2011
DOI: 10.1007/978-3-642-24288-5_8
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing Conclusive Approximations by Logical Formulae

Abstract: Abstract. Considering an initial set of terms E, a rewriting relation R and a goal set of terms Bad, reachability analysis in term rewriting tries to answer to the following question: does there exists at least one term of Bad that can be reached from E using the rewriting relation R? Some of the approaches try to show that there exists at least one term of Bad reachable from E using the rewriting relation R by computing the set of reachable terms. Some others tackle the unreachability problem i.e. no term of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…Here our termination proof holds for any left-linear TRS provided that the set of equations satisfy some properties. The approach followed by [37,18] is very different. Starting from the TRS, the set of initial terms and a set of "bad" terms that should not be reachable, they tend to directly characterize a correct approximation automaton by constraint solving for the first and by finite model generation for the second.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Here our termination proof holds for any left-linear TRS provided that the set of equations satisfy some properties. The approach followed by [37,18] is very different. Starting from the TRS, the set of initial terms and a set of "bad" terms that should not be reachable, they tend to directly characterize a correct approximation automaton by constraint solving for the first and by finite model generation for the second.…”
Section: Related Workmentioning
confidence: 99%
“…Our first criterion permits to build exactly an automaton recognizing sets of reachable terms and does not relies on "bad" terms. In this case, algorithms of [37,18] cannot be applied. Our second criterion does not either require to define "bad" terms.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Completion with equational abstraction has been applied to very complex case studies such as the verification of (industrial) cryptography protocols [26,28] and Java bytecode applications [13]. CEGAR algorithms based on equational-abstraction completion exist [11,12], but are known to be inefficient.…”
Section: Introductionmentioning
confidence: 99%