Theorem proving in a mathematical information environment

被引:0
|
作者
Yu. V. Kapitonova
A. A. Letichevskii
机构
来源
关键词
Theorem Prove; Constraint System; Entailment Relation; Mathematical Text; Artificial Theoretician;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:481 / 488
页数:7
相关论文
共 50 条
  • [1] Theorem proving in a mathematical information environment
    Kapitonova, YV
    Letichevskii, AA
    CYBERNETICS AND SYSTEMS ANALYSIS, 1998, 34 (04) : 481 - 488
  • [2] Using GXWeb for Theorem Proving and Mathematical Modelling
    Todd, Philip
    Aley, Danny
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2023, 398 : 38 - 42
  • [3] Combining theorem proving and symbolic mathematical computing
    Homann, K
    Calmet, J
    INTEGRATING SYMBOLIC MATHEMATICAL COMPUTATION AND ARTIFICIAL INTELLIGENCE, 1995, 958 : 18 - 29
  • [4] Bridging theorem proving and mathematical knowledge retrieval
    Benzmüller, C
    Meier, A
    Sorge, V
    MECHANIZING MATHEMATICAL REASONING: ESSAYS IN HONOUR OF JORG H SIEKMANN ON THE OCCASION OF HIS 60TH BIRTHDAY, 2005, 2605 : 277 - 296
  • [5] A dynamic geometry environment for learning theorem proving
    Wong, WK
    Chan, BY
    Yin, SK
    5th IEEE International Conference on Advanced Learning Technologies, Proceedings, 2005, : 15 - 17
  • [6] How to Recognize Artificial Mathematical Intelligence in Theorem Proving
    Pantsar, Markus
    TOPOI-AN INTERNATIONAL REVIEW OF PHILOSOPHY, 2025,
  • [7] An Exercise in Mathematical Engineering: Stating and Proving Kuratowski Theorem
    Abrial, Jean-Raymond
    THEORETICAL ASPECTS OF COMPUTING - ICTAC 2015, 2015, 9399 : 3 - 27
  • [8] Evaluation of Automated Theorem Proving on the Mizar Mathematical Library
    Urban, Josef
    Hoder, Krystof
    Voronkov, Andrei
    MATHEMATICAL SOFTWARE - ICMS 2010, 2010, 6327 : 155 - +
  • [9] Combining theorem proving and trajectory evaluation in an industrial environment
    Aagaard, MD
    Jones, RB
    Seger, CJH
    1998 DESIGN AUTOMATION CONFERENCE, PROCEEDINGS, 1998, : 538 - 541
  • [10] A theorem proving approach to analysis of secure information flow
    Darvas, A
    Hähnle, R
    Sands, D
    SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2005, 3450 : 193 - 209