For the past few years, our research groups have independently been developing systems in which a multi-agent system (typically of lightweight agents) provides some functionality i...
H. Van Dyke Parunak, Sven Brueckner, Danny Weyns, ...
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Abstract. An important open question in the semantic Web is the precise relationship between the RDF(S) semantics and the semantics of standard knowledge representation formalisms ...
Abstract. This paper presents a controlled language for ontology editing and a software implementation, based partly on standard NLP tools, for processing that language and manipul...
Adam Funk, Valentin Tablan, Kalina Bontcheva, Hami...