{"id":"https://openalex.org/W4387007350","doi":"https://doi.org/10.1145/3603165.3607415","title":"Course Design and Tool Development for Functional Programming Integrating with Program Verification: from the Perspective of the Interactive Theorem Prover","display_name":"Course Design and Tool Development for Functional Programming Integrating with Program Verification: from the Perspective of the Interactive Theorem Prover","publication_year":2023,"publication_date":"2023-07-28","ids":{"openalex":"https://openalex.org/W4387007350","doi":"https://doi.org/10.1145/3603165.3607415"},"language":"en","primary_location":{"id":"doi:10.1145/3603165.3607415","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603165.3607415","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Turing Award Celebration Conference - China 2023","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101745869","display_name":"Haipeng Qu","orcid":"https://orcid.org/0000-0002-1564-8980"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haipeng Qu","raw_affiliation_strings":["Ocean University of China, China"],"affiliations":[{"raw_affiliation_string":"Ocean University of China, China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002179505","display_name":"Y Yibin Hou","orcid":"https://orcid.org/0009-0005-6868-1011"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaojun Hou","raw_affiliation_strings":["Ocean University of China, China"],"affiliations":[{"raw_affiliation_string":"Ocean University of China, China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092933577","display_name":"Rongqian Zhou","orcid":"https://orcid.org/0009-0000-3618-8357"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongqian Zhou","raw_affiliation_strings":["Ocean University of China, China"],"affiliations":[{"raw_affiliation_string":"Ocean University of China, China","institution_ids":["https://openalex.org/I59028903"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101745869"],"corresponding_institution_ids":["https://openalex.org/I59028903"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11916947,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"94","last_page":"95"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7601538896560669},{"id":"https://openalex.org/keywords/functional-programming","display_name":"Functional programming","score":0.6680815815925598},{"id":"https://openalex.org/keywords/programming-paradigm","display_name":"Programming paradigm","score":0.516985297203064},{"id":"https://openalex.org/keywords/programming-language-theory","display_name":"Programming language theory","score":0.5125651359558105},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.48874664306640625},{"id":"https://openalex.org/keywords/inductive-programming","display_name":"Inductive programming","score":0.4653525948524475},{"id":"https://openalex.org/keywords/comprehension","display_name":"Comprehension","score":0.4523310959339142},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.44246500730514526},{"id":"https://openalex.org/keywords/automated-theorem-proving","display_name":"Automated theorem proving","score":0.42873457074165344},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4227582812309265},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10417219996452332}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7601538896560669},{"id":"https://openalex.org/C42383842","wikidata":"https://www.wikidata.org/wiki/Q193076","display_name":"Functional programming","level":2,"score":0.6680815815925598},{"id":"https://openalex.org/C34165917","wikidata":"https://www.wikidata.org/wiki/Q188267","display_name":"Programming paradigm","level":2,"score":0.516985297203064},{"id":"https://openalex.org/C18701968","wikidata":"https://www.wikidata.org/wiki/Q2670534","display_name":"Programming language theory","level":4,"score":0.5125651359558105},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.48874664306640625},{"id":"https://openalex.org/C50033165","wikidata":"https://www.wikidata.org/wiki/Q15712089","display_name":"Inductive programming","level":3,"score":0.4653525948524475},{"id":"https://openalex.org/C511192102","wikidata":"https://www.wikidata.org/wiki/Q5156948","display_name":"Comprehension","level":2,"score":0.4523310959339142},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.44246500730514526},{"id":"https://openalex.org/C206880738","wikidata":"https://www.wikidata.org/wiki/Q431667","display_name":"Automated theorem proving","level":2,"score":0.42873457074165344},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4227582812309265},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10417219996452332}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3603165.3607415","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603165.3607415","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Turing Award Celebration Conference - China 2023","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5799999833106995,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2089241138","https://openalex.org/W2103628211","https://openalex.org/W2144752539","https://openalex.org/W3161373887"],"related_works":["https://openalex.org/W4296878212","https://openalex.org/W1988194486","https://openalex.org/W1585224757","https://openalex.org/W2169841379","https://openalex.org/W2120434415","https://openalex.org/W2019852727","https://openalex.org/W2172209430","https://openalex.org/W2094055450","https://openalex.org/W1973795410","https://openalex.org/W2026235588"],"abstract_inverted_index":{"Functional":[0],"programming,":[1],"as":[2],"a":[3,65,128,134,151],"highly":[4],"reliable":[5],"programming":[6,40,91,130,163],"paradigm,":[7],"was":[8,17],"once":[9],"valued":[10],"in":[11,20,45,53],"the":[12,30,70,139,155],"last":[13],"century,":[14],"but":[15,69],"it":[16],"not":[18],"popularized":[19],"education":[21],"and":[22,36,74,81,85,103,119,132,144],"practical":[23,104],"applications.":[24],"In":[25,123],"recent":[26],"years,":[27],"due":[28],"to":[29,61,99,109,115,137,165],"increase":[31],"of":[32,50,87,141,154],"security-critical":[33],"information":[34,37],"infrastructure":[35],"systems,":[38],"functional":[39,90,121,129,162],"has":[41],"been":[42],"widely":[43,97],"used":[44],"key":[46],"areas":[47],"by":[48],"virtue":[49],"its":[51],"advantages":[52],"program":[54],"verification.":[55],"There":[56],"is":[57,96],"an":[58],"urgent":[59],"need":[60],"provide":[62],"students":[63,117,149],"with":[64,93,168],"supportive":[66],"learning":[67,72,84],"environment,":[68],"steep":[71],"curve":[73],"immature":[75],"ecosystem":[76],"can":[77,159],"present":[78],"certain":[79],"limitations":[80],"challenges":[82],"for":[83,101],"practice":[86],"students.":[88],"Combining":[89],"languages":[92,164],"concrete":[94],"tools":[95],"believed":[98],"allow":[100],"quick":[102],"learning,":[105],"so":[106],"we":[107,126],"chose":[108],"utilize":[110],"Interactive":[111],"Theorem":[112],"Provers":[113],"(ITPs)":[114],"help":[116],"understand":[118],"apply":[120],"programming.":[122],"this":[124],"poster,":[125],"design":[127],"course":[131],"develop":[133],"tool":[135],"FPAid":[136],"relieve":[138],"difficulty":[140],"getting":[142],"started":[143],"improving":[145],"teaching":[146,156],"method.":[147],"While":[148],"have":[150],"better":[152],"comprehension":[153],"content,":[157],"they":[158],"also":[160],"use":[161],"solve":[166],"problems":[167],"high":[169],"quality.":[170]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
