Sciweavers

813 search results - page 116 / 163
» Rule Interchange on the Web
Sort
View
ACSAC
2004
IEEE
14 years 2 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
IJCAI
2007
13 years 11 months ago
Embedding Non-Ground Logic Programs into Autoepistemic Logic for Knowledge-Base Combination
In the context of the Semantic Web, several approaches to the combination of ontologies, given in terms of theories of classical first-order logic, and rule bases have been propo...
Jos de Bruijn, Thomas Eiter, Axel Polleres, Hans T...
AAI
2005
113views more  AAI 2005»
13 years 10 months ago
Analysis and Synthesis of Learning Agent's Communicative Behavior
This paper is about people. It is about understanding how learning and communication mutually influence one another; allowing people to infer each other's communicative behavi...
Nik Nailah Binti Abdullah, Stefano A. Cerri

Publication
383views
15 years 10 months ago
The Cathedral and the Bazaar
Ever wondered why open source finally yields products that work? Eric Raymod discusses that in this paper using the bazaar as a metaphor for open source hacker developed software t...
Eric Raymond
CADE
2006
Springer
14 years 10 months ago
A Resolution-Based Decision Procedure for SHOIQ
We present a resolution-based decision procedure for the description logic SHOIQ--the logic underlying the Semantic Web ontology language OWL-DL. Our procedure is goal-oriented, an...
Yevgeny Kazakov, Boris Motik