Decomposing the proof of correctness of pipelined microprocessors

Author(s):  
Ravi Hosabettu ◽  
Mandayam Srivas ◽  
Ganesh Gopalakrishnan
Author(s):  
Giles Reger ◽  
David Rydeheard

AbstractParametric runtime verification is the process of verifying properties of execution traces of (data carrying) events produced by a running system. This paper continues our work exploring the relationship between specification techniques for parametric runtime verification. Here we consider the correspondence between trace-slicing automata-based approaches and rule systems. The main contribution is a translation from quantified automata to rule systems, which has been implemented in Scala. This then allows us to highlight the key differences in how the two formalisms handle data, an important step in our wider effort to understand the correspondence between different specification languages for parametric runtime verification. This paper extends a previous conference version of this paper with further examples, a proof of correctness, and an optimisation based on a notion of redundancy observed during the development of the translation.


Author(s):  
Xiao Wang ◽  
Ziwei Zhang ◽  
Jing Wang ◽  
Peng Cui ◽  
Shiqiang Yang

Trust prediction, aiming to predict the trust relations between users in a social network, is a key to helping users discover the reliable information. Many trust prediction methods are proposed based on the low-rank assumption of a trust network. However, one typical property of the trust network is that the trust relations follow the power-law distribution, i.e., few users are trusted by many other users, while most tail users have few trustors. Due to these tail users, the fundamental low-rank assumption made by existing methods is seriously violated and becomes unrealistic. In this paper, we propose a simple yet effective method to address the problem of the violated low-rank assumption. Instead of discovering the low-rank component of the trust network alone, we learn a sparse component of the trust network to describe the tail users simultaneously. With both of the learned low-rank and sparse components, the trust relations in the whole network can be better captured. Moreover, the transitive closure structure of the trust relations is also integrated into our model. We then derive an effective iterative algorithm to infer the parameters of our model, along with the proof of correctness. Extensive experimental results on real-world trust networks demonstrate the superior performance of our proposed method over the state-of-the-arts.


2004 ◽  
Vol 20 (3) ◽  
pp. 269-278 ◽  
Author(s):  
F. Corno ◽  
E. Sanchez ◽  
M. Sonza Reorda ◽  
G. Squillero

1984 ◽  
Vol 27 (3) ◽  
pp. 230-232 ◽  
Author(s):  
A. Lew

1994 ◽  
Vol 24 (3) ◽  
pp. 503-510 ◽  
Author(s):  
C. Barker ◽  
T.R. Martinez
Keyword(s):  

2017 ◽  
Vol 5 (1) ◽  
pp. 139-157 ◽  
Author(s):  
Sam Cole ◽  
Shmuel Friedland ◽  
Lev Reyzin

Abstract In this paper, we consider the planted partition model, in which n = ks vertices of a random graph are partitioned into k “clusters,” each of size s. Edges between vertices in the same cluster and different clusters are included with constant probability p and q, respectively (where 0 ≤ q < p ≤ 1). We give an efficient algorithm that, with high probability, recovers the clusters as long as the cluster sizes are are least (√n). Informally, our algorithm constructs the projection operator onto the dominant k-dimensional eigenspace of the graph’s adjacency matrix and uses it to recover one cluster at a time. To our knowledge, our algorithm is the first purely spectral algorithm which runs in polynomial time and works even when s = Θ (√n), though there have been several non-spectral algorithms which accomplish this. Our algorithm is also among the simplest of these spectral algorithms, and its proof of correctness illustrates the usefulness of the Cauchy integral formula in this domain.


Sign in / Sign up

Export Citation Format

Share Document