Skip to main content

Showing 1–11 of 11 results for author: Hamilton, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.10675   

    cs.PL cs.LO cs.SC cs.SE

    Proceedings 9th Workshop on Horn Clauses for Verification and Synthesis and 10th International Workshop on Verification and Program Transformation

    Authors: Geoffrey W. Hamilton, Temesghen Kahsai, Maurizio Proietti

    Abstract: These proceedings include selected papers presented at the 9th Workshop on Horn Clauses for Verification and Synthesis and the Tenth International Workshop on Verification and Program Transformation, both affiliated with ETAPS 2022. Many Program Verification and Synthesis problems of interest can be modeled directly using Horn clauses and many recent advances in the CLP and CAV communities have… ▽ More

    Submitted 19 November, 2022; originally announced November 2022.

    Journal ref: EPTCS 373, 2022

  2. The Ethics of Biosurveillance

    Authors: S. K. Devitt, P. W. J. Baxter, G. Hamilton

    Abstract: Governments must keep agricultural systems free of pests that threaten agricultural production and international trade. Biosecurity surveillance already makes use of a wide range of technologies, such as insect traps and lures, geographic information systems, and diagnostic biochemical tests. The rise of cheap and usable surveillance technologies such as remotely piloted aircraft systems (RPAS) pr… ▽ More

    Submitted 23 November, 2021; originally announced November 2021.

    Comments: 32 pages, 2 figures, 2019, Journal of Agricultural and Environmental Ethics

    ACM Class: K.4.0; K.4.1; K.4.2; K.4.3

    Journal ref: Journal of Agricultural and Environmental Ethics, 32(5), 709-740 (2019)

  3. arXiv:2108.11347  [pdf, ps, other

    cs.PL

    The Next 700 Program Transformers

    Authors: Geoffrey Hamilton

    Abstract: In this paper, we describe a hierarchy of program transformers in which the transformer at each level of the hierarchy builds on top of those at lower levels. The program transformer at level 1 of the hierarchy corresponds to positive supercompilation, and that at level 2 corresponds to distillation. We prove that the transformers at each level terminate. We then consider the speedups that can be… ▽ More

    Submitted 27 August, 2021; v1 submitted 25 August, 2021; originally announced August 2021.

    Comments: Pre-proceedings paper presented at the 31st International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2021), Tallinn, Estonia, and Virtual, September 7-8, 2021 (arXiv:2107.10160)

    Report number: LOPSTR/2021/13 ACM Class: D.3.4; I.2.2; F.3.2

  4. Tight Polynomial Bounds for Loop Programs in Polynomial Space

    Authors: A. M. Ben-Amram, G. W. Hamilton

    Abstract: We consider the following problem: given a program, find tight asymptotic bounds on the values of some variables at the end of the computation (or at any given program point) in terms of its input values. We focus on the case of polynomially-bounded variables, and on a weak programming language for which we have recently shown that tight bounds for polynomially-bounded variables are computable. Th… ▽ More

    Submitted 10 November, 2021; v1 submitted 6 October, 2020; originally announced October 2020.

    MSC Class: F.2.0 ACM Class: F.2.0

    Journal ref: Logical Methods in Computer Science, Volume 17, Issue 4 (November 11, 2021) lmcs:6832

  5. Distilling Programs to Prove Termination

    Authors: G. W. Hamilton

    Abstract: The problem of determining whether or not any program terminates was shown to be undecidable by Turing, but recent advances in the area have allowed this information to be determined for a large class of programs. The classic method for deciding whether a program terminates dates back to Turing himself and involves finding a ranking function that maps a program state to a well-order, and then pro… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    Comments: In Proceedings VPT/HCVS 2020, arXiv:2008.02483. This work owes a lot to the input of Neil Jones, who provided many useful insights and ideas on the subject matter presented here

    ACM Class: F.3.1; D.2.4

    Journal ref: EPTCS 320, 2020, pp. 140-154

  6. Tight Polynomial Worst-Case Bounds for Loop Programs

    Authors: Amir M. Ben-Amram, Geoff Hamilton

    Abstract: In 2008, Ben-Amram, Jones and Kristiansen showed that for a simple programming language - representing non-deterministic imperative programs with bounded loops, and arithmetics limited to addition and multiplication - it is possible to decide precisely whether a program has certain growth-rate properties, in particular whether a computed value, or the program's running time, has a polynomial growt… ▽ More

    Submitted 13 May, 2020; v1 submitted 24 June, 2019; originally announced June 2019.

    MSC Class: F.2.0 ACM Class: F.2.0

    Journal ref: Logical Methods in Computer Science, Volume 16, Issue 2 (May 14, 2020) lmcs:5596

  7. Generating Loop Invariants for Program Verification by Transformation

    Authors: G. W. Hamilton

    Abstract: Loop invariants play a central role in the verification of imperative programs. However, finding these invariants is often a difficult and time-consuming task for the programmer. We have previously shown how program transformation can be used to facilitate the verification of functional programs, but the verification of imperative programs is more challenging due to the need to discover these loop… ▽ More

    Submitted 23 August, 2017; originally announced August 2017.

    Comments: In Proceedings VPT 2017, arXiv:1708.06887

    ACM Class: F.3.1; D.2.4

    Journal ref: EPTCS 253, 2017, pp. 36-53

  8. Program Transformation to Identify List-Based Parallel Skeletons

    Authors: Venkatesh Kannan, G. W. Hamilton

    Abstract: Algorithmic skeletons are used as building-blocks to ease the task of parallel programming by abstracting the details of parallel implementation from the developer. Most existing libraries provide implementations of skeletons that are defined over flat data types such as lists or arrays. However, skeleton-based parallel programming is still very challenging as it requires intricate analysis of the… ▽ More

    Submitted 8 July, 2016; originally announced July 2016.

    Comments: In Proceedings VPT 2016, arXiv:1607.01835

    ACM Class: D.3.2

    Journal ref: EPTCS 216, 2016, pp. 118-136

  9. Generating Counterexamples for Model Checking by Transformation

    Authors: G. W. Hamilton

    Abstract: Counterexamples explain why a desired temporal logic property fails to hold. The generation of counterexamples is considered to be one of the primary advantages of model checking as a verification technique. Furthermore, when model checking does succeed in verifying a property, there is typically no independently checkable witness that can be used as evidence for the verified property. Previously,… ▽ More

    Submitted 8 July, 2016; originally announced July 2016.

    Comments: In Proceedings VPT 2016, arXiv:1607.01835. arXiv admin note: substantial text overlap with arXiv:1512.03860

    ACM Class: F.3.1; D.2.4

    Journal ref: EPTCS 216, 2016, pp. 65-82

  10. arXiv:1607.01835   

    cs.PL cs.SE

    Proceedings of the Fourth International Workshop on Verification and Program Transformation

    Authors: Geoff Hamilton, Alexei Lisitsa, Andrei P. Nemytykh

    Abstract: This volume contains the revised versions of papers presented at the Fourth International Workshop on Verification and Program Transformation (VPT 2016) on April 2, 2016 in Eindhoven, The Netherlands. The workshop is an event of the European Joint Conferences on Theory and Practice of Software (ETAPS 2016). The aim of the VPT workshops is to provide a forum where people from the area of program… ▽ More

    Submitted 6 July, 2016; originally announced July 2016.

    Journal ref: EPTCS 216, 2016

  11. Verifying Temporal Properties of Reactive Systems by Transformation

    Authors: Geoff Hamilton

    Abstract: We show how program transformation techniques can be used for the verification of both safety and liveness properties of reactive systems. In particular, we show how the program transformation technique distillation can be used to transform reactive systems specified in a functional language into a simplified form that can subsequently be analysed to verify temporal properties of the systems. Exam… ▽ More

    Submitted 11 December, 2015; originally announced December 2015.

    Comments: In Proceedings VPT 2015, arXiv:1512.02215. This work was supported, in part, by Science Foundation Ireland grant 10/CE/I1855 to Lero - the Irish Software Engineering Research Centre (www.lero.ie), and by the School of Computing, Dublin City University

    ACM Class: I.2.2, F.3.2

    Journal ref: EPTCS 199, 2015, pp. 33-49