{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:18:49Z","timestamp":1725830329829},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319242453"},{"type":"electronic","value":"9783319242460"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24246-0_19","type":"book-chapter","created":{"date-parts":[[2015,9,19]],"date-time":"2015-09-19T00:20:53Z","timestamp":1442622053000},"page":"307-322","source":"Crossref","is-referenced-by-count":0,"title":["Combining Forward and Backward Propagation"],"prefix":"10.1007","author":[{"given":"Amira","family":"Zaki","sequence":"first","affiliation":[]},{"given":"Slim","family":"Abdennadher","sequence":"additional","affiliation":[]},{"given":"Thom","family":"Fr\u00fchwirth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"19_CR1","series-title":"ASC","first-page":"141","volume-title":"FQAS 2000","author":"S. Abdennadher","year":"2000","unstructured":"Abdennadher, S., Christiansen, H.: An experimental CLP platform for integrity constraints and abduction. In: Larsen, H.L., Andreasen, T., Christiansen, H., Kacprzyk, J., Zadro\u017cny, S. (eds.) FQAS 2000. ASC, vol.\u00a01, pp. 141\u2013152. Springer, Heidelberg (2000)"},{"key":"19_CR2","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0055987","volume-title":"Flexible Query Answering Systems","author":"S. Abdennadher","year":"1998","unstructured":"Abdennadher, S., Sch\u00fctz, H.: CHR \n                      \n                        \n                      \n                      $^\\lor $\n                    : A flexible query language. In: Andreasen, T., Christiansen, H., Larsen, H.L. (eds.) FQAS 1998. LNCS (LNAI), vol.\u00a01495, pp. 1\u201314. Springer, Heidelberg (1998)"},{"issue":"5","key":"19_CR3","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1093\/logcom\/1.5.661","volume":"1","author":"L. Console","year":"1991","unstructured":"Console, L., Dupr, D.T., Torasso, P.: On the relationship between abduction and deduction. J. Log. Comput.\u00a01(5), 661\u2013690 (1991)","journal-title":"J. Log. Comput."},{"key":"19_CR4","unstructured":"De Koninck, L., Schrijvers, T., Demoen, B.: Search strategies in CHR(Prolog). In: Schrijvers, T., Fr\u00fchwirth, Th. (eds.) Proceedings of the 3rd Workshop on Constraint Handling Rule, pp. 109\u2013124. K.U.Leuven, Department of Computer Science, Technical report CW 452 (2006)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-27775-0_7","volume-title":"Logic Programming","author":"G.J. Duck","year":"2004","unstructured":"Duck, G.J., Stuckey, P.J., de la Banda, M.G., Holzbaur, C.: The refined operational semantics of constraint handling rules. In: Demoen, B., Lifschitz, V. (eds.) ICLP 2004. LNCS, vol.\u00a03132, pp. 90\u2013104. Springer, Heidelberg (2004)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-319-17822-6_4","volume-title":"Logic-Based Program Synthesis and Transformation","author":"A. Elsawy","year":"2015","unstructured":"Elsawy, A., Zaki, A., Abdennadher, S.: Exhaustive execution of chr through source-to-source transformation. In: Proietti, M., Seki, H. (eds.) LOPSTR 2014. LNCS, vol.\u00a08981, pp. 59\u201373. Springer, Heidelberg (2015)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Fr\u00fchwirth, T.: Constraint Handling Rules. Cambridge University Press (2009)","DOI":"10.1017\/CBO9780511609886"},{"key":"19_CR8","unstructured":"Fr\u00fchwirth, T., Holzbaur, C.: Source-to-source transformation for a class of expressive rules. In: Buccafurri, F. (ed.) Joint Conference on Declarative Programming APPIA-GULP-PRODE 2003 (AGP 2003), pp. 386\u2013397 (2003)"},{"key":"19_CR9","unstructured":"Fr\u00fchwirth, T., Raiser, F. (eds.): Constraint Handling Rules: Compilation, Execution, and Analysis. Books on Demand, March 2011"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Haemmerl\u00e9, R.: On combining backward and forward chaining in constraint logic programming. In: Proceedings of 16th International Symposium on Principles and Practice of Declarative Programming (PPDP 2014) (2014)","DOI":"10.1145\/2643135.2643144"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-28652-0_5","volume-title":"Compiler Construction","author":"C. Hou","year":"2012","unstructured":"Hou, C., Vulov, G., Quinlan, D., Jefferson, D., Fujimoto, R., Vuduc, R.: A new method for program inversion. In: O\u2019Boyle, M. (ed.) CC 2012. LNCS, vol.\u00a07210, pp. 81\u2013100. Springer, Heidelberg (2012)"},{"issue":"1","key":"19_CR12","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1093\/jigpal\/4.1.95","volume":"4","author":"M.C. Mayer","year":"1996","unstructured":"Mayer, M.C., Pirri, F.: Abduction is not deduction-in-reverse. Logic Journal of the IGPL\u00a04(1), 95\u2013108 (1996)","journal-title":"Logic Journal of the IGPL"},{"key":"19_CR13","unstructured":"Peirce, C.S.: Collected Papers of Charles Sanders Peirce, vol.\u00a02. Harvard University Press (1931)"},{"key":"19_CR14","first-page":"127","volume":"6","author":"I.S. Pohl","year":"1971","unstructured":"Pohl, I.S.: Bi-directional search. Machine Intelligence\u00a06, 127\u2013140 (1971)","journal-title":"Machine Intelligence"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Sneyers, J., Van Weert, P., Schrijvers, T., De Koninck, L.: As time goes by: constraint handling rules \u2013 a survey of CHR research between 1998 and 2007. In: Theory and Practice of Logic Programming, pp. 1\u201347 (2010)","DOI":"10.1017\/S1471068409990123"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Yokoyama, T.: Reversible computation and reversible programming languages. Electronic Notes in Theoretical Computer Science\u00a0253(6), 71\u201381 (2009). Proceedings of the Workshop on Reversible Computation (RC 2009)","DOI":"10.1016\/j.entcs.2010.02.007"},{"key":"19_CR17","unstructured":"Zaki, A., Fr\u00fchwirth, T.W., Abdennadher, S.: Towards inverse execution of constraint handling rules. In: Theory and Practice of Logic Programming, 13(4-5-Online-Supplement) (2013)"}],"container-title":["Lecture Notes in Computer Science","Frontiers of Combining Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24246-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:36:49Z","timestamp":1559248609000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24246-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319242453","9783319242460"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24246-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}