Ontology-Based Infrastructure for Intelligent Applications

Total Page:16

File Type:pdf, Size:1020Kb

Ontology-Based Infrastructure for Intelligent Applications Ontology-based Infrastructure for Intelligent Applications Andreas Eberhart Dissertation zur Erlangung des Grades Doktor der Ingenieurwissenschaften (Dr.-Ing.) der Naturwissenschaftlich-Technischen Fakult¨at I der Universit¨at des Saarlandes Saarbruc¨ ken, 2004 Tag des Kolloquiums: 18.12.2003 Dekan: Prof. Dr. Slusallek Vorsitzender: Prof. Dr. Andreas Zeller Berichterstatter: Prof. Dr. Wolfgang Wahlster, Prof. Dr. Andreas Reuter Fur¨ Hermann und Martin in liebevollem Gedenken Abstract Ontologien sind derzeit ein viel diskutiertes Thema in Bereichen wie Wissens- management oder Enterprise Application Integration. Diese Arbeit stellt dar, wie Ontologien als Infrastruktur zur Entwicklung neuartiger Applikationen ver- wendet werden k¨onnen, die den User bei verschiedenen Arbeiten unterstutzen.¨ Aufbauend auf den im Rahmen des Semantischen Webs entstandenen Spezi- fikationen, werden drei wesentliche Beitr¨age geleistet. Zum einen stellen wir Inferenzmaschinen vor, die das Ausfuhren¨ von deklarativ spezifizierter Applika- tionslogik erlauben, wobei besonderes Augenmerk auf die Skalierbarkeit gelegt wird. Zum anderen schlagen wir mehrere L¨osungen zum Anschluss solcher Sys- teme an bestehende IT Infrastruktur vor. Dies beinhaltet den, unseres Wissens nach, ersten lauff¨ahigen Prototyp der die beiden aufstrebenden Felder des Se- mantischen Webs und Web Services verbindet. Schließlich stellen wir einige intelligente Applikationen vor, die auf Ontologien basieren und somit großteils von Werkzeugen automatisch generiert werden k¨onnen. Abstract Ontologies currently are a hot topic in the areas of knowledge management and enterprise application integration. In this thesis, we investigate how ontologies can also be used as an infrastructure for developing applications that intelli- gently support a user with various tasks. Based on recent developments in the area of the Semantic Web, we provide three major contributions. We introduce inference engines, which allow the execution of business logic that is specified in a declarative way, while putting strong emphasis on scalability and ease of use. Secondly, we suggest various solutions for interfacing applications that are de- veloped under this new paradigm with existing IT infrastructure. This includes the first running solution, to our knowledge, for combining the emerging areas of the Semantic Web and Web Services. Finally, we introduce a set of intelligent applications, which is built on top of ontologies and Semantic Web standards, providing a proof of concept that the engineering effort can largely be based on standard components. Abstract Ontologien sind derzeit ein viel diskutiertes Thema in Bereichen wie Wissens- management oder Enterprise Application Integration. Diese Arbeit stellt dar, wie Ontologien als Infrastruktur zur Entwicklung neuartiger Applikationen ver- wendet werden k¨onnen, die den User bei verschiedenen Arbeiten unterstutzen.¨ Hierbei werden die folgenden wesentlichen Fragestellungen beantwortet. 1. Wie viel und welche Art von semantisch gekennzeichneten Daten sind im Web derzeit verfugbar?¨ Wir suchen das Web mittels vier verschiedener Methoden nach RDF ab. Die gefundenen RDF Fakten werden aufgrund des Pr¨adikatnamespaces und dem Fundort analysiert. Die Resultate zeigen, dass RDF noch nicht von einer großen Nutzergruppe verwendet wird. Dennoch sind viel ver- sprechende Anzeichen wie die RDF Unterstutzung¨ der Adobe Werkzeuge zu erkennen. 2. K¨onnen Regeln und Ontologien in eine etablierte IT Landschaft aus Daten- bank und objektorientierten Programmiersprachen integriert werden? Wir pr¨asentieren die OntoJava und OntoSQL Inferenzmaschinen, die sich auf bew¨ahrte Technologien wie Java und relationale Datenbanken stutzten.¨ Dabei werden RDF Schema Ontologien und RuleML in Java beziehungsweise SQL ub¨ ersetzt. Trotz einiger inh¨arenter Einschr¨ankungen bew¨ahrten sich diese Werkzeuge als Basis fur¨ die Entwicklung weiterer Applikationen. Leistungstest zeigen, dass Datenbanken durchaus mit tra- ditionellen regelbasierten Inferenzmaschinen wie XSB mithalten k¨onnen. 3. K¨onnen Ontologien und Ereignis Bedingung Aktionsregeln zur Spezifika- tion des Verhaltens von Agenten verwendet werden? Die deklarative Spezifikation von Agenten ist ein sehr viel versprechender Ansatz, da er den Entwickler von vielen der Lasten befreit, die die Pro- grammierung von Agenten normalerweise mit sich bringt. Mit OntoAgent stellen wir eine Plattform vor, die es erlaubt einen Agenten komplett mit Standards des Semantischen Webs, insbesondere RDF, RDF Schema und RuleML, zu spezifizieren. Die Implementierung basiert auf OntoSQL und einigen Modulen zur Realisierung von Reaktionsregeln, einer Komman- dobibliothek und einer Kommunikationseinheit. Wir diskutieren ferner etliche der getroffenen Designentscheidungen. 4. Ist es m¨oglich semantisch gekennzeichnete Dienste ad hoc aufzurufen? Wir pr¨asentieren WSDF, eine semantische Annotation von Web Ser- vices basierend auf WSDL, RDF Schema und RuleML. Mit Hilfe eines WSDL Kompilers und unseres OntoSQL RuleML-SQL Konverters wird ein Klient in die Lage versetzt, die generische Beschreibung des Dien- stes in lauff¨ahigen Code umzusetzen. Dadurch ist lediglich eine gemein- same Ontologie die Voraussetzung fur¨ das Aufrufen des Dienstes. Ob- wohl wir uns auf die einfachste Form, n¨amlich Dienste ohne Seiteneffekte, beschr¨anken ist dies ein wesentlicher Schritt nach vorn, da bisher im- mer explizit gegen die Schnittstelle programmiert werden musste oder ein vorab bekanntes UDDI tModel implementiert sein musste. Verglichen mit anderen Ans¨atzen wie DAML-S oder WSMF bieten wir nicht nur die Sprache, sondern erstmals auch eine funktionierende Laufzeitumgebung die es dem Klienten erlaubt generische Dienste aufzurufen und die Ergeb- nisse korrekt zu interpretieren. 5. Ist es m¨oglich linguistische Funktionen mittels derselben Mechanismen zu verwirklichen, die auch zur Einbindung von anderen Informationsquellen verwendet werden? Die OntoLang und SmartDialog Sprachsysteme demonstrieren diese M¨oglichkeit. OntoLang verwendet linguistische Annotationen um ein- fache S¨atze zu verstehen und die darin enthaltenen Fakten in die RDF Wissensbasis einzufugen.¨ Dadurch ist OntoLang in der Lage ub¨ er die Inferenzmaschine mit beliebigen anderen Applikationen zu interagieren. 6. Bietet die einer Software zugrunde liegende Ontologie eine ausreichende Basis um verschiedenen Komponenten eine Kooperation zu erm¨oglichen? Angenommen die Ontologie ist sowohl in dem Datenmodell der Fakten- basis als auch in der Inferenz- und der Anfrageschicht vertreten, so zeigen wir, dass Applikationsteile ub¨ er diese Schnittstelle kooperieren k¨onnen. Das gemeinsame Datenmodell fungiert hierbei als Mediator. 7. Sind Ontologien bei der Entwicklung von komplexen Applikationen hilfre- ich? Wir stellen die Tragf¨ahigkeit unserer Konzepte dadurch unter Beweise, indem wir einige Beispielapplikationen mit unseren eigenen Werkzeugen entwickeln. SmartGuide und SmartDialog demonstrieren hierbei wie eine komplexe Document Retrieval Anwendung die den Nutzerkontext mit ein- bezieht und kl¨arende Fragen stellt mit vertretbarem Aufwand implemen- tiert werden kann. Abstract Ontologies currently are a hot topic in the areas of knowledge management and enterprise application integration. In this thesis, we investigate how on- tologies can also be used as an infrastructure for developing applications that intelligently support a user with various tasks. In particular, the following key questions are answered. 1. How much and what kind of semantically tagged data is available on the Web today? We crawled the Web for RDF data using four different search strategies. The RDF facts were analyzed according to their predicate namespaces and their location. The results show that RDF has not yet caught on with a large user community. However, there are promising signs such as Adobe supporting RDF in its tools. 2. Can rules and ontology be integrated into a mainstream IT infrastructure of databases and object oriented programming languages? We present the OntoJava and OntoSQL inference engines which leverage proven technologies such as Java and relational databases by translating RDF Schema ontologies and RuleML into Java and SQL respectively. De- spite some inherent limitations on the rule expressiveness, the tools prove to be a valuable backbone for application development. Performance mea- surements show that SQL databases can very well keep up with traditional rule engines such as XSB. 3. Can ontologies and event condition action rules be used to define the behavioral aspects of agents? Declaratively specifying agents is an extremely promising approach since it relieves programmers from many of the burdens that are usually inher- ent with the implementation of agent systems. We present OntoAgent, a framework, which builds on Boley et. al's idea of specifying an agent en- tirely using the Semantic Web mark-up languages RDF, RDF Schema, and RuleML. The implementation is based on OntoSQL and a set of add-ons for realizing reaction rules, a command library, and a messaging subsystem based on HTTP. Several design choices and trade-offs are discussed. 4. Is it possible to invoke a semantically tagged service on the fly? We present WSDF, a semantic annotation of Web Services based on the existing languages WSDL, RDFS, and RuleML. Using a WSDL compiler and our OntoSQL RuleML to SQL converter, a client application is able to process the generic descriptions into running code. Web Services can therefore be invoked simply by agreeing on
Recommended publications
  • Base64 Character Encoding and Decoding Modeling
    Base64 Character Encoding and Decoding Modeling Isnar Sumartono1, Andysah Putera Utama Siahaan2, Arpan3 Faculty of Computer Science,Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia Abstract: Security is crucial to maintaining the confidentiality of the information. Secure information is the information should not be known to the unreliable person, especially information concerning the state and the government. This information is often transmitted using a public network. If the data is not secured in advance, would be easily intercepted and the contents of the information known by the people who stole it. The method used to secure data is to use a cryptographic system by changing plaintext into ciphertext. Base64 algorithm is one of the encryption processes that is ideal for use in data transmission. Ciphertext obtained is the arrangement of the characters that have been tabulated. These tables have been designed to facilitate the delivery of data during transmission. By applying this algorithm, errors would be avoided, and security would also be ensured. Keywords: Base64, Security, Cryptography, Encoding I. INTRODUCTION Security and confidentiality is one important aspect of an information system [9][10]. The information sent is expected to be well received only by those who have the right. Information will be useless if at the time of transmission intercepted or hijacked by an unauthorized person [7]. The public network is one that is prone to be intercepted or hijacked [1][2]. From time to time the data transmission technology has developed so rapidly. Security is necessary for an organization or company as to maintain the integrity of the data and information on the company.
    [Show full text]
  • The Semantic Web and Its Languages Editor: Dieter Fensel Vrije Universiteit Amsterdam [email protected]
    TRENDS & CONTROVERSIES The semantic Web and its languages Editor: Dieter Fensel Vrije Universiteit Amsterdam [email protected] The Web has drastically changed the availability of electronic informa- epistemologically rich modeling primitives, provided by the frame com- tion, but its success and exponential growth have made it increasingly munity; formal semantics and efficient reasoning support, provided by difficult to find, access, present, and maintain such information for a wide description logics; and a standard proposal for syntactical exchange nota- variety of users. In reaction to this bottleneck, many new research initia- tions, provided by the Web community. (See the essay by Frank van tives and commercial enterprises have been set up to enrich available Harmelen and Ian Horrocks.) information with machine-processable semantics. Such support is essen- Another candidate for such a Web-based ontology modeling lan- tial for bringing the Web to its full potential in areas such as knowledge guage is DAML-ONT. The DARPA Agent Markup Language is a management and electronic commerce. This semantic Web will provide major, well-funded initiative, aimed at joining the many ongoing intelligent access to heterogeneous and distributed information, enabling semantic Web efforts and focused on bringing ontologies to the Web. software products (agents) to mediate between user needs and available The DAML language inherits many aspects from OIL, and the capabili- information sources. Early steps in the direction of a semantic Web were ties of the two languages are relatively similar. Both initiatives cooper- SHOE1 and later Ontobroker,2 but now many more projects exist. ate in a Joint EU/US ad hoc Agent Markup Language Committee to Originally, the Web grew mainly around HTML, which provided a achieve a joined language proposal.
    [Show full text]
  • French Montana Do for Drugs
    Do for Drugs French Montana Max, French Montana, Dame Grease, Coke Wave This That More Compatible Music This That Shit That Got Them Feenes Selling They Whole Muthafuc kin' Cream What You Won't Do For Drugs? You Think You Got Everything, But You Gonna Need Drugs You Pawned Your Jewels (Pawned Your Jewels) For Drugs You Tried Everything But You Gone Need Drugs I Should Have Knew You Was Trouble Right From The Start You Stood In MY Corner When That Bitch Broke My Heart You Came Through, Kept A Brother Up, I Maintained But You Tried To Set A Nigga Up Fuck It, I Wouldn't Risk, Knowing I'm Living On The Edge Keep My Burner, 9-1-3 In His Head, Coppers Come And We Fled It Was Me, Unc & Bugalo. I'm Really The One, Know Tell Me What You Gonna Do I Think I Need A 50 Piece, That Shit Will Get Me Right, Get Me High We Running Through The City Fly, Bitches Love When We Fuck Love When We Come & Light Em Up, Bite Em Up Baby Come Get In The Truck (What You Wanna Do?) What You Won't Do For Drugs? You Think You Got Everything, But You Gonna Need Drugs You Pawned Your Jewels (Pawned Your Jewels) For Drugs You Tried Everything But You Gone Need Drugs Feenes Love The Aroma, Catch Me Outside With My Vest & My Armor All I See Is Green, Homie I'm A Farmer, Nah That's Off Topic, F uck The Informants Gone Hang My Phone, Meet Me Outside, Don't Make It Obvious Jump Up In The Ride (What You Say? 2x) Money On The Table, Niggas Moving Drugs, Hom ie Fuck A Label Granddaddy Kush, Make You Cough A Lung Up, You Can't Go Higher You Can't Go Under Homie Them Potent O's & Grams In A Roll, Summer To The Spring T o The Winter To The Fall Pieces Of The Hole, Got The Soft & The Hard.
    [Show full text]
  • Works S11-1.Pub
    Fall 2010-Spring 2011 The Official Arts Publication of Sauk Valley Community College TheThe WorksWorks honorable mention in student visual art contest (above): Carlow, Ireland by William Brown Fiction Poetry Visual Arts The Anne Horton Writing Award 2011 Film Review Contest The Works Editorial Staff . Sara Beets Elizabeth Conderman Cody Froeter Tessa Ginn Tracy Hand Steven Hoyle James Hyde Jamie Lybarger Lauren Walter David Waters Faculty Advisor . Tom Irish * * * * * Special thanks to SVCC’s Foundation, Student Government Association, and English Department 2 Table of Contents . POETRY: First Place: Human Cannibalization: A Study, by Lauren Walter . 4 Honorable Mention: At the End of the Wind, by Phil Arellano . 6 Doesn’t Feel Right, by Sara Beets . 7 Goodnight, by Hayleigh Covella . 8 Two Caves, by Corey Coomes . .10 Doesn’t Feel Right, by Tessa Ginn . 11 Speed Kills, by Corey Coomes . 12 Something About Bravery, by Lauren Walter . .13 In My Place, by Jamie Lybarger . 14 Oh Sweetie, Oh Please, by Hayleigh Covella . 16 Mortal, by Sara Beets . 17 Hot Tears of Love, by Len Michaels . 18 Unimpressed, by Hayleigh Covella . 19 Planet Mars-Population: Failure, by Sara Beets . 20 Seventh Sin: A Collection of Poetry, by Sara Beets , Tessa Ginn, and Lauren Walter . 22 FICTION: First Place: Emperor Onion, by Elizabeth Conderman . 32 Honorable Mention: Buried, by Lauren Walter . 35 The Legend of the Pipperwhill, by Brooke Ehlert. 38 MICHAEL JUSTIN, by Rebekah Megill . 40 Just Animals, by Nick Sobottka . 42 The FINAL CHAPTER of NICK CARTER: The Price, by Jason Hedrick . 44 Pleasant Dreams, by Len Michaels . 47 A Very Short Story About Fruit Snacks, by Tom Irish .
    [Show full text]
  • The Base16, Base32, and Base64 Data Encodings
    Network Working Group S. Josefsson Request for Comments: 4648 SJD Obsoletes: 3548 October 2006 Category: Standards Track The Base16, Base32, and Base64 Data Encodings Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the “Internet Official Protocol Standards” (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright © The Internet Society (2006). All Rights Reserved. Abstract This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. RFC 4648 Base-N Encodings October 2006 Table of Contents 1 Introduction...............................................................................................................................................................3 2 Conventions Used in This Document..................................................................................................................... 4 3 Implementation Discrepancies................................................................................................................................ 5 3.1 Line Feeds in Encoded Data.................................................................................................................................5
    [Show full text]
  • Interaction Between Record Matching and Data Repairing
    Interaction between Record Matching and Data Repairing Wenfei Fan1;2 Jianzhong Li2 Shuai Ma3 Nan Tang1 Wenyuan Yu1 1University of Edinburgh 2Harbin Institute of Technology 3Beihang University fwenfei@inf., ntang@inf., [email protected] [email protected] [email protected] Abstract cost: it costs us businesses 600 billion dollars each year [16]. Central to a data cleaning system are record matching and With this comes the need for data cleaning systems. As data repairing. Matching aims to identify tuples that re- an example, data cleaning tools deliver \an overall business fer to the same real-world object, and repairing is to make a value of more than 600 million GBP" each year at BT [31]. In database consistent by fixing errors in the data by using con- light of this, the market for data cleaning systems is grow- straints. These are treated as separate processes in current ing at 17% annually, which substantially outpaces the 7% data cleaning systems, based on heuristic solutions. This pa- average of other IT segments [22]. per studies a new problem, namely, the interaction between There are two central issues about data cleaning: ◦ record matching and data repairing. We show that repair- Recording matching is to identify tuples that refer to ing can effectively help us identify matches, and vice versa. the same real-world entity [17, 26]. ◦ To capture the interaction, we propose a uniform frame- Data repairing is to find another database (a candidate work that seamlessly unifies repairing and matching oper- repair) that is consistent and minimally differs from ations, to clean a database based on integrity constraints, the original data, by fixing errors in the data [4, 21].
    [Show full text]
  • IDOL RSS Connector (CFS)
    HPE RSS Connector Software Version: 10.11.0 RSS Connector (CFS) Release Notes Document Release Date: November 2015 Software Release Date: November 2015 RSS Connector (CFS) Release Notes Legal Notices Warranty The only warranties for Hewlett Packard Enterprise Development LP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HPE shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Restricted Rights Legend Confidential computer software. Valid license from HPE required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright Notice © Copyright 2015 Hewlett Packard Enterprise Development LP Trademark Notices Adobe™ is a trademark of Adobe Systems Incorporated. Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation. UNIX® is a registered trademark of The Open Group. This product includes an interface of the 'zlib' general purpose compression library, which is Copyright © 1995-2002 Jean-loup Gailly and Mark Adler. Documentation Updates HPE Big Data Support provides prompt and accurate support to help you quickly and effectively resolve any issue you may encounter while using HPE Big Data products. Support services include access to the Customer Support Site (CSS) for online answers, expertise-based service by HPE Big Data support engineers, and software maintenance to ensure you have the most up-to-date technology.
    [Show full text]
  • Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation
    ISSN (Print) : 0974-6846 Indian Journal of Science and Technology, Vol 8(24), DOI: 10.17485/ijst/2015/v8i24/80032, September 2015 ISSN (Online) : 0974-5645 Confidentiality Technique to Enhance Security of Data in Public Cloud Storage using Data Obfuscation S. Monikandan1* and L. Arockiam2 1Department of MCA, Christhu Raj College, Panjappur, Tiruchirappalli – 620012, Tamil Nadu, India; [email protected] 2Departmentof Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli – 620102, Tamil Nadu, India; [email protected] Abstract Security of data stored in the cloud is most important challenge in public cloud environment. Users are outsourced their data to cloud for efficient, reliable and flexible storage. Due the security issues, data are disclosed by Cloud Service Providers (CSP) and others users of cloud. To protect the data from unauthorized disclosure, this paper proposes a confidentiality technique as a Security Service Algorithm (SSA), named MONcryptto secure the data in cloud storage. This proposed confidentiality technique is based on data obfuscation technique. The MONcrypt SSA is availed from Security as a Service (SEaaS). Users could use this security service from SEaaS to secure their data at any time. Simulations were conducted in cloud environment (Amazon EC2) for analysis the security of proposed MONcrypt SSA. A security analysis tool is used for measure the security of proposed and existing obfuscation techniques. MONcrypt compares with existing obfuscation techniques like Base32, Base64 and Hexadecimal Encoding. The proposed technique provides better performance and good security when compared with existing obfuscation techniques. Unlike the existing technique, MONcrypt reduces the sizeKeywords: of data being uploaded to the cloud storage.
    [Show full text]
  • Better Is Better Than More: Complexity, Economic Progress, and Qualitative Growth
    Better is Better Than More Complexity, Economic Progress, and Qualitative Growth by Michael Benedikt and Michael Oden Center for Sustainable Development Working Paper Series - 2011(01) csd Center for Sustainable Development The Center for Sustainable Development Better is Better than More: Complexity, Economic Working Paper Series 2011 (01) Progress, and Qualitative Growth Better is Better than More: Complexity, Economic Progress, and Qualitative Growth Michael Benedikt Hal Box Chair in Urbanism Michael Oden Professor of Community & Regional Planning Table of Contents The University of Texas at Austin 1. Introduction, and an overview of the argument 2 © Michael Benedikt and Michael Oden 2. Economic growth, economic development, and economic progress 6 Published by the Center for Sustainable Development The University of Texas at Austin 3. Complexity 10 School of Architecture 1 University Station B7500 Austin, TX 78712 4. The pursuit of equity as a generator of complexity 21 All rights reserved. Neither the whole nor any part of this paper may be reprinted or reproduced or quoted 5. The pursuit of quality as a generator of complexity 26 in any form or by any electronic, mechanical, or other Richness of functionality 31 means, now known or hereafter invented, including photocopying and recording, or in any information Reliability/durability 32 storage or retrieval system, without accompanying full Attention to detail 33 bibliographic listing and reference to its title, authors, Beauty or “style” 33 publishers, and date, place and medium of publication or access. Generosity 36 Simplicity 37 Ethicality 40 The cost of quality 43 6. Quality and equity together 48 The token economy 50 7.
    [Show full text]
  • The Role of Ontology in Information Management
    UNLV Retrospective Theses & Dissertations 1-1-2003 The role of ontology in information management Renato de Freitas Marteleto University of Nevada, Las Vegas Follow this and additional works at: https://digitalscholarship.unlv.edu/rtds Repository Citation Marteleto, Renato de Freitas, "The role of ontology in information management" (2003). UNLV Retrospective Theses & Dissertations. 1494. http://dx.doi.org/10.25669/0fz6-zsye This Thesis is protected by copyright and/or related rights. It has been brought to you by Digital Scholarship@UNLV with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This Thesis has been accepted for inclusion in UNLV Retrospective Theses & Dissertations by an authorized administrator of Digital Scholarship@UNLV. For more information, please contact [email protected]. THE ROLE OF ONTOLOGY IN INFORMATION MANAGEMENT by Renato de Ereitas Marteleto Bachelor of Science Universidade Federal de Ouro Preto - Brazil 1999 A thesis submitted in partial fulfillment of the requirements for the Master of Science in Computer Science Department of Computer Science Howard R. Hughes College of Engineering Graduate College University of Nevada, Las Vegas M ay 2003 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. UMI Number: 1414535 Marteleto, Renato de Freitas All rights reserved. UMI UMI Microform 1414535 Copyright 2003 by ProQuest Information and Learning Company.
    [Show full text]
  • Chapter 4: Inter-Process Communications
    95-702 Distributed Systems Chapter 4: Inter-process Communications 95-702 Distributed Systems Information System Management 1 Objectives • Understand the purpose of middleware. • Understand how external data representations contribute to interoperability. • Understand how external data representations contribute to speed. • Understand marshalling/unmarshalling • Understand CORBA’s CDR • Understand Java’s serialization • Understand XML and JSON • Understand how remote object references may be represented. • A UDP based request response protocol • Failure models • Discussion questions 95-702 Distributed Systems Information System Management 2 Middleware layers Applications, services RMI and RPC request-reply protocol Middleware This layers chapter marshalling and external data representation UDP and TCP Middleware provides a higher level programming abstraction for the development of distributed systems. (Coulouris text). 95-702 Distributed Systems Information System Management 3 Moving values around on a network Passing values over a network may be problematic. Why? If both sides are the same (homogenous), no problem. But if the two sides differ in the way they represent data then we are faced with interoperability problems: 1. Big-endian, little-endian byte ordering may differ 2. Floating point representation may differ 3. Character encodings (ASCII, UTF-8, Unicode, EBCDIC) may differ as well. So, we must either: Have both sides agree on an external representation or transmit in the sender’s format along with an indication of the format
    [Show full text]
  • XEP-0116: Encrypted Session Negotiation
    XEP-0116: Encrypted Session Negotiation Ian Paterson Peter Saint-Andre mailto:ian:paterson@clientside:co:uk mailto:xsf@stpeter:im xmpp:ian@zoofy:com xmpp:peter@jabber:org http://stpeter:im/ Dave Smith mailto:dizzyd@jabber:org xmpp:dizzyd@jabber:org 2007-05-30 Version 0.16 Status Type Short Name Deferred Standards Track TO BE ASSIGNED This document specifies an XMPP protocol extension for negotiating an end-to-end encrypted session. Legal Copyright This XMPP Extension Protocol is copyright © 1999 – 2020 by the XMPP Standards Foundation (XSF). Permissions Permission is hereby granted, free of charge, to any person obtaining a copy of this specification (the ”Specification”), to make use of the Specification without restriction, including without limitation the rights to implement the Specification in a software program, deploy the Specification in a network service, and copy, modify, merge, publish, translate, distribute, sublicense, or sell copies of the Specifi- cation, and to permit persons to whom the Specification is furnished to do so, subject to the condition that the foregoing copyright notice and this permission notice shall be included in all copies or sub- stantial portions of the Specification. Unless separate permission is granted, modified works that are redistributed shall not contain misleading information regarding the authors, title, number, or pub- lisher of the Specification, and shall not claim endorsement of the modified works by the authors, any organization or project to which the authors belong, or the XMPP Standards Foundation. Warranty ## NOTE WELL: This Specification is provided on an ”AS IS” BASIS, WITHOUT WARRANTIES OR CONDI- TIONS OF ANY KIND, express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]