2014 Spring

Welcome to the homepage of CSE645 (Spring 2014) Seminar in Languages!

General Information

Course description: We will read papers and discuss research ranging from high-level specifications (such as logic, rules, and sets) to algorithms and methods for efficient implementations, with applications in semantic web, program analysis, security, and services.

Instructors: Michael Kifer, David Warren, Annie Liu, CR Ramakrishnan and Paul Fodor (contact: paul.fodor@stonybrook.edu)

Hours: Thursdays 2:30pm-3:50pm, in CS 1310.

Papers:

We will select papers from the following list (don't have to cover all) and possibly other interesting ones as they come up.

Logic programming, database and AI planning papers:

Tabular: A Schema-Driven Probabilistic Programming Language,

Andrew D. Gordon, Thore Graepel, Nicolas Rolland, Claudio Russo, Johannes Borgstrom, and John Guiver

POPL 2014.

http://research.microsoft.com/pubs/204661/MSR-TR-2013-118.pdf

Massive Graph Triangulation,

Xiaocheng Hu, Yufei Tao, Chin-Wan Chung,

SIGMOD 2013,

http://www.cse.cuhk.edu.hk/~taoyf/paper/sigmod13-triangle.pdf

Cascading Map-Side Joins over HBase for Scalable Join Processing.

Alexander Schätzle, Martin Przyjaciel-Zablocki, Christopher Dorner, Thomas Hornung, Georg Lausen.

In the Joint Workshop on Scalable and High-Performance Semantic Web Systems 2012 (in conjunction with the International Semantic Web Conference ISWC 2012).

http://ceur-ws.org/Vol-943/SSWS_HPCSW2012_paper5.pdf

Lloyd-Topor Completion and General Stable Models.

Vladimir Lifschitz and Fangkai Yang.

In ICLP 2013.

http://www.cs.utexas.edu/users/vl/papers/ltc.pdf

Some Alternative Formulations of the Event Calculus.

Rob Miller, Murray Shanahan.

In Computational Logic: Logic Programming and Beyond, 2002.

http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.476

Compact Serialization of Prolog Terms.

Paul Tarau.

In ICLP 2013.

http://journals.cambridge.org/action/displayFulltext?type=1&fid=9011735&jid=TLP&volumeId=13&issueId=4-5&aid=9011733

A Tabled Prolog Program for Solving Sokoban.

Neng-Fa Zhou, Agostino Dovier

Fundam. Inform. 124(4): 561-575 (2013)

http://www.sci.unich.it/cilc2011/papers/zhou.pdf

A Comparison of CP, IP, and SAT Solvers through a Common Interface,

Neng-Fa Zhou, Masato Tsuru, Eitaku Nobuyama,

ICTAI 2012: 41-48

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6495027

The PDF is not available with Google seach, but can be obtained if the student uses the Stony Brook library system within SBU. Open: http://guides.library.stonybrook.edu/databases , click "Browse by subject", select "Computer Science" and search for the title.

Programming Finite-Domain Constraint Propagators in Action Rules,

Neng-Fa Zhou,

In Theory and Practice of Logic Programming, Vol.6, No.5, pp.483-508, 2006.

http://www.sci.brooklyn.cuny.edu/~zhou/papers/arule.pdf

Linear Tabling Strategies and Optimizations,

Neng-Fa Zhou, T. Sato, and Y.D. Shen

In Theory and Practice of Logic Programming, Vol.8, No.1, pp.81-109, 2008.

http://www.sci.brooklyn.cuny.edu/~zhou/papers/tplp07.pdf

Attempto Controlled English for Knowledge Representation

Norbert E. Fuchs, Kaarel Kaljurand, and Tobias Kuhn

Reasoning Web 2008.

http://attempto.ifi.uzh.ch/site/pubs/papers/reasoningweb2008_fuchs.pdf

Security, trust management languages and attribute-based access control papers:

DKAL 2 – a simplified and improved authorization language.

Y. Gurevich and I. Neeman.

Technical Report MSR-TR-2009-11, Microsoft Research, 2009.

http://research.microsoft.com/pubs/79528/200.pdf

Regulating service access and information release on the web.

P. Bonatti and P. Samarati.

In Proceedings of the 7th ACM conference on Computer and communications security, pages 134–143. ACM, 2000.

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.99.4111&rep=rep1&type=pdf

and

A uniform framework for regulating service access and information release on the web,

P. Bonatti and P. Samarati,

In Journal of Computer Security, 10(3):241–272, 2002.

http://spdp.di.unimi.it/papers/jcs-cred.ps

SD3: A trust management system with certified evaluation.

T. Jim.

In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 106–115, 2001.

http://trevorjim.com/papers/JimOakland2001.pdf

Foundations of Logic-Based Trust Management,

Moritz Y. Becker, Alessandra Russo, Nik Sultana.

IEEE Symposium on Security and Privacy, 2012.

http://www.computer.org/csdl/proceedings/sp/2012/4681/00/06234411.pdf

Requirements engineering for trust management: model, methodology, and reasoning.

P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone.

International Journal of Information Security, 5(4):257–274, 2006.

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.9393&rep=rep1&type=pdf

Schedule

1/30  Organizational meeting.

2/6 Jon and Spyros will present their prelims.

2/13 Snow day.

2/20 Tiantian will present "Attempto Controlled English for Knowledge Representation", Reasoning Web 2008, http://attempto.ifi.uzh.ch/site/pubs/papers/reasoningweb2008_fuchs.pdf

2/27 Pachurya Nayak will present "SD3: A trust management system with certified evaluation", 2001 IEEE Symposium on Security and Privacy, http://trevorjim.com/papers/JimOakland2001.pdf.

3/6  Reza will present "DKAL 2 – a simplified and improved authorization language (Microsoft Research 2009, http://research.microsoft.com/pubs/79528/200.pdf).

3/13 Bo will present "Programming Finite-Domain Constraint Propagators in Action Rules" (TPLP2006, http://www.sci.brooklyn.cuny.edu/~zhou/papers/arule.pdf)

3/20 Spring break.

3/27 Ahsanul Karim will present "Requirements Engineering for Trust Management: Model, Methodology, and Reasoning", Journal of Information Security 2006, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.9393&rep=rep1&type=pdf.

4/3 Faculty candidate.

4/10 Yi Li will present "Cascading Map-Side Joins over HBase for Scalable Join Processing", ISWC 2012, http://ceur-ws.org/Vol-943/SSWS_HPCSW2012_paper5.pdf.

4/17 Kane will present "A Comparison of CP, IP, and SAT Solvers through a Common Interface" (ICTAI 2012, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6495027).

4/24 Andrei will present "Tabular: A Schema-Driven Probabilistic Programming Language" (POPL 2014, http://research.microsoft.com/pubs/204661/MSR-TR-2013-118.pdf).

5/1 Mohammad Amin will present the papers: "Regulating service access and information release on the web" (ACM Com. 2000, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.99.4111&rep=rep1&type=pdf) and "A uniform framework for regulating service access and information release on the web" (Journal of Computer Security 2002, http://spdp.di.unimi.it/papers/jcs-cred.ps).

5/8 Jon will present "Foundations of Logic-Based Trust Management", IEEE Symposium on Security and Privacy, 2012. http://www.computer.org/csdl/proceedings/sp/2012/4681/00/06234411.pdf.

Stand presentations: 

- Payel will present "A Tabled Prolog Program for Solving Sokoban" (FundamInform2013, http://www.sci.unich.it/cilc2011/papers/zhou.pdf).

- Yi Guo will present "Lloyd-Topor Completion and General Stable Models" (ICLP 2013, http://www.cs.utexas.edu/users/vl/papers/ltc.pdf).