Sciweavers

1235 search results - page 211 / 247
» Formalizing information security knowledge
Sort
View
FMCAD
2004
Springer
14 years 1 months ago
Proof Styles in Operational Semantics
Abstract. We relate two well-studied methodologies in deductive verification of operationally modeled sequential programs, namely the use of inductive invariants and clock functio...
Sandip Ray, J. Strother Moore
ISEMANTICS
2010
13 years 9 months ago
Foundations of data interoperability on the web: a web science perspective
In this paper, when we use the term ontology, we are primarily referring to linked data in the form of RDF(S). The problem of ontology mapping has attracted considerable attention...
Hamid Haidarian Shahri
WWW
2008
ACM
14 years 8 months ago
Exploiting semantic web technologies to model web form interactions
Form mapping is the key problem that needs to be solved in order to get access to the hidden web. Currently available solutions for fully automatic mapping are not ready for comme...
Bernhard Krüpl, Robert Baumgartner, Wolfgang ...
WWW
2007
ACM
14 years 8 months ago
Ontology Maturing: a Collaborative Web 2.0 Approach to Ontology Engineering
Most of the current methodologies for building ontologies rely on specialized knowledge engineers. This is in contrast to real-world settings, where the need for maintenance of do...
Simone Braun, Andreas Schmidt, Andreas Walter, G&a...
WWW
2006
ACM
14 years 8 months ago
Position paper: ontology construction from online ontologies
One of the main hurdles towards a wide endorsement of ontologies is the high cost of constructing them. Reuse of existing ontologies offers a much cheaper alternative than buildin...
Harith Alani