Sciweavers

RULEML
2010
Springer
13 years 3 months ago
Visualizing Logical Dependencies in SWRL Rule Bases
Rule bases are common in many business rule applications, clinical decision support programs, and other types of intelligent systems. As the size of the rule bases grows and the in...
Saeed Hassanpour, Martin J. O'Connor, Amar K. Das
RR
2010
Springer
13 years 3 months ago
A RESTful SWRL Rule Editor
The sparse application of the Semantic Web Rule Language is partly caused by a lack of intuitive rule editors. This applies both from a human user’s, as well as from a software i...
Carsten Keßler
ENTCS
2006
117views more  ENTCS 2006»
13 years 5 months ago
Interpreting SWRL Rules in RDF Graphs
An unresolved issue in SWRL (the Semantic Web Rule Language) is whether the intended semantics of its RDF representation can be described as an extension of the W3C RDF semantics....
Jing Mei, Harold Boley
ESWS
2006
Springer
13 years 8 months ago
A Metamodel and UML Profile for Rule-Extended OWL DL Ontologies
In this paper we present a MOF compliant metamodel and UML profile for the Semantic Web Rule Language (SWRL) that integrates with our previous work on a metamodel and UML profile f...
Saartje Brockmans, Peter Haase, Pascal Hitzler, Ru...
ATAL
2005
Springer
13 years 10 months ago
OWL-P: OWL for protocol and processes
We describe OWL-P (OWL for Processes and Protocols), a methodology and software tool for specifying and enacting interaction protocols among autonomous agents. We use the Web Onto...
Ashok U. Mallya, Nirmit Desai, Amit K. Chopra, Mun...
RR
2007
Springer
13 years 11 months ago
Extending SWRL to Enhance Mathematical Support
This paper presents an extension to the Semantic Web Rule Language and a methodology to enable advanced mathematical support in SWRL rules. This solution separates mathematical and...
Alfonso Sánchez-Macián, Encarna Past...
ICDE
2008
IEEE
165views Database» more  ICDE 2008»
13 years 11 months ago
Semantic Web and firewall alignment
— Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach...
Simon N. Foley, William M. Fitzgerald