Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,265,159 papers from all fields of science
Search
Sign In
Create Free Account
ACL2
Known as:
ACL
, ACL2 theorem prover
ACL2 (A Computational Logic for Applicative Common Lisp) is a software system consisting of a programming language, an extensible theory in a first…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
ACM Software System Award
AMD K5
Applicative programming language
Automated reasoning
Expand
Broader (1)
Lisp
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
ACL2(ml): Machine-Learning for ACL2
Jónathan Heras
,
Ekaterina Komendantskaya
International Workshop on the ACL2 Theorem Prover…
2014
Corpus ID: 9536539
ACL2(ml) is an extension for the Emacs interface of ACL2. This tool uses machine-learning to help the ACL2 user during the proof…
Expand
2006
2006
Function memoization and unique object representation for ACL2 functions
R. Boyer
,
W. Hunt
International Workshop on the ACL2 Theorem Prover…
2006
Corpus ID: 859344
We have developed an extension of ACL2 that includes the implementation of hash-based association lists and function memoization…
Expand
2006
2006
Soundness of the simply typed lambda calculus in ACL2
S. Swords
,
W. Cook
International Workshop on the ACL2 Theorem Prover…
2006
Corpus ID: 9493666
To make it practical to mechanize proofs in programming language metatheory, several capabilities are required of the theorem…
Expand
2006
2006
Weak Bisimulation Approximants
W. Harwood
,
F. Moller
,
A. Setzer
Annual Conference for Computer Science Logic
2006
Corpus ID: 1752688
Bisimilarity and weak bisimilarity ≈ are canonical notions of equivalence between processes, which are defined co-inductively…
Expand
2005
2005
Meta Reasoning in ACL2
W. Hunt
,
Matt Kaufmann
,
R. Krug
,
J. S. Moore
,
E. Smith
International Conference on Theorem Proving in…
2005
Corpus ID: 30110612
The ACL2 system is based upon a first-order logic and implements traditional first-order reasoning techniques, notably…
Expand
2004
2004
Formal Reasoning About Intrusion Detection Systems
Tao Song
,
C. Ko
,
J. Alves-Foss
,
Cui Zhang
,
K. Levitt
International Symposium on Recent Advances in…
2004
Corpus ID: 17322967
Intrusion detection is an appealing approach to improving the security of systems. The goal of intrusion detection is to detect…
Expand
Review
2002
Review
2002
Flat Domains and Recursive Equations in ACL2
J. Cowles
2002
Corpus ID: 59839581
Flat domains can be viewed as a “logic” of total functions in which every recursive equation has at least one function that…
Expand
1999
1999
Results of the Verification of a Complex Pipelined Machine Model
J. Sawada
,
W. Hunt
Conference on Correct Hardware Design and…
1999
Corpus ID: 383458
Using a theorem prover, we have verified a microprocessor design, FM9801. We define our correctness criterion for processors with…
Expand
1998
1998
Mechanically Verifying the Correctness of the Fast Fourier Transform in ACL2
Ruben Gamboa
IPPS/SPDP Workshops
1998
Corpus ID: 8548450
In [10], Misra introduced the powerlist data structure, which is well suited to express recursive, data-parallel algorithms. In…
Expand
1996
1996
Comparing verification systems: interactive consistency in ACL2
W. D. Young
Proceedings of 11th Annual Conference on Computer…
1996
Corpus ID: 9046307
Achieving interactive consistency among processors in the presence of faults is an important problem in fault-tolerant computing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE