Sciweavers

5255 search results - page 920 / 1051
» Formal Methods for Privacy
Sort
View
IHIS
2005
ACM
15 years 9 months ago
Verifying web services composition based on hierarchical colored petri nets
Current Web services composition proposals, such as BPML, BPEL, WSCI, and OWL-S, provide notations for describing the control and data flows in Web service collaborations. However...
Yanping Yang, QingPing Tan, Yong Xiao
KCAP
2005
ACM
15 years 9 months ago
A case study of wiki-based experience repository at a medium-sized software company
The paper reports on an exploratory case study where an organizational learning methodology was used to support knowledge sharing in a medium-sized distributed software developmen...
Thomas Chau, Frank Maurer
KCAP
2005
ACM
15 years 9 months ago
An Approach to Ontology Mapping Negotiation
Ontology mapping negotiation aims to achieve consensus among real-world entities about the process of transforming information between different models (ontologies). This paper de...
Nuno Silva, Paulo Maio, João Rocha
KCAP
2005
ACM
15 years 9 months ago
Matching utterances to rich knowledge structures to acquire a model of the speaker's goal
An ultimate goal of AI is to build end-to-end systems that interpret natural language, reason over the resulting logical forms, and perform actions based on that reasoning. This r...
Peter Z. Yeh, Bruce W. Porter, Ken Barker
SAC
2005
ACM
15 years 9 months ago
Knowledge based approach to semantic composition of teams in an organization
Finding rapidly suitable experts in an organization to compose a team able to solve specific tasks is a typical problem in large consulting firms. In this paper we present a Des...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...