h1

h2

h3

h4

h5
h6
001028153 001__ 1028153
001028153 005__ 20260313144443.0
001028153 0247_ $$2ISBN$$a978-3-95977-372-0
001028153 0247_ $$2ISSN$$a1868-8969
001028153 0247_ $$2SCOPUS$$aSCOPUS:2-s2.0-105009915745
001028153 0247_ $$2doi$$a10.4230/LIPIcs.ICALP.2025.157
001028153 0247_ $$2datacite_doi$$a10.18154/RWTH-2026-01495
001028153 037__ $$aRWTH-2026-01495
001028153 041__ $$aEnglish
001028153 1001_ $$0P:(DE-82)IDM05193$$aGehnen, Christina$$b0$$eCorresponding author$$urwth
001028153 1112_ $$a52. International Colloquium on Automata, Languages, and Programming$$cAarhus$$d2025-07-08 - 2025-07-11$$gICALP 2025$$wDenmark
001028153 245__ $$aBayesian Inference in Quantum Programs$$honline
001028153 260__ $$aWadern$$bSchloss Dagstuhl - Leibniz-Zentrum für Informatik GmbH$$c2025
001028153 29510 $$a52nd International Colloquium on Automata, Languages, and Programming : ICALP 2025, July 8–11, 2025, Aarhus, Denmark / edited by Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, Gabriele Puppis
001028153 300__ $$a157:1-157:18
001028153 3367_ $$033$$2EndNote$$aConference Paper
001028153 3367_ $$0PUB:(DE-HGF)7$$2PUB:(DE-HGF)$$aContribution to a book$$mcontb
001028153 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings$$bcontrib$$mcontrib
001028153 3367_ $$2BibTeX$$aINPROCEEDINGS
001028153 3367_ $$2DRIVER$$aconferenceObject
001028153 3367_ $$2DataCite$$aOutput Types/Conference Paper
001028153 3367_ $$2ORCID$$aCONFERENCE_PAPER
001028153 4900_ $$aLIPIcs - Leibniz international proceedings in informatics$$v334
001028153 536__ $$0G:(EU-Grant)819317$$aCerQuS - Certified Quantum Security (819317)$$c819317$$fERC-2018-COG$$x0
001028153 588__ $$aDataset connected to DataCite
001028153 591__ $$aGermany
001028153 650_7 $$2Other$$aBayesian Inference
001028153 650_7 $$2Other$$aProgram Semantics
001028153 650_7 $$2Other$$aQuantum Program Logics
001028153 650_7 $$2Other$$aTheory of computation → Logic and verification
001028153 650_7 $$2Other$$aTheory of computation → Program semantics
001028153 650_7 $$2Other$$aTheory of computation → Quantum information theory
001028153 650_7 $$2Other$$aWeakest Preconditions
001028153 7001_ $$0P:(DE-82)IDM06461$$aUnruh, Dominique$$b1$$urwth
001028153 7001_ $$0P:(DE-82)IDM00048$$aKatoen, Joost-Pieter$$b2$$urwth
001028153 8564_ $$uhttps://publications.rwth-aachen.de/record/1028153/files/1028153.pdf$$yOpenAccess
001028153 909CO $$ooai:publications.rwth-aachen.de:1028153$$pdnbdelivery$$pec_fundedresources$$pVDB$$pdriver$$popen_access$$popenaire
001028153 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM05193$$aRWTH Aachen$$b0$$kRWTH
001028153 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM06461$$aRWTH Aachen$$b1$$kRWTH
001028153 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM00048$$aRWTH Aachen$$b2$$kRWTH
001028153 9141_ $$y2025
001028153 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0
001028153 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess
001028153 915__ $$0LIC:(DE-HGF)CCBY4$$2HGFVOC$$aCreative Commons Attribution CC BY 4.0
001028153 9201_ $$0I:(DE-82)121310_20140620$$k121310$$lLehrstuhl für Softwaremodellierung und Verifikation (Informatik 2)$$x0
001028153 9201_ $$0I:(DE-82)125910_20230816$$k125910$$lLehrstuhl für Quanteninformationssysteme (Informatik 15)$$x1
001028153 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x2
001028153 961__ $$c2026-02-06T10:58:18.723938$$x2026-02-06T10:54:22.257354$$z2026-02-09
001028153 980__ $$aI:(DE-82)120000_20140620
001028153 980__ $$aI:(DE-82)121310_20140620
001028153 980__ $$aI:(DE-82)125910_20230816
001028153 980__ $$aUNRESTRICTED
001028153 980__ $$aVDB
001028153 980__ $$acontb
001028153 980__ $$acontrib
001028153 9801_ $$aFullTexts