When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Many popular ontology languages are based on (subsets of) first-order predicate logic, with classes represented by unary predicates and properties by binary predicates. Specificall...
Semantic Business Process Management is a recent and promising research area devoted to extending the results from Semantic Web Services — i.e., the application of ontology-base...
Abstract. Diagrams that serve as a visual input facility for programming environments have to be translated into some kind of semantic description. This paper describes such a meth...
Abstract—Stakeholders from several domains with local terminologies have to work together to develop and operate softwareintensive systems, like production automation systems. On...