Rely-guarantee (RG) is a highly influential compositional proof techniqu...
Modern processors such as ARMv8 and RISC-V allow executions in which
ind...
Transactional memory (TM) is an intensively studied synchronisation para...
The rise of persistent memory is disrupting computing to its core. Our w...
In today's world, critical infrastructure is often controlled by computi...
Deductive verification of concurrent programs under weak memory has thus...
Deductive verification techniques for C11 programs have advanced
signifi...
Hyperproperties are correctness conditions for labelled transition syste...
Deductive verification of concurrent programs under weak memory has thus...
Non-volatile memory (NVM), also known as persistent memory, is an emergi...
Non-volatile memory (NVM), aka persistent memory, is a new paradigm for
...
Weak memory presents a new challenge for program verification and has
re...
This paper develops an operational semantics for a release-acquire fragm...
Refinement is one of the cornerstones of a formal approach to software
e...
In the interleaving model of concurrency, where events are totally order...