Conference Paper

Resolution of Goals with the Functional and Logic Programming Language LPG: Impact of Abstract Interpretation.

DOI: 10.1007/BFb0014359 Conference: Algebraic Methodology and Software Technology, 5th International Conference, AMAST '96, Munich, Germany, July 1-5, 1996, Proceedings
Source: DBLP


Introductionlpg [1, 5] belongs to the class of languages designed for software specification,rapid prototyping and high-level programming. It allows one to define abstractdata types, functions and predicates within one unified framework : Horn clauselogic with equality. An implementation of lpg for SUN4/SunOS 4.1.3 is availableby URL The lpg calculus, designedto solve goals `a la Prolog, is mainly based on narrowing techniques. These techniquesyield...

Full-text preview

Available from:
  • Source
    • "Our technique could be used as a basis for developing abstract debugging tools for different multi-paradigm languages equipped with a form of narrowing, including e.g., Curry [83], Elan [36], LPG [32] [33], Maude [51] [102] [103], and Toy [96]. (3) In order to provide a practical implementation, we also present an effective debugging methodology that is based on abstract interpretation. "
    [Show abstract] [Hide abstract]
    ABSTRACT: We present a generic scheme for the declarative debugging of programs that are written in rewriting-based languages that are equipped with narrowing. Our aim is to provide an integrated development environment in which it is possible to debug a program and then correct it automatically. Our methodology is based on the combination (in a single framework) of a semantics-based diagnoser that identifies those parts of the code that contain errors and an inductive learner that tries to repair them, once the bugs have been located in the program. We develop our methodology in several steps. First, we associate with our programs a semantics that is based on a (continuous) immediate consequence operator, TR, which models the answers computed by narrowing and is parametric w.r.t. the evaluation strategy, which can be eager or lazy. Then, we show that, given the intended specification of a program R, it is possible to check the correctness of R by a single step of TR. In order to develop an effective debugging method, we approximate the computed answers semantics of R and derive a finitely terminating bottom-up abstract diagnosis method, which can be used statically. Finally, a bug-correction program synthesis methodology attempts to correct the erroneous components of the wrong code. We propose a hybrid, top-down (unfolding-based) as well as bottom-up (induction-based), correction approach that is driven by a set of evidence examples which are automatically produced as an outcome by the diagnoser. The resulting program is proven to be correct and complete w.r.t. the considered example sets. Our debugging framework does not require the user to provide error symptoms in advance or to answer difficult questions concerning program correctness. An implementation of our debugging system has been undertaken which demonstrates the workability of our approach.
    Full-text · Article · Oct 2010 · Theoretical Computer Science
  • Source
    • "Note that similar approaches have been used for other purposes. See for instance, k-limiting in may-alias analysis [16] and abstract rewriting [17], [18]. "
    [Show abstract] [Hide abstract]
    ABSTRACT: Given its special nature, e-commerce yields concerns for providing secure transactions. Accordingly, a number of secu- rity properties, such as secrecy, authentication and fairn ess, have to be guaranteed. In this paper, we present a new method based on abstract interpretation for secrecy verification in e-co mmerce protocols. Hence, we define an abstract message domain and an abstract interpretation over finite and approximated model s of e-commerce protocols. This allows us to build a semi-decidable procedure for e-commerce protocol correctness with respect to the secrecy property. Our approach is fully automatic from cryptographic protocol description to results and requires no user input except the protocol description and the level of the abstraction.
    Full-text · Article · Jan 2008