Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof-Producing Reflection for HOL - With an Application to Model Polymorphism., and . ITP, volume 9236 of Lecture Notes in Computer Science, page 170-186. Springer, (2015)(Nominal) Unification by Recursive Descent with Triangular Substitutions., and . ITP, volume 6172 of Lecture Notes in Computer Science, page 51-66. Springer, (2010)Reward tampering problems and solutions in reinforcement learning: a causal influence diagram perspective., , , and . Synth., 198 (27): 6435-6467 (2021)Verifying efficient function calls in CakeML., , , , and . Proc. ACM Program. Lang., 1 (ICFP): 18:1-18:27 (2017)Verified Compilation and Optimization of Floating-Point Programs in CakeML (Artifact)., , , , , , , and . Dagstuhl Artifacts Ser., 8 (2): 10:1-10:2 (2022)TacticToe: Learning to Prove with Tactics., , , , and . J. Autom. Reason., 65 (2): 257-286 (2021)Proof-Producing Synthesis of CakeML from Monadic HOL Functions., , , , , , and . J. Autom. Reason., 64 (7): 1287-1306 (2020)Verified Certificate Checking for Counting Votes., , , and . VSTTE, volume 11294 of Lecture Notes in Computer Science, page 69-87. Springer, (2018)Modeling AGI Safety Frameworks with Causal Influence Diagrams., , , and . AISafety@IJCAI, volume 2419 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Solving math word problems with process- and outcome-based feedback., , , , , , , , and . CoRR, (2022)