Preface |
|
xvii | |
About the Authors |
|
xxi | |
Contributors |
|
xxv | |
|
Chapter 1 The Case for Contextually Driven Computation |
|
|
1 | (22) |
|
|
1 | (3) |
|
1.1 The Three Mile Island Nuclear Disaster |
|
|
4 | (1) |
|
1.2 Indian Ocean Tsunami Disaster |
|
|
5 | (2) |
|
1.3 Contextual Information Processing (CIP) of Disaster Data |
|
|
7 | (2) |
|
1.4 Contextual Information Processing and Information Assurance (CIPIA) of Disaster Data |
|
|
9 | (2) |
|
1.5 Components of Traditional Information Technology (IT) Architectures |
|
|
11 | (1) |
|
1.6 Example of Traditional It Architectures and Their Limitations |
|
|
12 | (4) |
|
1.7 Contextual Processing and the Semantic Web |
|
|
16 | (1) |
|
1.8 Contextual Processing and Cloud Computing |
|
|
16 | (3) |
|
1.9 Contextual Processing and Universal Core |
|
|
19 | (2) |
|
1.10 The Case for Contextual Processing and Summary |
|
|
21 | (1) |
|
|
22 | (1) |
|
Chapter 2 Defining the Transformation of Data to Contextual Knowledge |
|
|
23 | (52) |
|
|
23 | (1) |
|
2.1 Introduction and Knowledge Derivation from the Snow of Data |
|
|
24 | (2) |
|
2.2 The Importance of Knowledge in Manmade Disasters |
|
|
26 | (2) |
|
2.2.1 September 11: World Trade Center |
|
|
26 | (2) |
|
2.3 Context Models and Their Applications |
|
|
28 | (3) |
|
2.4 Defining Contextual Processing |
|
|
31 | (4) |
|
2.5 The Properties of Contextual Data |
|
|
35 | (1) |
|
2.6 Characteristics of Data |
|
|
36 | (3) |
|
2.7 Semantics and Syntactical Processing Models for Contextual Processing |
|
|
39 | (8) |
|
2.8 Storage Models that Preserve Spatial and Temporal Relationships Among Contexts |
|
|
47 | (1) |
|
2.9 Deriving Knowledge from Collected and Stored Contextual Information |
|
|
48 | (3) |
|
2.10 Similarities Among Data Objects |
|
|
51 | (1) |
|
2.11 Reasoning Methods for Similarity Analysis of Contexts |
|
|
52 | (17) |
|
2.11.1 Statistical Methods Means, Averages, Ceilings, and Floors |
|
|
55 | (1) |
|
|
55 | (1) |
|
2.11.3 Standard Deviation |
|
|
56 | (1) |
|
2.11.4 Probabilistic Reasoning |
|
|
57 | (3) |
|
2.11.5 Support Vector Machines |
|
|
60 | (2) |
|
|
62 | (3) |
|
2.11.7 Bayesian Techniques |
|
|
65 | (3) |
|
|
68 | (1) |
|
2.12 Other Types of Reasoning in Contexts |
|
|
69 | (1) |
|
|
70 | (2) |
|
2.14 Research Directions for Global Contextual Processing |
|
|
72 | (1) |
|
|
73 | (2) |
|
Chapter 3 Calculus for Reasoning about Contextual Information |
|
|
75 | (20) |
|
|
75 | (1) |
|
3.1 Context Representation |
|
|
76 | (1) |
|
|
77 | (2) |
|
3.3 Fuzzy Set and Operations |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
3.4 Contextual Information and Nonmonotonic Logic |
|
|
80 | (4) |
|
3.4.1 Conflicts in Conclusions |
|
|
80 | (2) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (2) |
|
3.4.3 Entailment in a Contextual Case |
|
|
84 | (1) |
|
3.4.3.1 Prioritized Default Theory |
|
|
84 | (1) |
|
|
84 | (4) |
|
|
85 | (1) |
|
3.5.2 Circumscription and the Yale Shooting Problem |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
3.5.4 The Successor State Axioms |
|
|
87 | (1) |
|
3.6 Recommended Framework |
|
|
88 | (1) |
|
3.6.1 Fuzzy Inference Scheme |
|
|
88 | (1) |
|
|
89 | (3) |
|
3.7.1 Prioritize Defaults |
|
|
90 | (1) |
|
3.7.2 Resolve the Frame Problem |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (2) |
|
Chapter 4 Information Mining for Contextual Data Sensing and Fusion |
|
|
95 | (20) |
|
|
95 | (1) |
|
|
96 | (2) |
|
4.2 Distributed Data Mining |
|
|
98 | (10) |
|
4.2.1 Motivation for Distributed Data Mining |
|
|
98 | (1) |
|
|
99 | (1) |
|
4.2.2.1 A Data-Driven Approach |
|
|
99 | (1) |
|
4.2.2.2 A Model-Driven Approach |
|
|
99 | (1) |
|
4.2.2.3 An Architecture-Driven Approach |
|
|
100 | (1) |
|
|
101 | (1) |
|
4.2.3.1 Parallel and Distributed DM Algorithms |
|
|
101 | (1) |
|
4.2.4 Research Directions |
|
|
102 | (1) |
|
4.2.5 Scheduling DM Tasks on Distributed Platforms |
|
|
102 | (1) |
|
4.2.6 Data and the K-Grid |
|
|
103 | (1) |
|
4.2.7 The Knowledge Grid Scheduler (KGS) |
|
|
104 | (1) |
|
4.2.8 Requirements of the KGS |
|
|
104 | (1) |
|
|
104 | (2) |
|
4.2.10 An Architectural Model for a K-Grid |
|
|
106 | (2) |
|
4.3 Context-Based Sensing, Data Mining, and its Applications |
|
|
108 | (1) |
|
4.3.1 Applications of Contextual Data Mining |
|
|
108 | (1) |
|
4.4 Example: The Coastal Restoration Data Grid and Hurricane Katrina |
|
|
109 | (1) |
|
4.5 The Power of Information Mining in Contextual Computing |
|
|
110 | (1) |
|
4.6 Enabling Large-Scale Data Analysis |
|
|
110 | (1) |
|
4.7 Example: Accessing Real-Time Information-Sensor Grids |
|
|
111 | (1) |
|
4.8 Research Directions for Fusion and Data Mining In Contextual Processing |
|
|
112 | (1) |
|
|
113 | (2) |
|
Chapter 5 Hyperdistribution of Contextual Information |
|
|
115 | (70) |
|
|
115 | (1) |
|
5.1 Introduction to Data Dissemination and Discovery |
|
|
116 | (1) |
|
5.2 Defining Hyperdistribution |
|
|
117 | (8) |
|
5.3 Issues in Hyperdistribution |
|
|
125 | (3) |
|
|
125 | (2) |
|
5.3.2 Discovery of Consumers |
|
|
127 | (1) |
|
5.3.3 Routing of Data and Contextual Information |
|
|
127 | (1) |
|
5.4 Methods Infrastructure, Algorithms, and Agents |
|
|
128 | (11) |
|
|
128 | (2) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
5.4.5 Security Issues with Web Services |
|
|
133 | (3) |
|
5.4.6 The Use of Web Services as Mobile Agent Hosts |
|
|
136 | (1) |
|
5.4.7 Security Issues with the Use of Web Services as Mobile Agent Hosts |
|
|
137 | (1) |
|
5.4.8 Web Services as Static Agents |
|
|
137 | (1) |
|
5.4.9 Hyperdistribution Methods |
|
|
138 | (1) |
|
|
139 | (13) |
|
|
139 | (1) |
|
|
140 | (1) |
|
5.5.1.2 Preliminary Definitions |
|
|
140 | (3) |
|
5.5.1.3 The Polyadic π-Calculus |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
5.5.2.2 Mobility and Communication |
|
|
144 | (3) |
|
|
147 | (1) |
|
|
147 | (3) |
|
5.5.3.2 Formal Definition |
|
|
150 | (2) |
|
5.5.3.3 Extensions to the Petri Net |
|
|
152 | (1) |
|
|
152 | (26) |
|
|
153 | (1) |
|
|
154 | (5) |
|
|
159 | (3) |
|
|
162 | (1) |
|
5.6.1.4 Substitution and Convertibility |
|
|
162 | (1) |
|
|
163 | (2) |
|
|
165 | (2) |
|
5.6.1.7 Structural Congruence |
|
|
167 | (1) |
|
|
168 | (4) |
|
5.6.1.9 Simple Examples of API-S |
|
|
172 | (6) |
|
5.7 Example: Contextual Hyperdistribution |
|
|
178 | (1) |
|
5.8 Research Directions in Hyperdistribution of Contexts |
|
|
179 | (2) |
|
|
181 | (4) |
|
Chapter 6 Set-Based Data Management Models for Contextual Data and Ambiguity in Selection |
|
|
185 | (26) |
|
|
185 | (1) |
|
6.1 Introduction to Data Management |
|
|
186 | (1) |
|
6.2 Background on Contextual Data Management |
|
|
187 | (2) |
|
6.3 Context-Oriented Data Set Management |
|
|
189 | (1) |
|
6.4 Contextual Set Spatial Ambiguity in Retrieval |
|
|
190 | (7) |
|
6.5 A Set Model-Based Erd |
|
|
197 | (2) |
|
6.6 A Fuzzy Erd Model For Contextual Data Management |
|
|
199 | (1) |
|
|
200 | (1) |
|
6.8 Fuzzy Relation Similar Fns() |
|
|
201 | (1) |
|
|
202 | (1) |
|
6.10 Discretizing Function (Temporal () |
|
|
202 | (2) |
|
6.11 Fuzzy Relation (Spatial() |
|
|
204 | (1) |
|
6.12 Extended Data Model for the Storage of Context Data Sets |
|
|
204 | (4) |
|
6.13 Example: Set-Based Modeling and Contextual Data Management |
|
|
208 | (1) |
|
6.14 Research Directions in Contextually Based Set Model Data Management |
|
|
209 | (1) |
|
|
210 | (1) |
|
Chapter 7 Security Modeling Using Contextual Data Cosmology and Brane Surfaces |
|
|
211 | (42) |
|
|
211 | (1) |
|
|
212 | (5) |
|
7.1.1 Cybersecurity Overview and Issues |
|
|
212 | (3) |
|
|
215 | (2) |
|
7.2 Challenges and Issues in the Development of Contextual Security |
|
|
217 | (7) |
|
7.2.1 Elements of Contexts |
|
|
217 | (1) |
|
7.2.2 Core Issues in Contextual Security |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
7.2.2.3 Control and Geopolitics |
|
|
220 | (1) |
|
7.2.2.4 Spatial Data Security |
|
|
220 | (1) |
|
7.2.2.5 Time and Streaming |
|
|
221 | (2) |
|
7.2.2.6 Spatial Relationships |
|
|
223 | (1) |
|
7.2.2.7 Versioning Relationships |
|
|
223 | (1) |
|
7.2.2.8 Impact and Criticality |
|
|
224 | (1) |
|
7.3 An N-Dimensional Surface Model That Can Be Applied to Contextual Security |
|
|
224 | (22) |
|
7.3.1 Key Concepts of Relevance to Security |
|
|
224 | (1) |
|
|
225 | (3) |
|
7.3.3 Brane Geo-referencing |
|
|
228 | (1) |
|
7.3.4 Brane Classification Properties |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
7.3.5 Selected Branes' Structures and Properties |
|
|
232 | (1) |
|
|
233 | (1) |
|
7.3.5.2 Cylindrical Brane |
|
|
234 | (1) |
|
7.3.5.3 Frustum of a Cone Brane |
|
|
235 | (2) |
|
7.3.5.4 calcsecuritylevel() |
|
|
237 | (2) |
|
7.3.5.5 n-Sided Pyramid Brane |
|
|
239 | (1) |
|
7.3.5.6 pointinsideface (Eo, sides, apex) |
|
|
240 | (1) |
|
7.3.5.7 calcintersection (baseside, Eo) |
|
|
240 | (4) |
|
7.3.5.8 Frustum of a Pyramid Brane |
|
|
244 | (2) |
|
7.4 Textual Example: Pretty Good Security and Branes |
|
|
246 | (2) |
|
7.5 Practical Example: Pretty Good Security and Branes |
|
|
248 | (1) |
|
7.6 Research Directions in Pretty Good Security |
|
|
249 | (2) |
|
|
251 | (2) |
Index |
|
253 | |