29,033 research outputs found
Open semantic service networks
Online service marketplaces will soon be part of the economy to scale the provision of specialized multi-party services through automation and standardization. Current research, such as the *-USDL service description language family, is already deïŹning the basic building blocks to model the next generation of business services. Nonetheless, the developments being made do not target to interconnect services via service relationships. Without the concept of relationship, marketplaces will be seen as mere functional silos containing service descriptions. Yet, in real economies, all services are related and connected. Therefore, to address this gap we introduce the concept of open semantic service network (OSSN), concerned with the establishment of rich relationships between services. These networks will provide valuable knowledge on the global service economy, which can be exploited for many socio-economic and scientiïŹc purposes such as service network analysis, management, and control
Overview of methodologies for building ontologies
A few research groups are now proposing a series of steps and methodologies for developing ontologies. However, mainly due to the fact that Ontological Engineering is still a relatively immature discipline, each work group employs its own methodology. Our goal is to present the most representative methodologies used in ontology development and to perform an analysis of such methodologies against the same framework of reference. So, the goal of this paper is not to provide new insights about methodologies, but to put it all in one place and help people to select which methodology to use
Directed Security Policies: A Stateful Network Implementation
Large systems are commonly internetworked. A security policy describes the
communication relationship between the networked entities. The security policy
defines rules, for example that A can connect to B, which results in a directed
graph. However, this policy is often implemented in the network, for example by
firewalls, such that A can establish a connection to B and all packets
belonging to established connections are allowed. This stateful implementation
is usually required for the network's functionality, but it introduces the
backflow from B to A, which might contradict the security policy. We derive
compliance criteria for a policy and its stateful implementation. In
particular, we provide a criterion to verify the lack of side effects in linear
time. Algorithms to automatically construct a stateful implementation of
security policy rules are presented, which narrows the gap between
formalization and real-world implementation. The solution scales to large
networks, which is confirmed by a large real-world case study. Its correctness
is guaranteed by the Isabelle/HOL theorem prover.Comment: In Proceedings ESSS 2014, arXiv:1405.055
A Framework for Semi-automated Web Service Composition in Semantic Web
Number of web services available on Internet and its usage are increasing
very fast. In many cases, one service is not enough to complete the business
requirement; composition of web services is carried out. Autonomous composition
of web services to achieve new functionality is generating considerable
attention in semantic web domain. Development time and effort for new
applications can be reduced with service composition. Various approaches to
carry out automated composition of web services are discussed in literature.
Web service composition using ontologies is one of the effective approaches. In
this paper we demonstrate how the ontology based composition can be made faster
for each customer. We propose a framework to provide precomposed web services
to fulfil user requirements. We detail how ontology merging can be used for
composition which expedites the whole process. We discuss how framework
provides customer specific ontology merging and repository. We also elaborate
on how merging of ontologies is carried out.Comment: 6 pages, 9 figures; CUBE 2013 International Conferenc
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial
render instructional content in a three-dimensional immersive computer
experience for training youth with learning impediments. There are limited
prior works that explored attack vulnerability in VR technology, and hence
there is a need for systematic frameworks to quantify risks corresponding to
security, privacy, and safety (SPS) threats. The SPS threats can adversely
impact the educational user experience and hinder delivery of VRLE content. In
this paper, we propose a novel risk assessment framework that utilizes attack
trees to calculate a risk score for varied VRLE threats with rate and duration
of threats as inputs. We compare the impact of a well-constructed attack tree
with an adhoc attack tree to study the trade-offs between overheads in managing
attack trees, and the cost of risk mitigation when vulnerabilities are
identified. We use a vSocial VRLE testbed in a case study to showcase the
effectiveness of our framework and demonstrate how a suitable attack tree
formalism can result in a more safer, privacy-preserving and secure VRLE
system.Comment: Tp appear in the CCNC 2019 Conferenc
The integration of new technologies : the stakes of knowledge
In order to remain competitive in an increasingly competitive international context, French companies are forced to follow one or more of various possible routes: relocating some of the activities, optimizing the design and / or production process, or innovate technologically. When they choose to develop new technologies, it is advisable to seek outside expertise in different areas. Thus they must exchange and create knowledge in partnership with other companies. But in order to control and integrate this future technology, we support that the acquisition and the capitalization of the technical training, during the process of innovation, are of primary importance. This article demonstrates that the construction of this knowledge base can be achieved only by formalizing close and rigorous collaboration. To do this, we propose a model of the collaborative process, meant for the leaders of innovative projects to support design.Cifr
Recommended from our members
Computerization of workflows, guidelines and care pathways: a review of implementation challenges for process-oriented health information systems
There is a need to integrate the various theoretical frameworks and formalisms for modeling clinical guidelines, workflows, and pathways, in order to move beyond providing support for individual clinical decisions and toward the provision of process-oriented, patient-centered, health information systems (HIS). In this review, we analyze the challenges in developing process-oriented HIS that formally model guidelines, workflows, and care pathways. A qualitative meta-synthesis was performed on studies published in English between 1995 and 2010 that addressed the modeling process and reported the exposition of a new methodology, model, system implementation, or system architecture. Thematic analysis, principal component analysis (PCA) and data visualisation techniques were used to identify and cluster the underlying implementation âchallengeâ themes. One hundred and eight relevant studies were selected for review. Twenty-five underlying âchallengeâ themes were identified. These were clustered into 10 distinct groups, from which a conceptual model of the implementation process was developed. We found that the development of systems supporting individual clinical decisions is evolving toward the implementation of adaptable care pathways on the semantic web, incorporating formal, clinical, and organizational ontologies, and the use of workflow management systems. These architectures now need to be implemented and evaluated on a wider scale within clinical settings
Formalization of the partnering structure for networked businesses
Rapidly changing market demands and increasing competitive pressure cause many businesses implement changes to the way they conduct business. One of these changes is the decision to collaborate with other businesses, forming what we call a 'networked business'. Networked businesses are formed by different organizations working together to reach a common goal. For the participating organizations in a networked business to be able to promptly react to their customers' needs, they must set up as cornerstone a well-defined collaborative partnering structure. In this report we discuss the partnering structure of networked businesses and present a framework for its formalization. Using a case study, we illustrate that existing approaches for value modeling, roles specification, and responsibilities definition can be used successfully if employed in a unifying way to address this structure concept
Public-Private Co-operation for Gas Provision in Poor Neighbourhoods of Buenos Aires: Impact on Housing Improvements and Health
This study examines the programme Redes Solidarias, a public-private initiative that connected to natural pipelined gas 4,000 households in the Great Buenos Aires Area during 2005. The main features of the institutional framework are described and the main results of an impact estimation analysis are reported. The mechanism of selection of neighbourhoods for the connection represents a ânatural experimentâ, which allows the estimation of the causal effects of the programme on several indicators, including housing improvements, health and happiness related variables. We perform this analysis using data from two surveys we collected on the neighbourhoods in 2006 and 2007. The programme was found to generate improvements on dwelling walls, and the âŠinfrastructure provision, gas, impact evaluation
- âŠ