Abstract

We are excited to present the AMAI special issue on Application of Constraints to Formal Verification and Artificial Intelligence. The issue contains three papers: In the first paper, entitled Establishing Flight Software Reliability: Testing, Model Checking, Constraint-Solving, Monitoring and Learning, Alex Groce from Oregon State University, Klaus Havelund, Gerard Holzmann, and Rajeev Joshi from the NASA Jet Propulsion Laboratory (JPL), and Ru-Gang Xu from the University of California at Los Angeles discuss the application of a range of techniques to the verification of missioncritical flight software at JPL. They present insights on the combination of random testing, model checking, constraint-solving, monitoring, and finite-state machine learning, in addition to static code analysis for the efficient verification of properties of a flash file system and other software for space missions. In the second paper, entitled Polynomial Function Intervals for Floating-Point Software Verification, Jan Duracz from Halmstad University in Sweden and Michal Konecny from Aston University in the U.K. present a new method for verification of numerical software, supporting a substantially more expressive language for specifications than other publicly available automated tools. Their experiments indicate that the additional expressivity does not come at a performance cost when comparing the results with those obtained with other publicly available state-of-the-art provers. They also include a scalability study of their algorithm when proving tight functional specifications of progressively larger randomly generated programs. In the third paper, entitled Tradeoffs in the Complexity of Backdoors to Satisfiability: Dynamic Sub-Solvers and Learning During Search, Bistra Dilkina from the Georgia Institute of Technology, Carla P. Gomes from Cornell University, and Ashish Sabharwal from IBM study the potential to capture succinctly hidden problem structure in Boolean Satisfiability (SAT) problems using different notions of backdoors—a set of key variables, such

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.