Author of the publication

Adapting Methods to Novel Tasks in Proof Planning.

, , , and . KI, volume 861 of Lecture Notes in Computer Science, page 379-390. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource Guided Concurrent Deduction., , , and . ARW, volume 32 of CEUR Workshop Proceedings, CEUR-WS.org, (2000)VCG - Combinatorial Vickrey-Clarke-Groves Auctions., , , and . Archive of Formal Proofs, (2015)Heuristics for Resolution in Propositional Logic.. KI, volume 5803 of Lecture Notes in Computer Science, page 656-663. Springer, (2009)Omega: Towards a Mathematical Assistant., , , , , , , , , and 3 other author(s). CADE, volume 1249 of Lecture Notes in Computer Science, page 252-255. Springer, (1997)On the Translation of Higher-Order Problems into First-Order Logic.. ECAI, page 145-149. John Wiley and Sons, Chichester, (1994)On Knowledge, Strings, and Paradoxes.. JELIA, volume 1489 of Lecture Notes in Computer Science, page 342-354. Springer, (1998)Reformulating Resolution Problems by Tactics., and . WOCFAI, page 169-180. Angkor, 6, rue Maître-Albert, 75005 Paris, France, (1995)Proofs, Proofs, Proofs, and Proofs.. AISC/MKM/Calculemus, volume 6167 of Lecture Notes in Computer Science, page 345-354. Springer, (2010)A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory., , , , , , and . MKM/Calculemus/DML, volume 7961 of Lecture Notes in Computer Science, page 200-215. Springer, (2013)Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling., and . IEEE Symposium on Security and Privacy Workshops, page 304-313. IEEE Computer Society, (2016)