Probabilistic Relational Models for Operational Risk: A New Application Area and an Implementation Using Domain Ontologies
|
|
- Justin Holmes
- 8 years ago
- Views:
Transcription
1 Probabilistic Relational Models for Operational Risk: A New Application Area and an Implementation Using Domain Ontologies Marcus Spies Abstract The application of probabilistic relational models (PRM) to the statistical analysis of operational risk is presented. We explain the basic components of PRM, domain theories and dependency models. We discuss two real application scenarios from the IT services domain. Finally, we provide details on an implementation of the PRM approach using semantic web technologies. 1 Introduction In statistical models for operational risk, we often need to combine information from multiple entities. An example would be to build a model combining: Observations related to failures of technical or other service components. Observations related to customer contract related data, like customer claims in the scope of a service contract. Both classes of observations can be described by suitable theoretical distributions whose parameters can be estimated given actual empirical data. Typically, failure probabilities can be assessed using distributions from reliability theory, while customer claims will follow some loss sizes distribution that is typically taken from one of the fat tail distribution families like the Weibull distribution. In operational risk analysis, combination of these distributions is performed using convolution in order to estimate losses as they accumulate over time and compute meaningful scores like value at risk (VaR), see Giudici (2010). M. Spies Chair of Knowledge Management, Department of Computer Science, LMU University of Munich, Germany marcus.spies@ieee.org This work has been supported by the European Commission under the umbrella of the MUSING project, contract number , A. Di Ciaccio et al. (eds.), Advanced Statistical Methods for the Analysis of Large Data-Sets, Studies in Theoretical and Applied Statistics, DOI / , Springer-Verlag Berlin Heidelberg
2 386 M. Spies In the present service provider scenario, however, the combination of the information from both data sets gets more complicated if we want take into account the service providers who are operating the technical components and also appear as contracting party in customer service contracts. This implies that only component failures that fall in the service domain of a given service contract can be the possible causes of certain customer claims. This dependency can be formulated conveniently using database schemes as usual in relational database modelling (see Sect. 2). As a consequence, for an integrated statistical model of multivariate observations in a multi-entity setting, we must combine the sampling spaces for both observation classes by considering a suitable constraint structure on the product space. A formal language is required in which we can declare the constraint on possible dependencies between observations and perform computations related to parameter estimation in accordance with the factual entity dependencies underlying the real data at hand. This requirement for a relational modelling enabled formulation of observation based variable dependency has been noted in several application fields, notably genome analysis, web link analysis, and natural language based information extraction. As a consequence, the new field of probabilistic relational modelling (PRM) and learning is being established by a network of cooperating groups, see Getoor and Taskar (2007). PRM are closely related to Markov random fields, but the approach to defining variables and estimating parameters is different. PRMs can be introduced as extensions of Bayesian networks, which are nothing but single-entity PRMs. Therefore, the PRM approach nicely specializes to well known methods for statistical analysis of graphical models, see Cowell et al. (2007). Several approaches related to PRM with essentially the same basic assumptions have been published, they build on: Using an entity relationship model (ERM) for encoding the relational dependencies in Getoor et al. (2007). Using a suitable subset of first order logic (FOL) and model-theoretic semantics to describe entities, attributes and dependencies in Kersting and De Raedt (2007). Combining ERM and FOL assertions for capturing constraints in the Directed Acyclic Probabilistic Entity Relationship approach (DAPER) (Heckerman 2007). The presentation in the paper is motivated by applications and presents examples from the context of the EU integrated project Multi-Industry Semantics based Next Generation Business Intelligence (MUSING, EU contract number ). In Sect. 2, we present the basic approach to relational modelling of an application domain, in Sect. 3 we explain dependency models in PRMs and their transformation to Bayesian networks, and outline two case studies. In Sect. 4 we discuss an implementation of the model definition and data collection steps using domain ontologies.
3 Probabilistic Relational Models for Operational Risk Relational Domain Models The first step towards a probabilistic relational model is to define an explicit formal data theory of the given application domain in a declarative way. This theory contains non-logical (factual) axioms about classes, their generic relationships and attributes. In a statistical setting, the attributes correspond to random variables. The theory has models in terms of real-world scenarios allowing for experiments. These experiments consist of drawing samples of objects instantiating the classes. These objects preserve the relationships as stated in theory. What we observe is the values of the attributes corresponding to the class attributes in the theory. More formally, using concepts of the unified modelling language UML (Object Management Group 2010a,b), let X DfX 1 ;:::;X n g denote a set of classes. Each class X i is further described by attributes A.X i /. These attributes are assumed to take values in discrete domains, i.e. they are considered as nominal scaled variables. In practice, it is often assumed that the attributes are valued in one element of the set of atomic datatypes in XML Schema and are restricted to a suitably enumerated finite subset in case of an infinite value set. The classes in X are further allowed to be related by associations contained in a set R. A direct association is a two-place relation i;j W X i! X j on classes.x i ;X j /. If a direct association is a mapping, it is also called a reference. Thus, in case of a reference, j.x i /j D 1 8x i 2 X i. References can be seen as generalizations of has-a relations in artificial intelligence. An m W n association is modelled by an explicit association class that contains references to associated members in each participating class. Association classes can combine more than two classes. The definition of a suitable set of classes, their attributes and associations is a theory of the application domain in question. Such a theory can be formulated according to different modelling approaches in different specific formal languages. One common choice is UML class diagrams (Object Management Group 2010a,b). Another relevant modelling language is entity relationship modelling (ERM) that allows to derive a relational database schema from the theory. Basically, an ER model interprets classes by schemas of relational tables, references by foreign key relationships, and association classes by explicit join tables containing foreign keys to the tables participating in the association. ERM is based on relational database normalization and schema theories (Beeri et al. 1977, 1983). A particular requirement against an ERM is that references in a domain theory form directed acyclic graph (DAG). Finally, a class based domain data theory may be formulated using description logic by defining a domain ontology, most commonly based on the web ontology language OWL (Motik et al. 2006). In ontology engineering, the attributes of classes are modelled by datatype properties, associations by object properties, which are declared functional for references. Possible transformations and incompatibilities between domain theories from these different modelling languages have been studied extensively and formalized
4 388 M. Spies in the Object Management Group s Ontology Definition Metamodel specification (Object Management Group 2009). 3 Probabilities in Relational Domain Models The second step in setting up a PRM is specifying a probability model covering attributes of classes. The most obvious way is to consider the class attributes as (discrete) random variables. This leads to a family of statistical models studied by Heckerman (2007) andgetoor et al. (2007), and also, in a stronger predicatelogic driven approach, by Laskey (2006). As usual in graphical statistical models, the probability model is stated in terms of statistical dependency or independence assertions (LauritzenandSpiegelhalter1988; Cowell et al. 2007). An attribute dependency assertion is of the form Pr.A j.x i /jpa.a j.x i // with A j.x i / 2 A.X i /,wherepa.a j.x i // denotes a set of parent attributes. Thus, dependency assertions are stated for subsets of attributes of one or several classes, possibly with constraints in first-order logic added, see Heckerman (2007). A set of non-circular dependency assertions for j 2 J is also called a dependency model, denoted by D J. If a dependency model contains only attributes and parents from one class, the model translates directly into a conventional Bayesian network. The interpretation I (in the usual sense of first-order-logic) of a set of classes and associations from a relational domain model is described as I.X / [ I.R/. A generic element of I.X i / is written x i, with attribute value variable x i.a j / for the attribute subscripted j in A.X i /. It is of key importance to observe that different interpretations of a domain theory usually involve different references. Therefore, if a dependency model contains attributes from several classes, different interpretations usually lead to different entities being related. As a consequence, the sample space for a dependency model restricted set of class attributes depends on the interpretation of the domain theory. This is the key statistical issue when moving from single-entity Bayesian networks (BN) to PRMs. Formally, if Pa.A j.x i // is the matrix fy 1.a y1 /;:::;y m.a ym /g, thesample space is the set of possible observations fx i.a j /; y 1.a y1 /;:::;y m.a ym /g 8x i 2 I.X i /; y 1 2 I.Y 1 /;:::;y m 2 I.Y m / s.t..x i ;y 1 ;:::y m / 2 I.R/ it contains all observable cases of class instances in the sample and their corresponding attribute value combinations constrained by the specific references relating x i to y j in the given interpretation. One basic result from Heckerman (2007), Getoor et al. (2007) isthatanyd transforms to exactly one BN for each partial interpretation that fixes class instances and associations only, comprising references. Such a partial interpretation is referred to as skeleton. The random variation is then confined to the attribute values. The practical use of this result is in multi-entity repeated measures analysis. Asa consequence, the usual computations known from Bayesian network algorithms can be applied (Lauritzen and Spiegelhalter 1988; Cowell et al. 2007).
5 Probabilistic Relational Models for Operational Risk 389 However, in practical terms, a scenario with specific and fixed instances of all classes, references and other associations is often not useful. Therefore, in terms of statistical learning, we generalize over possible skeletons by allowing only as many parameters as the generic dependency assertions require and tie parameters from training on different skeletons accordingly. In general, the log-likelihood function for a PRM can be expressed within each partial interpretation or skeleton as sum across all classes, then across all attributes appearing on the LHS (left hand side) of a dependency assertion, of the conditional log-probabilities of the elements in the skeleton. More formally, given a dependency model D J, then, for one skeleton, we have (see Getoor et al. (2007), p. 162, adapted to our notation, and, in particular, letting S.x i.a j // D fy 1.a y1 /;:::;y m.a ym /g if.x i ;y 1 ;:::;y m / 2 I.R/, and else D;), and A j the range of the attribute subscripted j in A j.x i /,andn the count of classes in the domain theory) L. DJ ji ; S / D log Pr.I js ; DJ / D X nx X X log Pr.x i.a j /js.x i.a j //; DJ / j 2J id1 a j 2A j x i 2I.X i / 3.1 Case Studies Customer Claims Risk in IT Services A promising application of the approach is based on the MUSING cooperation with the Italian bank MPS (Monte dei Paschi di Siena). The purpose is to evaluate the risk (in terms of probability and cost) of customer claims following failures in financial IT services providers infrastructures. While the exact relationship between IT failures and customer claims is only known in special cases, investments in network infrastructure and software can be prioritized if probable causes of high cost or high frequency claims can be inferred. Building on the example of the introduction, a simplified domain theory focussing on corporate customers and network servers can be set up as follows: 1. The relevant classes in this application domain are customers, (IT) service providers, services, server operators, servers, service contracts. 2. Each service contract is between one service provider and one customer for one service. 3. Each claim refers to one service contract. 4. Each service has one provider, failures are summarized in an attribute called downtime average. 5. Each service is deployed on some service components, an m W n relationship, since components can provide different services. 6. A service component is managed by a service operator. The operator defines maintenance policies etc.
6 390 M. Spies Fig. 1 A database scheme diagram for operational risk analysis in IT services customer relationships, produced with Microsoft (R) Visual Studio 2010 This domain theory (with some extras) is depicted as database scheme diagram in Fig. 1. Note that the overall structure of the diagram is an acyclic directed graph. In this situation, a PRM based on a fixed partial interpretation for a multi-entity repeated measures analysis is realistic, because entities are linked by contracts for some period of time during which failures, claims, maintenance problems etc can be recorded and analyzed. To illustrate this, Fig. 2 shows an overlay of a partial interpretation with a suitable ground Bayesian network, simplified (and with a little bit of humour added) from MUSING. In a database setting, the computation of the log-likelihood can be conveniently implemented in SQL (for a simplified example, see Getoor et al. (2007)). Note that the Bayesian network structure would change with variations in the objects associations, even if the generic dependencies were the same, e.g. those from services downtimes to claims. Corporate Customers Risk in Services Provisioning A second application case study is the MUSING pilot for assessing operational risks at a virtual network operator (VNO) with a large customer base in Israel. The key practical advantage of the PRM based solution is the ability to integrate corporate customer data with IT operational services protocols into predictions and assessments of likely operational
7 Probabilistic Relational Models for Operational Risk 391 MI1 VNO1 MI2 VNO2 FS1 sun1 FS2 ibm2 FS3 dell3 LossT topscout LossF flopscout ClaimA DT2 flight Booking c1 c3 DT1 webhosting Claim4 c2 ClaimB ClaimC Fig. 2 Overlay of a partial interpretation (dashed items) and the ground Bayesian network (elliptic nodes and directed arcs) for the domain model from Fig. 1. In the partial interpretation, c1 to c4 denote contract instances linking a service (like webhosting), a provider (like flopscout) and a customer (like Tom), etc. A ground Bayesian network is provided for some attributes of different classes (MI for maintenance policy by a server operator, DT for downtime of a service, FS for failure severity of a server). The Bayesian network exhibits instance specific probabilistic attribute value dependencies c4 losses and their economic impact on the VNO. This ability has been used to deploy a decision support dashboard application prototype at the VNO. The application integrates indicators from the public part of the corporate balance sheets with operational data for the services the customer requests and computes a qualitative overall riskiness score. We now turn to the implementation details for both case studies. 4 An Implementation Using a Domain Ontology Development and Runtime Environment In this section, we introduce and discuss the EU MUSING implementation of the PRM domain modelling and data integration based on domain ontologies using the web ontology language OWL, see Motik et al. (2006). For the MUSING project, the specific need arose to have a PRM framework available that could easily be combined with existing domain ontologies as they were built for several risk management domains throughout the project using the web ontology language, see Motik et al. (2006). The key motivation for an ontology based representation of data for analytic processing is the combination
8 392 M. Spies of statistical analyses with text processing (annotation, text classification etc), see Therefore, a solution was envisioned that would make it very simple to add attribute (datatype property) dependencies to an existing OWL ontology. Moreover, the MUSING ontologies are constantly populated (enriched by new instances) in real application environments. Therefore, simple mechanisms to collect the sufficient statistics of the parametric PRM learning were needed, as well. This could be accomplished using the SPARQL RDF-query language that was extended by SELECT COUNT and UPDATE constructs during the MUSING project lifetime, see Prudhommeaux and Seaborne (2008). This allows to collect counts and store them into appropriate places in the domain ontology itself. The persistent storage of counts is combined with a versioning mechanism in order to handle learning data from various skeletons and from various datasets independently. This was implemented by means of a service oriented architecture offering domain or application specific repositories in addition to the definitory parts (classes, properties, axioms) of the ontologies. In addition, an export utility of the resulting ground Bayesian network an XML representation was implemented. For this, the XML for Bayesian networks format (Microsoft Corp. 2009) was used. Using this utility, applications of MUSING can pass parameter estimates to several commercial or freely available Bayesian network tools for further processing. An import utility for parameter priors could be added easily. In terms of combining PRMs and ontologies, the approach taken was to define a set of classes suitable for enabling a straightforward declarative definition of a dependency model D in any domain ontology. This amounts to defining suitable ontology classes and properties such that a dependency assertion can be stated by defining appropriate instances of additional and restrictions on internal classes of a given domain ontology. These instances shall then be used for collecting counts as sufficient statistics for parameter estimation within a given skeleton. Two generic classes were needed to back up an implementation of this approach. The first, ObservableAttribute, serves mainly as a source of inheritance relationships for other ontology classes appearing as (object) properties in a dependency model. This means that, in our approach, dependency assertions are expressed in terms of object properties of domain classes. In order to ensure finiteness of the implied discrete random variables, the classes used for any dependency assertion were defined by enumerations. The second class for setting up the construction, CartesianProduct, is instantiated for each dependency assertion. It carries object properties referencing the attributes (object properties) participating in the conditional probability distribution being defined. Coming back to our running example of the virtual network operator and the assessment of operational risk, a given scenario of services, customers and providers can readily be modelled as a fixed skeleton. For our prototypes, we only used simple dependency models with one element in the LHS and in the RHS of any dependency assertion. At this point, it should be remarked that, due to the triangulation theorem for Bayesian networks (see Lauritzen and Spiegelhalter (1988)), the maximum
9 Probabilistic Relational Models for Operational Risk 393 ObservableAttribute Severity severity sety setx CartesianProduct setx : ObservableAttribute sety : ObservableAttribute count : int relativefrequency : double BusinessLine businessline ASP provider Customer businessline : BusinessLine owner Service owner : Customer provider : ASP causedby Event causedby : Service severity : Severity Fig. 3 A domain ontology with two additional entities for probabilistic dependencies. The abstract class ObservableAttribute is used to enable enumerative classes (here severity and business line) for use as discrete random variables. The class CartesianProduct is used to express bivariate dependency assertions. Instances of this class correspond to dependency assertions involving two variables. (Generated with TopBraidComposer of TopQuadrant Inc.) number of classes involved in a dependency assertion can be limited to three. The approach is illustrated in the subsequent figures, Figs. 3 and 4. 5 Conclusion This contribution shows a novel application area for probabilistic relational models in risk analysis as implemented in the EU project Multi-Industry Semantics based Next Generation Business Intelligence (MUSING) for operational and credit risks following the Basel II framework (Basel Committee on Banking Supervision 2004). In particular, as MUSING is strongly relying on domain ontologies, we studied an approach to implementing the dependency model definition and data processing
10 394 M. Spies ISP ISP_1 Event Service BusinessLine provider CargoAirTransport Event_9 causedby Service_1 Customer severity Severity owner Customer_3 businessline Middle Fig. 4 An example of ontology population (diamond shapes represent instances) affecting two entities involved in a relationship with a dependency assertion (system failure events affecting business lines). The counts used for parameter estimation are stored in the suitable instance of the ObservableAttribute class, the count updating is implemented in SPARQL code that is executed upon committing the population instances to the ontology repository steps needed for a PRM analysis using ontologies conforming to the web ontology language (OWL) standard. It could be shown that a rather straightforward extension of any domain ontology suffices to enable declarative dependency model definitions and to collect sufficient statistics that are readily exported to standard Bayesian networks tools for further processing. Acknowledgements The author gratefully acknowledges technical exchanges about practical applications related to IT Operational Risk Management and Credit Risk Management within the MUSING consortium. Special thanks go to Prof. P. Giudici, head of Libero Lenti Laboratory at Pavia University, and Prof. Ron Kenett, Torino University and head of the KPA consultancy (Tel Aviv). The author also acknowledges support by MetaWare S.p.A. of Pisa as overall project coordinator. References Basel Committee on Banking Supervision: International convergence of capital measurement and capital standards: A revised framework comprehensive version (2004). URL org/publ/bcbs107.htm Beeri, C., Fagin, R., Howard, J.: A complete axiomatization for functional and multivalued dependencies in database relations. In: Int. Conf. Mgmt of Data, pp ACM (1977) Beeri, C., Fagin, R., Maier, D., Yannakakis, M.: On the desirability of acyclic database schemes. J. ACM 30(3), (1983)
11 Probabilistic Relational Models for Operational Risk 395 Cowell, R.G., Dawid, A., Lauritzen, S.L., Spiegelhalter, D.J.: Probabilistic networks and expert systems. Exact computational methods for Bayesian networks. 2nd printing. Information Science and Statistics. New York, NY: Springer. xii, 321 p. (2007) Getoor, L., Friedman, N., Koller, D., Pfeffer, A., Taskar, B.: Probabilistic relational models. In: L. Getoor, B. Taskar (eds.) Introduction to Statistical Relational Learning, pp (2007) Getoor, L., Taskar, B. (eds.): Introduction to Statistical Relational Learning. Massachusetts Institute of Technology, MIT Press, Cambridge, MA (2007) Giudici, P.: Scoring models for operational risk. In: R. Kenett, Y. Raanan (eds.) Operational risk management a practical approach to intelligent data analysis. Wiley (2010) Heckerman, D., Meck, C., Koller, D.: Probabilistic entity-relationship models, prms, and plate models. In: Getoor and Taskar (2007), pp (2007) Kersting, K., De Raedt, L.: Bayesian logic programming: Theory and tool. In: Getoor and Taskar (2007), pp Laskey, K.: MEBN: A logic for open-world probabilistic reasoning. Tech. Rep. GMU C4I Center Technical Report C4I-06-01, George Mason University (2006) Lauritzen, S., Spiegelhalter, D.: Local computations with probabilities on graphical structures and their application to expert systems. J. R. Statistical Society B 50(2), (1988) Microsoft Corp.: XML for bayesian networks (2009). URL bnformat/xbn dtd.html Motik, B., Patel-Schneider, P., Horrocks, I.: OWL 1.1 web ontology language structural specification and functional-style syntax (2006) Object Management Group: Ontology definition metamodel version 1.0 (2009). URL omg.org/spec/odm/1.0/pdf Object Management Group: Unified modeling language: Infrastructure (2010). URL omg.org/spec/uml/2.3/infrastructure/pdf/ Object Management Group: Unified modeling language: Superstructure specification (2010). URL Prudhommeaux, E., Seaborne, A.: SPARQL query language for RDF (2008). URL org/tr/rdf-sparql-query/
Data Validation with OWL Integrity Constraints
Data Validation with OWL Integrity Constraints (Extended Abstract) Evren Sirin Clark & Parsia, LLC, Washington, DC, USA evren@clarkparsia.com Abstract. Data validation is an important part of data integration
More informationJoin Bayes Nets: A New Type of Bayes net for Relational Data
Join Bayes Nets: A New Type of Bayes net for Relational Data Bayes nets, statistical-relational learning, knowledge discovery in databases Abstract Many real-world data are maintained in relational format,
More informationChapter 14 Managing Operational Risks with Bayesian Networks
Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian
More informationChapter 28. Bayesian Networks
Chapter 28. Bayesian Networks The Quest for Artificial Intelligence, Nilsson, N. J., 2009. Lecture Notes on Artificial Intelligence, Spring 2012 Summarized by Kim, Byoung-Hee and Lim, Byoung-Kwon Biointelligence
More informationModeling BPMN Diagrams within XTT2 Framework. A Critical Analysis**
AUTOMATYKA 2011 Tom 15 Zeszyt 2 Antoni Ligêza*, Tomasz Maœlanka*, Krzysztof Kluza*, Grzegorz Jacek Nalepa* Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis** 1. Introduction Design, analysis
More informationA Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems
A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems Vincenzo Grassi Università di Roma Tor Vergata, Italy Raffaela Mirandola {vgrassi, mirandola}@info.uniroma2.it Abstract.
More informationModel-Based Cluster Analysis for Web Users Sessions
Model-Based Cluster Analysis for Web Users Sessions George Pallis, Lefteris Angelis, and Athena Vakali Department of Informatics, Aristotle University of Thessaloniki, 54124, Thessaloniki, Greece gpallis@ccf.auth.gr
More informationApplication of ontologies for the integration of network monitoring platforms
Application of ontologies for the integration of network monitoring platforms Jorge E. López de Vergara, Javier Aracil, Jesús Martínez, Alfredo Salvador, José Alberto Hernández Networking Research Group,
More informationThe Ontological Approach for SIEM Data Repository
The Ontological Approach for SIEM Data Repository Igor Kotenko, Olga Polubelova, and Igor Saenko Laboratory of Computer Science Problems, Saint-Petersburg Institute for Information and Automation of Russian
More informationCompression algorithm for Bayesian network modeling of binary systems
Compression algorithm for Bayesian network modeling of binary systems I. Tien & A. Der Kiureghian University of California, Berkeley ABSTRACT: A Bayesian network (BN) is a useful tool for analyzing the
More informationBayesian Networks of Customer Satisfaction Survey Data
Bayesian Networks of Customer Satisfaction Survey Data Silvia Salini * University of Milan, Italy Ron S. Kenett KPA Ltd., Raanana, Israel and University of Torino, Torino, Italy Abstract: A Bayesian Network
More informationParametric Attack Graph Construction and Analysis
Parametric Attack Graph Construction and Analysis Leanid Krautsevich Department of Computer Science, University of Pisa Largo Bruno Pontecorvo 3, Pisa 56127, Italy Istituto di Informatica e Telematica,
More informationUpdate on the OMG PRR Standard
Update on the OMG PRR Standard Paul Vincent TIBCO Software Inc. MarkupLanguages 2008 Conference 2 Why am I here? (Where do Standards Fit in Commercial IT Tools?) Best Practices Technical Partner Service
More informationAN ONTOLOGICAL APPROACH TO WEB APPLICATION DESIGN USING W2000 METHODOLOGY
STUDIA UNIV. BABEŞ BOLYAI, INFORMATICA, Volume L, Number 2, 2005 AN ONTOLOGICAL APPROACH TO WEB APPLICATION DESIGN USING W2000 METHODOLOGY ANNA LISA GUIDO, ROBERTO PAIANO, AND ANDREA PANDURINO Abstract.
More informationRevel8or: Model Driven Capacity Planning Tool Suite
Revel8or: Model Driven Capacity Planning Tool Suite Liming Zhu 1,2, Yan Liu 1,2, Ngoc Bao Bui 1,2,Ian Gorton 3 1 Empirical Software Engineering Program, National ICT Australia Ltd. 2 School of Computer
More informationOptimised Realistic Test Input Generation
Optimised Realistic Test Input Generation Mustafa Bozkurt and Mark Harman {m.bozkurt,m.harman}@cs.ucl.ac.uk CREST Centre, Department of Computer Science, University College London. Malet Place, London
More informationDETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS
Hacettepe Journal of Mathematics and Statistics Volume 33 (2004), 69 76 DETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS Hülya Olmuş and S. Oral Erbaş Received 22 : 07 : 2003 : Accepted 04
More informationCell Phone based Activity Detection using Markov Logic Network
Cell Phone based Activity Detection using Markov Logic Network Somdeb Sarkhel sxs104721@utdallas.edu 1 Introduction Mobile devices are becoming increasingly sophisticated and the latest generation of smart
More informationA methodology for graphical modeling of business rules
A methodology for graphical modeling of business rules Article Accepted version D. Di Bona, G. Lo Re, G. Aiello, A. Tamburo, M. Alessi In Proceedings of the Fifth UKSim European Symposium on Computer Modeling
More informationA generic approach for data integration using RDF, OWL and XML
A generic approach for data integration using RDF, OWL and XML Miguel A. Macias-Garcia, Victor J. Sosa-Sosa, and Ivan Lopez-Arevalo Laboratory of Information Technology (LTI) CINVESTAV-TAMAULIPAS Km 6
More informationProgrammabilty. Programmability in Microsoft Dynamics AX 2009. Microsoft Dynamics AX 2009. White Paper
Programmabilty Microsoft Dynamics AX 2009 Programmability in Microsoft Dynamics AX 2009 White Paper December 2008 Contents Introduction... 4 Scenarios... 4 The Presentation Layer... 4 Business Intelligence
More informationObject-Process Methodology as a basis for the Visual Semantic Web
Object-Process Methodology as a basis for the Visual Semantic Web Dov Dori Technion, Israel Institute of Technology, Haifa 32000, Israel dori@ie.technion.ac.il, and Massachusetts Institute of Technology,
More informationData Integration using Semantic Technology: A use case
Data Integration using Semantic Technology: A use case Jürgen Angele, ontoprise GmbH, Germany Michael Gesmann, Software AG, Germany Abstract For the integration of data that resides in autonomous data
More informationOptimization of ETL Work Flow in Data Warehouse
Optimization of ETL Work Flow in Data Warehouse Kommineni Sivaganesh M.Tech Student, CSE Department, Anil Neerukonda Institute of Technology & Science Visakhapatnam, India. Sivaganesh07@gmail.com P Srinivasu
More informationDESIGNING AND MINING WEB APPLICATIONS: A CONCEPTUAL MODELING APPROACH
DESIGNING AND MINING WEB APPLICATIONS: A CONCEPTUAL MODELING APPROACH Rosa Meo Dipartimento di Informatica, Università di Torino Corso Svizzera, 185-10149 - Torino - Italy E-mail: meo@di.unito.it Tel.:
More informationA Bayesian Approach for on-line max auditing of Dynamic Statistical Databases
A Bayesian Approach for on-line max auditing of Dynamic Statistical Databases Gerardo Canfora Bice Cavallo University of Sannio, Benevento, Italy, {gerardo.canfora,bice.cavallo}@unisannio.it ABSTRACT In
More informationCHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
More informationONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS
ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS Hasni Neji and Ridha Bouallegue Innov COM Lab, Higher School of Communications of Tunis, Sup Com University of Carthage, Tunis, Tunisia. Email: hasni.neji63@laposte.net;
More informationLeveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC S. Berhe 1, S. Demurjian 1, S. Gokhale 1, J. Pavlich-Mariscal 2,3,
More informationSimplifying e Business Collaboration by providing a Semantic Mapping Platform
Simplifying e Business Collaboration by providing a Semantic Mapping Platform Abels, Sven 1 ; Sheikhhasan Hamzeh 1 ; Cranner, Paul 2 1 TIE Nederland BV, 1119 PS Amsterdam, Netherlands 2 University of Sunderland,
More informationChapter 4 Software Lifecycle and Performance Analysis
Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and
More information1 File Processing Systems
COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.
More informationSemantic Modeling of Mortgage Backed Securities: Case Study. Mike Bennett, Enterprise Data Management Council Yefim Zhuk, Sallie Mae
Semantic Modeling of Mortgage Backed Securities: Case Study Mike Bennett, Enterprise Data Management Council Yefim Zhuk, Sallie Mae 1 Overview EDM Council Semantics Repository Regulatory challenges Project
More informationSEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.
More informationA knowledge-based model for instructional design
A knowledge-based model for instructional design Frosina Koceva Università degli Studi di Genova, Italy frosina.koceva@edu.unige.it Abstract. This thesis will discuss a knowledge-based model for the design
More informationScope. Cognescent SBI Semantic Business Intelligence
Cognescent SBI Semantic Business Intelligence Scope...1 Conceptual Diagram...2 Datasources...3 Core Concepts...3 Resources...3 Occurrence (SPO)...4 Links...4 Statements...4 Rules...4 Types...4 Mappings...5
More informationData Modeling Basics
Information Technology Standard Commonwealth of Pennsylvania Governor's Office of Administration/Office for Information Technology STD Number: STD-INF003B STD Title: Data Modeling Basics Issued by: Deputy
More informationWeb-Based Genomic Information Integration with Gene Ontology
Web-Based Genomic Information Integration with Gene Ontology Kai Xu 1 IMAGEN group, National ICT Australia, Sydney, Australia, kai.xu@nicta.com.au Abstract. Despite the dramatic growth of online genomic
More informationRules and Business Rules
OCEB White Paper on Business Rules, Decisions, and PRR Version 1.1, December 2008 Paul Vincent, co-chair OMG PRR FTF TIBCO Software Abstract The Object Management Group s work on standards for business
More informationWhy Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization. Learning Goals. GENOME 560, Spring 2012
Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization GENOME 560, Spring 2012 Data are interesting because they help us understand the world Genomics: Massive Amounts
More informationThe Optimality of Naive Bayes
The Optimality of Naive Bayes Harry Zhang Faculty of Computer Science University of New Brunswick Fredericton, New Brunswick, Canada email: hzhang@unbca E3B 5A3 Abstract Naive Bayes is one of the most
More informationTechnology WHITE PAPER
Technology WHITE PAPER What We Do Neota Logic builds software with which the knowledge of experts can be delivered in an operationally useful form as applications embedded in business systems or consulted
More informationThe Bayesian Network Methodology for Industrial Control System with Digital Technology
, pp.157-161 http://dx.doi.org/10.14257/astl.2013.42.37 The Bayesian Network Methodology for Industrial Control System with Digital Technology Jinsoo Shin 1, Hanseong Son 2, Soongohn Kim 2, and Gyunyoung
More informationDesigning a Semantic Repository
Designing a Semantic Repository Integrating architectures for reuse and integration Overview Cory Casanave Cory-c (at) modeldriven.org ModelDriven.org May 2007 The Semantic Metadata infrastructure will
More informationBayesian networks - Time-series models - Apache Spark & Scala
Bayesian networks - Time-series models - Apache Spark & Scala Dr John Sandiford, CTO Bayes Server Data Science London Meetup - November 2014 1 Contents Introduction Bayesian networks Latent variables Anomaly
More informationBringing Business Objects into ETL Technology
Bringing Business Objects into ETL Technology Jing Shan Ryan Wisnesky Phay Lau Eugene Kawamoto Huong Morris Sriram Srinivasn Hui Liao 1. Northeastern University, jshan@ccs.neu.edu 2. Stanford University,
More informationFormalization of the CRM: Initial Thoughts
Formalization of the CRM: Initial Thoughts Carlo Meghini Istituto di Scienza e Tecnologie della Informazione Consiglio Nazionale delle Ricerche Pisa CRM SIG Meeting Iraklio, October 1st, 2014 Outline Overture:
More informationThe BPM to UML activity diagram transformation using XSLT
The BPM to UML activity diagram transformation using XSLT Ondřej Macek 1 and Karel Richta 1,2 1 Department of Computer Science and Engineering, Faculty of Electrical Engineering, Czech Technical University,
More informationONTODESIGN; A DOMAIN ONTOLOGY FOR BUILDING AND EXPLOITING PROJECT MEMORIES IN PRODUCT DESIGN PROJECTS
ONTODESIGN; A DOMAIN ONTOLOGY FOR BUILDING AND EXPLOITING PROJECT MEMORIES IN PRODUCT DESIGN PROJECTS DAVY MONTICOLO Zurfluh-Feller Company 25150 Belfort France VINCENT HILAIRE SeT Laboratory, University
More informationAlejandro Vaisman Esteban Zimanyi. Data. Warehouse. Systems. Design and Implementation. ^ Springer
Alejandro Vaisman Esteban Zimanyi Data Warehouse Systems Design and Implementation ^ Springer Contents Part I Fundamental Concepts 1 Introduction 3 1.1 A Historical Overview of Data Warehousing 4 1.2 Spatial
More informationLightweight Data Integration using the WebComposition Data Grid Service
Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed
More informationReputation Network Analysis for Email Filtering
Reputation Network Analysis for Email Filtering Jennifer Golbeck, James Hendler University of Maryland, College Park MINDSWAP 8400 Baltimore Avenue College Park, MD 20742 {golbeck, hendler}@cs.umd.edu
More informationScalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many
More informationOntology and automatic code generation on modeling and simulation
Ontology and automatic code generation on modeling and simulation Youcef Gheraibia Computing Department University Md Messadia Souk Ahras, 41000, Algeria youcef.gheraibia@gmail.com Abdelhabib Bourouis
More informationFUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
More informationSemantically Enhanced Web Personalization Approaches and Techniques
Semantically Enhanced Web Personalization Approaches and Techniques Dario Vuljani, Lidia Rovan, Mirta Baranovi Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, HR-10000 Zagreb,
More informationFiltering the Web to Feed Data Warehouses
Witold Abramowicz, Pawel Kalczynski and Krzysztof We^cel Filtering the Web to Feed Data Warehouses Springer Table of Contents CHAPTER 1 INTRODUCTION 1 1.1 Information Systems 1 1.2 Information Filtering
More informationCONTEMPORARY SEMANTIC WEB SERVICE FRAMEWORKS: AN OVERVIEW AND COMPARISONS
CONTEMPORARY SEMANTIC WEB SERVICE FRAMEWORKS: AN OVERVIEW AND COMPARISONS Keyvan Mohebbi 1, Suhaimi Ibrahim 2, Norbik Bashah Idris 3 1 Faculty of Computer Science and Information Systems, Universiti Teknologi
More informationSERENITY Pattern-based Software Development Life-Cycle
SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies
More informationThe Basics of Graphical Models
The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures
More informationCredal Networks for Operational Risk Measurement and Management
Credal Networks for Operational Risk Measurement and Management Alessandro Antonucci, Alberto Piatti, and Marco Zaffalon Istituto Dalle Molle di Studi sull Intelligenza Artificiale Via Cantonale, Galleria
More informationOpen Source egovernment Reference Architecture Osera.modeldriven.org. Copyright 2006 Data Access Technologies, Inc. Slide 1
Open Source egovernment Reference Architecture Osera.modeldriven.org Slide 1 Caveat OsEra and the Semantic Core is work in progress, not a ready to use capability Slide 2 OsEra What we will cover OsEra
More informationOntology-Based Discovery of Workflow Activity Patterns
Ontology-Based Discovery of Workflow Activity Patterns Diogo R. Ferreira 1, Susana Alves 1, Lucinéia H. Thom 2 1 IST Technical University of Lisbon, Portugal {diogo.ferreira,susana.alves}@ist.utl.pt 2
More informationUIMA and WebContent: Complementary Frameworks for Building Semantic Web Applications
UIMA and WebContent: Complementary Frameworks for Building Semantic Web Applications Gaël de Chalendar CEA LIST F-92265 Fontenay aux Roses Gael.de-Chalendar@cea.fr 1 Introduction The main data sources
More informationCreating an RDF Graph from a Relational Database Using SPARQL
Creating an RDF Graph from a Relational Database Using SPARQL Ayoub Oudani, Mohamed Bahaj*, Ilias Cherti Department of Mathematics and Informatics, University Hassan I, FSTS, Settat, Morocco. * Corresponding
More informationSPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
More informationRisk Analysis Approaches to Rank Outliers in Trade Data
Risk Analysis Approaches to Rank Outliers in Trade Data Vytis Kopustinskas and Spyros Arsenis Abstract The paper discusses ranking methods for outliers in trade data based on statistical information with
More informationTool Support for Model Checking of Web application designs *
Tool Support for Model Checking of Web application designs * Marco Brambilla 1, Jordi Cabot 2 and Nathalie Moreno 3 1 Dipartimento di Elettronica e Informazione, Politecnico di Milano Piazza L. Da Vinci,
More informationOntoDBench: Ontology-based Database Benchmark
OntoDBench: Ontology-based Database Benchmark Stéphane Jean, Ladjel Bellatreche, Géraud Fokou, Mickaël Baron, and Selma Khouri LIAS/ISAE-ENSMA and University of Poitiers BP 40109, 86961 Futuroscope Cedex,
More informationThe University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
More informationWinery A Modeling Tool for TOSCA-based Cloud Applications
Institute of Architecture of Application Systems Winery A Modeling Tool for TOSCA-based Cloud Applications Oliver Kopp 1,2, Tobias Binz 2, Uwe Breitenbücher 2, and Frank Leymann 2 1 IPVS, 2 IAAS, University
More information! " # The Logic of Descriptions. Logics for Data and Knowledge Representation. Terminology. Overview. Three Basic Features. Some History on DLs
,!0((,.+#$),%$(-&.& *,2(-$)%&2.'3&%!&, Logics for Data and Knowledge Representation Alessandro Agostini agostini@dit.unitn.it University of Trento Fausto Giunchiglia fausto@dit.unitn.it The Logic of Descriptions!$%&'()*$#)
More informationChristian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
More informationGenomic CDS: an example of a complex ontology for pharmacogenetics and clinical decision support
Genomic CDS: an example of a complex ontology for pharmacogenetics and clinical decision support Matthias Samwald 1 1 Medical University of Vienna, Vienna, Austria matthias.samwald@meduniwien.ac.at Abstract.
More informationModeling the User Interface of Web Applications with UML
Modeling the User Interface of Web Applications with UML Rolf Hennicker,Nora Koch,2 Institute of Computer Science Ludwig-Maximilians-University Munich Oettingenstr. 67 80538 München, Germany {kochn,hennicke}@informatik.uni-muenchen.de
More informationCHAPTER 6: TECHNOLOGY
Chapter 6: Technology CHAPTER 6: TECHNOLOGY Objectives Introduction The objectives are: Review the system architecture of Microsoft Dynamics AX 2012. Describe the options for making development changes
More informationDeliverable D.4.2 Executive Summary
Deliverable D.4.2 Executive Summary Knowledge Lenses and Process Support Tools Authors: Victoria Uren, Open University, v.s.uren@open.ac.uk Sam Chapman University of Sheffield, sam@dcs.shef.ac.uk Aba-Sah
More informationOracle Data Integrator: Administration and Development
Oracle Data Integrator: Administration and Development What you will learn: In this course you will get an overview of the Active Integration Platform Architecture, and a complete-walk through of the steps
More informationTowards an Automated Pattern Selection Procedure in Software Models
Towards an Automated Pattern Selection Procedure in Software Models Alexander van den Berghe, Jan Van Haaren, Stefan Van Baelen, Yolande Berbers, and Wouter Joosen {firstname.lastname}@cs.kuleuven.be IBBT-DistriNet,
More informationFederico Rajola. Customer Relationship. Management in the. Financial Industry. Organizational Processes and. Technology Innovation.
Federico Rajola Customer Relationship Management in the Financial Industry Organizational Processes and Technology Innovation Second edition ^ Springer Contents 1 Introduction 1 1.1 Identification and
More informationA Hybrid Approach for Ontology Integration
A Hybrid Approach for Ontology Integration Ahmed Alasoud Volker Haarslev Nematollaah Shiri Concordia University Concordia University Concordia University 1455 De Maisonneuve Blvd. West 1455 De Maisonneuve
More informationChapter 8 The Enhanced Entity- Relationship (EER) Model
Chapter 8 The Enhanced Entity- Relationship (EER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 8 Outline Subclasses, Superclasses, and Inheritance Specialization
More informationArtificial Intelligence
Artificial Intelligence ICS461 Fall 2010 1 Lecture #12B More Representations Outline Logics Rules Frames Nancy E. Reed nreed@hawaii.edu 2 Representation Agents deal with knowledge (data) Facts (believe
More informationHandling attrition and non-response in longitudinal data
Longitudinal and Life Course Studies 2009 Volume 1 Issue 1 Pp 63-72 Handling attrition and non-response in longitudinal data Harvey Goldstein University of Bristol Correspondence. Professor H. Goldstein
More informationTraining Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object
Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Anne Monceaux 1, Joanna Guss 1 1 EADS-CCR, Centreda 1, 4 Avenue Didier Daurat 31700 Blagnac France
More informationBayesian Statistics: Indian Buffet Process
Bayesian Statistics: Indian Buffet Process Ilker Yildirim Department of Brain and Cognitive Sciences University of Rochester Rochester, NY 14627 August 2012 Reference: Most of the material in this note
More informationSemantic Stored Procedures Programming Environment and performance analysis
Semantic Stored Procedures Programming Environment and performance analysis Marjan Efremov 1, Vladimir Zdraveski 2, Petar Ristoski 2, Dimitar Trajanov 2 1 Open Mind Solutions Skopje, bul. Kliment Ohridski
More information72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD
72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD Paulo Gottgtroy Auckland University of Technology Paulo.gottgtroy@aut.ac.nz Abstract This paper is
More informationA Variability Viewpoint for Enterprise Software Systems
2012 Joint Working Conference on Software Architecture & 6th European Conference on Software Architecture A Variability Viewpoint for Enterprise Software Systems Matthias Galster University of Groningen,
More informationAn Ontology Based Method to Solve Query Identifier Heterogeneity in Post- Genomic Clinical Trials
ehealth Beyond the Horizon Get IT There S.K. Andersen et al. (Eds.) IOS Press, 2008 2008 Organizing Committee of MIE 2008. All rights reserved. 3 An Ontology Based Method to Solve Query Identifier Heterogeneity
More informationReverse Engineering of Relational Databases to Ontologies: An Approach Based on an Analysis of HTML Forms
Reverse Engineering of Relational Databases to Ontologies: An Approach Based on an Analysis of HTML Forms Irina Astrova 1, Bela Stantic 2 1 Tallinn University of Technology, Ehitajate tee 5, 19086 Tallinn,
More informationRisk Management for IT Security: When Theory Meets Practice
Risk Management for IT Security: When Theory Meets Practice Anil Kumar Chorppath Technical University of Munich Munich, Germany Email: anil.chorppath@tum.de Tansu Alpcan The University of Melbourne Melbourne,
More informationBreaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
More informationAN AI PLANNING APPROACH FOR GENERATING BIG DATA WORKFLOWS
AN AI PLANNING APPROACH FOR GENERATING BIG DATA WORKFLOWS Wesley Deneke 1, Wing-Ning Li 2, and Craig Thompson 2 1 Computer Science and Industrial Technology Department, Southeastern Louisiana University,
More informationRDF y SPARQL: Dos componentes básicos para la Web de datos
RDF y SPARQL: Dos componentes básicos para la Web de datos Marcelo Arenas PUC Chile & University of Oxford M. Arenas RDF y SPARQL: Dos componentes básicos para la Web de datos Valladolid 2013 1 / 61 Semantic
More informationPersonalization of Web Search With Protected Privacy
Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information
More informationMonitoring the Behaviour of Credit Card Holders with Graphical Chain Models
Journal of Business Finance & Accounting, 30(9) & (10), Nov./Dec. 2003, 0306-686X Monitoring the Behaviour of Credit Card Holders with Graphical Chain Models ELENA STANGHELLINI* 1. INTRODUCTION Consumer
More informationDistributed Database for Environmental Data Integration
Distributed Database for Environmental Data Integration A. Amato', V. Di Lecce2, and V. Piuri 3 II Engineering Faculty of Politecnico di Bari - Italy 2 DIASS, Politecnico di Bari, Italy 3Dept Information
More informationForecast covariances in the linear multiregression dynamic model.
Forecast covariances in the linear multiregression dynamic model. Catriona M Queen, Ben J Wright and Casper J Albers The Open University, Milton Keynes, MK7 6AA, UK February 28, 2007 Abstract The linear
More informationKnowledge Fusion in Academic Networks
Knowledge Fusion in Academic Networks Horea Adrian Greblă Faculty of Mathematics and Computer Science, Babeş-Bolyai University of Cluj-Napoca Mihail Kogalniceanu, 1, Cluj-Napoca, 400084, Romania, horea@cs.ubbcluj.ro
More information