Supervised tracking and correction of inconsistencies in RDF data

Size: px
Start display at page:

Download "Supervised tracking and correction of inconsistencies in RDF data"

Transcription

1 Supervise tracking an correction of inconsistencies in RDF ata Youen Péron, Frééric Raimbault, Gilas Ménier, Pierre-François Marteau To cite this version: Youen Péron, Frééric Raimbault, Gilas Ménier, Pierre-François Marteau. Supervise tracking an correction of inconsistencies in RDF ata <inria v2> HAL I: inria Submitte on 20 May 2011 HAL is a multi-isciplinary open access archive for the eposit an issemination of scientific research ocuments, whether they are publishe or not. The ocuments may come from teaching an research institutions in France or abroa, or from public or private research centers. L archive ouverte pluriisciplinaire HAL, est estinée au épôt et à la iffusion e ocuments scientifiques e niveau recherche, publiés ou non, émanant es établissements enseignement et e recherche français ou étrangers, es laboratoires publics ou privés.

2 Supervise tracking an correction of inconsistencies in RDF ata Youen Péron, Frééric Raimbault, Gilas Ménier, an Pierre-François Marteau Valoria, Université e Bretagne Su, Université Européene e Bretagne, Vannes, France {firstname.lastname}@univ-ubs.fr Abstract. The rapi evelopment of the Linke Data is hampere by the increase of errors in publishe ata, mainly relate to inconsistencies with omain ontologies. This problem alter reliability of application when analysis of inepenent an heterogeneous rf ata is involve. Therefore, it is important to improve the quality of the publishe ata to promote the evelopment of Semantic Web. We introuce a process esigne to etect an ientify specific inconsistencies in publishe ata, an to fix them at an ontological level. We propose a metho to quantitatively evaluate omain an range issues of a property. A iagnosis is then establishe an use to rive a supervise process for the correction (or possibly enhancement) of the ontology. We show the interest of this metho on a case stuy involving bpeia. The results of experiments carrie on very large ata sets generate with rf sp2bench benchmark valiate the applicability an scalability of our metho. 1 Introuction Launche in 2006 by Tim Berners-Lee, the Linke Data 1 movement an its recommenations is playing a leaing role for publishing, sharing, an interconnecting ata on the Semantic Web [3]. Many companies (eg. the BBC an The New York Times), organizations (eg. wikipeia Geonames, FreeBase, UN) an governments (eg. U.S. an U.K.) have aopte the principles of Linke Data to publish their ata using rf 2 stanar an their ontologies 3 using rfs 4 an owl 5 : the size an variety of available ata sets keep growing. April 2011, the Linke Data giant global graph ata has been estimate over 200 large ata sets (more than 1000 triplets each), an totaling 29 billion rf triples an 400 million links 6. Unfortunately, this uncontrolle growth is accompanie by a proliferation of errors in publishe ata associate with ontological inconsistencies. This problem alters application reliability when analysis of inepenent an heterogeneous rf ata is involve. Therefore, it is important to improve the quality of the publishe ata to promote the evelopment of the Semantic Web. Our metho quantitatively evaluates omain an property misuses an helps fix these problems. Most of the research ealing with ata quality in Semantic Web focus either on ontology (class an properties efinition) or raw ata (class an literal instances). Ontology valiation has been extensively stuie in [4, 2, 10, 8]. These works verify the consistency an completeness of an ontology within the assumptions of the open worl an non-unique ientification characterizing the semantic web : The tools are targete towars ontology esigners, irrespectively of the use relate to the ata publication. Surprisingly, valiation of raw ata has been much less stuie, even if it represents the main part of the publishe ata. Some tools have been esigne for syntactic valiation, such as vrp [14] a tool from ics-forthrffsuite 7. This kin of tools checks the ata compliance with the

3 RDF syntax an semantic constraints (also calle consistency logic) in ontologies - uner the assumption that the use ontologies are errors free. The origin of the error in raw ata is searche a syntactic level. Error reporting is performe iniviually for each erroneous instance. The Peantic Web s project 8 proposes iagnosis of ontology errors an (most important) recommenation to avoi them. In [6] the initiators of this project perform an analysis of errors foun in a sample set obtaine by crawling: they ientify four symptoms of recurring errors an propose recommenations to manage them. The authors also introuce an online tool, rf:alerts 9 esigne to etect these errors. Our contribution takes part to the Peantic Web main works: we propose to enhance the semantic analysis by aing range an omain verification for properties on non literal ata (unlike [6] where the analysis is strictly restricte to range checking on literal ata). Our analysis is performe on class instances, being subject or object of property. We also propose a way to measure the importance of errors etecte so that the priority of the correction can be evaluate: if a correction has to be one, we propose a iagnosis an an aapte fix. In [13], the authors also aress the problem of ata compliance to ontologies. They propose a generic evaluation metho of ata, base on systematic search of some error patterns: this search is performe by sparql queries applie to the euctive closure of the graph of all inference rules. Their formulation is complex because it requires negations (which is nont trivial for sparql). Since we want our metho to be scalable such to be teste on very large set of rf ata, we propose a one-rule inference (hierarchy) process to spee up the etection of possible errors. We performe our test using the parallel environment haoop an the request language pig. Their metho isn t proviing any assistance to correct the ontology. If necessary, our approach aims also to fill this gap. The rest of the paper is organize as follows: In part 2, we recall some basic concepts of the semantic web an we efine the notations use through out this article. The thir part is the escription of our processing metho. The evaluation an tests are introuce in the fourth section. Then we conclue with a iscussion in the last section. 2 Backgroun an notations In this part, we recall some concepts of the rf ata moel, rfs an owl vocabularies an we efine the notations we use in this paper. 2.1 rf moel Accoring to the rf ata moel, all information is expresse as a triplet (subject, preicate, object). The subject an preicate of a triple are resources ientifie by uris 10. In this article, we use the prefixe uri form to simplifies the examples. A triplet object can be either a ressource or a literal. Let U be the set of resources an L the set or literals. A triplet t is efine as follows : t = (s, p, o) U U (U L) Since a same resource can play the role of a subject or an object into a triplet, a set of triplets can be represente as a graph. We aress the abox/tbox separation problem (see [1]) by istributing the triplets in the terminology ata (tbox) an assertion ata (abox). 2.2 Meta Data Vocabulary Terminology information is escribe using specific rf, rfs or owl vocabulary as efine by W3C. We introuce here in often the terminology we use in this paper : 8 site : uri : Uniform Resource Ientifier

4 rf:type is a resource that provies an elementary system of belonging to a class. A triplet (r, rf : type, c) translates as r belongs to the class c. Let resources(c) be the set of resources belonging to the class c an let C be the set of classes. The number of resources in a class c is c = resoureces(c). A same resource can belong to several classes. All resources belong to the class owl:thing. rf:property is a class whose instances are use as preicate in a triplet. These resources are calle properties. Let the set of properties be P = resources(rf:property). A property s omains an tbox ranges are enote respectively by rfs:range an rfs:omain. Domain an range can be classes or even set of classes. Let omain(p) be the set of graph resources that belong to the object class of rfs:omain an let range(p) be the set of resources belonging to the object class of rfs:range. By efault, the omain an the tbox range of a property p are owl:thing. owl:objectproperty is the class of properties which range cannot be a literal, but only a class instance (also calle property-object in the text below). rfs:subclassof is a property escribing a subsumption relationship between a class c an a parent class f ( c f ). This is a transitive relationship : Each class can subsume itself : c 1, c 2, c 3 C (c 1 c 2 ) (c 2 c 3 ) = (c 1 c 3 ) c C, c c Let (c) be the set of classes that subsume a class c : (c) = {j C, j c} The generate hierarchy is efine as H. Let assume that, for each graph, the closure of this relationship has alreay been performe (as preprocessing) on the graph so that the following formula is true : ( u U), ( c, f C), (u c) (c f) = (u f) We use the metho of reasoning escribe in articles [15] an [7], which enable the implementation of inference rules on large (istribute) rf ata sets. 2.3 Effective omain an range Let omain e (p) be the set of resource subjects for a property p. Let range e (p) be the set of resource objects for a property p ɛ 10 5 ɛ r 10 4 # errors rank Fig. 1. Number of errors per property p as a function of the rank of p.

5 We check in paragraph 3 that the effective omain (resp. effective range) is inclue in the omain efine in the tbox (resp. in the range efine in the tbox). Let a omain error be efine as the occurrence of a subject resource of an object-property p that oes not belong to omain(p). Similarity, let a range error be efine as one occurrence of an object resource of an object-property p that oes not belong to range(p). As a preliminary test, we have evaluate the omain an range error ε (p) an ε r (p) in DBpeia for each object-property : 13.9 % of the properties has at least one omain error. These errors are epicte in figure 1: in wich x-axis represents the properties are sorte by escening number of errors an the y-axis represents the number of error per property. Each axis is in a log scale. The shape of the curve reveals that the errors are concentrate on a small number of objectproperties - locate left to the vertical otte line. The fixing of a small number of object-properties can enhance greatly the general consistency of the overall set of ata. The metho escribe above has two rawbacks : (i) it is time an space expensive (especially for large ata sets) because it relies on a ictionary for the classes of resources. (ii) the lack of inication of which instances has cause the error, prevents a etaile tracking of the problem an therefore the esign of a solution. In the following parts of this paper, we escribe another evaluation metho that overcome these problems. 3 Our metho We propose a three-stage processing approach to compute the upper boun of the error number per object-property. Then we show how to use it to iagnose the source of the errors. To illustrate this metho, we will escribe each step of application on the bpeia s objectproperty bpeia:hometown. Its efinition s omain is bpeia:person, but in reality it is use with resources that o not belong to this class. Figure 2 shows the result of our lines processing metho: in the left part, the omain of efinition of bpeia:hometown appears in otte - its effective omain is hatche shae - lines (note that the range is not epicte here). In the right part, we can see the hierarchy of the classes with the number of resources using the property. Fig. 2. Class bpeia:person is the omain of efinition of bpeia:hometown. The effective omain, hatche shae, is ivie between classes: bpeia:person an bpeia:ban. The values appearing in the class hierarchy are those of the histogram of classes for property. 3.1 Computation of a histogram for a property In the first stage, we calculate the istribution of the resources in the effective omain e (p) an the effective range range e (p) of an object-property p in the set of classes C. Let us efine two

6 histograms of size C : p for the resources of the omain of p an p r for the resources involve in the range of p : p [c] = ressources(c) omain e (p) p r [c] = ressources(c) range e (p) In the case of object-property bpeia:hometown, the values of the histogram are inicate on the tree of Figure 2 for the relevant classes an are 0 for the other classes. Generally, the maximum coorinate of these histogram (omain an range) is for the class owl:thing because it inclues all of the instances member of the omain an of the effective range. p [owl:thing] = max c C {p [c]} p r [owl:thing] = max c C {p r [c]} In our example (bpeia), the object-property bpeia:hometown is involve by resources (istribute between people an organizations). 3.2 Searching for the most specific class In the secon stage, using the histogram for an object-property p, we select the most specific class class (p) that inclues the effective omain of p. It is obtaine by fining the lowest class in the hierarchy H among the classes containing the effective omain of the property. By esign, class (p) features both the following relations : (i) p [class (p)] = p [owl:thing] (ii) ( c C)(c class (p)) (p [c] < p [owl:thing]) (class (p) c) (i) ensures that resources(class (p)) inclues omain e (p) an (ii) ensures that class (p) is the most specific class containing omain e (p). Since we assume the assumption that the classes of instances meet a hierarchy : c 1 c 2 = (p [c 1 ] p [c 2 ]) This proves the existence an unicity of class (p). In the above example (see figure 2), owl:thing is the most specific class for bpeia:hometown that inclues the effective omain. In the same way as for the omain, lets efine class r (p) the more specific class that inclues the real range of p : (i) p r [class r (p)] = p r [owl:thing] (ii) ( c C)(c class r (p) (p r [c] < p r [owl:thing]) (class r (p) c) 3.3 Computing the upper boun of the number of errors The last stage, involves the computation of the upper boun of the number of errors ε sup (p) - for the omain of p - an ε sup r (p) for the range of the object-property p. ε sup ε sup r (p) = p [class (p)] omain(p) (p) = p r [class r (p)] range(p) The eviation between the number of errors an the upper boun is relate to the resource (or the effective range) belonging to more than one class : these resources may be counte several times using the hierarchy of classes they belong to. In the figure 2 example, the omain of efinition is the class bpeia:person. The upper boun of error is : ε sup (bpeia:hometown) = p [owl:thing] p [bpeia:person] = This means that resources are subjects of bpeia:hometown even if they o not belong to its omain of efinition (here bpeia:person). We show in 4.1 that this upper boun matches perfectly the number of errors compute using the naive counting process.

7 3.4 Diagnostics an error correction After having etect potential problems, we will now escribe how it is possible to fin an fix errors. In the current example of figure 2, there is for instance a problem with bpeia:hometown. The stuy of histogram class for bpeia:hometown shows that most of the errors comes from the instance of bpeia:ban. These instances use the property bpeia:hometown but o not belong to the efinition omain of bpeia:person. A first iea involves the application of the following assumption : each resource use as a subject of a property belongs to the efinition omain of the class of this property. (3) r omain e (p) = r omain(p) In the case of bpeia:hometown, this woul imply that each music group (instance of bpeia:ban) belongs also to people (instance of bpeia:person). For instance, the resource bpeia:the Beach Boys use the property bpeia:hometown but it is not an instance of bpeia:person. Changing this an letting bpeia:the Beach Boys belong to bpeia:person may introuce errors on search relate to bpeia:person. A secon solution woul rely on the use of two ifferent properties for the music group an for people. This is not acceptable since it woul uplicate properties that have the same meaning - some ontology level problem may then arise. A thir iea is to relax the efinition omain of bpeia:hometown. In the bpeia hierarchy, owl:thing is the only less specific class than bpeia:person. The problem is that bpeia:hometown is not compatible with every bpeia s classes. At least, we think that the best solution in this case, is to a the bpeia:ban class to the efinition omain of bpeia:hometown. In general, we propose a iagnostic on erroneous efinition omain for property using the following scheme : if it seems that most of the instances of effective omain of the property belong to the efinition omain s class then the inference (3) applies else if the property may have ifferent senses for the ifferent resources then as much istinct properties as neee are create (one for each semantic) else if it is possible to fin a class that inclues a part of the effective omain an complies with the semantic of the property an for which the number of errors is acceptable then the efinition omain of this class is wiene else the efinition of the property is enhance by merging it to the set of classes from the effective omain. 4 Evaluation In this section, we analyze the quality of the results obtaine by our approach applie on bpeia (version 3.6), then we valiate the scalability of our metho using the benchmark sp2bench [12]. 4.1 DBpeia analysis bpeia is built upon an ontology 11 of 272 classes, 629 object-properties an 706 litteral-properties. Range an omain of each property are efine by a class or a set of classes. The ata in 843, 000 articles from Wikipeia (English version) are extracte an projecte to a 3.5 million resources graph that complies to the ontology. We performe our analysis on this set of ata - effective omain an range evaluation an etermination of the upper boun number of errors. An online emo that present the results of our system is available

8 Comparison with the exact number of error The table 1 shows a selection of the properties having the most errors an compares the upper boun error ε sup (p) to the exact number of errors ε (p) - see paragraph Comparison of omain ε (p) ε sup (p) bpeia:class 166, ,004 bpeia:hometown 21,287 21,287 bpeia:network 12,171 12,171 bpeia:sisterstation 5,044 5,044 bpeia:esigner 3,028 3,028 Comparison of range ε r(p) ε sup r (p) bpeia:city 12,168 12,168 bpeia:associatemusicalartist 11,027 11,027 bpeia:artist 10,166 10,166 bpeia:associateban 6,809 6,809 bpeia:sisterstation 5,464 5,464 Table 1. Comparison of the upper boun error an the excat number of errors on the first top 5 erroneous properties This table shows that the upper boun error ε sup (p) perfectly matches ε (p) : this is not surprising since every resource use in these properties belongs to one an only one class. Case stuy. We iscuss below some cases of errors encountere in bpeia using the iagnostic process presente in paragraph 3.4. bpeia:architect is eicate to the instance of builings (bpeia:builings class) but is in fact use in conjunction with bpeia:place - which is, into the hierarchy, parent to bpeia:builings. It seems acceptable to assume that every place having an architect is a builing. For instance, the Mongomery place in New York is an instance of bpeia:place. Even if this place has an architect, it oes not belong to bpeia:builing. We propose to a the Montgomery place to bpeia:builing. bpeia:class is the property causing the greatest number of errors. The notion of class is use in two ifferent contexts. Accoring to the ontology, this property shoul be use with transportation items. The histogram show that this property is mainly use by sub classes of bpeia:species - which has no relationship with transportation. Species are in no way means of transportation (with exceptions such as horses). In this case, the inference rule (3) see in 3.4 shoul not apply. It seems that bpeia can have ifferent semantics relate to bpeia:species or bpeia:meansoftransportation. We propose to fix this ambiguous property by creating - for each context - new properties in the tbox (an use the correct property in the abox) bpeia:city has the efinition range bpeia:city. Resources from its effective range are mainly location instances (bpeia:place is a parent class of bpeia:city). For instance, the triplet (Cincinnati bengals, bpeia:city, paul brown staium) means that the American football team Cincinnati Bengals is locate in the Paul Brown Staium. It is therefore elicate to assume that all the places use as objects for bpeia:city are cities. The property seems to have one an only one semantic for all resources in the effective range so it oesn t seem necessary to uplicate it. The most specific class that inclues the effective range is owl:thing. This class is much too general to be use as range. The bpeia:place is the best trae-off between the number of errors an the semantic consistency (only 37 resources among of the effective range of bpeia:city are not instances of the bpeia:place class).

9 Fig. 3. Execution times require for the computation of the histograms as a function of the number of triplets generate by sp2bench 4.2 Scalability We have use the pig system [9] on a cluster of 16 computers which can process up to 250 tasks in parallel. Since we want to stuy the processing time base on the graph size, we have teste our metho on series of test sets of increasing size generate by sp2bench [12]. sp2bench is mainly esigne to evaluate sparql engines but it is also useful for scalable ata sets generation. We have introuces errors in abox by changing the reference ontology (tbox). The errors are etecte an counte following a two step process : 1. the computation of istribution histograms execute in a ata-parallel way. (see paragraph 3.1) 2. the upper boun error is sequentially compute given the histograms an the tbox. This last step uration is not comparable to the histogram s computation so we ignore it in our results. Figure 3 shows the results. We use a log scale for the two axis. The execution time is multiplie by 3 when the size of ata increases by a factor of This results show that our metho scales relatively well acceptably scalable an emonstarte it efficiency on very large rf atasets. 5 Conclusion We have escribe an evaluate a metho that analysis a rf graph an computes upper bouns for the omain/range errors number for a given property. In the case of bpeia, this error matches exactly the number of errors. We explaine how to perform an error iagnosis an propose ways to fix the ontology accoringly. As an example, we applie this process to bpeia an suggest eicate fixing proceures.. The experimentations carrie on large set of ata show promising results an emonstrate the relative scalability an usability of our metho for quantitative stuy of the evolution of Semantic Web Data.

10 Our approach has nevertheless some limitations: for instance, we assume that the class hierarchy is error free so that it is possible to infer new relations. In some situations, the hierarchy relations shoul be checke or perhaps rebuilt - some systems [11] can compute a new hierarchy base on hierarchy clustering: anyway, this woul be mae uner the assumption of instances correctness. These two problems are closely relate so the scanning of the ata base shoul involve jointly these processes that must be run in intricate ways. We are currently expaning our metho to the processing of other OWL constraints such as range restriction (owl:allvaluefrom), isjonctions (owl:isjoint), carinality (owl:carinality) etc.. The iagnosis coul also be enhance using a semi-supervise process involving the selection of the most relevant example - for instance using page rank like algorithm [5]. References 1. Baaer, F.: The escription logic hanbook: theory, implementation, an applications. Cambrige Univ Pr (2003) 2. Baclawski, K., Matheus, C., Kokar, M., Letkowski, J., Kogut, P.: Towars a symptom ontology for semantic web applications. In: ISWC. p (2004) 3. Bizer, C., Heath, T., Berners-Lee, T.: Linke ata - the story so far. Int. J. Semantic Web Inf. Syst. 5(3), 1 22 (2009) 4. Gomez-Perez, A.: Evaluation of ontologies. International Journal of Intelligent Systems 16(3), (2001) 5. Hogan, A., Harth, A., Decker, S.: Reconrank: A scalable ranking metho for semantic web ata with context. In: 2n Workshop on Scalable Semantic Web Knowlege Base Systems. Citeseer (2006) 6. Hogan, A., Harth, A., Passant, A., Decker, S., Polleres, A.: Weaving the peantic web. In: 3r International Workshop on Linke Data on the Web (LDOW2010), in conjunction with 19th International Worl Wie Web Conference, CEUR (2010) 7. Hogan, A., Harth, A., Polleres, A.: Scalable authoritative OWL reasoning for the web. Information Systems 5(2), (2009) 8. Kalyanpur, A., Parsia, B., Sirin, E., Henler, J.A.: Debugging unsatisfiable classes in owl ontologies. Journal of Web Semantics 3(4), (2005) 9. Olston, C., Ree, B., Srivastava, U., Kumar, R., Tomkins, A.: Pig latin: a not-so-foreign language for ata processing. In: Proceeings of the 2008 ACM SIGMOD international conference on Management of ata. pp ACM (2008) 10. Parsia, B., Sirin, E., Kalyanpur, A.: Debugging owl ontologies. In: International Worl Wie Web Conference. pp (2005) 11. Quan, T., Hui, S., Cao, T.: A fuzzy FCA-base approach to conceptual clustering for automatic generation of concept hierarchy on uncertainty ata. In: Proc. of the 2004 Concept Lattices an Their Applications Workshop. pp Citeseer (2004) 12. Schmit, M., Hornung, T., Lausen, G., Pinkel, C.: SPˆ 2Bench: A SPARQL Performance Benchmark. In: Data Engineering, ICDE 09. IEEE 25th International Conference on. pp IEEE (2009) 13. Tao, J., Ding, L., McGuinness, D.L.: Instance ata evaluation for semantic web-base knowlege management systems. In: Proceeings of the 42th Hawaii International Conference on System Sciences (HICSS-42). pp Big Islan, Hawaii (2009) 14. Tolle, K.: Valiating RDF Parser: A Tool for Parsing an Valiating RDF Metaata an Schemas. Master s thesis, University of Hannover (2000) 15. Urbani, J., Kotoulas, S., Oren, E., van Harmelen, F.: Scalable istribute reasoning using mapreuce. The Semantic Web-ISWC 2009 pp (2009)

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Directed Louvain : maximizing modularity in directed networks

Directed Louvain : maximizing modularity in directed networks Directe Louvain : maximizing moularity in irecte networks Nicolas Dugué, Anthony Perez To cite this version: Nicolas Dugué, Anthony Perez. Directe Louvain : maximizing moularity in irecte networks. [Research

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

An FCA Framework for Knowledge Discovery in SPARQL Query Answers

An FCA Framework for Knowledge Discovery in SPARQL Query Answers An FCA Framework for Knowledge Discovery in SPARQL Query Answers Melisachew Wudage Chekol, Amedeo Napoli To cite this version: Melisachew Wudage Chekol, Amedeo Napoli. An FCA Framework for Knowledge Discovery

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Scalewelis: a Scalable Query-based Faceted Search System on Top of SPARQL Endpoints

Scalewelis: a Scalable Query-based Faceted Search System on Top of SPARQL Endpoints Scalewelis: a Scalable Query-based Faceted Search System on Top of SPARQL Endpoints Joris Guyonvarc H, Sébastien Ferré To cite this version: Joris Guyonvarc H, Sébastien Ferré. Scalewelis: a Scalable Query-based

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Sewelis: Exploring and Editing an RDF Base in an Expressive and Interactive Way

Sewelis: Exploring and Editing an RDF Base in an Expressive and Interactive Way Sewelis: Exploring and Editing an RDF Base in an Expressive and Interactive Way Sébastien Ferré, Alice Hermann To cite this version: Sébastien Ferré, Alice Hermann. Sewelis: Exploring and Editing an RDF

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Towards an Adaptive Completion of Sparse Call Detail Records for Mobility Analysis

Towards an Adaptive Completion of Sparse Call Detail Records for Mobility Analysis Towars an Aaptive Completion of Sparse Call Detail Recors for Mobility Analysis Guangshuo Chen, Aline Carneiro Viana, Carlos Sarraute To cite this version: Guangshuo Chen, Aline Carneiro Viana, Carlos

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

SPARQL Update under RDFS Entailment in Fully Materialized and Redundancy-Free Triple Stores

SPARQL Update under RDFS Entailment in Fully Materialized and Redundancy-Free Triple Stores SPARQL Upate uner RDFS Entailment in Fully Materialize an Reunancy-Free Triple Stores Albin Ahmeti 1 an Axel Polleres 2 1 Vienna University of Technology, Favoritenstraße 9, 1040 Vienna, Austria 2 Vienna

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Linked data from your pocket: The Android RDFContentProvider

Linked data from your pocket: The Android RDFContentProvider Linked data from your pocket: The Android RDFContentProvider Jérôme David, Jérôme Euzenat To cite this version: Jérôme David, Jérôme Euzenat. Linked data from your pocket: The Android RDFContentProvider.

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Tacked Link List - An Improved Linked List for Advance Resource Reservation

Tacked Link List - An Improved Linked List for Advance Resource Reservation Tacked Link List - An Improved Linked List for Advance Resource Reservation Li-Bing Wu, Jing Fan, Lei Nie, Bing-Yi Liu To cite this version: Li-Bing Wu, Jing Fan, Lei Nie, Bing-Yi Liu. Tacked Link List

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

QAKiS: an Open Domain QA System based on Relational Patterns

QAKiS: an Open Domain QA System based on Relational Patterns QAKiS: an Open Domain QA System based on Relational Patterns Elena Cabrio, Julien Cojan, Alessio Palmero Aprosio, Bernardo Magnini, Alberto Lavelli, Fabien Gandon To cite this version: Elena Cabrio, Julien

More information

Change Detection System for the Maintenance of Automated Testing

Change Detection System for the Maintenance of Automated Testing Change Detection System for the Maintenance of Automated Testing Miroslav Bures To cite this version: Miroslav Bures. Change Detection System for the Maintenance of Automated Testing. Mercedes G. Merayo;

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

YAM++ : A multi-strategy based approach for Ontology matching task

YAM++ : A multi-strategy based approach for Ontology matching task YAM++ : A multi-strategy based approach for Ontology matching task Duy Hoa Ngo, Zohra Bellahsene To cite this version: Duy Hoa Ngo, Zohra Bellahsene. YAM++ : A multi-strategy based approach for Ontology

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Assisted Policy Management for SPARQL Endpoints Access Control

Assisted Policy Management for SPARQL Endpoints Access Control Assisted Policy Management for SPARQL Endpoints Access Control Luca Costabello, Serena Villata, Iacopo Vagliano, Fabien Gandon To cite this version: Luca Costabello, Serena Villata, Iacopo Vagliano, Fabien

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

Enabling Rollback Support in IT Change Management Systems

Enabling Rollback Support in IT Change Management Systems Enabling Rollback Support in IT Change Management Systems Guilherme Sperb Machao, Fábio Fabian Daitx, Weverton Luis a Costa Coreiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisanro Zambeneetti

More information

YANG-Based Configuration Modeling - The SecSIP IPS Case Study

YANG-Based Configuration Modeling - The SecSIP IPS Case Study YANG-Based Configuration Modeling - The SecSIP IPS Case Study Abdelkader Lahmadi, Emmanuel Nataf, Olivier Festor To cite this version: Abdelkader Lahmadi, Emmanuel Nataf, Olivier Festor. YANG-Based Configuration

More information

Coloring RDF Triples to Capture Provenance

Coloring RDF Triples to Capture Provenance Coloring RDF Triples to Capture Provenance Giorgos Flouris 1, Irini Funulaki 1, Panagiotis Peiaitis 1,2, Yannis Theoharis 1,2, an Vassilis Christophies 1,2 1 Institute of Computer Science, FORTH, Greece

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

Reverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces

Reverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces Reverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces Romain Delamare, Benoit Baudry, Yves Le Traon To cite this version: Romain Delamare, Benoit Baudry, Yves Le Traon. Reverse-engineering

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Teaching Encapsulation and Modularity in Object-Oriented Languages with Access Graphs

Teaching Encapsulation and Modularity in Object-Oriented Languages with Access Graphs Teaching Encapsulation and Modularity in Object-Oriented Languages with Access Graphs Gilles Ardourel, Marianne Huchard To cite this version: Gilles Ardourel, Marianne Huchard. Teaching Encapsulation and

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Fuzzy Clustering in Parallel Universes

Fuzzy Clustering in Parallel Universes Fuzzy Clustering in Parallel Universes Bern Wisweel an Michael R. Berthol ALTANA-Chair for Bioinformatics an Information Mining Department of Computer an Information Science, University of Konstanz 78457

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Setup of epiphytic assistance systems with SEPIA

Setup of epiphytic assistance systems with SEPIA Setup of epiphytic assistance systems with SEPIA Blandine Ginon, Stéphanie Jean-Daubias, Pierre-Antoine Champin, Marie Lefevre To cite this version: Blandine Ginon, Stéphanie Jean-Daubias, Pierre-Antoine

More information

Research Article Research on Law s Mask Texture Analysis System Reliability

Research Article Research on Law s Mask Texture Analysis System Reliability Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

Graphe-Based Rules For XML Data Conversion to OWL Ontology

Graphe-Based Rules For XML Data Conversion to OWL Ontology Graphe-Based Rules For XML Data Conversion to OWL Ontology Christophe Cruz, Christophe Nicolle To cite this version: Christophe Cruz, Christophe Nicolle. Graphe-Based Rules For XML Data Conversion to OWL

More information

Structuring the First Steps of Requirements Elicitation

Structuring the First Steps of Requirements Elicitation Structuring the First Steps of Requirements Elicitation Jeanine Souquières, Maritta Heisel To cite this version: Jeanine Souquières, Maritta Heisel. Structuring the First Steps of Requirements Elicitation.

More information

Coloring RDF Triples to Capture Provenance

Coloring RDF Triples to Capture Provenance Coloring RDF Triples to Capture Provenance G. Flouris 1, I. Funulaki 1, P. Peiaitis 1,2, Y. Theoharis 1,2, an V. Christophies 1,2 1 Institute of Computer Science, FORTH, Greece an 2 Computer Science Department,

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Performance Characterization of a Bluetooth Piconet with Multi Slot Packets

Performance Characterization of a Bluetooth Piconet with Multi Slot Packets Performance Characterization of a Bluetooth Piconet with Multi Slot Packets aniele Miorani Carlo Caimi Anrea anella To cite this version: aniele Miorani Carlo Caimi Anrea anella. Performance Characterization

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Capturing Provenance of RDF Triples through Colors

Capturing Provenance of RDF Triples through Colors Capturing Provenance of RDF Triples through Colors G. Flouris FORTH-ICS, Greece fgeo@ics.forth.gr I. Funulaki FORTH-ICS, Greece funul@ics.forth.gr Y. Theoharis FORTH-ICS, Greece University of Crete, Greece

More information

Analysis of Virtual Machine System Policies

Analysis of Virtual Machine System Policies Analysis of Virtual Machine System Policies Sanra Ruea, Hayawarh Vijayakumar, Trent Jaeger Systems an Internet Infrastructure Security Laboratory The Pennsylvania State University University Park, PA,

More information

ASAP.V2 and ASAP.V3: Sequential optimization of an Algorithm Selector and a Scheduler

ASAP.V2 and ASAP.V3: Sequential optimization of an Algorithm Selector and a Scheduler ASAP.V2 and ASAP.V3: Sequential optimization of an Algorithm Selector and a Scheduler François Gonard, Marc Schoenauer, Michele Sebag To cite this version: François Gonard, Marc Schoenauer, Michele Sebag.

More information

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation Fuzzy Learning ariable Amittance Control for Human-Robot Cooperation Fotios Dimeas an Nikos Aspragathos Abstract This paper presents a metho for variable amittance control in human-robot cooperation tasks,

More information

Open Access Adaptive Image Enhancement Algorithm with Complex Background

Open Access Adaptive Image Enhancement Algorithm with Complex Background Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

ACE: And/Or-parallel Copying-based Execution of Logic Programs

ACE: And/Or-parallel Copying-based Execution of Logic Programs ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel

More information

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset Vol.3, Issue.1, Jan-Feb. 013 pp-504-508 ISSN: 49-6645 A PSO Optimize Layere Approach for Parametric Clustering on Weather Dataset Shikha Verma, 1 Kiran Jyoti 1 Stuent, Guru Nanak Dev Engineering College

More information

Comparator: A Tool for Quantifying Behavioural Compatibility

Comparator: A Tool for Quantifying Behavioural Compatibility Comparator: A Tool for Quantifying Behavioural Compatibility Meriem Ouederni, Gwen Salaün, Javier Cámara, Ernesto Pimentel To cite this version: Meriem Ouederni, Gwen Salaün, Javier Cámara, Ernesto Pimentel.

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Comparison of spatial indexes

Comparison of spatial indexes Comparison of spatial indexes Nathalie Andrea Barbosa Roa To cite this version: Nathalie Andrea Barbosa Roa. Comparison of spatial indexes. [Research Report] Rapport LAAS n 16631,., 13p. HAL

More information

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Selection Strategies for Initial Positions and Initial Velocities in Multi-optima Particle Swarms

Selection Strategies for Initial Positions and Initial Velocities in Multi-optima Particle Swarms ACM, 2011. This is the author s version of the work. It is poste here by permission of ACM for your personal use. Not for reistribution. The efinitive version was publishe in Proceeings of the 13th Annual

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

3D CITY REGISTRATION AND ENRICHMENT

3D CITY REGISTRATION AND ENRICHMENT 3D CITY REGISTRATION AND ENRICHMENT J. A. Quinn, P. D. Smart an C. B. Jones School of Computer Science, Cariff University {j.a.quinn, p.smart, c.b.jones}@cs.cf.ac.uk KEY WORDS: City moels, registration,

More information

NP versus PSPACE. Frank Vega. To cite this version: HAL Id: hal https://hal.archives-ouvertes.fr/hal

NP versus PSPACE. Frank Vega. To cite this version: HAL Id: hal https://hal.archives-ouvertes.fr/hal NP versus PSPACE Frank Vega To cite this version: Frank Vega. NP versus PSPACE. Preprint submitted to Theoretical Computer Science 2015. 2015. HAL Id: hal-01196489 https://hal.archives-ouvertes.fr/hal-01196489

More information

Service Reconfiguration in the DANAH Assistive System

Service Reconfiguration in the DANAH Assistive System Service Reconfiguration in the DANAH Assistive System Said Lankri, Pascal Berruet, Jean-Luc Philippe To cite this version: Said Lankri, Pascal Berruet, Jean-Luc Philippe. Service Reconfiguration in the

More information

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller From an Abstract Object-Oriente Moel to a Reay-to-Use Embee System Controller Stanislav Chachkov, Diier Buchs Software Engineering Laboratory, Swiss Feeral Institute for Technology 1015 Lausanne, Switzerlan

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

Malware models for network and service management

Malware models for network and service management Malware models for network and service management Jérôme François, Radu State, Olivier Festor To cite this version: Jérôme François, Radu State, Olivier Festor. Malware models for network and service management.

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

RDF/SPARQL Design Pattern for Contextual Metadata

RDF/SPARQL Design Pattern for Contextual Metadata RDF/SPARQL Design Pattern for Contextual Metadata Olivier Corby, Catherine Faron Zucker To cite this version: Olivier Corby, Catherine Faron Zucker. RDF/SPARQL Design Pattern for Contextual Metadata. IEEE/WIC/ACM

More information

ProLD: Propagate Linked Data

ProLD: Propagate Linked Data ProLD: Propagate Linked Data Peter Kalchgruber University of Vienna, Faculty of Computer Science, Liebiggasse 4/3-4, A-1010 Vienna peter.kalchgruber@univie.ac.at Abstract. Since the Web of Data consists

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

k-balanced Sorting and Skew Join in MPI and MapReduce

k-balanced Sorting and Skew Join in MPI and MapReduce k-balance Sorting an Skew Join in MPI an MapReuce Silu Huang, Aa Wai-Chee Fu Department of Computer Science an Engineering, Chinese University of Hong Kong slhuang,aafu@cse.cuhk.eu.hk Abstract We consier

More information

Inverse Model to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach

Inverse Model to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach Inverse Moel to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach 1 HAFEZ IBRAHIM, 2 JAMALLUDIN TALIB, 3 NORMAH MAAN Department of Mathematics Universiti Teknologi Malaysia 81310

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information