Abstract. This paper discusses the approach of ontology-based knowledge engineering in FF POIROT, a project to explore the use of ontology technology in information systems against...
Gang Zhao, John Kingston, Koen Kerremans, Frederic...
Abstract. Digital goods such as music are vulnerable to illegal use over the internet. Technology-driven IT solutions to protection are useful but limited. Instead, we suggest that...
Jaap Gordijn, Hans Akkermans, Hans van Vliet, Edwi...
We describe the rst parallel algorithm with optimal speedup for constructing minimum-width tree decompositions of graphs of bounded treewidth. On n-vertex input graphs, the algori...
Abstract. The main contribution of this paper is a new iterated secretkey block cipher called 3D, inspired by the AES cipher. The 3D cipher has an SPN design, operates on 512-bit b...
Many formal models of cognition implicitly use subjective probability distributions to capture the assumptions of human learners. Most applications of these models determine these...