2014 Spring
Welcome to the homepage of CSE645 (Spring 2014) Seminar in Languages!
General Information
Course description: We will read papers and discuss research ranging from high-level specifications (such as logic, rules, and sets) to algorithms and methods for efficient implementations, with applications in semantic web, program analysis, security, and services.
Instructors: Michael Kifer, David Warren, Annie Liu, CR Ramakrishnan and Paul Fodor (contact: paul.fodor@stonybrook.edu)
Hours: Thursdays 2:30pm-3:50pm, in CS 1310.
Papers:
We will select papers from the following list (don't have to cover all) and possibly other interesting ones as they come up.
Logic programming, database and AI planning papers:
Tabular: A Schema-Driven Probabilistic Programming Language,
Andrew D. Gordon, Thore Graepel, Nicolas Rolland, Claudio Russo, Johannes Borgstrom, and John Guiver
POPL 2014.
http://research.microsoft.com/pubs/204661/MSR-TR-2013-118.pdf
Massive Graph Triangulation,
Xiaocheng Hu, Yufei Tao, Chin-Wan Chung,
SIGMOD 2013,
http://www.cse.cuhk.edu.hk/~taoyf/paper/sigmod13-triangle.pdf
Cascading Map-Side Joins over HBase for Scalable Join Processing.
Alexander Schätzle, Martin Przyjaciel-Zablocki, Christopher Dorner, Thomas Hornung, Georg Lausen.
In the Joint Workshop on Scalable and High-Performance Semantic Web Systems 2012 (in conjunction with the International Semantic Web Conference ISWC 2012).
http://ceur-ws.org/Vol-943/SSWS_HPCSW2012_paper5.pdf
Lloyd-Topor Completion and General Stable Models.
Vladimir Lifschitz and Fangkai Yang.
In ICLP 2013.
http://www.cs.utexas.edu/users/vl/papers/ltc.pdf
Some Alternative Formulations of the Event Calculus.
Rob Miller, Murray Shanahan.
In Computational Logic: Logic Programming and Beyond, 2002.
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.476
Compact Serialization of Prolog Terms.
Paul Tarau.
In ICLP 2013.
A Tabled Prolog Program for Solving Sokoban.
Neng-Fa Zhou, Agostino Dovier
Fundam. Inform. 124(4): 561-575 (2013)
http://www.sci.unich.it/cilc2011/papers/zhou.pdf
A Comparison of CP, IP, and SAT Solvers through a Common Interface,
Neng-Fa Zhou, Masato Tsuru, Eitaku Nobuyama,
ICTAI 2012: 41-48
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6495027
The PDF is not available with Google seach, but can be obtained if the student uses the Stony Brook library system within SBU. Open: http://guides.library.stonybrook.edu/databases , click "Browse by subject", select "Computer Science" and search for the title.
Programming Finite-Domain Constraint Propagators in Action Rules,
Neng-Fa Zhou,
In Theory and Practice of Logic Programming, Vol.6, No.5, pp.483-508, 2006.
http://www.sci.brooklyn.cuny.edu/~zhou/papers/arule.pdf
Linear Tabling Strategies and Optimizations,
Neng-Fa Zhou, T. Sato, and Y.D. Shen
In Theory and Practice of Logic Programming, Vol.8, No.1, pp.81-109, 2008.
http://www.sci.brooklyn.cuny.edu/~zhou/papers/tplp07.pdf
Attempto Controlled English for Knowledge Representation
Norbert E. Fuchs, Kaarel Kaljurand, and Tobias Kuhn
Reasoning Web 2008.
http://attempto.ifi.uzh.ch/site/pubs/papers/reasoningweb2008_fuchs.pdf
Security, trust management languages and attribute-based access control papers:
DKAL 2 – a simplified and improved authorization language.
Y. Gurevich and I. Neeman.
Technical Report MSR-TR-2009-11, Microsoft Research, 2009.
http://research.microsoft.com/pubs/79528/200.pdf
Regulating service access and information release on the web.
P. Bonatti and P. Samarati.
In Proceedings of the 7th ACM conference on Computer and communications security, pages 134–143. ACM, 2000.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.99.4111&rep=rep1&type=pdf
and
A uniform framework for regulating service access and information release on the web,
P. Bonatti and P. Samarati,
In Journal of Computer Security, 10(3):241–272, 2002.
http://spdp.di.unimi.it/papers/jcs-cred.ps
SD3: A trust management system with certified evaluation.
T. Jim.
In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 106–115, 2001.
http://trevorjim.com/papers/JimOakland2001.pdf
Foundations of Logic-Based Trust Management,
Moritz Y. Becker, Alessandra Russo, Nik Sultana.
IEEE Symposium on Security and Privacy, 2012.
http://www.computer.org/csdl/proceedings/sp/2012/4681/00/06234411.pdf
Requirements engineering for trust management: model, methodology, and reasoning.
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone.
International Journal of Information Security, 5(4):257–274, 2006.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.9393&rep=rep1&type=pdf
Schedule
1/30 Organizational meeting.
2/6 Jon and Spyros will present their prelims.
2/13 Snow day.
2/20 Tiantian will present "Attempto Controlled English for Knowledge Representation", Reasoning Web 2008, http://attempto.ifi.uzh.ch/site/pubs/papers/reasoningweb2008_fuchs.pdf.
2/27 Pachurya Nayak will present "SD3: A trust management system with certified evaluation", 2001 IEEE Symposium on Security and Privacy, http://trevorjim.com/papers/JimOakland2001.pdf.
3/6 Reza will present "DKAL 2 – a simplified and improved authorization language (Microsoft Research 2009, http://research.microsoft.com/pubs/79528/200.pdf).
3/13 Bo will present "Programming Finite-Domain Constraint Propagators in Action Rules" (TPLP2006, http://www.sci.brooklyn.cuny.edu/~zhou/papers/arule.pdf)
3/20 Spring break.
3/27 Ahsanul Karim will present "Requirements Engineering for Trust Management: Model, Methodology, and Reasoning", Journal of Information Security 2006, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.9393&rep=rep1&type=pdf.
4/3 Faculty candidate.
4/10 Yi Li will present "Cascading Map-Side Joins over HBase for Scalable Join Processing", ISWC 2012, http://ceur-ws.org/Vol-943/SSWS_HPCSW2012_paper5.pdf.
4/17 Kane will present "A Comparison of CP, IP, and SAT Solvers through a Common Interface" (ICTAI 2012, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6495027).
4/24 Andrei will present "Tabular: A Schema-Driven Probabilistic Programming Language" (POPL 2014, http://research.microsoft.com/pubs/204661/MSR-TR-2013-118.pdf).
5/1 Mohammad Amin will present the papers: "Regulating service access and information release on the web" (ACM Com. 2000, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.99.4111&rep=rep1&type=pdf) and "A uniform framework for regulating service access and information release on the web" (Journal of Computer Security 2002, http://spdp.di.unimi.it/papers/jcs-cred.ps).
5/8 Jon will present "Foundations of Logic-Based Trust Management", IEEE Symposium on Security and Privacy, 2012. http://www.computer.org/csdl/proceedings/sp/2012/4681/00/06234411.pdf.
Stand presentations:
- Payel will present "A Tabled Prolog Program for Solving Sokoban" (FundamInform2013, http://www.sci.unich.it/cilc2011/papers/zhou.pdf).
- Yi Guo will present "Lloyd-Topor Completion and General Stable Models" (ICLP 2013, http://www.cs.utexas.edu/users/vl/papers/ltc.pdf).