There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
A common and difficult maintenance activity is the integration of existing software components or tools into a consistent and interoperable whole. One area in which this has prov...
This paper describes an approach for a composition of web services based on their semantic descriptions. The process section of OWL-S service descriptions is built with references...
— Semantic Web research and recent efforts of large software companies have lead to mature technologies that can enable real-life semantic applications. While benefits such as a...
Because of the increasing number of electronic data, designing efficient tools to retrieve and exploit documents is a major challenge. Current search engines suffer from two main d...
Sylvie Ranwez, Vincent Ranwez, Mohameth-Fran&ccedi...