@inproceedings{Kocher1999,
 author = {Kocher, Paul C. and Jaffe, Joshua and Jun, Benjamin},
 title = {Differential Power Analysis},
 booktitle = {Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology},
 series = {CRYPTO '99},
 year = {1999},
 
 pages = {388--397},
 numpages = {10}

} 





@INPROCEEDINGS{tupni,
    author = {Weidong Cui and Helen J. Wang and Marcus Peinado and Luiz Irun-briz and Karl Chen},
    title = {Tupni: Automatic Reverse Engineering of Input Formats},
    booktitle = {In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS},
    year = {2008}
}


@inproceedings{reformat,
 author = {Wang, Zhi and Jiang, Xuxian and Cui, Weidong and Wang, Xinyuan and Grace, Mike},
 title = {ReFormat: Automatic Reverse Engineering of Encrypted Messages},
 booktitle = {Proceedings of the 14th European Conference on Research in Computer Security},
 series = {ESORICS'09},
 year = {2009},
 pages = {200--215},
 numpages = {16}} 


@inproceedings{polygot,
 author = {Caballero, Juan and Yin, Heng and Liang, Zhenkai and Song, Dawn},
 title = {Polyglot: Automatic Extraction of Protocol Message Format Using Dynamic Binary Analysis},
 booktitle = {Proceedings of the 14th ACM Conference on Computer and Communications Security},
 series = {CCS '07},
 year = {2007},
 pages = {317--329},
 numpages = {13}}


@inproceedings{prospex,
 author = {Comparetti, Paolo Milani and Wondracek, Gilbert and Kruegel, Christopher and Kirda, Engin},
 title = {Prospex: Protocol Specification Extraction},
 booktitle = {Proceedings of the 2009 30th IEEE Symposium on Security and Privacy},
 series = {SP '09},
 year = {2009},
 pages = {110--125},
 numpages = {16}}


@inproceedings{Cho2010,
 author = {Cho, Chia Yuan and Babi \'{c}, Domagoj and Shin, Eui Chul Richard and Song, Dawn},
 title = {Inference and Analysis of Formal Models of Botnet Command and Control Protocols},
 booktitle = {Proceedings of the 17th ACM Conference on Computer and Communications Security},
 series = {CCS '10},
 year = {2010},
 pages = {426--439},
 numpages = {14}}}



@misc{7816-1,
author={Iso.org},
title={{ISO/IEC 7816-1:1998 Identification cards — Integrated circuit(s) cards with contacts — Part 1: Physical characteristics}},
year={1198}}

@misc{7816-2,
author={Iso.org},
title={{ISO/IEC 7816-2:2007 Identification cards — Integrated circuit cards — Part 2: Cards with contacts — Dimensions and location of the contacts}},
year={2007}}

@misc{7816-3,
author={Iso.org},
title={{ISO/IEC 7816-3:2006 Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols}},
year={2006}}


@misc{7816-4,
author={Iso.org},
title={{ISO/IEC 7816-4:2005 Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange}},
year={2005}}


@misc{7816-5,
author={Iso.org},
title={{ISO/IEC 7816-5:2004 Identification cards — Integrated circuit cards — Part 5: Registration of application providers}},
year={2005}}


@misc{7816-6,
author={Iso.org},
title={{ISO/IEC 7816-6:2004 Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange}},
year={2005}}


@misc{7816-7,
author={Iso.org},
title={{ISO/IEC 7816-7:1999 Identification cards — Integrated circuit(s) cards with contacts — Part 7: Interindustry commands for Structured Card Query Language (SCQL)}},
year={2005}}


@misc{7816-8,
author={Iso.org},
title={{ISO/IEC 7816-8:2004 Identification cards — Integrated circuit cards — Part 8: Commands for security operations}},
year={2005}}


@misc{7816-9,
author={Iso.org},
title={{ISO/IEC 7816-9:2004 Identification cards — Integrated circuit cards — Part 9: Commands for card management}},
year={2005}}



@misc{7816-10,
author={Iso.org},
title={{ISO/IEC 7816-10:1999 Identification cards — Integrated circuit(s) cards with contacts — Part 10: Electronic signals and answer to reset for synchronous cards}},
year={2005}}


@misc{7816-11,
author={Iso.org},
title={{ISO/IEC 7816-11:2004 Identification cards — Integrated circuit cards — Part 11: Personal verification through biometric methods}},
year={}}



@misc{7816-12,
author={Iso.org},
title={{ISO/IEC 7816-12:2005 Identification cards — Integrated circuit cards — Part 12: Cards with contacts — USB electrical interface and operating procedures}},
year={2005}}


@misc{7816-13,
author={Iso.org},
title={{ISO/IEC 7816-13:2007 Identification cards — Integrated circuit cards — Part 13: Commands for application management in a multi-application environment}},
year={2005}}


@misc{7816-15,
author={Iso.org},
title={{ISO/IEC 7816-15:2004 Identification cards — Integrated circuit cards — Part 15: Cryptographic information application}},
year={2005}}



@inproceedings{fish-and-chips,
  author    = {Ben Adida and
               Mike Bond and
               Jolyon Clulow and
               Amerson Lin and
               Steven J. Murdoch and
               Ross J. Anderson and
               Ronald L. Rivest},
  title     = {Phish and Chips},
  booktitle = {Security Protocols Workshop},
  year      = {2006},
  pages     = {40-48}}


@misc{sicstus,
author={Sicstus},
year={2005},
title={Sicstus user’s manual.
http://www.sics.se/sicstus/docs/latest/html/sicstus/}}

@article{inductive-verification-security,
  author    = {Giampaolo Bella},
  title     = {Inductive Verification of Smart Card Protocols},
  journal   = {Journal of Computer Security},
  volume    = {11},
  number    = {1},
  year      = {2003},
  pages     = {87-132}
}


@article{dolev-1983,
 author = {Dolev, D. and Yao, A.},
 title = {On the {S}ecurity of {P}ublic {K}ey {P}rotocols},
 journal = {{IEEE} {T}ransactions in {I}nformation {T}heory},
 issue_date = {March},
year={1983},
 volume = {29},
 number = {2},
 
 pages = {198--208},
 numpages = {11}
 
} 


@INPROCEEDINGS{Clulow03onthe,
    author = {Jolyon Clulow},
    title = {On the {S}ecurity of {PKCS}\#11},
    booktitle = {IN {P}roceedings Of the 5TH {I}nternational {W}orkshop on {C}ryptographic {H}ardware and {E}mbedded {S}ystems},
 series = {CHES’03},
 year = {2003},
    pages = {411--425}
}

@inproceedings{smartlogig-koning,
 author = {de Koning Gans, Gerhard and de Ruiter, Joeri},
 title = {{The SmartLogic Tool: Analysing and Testing Smart Card Protocols}},
 booktitle = {{Proceedings of the 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation}},
 series = {ICST '12},
 year = {2012},

 pages = {864--871},
 numpages = {8}
}


@article{gordon-c-verifier,
  author    = {Fran\c{c}ois Dupressoir and
               Andrew D. Gordon and
               Jan J{\"u}rjens and
               David A. Naumann},
  title     = {{Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols}},
  journal   = {CoRR},

  year      = {2013}
}


@book{steel-formal-analysis-apis,
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  title     = {Encyclopedia of Cryptography and Security, 2nd Ed},
  publisher = {Springer},
  year      = {2011}
}


@INPROCEEDINGS{mao-formal-analysis, 
author={Wenbo Mao and Boyd, C.}, 
booktitle={{Computer Security Foundations Workshop VI}}, 
title={Towards the {F}ormal {A}nalysis of {S}ecurity {P}rotocols}, 
year={1993}, 
month={Jun}, 
pages={147-158}}


@proceedings{basin-java-card,
  editor    = {David A. Basin and
               Burkhart Wolff},
  title     = {Theorem Proving in Higher Order Logics, 16th International
               Conference, TPHOLs 2003, Rom, Italy, September 8-12, 2003,
               Proceedings},
  booktitle = {TPHOLs},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {2758},
  year      = {2003}}
}


@Article{Lowe96,
 author = {G. Lowe},
 title ={Breaking and Fixing the {N}eedham-{S}chroeder Public-Key Protocol using {FDR}},
 journal = {Software {C}oncepts and {T}ools},
 number = {17},
 pages = {93--102},
 year = {1996}}


@article{needham-encryption-atuhentication,
 author = {Needham, Roger M. and Schroeder, Michael D.},
 title = {Using Encryption for Authentication in Large Networks of Computers},
 journal = {Communications {Of} the {ACM}},
 issue_date = {Dec. 1978},
 volume = {21},
 number = {12},
 year = {1978},
 pages = {993--999},
 numpages = {7}
}



@inproceedings{andronik-formal-verification,
  author    = {June Andronick and
               Boutheina Chetali and
               Christine Paulin-Mohring},
  title     = {Formal Verification of Security Properties of Smart Card
               Embedded Source Code},
  booktitle = {FM},
  year      = {2005},
  pages     = {302-317}
}


@inproceedings{barbu-eavesdropping-apdu-buffer,
  author    = {Guillaume Barbu and
               Christophe Giraud and
               Vincent Guerin},
  title     = {Embedded Eavesdropping on Java Card},
  booktitle = {SEC},
  year      = {2012},
  pages     = {37-48}
}


@inproceedings{Murdoch-chp-pin,
 author = {Murdoch, Steven J. and Drimer, Saar and Anderson, Ross and Bond, Mike},
 title = {Chip and PIN is Broken},
 booktitle = {Proceedings of the 2010 IEEE Symposium on Security and Privacy},
 series = {SP '10},
 year = {2010},
 isbn = {978-0-7695-4035-1},
 pages = {433--446},
 numpages = {14},
 
 publisher = {IEEE Computer Society},
 
} 



@inproceedings{sumoTranslation, author = {Adam Pease and Geoff Sutcliffe}, 
title = {First Order {R}easoning on a {L}arge {O}ntology}, booktitle = {ESARLT}, year = {2007} }

@inproceedings{bakproof,
author={Courant, J. and Monin, J.-F.},
title={Defending the {B}ank with a {P}roof assistant},
booktitle={In {P}roceedings of the 6th {I}nternational {W}orkshop on {I}ssues in the {T}heory of {S}ecurity ({W}{I}{T}{S}’06)}, 
pages ={87–98},
year={2006}}

@book{tsalapati,
author= {Tsalapati, E.},
title= {Analysis of {PKCS}\#11 using {AVISPA} tools},
publisher= {Master’s thesis, {U}niversity of {E}dinburgh}, 
year= {2007}}

@INPROCEEDINGS{steelxor,
    author = {Graham Steel and Alan Bundy},
    title = {Deduction with XOR Constraints In Security API Modelling},
    booktitle = {In Proceedings of the 20th International Conference on Automated Deduction (CADE’05), volume 3632 of LNCS},
    year = {2005},
    pages = {322--336}
}

@inproceedings{steelformalanalysis,
  author    = {Stephanie Delaune and
               Steve Kremer and
               Graham Steel},
  title     = {Formal Analysis of {PKCS}\#11},
  booktitle = {CSF},
  year      = {2008},
  pages     = {331-344}
}


@inproceedings{galileo,
author={ Chan, M. and Lehmann, J. and Bundy, A.},
title ={{G}{A}{L}{I}{L}{E}{O}: {A} {S}ystem for {A}utomating {O}ntology {E}volution}, 
booktitle={In Notes of the {I}{J}{C}{A}{I}-11 {W}orkshop on {A}utomated {R}easoning about {C}ontext and {O}ntology {E}volution},
year={2011}}


@article{Longley,
	title = {An Automatic Search for Security Flaws in Key Management Schemes},
	author = {D. Longley,S. Rigby},
	year = {1992},
	institution = {Elsevier {S}cience {P}ublishers {L}td.},
	journal = {Computers and {S}ecurity},
	number = {1},
	volume = {11}}







@article{casc, 
author = {Francis Jeffry Pelletier and Geoff Sutcliffe and Christian B. Suttner}, title = {The development of {CASC}}, journal = {{A}{I} Commun.}, volume = {15}, number = {2-3}, year = {2002}, pages = {79-90}}

@book{gomez,
  title={Ontological engineering: with examples from the areas of knowledge management, e-commerce and the {S}emantic Web},
  author={Gomez-Perez, A. and Fernandez-Lopez, M. and Corcho, O.},
  year={2004},
  publisher={Springer}
}



@InProceedings{cortier,
  author = 	 {V. Cortier and G. Keighren and G. Steel},
  title = 	 {Automatic Analysis of the Security of {XOR}-based Key Management Schemes,},
  booktitle =	 {TACAS 2007},
  pages =	 {538-552},
  year =	 2007,
  editor =	 {O. Grumberg and M. Huth},
  number =	 4424,
  series =	 {LNCS}
}


@techreport{youn,
author={P. Youn and B. Adida and M. Bond and J. Clulow and J. Herzog
                  and A. Lin and R. Rivest and R. Anderson},
title={Robbing the bank with a theorem prover},
number={UCAM-CL-TR-644},
institution={University of Cambridge},
year={2005}
}

@inproceedings{courant,
  author = {Judica{\"e}l Courant and Jean-Fran\c{c}ois Monin},
  title = {Defending the bank with a proof assistant},
  booktitle = {{WITS 2006}},
  note = {In {WITS} proceedings},
  year = 2006
}


@inproceedings{steel10,
  author    = {Matteo Bortolozzo and Matteo Centenaro and
               Riccardo Focardi and
               Graham Steel},
  title     = {Attacking and fixing PKCS\#11 security tokens},
  booktitle = {ACM Conference on Computer and Communications Security},
  year      = {2010},
  pages     = {260-269}
}

@Article{cyc,
  author =      {Lenat, D.B.},
  title =      {{CYC}: a large-scale investment in knowledge infrastructure},
  journal =      {Commun. ACM},
  year =      1995,
  volume =     38,
  number =     11,
  pages =     {33-38},
  month =     {November}
}




@TECHREPORT{robbank,
    author = { Paul Youn and Ben Adida and Mike Bond  and Jolyon Clulow  and Jonathan Herzog and Amerson Lin  and Ronald L. Rivest  and Ross Anderson },
    title = {Robbing the bank with a theorem prover},
    institution = {{U}niverisity of {C}ambridge},
    year = {2005}
}










@Article{ors,
author = { Fiona McNeill and Alan Bundy },
title = {{D}ynamic, {A}utomatic, {F}irst-{O}rder {O}ntology {R}epair by {D}iagnosis of {F}ailed {P}lan {E}xecution},
journal = {IJSWIS ({I}nternational {J}ournal on {S}emantic {W}eb and {I}nformation {S}ystems) {S}pecial issue on {O}ntology {M}atching},
year = 2007,
volume = {3},
pages = {1-35}
}



@article{SchulzEprover,
 author = {Stephan Schulz },
 title = {E - a brainiac theorem prover},
 journal = {AI Commun.},
 volume = {15},
 issue = {2,3},
 month = {August},
 year = {2002},
 pages = {111-126}} 


@article{ cycfirstorder,
author= {Ramach, D. and Reagan, R. P. and Goolsbey, K.},
title={First-{O}rderized {R}esearch{C}yc: {E}xpressivity and efficiency in a common-sense ontology}, 
journal= {In Papers from the {A}{A}{A}{I} {W}orkshop on
{C}ontexts and {O}ntologies: {T}heory, {P}ractice and {A}pplications},
year={2005}
}


@INPROCEEDINGS{vampirereasoningsupport,
    author = {Ian Horrocks and Andrei Voronkov},
    title = {Reasoning {S}upport for {E}xpressive {O}ntology {L}anguages {U}sing a {T}heorem {P}rover},
    booktitle = { {F}o{I}{K}{S}},
    year = {2006},
    pages = {201-218}
 
}

@article{owl,
author = { Bechhofer, S. and van Harmelen, F. and  Hendler, J. and  Horrocks, I. and  McGuinness, D. L.  and Patel-Schneider, P. F.  and  Stein, L. A.},
title = { {O}WL {W}eb {O}ntology {L}anguage 1.0 (R)eference},
journal = { {W}{3}{C}, {R}ecommendation},
year ={2004}
}


@article{Gruninger04,
author={Berardi, D. and Gruninger, M. and  Hull, R. and McIlraith, S.},
title={ Towards a {F}irst-{O}rder {O}ntology for {S}emantic web {S}ervices},
journal={http://www.w3.org/2004/08/ws-cc/mci-20040904}, 
year={2004}
}

@inproceedings{Horrocks04,
author = {Horrocks, I. and Patel-Schneider, P. F.},
 title = {A proposal for an owl rules language},
 booktitle = {Proceedings of the 13th international conference on {W}orld {W}ide W{}eb},
 series = {W{W}{W} '04},
 year = {2004},
 pages = {723-731},
 number = {9}}



@inproceedings{semiautomate,
  author    = {Blaz Fortuna and
               Dunja Mladenic and
               Marko Grobelnik},
  title     = {{S}emi-automatic {C}onstruction of {T}opic {O}ntologies},
  booktitle = {EWMF/KDO},
  year      = {2005},
  pages     = {121-131}
 }

@article{bundymcneill06,
author = {Alan Bundy and Fiona McNeill},
title = {{R}epresentation as a {F}luent: An {AI} {C}hallenge for the {N}ext {H}alf {C}entury},
journal ={IEEE Intelligent Systems},
volume = {21},
year = {2006},
pages = {85-87}
}

@article{mcneillbundy07,
author = { Fiona McNeill and Alan Bundy },
title = {{D}ynamic, {A}utomatic, {F}irst-order {O}ntology {R}epair by {D}iagnosis of {F}ailed {P}lan {E}xecution},
journal = {{I}n IJSWIS,   {S}pecial {I}ssue on {O}ntology {M}atching},
year = 2007,
volume = {3},
pages = {1-35}
}





@inproceedings{reverb,
  author    = {Oren Etzioni and
               Anthony Fader and
               Janara Christensen and
               Stephen Soderland and
               Mausam},
  title     = {{O}pen {I}nformation {E}xtraction: {T}he {S}econd {G}eneration},
  booktitle = {IJCAI},
  year      = {2011},
  pages     = {3-10}
}




@misc{pkcs,
author={{RSA Security INC}},
title={v2.20. {PKCS}\#11: {C}ryptographic {T}oken {I}nterface {S}tandard},
year={2004}}









@article{sherlock,
 author = {Schoenmackers Stefan and Etzioni, Oren and Weld, Daniel S. and Davis, Jesse},
 title = {{L}earning first-order {H}orn clauses from web text},
 
 journal = {EMNLP 2010},
 year = {2010},
 location = {Cambridge, Massachusetts},
 pages = {1088-1098},
 volume = {11}
 } 

@article{prolog,
  author    = {Jan Wielemaker and
               Tom Schrijvers and
               Markus Triska and
               Torbj{\"o}rn Lager},
  title     = {{SWI-P}rolog},
  journal   = {CoRR},
  volume    = {abs/1011.5332},
  year      = {2010}
  }


@inproceedings{sumo,
 author = {Ian Niles and  Adam Pease},
 title = {Towards a {S}tandard {U}pper {O}ntology},
 booktitle = {Proceedings of the {I}nternational {C}onference on {F}ormal {O}ntology in {I}nformation {S}ystems},
 series = {FOIS '01},
 year = {2001},
 location = {Ogunquit, Maine, USA},
 pages = {2--9},
 numpages = {8},

 acmid = {505170},
 publisher = {ACM}
} 



@inproceedings{functional,
  author    = {Thomas Lin and
               Mausam and
               Oren Etzioni},
  title     = {{I}dentifying {F}unctional {R}elations in {W}eb {T}ext},
  booktitle = {EMNLP},
  year      = {2010},
  pages     = {1266-1276},
}



@Article{tptp,
    Author       = "Sutcliffe, G.",
    Year         = "2009",
    Title        = "{{T}he {TPTP} {P}roblem {L}ibrary and {A}ssociated {I}nfrastructure: 
                    {T}he {FOF} and {CNF} {P}arts, v3.5.0}",
    Journal      = "Journal of Automated Reasoning",
    Volume       = "43",
    Number       = "4",
    Pages        = "337-362"
} 



@INPROCEEDINGS{hearst,
    author = {Marti A. Hearst},
    title = {{A}utomatic {A}cquisition of {H}yponyms from {L}arge {T}ext {C}orpora},
    booktitle = {In Proceedings of the 14th International Conference on Computational Linguistics},
    year = {1992},
    pages = {539--545}
}











@INPROCEEDINGS{Bundy88theuse,
    author = {Alan Bundy},
    title = {{The Use of Explicit Plans to Guide Inductive Proofs}},
    booktitle = {9th Conference on Automated Deduction},
    year = {1988},
    pages = {111--120},
    publisher = {Springer-Verlag}
}



@inproceedings{sumoTranslation, author = {Adam Pease and Geoff Sutcliffe}, 
title = {First Order {R}easoning on a {L}arge {O}ntology}, booktitle = {ESARLT}, year = {2007} }












@article{casc, 
author = {Francis Jeffry Pelletier and Geoff Sutcliffe and Christian B. Suttner}, title = {The development of {CASC}}, journal = {{A}{I} Commun.}, volume = {15}, number = {2-3}, year = {2002}, pages = {79-90}}

@book{gomez,
  title={Ontological engineering: with examples from the areas of knowledge management, e-commerce and the {S}emantic Web},
  author={Gomez-Perez, A. and Fernandez-Lopez, M. and Corcho, O.},
  year={2004},
  publisher={Springer}
}



@

@Article{cyc,
  author =      {Lenat, D.B.},
  title =      {{CYC}: a large-scale investment in knowledge infrastructure},
  journal =      {Commun. ACM},
  year =      1995,
  volume =     38,
  number =     11,
  pages =     {33-38},
  month =     {November}
}














@Article{ors,
author = { Fiona McNeill and Alan Bundy },
title = {{D}ynamic, {A}utomatic, {F}irst-{O}rder {O}ntology {R}epair by {D}iagnosis of {F}ailed {P}lan {E}xecution},
journal = {IJSWIS ({I}nternational {J}ournal on {S}emantic {W}eb and {I}nformation {S}ystems) {S}pecial issue on {O}ntology {M}atching},
year = 2007,
volume = {3},
pages = {1-35}
}



@article{SchulzEprover,
 author = {Stephan Schulz },
 title = {E - a brainiac theorem prover},
 journal = {AI Commun.},
 volume = {15},
 issue = {2,3},
 month = {August},
 year = {2002},
 pages = {111-126}} 


@article{ cycfirstorder,
author= {Ramach, D. and Reagan, R. P. and Goolsbey, K.},
title={First-{O}rderized {R}esearch{C}yc: {E}xpressivity and efficiency in a common-sense ontology}, 
journal= {In Papers from the {A}{A}{A}{I} {W}orkshop on
{C}ontexts and {O}ntologies: {T}heory, {P}ractice and {A}pplications},
year={2005}
}


@INPROCEEDINGS{vampirereasoningsupport,
    author = {Ian Horrocks and Andrei Voronkov},
    title = {Reasoning {S}upport for {E}xpressive {O}ntology {L}anguages {U}sing a {T}heorem {P}rover},
    booktitle = { {F}o{I}{K}{S}},
    year = {2006},
    pages = {201-218}
 
}

@article{owl,
author = { Bechhofer, S. and van Harmelen, F. and  Hendler, J. and  Horrocks, I. and  McGuinness, D. L.  and Patel-Schneider, P. F.  and  Stein, L. A.},
title = { {O}WL {W}eb {O}ntology {L}anguage 1.0 (R)eference},
journal = { {W}{3}{C}, {R}ecommendation},
year ={2004}
}


@article{Gruninger04,
author={Berardi, D. and Gruninger, M. and  Hull, R. and McIlraith, S.},
title={ Towards a {F}irst-{O}rder {O}ntology for {S}emantic web {S}ervices},
journal={http://www.w3.org/2004/08/ws-cc/mci-20040904}, 
year={2004}
}

@inproceedings{Horrocks04,
author = {Horrocks, I. and Patel-Schneider, P. F.},
 title = {A proposal for an owl rules language},
 booktitle = {Proceedings of the 13th international conference on {W}orld {W}ide W{}eb},
 series = {W{W}{W} '04},
 year = {2004},
 pages = {723-731},
 number = {9}}



@inproceedings{semiautomate,
  author    = {Blaz Fortuna and
               Dunja Mladenic and
               Marko Grobelnik},
  title     = {{S}emi-automatic {C}onstruction of {T}opic {O}ntologies},
  booktitle = {EWMF/KDO},
  year      = {2005},
  pages     = {121-131}
 }








@inproceedings{reverb,
  author    = {Oren Etzioni and
               Anthony Fader and
               Janara Christensen and
               Stephen Soderland and
               Mausam},
  title     = {{O}pen {I}nformation {E}xtraction: {T}he {S}econd {G}eneration},
  booktitle = {IJCAI},
  year      = {2011},
  pages     = {3-10}
}













@article{sherlock,
 author = {Schoenmackers Stefan and Etzioni, Oren and Weld, Daniel S. and Davis, Jesse},
 title = {{L}earning first-order {H}orn clauses from web text},
 
 journal = {EMNLP 2010},
 year = {2010},
 location = {Cambridge, Massachusetts},
 pages = {1088-1098},
 volume = {11}
 } 

@article{prolog,
  author    = {Jan Wielemaker and
               Tom Schrijvers and
               Markus Triska and
               Torbj{\"o}rn Lager},
  title     = {{SWI-P}rolog},
  journal   = {CoRR},
  volume    = {abs/1011.5332},
  year      = {2010}
  }


@inproceedings{sumo,
 author = {Ian Niles and  Adam Pease},
 title = {Towards a {S}tandard {U}pper {O}ntology},
 booktitle = {Proceedings of the {I}nternational {C}onference on {F}ormal {O}ntology in {I}nformation {S}ystems},
 series = {FOIS '01},
 year = {2001},
 location = {Ogunquit, Maine, USA},
 pages = {2--9},
 numpages = {8},

 acmid = {505170},
 publisher = {ACM}
} 



@inproceedings{functional,
  author    = {Thomas Lin and
               Mausam and
               Oren Etzioni},
  title     = {{I}dentifying {F}unctional {R}elations in {W}eb {T}ext},
  booktitle = {EMNLP},
  year      = {2010},
  pages     = {1266-1276},
}



@Article{tptp,
    Author       = "Sutcliffe, G.",
    Year         = "2009",
    Title        = "{{T}he {TPTP} {P}roblem {L}ibrary and {A}ssociated {I}nfrastructure: 
                    {T}he {FOF} and {CNF} {P}arts, v3.5.0}",
    Journal      = "Journal of Automated Reasoning",
    Volume       = "43",
    Number       = "4",
    Pages        = "337-362"
} 



@INPROCEEDINGS{hearst,
    author = {Marti A. Hearst},
    title = {{A}utomatic {A}cquisition of {H}yponyms from {L}arge {T}ext {C}orpora},
    booktitle = {In Proceedings of the 14th International Conference on Computational Linguistics},
    year = {1992},
    pages = {539--545}
}
