Difference between revisions of "List of Papers"

From BITPlan ceur-ws Wiki
Jump to navigation Jump to search
m (created by WikiTask 2020-07-21T05:35:59Z)
m (created by WikiTask 2020-08-04T04:34:03Z)
Line 13: Line 13:
 
{{#ask: [[Concept:Paper]]
 
{{#ask: [[Concept:Paper]]
 
|mainlabel=Paper
 
|mainlabel=Paper
 +
| ?Paper id = id
 
| ?Paper title = title
 
| ?Paper title = title
| ?Paper id = id
+
| ?Paper authors = authors
 +
| ?Paper pdfUrl = pdfUrl
 
| ?Paper volume = volume
 
| ?Paper volume = volume
 
| ?Paper session = session
 
| ?Paper session = session
  
 
+
|sort=Paper id
 
+
|order=ascending
 
| limit=200  
 
| limit=200  
 
}}
 
}}
Line 27: Line 29:
 
{{#ask: [[Concept:Paper]]
 
{{#ask: [[Concept:Paper]]
 
| ?#=pageid
 
| ?#=pageid
 +
| ?Paper id = id
 
| ?Paper title = title
 
| ?Paper title = title
| ?Paper id = id
+
| ?Paper authors = authors
 +
| ?Paper pdfUrl = pdfUrl
 
| ?Paper volume = volume
 
| ?Paper volume = volume
 
| ?Paper session = session
 
| ?Paper session = session

Revision as of 06:34, 4 August 2020

iconTopicnamepluralNamedocumentation
Paper-logo-64px.pngPaperPaperPapersA paper is e.g. a scholarly article

Papers

129 Papers:

PaperidtitleauthorspdfUrlvolumesession
Vol-1878/article-05Vol-1878/article-05Scholarly Social Machineshttps://ceur-ws.org/Vol-1878/article-05.pdfVol-1878
Vol-2535/paper10Vol-2535/paper10Towards a Knowledge Graph Lifecycle: A pipeline for the population of a commercial Knowledge Graphhttps://ceur-ws.org/Vol-2535/paper 10.pdfVol-2535
Vol-2599/CKG2019 paper 2Vol-2599/CKG2019_paper_2Formalizing Gremlin Pattern Matching Traversals in an Integrated Graph Algebrahttps://ceur-ws.org/Vol-2599/CKG2019 paper 2.pdfVol-2599
Vol-2599/paper5Vol-2599/paper5Private Digital Identity on Blockchainhttps://ceur-ws.org/Vol-2599/paper5.pdfVol-2599
Vol-2644/paper35Vol-2644/paper35Using PROVA-Rule Engine as Dispatching-Service for FHIR-Observation-Resourceshttps://ceur-ws.org/Vol-2644/paper35.pdfVol-2644
Vol-2644/paper44Vol-2644/paper44One-Shot Rule Learning for Challenging Character Recognitionhttps://ceur-ws.org/Vol-2644/paper44.pdfVol-2644
Vol-3113/paper1Vol-3113/paper1Towards an Experiment for Analyzing Subprocess Navigation in BPMN Tooling (short paper)https://ceur-ws.org/Vol-3113/paper1.pdfVol-3113
Vol-3170/keynoteVol-3170/keynoteDigital Twins: An Emerging Paradigm for Model-Centric Engineering (Invited Talk)https://ceur-ws.org/Vol-3170/keynote.pdfVol-3170
Vol-3170/paper1Vol-3170/paper1Formal Specification and Validation of a Data-driven Software System for Fire Risk Predictionhttps://ceur-ws.org/Vol-3170/paper1.pdfVol-3170
Vol-3170/paper10Vol-3170/paper10Probabilistic Communication Structured Acyclic Netshttps://ceur-ws.org/Vol-3170/paper10.pdfVol-3170
Vol-3170/paper11Vol-3170/paper11Towards Automatic Extraction of Events for SON Modellinghttps://ceur-ws.org/Vol-3170/paper11.pdfVol-3170
Vol-3170/paper2Vol-3170/paper2Partial Specifications of Component-Based Systems using Petri Netshttps://ceur-ws.org/Vol-3170/paper2.pdfVol-3170
Vol-3170/paper3Vol-3170/paper3Between Expressiveness and Verifiability: P/T-nets with Synchronous Channels and Modular Structurehttps://ceur-ws.org/Vol-3170/paper3.pdfVol-3170
Vol-3170/paper4Vol-3170/paper4Information Flow among Transitions of Bounded Equal-Conflict Petri Netshttps://ceur-ws.org/Vol-3170/paper4.pdfVol-3170
Vol-3170/paper5Vol-3170/paper5Analysing Adaption Processes of Hornetshttps://ceur-ws.org/Vol-3170/paper5.pdfVol-3170
Vol-3170/paper6Vol-3170/paper6On Reduction of Cycloidshttps://ceur-ws.org/Vol-3170/paper6.pdfVol-3170
Vol-3170/paper7Vol-3170/paper7EDEN Framework for Interactive Analysis of Ecosystems Modelshttps://ceur-ws.org/Vol-3170/paper7.pdfVol-3170
Vol-3170/paper8Vol-3170/paper8Analysing Multi-Agent Systems using 1-safe Petri Netshttps://ceur-ws.org/Vol-3170/paper8.pdfVol-3170
Vol-3170/paper9Vol-3170/paper9Enhancement of Renew to Version 4.0 using JPMShttps://ceur-ws.org/Vol-3170/paper9.pdfVol-3170
Vol-3170/poster1Vol-3170/poster1Adaptative Systems Based on Continuous Observation of Petri Net Product Lineshttps://ceur-ws.org/Vol-3170/poster1.pdfVol-3170
Vol-3170/poster2Vol-3170/poster2Reset Petri Net Unfolding Semantics for Ecosystem Hypergraphshttps://ceur-ws.org/Vol-3170/poster2.pdfVol-3170
Vol-3170/poster3Vol-3170/poster3Parametrisation of CSA-Netshttps://ceur-ws.org/Vol-3170/poster3.pdfVol-3170
Vol-3170/poster4Vol-3170/poster4Trace Language: Mining Micro-configurations from Process Transition Traceshttps://ceur-ws.org/Vol-3170/poster4.pdfVol-3170
Vol-3170/short1Vol-3170/short1The Chameleon Gamehttps://ceur-ws.org/Vol-3170/short1.pdfVol-3170
Vol-3184/paper3Vol-3184/paper3Enriching a Fashion Knowledge Graph from Product Textual Descriptionshttps://ceur-ws.org/Vol-3184/TEXT2KG Paper 3.pdfVol-3184
Vol-3184/paper4Vol-3184/paper4Generating Domain-Specific Knowledge Graphs: Challenges with Open Information Extractionhttps://ceur-ws.org/Vol-3184/TEXT2KG Paper 4.pdfVol-3184
Vol-3184/paper5Vol-3184/paper5Extracting Knowledge from Parliamentary Debates for Studying Political Culture and Languagehttps://ceur-ws.org/Vol-3184/TEXT2KG Paper 5.pdfVol-3184
Vol-3184/paper7Vol-3184/paper7FAIR Knowledge Graph Construction from Text, an Approach Applied to Fictional Novelshttps://ceur-ws.org/Vol-3184/TEXT2KG Paper 7.pdfVol-3184
Vol-3194/award1Vol-3194/award1Techniques for the Analysis of Conceptual Schemahttps://ceur-ws.org/Vol-3194/award1.pdfVol-3194
Vol-3194/award2Vol-3194/award2Querying Genome Databaseshttps://ceur-ws.org/Vol-3194/award2.pdfVol-3194
Vol-3194/invited1Vol-3194/invited1Runtime-Optimized Analyticshttps://ceur-ws.org/Vol-3194/invited1.pdfVol-3194
Vol-3194/invited2Vol-3194/invited2From Database Systems to Global Platforms: Cyberspace and the new Rules of Geopoliticshttps://ceur-ws.org/Vol-3194/invited2.pdfVol-3194
Vol-3194/paper1Vol-3194/paper1OpenTRIAGE: Entity Linkage for Detail Webpageshttps://ceur-ws.org/Vol-3194/paper1.pdfVol-3194
Vol-3194/paper10Vol-3194/paper10Conceptually-grounded Mapping Patterns for Virtual Knowledge Graphshttps://ceur-ws.org/Vol-3194/paper10.pdfVol-3194
Vol-3194/paper11Vol-3194/paper11Understanding RDF Data Representations in Triplestoreshttps://ceur-ws.org/Vol-3194/paper11.pdfVol-3194
Vol-3194/paper12Vol-3194/paper12The Usage of Negation in Real-World JSON Schema Documentshttps://ceur-ws.org/Vol-3194/paper12.pdfVol-3194
Vol-3194/paper13Vol-3194/paper13Energy and QoE aware Placement of Applications and Data at the Edgehttps://ceur-ws.org/Vol-3194/paper13.pdfVol-3194
Vol-3194/paper14Vol-3194/paper14SoBigData RI: European Integrated Infrastructure for Social Mining and Big Data Analyticshttps://ceur-ws.org/Vol-3194/paper14.pdfVol-3194
Vol-3194/paper15Vol-3194/paper15Workflows for Bringing Data Science on the Cloud/Edge Computing Continuumhttps://ceur-ws.org/Vol-3194/paper15.pdfVol-3194
Vol-3194/paper16Vol-3194/paper16Exploiting Curated Databases to Train Relation Extraction Models for Gene-Disease Associationshttps://ceur-ws.org/Vol-3194/paper16.pdfVol-3194
Vol-3194/paper17Vol-3194/paper17Imputation of Missing Values through Profiling Metadatahttps://ceur-ws.org/Vol-3194/paper17.pdfVol-3194
Vol-3194/paper18Vol-3194/paper18Supporting the Design of Data Preparation Pipelineshttps://ceur-ws.org/Vol-3194/paper18.pdfVol-3194
Vol-3194/paper19Vol-3194/paper19Counting Database Repairs Entailing a Query: The Case of Functional Dependencieshttps://ceur-ws.org/Vol-3194/paper19.pdfVol-3194
Vol-3194/paper2Vol-3194/paper2Extracting a Unified Database from Heterogeneous Bills of Materials via Data Integration Approacheshttps://ceur-ws.org/Vol-3194/paper2.pdfVol-3194
Vol-3194/paper20Vol-3194/paper20A Survey of Sentimental Analysis Methods on COVID-19 Researchhttps://ceur-ws.org/Vol-3194/paper20.pdfVol-3194
Vol-3194/paper21Vol-3194/paper21MAT-Builder: a System to Build Semantically Enriched Trajectorieshttps://ceur-ws.org/Vol-3194/paper21.pdfVol-3194
Vol-3194/paper22Vol-3194/paper22A Network-based Model and a Related Approach to Represent and Handle the Semantics of Comments in a Social Networkhttps://ceur-ws.org/Vol-3194/paper22.pdfVol-3194
Vol-3194/paper23Vol-3194/paper23Explaining Link Prediction with Kelpiehttps://ceur-ws.org/Vol-3194/paper23.pdfVol-3194
Vol-3194/paper24Vol-3194/paper24Predicting Vehicles Parking Behaviour for EV Recharge Optimizationhttps://ceur-ws.org/Vol-3194/paper24.pdfVol-3194
Vol-3194/paper25Vol-3194/paper25Discovering the Landscape of Decentralized Online Social Networks through Mastodonhttps://ceur-ws.org/Vol-3194/paper25.pdfVol-3194
Vol-3194/paper27Vol-3194/paper27Extracting Large Scale Spatio-Temporal Descriptions from Social Mediahttps://ceur-ws.org/Vol-3194/paper27.pdfVol-3194
Vol-3194/paper28Vol-3194/paper28Online News Event Extraction for Crime Analysishttps://ceur-ws.org/Vol-3194/paper28.pdfVol-3194
Vol-3194/paper29Vol-3194/paper29Semantic Shift Detection in Vatican Publications: a Case Study from Leo XIII to Francishttps://ceur-ws.org/Vol-3194/paper29.pdfVol-3194
Vol-3194/paper3Vol-3194/paper3Towards an Italian Energy Data Spacehttps://ceur-ws.org/Vol-3194/paper3.pdfVol-3194
Vol-3194/paper30Vol-3194/paper30Shared Metrics of Sustainability: a Knowledge Graph Approachhttps://ceur-ws.org/Vol-3194/paper30.pdfVol-3194
Vol-3194/paper31Vol-3194/paper31LPG-based Ontologies as Schemas for Graph DBshttps://ceur-ws.org/Vol-3194/paper31.pdfVol-3194
Vol-3194/paper32Vol-3194/paper32A Topological Perspective of Port Networks From Three Years (2017-2019) of AIS Datahttps://ceur-ws.org/Vol-3194/paper32.pdfVol-3194
Vol-3194/paper33Vol-3194/paper33Expanding the Citation Graph for Data Citationshttps://ceur-ws.org/Vol-3194/paper33.pdfVol-3194
Vol-3194/paper34Vol-3194/paper34Active Integrity Constraints with Existential Quantificationhttps://ceur-ws.org/Vol-3194/paper34.pdfVol-3194
Vol-3194/paper35Vol-3194/paper35Reasoning in Warded Datalog+/- with Harmful Joinshttps://ceur-ws.org/Vol-3194/paper35.pdfVol-3194
Vol-3194/paper36Vol-3194/paper36An Overview of Vadalog: a System for Reasoning over Large Knowledge Graphshttps://ceur-ws.org/Vol-3194/paper36.pdfVol-3194
Vol-3194/paper37Vol-3194/paper37Reasoning about Smart Contracts via LTL Encodinghttps://ceur-ws.org/Vol-3194/paper37.pdfVol-3194
Vol-3194/paper38Vol-3194/paper38Decentralized Federated Learning and Network Topologies: an Empirical Study on Convergencehttps://ceur-ws.org/Vol-3194/paper38.pdfVol-3194
Vol-3194/paper39Vol-3194/paper39Mapping and Compressing a Convolutional Neural Network through a Multilayer Networkhttps://ceur-ws.org/Vol-3194/paper39.pdfVol-3194
Vol-3194/paper4Vol-3194/paper4Describing Multidimensional Data Through Highlightshttps://ceur-ws.org/Vol-3194/paper4.pdfVol-3194
Vol-3194/paper40Vol-3194/paper40Ambiguity Detection and Textual Claims Generation from Relational Datahttps://ceur-ws.org/Vol-3194/paper40.pdfVol-3194
Vol-3194/paper41Vol-3194/paper41Generating Synthetic Discrete Datasets with Machine Learninghttps://ceur-ws.org/Vol-3194/paper41.pdfVol-3194
Vol-3194/paper42Vol-3194/paper42Distributed Heterogeneous Transfer Learninghttps://ceur-ws.org/Vol-3194/paper42.pdfVol-3194
Vol-3194/paper43Vol-3194/paper43Multiple Instance Learning for viral pneumonia chest X-ray Classificationhttps://ceur-ws.org/Vol-3194/paper43.pdfVol-3194
Vol-3194/paper44Vol-3194/paper44Towards Extreme Multi-Label Classification of Multimedia Contenthttps://ceur-ws.org/Vol-3194/paper44.pdfVol-3194
Vol-3194/paper45Vol-3194/paper45Improving Conversational Evaluation via a Dependency-Aware Permutation Strategyhttps://ceur-ws.org/Vol-3194/paper45.pdfVol-3194
Vol-3194/paper46Vol-3194/paper46Attributed Stream-Hypernetwork Analysis: a SocioPatterns Case Studyhttps://ceur-ws.org/Vol-3194/paper46.pdfVol-3194
Vol-3194/paper47Vol-3194/paper47Data–Driven, AI–Based Clinical Practice: Experiences, Challenges, and Research Directionshttps://ceur-ws.org/Vol-3194/paper47.pdfVol-3194
Vol-3194/paper48Vol-3194/paper48Supporting Big Moving Objects Tracking and Analysis: An Innovative Scan-Matching Algorithmhttps://ceur-ws.org/Vol-3194/paper48.pdfVol-3194
Vol-3194/paper49Vol-3194/paper49Investigating Binary Partition Power in Metric Queryhttps://ceur-ws.org/Vol-3194/paper49.pdfVol-3194
Vol-3194/paper5Vol-3194/paper5A Multi-Perspective Data Model for Cyber Physical Production Networkshttps://ceur-ws.org/Vol-3194/paper5.pdfVol-3194
Vol-3194/paper50Vol-3194/paper50Annotating Protein Structures for Understanding SARS-CoV-2 Interactomehttps://ceur-ws.org/Vol-3194/paper50.pdfVol-3194
Vol-3194/paper51Vol-3194/paper51In-Vehicle Big Data Exploration for Road Maintenancehttps://ceur-ws.org/Vol-3194/paper51.pdfVol-3194
Vol-3194/paper52Vol-3194/paper52Correlation Clustering: from Local to Global Constraintshttps://ceur-ws.org/Vol-3194/paper52.pdfVol-3194
Vol-3194/paper53Vol-3194/paper53SiMBA: Systematic Clustering-Based Methodology to Support Built Environment Analysishttps://ceur-ws.org/Vol-3194/paper53.pdfVol-3194
Vol-3194/paper54Vol-3194/paper54Clustered Majority Judgementhttps://ceur-ws.org/Vol-3194/paper54.pdfVol-3194
Vol-3194/paper55Vol-3194/paper55Helping Wine Lovers With Taxonomieshttps://ceur-ws.org/Vol-3194/paper55.pdfVol-3194
Vol-3194/paper56Vol-3194/paper56Query Answer Explanations under Existential Ruleshttps://ceur-ws.org/Vol-3194/paper56.pdfVol-3194
Vol-3194/paper57Vol-3194/paper57Explanations for Inconsistency-Tolerant Query Answering under Existential Ruleshttps://ceur-ws.org/Vol-3194/paper57.pdfVol-3194
Vol-3194/paper58Vol-3194/paper58Personalized Context-Aware Recommender System for Travelershttps://ceur-ws.org/Vol-3194/paper58.pdfVol-3194
Vol-3194/paper59Vol-3194/paper59Inferring User Decision-Making Processes in Recommender Systems with Knowledge Graphshttps://ceur-ws.org/Vol-3194/paper59.pdfVol-3194
Vol-3194/paper6Vol-3194/paper6Progressive Entity Resolution with Node Embeddingshttps://ceur-ws.org/Vol-3194/paper6.pdfVol-3194
Vol-3194/paper60Vol-3194/paper60The Challenging Reproducibility Task in Recommender Systems Research between Traditional and Deep Learning Modelshttps://ceur-ws.org/Vol-3194/paper60.pdfVol-3194
Vol-3194/paper61Vol-3194/paper61Investigating Monotone Abstractionshttps://ceur-ws.org/Vol-3194/paper61.pdfVol-3194
Vol-3194/paper62Vol-3194/paper62Complexity of Inconsistency-Tolerant Query Answering in Datalog+/- under Cardinality-Based Repairshttps://ceur-ws.org/Vol-3194/paper62.pdfVol-3194
Vol-3194/paper63Vol-3194/paper63SoCRATe: a Framework for Compensating Users Over Time with Limited Availability Recommendationshttps://ceur-ws.org/Vol-3194/paper63.pdfVol-3194
Vol-3194/paper64Vol-3194/paper64Credit Score Prediction Relying on Machine Learninghttps://ceur-ws.org/Vol-3194/paper64.pdfVol-3194
Vol-3194/paper65Vol-3194/paper65Bias Score: Estimating Gender Bias in Sentence Representationshttps://ceur-ws.org/Vol-3194/paper65.pdfVol-3194
Vol-3194/paper66Vol-3194/paper66Functional Dependencies to Mitigate Data Biashttps://ceur-ws.org/Vol-3194/paper66.pdfVol-3194
Vol-3194/paper67Vol-3194/paper67Accounting for Bossy Users in Context-Aware Group Recommendationshttps://ceur-ws.org/Vol-3194/paper67.pdfVol-3194
Vol-3194/paper68Vol-3194/paper68Gender Discriminatory Language Identification with an Hybrid Algorithm based on Syntactic Rules and Machine Learninghttps://ceur-ws.org/Vol-3194/paper68.pdfVol-3194
Vol-3194/paper69Vol-3194/paper69A Federated Cloud Solution for Transnational Mobility Data Sharinghttps://ceur-ws.org/Vol-3194/paper69.pdfVol-3194
Vol-3194/paper7Vol-3194/paper7Active E-Learning by Doing with ALDOhttps://ceur-ws.org/Vol-3194/paper7.pdfVol-3194
Vol-3194/paper70Vol-3194/paper70Cross-Social Network Investigation to Highlight Privacy Violations in Data Sharing Activitieshttps://ceur-ws.org/Vol-3194/paper70.pdfVol-3194
Vol-3194/paper71Vol-3194/paper71Risk Analysis for Unsupervised Privacy-Preserving Toolshttps://ceur-ws.org/Vol-3194/paper71.pdfVol-3194
Vol-3194/paper72Vol-3194/paper72Recent Advancements on Bio-Inspired Hebbian Learning for Deep Neural Networkshttps://ceur-ws.org/Vol-3194/paper72.pdfVol-3194
Vol-3194/paper73Vol-3194/paper73A Research on Data Lakes and their Integration Challengeshttps://ceur-ws.org/Vol-3194/paper73.pdfVol-3194
Vol-3194/paper74Vol-3194/paper74An XAI Framework for Automated Allocation and Exploitation of Resourceshttps://ceur-ws.org/Vol-3194/paper74.pdfVol-3194
Vol-3194/paper75Vol-3194/paper75Task-Driven Big Data Integrationhttps://ceur-ws.org/Vol-3194/paper75.pdfVol-3194
Vol-3194/paper8Vol-3194/paper8Landmark Explanation: a Tool for Entity Matchinghttps://ceur-ws.org/Vol-3194/paper8.pdfVol-3194
Vol-3194/paper9Vol-3194/paper9Automatic Information Extraction from Investment Product Documentshttps://ceur-ws.org/Vol-3194/paper9.pdfVol-3194
Vol-3194/tutorialVol-3194/tutorialA Pragmatic Approach to Neural Information Retrievalhttps://ceur-ws.org/Vol-3194/tutorial.pdfVol-3194
Vol-3197/invited1Vol-3197/invited1Hybrid Answer Set Programming: Opportunities and Challengeshttps://ceur-ws.org/Vol-3197/invited1.pdfVol-3197
Vol-3197/invited2Vol-3197/invited2Rectifying Classifiershttps://ceur-ws.org/Vol-3197/invited2.pdfVol-3197
Vol-3197/invited3Vol-3197/invited3Fallacious Arguments: the Place where Knowledge Representation and Argument Mining Meet Each Otherhttps://ceur-ws.org/Vol-3197/invited3.pdfVol-3197
Vol-3197/paper1Vol-3197/paper1Towards Legally and Ethically Correct Online HTN Planning for Data Transferhttps://ceur-ws.org/Vol-3197/paper1.pdfVol-3197
Vol-3197/paper10Vol-3197/paper10A Situation-Calculus Model of Knowledge and Belief Based on Thinking About Justificationshttps://ceur-ws.org/Vol-3197/paper10.pdfVol-3197
Vol-3197/paper11Vol-3197/paper11There and Back Again: Combining Non-monotonic Logical Reasoning and Deep Learning on an Assistive Robothttps://ceur-ws.org/Vol-3197/paper11.pdfVol-3197
Vol-3197/paper12Vol-3197/paper12From Weighted Conditionals with Typicality to a Gradual Argumentation Semantics and Backhttps://ceur-ws.org/Vol-3197/paper12.pdfVol-3197
Vol-3197/paper2Vol-3197/paper2Repairing Ontologies via Kernel Pseudo-Contractionhttps://ceur-ws.org/Vol-3197/paper2.pdfVol-3197
Vol-3197/paper3Vol-3197/paper3The Effect of Preferences in Abstract Argumentation Under a Claim-Centric Viewhttps://ceur-ws.org/Vol-3197/paper3.pdfVol-3197
Vol-3197/paper4Vol-3197/paper4Trust Graphs for Belief Revision: Framework and Implementationhttps://ceur-ws.org/Vol-3197/paper4.pdfVol-3197
Vol-3197/paper5Vol-3197/paper5Bipolar Argumentation Frameworks with Explicit Conclusions: Connecting Argumentation and Logic Programminghttps://ceur-ws.org/Vol-3197/paper5.pdfVol-3197
Vol-3197/paper6Vol-3197/paper6Conditional Syntax Splitting, Lexicographic Entailment and the Drowning Effecthttps://ceur-ws.org/Vol-3197/paper6.pdfVol-3197
Vol-3197/paper7Vol-3197/paper7Modelling Agents Roles in the Epistemic Logic L-DINFhttps://ceur-ws.org/Vol-3197/paper7.pdfVol-3197
Vol-3197/paper8Vol-3197/paper8Truth-Tracking with Non-Expert Information Sourceshttps://ceur-ws.org/Vol-3197/paper8.pdfVol-3197
Vol-3197/paper9Vol-3197/paper9Argumentation Frameworks Induced by Assumption-Based Argumentation: Relating Size and Complexityhttps://ceur-ws.org/Vol-3197/paper9.pdfVol-3197
Vol-3197/short1Vol-3197/short1Asking Human Reasoners to Judge Postulates of Belief Change for Plausibilityhttps://ceur-ws.org/Vol-3197/short1.pdfVol-3197
Vol-3197/short2Vol-3197/short2Abductive Reasoning with Sequent-Based Argumentationhttps://ceur-ws.org/Vol-3197/short2.pdfVol-3197
Vol-3197/short3Vol-3197/short3On Some Weakened Forms of Transitivity in the Logic of Normshttps://ceur-ws.org/Vol-3197/short3.pdfVol-3197
Vol-3197/short4Vol-3197/short4Situated Conditionals - A Brief Introductionhttps://ceur-ws.org/Vol-3197/short4.pdfVol-3197
Vol-3197/short5Vol-3197/short5Defeasible Reasoning in RDFShttps://ceur-ws.org/Vol-3197/short5.pdfVol-3197
Vol-3197/short6Vol-3197/short6Rational Defeasible Subsumption in DLs with Nested Quantifiers: the Case of ELI⊥https://ceur-ws.org/Vol-3197/short6.pdfVol-3197
Vol-3355/richardnordsieckVol-3355/richardnordsieckTowards Models of Conceptual and Procedural Operator Knowledgehttps://ceur-ws.org/Vol-3355/richardnordsieck.pdfVol-3355

Category:Paper