Abstract. We present an approach to security requirements engineering, which makes use of special kinds of problem frames that serve to structure, characterize, analyze, and solve ...
This paper argues that itisimpossible to separate lexicaland encyclopedic knowledge and describes an attempt to build a large lexical database that contains the range of informati...
Martha W. Evens, Joanne Dardaine, Yu-Feng Huang, S...
Abstract. The DL implementation group (DIG) has specified a common interface for description logic reasoner. While the original intention was to make it easier for other tools to ...
Policy-based automation is emerging as a viable approach to IT systems management, codifying high-level business goals into executable specifications for governing IT operations. ...
Eser Kandogan, John H. Bailey, Paul P. Maglio, Ebe...
Planning is often not a one-shot task because either the world or the agent's knowledge of the world changes. In this paper, we introduce a new principle that can be used to ...