• Publications
  • Influence
SATCHMO: A Theorem Prover Implemented in Prolog
Satchmo is a theorem prover consisting of just a few short and simple Prolog programs. Prolog may be used for representing problem clauses as well. SATCHMO is based on a model-generation paradigm. ItExpand
  • 320
  • 39
Statistical Database
A statistical database is a database used for statistical analysis purposes. It is an OLAP (online analytical processing), instead of OLTP (online transaction. Whats new? Help us improve thisExpand
  • 353
  • 37
Minimal Model Generation with Positive Unit Hyper-Resolution Tableaux
Herbrand models for clausal theories are useful in several areas of computer science. In most cases, however, the conventional model generation algorithms are inappropriate because they generateExpand
  • 94
  • 15
XPath: Looking Forward
The location path language XPath is of particular importance for XML applications since it is a core component of many XML processing standards such as XSLT or XQuery. In this paper, based on axisExpand
  • 266
  • 13
Intensional Updates: Abduction via Deduction
  • 80
  • 13
Query Evaluation in Recursive Databases
  • 77
  • 10
Human computation
Until the middle of the 20th century, a reader would have stumbled against the phrase “Human Computation” because, at that time, computers were humans carrying out calculations, not machines. BackExpand
  • 155
  • 8
Positive Unit Hyperresolution Tableaux and Their Application to Minimal Model Generation
Minimal Herbrand models of sets of first-order clauses are useful in several areas of computer science, for example, automated theorem proving, program verification, logic programming, databases, andExpand
  • 71
  • 8
Complex Event Processing (CEP)
ZusammenfassungEreignisgesteuerte Informationssysteme benötigen eine systematische und automatische Verarbeitung von Ereignissen: Complex Event Processing (CEP).
  • 83
  • 8
A Uniform Approach to Constraint Satisfaction and Constraint Satisfiability in Deductive Databases
Integrity maintenance methods have been defined for preventing updates from violating integrity constraints. Depending on the update, the full check for constraint satisfaction is reduced to checkingExpand
  • 121
  • 6