CHAPTER 6 SEMANTIC ASSOCIATION THROUGH CONTEXT CLOSENESS

Size: px
Start display at page:

Download "CHAPTER 6 SEMANTIC ASSOCIATION THROUGH CONTEXT CLOSENESS"

Transcription

1 69 CHAPTER 6 SEMANTIC ASSOCIATION THROUGH CONTEXT CLOSENESS 6.1 INTRODUCTION Precision in ranking semantic association can be improved by filtering the irrelevant paths that was discussed in the previous chapter. This chapter discusses about the context closeness and how it is used in improving the precision in finding semantic associations. In the proposed work assume that the properties in the RDF graph are bidirectional ie. every relationship has a corresponding inverse relationship. This assumption is necessary because two resources may not be connected by a directed path but by a path which contains inverse relations. 6.2 MOTIVATION Assume that there are two persons X and Y. Suppose user knows something about person X or Y such as person X is involved more in financial activities or person Y is involved in politics etc. In that case, the user may be interested in finding these types of relationships between X and Y. Based on the expectation of the user the relationships between two entities are ranked. Consider the example for the relationships between person John and movie Slumdog_Millionaire in the RDF shown in Table 6.1.

2 70 Table 6.1 shows the possible relationships between the entity John and Slumdog_Millionaire. There are four intermediate entities between John and Slumdog_Millionaire. Table 6.1 Relationships between person John and movie Slumdog_Millionaire John edit_music-human_movie support_fund-tara_funding_agencies support_fund- Ragam_Music member_of-arrahman provides_music- Slumdog_Millionaire John member_of- Tara_Funding_Agency -supports_fund- Human_Movie associated_with- Ragam_Music member_of- ARRahman provides_music- Slumdog_Millionaire John edits_music Human_Movie associated_with-ragam_music support_fund- Tara_Funding_Agencies -member of- ARRahman provides_music- Slumdog_Millionaire These intermediate entities are scattered over the path in different possible combinations. If the user is interested in Music and Finance, Anyanwu et al (2005) method produce the same weights for all paths, since the component values are calculated independently and then summed up. In this case, all the paths are having equal weights and are ranked arbitrarily. Here, the user has to go through this subset of paths to find the relevant paths. Suppose a user is interested in finding and ranking relevant association according to their domain of interest which is closer to either the left entity John or the right entity Slumdog Millionaire, and to rank these paths accordingly, the existing system provides the flexibility to the user for selecting the choice for favoring long path or favoring short path, favoring popularity or favoring unpopular or favoring rarity. But there are no ways to select the choice for context closeness. The proposed method, rank the

3 71 semantic association paths between two entities according to the users needs that support context closeness. Definition (Context closeness): In an RDF graph, the sequence e 1,P 1,e 2,P 2, e 3,P 3 e n-1, P n-1,e n, where e i (1 i n) are called as the entities and P j (1 j< n) are called as properties. If the sum of context weight of user entities in the first half of the sequence is greater than second half of the sequence, then the context is said to be closer to left entity e 1. Otherwise, it is said to be closer to right entity e n. To calculate the context value based on the choice of the user selection in context closer, the Equation (4.3) has been modified based on the above definition which is as follows: C cv c D (6.1) i i i c /2 1 n #c D p i i i 1 c / 2 1 MC C 0.1 C x(1 ) c c (6.2) c /2 1 n #c D p i i i 1 c /2 1 MC 0.1 C C x(1 ) c c (6.3) where c is the total no of components in the path (excluding the start and end entities). The Equations (6.2) and (6.3) are used to calculate the context weights closer to the left entity and the right entity respectively. The context weight MC p is used as a parameter to calculate the weight of the semantic association paths.

4 PSEUDO CODE FOR RANKING THE SEMANTIC ASSOCIATION Figure 6.1 shows the pseudo code to find the semantic association paths between two entities. For each resources (entities and relations) in an association path, subsumption weight, popularity weight, rarity weight, popularity weight and association length are calculated as discussed in Chapter 2. The context weight is calculated using the equation given in Section 6.2. Finally, overall weight is calculated by adding all the resources weight in the association path. One path in an RDF graph is considered in each iteration and weights are calculated for all the resources in this path. The algorithm terminates when all the paths are considered. Input : RDF graph and two entities Output : Semantic association paths with ranking according to the user s Interest /* Initialization */ // ws - Subsumption weight // wc - Context weight // wr - Rarity weight // wp - Popularity weight // wt - Trust weight // wl - Association length weight Rank, ws,wc,wr,wp,wt,wl =0 for each resource r, in association_path /* Loop through the association */ { /* Trust calculation */ If wt < resource.trust wt = resource.trust TwP = TwP + No of incoming and outgoing relationship of entity / max (No of incoming and outgoing relationship among all entities) TwR = (No of instances and relationships in knowledgebase - instance and relationship with same type) / No of instances and relationships in knowledgebase /* context weight of the resource */ cw=context.relevance(resource) if resource.num <= association.length()/2 if cw ==0.0 notcontextl++ wcl = wcl+cw Figure 6.1 (Continued)

5 73 Else if cw ==0.0 notcontextr++ wcr = wcr+cw} /* Subsumption Calculation */ ws = ws/association.length() /* Context Calculation */ // context weight for left entity wcl=(1.0/association.length())* (wcl* (1.0 (notcontextl/association.length() ) ) ) // context weight for right entity wcr=(1.0/association.length())* (wcr*(1.0 (notcontextr/association.length()) ) ) if context closed to left wc = wcl+(0.1) wcr wc =(0.1) wcl+ wcr /* Rarity Calculation */ if favor rare associations wr = TwR/ association.length() wr = 1.0 ( TwR/ association.length()) /* Popularity Calculation */ if favor popular associations wp = TwP/ association.length() wp = 1.0 (TwP/ association.length() ) /* Association Length Calculation */ if favor long associations wl = 1.0 (1.0/association.length()) wl = 1.0/association.length() /* Overall ranking */ Rank =(k1*wc)+(k2*ws)+(k3*wp)+(k4*wr)+(k5*wl)+(k6*wt) Figure 6.1 Pseudo code to find the semantic association between two entities

6 EXPERIMENTAL EVALUATION For finding semantic association paths, the proposed system used an RDF consisting of 52 classes, 70 properties and 3000 entities covering various domains such as Music, Finance, Terrorism, Sports. To test the performance of our system, 40 pairs of entities are selected in the RDF. Figure 6.2 Paths between two entities John and Slumdog Millionaire with context closer to John Semantic association paths have been generated and ranked under the various criteria such as favor short association or favor long association, favor popular entities or favor unpopular entities, favor rarity, context closer to right entity or context closer to left entity. Criteria have been selected through user interface. Semantic association paths ranking has been done by the 50 users through the system as well as manually.

7 75 Figure 6.2 shows the paths between two entities John and Slumdog Millionaire with context closer to John and Figure 6.3 shows the Paths between two entities John and Slumdog Millionaire with context closer to Slumdog Millionaire. Figure 6.3 Paths between two entities John and Slumdog Millionaire with context closer to Slumdog Millionaire According to our experiments, the average correlation coefficients between proposed system ranking and user-human s ranking is Figure 6.4 shows the correlation between human ranking and the proposed system ranking for the top-k semantic association paths. Since the average correlation coefficient is greater than 0.5, the proposed system s ranking and user-human ranking are highly correlated. Figure 6.5 shows the comparison of correlation between human rankings with proposed system and other existing association ranking methods. It explains that correlation between

8 76 human ranking and the proposed approach is higher than other existing methods. Figure 6.4 Comparison of human and proposed system ranking with top-k results The precision rates are evaluated to the top-k semantic association paths from the ranked results of the proposed system and other existing methods. Precision represents the fraction of the relevant paths from top-k semantic association paths. Figure 6.6 shows the comparison of precision of the proposed method with the existing methods. Irrespective of value of k, precision will increase or decrease. Among the five methods which show the same phenomenon, the proposed method which is adapted is more significant and provides a high rate of precision.

9 77 Figure 6.5 Comparison of correlation between human ranking and existing association ranking methods Figure 6.6 Comparison of precision between proposed method and existing methods

10 SUMMARY AND DISCUSSION Semantic data contains entities and heterogeneous relationships among them. The number of relationships between entities might be much greater than the number of entities. Ranking these relationship paths are required to find the relevant relationships between entities with respect to the user s domain of interest. In some situation, users may expect the relationships between two entities in which his/her context is closer to any one of the end points either left entity or right entity. The proposed method provides the flexibility to the user to find and rank the semantic association paths with their interested domain components which are closer to either to the left entity or right entity. The proposed method is compared with existing methods through the Spearman Correlation Coefficient and Precision. The average correlation coefficient between the proposed system ranking, Aleman-Meza et al (2005), Anyanwu et al (2005), Lee et al (2009) and Vidal et al (2010) with human ranking are 0.70, 0.61, 0.58, and 0.6 respectively. It is evident that the proposed system ranking is highly correlated with human ranking. The precision for the top-k ranking of the proposed system ranking and other existing methods are evaluated. According to the experiments, the proposed system achieves high precision with top-k ranking than other methods.

Entity-based Semantic Association Ranking on the Semantic Web

Entity-based Semantic Association Ranking on the Semantic Web Entity-based Semantic Association Ranking on the Semantic Web S Narayana Gudlavalleru Engineering College Gudlavalleru, Andhra Pradesh, India S Sivaleela Gudlavalleru Engineering College Gudlavalleru,

More information

Youtube Graph Network Model and Analysis Yonghyun Ro, Han Lee, Dennis Won

Youtube Graph Network Model and Analysis Yonghyun Ro, Han Lee, Dennis Won Youtube Graph Network Model and Analysis Yonghyun Ro, Han Lee, Dennis Won Introduction A countless number of contents gets posted on the YouTube everyday. YouTube keeps its competitiveness by maximizing

More information

Context-Aware Semantic Association Ranking 1

Context-Aware Semantic Association Ranking 1 Context-Aware Semantic Association Ranking Boanerges Aleman-Meza, Chris Halaschek, I. Budak Arpinar, and Amit Sheth Large Scale Distributed Information Systems (LSDIS) Lab, Computer Science Department,

More information

A FLEXIBLE APPROACH FOR RANKING COMPLEX RELATIONSHIPS ON THE SEMANTIC WEB CHRISTIAN HALASCHEK-WIENER

A FLEXIBLE APPROACH FOR RANKING COMPLEX RELATIONSHIPS ON THE SEMANTIC WEB CHRISTIAN HALASCHEK-WIENER A FLEXIBLE APPROACH FOR RANKING COMPLEX RELATIONSHIPS ON THE SEMANTIC WEB by CHRISTIAN HALASCHEK-WIENER (Under the Direction of I. Budak Arpinar and Amit P. Sheth) ABSTRACT The focus of contemporary Web

More information

Feature Selection. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani

Feature Selection. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani Feature Selection CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Dimensionality reduction Feature selection vs. feature extraction Filter univariate

More information

Chapter 12. Routing and Routing Protocols 12-1

Chapter 12. Routing and Routing Protocols 12-1 Chapter 12 Routing and Routing Protocols 12-1 Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone

More information

Advanced Methods in Algorithms HW 5

Advanced Methods in Algorithms HW 5 Advanced Methods in Algorithms HW 5 Written by Pille Pullonen 1 Vertex-disjoint cycle cover Let G(V, E) be a finite, strongly-connected, directed graph. Let w : E R + be a positive weight function dened

More information

Towards a hybrid approach to Netflix Challenge

Towards a hybrid approach to Netflix Challenge Towards a hybrid approach to Netflix Challenge Abhishek Gupta, Abhijeet Mohapatra, Tejaswi Tenneti March 12, 2009 1 Introduction Today Recommendation systems [3] have become indispensible because of the

More information

Big Data Analytics CSCI 4030

Big Data Analytics CSCI 4030 High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Web advertising

More information

Semantic Web Technology Evaluation Ontology (SWETO): A test bed for evaluating tools and benchmarking semantic applications

Semantic Web Technology Evaluation Ontology (SWETO): A test bed for evaluating tools and benchmarking semantic applications Semantic Web Technology Evaluation Ontology (SWETO): A test bed for evaluating tools and benchmarking semantic applications WWW2004 (New York, May 22, 2004) Semantic Web Track, Developers Day Boanerges

More information

Semantic Web Technology Evaluation Ontology (SWETO): A Test Bed for Evaluating Tools and Benchmarking Applications

Semantic Web Technology Evaluation Ontology (SWETO): A Test Bed for Evaluating Tools and Benchmarking Applications Wright State University CORE Scholar Kno.e.sis Publications The Ohio Center of Excellence in Knowledge- Enabled Computing (Kno.e.sis) 5-22-2004 Semantic Web Technology Evaluation Ontology (SWETO): A Test

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Most of today s Web content is intended for the use of humans rather than machines. While searching documents on the Web using computers, human interpretation is required before

More information

Web Search Engines: Solutions to Final Exam, Part I December 13, 2004

Web Search Engines: Solutions to Final Exam, Part I December 13, 2004 Web Search Engines: Solutions to Final Exam, Part I December 13, 2004 Problem 1: A. In using the vector model to compare the similarity of two documents, why is it desirable to normalize the vectors to

More information

Fundamentals of Operations Research. Prof. G. Srinivasan. Department of Management Studies. Indian Institute of Technology Madras.

Fundamentals of Operations Research. Prof. G. Srinivasan. Department of Management Studies. Indian Institute of Technology Madras. Fundamentals of Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras Lecture No # 06 Simplex Algorithm Initialization and Iteration (Refer Slide

More information

Social-Network Graphs

Social-Network Graphs Social-Network Graphs Mining Social Networks Facebook, Google+, Twitter Email Networks, Collaboration Networks Identify communities Similar to clustering Communities usually overlap Identify similarities

More information

Handling Ties. Analysis of Ties in Input and Output Data of Rankings

Handling Ties. Analysis of Ties in Input and Output Data of Rankings Analysis of Ties in Input and Output Data of Rankings 16.7.2014 Knowledge Engineering - Seminar Sports Data Mining 1 Tied results in the input data Frequency depends on data source tie resolution policy

More information

CS473: Course Review CS-473. Luo Si Department of Computer Science Purdue University

CS473: Course Review CS-473. Luo Si Department of Computer Science Purdue University CS473: CS-473 Course Review Luo Si Department of Computer Science Purdue University Basic Concepts of IR: Outline Basic Concepts of Information Retrieval: Task definition of Ad-hoc IR Terminologies and

More information

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture - 8 Consistency and Redundancy in Project networks In today s lecture

More information

Extension, Abbreviation and Refinement -Identifying High-Level Dependence Structures Using Slice-Based Dependence Analysis

Extension, Abbreviation and Refinement -Identifying High-Level Dependence Structures Using Slice-Based Dependence Analysis Extension, Abbreviation and Refinement -Identifying High-Level Dependence Structures Using Slice-Based Dependence Analysis Zheng Li CREST, King s College London, UK Overview Motivation Three combination

More information

Feature Selection Using Modified-MCA Based Scoring Metric for Classification

Feature Selection Using Modified-MCA Based Scoring Metric for Classification 2011 International Conference on Information Communication and Management IPCSIT vol.16 (2011) (2011) IACSIT Press, Singapore Feature Selection Using Modified-MCA Based Scoring Metric for Classification

More information

Lecture 4 Wide Area Networks - Routing

Lecture 4 Wide Area Networks - Routing DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Routing Mei Yang Based on Lecture slides by William Stallings 1 ROUTING IN PACKET SWITCHED NETWORK key design issue for (packet) switched

More information

Proximity Prestige using Incremental Iteration in Page Rank Algorithm

Proximity Prestige using Incremental Iteration in Page Rank Algorithm Indian Journal of Science and Technology, Vol 9(48), DOI: 10.17485/ijst/2016/v9i48/107962, December 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Proximity Prestige using Incremental Iteration

More information

Case 2:17-cv-00980-RRS-KK Document 96-4 Filed 10/01/18 Page 1 of 25 PageID #: 2144 Analysis of Fort Polk s Course of Action (COA) Decision Matrix For Horse Elimination U Case 2:17-cv-00980-RRS-KK Document

More information

MapReduce Design Patterns

MapReduce Design Patterns MapReduce Design Patterns MapReduce Restrictions Any algorithm that needs to be implemented using MapReduce must be expressed in terms of a small number of rigidly defined components that must fit together

More information

Exploiting Communities for Enhancing Lookup Performance in Structured P2P Systems

Exploiting Communities for Enhancing Lookup Performance in Structured P2P Systems Exploiting Communities for Enhancing Lookup Performance in Structured P2P Systems H. M. N. Dilum Bandara and Anura P. Jayasumana Colorado State University Anura.Jayasumana@ColoState.edu Contribution Community-aware

More information

Extending Functional Dependency to Detect Abnormal Data in RDF Graphs

Extending Functional Dependency to Detect Abnormal Data in RDF Graphs Extending Functional Dependency to Detect Abnormal Data in RDF Graphs Yang Yu, Jeff Heflin SWAT Lab Department of Computer Science and Engineering Lehigh University PA, USA Outline Semantic Web data and

More information

Impact of Search Engines on Page Popularity

Impact of Search Engines on Page Popularity Introduction October 10, 2007 Outline Introduction Introduction 1 Introduction Introduction 2 Number of incoming links 3 Random-surfer model Case study 4 Search-dominant model 5 Summary and conclusion

More information

Intelligent ranking for photo galleries using sharing intent

Intelligent ranking for photo galleries using sharing intent Technical Disclosure Commons Defensive Publications Series June 20, 2018 Intelligent ranking for photo galleries using sharing intent John Oberbeck Follow this and additional works at: https://www.tdcommons.org/dpubs_series

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

A distributed algorithm for minimum weight spanning trees

A distributed algorithm for minimum weight spanning trees A distributed algorithm for minimum weight spanning trees R. G. Gallager, P. A. Humblet and P. M. Spira Prepared by: Guy Flysher and Amir Rubinshtein Preface In this document we will review Gallager,

More information

Performance Evaluation

Performance Evaluation Chapter 4 Performance Evaluation For testing and comparing the effectiveness of retrieval and classification methods, ways of evaluating the performance are required. This chapter discusses several of

More information

arxiv: v3 [cs.db] 1 Dec 2017

arxiv: v3 [cs.db] 1 Dec 2017 Efficient Error-tolerant Search on Knowledge Graphs Zhaoyang Shao University of Alberta zhaoyang@ualberta.ca Davood Rafiei University of Alberta drafiei@ualberta.ca Themis Palpanas Paris Descartes University

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

Alternate Routing Diagram

Alternate Routing Diagram 68 0 Computer Networks Chapter Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone switches

More information

Graph and Link Mining

Graph and Link Mining Graph and Link Mining Graphs - Basics A graph is a powerful abstraction for modeling entities and their pairwise relationships. G = (V,E) Set of nodes V = v,, v 5 Set of edges E = { v, v 2, v 4, v 5 }

More information

SemSearch: Refining Semantic Search

SemSearch: Refining Semantic Search SemSearch: Refining Semantic Search Victoria Uren, Yuangui Lei, and Enrico Motta Knowledge Media Institute, The Open University, Milton Keynes, MK7 6AA, UK {y.lei,e.motta,v.s.uren}@ open.ac.uk Abstract.

More information

Query Refinement and Search Result Presentation

Query Refinement and Search Result Presentation Query Refinement and Search Result Presentation (Short) Queries & Information Needs A query can be a poor representation of the information need Short queries are often used in search engines due to the

More information

Search Engine Optimization

Search Engine Optimization Search Engine Optimization A necessary campaign for heightened corporate awareness What is SEO? Definition: The practice of building or transforming a Web site so that its content is seen as highly readable,

More information

Web Document Clustering using Semantic Link Analysis

Web Document Clustering using Semantic Link Analysis Web Document Clustering using Semantic Link Analysis SOMJIT ARCH-INT, Ph.D. Semantic Information Technology Innovation (SITI) LAB Department of Computer Science, Faculty of Science, Khon Kaen University,

More information

Searching the Deep Web

Searching the Deep Web Searching the Deep Web 1 What is Deep Web? Information accessed only through HTML form pages database queries results embedded in HTML pages Also can included other information on Web can t directly index

More information

Variogram Inversion and Uncertainty Using Dynamic Data. Simultaneouos Inversion with Variogram Updating

Variogram Inversion and Uncertainty Using Dynamic Data. Simultaneouos Inversion with Variogram Updating Variogram Inversion and Uncertainty Using Dynamic Data Z. A. Reza (zreza@ualberta.ca) and C. V. Deutsch (cdeutsch@civil.ualberta.ca) Department of Civil & Environmental Engineering, University of Alberta

More information

Semantic Web. Ontology Engineering and Evaluation. Morteza Amini. Sharif University of Technology Fall 93-94

Semantic Web. Ontology Engineering and Evaluation. Morteza Amini. Sharif University of Technology Fall 93-94 ه عا ی Semantic Web Ontology Engineering and Evaluation Morteza Amini Sharif University of Technology Fall 93-94 Outline Ontology Engineering Class and Class Hierarchy Ontology Evaluation 2 Outline Ontology

More information

Network Working Group Request for Comments: 2751 Category: Standards Track January 2000

Network Working Group Request for Comments: 2751 Category: Standards Track January 2000 Network Working Group S. Herzog Request for Comments: 2751 IPHighway Category: Standards Track January 2000 Status of this Memo Signaled Preemption Priority Policy Element This document specifies an Internet

More information

Big Data Analytics CSCI 4030

Big Data Analytics CSCI 4030 High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Web advertising

More information

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material

More information

Enhanced Trustworthy and High-Quality Information Retrieval System for Web Search Engines

Enhanced Trustworthy and High-Quality Information Retrieval System for Web Search Engines 38 Enhanced Trustworthy and High-Quality Information Retrieval System for Web Search Engines Sumalatha Ramachandran, Sujaya Paulraj, Sharon Joseph and Vetriselvi Ramaraj Department of Information Technology,

More information

Key Concepts: Economic Computation, Part II

Key Concepts: Economic Computation, Part II Key Concepts: Economic Computation, Part II Brent Hickman Fall, 2009 The purpose of the second section of these notes is to give you some further practice with numerical computation in MATLAB, and also

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 5 Naming

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 5 Naming DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 5 Naming Naming Naming and name resolution mechanisms Names, Identifiers, and Addresses Flat Naming

More information

second_language research_teaching sla vivian_cook language_department idl

second_language research_teaching sla vivian_cook language_department idl Using Implicit Relevance Feedback in a Web Search Assistant Maria Fasli and Udo Kruschwitz Department of Computer Science, University of Essex, Wivenhoe Park, Colchester, CO4 3SQ, United Kingdom fmfasli

More information

Learning Ontology-Based User Profiles: A Semantic Approach to Personalized Web Search

Learning Ontology-Based User Profiles: A Semantic Approach to Personalized Web Search 1 / 33 Learning Ontology-Based User Profiles: A Semantic Approach to Personalized Web Search Bernd Wittefeld Supervisor Markus Löckelt 20. July 2012 2 / 33 Teaser - Google Web History http://www.google.com/history

More information

ONTOPARK: ONTOLOGY BASED PAGE RANKING FRAMEWORK USING RESOURCE DESCRIPTION FRAMEWORK

ONTOPARK: ONTOLOGY BASED PAGE RANKING FRAMEWORK USING RESOURCE DESCRIPTION FRAMEWORK Journal of Computer Science 10 (9): 1776-1781, 2014 ISSN: 1549-3636 2014 doi:10.3844/jcssp.2014.1776.1781 Published Online 10 (9) 2014 (http://www.thescipub.com/jcs.toc) ONTOPARK: ONTOLOGY BASED PAGE RANKING

More information

Reducing the Number of Test Cases for Performance Evaluation of Components

Reducing the Number of Test Cases for Performance Evaluation of Components Reducing the Number of Test Cases for Performance Evaluation of Components João W. Cangussu Kendra Cooper Eric Wong Department of Computer Science University of Texas at Dallas Richardson-TX 75-, USA cangussu,kcooper,ewong

More information

SimRank : A Measure of Structural-Context Similarity

SimRank : A Measure of Structural-Context Similarity SimRank : A Measure of Structural-Context Similarity Glen Jeh and Jennifer Widom 1.Co-Founder at FriendDash 2.Stanford, compter Science, department chair SIGKDD 2002, Citation : 506 (Google Scholar) 1

More information

Statistical Matching using Fractional Imputation

Statistical Matching using Fractional Imputation Statistical Matching using Fractional Imputation Jae-Kwang Kim 1 Iowa State University 1 Joint work with Emily Berg and Taesung Park 1 Introduction 2 Classical Approaches 3 Proposed method 4 Application:

More information

Software Testing and Maintenance 1

Software Testing and Maintenance 1 Combinatorial Testing!! Introduction!! Combinatorial Coverage Criteria!! Pairwise Test Generation!! Summary Software Testing and Maintenance 1 Motivation!! The behavior of a software application may be

More information

INNOCEPT CONSULT Toolkits for user innovation WHITE PAPER

INNOCEPT CONSULT Toolkits for user innovation WHITE PAPER INNOCEPT CONSULT WHITE PAPER 02 2 Innocept Consult Phone: +45 60 66 66 60 E-mail: info@innocept.dk Website: www.innocept.dk Address: Innocept Consult Trekanten 14 E 4200 Slagelse CVR nr.: 21058394 3 This

More information

Multi Layer Perceptron trained by Quasi Newton learning rule

Multi Layer Perceptron trained by Quasi Newton learning rule Multi Layer Perceptron trained by Quasi Newton learning rule Feed-forward neural networks provide a general framework for representing nonlinear functional mappings between a set of input variables and

More information

Unsplittable Flows. Hoon Cho and Alex Wein Final Project

Unsplittable Flows. Hoon Cho and Alex Wein Final Project Unsplittable Flows Hoon Cho (hhcho@mit.edu) and Alex Wein (awein@mit.edu) 6.854 Final Project Abstract An unsplittable flow in a multicommodity network is a flow that routes each commoidty on a single

More information

A NOTE ON ESWARAN AND TARJAN'S ALGORITHM FOR THE STRONG CONNECTIVITY AUGMENTATION PROBLEM

A NOTE ON ESWARAN AND TARJAN'S ALGORITHM FOR THE STRONG CONNECTIVITY AUGMENTATION PROBLEM A NOTE ON ESWARAN AND TARJAN'S ALGORITHM FOR THE STRONG CONNECTIVITY AUGMENTATION PROBLEM S. Raghavan The Robert H. Smith School of Business University of Maryland, College Park Abstract In a seminal paper

More information

Collaborative Filtering using Euclidean Distance in Recommendation Engine

Collaborative Filtering using Euclidean Distance in Recommendation Engine Indian Journal of Science and Technology, Vol 9(37), DOI: 10.17485/ijst/2016/v9i37/102074, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Collaborative Filtering using Euclidean Distance

More information

7. Collinearity and Model Selection

7. Collinearity and Model Selection Sociology 740 John Fox Lecture Notes 7. Collinearity and Model Selection Copyright 2014 by John Fox Collinearity and Model Selection 1 1. Introduction I When there is a perfect linear relationship among

More information

A STUDY OF RANKING ALGORITHM USED BY VARIOUS SEARCH ENGINE

A STUDY OF RANKING ALGORITHM USED BY VARIOUS SEARCH ENGINE A STUDY OF RANKING ALGORITHM USED BY VARIOUS SEARCH ENGINE Bohar Singh 1, Gursewak Singh 2 1, 2 Computer Science and Application, Govt College Sri Muktsar sahib Abstract The World Wide Web is a popular

More information

Lecture 26: Missing data

Lecture 26: Missing data Lecture 26: Missing data Reading: ESL 9.6 STATS 202: Data mining and analysis December 1, 2017 1 / 10 Missing data is everywhere Survey data: nonresponse. 2 / 10 Missing data is everywhere Survey data:

More information

Mining Web Data. Lijun Zhang

Mining Web Data. Lijun Zhang Mining Web Data Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Web Crawling and Resource Discovery Search Engine Indexing and Query Processing Ranking Algorithms Recommender Systems

More information

On Application of Structural Decomposition for Process Model Abstraction. Artem Polyvyanyy Sergey Smirnov Mathias Weske

On Application of Structural Decomposition for Process Model Abstraction. Artem Polyvyanyy Sergey Smirnov Mathias Weske On Application of Structural Decomposition for Process Model Abstraction Artem Polyvyanyy Sergey Smirnov Mathias Weske BPSC 2009 24 March 2009 Motivation 2 Research project with AOK Brandenburg Goal: detailed

More information

Searching the Deep Web

Searching the Deep Web Searching the Deep Web 1 What is Deep Web? Information accessed only through HTML form pages database queries results embedded in HTML pages Also can included other information on Web can t directly index

More information

Design and Construction of Relational Database for Structural Modeling Verification and Validation. Weiju Ren, Ph. D.

Design and Construction of Relational Database for Structural Modeling Verification and Validation. Weiju Ren, Ph. D. Design and Construction of Relational Database for Structural Modeling Verification and Validation Weiju Ren, Ph. D. Oak Ridge National Laboratory renw@ornl.gov ASME Verification and Validation Symposium

More information

Analysis and Modeling

Analysis and Modeling Guillaume Guérard A Complex System Approach for SMART GRID Analysis and Modeling KES 12 September 2012 1 Problematic Thesis: Optimization in complex networks. Problem: Optimization of the energy distribution

More information

CSE 190 Lecture 16. Data Mining and Predictive Analytics. Small-world phenomena

CSE 190 Lecture 16. Data Mining and Predictive Analytics. Small-world phenomena CSE 190 Lecture 16 Data Mining and Predictive Analytics Small-world phenomena Another famous study Stanley Milgram wanted to test the (already popular) hypothesis that people in social networks are separated

More information

Extracting Latent User Preferences Using Sticky Sliders

Extracting Latent User Preferences Using Sticky Sliders Extracting Latent User Preferences Using Sticky Sliders Garrett Eastham {Stanford University} Machine learning plays a critical role in user modeling applications where dynamic systems are trained against

More information

vector space retrieval many slides courtesy James Amherst

vector space retrieval many slides courtesy James Amherst vector space retrieval many slides courtesy James Allan@umass Amherst 1 what is a retrieval model? Model is an idealization or abstraction of an actual process Mathematical models are used to study the

More information

Efficient Re-construction of Document Versions Based on Adaptive Forward and Backward Change Deltas

Efficient Re-construction of Document Versions Based on Adaptive Forward and Backward Change Deltas Efficient Re-construction of Document Versions Based on Adaptive Forward and Backward Change Deltas Raymond K. Wong Nicole Lam School of Computer Science & Engineering, University of New South Wales, Sydney

More information

OIM 413 Logistics and Transportation Lecture 2: Representation of a Transportation Network

OIM 413 Logistics and Transportation Lecture 2: Representation of a Transportation Network OIM 413 Logistics and Transportation Lecture 2: Representation of a Transportation Network Professor Anna Nagurney John F. Smith Memorial Professor and Director Virtual Center for Supernetworks Department

More information

In = number of words appearing exactly n times N = number of words in the collection of words A = a constant. For example, if N=100 and the most

In = number of words appearing exactly n times N = number of words in the collection of words A = a constant. For example, if N=100 and the most In = number of words appearing exactly n times N = number of words in the collection of words A = a constant. For example, if N=100 and the most common word appears 10 times then A = rn*n/n = 1*10/100

More information

An Improved Measurement Placement Algorithm for Network Observability

An Improved Measurement Placement Algorithm for Network Observability IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 16, NO. 4, NOVEMBER 2001 819 An Improved Measurement Placement Algorithm for Network Observability Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper

More information

A NOTE ON ESWARAN AND TARJAN S ALGORITHM FOR THE STRONG CONNECTIVITY AUGMENTATION PROBLEM

A NOTE ON ESWARAN AND TARJAN S ALGORITHM FOR THE STRONG CONNECTIVITY AUGMENTATION PROBLEM A NOTE ON ESWARAN AND TARJAN S ALGORITHM FOR THE STRONG CONNECTIVITY AUGMENTATION PROBLEM S. Raghavan The Robert H. Smith School of Business University of Maryland, College Park Abstract In a seminal paper

More information

1 Homophily and assortative mixing

1 Homophily and assortative mixing 1 Homophily and assortative mixing Networks, and particularly social networks, often exhibit a property called homophily or assortative mixing, which simply means that the attributes of vertices correlate

More information

Dimensionality Reduction, including by Feature Selection.

Dimensionality Reduction, including by Feature Selection. Dimensionality Reduction, including by Feature Selection www.cs.wisc.edu/~dpage/cs760 Goals for the lecture you should understand the following concepts filtering-based feature selection information gain

More information

Properties. Comparing and Ordering Rational Numbers Using a Number Line

Properties. Comparing and Ordering Rational Numbers Using a Number Line Chapter 5 Summary Key Terms natural numbers (counting numbers) (5.1) whole numbers (5.1) integers (5.1) closed (5.1) rational numbers (5.1) irrational number (5.2) terminating decimal (5.2) repeating decimal

More information

DEGENERACY AND THE FUNDAMENTAL THEOREM

DEGENERACY AND THE FUNDAMENTAL THEOREM DEGENERACY AND THE FUNDAMENTAL THEOREM The Standard Simplex Method in Matrix Notation: we start with the standard form of the linear program in matrix notation: (SLP) m n we assume (SLP) is feasible, and

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online RESEARCH ARTICLE ISSN: 2321-7758 AN SCALABLE ONTOLOGY MEASUREMENT APPROACH FOR SEMANTIC ONTOLOGIES USING DISTANCE METRIC G.PRADEEP 1, V.ABARNA 2, R.BHUVANA 3, R.SHARMILA 4, P.VALLABBI 5, 1 Professor -

More information

Year Hourly $1.15 $1.30 $1.60 $2.20 $2.90 $3.10 $3.35

Year Hourly $1.15 $1.30 $1.60 $2.20 $2.90 $3.10 $3.35 Math 48C Mathematical Models A model is a representation of an object or a process. For example, in my middle school science class, I created a model of the solar system by using different-sized Styrofoam

More information

Geometry Optimization Made Simple with Translation and Rotation Coordinates

Geometry Optimization Made Simple with Translation and Rotation Coordinates Geometry Optimization Made Simple with Translation and Rotation Coordinates Lee-Ping Wang 1 and Chenchen Song 2, 3 1) Department of Chemistry, University of California; 1 Shields Ave; Davis, CA 95616.

More information

Combining RDF Vocabularies for Expert Finding

Combining RDF Vocabularies for Expert Finding Combining RDF Vocabularies for Expert Finding presented by Axel Polleres DERI, National University of Ireland, Galway Joint work with the ExpertFinder Initiative, particularly co-authors: Boanerges Aleman-Meza,

More information

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017 THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS Summer semester, 2016/2017 SOCIAL NETWORK ANALYSIS: THEORY AND APPLICATIONS 1. A FEW THINGS ABOUT NETWORKS NETWORKS IN THE REAL WORLD There are four categories

More information

Linked Data: Standard s convergence

Linked Data: Standard s convergence Linked Data: Standard s convergence Enhancing the convergence between reporting standards Maria Mora Technical Manager maria.mora@cdp.net 1 Lets talk about a problem Lack of a perfect convergence between

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

Graph Databases. Graph Databases. May 2015 Alberto Abelló & Oscar Romero

Graph Databases. Graph Databases. May 2015 Alberto Abelló & Oscar Romero Graph Databases 1 Knowledge Objectives 1. Describe what a graph database is 2. Explain the basics of the graph data model 3. Enumerate the best use cases for graph databases 4. Name two pros and cons of

More information

Reading Time: A Method for Improving the Ranking Scores of Web Pages

Reading Time: A Method for Improving the Ranking Scores of Web Pages Reading Time: A Method for Improving the Ranking Scores of Web Pages Shweta Agarwal Asst. Prof., CS&IT Deptt. MIT, Moradabad, U.P. India Bharat Bhushan Agarwal Asst. Prof., CS&IT Deptt. IFTM, Moradabad,

More information

Combining Information Retrieval and Relevance Feedback for Concept Location

Combining Information Retrieval and Relevance Feedback for Concept Location Combining Information Retrieval and Relevance Feedback for Concept Location Sonia Haiduc - WSU CS Graduate Seminar - Jan 19, 2010 1 Software changes Software maintenance: 50-90% of the global costs of

More information

Consensus Answers for Queries over Probabilistic Databases. Jian Li and Amol Deshpande University of Maryland, College Park, USA

Consensus Answers for Queries over Probabilistic Databases. Jian Li and Amol Deshpande University of Maryland, College Park, USA Consensus Answers for Queries over Probabilistic Databases Jian Li and Amol Deshpande University of Maryland, College Park, USA Probabilistic Databases Motivation: Increasing amounts of uncertain data

More information

Equations and Problem Solving with Fractions. Variable. Expression. Equation. A variable is a letter used to represent a number.

Equations and Problem Solving with Fractions. Variable. Expression. Equation. A variable is a letter used to represent a number. MAT 040: Basic Math Equations and Problem Solving with Fractions Variable A variable is a letter used to represent a number. Expression An algebraic expression is a combination of variables and/or numbers

More information

Multivariate Normal Random Numbers

Multivariate Normal Random Numbers Multivariate Normal Random Numbers Revised: 10/11/2017 Summary... 1 Data Input... 3 Analysis Options... 4 Analysis Summary... 5 Matrix Plot... 6 Save Results... 8 Calculations... 9 Summary This procedure

More information

Approximation slides 1. An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs

Approximation slides 1. An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs Approximation slides 1 An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs Approximation slides 2 Linear independence A collection of row vectors {v T i } are independent

More information

Sorting and Selection

Sorting and Selection Sorting and Selection Introduction Divide and Conquer Merge-Sort Quick-Sort Radix-Sort Bucket-Sort 10-1 Introduction Assuming we have a sequence S storing a list of keyelement entries. The key of the element

More information

Data and Computer Communications. Chapter 12 Routing in Switched Networks

Data and Computer Communications. Chapter 12 Routing in Switched Networks Data and Computer Communications Chapter 1 Routing in Switched Networks Routing in Packet Switched Network Select route between end nodes Characteristics required: Correctness Simplicity Robustness Stability

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 0000; 00: 6 Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding Pouya Ostovari, Abdallah Khreishah,

More information

DATA MINING INTRODUCTION TO CLASSIFICATION USING LINEAR CLASSIFIERS

DATA MINING INTRODUCTION TO CLASSIFICATION USING LINEAR CLASSIFIERS DATA MINING INTRODUCTION TO CLASSIFICATION USING LINEAR CLASSIFIERS 1 Classification: Definition Given a collection of records (training set ) Each record contains a set of attributes and a class attribute

More information

Delay Injection for. Service Dependency Detection

Delay Injection for. Service Dependency Detection Delay Injection for Service Dependency Detection Richard A. Kemmerer Computer Security Group Department of Computer Science University of California, Santa Barbara http://seclab.cs.ucsb.edu ARO/MURI Meeting

More information