1995
DOI: 10.1093/logcom/5.5.631
|View full text |Cite
|
Sign up to set email alerts
|

Automated Mathematical Induction

Abstract: Proofs by induction are important in many computer science and arti cial intelligence applications, in particular, in program veri cation and speci cation systems. We present a new method to prove (and disprove) automatically inductive properties. Given a set of axioms, a well-suited induction scheme is constructed automatically. We call such an induction scheme a test set. Then, for proving a property, we just instantiate it with terms from the test set and apply pure algebraic simpli cation to the result. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

1996
1996
2011
2011

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 42 publications
(30 citation statements)
references
References 31 publications
0
30
0
Order By: Relevance
“…a rewrite system R, we will consider a simplified version of the Spike inference system [5,3], represented in Fig. 1, that implements this particular case of Noetherian induction in order to perform implicit induction proofs.…”
Section: Noetherian Induction For Implicit Induction Proofsmentioning
confidence: 99%
See 2 more Smart Citations
“…a rewrite system R, we will consider a simplified version of the Spike inference system [5,3], represented in Fig. 1, that implements this particular case of Noetherian induction in order to perform implicit induction proofs.…”
Section: Noetherian Induction For Implicit Induction Proofsmentioning
confidence: 99%
“…if e is subsumed by some conjecture from H ∪ L. presented in [3] and is different from the 'test set' method from [5]. Finally, the current conjecture is added to the set of premises.…”
Section: Noetherian Induction For Implicit Induction Proofsmentioning
confidence: 99%
See 1 more Smart Citation
“…This algorithm is used to synchronize a collaborative text object, shared by two or more users. There are two editing operations: Ins(p, c, pr) to insert a character c at position p and Del(p, pr) to delete a character at position p. Operations Ins and Del are extended with another parameter pr 1 . This one represents a priority scheme that is used to solve a conflict occurring when two concurrent insert operations were originally intended to insert different characters at the same position.…”
Section: Convergence Problemsmentioning
confidence: 99%
“…(iii) In the same way, op 1 is received on site 2 and must be transformed according to op 2 . T (Ins(1, x), Del (1)) is called and returns Ins(0, x). Condition C 1 is violated.…”
Section: Violation Of Cmentioning
confidence: 99%