Processing Ubiquitous Personal Event Streams to Provide User-Controlled Support

Size: px
Start display at page:

Download "Processing Ubiquitous Personal Event Streams to Provide User-Controlled Support"

Transcription

1 Processing Ubiquitous Personal Event Streams to Provide User-Controlled Support Jeremy Debattista, Simon Scerri, Ismael Rivera, and Siegfried Handschuh Digital Enterprise Research Institute, National University of Ireland, Galway Abstract. The increase in use of smart devices nowadays provides us with a lot of personal data and context information. In this paper we describe an approach which allows users to define and register rules based on their personal data activities in an event processor, which continuously listens to perceived context data and triggers any satisfied rules. We describe the Rule Management Ontology (DRMO) as a means to define rules using a standard format, whilst providing a scalable solution in the form of a Rule Network Event Processor which detects and analyses events, triggering rules which are satisfied. Following an evaluation of the network v.s. a simplistic sequential approach, we justify a trade-off between initialisation time and processing time. 1 Introduction The increase in the use of smart mobile devices provides us with ample data regarding the users surroundings, activities and information. This data can be collected from various applications, embedded physical sensors (such as GPS), and users online presence. As this information is heterogeneous in nature, it cannot be readily unified under a common domain model. This limits the potential of having smart devices operating on this combined user data, in order to provide added value. If this limitation is addressed, smart devices can become increasingly aware of a user s activities, situations and habits. As a result, daily repetitive tasks (e.g. changing the mobile mode to silent when arriving at work) can be automated or suggested to the user. The di.me 1 project addresses the above limitation by unifying the user s personal information across various heterogeneous sources, including social networks and personal devices, into one standardised data representation format. di.me restricts the working Knowledge Base (KB) to cover a personal closed-world environment; introducing and extending ontologies modeling the user s Personal Information Model (PIM). Thus we represent both information about me 2 (such as current location, nearby persons, live This work is supported in part by the European Commission under the Seventh Framework Program FP7/ (digital.me ICT ) and in part by Science Foundation Ireland under Grant No. SFI/08/CE/I1380 (Líon-2) term coined by David Karger in the blog:

2 2 Lecture Notes in Computer Science posts, etc) and for me 2 (such as calendar, s, contacts, etc), rather than just the latter, as covered by the Social Semantic Desktop [8]. The availability of the di.me PIM enables us to tap this personal data and allow users to define declarative rules. In di.me, we develop a scalable solution that assists the user with daily repetitive tasks within a personal information sphere. This paper s objectives are to: 1. Enable the declarative representation of event patterns and associated actions (i.e. rules), so as to enable both human users and their machines to make sense of them; 2. Create an Event Processor that interprets declarative rules, detects events and triggers the desired actions; 3. Evaluate the performance and scalability of the Event Processor implemented. The rest of this paper is organised as follows: Section 2 compares related work; Section 3 and 4 focus on the DRMO ontology and Event Processor respectively; whereas Section 5 presents the process and results of our evaluation. Future work will be discussed in the concluding remarks in Section 6. 2 Related Work Every solution which implements event processing requires an underlying rulelanguage. Systems such as [2] propose rule languages which are specific to their particular framework. One major issue in such approaches is that the modelled rules cannot be easily reused on other frameworks. RuleML 3 is an XML markup language which allows rules to be defined using a formal notation. Since our user-defined rules are dependant on PIM data, the use of the Resource Description Framework (RDF) to model rules was a natural choice. In contrast to XML-based frameworks, RDF helps us achieve semantic interoperability more easy [4]. Since in di.me we strive to have one unified model to represent the user s KB, XML based rules would need to be transformed into RDF prior to being stored in the user s PIM. Another advantage of RDF over XML is that known knowledge can be reused in rule instances having the same semantics, thus for example saved rule conditions can be reused in other rule instances. Complex Event Processing (CEP) and Rule-based systems are commonly used to allow rules to define how perceived data (or events) is processed. Whilst CEP (using the Event-Condition-Action pattern) rules are only triggered by specific events and do not need advanced matching techniques such as RETE, production rules are constantly being monitored for activation using such algorithms. The DRMO vocabulary allows users to express rules whose conditions can be expressed in a sequential fashion using the succeeded by and preceded by operators, though rules are not necessarily activated via specific events. Therefore DRMO rules can be classified as production rules with the added value of temporal constraints. Our approach in creating an event processor is to exploit CEP properties that enable the use of temporal constraints in rules and perceive data from multiple sources, whilst having a rule processing algorithm to filter and trigger relevant rules. Traditionally, the Rete algorithm [5] is used in rule-based systems to match facts with rule patterns. This algorithm was extended by various efforts 3

3 Lecture Notes in Computer Science 3 including in [9], where the authors tackle the missing temporal aspect to support complex event detection. One main problem of the original Rete Algorithm is that values in the network should be explicit, where non-constants and variables requiring further querying in a KB are not allowed. In this paper we create a Rule Network based on the idea of the Rete network, supporting the two mentioned shortcomings; temporal aspect, and allowing implicit values in the tree. Unlike Rete, the proposed Rule Network will be used to efficiently filter rules, rather than to match conditions with nodes. 3 di.me Rule Management Ontology (DRMO) The Rule Management Ontology (Figure 1) concepts are inspired by the Event- Condition-Action (ECA) pattern. The ECA pattern is used in event-driven architectures, where the event specifies what triggers the rule, what conditions to specify, and what actions are executed, unlike in our case where DRMO rules do not expect any transaction event signals (such as on update or on delete ) to invoke the rule. The DRMO is based on the following rule pattern: if R = {a 1,.., a n } ; R = {c 1,..., c m } ; C m = {c m1,..., c mn } (1) where R represents a rule that consists of a combination of conditions c m, triggering one or more resulting actions a n. c m consists of a number of constraints c mn, possibly recursive. In theory, constraints can be applied recursively, thus allowing an infinite number of embedded conditions. For practical reasons, we expect applications of DRMO to set a limit on the amount of embedded conditions (more on this later). We refer the reader to [3] or the schema online 4 for a full description of the ontology. 3.1 Defining Rules Fig. 1. An extract of the Rule Management Ontology 5 Figure 2 demonstrates how a user can define a rule using the intelligent di.me User Interface(UI) [7]. The defined rule consists of three adjoined conditions (a specific usercreated Situation, a Contact and an Image) and an action (share image). The latter two conditions have been constrained. The full rule can be described as: When in Situation going out and in the vicinity of any Contact(s) belonging to a Group Friends and a new Image is created then: Share the Image with that Contact(s). This functionality The full visualisation and description of the DRMO ontology can be found online:

4 4 Lecture Notes in Computer Science is similar to that used in IFTTT 6 services, where users can define rules in terms of condition blocks and actions. JSON 7 is used as a communication interface between the DRMO instances stored in the PIM and the UI. Fig. 2. Creating rules using the Rule Manager in di.me userware 4 Rule Network Event Processor For the Rule Network Event Processor, a network is generated based on the idea of Forgy s Rete network [5], where DRMO rule instances are registered in the event processor, forming a network structure. Rule instances are also transformed into SPARQL queries, each of which is stored in a level above the network s terminal node. An algorithm based on the K-Shortest Path [10] is proposed to filter and trigger candidate rules from the network. The system architecture is illustrated in Figure 3. Different sources send data about the user s activities, surroundings and information as registered in the PIM. A broadcaster broadcasts the new events to the registered processes (the rule network), which is then processed to trigger any rules relevant to the newly perceived event. A garbage collection (GC) service is attached to the rule network to discard any expired partial results stored in join nodes. Below, we first discuss how rules are transformed into a rule network carrying SPARQL queries. Then, we explain the event object and its lifetime in the rule network. Finally we show how the network is processed to filter and trigger those which are satisfied. Fig. 3. General System Architecture Fig. 4. A Rule Network Example

5 Lecture Notes in Computer Science Building the Network In our rule network we define six different nodes. The Root node is the one with no incoming vertices and the Terminal node is the one with no outgoing vertices. Figure 4 is an example of a rule network. Each rule instance registered to the event processor is fed through the root node of the network to start the process of adding rules to the network and transforming them into SPARQL queries. A rule instance is first broken down into a number of conditions defined by the property drmo:iscomposedof. These conditions and their constraints are attached to the network s root as nodes, starting with the Object-Type node (in Figure 4, nmo: ) and finishing with the Rule node (represented as circle nodes : R1, R2, R3), storing the transformed SPARQL query. Then, for each of condition s constraints, we check the drmo:hasconstraintonproperty and add the node to the network (attached to the previously added Object-Type node), followed by the associated constraint value (subject/object) node. These last two mentioned nodes are Triple-type nodes (shown as rectangles in Figure 4) and store the triple patterns required to create the final query. Two conditions (in a rule) can be joined together using the Join node, apart from those linked together with a drmo:or operator. In the latter case, the event processor handles the drmo:or joined conditions as two distinct rules triggering the same action since these are independent from each other (see all supported operators in [3]). An advantage of this decision is that for such queries the response time is decreased, as we are adding less triple patterns to the queries. A Join node refers to two ordered inputs. For each input we store the intermediate query and intermediate result. The advantage of storing intermediate results is that during processing they enable us to check if a rule can be triggered based on the intermediate result. Intermediate queries are used in order to avoid using SPARQL FILTERS to compare the event s occurrence time for rule conditions joined by the drmo:succeededby and drmo:precededby operators. Another advantage of storing intermediate results is that unlike the sequential processor defined in [3], there is no need for an Event Log to keep track of the perceived events. Similar to [9] the ordered inputs are used to check the temporal constraints of a rule. If the join node is a succeededby node, then the left input must be satisfied first in order to trigger the right input (and vice-versa for a preceededby node, where the right input is the first input to be satisfied). There is no particular order for and join nodes. The rule transformation ends with the Rule node, in which the transformed SPARQL query [3] and the action instances are stored. SPARQL allows the fast querying of the perceived events stored in the user s KB. These queries also help in filling the blank in a rule which does not have an explicit value, for example a rule Receive an from <urn:person1> would require a further query to the PIM to get all the addresses linked to <urn:person1>, since the event metadata would contain a raw address (e.g. person1@ .com ) rather than the URI defined in the user s PIM. 4.2 Events and Validity Events perceived by the sensors and stored in the user s KB (PIM), can trigger any userdefined rule. When events are perceived (this could be a created, modified or deleted resource in the PIM), semantic lifting is performed on relevant graphs in order to store

6 6 Lecture Notes in Computer Science the metadata for the event perceived. The event s resource type together with a timestamp, a pointer to the graph this resource is stored in, and the event operation (e.g. Resource Modified), is then broadcasted to the event processor. The lifetime of an event is difficult to predict since different event types might have different time-spans when correlated to other events in rules. In order for the rule If I receive an succeededby a new document created to trigger, two events (receive an ) and (new document created) need to occur after each other. This could lead the rule to trigger at an indefinite time if the first event does not expire after a certain time. On the other hand, premature event expiry might also lead to relevant rules being missed. In our system we employ the consumption mode technique, maximum event lifetime technique, and the time-based windows technique, similar to how these are described in [9]. The first technique is used to keep the most recent resource URI in a join node. On the other hand the maximum event lifetime expires resource URIs in join nodes after an X amount of time, irrelevant of the resource type, whilst for the last technique, these expire according to a time period assigned to the respective resource type. Events defining a context state [1] (e.g. current availability) are automatically invalidated and removed from the join nodes according to the changed state. 4.3 Processing the Network Algorithm Algorithm 1: Processing Rule Network to trigger rule(s) from detected events Data: Perceived Event E; Rule Network N; ResultSet S get resource type T for event E ; P L ksp(n,t) ; from P L find common subpaths C p ; while path P in P L do if path P contains join node J then inputpath get left or right input of P in J ; if J = AndNode then inputpath.result execute(inputpath.query) ; checkeventjoinnode(n, inputp ath, J) ; continue iteration ; else if path execute(p.rule) null then remove all paths in P L where P is not a subpath (C p) ; S.add(P.rule) remove all paths in P L where P is a subpath (C p) ; Procedure checkeventjoinnode(n,p,j) Input: Rule Network N; InputPath P ; JoinNode J if J = SucceededByNode then if inputpath is the left input then inputpath.result execute(inputpath.query) ; else if left input result is not empty then if execute(inputpath.query) null then S.add(P.rule) ; if J = PrecededByNode then if inputpath is the right input then inputpath.result execute(inputpath.query) ; else if right input result is not empty then if execute(inputpath.query) null then S.add(P.rule) ;

7 Lecture Notes in Computer Science 7 In contrast to the Rete Algorithm [5], the improved processor we introduce does not process the network by matching patterns, but aims to efficiently filter and find candidate rules. This is done by forming a subgraph, with the perceived resource type as the root node. Algorithm 1 shows how the processing of the network is done. Candidate rules are filtered (P L ) using Yen s K-Shortest Path algorithm [10]. Common subpaths (C p ) are also discovered during the execution of the k-shortest path algorithm. This has the benefit of reducing the number of queries performed to check for potential rules to be triggered. Once a set of paths is ordered, these are iterated and the query in the rule node is executed. Rules whose queries return a result (indicating a rule triggered) are stored in a set which is then passed to the action executor. The rule matcher runs its matching process until all paths (in P L ) are checked. At worst, the matcher iterates on all candidate paths found by the KSP algorithm. When a rule is matched, all other paths which do not have the same condition as the rule in question, are removed and not checked by the matcher. This approach is due to the non-repetitive nature of the network, where rules with the same condition are represented by the same branch in the network. 5 Evaluation Our evaluation serves two purposes: to compare the efficiency of the new networkbased approach to the sequential approach proposed earlier [3], and to investigate its scalability. We base our investigation on a study on the performance of event processing systems [6], which focus on the bottlenecks and the degrading of performance as the load is increased. The authors suggest benchmarking various factors, including the selection and pattern detection. The key performance aspects to prove the scalability of the proposed event processor are: The initialisation of the Rule Network; The selection of rules on event detection; The maximum load of events the event processor can handle. For these tests, we require a knowledge base (KB), DRMO rule instances and event data. As a KB, we use a sample di.me PIM containing data based on various OSCAF 8 ontologies. Test rules were manually created. In the context of di.me, we limit the number of recursive conditions (defined in Section 3 - equation (1)) to 2. For these evaluation tests no repeated rules were used so that the Rule Network event processor is not given an advantage over the Sequential. We also propose the following limits: 50 different rules each having 5 conditions, based on the sample PIM and following a small user study. For the generation of the event data we developed an event generator that generates realistic 9 daily events based on the given PIM and scenarios. The evaluation tests have been carried out on a Macbook Pro, Intel Core i5 with 2.4Ghz processor speed and 4GB of RAM. Data is stored in-memory using Sesame All data and evaluation results can be found:

8 8 Lecture Notes in Computer Science 5.1 Initialisation Test The aim of this test is to measure the time taken to register rule instances in both event processors (sequential vs rule network). We initialise our event processors ten times each, starting with five rules and progressively incrementing the number of loaded rules by five. Figure 5 shows the time taken (in milliseconds), against the number of rules loaded in the event processors with each initialisation. The graph shows that the behaviour of the time consumed in relation to the number of rules loaded in the system is linear. The rule network event processor consistently took more time to initialise than the sequential event processor, due to the extra overhead needed to update the network. Fig. 5. Time taken to initialise Event Processors Fig. 6. No. of distinct events perceived over time 5.2 Filtering Test In this test we measure the time taken (in ms) by the processors to select candidate rules with each event perceived. We use data generated over 24-hours, thus assuming that events in the event log (required only for the sequential event processor) remain valid throughout this period. After loading all 50 rules in both processors, the test was repeated four times, each time producing a number of events until the desired number of distinct types were available on the event log. For the experiment we require that the filtering algorithm returns candidate rules satisfying either of the following criteria: 1. A rule with one condition where the associated resource type (drmo:hasresourcetype) is the same as the perceived event s type; 2. A multiple-condition rule such that one of it s conditions is satisfied by the type of the new event. The graph in Figure 6 shows how the sequential process grows in time as the number of distinct event types increase in the event log, whilst the network filtering process remains constant. This result was expected, since the sequential s filtering process needs to go through all the rules to check their resource types against the distinct event types on the event log, in order to satisfy either of the mentioned criteria. On the other hand the network is built such that the associated rules can be automatically found by forming a sub-graph, using the resource type as the start vertex. The network filtering process takes time in order to sort the possible rules by shortest path first, allowing simple rules to be evaluated before the more complex ones.

9 Lecture Notes in Computer Science Load Testing The aim of this experiment is to understand to which extent the event processors can work sufficiently and in an acceptable manner. For this experiment we created a producer/consumer service, where the producer sends a stream of generated events to the consumer (the event processor), which filters and triggers rules simultaneously. After both processors were loaded with the 50 rules, we ran this test five times, progressively increasing the event load up to a maximum events. We established that an acceptable time-frame for the processing of consumed events should be less than 20 seconds. Since the sequential process failed this test outright, with 100 events being processed in seconds, it was subsequently eliminated from this experiment. Figure 7 shows time time taken (in seconds) to perform all consumed events for the rule network event processor. In particular, we observe that events were consumed and processed in around 2 seconds. In the di.me userware, we do not foresee a user to have anything near events being perceived at the same time. More realistically, we observe that the rule network event processor can process up to 2000 events in a reasonable time ( 0.4 sec), with 100 events being processed in less than 0.1 sec. Fig. 7. Testing time taken to process events From these results we conclude that although during the initialisation stage the Rule Network event processor takes longer than the Sequential event processor, the runtime process for filtering and triggering takes considerably less time, regardless of the load of events being consumed by the processor. The trade-off between the time taken to initialise the rule, and to process events, is justified for the following reasons: 1. The initialisation process is done only once; 2. The difference in milliseconds between both event processors is almost insignificant (to initialise 50 rules, the network takes < 100ms more); 3. The filtering of events takes considerably less time in the network event processor; 4. Even with a load of events, the rule network performs within a reasonable time-frame. 6 Conclusion In this paper we describe an ontology-driven event processor which operates on personal, activities and context; as perceived by various devices and online sources. The

10 10 Lecture Notes in Computer Science event processor compares event streams to the antecedent of declarative rules, defined by a user through an intelligent UI. Prospectively, a JSON-LD 11 serialisation would enable us to interchange DRMO instances, ensuring that the full semantics are retained event at the UI level. Rules consist of various conditions corresponding to items in a unified PIM, and one or more resultant actions. Due to the nature of the rule conditions and their constraints, we propose to represent them by a rule management ontology. This also means that in theory, the personalised user-defined rules can be processed by various platforms. In the future, we also intend to investigate the possibility to enable the automatic rule learning and discovery based on the availability of a user s context history. Defined rules are transformed and registered in a Rule Network, which is then operated upon by the event processor. After initialising the rule network, the system is ready to start perceiving events from multiple datasources. With each new event, the rule network filters candidate rules and triggers any which are satisfied. The proposed network-based event processor is compared to an earlier sequential approach. Evaluation results show that although the rule network takes more time at the initialisation stage, it performs considerably better than the alternative, during both the filtering and triggering processes. In particular, our event processor can process 100 events in less than 0.1 seconds. References 1. J. Attard, S. Scerri, I. Rivera, and S. Handschuh. Ontology-based situation recognition for context-aware systems. In I-SEMANTICS 2013, V. Beltran, K. Arabshian, and H. Schulzrinne. Ontology-based user-defined rules and context-aware service composition system. In Proceedings of the 8th international conference on The Semantic Web, ESWC 11, Berlin, Heidelberg, Springer-Verlag. 3. J. Debattista, S. Scerri, I. Rivera, and S. Handschuh. Ontology-based rules for recommender systems. In Proceedings of the International Workshop on Semantic Technologies meet Recommender Systems & Big Data, S. Decker, S. Melnik, F. van Harmelen, D. Fensel, M. Klein, J. Broekstra, M. Erdmann, and I. Horrocks. The semantic web: the roles of xml and rdf. Internet Computing, IEEE, 4(5):63 73, C. L. Forgy. Rete: A fast algorithm for the many pattern/many object pattern match problem. Artificial Intelligence, 19(1):17 37, M. R. N. Mendes, P. Bizarro, and P. Marques. A performance study of event processing systems. In TPCTC, pages , S. Scerri, A. Schuller, I. Rivera, J. Attard, J. Debattista, M. Valla, F. Hermann, and S. Handschuh. Interacting with a context-aware personal information sharing system. In Proceedings of the 15th International Conference on Human-Computer Interaction (HCI2013), M. Sintek, S. Handschuh, S. Scerri, and L. van Elst. Technologies for the social semantic desktop. In Reasoning Web. Semantic Technologies for Information Systems, volume 5689 of Lecture Notes in Computer Science, pages Springer Berlin / Heidelberg, K. Walzer, T. Breddin, and M. Groch. Relative temporal constraints in the rete algorithm for complex event detection. In DEBS, pages , J. Y. Yen. Finding the K Shortest Loopless Paths in a Network. Management Science,

di.me: Ontologies for a Pervasive Information System

di.me: Ontologies for a Pervasive Information System di.me: Ontologies for a Pervasive Information System Simon Scerri 1, Ismael Rivera 1, Jeremy Debattista 1, Simon Thiel 2, Keith Cortis 1, Judie Attard 1, Christian Knecht 2, Andreas Schuller 2, and Fabian

More information

FedX: A Federation Layer for Distributed Query Processing on Linked Open Data

FedX: A Federation Layer for Distributed Query Processing on Linked Open Data FedX: A Federation Layer for Distributed Query Processing on Linked Open Data Andreas Schwarte 1, Peter Haase 1,KatjaHose 2, Ralf Schenkel 2, and Michael Schmidt 1 1 fluid Operations AG, Walldorf, Germany

More information

LinDA: A Service Infrastructure for Linked Data Analysis and Provision of Data Statistics

LinDA: A Service Infrastructure for Linked Data Analysis and Provision of Data Statistics LinDA: A Service Infrastructure for Linked Data Analysis and Provision of Data Statistics Nicolas Beck, Stefan Scheglmann, and Thomas Gottron WeST Institute for Web Science and Technologies University

More information

Evaluating semantic data infrastructure components for small devices

Evaluating semantic data infrastructure components for small devices Evaluating semantic data infrastructure components for small devices Andriy Nikolov, Ning Li, Mathieu d Aquin, Enrico Motta Knowledge Media Institute, The Open University, Milton Keynes, UK {a.nikolov,

More information

Towards a Semantic Web Platform for Finite Element Simulations

Towards a Semantic Web Platform for Finite Element Simulations Towards a Semantic Web Platform for Finite Element Simulations André Freitas 1, Kartik Asooja 1, Swapnil Soni 1,2, Marggie Jones 1, Panagiotis Hasapis 3, Ratnesh Sahay 1 1 Insight Centre for Data Analytics,

More information

An Archiving System for Managing Evolution in the Data Web

An Archiving System for Managing Evolution in the Data Web An Archiving System for Managing Evolution in the Web Marios Meimaris *, George Papastefanatos and Christos Pateritsas * Institute for the Management of Information Systems, Research Center Athena, Greece

More information

Big Data Management and NoSQL Databases

Big Data Management and NoSQL Databases NDBI040 Big Data Management and NoSQL Databases Lecture 10. Graph databases Doc. RNDr. Irena Holubova, Ph.D. holubova@ksi.mff.cuni.cz http://www.ksi.mff.cuni.cz/~holubova/ndbi040/ Graph Databases Basic

More information

SPARQL-Based Applications for RDF-Encoded Sensor Data

SPARQL-Based Applications for RDF-Encoded Sensor Data SPARQL-Based Applications for RDF-Encoded Sensor Data Mikko Rinne, Seppo Törmä, Esko Nuutila http://cse.aalto.fi/instans/ 5 th International Workshop on Semantic Sensor Networks 12.11.2012 Department of

More information

Annotation Component in KiWi

Annotation Component in KiWi Annotation Component in KiWi Marek Schmidt and Pavel Smrž Faculty of Information Technology Brno University of Technology Božetěchova 2, 612 66 Brno, Czech Republic E-mail: {ischmidt,smrz}@fit.vutbr.cz

More information

ISA Action 1.17: A Reusable INSPIRE Reference Platform (ARE3NA)

ISA Action 1.17: A Reusable INSPIRE Reference Platform (ARE3NA) ISA Action 1.17: A Reusable INSPIRE Reference Platform (ARE3NA) Expert contract supporting the Study on RDF and PIDs for INSPIRE Deliverable D.EC.3.2 RDF in INSPIRE Open issues, tools, and implications

More information

Multicast Communications. Slide Set were original prepared by Dr. Tatsuya Susa

Multicast Communications. Slide Set were original prepared by Dr. Tatsuya Susa Multicast Communications Slide Set were original prepared by Dr. Tatsuya Susa Outline 1. Advantages of multicast 2. Multicast addressing 3. Multicast Routing Protocols 4. Multicast in the Internet 5. IGMP

More information

A SEMANTIC MATCHMAKER SERVICE ON THE GRID

A SEMANTIC MATCHMAKER SERVICE ON THE GRID DERI DIGITAL ENTERPRISE RESEARCH INSTITUTE A SEMANTIC MATCHMAKER SERVICE ON THE GRID Andreas Harth Yu He Hongsuda Tangmunarunkit Stefan Decker Carl Kesselman DERI TECHNICAL REPORT 2004-05-18 MAY 2004 DERI

More information

Novel System Architectures for Semantic Based Sensor Networks Integraion

Novel System Architectures for Semantic Based Sensor Networks Integraion Novel System Architectures for Semantic Based Sensor Networks Integraion Z O R A N B A B O V I C, Z B A B O V I C @ E T F. R S V E L J K O M I L U T N O V I C, V M @ E T F. R S T H E S C H O O L O F T

More information

From Online Community Data to RDF

From Online Community Data to RDF From Online Community Data to RDF Abstract Uldis Bojārs, John G. Breslin [uldis.bojars,john.breslin]@deri.org Digital Enterprise Research Institute National University of Ireland, Galway Galway, Ireland

More information

Semantic Exploitation of Engineering Models: An Application to Oilfield Models

Semantic Exploitation of Engineering Models: An Application to Oilfield Models Semantic Exploitation of Engineering Models: An Application to Oilfield Models Laura Silveira Mastella 1,YamineAït-Ameur 2,Stéphane Jean 2, Michel Perrin 1, and Jean-François Rainaud 3 1 Ecole des Mines

More information

Development of an Ontology-Based Portal for Digital Archive Services

Development of an Ontology-Based Portal for Digital Archive Services Development of an Ontology-Based Portal for Digital Archive Services Ching-Long Yeh Department of Computer Science and Engineering Tatung University 40 Chungshan N. Rd. 3rd Sec. Taipei, 104, Taiwan chingyeh@cse.ttu.edu.tw

More information

Benchmarking RDF Production Tools

Benchmarking RDF Production Tools Benchmarking RDF Production Tools Martin Svihla and Ivan Jelinek Czech Technical University in Prague, Karlovo namesti 13, Praha 2, Czech republic, {svihlm1, jelinek}@fel.cvut.cz, WWW home page: http://webing.felk.cvut.cz

More information

VISO: A Shared, Formal Knowledge Base as a Foundation for Semi-automatic InfoVis Systems

VISO: A Shared, Formal Knowledge Base as a Foundation for Semi-automatic InfoVis Systems VISO: A Shared, Formal Knowledge Base as a Foundation for Semi-automatic InfoVis Systems Jan Polowinski Martin Voigt Technische Universität DresdenTechnische Universität Dresden 01062 Dresden, Germany

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Configuration Management for Component-based Systems

Configuration Management for Component-based Systems Configuration Management for Component-based Systems Magnus Larsson Ivica Crnkovic Development and Research Department of Computer Science ABB Automation Products AB Mälardalen University 721 59 Västerås,

More information

Single Pass Connected Components Analysis

Single Pass Connected Components Analysis D. G. Bailey, C. T. Johnston, Single Pass Connected Components Analysis, Proceedings of Image and Vision Computing New Zealand 007, pp. 8 87, Hamilton, New Zealand, December 007. Single Pass Connected

More information

Performance Evaluation of Semantic Registries: OWLJessKB and instancestore

Performance Evaluation of Semantic Registries: OWLJessKB and instancestore Service Oriented Computing and Applications manuscript No. (will be inserted by the editor) Performance Evaluation of Semantic Registries: OWLJessKB and instancestore Simone A. Ludwig 1, Omer F. Rana 2

More information

Semantic Web in a Constrained Environment

Semantic Web in a Constrained Environment Semantic Web in a Constrained Environment Laurens Rietveld and Stefan Schlobach Department of Computer Science, VU University Amsterdam, The Netherlands {laurens.rietveld,k.s.schlobach}@vu.nl Abstract.

More information

Adaptable and Adaptive Web Information Systems. Lecture 1: Introduction

Adaptable and Adaptive Web Information Systems. Lecture 1: Introduction Adaptable and Adaptive Web Information Systems School of Computer Science and Information Systems Birkbeck College University of London Lecture 1: Introduction George Magoulas gmagoulas@dcs.bbk.ac.uk October

More information

Structured Data To RDF II Deliverable D4.3.2

Structured Data To RDF II Deliverable D4.3.2 Structured Data To RDF II Deliverable D4.3.2 Version Final Authors: W.R. Van Hage 1, T. Ploeger 1, J.E. Hoeksema 1 Affiliation: (1) SynerScope B.V. Building structured event indexes of large volumes of

More information

Using Linked Data to Build Open, Collaborative Recommender Systems

Using Linked Data to Build Open, Collaborative Recommender Systems Using Linked Data to Build Open, Collaborative Recommender Systems Benjamin Heitmann and Conor Hayes Digital Enterprise Research Institute National University of Ireland, Galway Galway, Ireland firstname.lastname@deri.org

More information

Multi-relational Decision Tree Induction

Multi-relational Decision Tree Induction Multi-relational Decision Tree Induction Arno J. Knobbe 1,2, Arno Siebes 2, Daniël van der Wallen 1 1 Syllogic B.V., Hoefseweg 1, 3821 AE, Amersfoort, The Netherlands, {a.knobbe, d.van.der.wallen}@syllogic.com

More information

Implementation Techniques

Implementation Techniques V Implementation Techniques 34 Efficient Evaluation of the Valid-Time Natural Join 35 Efficient Differential Timeslice Computation 36 R-Tree Based Indexing of Now-Relative Bitemporal Data 37 Light-Weight

More information

Parallel Approach for Implementing Data Mining Algorithms

Parallel Approach for Implementing Data Mining Algorithms TITLE OF THE THESIS Parallel Approach for Implementing Data Mining Algorithms A RESEARCH PROPOSAL SUBMITTED TO THE SHRI RAMDEOBABA COLLEGE OF ENGINEERING AND MANAGEMENT, FOR THE DEGREE OF DOCTOR OF PHILOSOPHY

More information

Paolo Bellavista Veronica Conti Carlo Giannelli Jukka Honkola

Paolo Bellavista Veronica Conti Carlo Giannelli Jukka Honkola The Smart-M3 Semantic Information Broker (SIB) Plug-in Extension: Implementation and Evaluation Experiences Paolo Bellavista Veronica Conti Carlo Giannelli Jukka Honkola 20.11.2012 - SN4MS'12 DISI, Università

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

The onprom Toolchain for Extracting Business Process Logs using Ontology-based Data Access

The onprom Toolchain for Extracting Business Process Logs using Ontology-based Data Access The onprom Toolchain for Extracting Business Process Logs using Ontology-based Data Access Diego Calvanese, Tahir Emre Kalayci, Marco Montali, and Ario Santoso KRDB Research Centre for Knowledge and Data

More information

Contents. G52IWS: The Semantic Web. The Semantic Web. Semantic web elements. Semantic Web technologies. Semantic Web Services

Contents. G52IWS: The Semantic Web. The Semantic Web. Semantic web elements. Semantic Web technologies. Semantic Web Services Contents G52IWS: The Semantic Web Chris Greenhalgh 2007-11-10 Introduction to the Semantic Web Semantic Web technologies Overview RDF OWL Semantic Web Services Concluding comments 1 See Developing Semantic

More information

Finding Similarity and Comparability from Merged Hetero Data of the Semantic Web by Using Graph Pattern Matching

Finding Similarity and Comparability from Merged Hetero Data of the Semantic Web by Using Graph Pattern Matching Finding Similarity and Comparability from Merged Hetero Data of the Semantic Web by Using Graph Pattern Matching Hiroyuki Sato, Kyoji Iiduka, Takeya Mukaigaito, and Takahiko Murayama Information Sharing

More information

Knowledge Representation, Ontologies, and the Semantic Web

Knowledge Representation, Ontologies, and the Semantic Web Knowledge Representation, Ontologies, and the Semantic Web Evimaria Terzi 1, Athena Vakali 1, and Mohand-Saïd Hacid 2 1 Informatics Dpt., Aristotle University, 54006 Thessaloniki, Greece evimaria,avakali@csd.auth.gr

More information

An ECA Engine for Deploying Heterogeneous Component Languages in the Semantic Web

An ECA Engine for Deploying Heterogeneous Component Languages in the Semantic Web An ECA Engine for Deploying Heterogeneous Component s in the Semantic Web Erik Behrends, Oliver Fritzen, Wolfgang May, and Daniel Schubert Institut für Informatik, Universität Göttingen, {behrends fritzen

More information

Semantic Web Knowledge Representation in the Web Context. CS 431 March 24, 2008 Carl Lagoze Cornell University

Semantic Web Knowledge Representation in the Web Context. CS 431 March 24, 2008 Carl Lagoze Cornell University Semantic Web Knowledge Representation in the Web Context CS 431 March 24, 2008 Carl Lagoze Cornell University Acknowledgements for various slides and ideas Ian Horrocks (Manchester U.K.) Eric Miller (W3C)

More information

Event Object Boundaries in RDF Streams A Position Paper

Event Object Boundaries in RDF Streams A Position Paper Event Object Boundaries in RDF Streams A Position Paper Robin Keskisärkkä and Eva Blomqvist Department of Computer and Information Science Linköping University, Sweden {robin.keskisarkka eva.blomqvist}@liu.se

More information

Bridging the Gap between Semantic Web and Networked Sensors: A Position Paper

Bridging the Gap between Semantic Web and Networked Sensors: A Position Paper Bridging the Gap between Semantic Web and Networked Sensors: A Position Paper Xiang Su and Jukka Riekki Intelligent Systems Group and Infotech Oulu, FIN-90014, University of Oulu, Finland {Xiang.Su,Jukka.Riekki}@ee.oulu.fi

More information

Introduction to INSTANS

Introduction to INSTANS Introduction to INSTANS Mikko Rinne, Seppo Törmä, Esko Nuutila http://cse.aalto.fi/instans/ 11.10.2013 Department of Computer Science and Engineering Distributed Systems Group INSTANS *) Event Processing

More information

An Annotation Tool for Semantic Documents

An Annotation Tool for Semantic Documents An Annotation Tool for Semantic Documents (System Description) Henrik Eriksson Dept. of Computer and Information Science Linköping University SE-581 83 Linköping, Sweden her@ida.liu.se Abstract. Document

More information

SWSE: Objects before documents!

SWSE: Objects before documents! Provided by the author(s) and NUI Galway in accordance with publisher policies. Please cite the published version when available. Title SWSE: Objects before documents! Author(s) Harth, Andreas; Hogan,

More information

Fausto Giunchiglia and Mattia Fumagalli

Fausto Giunchiglia and Mattia Fumagalli DISI - Via Sommarive 5-38123 Povo - Trento (Italy) http://disi.unitn.it FROM ER MODELS TO THE ENTITY MODEL Fausto Giunchiglia and Mattia Fumagalli Date (2014-October) Technical Report # DISI-14-014 From

More information

PROJECT PERIODIC REPORT

PROJECT PERIODIC REPORT PROJECT PERIODIC REPORT Grant Agreement number: 257403 Project acronym: CUBIST Project title: Combining and Uniting Business Intelligence and Semantic Technologies Funding Scheme: STREP Date of latest

More information

Information Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a *

Information Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a * Information Retrieval System Based on Context-aware in Internet of Things Ma Junhong 1, a * 1 Xi an International University, Shaanxi, China, 710000 a sufeiya913@qq.com Keywords: Context-aware computing,

More information

Reasoning on Business Processes and Ontologies in a Logic Programming Environment

Reasoning on Business Processes and Ontologies in a Logic Programming Environment Reasoning on Business Processes and Ontologies in a Logic Programming Environment Michele Missikoff 1, Maurizio Proietti 1, Fabrizio Smith 1,2 1 IASI-CNR, Viale Manzoni 30, 00185, Rome, Italy 2 DIEI, Università

More information

Investigating F# as a development tool for distributed multi-agent systems

Investigating F# as a development tool for distributed multi-agent systems PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 32-36, 2011 Investigating F# as a development tool for distributed multi-agent systems Extended abstract Alex

More information

Towards Green Linked Data

Towards Green Linked Data Towards Green Linked Data Julia Hoxha 1, Anisa Rula 2, and Basil Ell 1 1 Institute AIFB, Karlsruhe Institute of Technology, {julia.hoxha, basil.ell}@kit.edu, 2 Dipartimento di Informatica Sistemistica

More information

Semantic Processing of Sensor Event Stream by Using External Knowledge Bases

Semantic Processing of Sensor Event Stream by Using External Knowledge Bases Semantic Processing of Sensor Event Stream by Using External Knowledge Bases Short Paper Kia Teymourian and Adrian Paschke Freie Universitaet Berlin, Berlin, Germany {kia, paschke}@inf.fu-berlin.de Abstract.

More information

Ontology Exemplification for aspocms in the Semantic Web

Ontology Exemplification for aspocms in the Semantic Web Ontology Exemplification for aspocms in the Semantic Web Anand Kumar Department of Computer Science Babasaheb Bhimrao Ambedkar University Lucknow-226025, India e-mail: anand_smsvns@yahoo.co.in Sanjay K.

More information

QSMat: Query-Based Materialization for Efficient RDF Stream Processing

QSMat: Query-Based Materialization for Efficient RDF Stream Processing QSMat: Query-Based Materialization for Efficient RDF Stream Processing Christian Mathieu 1, Matthias Klusch 2, and Birte Glimm 3 1 Saarland University, Computer Science Department, 66123 Saarbruecken,

More information

A Formal Definition of RESTful Semantic Web Services. Antonio Garrote Hernández María N. Moreno García

A Formal Definition of RESTful Semantic Web Services. Antonio Garrote Hernández María N. Moreno García A Formal Definition of RESTful Semantic Web Services Antonio Garrote Hernández María N. Moreno García Outline Motivation Resources and Triple Spaces Resources and Processes RESTful Semantic Resources Example

More information

Evaluating find a path reachability queries

Evaluating find a path reachability queries Evaluating find a path reachability queries Panagiotis ouros and Theodore Dalamagas and Spiros Skiadopoulos and Timos Sellis Abstract. Graphs are used for modelling complex problems in many areas, such

More information

The UML Extension Mechanisms

The UML Extension Mechanisms Jasmine Farhad Dept of Computer Science University College London 13-Dec-02 The UML Extension Mechanisms Introduction There is an important need for organisations to evolve in today s market. This has

More information

Porting Social Media Contributions with SIOC

Porting Social Media Contributions with SIOC Porting Social Media Contributions with SIOC Uldis Bojars, John G. Breslin, and Stefan Decker DERI, National University of Ireland, Galway, Ireland firstname.lastname@deri.org Abstract. Social media sites,

More information

The Event Processing ODP

The Event Processing ODP The Event Processing ODP Eva Blomqvist 1 and Mikko Rinne 2 1 Linköping University, 581 83 Linköping, Sweden eva.blomqvist@liu.se 2 Department of Computer Science and Engineering, Aalto University, School

More information

Available online at ScienceDirect. International Workshop on Enabling ICT for Smart Buildings (ICT-SB 2014)

Available online at   ScienceDirect. International Workshop on Enabling ICT for Smart Buildings (ICT-SB 2014) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 32 ( 2014 ) 997 1002 International Workshop on Enabling ICT for Smart Buildings (ICT-SB 2014) Using a Residential Environment

More information

User Interests: Definition, Vocabulary, and Utilization in Unifying Search and Reasoning

User Interests: Definition, Vocabulary, and Utilization in Unifying Search and Reasoning User Interests: Definition, Vocabulary, and Utilization in Unifying Search and Reasoning Yi Zeng 1, Yan Wang 1, Zhisheng Huang 2, Danica Damljanovic 3, Ning Zhong 1,4, Cong Wang 1 1 International WIC Institute,

More information

DIONYSUS: Towards Query-aware Distributed Processing of RDF Graph Streams

DIONYSUS: Towards Query-aware Distributed Processing of RDF Graph Streams DIONYSUS: Towards Query-aware Distributed Processing of RDF Graph Streams Syed Gillani, Gauthier Picard, Frederique Laforest Laboratoire Hubert Curien & Institute Mines St-Etienne, France GraphQ 2016 [Outline]

More information

Semantic Web Systems Web Services Part 2 Jacques Fleuriot School of Informatics

Semantic Web Systems Web Services Part 2 Jacques Fleuriot School of Informatics Semantic Web Systems Web Services Part 2 Jacques Fleuriot School of Informatics 16 th March 2015 In the previous lecture l Web Services (WS) can be thought of as Remote Procedure Calls. l Messages from

More information

W3C Workshop on the Future of Social Networking, January 2009, Barcelona

W3C Workshop on the Future of Social Networking, January 2009, Barcelona 1 of 6 06/01/2010 20:19 W3C Workshop on the Future of Social Networking, 15-16 January 2009, Barcelona John G. Breslin 1,2, Uldis Bojārs 1, Alexandre Passant, Sergio Fernández 3, Stefan Decker 1 1 Digital

More information

Proposal for Implementing Linked Open Data on Libraries Catalogue

Proposal for Implementing Linked Open Data on Libraries Catalogue Submitted on: 16.07.2018 Proposal for Implementing Linked Open Data on Libraries Catalogue Esraa Elsayed Abdelaziz Computer Science, Arab Academy for Science and Technology, Alexandria, Egypt. E-mail address:

More information

Module 5. Function-Oriented Software Design. Version 2 CSE IIT, Kharagpur

Module 5. Function-Oriented Software Design. Version 2 CSE IIT, Kharagpur Module 5 Function-Oriented Software Design Lesson 12 Structured Design Specific Instructional Objectives At the end of this lesson the student will be able to: Identify the aim of structured design. Explain

More information

SMART RESOURCE PROTOTYPE ENVIRONMENT V. 2.0 DELIVERABLE 2.3

SMART RESOURCE PROTOTYPE ENVIRONMENT V. 2.0 DELIVERABLE 2.3 IOG SMART RESOURCE PROTOTYPE ENVIRONMENT V. 2.0 DELIVERABLE 2.3 Technical report SmartResource: Proactive Self-Maintained Resources in Semantic Web 12/13/2005 University of Jyväskylä Agora Center Author:

More information

A General Approach to Query the Web of Data

A General Approach to Query the Web of Data A General Approach to Query the Web of Data Xin Liu 1 Department of Information Science and Engineering, University of Trento, Trento, Italy liu@disi.unitn.it Abstract. With the development of the Semantic

More information

Hyperdata: Update APIs for RDF Data Sources (Vision Paper)

Hyperdata: Update APIs for RDF Data Sources (Vision Paper) Hyperdata: Update APIs for RDF Data Sources (Vision Paper) Jacek Kopecký Knowledge Media Institute, The Open University, UK j.kopecky@open.ac.uk Abstract. The Linked Data effort has been focusing on how

More information

ProLD: Propagate Linked Data

ProLD: Propagate Linked Data ProLD: Propagate Linked Data Peter Kalchgruber University of Vienna, Faculty of Computer Science, Liebiggasse 4/3-4, A-1010 Vienna peter.kalchgruber@univie.ac.at Abstract. Since the Web of Data consists

More information

The Personal Knowledge Workbench of the NEPOMUK Semantic Desktop

The Personal Knowledge Workbench of the NEPOMUK Semantic Desktop The Personal Knowledge Workbench of the NEPOMUK Semantic Desktop Gunnar Aastrand Grimnes, Leo Sauermann, and Ansgar Bernardi DFKI GmbH, Kaiserslautern, Germany gunnar.grimnes@dfki.de, leo.sauermann@dfki.de,

More information

SEMANTIC SOLUTIONS FOR OIL & GAS: ROLES AND RESPONSIBILITIES

SEMANTIC SOLUTIONS FOR OIL & GAS: ROLES AND RESPONSIBILITIES SEMANTIC SOLUTIONS FOR OIL & GAS: ROLES AND RESPONSIBILITIES Jeremy Carroll, Ralph Hodgson, {jeremy,ralph}@topquadrant.com This paper is submitted to The W3C Workshop on Semantic Web in Energy Industries

More information

Contextion: A Framework for Developing Context-Aware Mobile Applications

Contextion: A Framework for Developing Context-Aware Mobile Applications Contextion: A Framework for Developing Context-Aware Mobile Applications Elizabeth Williams, Jeff Gray Department of Computer Science, University of Alabama eawilliams2@crimson.ua.edu, gray@cs.ua.edu Abstract

More information

Executing Evaluations over Semantic Technologies using the SEALS Platform

Executing Evaluations over Semantic Technologies using the SEALS Platform Executing Evaluations over Semantic Technologies using the SEALS Platform Miguel Esteban-Gutiérrez, Raúl García-Castro, Asunción Gómez-Pérez Ontology Engineering Group, Departamento de Inteligencia Artificial.

More information

MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS

MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS INTRODUCTION The ability to create and manage snapshots is an essential feature expected from enterprise-grade storage systems. This capability

More information

Exploiting On-Chip Data Transfers for Improving Performance of Chip-Scale Multiprocessors

Exploiting On-Chip Data Transfers for Improving Performance of Chip-Scale Multiprocessors Exploiting On-Chip Data Transfers for Improving Performance of Chip-Scale Multiprocessors G. Chen 1, M. Kandemir 1, I. Kolcu 2, and A. Choudhary 3 1 Pennsylvania State University, PA 16802, USA 2 UMIST,

More information

How to Exploit Abstract User Interfaces in MARIA

How to Exploit Abstract User Interfaces in MARIA How to Exploit Abstract User Interfaces in MARIA Fabio Paternò, Carmen Santoro, Lucio Davide Spano CNR-ISTI, HIIS Laboratory Via Moruzzi 1, 56124 Pisa, Italy {fabio.paterno, carmen.santoro, lucio.davide.spano}@isti.cnr.it

More information

Crossword Puzzles as a Constraint Problem

Crossword Puzzles as a Constraint Problem Crossword Puzzles as a Constraint Problem Anbulagan and Adi Botea NICTA and Australian National University, Canberra, Australia {anbulagan,adi.botea}@nicta.com.au Abstract. We present new results in crossword

More information

How Caching Improves Efficiency and Result Completeness for Querying Linked Data

How Caching Improves Efficiency and Result Completeness for Querying Linked Data How Caching Improves Efficiency and Result Completeness for Querying Linked Data Olaf Hartig Humboldt-Universität zu Berlin Unter den Linden 6 10099 Berlin, Germany hartig@informatik.hu-berlin.de ABSTRACT

More information

Towards Efficient Semantically Enriched Complex Event Processing and Pattern Matching

Towards Efficient Semantically Enriched Complex Event Processing and Pattern Matching Towards Efficient Semantically Enriched Complex Event Processing and Pattern Matching Syed Gillani 1,2 Gauthier Picard 1 Frédérique Laforest 2 Antoine Zimmermann 1 Institute Henri Fayol, EMSE, Saint-Etienne,

More information

Who s Who A Linked Data Visualisation Tool for Mobile Environments

Who s Who A Linked Data Visualisation Tool for Mobile Environments Who s Who A Linked Data Visualisation Tool for Mobile Environments A. Elizabeth Cano 1,, Aba-Sah Dadzie 1, and Melanie Hartmann 2 1 OAK Group, Dept. of Computer Science, The University of Sheffield, UK

More information

Provided by the author(s) and NUI Galway in accordance with publisher policies. Please cite the published version when available.

Provided by the author(s) and NUI Galway in accordance with publisher policies. Please cite the published version when available. Provided by the author(s) and NUI Galway in accordance with publisher policies. Please cite the published version when available. Title Extracting and Utilizing Social Networks from Log Files of Shared

More information

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model Indian Journal of Science and Technology, Vol 8(20), DOI:10.17485/ijst/2015/v8i20/79311, August 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study of Future Internet Applications based on

More information

Semantic Technologies to Support the User-Centric Analysis of Activity Data

Semantic Technologies to Support the User-Centric Analysis of Activity Data Semantic Technologies to Support the User-Centric Analysis of Activity Data Mathieu d Aquin, Salman Elahi and Enrico Motta Knowledge Media Institute, The Open University, Milton Keynes, UK {m.daquin, s.elahi,

More information

SEMANTIC WEB POWERED PORTAL INFRASTRUCTURE

SEMANTIC WEB POWERED PORTAL INFRASTRUCTURE SEMANTIC WEB POWERED PORTAL INFRASTRUCTURE YING DING 1 Digital Enterprise Research Institute Leopold-Franzens Universität Innsbruck Austria DIETER FENSEL Digital Enterprise Research Institute National

More information

Automation of Semantic Web based Digital Library using Unified Modeling Language Minal Bhise 1 1

Automation of Semantic Web based Digital Library using Unified Modeling Language Minal Bhise 1 1 Automation of Semantic Web based Digital Library using Unified Modeling Language Minal Bhise 1 1 Dhirubhai Ambani Institute for Information and Communication Technology, Gandhinagar, Gujarat, India Email:

More information

arxiv: v1 [cs.db] 7 Nov 2012

arxiv: v1 [cs.db] 7 Nov 2012 Data Shapes and Data Transformations Michael Hausenblas 1, Boris Villazón-Terrazas 2, and Richard Cyganiak 1 arxiv:1211.1565v1 [cs.db] 7 Nov 2012 1 DERI, NUI Galway, Ireland firstname.lastname@deri.org

More information

An Evaluation of Geo-Ontology Representation Languages for Supporting Web Retrieval of Geographical Information

An Evaluation of Geo-Ontology Representation Languages for Supporting Web Retrieval of Geographical Information An Evaluation of Geo-Ontology Representation Languages for Supporting Web Retrieval of Geographical Information P. Smart, A.I. Abdelmoty and C.B. Jones School of Computer Science, Cardiff University, Cardiff,

More information

Instances of Instances Modeled via Higher-Order Classes

Instances of Instances Modeled via Higher-Order Classes Instances of Instances Modeled via Higher-Order Classes douglas foxvog Digital Enterprise Research Institute (DERI), National University of Ireland, Galway, Ireland Abstract. In many languages used for

More information

Programming the Semantic Web

Programming the Semantic Web Programming the Semantic Web Steffen Staab, Stefan Scheglmann, Martin Leinberger, Thomas Gottron Institute for Web Science and Technologies, University of Koblenz-Landau, Germany Abstract. The Semantic

More information

ACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS

ACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS ACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS Prabodha Srimal Rodrigo Registration No. : 138230V Degree of Master of Science Department of Computer Science & Engineering University

More information

A GML SCHEMA MAPPING APPROACH TO OVERCOME SEMANTIC HETEROGENEITY IN GIS

A GML SCHEMA MAPPING APPROACH TO OVERCOME SEMANTIC HETEROGENEITY IN GIS A GML SCHEMA MAPPING APPROACH TO OVERCOME SEMANTIC HETEROGENEITY IN GIS Manoj Paul, S. K. Ghosh School of Information Technology, Indian Institute of Technology, Kharagpur 721302, India - (mpaul, skg)@sit.iitkgp.ernet.in

More information

TIBCO Complex Event Processing Evaluation Guide

TIBCO Complex Event Processing Evaluation Guide TIBCO Complex Event Processing Evaluation Guide This document provides a guide to evaluating CEP technologies. http://www.tibco.com Global Headquarters 3303 Hillview Avenue Palo Alto, CA 94304 Tel: +1

More information

PLATFORM FOR ADVANCED CONTROL APPLICATIONS. B. Horn*, J. Beran**, J. Findejs**, V. Havlena**, M. Rozložník**

PLATFORM FOR ADVANCED CONTROL APPLICATIONS. B. Horn*, J. Beran**, J. Findejs**, V. Havlena**, M. Rozložník** PLATFORM FOR ADVANCED CONTROL APPLICATIONS B. Horn*, J. Beran**, J. Findejs**, V. Havlena**, M. Rozložník** *Honeywell Process Solutions 2500 W. Union Hills Drive, Phoenix, AZ 85027, USA brian.horn@honeywell.com

More information

A Fast and High Throughput SQL Query System for Big Data

A Fast and High Throughput SQL Query System for Big Data A Fast and High Throughput SQL Query System for Big Data Feng Zhu, Jie Liu, and Lijie Xu Technology Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, Beijing, China 100190

More information

Sindice Widgets: Lightweight embedding of Semantic Web capabilities into existing user applications.

Sindice Widgets: Lightweight embedding of Semantic Web capabilities into existing user applications. Sindice Widgets: Lightweight embedding of Semantic Web capabilities into existing user applications. Adam Westerski, Aftab Iqbal, and Giovanni Tummarello Digital Enterprise Research Institute, NUI Galway,Ireland

More information

Ontology-based Architecture Documentation Approach

Ontology-based Architecture Documentation Approach 4 Ontology-based Architecture Documentation Approach In this chapter we investigate how an ontology can be used for retrieving AK from SA documentation (RQ2). We first give background information on the

More information

Semantic Web Platform for Personal Information Management

Semantic Web Platform for Personal Information Management Semantic Web Platform for Personal Information Management Ora Lassila, Ph.D Research Fellow, Nokia Research Center Cambridge Visiting Scientist, MIT CSAIL Elected Member, W3C Advisory Board Semantic Days,

More information

H1 Spring C. A service-oriented architecture is frequently deployed in practice without a service registry

H1 Spring C. A service-oriented architecture is frequently deployed in practice without a service registry 1. (12 points) Identify all of the following statements that are true about the basics of services. A. Screen scraping may not be effective for large desktops but works perfectly on mobile phones, because

More information

Evolving SQL Queries for Data Mining

Evolving SQL Queries for Data Mining Evolving SQL Queries for Data Mining Majid Salim and Xin Yao School of Computer Science, The University of Birmingham Edgbaston, Birmingham B15 2TT, UK {msc30mms,x.yao}@cs.bham.ac.uk Abstract. This paper

More information

BPMN Getting Started Guide

BPMN Getting Started Guide Enterprise Studio BPMN Getting Started Guide 2017-09-21 Applies to: Enterprise Studio 3.0.0, Team Server 3.0.0 Table of contents 1 About modeling with BPMN 5 1.1 What is BPMN? 5 1.2 BPMN modeling 5 1.3

More information

One-Point Geometric Crossover

One-Point Geometric Crossover One-Point Geometric Crossover Alberto Moraglio School of Computing and Center for Reasoning, University of Kent, Canterbury, UK A.Moraglio@kent.ac.uk Abstract. Uniform crossover for binary strings has

More information