Skip to main content

Showing 1–10 of 10 results for author: Rueher, M

.
  1. arXiv:2002.12447  [pdf, other

    cs.AI

    Bringing freedom in variable choice when searching counter-examples in floating point programs

    Authors: Heytem Zitoun, Claude Michel, Laurent Michel, Michel Rueher

    Abstract: Program verification techniques typically focus on finding counter-examples that violate properties of a program. Constraint programming offers a convenient way to verify programs by modeling their state transformations and specifying searches that seek counter-examples. Floating-point computations present additional challenges for verification given the semantic subtleties of floating point arith… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

  2. arXiv:2002.12441  [pdf, other

    cs.AI

    An efficient constraint based framework forhandling floating point SMT problems

    Authors: Heytem Zitoun, Claude Michel, Laurent Michel, Michel Rueher

    Abstract: This paper introduces the 2019 version of \us{}, a novel Constraint Programming framework for floating point verification problems expressed with the SMT language of SMTLIB. SMT solvers decompose their task by delegating to specific theories (e.g., floating point, bit vectors, arrays, ...) the task to reason about combinatorial or otherwise complex constraints for which the SAT encoding would be c… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

  3. arXiv:1511.01080  [pdf, ps, other

    cs.PL cs.DS math.NA

    Searching input values hitting suspicious Intervals in programs with floating-point operations

    Authors: Hélène Collavizza, Claude Michel, Michel Rueher

    Abstract: Programs with floating-point computations are often derived from mathematical models or designed with the semantics of the real numbers in mind. However, for a given input, the computed path with floating-point numbers may differ from the path corresponding to the same computation with real numbers. A common practice when validating such programs consists in estimating the accuracy of floating-poi… ▽ More

    Submitted 5 August, 2016; v1 submitted 3 November, 2015; originally announced November 2015.

    Journal ref: 28th International Conference on Software and Systems (ICTSS-2016)., Oct 2016, Graz, Austria. 2016, LNCS

  4. arXiv:1505.06324  [pdf, other

    cs.SE

    Un algorithme incrémental dirigé par les flots et basé sur les contraintes pour l'aide à la localisation d'erreurs

    Authors: Mohammed Bekkouche, Hélène Collavizza, Michel Rueher

    Abstract: In this article, we present our improved algorithm for error localization from counterexamples, LocFaults, flow-driven and constraint-based. This algorithm analyzes the paths of CFG (Control Flow Graph) of the erroneous program to calculate the subsets of suspicious instructions to correct the program. Indeed, we generate a system of constraints for paths of control flow graph for which at most k… ▽ More

    Submitted 23 May, 2015; originally announced May 2015.

    Comments: in French

  5. arXiv:1404.6567  [pdf, other

    cs.AI cs.SE

    Une approche CSP pour l'aide à la localisation d'erreurs

    Authors: Mohammed Bekkouche, Hélène Collavizza, Michel Rueher

    Abstract: We introduce in this paper a new CP-based approach to support errors location in a program for which a counter-example is available, i.e. an instantiation of the input variables that violates the post-condition. To provide helpful information for error location, we generate a constraint system for the paths of the CFG (Control Flow Graph) for which at most k conditional statements may be erroneous… ▽ More

    Submitted 25 April, 2014; originally announced April 2014.

    Comments: 10 pages, in French

  6. Handling software upgradeability problems with MILP solvers

    Authors: Claude Michel, Michel Rueher

    Abstract: Upgradeability problems are a critical issue in modern operating systems. The problem consists in finding the "best" solution according to some criteria, to install, remove or upgrade packages in a given installation. This is a difficult problem: the complexity of the upgradeability problem is NP complete and modern OS contain a huge number of packages (often more than 20 000 packages in a Linu… ▽ More

    Submitted 6 July, 2010; originally announced July 2010.

    Comments: In Proceedings LoCoCo 2010, arXiv:1007.0831

    ACM Class: D2.7; G1.6

    Journal ref: EPTCS 29, 2010, pp. 1-10

  7. arXiv:0808.1508  [pdf, ps, other

    cs.SE cs.AI cs.LO

    Comparison between CPBPV, ESC/Java, CBMC, Blast, EUREKA and Why for Bounded Program Verification

    Authors: Hélène Collavizza, Michel Rueher, Pascal Van Hentenryck

    Abstract: This report describes experimental results for a set of benchmarks on program verification. It compares the capabilities of CPBVP "Constraint Programming framework for Bounded Program Verification" [4] with the following frameworks: ESC/Java, CBMC, Blast, EUREKA and Why.

    Submitted 11 August, 2008; originally announced August 2008.

  8. arXiv:0807.2383  [pdf, ps, other

    cs.SE cs.AI cs.LO

    CPBVP: A Constraint-Programming Framework for Bounded Program Verification

    Authors: Hélène Collavizza, Michel Rueher, Pascal Van Hentenryck

    Abstract: This paper studies how to verify the conformity of a program with its specification and proposes a novel constraint-programming framework for bounded program verification (CPBPV). The CPBPV framework uses constraint stores to represent the specification and the program and explores execution paths nondeterministically. The input program is partially correct if each constraint store so produced i… ▽ More

    Submitted 15 July, 2008; originally announced July 2008.

    Journal ref: The 14th International Conference on Principles and Practice of Constraint Programming, Sydney : Australie (2008)

  9. arXiv:0807.2382  [pdf, ps, other

    math.NA cs.MS math.OC

    Revisiting the upper bounding process in a safe Branch and Bound algorithm

    Authors: Alexandre Goldsztejn, Yahia Lebbah, Claude Michel, Michel Rueher

    Abstract: Finding feasible points for which the proof succeeds is a critical issue in safe Branch and Bound algorithms which handle continuous problems. In this paper, we introduce a new strategy to compute very accurate approximations of feasible points. This strategy takes advantage of the Newton method for under-constrained systems of equations and inequalities. More precisely, it exploits the optimal… ▽ More

    Submitted 15 July, 2008; originally announced July 2008.

    Comments: Optimization, continuous domains, nonlinear constraint problems, safe constraint based approaches; 14th International Conference on Principles and Practice of Constraint Programming, Sydney : Australie (2008)

  10. arXiv:0807.2269  [pdf, ps, other

    math.NA cs.DS

    An Efficient Algorithm for a Sharp Approximation of Universally Quantified Inequalities

    Authors: Alexandre Goldsztejn, Claude Michel, Michel Rueher

    Abstract: This paper introduces a new algorithm for solving a sub-class of quantified constraint satisfaction problems (QCSP) where existential quantifiers precede universally quantified inequalities on continuous domains. This class of QCSPs has numerous applications in engineering and design. We propose here a new generic branch and prune algorithm for solving such continuous QCSPs. Standard pruning ope… ▽ More

    Submitted 15 July, 2008; originally announced July 2008.

    Comments: ACM symposium on Applied computing, Fortaleza, Ceara : Brésil (2008)

    ACM Class: G.1