Sciweavers

50 search results - page 10 / 10
» Ontology based IT-security planning
Sort
View
EKAW
2008
Springer
13 years 7 months ago
Principles for Knowledge Engineering on the Web
With the advent of the Web and the efforts towards a Semantic Web the nature of knowledge engineering has changed drastically. In this position paper we propose four principles fo...
Guus Schreiber
AAAI
2004
13 years 6 months ago
Mixed-Initiative Workflow Composition
CAT's knowledge base contains abstract task or example "abstract flight reservation task," which can be included in a workflow as placeholders. CAT will gest that us...
Marc Spraragen
HICSS
2002
IEEE
136views Biometrics» more  HICSS 2002»
13 years 10 months ago
Using XML to Facilitate Information Management across Multiple Local Government Agencies
The main barriers to the level of electronic data interchange required to seamlessly integrate services offered by legacy systems in an Internet environment are the need for appli...
G. M. Bryan, Joanne M. Curry, Carolyn McGregor, D....
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
13 years 11 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu
EKAW
2004
Springer
13 years 10 months ago
ConEditor: Tool to Input and Maintain Constraints
We present a tool which helps domain experts capture and maintain constraints. The tool displays parts of an ontology (as classes, sub-classes and properties) in the form of a tree...
Suraj Ajit, Derek H. Sleeman, David W. Fowler, Dav...