Available Topics
- AC-KBO
- Alpha Avoidance
- Automating Logarithmic Amortised Complexity Analysis
- Completion for Logically Constrained Rewrite Systems
- Conditional Nonreachability
- Deep Learning for Logic
- Formalization of Social Choice Theory
- Multivariate Amortised Resource Analysis for Term Rewrite Systems
- Patterns from First- to Higher-Order
- Proof Terms for Rewriting
- Quantified Boolean Formulas
- Rewriting Techniques for LLVM Expression Optimizations
- Root Isolation and Root Counting of Complex Roots
- Strategy Selection for Theorem Proving
AC-KBO
The Knuth-Bendix Order (KBO) is a well-known, fast, and powerful method for proving termination of term rewrite systems. Making KBO applicable to term rewrite systems with associative and commutative symbols (AC-KBO) is a very useful extension that has been repeatedly considered in the literature. The task of this seminar topic is to implement and compare existing variants of AC-KBO.-
AC-KBO Revisited
A. Yamada, S. Winkler, N. Hirokawa, A. Middeldorp
Theory and Practice of Logic Programming 16(2), pp. 163 – 188, 2016
Alpha Avoidance
The λ-calculus is the basis for functional programming languages such as Haskell. Its computation rule (β-reduction) may necessitate renaming of variables (α-conversion):-
BCK-Combinators
and Linear λ-Terms have Types
J.R. Hindley
Theoretical Computer Science 64, pp. 97 – 105, 1989 -
Confluence and
Superdevelopments
F. van Raamsdonk
Proc. 5th International Conference on Rewriting Techniques and Applications, LNCS 690, pp. 168 – 182, 1993 -
Combinatory
Weak Reduction in Lambda Calculus
N. Çağman, J.R. Hindley
Theoretical Computer Science 198, pp. 239 – 247, 1998 -
The Safe Lambda
Calculus
W. Blum, C.-H. Luke Ong
Logical Methods in Computer Science 5(1), paper 3, 2009
Automating Logarithmic Amortised Complexity Analysis
Based on earlier work on automating amortised complexity analysis, we study the automation of logarithmic amortised complexity, in particular the automation of the (optimal) analysis of self-adjusting data structures like splay trees.-
A Systematic
Analysis of Splaying
B. Schoenmakers
Information Processing Letters 45(1), pp. 41 – 50, 1993 -
Amortized
Complexity Verified
T. Nipkow
Proc. 6th International Conference on Interactive Theorem Proving, LNCS 9236, pp. 310 – 324, 2015
Completion for Logically Constrained Rewrite Systems
Knuth-Bendix completion is a fundamental approach in equational theorem proving. If successful, it produces a complete presentation of the theory. Such a presentation allows to decide the word problem, i.e., one can determine for any given equation whether it follows from the input axioms. Complete rewrite systems are thus used by systems like Mathematica to simplify expressions. Recently, the advent of powerful SMT solvers led to the proposal of logically constrained rewriting. This setting is effective and convenient for program analysis as well as to analyse expression rewriting as e.g. done in compilers.The aim of this project is to formulate a Knuth-Bendix completion procedure for logically constrained rewrite systems. To take advantage of the SMT-related setting, it should be based on the idea of maximal completion, a simple but powerful satisfiability-based completion procedure.
-
Maximal Completion
D. Klein, N. Hirokawa
Proc. 22nd International Conference on Rewriting Techniques and Applications, LIPIcs 10, pp. 71 – 80, 2011 -
Term Rewriting with Logical Constraints
C. Kop, N. Nishida
Proc. 9th International Symposium on Frontiers of Combining Systems, LNCS 8152, pp. 343 – 358, 2013
Conditional Nonreachability
The question of (general) nonreachability is, given a term rewrite system (TRS) and two terms, is it possible to rewrite an arbitrary substitution instance of the first term into an arbitrary substitution instance of the second term? This kind of nonreachability has applications in termination analysis of TRSs as well as for automatically showing confluence of conditional TRSs. However, for the latter the existing techniques only yield a crude approximation. The task of this seminar topic is to investigate nonreachability analysis for the conditional case, i.e., where the set of axioms may be conditional equations.-
Reachability
Analysis over Term Rewriting Systems
G. Feuillade, T. Genet, V. Viet Triem Tong
Journal of Automated Reasoning 33(3-4), pp. 341 – 383, 2004
Deep Learning for Logic
Deep learning is a recent branch of machine learning that has allowed many significant advances in domains such as machine translation, image captioning, speech recognition, or the game of Go. The task of this master seminar topic is to study deep learning and investigate its applicability to recognizing logical formulae.-
Learning Continuous
Semantic Representations of Symbolic Expressions
M. Allamanis, P. Chanthirasegaran, P. Kohli, C. Sutton
ICLR 2017/OpenReview
Formalization of Social Choice Theory
Kenneth Arrow showed that every voting scheme with desired properties must necessarily adhere to some undesired restrictions. Amartya Sen introduced a way to prove such results in Social Choice Theory circumventing impossibility results using Social Decision Functions. We will discuss the formalizations of the two results.-
Formalizing Arrow’s
Theorem
F. Wiedijk
Sadhana 34(1), pp. 193 – 220, 2009 -
Some
Classical Results in Social Choice Theory
P. Gammie
Archive of Formal Proofs, 2008
Multivariate Amortised Resource Analysis for Term Rewrite Systems
Based on earlier work on automating amortised complexity analysis, we study multivariate amortised resource analysis in the context of term rewrite systems and provide an implementations thereof.-
Multivariate Amortised Resource Analysis for Term Rewrite Systems
M. Hofmann, G. Moser
Proc. 13th International Conference on Typed Lambda Calculi and Applications, LIPIcs 38, pp. 241 – 256, 2015
Patterns from First- to Higher-Order
Higher-order patterns were introduced by Miller as a subset of the higher-order terms that `behave the same' as in the first-order case. The aim of this seminar is to present the exact meaning of `behaving the same' of the class of patterns of its recent extension with `Functions-as-Constructors'. This concerns issues such as unification and its complexity, but also whether or not the (linear) pattern occurrences in a term constitute a finite distributive lattice, and whether patterns have discriminating power.-
A Logic Programming Language with Lambda-Abstraction, Function Variables,
and Simple Unification
D. Miller
Journal of Logic and Computation 1(4), pp. 497 – 536, 1991 -
Functions-as-Constructors Higher-Order Unification
T. Libal, D. Miller
Proc. 1st International Conference on Formal Structures for Computation and Deduction, LIPIcs 52, pp. 26:1 – 26:17, 2016
Proof Terms for Rewriting
Proof terms in term rewriting allow to represent rewrite steps and rewrite sequences as first-order terms. They come equipped with important operations like join and residual. Performing these operations manually is cumbersome and error-prone. The task of this master seminar topic is to study the literature on proof terms and to develop a proof term manipulator for multisteps in left-linear rewrite systems.-
Four Equivalent
Equivalences of Reductions
V. van Oostrom, R. de Vrijer
Proc. 2nd International Workshop on Reduction Strategies in Rewriting and Programming, ENTCS 70(6), pp. 21 – 61, 2012 -
Equivalence of
Reductions
V. van Oostrom, R. de Vrijer
Chapter 8, Term Rewriting Systems, Cambridge Tracts in Theoretical Computer Science 55, 2003
Quantified Boolean Formulas
Quantified boolean formulas (QBF) are an extension of propositional logic with explicit quantification over propositional variables. The QBF decision problem is PSPACE-complete. Consequently, many problems from application domains such as model checking that are PSPACE-complete can be encoded in QBF. In the past years significant progress has been made in QBF solving. The aim of this master seminar is to present some of the techniques that have been developed for QBF solving such as QDPLL.-
Reasoning with Quantified Boolean Formulas
E. Giunchiglia, P. Marin, M. Narizzano
Chapter 24, Handbook of Satisfiability, IOS Press, 2009 -
Dependency Schemes and Search-Based QBF
Solving: Theory and Practice
F. Lonsing
PhD thesis, Johannes Kepler University, Linz, 2012
Rewriting Techniques for LLVM Expression Optimizations
Compilers draw great advantage from performing so-called peephole optimizations to simplify expressions, as e.g. done in the Instcombine pass of LLVM. Previous work has shown that the current set of LLVM optimizations may loop, thus causing nontermination of the compiler. Besides termination, also unique normal forms of the optimization set is a desirable property to ensure determinism. In order to analyse these properties, rewriting techniques are a natural choice.In this project we first transform the set of LLVM peephole optimizations into logically constrained term rewrite systems which reflect the intended semantics. Second, termination techniques from the area of constrained rewriting should be applied on the obtained rewrite systems to find terminating subsystems. Some suitable additional techniques should be implemented in the tool Ctrl.
-
Termination-Checking for LLVM Peephole Optimizations
D. Menendez, S. Nagarakatte
Proc. 38th International Conference on Software Engineering, ACM, pp. 191 – 202, 2016 -
Term Rewriting with Logical Constraints
C. Kop, N. Nishida
Proc. 9th International Symposium on Frontiers of Combining Systems, LNCS 8152, pp. 343 – 358, 2013
Root Isolation and Root Counting of Complex Roots
Complex root isolation is the task to compute a number of discs in complex space for a given polynomial, such that each disc contains precisely one root. This task has applications in algebraic geometry, for instance in the implementation of complex algebraic numbers. One approach to complex root isolation is bisection in combination with a root counting method, where root counting demands to compute the number of roots for a given disc and polynomial.The aim of this master seminar is to present existing root counting and root isolation algorithms for complex numbers such as Kronecker's method. This seminar project can be extended into a master project.
Machine Learning Problems in Automated Reasoning
Cezary Kaliszyk
In this talk I will discuss the ATP tasks which correspond to machine learning problems. I will define internal guidance, and discuss the existing approaches to integrating such guidance in various automated reasoning calculi. We will look at prediction of the actual inference rules to apply at a given proof step, as well as at more powerful state evaluation functions and conjecturing of possible useful intermediate ATP steps.Normalising Strategies for Orthogonal Systems and Beyond
Vincent van Oostrom
A strategy for a term rewrite system is normalising if for any term having a normal form, that normal form is found by repeated execution of the strategy. In this talk we will first address the question how to find a normalising strategy for term rewrite systems, and next how to prove that such a strategy in fact is normalising. We revisit and refine strategies introduced by Huet and Lévy contracting, respectively,- external (an outer redex having an external residual),
- linear (a redex having one linear residual), or
- needed (redexes having at least one needed residual)
-
Computations in Orthogonal Rewriting Systems, I
G.P. Huet, J.J. Lévy
Computational Logic – Essays in Honor of Alan Robinson, MIT Press, pp. 395 – 414, 1991 -
Normalisation by
Random Descent
V. van Oostrom, Y. Toyama
Proc. 2nd International Conference on Formal Structures for Computation and Deduction, LIPIcs 52, pp. 32:1 – 32:18, 2016
The Perron–Frobenius Theorem for Certification of Complexity Proofs
René Thiemann
Matrix interpretations are widely used in automated complexity analysis. Certifying such analyses boils down to determining the growth rate of An for a fixed non-negative rational matrix A. A direct solution for this task involves the computation of all eigenvalues of A, which often leads to expensive algebraic number computations. Therefore, we will illustrate in this talk how the required computations can be simplified with the help of variants of the Perron–Frobenius theorem, and further provide some details on the formalization.-
Efficient Certification of Complexity Proofs —
Formalizing the Perron–Frobenius Theorem
J. Divasón, S. Joosten, O. Kunčar, R. Thiemann, A. Yamada
Proc. 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2018, to appear
Artificial Intelligence for Perfect Information Games
Thibault Gauthier
We present the progress of artificial intelligence in two-player zero-sum perfect information games such as draughts, chess and go. We observe the gradual optimization of tree search algorithms and describe them in terms of changes to their policy (choosing a move) and evaluation (estimating a position) functions. This journey culminates in the introduction of deep learning and reinforcement learning techniques that were crucial to win against the best humans at the game of go.-
Mastering the Game of Go
without Human Knowledge
D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang, A. Guez, T. Hubert, L. Baker, M. Lai, A. Bolton, Y. Chen, T. Lillicrap, F. Hui, L. Sifre, G. van den Driessche, T. Graepel, D. Hassabis
Nature 550, pp. 354 – 359, 2017
Legendrian Racks: where automated theorem proving meets contact topology
T. V. H. Prathamesh
Finding `invariants' of geometric objects under deformations is one of the key areas of research in topology/geometry. These invariants range from numbers and polynomials associated to the object, to algebraic structures such as groups. In this talk, I will discuss an invariant of a class of knots called Legendrian knots, called Legendrian racks. Legendrian knots are an object of interest to topologists studying contact topology. Legendrian racks are an example of algebraic structures called racks, which are self-distributive structures and finitely axiomatizable in first-order logic. Thus it could possibly be of interest from a term rewriting perspective.The discovery of these invariants was aided by the use of the first-order theorem prover Prover9. It was inspired by an earlier work by Fish and Lisitsa, on using automated theorem provers for unknot recognition.
In this talk, I will discuss Legendrian racks, and how Prover9 aided the discovery of these invariants. That talk will be largely self-contained, and no background in topology/geometry or knot theory will be assumed.
-
On Rack Invariants of Legendrian
Knots
D. Kulkarni, T. V. H. Prathamesh -
Detecting Unknots
via Equational Reasoning, I: Exploration
A. Fish, A. Lisitsa
Proc. 7th International Conference on Intelligent Computer Mathematics, LNCS 8543, pp. 76 – 91, 2014
Complexity Analysis for Extended First Epsilon Theorem
Kenji Miyamoto
Hilbert's pure epsilon calculus is elementary calculus extended with the epsilon operator ε, and further enriched by the equality predicate. The epsilon operator allows to express for a given formula A(x) a term εxA(x) whose property is characterized by the critical axiom A(t)→A(εxA(x)) where t is an arbitrary term. Extended epsilon theorem by Hilbert and Bernays claims that if a formula A(e) is true in pure epsilon calculus for a term e which may involve ε, there are some number n and ε-free terms s1, ..., sn such that A(s1) ∨ ... ∨ A(sn) is true in elementary calculus. This theorem is understood as an admissibility result similar to the cut elimination theorem, and moreover the numerical bound of the number n expresses the complexity of the critical axiom. I am going to talk about the current results in complexity analysis for extended first epsilon theorem involving the equality predicate. This is joint work with Georg Moser.-
The Epsilon Calculus and Herbrand Complexity
G. Moser and R. Zach
Studia Logica 82(1), pp. 133 – 155, 2006
Proof-of-Stake Blockchain Security
Michael Färber
Running Proof-of-Work blockchain protocols is relatively energy-consuming. Alternatives such as Proof-of-Stake protocols solve this problem, but so far, the security of such systems has not been rigorously analysed. I summarise a paper which introduces a new Proof-of-Stake blockchain protocol as well as proves several security properties of it.-
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
A. Kiayias, A. Russell, B. David, R. Oliynykov
Proc. 37th Annual International Cryptology Conference, LNCS 10401, pp. 357 – 388, 2017
Relative Definability of Higher-order Functions in Simply Typed Lambda Calculus
Evan Marzion
Clone theory may be viewed as a way of studying definability between first-order functions within the presence of certain natural operations, namely projection and composition. The founding result from clone theory is Post's complete classification of the lattice of clones over the two element boolean domain, from which his functional completeness theorem falls out. In this talk, we will show how to extend this work in order to accommodate higher-order functions. We will briefly recount Post's work before introducing a higher-order analog to clones, which we call a combinatory clone. A combinatory clone can be thought of as a set of functions which is closed under definability in the simply-typed lambda calculus. We will show how a number of results from Post's work transfer over into this higher-order setting, while also highlighting when things differ.-
The Two-Valued Iterative Systems of Mathematical Logic
E.L. Post
Annals of Mathematics Studies 5, 1941 -
Closed Sets of Higher-Order Functions
E. Marzion
MSc thesis, MoL Thesis Series, ILLC, University of Amsterdam, 2016
A Formally Verified Solver for Homogeneous Linear Diophantine Equations
Christian Sternagel
I will present an Isabelle/HOL formalization of homogeneous linear diophantine equations, focusing on an algorithm for computing minimal complete sets of solutions. I will start from a simple but inefficient variant of Huet's lexicographic algorithm incorporating improved bounds due to Clausen and Fortenbacher. Then, I will employ program transformation techniques to obtain a reasonably efficient implementation.-
An Algorithm to Generate the Basis of Solutions to homogeneous Linear
Diophantine Equations
G. Huet
Information Processing Letters 7(3), pp. 144 – 147, 1978 -
Homogeneous Linear Diophantine Equations
F. Meßner, J. Parsert, J. Schöpf, C. Sternagel
Archive of Formal Proofs, October 2017
Completeness of Inst-saturated Sets of First Order Clauses with Equality
Alexander Maringele
Instantiation-based theorem proving eventually finds a finite set of unsatisfiable ground instances for any unsatisfiable set of first order clauses (at least in theory). Satisfiability of ground instances can be effectively decided by a SAT-solver. But in general, satisfiability of a finite set of ground instances does not confirm the satisfiability of a set of non-ground clauses. Unit paramodulation is part of a sound instantiation-based calculus for first order logic with equality. The proving procedure may saturate without generating an unsatisfiable set of ground instances. We present a completeness proof from the literature. An Inst-saturated set of non-ground clauses with satisfiable grounded instances is satisfiable.-
Integrating
Equational Reasoning into Intantiation-Based Theorem Proving
H. Ganzinger, K. Korovin
Proc. 18th Annual Conference of the European Association for Computer Science Logic, LNCS 3210, pp 71 – 84, 2004
ENIGMA: Efficient Learning-Based Inference Guiding Machine
Jan Jakubův
ENIGMA is a learning-based method for guiding given clause selection in saturation-based theorem provers. Clauses from many previous proof searches are classified as positive and negative based on their participation in the proofs. An efficient classification model is trained on this data, classifying a clause as useful or un-useful for the proof search. This learned classification is used to guide next proof searches prioritizing useful clauses among other generated clauses. The approach is evaluated on the E prover and the CASC 2016 AIM benchmark, showing a large increase of E's performance.Formalizing Completeness of Ordered Completion
Sarah Winkler
Ordered completion, also known as unfailing completion, is a landmark method in equational theorem proving. An ordered completion procedure outputs a ground complete system which can be used to decide the validity problem on ground terms. Already when proposing ordered completion in 1989, Bachmair, Dershowitz, and Plaisted showed that under certain circumstances ordered completion results in a complete system, which can thus also be used to decide the validity problem on open terms. Devie later on proved a more general result for linear systems. The talk is about the formalization of these completeness results in IsaFoR.-
Completion Without Failure
L. Bachmair, N. Dershowitz, D. Plaisted
in: Resolution of Equations in Algebraic Structures (volume 2: Rewriting Techniques), Progress in Theoretical Computer Science, pp. 1 – 30, 1989 -
Linear Completion
H. Devie
Proc. 2nd International Workshop on Conditional and Typed Rewriting Systems, LNCS 516, pp. 233 – 245, 1990
Proof Strategy Language and Proof Method Recommendation
Yutaka Nagashima
Despite the recent progress in automatic theorem provers, proof engineers are still suffering from the lack of powerful proof automation. In this talk, I present a proof strategy language (PSL) and a proof method recommendation tool (PaMpeR) for Isabelle/HOL. Given a strategy and a proof obligation, PSL generates and combines various tactics to search for a proof script. On the contrary, PaMpeR recommends proof methods to discharge the proof goal without conducting a proof search by using a decision tree algorithm.-
A Proof Strategy Language and Proof Script Generation for Isabelle/HOL
Y. Nagashima, R. Kumar
Proc. 26th International Conference on Automated Deduction, LNCS 10395, pp. 528 – 545, 2017
FORT 2.0
Franziska Rapp
In this talk I will present the newest version of our tool FORT. It is a decision and synthesis tool for the first-order theory of rewriting with the restriction to left-linear right-ground TRSs. In particular it is now possible to express commutation and other properties on multiple TRSs. The inspiring tool for this extension was Carpa, which is quite strong on synthesizing ARSs, but cannot handle left-linear right-ground TRSs.-
Finding Small Counter Examples for Abstract Rewriting Properties
H. Zantema
Mathematical Structures in Computer Science, 2013, accepted for publication (?!)
Layer Systems for Confluence — Formalized
Bertram Felgenhauer
Layer systems are a common framework for proving several related results on confluence of term rewrite systems, including modularity of confluence, persistence of confluence, and preservation of confluence by currying. I will talk about a formalization of layer systems in Isabelle, as part of IsaFoR.-
Layer Systems for Proving Confluence
B. Felgenhauer, H. Zankl, A. Middeldorp, V. van Oostrom
ACM TOCL 16(2), pp. 14:1 – 14:32, 2015
Towards a Hardware-Parallel Implementation of Interaction Nets
David Obwaller
Interaction nets are a computational model based on graph rewriting and allow for parallel and asynchronous reduction. Interaction automata serve as environment for concrete implementations of parallel (potentially abstract) hardware, that can be used to run interaction net computations. I will talk about interaction nets, interaction automata, and related frameworks and techniques for executing parallel programs-
Interaction
Automata and the ia2d Interpreter
S. Gimenez, D. Obwaller
Proc. 1st International Conference on Formal Structures for Computation and Deduction, LIPIcs 52, pp. 35:1 – 35:11, 2016