Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intelligent Information Integration for the Semantic Web (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

Buy

The Semantic Web offers new options for information processes. Dr. Visser is dealing with two core issues in this area: the integration of data on the semantic level and the problem of spatio-temporal representation and reasoning. He tackles existing research problems within the field of geographic information systems (GIS), the solutions of which are essential for an improved functionality of applications that make use of the Semantic Web (e.g., for heterogeneous digital maps). In addition, they are of fundamental significance for information sciences as such.

In an introductory overview of this field of research, he motivates the necessity for formal metadata for unstructured information in the World Wide Web. Without metadata, an efficient search on a semantic level will turn out to be impossible, above all if it is not only applied to a terminological level but also to spatial-temporal knowledge. In this context, the task of information integration is divided into syntactic, structural, and semantic integration, the last class by far the most difficult, above all with respect to contextual semantic heterogeneities.

A current overview of the state of the art in the field of information integration follows. Emphasis is put particularly on the representation of spatial and temporal aspects including the corresponding inference mechanisms, and also the special requirements on the Open GIS Consortium.

(HTML tags aren't allowed.)

Understanding 3D Animation Using Maya (Book with CD)
Understanding 3D Animation Using Maya (Book with CD)
Many animators and designers would like to supplement their Maya learning with a less-technical, more helpful book. This new self-study manual is both a general guide for understanding 3-D computer graphics and a specific guide for learning the fundamentals of Maya: workspace, modeling, animation, shading, lighting, and rendering.

This...

Nonlinear Diffusion of Electromagnetic Fields: With Applications to Eddy Currents and Superconductivity (Electromagnetism)
Nonlinear Diffusion of Electromagnetic Fields: With Applications to Eddy Currents and Superconductivity (Electromagnetism)
Nonlinear Diffusion of Electromagnetic Fields covers applications of the phenomena of non-linear diffusion of electromagnetic fields, such as magnetic recording, electromagnetic shielding and non-destructive testing, development of CAD software, and the design of magnetic components in electrical machinery. The material presented...
Mastering IBM i: The Complete Resource for Today's IBM i System
Mastering IBM i: The Complete Resource for Today's IBM i System

The IBM i operating system running on IBM Power Systems is a platform in transition. Many think the system is obsolete, largely due to its infamous green screen. Nothing, though, could be further from the truth. When IBM embraced open-source software such as Linux, MySQL, and Zend PHP, the system cemented a formidable position in...


Core Java 2, Volume I: Fundamentals (6th Edition)
Core Java 2, Volume I: Fundamentals (6th Edition)

Ask any experienced Java technology programmer: Core Java delivers the real-world guidance you need to accomplish even the most challenging tasks. That's why it's been an international best seller for seven straight years. Core Java II, Volume 1 covers the...

802.11n: A Survival Guide
802.11n: A Survival Guide
Communications is changing our life in many ways. Our society is increasingly dependent on wireless communications technologies and the applications they support. In the same way that we can’t understand how the folks who lived in 1800 managed without anesthesia, television, … (insert favorite must-have...
Mission Critical Internet Security
Mission Critical Internet Security
The best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy