Not enough data to create a plot.
Try a different view from the menu above.
Information Technology
Ontological Semantics for Data Privacy Compliance: The NEURONA Project
Casellas, Nuria (Institute of Law and Technology, Universitat Autònoma de Barcelona) | Nieto, Juan-Emilio (Universitat Autònoma de Barcelona) | Meroño, Albert (Universitat Autònoma de Barcelona) | Roig, Antoni (Universitat Autònoma de Barcelona) | Torralba, Sergi (Universitat Autònoma de Barcelona) | Reyes, Mario (S21sec) | Casanovas, Pompeu (Universitat Autònoma de Barcelona)
Some of the top legal ontologies developed so far include the Functional Ontology for Law [FOLaw] The increasing need for legal information and content (Valente 1995), the Frame-Based Ontology (van Kralingen management caused by the growing amount of 1995), the LRI-Core ontology (Breuker 2004), unstructured (or poorly structured) legal data managed by DOLCE CLO [Core Legal Ontology] (Gangemi et al. legal publishing companies, law firms and public 2003), or the Ontology of Fundamental Concepts (Rubino administrations, or the increasing amount of legal et al. 2006, Sartor 2006) the basis for the LKIF-Core information directly available on the World Wide Web, Ontology (Breuker et al. 2007). Nevertheless, most legal have created an urgent need to construct conceptual ontologies are domain specific ontologies, which represent structures for knowledge representation to share and particular legal domains towards search, indexing and manage intelligently all this information, whilst making reasoning in a specific domain of national or European law human-machine communication and understanding (e.g. the IPRONTO ontology by Delgado et al. 2003, the possible.
Linked Data Meets Computational Intelligence - Position paper
Gueret, Christophe (Vrije Universiteit Amsterdam)
The Web of Data (WoD) is growing at an amazing rate and it will no longer be feasible to deal with it in a global way, by centralising the data or reasoning processes making use of that data. We believe that Computational Intelligence techniques provides the adaptiveness, robustness and scalability that will be required to exploit the full value of ever growing amounts of dynamic Semantic Web data.
Privacy in Online Social Lending
Böhme, Rainer (ICSI Berkeley) | Pötzsch, Stefanie (Technische Universität Dresden)
Online social lending is the Web 2.0's response to classical bank loans. Borrowers publish credit applications on websites which match them with private investors. We point to a conflict between economic interests and privacy goals in online social lending, empirically analyze the effect of data disclosure on credit conditions, and outline directions towards efficient yet privacy-friendly alternative credit markets.
Reality Mining Africa
Hill, Shawndra (University of Pennsylvania) | Banser, Anita (University of Pennsylvania) | Berhan, Getachew (Addis Ababa University) | Eagle, Nathan (Santa Fe Institute)
Cellular phones can be used as mobile sensors, continuously logging users’ behavior including movement, communication and proximity to others. While it is well understood that data generated from mobile phones includes a record of phone calls, there are also more sophisticated data types, such as Bluetooth or cell tower proximity logging, which reveal movement patterns and day-to-day human interactions. We explore the possibility of using mobile phone data to compare movement and communication patterns across cultures. The goal of this proof-of-concept study is to quantify behavior in order to compare different populations. We compare our ability to predict future calling behavior and movement patterns from the cellular phone data of subjects in two distinct groups: a set of university students at MIT in the United States and the University of Nairobi in Kenya. In addition, we show how Bluetooth data may be used to estimate the diffusion of an airborne pathogen outbreak in the different populations.
Towards Territorial Privacy in Smart Environments
Könings, Bastian (Ulm University) | Schaub, Florian (Ulm University) | Weber, Michael (Ulm University) | Kargl, Frank (University of Twente)
Territorial privacy is an old concept for privacy of the personal space dating back to the 19th century. Despite its former relevance, territorial privacy has been neglected in recent years, while privacy research and legislation mainly focused on the issue of information privacy. However, with the prospect of smart and ubiquitous environments, territorial privacy deserves new attention. Walls, as boundaries between personal and public spaces, will be insufficient to guard territorial privacy when our environments are permeated with numerous computing and sensing devices, that gather and share real-time information about us. Territorial privacy boundaries spanning both the physical and virtual world are required for the demarcation of personal spaces in smart environments. In this paper, we analyze and discuss the issue of territorial privacy in smart environments. We further propose a real-time user-centric observation model to describe multimodal observation channels of multiple physical and virtual observers. The model facilitates the definition of a territorial privacy boundary by separating desired from undesired observers, regardless of whether they are physically present in the user’s private territory or virtually participating in it. Moreover, we outline future research challenges and identify areas of work that require attention in the context of territorial privacy in smart environments.
Preprocessing Legal Text: Policy Parsing and Isomorphic Intermediate Representation
Waterman, K. Krasnow (Massachusetts Institute of Technology)
One of the most significant challenges in achieving digital privacy is incorporating privacy policy directly in computer systems. While rule systems have long existed, translating privacy laws, regulations, policies, and contracts into processor amenable forms is slow and difficult because the legal text is scattered, run-on, and unstructured, antithetical to the lean and logical forms of computer science. We are using and developing intermediate isomorphic forms as a Rosetta Stone-like tool to accelerate the translation process and in hopes of providing support to future domain-specific Natural Language Processing technology. This report describes our experience, thoughts about how to improve the form, and discoveries about the form and logic of the legal text that will affect the successful development of a rules tool to implement real-world complex privacy policies.
Stream-Based Middleware Support for Embedded Reasoning
Heintz, Fredrik (Linköping University) | Kvarnström, Jonas (Linköping University) | Doherty, Patrick (Linköping University)
For autonomous systems such as unmanned aerial vehicles tosuccessfully perform complex missions, a great deal of embedded reasoning is required at varying levels of abstraction. In order to make use of diverse reasoning modules in such systems, issues ofintegration such as sensor data flow and information flow between such modules has to be taken into account. The DyKnow framework is a tool with a formal basis that pragmatically deals with many of the architectural issues which arise in such systems. This includes a systematic stream-based method for handling the sense-reasoning gap,caused by the wide difference in abstraction levels between the noisy data generally available from sensors and the symbolic, semantically meaningful information required by many high-level reasoning modules. DyKnow has proven to be quite robust and widely applicable to different aspects of hybrid software architectures forrobotics. In this paper, we describe the DyKnow framework and show how it is integrated and used in unmanned aerial vehicle systems developed in our group. In particular, we focus on issues pertaining to the sense-reasoning gap and the symbol grounding problem and the use of DyKnow as a means of generating semantic structures representing situational awareness for such systems. We also discuss the use of DyKnow in the context of automated planning, in particular execution monitoring.
Vocabulary Hosting: A Modest Proposal
Halpin, Harry R. (University of Edinburgh) | Baker, Tom (Dublin Core Metadata Initiative Ltd)
Many of the benefits of structured data come about when users can re-use existing vocabularies rather than create new ones, but it is currently difficult for users to find, create, and host new vocabularies. Moreover, the value of any given vocabulary as a foundation for applications depends on the perceived certainty that the vocabulary — both its machine-readable schemas and human-readable specification documents — will remain reliably accessible over time and that its URIs will not be sold, re-purposed, or simply forgotten. This note proposes two approaches for solving these problems: one for multiple Vocabulary Hosting Services and a Vocabulary Preservation System to keep them linked together.
Predicting Positive and Negative Links in Online Social Networks
Leskovec, Jure, Huttenlocher, Daniel, Kleinberg, Jon
We study online social networks in which relationships can be either positive (indicating relations such as friendship) or negative (indicating relations such as opposition or antagonism). Such a mix of positive and negative links arise in a variety of online settings; we study datasets from Epinions, Slashdot and Wikipedia. We find that the signs of links in the underlying social networks can be predicted with high accuracy, using models that generalize across this diverse range of sites. These models provide insight into some of the fundamental principles that drive the formation of signed links in networks, shedding light on theories of balance and status from social psychology; they also suggest social computing applications by which the attitude of one user toward another can be estimated from evidence provided by their relationships with other members of the surrounding social network.
Indexer Based Dynamic Web Services Discovery
Bashir, Saba, Khan, Farhan Hassan, Javed, M. Younus, Khan, Aihab, Khiyal, Malik Sikandar Hayat
Recent advancement in web services plays an important role in business to business and business to consumer interaction. Discovery mechanism is not only used to find a suitable service but also provides collaboration between service providers and consumers by using standard protocols. A static web service discovery mechanism is not only time consuming but requires continuous human interaction. This paper proposed an efficient dynamic web services discovery mechanism that can locate relevant and updated web services from service registries and repositories with timestamp based on indexing value and categorization for faster and efficient discovery of service. The proposed prototype focuses on quality of service issues and introduces concept of local cache, categorization of services, indexing mechanism, CSP (Constraint Satisfaction Problem) solver, aging and usage of translator. Performance of proposed framework is evaluated by implementing the algorithm and correctness of our method is shown. The results of proposed framework shows greater performance and accuracy in dynamic discovery mechanism of web services resolving the existing issues of flexibility, scalability, based on quality of service, and discovers updated and most relevant services with ease of usage.