A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A semantic privacy-preserving model for data sharing and integration
2011
Proceedings of the International Conference on Web Intelligence, Mining and Semantics - WIMS '11
ontology and rule. 3 Using a combination of semantics-enabled policies for data sharing and protection in multiple servers. 4 Ensuring soundness and completeness of query rewriting services in a semantic ...
and rule. 3 Using a combination of semantics-enabled policies for data sharing and protection in multiple servers. 4 Ensuring soundness and completeness of query rewriting services in a semantic privacy-preserving ...
The perfect datalog rule integration enforces the data query and protection services. ...
doi:10.1145/1988688.1988700
dblp:conf/wims/HuY11
fatcat:jtrqevrcjvdgfdcmo4cuwrpis4
A Semantic Query Method for Deep Web
2013
Applied Mechanics and Materials
web environment through describing the establishment of the semantic environment, re-writing the SPARQL-to-SQL query, semantic packaging of semantic query result, and the architecture of semantic query services ...
As a semantic Web service, DWSQS semantics is described by a number of service anthologies. ...
The main steps of the definition of limited RDF view for Deep Web back-end RDB by RDF view builder as follows: 1) RDB schema abstraction [11] ; 2) RDB-to-RDF schema mapping rules [12] ; 3) Build limited ...
doi:10.4028/www.scientific.net/amm.347-350.2559
fatcat:p6dyiujb3vhmpmyv3sxwj2kzpa
Combining Configuration and Query Rewriting for Web Service Composition
2011
2011 IEEE International Conference on Web Services
with respect to business rules organized into different levels (composition, service and user). ...
Web services that supports query rewriting, and 2) a clear separation between constraints and service/domain knowledge description. ...
Second, configuration allows integrating business rules as constraints related to the domain of composition and to services of this domain without mixing with the domain ontology, keeping a clear separation ...
doi:10.1109/icws.2011.26
dblp:conf/icws/MesmoudiMH11
fatcat:qyioqhfc55dgdmuhgw3hmd4pkq
Datalog access to real-world web services
2018
Figshare
Conclusion
Web Services
Growing use of specialized web services
Personal and professional use
Integrated solutions ...
proposition: Consider data providing API operations as database relations Use mediation approach of data integration for querying web services
Mediation Approach Global Schema Set of relations with attributes ...
Datalog Engine: Modified IRIS integrated with generic wrapper
Use cases Feeding a data warehouse (data analysis) Integrated dashboard Web mashups
Future Works Limitations and future works Incomplete ...
doi:10.6084/m9.figshare.6707420.v1
fatcat:ucyfcr2i3rgkhczf4zyu64dera
An Expressive and Efficient Solution to the Service Selection Problem
[chapter]
2010
Lecture Notes in Computer Science
The LAV formulation allows us to cast the service selection problem as a query rewriting problem that must consider the relationships among the concepts in the ontology and the ranks induced by the preferences ...
Then, building on related work, we devise an encoding of the resulting query rewriting problem as a logical theory whose models are in correspondence with the solutions of the user request, and in presence ...
Discussion We proposed a novel formalism for expressing Service Selection Problems involving an ontology of generic concepts, services described using views in terms of the concepts, following the LAV ...
doi:10.1007/978-3-642-17746-0_25
fatcat:orxm4aomhnfj7kmk34rp55buni
Only the Best Can Make It: Optimal Component Selection
2007
Electronical Notes in Theoretical Computer Science
As a result of the rule application, the service ATP is bound to GPSLoc, and GP S−sensor is added as new required service, since it appears neither as bound nor as required service in the current system ...
For this purpose, we specify the desired behavior of the target component system as a term. Rewrite rules map the required services in the specification to concrete components. ...
doi:10.1016/j.entcs.2006.02.034
fatcat:5etzithjb5dbncsrr6mij6hode
Change Management of BPM-based Software Applications
english
2013
Proceedings of the 15th International Conference on Enterprise Information Systems
english
The specifications are then implemented using an integrated software change management platform appearing as a set of the Eclipse Workbench plug-ins. ...
From a formal point of view, our work consists of specifying a BPM meta-model using a typed attributed graph and a BPM change operations taxonomy based on graph rewriting rules. ...
The graph rewriting rules have been implemented with AGG that as a graph rewriting system. This implementation can be considered as an operational or constructive specification. ...
doi:10.5220/0004441400370045
dblp:conf/iceis/BouneffaA13
fatcat:yao42mtqgngapmcvmf34y7pdlm
Datalog Access To Real-World Web Services
2018
Zenodo
Datalog program, including conjunctive queries help to describe API operations as well as query them using query rewriting algorithms like inverse-rules algorithm. ...
Mediation-based data integration approach when extended to web service API on one hand helped to achieve a declarative approach to the problem of extracting desired in- formation from the web services, ...
Datalog program, including conjunctive queries help to describe API operations as well as query them using query rewriting algorithms like inverse-rules algorithm. ...
doi:10.5281/zenodo.1285281
fatcat:f5jv2wtx5bfgpcuq3d7twkabgu
Monitoring conversational web services
2007
2nd international workshop on Service oriented software engineering in conjunction with the 6th ESEC/FSE joint meeting - IW-SOSWE '07
The dynamic nature of web service compositions demands continuous monitoring of the quality of the provided service, as perceived by the client. ...
We propose a monitoring approach based on an algebraic specification language and we show how this can be integrated into a run-time monitoring architecture. ...
In operational semantics, the axioms of an algebraic specification can be regarded as rewrite rules of a TRS. ...
doi:10.1145/1294928.1294933
dblp:conf/sigsoft/BianculliG07
fatcat:je7lpufxt5dybcx6g6optq7bna
Towards a Data Warehouse Fed with Web Services
[chapter]
2014
Lecture Notes in Computer Science
integration. ...
The goal of our work is to investigate and devise an approach to address the trade-off between scalability and adaptability in large scale integration with numerous ever-evolving web services. ...
We chose IRIS (Integrated Rule Inference System) [15] as the datalog engine to perform query evaluation. ...
doi:10.1007/978-3-319-07443-6_61
fatcat:2a3w2ojphrdulgtr74amlsjpgu
Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search and Rescue
2019
2019 IEEE International Conference on Services Computing (SCC)
We propose an approach to support situationaware access control in a federated Data-as-a-Service architecture. ...
We develop an ontology and rules to represent access control policies and a distributed reasoning framework to enforce these policies. We implement our proposed solution in a proof-of-concept system. ...
rules and can be easily integrated with existing systems. ...
doi:10.1109/scc.2019.00046
dblp:conf/IEEEscc/OniCCJN19
fatcat:ltcsin4m3vfs3emivm4duy42x4
The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach
[chapter]
2014
Lecture Notes in Business Information Processing
The change operations are then formalized by graph rewriting (or transformation) rules. These rules implement both the change and the change impact propagation. ...
This ontology is intended to be able to automatically generate some change management rules. We use graph rewriting system (AGG) as a mean to formally specify and validate the result of our approach. ...
The main concept of our approach is validated using a set of tools integrated as ECLIPSE plug-ins. ...
doi:10.1007/978-3-319-09492-2_17
fatcat:6w5nv3w7mvfxxkuljtw3njvkaq
A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting
2020
2020 IEEE International Conference on Services Computing (SCC)
We present a novel framework to enable situation-aware access control in a federated Data-asa-Service architecture by using semantic web technologies. ...
Examples include contact tracing for a contagious disease such as COVID-19, maritime search and rescue operations, or creating a collaborative bid for a contract. ...
case; 2) a distributed reasoning framework based on query rewriting that enforces these rules and can be easily integrated with existing federated Data-as-a-Service architecture; 3) a peerto-peer architecture ...
doi:10.1109/scc49832.2020.00008
fatcat:5mhxbz67xjgltnnfdkf6vnvfz4
Constructing component-based extension interfaces in legacy systems code
2004
Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC - EW11
To resolve the second problem, we propose to augment interface specifications with rewrite rules that integrate support for extensions in the legacy code. ...
In both cases a small number of rules are sufficient to describe modifications that apply across the implementation of a large legacy system. ...
Implementations of system services, such as drivers and file systems, are borrowed from Linux and BSD. ...
doi:10.1145/1133572.1133605
dblp:conf/sigopsE/MullerLMS04
fatcat:bacly6je2vbpdi3sysz6qspum4
Data flow testing of service-oriented workflow applications
2008
Proceedings of the 13th international conference on Software engineering - ICSE '08
We use the mathematical definitions of XPath constructs as rewriting rules, and propose a data structure called XPath Rewriting Graph (XRG), which not only models how an XPath is conceptually rewritten ...
We treat the mathematical variables in the applied rewriting rules as if they were program variables, and use them to analyze how information may be rewritten in an XPath conceptually. ...
We treat the definitions as "left-to-right" rewriting rules (similarly to the application of axioms as rewriting rules in algebraic specifications [6] ). ...
doi:10.1145/1368088.1368139
dblp:conf/icse/MeiCT08
fatcat:kgj5yqgjpnffbanl5gs6g25s6y
« Previous
Showing results 1 — 15 out of 44,249 results