نتایج جستجو برای: protégé
تعداد نتایج: 1068 فیلتر نتایج به سال:
Computer-mediated communication (CMC) technologies, such as Instant Messaging (IM), the cell phone, and email have exploded, thus, creating fertile ground for innovative methods of communication. In this global environment, it is evident that innovative techniques must be employed to foster and sustain the mentor/protégé relationship. Using PLS as the analysis technique, we investigate the impa...
We present a Protégé plugin implementing Swift Linked Data Miner, an anytime algorithm for extending an ontology with new subsumptions. The algorithm mines an RDF graph accessible via a SPARQL endpoint and proposes new SubClassOf axioms to the user.
jcel is a reasoner for the description logic EL that uses a rule-based completion algorithm. These algorithms are used to get subsumptions in the lightweight description logic EL and its extensions. One of these extensions is EL, a description logic with restricted expressivity, but used in formal representation of biomedical ontologies. These ontologies can be encoded using the Web Ontology La...
To be effective, informatics tools for clinical trial protocols must inter-operate and share knowledge. We demonstrate a simple XML-based communication of eligibility criteria information between two independently-developed informatics tools. Using a shared DTD model of criteria, an authoring tool (developed within the Protégé environment) can send a list of eligibility criteria to a commercial...
Introduction. Business Process Model and Notation (BPMN) is widely used standard for modeling business processes supported by the Object-Oriented Technology Specification Management Group (OMG). However, BPMN 2.0 specification quite lengthy contains over 500 pages. Item definitions are scattered across different sections of sometimes conflict. In addition, structure elements their relationships...
INTRODUCTION In 1995, in a small city in northeastern Argentina, a local magnate who owned some gas stations, a transportation company, and several other businesses supported a fellow Radical Party member in the contest for mayor. But once in office the magnate’s protégé proved too independent. In the next mayoral race, in 1999, the magnate threw his support behind a competitor. Despite the may...
This paper explores the solution of the VT Sisyphus II challenge using a Constraint Satisfaction Problem (CSP) paradigm and is an extension of the ExtrAKTor work presented at EKAW 2006. ExtrAKTor takes a Protégé KB describing a propose and-revise (PnR) problem, including both constraints & fixes. Subsequently, it extracts and transforms these components so that they are directly usable by the E...
Interoperability and reuse of components and declarative knowledge are crucial to the further development of knowledge-based software. Unfortunately, it is hard to get components to interoperate and even harder to reuse other people’s work. These difficulties are often a result of incompatibilities in the knowledge models (the precise definition of declarative knowledge structures) assumed by t...
Web service technology establishes a common, vendor-neutral platform for integrating distributed computing applications, in intranets as well as on the Internet at large. Semantic Web Services (SWSs) promise to provide solutions to the challenges associated with automated discovery, dynamic composition, enactment, and other tasks associated with managing and using service-based systems. One of ...
The new Web Ontology Language (OWL) and its Description Logic compatible sublanguage (OWL-DL) explicitly exclude defaults and exceptions, as do all logic based formalisms for ontologies. However, many biomedical applications appear to require default reasoning, at least if they are to be engineered in a maintainable way. Default reasoning has always been one of the great strengths of Frame syst...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید