X-IronPort-MID: 1799786603 X-SBRS: 4.1 X-BrightmailFiltered: true X-Brightmail-Tracker: AAAAAQAAA+k= X-IronPort-AV: i="4.02,153,1139205600"; d="scan'208"; a="1799786603:sNHT16568884" To: acl2-mtg@lists.cc.utexas.edu Subject: This week in ACL2 Date: Tue, 28 Feb 2006 11:53:01 -0600 From: Robert Bellarmine Krug Reply-To: acl2-mtg@lists.cc.utexas.edu Sender: owner-acl2-mtg@lists.cc.utexas.edu X-Listprocessor-Version: 8.2.10/020311/17:52 -- ListProc(tm) by CREN X-SpamAssassin-Status: No, hits=-2.6 required=5.0 X-UTCS-Spam-Status: No, hits=-132 required=180 Greetings, This week I will be talking about my work in support of the Destiny tool being developed at the NSA. I assume no background other than familiarity with ACL2. I will say a few, brief, words about Destiny and what it does from the perspective of ACL2. I will give examples of its input and output, but will say almost nothing about how it operates. I will then point out a couple of difficulties the ACL2 analyst would encounter when using this output. These are primarily related to induction. My current solutions to these problems will be presented. These solutions fall into four categories: 1. Invariant theorems 2. Call Stack-related theorems 3. Cone of Influence theorems 4. Other theorems. I will provide examples of each, and briefly describe how I guess the appropriate theorems. I will also talk about what I like or don't like about these solutions. Robert