{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T15:10:02Z","timestamp":1747581002207,"version":"3.40.5"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2002,9,1]],"date-time":"2002-09-01T00:00:00Z","timestamp":1030838400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2002,9,1]],"date-time":"2002-09-01T00:00:00Z","timestamp":1030838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Intelligence"],"published-print":{"date-parts":[[2002,9]]},"DOI":"10.1023\/a:1016112931442","type":"journal-article","created":{"date-parts":[[2002,12,29]],"date-time":"2002-12-29T02:21:22Z","timestamp":1041128482000},"page":"187-202","source":"Crossref","is-referenced-by-count":5,"title":["Using Extended Logic Programming for Alarm-Correlation in Cellular Phone Networks"],"prefix":"10.1007","volume":"17","author":[{"given":"C.V.","family":"Dam\u00e1sio","sequence":"first","affiliation":[]},{"given":"P.","family":"Fr\u00f6hlich","sequence":"additional","affiliation":[]},{"given":"W.","family":"Nejdl","sequence":"additional","affiliation":[]},{"given":"L.M.","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"M.","family":"Schroeder","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5090795_CR1","unstructured":"P. Fr\u00f6hlich, W. Nejdl, K. Jobmann, and H. Wietgrefe, \u201cModelbased alarm correlation in cellular phone networks,\u201d in Fifth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 1997."},{"key":"5090795_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-61488-5","volume-title":"Reasoning with Logic Programming","author":"J.J. Alferes","year":"1996","unstructured":"J.J. Alferes and L.M. Pereira, Reasoning with Logic Programming, LNAI, vol. 1111, Springer-Verlag: Berlin, 1996."},{"issue":"1","key":"5090795_CR3","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/0004-3702(87)90062-2","volume":"32","author":"R. Reiter","year":"1987","unstructured":"R. Reiter, \u201cA theory of diagnosis from first principles,\u201d Artificial Intelligence, vol. 32, no. 1, pp. 57\u201396, 1987.","journal-title":"Artificial Intelligence"},{"key":"5090795_CR4","volume-title":"Proceedings of the Conference on Logic Programming and Non-Monotonic Reasoning LPNMR97","author":"C.V. Dam\u00e1sio","year":"1997","unstructured":"C.V.Dam\u00e1sio, L.M. Pereira, and M. Schroeder, \u201cREVISE: Logic programming and diagnosis,\u201d in Proceedings of the Conference on Logic Programming and Non-Monotonic Reasoning LPNMR97, LNAI, vol. 1265, Springer-Verlag: Berlin, 1997."},{"key":"5090795_CR5","volume-title":"Proceedings of the Twelfth Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems IEA\/AIE-99","author":"C. Damasio","year":"1999","unstructured":"C. Damasio, P. Froehlich, W. Nejdl, L. Pereira, and M. Schroeder, \u201cUsing extended logic programming for alarmcorrelation in cellular phone networks,\u201d in Proceedings of the Twelfth Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems IEA\/AIE-99, Cairo, Egypt, Springer-Verlag, 1999."},{"key":"5090795_CR6","volume-title":"The Art of Prolog","author":"L. Sterling","year":"1986","unstructured":"L. Sterling and E. Shapiro, The Art of Prolog. MIT Press: Cambridge, MA, 1986."},{"key":"5090795_CR7","doi-asserted-by":"crossref","unstructured":"A.V. Gelder, K. Ross, and J.S. Schlipf, \u201cUnfounded sets and well-founded semantics for general logic programs,\u201d in Proceeding of the 7th ACM Symposium on Principles of Databse Systems, Austin, Texas, 1988, pp. 221\u2013230.","DOI":"10.1145\/308386.308444"},{"key":"5090795_CR8","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/0004-3702(90)90012-O","volume":"45","author":"J. de Kleer","year":"1990","unstructured":"J. de Kleer, \u201cUsing crude probability estimates to guide diagnosis,\u201d Artificial Intelligence, vol. 45, pp. 381\u2013391, 1990.","journal-title":"Artificial Intelligence"},{"issue":"1","key":"5090795_CR9","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/0004-3702(89)90079-9","volume":"41","author":"R. Greiner","year":"1989","unstructured":"R. Greiner, B.A. Smith, and R.W. Wilkerson, \u201c'A correction of the algorithm in Reiter's theory of diagnosis,\u201d Artificial Intelligence, vol. 41, no. 1, pp. 79\u201388, 1989.","journal-title":"Artificial Intelligence"},{"issue":"3","key":"5090795_CR10","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1111\/j.1467-8640.1991.tb00388.x","volume":"7","author":"L. Console","year":"1991","unstructured":"L. Console and P. Torasso, \u201cA spectrum of logical definitions of model-based diagnosis,\u201d Computational Intelligence, vol. 7, no. 3, pp. 133\u2013141, 1991.","journal-title":"Computational Intelligence"},{"key":"5090795_CR11","first-page":"293","volume-title":"Logic and Databases","author":"K.L. Clark","year":"1978","unstructured":"K.L. Clark, \u201cNegation as failure,\u201d in: Logic and Databases, edited by Gallaire and Minker, Plenum Press: New York, 1978, pp. 293\u2013322."},{"key":"5090795_CR12","unstructured":"P. Fr\u00f6hlic and W. Nejdl, \u201cEfficient diagnosis based on incomplete system descriptions,\u201d in Proceedings of the Workshop on Nonmonotonic Reasoning NMR98, Trento, Italy, 1998."},{"key":"5090795_CR13","unstructured":"I. Mozeti\u010d and C. Holzbauer, \u201cControlling the complexity in model-based diagnosis,\u201d Annals of Mathematics and Artificial Intelligence, 1993."},{"key":"5090795_CR14","unstructured":"H. Wietgrefe, K.-D. Tuchs, K. Jobmann, G. Carls, P. Fr\u00f6hlich, W. Nejdl, and S. Steinfeld, \u201cUsing neural networks for alarm correlation in cellular phone networks,\u201d in Proceedings of International Workshop on Applications of Neural Networks in Telecommunications, 1997."}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1016112931442.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1016112931442\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1016112931442.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T14:53:14Z","timestamp":1747579994000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1016112931442"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,9]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,9]]}},"alternative-id":["5090795"],"URL":"https:\/\/doi.org\/10.1023\/a:1016112931442","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2002,9]]}}}