Author of the publication

Knowledge-based Highly-specialized Terrorist Event Extraction.

, , , and . RuleML (2), volume 1004 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuel Crime Conceptualization through Specialization of Ontology for Investigation Management System.. Trans. Comput. Collect. Intell., (2010)The proof-checking component for the PLEATS programming system enabling specification of theories., and . Mathematical Methods of Specification and Synthesis of Software Systems, volume 215 of Lecture Notes in Computer Science, page 149-155. Springer, (1985)On the Detection and Analysis of VAT Carousel Crime., , , , and . JURIX, volume 235 of Frontiers in Artificial Intelligence and Applications, page 130-134. IOS Press, (2011)Ontological Modeling of a Class of Linked Economic Crimes., , and . Trans. Comput. Collect. Intell., (2013)Applying the c.DnS Design Pattern to Obtain an Ontology for Investigation Management System.. ICCCI, volume 5796 of Lecture Notes in Computer Science, page 516-527. Springer, (2009)Semantic Roles as Slots in OIL Ontologies., and . Comput. Humanit., 38 (2): 129-147 (2004)XML Schema Mappings in the Presence of Key Constraints and Value Dependencies., , and . EROW, volume 229 of CEUR Workshop Proceedings, CEUR-WS.org, (2007)Police Investigation Management System Based on the Workflow Technology., , and . JURIX, volume 189 of Frontiers in Artificial Intelligence and Applications, page 150-159. IOS Press, (2008)Schema- and Ontology-Based XML Data Exchange in Semantic E-Business Applications., , and . BIS, volume P-85 of LNI, page 429-441. GI, (2006)Towards Ontology of Fraudulent Disbursement., , and . KES-AMSTA, volume 6682 of Lecture Notes in Computer Science, page 301-310. Springer, (2011)