Extending OWL with Explicit Dependency

Size: px
Start display at page:

Download "Extending OWL with Explicit Dependency"

Transcription

1 Extending OWL with Exlicit Deendency Jean-Paul Calbimonte, Fabio Porto Ecole Politechnique Fédéral de Lausanne EPFL Database Laboratory - Switzerland firstname.lastname@efl.ch Abstract. Functional Deendency has been extensively studied in database theory. It rovides an elegant formalism for secifying key constraints and is the basis for normalization theory used in Relational database design. Given its known axiomatization through logical imlications it is exected that the ontology community would be interested in investigating its alicability to concetual modeling. This aer investigates the extension of OWL ontologies with functional deendencies. In articular, we focus on key deendency and a new class referred to as exlicit deendency. The latter is a functional deendency in which the function that correlates the lefthand side to the right-hand side of the deendency is known. We extend current formalism to allow functions to aear in the consequent of a deendency declaration. A maing of the roosed formalism to Horn clause is secified and ermits FDs to be evaluated as logic rules. The ontology therein roduced may resent different behaviors deending on the interretation given to functional deendencies. Interesting enough is that exlicit deendency adds one extra ossible interretation, similar to views in databases. We have integrated the extended formalism into OWL and used SWRL to ma deendencies to logic rules. A rototye has been imlemented and illustrates the roosed aroach.. Introduction Data deendency has been introduced as a general model for a large class of database constraints that augments the exressivity of simle database models []. Functional deendencies (FD) comose a articularly interesting data deendency [] with which one can design correct Relational database schemas. This is due to the fact that FDs elegantly model the tye of relationshis existing between attributes of a relation, used, for instance, in defining rimary keys and in avoiding redundant data reresentation by alying normalization rules. The semantics exressed through functional deendencies are equally relevant when secifying a concetual schema. As a matter of fact, it has been observed [3] that in data-centric alications users exect ontologies to offer mechanisms similar to those found in the database area that guarantee the correctness of entered data. There has been quite a few works investigating the adotion of FD in ontologies [4,5,6,7]. In these works, functional deendency (including keys) is incororated into variants of descrition logic languages and an analysis of decidability of the new language is rovided. Albeit the differences in exressivity of the different FD aroaches, the semantics of the introduced FD construct remain essentially invariant. A semi-formal definition can be stated as: Given a concet C with sets of roerties X and Y, we say that X determines Y () (X Y) iff given two instances I, I of C with two bindings (x, x ) of X and (y, y ) of Y, where x i, y i I i, then if x = x imlies y = y As an examle of functional deendency that follows the semantics described in () and models flight information, one may secify that for a given flight number and date a single ilot can be allocated: Flight: hasnumber, hasdate haspilot () The semantics in () is suitable for secifying keys of concets and to constrain the cardinality of deendent roerties. In fact, OWL offers the Functional (resectively InverseFunctional) roerty construct that restricts the maximal cardinality of a single roerty to [8]. In this aer we extend the class of data deendencies that can be exressed through functional deendencies. Consider for instance the rule requiring ilots of a flight to hold assorts issued by the same country as the one reresented by the airline comany flag. This rule could be stated as:

2 hasairline.hasflag(x) and haspilot.haspassort.issuedby (y) -> x=y (3) Observe that differently to the exression in (), the one in (3) imlies an exlicit functional relationshi between the instances in the range of redicates hasflag and isissuedby. Thus, in addition to secifying constraint cardinality, the rule in (3) secifies the value the deendent roerty shall hold as a function of the determining roerty value. We refer to this class of functional deendency as Exlicit Deendency (ED), emhasizing the exlicit secification of the deendency function. In other to accommodate ED with keys and traditional functional deendency definitions, we extend current formalism by allowing functions to aear in the consequent of a FD. As roosed in the database literature [], a Horn clause reresentation is adoted, allowing natural maing of FD formal definition into logic rules. The ontology obtained by adding FDs may induce different behaviors according to the interretation given to FDs [3]. Basically, the business rules imlied by FDs can be interreted as constraints, as in databases, or as art of the theory (TBox) affecting reasoning. Interesting enough, EDs allow further interretation, similar to views in databases. The extended FD secification has been integrated into OWL and a maing to SWRL [9] language allows rules to be evaluated and results to be integrated back into OWL. An initial rototye has been imlemented validating the roosed extensions. The remaining of this aer is organized as follows. Section discusses related work. Next, Section 3 motivates the need for functional deendencies in ontologies. A formal framework for extending DL ontologies with functional deendencies is resented in Section 4. Section 5 discusses the extension of OWL with FD and Section 6 describes our rototye imlementation. Finally, Section 7 concludes.. Related Work Functional deendency has been extensively studied in databases with the main intention of adding more semantics to database schemas []. Imortant results of FD in databases include the secification of key deendency within a relation and referential integrity between relations, known as inclusion deendency. Although inclusion deendency is laced in the realm of ontology languages, key deendency has long being neglected. Most of the work in DL concerning FD exlores alternatives to integrating the new feature into the language and analyze the decidability and comlexity of satisfiability of axioms under the extended language. Calvanese et al. [4] extend DLR with multile-keys (keys constituted by more than one attribute) for concets and n-ary relations. Comonents of keys are simle roerties that cannot ma into a ath of relationshis [0]. Keys are in fact modeled as cardinality constraints over roles in concet constructors and relations without requiring further extension to the language, which ermitted to kee the satisfiability of concets in EXPTIME. Borgida and Wedell [0] extend the Classic descrition logics with functional deendencies and show how subsumtion and views can be comuted using descrition grahs even in the resence of FDs. An interesting oint raised by the authors is the integration of FD definitions with the TBox. In articular, the extension of DL through extra constructs for FD reresentation may fail to rovide any interesting deduction based on associated concets relationshis. In order to circumvent this roblem the FD interretation is secified with reference to the domain making it valid for any subsumtion assertion related to the FD definition. In our aroach, as FDs are maed into SWRL rules, the antecedent formula is comosed of conjunctions of roles forming aths with a common root concet. In this context, any ABox instances matching the redicates fires the rule, including those related to the involved terms through subsumtion relationshi with the resective classes. The reresentation of views in Classic was also insiring, as described in Section 4. Lutz and Milicic [6] roose an extension of descrition logics ALC(D) with concrete domains to suort functional deendencies with aths in the antecedents and consequents. A set of functional deendencies over a concet C forms a key-box. The work shows that for large class of ractical scenario key-boxes, comuting the satisfiability of concets is decidable. Our formalization for FDs equally considers aths in comosing the left and right hand side of its imlication with the difference of not distinguishing between concrete and abstract features. Toman and Weddell [7] investigate the decidability of a terminology in DLFD when FDs are art of concet constructors using aths. It is shown that decidability is maintained with ath functional deendencies iff the latter is restricted to aear in the right-hand side of monotone concet

3 constructors. Our results do not consider FD in concet constructor; rather we add a new constructor for FDs and integrate it to the TBox through logic rules derived from the FD formulation. Motik and colleagues [3] elegantly discuss the role of constraints in ontologies and trace an interesting comarison to constraints in databases. Indeed, the very same business rule may be interreted as terminological axiom or as a constraint. The authors extend the definition of a knowledge base to admit a secial constraint comonent that adverts against non-comliance to the rules without being art of the terminology. The constraint comonent is one of the elements of our concetual model with very similar behavior. Finally, Ludascher et al [] introduced a distinguishable witness redicate for holding instances not conforming to secified constraints. The aroach we adoted for integrating constraints enforcement to our framework was insired by the aforementioned roosal. 3. Preliminaries As we have seen, functional deendencies can be used to exress different tyes of relationshis between ontology elements. In classical FDs and the secial case of keys, the function that links the antecedent and consequent is a selection function, which is based on semantic interretations of the domain of interest. For instance consider the following examle in the flight ontology: the destination airort of a flight functionally determines the dearture gate. This constraint would ensure that assengers from two different flights with the same destination should ass through the same gate. In terms of DL, let s suose that we have defined the flights F and F, gates G, G and airort HEATHROW: hasdestination(f,heathrow) hasdestination(f,heathrow) deartsthrough(f,g) The ABox assertions above would imly that it is not ossible to have the following assertion: deartsthrough(f,g) It would indeed violate the FD. However the selection of G instead of G is rather arbitrary. It deends absolutely on the user s ercetion and interretation of reality. In fact if we change G by G for both flights, the FD constraint is resected anyway. This is understandable because the function that establishes a relationshi between antecedent and consequent is not exlicitly stated. But there are cases where we might want to formally reresent this function in the FD declaration. Consider this examle: the flight origin and destination functionally determine the rice of the ticket. In this case the ticket rice deends on a known function, which takes the flight origin and destination as arameters. For examle, we could calculate the rice based on the distance of the two airorts. Now we cannot arbitrarily choose between all ossible rice values, the function comutes it and all instances should agree on it: hasdestination(f,heathrow) hasdestination(f,heathrow) hasorigin(f,geneva) hasorigin(f,geneva) ticketforflight(ticket,f) ticketforflight(ticket,f) rice(t,300) rice(t,300) In the examle we see that two comletely different flights that agree on origin and destination (GENEVA and HEATHROW), also agree on the ticket rice, which is comuted by a function f. So we see the need of defining all these flavours of FDs in DL. In OWL-DL, only basic FDs are exressible thanks to the FunctionalProerty and the InverseFunctionalProerty. If a roerty P is declared as functional it satisfies the following rule for all instances x, y and z: P( x, y) P( x, z) y = z (4) And for the inverse case: P( y, x) P( z, x) y = z (5) It is easy to see that this is very limited in terms of exressivity, not even comound keys or FDs can be constructed. By using the key-box constructs introduced in [6] and Path-FD s of [7] we are able to

4 define quite comlex FD but we are required to modify the reasoners in order to check comliance of the theory to the FDs. Moreover, we are anyway unable to exress exlicit functions with FDs like in the ticket rice examle. It is well known that there is an intrinsic relation between Horn clauses and functional deendencies, as described in [] in the context of databases. So it seems natural to use Horn clauses for FDs in DL as well. First we analyze the general and common case of a classical FD. Consider the flight and gate examle described reviously. We can translate the FD as a Horn clause rule in the following way: hasdestination( x, y) hasdestination( x, y) deartsthrough( x, z ) hasdestination( x, z ) z = z It is interesting to see that similar rules can be constructed for the case of keys. For instance if we define that two assorts issued for the same country and the same assort numbers are the same, then we can exress this constraint with the following rule: issuedincountry( x, y) issuedincountry( x assnumber( x, z) assnumber( x, z), y) x = x (6) (7) Finally we can write a similar rule for the ticket rice examle: ticketforflight( t, x ) hasorigin( x, w) rice ( t, f ( w, z)) hasdestination( x, z) (8) Notice that f is a known deterministic function that takes two instances, the origin and destination, and returns a rice value. The examles above denote a requirement to a more exressive DL knowledge base. Some roosals suggest the extension of DL with functional deendency and keys but, to the best of our knowledge, no work has considered exlicit deendency. Section 4 describes a formal framework that accommodates: keys, functional and exlicit deendencies. 4. Formal Framework Section 3 illustrates that comlex keys and exlicit deendency definitions are relevant business rules that require an extended DL knowledge base to be exressed. The extension we roose is introduced by a new concet FD that is added to a DL knowledge base. In fact, instances of FD are rules descritions that are maed to logic rules using a rule language. We study the consequence of adding FDs as rules and rovide three interretations for their evaluation. As a result of these different interretations our concetual model distinguishes elements of the terminology and the assertion base therein roduced. 4.. Concetual Model Functional deendencies establish articular relationshis between elements of the knowledge base. Keys, for examle, induce equality of values between non-key roerties for instances identified to be the same. Similarly, exlicit deendencies relate values of deendent roerties to those of determining ones by means of an exlicit function. The referred relationshis are exressed by means of redicates in the head of FD rules that, as a result of rule evaluation, may roduce new facts. Thus, one may say that the facts roduced by running FD rules corresond to the subset of assertions in the knowledge base that agrees on the FD relationshi. In this resect, an imortant issue is to analyze the corresondence of such subset with the ABox without FD inferences. We roose three different interretations: Assertions usual ABox facts; Constraints witnesses [] facts about ABox assertions conflicting with the FD rule; Views facts whose maing to the FD rule defines a necessary and sufficient condition for belonging to the resulting head redicate [0];

5 In order to accommodate these different interretations we extend the concetual model roosed in [3] according to the following definition. Definition : An extended DL-FD knowledge base is a quintule (9) K=(T,A,C,C A,V, FD) such that T is a finite set of standard TBox axioms, A is a finite set of standard ABox assertions, C is a finite set of axioms secifying constraints (i.e. witnesses), C A is a finite set of assertion hurting some constraint in C and exressed as witnesses facts, V is a finite set of view definitions of tye V={v fdv,, v n fdv n }, where fdv i FDV FD, and FD is a finite set of functional deendency definition instances with FDa FDc FDv FDk = FD, where FDa is a finite set of assertion FDs, FDc is a finite set of constraint FDs, FDv is a finite set of views FDs, and FDk is a finite set of key FDs. In Definition, we have that elements of K are air wise disjoint. The constraint interretation corresonds to the behavior in which a ABox is searched for assertions not conforming to a FD rule. Note that redicates reflecting the FD constraint must be negated in the body of the rule. ABox assertions conforming to the aths in the FD rule body lead to the literals that match with the variables of a articular witness redicate in the rule head. Witnesses are secified as distinguished constraint concets in C. The roduced witness facts are added to the constraint assertion box C A. The view interretation secifies queries whose answers are comuted by the exlicit deendency function over determining roerty values. The view characterization defers from simle assertions in that the FD rule definition secifies necessary and sufficient conditions for ABox assertions to match with redicates in FD. In fact, comuting view results is only deendent on redicates on the body of FD rule. V comrehends view labels maed to corresonding FDv instances. Observe that the equivalence between a V instance and an FDv one allows querying from both FDv i or view evaluation. The consequent of an FDv rule is a redicate defined in T and having the resulting assertions due to the view evaluation added to the usual ABox. One may clearly observe that V FDk =. The assertion interretation assumes that the results of FDa evaluation are added to the set A. Predicates in the head of an FDa functional deendency are defined, as usual, in T. Thus, is exected that assertions corroborate to the comlete theory as exressed by T A. 4.. Formalizing Functional Deendencies A FD definition fd is comosed of the following elements: the antecedent A, consequent C, a root concet R and eventually a deterministic function f: fd = ( A, C, R, f ) (0) The antecedent is a list of aths. A ath u i is in turn comosed of roles r i : A = { u, u,..., u } () u i = { r i, C = { u}, r u = { s, s i,,..., r,..., s } l n i, ni } The consequent is defined by a single ath u, which is comosed of l roles u i. The root concet R is the starting oint of all aths in the antecedent and consequent. This ensures that all aths in the FD definition have a common source, which serves as a linking element between them.

6 In case of having the deterministic function f defined, it takes as arameters the ranges of the last roles of the antecedent aths. And the result of f must be comarable to the range of the last role of the ath in the consequent. If the FD is a key FD, then the consequent is the instance of the root concet itself (Id). In the simle examle of the assort with a key FD, the fd definition would be comosed of the following antecedent, consequent and root concet: A = { u, u} C = { u} R = Passort () u = { issuedincountry} u = { assnumber} u = { Id} Or in a simlified way, we could write it as: Passort :{ issuedincountry},{ assnumber} { Id} (3) For the more comlex case of the ticket rice we would have: A = { u, u} C = { u} R = Ticket f = f (4) ticket u = { ticketforflight, hasorigin} u = { ticketforflight, hasdestination} u = { rice} Or in simlified notation: Ticket :{ ticketforflight, hasorigin}, ticket { ticketforflight, hasdestination} f { rice} (5) We can see that these abstract FD definitions can be maed to their corresonding Horn clause rule counterarts (as seen in exressions (6), (7) and (8)). In the general case the abstract FD definition in () can be translated to the following Horn rule: r ( r,,... i, ( ) r ) r ) r ( ( (,,, )... r )... r s ( ) s (, )... s i,, r (,,, i,,, i,, i,, )... r l, n i, ni ( l (, n ( ( i, ni,, n,, n, ), i, n ) i ) l, f (,,..., )) sl ( l, n, n i, ni The i,j and a elements are variables in the rule language. The variable a is the common root node linking all the aths in the antecedent and consequent of the FD. Notice that the formalization in (6) imlies a new assertion interretation. The head of the rule is the new information added to the theory. In the following sub-section we discuss the different tyes of interretations of functional deendencies within our framework., n, n ) (6) 4.3. FD Interretation As we have introduced in Section 4., deending on the kind of FD enforcement, its results can be interreted differently. We have identified three basic cases of FD interretations: as constraint, new assertions and views. To better understand the different usages of FD deendencies, consider the following examle, again in the context of the flight ontology : "The tax on a ticket rice functionally deends on the assenger age-grou, the dearture airort and the arrival airort". This rule may make sense if for instance a secial ticket tax is added to the rice deending of the age of the assenger and the airort

7 he is arriving to. The following grah will hel us to reresent the concets and roles involved in the aforementioned rule: Ticket ticketforflight Flight deartsfrom Airort haspassenger hasprice arrivesto Airort Passenger Price belongstogrou hastax AgeGrou Tax Fig.. Grah of concets and roles involved in the ticket rice tax examle. We can easily identify the following aths for the antecedent: {ticketforflight, deartsfrom} {ticketforfligh, arrivesto} {haspassenger, AgeGrou} And the single ath for the consequent (dashed arrows in Fig. ): {hasprice,hastax} In addition, we define f tax as the function that comutes the tax based on the dearture, arrival and age grou: tax = f tax (deartureairort,arrivalairort,agegrou) Our FD is then defined as: fd tax C = In the Horn-rule version: : ( A, C, Ticket, f { ticketforflight, dertsfrom}, A = haspassenger( has Pr ice( ) hastax(, f ( tax { ticketforflight, arrivesto}, { haspassenger, agegrou} { has Pr ice, hastax } ticketforflight( ticketforflight( 3,,,, ) agegrou(, ) ) arrivesto( )),, ) ) (7) ) deartsfrom(, ) (8), 3, 3, In this case, if FDs are interreted as assertions, the head of the rule exress a new fact, which is added to the ontology as a consequence of FD evaluation. In the current scenario, the hastax redicate secifies the value to be aid as comuted by the know function f alied over the determining roerties:,, 3, hastax(, f (,,, 3, )) (9) This assertion would be added to the A set of the knowledge base. The roerty hastax should exist in the T set of the knowledge base. If the FD above is treated as a constraint, then we need to change the rule in such a way that we add a witness in case the theory does not obey the FDs. The rules would have to include a negation in the last redicate of the consequent:,,

8 ticketforflight(, ) deartsfrom(,,, ) ticketforflight(, ) arrivesto(,,, ) haspassenger( 3, ) agegrou( 3,, 3, ) hasprice( ) hastax(, f (,,, 3, )) w tax ( fd tax,hastax(, f (,,, 3, ))) (0) Notice that the witness w tax indicates: the failing instance, the FD and the redicate that caused the failure. This witness would be added to the C A set of the knowledge base. Notice that the witness can grow in comlexity, similarly to excetion handling classes in OO modelling. The taxonomy of the witness classes is defined in the C set of the knowledge base. Finally, ED rules may behave like views in databases by secifying values of a deendent roerty as derived from the function evaluation over determining roerties. Views are secified in the V set and corresond to labels associated to FD clauses. In the head of a view FD, a redicate, secified as art of the T set, is filled with matching values resulting from rule evaluation. Observe that differently to the two other interretations, a user can exlicit invoke a view FD. Clause () illustrates a view FD for the examle (7). Note that syntactically it is equivalent to the one resented in (8). ticketforflight( ticketforflight( haspassenger( has Pr ice( ) hastax(, f ( 3,,,, ) deartsfrom(, ) () ) arrivesto( ) agegrou(,, 3, )) 3,,,,, 3,,, ) ) Having defined FDs formally and having exlained the different interretations we can find, we exlain in the next section how we extended OWL with functional deendencies. 5. Extending OWL with FD The formalism introduced in Section 4 is the basis for the integration of the extended FD aroach into OWL. In this section we discuss such aroach and use the SWRL language to exress logic rules therein roduced. 5.. OWL FD Definition In order to model the abstract FD definition resented in (6), an OWL Class FD has been secified. The FD Class, just like in the definition introduced at (6), has the following roerties: antecedent, consequent, definedfor and function. The antecedent roerty links FD instances to one or more Path instances. A Path is a Class that contains a list of roerty references called PartList. The PartList class is a extension of the generic rdf:list. In order to make this a list of roerties, the first roerty of this list can only accet rdf:proerty instances. An examle of a consequent roerty is shown below: <owlfd:antecedent> <owlfd:ath rdf:id="ath_"> () <owlfd:art> <owlfd:artlist> <rdf:first rdf:reference="#issuedforperson"/> <rdf:rest> <owlfd:artlist> <rdf:first rdf:reference="#worksfor"/> <rdf:rest> <owlfd:artlist> <rdf:first rdf:reference="#basedincountry"/> <rdf:rest rdf:resource="htt:// 999/0/-rdf-syntax-ns#nil"/>

9 </owlfd:artlist> </rdf:rest> </owlfd:artlist> </rdf:rest> </owlfd:artlist> </owlfd:art> </owlfd:ath> </owlfd:antecedent> The Path instance contained in the antecedent secified in () secifies the following ath in abstract notation: ath _ = { issuedforperson, worksfor, basedincountry} (3) The consequent roerty also links an FD instance to a Path, but to maximum. The ath of the consequent also contains a list of rdf:proerty references. The definedfor roerty of the FD class corresonds to the root concet defined in (0). In case of being a FD key, we use the sub-roerty keydefinedfor. The definedfor roerty links an FD instance with a reference to a Class, like in the following examle: <owlfd:definedfor rdf:resource="#passort" /> (4) Notice that the Passort class should have been reviously defined somewhere in the ontology. Finally the hasfunction roerty indicates the resource id of the function corresonding to f in (0). We can summarize the aforementioned characteristics of the FD class with its definition in OWL using a simlified syntax: FD owl:thing antecedent only Path antecedent min consequent only Path consequent max = definedfor exactly = hasfunction exactly The Path class and the PartList are defined as follows: Path owl:thing art some artlist art min PartList rdf:list rdf:first only rdf:proerty = rdf:first exactly rdf:rest only rdf:list = rdf:rest exactly In addition we have defined three subclasses of FD: FD FDc and FDv. These subclasses corresond to the abovementioned interretation tyes: assertions, constraints and views resectively: FDa FD FDc FD FDv FD Another subclass of FD is FDk, for the secial case of key functional deendencies: FDk FD (8) Once we have these classes and roerties defined, we can reuse them to define FD s in any OWL ontology. For instance consider the Passort FD examle in (7). We would instantiate our FDk class as follows: <owlfd:fdk rdf:id="fd_"> <owlfd:antecedent> (9) <owlfd:path rdf:id="ath_"> <owlfd:art> <owlfd:partlist> (5) (6) (7)

10 <rdf:first rdf:resource="#issuedforcountry" /> <rdf:rest rdf:resource="htt:// -rdf-syntax-ns#nil" /> </owlfd:partlist> </owlfd:art> </owlfd:path> </owlfd:antecedent> <owlfd:antecedent> <owlfd:path rdf:id="ath_"> <owlfd:art> <owlfd:partlist> <rdf:first rdf:resource="#assortnumber" /> <rdf:rest rdf:resource="htt:// -rdf-syntax-ns#nil" /> </owlfd:partlist> </owlfd:art> </owlfd:path> </owlfd:antecedent> <owlfd:keydefinedfor rdf:resource="#passort" /> </owlfd:fdk> 5.. Maing to SWRL One we have defined the FD using our OWL FD classes, we can build Horn clause rules following the maing schema as shown in (6). We used the Semantic Web Rule Language SWRL to exress such rules. It is easy to see that a simle scrit rogram can easily generate the necessary SWRL rules based in a FD definition. For instance the SWRL rule counterart to (9) would be: <swrl:im rdf:id="rule_fd_"> <swrl:body rdf:arsetye="collection"> (30) <swrl:individualproertyatom> <swrl:roertypredicate rdf:resource="#issuedforcountry"/> <swrl:argument rdf:resource="#"/> <swrl:argument rdf:resource="#c"/> </swrl:individualproertyatom> <swrl:individualproertyatom> <swrl:roertypredicate rdf:resource="#issuedforcountry"/> <swrl:argument rdf:resource="#"/> <swrl:argument rdf:resource="#c"/> </swrl:individualproertyatom> <swrl:individualproertyatom> <swrl:roertypredicate rdf:resource="#assortnumber"/> <swrl:argument rdf:resource="#"/> <swrl:argument rdf:resource="er"/> </swrl:individualproertyatom> <swrl:individualproertyatom> <swrl:roertypredicate rdf:resource="#assortnumber"/> <swrl:argument rdf:resource="#"/> <swrl:argument rdf:resource="#er"/> </swrl:individualproertyatom> </swrl:body> <swrl:head rdf:arsetye="collection"> <swrl:individualproertyatom> <swrl:argument rdf:resource="#"/> <swrl:argument rdf:resource="#"/> <swrl:roertypredicate rdf:resource="#sameas"/> </swrl:individualproertyatom> </swrl:head> </swrl:im> As exlained above, the SWRL rule indicates that the issuedforcountry and assortnumber are the keys of the Passort class. In the figure below, dotted arrows mark the key roerties.

11 Passort issuedforcountry Country forperson assortnumber Person PassNumber Fig.. FDk for the Passort Class. Notice that, in this articular case, the FD is a key FD. If two assorts have same instances for the roerties issuedforcountry and assortnumber, then both Passorts are the same. We can exress this equality with the owl:sameas roerty, and add it to the ontology. Once the SWRL rules are generated, a SWRL reasoner can evaluate them and roduce results. These results may eventually be added to the ABox or used for constraint checking. An OWL reasoner can then be alied to see if the ontology is consistent. If not, then some instances of the ABox do not comly with the FD s defined reviously and they can be signaled in a consistency reort. 6. Imlementation Having described our aroach for adding functional deendencies to OWL, we roceed now to describe a rototye imlementation demonstrating the alicability of our ideas. As it can be seen throughout this aer, we have worked with a simle ontology concerning flights. This ontology has been written in OWL. In the next subsections we will resent the main comonents of our rototye and the main stes of the imlementation workflow. 6.. Building Blocks In order to make ossible an imlementation of our constructs, we have ut together several comonents and tools, which are detailed below. First we have added an abstract extension of FD s for OWL, which we call owlfd. Then we have used SWRL to define FDs in terms of horn clauses: FD definitions owlfd SWRL FDs as rules OWL Taxonomy and assertions Fig. 3. OWL SWRL and FDs Now to generate the SWRL rules based on the FD definitions, we have written a Java rogram that arses and interrets the FD s and returns the corresonding rules. The SWRL evaluation is erformed by the Jess engine. For consistency checking we have used Pellet reasoner. 6.. Imlementation Workflow The workflow of our imlementation can be summarized in the following figure:

12 Java Program 3 4 Jess 5 6 Pellet Fig. 4. Workflow of FD construction and evaluation with SWRL. Using the abstract FD OWL extension described in the revious section, we have written FD definitions on the flight ontology (ste in fig. 4). These definitions define antecedents and consequents just like described in 6. Since our FD classes and roerties are secified in OWL, it is ossible to use a generic OWL editor like Protégé. In order to generate SWRL rules based on the FD definitions (ste in fig. 4); we have written a Java rogram that generates such rules following the maing we established in section 4. It is imortant to notice that our imlementation currently focuses on the identity function as the f comonent of a FD described in section 4. Once the rogram has generated the SWRL rules, a SWRL reasoner can evaluate them (ste 4 in fig. 4). We have used Jess with the JessTab extension of Protégé to evaluate the rules. Once the SWRL reasoner roduces new assertions these are added to the ontology as new knowledge. Notice that it could also be ossible to treat the FD as constraints and never add the results of the SWRL evaluation back to the theory. At this oint it is ossible to use a standard OWL reasoner to check if the ontology is still consistent (ste 6 of fig. 4). We used Pellet to do so. In case of finding inconsistencies, it could be due to several reasons. For examle, the existent instances do not comly with the rules. But it could also be the case that the rules are wrong or badly defined. Since they are art of the knowledge base and their semantic interretation deends on the domain and context, we can only let the user know that inconsistencies have been found. A deeer analysis should be erformed by an exert in the domain of the concerned ontology Conclusions The extension of DL knowledge based with functional deendencies has been acknowledged as relevant in roducing more exressive ontologies. In this aer we investigate the extension of knowledge bases with three kinds of functional deendencies: classical, keys and exlicit. In fact, to the best of our knowledge, this is the first work in ontologies that exlores exlicit functional deendencies, which are those where an exlicit function relating deendent to determining roerties is known. We roose a formal framework to extend ontologies with these three functional deendencies and study the different behaviors that can be considered when running FD rules. We identified three main interretations: constraints, assertions and view and show how to integrate them within a common framework. The concetual reresentation is imlemented in OWL by a new FD

13 concet holding functional deendencies definitions. Moreover, a maing function translates FD instance definitions into SWRL rules, allowing inferences to roduce the desired FD behavior. The framework has been imlemented in an initial rototye under Protegé and using Jess as the rule execution engine. Currently, the maing of exlicit deendencies to SWRL only consider identify function. We intend as future work to exlore the extension of SWRL with other builtin functions and the ossibility of including user defined functions. Our aroach to extend the knowledge base with a new FD class has both advantages and disadvantages. The advantage is that it can be easily adoted without requiring any extension to the language. Furthermore, as the FD evaluation is done through SWRL it does not affect subsumtion reasoning in the TBox. It turns out that this same asect can be seen as a disadvantage as subsumtion cannot be exressed over constrained concets with FD. Another interesting issue that we leave for future investigation is the case of key FD with multivalued non-key attributes. In this scenario deciding on equality of sets seems not evident. Similarly, if roerties in the head of a FD are allowed to be multi-valued then existential quantification over the set is required. Finally, we intent to further exlore the view interretation, investigating how queries should be exressed and the ossible effects of integrating view results with ABox assertions. References. S. Abiteboul, R. Hull and V. Vianu. Foundations of Databases, Addison Wesley, Ronald Fagin. Horn Clauses and Database Deendencies. In Journal of the Association for comuting Machinery, Vol 9, no 4, ages , Boris Motik, Ian Horrocks, Ulrike Sattler. Bridging the Ga Between OWL and Relational Databases. In Proceedings of the 6 th international conference on World Wide Web, ages , Diego Calvanese, Giusee De Giacomo, Maurizio Lenzerini. Keys for free in Descrition Logics. In Proc. of the 000 International Worksho on Descrition Logics (DL'000), Diego Calvanese, Giusee De Giacomo, Maurizio Lenzerini. Identification Constraints and Functional Deendencies in Descrition Logics. In Proc. of IJCAI 00, ages , Carsten Lutz, Maja Milicic, Descrition Logics with Concrete Domains and Functional Deendencies. In Proceedings of the 6th Euroean Conference on Artificial Intelligence (ECAI-004), David Toman, Grant E. Weddell, On Keys and Functional Deendencies as First-Class Citizens in Descrition Logics. On IJCAR 006: , S. Bechhofer, F. V. Harmelen, J. Hendler, I. Horrocks, D. L. McGuinness, P.F. Patel-Schneider, L. A. Stein. OWL Web Ontology Language Reference, htt:// W3C Recommendation I. Horrocks, P. F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, M. Dean, SWRL A Semantic Web Rule Langguage Combining OWL and RuleML, W3C member submission, th May Alexander Borgida and Grant E. Weddell. Adding uniqueness constraints to descrition logics (reliminary reort). In Proceedings of the Fifth International Conference on Deductive and Object Oriented Databases, ages 85--0, B. Ludascher, Amarnath Gut M. E. Martone, Model-Based Mediation with Domain Mas, 7th International Conference on Data Engineering, Heidelberg, Germany, 00.

Functional Dependencies in OWL A-BOX

Functional Dependencies in OWL A-BOX Functional Dependencies in OWL A-BOX Jean-Paul Calbimonte, Fabio Porto École Polytechnique Fédérale de Lausanne - EPFL Database Laboratory - Switzerland {jean-paul.calbimonte, fabio.porto}@epfl.ch Abstract.

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Non-Strict Independence-Based Program Parallelization Using Sharing and Freeness Information

Non-Strict Independence-Based Program Parallelization Using Sharing and Freeness Information Non-Strict Indeendence-Based Program Parallelization Using Sharing and Freeness Information Daniel Cabeza Gras 1 and Manuel V. Hermenegildo 1,2 Abstract The current ubiuity of multi-core rocessors has

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Information Flow Based Event Distribution Middleware

Information Flow Based Event Distribution Middleware Information Flow Based Event Distribution Middleware Guruduth Banavar 1, Marc Kalan 1, Kelly Shaw 2, Robert E. Strom 1, Daniel C. Sturman 1, and Wei Tao 3 1 IBM T. J. Watson Research Center Hawthorne,

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information

OWL Rules, OK? Ian Horrocks Network Inference Carlsbad, CA, USA

OWL Rules, OK? Ian Horrocks Network Inference Carlsbad, CA, USA OWL Rules, OK? Ian Horrocks Network Inference Carlsbad, CA, USA ian.horrocks@networkinference.com Abstract Although the OWL Web Ontology Language adds considerable expressive power to the Semantic Web

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

Extending the SHOIQ(D) Tableaux with DL-safe Rules: First Results

Extending the SHOIQ(D) Tableaux with DL-safe Rules: First Results Extending the SHOIQ(D) Tableaux with DL-safe Rules: First Results Vladimir Kolovski and Bijan Parsia and Evren Sirin University of Maryland College Park, MD 20740 kolovski@cs.umd.edu bparsia@isr.umd.edu

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

Weighted Page Rank Algorithm based on In-Out Weight of Webpages

Weighted Page Rank Algorithm based on In-Out Weight of Webpages Indian Journal of Science and Technology, Vol 8(34), DOI: 10.17485/ijst/2015/v8i34/86120, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 eighted Page Rank Algorithm based on In-Out eight

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

aclass: ClassDeclaration (name=name) aspectstatement: Statement (place=name) methods method: MethodDeclaration

aclass: ClassDeclaration (name=name) aspectstatement: Statement (place=name) methods method: MethodDeclaration Asect Weaving with Grah Rewriting Uwe A mann and Andreas Ludwig Institut f r Programmstrukturen und Datenorganisation Universit t Karlsruhe, RZ, Postfach 6980, 76128 Karlsruhe, Germany (assmannjludwig)@id.info.uni-karlsruhe.de

More information

MSO Exam January , 17:00 20:00

MSO Exam January , 17:00 20:00 MSO 2014 2015 Exam January 26 2015, 17:00 20:00 Name: Student number: Please read the following instructions carefully: Fill in your name and student number above. Be reared to identify yourself with your

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ Imrove Precategorized Collection Retrieval by Using Suervised Term Weighting Schemes Λ Ying Zhao and George Karyis University of Minnesota, Deartment of Comuter Science Minneaolis, MN 55455 Abstract The

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

CASCH - a Scheduling Algorithm for "High Level"-Synthesis

CASCH - a Scheduling Algorithm for High Level-Synthesis CASCH a Scheduling Algorithm for "High Level"Synthesis P. Gutberlet H. Krämer W. Rosenstiel Comuter Science Research Center at the University of Karlsruhe (FZI) HaidundNeuStr. 1014, 7500 Karlsruhe, F.R.G.

More information

Object and Native Code Thread Mobility Among Heterogeneous Computers

Object and Native Code Thread Mobility Among Heterogeneous Computers Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

in Distributed Systems Department of Computer Science, Keio University into four forms according to asynchrony and real-time properties.

in Distributed Systems Department of Computer Science, Keio University into four forms according to asynchrony and real-time properties. Asynchrony and Real-Time in Distributed Systems Mario Tokoro? and Ichiro Satoh?? Deartment of Comuter Science, Keio University 3-14-1, Hiyoshi, Kohoku-ku, Yokohama, 223, Jaan Tel: +81-45-56-115 Fax: +81-45-56-1151

More information

Synthesis of FSMs on the Basis of Reusable Hardware Templates

Synthesis of FSMs on the Basis of Reusable Hardware Templates Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Comutation, Elounda, Greece, August -3, 006 (09-4) Synthesis of FSMs on the Basis of Reusable Hardware Temlates VALERY SKLYAROV, IOULIIA

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Navigation in SPARQL 1.1

Navigation in SPARQL 1.1 Navigation in SPARQL 1.1 Marcelo Arenas PUC Chile & U. of Oxford Oxford, November 2012 Semantic Web The Semantic Web is an extension of the current web in which information is given well-defined meaning,

More information

Graph Cut Matching In Computer Vision

Graph Cut Matching In Computer Vision Grah Cut Matching In Comuter Vision Toby Collins (s0455374@sms.ed.ac.uk) February 2004 Introduction Many of the roblems that arise in early vision can be naturally exressed in terms of energy minimization.

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

CS 1110 Final, December 7th, 2017

CS 1110 Final, December 7th, 2017 CS 1110 Final, December 7th, 2017 This 150-minute exam has 8 questions worth a total of 100 oints. Scan the whole test before starting. Budget your time wisely. Use the back of the ages if you need more

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

The concept of set is a very basic one. It is simple; yet, it suffices as the basis on which all abstract notions in mathematics can be built.

The concept of set is a very basic one. It is simple; yet, it suffices as the basis on which all abstract notions in mathematics can be built. Chater 1 Sets and functions Section 1.1 Sets The concet of set is a very basic one. It is simle; yet, it suffices as the basis on which all abstract notions in mathematics can be built. A set is determined

More information

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1 Bayesian Oil Sill Segmentation of SAR Images via Grah Cuts 1 Sónia Pelizzari and José M. Bioucas-Dias Instituto de Telecomunicações, I.S.T., TULisbon,Lisboa, Portugal sonia@lx.it.t, bioucas@lx.it.t Abstract.

More information

On Order Dependencies for the Semantic Web

On Order Dependencies for the Semantic Web On Order Dependencies for the Semantic Web David Toman and Grant Weddell David R. Cheriton School of Computer Science University of Waterloo, Canada Email: {david,gweddell}@uwaterloo.ca Faculty of Computer

More information

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Qi Tian, Baback Moghaddam 2 and Thomas S. Huang Beckman Institute, University of Illinois, Urbana-Chamaign, IL 680,

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Support Vector Machines for Face Authentication

Support Vector Machines for Face Authentication Suort Vector Machines for Face Authentication K Jonsson 1 2, J Kittler 1,YPLi 1 and J Matas 1 2 1 CVSSP, University of Surrey Guildford, Surrey GU2 5XH, United Kingdom 2 CMP, Czech Technical University

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases Signature File Hierarchies and Signature Grahs: a New Index Method for Object-Oriented Databases Yangjun Chen* and Yibin Chen Det. of Business Comuting University of Winnieg, Manitoba, Canada R3B 2E9 ABSTRACT

More information

The Research on Curling Track Empty Value Fill Algorithm Based on Similar Forecast

The Research on Curling Track Empty Value Fill Algorithm Based on Similar Forecast Research Journal of Alied Sciences, Engineering and Technology 6(8): 1472-1478, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: October 31, 2012 Acceted: January

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

Representing Product Designs Using a Description Graph Extension to OWL 2

Representing Product Designs Using a Description Graph Extension to OWL 2 Representing Product Designs Using a Description Graph Extension to OWL 2 Henson Graves Lockheed Martin Aeronautics Company Fort Worth Texas, USA henson.graves@lmco.com Abstract. Product development requires

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

A Brief Introduction to Truth-Table Logic. Kent Slinker Pima Community College

A Brief Introduction to Truth-Table Logic. Kent Slinker Pima Community College ` A Brief Introduction to ruth-able Logic Kent Slinker Pima Community College Earlier in this class, we learned that all arguments are either valid or invalid. Additionally, we learned that certain valid

More information

Mining Association rules with Dynamic and Collective Support Thresholds

Mining Association rules with Dynamic and Collective Support Thresholds Mining Association rules with Dynamic and Collective Suort Thresholds C S Kanimozhi Selvi and A Tamilarasi Abstract Mining association rules is an imortant task in data mining. It discovers the hidden,

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

A Survey on Formal Verification Techniques for Safety-Critical Systems-on-Chip

A Survey on Formal Verification Techniques for Safety-Critical Systems-on-Chip electronics Review A Survey on Formal Verification Techniques for Safety-Critical Systems-on-Chi Tomás Grimm 1, * ID, Djones Lettnin 2 and Michael Hübner 1 1 Chair of Embedded Systems for Information Technology,

More information

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

Allowing the use of Multiple Ontologies for Discovery of Web Services in Federated Registry Environment

Allowing the use of Multiple Ontologies for Discovery of Web Services in Federated Registry Environment Allowing the use of Multile Ontologies for Discovery of Web Services in Federated Registry Environment Kunal Verma 1, Amit Sheth 2, Swana Oundhakar 3, Kaarthik Sivashanmugam 4, John Miller 3 1 Accenture

More information

Image Segmentation Using Topological Persistence

Image Segmentation Using Topological Persistence Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, jfritts}@slu.edu Abstract. This aer resents

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points.

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points. Voronoi Diagram and Delaunay Triangulation 1 Introduction The Voronoi Diagram (VD, for short) is a ubiquitious structure that aears in a variety of discilines - biology, geograhy, ecology, crystallograhy,

More information

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. An Interactive Programming Method for Solving the Multile Criteria Problem Author(s): Stanley Zionts and Jyrki Wallenius Source: Management Science, Vol. 22, No. 6 (Feb., 1976),. 652-663 Published by:

More information

Distributed Algorithms

Distributed Algorithms Course Outline With grateful acknowledgement to Christos Karamanolis for much of the material Jeff Magee & Jeff Kramer Models of distributed comuting Synchronous message-assing distributed systems Algorithms

More information

Experimental Comparison of Shortest Path Approaches for Timetable Information

Experimental Comparison of Shortest Path Approaches for Timetable Information Exerimental Comarison of Shortest Path roaches for Timetable Information Evangelia Pyrga Frank Schulz Dorothea Wagner Christos Zaroliagis bstract We consider two aroaches that model timetable information

More information

Chapter 7b - Point Estimation and Sampling Distributions

Chapter 7b - Point Estimation and Sampling Distributions Chater 7b - Point Estimation and Samling Distributions Chater 7 (b) Point Estimation and Samling Distributions Point estimation is a form of statistical inference. In oint estimation we use the data from

More information

Sage Estimating (formerly Sage Timberline Estimating) Getting Started Guide. Version has been retired. This version of the software

Sage Estimating (formerly Sage Timberline Estimating) Getting Started Guide. Version has been retired. This version of the software Sage Estimating (formerly Sage Timberline Estimating) Getting Started Guide Version 14.12 This version of the software has been retired This is a ublication of Sage Software, Inc. Coyright 2014. Sage Software,

More information

Building Better Nurse Scheduling Algorithms

Building Better Nurse Scheduling Algorithms Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham

More information

Efficient Sequence Generator Mining and its Application in Classification

Efficient Sequence Generator Mining and its Application in Classification Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,

More information

[2009] IEEE. Reprinted, with permission, from [Jie Lu, Qusai Shambour and Guangquan Zhang, Recommendation Technique-based Government-to-Business

[2009] IEEE. Reprinted, with permission, from [Jie Lu, Qusai Shambour and Guangquan Zhang, Recommendation Technique-based Government-to-Business [009] IEEE. erinted, with ermission, from [Jie Lu, Qusai Shambour and Guanguan Zhang, ecommendation Techniue-based Government-to-Business Personalized e-services, Fuzzy Information Processing Society,

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information