Report
| Date
| Title
|
EDI-INF-RR-1378
| 2010
| Properties of IsaCoSy's Constraint Generation Algorithm
|
EDI-INF-RR-1377
| 2010
| Ideas for a high-level proof strategy language
|
EDI-INF-RR-1347
| Sep 2009
| Learning from experts to aid the automation of proof search
|
EDI-INF-RR-1328
| Mar 2009
| On Process Equivalence = Equation Solving in CCS
|
EDI-INF-RR-1326
| 2009
| Case-Analysis for Rippling and Inductive Proof
|
EDI-INF-RR-1314
| Nov 2008
| Inconstancy: An Ontology Repair Plan for Adding Hidden Variables
|
EDI-INF-RR-1312
| Sep 2004
| The Paradox of the Case Study
|
EDI-INF-RR-1311
| 2002
| A Critique of Proof Planning
|
EDI-INF-RR-1271
| Jul 2008
| Automating Signature Evolution in Logical Theories
|
EDI-INF-RR-1264
| Jul 2008
| Towards Ontology Evolution in Physics
|
EDI-INF-RR-1257
| Feb 2005
| Psychological validity of schematic proofs
|
EDI-INF-RR-1247
| 2007
| Automatic synthesis of decision procedures
|
EDI-INF-RR-1246
| 2007
| Fast, but Approximate, Workflow-Runtime Estimation Using the Bell-Curve Calculus
|
EDI-INF-RR-1245
| 2007
| Computational Thinking is Pervasive
|
EDI-INF-RR-1225
| Jul 2007
| Where's My Stuff? An Ontology Repair Plan
|
EDI-INF-RR-1149
| 2007
| Dynamic, automatic, first-order ontology repair by diagnosis of failed plan execution
|
EDI-INF-RR-1097
| Jul 2007
| Automated discovery of inductive theorems.
|
EDI-INF-RR-1069
| Mar 2006
| Towards a Bell-Curve Calculus and its Application to e-Science
|
EDI-INF-RR-1068
| Sep 2006
| Towards a Bell-Curve Calculus for e-Science
|
EDI-INF-RR-0989
| Nov 2005
| Automatic Verification of Design Patterns in Java
|
EDI-INF-RR-0954
| Jan 2007
| Cooperating Reasoning Processes: More than Just the Sum of their Parts
|
EDI-INF-RR-0869
| Oct 2005
| What is a proof?
|
EDI-INF-RR-0849
| Aug 2006
| Best-First Rippling
|
EDI-INF-RR-0842
| Sep 2006
| Towards a Bell-Curve Calculus for e-Science
|
EDI-INF-RR-0841
| Jul 2006
| Constructing, Selecting and Repairing Representations of Knowledge
|
EDI-INF-RR-0837
| May 2006
| On Repairing Reasoning Reversals via Representational Refinements
|
EDI-INF-RR-0836
| May 2006
| Representation as a Fluent: An AI Challenge for the Next Half Century
|
EDI-INF-RR-0831
| 2006
| A Very Mathematical Dilemma
|
EDI-INF-RR-0786
| 2006
| Planning as Deductive Synthesis in Intuitionistic Linear Logic
|
EDI-INF-RR-0564
| 2006
| Ascertaining Mathematical Theorems
|
EDI-INF-RR-0491
| 2005
| Constructing Induction Rules for Deductive Synthesis Proofs
|
EDI-INF-RR-0394
| Oct 2005
| The Nature of Mathematical Proof
|
EDI-INF-RR-0348
| 2004
| An Experimental Comparison of Diagrammatic and Algebraic Logics
|
EDI-INF-RR-0331
| 2002
| Using Animation in Diagrammatic Theorem Proving
|
EDI-INF-RR-0315
| Jun 2005
| Rippling: Meta-Level Guidance for Mathematical Reasoning
|
EDI-INF-RR-0291
| Sep 2000
| A Proposal for Automating Diagrammatic Reasoning in Continuous Domains
|
EDI-INF-RR-0270
| 2004
| Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
|
EDI-INF-RR-0269
| 2004
| Attacking Group Multicast Key Management Protocols Using CORAL
|
EDI-INF-RR-0268
| Jan 2006
| Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
|
EDI-INF-RR-0253
| Dec 2003
| Plan Execution Failure Analysis Using Plan Deconstruction
|
EDI-INF-RR-0252
| Dec 2004
| An Automatic Translator from KIF to PDDL
|
EDI-INF-RR-0251
| Jul 2004
| Diagnosing and Repairing Ontological Mismatches
|
EDI-INF-RR-0245
| Jun 2004
| Facilitating Agent Communication through Detecting, Diagnosing and Refining Ontological Mismatch
|
EDI-INF-RR-0244
| Jun 2005
| Planning from rich ontologies through translation betweeen representations
|
EDI-INF-RR-0229
| Jul 2004
| Planning and Patching Proof
|
EDI-INF-RR-0182
| Sep 2001
| On the correction of faulty formulae
|
EDI-INF-RR-0179
| Oct 2003
| Attacking the Asokan--Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL
|
EDI-INF-RR-0177
| Jun 2003
| Dynamic Ontology Refinement
|
EDI-INF-RR-0141
| Jul 2002
| Finding Counterexamples to Inductive Conjectures and Discovering Security Protocol Attacks
|
EDI-INF-RR-0103
| Feb 2001
| Applying adversarial planning techniques to Go
|
EDI-INF-RR-0098
| Jan 1999
| Extensions to the Estimation Calculus
|
EDI-INF-RR-0097
| Jan 2001
| Strict General Setting for Building Decision Procedures into Theorem Provers
|
EDI-INF-RR-0096
| Jan 1999
| A Framework for the Flexible Integration of a Class of Decision Procedures into Theorem Provers
|
EDI-INF-RR-0095
| Jan 2002
| A General Setting for Flexibly Combining and Augmenting Decision Procedures
|
EDI-INF-RR-0019
| May 2000
| Cross Domain Mathematical Concept Formation
|
EDI-INF-RR-0004
| 1999
| Making a Productive Use of Failure to Generate Witnesses for Coinduction from Divergent Proof Attempts
|
EDI-INF-RR-0003
| Sep 1999
| Proofs About Lists Using Ellipsis
|
EDI-INF-RR-0002
| Apr 1999
| The Automation Of Proof By Mathematical Induction
|
EDI-INF-RR-0001
| Apr 1999
| A Survey of Automated Deduction
|