Results 1 
8 of
8
Towards an Archival Intermemory
 In Proc. of IEEE ADL
, 1998
"... We propose a selforganizing archival Intermemory. That is, a noncommercial subscriberprovided distributed information storage service built on the existing Internet. Given an assumption of continued growth in the memory's total size, a subscriber's participation for only a finite time can neverthe ..."
Abstract

Cited by 88 (1 self)
 Add to MetaCart
We propose a selforganizing archival Intermemory. That is, a noncommercial subscriberprovided distributed information storage service built on the existing Internet. Given an assumption of continued growth in the memory's total size, a subscriber's participation for only a finite time can nevertheless ensure archival preservation of the subscriber's data. Information disperses through the network over time and memories become more difficult to erase as they age. The probability of losing an old memory given random node failures is vanishingly small  and an adversary would have to corrupt hundreds of thousands of nodes to destroy a very old memory. This paper presents a framework for the design of an Intermemory, and considers certain aspects of the design in greater detail. In particular, the aspects of addressing, space efficiency, and redundant coding are discussed. Keywords: Archival Storage, Distributed Redundant Databases, Electronic Publishing, Distributed Algorithms, Error ...
Defthms about zip and tie: Reasoning about powerlists in ACL2
 Univ. of Texas Comp. Sci. Tech. Rep
, 1997
"... In [Mis94], Misra introduced the powerlist data structure, which is well suited to express recursive, dataparallel algorithms. Moreover, Misra and other researchers have shown how powerlists can be used to prove the correctness of several algorithms. This success has encouraged some researchers to ..."
Abstract

Cited by 8 (3 self)
 Add to MetaCart
In [Mis94], Misra introduced the powerlist data structure, which is well suited to express recursive, dataparallel algorithms. Moreover, Misra and other researchers have shown how powerlists can be used to prove the correctness of several algorithms. This success has encouraged some researchers to pursue automated proofs of theorems about powerlists[Kap97, KS95a, KS95b]. In this paper, we show how ACL2 can be used to verify theorems about powerlists. We depart from previous approaches in two significant ways. First, the powerlists we use are not the regular structures defined by Misra; that is, we do not require powerlists to be balanced trees. As we will see, this complicates some of the proofs, but on the other hand it allows us to state theorems that are otherwise beyond the language of powerlists. Second, we wish to prove the correctness of powerlist algorithms as much as possible within the logic of powerlists. Previous approaches have relied
Mechanically Verifying the Correctness of the Fast Fourier Transform in ACL2
 IN THIRD INTERNATIONAL WORKSHOP ON FORMAL METHODS FOR PARALLEL PROGRAMMING: THEORY AND APPLICATIONS
, 1998
"... In [10], Misra introduced the powerlist data structure, which is well suited to express recursive, dataparallel algorithms. In particular, Misra showed how powerlists could be used to give simple descriptions to very complex algorithms, such as the Fast Fourier Transform (FFT). Such simplicity in ..."
Abstract

Cited by 4 (2 self)
 Add to MetaCart
In [10], Misra introduced the powerlist data structure, which is well suited to express recursive, dataparallel algorithms. In particular, Misra showed how powerlists could be used to give simple descriptions to very complex algorithms, such as the Fast Fourier Transform (FFT). Such simplicity in presentation facilitates reasoning about the resulting algorithms, and in fact Misra was able to give a stunningly simple proof of the correctness of the FFT. In this paper, we show how this proof can be verified using ACL2. This strengthens Misra's case that powerlists provide a suitable framework in which to define and reason about parallel algorithms, particularly using mechanical tools to aid in reasoning.
Square Roots in ACL2: A Study in Sonata Form
, 1996
"... this paper, we explore this issue by focusing on the square root function. We begin by showing that this function does not exist in the ACL2 universe. In particular, we use the absence of the irrationals to prove that for all x, x ..."
Abstract

Cited by 3 (2 self)
 Add to MetaCart
this paper, we explore this issue by focusing on the square root function. We begin by showing that this function does not exist in the ACL2 universe. In particular, we use the absence of the irrationals to prove that for all x, x
On computing the centroid of the vertices of an arrangement and related problems
 Proc. Symp. Algo. Data Structures (WADS’07), LNCS 4619, 2007
, 2008
"... Abstract. We consider the problem of computing the centroid of all the vertices in a nondegenerate arrangement of n lines. The trivial approach 2 vertices. We present an O(nlog n) requires the enumeration of all ` n 2 algorithm for computing this centroid. For arrangements of n segments we give an ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
Abstract. We consider the problem of computing the centroid of all the vertices in a nondegenerate arrangement of n lines. The trivial approach 2 vertices. We present an O(nlog n) requires the enumeration of all ` n 2 algorithm for computing this centroid. For arrangements of n segments we give an O(n 4 3 +ǫ) algorithm for computing the centroid of its vertices. For the special case that all the segments of the arrangement are chords of a simply connected planar region we achieve an O(nlog 5 n) time bound. Our bounds also generalize to certain natural weighted versions of those problems.
Implementing a costaware evaluator for ACL2 expressions
 in ACL2 ’06: Proceedings of the sixth international workshop on the ACL2 theorem prover and its applications
, 2006
"... One of ACL2’s most interesting features is that it is executable, so users can run the programs that they verify, and debug them during verification. In fact, the ACL2 implementors have gone well out of their way to make sure ACL2 programs can be executed efficiently. Nevertheless, ACL2 does not pro ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
One of ACL2’s most interesting features is that it is executable, so users can run the programs that they verify, and debug them during verification. In fact, the ACL2 implementors have gone well out of their way to make sure ACL2 programs can be executed efficiently. Nevertheless, ACL2 does not provide a framework for reasoning about the cost of function invocations. This paper describes how such a framework can be added to ACL2, by using ACL2 macros and supporting code to access the prover state. The approach is illustrated with a cost analysis of redblack tree operations.
Prelude
, 1996
"... One of ACL2’s extensions over its predecessor Nqthm is the direct support for a richer set of numbers, including the rationals and complexrationals but not including the irrationals. The absence of the irrationals is strong, in the sense that ACL2’s typing mechanism asserts that all numbers are inte ..."
Abstract
 Add to MetaCart
One of ACL2’s extensions over its predecessor Nqthm is the direct support for a richer set of numbers, including the rationals and complexrationals but not including the irrationals. The absence of the irrationals is strong, in the sense that ACL2’s typing mechanism asserts that all numbers are integers, rationals, or complexrationals, and all other objects are indistinguishable from zero, as far as arithmetic operations are concerned. This is in contrast to an approach where the irrationals exist, but the axioms are simply too weak to prove much of anything about them that isn’t also true about all the real numbers; in other words, a logic roughly equivalent to our everyday understanding of the reals. This brings up the question of what is the proper way to reason about transcendental functions in ACL2, since strictly speaking ACL2 can only reason about rational functions. In this paper, we explore this issue by focusing on the square root function. We begin by showing that this function does not exist in the ACL2 universe. In particular, we use the absence of the irrationals to prove that for all x, x 2 ̸ = 2. This illustrates that when dealing with assertions about the real number line, one best remember that ACL2 can prove them only for the rationals — and the equivalent assertions about the reals may be false. One can argue, however, that to a computer scientist the rationals should be enough. After all, computers don’t support the irrational numbers, either, so we have to approximate any transcendental function by a rational equivalent. We show how this can be done for square root and use ACL2 to prove that our approximation is arbitrarily close to the square root function. Our technique is to prove that a specific function (namely a bisection algorithm) serves as an approximation. ∗ Author is supported by a salary from LIM International, Inc. 1 1