Author of the publication

The least fixpoint transformation for disjunctive logic programs.

, , and . J. Comput. Sci. Technol., 13 (3): 193-201 (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Clustering Scheme in Mobile Peer-to-Peer Networks., , , , and . ICOIN, page 1-5. IEEE, (2008)Automated Reasoning on Prime Weighted Neural Network., and . IWAR, volume A-19 of IFIP Transactions, page 335-341. North-Holland, (1992)Growing Distributed System., , , and . PDPTA, page 399-403. CSREA Press, (2002)QoS Aware Service Composition with Multiple Quality Constraints., , , and . NPC, volume 3779 of Lecture Notes in Computer Science, page 123-131. Springer, (2005)Research of Agent Based Multiple-Granularity Load Balancing Middleware for Service-Oriented Computing., , , and . PRIMA, volume 4088 of Lecture Notes in Computer Science, page 564-570. Springer, (2006)A Rule Induction Method of Plant Disease Description Based on Rough Sets., , and . RSFDGrC, volume 2639 of Lecture Notes in Computer Science, page 259-263. Springer, (2003)A Study on Organizational Knowledge in Multi-Agent System., , and . J. Convergence Inf. Technol., 2 (1): 61-65 (2007)LBSNRank: personalized pagerank on location-based social networks., , , , and . UbiComp, page 980-987. ACM, (2012)An Efficient Hierarchical Failure Recovery Algorithm Ensuring Semantic Atomicity for Workflow Applications., , , and . WAIM, volume 3129 of Lecture Notes in Computer Science, page 664-671. Springer, (2004)Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering., , , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 444-454. Springer, (2008)