{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:28:12Z","timestamp":1747805292383},"publisher-location":"Boston, MA","reference-count":25,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441902207"},{"type":"electronic","value":"9781441902214"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-1-4419-0221-4_54","type":"book-chapter","created":{"date-parts":[[2009,10,3]],"date-time":"2009-10-03T08:01:49Z","timestamp":1254556909000},"page":"459-468","source":"Crossref","is-referenced-by-count":12,"title":["Learning Rules from User Behaviour"],"prefix":"10.1007","author":[{"given":"Domenico","family":"Corapi","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Alessandra","family":"Russo","sequence":"additional","affiliation":[]},{"given":"Arosha","family":"Bandara","sequence":"additional","affiliation":[]},{"given":"Emil","family":"Lupu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"54_CR1_54","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1002\/cpe.1194","volume":"20","author":"E.L.","year":"2008","unstructured":"et al., E.L.: AMUSe: Autonomic Management of Ubiquitous Systems for e-health. J. Conc. and Comp.: Practice and Experience 20(3), 277\u2013295 (2008)","journal-title":"J. Conc. and Comp.: Practice and Experience"},{"key":"54_CR2_54","unstructured":"Bandara, A., Nuseibeh, B., Price, B., Rogers, Y., Dulay, N., et al.: Privacy rights management for mobile applications. In: 4th Int. Symposium on Usable Privacy and Security. Pittsburgh (2008)"},{"key":"54_CR3_54","first-page":"ACM","volume-title":"SOUPS'05: Proc. of the 2005 symp. on Usable privacy and security","author":"C. Brodie","year":"2005","unstructured":"Brodie, C., Karat, C., Karat, J., Feng, J.: Usable security and privacy: a case study of developing privacy management tools. In: SOUPS'05: Proc. of the 2005 symp. on Usable privacy and security, pp. 35\u201343. ACM, New York, NY, USA (2005)"},{"key":"54_CR4_54","unstructured":"Cityware: Urban design and pervasive systems. http:\/\/www.cityware.org.uk \/"},{"key":"54_CR5_54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68856-3","volume-title":"Probabilistic, Logical and Relational Learning \u2014 A Further Synthesis","author":"L. Raedt De","year":"2008","unstructured":"De Raedt, L., Thomas, G., Getoor, L., Kersting, K., Muggleton, S. (eds.): Probabilistic, Logical and Relational Learning \u2014 A Further Synthesis, 15.04. \u2014 20.04.2007. IBFI, Schloss Dagstuhl, Germany (2008)"},{"issue":"4","key":"54_CR6_54","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N. Eagle","year":"2006","unstructured":"Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Personal and Ubiquitous Computing 10(4), 255\u2013268 (2006)","journal-title":"Personal and Ubiquitous Computing"},{"issue":"3","key":"54_CR7_54","doi-asserted-by":"crossref","first-page":"213","DOI":"10.3233\/IDA-2004-8302","volume":"8","author":"F. Esposito","year":"2004","unstructured":"Esposito, F., Ferilli, S., Fanizzi, N., Basile, T., Di Mauro, N.: Incremental learning and concept drift in inthelex. Intell. Data Anal. 8(3), 213\u2013237 (2004)","journal-title":"Intell. Data Anal."},{"issue":"1\u20132","key":"54_CR8_54","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1023\/A:1007638124237","volume":"38","author":"F. Esposito","year":"2000","unstructured":"Esposito, F., Semeraro, G., Fanizzi, N., Ferilli, S.: Multistrategy theory revision: Induction and Abduction in INTHELEX. Mach. Learn. 38(1\u20132), 133\u2013156 (2000)","journal-title":"Mach. Learn."},{"key":"54_CR9_54","unstructured":"Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: R. Kowalski, K. Bowen (eds.) Logic Programming, pp. 1070\u20131080. MIT Press (1988)"},{"issue":"6","key":"54_CR10_54","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1093\/logcom\/2.6.719","volume":"2","author":"A. Kakas","year":"1992","unstructured":"Kakas, A., Kowalski, R., Toni, F.: Abductive logic programming. J. Log. Comput. 2(6), 719\u2013770 (1992)","journal-title":"J. Log. Comput."},{"key":"54_CR11_54","doi-asserted-by":"crossref","unstructured":"Lloyd, J.: Foundations of Logic Programming, 2nd Edition. Springer (1987)","DOI":"10.1007\/978-3-642-83189-8"},{"key":"54_CR12_54","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s10458-008-9028-y","volume":"16","author":"J. Ma","year":"2008","unstructured":"Ma, J., Russo, A., Broda, K., Clark, K.: DARE: a system for Distributed Abductive REasoning. J. Autonomous Agents and Multi-Agent Systems 16, 271\u2013297 (2008)","journal-title":"J. Autonomous Agents and Multi-Agent Systems"},{"key":"54_CR13_54","first-page":"20742","volume-title":"An overview of nonmonotonic reasoning and logic programming","author":"J. Minker","year":"1991","unstructured":"Minker, J.: An overview of nonmonotonic reasoning and logic programming. Tech. Rep. UMIACS-TR-91-112, CS-TR-2736, University of Maryland, College Park, Maryland 20742 (August 1991)"},{"key":"54_CR14_54","unstructured":"Moyle, S.: An investigation into theory completion techniques in inductive logic. Ph.D. thesis, University of Oxford (2003)"},{"key":"54_CR15_54","doi-asserted-by":"crossref","unstructured":"Muggleton, S.: Inverse entailment and Progol. New Generation Comput. J. 13, 245\u2013286","DOI":"10.1007\/BF03037227"},{"key":"54_CR16_54","doi-asserted-by":"crossref","unstructured":"Muggleton, S.: Learning from positive data. In: 6th Int. Workshop on Inductive Logic Programming, pp. 358\u2013376. Springer Verlag, London, U.K. (1996)","DOI":"10.1007\/3-540-63494-0_65"},{"key":"54_CR17_54","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/0743-1066(94)90035-3","volume":"19\/20","author":"S. Muggleton","year":"1994","unstructured":"Muggleton, S., De Raedt, L.: Inductive logic programming: Theory and methods. J. of Logic Programming 19\/20, 629\u2013679 (1994)","journal-title":"J. of Logic Programming"},{"key":"54_CR18_54","unstructured":"Ponder2: The ponder2 policy environment. www.ponder2.net"},{"key":"54_CR19_54","doi-asserted-by":"crossref","unstructured":"Ray, O.: Nonmonotonic abductive inductive learning. In: Journal of Applied Logic. (Elsevier, in press) (2008)","DOI":"10.1016\/j.jal.2008.10.007"},{"issue":"2","key":"54_CR20_54","first-page":"95","volume":"19","author":"B. Richards","year":"1995","unstructured":"Richards, B., Mooney, R.J.: Automated refinement of first-order horn-clause domain theories. Machine Learning 19(2), 95\u2013131 (1995)","journal-title":"Machine Learning"},{"key":"54_CR21_54","first-page":"371","volume":"12","author":"A. Russo","year":"1927","unstructured":"Russo, A.: A hybrid abductive inductive proof procedure. Logic J. of the IGPL 12, 371\u2013397(27)","journal-title":"Logic J. of the IGPL"},{"key":"54_CR22_54","unstructured":"Sacca, D., Zaniolo, C.: Stable models and non-determinism in logic programs with negation"},{"key":"54_CR23_54","doi-asserted-by":"crossref","unstructured":"Shanahan, M.: The event calculus explained. In: Artificial Intelligence Today, pp. 409\u2013430 (1999)","DOI":"10.1007\/3-540-48317-9_17"},{"key":"54_CR24_54","doi-asserted-by":"crossref","unstructured":"Widmer, G.: Learning in the presence of concept drift and hidden contexts. In: Machine Learning, pp. 69\u2013101 (1996)","DOI":"10.1007\/BF00116900"},{"key":"54_CR25_54","unstructured":"Wogulis, J., Pazzani, M.: A methodology for evaluating theory revision systems: Results with Audrey II. In: 13th IJCAI, pp. 1128\u20131134 (1993)"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-0221-4_54.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T00:56:26Z","timestamp":1685148986000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-0221-4_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9781441902207","9781441902214"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-0221-4_54","relation":{},"ISSN":["1868-4238"],"issn-type":[{"type":"print","value":"1868-4238"}],"subject":[],"published":{"date-parts":[[2009]]}}}