Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
This paper introduces BIUTEE1 , an opensource system for recognizing textual entailment. Its main advantages are its ability to utilize various types of knowledge resources, and i...
AI planning solves the problem of generating a correct and efficient ordered set of instantiated activities, from a knowledge base of generic actions, which when executed will tra...
An important concern in web based educational environment is the task of designing and preparing learner assessment, which would enhance the learning process. Currently the majori...
This paper details a visual concept ontology driven knowledge acquisition methodology. We propose to use a visual concept ontology to guide experts in the visual description of the...