Author of the publication

Mereotopological Analysis of Formal Concepts in Security Ontologies.

, and . CISIS, volume 85 of Advances in Intelligent and Soft Computing, page 33-40. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A logic-algebraic tool for reasoning with Knowledge-Based Systems., , , , and . CoRR, (2018)Specifying and Verifying Meta-Security by Means of Semantic Web Methods., , , and . SOCO-CISIS-ICEUTE, volume 299 of Advances in Intelligent Systems and Computing, page 355-365. Springer, (2014)Algebraic combinatorics in bounded induction.. Ann. Pure Appl. Log., 172 (2): 102885 (2021)A Topological Study of the Upward Refinement Operators in ILP., , and . ILP Work-in-progress reports, volume 35 of CEUR Workshop Proceedings, CEUR-WS.org, (2000)A model of three-way decisions for Knowledge Harnessing., , and . Int. J. Approx. Reason., (2020)Explainable Artificial Intelligence in Data Science., and . Minds Mach., 32 (3): 485-531 (2022)Modeling Lexicon Emergence as Concept Emergence in Networks., , and . AECIA, volume 427 of Advances in Intelligent Systems and Computing, page 409-420. Springer, (2015)Estimating Re-identification Risk by Means of Formal Conceptualization., , and . CISIS-ICEUTE, volume 1400 of Advances in Intelligent Systems and Computing, page 13-22. Springer, (2021)Towards a Soft Evaluation and Refinement of Tagging in Digital Humanities., , and . SOCO, volume 368 of Advances in Intelligent Systems and Computing, page 79-89. Springer, (2015)Generalizing Programs vis Subsumption., , and . EUROCAST, volume 2809 of Lecture Notes in Computer Science, page 115-126. Springer, (2003)