Nome |
# |
Abductive Logic Programming for Normative Reasoning and Ontologies, file e309ade0-e264-3969-e053-3a05fe0a2c94
|
151
|
A network model for routing-fault-free wavelength selection in WRONoCs design, file e309ade1-ba28-3969-e053-3a05fe0a2c94
|
149
|
Logic programming approaches for routing fault-free and maximally parallel wavelength-routed optical networks-on-chip (Application paper), file e309ade1-7f82-3969-e053-3a05fe0a2c94
|
71
|
An ASP approach for the valves positioning optimization in a water distribution system, file e309ade2-e976-3969-e053-3a05fe0a2c94
|
63
|
Improved filtering for the Euclidean Traveling Salesperson Problem in CLP(FD), file e309ade2-ab1d-3969-e053-3a05fe0a2c94
|
53
|
An Abductive Framework for Datalog± Ontologies, file e309ade0-8be0-3969-e053-3a05fe0a2c94
|
51
|
Abductive logic programming for Datalog+/- ontologies, file e309ade0-9b21-3969-e053-3a05fe0a2c94
|
47
|
Evaluating Compliance: From LTL to Abductive Logic Programming, file e309ade2-e364-3969-e053-3a05fe0a2c94
|
46
|
Special Issue on the Italian Conference on Computational Logic: CILC 2009. Preface, file e309ade0-3ce2-3969-e053-3a05fe0a2c94
|
42
|
Expressing and Verifying Business Contracts with Abductive Logic Programming, file e309ade0-d23d-3969-e053-3a05fe0a2c94
|
42
|
Accountable protocols in abductive logic programming, file e309ade3-08d6-3969-e053-3a05fe0a2c94
|
40
|
Accountable protocols in abductive logic programming (extended abstract), file e309ade4-7ae0-3969-e053-3a05fe0a2c94
|
39
|
Reasoning on Datalog± Ontologies with Abductive Logic Programming, file e309ade2-e8ab-3969-e053-3a05fe0a2c94
|
25
|
Visual Decision Support for Policy Making: Advancing Policy Analysis with Visualization, file e309ade0-7aa6-3969-e053-3a05fe0a2c94
|
23
|
Simulation of incentive mechanisms for renewable energy policies, file e309ade0-8e2f-3969-e053-3a05fe0a2c94
|
21
|
Mapping deontic operators to abductive expectations, file e309ade0-d240-3969-e053-3a05fe0a2c94
|
21
|
Branching interval algebra: An almost complete picture, file e309ade5-16ed-3969-e053-3a05fe0a2c94
|
16
|
An ASP Approach for the Valves Positioning Optimization in a Water Distribution System, file e309ade0-39a3-3969-e053-3a05fe0a2c94
|
14
|
Dischargeable Obligations in the ScIFF Framework, file 6dc7bb42-0af1-4446-b75c-bf3ddf150d70
|
13
|
Improving Quality and Efficiency in Home Health Care: an application of Constraint Logic Programming for the Ferrara NHS unit, file e309ade0-39a4-3969-e053-3a05fe0a2c94
|
13
|
Reasoning on Datalog± Ontologies with Abductive Logic Programming, file e309ade1-b3c5-3969-e053-3a05fe0a2c94
|
12
|
Dischargeable Obligations in the ScIFF Framework, file e309ade4-b2cf-3969-e053-3a05fe0a2c94
|
12
|
A Social ACL Semantics by Deontic Constraints, file e309ade4-ff6e-3969-e053-3a05fe0a2c94
|
12
|
Optimal Placement of Valves in a Water Distribution Network with CLP(FD), file e309ade5-539a-3969-e053-3a05fe0a2c94
|
12
|
Evaluating compliance: from LTL to abductive logic programming, file e309ade0-91a3-3969-e053-3a05fe0a2c94
|
11
|
Improved filtering for the Euclidean Traveling Salesperson Problem in CLP(FD), file e309ade2-7fdf-3969-e053-3a05fe0a2c94
|
11
|
Improving the efficiency of euclidean TSP solving in constraint programming by predicting effective nocrossing constraints, file e309ade3-7af0-3969-e053-3a05fe0a2c94
|
11
|
Computational logic for run-time verification of web service choreographies: exploiting the SOCS-SI tool, file e309ade1-7eb9-3969-e053-3a05fe0a2c94
|
10
|
The horn fragment of branching algebra, file e309ade2-c36e-3969-e053-3a05fe0a2c94
|
10
|
Near-optimal scheduling of device activation in water distribution systems to reduce the impact of a contamination event, file e309ade5-6285-3969-e053-3a05fe0a2c94
|
10
|
Modeling Interactions Using Social Integrity Constraints: A Resource Sharing Case Study, file e309ade0-e4b3-3969-e053-3a05fe0a2c94
|
9
|
A Bilevel Mixed Integer Linear Programming Model for Valves Location in Water Distribution Systems, file e309ade5-663a-3969-e053-3a05fe0a2c94
|
9
|
A Mechatronic Cardiovascular Simulation System for Jugular Venous Echo-Doppler Training, file 6da3bacf-745f-4846-8da8-58a7c28b39b4
|
8
|
A Verifiable Logic-Based Agent Architecture, file e309ade0-e245-3969-e053-3a05fe0a2c94
|
8
|
Declarative and Mathematical Programming approaches to Decision Support Systems for food recycling, file e309ade2-b9a2-3969-e053-3a05fe0a2c94
|
8
|
On (maximal, tractable) fragments of the branching algebra?, file e309ade3-7749-3969-e053-3a05fe0a2c94
|
8
|
A Decomposition Approach to the Clinical Pathway Deployment for Chronic Outpatients with Comorbidities, file e309ade4-837b-3969-e053-3a05fe0a2c94
|
8
|
The horn fragment of branching algebra, file e309ade2-afb3-3969-e053-3a05fe0a2c94
|
7
|
Deciding the consistency of branching time interval networks, file e309ade5-7b0a-3969-e053-3a05fe0a2c94
|
7
|
A Computational Logic Application Framework for Service Discovery and Contracting, file e309ade0-3396-3969-e053-3a05fe0a2c94
|
6
|
A Rule-Based Approach for Reasoning About Collaboration Between Smart Web Services, file e309ade0-b9bf-3969-e053-3a05fe0a2c94
|
6
|
Integrating Abductive Logic Programming and Description Logics in a Dynamic Contracting Architecture, file e309ade0-e181-3969-e053-3a05fe0a2c94
|
6
|
The CHR-based Implementation of the SCIFF Abductive System, file e309ade0-e185-3969-e053-3a05fe0a2c94
|
6
|
An Application of Fuzzy Logic to Strategic Environmental Assessment, file e309ade4-f904-3969-e053-3a05fe0a2c94
|
6
|
Learning specifications of interaction protocols and business processes and proving their properties, file e309ade0-2747-3969-e053-3a05fe0a2c94
|
5
|
An application of constraint solving for home health care, file e309ade0-4234-3969-e053-3a05fe0a2c94
|
5
|
The Isolation System Design in Hydraulic Networks, file e309ade0-8c5a-3969-e053-3a05fe0a2c94
|
5
|
Improving the Efficiency of Euclidean TSP Solving in Constraint Programming by Predicting Effective Nocrossing Constraints, file e309ade4-75b0-3969-e053-3a05fe0a2c94
|
5
|
RCRA 2008 Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion, file e309ade4-c5b3-3969-e053-3a05fe0a2c94
|
5
|
A Decomposition Approach to the Clinical Pathway Deployment for Chronic Outpatients with Comorbidities, file 9b6483dd-4d4c-43e3-8272-a92130473ad1
|
4
|
Preface to RCRA 2008 Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion, file e309ade0-3576-3969-e053-3a05fe0a2c94
|
4
|
An ASP approach for the valves positioning optimization in a water distribution system, file e309ade0-4c38-3969-e053-3a05fe0a2c94
|
4
|
Integration of abductive reasoning and constraint optimization in SCIFF, file e309ade0-e7a8-3969-e053-3a05fe0a2c94
|
4
|
SLDNF-Draw: Visualization of Prolog operational semantics in LaTeX, file e309ade1-5054-3969-e053-3a05fe0a2c94
|
4
|
The ICLP 2013 Doctoral Consortium, file e309ade1-5ead-3969-e053-3a05fe0a2c94
|
4
|
Accountable protocols in abductive logic programming, file e309ade1-ce49-3969-e053-3a05fe0a2c94
|
4
|
A network model for routing-fault-free wavelength selection in WRONoCs design, file e309ade2-e30f-3969-e053-3a05fe0a2c94
|
4
|
Declarative and Mathematical Programming approaches to Decision Support Systems for food recycling, file 52c5ce22-5c1c-4cb3-8165-aef1cb568f9c
|
3
|
Verification from declarative specifications using logic programming, file e309ade0-297f-3969-e053-3a05fe0a2c94
|
3
|
null, file e309ade0-421c-3969-e053-3a05fe0a2c94
|
3
|
Scheduling countermeasures to contamination events by genetic algorithms, file e309ade0-4c4f-3969-e053-3a05fe0a2c94
|
3
|
A CHR-based implementation of known arc-consistency, file e309ade0-de78-3969-e053-3a05fe0a2c94
|
3
|
null, file e309ade0-df53-3969-e053-3a05fe0a2c94
|
3
|
A logic-based approach to interaction design in open multi-agent systems, file e309ade0-e45a-3969-e053-3a05fe0a2c94
|
3
|
Design technology for fault-free and maximally-parallel wavelength-routed optical networks-on-chip, file e309ade1-0a41-3969-e053-3a05fe0a2c94
|
3
|
Deciding the consistency of branching time interval networks, file e309ade1-f253-3969-e053-3a05fe0a2c94
|
3
|
Nonground Abductive Logic Programming with Probabilistic Integrity Constraints, file 465ca7e7-1d81-4696-bef9-31f62689790e
|
2
|
Nonground Abductive Logic Programming with Probabilistic Integrity Constraints, file 61e0a1ce-44ec-4ed5-97a1-a128c510011e
|
2
|
Comparing Emotion and Sentiment Analysis Tools on Italian anti-vaccination for COVID-19 posts, file 6d35e358-d6de-4e81-b837-3d57582041fe
|
2
|
Modeling opinion polarization on social media: Application to Covid-19 vaccination hesitancy in Italy, file 7295f105-bced-4fb8-9f16-4cd4987970a3
|
2
|
Expressing and Verifying Business Contracts with Abductive Logic Programming, file e309ade0-2320-3969-e053-3a05fe0a2c94
|
2
|
Mapping Deontic Operators to Abductive Expectations, file e309ade0-2328-3969-e053-3a05fe0a2c94
|
2
|
Specification and verification of agent interaction protocols in a logic-based system, file e309ade0-232a-3969-e053-3a05fe0a2c94
|
2
|
null, file e309ade0-35ee-3969-e053-3a05fe0a2c94
|
2
|
null, file e309ade0-b22e-3969-e053-3a05fe0a2c94
|
2
|
SPECIFICATION AND VERIFICATION OF AGENT INTERACTIONS USING SOCIAL INTEGRITY CONSTRAINTS, file e309ade0-d9b2-3969-e053-3a05fe0a2c94
|
2
|
Constraint and optimization techniques for supporting policy making, file e309ade0-df54-3969-e053-3a05fe0a2c94
|
2
|
What-if analysis through simulation-optimization hybrids, file e309ade0-e187-3969-e053-3a05fe0a2c94
|
2
|
Web Service Contracting: Specification and Reasoning with SCIFF, file e309ade0-e7e2-3969-e053-3a05fe0a2c94
|
2
|
Dischargeable obligations in abductive logic programming, file e309ade1-70f9-3969-e053-3a05fe0a2c94
|
2
|
Evaluating Compliance: From LTL to Abductive Logic Programming, file e309ade1-a11a-3969-e053-3a05fe0a2c94
|
2
|
An ASP approach for the valves positioning optimization in a water distribution system, file e309ade2-e977-3969-e053-3a05fe0a2c94
|
2
|
Logic-Based Benders Decomposition in Answer Set Programming for Chronic Outpatients Scheduling, file 45a069fa-f8d2-4b87-a858-de3814fd86f4
|
1
|
Geometric reasoning on the Traveling Salesperson Problem: comparing Answer Set Programming and Constraint Logic Programming Approaches, file 700fb779-9ee3-4349-8f4f-6c08ffd01c60
|
1
|
L’esitazione vaccinale tra scompenso informativo, terrorismo mediatico e semi-complottismo. Un’indagine empirica, file b978395a-b5dd-4388-8997-8c8052f8edde
|
1
|
ASPECT: Answer Set rePresentation as vEctor graphiCs in laTex, file cf660bfe-1dcb-4969-b877-8e223d89f2fe
|
1
|
null, file e309ade0-2329-3969-e053-3a05fe0a2c94
|
1
|
null, file e309ade0-276b-3969-e053-3a05fe0a2c94
|
1
|
null, file e309ade0-294f-3969-e053-3a05fe0a2c94
|
1
|
null, file e309ade0-299f-3969-e053-3a05fe0a2c94
|
1
|
Compliance verification of agent interaction: A logic-based software tool, file e309ade0-2cef-3969-e053-3a05fe0a2c94
|
1
|
null, file e309ade0-2cf1-3969-e053-3a05fe0a2c94
|
1
|
Optimal Placement of Valves in a Water Distribution Network with CLP(FD), file e309ade0-310d-3969-e053-3a05fe0a2c94
|
1
|
Constraint Logic Programming, file e309ade0-3da6-3969-e053-3a05fe0a2c94
|
1
|
null, file e309ade0-42c1-3969-e053-3a05fe0a2c94
|
1
|
null, file e309ade0-438e-3969-e053-3a05fe0a2c94
|
1
|
Practical Aspects of Declarative Languages: 18th international symposium, PADL 2016 St. Petersburg, FL, USA, January 18-19, 2016 proceedings, file e309ade0-a47e-3969-e053-3a05fe0a2c94
|
1
|
null, file e309ade0-d242-3969-e053-3a05fe0a2c94
|
1
|
null, file e309ade0-d29b-3969-e053-3a05fe0a2c94
|
1
|
null, file e309ade0-d29f-3969-e053-3a05fe0a2c94
|
1
|
Totale |
1.287 |