This paper describes two techniques for Datalog query evaluation and their application to object-oriented program analysis. The first technique transforms Datalog programs into an implicit Boolean Equation System (Bes) that can then be solved by using linear-time complexity algorithms that are available in existing, general purpose verification toolboxes such as Cadp. In order to improve scalability and to enable analyses involving advanced meta-programming features, we develop a second methodology that transforms Datalog programs into rewriting logic (Rwl) theories. This method takes advantage of the preeminent features and facilities that are available within the high-performance system Maude, which provides a very efficient implementatio...
This document is the Accepted Manuscript version of a Published Work that appeared in final form in ...
[EN] Two document processing applications are con- sidered: computer-assisted transcription of text...
Batch synchronization has been widely misunderstood as being only needed when variable trajectories ...
[EN] In program analysis, the synthesis of models of logical theories representing the program seman...
[EN] Rewriting logic is both a flexible semantic framework within which widely different concurrent ...
[EN] Mathematical programming models are invaluable tools at decision making, assisting managers to ...
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-23165-5_3This...
[EN] In the realm of term rewriting, given terms s and t, a reachability condition s>>t is called...
[EN] We investigate a parallelization strategy for dense matrix factorization (DMF) algorithms, usin...
© 2015 Folch-Fortuny et al. Open Access This article is distributed under the terms of the Creative ...
The final publication is available at Springer via http://dx.doi.org/10.1007/s10458-014-9257-1This ...
[EN] We report on the new version of mu-term, a tool for proving termination properties of variants ...
The final publication is available at Springer via http://dx.doi.org/10.1007/s10270-013-0371-3The us...
[EN] Modeling is requiring increasingly larger efforts while becoming indispensable given the comple...
[EN] Maude-NPA is an analysis tool for cryptographic security protocols that takes into account the ...
This document is the Accepted Manuscript version of a Published Work that appeared in final form in ...
[EN] Two document processing applications are con- sidered: computer-assisted transcription of text...
Batch synchronization has been widely misunderstood as being only needed when variable trajectories ...
[EN] In program analysis, the synthesis of models of logical theories representing the program seman...
[EN] Rewriting logic is both a flexible semantic framework within which widely different concurrent ...
[EN] Mathematical programming models are invaluable tools at decision making, assisting managers to ...
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-23165-5_3This...
[EN] In the realm of term rewriting, given terms s and t, a reachability condition s>>t is called...
[EN] We investigate a parallelization strategy for dense matrix factorization (DMF) algorithms, usin...
© 2015 Folch-Fortuny et al. Open Access This article is distributed under the terms of the Creative ...
The final publication is available at Springer via http://dx.doi.org/10.1007/s10458-014-9257-1This ...
[EN] We report on the new version of mu-term, a tool for proving termination properties of variants ...
The final publication is available at Springer via http://dx.doi.org/10.1007/s10270-013-0371-3The us...
[EN] Modeling is requiring increasingly larger efforts while becoming indispensable given the comple...
[EN] Maude-NPA is an analysis tool for cryptographic security protocols that takes into account the ...
This document is the Accepted Manuscript version of a Published Work that appeared in final form in ...
[EN] Two document processing applications are con- sidered: computer-assisted transcription of text...
Batch synchronization has been widely misunderstood as being only needed when variable trajectories ...