DAML+OIL: An ontology language for the semantic web

被引:0
|
作者
机构
来源
IEEE Distributed Systems Online | 2002年 / 3卷 / 11期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
11
引用
收藏
相关论文
共 50 条
  • [41] Towards a semantic choreography of web services: from WSDL to DAML-S
    Paolucci, M
    Srinivasan, N
    Sycara, K
    Nishimura, T
    ICWS'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WEB SERVICES, 2003, : 22 - 26
  • [42] Introduction to semantic web ontology languages
    Antoniou, G
    Franconi, E
    van Harmelen, R
    REASONING WEB, 2005, 3564 : 1 - 21
  • [43] The Study of Ontology Reasoning to Semantic Web
    Cheng Xian-Yi
    Yang Ai-qin
    Cheng Xue-yun
    ADVANCED MATERIALS SCIENCE AND TECHNOLOGY, PTS 1-2, 2011, 181-182 : 230 - 235
  • [44] Approximate ontology merging for the Semantic Web
    Richardson, B
    Mazlack, LJ
    NAFIPS 2004: ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY, VOLS 1AND 2: FUZZY SETS IN THE HEART OF THE CANADIAN ROCKIES, 2004, : 641 - 646
  • [45] Semantic web complex ontology mapping
    Silva, N
    Rocha, J
    IEEE/WIC INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, PROCEEDINGS, 2003, : 82 - 88
  • [46] Managing ontology changes on the Semantic Web
    Rogozan, D
    Paquette, G
    2005 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, PROCEEDINGS, 2005, : 430 - 433
  • [47] The Study of Ontology Reasoning to Semantic Web
    Cheng Xian-Yi
    Yang Ai-qin
    Cheng Xue-yun
    ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7, 2011, 204-210 : 375 - 380
  • [48] Complex semantic web ontology mapping
    Silva, Nuno
    Rocha, João
    Web Intelligence and Agent Systems, 2003, 1 (3-4): : 235 - 248
  • [49] Ontology Evolution in the Corporate Semantic Web
    Chamekh, Fatma
    Talens, Guilaine
    Boulanger, Danielle
    ICEIS: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2013, : 182 - 189
  • [50] Malware fuzzy ontology for semantic web
    Tafazzoli, Tala
    Sadjadi, Seyed Hadi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07): : 153 - 161