Follow
Isaac Mackey
Title
Cited by
Cited by
Year
Querying workflow logs
Y Tang, I Mackey, J Su
Information 9 (2), 25, 2018
132018
Early detection of temporal constraint violations
I Mackey, R Chimni, J Su
Information and Computation 296, 105114, 2024
32024
A Rule-Based Constraint Language for Event Streams
I Mackey, J Su
4th International Workshop on the Resurgence of Datalog in Academia and …, 2022
32022
Mapping Business Rules to LTL Formulas
I Mackey, J Su
Service-Oriented Computing: 17th International Conference, ICSOC 2019 …, 2019
22019
The worst parallel Hanoi graphs
EL Leiss, I Mackey
Theoretical Computer Science 705, 1-8, 2018
22018
Mapping singly-linked rules to linear temporal logic formulas
I Mackey, J Su
Information Systems 117, 102222, 2023
12023
Improving Navigation Analysis with OD-D: The Visually Interactive Orbit Determination Dashboard
M Jah, EBA Ramaswamy, J Stuart, I Mackey, J Crowley
Pasadena, CA: Jet Propulsion Laboratory, National Aeronautics and Space …, 2020
12020
Early Detection of Business Rule Violations
IA Mackey
University of California, Santa Barbara, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–8