SlideShare una empresa de Scribd logo
1 de 35
A quick ‘n easy intro to LKIF Core Rinke Hoekstra
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LKIF-Core ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Principled Design ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Middle-out Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object]
LKIF-Core Scores ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LKIF-Core Modules (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top level ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mereology (1): Concepts
Mereology (2): Relations
Time (1): Concepts ,[object Object]
Time (2): Relations
Place (1): Concepts ,[object Object]
Place (2): Relations
Process (1): Concepts
Process (2): Relations
Basic level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Action (1): Agent
Action (2): Action
Role (1): Three types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Role (2): Overview
Expression (1): Proposition and Medium ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Expression (2): PA’s and Qualifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Expression (3): Epistemic Roles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Expression (4): Relations
Legal level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Norm (1): Norms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Norm (2): Normatively Qualified
Norm (3): Legal Sources
Legal Action
Frameworks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Modification
Rules (& Epistemic Roles)
Problematic Things ,[object Object],[object Object],[object Object],[object Object]
TODO’s & Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

Similar a Leibniz Meeting 20070405

Prior to beginning work on this discussion read Hill (2013) Partner.docx
Prior to beginning work on this discussion read Hill (2013) Partner.docxPrior to beginning work on this discussion read Hill (2013) Partner.docx
Prior to beginning work on this discussion read Hill (2013) Partner.docx
keilenettie
 
Prior to beginning work on this discussion read Hill (2013) Partn.docx
Prior to beginning work on this discussion read Hill (2013) Partn.docxPrior to beginning work on this discussion read Hill (2013) Partn.docx
Prior to beginning work on this discussion read Hill (2013) Partn.docx
arleanemlerpj
 
I need about 120 words for each question and prefer to have each que.docx
I need about 120 words for each question and prefer to have each que.docxI need about 120 words for each question and prefer to have each que.docx
I need about 120 words for each question and prefer to have each que.docx
florriezhamphrey3065
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
jakeomoore75037
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organ
lauricesatu
 
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxIDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
alanrgibson41217
 
Norms in Multi Agent Systems
Norms in Multi Agent SystemsNorms in Multi Agent Systems
Norms in Multi Agent Systems
harrikipper
 
Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
mattjtoni51554
 
Planning, Negotiating & Implementation Assignment
Planning, Negotiating & Implementation Assignment                 Planning, Negotiating & Implementation Assignment
Planning, Negotiating & Implementation Assignment
dessiechisomjj4
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
jeanettehully
 
13 Leadership EthicsDescriptionThis chapter is different from .docx
13 Leadership EthicsDescriptionThis chapter is different from .docx13 Leadership EthicsDescriptionThis chapter is different from .docx
13 Leadership EthicsDescriptionThis chapter is different from .docx
drennanmicah
 
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docxSTEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
whitneyleman54422
 
This assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docxThis assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docx
gasciognecaren
 
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docxRUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
toddr4
 

Similar a Leibniz Meeting 20070405 (20)

Prior to beginning work on this discussion read Hill (2013) Partner.docx
Prior to beginning work on this discussion read Hill (2013) Partner.docxPrior to beginning work on this discussion read Hill (2013) Partner.docx
Prior to beginning work on this discussion read Hill (2013) Partner.docx
 
Prior to beginning work on this discussion read Hill (2013) Partn.docx
Prior to beginning work on this discussion read Hill (2013) Partn.docxPrior to beginning work on this discussion read Hill (2013) Partn.docx
Prior to beginning work on this discussion read Hill (2013) Partn.docx
 
I need about 120 words for each question and prefer to have each que.docx
I need about 120 words for each question and prefer to have each que.docxI need about 120 words for each question and prefer to have each que.docx
I need about 120 words for each question and prefer to have each que.docx
 
Introduction to Legal Research Methodology
Introduction to Legal Research MethodologyIntroduction to Legal Research Methodology
Introduction to Legal Research Methodology
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organ
 
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxIDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
 
Norms in Multi Agent Systems
Norms in Multi Agent SystemsNorms in Multi Agent Systems
Norms in Multi Agent Systems
 
Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
 
Planning, Negotiating & Implementation Assignment
Planning, Negotiating & Implementation Assignment                 Planning, Negotiating & Implementation Assignment
Planning, Negotiating & Implementation Assignment
 
Karl N. Llewellyn 0503 Intro
Karl N. Llewellyn 0503 IntroKarl N. Llewellyn 0503 Intro
Karl N. Llewellyn 0503 Intro
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Indept fgd kelembagaan bbptp (yuti)
Indept fgd kelembagaan   bbptp (yuti)Indept fgd kelembagaan   bbptp (yuti)
Indept fgd kelembagaan bbptp (yuti)
 
13 Leadership EthicsDescriptionThis chapter is different from .docx
13 Leadership EthicsDescriptionThis chapter is different from .docx13 Leadership EthicsDescriptionThis chapter is different from .docx
13 Leadership EthicsDescriptionThis chapter is different from .docx
 
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docxSTEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
 
Overview In this you will look at Wheel.docx
Overview In this you will look at Wheel.docxOverview In this you will look at Wheel.docx
Overview In this you will look at Wheel.docx
 
Forms of discourse analysis
Forms of discourse analysisForms of discourse analysis
Forms of discourse analysis
 
Data Model vs Ontology Development – a FIBO perspective | Mike Bennett
Data Model vs Ontology Development – a FIBO perspective | Mike BennettData Model vs Ontology Development – a FIBO perspective | Mike Bennett
Data Model vs Ontology Development – a FIBO perspective | Mike Bennett
 
This assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docxThis assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docx
 
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docxRUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
 

Más de Rinke Hoekstra

Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
Provenance and Reuse of Open Data (PILOD 2.0 June 2014)Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
Rinke Hoekstra
 
Linked (Open) Data - But what does it buy me?
Linked (Open) Data - But what does it buy me?Linked (Open) Data - But what does it buy me?
Linked (Open) Data - But what does it buy me?
Rinke Hoekstra
 
Linked Science - Building a Web of Research Data
Linked Science - Building a Web of Research DataLinked Science - Building a Web of Research Data
Linked Science - Building a Web of Research Data
Rinke Hoekstra
 
Semantic Representations for Research
Semantic Representations for ResearchSemantic Representations for Research
Semantic Representations for Research
Rinke Hoekstra
 
SIKS 2011 Semantic Web Languages
SIKS 2011 Semantic Web LanguagesSIKS 2011 Semantic Web Languages
SIKS 2011 Semantic Web Languages
Rinke Hoekstra
 
The MetaLex Document Server - Legal Documents as Versioned Linked Data
The MetaLex Document Server - Legal Documents as Versioned Linked DataThe MetaLex Document Server - Legal Documents as Versioned Linked Data
The MetaLex Document Server - Legal Documents as Versioned Linked Data
Rinke Hoekstra
 

Más de Rinke Hoekstra (20)

Knowledge Representation on the Web
Knowledge Representation on the WebKnowledge Representation on the Web
Knowledge Representation on the Web
 
Managing Metadata for Science and Technology Studies: the RISIS case
Managing Metadata for Science and Technology Studies: the RISIS caseManaging Metadata for Science and Technology Studies: the RISIS case
Managing Metadata for Science and Technology Studies: the RISIS case
 
An Ecosystem for Linked Humanities Data
An Ecosystem for Linked Humanities DataAn Ecosystem for Linked Humanities Data
An Ecosystem for Linked Humanities Data
 
QBer - Connect your data to the cloud
QBer - Connect your data to the cloudQBer - Connect your data to the cloud
QBer - Connect your data to the cloud
 
Jurix 2014 welcome presentation
Jurix 2014 welcome presentationJurix 2014 welcome presentation
Jurix 2014 welcome presentation
 
Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
Provenance and Reuse of Open Data (PILOD 2.0 June 2014)Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
 
Prov-O-Viz: Interactive Provenance Visualization
Prov-O-Viz: Interactive Provenance VisualizationProv-O-Viz: Interactive Provenance Visualization
Prov-O-Viz: Interactive Provenance Visualization
 
Linkitup: Link Discovery for Research Data
Linkitup: Link Discovery for Research DataLinkitup: Link Discovery for Research Data
Linkitup: Link Discovery for Research Data
 
A Network Analysis of Dutch Regulations - Using the Metalex Document Server
A Network Analysis of Dutch Regulations - Using the Metalex Document ServerA Network Analysis of Dutch Regulations - Using the Metalex Document Server
A Network Analysis of Dutch Regulations - Using the Metalex Document Server
 
Linked (Open) Data - But what does it buy me?
Linked (Open) Data - But what does it buy me?Linked (Open) Data - But what does it buy me?
Linked (Open) Data - But what does it buy me?
 
Linked Science - Building a Web of Research Data
Linked Science - Building a Web of Research DataLinked Science - Building a Web of Research Data
Linked Science - Building a Web of Research Data
 
COMMIT/VIVO
COMMIT/VIVOCOMMIT/VIVO
COMMIT/VIVO
 
Semantic Representations for Research
Semantic Representations for ResearchSemantic Representations for Research
Semantic Representations for Research
 
A Slightly Different Web of Data
A Slightly Different Web of DataA Slightly Different Web of Data
A Slightly Different Web of Data
 
The Knowledge Reengineering Bottleneck
The Knowledge Reengineering BottleneckThe Knowledge Reengineering Bottleneck
The Knowledge Reengineering Bottleneck
 
Linked Census Data
Linked Census DataLinked Census Data
Linked Census Data
 
Concept- en Definitie Extractie
Concept- en Definitie ExtractieConcept- en Definitie Extractie
Concept- en Definitie Extractie
 
SIKS 2011 Semantic Web Languages
SIKS 2011 Semantic Web LanguagesSIKS 2011 Semantic Web Languages
SIKS 2011 Semantic Web Languages
 
The MetaLex Document Server - Legal Documents as Versioned Linked Data
The MetaLex Document Server - Legal Documents as Versioned Linked DataThe MetaLex Document Server - Legal Documents as Versioned Linked Data
The MetaLex Document Server - Legal Documents as Versioned Linked Data
 
Querying the Web of Data
Querying the Web of DataQuerying the Web of Data
Querying the Web of Data
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Leibniz Meeting 20070405