2014
DOI: 10.1007/978-3-319-07151-0_4
|View full text |Cite
|
Sign up to set email alerts
|

Using Big-Step and Small-Step Semantics in Maude to Perform Declarative Debugging

Abstract: Declarative debugging is a semi-automatic debugging technique that abstracts the execution details to focus on results. This technique builds a debugging tree representing an incorrect computation and traverses it by asking questions to the user until the error is found. In previous works we have presented a declarative debugger for Maude specifications. Besides a programming language, Maude is a semantic framework where several other languages can be specified. However, our declarative debugger is only able t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Several tools and techniques rely on Maude's advanced unification capabilities, such as termination [14] and local confluence and coherence [15,16] proofs, narrowing-based theorem proving [35] or testing [34], and logical model checking [20,4]. The area of cryptographic protocol analysis has also benefited from advanced unification algorithms: Maude-NPA [19], Tamarin [12] and AKISS [5] rely on the different unification features of Maude.…”
Section: Introductionmentioning
confidence: 99%
“…Several tools and techniques rely on Maude's advanced unification capabilities, such as termination [14] and local confluence and coherence [15,16] proofs, narrowing-based theorem proving [35] or testing [34], and logical model checking [20,4]. The area of cryptographic protocol analysis has also benefited from advanced unification algorithms: Maude-NPA [19], Tamarin [12] and AKISS [5] rely on the different unification features of Maude.…”
Section: Introductionmentioning
confidence: 99%
“…Several tools and techniques rely on Maude's advanced unification capabilities, such as termination [13] and local confluence and coherence [14] proofs, narrowing-based theorem proving [34] or testing [33], and logical model checking [18,4]. The area of cryptographic protocol analysis has also benefited: the Maude-NPA tool [17] is the most successful example of using variant-based equational unification in Maude and the Tamarin tool [26,10,11] also relies on variants.…”
Section: Introductionmentioning
confidence: 99%
“…Several tools and techniques rely on Maude's advanced unification capabilities, such as termination [47] and local confluence and coherence [48,49] proofs, narrowing-based theorem proving [104] or testing [103], and logical model checking [16,58]. The area of cryptographic protocol analysis has also benefited from advanced unification algorithms: Maude-NPA [55], Tamarin [45] and AKISS [17] rely on the different unification features of Maude.…”
Section: Introductionmentioning
confidence: 99%