How an Agent Might Think.
A. Szalas,
To appear in Logic J. IGPL. Special issue edited by B. Dunin-Keplicz and R. Verbrugge,
2013
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content
Shruti Tople, Shweta Shinde, Zhaofeng Chen, and Prateek Saxena
CCS '13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security,
2013
Declarative Datalog Debugging for Mere Mortals
Sven Köhler, Bertram Ludäscher, and Yannis Smaragdakis
Datalog in Academia and Industry, LNCS 7494,
2012.
An Analysis of the Mozilla Jetpack Extension Framework
Rezwana Karim, Mohan Dhawan, Vinod Ganapathy, Chung-chieh Shan.
Proceedings of the 26th European Conference on Object-Oriented Programming (ECOOP 2012),
LNCS 7313, June
2012.
Semantic-based Query Answering Supported by Association Patterns and Materialized Views
Nittaya Kerdprasop and Kittisak Kerdprasop
International Journal of Database Theory and Application. Vol. 5, No. 1, March,
2012.
Using Logic Programming to Represent Information Content Inclusion Relations
Doug Salt and Junkang Feng
International Journal of Information Technology and Computer Science(IJITCS), Vol. 4, No. 1, February,
2012.
Quantitative Decision-making in Software Engineering
P. Bhattacharya
Dissertation submitted in for PhD in Computer Science,
University of California - Riverside, USA,
2012
Transformation of relational database to a knowledge repository in deductive database
Master Thesis
Suranaree University of Technology, Thailand,
2012
Using Declarative Invariants for Protecting File-System Integrity
Jack Sun, Daniel Fryer, Ashvin Goel and Angela Demke Brown
University of Toronto
PLOS ‘11, October 23, 2011, Cascais, Portugal. ACM 978-1-4503-0979-0/11/10,
2011
A Prolog-based Framework for Search, Integration and Empirical Analysis on Software Evolution Data
Pamela Bhattacharya and Iulian Neamtiu
University of California
SUITE '11 Proceedings of the 3rd International Workshop on Search-Driven Development: Users, Infrastructure, Tools, and Evaluation, pp. 29-32, ACM,
2011
ASPIDE: Integrated Development Environment for Answer Set Programming
Onofrio Febbraro, Kristian Reale and Francesco Ricca
Logic Programming and Nonmonotonic Reasoning 2011
LNAI 6645
Springer-Verlag,
2011
Optimizing Database Queries with Materialized Views and Data Mining Models
Nittaya Kerprasop and Kittisak Kerprasop
DTA/BSBT 2011
Springer-Verlag,
2011
Using Declarative Invariants for Protecting File-System Integrity
Jack Sun, Daniel Fryer, Ashvin Goel, and Angela Demke Brown(University of Toronto)
PLOS'11
October
2011
Overview of selected approaches to rule representation on the Semantic Web
Weronika T. Adrian, Grzegorz J. Nalepa, Krzysztof Kaczor, Marta Noga
AGH University of Science and Technology Department of Automatics Kraków, POLAND
October
2010
Using the Monet database system as a platform for graph processing
Steven Woudenberg
Master thesis. Faculty of Science. Information and Computing Sciences. University of Utrecht,
2010
Authorization Constraint Method in Workflow Management Systems Based on RBAC
SHAN Xu-mei, YU Hui-qun
Journal of Computer Engineering,
Vol.36, Nş.4, February
2010
Possible use of Deductive Databases for Production Information Systems
Donetsk National Technical University
Ukraine,
2010
Collaborative Narrative Generation in Persistent Virtual Environments
by Neil Madden, BSc
Thesis submitted to The University of Nottingham
for the degree of Doctor of Philosophy, January
2009
Translating SQL Applications to the Semantic Web
S.H. Tirmizi, J. Sequeda, D. Miranker
DEXA 2008,
pp. 450-464,
2008
Magické transformácie pre DATALÓG:
Diplomová práca
Fakulta matematiky, fyziky a informatiky
Univerzita Komenského v Bratislave,
2008
Alias Analysis for Assembly
David Brumley and James Newsome
CMU-CS-06-180
School of Computer Science
Carnegie Mellon University,
2006
A Paxon Evaluation of P2
Benjamin Szekely, Elias Torres,
2005
Advanced Techniques for Efficient Data Integrity Checking
Ph.D. Dissertation
Davide Martinenghi
Roskilde University,
Department of Computer Science
October
2005
An Approach to Specifying and Analyzing Context-Aware Access Control Policies
DU Li-ping YU Hui-qun
JOURNAL OF EAST CHINA UNIVERSITY OF SCIENCE AND TECHNOLOGY NATURAL SCIENCE EDITION
Vol.32 No.9 P.1098-1103,
2006
A Survey of Approaches to Atomic Schema Matching
Samer Samarah
School of Information Technology and Engineering
University of Ottawa
Canada
Efficient Integrity Checking for Databases with Recursive Views
Davide Martinenghi and Henning Christiansen
In Advances in Databases and Information Systems: 9th East European Conference, ADBIS 2005, Tallinn, Estonia, LNCS 3631, September,
2005
PhD
Computer Science and Engineering Department
University of Nebraska - Lincoln, USA
PhD
University of Texas at San Antonio, USA