116,438 research outputs found
Using Event Calculus to Formalise Policy Specification and Analysis
As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods for performing analysis and refinement of policy specifications. Although this is an area that researchers have devoted some attention to, none of the proposed solutions address the issues of analysing specifications that combine authorisation and management policies; analysing policy specifications that contain constraints on the applicability of the policies; and performing a priori analysis of the specification that will both detect the presence of inconsistencies and explain the situations in which the conflict will occur. We present a method for transforming both policy and system behaviour specifications into a formal notation that is based on event calculus. Additionally it describes how this formalism can be used in conjunction with abductive reasoning techniques to perform a priori analysis of policy specifications for the various conflict types identified in the literature. Finally, it presents some initial thoughts on how this notation and analysis technique could be used to perform policy refinement
Improving Drug Safety: The Importance of Postmarking Drug Surveillance
Improved postmarketing surveillance system may reduce the number of adverse reactions to prescription drugs that under the current system continue to rise as the number of prescriptions written in the U.S. rises
Coreference detection in XML metadata
Preserving data quality is an important issue in data collection management. One of the crucial issues hereby is the detection of duplicate objects (called coreferent objects) which describe the same entity, but in different ways. In this paper we present a method for detecting coreferent objects in metadata, in particular in XML schemas. Our approach consists in comparing the paths from a root element to a given element in the schema. Each path precisely defines the context and location of a specific element in the schema. Path matching is based on the comparison of the different steps of which paths are composed. The uncertainty about the matching of steps is expressed with possibilistic truth values and aggregated using the Sugeno integral. The discovered coreference of paths can help for determining the coreference of different XML schemas
Rock falls impacting railway tracks. Detection analysis through an artificial intelligence camera prototype
During the last few years, several approaches have been proposed to improve early warning systems for managing geological risk
due to landslides, where important infrastructures (such as railways, highways, pipelines, and aqueducts) are exposed elements.
In this regard, an Artificial intelligence Camera Prototype (AiCP) for real-time monitoring has been integrated in a multisensor
monitoring system devoted to rock fall detection. An abandoned limestone quarry was chosen at Acuto (central Italy) as test-site
for verifying the reliability of the integratedmonitoring system. A portion of jointed rockmass, with dimensions suitable for optical
monitoring, was instrumented by extensometers. One meter of railway track was used as a target for fallen blocks and a weather
station was installed nearby. Main goals of the test were (i) evaluating the reliability of the AiCP and (ii) detecting rock blocks that
reach the railway track by the AiCP. At this aim, several experiments were carried out by throwing rock blocks over the railway
track. During these experiments, the AiCP detected the blocks and automatically transmitted an alarm signal
An Ontology-Based Method for Semantic Integration of Business Components
Building new business information systems from reusable components is today
an approach widely adopted and used. Using this approach in analysis and design
phases presents a great interest and requires the use of a particular class of
components called Business Components (BC). Business Components are today
developed by several manufacturers and are available in many repositories.
However, reusing and integrating them in a new Information System requires
detection and resolution of semantic conflicts. Moreover, most of integration
and semantic conflict resolution systems rely on ontology alignment methods
based on domain ontology. This work is positioned at the intersection of two
research areas: Integration of reusable Business Components and alignment of
ontologies for semantic conflict resolution. Our contribution concerns both the
proposal of a BC integration solution based on ontologies alignment and a
method for enriching the domain ontology used as a support for alignment.Comment: IEEE New Technologies of Distributed Systems (NOTERE), 2011 11th
Annual International Conference; ISSN: 2162-1896 Print ISBN:
978-1-4577-0729-2 INSPEC Accession Number: 12122775 201
Detecting Ontological Conflicts in Protocols between Semantic Web Services
The task of verifying the compatibility between interacting web services has
traditionally been limited to checking the compatibility of the interaction
protocol in terms of message sequences and the type of data being exchanged.
Since web services are developed largely in an uncoordinated way, different
services often use independently developed ontologies for the same domain
instead of adhering to a single ontology as standard. In this work we
investigate the approaches that can be taken by the server to verify the
possibility to reach a state with semantically inconsistent results during the
execution of a protocol with a client, if the client ontology is published.
Often database is used to store the actual data along with the ontologies
instead of storing the actual data as a part of the ontology description. It is
important to observe that at the current state of the database the semantic
conflict state may not be reached even if the verification done by the server
indicates the possibility of reaching a conflict state. A relational algebra
based decision procedure is also developed to incorporate the current state of
the client and the server databases in the overall verification procedure
- …