Information Technology Reference
In-Depth Information
113. Franch X, Maiden NAM (2003) Modelling Component Dependencies to Inform their
Selection. In :Procs of the 2nd International Conference on COTS-Based Software Systems,
Springer.
114. Vieira M, Dias M, Richardson DJ (2001) Describing Dependencies in Component Access
Points. In: Procs of the 23rd International Conference on Software Engineering (ICSE'01),
Toronto, Canada, pages 115-118.
115. Vieira M, Richardson D (2002) Analyzing dependencies in large component-based systems.
In: Procs of the 17th IEEE International Conference on Automated Service Engineering,
ASE'02. Los Alamitos, CA, USA, 2002. IEEE Computer Society.
116. Walter M, Trinitis M, Karl W (2001) OpenSESAME: an intuitive dependability mod-
elling environment supporting inter-component dependencies. In: Procs of Pacific Rim
International Symposium on Dependable Computing, 76-83.
117. Tzitzikas Y, Marketakis Y, Antoniou G (2010) Task-based Dependency Managemt for the
Preservation of Digital Objects using Rules. In: Procs of the 6th Hellenic Conference on
Artificial Intelligence (SETN'10), Athens, Greece, May, 2010
118. Wikipedia Article About Datalog http://en.wikipedia.org/wiki/Datalog
119. Tzitzikas Y, Flouris G (2007) Mind the (Intelligibily) Gap. In: Procs of the 11th European
Conference on Research and Advanced Technology for Digital Libraries, (ECDL'07),
Budapest, Hungary, September 2007. Springer-Verlag.
120. Kakas AC, Kowalski RA, Toni F (1998) The Role of Abduction in Logic Programming. In:
Handbook of Logic in Artificial Intelligence and Logic Programming: Logic programming,
page 235
121. Console L, Dupre DT, Torasso P (1991). On the relationship between abduction and
deduction. In: Journal of Logic and Computation. 1(5):661
122. Eiter T, Gottlob G (1995) The complexity of logic-based abduction. In: Journal of the ACM
(JACM), 42(1):3-42.
123. PreScan Tool web site http://www.ics.forth.gr/prescan
124. Open Provenance Model (OPM) see http://openprovenance.org/
125. Moreau L, Freire J, Myers J, Furelle J, Paulson P (2007) The Open Provenance Model,
University of Southampton.
126. Theodoridou M, Tzitzikas Y, Doerr M, Marketakis Y, Melessanakis V (2010) Modelling
and Querying Provenance by Extending CIDOC CRM. Journal of Distributed and Parallel
Databases, 27:169-210.
127. Christiansen H, Dahl V (2004) Assumptions and abduction in Prolog. In: 3rd International
Workshop on Multiparadigm Constraint Programming Languages, MultiCPL, Saint-Malo,
France, September 2004
128. Christiansen H, Dahl V (2005) HYPROLOG: A new logic programming language with
assumptions and abduction. In: Lecture Notes in Computer Science, 3668:159-173,
2005.
129. Horrocks I, Patel-Schneider PF, Boley H, Tabet S, Grosof B, Dean M (2004) SWRL: A
Semantic Web Rule Language Combining OWL and RuleML, May 2004. Available from
http://www.w3.org/Submission/SWRL/ .
130. Arecibo Message http://en.wikipedia.org/wiki/Arecibo_message
131. Song S, JaJa J (2007) ACE: a Novel Software Platform to Ensure the Long Term Integrity
of Digital Archives. Available from http://www.umiacs.umd.edu/~joseph/ace-archiving07.
pdf
132. DCCWorkshop on Persistent Identifiers. Available at http://www.dcc.ac.uk/events/pi-2005/
133. Archival Resource Key (ARK) http://www.ietf.org/internet-drafts/draft-kunze-ark-09.txt
134. N2T (Name-To-Thing resolver) http://n2t.info/
135. PURL (Persistent Uniform Resource Locators) http://purl.org
136. Handle System web site http://www.handle.net/
137. DOI (Digital Object Identifier system) http://www.doi.org/
138. UUID (Universally Unique IDentifier) http://www.ietf.org/rfc/rfc4122.txt
Search WWH ::




Custom Search