Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Proving that particular methods within a code base are functionally pure--deterministic and side-effect free--would aid verification of security properties including function inve...
Matthew Finifter, Adrian Mettler, Naveen Sastry, D...
Knowledge engineering relies on a unified effort of two components for success: 1) a strong expert knowledge back-end, and 2) an effective user interface. We address the latter is...
Victor Chou Hung, Avelino J. Gonzalez, Ronald F. D...
When a whole knowledge base must be derived for a fuzzy rule-based system, learning methods usually address this task with two or more sequential stages by separately designing ea...
Abstract. Many activities related to semantically annotated resources can be enabled by a notion of similarity among them. We propose a method for defining a family of semi-distan...