{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:22:18Z","timestamp":1725549738977},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290414"},{"type":"electronic","value":"9783540317333"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11558590_14","type":"book-chapter","created":{"date-parts":[[2005,10,5]],"date-time":"2005-10-05T12:53:11Z","timestamp":1128516791000},"page":"135-147","source":"Crossref","is-referenced-by-count":18,"title":["The SCIFF Abductive Proof-Procedure"],"prefix":"10.1007","author":[{"given":"Marco","family":"Alberti","sequence":"first","affiliation":[]},{"given":"Marco","family":"Gavanelli","sequence":"additional","affiliation":[]},{"given":"Evelina","family":"Lamma","sequence":"additional","affiliation":[]},{"given":"Paola","family":"Mello","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Torroni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","first-page":"235","volume-title":"Handbook of Logic in Artificial Intelligence and Logic Programming","author":"A.C. Kakas","year":"1998","unstructured":"Kakas, A.C., Kowalski, R.A., Toni, F.: The role of abduction in logic programming. In: Gabbay, D.M., Hogger, C.J., Robinson, J.A. (eds.) Handbook of Logic in Artificial Intelligence and Logic Programming, vol.\u00a05, pp. 235\u2013324. Oxford University Press, Oxford (1998)"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1093\/logcom\/1.5.661","volume":"1","author":"L. Console","year":"1991","unstructured":"Console, L., Dupr\u00e9, D.T., Torasso, P.: On the relationship between abduction and deduction. Journal of Logic and Computation\u00a01, 661\u2013690 (1991)","journal-title":"Journal of Logic and Computation"},{"key":"14_CR3","unstructured":"Kakas, A., Mancarella, P.: On the relation between Truth Maintenance and Abduction. In: Fukumura, T. (ed.) Proc. PRICAI 1990, pp. 438\u2013443. Ohmsha Ltd (1990)"},{"key":"14_CR4","first-page":"671","volume-title":"Proc. ICLP 1992","author":"K. Satoh","year":"1992","unstructured":"Satoh, K., Iwayama, N.: A Query Evaluation Method for Abductive Logic Programming. In: Apt, K. (ed.) Proc. ICLP 1992, pp. 671\u2013685. MIT Press, Cambridge (1992)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S0743-1066(97)00026-5","volume":"33","author":"T.H. Fung","year":"1997","unstructured":"Fung, T.H., Kowalski, R.A.: The IFF proof procedure for abductive logic programming. Journal of Logic Programming\u00a033, 151\u2013165 (1997)","journal-title":"Journal of Logic Programming"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/S0743-1066(99)00075-8","volume":"44","author":"A.C. Kakas","year":"2000","unstructured":"Kakas, A.C., Michael, A., Mourlas, C.: ACLP: Abductive Constraint Logic Programming. Journal of Logic Programming\u00a044, 129\u2013177 (2000)","journal-title":"Journal of Logic Programming"},{"key":"14_CR7","first-page":"591","volume-title":"Proc. IJCAI 2001","author":"A. Kakas","year":"2001","unstructured":"Kakas, A., van Nuffelen, B., Denecker, M.: ${\\cal A}$ -System: Problem solving through abduction. In: Nebel, B. (ed.) Proc. IJCAI 2001, pp. 591\u2013596. Morgan Kaufmann Publishers, San Francisco (2001)"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1017\/S1471068403001960","volume":"4","author":"J. Alferes","year":"2004","unstructured":"Alferes, J., Pereira, L.M., Swift, T.: Abduction in well-founded semantics and generalized stable models via tabled dual programs. Theory and Practice of Logic Programming\u00a04, 383\u2013428 (2004)","journal-title":"Theory and Practice of Logic Programming"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/S0743-1066(98)10005-5","volume":"37","author":"T. Fr\u00fchwirth","year":"1998","unstructured":"Fr\u00fchwirth, T.: Theory and practice of constraint handling rules. Journal of Logic Programming\u00a037, 95\u2013138 (1998)","journal-title":"Journal of Logic Programming"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Compliance verification of agent interaction: a logic-based software tool. In: Applied Artificial Intelligence (to appear)","DOI":"10.1080\/08839510500479546"},{"key":"14_CR11","unstructured":"Alberti, M., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Specification and verification of interaction protocols: a computational logic approach based on abduction. Technical Report CS-2003-03, Dipartimento di Ingegneria di Ferrara, Ferrara, Italy (2003), Available at, http:\/\/www.ing.unife.it\/informatica\/tr\/"},{"key":"14_CR12","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/0743-1066(94)90033-7","volume":"19-20","author":"J. Jaffar","year":"1994","unstructured":"Jaffar, J., Maher, M.: Constraint logic programming: a survey. Journal of Logic Programming\u00a019-20, 503\u2013582 (1994)","journal-title":"Journal of Logic Programming"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/0004-3702(94)90027-2","volume":"66","author":"H. B\u00fcrckert","year":"1994","unstructured":"B\u00fcrckert, H.: A resolution principle for constrained logics. Artificial Intelligence\u00a066, 235\u2013271 (1994)","journal-title":"Artificial Intelligence"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-39853-0_24","volume-title":"AI*IA 2003: Advances in Artificial Intelligence","author":"M. Alberti","year":"2003","unstructured":"Alberti, M., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: An Abductive Interpretation for Open Societies. In: Cappelli, A., Turini, F. (eds.) AI*IA 2003. LNCS, vol.\u00a02829, pp. 287\u2013299. Springer, Heidelberg (2003)"},{"key":"14_CR15","doi-asserted-by":"crossref","first-page":"203","DOI":"10.3233\/FI-1998-34301","volume":"34","author":"R. Kowalski","year":"1998","unstructured":"Kowalski, R., Toni, F., Wetzel, G.: Executing suspended logic programs. Fundamenta Informaticae\u00a034, 203\u2013224 (1998)","journal-title":"Fundamenta Informaticae"},{"key":"14_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-30227-8_6","volume-title":"Logics in Artificial Intelligence","author":"U. Endriss","year":"2004","unstructured":"Endriss, U., Mancarella, P., Sadri, F., Terreni, G., Toni, F.: The CIFF proof procedure for abductive logic programming with constraints. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS (LNAI), vol.\u00a03229, pp. 31\u201343. Springer, Heidelberg (2004)"},{"key":"14_CR17","first-page":"27","volume-title":"Integrated Interactive Computer Systems","author":"M.J. Sergot","year":"1983","unstructured":"Sergot, M.J.: A query-the-user facility of logic programming. In: Degano, P., Sandwell, E. (eds.) Integrated Interactive Computer Systems, pp. 27\u201341. North Holland, Amsterdam (1983)"},{"key":"14_CR18","unstructured":"Evans, C., Kakas, A.: Hypotheticodedutive reasoning. In: Proc. International Conference on Fifth Generation Computer Systems,Tokyo, pp. 546\u2013554 (1992)"},{"key":"14_CR19","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/3-540-45757-7_5","volume-title":"Logics in Artificial Intelligence","author":"J. Alferes","year":"2002","unstructured":"Alferes, J., Brogi, A., Leite, J., Pereira, L.: Evolving logic programs. In: Flesca, S., Greco, S., Leone, N., Ianni, G. (eds.) JELIA 2002. LNCS (LNAI), vol.\u00a02424, pp. 50\u201361. Springer, Heidelberg (2002)"},{"key":"14_CR20","first-page":"263","volume-title":"Proc. ICMAS 2000","author":"K. Satoh","year":"2000","unstructured":"Satoh, K., Inoue, K., Iwanuma, K., Sakama, C.: Speculative computation by abduction under incomplete communication environments. In: Proc. ICMAS 2000, pp. 263\u2013270. IEEE Press, Los Alamitos (2000)"},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF03037383","volume":"4","author":"R.A. Kowalski","year":"1986","unstructured":"Kowalski, R.A., Sergot, M.: A logic-based calculus of events. New Generation Computing\u00a04, 67\u201395 (1986)","journal-title":"New Generation Computing"},{"key":"14_CR22","series-title":"Series In Engineering and Computer Science","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/978-1-4615-1567-8_11","volume-title":"Logic-based Artificial Intelligence","author":"M.P. Shanahan","year":"2000","unstructured":"Shanahan, M.P.: Reinventing Shakey. In: Minker, J. (ed.) Logic-based Artificial Intelligence. Series In Engineering and Computer Science, vol.\u00a0597, pp. 233\u2013253. Kluwer Int., Dordrecht (2000)"}],"container-title":["Lecture Notes in Computer Science","AI*IA 2005: Advances in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11558590_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:48:46Z","timestamp":1605642526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11558590_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290414","9783540317333"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11558590_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}