44,249 Hits in 3.3 sec

A semantic privacy-preserving model for data sharing and integration

Yuh-Jong Hu, Jiun-Jan Yang
2011 Proceedings of the International Conference on Web Intelligence, Mining and Semantics - WIMS '11  
ontology and rule. 3 Using a combination of semantics-enabled policies for data sharing and protection in multiple servers. 4 Ensuring soundness and completeness of query rewriting services in a semantic  ...  and rule. 3 Using a combination of semantics-enabled policies for data sharing and protection in multiple servers. 4 Ensuring soundness and completeness of query rewriting services in a semantic privacy-preserving  ...  The perfect datalog rule integration enforces the data query and protection services.  ... 
doi:10.1145/1988688.1988700 dblp:conf/wims/HuY11 fatcat:jtrqevrcjvdgfdcmo4cuwrpis4

A Semantic Query Method for Deep Web

Hao Jiang, Wen Ju Liu, Li Li Lu
2013 Applied Mechanics and Materials  
web environment through describing the establishment of the semantic environment, re-writing the SPARQL-to-SQL query, semantic packaging of semantic query result, and the architecture of semantic query services  ...  As a semantic Web service, DWSQS semantics is described by a number of service anthologies.  ...  The main steps of the definition of limited RDF view for Deep Web back-end RDB by RDF view builder as follows: 1) RDB schema abstraction [11] ; 2) RDB-to-RDF schema mapping rules [12] ; 3) Build limited  ... 
doi:10.4028/ fatcat:p6dyiujb3vhmpmyv3sxwj2kzpa

Combining Configuration and Query Rewriting for Web Service Composition

Amin Mesmoudi, Michaël Mrissa, Mohand-Saïd Hacid
2011 2011 IEEE International Conference on Web Services  
with respect to business rules organized into different levels (composition, service and user).  ...  Web services that supports query rewriting, and 2) a clear separation between constraints and service/domain knowledge description.  ...  Second, configuration allows integrating business rules as constraints related to the domain of composition and to services of this domain without mixing with the domain ontology, keeping a clear separation  ... 
doi:10.1109/icws.2011.26 dblp:conf/icws/MesmoudiMH11 fatcat:qyioqhfc55dgdmuhgw3hmd4pkq

Datalog access to real-world web services

John Samuel
2018 Figshare  
Conclusion Web Services Growing use of specialized web services Personal and professional use Integrated solutions  ...  proposition: Consider data providing API operations as database relations Use mediation approach of data integration for querying web services Mediation Approach Global Schema Set of relations with attributes  ...  Datalog Engine: Modified IRIS integrated with generic wrapper Use cases Feeding a data warehouse (data analysis) Integrated dashboard Web mashups Future Works Limitations and future works Incomplete  ... 
doi:10.6084/m9.figshare.6707420.v1 fatcat:ucyfcr2i3rgkhczf4zyu64dera

An Expressive and Efficient Solution to the Service Selection Problem [chapter]

Daniel Izquierdo, María-Esther Vidal, Blai Bonet
2010 Lecture Notes in Computer Science  
The LAV formulation allows us to cast the service selection problem as a query rewriting problem that must consider the relationships among the concepts in the ontology and the ranks induced by the preferences  ...  Then, building on related work, we devise an encoding of the resulting query rewriting problem as a logical theory whose models are in correspondence with the solutions of the user request, and in presence  ...  Discussion We proposed a novel formalism for expressing Service Selection Problems involving an ontology of generic concepts, services described using views in terms of the concepts, following the LAV  ... 
doi:10.1007/978-3-642-17746-0_25 fatcat:orxm4aomhnfj7kmk34rp55buni

Only the Best Can Make It: Optimal Component Selection

Lars Gesellensetter, Sabine Glesner
2007 Electronical Notes in Theoretical Computer Science  
As a result of the rule application, the service ATP is bound to GPSLoc, and GP S−sensor is added as new required service, since it appears neither as bound nor as required service in the current system  ...  For this purpose, we specify the desired behavior of the target component system as a term. Rewrite rules map the required services in the specification to concrete components.  ... 
doi:10.1016/j.entcs.2006.02.034 fatcat:5etzithjb5dbncsrr6mij6hode

Change Management of BPM-based Software Applications

Mourad Bouneffa, Adeel Ahmad
2013 Proceedings of the 15th International Conference on Enterprise Information Systems  
The specifications are then implemented using an integrated software change management platform appearing as a set of the Eclipse Workbench plug-ins.  ...  From a formal point of view, our work consists of specifying a BPM meta-model using a typed attributed graph and a BPM change operations taxonomy based on graph rewriting rules.  ...  The graph rewriting rules have been implemented with AGG that as a graph rewriting system. This implementation can be considered as an operational or constructive specification.  ... 
doi:10.5220/0004441400370045 dblp:conf/iceis/BouneffaA13 fatcat:yao42mtqgngapmcvmf34y7pdlm

Datalog Access To Real-World Web Services

John Samuel, Christophe Rey
2018 Zenodo  
Datalog program, including conjunctive queries help to describe API operations as well as query them using query rewriting algorithms like inverse-rules algorithm.  ...  Mediation-based data integration approach when extended to web service API on one hand helped to achieve a declarative approach to the problem of extracting desired in- formation from the web services,  ...  Datalog program, including conjunctive queries help to describe API operations as well as query them using query rewriting algorithms like inverse-rules algorithm.  ... 
doi:10.5281/zenodo.1285281 fatcat:f5jv2wtx5bfgpcuq3d7twkabgu

Monitoring conversational web services

Domenico Bianculli, Carlo Ghezzi
2007 2nd international workshop on Service oriented software engineering in conjunction with the 6th ESEC/FSE joint meeting - IW-SOSWE '07  
The dynamic nature of web service compositions demands continuous monitoring of the quality of the provided service, as perceived by the client.  ...  We propose a monitoring approach based on an algebraic specification language and we show how this can be integrated into a run-time monitoring architecture.  ...  In operational semantics, the axioms of an algebraic specification can be regarded as rewrite rules of a TRS.  ... 
doi:10.1145/1294928.1294933 dblp:conf/sigsoft/BianculliG07 fatcat:je7lpufxt5dybcx6g6optq7bna

Towards a Data Warehouse Fed with Web Services [chapter]

John Samuel
2014 Lecture Notes in Computer Science  
integration.  ...  The goal of our work is to investigate and devise an approach to address the trade-off between scalability and adaptability in large scale integration with numerous ever-evolving web services.  ...  We chose IRIS (Integrated Rule Inference System) [15] as the datalog engine to perform query evaluation.  ... 
doi:10.1007/978-3-319-07443-6_61 fatcat:2a3w2ojphrdulgtr74amlsjpgu

Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search and Rescue

Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, Don Needham
2019 2019 IEEE International Conference on Services Computing (SCC)  
We propose an approach to support situationaware access control in a federated Data-as-a-Service architecture.  ...  We develop an ontology and rules to represent access control policies and a distributed reasoning framework to enforce these policies. We implement our proposed solution in a proof-of-concept system.  ...  rules and can be easily integrated with existing systems.  ... 
doi:10.1109/scc.2019.00046 dblp:conf/IEEEscc/OniCCJN19 fatcat:ltcsin4m3vfs3emivm4duy42x4

The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach [chapter]

Mourad Bouneffa, Adeel Ahmad
2014 Lecture Notes in Business Information Processing  
The change operations are then formalized by graph rewriting (or transformation) rules. These rules implement both the change and the change impact propagation.  ...  This ontology is intended to be able to automatically generate some change management rules. We use graph rewriting system (AGG) as a mean to formally specify and validate the result of our approach.  ...  The main concept of our approach is validated using a set of tools integrated as ECLIPSE plug-ins.  ... 
doi:10.1007/978-3-319-09492-2_17 fatcat:6w5nv3w7mvfxxkuljtw3njvkaq

A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting

Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna P Joshi, Don Needham
2020 2020 IEEE International Conference on Services Computing (SCC)  
We present a novel framework to enable situation-aware access control in a federated Data-asa-Service architecture by using semantic web technologies.  ...  Examples include contact tracing for a contagious disease such as COVID-19, maritime search and rescue operations, or creating a collaborative bid for a contract.  ...  case; 2) a distributed reasoning framework based on query rewriting that enforces these rules and can be easily integrated with existing federated Data-as-a-Service architecture; 3) a peerto-peer architecture  ... 
doi:10.1109/scc49832.2020.00008 fatcat:5mhxbz67xjgltnnfdkf6vnvfz4

Constructing component-based extension interfaces in legacy systems code

Gilles Muller, Julia L. Lawall, Jean-Marc Menaud, Mario Südholt
2004 Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC - EW11  
To resolve the second problem, we propose to augment interface specifications with rewrite rules that integrate support for extensions in the legacy code.  ...  In both cases a small number of rules are sufficient to describe modifications that apply across the implementation of a large legacy system.  ...  Implementations of system services, such as drivers and file systems, are borrowed from Linux and BSD.  ... 
doi:10.1145/1133572.1133605 dblp:conf/sigopsE/MullerLMS04 fatcat:bacly6je2vbpdi3sysz6qspum4

Data flow testing of service-oriented workflow applications

Lijun Mei, W.K. Chan, T.H. Tse
2008 Proceedings of the 13th international conference on Software engineering - ICSE '08  
We use the mathematical definitions of XPath constructs as rewriting rules, and propose a data structure called XPath Rewriting Graph (XRG), which not only models how an XPath is conceptually rewritten  ...  We treat the mathematical variables in the applied rewriting rules as if they were program variables, and use them to analyze how information may be rewritten in an XPath conceptually.  ...  We treat the definitions as "left-to-right" rewriting rules (similarly to the application of axioms as rewriting rules in algebraic specifications [6] ).  ... 
doi:10.1145/1368088.1368139 dblp:conf/icse/MeiCT08 fatcat:kgj5yqgjpnffbanl5gs6g25s6y
« Previous Showing results 1 — 15 out of 44,249 results