Professional Documents
Culture Documents
Full Ebook of Provenance in Data Science From Data Models To Context Aware Knowledge Graphs Leslie F Sikos Online PDF All Chapter
Full Ebook of Provenance in Data Science From Data Models To Context Aware Knowledge Graphs Leslie F Sikos Online PDF All Chapter
Full Ebook of Provenance in Data Science From Data Models To Context Aware Knowledge Graphs Leslie F Sikos Online PDF All Chapter
https://ebookmeta.com/product/knowledge-graphs-data-in-context-
for-responsive-businesses-jesus-barrasa/
https://ebookmeta.com/product/cybersecurity-teaching-in-higher-
education-leslie-f-sikos/
https://ebookmeta.com/product/web-data-apis-for-knowledge-graphs-
easing-access-to-semantic-data-for-application-developers-1st-
edition-albert-merono-penuela/
https://ebookmeta.com/product/statistical-models-and-methods-for-
data-science-leonardo-grilli/
AI-Assisted Data Science (MEAP V02): Large Language
Models for multimodal data analysis Immanuel Trummer
https://ebookmeta.com/product/ai-assisted-data-science-
meap-v02-large-language-models-for-multimodal-data-analysis-
immanuel-trummer/
https://ebookmeta.com/product/machine-learning-for-data-science-
handbook-data-mining-and-knowledge-discovery-handbook-3rd-lior-
rokach/
https://ebookmeta.com/product/training-data-for-machine-learning-
human-supervision-from-annotation-to-data-science-1st-edition-
anthony-sarkis-2/
https://ebookmeta.com/product/training-data-for-machine-learning-
human-supervision-from-annotation-to-data-science-1st-edition-
anthony-sarkis/
https://ebookmeta.com/product/big-data-in-healthcare-extracting-
knowledge-from-point-of-care-machines-pouria-amirian/
Advanced Information and Knowledge
Processing
Editors-in-Chief
Lakhmi C. Jain
Bournemouth University, Poole, UK, and, University of South Australia,
University of South Australia, Adelaide, Australia
Xindong Wu
University of Vermont, USA
Series Editors
Sheryl Brahnam
Missouri State University, Spring ield, USA
Diane J Cook
Washington State University, Pullman, WA, USA
Josep Domingo-Ferrer
Universitat Rovira i Virgili, Tarragona, Spain
Bogdan Gabrys
School of Design, Bournemouth University, Poole, UK
Francisco Herrera
ETS de Ingenierias Infoy de Telecom, University of Granada, Granada,
Spain
Hiroshi Mamitsuka
School of Pharmaceutical Sciences, Kyoto University, Kyoto, Japan
Vir V. Phoha
Department of Electrical Engineering and Computer Science, Syracuse
University, Ruston, LA, USA
Arno Siebes
Utrecht, The Netherlands
Philippe de Wilde
Of ice of the Vice Chancellor, University of Kent, Edinburgh, UK
Oshani W. Seneviratne
Health Data Research, Rensselaer Polytechnic Institute, Troy, NY, USA
Deborah L. McGuinness
Rensselaer Polytechnic Institute, Troy, NY, USA
The publisher, the authors and the editors are safe to assume that the
advice and information in this book are believed to be true and accurate
at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, expressed or implied, with respect to the
material contained herein or for any errors or omissions that may have
been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional af iliations.
Deborah L. McGuinness
Prof. Deborah L. McGuinness is the Tetherless World Senior
Constellation Chair and Professor of Computer, Cognitive,
and Web Sciences at RPI. She is also the founding director of
the Web Science Research Center and the CEO of
McGuinness Associates Consulting. Deborah has been
recognized with awards as a fellow of the American
Association for the Advancement of Science (AAAS) for
contributions to the Semantic Web, knowledge representation, and
reasoning environments and as the recipient of the Robert Engelmore
Award from the Association for the Advancement of Arti icial
Intelligence (AAAI) for leadership in Semantic Web research and in
bridging Arti icial Intelligence (AI) and eScience, signi icant
contributions to deployed AI applications, and extensive service to the
AI community. Deborah leads a number of large diverse data-intensive
resource efforts, and her team is creating next-generation ontology-
enabled research infrastructure for work in large interdisciplinary
settings. Prior to joining RPI, Deborah was the acting director of the
Knowledge Systems, Arti icial Intelligence Laboratory, and Senior
Research Scientist in the Computer Science Department of Stanford
University, and previous to that, she was at AT&T Bell Laboratories.
Deborah consults with numerous large corporations as well as
emerging startup companies wishing to plan, develop, deploy, and
maintain Semantic Web and/or AI applications. Some areas of recent
work include: data science, next-generation health advisors, ontology
design and evolution environments, semantically enabled virtual
observatories, semantic integration of scienti ic data, context-aware
mobile applications, search, eCommerce, con iguration, and supply
chain management. Deborah holds a bachelor’s degree in Math and
Computer Science from Duke University, a master’s degree in Computer
Science from the University of California at Berkeley, and a Ph.D. in
Computer Science from Rutgers University.
© Springer Nature Switzerland AG 2021
L. F. Sikos et al. (eds.), Provenance in Data Science, Advanced Information and
Knowledge Processing
https://doi.org/10.1007/978-3-030-67681-0_1
Leslie F. Sikos
Email: l.sikos@ecu.edu.au
1.10 Summary
The purity of the standard RDF data model has several bene its, but the
incapability of capturing data provenance makes RDF unusable in
application ields for which provenance is of utmost importance for
veri ication, tracking, and other purposes. The various approaches and
techniques proposed over the years to capture RDF provenance all have
their strengths and weaknesses; therefore, which one to choose
depends on the application. Generally, graph-based approaches
outperform instantiated predicate-based approaches in terms of
querying, although reasoning over RDF provenance has additional
requirements beyond capturing provenance for individual RDF
statements of sets of RDF triples. It is important to keep in mind that
even those mechanisms that have formal semantics de ined not
necessarily have semantics for every component, such as unique
predicates with consecutive numbering for different relationship
versions depending on the data source are just known to be derivatives
of the original predicate. Not only that, but part of the semantics of
these might only make sense to humans and cannot be fully interpreted
by software agents alone.
References
Aljalbout S, Buchs D, Falquet G (2019) Introducing contextual reasoning to the
Semantic Web with OWLC. In: Endres D, Alam M, Şotropa D (eds) Graph-based
representation and reasoning. Springer, Cham, pp 13–26. https://doi.org/10.1007/
978-3-030-23182-8_2
[Crossref]
Carroll JJ, Bizer C, Hayes P, Stickler P (2005) Named graphs, provenance and trust. In:
Proceedings of the 14th International Conference on World Wide Web. ACM, New
York, pp 613–622. https://doi.org/10.1145/1060745.1060835
[Crossref]
Gutierrez C, Hurtado CA, Vaisman A (2007) Introducing time into RDF. IEEE T Knowl
Data En 19(2):207–218. https://doi.org/10.1109/TKDE.2007.34
[Crossref]
Hogan A (2018) Context in graphs. In: Proceedings of the 1st International Workshop
on Conceptualized Knowledge Graphs. RWTH Aachen University, Aachen
Hurtado C, Vaisman A (2006) Reasoning with temporal constraints in RDF. In: Alferes
JJ, Bailey J, May W, Schwertel U (eds) Principles and practice of semantic web
reasoning. Springer, Heidelberg, pp 164–178. https://doi.org/10.1007/11853107_12
[Crossref]
Nguyen V, Bodenreider O, Sheth A (2014) Don’t like RDF rei ication?: Making
statements about statements using singleton property. In: Proceedings of the 23rd
International Conference on World Wide Web. ACM, New York, pp 759–770. https://
doi.org/10.1145/2566486.2567973
[Crossref]
Philp D, Chan N, Sikos LF (2019) Decision support for network path estimation via
automated reasoning. In: Czarnowski I, Howlett RJ, Jain LC (eds) Intelligent decision
technologies 2019. Springer, Singapore, pp 335–344. https://doi.org/10.1007/978-
981-13-8311-3_29
Sahoo SS, Sheth A (2009) Provenir ontology: towards a framework for eScience
provenance management. Microsoft eScience Workshop
Sikos LF (2017a) 3D model indexing in videos for content-based retrieval via X3D-
based semantic enrichment and automated reasoning. In: Proceedings of the 22nd
International Conference on 3D Web Technology. ACM, New York. https://doi.org/10.
1145/3055624.3075943
Footnotes
1 https://www.w3.org/RDF/
2 https://www.w3.org/TR/rdf-primer/#rei ication
3 https://www.w3.org/1999/02/22-rdf-syntax-ns.ttl
4 https://www.w3.org/TR/swbp-n-aryRelations/
6 https://www.w3.org/TR/rdf-schema/
7 https://www.w3.org/OWL/
8 https://www.w3.org/TR/n-quads/
9 http://purl.org/ontology/network/
10 http://www.w3.org/ns/prov-o
11 https://www.w3.org/TR/void/
© Springer Nature Switzerland AG 2021
L. F. Sikos et al. (eds.), Provenance in Data Science, Advanced Information and
Knowledge Processing
https://doi.org/10.1007/978-3-030-67681-0_2
Oshani W. Seneviratne
Email: senevo@rpi.edu
from HTML pages . Using this tool, as the user browses several menu
options in the Firefox browser can be used to select licensed images
with the proper intention, for example, commercial purpose. Finally,
when a user attempts to copy an image from the browser, the tool will
automatically determine if it is permissible by checking the license
restrictions. If it is permitted, it will create the appropriate license.
References
Aldayel A, Magdy W (2019) Your stance is exposed! analyzing possible factors for
stance detection on social media. Proc ACM Hum-Comput Interact 3. https://doi.
org/10.1145/3359307
Ball A (2007) Brie ing paper: The Adobe eXtensible Metadata Platform (XMP).
UKOLN Research Organization. http://www.ukoln.ac.uk/projects/grand-challenge/
papers/xmpBrie ing.pdf
Benkler Y (2006) The wealth of networks: how social production transforms markets
and freedom. Yale University Press, London
Bernstein MS, Bakshy E, Burke M, Karrer B (2013) Quantifying the invisible audience
in social networks. In: Proceedings of the SIGCHI conference on human factors in
computing systems, pp 21–30. https://doi.org/10.1145/2470654.2470658
Carroll JJ, Bizer C, Hayes P, Stickler P (2005) Named graphs. J Web Semant 3(4):247–
267. https://doi.org/10.1016/j.websem.2005.09.001
[Crossref]
Da Silva PP, McGuinness DL, Fikes R (2006) A proof markup language for Semantic
Web services. Inf Syst 31(4–5):381–395. https://doi.org/10.1016/j.is.2005.02.003
[Crossref]
Davidson SB, Freire J (2008) Provenance and scienti ic work lows: challenges and
opportunities. In: Proceedings of the 2008 ACM SIGMOD international conference on
management of data, pp 1345–1350. https://doi.org/10.1145/1376616.1376772
Duhigg C (2012) How companies learn your secrets. The New York Times. https://
www.nytimes.com/2012/02/19/magazine/shopping-habits.html
Garcia D (2017) Leaking privacy and shadow pro iles in online social networks. Sci
Adv 3(8):e1701172
[Crossref]
Greene Laboratory (2017) The Parasite Awards: celebrating rigorous secondary data
analysis. https://researchparasite.com
Groth P (2010) ProvenanceJS: revealing the provenance of web pages. In: McGuinness
DL, Michaelis JR, Moreau L (eds) Provenance and annotation of data and processes.
Springer, Heidelberg, pp 283–285. https://doi.org/10.1007/978-3-642-17819-1_34
[Crossref]
Groth P, Gil Y, Cheney J, Miles S (2012) Requirements for provenance on the Web. Int J
Digit Curat 7(1):39–56. https://doi.org/10.2218/ijdc.v7i1.213
[Crossref]
Heussner KM (2009) Woman loses bene its after posting Facebook pics. ABC News
23. https://abcnews.go.com/Technology/AheadoftheCurve/woman-loses-insurance-
bene its-facebook-pics/story?id=9154741
Jain P, Jain P, Kumaraguru P (2013) Call me maybe: understanding nature and risks of
sharing mobile numbers on online social networks. In: Proceedings of the irst ACM
conference on online social networks, pp 101–106. https://doi.org/10.1145/
2512938.2512959
JEITA (2002) Exchangeable image ile format for digital still cameras: Exif version
2.2
Jernigan C, Mistree BFT (2009) View of gaydar: Facebook friendships expose sexual
orientation. https:// irstmonday.org/article/view/2611/2302
Jurgens D, Tsvetkov Y, Jurafsky D (2017) Writer pro iling without the writers text. In:
Ciampaglia GL, Mashhadi A, Yasseri T (eds) Social informatics, Part II. Springer,
Cham, pp 537–558. https://doi.org/10.1007/978-3-319-67256-4_43
Kekü llü oglu D, Magdy W, Vaniea K (2020) analyzing privacy leakage of life events on
Twitter. In: 12th ACM conference on web science, pp 287–294. https://doi.org/10.
1145/3394231.3397919
Kekü llü oğ lu D, Magdy W, Vaniea K (2020) analyzing privacy leakage of life events on
Twitter. In: 12th ACM conference on web science, pp 287–294. https://doi.org/10.
1145/3394231.3397919
Kumari P, Pretschner A, Peschla J, Kuhn JM (2011) Distributed data usage control for
web applications: a social network implementation. In: Proceedings of the irst ACM
conference on data and application security and privacy, pp 85–96. https://doi.org/
10.1145/1943513.1943526
Longo DL, Drazen JM (2016) Data sharing. N Engl J Med 374(3):276–277. https://doi.
org/10.1056/NEJMe1516564
[Crossref]
Marshall MS, Boyce R, Deus HF, Zhao J, Willighagen EL, Samwald M, Pichler E,
Hajagos J, Prudhommeaux E, Stephens S (2012) Emerging practices for mapping and
linking life sciences data using RDF—a case series. J Web Semant 14:2–13. https://
doi.org/10.1016/j.websem.2012.02.003
[Crossref]
McGuinness DL, Da Silva PP (2004) Explaining answers from the Semantic Web: The
Inference Web approach. J Web Semant 1(4):397–413. https://doi.org/10.1016/j.
websem.2004.06.002
[Crossref]
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.