default search action
Jorge Lobo 0001
Person information
- affiliation: Pompeu Fabra University, ICREA / Department of Information and Communication Technologies, Barcelona, Spain
- affiliation (former): IBM T. J. Watson Research Center, USA
- affiliation (former): Teltier Technologies
- affiliation (former): Bell Laboratories, Murray Hill, NJ, USA
- affiliation (former): University of Illinois, Chicago, IL, USA
- affiliation (former): University of Maryland, College Park, MD, USA
Other persons with the same name
- Jorge Lobo 0002 (aka: Jorge Nuno de Almeida e Sousa Almada Lobo) — Coimbra University, Department of Electrical & Computer Engineering, Portugal
Other persons with a similar name
- Jorge M. Lobo — Museo Nacional de Ciencias Naturales, Madrid, Spain
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Carlos Buil-Aranda, Jorge Lobo, Federico Olmedo:
Differential privacy and SPARQL. Semantic Web 15(3): 745-773 (2024) - [c105]Daniel Cunnington, Mark Law, Jorge Lobo, Alessandra Russo:
The Role of Foundation Models in Neuro-Symbolic Learning and Reasoning. NeSy (1) 2024: 84-100 - [c104]Yaniv Aspis, Mohammad Albinhassan, Jorge Lobo, Alessandra Russo:
Embed2Rule Scalable Neuro-Symbolic Learning via Latent Space Weak-Labelling. NeSy (1) 2024: 195-218 - [i8]Daniel Cunnington, Mark Law, Jorge Lobo, Alessandra Russo:
The Role of Foundation Models in Neuro-Symbolic Learning and Reasoning. CoRR abs/2402.01889 (2024) - 2023
- [j39]Daniel Cunnington, Mark Law, Jorge Lobo, Alessandra Russo:
FFNSL: Feed-Forward Neural-Symbolic Learner. Mach. Learn. 112(2): 515-569 (2023) - [c103]Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Dinesh C. Verma, Seraphin B. Calo, Alessandra Russo:
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies. CODASPY 2023: 263-272 - [c102]Daniel Cunnington, Mark Law, Jorge Lobo, Alessandra Russo:
Neuro-Symbolic Learning of Answer Set Programs from Raw Data. IJCAI 2023: 3586-3596 - 2022
- [c101]Yaniv Aspis, Krysia Broda, Jorge Lobo, Alessandra Russo:
Embed2Sym - Scalable Neuro-Symbolic Reasoning via Clustered Embeddings. KR 2022 - [i7]Daniel Cunnington, Mark Law, Jorge Lobo, Alessandra Russo:
Inductive Learning of Complex Knowledge from Raw Data. CoRR abs/2205.12735 (2022) - 2021
- [c100]Daniel Cunnington, Mark Law, Jorge Lobo, Alessandra Russo:
Inductive Learning of Complex Knowledge from Raw Data. TFSOCTAI@AAAI Fall Symposium 2021 - [c99]Diego Calvanese, Francesco Di Cosmo, Jorge Lobo, Marco Montali:
Convergence Verification of Declarative Distributed Systems. CILC 2021: 62-76 - [c98]Daniel Cunnington, Mark Law, Alessandra Russo, Jorge Lobo, Lance M. Kaplan:
Towards Neural-Symbolic Learning to support Human-Agent Operations. FUSION 2021: 1-8 - [c97]Anand Mudgerikar, Elisa Bertino, Jorge Lobo, Dinesh C. Verma:
A Security-Constrained Reinforcement Learning Framework for Software Defined Networks. ICC 2021: 1-6 - [c96]Arthur Drozdov, Mark Law, Jorge Lobo, Alessandra Russo, Mercion Wilathgamuwage Don:
Online Symbolic Learning of Policies for Explainable Security. TPS-ISA 2021: 269-278 - [e6]Jorge Lobo, Roberto Di Pietro, Omar Chowdhury, Hongxin Hu:
SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021. ACM 2021, ISBN 978-1-4503-8365-3 [contents] - [i6]Daniel Cunnington, Mark Law, Alessandra Russo, Jorge Lobo:
FF-NSL: Feed-Forward Neural-Symbolic Learner. CoRR abs/2106.13103 (2021) - 2020
- [c95]Mark Law, Alessandra Russo, Elisa Bertino, Krysia Broda, Jorge Lobo:
FastLAS: Scalable Inductive Logic Programming Incorporating Domain-Specific Optimisation Criteria. AAAI 2020: 2877-2885 - [c94]Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Mark Law, Alessandra Russo, Seraphin B. Calo, Dinesh C. Verma:
Polisma - A Framework for Learning Attribute-Based Access Control Policies. ESORICS (1) 2020: 523-544 - [c93]Yaniv Aspis, Krysia Broda, Alessandra Russo, Jorge Lobo:
Stable and Supported Semantics in Continuous Vector Spaces. KR 2020: 59-68 - [c92]Jorge Lobo, Elisa Bertino, Alessandra Russo:
On Security Policy Migrations. SACMAT 2020: 179-188 - [e5]Jorge Lobo, Scott D. Stoller, Peng Liu:
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, Barcelona, Spain, June 10-12, 2020. ACM 2020, ISBN 978-1-4503-7568-9 [contents] - [i5]Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Dinesh C. Verma, Seraphin B. Calo, Alessandra Russo:
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies. CoRR abs/2010.09767 (2020) - [i4]Daniel Cunnington, Alessandra Russo, Mark Law, Jorge Lobo, Lance M. Kaplan:
NSL: Hybrid Interpretable Learning From Noisy Raw Data. CoRR abs/2012.05023 (2020)
2010 – 2019
- 2019
- [j38]Jorge Lobo:
Relationship-based access control: More than a social network access control model. WIREs Data Mining Knowl. Discov. 9(2) (2019) - [c91]Mark Law, Alessandra Russo, Elisa Bertino, Krysia Broda, Jorge Lobo:
Representing and Learning Grammars in Answer Set Programming. AAAI 2019: 2919-2928 - [c90]Elisa Bertino, Graham White, Jorge Lobo, John Ingham, Gregory H. Cirincione, Alessandra Russo, Mark Law, Seraphin B. Calo, Irene Manotas, Dinesh C. Verma, Amani Abu Jabal, Daniel Cunnington, Geeth de Mel:
Generative Policies for Coalition Systems - A Symbolic Learning Framework. ICDCS 2019: 1590-1600 - [c89]Jorge Lobo, Windhya Rankothge, Helena Ramalhinho Lourenço:
On the Scaling of Virtualized Network Functions. IM 2019: 125-133 - [p1]Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo:
Optimal Placement of Security Resources for the Internet of Things. The Internet of Things for Smart Urban Ecosystems 2019: 95-124 - 2018
- [c88]Diego Calvanese, Marco Montali, Jorge Lobo:
Verification of Fixed-Topology Declarative Distributed Systems with External Data. AMW 2018 - [c87]Jiefei Ma, Windhya Rankothge, Christian Makaya, Mariceli Morales, Franck Le, Jorge Lobo:
An Overview of A Load Balancer Architecture for VNF chains Horizontal Scaling. CNSM 2018: 323-327 - [c86]Antonino Rullo, Edoardo Serra, Jorge Lobo:
Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review. PADG@ESORICS 2018: 202-226 - [e4]Elisa Bertino, Dan Lin, Jorge Lobo:
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018. ACM 2018 [contents] - [i3]Jiefei Ma, Windhya Rankothge, Christian Makaya, Mariceli Morales, Franck Le, Jorge Lobo:
A Comprehensive Study on Load Balancers for VNF chains Horizontal Scaling. CoRR abs/1810.03238 (2018) - 2017
- [j37]Windhya Rankothge, Franck Le, Alessandra Russo, Jorge Lobo:
Optimizing Resource Allocation for Virtualized Network Functions in a Cloud Center Using Genetic Algorithms. IEEE Trans. Netw. Serv. Manag. 14(2): 343-356 (2017) - [c85]Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo:
Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios. ESORICS (2) 2017: 419-436 - [c84]Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo:
Shortfall-Based Optimal Security Provisioning for Internet of Things. ICDCS 2017: 2585-2586 - [c83]Edelmira Pasarella, Jorge Lobo:
A Datalog Framework for Modeling Relationship-based Access Control Policies. SACMAT 2017: 91-102 - [i2]Windhya Rankothge, Franck Le, Alessandra Russo, Jorge Lobo:
Data Modelling for the Evaluation of Virtualized Network Functions Resource Allocation Algorithms. CoRR abs/1702.00369 (2017) - 2016
- [j36]Jorge Lobo:
Introduction to Stochastic Computing using a Remote Lab with Reconfigurable Logic. Int. J. Online Eng. 12(4): 23-26 (2016) - [j35]Jiefei Ma, Franck Le, Alessandra Russo, Jorge Lobo:
Declarative Framework for Specification, Simulation and Analysis of Distributed Applications. IEEE Trans. Knowl. Data Eng. 28(6): 1489-1502 (2016) - 2015
- [j34]Qiang Zeng, Mingyi Zhao, Peng Liu, Poonam Yadav, Seraphin B. Calo, Jorge Lobo:
Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation. IEEE Trans. Knowl. Data Eng. 27(4): 979-992 (2015) - [c82]Edelmira Pasarella, Jorge Lobo:
Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational Framework. CSF 2015: 232-242 - [c81]Mingyi Zhao, Peng Liu, Jorge Lobo:
Towards Collaborative Query Planning in Multi-party Database Networks. DBSec 2015: 19-34 - [c80]Windhya Rankothge, Jiefei Ma, Franck Le, Alessandra Russo, Jorge Lobo:
Towards making network function virtualization a cloud computing service. IM 2015: 89-97 - [c79]Jiefei Ma, Franck Le, Alessandra Russo, Jorge Lobo:
Detecting distributed signature-based intrusion: The case of multi-path routing attacks. INFOCOM 2015: 558-566 - [c78]Windhya Rankothge, Franck Le, Alessandra Russo, Jorge Lobo:
Experimental results on the use of genetic algorithms for scaling virtualized network functions. NFV-SDN 2015: 47-53 - 2014
- [c77]Edelmira Pasarella, Jorge Lobo:
An Operational Framework to Reason about Policies Behavior in Trust Management System. AMW 2014 - 2013
- [j33]Philippe Owezarski, Jorge Lobo, Deep Medhi:
Network and Service Management for Cloud Computing and Data Centers: A Report on CNSM 2012. J. Netw. Syst. Manag. 21(4): 707-712 (2013) - [j32]Dan Lin, Prathima Rao, Rodolfo Ferrini, Elisa Bertino, Jorge Lobo:
A Similarity Measure for Comparing XACML Policies. IEEE Trans. Knowl. Data Eng. 25(9): 1946-1959 (2013) - [j31]Jiefei Ma, Franck Le, David Wood, Alessandra Russo, Jorge Lobo:
A declarative approach to distributed computing: Specification, execution and analysis. Theory Pract. Log. Program. 13(4-5): 815-830 (2013) - 2012
- [c76]Raheleh Dimaghani, Sahin Cem Geyik, Keith Grueneberg, Jorge Lobo, S. Yousaf Shah, Boleslaw K. Szymanski, Petros Zerfos:
Policy-Aware Service Composition in Sensor Networks. IEEE SCC 2012: 186-193 - [c75]Jorge Lobo, Jiefei Ma, Alessandra Russo, Franck Le:
Declarative Distributed Computing. Correct Reasoning 2012: 454-470 - [c74]Jorge Lobo, David Wood, Dinesh C. Verma, Seraphin B. Calo:
Distributed state machines: A declarative framework for the management of distributed systems. CNSM 2012: 224-228 - [c73]Ian M. Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo:
Risk-based security decisions under uncertainty. CODASPY 2012: 157-168 - [c72]Luke Dickens, Ian M. Molloy, Jorge Lobo, Pau-Chen Cheng, Alessandra Russo:
Learning Stochastic Models of Information Flow. ICDE 2012: 570-581 - [c71]Jorge Lobo, Massimo Marchi, Alessandro Provetti:
Firewall Configuration Policies for the Specification and Implementation of Private Zones. POLICY 2012: 78-85 - [c70]Suresh Chari, Jorge Lobo, Ian M. Molloy:
Practical risk aggregation in RBAC models. SACMAT 2012: 117-118 - [c69]Ramya Raghavendra, Jorge Lobo, Kang-Won Lee:
Dynamic graph query primitives for SDN-based cloudnetwork management. HotSDN@SIGCOMM 2012: 97-102 - 2011
- [j30]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
Fine-grained integration of access control policies. Comput. Secur. 30(2-3): 91-107 (2011) - [c68]Ian M. Molloy, Jorge Lobo, Suresh Chari:
Adversaries' Holy Grail: access control analytics. BADGERS@EuroSys 2011: 54-61 - [c67]Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil Lupu, Seraphin B. Calo, Morris Sloman:
Refinement of History-Based Policies. Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning 2011: 280-299 - [c66]Robert Craven, Jorge Lobo, Emil Lupu, Alessandra Russo, Morris Sloman:
Policy refinement: Decomposition and operationalization for dynamic domains. CNSM 2011: 1-9 - [c65]Hang Zhao, Jorge Lobo, Arnab Roy, Steven M. Bellovin:
Policy refinement of network services for MANETs. Integrated Network Management 2011: 113-120 - [e3]Ruth Breu, Jason Crampton, Jorge Lobo:
16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0688-1 [contents] - 2010
- [j29]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
EXAM: a comprehensive environment for the analysis of access control policies. Int. J. Inf. Sec. 9(4): 253-273 (2010) - [j28]Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie, Clare-Marie Karat, John Karat, Alberto Trombetta:
Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. 13(3): 24:1-24:31 (2010) - [j27]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining Roles with Multiple Objectives. ACM Trans. Inf. Syst. Secur. 13(4): 36:1-36:35 (2010) - [c64]Qun Ni, Elisa Bertino, Jorge Lobo:
Risk-based access control systems built on fuzzy inferences. AsiaCCS 2010: 250-260 - [c63]Robert Craven, Jorge Lobo, Emil C. Lupu, Alessandra Russo, Morris Sloman:
Decomposition techniques for policy refinement. CNSM 2010: 72-79 - [c62]Mandis Beigi, Jorge Lobo, Keith Grueneberg, Seraphin B. Calo, John Karat:
A Negotiation Framework for Negotiation of Coalition Policies. POLICY 2010: 133-136 - [c61]Ian M. Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens:
Mining roles with noisy data. SACMAT 2010: 45-54 - [c60]Chris Giblin, Marcel Graf, Günter Karjoth, Andreas Wespi, Ian M. Molloy, Jorge Lobo, Seraphin B. Calo:
Towards an integrated approach to role engineering. SafeConfig 2010: 63-70
2000 – 2009
- 2009
- [j26]Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang:
Analysis of privacy and security policies. IBM J. Res. Dev. 53(2): 3 (2009) - [j25]John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder:
Policy framework for security and privacy management. IBM J. Res. Dev. 53(2): 4 (2009) - [j24]Qun Ni, Elisa Bertino, Jorge Lobo, Seraphin B. Calo:
Privacy-Aware Role-Based Access Control. IEEE Secur. Priv. 7(4): 35-43 (2009) - [c59]Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil C. Lupu, Arosha K. Bandara:
Expressive policy analysis with enhanced system dynamicity. AsiaCCS 2009: 239-250 - [c58]Qun Ni, Elisa Bertino, Jorge Lobo:
D-algebra for composing access control policy decisions. AsiaCCS 2009: 298-309 - [c57]Li Pan, Jorge Lobo, Seraphin B. Calo:
Extending the CIM-SPL policy language with RBAC for distributed management systems in the WBEM infrastructure. Integrated Network Management 2009: 145-148 - [c56]Prathima Rao, Gabriel Ghinita, Elisa Bertino, Jorge Lobo:
Visualization for Access Control Policy Analysis Results Using Multi-level Grids. POLICY 2009: 25-28 - [c55]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
An algebra for fine-grained integration of XACML policies. SACMAT 2009: 63-72 - [c54]Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, Mary Ellen Zurko:
Usability meets access control: challenges and research opportunities. SACMAT 2009: 73-74 - [c53]Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohatgi, Elisa Bertino:
Automating role-based provisioning by learning from examples. SACMAT 2009: 75-84 - [c52]Ian M. Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo:
Evaluating role mining algorithms. SACMAT 2009: 95-104 - [c51]Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin:
Access control policy combining: theory meets practice. SACMAT 2009: 135-144 - [c50]Robert Craven, Jorge Lobo, Emil Lupu, Alessandra Russo, Morris Sloman:
Security policy refinement using data integration: a position paper. SafeConfig 2009: 25-28 - [e2]Ehab Al-Shaer, Mohamed G. Gouda, Jorge Lobo, Sanjai Narain, Felix Wu:
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009. ACM 2009, ISBN 978-1-60558-778-3 [contents] - 2008
- [c49]Alberto E. Schaeffer Filho, Emil Lupu, Morris Sloman, Sye Loong Keoh, Jorge Lobo, Seraphin B. Calo:
A Role-Based Infrastructure for the Management of Dynamic Communities. AIMS 2008: 1-14 - [c48]Michael Gelfond, Jorge Lobo:
Authorization and Obligation Policies in Dynamic Systems. ICLP 2008: 22-36 - [c47]Jorge Lobo, Vasileios Pappas:
C2: The Case for a Network Configuration Checking Language. POLICY 2008: 29-36 - [c46]Hang Zhao, Jorge Lobo, Steven M. Bellovin:
An Algebra for Integration and Analysis of Ponder2 Policies. POLICY 2008: 74-77 - [c45]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240 - [c44]Carolyn Brodie, David George, Clare-Marie Karat, John Karat, Jorge Lobo, Mandis Beigi, Xiping Wang, Seraphin B. Calo, Dinesh C. Verma, Alberto E. Schaeffer Filho, Emil Lupu, Morris Sloman:
The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment. POLICY 2008: 247-249 - [c43]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining roles with semantic meanings. SACMAT 2008: 21-30 - [c42]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
Policy decomposition for collaborative access control. SACMAT 2008: 103-112 - [c41]Qun Ni, Elisa Bertino, Jorge Lobo:
An obligation model bridging access control policies and privacy policies. SACMAT 2008: 133-142 - 2007
- [c40]Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo:
Conditional Privacy-Aware Role Based Access Control. ESORICS 2007: 72-89 - [c39]Dakshi Agrawal, Seraphin B. Calo, Kang-Won Lee, Jorge Lobo:
Issues in Designing a Policy Language for Distributed Management of IT Infrastructures. Integrated Network Management 2007: 30-39 - [c38]Jorge Lobo:
Policy-Based Computing: From Systems and Applications to Theory. LPNMR 2007: 2 - [c37]Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo:
An approach to evaluate policy similarity. SACMAT 2007: 1-10 - [c36]Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo:
Privacy-aware role based access control. SACMAT 2007: 41-50 - [c35]Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 - 2006
- [c34]Seraphin B. Calo, Jorge Lobo:
A Basis for Comparing Characteristics of Policy Systems. POLICY 2006: 183-194 - 2005
- [j23]Dakshi Agrawal, Kang-Won Lee, Jorge Lobo:
Policy-based management of networked computing systems. IEEE Commun. Mag. 43(10): 69-75 (2005) - [c33]Dakshi Agrawal, James Giles, Kang-Won Lee, Jorge Lobo:
Policy Ratification. POLICY 2005: 223-232 - 2004
- [i1]Jorge Lobo, Gisela Mendez, Stuart R. Taylor:
Knowledge And The Action Description Language A. CoRR cs.AI/0404051 (2004) - 2003
- [j22]Madhur Kohli, Jorge Lobo:
Realizing network Control Policies using Distributed Action Plans. J. Netw. Syst. Manag. 11(3): 305-327 (2003) - [j21]Jan Chomicki, Jorge Lobo, Shamim A. Naqvi:
Conflict Resolution Using Logic Programming. IEEE Trans. Knowl. Data Eng. 15(1): 244-249 (2003) - 2001
- [j20]Goce Trajcevski, Chitta Baral, Jorge Lobo:
Formalizing and Reasoning About the Requirements Specifications of Workflow Systems. Int. J. Cooperative Inf. Syst. 10(4): 483-507 (2001) - [j19]Jorge Lobo, Gisela Mendez, Stuart R. Taylor:
Knowledge and the Action Description Language A. Theory Pract. Log. Program. 1(2): 129-184 (2001) - [c32]Tran Cao Son, Jorge Lobo:
Reasoning about Policies using Logic Programs. Answer Set Programming 2001 - [c31]Jan Chomicki, Jorge Lobo:
Monitors for History-Based Policies. POLICY 2001: 57-72 - [e1]Morris Sloman, Jorge Lobo, Emil Lupu:
Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings. Lecture Notes in Computer Science 1995, Springer 2001, ISBN 3-540-41610-2 [contents] - 2000
- [c30]Madhur Kohli, Jorge Lobo:
Distributed action plans in an agent based network management system. Agents 2000: 140-141 - [c29]Goce Trajcevski, Chitta Baral, Jorge Lobo:
Formalizing (and Reasoning About) the Specifications of Workflows. CoopIS 2000: 1-17 - [c28]Randeep Bhatia, Jorge Lobo, Madhur Kohli:
Policy Evaluation for Network Management. INFOCOM 2000: 1107-1116 - [c27]Jan Chomicki, Jorge Lobo, Shamim A. Naqvi:
A Logic Programming Approach to Conflict Resolution in Policy Management. KR 2000: 121-132 - [c26]Aashu Virmani, Jorge Lobo, Madhur Kohli:
Netmon: network management for the SARAS softswitch. NOMS 2000: 803-816
1990 – 1999
- 1999
- [j18]Jürgen Dix, Jorge Lobo:
Editorial - Logic Programming with Non-monotonic Semantics: Representing Knowledge and its Computation. Ann. Math. Artif. Intell. 25(3-4): 161-164 (1999) - [c25]Jorge Lobo, Randeep Bhatia, Shamim A. Naqvi:
A Policy Description Language. AAAI/IAAI 1999: 291-298 - [c24]Randeep Bhatia, Madhur Kohli, Jorge Lobo, Aashu Virmani:
A Policy-based Network Management System. IC-AI 1999: 465-471 - 1997
- [j17]Jorge Lobo, Carlos Uzcátegui:
Abductive Consequence Relations. Artif. Intell. 89(1-2): 149-171 (1997) - [j16]Terry Gaasterland, Jorge Lobo:
Qualifying Answers According to User Needs and Preferences. Fundam. Informaticae 32(2): 121-137 (1997) - [j15]Jorge Lobo, Goce Trajcevski:
Minimal and Consistent Evolution of Knowledge Bases. J. Appl. Non Class. Logics 7(1): 117-146 (1997) - [c23]Jorge Lobo, Gisela Mendez, Stuart R. Taylor:
Adding Knowledge to the Action Description Language A. AAAI/IAAI 1997: 454-459 - [c22]Chitta Baral, Jorge Lobo:
From Action Theories to Updates, Transactions, Triggers and Agents - A Tutorial. DOOD 1997: 26-32 - [c21]Chitta Baral, Jorge Lobo, Goce Trajcevski:
Formal Characterizations of Active Databases: Part II. DOOD 1997: 247-264 - [c20]Chitta Baral, Jorge Lobo:
Defeasible Specifications in Action Theories. IJCAI 1997: 1441-1446 - 1996
- [j14]Chengjie Luo, Clement T. Yu, Jorge Lobo, Gaoming Wang, Tracy Pham:
Computation of Best Bounds of Probabilities from Uncertain Data. Comput. Intell. 12: 541-566 (1996) - [j13]Jorge Lobo, Carlos Uzcátegui:
Abductive Change Operators. Fundam. Informaticae 27(4): 385-411 (1996) - [j12]John Jeffrey, Jorge Lobo, Tadao Murata:
A High-Level Petri Net for Goal-Directed Semantics of Horn Clause Logic. IEEE Trans. Knowl. Data Eng. 8(2): 241-259 (1996) - [j11]Louiqa Raschid, Jorge Lobo:
Semantics for Update Rule Programs and Implementations in a Relational Database Management System. ACM Trans. Database Syst. 21(4): 526-571 (1996) - [c19]Goce Trajcevski, Jorge Lobo, Naveen Grover:
Meta Updater: An Interactive Tool for Minimal View Updates in Knowledge Bases. ICTAI 1996: 478-479 - [c18]Chitta Baral, Jorge Lobo:
Formal Characterization of Active Databases. Logic in Databases 1996: 175-195 - 1995
- [j10]Jorge Lobo, Qi Yang, Clement T. Yu:
Dynamic Maintenance of the Transitive Closure in Disjunctive Graphs. Ann. Math. Artif. Intell. 14(2-4): 151-176 (1995) - [j9]Teruhiro Shimura, Jorge Lobo, Tadao Murata:
An Extended Petri Net Model for Normal Logic Programs. IEEE Trans. Knowl. Data Eng. 7(1): 150-162 (1995) - [c17]Claudio Robles, Jorge Lobo, Terry Gaasterland:
An Experimental Distributed Deductive Database System. DOOD 1995: 128-142 - 1994
- [j8]Louiqa Raschid, Jorge Lobo:
A Semantics for a Class of Non-Deterministic and Causal Production System Programs. J. Autom. Reason. 12(3): 305-349 (1994) - [c16]Terry Gaasterland, Natalia Maltsev, Jorge Lobo, Guo-Hua Chen:
Assigning Function to CDS Through Qualified Query Answering: Beyond Alignment and Motifs. ISMB 1994: 130-137 - [c15]Monica D. Barback, Jorge Lobo:
A Resolution-based Procedure for Default Theories with Extensions. NMELP 1994: 101-126 - [c14]Terry Gaasterland, Jorge Lobo:
Qualified Answers That Reflect User Needs and Preferences. VLDB 1994: 309-320 - 1993
- [j7]José Alberto Fernández, Jorge Lobo, Jack Minker, V. S. Subrahmanian:
Disjunctive LP + Integrity Constraints = Stable Model Semantics. Ann. Math. Artif. Intell. 8(3-4): 449-474 (1993) - [j6]John Grant, John F. Horty, Jorge Lobo, Jack Minker:
View Updates in Stratified Disjunctive Databases. J. Autom. Reason. 11(2): 249-267 (1993) - [j5]Terry Gaasterland, Jorge Lobo:
Processing Negation and Disjunction in Logic Programs Through Integrity Constraints. J. Intell. Inf. Syst. 2(3): 225-243 (1993) - [c13]Terry Gaasterland, Jorge Lobo:
Using Semantic Information for Processing Negation and Disjunction in Logic Programs. ISMIS 1993: 198-208 - [c12]Monica D. Barback, Jorge Lobo:
A Proof Procedure for Default Theories with Extensions. ILPS 1993: 651 - 1992
- [b1]Jorge Lobo, Jack Minker, Arcot Rajasekar:
Foundations of disjunctive logic programming. Logic Programming, MIT Press 1992, ISBN 978-0-262-12165-1, pp. 1-307 - [j4]Chitta Baral, Jorge Lobo, Jack Minker:
Generalized Disjunctive Well-Founded Semantics for Logic Programs. Ann. Math. Artif. Intell. 5(2-4): 89-131 (1992) - [j3]Jorge Lobo, V. S. Subrahmanian:
Relating Minimal Models and Pre-Requisite-Free Normal Defaults. Inf. Process. Lett. 44(3): 129-133 (1992) - [c11]Monica D. Barback, Jorge Lobo, James J. Lu:
Minimizing Indefinite Information in Disjunctive Deductive Databases. ICDT 1992: 246-260 - [c10]Teruhiro Shimura, Jorge Lobo, Tadao Murata:
A Petri Net Semantics for Logic Programs with Negation. SEKE 1992: 292-299 - 1991
- [j2]Jorge Lobo, Arcot Rajasekar, Jack Minker:
Semantics of Horn and Disjunctive Logic Programs. Theor. Comput. Sci. 86(1): 93-106 (1991) - [c9]Jack Minker, Jorge Lobo, Arcot Rajasekar:
Circumscription and Disjunctive Logic Programming. Artificial and Mathematical Theory of Computation 1991: 281-304 - [c8]Jack Minker, Arcot Rajasekar, Jorge Lobo:
Theory of Disjunctive Logic Programs. Computational Logic - Essays in Honor of Alan Robinson 1991: 613-639 - [c7]Chitta Baral, Jorge Lobo, Jack Minker:
WF³: A Semantics for Negation in Normal Disjunctive Logic Programs. ISMIS 1991: 459-468 - 1990
- [c6]Chitta Baral, Jorge Lobo, Jack Minker:
Generalized Well-founded Semantics for Logic Programs (Extended Abstract). CADE 1990: 102-116 - [c5]Jorge Lobo:
On Constructive Negation for Disjunctive Logic Programs. NACLP 1990: 704-718
1980 – 1989
- 1989
- [j1]Arcot Rajasekar, Jorge Lobo, Jack Minker:
Weak Generalized Closed World Assumption. J. Autom. Reason. 5(3): 293-307 (1989) - [c4]Jorge Lobo, Jack Minker, Arcot Rajasekar:
Extending the Semantics of Logic Programs to Disjunctive Logic Programs. ICLP 1989: 255-267 - [c3]Arcot Rajasekar, Jorge Lobo, Jack Minker:
Skeptical Reasoning and Disjunctive Programs. KR 1989: 349-356 - 1988
- [c2]Jorge Lobo, Jack Minker:
A Metaprogramming Approach to Semantically Optimize Queries in Deduktive Databases. Expert Database Conf. 1988: 699-741 - [c1]Jorge Lobo, Jack Minker, Arcot Rajasekar:
Weak Completion Theory for Non-Horn Programs. ICLP/SLP 1988: 828-842
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint