Search results for: Gerwin Klein
Lecture Notes in Computer Science > Logic-Based Program Synthesis and Transformation > Security and Synthesis > 111-126
Lecture Notes in Computer Science > Verified Software: Theories, Tools, Experiments > Case Studies > 99-114
Lecture Notes in Computer Science > Verified Software: Theories, Tools, Experiments > Invited Talk > 86-96
Lecture Notes in Computer Science > Theorem Proving in Higher Order Logics > Regular Papers > 167-182
Lecture Notes in Computer Science > Verified Software: Theories, Tools, Experiments > Logics > 15-29
IFIP — The International Federation for Information Processing > Exploring New Frontiers of Theoretical Informatics > Track (2) on Logic, Semantics, Specification, and Verification > 333-347
Lecture Notes in Computer Science > Logic for Programming, Artificial Intelligence, and Reasoning > 474-488
Lecture Notes in Computer Science > Theorem Proving in Higher Order Logics > Regular Papers > 276-292
Lecture Notes in Computer Science > Theorem Proving in Higher Order Logics > Hardware and Assembler Languages > 55-70
Lecture Notes in Computer Science > Theorem Proving in Higher Order Logics > Regular Papers > 500-515
IFIP — The International Federation for Information Processing > Exploring New Frontiers of Theoretical Informatics > Track (2) on Logic, Semantics, Specification, and Verification > 333-347
Journal of Automated Reasoning > 2016 > 56 > 3 > 201-203
Information and Software Technology > 2015 > 60 > Complete > 102-112
Formal Aspects of Computing > 2014 > 26 > 6 > 1205-1229