Reconciling Schema Matching Networks Through Crowdsourcing
Journal Title: EAI Endorsed Transactions on Collaborative Computing - Year 2015, Vol 1, Issue 2
Abstract
for data integration purposes. Although several automatic schema matching tools have been developed, their results are often incomplete or erroneous. To obtain a correct set of correspondences, usually human effort is required to validate the generated correspondences. This validation process is often costly, as it is performed by highly skilled experts. Our paper analyzes how to leverage crowdsourcing techniques to validate the generated correspondences by a large group of non-experts. In our work we assume that one needs to establish attribute correspondences not only between two schemas but in a network. We also assume that the matching is realized in a pairwise fashion, in the presence of consistency expectations about the network of attribute correspondences. We demonstrate that formulating these expectations in the form of integrity constraints can improve the process of reconciliation. As in the case of crowdsourcing the user’s input is unreliable, we need specific aggregation techniques to obtain good quality. We demonstrate that consistency constraints can not only improve the quality of aggregated answers, but they also enable us to more reliably estimate the quality answers of individual workers and detect spammers. Moreover, these constraints also enable to minimize the necessary human effort needed, for the same expected quality of results.
Authors and Affiliations
Nguyen Quoc Viet Hung, Nguyen Thanh Tam, Zoltán Miklós, Karl Aberer
Testing Software Using Swarm Intelligence: A Bee Colony Optimization Approach
Software testing is a critical activity in increasing our confidence of a system under test and improving its quality. The key idea for testing a software application is to minimize the number of faults found in the syst...
Message from the Editors-in-Chief
We are very pleased to welcome you all to the second issue of this journal. In this issue, we present six selected invited papers that span various aspects of collaborative computing and technologies. In particular, t...
Achieving Security Assurance with Assertion-based Application Construction
Modern software applications are commonly built by leveraging pre-fabricated modules, e.g. application programming interfaces (APIs), which are essential to implement the desired functionalities of software applications,...
An Alert System on the Presence of Myriapods in Peanut Farms in Senegal
In Senegal, agriculture remains one of the most important sectors of the economy and the culture of peanut is one of the pillars in this domain. Unfortunately, the expansion of this culture is constantly hampered by atta...
Space Searching Algorithms Used by Fungi
Experimental studies have shown that fungi use a natural program for searching the space available in micro-confined networks, e.g., mazes. This natural program, which comprises two subroutines, i.e., collision-induced b...