13 research outputs found

    XML Matchers: approaches and challenges

    Full text link
    Schema Matching, i.e. the process of discovering semantic correspondences between concepts adopted in different data source schemas, has been a key topic in Database and Artificial Intelligence research areas for many years. In the past, it was largely investigated especially for classical database models (e.g., E/R schemas, relational databases, etc.). However, in the latest years, the widespread adoption of XML in the most disparate application fields pushed a growing number of researchers to design XML-specific Schema Matching approaches, called XML Matchers, aiming at finding semantic matchings between concepts defined in DTDs and XSDs. XML Matchers do not just take well-known techniques originally designed for other data models and apply them on DTDs/XSDs, but they exploit specific XML features (e.g., the hierarchical structure of a DTD/XSD) to improve the performance of the Schema Matching process. The design of XML Matchers is currently a well-established research area. The main goal of this paper is to provide a detailed description and classification of XML Matchers. We first describe to what extent the specificities of DTDs/XSDs impact on the Schema Matching task. Then we introduce a template, called XML Matcher Template, that describes the main components of an XML Matcher, their role and behavior. We illustrate how each of these components has been implemented in some popular XML Matchers. We consider our XML Matcher Template as the baseline for objectively comparing approaches that, at first glance, might appear as unrelated. The introduction of this template can be useful in the design of future XML Matchers. Finally, we analyze commercial tools implementing XML Matchers and introduce two challenging issues strictly related to this topic, namely XML source clustering and uncertainty management in XML Matchers.Comment: 34 pages, 8 tables, 7 figure

    An Algorithm for payoff space in C1 parametric games

    Get PDF
    We present a novel algorithm to determine the payoff-space of certain normal-form C1 parametric games, and - more generally - of continuous families of normal-form C1 games. The algorithm has been implemented by using MATLAB, and it has been applied to several examples. The implementation of the algorithm gives the parametric expressions of the critical zone of any game in the family under consideration both in the bistrategy space and in the payoff space and the graphical representations of the disjoint union (with respect to the parameter set of the parametric game) of the family of all payoff spaces. We have so the parametric representation of the union of all the critical zones. One of the main motivations of our paper is that, in the applications, many normal-form games appear naturally in a parametric fashion; moreover, some efficient models of coopetition are parametric games of the considered type. Specifically, we have realized an algorithm that provides the parametric and graphical representation of the payoff space and of the critical zone of a parametric game in normal-form, supported by a finite family of compact intervals of the real line. Our final goal is to provide a valuable tool to study simply (but completely) normal-form C1-parametric games in two dimensions

    An Algorithm for payoff space in C1 parametric games

    Get PDF
    We present a novel algorithm to determine the payoff-space of certain normal-form C1 parametric games, and - more generally - of continuous families of normal-form C1 games. The algorithm has been implemented by using MATLAB, and it has been applied to several examples. The implementation of the algorithm gives the parametric expressions of the critical zone of any game in the family under consideration both in the bistrategy space and in the payoff space and the graphical representations of the disjoint union (with respect to the parameter set of the parametric game) of the family of all payoff spaces. We have so the parametric representation of the union of all the critical zones. One of the main motivations of our paper is that, in the applications, many normal-form games appear naturally in a parametric fashion; moreover, some efficient models of coopetition are parametric games of the considered type. Specifically, we have realized an algorithm that provides the parametric and graphical representation of the payoff space and of the critical zone of a parametric game in normal-form, supported by a finite family of compact intervals of the real line. Our final goal is to provide a valuable tool to study simply (but completely) normal-form C1-parametric games in two dimensions

    Wavelet and Multichannel Wavelet Based Watermarking Algorithms for Digital Color Images

    No full text
    Protection of digital images copyright is a critical point for the multimedia Web applications. In this work we face the problem using watermarking techniques. In particular we present the analysis, development, implementation and application of wavelet and multichannel wavelet based watermarking algorithms for digital color images from a viewpoint of an effective usability and availability in a real applicative background. [DOI: 10.1685/CSC09242] About DO

    A Finite Difference Method on Non-Uniform Meshes for Time-Fractional Advection–Diffusion Equations with a Source Term

    No full text
    The present paper deals with the numerical solution of time-fractional advection–diffusion equations involving the Caputo derivative with a source term by means of an unconditionally-stable, implicit, finite difference method on non-uniform grids. We use a special non-uniform mesh in order to improve the numerical accuracy of the classical discrete fractional formula for the Caputo derivative. The stability and the convergence of the method are discussed. The error estimates established for a non-uniform grid and a uniform one are reported, to support the theoretical results. Numerical experiments are carried out to demonstrate the effectiveness of the method

    An image adaptive, wavelet-based watermarking of digital images

    Get PDF
    AbstractIn digital management, multimedia content and data can easily be used in an illegal way—being copied, modified and distributed again. Copyright protection, intellectual and material rights protection for authors, owners, buyers, distributors and the authenticity of content are crucial factors in solving an urgent and real problem. In such scenario digital watermark techniques are emerging as a valid solution. In this paper, we describe an algorithm—called WM2.0—for an invisible watermark: private, strong, wavelet-based and developed for digital images protection and authenticity. Using discrete wavelet transform (DWT) is motivated by good time-frequency features and well-matching with human visual system directives. These two combined elements are important in building an invisible and robust watermark. WM2.0 works on a dual scheme: watermark embedding and watermark detection. The watermark is embedded into high frequency DWT components of a specific sub-image and it is calculated in correlation with the image features and statistic properties. Watermark detection applies a re-synchronization between the original and watermarked image. The correlation between the watermarked DWT coefficients and the watermark signal is calculated according to the Neyman–Pearson statistic criterion. Experimentation on a large set of different images has shown to be resistant against geometric, filtering and StirMark attacks with a low rate of false alarm

    A case study on graph-based planning for emergency evacuation

    No full text
    Abstract. We present a pilot study on the implementation of a software, based on declarative knowledge representation and logic-based automated planning, which assists the management of severe Chemical hazard events, e.g. fire or emissions that may require the evacuation of the area surrounding the affected Chemical plant. We model the geography, the road network and the population of the chemical plant and the surroundings by weighted, labeled graphs, which are updated as the hazardous situation develops. Intervening factors, e.g. the spread of toxic in the air, are represented in the graph in terms of their effects. Risk for the resident population and possible evacuation plans are evaluated and re-evaluated as the accident develops. Also evacuation plans are contingent and as conditions change may be re-evaluated from scratch; moreover, they may involve complex coordinated actions among the rescue units. Both the evaluation of the emergency scenario and the evacuation planning phases have been prototyped by means of an Answer Set Programming planner
    corecore