Multi-application Profile Updates Propagation: a Semantic Layer to improve Mapping between Applications

Size: px
Start display at page:

Download "Multi-application Profile Updates Propagation: a Semantic Layer to improve Mapping between Applications"

Transcription

1 Multi-application Profile Updates Propagation: a Semantic Layer to improve Mapping between Applications N a d i a B e n n a n i U n i v e r s i t é d e L y o n M a x C h e v a l i e r - U n i v e r s i t é P a u l S a b a t i e r Elöd E g y e d - Z s i g m o n d U n i v e r s i t é d e L y o n G i l l e s H u b e r t U n i v e r s i t é P a u l S a b a t i e r M a r c o V i v i a n i U n i v e r s i t à d e g l i S t u d i d e l l I n s u b r i a M u l t i A - P r o A P R I L 1 6 TH

2 OUTLINE Open Issues in Multi-application Personalization G-Profile The Semantic Layer Benefits of Integration Conclusions and Further Research 2 16/04/2012 MultiA-Pro

3 Introduction Nowadays, many applications in different areas (digital libraries, search engines, e-learning, online databases, ecommerce, social networks ) collect information about users for service personalization. Applications organize user properties, preferences and assumptions based on the user state, in user profiles. Each application manages user information independently from others, using a specific user model. 3 16/04/2012 MultiA-Pro

4 Mono application user profile management Application 3 Application 2 Application 4 Internet Application 5 Application 1 Application /04/2012 MultiA-Pro 4

5 Drawbacks Data incoherence among isolated user profiles can be produced, due to several drawbacks strictly connected to mono-application personalization. Redundancy. Lack of inter-application experience: data connected to a given user remain private to each application. Users cannot take advantage of their information scattered across different applications. Lack of inter-user experience: users cannot profit of the experience already accumulated by other users, in the same or different applications. Lack of control: users have little or no control over the information defining their profiles. 5 16/04/2012 MultiA-Pro

6 Aim of our Work G-Profile: a multi-application user modeling system G-Profile allows user profile information to evolve in a multi-application context by user data propagation. G-Profile is based on user profile mappings between applications. To improve mapping management and to limit human intervention, we propose to add to G-Profile a Semantic Layer: a module allowing to automatically identify these mappings. 6 16/04/2012 MultiA-Pro

7 G-Profile G-Profile does not propose neither a specific reconciliation technique able to take into account all the possible user data representations in different applications, nor a standard user profile model. We define some abstract mapping functions, based on the generic concept of mapping between user data among applications. An application is G-Profile-aware if it provides a suitable application programming interface (API) to access both its user profile attributes and a set of mapping functions for these attributes to be used in mapping generation assisted by G- Profile. 7 16/04/2012 MultiA-Pro

8 Architecture 8 16/04/2012 MultiA-Pro

9 User Profile Formalization Each application A manages a set of user attributes a A k k {1,, m A } m A is the total number of attributes for the application A for each user u x using the application A, each attribute a A k has a value v k associated, forming the user profile element as a couple (attribute, value) Formally 9 16/04/2012 MultiA-Pro

10 Mapping example 1/2 A 1 = ebay DirectCopy(A 2 ) = m 2 A 2 A 2 = Amazon A 3 = Windows Live m 2 A 3 = Extract(A 3 )² Shipping_address DirectCopy(A 1,A 2 ) = m 2 A 1,A 2 Address m 1 A 2,A 3 = Extract(A 2,A 3 ) Home_town 10 16/04/2012 MultiA-Pro

11 Data Mapping Formalization 1/2 Each attribute can, from time to time, be involved as the source or the target attribute in a relation with others. More specifically, since attributes are organized differently in each application A i depending on the adopted user model, they can be permuted in several source sets 11 16/04/2012 MultiA-Pro

12 Data Mapping Formalization 2/2 In the same way, each attribute of the application A i can be a target attribute belonging to the target set We define a mapping between two applications A i and A j, i j, as the triple Formally a mapping function 12 16/04/2012 MultiA-Pro

13 Mapping Graph Formalization It is possible to define a mapping graph G as a combination of all the mappings in our environment. G is a directed graph G = (V,E) composed of (i) a set V of nodes, (ii) a set E of directed edges. We define two kinds of node: attribute nodes (n-att) and function nodes (n-fun). V = V n-att V n-fun Formally 13 16/04/2012 MultiA-Pro

14 Mapping example 2/2 A 4 = Facebook (s A4 1 )First_name (s A4 2 )Middle_name (s A4 3 )Surname A 2 = Amazon Concat(A 4,A 2 ) = m 1 A 4,A 2 (t 1 A2 )Full_name Interests In_my_own_words Events Wish_list (t 1 A2, s 6 A2 )Address Concat(A 2 ) = m 1 A 2 DirectCopy(A 2) = m 2 A 2 DirectCopy(A 1,A 2 ) = m 2 A 1,A 2 Last_name Birthday Biography DirectCopy(A 2,A 4 ) = m 1 A 2,A 1 DirectCopy(A 4,A 3 ) m A 3 = m A 1,A 3 1 = 1 DirectCopy(A 3 ) First_name Wall m 1 A 4 = DirectCopy(A 4 ) Publish(A 2,A 4 ) = m 2 A 2,A 4 Append(A 2,A 1 ) = m 1 A 2,A 1 Birth_date Publish(A 4 ) = m 2 A 4 Publish(A 1,A 4 ) = m 1 A 1,A 4 m 1 A 1 = Append(A 1 ) m A 2,A 3 m A 3 1 = 2 = Extract(A 2,A 3 ) Extract(A 3 ) Home_town A 1 = ebay Feedbacks Wish_list Shipping_addre ss A 3 = Windows Live 14 16/04/2012 MultiA-Pro

15 Profile change propagation (Eg. 1) User Profile u 1 (A 1 ) USER DATA propagation User Profile u 1 (A 2 ) USER DATA User Profile u 1 ( ) USER DATA User Profile u 1 (A n ) USER DATA Application 1 mapping Application 2 Application n Time t = 0 Modification of user data on A 1 Time t = 1 Propagation of the modification on A 2 Time t = Propagation of the modification on Time t = n-1 Propagation of the modification on A n 15 16/04/2012 MultiA-Pro

16 Data Propagation 1/ /04/2012 MultiA-Pro

17 Data Propagation 2/ /04/2012 MultiA-Pro

18 Recursive Data Propagation 1/ /04/2012 MultiA-Pro

19 Recursive Data Propagation 2/ /04/2012 MultiA-Pro

20 Recursive Data Propagation 3/ /04/2012 MultiA-Pro

21 Recursive Data Propagation 4/4 Manual mapping creation is a time consuming process There are many «obvious mappings» easily identifiable 21 16/04/2012 MultiA-Pro

22 Mapping Identification A semantic layer to: Allow every application to manage its own view on user profiles (e.g. different attribute names) Avoid explicit description of relations between attributes Identify related attributes into two user profiles coming from two applications Every application uses the semantic layer to label its own attributes 22 16/04/2012 MultiA-Pro

23 Mapping Identification Generalized semantic user profile 23 16/04/2012 MultiA-Pro

24 Mapping Identification Semantic labeling of attributes Customer Factual Data Transactional Data Customer ID Identity BirthDate Gender Semantic Layer Application Side First Name Last Name Product Purchase Preference History 24 16/04/2012 MultiA-Pro

25 Mapping Identification Mapping identification process Profile #1 Profile #2 Shared Attributes Extraction Shared Attributes Extraction Corresponding Concept Extraction Corresponding Concept Extraction Concept Compatibility Checking Value-type Compatibility Checking 25 16/04/2012 MultiA-Pro

26 Benefits of Integration Taking into account different User Models Mediation based profile mapping Profile information modification propagation Semantic layer = Shared representation of users Assisted mapping identification 26 16/04/2012 MultiA-Pro

27 Perspectives Validate the model on real or artificial data Handle privacy issues and refine the security and privacy issues through the semantic layer Integrate the semantic layer in the prototype Propose the model as a standard protocol 27 16/04/2012 MultiA-Pro

User Profile Integration Made Easy Model-Driven Extraction and Transformation of Social Network Schemas

User Profile Integration Made Easy Model-Driven Extraction and Transformation of Social Network Schemas User Profile Integration Made Easy Model-Driven Extraction and Transformation of Social Network s Martin Wischenbart, S. Mitsch, E. Kapsammer, A. Kusel, B. Pröll, W. Retschitzegger, W. Schwinger, J. Schönböck,

More information

KNOWLEDGE MANAGEMENT VIA DEVELOPMENT IN ACCOUNTING: THE CASE OF THE PROFIT AND LOSS ACCOUNT

KNOWLEDGE MANAGEMENT VIA DEVELOPMENT IN ACCOUNTING: THE CASE OF THE PROFIT AND LOSS ACCOUNT KNOWLEDGE MANAGEMENT VIA DEVELOPMENT IN ACCOUNTING: THE CASE OF THE PROFIT AND LOSS ACCOUNT Tung-Hsiang Chou National Chengchi University, Taiwan John A. Vassar Louisiana State University in Shreveport

More information

Privacy Policy. Personal Data collected for the following purposes and using the following services:

Privacy Policy. Personal Data collected for the following purposes and using the following services: Privacy Policy This Application collects some Personal Data from its Users. Summary Personal Data collected for the following purposes and using the following services: Access to third party services'

More information

Privacy Policy of ManualsLib App

Privacy Policy of ManualsLib App Privacy Policy of ManualsLib App This Application collects some Personal Data from its Users. POLICY SUMMARY Personal Data collected for the following purposes and using the following services: Access

More information

Microsoft Outlook 2007 Contacts

Microsoft Outlook 2007 Contacts Outline Contacts... 1 Create a contact card from an incoming email message... 1 Create a contact card from scratch... 2 Send email to contact... 2 Option 1... 2 Option 2... 3 Displaying in LastName, FirstName

More information

Software Design Description Report

Software Design Description Report 2015 Software Design Description Report CodeBenders Haldun Yıldız 1819663 Onur Aydınay 1819002 Deniz Can Yüksel 1819697 Ali Şihab Akcan 1818871 TABLE OF CONTENTS 1 Overview... 3 1.1 Scope... 3 1.2 Purpose...

More information

Data Controller and Owner. Types of Data collected. Mode and place of processing the Data. Privacy Policy of aimedis.com. Methods of processing

Data Controller and Owner. Types of Data collected. Mode and place of processing the Data. Privacy Policy of aimedis.com. Methods of processing Privacy Policy of aimedis.com This Application collects some Personal Data from its Users. Data Controller and Owner Aimedis B.V., Sint Michaëlstraat 4, 5935 BL Steyl, Netherlands Owner contact email:

More information

EECS 647: Introduction to Database Systems

EECS 647: Introduction to Database Systems EECS 647: Introduction to Database Systems Instructor: Luke Huan Spring 2009 Administrative I have communicated with KU Bookstore inquring about the text book status. Take home background survey is due

More information

PS-80 Storing Data in the Right Place in Deltek Vision

PS-80 Storing Data in the Right Place in Deltek Vision PS-80 Storing Data in the Right Place in Deltek Vision Loren Saunders Owner: Saunders Consulting Group, LLC PS-80 Storing Data in the Right Place What it may feel like Deltek Vision is a massive application.

More information

Open Integration Hub One connector for many integrations

Open Integration Hub One connector for many integrations Open Integration Hub One connector for many integrations Copyright 2018 Cloud Ecosystem e.v. What concerns everyone can only be resolved by everyone. Friedrich Dürrenmatt (1921-1990), The Physicists. This

More information

Interface (API) Design

Interface (API) Design Interface (API) Design Architect s Perspective R. Kuehl/J. Scott Hawker p. 1 What is an API? Exposes the public facing functionality of a software component Operations, inputs, and outputs Exposes functionality

More information

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

Introduction to Cloud Computing. [thoughtsoncloud.com] 1 Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:

More information

Yada. A blockchain-based social graph

Yada. A blockchain-based social graph Yada A blockchain-based social graph January 2018 Abstract The goal of Yada is to achieve an acceptable level anonymity, privacy, and freedom of expression while making available to the public a structure

More information

AmI Design Process. 01QZP - Ambient intelligence. Fulvio Corno. Politecnico di Torino, 2017/2018

AmI Design Process. 01QZP - Ambient intelligence. Fulvio Corno. Politecnico di Torino, 2017/2018 AmI Design Process 01QZP - Ambient intelligence Fulvio Corno Politecnico di Torino, 2017/2018 Design Process http://dilbert.com/strips/comic/2002-02-20/ http://dilbert.com/strips/comic/2001-12-12/ 2017/2018

More information

Introduction To Model-to-Model Transformation

Introduction To Model-to-Model Transformation - 1 - Context of this work The present courseware has been elaborated in the context of the MODELPLEX European IST FP6 project ( http://www.modelplex.org/). Co-funded by the European Commission, the MODELPLEX

More information

Pattern-Based Analysis of an Embedded Real-Time System Architecture

Pattern-Based Analysis of an Embedded Real-Time System Architecture Pattern-Based Analysis of an Embedded Real-Time System Architecture Peter Feiler Software Engineering Institute phf@sei.cmu.edu 412-268-7790 Outline Introduction to SAE AADL Standard The case study Towards

More information

xbook: Redesigning Privacy Control in Social Networking Platforms Kapil Singh, Sumeer Bhola and Wenke Lee

xbook: Redesigning Privacy Control in Social Networking Platforms Kapil Singh, Sumeer Bhola and Wenke Lee xbook: Redesigning Privacy Control in Social Networking Platforms Kapil Singh, Sumeer Bhola and Wenke Lee Social networking is growing 2 Privacy concerns are growing More personal data being fed to social

More information

Object-Oriented Introduction

Object-Oriented Introduction Object-Oriented Introduction Or: Your Honor, I Object... Jonathan Sprinkle 1 University of Arizona Department of Electrical and Computer Engineering PO Box 210104, Tucson, AZ 85721, USA August 22, 2012

More information

Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle

Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle Demetris Kyriacou Learning Societies Lab School of Electronics and Computer Science, University of Southampton

More information

Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture

Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture Architecting Self-Managing Distributed Systems Workshop ASDS@ECSAW 15 Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture Flávia C. Delicato Federal University of Rio de Janeiro

More information

Tuesday, October 4. Announcements

Tuesday, October 4. Announcements Tuesday, October 4 Announcements www.singularsource.net Donate to my short story contest UCI Delta Sigma Pi Accepts business and ICS students See Facebook page for details Slide 2 1 Design Patterns Design

More information

Overview of Database Design Process Example Database Application (COMPANY) ER Model Concepts

Overview of Database Design Process Example Database Application (COMPANY) ER Model Concepts Chapter Outline Overview of Database Design Process Example Database Application (COMPANY) ER Model Concepts Entities and Attributes Entity Types, Value Sets, and Key Attributes Relationships and Relationship

More information

Distributed Programming and Remote Procedure Calls (RPC): Apache Thrift. George Porter CSE 124 February 19, 2015

Distributed Programming and Remote Procedure Calls (RPC): Apache Thrift. George Porter CSE 124 February 19, 2015 Distributed Programming and Remote Procedure Calls (RPC): Apache Thrift George Porter CSE 124 February 19, 2015 End-to-end RPC protocol RPC Components Defines messages, message exchange behavior, Programming

More information

5 OAuth Essentials for API Access Control

5 OAuth Essentials for API Access Control 5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows

More information

CSE 880:Database Systems. ER Model and Relation Schemas

CSE 880:Database Systems. ER Model and Relation Schemas CSE 880:Database Systems ER Model and Relation Schemas 1 Major Steps for Database Design and Implementation 1. Requirements Collection and Analysis: Produces database requirements such as types of data,

More information

What this is (NOT) about

What this is (NOT) about Resolving the Transport Tussle Recursive InterNetwork Architecture @ Computer Science Boston U. http://csr.bu.edu/rina 1 What this is (NOT) about q NOT much about specific protocols, algorithms, interfaces,

More information

Programming II. Modularity 2017/18

Programming II. Modularity 2017/18 Programming II Modularity 2017/18 Module? Lecture Outline Evolution and history of programming languages Modularity Example History of Programming Programming Paradigms How and why languages develop? How

More information

Failure Modelling in Software Architecture Design for Safety

Failure Modelling in Software Architecture Design for Safety Failure Modelling in Software Architecture Design for Safety Weihang Wu Tim Kelly Presented by George Despotou High Integrity Systems Engineering Group Department of Computer Science Failure Modelling

More information

5 OAuth EssEntiAls for APi AccEss control layer7.com

5 OAuth EssEntiAls for APi AccEss control layer7.com 5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the

More information

General Framework for Secure IoT Systems

General Framework for Secure IoT Systems General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things

More information

Privacy Policy Personal identification information Non-personal identification information Web browser cookies

Privacy Policy Personal identification information Non-personal identification information Web browser cookies Privacy Policy This Privacy Policy governs the manner in which Wavelry Belmont Elementary PTO collects, uses, maintains and discloses information collected from users (each, a "User") of the https:// www.waverlybelmontpto.org/

More information

Learning Methods for Similarity Handling in Phonebook-centric Social Networks

Learning Methods for Similarity Handling in Phonebook-centric Social Networks agyar Kutatók 10. Nemzetközi Szimpóziuma 10 th International Symposium of Hungarian Researchers on Computational Intelligence and Informatics Learning ethods for Similarity Handling in Phonebook-centric

More information

Welcome to Community Weaver 3!

Welcome to Community Weaver 3! Welcome to Community Weaver 3! Onion River Exchange - our new timebanking software) We ve created this guide to help you get oriented to the upgraded software. At this time, be aware that this guide is

More information

Third Party Cloud Services Its Adoption in the New Age

Third Party Cloud Services Its Adoption in the New Age Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals

More information

SSID User Guide and Policy

SSID User Guide and Policy OSPI SSID User Guide and Policy Using the Comprehensive Education Data and Research System to obtain State Student Identifiers Customer Support September 2017 Table of Contents Introduction... 3 Using

More information

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered Topics covered Chapter 6 Architectural Design Architectural design decisions Architectural views Architectural patterns Application architectures Lecture 1 1 2 Software architecture The design process

More information

UML-Based Conceptual Modeling of Pattern-Bases

UML-Based Conceptual Modeling of Pattern-Bases UML-Based Conceptual Modeling of Pattern-Bases Stefano Rizzi DEIS - University of Bologna Viale Risorgimento, 2 40136 Bologna - Italy srizzi@deis.unibo.it Abstract. The concept of pattern, meant as an

More information

Websites of different companies

Websites of different companies Websites of different companies In this presentation I aim to present two competing companies websites for the client. The client s company is Lightning games, and the two competing sites will also be

More information

What is this Privacy Policy for? The Website. Use of Cookies

What is this Privacy Policy for? The Website. Use of Cookies What is this Privacy Policy for? This privacy policy is for this website [http://ndfatraining.co.uk] and served by NDFA and governs the privacy of its users who choose to use it. The policy sets out the

More information

Enhancing Internet Search Engines to Achieve Concept-based Retrieval

Enhancing Internet Search Engines to Achieve Concept-based Retrieval Enhancing Internet Search Engines to Achieve Concept-based Retrieval Fenghua Lu 1, Thomas Johnsten 2, Vijay Raghavan 1 and Dennis Traylor 3 1 Center for Advanced Computer Studies University of Southwestern

More information

Oracle Financial Consolidation and Close Cloud. What s New in the December Update (16.12)

Oracle Financial Consolidation and Close Cloud. What s New in the December Update (16.12) Oracle Financial Consolidation and Close Cloud What s New in the December Update (16.12) December 2016 TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE FINANCIAL CONSOLIDATION AND CLOSE CLOUD, DECEMBER UPDATE...

More information

Database Systems (Jukic) Chapter 1 Introduction. 1.1 Multiple Choice Questions

Database Systems (Jukic) Chapter 1 Introduction. 1.1 Multiple Choice Questions Database Systems (Jukic) Chapter 1 Introduction 1.1 Multiple Choice Questions 1) Which of the following is a format in which data can appear? A) Text B) Numbers C) Image D) All of the above Diff: 1 Page

More information

Middleware Mediated Transactions & Conditional Messaging

Middleware Mediated Transactions & Conditional Messaging Middleware Mediated Transactions & Conditional Messaging Expert Topic Report ECE1770 Spring 2003 Submitted by: Tim Chen John C Wu To: Prof Jacobsen Date: Apr 06, 2003 Electrical and Computer Engineering

More information

CS 405G: Introduction to Database Systems

CS 405G: Introduction to Database Systems CS 405G: Introduction to Database Systems Entity Relationship Model Jinze Liu 9/11/2014 1 CS685 : Special The UNIVERSITY Topics in Data of Mining, KENTUCKY UKY Review A database is a large collection of

More information

User Group Resource Operations

User Group Resource Operations CHAPTER 5 A Cisco WebEx Social user group is an arbitrary collection of users that a system administrator creates. Typically, users who are in a user group have common interests, goals, or responsibilities.

More information

Discussion of Proposals for Redundancy in 802.1ASbt

Discussion of Proposals for Redundancy in 802.1ASbt IEEE 802.1ASbt Timing and Synchronization Discussion of Proposals for Redundancy in 802.1ASbt IEEE 802.1 Interim Meeting - Sept. 2014, Ottawa, Canada Feng Chen, Franz-Josef Goetz - Siemens AG Geoff Garner

More information

A Robot Recognizing Everyday Objects

A Robot Recognizing Everyday Objects A Robot Recognizing Everyday Objects -- Towards Robot as Autonomous Knowledge Media -- Hideaki Takeda Atsushi Ueno Motoki Saji, Tsuyoshi Nakano Kei Miyamato The National Institute of Informatics Nara Institute

More information

Architectural Support for Internet Evolution and Innovation

Architectural Support for Internet Evolution and Innovation Architectural Support for Internet Evolution and Innovation George N. Rouskas Department of Computer Science North Carolina State University http://net-silos.net/ Joint work with: Ilia Baldine (RENCI),

More information

Web-APIs. Examples Consumer Technology Cross-Domain communication Provider Technology

Web-APIs. Examples Consumer Technology Cross-Domain communication Provider Technology Web-APIs Examples Consumer Technology Cross-Domain communication Provider Technology Applications Blogs and feeds OpenStreetMap Amazon, Ebay, Oxygen, Magento Flickr, YouTube 3 more on next pages http://en.wikipedia.org/wiki/examples_of_representational_state_transfer

More information

Setting up Inter Cluster Trunks with Three or More Cisco CallManagers

Setting up Inter Cluster Trunks with Three or More Cisco CallManagers Setting up Inter Cluster Trunks with Three or More Cisco CallManagers Document ID: 19200 Contents Introduction Prerequisites Requirements Components Used Conventions Problem 3.1.x or 3.2.x Solutions Solution

More information

Modeling and Execution of Data-aware Choreographies: An Overview Michael Hahn, Uwe Breitenbücher, Oliver Kopp, Frank Leymann

Modeling and Execution of Data-aware Choreographies: An Overview Michael Hahn, Uwe Breitenbücher, Oliver Kopp, Frank Leymann Institute of Architecture of Application Systems Modeling and Execution of Data-aware Choreographies: An Overview Michael Hahn, Uwe Breitenbücher, Oliver Kopp, Frank Leymann 1 Institute of Architecture

More information

Lecture 1. Chapter 6 Architectural design

Lecture 1. Chapter 6 Architectural design Chapter 6 Architectural Design Lecture 1 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process

More information

EMR web api documentation

EMR web api documentation Introduction EMR web api documentation This is the documentation of Medstreaming EMR Api. You will find all available Apis and the details of every api. Including its url, parameters, Description, Response

More information

AXIOMS OF AN IMPERATIVE LANGUAGE PARTIAL CORRECTNESS WEAK AND STRONG CONDITIONS. THE AXIOM FOR nop

AXIOMS OF AN IMPERATIVE LANGUAGE PARTIAL CORRECTNESS WEAK AND STRONG CONDITIONS. THE AXIOM FOR nop AXIOMS OF AN IMPERATIVE LANGUAGE We will use the same language, with the same abstract syntax that we used for operational semantics. However, we will only be concerned with the commands, since the language

More information

New Paradigms of Digital Identity:

New Paradigms of Digital Identity: A Telefonica White Paper New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS) February 2016 1. Introduction The concept of identity has always been the key factor

More information

The Data Organization

The Data Organization C V I T F E P A O TM The Data Organization 1251 Yosemite Way Hayward, CA 94545 (510) 303-8868 rschoenrank@computer.org Business Intelligence Process Architecture By Rainer Schoenrank Data Warehouse Consultant

More information

Identifying and Preventing Conditions for Web Privacy Leakage

Identifying and Preventing Conditions for Web Privacy Leakage Identifying and Preventing Conditions for Web Privacy Leakage Craig E. Wills Computer Science Department Worcester Polytechnic Institute Worcester, MA 01609 1 Position Statement Beyond tracking and proposals

More information

Chronos Fitness, Inc. dba Chronos Wearables, 1347 Green St. San Francisco CA 94109,

Chronos Fitness, Inc. dba Chronos Wearables, 1347 Green St. San Francisco CA 94109, Privacy Policy Of Chronos Wearables This Application collects some Personal Data from its Users. Data Controller and Owner Chronos Fitness, Inc. dba Chronos Wearables, 1347 Green St. San Francisco CA 94109,

More information

Hi hi! My. work NATHAN ROSS. User Experience

Hi hi! My. work NATHAN ROSS. User Experience Hi hi! My NATHAN ROSS work User Experience 415.819.7530 nathantross@gmail.com nathantross.com Welcome to my portfolio Hi hi! My work I m a UX Designer with 10+ years experience building and creating products.

More information

Passwords. Twitter UN: IDANRV Twitter PW: idanrv1. Thank You

Passwords. Twitter UN: IDANRV Twitter PW: idanrv1. Thank You Passwords Twitter UN: IDANRV Twitter PW: idanrv1 Thank You USER'S MANUAL TABLE OF CONTENTS Page # 1.1 SYSTEM OVERVIEW... 4 1.2 DEFINITIONS & ACRONYMS... 4 1.3 REFERENCES... 4 2.0 INSTALLATION... 5 2.1

More information

Privacy-Preserving Data Mining in the Fully Distributed Model

Privacy-Preserving Data Mining in the Fully Distributed Model Privacy-Preserving Data Mining in the Fully Distributed Model Rebecca Wright Stevens Institute of Technology www.cs.stevens.edu/~rwright MADNES 05 22 September, 2005 (Includes joint work with Zhiqiang

More information

Chapter 6 Architectural Design

Chapter 6 Architectural Design Chapter 6 Architectural Design Chapter 6 Architectural Design Slide 1 Topics covered The WHAT and WHY of architectural design Architectural design decisions Architectural views/perspectives Architectural

More information

Relational databases

Relational databases COSC 6397 Big Data Analytics NoSQL databases Edgar Gabriel Spring 2017 Relational databases Long lasting industry standard to store data persistently Key points concurrency control, transactions, standard

More information

UBC Graduate Information System (GIS)

UBC Graduate Information System (GIS) UBC Graduate Information System (GIS) Project Design University of British Columbia Okanagan COSC 304 Fall 2009 Version: 1.3 Date: 11/22/2009 Project Team Kyle Kotowick Andrew Campbell Document Control

More information

A new international standard for data validation and processing

A new international standard for data validation and processing A new international standard for data validation and processing Marco Pellegrino (marco.pellegrino@ec.europa.eu) 1 Keywords: Data validation, transformation, open standards, SDMX, GSIM 1. INTRODUCTION

More information

Foundations of Data Warehouse Quality (DWQ)

Foundations of Data Warehouse Quality (DWQ) DWQ Foundations of Data Warehouse Quality (DWQ) v.1.1 Document Number: DWQ -- INRIA --002 Project Name: Foundations of Data Warehouse Quality (DWQ) Project Number: EP 22469 Title: Author: Workpackage:

More information

Midterm 2 Solutions. CS70 Discrete Mathematics and Probability Theory, Spring 2009

Midterm 2 Solutions. CS70 Discrete Mathematics and Probability Theory, Spring 2009 CS70 Discrete Mathematics and Probability Theory, Spring 2009 Midterm 2 Solutions Note: These solutions are not necessarily model answers. Rather, they are designed to be tutorial in nature, and sometimes

More information

Integration Requirements

Integration Requirements Marketo Overview and Setup Instructions The Socedo Marketo integration gives you the ability to build powerful engagement campaigns, nurture programs and/or marketing workflows with your social leads from

More information

Polyèdres et compilation

Polyèdres et compilation Polyèdres et compilation François Irigoin & Mehdi Amini & Corinne Ancourt & Fabien Coelho & Béatrice Creusillet & Ronan Keryell MINES ParisTech - Centre de Recherche en Informatique 12 May 2011 François

More information

Object Oriented Issues in VDM++

Object Oriented Issues in VDM++ Object Oriented Issues in VDM++ Nick Battle, Fujitsu UK (nick.battle@uk.fujitsu.com) Background VDMJ implemented VDM-SL first (started late 2007) Formally defined. Very few semantic problems VDM++ support

More information

Social Voting Techniques: A Comparison of the Methods Used for Explicit Feedback in Recommendation Systems

Social Voting Techniques: A Comparison of the Methods Used for Explicit Feedback in Recommendation Systems Special Issue on Computer Science and Software Engineering Social Voting Techniques: A Comparison of the Methods Used for Explicit Feedback in Recommendation Systems Edward Rolando Nuñez-Valdez 1, Juan

More information

Discussion of Proposals for Redundancy in 802.1ASbt

Discussion of Proposals for Redundancy in 802.1ASbt IEEE 802.1ASbt Timing and Synchronization Discussion of Proposals for Redundancy in 802.1ASbt IEEE 802.1 Interim Meeting - Sept. 2014, Ottawa, Canada Feng Chen, Franz-Josef Goetz - Siemens AG Geoffrey

More information

Context-Awareness and Adaptation in Distributed Event-Based Systems

Context-Awareness and Adaptation in Distributed Event-Based Systems Context-Awareness and Adaptation in Distributed Event-Based Systems Eduardo S. Barrenechea, Paulo S. C. Alencar, Rolando Blanco, Don Cowan David R. Cheriton School of Computer Science University of Waterloo

More information

Modellistica Medica. Maria Grazia Pia, INFN Genova. Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico

Modellistica Medica. Maria Grazia Pia, INFN Genova. Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico Modellistica Medica Maria Grazia Pia INFN Genova Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003 Lezione 8 OO modeling Design Patterns Introduction Creational Patterns Software

More information

Mir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada

Mir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada Mir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada Mohamed Bakillah and Steve H.L. Liang Department of Geomatics Engineering University of Calgary, Alberta, Canada

More information

Deanship of Academic Development. Comprehensive eportfolio Strategy for KFU Dr. Kathryn Chang Barker Director, Department of Professional Development

Deanship of Academic Development. Comprehensive eportfolio Strategy for KFU Dr. Kathryn Chang Barker Director, Department of Professional Development Deanship of Academic Development Comprehensive eportfolio Strategy for KFU Dr. Kathryn Chang Barker Director, Department of Professional Development The new Department of Professional Development (DPD)

More information

Relational inductive biases, deep learning, and graph networks

Relational inductive biases, deep learning, and graph networks Relational inductive biases, deep learning, and graph networks Peter Battaglia et al. 2018 1 What The authors explore how we can combine relational inductive biases and DL. They introduce graph network

More information

Creating End-toEnd Middleware Services Via Configuration

Creating End-toEnd Middleware Services Via Configuration Creating End-toEnd Middleware Services Via Configuration Sanjai Narain narain@research.telcordia.com Kirthika Parmeswaran kirthika@research.telcordia.com Pradeep Gore pradeep@oomworks.com Real-Time And

More information

Distributed Data Management

Distributed Data Management Lecture Data Management Chapter 1: Erik Buchmann buchmann@ipd.uka.de IPD, Forschungsbereich Systeme der Informationsverwaltung of this Chapter are databases and distributed data management not completely

More information

Chapter 6 Architectural Design. Lecture 1. Chapter 6 Architectural design

Chapter 6 Architectural Design. Lecture 1. Chapter 6 Architectural design Chapter 6 Architectural Design Lecture 1 1 Topics covered ² Architectural design decisions ² Architectural views ² Architectural patterns ² Application architectures 2 Software architecture ² The design

More information

File Processing Approaches

File Processing Approaches Relational Database Basics Review Overview Database approach Database system Relational model File Processing Approaches Based on file systems Data are recorded in various types of files organized in folders

More information

Friend Cloud: Identifying Networks and Connections Between Facebook Friends. Ben Fuja and Joey Rich. Programming Paradigms May 12, 2011

Friend Cloud: Identifying Networks and Connections Between Facebook Friends. Ben Fuja and Joey Rich. Programming Paradigms May 12, 2011 Friend Cloud: Identifying Networks and Connections Between Facebook Friends Ben Fuja and Joey Rich Programming Paradigms May 12, 2011 1 Abstract Facebook has become a ubiquitous aspect of the social world,

More information

AN AGENT-ORIENTED EXECUTIVE MODEL FOR SERVICE CHOREOGRAPHY

AN AGENT-ORIENTED EXECUTIVE MODEL FOR SERVICE CHOREOGRAPHY AN AGENT-ORIENTED EXECUTIVE MODEL FOR SERVICE CHOREOGRAPHY MOHAMMAD ZAHIRI, MOHAMMAD R. KHAYYAMBASHI Department of Computer Eng. and Information Technology, University of Sheikh Bahaei, Isfahan, Iran Computer

More information

Group Name: Team Epsilon Max Hinson Jhon Faghih Nassiri

Group Name: Team Epsilon Max Hinson Jhon Faghih Nassiri Software Requirements Specification for UCSB 360 Version 1.2 Prepared by Group Name: Team Epsilon Max Hinson 4426771 maxwellhinson@gmail.com Jhon Faghih Nassiri 4111274 jfaghihnassiri@gmail.com Luke Buckland

More information

Hans Joachim Jelena Mirkovic Ivica Milanovic Øyvind Bakkeli

Hans Joachim Jelena Mirkovic Ivica Milanovic Øyvind Bakkeli Hans Joachim Jelena Mirkovic Ivica Milanovic Øyvind Bakkeli Introduction Research questions: What are most common and accepted authentication methods for mobile services? What are differences, opportunities

More information

Chapter Outline. Note 1. Overview of Database Design Process Example Database Application (COMPANY) ER Model Concepts

Chapter Outline. Note 1. Overview of Database Design Process Example Database Application (COMPANY) ER Model Concepts Chapter Outline Overview of Database Design Process Example Database Application (COMPANY) ER Model Concepts Entities and Attributes Entity Types, Value Sets, and Key Attributes Relationships and Relationship

More information

OpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off]

OpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off] OpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off] DRAFT: This is the near final draft of the 1.2 version of the OpenChain Specification. We have recently completed the final

More information

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY National Video Conferencing Network Version 1.0 Released January 01, 2014 HIGHER EDUCATION COMMISSION, PAKISTAN 1 GENERAL The Higher Education Commission

More information

Data integration perspectives from the LTB project

Data integration perspectives from the LTB project Data integration perspectives from the LTB project Michele Pasin Centre for Computing in the Humanities Kings College, London michele.pasin@ kcl.ac.uk SDH-SEMI-2010 Montreal, Canada, June 2010 Summary

More information

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS 6403 - SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS 1. Explain iterative waterfall and spiral model for software life cycle and various activities

More information

finalsite/renweb Integration Technical Overview

finalsite/renweb Integration Technical Overview finalsite/renweb Integration Technical Overview version 0.1 June 18, 2009 Contents 1. Introduction 2. Terminology 3. Data considerations 4. Web service properties 5. Data reconciliation 6. RenWeb.com 7.

More information

Session Booklet Social Media & Facebook

Session Booklet Social Media & Facebook Session Booklet Social Media & Facebook Social networking refers to the use of online social networks such as Facebook to communicate with other people. A social network can include blogs and other ways

More information

Translation Validation for a Verified OS Kernel

Translation Validation for a Verified OS Kernel To appear in PLDI 13 Translation Validation for a Verified OS Kernel Thomas Sewell 1, Magnus Myreen 2, Gerwin Klein 1 1 NICTA, Australia 2 University of Cambridge, UK L4.verified sel4 = a formally verified

More information

TestBase's Patented Slice Feature is an Answer to Db2 Testing Challenges

TestBase's Patented Slice Feature is an Answer to Db2 Testing Challenges Db2 for z/os Test Data Management Revolutionized TestBase's Patented Slice Feature is an Answer to Db2 Testing Challenges The challenge in creating realistic representative test data lies in extracting

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

Chapter 6 Architectural Design. Chapter 6 Architectural design

Chapter 6 Architectural Design. Chapter 6 Architectural design Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying

More information

XV. The Entity-Relationship Model

XV. The Entity-Relationship Model XV. The Entity-Relationship Model The Entity-Relationship Model Entities, Relationships and Attributes Cardinalities, Identifiers and Generalization Documentation of E-R Diagrams and Business Rules Acknowledgment:

More information

All you need is fun. Cons T Åhs Keeper of The Code

All you need is fun. Cons T Åhs Keeper of The Code All you need is fun Cons T Åhs Keeper of The Code cons@klarna.com Cons T Åhs Keeper of The Code at klarna Architecture - The Big Picture Development - getting ideas to work Code Quality - care about the

More information

Semantic Web. Semantic Web Services. Morteza Amini. Sharif University of Technology Fall 94-95

Semantic Web. Semantic Web Services. Morteza Amini. Sharif University of Technology Fall 94-95 ه عا ی Semantic Web Semantic Web Services Morteza Amini Sharif University of Technology Fall 94-95 Outline Semantic Web Services Basics Challenges in Web Services Semantics in Web Services Web Service

More information

NESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE

NESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE PRIVACY NOTICE Nestlé Purina Petcare Limited (hereinafter referred to as Nestlé ) is committed to safeguarding your privacy and ensuring that you continue to trust Nestlé with your personal data. When

More information