Numerical Software with Result Verification


Book Description

This book constitutes the thoroughly refereed post-proceedings of the Dagstuhl Seminar 03041 on Numerical Software with Result Verification held at Dagstuhl Castle, Germany, in January 2003. The 18 revised full papers presented were selected during two rounds of reviewing and improvements. The papers are organized in topical sections on languages, software systems and tools, new verification techniques based on interval arithmetic, applications in science and engineering, and novel approaches to verification.




Numerical Validation in Current Hardware Architectures


Book Description

The major emphasis of the Dagstuhl Seminar on “Numerical Validation in C- rent Hardware Architectures” lay on numerical validation in current hardware architecturesand softwareenvironments. The generalidea wasto bring together experts who are concerned with computer arithmetic in systems with actual processor architectures and scientists who develop, use, and need techniques from veri?ed computation in their applications. Topics of the seminar therefore included: – The ongoing revision of the IEEE 754/854 standard for ?oating-point ari- metic – Feasible ways to implement multiple precision (multiword) arithmetic and to compute the actual precision at run-time according to the needs of input data – The achievement of a similar behavior of ?xed-point, ?oating-point and - terval arithmetic across language compliant implementations – The design of robust and e?cient numerical programsportable from diverse computers to those that adhere to the IEEE standard – The development and propagation of validated special-purpose software in di?erent application areas – Error analysis in several contexts – Certi?cation of numerical programs, veri?cation and validation assessment Computer arithmetic plays an important role at the hardware and software level, when microprocessors, embedded systems, or grids are designed. The re- ability of numerical softwarestrongly depends on the compliance with the cor- sponding ?oating-point norms. Standard CISC processors follow the 1985 IEEE norm 754, which is currently under revision, but the new highly performing CELL processor is not fully IEEE compliant.




Developments in Reliable Computing


Book Description

The SCAN conference, the International Symposium on Scientific Com puting, Computer Arithmetic and Validated Numerics, takes place bian nually under the joint auspices of GAMM (Gesellschaft fiir Angewandte Mathematik und Mechanik) and IMACS (International Association for Mathematics and Computers in Simulation). SCAN-98 attracted more than 100 participants from 21 countries all over the world. During the four days from September 22 to 25, nine highlighted, plenary lectures and over 70 contributed talks were given. These figures indicate a large participation, which was partly caused by the attraction of the organizing country, Hungary, but also the effec tive support system have contributed to the success. The conference was substantially supported by the Hungarian Research Fund OTKA, GAMM, the National Technology Development Board OMFB and by the J6zsef Attila University. Due to this funding, it was possible to subsidize the participation of over 20 scientists, mainly from Eastern European countries. It is important that the possibly first participation of 6 young researchers was made possible due to the obtained support. The number of East-European participants was relatively high. These results are especially valuable, since in contrast to the usual 2 years period, the present meeting was organized just one year after the last SCAN-xx conference.




Scientific Computing, Computer Arithmetic, and Validated Numerics


Book Description

This book constitutes the refereed post proceedings of the 16th International Symposium, SCAN 2014, held in Würzburg, Germany, in September 2014. The 22 full papers presented were carefully reviewed and selected from 60 submissions. The main concerns of research addressed by SCAN conferences are validation, verification or reliable assertions of numerical computations. Interval arithmetic and other treatments of uncertainty are developed as appropriate tools.




Computer Aided Verification


Book Description

This book constitutes the refereed proceedings of the 19th International Conference on Computer Aided Verification. Thirty-three state-of-the-technology papers are presented, together with fourteen tool papers, three invited papers, and four invited tutorials. All the current issues in computer aided verification and model checking—from foundational and methodological issues to the evaluation of major tools and systems—are addressed.




Advanced Computing and Systems for Security: Volume 14


Book Description

This book features extended versions of selected papers that were presented and discussed at the 8th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2021), held in Kolkata, India, on April 9–10, 2021. Organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology at the University of Calcutta, the symposium’s international partners were Ca' Foscari University of Venice, Italy, and Bialystok University of Technology, Poland. The topics covered include biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks, and security systems, reflecting the various symposium sessions.




Computer Aided Verification


Book Description

This open access two-volume set LNCS 12759 and 12760 constitutes the refereed proceedings of the 33rd International Conference on Computer Aided Verification, CAV 2021, held virtually in July 2021. The 63 full papers presented together with 16 tool papers and 5 invited papers were carefully reviewed and selected from 290 submissions. The papers were organized in the following topical sections: Part I: invited papers; AI verification; concurrency and blockchain; hybrid and cyber-physical systems; security; and synthesis. Part II: complexity and termination; decision procedures and solvers; hardware and model checking; logical foundations; and software verification.




Computer Aided Verification


Book Description

The two-volume set LNCS 10426 and LNCS 10427 constitutes the refereed proceedings of the 29th International Conference on Computer Aided Verification, CAV 2017, held in Heidelberg, Germany, in July 2017. The total of 50 full and 7 short papers presented together with 5 keynotes and tutorials in the proceedings was carefully reviewed and selected from 191 submissions. The CAV conference series is dedicated to the advancement of the theory and practice of computer-aided formal analysis of hardware and software systems. The conference covers the spectrum from theoretical results to concrete applications, with an emphasis on practical verification tools and the algorithms and techniques that are needed for their implementation.




Practical Aspects of Declarative Languages


Book Description

This book constitutes the refereed proceedings of the Second International Workshop on Practical Aspects of Declarative Languages, PADL 2000, held in Boston, MA, USA in January 2000. The 21 revised full papers presented were carefully reviewed and selected from a total of 36 submissions. The papers are organized in topical sections on functional programming, functional-logic programming, logic programming, innovative applications, constraint programming and constraint solving, and systems applications.




Computer Aided Verification


Book Description

The open access proceedings set LNCS 13964, 13965, 13966 constitutes the refereed proceedings of the 35th International Conference on Computer Aided Verification, CAV 2023, which was held in Paris, France, in July 2023. The 67 full papers presented in these proceedings were carefully reviewed and selected from 261 submissions. The have been organized in topical sections as follows: Part I: Automata and logic; concurrency; cyber-physical and hybrid systems; synthesis; Part II: Decision procedures; model checking; neural networks and machine learning; Part II: Probabilistic systems; security and quantum systems; software verification.