callback( { "result":{ "query":":facetid:toc:\"db/journals/fuin/fuin14.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"62.83" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"26", "@dc":"26", "@oc":"26", "@id":"43452128", "text":":facetid:toc:db/journals/fuin/fuin14.bht" } }, "hits":{ "@total":"26", "@computed":"26", "@sent":"26", "@first":"0", "hit":[{ "@score":"1", "@id":"6902635", "info":{"authors":{"author":[{"@pid":"a/KRApt","text":"Krzysztof R. Apt"},{"@pid":"77/2259","text":"Howard A. Blair"}]},"title":"Arithmetic classification of perfect models of stratified programs.","venue":"Fundam. Informaticae","volume":"14","number":"3","pages":"339-343","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/AptB91","url":"https://dblp.org/rec/journals/fuin/AptB91"}, "url":"URL#6902635" }, { "@score":"1", "@id":"6902636", "info":{"authors":{"author":[{"@pid":"46/3961","text":"Tudor Balanescu"},{"@pid":"09/5927","text":"Marian Gheorghe 0001"}]},"title":"A note on PF(k) - parsable languages.","venue":"Fundam. Informaticae","volume":"14","number":"3","pages":"283-286","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/BalanescuG91","url":"https://dblp.org/rec/journals/fuin/BalanescuG91"}, "url":"URL#6902636" }, { "@score":"1", "@id":"6902637", "info":{"authors":{"author":{"@pid":"48/554","text":"Stefano Baratella"}},"title":"Models of Clark's completion for some classes of logic programs.","venue":"Fundam. Informaticae","volume":"14","number":"3","pages":"323-337","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Baratella91","url":"https://dblp.org/rec/journals/fuin/Baratella91"}, "url":"URL#6902637" }, { "@score":"1", "@id":"6902638", "info":{"authors":{"author":{"@pid":"69/1253","text":"Rana Barua"}},"title":"On generalized automata.","venue":"Fundam. Informaticae","volume":"14","number":"3","pages":"313-322","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Barua91","url":"https://dblp.org/rec/journals/fuin/Barua91"}, "url":"URL#6902638" }, { "@score":"1", "@id":"6902639", "info":{"authors":{"author":[{"@pid":"b/BerndBecker","text":"Bernd Becker 0001"},{"@pid":"08/3781","text":"Uwe Sparmann"}]},"title":"A uniform test approach for RCC-adders.","venue":"Fundam. Informaticae","volume":"14","number":"2","pages":"185-219","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/BeckerS91","url":"https://dblp.org/rec/journals/fuin/BeckerS91"}, "url":"URL#6902639" }, { "@score":"1", "@id":"6902641", "info":{"authors":{"author":{"@pid":"14/3094","text":"Andrzej Blikle"}},"title":"Three-valued predicates for software specification and validation.","venue":"Fundam. Informaticae","volume":"14","number":"4","pages":"387-410","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Blikle91","url":"https://dblp.org/rec/journals/fuin/Blikle91"}, "url":"URL#6902641" }, { "@score":"1", "@id":"6902642", "info":{"authors":{"author":{"@pid":"84/275","text":"Stephen D. Comer"}},"title":"An algebraic approach to the approximation of information.","venue":"Fundam. Informaticae","volume":"14","number":"4","pages":"495-502","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Comer91","url":"https://dblp.org/rec/journals/fuin/Comer91"}, "url":"URL#6902642" }, { "@score":"1", "@id":"6902643", "info":{"authors":{"author":[{"@pid":"00/1116","text":"Philippe Darondeau"},{"@pid":"90/1344","text":"Pierpaolo Degano"}]},"title":"About semantic action refinement.","venue":"Fundam. Informaticae","volume":"14","number":"2","pages":"221-234","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/DarondeauD91","url":"https://dblp.org/rec/journals/fuin/DarondeauD91"}, "url":"URL#6902643" }, { "@score":"1", "@id":"6902650", "info":{"authors":{"author":[{"@pid":"h/HendrikJanHoogeboom","text":"Hendrik Jan Hoogeboom"},{"@pid":"r/GrzegorzRozenberg","text":"Grzegorz Rozenberg"}]},"title":"Diamond properties of elementary net systems.","venue":"Fundam. Informaticae","volume":"14","number":"3","pages":"287-300","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/HoodgeboomR91","url":"https://dblp.org/rec/journals/fuin/HoodgeboomR91"}, "url":"URL#6902650" }, { "@score":"1", "@id":"6902655", "info":{"authors":{"author":[{"@pid":"01/6261","text":"Andrzej Jankowski"},{"@pid":"m/ZMichalewicz","text":"Zbigniew Michalewicz"}]},"title":"Closed sets of Boolean terms in relational databases.","venue":"Fundam. Informaticae","volume":"14","number":"3","pages":"367-385","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/JankowskiM91","url":"https://dblp.org/rec/journals/fuin/JankowskiM91"}, "url":"URL#6902655" }, { "@score":"1", "@id":"6902656", "info":{"authors":{"author":{"@pid":"84/321","text":"Michael Kaminski"}},"title":"Embedding a default system into nonmonotonic logics.","venue":"Fundam. Informaticae","volume":"14","number":"3","pages":"345-353","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Kaminski91","url":"https://dblp.org/rec/journals/fuin/Kaminski91"}, "url":"URL#6902656" }, { "@score":"1", "@id":"6902657", "info":{"authors":{"author":[{"@pid":"41/4261","text":"N. W. Keesmaat"},{"@pid":"k/JettyKleijn","text":"H. C. M. Kleijn"},{"@pid":"r/GrzegorzRozenberg","text":"Grzegorz Rozenberg"}]},"title":"Vector controlled concurrent systems, part II: comparisons.","venue":"Fundam. Informaticae","volume":"14","number":"1","pages":"1-38","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/KeesmaatKR91","url":"https://dblp.org/rec/journals/fuin/KeesmaatKR91"}, "url":"URL#6902657" }, { "@score":"1", "@id":"6902658", "info":{"authors":{"author":[{"@pid":"22/4203","text":"Beata Konikowska"},{"@pid":"t/AndrzejTarlecki","text":"Andrzej Tarlecki"},{"@pid":"14/3094","text":"Andrzej Blikle"}]},"title":"A three-valued logic for software specification and validation.","venue":"Fundam. Informaticae","volume":"14","number":"4","pages":"411-453","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/KonikowskaTB91","url":"https://dblp.org/rec/journals/fuin/KonikowskaTB91"}, "url":"URL#6902658" }, { "@score":"1", "@id":"6902660", "info":{"authors":{"author":{"@pid":"12/47","text":"Waldemar Korczynski"}},"title":"An axiomatic characterization of a class of Petri Nets.","venue":"Fundam. Informaticae","volume":"14","number":"4","pages":"477-491","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Korczynski91","url":"https://dblp.org/rec/journals/fuin/Korczynski91"}, "url":"URL#6902660" }, { "@score":"1", "@id":"6902661", "info":{"authors":{"author":{"@pid":"k/MaciejKoutny","text":"Maciej Koutny"}},"title":"Axiom system induced by CTL* Logic.","venue":"Fundam. Informaticae","volume":"14","number":"2","pages":"235-253","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Koutny91","url":"https://dblp.org/rec/journals/fuin/Koutny91"}, "url":"URL#6902661" }, { "@score":"1", "@id":"6902663", "info":{"authors":{"author":[{"@pid":"k/FredKroger","text":"Fred Kröger"},{"@pid":"52/4601","text":"Stephan Merz"}]},"title":"Temporal logic and recursion.","venue":"Fundam. Informaticae","volume":"14","number":"2","pages":"261-281","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/KrogerM91","url":"https://dblp.org/rec/journals/fuin/KrogerM91"}, "url":"URL#6902663" }, { "@score":"1", "@id":"6902664", "info":{"authors":{"author":[{"@pid":"l/RitaLoogen","text":"Rita Loogen"},{"@pid":"g/UrsulaGoltz","text":"Ursula Goltz"}]},"title":"Modelling nondeterministic concurrent processes with event structures.","venue":"Fundam. Informaticae","volume":"14","number":"1","pages":"39-74","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/LoogenG91","url":"https://dblp.org/rec/journals/fuin/LoogenG91"}, "url":"URL#6902664" }, { "@score":"1", "@id":"6902665", "info":{"authors":{"author":[{"@pid":"27/1341","text":"Andrea Maggiolo-Schettini"},{"@pid":"20/797","text":"G. Michele Pinna"},{"@pid":"46/3496","text":"Józef Winkowski"}]},"title":"A compositional semantics for unmarked predicate/transition nets.","venue":"Fundam. Informaticae","volume":"14","number":"1","pages":"109-128","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Maggiolo-SchettiniPW91","url":"https://dblp.org/rec/journals/fuin/Maggiolo-SchettiniPW91"}, "url":"URL#6902665" }, { "@score":"1", "@id":"6902667", "info":{"authors":{"author":{"@pid":"31/1171","text":"Erkki Mäkinen"}},"title":"A hierarchy of context-free derivations.","venue":"Fundam. Informaticae","volume":"14","number":"2","pages":"255-259","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Makinen91","url":"https://dblp.org/rec/journals/fuin/Makinen91"}, "url":"URL#6902667" }, { "@score":"1", "@id":"6902670", "info":{"authors":{"author":[{"@pid":"76/6395","text":"Miroslav Novotný"},{"@pid":"19/2833","text":"Zdzislaw Pawlak"}]},"title":"Algebraic theory of independence in information systems.","venue":"Fundam. Informaticae","volume":"14","number":"4","pages":"454-476","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/NovotnyP91","url":"https://dblp.org/rec/journals/fuin/NovotnyP91"}, "url":"URL#6902670" }, { "@score":"1", "@id":"6902677", "info":{"authors":{"author":{"@pid":"32/4183","text":"Zbigniew Stachniak"}},"title":"Minimization of resolution proof systems.","venue":"Fundam. Informaticae","volume":"14","number":"1","pages":"129-146","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Stachniak91","url":"https://dblp.org/rec/journals/fuin/Stachniak91"}, "url":"URL#6902677" }, { "@score":"1", "@id":"6902678", "info":{"authors":{"author":{"@pid":"84/302","text":"Jaroslaw Stepaniuk"}},"title":"Applications of finite models properties in approximation and algorithmic logics.","venue":"Fundam. Informaticae","volume":"14","number":"1","pages":"91-108","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Stepaniuk91","url":"https://dblp.org/rec/journals/fuin/Stepaniuk91"}, "url":"URL#6902678" }, { "@score":"1", "@id":"6902679", "info":{"authors":{"author":{"@pid":"17/5767","text":"Stefka Stoeva"}},"title":"On processing of fuzzy production systems.","venue":"Fundam. Informaticae","volume":"14","number":"3","pages":"301-312","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Stoeva91","url":"https://dblp.org/rec/journals/fuin/Stoeva91"}, "url":"URL#6902679" }, { "@score":"1", "@id":"6902680", "info":{"authors":{"author":{"@pid":"t/MiroslawTruszczynski","text":"Miroslaw Truszczynski"}},"title":"Modal nonmonotonic logic with restricted application of the negation as failure to prove rule.","venue":"Fundam. Informaticae","volume":"14","number":"3","pages":"355-366","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Truszczynski91","url":"https://dblp.org/rec/journals/fuin/Truszczynski91"}, "url":"URL#6902680" }, { "@score":"1", "@id":"6902682", "info":{"authors":{"author":{"@pid":"v/KVidyasankar","text":"K. Vidyasankar"}},"title":"Unified theory of database serializability.","venue":"Fundam. Informaticae","volume":"14","number":"2","pages":"147-183","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Vidyasankar91","url":"https://dblp.org/rec/journals/fuin/Vidyasankar91"}, "url":"URL#6902682" }, { "@score":"1", "@id":"6902684", "info":{"authors":{"author":{"@pid":"12/4158","text":"Pawel Wlaz"}},"title":"On uniqueness of the Wulff shape for cellular automata.","venue":"Fundam. Informaticae","volume":"14","number":"1","pages":"75-90","year":"1991","type":"Journal Articles","access":"unavailable","key":"journals/fuin/Wlaz91","url":"https://dblp.org/rec/journals/fuin/Wlaz91"}, "url":"URL#6902684" } ] } } } )