Author of the publication

Refactoring Proofs with Tactician.

. SEFM Workshops, volume 9509 of Lecture Notes in Computer Science, page 53-67. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The sequence of the human genome (abstract only).. RECOMB, page 1. ACM, (2001)Introducing HOL Zero - (Extended Abstract).. ICMS, volume 6327 of Lecture Notes in Computer Science, page 142-143. Springer, (2010)Using sparse voxel octrees in a level-of-detail pipeline for Rio 2., , and . SIGGRAPH Talks, page 70:1. ACM, (2014)Populating the crowds in Ferdinand., , , , , and . SIGGRAPH Talks, page 68:1-68:2. ACM, (2017)Refactoring Proofs with Tactician.. SEFM Workshops, volume 9509 of Lecture Notes in Computer Science, page 53-67. Springer, (2015)Using friendly jamming to improve route security and quality in ad hoc networks., and . CCECE, page 1-6. IEEE, (2017)Use of the Recursive Least Squares Filter for Self Interference Channel Estimation., and . VTC Fall, page 1-4. IEEE, (2016)HOL Zero's Solutions for Pollack-Inconsistency.. ITP, volume 9807 of Lecture Notes in Computer Science, page 20-35. Springer, (2016)Bats, birds, and boggans: the simulated armies of epic., , , and . SIGGRAPH Talks, page 4:1. ACM, (2013)Flyspecking Flyspeck.. ICMS, volume 8592 of Lecture Notes in Computer Science, page 16-20. Springer, (2014)