Developing successful multimedia systems is challenging as it involves integrating different media types into a coherent framework. Continuous media like video require large storage and bandwidth while automatic analysis of audio, image and video content is difficult. Multimedia computing draws from many areas and requires complex algorithms and efficient hardware. Example multimedia systems at MIT's Project Athena included applications for real estate, navigation, learning and photos sharing. Key techniques in multimedia include data compression, processing and analysis, delivery over networks, and database indexing and retrieval.
The document discusses NovaGenesis, a proposed clean slate architecture for next generation converging information technologies. It describes key aspects of NovaGenesis including using natural language for naming, distributing functionalities as services, storing name bindings on distributed hash tables, and enabling discovery through publishing and subscribing to bindings. The document also outlines several security requirements and challenges for NovaGenesis, such as ensuring message integrity and confidentiality, managing identity and reputation, and addressing scalability and resilience issues.
The Next Generation Internet (NGI) is a European initiative that aims to shape the future development of the Internet to be more human-centric. The NGI funds several projects related to intrusion detection systems, computer vision databases, web development frameworks, opportunistic social networking routing, and trust/security in online social networks. Each project coordinates with others to build technologies that meet the NGI's objectives of responding to fundamental human needs like trust, security, values and ethics.
Presentation done at the BIC event at São Paulo, 2013.
As part of it’s long term strategy for building international cooperation, the BIC project is setting up an in-country Extended Working Group (EWG) in Brazil comprised of key members of the Brazilian research community engaged in research in all areas related to Trustworthy ICT and international cooperation.
The launch meeting of the Brazil EWG was held on 22nd October, 2013, at the Instituto de Tecnologia de Software (ITS) in São Paulo, Brazil.
9th International Conference on Database and Data Mining (DBDM 2021)albert ca
9th International Conference on Database and Data Mining (DBDM 2021) Conference provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.
The document discusses strategies for civil society organizations (CSOs) to advocate on internet policy issues in Indonesia, including online freedom of expression. It identifies key issues like privacy, surveillance, and net neutrality. CSO representatives discussed these topics and how to prioritize them for engagement at the 2013 Internet Governance Forum. The document also examines Indonesia's law on electronic information dissemination and some court cases around online defamation, identifying the law as a hindrance to internet users' rights. CSOs plan capacity building, media outreach, and stakeholder engagement to advocate reforming this law to protect freedom of expression.
The document discusses data science and distributed computing. It includes details about the author's contact information and areas of expertise including locations, programming tools, and frameworks. It then discusses perspectives on data science and how fields are now data science fields. It provides examples of using data exploration and data mining from various sources. It also includes information about genetic causes of disease research conducted on Azure cloud using many cores. Finally, it lists various data analytics and machine learning tools and frameworks.
Developing successful multimedia systems is challenging as it involves integrating different media types into a coherent framework. Continuous media like video require large storage and bandwidth while automatic analysis of audio, image and video content is difficult. Multimedia computing draws from many areas and requires complex algorithms and efficient hardware. Example multimedia systems at MIT's Project Athena included applications for real estate, navigation, learning and photos sharing. Key techniques in multimedia include data compression, processing and analysis, delivery over networks, and database indexing and retrieval.
The document discusses NovaGenesis, a proposed clean slate architecture for next generation converging information technologies. It describes key aspects of NovaGenesis including using natural language for naming, distributing functionalities as services, storing name bindings on distributed hash tables, and enabling discovery through publishing and subscribing to bindings. The document also outlines several security requirements and challenges for NovaGenesis, such as ensuring message integrity and confidentiality, managing identity and reputation, and addressing scalability and resilience issues.
The Next Generation Internet (NGI) is a European initiative that aims to shape the future development of the Internet to be more human-centric. The NGI funds several projects related to intrusion detection systems, computer vision databases, web development frameworks, opportunistic social networking routing, and trust/security in online social networks. Each project coordinates with others to build technologies that meet the NGI's objectives of responding to fundamental human needs like trust, security, values and ethics.
Presentation done at the BIC event at São Paulo, 2013.
As part of it’s long term strategy for building international cooperation, the BIC project is setting up an in-country Extended Working Group (EWG) in Brazil comprised of key members of the Brazilian research community engaged in research in all areas related to Trustworthy ICT and international cooperation.
The launch meeting of the Brazil EWG was held on 22nd October, 2013, at the Instituto de Tecnologia de Software (ITS) in São Paulo, Brazil.
9th International Conference on Database and Data Mining (DBDM 2021)albert ca
9th International Conference on Database and Data Mining (DBDM 2021) Conference provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.
The document discusses strategies for civil society organizations (CSOs) to advocate on internet policy issues in Indonesia, including online freedom of expression. It identifies key issues like privacy, surveillance, and net neutrality. CSO representatives discussed these topics and how to prioritize them for engagement at the 2013 Internet Governance Forum. The document also examines Indonesia's law on electronic information dissemination and some court cases around online defamation, identifying the law as a hindrance to internet users' rights. CSOs plan capacity building, media outreach, and stakeholder engagement to advocate reforming this law to protect freedom of expression.
The document discusses data science and distributed computing. It includes details about the author's contact information and areas of expertise including locations, programming tools, and frameworks. It then discusses perspectives on data science and how fields are now data science fields. It provides examples of using data exploration and data mining from various sources. It also includes information about genetic causes of disease research conducted on Azure cloud using many cores. Finally, it lists various data analytics and machine learning tools and frameworks.
This document discusses the components and technologies of digital libraries. It describes the key components as selection and acquisition, organization through metadata assignment, indexing and storage in a repository, and search and retrieval via a digital library website. It then associates various technologies with these components, such as metadata standards, document formats, repository systems like DSpace and Fedora, and semantic technologies.
The document discusses grid computing and the development of computational grids. Key points:
- Grids allow for sharing of computing power and resources across geographic locations through networked supercomputers, databases, and instruments.
- Major organizations like NASA, DOE, and NSF are working to build computational grids for applications like scientific simulations and instrument control.
- Indiana University is involved in grid research through various departments and projects focused on resource sharing, portals, middleware, and more.
Data Modeling and Knowledge Engineering for the Internet of ThingsPayamBarnaghi
The document discusses semantic modeling for the Internet of Things (IoT). It begins by outlining some of the key challenges for IoT, including scalability, interoperability, efficiency, data processing/privacy, and discovery. It then describes a "semantic oriented" vision for IoT that addresses these challenges through unique object addressing, representation of exchanged information, and storing information - bringing a semantic perspective to IoT.
Coreon - Making Sure IoT Devices Understand Each Other!Jochen Hummel
The biggest challenge for the IoT is semantic interoperability. The solution is to abstract metadata from sensors and devices by creating an IoT knowledge system.
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is an important problem and crucial for many Web applications. An approach that addresses data integrity and confidentiality in content adaptation and caching by intermediaries. It permits multiple intermediaries to simultaneously perform content services on different portions of the data. Protocol supports decentralized proxy and key management and flexible delegation of services. Experimental results show that approach is efficient and minimizes the amount of data transmitted across the network.
Building Scalable, secure, hierarchical ROOFs using Distributed Hash TablesRohit Sardesai
This document discusses using distributed hash tables (DHTs) as an alternative to blockchain for device management and validation in real-time onsite operations facilitation (ROOF) frameworks for IoT. DHTs distribute key-value pairs across nodes to provide load balancing, fault tolerance, and efficient lookups while considering network locality. The document outlines challenges with blockchain for resource-limited IoT devices and proposes using a scalable, fault-tolerant, private DHT overlay network between devices running the same application as a faster alternative that does not require consensus. Holochain is mentioned as an example that could provide context-based communication between devices using such a DHT while preventing malicious attacks.
The impact of Big Data on next generation of smart citiesPayamBarnaghi
Big data has the potential to empower citizens, improve public services, and create smarter cities if used effectively. However, simply collecting large volumes of data is not enough - data must be given proper semantics, quality assurances, and integrated with domain knowledge to generate meaningful insights and actions. Additionally, cities are complex social systems, so the social aspects of data collection and its implications must be considered. Technical challenges include data discovery, access, integration, interpretation and scaling to large volumes from many sources, while social challenges involve transforming perceptions and ensuring citizen participation, privacy, and open data access.
David Turner_AEKOS: a new paradigm to enable discovery, access and re-purposi...TERN Australia
ÆKOS is a new paradigm for discovering and accessing complex ecological data. It aims to preserve the full richness of ecological data and context by using a flexible semi-structured graph model rather than rigid data models. ÆKOS captures descriptive artifacts to provide understanding of data context and avoid overly complex modeling. This approach enables more informed reuse of data for a broader range of questions by allowing users to assess suitability for their purposes.
PERICLES workshop (London 15 October 2015) - Art & Media Domain OntologiesPERICLES_FP7
PERICLES partner Anna Eggers (University of Göttingen) introduces a card game which has been invented to explain the Digital Ecosystem Model.
The modelling card game helps to model a scenario without having to write code or use modelling software.
PERICLES workshop (London 15 October 2015) - Digital Ecosystem ModelPERICLES_FP7
PERICLES partner Johannes Biermann (University of Göttingen) introduces the concepts of digital ecosystem and modelling in the context of change management and LTDP.
PERICLES - Choice of Information Encapsulation (IE) TechniquePERICLES_FP7
This presentation by Anna-Grit Eggers (University of Goettingen) offers some guidance on the use of Information Encapsulation techniques.
PERICLES is a four-year Integrated Project (2013-2017) funded by the European Union under its Seventh Framework Programme (ICT Call 9).
http://pericles-project.eu/
Semi-automated metadata extraction in the long-termPERICLES_FP7
This presentation was delivered by Emma Tonkin (King's College London) at the Digital Preservation Coalition (DPC) event entitled 'Practical Preservation and People: a briefing about metadata', which took place at the Public Records Office of Northern Ireland, Belfast on 3 December 2015.
PERICLES Information Packaging TechniquesPERICLES_FP7
This document provides an overview of various information packaging techniques and metadata schemes used for digital archiving and preservation. It discusses simple archive container formats like ZIP and TAR, structured packaging methods like BagIt and compound document formats. It also covers several metadata standards for describing and linking digital objects and files, such as METS, PREMIS, ORE, and LMER. The document serves as an introduction to common methods and standards for technical information management.
PERICLES Information Embedding TechniquesPERICLES_FP7
This presentation by Anna Grit Eggers (University of Goettingen) offers an overview of methods and standards for Information Embedding.
PERICLES is a four-year Integrated Project (2013-2017) funded by the European Union under its Seventh Framework Programme (ICT Call 9).
http://pericles-project.eu/
The document describes the PeriCAT framework, which provides a mechanism for capturing user scenarios and suggesting the best information encapsulation technique. It allows integrating various encapsulation techniques from different domains. The framework includes a Java application that can encapsulate and decapsulate digital objects and associated metadata. It provides tutorials and guides for using the tool and its API, as well as information for developers on integrating new techniques and criteria into the framework.
PERICLES Modelling Policies - Acting on Change 2016PERICLES_FP7
This presentation was delivered by Justin and Joel Simpson (Artefactual), Fabio Corubolo (Univ. Liverpool/PERICLES), Jean-Yves Vion-Dury (Xerox/PERICLES) and Stratos Kontopoulos (CERTH/PERICLES) within the interactive workshop 'Modelling Policies, Exploring Real Use Cases' which took place at final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
This workshop explored the application of the PERICLES approach for policy and digital ecosystems modelling for real world preservation policies, provided by Artefactual and by the attendees. A video-player example was used to illustrate change propagation. In the second part of the workshop participants joined in a practical exercise exploring changing needs for Email preservation.
http://pericles-project.eu/
This presentation was delivered by Justin and Joel Simpson (Artefactual), Jean-Yves Vion-Dury (Xerox/PERICLES) and Stratos Kontopoulos (CERTH/PERICLES) at the final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
This thematic session entitled 'Policy Management & Ontology Supported Preservation' aimed at exploring the PERICLES ontology-based digital ecosystems approach, through studying a use case brought to us by Justin Simpson (Director, Archivematica Technical Services - Artefactual ). Mainly focusing on preservation policy management, the use case was a guiding thread to understand how the Linked Resource Model (LRM) ontology and its derivatives (e.g. Digital Ecosystem Model (DEM)) can be applied to address the change issues, notably to track and control the evolution of the objects we are interested in, to document and capture knowledge regarding the external tools associated to them as well as to understand the sensitivity of those objects to their overall technical context.
http://pericles-project.eu/
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES_FP7
This presentation was delivered by Stratos Kontopoulos and Panos Mitzias from PERICLES project partner CERTH/ITI at the interactive workshop ‘Eye of the Storm: Preserving Digital Content in an Ever-Changing World’ (Wellcome Collection Conference Centre, London, 2 December 2016).
This full-day event aimed at introducing and experimenting with the PERICLES model-driven approach demonstrating its usefulness for managing change in evolving digital ecosystems.
http://pericles-project.eu/
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016PERICLES_FP7
This presentation was delivered by Johannes Biermann and Anna Eggers from PERICLES project partner State and University Library Göttingen at the final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
Day 2 - Session 6: 'Capturing the ecosystem of shared infrastructures: How to model the use case of the Dutch network of shared facilities?'
Beginning with presentations from the Netherlands Coalition for Digital Preservation on a new programme to construct a network of national facilities for preservation, the workshop will explore the value of modelling such complex, large-scale preservation environments, focusing on dependencies between, and policies common to, participating organisations, and how PERICLES ideas can help in managing risk across the network.
http://pericles-project.eu/
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...PERICLES_FP7
This presentation was delivered by Noa Campos López and Marcel Hellkamp from PERICLES project partner Georg-August-Universität Göttingen (GWDG), at the interactive workshop ‘Eye of the Storm: Preserving Digital Content in an Ever-Changing World’ (Wellcome Collection Conference Centre, London, 2 December 2016).
This full-day event aimed at introducing and experimenting with the PERICLES model-driven approach demonstrating its usefulness for managing change in evolving digital ecosystems.
http://pericles-project.eu/
This document discusses the components and technologies of digital libraries. It describes the key components as selection and acquisition, organization through metadata assignment, indexing and storage in a repository, and search and retrieval via a digital library website. It then associates various technologies with these components, such as metadata standards, document formats, repository systems like DSpace and Fedora, and semantic technologies.
The document discusses grid computing and the development of computational grids. Key points:
- Grids allow for sharing of computing power and resources across geographic locations through networked supercomputers, databases, and instruments.
- Major organizations like NASA, DOE, and NSF are working to build computational grids for applications like scientific simulations and instrument control.
- Indiana University is involved in grid research through various departments and projects focused on resource sharing, portals, middleware, and more.
Data Modeling and Knowledge Engineering for the Internet of ThingsPayamBarnaghi
The document discusses semantic modeling for the Internet of Things (IoT). It begins by outlining some of the key challenges for IoT, including scalability, interoperability, efficiency, data processing/privacy, and discovery. It then describes a "semantic oriented" vision for IoT that addresses these challenges through unique object addressing, representation of exchanged information, and storing information - bringing a semantic perspective to IoT.
Coreon - Making Sure IoT Devices Understand Each Other!Jochen Hummel
The biggest challenge for the IoT is semantic interoperability. The solution is to abstract metadata from sensors and devices by creating an IoT knowledge system.
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is an important problem and crucial for many Web applications. An approach that addresses data integrity and confidentiality in content adaptation and caching by intermediaries. It permits multiple intermediaries to simultaneously perform content services on different portions of the data. Protocol supports decentralized proxy and key management and flexible delegation of services. Experimental results show that approach is efficient and minimizes the amount of data transmitted across the network.
Building Scalable, secure, hierarchical ROOFs using Distributed Hash TablesRohit Sardesai
This document discusses using distributed hash tables (DHTs) as an alternative to blockchain for device management and validation in real-time onsite operations facilitation (ROOF) frameworks for IoT. DHTs distribute key-value pairs across nodes to provide load balancing, fault tolerance, and efficient lookups while considering network locality. The document outlines challenges with blockchain for resource-limited IoT devices and proposes using a scalable, fault-tolerant, private DHT overlay network between devices running the same application as a faster alternative that does not require consensus. Holochain is mentioned as an example that could provide context-based communication between devices using such a DHT while preventing malicious attacks.
The impact of Big Data on next generation of smart citiesPayamBarnaghi
Big data has the potential to empower citizens, improve public services, and create smarter cities if used effectively. However, simply collecting large volumes of data is not enough - data must be given proper semantics, quality assurances, and integrated with domain knowledge to generate meaningful insights and actions. Additionally, cities are complex social systems, so the social aspects of data collection and its implications must be considered. Technical challenges include data discovery, access, integration, interpretation and scaling to large volumes from many sources, while social challenges involve transforming perceptions and ensuring citizen participation, privacy, and open data access.
David Turner_AEKOS: a new paradigm to enable discovery, access and re-purposi...TERN Australia
ÆKOS is a new paradigm for discovering and accessing complex ecological data. It aims to preserve the full richness of ecological data and context by using a flexible semi-structured graph model rather than rigid data models. ÆKOS captures descriptive artifacts to provide understanding of data context and avoid overly complex modeling. This approach enables more informed reuse of data for a broader range of questions by allowing users to assess suitability for their purposes.
PERICLES workshop (London 15 October 2015) - Art & Media Domain OntologiesPERICLES_FP7
PERICLES partner Anna Eggers (University of Göttingen) introduces a card game which has been invented to explain the Digital Ecosystem Model.
The modelling card game helps to model a scenario without having to write code or use modelling software.
PERICLES workshop (London 15 October 2015) - Digital Ecosystem ModelPERICLES_FP7
PERICLES partner Johannes Biermann (University of Göttingen) introduces the concepts of digital ecosystem and modelling in the context of change management and LTDP.
PERICLES - Choice of Information Encapsulation (IE) TechniquePERICLES_FP7
This presentation by Anna-Grit Eggers (University of Goettingen) offers some guidance on the use of Information Encapsulation techniques.
PERICLES is a four-year Integrated Project (2013-2017) funded by the European Union under its Seventh Framework Programme (ICT Call 9).
http://pericles-project.eu/
Semi-automated metadata extraction in the long-termPERICLES_FP7
This presentation was delivered by Emma Tonkin (King's College London) at the Digital Preservation Coalition (DPC) event entitled 'Practical Preservation and People: a briefing about metadata', which took place at the Public Records Office of Northern Ireland, Belfast on 3 December 2015.
PERICLES Information Packaging TechniquesPERICLES_FP7
This document provides an overview of various information packaging techniques and metadata schemes used for digital archiving and preservation. It discusses simple archive container formats like ZIP and TAR, structured packaging methods like BagIt and compound document formats. It also covers several metadata standards for describing and linking digital objects and files, such as METS, PREMIS, ORE, and LMER. The document serves as an introduction to common methods and standards for technical information management.
PERICLES Information Embedding TechniquesPERICLES_FP7
This presentation by Anna Grit Eggers (University of Goettingen) offers an overview of methods and standards for Information Embedding.
PERICLES is a four-year Integrated Project (2013-2017) funded by the European Union under its Seventh Framework Programme (ICT Call 9).
http://pericles-project.eu/
The document describes the PeriCAT framework, which provides a mechanism for capturing user scenarios and suggesting the best information encapsulation technique. It allows integrating various encapsulation techniques from different domains. The framework includes a Java application that can encapsulate and decapsulate digital objects and associated metadata. It provides tutorials and guides for using the tool and its API, as well as information for developers on integrating new techniques and criteria into the framework.
PERICLES Modelling Policies - Acting on Change 2016PERICLES_FP7
This presentation was delivered by Justin and Joel Simpson (Artefactual), Fabio Corubolo (Univ. Liverpool/PERICLES), Jean-Yves Vion-Dury (Xerox/PERICLES) and Stratos Kontopoulos (CERTH/PERICLES) within the interactive workshop 'Modelling Policies, Exploring Real Use Cases' which took place at final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
This workshop explored the application of the PERICLES approach for policy and digital ecosystems modelling for real world preservation policies, provided by Artefactual and by the attendees. A video-player example was used to illustrate change propagation. In the second part of the workshop participants joined in a practical exercise exploring changing needs for Email preservation.
http://pericles-project.eu/
This presentation was delivered by Justin and Joel Simpson (Artefactual), Jean-Yves Vion-Dury (Xerox/PERICLES) and Stratos Kontopoulos (CERTH/PERICLES) at the final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
This thematic session entitled 'Policy Management & Ontology Supported Preservation' aimed at exploring the PERICLES ontology-based digital ecosystems approach, through studying a use case brought to us by Justin Simpson (Director, Archivematica Technical Services - Artefactual ). Mainly focusing on preservation policy management, the use case was a guiding thread to understand how the Linked Resource Model (LRM) ontology and its derivatives (e.g. Digital Ecosystem Model (DEM)) can be applied to address the change issues, notably to track and control the evolution of the objects we are interested in, to document and capture knowledge regarding the external tools associated to them as well as to understand the sensitivity of those objects to their overall technical context.
http://pericles-project.eu/
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES_FP7
This presentation was delivered by Stratos Kontopoulos and Panos Mitzias from PERICLES project partner CERTH/ITI at the interactive workshop ‘Eye of the Storm: Preserving Digital Content in an Ever-Changing World’ (Wellcome Collection Conference Centre, London, 2 December 2016).
This full-day event aimed at introducing and experimenting with the PERICLES model-driven approach demonstrating its usefulness for managing change in evolving digital ecosystems.
http://pericles-project.eu/
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016PERICLES_FP7
This presentation was delivered by Johannes Biermann and Anna Eggers from PERICLES project partner State and University Library Göttingen at the final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
Day 2 - Session 6: 'Capturing the ecosystem of shared infrastructures: How to model the use case of the Dutch network of shared facilities?'
Beginning with presentations from the Netherlands Coalition for Digital Preservation on a new programme to construct a network of national facilities for preservation, the workshop will explore the value of modelling such complex, large-scale preservation environments, focusing on dependencies between, and policies common to, participating organisations, and how PERICLES ideas can help in managing risk across the network.
http://pericles-project.eu/
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...PERICLES_FP7
This presentation was delivered by Noa Campos López and Marcel Hellkamp from PERICLES project partner Georg-August-Universität Göttingen (GWDG), at the interactive workshop ‘Eye of the Storm: Preserving Digital Content in an Ever-Changing World’ (Wellcome Collection Conference Centre, London, 2 December 2016).
This full-day event aimed at introducing and experimenting with the PERICLES model-driven approach demonstrating its usefulness for managing change in evolving digital ecosystems.
http://pericles-project.eu/
Technical Appraisal Tool, MICE - Acting on Change 2016PERICLES_FP7
This presentation was delivered by Jun Zhang (King’s College London), Patricia Falcao (Tate) and Maria Akritidou (DOTSOFT S.A.) at PERICLES final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
This 'PERICLES in practice' session aimed at demonstrating how risks to digital video artworks and archived space science experiments can be monitored, assessed and visualised.
The 'PERICLES in practice' sessions presented specific outcomes of the PERICLES project set in an example workflow, combining tools to accomplish a goal defined by practitioners and derived from real life challenges they experience in their field of work.
The purpose of digital preservation is to ensure continued access to digital objects over time as technologies change. This requires both passive preservation through secure storage and active preservation such as migration to new file formats or emulation. Characterization, planning, and action are important steps in the preservation process. Tools like PRONOM, LOCKSS, EPrints, and DSpace can help with various aspects of passive and active preservation. The National Library of Korea's OASIS system collects and preserves Korean digital resources through workflows that involve selective collection, processing, metadata, and long-term preservation.
This document provides an introduction to digital preservation. It discusses challenges such as hardware and software obsolescence, storage media decay, and loss of information over time. Standards like the UNESCO Charter on Digital Preservation are mentioned, which emphasize the importance of preserving digital heritage. The heterogeneity of digital materials, formats, and metadata are issues that must be addressed. Approaches to preservation like migration, emulation, and normalization are outlined. The importance of preservation policies, metadata, tools, legal issues, and trusted repositories are also summarized.
- The document discusses requirements for distributed multimedia systems, including supporting continuous media streams, quality of service management, synchronization, and multiparty communications.
- It introduces two framework models for meeting these requirements: 1) A middleware platform that uses "binding objects" to establish and control quality of service for streaming multimedia between applications. 2) A framework providing different services and satisfying application requirements through service selection and integration in an IPv6 differentiated services environment.
- The key requirements discussed are the need to support continuous media streaming over long periods, sophisticated static and dynamic quality of service management, synchronization of multiple media streams, and programming/system support for multiparty communications.
This document provides definitions for terms related to digital preservation and resources. It begins with an introduction stating that a lack of precise definitions can make communication problematic in emerging disciplines like digital preservation. It then provides definitions for key terms such as access, authentication, authenticity, "born digital", digital archiving, digital materials, digital preservation, documentation, and metadata. The document also defines different types of digital resources including e-journals, e-books, aggregated resources, databases, and more. It provides examples of molecular viewer and chemical calculator software. Finally, it discusses the importance of life cycle assessment for managing digital collections over time.
This document provides an overview and introduction to creating and managing digital collections, including:
- Defining digital libraries and their components
- The importance of selection criteria, intellectual property rights, and other legal considerations for digitization
- Cost factors and examples for digitizing different types of materials
- Standards for image processing, file formats, and quality control
- The role and types of metadata, content standards, and ensuring interoperability
- Database software options and technical considerations for storage, access, and user interfaces
PERICLES Domain-specific ontological representations and ontology evolutionPERICLES_FP7
Presented by Stratos Kontopoulos at the PERICLES workshop 'From Semantics of Change to Change of Semantics', University of Borås, 19 May 2015.
http://www.hb.se/en/About-UB/Current/Events/Pericles-F2F/Workshop/
This document discusses research on detecting deception in real-time audio and video streams. It outlines challenges in synchronizing, capturing, indexing and analyzing multiple streams. It proposes using MPEG-7 semantic annotations to generate knowledge bases for analysis. The research tests infrastructure for capturing, storing and retrieving segmented streams in SQL Server 2008. It also demonstrates prototype avatar animation controlled by Python scripts. Further studies are needed on the visual concept models and detection analysis engine.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The technology of object oriented databases was introduced to system developers in
the late 1980’s. Object DBMSs add database functionality to object programming languages. A
major benefit of this approach is the unification of the application and database development into
a seamless data model and language environment. As a result, applications require less code, use
more natural data modeling, and code bases are easier to maintain.
Preparation, Proceed and Review of preservation of Digital Library Asheesh Kamal
My paper focuses on the future information to preserve and use in a user-friendly environment; and also digital preservation methods and strategy, the life cycle of digital media, especially in the digital library.
Digital preservation involves managing digital resources over time to extend their usable lifespan and protect them from technological obsolescence and physical threats. It aims to ensure long-term access through continued accessibility, error-free storage, and ability to retrieve and interpret resources. Key challenges are digital obsolescence as hardware, software, file formats and storage media become outdated, and physical threats like damage from improper storage environments. Strategies include bitstream copying, refreshing to new storage media, analog backups, and data migration to new formats and systems. The Open Archival Information System reference model provides standards for digital preservation.
This document discusses the future of 3D internet and how it could evolve from the current 2D internet. It proposes an architecture for 3D internet involving avatar/ID servers to manage user identities and locations, universe location servers to provide virtual geographical information, and client programs to access the 3D internet via 3D rendering. The 3D internet could support richer virtual environments and applications like social networks, virtual tours, and live events. It may be implemented using technologies like virtual platforms, artificial intelligence, augmented reality devices, and holograms.
Chipster is a user-friendly microarray analysis software that provides intuitive graphical interface and comprehensive selection of analysis tools and visualizations. It uses a distributed system architecture implemented with Java and messaging to connect to external analysis tools via its graphical user interface. Chipster combines a data-centric and workflow-oriented paradigm by allowing users to record and save analyses as reusable scripts.
A Framework To Generate 3D Learning ExperienceNathan Mathis
The document discusses a framework called OpenWebTalk (OWT) that was created to generate configurable 3D learning experiences. OWT is a declarative 3D component framework based on XML documents that describe both the formal structure of the virtual world and the complex set of interaction rules that govern user interactions. This framework aims to help fast prototyping and easy building of collaborative applications. It decouples all phases of authoring, allows easy definition and composition of virtual sessions in a component-oriented fashion, and can drive and control interactions to stimulate collaboration. The framework also provides a high-performance 3D rendering engine configurable through XML.
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsPayamBarnaghi
This document discusses the need for dynamic semantics to handle the complex and changing nature of data in IoT environments. It notes that while semantic models and ontologies exist and are helpful for interoperability, they need to be designed simply and account for the dynamic nature of IoT data. Semantic annotations may change over time and location, and tools are needed to update them automatically. Overall, semantics are an important part of solving interoperability but must be implemented carefully considering the constraints of IoT environments.
The document summarizes key aspects of the gCube architecture and its approaches to enabling interoperability across heterogeneous resources and communities. gCube aims to hide heterogeneity by providing unified access to diverse resources, and embrace heterogeneity by supporting multiple protocols and models. It utilizes various approaches like blackboard communication, wrappers, and adapters to achieve interoperability for resource discovery, content access, data discovery, process execution, and security. Applications like AquaMaps and time series management are also discussed.
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
The document summarizes research on cloud forensics and proposes a new framework. It discusses drawbacks in current cloud forensics methodologies, including an inability to collect evidence from all cloud subscribers and support future forensic objectives. The proposed framework aims to offer a forensic-friendly cloud platform that facilitates easy access to cloud evidence in a forensically-sound manner while minimizing non-essential data and maximizing reliability, relevance and authenticity of collected evidence.
The document summarizes a training event on trusted digital repositories that took place in Vilnius, Lithuania from October 1-5, 2007. It discusses key initiatives and standards for digital preservation and certification of trusted repositories, including the nestor criteria catalogue. The nestor network aims to create a framework of trustworthy long-term digital archives. The document outlines criteria for organizational framework, object management, and infrastructure/security that repositories should address.
Similar to PERICLES workshop (London 15 October 2015) - Art & Media Domain Ontologies (20)
Digital Ecosystem and Process Compiler - IDCC17PERICLES_FP7
This presentation was delivered by Johannes Biermann (State and University Library) and Noa Campos López (Gesellschaft für wissenschaftliche Datenverarbeitung Göttingen mbH).
It introduced the EcoBuilder and the Process Compiler tools during a PERICLES workshop at IDCC17 (Edinburgh, 20 February 2017).
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...PERICLES_FP7
This presentation was delivered by Simon Waddington from PERICLES project partner King's College London at the 12th International Digital Curation Conference (IDCC17).
The presentation introduced the aims of the workshop and core concepts behind PERICLES model-driven approach.
Technical appraisal and change impact analysis - IDCC17 workshopPERICLES_FP7
This presentation was delivered by Simon Waddington from PERICLES project partner King's College London at the 12th International Digital Curation Conference (IDCC17).
ForgetIT: human memory inspired Information ModelPERICLES_FP7
This presentation was delivered by Walter Allasia, Chief Research Officer at EURIX Group during one of the online meetings that took place in the PERICLES Community of Practice (CoP) related to the reuse of science data. This CoP focuses on issues related to the re-use of data in the science domain and brings together scientists, researchers and project managers from leading institutions in Europe to discuss barriers, developments and examples of data management strategies for long-term access.
The presentation covered the Information Model developed by the EU-funded project ForgetIT (2013-2016).
Data quality, preservation and access: a DANS perspectivePERICLES_FP7
This presentation was delivered by Ingrid Dillo, Deputy Director at DANS, during one of the online meetings that took place in the PERICLES Community of Practice (CoP) related to the reuse of science data. This CoP focuses on issues related to the re-use of data in the science domain and brings together scientists, researchers and project managers from leading institutions in Europe to discuss barriers, developments and examples of data management strategies for long-term access.
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...PERICLES_FP7
This presentation was delivered by George Papastefanatos (Athena-Research and Innovation Center) at the PERICLES final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
The workshop was also joined by Simon Waddington (King's College London/PERICLES) and Tomasz Miksa (SBA Research), who discussed approaches to automating long-term management including automated extraction and analysis of environments, and approaches to capturing and applying knowledge and metadata and creation of evidence to support verification and validation. Whilst full automation of preservation processes is still a distant goal, the workshop aimed at investigating how current techniques can be applied for automating decision support and enabling proactive solutions.
http://pericles-project.eu/
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...PERICLES_FP7
This presentation was prepared by George Papastefanatos (Athena-Research and Innovation Center) for the PERICLES final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
George Papastefanatos joined a panel discussion on 'Preparing for Change' facilitated by Natalie Harrower (Digital Repository of Ireland). The panel comprised an exciting group of experts including Natasa Milic-Frayling (Intact Digital/PERSIST); Jean-Yves Vion-Dury (Xerox/PERICLES); Neil Beagrie (Charles Beagrie Ltd) and Nancy McGovern (MIT),
There is a growing awareness of the broader scope of change in digital preservation, but has this awareness yet led to understanding? And understanding to action? Our question to experts in the field of digital preservation was this: how well prepared are we to deal with the multifaceted aspects of change in our digital environments?
http://pericles-project.eu/
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016PERICLES_FP7
This presentation was delivered by Sándor Darányi (University of Borås, Sweden) and Panos Mitzias (CERTH/ITI, Greece) at PERICLES final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
This 'PERICLES in practice' session covered the PERICLES approach in addressing evolving semantics and the use of Somoclu and SemaDrift in the detection of drift to alert ontology maintenance and object appraisal by designated workflows.
http://pericles-project.eu
Risk assessment for preservation in the active life of complex digital object...PERICLES_FP7
This document summarizes a grant agreement from the European Union's Seventh Framework Programme for a project on digital preservation. It also discusses risks to cultural property and the need to identify, estimate, communicate, and manage those risks regularly. Finally, it provides information on the 2005 artwork "Subtitled Public" by Rafael Lozano Hemmer, which uses computer vision and projection mapping to generate and exchange subtitles for people in an exhibition space.
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...PERICLES_FP7
This presentation was delivered by Anna Eggers (State and University Library Göttingen) and Fabio Corubolo (University of Liverpool) at PERICLES final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
This 'PERICLES in practice' session aimed at demonstrating how the PET and the EcoBuilder tools can be used to generate information to populate Digital Ecosystem Model (entities) and how the model can be fed into the Entity Registry Model Repository (ERMR). This session showed how the PERICLES tools can contribute to automated model instance creation and automatic updating.
The 'PERICLES in practice' sessions presented specific outcomes of the PERICLES project set in an example workflow, combining tools to accomplish a goal defined by practitioners and derived from real life challenges they experience in their field of work.
Automatic policy application and change management - Acting on Change 2016PERICLES_FP7
This presentation was delivered by Fabio Corubolo (University of Liverpool) at PERICLES final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
In this 'PERICLES in practice' workshop, Fabio Corubolo used the EUMETSAT example to demonstrate the change of a policy in a real life scenario applying the Policy Editor and the Entity Registry Model Repository (ERMR).
The PERICLES in practice workshops presented specific outcomes of the PERICLES project set in an example workflow, combining tools to accomplish a goal defined by practitioners and derived from real life challenges they experience in their field of work.
Reproducibile scientific workflows - Acting on Change 2016PERICLES_FP7
This presentation was delivered by Tomasz Miksa (SBA Research) at the PERICLES final project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
Tomasz Miksa joined Barbara Reed (Recordkeeping Innovation), Pip Laurenson (Tate/PERICLES), Simon Waddington (King's College London/PERICLES) and Patricia Falcao (Tate/PERICLES) in a thematic session on 'Risk assessment for preservation in the active life of complex digital objects'.
This session looked at how to characterise different types of risk which are relevant to the preservation of a range of digital objects in different contexts including those described by continuum theory. It also considered what type of information is available and required for accurate assessment within different preservation contexts, namely digital artworks, scientific data, records and archives. The focus of this session was largely be on complex digital objects.
http://pericles-project.eu/
Pro-active solutions for higher reproducibility of scientific experiments - A...PERICLES_FP7
This presentation was delivered by Tomasz Miksa (SBA Research) at the final PERICLES project conference 'Acting on Change: New Approaches and Future Practices in LTDP' (Wellcome Collection Conference Centre, London, 30 Nov -1 Dec 2016).
Tomasz Miksa joined Simon Waddington (King's College London/PERICLES) and George Papastefanatos (Athena-Research and Innovation Center) in a workshop on Proactive Data Management, where they discussed approaches to automating long-term management including automated extraction and analysis of environments, and approaches to capturing and applying knowledge and metadata and creation of evidence to support verification and validation. Whilst full automation of preservation processes is still a distant goal, the workshop aimed at investigating how current techniques can be applied for automating decision support and enabling proactive solutions.
http://pericles-project.eu/
PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...PERICLES_FP7
This presentation was delivered by Johannes Biermann and Anna Eggers from PERICLES project partner State and University Library Goettingen, at the interactive workshop ‘Eye of the Storm: Preserving Digital Content in an Ever-Changing World’ (Wellcome Collection Conference Centre, London, 2 December 2016).
This full-day event aimed at introducing and experimenting with the PERICLES model-driven approach demonstrating its usefulness for managing change in evolving digital ecosystems.
http://pericles-project.eu/
PERICLES Decapsulation and RestorationPERICLES_FP7
This presentation by Anna-Grit Eggers (University of Goettingen) offers an overview on information decapsulation and restoration.
PERICLES is a four-year Integrated Project (2013-2017) funded by the European Union under its Seventh Framework Programme (ICT Call 9).
http://pericles-project.eu/
Simon Waddington presented on appraisal tools and requirements for digital preservation. An appraisal tool is needed to assess complex digital objects in a collection and determine which will remain reusable over time. Risks to the objects include technical obsolescence and outdated file formats. A manual appraisal is time-consuming and subjective. An automated tool is needed to assess primary risks to objects, secondary risks to dependent objects, and propose preservation actions to maintain reusability, helping data managers plan preservation strategies. The tool should provide visual risk assessments, automate actions where possible, and perform ongoing assessments, not just one-time appraisals.
PERICLES workshop (IDCC 2016) - Introduction to the PERICLES projectPERICLES_FP7
This presentation was delivered by Simon Waddington from project partner King's College London during the PERICLES workshop entitled 'Appraisal, Quality Assurance and Risk Assessment in the Data Continuum'. The half-day workshop took place at IDCC on 25 February 2016 and presented the PERICLES approach to appraisal and quality assurance of complex digital objects.
See more at: http://www.dcc.ac.uk/events/idcc16/workshops#Worskhop%209
Learn SQL from basic queries to Advance queriesmanishkhaire30
Dive into the world of data analysis with our comprehensive guide on mastering SQL! This presentation offers a practical approach to learning SQL, focusing on real-world applications and hands-on practice. Whether you're a beginner or looking to sharpen your skills, this guide provides the tools you need to extract, analyze, and interpret data effectively.
Key Highlights:
Foundations of SQL: Understand the basics of SQL, including data retrieval, filtering, and aggregation.
Advanced Queries: Learn to craft complex queries to uncover deep insights from your data.
Data Trends and Patterns: Discover how to identify and interpret trends and patterns in your datasets.
Practical Examples: Follow step-by-step examples to apply SQL techniques in real-world scenarios.
Actionable Insights: Gain the skills to derive actionable insights that drive informed decision-making.
Join us on this journey to enhance your data analysis capabilities and unlock the full potential of SQL. Perfect for data enthusiasts, analysts, and anyone eager to harness the power of data!
#DataAnalysis #SQL #LearningSQL #DataInsights #DataScience #Analytics
Build applications with generative AI on Google CloudMárton Kodok
We will explore Vertex AI - Model Garden powered experiences, we are going to learn more about the integration of these generative AI APIs. We are going to see in action what the Gemini family of generative models are for developers to build and deploy AI-driven applications. Vertex AI includes a suite of foundation models, these are referred to as the PaLM and Gemini family of generative ai models, and they come in different versions. We are going to cover how to use via API to: - execute prompts in text and chat - cover multimodal use cases with image prompts. - finetune and distill to improve knowledge domains - run function calls with foundation models to optimize them for specific tasks. At the end of the session, developers will understand how to innovate with generative AI and develop apps using the generative ai industry trends.
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...Social Samosa
The Modern Marketing Reckoner (MMR) is a comprehensive resource packed with POVs from 60+ industry leaders on how AI is transforming the 4 key pillars of marketing – product, place, price and promotions.
End-to-end pipeline agility - Berlin Buzzwords 2024Lars Albertsson
We describe how we achieve high change agility in data engineering by eliminating the fear of breaking downstream data pipelines through end-to-end pipeline testing, and by using schema metaprogramming to safely eliminate boilerplate involved in changes that affect whole pipelines.
A quick poll on agility in changing pipelines from end to end indicated a huge span in capabilities. For the question "How long time does it take for all downstream pipelines to be adapted to an upstream change," the median response was 6 months, but some respondents could do it in less than a day. When quantitative data engineering differences between the best and worst are measured, the span is often 100x-1000x, sometimes even more.
A long time ago, we suffered at Spotify from fear of changing pipelines due to not knowing what the impact might be downstream. We made plans for a technical solution to test pipelines end-to-end to mitigate that fear, but the effort failed for cultural reasons. We eventually solved this challenge, but in a different context. In this presentation we will describe how we test full pipelines effectively by manipulating workflow orchestration, which enables us to make changes in pipelines without fear of breaking downstream.
Making schema changes that affect many jobs also involves a lot of toil and boilerplate. Using schema-on-read mitigates some of it, but has drawbacks since it makes it more difficult to detect errors early. We will describe how we have rejected this tradeoff by applying schema metaprogramming, eliminating boilerplate but keeping the protection of static typing, thereby further improving agility to quickly modify data pipelines without fear.
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeWalaa Eldin Moustafa
Dynamic policy enforcement is becoming an increasingly important topic in today’s world where data privacy and compliance is a top priority for companies, individuals, and regulators alike. In these slides, we discuss how LinkedIn implements a powerful dynamic policy enforcement engine, called ViewShift, and integrates it within its data lake. We show the query engine architecture and how catalog implementations can automatically route table resolutions to compliance-enforcing SQL views. Such views have a set of very interesting properties: (1) They are auto-generated from declarative data annotations. (2) They respect user-level consent and preferences (3) They are context-aware, encoding a different set of transformations for different use cases (4) They are portable; while the SQL logic is only implemented in one SQL dialect, it is accessible in all engines.
#SQL #Views #Privacy #Compliance #DataLake
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Kaxil Naik
Navigating today's data landscape isn't just about managing workflows; it's about strategically propelling your business forward. Apache Airflow has stood out as the benchmark in this arena, driving data orchestration forward since its early days. As we dive into the complexities of our current data-rich environment, where the sheer volume of information and its timely, accurate processing are crucial for AI and ML applications, the role of Airflow has never been more critical.
In my journey as the Senior Engineering Director and a pivotal member of Apache Airflow's Project Management Committee (PMC), I've witnessed Airflow transform data handling, making agility and insight the norm in an ever-evolving digital space. At Astronomer, our collaboration with leading AI & ML teams worldwide has not only tested but also proven Airflow's mettle in delivering data reliably and efficiently—data that now powers not just insights but core business functions.
This session is a deep dive into the essence of Airflow's success. We'll trace its evolution from a budding project to the backbone of data orchestration it is today, constantly adapting to meet the next wave of data challenges, including those brought on by Generative AI. It's this forward-thinking adaptability that keeps Airflow at the forefront of innovation, ready for whatever comes next.
The ever-growing demands of AI and ML applications have ushered in an era where sophisticated data management isn't a luxury—it's a necessity. Airflow's innate flexibility and scalability are what makes it indispensable in managing the intricate workflows of today, especially those involving Large Language Models (LLMs).
This talk isn't just a rundown of Airflow's features; it's about harnessing these capabilities to turn your data workflows into a strategic asset. Together, we'll explore how Airflow remains at the cutting edge of data orchestration, ensuring your organization is not just keeping pace but setting the pace in a data-driven future.
Session in https://budapestdata.hu/2024/04/kaxil-naik-astronomer-io/ | https://dataml24.sessionize.com/session/667627
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Aggregage
This webinar will explore cutting-edge, less familiar but powerful experimentation methodologies which address well-known limitations of standard A/B Testing. Designed for data and product leaders, this session aims to inspire the embrace of innovative approaches and provide insights into the frontiers of experimentation!
Challenges of Nation Building-1.pptx with more important
PERICLES workshop (London 15 October 2015) - Art & Media Domain Ontologies
1. GRANT AGREEMENT: 601138 | SCHEME FP7 ICT 2011.4.3
Promoting and Enhancing Reuse of Information throughout the Content Lifecycle taking account of Evolving Semantics [Digital
Preservation]
PERICLES Art & Media Domain Ontologies
Panos Mitzias (CERTH/ITI)
2. ◦Upper-level ontology: Linked Resource Model (LRM)
◦Domain ontology: Art and Media, with sub-domains
Digital Video Art (DVA)
Software-based Art (SBA)
Born-digital Archives (BDA)
Ontologies in PERICLES
3. Main notions adopted from LRM in the Art and Media ontology:
◦Resource
◦Agent
◦Activity
◦Dependency
◦Description
LRM Adoption
4. ◦AbstractResource: Conceptual representation of an entity.
◦ConcreteResource: Concrete realization of an abstract resource.
◦AggregatedResource: A set of multiple resources.
Abstract / Concrete / Aggregated Resource
AbstractResource
AggregatedResource
∩
ConcreteResource
ConcreteResource_1
ConcreteResource_2
ConcreteResource_N
realizedAs hasPart
...
AbstractResource
realizedAs
ConcreteResource
6. Agent: The “bearer” of change to the ecosystem.
i.e. someone or something that brings change to a resource or
participates in an activity.
Subclasses*:
◦ HumanAgent (individual, group, organization, etc.)
◦ SoftwareAgent (operating system, media player, etc.)
* extensions to LRM
Agent
7. Activity: Temporal entity that represents an action or set of
actions.
Subclasses*:
◦ CreationActivity
◦ AcquisitionActivity
◦ MigrationActivity
◦ etc.
* extensions to LRM
Activity
10. ◦ HardwareDependency
Specifies hardware requirements for a(n) (Abstract or Concrete or SoftwareAgent or Digital) Resource, or
relations among them, in order for the Resource to function properly.
◦ SoftwareDependency
Indicates the dependency of a Resource or Activity on a specific software - name, version, etc.
◦ DataDependency
Implies the requirement of some knowledge, or data or information in order for a(n) (Abstract or Concrete
or SoftwareAgent of Digital) Resource to achieve its purpose of existence or function. This kind of data may
originate from human input, computer files (e.g. configuration files), network connection, live video, etc.
Dependency Types
11. Predefined (but extensible) intention types:
◦ conceptual intention
Qualifies a dependency as having significance to the artist’s conceptualization of the artwork.
◦ functional intention
Qualifies a dependency required for the proper, consistent and complete functioning of the artwork.
◦ compatibility intention
Defines dependencies where different types of software/hardware components can be substituted and still
operate satisfactorily together.
Dependency Intentions
12. Latest version of Art and Media domain ontologies tackle the
following:
◦Detailed description of material, actors, activities and
entities involved.
◦Information capturing processes performed by a CH related
agent for representing the life cycle of digital resources.
◦Significant properties and dependencies, which may indicate
relevant risks.
Modelling issues addressed thus far…
14. Demonstrate the three types of dependencies, by following the
process below:
1. Introduce already existing resources of domain
2. Specify a challenge/risk for a selected resource
3. Instantiate and explain the new implemented concepts
4. Execute different scenarios
5. Discuss results
Description of Evaluation Exercise