Experimental results on learning soft constraints, KR, pp.435-444, 2000. ,
Semirings for Soft Constraint Solving and Programming, LNCS, vol.2962, 2004. ,
DOI : 10.1007/b95712
Soft constraint propagation and solving in CHRs, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.1-5, 2002. ,
DOI : 10.1145/508791.508793
Enhancing constraints manipulation in semiringbased formalisms, ECAI '06: European Conference on Artificial Intelligence, pp.63-67, 2006. ,
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family, Autonomic and Trusted Computing, 5th International Conference, pp.481-495, 2008. ,
DOI : 10.1007/978-3-540-69295-9_38
Weighted Datalog and Levels of Trust, 2008 Third International Conference on Availability, Reliability and Security, pp.1128-1134, 2008. ,
DOI : 10.1109/ARES.2008.197
Semiring-based constraint satisfaction and optimization, Journal of the ACM, vol.44, issue.2, pp.201-236, 1997. ,
DOI : 10.1145/256303.256306
Learning implied global constraints, IJCAI'07: Proc. of the International Joint Conference on Artificial Intelligence, pp.44-49, 2007. ,
HYPROLOG: A New Logic Programming Language with Assumptions and Abduction, Logic Programming, 21st International Conference, pp.159-173, 2005. ,
DOI : 10.1007/11562931_14
Abduction and concurrent logic languages, ECAI '94: European Conference on Artificial Intelligence, pp.75-79, 1994. ,
Computing Explanations and Implications in Preference-Based Configurators, International Workshop on Constraint Solving and CLP, pp.76-92, 2002. ,
DOI : 10.1007/3-540-36607-5_6
Constraint handling rules, Selected Papers from Constraint Programming, pp.90-107, 1995. ,
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
ACLP: Integrating abduction and constraint solving, 2000. ,
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication, Journal of Network and Systems Management, vol.6, issue.1, pp.117-136, 2007. ,
DOI : 10.1007/s10922-006-9057-2
Design of a role-based trustmanagement framework, SP '02: Proc. of Security and Privacy, pp.114-130, 2002. ,
Abduction of Linear Arithmetic Constraints, ICLP '05: Conf. on Logic Programming, pp.174-188, 2005. ,
DOI : 10.1007/11562931_15
On Computing Constraint Abduction Answers, Logic for Programming, pp.421-435, 2008. ,
DOI : 10.1007/978-3-540-89439-1_30
Applications of abduction: knowledge-level modelling, International Journal of Human-Computer Studies, vol.45, issue.3, pp.305-335, 1996. ,
DOI : 10.1006/ijhc.1996.0054
On the mechanization of abductive logic, IJCAI'73: Proc. of the International Joint Conference on Artificial Intelligence, pp.147-152, 1973. ,
Prediction is deduction but explanation is abduction, IJCAI'89: Proc. of the International Joint Conference on Artificial Intelligence, pp.1055-1060, 1989. ,
Semiring-Based Constraint Acquisition, 19th IEEE International Conference on Tools with Artificial Intelligence(ICTAI 2007), pp.251-258, 2007. ,
DOI : 10.1109/ICTAI.2007.160
An overview of the SWI-Prolog programming environment, Proc. of the 13th International Workshop on Logic Programming Environments, pp.1-16, 2003. ,