Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standalone Tactics Using OpenTheory., and . ITP, volume 7406 of Lecture Notes in Computer Science, page 405-411. Springer, (2012)Solving math word problems with process- and outcome-based feedback., , , , , , , , and . CoRR, (2022)Scaling Goal-based Exploration via Pruning Proto-goals., , , and . CoRR, (2023)Discovering Agents., , , , , and . CoRR, (2022)Discovering Agents (Abstract Reprint)., , , , , and . AAAI, page 22701. AAAI Press, (2024)Challenges in Using OpenTheory to Transport Harrison's HOL Model from HOL Light to HOL4.. PxTP@CADE, volume 14 of EPiC Series in Computing, page 110-116. EasyChair, (2013)Proof-Producing Synthesis of CakeML with I/O and Local State from Monadic HOL Functions., , , , , and . IJCAR, volume 10900 of Lecture Notes in Computer Science, page 646-662. Springer, (2018)Evaluating Frontier Models for Dangerous Capabilities., , , , , , , , , and 17 other author(s). CoRR, (2024)Verified Characteristic Formulae for CakeML., , , and . ESOP, volume 10201 of Lecture Notes in Computer Science, page 584-610. Springer, (2017)Steps towards Verified Implementations of HOL Light., , and . ITP, volume 7998 of Lecture Notes in Computer Science, page 490-495. Springer, (2013)