: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
In this topical1 paper we try to give an analysis and overview of the current state of Semantic Web research. We point to different interpretations of the Semantic Web as the reaso...
In this paper two formal dialectic systems are described, a persuasion protocol (PP0) and a negotiation protocol (NP0), together with a method for shifting from an instance of a pe...
This paper analyzes the way in which the London Ambulance Service (LAS) recovered from the events of October 1992, when it implemented a computer aided despatch system (LASCAD) th...
In this paper a representative example is chosen that is meant be fairly simple for illustrating the point that in a very common kind of instance, argument and explanation are mixe...