This paper introduces a set of challenges for developing a dissemination service over a Web collaborative network. We define specific metrics for working on a co-authorship researc...
Giseli Rabello Lopes, Mirella M. Moro, Leandro Kru...
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Abstract. We study the problem of instance level (ABox) updates for Knowledge Bases (KBs) represented in Description Logics of the DL-Lite family. DLLite is at the basis of OWL 2 Q...
Diego Calvanese, Evgeny Kharlamov, Werner Nutt, Dm...
Abstract. Inference control can guarantee confidentiality but is costly to implement. Access control can be implemented efficiently but cannot guarantee confidentiality. Hence, it ...
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan...
The definition of Information System do not consider individual as a component of the Information System. In this paper we present our postulates, and our definition of Knowledge M...
The lexical entry for a word must contain all the information needed to construct a semantic representation for sentences that contain the word. Because of that requirement, the f...
This paper argues that there is no reason to distinguish between lexical information and real-world information on the basis of the formalisms used; that both types of knowledge c...
Drawing on a growing database of systematic relationships between word-senses, the authors argue that a significant class of these represent Lexical Implication Rules, a set of fo...
A computationally relevant theory of lexical semantics must take into consideration both the form and the content of three different static knowledge sources -- the lexicon, the o...