Today ontology languages present a syntax which looks not “natural” and are lacking of built-in primitives (i.e., modeling notions) domain experts are familiar with. In this pa...
Abstract. The method of lexical chains is the first time introduced to generate summaries from Chinese texts. The algorithm which computes lexical chains based on the HowNet knowl...
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
In open environments like the Web, and open Multiagent and Peer2Peer systems, consent among the autonomous, self-interested knowledge sources and users very often cannot be establ...
A constraint expresses a relationship among one or more variables. Constraints are very useful in the development of collaborative applications, such as collaborative CAD and CASE ...
Kai Lin, David Chen, Chengzheng Sun, R. Geoff Drom...