Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9948621444402882
    Format: XV, 368 p. , online resource.
    Edition: 1st ed. 2004.
    ISBN: 9783642186905
    Content: In this era of heterogeneous and distributed data sources, ranging from semistructured documents to knowledge about coordination processes or workflows, logic provides a rich set of tools and techniques with which to address the questions of how to represent, query and reason about complex data. This book provides a state-of-the-art overview of research on the application of logic-based methods to information systems, covering highly topical and emerging fields covering XML programming and querying, intelligent agents, workflow modeling and verification, data integration, temporal and dynamic information, data mining, authorization, and security. It provides both scientists and graduate students with a wealth of material and references for their own research and education.
    Note: 1 XML: Model, Schemas, Types, Logics, and Queries -- 1.1 Introduction -- 1.2 XML Fundamentals -- 1.3 XML Schema Notations -- 1.4 Programming and Querying XML -- 1.5 The Theory of Regular Tree Languages -- 1.6 XML Query Languages versus Automata and Logic -- 1.7 Conclusion -- References -- 2 Query Answering in Inconsistent Databases -- 2.1 Introduction -- 2.2 Consistent Query Answers -- 2.3 Query Transformation -- 2.4 SpecifYing Database Repairs -- 2.5 Computational Complexity -- 2.6 Aggregation Queries -- 2.7 Related Work -- 2.8 Conclusions and Future Work -- References -- 3 Declarative Update Policies for Nonmonotonic Knowledge Bases -- 3.1 Introduction -- 3.2 Preliminaries -- 3.3 Framework and Language -- 3.4 Properties -- 3.5 Implementation and Update Agents -- 3.6 Extensions -- 3.7 Related Work -- 3.8 Conclusion -- References -- 4 Intelligent Agents: Issues and Logics -- 4.1 Introduction -- 4.2 Issues -- 4.3 Epistemic and Doxastic Logic -- 4.4 Desires and Intentions -- 4.5 Cohen and Levesque's Logic of Intention -- 4.6 BDI Logic -- 4.7 KARO Logic -- 4.8 Logics for Multi-Agent Systems -- 4.9 Conclusion -- References and Further Readings -- 5 Logic Based Approaches to Workflow Modeling and Verification -- 5.1 Introduction -- 5.2 Preliminaries -- 5.3 Modeling Workflows with Temporal Logic -- 5.4 Modeling Workflows Using Event Algebra -- 5.5 Workflow Modeling Using Concurrent Transaction Logic -- 5.6 Other Uses of Logic in Workflow Modeling -- 5.7 Conclusion -- References -- 6 Logical Data Expiration -- 6.1 Introduction -- 6.2 Framework for Data Expiration -- 6.3 Administrative Approaches to Data Expiration -- 6.4 Query-Driven Approaches to Data Expiration -- 6.5 Potentially Infinite Histories -- 6.6 Related Work -- 6.7 Conclusion -- References -- 7 Description Logics for Modeling Dynamic Information -- 7.1 Introduction -- 7.2 Conceptual Modeling of Dynamic Information -- 7.3 Description Logics -- 7.4 ERVT : A Formal Temporal Conceptual Model -- 7.5 An Object-Oriented Data Model for Evolving Schemas -- 7.6 Conclusion -- References -- 8 Logics for Authorizations and Security -- 8.1 Introduction -- 8.2 Preliminaries on Security Formalizations -- 8.3 Logic-Based Policy Specification Languages -- 8.4 Policy Evaluation and Verification -- 8.5 Other Applications of Logic to Security -- 8.6 Conclusion and Perspective -- References -- 9 Logical Languages for Data Mining -- 9.1 Introduction -- 9.2 The Search for Knowledge in Databases -- 9.3 Inductive Databases -- 9.4 Induction of Logic Programs -- 9.5 Multirelational Data Mining -- 9.6 A Vision of Convergence -- 9.7 Conclusion -- References.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783642622489
    Additional Edition: Printed edition: ISBN 9783540007050
    Additional Edition: Printed edition: ISBN 9783642186912
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages