default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2010
- Kumiyo Nakakoji, Yohei Murakami, Eric McCready:
New Frontiers in Artificial Intelligence, JSAI-isAI 2009 Workshops, LENLS, JURISIN, KCSD, LLLL, Tokyo, Japan, November 19-20, 2009, Revised Selected Papers. Lecture Notes in Computer Science 6284, Springer 2010, ISBN 978-3-642-14887-3 [contents] - 2009
- Francisco Andrade, Paulo Novais, Davide Carneiro, John Zeleznikow, José Neves:
Using BATNAs and WATNAs in Online Dispute Resolution. JSAI-isAI Workshops 2009: 5-18 - Daisuke Bekki:
6th International Workshop on Logic and Engineering of Natural Language Semantics (LENLS 6). JSAI-isAI Workshops 2009: 159-160 - Daisuke Bekki, Kenichi Asai:
Representing Covert Movements by Delimited Continuations. JSAI-isAI Workshops 2009: 161-180 - Vi-sit Boonchom, Nuanwan Soonthornphisaj:
Thai Succession and Family Law Ontology Building Using Ant Colony Algorithm. JSAI-isAI Workshops 2009: 19-32 - Alastair Butler, Kei Yoshimoto:
Problems with Intervention and Binding into Relations. JSAI-isAI Workshops 2009: 181-196 - Elizabeth Coppock, David Baxter:
A Translation from Logic to English with Dynamic Semantics. JSAI-isAI Workshops 2009: 197-216 - Guido Governatori, Antonino Rotolo, Rossella Rubino:
Implementing Temporal Defeasible Logic for Modeling Legal Reasoning. JSAI-isAI Workshops 2009: 45-58 - Takashi Iida:
Semantics of Possibility Suffix "(Rar)e". JSAI-isAI Workshops 2009: 217-234 - Yuichi Kameda, Hiroo Tokunaga:
Inferability of Unbounded Unions of Certain Closed Set Systems. JSAI-isAI Workshops 2009: 317-330 - Toshihiro Kamiya:
Identifying the Concepts That Are Searchable with Keywords in Code Search Engines. JSAI-isAI Workshops 2009: 116-123 - Masakazu Kanbe, Shuichiro Yamamoto, Toshizumi Ohta:
A Proposal of TIE Model for Communication in Software Development Process. JSAI-isAI Workshops 2009: 104-115 - Takashi Katoh, Hiroki Arimura, Kouichi Hirata:
Mining Frequent k-Partite Episodes from Event Sequences. JSAI-isAI Workshops 2009: 331-344 - Hans Lycke:
An Adaptive Logic for the Formal Explication of Scalar Implicatures. JSAI-isAI Workshops 2009: 235-251 - Yoshiharu Maeno, Katsumi Nitta, Yukio Ohsawa:
Reflective Visualization of the Agreement Quality in Mediation. JSAI-isAI Workshops 2009: 33-44 - Kumiyo Nakakoji, Yunwen Ye, Yasuhiro Yamamoto:
Comparison of Coordination Communication and Expertise Communication in Software Development: Motives, Characteristics, and Needs. JSAI-isAI Workshops 2009: 147-155 - Masao Ohira, Kiwako Koyama, Akinori Ihara, Shinsuke Matsumoto, Yasutaka Kamei, Ken-ichi Matsumoto:
A Time-Lag Analysis for Improving Communication among OSS Developers. JSAI-isAI Workshops 2009: 135-146 - Masao Ohira, Yunwen Ye:
3rd International Workshop on Supporting Knowledge Collaboration in Software Development (KCSD2009). JSAI-isAI Workshops 2009: 89-90 - Seishi Ouchi, Akihiro Yamamoto:
Learning from Positive Data Based on the MINL Strategy with Refinement Operators. JSAI-isAI Workshops 2009: 345-357 - Giuseppe Primiero, Bjørn Jespersen:
Two Kinds of Procedural Semantics for Privative Modification. JSAI-isAI Workshops 2009: 252-271 - Tiago Proenca, Nilmax Teones Moura, André van der Hoek:
On the Use of Emerging Design as a Basis for Knowledge Collaboration. JSAI-isAI Workshops 2009: 124-134 - Seiichiro Sakurai:
Third International Workshop on Juris-Informatics. JSAI-isAI Workshops 2009: 3-4 - Ken Satoh:
Computing Minimal Models by Positively Minimal Disjuncts. JSAI-isAI Workshops 2009: 358-371 - Emad Shihab, Nicolas Bettenburg, Bram Adams, Ahmed E. Hassan:
On the Central Role of Mailing Lists in Open Source Projects: An Exploratory Study. JSAI-isAI Workshops 2009: 91-103 - Pontus Stenetorp, Jason Jingshi Li:
Evaluating Cases in Legal Disputes as Rival Theories. JSAI-isAI Workshops 2009: 59-72 - Michael Stieghahn, Thomas Engel:
Law-Aware Access Control: About Modeling Context and Transforming Legislation. JSAI-isAI Workshops 2009: 73-86 - Akihiro Yamamoto, Kouichi Hirata, Shin-ichi Minato:
The Sixth Workshop on Learning with Logics and Logics for Learning (LLLL2009). JSAI-isAI Workshops 2009: 315-316 - Igor Yanovich:
On the Nature and Formal Analysis of Indexical Presuppositions. JSAI-isAI Workshops 2009: 272-291 - Sarah Zobel:
Non-standard Uses of German 1st Person Singular Pronouns. JSAI-isAI Workshops 2009: 292-311
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-06 11:10 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint