Universidade dé Evora's Integrated Information System (SIIUE) aims at representing the entire universe of concepts useful for the management and day-today operation of the Organization, as seen from the point of view of several different classes of users. It relies on ISCO, a logic programming language geared towards the development and maintenance of… (More)
GNU Prolog is a general-purpose implementation of the Prolog language, which distinguishes itself from most other systems by being, above all else, a native-code compiler which produces standalone executables which don't rely on any byte-code emulator or meta-interpreter. Other aspects which stand out include the explicit organization of the Prolog system… (More)
The current proposals for the inclusion of modules in the ISO Prolog standard are not very consensual. Since a program-structuring feature is required for a production programming language, several alternatives have been explored over the years. In this article we recall and expand on the concepts of Contextual Logic Programming, a powerful and simple… (More)
In this article we present the University of Evora's Integrated Information System (SIIUE), which is meant to model most of the information necessary for the management and day-today operation of an institution such as a public University. SIIUE is centered around a logic-based representation of all intervenients and processes, which is used to generate the… (More)
We present a parallel implementation of a constraint-based local search algorithm and investigate its performance results on hardware with several hundreds of processors. We choose as basic constraint solving algorithm for these experiments the " adaptive search " method, an efficient sequential local search method for Constraint Satisfaction Problems. The… (More)
SUMMARY We investigated the use of the Cell Broadband Engine (Cell/BE) for constraint-based local search and combinatorial optimization applications. We presented a parallel version of a constraint-based local search algorithm that was chosen because it fits very well the Cell/BE architecture because it requires neither shared memory nor communication among… (More)
The boundary between the trusted inside and the untrusted outside blurs when a company adopts cloud computing. The organization's applications-and data-are no longer onsite, fundamentally changing the definition of a malicious insider.