Computing For The Human Experience: Semantics-Empowered Sensors, Services, And Social Computing On The Ubiquitous Web,
2010
Wright State University - Main Campus
Computing For The Human Experience: Semantics-Empowered Sensors, Services, And Social Computing On The Ubiquitous Web, Amit P. Sheth
Kno.e.sis Publications
People are on the verge of an era in which the human experience can be enriched in ways they couldn't have imagined two decades ago. Rather than depending on a single technology, people progressed with several whose semantics-empowered convergence and integration will enable us to capture, understand, and reapply human knowledge and intellect. Such capabilities will consequently elevate our technological ability to deal with the abstractions, concepts, and actions that characterize human experiences. This will herald computing for human experience (CHE). The CHE vision is built on a suite of technologies that serves, assists, and cooperates with humans to nondestructively …
Nominal Schemas For Integrating Rules And Ontologies,
2010
Wright State University - Main Campus
Nominal Schemas For Integrating Rules And Ontologies, Frederick Maier, Adila A. Krisnadhi, Pascal Hitzler
Computer Science and Engineering Faculty Publications
We propose a description-logic style extension of OWL DL, which includes DL-safe variable SWRL and seamlessly integrates datalog rules. Our language also sports a tractable fragment, which we call ELP 2, covering OWL EL, OWL RL, most of OWL QL, and variable restricted datalog.
Approximate Instance Retrieval On Ontologies,
2010
Wright State University - Main Campus
Approximate Instance Retrieval On Ontologies, Tuvshintur Tserendorj, Stephan Grimm, Pascal Hitzler
Computer Science and Engineering Faculty Publications
With the development of more expressive description logics (DLs) for the Web Ontology Language OWL the question arises how we can properly deal with the high computational complexity for efficient reasoning. In application cases that require scalable reasoning with expressive ontologies, non-standard reasoning solutions such as approximate reasoning are necessary to tackle the intractability of reasoning in expressive DLs. In this paper, we are concerned with the approximation of the reasoning task of instance retrieval on DL knowledge bases, trading correctness of retrieval results for gain of speed. We introduce our notion of an approximate concept extension and we provide …
Automated Isolation Of Translational Efficiency Bias That Resists The Confounding Effect Of Gc(At)-Content,
2010
Wright State University - Main Campus
Automated Isolation Of Translational Efficiency Bias That Resists The Confounding Effect Of Gc(At)-Content, Douglas W. Raiford, Dan E. Krane, Travis E. Doom, Michael L. Raymer
Kno.e.sis Publications
Genomic sequencing projects are an abundant source of information for biological studies ranging from the molecular to the ecological in scale; however, much of the information present may yet be hidden from casual analysis. One such information domain, trends in codon usage, can provide a wealth of information about an organism's genes and their expression. Degeneracy in the genetic code allows more than one triplet codon to code for the same amino acid, and usage of these codons is often biased such that one or more of these synonymous codons is preferred. Detection of this bias is an important tool …
From Questions To Effective Answers: On The Utility Of Knowledge-Driven Querying Systems For Life Sciences Data,
2010
Wright State University - Main Campus
From Questions To Effective Answers: On The Utility Of Knowledge-Driven Querying Systems For Life Sciences Data, Amir H. Asiaee, Prashant Doshi, Todd Minning, Satya S. Sahoo, Priti Parikh, Amit P. Sheth, Rick L. Tarleton
Kno.e.sis Publications
We compare two distinct approaches for querying data in the context of the life sciences. The first approach utilizes conventional databases to store the data and intuitive form-based interfaces to facilitate easy querying of the data. These interfaces could be seen as implementing a set of 'pre-canned' queries commonly used by the life science researchers that we study. The second approach is based on semantic Web technologies and is knowledge (model) driven. It utilizes a large OWL ontology and same datasets as before but associated as RDF instances of the ontology concepts. An intuitive interface is provided that allows the …
Sensor Data And Perception: Can Sensors Play 20 Questions,
2010
Wright State University - Main Campus
Sensor Data And Perception: Can Sensors Play 20 Questions, Cory Andrew Henson
Kno.e.sis Publications
Currently, there are many sensors collecting information about our environment, leading to an overwhelming number of observations that must be analyzed and explained in order to achieve situation awareness. As perceptual beings, we are also constantly inundated with sensory data, yet we are able to make sense of our environment with relative ease. Why is the task of perception so easy for us, and so hard for machines; and could this have anything to do with how we play the game 20 Questions?
Continuous Semantics To Analyze Real-Time Data,
2010
Wright State University - Main Campus
Continuous Semantics To Analyze Real-Time Data, Amit P. Sheth, Christopher Thomas, Pankaj Mehra
Kno.e.sis Publications
Increasingly we are presented with dynamic domains involved in social, mobile, and sensor webs. Such domains are spontaneous (arising suddenly), follow a period of rapid evolution, involving real-time or near real-time data, involve many distributed participants and diverse viewpoints involving topical or contentious subjects, and involve feature context colored by local knowledge and sociocultural backgrounds. This article present continuous semantics can help us model such dynamic domains and analyze the related real-time data. Capabilities include crating dynamic domain model by mining social data, and using dynamic models for semantic analysis of real-time data.
Mobicloud - Making Clouds Reachable: A Toolkit For Easy And Efficient Development Of Customized Cloud Mobile Hybrid Applications,
2010
Wright State University - Main Campus
Mobicloud - Making Clouds Reachable: A Toolkit For Easy And Efficient Development Of Customized Cloud Mobile Hybrid Applications, Ashwin Manjunatha, Ajith Harshana Ranabahu, Amit P. Sheth, Krishnaprasad Thirunarayan
Kno.e.sis Publications
The advancements in computing have resulted in a boom of cheap, ubiquitous, connected mobile devices, as well as seemingly unlimited, utility style, pay as you go computing resources, commonly referred to as Cloud computing. However, taking full advantage of this mobile and cloud computing landscape, especially for the data intensive domains, has been hampered by the many heterogeneities that exist in the mobile space, as well as the Cloud space. Our research attempts to exploit the capabilities of the mobile and cloud landscape by introducing MobiCloud, an online toolkit to efficiently develop Cloud-mobile hybrid (CMH) applications. We define a CMH …
A Qualitative Examination Of Topical Tweet And Retweet Practices,
2010
Wright State University - Main Campus
A Qualitative Examination Of Topical Tweet And Retweet Practices, Meenakshi Nagarajan, Hemant Purohit, Amit P. Sheth
Kno.e.sis Publications
This work contributes to the study of retweet behavior on Twitter surrounding real-world events. We analyze over a million tweets pertaining to three events, present general tweet properties in such topical datasets and qualitatively analyze the properties of the retweet behavior surrounding the most tweeted/viral content pieces. Findings include a clear relationship between sparse/dense retweet patterns and the content and type of a tweet itself; suggesting the need to study content properties in link-based diffusion models.
Linked Open Social Signals,
2010
Wright State University - Main Campus
Linked Open Social Signals, Pablo N. Mendes, Alexandre Passant, Pavan Kapanipathi, Amit P. Sheth
Kno.e.sis Publications
In this paper we discuss the collection, semantic annotation and analysis of real-time social signals from micro-blogging data. We focus on users interested in analyzing social signals collectively for sensemaking. Our proposal enables flexibility in selecting subsets for analysis, alleviating information overload. We define an architecture that is based on state-of-the-art Semantic Web technologies and a distributed publish subscribe protocol for real time communication. In addition, we discuss our method and application in a scenario related to the health care reform in the United States.
Provenance Aware Linked Sensor Data,
2010
Wright State University - Main Campus
Provenance Aware Linked Sensor Data, Harshal Kamlesh Patni, Satya S. Sahoo, Cory Andrew Henson, Amit P. Sheth
Kno.e.sis Publications
Provenance, from the French word “provenir”, describes the lineage or history of a data entity. Provenance is critical information in the sensors domain to identify a sensor and analyze the observation data over time and geographical space. In this paper, we present a framework to model and query the provenance information associated with the sensor data exposed as part of the Web of Data using the Linked Open Data conventions. This is accomplished by developing an ontology-driven provenance management infrastructure that includes a representation model and query infrastructure. This provenance infrastructure, called Sensor Provenance Management System (PMS), is …
Provenance Context Entity (Pace): Scalable Provenance Tracking For Scientific Rdf Data,
2010
Wright State University - Main Campus
Provenance Context Entity (Pace): Scalable Provenance Tracking For Scientific Rdf Data, Satya S. Sahoo, Olivier Bodenreider, Pascal Hitzler, Amit P. Sheth, Krishnaprasad Thirunarayan
Kno.e.sis Publications
The Resource Description Framework (RDF) format is being used by a large number of scientific applications to store and disseminate their datasets. The provenance information, describing the source or lineage of the datasets, is playing an increasingly significant role in ensuring data quality, computing trust value of the datasets, and ranking query results. Current provenance tracking approaches using the RDF reification vocabulary suffer from a number of known issues, including lack of formal semantics, use of blank nodes, and application-dependent interpretation of reified RDF triples. In this paper, we introduce a new approach called Provenance Context Entity (PaCE) that uses …
A Reasonable Semantic Web,
2010
Wright State University - Main Campus
A Reasonable Semantic Web, Pascal Hitzler, Frank Van Harmelen
Computer Science and Engineering Faculty Publications
The realization of Semantic Web reasoning is central to substantiating the Semantic Web vision. However, current mainstream research on this topic faces serious challenges, which forces us to question established lines of research and to rethink the underlying approaches. We argue that reasoning for the Semantic Web should be understood as "shared inference," which is not necessarily based on deductive methods. Model-theoretic semantics (and sound and complete reasoning based on it) functions as a gold standard, but applications dealing with large-scale and noisy data usually cannot afford the required runtimes. Approximate methods, including deductive ones, but also approaches based on …
Embedded Systems As Datacenters,
2009
RAI Laboratory LLC
Embedded Systems As Datacenters, Robert Iannucci
Robert A Iannucci
No abstract provided.
Integrating Software Assurance Into The Software Development Life Cycle (Sdlc),
2009
Oklahoma State University - Main Campus
Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster
Maurice Dawson
This article examines the integration of secure coding practices into the overall Software Development Life Cycle (SDLC). Also detailed is a proposed methodology for integrating software assurance into the Department of Defense Information Assurance Certification & Accreditation Process (DIACAP). This method for integrating software assurance helps in properly securing the application layer as that is where more than half of the vulnerabilities lie in a system.