-
1
-
-
22944479839
-
Experimental results on learning soft constraints
-
Biso, A., Rossi, F., Sperduti, A.: Experimental results on learning soft constraints. In: KR, pp. 435-444 (2000)
-
(2000)
KR
, pp. 435-444
-
-
Biso, A.1
Rossi, F.2
Sperduti, A.3
-
2
-
-
29244468339
-
Semirings for Soft Constraint Solving and Programming
-
Springer, Heidelberg
-
Bistarelli, S.: Semirings for Soft Constraint Solving and Programming. LNCS, vol. 2962. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2962
-
-
Bistarelli, S.1
-
3
-
-
0036038693
-
Soft constraint propagation and solving in CHRs
-
ACM Press, New York
-
Bistarelli, S., Frühwirth, T., Marte, M.: Soft constraint propagation and solving in CHRs. In: SAC 2002: Proc. of the ACM Symposium on Applied Computing, pp. 1-5. ACM Press, New York (2002)
-
(2002)
SAC 2002: Proc. of the ACM Symposium on Applied Computing
, pp. 1-5
-
-
Bistarelli, S.1
Frühwirth, T.2
Marte, M.3
-
5
-
-
48249093411
-
A semantic foundation for trust management languages with weights: An application to the RT family
-
Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. Springer, Heidelberg
-
Bistarelli, S., Martinelli, F., Santini, F.: A semantic foundation for trust management languages with weights: An application to the RT family. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. LNCS, vol. 5060, pp. 481-495. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5060
, pp. 481-495
-
-
Bistarelli, S.1
Martinelli, F.2
Santini, F.3
-
6
-
-
49049108917
-
Weighted datalog and levels of trust
-
IEEE Computer Society, Los Alamitos
-
Bistarelli, S., Martinelli, F., Santini, F.: Weighted datalog and levels of trust. In: ARES: Conference on Availability, Reliability and Security, pp. 1128-1134. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
ARES: Conference on Availability, Reliability and Security
, pp. 1128-1134
-
-
Bistarelli, S.1
Martinelli, F.2
Santini, F.3
-
7
-
-
0031095278
-
Semiring-based constraint satisfaction and optimization
-
Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based constraint satisfaction and optimization. J. ACM 44(2), 201-236 (1997)
-
(1997)
J. ACM
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
8
-
-
77958467084
-
Learning implied global constraints
-
Bessière, C., Coletta, R., Petit, T.: Learning implied global constraints. In: IJCAI 2007: Proc. of the International Joint Conference on Artificial Intelligence, pp. 44-49 (2007)
-
(2007)
IJCAI 2007: Proc. of the International Joint Conference on Artificial Intelligence
, pp. 44-49
-
-
Bessière, C.1
Coletta, R.2
Petit, T.3
-
9
-
-
27144485193
-
Hyprolog: A new logic programming language with assumptions and abduction
-
Gabbrielli, M., Gupta, G. (eds.) ICLP 2005. Springer, Heidelberg
-
Christiansen, H., Dahl, V.: Hyprolog: A new logic programming language with assumptions and abduction. In: Gabbrielli, M., Gupta, G. (eds.) ICLP 2005. LNCS, vol. 3668, pp. 159-173. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3668
, pp. 159-173
-
-
Christiansen, H.1
Dahl, V.2
-
11
-
-
7044231003
-
Computing explanations and implications in preference-based configurators
-
O'Sullivan, B. (ed.) CologNet 2002. Springer, Heidelberg
-
Freuder, E.C., Likitvivatanavong, C., Moretti, M., Rossi, F., Wallace, R.J.: Computing explanations and implications in preference-based configurators. In: O'Sullivan, B. (ed.) CologNet 2002. LNCS (LNAI), vol. 2627, pp. 76-92. Springer, Heidelberg (2003)
-
(2003)
LNCS (LNAI)
, vol.2627
, pp. 76-92
-
-
Freuder, E.C.1
Likitvivatanavong, C.2
Moretti, M.3
Rossi, F.4
Wallace, R.J.5
-
12
-
-
84956978060
-
Constraint handling rules
-
London, UK, Springer, Heidelberg
-
Frühwirth, T.W.: Constraint handling rules. In: Selected Papers from Constraint Programming, London, UK, pp. 90-107. Springer, Heidelberg (1995)
-
(1995)
Selected Papers from Constraint Programming
, pp. 90-107
-
-
Frühwirth, T.W.1
-
13
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618-644 (2007)
-
(2007)
Decis. Support Syst.
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
15
-
-
33947544647
-
A negotiation scheme for access rights establishment in autonomic communication
-
Koshutanski, H., Massacci, F.: A negotiation scheme for access rights establishment in autonomic communication. J. Network Syst. Manage. 15(1), 117-136 (2007)
-
(2007)
J. Network Syst. Manage.
, vol.15
, Issue.1
, pp. 117-136
-
-
Koshutanski, H.1
Massacci, F.2
-
16
-
-
84948440714
-
Design of a role-based trust-management framework
-
IEEE Computer Society, Los Alamitos
-
Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: SP 2002: Proc. of Security and Privacy, pp. 114-130. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
SP 2002: Proc. of Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
17
-
-
27144465743
-
Abduction of linear arithmetic constraints
-
Gabbrielli, M., Gupta, G. (eds.) ICLP 2005. Springer, Heidelberg
-
Maher, M.J.: Abduction of linear arithmetic constraints. In: Gabbrielli, M., Gupta, G. (eds.) ICLP 2005. LNCS, vol. 3668, pp. 174-188. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3668
, pp. 174-188
-
-
Maher, M.J.1
-
18
-
-
58049105920
-
On computing constraint abduction answers
-
Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. Springer, Heidelberg
-
Maher, M.J., Huang, G.: On computing constraint abduction answers. In: Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. LNCS (LNAI), vol. 5330, pp. 421-435. Springer, Heidelberg (2008)
-
(2008)
LNCS (LNAI)
, vol.5330
, pp. 421-435
-
-
Maher, M.J.1
Huang, G.2
-
19
-
-
0030247429
-
Applications of abduction: Knowledge-level modelling
-
Menzies, T.: Applications of abduction: knowledge-level modelling. Int. J. Hum.Comput. Stud. 45(3), 305-335 (1996)
-
(1996)
Int. J. Hum.Comput. Stud.
, vol.45
, Issue.3
, pp. 305-335
-
-
Menzies, T.1
-
21
-
-
48749114683
-
-
CoRR, cs.LO/0006045
-
Ribeiro, C., Zuquete, A., Ferreira, P., Guedes, P.: Security policy consistency. CoRR, cs.LO/0006045 (2000)
-
(2000)
Security Policy Consistency
-
-
Ribeiro, C.1
Zuquete, A.2
Ferreira, P.3
Guedes, P.4
|