Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing security in semantics driven policy based networks., , , and . Comput. Stand. Interfaces, 33 (1): 2-12 (2011)A framework for distributed trust management, , , and . Proceedings of IJCAI-01 Workshop on Autonomy, Delegation and Control, (2001)http://citeseer.nj.nec.com/kagal01framework.html.An Approach to Confidentiality and Integrity for OWL-S, , , , , and . Proceedings of AAAI 2004 Spring Symposium, (2004)Enabling Technology for Knowledge Sharing, , and . AI Magazine, 12 (3): 36-56 (1991)Social networking on the semantic web, , , and . The Learning Organization: An International Journal, (1 May 2005)KQML: A Language and Protocol for Knowledge and Information Exchenage, , , and . Knowledge Building and Knowledge Sharing, IOS Press, Amsterdam, (1994)Detecting Botnets using a Collaborative Situational-aware IDPS., , and . ICISSP, page 290-298. SciTePress, (2016)Interactive Knowledge Base Population., , , , , , and . CoRR, (2015)KELVIN: Extracting Knowledge from Large Text Collections., , , , and . AAAI Fall Symposia, AAAI Press, (2014)HLTCOE Approaches to Knowledge Base Population at TAC 2009., , , , , , , , , and . TAC, NIST, (2009)