Author of the publication

Standalone Tactics Using OpenTheory.

, and . ITP, volume 7406 of Lecture Notes in Computer Science, page 405-411. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verified Certificate Checking for Counting Votes., , , and . VSTTE, volume 11294 of Lecture Notes in Computer Science, page 69-87. Springer, (2018)Proof-Producing Reflection for HOL - With an Application to Model Polymorphism., and . ITP, volume 9236 of Lecture Notes in Computer Science, page 170-186. Springer, (2015)(Nominal) Unification by Recursive Descent with Triangular Substitutions., and . ITP, volume 6172 of Lecture Notes in Computer Science, page 51-66. Springer, (2010)Modeling AGI Safety Frameworks with Causal Influence Diagrams., , , and . AISafety@IJCAI, volume 2419 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Steps towards Verified Implementations of HOL Light., , and . ITP, volume 7998 of Lecture Notes in Computer Science, page 490-495. Springer, (2013)Verified Characteristic Formulae for CakeML., , , and . ESOP, volume 10201 of Lecture Notes in Computer Science, page 584-610. Springer, (2017)A Proof Strategy Language and Proof Script Generation for Isabelle/HOL., and . CADE, volume 10395 of Lecture Notes in Computer Science, page 528-545. Springer, (2017)Candle: A Verified Implementation of HOL Light., , , and . ITP, volume 237 of LIPIcs, page 3:1-3:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Discovering Agents., , , , , and . CoRR, (2022)Standalone Tactics Using OpenTheory., and . ITP, volume 7406 of Lecture Notes in Computer Science, page 405-411. Springer, (2012)