In architecture companies, work is very often performed by several individuals. From conceptual design to the construction of a final product, the object passes through many hands,...
Daniel Pinho, Adriana Santarosa Vivacqua, Sé...
This paper provides a systematic analysisof the relativeutility of basingEBG based plan reuse techniques in partial ordering vs. total ordering planning frameworks. We separate th...
This demo presents the Cupboard online system for sharing and reusing ontologies linked together with alignments, and that are attached to rich metadata and reviews. Categories an...
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
The rapid growth of available data arises the need for more sophisticated techniques for semantic access to information. It has been proved that using conceptual model or ontology...