Querying workflow logs Y Tang, I Mackey, J Su Information 9 (2), 25, 2018 | 13 | 2018 |
Early detection of temporal constraint violations I Mackey, R Chimni, J Su Information and Computation 296, 105114, 2024 | 3 | 2024 |
A Rule-Based Constraint Language for Event Streams I Mackey, J Su 4th International Workshop on the Resurgence of Datalog in Academia and …, 2022 | 3 | 2022 |
Mapping Business Rules to LTL Formulas I Mackey, J Su Service-Oriented Computing: 17th International Conference, ICSOC 2019 …, 2019 | 2 | 2019 |
The worst parallel Hanoi graphs EL Leiss, I Mackey Theoretical Computer Science 705, 1-8, 2018 | 2 | 2018 |
Mapping singly-linked rules to linear temporal logic formulas I Mackey, J Su Information Systems 117, 102222, 2023 | 1 | 2023 |
Improving Navigation Analysis with OD-D: The Visually Interactive Orbit Determination Dashboard M Jah, EBA Ramaswamy, J Stuart, I Mackey, J Crowley Pasadena, CA: Jet Propulsion Laboratory, National Aeronautics and Space …, 2020 | 1 | 2020 |
Early Detection of Business Rule Violations IA Mackey University of California, Santa Barbara, 2023 | | 2023 |