Several studies indicate that the level of predicate-argument structure is relevant for modeling prevalent phenomena in current textual entailment corpora. Although large resource...
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
The integration of Web services is a recent outgrowth of the Business Process integration field that will require powerful meta-schema mechanisms supported by higher level abstra...
Jun Shen, Georg Grossmann, Yun Yang, Markus Stumpt...
We present a logical approach to plan recognition that builds on Kautz's theory of keyhole plan recognition, defined as the problem of inferring descriptions of high-level pl...
—The vision of the Semantic Web has brought about new challenges at the intersection of web research and data management. One fundamental research issue at this intersection is t...