Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Set Theory With a Filter Quantifier.. J. Symb. Log., 48 (2): 263-287 (1983)Meeting of the Association for Symbolic Logic: Notre Dame, Indiana, 1984., , and . J. Symb. Log., 50 (1): 284-286 (1985)Enhancements to ACL2 in Versions 5.0, 6.0, and 6.1, and . ACL2, volume 114 of EPTCS, page 5-12. (2013)Meta Reasoning in ACL2., , , , and . TPHOLs, volume 3603 of Lecture Notes in Computer Science, page 163-178. Springer, (2005)A prototype theorem-prover for a higher-order functional language., and . ACM SIGSOFT Softw. Eng. Notes, 10 (4): 72-74 (1985)A Mechanically Checked Proof of the AMD5K86TM Floating Point Division Program., , and . IEEE Trans. Computers, 47 (9): 913-926 (1998)Blunt and Topless End Extensions of Models of Set Theory.. J. Symb. Log., 48 (4): 1053-1073 (1983)ACL2 and Its Applications to Digital System Verification., and . Design and Verification of Microprocessor Systems for High-Assurance Applications, Springer, (2010)Commercial Design Verification: Methodology and Tools., , , , , , , , , and . ITC, page 839-848. IEEE Computer Society, (1996)Engineering a Formal, Executable x86 ISA Simulator for Software Verification., , and . Provably Correct Systems, Springer, (2017)