774
Lecture Notes in Computer Science 4805 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

On the Move to Meaningful Internet Systems 2007.. OTM 2007

Embed Size (px)

Citation preview

LNCS 4805 - On the Move to Meaningful Internet Systems 2007: OTM 2007 WorkshopsLecture Notes in Computer Science 4805 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler University of Surrey, Guildford, UK
Jon M. Kleinberg Cornell University, Ithaca, NY, USA
Friedemann Mattern ETH Zurich, Switzerland
John C. Mitchell Stanford University, CA, USA
Moni Naor Weizmann Institute of Science, Rehovot, Israel
Oscar Nierstrasz University of Bern, Switzerland
C. Pandu Rangan Indian Institute of Technology, Madras, India
Bernhard Steffen University of Dortmund, Germany
Madhu Sudan Massachusetts Institute of Technology, MA, USA
Demetri Terzopoulos University of California, Los Angeles, CA, USA
Doug Tygar University of California, Berkeley, CA, USA
Moshe Y. Vardi Rice University, Houston, TX, USA
Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
Robert Meersman Zahir Tari Pilar Herrero (Eds.)
On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops
OTM Confederated International Workshops and Posters AWeSOMe, CAMS, OTM Academy Doctoral Consortium, MONET, OnToContent, ORM, PerSys, PPN, RDDS, SSWS, and SWWS 2007 Vilamoura, Portugal, November 25-30, 2007 Proceedings, Part I
13
Robert Meersman Vrije Universiteit Brussel (VUB), STARLab Bldg G/10, Pleinlaan 2, 1050 Brussels, Belgium E-mail: [email protected]
Zahir Tari RMIT University, School of Computer Science and Information Technology Bld 10.10, 376-392 Swanston Street, VIC 3001, Melbourne, Australia E-mail: [email protected]
Pilar Herrero Universidad Politécnica de Madrid, Facultad de Informática Campus de Montegancedo S/N, 28660 Boadilla del Monte, Madrid, Spain E-mail: [email protected]
Library of Congress Control Number: 2007939492
CR Subject Classification (1998): H.2, H.3, H.4, C.2, H.5, I.2, D.2, K.4
LNCS Sublibrary: SL 3 – Information Systems and Application, incl. Internet/Web and HCI
ISSN 0302-9743 ISBN-10 3-540-76887-4 Springer Berlin Heidelberg New York ISBN-13 978-3-540-76887-6 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law.
Springer is a part of Springer Science+Business Media
springer.com
© Springer-Verlag Berlin Heidelberg 2007 Printed in Germany
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12193509 06/3180 5 4 3 2 1 0
Volume Editors
CAMS
OnToContent
Yoke Sure Tharam S. Dillon
OTM 2007 General Co-chairs’ Message
OnTheMove 2007 held in Vilamoura, Portugal, November 25–30 further consoli- dated the growth of the conference series that was started in Irvine, California in 2002, and then held in Catania, Sicily in 2003, in Cyprus in 2004 and 2005, and in Montpellier last year. It continues to attract a diversifying and representative selection of today’s worldwide research on the scientific concepts underlying new computing paradigms that of necessity must be distributed, heterogeneous and autonomous yet meaningfully collaborative.
Indeed, as such large, complex and networked intelligent information systems become the focus and norm for computing, it is clear that there is an acute and in- creasing need to address and discuss in an integrated forum the implied software and system issues as well as methodological, semantical, theoretical and appli- cation issues. As we all know, e-mail, the Internet, and even video conferences are not sufficient for effective and efficient scientific exchange. This is why the OnTheMove (OTM) Federated Conferences series has been created to cover the increasingly wide yet closely connected range of fundamental technologies such as data and Web Semantics, distributed objects, Web services, databases, infor- mation systems, workflow, cooperation, ubiquity, interoperability, mobility, grid and high-performance systems. OnTheMove aspires to be a primary scientific meeting place where all aspects of the development of Internet- and Intranet- based systems in organizations and for e-business are discussed in a scientifically motivated way. This sixth 2007 edition of the OTM Federated Conferences event, therefore, again provided an opportunity for researchers and practitioners to un- derstand and publish these developments within their individual as well as within their broader contexts.
Originally the federative structure of OTM was formed by the co-location of three related, complementary and successful main conference series: DOA (Dis- tributed Objects and Applications, since 1999), covering the relevant infrastructure-enabling technologies, ODBASE (Ontologies, DataBases and Ap- plications of SEmantics, since 2002) covering Web semantics, XML databases and ontologies, CoopIS (Cooperative Information Systems, since 1993) covering the application of these technologies in an enterprise context through, e.g., workflow systems and knowledge management. In 2006 a fourth conference, GADA (Grid computing, high-performAnce and Distributed Applications), was added as a main symposium, and this year the same happened with IS (Information Security). Both started off as successful workshops at OTM, the first covering the large-scale in- tegration of heterogeneous computing systems and data resources with the aim of providing a global computing space, the second covering the issues of security in complex Internet-based information systems. Each of these five conferences en- courages researchers to treat their respective topics within a framework that in-
VIII Preface
corporates jointly (a) theory , (b) conceptual design and development, and (c) applications, in particular case studies and industrial solutions.
Following and expanding the model created in 2003, we again solicited and selected quality workshop proposals to complement the more “archival” nature of the main conferences with research results in a number of selected and more “avant garde” areas related to the general topic of distributed computing. For instance, the so-called Semantic Web has given rise to several novel research areas combining linguistics, information systems technology, and artificial intelligence, such as the modeling of (legal) regulatory systems and the ubiquitous nature of their usage. We were glad to see that no less than eight of our earlier successful workshops (notably AweSOMe, CAMS, SWWS, ORM, OnToContent, MONET, PerSys, RDDS) re-appeared in 2007 with a second or third edition, and that four brand-new workshops emerged to be selected and hosted, and were successfully organized by their respective proposers: NDKM, PIPE, PPN, and SSWS. We know that as before, workshop audiences will productively mingle with another and with those of the main conferences, as is already visible from the overlap in authors! The OTM organizers are especially grateful for the leadership and competence of Pilar Herrero in managing this complex process into a success for the fourth year in a row.
A special mention for 2007 is to be made of third and enlarged edition of the OnTheMove Academy (formerly called Doctoral Consortium Workshop), our “vision for the future” in research in the areas covered by OTM. Its 2007 orga- nizers, Antonia Albani, Torben Hansen and Johannes Maria Zaha, three young and active researchers, guaranteed once more the unique interactive formula to bring PhD students together: research proposals are submitted for evaluation; selected submissions and their approaches are presented by the students in front of a wider audience at the conference, and are independently and extensively analyzed and discussed in public by a panel of senior professors. This year these were once more Johann Eder and Maria Orlowska, under the guidance of Jan Dietz, the incumbent Dean of the OnTheMove Academy. The successful students only pay a minimal fee for the Doctoral Symposium itself and also are awarded free access to all other parts of the OTM program (in fact their attendance is largely sponsored by the other participants!).
All five main conferences and the associated workshops share the distributed aspects of modern computing systems, and the resulting application-pull created by the Internet and the so-called Semantic Web. For DOA 2007, the primary emphasis stayed on the distributed object infrastructure; for ODBASE 2007, it became the knowledge bases and methods required for enabling the use of for- mal semantics; for CoopIS 2007, the topic as usual was the interaction of such technologies and methods with management issues, such as occur in networked organizations; for GADA 2007, the topic was the scalable integration of heteroge- neous computing systems and data resources with the aim of providing a global computing space; and last but not least in the relative newcomer IS 2007 the emphasis was on information security in the networked society. These subject areas overlap naturally and many submissions in fact also treated an envisaged
Preface IX
mutual impact among them. As for the earlier editions, the organizers wanted to stimulate this cross-pollination by a shared program of famous keynote speakers: this year we were proud to announce Mark Little of Red Hat, York Sure of SAP Research, Donald Ferguson of Microsoft, and Dennis Gannon of Indiana Uni- versity. As always, we also encouraged multiple event attendance by providing all authors, also those of workshop papers, with free access or discounts to one other conference or workshop of their choice.
We received a total of 362 submissions for the five main conferences and 241 for the workshops. Not only may we indeed again claim success in attracting an increasingly representative volume of scientific papers, but such a harvest of course allows the Program Committees to compose a higher-quality cross- section of current research in the areas covered by OTM. In fact, in spite of the larger number of submissions, the Program Chairs of each of the three main conferences decided to accept only approximately the same number of papers for presentation and publication as in 2004 and 2005 (i.e., average one paper out of every three to four submitted, not counting posters). For the workshops, the acceptance rate varied but was much stricter than before, consistently about one accepted paper for every two to three submitted. Also for this reason, we separate the proceedings into four books with their own titles, two for main conferences and two for workshops, and we are grateful to Springer for their suggestions and collaboration in producing these books and CD-Roms. The reviewing process by the respective Program Committees was again performed very professionally and each paper in the main conferences was reviewed by at least three referees, with arbitrated e-mail discussions in the case of strongly diverging evaluations. It may be worthwhile to emphasize that it is an explicit OnTheMove policy that all conference Program Committees and Chairs make their selections com- pletely autonomously from the OTM organization itself. Continuing a costly but nice tradition, the OnTheMove Federated Event organizers decided again to make all proceedings available to all participants of conferences and work- shops, independently of one’s registration to a specific conference or workshop. Each participant also received a CD-Rom with the full combined proceedings (conferences + workshops).
The General Chairs are once more especially grateful to all the many peo- ple directly or indirectly involved in the set-up of these federated conferences, who contributed to making them a success. Few people realize what a large number of individuals have to be involved, and what a huge amount of work, and sometimes risk, the organization of an event like OTM entails. Apart from the persons mentioned above, we therefore in particular wish to thank our 12 main conference PC Co-chairs (GADA 2007: Pilar Herrero, Daniel Katz, Mara S. Perez, Domenico Talia; DOA 2007: Pascal Felber, Aad van Moorsel, Calton Pu; ODBASE 2007: Tharam Dillon, Michele Missikoff, Steffen Staab; CoopIS 2007: Francisco Curbera, Frank Leymann, Mathias Weske; IS 2007: Mario Freire, Simao Melo de Sousa, Vitor Santos, Jong Hyuk Park) and our 36 workshop PC Co-chairs (Antonia Albani, Susana Alcalde, Adezzine Boukerche, George Buchanan, Roy Campbell, Werner Ceusters, Elizabeth Chang, Antonio Coro-
X Preface
nato, Simon Courtenage, Ernesto Damiani, Skevos Evripidou, Pascal Felber, Fernando Ferri, Achille Fokoue, Mario Freire, Daniel Grosu, Michael Gurstein, Pilar Herrero, Terry Halpin, Annika Hinze, Jong Hyuk Park, Mustafa Jarrar, Jiankun Hu, Cornel Klein, David Lewis, Arek Kasprzyk, Thorsten Liebig, Gon- zalo Mendez, Jelena Mitic, John Mylopoulos, Farid Nad-Abdessalam, Sjir Ni- jssen, the late Claude Ostyn, Bijan Parsia, Maurizio Rafanelli, Marta Sabou, Andreas Schmidt, Simao Melo de Sousa, York Sure, Katia Sycara, Thanassis Tiropanis, Arianna D’Ulizia, Rainer Unland, Eiko Yoneki, Yuanbo Guo).
All, together with their many PC members, did a superb and professional job in selecting the best papers from the large harvest of submissions.
We also must heartily thank Jos Valente de Oliveira for the efforts in ar- ranging facilities at the venue and coordinating the substantial and varied local activities needed for a multi-conference event such as ours. And we must all be grateful also to Ana Cecilia Martinez-Barbosa for researching and securing the sponsoring arrangements, to our extremely competent and experienced Con- ference Secretariat and technical support staff in Antwerp, Daniel Meersman, Ana-Cecilia, and Jan Demey, and last but not least to our energetic Publica- tions Chair and loyal collaborator of many years in Melbourne, Kwong Yuen Lai, this year vigorously assisted by Vidura Gamini Abhaya and Peter Dimopoulos.
The General Chairs gratefully acknowledge the academic freedom, logistic support and facilities they enjoy from their respective institutions, Vrije Univer- siteit Brussel (VUB) and RMIT University, Melbourne, without which such an enterprise would not be feasible.
We do hope that the results of this federated scientific enterprise contribute to your research and your place in the scientific network.
August 2007 Robert Meersman Zahir Tari
Organization Committee
The OTM (On The Move) Federated Workshops aim at complementing the more “archival” nature of the OTM Federated Conferences with research results in a number of selected and more “avant garde” areas related to the general topic of distributed computing. In 2007, only 11 workshops were chosen after a rigourous selection process by Pilar Herrero. The 2007 selected international workshops were: AWeSOMe (International Workshop on Agents, Web Services and Ontologies Merging), CAMS (International Workshop on Context-Aware Mobile Systems), OTM Academy Doctoral Consortium, MONET (International Workshop on MObile and NEtworking Technologies for social applications), On- ToContent (International Workshop on Ontology content and evaluation in En- terprise), ORM (International Workshop on Object-Role Modeling), PerSys (In- ternational Workshop on Pervasive Systems), PPN (International Workshop on Peer-to-Peer Networks), RDDS (International Workshop on Reliability in De- centralized Distributed Systems), SSWS (International Workshop on Scalable Semantic Web Knowledge Base Systems), and SWWS (IFIP WG 2.12 and WG 12.4 International Workshop on Semantic Web and Web Semantics). OTM 2007 Federated Workshops were proudly supported by RMIT University (School of Computer Science and Information Technology) and Vrije Universiteit Brussel (Department of Computer Science).
Executive Committee
OTM 2007 General Co-chairs Robert Meersman (Vrije Universiteit Brus- sel, Belgium), Zahir Tari (RMIT University, Australia), and Pilar Herrero (Universidad Politecnica de Madrid, Spain)
AWeSOMe 2007 PC Co-chairs Pilar Herrero (Universidad Politecnica de Madrid, Spain), Gonzalo Medez (Universidad Complutense de Madrid, Spain), and Rainer Unland (University of Duisburg-Essen,
Germany) CAMS 2007 PC Co-chairs George Buchanan (University of Wales
Swansea, UK) and Annika Hinze (University of Waikato, New Zealand)
OTM 2007 Academy Doctoral Consortium PC Co-chairs
Antonia Albani (Delft University of Technol- ogy, The Netherlands), Torben Hansen (Ger- man Research Center for Artificial Intelligence, Germany) and Johannes Maria Zaha (Univer- sity of Duisburg-Essen, Germany)
XII Organization
MONET 2007 PC Co-chairs Fernando Ferri (National Research Council, Italy), Maurizio Rafanelli (National Research Council, Italy) and Arianna D’Ulizia (National Research Council, Italy)
OnToContent 2007 PC Co-chairs
Mustafa Jarrar (Vrije Universiteit Brussel, Belgium), Andreas Schmidt (FZI, Germany), Claude Ostyn (IEEE-LTSC, USA), and Werner Ceusters (University of Buffalo, USA)
ORM 2007 PC Co-chairs Terry Halpin (Neumont University, USA), Sjir Nijssen (PNA, The Netherlands), and Robert Meersman (Vrije Universiteit Brussel, Belgium)
PerSys 2007 PC Co-chairs Skevos Evripidou (University of Cyprus, Cyprus), Roy Campbell (University of Illinois at Urbana-Champaign, USA), Anja Schanzen- berger (Middlesex University, UK)
PPN 2007 PC Co-chairs Farid Nat-Abdesselam (University of Science and Technology of Lille, France), Jiankun Hu (RMIT University, Australia), and Azzedine Boukerche (University of Ottawa, Canada)
RDDS 2007 PC Co-chairs Eiko Yoneki (University of Cambridge, UK) and Pascal Felber (Universite de Neuchatel,
Switzerland) SSWS 2007 PC Co-chairs Achille Fokoue (IBM T.J. Watson Research
Center, USA), Yuanbo Guo (Microsoft Corp, USA), Thorsten Liebig (Ulm University, Germany), and Bijan Parsia (University of
Manchester, UK) SWWS 2007 PC Co-chairs John Mylopoulos (University of Toronto,
Canada), Elizabeth Chang (Curtin University of Technology, Australia), Ernesto Damiani (Milan University, Italy), Yoke Sure (University of Karlsruhe, Germany), and Tharam Dillon (University of Technology Sydney, Australia)
Publication Co-chairs Kwong Yuen Lai (RMIT University, Australia) and Vidura Gamini Abhaya (RMIT University,
Australia) Local Organizing Chair Jose Valente de Oliveira (University of Algarve,
Portugal) Conferences Publicity Chair Jean-Marc Petit (INSA, Lyon, France) Workshops Publicity Chair Gonzalo Mendez (Universidad Complutense de
Madrid, Spain) Secretariat Ana-Cecilia Martinez Barbosa, Jan Demey, and
Daniel Meersman
Organization XIII
AWeSOMe (Agents, Web Services and Ontologies Merging) 2007 Program Committee
M. Brian Blake Jose Luis Bosque Juan A. Bota Blaya Paul Buhler Jose Cardoso Isaac Chao Adam Cheyer Ian Dickinson Jorge Gomez Dominic Greenwood Jingshan Huang Margaret Lyell Dan Marinescu Gregorio Martnez Viviana Mascardi Michael Maximilien Barry Norton Julian Padget Mauricio Paletta
Juan Pavon Jose Pena Mara Perez Ronald Poell Omer Rana Paul Roe Marta Sabou Manuel Salvadores Alberto Sanchez Weisong Shi Marius-Calin Silaghi Ben K.M. Sim Hiroki Suguri Henry Tirri Santtu Toivonen Sander van Splunter Julita Vassileva Yao Wang
CAMS (Context-Aware Mobile Systems) 2007 Program Committee
Pilar Herrero George Buchanan Trevor Collins Keith Cheverst Dan Chalmers Gill Dobbie Tiong Goh Annika Hinze
Reto Krummenacher Johan Koolwaaij Diane Lingrand Gero Muehl Michel Scholl Goce Trajcevski Katarzyna Wac
OTM Academy (International Doctoral Consortium) 2007 Program Committee
Antonia Albani Domenico Beneventano Jaime Delgado Jan Dietz Schahram Dustdar
Johann Eder Torben Hansen Jorg Muller Maria Orlowska Johannes Maria Zaha
XIV Organization
MONET (MObile and NEtworking Technologies for Social Applications) 2007 Program Committee
Russell Beale Yiwei Cao Tiziana Catarci Richard Chbeir Karin Coninx Simon Courtenage Juan De Lara Anna Formica Patrizia Grifoni Otthein Herzog C.-C. Jay Kuo Irina Kondratova David Lewis Stephen Marsh
Rebecca Montanari Michele Missikoff Nuria Oliver Marco Padula Andrew Phippen Tommo Reti Tim Strayer Henri Ter Hofte Thanassis Tiropanis Yoshito Tobe Riccardo Torlone Mikael Wiberg
OnToContent (Ontology Content and Evaluation in Enterprise) 2007 Program Committee
Bill Andersen Keith Baker Ernst Biesalski Paolo Bouquet Simone Braun Christopher Brewster Michael Brown Yannis Charalabidis Ernesto Damiani Aldo Gangemi Fausto Giunchiglia Giancarlo Guizzardi Mohand-Said Hacid Martin Hepp Stijn Heymans Christine Kunzmann Jens Lemcke
Stefanie Lindstaedt Alessandro Oltramari Jeff Pan Paul Piwek Christophe Roch Pavel Shvaiko Miguel-Angel Sicilia Barry Smith Silvie Spreeuwenberg Armando Stellato Andrew Stranieri Karl Stroetmann Sergio Tessaris Robert Tolksdorf Francky Trichet Luk Vervenne
ORM (Object-Role Modeling) 2007 Program Committee
Guido Bakema Herman Balsters Linda Bird
Anthony Bloesch Scott Becker Peter Bollen
Organization XV
Lex Bruil Andy Carver Dave Cuyler Necito dela Cruz Aldo de Moor Olga De Troyer Jan Dietz David Embley Ken Evans Gordon Everest Mario Gutknecht Henri Habrias Pat Hallock Terry Halpin Hank Hermans Stijn Hoppenbrouwers Mike Jackson
Mustafa Jarrar Inge Lemmens Robert Meersman Tony Morgan Maurice Nijssen Sjir Nijssen Baba Piprani Erik Proper Jos Rozendaal Gerhard Skagestein Peter Spyns Deny Smeets Sten Sundblad Jos Vos Theo van der Weide Jan Pieter Zwart
PerSys (Pervasive Systems) 2007 Program Committee
Xavier Alama Jalal Al-Muhtadi Susana Alcalde Bagues Christian Becker Michael Beigl Alastair Beresford Roy Campbell Antonio Coronato Thanos Demiris Hakan Duman Bob Hulsebosch Hesham El-Rewini Skevos Evripidou Alois Ferscha Nikolaos Georgantas Alex Healing
Markus Huebscher Cornel Klein Jelena Mitic Andrew Rice Philip Robison Das Sajal George Samaras Anja Schanzenberger Gregor Schiele Behrooz Shirazi Sotirios Terzis Issarny Valerie Gregory Yovanof Apostolos Zarras Arkady Zaslavsky
PPN (Peer-to-Peer Networks) 2007 Program Committee
Marinho Pilla Barcellos Jalel Ben-Othman Brahim Bensaou Tarek Bijaoui Jean Carle
Song Ci Pilar Herrero Ashfaq Khokhar Nouredine Melab Alberto Montresor
XVI Organization
Florent Nolot Aris Ouksel Douglas Reeves Ahmed Serhrouchni Orazio Tomarchio
Kurt Tutschku Carlos Becker Westphall Sherali Zeadally
RDDS (Reliability in Decentralized Distributed Systems) 2007 Program Committee
Licia Capra Paolo Costa Simon Courtenage Patrick Eugster Pascal Felber Ludger Fiege Christos Gkantsidis Michael Kounavis Marco Mamei Gero Muehl
Jonathan Munson Maziar Nekovee Andrea Passarella Peter Pietzuch Matthieu Roy Francois Taiani Einar Vollset Eiko Yoneki
SSWS (Scalable Semantic Web Knowledge Base Systems) 2007 Program Committee
Pascal Hitzler York Sure Kavitha Srinivas Takahira Yamaguch Raul Garca Castro Aditya Kalyanpur Oscar Corcho Jeff Heflin Ralf Moller Ian Horrocks
Boris Motik Pierre-Antoine Champin Ying Ding Marko Luther Timo Weithoner Andy Seaborne Ulrike Sattler Jan Wielemaker Volker Haarslev
SWWS (Semantic Web and Web Semantics) 2007 Program Committee
Aldo Gangemi Amandeep Sidhu Amit Sheth
Angela Schwering Avigdor Gal Birgit Hofreiter
Organization XVII
Carlos Sierra Carole Goble Chris Bussler Claudia d’Amato David Bell Elena Camossi Elisa Bertino Elizabeth Chang Ernesto Damiani Farookh Hussain Feng Ling Grigoris Antoniou Hai Zhuge Jaiwei Han John Debenham John Mylopoulos Katia Sycara Krzysztof Janowicz Kokou Yetongnon Kyu-Young Whang Ling Liu Lizhu Zhou Lotfi Zadeh Manfred Hauswirth Maria Andrea Rodriguez-Tastets
Masood Nikvesh Mihaela Ulieru Mohand-Said Hacid Monica De Martino Mukesh Mohania Mustafa Jarrar Nicola Guarino Paolo Ceravolo Peter Spyns Pieree Yves Schobbens Pilar Herrero Qing Li Rajugan Rajagopalapillai Ramasamy Uthurusamy Riccardo Albertoni Robert Meersman Robert Tolksdorf Stefan Decker Susan Urban Tharam Dillon Usuama Fayed Wil van der Aalst York Sure Zahir Tari
Table of Contents – Part I
Posters of the 2007 DOA (Distributed Objects and Applications) International Conference
A Deterministic Database Replication Protocol Where Multicast Writesets Never Get Aborted . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
J.R. Juarez-Rodrguez, J.E. Armendariz-Inigo, F.D. Munoz-Esco, J.R. Gonzalez de Mendvil, and J.R. Garitagoitia
AWSM: Infrastructure for Adaptive Web Service Migration . . . . . . . . . . . . 3 Holger Schmidt, Rudiger Kapitza, Franz J. Hauck, and Hans P. Reiser
Generic Proxies—Supporting Data Integration Inside the Database . . . . . 5 Andrei Vancea, Michael Grossniklaus, and Moira C. Norrie
Collaborative Data Synchronization in an Instance-Mapped P2P Data Sharing System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Md Mehedi Masud and Iluju Kiringa
Posters of the 2007 ODBASE (Ontologies, Databases, and Applications of Semantics) International Conference
Translating XPath Queries into SPARQL Queries . . . . . . . . . . . . . . . . . . . . 9 Matthias Droop, Markus Flarer, Jinghua Groppe, Sven Groppe, Volker Linnemann, Jakob Pinggera, Florian Santner, Michael Schier, Felix Schopf, Hannes Staffler, and Stefan Zugal
Validating a Tool for Evaluating Automatically Lexical Triples Mined from Texts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Peter Spyns
Semi-automatic Semantic Enrichment of Raw Sensor Data . . . . . . . . . . . . 13 Nicolas Legeay, Mark Roantree, Gareth J.F. Jones, Noel E. O’Connor, and Alan F. Smeaton
Ontology modelling for Ambient Intelligent Home Environments . . . . . . . 15 Jarmo Kalaoja, Julia Kantorovitch, Ioanna Roussaki, Dimitrios Tsesmetzis, and Ioannis Papaioannou
Implementing OCL as a Database Query Language . . . . . . . . . . . . . . . . . . . 17 Piotr Habela, Krzysztof Kaczmarski, Krzysztof Stencel, and Kazimierz Subieta
XX Table of Contents – Part I
Improving Scalability in Pub-Sub Knowledge-Based Networking by Semantic Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
John Keeney, Dominic Jones, Dominik Roblek, David Lewis, and Declan O’Sullivan
A Model for Fuzzy Multidimensional Spaces . . . . . . . . . . . . . . . . . . . . . . . . . 21 Claudia Gonzalez, Raimundo Mirisola, Leonid Tineo, and Angelica Urrutia
Capturing Ontology Evolution Processes by Repeated Sampling of Large Document Collections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Albert Weichselbraun, Arno Scharl, Wei Liu, and Gerhard Wohlgenannt
Information Systems Development: A Trust Ontology . . . . . . . . . . . . . . . . . 25 Kamaljit Kaur Bimrah, Haralambos Mouratidis, and David Preston
Automatic Annotation in Data Integration Systems . . . . . . . . . . . . . . . . . . 27 Sonia Bergamaschi, Laura Po, and Serena Sorrentino
Posters of the 2007 GADA (Grid Computing, High Performance and Distributed Applications) International Conference
Volunteer Computing, an Interesting Option for Grid Computing: Extremadura as Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Miguel Cardenas Montes, Miguel A. Vega-Rodrguez, Carlos J. Garca Orellana, Manuel Rubio del Solar, Juan A. Gomez-Pulido, Horacio Gonzalez Velasco, Antonio Gomez Iglesias, Juan M. Sanchez-Perez, and Miguel Macas Macas
Replication Heuristics for Efficient Workflow Execution on Grids . . . . . . . 31 J.L. Vazquez-Poletti, E. Huedo, R.S. Montero, and I.M. Llorente
Network-Aware Grid Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Agustn Caminero, Blanca Caminero, and Carmen Carrion
Implementing a P2P Network through Updatable Database Views . . . . . 35 Radoslaw Adamus, Hanna Kozankiewicz, Krzysztof Stencel, and Kazimierz Subieta
A Group Selection Pattern Optimizing Job Scheduling in Decentralized Grid Markets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Isaac Chao, Oscar Ardaiz, and Ramon Sanguesa
A Conceptual Model for Grid Learning Services Automatic Composition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Gustavo Gutierrez-Carreon, Thanasis Daradoumis, and Josep Jorba
Table of Contents – Part I XXI
Posters of the 2007 IS (Information Security) International Conference
A Multi-party Rational Exchange Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Almudena Alcaide, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, and Arturo Ribagorda
A Texture Based Image Signature Using Second Order Statistics Characterisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
A. Samia Boucherkha and Mohamed Benmohamed
Expert System for Business Decisions on Security Requirements . . . . . . . 46 Eriks Dobelis
Workshop on Agents, Web Services and Ontologies Merging (AweSOMe)
AWeSOMe 2007 PC Co-chairs’ Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Resource Allocation
Daniel Lazaro, Xavier Vilajosana, and Joan Manuel Marques
An Agents-Based Cooperative Awareness Model to Cover Load Balancing Delivery in Grid Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Pilar Herrero, Jose Luis Bosque, and Mara S. Perez
Semantic Web Approaches
TV Navigation Agent for Measuring Semantic Similarity Between Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Yumiko Mizoguchi-Shimogori, Toshiaki Nakamoto, Kazuma Asakawa, Shinichi Nagano, Masumi Inaba, and Takahiro Kawamura
Engineering an MAS Platform for Semantic Service Integration Based on the SWSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Ozgur Gumus, Onder Gurcan, Geylani Kardas, Erdem Eser Ekinci, and Oguz Dikenelli
A Planner Infrastructure for Semantic Web Enabled Agents . . . . . . . . . . . 95 Erdem Eser Ekinci, Ali Murat Tiryaki, Onder Gurcan, and Oguz Dikenelli
Agent-Based Applications
From a Goal-Oriented Methodology to a BDI Agent Language: The Case of Tropos and Alan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Francesco Pagliarecci, Loris Penserini, and Luca Spalazzi
XXII Table of Contents – Part I
A Human-Like SOA-Based Interdisciplinary Framework for Intelligent Virtual Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Mauricio Paletta and Pilar Herrero
Short Papers
A Group Selection Pattern for Agent-Based Virtual Organizations Coordination in Grids . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Isaac Chao, Oscar Ardaiz, and Ramon Sanguesa
Web Services System for Distributed Technology Upgrade Within an e-Maintenance Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Eduardo Gilabert, Susana Ferreiro, and Aitor Arnaiz
WSBL: Web Service Architecture for Financial Products . . . . . . . . . . . . . . 158 Marcos Aza Hidalgo and Jose Luis Bosque Orero
Workflow Management in Grid Era: From Process-Driven Paradigm to a Goal-Driven One . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Jinlei Jiang, Shaohua Zhang, Johann Schlichter, and Guangwen Yang
BPEL for Semantic Web Services (BPEL4SWS) . . . . . . . . . . . . . . . . . . . . . 179 Jorg Nitzsche, Tammo van Lessen, Dimka Karastoyanova, and Frank Leymann
Workshop on Context Aware Mobile Systems (CAMS)
CAMS 2007 PC Co-chairs’ Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Users
Context-Awareness in the Wild: An Investigation into the Existing Uses of Context in Everyday Life . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Jason Pascoe, Kirsten Thomson, and Helena Rodrigues
‘Guess A Who, Why, Where, When?’: The Visualization of Context Data to Aid the Authoring and Orchestration of a Mobile Pervasive Game . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Michael Wright, Alan Chamberlain, Chris Greenhalgh, Steve Benford, Nick Tandavanitj, Amanda Oldroyd, and Jon Sutton
Modeling
Browsing Semantics in Context-Aware Mobile Hypermedia . . . . . . . . . . . . 211 Cecilia Challiol, Agustin Munoz, Gustavo Rossi, Silvia E. Gordillo, Andres Fortier, and Robert Laurini
Table of Contents – Part I XXIII
Context, Data and Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 Annika Hinze, George Buchanan, Andrea Schweer, and Matt Jones
Technical Aspects
Wendy Osborn and Annika Hinze
A Peer-to-Peer based Infrastructure for Context Distribution in Mobile and Ubiquitous Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Xiaoming Hu, Yun Ding, Nearchos Paspallis, George A. Papadopoulos, Pyrros Bratskas, Paolo Barone, Alessandro Mamelli, Yves Vanrompay and Yolande Berbers
Doctoral Consortium
Information System Development
Elaborating a Decentralized Market Information System . . . . . . . . . . . . . . 245 Rene Brunner and Felix Freitag
COPA-CASE: Methodological Environment for the Generation, Application and Validation of Coordination Patterns . . . . . . . . . . . . . . . . . 255
P.L. Perez-Serrano and M. Sanchez-Alonso
Providing Support for Data Replication Protocols with Multiple Isolation Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
J.M. Bernabe-Gisbert
Market Driven Product Ontologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Davor Meersman
Smart Distribution of Bio-signal Processing Tasks in M-Health . . . . . . . . 284 Hailiang Mei
Service-Oriented Approaches
Dieter Van Nuffel
Sonja Zaplata
Semantic Web Service Offer Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 Jacek Kopecky
Top-Down Modeling Methodology for Model-Driven SOA Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Jan Ricken
Workshop on Mobile and Networking Technologies for Social Applications (MONET)
MONET 2007 PC Co-chairs’ Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Mobile Learning Environments
Social Knowledge Building in a Mobile Learning Environment . . . . . . . . . 337 Manuel Gentile, Davide Taibi, Luciano Seta, Marco Arrigo, Giovanni Fulantelli, Onofrio Di Giuseppe, and Gaspare Novara
Improving Collaboration and Interaction in Distributed B-learning Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Nidia Moncallo R., Pilar Herrero, and Luis Joyanes
Re-experiencing History in Archaeological Parks by Playing a Mobile Augmented Reality Game . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Carmelo Ardito, Paolo Buono, Maria Francesca Costabile, Rosa Lanzilotti, and Thomas Pederson
Theories and Applications of Multimodal Systems
A Hybrid Grammar-Based Approach to Multimodal Languages Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Arianna D’Ulizia, Fernando Ferri, and Patrizia Grifoni
Enabling Rapid Development of Multimodal Data Entry Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Irina Kondratova and Scott Durling
An Approach for Managing Ambiguities in Multimodal Interaction . . . . . 387 Maria Chiara Caschera, Fernando Ferri, and Patrizia Grifoni
Applications of Mobile Technology in Different Social Contexts
Supporting Social Networks by Event-Driven Mobile Notification Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
Adam Wojciechowski
Realising Context-Sensitive Mobile Messaging . . . . . . . . . . . . . . . . . . . . . . . 407 Jill Freyne, Emil Varga, Daragh Byrne, Alan F. Smeaton, Barry Smyth, and Gareth J.F. Jones
The Mobile Interfaces for Geo-hypermedia Databases . . . . . . . . . . . . . . . . . 417 Yiwei Cao, Ralf Klamma, Satish Srirama, and Kaifei Wang
Personalization in Networked Systems
Personalized Information Access in a Wiki Using Structured Tagging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Anmol V. Singh, Andreas Wombacher, and Karl Aberer
A Collection-Oriented Framework for Social Applications . . . . . . . . . . . . . 437 Alexandre de Spindler, Michael Grossniklaus, and Moira C. Norrie
A Virtual Shopper Customer Assistant in Pervasive Environments . . . . . 447 Antonella Santangelo, Agnese Augello, Salvatore Sorce, Giovanni Pilato, Antonio Gentile, Alessandro Genco, and Salvatore Gaglio
Profiling Nomadic Users Considering Preferences and Context of Use . . . 457 Angela Carrillo-Ramos, Marlene Villanova-Oliver, Jerome Gensel, and Herve Martin
Networking for Distributed Knowledge Management
ANN-Agent for Distributed Knowledge Source Discovery . . . . . . . . . . . . . . 467 Georgina Stegmayer, M. Caliusco, Omar Chiotti, and M. Rosa Galli
P2P Routing-by-Content on a Lightweight Community Basis . . . . . . . . . . 477 Silvana Castano, Alfio Ferrara, and Stefano Montanelli
Collaborative Systems
Towards a Society of Peers: Expert and Interest Groups in Peer-to-Peer Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Achmad Nizar Hidayanto and Stephane Bressan
Self-organization of Wireless Networks Through Declarative Local Communication (Extended Abstract) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Stephane Grumbach, Jia-liang Lu, and Wenwu Qu
Workshop on Ontology Content and Evaluation in Enterprise (OntoContent)
OnToContent 2007 PC Co-chairs’ Message . . . . . . . . . . . . . . . . . . . . . . . . . . 509
XXVI Table of Contents – Part I
Ontology Design and Evaluation
Evaluation Framework for Automatic Ontology Extraction Tools: An Experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Jinsoo Park, Wonchin Cho, and Sangkyu Rho
Ontology Design Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522 Carlos Ruben Ferreira, Pedro Marques, Andre L. Martins, Sergio Rita, Bruno Grilo, Rudi Araujo, Peyman Sazedj, and H. Sofia Pinto
Ontology-Based Decisions and Dialogues
On Conducting a Decision Group to Construct Semantic Decision Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
Yan Tang
Ontology-Based Medical Applications
Federated Ontology Search for the Medical Domain . . . . . . . . . . . . . . . . . . 554 Vasco Calais Pedro, Lucian Vlad Lita, Stefan Niculescu, Bharat Rao, and Jaime Carbonell
An Ontology-Based Technique for Validation of MRI Brain Segmentation Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
Bruno Alfano, Marco Comerci, Giuseppe De Pietro, and Amalia Esposito
Workshop on Object-Role Modeling (ORM)
ORM 2007 PC Co-chairs’ Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Process Modeling
Fact-Oriented Modeling in the Data-, Process- and Event Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Peter Bollen
Declarative Process Modeling with Business Vocabulary and Business Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
Stijn Goedertier and Jan Vanthienen
Table of Contents – Part I XXVII
Metamodeling
A NIAM2007 Conceptual Analysis of the ISO and OMG MOF Four Layer Metadata Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
Inge Lemmens, Maurice Nijssen, and Sjir Nijssen
A Meta-model for Ontologies with ORM2 . . . . . . . . . . . . . . . . . . . . . . . . . . . 624 Christina Tziviskou and C. Maria Keet
Data Integration
Object Role Modeling Enabled Metadata Repository . . . . . . . . . . . . . . . . . 634 Bryan Shelstad, Pat Hallock, Necito Dela Cruz, and Dick Barden
Using ORM in an Ontology Based Approach for a Common Mapping Across Heterogeneous Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647
Baba Piprani
Modeling Data Federations in ORM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657 Herman Balsters and Terry Halpin
Industrial Applications
Promising Chance of Innovation for Conceptual Modeling in Commerzbank . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
Mario Gutknecht
Industrial Experience with Fact Based Modeling at a Large Bank . . . . . . 678 Jos Rozendaal
Is There Fact Orientation Life Preceding Requirements? . . . . . . . . . . . . . . 688 Jos Vos
Formal Issues
Reduction Transformations in ORM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699 Terry Halpin, Andy Carver, and Kevin M. Owen
Visualizing Formalisms with ORM Models . . . . . . . . . . . . . . . . . . . . . . . . . . 709 S.J. Overbeek, P. van Bommel, H.A. (Erik) Proper, and D.B.B. Rijsenbrij
Advances in FCO-IM (2): A Shorter Algorithm for Determining Intra Fact Type Uniqueness Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
Jan Pieter Zwart and Guido Bakema
Description Logics and OWL
Mapping ORM into the SHOIN/OWL Description Logic: Towards a Methodological and Expressive Graphical Notation for Ontology Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
Mustafa Jarrar
XXVIII Table of Contents – Part I
Mapping OWL-DL into ORM/RIDL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 742 Dang Bui Bach, Robert Meersman, Peter Spyns, and Damien Trog
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
J.R. Juarez-Rodrguez1, J.E. Armendariz-Inigo1, F.D. Munoz-Esco2, J.R. Gonzalez de Mendvil1, and J.R. Garitagoitia1
1 Universidad Publica de Navarra, 31006 Pamplona, Spain {jr.juarez,enrique.armendariz,mendivil,joserra}@unavarra.es
2 Instituto Tecnologico de Informatica, 46022 Valencia, Spain [email protected]
Introduction. Several approaches for the full replication of data in distributed databases [1] have been studied. One of the preferred techniques is the eager update everywhere based on the total-order multicast delivery service [2], where the most outstanding va- rieties are: certification-based and weak-voting [1]. Under this approach, the execution flow of a transaction can be split into two different main phases: the first one, all op- erations are entirely executed at the delegate replica of the transaction; and followed by the second phase, started when the transaction requests its commit, all updates are collected and grouped (denoted as writeset) at the delegate replica and sent to all repli- cas. The commitment or abortion of a transaction is decided upon the delivery of the message. In the case of certification-based ones, each replica holds an ordered log of already committed transactions and the writeset is certified [3], against the log, to com- mit or abort the transaction. On the other hand, weak-voting ones atomically apply the delivered writeset at remote replicas whilst the delegate, if it is still active, reliably mul- ticasts [2] a commit message. Thus, the certification-based presents a better behavior in terms of performance, only one message is multicast per transaction, but with higher abortion rates [1]. Recently, due to the use of DBMS providing SI, we have found sev- eral certification-based protocols to achieve, actually a weaker form called GSI [3], this isolation level in a replicated setting [3] while quite a few weak-voting ones [4].
Total-order multicast in database replication offers two attractive properties: a) they reliably send the writeset to all replicas; and, b) they provide the same scheduling of transactions and, thus, all replicas reach the same decision for each transaction in the replicated setting. However, if we focus in the scheduling policy, there is a point where certification-based and weak-voting techniques converge: all delivered messages com- ing from a replica are known to be successfully certified (i.e no need of a log for cer- tification ones) and committed (i.e. no need for the additional message exchange for weak-voting ones). Nevertheless, this may cause the penalization of certain transaction patterns. We propose an eager update-everywhere replication protocol [5] that follows the most straightforward scheduling policy: a round-robin based on replica identifiers that is unique and known by all replicas. At a given slot, only those writesets coming from the replica associated to that slot are allowed to commit, while the conflicting local transactions should be aborted. This generates a unique scheduling configuration of all replicas where all writesets are applied in the same order providing GSI. This work has been partially supported by the EU FEDER and Spanish MEC under grant
TIN2006-14738-C02.
R. Meersman, Z. Tari, P. Herrero et al. (Eds.): OTM 2007 Ws, Part I, LNCS 4805, pp. 1–2, 2007. c© Springer-Verlag Berlin Heidelberg 2007
2 J.R. Juarez-Rodrguez et al.
Outline of the Protocol. The replication protocol is going to be implemented in a mid- dleware system. All operations of a transaction Ti are submitted to the middleware (abort operations are ignored for simplicity) corresponding to its delegate replica (k). Each middleware replica stores the same copy of a list (to work) that determines the scheduling of transactions in the system. Here, for the sake of understanding, it is as- sumed a round robin scheduling based on replica identifiers (N). The to work variable is in charge of deciding which replica can send a message or which writeset has to be applied, respectively. Initially, it is filled with infinite tuples (just for algorithm presen- tation purposes) of the form order, n mod N, n, ∅ with n ∈ N, sorted by n.
When a transaction requests its commit the writeset is retrieved from the local database replica, if it is an empty one the transaction will be committed. Otherwise, there is a list (WS list) that stores local transactions (with their writesets) that have requested their commit. Concurrent to this, the replica must wait for its turn, i.e. the first position of order, k, n, ∅, in its own to work. Once it reaches its turn, if there are no transactions stored in WS list it will make advance the turn to the next middleware replica by multicasting (reliable) the next, k, n, ∅ to all replicas. Otherwise, it will reliably multicast all the writesets contained in WS list in a to commit, k, n, WS list. Upon delivery of these next and to commit messages they are substituted in their proper positions (which is reflected by n) of the to work list of the delivered replica. All replicas run at different speed and there could be replicas still handling previous positions of their own to work. The next tuples of to work are deleted so it can progress the scheduling of new transactions. We will distinguish two cases of writeset execution: at its delegate replica or at a remote replica. In the first case the transactions will be directly committed. Whereas in the other case a remote transaction is used to apply and commit the transaction. However, it may conflict with local transactions and being in- volved in a local database deadlock. To partially avoid this fact, we stop the execution of write operations in the system. Nevertheless, this is not enough since the writeset can be involved in a deadlock with local transactions that already wrote in some data item that intersects with the writeset and be aborted. Hence, it must be re-attempted until its successful completion. Further details about its execution flow, correctness, comparing simulations and fault-tolerance issues are given in [5].
References
1. Wiesmann, M., Schiper, A.: Comparison of database replication techniques based on total order broadcast. IEEE TKDE 17(4), 551–566 (2005)
2. Chockler, G., Keidar, I., Vitenberg, R.: Group communication specifications: a comprehensive study. ACM Comput. Surv. 33(4), 427–469 (2001)
3. Elnikety, S., Pedone, F., Zwaenopoel, W.: Database replication using generalized snapshot isolation. In: SRDS, IEEE-CS, Los Alamitos (2005)
4. Juarez, J.R., Armendariz, J.E., de Mendvil, J.R.G., Munoz, F.D., Garitagoitia, J.R.: A weak voting database replication protocol providing different isolation levels. In: NOTERE 2007 (2007)
5. Juarez, J.R., Armendariz, J.E., Munoz, F.D., de Mendvil, J.R.G., Garitagoitia, J.R.: A deter- ministic database replication protocol where multicast writesets never got aborted. Technical Report ITI-ITE-07/15, ITI (2007)
AWSM: Infrastructure for Adaptive Web
Service Migration
Holger Schmidt1, Rudiger Kapitza2, Franz J. Hauck1, and Hans P. Reiser3
1 Institute of Distributed Systems, Ulm University, Germany {holger.schmidt,franz.hauck}@uni-ulm.de
2 Dept. of Comp. Sciences, Informatik 4, University of Erlangen-Nurnberg, Germany [email protected]
3 LaSIGE, Departamento de Informatica, University of Lisboa, Portugal [email protected]
Abstract. Ubiquitous computing applications have to cope with a highly dynamic and heterogeneous infrastructure. Thus, software must be able to adapt dynamically and react to the environment. Further- more, it should be platform and language independent. We propose an infrastructure for stateful self-adaptive migratable Web services for im- plementing ubiquitous computing applications. Our infrastructure allows location-transparent, stateful migration at runtime. Unlike related work, we introduce location-independent Web service references. Our Web ser- vices support adaptation to the application context by being able to dynamically change the interface, locally available state and implemen- tation at the same time. The concept can be transferred to any Web service platform as we build on top of standard Web service technology.
Keywords: Web Service, Migration, Adaptation, Platform Indepen- dency, Dynamic Loading of Code.
Ubiquitous Computing infrastructures should provide mechanisms to automati- cally handle heterogeneity and to reduce the complexity of handling adaptivity and reactivity in the applications. State-of-the-art infrastructures have limita- tions in terms of supporting adaptation and handling heterogeneity.
In this paper, we present stateful self-adaptive migratable Web services (SAM- WS). A SAM-WS is comparable to a distributed object, which offers a Web service interface. It can dynamically load the code necessary for the given envi- ronment, change its interface on the basis of the current location context, and ad- just the active state that is available at the current node. The novel contribution of our infrastructure is that it combines Web service technology with mobility mechanisms that support adaptation and heterogeneity. The key difference to related work on migratable Web services [1] is the support for adaptation to the current application context by dynamically changing the service interface, the lo- cally available state and the implementation in use. Unlike our previous work on context-aware migration of CORBA objects [2], in this paper we propose the use of standard Web service technology as core mechanism, which highly simplifies interoperability between heterogeneous infrastructures of different vendors and
R. Meersman, Z. Tari, P. Herrero et al. (Eds.): OTM 2007 Ws, Part I, LNCS 4805, pp. 3–4, 2007. c© Springer-Verlag Berlin Heidelberg 2007
4 H. Schmidt et al.
allows disconnected operation. On the basis of previous work [3], the presented platform contains a novel dynamic deployment service that allows migration of services to machines on which the corresponding code is unavailable and thus has to be loaded on demand. We support client-transparent migration by intro- ducing persistent Web service references for the whole life-cycle on basis of a globally unique ID for each SAM-WS instance, which is encoded into the service URL, and a location service enabling discovery of the current location.
Figure 1 shows the CORBA life-cycle-service-like interaction among the logical entities for self-adaptive Web service migration. Migration is initiated by storing the Web service’s active state into a state store service for later use. Then, the SAM-WS discovers possible migration targets with the help of a factory finder service. Therefore, the SAM-WS passes criteria to the factory finder service (e.g., required context and desired interface at target location) according to which appropriate factory services (i.e., migration targets) are returned. These factory services enable the remote deployment of arbitrary Web services. The factory service that is returned by the factory finder service allows the creation of the criteria-specified Web service facet (i.e., a specific configuration of interface, state and implementation) at the desired location. Last, the newly created Web service is updated with the necessary state from the state store service, the original Web service is undeployed and references to the Web service are updated by storing the current location in the location service.
Fig. 1. Collaboration of logical entities for self-adaptive Web service migration
Our ongoing work targets the prototype implementation for other Web ser- vice platforms, i.e., .NET and the Java Micro Edition. We do not expect inter- operability problems, as our infrastructure only relies on standard Web service technology. Additionally, for supporting the development of a SAM-WS, we will investigate the use of a model-driven architecture.
References
1. Hammerschmidt, B.C., Linnemann, V.: Migratable Web Services: Increasing Perfor- mance and Privacy in Service Oriented Architectures. IADIS Int. Journal on Comp. Sci. and Info. Sys. 1(1), 42–56 (2006)
2. Kapitza, R., Schmidt, H., Soldner, G., Hauck, F.J.: A Framework for Adaptive Mobile Objects in Heterogeneous Environments. In: Meersman, R., Tari, Z. (eds.) On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE. LNCS, vol. 4276, pp. 1739–1756. Springer, Heidelberg (2006)
3. Kapitza, R., Schmidt, H., Bartlang, U., Hauck, F.J.: A Generic Infrastructure for Decentralised Dynamic Loading of Platform-Specific Code. In: DAIS 2007 (2007)
Generic Proxies—Supporting Data Integration
Inside the Database
Institute for Information Systems, ETH Zurich CH-8092 Zurich, Switzerland
{vancea,grossniklaus,norrie}@inf.ethz.ch
Abstract. Existing approaches to data integration generally propose building a layer on top of database systems to perform the necessary data transformations and manage data consistency. We show how support for the integration of heterogeneous data sources can instead be built into a database system through the introduction of a generic proxy concept.
Over the last two decades a great deal of research in the database and information systems communities has addressed the challenges of data integration. Generally, the problem addressed is how to combine data from different sources to provide a unified user view [1]. Various approaches have been proposed depending on the purpose of the integration and the nature of the data sources, but two broad categories of data integration systems that have received a lot of attention in recent years are mediator [2] and data warehousing [3] systems. These systems tend to have a common architectural approach in that integration is achieved by building extra layers on top of the database systems. We believe that adding internal support for data integration in a database system can have positive effects in the development of data integration systems.
In our approach, the integration of external information sources is done using a generic proxy. A generic proxy consists of two parts: the proxy object and the proxy process. The proxy object represents the database view of the external data source. The data from the external source is cached locally, similar to the data warehouse approach. Queries can be executed locally without any com- munication to the external source. The synchronisation between the database view of the information source and the external information source is done au- tomatically by the database management system in a transparent way. We have defined a proxy programming interface that allows the user to specify how a proxy object interacts with an external source. The user has to write different implementations for different types of external sources. The proxy processes are created from particular implementations of the proxy interface.
When a user wants to create a new proxy object, they must specify the name of the proxy and also the list of arguments that are needed in order to initialize the generic proxy. First, a new proxy object is created and stored in the data- base. Afterwards, the proxy object must be associated with an existing or newly created proxy process. This association is performed using a chain of responsibil- ity approach. All of the existing proxy processes pertaining to the current proxy
R. Meersman, Z. Tari, P. Herrero et al. (Eds.): OTM 2007 Ws, Part I, LNCS 4805, pp. 5–6, 2007. c© Springer-Verlag Berlin Heidelberg 2007
6 A. Vancea, M. Grossniklaus, and M.C. Norrie
type are asked to accept the newly created proxy object using the accept call. The proxy object is associated with the first process that accepts it. If no such process is found, a new one is created and associated with the proxy object. The association between the proxy object and the proxy process cannot be changed at a later time.
A proxy process must handle the bi-directional communication between the database and the external source. When the proxy object is changed, the data- base system, using the proxy process, sends the modifications to the information source. At the same time, when the external information source is changed the database system is notified by the proxy process. Having a running proxy pro- cess for each proxy object is clearly not a feasible solution. We therefore chose to map more than one proxy object to a single proxy process. By using the proxy programming interface, the user can specify how the mapping of proxy objects to proxy processes is done for particular types of proxies.
We maintain a FIFO list that contains the proxy objects that are scheduled for synchronisation with their external information sources. A proxy object is added to this list if the value of one of its attribute is modified or as a result of the modification of the external information source. The proxy objects are ex- tracted, one by one, from the list and are synchronised with the external sources. During the synchronisation process, a new object is created (remoteObject) by reading the data directly from the external source. The values of the two objects (the proxy object and remoteObject) are then merged together, resulting a new object (mergedObject). Potential conflicts are also solved during the merging process. The values of mergedObject are then sent to the information used, using the proxy process. The proxy object is replaced with mergedObject.
By using the generic proxy mechanism, the synchronisation between the exter- nal information sources and the database system is done automatically when the information source is changed or when the value of its proxy object is modified. The system does not guarantee that the client will work with the latest versions of the information sources, but the synchronisation is usually done within a rea- sonable amount of time. We have implemented generic proxies in an object data management framework based on the db4o object storage system [4].
References
1. Lenzerini, M.: Data Integration: A theoretical Perspective. In: Proceedings of ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Madi- son, WI, USA, pp. 233–246. ACM Press, New York (2002)
2. Wiederhold, G.: Mediators in the Architecture of Future Information Systems. In: Huhns, M.N., Singh, M.P. (eds.) Readings in Agents, Morgan Kaufmann, San Fran- cisco (1997)
3. Widom, J.: Research Problems in Data Warehousing. In: Proceedings of Interna- tional Conference on Information and Knowledge Management, Baltimore, MD, USA (1995)
4. Paterson, J., Edlich, S., Horning, H., Horning, R.: The Definitive Guide to db4o. Apress (2006)
Collaborative Data Synchronization in an
Instance-Mapped P2P Data Sharing System
Md Mehedi Masud and Iluju Kiringa
SITE, University of Ottawa, Canada {mmasud,kiringa}@site.uottawa.ca
Abstract. In this paper, we propose a data synchronizing mechanism between peers in a peer-to-peer (P2P) database network where each peer has an independently created relational database. We assume that data- level mappings are used to resolve data heterogeneity between two peers. According to the strategy, peers resolve update execution conflicts during data synchronization in a collaborative fashion.
Peer-to-peer data sharing deals with the exchange of data between heterogeneous sources whose data need not be interdependent, replicated, and may represent different real world domains. In this paper, we assume that each peer stores heterogeneous relational data which are related to data stored in remote peers through mapping tables [1]. Intuitively, mapping tables are data-level mappings which list pairs of corresponding values between two sources and thereby act as an interface to relate data between two peers. Two peers related through mapping tables are said to be acquainted. In the settings, any peer may initi- ate an update which is executed first locally and then the update is propagated throughout the P2P network among the acquainted peers in order to synchro- nize the data. The authors in [2] introduce the update semantics in such an environment and describe update execution mechanism. The authors also pro- pose a data synchronization mechanism, where each peer independently detects and resolves conflicts and agrees on the same data value with its acquaintees. In this paper we propose a data synchronization technique where peers resolve conflicts in a collaborative fashion where human intervention may be required to resolve conflicts. The approach is applicable where the system tolerates data in- consistency for a certain period of time and update to a peer is not immediately important to other peers. The strategy is described below.
Consider that a peer receives two updates generated from two peers that modify a tuple in the database. Without proper knowledge, the peer is unable make a decision which one to accept or reject. Due to the arbitrary topology of P2P networks, conflict between the same pair of updates may occur at different peers during their propagation. In order to keep the databases consistent, each peer must reach the same decision to execute the updates. According to the strategy, when a peer detects a conflict, the peer consults with its parent about the decision. Note that a peer which forwards an update is a parent and the peer which receives the update is called a child peer. If the parent has no knowledge
R. Meersman, Z. Tari, P. Herrero et al. (Eds.): OTM 2007 Ws, Part I, LNCS 4805, pp. 7–8, 2007. c© Springer-Verlag Berlin Heidelberg 2007
8 M.M. Masud and I. Kiringa
Fig. 1. Collaborative approach
about the execution decision, then the parent also asks its parent. This process continues until a peer is found which knows the decision or the inquiry reaches the initiators. The first peer which detects the conflict may have already propagated an inquiry along the path to the initiators and the result is already decided. Hence, other peers which detect the same conflict may receive the result from any intermediate peers along the path to the initiator. After receiving the conflicting updates, both initiators reach an agreement about the conflict resolution. The initiators then propagate the result to the conflicting peers. Each peer along the path stores the result. After receiving the decision, conflicting peers continue the execution of the updates.
The collaborative algorithm is illustrated in Figure 1. Consider that the peers P2, P3, and P4 have a conflict between two updates u1 and u6. Also in peers Pi
and Pj , somewhere in the network, the same pair of updates u1 and u6 involved in conflict. To decide about the execution, P2 enquires its parent about execution decision. In this case the parent is the initiator of u1. Similarly, P3 asks P5 which in turn asks P6, the initiator of u6. P4 also asks P2 and P5 about the decision and waits for the decision. In addition, Pi and Pj also involved in conflict with respect to u1 and u6. Pi and Pj also perform the same procedure by asking their respective parents. In this case Pj asks P7 along the path Pj → · · · → P7. P7
then asks P3. If P3 has already the result then P3 informs P7 about the result. Otherwise, P7 waits for P3 which is also waiting for the result. Similarly, Pi asks P1 along the path Pi → · · · → P1, which is the initiator of u1. During request propagation, if any peer Pk is found which knows the decision, then Pk forwards the result to Pi along the path Pk → · · · → Pi. When the inquiry reaches both P1 and P6, decision is made. In this case users may be involved if the decision cannot be taken automatically. After the decision has been made, the results are propagated to all the inquiring peers. In this way peers resolve the conflict in a P2P network.
References
1. Kementsietsidis, A., Arenas, M., Miller, R.J.: Mapping Data in Peer-to-Peer Sys- tems: Semantics and Algorithmic Issues. In: SIGMOD (2003)
2. Masud, M., Kiringa, I., Ural, H.: Update Propagation and Data Synchronization in Instance Mapped Peer Data Sharing Systems. In: InterDB (2007)
R. Meersman, Z. Tari, P. Herrero et al. (Eds.): OTM 2007 Workshops, Part I, LNCS 4805, pp. 9–10, 2007. © Springer-Verlag Berlin Heidelberg 2007
Translating XPath Queries into SPARQL Queries
M. Droop1, M. Flarer1, J. Groppe2, S. Groppe2, V. Linnemann2, J. Pinggera1, F. Santner1, M. Schier1, F. Schöpf1, H. Staffler1, and S. Zugal1
1 University of Innsbruck, Technikerstrasse 21a, A-6020 Innsbruck, Austria [email protected], [email protected], {Jakob.Pinggera,Florian.Santner}@student.uibk.ac.at,
[email protected], [email protected], {Hannes.Staffler, Stefan.Zugal}@student.uibk.ac.at
2 IFIS, University of Lübeck, Ratzeburger Allee 160, D-23538 Lübeck, Germany {jinghua.groppe,groppe,linnemann}@ifis.uni-luebeck.de
Extended Abstract
The W3C has developed XPath [3] as a query language for XML data. XPath is embedded in many other languages like XQuery and XSLT. The name of XPath derives from its basic concept, the path expression, with which the user can hierarchically address the nodes of the XML data. The user of XPath may not only use simple relationships like parent-child, but also more complex relationships like the descendant relationship, which is the transitive closure of the parent-child relationship. Furthermore, complex filter expressions are allowed in XPath queries.
RDF is a language for representing information about resources in the World Wide Web. SPARQL [2] supports querying RDF by triple and optional patterns, con- and disjunctions and extensible value testing.
<bookstore> <book category="CHILDREN">
<title>Harry Potter</title> <author>J. K. Rowling</author></book> <book/></bookstore>
Fig. 1. An example XML document
The translation process from XPath [3] queries into SPARQL [2] queries consists of (i) the translation of the input data from XML into RDF, (ii) the translation from the XPath query into the translated SPARQL query, and (iii) the translation of the result into a format, which is equivalent to the result of the XPath query.
Fig. 2. Transformed RDF data of Fig. 1
bookstore rel:n
relationship rrel: r
relationship rrel: r
relationship rrel: r
10 M. Droop et al.
We translate the XML data into RDF data by a depth-first traversal of the XML tree and annotate each translated node of the XML data with relationships for annotating the type of the XML node, attribute relationships, namespace relationships, parent-child relationships, its name, its value and two relationships for the usage of a numbering scheme [1] (see Fig. 1 and Fig. 2), as SPARQL queries do not allow the computation of the transitive closure, which is necessary for recursive XPath axes.
With these relationships, we can support all XPath axes in our translation scheme, as we can determine the nodes according to the basic relationships. Note that the XPath location step following::n is equivalent to ancestor-or-self::node()/following- sibling::node()/descendant-or-self::n, and the XPath location step preceding::n is equivalent to ancestor-or-self::node()/preceding-sibling::node()/descendant-or-self::n.
We use standard compiler techniques for the translation of the XPath query into the SPARQL query. See Fig. 3 for the translation of the XPath query /bookstore/parent:: node()/descendant::title/text().
PREFIX rel: <http://uibk.ac.at/relations/> PREFIX xsd:<http://www.w3.org/2001/XMLSchema#> SELECT ?v9 WHERE { ?v0 rel:type "9".
?v0 rel:child ?v1. ?v1 rel:type "1". ?v1 rel:name "bookstore". ?v2 rel:child ?v1. ?v7 rel:start ?v3. ?v2 rel:start ?v5.
?v7 rel:end ?v4. ?v2 rel:end ?v6. ?v7 rel:type "1". ?v7 rel:name "title". ?v7 rel:child ?v8. ?v8 rel:type "3". ?v8 rel:value ?v9. FILTER(xsd:long(?v6)>xsd:long(?v4)). FILTER(xsd:long(?v5)<xsd:long(?v3)).}
Fig. 3. Translated SPARQL query of /bookstore/parent::node()/descendant::title/text()
The result of a SPARQL query is a set of bindings of variables in the SELECT clause of a SPARQL query. We determine the translated SPARQL query in such a way that the retrieved bindings of the variables in the SELECT clause of the SPARQL query represent the resultant XML nodes of the original query. In the module of the translation of the result, we rebuild the subtrees of these resultant XML nodes by considering the information of the original XML tree in the RDF data. Furthermore, we sort the resultant XML trees according to the document order of the original XML tree, as the XPath language specifies the result of an XPath query to be in document order of the queried XML document.
We have developed a prototype to verify our translations and to show the practical usability. We have done a performance analysis to measure the execution times of the translations and the evaluations of the XPath query and the translated SPARQL query. The evaluation of translated SPARQL queries from XPath queries not containing a recursive axis is efficient and not significantly slower than processing the original XPath queries.
References
1. Grust, T., van Keulen, M., Teubner, J.: Accelerating XPath evaluation in any RDBMS. ACM Trans. Database Syst. 29, 91–131 (2004)
2. W3C, SPARQL Query Language for RDF, W3C Candidate Recommendation (2007) 3. W3C: XML Path Language (XPath) 2.0, W3C Recommendation (2007)
R. Meersman, Z. Tari, P. Herrero et al. (Eds.): OTM 2007 Workshops, Part I, LNCS 4805, pp. 11–12, 2007. © Springer-Verlag Berlin Heidelberg 2007
Validating a Tool for Evaluating Automatically Lexical Triples Mined from Texts
Peter Spyns
Vrije Universiteit Brussel, STAR Lab Pleinlaan 2, Gebouw G-10, B-1050 Brussel, Belgium
[email protected] http://www.starlab.vub.ac.be
Abstract. We report on an on-going effort to assess an automated ontology evaluation method that uses lexical frequencies to determine which are relevant lexical triples of a set of triples automatically mined from a textual corpus. The aim is to obtain a light-weight automatic ontology evaluation method that can be easily applied by knowledge engineers to determine whether or not the most important notions and relationships are represented in a set of ontology triples.
1 Problem
More and more ontologies are created automatically to avoid the knowledge acquisition bottleneck. The question then arises of how to enable non ontology engineering skilled individuals to estimate the “value” of ontological material generated automatically. It is our hypothesis that relatively crude evaluation methods suffice to give a general indication of how well the material fits the domain under scrutiny. But even the automated evaluation method needs to be assessed first by human experts and checked on its validity.
2 Methods
Two texts (the EU directives on privacy and VAT) have been selected to be processed by an unsupervised text miner (a combination of a shallow parser and statistically based filters built by CNTS Antwerp). Series of triples (consisting of combinations of noun phrases, verbs and prepositional phrases) have been generated. Some evaluation metrics have been defined using a simple and basic method. First the relevant terms of a text (compared to a neutral corpus) are determined. This allows us to compare the set of relevant words with the vocabulary of the triples generated by the unsupervised miner. In addition, a list of VAT terms and expressions was available to validate the set of terms retrieved automatically. Unfortunately, such a list did not exist for the Privacy domain. Afterwards, the triples themselves are scored as well. A score indicates how many characters of the three triple parts (expressed as an averaged percentage) are matched by relevant words. The evaluation methods can be kept simple and straightforward: it is only meant as a check to determine whether or not the more sophisticated text miner has done a good job. Finally, to assess the quality of
12 P. Spyns
the automatic evaluator, human experts have manually checked the outcomes (for the privacy directive). In the case of the VAT directive no experts were available, but instead the manually created list of relevant terms and expressions had to be used.
3 Discussion
The figure shows how the experiment has been set up. A problem was that the experiments could not be performed completely in parallel. Also, the Privacy experts
inter rater agreement was extremely low (due to their different background).
4 Conclusion
Even if the current experiments give a partially indecisive answer to the simple question whether the automatic evaluation procedure is up to providing a reliable indication on the quality of triples produced by a text miner, this line of research still offers further avenues of research to be explored. The results presented here can serve as a base line. The growing number of recent publications
on ontology evaluation illustrate that the topic itself is becoming a valuable research area on its own.
Acknowledgements
We gratefully thank M.-L. Reinberger (then at CNTS Antwerpen, Belgium), John Borkin (Borking Consultancy, The Netherlands) and Giles Hoghen (then at the EU JRC Ispra, Italy) and Patrick Wille (VAT@ Belgium) for their contributions.
Fig. 1. Flow of the experiment
Semi-automatic Semantic Enrichment of Raw
Sensor Data
Nicolas Legeay, Mark Roantree, Gareth J.F. Jones, Noel E. O’Connor, and Alan F. Smeaton
Adaptive Information Cluster, Dublin City University, Ireland
1 Sensor Network Background
In the XSENSE Project, we gathered a total of 6 biometric sensor data feeds from the participants in our experiments using 3 different sensor devices. These readings were taken during 33 experiments where upto 6 users watched a variety of different films and their reactions were monitored.
Polar S610iTM heart-rate monitor. This consists of a fabric band which fits around a person’s chest and detects and logs their heartrate, sampled every few seconds.
BodyMedia SenseWear R©. This sensor array is worn around the upper arm and measures and logs the following: galvanic skin response, a measure of skin conductivity which is affected by perspiration; skin temperature, which is linearly reflective of the body’s core temperature activities; heat flux which is the rate of heat being dissipated by the body; subject motion using an in-built accelerometer.
Smart Chairs. Each of the chairs used had a specially designed foam-based pressure sensor integrated into its backrest to record changes in viewer posture.
2 Managing a Large Sensor Network
In order to make the process scalable, we developed a peer-to-peer architecture where each sensor was modelled as a peer. Using XSENSE-Peer, a sensor is modelled as a peer. Peers sharing common information are grouped into a cluster and managed by a super-peer. The definition of a cluster is flexible and might contain all heart-monitor data, or all data for a specified experiment, or all experiments that contained no gender mix among the users, for example. Clusters of peers are referenced by domains. Queries are sent to chosen domains and then routed using super-peers to the appropriate clusters. In this example, we have a single domain, CDVPlex, and all clusters belong to this domain.
Each peer makes its sensor data available in the form of a service. A special client peer called a Query Peer reads XPath queries, sends them to Cluster Peers and retrieves responses. A Repository Peer receives metadata queries from both Query Peers or Cluster Peers. A Cluster Peer receives XPath Full Paper available at www.computing.dcu.ie/∼isg/technicalReport.html
R. Meersman, Z. Tari, P. Herrero et al. (Eds.): OTM 2007 Ws, Part I, LNCS 4805, pp. 13–14, 2007. c© Springer-Verlag Berlin Heidelberg 2007
14 N. Legeay et al.
queries from Query Peers and passes the query to all Data Peers in its cluster. It aggregates responses and returns the result back to the Query Peer.
1. The Query Peer passes keywords to the Repository Peer requesting ids of suitable Cluster Peers.
2. The query is sent to the ClusterPeers. 3. Cluster Peers request the ids of the Data Peers within their respective clus-
ter from the Repository Peer. This step can be eliminated by loading this information at startup but we chose to leave it in place for our experiments. This was to enable a system where sensors can come and go in a random fashion.
4. Data Peers send results to their Cluster Peers 5. Cluster Peers send the final result to the QueryPeer.
3 Experiments and Conclusions
Experiments were run on 3.2GHz Pentium IV machines, each with 1GB of RAM using the Windows XP Pro operating system and the P2P Query Processor was implemented using Java Virtual Machine (JVM) version 1.5. Each peer required a separate JVM (even on the same machine) to emulate a properly distributed environment and experiments were run three times with their times averaged to produce the final query response time. A P2P query using between 10 and 40 peers required between 2 and 10 seconds, proportional to the number of peers. We discovered that if queries used more than 50 sensor devices, some form of pre-integration or caching is recommended but where clusters are kept to a reasonable size, dynamic queries have good response times.
As sensor networks become more pervasive, the volumes of data generated will pose challenges to managing the stream of data values in an efficient, scal- able, and yet useful manner. This data will include data readings from sensing devices, such as the biometric sensing devices we have used in this paper. It will also include data values derived from analysis of raw sensed data, such as the highlights and event detection results from an audio-visual data stream which we have illustrated in this paper through our analysis of movie video. While many differing solutions exist for efficiently managing the raw data values, we are more concerned in the work reported here on allowing semantic enrichment of the raw data to take place and to facilitate subsequent high level queries. To address this we have presented and used the XSENSE architecture, extended with Peer-2-Peer concepts and implementation, to realise scalable management of sensor data at a semantic level. We have demonstrated this in operation using a dataset of 33 experiments covering 29 movies and a total of 171 sensor outputs, realising a data volume of 316 MB of raw data. Our implementation has been tested using a collection of different semantic query types and response time performance, on a standard desktop machine, has been good.
R. Meersman, Z. Tari, P. Herrero et al. (Eds.): OTM 2007 Ws, Part I, LNCS 4805, pp. 15–16, 2007. © Springer-Verlag Berlin Heidelberg 2007
Ontology Modelling for Ambient Intelligent Home Environments
Jarmo Kalaoja1, Julia Kantorovitch1, Ioanna Roussaki2, Dimitrios Tsesmetzis2, and Ioannis Papaioannou2
1 The Technical Research Centre of Finland (VTT), Kaitoväylä 1, 90570 Oulu, Finland {Julia.Kantorovitch,Jarmo.Kalaoja}@vtt.fi
2 School of Electrical & Computer Engineering, National Technical University of Athens, 9 Heroon Polytechneiou Str, 157-73 Zographou, Athens, Greece {nanario,jpapai,dtsesme}@telecom.ntua.gr
Abstract. The research work presented in this paper focuses on the ontologies necessary to describe ambient intelligent home environments.
Keywords: Ontology specification, service modelling, Intelligent Home.
1 Introduction
Ontologies are very essential for the Ambient Intelligent Home (AIH) environment. They act as the means for describing the services provided by networked devices, sensors and appliances, thus facilitating their seamless automatic communication to support the users in their everyday tasks. Even though several ongoing initiatives study the problem of ontology design in pervasive environments, numerous issues remain unresolved. The designed ontologies focus mainly on very specific service aspects, e.g. modelling context [1] or QoS related service properties [2]. The capabilities of services from different functional domains, such as personal computing (PC), mobile communications (MC), consumer electronics (CE), and home automation (HA) (i.e. domotic), are addressed in a minor degree and are not aligned with the non-functional ontologies. Minor attempts have been made to integrate the existing ontologies in AIH environments and facilitate their integration with emerging new technologies for networks, devices and software architectures and platforms. The research presented in this paper addresses the issues above and has been performed within the Amigo integrated project [3]. Utilization of ontologies in Amigo enables the effective description of the heterogeneous services and resources residing in the home. Rich representation of service capabilities with non-functional parameters, such as QoS and context, enable the automated service discovery, selection and composition. The ontology architecture is briefly discussed in the next section. The Amigo ontologies and relevant user and developer guides are available at: http://amigo.gforge.inria.fr/home/index.html.
2 The Architecture of Ontologies
The main rationale behind the overall hierarchy of the Amigo Service Description Vocabulary Ontologies (see Fig.1) is that vocabularies should support maintainability and future evolution of concepts related to Amigo or any other home environment.
16 J. Kalaoja et al.
Fig. 1. Service description vocabularies’ classification and dependencies
The Domain Vocabularies are extendable modules that provide detailed information about technologies and features of a particular class or model of a device in the home. New domain vocabularies can be added to the existing ones (i.e. PC, MC, CE and HA) to cover more device manufacturers. The main part of vocabularies belongs to the Amigo Core Domain vocabularies. Generic ontologies for various domains, such as the Foundation of Intelligent Physical Agents (FIPA) device ontology [4], may be imported or adapted by these ontologies. Furthermore, any semantic service description language such as Amigo-S [4] or OWL-S [5] can be imported. The Amigo Core Concepts layer provides a classification of concepts selected from the Amigo core domain vocabularies that have important cross-domain relations. More information about ontologies and their usage can be found in [6][7].
References
1. Sirin, E., Parsia, B., Hendler, J.: Filtering and selecting semantic web services with interactive composition techniques. IEEE Intelligent Systems 19(4), 42–49 (2004)
2. Maximilien, W.M., Singh, M.P.: A framework and ontology for dynamic web services selection. IEEE Internet Computing 8(5), 84–93 (2004)
3. Amigo Project homepage: http://www.amigoproject.org 4. Amigo Consortium, D3.2: Amigo middleware core, Prototype Implementation (2006) 5. OWL-S 1.1 Release (2004), http://www.daml.org/services/owl-s/1.1/ 6. Kalaoja, J., Kantorovitch, J., Carro, S., Miranda, J.M., Ramos, A., Parra, J.: The vocabulary
ontology engineering for the semantic modelling of home services. In: ICEIS, Funchal, Madeira - Portugal, pp. 461–466 (2006)
7. Tsesmetzis, D.T., Roussaki, I.G., Papaioannou, I.V., Anagnostou, M.E.: QoS awareness support in Web-Service semantics. In: ICIW, Guadeloupe, French Caribbean, pp. 128–134 (2006)
R. Meersman, Z. Tari, P. Herrero et al. (Eds.): OTM 2007 Ws, Part I, LNCS 4805, pp. 17–18, 2007. © Springer-Verlag Berlin Heidelberg 2007
Implementing OCL as a Database Query Language*
Piotr Habela3, Krzysztof Kaczmarski3,4, Krzysztof Stencel2, and Kazimierz Subieta1,3
1 Institute of Computer Sciences of the Polish Academy of Sciences, Warsaw, Poland 2 Institute of Informatics, Warsaw University, Warsaw, Poland
3 Polish-Japanese Institute of Information Technology, Warsaw, Poland 4 Warsaw University of Technology, Warsaw, Poland
{habela,stencel,subieta}@pjwstk.edu.pl, [email protected]
1 Introduction
The approach of model-driven software development sketches the vision of the next big step in raising the level of abstraction and flexibility of programming tools. The key expectation behind MDA is achieving a productivity gain through the automating software construction based on models. In this paper we focus on one of