Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extended Prolog Machine for Dynamic Context Handling., , and . ECAI, page 284-289. Pitmann Publishing, London, (1988)From Eager to Lazy Constrained Data Acquisition: A General Framework., , , , , and . New Generation Comput., 19 (4): 339-368 (2001)Exploiting Symbolic Learning in Visual Inspection., , , and . IDA, volume 1280 of Lecture Notes in Computer Science, page 223-234. Springer, (1997)An Extended Warren Abstract Machine for the Execution of Structured Logic Programs., , and . J. Log. Program., 14 (3&4): 187-222 (1992)Improving the Efficiency of Dynamic Modular Logic Languages., , and . GULP-PRODE, page 347-358. (1995)An Abstract Interpretation Framework for Optimizing Dynamic Modular Logic Languages., , and . Inf. Process. Lett., 58 (4): 163-170 (1996)A CHR-based Implementation of Known Arc-Consistency, , , , and . CoRR, (2004)A CHR-based implementation of known arc-consistency., , , , and . Theory Pract. Log. Program., 5 (4-5): 419-440 (2005)Generating synthetic positive and negative business process traces through abduction., , , and . Knowl. Inf. Syst., 62 (2): 813-839 (2020)Artificial Intelligence Techniques for Monitoring Dangerous Infections., , , , , and . IEEE Trans. Information Technology in Biomedicine, 10 (1): 143-155 (2006)