The Experts below are selected from a list of 34857 Experts worldwide ranked by ideXlab platform
Peter Mika - One of the best experts on this subject based on the ideXlab platform.
-
Application of Semantic Technology for social network analysis in the sciences
Scientometrics, 2006Co-Authors: Peter Mika, Tom Elfring, Peter GroenewegenAbstract:The use of electronic data is steadily gaining ground in the study of the social organization of scientific and research communities, decreasing the researcher's reliance on commercial databases of bibliographic entries, patents grants and other manually constructed records of scientific works. In our work we provide a methodological innovation based on Semantic Technology for dealing with heterogeneity in electronic data sources. We demonstrate the use of our electronic system for data collection and aggregation through a study of the Semantic Web research community. Using methods of network analysis, we confirm the effect of Structural Holes and provide novel explanations of scientific performance based on cognitive diversity in social networks.
-
flink Semantic web Technology for the extraction and analysis of social networks
Journal of Web Semantics, 2005Co-Authors: Peter MikaAbstract:We present the Flink system for the extraction, aggregation and visualization of online social networks. Flink employs Semantic Technology for reasoning with personal information extracted from a number of electronic information sources including web pages, emails, publication archives and FOAF profiles. The acquired knowledge is used for the purposes of social network analysis and for generating a web-based presentation of the community. We demonstrate our novel method to social science based on electronic data using the example of the Semantic Web research community.
David Alsmeyer - One of the best experts on this subject based on the ideXlab platform.
-
applying Semantic Technology to a digital library a case study
Library Management, 2005Co-Authors: Paul Warren, David AlsmeyerAbstract:Purpose – To describe how Semantic knowledge Technology can be used to enhance a digital library.Design – The paper examines the main research challenges in the field of digital libraries and identifies the extent to which Semantic knowledge Technology can be used to respond to these challenges. Functionality developed within the SEKT project (http://sekt.Semanticweb.org) is used to enhance an existing digital library. The development of a good ontology is central to such an application, and the paper describes the particular ontology engineering approach adopted.Findings – Four broad challenges were identified: achieving interoperability; describing objects and repositories; managing multimedia collections; and improving user interfaces and human‐computer interaction. The SEKT digital library case study is using Semantic knowledge Technology to respond to the first two and the last of these. The paper describes how this is being done and the kind of enhanced functionality being developed.Originality/valu...
Minzhe Guo - One of the best experts on this subject based on the ideXlab platform.
-
security data mining in an ontology for vulnerability management
International Joint Conferences on Bioinformatics Systems Biology and Intelligent Computing, 2009Co-Authors: Ju An Wang, Minzhe GuoAbstract:Information security is such a complex topic that the sheer scope and volume of available security data overwhelms security professionals and managers alike. This paper discusses the rationale of applying Semantic Technology to information security with a focus on software vulnerability management. With Semantic technologies, we can describe the pattern of external threats and internal vulnerabilities formally and precisely. Based on this, we can make inference and make high-level decisions accordingly. We have constructed an ontology for security vulnerabilities, which defines the key concepts in vulnerability management and their relationships. We introduce the design and reasoning within the ontology with examples in vulnerability analysis and assessment. The result of this paper provides a promising pathway to making security automation successful through Semantic technologies.
-
IJCBS - Security Data Mining in an Ontology for Vulnerability Management
2009 International Joint Conference on Bioinformatics Systems Biology and Intelligent Computing, 2009Co-Authors: Ju An Wang, Minzhe GuoAbstract:Information security is such a complex topic that the sheer scope and volume of available security data overwhelms security professionals and managers alike. This paper discusses the rationale of applying Semantic Technology to information security with a focus on software vulnerability management. With Semantic technologies, we can describe the pattern of external threats and internal vulnerabilities formally and precisely. Based on this, we can make inference and make high-level decisions accordingly. We have constructed an ontology for security vulnerabilities, which defines the key concepts in vulnerability management and their relationships. We introduce the design and reasoning within the ontology with examples in vulnerability analysis and assessment. The result of this paper provides a promising pathway to making security automation successful through Semantic technologies.
Paul Warren - One of the best experts on this subject based on the ideXlab platform.
-
Foundations for the Web of Information and Services - Semantic Technology and Knowledge Management
Foundations for the Web of Information and Services, 2011Co-Authors: John Davies, Paul Warren, York SureAbstract:Prof. Rudi Studer has been technical director of a number of significant EU collaborative projects researching the application of Semantic Technology to Knowledge Management. In this chapter, drawing largely on work done in these projects, we provide an overview of the knowledge management problems and opportunities faced by large organisations; and indeed also shared by some smaller organisations. We show how Semantic technologies can make a significant contribution. We look at the key application areas: searching and browsing for information; sharing knowledge; supporting processes, in particular informal processes; and extracting knowledge from unstructured information. In each application area we describe some solutions, either currently available or being researched. We do this to provide examples of what is possible rather than to provide a comprehensive list. The use of ontologies as a form of knowledge representation underlies everything we talk about in the chapter. Ontologies offer expressive power; they provide flexibility, with the ability to evolve dynamically unlike typical database schemata; and they make machine reasoning possible.
-
applying Semantic Technology to a digital library a case study
Library Management, 2005Co-Authors: Paul Warren, David AlsmeyerAbstract:Purpose – To describe how Semantic knowledge Technology can be used to enhance a digital library.Design – The paper examines the main research challenges in the field of digital libraries and identifies the extent to which Semantic knowledge Technology can be used to respond to these challenges. Functionality developed within the SEKT project (http://sekt.Semanticweb.org) is used to enhance an existing digital library. The development of a good ontology is central to such an application, and the paper describes the particular ontology engineering approach adopted.Findings – Four broad challenges were identified: achieving interoperability; describing objects and repositories; managing multimedia collections; and improving user interfaces and human‐computer interaction. The SEKT digital library case study is using Semantic knowledge Technology to respond to the first two and the last of these. The paper describes how this is being done and the kind of enhanced functionality being developed.Originality/valu...
Ilaria Torre - One of the best experts on this subject based on the ideXlab platform.
-
Adaptive systems in the era of the Semantic and Social Web, a survey
User Modeling and User-Adapted Interaction, 2009Co-Authors: Ilaria TorreAbstract:Abstract In this paper we provide a classification of adaptive systems with respect to the kind of Semantic Technology they exploit\nto accomplish or improve specific adaptation and user modeling tasks. This classification is based on a distinction between\nstrong Semantic techniques and weak Semantic techniques. The former are techniques based on the Semantic Web, while the latter regard technologies that, in different ways, annotate\nresources, enriching their meaning. This second category includes, in particular, Web 2.0 social annotations and mixed approaches\nbetween social annotations and Semantic Web techniques. While the impact of the Semantic Web on adaptive systems has been\ndiscussed in several survey papers, the potential of weak Semantic technologies has, so far, received little attention. The\naim of this analysis is to fill this gap. Therefore, we will discuss contributions and limits of both approaches, but we will\nfocus special attention on weak Semantic adaptive systems.