Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

PDF

Science and Technology Studies

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 425

Full-Text Articles in Social and Behavioral Sciences

Synthesis Of Mn3o4-Encapsulated Graphene Sheet Nanocomposites Via A Facile, Fast Microwave Hydrothermal Method And Their Supercapacitive Behaviour, Li Li, Kuok Hau Seng, Zhixin Chen, Hua-Kun Liu, Ivan P. Nevirkovets, Zaiping Guo Dec 2012

Synthesis Of Mn3o4-Encapsulated Graphene Sheet Nanocomposites Via A Facile, Fast Microwave Hydrothermal Method And Their Supercapacitive Behaviour, Li Li, Kuok Hau Seng, Zhixin Chen, Hua-Kun Liu, Ivan P. Nevirkovets, Zaiping Guo

Faculty of Engineering and Information Sciences - Papers: Part A

Well-crystallized Mn3O4-anchored reduced graphene oxide (rGO) nanocomposites have been successfully synthesized via a facile, effective, energy-saving, and scalable microwave hydrothermal technique for potential application as supercapacitor material. Integrating these nanostructures resulted in a strong synergistic effect between the two materials, consequently leading to a hybrid composite with higher specific capacitance compared to the bare Mn3O4 nanoparticles. The results from different sorts of characterization indicate that the Mn3O4 particles were deposited and anchored on graphene sheets. The capacitance value of the rGO(31.6%)–Mn3O4 nanocomposite reached 153 F/g, much higher than that of the bare Mn3O4 (87 F/g) at a scan rate of …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Wie Verändert Das Internet Die Demokratie?, Ralf Lindner Dec 2012

Wie Verändert Das Internet Die Demokratie?, Ralf Lindner

Ralf Lindner

Obwohl seit dem Aufstieg des Internets zum Massenmedium in den 1990er Jahren Ernüchterung über die Demokratisierungswirkung der neuen Medien eingetreten ist, werden regelmäßig weitreichende Erwartungen über der politische Transformationspotenzial des Internets formuliert. So wird häufig postuliert, dass das Internet demokratische Politik über kurz oder lang fundamental verändern werde, indem universeller Informationszugang ermöglicht, etablierte Machtstrukturen unterminiert und politische Partizipation gesteigert werde. Der Beitrag erörtert zunächst die Hintergründe für populäre Fehlschlüsse, die die Debatte um elektronische Demokratie begleiten. Auf der Grundlage einer kritischen Reflexion mit den ideologisch-normativ imprägnierten Erwartungen an das Internet werden theoretisch wie empirisch robustere Überlegungen zum Beitrag der neuen …


User Taglines: Alternative Presentations Of Expertise And Interest In Social Media, Hemant Purohit, Alex Dow, Omar Alonso, Lei Duan, Kevin Haas Dec 2012

User Taglines: Alternative Presentations Of Expertise And Interest In Social Media, Hemant Purohit, Alex Dow, Omar Alonso, Lei Duan, Kevin Haas

Kno.e.sis Publications

Web applications are increasingly showing recommended users from social media along with some descriptions, an attempt to show relevancy - why they are being shown. For example, Twitter search for a topical keyword shows expert twitterers on the side for 'whom to follow'. Google+ and Facebook also recommend users to follow or add to friend circle. Popular Internet newspaper- The Huffington Post shows Twitter influencers/ experts on the side of an article for authoritative relevant tweets. The state of the art shows user profile bios as summary for Twitter experts, but it has issues with length constraint imposed by user …


Are Twitter Users Equal In Predicting Elections? A Study Of User Groups In Predicting 2012 U.S. Republican Primaries, Lu Chen, Wenbo Wang, Amit P. Sheth Dec 2012

Are Twitter Users Equal In Predicting Elections? A Study Of User Groups In Predicting 2012 U.S. Republican Primaries, Lu Chen, Wenbo Wang, Amit P. Sheth

Kno.e.sis Publications

Existing studies on predicting election results are under the assumption that all the users should be treated equally. However, recent work [14] shows that social media users from different groups (e.g., “silent majority” vs. “vocal minority”) have significant differences in the generated content and tweeting behavior. The effect of these differences on predicting election results has not been exploited yet. In this paper, we study the spectrum of Twitter users who participate in the on-line discussion of 2012 U.S. Republican Presidential Primaries, and examine the predictive power of different user groups (e.g., highly engaged users vs. lowly engaged users, right-leaning …


The Ssn Ontology Of The W3c Semantic Sensor Network Incubator Group, Michael Compton, Payam Barnaghi, Luis Bermudez, Raul Garcia-Castro, Oscar Corcho, Simon Cox, John Graybeal, Manfred Hauswirth, Cory Andrew Henson, Arthur Herzog, Vincent Huang, Krzysztof Janowicz, W. David Kelsey, Danh Le Phuoc, Laurent Lefort, Myriam Leggieri, Holger Neuhaus, Andriy Nikolov, Kevin Page, Alexandre Passant, Amit P. Sheth, Kerry Taylor Dec 2012

The Ssn Ontology Of The W3c Semantic Sensor Network Incubator Group, Michael Compton, Payam Barnaghi, Luis Bermudez, Raul Garcia-Castro, Oscar Corcho, Simon Cox, John Graybeal, Manfred Hauswirth, Cory Andrew Henson, Arthur Herzog, Vincent Huang, Krzysztof Janowicz, W. David Kelsey, Danh Le Phuoc, Laurent Lefort, Myriam Leggieri, Holger Neuhaus, Andriy Nikolov, Kevin Page, Alexandre Passant, Amit P. Sheth, Kerry Taylor

Kno.e.sis Publications

The W3C Semantic Sensor Network Incubator group (the SSN-XG) produced an OWL 2 ontology to describe sensors and observations — the SSN ontology, available at http://purl.oclc.org/NET/ssnx/ssn. The SSN ontology can describe sensors in terms of capabilities, measurement processes, observations and deployments. This article describes the SSN ontology. It further gives an example and describes the use of the ontology in recent research projects.


Manufacturing Process And The Integration Process Needed To Create A Streamline Work Cell For Instruction At The University Level Course, Nicholas J. Savitzky Dec 2012

Manufacturing Process And The Integration Process Needed To Create A Streamline Work Cell For Instruction At The University Level Course, Nicholas J. Savitzky

Masters Theses

No abstract provided.


Radio As The Voice Of God: Peace And Tolerance Radio Programming’S Impact On Norms, Daniel P. Aldrich Nov 2012

Radio As The Voice Of God: Peace And Tolerance Radio Programming’S Impact On Norms, Daniel P. Aldrich

Daniel P Aldrich

Observers have argued that radio programming can alter norms, especially through hate radio designed to increase animosity between groups. This article tests whether or not radio programming under the countering violent extremism (CVE) policy framework can reduce potential conflict and increase civic engagement and positive views of foreign nations. Data from surveys of more than 1,000 respondents in Mali, Chad, and Niger illuminate the ways in which peace and tolerance programming changed perspectives and altered behavior in statistically significant ways. Results show that individuals exposed to multi-level U.S. government programming were more likely to listen to peace and tolerance radio. …


Hoffman Triangle 2012: Neighborhood Profile Report, Michelle M. Thompson, Josh Baer, Rachael Bauer, Frank Carter, Patrick Coyle, Alex Depriest, Malissa Dietsch, Lawrence Guimont, Kevin Harrison, Nelson Hollings, Annabeth Mccall, Tara Mckeefry, Valerie Mcmillan, Brooke Perry, Adarian Pike, Kevin Potter Nov 2012

Hoffman Triangle 2012: Neighborhood Profile Report, Michelle M. Thompson, Josh Baer, Rachael Bauer, Frank Carter, Patrick Coyle, Alex Depriest, Malissa Dietsch, Lawrence Guimont, Kevin Harrison, Nelson Hollings, Annabeth Mccall, Tara Mckeefry, Valerie Mcmillan, Brooke Perry, Adarian Pike, Kevin Potter

Dr. Michelle M. Thompson, GISP, FRGS

Hoffman Triangle is located in the Central City neighborhood of New Orleans. It is bounded by South Claiborne Avenue to the South, Toledo Street and Washington Avenue to the West and Martin Luther King Jr. Boulevard to the East. It is a neighborhood that continues to evolve and significantly grow after the Hurricane Katrina in 2005. In order to support the work that the Neighborhood Development Foundation, Associated Neighborhood Development and the Hoffman Triangle Neighborhood Association are doing to improve the quality of life of all existing and future residents, WhoData.org and the University of New Orleans – Department of …


The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao Nov 2012

The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao

Yueh-Hsuan Weng

One of the reasons that future robots will enhance their intelligence and actions in an unstructured environment is because of their “networked” feature. Current robot designs have difficulty in understanding unstructured environments due to the inherent diversity and unpredictability of phenomena in the real world. However, new developments such as ubiquitous computing, cloud computing, the Internet of things and next-generation internet technologies will make it easier for networked robots to obtain structured information about their physical environment. The formation of cloud-enabled robotics by advanced technology will be tightly integrated into the virtual and real world, and this will strengthen the …


Social Construction Of Safety In Uas Technology In Concrete Settings: Some Military Cases Studied, Gwendolyn C.H. Bakx, James M. Nyce Nov 2012

Social Construction Of Safety In Uas Technology In Concrete Settings: Some Military Cases Studied, Gwendolyn C.H. Bakx, James M. Nyce

Gwendolyn C.H. Bakx

Unmanned aerial systems (UASs) in general and UAS safety in particular have so far received little attention in the science, technology and society (STS) literature. This paper therefore reports on sev- eral (military) cases of this relatively new technology, focusing specifi cally on issues of safety. Quite often, safety of technology is considered the result of a rational process – one of a series of rational, often calculative, linear steps. The paper’s results suggest that establishing safety in military UASs is very much a social process. Approaching (military) UAS safety from this perspective could perhaps be complementary to more analytical …


Exploring The Effectiveness Of Online Instructional Technology In Higher Education: Professors’ Perspective, George Shaw Jr. Nov 2012

Exploring The Effectiveness Of Online Instructional Technology In Higher Education: Professors’ Perspective, George Shaw Jr.

Annual Research Symposium of the College of Communication and Information

Technology has drastically changed the landscape of how, when, and where we can access information. As a result of technological advancements, delivery methods for classroom lectures has also change. In higher education, 21st century technology allows professors to deliver lectures face-to-face or online and synchronous or asynchronous within the online education environment. This pilot study interviewed four faculty members and one instructor at a major university in South Carolina in a one-on-one interview session to explore the effectiveness of online instructional technology. Understanding how open source software help professors make online instructional technology more conducive to the learning and knowledge …


Biodiversity Information For Natural Resource Management: Information Needs And Practices In Southern Appalachia, Miriam Davis, Carol Tenopir Nov 2012

Biodiversity Information For Natural Resource Management: Information Needs And Practices In Southern Appalachia, Miriam Davis, Carol Tenopir

Annual Research Symposium of the College of Communication and Information

Introduction

Natural resource managers rely on high quality, current and complete environmental information to make decisions about how resources and landscapes are managed for biodiversity conservation and human use. As such, they represent a unique combination of research scientist, decision maker and practicing professional. In addition, given the applied nature of their work, relating to conservation, resource use and policy, they are frequently required to make timely decisions with real world consequences. However, wading through the vast amounts of currently available scientific and technical knowledge to find needed information can be a challenge. To be useful, this information must be …


Demonstration: Dynamic Sensor Registration And Semantic Processing For Ad-Hoc Mobile Environments (Semmob), Pramod Anantharam, Gary Alan Smith, Josh Pschorr, Krishnaprasad Thirunarayan, Amit P. Sheth Nov 2012

Demonstration: Dynamic Sensor Registration And Semantic Processing For Ad-Hoc Mobile Environments (Semmob), Pramod Anantharam, Gary Alan Smith, Josh Pschorr, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

SemMOB enables dynamic registration of sensors via mobile devices, search, and near real-time inference over sensor observations in ad-hoc mobile environments (e.g., fire fighting). We demonstrate SemMOB in the context of an emergency response use case that requires automatic and dynamic registrations of sensor devices and annotation of sensor observations, decoding of latitude-longitude information in terms of human sensible names, fusion and abstraction of sensor values using background knowledge, and their visualization using mash-up.


Using Social Influence To Predict Subscriber Churn, Derek Doran, Veena Mendiratta, Chitra Phadke, Dan Kushnir, Huseyin Uzunalioglu Nov 2012

Using Social Influence To Predict Subscriber Churn, Derek Doran, Veena Mendiratta, Chitra Phadke, Dan Kushnir, Huseyin Uzunalioglu

Kno.e.sis Publications

The saturation of mobile phone markets has resulted in rising costs for operators to obtain new customers. These operators thus focus their energies on identifying users that will churn so they can be targeted for retention campaigns. Typical churn prediction algorithms identify churners based on service usage metrics, network performance indicators, and demographic information. Social and peer-influence to churn, however, is usually not considered. In this paper, we describe a new churn prediction algorithm that incorporates the influence churners spread to their social peers. Using data from a major service provider, we show that social influence improves churn prediction and …


Understanding User Triads On Facebook, Derek Doran, Alberta De La Rosa Algarin, Swapna S. Gokhale Nov 2012

Understanding User Triads On Facebook, Derek Doran, Alberta De La Rosa Algarin, Swapna S. Gokhale

Kno.e.sis Publications

Contemporary approaches that analyze user behavior on online social networks only consider interactions among dyads, which are pairs of directly connected users. A large body of sociological work, however, suggests that mutual connections among users can influence their activities, leading to differences between two- and three-way interactions. This paper explores the dynamics of triads among Facebook users based on the wall posts from the New Orleans regional network. Initially, each connection is categorized as a close friendship or an acquiantance, contingent on the number of wall posts exchanged. Subsequently, the impact of different types of connections comprising triads is examined …


How I Would Like Semantic Web To Be, For My Children., Raghava Mutharaju Nov 2012

How I Would Like Semantic Web To Be, For My Children., Raghava Mutharaju

Kno.e.sis Publications

Semantic Web, since its inception, has gone through lot of developments in its relatively nascent existence; right from people's perception, to the standards and to its adoption by the industry and more importantly by the scientific community. This impressive growth only seems to increase. In this paper, we project this growth to the next 10 years and highlight some of the facets on which Semantic Web could have a major impact on. We also present the challenges that Semantic Web and its community has to deal with in order to get there.


Do Students Using Electronic Books Display Different Reading Comprehension And Motivation Levels Than Students Using Traditional Print Books?, Casey Wells Nov 2012

Do Students Using Electronic Books Display Different Reading Comprehension And Motivation Levels Than Students Using Traditional Print Books?, Casey Wells

Doctoral Dissertations and Projects

The effect of electronic books on the reading comprehension of middle and high school students was examined using an experimental posttest-only control-group design. A convenience sample of 140 randomly assigned middle and high school English students at an independent school in eastern North Carolina participated. Half of the students used passages from text read on tablets while half utilized traditional print text passages. Data was collected during one class period in which the reading comprehension section of the Gates-MacGinitie Reading Tests®, a 35 minute test containing 48 questions, was administered. Reading comprehension data was analyzed using an independent t-test. The …


An Efficient Bit Vector Approach To Semantics-Based Machine Perception In Resource-Constrained Devices, Cory Andrew Henson, Krishnaprasad Thirunarayan, Amit P. Sheth Nov 2012

An Efficient Bit Vector Approach To Semantics-Based Machine Perception In Resource-Constrained Devices, Cory Andrew Henson, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

The primary challenge of machine perception is to define efficient computational methods to derive high-level knowledge from low-level sensor observation data. Emerging solutions are using ontologies for expressive representation of concepts in the domain of sensing and perception, which enable advanced integration and interpretation of heterogeneous sensor data. The computational complexity of OWL, however, seriously limits its applicability and use within resource-constrained environments, such as mobile devices. To overcome this issue, we employ OWL to formally define the inference tasks needed for machine perception – explanation and discrimination – and then provide efficient algorithms for these tasks, using bit-vector encodings …


Iexplore: Interactive Browsing And Exploring Biomedical Knowledge, Vinh Nguyen, Olivier Bodenreider, Jagannathan Srinivasan, Todd Minning, Thomas Rindflesch, Bastien Rance, Ramakanth Kavuluru, Himi Yalamanchili, Krishnaprasad Thirunarayan, Satya S. Sahoo, Amit P. Sheth Nov 2012

Iexplore: Interactive Browsing And Exploring Biomedical Knowledge, Vinh Nguyen, Olivier Bodenreider, Jagannathan Srinivasan, Todd Minning, Thomas Rindflesch, Bastien Rance, Ramakanth Kavuluru, Himi Yalamanchili, Krishnaprasad Thirunarayan, Satya S. Sahoo, Amit P. Sheth

Kno.e.sis Publications

We present iExplore, a Semantic Web based application that helps biomedical researchers study and explore biomedical knowledge interactively. iExplore uses the Biomedical Knowledge Repository (BKR), which integrates knowledge from various sources ranging from information extracted from biomedical literature (from PubMed) to many structured vocabularies in the Unified Medical Language System (UMLS). The current version of BKR provides a unified provenance representation for 12 million semantic predications (triples with a predicate connecting a subject and an object) derived from 87 vocabulary families in the UMLS and 14 million predications extracted from 21 million PubMed abstracts. To engage the domain experts in …


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Systemic Bias In Wikipedia : What It Looks Like, And How To Deal With It, Laura Quilter Oct 2012

Systemic Bias In Wikipedia : What It Looks Like, And How To Deal With It, Laura Quilter

Laura Quilter

No abstract provided.


Apps And Apple Devices: Productive Icloud Uses, Cyrus Ford Zarganj Oct 2012

Apps And Apple Devices: Productive Icloud Uses, Cyrus Ford Zarganj

Library Faculty Presentations

This program introduces useful apps for librarians who have two or more Apple devices such as an iPhone, iPad, or MacBook. You can learn how to use the iCloud, sync devices together, and about other useful apps for librarians to work on their projects from different places with different Apple devices without carrying files.


Breve Perspectiva Crítica Sobre El Gobierno Abierto Y El Open Data, Lucas Jolías, Alejandro Prince Oct 2012

Breve Perspectiva Crítica Sobre El Gobierno Abierto Y El Open Data, Lucas Jolías, Alejandro Prince

Lucas Jolías

Las ciberculturas y sus apóstoles aportan cada tanto tiempo y de forma incremental, nuevos conceptos o memes, es decir, unidades teóricas de información cultural transmisibles entre individuos, mentes o generaciones. Algunos de estos conceptos son vacíos, otros son comerciales, varios son sólo nuevos nombres de viejas ideas, pero todos de alguna manera connotan los cambios o tendencias de lo que en forma general podemos denominar la Sociedad del Conocimiento. Algunos de estos conceptos mueren a poco de nacer, otros cobran fuerza y vida propia (como la “web 2.0”), suman fans o detractores, y hasta se institucionalizan. De estos, y entre …


Presupuesto Participativo En Argentina: Análisis De Su Evolución Y Estudio De Caso, Lucas Jolías, Alejandro Prince, Ana Doria Oct 2012

Presupuesto Participativo En Argentina: Análisis De Su Evolución Y Estudio De Caso, Lucas Jolías, Alejandro Prince, Ana Doria

Lucas Jolías

Las sociedades de los países occidentales con sistemas democráticos representativos están tendiendo, en los últimos tiempos, a implementar políticas públicas de Democracia Directa y Semi-Directa, a través de acciones y políticas participativas con la intervención de los ciudadanos en las decisiones de gobierno. El Presupuesto Participativo se convirtió en uno de los procesos más consolidados y genuinos de este tipo de ejercicio de democracia. En la Argentina, desde comienzos de siglo, algunos municipios han comenzado a implementar esta práctica, sin embargo, son al día de hoy experiencias esporádicas y no existe una marco común de acción que las agrupe. En …


Privacy Preserving Boosting In The Cloud With Secure Half-Space Queries, Shumin Guo, Keke Chen Oct 2012

Privacy Preserving Boosting In The Cloud With Secure Half-Space Queries, Shumin Guo, Keke Chen

Kno.e.sis Publications

This paper presents a preliminary study on the PerturBoost approach that aims to provide efficient and secure classifier learning in the cloud with both data and model privacy preserved.


Walled Gardens: Privacy Within Public Leisure Space Online And Offline, Payal Arora Oct 2012

Walled Gardens: Privacy Within Public Leisure Space Online And Offline, Payal Arora

Payal Arora

Social network sites are the new urban parks where people congregate, socialize and exercise leisure. Its web architectures however are being walled in, dictated by market systems and State ideologies. These cyber-enclosures are justified along the lines of privacy that garners protection, efficiency and functionality. There is significant concern for the potential irrevocable loss of the ‘public’ and ‘open’ character intended of internet infrastructures, fearing the fostering of social segregation, homogenization and corporatization of leisure and a loss of civic sense. This paper addresses these concerns by looking at contemporary material architectures that are shaping public social and leisure space, …


Computing Perception From Sensor Data, Payam Barnaghi, Frieder Ganz, Cory Andrew Henson, Amit P. Sheth Oct 2012

Computing Perception From Sensor Data, Payam Barnaghi, Frieder Ganz, Cory Andrew Henson, Amit P. Sheth

Kno.e.sis Publications

This paper describes a framework for perception creation from sensor data. We propose using data abstraction techniques, in particular Symbolic Aggregate Approximation (SAX), to analyse and create patterns from sensor data. The created patterns are then linked to semantic descriptions that define thematic, spatial and temporal features, providing highly granular abstract representation of the raw sensor data. This helps to reduce the size of the data that needs to be communicated from the sensor nodes to the gateways or highlevel processing components. We then discuss a method that uses abstract patterns created by SAX method and occurrences of different observations …


Recent Advances In Integrating Owl And Rules, Matthias Knorr, David Carral Martinez, Pascal Hitzler, Adila A. Krisnadhi, Frederick Maier, Cong Wang Sep 2012

Recent Advances In Integrating Owl And Rules, Matthias Knorr, David Carral Martinez, Pascal Hitzler, Adila A. Krisnadhi, Frederick Maier, Cong Wang

Computer Science and Engineering Faculty Publications

As part of the quest for a unifying logic for the Semantic Web Technology Stack, a central issue is finding suitable ways of integrating description logics based on the Web Ontology Language (OWL) with rule-based approaches based on logic programming. Such integration is difficult since naive approaches typically result in the violation of one or more desirable design principles. For example, while both OWL 2 DL and RIF Core (a dialect of the Rule Interchange Format RIF) are decidable, their naive union is not, unless carefully chosen syntactic restrictions are applied.

We report on recent advances and ongoing work by …


A Tableau Algorithm For Description Logics With Nominal Schema, Adila Krisnadhi, Pascal Hitzler Sep 2012

A Tableau Algorithm For Description Logics With Nominal Schema, Adila Krisnadhi, Pascal Hitzler

Computer Science and Engineering Faculty Publications

We present a tableau algorithm for the description logic ALCOV. This description logic is obtained by extending the description logic ALCO with the expressive nominal schema construct that enables DL-safe datalog with predicates of arbitrary arity to be covered within the description logic framework. The tableau algorithm provides a basis to implement a delayed grounding strategy which was not facilitated by earlier versions of decision procedures for satisfiability in expressive description logics with nominal schemas.