Coloring RDF Triples to Capture Provenance
|
|
- Eleanore Briggs
- 5 years ago
- Views:
Transcription
1 Coloring RDF Triples to Capture Provenance G. Flouris 1, I. Funulaki 1, P. Peiaitis 1,2, Y. Theoharis 1,2, an V. Christophies 1,2 1 Institute of Computer Science, FORTH, Greece an 2 Computer Science Department, University of Crete, Greece {fgeo, funul, ppe, theohari, christop}@ics.forth.gr bstract. Recently, the W3C Linking Open Data effort has booste the publication an inter-linkage of large amounts of RDF atasets on the Semantic Web. Various ontologies an knowlege bases with millions of RDF triples from Wikipeia an other sources, mostly in e-science, have been create an are publicly available. Recoring provenance information of RDF triples aggregate from ifferent heterogeneous sources is crucial in orer to effectively support trust mechanisms, igital rights an privacy policies. Managing provenance becomes even more important when we consier not only explicitly state but also implicit triples (through RDFS inference rules) in conjunction with eclarative languages for querying an upating RDF graphs. In this paper we rely on colore RDF triples represente as quaruples to capture an manipulate explicit provenance information. 1 Introuction Recently, the W3C Linking Open Data [29] effort has booste the publication an interlinkage of large amounts of RDF atasets on the Semantic Web [1]. Various ontologies an knowlege bases with millions of RDF triples from Wikipeia [26] an other sources have been create an are available online [25]. In aition, numerous ata sources in e-science are publishe nowaays as RDF graphs, most notably in the area of life sciences [27], to facilitate community annotation an interlinkage of both scientific an scholarly ata of interest. Finally, Web 2.0 platforms are consiering RDF an RDFS as non-proprietary exchange formats for the construction of information mashups [16, 28]. In this context, it is of paramount importance to be able to store the provenance of a piece of ata in orer to effectively support trust mechanisms, igital rights an privacy policies. Provenance means origin or source an refers to from where an how the piece of ata was obtaine [33]. In the context of scientific communities, provenance information can be use in the proof of the correctness of results an in general etermines their quality. In some cases, provenance of ata is consiere more important than the result itself. The popularity of the RDF ata moel [8] an RDF Schema language (RDFS) [2] is ue to the flexible an extensible representation of information, inepenently of the existence or absence of a schema, uner the form of triples. n RDF triple, (subject,- property,object), asserts the fact that subject is associate with object through property. RDFS is use to a semantics to RDF triples, by imposing inference rules [15] 193
2 2 G. Flouris, I. Funulaki, P. Peiaitis, Y. Theoharis, an V. Christophies (mainly relate to the transitivity of subsumption relationships) which can be use to entail new implicit triples (i.e., facts) that are not explicitly asserte. Currently, there is no aequate support for managing (i.e., querying an upating) provenance information of implicit RDF triples. There are two ifferent ways in which such implicit knowlege can be viewe an this affects the semantics of upate operations only. Uner the coherence semantics [10], implicit knowlege oes not epen on the explicit one but has a value on its own; therefore, there is no nee for explicit support of some triple. Uner this viewpoint, implicit triples are first-class citizens, i.e., consiere of equal value as explicit ones. On the other han, uner the founational semantics [10] each implicit triple epens on the existence of the explicit triple(s) that imply it: implicit knowlege is only vali as long as the supporting explicit knowlege exists. It shoul be emphasize that the selecte viewpoint is irrelevant as far as stanar implication an querying is consiere, but it affects the way upates shoul be performe; in particular, the coherence semantics correspons to belief set changes, whereas founational semantics correspons to belief base changes, in the belief revision terminology [10]. In this paper we propose the use of colors (as in [4]) in orer to capture the provenance of RDF ata an schema triples. Intuitively, the color of an implicit an explicit triple represents the source from which the triple was obtaine. We recor the color of an RDF triple as a fourth column, hence obtaining an RDF quaruple as in [7, 17]. s p o c a 1 p b 1 b 1 q 1 b 1 t 1 1 r b 2 2 r b 1 c 3 c 3 s p o a 1 p b 1 b 1 q 1 b 1 t 1 1 r b 2 2 r b 1 To provie the intuition of the granularity levels of provenance for RDF Fig. 1. Granularity Levels of Provenance atasets that we capture with this work, we compare it with the representation of provenance information in the relational context. For instance, authors in [4] use colors to capture the provenance of relational tables, tuples an attributes. If we consier that a relational tuple of the form [a 1 :v 1,..., a k :v k ] with tuple ientifier ti correspons to a set of triples (ti, a j, v j ), j = 1,... k, then (see Fig. 1): a color assigne to (a) a single triple captures provenance at the level of an attribute of the relational tuple; (b) a collection of triples sharing the same subject captures provenance at the level of the relational tuple an finally (c) a set of triples whose subjects are instances of the same schema class, captures provenance of the relational table. The quaruples use to represent colore RDF/S triples leverage the syntax of RDF Name Graphs [5]: an RDF name graph can be moele by arbitrary sets of triples sharing the same color. The main contributions of this work are: We rely on the notion of colors to capture provenance information of explicit an implicit RDF triples. In particular, we employ a semigroup structure, efine by a set of colors to recor an a binary operation + to reason over the provenance of RDF triples. (a) (b) (c) 194
3 Coloring RDF Triples to Capture Provenance 3 We exten the RDFS inference rules [15] for computing the composite provenance of implicit RDF triples. In this respect, we evise an algorithm for etermining on the fly the provenance of non-materialize implicit RDF triples. We stuy the semantics of provenance propagation an querying for the subclass, subproperty an type RDF hierarchies when colore RDF triples are represente as quaruples. In aition, we iscuss atomic upate operations (i.e., inserts an eletes) of RDF quaruples; upates are consiere uner the coherence semantics which allow us to preserve more knowlege uring upate operations [10]. The paper is structure as follows: in Section 2 we present the motivating example that we will use throughout this paper. Section 3 presents the basic RDF an RDFS notions. In Section 4 we introuce the notions of color an quaruple an iscuss inference rules for sets of RDF quaruples. Section 5 iscusses simple queries an atomic upates. We present relate work in Section 6 an conclue in Section 7. 2 Motivating Example We will use, for illustration purposes, an example taken from the News application omain. The RDFS schema of our News example captures information relate to newspapers an politicians as well as the relationships between them an is contribute by ifferent information sources. s p o c q 1 &NYT enorses &. Obama q 2 &NYT rf:type Newspaper c 4 q 3 Newspaper rf:type rfs:class c 3 q 4 Newspaper rfs:subclassof Mass Meia c 3 q 5 Mass Meia rfs:subclassof Meia c 5 q 6 Caniate rf:type rfs:class c 5 q 7 &. Obama rf:type Caniate c 5 q 8 enorses rf:type rf:property q 9 enorses rfs:omain Newspaper q 10 enorses rfs:range Caniate q 11 Caniate rfs:subclassof Person q 12 supports rf:type rf:property q 13 supports rfs:omain MassMeia q 14 supports rfs:range Person q 15 enorses rfs:subpropertyof supports q 16 &NYT enorses &. Obama q 17 Meia rf:type rfs:class c 5 Fig. 2. Relation Q(s, p, o, c) Relation Q(s,p,o,c) that stores both schema an ata triples is shown in Fig. 2. For Q(s, p, o, c), the s, p an o columns stan for the subject, preicate an object of an RDF triple. Column c is use to store the provenance (color) of a triple (s, p, o), which correspons to the source from which this triple originates from an is represente by a URI (the URI of the source). We say that a triple (s, p, o) is colore c iff (s, p, o, c) is in Q(s, p, o, c). The set of triples (s, p, o) can be obtaine by projecting on columns s, p an o of Q(s, p, o, c). In Q(s, p, o, c), a triple (s, p, o) can be assigne ifferent colors (e.g., quaruples q 1 an q 16 ); this way, we can capture ata integration scenarios in which the same piece of information originates from ifferent sources. Since RDF/S graphs can be seen as a kin of noe an ege labele irecte graphs, we use the following graphical notation: classes an properties (binary relations between classes) of an RDFS vocabulary, are represente with boxes, an ovals respectively. Instances of classes contain their URI reference an to istinguish between in- 195
4 4 G. Flouris, I. Funulaki, P. Peiaitis, Y. Theoharis, an V. Christophies iviual resources an classes, we prefix the URI of the former with the & symbol. RDFS built-in properties rfs:subclassof, rf:type an rfs:subpropertyof are represente by ashe, otte an otte-ashe arrows respectively. Fig. 3 shows the graph obtaine from the quaruples in Q(s, p, o, c) of Fig. 2. For (s, p, o, c), we color the ege with c an we raw s p c o (except if p is one of the built-in RDF/S properties where we raw s c o). Meia c 5 Mass Meia rfs:class c rf:property 5 c 5 c 3 c c5 1 supports Person rf:type rfs:subclassof rfs:subpropertyof c 3 c 1 Newspaper enorses Caniate rfs:omain rfs:range c 4 &NYT enorses enorses c 5 &. Obama Fig. 3. Graph representation of Q(s, p, o, c) great part of the information capture by a set of RDF triples can be inferre [15] by the transitivity of class an property subsumption relationships (rfs:subclassof an rfs:subpropertyof respectively) state in the associate schemas. For instance, although not explicitly asserte in Q(s, p, o, c), we can infer that Newspaper is a subclass of Meia because (i) Newspaper is a subclass of Mass Meia (quaruple q 4 ) an (ii) Mass Meia is a subclass of Meia (quaruple q 5 ). The question raise here is the following: what is the color of the implicit RDF triple? : the triple cannot be colore either c 3 or c 5 (colors of quaruples q 4 an q 5 respectively). In terms of provenance, we view the origin of this triple as composite: this triple shoul be colore c 3 an c 5. possible way to represent this fact is to a quaruples (Newspaper, rfs:subclassof, Meia, c 3 ) an (Newspaper, rfs:subclassof, - Meia, c 5 ) in Q(s, p, o, c). ut, in this case, the query return the triples colore c 3 woul falsely return (Newspaper, rfs:subclassof, Meia). Hence, composite origin cannot be capture by associating with the implicit triple separately the colors of its implying triples. Instea, we capture the provenance of implicit triples using colors efine by applying the special operation + on the colors of its implying triples. For instance, we color triple (Newspaper, rfs:subclassof, Meia) with the color c (3,5) = c 3 + c 5. Color c (3,5) can be seen as a new, composite source of information: it is a new URI an is assigne to the triples which are implie by triples colore c 3 an c 5 (as in the above example). Note that in this paper, we only consier where provenance [33], i.e., we recor the sources that contribute in generating a particular triple, not the processes 196
5 Coloring RDF Triples to Capture Provenance 5 (e.g., the particular inference rules) that le to its generation (how provenance) [33]. In Section 4 we iscuss the properties of operation + in more etail. s with annotate atabases [11, 12], we aim at supporting both provenance propagation an provenance querying over the subclass, subproperty an type RDF hierarchies. In the case of provenance propagation, queries are targete to the original ata an provenance is propagate to the query results. The result of these queries are explicit an implicit colore RDF triples. For instance, one can ask the query return all instances of class Newspaper. The result of the query will be (&NYT, rf:type, - Newspaper, c 4 ). Query return all subclasses of Meia will return (Newspaper, rfs:subclassof, Meia, c (3,5) ) an (Mass Meia, rfs:subclassof, Meia, c 5 ). Note that (Newspaper, rfs:subclassof, Meia, c (3,5) ) is an implicit quaruple obtaine by applying the transitive rfs:subclassof subsumption relationship on quaruples (Mass Meia, rfs:subclassof, Meia, c 5 ) an (Newspaper, rfs:subclassof, Mass Meia,c 3 ) as previously iscusse. On the other han, in the case of provenance querying, queries are explicitly targete at provenance information. Examples falling in this category are queries asking for the color of a given triple, or queries that filter triples given a color. For instance, the query return the color of (Newspaper, rfs:subclassof, Meia), will return c (3,5). In this work, we support atomic upates; more specifically, one can either (a) insert a quaruple, or (b) elete an explicit or implicit quaruple. s previously state, for our upate operations we ahere to the coherence semantics [10], accoring to which we must explicitly retain all the implicit triples that will no longer be implie after the eletion of an explicit triple; we must also ensure that the resulting set of quaruples is reunant-free. s an example, consier the eletion of (&. Obama, rf:type, Caniate, c 5 ). ccoring to the coherence semantics we must retain the implicit information (&. Obama, rf:type, Person, c (1,5) ) implie by quaruples (&. Obama, rf:type, Caniate, c 5 ) an (Caniate, rf:subclassof, Person, ). Ha we followe the founational semantics, the implicit triple (an all the information it carries) woul be lost, which woul correspon to an unnecessary loss of information. 3 Preliminaries In this work, we ignore non-universally ientifie resources, calle unname or blank noes [14]. In this respect, we consier two isjoint an infinite sets U, L, enoting the URIs an literals respectively. Definition 1 n RDF triple (subject, preicate, object) is any element of the set T = U U (U L). The RDF Schema (RDFS) language [2] provies a built-in vocabulary for asserting user-efine schemas in the RDF ata moel. For instance, RDFS names rfs:resource (res), rfs:class (class) an rf:property (prop) 3 coul be use as objects of triples escribing class an property types. Furthermore, one can assert instance of relationships 3 In parenthesis are the terms we use to refer to the RDFS built-in classes an properties. 197
6 6 G. Flouris, I. Funulaki, P. Peiaitis, Y. Theoharis, an V. Christophies of resources with the RDF preicate rf:type (type), whereas subsumption relationships among classes an properties are expresse with the RDFS rfs:subclassof (sc) an rfs:subpropertyof (sp) preicates respectively. In aition, RDFS rfs:omain (omain) an rfs:range (range) preicates allow one to specify the omain an range of the properties in an RDFS vocabulary. In the rest of this paper, we consier two isjoint an infinite sets of URIs of classes (C U) an property types (P U). 4 Provenance for RDF/S Data In the same spirit as in [4] for relational atabases, we assign a color to an RDF triple in orer to capture its provenance. Definition 1. Structure (I, + ) is a commutative semigroup where: I U is the set of colors, isjoint from the sets of class C an property types P. + is a binary operation with the following properties:,, c 3 I + = (Iempotence) + = + (Commutativity) + ( + c 3 ) = ( + ) + c 3 (ssociativity) inary operation + is efine to capture the provenance of implicit RDF triples (see Table 1) an returns a composite color which is also in I, i.e., if a triple t is implie by triple t 1 (whose color is ) an t 2 (whose color is ), then the color of t shoul be + an is enote by c (1,2). In fact, c (1,2) is a new URI in I whose exact form is an implementation etail that we on t aress in this paper. Note that, for n colors, there are O(2 n ) possible composite colors, so the storage of a composite color woul require O(n) bits in an efficient implementation. For an implicit RDF triple, its implying triples are those use to obtain it through the application of the inference rules that will be iscusse in Section 4.1. We say that color c k is a efining color of c (1,2,...,n) an write c k,2,...,n iff k {1, 2,..., n}, i.e., if c (1,2,...,n) can be obtaine by an operation of the form c (1,2,...,n) = c k + c for some color c. In other wors, if a triple t is colore c (1,2,...,n) an c k is a efining color of c (1,2,...,n), then t is an implicit triple which has been inferre using some triple colore c k. The intuition behin the properties of the + operation is the following: (a) an implicit RDF triple obtaine from triples of the same color inherits the color of its implying triples (iempotence) (b) the color of an implicit triple is uniquely etermine by the colors of the triples that imply it an not by the orer of application of the inference rules (commutativity an associativity). We shoul also note that + is a new color unless =. In this manner, we keep a clear separation of what is given (explicit) an what can be implie (implicit). Moreover, the choice of iempotence is ue to the semantics we give to colors as sources of information an the type of provenance we support: we nee to know which sources participate in the creation of a new triple irrespective of which triples contribute to its implication. On the other han, commutativity an associativity stem from the fact that the set of triples that are implie by a given triple set is the same irrespective of the orer in which the inference rules are applie. 198
7 Coloring RDF Triples to Capture Provenance 7 Definition 2 n RDF quaruple (subject, preicate, object, color) is any element of the set D = U U (U L) I. Using this efinition, we can efine the notion of an RDF ataset featuring triples associate with their provenance information as follows: Definition 3 n RDF Dataset is a finite set of quaruples in D ( D). Note that none of the existing approaches in the literature combine intentional an extensional assignment of triples to provenance information (colors). In [30] RDF Name Graphs, capturing the provenance of RDF triples, are efine intentionally through SPRQL [31] views an o not support the explicit assignment of triples to such graphs, whereas in [5] a purely extensional efinition is followe. The notion of colors as introuce in this paper allows us to capture both the intentional an extensional aspects of RDF graphs (i.e., sets of RDF triples) that are useful to recor an reason about provenance information in the presence of upates. 4.1 Inference Similarly to RDF graphs (i.e., sets of triples) we efine a consequence operator that abstracts a set of inference rules. These rules compute the closure of an RDF ataset, enote by Cn(), which is obtaine using the inference rules of Table 1. We say that a ataset entails a quaruple q, an write q, iff q Cn(). We say that a triple t = (s, p, o) is colore c iff (s, p, o, c) Cn(). The inference rules shown in Table 1 exten those specifie in [15] in a straightforwar manner to take into account colors. They compute the color of an implicit triple, using the colors of its implying triples. For instance, for our motivating example of Section 2, quaruple (Newspaper, rfs:subclassof, Meia, c (3,5) ) is obtaine by applying the Transitivity of sc I (2) rule on quaruples (Newspaper, rfs:subclassof, Mass Meia, c 3 ) an (Mass Meia, rfs:subclassof, Meia, c 5 ). 4.2 Reunancy Elimination In our work we consier that the RDF atasets are reunant free. n RDF ataset is reunant free if there oes not exist a quaruple that can be implie by others when applying inference rules I (1) I (6) of Table 1. The etection an removal of reunancies is straightforwar using these rules. In the sequel, we assume that queries an upates are performe upon reunant free RDF atasets. In effect, this means that reunancies are etecte (an remove) at upate time rather than at query time. This choice was mae because we believe that in real scale Semantic Web systems, query performance shoul prevail over upate performance. Reunant free RDF atasets were chosen because they offer a number of avantages in the case of transaction management for concurrent upates an queries. 199
8 8 G. Flouris, I. Funulaki, P. Peiaitis, Y. Theoharis, an V. Christophies Reflexivity of sc Transitivity of sc (C, type, class, ) (C 1, sc, C 2, ), (C 2, sc, C 3, ) I (1) : (C, sc, C, ) I (2) : (C 1, sc, C 3, c (1,2) ) Reflexivity of sp Transitivity of sp (P, type, prop, ) (P 1, sp, P 2, ), (P 2, sp, P 3, ) I (3) : (P, sp, P, ) I (4) : (P 1, sp, P 3, c (1,2) ) Transitivity of class instantiation Transitivity of property instantiation (x, type, C 1, ), (C 1, sc, C 2, ) (P 1, sp, P 2, ), (x 1, P 1, x 2, ) I (5) : (x, type, C 2, c (1,2) ) I (6) : (x 1, P 2, x 2, c (1,2) ) Table 1. subset of the RDFS Inference Rules for RDF Datasets 5 Querying an Upating RDF Datasets 5.1 Querying RDF Datasets In this section we iscuss a simple class of queries that allow one to express queries on the subclass, subproperty an type hierarchies of an RDF ataset. We consier V, C to be two sets of variables for resources an colors respectively; V, C, U (URIs) an L (literals) are mutually isjoint sets. We efine a simple form of a quaruple pattern, calle q-pattern which is an element from (U V) {type sc sp} (U V) (I C). In our context, a query is of the form (H,, C) where H (hea) is a q-pattern, (boy) is an expression efine after the anteceent of the inference rules presente in Section 4.1, an C (constraints) is a conjunction of atomic preicates. Each atomic preicate has the form: (1) v = const for v V; (2) v v for v, v C; (3) c = c k where c C an c i I. ccoring to the above efinition, one can express constraints on resources (1), on colors (2), as well as to specify that a color consiere in the query is efine by a set of other colors (3). In aition, we require that all variables that appear in the hea of the query (H) appear in the query s boy (). This restriction is impose in orer to have computationally esirable properties. We enote variables with?x,?y,... for resources an?,?,... for colors. To efine the query semantics, we use the notion of mapping (as in [21]) as follows: a mapping µ is a partial function µ : (V C) U. The omain of µ (om(µ)) is the subset of V C where µ is efine. For a variable?v, µ(?v) enotes the resource or color to which?v is mappe through µ. To efine the semantics of a q-pattern we must efine first the semantics of a property r over an RDF ataset, enote by [[r]]. Given an RDF ataset, [[r]] for properties type, sc, sp, omain, range an user efine property p is given in Table 2. We write S q to enote that ataset entails quaruple q when the inference rules in S are applie on. 200
9 [[type]] = {(x, y, c) {I (2) [[sc]] = {(x, y, c) {I (1) Coloring RDF Triples to Capture Provenance 9,I(5),I(2) } (x, type, y, c)} } (x, sc, y, c)} [[sp]] = {(x, y, c) (3) {I,I(4) [[omain]] = {(x, y, c) (x, omain, y, c)} } (x, sp, y, c)} [[range]] = {(x, y, c) (x, range, y, c)} [[p]] = {(x, y, c) (4) {I (x, p, y, c)},i(6) } Table 2. [[r]] for type, sc, sp, omain, range an user efine property p [[(a, exp,?y,?c)]] = {µ om(µ) = {?y,?c} an (a, µ(?y), µ(?c)) [[exp]] } [[(?x, exp, a,?c)]] = {µ om(µ) = {?x,?c} an (µ(?x), a, µ(?c)) [[exp]] } [[(?x, exp,?y, c)]] = {µ om(µ) = {?x,?y} an (µ(?x), µ(?y), c) [[exp]] } [[(a, exp, b,?c)]] = {µ om(µ) = {?c} an (a, b, µ(?c)) [[exp]] } [[(a, exp, b, c)]] = {µ om(µ) = an (a, b, c) [[exp]] } Table 3. Semantics of q-patterns We write r to enote the semantics of property r when no inference rule is use. We can now efine the semantics of a q-pattern. Consier an RDF ataset an q = (?X, exp,?y,?c) a q-pattern, where exp is one of sc, sp, type, omain an range. Then the evaluation of q over is efine as follows: [[q]] = {µ om(µ) = {?X,?Y,?c} an (µ(?x), µ(?y ), µ(?c)) [[exp]] } In Table 3 we give the semantics of some q-patterns when URIs an colors are consiere (where a, b U an c I). Finally, given a mapping µ we say that µ satisfies an atomic preicate C, enote by µ C, per the following conitions: µ (?x = const) iff µ(?x) = const, const U,?x om(µ) µ (?x =?y) iff µ(?x) = µ(?y),?x,?y om(µ) µ (?c =?c ) iff µ(?c) = µ(?c ),?c,?c om(µ) µ (?c?c ) iff µ(?c) µ(?c )?c,?c om(µ) µ (?c = c k ) iff µ(?c) = c k,?c om(µ) For a query Q = (H,, C) an RDF ataset an mapping µ, such that µ [[]], an µ C, µ(h) is the quaruple obtaine by replacing every variable?x in om(µ) with µ(?x). The color variable (if any) is replace by the color obtaine by applying the + operator as specifie by the inference rules I (1) to I (6) of Table 1. The answer to Q is the union of the quaruples µ(h) for each such mapping µ. 5.2 Upating RDF Datasets In this section we iscuss atomic upate operations (inserts an eletes). Recall that in our work we follow the coherence semantics [10] accoring to which we nee to retain implicit information that woul be lost uring a triple eletion. Moreover, we enforce that the resulting RDF atasets will remain vali with respect to the employe RDFS 201
10 10 G. Flouris, I. Funulaki, P. Peiaitis, Y. Theoharis, an V. Christophies schema. The notion of valiity has been escribe in various fragments of the RDFS language ([18, 32]), an is use to overrule certain triple combinations. In the context of RDF atasets, the valiity constraints are applie (an efine) at the level of the ataset, but the color-relate part of the quaruple is not consiere. The valiity constraints that we consier in this work concern the isjointness between class, property an color names an the acyclicity of rfs:subclassof an rfs:subpropertyof subsumption relationships. n aitional valiity constraint that we consier in our work is that the subject an object of the instance of some property shoul be correctly classifie uner the omain an range of the property respectively. For a full list of the relate valiity constraints, see [19]. The semantics of each atomic upate is specifie by its corresponing effects an sie-effects. The effect of an insert or elete operation consists of the straightforwar insertion/eletion of the requeste quaruples. The sie-effects ensure that the resulting RDF ataset continues to be vali an non-reunant as iscusse in [35]. Upate semantics ahere to the principle of minimal change [9], per which a minimal number of insertions an eletions shoul be performe in orer to restore a vali an nonreunant state of an RDF ataset. The effects an sie-effects of insertions an eletions are etermine by the kin of triple involve, i.e., whether it is a class instance or property instance insertion or eletion. Due to space restrictions we only escribe class instance insertions an eletions. INSERT Operation: primitive insert operation is of the form: insert(s, p, o, i) where s, p U, o U L, i I Data: insert(x, type, y, i), RDF ataset Result: Upate RDF ataset if ( (x, y, i) [[type]] ) then return ; if (y / C) then return ; forall ((x, z, i ) type s.t. (y, z, i ) [[sc]] an i = i + i ) o = \ {(x, type, z, i )}; en = {(x, type, y, i)}; return lgorithm 1. Class Instance Insertion lgorithm formal escription of the insertion of a quaruple (x, type, y, i) in an RDF ataset along with its sie-effects can be foun in lgorithm 1. t line 1 we examine if the quaruple alreay belongs to the semantics of property type. If not, then we ensure that y is a class (lines 2 3). If it is, then we remove all class instantiation quaruples from the RDF ataset which can be implie through the quaruple to be inserte an the class subsumption relationships (lines 4 6), to guarantee that the result is reunant free. Finally, the quaruple is inserte (line 7). n example of a class instance insertion is shown in Figures 4(a) an 4(b). 202
11 Coloring RDF Triples to Capture Provenance 11 Data: elete(x, type, y, i), RDF ataset Result: Upate RDF ataset 1 if ( (x, y, i) [[type]] ) then return ; 2 forall ((x, y, i ) [[type]],(y, y, i ) [[sc]] s.t. i = i + i ) o 3 forall (y, z, k) sc s.t. y! = z o 4 if (z, y, h) [[sc]] then = {(x, type, z, i + k)} 5 en 6 = \ {(x, type, y, i )} 7 en 8 forall (x, o, h) q, s.t. (q, c, i) omain o 9 if (x, c, j) [[type]] then 10 = \ {(x, q, o, h)} ; 11 forall q s.t. (q, q, h ) [[sp]] o 12 if (x, e, k) [[type]] s.t. (q, e, k ) omain then = {(x, q, o, h + h )} 13 en en 16 forall (o, x, h) q, s.t. (q, c, i) range o 17 if (x, c, j) [[type]] then 18 = \ {(o, q, x, h)} ; 19 forall q s.t. (q, q, h ) [[sp]] o 20 if (x, e, k) [[type]] s.t. (q, e, k ) range then = {(o, q, x, h + h )} 21 en en 24 return lgorithm 2. Class Instance Deletion lgorithm DELETE Operation primitive elete operation is of the form: elete(s, p, o, i) where s, p U, o U L, i I. formal escription of the eletion of a quaruple (x, type, y, i) is given in lgorithm 2. t line 1 we examine if (x, type, y, i) belongs to the semantics of property type. If this is the case, then we must (1) insert all the quaruples that are implie by the quaruple that we wish to elete (per the coherence semantics) an (2) elete the quaruples that if retaine woul imply the quaruple we wish to elete (lines 2 7). To ensure that the RDF ataset is still vali after the upates, we must remove all properties originating from (or reaching resp.) x whose omain (or range resp.) is a class that x is no longer an instance of (lines 8 23). Examples of class instance eletions can be foun in Figures 4(c) an 4(). 5.3 Complexity nalysis When working with colore RDF triples, one of the basic kins of queries that we nee to answer is what is the color of a triple. This is a provenance query an essentially 203
12 12 G. Flouris, I. Funulaki, P. Peiaitis, Y. Theoharis, an V. Christophies insert(&x, type,, ) insert(&x, type,, c1) c (1,2) &x (&x, type,, ) is inserte (&x, type,, c (1,2)) is elete since it coul be inferre by existing quaruples &x &x (&x, type,, ) is inserte (&x, type,, ) is reunant an elete &x (a) Class Instance Insertion (1) (b) Class Instance Insertion (2) C c 3 D elete(&x, type,, c (1,2)) c 3 C D elete(&x, type,, ) &x (&x, type, C, c (1,2)) is inserte (&x, type, D, c (1,2)) is not inserte since quaruple (&x, type,, c (1,2)) woul still be inferre (&x, type,, ) is elete because otherwise (&x, type,, c (1,2) woul still be inferre. c (1,2) &x &x (&x, type,, ) is elete (&x, type,, c (1,2)) is inserte because it was initially inferre &x c (1,2) (c) Class Instance Deletion (1) () Class Instance Deletion (2) Fig. 4. Examples of Class Instance Insertions ((a) (b)) an Deletions ((c) ()) boils own to fining, for a given triple (s, p, o) an RDF ataset, all quaruples of the form (s, p, o, c) in Cn(). Given that we work with reunant free RDF atasets (so implicit triples are not materialize), we present here an algorithm that computes the color of RDF triples without materializing Cn(), an iscuss its complexity. 4 c 9 1 c 3 c 4 c 4 2 c Consier an RDF ataset whose size is N. In orer to etermine the color of (s, p, o), without computing Cn(), we nee to fin all the possible ways in which a quaruple of the form (s, p, o, c) (for any c) can be inferre using quaruples from. Using the algorithm below, this can be mae in O(N log(n)) time. c 3 Certain quaruples are not involve in the inference rules in Table 1, so they cannot be implie c9 by others: these are all the quaruples that o not involve the RDFS type, sc an sp relationships. Determining the color of such a quaruple is trivial, as Fig. 5. sc Hierarchy we only nee to check (rather than Cn()), so it can be mae in O(log(N)) time by a simple search in (using an appropriate inex). 204
13 Coloring RDF Triples to Capture Provenance 13 To etermine the color of quaruples that involve the aforementione built-in RDFS properties, we view the sc an sp hierarchies as irecte acyclic graphs. Noes in the graph are classes (properties resp.), an there exists an ege between noes x an y iff x is a subclass (subproperty resp.) of y. The problem of obtaining the sequence of quaruples from which e.g., quaruple (, sc,, c) (for any c), can be implie is equivalent to iscovering the path(s) (i.e., sequences of eges) in the DG from noe to noe. For each of these sequences of eges, we keep the color of each involve quaruple. Recall that an ege may involve several quaruples (i.e., a triple can be colore with ifferent colors). The algorithm uses a epth-first search an terminates when is reache. t each step of the algorithm, we (i) fin the superclasses of the context noe (i.e., the noe that we are currently looking at) that are also subclasses of the target noe (e.g., ) an (ii) store the set of colors of the eges that we have alreay examine Data: Classes source an target, RDF Dataset, Set of colors S; Result: Set of colors S; if source=target then return S; res ; foreach class x, where x is a superclass of source an subclass of target o Let (source, sc, x, c) ; Let S x ; forall colors c i in S o S x S x {c i + c}; en res res Traverse Subsumption Graph(x,target,,S x); en return res lgorithm 3. Traverse Subsumption Graph In lgorithm 3 in orer to obtain all the classes that are superclasses of source an subclasses of target (line 4), we use the labeling scheme introuce in [6] that captures the subsumption relationships between classes an properties an allows us to etermine whether a class (or property) is a subclass (or subproperty) of another in constant time. This is achieve by simply comparing the labels of the classes/properties. The labeling scheme is solely use to prune irrelevant subclass an subproperty paths, thereby limiting our search space significantly, without taking into consieration colors of triples. s an example of application, consier the subclass hierarchy shown in Fig. 5. Suppose that we nee to iscover the color of triple (, sc, ). We start with class an in the first step we will keep classes 1, 2 an sets of colors S 1 = { }, S 2 = {c 3, c 9 } since the eges that etermine that is a subclass of 1, 2 are forme by triples colore { }, {c 3, c 9 } respectively. For each of the superclasses of (i.e., 1, 2 ), we perform exactly the same process an exten the sets of colors that we have obtaine us- 205
14 14 G. Flouris, I. Funulaki, P. Peiaitis, Y. Theoharis, an V. Christophies ing operation +. Upon return of the recursion, these colors are place into the set res to be returne. The output of the algorithm are the colors: c (3,4), c (9,4), c (2,4), c (2,9,3), where c (1,...,n) = c n. Given the fact that we prune subsumption paths that are not relevant in line 4 (using the labeling scheme), an that no cycles are allowe, the escribe process will, in the worst case, consier each quaruple in the RDF ataset once. Given that each access requires a search in, the cost of each access is O(log(N)) (using an aequate inexing system). Therefore, the total complexity is O(N log(n)). For the other triples that may appear as implicit ones, the algorithm is similar. In particular, if t is of the form (P, sp, Q), then the process is ientical to the above, except that properties an subproperty relationships are consiere instea of class an subclass relationships. If t is of the form (, type, ) then the process is almost ientical, except that, in the first step of the recursion, we search for all classes whose explicit instance is an are also (implicit or explicit) subclasses of ; the rest is the same. Finally, if t is of the form (x, P, y), then, again, the process is ientical, except that, in the first step of the recursion, we search for all explicit quaruples of the form (x, Q, y, c) such that Q is an explicit or implicit subproperty of P. The rest of the recursion steps are as in the above cases. 6 Relate Work So far, research on recoring provenance for RDF ata has focuse on either associating triples with an RDF name graph [5, 34] or by extening an RDF triple to a quaruple where the fourth element is a URI, a blank noe or an ientifier [7, 17]. These works vary in the semantics of the fourth element which is use to represent provenance, context an access control information. RDF Name graphs have been propose in [5, 34] to capture explicit provenance information by allowing users to refer to specific parts of RDF/S graphs in orer to ecie how creible is, or how evolves a piece of information. n RDF name graph is a set of triples to which a URI has been assigne an can be reference by other graphs as a normal resource; in this manner, one can assign explicit provenance information to this collection of triples. Currently, there is no aequate support on how to manage provenance of implicit an explicit triples in the presence of queries an upates. uthors in [5] o not iscuss RDFS inference, queries an upates in the presence of RDF name graphs. Unfortunately, existing eclarative languages for querying an upating RDF triples have been extene either with RDF name graphs (such as SPRQL [23] an SPRQL Upate [31]) or with RDFS inference support [22, 24], but not with both. In this paper, we attempt to fill this gap by proposing a framework base on the use of colors to capture provenance of RDF triples an reason about the provenance of implicit triples for simple queries an atomic upates. In a previous work [20], we have introuce the notion of RDF/S graphsets which buils upon an extens the notion of RDF name graphs. In that paper we showe that the mechanism of RDF name graphs cannot capture the provenance of implicit RDF triples, an propose RDF graphsets as a solution to this problem. In this paper, we use colors as an elegant an uniform way to capture the provenance of both explicit an implicit RDF triples. Colors are a generalization of 206
15 Coloring RDF Triples to Capture Provenance 15 RDF name graphs [5]: a set of triples colore with a single color can be consiere as belonging to the RDF name graph whose URI is the color (recall that colors are URIs). Colors obtaine by applying the + operation on other colors simulate graphsets [20]. The notion of colors as introuce in this paper allows us to capture both the intentional an extensional aspects of RDF graphs that are useful to recor an reason about provenance information in the presence of upates whereas none of the existing approaches [5, 30] combine intentional an extensional assignment of triples to provenance information. On the other sie of the spectrum, a significant amount of work on the issue has been one for relational an tree-structure atabases [3, 4, 13, 12]. Unlike these works, we consier both recursion an upates, whereas [13] oes not consier upates, [3, 4] supports upates but not recursion an [12] consiers neither recursion or upates. Moreover, we o not focus on provenance propagation through relational operators but through inference rules that can be translate to relational unions an joins with boune recursion. However, inference rules compute on the fly implicit triples without the nee to materialize the provenance of intermeiate results (per recursion step). 7 Conclusion In this paper we propose the use of colors to capture the provenance of RDF ata an schema triples. We use the logical representation of quaruples to store the color of an RDF triple. The use of colors allows us to capture provenance at several granularity levels an can be consiere as a generalization of RDF Name Graphs. One of the main contributions of the paper is the extension of RDFS inference rules to etermine the provenance of implicit RDF triples, an extension which is not possible uner the RDF name graphs approach an has been overlooke in the majority of approaches that eal with managing provenance information for RDF graphs. Note that the extene inference rules o not entail any aitional complexity or scalability concerns to those alreay involving RDFS reasoning (see complexity analysis). s a future work we will stuy a more general algebraic structure (as in [13]) to capture the provenance of triples an mappings obtaine by the SPRQL operators [23]. In aition, we plan to stuy the insertion an eletion of colors where the latter can be expresse as a batch eletion of quaruples sharing the same color. cknowlegements This work was partially supporte by the EU project CSPR (FP IST ). References 1. T. erners-lee, J. Henler, an O. Lassila. The Semantic Web. Scientific merican- merican Eition, D. rickley an R.V. Guha. RDF Vocabulary Description Language 1.0: RDF Schema P. uneman,. P. Chapman, an J. Cheney. Provenance Management in Curate Databases. In SIGMOD, P. uneman, J. Cheney, an S. Vansummeren. On the Expressiveness of Implicit Provenance in Query an Upate Languages. In ICDT,
16 16 G. Flouris, I. Funulaki, P. Peiaitis, Y. Theoharis, an V. Christophies 5. J. Carroll, C. izer, P. Hayes, an P. Stickler. Name graphs, Provenance an Trust. In WWW, V. Christophies, D. Plexousakis, M. Scholl, an S. Tourtounis. On labeling schemes for the semantic web. In WWW, E. Dumbill. Tracking Provenance of RDF Data. Technical report, ISO/IEC, Mcrie F. Manola, E. Miller. RDF Primer. February P. Garenfors. elief Revision: n Introuction. elief Revision, (29):1 28, P. Garenfors. The ynamics of belief systems: Founations versus coherence theories. Revue Internationale e Philosophie, 44:24 46, F. Geerts an J. V. en ussche. Relational Completeness of Query Languages for nnotate Databases. In DPL, F. Geerts,. Kementsietsiis, an D. Milano. MONDRIN: nnotating an Querying Databases through Colors an locks. In ICDE, T. J. Green, G. Karvounarakis, an V. Tannen. Provenance semirings. In PODS, C. Gutierrez, C.. Hurtao, an. O. Menelzon. Founations of Semantic Web Databases. In PODS, P. Hayes. RDF Semantics. February D. Le-Phuoc,. Polleres, M. Hauswirth, G. Tummarello, an C. Morbioni. Rapi Prototyping of Semantic Mash-ups through Semantic Web Pipes. In WWW, R. MacGregor an I.-Y. Ko. Representing Contextualize Data using Semantic Web Tools. In Practical an Scalable Semantic Systems, In conjunction with ISWC. 18. S. Munoz, J. Perez, an C. Gutierrez. Minimal euctive systems for RDF. In ESWC, P. Peiaitis. Querying an Upating RDF/S Name Graphs. Master s thesis, Computer Science Department, University of Crete, P. Peiaitis, G. Flouris, I. Funulaki, an V. Christophies. On Explicit Provenance Management in RDF/S Graphs. In TPP, J. Perez, M. renas, an C. Gutierrez. Semantics an Complexity of SPRQL. In ISWC, J. Perez, M. renas, an C. Gutierrez. nsprql: Navigational Language for RDF. In ISWC, E. Pru hommeaux an. Seaborne. SPRQL Query Language for RDF. TR/rf-sparql-query, January PSPRQL. psparql.inrialpes.fr. 25. DLP Comp. Science ibliography. ley/b. 26. DPeia Gene Ontology RDFizers. simile.mit.eu/wiki/rdfizers. 29. W3C Linking Open Data. esw.w3.org/topic/sweoig/taskforces/ CommunityProjects/LinkingOpenData. 30. S. Schenk an S. Staab. Networke graphs: a eclarative mechanism for SPRQL rules, SPRQL views an RDF ata integration on the Web. In WWW, Seaborne an G. Manjunath. SPRQL/Upate: language for upating RDF graphs. jena.hpl.hp.com/ afs/sprql-upate.html, pril G. Serfiotis, I. Koffina, V. Christophies, an V. Tannen. Containment an Minimization of RDF/S Query Patterns. In ISWC, W.-C. Tan. Provenance in atabases: Past, current, an future. ulletin of the IEEE Computer Society Technical Committee on Data Engineering, E. Watkins an D. Nicole. Name Graphs as a Mechanism for Reasoning bout Provenance. In Frontiers of WWW Research an Development - PWeb, D. Zeginis, Y. Tzitzikas, an V. Christophies. On the Founations of Computing Deltas etween RDF Moels. In ISWC/SWC,
Capturing Provenance of RDF Triples through Colors
Capturing Provenance of RDF Triples through Colors G. Flouris FORTH-ICS, Greece fgeo@ics.forth.gr I. Funulaki FORTH-ICS, Greece funul@ics.forth.gr Y. Theoharis FORTH-ICS, Greece University of Crete, Greece
More informationColoring RDF Triples to Capture Provenance
Coloring RDF Triples to Capture Provenance Giorgos Flouris 1, Irini Funulaki 1, Panagiotis Peiaitis 1,2, Yannis Theoharis 1,2, an Vassilis Christophies 1,2 1 Institute of Computer Science, FORTH, Greece
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationSPARQL Update under RDFS Entailment in Fully Materialized and Redundancy-Free Triple Stores
SPARQL Upate uner RDFS Entailment in Fully Materialize an Reunancy-Free Triple Stores Albin Ahmeti 1 an Axel Polleres 2 1 Vienna University of Technology, Favoritenstraße 9, 1040 Vienna, Austria 2 Vienna
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationFrequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises
verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationCompiler Optimisation
Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.
More informationd 3 d 4 d d d d d d d d d d d 1 d d d d d d
Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationControlling Access to RDF Graphs
Controlling Access to RDF Graphs Giorgos Flouris 1, Irini Fundulaki 1, Maria Michou 1, and Grigoris Antoniou 1,2 1 Institute of Computer Science, FORTH, Greece 2 Computer Science Department, University
More informationUpdating RDFS ABoxes and TBoxes in SPARQL
Upating RDFS ABoxes an TBoxes in SPARQL Albin Ahmeti 1, Diego Calvanese 2, an Axel Polleres 3 1 Vienna University of Technology, Favoritenstraße 9, 1040 Vienna, Austria 2 Faculty of Computer Science, Free
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms
More informationOn the Hardness of Counting the Solutions of SPARQL Queries
On the Hardness of Counting the Solutions of SPARQL Queries Reinhard Pichler and Sebastian Skritek Vienna University of Technology, Faculty of Informatics {pichler,skritek}@dbai.tuwien.ac.at 1 Introduction
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationACE: And/Or-parallel Copying-based Execution of Logic Programs
ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More information+ E. Bit-Alignment for Retargetable Code Generators * 1 Introduction A D T A T A A T D A A. Keen Schoofs Gert Goossens Hugo De Mant
Bit-lignment for Retargetable Coe Generators * Keen Schoofs Gert Goossens Hugo e Mant IMEC, Kapelreef 75, B-3001 Leuven, Belgium bstract When builing a bit-true retargetable compiler, every signal type
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationAlgebraic transformations of Gauss hypergeometric functions
Algebraic transformations of Gauss hypergeometric functions Raimunas Viūnas Faculty of Mathematics, Kobe University Abstract This article gives a classification scheme of algebraic transformations of Gauss
More informationCharacterizing Decoding Robustness under Parametric Channel Uncertainty
Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationCS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics
CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,
More informationA Framework for Dialogue Detection in Movies
A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationIndexing the Edges A simple and yet efficient approach to high-dimensional indexing
Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science
More informationSupervised tracking and correction of inconsistencies in RDF data
Supervise tracking an correction of inconsistencies in RDF ata Youen Péron, Frééric Raimbault, Gilas Ménier, Pierre-François Marteau To cite this version: Youen Péron, Frééric Raimbault, Gilas Ménier,
More informationRevisiting Blank Nodes in RDF to Avoid the Semantic Mismatch with SPARQL
Revisiting Blank Nodes in RDF to Avoid the Semantic Mismatch with SPARQL Marcelo Arenas 1, Mariano Consens 2, and Alejandro Mallea 1,3 1 Pontificia Universidad Católica de Chile 2 University of Toronto
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationOverlap Interval Partition Join
Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan
More informationLearning Polynomial Functions. by Feature Construction
I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationLogical reconstruction of RDF and ontology languages
Logical reconstruction of RDF and ontology languages Jos de Bruijn 1, Enrico Franconi 2, and Sergio Tessaris 2 1 Digital Enterprise Research Institute, University of Innsbruck, Austria jos.debruijn@deri.org
More informationUninformed search methods
CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationUsing RDF to Model the Structure and Process of Systems
Using RDF to Model the Structure and Process of Systems Marko A. Rodriguez Jennifer H. Watkins Johan Bollen Los Alamos National Laboratory {marko,jhw,jbollen}@lanl.gov Carlos Gershenson New England Complex
More informationPERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING
PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationModifying ROC Curves to Incorporate Predicted Probabilities
Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationFeature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative
More informationCS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing
CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationPART 2. Organization Of An Operating System
PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms
More informationRough Set Approach for Classification of Breast Cancer Mammogram Images
Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems
More informationShift-map Image Registration
Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy
More informationVariable Independence and Resolution Paths for Quantified Boolean Formulas
Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationAdditional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication
Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last
More informationA Convex Clustering-based Regularizer for Image Segmentation
Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)
More informationPairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:
airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationSampling Strategies for Epidemic-Style Information Dissemination
This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceeings. Sampling Strategies for Epiemic-Style Information
More informationTrace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations
Trace-base Approach to Eitability an Corresponence Analysis for Biirectional Graph Transformations Soichiro Hiaka National Institute of Informatics, Japan hiaka@nii.ac.jp Martin Billes Technical University
More informationFinite Automata Implementations Considering CPU Cache J. Holub
Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,
More informationSupporting Fully Adaptive Routing in InfiniBand Networks
XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar
More informationTowards Equivalences for Federated SPARQL Queries
Towards Equivalences for Federated SPARQL Queries Carlos Buil-Aranda 1? and Axel Polleres 2?? 1 Department of Computer Science, Pontificia Universidad Católica, Chile cbuil@ing.puc.cl 2 Vienna University
More informationChange Patterns and Change Support Features in Process-Aware Information Systems
hange Patterns an hange Support eatures in -Aware Information Systems arbara Weber 1,, Stefanie Rinerle 2, an Manfre Reichert 3 1 Quality ngineering Research Group, University of Innsbruck, Austria arbara.weber@uibk.ac.at
More informationDeltaPath: Precise and Scalable Calling Context Encoding
DeltaPath: Precise an Scalable Calling Context Encoing Qiang Zeng, Junghwan Rhee, Hui Zhang, Nipun rora, Guofei Jiang, Peng Liu Penn State University, NEC Laboratories merica BSTRCT Calling context provies
More informationDisjoint Multipath Routing in Dual Homing Networks using Colored Trees
Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationFINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD
Warsaw University of Technology Faculty of Physics Physics Laboratory I P Joanna Konwerska-Hrabowska 6 FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD.
More informationProvisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks
Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:
More informationMining Sequential Patterns with Periodic Wildcard Gaps
Mining Sequential Patterns with Perioic Wilcar Gaps Youxi Wu, Lingling Wang, Jiaong Ren, Wei Ding, Xinong Wu Abstract Mining frequent patterns with perioic wilcar gaps is a critical ata mining problem
More informationA General Approach to Query the Web of Data
A General Approach to Query the Web of Data Xin Liu 1 Department of Information Science and Engineering, University of Trento, Trento, Italy liu@disi.unitn.it Abstract. With the development of the Semantic
More informationOpen Access Adaptive Image Enhancement Algorithm with Complex Background
Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment
More informationBackpressure-based Packet-by-Packet Adaptive Routing in Communication Networks
1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing
More information1 Surprises in high dimensions
1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationReal Time On Board Stereo Camera Pose through Image Registration*
28 IEEE Intelligent Vehicles Symposium Einhoven University of Technology Einhoven, The Netherlans, June 4-6, 28 Real Time On Boar Stereo Camera Pose through Image Registration* Fai Dornaika French National
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationHOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM
HOW O SECURTY TECHNOLOGES NTERACT WTH EACH OTHER TO CREATE VALUE? THE ANALYSS O REWALL AN NTRUSON ETECTON SYSTEM Huseyin CAVUSOGLU Srinivasan RAGHUNATHAN Hasan CAVUSOGLU Tulane University University of
More information