Sciweavers

495 search results - page 71 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
IJWIS
2008
107views more  IJWIS 2008»
13 years 9 months ago
Adaptive ontology re-use: finding and re-using sub-ontologies
Purpose The discovery of the "right" ontology or ontology part is a central ingredient for effective ontology re-use. We present an approach for supporting a form of ada...
Rodolfo Stecher, Claudia Niederée, Wolfgang...
PERCOM
2010
ACM
13 years 8 months ago
Towards ontology-driven development of applications for smart environments
—In the environments where heterogeneous devices need to share information, utilize services of each other, and participate as components in various smart applications, it is com...
Artem Katasonov, Marko Palviainen
GIS
2007
ACM
14 years 10 months ago
Exploiting automatically inferred constraint-models for building identification in satellite imagery
The building identification (BID) problem is based on a process that uses publicly available information to automatically assign addresses to buildings in satellite imagery. In pr...
Martin Michalowski, Craig A. Knoblock, Kenneth M. ...
SEMWEB
2004
Springer
14 years 3 months ago
Trust Negotiation for Semantic Web Services
Semantic Web Services enable the dynamic discovery of services based on a formal, explicit specification of the requester needs. The actual Web Services that will be used to satis...
Daniel Olmedilla, Rubén Lara, Axel Polleres...
WOA
2007
13 years 10 months ago
Conceptual Foundations of Interrogative Agents
—Reasoning by interrogation is one of the most ancient and experimented ways of reasoning. Originated by the Aristotelian elenchus, it has been used for many purposes, such as th...
Vincenzo Deufemia, Giuseppe Polese, Genoveffa Tort...