Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verified Certificate Checking for Counting Votes., , , and . VSTTE, volume 11294 of Lecture Notes in Computer Science, page 69-87. Springer, (2018)Proof-Producing Reflection for HOL - With an Application to Model Polymorphism., and . ITP, volume 9236 of Lecture Notes in Computer Science, page 170-186. Springer, (2015)(Nominal) Unification by Recursive Descent with Triangular Substitutions., and . ITP, volume 6172 of Lecture Notes in Computer Science, page 51-66. Springer, (2010)Verifying efficient function calls in CakeML., , , , and . Proc. ACM Program. Lang., 1 (ICFP): 18:1-18:27 (2017)Reward tampering problems and solutions in reinforcement learning: a causal influence diagram perspective., , , and . Synth., 198 (27): 6435-6467 (2021)Verified Compilation and Optimization of Floating-Point Programs in CakeML (Artifact)., , , , , , , and . Dagstuhl Artifacts Ser., 8 (2): 10:1-10:2 (2022)TacticToe: Learning to Prove with Tactics., , , , and . J. Autom. Reason., 65 (2): 257-286 (2021)Proof-Producing Synthesis of CakeML from Monadic HOL Functions., , , , , , and . J. Autom. Reason., 64 (7): 1287-1306 (2020)Modeling AGI Safety Frameworks with Causal Influence Diagrams., , , and . AISafety@IJCAI, volume 2419 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Learning to Prove with Tactics., , , , and . CoRR, (2018)