These are the slides corresponding to the presentation done at ISWC 2013 in Sydney, for the paper with the same title. Remember to check the main URL: http://j.mp/benchmarkqueryrewriting
Legal Vocabulary and its Transformation Evaluation using Competency Questionsshashi792
This document discusses evaluating legal vocabularies using competency questions. It presents a model-driven architecture approach to represent legal knowledge using concepts, facts, and rules in a semi-formal language called SBVR. Competency questions are designed to verify the accuracy, completeness, and consistency of the legal vocabulary. The questions are translated into formal queries to check inferences from the ontology. Experimental results show how competency questions can identify incomplete or sensitive concepts. The legal rules represented semi-formally can then be mapped to formal rule languages for implementation.
The document discusses VHDL (VHSIC Hardware Description Language) and provides information on various topics related to VHDL such as the design flow, levels of abstraction, types of HDLs, comparing VHDL and Verilog, simulation vs. synthesis, logic simulation, motivation for mixed-signal microelectronics, viewing designs by chip technology, concepts of modules and chips, levels of abstraction, types of VHDL, comparing VHDL and Verilog, choosing an HDL, the IEEE standard 1164, entities, architectures, and data objects in VHDL like constants, signals, and variables.
This document provides an overview of Verilog, including:
- Verilog is a hardware description language used to model and simulate digital circuits.
- It allows designing at different levels of abstraction from transistor to system level.
- The design process involves defining specifications, simulating designs, and redesigning until the design is correct.
- Verilog has constructs for modeling delays and parallel execution unlike programs that execute serially.
- Examples of Verilog code are provided to model a multiplexer and half adder circuit.
This document outlines the course content for an even semester HDL design course. It will cover the introduction to HDL including a brief history of HDL, structure of HDL modules, operators and data types in HDL, types of HDL descriptions, and simulation and synthesis. It will also provide a brief comparison of VHDL and Verilog. The course is divided into 6 hour long units, with Unit 1 focusing on the introduction to HDL.
Modeling and Evaluation of Performance and Reliability of Component-based So...Editor IJCATR
Validation of software systems is very useful at the primary stages of their development cycle. Evaluation of functional
requirements is supported by clear and appropriate approaches, but there is no similar strategy for evaluation of non-functional requirements
(such as performance and reliability). Whereas establishing the non-functional requirements have significant effect on success of software
systems, therefore considerable necessities are needed for evaluation of non-functional requirements. Also, if the software performance has
been specified based on performance models, may be evaluated at the primary stages of software development cycle. Therefore, modeling
and evaluation of non-functional requirements in software architecture level, that are designed at the primary stages of software systems
development cycle and prior to implementation, will be very effective.
We propose an approach for evaluate the performance and reliability of software systems, based on formal models (hierarchical timed
colored petri nets) in software architecture level. In this approach, the software architecture is described by UML use case, activity and
component diagrams, then UML model is transformed to an executable model based on hierarchical timed colored petri nets (HTCPN) by a
proposed algorithm. Consequently, upon execution of an executive model and analysis of its results, non-functional requirements including
performance (such as response time) and reliability may be evaluated in software architecture level.
Se 381 - lec 26 - 26 - 12 may30 - software design - detailed design - se de...babak danyal
This document discusses detailed design in software engineering. It explains that detailed design further specifies modules identified in high-level design in an unambiguous way so they can be implemented by programmers. Module specifications can use structured English, pseudo-code, decision tables, or state transition diagrams. An example of a structured English specification for a sorting module is provided. The document also discusses when more formal methods like decision trees may be needed for complex modules.
A Lightweight Formal Encoding for a Constraint Language DSML ComponentMarc Pantel
This paper proposes a lightweight formal encoding for verifying domain-specific modeling languages (DSMLs) that use constraint languages. It presents a common formalization using WhyML to translate both the DSML elements and constraint specifications for automatic verification using SMT solvers. A case study of the BlockLibrary specification language is used to demonstrate the approach.
Legal Vocabulary and its Transformation Evaluation using Competency Questionsshashi792
This document discusses evaluating legal vocabularies using competency questions. It presents a model-driven architecture approach to represent legal knowledge using concepts, facts, and rules in a semi-formal language called SBVR. Competency questions are designed to verify the accuracy, completeness, and consistency of the legal vocabulary. The questions are translated into formal queries to check inferences from the ontology. Experimental results show how competency questions can identify incomplete or sensitive concepts. The legal rules represented semi-formally can then be mapped to formal rule languages for implementation.
The document discusses VHDL (VHSIC Hardware Description Language) and provides information on various topics related to VHDL such as the design flow, levels of abstraction, types of HDLs, comparing VHDL and Verilog, simulation vs. synthesis, logic simulation, motivation for mixed-signal microelectronics, viewing designs by chip technology, concepts of modules and chips, levels of abstraction, types of VHDL, comparing VHDL and Verilog, choosing an HDL, the IEEE standard 1164, entities, architectures, and data objects in VHDL like constants, signals, and variables.
This document provides an overview of Verilog, including:
- Verilog is a hardware description language used to model and simulate digital circuits.
- It allows designing at different levels of abstraction from transistor to system level.
- The design process involves defining specifications, simulating designs, and redesigning until the design is correct.
- Verilog has constructs for modeling delays and parallel execution unlike programs that execute serially.
- Examples of Verilog code are provided to model a multiplexer and half adder circuit.
This document outlines the course content for an even semester HDL design course. It will cover the introduction to HDL including a brief history of HDL, structure of HDL modules, operators and data types in HDL, types of HDL descriptions, and simulation and synthesis. It will also provide a brief comparison of VHDL and Verilog. The course is divided into 6 hour long units, with Unit 1 focusing on the introduction to HDL.
Modeling and Evaluation of Performance and Reliability of Component-based So...Editor IJCATR
Validation of software systems is very useful at the primary stages of their development cycle. Evaluation of functional
requirements is supported by clear and appropriate approaches, but there is no similar strategy for evaluation of non-functional requirements
(such as performance and reliability). Whereas establishing the non-functional requirements have significant effect on success of software
systems, therefore considerable necessities are needed for evaluation of non-functional requirements. Also, if the software performance has
been specified based on performance models, may be evaluated at the primary stages of software development cycle. Therefore, modeling
and evaluation of non-functional requirements in software architecture level, that are designed at the primary stages of software systems
development cycle and prior to implementation, will be very effective.
We propose an approach for evaluate the performance and reliability of software systems, based on formal models (hierarchical timed
colored petri nets) in software architecture level. In this approach, the software architecture is described by UML use case, activity and
component diagrams, then UML model is transformed to an executable model based on hierarchical timed colored petri nets (HTCPN) by a
proposed algorithm. Consequently, upon execution of an executive model and analysis of its results, non-functional requirements including
performance (such as response time) and reliability may be evaluated in software architecture level.
Se 381 - lec 26 - 26 - 12 may30 - software design - detailed design - se de...babak danyal
This document discusses detailed design in software engineering. It explains that detailed design further specifies modules identified in high-level design in an unambiguous way so they can be implemented by programmers. Module specifications can use structured English, pseudo-code, decision tables, or state transition diagrams. An example of a structured English specification for a sorting module is provided. The document also discusses when more formal methods like decision trees may be needed for complex modules.
A Lightweight Formal Encoding for a Constraint Language DSML ComponentMarc Pantel
This paper proposes a lightweight formal encoding for verifying domain-specific modeling languages (DSMLs) that use constraint languages. It presents a common formalization using WhyML to translate both the DSML elements and constraint specifications for automatic verification using SMT solvers. A case study of the BlockLibrary specification language is used to demonstrate the approach.
Kill Bill nos revela 10 claves para alcanzar objetivos de comunicación de marca u objetivos de marketing a través de medios digitales. Conocé a tu “cliente” y conócete a vos mismo, y saldrás triunfador en mil campañas. - Paráfrasis "El Arte de la Guerra" - Sun Tzu.
Jón Leifs was Iceland's greatest classical composer. He was born in Iceland in 1899 and studied and composed in Germany from 1916 to 1944, returning to Iceland for the rest of his life. Leifs composed about 70 works that drew from Icelandic folk songs and harmonic structures. His music reflected Iceland's history and struggle for independence. Some of his most famous works include the "Elegy" written for his mother, "Geysir" inspired by Icelandic geysers, and "Three Images" which depicts the Icelandic landscape. His "Saga Symphony" had five movements each dedicated to heroes from Icelandic sagas.
Mixed methods for understanding consumer behaviour: Interviews and survey in ...Kyungeun Sung
The slides presented for Research Methods Module (for MA and MSc Product Design students) at Nottingham Trent University, Nottingham, UK on 25th October 2016. This presentation shows the interrelationships between research aim, objectives, questions and matching research methods, and introduces mixed methods as an overall strategy for the PhD research. It further describes detailed design of interview and survey studies in terms of research techniques, sampling, validity and reliability, data analysis, and research procedure and instrument.
This document describes four different polka dot themed mugs or mug sets: a set of 4 clear glass mason jars with colored polka dot lids and straws; a 6.5 inch Hello Kitty mug; and a 6-piece mug stand set with a polka dot print mug. The mugs are suitable for drinking soup, coffee, and tea.
This document discusses addiction and provides a few brief points. It mentions addiction, lists some letters, and repeats another letter multiple times without providing meaningful or coherent information.
breve descripción sobre los usos de la tecnología en la educación en el siglo xxi . para mejorar procesos de enseñanza aplicables a realidad actual de los adolescentes
Nicolás Alvarado y la censura digitalPérez Esquer
El artículo discute un caso reciente de censura digital contra el periodista cultural Nicolás Alvarado. Alvarado publicó una columna criticando al cantante Juan Gabriel recién fallecido, la cual fue considerada ofensiva por muchos lectores en las redes sociales. Esto llevó a una petición en línea para despedir a Alvarado de su trabajo en la UNAM, lo cual ocurrió. El artículo argumenta que Alvarado tenía derecho a expresar su opinión libremente y que la reacción en las redes sociales y la decisión de la UNAM
El documento describe las características del edificio del IES Martínez Uribarri. El instituto tiene agujeros en las paredes, una cafetería entre la segunda y tercera planta, dos gimnasios en la planta baja (uno grande y otro pequeño), un ascensor para uso de profesores y alumnos con lesiones, y un pasillo en la entreplanta con aulas y orientación. En la planta baja, segunda y cuarta hay oficinas de conserjería, y en la primera y tercera planta trofeos y títulos del centro.
El documento describe los principios de una enseñanza centrada en el estudiante. Este tipo de enseñanza toma en cuenta las culturas y experiencias de los estudiantes, respeta sus formas de hablar y les permite construir su propio significado a partir de sus creencias y conocimientos previos. También se enfoca en ayudar a los estudiantes a desarrollar una comprensión de las disciplinas a través de actividades que transformen a los estudiantes en conocedores reflexivos sobre su propio aprendizaje.
Este documento describe cómo las organizaciones pueden pasar de los objetivos de negocio a las decisiones informadas mediante el análisis de datos. Explica que las organizaciones deben acceder a datos de múltiples fuentes, medir a lo largo del ciclo de conversión del cliente, y establecer KPI relevantes para monitorear el progreso hacia objetivos como la generación de ingresos, contactos y construcción de marca. El objetivo final es tomar mejores decisiones que impulsen el negocio.
The 7 C's of Case Management outlines essential skills for navigating the changing healthcare landscape. These include: collaboration through interprofessional teams built on trust and respect; communication through open conversations and active listening; coordination by maintaining connections across the care continuum and addressing barriers between specialties; commitment to healthcare delivery redesign and an open mindset; contributing knowledge and experience while cultivating leadership and avoiding burnout; confidence and conviction as an advocate guided by professional standards; and demonstrating compassion and caring with patients at the center of care.
The precedent study analyzes three tourism projects: El-Gouna in Egypt, Marassi Mediterranean Beach & Golf Resort in Egypt, and Sharq Village & Spa in Qatar. The analysis focuses on contextual factors, environmental aspects, attractions, conceptual approach, functional program, and target users. El-Gouna is located on islands in the Red Sea coast of Egypt and features a variety of residential neighborhoods, hotels, and open green spaces centered around mixed-use areas along the waterfront.
La hermenéutica profunda proporciona un marco metodológico para interpretar formas simbólicas de manera adecuada. Requiere que el objeto de análisis sea una construcción simbólica significativa que necesita interpretación. Este enfoque puede adaptarse para analizar ideología, cultura y comunicación masiva, y vincula otros métodos.
This document discusses and compares community policing and zero tolerance policing approaches. It outlines several benefits and disadvantages of each. Community policing is presented as generally better than zero tolerance policing as it fosters trust and partnership between police and communities. It notes that neither approach has been conclusively proven to lower crime rates on their own. The document ultimately suggests that community policing would be better suited than zero tolerance policing to address crime problems while incorporating community input and expectations.
La Unión Europea ha anunciado nuevas sanciones contra Rusia por su invasión de Ucrania. Las sanciones incluyen prohibiciones de viaje y congelamiento de activos para más funcionarios rusos, así como restricciones a las importaciones de productos rusos de acero y tecnología. Los líderes de la UE esperan que estas medidas adicionales aumenten la presión sobre Rusia para poner fin a su guerra contra Ucrania.
Este documento presenta el perfil profesional de Fernando Torres Mejía, incluyendo su educación en MBA y especialización en gerencia de negocios internacionales. Además, describe sus habilidades en áreas financieras y comerciales como presupuestos, proyecciones financieras y análisis de riesgos. Luego, presenta información sobre diferentes métodos de valoración de empresas, incluyendo balances, estados de resultados, flujos de efectivo descontados y creación de valor económico.
Slides used in my thesis defense/viva. Relevant links:
http://oa.upm.es/39348/
https://bitbucket.org/jmora/thesis
https://bitbucket.org/jmora/kyrie
https://bitbucket.org/jmora/kyrie-aux
The document discusses a software engineering methodology for designing hardware applications targeting reconfigurable architectures (RAs). It presents an object-oriented design flow called MADEO that allows applying software techniques like simulation, testing, and debugging. The flow includes modeling RAs and applications, multi-level simulation from behavioral to hardware, and interfacing with third-party EDA tools through code generation.
Kill Bill nos revela 10 claves para alcanzar objetivos de comunicación de marca u objetivos de marketing a través de medios digitales. Conocé a tu “cliente” y conócete a vos mismo, y saldrás triunfador en mil campañas. - Paráfrasis "El Arte de la Guerra" - Sun Tzu.
Jón Leifs was Iceland's greatest classical composer. He was born in Iceland in 1899 and studied and composed in Germany from 1916 to 1944, returning to Iceland for the rest of his life. Leifs composed about 70 works that drew from Icelandic folk songs and harmonic structures. His music reflected Iceland's history and struggle for independence. Some of his most famous works include the "Elegy" written for his mother, "Geysir" inspired by Icelandic geysers, and "Three Images" which depicts the Icelandic landscape. His "Saga Symphony" had five movements each dedicated to heroes from Icelandic sagas.
Mixed methods for understanding consumer behaviour: Interviews and survey in ...Kyungeun Sung
The slides presented for Research Methods Module (for MA and MSc Product Design students) at Nottingham Trent University, Nottingham, UK on 25th October 2016. This presentation shows the interrelationships between research aim, objectives, questions and matching research methods, and introduces mixed methods as an overall strategy for the PhD research. It further describes detailed design of interview and survey studies in terms of research techniques, sampling, validity and reliability, data analysis, and research procedure and instrument.
This document describes four different polka dot themed mugs or mug sets: a set of 4 clear glass mason jars with colored polka dot lids and straws; a 6.5 inch Hello Kitty mug; and a 6-piece mug stand set with a polka dot print mug. The mugs are suitable for drinking soup, coffee, and tea.
This document discusses addiction and provides a few brief points. It mentions addiction, lists some letters, and repeats another letter multiple times without providing meaningful or coherent information.
breve descripción sobre los usos de la tecnología en la educación en el siglo xxi . para mejorar procesos de enseñanza aplicables a realidad actual de los adolescentes
Nicolás Alvarado y la censura digitalPérez Esquer
El artículo discute un caso reciente de censura digital contra el periodista cultural Nicolás Alvarado. Alvarado publicó una columna criticando al cantante Juan Gabriel recién fallecido, la cual fue considerada ofensiva por muchos lectores en las redes sociales. Esto llevó a una petición en línea para despedir a Alvarado de su trabajo en la UNAM, lo cual ocurrió. El artículo argumenta que Alvarado tenía derecho a expresar su opinión libremente y que la reacción en las redes sociales y la decisión de la UNAM
El documento describe las características del edificio del IES Martínez Uribarri. El instituto tiene agujeros en las paredes, una cafetería entre la segunda y tercera planta, dos gimnasios en la planta baja (uno grande y otro pequeño), un ascensor para uso de profesores y alumnos con lesiones, y un pasillo en la entreplanta con aulas y orientación. En la planta baja, segunda y cuarta hay oficinas de conserjería, y en la primera y tercera planta trofeos y títulos del centro.
El documento describe los principios de una enseñanza centrada en el estudiante. Este tipo de enseñanza toma en cuenta las culturas y experiencias de los estudiantes, respeta sus formas de hablar y les permite construir su propio significado a partir de sus creencias y conocimientos previos. También se enfoca en ayudar a los estudiantes a desarrollar una comprensión de las disciplinas a través de actividades que transformen a los estudiantes en conocedores reflexivos sobre su propio aprendizaje.
Este documento describe cómo las organizaciones pueden pasar de los objetivos de negocio a las decisiones informadas mediante el análisis de datos. Explica que las organizaciones deben acceder a datos de múltiples fuentes, medir a lo largo del ciclo de conversión del cliente, y establecer KPI relevantes para monitorear el progreso hacia objetivos como la generación de ingresos, contactos y construcción de marca. El objetivo final es tomar mejores decisiones que impulsen el negocio.
The 7 C's of Case Management outlines essential skills for navigating the changing healthcare landscape. These include: collaboration through interprofessional teams built on trust and respect; communication through open conversations and active listening; coordination by maintaining connections across the care continuum and addressing barriers between specialties; commitment to healthcare delivery redesign and an open mindset; contributing knowledge and experience while cultivating leadership and avoiding burnout; confidence and conviction as an advocate guided by professional standards; and demonstrating compassion and caring with patients at the center of care.
The precedent study analyzes three tourism projects: El-Gouna in Egypt, Marassi Mediterranean Beach & Golf Resort in Egypt, and Sharq Village & Spa in Qatar. The analysis focuses on contextual factors, environmental aspects, attractions, conceptual approach, functional program, and target users. El-Gouna is located on islands in the Red Sea coast of Egypt and features a variety of residential neighborhoods, hotels, and open green spaces centered around mixed-use areas along the waterfront.
La hermenéutica profunda proporciona un marco metodológico para interpretar formas simbólicas de manera adecuada. Requiere que el objeto de análisis sea una construcción simbólica significativa que necesita interpretación. Este enfoque puede adaptarse para analizar ideología, cultura y comunicación masiva, y vincula otros métodos.
This document discusses and compares community policing and zero tolerance policing approaches. It outlines several benefits and disadvantages of each. Community policing is presented as generally better than zero tolerance policing as it fosters trust and partnership between police and communities. It notes that neither approach has been conclusively proven to lower crime rates on their own. The document ultimately suggests that community policing would be better suited than zero tolerance policing to address crime problems while incorporating community input and expectations.
La Unión Europea ha anunciado nuevas sanciones contra Rusia por su invasión de Ucrania. Las sanciones incluyen prohibiciones de viaje y congelamiento de activos para más funcionarios rusos, así como restricciones a las importaciones de productos rusos de acero y tecnología. Los líderes de la UE esperan que estas medidas adicionales aumenten la presión sobre Rusia para poner fin a su guerra contra Ucrania.
Este documento presenta el perfil profesional de Fernando Torres Mejía, incluyendo su educación en MBA y especialización en gerencia de negocios internacionales. Además, describe sus habilidades en áreas financieras y comerciales como presupuestos, proyecciones financieras y análisis de riesgos. Luego, presenta información sobre diferentes métodos de valoración de empresas, incluyendo balances, estados de resultados, flujos de efectivo descontados y creación de valor económico.
Slides used in my thesis defense/viva. Relevant links:
http://oa.upm.es/39348/
https://bitbucket.org/jmora/thesis
https://bitbucket.org/jmora/kyrie
https://bitbucket.org/jmora/kyrie-aux
The document discusses a software engineering methodology for designing hardware applications targeting reconfigurable architectures (RAs). It presents an object-oriented design flow called MADEO that allows applying software techniques like simulation, testing, and debugging. The flow includes modeling RAs and applications, multi-level simulation from behavioral to hardware, and interfacing with third-party EDA tools through code generation.
This document discusses program analysis and transformation. It covers static and dynamic analysis, extracting entities and relationships from source code, different representations of extracted information including abstract syntax trees, and challenges with program analysis and instrumentation for dynamic analysis. It also discusses different types of program transformations and tools used for transformation.
Analysing plc software: A SEMANTIC WEB POWERED FRAMEWORK FOR EVALUATING CONTR...Akashdeep Singh
A presentation based on Feldmann, S., Hauer, F., Ulewicz, S. and Vogel-Heuser, B., 2016, June. Analysis framework for evaluating PLC software: An application of Semantic Web technologies. In 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE) (pp. 1048-1054). IEEE
The document discusses various software metrics that can be used to measure attributes of software products and processes. It describes metrics for size (e.g. lines of code), complexity (e.g. cyclomatic complexity), quality (e.g. defects per KLOC), design (e.g. coupling and cohesion), and object-oriented software (e.g. weighted methods per class). The goals of metrics include estimating costs, evaluating quality, and improving processes and products.
Process Mining and Predictive Process MonitoringMarlon Dumas
This document discusses process mining and predictive process monitoring. It begins with an overview of offline process mining techniques like process discovery, conformance checking, and deviance mining. It then discusses applying these techniques online for predictive process monitoring, including predicting outcomes, deviations, or failures. Various techniques are presented like nearest neighbor classification of partial traces and clustering traces before classification. The goal is to accurately predict outcomes during process execution based on control flow, data attributes, and textual case data.
Tool-Driven Technology Transfer in Software EngineeringHeiko Koziolek
This talk presentst the tool-driven technology transfer process ABB Corporate Research applies in selected software engineering University collaborations. As an example, we have created an add-in to a popular UML tool and developed the tooling in close interaction with the target users. Centering the technology transfer around tool implementations brings many benefits such as the need to make conceptual contributions applicable and the ability to quickly benefit from the new concepts. A challenge to this form of technology transfer is the long-term commitment to the maintenance of the tooling, which we try to address by creating an open developer community. Tool-driven technology transfer projects have proven to be valuable a instrument of bringing advanced software engineering technologies into our organization.
An integrated Solver Manager: using R and Python for energy systems optimizationEmilio L. Cano
1) Decision support systems are needed to address new challenges for building managers around energy planning given global changes and local needs.
2) A Solver Manager was developed to integrate optimization models and solvers in a flexible and extensible way for use in decision support systems.
3) An example energy systems optimization model is presented involving minimizing costs subject to capacity and demand constraints. The model is specified, an instance is generated with data, and the solution is obtained.
The document presents an approach called Convolutional Analysis of code Metrics Evolution (CAME) that uses a convolutional neural network to detect anti-patterns by analyzing the historical evolution of source code metrics at the class level. An evaluation on 7 open-source systems shows that considering longer histories of metrics improves detection performance and that CAME outperforms other machine learning and anti-pattern detection techniques in terms of precision, recall, and F-measure.
The presentation provides an overview of behavioral synthesis and SystemC. It discusses what behavioral synthesis is, the synthesis process which includes data flow optimization, scheduling, clustering, allocation and binding, and control logic generation. It notes some limitations of behavioral synthesis. It then defines SystemC as a C++ library with HDL features that allows modeling concurrent processes using plain C++ syntax. It outlines some key features of SystemC like modules, ports, processes and channels.
This document discusses the Dynamic Reconfigurability in Embedded System Design (DRESD) project. It provides an overview of the DRESD philosophy, team structure and partnerships. It also describes some of the key areas of research within the project, including reconfiguration principles, the Earendil design flow, and example projects exploring reconfigurable hardware and simulation frameworks.
The document discusses Open-DO, an open source initiative for developing safety-critical software. It provides an overview of Open-DO concepts like FLOSS, agile development practices, and high-integrity certification. Updates on Open-DO include new community projects, conferences, and tools to support qualifications. Formal methods like Couverture and Hi-Lite are presented as ways to verify properties and generate verification conditions for proof.
From time to time, there is a need to modify information systems due to changes in legislation (like SOX), standards, currency change (like the euro), and more. These types of changes have a substantial impact on many components of an information system and therefore contain a high risk factor.
LOGIC OPTIMIZATION USING TECHNOLOGY INDEPENDENT MUX BASED ADDERS IN FPGAVLSICS Design
Adders form an almost obligatory component of every contemporary integrated circuit. The prerequisite of the adder is that it is primarily fast and secondarily efficient in terms of power consumption and chip area. Therefore, careful optimization of the adder is of the greatest importance. This optimization can be attained
in two levels; it can be circuit or logic optimization. In circuit optimization the size of transistors are manipulated, where as in logic optimization the Boolean equations are rearranged (or manipulated) to optimize speed, area and power consumption. This paper focuses the optimization of adder through technology independent mapping. The work presents 20 different logical construction of 1-bit adder cell in CMOS logic and its performance is analyzed in terms of transistor count, delay and power dissipation. These performance issues are analyzed through Tanner EDA with TSMC MOSIS 250nm technology. From this analysis the optimized equation is chosen to construct a full adder circuit in terms of multiplexer. This logic optimized multiplexer based adders are incorporated in selected existing adders like ripple carry
adder, carry look-ahead adder, carry skip adder, carry select adder, carry increment adder and carry save adder and its performance is analyzed in terms of area (slices used) and maximum combinational path delay as a function of size. The target FPGA device chosen for the implementation of these adders was Xilinx ISE 12.1 Spartan3E XC3S500-5FG320. Each adder type was implemented with bit sizes of: 8, 16, 32, 64 bits. This variety of sizes will provide with more insight about the performance of each adder in terms of area and delay as a function of size.
This document discusses correctness in benchmarking RDF stream processors. It proposes a common model for the operational semantics of these systems called CSR and an extension to an existing benchmark called CSR-bench that focuses on correctness. CSR-bench includes an oracle to automatically validate correctness and a test suite. Experiments with three systems showed incorrect behaviors related to window initialization, slide parameters, window contents and timestamps. The work aims to improve understanding and assessment of these systems through a shared test environment.
The document provides advice for becoming a better programmer based on experience and theory. It discusses maintaining good code quality through principles like DRY (Don't Repeat Yourself), orthogonality, reversibility, prototyping, and domain-specific languages. Specific techniques mentioned include refactoring, testing, modularity, learning new skills regularly, and critically analyzing information to avoid hype. The goal is to produce good-enough software through an iterative process while fighting software entropy.
The document discusses some of the promises and perils of mining software repositories like Git and GitHub for research purposes. It notes that while these sources contain rich data on software development, there are also challenges to consider. For example, decentralized version control systems like Git allow private collaboration that may be missed. And most GitHub projects are personal and inactive, while it is also used for storage and hosting. The document recommends researchers approach these data sources carefully and provides lessons on how to properly analyze and interpret the data from repositories like Git and GitHub.
AN IC THAT CONTAINS LARGE NUMBERS OF GATES, FLIP-FLOPS, ETC.
THAT CAN BE CONFIGURED BY THE USER TO PERFORM DIFFERENT
FUNCTIONS IS CALLED A PROGRAMMABLE LOGIC DEVICE (PLD). A
PROGRAMMABLE LOGIC DEVICE IS AN ELECTRONIC COMPONENT USED TO
BUILD RECONFIGURABLE DIGITAL CIRCUITS. UNLIKE INTEGRATED CIRCUITS
WHICH CONSIST OF LOGIC GATES AND HAVE A FIXED FUNCTION, A PLD HAS
AN UNDEFINED FUNCTION AT THE TIME OF MANUFACTURE. IT PERMITS
ELABORATE DIGITAL LOGIC DESIGNS TO BE IMPLEMENTED BY THE USER ON
A SINGLE DEVICE. THE INTERNAL LOGIC GATES AND/OR CONNECTIONS OF
PLDS CAN BE CHANGED/CONFIGURED BY A PROGRAMMING PROCESS.
The document discusses various techniques for measuring requirements engineering processes, including size estimation methods like lines of code and function points. It also covers complexity measures like cyclomatic complexity that evaluate the logical complexity of a program based on its flow graph. Finally, it evaluates the different measurement methods in terms of how they are affected by cost, time, quality, and functionality.
Similaire à Towards a systematic benchmarking of ontology-based query rewriting systems (20)
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Towards a systematic benchmarking of ontology-based query rewriting systems
1. Introduction
State of the art
Analysis
Results
Conclusions
References
T OWARDS A SYSTEMATIC BENCHMARKING OF
ONTOLOGY- BASED QUERY REWRITING SYSTEMS
´
Jos´ Mora and Oscar Corcho
e
{jmora, ocorcho}@fi.upm.es
http://j.mp/benchmarkqueryrewriting
Sydney - October 25, 2013
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
1 / 21
2. Introduction
State of the art
Analysis
Results
Conclusions
References
WARNING
Before we start:
This is an evaluation paper
There are many acronyms, sorry for that...
Extensive state of the art, short slides
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
2 / 21
3. Introduction
State of the art
Analysis
Results
Conclusions
References
I NDEX
1
I NTRODUCTION
2
S TATE OF THE ART
3
A NALYSIS
4
R ESULTS
5
C ONCLUSIONS
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
3 / 21
4. Introduction
State of the art
Analysis
Results
Conclusions
References
OBDA I DEA
query
jmora@fi.upm.es
ontology
Evaluating OBDA query rewriting
data source
Sydney - October 25, 2013
4 / 21
5. Introduction
State of the art
Analysis
Results
Conclusions
References
A PPROACH
query
ontology
rewritten
query
jmora@fi.upm.es
REWRITING
data source
Evaluating OBDA query rewriting
Sydney - October 25, 2013
5 / 21
6. Introduction
State of the art
Analysis
Results
Conclusions
References
E XAMPLE
query
Q(x) <- Person(x)
REWRITING
rewritten
query
ontology
Student
Person
Q(x) <- Person(x)
Q(x) <- Student(x)
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
6 / 21
7. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONTEXT
ontology
REWRITING
rewritten
query
translated
results
jmora@fi.upm.es
Evaluating OBDA query rewriting
translated
query
data source
query
translation
query
execution
translation
results
Sydney - October 25, 2013
7 / 21
8. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONTEXT
ontology
REWRITING
rewritten
query
translated
results
jmora@fi.upm.es
Evaluating OBDA query rewriting
translated
query
data source
query
translation
query
execution
translation
results
Sydney - October 25, 2013
7 / 21
9. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONTEXT
ontology
REWRITING
rewritten
query
translated
results
jmora@fi.upm.es
Evaluating OBDA query rewriting
translated
query
data source
query
translation
query
execution
translation
results
Sydney - October 25, 2013
7 / 21
10. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONTEXT
rewritten
query
translation
translated
query
EBox
data source
query
execution
translated
results
jmora@fi.upm.es
REWRITING
query
ontology
translation
results
Evaluating OBDA query rewriting
Sydney - October 25, 2013
7 / 21
11. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONTEXT
rewritten
query
translation
translated
query
Mappings
data source
query
execution
translated
results
jmora@fi.upm.es
REWRITING
query
ontology
ontology
ontology
ontology
translation
results
Evaluating OBDA query rewriting
Sydney - October 25, 2013
7 / 21
12. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONTEXT
ontology
REWRITING
rewritten
query
to analyse
jmora@fi.upm.es
translated
results
Evaluating OBDA query rewriting
translated
query
data source
query
translation
query
execution
translation
results
Sydney - October 25, 2013
7 / 21
13. Introduction
State of the art
Analysis
Results
Conclusions
References
F OCUSING
query
REWRITING
ontology
rewritten
query
to analyse
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
8 / 21
14. Introduction
State of the art
Analysis
Results
Conclusions
References
Horn
-S H I
g ±2
Data
lo
IO ¬
E LH
Rapi
d’s
iteR
DL-L
iteF
DL-L
axiom1
B1 B2 , B1 ¬B2 3
≥ 2R1 ⊥
R1 R2 , R1 ¬R2
B1 ∃R1 , ∃R1 B1
B1 ∃R1 .B2
∃R1 .B1 B2
B1 B2 B3
{a} B, B {a}, B(a)
n-ary predicates
trans(R1 )
B1 ∀R1 .B2 , B1 ≤ 1R1 .B2
DL-L
logic
iteco
r
e
Q
L OGICS
1 here
Bi represents a basic concept and Rj a role that may be basic or inverted.
implemented in Nyaya
3 note that some systems implementing negation assume a consistent ABox
2 as
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
9 / 21
15. Introduction
State of the art
Analysis
Results
Conclusions
References
S YSTEMS
System
Quonto
REQUIEM
Presto
Rapid
Nyaya
Venetis’
Prexto
Clipper
kyrie
4 Close
Input
DL-LiteR
ELHIO¬
DL-LiteR
DL-LiteR 4
Datalog±
DL-LiteR
DL-LiteR and EBox
Horn-SHIQ
ELHIO¬
to OWL2 QL, B1
jmora@fi.upm.es
Output
UCQ
Datalog or UCQ
Datalog
Datalog or UCQ
UCQ
UCQ
Datalog or UCQ
Datalog
Datalog or UCQ
Reference
Calvanese et al. (2007)
P´ rez-Urbina et al. (2009)
e
Rosati and Almatelli (2010)
Chortaras et al. (2011)
Gottlob et al. (2011)
Venetis et al. (2011)
Rosati (2012)
Eiter et al. (2012)
Mora and Corcho (2013)
∃R.B2 axioms are supported
Evaluating OBDA query rewriting
Sydney - October 25, 2013
10 / 21
16. Introduction
State of the art
Analysis
Results
Conclusions
References
G OALS
We analyse this context and available assets to
1. obtain a set of dimensions
2. describe current evaluations, systems and user needs
3. facilitate the construction and expansion of benchmarks
4. choose the system that addresses best one or several given use cases
5. detect the most relevant limitations in the state of the art and
6. address these limitations
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
11 / 21
17. Introduction
State of the art
Analysis
Results
Conclusions
References
G OALS
We analyse this context and available assets to
1. obtain a set of dimensions
2. describe current evaluations, systems and user needs
3. facilitate the construction and expansion of benchmarks
4. choose the system that addresses best one or several given use cases
5. detect the most relevant limitations in the state of the art and
6. address these limitations
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
11 / 21
18. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
19. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
20. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
21. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
22. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
23. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
24. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
25. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
26. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
27. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
28. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
29. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
30. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
31. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
32. Introduction
State of the art
Analysis
Results
Conclusions
References
D IMENSIONS
Expressiveness in tests: traditionally DL-LiteR
Most expressive logic in the intersection of all systems
Systems that handle more expressive logics cannot show their full potential
Expressiveness lost in translation to Datalog
How expressive are the ontologies for OBDA?
Consequences of not covered expressiveness on precision and completeness
Output complexity: apples, oranges and pears
How to compare UCQs and Datalog programs?
Characteristics of the system that is going to execute them
Input complexity: treat with care
What kind of queries can be processed?
What kind of queries do we want to process?
Additional inputs: to each one its own
EBox, cache of previous queries, etc.
Comparison among systems and comparison with RealityTM
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
12 / 21
33. Introduction
State of the art
Analysis
Results
Conclusions
References
A SSETS
Several assets used for evaluation5
Usual ontologies (A, AX, P1, P5, P5X, S, U, UX, V)
Not so usual ontologies (core, galen-lite)
New ontologies (AXE, AXEb, P5XE, UXE)
Usually with 5 queries, but up to 9 in some cases
5 available
here: http://j.mp/benchmarkqueryrewriting
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
13 / 21
34. Introduction
State of the art
Analysis
Results
Conclusions
References
A SSETS
Several assets used for evaluation5
Usual ontologies (A, AX, P1, P5, P5X, S, U, UX, V)
Not so usual ontologies (core, galen-lite)
New ontologies (AXE, AXEb, P5XE, UXE)
Usually with 5 queries, but up to 9 in some cases
5 available
here: http://j.mp/benchmarkqueryrewriting
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
13 / 21
35. Introduction
State of the art
Analysis
Results
Conclusions
References
A SSETS
Several assets used for evaluation5
Usual ontologies (A, AX, P1, P5, P5X, S, U, UX, V)
Not so usual ontologies (core, galen-lite)
New ontologies (AXE, AXEb, P5XE, UXE)
Usually with 5 queries, but up to 9 in some cases
5 available
here: http://j.mp/benchmarkqueryrewriting
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
13 / 21
36. Introduction
State of the art
Analysis
Results
Conclusions
References
A SSETS
Several assets used for evaluation5
Usual ontologies (A, AX, P1, P5, P5X, S, U, UX, V)
Not so usual ontologies (core, galen-lite)
New ontologies (AXE, AXEb, P5XE, UXE)
Usually with 5 queries, but up to 9 in some cases
5 available
here: http://j.mp/benchmarkqueryrewriting
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
13 / 21
37. Introduction
State of the art
Analysis
Results
Conclusions
References
A SSETS
Several assets used for evaluation5
Usual ontologies (A, AX, P1, P5, P5X, S, U, UX, V)
Not so usual ontologies (core, galen-lite)
New ontologies (AXE, AXEb, P5XE, UXE)
Usually with 5 queries, but up to 9 in some cases
5 available
here: http://j.mp/benchmarkqueryrewriting
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
13 / 21
38. Introduction
State of the art
Analysis
Results
Conclusions
References
E XPERIMENTAL SETUP
Intel Core2 6300@1.86GHz, 2GB of RAM
Running queries 5 times, results averaged
Cold runs of the systems
Measuring the time for the rewriting
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
14 / 21
43. Introduction
State of the art
Analysis
Results
Conclusions
References
R E - FOCUSING
query
REWRITING
ontology
rewritten
query
to analyse
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
17 / 21
44. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
45. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
46. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
47. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
48. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
49. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
50. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
51. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
52. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
53. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
54. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
55. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
56. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS I
A benchmark should consider how the input represents reality wrt:
queries
syntax (=, COUNT, MAX, ...)
expressiveness (CQ, UCQ, comparisons, arithmetic operations, ...)
shape (star shaped, linear, cyclic, ...)
size (number of atoms, number of clauses, triples...)
ontologies
expressiveness (from DL-LiteR to...)
shape (flat, hierarchical, cyclic ...)
size (number of concepts, properties, individuals, ...)
Additional information
mappings
ABox dependencies / EBox
caching for several queries
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
18 / 21
57. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS II
A benchmark should consider what the output means wrt:
Shape of rewritten queries
expressiveness
types of clauses
syntax with special characteristics
Size of rewritten queries
number of clauses
number of atoms (and distinct atoms)
number of joins
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
19 / 21
58. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS II
A benchmark should consider what the output means wrt:
Shape of rewritten queries
expressiveness
types of clauses
syntax with special characteristics
Size of rewritten queries
number of clauses
number of atoms (and distinct atoms)
number of joins
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
19 / 21
59. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS II
A benchmark should consider what the output means wrt:
Shape of rewritten queries
expressiveness
types of clauses
syntax with special characteristics
Size of rewritten queries
number of clauses
number of atoms (and distinct atoms)
number of joins
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
19 / 21
60. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS II
A benchmark should consider what the output means wrt:
Shape of rewritten queries
expressiveness
types of clauses
syntax with special characteristics
Size of rewritten queries
number of clauses
number of atoms (and distinct atoms)
number of joins
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
19 / 21
61. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS II
A benchmark should consider what the output means wrt:
Shape of rewritten queries
expressiveness
types of clauses
syntax with special characteristics
Size of rewritten queries
number of clauses
number of atoms (and distinct atoms)
number of joins
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
19 / 21
62. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS II
A benchmark should consider what the output means wrt:
Shape of rewritten queries
expressiveness
types of clauses
syntax with special characteristics
Size of rewritten queries
number of clauses
number of atoms (and distinct atoms)
number of joins
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
19 / 21
63. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS II
A benchmark should consider what the output means wrt:
Shape of rewritten queries
expressiveness
types of clauses
syntax with special characteristics
Size of rewritten queries
number of clauses
number of atoms (and distinct atoms)
number of joins
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
19 / 21
64. Introduction
State of the art
Analysis
Results
Conclusions
References
C ONCLUSIONS II
A benchmark should consider what the output means wrt:
Shape of rewritten queries
expressiveness
types of clauses
syntax with special characteristics
Size of rewritten queries
number of clauses
number of atoms (and distinct atoms)
number of joins
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
19 / 21
65. Introduction
State of the art
Analysis
Results
Conclusions
References
R EFERENCES I
Diego Calvanese, Giuseppe De Giacomo, Domenico Lembo, Maurizio Lenzerini, and Riccardo Rosati. Tractable reasoning and efficient query answering in
description logics: The DL-Lite family. Journal of Automated Reasoning, 39(3):385–429, October 2007. doi: 10.1007/s10817- 007- 9078- x. URL
http://dx.doi.org/10.1007/s10817- 007- 9078- x.
Alexandros Chortaras, Despoina Trivela, and Giorgos Stamou. Optimized query rewriting for OWL 2 QL. In Nikolaj Bjørner and Viorica
Sofronie-Stokkermans, editors, Automated Deduction – CADE-23, volume 6803, pages 192–206. Springer Berlin Heidelberg, Berlin, Heidelberg, 2011.
ISBN 978-3-642-22437-9. URL http://www.springerlink.com/content/g8153m783k638210/.
Thomas Eiter, Magdalena Ortiz, Mantas vSimkus, Trung-Kien Tran, and Guohui Xiao. Query rewriting for horn-SHIQ plus rules. In Proc. of the 26th AAAI
Conference on Artificial Intelligence, AAAI, 2012. URL
http://www.aaai.org/ocs/index.php/AAAI/AAAI12/paper/viewPDFInterstitial/4931/5263.
Georg Gottlob, Giorgio Orsi, and Andreas Pieris. Ontological queries: Rewriting and optimization (extended version). arXiv:1112.0343, December 2011.
URL http://arxiv.org/abs/1112.0343.
Jose Mora and Oscar Corcho. Engineering optimisations in query rewriting for OBDA. In Proceedings of the 9th International Conference on Semantic Systems,
ICPS, pages 41–48, Graz, Austria, September 2013. ACM.
H´ ctor P´ rez-Urbina, Ian Horrocks, and Boris Motik. Efficient query answering for OWL 2. In The Semantic Web - ISWC 2009, volume 5823 of Lecture Notes in
e
e
Computer Science, pages 489–504. Springer, 2009. URL http://dx.doi.org/10.1007/978- 3- 642- 04930- 9_31.
Riccardo Rosati. Prexto: Query rewriting under extensional constraints in DL-Lite. In Elena Simperl, Philipp Cimiano, Axel Polleres, Oscar Corcho, and
Valentina Presutti, editors, The Semantic Web: Research and Applications, volume 7295 of Lecture Notes in Computer Science, pages 360–374. Springer Berlin
/ Heidelberg, 2012. ISBN 978-3-642-30283-1. URL http://www.springerlink.com/content/1j61g52j78525175/abstract/.
Riccardo Rosati and Alessandro Almatelli. Improving query answering over DL-Lite ontologies. In Fangzhen Lin, Ulrike Sattler, and Miroslaw
Truszczynski, editors, Proceedings of the Twelfth International Conference on the Principles of Knowledge Representation and Reasoning. AAAI Press, 2010. URL
http://dblp.uni- trier.de/db/conf/kr/kr2010.html.
T. Venetis, G. Stoilos, and G. Stamou. Query rewriting under query extensions for OWL 2 QL ontologies. In The 7th International Workshop on Scalable
Semantic Web Knowledge Base Systems (SSWS 2011), page 59, 2011. URL
http://iswc2011.semanticweb.org/fileadmin/iswc/Papers/Workshops/SSWS/SSWS2011- Proceedings.pdf.
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
20 / 21
66. Introduction
State of the art
Analysis
Results
Conclusions
References
T OWARDS A SYSTEMATIC BENCHMARKING OF
ONTOLOGY- BASED QUERY REWRITING SYSTEMS
´
Jos´ Mora and Oscar Corcho
e
{jmora, ocorcho}@fi.upm.es
http://j.mp/benchmarkqueryrewriting
Sydney - October 25, 2013
jmora@fi.upm.es
Evaluating OBDA query rewriting
Sydney - October 25, 2013
21 / 21