| http://www.w3.org/ns/prov#value | - FIG. 8 shows concrete examples of an omission-in-software-property-management detection list and an unused-computer list in the omission-in-software-property-management detection system using a network in the second embodiment of the present invention;
|