Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Checking Termination of Datalog with Function Symbols Through Linear Constraints., , , and . SEBD, page 192-199. Curran Associates, Inc., (2015)The View-Update Problem for Indefinite Databases., , , and . SEBD, page 95-102. Curran Associates, (2013)Consistent Queries over Databases with Integrity Constraints., , , and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Evaluating User Behaviour in a Cooperative Environment., , , , , , and . Inf., 9 (12): 303 (2018)Querying Data Exchange Settings Beyond Positive Queries., , , and . Datalog, volume 3203 of CEUR Workshop Proceedings, page 27-41. CEUR-WS.org, (2022)Preference-based inconsistency-tolerant query answering under existential rules., , , and . Artif. Intell., (2022)Even-if Explanations: Formal Foundations, Priorities and Complexity., , , , , and . CoRR, (2024)Logic languages and optimization techniques for decision, search and optimization problems.. University of Calabria, Italy, (2005)On the Semantics of Logic Programs with Preferences., , and . JELIA, volume 4160 of Lecture Notes in Computer Science, page 203-215. Springer, (2006)Analyzing Security Scenarios Using Defence Trees and Answer Set Programming., , and . STM@ESORICS, volume 197 of Electronic Notes in Theoretical Computer Science, page 121-129. Elsevier, (2007)