Knowledge Begets Knowledge: Steps towards Assisted Knowledge Acquisition in Cyc . Papers from the 2005 AAAI Spring Symposium on Knowledge Collection from Volunteer Contributors. :pp.99-105.. 2005.
A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment . The Seventeenth Innovative Applications of Artificial Intelligence Conference.. 2005.
Knowledge Formation and Dialogue Using the KRAKEN Toolset . Fourteenth National Conference on Innovative Applications of Artificial Intelligence. :p.900-905.. 2002.