Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inducing Specification of Interaction Protocols and Business Processes and Proving their Properties., , , , and . Il Milione, volume 487 of CEUR Workshop Proceedings, CEUR-WS.org, (2008)Mapping of Deontic Operators to Abductive Expectations., , , , , and . NORMAS, page 126-136. (2005)Runtime Addition of Integrity Constraints in an Abductive Proof Procedure., , and . ICLP (Technical Communications), volume 7 of LIPIcs, page 4-13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2010)Normative systems require hybrid knowledge bases., , , , , and . AAMAS, page 1425-1426. IFAAMAS, (2012)A CHR-based implementation of known arc-consistency., , , , and . Theory Pract. Log. Program., 5 (4-5): 419-440 (2005)Observation Strategies for Event Detection with Incidence on Runtime Verification., , and . RCRA@CPAIOR, volume 616 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)An Iterative Fixpoint Semantics for MKNF Hybrid Knowledge Bases with Function Symbols., , , and . ICLP Technical Communications / Doctoral Consortium, volume 364 of EPTCS, page 65-78. (2022)A Social ACL Semantics by Deontic Constraints., , , , , and . CEEMAS, volume 2691 of Lecture Notes in Computer Science, page 204-213. Springer, (2003)Modeling Interactions Using Social Integrity Constraints: A Resource Sharing Case Study., , , , and . DALT, volume 2990 of Lecture Notes in Computer Science, page 243-262. Springer, (2003)Abduction with Hypotheses Confirmation., , , , and . IJCAI, page 1545-1546. Professional Book Center, (2005)