Is Semantic Web Technology Taking the Wrong Turn?
Internet Computing (02/08) Vol. 12, No. 1, P. 75; Bussler, Christoph
Author Christoph Bussler sees a disaster in the making for Semantic Web technology (SWT) unless a change of course is implemented. "SWT doesn't propose a different application architecture," he writes. "Instead, it proposes languages and technologies that are intended to make the application development process and integration efforts a lot simpler, faster, and more reliable, especially in the areas of data and process mediation to achieve uniform semantic interpretation." But Bussler notes that the impact of SWT requires a certain degree of integration with current core computing technologies. He points out that the deployment of SWT as a wrapping technology to facilitate semantic interfaces for layers causes the number of data models requiring additional mediation to sharply increase due to problems with heterogeneity. SWT would like to tackle the heterogeneity challenge, but researchers generally attempt to bypass it by making assumptions or establishing restrictions to produce homogeneous environments, Bussler says. He considers the research community and industry's decision to split up the SWT space along classical lines of distinction between layers and components in software architectures, and along classical academic research fields, to be one possible reason for the derailment of the original SWT vision. "One possible turn would be to start addressing the problem of data and process heterogeneity, not only among systems but also along the layers within them to reduce or eliminate the number of mediations necessary," Bussler writes.
Click Here to View Full Article
Friday, February 1, 2008
Subscribe to:
Post Comments (Atom)
Blog Archive
-
►
2012
(35)
- ► April 2012 (13)
- ► March 2012 (16)
- ► February 2012 (3)
- ► January 2012 (3)
-
►
2011
(118)
- ► December 2011 (9)
- ► November 2011 (11)
- ► October 2011 (7)
- ► September 2011 (13)
- ► August 2011 (7)
- ► April 2011 (8)
- ► March 2011 (11)
- ► February 2011 (12)
- ► January 2011 (15)
-
►
2010
(183)
- ► December 2010 (16)
- ► November 2010 (15)
- ► October 2010 (15)
- ► September 2010 (25)
- ► August 2010 (19)
- ► April 2010 (21)
- ► March 2010 (7)
- ► February 2010 (6)
- ► January 2010 (6)
-
►
2009
(120)
- ► December 2009 (5)
- ► November 2009 (12)
- ► October 2009 (2)
- ► September 2009 (3)
- ► August 2009 (16)
- ► April 2009 (4)
- ► March 2009 (20)
- ► February 2009 (9)
- ► January 2009 (19)
-
▼
2008
(139)
- ► December 2008 (15)
- ► November 2008 (16)
- ► October 2008 (17)
- ► September 2008 (2)
- ► August 2008 (2)
- ► April 2008 (12)
- ► March 2008 (25)
-
▼
February 2008
(16)
- Security: Hackers swipe FTP server credentials usi...
- Security: PGP Responds to Cold Boot Attack Paper (...
- Security: Wireless Worms Will Follow Influenza's E...
- Medical Software: Microsoft HealthVault is nothing...
- Security: Research on Malware Distribution
- Medical Software: AT&T, Tenn. create medical info ...
- Security: Cryptanalysis of A5/1, attack against th...
- Software: Java Increasingly Threatened by New App ...
- Security: Replicating Virtual Servers Vulnerable t...
- Security: GENI project; a "secure web" framework
- Research: A New Theory Changes the Thinking Behind...
- Security: Web Browsing, Search, and Online Ads Gro...
- Web: Tool Predicts Election Results and Stock Prices
- Security: Workplace Autopilot Threatens Security R...
- Research: Accidental Algorithms
- Web: Is Semantic Web Technology Taking the Wrong T...
- ► January 2008 (6)
-
►
2007
(17)
- ► December 2007 (4)
- ► November 2007 (4)
- ► October 2007 (7)
Blog Labels
- research
- CSE
- security
- software
- web
- AI
- development
- hardware
- algorithm
- hackers
- medical
- machine learning
- robotics
- data-mining
- semantic web
- quantum computing
- Cloud computing
- cryptography
- network
- EMR
- search
- NP-complete
- linguistics
- complexity
- data clustering
- optimization
- parallel
- performance
- social network
- HIPAA
- accessibility
- biometrics
- connectionist
- cyber security
- passwords
- voting
- XML
- biological computing
- neural network
- user interface
- DNS
- access control
- firewall
- graph theory
- grid computing
- identity theft
- project management
- role-based
- HTML5
- NLP
- NoSQL
- Python
- cell phone
- database
- java
- open-source
- spam
- GENI
- Javascript
- SQL-Injection
- Wikipedia
- agile
- analog computing
- archives
- biological
- bots
- cellular automata
- computer tips
- crowdsourcing
- e-book
- equilibrium
- game theory
- genetic algorithm
- green tech
- mobile
- nonlinear
- p
- phone
- prediction
- privacy
- self-book publishing
- simulation
- testing
- virtual server
- visualization
- wireless
No comments:
Post a Comment