TITLE

RDF-based Peer-to-Peer Based Ontology Editing

AUTHOR(S)
Becker, Peter; Eklund, Peter; Roberts, Natalyia
PUB. DATE
March 2006
SOURCE
Journal of Digital Information Management;Mar2006, Vol. 4 Issue 1, p50
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The evolution of the Semantic Web has accelerated the need for ontologies. There is a need to build new ontologies and to extend and merge existing ontologies. To achieve this we need software tools to edit and build ontologies. Our paper describes software to develop a protocol for collaborative ontology editing based on RDF and using a Peer-to-Peer (P2P) networking architecture. The protocol allows for the implementation a voting mechanism embedded into the RDF data itself, using a mixed initiative design for notification. This is implemented as extensions to an ontology browser called ONTORAMA. The P2P approach is compared to the classic ontology editing approaches and the special requirements of the ontology editing environment are discussed. The protocol, design, implementation and architecture for ontology update are also elaborated.
ACCESSION #
20478401

 

Related Articles

  • Good guys or bad guys? Wilson, Carol // Telephony;10/8/2007, Vol. 248 Issue 16, p6 

    The author reflects on the peer-to-peer (P2P) technology issues in the U.S. She notes that there are some concerns about the dots per inch (DPI) devices, despite its ability to allow service providers to see exactly how customers use Internet access services by both identifying the P2P traffic...

  • Peering into Video's Future. Roush, Wade // Technology Review;Mar2007, Vol. 110 Issue 2, p46 

    The article discusses issues related to the increasing popularity of digital video and its implications for Internet traffic. The growing popularity of digital video is evidenced by the fact that 60 percent of Internet traffic is accounted for television shows, YouTube clips, animations and...

  • Using Proximity Measure to Improve Locality in Structured P2P Networks. Hadighi, Rofide; Gharib, Mohammed // International Journal of Computer Applications;May2012, Vol. 45, p31 

    Peer-to-peer networks are generally characterized in terms of sharing computer resources without the intermediation of a centralized server. Interconnected nodes in peer-to-peer networks are able to communicate through a self organizing topology which runs as an overlay on top of the physical...

  • P2P 4 The Enterprise? Krapf, Eric // Business Communications Review;May2005, Vol. 35 Issue 5, p4 

    The article focuses on using peer-to-peer (P2P) technologies of computer networks such as BitTorrent. P2P is only growing. BitTorrent alone accounts for almost one-third of all traffic on the Internet. By its nature, P2P is more suited for consumer applications than enterprise. BitTorrent and...

  • CENTRALITY-BASED NETWORK CODER PLACEMENT FOR PEER-TO-PEER CONTENT DISTRIBUTION. Dinh Nguyen; Hidenori Nakazato // International Journal of Computer Networks & Communications;May2013, Vol. 5 Issue 3, p157 

    Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation cost: every node in the network has to code. Interested in minimizing resource consumption of network coding while maintaining its performance, in this paper, we propose a practical network...

  • P2P For Communications: Beyond File Sharing. Jennings, Cullen; Bryan, David A. // Business Communications Review;Feb2006, Vol. 36 Issue 2, p36 

    The article provides a comprehensive information about peer-to-peer telephony (P2P). There is no exact technical definition available for P2P technology. Its implication is more related to marketing rather than technology. It implies that multiple pieces of software work together directly as...

  • Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets. Tian-Zuo Wang; Huai-Min Wang; Bo Liu; Bo Ding; Jing Zhang; Pei-Chang Shi // KSII Transactions on Internet & Information Systems;Oct2012, Vol. 6 Issue 10, p2731 

    Sybil attack has been proved effective in mitigating the P2P botnet, but the impacts of some important parameters were not studied, and no model to estimate the effectiveness was proposed. In this paper, taking Kademlia-based botnets as the example, the model which has the upper and lower bound...

  • PEER POLITICS. Spangler, Todd // Multichannel News;4/21/2008, Vol. 29 Issue 16, p33 

    The article discusses the treatment of Comcast and other Internet-service providers on peer-to-peer traffic that crosses the network. Comcast positioned itself as proactively and responsibly addressing to the issue of peer-to-peer applications by leading an industry wide effort to create a P2P...

  • P2P For Communications: Beyond File Sharing. Jennings, Cullen; Bryan, David A. // Business Communications Review;Feb2006, Vol. 36 Issue 2, p36 

    The article provides a comprehensive information about peer-to-peer telephony (P2P). There is no exact technical definition available for P2P technology. Its implication is more related to marketing rather than technology. It implies that multiple pieces of software work together directly as...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics