Jared Davis's research while affiliated with University of Texas at Austin and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (8)
Rewriting with lemmas is a central strategy in interactive theorem provers. We describe the Milawa rewriter, which makes use of assumptions, cal-culation, and conditional rewrite rules to simplify the terms of a first-order logic. We explain how we have developed an ACL2 proof showing the rewriter is sound, and how this proof can accommodate our re...
We have written a new records library for modelling fixed- size arrays and linear memories. Our implementation pro- vides fixnum-optimized O(log2 n) reads and writes from ad- dresses 0,1,...,n 1. Space is not allocated until locations are used, so large address spaces can be represented. We do not use single-threaded objects or ACL2 arrays, which f...
We introduce the logical story behind file input in ACL2 and discuss the types of theorems that can be proven about file-reading operations. We develop a low level library for reasoning about the primitive input routines. We then develop a representation for Unicode text, and implement efficient functions to translate our representation to and from...
We present a new finite set theory implementation for ACL2 wherein sets are implemented as fully ordered lists. This order unifies the notions of set equality and element equality by creating a unique represen-tation for each set, which in turn enables nested sets to be trivially supported and eliminates the need for congruence rules. We demonstrat...
The SSP is a high assurance systems engineering effort spanning both hardware and software. Extensive design review, first principle design, n-version programming, program transformation, verification, and consistency checking are the techniques used to provide assurance in the correctness of the resulting system.
We prove the equivalence of a function that efficiently recog-nizes XML name characters with its specification in ACL2. We conduct the proof by reducing the search space to a finite set of cases, then ef-ficiently and exhaustively testing the remaining cases by executing a hand-written function. Our proof is possible because of the way ACL2 integra...
We present a finite set theory implementation for ACL2. Our library represents sets as fully ordered lists, and provides efficient implementations of the typical set theory operations such as insertion, deletion, union, intersection, difference, cardinality, and sorting lists to create sets. It also includes facilities for quantifying predicates ov...
Citations
... @BULLET The std/osets [5] library functions treat non-sets as nil. ...
Reference: Fix Your Types
... Records [22] are data storing structures that can be accessed by the user for reading as well as writing data in memories. A record can hence be considered as a simple abstraction for the memory. ...
... Davis [8] used exhaustive testing to prove lemmas toward the correctness of UTF-8 processing functions . The most difficult proof carried out this way was a well-formedness and inversion property for four-byte UTF-8 sequences, which involved checking 2 32 cases. ...
Reference: Bit-Blasting ACL2 Theorems
... The SCORE processor [6] is a hardware implementation of the JVM [7] being designed at Sandia National Laboratories , that is similar to the Java Card [8,9], for use in resource-constrained embedded applications.Table 1 gives an overview of the features not supported by the SCORE. We would like to mention that the SCORE does support general exceptions, just not run-time assertions. ...