A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints
暂无分享,去创建一个
Stefano Bistarelli | Francesco Santini | Fabio Martinelli | F. Martinelli | Francesco Santini | Stefano Bistarelli
[1] Francesca Rossi,et al. Semiring-based constraint satisfaction and optimization , 1997, JACM.
[2] Verónica Dahl,et al. HYPROLOG: A New Logic Programming Language with Assumptions and Abduction , 2005, ICLP.
[3] Alessandro Sperduti,et al. Experimental Results on Learning Soft Constraints , 2000, KR.
[4] Fabio Massacci,et al. A Negotiation Scheme for Access Rights Establishment in Autonomic Communication , 2006, Journal of Network and Systems Management.
[5] Murray Shanahan,et al. Prediction is Deduction but Explanation is Abduction , 1989, IJCAI.
[6] Philippe Codognet,et al. Abduction and Concurrent Logic Languages , 1994, ECAI.
[7] André Zúquete,et al. Security Policy Consistency , 2000, ArXiv.
[8] Christian Bessiere,et al. Learning Implied Global Constraints , 2007, IJCAI.
[9] Roberto Rossi,et al. Cost-Based Filtering for Stochastic Inventory Control , 2006, CSCLP.
[10] Thom W. Frühwirth,et al. Constraint Handling Rules , 2009, Constraint Programming.
[11] Michael J. Maher,et al. On Computing Constraint Abduction Answers , 2008, LPAR.
[12] Harry E. Pople,et al. Session 6 Theorem Proving and Logic: I I ON THE MECHANIZATION OF ABDUCTIVE LOGIC , 2006 .
[13] Thom W. Frühwirth,et al. Soft constraint propagation and solving in CHRs , 2002, SAC '02.
[14] Francesca Rossi,et al. Computing Explanations and Implications in Preference-Based Configurators , 2002, International Workshop on Constraint Solving and Constraint Logic Programming.
[15] Jan Wielemaker,et al. An Overview of the SWI-Prolog Programming Environment , 2003, WLPE.
[16] Stefano Bistarelli,et al. A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily , 2008, ATC.
[17] Leon G. Higley,et al. Forensic Entomology: An Introduction , 2009 .
[18] Tim Menzies,et al. Applications of abduction: knowledge-level modelling , 1996, Int. J. Hum. Comput. Stud..
[19] Fabio Gadducci,et al. Enhancing Constraints Manipulation in Semiring-Based Formalisms , 2006, ECAI.
[20] Frank Wolter,et al. Monodic fragments of first-order temporal logics: 2000-2001 A.D , 2001, LPAR.
[21] Krzysztof R. Apt,et al. Logic Programming , 1990, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.
[22] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[23] Stefano Bistarelli,et al. Weighted Datalog and Levels of Trust , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[24] Antonis C. Kakas,et al. ACLP: Integrating Abduction and Constraint Solving , 2000, ArXiv.
[25] Michael J. Maher. Abduction of Linear Arithmetic Constraints , 2005, ICLP.
[26] Barry O'Sullivan,et al. Semiring-Based Constraint Acquisition , 2007, 19th IEEE International Conference on Tools with Artificial Intelligence(ICTAI 2007).
[27] Stefano Bistarelli. Semirings for Soft Constraint Solving and Programming , 2004, Lecture Notes in Computer Science.
[28] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..