Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy analysis for Administrative Role-Based Access Control., , , and . Theor. Comput. Sci., 412 (44): 6208-6234 (2011)Symbolic Support Graph: A Space Efficient Data Structure for Incremental Tabled Evaluation., and . ICLP, volume 3668 of Lecture Notes in Computer Science, page 235-249. Springer, (2005)Constraint-Based Inference in Probabilistic Logic Programs., and . PLP@ICLP, volume 1413 of CEUR Workshop Proceedings, page 46-56. CEUR-WS.org, (2015)Model-Based Analysis of Configuration Vulnerabilities., and . J. Comput. Secur., 10 (1/2): 189-209 (2002)Verification Using Tabled Logic Programming.. CONCUR, volume 1877 of Lecture Notes in Computer Science, page 89-91. Springer, (2000)Online Justification for Tabled Logic Programs., , , , and . FLOPS, volume 2998 of Lecture Notes in Computer Science, page 24-38. Springer, (2004)Subsumption Algorithms Based on Search Trees., , , and . CAAP, volume 1059 of Lecture Notes in Computer Science, page 135-148. Springer, (1996)Justifying proofs using memo tables., , and . PPDP, page 178-189. ACM, (2000)Incremental Evaluation of Tabled Logic Programs., and . ICLP, volume 2916 of Lecture Notes in Computer Science, page 392-406. Springer, (2003)Beyond Tamaki-Sato Style Unfold/Fold Transformations for Normal Logic Programs., , , and . ASIAN, volume 1742 of Lecture Notes in Computer Science, page 322-333. Springer, (1999)