Disguising recursively chained rewrite rules as equational theorems, as implemented in the prover EFTTP mark 2

M. Randall Holmes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Original languageEnglish
Title of host publicationRewriting Techniques and Applications - 6th Intemational Conference, RTA 1995, Proceedings
EditorsJieh Hsiang
PublisherSpringer Verlag
Pages432-437
Number of pages6
ISBN (Print)9783540592006
DOIs
StatePublished - 1995
Event6th International Conference on Rewriting Techniques and Applications, RTA 1995 - Kaiserslautern, Germany
Duration: 5 Apr 19957 Apr 1995

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume914
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Rewriting Techniques and Applications, RTA 1995
Country/TerritoryGermany
CityKaiserslautern
Period5/04/957/04/95

Fingerprint

Dive into the research topics of 'Disguising recursively chained rewrite rules as equational theorems, as implemented in the prover EFTTP mark 2'. Together they form a unique fingerprint.

Cite this