AbstractCongruence closure algorithms for deduction in ground equational theories are ubiquitous in many (semi-)decision procedures used for verification and automated deduction. In many of these applications one needs an incremental algorithm that is moreover capable of recovering, among the thousands of input equations, the small subset that explains the equivalence of a given pair of terms. In this paper we present an algorithm satisfying all these requirements. First, building on ideas from abstract congruence closure algorithms, we present a very simple and clean incremental congruence closure algorithm and show that it runs in the best known time O(n log n). After that, we introduce a proof-producing union-find data structure that is ...
Algorithms for computing congruence closure of ground equations overuninterpreted symbols and interp...
Abstract. In this paper, it is shown that there is an algorithm that, given any finite set E of grou...
Message deducibility and static equivalence are central problems in symbolic security protocol analy...
Congruence closure algorithms for deduction in ground equational theories are ubiquitous in many (se...
AbstractCongruence closure algorithms for deduction in ground equational theories are ubiquitous in ...
Article dans revue scientifique avec comité de lecture.We describe the concept of an abstract congru...
This paper presents two fast algorithms for testing the unsatisfiability of a set of ground Horn cla...
It is by now well known that congruence closure (CC) algorithms can be viewed as implementing ground...
We first show that ground term-rewriting systems can be completed in a polynomial number of rewritin...
In this paper, an algorithm for testing the unsatisfiability of a set of ground order-sorted equatio...
We present a data structure to represent and manipulate large sets of (equal) terms (or expressions)...
Several existing program verification and automated prooff systems make use of similar decision pro...
In deduction modulo, a theory is not represented by a set of axioms but by a congruence on propositi...
Many verification techniques nowadays successfully rely on SMT solvers as back-ends to automatically...
AbstractThe importance of models within automated deduction is generally acknowledged both in constr...
Algorithms for computing congruence closure of ground equations overuninterpreted symbols and interp...
Abstract. In this paper, it is shown that there is an algorithm that, given any finite set E of grou...
Message deducibility and static equivalence are central problems in symbolic security protocol analy...
Congruence closure algorithms for deduction in ground equational theories are ubiquitous in many (se...
AbstractCongruence closure algorithms for deduction in ground equational theories are ubiquitous in ...
Article dans revue scientifique avec comité de lecture.We describe the concept of an abstract congru...
This paper presents two fast algorithms for testing the unsatisfiability of a set of ground Horn cla...
It is by now well known that congruence closure (CC) algorithms can be viewed as implementing ground...
We first show that ground term-rewriting systems can be completed in a polynomial number of rewritin...
In this paper, an algorithm for testing the unsatisfiability of a set of ground order-sorted equatio...
We present a data structure to represent and manipulate large sets of (equal) terms (or expressions)...
Several existing program verification and automated prooff systems make use of similar decision pro...
In deduction modulo, a theory is not represented by a set of axioms but by a congruence on propositi...
Many verification techniques nowadays successfully rely on SMT solvers as back-ends to automatically...
AbstractThe importance of models within automated deduction is generally acknowledged both in constr...
Algorithms for computing congruence closure of ground equations overuninterpreted symbols and interp...
Abstract. In this paper, it is shown that there is an algorithm that, given any finite set E of grou...
Message deducibility and static equivalence are central problems in symbolic security protocol analy...