Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
We present a framework for logic-based matchmaking on ALN ABoxes stored in a relational database. The proposed approach allows both non-standard reasoning and subsumption check be ...
Eufemia Tinelli, Francesco M. Donini, Michele Ruta...
Ontology is a comprehensive knowledge model which enables the developer to practice a “higher” level of reuse of knowledge. Typically, different modeling languages are employe...
: In this article we analyse the notion of knowledge role. First of all, we present how the relationship between problem solving methods and domain models is tackled in different a...
Chantal Reynaud, Nathalie Aussenac-Gilles, Pierre ...
The next development in building Bayesian networks will most likely entail constructing multipurpose models that can be employed for varying tasks and by different types of user. ...
Hermina J. M. Tabachneck-Schijf, Linda C. van der ...