Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
In this paper we discuss the current methods in the representation of corpora annotated at multiple levels of linguistic organization (so-called multi-level or multi-layer corpora...
The purpose of this paper is to argue that research and practice of ISD could substantially benefit from interpreting ISD as knowledge work. Two distinct areas of competence are i...
— The relation between DAML-S, a language for the description of Web services grounded in the Semantic Web, and the growing Web services infrastructure based on WSDL is, by an la...
Massimo Paolucci, Naveen Srinivasan, Katia P. Syca...
The notion of tacit knowledge has been widely and diversely adopted in the knowledge management literature. It is used to cover knowledge which hasn't yet been articulated as ...