Nome |
# |
Using Ontologies for Semantic Data Integration, file e3835317-2ddc-15e8-e053-a505fe0a3de9
|
371
|
Inconsistency-tolerant Query Answering in Ontology-based Data Access, file e383531b-7960-15e8-e053-a505fe0a3de9
|
199
|
Revisiting Controlled Query Evaluation in Description Logics, file e3835321-77bd-15e8-e053-a505fe0a3de9
|
114
|
Acquiring Ontology Axioms through Mappings to Data Sources, file e3835325-1044-15e8-e053-a505fe0a3de9
|
70
|
Ontology-Based Data Access: A Survey, file e383531c-bd6d-15e8-e053-a505fe0a3de9
|
59
|
Controlled query evaluation in description logics through instance indistinguishability, file e3835328-c613-15e8-e053-a505fe0a3de9
|
58
|
Optique: Zooming in on Big Data, file e383532b-8cb7-15e8-e053-a505fe0a3de9
|
55
|
Ontology-Based Data Access and Integration, file e3835322-2e76-15e8-e053-a505fe0a3de9
|
53
|
Mapping Repair in Ontology-based Data Access Evolving Systems, file e3835322-149e-15e8-e053-a505fe0a3de9
|
51
|
Approaching OBDA Evolution through Mapping Repair, file e3835315-d07b-15e8-e053-a505fe0a3de9
|
49
|
Controlled Query Evaluation in Ontology-Based Data Access, file e383532d-0927-15e8-e053-a505fe0a3de9
|
38
|
Mapping Analysis in Ontology-Based Data Access: Algorithms and Complexity, file e383532a-dc4e-15e8-e053-a505fe0a3de9
|
32
|
Instance-Level Update in DL-Lite Ontologies through First-Order Rewriting, file e383532d-26e2-15e8-e053-a505fe0a3de9
|
28
|
Mapping analysis in ontology-based data access: Algorithms and complexity (Discussion paper), file e3835329-ee51-15e8-e053-a505fe0a3de9
|
23
|
Controlled Query Evaluation over Ontologies through Policies with Numerical Restrictions, file e383532d-9d16-15e8-e053-a505fe0a3de9
|
22
|
Revisiting Controlled Query Evaluation in Description Logics, file e3835323-260d-15e8-e053-a505fe0a3de9
|
21
|
A novel approach to controlled query evaluation in DL-Lite, file e3835325-51db-15e8-e053-a505fe0a3de9
|
19
|
Controlled Query Evaluation in OWL 2 QL: A "Longest Honeymoon" Approach, file 709c7130-c0fc-4fbe-bcdf-8c0ac74c0463
|
16
|
Query-based comparison of OBDA specifications, file e3835322-05a0-15e8-e053-a505fe0a3de9
|
16
|
Controlled query evaluation over prioritized ontologies with expressive data protection policies, file e383532d-09fa-15e8-e053-a505fe0a3de9
|
16
|
A Comprehensive Framework for Controlled Query Evaluation, Consistent Query Answering and KB Updates in Description Logics, file e383531d-8d59-15e8-e053-a505fe0a3de9
|
13
|
Mapping Analysis in Ontology-based Data Access: Algorithms and Complexity (Extended Abstract), file e3835322-03e8-15e8-e053-a505fe0a3de9
|
13
|
Mapping Repair in Ontology-based Data Access Evolving Systems (Extended Abstract), file e3835321-dc2e-15e8-e053-a505fe0a3de9
|
12
|
Bounded Implication for Existential Rules, file e3835322-6f0f-15e8-e053-a505fe0a3de9
|
10
|
On the first-order rewritability of conjunctive queries over binary guarded existential rules, file e3835323-71e6-15e8-e053-a505fe0a3de9
|
10
|
A theory and implementation of cognitive mobile robots, file e3835311-e7f6-15e8-e053-a505fe0a3de9
|
9
|
Controlled Query Evaluation in Ontology-Based Data Access, file e3835328-1b71-15e8-e053-a505fe0a3de9
|
9
|
A Gentle Introduction to Controlled Query Evaluation in DL-Lite Ontologies, file 0e56f287-e569-429d-a435-7c10f71e705f
|
6
|
On Instance-level Update and Erasure in Description Logic Ontologies, file e3835311-ed72-15e8-e053-a505fe0a3de9
|
6
|
Data complexity of query answering in description logics, file e3835312-3f6b-15e8-e053-a505fe0a3de9
|
5
|
Data Complexity of Query Answering in Description Logics, file e3835314-11ef-15e8-e053-a505fe0a3de9
|
5
|
On Information Disclosure in Ontology-based Data Access (Extended Abstract), file e383532c-dc80-15e8-e053-a505fe0a3de9
|
5
|
Controlled Query Evaluation in OWL 2 QL: A "Longest Honeymoon" Approach, file 30f4150d-fdf7-4ecd-be38-f3c5e6883ecb
|
4
|
Controlled query evaluation over prioritized ontologies with expressive data protection policies, file 279bcc6e-510d-4cbd-9fc6-fcbc07b2869e
|
3
|
MASTRO STUDIO: Managing ontology-based data access applications, file e3835314-1685-15e8-e053-a505fe0a3de9
|
3
|
Controlled Query Evaluation in Description Logics Through Instance Indistinguishability, file e3835327-d570-15e8-e053-a505fe0a3de9
|
3
|
Privacy Preserving Query Answering in Description Logics Through Instance Indistinguishability, file e383532e-9e4b-15e8-e053-a505fe0a3de9
|
3
|
Dynamic Controlled Query Evaluation over DL-Lite Ontologies, file 5725f161-f572-48ed-9874-58347660e13c
|
2
|
Reasoning about Actions with Sensing under Qualitative and Probabilistic Uncertainty, file e3835311-c722-15e8-e053-a505fe0a3de9
|
2
|
null, file e3835314-0fc2-15e8-e053-a505fe0a3de9
|
2
|
Optique: Zooming in on Big Data, file e3835316-fbb7-15e8-e053-a505fe0a3de9
|
2
|
Ontology-Based Data Access and Integration, file e3835322-2e75-15e8-e053-a505fe0a3de9
|
2
|
Mapping analysis in ontology-based data access: Algorithms and complexity (Discussion paper), file e3835322-3851-15e8-e053-a505fe0a3de9
|
2
|
Inconsistency tolerance in P2P data integration: An epistemic logic approach, file e3835311-8718-15e8-e053-a505fe0a3de9
|
1
|
Query rewriting for inconsistent DL-lite ontologies, file e3835314-0c37-15e8-e053-a505fe0a3de9
|
1
|
Mastro: Ontology-based data access at work (extended abstract), file e3835314-158a-15e8-e053-a505fe0a3de9
|
1
|
Query-based comparison of mappings in ontology-based data access, file e3835322-46d8-15e8-e053-a505fe0a3de9
|
1
|
The What-To-Ask Problem for Ontology-Based Peers, file e3835324-c4bd-15e8-e053-a505fe0a3de9
|
1
|
Preface, file e3835325-9454-15e8-e053-a505fe0a3de9
|
1
|
Scalable end-user access to big data, file e3835327-07fc-15e8-e053-a505fe0a3de9
|
1
|
Totale |
1.448 |