Results 1 - 10
of
37
A semantic wiki for mathematical knowledge management
- Proceedings of the 1st Workshop on Semantic Wikis, European Semantic Web Conference 2006, Budva, Montenegro, 2006. CEUR Workshop Proceedings. To appear, provisional online version at http://www.eswc2006.org/technologies/ usb/proceedings-workshops/ eswc200
, 2007
"... SWIM is a semantic wiki for collaboratively building, editing and browsing mathematical knowledge represented in the structural markup language OMDOC. It has been designed to enable groups of scientists to develop new mathematical theories in OMDOC and to enable scholars to browse such a corpus. Aft ..."
Abstract
-
Cited by 36 (15 self)
- Add to MetaCart
SWIM is a semantic wiki for collaboratively building, editing and browsing mathematical knowledge represented in the structural markup language OMDOC. It has been designed to enable groups of scientists to develop new mathematical theories in OMDOC and to enable scholars to browse such a corpus. After a short introduction to semantic wikis and their usefulness for mathematical knowledge, this article presents the architecture and the user interface of the current SWIM prototype and outlines the plans for developing its successor, an ontology-based platform for semantic scientific services that exploit the knowledge and make it accessible to the user. 1
CumulusRDF: linked data management on nested key-value stores. In:
- Proceedings of SSWS
, 2011
"... Abstract. Publishers of Linked Data require scalable storage and retrieval infrastructure due to the size of datasets and potentially high rate of lookups on popular sites. In this paper we investigate the feasibility of using a distributed nested keyvalue store as an underlying storage component f ..."
Abstract
-
Cited by 16 (0 self)
- Add to MetaCart
(Show Context)
Abstract. Publishers of Linked Data require scalable storage and retrieval infrastructure due to the size of datasets and potentially high rate of lookups on popular sites. In this paper we investigate the feasibility of using a distributed nested keyvalue store as an underlying storage component for a Linked Data server which provides functionality for serving Linked Data via HTTP lookups and in addition offers single triple pattern lookups. We devise two storage schemes for our CumulusRDF system implemented on Apache Cassandra, an open-source nested key-value store. We compare the schemes on a subset of DBpedia and both synthetic workloads and workloads obtained from DBpedia's access logs. Results on a cluster of up to 8 machines indicate that CumulusRDF is competitive to state-of-the-art distributed RDF stores.
Efficient Runtime Service Discovery and Consumption with Hyperlinked RESTdesc
"... Abstract—Hyperlinks and forms let humans navigate with ease through websites they have never seen before. In contrast, automated agents can only perform preprogrammed actions on Web services, reducing their generality and restricting their usefulness to a specialized domain. Many of the employed ser ..."
Abstract
-
Cited by 13 (2 self)
- Add to MetaCart
(Show Context)
Abstract—Hyperlinks and forms let humans navigate with ease through websites they have never seen before. In contrast, automated agents can only perform preprogrammed actions on Web services, reducing their generality and restricting their usefulness to a specialized domain. Many of the employed services call themselves RESTful, although they neglect the hypermedia constraint as defined by Roy T. Fielding, stating that the application state should be driven by hypertext. This lack of link usage on the Web of services severely limits agents in what they can do, while connectedness forms a primary feature of the human Web. An urgent need for more intelligent agents becomes apparent, and in this paper, we demonstrate how the conjunction of functional service descriptions and hypermedia links leads to advanced, interactive agent behavior. We propose a new mode for our previously introduced semantic service description format RESTdesc, providing the mechanisms for agents to consume Web services based on links, similar to human browsing strategies. We illustrate the potential of these descriptions by a use case that shows the enhanced capabilities they offer to automated agents, and explain how this is vital for the future Web. Index Terms—automated agents; hypermedia links, Semantic Web; service consumption; service discovery
Providing Access Control to Online Photo Albums Based on Tags and Linked Data ∗
"... While photo sharing sites such as Flickr provide efficient tools for setting up an online album, users who want to maintain a certain level of privacy are usually only provided with rudimentary access control. Given that descriptive tags are extensively used on photos, and that the Semantic Web prov ..."
Abstract
-
Cited by 13 (1 self)
- Add to MetaCart
(Show Context)
While photo sharing sites such as Flickr provide efficient tools for setting up an online album, users who want to maintain a certain level of privacy are usually only provided with rudimentary access control. Given that descriptive tags are extensively used on photos, and that the Semantic Web provides a common means of sharing social network information as linked data, we believe better access control mechanism can be provided by combining the two. Based on this idea, we propose and describe in this paper a system which allows users to create expressive access control policies for their photos on the Web by using both tags and linked data.
Provenance map orbiter: Interactive exploration of large provenance graphs
- in Proceedings of the 3rd Workshop on the Theory and Practice of Provenance (TaPP), USENIX Association
, 2011
"... Provenance systems can produce enormous provenance graphs that can be used for a variety of tasks from deter-mining the inputs to a particular process to debugging entire workflow executions or tracking difficult-to-find dependencies. Visualization can be a useful tool to sup-port such tasks, but gr ..."
Abstract
-
Cited by 12 (4 self)
- Add to MetaCart
(Show Context)
Provenance systems can produce enormous provenance graphs that can be used for a variety of tasks from deter-mining the inputs to a particular process to debugging entire workflow executions or tracking difficult-to-find dependencies. Visualization can be a useful tool to sup-port such tasks, but graphs of such scale (thousands to millions of nodes) are notoriously difficult to visualize. This paper presents the Provenance Map Orbiter, a tool for interactively exploring large provenance graphs using graph summarization and semantic zoom. It presents its users with a high-level abstracted view of the graph and the ability to incrementally drill down to the details. 1
Respect My Privacy by
, 2009
"... Most social networks have implemented extensive, complex privacy controls in order to battle the host of privacy concerns that initially plagued their online communities. These privacy controls have taken the form of access restriction, which allows users to specify who is and who is not allowed to ..."
Abstract
-
Cited by 8 (2 self)
- Add to MetaCart
(Show Context)
Most social networks have implemented extensive, complex privacy controls in order to battle the host of privacy concerns that initially plagued their online communities. These privacy controls have taken the form of access restriction, which allows users to specify who is and who is not allowed to view their personal information. This binary system leaves users unprotected in the, hopefully rare, cases in which the access restriction mechanisms are bypassed. Respect My Privacy offers a different approach to privacy protection, founded on the philosophies of Information Accountability. Respect My Privacy aims to allow users to clearly declare the policies that govern the use of their data, and implement mechanisms that promptly notify the user of misuse after the fact. In its current state, the Respect My Privacy project has been implemented across three platforms: Facebook, OpenSocial, and the Tabulator extension with a focus on defining a clear vocabulary for discussing restrictions on use of data and making it simple for users to display and edit the restrictions users wish to place on their personal
P.: Privacy control in smart phones using semantically rich reasoning and context modeling
- In: IEEE Workshop on Semantic Computing and Security (SPW
, 2012
"... and context modeling ..."
(Show Context)
QUATRO Plus: Quality You Can Trust?
"... Abstract. The QUATRO Plus project, a follow on from the original QUATRO Project, aims to balance the wisdom of the crowds with the knowledge of the experts. It uses a mixture of authenticated data sources and the opinions of end users expressed through social networking software to build a dataset t ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
(Show Context)
Abstract. The QUATRO Plus project, a follow on from the original QUATRO Project, aims to balance the wisdom of the crowds with the knowledge of the experts. It uses a mixture of authenticated data sources and the opinions of end users expressed through social networking software to build a dataset that is authoritative and trustworthy. The dataset describes online resources using RDF with the upcoming W3C Recommendation, POWDER, as the underlying transport and storage mechanism. Data can be added to or queried through a variety of tools provided by the project, some of which are described in detail in this paper. 1
Scalable Authoritative OWL Reasoning on a Billion Triples
"... Abstract. In this paper we present a scalable algorithm for performing a subset of OWL reasoning over web data using a rule-based approach to forward-chaining; in particular, we identify the problem of ontology hijacking: new ontologies published on the Web re-defining the semantics of existing conc ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
Abstract. In this paper we present a scalable algorithm for performing a subset of OWL reasoning over web data using a rule-based approach to forward-chaining; in particular, we identify the problem of ontology hijacking: new ontologies published on the Web re-defining the semantics of existing concepts resident in other ontologies. Our solution introduces consideration of authoritative sources. We present the results of applying our methods on a re-crawl of the billion triple challenge dataset. 1
Promoting Interoperability between Heterogeneous Policy Domains ∗
"... With policy management gaining popularity as a means of providing flexible Web security, the number of policy languages being proposed is constantly increasing. We recognize the importance of policies for securing the Web and protecting user information and believe that the future will only bring mo ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
With policy management gaining popularity as a means of providing flexible Web security, the number of policy languages being proposed is constantly increasing. We recognize the importance of policies for securing the Web and protecting user information and believe that the future will only bring more policy languages. We do not, however, believe that users should be forced to conform the description of their policy relationships to a single standard policy language. Instead there should be a way of encompassing different policy languages and supporting heterogeneous policy systems. As a step in this direction, we propose Rein, a policy framework grounded in Semantic Web technologies, which leverages the distributed nature and linkability of the Web to provide policy management for the Web. Rein provides ontologies for describing policy domains in a decentralized manner and provides an engine for reasoning over these descriptions, both of which can be used to develop domain and policy language specific systems. 1