1 Thomas Triebsees, Department of Computer Science Thomas Triebsees University of the German Federal Armed Forces Munich Department of Computer Science.

Slides:



Advertisements
Similar presentations
Hybrid automata - Abstraction Anders P. Ravn Department of Computer Science, Aalborg University, Denmark Hybrid Systems – PhD School Aalborg University.
Advertisements

Tree Regular Model Checking P. Abdulla, B. Jonsson, P. Mahata and J. d’Orso Uppsala University.
Translation-Based Compositional Reasoning for Software Systems Fei Xie and James C. Browne Robert P. Kurshan Cadence Design Systems.
A Technique for Automatic Validation of Model Transformations Levi Lúcio and Bruno Barroca Universidade Nova de Lisboa.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
Background information Formal verification methods based on theorem proving techniques and model­checking –to prove the absence of errors (in the formal.
Finite Automata and Non Determinism
Automated Analysis and Code Generation for Domain-Specific Models George Edwards Center for Systems and Software Engineering University of Southern California.
Visual Web Information Extraction With Lixto Robert Baumgartner Sergio Flesca Georg Gottlob.
Jackson, Web Technologies: A Computer Science Perspective, © 2007 Prentice-Hall, Inc. All rights reserved Chapter 3 Style Sheets: CSS WEB.
Validating Streaming XML Documents Luc Segoufin & Victor Vianu Presented by Harel Paz.
Containment and Equivalence for an XPath Fragment By Gerom e Mikla Dan Suciu Presented By Roy Ionas.
Annotating Documents for the Semantic Web Using Data-Extraction Ontologies Dissertation Proposal Yihong Ding.
Automatic Data Ramon Lawrence University of Manitoba
Using Use Case Scenarios and Operational Variables for Generating Test Objectives Javier J. Gutiérrez María José Escalona Manuel Mejías Arturo H. Torres.
LBSC 670 Organization of Information. Review Metadata models Dublin Core Metadata Standards Dublin core, MARC Encoding Schemes HTML, XML, MARC… Advanced.
1 Thomas Triebsees, Uwe M. Borghoff, Dptmt. of Computer Science Thomas Triebsees Universität der Bundeswehr München Department of Computer Science
Knowledge Mediation in the WWW based on Labelled DAGs with Attached Constraints Jutta Eusterbrock WebTechnology GmbH.
Semantic Interoperability Jérôme Euzenat INRIA & LIG France Natasha Noy Stanford University USA.
Aurora: A Conceptual Model for Web-content Adaptation to Support the Universal Accessibility of Web-based Services Anita W. Huang, Neel Sundaresan Presented.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. Towards Translating between XML and WSML based on mappings between.
Introduction technology XSL. 04/11/2005 Script of the presentation Introduction the XSL The XSL standard Tools for edition of codes XSL Necessary resources.
XP New Perspectives on XML Tutorial 6 1 TUTORIAL 6 XSLT Tutorial – Carey ISBN
OPERATING SYSTEMS AND LANGUAGE TRANSLATORS CIS 2380 TERM 2 – LANGUAGE TRANSLATORS Lee McCluskey – 23/09/20151.
APPLICATIONS OF CONTEXT FREE GRAMMARS BY, BRAMARA MANJEERA THOGARCHETI.
Mathematical Modeling and Formal Specification Languages CIS 376 Bruce R. Maxim UM-Dearborn.
Tree-adjoining grammar (TAG) is a grammar formalism defined by Aravind Joshi and introduced in Tree-adjoining grammars are somewhat similar to context-free.
1 CIS336 Website design, implementation and management (also Semester 2 of CIS219, CIS221 and IT226) Lecture 6 XSLT (Based on Møller and Schwartzbach,
1Computer Sciences Department. Book: INTRODUCTION TO THE THEORY OF COMPUTATION, SECOND EDITION, by: MICHAEL SIPSER Reference 3Computer Sciences Department.
REGULAR LANGUAGES.
Configuration Management (CM)
Author: Graham Hughes, Tevfik Bultan Computer Science Department, University of California, Santa Barbara, CA 93106, USA Source: International Journal.
Concordia University Department of Computer Science and Software Engineering Click to edit Master title style COMPILER DESIGN Review Joey Paquet,
CEFRIEL Consorzio per la Formazione e la Ricerca in Ingegneria dell’Informazione Politecnico di Milano Model Checking UML Specifications of Real Time Software.
Controlled Migration in Digital Archives Thomas Triebsees University of the Federal Armed Forces Munich Department of Computer Science
XML Data Management 10. Deterministic DTDs and Schemas Werner Nutt.
Verification and Validation in the Context of Domain-Specific Modelling Janne Merilinna.
Ontoprise: B 3 - Semantic B2B Broker whitepaper review Bernhard Schueler CSCI 8350, Spring 2002,UGA.
ISBN Chapter 3 Describing Semantics -Attribute Grammars -Dynamic Semantics.
University of Paderborn Software Engineering Group Prof. Dr. Wilhelm Schäfer Towards Verified Model Transformations Holger Giese 1, Sabine Glesner 2, Johannes.
Semantics & Verification Research Group Department of Computer Science University of Malta FLACOS 2008 Detection of Conflicts in Electronic Contracts Stephen.
Declaratively Producing Data Mash-ups Sudarshan Murthy 1, David Maier 2 1 Applied Research, Wipro Technologies 2 Department of Computer Science, Portland.
©Ferenc Vajda 1 Semantic Grid Ferenc Vajda Computer and Automation Research Institute Hungarian Academy of Sciences.
CSCI 2670 Introduction to Theory of Computing August 26, 2004.
CSCI 2670 Introduction to Theory of Computing August 25, 2005.
XML Extras Outline 1 - XML in 10 Points 2 - XML Family of Technologies 3 - XML is Modular 4 - RDF and Semantic Web 5- XML Example: UK GovTalk Group’s Schema.
3.2 Semantics. 2 Semantics Attribute Grammars The Meanings of Programs: Semantics Sebesta Chapter 3.
Programming Languages and Design Lecture 3 Semantic Specifications of Programming Languages Instructor: Li Ma Department of Computer Science Texas Southern.
CNI, 4th April 2006 Slide 1 Key Standards Update: SRU (“Technical” Details) Dr. Robert Sanderson Dept. of Computer Science University of Liverpool
Introduction to the Semantic Web and Linked Data
Session 10a, 21st October 2005 eChallenges e-2005 Copyright 2005 K-Wf Grid, Institute of Informatics SAS Experience Management based on Text Notes (EMBET)
Compiler Design Introduction 1. 2 Course Outline Introduction to Compiling Lexical Analysis Syntax Analysis –Context Free Grammars –Top-Down Parsing –Bottom-Up.
Lecture 5 1 CSP tools for verification of Sec Prot Overview of the lecture The Casper interface Refinement checking and FDR Model checking Theorem proving.
JISC/NSF PI Meeting, June Archon - A Digital Library that Federates Physics Collections with Varying Degrees of Metadata Richness Department of Computer.
HACNet Simulation-based Validation of Security Protocols Vinay Venkataraghavan Advisors: S.Nair, P.-M. Seidel HACNet Lab Computer Science and Engineering.
(A comparative study for XML change detection) Grégory Cobéna (INRIA), Talel Abdessalem (ENST), Yassine Hinnach (ENST) Etude comparative sur la détection.
Formal Verification. Background Information Formal verification methods based on theorem proving techniques and model­checking –To prove the absence of.
From Natural Language to LTL: Difficulties Capturing Natural Language Specification in Formal Languages for Automatic Analysis Elsa L Gunter NJIT.
SEESCOASEESCOA SEESCOA Meeting Activities of LUC 9 May 2003.
Nondeterministic Finite Automata (NFAs). Reminder: Deterministic Finite Automata (DFA) q For every state q in Q and every character  in , one and only.
MOPS: an Infrastructure for Examining Security Properties of Software Authors Hao Chen and David Wagner Appears in ACM Conference on Computer and Communications.
Ontologies Reasoning Components Agents Simulations An Overview of Model-Driven Engineering and Architecture Jacques Robin.
1 Lecture 7 Style Sheets: CSS. 2 Motivation HTML markup can be used to represent –Semantics: h1 means that an element is a top-level heading –Presentation:
C Sc 132 Computing Theory Professor Meiliu Lu Computer Science Department.
Database Processing with XML
Software Design Methodology
Formal Methods in software development
Regular Expressions
Automated Analysis and Code Generation for Domain-Specific Models
Presentation transcript:

1 Thomas Triebsees, Department of Computer Science Thomas Triebsees University of the German Federal Armed Forces Munich Department of Computer Science Winnipeg, 31th August 2007 Towards Automatic Document Migration: Semantic Preservation of Embedded Queries

2 Thomas Triebsees, Department of Computer Science Agenda I.Research Context and Motivation II.Our Approach 1.Property Specification and Tracing 2.Automated Query Evalutation and Construction III.Results IV.Conclusions

3 Thomas Triebsees, Department of Computer Science I.Research Context and Motivation

4 Thomas Triebsees, Department of Computer Science Research Context Task: Semantic preservation  high degree of process reliability necessary (trustworthyness)  amount of documents requires automation  document representations (formats) change  still: most QA done hand-crafted

5 Thomas Triebsees, Department of Computer Science Example Property – Link Consistency Calculation documents harvest WWW store source calc05 calc.pdf start.html Website Calculation Calculation documents Aim: improve portability source calc05 calc.pdf start.html Website Calculation style.css

6 Thomas Triebsees, Department of Computer Science Example Property – Link Consistency Calculation html index.html calc05 resources calc.pdf calc05 source calc05 calc.pdf start.html Website Calculation Calculation documents harvest WWW store Calculation documents style.css

7 Thomas Triebsees, Department of Computer Science Semantic Queries Queries embedded in documents; Formalize semantic preservation: - evaluation - construction? Examples:  URLs query server/directory structure  style sheets (CSS) query XML/HTML documents  XPath expressions query XML documents  … Calculation documents Calculation htmlindex.html calc05 resources calc.pdf calc05 style.css

8 Thomas Triebsees, Department of Computer Science II.Our Approach – Semantic Evaluation and Construction of Embedded Queries

9 Thomas Triebsees, Department of Computer Science Our Approach migration process source documentstarget documents property specifications preservation requirements Framework tracing property matching property matching automated verification notification What are the relevant properties? What are the different representation forms? (1) (2) What is to be preserved? (3) Implement transformation: Notify system on transformation steps (4) Trace relevant object histories. Verify preservation requirements w.r.t. source and target objects.

10 Thomas Triebsees, Department of Computer Science (1) Property Specification LinksTo Calculation documents link_source link_anchor link_target Concept + Interface Context LinkAbsContext LinkRel store Calculation documents Calculation htmlindex.html calc05 resources calc.pdf calc05 style.css source calc05 calc.pdf start.html Website Calculation style.css  define role names for property  assign roles in different implementations

11 Thomas Triebsees, Department of Computer Science pres K ( {s → link_source, a → link_anchor, t → link_target}, LinksTo (s, a, t), {LinkAbs,LinkRel}, {LinkRel}) Expressed semi-formally using concepts and contexts: When transforming a link source, a link anchor, and a link target to a new representation, preserve the concept LinksTo for these objects in the context LinkRel. (2) Expressing Preservation Requirements Requirement: When transforming a website, translate all absolute links to relative links while preserving link consistency. Expressed formally:

12 Thomas Triebsees, Department of Computer Science (3) Tracing Semantic Properties - Preservation LinksTo Calculation documents link_source link_anchor link_target LinkAbsLinkRel store Calculation documents pres K ( {s → link_source, a → link_anchor, t → link_target}, LinksTo (s, a, t), {LinkAbs,LinkRel}, {LinkRel}) Calculation htmlindex.html calc05 resources calc.pdf calc05 style.css source calc05 calc.pdf start.html Website Calculation style.css

13 Thomas Triebsees, Department of Computer Science Preservation of Embedded Queries Targets: Semantic preservation of link consistency  links can be evaluated semantically  only valid URLs are accepted as links  links can be constructed automatically  only valid URLs are constructed  constructions allow for formal proofs w.r.t. preservation requirement Tools:  Automata Theory (Finite State Automata, FSA)  Graph Theory Steps: (1)Formalize queried structure for link evaluation and construction (2)Formalize syntactically valid URLs (3)Combine both Can be generalized to other applications Integrating embedded queries

14 Thomas Triebsees, Department of Computer Science Specification of Queried Structure (1) Formalize queried structure - vertices (objects) yield query semantics - labels carry URL substrings - generate finite state automaton

15 Thomas Triebsees, Department of Computer Science Specification of Queried Structure

16 Thomas Triebsees, Department of Computer Science Grammar for URI-references Specification of Syntactically Valid URLs (2) Formalize syntactically valid URLs - reduce URI-reference grammar - construct query automaton

17 Thomas Triebsees, Department of Computer Science Specification of Syntactically Valid URLs Construction of Query automaton

18 Thomas Triebsees, Department of Computer Science Combine both – Full link automaton - basically: Let both automata run in parallel - match non-terminal transitions of URL automaton with appropriate transitions of struture automaton (3) Combine both

19 Thomas Triebsees, Department of Computer Science Integration and Benefit LinksTo Calculation documents link_source link_anchor link_target LinkAbsLinkRel store Calculation documents evaluation construction Calculation htmlindex.html calc05 resources calc.pdf calc05 style.css source calc05 calc.pdf start.html Website Calculation style.css working provably correct

20 Thomas Triebsees, Department of Computer Science III.Results

21 Thomas Triebsees, Department of Computer Science

22 Thomas Triebsees, Department of Computer Science IV.Conclusions and Outlook

23 Thomas Triebsees, Department of Computer Science I.Automated evaluation and construction of embedded queries II.Based on formal, automata-theoretic constructions -> provable correctness III.Integration into framework for semantic preservation IV.Future work:  Computing structures on demand  Regular expressions as queries  Include extensions like CSS or XPath predicates

24 Thomas Triebsees, Department of Computer Science Subject to your questions… Thomas Triebsees Universität der Bundeswehr München Department of Computer Science