<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Using Spreading Activation through Ontologies to Support Personal Information Management</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Akrivi</forename><surname>Katifori</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Dept. of Informatics &amp; Telecommu-nications</orgName>
								<orgName type="institution">University of Athens Panepistimioupolis</orgName>
								<address>
									<addrLine>Ilissia</addrLine>
									<postCode>15784</postCode>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Costas</forename><surname>Vassilakis</surname></persName>
							<email>costas@uop.gr</email>
							<affiliation key="aff1">
								<orgName type="department">Dept. of Computer Science and Technology</orgName>
								<orgName type="institution">University of Peloponnese Terma Karaiskaki</orgName>
								<address>
									<postCode>22100</postCode>
									<settlement>Tripoli</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alan</forename><surname>Dix</surname></persName>
							<email>a.dix@comp.lancs.ac.uk</email>
							<affiliation key="aff2">
								<orgName type="department">Computing Department</orgName>
								<orgName type="institution">Lancaster University</orgName>
								<address>
									<postCode>LA1 4WA</postCode>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Using Spreading Activation through Ontologies to Support Personal Information Management</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">F8477BAAF414344AEAD2F644C7CB26CF</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T01:21+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Personal ontology</term>
					<term>spreading activation</term>
					<term>context inference H5.m. Information interfaces and presentation (e.g.</term>
					<term>HCI): Miscellaneous</term>
					<term>H3.0 Information Storage and Retrieval: General</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Recent research in the domain of Personal Information Management has recognized the need for a paradigm shift towards a more activity-oriented system. Ontologies, as semantic networks with a structure not dissimilar to the one used by the human brain for storing long-term knowledge, may be very useful as the basis of such a system. This work proposes the use of spreading activation over ontologies in order to provide to a task-based system and its associated tools with methods to record semantics related to documents and tasks and to support user context inference.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>INTRODUCTION</head><p>As a direct result of the rapid technological progress of the last few decades, personal computers have become repositories for company information and scientific data, documents, electronic mail as well as personal collections of media, like photographs, video or music. Computer users, however, in order to take advantage of this memory complement offered to them, have to invest more and more time into managing and organizing their collections and repositories because, if they don't, retrieving information from them when necessary will be nearly impossible. Furthermore, in current computer systems the user interaction paradigm is based on functionally defined applications (word processing, address management, internet browsing) and on the storage, organisation and retrieval of information in files or databases, the content types and structure of which are determined by the units of operation of the applications. However, real activity, whether for work or leisure, crosses application boundaries, may involve portions of files, and interlinks fragments of both. Users should not have to focus on managing their information but rather on performing the tasks this information is to be used for.</p><p>Recent research in the domain of Personal Information Management (PIM) and Task-centered Information Management (TIM) has recognized the need for a paradigm shift towards more task-and activity-oriented systems <ref type="bibr" target="#b20">[21]</ref>. Ontologies, as semantic networks with a structure very similar to the one used by the human brain for storing long term knowledge, may be very useful as the basis of such a system. They offer a flexible and expressive layer of abstraction, very useful for capturing the semantics of information repositories and facilitating their retrieval either by the user or by the system to support user tasks. To this end, if combined with appropriate "intelligent" mechanisms, they may become useful tools to record semantics related to documents and tasks and function as an extension to the user's own memory, available both for the user and the system. This work explores the application of the spreading activation theory of the human memory <ref type="bibr" target="#b0">[1]</ref>  <ref type="bibr" target="#b1">[2]</ref> on ontologies in order to create a context inference model for an ontology-based PIM/TIM prototype system. The following section briefly outlines the architecture of this system, focusing on the ontology and context inference module, whereas the next describes briefly the human memory theories that have been the basis of this work, along with an example of spreading activation. The following section describes the creation of a personal ontology for the user domain, followed by the description of the spreading activation algorithm. The next section discusses briefly the results of a preliminary evaluation of the spreading activation module. Finally, after a brief outline of related work, the last section presents the conclusions and outlines future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>TOWARDS A PERSONAL INTERACTION MANAGEMENT SYSTEM</head><p>The motivation of our work on personal ontologies and spreading activation has been the vision of more activitycentric computing and the general aim of moving from systems focusing on the management of personal information (i.e. PIM) to systems focusing on the management of personal interaction. We define Personal Interaction Management System (PIMS) to be a system that supports the user in executing tasks in an interactive and efficient way, providing at the same time effective and transparent mechanisms for maintaining the user's personal document collection.</p><p>In order for a PIMS to be effective, it should provide effective mechanisms for user profiling, semantic storage of documents and context inference. Figure <ref type="figure">1</ref> shows a sketch view of the main components a PIMS must include to support this functionality. The information side (documents, emails etc.) is linked to the computation side (actions) through two main components:</p><p>1. A recogniser finding suitable fragments of the raw information that are semantically meaningful and that can be used to initiate or feed into actions 2. A personal ontology that contains knowledge specific to the user (people, projects, etc.).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1. Basic outline of a PIMS system</head><p>These two feed into one another. The various terms, names, emails, etc, in a personal ontology can yield keywords to be matched against text or semi-structured sources. So an increasingly rich personal ontology will lead to better identification of suitable loci for action. Furthermore, as users perform actions the way in which they use information, the results of their activities can be used to enrich the ontology. For example, if a piece of text is used to search in a gazetteer it suggests that (i) it is a place name -that is we know more about its type and (ii) it is a place name that is important to the user -so will be suggested to be added into the personal ontology.</p><p>Figure <ref type="figure">1</ref> also shows a history sub-component related to the personal ontology. We need to record what is done in order to both (a) establish a sense of context and (b) be able to allow the system to gain some understanding of the user's ongoing activities.</p><p>Both of these require inference mechanisms which sit outside this picture, using the information from the personal ontology and history and then feeding this in to modify the recognition and action selection. For task inference we are using a bottom up approach described in more detail in <ref type="bibr" target="#b22">[23]</ref> and prototyped over actions on web forms. For context inference we are using spreading activation over the Personal Ontology, which is the focus of this work. The PIMS system architecture and individual components are discussed in more detail in <ref type="bibr" target="#b20">[21]</ref> and <ref type="bibr" target="#b21">[22]</ref>, whereas this work focuses on spreading activation for context inference.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>ONTOLOGIES AND PERSONAL INFORMATION MANAGEMENT</head><p>According to <ref type="bibr" target="#b4">[5]</ref>, an ontology is an explicit specification of a conceptualization. The term "conceptualization" is defined as an abstract, simplified view of the world that needs to be represented for some purpose. It contains the concepts (classes) and their instantiations (instances) that are presumed to exist in some area of interest and their properties and relations that link them (slots). The term "ontology" is borrowed from philosophy, where an ontology is a systematic account of Existence. This section presents the creation of a personal ontology to be the basis of the intelligent context inference mechanism of our PIMS system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ontologies in PIM systems</head><p>Using an ontology to model semantics related to the user personal domain has already been proposed for various applications like web search <ref type="bibr" target="#b10">[12]</ref>, <ref type="bibr" target="#b11">[13]</ref>. Most of these approaches use ontologies only as concept hierarchies, like hierarchies of user interests, without particular semantic complexity. The value of ontologies for personal information management has also been recognized and there is on-going research on incorporating them in PIM systems like OntoPIM <ref type="bibr" target="#b12">[14]</ref>, GNOWSIS <ref type="bibr" target="#b14">[15]</ref> and the semantic desktop search environment proposed in <ref type="bibr" target="#b15">[16]</ref>.</p><p>In the context of our proposed PIMS system the personal ontology has a very important part to play. On one hand, it may constitute a useful repository of information related to many aspects of the user's personal and professional life. There the user will be able to store and access information on contacts (friends, colleagues, etc), activities (like a research project or a hobby), events (like project meetings, conferences, etc), documents (collected books and research papers, etc) and tasks. With the appropriate interface, the ontology may become an easily customizable repository of information that may serve as a memory complement for the user. On the other hand, coupled with intelligent mechanisms, the ontology may become invaluable for context inference in the process of supporting the user tasks through task inference.</p><p>To this end, we have created an ontology for the user's personal collection domain. This ontology has been created taking into account existing profile models in applications as well as related research in the area of profiling.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ontology Creation</head><p>Creating a personal ontology, either automatically, manually or semi-automatically is not an easy task. In order for such an ontology to be truly personal, it should be able to reflect the user individuality, but, it should do so in the context of a specific general model that will enable exchange of information between users and will be usable by computers. This is the main reason why the personal ontology model we propose encompasses a basic core of general concepts that may be enriched to accommodate several user stereotypes or individual profiles. The addition of new classes may be accomplished both at the ontology designer and the end user level.</p><p>Details on the creation of the personal ontology may be found in <ref type="bibr" target="#b5">[6]</ref>. The version of the personal ontology used in this work is an extension of the one in <ref type="bibr" target="#b5">[6]</ref>, as it has been enriched with more user-related classes for the user stereotype of "Researcher" in order to be used for the fine tuning and evaluation of the spreading activation algorithm. The ontology, along with example instances may be found in <ref type="bibr" target="#b6">[8]</ref>. Figure <ref type="figure" target="#fig_0">2</ref> presents an overview of the upper levels of the class hierarchy.</p><p>The personal ontology attempts to encompass a wide range of user characteristics, including personal information as well as relations to other people, preferences and interests. The ontology may be extended through inheritance and the addition of more classes, as well as concept instantiation according to the needs of user stereotypes or individuals.</p><p>The personal ontology classes are divided in two main groups, which comprise the two upper levels of the ontology, "Value class" and "Thing" (Figure <ref type="figure" target="#fig_0">2</ref>). "Value Class" contains a description of information items that are more complex than simple data types but are not self-contained enough to be included in the ontology as separate entities. These among others include dates, URLs, telephone numbers, zip codes and names and may be used as slot types for the concepts of the "Thing" sub-hierarchy. Instances of these concepts may serve as information items identified automatically by a PIM or TIM application.</p><p>Class "Thing" (Figure <ref type="figure" target="#fig_0">2</ref>) contains both abstract and tangible things, which may be objects, living organisms and concepts. Classes "Interest Type" and "Preference Type" model interest and preference hierarchies as the ones suggested in <ref type="bibr" target="#b10">[12]</ref> and <ref type="bibr" target="#b11">[13]</ref>. Class "Self" (highlighted in Fig. <ref type="figure" target="#fig_0">2</ref>), a direct subclass of "Person", models the profiled user.</p><p>The ontology has been modeled using Protégé [7], a widely used open source ontology management tool with a welldefined API for creating plug-ins. To this end it was selected for the implementation and testing of the spreading activation algorithm over the personal ontology. The following section describes human memory theories on which our work has been based, along with a brief example of spreading activation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>SPREADING ACTIVATION IN THE HUMAN BRAIN AND IN ONTOLOGIES Different Timescales of Human Memory</head><p>The human memory operates on multiple timescales. According to the model that Atkinson and Shiffrin proposed in 1968 <ref type="bibr" target="#b3">[4]</ref>, there are two distinct memory stores:</p><p>• Short term memory-the things we are currently thinking about. This is short lived (10-30 secs) unless it is constantly rehearsed.</p><p>• Long term memory -the things we have learnt and stay with us for years (possibly forever), but may be more or less easy to retrieve.</p><p>Short term memory is held in patterns of electrical activity whereas long term memories are formed by actual synapse growth. However, there are things that stay around longer than the 10-30 seconds of the short term memory, but are related to the current moment and task. These include the context of "what am I doing now" as well as recent episodic memory of "what has happened in the last few minutes". This in-between or 'mezzanine' memory is not well dealt with in the literature as it is too 'fast' for neuron growth. It may be in part due to more maintained electrical states or chemical changes in neurons called long term potentiation or LTP, which are known to last for anything from seconds to hours. The spreading activation theory <ref type="bibr" target="#b0">[1]</ref> has proven to provide a model with a high degree of explanatory power in cognitive psychology <ref type="bibr" target="#b1">[2]</ref>. The main advantage of this model is that it captures both the way knowledge is represented and also the way it is processed. According to this theory, knowledge in the long term memory is represented in terms of nodes and associative pathways between nodes, which form a semantic network of concepts. A hierarchical structure is also present in this network, classifying concepts in more generic and more specific ones <ref type="bibr" target="#b1">[2]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Person</head><p>Connection strength and node distance are determined by the semantic relations or associative relations between the conceptual nodes. This model assumes that activation spreads from one conceptual node to those around it, with greater emphasis to the closer ones <ref type="bibr" target="#b2">[3]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>An Example of Spreading Activation through the Personal Ontology</head><p>To provide a clearer view of the use of spreading activation over the personal ontology, consider Figure <ref type="figure" target="#fig_1">3</ref>. It presents an ontology schema with classes for Persons, Universities, Cities and Countries and a number of relationships (unlabelled, but all obvious except that the Person to Person relationship is PhD supervisor).</p><p>In the lower part of the figure are a number of instances on the classes and their relationships: from the class Person the instances Vivi, Costas and George have been added to the personal ontology. Costas supervises Vivi's PhD. Costas and Vivi both work for UoA which is in Athens, Greece and George works for UoP which is in Tripolis, Greece.</p><p>Suppose that there is some sort of initial reason for focusing on Vivi, perhaps she has been selected by the user for interaction or has appeared in a recent email. Vivi is therefore given a high initial activation level. The entities directly connected to Vivi (in this case Costas and UoA) are then also given activation, less than Vivi's though. Because UoA receives activation entities connected with it, in particular the City it is in, Athens, are given a small share of its activation. This then further spreads to Greece, the country in which the City of Athens is situated.</p><p>This activation will also flow backwards through relations so that Tripolis becomes activated because Greece is, and so on. When activation spreads through a 1-m relation it will be weaker than through an m-1 relation, as there are many things to which it is spreading. Also note that some entities may receive activation through multiple routes. For example, UoA receives activation because it is the place Costas works as well as because of its direct link to Vivi. This may then lead to cycles of activation, hence the importance of 'throttling' the spread of activation where there is large fan out (as in 1-m relations).</p><p>Some relations may be deemed more important than others and hence given a weighting in the schema, which can then be used when computing the activation spread. In addition, over time these could be adjusted so that where entities in either side of a relation are often active together the relation may grow in weight. The amount of activation an entity receives is also related to (1) if the entity was activated by an external factor (i.e. being detected in an e-mail), (2) if the entity was recently active (i.e. detected very recently in the user's tasks), (3) if the entity has long term importance to the user.</p><p>The result of the spreading activation will be a set of entities that have been found relevant to the user's current task and therefore given priority during the task inference stage. The context inference module, based on spreading activation, has been inspired by the human memory spreading activation model, which is briefly presented in the following section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>DIFFERENT TIMESCALES FOR TASK-BASED INTERACTION</head><p>In user interaction with a system multiple timescales can be noted, which roughly correspond to the ones apparent in the human memory model. First, there are the contents of the personal ontology and the available information sources that roughly correspond to human long-term memory. Not all things in this long-term system memory are equally important and it should be recorded that some things (such as the user's own address) are more important than others (the address of the plumber). Corresponding to the short/working memory are the things the system has to store regarding the current user task -for example, the contents of the email the user has just opened, the text the user has just selected, the web page just visited, or the form field being completed. Finally, there are the things the user has been recently doing (other pages visited, documents seen, etc.) that roughly correspond to the mezzanine memory. This recent history is important as, for example, if the user has recently viewed a web site about an upcoming event and then goes to a travel website it is likely that the place to be visited is that of the event.</p><p>These different levels could be dealt with in a spreading activation framework by simply fading memories over time so that entities frequently encountered become increasingly highly 'activated'. However, with a single mechanism it is hard to create a balance between having recent things be more active (the place just mentioned in an email) than important general things (the user's address), whilst on the other hand not having them crowd out the longer-term things.</p><p>Because of this it seems more appropriate to explicitly code these different levels using multiple activations with 'rules' for passing activation between short-term to longer-term memories. The simplest such rule would be to define thresholds so that if the short-term activation exceeds some value then the medium-term activation is incremented and similarly if the medium term memory exceeds its own threshold (signalling that something has been repeatedly of high relevance), then the long-term activation grows. In addition, certain events (e.g. explicitly interacting with an entity) may be regarded as sufficiently important to increase the long-term memory directly (just as significant events are easily remembered).</p><p>The following section presents the algorithm and implementation inspired by the human memory model through spreading activation on the personal ontology</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Spreading Activation Algorithm</head><p>The spreading activation through the personal ontology algorithm assumes, to avoid repetition in the formulae, that the inverse of each relation is explicitly recorded in the ontology schema. For a real schema this means that all qualifiers would have to range over relations and their inverses. Also the weight (strength) of a relation is directional, so that there is a difference between the weights depending on which direction the relation is traversed. Again to simplify the formulae, property values will be ignored.</p><p>Given this we have a set of relations L, of entities (instances) E and instances of relationships (statements) S. Every statement is a relation between specific entities:</p><formula xml:id="formula_0">S = L x E x E</formula><p>So a typical statement is of the form r(e1,e2), where r is a relation and e1 and e2 are instances.</p><p>The current state of the ontology is then simply a set of statements:</p><p>OntologyState º OS Ì S An activation state over such an ontology is then an activation level (real number) assigned to each entity:</p><formula xml:id="formula_1">ActivationState: E ® R</formula><p>The set of all possible activation states over an entity set E will be denoted as AS(E). We will refer to the three time scales of system activation as STA, MTA and LTA. STA (Short Term Activation) refers to things that are currently active, MTA (Medium Term Activation) to things that have been recently active (and most probably still are), whereas LTA (Long Term Activation) to things that are important to the user in the long term. There is also a 'trigger' activation, IA (Immediate Activation), corresponding to the things that are in some way important directly due to the current task/interaction; for example, the things that are in the currently viewed e-mail or web page. STA, MTA, LTA, IA Î AS(E) Also we assume that each relation, r, has a long-term weight LTW(r) that is initialized according to the cardinality of the relationship (1-1, 1-m, m-1, m-n).</p><p>The basic steps of the algorithm may be summarized as follows:</p><p>1. Initialize appropriate weights and activations 2. Create a set with the currently active entities (entities e with IA(e) &gt; 0), Active Set</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Repeat:</head><p>Compute STA(e) for the entities in the Active Set as well as their related ones</p><p>For the related entities whose STA exceeds a threshold, place them in the Active Set Until &lt;condition&gt;</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Update MTA and LTA activation weights if appropriate</head><p>We envision that the spreading activation algorithm will be triggered after each "event" in a PIMS system. With the term "event" in this case we refer to a user action that has resulted in the identification of ontology entities related to the current action. For example, the user opens an e-mail, and in it the sender name has been detected as well as the name of a research project the user currently participates in. Bearing this in mind, the following sections present in details the algorithm steps.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Updating Short Term Activation</head><p>Given a particular state of the STA, each entity e has an The function will typically count IA strongly, and only take into account MTA and LTA where either IA or IN(e) is non-zero. For example, a possible function might be:</p><formula xml:id="formula_2">f(ia, in, mta, lta) = (A ´ ia + B ´ in) * (1 + ( C ´ mta + D ´ lta))</formula><p>The non-linear term means that long-or medium-term activation are not in themselves sufficient to cause shortterm activation, but do strengthen the effect of STA.</p><p>The result of the STA update function is passed through a sigmoid function ( ) to emphasise the difference between large and small activations and to cap the largest.</p><p>The equation for STA is recursive and is applied on the set of activated entities of each step.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Spreading Activation Termination Conditions</head><p>For the number of iterations during the spreading activation algorithm step for STA computation, two options have been considered:</p><p>1. Full Spreading of Activation: Repeat spreading computations for the whole ontology, until it reaches a stable state.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Constrained Spreading of Activation:</head><p>Repeat for a specific number of iterations.</p><p>The first option was not selected for a number of reasons Firstly, bearing in mind that a personal ontology serving as memory aid for a user may contain thousands of instances, applying spreading activation on the whole ontology would not be very efficient, especially in applications like task information management where access to the ontology is very frequent.</p><p>Furthermore, the existence of cyclic paths in the ontology graph means that the spreading activation process won't end because of the loops. A way to go around this would be to detect already visited entities and avoid loops by not spreading activation to them again. However, this could be a problem as well, as an entity may be related to more than one active entities. For example, an entity e1 may receive activation from the directly connected to it e2 during the first iteration step and from the entity e3 that is related to e1 through e4 during the second iteration step (e1à e2 and e1à e4 à e3). So excluding already visited entities has also been rejected.</p><p>As a result, for the needs of our implementation of spreading activation we opted for constrained spreading activation, also suggested in <ref type="bibr" target="#b8">[10]</ref>. We feel that this variation of the algorithm is closer to the human memory spreading activation process where the finite rate of firing and tome available means that only a limited number of 'steps' are taken. To this end, we apply spreading activation on the ontology for a specific number of iterations. Futrhermore, if the personal ontology is a 'small world' then it may be that activation can in principle spread across the network in a very few iterations, before feedback loops become too powerful. The optimum number of iterations is still an issue for experimentation and it is directly related to the needs of the specific application as well as the ontology weights and parameters.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Updating Medium and Long Term Activation</head><p>At the end of the spreading activation cycle, MTA and LTA are updated.</p><p>We MTA and LTA apart from being incremented when active, it should also be decayed when inactive. This gradual decay should reflect the fact that memories tend to fade or become less readily accessible when they fall into disuse for a sufficient period of time. Due to the differences of medium and long term activations, however, their update mechanisms should be examined separately.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>MTA Increase and Decay</head><p>MTA expresses the number of things that are recently and currently "active" and may involve the user's current tasks. This suggests that the total amount of MTA weights in the ontology should remain relatively steady, in order to reflect the fact that the user's divided attention among many tasks (and, subsequently, entities), results in less attention paid to each particular task/entity.</p><p>To this end, we define a constant, MaxMTATotal, which represents the maximum value for the sum of all MTA weights in the ontology.</p><p>The decay of MTA is accomplished with the following process:</p><p>Every T steps:</p><p>1. The total amount of MTA increase over the T steps, s MTA , is recorded 2. We set λ MTA = s MTA / MaxMTATotal as the decay factor 3. For every entity e, the new MTA is computed: MTA'(e) = (1 -l MTA ) * MTA(e)</p><p>The frequency of the MTA decay as well as the maximum total of MTA weights should be adjusted according to the needs of the specific application. For a TIM system MTA probably should be updated after each "event".</p><p>In special cases when IA on its own exceeds some value or was caused by some specific effect, MTA could be increased directly.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>LTA Increase and Decay</head><p>LTA reflects the long term importance of entities: it represents the fact that some things have been important to the user several times in the past. Even if currently or in the recent past they may not have been active, they most probably will be again in the future. Entities like the user's address or parents can never be entirely forgotten.</p><p>As a result, when decaying LTA weights, it should be made sure that the decay does not result in important things having their LTA weight value gradually returning to zero. A way to accomplish this is to make sure that the LTA of an entity never decays to less than a percentage (n%) of its maximum value.</p><p>We define as maxLTA(e) the maximum LTA value an entity e has ever received Furthermore, we define two constants, λ LTA as the decay constant that depends on the time interval between each decay and minPerc as the minimum percentage of the entity maxLTA value that the LTA of an entity may reach when decayed. The LTA decay is computed using the following process:</p><p>At the designated time points, for every entity e:</p><p>if (LTA(e) &gt; maxLTA(e)) {maxLTA(e) = LTA(e)} minLTA_e = minPerc * maxLTA(e); if (LTA(e) &gt; minLTA_e ) { delta_e = λ LTA * (LTA(e) -minLTA_e) LTA'(e) = LTA(e) -delta_e } An issue here is the definition of the time interval between consecutive decays. For the moment, events are considered as a time unit in order to measure the passage of time. The LTA decay time intervals in a TIM application should take into account other factors like the real time elapsed and the computer usage time elapsed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>LTW and Relation Weights</head><p>Relation weights are a very important issue in the spreading activation framework.</p><p>Three levels of relation weights may be distinguished:</p><p>(1) The relation as a whole, which is expressed by the relation Long Term Weight -LTW.</p><p>(2) Weights on the precise instance of a relation, that is for a specific e 1 , e 2 with a relation r between them, we could assign a weight dependent on:</p><p>(a) Whether the relation was important in spreading activation (b) Whether both e 1 and e 2 have received high activation</p><p>(3) Weights on the relation for an individual entity, that is given an entity e1 for the specific instance of the relation r in e1, the LTW' is computed as the relation LTW/k, where k is the relation fan-out for the specific entity, i.e. the number of entities with which e1 is connected through the specific relation r.</p><p>For the moment, the spreading activation algorithm has been implemented with the third option for LTW weights.</p><p>As an example, if we look at the class-students relationship, then if a particular class has many students we may want to reduce the spread accordingly, closer to an activation budget model where if a node has so much activation it spreads some of it to other nodes, but has to share amongst the ones connected to it. A model of this form could penalise well-connected entities (which are likely to be central and generally important ones), but without some bias of this form such entities might just become 'fixations' of the ontology.</p><p>A well-connected entity bound to be a fixation in the ontology is the instance of "Self", which represents the user in the ontology. As this is the user's personal ontology, it is natural for it to be the best-connected one, a focal point related to almost all entities in the ontology. This special characteristic of the "Self" instance affects the spreading of activation, so it has been treated as a special case and we have experimenting both with its inclusion and exclusion during the execution of the spreading activation algorithm.</p><p>Working with weights on relation instances remains an open issue that requires further research, as it is not yet clear what would their interaction would be with LTW weights.</p><p>As a final point, LTW weights could also be adjusted to reflect the fact that if it appears that usually when an entity is active so are all those it is related to through a particular relationship r, then this would suggest that that relationship should be given a higher weight.</p><p>IF foreach e Î dom(r), (i) MTA(e) &gt; threshold R1 AND (ii) for most e': r(e, e') Î OntologyState, MTA(e') &gt; threshold <ref type="bibr">R2</ref> ´ MTA(e) THEN increase LTW(r)</p><p>However, this needs to be applied with some care as it is a positive feedback loop -stronger LTW leads to stronger incoming activation and hence makes it more likely that related things are active together, further increasing the LTW of the relation. Until the exact implications of LTW update have been identified, it has not been included in the spreading activation algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>LTA, STA and MTA Initialization</head><p>For the spreading activation algorithm to yield useful and meaningful results, there are two very important factors.</p><p>The first is a rich personal ontology and the second the correct weight and parameter adjustment and initialization.</p><p>For testing the algorithm and after preliminary experimentation, we concluded at a set of default values for these parameters and weights. These are set as default values in the Protégé plug-in for the evaluation of the algorithm, described in the following section. It is obvious that a different set could be used according to the needs of the application that would use the algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>PRELIMINARY EVALUATION</head><p>In order to fully evaluate the spreading activation algorithm, it should be integrated in a TIM prototype and observe its effectiveness in the working environment of the user. For the moment, in order to achieve the fine-tuning of the algorithm parameters and locate problems and flaws, a testing platform has been created in Java in the form of a plug-in for the Protégé ontology editor [7].</p><p>This section presents the evaluation platform as well as the results of the preliminary evaluation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The ActiveOnto Protégé Plug-in</head><p>The ActiveOnto plug-in allows the initialization and setting of all the algorithm parameters and allows the user to simulate the functionality of the algorithm in a PIM/TIM system.</p><p>In the plug-in the user may select instances as "Immediately Active", simulating thus their appearance in an e-mail, document or web page. Then, by pressing the "update" button, the STA, MTA and LTA activations are computed and the user may view the instances that received an STA value greater than a specific user-defined threshold (Fig. <ref type="figure" target="#fig_5">4</ref>).</p><p>The plug-in may be found in <ref type="bibr" target="#b23">[24]</ref> along with its installation instructions. In order for the plug-in to function, an ontology with specific characteristics must be used, as slots representing the activation weights are needed. More specifically, the ontology to be used with the plug-in should have the following characteristics: 3. All slots should conform to a meta-slot with an LTW slot of type String.</p><p>As an example, the personal ontology in <ref type="bibr" target="#b6">[8]</ref> may be used.</p><p>The plug-in offers the possibility to include or exclude the "Self" instance at will in the execution of the spreading activation algorithm, by appropriately setting or clearing a relevant checkbox.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Preliminary Evaluation</head><p>As a first step, we asked a researcher of our group to aid us in evaluating the plug-in. The researcher was asked to populate his personal ontology with instances relevant to his work and computer-related activities in general for the past six months. Then, we asked him to go through his e-mail for the same duration and for each e-mail to set in the plug-in the IA activation of the instances that appeared in the e-mail and update STA, MTA and LTA weights.</p><p>Although the STA update seemed to generally produce relevant concepts and with meaningful activation values, the update of the MTA and LTA weights showed that using the e-mail in this way did not produce interesting results concerning these two weights. This is to be expected, as the e-mails constitute a series of, most of the time, irrelevant "events". Consequently, entities unrelated to one another followed in succession, resulting in constantly increasing and decreasing MTA values that never surpassed the appropriate threshold for increasing the LTA weight.</p><p>These results have lead us to construct more realistic usage scenarios than going through a continuous series of e-mails.</p><p>We have decided to proceed with another non-formal evaluation that would be more task-oriented. This evaluation procedure is currently being designed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>RELATED WORK</head><p>Spreading activation is not a new concept in semantic networks related research. There is a number of proposed applications of spreading activation, especially in the area of information retrieval <ref type="bibr" target="#b9">[11]</ref>.</p><p>Crestani <ref type="bibr" target="#b18">[19]</ref> proposes the use of spreading activation on automatically constructed hypertext networks in order to support web browsing. In this case, constrained spreading activation is used in order to avoid spreading through the whole network, as is the case with our implementation. Liu et al <ref type="bibr" target="#b17">[18]</ref> use spreading activation on a semantic network of automatically extracted concepts in order to identify suitable candidates for expanding a specific domain ontology. Xue et al <ref type="bibr" target="#b18">[19]</ref> propose a mining algorithm to improve web search performance by utilizing the user clickthrough data. Weighted relations between user queries and selected web pages are created and spreading activation is performed on the resulting network in order to re-rank the search results of a specific query.</p><p>Hasan in <ref type="bibr" target="#b19">[20]</ref> proposes an indexing structure and navigational interface which integrates an ontology-driven knowledge-base with statistically derived indexing parameters, and the experts' feedback into a single spreading activation framework to harness knowledge from heterogeneous knowledge assets.</p><p>Neural networks and in particular Hopfield Networks <ref type="bibr" target="#b7">[9]</ref> attempt to approach and simulate the associative memory again by using weighted nodes but at a different level. In this case, the individual network nodes are not separate concepts by themselves, but rather, in their whole, are used to represented memory states. This approach corresponds to the neuron functions of the human brain, whereas ours attempts to simulate the human memory conceptual network functions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>CONCLUSIONS AND FUTURE WORK</head><p>This work outlines a spreading activation over a personal ontology framework to be used in the context of a Personal Interaction Management System. The human brain and the theories related to the different levels of human memory and spreading activation have been the incentive of this work.</p><p>The proposed personal ontology model along with the mechanism that implements the spreading activation will be incorporated in the PIMS prototype currently under development to provide context inference to support user actions, as well as act as a memory supplement for the user.</p><p>Very important for the algorithm effectiveness in identifying "active" entities that are relevant to the ones appearing in the user's current task are the parameters for updating the weights. These parameters have been fine tuned to an extent through a process of preliminary testing, but there is still work to be done in this direction.</p><p>There is also a number of issues to be further investigated:</p><p>Weights on relation instances. To this end, an extension for the Protégé ontology model has been created, allowing the existence of weighted relations to be defined as slot types <ref type="bibr" target="#b25">[26]</ref>. At the moment, the incorporation of these weights in the algorithm is being investigated, in order to decide if they offer some added value to the algorithm effectiveness LTW update. The LTW relation weights are at the moment static. Their update according to occurring events and/or connected entities' STA, MTA and LTA variations, is being investigated.</p><p>Automatic tuning of spreading activation parameters, e.g. automatic alteration for the number of iterations.</p><p>Dealing with topics/contexts -People often do two interleaved -but not relevant to each other-tasks nearly simultaneously, e.g. someone works on a project and opens a window to see the latest football news. The task inference mechanism should be extended to recognize such cases and produce two distinct and specific tasks, instead of a single task consisting of irrelevant activities Results of the preliminary, informal evaluation of the algorithm have shown it to be effective in inferring the context of user tasks. A more effective and thorough taskbased evaluation is being designed in order to evaluate the update of MTA and LTA weights. However, in order to fully evaluate the algorithm, it should be incorporated in the PIMS prototype under development. There are various issues relevant to this incorporation, such as:</p><p>User interaction with the weighted ontology. Bearing in mind that the ontology will be a simplification of the user's semantic network on some aspects of his/her life, his/her contribution on defining the ontology entities and relations, as well as fine-tuning the weights will be invaluable.</p><p>Although for an experienced user doing this directly on an ontology editor like Protégé would not be difficult, nonexpert users would have trouble coping with such an editor interface, as well as the concept of the ontology itself. Furthermore, editing the ontology would add to the user's work a substantial overhead. To this end, semi-automatic methods for visualizing, updating and personalizing the ontology along with the weights are being investigated <ref type="bibr" target="#b24">[25]</ref>.</p><p>Representation of tasks/activities. Should 'types' of tasks and actual instances of things done be represented within the ontology as concepts, just like a friend's name, or should they be placed in some parallel but linked representation?</p><p>Scaling -the spreading activation so far has been created and tested for a personal ontology, but the personal ontology may well include links to external ontologies, even the whole web. Should we and how do we do this form of reasoning over very large ontologies?</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2</head><label>2</label><figDesc>Figure 2 Overview of the Personal Ontology with the upper levels expanded</figDesc><graphic coords="3,88.32,88.88,99.84,214.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 .</head><label>3</label><figDesc>Figure 3. An example of spreading activation over the personal ontology</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>incoming activation IN given by IN(e) = å LTW'(r) ´ STA(e'), r Î R Ù $ e' Î E: r(e, e' ) Î OntologyState The value of LTW'(r) is in fact the relation LTW value divided by the number of entities e' is related with through this relation, i.e. the "fan out" of the relation. The formula for the STA then becomes: STA(e) = f (IA(e), IN(e), MTA(e), LTA(e))</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>1 . 2 .</head><label>12</label><figDesc>All classes should conform to a meta-class having the slots IA, IN, STA, MTA, LTA and MAXLTA of type String. All instances should have the slots IA, IN, STA, MTA, LTA and MAXLTA of type String.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 4 .</head><label>4</label><figDesc>Figure 4. Part of the plug-in window showing the STA, MTA and LTA values for the entities that received STA activation value greater than 12, when entity "Alan Dix" got IA = 1.</figDesc><graphic coords="8,308.88,271.04,234.48,140.40" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A spreading activation theory of memory</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Anderson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Verbal Learning and Verbal Behaviour</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="page" from="261" to="295" />
			<date type="published" when="1983">1983</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Hierarchical Spreading of activation</title>
		<author>
			<persName><forename type="first">F</forename><surname>Sharifian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Samani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the Conference on Language, Cognition and Interpretation</title>
				<meeting>of the Conference on Language, Cognition and Interpretation<address><addrLine>Isfahan</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1997">1997</date>
			<biblScope unit="page" from="1" to="10" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Gazzaniga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">B</forename><surname>Ivry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">R</forename><surname>Mangun</surname></persName>
		</author>
		<title level="m">Cognitive Neuroscience, The Biology of the Mind</title>
				<imprint>
			<publisher>New Ed edition</publisher>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="289" to="294" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Human memory: A proposed system and its control processes</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Atkinson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Shiffrin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The psychology of learning and motivation</title>
				<editor>
			<persName><forename type="first">K</forename><forename type="middle">W</forename><surname>Spence</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">T</forename><surname>Spence</surname></persName>
		</editor>
		<meeting><address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<publisher>Academic Press</publisher>
			<date type="published" when="1968">1968</date>
			<biblScope unit="volume">8</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A Translation Approach to Portable Ontology Specifications, Knowledge Acquisition</title>
		<author>
			<persName><forename type="first">Thomas</forename><forename type="middle">R</forename><surname>Gruber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Special issue: Current issues in knowledge modelling</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="199" to="220" />
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Creating an Ontology for the User Profile: Method and Applications</title>
		<author>
			<persName><forename type="first">M</forename><surname>Golemati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Katifori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Vassilakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lepouras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Halatsis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the First RCIS Conference</title>
				<meeting>the First RCIS Conference<address><addrLine>Ouarzazate, Morocco</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007-04-23">2007. April 23-26</date>
			<biblScope unit="page" from="407" to="412" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Katifori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Vassilakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dix</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Daradimos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lepouras</surname></persName>
		</author>
		<ptr target="http://oceanis.mm.di.uoa.gr/pened/?category=pub#ontos" />
		<title level="m">Spreading activation user profile ontology</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Neural networks and physical systems with emergent collective computational properties</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hopfield</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proceedings of the National Academy of Sciences</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="page" from="2554" to="2588" />
			<date type="published" when="1982">1982</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Retrieving documents by constrained spreading activation on automatically constructed hypertexts</title>
		<author>
			<persName><forename type="first">F</forename><surname>Crestani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of EU-FIT 97-Fifth International Congress on Intelligent Techniques and Soft Computing</title>
				<meeting>EU-FIT 97-Fifth International Congress on Intelligent Techniques and Soft Computing<address><addrLine>Aachen, Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1997">1997</date>
			<biblScope unit="page" from="1210" to="1214" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Application of spreading activation techniques in information retrieval</title>
		<author>
			<persName><forename type="first">F</forename><surname>Crestani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence Review</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="453" to="482" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Improving Ontology-based User Profiles</title>
		<author>
			<persName><forename type="first">J</forename><surname>Trajkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gauch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of RIAO 2004</title>
				<meeting>of RIAO 2004<address><addrLine>Vaucluse), France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004">April 26-28 (2004</date>
			<biblScope unit="page" from="380" to="389" />
		</imprint>
		<respStmt>
			<orgName>University of Avignon</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Ontology-Based User Profiles for Search and Browsing, User Modeling and User-Adapted Interaction: The Journal of Personalization Research</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gauch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chaffee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pretschner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Special Issue on User Modeling for Web and Hypermedia Information Retrieval</title>
				<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">V</forename><surname>Katifori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Poggi</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">OntoPIM: how to rely on a personal ontology for Personal Information Management</title>
		<author>
			<persName><forename type="first">M</forename><surname>Scannapieco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Catarci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ioannidis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 1st Workshop on The Semantic Desktop</title>
				<meeting>of the 1st Workshop on The Semantic Desktop</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The Gnowsis Semantic Desktop for Information Integration</title>
		<author>
			<persName><forename type="first">Leo</forename><surname>Sauermann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd Conference Professional Knowledge Management</title>
				<meeting>the 3rd Conference Professional Knowledge Management</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Activity Based Metadata for Semantic Desktop Search</title>
		<author>
			<persName><forename type="first">Paul -Alexandru</forename><surname>Chirita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rita</forename><surname>Gavriloai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Stefania</forename><surname>Ghita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wolfgang</forename><surname>Nejdl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Raluca</forename><surname>Paiu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd European Semantic Web Conference</title>
				<meeting>the 2nd European Semantic Web Conference</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Mining Ontologies from Text</title>
		<author>
			<persName><forename type="first">A</forename><surname>Maedche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Staab</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of EKAW 2000</title>
				<meeting>EKAW 2000</meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="189" to="202" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Semi-Automatic Ontology Extension Using Spreading Activation</title>
		<author>
			<persName><forename type="first">W</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Weichselbraun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Scharl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Chang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Universal Knowledge Management</title>
		<imprint>
			<biblScope unit="volume">0</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="50" to="58" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">Optimizing Web Search Using Web Click-through Data</title>
		<author>
			<persName><forename type="first">Gui-Rong</forename><surname>Xue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hua-Jun</forename><surname>Zeng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zheng</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wei-Ying</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wensi</forename><surname>Xi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Weiguo</forename><surname>Fan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yong</forename><surname>Yu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="118" to="126" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A Spreading Activation Framework for Ontology-enhanced Adaptive Information Access within Organisations</title>
		<author>
			<persName><forename type="first">Md</forename><surname>Hasan</surname></persName>
		</author>
		<author>
			<persName><surname>Maruf</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Spring Symposium on Agent Mediated Knowledge Management 2003</title>
				<meeting>the Spring Symposium on Agent Mediated Knowledge Management 2003<address><addrLine>California, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2003">2003. 2003</date>
		</imprint>
		<respStmt>
			<orgName>Stanford University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Task-Centered Information Management</title>
		<author>
			<persName><forename type="first">T</forename><surname>Catarci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dix</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Katifori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lepouras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Poggi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">DELOS Conference 2007 on Working Notes</title>
				<editor>
			<persName><forename type="first">)</forename></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Thanos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Borri</surname></persName>
		</editor>
		<meeting><address><addrLine>Tirrenia, Pisa (Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007-02-14">13-14 February 2007. 2007</date>
			<biblScope unit="page" from="253" to="263" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">OntoPIM: From Personal Information Management to Task Information Management</title>
		<author>
			<persName><forename type="first">G</forename><surname>Lepouras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dix</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Katifori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Catarci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Habegger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Poggi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ioannidis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Personal Information Management, SIGIR 2006 workshop</title>
				<meeting><address><addrLine>Seattle, Washington</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006-08-10">2006. August 10-11, (2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Intelligent user task oriented systems</title>
		<author>
			<persName><forename type="first">T</forename><surname>Catarci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Habegger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Poggi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dix</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ioannidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Katifori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lepouras</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the Second SIGIR Workshop on Personal Information Management (PIM</title>
				<meeting>of the Second SIGIR Workshop on Personal Information Management (PIM</meeting>
		<imprint>
			<date type="published" when="2006">2006. 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Katifori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dix</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Vassilakis</surname></persName>
		</author>
		<ptr target="http://oceanis.mm.di.uoa.gr/pened/?c=pub#plugins" />
		<title level="m">Spreading activation Protégé plugin</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">A Comparative Study of Four Ontology Visualization Techniques in Protégé: Experiment Setup and Preliminary Results</title>
		<author>
			<persName><forename type="first">A</forename><surname>Katifori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Torou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Halatsis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lepouras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Vassilakis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IV 06 Conference</title>
				<meeting>the IV 06 Conference</meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Vassilakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lepouras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Katifori</surname></persName>
		</author>
		<idno>TR-SSDBL-07-001</idno>
		<ptr target="http://wt-protege.uop.gr" />
		<title level="m">wt-Protégé -An Extension for Protégé Supporting Temporal and Weighted Data</title>
				<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
