callback( { "result":{ "query":":facetid:toc:\"db/conf/lpar/lpar2015.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.48" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"44", "@dc":"44", "@oc":"44", "@id":"43412965", "text":":facetid:toc:db/conf/lpar/lpar2015.bht" } }, "hits":{ "@total":"44", "@computed":"44", "@sent":"44", "@first":"0", "hit":[{ "@score":"1", "@id":"3621078", "info":{"authors":{"author":[{"@pid":"91/1275","text":"Wolfgang Ahrendt"},{"@pid":"k/LauraKovacs","text":"Laura Kovács"},{"@pid":"145/9554","text":"Simon Robillard"}]},"title":"Reasoning About Loops Using Vampire in KeY.","venue":"LPAR","pages":"434-443","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/AhrendtKR15","doi":"10.1007/978-3-662-48899-7_30","ee":"https://doi.org/10.1007/978-3-662-48899-7_30","url":"https://dblp.org/rec/conf/lpar/AhrendtKR15"}, "url":"URL#3621078" }, { "@score":"1", "@id":"3621079", "info":{"authors":{"author":[{"@pid":"72/1335","text":"Benjamin Aminof"},{"@pid":"41/1330","text":"Aniello Murano"},{"@pid":"07/1731","text":"Sasha Rubin"}]},"title":"On CTL* with Graded Path Modalities.","venue":"LPAR","pages":"281-296","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/AminofMR15","doi":"10.1007/978-3-662-48899-7_20","ee":"https://doi.org/10.1007/978-3-662-48899-7_20","url":"https://dblp.org/rec/conf/lpar/AminofMR15"}, "url":"URL#3621079" }, { "@score":"1", "@id":"3621080", "info":{"authors":{"author":[{"@pid":"72/1335","text":"Benjamin Aminof"},{"@pid":"07/1731","text":"Sasha Rubin"},{"@pid":"69/2671","text":"Florian Zuleger"}]},"title":"On the Expressive Power of Communication Primitives in Parameterised Systems.","venue":"LPAR","pages":"313-328","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/AminofRZ15","doi":"10.1007/978-3-662-48899-7_22","ee":"https://doi.org/10.1007/978-3-662-48899-7_22","url":"https://dblp.org/rec/conf/lpar/AminofRZ15"}, "url":"URL#3621080" }, { "@score":"1", "@id":"3621082", "info":{"authors":{"author":[{"@pid":"76/2574","text":"Souheib Baarir"},{"@pid":"43/6032","text":"Alexandre Duret-Lutz"}]},"title":"SAT-Based Minimization of Deterministic \\omega -Automata.","venue":"LPAR","pages":"79-87","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/BaarirD15","doi":"10.1007/978-3-662-48899-7_6","ee":"https://doi.org/10.1007/978-3-662-48899-7_6","url":"https://dblp.org/rec/conf/lpar/BaarirD15"}, "url":"URL#3621082" }, { "@score":"1", "@id":"3621083", "info":{"authors":{"author":[{"@pid":"57/6862","text":"Patrick Baillot"},{"@pid":"b/GBarthe","text":"Gilles Barthe"},{"@pid":"44/3105","text":"Ugo Dal Lago"}]},"title":"Implicit Computational Complexity of Subrecursive Definitions and Applications to Cryptographic Proofs.","venue":"LPAR","pages":"203-218","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/BaillotBL15","doi":"10.1007/978-3-662-48899-7_15","ee":"https://doi.org/10.1007/978-3-662-48899-7_15","url":"https://dblp.org/rec/conf/lpar/BaillotBL15"}, "url":"URL#3621083" }, { "@score":"1", "@id":"3621084", "info":{"authors":{"author":[{"@pid":"b/GBarthe","text":"Gilles Barthe"},{"@pid":"164/3319","text":"Thomas Espitau"},{"@pid":"28/2414","text":"Benjamin Grégoire"},{"@pid":"35/10964","text":"Justin Hsu"},{"@pid":"160/7666","text":"Léo Stefanesco"},{"@pid":"35/5080","text":"Pierre-Yves Strub"}]},"title":"Relational Reasoning via Probabilistic Coupling.","venue":"LPAR","pages":"387-401","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/BartheEGHSS15","doi":"10.1007/978-3-662-48899-7_27","ee":"https://doi.org/10.1007/978-3-662-48899-7_27","url":"https://dblp.org/rec/conf/lpar/BartheEGHSS15"}, "url":"URL#3621084" }, { "@score":"1", "@id":"3621085", "info":{"authors":{"author":[{"@pid":"116/5005","text":"Luciano Bello"},{"@pid":"37/1881","text":"Daniel Hedin"},{"@pid":"s/AndreiSabelfeld","text":"Andrei Sabelfeld"}]},"title":"Value Sensitivity and Observable Abstract Values for Information Flow Control.","venue":"LPAR","pages":"63-78","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/BelloHS15","doi":"10.1007/978-3-662-48899-7_5","ee":"https://doi.org/10.1007/978-3-662-48899-7_5","url":"https://dblp.org/rec/conf/lpar/BelloHS15"}, "url":"URL#3621085" }, { "@score":"1", "@id":"3621086", "info":{"authors":{"author":[{"@pid":"172/1741","text":"Fiona Berreby"},{"@pid":"05/5583","text":"Gauvain Bourgne"},{"@pid":"g/JGGanascia","text":"Jean-Gabriel Ganascia"}]},"title":"Modelling Moral Reasoning and Ethical Responsibility with Logic Programming.","venue":"LPAR","pages":"532-548","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/BerrebyBG15","doi":"10.1007/978-3-662-48899-7_37","ee":"https://doi.org/10.1007/978-3-662-48899-7_37","url":"https://dblp.org/rec/conf/lpar/BerrebyBG15"}, "url":"URL#3621086" }, { "@score":"1", "@id":"3621090", "info":{"authors":{"author":[{"@pid":"172/1737","text":"Peter Brottveit Bock"},{"@pid":"07/4034-1","text":"Carsten Schürmann 0001"}]},"title":"A Contextual Logical Framework.","venue":"LPAR","pages":"402-417","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/BockS15","doi":"10.1007/978-3-662-48899-7_28","ee":"https://doi.org/10.1007/978-3-662-48899-7_28","url":"https://dblp.org/rec/conf/lpar/BockS15"}, "url":"URL#3621090" }, { "@score":"1", "@id":"3621093", "info":{"authors":{"author":[{"@pid":"99/622","text":"Franck Cassez"},{"@pid":"172/1725","text":"Frowin Ziegler"}]},"title":"Verification of Concurrent Programs Using Trace Abstraction Refinement.","venue":"LPAR","pages":"233-248","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/CassezZ15","doi":"10.1007/978-3-662-48899-7_17","ee":"https://doi.org/10.1007/978-3-662-48899-7_17","url":"https://dblp.org/rec/conf/lpar/CassezZ15"}, "url":"URL#3621093" }, { "@score":"1", "@id":"3621094", "info":{"authors":{"author":[{"@pid":"c/ICervesato","text":"Iliano Cervesato"},{"@pid":"55/3413","text":"Edmund S. L. Lam"}]},"title":"Modular Multiset Rewriting.","venue":"LPAR","pages":"515-531","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/CervesatoL15","doi":"10.1007/978-3-662-48899-7_36","ee":"https://doi.org/10.1007/978-3-662-48899-7_36","url":"https://dblp.org/rec/conf/lpar/CervesatoL15"}, "url":"URL#3621094" }, { "@score":"1", "@id":"3621096", "info":{"authors":{"author":[{"@pid":"35/6012","text":"Kaustuv Chaudhuri"},{"@pid":"72/9473","text":"Giselle Reis"}]},"title":"An Adequate Compositional Encoding of Bigraph Structure in Linear Logic with Subexponentials.","venue":"LPAR","pages":"146-161","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/ChaudhuriR15","doi":"10.1007/978-3-662-48899-7_11","ee":"https://doi.org/10.1007/978-3-662-48899-7_11","url":"https://dblp.org/rec/conf/lpar/ChaudhuriR15"}, "url":"URL#3621096" }, { "@score":"1", "@id":"3621097", "info":{"authors":{"author":[{"@pid":"02/4363","text":"Petr Cintula"},{"@pid":"63/719","text":"Denisa Diaconescu"},{"@pid":"49/3739","text":"George Metcalfe"}]},"title":"Skolemization for Substructural Logics.","venue":"LPAR","pages":"1-15","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/CintulaDM15","doi":"10.1007/978-3-662-48899-7_1","ee":"https://doi.org/10.1007/978-3-662-48899-7_1","url":"https://dblp.org/rec/conf/lpar/CintulaDM15"}, "url":"URL#3621097" }, { "@score":"1", "@id":"3621098", "info":{"authors":{"author":[{"@pid":"74/2610","text":"Koen Claessen"},{"@pid":"124/5885","text":"Dan Rosén"}]},"title":"SAT Modulo Intuitionistic Implications.","venue":"LPAR","pages":"622-637","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/ClaessenR15","doi":"10.1007/978-3-662-48899-7_43","ee":"https://doi.org/10.1007/978-3-662-48899-7_43","url":"https://dblp.org/rec/conf/lpar/ClaessenR15"}, "url":"URL#3621098" }, { "@score":"1", "@id":"3621099", "info":{"authors":{"author":[{"@pid":"61/11109","text":"Arlen Cox"},{"@pid":"68/6029","text":"Bor-Yuh Evan Chang"},{"@pid":"167/4520","text":"Huisong Li"},{"@pid":"r/XavierRival","text":"Xavier Rival"}]},"title":"Abstract Domains and Solvers for Sets Reasoning.","venue":"LPAR","pages":"356-371","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/CoxCLR15","doi":"10.1007/978-3-662-48899-7_25","ee":"https://doi.org/10.1007/978-3-662-48899-7_25","url":"https://dblp.org/rec/conf/lpar/CoxCLR15"}, "url":"URL#3621099" }, { "@score":"1", "@id":"3621101", "info":{"authors":{"author":[{"@pid":"01/3840","text":"Cristina David"},{"@pid":"k/DanielKroening","text":"Daniel Kroening"},{"@pid":"10/5971","text":"Matt Lewis"}]},"title":"Using Program Synthesis for Program Analysis.","venue":"LPAR","pages":"483-498","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/DavidKL15","doi":"10.1007/978-3-662-48899-7_34","ee":"https://doi.org/10.1007/978-3-662-48899-7_34","url":"https://dblp.org/rec/conf/lpar/DavidKL15"}, "url":"URL#3621101" }, { "@score":"1", "@id":"3621103", "info":{"authors":{"author":[{"@pid":"163/5178","text":"Thinh Dong"},{"@pid":"22/707","text":"Chan Le Duc"},{"@pid":"29/11442","text":"Philippe Bonnot 0002"},{"@pid":"l/MyriamLamolle","text":"Myriam Lamolle"}]},"title":"Tableau-Based Revision over SHIQ TBoxes.","venue":"LPAR","pages":"575-590","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/DongD0L15","doi":"10.1007/978-3-662-48899-7_40","ee":"https://doi.org/10.1007/978-3-662-48899-7_40","url":"https://dblp.org/rec/conf/lpar/DongD0L15"}, "url":"URL#3621103" }, { "@score":"1", "@id":"3621104", "info":{"authors":{"author":[{"@pid":"50/4956","text":"Gilles Dowek"},{"@pid":"42/1709","text":"Ying Jiang"}]},"title":"Decidability, Introduction Rules and Automata.","venue":"LPAR","pages":"97-111","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/DowekJ15","doi":"10.1007/978-3-662-48899-7_8","ee":"https://doi.org/10.1007/978-3-662-48899-7_8","url":"https://dblp.org/rec/conf/lpar/DowekJ15"}, "url":"URL#3621104" }, { "@score":"1", "@id":"3621105", "info":{"authors":{"author":[{"@pid":"57/8336","text":"Cvetan Dunchev"},{"@pid":"50/6127","text":"Ferruccio Guidi"},{"@pid":"40/646","text":"Claudio Sacerdoti Coen"},{"@pid":"35/4153","text":"Enrico Tassi"}]},"title":"ELPI: Fast, Embeddable, λProlog Interpreter.","venue":"LPAR","pages":"460-468","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/DunchevGCT15","doi":"10.1007/978-3-662-48899-7_32","ee":"https://doi.org/10.1007/978-3-662-48899-7_32","url":"https://dblp.org/rec/conf/lpar/DunchevGCT15"}, "url":"URL#3621105" }, { "@score":"1", "@id":"3621106", "info":{"authors":{"author":[{"@pid":"e/UweEgly","text":"Uwe Egly"},{"@pid":"85/828","text":"Florian Lonsing"},{"@pid":"21/4494","text":"Johannes Oetsch"}]},"title":"Automated Benchmarking of Incremental SAT and QBF Solvers.","venue":"LPAR","pages":"178-186","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/EglyLO15","doi":"10.1007/978-3-662-48899-7_13","ee":"https://doi.org/10.1007/978-3-662-48899-7_13","url":"https://dblp.org/rec/conf/lpar/EglyLO15"}, "url":"URL#3621106" }, { "@score":"1", "@id":"3621107", "info":{"authors":{"author":[{"@pid":"e/MDErnst","text":"Michael D. Ernst"},{"@pid":"14/4237","text":"Alberto Lovato"},{"@pid":"29/900","text":"Damiano Macedonio"},{"@pid":"172/1715","text":"Ciprian Spiridon"},{"@pid":"21/1969","text":"Fausto Spoto"}]},"title":"Boolean Formulas for the Static Identification of Injection Attacks in Java.","venue":"LPAR","pages":"130-145","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/ErnstLMSS15","doi":"10.1007/978-3-662-48899-7_10","ee":"https://doi.org/10.1007/978-3-662-48899-7_10","url":"https://dblp.org/rec/conf/lpar/ErnstLMSS15"}, "url":"URL#3621107" }, { "@score":"1", "@id":"3621108", "info":{"authors":{"author":[{"@pid":"222/9136","text":"Daniel Fava"},{"@pid":"26/3282","text":"Julien Signoles"},{"@pid":"86/636","text":"Matthieu Lemerre"},{"@pid":"41/7506","text":"Martin Schäf"},{"@pid":"t/AshishTiwari","text":"Ashish Tiwari 0001"}]},"title":"Gamifying Program Analysis.","venue":"LPAR","pages":"591-605","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/FavaSLST15","doi":"10.1007/978-3-662-48899-7_41","ee":"https://doi.org/10.1007/978-3-662-48899-7_41","url":"https://dblp.org/rec/conf/lpar/FavaSLST15"}, "url":"URL#3621108" }, { "@score":"1", "@id":"3621109", "info":{"authors":{"author":[{"@pid":"43/8810","text":"Grigory Fedyukovich"},{"@pid":"44/3532","text":"Arie Gurfinkel"},{"@pid":"12/2269","text":"Natasha Sharygina"}]},"title":"Automated Discovery of Simulation Between Programs.","venue":"LPAR","pages":"606-621","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/FedyukovichGS15","doi":"10.1007/978-3-662-48899-7_42","ee":"https://doi.org/10.1007/978-3-662-48899-7_42","url":"https://dblp.org/rec/conf/lpar/FedyukovichGS15"}, "url":"URL#3621109" }, { "@score":"1", "@id":"3621110", "info":{"authors":{"author":[{"@pid":"01/2980","text":"Vojtech Forejt"},{"@pid":"43/8180","text":"Jan Krcál"},{"@pid":"95/6511","text":"Jan Kretínský"}]},"title":"Controller Synthesis for MDPs and Frequency LTL\\GU.","venue":"LPAR","pages":"162-177","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/ForejtKK15","doi":"10.1007/978-3-662-48899-7_12","ee":"https://doi.org/10.1007/978-3-662-48899-7_12","url":"https://dblp.org/rec/conf/lpar/ForejtKK15"}, "url":"URL#3621110" }, { "@score":"1", "@id":"3621111", "info":{"authors":{"author":[{"@pid":"146/0608","text":"Thibault Gauthier"},{"@pid":"30/5217","text":"Cezary Kaliszyk"}]},"title":"Sharing HOL4 and HOL Light Proof Knowledge.","venue":"LPAR","pages":"372-386","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/GauthierK15","doi":"10.1007/978-3-662-48899-7_26","ee":"https://doi.org/10.1007/978-3-662-48899-7_26","url":"https://dblp.org/rec/conf/lpar/GauthierK15"}, "url":"URL#3621111" }, { "@score":"1", "@id":"3621113", "info":{"authors":{"author":[{"@pid":"172/1733","text":"Gaëtan Gilbert"},{"@pid":"72/1933","text":"Olivier Hermant"}]},"title":"Normalisation by Completeness with Heyting Algebras.","venue":"LPAR","pages":"469-482","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/GilbertH15","doi":"10.1007/978-3-662-48899-7_33","ee":"https://doi.org/10.1007/978-3-662-48899-7_33","url":"https://dblp.org/rec/conf/lpar/GilbertH15"}, "url":"URL#3621113" }, { "@score":"1", "@id":"3621114", "info":{"authors":{"author":[{"@pid":"g/EricGregoire","text":"Éric Grégoire"},{"@pid":"28/7480","text":"Jean-Marie Lagniez"}]},"title":"On Anti-subsumptive Knowledge Enforcement.","venue":"LPAR","pages":"48-62","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/GregoireL15","doi":"10.1007/978-3-662-48899-7_4","ee":"https://doi.org/10.1007/978-3-662-48899-7_4","url":"https://dblp.org/rec/conf/lpar/GregoireL15"}, "url":"URL#3621114" }, { "@score":"1", "@id":"3621115", "info":{"authors":{"author":[{"@pid":"09/9862","text":"Liana Hadarean"},{"@pid":"b/ClarkWBarrett","text":"Clark W. Barrett"},{"@pid":"41/9861","text":"Andrew Reynolds 0001"},{"@pid":"37/4921","text":"Cesare Tinelli"},{"@pid":"16/1191","text":"Morgan Deters"}]},"title":"Fine Grained SMT Proofs for the Theory of Fixed-Width Bit-Vectors.","venue":"LPAR","pages":"340-355","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/HadareanBRTD15","doi":"10.1007/978-3-662-48899-7_24","ee":"https://doi.org/10.1007/978-3-662-48899-7_24","url":"https://dblp.org/rec/conf/lpar/HadareanBRTD15"}, "url":"URL#3621115" }, { "@score":"1", "@id":"3621116", "info":{"authors":{"author":{"@pid":"129/1659","text":"Miika Hannula"}},"title":"Reasoning About Embedded Dependencies Using Inclusion Dependencies.","venue":"LPAR","pages":"16-30","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/Hannula15","doi":"10.1007/978-3-662-48899-7_2","ee":"https://doi.org/10.1007/978-3-662-48899-7_2","url":"https://dblp.org/rec/conf/lpar/Hannula15"}, "url":"URL#3621116" }, { "@score":"1", "@id":"3621117", "info":{"authors":{"author":[{"@pid":"h/MarijnHeule","text":"Marijn J. H. Heule"},{"@pid":"b/ArminBiere","text":"Armin Biere"}]},"title":"Compositional Propositional Proofs.","venue":"LPAR","pages":"444-459","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/HeuleB15","doi":"10.1007/978-3-662-48899-7_31","ee":"https://doi.org/10.1007/978-3-662-48899-7_31","url":"https://dblp.org/rec/conf/lpar/HeuleB15"}, "url":"URL#3621117" }, { "@score":"1", "@id":"3621120", "info":{"authors":{"author":[{"@pid":"02/6790","text":"Temesghen Kahsai"},{"@pid":"77/4230a","text":"Jorge A. Navas"},{"@pid":"56/2451","text":"Dejan Jovanovic"},{"@pid":"41/7506","text":"Martin Schäf"}]},"title":"Finding Inconsistencies in Programs with Loops.","venue":"LPAR","pages":"499-514","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/KahsaiNJS15","doi":"10.1007/978-3-662-48899-7_35","ee":"https://doi.org/10.1007/978-3-662-48899-7_35","url":"https://dblp.org/rec/conf/lpar/KahsaiNJS15"}, "url":"URL#3621120" }, { "@score":"1", "@id":"3621121", "info":{"authors":{"author":[{"@pid":"30/5217","text":"Cezary Kaliszyk"},{"@pid":"63/5214","text":"Josef Urban"}]},"title":"FEMaLeCoP: Fairly Efficient Machine Learning Connection Prover.","venue":"LPAR","pages":"88-96","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/KaliszykU15","doi":"10.1007/978-3-662-48899-7_7","ee":"https://doi.org/10.1007/978-3-662-48899-7_7","url":"https://dblp.org/rec/conf/lpar/KaliszykU15"}, "url":"URL#3621121" }, { "@score":"1", "@id":"3621123", "info":{"authors":{"author":[{"@pid":"30/11004","text":"Miroslav Klimos"},{"@pid":"k/AntoninKucera","text":"Antonín Kucera 0001"}]},"title":"Cobra: A Tool for Solving General Deductive Games.","venue":"LPAR","pages":"31-47","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/KlimosK15","doi":"10.1007/978-3-662-48899-7_3","ee":"https://doi.org/10.1007/978-3-662-48899-7_3","url":"https://dblp.org/rec/conf/lpar/KlimosK15"}, "url":"URL#3621123" }, { "@score":"1", "@id":"3621124", "info":{"authors":{"author":[{"@pid":"01/3861","text":"Cynthia Kop"},{"@pid":"77/1253-1","text":"Naoki Nishida 0001"}]},"title":"Constrained Term Rewriting tooL.","venue":"LPAR","pages":"549-557","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/Kop015","doi":"10.1007/978-3-662-48899-7_38","ee":"https://doi.org/10.1007/978-3-662-48899-7_38","url":"https://dblp.org/rec/conf/lpar/Kop015"}, "url":"URL#3621124" }, { "@score":"1", "@id":"3621127", "info":{"authors":{"author":[{"@pid":"53/9766","text":"Björn Lellmann"},{"@pid":"53/5809","text":"Elaine Pimentel"}]},"title":"Proof Search in Nested Sequent Calculi.","venue":"LPAR","pages":"558-574","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/LellmannP15","doi":"10.1007/978-3-662-48899-7_39","ee":"https://doi.org/10.1007/978-3-662-48899-7_39","url":"https://dblp.org/rec/conf/lpar/LellmannP15"}, "url":"URL#3621127" }, { "@score":"1", "@id":"3621129", "info":{"authors":{"author":[{"@pid":"78/4908","text":"Chuck C. Liang"},{"@pid":"m/DaleMiller","text":"Dale Miller 0001"}]},"title":"On Subexponentials, Synthetic Connectives, and Multi-level Delimited Control.","venue":"LPAR","pages":"297-312","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/LiangM15","doi":"10.1007/978-3-662-48899-7_21","ee":"https://doi.org/10.1007/978-3-662-48899-7_21","url":"https://dblp.org/rec/conf/lpar/LiangM15"}, "url":"URL#3621129" }, { "@score":"1", "@id":"3621130", "info":{"authors":{"author":[{"@pid":"85/828","text":"Florian Lonsing"},{"@pid":"b/FahiemBacchus","text":"Fahiem Bacchus"},{"@pid":"b/ArminBiere","text":"Armin Biere"},{"@pid":"e/UweEgly","text":"Uwe Egly"},{"@pid":"75/2935","text":"Martina Seidl"}]},"title":"Enhancing Search-Based QBF Solving by Dynamic Blocked Clause Elimination.","venue":"LPAR","pages":"418-433","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/LonsingBBES15","doi":"10.1007/978-3-662-48899-7_29","ee":"https://doi.org/10.1007/978-3-662-48899-7_29","url":"https://dblp.org/rec/conf/lpar/LonsingBBES15"}, "url":"URL#3621130" }, { "@score":"1", "@id":"3621132", "info":{"authors":{"author":[{"@pid":"m/DaleMiller","text":"Dale Miller 0001"},{"@pid":"v/MarcoVolpe","text":"Marco Volpe 0001"}]},"title":"Focused Labeled Proof Systems for Modal Logic.","venue":"LPAR","pages":"266-280","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/MillerV15","doi":"10.1007/978-3-662-48899-7_19","ee":"https://doi.org/10.1007/978-3-662-48899-7_19","url":"https://dblp.org/rec/conf/lpar/MillerV15"}, "url":"URL#3621132" }, { "@score":"1", "@id":"3621133", "info":{"authors":{"author":[{"@pid":"172/1754","text":"Shoshin Nomura"},{"@pid":"90/1289","text":"Katsuhiko Sano"},{"@pid":"23/3704","text":"Satoshi Tojo"}]},"title":"A Labelled Sequent Calculus for Intuitionistic Public Announcement Logic.","venue":"LPAR","pages":"187-202","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/NomuraST15","doi":"10.1007/978-3-662-48899-7_14","ee":"https://doi.org/10.1007/978-3-662-48899-7_14","url":"https://dblp.org/rec/conf/lpar/NomuraST15"}, "url":"URL#3621133" }, { "@score":"1", "@id":"3621135", "info":{"authors":{"author":[{"@pid":"124/5885","text":"Dan Rosén"},{"@pid":"40/7376","text":"Nicholas Smallbone"}]},"title":"TIP: Tools for Inductive Provers.","venue":"LPAR","pages":"219-232","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/RosenS15","doi":"10.1007/978-3-662-48899-7_16","ee":"https://doi.org/10.1007/978-3-662-48899-7_16","url":"https://dblp.org/rec/conf/lpar/RosenS15"}, "url":"URL#3621135" }, { "@score":"1", "@id":"3621136", "info":{"authors":{"author":[{"@pid":"132/1783","text":"Adi Sosnovich"},{"@pid":"g/OrnaGrumberg","text":"Orna Grumberg"},{"@pid":"42/5782","text":"Gabi Nakibly"}]},"title":"Analyzing Internet Routing Security Using Model Checking.","venue":"LPAR","pages":"112-129","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/SosnovichGN15","doi":"10.1007/978-3-662-48899-7_9","ee":"https://doi.org/10.1007/978-3-662-48899-7_9","url":"https://dblp.org/rec/conf/lpar/SosnovichGN15"}, "url":"URL#3621136" }, { "@score":"1", "@id":"3621137", "info":{"authors":{"author":[{"@pid":"163/2202","text":"Alexander Steen"},{"@pid":"b/CBenzmueller","text":"Christoph Benzmüller"}]},"title":"There Is No Best \\beta -Normalization Strategy for Higher-Order Reasoners.","venue":"LPAR","pages":"329-339","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/SteenB15","doi":"10.1007/978-3-662-48899-7_23","ee":"https://doi.org/10.1007/978-3-662-48899-7_23","url":"https://dblp.org/rec/conf/lpar/SteenB15"}, "url":"URL#3621137" }, { "@score":"1", "@id":"3621139", "info":{"authors":{"author":[{"@pid":"133/7828","text":"Yuya Uezato"},{"@pid":"27/2249","text":"Yasuhiko Minamide"}]},"title":"Synchronized Recursive Timed Automata.","venue":"LPAR","pages":"249-265","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/lpar/UezatoM15","doi":"10.1007/978-3-662-48899-7_18","ee":"https://doi.org/10.1007/978-3-662-48899-7_18","url":"https://dblp.org/rec/conf/lpar/UezatoM15"}, "url":"URL#3621139" }, { "@score":"1", "@id":"3670477", "info":{"authors":{"author":[{"@pid":"d/MartinDDavis","text":"Martin Davis"},{"@pid":"05/1281","text":"Ansgar Fehnker"},{"@pid":"m/AnnabelleMcIver","text":"Annabelle McIver"},{"@pid":"v/AndreiVoronkov","text":"Andrei Voronkov"}]},"title":"Logic for Programming, Artificial Intelligence, and Reasoning - 20th International Conference, LPAR-20 2015, Suva, Fiji, November 24-28, 2015, Proceedings","venue":["LPAR","Lecture Notes in Computer Science"],"volume":"9450","publisher":"Springer","year":"2015","type":"Editorship","key":"conf/lpar/2015","doi":"10.1007/978-3-662-48899-7","ee":"https://doi.org/10.1007/978-3-662-48899-7","url":"https://dblp.org/rec/conf/lpar/2015"}, "url":"URL#3670477" } ] } } } )