callback( { "result":{ "query":":facetid:toc:\"db/conf/ismis/ismis96.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"63.17" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"64", "@dc":"64", "@oc":"64", "@id":"43396480", "text":":facetid:toc:db/conf/ismis/ismis96.bht" } }, "hits":{ "@total":"64", "@computed":"64", "@sent":"64", "@first":"0", "hit":[{ "@score":"1", "@id":"6716376", "info":{"authors":{"author":[{"@pid":"b/ThomasBack","text":"Thomas Bäck"},{"@pid":"81/1945","text":"Martin Schütz"}]},"title":"Intelligent Mutation Rate Control in Canonical Genetic Algorithms.","venue":"ISMIS","pages":"158-167","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/BackS96","doi":"10.1007/3-540-61286-6_141","ee":"https://doi.org/10.1007/3-540-61286-6_141","url":"https://dblp.org/rec/conf/ismis/BackS96"}, "url":"URL#6716376" }, { "@score":"1", "@id":"6716377", "info":{"authors":{"author":[{"@pid":"37/1026","text":"Jerzy W. Bala"},{"@pid":"p/PeterWPachowicz","text":"Peter Pachowicz"},{"@pid":"w/HarryWechsler","text":"Harry Wechsler"}]},"title":"Learning with Noise in Engineering Domains.","venue":"ISMIS","pages":"633-642","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/BalaPW96","doi":"10.1007/3-540-61286-6_187","ee":"https://doi.org/10.1007/3-540-61286-6_187","url":"https://dblp.org/rec/conf/ismis/BalaPW96"}, "url":"URL#6716377" }, { "@score":"1", "@id":"6716378", "info":{"authors":{"author":[{"@pid":"b/LEBertossi","text":"Leopoldo E. Bertossi"},{"@pid":"55/1688","text":"Javier Pinto"},{"@pid":"58/3141","text":"Pablo Sáez"},{"@pid":"k/DeepakKapur","text":"Deepak Kapur"},{"@pid":"s/MSubramaniam","text":"Mahadevan Subramaniam"}]},"title":"Automating Proofs of Integrity Constraints in Situation Calculus.","venue":"ISMIS","pages":"212-222","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/BertossiPSKS96","doi":"10.1007/3-540-61286-6_146","ee":"https://doi.org/10.1007/3-540-61286-6_146","url":"https://dblp.org/rec/conf/ismis/BertossiPSKS96"}, "url":"URL#6716378" }, { "@score":"1", "@id":"6716379", "info":{"authors":{"author":[{"@pid":"69/6136","text":"Hendrik Blockeel"},{"@pid":"r/LucDeRaedt","text":"Luc De Raedt"}]},"title":"Inductive Database Design.","venue":"ISMIS","pages":"376-385","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/BlockeelR96","doi":"10.1007/3-540-61286-6_162","ee":"https://doi.org/10.1007/3-540-61286-6_162","url":"https://dblp.org/rec/conf/ismis/BlockeelR96"}, "url":"URL#6716379" }, { "@score":"1", "@id":"6716380", "info":{"authors":{"author":[{"@pid":"06/5614","text":"Eric Bloedorn"},{"@pid":"72/6710","text":"Ryszard S. Michalski"}]},"title":"The AQ17-DCI System for Data-Driven Constructive Induction and its Application to the Analysis of World Economics.","venue":"ISMIS","pages":"108-117","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/BloedornM96","doi":"10.1007/3-540-61286-6_136","ee":"https://doi.org/10.1007/3-540-61286-6_136","url":"https://dblp.org/rec/conf/ismis/BloedornM96"}, "url":"URL#6716380" }, { "@score":"1", "@id":"6716381", "info":{"authors":{"author":[{"@pid":"35/1229","text":"Patrick Bosc"},{"@pid":"08/545","text":"Olivier Pivert"}]},"title":"On the Handling of Imperfect Data in Relational Database Systems - From Null Values to Possibility Distributions.","venue":"ISMIS","pages":"408-417","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/BoscP96","doi":"10.1007/3-540-61286-6_165","ee":"https://doi.org/10.1007/3-540-61286-6_165","url":"https://dblp.org/rec/conf/ismis/BoscP96"}, "url":"URL#6716381" }, { "@score":"1", "@id":"6716382", "info":{"authors":{"author":{"@pid":"95/3763","text":"Michael L. Brodie"}},"title":"Putting Objects to Work on a Massive Scale.","venue":"ISMIS","pages":"1-18","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Brodie96","doi":"10.1007/3-540-61286-6_127","ee":"https://doi.org/10.1007/3-540-61286-6_127","url":"https://dblp.org/rec/conf/ismis/Brodie96"}, "url":"URL#6716382" }, { "@score":"1", "@id":"6716383", "info":{"authors":{"author":[{"@pid":"72/634","text":"Stefan Brüning"},{"@pid":"s/TorstenSchaub","text":"Torsten Schaub"}]},"title":"A Model-Based Approach to Consistency-Checking.","venue":"ISMIS","pages":"315-324","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/BruningS96","doi":"10.1007/3-540-61286-6_156","ee":"https://doi.org/10.1007/3-540-61286-6_156","url":"https://dblp.org/rec/conf/ismis/BruningS96"}, "url":"URL#6716383" }, { "@score":"1", "@id":"6716384", "info":{"authors":{"author":[{"@pid":"66/5536","text":"Vittorio Brusoni"},{"@pid":"c/LConsole","text":"Luca Console"},{"@pid":"l/EvelinaLamma","text":"Evelina Lamma"},{"@pid":"m/PMello","text":"Paola Mello"},{"@pid":"m/MichelaMilano","text":"Michela Milano"},{"@pid":"26/279","text":"Paolo Terenziani"}]},"title":"Resource-Based vs. Task-Based Approaches for Scheduling Problems.","venue":"ISMIS","pages":"325-334","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/BrusoniCLMMT96","doi":"10.1007/3-540-61286-6_157","ee":"https://doi.org/10.1007/3-540-61286-6_157","url":"https://dblp.org/rec/conf/ismis/BrusoniCLMMT96"}, "url":"URL#6716384" }, { "@score":"1", "@id":"6716385", "info":{"authors":{"author":[{"@pid":"00/849","text":"Boris Cadish"},{"@pid":"18/2744","text":"Zinovy Diskin"}]},"title":"Heterogeneous View Integration via Sketches and Equations.","venue":"ISMIS","pages":"603-612","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/CadishD96","doi":"10.1007/3-540-61286-6_184","ee":"https://doi.org/10.1007/3-540-61286-6_184","url":"https://dblp.org/rec/conf/ismis/CadishD96"}, "url":"URL#6716385" }, { "@score":"1", "@id":"6716386", "info":{"authors":{"author":[{"@pid":"17/1259","text":"Jacques Calmet"},{"@pid":"35/4982","text":"James J. Lu"},{"@pid":"54/71","text":"Maria Rodriguez"},{"@pid":"53/3371","text":"Joachim Schü"}]},"title":"Signed Formula Logic Programming: Operational Semantics and Applications (Extended Abstract).","venue":"ISMIS","pages":"202-211","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/CalmetLRS96","doi":"10.1007/3-540-61286-6_145","ee":"https://doi.org/10.1007/3-540-61286-6_145","url":"https://dblp.org/rec/conf/ismis/CalmetLRS96"}, "url":"URL#6716386" }, { "@score":"1", "@id":"6716387", "info":{"authors":{"author":[{"@pid":"37/1024","text":"R. Capobianchi"},{"@pid":"52/6428","text":"M. Mautref"},{"@pid":"k/MauricevanKeulen","text":"Maurice van Keulen"},{"@pid":"63/3563","text":"Herman Balsters"}]},"title":"An Architecture and Methodology for the Design and Development of Technical Information Systems.","venue":"ISMIS","pages":"511-520","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/CapobianchiMKB96","doi":"10.1007/3-540-61286-6_175","ee":"https://doi.org/10.1007/3-540-61286-6_175","url":"https://dblp.org/rec/conf/ismis/CapobianchiMKB96"}, "url":"URL#6716387" }, { "@score":"1", "@id":"6716388", "info":{"authors":{"author":[{"@pid":"21/5301-3","text":"Jianhua Chen 0003"},{"@pid":"14/728","text":"Sukhamay Kundu"}]},"title":"A Sound and Complete Fuzzy Logic System Using Zadeh's Implication Operator.","venue":"ISMIS","pages":"233-242","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/ChenK96","doi":"10.1007/3-540-61286-6_148","ee":"https://doi.org/10.1007/3-540-61286-6_148","url":"https://dblp.org/rec/conf/ismis/ChenK96"}, "url":"URL#6716388" }, { "@score":"1", "@id":"6716389", "info":{"authors":{"author":{"@pid":"61/5821","text":"Pawel Cholewinski"}},"title":"Towards Programming in Default Logic.","venue":"ISMIS","pages":"223-232","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Cholewinski96","doi":"10.1007/3-540-61286-6_147","ee":"https://doi.org/10.1007/3-540-61286-6_147","url":"https://dblp.org/rec/conf/ismis/Cholewinski96"}, "url":"URL#6716389" }, { "@score":"1", "@id":"6716390", "info":{"authors":{"author":{"@pid":"37/3997","text":"Kenneth A. De Jong"}},"title":"On Evolving Intelligence .","venue":"ISMIS","pages":"149-157","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/DeJong96","doi":"10.1007/3-540-61286-6_140","ee":"https://doi.org/10.1007/3-540-61286-6_140","url":"https://dblp.org/rec/conf/ismis/DeJong96"}, "url":"URL#6716390" }, { "@score":"1", "@id":"6716391", "info":{"authors":{"author":{"@pid":"d/JohnKDebenham","text":"John K. Debenham"}},"title":"Knowledge Simplification.","venue":"ISMIS","pages":"305-314","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Debenham96","doi":"10.1007/3-540-61286-6_155","ee":"https://doi.org/10.1007/3-540-61286-6_155","url":"https://dblp.org/rec/conf/ismis/Debenham96"}, "url":"URL#6716391" }, { "@score":"1", "@id":"6716392", "info":{"authors":{"author":[{"@pid":"05/1327","text":"Luc Dehaspe"},{"@pid":"r/LucDeRaedt","text":"Luc De Raedt"}]},"title":"DLAB: A Declarative Language Bias Formalism.","venue":"ISMIS","pages":"613-622","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/DehaspeR96","doi":"10.1007/3-540-61286-6_185","ee":"https://doi.org/10.1007/3-540-61286-6_185","url":"https://dblp.org/rec/conf/ismis/DehaspeR96"}, "url":"URL#6716392" }, { "@score":"1", "@id":"6716393", "info":{"authors":{"author":{"@pid":"31/4123","text":"Robert Demolombe"}},"title":"Validity Queries and Completeness Queries.","venue":"ISMIS","pages":"253-263","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Demolombe96","doi":"10.1007/3-540-61286-6_150","ee":"https://doi.org/10.1007/3-540-61286-6_150","url":"https://dblp.org/rec/conf/ismis/Demolombe96"}, "url":"URL#6716393" }, { "@score":"1", "@id":"6716394", "info":{"authors":{"author":[{"@pid":"p/AnneMariePinnaDery","text":"Anne-Marie Dery"},{"@pid":"d/SDucasse","text":"Stéphane Ducasse"},{"@pid":"b/MireilleBlayFornarino","text":"Mireille Blay-Fornarino"}]},"title":"Object and Dependency Oriented Programming in FLO.","venue":"ISMIS","pages":"295-304","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/DeryDF96","doi":"10.1007/3-540-61286-6_154","ee":"https://doi.org/10.1007/3-540-61286-6_154","url":"https://dblp.org/rec/conf/ismis/DeryDF96"}, "url":"URL#6716394" }, { "@score":"1", "@id":"6716395", "info":{"authors":{"author":{"@pid":"d/RoseDieng","text":"Rose Dieng"}},"title":"Comparison of Conceptual Graphs for Modelling Knowledge of Multiple Experts.","venue":"ISMIS","pages":"78-87","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Dieng96","doi":"10.1007/3-540-61286-6_133","ee":"https://doi.org/10.1007/3-540-61286-6_133","url":"https://dblp.org/rec/conf/ismis/Dieng96"}, "url":"URL#6716395" }, { "@score":"1", "@id":"6716396", "info":{"authors":{"author":[{"@pid":"d/FrankDignum","text":"Frank Dignum"},{"@pid":"70/260","text":"Hans Weigand"},{"@pid":"28/1126","text":"Egon Verharen"}]},"title":"Meeting the Deadline: On the Formal Specification of Temporal Deontic Constraints.","venue":"ISMIS","pages":"243-252","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/DignumWV96","doi":"10.1007/3-540-61286-6_149","ee":"https://doi.org/10.1007/3-540-61286-6_149","url":"https://dblp.org/rec/conf/ismis/DignumWV96"}, "url":"URL#6716396" }, { "@score":"1", "@id":"6716397", "info":{"authors":{"author":[{"@pid":"81/3618","text":"Patrick Doherty 0001"},{"@pid":"73/4447","text":"Witold Lukaszewicz"},{"@pid":"60/661","text":"Andrzej Szalas"}]},"title":"Explaining Explanation Closure.","venue":"ISMIS","pages":"521-530","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/DohertyLS96","doi":"10.1007/3-540-61286-6_176","ee":"https://doi.org/10.1007/3-540-61286-6_176","url":"https://dblp.org/rec/conf/ismis/DohertyLS96"}, "url":"URL#6716397" }, { "@score":"1", "@id":"6716398", "info":{"authors":{"author":[{"@pid":"d/DidierDubois","text":"Didier Dubois"},{"@pid":"p/HenriPrade","text":"Henri Prade"}]},"title":"Approximate and Commonsense Reasoning: From Theory to Practice.","venue":"ISMIS","pages":"19-33","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/DuboisP96","doi":"10.1007/3-540-61286-6_128","ee":"https://doi.org/10.1007/3-540-61286-6_128","url":"https://dblp.org/rec/conf/ismis/DuboisP96"}, "url":"URL#6716398" }, { "@score":"1", "@id":"6716399", "info":{"authors":{"author":{"@pid":"e/AEEiben","text":"A. E. Eiben"}},"title":"Evolutionary Exploration of Search Spaces.","venue":"ISMIS","pages":"178-188","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Eiben96","doi":"10.1007/3-540-61286-6_143","ee":"https://doi.org/10.1007/3-540-61286-6_143","url":"https://dblp.org/rec/conf/ismis/Eiben96"}, "url":"URL#6716399" }, { "@score":"1", "@id":"6716400", "info":{"authors":{"author":[{"@pid":"68/6961","text":"Floriana Esposito"},{"@pid":"25/291","text":"Angela Laterza"},{"@pid":"m/DonatoMalerba","text":"Donato Malerba"},{"@pid":"41/446","text":"Giovanni Semeraro"}]},"title":"Locally Finite, Proper and Complete Operators for Refining Datalog Programs.","venue":"ISMIS","pages":"468-478","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/EspositoLMS96","doi":"10.1007/3-540-61286-6_171","ee":"https://doi.org/10.1007/3-540-61286-6_171","url":"https://dblp.org/rec/conf/ismis/EspositoLMS96"}, "url":"URL#6716400" }, { "@score":"1", "@id":"6716401", "info":{"authors":{"author":{"@pid":"47/2029","text":"Jutta Eusterbrock"}},"title":"A Multi-Layer Architecture for Knowledge-Based System Synthesis.","venue":"ISMIS","pages":"582-592","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Eusterbrock96","doi":"10.1007/3-540-61286-6_182","ee":"https://doi.org/10.1007/3-540-61286-6_182","url":"https://dblp.org/rec/conf/ismis/Eusterbrock96"}, "url":"URL#6716401" }, { "@score":"1", "@id":"6716402", "info":{"authors":{"author":{"@pid":"55/2719","text":"Marta Franová"}},"title":"Automated Inductive Reasoning as a Support of Deductive Reasoning in a User-Independent Automation of Inductive Theorem Proving.","venue":"ISMIS","pages":"551-560","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Franova96","doi":"10.1007/3-540-61286-6_179","ee":"https://doi.org/10.1007/3-540-61286-6_179","url":"https://dblp.org/rec/conf/ismis/Franova96"}, "url":"URL#6716402" }, { "@score":"1", "@id":"6716403", "info":{"authors":{"author":[{"@pid":"g/AttilioGiordana","text":"Attilio Giordana"},{"@pid":"80/3049","text":"Filippo Neri"},{"@pid":"s/LorenzaSaitta","text":"Lorenza Saitta"}]},"title":"A Fine-Grained Parallel Evolutionary Program for Concept Induction.","venue":"ISMIS","pages":"168-177","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/GiordanaNS96","doi":"10.1007/3-540-61286-6_142","ee":"https://doi.org/10.1007/3-540-61286-6_142","url":"https://dblp.org/rec/conf/ismis/GiordanaNS96"}, "url":"URL#6716403" }, { "@score":"1", "@id":"6716404", "info":{"authors":{"author":[{"@pid":"g/ParkeGodfrey","text":"Parke Godfrey"},{"@pid":"g/JarekGryz","text":"Jarek Gryz"},{"@pid":"m/JackMinker","text":"Jack Minker"}]},"title":"Semantic Query Optimization for Bottom-Up Evaluation.","venue":"ISMIS","pages":"561-571","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/GodfreyGM96","doi":"10.1007/3-540-61286-6_180","ee":"https://doi.org/10.1007/3-540-61286-6_180","url":"https://dblp.org/rec/conf/ismis/GodfreyGM96"}, "url":"URL#6716404" }, { "@score":"1", "@id":"6716405", "info":{"authors":{"author":{"@pid":"21/6830","text":"Ibrahim F. Imam"}},"title":"An Empirical Study on The Incompetence of Attribute Selection Criteria.","venue":"ISMIS","pages":"458-467","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Imam96","doi":"10.1007/3-540-61286-6_170","ee":"https://doi.org/10.1007/3-540-61286-6_170","url":"https://dblp.org/rec/conf/ismis/Imam96"}, "url":"URL#6716405" }, { "@score":"1", "@id":"6716406", "info":{"authors":{"author":[{"@pid":"21/6830","text":"Ibrahim F. Imam"},{"@pid":"72/6710","text":"Ryszard S. Michalski"}]},"title":"Learning for Decision Making: the FRD Approach and a Comparative Study.","venue":"ISMIS","pages":"428-437","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/ImamM96","doi":"10.1007/3-540-61286-6_167","ee":"https://doi.org/10.1007/3-540-61286-6_167","url":"https://dblp.org/rec/conf/ismis/ImamM96"}, "url":"URL#6716406" }, { "@score":"1", "@id":"6716407", "info":{"authors":{"author":[{"@pid":"j/MatthiasJarke","text":"Matthias Jarke"},{"@pid":"j/ManfredAJeusfeld","text":"Manfred A. Jeusfeld"},{"@pid":"46/39","text":"Peter Peters 0001"},{"@pid":"11/3005","text":"Peter Szczurko"}]},"title":"Distributed Information Systems Engineering.","venue":"ISMIS","pages":"34-49","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/JarkeJPS96","doi":"10.1007/3-540-61286-6_129","ee":"https://doi.org/10.1007/3-540-61286-6_129","url":"https://dblp.org/rec/conf/ismis/JarkeJPS96"}, "url":"URL#6716407" }, { "@score":"1", "@id":"6716408", "info":{"authors":{"author":{"@pid":"68/5373","text":"Lars Karlsson"}},"title":"Planning, Truth Criteria and the Systematic Approach to Action and Change.","venue":"ISMIS","pages":"541-550","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Karlsson96","doi":"10.1007/3-540-61286-6_178","ee":"https://doi.org/10.1007/3-540-61286-6_178","url":"https://dblp.org/rec/conf/ismis/Karlsson96"}, "url":"URL#6716408" }, { "@score":"1", "@id":"6716409", "info":{"authors":{"author":{"@pid":"54/1538","text":"Willi Klösgen"}},"title":"Knowledge Discovery in Databases and Data Mining.","venue":"ISMIS","pages":"623-632","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Klosgen96","doi":"10.1007/3-540-61286-6_186","ee":"https://doi.org/10.1007/3-540-61286-6_186","url":"https://dblp.org/rec/conf/ismis/Klosgen96"}, "url":"URL#6716409" }, { "@score":"1", "@id":"6716410", "info":{"authors":{"author":[{"@pid":"12/1192","text":"Marzena Kryszkiewicz"},{"@pid":"16/2796","text":"Henryk Rybinski"}]},"title":"Reducing Information Systems with Uncertain Attributes.","venue":"ISMIS","pages":"285-294","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/KryszkiewiczR96","doi":"10.1007/3-540-61286-6_153","ee":"https://doi.org/10.1007/3-540-61286-6_153","url":"https://dblp.org/rec/conf/ismis/KryszkiewiczR96"}, "url":"URL#6716410" }, { "@score":"1", "@id":"6716411", "info":{"authors":{"author":[{"@pid":"l/PatrickLambrix","text":"Patrick Lambrix"},{"@pid":"72/283","text":"Jalal Maleki"}]},"title":"Learning Composite Concepts in Description Logics: A First Step.","venue":"ISMIS","pages":"68-77","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/LambrixM96","doi":"10.1007/3-540-61286-6_132","ee":"https://doi.org/10.1007/3-540-61286-6_132","url":"https://dblp.org/rec/conf/ismis/LambrixM96"}, "url":"URL#6716411" }, { "@score":"1", "@id":"6716412", "info":{"authors":{"author":[{"@pid":"93/3337","text":"Grace SauLan Loo"},{"@pid":"25/4706","text":"Tharam S. Dillon"},{"@pid":"96/5960","text":"John Zeleznikow"},{"@pid":"16/15","text":"Kok-Huat Lee"}]},"title":"Enhancing Query Processing of Information Systems.","venue":"ISMIS","pages":"386-397","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/LooDZL96","doi":"10.1007/3-540-61286-6_163","ee":"https://doi.org/10.1007/3-540-61286-6_163","url":"https://dblp.org/rec/conf/ismis/LooDZL96"}, "url":"URL#6716412" }, { "@score":"1", "@id":"6716413", "info":{"authors":{"author":[{"@pid":"m/ZMichalewicz","text":"Zbigniew Michalewicz"},{"@pid":"67/4008-1","text":"Jing Xiao 0001"},{"@pid":"t/KrzysztofTrojanowski","text":"Krzysztof Trojanowski"}]},"title":"Evolutionary Computation: One Project, Many Directions.","venue":"ISMIS","pages":"189-201","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/MichalewiczXT96","doi":"10.1007/3-540-61286-6_144","ee":"https://doi.org/10.1007/3-540-61286-6_144","url":"https://dblp.org/rec/conf/ismis/MichalewiczXT96"}, "url":"URL#6716413" }, { "@score":"1", "@id":"6716414", "info":{"authors":{"author":[{"@pid":"75/875","text":"Michael Minock"},{"@pid":"c/WesleyWChu","text":"Wesley W. Chu"}]},"title":"Explanation for Cooperative Information Systems.","venue":"ISMIS","pages":"264-273","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/MinockC96","doi":"10.1007/3-540-61286-6_151","ee":"https://doi.org/10.1007/3-540-61286-6_151","url":"https://dblp.org/rec/conf/ismis/MinockC96"}, "url":"URL#6716414" }, { "@score":"1", "@id":"6716415", "info":{"authors":{"author":[{"@pid":"25/2775","text":"Torulf Mollestad"},{"@pid":"s/AndrzejSkowron","text":"Andrzej Skowron"}]},"title":"A Rough Set Framework for Data Mining of Propositional Default Rules.","venue":"ISMIS","pages":"448-457","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/MollestadS96","doi":"10.1007/3-540-61286-6_169","ee":"https://doi.org/10.1007/3-540-61286-6_169","url":"https://dblp.org/rec/conf/ismis/MollestadS96"}, "url":"URL#6716415" }, { "@score":"1", "@id":"6716416", "info":{"authors":{"author":[{"@pid":"36/2248","text":"Sunil J. Noronha"},{"@pid":"s/StanSzpakowicz","text":"Stan Szpakowicz"}]},"title":"Forest Fire Management with Negoplan.","venue":"ISMIS","pages":"479-490","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/NoronhaS96","doi":"10.1007/3-540-61286-6_172","ee":"https://doi.org/10.1007/3-540-61286-6_172","url":"https://dblp.org/rec/conf/ismis/NoronhaS96"}, "url":"URL#6716416" }, { "@score":"1", "@id":"6716417", "info":{"authors":{"author":[{"@pid":"33/4997","text":"Joseph D. Oldham"},{"@pid":"m/VictorWMarek","text":"V. Wiktor Marek"}]},"title":"Toward Intelligent Representation of Database Content.","venue":"ISMIS","pages":"274-284","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/OldhamM96","doi":"10.1007/3-540-61286-6_152","ee":"https://doi.org/10.1007/3-540-61286-6_152","url":"https://dblp.org/rec/conf/ismis/OldhamM96"}, "url":"URL#6716417" }, { "@score":"1", "@id":"6716418", "info":{"authors":{"author":{"@pid":"p/GPiatetskyShapiro","text":"Gregory Piatetsky-Shapiro"}},"title":"Data Mining and Knowledge Discovery in Business Databases.","venue":"ISMIS","pages":"56-67","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Piatetsky-Shapiro96","doi":"10.1007/3-540-61286-6_131","ee":"https://doi.org/10.1007/3-540-61286-6_131","url":"https://dblp.org/rec/conf/ismis/Piatetsky-Shapiro96"}, "url":"URL#6716418" }, { "@score":"1", "@id":"6716419", "info":{"authors":{"author":{"@pid":"31/2532","text":"François G. Pin"}},"title":"A Fuzzy Behaviorist Approach to Sensor-Based Robot Control.","venue":"ISMIS","pages":"335-345","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Pin96","doi":"10.1007/3-540-61286-6_158","ee":"https://doi.org/10.1007/3-540-61286-6_158","url":"https://dblp.org/rec/conf/ismis/Pin96"}, "url":"URL#6716419" }, { "@score":"1", "@id":"6716420", "info":{"authors":{"author":[{"@pid":"69/10462","text":"Olga Pons"},{"@pid":"90/2542-1","text":"Juan Miguel Medina 0001"},{"@pid":"c/JuanCCubero","text":"Juan C. Cubero"},{"@pid":"10/2317","text":"María Amparo Vila Miranda"}]},"title":"An Architecture for a Deductive Fuzzy Relational Database.","venue":"ISMIS","pages":"491-500","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/PonsMCV96","doi":"10.1007/3-540-61286-6_173","ee":"https://doi.org/10.1007/3-540-61286-6_173","url":"https://dblp.org/rec/conf/ismis/PonsMCV96"}, "url":"URL#6716420" }, { "@score":"1", "@id":"6716421", "info":{"authors":{"author":{"@pid":"r/LucDeRaedt","text":"Luc De Raedt"}},"title":"PAC-Learning Logic Programs under the Closed-World Assumption.","venue":"ISMIS","pages":"531-540","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Raedt96","doi":"10.1007/3-540-61286-6_177","ee":"https://doi.org/10.1007/3-540-61286-6_177","url":"https://dblp.org/rec/conf/ismis/Raedt96"}, "url":"URL#6716421" }, { "@score":"1", "@id":"6716422", "info":{"authors":{"author":[{"@pid":"38/60","text":"Mohan Ravindranathan"},{"@pid":"55/1149","text":"Roy Leitch"}]},"title":"MuRaLi: An Architecture for Multiple Reasoning.","venue":"ISMIS","pages":"593-602","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/RavindranathanL96","doi":"10.1007/3-540-61286-6_183","ee":"https://doi.org/10.1007/3-540-61286-6_183","url":"https://dblp.org/rec/conf/ismis/RavindranathanL96"}, "url":"URL#6716422" }, { "@score":"1", "@id":"6716423", "info":{"authors":{"author":{"@pid":"s/ErikSandewall","text":"Erik Sandewall"}},"title":"Towards a World-Wide Knowledge Base.","venue":"ISMIS","pages":"50-55","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Sandewall96","doi":"10.1007/3-540-61286-6_130","ee":"https://doi.org/10.1007/3-540-61286-6_130","url":"https://dblp.org/rec/conf/ismis/Sandewall96"}, "url":"URL#6716423" }, { "@score":"1", "@id":"6716424", "info":{"authors":{"author":{"@pid":"57/6446","text":"Franciszek Seredynski"}},"title":"Coevolutionary Game-Theoretic Multi-Agent Systems.","venue":"ISMIS","pages":"356-365","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Seredynski96","doi":"10.1007/3-540-61286-6_160","ee":"https://doi.org/10.1007/3-540-61286-6_160","url":"https://dblp.org/rec/conf/ismis/Seredynski96"}, "url":"URL#6716424" }, { "@score":"1", "@id":"6716425", "info":{"authors":{"author":[{"@pid":"42/6415","text":"Ning Shan"},{"@pid":"h/HowardJHamilton","text":"Howard J. Hamilton"},{"@pid":"c/NickCercone","text":"Nick Cercone"}]},"title":"Induction of Classification Rules from Imperfect Data.","venue":"ISMIS","pages":"118-127","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/ShanHC96","doi":"10.1007/3-540-61286-6_137","ee":"https://doi.org/10.1007/3-540-61286-6_137","url":"https://dblp.org/rec/conf/ismis/ShanHC96"}, "url":"URL#6716425" }, { "@score":"1", "@id":"6716426", "info":{"authors":{"author":[{"@pid":"31/5210","text":"Hung Son Nguyen"},{"@pid":"14/1689","text":"Sinh Hoa Nguyen"},{"@pid":"s/AndrzejSkowron","text":"Andrzej Skowron"}]},"title":"Searching for Features Defined by Hyperplanes.","venue":"ISMIS","pages":"366-375","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/SonHS96","doi":"10.1007/3-540-61286-6_161","ee":"https://doi.org/10.1007/3-540-61286-6_161","url":"https://dblp.org/rec/conf/ismis/SonHS96"}, "url":"URL#6716426" }, { "@score":"1", "@id":"6716427", "info":{"authors":{"author":{"@pid":"28/1236","text":"Les M. Sztandera"}},"title":"Knowledge-Based Fuzzy Neural Networks.","venue":"ISMIS","pages":"346-355","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Sztandera96","doi":"10.1007/3-540-61286-6_159","ee":"https://doi.org/10.1007/3-540-61286-6_159","url":"https://dblp.org/rec/conf/ismis/Sztandera96"}, "url":"URL#6716427" }, { "@score":"1", "@id":"6716428", "info":{"authors":{"author":[{"@pid":"66/3259","text":"Shusaku Tsumoto"},{"@pid":"41/4423","text":"Hiroshi Tanaka"}]},"title":"Induction of Expert System Rules from Databases Based on Rough Set Theory and Resampling Methods.","venue":"ISMIS","pages":"128-138","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/TsumotoT96","doi":"10.1007/3-540-61286-6_138","ee":"https://doi.org/10.1007/3-540-61286-6_138","url":"https://dblp.org/rec/conf/ismis/TsumotoT96"}, "url":"URL#6716428" }, { "@score":"1", "@id":"6716429", "info":{"authors":{"author":[{"@pid":"66/3259","text":"Shusaku Tsumoto"},{"@pid":"57/6779","text":"Wojciech Ziarko"}]},"title":"The Application of Rough Sets-Based Data Mining Technique to Differential Diagnosis of Meningoenchepahlitis.","venue":"ISMIS","pages":"438-447","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/TsumotoZ96","doi":"10.1007/3-540-61286-6_168","ee":"https://doi.org/10.1007/3-540-61286-6_168","url":"https://dblp.org/rec/conf/ismis/TsumotoZ96"}, "url":"URL#6716429" }, { "@score":"1", "@id":"6716430", "info":{"authors":{"author":[{"@pid":"t/CanTurker","text":"Can Türker"},{"@pid":"c/StefanConrad1","text":"Stefan Conrad 0001"},{"@pid":"s/GunterSaake","text":"Gunter Saake"}]},"title":"Dynamically Changing Behavior: An Agent-Oriented View to Modeling Intelligent Information Systems.","venue":"ISMIS","pages":"572-581","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/TurkerCS96","doi":"10.1007/3-540-61286-6_181","ee":"https://doi.org/10.1007/3-540-61286-6_181","url":"https://dblp.org/rec/conf/ismis/TurkerCS96"}, "url":"URL#6716430" }, { "@score":"1", "@id":"6716431", "info":{"authors":{"author":{"@pid":"v/ChristelVrain","text":"Christel Vrain"}},"title":"Hierarchical Conceptual Clustering in a First Order Representation.","venue":"ISMIS","pages":"643-652","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Vrain96","doi":"10.1007/3-540-61286-6_188","ee":"https://doi.org/10.1007/3-540-61286-6_188","url":"https://dblp.org/rec/conf/ismis/Vrain96"}, "url":"URL#6716431" }, { "@score":"1", "@id":"6716432", "info":{"authors":{"author":[{"@pid":"w/SlawomirTWierzchon","text":"Slawomir T. Wierzchon"},{"@pid":"k/MieczyslawAKlopotek","text":"Mieczyslaw A. Klopotek"}]},"title":"Modified Component Valuations in Valuation Based Systems as a Way to Optimize Query Processing.","venue":"ISMIS","pages":"418-427","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/WierzchonK96","doi":"10.1007/3-540-61286-6_166","ee":"https://doi.org/10.1007/3-540-61286-6_166","url":"https://dblp.org/rec/conf/ismis/WierzchonK96"}, "url":"URL#6716432" }, { "@score":"1", "@id":"6716433", "info":{"authors":{"author":{"@pid":"89/5489","text":"Agata Wrzos-Kaminska"}},"title":"Partial Evaluation in Constraint Logic Programming.","venue":"ISMIS","pages":"98-107","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Wrzos-Kaminska96","doi":"10.1007/3-540-61286-6_135","ee":"https://doi.org/10.1007/3-540-61286-6_135","url":"https://dblp.org/rec/conf/ismis/Wrzos-Kaminska96"}, "url":"URL#6716433" }, { "@score":"1", "@id":"6716434", "info":{"authors":{"author":[{"@pid":"48/7030","text":"Gian Piero Zarri"},{"@pid":"34/65","text":"Luca Gilardoni"}]},"title":"Structuring and Retrieval of the Complex Predicate Arguments Proper to the NKRL Conceptual Language.","venue":"ISMIS","pages":"398-407","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/ZarriG96","doi":"10.1007/3-540-61286-6_164","ee":"https://doi.org/10.1007/3-540-61286-6_164","url":"https://dblp.org/rec/conf/ismis/ZarriG96"}, "url":"URL#6716434" }, { "@score":"1", "@id":"6716435", "info":{"authors":{"author":{"@pid":"04/3348-3","text":"Yan Zhang 0003"}},"title":"Semantical Considerations for Knowledge Base Updates.","venue":"ISMIS","pages":"88-97","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/Zhang96","doi":"10.1007/3-540-61286-6_134","ee":"https://doi.org/10.1007/3-540-61286-6_134","url":"https://dblp.org/rec/conf/ismis/Zhang96"}, "url":"URL#6716435" }, { "@score":"1", "@id":"6716436", "info":{"authors":{"author":[{"@pid":"z/NingZhong","text":"Ning Zhong 0001"},{"@pid":"25/4174","text":"Setsuo Ohsuga"}]},"title":"A Multi-Step Process for Discovering, Managing and Refining Strong Functional Relations Hidden in Databases.","venue":"ISMIS","pages":"501-510","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/ZhongO96","doi":"10.1007/3-540-61286-6_174","ee":"https://doi.org/10.1007/3-540-61286-6_174","url":"https://dblp.org/rec/conf/ismis/ZhongO96"}, "url":"URL#6716436" }, { "@score":"1", "@id":"6716437", "info":{"authors":{"author":[{"@pid":"57/6779","text":"Wojciech Ziarko"},{"@pid":"c/NickCercone","text":"Nick Cercone"},{"@pid":"h/XiaohuaHu","text":"Xiaohua Hu 0001"}]},"title":"Rule Discovery from Databases with Decision Matrices.","venue":"ISMIS","pages":"653-662","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/ZiarkoCH96","doi":"10.1007/3-540-61286-6_189","ee":"https://doi.org/10.1007/3-540-61286-6_189","url":"https://dblp.org/rec/conf/ismis/ZiarkoCH96"}, "url":"URL#6716437" }, { "@score":"1", "@id":"6716438", "info":{"authors":{"author":[{"@pid":"63/6215","text":"Jan M. Zytkow"},{"@pid":"19/2401","text":"Robert Zembowicz"}]},"title":"Search for Patterns at Each Scale in Massive Data.","venue":"ISMIS","pages":"139-148","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/ZytkowZ96","doi":"10.1007/3-540-61286-6_139","ee":"https://doi.org/10.1007/3-540-61286-6_139","url":"https://dblp.org/rec/conf/ismis/ZytkowZ96"}, "url":"URL#6716438" }, { "@score":"1", "@id":"6725607", "info":{"authors":{"author":[{"@pid":"r/ZbigniewWRas","text":"Zbigniew W. Ras"},{"@pid":"80/6060","text":"Maciej Michalewicz"}]},"title":"Foundations of Intelligent Systems, 9th International Symposium, ISMIS '96, Zakopane, Poland, June 9-13, 1996, Proceedings","venue":["ISMIS","Lecture Notes in Computer Science"],"volume":"1079","publisher":"Springer","year":"1996","type":"Editorship","key":"conf/ismis/1996","doi":"10.1007/3-540-61286-6","ee":"https://doi.org/10.1007/3-540-61286-6","url":"https://dblp.org/rec/conf/ismis/1996"}, "url":"URL#6725607" } ] } } } )