19,857 research outputs found

    Benchmarking Bottom-Up and Top-Down Strategies to Sparql-To-Sql Query Translation

    Get PDF
    Many researchers have proposed using conventional relational databases to store and query large Semantic Web datasets. The most complex component of this approach is SPARQL-to-SQL query translation. Existing algorithms perform this translation using either bottom-up or top-down strategy and result in semantically equivalent but syntactically different relational queries. Do relational query optimizers always produce identical query execution plans for semantically equivalent bottom-up and top-down queries? Which of the two strategies yields faster SQL queries? To address these questions, this work studies bottom-up and top-down translations of SPARQL queries with nested optional graph patterns. This work presents: (1) A basic graph pattern translation algorithm that yields flat SQL queries, (2) A bottom-up nested optional graph pattern translation algorithm, (3) A top-down nested optional graph pattern translation algorithm, and (4) A performance study featuring SPARQL queries with nested optional graph patterns over RDF databases created in Oracle, DB2, and PostgreSQL

    Cultural Relevance of the Transtheoretical Model in Physical Activity Promotion: Mexican-American Women’s use of the Processes of Change

    Get PDF
    Hispanic women in the U.S. have disproportionately high rates of obesity and health disparities related to insufficient physical activity (PA). While the Transtheoretical Model (TTM) is one of the most commonly used behavioral theories in interventions promoting PA, there is a lack of evidence to support the cultural relevance of theoretical constructs for increasing PA in Hispanic women. To learn about Hispanic women’s use and interpretation of the construct Processes of Change (POC) for increasing PA, we conducted focus groups with overweight/obese Mexican/Mexican-American females (N=13) ages 27-40 years. Major themes centered on the importance of children and family caretaking, social support, and PA to promote weight loss. Participants identified strategies they use to enact the POC for increasing PA such as retos (challenges), exercise as an alternative to eating, and clothing as a reward/reminder for PA. This study examined culture-specific factors used by Mexican-American women for becoming more physically active as they correspond to the theoretical constructs of the TTM. We showed that the POC examined in our study are culturally relevant and enacted by Mexican-American women for increasing PA, and are poised to be deployed in culturally appropriate PA promotion and weight loss interventions

    S2ST: A Relational RDF Database Management System

    Get PDF
    The explosive growth of RDF data on the Semantic Web drives the need for novel database systems that can efficiently store and query large RDF datasets. To achieve good performance and scalability of query processing, most existing RDF storage systems use a relational database management system as a backend to manage RDF data. In this paper, we describe the design and implementation of a Relational RDF Database Management System. Our main research contributions are: (1) We propose a formal model of a Relational RDF Database Management System (RRDBMS), (2) We propose generic algorithms for schema, data and query mapping, (3) We implement the first and only RRDBMS, S2ST, that supports multiple relational database management systems, user-customizable schema mapping, schema-independent data mapping, and semantics-preserving query translation

    Map the Meal Gap 2016: Highlights of Findings for Overall and Child Food Insecurity

    Get PDF
    In order to address the problem of hunger, we must first understand it. Feeding America undertook the Map the Meal Gap project to learn more about hunger at the local community level. By understanding the population in need, communities can better identify strategies for reaching the people who most need food assistance.At Feeding America, our mission is to feed America's hungry through a nationwide network of member food banks and engage our country in the fight to end hunger. Although we seek to meet the needs of food insecure individuals and families, it is not always easy to identify the need for food within each of our communities. But what is food insecurity and how do we understand the research around it? Traditionally, Feeding America has used state and national level USDA food insecurity data to estimate the need (e.g. "42 million Americans are at risk of hunger"), but food banks are rooted in their local communities and need better information at the ground level in order to be responsive to their unique local conditions.Until now, the number of people falling below the federal poverty threshold has been the indicator most typically used for identifying the need for food at the local level because it is one of the few indicators available at the county level. However, national food insecurity data reveal that about 57% of those struggling with hunger actually have incomes above the federal poverty level and 60% of poor households are food secure. Thus, measuring need based on local poverty rates alone provides an incomplete illustration of the potential need for food assistance within our communities. More accurate assessments of need across all income levels within our service areas can assist Feeding America and our network of food banks in strategic planning for charitable food services that best support Americans facing hunger, as well as inform the public policy discussion so that vital federal nutrition programs can better serve those in need. Most importantly, better community-level data can serve as an important resource for engaging community leaders and partners in the journey from aspiration (ending hunger) to achievement through a quantifiable and data-driven approach

    Gone in Sixty Milliseconds: Trademark Law and Cognitive Science

    Get PDF
    Trademark dilution is a cause of action for interfering with the uniqueness of a trademark. For example, consumers would probably not think that Kodak soap was produced by the makers of Kodak cameras, but its presence in the market would diminish the uniqueness of the original Kodak mark. Trademark owners think dilution is harmful but have had difficulty explaining why. Many courts have therefore been reluctant to enforce dilution laws, even while legislatures have enacted more of them over the past half century. Courts and commentators have now begun to use psychological theories, drawing on associationist models of cognition, to explain how a trademark can be harmed by the existence of similar marks even when consumers can readily distinguish the marks from one another and thus are not confused. Though the cognitive theory of dilution is internally consistent and appeals to the authority of science, it does not rest on sufficient empirical evidence to justify its adoption. Moreover, the harms it identifies do not generally come from commercial competitors but from free speech about trademarked products. As a result, even a limited dilution law should be held unconstitutional under current First Amendment commercial-speech doctrine. In the absence of constitutional invalidation, the cognitive explanation of dilution is likely to change the law for the worse. Rather than working like fingerprint evidence--which ideally produces more evidence about already-defined crimes--psychological explanations of dilution are more like economic theories in antitrust, which changed the definition of actionable restraints of trade. Given the empirical and normative flaws in the cognitive theory, using it to fill dilution\u27s theoretical vacuum would be a mistake

    Lex Informatica: The Formulation of Information Policy Rules through Technology

    Get PDF
    Historically, law and government regulation have established default rules for information policy, including constitutional rules on freedom of expression and statutory rights of ownership of information. This Article will show that for network environments and the Information Society, however, law and government regulation are not the only source of rule-making. Technological capabilities and system design choices impose rules on participants. The creation and implementation of information policy are embedded in network designs and standards as well as in system configurations. Even user preferences and technical choices create overarching, local default rules. This Article argues, in essence, that the set of rules for information flows imposed by technology and communication networks form a “Lex Informatica” that policymakers must understand, consciously recognize, and encourage
    • …
    corecore