Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cutting planes, connectivity, and threshold logic., and . Arch. Math. Log., 35 (1): 33-62 (1996)Safe Recursive Set Functions., , and . J. Symb. Log., 80 (3): 730-762 (2015)3-D Computer Graphics.. Cambridge University Press, (2013)Small Stone in Pool., and . Logical Methods in Computer Science, (2014)The Polynomial Hierarchy and Fragments of Bounded Arithmetic (Extended Abstract). STOC, page 285-290. ACM, (1985)Minimum Propositional Proof Length is NP-Hard to Linearly Approximate., , , and . MFCS, volume 1450 of Lecture Notes in Computer Science, page 176-184. Springer, (1998)The Modal Logic of Pure Provability.. Notre Dame J. Formal Log., 31 (2): 225-231 (1990)Resource-Bounded Continuity and Sequentiality for Type-Two Functionals., and . LICS, page 77-83. IEEE Computer Society, (2000)A Switching Lemma for Small Restrictions and Lower Bounds for k - DNF Resolution., , and . FOCS, page 604-. IEEE Computer Society, (2002)The prospects for mathematical logic in the twenty-first century., , , and . Bull. Symb. Log., 7 (2): 169-196 (2001)