First Page | Document Content | |
---|---|---|
Date: 2010-03-16 23:51:24Programming language theory Programming paradigms Predicate logic Datalog Prolog Logic programming Predicate Extension SQL Computing Software engineering Query languages | SecureBlox: Customizable Secure Distributed Data Processing William R. Marczak∗ Micah Sherr‡ Shan Shan Huang†Add to Reading ListSource URL: netdb.cis.upenn.eduDownload Document from Source WebsiteFile Size: 346,04 KBShare Document on Facebook |
The Prolog to Mercury transition guide Version rotdThomas Conway Zoltan Somogyi Fergus HendersonDocID: 1xVTf - View Document | |
The Prolog to Mercury transition guide VersionThomas Conway Zoltan Somogyi Fergus HendersonDocID: 1xUyl - View Document | |
Prolog-Programm: - Fakten - Regeln - Anfragen Horn-Klauseln, bilden WissensbasisDocID: 1vbGX - View Document | |
Dept. of Social Science Informatics (SWI) Roetersstraat 15, 1018 WB Amsterdam The Netherlands http://www.swi.psy.uva.nl Programming in XPCE / PrologDocID: 1uQRL - View Document | |
Avoiding Equivariance in Alpha-Prolog Christian Urban1 and James Cheney2 1 Ludwig-Maximilians-University Munich () 2DocID: 1uyDU - View Document |