An Iterative Fixpoint Semantics for MKNF Hybrid Knowledge Bases with Function Symbols. | 0 | 0.34 | 2022 |
Probabilistic Inductive Constraint Logic | 1 | 0.35 | 2021 |
MAP Inference for Probabilistic Logic Programming | 1 | 0.35 | 2020 |
Dischargeable Obligations In The Sciff Framework | 0 | 0.34 | 2020 |
Accountable Protocols in Abductive Logic Programming. | 2 | 0.39 | 2018 |
Dischargeable Obligations In Abductive Logic Programming | 0 | 0.34 | 2017 |
Cplint On Swish: Probabilistic Logical Inference With A Web Browser | 5 | 0.39 | 2017 |
Iterated Fixpoint Well-Founded Semantics for Hybrid Knowledge Bases. | 0 | 0.34 | 2017 |
Probabilistic Logical Inference on the Web. | 1 | 0.35 | 2016 |
Probabilistic Hybrid Knowledge Bases Under the Distribution Semantics. | 0 | 0.34 | 2016 |
Probabilistic Logic Programming for Natural Language Processing. | 0 | 0.34 | 2016 |
Probabilistic Constraint Logic Theories. | 1 | 0.38 | 2016 |
A spatial agent-based model for assessing strategies of adaptation to climate and tourism demand changes in an alpine tourism destination | 9 | 0.60 | 2013 |
Normative systems require hybrid knowledge bases | 5 | 0.40 | 2012 |
Deon+: abduction and constraints for normative reasoning | 4 | 0.40 | 2012 |
Normative systems require hybrid knowledge bases | 0 | 0.34 | 2012 |
Learning Specifications Of Interaction Protocols And Business Processes And Proving Their Properties | 0 | 0.34 | 2011 |
The CHR-based Implementation of the SCIFF Abductive System | 4 | 0.46 | 2011 |
Observation strategies for event detection with incidence on runtime verification: theory, algorithms, experimentation | 1 | 0.36 | 2011 |
A Computational Logic Application Framework for Service Discovery and Contracting | 5 | 0.42 | 2011 |
NO Revision and NO Contraction | 4 | 0.41 | 2011 |
Normative systems represented as hybrid knowledge bases | 19 | 0.92 | 2011 |
Runtime Addition of Integrity Constraints in SCIFF. | 1 | 0.35 | 2010 |
Abductive Logic Programming as an Effective Technology for the Static Verification of Declarative Business Processes | 8 | 0.51 | 2010 |
Observation Strategies for Event Detection, with Incidence on Runtime Verification | 0 | 0.34 | 2010 |
RUNTIME ADDITION OF INTEGRITY CONSTRAINS IN AN ABDUCTIVE PROOF PROCEDURE | 0 | 0.34 | 2010 |
Integrating Abductive Logic Programming and Description Logics in a Dynamic Contracting Architecture | 8 | 0.46 | 2009 |
Integration of Abductive Reasoning and Constraint Optimization in SCIFF | 5 | 0.38 | 2009 |
Integrating Abduction and Constraint Optimization in Constraint Handling Rules | 3 | 0.39 | 2008 |
Exploiting Semantic Technology in Computational Logic-based Service Contracting | 1 | 0.36 | 2008 |
Verification from Declarative Specifications Using Logic Programming | 16 | 0.78 | 2008 |
Verifiable agent interaction in abductive logic programming: The SCIFF framework | 100 | 2.83 | 2008 |
A rule-based approach for reasoning about collaboration between smart web services | 1 | 0.35 | 2007 |
Specification and verification of agent interaction protocols in a logic-based system | 43 | 2.01 | 2007 |
Web Service Contracting: Specification and Reasoning with SCIFF | 8 | 0.53 | 2007 |
Mapping deontic operators to abductive expectations | 27 | 0.98 | 2006 |
Computational logic for run-time verification of web services choreographies: exploiting the SOCS-SI tool | 8 | 0.55 | 2006 |
Policy-based Reasoning for Smart Web Service Interaction | 1 | 0.38 | 2006 |
A verifiable logic-based agent architecture | 0 | 0.34 | 2006 |
An abductive framework for a-priori verification of web services | 22 | 0.82 | 2006 |
Compliance verification of agent interaction: a logic-based software tool | 44 | 1.83 | 2006 |
The SCIFF abductive proof-procedure | 22 | 0.93 | 2005 |
Protocol Specification and Verification by Using Computational Logic | 2 | 0.39 | 2005 |
Abduction with hypotheses confirmation | 5 | 0.48 | 2005 |
The computational behaviour of the SCIFF abductive proof procedure and the SOCS-SI system | 3 | 0.43 | 2005 |
Security protocols verification in abductive logic programming: a case study | 10 | 0.57 | 2005 |
Expressing interaction in combinatorial auction through social integrity constraints. | 1 | 0.36 | 2005 |
Specification and Verification of Agent Interaction Using Abductive Reasoning (Tutorial Paper) | 3 | 0.37 | 2005 |
The CHR-based Implementation of a System for Generation and Confirmation of Hypotheses | 11 | 0.56 | 2005 |
A CHR-based implementation of known arc-consistency | 5 | 0.44 | 2004 |