Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3154457

zbMath1063.68500MaRDI QIDQ3154457

Donald Mackenzie

Publication date: 14 January 2005


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.


Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (28)

Computing and the cultures of provingPanelist position statement: logic and models in computer scienceMATHEMATICAL INFERENCE AND LOGICAL INFERENCEComputer assisted reasoning. A Festschrift for Michael J. C. GordonLakatos-style collaborative mathematics through dialectical, structured and abstract argumentationCritical sets for Sudoku and general graph coloringsChecking ProofsThe Parallel Structure of Mathematical ReasoningEnabling mathematical cultures: introductionWhen Logic Meets Engineering: Introduction to Logical Issues in the History and Philosophy of Computer ScienceRecent progress towards Hadwiger's conjectureOn a generalization of ``eight blocks to madness puzzleUsing formal methods with SysML in aerospace design and engineeringAutomated theorem provers: a practical tool for the working mathematician?Can strategizing in round-robin subtournaments be avoided?History of mathematics: a global cultural approach. Abstracts from the workshop held December 13--19, 2020 (online meeting)Integrating searching and authoring in MizarAn independence relation for sets of secretsWhy do informal proofs conform to formal norms?Mathematics and argumentationLogic of secrets in collaboration networksAssembling a prehistory for formal methods: a personal viewMilestones from the Pure Lisp Theorem Prover to ACL2An Independence Relation for Sets of SecretsMechanized metatheory revisitedOperating system verification---an overviewThe halting problem and security’s language-theoretic approach: Praise and criticism from a technical historianProof Auditing Formalised Mathematics




This page was built for publication: