default search action
Fundamenta Informaticae, Volume 89
Volume 89, Number 1, 2008
- Jeroen De Knijf, Ad Feelders:
An Experimental Comparison of Different Inclusion Relations in Frequent Tree Mining. 1-22 - Floriana Esposito, Nicola Di Mauro, Teresa Maria Altomare Basile, Stefano Ferilli:
Multi-Dimensional Relational Sequence Mining. 23-43 - Nuno A. Fonseca, Rui Camacho, Ricardo Rocha, Vítor Santos Costa:
Compile the Hypothesis Space: Do it Once, Use it Often. 45-67 - Hongyu Guo, Herna L. Viktor:
Learning from Skewed Class Multi-relational Databases. 69-94 - Ondrej Kuzelka, Filip Zelezný:
A Restarted Strategy for Efficient Subsumption Testing. 95-109 - Niels Landwehr, Bernd Gutmann, Ingo Thon, Luc De Raedt, Matthai Philipose:
Relational Transformation-based Tagging for Activity Recognition. 111-129 - Wannes Meert, Jan Struyf, Hendrik Blockeel:
Learning Ground CP-Logic Theories by Leveraging Bayesian Network Learning Techniques. 131-160
Volume 89, Numbers 2-3, 2008
- Chien-Fu Cheng, Shu-Ching Wang, Tyne Liang:
Byzantine Agreement & Fault Diagnosis Agreement in Dynamic Ad-Hoc Environment. 161-187 - Krzysztof Dembczynski, Wojciech Kotlowski, Marcin Sydow:
Effective Prediction of Web User Behaviour with User-Level Models. 189-206 - Zoltán Fülöp, Lorand Muzamel:
Pebble Macro Tree Transducers with Strong Pebble Handling. 207-257 - Gösta Grahne, Alex Thomo, William W. Wadge:
Preferential Regular Path Queries. 259-288 - Tomasz Jurdzinski:
The Boolean Closure of Growing Context-Sensitive Languages. 289-305 - Daniel Leivant:
Logical Undecidabilities Made Easy. 307-312 - Anna Nepomniaschaya:
Efficient Implementation of the Italiano Algorithms for Updating the Transitive Closure on Associative Parallel Processors. 313-329 - Indranil Saha, Bhargab B. Bhattacharya, Sheng Zhang, Sharad C. Seth:
Planar Straight-Line Embedding of Double-Tree Scan Architecture on a Rectangular Grid. 331-344 - Filip Svrcek:
On the Axiomatic System of SBLnotalgebras. 345-368
Volume 89, Number 4, 2008
- Ingo Brückner, Klaus Dräger, Bernd Finkbeiner, Heike Wehrheim:
Slicing Abstractions. 369-392 - Muhammad Torabi Dashti, Srijith Krishnan Nair, Hugo L. Jonker:
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme. 393-417 - Parosh Aziz Abdulla, Johann Deneux, Joël Ouaknine, Karin Quaas, James Worrell:
Universality Analysis for One-Clock Timed Automata. 419-450 - Mario Bravetti, Gianluigi Zavattaro:
A Foundational Theory of Contracts for Multi-party Service Composition. 451-478 - Filippo Bonchi, Antonio Brogi, Sara Corfini, Fabio Gadducci:
On the Use of Behavioural Equivalences for Web Services' Development. 479-510 - Carlo Montangero, Stephan Reiff-Marganiec, Laura Semini:
Logic-based Conflict Detection for Distributed Policies. 511-538 - Seyyed Vahid Hashemian, Farhad Mavaddat:
A Logical Reasoning Approach to Automatic Composition of Stateless Components. 539-577
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.