Livshits, B., Sridharan, M., Smaragdakis, Y., Lhoták, O., Amaral, J. N., Chang, B.-Y. E., Guyer, S. Z., Khedker, U. P.
, Møller, A. & Vardoulakis, D. (2015).
In Defense of Soundiness: A Manifesto.
Communications of the A C M,
58(2).
https://doi.org/10.1145/2644805
Andreasen, E., Feldthaus, A., Jensen, S. H., Jensen, C. S., Jonsson, P. A., Madsen, M. & Møller, A. (2012).
Improving Tools for JavaScript Programmers (Position Paper). Paper presented at International Workshop on Scripts to Programs, Beijing, China.
http://cs.au.dk/~amoeller/papers/stop/
Svendsen, K. & Birkedal, L. (2014).
Impredicative concurrent abstract predicates. In Z. Shao (Ed.),
Programming Languages and Systems: 23rd European Symposium on Programming, ESOP 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (pp. 149-168 ). Springer.
https://doi.org/10.1007/978-3-642-54833-8_9
Shaik, I., Mayer-Eichberger, V.
, van de Pol, J. & Saffidine, A. (2024).
Implicit QBF Encodings for Positional Games. In M. Hartisch, C.-H. Hsueh & J. Schaeffer (Eds.),
Advances in Computer Games - 18th International Conference, ACG 2023, Revised Selected Papers (pp. 133-145). Springer.
https://doi.org/10.1007/978-3-031-54968-7_12
Bhargavan, K., Buyse, M., Franceschino, L.
, Hansen, L. L., Kiefer, F., Schneider-Bensch, J.
& Spitters, B. (2025).
hax: Verifying Security-Critical Rust Software Using Multiple Provers. In J. Protzenko & A. Raad (Eds.),
Verified Software. Theories, Tools and Experiments - 16th International Conference, VSTTE 2024, Revised Selected Papers (pp. 96-119). Springer.
https://doi.org/10.1007/978-3-031-86695-1_7
Bizjak, A., Grathwohl, H. B., Clouston, R., Møgelberg, R. E.
& Birkedal, L. (2016).
Guarded dependent type theory with coinductive types. In B. Jacobs & C. Löding (Eds.),
Foundations of Software Science and Computation Structures: 19th International Conference, FOSSACS 2016 (Vol. 9634, pp. 20-35). Springer VS.
https://doi.org/10.1007/978-3-662-49630-5_2
Birkedal, L., Bizjak, A., Clouston, R., Grathwohl, H. B., Spitters, B. & Vezzosi, A. (2016).
Guarded Cubical Type Theory: Path Equality for Guarded Recursion. In J.-M. Talbot & L. Regnier (Eds.),
CSL 2016: 25th EACSL Annual Conference on Computer Science Logic (pp. 1 - 17)
Birkedal, L., Bizjak, A., Clouston, R., Grathwohl, H. B., Spitters, B. & Vezzosi, A. (2016, Aug 1).
Guarded Cubical Type Theory.
https://doi.org/10.4230/LIPIcs.CSL.2016.23
Birkedal, L., Bizjak, A., Clouston, R., Grathwohl, H. B., Spitters, B. & Vezzosi, A. (2019).
Guarded Cubical Type Theory.
Journal of Automated Reasoning,
63(2), 211-253.
https://doi.org/10.1007/s10817-018-9471-7,
https://doi.org/10.1007/s10817-018-9471-7
Birkedal, L., Bizjak, A., Clouston, R., Grathwohl, H. B., Spitters, B. & Vezzosi, A. (2016).
Guarded cubical type theory. Abstract from 22nd International Conference on Types for Proofs and Programs, Novi Sad, Serbia.
http://www.cs.au.dk/~spitters/TYPES16.pdf
Mehnert, H.
, Sieczkowski, F., Birkedal, L. & Sestoft, P. (2012).
Formalized verification of snapshotable trees: Separation and sharing. In R. Joshi, P. Müller & A. Podelski (Eds.),
Verified Software: Theories, Tools, Experiments: 4th International Conference, VSTTE 2012, Philadelphia, PA, USA, January 28-29, 2012. Proceedings (pp. 179-195). Springer.
https://doi.org/10.1007/978-3-642-27705-4_15
Brendborg, J.
, Karras, P., Pavlogiannis, A., Rasmussen, A. U. & Tkadlec, J. (2022).
Fixation Maximization in the Positional Moran Process.
Proceedings of the AAAI Conference on Artificial Intelligence,
36(9, AAAI Technical Track on Multiagent Systems), 9304-9312.
https://doi.org/10.1609/aaai.v36i9.21160