Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2966)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Arkansas, Fayetteville (42)
- University of Wisconsin Milwaukee (42)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2872)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- Graduate Theses and Dissertations (33)
- All Capstone Projects (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 4411 - 4440 of 6727
Full-Text Articles in Physical Sciences and Mathematics
Mobile Spatial Interaction In The Future Internet Of Things, James Carswell, Junjun Yin
Mobile Spatial Interaction In The Future Internet Of Things, James Carswell, Junjun Yin
Conference papers
Research and development of mobile information systems in the Future Internet of Things is about delivering technologies built around management and access to real-time heterogeneous datasets. Analyzing these enormous volumes of disparate data on mobile devices requires context-aware smart applications and services. 3DQ (Three Dimensional Query) is our novel mobile spatial interaction (MSI) prototype for data mining and analysis on today’s location and orientation aware “smartphones” within such 3D sensor web environments. Our application tailors a military style threat dome query calculation using MSI with “hidden query removal” functionality to reduce information overload and heighten situation awareness on these commercial …
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …
Geometric Programming Subject To System Of Fuzzy Relation Inequalities, Elyas Shivanian, Mahdi Keshtkar, Esmaile Khorram
Geometric Programming Subject To System Of Fuzzy Relation Inequalities, Elyas Shivanian, Mahdi Keshtkar, Esmaile Khorram
Applications and Applied Mathematics: An International Journal (AAM)
In this paper, an optimization model with geometric objective function is presented. Geometric programming is widely used; many objective functions in optimization problems can be analyzed by geometric programming. We often encounter these in resource allocation and structure optimization and technology management, etc. On the other hand, fuzzy relation equalities and inequalities are also used in many areas. We here present a geometric programming model with a monomial objective function subject to the fuzzy relation inequality constraints with maxproduct composition. Simplification operations have been given to accelerate the resolution of the problem by removing the components having no effect on …
Numerical Solution Of Interval And Fuzzy System Of Linear Equations, Suparna Das, S. Chakraverty
Numerical Solution Of Interval And Fuzzy System Of Linear Equations, Suparna Das, S. Chakraverty
Applications and Applied Mathematics: An International Journal (AAM)
A system of linear equations, in general is solved in open literature for crisp unknowns, but in actual case the parameters (coefficients) of the system of linear equations contain uncertainty and are less crisp. The uncertainties may be considered in term of interval or fuzzy number. In this paper, a detail of study of linear simultaneous equations with interval and fuzzy parameter (triangular and trapezoidal) has been performed. New methods have been proposed for solving such systems. First, the methods have been tested for known problems viz. a circuit analysis solved in the literature and the results are found to …
A Web-Based Study Of Self-Treatment Of Opioid Withdrawal Symptoms With Loperamide, Raminta Daniulaityte, Robert G. Carlson, Russel S. Falck, Delroy H. Cameron, Sujan Udayanaga, Lu Chen, Amit P. Sheth
A Web-Based Study Of Self-Treatment Of Opioid Withdrawal Symptoms With Loperamide, Raminta Daniulaityte, Robert G. Carlson, Russel S. Falck, Delroy H. Cameron, Sujan Udayanaga, Lu Chen, Amit P. Sheth
Kno.e.sis Publications
Aims: Many websites provide a medium for individuals to freely share their experiences and knowledge about different drugs. Such user-generated content can be used as a rich data source to study emerging drug use practices and trends. The study aims to examine web-based reports of loperamide use practices among non-medical opioid users. Loperamide, a piperidine derivative, is an opioid agonist approved for the control of diarrhea symptoms. Because of its general inability to cross the blood-brain barrier, it is considered to have no abuse potential and is available without a prescription. Methods: A website that allows free discussion of illicit …
Prediction Of Topic Volume On Twitter, Yiye Ruan, Hemant Purohit, David Fuhry, Srinivasan Parthasarathy, Amit P. Sheth
Prediction Of Topic Volume On Twitter, Yiye Ruan, Hemant Purohit, David Fuhry, Srinivasan Parthasarathy, Amit P. Sheth
Kno.e.sis Publications
We discuss an approach for predicting microscopic (individual) and macroscopic (collective) user behavioral patterns with respect to specific trending topics on Twitter. Going beyond previous efforts that have analyzed driving factors in whether and when a user will publish topic-relevant tweets, here we seek to predict the strength of content generation which allows more accurate understanding of Twitter users' behavior and more effective utilization of the online social network for diffusing information. Unlike traditional approaches, we consider multiple dimensions into one regression-based prediction framework covering network structure, user interaction, content characteristics and past activity. Experimental results on three large Twitter …
Topical Anomaly Detection From Twitter Streams, Pramod Anantharam, Krishnaprasad Thirunarayan, Amit P. Sheth
Topical Anomaly Detection From Twitter Streams, Pramod Anantharam, Krishnaprasad Thirunarayan, Amit P. Sheth
Kno.e.sis Publications
No abstract provided.
Visualizing Media Bias Through Twitter, Jisun An, Meeyoung Cha, Gummadi, Krishna, Jon Crowcroft, Daniele Queria
Visualizing Media Bias Through Twitter, Jisun An, Meeyoung Cha, Gummadi, Krishna, Jon Crowcroft, Daniele Queria
Research Collection School Of Computing and Information Systems
Traditional media outlets are known to report political news in a biased way, potentially affecting the political beliefs of the audience and even altering their voting behaviors. Therefore, tracking bias in everyday news and building a platform where people can receive balanced news information is important. We propose a model that maps the news media sources along a dimensional dichotomous political spectrum using the co-subscriptions relationships inferred by Twitter links. By analyzing 7 million follow links, we show that the political dichotomy naturally arises on Twitter when we only consider direct media subscription. Furthermore, we demonstrate a real-time Twitter-based application …
An Evolutionary Search Paradigm That Learns With Past Experiences, Liang Feng, Yew-Soon Ong, Ivor Tsang, Ah-Hwee Tan
An Evolutionary Search Paradigm That Learns With Past Experiences, Liang Feng, Yew-Soon Ong, Ivor Tsang, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
A major drawback of evolutionary optimization approaches in the literature is the apparent lack of automated knowledge transfers and reuse across problems. Particularly, evolutionary optimization methods generally start a search from scratch or ground zero state, independent of how similar the given new problem of interest is to those optimized previously. In this paper, we present a study on the transfer of knowledge in the form of useful structured knowledge or latent patterns that are captured from previous experiences of problem-solving to enhance future evolutionary search. The essential contributions of our present study include the meme learning and meme selection …
Self-Organizing Neural Networks For Learning Air Combat Maneuvers, Teck-Hou Teng, Ah-Hwee Tan
Self-Organizing Neural Networks For Learning Air Combat Maneuvers, Teck-Hou Teng, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
This paper reports on an agent-oriented approach for the modeling of adaptive doctrine-equipped computer generated force (CGF) using a commercial-grade simulation platform known as CAE STRIVECGF. A self- organizing neural network is used for the adaptive CGF to learn and generalize knowledge in an online manner during the simulation. The challenge of defining the state space and action space and the lack of domain knowledge to initialize the adaptive CGF are addressed using the doctrine used to drive the non-adaptive CGF. The doctrine contains a set of specialized knowledge for conducting 1-v-1 dogfights. The hierarchical structure and symbol representation of …
Ifalcon: A Neural Architecture For Hierarchical Planning, Budhitama Subagdja, Ah-Hwee Tan
Ifalcon: A Neural Architecture For Hierarchical Planning, Budhitama Subagdja, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Hierarchical planning is an approach of planning by composing and executing hierarchically arranged predefined plans on the fly to solve some problems. This approach commonly relies on a domain expert providing all semantic and structural knowledge. One challenge is how the system deals with incomplete ill-defined knowledge while the solution can be achieved on the fly. Most symbolic-based hierarchical planners have been devised to allow the knowledge to be described expressively. However, in some cases, it is still difficult to produce the appropriate knowledge due to the complexity of the problem domain especially if the missing knowledge must be acquired …
More Of A Receiver Than A Giver: Why Do People Unfollow In Twitter?, Haewoon Kwak, Sue Moon, Wonjae Lee
More Of A Receiver Than A Giver: Why Do People Unfollow In Twitter?, Haewoon Kwak, Sue Moon, Wonjae Lee
Research Collection School Of Computing and Information Systems
We propose a logistic regression model taking into ac- count two analytically different sets of factors–structure and action. The factors include individual, dyadic, and triadic properties between ego and alter whose tie breakup is under consideration. From the fitted model using a large-scale data, we discover 5 structural and 7 actional variables to have significant explanatory power for unfollow. One unique finding from our quantitative analysis is that people appreciate receiving acknowl- edgements from others even in virtually unilateral com- munication relationships and are less likely to unfollow them: people are more of a receiver than a giver.
Memory Formation, Consolidation, And Forgetting In Learning Agents, Budhitama Subagdja, Wenwen Wang, Ah-Hwee Tan, Yuan-Sin Tan, Loo-Nin Teow
Memory Formation, Consolidation, And Forgetting In Learning Agents, Budhitama Subagdja, Wenwen Wang, Ah-Hwee Tan, Yuan-Sin Tan, Loo-Nin Teow
Research Collection School Of Computing and Information Systems
Memory enables past experiences to be remembered and acquired as useful knowledge to support decision making, especially when perception and computational resources are limited. This paper presents a neuropsychological-inspired dual memory model for agents, consisting of an episodic memory that records the agent’s experience in real time and a semantic memory that captures factual knowledge through a parallel consolidation process. In addition, the model incorporates a natural forgetting mechanism that prevents memory overloading by removing transient memory traces. Our experimental study based on a real-time first-person-shooter video game has indicated that the memory consolidation and forgetting processes are not only …
Memory Formation, Consolidation, And Forgetting In Learning Agents, Budhitama Susnagdja, Wenwen Wang, Ah-Hwee Tan, Yuan-Sin Tan, Loo-Nin Teow
Memory Formation, Consolidation, And Forgetting In Learning Agents, Budhitama Susnagdja, Wenwen Wang, Ah-Hwee Tan, Yuan-Sin Tan, Loo-Nin Teow
Research Collection School Of Computing and Information Systems
Memory enables past experiences to be remembered and acquired as useful knowledge to support decision making, especially when perception and computational resources are limited. This paper presents a neuropsychological- inspired dual memory model for agents, consisting of an episodic memory that records the agent's experience in real time and a semantic memory that captures factual knowledge through a parallel consolidation process. In addition, the model incorporates a natural forgetting mechanism that prevents memory overloading by removing transient memory traces. Our experimental study based on a real-time first-person-shooter video game has indicated that the memory consolidation and forgetting processes are not …
A Novel Unbalanced Tree Structure For Low-Cost Authentication Of Streaming Content On Mobile And Sensor Devices, Thivya Kandappu, Vijay Sivaraman, Roksana Boreli
A Novel Unbalanced Tree Structure For Low-Cost Authentication Of Streaming Content On Mobile And Sensor Devices, Thivya Kandappu, Vijay Sivaraman, Roksana Boreli
Research Collection School Of Computing and Information Systems
We consider stored content being streamed to a resource-poor device (such as a sensor node or a mobile phone), and address the issue of authenticating such content in realtime at the receiver. Per-packet digital signatures incur high computational cost, while per-block signatures impose high delays. A Merkle hash tree combines the benefits of the two by having a single signature per-block (at the root of the tree), while allowing immediate per-packet verification by following a hash-path logarithmic in the number of packets. In this paper we explore how the structure of the Merkle tree can be adapted to improve playback …
Overcoming The Challenges In Cost Estimation For Distributed Software Projects, Narayanasamy Ramasubbu, Rajesh Krishna Balan
Overcoming The Challenges In Cost Estimation For Distributed Software Projects, Narayanasamy Ramasubbu, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
We describe how we studied, in-situ, the operational processes of three large high process maturity distributed software development companies and discovered three common problems they faced with respect to early stage project cost estimation. We found that project managers faced significant challenges to accurately estimate project costs because the standard metrics-based estimation tools they used (a) did not effectively incorporate diverse distributed project configurations and characteristics, (b) required comprehensive data that was not fully available for all starting projects, and (c) required significant domain experience to derive accurate estimates. To address these challenges, we collaborated with practitioners at the three …
When A Friend In Twitter Is A Friend In Life, Wei Xie, Cheng Li, Feida Zhu, Ee-Peng Lim, Xueqing Gong
When A Friend In Twitter Is A Friend In Life, Wei Xie, Cheng Li, Feida Zhu, Ee-Peng Lim, Xueqing Gong
Research Collection School Of Computing and Information Systems
Twitter is a fast-growing online social network service (SNS) where users can "follow" any other user to receive his or her mini-blogs which are called "tweets". In this paper, we study the problem of identifying a user's off-line real-life social community, which we call the user'sTwitter off-line community, purely from examining Twitter network structure. Based on observations from our user-verified Twitter data and results from previous works, we propose three principles about Twitter off-line communities. Incorporating these principles, we develop a novel algorithm to iteratively discover the Twitter off-line community based on a new way of measuring user closeness. According …
Semi-Supervised Hierarchical Clustering For Personalized Web Image Organization, Lei Meng, Ah-Hwee Tan
Semi-Supervised Hierarchical Clustering For Personalized Web Image Organization, Lei Meng, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Existing efforts on web image organization usually transform the task into surrounding text clustering. However, Current text clustering algorithms do not address the problem of insufficient statistical information for image representation and noisy tags which greatly decreases the clustering performance while increases the computational cost. In this paper, we propose a two-step semi-supervised hierarchical clustering algorithm, Personalized Hierarchical Theme-based Clustering (PHTC), for web image organization. In the first step, the Probabilistic Fusion ART (PF-ART) is proposed for grouping semantically similar images and simultaneously learning the probabilistic distribution of tag occurrence for mining the key tags/topics of clusters. In this way, …
A Self-Organizing Multi-Memory System For Autonomous Agents, Wenwen Wang, Budhitama Subagdja, Ah-Hwee Tan, Yuan-Sin Tan
A Self-Organizing Multi-Memory System For Autonomous Agents, Wenwen Wang, Budhitama Subagdja, Ah-Hwee Tan, Yuan-Sin Tan
Research Collection School Of Computing and Information Systems
This paper presents a self-organizing approach to the learning of procedural and declarative knowledge in parallel using independent but interconnected memory models. The proposed system, employing fusion Adaptive Resonance Theory (fusion ART) network as a building block, consists of a declarative memory module, that learns both episodic traces and semantic knowledge in real time, as well as a procedural memory module that learns reactive responses to its environment through reinforcement learning. More importantly, the proposed multi-memory system demonstrates how the various memory modules transfer knowledge and cooperate with each other for a higher overall performance. We present experimental studies, wherein …
A Biologically-Inspired Affective Model Based On Cognitive Situational Appraisal, Feng Shu, Ah-Hwee Tan
A Biologically-Inspired Affective Model Based On Cognitive Situational Appraisal, Feng Shu, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Although various emotion models have been proposed based on appraisal theories, most of them focus on designing specific appraisal rules and there is no unified framework for emotional appraisal. Moreover, few existing emotion models are biologically-inspired and are inadequate in imitating emotion process of human brain. This paper proposes a bio-inspired computational model called Cognitive Regulated Affective Architecture (CRAA), inspired by the cognitive regulated emotion theory and the network theory of emotion. This architecture is proposed by taking the following positions: (1) Cognition and emotion are not separated but interacted systems; (2) The appraisal of emotion depends on and should …
Suffix Trees For Document Retrieval, Ryan Reck
Suffix Trees For Document Retrieval, Ryan Reck
Master's Theses
This thesis presents a look at the suitability of Suffix Trees for full text indexing and retrieval. Typically suffix trees are built on a character level, where the tree records which characters follow each other character. By building suffix trees for documents based on words instead of characters, the resulting tree effectively indexes every word or sequence of words that occur in any of the documents. Ukkonnen's algorithm is adapted to build word-level suffix trees. But the primary focus is on developing Algorithms for searching the suffix tree for exact and approximate, or fuzzy, matches to arbitrary query strings. A …
Modeling Diffusion In Social Networks Using Network Properties, Duc Minh Luu, Ee Peng Lim, Tuan Anh Hoang, Chong Tat Freddy Chua
Modeling Diffusion In Social Networks Using Network Properties, Duc Minh Luu, Ee Peng Lim, Tuan Anh Hoang, Chong Tat Freddy Chua
Research Collection School Of Computing and Information Systems
"Diffusion of items occurs in social networks due to spreading of items through word of mouth and exogenous factors. These items may be news, products, videos, advertisements or contagious viruses. When a user purchases or consumes one of such items, we say that she adopts the item and she becomes an item adopter. Previous research has studied diffusion process at both the macro and micro levels. The former models the number of item adopters in the diffusion process while the latter determines which individuals adopt item. Both macro and micro level models have their merits and limitations. In this paper, …
Virality And Susceptibility In Information Diffusions, Tuan-Anh Hoang, Ee Peng Lim
Virality And Susceptibility In Information Diffusions, Tuan-Anh Hoang, Ee Peng Lim
Research Collection School Of Computing and Information Systems
Viral diffusion allows a piece of information to widely and quickly spread within the network of users through word-ofmouth. In this paper, we study the problem of modeling both item and user factors that contribute to viral diffusion in Twitter network. We identify three behaviorial factors, namely user virality, user susceptibility and item virality, that contribute to viral diffusion. Instead of modeling these factors independently as done in previous research, we propose a model that measures all the factors simultaneously considering their mutual dependencies. The model has been evaluated on both synthetic and real datasets. The experiments show that our …
Dash: A Novel Search Engine For Database-Generated Dynamic Web Pages, Ken C. K. Lee, Kanchan Bankar, Baihua Zheng, Chi-Yin Chow, Honggang Wang
Dash: A Novel Search Engine For Database-Generated Dynamic Web Pages, Ken C. K. Lee, Kanchan Bankar, Baihua Zheng, Chi-Yin Chow, Honggang Wang
Research Collection School Of Computing and Information Systems
Database-generated dynamic web pages (db-pages, in short), whose contents are created on the fly by web applications and databases, are now prominent in the web. However, many of them cannot be searched by existing search engines. Accordingly, we develop a novel search engine named Dash, which stands for Db-pAge SearcH, to support db-page search. Dash determines db-pages possibly generated by a target web application and its database through exploring the application code and the related database content and supports keyword search on those db-pages. In this paper, we present its system design and focus on the efficiency issue.
To minimize …
Effects Of Information Importance And Distribution On Information Exchange In Team Decision Making, Babajide James Osatuyi
Effects Of Information Importance And Distribution On Information Exchange In Team Decision Making, Babajide James Osatuyi
Dissertations
Teams in organizations are strategically built with members from domains and experiences so that a wider range of information and options can be pooled. This strategic team structure is based on the assumption that when team members share the information they have, the team as a whole can access a larger pool of information than any one member acting alone, potentially enabling them to make better decisions. However, studies have shown that teams, unlike individuals, sometimes do not effectively share and use the unique information available to them, leading to poorer decisions. Research on information sharing in team decision making …
Integrating Owl And Rules: A Syntax Proposal For Nominal Schemas, David Carral Martinez, Adila Krisnadhi, Pascal Hitzler
Integrating Owl And Rules: A Syntax Proposal For Nominal Schemas, David Carral Martinez, Adila Krisnadhi, Pascal Hitzler
Computer Science and Engineering Faculty Publications
This paper proposes an addition to OWL 2 syntax to incorporate nominal schemas, which is a new description-logic style extension of OWL 2 which was recently proposed, and which makes is possible to express "variable nominal classes" within axioms in an OWL 2 ontology. Nominal schemas make it possible to express DL-safe rules of arbitrary arity within the extended OWL paradigm, hence covering the well-known DL-safe SWRL language. To express this feature, we extend OWL 2 syntax to include necessary and minimal modifications to both Functional and Manchester syntax grammars and mappings from these two syntaxes to Turtle/RDF. We also …
Dynamic Scoping For Browser Based Access Control System, Vinaykumar Nadipelly
Dynamic Scoping For Browser Based Access Control System, Vinaykumar Nadipelly
Masters Theses & Specialist Projects
We have inorganically increased the use of web applications to the point of using them for almost everything and making them an essential part of our everyday lives. As a result, the enhancement of privacy and security policies for the web applications is becoming increasingly essential. The importance and stateless nature of the web infrastructure made the web a preferred target of attacks. The current web access control system is a reason behind the victory of attacks. The current web consists of two major components, the browser and the server, where the effective access control system needs to be implemented. …
Semantic Aspects Of Earthcube, Pascal Hitzler, Krzysztof Janowicz, Gary Berg-Cross, Leo Obrst, Amit P. Sheth, Timothy Finin, Isabel F. Cruz
Semantic Aspects Of Earthcube, Pascal Hitzler, Krzysztof Janowicz, Gary Berg-Cross, Leo Obrst, Amit P. Sheth, Timothy Finin, Isabel F. Cruz
Kno.e.sis Publications
In this document, we give a high-level overview of selected Semantic (Web) technologies, methods, and other important considerations, that are relevant for the success of EarthCube. The goal of this initial document is to provide entry points and references for discussions between the Semantic Technologies experts and the domain experts within EarthCube. The selected topics are intended to ground the EarthCube roadmap in the state of the art in semantics research and ontology engineering.
We anticipate that this document will evolve as EarthCube progresses. Indeed, all EarthCube parties are asked to provide topics of importance that should be treated in …
Trust Networks, Krishnaprasad Thirunarayan, Pramod Anantharam, Cory Andrew Henson, Amit P. Sheth
Trust Networks, Krishnaprasad Thirunarayan, Pramod Anantharam, Cory Andrew Henson, Amit P. Sheth
Kno.e.sis Publications
Trust relationships occur naturally in many diverse contexts such as collaborative systems, e-commerce, interpersonal interactions, social networks, semantic sensor web, etc. As collaborating agents providing content and services become increasingly removed from the agents that consume them, the issue of robust trust inference and update become critical. There is a need to find online substitutes for traditional (direct or face-to-face) cues to derive measures of trust, and create efficient and secure system for managing trust, to support decision-making. Unfortunately, there is neither a universal notion of trust that is applicable to all domains nor a clear explication of its semantics …
Spatial Queries In Wireless Broadcast Environments [Keynote Speech], Kyriakos Mouratidis
Spatial Queries In Wireless Broadcast Environments [Keynote Speech], Kyriakos Mouratidis
Research Collection School Of Computing and Information Systems
Wireless data broadcasting is a promising technique for information dissemination that exploits the computational capabilities of mobile devices, in order to enhance the scalability of the system. Under this environment, the data are continuously broadcast by the server, interleaved with some indexing information for query processing. Clients may tune in the broadcast channel and process their queries locally without contacting the server. In this paper we focus on spatial queries in particular. First, we review existing methods on this topic. Next, taking shortest path computation as an example, we showcase technical challenges arising in this processing model and describe techniques …