Feedback on OPM Yogesh Simmhan Microsoft Research Synthesis of pairwise conversations with: Roger Barga Satya Sahoo Microsoft Research Beth Plale Abhijit.

Slides:



Advertisements
Similar presentations
Ontology-Based Computing Kenneth Baclawski Northeastern University and Jarg.
Advertisements

Dr. Leo Obrst MITRE Information Semantics Information Discovery & Understanding Command & Control Center February 6, 2014February 6, 2014February 6, 2014.
OGSA Workshop, March 2002 MetaData Group. What metadata are needed? AIM: Systematic metadata framework for Grid Are these explicitly catered for in OGSA?
Brief Introduction to Provenance "As data becomes plentiful, verifiable truth becomes scarce
Service Oriented Architecture for Mobile Applications Swarupsingh Baran University of North Carolina Charlotte.
CH-4 Ontologies, Querying and Data Integration. Introduction to RDF(S) RDF stands for Resource Description Framework. RDF is a standard for describing.
Q UERY L ANGUAGE C ONSTRUCTS FOR P ROVENANCE Murali Mani, Mohamad Alawa, Arunlal Kalyanasundaram University of Michigan, Flint Presented at IDEAS 2011.
Haystack: Per-User Information Environment 1999 Conference on Information and Knowledge Management Eytan Adar et al Presented by Xiao Hu CS491CXZ.
Open Provenance Model Tutorial Session 2: OPM Overview and Semantics Luc Moreau University of Southampton.
Provenance GGF18 Kepler/COW+RWS, Kepler/COW+RWS, Bowers, McPhiilips et al. Provenance Management in a COllection-oriented Scientific Workflow.
ICS-FORTH May 23, An Ontological Approach to Digital Preservation Metadata Martin Doerr Foundation for Research and Technology - Hellas Institute.
Open Provenance Model Tutorial Session 3: OPM Serializations Luc Moreau University of Southampton.
Provenance Management Framework Satya S. Sahoo Kno.e.sis Center, Wright State University In Collaboration with Tarleton Lab, University of Georgia and.
NERC DataGrid Vocabulary Workshop, RAL, February 25, 2009 NERC DataGrid Vocabulary Server Description.
Architecture Tutorial 1 Overview of Today’s Talks Provenance Data Structures Recording and Querying Provenance –Break (30 minutes) Distribution and Scalability.
The CERIF-2000 Implementation. Andrei S. Lopatenko CERIF Implementation Guidelines Andrei Lopatenko Vienna University of Technology
GLOCAL Event-based Retrieval of Networked Media NEM Concertation Meeting Brussels, Feb
Using Provenance to Support Real-Time Collaborative Design of Workflows Workflow evolution provenance and OPM Tommy Ellkvist and Juliana Freire.
What legal inferences in OPM OPM Workshop Luc Moreau.
Karma Provenance Framework v2 Provenance Challenge Workshop/GGF18 Yogesh L. Simmhan Beth Plale, Dennis Gannon, Srinath Perera Indiana University.
Semantic Representation of Temporal Metadata in a Virtual Observatory Han Wang 1 Eric Rozell 1
Karma Provenance Framework v2 Provenance Challenge Workshop/GGF18 Yogesh L. Simmhan Beth Plale, Dennis Gannon, Srinath Perera Indiana University.
Semantic Representation of Temporal Metadata in a Virtual Observatory Han Wang 1 Eric Rozell 1
Generic Simulator for Users' Movements and Behavior in Collaborative Systems.
Open Provenance Model Tutorial Session 5: OPM Emerging Profiles.
Amarnath Gupta Univ. of California San Diego. An Abstract Question There is no concrete answer …but …
Copyright © 2013 Curt Hill The Zachman Framework What is it all about?
Logics for Data and Knowledge Representation
Usage of `provenance’: A Tower of Babel Luc Moreau.
Provenance-based Access Control in Cloud IaaS August 23, 2013 Dissertation Proposal Dang Nguyen Institute for Cyber Security University of Texas at San.
Architecture Tutorial 1 Overview of Today’s Talks Provenance Data Structures Recording and Querying Provenance –Break (30 minutes) Distribution and Scalability.
On Data Provenance in Group-centric Secure Collaboration Oct. 17, 2011 CollaborateCom Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
Querying Structured Text in an XML Database By Xuemei Luo.
MAEviz as a MAE/NCSA Cyberenvironment Partnership Jim Myers Associate Director NCSA Cyberenvironments.
Towards Low Overhead Provenance Tracking in Near Real-Time Stream Filtering Nithya N. Vijayakumar, Beth Plale DDE Lab, Indiana University {nvijayak,
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
11 CORE Architecture Mauro Bruno, Monica Scannapieco, Carlo Vaccari, Giulia Vaste Antonino Virgillito, Diego Zardetto (Istat)
Functions. Warm Up Solve each equation. 1.2x – 6 = x = X + 29 = x – 5 – 4x = 17 x = 14 x = - 7 x = -15 x = 11.
Phase II Additions to LSG Search capability to Gene Browser –Though GUI in Gene Browser BLAST plugin that invokes remote EBI BLAST service Working set.
Quick start guide.  Create a workflow that the users can invoke for a particular customer (contact) which sets the priority of all the customer’s cases.
Procedures for managing workflow components Workflow components: A workflow can usually be described using formal or informal flow diagramming techniques,
ModelPedia Model Driven Engineering Graphical User Interfaces for Web 2.0 Sites Centro de Informática – CIn/UFPe ORCAS Group Eclipse GMF Fábio M. Pereira.
Semantic Technologies and Application to Climate Data M. Benno Blumenthal IRI/Columbia University CDW /04-01.
Ontology-Based Computing Kenneth Baclawski Northeastern University and Jarg.
SKOS. Ontologies Metadata –Resources marked-up with descriptions of their content. No good unless everyone speaks the same language; Terminologies –Provide.
1 Artificial Intelligence Applications Institute Centre for Intelligent Systems and their Applications Stuart Aitken Artificial Intelligence Applications.
Design Model Lecture p6 T120B pavasario sem.
11 CORE Architecture Mauro Bruno, Monica Scannapieco, Carlo Vaccari, Giulia Vaste Antonino Virgillito, Diego Zardetto (Istat)
Math – What is a Function? 1. 2 input output function.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
User Profiling using Semantic Web Group members: Ashwin Somaiah Asha Stephen Charlie Sudharshan Reddy.
Recording the Context of Action for Process Documentation Ian Wootten Cardiff University, UK
Information Dynamics & Interoperability Presented at: NIT 2001 Global Digital Library Development in the New Millennium Beijing, China, May 2001, and DELOS.
Description of Information Resources: RDF/RDFS (an Introduction)
A Semantic Web Approach for the Third Provenance Challenge Tetherless World Rensselaer Polytechnic Institute James Michaelis, Li Ding,
Using DAML+OIL Ontologies for Service Discovery in myGrid Chris Wroe, Robert Stevens, Carole Goble, Angus Roberts, Mark Greenwood
1 Proposal on MFI-5: Process model registration based on ontology (MFI4Process) He Keqing Wang Chong 2006/08/29.
Personalized Recommendation of Related Content Based on Automatic Metadata Extraction Andreas Nauerz 1, Fedor Bakalov 2, Birgitta.
Knowledge Modeling and Discovery. About Thetus Thetus develops knowledge modeling and discovery infrastructure software for customers who: Have high-value.
Behavioral Framework Background & Terminology. Behavioral Framework: Introduction  Background..  What was the goal..
Inferring Declarative Requirements Specification from Operational Scenarios IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 24, NO. 12, DECEMBER, 1998.
Write a function rule for a graph EXAMPLE 3 Write a rule for the function represented by the graph. Identify the domain and the range of the function.
EMEA Beat Schwegler Architect Microsoft EMEA HQ Ingo Rammer Principal Consultant thinktecture
Ewa Deelman, Virtual Metadata Catalogs: Augmenting Existing Metadata Catalogs with Semantic Representations Yolanda Gil, Varun Ratnakar,
Web Service Modeling Ontology (WSMO)
Web Ontology Language for Service (OWL-S)
Multi-agent system for web services
Workflow Provenance Bill Howe.
Notes Over 2.1 Function {- 3, - 1, 1, 2 } { 0, 2, 5 }
Data Provenance.
Presentation transcript:

Feedback on OPM Yogesh Simmhan Microsoft Research Synthesis of pairwise conversations with: Roger Barga Satya Sahoo Microsoft Research Beth Plale Abhijit Borude Indiana University

Roles Using role annotations in OPM is not well defined… – Named relationships are used as first class objects as defined in the RDF model – Affect the way inferences are made – Semantically meaningful or not?

Bake Cake Eggs(3) John Flour Used(eggs) Eggs(1) wasGeneratedBy(unused) wasGeneratedBy(cake) Used(flour) Bake Cake Eggs(A, B, C) John Flour Used(eggs) Eggs(A) wasGeneratedBy(unused) wasGeneratedBy(cake) Used(flour)

Accounts Composite processes identified in OPM – Different granularity? – Different view (client vs service) – service/workflow composition using alternate accounts? – Should we specify composition more explicitly in edges as edge types? Subclasses? Customer A Baking Baker Baking [] [] [] Customer B Observer Observers

Data Collections does not seem to support the idea of granularity for data products Alternate accounts more suited for process granularity, less for data granularity – process types for data de/compositions? Subclasses?

Annotations Causality is not the only relationship between provenance entities – Relevant domain-specific relationships that are needed to answer a scientists query. Subclasses stronger form of annotations – Different? – Subclasses part of model – Annotations dependent on representation? Extensibility mechanisms?

Representation/Serialization OPM maps exactly to the W3C recommended standard to represent metadata Resource Description Framework (RDF) – OPM graph is differently named RDF graph XML, RDF, CSV…

Time OPM approach to incorporating temporal parameter in provenance using time interval to represent instantaneous is not well defined – based on granularity of values the query result will vary – Accuracy of timestamps affects inference – Logical timestamps? Do we need time range? – Long running process (provenance is past, notcurrent)…

Agent Loose form of control flow? – Workflow engine? – Commandline invoking workflow engine? – Researcher who starts commandline? – Previous component that triggers next component? – Where do we have TriggeredBy and where do we have ControlledBy?

Service Output data Input data WF Engine Service Output data Input data Client ? WF Engine? WF document Service Output data Input data WF document User ? ? Client ? WF Engine ? ? ?

Vagueness in Inferences Edge count limits? Weak and strong semantics P1 used A1 – P1 MUST have used A1 – P1 MAY have used A1 P1 used A1; A2 wasGenerated by P1 – A2 MUST have been derived from A1 – A2 MAY have been derived from A1 Weak is lowest common denominator – mayHaveBeenUsed <= mustHaveBeenUsed…subclass?