Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- SSW (3)
- Semantic Sensor Web (3)
- Semantic Web (3)
- Authentication (2)
- Bandwidth (2)
-
- Computer networks (2)
- Delay (2)
- Lifetime estimation (2)
- Network topology (2)
- Peer-to-peer computing (2)
- Random processes (2)
- Robustness (2)
- Routing protocols (2)
- Sampling methods (2)
- Spatio-Temporal-Thematic Analysis of Social Data (2)
- #antcenter (1)
- AFDMA (1)
- Abductive Reasoning (1)
- Academic Library (1)
- Access control (1)
- Access protocols (1)
- Accidents (1)
- Ad hoc network (1)
- Ad hoc networks (1)
- Advertising on Social Networks (1)
- Age-based selection (1)
- Age-proportional graphs (1)
- Airplanes--Air refueling (1)
- Algorithms (1)
- Analysis of User Generated Content (1)
- Publication
- Publication Type
Articles 1 - 30 of 63
Full-Text Articles in Physical Sciences and Mathematics
Research In Semantic Web And Information Retrieval: Trust, Sensors, And Search, Krishnaprasad Thirunarayan
Research In Semantic Web And Information Retrieval: Trust, Sensors, And Search, Krishnaprasad Thirunarayan
Kno.e.sis Publications
No abstract provided.
Towards Reasoning Pragmatics, Pascal Hitzler
Towards Reasoning Pragmatics, Pascal Hitzler
Computer Science and Engineering Faculty Publications
The realization of Semantic Web reasoning is central to substantiating the Semantic Web vision. However, current mainstream research on this topic faces serious challenges, which force us to question established lines of research and to rethink the underlying approaches.
A Contrast Pattern Based Clustering Quality Index For Categorical Data, Qingbao Liu, Guozhu Dong
A Contrast Pattern Based Clustering Quality Index For Categorical Data, Qingbao Liu, Guozhu Dong
Kno.e.sis Publications
Since clustering is unsupervised and highly explorative, clustering validation (i.e. assessing the quality of clustering solutions) has been an important and long standing research problem. Existing validity measures have significant shortcomings. This paper proposes a novel contrast pattern based clustering quality index (CPCQ) for categorical data, by utilizing the quality and diversity of the contrast patterns (CPs) which contrast the clusters in clusterings. High quality CPs can characterize clusters and discriminate them against each other. Experiments show that the CPCQ index (1) can recognize that expert-determined classes are the best clusters for many datasets from the UCI repository; (2) does …
Sparql Query Re-Writing For Spatial Datasets Using Partonomy Based Transformation Rules, Prateek Jain, Cory Andrew Henson, Amit P. Sheth, Peter Z. Yeh, Kunal Verma
Sparql Query Re-Writing For Spatial Datasets Using Partonomy Based Transformation Rules, Prateek Jain, Cory Andrew Henson, Amit P. Sheth, Peter Z. Yeh, Kunal Verma
Kno.e.sis Publications
Often the information present in a spatial knowledge base is represented at a different level of granularity and abstraction than the query constraints. For querying ontology’s containing spatial information, the precise relationships between spatial entities has to be specified in the basic graph pattern of SPARQL query which can result in long and complex queries. We present a novel approach to help users intuitively write SPARQL queries to query spatial data, rather than relying on knowledge of the ontology structure. Our framework re-writes queries, using transformation rules to exploit part-whole relations between geographical entities to address the mismatches between query …
A Local Qualitative Approach To Referral And Functional Trust, Krishnaprasad Thirunarayan, Dharan Althuru, Cory Andrew Henson, Amit P. Sheth
A Local Qualitative Approach To Referral And Functional Trust, Krishnaprasad Thirunarayan, Dharan Althuru, Cory Andrew Henson, Amit P. Sheth
Kno.e.sis Publications
Trust and confidence are becoming key issues in diverse applications such as ecommerce, social networks, semantic sensor web, semantic web information retrieval systems, etc. Both humans and machines use some form of trust to make informed and reliable decisions before acting. In this work, we briefly review existing work on trust networks, pointing out some of its drawbacks. We then propose a local framework to explore two different kinds of trust among agents called referral trust and functional trust, that are modelled using local partial orders, to enable qualitative trust personalization. The proposed approach formalizes reasoning with trust, distinguishing between …
A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White
A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White
Master's Theses
The size and speed of computer networks continue to expand at a rapid pace, as do the corresponding errors, failures, and faults inherent within such extensive networks. This thesis introduces a novel approach to interface Border Gateway Protocol (BGP) computer networks with neural networks to learn the precursor connectivity patterns that emerge prior to a node failure. Details of the design and construction of a framework that utilizes neural networks to learn and monitor BGP connection states as a means of detecting and predicting BGP peer node failure are presented. Moreover, this framework is used to monitor a BGP network …
An Anytime Algorithm For Computing Inconsistency Measurement, Yue Ma, Guilin Qi, Guohui Xiao, Pascal Hitzler, Zuoquan Lin
An Anytime Algorithm For Computing Inconsistency Measurement, Yue Ma, Guilin Qi, Guohui Xiao, Pascal Hitzler, Zuoquan Lin
Computer Science and Engineering Faculty Publications
Measuring inconsistency degrees of inconsistent knowledge bases is an important problem as it provides context information for facilitating inconsistency handling. Many methods have been proposed to solve this problem and a main class of them is based on some kind of paraconsistent semantics. In this paper, we consider the computational aspects of inconsistency degrees of propositional knowledge bases under 4-valued semantics. We first analyze its computational complexity. As it turns out that computing the exact inconsistency degree is intractable, we then propose an anytime algorithm that provides tractable approximation of the inconsistency degree from above and below. We show that …
Ontology-Driven Provenance Management In Escience: An Application In Parasite Research, Satya S. Sahoo, D. Brent Weatherly, Raghava Mutharaju, Pramod Anantharam, Amit P. Sheth, Rick L. Tarleton
Ontology-Driven Provenance Management In Escience: An Application In Parasite Research, Satya S. Sahoo, D. Brent Weatherly, Raghava Mutharaju, Pramod Anantharam, Amit P. Sheth, Rick L. Tarleton
Kno.e.sis Publications
Provenance, from the French word “provenir”, describes the lineage or history of a data entity. Provenance is critical information in scientific applications to verify experiment process, validate data quality and associate trust values with scientific results. Current industrial scale eScience projects require an end-to-end provenance management infrastructure. This infrastructure needs to be underpinned by formal semantics to enable analysis of large scale provenance information by software applications. Further, effective analysis of provenance information requires well-defined query mechanisms to support complex queries over large datasets. This paper introduces an ontology-driven provenance management infrastructure for biology experiment data, as part …
A Survey Of The Semantic Specification Of Sensors, Michael Compton, Cory Andrew Henson, Laurent Lefort, Holger Neuhaus, Amit P. Sheth
A Survey Of The Semantic Specification Of Sensors, Michael Compton, Cory Andrew Henson, Laurent Lefort, Holger Neuhaus, Amit P. Sheth
Kno.e.sis Publications
Semantic sensor networks use declarative descriptions of sensors promote reuse and integration, and to help solve the difficulties of installing, querying and maintaining complex, heterogeneous sensor networks. This paper reviews the state of the art for the semantic specification of sensors, one of the fundamental technologies in the semantic sensor network vision. Twelve sensor ontologies are reviewed and analysed for the range and expressive power of their concepts. The reasoning and search technology developed in conjunction with these ontologies is also reviewed, as is technology for annotating OGC standards with links to ontologies. Sensor concepts that cannot be expressed accurately …
Provenir Ontology: Towards A Framework For Escience Provenance Management, Satya S. Sahoo, Amit P. Sheth
Provenir Ontology: Towards A Framework For Escience Provenance Management, Satya S. Sahoo, Amit P. Sheth
Kno.e.sis Publications
Provenance metadata describes the 'lineage' or history of an entity and necessary information to verify the quality of data, validate experiment protocols, and associate trust value with scientific results. eScience projects generate data and the associated provenance metadata in a distributed environment (such as myGrid) and on a very large scale that often precludes manual analysis. Given this scenario, provenance information should be, (a) interoperable across projects, research groups, and application domains, and (b) support analysis over large datasets using reasoning to discover implicit information. In this paper, we introduce an ontology-driven framework for eScience provenance management underpinned by an …
Suggestions For Owl 3, Pascal Hitzler
Suggestions For Owl 3, Pascal Hitzler
Computer Science and Engineering Faculty Publications
With OWL 2 about to be completed, it is the right time to start discussions on possible future modifications of OWL. We present here a number of suggestions in order to discuss them with the OWL user community. They encompass expressive extensions on polynomial OWL 2 profiles, a suggestion for an OWL Rules language, and expressive extensions for OWL DL.
Paraconsistent Reasoning For Owl 2, Yue Ma, Pascal Hitzler
Paraconsistent Reasoning For Owl 2, Yue Ma, Pascal Hitzler
Computer Science and Engineering Faculty Publications
A four-valued description logic has been proposed to reason with description logic based inconsistent knowledge bases. This approach has a distinct advantage that it can be implemented by invoking classical reasoners to keep the same complexity as under the classical semantics. However, this approach has so far only been studied for the basid description logic ALC. In this paper, we further study how to extend the four-valued semantics to the more expressive description logic SROIQ which underlies the forthcoming revision of the Web Ontology Language, OWL 2, and also investigate how it fares when adapated to tractable description logics including …
A Preferential Tableaux Calculus For Circumscriptive Alco, Stephan Grimm, Pascal Hitzler
A Preferential Tableaux Calculus For Circumscriptive Alco, Stephan Grimm, Pascal Hitzler
Computer Science and Engineering Faculty Publications
Nonmonotonic extensions of description logics (DLs) allow for default and local closed-world reasoning and are an acknowledged desired feature for applications, e.g. in the Semantic Web. A recent approach to such an extension is based on McCarthy's circumscription, which rests on the principle of minimising the extension of selected predicates to close off dedicated parts of a domain model. While decidability and complexity results have been established in the literature, no practical algorithmisation for circumscriptive DLs has been proposed so far. In this paper, we present a tableaux calculus that can be used as a decision procedure for concept satisfiability …
Ibm Altocumulus: A Cross-Cloud Middleware And Platform, E. Michael Maximilien, Ajith Harshana Ranabahu, Roy Engehausen, Laura Anderson
Ibm Altocumulus: A Cross-Cloud Middleware And Platform, E. Michael Maximilien, Ajith Harshana Ranabahu, Roy Engehausen, Laura Anderson
Kno.e.sis Publications
Cloud computing has become the new face of computing and promises to offer virtually unlimited, cheap, readily available, "utility type" computing resources. Many vendors have entered this market with different offerings ranging from infrastructure-as-a-service such as Amazon, to fully functional platform services such as Google App Engine. However, as a result of this heterogeneity, deploying applications to a cloud and managing them needs to be done using vendor specific methods. This "lock in" is seen as a major hurdle in adopting cloud technologies to the enterprise. IBM Altocumulus, the cloud middleware platform from IBM Almaden Services Research, aims to solve …
A Best Practice Model For Cloud Middleware Systems, Ajith Harshana Ranabahu, E. Michael Maximilien
A Best Practice Model For Cloud Middleware Systems, Ajith Harshana Ranabahu, E. Michael Maximilien
Kno.e.sis Publications
Cloud computing is the latest trend in computing where the intention is to facilitate cheap, utility type computing resources in a service-oriented manner. However, the cloud landscape is still maturing and there are heterogeneities between the clouds, ranging from the application development paradigms to their service interfaces,and scaling approaches. These differences hinder the adoption of cloud by major enterprises. We believe that a cloud middleware can solve most of these issues to allow cross-cloud inter-operation. Our proposed system is Altocumulus, a cloud middleware that homogenizes the clouds. In order to provide the best use of the cloud resources and make …
Context And Domain Knowledge Enhanced Entity Spotting In Informal Text, Daniel Gruhl, Meena Nagarajan, Jan Pieper, Christine Robson, Amit P. Sheth
Context And Domain Knowledge Enhanced Entity Spotting In Informal Text, Daniel Gruhl, Meena Nagarajan, Jan Pieper, Christine Robson, Amit P. Sheth
Kno.e.sis Publications
This paper explores the application of restricted relationship graphs (RDF) and statistical NLP techniques to improve named entity annotation in challenging Informal English domains. We validate our approach using on-line forums discussing popular music. Named entity annotation is particularly difficult in this domain because it is characterized by a large number of ambiguous entities, such as the Madonna album “Music” or Lilly Allen’s pop hit “Smile”.
We evaluate improvements in annotation accuracy that can be obtained by restricting the set of possible entities using real-world constraints. We find that constrained domain entity extraction raises the annotation accuracy significantly, making an …
Context Is Highly Contextual!, Amit P. Sheth
Context Is Highly Contextual!, Amit P. Sheth
Kno.e.sis Publications
No abstract provided.
Robust Lifetime Measurement In Large-Scale P2p Systems With Non-Stationary Arrivals, Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri Loguinov
Robust Lifetime Measurement In Large-Scale P2p Systems With Non-Stationary Arrivals, Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri Loguinov
Computer Science Faculty Publications
Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work has shown that direct sampling of user lifetimes may lead to certain bias (arising from missed peers and round-off inconsistencies) and proposed a technique that estimates lifetimes based on sampled residuals. In this paper, however, we show that under non-stationary arrivals, which are often present in real systems, residual-based sampling does not correctly reconstruct user lifetimes and suffers a varying degree of bias, which in some cases makes estimation completely impossible. We overcome this problem using two contributions: a …
Communication-Efficient Classification In P2p Networks, Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong Ng, Steven C. H. Hoi
Communication-Efficient Classification In P2p Networks, Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong Ng, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Distributed classification aims to learn with accuracy comparable to that of centralized approaches but at far lesser communication and computation costs. By nature, P2P networks provide an excellent environment for performing a distributed classification task due to the high availability of shared resources, such as bandwidth, storage space, and rich computational power. However, learning in P2P networks is faced with many challenging issues; viz., scalability, peer dynamism, asynchronism and fault-tolerance. In this paper, we address these challenges by presenting CEMPaR—a communication-efficient framework based on cascading SVMs that exploits the characteristics of DHT-based lookup protocols. CEMPaR is designed to be robust …
Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar
Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar
International Conference on Information and Communication Technologies
Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relevant aspect may causes a serious disaster and even loss of human lives. Managing and interacting with such real-time system becomes much intricate when the resources are limited as in wireless sensor nodes. A wireless sensor node is typically comprises …
Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari
Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari
International Conference on Information and Communication Technologies
As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the challenging issues in front of researchers. In this paper we have addressed the problem of identity based secure authentication employing well-known RSA algorithm and secret sharing to generate threshold signature on a message.
Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha
Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha
International Conference on Information and Communication Technologies
Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (analytic hierarchy process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a …
Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali
Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali
International Conference on Information and Communication Technologies
Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …
Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer
Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer
International Conference on Information and Communication Technologies
Security is amongst one of the major issues in broadband wireless access (BWA) networks. After the launch of the IEEE 802.16 standard (WiMAX), a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, the analysis of the authentication protocols implemented in WiMAX has been presented along with the description of the threats posed to them. The paper also describes security sub-layer and limitations of the existing architecture. An approach has also been presented for the prevention of these threats like the …
Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel
Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel
International Conference on Information and Communication Technologies
Authentication, access control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true …
Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit
Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit
International Conference on Information and Communication Technologies
Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.
Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan
Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan
International Conference on Information and Communication Technologies
The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.
Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood
Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood
International Conference on Information and Communication Technologies
New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data …
Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain
Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain
International Conference on Information and Communication Technologies
An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced …
Networks - I: Cooperative Friendship Networks Through Slac With Newscast, M. Usman Akram, Anam Tariq
Networks - I: Cooperative Friendship Networks Through Slac With Newscast, M. Usman Akram, Anam Tariq
International Conference on Information and Communication Technologies
The effective cooperation and coordination of nodes is necessary for performance improvement in the P2P network. In this paper, we focus on the problem of maintaining considerable amount of cooperation and friendship in P2P networks of selfish peers. For this purpose we will analyze the performance of SLAC. It is a simple algorithm that maintains excessive levels of cooperation and friendship in a network while performing tasks. A simulation model ldquoPrisoners' Dilemmardquo is presented that puts this algorithm to work in a Peersim environment. For providing random sampling, an existing protocol called ldquoNEWSCASTrdquo has been used. The extensive computer simulations …