Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Semantic Web and Peer-to-Peer: Decentralized Management and Exchange of Knowledge and Information

Buy
The Semantic Web and Peer-to-Peer are two technologies that address a common
need at different levels:

• The Semantic Web addresses the requirement that one may model, manipulate
and query knowledge and information at the conceptual level rather than at the
level of some technical implementation. Moreover, it pursues this objective in a
way that allows people from all over the world to relate their own view to this
conceptual layer. Thus, the Semantic Web brings new degrees of freedom for
changing and exchanging the conceptual layer of applications.
• Peer-to-Peer technologies aim at abandoning centralized control in favor of decentralized
organization principles. In this objective they bring new degrees of
freedom for changing information architectures and exchanging information between
different nodes in a network.
• Together, Semantic Web and Peer-to-Peer allow for combined flexibility at the
level of information structuring and distribution.

Historical Remarks and Acknowledgements
How to benefit from this combined flexibility has been investigated in a number of
research efforts. In particular, we coordinated the EU IST research project “SWAP
— Semantic Web and Peer-to-peer” (http://swap.semanticweb.org) that
led to many chapters of this book1 and, also, to a 15,000 Euro doIT software innovation
award for the work on Bibster (see Chap. 18) from the local government of the
German state of Baden-Württemberg. Thus, we are very much indebted to the EU
for generously funding this project.
(HTML tags aren't allowed.)

iOS Recipes: Tips and Tricks for Awesome iPhone and iPad Apps
iOS Recipes: Tips and Tricks for Awesome iPhone and iPad Apps

Our goal as programmers is to solve problems. Sometimes the problems are hard, sometimes they’re easy, and sometimes they’re even fun. Maybe they’re not even “problems” in the colloquial sense of the word, but we are there to solve them.

Our goal as authors is to help you solve your problems...

Bailout Nation: How Greed and Easy Money Corrupted Wall Street and Shook the World Economy
Bailout Nation: How Greed and Easy Money Corrupted Wall Street and Shook the World Economy

An engaging look at what led to the financial turmoil we now find ourselves in

Bailout Nation offers one of the clearest looks at the financial lenders, regulators, and politicians responsible for the financial crisis of 2008. Written by Barry Ritholtz, one of today's most popular economic bloggers and a well-established...

Failure Criteria in Fibre-Reinforced-Polymer Composites
Failure Criteria in Fibre-Reinforced-Polymer Composites
Fibre Reinforced Polymer composite materials (FRP’s) are now widely utilised in many applications including aircraft, yachts, motor vehicles, chemical and process plant, sporting goods and a wide range of military equipment. They are an extremely broad and versatile class of material, encompassing a wide range of fibre and...

Understanding IPv6
Understanding IPv6

This book is a straightforward discussion of the concepts, principles, and processes of Internet Protocol version 6 (IPv6) and how IPv6 is supported by the Microsoft Windows .NET Server 2003 family of operating systems. It is primarily a discussion of protocols and processes rather than a discussion of planning, configuration, deployment, and...

Pro ASP.NET 1.1 in VB.NET: From Professional to Expert
Pro ASP.NET 1.1 in VB.NET: From Professional to Expert

Pro ASP.NET 1.1 in VB.NET aims to be the definite reference for working developers in the field. Its compendium format covers every topic you are likely to come across in your day-to-day work, from handling data through to configuration and deployment.

The books goal is to act firstly as a tutorial guide that can be read...

Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy