2014
DOI: 10.1016/j.entcs.2014.10.009
|View full text |Cite
|
Sign up to set email alerts
|

Abstract Local Reasoning for Concurrent Libraries: Mind the Gap

Abstract: 16.06.15 KB. Ok to add published verison, OA paper© 2014 The Authors.We study abstract local reasoning for concurrent libraries. There are two main approaches: provide a specification of a library by abstracting from concrete reasoning about an implementation; or provide a direct abstract library specification, justified by refining to an implementation. Both approaches have a significant gap in their reasoning, due to a mismatch between the abstract connectivity of the abstract data structures and the concret… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…We give a natural axiomatic specification of the sequential POSIX file system using SSL; the general theory is in [25,12]. We verify safety properties for a client software installer, demonstrating integrated reasoning for the file system and the heap.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…We give a natural axiomatic specification of the sequential POSIX file system using SSL; the general theory is in [25,12]. We verify safety properties for a client software installer, demonstrating integrated reasoning for the file system and the heap.…”
Section: Discussionmentioning
confidence: 99%
“…Concurrent abstract predicates [7,24,23] work well for reasoning abstractly about simple concurrent data structures. However, they do not extend to complex data structures since the implementation details leak into the abstraction [12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, n.getElementsByTagName(s) returns a NodeList (using depth-first, left-to-right search) containing the identifiers of the elements named s underneath the tree rooted at n. Given the DOM tree of Fig. 1a, when n=4 and s="img", then r = n.getElementsByTagName(s) yields r= [3,8,2]. However, since NodeLists are live, if node 8 is later removed from the document, then r= [3,2].…”
Section: Live Collectionsmentioning
confidence: 99%
“…We present a faithful axiomatic specification of a key fragment of the DOM and verify substantial client programs, using structural separation logic (SSL) introduced in [25,8]. SSL provides fine-grained reasoning about complex data structures.…”
Section: Introductionmentioning
confidence: 99%