Items where Subject is "Q Science > QA Mathematics (inc Computing science) > QA 9 Formal systems, logics"
Number of items at this level: 43. Article
Buchberger, Bruno and Craciun, Adrian and Jebelean, Tudor and Kovacs, Laura and Temur, Kutsia and Koji, Nakagawa and Piroi, Florina and Popov, Nikolaj and Robu, Judit and Rosenkranz, Markus and Windsteiger, Wolfgang
(2006)
Theorema: Towards computer-aided mathematical theory exploration.
Journal of Applied Logic,
4
(4).
pp. 470-504.
ISSN 1570-8683.
(doi:https://doi.org/10.1016/j.jal.2005.10.006)
(The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)
|
|
Grigore, Radu and Tzevelekos, Nikos
(2016)
History-Register Automata.
Logical Methods in Computer Science,
12
(1).
pp. 1-32.
ISSN 1860-5974.
(Full text available)
|
![[img]](/54558/1.hassmallThumbnailVersion/1209.0680v3.pdf)  Preview |
|
Book section
Wheeler, Gregory and Williamson, Jon
(2011)
Evidential Probability and Objective Bayesian Epistemology.
In: Bandyopadhyay, Prasanta S. and Forster, Malcolm R., eds.
Philosophy of statistics.
Handbook of the Philosophy of Science, 7
.
Elsevier Science & Technology/ North Holland, Oxford, pp. 307-331.
ISBN 9780444518620.
(The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)
|
|
Windsteiger, Wolfgang and Buchberger, Bruno and Rosenkranz, Markus
(2006)
Theorema.
In: Wiedijk, Freek, ed.
The Seventeen Provers of the World.
Lecture Notes in Artificial Intelligence, 3600
.
Springer, pp. 96-107.
ISBN 9783540307044.
(doi:https://doi.org/10.1007/11542384_1)
(The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)
|
|
Monograph
Conference or workshop item
Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie
(2015)
Composing security protocols: from confidentiality to privacy.
In: 4th International Conference on Principles of Security and Trust (POST'15), April 2015, London, UK.
(Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
|
|
Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie
(2010)
Automating Security Analysis: Symbolic Equivalence of Constraint Systems.
In: Giesl, Jürgen and Hähnle, Reiner, eds.
Automated Reasoning.
Lecture Notes in Computer Science, 6173.
Springer-Verlag Berlin, Edinburgh, Scotland, UK
pp. 412-426.
ISBN 978-3-642-14202-4.
E-ISBN 978-3-642-14203-1.
(doi:https://doi.org/10.1007/978-3-642-14203-1_35)
(Full text available)
|
![[img]](/46730/1.hassmallThumbnailVersion/CCD-ijcar10.pdf)  Preview |
|
Petricek, Tomas and Orchard, Dominic A. and Mycroft, Alan
(2013)
Coeffects: Unified static analysis of context-dependence.
In: Automata, Languages, and Programming: 40th International Colloquium, ICALP 2013, July 8-12, 2013, Riga, Latvia.
(doi:https://doi.org/10.1007/978-3-642-39212-2_35)
(Full text available)
|
![[img]](/57543/1.hassmallThumbnailVersion/coeffects-icalp13.pdf)  Preview |
|
Book
Fischer, Michael D.
(1994)
Applications in Computing for Social Anthropologists.
ASA Research Methods
.
Routledge, London, 248 pp.
ISBN 9780203451083.
(The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)
|
|
Thesis
Internet publication
Review
Jordanous, Anna
(2015)
Review: The POINT of creative collaborations between composers and computers.
Review of: Patterns of intuition: Musical Creativity in the Light of Algorithmic Composition (Springer, 2015 )
by UNSPECIFIED.
ACM Computing Reviews,
(184827).
p. 1.
(The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)
|
|
This list was generated on Sat Apr 21 23:41:19 2018 BST.
|