Multi-application Profile Updates Propagation: a Semantic Layer to improve Mapping between Applications
|
|
- Camron Domenic Tucker
- 5 years ago
- Views:
Transcription
1 Multi-application Profile Updates Propagation: a Semantic Layer to improve Mapping between Applications N a d i a B e n n a n i U n i v e r s i t é d e L y o n M a x C h e v a l i e r - U n i v e r s i t é P a u l S a b a t i e r Elöd E g y e d - Z s i g m o n d U n i v e r s i t é d e L y o n G i l l e s H u b e r t U n i v e r s i t é P a u l S a b a t i e r M a r c o V i v i a n i U n i v e r s i t à d e g l i S t u d i d e l l I n s u b r i a M u l t i A - P r o A P R I L 1 6 TH
2 OUTLINE Open Issues in Multi-application Personalization G-Profile The Semantic Layer Benefits of Integration Conclusions and Further Research 2 16/04/2012 MultiA-Pro
3 Introduction Nowadays, many applications in different areas (digital libraries, search engines, e-learning, online databases, ecommerce, social networks ) collect information about users for service personalization. Applications organize user properties, preferences and assumptions based on the user state, in user profiles. Each application manages user information independently from others, using a specific user model. 3 16/04/2012 MultiA-Pro
4 Mono application user profile management Application 3 Application 2 Application 4 Internet Application 5 Application 1 Application /04/2012 MultiA-Pro 4
5 Drawbacks Data incoherence among isolated user profiles can be produced, due to several drawbacks strictly connected to mono-application personalization. Redundancy. Lack of inter-application experience: data connected to a given user remain private to each application. Users cannot take advantage of their information scattered across different applications. Lack of inter-user experience: users cannot profit of the experience already accumulated by other users, in the same or different applications. Lack of control: users have little or no control over the information defining their profiles. 5 16/04/2012 MultiA-Pro
6 Aim of our Work G-Profile: a multi-application user modeling system G-Profile allows user profile information to evolve in a multi-application context by user data propagation. G-Profile is based on user profile mappings between applications. To improve mapping management and to limit human intervention, we propose to add to G-Profile a Semantic Layer: a module allowing to automatically identify these mappings. 6 16/04/2012 MultiA-Pro
7 G-Profile G-Profile does not propose neither a specific reconciliation technique able to take into account all the possible user data representations in different applications, nor a standard user profile model. We define some abstract mapping functions, based on the generic concept of mapping between user data among applications. An application is G-Profile-aware if it provides a suitable application programming interface (API) to access both its user profile attributes and a set of mapping functions for these attributes to be used in mapping generation assisted by G- Profile. 7 16/04/2012 MultiA-Pro
8 Architecture 8 16/04/2012 MultiA-Pro
9 User Profile Formalization Each application A manages a set of user attributes a A k k {1,, m A } m A is the total number of attributes for the application A for each user u x using the application A, each attribute a A k has a value v k associated, forming the user profile element as a couple (attribute, value) Formally 9 16/04/2012 MultiA-Pro
10 Mapping example 1/2 A 1 = ebay DirectCopy(A 2 ) = m 2 A 2 A 2 = Amazon A 3 = Windows Live m 2 A 3 = Extract(A 3 )² Shipping_address DirectCopy(A 1,A 2 ) = m 2 A 1,A 2 Address m 1 A 2,A 3 = Extract(A 2,A 3 ) Home_town 10 16/04/2012 MultiA-Pro
11 Data Mapping Formalization 1/2 Each attribute can, from time to time, be involved as the source or the target attribute in a relation with others. More specifically, since attributes are organized differently in each application A i depending on the adopted user model, they can be permuted in several source sets 11 16/04/2012 MultiA-Pro
12 Data Mapping Formalization 2/2 In the same way, each attribute of the application A i can be a target attribute belonging to the target set We define a mapping between two applications A i and A j, i j, as the triple Formally a mapping function 12 16/04/2012 MultiA-Pro
13 Mapping Graph Formalization It is possible to define a mapping graph G as a combination of all the mappings in our environment. G is a directed graph G = (V,E) composed of (i) a set V of nodes, (ii) a set E of directed edges. We define two kinds of node: attribute nodes (n-att) and function nodes (n-fun). V = V n-att V n-fun Formally 13 16/04/2012 MultiA-Pro
14 Mapping example 2/2 A 4 = Facebook (s A4 1 )First_name (s A4 2 )Middle_name (s A4 3 )Surname A 2 = Amazon Concat(A 4,A 2 ) = m 1 A 4,A 2 (t 1 A2 )Full_name Interests In_my_own_words Events Wish_list (t 1 A2, s 6 A2 )Address Concat(A 2 ) = m 1 A 2 DirectCopy(A 2) = m 2 A 2 DirectCopy(A 1,A 2 ) = m 2 A 1,A 2 Last_name Birthday Biography DirectCopy(A 2,A 4 ) = m 1 A 2,A 1 DirectCopy(A 4,A 3 ) m A 3 = m A 1,A 3 1 = 1 DirectCopy(A 3 ) First_name Wall m 1 A 4 = DirectCopy(A 4 ) Publish(A 2,A 4 ) = m 2 A 2,A 4 Append(A 2,A 1 ) = m 1 A 2,A 1 Birth_date Publish(A 4 ) = m 2 A 4 Publish(A 1,A 4 ) = m 1 A 1,A 4 m 1 A 1 = Append(A 1 ) m A 2,A 3 m A 3 1 = 2 = Extract(A 2,A 3 ) Extract(A 3 ) Home_town A 1 = ebay Feedbacks Wish_list Shipping_addre ss A 3 = Windows Live 14 16/04/2012 MultiA-Pro
15 Profile change propagation (Eg. 1) User Profile u 1 (A 1 ) USER DATA propagation User Profile u 1 (A 2 ) USER DATA User Profile u 1 ( ) USER DATA User Profile u 1 (A n ) USER DATA Application 1 mapping Application 2 Application n Time t = 0 Modification of user data on A 1 Time t = 1 Propagation of the modification on A 2 Time t = Propagation of the modification on Time t = n-1 Propagation of the modification on A n 15 16/04/2012 MultiA-Pro
16 Data Propagation 1/ /04/2012 MultiA-Pro
17 Data Propagation 2/ /04/2012 MultiA-Pro
18 Recursive Data Propagation 1/ /04/2012 MultiA-Pro
19 Recursive Data Propagation 2/ /04/2012 MultiA-Pro
20 Recursive Data Propagation 3/ /04/2012 MultiA-Pro
21 Recursive Data Propagation 4/4 Manual mapping creation is a time consuming process There are many «obvious mappings» easily identifiable 21 16/04/2012 MultiA-Pro
22 Mapping Identification A semantic layer to: Allow every application to manage its own view on user profiles (e.g. different attribute names) Avoid explicit description of relations between attributes Identify related attributes into two user profiles coming from two applications Every application uses the semantic layer to label its own attributes 22 16/04/2012 MultiA-Pro
23 Mapping Identification Generalized semantic user profile 23 16/04/2012 MultiA-Pro
24 Mapping Identification Semantic labeling of attributes Customer Factual Data Transactional Data Customer ID Identity BirthDate Gender Semantic Layer Application Side First Name Last Name Product Purchase Preference History 24 16/04/2012 MultiA-Pro
25 Mapping Identification Mapping identification process Profile #1 Profile #2 Shared Attributes Extraction Shared Attributes Extraction Corresponding Concept Extraction Corresponding Concept Extraction Concept Compatibility Checking Value-type Compatibility Checking 25 16/04/2012 MultiA-Pro
26 Benefits of Integration Taking into account different User Models Mediation based profile mapping Profile information modification propagation Semantic layer = Shared representation of users Assisted mapping identification 26 16/04/2012 MultiA-Pro
27 Perspectives Validate the model on real or artificial data Handle privacy issues and refine the security and privacy issues through the semantic layer Integrate the semantic layer in the prototype Propose the model as a standard protocol 27 16/04/2012 MultiA-Pro
User Profile Integration Made Easy Model-Driven Extraction and Transformation of Social Network Schemas
User Profile Integration Made Easy Model-Driven Extraction and Transformation of Social Network s Martin Wischenbart, S. Mitsch, E. Kapsammer, A. Kusel, B. Pröll, W. Retschitzegger, W. Schwinger, J. Schönböck,
More informationKNOWLEDGE MANAGEMENT VIA DEVELOPMENT IN ACCOUNTING: THE CASE OF THE PROFIT AND LOSS ACCOUNT
KNOWLEDGE MANAGEMENT VIA DEVELOPMENT IN ACCOUNTING: THE CASE OF THE PROFIT AND LOSS ACCOUNT Tung-Hsiang Chou National Chengchi University, Taiwan John A. Vassar Louisiana State University in Shreveport
More informationPrivacy Policy. Personal Data collected for the following purposes and using the following services:
Privacy Policy This Application collects some Personal Data from its Users. Summary Personal Data collected for the following purposes and using the following services: Access to third party services'
More informationPrivacy Policy of ManualsLib App
Privacy Policy of ManualsLib App This Application collects some Personal Data from its Users. POLICY SUMMARY Personal Data collected for the following purposes and using the following services: Access
More informationMicrosoft Outlook 2007 Contacts
Outline Contacts... 1 Create a contact card from an incoming email message... 1 Create a contact card from scratch... 2 Send email to contact... 2 Option 1... 2 Option 2... 3 Displaying in LastName, FirstName
More informationSoftware Design Description Report
2015 Software Design Description Report CodeBenders Haldun Yıldız 1819663 Onur Aydınay 1819002 Deniz Can Yüksel 1819697 Ali Şihab Akcan 1818871 TABLE OF CONTENTS 1 Overview... 3 1.1 Scope... 3 1.2 Purpose...
More informationData Controller and Owner. Types of Data collected. Mode and place of processing the Data. Privacy Policy of aimedis.com. Methods of processing
Privacy Policy of aimedis.com This Application collects some Personal Data from its Users. Data Controller and Owner Aimedis B.V., Sint Michaëlstraat 4, 5935 BL Steyl, Netherlands Owner contact email:
More informationEECS 647: Introduction to Database Systems
EECS 647: Introduction to Database Systems Instructor: Luke Huan Spring 2009 Administrative I have communicated with KU Bookstore inquring about the text book status. Take home background survey is due
More informationPS-80 Storing Data in the Right Place in Deltek Vision
PS-80 Storing Data in the Right Place in Deltek Vision Loren Saunders Owner: Saunders Consulting Group, LLC PS-80 Storing Data in the Right Place What it may feel like Deltek Vision is a massive application.
More informationOpen Integration Hub One connector for many integrations
Open Integration Hub One connector for many integrations Copyright 2018 Cloud Ecosystem e.v. What concerns everyone can only be resolved by everyone. Friedrich Dürrenmatt (1921-1990), The Physicists. This
More informationInterface (API) Design
Interface (API) Design Architect s Perspective R. Kuehl/J. Scott Hawker p. 1 What is an API? Exposes the public facing functionality of a software component Operations, inputs, and outputs Exposes functionality
More informationIntroduction to Cloud Computing. [thoughtsoncloud.com] 1
Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:
More informationYada. A blockchain-based social graph
Yada A blockchain-based social graph January 2018 Abstract The goal of Yada is to achieve an acceptable level anonymity, privacy, and freedom of expression while making available to the public a structure
More informationAmI Design Process. 01QZP - Ambient intelligence. Fulvio Corno. Politecnico di Torino, 2017/2018
AmI Design Process 01QZP - Ambient intelligence Fulvio Corno Politecnico di Torino, 2017/2018 Design Process http://dilbert.com/strips/comic/2002-02-20/ http://dilbert.com/strips/comic/2001-12-12/ 2017/2018
More informationIntroduction To Model-to-Model Transformation
- 1 - Context of this work The present courseware has been elaborated in the context of the MODELPLEX European IST FP6 project ( http://www.modelplex.org/). Co-funded by the European Commission, the MODELPLEX
More informationPattern-Based Analysis of an Embedded Real-Time System Architecture
Pattern-Based Analysis of an Embedded Real-Time System Architecture Peter Feiler Software Engineering Institute phf@sei.cmu.edu 412-268-7790 Outline Introduction to SAE AADL Standard The case study Towards
More informationxbook: Redesigning Privacy Control in Social Networking Platforms Kapil Singh, Sumeer Bhola and Wenke Lee
xbook: Redesigning Privacy Control in Social Networking Platforms Kapil Singh, Sumeer Bhola and Wenke Lee Social networking is growing 2 Privacy concerns are growing More personal data being fed to social
More informationObject-Oriented Introduction
Object-Oriented Introduction Or: Your Honor, I Object... Jonathan Sprinkle 1 University of Arizona Department of Electrical and Computer Engineering PO Box 210104, Tucson, AZ 85721, USA August 22, 2012
More informationEnriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle
Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle Demetris Kyriacou Learning Societies Lab School of Electronics and Computer Science, University of Southampton
More informationSelf-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture
Architecting Self-Managing Distributed Systems Workshop ASDS@ECSAW 15 Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture Flávia C. Delicato Federal University of Rio de Janeiro
More informationTuesday, October 4. Announcements
Tuesday, October 4 Announcements www.singularsource.net Donate to my short story contest UCI Delta Sigma Pi Accepts business and ICS students See Facebook page for details Slide 2 1 Design Patterns Design
More informationOverview of Database Design Process Example Database Application (COMPANY) ER Model Concepts
Chapter Outline Overview of Database Design Process Example Database Application (COMPANY) ER Model Concepts Entities and Attributes Entity Types, Value Sets, and Key Attributes Relationships and Relationship
More informationDistributed Programming and Remote Procedure Calls (RPC): Apache Thrift. George Porter CSE 124 February 19, 2015
Distributed Programming and Remote Procedure Calls (RPC): Apache Thrift George Porter CSE 124 February 19, 2015 End-to-end RPC protocol RPC Components Defines messages, message exchange behavior, Programming
More information5 OAuth Essentials for API Access Control
5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows
More informationCSE 880:Database Systems. ER Model and Relation Schemas
CSE 880:Database Systems ER Model and Relation Schemas 1 Major Steps for Database Design and Implementation 1. Requirements Collection and Analysis: Produces database requirements such as types of data,
More informationWhat this is (NOT) about
Resolving the Transport Tussle Recursive InterNetwork Architecture @ Computer Science Boston U. http://csr.bu.edu/rina 1 What this is (NOT) about q NOT much about specific protocols, algorithms, interfaces,
More informationProgramming II. Modularity 2017/18
Programming II Modularity 2017/18 Module? Lecture Outline Evolution and history of programming languages Modularity Example History of Programming Programming Paradigms How and why languages develop? How
More informationFailure Modelling in Software Architecture Design for Safety
Failure Modelling in Software Architecture Design for Safety Weihang Wu Tim Kelly Presented by George Despotou High Integrity Systems Engineering Group Department of Computer Science Failure Modelling
More information5 OAuth EssEntiAls for APi AccEss control layer7.com
5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the
More informationGeneral Framework for Secure IoT Systems
General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things
More informationPrivacy Policy Personal identification information Non-personal identification information Web browser cookies
Privacy Policy This Privacy Policy governs the manner in which Wavelry Belmont Elementary PTO collects, uses, maintains and discloses information collected from users (each, a "User") of the https:// www.waverlybelmontpto.org/
More informationLearning Methods for Similarity Handling in Phonebook-centric Social Networks
agyar Kutatók 10. Nemzetközi Szimpóziuma 10 th International Symposium of Hungarian Researchers on Computational Intelligence and Informatics Learning ethods for Similarity Handling in Phonebook-centric
More informationWelcome to Community Weaver 3!
Welcome to Community Weaver 3! Onion River Exchange - our new timebanking software) We ve created this guide to help you get oriented to the upgraded software. At this time, be aware that this guide is
More informationThird Party Cloud Services Its Adoption in the New Age
Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals
More informationSSID User Guide and Policy
OSPI SSID User Guide and Policy Using the Comprehensive Education Data and Research System to obtain State Student Identifiers Customer Support September 2017 Table of Contents Introduction... 3 Using
More information5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered
Topics covered Chapter 6 Architectural Design Architectural design decisions Architectural views Architectural patterns Application architectures Lecture 1 1 2 Software architecture The design process
More informationUML-Based Conceptual Modeling of Pattern-Bases
UML-Based Conceptual Modeling of Pattern-Bases Stefano Rizzi DEIS - University of Bologna Viale Risorgimento, 2 40136 Bologna - Italy srizzi@deis.unibo.it Abstract. The concept of pattern, meant as an
More informationWebsites of different companies
Websites of different companies In this presentation I aim to present two competing companies websites for the client. The client s company is Lightning games, and the two competing sites will also be
More informationWhat is this Privacy Policy for? The Website. Use of Cookies
What is this Privacy Policy for? This privacy policy is for this website [http://ndfatraining.co.uk] and served by NDFA and governs the privacy of its users who choose to use it. The policy sets out the
More informationEnhancing Internet Search Engines to Achieve Concept-based Retrieval
Enhancing Internet Search Engines to Achieve Concept-based Retrieval Fenghua Lu 1, Thomas Johnsten 2, Vijay Raghavan 1 and Dennis Traylor 3 1 Center for Advanced Computer Studies University of Southwestern
More informationOracle Financial Consolidation and Close Cloud. What s New in the December Update (16.12)
Oracle Financial Consolidation and Close Cloud What s New in the December Update (16.12) December 2016 TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE FINANCIAL CONSOLIDATION AND CLOSE CLOUD, DECEMBER UPDATE...
More informationDatabase Systems (Jukic) Chapter 1 Introduction. 1.1 Multiple Choice Questions
Database Systems (Jukic) Chapter 1 Introduction 1.1 Multiple Choice Questions 1) Which of the following is a format in which data can appear? A) Text B) Numbers C) Image D) All of the above Diff: 1 Page
More informationMiddleware Mediated Transactions & Conditional Messaging
Middleware Mediated Transactions & Conditional Messaging Expert Topic Report ECE1770 Spring 2003 Submitted by: Tim Chen John C Wu To: Prof Jacobsen Date: Apr 06, 2003 Electrical and Computer Engineering
More informationCS 405G: Introduction to Database Systems
CS 405G: Introduction to Database Systems Entity Relationship Model Jinze Liu 9/11/2014 1 CS685 : Special The UNIVERSITY Topics in Data of Mining, KENTUCKY UKY Review A database is a large collection of
More informationUser Group Resource Operations
CHAPTER 5 A Cisco WebEx Social user group is an arbitrary collection of users that a system administrator creates. Typically, users who are in a user group have common interests, goals, or responsibilities.
More informationDiscussion of Proposals for Redundancy in 802.1ASbt
IEEE 802.1ASbt Timing and Synchronization Discussion of Proposals for Redundancy in 802.1ASbt IEEE 802.1 Interim Meeting - Sept. 2014, Ottawa, Canada Feng Chen, Franz-Josef Goetz - Siemens AG Geoff Garner
More informationA Robot Recognizing Everyday Objects
A Robot Recognizing Everyday Objects -- Towards Robot as Autonomous Knowledge Media -- Hideaki Takeda Atsushi Ueno Motoki Saji, Tsuyoshi Nakano Kei Miyamato The National Institute of Informatics Nara Institute
More informationArchitectural Support for Internet Evolution and Innovation
Architectural Support for Internet Evolution and Innovation George N. Rouskas Department of Computer Science North Carolina State University http://net-silos.net/ Joint work with: Ilia Baldine (RENCI),
More informationWeb-APIs. Examples Consumer Technology Cross-Domain communication Provider Technology
Web-APIs Examples Consumer Technology Cross-Domain communication Provider Technology Applications Blogs and feeds OpenStreetMap Amazon, Ebay, Oxygen, Magento Flickr, YouTube 3 more on next pages http://en.wikipedia.org/wiki/examples_of_representational_state_transfer
More informationSetting up Inter Cluster Trunks with Three or More Cisco CallManagers
Setting up Inter Cluster Trunks with Three or More Cisco CallManagers Document ID: 19200 Contents Introduction Prerequisites Requirements Components Used Conventions Problem 3.1.x or 3.2.x Solutions Solution
More informationModeling and Execution of Data-aware Choreographies: An Overview Michael Hahn, Uwe Breitenbücher, Oliver Kopp, Frank Leymann
Institute of Architecture of Application Systems Modeling and Execution of Data-aware Choreographies: An Overview Michael Hahn, Uwe Breitenbücher, Oliver Kopp, Frank Leymann 1 Institute of Architecture
More informationLecture 1. Chapter 6 Architectural design
Chapter 6 Architectural Design Lecture 1 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process
More informationEMR web api documentation
Introduction EMR web api documentation This is the documentation of Medstreaming EMR Api. You will find all available Apis and the details of every api. Including its url, parameters, Description, Response
More informationAXIOMS OF AN IMPERATIVE LANGUAGE PARTIAL CORRECTNESS WEAK AND STRONG CONDITIONS. THE AXIOM FOR nop
AXIOMS OF AN IMPERATIVE LANGUAGE We will use the same language, with the same abstract syntax that we used for operational semantics. However, we will only be concerned with the commands, since the language
More informationNew Paradigms of Digital Identity:
A Telefonica White Paper New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS) February 2016 1. Introduction The concept of identity has always been the key factor
More informationThe Data Organization
C V I T F E P A O TM The Data Organization 1251 Yosemite Way Hayward, CA 94545 (510) 303-8868 rschoenrank@computer.org Business Intelligence Process Architecture By Rainer Schoenrank Data Warehouse Consultant
More informationIdentifying and Preventing Conditions for Web Privacy Leakage
Identifying and Preventing Conditions for Web Privacy Leakage Craig E. Wills Computer Science Department Worcester Polytechnic Institute Worcester, MA 01609 1 Position Statement Beyond tracking and proposals
More informationChronos Fitness, Inc. dba Chronos Wearables, 1347 Green St. San Francisco CA 94109,
Privacy Policy Of Chronos Wearables This Application collects some Personal Data from its Users. Data Controller and Owner Chronos Fitness, Inc. dba Chronos Wearables, 1347 Green St. San Francisco CA 94109,
More informationHi hi! My. work NATHAN ROSS. User Experience
Hi hi! My NATHAN ROSS work User Experience 415.819.7530 nathantross@gmail.com nathantross.com Welcome to my portfolio Hi hi! My work I m a UX Designer with 10+ years experience building and creating products.
More informationPasswords. Twitter UN: IDANRV Twitter PW: idanrv1. Thank You
Passwords Twitter UN: IDANRV Twitter PW: idanrv1 Thank You USER'S MANUAL TABLE OF CONTENTS Page # 1.1 SYSTEM OVERVIEW... 4 1.2 DEFINITIONS & ACRONYMS... 4 1.3 REFERENCES... 4 2.0 INSTALLATION... 5 2.1
More informationPrivacy-Preserving Data Mining in the Fully Distributed Model
Privacy-Preserving Data Mining in the Fully Distributed Model Rebecca Wright Stevens Institute of Technology www.cs.stevens.edu/~rwright MADNES 05 22 September, 2005 (Includes joint work with Zhiqiang
More informationChapter 6 Architectural Design
Chapter 6 Architectural Design Chapter 6 Architectural Design Slide 1 Topics covered The WHAT and WHY of architectural design Architectural design decisions Architectural views/perspectives Architectural
More informationRelational databases
COSC 6397 Big Data Analytics NoSQL databases Edgar Gabriel Spring 2017 Relational databases Long lasting industry standard to store data persistently Key points concurrency control, transactions, standard
More informationUBC Graduate Information System (GIS)
UBC Graduate Information System (GIS) Project Design University of British Columbia Okanagan COSC 304 Fall 2009 Version: 1.3 Date: 11/22/2009 Project Team Kyle Kotowick Andrew Campbell Document Control
More informationA new international standard for data validation and processing
A new international standard for data validation and processing Marco Pellegrino (marco.pellegrino@ec.europa.eu) 1 Keywords: Data validation, transformation, open standards, SDMX, GSIM 1. INTRODUCTION
More informationFoundations of Data Warehouse Quality (DWQ)
DWQ Foundations of Data Warehouse Quality (DWQ) v.1.1 Document Number: DWQ -- INRIA --002 Project Name: Foundations of Data Warehouse Quality (DWQ) Project Number: EP 22469 Title: Author: Workpackage:
More informationMidterm 2 Solutions. CS70 Discrete Mathematics and Probability Theory, Spring 2009
CS70 Discrete Mathematics and Probability Theory, Spring 2009 Midterm 2 Solutions Note: These solutions are not necessarily model answers. Rather, they are designed to be tutorial in nature, and sometimes
More informationIntegration Requirements
Marketo Overview and Setup Instructions The Socedo Marketo integration gives you the ability to build powerful engagement campaigns, nurture programs and/or marketing workflows with your social leads from
More informationPolyèdres et compilation
Polyèdres et compilation François Irigoin & Mehdi Amini & Corinne Ancourt & Fabien Coelho & Béatrice Creusillet & Ronan Keryell MINES ParisTech - Centre de Recherche en Informatique 12 May 2011 François
More informationObject Oriented Issues in VDM++
Object Oriented Issues in VDM++ Nick Battle, Fujitsu UK (nick.battle@uk.fujitsu.com) Background VDMJ implemented VDM-SL first (started late 2007) Formally defined. Very few semantic problems VDM++ support
More informationSocial Voting Techniques: A Comparison of the Methods Used for Explicit Feedback in Recommendation Systems
Special Issue on Computer Science and Software Engineering Social Voting Techniques: A Comparison of the Methods Used for Explicit Feedback in Recommendation Systems Edward Rolando Nuñez-Valdez 1, Juan
More informationDiscussion of Proposals for Redundancy in 802.1ASbt
IEEE 802.1ASbt Timing and Synchronization Discussion of Proposals for Redundancy in 802.1ASbt IEEE 802.1 Interim Meeting - Sept. 2014, Ottawa, Canada Feng Chen, Franz-Josef Goetz - Siemens AG Geoffrey
More informationContext-Awareness and Adaptation in Distributed Event-Based Systems
Context-Awareness and Adaptation in Distributed Event-Based Systems Eduardo S. Barrenechea, Paulo S. C. Alencar, Rolando Blanco, Don Cowan David R. Cheriton School of Computer Science University of Waterloo
More informationModellistica Medica. Maria Grazia Pia, INFN Genova. Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico
Modellistica Medica Maria Grazia Pia INFN Genova Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003 Lezione 8 OO modeling Design Patterns Introduction Creational Patterns Software
More informationMir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada
Mir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada Mohamed Bakillah and Steve H.L. Liang Department of Geomatics Engineering University of Calgary, Alberta, Canada
More informationDeanship of Academic Development. Comprehensive eportfolio Strategy for KFU Dr. Kathryn Chang Barker Director, Department of Professional Development
Deanship of Academic Development Comprehensive eportfolio Strategy for KFU Dr. Kathryn Chang Barker Director, Department of Professional Development The new Department of Professional Development (DPD)
More informationRelational inductive biases, deep learning, and graph networks
Relational inductive biases, deep learning, and graph networks Peter Battaglia et al. 2018 1 What The authors explore how we can combine relational inductive biases and DL. They introduce graph network
More informationCreating End-toEnd Middleware Services Via Configuration
Creating End-toEnd Middleware Services Via Configuration Sanjai Narain narain@research.telcordia.com Kirthika Parmeswaran kirthika@research.telcordia.com Pradeep Gore pradeep@oomworks.com Real-Time And
More informationDistributed Data Management
Lecture Data Management Chapter 1: Erik Buchmann buchmann@ipd.uka.de IPD, Forschungsbereich Systeme der Informationsverwaltung of this Chapter are databases and distributed data management not completely
More informationChapter 6 Architectural Design. Lecture 1. Chapter 6 Architectural design
Chapter 6 Architectural Design Lecture 1 1 Topics covered ² Architectural design decisions ² Architectural views ² Architectural patterns ² Application architectures 2 Software architecture ² The design
More informationFile Processing Approaches
Relational Database Basics Review Overview Database approach Database system Relational model File Processing Approaches Based on file systems Data are recorded in various types of files organized in folders
More informationFriend Cloud: Identifying Networks and Connections Between Facebook Friends. Ben Fuja and Joey Rich. Programming Paradigms May 12, 2011
Friend Cloud: Identifying Networks and Connections Between Facebook Friends Ben Fuja and Joey Rich Programming Paradigms May 12, 2011 1 Abstract Facebook has become a ubiquitous aspect of the social world,
More informationAN AGENT-ORIENTED EXECUTIVE MODEL FOR SERVICE CHOREOGRAPHY
AN AGENT-ORIENTED EXECUTIVE MODEL FOR SERVICE CHOREOGRAPHY MOHAMMAD ZAHIRI, MOHAMMAD R. KHAYYAMBASHI Department of Computer Eng. and Information Technology, University of Sheikh Bahaei, Isfahan, Iran Computer
More informationGroup Name: Team Epsilon Max Hinson Jhon Faghih Nassiri
Software Requirements Specification for UCSB 360 Version 1.2 Prepared by Group Name: Team Epsilon Max Hinson 4426771 maxwellhinson@gmail.com Jhon Faghih Nassiri 4111274 jfaghihnassiri@gmail.com Luke Buckland
More informationHans Joachim Jelena Mirkovic Ivica Milanovic Øyvind Bakkeli
Hans Joachim Jelena Mirkovic Ivica Milanovic Øyvind Bakkeli Introduction Research questions: What are most common and accepted authentication methods for mobile services? What are differences, opportunities
More informationChapter Outline. Note 1. Overview of Database Design Process Example Database Application (COMPANY) ER Model Concepts
Chapter Outline Overview of Database Design Process Example Database Application (COMPANY) ER Model Concepts Entities and Attributes Entity Types, Value Sets, and Key Attributes Relationships and Relationship
More informationOpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off]
OpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off] DRAFT: This is the near final draft of the 1.2 version of the OpenChain Specification. We have recently completed the final
More informationSERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY
SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY National Video Conferencing Network Version 1.0 Released January 01, 2014 HIGHER EDUCATION COMMISSION, PAKISTAN 1 GENERAL The Higher Education Commission
More informationData integration perspectives from the LTB project
Data integration perspectives from the LTB project Michele Pasin Centre for Computing in the Humanities Kings College, London michele.pasin@ kcl.ac.uk SDH-SEMI-2010 Montreal, Canada, June 2010 Summary
More informationCS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS 6403 - SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS 1. Explain iterative waterfall and spiral model for software life cycle and various activities
More informationfinalsite/renweb Integration Technical Overview
finalsite/renweb Integration Technical Overview version 0.1 June 18, 2009 Contents 1. Introduction 2. Terminology 3. Data considerations 4. Web service properties 5. Data reconciliation 6. RenWeb.com 7.
More informationSession Booklet Social Media & Facebook
Session Booklet Social Media & Facebook Social networking refers to the use of online social networks such as Facebook to communicate with other people. A social network can include blogs and other ways
More informationTranslation Validation for a Verified OS Kernel
To appear in PLDI 13 Translation Validation for a Verified OS Kernel Thomas Sewell 1, Magnus Myreen 2, Gerwin Klein 1 1 NICTA, Australia 2 University of Cambridge, UK L4.verified sel4 = a formally verified
More informationTestBase's Patented Slice Feature is an Answer to Db2 Testing Challenges
Db2 for z/os Test Data Management Revolutionized TestBase's Patented Slice Feature is an Answer to Db2 Testing Challenges The challenge in creating realistic representative test data lies in extracting
More informationTechnical Overview. Version March 2018 Author: Vittorio Bertola
Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which
More informationChapter 6 Architectural Design. Chapter 6 Architectural design
Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying
More informationXV. The Entity-Relationship Model
XV. The Entity-Relationship Model The Entity-Relationship Model Entities, Relationships and Attributes Cardinalities, Identifiers and Generalization Documentation of E-R Diagrams and Business Rules Acknowledgment:
More informationAll you need is fun. Cons T Åhs Keeper of The Code
All you need is fun Cons T Åhs Keeper of The Code cons@klarna.com Cons T Åhs Keeper of The Code at klarna Architecture - The Big Picture Development - getting ideas to work Code Quality - care about the
More informationSemantic Web. Semantic Web Services. Morteza Amini. Sharif University of Technology Fall 94-95
ه عا ی Semantic Web Semantic Web Services Morteza Amini Sharif University of Technology Fall 94-95 Outline Semantic Web Services Basics Challenges in Web Services Semantics in Web Services Web Service
More informationNESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE
PRIVACY NOTICE Nestlé Purina Petcare Limited (hereinafter referred to as Nestlé ) is committed to safeguarding your privacy and ensuring that you continue to trust Nestlé with your personal data. When
More information