doc-src/TutorialI/preface.tex
author Walther Neuper <neuper@ist.tugraz.at>
Thu, 12 Aug 2010 15:03:34 +0200
branchisac-from-Isabelle2009-2
changeset 37913 20e3616b2d9c
parent 16306 8117e2037d3b
child 48693 34b44d28fc4b
permissions -rw-r--r--
prepare reactivation of isac-update-Isa09-2
paulson@11408
     1
\chapter*{Preface}
paulson@11408
     2
\markboth{Preface}{Preface}
paulson@11408
     3
paulson@12539
     4
This volume is a self-contained introduction to interactive proof
nipkow@16306
     5
in higher-order logic (HOL), using the proof assistant Isabelle. 
nipkow@16306
     6
It is written for potential users rather
paulson@11408
     7
than for our colleagues in the research world.
paulson@11408
     8
paulson@12539
     9
The book has three parts.  
paulson@12539
    10
\begin{itemize}
paulson@12539
    11
\item 
wenzelm@12669
    12
The first part, \textbf{Elementary Techniques},
paulson@12539
    13
shows how to model functional programs in higher-order logic.  Early
paulson@12539
    14
examples involve lists and the natural numbers.  Most proofs
paulson@12539
    15
are two steps long, consisting of induction on a chosen variable
paulson@12539
    16
followed by the \isa{auto} tactic.  But even this elementary part
paulson@12539
    17
covers such advanced topics as nested and mutual recursion.
paulson@12539
    18
\item 
paulson@12539
    19
The second part, \textbf{Logic and Sets}, presents a collection of
paulson@12539
    20
lower-level tactics that you can use to apply rules selectively.  It
paulson@12539
    21
also describes Isabelle/HOL's treatment of sets, functions and
paulson@12539
    22
relations and explains how to define sets inductively.  One of the
paulson@12539
    23
examples concerns the theory of model checking, and another is drawn
paulson@12539
    24
from a classic textbook on formal languages.
paulson@12539
    25
\item 
nipkow@16306
    26
The third part, \textbf{Advanced Material}, describes a variety of other
nipkow@16306
    27
topics.  Among these are the real numbers, records and overloading.  Advanced
nipkow@16306
    28
techniques for induction and recursion are described.  A whole chapter is
nipkow@16306
    29
devoted to an extended example: the verification of a security protocol.
paulson@12539
    30
\end{itemize}
paulson@12539
    31
nipkow@12327
    32
The typesetting relies on Wenzel's theory presentation tools.  An
nipkow@12327
    33
annotated source file is run, typesetting the theory
wenzelm@12646
    34
in the form of a \LaTeX\ source file.  This book is derived almost entirely
wenzelm@12646
    35
from output generated in this way.  The final chapter of Part~I explains how
wenzelm@12646
    36
users may produce their own formal documents in a similar fashion.
paulson@11408
    37
wenzelm@12641
    38
Isabelle's \hfootref{http://isabelle.in.tum.de/}{web site} contains links to
wenzelm@12641
    39
the download area and to documentation and other information.  Most Isabelle
wenzelm@12641
    40
sessions are now run from within David Aspinall's\index{Aspinall, David}
paulson@14296
    41
wonderful user interface, \hfootref{http://proofgeneral.inf.ed.ac.uk/}{Proof
wenzelm@12641
    42
  General}, even together with the
wenzelm@13141
    43
\hfootref{http://x-symbol.sourceforge.net}{X-Symbol} package for XEmacs.  This
wenzelm@13141
    44
book says very little about Proof General, which has its own documentation.
wenzelm@13141
    45
In order to run Isabelle, you will need a Standard ML compiler.  We recommend
wenzelm@13141
    46
\hfootref{http://www.polyml.org/}{Poly/ML}, which is free and gives the best
wenzelm@13141
    47
performance.  The other fully supported compiler is
nipkow@16306
    48
\hfootref{http://www.smlnj.org/index.html}{Standard ML of New Jersey}.
paulson@12539
    49
paulson@11408
    50
This tutorial owes a lot to the constant discussions with and the valuable
nipkow@11547
    51
feedback from the Isabelle group at Munich: Stefan Berghofer, Olaf
nipkow@11547
    52
M{\"u}ller, Wolfgang Naraschewski, David von Oheimb, Leonor Prensa Nieto,
paulson@12812
    53
Cornelia Pusch, Norbert Schirmer and Martin Strecker. Stephan
nipkow@11547
    54
Merz was also kind enough to read and comment on a draft version.  We
paulson@14179
    55
received comments from Stefano Bistarelli, Gergely Buday, John Matthews
paulson@14179
    56
and Tanja Vos.
paulson@11408
    57
nipkow@11547
    58
The research has been funded by many sources, including the {\sc dfg} grants
nipkow@16306
    59
NI~491/2, NI~491/3, NI~491/4, NI~491/6, {\sc bmbf} project Verisoft, the {\sc
nipkow@16306
    60
epsrc} grants GR/K57381, GR/K77051, GR/M75440, GR/R01156/01 GR/S57198/01 and
nipkow@16306
    61
by the \textsc{esprit} working groups 21900 and IST-1999-29001 (the
nipkow@16306
    62
\emph{Types} project).