In this chapter we will introduce description logics, a family of logic-based knowledge representation languages that can be used to represent the terminological knowledge of an a...
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
We investigate the use of elastic hierarchies for representing trees, where a single graphical depiction uses a hybrid mixture, or “interleaving”, of more basic forms at diffe...
Shengdong Zhao, Michael J. McGuffin, Mark H. Chign...
In this paper we describe a tool to improve interfunctional communication of project plans by displaying them as a metro map. Our tool automatically lays out plans using a multicr...
Jonathan M. Stott, Peter Rodgers, Remo Aslak Burkh...
Abstract. Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not bee...
Hayriye Altunbasak, Sven Krasser, Henry L. Owen, J...