Author of the publication

How to Produce Information About a Given Entity Using Automated Deduction Methods.

, and . LSFA, volume 256 of Electronic Notes in Theoretical Computer Science, page 19-31. Elsevier, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Strategy for Non-Horn Deductive Databases.. Theor. Comput. Sci., 78 (1): 245-259 (1991)Optimisation sémantique utilisant des techniques d'Intelligence Artificielle., , and . BDA, page 323-346. INRIA, (1987)Trust and Norms in the Context of Computer Security: A Logical Formalization., and . DEON, volume 5076 of Lecture Notes in Computer Science, page 50-64. Springer, (2008)Towards a Uniform Logical Representation of Different Kinds of Integrity Constraints., , and . FMLDO, page 157-164. University of Magedeburg, Faculty of Computer Science, (1996)Assigning Meaning to Ill-Defined Queries Expressed in Predicate Caculus Language.. Advances in Data Base Theory, page 367-395. New York, Plemum Press, (1979)Semantic Optimization in Data Bases Using Artificial Intelligence Techniques., , and . DS-3, page 519-528. North-Holland, (1988)How to Improve Performance of Relational DBMS.. IFIP Congress, page 229-233. North-Holland/IFIP, (1983)Strategies for the Computation of Conditional Answers.. DAISD, volume LSI/90-30 of Report de recerca, page 49-71. Universitat Politecnica de Catalunya (UPC), (1990)Validity Queries and Completeness Queries.. ISMIS, volume 1079 of Lecture Notes in Computer Science, page 253-263. Springer, (1996)Heuristics for Syntactial Optimization of Relational Queries., and . Inf. Process. Lett., 32 (6): 313-316 (1989)