equal
  deleted
  inserted
  replaced
  
    
    
   247   of the original work (we allow overlapping critical sections) in the theorem prover  | 
   247   of the original work (we allow overlapping critical sections) in the theorem prover  | 
   248   <A HREF="http://isabelle.in.tum.de">Isabelle</A>.  | 
   248   <A HREF="http://isabelle.in.tum.de">Isabelle</A>.  | 
   249   | 
   249   | 
   250   In our formalisation we use the inductive method we learned from  | 
   250   In our formalisation we use the inductive method we learned from  | 
   251   <A HREF="https://www.cl.cam.ac.uk/~lp15/">Prof. Larry Paulson</A>.  | 
   251   <A HREF="https://www.cl.cam.ac.uk/~lp15/">Prof. Larry Paulson</A>.  | 
   252   He used this method in order to prove the correctness of security  | 
   252   He used this method in order to prove the correctness of cryptographic  | 
   253   protocols. We have implemented our algorithm on top of the  | 
   253   protocols. We have implemented our algorithm on top of the  | 
   254   the small <A HREF="https://en.wikipedia.org/wiki/Pintos">PINTOS</A>  | 
   254   the small <A HREF="https://en.wikipedia.org/wiki/Pintos">PINTOS</A>  | 
   255   operating system used for teaching (we passed all their test cases and were  | 
   255   operating system used for teaching (we passed all their test cases and were  | 
   256   faster than their reference implementation).  | 
   256   faster than their reference implementation).  | 
   257   | 
   257   |