{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:34:30Z","timestamp":1725536070478},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642028458"},{"type":"electronic","value":"9783642028465"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02846-5_32","type":"book-chapter","created":{"date-parts":[[2009,7,20]],"date-time":"2009-07-20T06:44:16Z","timestamp":1248072256000},"page":"387-401","source":"Crossref","is-referenced-by-count":3,"title":["Integration of Abductive Reasoning and Constraint Optimization in SCIFF"],"prefix":"10.1007","author":[{"given":"Marco","family":"Gavanelli","sequence":"first","affiliation":[]},{"given":"Marco","family":"Alberti","sequence":"additional","affiliation":[]},{"given":"Evelina","family":"Lamma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","first-page":"235","volume-title":"Handbook of Logic in Artificial Intelligence and Logic Programming","author":"A.C. Kakas","year":"1998","unstructured":"Kakas, A.C., Kowalski, R.A., Toni, F.: The role of abduction in logic programming. In: Gabbay, D.M., Hogger, C.J., Robinson, J.A. (eds.) Handbook of Logic in Artificial Intelligence and Logic Programming, vol.\u00a05, pp. 235\u2013324. Oxford University Press, Oxford (1998)"},{"key":"32_CR2","unstructured":"Eshghi, K., Kowalski, R.A.: Abduction compared with negation by failure. In: Levi, G., Martelli, M. (eds.) ICLP 1989, pp. 234\u2013255 (1989)"},{"key":"32_CR3","unstructured":"Eshghi, K.: Abductive planning with the event calculus. In: ICLP 1988 (1988)"},{"key":"32_CR4","unstructured":"Kakas, A.C., Mancarella, P.: On the relation between Truth Maintenance and Abduction. In: Fukumura, T. (ed.) Proc. 1st Pacific Rim Int. Conf. on Artificial Intelligence, PRICAI (1990)"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/S0743-1066(97)00074-5","volume":"34","author":"M. Denecker","year":"1998","unstructured":"Denecker, M., De Schreye, D.: SLDNFA: an abductive procedure for abductive logic programs. Journal of Logic Programming\u00a034, 111\u2013167 (1998)","journal-title":"Journal of Logic Programming"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/S0743-1066(99)00075-8","volume":"44","author":"A.C. Kakas","year":"2000","unstructured":"Kakas, A.C., Michael, A., Mourlas, C.: ACLP: Abductive Constraint Logic Programming. Journal of Logic Programming\u00a044, 129\u2013177 (2000)","journal-title":"Journal of Logic Programming"},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S0743-1066(97)00026-5","volume":"33","author":"T.H. Fung","year":"1997","unstructured":"Fung, T.H., Kowalski, R.A.: The IFF proof procedure for abductive logic programming. Journal of Logic Programming\u00a033, 151\u2013165 (1997)","journal-title":"Journal of Logic Programming"},{"key":"32_CR8","unstructured":"Kakas, A.C., van Nuffelen, B., Denecker, M.: \n                    \n                      \n                    \n                    ${\\cal A}$\n                  -System: Problem solving through abduction. In: Nebel, B. (ed.) Proc. of IJCAI 2001, pp. 591\u2013596 (2001)"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Alferes, J., Pereira, L., Swift, T.: Abduction in well-founded semantics and generalized stable models via tabled dual programs. Theory and Practice of Logic Programming\u00a04 (2004)","DOI":"10.1017\/S1471068403001960"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-30227-8_6","volume-title":"Logics in Artificial Intelligence","author":"U. Endriss","year":"2004","unstructured":"Endriss, U., Mancarella, P., Sadri, F., Terreni, G., Toni, F.: The CIFF proof procedure for abductive logic programming with constraints. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS, vol.\u00a03229, pp. 31\u201343. Springer, Heidelberg (2004)"},{"key":"32_CR11","unstructured":"van Nuffelen, B., Denecker, M.: Problem solving in ID-logic with aggregates. In: Proc. 8th Int. Workshop on Non-Monotonic Reasoning, NMR 2000, pp. 1\u20139 (2000)"},{"key":"32_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Principles and Practice of Constraint Programming - CP\u201996","author":"F. Fages","year":"1996","unstructured":"Fages, F.: From constraint minimization to goal optimization in CLP languages. In: Freuder, E. (ed.) CP 1996. LNCS, vol.\u00a01118. Springer, Heidelberg (1996)"},{"key":"32_CR13","unstructured":"Marriott, K., Stuckey, P.: Semantics of constraint logic programs with optimization. In: A\u00eft-Kaci, H., Hanus, M., Moreno-Navarro, J. (eds.) ICLP Workshop: Integration of Declarative Paradigms, pp. 23\u201335 (1994)"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Verifiable agent interaction in abductive logic programming: The SCIFF framework. ACM Transactions on Computational Logic\u00a09 (2008)","DOI":"10.1145\/1380572.1380578"},{"key":"32_CR15","unstructured":"Gavanelli, M., Alberti, M., Lamma, E.: Integrating abduction and constraint optimization in constraint handling rules. In: Ghallab, M., Spyropoulos, C.D., Fakotakis, N., Avouris, N. (eds.) ECAI 2008: 18th European Conference on Artificial Intelligence, pp. 903\u2013904 (2008)"},{"key":"32_CR16","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/S0743-1066(98)10005-5","volume":"37","author":"T. Fr\u00fchwirth","year":"1998","unstructured":"Fr\u00fchwirth, T.: Theory and practice of constraint handling rules. Journal of Logic Programming\u00a037, 95\u2013138 (1998)","journal-title":"Journal of Logic Programming"},{"key":"32_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11562931_14","volume-title":"Logic Programming","author":"H. Christiansen","year":"2005","unstructured":"Christiansen, H., Dahl, V.: HYPROLOG: A new logic programming language with assumptions and abduction. In: Gabbrielli, M., Gupta, G. (eds.) ICLP 2005. LNCS, vol.\u00a03668, pp. 159\u2013173. Springer, Heidelberg (2005)"},{"key":"32_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/3-540-45422-5_6","volume-title":"KI 2001: Advances in Artificial Intelligence","author":"L. Badea","year":"2001","unstructured":"Badea, L., Tilivea, D.: Abductive partial order planning with dependent fluents. In: Baader, F., Brewka, G., Eiter, T. (eds.) KI 2001. LNCS, vol.\u00a02174, pp. 63\u201377. Springer, Heidelberg (2001)"},{"key":"32_CR19","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/0743-1066(94)90033-7","volume":"19-20","author":"J. Jaffar","year":"1994","unstructured":"Jaffar, J., Maher, M.: Constraint logic programming: a survey. Journal of Logic Programming\u00a019-20, 503\u2013582 (1994)","journal-title":"Journal of Logic Programming"},{"key":"32_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-30227-8_19","volume-title":"Logics in Artificial Intelligence","author":"W. Faber","year":"2004","unstructured":"Faber, W., Leone, N., Pfeifer, G.: Recursive aggregates in disjunctive logic programs: Semantics and complexity. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS, vol.\u00a03229, pp. 200\u2013212. Springer, Heidelberg (2004)"},{"key":"32_CR21","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/S0743-1066(85)80005-4","volume":"2","author":"M. Fitting","year":"1985","unstructured":"Fitting, M.: A Kripke-Kleene semantics for logic programs. Journal of Logic Programming\u00a02, 295\u2013312 (1985)","journal-title":"Journal of Logic Programming"},{"key":"32_CR22","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/0743-1066(87)90007-0","volume":"4","author":"K. Kunen","year":"1987","unstructured":"Kunen, K.: Negation in logic programming. Journal of Logic Programming\u00a04, 289\u2013308 (1987)","journal-title":"Journal of Logic Programming"},{"key":"32_CR23","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/0743-1066(94)90024-8","volume":"19\/20","author":"K.R. Apt","year":"1994","unstructured":"Apt, K.R., Bol, R.N.: Logic programming and negation: a survey. Journal of Logic Programming\u00a019\/20, 9\u201371 (1994)","journal-title":"Journal of Logic Programming"},{"key":"32_CR24","series-title":"Lecture Notes in Computer Science","first-page":"141","volume-title":"FQAS, Flexible Query Answering Systems","author":"S. Abdennadher","year":"2000","unstructured":"Abdennadher, S., Christiansen, H.: An experimental CLP platform for integrity constraints and abduction. In: Larsen, H., Kacprzyk, J., Zadrozny, S., Andreasen, T., Christiansen, H. (eds.) FQAS, Flexible Query Answering Systems. LNCS, pp. 141\u2013152. Springer, Heidelberg (2000)"},{"key":"32_CR25","unstructured":"Gavanelli, M., Lamma, E., Mello, P., Milano, M., Torroni, P.: Interpreting abduction in CLP. In: Buccafurri, F. (ed.) APPIA-GULP-PRODE Joint Conference on Declarative Programming, Reggio Calabria, Italy, Universit\u00e0 Mediterranea di Reggio Calabria, pp. 25\u201335 (2003)"},{"key":"32_CR26","first-page":"1","volume":"8","author":"M. Alberti","year":"2007","unstructured":"Alberti, M., Chesani, F., Daolio, D., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Specification and verification of agent interaction protocols in a logic-based system. Scalable Computing: Practice and Experience\u00a08, 1\u201313 (2007)","journal-title":"Scalable Computing: Practice and Experience"}],"container-title":["Lecture Notes in Computer Science","Logic Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02846-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T01:45:13Z","timestamp":1552095913000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02846-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642028458","9783642028465"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02846-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}