16 research outputs found

    Synote: weaving media fragments and linked data

    No full text
    While end users could easily share and tag the multimedia resources online, the searching and reusing of the inside content of multimedia, such as a certain area within an image or a ten minutes segment within a one-hour video, is still difficult. Linked data is a promising way to interlink media fragments with other resources. Many applications in Web 2.0 have generated large amount of external annotations linked to media fragments. In this paper, we use Synote as the target application to discuss how media fragments could be published together with external annotations following linked data principles. Our design solves the dereferencing, describing and interlinking methods problems in interlinking multimedia. We also implement a model to let Google index media fragments which improves media fragments' online presence. The evaluation shows that our design can successfully publish media fragments and annotations for both semantic Web agents and traditional search engines. Publishing media fragments using the design we describe in this paper will lead to better indexing of multimedia resources and their consequent findabilit

    From Information to Sense-Making: Fetching and Querying Semantic Repositories

    No full text
    Information, its gathering, sharing, and storage, is growing at a very rapid rate. Information turned into knowledge leads to sense- making. Ontologies, and their representations in RDF, are increasingly being used to turn information into knowledge. This paper describes how to leverage the power of ontologies and semantic repositories to turn today’s glut of information into sense-making. This would enable better applications to be built making users’ lives easier and more effective

    Linking social, open, and enterprise data

    No full text

    Towards Mapping the security Challenges of the Internet of Things (IoT) supply Chain

    No full text
    The flow complexity in today's IoT supply chain is enormouS. To produce an item in a global network of suppliers requires a delicate dance of people, assets, Systems, information, companies, and even governmentS. The opportunities for security vulnerabilities abound. In this paper, we describe the security challenges facing an IoT supply chain. We first start by describing what an IoT endpoint is, their various types together with their concomitant security challengeS. An IoT endpoint is an output of an IoT supply chain, and the enumeration of its security challenges is then used to describe what IoT attack surfaces are, together with the threats and vulnerabilities facing a typical IoT supply chain. We use the iPhone/Apple supply chain as an exemplar, creating a map, and using that map to depict likely vulnerabilities and attackS. We conclude by discussing the mitigations against potential vulnerabilities in such a supply chain.</p

    Capturing interactive data transformation operations using provenance workflows

    No full text
    The ready availability of data is leading to the increased opportunity of their re-use for new applications and for analyses. Most of these data are not necessarily in the format users want, are usually heterogeneous, and highly dynamic, and this necessitates data transformation efforts to re-purpose them. Interactive data transformation (IDT) tools are becoming easily available to lower these barriers to data trans- formation efforts. This paper describes a principled way to capture data lineage of interactive data transformation processes. We provide a formal model of IDT, its mapping to a provenance representation, and its implementation and validation on Google Refine. Provision of the data transformation process sequences allows assessment of data quality and ensures portability between IDT and other data transformation platforms. The proposed model showed a high level of coverage against a set of requirements used for evaluating systems that provide provenance management solutions

    Capturing Interactive Data Transformation Operations using Provenance Workflows

    No full text
    Abstract. The ready availability of data is leading to the increased opportunity of their re-use for new applications and for analyses. Most of these data are not necessarily in the format users want, are usually heterogeneous, and highly dynamic, and this necessitates data transformation efforts to re-purpose them. Interactive data transformation (IDT) tools are becoming easily available to lower these barriers to data transformation efforts. This paper describes a principled way to capture data lineage of interactive data transformation processes. We provide a formal model of IDT, its mapping to a provenance representation, and its implementation and validation on Google Refine. Provision of the data transformation process sequences allows assessment of data quality and ensures portability between IDT and other data transformation platforms. The proposed model showed a high level of coverage against a set of requirements used for evaluating systems that provide provenance management solutions
    corecore