All major semantics of normal logic programs and normal logic programs with aggregates can be described as fixpoints of the one-step provability operator or of operators that can...
As the desire for business intelligence capabilities for e-business processes expands, existing workflow management systems and decision support systems are not able to provide co...
We have used comparative genome analyses to produce annotated maps for large genomic loci. The first example is a locus on mouse chromosome 9 that is syntenic to human chromosome ...
We present a constructive procedure for extracting polynomial-time realizers from ineffective proofs of Π0 2theorems in feasible analysis. By ineffective proof we mean a proof wh...
In this paper we describe our approach to reconstructing the software architecture of J2EE web applications. We use the Siemens Four Views approach, separating the architecture in...