Ontology-based Resource Description and Discovery Framework Sample Clauses

Ontology-based Resource Description and Discovery Framework. The ontology-driven approaches for search and discovery are increasing because of the power behind the semantic representation of linked data, including the description of resources and devices. Thus, in [64] we find an approach for an ontology-based resource description framework, developed particularly for ICT energy management purposes, where the focus is on energy- related semantic of resources and their properties. It proposes a scalable resource discovery method in the large and dynamic collections of ICT resources, based on semantics similarity inside a federated index using a Bayesian belief network. The framework allows users to identify the cleanest resource deployments in order to achieve a given task, taking into account the available energy source. This approach also uses the RDF data model to describe the resources to be stored in the database of the discovery system and uses a semantic analyzer to perform information processing based on such descriptions in order to determine the association of resources to the ontology concepts. The end user stack begins with a request for resources. The query is analyzed and keywords are extracted and processed by the semantic analyzer. Based on its knowledge base, it determines the required resources and their locations. If a resource is available, it will be triggered. In order to provide a powerful search method based on the proposed ontology, this architecture uses a Bayesian semantic graph which combines semantic inference and probability. The key idea is to integrate semantic links and reasoning rules which determine the cluster the resource belongs to by processing keywords and taking into account the context. As proposed in its ontology, a resource will be placed in one of the three categories: computing, storage and network. However, a user query like (RAM=64Mb, IP address=10.0.0.1) may lead to a confusion, because the result can be a server or a router. If further information, such as “bandwidth=1G” is added, a more accurate network resource could be found. The Bayesian semantic analyzer is used to deal with such confusion. It processes all the words in each resource description or user query and calculates the probability that the resource belongs to each cluster. Such a mechanism improves significantly the search operation. In order to define the concepts and clusters for the Bayesian network, the architecture builds a probabilistic table, as proposed in [65], which assigns joint probability va...
AutoNDA by SimpleDocs

Related to Ontology-based Resource Description and Discovery Framework

  • Service Description The Parties will provide Common Channel Signaling (CCS) to one another via Signaling System 7 (SS7) network Interconnection, in accordance with prevailing industry standards. Use of a third party provider of SS7 trunks is permitted.

  • Service Descriptions Available services for Transitional and Enhanced Supervision Services a. One (1) one-to-one meeting with the Contractor per week for case management services.

  • Detailed Description of Services / Statement of Work Describe fully the services that Contractor will provide, or add and attach Exhibit B to this Agreement.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Project Description In two or three brief sentences, provide a concise description of your exhibition. Include the subject matter, type of objects to be included (paintings, sculpture, manuscripts, etc.), those responsible for organizing the exhibition, and catalogue author(s).

  • Product Description The lead products covered by this Settlement Agreement is limited to following Amazon Identification Number (ASIN) B0BBMRLNV9, with the description, "Lesnow 63-37 Tin Lead Rosin Core Solder Wire for Electrical Soldering 0.8mm Soldering Wire Electronics Solder Content Solder Flux 1.8% (0.8mm, 50g)," which was offered for sale by the Settling Entity on xxxxxx.xxx, hereinafter the “Product” or “Products.”

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Cost Responsibility for Network Upgrades 9 5.1 Applicability 9 5.2 Network Upgrades 9

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!