General Formal Ontology (GFO): A foundational ontology for conceptual modelling

H Herre - Theory and applications of ontology: computer …, 2010 - Springer
The current chapter presents an overview about the current stage of the foundational
ontology GFO. GFO (General Formal Ontology). GFO is a foundational ontology integrating …

Topological Quantum Gates in Homotopy Type Theory

DJ Myers, H Sati, U Schreiber - Communications in Mathematical Physics, 2024 - Springer
Despite the plausible necessity of topological protection for realizing scalable quantum
computers, the conceptual underpinnings of topological quantum logic gates had arguably …

Proofs of randomized algorithms in Coq

P Audebaud, C Paulin-Mohring - Science of Computer Programming, 2009 - Elsevier
Randomized algorithms are widely used for finding efficiently approximated solutions to
complex problems, for instance primality testing and for obtaining good average behavior …

Parameterized complexity for uniform operators on multidimensional analytic functions and ODE solving

A Kawamura, F Steinberg, H Thies - International Workshop on Logic …, 2018 - Springer
Real complexity theory is a resource-bounded refinement of computable analysis and
provides a realistic notion of running time of computations over real numbers, sequences …

Minlog-a tool for program extraction supporting algebras and coalgebras

U Berger, K Miyamoto, H Schwichtenberg… - … Conference on Algebra …, 2011 - Springer
Minlog is an interactive system which implements proof-theoretic methods and applies them
to verification and program extraction. We give an overview of Minlog and demonstrate how …

From coinductive proofs to exact real arithmetic

U Berger - Computer Science Logic: 23rd international Workshop …, 2009 - Springer
We give a coinductive characterization of the set of continuous functions defined on a
compact real interval, and extract certified programs that construct and combine exact real …

Lambda obfuscation

P Lan, P Wang, S Wang, D Wu - … Conference on Security and Privacy in …, 2017 - Springer
With the rise of increasingly advanced reverse engineering technique, especially more
scalable symbolic execution tools, software obfuscation faces great challenges. Branch …

From coinductive proofs to exact real arithmetic: theory and applications

U Berger - Logical Methods in Computer Science, 2011 - lmcs.episciences.org
Based on a new coinductive characterization of continuous functions we extract certified
programs for exact real number computation from constructive proofs. The extracted …

Proofs, programs, processes

U Berger, M Seisenberger - Theory of Computing Systems, 2012 - Springer
The objective of this paper is to provide a theoretical foundation for program extraction from
inductive and coinductive proofs geared to practical applications. The novelties consist in …

Doubly efficient interactive proofs over infinite and non-commutative rings

E Soria-Vazquez - Theory of Cryptography Conference, 2022 - Springer
We introduce the first proof system for layered arithmetic circuits over an arbitrary ring R that
is (possibly) non-commutative and (possibly) infinite, while only requiring black-box access …