Sciweavers

4335 search results - page 175 / 867
» Ontology Engineering Relationally
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 5 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
WM
2003
15 years 5 months ago
Integration with Ontologies
: One of today’s hottest IT topics is integration, as bringing together information from different sources and structures is not completely solved. The approach outlined here wan...
Andreas Maier, Jessica Aguado, Amaia Bernaras, I&n...
DLOG
2011
14 years 7 months ago
Extracting Finite Sets of Entailments from OWL Ontologies
The canonical standard description logic reasoning service is classification, that is, the generation of the set of atomic subsumptions which are entailed by some ontology. While ...
Samantha Bail, Bijan Parsia, Ulrike Sattler
ECAI
2000
Springer
15 years 8 months ago
Enriching very large ontologies using the WWW
This paper explores the possibility to exploit text on the world wide web in order to enrich the concepts in existing ontologies. First, a method to retrieve documents from the WWW...
Eneko Agirre, Olatz Ansa, Eduard H. Hovy, David Ma...
139
Voted
ECAI
2006
Springer
15 years 7 months ago
Discovering Missing Background Knowledge in Ontology Matching
Semantic matching determines the mappings between the nodes of two graphs (e.g., ontologies) by computing logical relations (e.g., subsumption) holding among the nodes that corresp...
Fausto Giunchiglia, Pavel Shvaiko, Mikalai Yatskev...