Enhancing disjunctive datalog by constraints F Buccafurri, N Leone, P Rullo IEEE Transactions on Knowledge and Data Engineering 12 (5), 845-860, 2000 | 206 | 2000 |
Strong and weak constraints in disjunctive datalog F Buccafurri, N Leone, P Rullo International Conference on Logic Programming and Nonmonotonic Reasoning, 2-17, 1997 | 114 | 1997 |
Disjunctive Logic Programs with Inheritance. F Buccafurri, W Faber, N Leone ICLP 99, 79-93, 1999 | 105 | 1999 |
Enhancing model checking in verification by AI techniques F Buccafurri, T Eiter, G Gottlob, N Leone Artificial Intelligence 112 (1-2), 57-104, 1999 | 104 | 1999 |
A logical framework for reasoning on data access control policies E Bertino, F Buccafurri, E Ferrari, P Rullo Proceedings of the 12th IEEE Computer Security Foundations Workshop, 175-189, 1999 | 81 | 1999 |
Comparing Twitter and Facebook user behavior: Privacy and other aspects F Buccafurri, G Lax, S Nicolazzo, A Nocera Computers in Human Behavior 52, 87-95, 2015 | 66 | 2015 |
Discovering links among social networks F Buccafurri, G Lax, A Nocera, D Ursino Joint European Conference on Machine Learning and Knowledge Discovery in …, 2012 | 60 | 2012 |
A quad-tree based multiresolution approach for two-dimensional summary data F Buccafurri, F Furfaro, GM Mazzeo, D Saccà Information Systems 36 (7), 1082-1103, 2011 | 60 | 2011 |
Bridge analysis in a social internetworking scenario F Buccafurri, VD Foti, G Lax, A Nocera, D Ursino Information Sciences 224, 1-18, 2013 | 49 | 2013 |
Modeling cooperation in multi-agent communities F Buccafurri, D Rosaci, GML Sarné, L Palopoli Cognitive Systems Research 5 (3), 171-190, 2004 | 48 | 2004 |
Stable models and their computation for logic programming with inheritance and true negation F Buccafurri, N Leone, P Rullo The Journal of logic programming 27 (1), 5-43, 1996 | 48 | 1996 |
Discovering missing me edges across social networks F Buccafurri, G Lax, A Nocera, D Ursino Information Sciences 319, 18-37, 2015 | 45 | 2015 |
Improving range query estimation on histograms F Buccafurri, D Rosaci, L Pontieri, D Saccà Proceedings 18th International Conference on Data Engineering, 628-638, 2002 | 38 | 2002 |
Analysis of QoS in cooperative services for real time applications F Buccafurri, P De Meo, M Fugini, R Furnari, A Goy, G Lax, P Lops, ... Data & Knowledge Engineering 67 (3), 463-484, 2008 | 37 | 2008 |
An agent-based hierarchical clustering approach for e-commerce environments F Buccafurri, D Rosaci, GML Sarnè, D Ursino International Conference on Electronic Commerce and Web Technologies, 109-118, 2002 | 37 | 2002 |
Moving from social networks to social internetworking scenarios: The crawling perspective F Buccafurri, G Lax, A Nocera, D Ursino Information Sciences 256, 126-137, 2014 | 36 | 2014 |
On ACTL formulas having linear counterexamples F Buccafurri, T Eiter, G Gottlob, N Leone Journal of Computer and System Sciences 62 (3), 463-515, 2001 | 36 | 2001 |
An authorization model and its formal semantics E Bertino, F Buccafurri, E Ferrari, P Rullo European Symposium on Research in Computer Security, 127-142, 1998 | 35 | 1998 |
Analysis-preserving protection of user privacy against information leakage of social-network Likes F Buccafurri, L Fotia, G Lax, V Saraswat Information Sciences 328, 340-358, 2016 | 32 | 2016 |
A logic-based approach for enforcing access control 1 E Bertino, F Buccafurri, E Ferrari, P Rullo Journal of Computer Security 8 (2-3), 109-139, 2000 | 30 | 2000 |