In this paper we consider supernormal defaults [Poo88] with a strict partial order defining their priorities [Bre91]. We investigate their relation to minimal or preferential ent...
In this paper, we present an extension of the scheme HH(C) (Hereditary Harrop formulas with Constraints) with a suitable formulation of negation in order to obtain a constraint ded...
Abstract. It is well-knwon that crisp RDF is not suitable to represent vague information. Fuzzy RDF variants are emerging to overcome to this limitations. In this work we provide, ...
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
To make use of data represented on the Semantic Web, it is necessary to provide languages for Web data retrieval and evolution. This article introduces into the (conventional and S...