callback( { "result":{ "query":":facetid:toc:\"db/journals/ai/ai289.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.79" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"12", "@dc":"12", "@oc":"12", "@id":"43330669", "text":":facetid:toc:db/journals/ai/ai289.bht" } }, "hits":{ "@total":"12", "@computed":"12", "@sent":"12", "@first":"0", "hit":[{ "@score":"1", "@id":"1507887", "info":{"authors":{"author":[{"@pid":"245/0376","text":"Shyan Akmal"},{"@pid":"245/0368","text":"Savana Ammons"},{"@pid":"245/0375","text":"Hemeng Li"},{"@pid":"148/5956","text":"Michael Gao"},{"@pid":"266/4549","text":"Lindsay Popowski"},{"@pid":"42/2103","text":"James C. Boerkoel Jr."}]},"title":"Quantifying controllability in temporal networks with uncertainty.","venue":"Artif. Intell.","volume":"289","pages":"103384","year":"2020","type":"Journal Articles","access":"open","key":"journals/ai/AkmalALGPB20","doi":"10.1016/J.ARTINT.2020.103384","ee":"https://doi.org/10.1016/j.artint.2020.103384","url":"https://dblp.org/rec/journals/ai/AkmalALGPB20"}, "url":"URL#1507887" }, { "@score":"1", "@id":"1507891", "info":{"authors":{"author":[{"@pid":"123/4603","text":"Roberto Amadini"},{"@pid":"76/3059","text":"Graeme Gange"},{"@pid":"s/PeterJStuckey","text":"Peter J. Stuckey"}]},"title":"Dashed strings for string constraint solving.","venue":"Artif. Intell.","volume":"289","pages":"103368","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ai/AmadiniGS20","doi":"10.1016/J.ARTINT.2020.103368","ee":"https://doi.org/10.1016/j.artint.2020.103368","url":"https://dblp.org/rec/journals/ai/AmadiniGS20"}, "url":"URL#1507891" }, { "@score":"1", "@id":"1507894", "info":{"authors":{"author":[{"@pid":"17/6670","text":"Katie Atkinson"},{"@pid":"b/TJMBenchCapon","text":"Trevor J. M. Bench-Capon"},{"@pid":"b/DanushkaBollegala","text":"Danushka Bollegala"}]},"title":"Explanation in AI and law: Past, present and future.","venue":"Artif. Intell.","volume":"289","pages":"103387","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ai/AtkinsonBB20","doi":"10.1016/J.ARTINT.2020.103387","ee":"https://doi.org/10.1016/j.artint.2020.103387","url":"https://dblp.org/rec/journals/ai/AtkinsonBB20"}, "url":"URL#1507894" }, { "@score":"1", "@id":"1507907", "info":{"authors":{"author":[{"@pid":"b/PABonatti","text":"Piero A. Bonatti"},{"@pid":"256/5032","text":"Luca Ioffredo"},{"@pid":"148/4418","text":"Iliana M. Petrova"},{"@pid":"23/359","text":"Luigi Sauro"},{"@pid":"201/8135","text":"Ida Sri Rejeki Siahaan"}]},"title":"Real-time reasoning in OWL2 for GDPR compliance.","venue":"Artif. Intell.","volume":"289","pages":"103389","year":"2020","type":"Journal Articles","access":"open","key":"journals/ai/BonattiIPSS20","doi":"10.1016/J.ARTINT.2020.103389","ee":"https://doi.org/10.1016/j.artint.2020.103389","url":"https://dblp.org/rec/journals/ai/BonattiIPSS20"}, "url":"URL#1507907" }, { "@score":"1", "@id":"1507911", "info":{"authors":{"author":[{"@pid":"48/6264","text":"Pedro Cabalar"},{"@pid":"136/1503","text":"Jorge Fandinno"},{"@pid":"03/3567","text":"Luis Fariñas del Cerro"}]},"title":"Autoepistemic answer set programming.","venue":"Artif. Intell.","volume":"289","pages":"103382","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ai/CabalarFC20","doi":"10.1016/J.ARTINT.2020.103382","ee":"https://doi.org/10.1016/j.artint.2020.103382","url":"https://dblp.org/rec/journals/ai/CabalarFC20"}, "url":"URL#1507911" }, { "@score":"1", "@id":"1507915", "info":{"authors":{"author":[{"@pid":"230/6452","text":"Mohamed Sami Cherif"},{"@pid":"05/4422","text":"Djamal Habet"},{"@pid":"128/3618","text":"André Abramé"}]},"title":"Understanding the power of Max-SAT resolution through UP-resilience.","venue":"Artif. Intell.","volume":"289","pages":"103397","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ai/CherifHA20","doi":"10.1016/J.ARTINT.2020.103397","ee":"https://doi.org/10.1016/j.artint.2020.103397","url":"https://dblp.org/rec/journals/ai/CherifHA20"}, "url":"URL#1507915" }, { "@score":"1", "@id":"1507920", "info":{"authors":{"author":[{"@pid":"203/8467","text":"Kaya Deuser"},{"@pid":"84/281","text":"Pavel Naumov"}]},"title":"On composition of bounded-recall plans.","venue":"Artif. Intell.","volume":"289","pages":"103399","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ai/DeuserN20","doi":"10.1016/J.ARTINT.2020.103399","ee":"https://doi.org/10.1016/j.artint.2020.103399","url":"https://dblp.org/rec/journals/ai/DeuserN20"}, "url":"URL#1507920" }, { "@score":"1", "@id":"1507941", "info":{"authors":{"author":[{"@pid":"169/3490","text":"Armen Inants"},{"@pid":"85/192","text":"Jérôme Euzenat"}]},"title":"So, what exactly is a qualitative calculus?","venue":"Artif. Intell.","volume":"289","pages":"103385","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ai/InantsE20","doi":"10.1016/J.ARTINT.2020.103385","ee":"https://doi.org/10.1016/j.artint.2020.103385","url":"https://dblp.org/rec/journals/ai/InantsE20"}, "url":"URL#1507941" }, { "@score":"1", "@id":"1507950", "info":{"authors":{"author":[{"@pid":"21/8669","text":"Jianwen Li"},{"@pid":"33/1678","text":"Geguang Pu"},{"@pid":"76/10611","text":"Yueling Zhang"},{"@pid":"v/MosheYVardi","text":"Moshe Y. Vardi"},{"@pid":"67/519","text":"Kristin Y. Rozier"}]},"title":"SAT-based explicit LTLf satisfiability checking.","venue":"Artif. Intell.","volume":"289","pages":"103369","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ai/LiPZVR20","doi":"10.1016/J.ARTINT.2020.103369","ee":"https://doi.org/10.1016/j.artint.2020.103369","url":"https://dblp.org/rec/journals/ai/LiPZVR20"}, "url":"URL#1507950" }, { "@score":"1", "@id":"1507959", "info":{"authors":{"author":{"@pid":"43/5718","text":"Kedian Mu"}},"title":"Intrinsic approaches to prioritizing diagnoses in multi-context systems.","venue":"Artif. Intell.","volume":"289","pages":"103383","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ai/Mu20","doi":"10.1016/J.ARTINT.2020.103383","ee":"https://doi.org/10.1016/j.artint.2020.103383","url":"https://dblp.org/rec/journals/ai/Mu20"}, "url":"URL#1507959" }, { "@score":"1", "@id":"1507968", "info":{"authors":{"author":[{"@pid":"161/0073","text":"Ariel Rosenfeld"},{"@pid":"53/130","text":"Oleg Maksimov"},{"@pid":"k/SaritKraus","text":"Sarit Kraus"}]},"title":"When security games hit traffic: A deployed optimal traffic enforcement system.","venue":"Artif. Intell.","volume":"289","pages":"103381","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ai/RosenfeldMK20","doi":"10.1016/J.ARTINT.2020.103381","ee":"https://doi.org/10.1016/j.artint.2020.103381","url":"https://dblp.org/rec/journals/ai/RosenfeldMK20"}, "url":"URL#1507968" }, { "@score":"1", "@id":"1507982", "info":{"authors":{"author":{"@pid":"w/MichaelWooldridge","text":"Michael J. Wooldridge"}},"title":"Artificial Intelligence requires more than deep learning - but what, exactly?","venue":"Artif. Intell.","volume":"289","pages":"103386","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ai/Wooldridge20","doi":"10.1016/J.ARTINT.2020.103386","ee":"https://doi.org/10.1016/j.artint.2020.103386","url":"https://dblp.org/rec/journals/ai/Wooldridge20"}, "url":"URL#1507982" } ] } } } )