191 |
A Flexible Graph-Based Data Model Supporting Incremental Schema Design and EvolutionBraunschweig, Katrin, Thiele, Maik, Lehner, Wolfgang 26 January 2023 (has links)
Web data is characterized by a great structural diversity as well as frequent changes, which poses a great challenge for web applications based on that data. We want to address this problem by developing a schema-optional and flexible data model that supports the integration of heterogenous and volatile web data. Therefore, we want to rely on graph-based models that allow to incrementally extend the schema by various information and constraints. Inspired by the on-going web 2.0 trend, we want users to participate in the design and management of the schema. By incrementally adding structural information, users can enhance the schema to meet their very specific requirements.
|
192 |
OPEN—Enabling Non-expert Users to Extract, Integrate, and Analyze Open DataBraunschweig, Katrin, Eberius, Julian, Thiele, Maik, Lehner, Wolfgang 27 January 2023 (has links)
Government initiatives for more transparency and participation have lead to an increasing amount of structured data on the web in recent years. Many of these datasets have great potential. For example, a situational analysis and meaningful visualization of the data can assist in pointing out social or economic issues and raising people’s awareness. Unfortunately, the ad-hoc analysis of this so-called Open Data can prove very complex and time-consuming, partly due to a lack of efficient system support.On the one hand, search functionality is required to identify relevant datasets. Common document retrieval techniques used in web search, however, are not optimized for Open Data and do not address the semantic ambiguity inherent in it. On the other hand, semantic integration is necessary to perform analysis tasks across multiple datasets. To do so in an ad-hoc fashion, however, requires more flexibility and easier integration than most data integration systems provide. It is apparent that an optimal management system for Open Data must combine aspects from both classic approaches. In this article, we propose OPEN, a novel concept for the management and situational analysis of Open Data within a single system. In our approach, we extend a classic database management system, adding support for the identification and dynamic integration of public datasets. As most web users lack the experience and training required to formulate structured queries in a DBMS, we add support for non-expert users to our system, for example though keyword queries. Furthermore, we address the challenge of indexing Open Data.
|
193 |
Set-Derivability of Multidimensional AggregatesAlbrecht, J., Günzel, H., Lehner, Wolfgang 12 January 2023 (has links)
A common optimization technique in data warehouse environments is the use of materialized aggregates. Aggregate processing becomes complex, if partitions of aggregates or queries are materialized and reused later. Most problematic are the implication problems regarding the restriction predicates. We show that in the presence of hierarchies in a multidimensional environment an efficient algorithm can be given to construct - or to derive - an aggregate from one or more overlapping materialized aggregate partitions (set-derivability).
|
194 |
Extraction and integration of Web query interfacesKabisch, Thomas 20 October 2011 (has links)
Diese Arbeit fokussiert auf die Integration von Web Anfrageschnittstellen (Web Formularen). Wir identifizieren mehrere Schritte für den Integrationsprozess: Im ersten Schritt werden unbekannte Anfrageschnittstellen auf ihre Anwendungsdomäne hin analysiert. Im zweiten Schritt werden die Anfrageschnittstellen in ein maschinenlesbares Format transformiert (Extraktion). Im dritten Schritt werden Paare semantisch gleicher Elemente zwischen den verschiedenen zu integrierenden Anfragesschnittstellen identifiziert (Matching). Diese Schritte bilden die Grundlage, um Systeme, die eine integrierte Sicht auf die verschiedenen Datenquellen bieten, aufsetzen zu können. Diese Arbeit beschreibt neuartige Lösungen für alle drei der genannten Schritte. Der erste zentrale Beitrag ist ein Exktraktionsalgorithmus, der eine kleine Zahl von Designregeln dazu benutzt, um Schemabäume abzuleiten. Gegenüber früheren Lösungen, welche in der Regel lediglich eine flache Schemarepräsentation anbieten, ist der Schemabaum semantisch reichhaltiger, da er zusätzlich zu den Elementen auch Strukturinformationen abbildet. Der Extraktionsalgorithmus erreicht eine verbesserte Qualität der Element-Extraktion verglichen mit Vergängermethoden. Der zweite Beitrag der Arbeit ist die Entwicklung einer neuen Matching-Methode. Hierbei ermöglicht die Repräsentation der Schnittstellen als Schemabäume eine Verbesserung vorheriger Methoden, indem auch strukturelle Aspekte in den Matching-Algorithmus einfließen. Zusätzlich wird eine globale Optimierung durchgeführt, welche auf der Theorie der bipartiten Graphen aufbaut. Als dritten Beitrag entwickelt die Arbeit einen Algorithms für eine Klassifikation von Schnittstellen nach Anwendungsdomänen auf Basis der Schemabäume und den abgeleiteten Matches. Zusätzlich wird das System VisQI vorgestellt, welches die entwickelten Algorithmen implementiert und eine komfortable graphische Oberfläche für die Unterstützung des Integrationsprozesses bietet. / This thesis focuses on the integration of Web query interfaces. We model the integration process in several steps: First, unknown interfaces have to be classified with respect to their application domain (classification); only then a domain-wise treatment is possible. Second, interfaces must be transformed into a machine readable format (extraction) to allow their automated analysis. Third, as a pre-requisite to integration across databases, pairs of semantically similar elements among multiple interfaces need to be identified (matching). Only if all these tasks have been solved, systems that provide an integrated view to several data sources can be set up. This thesis presents new algorithms for each of these steps. We developed a novel extraction algorithm that exploits a small set of commonsense design rules to derive a hierarchical schema for query interfaces. In contrast to prior solutions that use mainly flat schema representations, the hierarchical schema better represents the structure of the interfaces, leading to better accuracy of the integration step. Next, we describe a multi-step matching method for query interfaces which builds on the hierarchical schema representation. It uses methods from the theory of bipartite graphs to globally optimize the matching result. As a third contribution, we present a new method for the domain classification problem of unknown interfaces that, for the first time, combines lexical and structural properties of schemas. All our new methods have been evaluated on real-life datasets and perform superior to previous works in their respective fields. Additionally, we present the system VisQI that implements all introduced algorithmic steps and provides a comfortable graphical user interface to support the integration process.
|
195 |
Theorizing Sonata Form from the Margins: The Keyboard Sonata in Eighteenth-Century SpainEspinosa, Bryan Stevens 05 1900 (has links)
This study describes a set of salient formal norms for the eighteenth-century Spanish keyboard sonata through an application of Hepokoski and Darcy's sonata theory, William Caplin's form-functional theory, and Robert Gjerdingen's schema theory. It finds that particular thematic types, intra-thematic functions, and rhetorical markers characterize this repertoire. In order to trace the development of these norms throughout the eighteenth century, this work is organized into two parts. The first part (Chapters 2 and 3) examines the mid-century Spanish keyboard sonatas of Sebastián de Albero (1722–1756), Joaquín Ojinaga (1719–1789), and their contemporaries. The second part (Chapters 4 and 5) examines the late-century Spanish keyboard sonatas of Manuel Blasco de Nebra (1750–1783) and his contemporaries.
|
196 |
Examining self-monitoring as a moderator of the effectiveness of social norms and self-schema matched messages for reducing binge drinking among college studentsMiller, Megan Michelle January 1900 (has links)
Master of Science / Department of Psychology / Laura A. Brannon / Self-monitoring was examined as a moderator of the effectiveness of persuasive messages for reducing college student binge drinking. Low self-monitors tend to be influenced by their personal values and attitudes, while high self-monitors tend to be influenced by the behavior of those around them. Via a website simulation, college students were presented with one of three types of anti-binge drinking messages: a self-schema message, which highlighted how responsible drinking is consistent with the message recipient’s personal values and attitudes; a social norms message, which explained that most college students drink less than one might think they do; or a control message, which stated in general terms that people can experience a variety of problems from binge drinking. Overall intended drinking behavior in the self-schema message condition was almost identical to that of the social norms message condition, both of which were lower than drinking intentions in the control message condition. When presented with a self-schema matched message, low self-monitors intended to drink less alcohol than did high self-monitors, but these means were not significantly different. However, high self-monitors intended to drink significantly less than did low self-monitors when presented with a social norms message. The results suggest that self-schema matched messages may be effective at reducing binge drinking for most students, and that social norms messages may be equally as effective but only for high self-monitors.
|
197 |
'They are exactly as bank notes are' : perceptions and technologies of bank note forgery during the Bank Restriction Period, 1797-1821Mockford, Jack January 2014 (has links)
Previous studies of Bank Note forgery in England during the Bank Restriction Period have adopted a highly institutional focus. Thus, much is known about the role played by both the Bank of England and the workings of the criminal justice system in combating both forgers and forged note utterers. The question of how the new system of small denomination Bank Notes impacted upon the day to day lives and understandings of the people that used them has received far less attention. The actual means by which Bank Notes were themselves forged has also been overlooked. This has led to a somewhat two-dimensional view of these notes as material objects. This thesis will engage with common mentalities and perceptions, seeking to write a 'new history from below' of both Bank Notes and their forgery in this period. Its primary aims will be to explore the question of why the English people were so easily imposed upon by forged Bank Notes; the various means by which forged notes could be constructed; and what an analysis of both of these points can tell us about economic and social understandings of non-elite people at this time. It will be argued that by studying instances in which small denomination Bank Notes were routinely exchanged, we can highlight a significant dichotomy of understanding in a society that was starting to engage with a new culture of promise based fiduciary paper money, yet was still deeply rooted in early-modern notions of paper instruments as objects of personal credit and debt. The thesis will show that heavy exposure to Bank Notes at this time clearly equipped some contemporaries with their own personalised sets of aesthetic and material "standards", against which the "goodness" of any monetary instrument with which they were presented would be compared. Others continued to examine the material aspect of Bank Notes via a direct comparison or consultation with others. Neither approach was always successful and indeed whatever method was adopted, the common occurrence of the materials and technologies required to construct a credible imitation of a Bank Note meant that it was not just illiterate persons that were susceptible to being deceived. Even a reading of the Bank Note's literate text failed to provide sufficient defence against the activities of the forger.
|
198 |
Systematic Analysis and Methodologies for Hardware SecurityMoein, Samer 18 December 2015 (has links)
With the increase in globalization of Integrated Circuit (IC) design and production,
hardware trojans have become a serious threat to manufacturers as well as
consumers. These trojans could be intensionally or accidentally embedded in ICs to
make a system vulnerable to hardware attacks. The implementation of critical applications
using ICs makes the effect of trojans an even more serious problem. Moreover,
the presence of untrusted foundries and designs cannot be eliminated since the need
for ICs is growing exponentially and the use of third party software tools to design
the circuits is now common. In addition if a trusted foundry for fabrication has to
be developed, it involves a huge investment. Therefore, hardware trojan detection
techniques are essential. Very Large Scale Integration (VLSI) system designers must
now consider the security of a system against internal and external hardware attacks.
Many hardware attacks rely on system vulnerabilities. Moreover, an attacker may
rely on deprocessing and reverse engineering to study the internal structure of a system
to reveal the system functionality in order to steal secret keys or copy the system.
Thus hardware security is a major challenge for the hardware industry. Many hardware
attack mitigation techniques have been proposed to help system designers build
secure systems that can resist hardware attacks during the design stage, while others
protect the system against attacks during operation.
In this dissertation, the idea of quantifying hardware attacks, hardware trojans,
and hardware trojan detection techniques is introduced. We analyze and classify hardware
attacks into risk levels based on three dimensions Accessibility/Resources/Time
(ART). We propose a methodology and algorithms to aid the attacker/defender to
select/predict the hardware attacks that could use/threaten the system based on the
attacker/defender capabilities. Because many of these attacks depends on hardware
trojans embedded in the system, we propose a comprehensive hardware trojan classification based on hardware trojan attributes divided into eight categories. An adjacency
matrix is generated based on the internal relationship between the attributes
within a category and external relationship between attributes in different categories.
We propose a methodology to generate a trojan life-cycle based on attributes determined
by an attacker/defender to build/investigate a trojan. Trojan identification
and severity are studied to provide a systematic way to compare trojans. Trojan
detection identification and coverage is also studied to provide a systematic way to
compare detection techniques and measure their e effectiveness related to trojan severity.
We classify hardware attack mitigation techniques based on the hardware attack
risk levels. Finally, we match these techniques to the attacks the could countermeasure
to help defenders select appropriate techniques to protect their systems against
potential hardware attacks. / Graduate / 0544 / 0984 / samerm@uvic.ca
|
199 |
Teenage Clumsiness: Does it exist?2015 June 1900 (has links)
Adolescence is characterized by systematic and dramatic physical and behavioural changes, the most noticeable physical growth is the rapid increase in stature marked by peak height velocity (PHV). Anecdotally, many people are aware that as youth pass through their adolescent growth spurt there is a perceived period of physical awkwardness; however, there is no scientific agreement as to whether a period of awkwardness associated with the adolescent growth actually exists. Previous research has focused on the development of general motor performance or gross motor coordination. Increases in strength during adolescence may mask the effect of a stage of adolescent awkwardness on general motor performance tasks. To detect adolescent awkwardness it is necessary to measure either performance of skills that specifically do not depend on strength, or body awareness. The purpose of this study was to investigate whether female adolescents’ awareness of their body size and movement was influenced by biological maturation, and whether adolescent awkwardness could be detected in performance of sport specific skills independent of strength. An endpoint matching task was used to measure awareness of foot position in space by measuring the distance (mm) between a reference and matching endpoint position (endpoint matching error (EME)) with eyes either open or closed. The Johnson wall volley and a ball juggling task were used to measure soccer specific skill and coordination. Thirty six female youth soccer players, aged 10-14 years, were recruited. Age at PHV was predicted from measures of age, height, leg length and weight. Three groups were identified: pre-PHV (n=6), PHV (n=5) and post –PHV (n=25). Mean group differences were assessed using ANOVA. It was found that when the endpoint matching task was performed with eyes open there was no significant difference in mean EME between groups (p > 0.05). With eyes closed the PHV group performed worse than the pre-PHV and post-PHV groups. The Post-PHV group significantly (p < 0.05) decreased their EME (22.2 ± 13.9) compared to the PHV group (32.8 ± 17.6) but no difference was found with the Pre-PHV group (27.5 ± 15.7). On the wall volley test the Post-PHV group performed significantly (p < 0.05) better compared to the PHV group but not the Pre-PHV group. The Post-PHV group performed significantly (p < 0.05) better on the ball juggling task compared to both the Pre-PHV and the PHV groups. In conclusion, the results suggest that in the year around PHV body awareness, as measured by EME, may plateau or decrease and that soccer skill performance plateaus. This plateau or decrease in body awareness and soccer skills involving coordination is likely temporary; participants in this study who were > 6 months past PHV had significantly better body awareness and soccer skill performance than those participants who were within 6 months of PHV. The results from the endpoint matching task also indicate that a measure of body size and movement awareness has the potential to be used to measure changes in body awareness during the adolescent growth spurt. The results of this study suggest that teenage clumsiness could exists. However, a definitive study with larger maturity groups followed over time is required to confirm this statement.
|
200 |
La structuration sémantique des contenus des documents audiovisuels selon les points de vue de la productionBui Thi, Minh Phung 26 June 2003 (has links) (PDF)
Dans le contexte des progrès sensibles en termes de technologies de l'information et de normes associées à la vidéo, notre travail propose des outils de description flexible et à forte teneur sémantique des contenus audiovisuels au niveau du plan – le PSDS (Production Shot Description Scheme) – orientés par l'approche sémiotique et selon les points de vue des professionnels de la production. Nous constatons que les contenus audio-visuels ont une triple dimension sémantique – la sémantique technique, la sémantique du monde narratif et la sémiotique – et chaque niveau a sa propre description ontologique. La sémiotique complète la sémantique technique et thématique du contenu de la vidéo en expliquant pour quelles raisons les structures dynamiques du texte filmique peuvent produire ces interprétations sémantiques. Mobilisant tant des techniques d'analyse automatiques des média que des modèles existants, des terminologies, des théories et des discours du monde de cinéma, cette approche peut offrir une traduction naturelle et simple entre les différents niveaux sémantiques. La description orientée-objet à multiples points de vue des contenus implique de mettre en évidence dans l'arbre ontologique les unités significatives du domaine et leurs caractéristiques. Ces unités constituent les informations fondamentales pour l'appréhension du sens du récit. Elles sont représentées par des concepts qui constituent un réseau sémantique où les utilisateurs peuvent naviguer à la recherche d'informations. Chaque concept est un noeud du réseau sémantique du domaine visé. Représentées ensuite selon le formalisme Mpeg-7 et XML Schema, les connaissances intégrées dans les schémas de description du plan de la vidéo peuvent servir de base à la construction d'environnements interactifs d'édition des images. La vidéo y devient un flux informationnel dont les données peuvent être balisées, annotées, analysées et éditées. Les métadonnées analysées dans notre travail, comprenant des informations relevant de trois étapes de la production (pré-production, production et post-production) doivent permettre aux applications de gérer et manipuler les objets de la vidéo, ainsi que les représentations de leur sémantique, afin de les réutiliser dans plusieurs offres d'accès telles que l'indexation du contenu, la recherche, le filtrage, l'analyse et l'appréhension des images du film.
|
Page generated in 0.113 seconds