Multiverse Recommendation: N-dimensional Tensor Factorization for Context-awa...Alexandros Karatzoglou
Slides from RecSys 2010 presentation.
Context has been recognized as an important factor to con- sider in personalized Recommender Systems. However, most model-based Collaborative Filtering approaches such as Ma- trix Factorization do not provide a straightforward way of integrating context information into the model. In this work, we introduce a Collaborative Filtering method based on Tensor Factorization, a generalization of Matrix Factoriza- tion that allows for a flexible and generic integration of con- textual information by modeling the data as a User-Item- Context N-dimensional tensor instead of the traditional 2D User-Item matrix. In the proposed model, called Multiverse Recommendation, different types of context are considered as additional dimensions in the representation of the data as a tensor
Este documento describe los procesos y fundamentos teóricos de la investigación diagnóstica social, incluyendo diferentes tipos de enfoques, perspectivas teóricas, y características como ser oportuno, estratégico, significativo, flexible y contextualizado. También discute temas como valores, necesidades, ámbitos sociales, juicios, objetividad, y factores como género e intereses políticos que deben considerarse en este tipo de investigación.
This document contains contact information for Sigi Feucht who works in business communication along with a list of employees and their roles at a company. It discusses getting employees to be more active at work by tracking their steps and creating social challenges. The document encourages testing their app to promote movement among employees during the work day.
Las tres escuelas filosóficas más importantes de la antigua Grecia fueron Mileto, Elea y Éfeso, cada una de las cuales contribuyó al desarrollo del pensamiento filosófico occidental en áreas como la naturaleza, la lógica y la metafísica.
SEO involves optimizing websites to rank higher in organic search results. On-site SEO includes optimizing title tags, meta descriptions, internal linking, images and blogging. Off-site SEO focuses on building quality backlinks through social sharing, press releases and competitor research. Local SEO involves claiming business listings and encouraging reviews. Tools like Google Analytics help measure traffic from SEO efforts.
Investigación etnográfica y discapacidad intelectual.José María
Este documento resume una investigación etnográfica sobre la discapacidad intelectual realizada por Joaquín Guerrero Muñoz. Se explican las características de la investigación etnográfica sobre la discapacidad intelectual, incluyendo el uso de herramientas etnográficas y diferentes interpretaciones antropológicas. También destaca los resultados que los métodos cualitativos han proporcionado al estudio sociocultural de la discapacidad. Finalmente, analiza el estudio etnográfico de M. Angrosino sobre cómo las personas con
Este documento presenta información sobre la epilepsia frontal nocturna autosómica. Describe que se caracteriza por crisis epilépticas que ocurren casi exclusivamente de noche, comenzando típicamente en la segunda década de vida. Las crisis son complejas e incluyen movimientos mínimos, menores, mayores y prolongados. El EEG puede mostrar anormalidades interictales o ictales frontales. Se distingue de las parasomnias por factores como la edad de inicio, historia familiar, frecuencia y duración de los episodios, semiología de los movim
Multiverse Recommendation: N-dimensional Tensor Factorization for Context-awa...Alexandros Karatzoglou
Slides from RecSys 2010 presentation.
Context has been recognized as an important factor to con- sider in personalized Recommender Systems. However, most model-based Collaborative Filtering approaches such as Ma- trix Factorization do not provide a straightforward way of integrating context information into the model. In this work, we introduce a Collaborative Filtering method based on Tensor Factorization, a generalization of Matrix Factoriza- tion that allows for a flexible and generic integration of con- textual information by modeling the data as a User-Item- Context N-dimensional tensor instead of the traditional 2D User-Item matrix. In the proposed model, called Multiverse Recommendation, different types of context are considered as additional dimensions in the representation of the data as a tensor
Este documento describe los procesos y fundamentos teóricos de la investigación diagnóstica social, incluyendo diferentes tipos de enfoques, perspectivas teóricas, y características como ser oportuno, estratégico, significativo, flexible y contextualizado. También discute temas como valores, necesidades, ámbitos sociales, juicios, objetividad, y factores como género e intereses políticos que deben considerarse en este tipo de investigación.
This document contains contact information for Sigi Feucht who works in business communication along with a list of employees and their roles at a company. It discusses getting employees to be more active at work by tracking their steps and creating social challenges. The document encourages testing their app to promote movement among employees during the work day.
Las tres escuelas filosóficas más importantes de la antigua Grecia fueron Mileto, Elea y Éfeso, cada una de las cuales contribuyó al desarrollo del pensamiento filosófico occidental en áreas como la naturaleza, la lógica y la metafísica.
SEO involves optimizing websites to rank higher in organic search results. On-site SEO includes optimizing title tags, meta descriptions, internal linking, images and blogging. Off-site SEO focuses on building quality backlinks through social sharing, press releases and competitor research. Local SEO involves claiming business listings and encouraging reviews. Tools like Google Analytics help measure traffic from SEO efforts.
Investigación etnográfica y discapacidad intelectual.José María
Este documento resume una investigación etnográfica sobre la discapacidad intelectual realizada por Joaquín Guerrero Muñoz. Se explican las características de la investigación etnográfica sobre la discapacidad intelectual, incluyendo el uso de herramientas etnográficas y diferentes interpretaciones antropológicas. También destaca los resultados que los métodos cualitativos han proporcionado al estudio sociocultural de la discapacidad. Finalmente, analiza el estudio etnográfico de M. Angrosino sobre cómo las personas con
Este documento presenta información sobre la epilepsia frontal nocturna autosómica. Describe que se caracteriza por crisis epilépticas que ocurren casi exclusivamente de noche, comenzando típicamente en la segunda década de vida. Las crisis son complejas e incluyen movimientos mínimos, menores, mayores y prolongados. El EEG puede mostrar anormalidades interictales o ictales frontales. Se distingue de las parasomnias por factores como la edad de inicio, historia familiar, frecuencia y duración de los episodios, semiología de los movim
Understanding your Diversity and Inclusion JourneyTom Williams
This document outlines five steps for developing an effective diversity and inclusion strategy: 1) Assess your current situation by evaluating data, policies, and processes; 2) Establish clear goals and metrics to measure progress; 3) Build a business case by highlighting tangible benefits like increased innovation, engagement, and revenue; 4) Implement the plan through education, proactive measures, and removing bias; 5) Continuously track success and refine the strategy. Taking these steps will help organizations reap rewards like attracting top talent and achieving sustainable growth.
The document discusses techniques for gathering user stories in Agile software development. It describes trawling as gathering requirements like catching fish in a net, acknowledging some requirements will be missed. Unlike waterfall which aims to gather all requirements upfront, Agile acknowledges not all user stories can be identified initially. Techniques discussed include user interviews, questionnaires, observation, and story-writing workshops where participants generate many stories without priorities on paper cards to facilitate iterative prototyping of conceptual workflows. The focus should be on quantity of stories rather than quality during workshops.
T-Mobile reported strong fourth quarter and full year 2014 results, with record customer growth that outpaced competitors. Some key highlights included:
- T-Mobile gained over 2 million total net new customers in Q4 2014 and over 8 million in 2014, capturing nearly 80% of industry postpaid phone growth in Q4 and nearly 100% for the full year.
- Service revenues grew 13.6% year-over-year in Q4 2014 and 9.0% for the full year, as the company expanded its 4G LTE network coverage and added new customers.
- The company expects continued growth in 2015, targeting over 2.2 million branded postpaid additions and adjusted EBITDA between
Symantec at Morgan Stanley Technology, Media & Telecom ConferenceInvestorSymantec
Steve Bennett, President and CEO of Symantec, discussed the company's new strategic direction at a Morgan Stanley conference. He outlined plans to focus on 3 areas: products and services, go-to-market strategy, and organizational changes. The company will move from standalone point products to integrated modular offerings that address important customer problems. It will also simplify its go-to-market approach and organization to better serve customers. Financial objectives include growing organically, improving operating margins over the next two years, and returning 50% of cash to shareholders through dividends and buybacks starting in the first quarter of 2014.
Studio solardesign is an Italian professional studio focused on project management of solar PV plants, energy management, and solar system consulting. It has over 15 years of experience in consulting, planning, and coordinating the implementation of photovoltaic and solar thermal systems. The studio provides services for feasibility studies, design, permitting, construction supervision, and grid connection for PV projects ranging from small rooftop systems to utility-scale PV power plants over 35 MWp.
Query understanding is about focusing less on the results and more on the query. It’s about figuring out what the searcher wants, rather than scoring and ranking results. Once you’ve established this mindset, your approach to search changes: you focus on query performance rather than ranking.
Presented at QConSF 2016: https://qconsf.com/sf2016/presentation/query-understanding-manifesto
Symantec Data Loss Prevention. Las tendencias mundiales nos muestran que el mayor porcentaje de perdida y robo de datos responde a la falta de visibilidad y el error en el manejo de los mismos. Conozca como prevenirse.
Happier and Healthier with Smartphone DataNeal Lathia
This document discusses how smartphone data can be used to monitor people's health and well-being over time. Smartphones contain various sensors that can track physical activity, social interactions, environment, and app usage. Two case studies are described where smartphone data was used: 1) to study the relationship between subjective well-being and physical activity levels, and 2) to develop a smoking cessation app that provides tailored support based on a person's location, profile and triggers for craving. The document argues that with people's consent, analyzing diverse smartphone data has potential to gain insights into people's long term health conditions and behaviors.
1. Atomic force microscopy was used to image streptavidin protein particles alone and in complexes with biotinylated DNA ligands.
2. Streptavidin appeared as globular particles, while biotinylated DNA ligands appeared as 50nm rods. When incubated together, streptavidin particles were observed with single or multiple DNA rods protruding, indicating ligand binding.
3. Analysis of streptavidin particles bound with two DNA ligands found an underrepresentation of acute angles between the ligands compared to expected probabilities, suggesting steric hindrance disfavors adjacent ligand binding.
Enterprise Intelligence: Putting the Pieces Together
http://enterpriserelevance.com/kdd2016/keynote.html
These slides are for a keynote presentation delivered at the Workshop on Enterprise Intelligence, held in conjunction with the 22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2016).
About the author:
Daniel Tunkelang is a data science and engineering executive who has built and led some of the strongest teams in the software industry. He studied computer science and math at MIT and has a PhD in computer science from CMU. He was a founding employee and chief scientist of Endeca, a search pioneer that Oracle acquired for $1.1B. He led a local search team at Google. He was a director of data science and engineering at LinkedIn, and he established their query understanding team. Daniel is a widely recognized writer and speaker. He is frequently invited to speak at academic and industry conferences, particularly in the areas of information retrieval, web science, and data science. He has written the definitive textbook on faceted search (now a standard for ecommerce sites), established an annual symposium on human-computer interaction and information retrieval, and authored 24 US patents. His social media posts have attracted over a million page views. Daniel advises and consults for companies that can benefit strategically from his expertise. His clients range from early-stage startups to "unicorn" technology companies like Etsy and Pinterest. He helps companies make decisions around algorithms, technology, product strategy, hiring, and organizational structure.
This document discusses mining smartphone sensor data using Python. It describes how smartphones have various sensors like accelerometers and gyroscopes that can provide data on movement and location. The talk focuses on collecting accelerometer data from a smartphone, examining raw data samples, extracting features from segmented data windows, and using those features to classify activities through machine learning. The goal is to demonstrate how to work with smartphone sensor data and classify activities like walking, running and using stairs.
System Center Operations Manager 2012 OverviewAmit Gatenyo
System Center Operations Manager 2012 includes several new features such as expanded application and network monitoring, simplified management server topology, and improved dashboards and visualizations. It allows monitoring of additional applications like Java EE and expands network monitoring capabilities. The new release also includes System Center Advisor which analyzes server configuration and performance data to provide recommendations to improve issues before they cause outages.
The document summarizes tear film dynamics and the structure of the tear film. It describes the three layers of the tear film - the outer lipid layer derived from meibomian and other glands, the middle aqueous layer secreted by lacrimal glands, and the inner mucin layer secreted by conjunctival goblet cells. It discusses the functions of each layer and the role of the tear film in lubrication, protection, and maintaining a smooth optical surface on the cornea. The dynamics of tear secretion, formation of the tear film layers, retention, redistribution, evaporation, and drainage of tears is also summarized.
Pharmacosomes are the colloidal dispersions of drugs covalently bound to lipids, and may exist as ultrafine vesicular, micellar, or hexagonal aggregates, depending on the chemical structure of drug-lipid complex.
Recommenders Systems tutorial slides from the European Summer School of Information Retrieval (ESSIR).
Covers basic ideas on Collaborative Filtering, Content-based methods, Matrix Factorization, Restricted Boltzmann Machines, Ranking, Diversity.
The slides include material from Xavier Amatriain, Saul Vargas and Linas Baltrunas.
In this Webinar Lorenz Bühmann presents the ontology repair and enrichment tool ORE and also the DL-Learner , a machine learning tool to solve supervised learnings tasks and support knowledge engineers in constructing knowledge. Those two beneighbored tools in the LOD2 Stack are for classification and the following quality analysis of Linked Data.
This document summarizes Jean-Paul Calbimonte's presentation on connecting stream reasoners on the web. It discusses representing data streams as RDF and using RDF stream processing systems. Key points include:
- RDF streams can be represented as sequences of timestamped RDF graphs.
- The W3C RSP community group is working to standardize RDF stream models and query languages.
- Producing RDF streams involves mapping live data sources to RDF and adding timestamps.
- Consuming RDF streams involves discovering stream metadata and endpoints to access the streams.
- Systems like TripleWave demonstrate approaches for spreading RDF streams on the web.
The importance of Being Erneast: Open datasets in PortugueseValeria de Paiva
The document discusses the speaker's career in Silicon Valley applying mathematics to computing. It describes various roles at companies like Samsung Research America, Nuance Communications, and PARC where the speaker worked on projects involving knowledge representation, conversational assistants, and developing open source resources like OpenWordNet-PT for Portuguese. The speaker emphasizes the importance of open source datasets for languages beyond English and ongoing work to improve resources like UD-PT and SICK-BR.
The CHOReOS European FP7 project that started 2 years ago, linked to OW2 Future Internet initiative, has now reached a level of maturity that provides concepts and concrete technical solutions for actual choreography enactment. It has defined several methods, toolkits and artifacts to enable this innovative distributed way of coordinating services, while at the same time dealing with some of the inherent difficulties to enacting choreographies in a Large Scale context. This presentation will cover CHOReOS base concepts as well as specific developments that were undertaken in these first two years, while putting them in perspective of a simple business-driven use-case in Air-Traffic Management.
This document provides an overview and definitions of key concepts related to complex event processing (CEP). It defines events, complex events, CEP, event-driven architecture (EDA), and how CEP relates to EDA and service-oriented architecture (SOA). It also outlines common CEP requirements, how events are viewed from a business rules perspective, characteristics of CEP scenarios, and major CEP market players. The document is intended as a crash course on CEP concepts for business technology professionals.
Understanding your Diversity and Inclusion JourneyTom Williams
This document outlines five steps for developing an effective diversity and inclusion strategy: 1) Assess your current situation by evaluating data, policies, and processes; 2) Establish clear goals and metrics to measure progress; 3) Build a business case by highlighting tangible benefits like increased innovation, engagement, and revenue; 4) Implement the plan through education, proactive measures, and removing bias; 5) Continuously track success and refine the strategy. Taking these steps will help organizations reap rewards like attracting top talent and achieving sustainable growth.
The document discusses techniques for gathering user stories in Agile software development. It describes trawling as gathering requirements like catching fish in a net, acknowledging some requirements will be missed. Unlike waterfall which aims to gather all requirements upfront, Agile acknowledges not all user stories can be identified initially. Techniques discussed include user interviews, questionnaires, observation, and story-writing workshops where participants generate many stories without priorities on paper cards to facilitate iterative prototyping of conceptual workflows. The focus should be on quantity of stories rather than quality during workshops.
T-Mobile reported strong fourth quarter and full year 2014 results, with record customer growth that outpaced competitors. Some key highlights included:
- T-Mobile gained over 2 million total net new customers in Q4 2014 and over 8 million in 2014, capturing nearly 80% of industry postpaid phone growth in Q4 and nearly 100% for the full year.
- Service revenues grew 13.6% year-over-year in Q4 2014 and 9.0% for the full year, as the company expanded its 4G LTE network coverage and added new customers.
- The company expects continued growth in 2015, targeting over 2.2 million branded postpaid additions and adjusted EBITDA between
Symantec at Morgan Stanley Technology, Media & Telecom ConferenceInvestorSymantec
Steve Bennett, President and CEO of Symantec, discussed the company's new strategic direction at a Morgan Stanley conference. He outlined plans to focus on 3 areas: products and services, go-to-market strategy, and organizational changes. The company will move from standalone point products to integrated modular offerings that address important customer problems. It will also simplify its go-to-market approach and organization to better serve customers. Financial objectives include growing organically, improving operating margins over the next two years, and returning 50% of cash to shareholders through dividends and buybacks starting in the first quarter of 2014.
Studio solardesign is an Italian professional studio focused on project management of solar PV plants, energy management, and solar system consulting. It has over 15 years of experience in consulting, planning, and coordinating the implementation of photovoltaic and solar thermal systems. The studio provides services for feasibility studies, design, permitting, construction supervision, and grid connection for PV projects ranging from small rooftop systems to utility-scale PV power plants over 35 MWp.
Query understanding is about focusing less on the results and more on the query. It’s about figuring out what the searcher wants, rather than scoring and ranking results. Once you’ve established this mindset, your approach to search changes: you focus on query performance rather than ranking.
Presented at QConSF 2016: https://qconsf.com/sf2016/presentation/query-understanding-manifesto
Symantec Data Loss Prevention. Las tendencias mundiales nos muestran que el mayor porcentaje de perdida y robo de datos responde a la falta de visibilidad y el error en el manejo de los mismos. Conozca como prevenirse.
Happier and Healthier with Smartphone DataNeal Lathia
This document discusses how smartphone data can be used to monitor people's health and well-being over time. Smartphones contain various sensors that can track physical activity, social interactions, environment, and app usage. Two case studies are described where smartphone data was used: 1) to study the relationship between subjective well-being and physical activity levels, and 2) to develop a smoking cessation app that provides tailored support based on a person's location, profile and triggers for craving. The document argues that with people's consent, analyzing diverse smartphone data has potential to gain insights into people's long term health conditions and behaviors.
1. Atomic force microscopy was used to image streptavidin protein particles alone and in complexes with biotinylated DNA ligands.
2. Streptavidin appeared as globular particles, while biotinylated DNA ligands appeared as 50nm rods. When incubated together, streptavidin particles were observed with single or multiple DNA rods protruding, indicating ligand binding.
3. Analysis of streptavidin particles bound with two DNA ligands found an underrepresentation of acute angles between the ligands compared to expected probabilities, suggesting steric hindrance disfavors adjacent ligand binding.
Enterprise Intelligence: Putting the Pieces Together
http://enterpriserelevance.com/kdd2016/keynote.html
These slides are for a keynote presentation delivered at the Workshop on Enterprise Intelligence, held in conjunction with the 22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2016).
About the author:
Daniel Tunkelang is a data science and engineering executive who has built and led some of the strongest teams in the software industry. He studied computer science and math at MIT and has a PhD in computer science from CMU. He was a founding employee and chief scientist of Endeca, a search pioneer that Oracle acquired for $1.1B. He led a local search team at Google. He was a director of data science and engineering at LinkedIn, and he established their query understanding team. Daniel is a widely recognized writer and speaker. He is frequently invited to speak at academic and industry conferences, particularly in the areas of information retrieval, web science, and data science. He has written the definitive textbook on faceted search (now a standard for ecommerce sites), established an annual symposium on human-computer interaction and information retrieval, and authored 24 US patents. His social media posts have attracted over a million page views. Daniel advises and consults for companies that can benefit strategically from his expertise. His clients range from early-stage startups to "unicorn" technology companies like Etsy and Pinterest. He helps companies make decisions around algorithms, technology, product strategy, hiring, and organizational structure.
This document discusses mining smartphone sensor data using Python. It describes how smartphones have various sensors like accelerometers and gyroscopes that can provide data on movement and location. The talk focuses on collecting accelerometer data from a smartphone, examining raw data samples, extracting features from segmented data windows, and using those features to classify activities through machine learning. The goal is to demonstrate how to work with smartphone sensor data and classify activities like walking, running and using stairs.
System Center Operations Manager 2012 OverviewAmit Gatenyo
System Center Operations Manager 2012 includes several new features such as expanded application and network monitoring, simplified management server topology, and improved dashboards and visualizations. It allows monitoring of additional applications like Java EE and expands network monitoring capabilities. The new release also includes System Center Advisor which analyzes server configuration and performance data to provide recommendations to improve issues before they cause outages.
The document summarizes tear film dynamics and the structure of the tear film. It describes the three layers of the tear film - the outer lipid layer derived from meibomian and other glands, the middle aqueous layer secreted by lacrimal glands, and the inner mucin layer secreted by conjunctival goblet cells. It discusses the functions of each layer and the role of the tear film in lubrication, protection, and maintaining a smooth optical surface on the cornea. The dynamics of tear secretion, formation of the tear film layers, retention, redistribution, evaporation, and drainage of tears is also summarized.
Pharmacosomes are the colloidal dispersions of drugs covalently bound to lipids, and may exist as ultrafine vesicular, micellar, or hexagonal aggregates, depending on the chemical structure of drug-lipid complex.
Recommenders Systems tutorial slides from the European Summer School of Information Retrieval (ESSIR).
Covers basic ideas on Collaborative Filtering, Content-based methods, Matrix Factorization, Restricted Boltzmann Machines, Ranking, Diversity.
The slides include material from Xavier Amatriain, Saul Vargas and Linas Baltrunas.
In this Webinar Lorenz Bühmann presents the ontology repair and enrichment tool ORE and also the DL-Learner , a machine learning tool to solve supervised learnings tasks and support knowledge engineers in constructing knowledge. Those two beneighbored tools in the LOD2 Stack are for classification and the following quality analysis of Linked Data.
This document summarizes Jean-Paul Calbimonte's presentation on connecting stream reasoners on the web. It discusses representing data streams as RDF and using RDF stream processing systems. Key points include:
- RDF streams can be represented as sequences of timestamped RDF graphs.
- The W3C RSP community group is working to standardize RDF stream models and query languages.
- Producing RDF streams involves mapping live data sources to RDF and adding timestamps.
- Consuming RDF streams involves discovering stream metadata and endpoints to access the streams.
- Systems like TripleWave demonstrate approaches for spreading RDF streams on the web.
The importance of Being Erneast: Open datasets in PortugueseValeria de Paiva
The document discusses the speaker's career in Silicon Valley applying mathematics to computing. It describes various roles at companies like Samsung Research America, Nuance Communications, and PARC where the speaker worked on projects involving knowledge representation, conversational assistants, and developing open source resources like OpenWordNet-PT for Portuguese. The speaker emphasizes the importance of open source datasets for languages beyond English and ongoing work to improve resources like UD-PT and SICK-BR.
The CHOReOS European FP7 project that started 2 years ago, linked to OW2 Future Internet initiative, has now reached a level of maturity that provides concepts and concrete technical solutions for actual choreography enactment. It has defined several methods, toolkits and artifacts to enable this innovative distributed way of coordinating services, while at the same time dealing with some of the inherent difficulties to enacting choreographies in a Large Scale context. This presentation will cover CHOReOS base concepts as well as specific developments that were undertaken in these first two years, while putting them in perspective of a simple business-driven use-case in Air-Traffic Management.
This document provides an overview and definitions of key concepts related to complex event processing (CEP). It defines events, complex events, CEP, event-driven architecture (EDA), and how CEP relates to EDA and service-oriented architecture (SOA). It also outlines common CEP requirements, how events are viewed from a business rules perspective, characteristics of CEP scenarios, and major CEP market players. The document is intended as a crash course on CEP concepts for business technology professionals.
This document presents WIND, an interaction model for designing geographical web applications. WIND uses an object-oriented model where an interaction consists of a sensible area, event, and reaction. Sensible areas can be text, maps, or calendars. The model is implemented as a JavaScript API and allows defining interactions through four steps. Future work includes improving the sensible area and event concepts and creating an authoring environment for non-programmers.
Brief introduction on CEP and Terminology
o Drools Vision
o Drools Fusion: Complex Event Processing extensions
o Event Declaration and Semantics
o Event Cloud, Streams and the Session Clock
o Temporal Reasoning
o Sliding Window Support
o Streams Support
o Memory Management
A short introduction to the term "Openness" as it is used by three different organizations in the geospatial domain, the OGC, OSGeo and OSM - plus an outlook where we should be going.
This document summarizes a presentation on applying complex event processing (CEP) with Drools Fusion. It introduces key CEP concepts and terminology like events, complex events, event processing, and event-driven architecture. It then describes Drools Fusion's capabilities for event detection, correlation, abstraction, temporal reasoning, stream processing, sliding windows, and memory management. The presentation demonstrates these features through a Twitter stream example and discusses event semantics, temporal operators, streams, session clocks, and more.
Slides of I2G (Poland) for their partner introduction as a new LOD2 partner in the course of the LOD2 project enlargement - presented at the LOD2 plenary meeting in Leuven, Belgium on September 2011
Aggregating Social Media for Enhancing Conference ExperiencesHouda khrouf
The document describes a system called Confomaton that aggregates social media to enhance conference experiences. Confomaton collects media items and event data from various sources, models the data semantically, and reconciles items to events in real-time. It provides a web interface and APIs to browse conferences and associated media. Future work aims to integrate more media sources, enrich event descriptions, refine reconciliation, and improve the user interface performance.
Experiencing Events through User-Generated MediaRaphael Troncy
Experiencing Events through User-Generated Media. Talk given at the 1st International Workshop on Consuming Linked Data (COLD), November 2010, Shanghai , China
A Conceptual Building-Block and Practical OpenStreetMap-Interface for Sharing...Werner Leyh
This document discusses linking hydrological observation datasets to specific hydrological features using standardized semantics. The authors implement an interface in OpenStreetMap to represent surface water features using standardized ontology terms. They model the interlinking between hydrological features and monitoring points using the VoID and DCAT vocabularies. This provides a flexible way to describe relationships between datasets and enables navigation between features and observations. The proof of concept implementation is inspired by challenges faced by a disaster monitoring organization and uses open data standards to lift datasets to the web of linked open data.
This deliverable presents the data management plan for the
ARCADIA project. This data management plan describes what kind of data is generated or collected in the ARCADIA project and how this data is published openly. A simple decision process is defined that either classifies a result as public or non -public. The publishing platforms used are the pro
ject website, the OwnCloud platform and GitHub for open-sourced code. All these platforms can be accessed openly.
I Linked Open Data nei Beni Culturali, alcuni progetti e casi di studioCulturaItalia
Maria Emilia Masci, Scuola Normale Superiore, Linked Open Data (LOD): Un’Opportunità per il Patrimonio Culturale Digitale, Roma, ICCU, 29 novembre 2013
A Sightseeing Tour of Prov and Some of its ExtensionsKhalid Belhajjame
This document provides an overview of the PROV provenance model and some of its extensions. It discusses the motivation for provenance, the history and development of the PROV model, its key concepts of entities, activities, and agents. It also describes extensions like ProvONE and PAV that build upon PROV to model workflow and scientific provenance.
Interlinking Standardized OpenStreetMap Data and Citizen Science Data in the ...Werner Leyh
Abstract. The aim of this work is to explore the opportunities offered by
semantic standardization to interlink primary “spatial data” (GI) from “Open-
StreetMap” (OSM) with repositories of the “Linked Open Data Cloud” (LOD).
Research in natural sciences can generate vast amounts of spatial data, where
Wikidata could be considered as the central hub between more detailed natural
science hubs on the spatial semantic web. Wikidata is a world readable and
writable community-driven knowledge base. It offers the opportunity to collaboratively
construct an open access knowledge graph that spans biology,
medicine, and all other domains of knowledge. In this study, we discuss
the opportunities and challenges provided by exploring Wikidata as a central
integration facility by interlink it with OSM, a popular, community driven
collection of free geographic data. This is empowered by the reuse of terms
and properties from commonly understood controlled vocabularies that
represent their respective well-identified knowledge domains.
URL: https://www.springerprofessional.de/en/interlinking-standardized-openstreetmap-data-and-citizen-science/13302088
DOI: https://doi.org/10.1007/978-3-319-60366-7_9
Werner Leyh, Homero Fonseca Filho
University of São Paulo (USP), São Paulo, Brazil
WernerLeyh@yahoo.com
Presentation about the collaboration between ADAPT and the Ordnance Survey Ireland at Linked Data Seminar -- Culture, Base Registries & Visualisations held in Amsterdam, The Netherlands on the 2nd of December 2016
Similar a LODE Linking Open Descriptions of Events (20)
This document provides information about the KCAP 2019 conference, including:
- Welcome and introduction to the organizing committee chairs and other roles.
- Statistics on the number of submissions received, reviews conducted, and papers selected for the conference.
- Instructions for presenters on time limits and session chairs.
- Details on the keynote speakers and topics.
- Housekeeping notes on spotlight papers, accessing the proceedings, using the conference hashtag on Twitter, and a town hall meeting.
Location Embeddings for Next Trip RecommendationRaphael Troncy
Joint work wih Amadeus presenting a recommender system for your next destination using knowledge graphs and deep learning network, presented at the LocWeb 2019 Workshop colocated with TheWebConf 2019 (San Francisco, USA)
A replication study of the top performing systems in SemEval twitter sentimen...Raphael Troncy
The document describes a study that aimed to replicate and improve upon the top performing system from SemEval Twitter sentiment analysis competitions from 2013-2015. The researchers were able to replicate the Webis system with similar or slightly better performance. They then developed the SentiME system, which included an additional classifier (Stanford Sentiment System) and bagging during training. SentiME outperformed Webis on sarcasm detection datasets, improving F-score by up to 6.5%, demonstrating better generalization capabilities. The study highlights lessons for reproducibility, such as the importance of archiving data, code, and software versions used.
NERD: an open source platform for extracting and disambiguating named entitie...Raphael Troncy
"NERD: an open source platform for extracting and disambiguating named entities in very diverse documents" - Keynote Talk given at the NLP&DBpedia International Workshop (NLP&DBpedia), 22 October 2013
Deep-linking into Media Assets at the Fragment Level SMAM 2013Raphael Troncy
"Deep-linking into Media Assets at the Fragment Level: Specification, Model and Applications" - Keynote Talk given at the International Workshop on Semantic Music and Media (SMAM), 21 October 2013
Semantics at the multimedia fragment level SSSW 2013Raphael Troncy
"Semantics at the multimedia fragment level or how enabling the remixing of online media" - Invited Talk given at the Semantic Web Summer School (SSSW), 12 July 2013
MediaFinder: Collect, Enrich and Visualize Media Memes Shared by the CrowdRaphael Troncy
"MediaFinder: Collect, Enrich and Visualize Media Memes Shared by the Crowd", talk given at the 2nd Real Time Analysis and Mining of Social Streams Workshop (RAMSS) colocated with WWW 2013, Rio de Janeiro, Brazil
EventMedia Live: Exploring Events Connections in Real-Time to Enhance ContentRaphael Troncy
"EventMedia Live: Exploring Events Connections in Real-Time to Enhance Content" presented at the Semantic Web Challenge, Open Track, of the 11th International Semantic Web Conference, Boston, USA, November 2012
Semantics at the multimedia fragment level or how enabling the remixing of on...Raphael Troncy
The document discusses media fragments and semantic indexing of multimedia content. It introduces media fragments as ways to annotate and share portions of audio/video. It then discusses semantic indexing through named entity recognition on transcripts to enable semantic search and linking to knowledge bases. Tools like NERD are presented for evaluating and combining different named entity recognition APIs and standards like NIF for lifting extraction results to linked data.
The document summarizes the 1st Workshop on Detection, Representation and Exploitation of Events which was held in Bonn, Germany on October 23, 2011. The workshop brought together researchers working on event detection, representation, and exploitation. It included sessions on event modeling, event detection, event exploitation, and a challenge task. The goal was to discuss improving interoperability of event vocabularies and requirements for event representations, detection, and exploitation to support semantic applications.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
LODE Linking Open Descriptions of Events
1. LODE: Linking Open
Descriptions of Events
Ryan Shaw <ryanshaw@ischool.berkeley.edu>
Raphaël Troncy <raphael.troncy@eurecom.fr>
Lynda Hardman <lynda.hardman@cwi.nl>
2. We have directory of events...
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China -2
3. 08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China -3
4. 08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China -4
5. 08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China -5
6. 08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China -6
7. 08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China -7
8. 08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China -8
9. 08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China -9
10. 08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 10
11. 08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 11
12. 08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 12
13. We have knowledge about “many things”...
16/09/2009
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 13
14. 08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 14
15. Event-based centric interfaces
Action or occurrence taking place at a certain
time at a specific location
Useful for organizing and browsing collections of media
Useful for discovering complex relationships between
data
Need for an expressive event model for
connecting pieces of data
Not Yet Another Model!
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 15
16. There are already many event ontologies
Event Model Ontology URL
CIDOC CRM http://cidoc.ics.forth.gr/OWL/cidoc_v4.2.owl
ABC Ontology http://metadata.net/harmony/ABC/ABC.owl
Event Ontology http://purl.org/NET/c4dm/event.owl#
EventsML-G2 http://www.iptc.org/EventsML/
Dolce+DnS Ultralite http://www.loa-cnr.it/ontologies/DUL.owl
F http://events.semantic-
multimedia.org/ontology/2008/12/15/model.owl
OpenCyc Ontology http://www.opencyc.org/
SEM http://semanticweb.cs.vu.nl/2009/04/event/
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 16
17. Fundamental Types of Events
Aspect: ongoing activity vs transition between states
cyc:Event ∩ cyc:StaticSituation ≤ cyc:Situation
cidoc:E5.Event ∩ cidoc:E3.Condition_State ≤ cidco:E2.Temporal_Entity
abc:Event is a transition between abc:Situation ≈ cidoc:E3.Condition_State
Agentivity: who has produced the event?
cyc:Action, dul:Action ≤ Event
E7.Activity ≤ E5.Event
abc:Action ∩ abc:Event = Ø
Events are fully described as a set of actions taken by specific agents
Issue for modeling e.g. earthquakes
Interpretation matters!
Identifiable changes or not? Agency can be assigned?
dul:Situation describe dul:Event
dul:Action, dul:Process ≤ dul:Event
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 17
18. Events and Temporal Intervals
Relating events to chronological spans of time
Persistent, socially attributed meanings
Arbitrary system for subdividing an abstract space
Modeling a class for temporal intervals and use an OP
ABC, CIDOC, EO (owl:TemporalEntity)
Modeling a XML Schema typed value and use a DP
Pro: simplicity, values expressed as xsd:date or xsd:dateTime
Cons: inability to express uncertain period or when there is no
coincidence with date units
Having two properties
dul:hasEventDate ... litteral value
dul:isObservableAt ... dul:TimeInterval
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 18
19. Events, Spaces and Places
Relating events to places
Semantically significant places
Abstract spatial regions
Support spatial regions only: ABC, CIDOC, EO
eo:Event eo:place wgs84:SpatialThing
cidoc:E5.Event cidoc:P7.took_place_at cidoc:E53.Place
Support the place/space distinction
dul:Event dul:hasLocation dul:Place
dul:Event dul:hasRegion dul:SpaceRegion
Most flexible approach: allow to resolve to places with no
geographical coordinate systems (e.g. mythical events, SecondLife)
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 19
20. Participation in events
Object involvement in events:
Simple involvement in event:
abc:Event abc:involves owl:Thing (≤ abc:Actuality)
cidoc:E5.Event cidoc:P12.occurred_in_the_presence_of cidoc:E77
dul:Event dul:hasParticipant dul:Object
eo:Event eo:factor owl:Thing
Tangible thing which results from an event:
abc:Event abc:hasResult owl:Thing
eo:Event eo:product owl:Thing
Agent participation in events:
abc:hasParticipant ≤ abc:hasPresence
cidoc:P11.had_participant ≤ cidoc:P14.carried_out_by
dul:involvesAgent ≤ abc:hasParticipant
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 20
21. Events, Influence, Purpose and Causality
Making broad assertions linking events to any thing
cidoc:P12.occurred_in_the_presence_of, cidoc:P15.was_influenced_by
eo:factor, abc:hasResult
F model uses the DnS pattern
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 21
22. Events, Parts and Composition
Event A being part of event B ≠
A's timespan ϵ B's timespan
cidoc:P86.falls_within for expressing containment among timespans
cidoc:P9.consist_of ≈ eo:sub_event ≈ abc:isSubEventOf
Linking sub-events with parthood
dul:hasPart
The 20th century contains the year 1923
World War II included Pearl Harbour
Linking sub-events with composition
dul:hasConstituent
The French revolution is composed of the Bastille catch
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 22
23. Towards a Linked Data Event Model
16/09/2009
08/12/2009 - Event-basedLinking Open Descriptions ofof Media--ASWC 2009, Shanghai, China (CH)
LODE: Annotation and Exploration Events PetaMedia SYTIM, Lausanne - 23
24. Some mappings in LODE
ABC CIDOC DUL EO LODE
atTime P4.has_time_span isObservableAt time atTime
P7.took_place_at place inSpace
inPlace hasLocation atPlace
involves P12.occurred_in_the_ hasParticipant factor involved
presence_of
hasPresence P11.had_participant involvesAgent agent involvedAgent
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 24
25. 16/09/2009
08/12/2009 - Event-basedLinking Open Descriptions ofof Media--ASWC 2009, Shanghai, China (CH)
LODE: Annotation and Exploration Events PetaMedia SYTIM, Lausanne - 25
26. Applications 1/2
Extracting events from Wikipedia Timelines
Timeline of World War II
7 years specific timelines involving people at days granularity
Timeline of Irish History
Single geographical location spread of wide temporal range
Timeline for the day of the September 11 attacks
147 fine-grained events from a single day
Timeline of evolution
Very coarse-grained events associated with times far in the past
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 26
27. Applications 2/2
Interoperability with Legacy Event Collections
Congressional Biographies:
Biographical Directory of the U.S. Congress
Series of statements for every member of the United State
legislature from 1774 to the present
69,228 events represented with the BIO vocabulary
The Emma Goldman Chronology:
Day to day activity of her assistants ...
From 1910 to 1916
Parsing dates, geo-coding place names,
linking person names with DBpedia
Generating 1041 events
modeled with the EO vocabulary
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 27
28. 16/09/2009
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 28
29. Conclusion and Future Work
Events are core in our thoughts and useful for
describing History, exploring archival records, structuring our lives
LODE: Linking Open Descriptions of Events
a set of mappings between event data models
http://linkedevents.org/ontology/
Event directory providing stable URI for events
Challenges:
Event description vs event interpretation
Event identification:
how to map multiple textual description to the same event identifier?
events are linguistic phenomena rather than objectively existing
... but we want two descriptions of past occurrences are the same event
Publish linked descriptions of large repositories of upcoming events
08/12/2009 - LODE: Linking Open Descriptions of Events - ASWC 2009, Shanghai, China - 29
Linked data cloud is not knowledge engineering – it is just a bunch of identified and linked concepts. Particular relevance to Petamedia: musicbrainz, bbc totp (top left) http://musicbrainz.org/
FAST: need to align different current event models
FAST: currently have a “Linked Data” event model.
which means we can also explore events. But these interfaces are not event specific. We want to develop event-centric interfaces. We don’t know what these are yet. This would be one of the goals of the IRP.