Supervised tracking and correction of inconsistencies in RDF data
|
|
- Amice Morris
- 6 years ago
- Views:
Transcription
1 Supervise tracking an correction of inconsistencies in RDF ata Youen Péron, Frééric Raimbault, Gilas Ménier, Pierre-François Marteau To cite this version: Youen Péron, Frééric Raimbault, Gilas Ménier, Pierre-François Marteau. Supervise tracking an correction of inconsistencies in RDF ata <inria v2> HAL I: inria Submitte on 20 May 2011 HAL is a multi-isciplinary open access archive for the eposit an issemination of scientific research ocuments, whether they are publishe or not. The ocuments may come from teaching an research institutions in France or abroa, or from public or private research centers. L archive ouverte pluriisciplinaire HAL, est estinée au épôt et à la iffusion e ocuments scientifiques e niveau recherche, publiés ou non, émanant es établissements enseignement et e recherche français ou étrangers, es laboratoires publics ou privés.
2 Supervise tracking an correction of inconsistencies in RDF ata Youen Péron, Frééric Raimbault, Gilas Ménier, an Pierre-François Marteau Valoria, Université e Bretagne Su, Université Européene e Bretagne, Vannes, France {firstname.lastname}@univ-ubs.fr Abstract. The rapi evelopment of the Linke Data is hampere by the increase of errors in publishe ata, mainly relate to inconsistencies with omain ontologies. This problem alter reliability of application when analysis of inepenent an heterogeneous rf ata is involve. Therefore, it is important to improve the quality of the publishe ata to promote the evelopment of Semantic Web. We introuce a process esigne to etect an ientify specific inconsistencies in publishe ata, an to fix them at an ontological level. We propose a metho to quantitatively evaluate omain an range issues of a property. A iagnosis is then establishe an use to rive a supervise process for the correction (or possibly enhancement) of the ontology. We show the interest of this metho on a case stuy involving bpeia. The results of experiments carrie on very large ata sets generate with rf sp2bench benchmark valiate the applicability an scalability of our metho. 1 Introuction Launche in 2006 by Tim Berners-Lee, the Linke Data 1 movement an its recommenations is playing a leaing role for publishing, sharing, an interconnecting ata on the Semantic Web [3]. Many companies (eg. the BBC an The New York Times), organizations (eg. wikipeia Geonames, FreeBase, UN) an governments (eg. U.S. an U.K.) have aopte the principles of Linke Data to publish their ata using rf 2 stanar an their ontologies 3 using rfs 4 an owl 5 : the size an variety of available ata sets keep growing. April 2011, the Linke Data giant global graph ata has been estimate over 200 large ata sets (more than 1000 triplets each), an totaling 29 billion rf triples an 400 million links 6. Unfortunately, this uncontrolle growth is accompanie by a proliferation of errors in publishe ata associate with ontological inconsistencies. This problem alters application reliability when analysis of inepenent an heterogeneous rf ata is involve. Therefore, it is important to improve the quality of the publishe ata to promote the evelopment of the Semantic Web. Our metho quantitatively evaluates omain an property misuses an helps fix these problems. Most of the research ealing with ata quality in Semantic Web focus either on ontology (class an properties efinition) or raw ata (class an literal instances). Ontology valiation has been extensively stuie in [4, 2, 10, 8]. These works verify the consistency an completeness of an ontology within the assumptions of the open worl an non-unique ientification characterizing the semantic web : The tools are targete towars ontology esigners, irrespectively of the use relate to the ata publication. Surprisingly, valiation of raw ata has been much less stuie, even if it represents the main part of the publishe ata. Some tools have been esigne for syntactic valiation, such as vrp [14] a tool from ics-forthrffsuite 7. This kin of tools checks the ata compliance with the
3 RDF syntax an semantic constraints (also calle consistency logic) in ontologies - uner the assumption that the use ontologies are errors free. The origin of the error in raw ata is searche a syntactic level. Error reporting is performe iniviually for each erroneous instance. The Peantic Web s project 8 proposes iagnosis of ontology errors an (most important) recommenation to avoi them. In [6] the initiators of this project perform an analysis of errors foun in a sample set obtaine by crawling: they ientify four symptoms of recurring errors an propose recommenations to manage them. The authors also introuce an online tool, rf:alerts 9 esigne to etect these errors. Our contribution takes part to the Peantic Web main works: we propose to enhance the semantic analysis by aing range an omain verification for properties on non literal ata (unlike [6] where the analysis is strictly restricte to range checking on literal ata). Our analysis is performe on class instances, being subject or object of property. We also propose a way to measure the importance of errors etecte so that the priority of the correction can be evaluate: if a correction has to be one, we propose a iagnosis an an aapte fix. In [13], the authors also aress the problem of ata compliance to ontologies. They propose a generic evaluation metho of ata, base on systematic search of some error patterns: this search is performe by sparql queries applie to the euctive closure of the graph of all inference rules. Their formulation is complex because it requires negations (which is nont trivial for sparql). Since we want our metho to be scalable such to be teste on very large set of rf ata, we propose a one-rule inference (hierarchy) process to spee up the etection of possible errors. We performe our test using the parallel environment haoop an the request language pig. Their metho isn t proviing any assistance to correct the ontology. If necessary, our approach aims also to fill this gap. The rest of the paper is organize as follows: In part 2, we recall some basic concepts of the semantic web an we efine the notations use through out this article. The thir part is the escription of our processing metho. The evaluation an tests are introuce in the fourth section. Then we conclue with a iscussion in the last section. 2 Backgroun an notations In this part, we recall some concepts of the rf ata moel, rfs an owl vocabularies an we efine the notations we use in this paper. 2.1 rf moel Accoring to the rf ata moel, all information is expresse as a triplet (subject, preicate, object). The subject an preicate of a triple are resources ientifie by uris 10. In this article, we use the prefixe uri form to simplifies the examples. A triplet object can be either a ressource or a literal. Let U be the set of resources an L the set or literals. A triplet t is efine as follows : t = (s, p, o) U U (U L) Since a same resource can play the role of a subject or an object into a triplet, a set of triplets can be represente as a graph. We aress the abox/tbox separation problem (see [1]) by istributing the triplets in the terminology ata (tbox) an assertion ata (abox). 2.2 Meta Data Vocabulary Terminology information is escribe using specific rf, rfs or owl vocabulary as efine by W3C. We introuce here in often the terminology we use in this paper : 8 site : uri : Uniform Resource Ientifier
4 rf:type is a resource that provies an elementary system of belonging to a class. A triplet (r, rf : type, c) translates as r belongs to the class c. Let resources(c) be the set of resources belonging to the class c an let C be the set of classes. The number of resources in a class c is c = resoureces(c). A same resource can belong to several classes. All resources belong to the class owl:thing. rf:property is a class whose instances are use as preicate in a triplet. These resources are calle properties. Let the set of properties be P = resources(rf:property). A property s omains an tbox ranges are enote respectively by rfs:range an rfs:omain. Domain an range can be classes or even set of classes. Let omain(p) be the set of graph resources that belong to the object class of rfs:omain an let range(p) be the set of resources belonging to the object class of rfs:range. By efault, the omain an the tbox range of a property p are owl:thing. owl:objectproperty is the class of properties which range cannot be a literal, but only a class instance (also calle property-object in the text below). rfs:subclassof is a property escribing a subsumption relationship between a class c an a parent class f ( c f ). This is a transitive relationship : Each class can subsume itself : c 1, c 2, c 3 C (c 1 c 2 ) (c 2 c 3 ) = (c 1 c 3 ) c C, c c Let (c) be the set of classes that subsume a class c : (c) = {j C, j c} The generate hierarchy is efine as H. Let assume that, for each graph, the closure of this relationship has alreay been performe (as preprocessing) on the graph so that the following formula is true : ( u U), ( c, f C), (u c) (c f) = (u f) We use the metho of reasoning escribe in articles [15] an [7], which enable the implementation of inference rules on large (istribute) rf ata sets. 2.3 Effective omain an range Let omain e (p) be the set of resource subjects for a property p. Let range e (p) be the set of resource objects for a property p ɛ 10 5 ɛ r 10 4 # errors rank Fig. 1. Number of errors per property p as a function of the rank of p.
5 We check in paragraph 3 that the effective omain (resp. effective range) is inclue in the omain efine in the tbox (resp. in the range efine in the tbox). Let a omain error be efine as the occurrence of a subject resource of an object-property p that oes not belong to omain(p). Similarity, let a range error be efine as one occurrence of an object resource of an object-property p that oes not belong to range(p). As a preliminary test, we have evaluate the omain an range error ε (p) an ε r (p) in DBpeia for each object-property : 13.9 % of the properties has at least one omain error. These errors are epicte in figure 1: in wich x-axis represents the properties are sorte by escening number of errors an the y-axis represents the number of error per property. Each axis is in a log scale. The shape of the curve reveals that the errors are concentrate on a small number of objectproperties - locate left to the vertical otte line. The fixing of a small number of object-properties can enhance greatly the general consistency of the overall set of ata. The metho escribe above has two rawbacks : (i) it is time an space expensive (especially for large ata sets) because it relies on a ictionary for the classes of resources. (ii) the lack of inication of which instances has cause the error, prevents a etaile tracking of the problem an therefore the esign of a solution. In the following parts of this paper, we escribe another evaluation metho that overcome these problems. 3 Our metho We propose a three-stage processing approach to compute the upper boun of the error number per object-property. Then we show how to use it to iagnose the source of the errors. To illustrate this metho, we will escribe each step of application on the bpeia s objectproperty bpeia:hometown. Its efinition s omain is bpeia:person, but in reality it is use with resources that o not belong to this class. Figure 2 shows the result of our lines processing metho: in the left part, the omain of efinition of bpeia:hometown appears in otte - its effective omain is hatche shae - lines (note that the range is not epicte here). In the right part, we can see the hierarchy of the classes with the number of resources using the property. Fig. 2. Class bpeia:person is the omain of efinition of bpeia:hometown. The effective omain, hatche shae, is ivie between classes: bpeia:person an bpeia:ban. The values appearing in the class hierarchy are those of the histogram of classes for property. 3.1 Computation of a histogram for a property In the first stage, we calculate the istribution of the resources in the effective omain e (p) an the effective range range e (p) of an object-property p in the set of classes C. Let us efine two
6 histograms of size C : p for the resources of the omain of p an p r for the resources involve in the range of p : p [c] = ressources(c) omain e (p) p r [c] = ressources(c) range e (p) In the case of object-property bpeia:hometown, the values of the histogram are inicate on the tree of Figure 2 for the relevant classes an are 0 for the other classes. Generally, the maximum coorinate of these histogram (omain an range) is for the class owl:thing because it inclues all of the instances member of the omain an of the effective range. p [owl:thing] = max c C {p [c]} p r [owl:thing] = max c C {p r [c]} In our example (bpeia), the object-property bpeia:hometown is involve by resources (istribute between people an organizations). 3.2 Searching for the most specific class In the secon stage, using the histogram for an object-property p, we select the most specific class class (p) that inclues the effective omain of p. It is obtaine by fining the lowest class in the hierarchy H among the classes containing the effective omain of the property. By esign, class (p) features both the following relations : (i) p [class (p)] = p [owl:thing] (ii) ( c C)(c class (p)) (p [c] < p [owl:thing]) (class (p) c) (i) ensures that resources(class (p)) inclues omain e (p) an (ii) ensures that class (p) is the most specific class containing omain e (p). Since we assume the assumption that the classes of instances meet a hierarchy : c 1 c 2 = (p [c 1 ] p [c 2 ]) This proves the existence an unicity of class (p). In the above example (see figure 2), owl:thing is the most specific class for bpeia:hometown that inclues the effective omain. In the same way as for the omain, lets efine class r (p) the more specific class that inclues the real range of p : (i) p r [class r (p)] = p r [owl:thing] (ii) ( c C)(c class r (p) (p r [c] < p r [owl:thing]) (class r (p) c) 3.3 Computing the upper boun of the number of errors The last stage, involves the computation of the upper boun of the number of errors ε sup (p) - for the omain of p - an ε sup r (p) for the range of the object-property p. ε sup ε sup r (p) = p [class (p)] omain(p) (p) = p r [class r (p)] range(p) The eviation between the number of errors an the upper boun is relate to the resource (or the effective range) belonging to more than one class : these resources may be counte several times using the hierarchy of classes they belong to. In the figure 2 example, the omain of efinition is the class bpeia:person. The upper boun of error is : ε sup (bpeia:hometown) = p [owl:thing] p [bpeia:person] = This means that resources are subjects of bpeia:hometown even if they o not belong to its omain of efinition (here bpeia:person). We show in 4.1 that this upper boun matches perfectly the number of errors compute using the naive counting process.
7 3.4 Diagnostics an error correction After having etect potential problems, we will now escribe how it is possible to fin an fix errors. In the current example of figure 2, there is for instance a problem with bpeia:hometown. The stuy of histogram class for bpeia:hometown shows that most of the errors comes from the instance of bpeia:ban. These instances use the property bpeia:hometown but o not belong to the efinition omain of bpeia:person. A first iea involves the application of the following assumption : each resource use as a subject of a property belongs to the efinition omain of the class of this property. (3) r omain e (p) = r omain(p) In the case of bpeia:hometown, this woul imply that each music group (instance of bpeia:ban) belongs also to people (instance of bpeia:person). For instance, the resource bpeia:the Beach Boys use the property bpeia:hometown but it is not an instance of bpeia:person. Changing this an letting bpeia:the Beach Boys belong to bpeia:person may introuce errors on search relate to bpeia:person. A secon solution woul rely on the use of two ifferent properties for the music group an for people. This is not acceptable since it woul uplicate properties that have the same meaning - some ontology level problem may then arise. A thir iea is to relax the efinition omain of bpeia:hometown. In the bpeia hierarchy, owl:thing is the only less specific class than bpeia:person. The problem is that bpeia:hometown is not compatible with every bpeia s classes. At least, we think that the best solution in this case, is to a the bpeia:ban class to the efinition omain of bpeia:hometown. In general, we propose a iagnostic on erroneous efinition omain for property using the following scheme : if it seems that most of the instances of effective omain of the property belong to the efinition omain s class then the inference (3) applies else if the property may have ifferent senses for the ifferent resources then as much istinct properties as neee are create (one for each semantic) else if it is possible to fin a class that inclues a part of the effective omain an complies with the semantic of the property an for which the number of errors is acceptable then the efinition omain of this class is wiene else the efinition of the property is enhance by merging it to the set of classes from the effective omain. 4 Evaluation In this section, we analyze the quality of the results obtaine by our approach applie on bpeia (version 3.6), then we valiate the scalability of our metho using the benchmark sp2bench [12]. 4.1 DBpeia analysis bpeia is built upon an ontology 11 of 272 classes, 629 object-properties an 706 litteral-properties. Range an omain of each property are efine by a class or a set of classes. The ata in 843, 000 articles from Wikipeia (English version) are extracte an projecte to a 3.5 million resources graph that complies to the ontology. We performe our analysis on this set of ata - effective omain an range evaluation an etermination of the upper boun number of errors. An online emo that present the results of our system is available
8 Comparison with the exact number of error The table 1 shows a selection of the properties having the most errors an compares the upper boun error ε sup (p) to the exact number of errors ε (p) - see paragraph Comparison of omain ε (p) ε sup (p) bpeia:class 166, ,004 bpeia:hometown 21,287 21,287 bpeia:network 12,171 12,171 bpeia:sisterstation 5,044 5,044 bpeia:esigner 3,028 3,028 Comparison of range ε r(p) ε sup r (p) bpeia:city 12,168 12,168 bpeia:associatemusicalartist 11,027 11,027 bpeia:artist 10,166 10,166 bpeia:associateban 6,809 6,809 bpeia:sisterstation 5,464 5,464 Table 1. Comparison of the upper boun error an the excat number of errors on the first top 5 erroneous properties This table shows that the upper boun error ε sup (p) perfectly matches ε (p) : this is not surprising since every resource use in these properties belongs to one an only one class. Case stuy. We iscuss below some cases of errors encountere in bpeia using the iagnostic process presente in paragraph 3.4. bpeia:architect is eicate to the instance of builings (bpeia:builings class) but is in fact use in conjunction with bpeia:place - which is, into the hierarchy, parent to bpeia:builings. It seems acceptable to assume that every place having an architect is a builing. For instance, the Mongomery place in New York is an instance of bpeia:place. Even if this place has an architect, it oes not belong to bpeia:builing. We propose to a the Montgomery place to bpeia:builing. bpeia:class is the property causing the greatest number of errors. The notion of class is use in two ifferent contexts. Accoring to the ontology, this property shoul be use with transportation items. The histogram show that this property is mainly use by sub classes of bpeia:species - which has no relationship with transportation. Species are in no way means of transportation (with exceptions such as horses). In this case, the inference rule (3) see in 3.4 shoul not apply. It seems that bpeia can have ifferent semantics relate to bpeia:species or bpeia:meansoftransportation. We propose to fix this ambiguous property by creating - for each context - new properties in the tbox (an use the correct property in the abox) bpeia:city has the efinition range bpeia:city. Resources from its effective range are mainly location instances (bpeia:place is a parent class of bpeia:city). For instance, the triplet (Cincinnati bengals, bpeia:city, paul brown staium) means that the American football team Cincinnati Bengals is locate in the Paul Brown Staium. It is therefore elicate to assume that all the places use as objects for bpeia:city are cities. The property seems to have one an only one semantic for all resources in the effective range so it oesn t seem necessary to uplicate it. The most specific class that inclues the effective range is owl:thing. This class is much too general to be use as range. The bpeia:place is the best trae-off between the number of errors an the semantic consistency (only 37 resources among of the effective range of bpeia:city are not instances of the bpeia:place class).
9 Fig. 3. Execution times require for the computation of the histograms as a function of the number of triplets generate by sp2bench 4.2 Scalability We have use the pig system [9] on a cluster of 16 computers which can process up to 250 tasks in parallel. Since we want to stuy the processing time base on the graph size, we have teste our metho on series of test sets of increasing size generate by sp2bench [12]. sp2bench is mainly esigne to evaluate sparql engines but it is also useful for scalable ata sets generation. We have introuces errors in abox by changing the reference ontology (tbox). The errors are etecte an counte following a two step process : 1. the computation of istribution histograms execute in a ata-parallel way. (see paragraph 3.1) 2. the upper boun error is sequentially compute given the histograms an the tbox. This last step uration is not comparable to the histogram s computation so we ignore it in our results. Figure 3 shows the results. We use a log scale for the two axis. The execution time is multiplie by 3 when the size of ata increases by a factor of This results show that our metho scales relatively well acceptably scalable an emonstarte it efficiency on very large rf atasets. 5 Conclusion We have escribe an evaluate a metho that analysis a rf graph an computes upper bouns for the omain/range errors number for a given property. In the case of bpeia, this error matches exactly the number of errors. We explaine how to perform an error iagnosis an propose ways to fix the ontology accoringly. As an example, we applie this process to bpeia an suggest eicate fixing proceures.. The experimentations carrie on large set of ata show promising results an emonstrate the relative scalability an usability of our metho for quantitative stuy of the evolution of Semantic Web Data.
10 Our approach has nevertheless some limitations: for instance, we assume that the class hierarchy is error free so that it is possible to infer new relations. In some situations, the hierarchy relations shoul be checke or perhaps rebuilt - some systems [11] can compute a new hierarchy base on hierarchy clustering: anyway, this woul be mae uner the assumption of instances correctness. These two problems are closely relate so the scanning of the ata base shoul involve jointly these processes that must be run in intricate ways. We are currently expaning our metho to the processing of other OWL constraints such as range restriction (owl:allvaluefrom), isjonctions (owl:isjoint), carinality (owl:carinality) etc.. The iagnosis coul also be enhance using a semi-supervise process involving the selection of the most relevant example - for instance using page rank like algorithm [5]. References 1. Baaer, F.: The escription logic hanbook: theory, implementation, an applications. Cambrige Univ Pr (2003) 2. Baclawski, K., Matheus, C., Kokar, M., Letkowski, J., Kogut, P.: Towars a symptom ontology for semantic web applications. In: ISWC. p (2004) 3. Bizer, C., Heath, T., Berners-Lee, T.: Linke ata - the story so far. Int. J. Semantic Web Inf. Syst. 5(3), 1 22 (2009) 4. Gomez-Perez, A.: Evaluation of ontologies. International Journal of Intelligent Systems 16(3), (2001) 5. Hogan, A., Harth, A., Decker, S.: Reconrank: A scalable ranking metho for semantic web ata with context. In: 2n Workshop on Scalable Semantic Web Knowlege Base Systems. Citeseer (2006) 6. Hogan, A., Harth, A., Passant, A., Decker, S., Polleres, A.: Weaving the peantic web. In: 3r International Workshop on Linke Data on the Web (LDOW2010), in conjunction with 19th International Worl Wie Web Conference, CEUR (2010) 7. Hogan, A., Harth, A., Polleres, A.: Scalable authoritative OWL reasoning for the web. Information Systems 5(2), (2009) 8. Kalyanpur, A., Parsia, B., Sirin, E., Henler, J.A.: Debugging unsatisfiable classes in owl ontologies. Journal of Web Semantics 3(4), (2005) 9. Olston, C., Ree, B., Srivastava, U., Kumar, R., Tomkins, A.: Pig latin: a not-so-foreign language for ata processing. In: Proceeings of the 2008 ACM SIGMOD international conference on Management of ata. pp ACM (2008) 10. Parsia, B., Sirin, E., Kalyanpur, A.: Debugging owl ontologies. In: International Worl Wie Web Conference. pp (2005) 11. Quan, T., Hui, S., Cao, T.: A fuzzy FCA-base approach to conceptual clustering for automatic generation of concept hierarchy on uncertainty ata. In: Proc. of the 2004 Concept Lattices an Their Applications Workshop. pp Citeseer (2004) 12. Schmit, M., Hornung, T., Lausen, G., Pinkel, C.: SPˆ 2Bench: A SPARQL Performance Benchmark. In: Data Engineering, ICDE 09. IEEE 25th International Conference on. pp IEEE (2009) 13. Tao, J., Ding, L., McGuinness, D.L.: Instance ata evaluation for semantic web-base knowlege management systems. In: Proceeings of the 42th Hawaii International Conference on System Sciences (HICSS-42). pp Big Islan, Hawaii (2009) 14. Tolle, K.: Valiating RDF Parser: A Tool for Parsing an Valiating RDF Metaata an Schemas. Master s thesis, University of Hannover (2000) 15. Urbani, J., Kotoulas, S., Oren, E., van Harmelen, F.: Scalable istribute reasoning using mapreuce. The Semantic Web-ISWC 2009 pp (2009)
Study of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationDirected Louvain : maximizing modularity in directed networks
Directe Louvain : maximizing moularity in irecte networks Nicolas Dugué, Anthony Perez To cite this version: Nicolas Dugué, Anthony Perez. Directe Louvain : maximizing moularity in irecte networks. [Research
More informationCS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics
CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,
More informationAn FCA Framework for Knowledge Discovery in SPARQL Query Answers
An FCA Framework for Knowledge Discovery in SPARQL Query Answers Melisachew Wudage Chekol, Amedeo Napoli To cite this version: Melisachew Wudage Chekol, Amedeo Napoli. An FCA Framework for Knowledge Discovery
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationScalewelis: a Scalable Query-based Faceted Search System on Top of SPARQL Endpoints
Scalewelis: a Scalable Query-based Faceted Search System on Top of SPARQL Endpoints Joris Guyonvarc H, Sébastien Ferré To cite this version: Joris Guyonvarc H, Sébastien Ferré. Scalewelis: a Scalable Query-based
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationModifying ROC Curves to Incorporate Predicted Probabilities
Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,
More informationSewelis: Exploring and Editing an RDF Base in an Expressive and Interactive Way
Sewelis: Exploring and Editing an RDF Base in an Expressive and Interactive Way Sébastien Ferré, Alice Hermann To cite this version: Sébastien Ferré, Alice Hermann. Sewelis: Exploring and Editing an RDF
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationTowards an Adaptive Completion of Sparse Call Detail Records for Mobility Analysis
Towars an Aaptive Completion of Sparse Call Detail Recors for Mobility Analysis Guangshuo Chen, Aline Carneiro Viana, Carlos Sarraute To cite this version: Guangshuo Chen, Aline Carneiro Viana, Carlos
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationSPARQL Update under RDFS Entailment in Fully Materialized and Redundancy-Free Triple Stores
SPARQL Upate uner RDFS Entailment in Fully Materialize an Reunancy-Free Triple Stores Albin Ahmeti 1 an Axel Polleres 2 1 Vienna University of Technology, Favoritenstraße 9, 1040 Vienna, Austria 2 Vienna
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationLinked data from your pocket: The Android RDFContentProvider
Linked data from your pocket: The Android RDFContentProvider Jérôme David, Jérôme Euzenat To cite this version: Jérôme David, Jérôme Euzenat. Linked data from your pocket: The Android RDFContentProvider.
More informationTable-based division by small integer constants
Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr
More informationTacked Link List - An Improved Linked List for Advance Resource Reservation
Tacked Link List - An Improved Linked List for Advance Resource Reservation Li-Bing Wu, Jing Fan, Lei Nie, Bing-Yi Liu To cite this version: Li-Bing Wu, Jing Fan, Lei Nie, Bing-Yi Liu. Tacked Link List
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic
More informationA Plane Tracker for AEC-automation Applications
A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)
More informationQAKiS: an Open Domain QA System based on Relational Patterns
QAKiS: an Open Domain QA System based on Relational Patterns Elena Cabrio, Julien Cojan, Alessio Palmero Aprosio, Bernardo Magnini, Alberto Lavelli, Fabien Gandon To cite this version: Elena Cabrio, Julien
More informationChange Detection System for the Maintenance of Automated Testing
Change Detection System for the Maintenance of Automated Testing Miroslav Bures To cite this version: Miroslav Bures. Change Detection System for the Maintenance of Automated Testing. Mercedes G. Merayo;
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationYAM++ : A multi-strategy based approach for Ontology matching task
YAM++ : A multi-strategy based approach for Ontology matching task Duy Hoa Ngo, Zohra Bellahsene To cite this version: Duy Hoa Ngo, Zohra Bellahsene. YAM++ : A multi-strategy based approach for Ontology
More informationNEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationAssisted Policy Management for SPARQL Endpoints Access Control
Assisted Policy Management for SPARQL Endpoints Access Control Luca Costabello, Serena Villata, Iacopo Vagliano, Fabien Gandon To cite this version: Luca Costabello, Serena Villata, Iacopo Vagliano, Fabien
More informationResearch Article Inviscid Uniform Shear Flow past a Smooth Concave Body
International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of
More informationEnabling Rollback Support in IT Change Management Systems
Enabling Rollback Support in IT Change Management Systems Guilherme Sperb Machao, Fábio Fabian Daitx, Weverton Luis a Costa Coreiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisanro Zambeneetti
More informationYANG-Based Configuration Modeling - The SecSIP IPS Case Study
YANG-Based Configuration Modeling - The SecSIP IPS Case Study Abdelkader Lahmadi, Emmanuel Nataf, Olivier Festor To cite this version: Abdelkader Lahmadi, Emmanuel Nataf, Olivier Festor. YANG-Based Configuration
More informationColoring RDF Triples to Capture Provenance
Coloring RDF Triples to Capture Provenance Giorgos Flouris 1, Irini Funulaki 1, Panagiotis Peiaitis 1,2, Yannis Theoharis 1,2, an Vassilis Christophies 1,2 1 Institute of Computer Science, FORTH, Greece
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationRobust Camera Calibration for an Autonomous Underwater Vehicle
obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of
More informationWLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic
WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e
More informationReverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces
Reverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces Romain Delamare, Benoit Baudry, Yves Le Traon To cite this version: Romain Delamare, Benoit Baudry, Yves Le Traon. Reverse-engineering
More informationfiltering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember
107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,
More informationTeaching Encapsulation and Modularity in Object-Oriented Languages with Access Graphs
Teaching Encapsulation and Modularity in Object-Oriented Languages with Access Graphs Gilles Ardourel, Marianne Huchard To cite this version: Gilles Ardourel, Marianne Huchard. Teaching Encapsulation and
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationFuzzy Clustering in Parallel Universes
Fuzzy Clustering in Parallel Universes Bern Wisweel an Michael R. Berthol ALTANA-Chair for Bioinformatics an Information Mining Department of Computer an Information Science, University of Konstanz 78457
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationSetup of epiphytic assistance systems with SEPIA
Setup of epiphytic assistance systems with SEPIA Blandine Ginon, Stéphanie Jean-Daubias, Pierre-Antoine Champin, Marie Lefevre To cite this version: Blandine Ginon, Stéphanie Jean-Daubias, Pierre-Antoine
More informationResearch Article Research on Law s Mask Texture Analysis System Reliability
Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November
More informationFigure 1: Schematic of an SEM [source: ]
EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam
More informationGraphe-Based Rules For XML Data Conversion to OWL Ontology
Graphe-Based Rules For XML Data Conversion to OWL Ontology Christophe Cruz, Christophe Nicolle To cite this version: Christophe Cruz, Christophe Nicolle. Graphe-Based Rules For XML Data Conversion to OWL
More informationStructuring the First Steps of Requirements Elicitation
Structuring the First Steps of Requirements Elicitation Jeanine Souquières, Maritta Heisel To cite this version: Jeanine Souquières, Maritta Heisel. Structuring the First Steps of Requirements Elicitation.
More informationColoring RDF Triples to Capture Provenance
Coloring RDF Triples to Capture Provenance G. Flouris 1, I. Funulaki 1, P. Peiaitis 1,2, Y. Theoharis 1,2, an V. Christophies 1,2 1 Institute of Computer Science, FORTH, Greece an 2 Computer Science Department,
More informationSoftware Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency
Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science
More informationPerformance Characterization of a Bluetooth Piconet with Multi Slot Packets
Performance Characterization of a Bluetooth Piconet with Multi Slot Packets aniele Miorani Carlo Caimi Anrea anella To cite this version: aniele Miorani Carlo Caimi Anrea anella. Performance Characterization
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationCapturing Provenance of RDF Triples through Colors
Capturing Provenance of RDF Triples through Colors G. Flouris FORTH-ICS, Greece fgeo@ics.forth.gr I. Funulaki FORTH-ICS, Greece funul@ics.forth.gr Y. Theoharis FORTH-ICS, Greece University of Crete, Greece
More informationAnalysis of Virtual Machine System Policies
Analysis of Virtual Machine System Policies Sanra Ruea, Hayawarh Vijayakumar, Trent Jaeger Systems an Internet Infrastructure Security Laboratory The Pennsylvania State University University Park, PA,
More informationASAP.V2 and ASAP.V3: Sequential optimization of an Algorithm Selector and a Scheduler
ASAP.V2 and ASAP.V3: Sequential optimization of an Algorithm Selector and a Scheduler François Gonard, Marc Schoenauer, Michele Sebag To cite this version: François Gonard, Marc Schoenauer, Michele Sebag.
More informationFuzzy Learning Variable Admittance Control for Human-Robot Cooperation
Fuzzy Learning ariable Amittance Control for Human-Robot Cooperation Fotios Dimeas an Nikos Aspragathos Abstract This paper presents a metho for variable amittance control in human-robot cooperation tasks,
More informationOpen Access Adaptive Image Enhancement Algorithm with Complex Background
Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment
More informationHandling missing values in kernel methods with application to microbiology data
an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos
More informationACE: And/Or-parallel Copying-based Execution of Logic Programs
ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel
More informationA PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset
Vol.3, Issue.1, Jan-Feb. 013 pp-504-508 ISSN: 49-6645 A PSO Optimize Layere Approach for Parametric Clustering on Weather Dataset Shikha Verma, 1 Kiran Jyoti 1 Stuent, Guru Nanak Dev Engineering College
More informationComparator: A Tool for Quantifying Behavioural Compatibility
Comparator: A Tool for Quantifying Behavioural Compatibility Meriem Ouederni, Gwen Salaün, Javier Cámara, Ernesto Pimentel To cite this version: Meriem Ouederni, Gwen Salaün, Javier Cámara, Ernesto Pimentel.
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationComparison of spatial indexes
Comparison of spatial indexes Nathalie Andrea Barbosa Roa To cite this version: Nathalie Andrea Barbosa Roa. Comparison of spatial indexes. [Research Report] Rapport LAAS n 16631,., 13p. HAL
More informationLocal Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction
Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut
More informationFeature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationSelection Strategies for Initial Positions and Initial Velocities in Multi-optima Particle Swarms
ACM, 2011. This is the author s version of the work. It is poste here by permission of ACM for your personal use. Not for reistribution. The efinitive version was publishe in Proceeings of the 13th Annual
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More information3D CITY REGISTRATION AND ENRICHMENT
3D CITY REGISTRATION AND ENRICHMENT J. A. Quinn, P. D. Smart an C. B. Jones School of Computer Science, Cariff University {j.a.quinn, p.smart, c.b.jones}@cs.cf.ac.uk KEY WORDS: City moels, registration,
More informationNP versus PSPACE. Frank Vega. To cite this version: HAL Id: hal https://hal.archives-ouvertes.fr/hal
NP versus PSPACE Frank Vega To cite this version: Frank Vega. NP versus PSPACE. Preprint submitted to Theoretical Computer Science 2015. 2015. HAL Id: hal-01196489 https://hal.archives-ouvertes.fr/hal-01196489
More informationService Reconfiguration in the DANAH Assistive System
Service Reconfiguration in the DANAH Assistive System Said Lankri, Pascal Berruet, Jean-Luc Philippe To cite this version: Said Lankri, Pascal Berruet, Jean-Luc Philippe. Service Reconfiguration in the
More informationFrom an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller
From an Abstract Object-Oriente Moel to a Reay-to-Use Embee System Controller Stanislav Chachkov, Diier Buchs Software Engineering Laboratory, Swiss Feeral Institute for Technology 1015 Lausanne, Switzerlan
More informationSupporting Fully Adaptive Routing in InfiniBand Networks
XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationRough Set Approach for Classification of Breast Cancer Mammogram Images
Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationA Framework for Dialogue Detection in Movies
A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki
More informationMalware models for network and service management
Malware models for network and service management Jérôme François, Radu State, Olivier Festor To cite this version: Jérôme François, Radu State, Olivier Festor. Malware models for network and service management.
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationRDF/SPARQL Design Pattern for Contextual Metadata
RDF/SPARQL Design Pattern for Contextual Metadata Olivier Corby, Catherine Faron Zucker To cite this version: Olivier Corby, Catherine Faron Zucker. RDF/SPARQL Design Pattern for Contextual Metadata. IEEE/WIC/ACM
More informationProLD: Propagate Linked Data
ProLD: Propagate Linked Data Peter Kalchgruber University of Vienna, Faculty of Computer Science, Liebiggasse 4/3-4, A-1010 Vienna peter.kalchgruber@univie.ac.at Abstract. Since the Web of Data consists
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationk-balanced Sorting and Skew Join in MPI and MapReduce
k-balance Sorting an Skew Join in MPI an MapReuce Silu Huang, Aa Wai-Chee Fu Department of Computer Science an Engineering, Chinese University of Hong Kong slhuang,aafu@cse.cuhk.eu.hk Abstract We consier
More informationInverse Model to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach
Inverse Moel to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach 1 HAFEZ IBRAHIM, 2 JAMALLUDIN TALIB, 3 NORMAH MAAN Department of Mathematics Universiti Teknologi Malaysia 81310
More informationVerifying performance-based design objectives using assemblybased vulnerability
Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA
More information