Using explicit ontologies in KBS development
International Journal of Human-Computer Studies
Query approximate answering system for an incomplete DKBS
Fundamenta Informaticae - Special issue: intelligent information systems
Knowledge representation: logical, philosophical and computational foundations
Knowledge representation: logical, philosophical and computational foundations
Formal Ontology in Information Systems: Proceedings of the 1st International Conference June 6-8, 1998, Trento, Italy
Ontology, Metadata, and Semiotics
ICCS '00 Proceedings of the Linguistic on Conceptual Structures: Logical Linguistic, and Computational Issues
Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce
Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce
Ontology-based distributed autonomous knowledge systems
Information Systems - Special issue on web data integration
Hi-index | 0.00 |
In this work we present a new rule-discovery method for Distributed Information System (DIS). Distributed Information System is the system that connects a number of information systems using network communication technology. This communication can be driven by request for knowledge needed to predict for maximal optimization what values should replace some null values. In this work we recall the notion of a distributed information system to talk about handling semantic inconsistencies between sites. Semantic inconsistencies are due to different interpretations of attributes and their values on the concepts level among sites. Different interpretations can be also linked with a different way of treating null values among sites. Some attributes might be just hidden because of the security reason. In such case we have to be certain that the missing data can not be reconstructed from the available data by any known null value imputation method and that some information in information system can not be uncovered as well. Assuming that one attribute is hidden at one of the sites of distributed information system we will try to reconstruct this attribute. In this work we will also show which values have to be hidden from users to guarantee that the hidden attribute can not be reconstructed.