—This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier’s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...
Bench-Capon and Sartor have proposed that reasoning with legal cases be seen as a process of theory construction, evaluation and application. They have proposed a set of theory co...
Information technology infrastructure (ITI) is said to play a significant role in knowledge management (KM) efforts. Yet, there is little research that focuses on how availability...
Previous content extraction evaluations have neglected to address problems which complicate the incorporation of extracted information into an existing knowledge base. Previous qu...
Paul McNamee, Hoa Trang Dang, Heather Simpson, Pat...
The difficulty of maintaining very large software systems is becoming more widely acknowledged. One of the primary problems is the need to access information about a complex and e...
Premkumar T. Devanbu, Peter G. Selfridge, Bruce W....