2009
DOI: 10.2139/ssrn.1356653
|View full text |Cite
|
Sign up to set email alerts
|

Framework for the Analysis of the Adaptability, Extensibility, and Scalability of Semantic Information Integration and the Context Mediation Approach

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 15 publications
(12 reference statements)
0
4
0
Order By: Relevance
“…Thus, the number of predefined conversions is largely reduced. As discussed in (Gannon et al 2009), the mechanism of the conversion composition significantly enhances the adaptability, extensibility, and scalability of the COIN-based solution.…”
Section: Related Work and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, the number of predefined conversions is largely reduced. As discussed in (Gannon et al 2009), the mechanism of the conversion composition significantly enhances the adaptability, extensibility, and scalability of the COIN-based solution.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…The algorithm of conversion composition can be found in (Zhu and Madnick 2006). Compared to the brute-force integration approaches, the mechanism of constructing composite conversions consisting of parameterized atomic conversions significantly enhances the adaptability and scalability of our reconciliation solution (Gannon et al 2009;Zhu and Madnick 2006).…”
Section: Figure 4 Wsdl Template Of External Web Servicesmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers argue that a mediator should rewrite database queries and query results to abstract from different representations and units [7]. Gannon et al extended this idea by developing a language that allows integrating new information sources by specifying transformation rules [19]. Both approaches cover only pull-based, static database access, with a known recipient of the requested data.…”
Section: Related Workmentioning
confidence: 99%