Sciweavers

152 search results - page 17 / 31
» Keys for Free in Description Logics
Sort
View
CADE
2005
Springer
15 years 10 months ago
Regular Protocols and Attacks with Regular Knowledge
We prove that, if the initial knowledge of the intruder is given by a deterministic bottom-up tree automaton, then the insecurity problem for cryptographic protocols with atomic ke...
Tomasz Truderung
OWLED
2008
14 years 11 months ago
Characterizing and Detecting Integrity Issues in OWL Instance Data
We view OWL instance data evaluation as a process in which instance data is checked for conformance with application requirements. We previously identified some integrity issues ra...
Jiao Tao, Li Ding, Jie Bao, Deborah L. McGuinness
EDBT
2002
ACM
138views Database» more  EDBT 2002»
15 years 9 months ago
DAML+OIL: A Reason-able Web Ontology Language
Ontologies are set to play a key role in the "Semantic Web", extending syntactic interoperability to semantic interoperability by providing a source of shared and precise...
Ian Horrocks
JSS
2010
132views more  JSS 2010»
14 years 4 months ago
Formal specification of the variants and behavioural features of design patterns
The formal specification of design patterns is widely recognized as being vital to their effective and correct use in software development. It can clarify the concepts underlying ...
Ian Bayley, Hong Zhu
CLEF
2008
Springer
14 years 11 months ago
RAVE: A Fast Logic-Based Answer Validator
RAVE (Real-time Answer Validation Engine) is a logic-based answer validator/selector designed for real-time question answering. Instead of proving a hypothesis for each answer, RAV...
Ingo Glöckner