Skip to main content
Log in

Predicate logic hacker tricks

  • Problem Corner
  • Published:
Journal of Automated Reasoning Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Andrews, P. B., Miller, D., Cohen, E. L., and Pfennig, F., Automating Higher-order Logic, Contemporary Mathematics, Vol. 29 (1984).

  2. Green, C., ‘Theorem-proving by resolution as a basis for question-answering systems’, Machine Intelligence Vol. 4, American Elsevier, New York, pp. 183–205, (1969).

    Google Scholar 

  3. Huet, Gérard P. ‘A mechanization of type theory’, Proc. 3rd IJCAI, pp 139–146 (1973).

  4. Huet, Gérard P., ‘A unification algorithm for typed λ-calculus’, Theoretical Computer Science 1 27–57 (1975).

    Google Scholar 

  5. Mayer, McRobbie and Thistlewait, ‘Nonclassical Logics for Automated Theorem Proving’ Australian National University, Canberra (1985) (to be published).

    Google Scholar 

  6. Karl Mark G. Raph, ‘The Markgraf Karl refutation procedure’, Research Report, FB. Informatik, University of Kaiserslautern (1984).

  7. Pietrykowski, T. and Jensen, D. C., ‘A complete mechanization of second-order type theory’, JACM 20, 333–364 (1973).

    CAS  PubMed  Google Scholar 

  8. Smullyan, R., ‘What is the Name of this Book?’, Prentice-Hall, Englewood Cliffs, New Jersey (1978).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ohlbach, H.J. Predicate logic hacker tricks. J Autom Reasoning 1, 435–440 (1985). https://doi.org/10.1007/BF00244279

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF00244279

Keywords

Navigation