ind this work was to extract a relatively abstract level of information from each sentence , using only a limited vocabulary that was hand-crafted to handle a restricted set of tar...
Wendy G. Lehnert, Claire Cardie, David Fisher, Ell...
In this paper we present the basic requirements and initial design of a system which manages and facilitates changes to an OWL ontology in a multi-editor environment. This system u...
Timothy Redmond, Michael Smith, Nick Drummond, Tan...
As web service technology matures there is growing interest in exploiting workflow techniques to coordinate web services. Bioinformaticians are a user community who combine web re...
Thomas M. Oinn, Matthew Addis, Justin Ferris, Darr...
Today's enterprise databases are large and complex, often relating hundreds of entities. Enabling ordinary users to query such databases and derive value from them has been o...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...