Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrity Constraints Evolution in Deductive Databases., and . GULP-PRODE, page 160-168. (1995)What Else Can Be Extracted from Ontologies? Influence Rules., and . ICSOFT (Selected Papers), volume 303 of Communications in Computer and Information Science, page 270-285. Springer, (2011)Enhancing GISs for spatio-temporal reasoning., , and . ACM-GIS, page 42-48. ACM, (2002)k-NN as an implementation of situation testing for discrimination discovery and prevention., , and . KDD, page 502-510. ACM, (2011)Mining Influence Rules out of Ontologies., and . ICSOFT (2), page 323-333. SciTePress, (2011)MuTACLP: A Language for Declarative GIS Analysis., , , and . Computational Logic, volume 1861 of Lecture Notes in Computer Science, page 1002-1016. Springer, (2000)Composing General Logic Programs., , and . LPNMR, volume 1265 of Lecture Notes in Computer Science, page 274-289. Springer, (1997)Knowledge Mining and Discovery for Searching in Literary Texts., , , , , , and . LREC, European Language Resources Association, (2002)Universal Quantification by Case Analysis., , , and . ECAI, page 111-116. (1990)Magma2: A Language Oriented toward Experiments in Control.. ACM Trans. Program. Lang. Syst., 6 (4): 468-486 (1984)