Exploiting and completing Web data sources capabilities

被引:0
|
作者
Boucelma, O [1 ]
Essid, M [1 ]
Lacroix, Z [1 ]
Bétari, A [1 ]
机构
[1] Univ Aix Marseille 1, LSIS, F-13453 Marseille 13, France
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Complex applications require integration systems that access data locally or on the Web while being capable to exploit and complete the various capabilities available at integrated resources. In scientific applications such as biomedical, engineering or geographical, information systems (IS) are highly heterogeneous: they differ-by their data representation and by their radically different query languages. Therefore, in addition to the common problem of data integration, provided scientific query languages shall also be integrated. In this paper we propose an approach that not only focuses on the data integration, but also addresses the integration of query capabilities available at the sources. An IS may provide a query capability inexistent at another IS, whereas two query capabilities may be similar but with slightly different semantics. We introduce the notion of derived wrapper that captures. additional query capabilities to either compensate capabilities lacking at a source, or to adjust an existing capability in order to make it homogeneous with other similar capabilities, wrapped at other sources. The use of derived wrappers extends traditional mediation approaches.
引用
收藏
页码:241 / 258
页数:18
相关论文
共 50 条
  • [41] Core IS capabilities for exploiting information technology
    Feeny, DF
    Willcocks, LP
    SLOAN MANAGEMENT REVIEW, 1998, 39 (03): : 9 - +
  • [42] Exploiting Social Capabilities in the Minority Game
    Cicirelli, Franco
    Nigro, Libero
    ACM TRANSACTIONS ON MODELING AND COMPUTER SIMULATION, 2016, 27 (01):
  • [43] Exploiting the transit timing capabilities of Ariel
    Luca Borsato
    Valerio Nascimbeni
    Giampaolo Piotto
    Gyula Szabó
    Experimental Astronomy, 2022, 53 : 635 - 653
  • [44] Exploiting the capabilities of experiment and numerical methods
    Herring, Steven J.
    Proceedings of the ASME Turbo Expo 2006, Vol 6, Pts A and B, 2006, : 1217 - 1225
  • [45] Exploiting the hidden web
    不详
    POWER ENGINEERING, 2005, 109 (01) : 12 - +
  • [46] Exploiting the information Web
    Gregg, Dawn G.
    Walczak, Steven
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2007, 37 (01): : 109 - 125
  • [47] Exploiting Privileged Information from Web Data for Action and Event Recognition
    Li Niu
    Wen Li
    Dong Xu
    International Journal of Computer Vision, 2016, 118 : 130 - 150
  • [48] Exploiting Privileged Information from Web Data for Action and Event Recognition
    Niu, Li
    Li, Wen
    Xu, Dong
    INTERNATIONAL JOURNAL OF COMPUTER VISION, 2016, 118 (02) : 130 - 150
  • [49] Web Service with Parallel Processing Capabilities for the Retrieval of CAD Assembly Data
    Kim, Byung Chul
    Mun, Duhwan
    Han, Soonhung
    CONCURRENT ENGINEERING-RESEARCH AND APPLICATIONS, 2011, 19 (01): : 5 - 18
  • [50] An Approach for Identifying IASMS Services, Functions, and Capabilities From Data Sources
    Ellis, Kyle
    Krois, Paul
    Mah, Robert
    Koelling, John
    Prinzel, Lawrence
    Davies, Misty
    Infeld, Samantha Indre
    2021 IEEE/AIAA 40TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2021,