Towards automatic identification of completeness and consistency in digital dossiers

The emergence of digital dossiers in Courts of Law presents new opportunities to streamline the criminal prosecution chain. This papers proposes the use of agent technology to support automatic verification of consistency and completeness of data in such dossiers. It sketches how agent systems in combination with other AI technology, can be used to enforce consistency and completeness in digital dossiers in the context of the semiopen environment of the Courts.

[1]  Frances M. T. Brazier,et al.  Scalable Middleware Environment for Agent-Based Internet Applications , 2004, PARA.

[2]  J NuttGary,et al.  Office Information Systems and Computer Science , 1980 .

[3]  Nicholas R. Jennings,et al.  Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.

[4]  John H. Boose,et al.  A survey of knowledge acquisition techniques and tools , 1993 .

[5]  Frances M. T. Brazier,et al.  Secure Distributed Dossier Management in the Legal Domain , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[6]  Ralph H. Sprague,et al.  Information systems management in practice , 1985 .

[7]  Patrick Valduriez,et al.  Principles of Distributed Database Systems , 1990 .

[8]  Aldo Gangemi,et al.  A Constructive Framework for Legal Ontologies , 2003, Law and the Semantic Web.

[9]  Rajeev Motwani,et al.  Robust and efficient fuzzy match for online data cleaning , 2003, SIGMOD '03.

[10]  Douglas H. Fisher,et al.  Knowledge Acquisition Via Incremental Conceptual Clustering , 1987, Machine Learning.

[11]  Clarence A. Ellis,et al.  Office Information Systems and Computer Science , 1980, CSUR.

[12]  Andrew S. Tanenbaum,et al.  Distributed systems: Principles and Paradigms , 2001 .

[13]  Jacques Ferber,et al.  Multi-agent systems - an introduction to distributed artificial intelligence , 1999 .

[14]  Michael Wooldridge,et al.  Intelligent agents: theory and practice The Knowledge Engineering Review , 1995 .

[15]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[16]  Michael Luck,et al.  Agent technology: Enabling next generation computing , 2003 .