Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,110,142 papers from all fields of science
Search
Sign In
Create Free Account
ACL2
Known as:
ACL
, ACL2 theorem prover
ACL2 (A Computational Logic for Applicative Common Lisp) is a software system consisting of a programming language, an extensible theory in a first…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
ACM Software System Award
AMD K5
Applicative programming language
Automated reasoning
Expand
Broader (1)
Lisp
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2007
2007
Theory Extension in ACL2(r)
Ruben Gamboa
,
J. Cowles
Journal of automated reasoning
2007
Corpus ID: 10657571
ACL2(r) is a modified version of the theorem prover ACL2 that adds support for the irrational numbers using nonstandard analysis…
Expand
2006
2006
Soundness of the simply typed lambda calculus in ACL2
S. Swords
,
W. Cook
International Workshop on the ACL2 Theorem Prover…
2006
Corpus ID: 9493666
To make it practical to mechanize proofs in programming language metatheory, several capabilities are required of the theorem…
Expand
2006
2006
Phylogenetic trees in ACL2
W. Hunt
,
Serita M. Nelesen
International Workshop on the ACL2 Theorem Prover…
2006
Corpus ID: 1237875
Biologists studying the evolutionary relationships between organisms use software packages to solve the computational problems…
Expand
2006
2006
Function memoization and unique object representation for ACL2 functions
R. Boyer
,
W. Hunt
International Workshop on the ACL2 Theorem Prover…
2006
Corpus ID: 859344
We have developed an extension of ACL2 that includes the implementation of hash-based association lists and function memoization…
Expand
2006
2006
Reasoning about ACL2 file input
Jared Davis
International Workshop on the ACL2 Theorem Prover…
2006
Corpus ID: 1436668
We introduce the logical story behind file input in ACL2 and discuss the types of theorems that can be proven about file-reading…
Expand
2004
2004
Formal Reasoning About Intrusion Detection Systems
Tao Song
,
C. Ko
,
J. Alves-Foss
,
Cui Zhang
,
K. Levitt
International Symposium on Recent Advances in…
2004
Corpus ID: 17322967
Intrusion detection is an appealing approach to improving the security of systems. The goal of intrusion detection is to detect…
Expand
Review
2004
Review
2004
Integrating Nonlinear Arithmetic into ACL2
R. Krug
,
James Moore
Annual Meeting of the Association for…
2004
Corpus ID: 16719566
In this paper we present an overview of the integration of a nonlinear arithmetic reasoning package into ACL2. We provide a brief…
Expand
Review
2002
Review
2002
Flat Domains and Recursive Equations in ACL2
J. Cowles
2002
Corpus ID: 59839581
Flat domains can be viewed as a “logic” of total functions in which every recursive equation has at least one function that…
Expand
1999
1999
Results of the Verification of a Complex Pipelined Machine Model
J. Sawada
,
W. Hunt
Conference on Correct Hardware Design and…
1999
Corpus ID: 383458
Using a theorem prover, we have verified a microprocessor design, FM9801. We define our correctness criterion for processors with…
Expand
1996
1996
Comparing verification systems: interactive consistency in ACL2
W. D. Young
Proceedings of 11th Annual Conference on Computer…
1996
Corpus ID: 9046307
Achieving interactive consistency among processors in the presence of faults is an important problem in fault-tolerant computing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE