27 results on '"Semantic networks (Information theory)"'
Search Results
2. Correctness Properties in a Shared-Memory Parallel Language.
- Author
-
Caplain, Gilbert
- Subjects
PROGRAMMING languages ,SEMANTIC networks (Information theory) ,PARALLEL programming - Abstract
Examines the property of semantic correctness of programs written in a shared-memory parallel language. Requirements in parallel programming; Importance of sequential consistency of a multiprocess device to parallel programming; Theorem of semantic equivalence.
- Published
- 2002
- Full Text
- View/download PDF
3. KNOWLEDGE SERVICES ON THE SEMANTIC WEB.
- Author
-
Mentzas, Gregoris, Kafentzis, Kostas, and Georgolios, Panos
- Subjects
- *
SEMANTIC networks (Information theory) , *KNOWLEDGE management , *INFORMATION architecture , *ONTOLOGY , *INFORMATION storage & retrieval systems , *SYNCHRONOUS data transmission systems - Abstract
The article discusses the use of semantic technology to create infrastructures for knowledge management (KM) and commerce. The authors propose a semantic architecture for use in knowledge services. They suggest that the content of knowledge assets requires textured representations and that synchronous and asynchronous communication should be utilized. They propose a knowledge object ontology that identifies concepts for information retrieval. They suggest the use of a universal discovery, description, and integration (UDDI) platform to manage knowledge services and the use of negotiation protocols.
- Published
- 2007
- Full Text
- View/download PDF
4. A SEMANTIC APPROACH TO MONITOR BUSINESS PROCESS PERFORMANCE.
- Author
-
Thomas, Manoj, Redmond, Richard, Yoon, Victoria, and Singh, Rahul
- Subjects
- *
SEMANTIC Web , *BUSINESS , *SEMANTIC networks (Information theory) , *INFORMATION resources management , *BUSINESS information services - Abstract
This article focuses on importance of finding an effective method for managing and evaluating the performance of business processes in the success of electronic business. A description of the Semantic Web architecture is included, as well as information about multi-agent systems of monitoring business processes. Examples are given that demonstrate the architecture of an agent monitoring business performance. The authors examine the semantic composition of processes in a dynamic manner.
- Published
- 2005
- Full Text
- View/download PDF
5. USING THE WEB SERVICE MODELING ONTOLOGY TO ENABLE SEMANTIC E-BUSINESS.
- Author
-
De Bruijn, Jos, Fensel, Dieter, Keller, Uwe, and Lara, Rubén
- Subjects
- *
SEMANTIC networks (Information theory) , *ELECTRONIC commerce , *COMPUTER network protocols , *SEMANTIC integration (Computer systems) , *COMPUTER software industry , *SEMANTIC Web - Abstract
The article focuses on the use of web service modeling ontology to enable semantic e-business. E-business solutions often require costly hardware and software for each pair of cooperating business partners. However, the lack of formal descriptions of services offered by companies hampers automation in the location and usage of services. Web Services provide a uniform infrastructure for the provision of services leveraging Web technologies, but they offer only syntactical descriptions that are hardly amenable to automation.
- Published
- 2005
- Full Text
- View/download PDF
6. PREDICTING How ONTOLOGIES for the SEMANTIC WEB WILL EVOLVE.
- Author
-
Kim, Henry M.
- Subjects
- *
METADATA , *SEMANTIC networks (Information theory) , *ONTOLOGY , *COMPLEXITY (Philosophy) , *XML (Extensible Markup Language) , *KNOWLEDGE management - Abstract
This article attempts to predict the future of semantic Web ontologies by analyzing the history of paper-based business forms, as of February 2002. Forms innovations were adopted to reduce information, task and coordination complexity. However, one such innovation, the photocopier, had a by-product effect of increasing uncertainty in forms processing. In evaluating possible adoption of competing analogs to forms for semantic Web, it has been argued that as long as the pressing need is to reduce complexity, extendible markup language (XML) use is preferable to ontology use. It has also been posited that the innovation of modeling tools allowing knowledge workers to codify idiosyncratic information and then expect that information to be shared will increase uncertainty in data sharing. When this happens, the use of ontologies over XML to codify information will likely be desirable. These predictions confirm what some in the ontology community suspect may happen, and place emphasis on designing an ontology development tool demonstrated to be useful and usable to a knowledge worker, who is not a knowledge representation expert and development of decentralized and adaptive ontologies, which have value in and of themselves, but whose full potential will only be realized if they are used in combination with other ontologies in the future to enable data sharing. The immediate value may be use of ontologies for software specification.
- Published
- 2002
- Full Text
- View/download PDF
7. Deep Semantic Mapping for Heterogeneous Multimedia Transfer Learning Using Co-Occurrence Data.
- Author
-
LIANG ZHAO, ZHIKUI CHEN, YANG, LAURENCE T., DEEN, M. JAMAL, and WANG, Z. JANE
- Subjects
SEMANTIC networks (Information theory) ,DEEP learning ,ARTIFICIAL intelligence ,INFORMATION theory ,ACQUISITION of data - Abstract
Transfer learning, which focuses on finding a favorable representation for instances of different domains based on auxiliary data, can mitigate the divergence between domains through knowledge transfer. Recently, increasing efforts on transfer learning have employed deep neural networks (DNN) to learn more robust and higher level feature representations to better tackle cross-media disparities. However, only a few articles consider the correction and semantic matching between multi-layer heterogeneous domain networks. In this article, we propose a deep semantic mapping model for heterogeneous multimedia transfer learning (DHTL) using co-occurrence data. More specifically, we integrate the DNN with canonical correlation analysis (CCA) to derive a deep correlation subspace as the joint semantic representation for associating data across different domains. In the proposed DHTL, a multi-layer correlation matching network across domains is constructed, in which the CCA is combined to bridge each pair of domain-specific hidden layers. To train the network, a joint objective function is defined and the optimization processes are presented. When the deep semantic representation is achieved, the shared features of the source domain are transferred for task learning in the target domain. Extensive experiments for three multimedia recognition applications demonstrate that the proposed DHTL can effectively find deep semantic representations for heterogeneous domains, and it is superior to the several existing state-of-the-art methods for deep transfer learning. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
8. Agents and Creativity.
- Author
-
Boden, Margaret A.
- Subjects
- *
CREATIVE ability , *INTELLIGENT agents , *COMPUTER software , *SEMANTIC networks (Information theory) , *COMPUTER simulation , *ARTIFICIAL intelligence - Abstract
Creativity involves coming up with something novel, something different. And this new idea, in order to be interesting, must be intelligible. No matter how different it is, one must be able to understand it in terms of what has been known before in the same field. As for intelligent agents, their potential uses include helping by suggesting, identifying, and even evaluating differences between familiar ideas and novel ones. Many scientifically minded individuals would argue that there is nothing especially problematic about creativity. A creative idea, they would say, is merely a novel combination of familiar ideas. Accordingly, creativity could be explained by a scientific theory showing how such novel combinations can come about. The units within a computer model of a rich semantic network could communicate not only with each other but also with a human user. A writer might use the set of intercommunicating agents as an intelligent thesaurus, or even a computerized literary critic. For agents of this type might aid someone stuck for a new image, or someone attempting to assess one suggested by another writer. And they might help to show whether a series of images fits together, or to diagnose the mixture in a mixed metaphor.
- Published
- 1994
- Full Text
- View/download PDF
9. Relating Sentences and Semantic Networks with Procedural Logic.
- Author
-
Simmons, Robert F., Chester, Daniel, and Montgomery, Christine
- Subjects
- *
SEMANTIC networks (Information theory) , *ALGORITHMS , *SENTENCES (Grammar) , *COMPUTER logic , *PARAGRAPHS , *COMPARATIVE clauses (Grammar) , *SYMMETRY , *SEMANTICS - Abstract
Presents a system to transform sentence narrative into semantic case structures. Application of a thirteen-sentence narrative about a V-2 rocket; Construction of the symmetric translation grammars; Importance of semantic structures for simplifying summaries.
- Published
- 1982
- Full Text
- View/download PDF
10. Logic and Semantic Networks.
- Author
-
Deliyanni, Amaryllis, Kowalski, Robert A., and Montgomery, C.
- Subjects
- *
SEMANTIC networks (Information theory) , *COMPUTER logic , *LOGIC programming , *ARTIFICIAL intelligence , *ABSTRACT data types (Computer science) , *DATA structures , *PROGRAMMING languages - Abstract
An extended form of semantic network is defined, which can be regarded as a syntactic variant of the clausal form of logic. By virtue of its relationship with logic, the extended semantic network is provided with a precise semantics, inference rules, and a procedural interpretation. On the other hand, by regarding semantic networks as an abstract data structure for the representation of clauses, we provide a theorem-prover with a potentially useful indexing scheme and path-following strategy for guiding the search for a proof. [ABSTRACT FROM AUTHOR]
- Published
- 1979
- Full Text
- View/download PDF
11. Generating English Discourse from Semantic Networks.
- Author
-
Simmons, R., Slocum, J., and Lawson, C.L.
- Subjects
- *
ENGLISH language , *SEMANTIC networks (Information theory) - Abstract
Describes a system for generating English sentences from a form of semantic nets in which the nodes are word-sense meanings and the paths are primarily deep case relations. Representation of the semantic structure of English discourse and lexical information as a network of wordense concepts connected by deep case relations; Selection of the appropriate generation paths through grammar.
- Published
- 1972
- Full Text
- View/download PDF
12. Clickstream User Behavior Models.
- Author
-
GANG WANG, XINYI ZHANG, SHILIANG TANG, WILSON, CHRISTO, HAITAO ZHENG, and ZHAO, BEN Y.
- Subjects
INTERNET users ,ONLINE information services ,CYBERBULLYING ,SEMANTIC networks (Information theory) ,SOCIAL networks - Abstract
The next generation of Internet services is driven by users and user-generated content. The complex nature of user behavior makes it highly challenging to manage and secure online services. On one hand, service providers cannot effectively prevent attackers from creating large numbers of fake identities to disseminate unwanted content (e.g., spam). On the other hand, abusive behavior from real users also poses significant threats (e.g., cyberbullying). In this article, we propose clickstream models to characterize user behavior in large online services. By analyzing clickstream traces (i.e., sequences of click events from users), we seek to achieve two goals: (1) detection: to capture distinct user groups for the detection ofmalicious accounts, and (2) understanding: to extract semantic information from user groups to understand the captured behavior. To achieve these goals, we build two related systems. The first one is a semisupervised system to detect malicious user accounts (Sybils). The core idea is to build a clickstream similarity graph where each node is a user and an edge captures the similarity of two users' clickstreams. Based on this graph, we propose a coloring scheme to identify groups of malicious accounts without relying on a large labeled dataset. We validate the system using groundtruth clickstream traces of 16,000 real and Sybil users from Renren, a large Chinese social network. The second system is an unsupervised system that aims to capture and understand the fine-grained user behavior. Instead of binary classification (malicious or benign), this model identifies the natural groups of user behavior and automatically extracts features to interpret their semantic meanings. Applying this system to Renren and another online social network,Whisper (100K users), we help service providers identify unexpected user behaviors and even predict users' future actions. Both systems received positive feedback from our industrial collaborators including Renren, LinkedIn, and Whisper after testing on their internal clickstream data. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
13. DIRECTIONS FOR SECURITY AND PRIVACY FOR SEMANTIC E-BUSINESS APPLICATIONS.
- Author
-
Thuraisingham, Bhavani
- Subjects
- *
SEMANTIC Web , *WORLD Wide Web , *ELECTRONIC commerce , *SEMANTIC networks (Information theory) , *BUSINESS , *KNOWLEDGE management - Abstract
This article provides initial directions for security and privacy for Semantic E-business applications. Security and privacy concerns are presented in relation to the Semantic Web. Other topics that are mentioned include knowledge management, integration, and semantic Web mining. There is a need for a more focused research program that addresses security for the Semantic Web and its various layers.
- Published
- 2005
- Full Text
- View/download PDF
14. THE SEMANTIC E-BUSINESS VISION.
- Subjects
- *
ELECTRONIC commerce , *SEMANTIC networks (Information theory) , *INFORMATION superhighway , *SEMANTIC integration (Computer systems) , *COMPUTER service industry , *SEMANTIC Web , *INFORMATION networks - Abstract
The article focuses on the prospects of e-business. Developments in semantic technologies make Semantic Web content unambiguously computer interpretable and amenable to agent interoperability and automated reasoning techniques. Web Services and Web Services Architecture provide envelope and transport mechanisms for information exchange. Together, these technologies provide semantic knowledge representation and exchange mechanisms for collaborations in Semantic E-business processes. Semantic e-business as an approach to managing knowledge for the coordination of e-business processes through the systematic application of Semantic Web technologies. Application of Semantic Web technologies provides organizations the means to design collaborative and integrative, inter and intra-organizational business processes, and systems founded upon the seamless exchange of knowledge among trusted business partners. Developments in the availability of content and business logic on-demand, through technologies such as Web services, offer the potential to allow organizations to create content based and logic-driven information and knowledge value chains in the digital economy.
- Published
- 2005
- Full Text
- View/download PDF
15. Probabilistic Relational Reasoning for Differential Privacy.
- Author
-
BARTHE, GILLES, KÖPF, BORIS, OLMEDO, FEDERICO, and ZANELLA-BÉGUELIN, SANTIAGO
- Subjects
- *
PROGRAMMING languages , *COMPUTER programming , *SEMANTIC networks (Information theory) , *DATA integrity , *DATA protection - Abstract
Differential privacy is a notion of confidentiality that allows useful computations on sensible data while protecting the privacy of individuals. Proving differential privacy is a difficult and error-prone task that calls for principled approaches and tool support. Approaches based on linear types and static analysis have recently emerged; however, an increasing number of programs achieve privacy using techniques that fall out of their scope. Examples include programs that aim for weaker, approximate differential privacy guarantees and programs that achieve differential privacy without using any standard mechanisms. Providing support for reasoning about the privacy of such programs has been an open problem. We report on CertiPriv, a machine-checked framework for reasoning about differential privacy built on top of the Coq proof assistant. The central component of CertiPriv is a quantitative extension of probabilistic relational Hoare logic that enables one to derive differential privacy guarantees for programs from first principles. We demonstrate the applicability of CertiPriv on a number of examples whose formal analysis is out of the reach of previous techniques. In particular, we provide the first machine-checked proofs of correctness of the Laplacian, Gaussian, and exponential mechanisms and of the privacy of randomized and streaming algorithms from the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
16. Optimizing XML Querying Using Type-Based Document Projection.
- Author
-
BENZAKEN, VÉRONIQUE, CASTAGNA, GIUSEPPE, COLAZZO, DARIO, and KIM NGUYÊN, KIM
- Subjects
- *
XML (Extensible Markup Language) , *DATABASE management , *QUERY languages (Computer science) , *PROGRAMMING languages , *SEMANTIC networks (Information theory) , *PROGRAM transformation - Abstract
XML data projection (or pruning) is a natural optimization for main memory query engines: given a query Q over a document D, the subtrees of D that are not necessary to evaluate Q are pruned, thus producing a smaller document D'; the query Q is then executed on D', hence avoiding to allocate and process nodes that will never be reached by Q. In this article, we propose a new approach, based on types, that greatly improves current solutions. Besides providing comparable or greater precision and far lesser pruning overhead, our solution--unlike current approaches--takes into account backward axes, predicates, and can be applied to multiple queries rather than just to single ones. A side contribution is a new type system for XPath able to handle backward axes. The soundness of our approach is formally proved. Furthermore, we prove that the approach is also complete (i.e., yields the best possible type-driven pruning) for a relevant class of queries and Schemas. We further validate our approach using the XMark and XPathMark benchmarks and show that pruning not only improves the main memory query engine's performances (as expected) but also those of state of the art native XML databases. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
17. Schema Matching and Embedded Value Mapping for Databases with Opaque Column Names and Mixed Continuous and Discrete-valued Data Fields.
- Author
-
JAISWAL, ANUJ, MILLER, DAVID J., and MITRA, PRASENJIT
- Subjects
- *
EMBEDDED value , *DATABASE management , *SEMANTIC networks (Information theory) , *BIJECTIONS , *EUCLIDEAN distance , *DATA mining - Abstract
Schema matching and value mapping across two information sources, such as databases, are critical information aggregation tasks. Before data can be integrated from multiple tables, the columns and values within the tables must be matched. The complexities of both these problems grow quickly with the number of attributes to be matched and due to multiple semantics of data values. Traditional research has mostly tackled schema matching and value mapping independently, and for categorical (discrete-valued) attributes.We propose novel methods that leverage value mappings to enhance schema matching in the presence of opaque column names for schemas consisting of both continuous and discrete-valued attributes. An additional source of complexity is that a discrete-valued attribute in one schema could in fact be a quantized, encoded version of a continuous-valued attribute in the other schema. In our approach, which can tackle both "onto" and bijective schema matching, the fitness objective for matching a pair of attributes from two schemas exploits the statistical distribution over values within the two attributes. Suitable fitness objectives are based on Euclidean-distance and the data log-likelihood, both of which are applied in our experimental study. A heuristic local descent optimization strategy that uses two-opt switching to optimize attribute matches, while simultaneously embedding value mappings, is applied for our matching methods. Our experiments show that the proposed techniques matched mixed continuous and discrete-valued attribute schemas with high accuracy and, thus, should be a useful addition to a framework of (semi) automated tools for data alignment. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
18. Ontology Learning from Text: A Look Back and into the Future.
- Author
-
Wong, Wilson, Wei Liu, and Bennamoun, Mohammed
- Subjects
- *
COMPUTER access control , *SOFTWARE protection , *INFORMATION storage & retrieval systems , *COMPUTER systems , *SEMANTIC Web , *SEMANTIC networks (Information theory) - Abstract
Ontologies are often viewed as the answer to the need for interoperable semantics in modern information systems. The explosion of textual information on the Read/Write Web coupled with the increasing demand for ontologies to power the Semantic Web have made (semi-)automatic ontology learning from text a very promising research area. This together with the advanced state in related areas, such as natural language processing, have fueled research into ontology learning over the past decade. This survey looks at how far we have come since the turn of the millennium and discusses the remaining challenges that will define the research directions in this area in the near future. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
19. Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction.
- Author
-
Xuxian Jiang, Xinyuan Wang, and Dongyan Xu
- Subjects
MALWARE ,VIRTUAL machine systems ,SEMANTIC computing ,COMPUTER operating systems ,SEMANTIC networks (Information theory) ,DATA structures - Abstract
An alarming trend in recent malware incidents is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive side, a fundamental limitation of traditional host-based antimalware systems is that they run inside the very hosts they are protecting ("in-the-box"), making them vulnerable to counter detection and subversion by malware. To address this limitation, recent solutions based on virtual machine (VM) technologies advocate placing the malware detection facilities outside of the protected VM ("out-ofthe- box"). However, they gain tamper resistance at the cost of losing the internal semantic view of the host, which is enjoyed by "in-the-box" approaches. This poses a technical challenge known as the semantic gap. In this article, we present the design, implementation, and evaluation of VMwatcher-an "outof- the-box" approach that overcomes the semantic gap challenge. A new technique called guest view casting is developed to reconstruct internal semantic views (e.g., files, processes, and kernel modules) of a VM nonintrusively from the outside. More specifically, the new technique casts semantic definitions of guest OS data structures and functions on virtual machine monitor (VMM)- level VM states, so that the semantic view can be reconstructed. Furthermore, we extend guest view casting to reconstruct details of system call events (e.g., the process that makes the system call as well as the system call number, parameters, and return value) in the VM, enriching the semantic view. With the semantic gap effectively narrowed, we identify three unique malware detection and monitoring capabilities: (i) view comparison-based malware detection and its demonstration in rootkit detection; (ii) "out-of-the-box" deployment of off-the-shelf anti malware software with improved detection accuracy and tamper-resistance; and (iii) nonintrusive system call monitoring for malware and intrusion behavior observation. We have implemented a proof-of-concept VMwatcher prototype on a number of VMM platforms. Our evaluation experiments with real-world malware, including elusive kernel-level rootkits, demonstrate VMwatcher's practicality and effectiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
20. Web Accessibility for Individuals with Cognitive Deficits: A Comparative Study between an Existing Commercial Web and Its Cognitively Accessible Equivalent.
- Author
-
Sevilla, Javier, Herrera, Gerardo, Martínez, Bibiana, and Alcantud, Francisco
- Subjects
HUMAN-computer interaction ,WEB accessibility ,COMPUTERS & people with disabilities ,ASSISTIVE computer technology ,HUMAN artificial insemination ,COGNITION disorders ,SEMANTIC networks (Information theory) - Abstract
Tim Berners-Lee claimed in 2001 that "the power of the Web is in its universality. Access by every- one regardless of disability is an essential aspect". A considerable amount of work has been done to make the web accessible to those with sensory or motor disability, with an increasing number of government and enterprise intranet webs being "accessible", and also with some consortiums and groups seriously approaching this commitment. Some authors, such as Harrysson, have already highlighted the need for a cognitively accessible web. However, in spite of good intentions, there has been little work to date that has tackled this task. At least until now, the existing WAI and NI4 recommendations about cognitive disability are extremely difficult (if not impossible) to test, as they are only general recommendations. This article explains an alternative Web that has been constructed and tested on a sample of participants with cognitive disabilities (N = 20) with positive results encouraging us to dedicate more effort to fine tune their requirements regarding specific cognitive deficits and automating the process of creating and testing cognitively accessible web content. This alternative web implies the use of a simplified web browser and an adequate web design. Discussion of the need to have several levels of cognitive accessibility, equivalent (although not identical) content for this collective and the need for testable protocols of accessibility that support these people's needs is also included. This article finishes with conclusions about the potential impact of accessible pages in the daily life of people suffering from cognitive deficits, outlining the features to be considered within a user profile specification that support cognitive difficulties and with reflections about the suitability of Semantic Web Technologies for future developments in this field. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
21. Metadata Handling: A Video Perspective.
- Author
-
Madhwacharyula, Chitra L., Davis, Marc, Mulhem, Philippe, and Kankanhalli, Mohan S.
- Subjects
VIDEO recording ,VIDEO editing ,METADATA ,METADATABASES ,SEMANTIC networks (Information theory) ,ELECTRONIC data processing - Abstract
This article addresses the problem of processing the annotations of preexisting video productions to enable reuse and repurposing of metadata. We introduce the concept of automatic content-based editing of preexisting semantic home video metadata. We propose a formal representation and implementation techniques for reusing and repurposing semantic video metadata in concordance with the actual video editing operations. A novel representation for metadata editing is proposed and an implementation framework for editing the metadata in accordance with the video editing operations is demonstrated. Conflict resolution and regularization operations are defined and implemented in the context of the video metadata editing operations. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
22. A Semantic Web Ontology for Context-Based Classification and Retrieval of Music Resources.
- Author
-
Ferrara, Alfio, Ludovico, Luca A., Montanelli, Stefano, Castano, Silvana, and Haus, Goffredo
- Subjects
MUSIC education ,MUSICAL performance ,SEMANTIC Web ,SEMANTIC integration (Computer systems) ,SEMANTIC networks (Information theory) ,ONTOLOGIES (Information retrieval) ,DATA structures - Abstract
In this article, we describe the MX-Onto ontology for providing a Semantic Web compatible representation of music resources based on their context. The context representation is realized by means of an OWL ontology that describes music information and that defines rules and classes for a flexible genre classification. By flexible classification we mean that the proposed approach enables capturing the subjective interpretation of music genres by defining multiple membership relations between a music resource and the corresponding music genres, thus supporting context-based and proximity-based search of music resources. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
23. A Proof Theory for Generic Judgments.
- Author
-
Miller, Dale and Tiu, Alwen
- Subjects
SEMANTIC networks (Information theory) ,SEMANTIC integration (Computer systems) ,INTEGRATED software ,MATHEMATICAL functions ,INFORMATION theory - Abstract
The article cites a study on the operational semantics of a computational system. It investigates the potential of using term-level abstractions and proof-level abstractions in creating high-level specifications. The study presents a sequent calculus that provides the local notion of this scope. The resulting logic can be used to encode a number of examples involving abstractions.
- Published
- 2005
- Full Text
- View/download PDF
24. Semantic Data Models.
- Author
-
Peckham, Joan and Maryanski, Fred
- Subjects
- *
SEMANTIC networks (Information theory) , *INFORMATION resources - Abstract
Describes the generic properties of semantic data models and presents a representative selection of models that have been proposed in the mid-1970. Features that are lack in generation data models.
- Published
- 1988
- Full Text
- View/download PDF
25. Multimedia Database Management System.
- Author
-
Ghafoor, Arif
- Subjects
- *
MULTIMEDIA systems , *DATABASE management , *INFORMATION storage & retrieval systems , *ELECTRONIC data processing , *SEMANTIC networks (Information theory) , *ARTIFICIAL intelligence , *INFORMATION theory - Abstract
The article focuses on multimedia database management systems. Due to the heterogeneous nature of multimedia data management systems, which are intended to store, transport, display and in general manage such data, must have considerably more capabilities than conventional information-management systems. This article elaborates on issues pertaining to multimedia database management and discuss technical challenges involved in developing a general-purpose multimedia. One can view these issues as specification requirements for this multimedia and focus the discussion on a reference architecture for such a system, development of formal semantic modeling techniques for multimedia information, especially for video and image data. These models should be rich in capabilities for abstracting multimedia information and capturing semantics. They should be able to provide canonical representations of complex images, scenes, and events in terms of objects and their spatio-tethporal behavior. These models need to be compared and evaluated.
- Published
- 1995
- Full Text
- View/download PDF
26. Dynamic Network Analytics.
- Author
-
Carley, Kathleen M. and Carley, Larry Richard
- Subjects
NETWORK analysis (Communication) ,ONLINE social networks ,TAGS (Metadata) ,SEMANTIC networks (Information theory) - Abstract
Network analytics are widely used in many fields. Increasingly though, the networks of interest are high dimensional. Rather than just focusing on the traditional who is interaction with whom networks, modern network analysis examines the who, what, where, when and why ecology of relations. For example, studies of organizations might look at the social network within the organization as well as the task assignment and knowledge network. Studies using Twitter frequently look at the mentions network at the same time as the hashtag network. Making network science actionable typically involves answering questions about where the network is concentrated or how the network varies over time. This tutorial will cover the basics of Network analytics and demonstrate the use of ORA to support social media analytics using high dimensional network analytics and visualization for social media networks, semantic networks, geo-spatial networks, and dynamic networks. It will cover the basics of visualizing and analyzing time varying networks and spatially positioned networks. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author. ORA is a powerful network analysis and visualization tool (Carley, 2017). ORA supports the assessment of standard social network data, organizational network data, high-dimensional network data, meta-network data, geo-spatial network data, and dynamic network data. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
27. Transitive Dependencies.
- Author
-
Teorey, Toby J.
- Subjects
- *
DATABASES , *REDUNDANCY in engineering , *SEMANTIC networks (Information theory) - Abstract
Comments on an article by Toby J. Teorey, Dongqing Yang and James P. Fry which presented an approach to designing relational databases. Information on several problems caused by redundant relationships; Impact of leaving the redundant relationships at the extended entity-relationship step; Function of additional semantic information.
- Published
- 1987
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.