<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>P. Bloem);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>mean when your URIs are redirected? Examining identity and redirection in the LOD cloud</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Idries Nasim</string-name>
          <email>m.i.nasim@student.vu.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Shuai Wang</string-name>
          <email>shuai.wang@vu.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joe Raad</string-name>
          <email>joe.raad@lisn.fr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Peter Bloem</string-name>
          <email>p.bloem@vu.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Frank van Harmelen</string-name>
          <email>frank.van.harmelen@vu.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, Vrije Universiteit Amsterdam</institution>
          ,
          <addr-line>Boelelaan 1111, Amsterdam</addr-line>
          ,
          <country country="NL">the Netherlands</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Interdisciplinary Laboratory of Numerical Sciences (LISN), University of Paris-Saclay</institution>
          ,
          <addr-line>Orsay</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Redirection of URIs is widely used in the LOD cloud, and is even part of the best practice guidelines as an approach to the “curation problem” on the semantic web (i.e. how to repair imperfections). When dereferencing, one URI is redirected to another URI. Such a redirection could be the result of an update of the namespace, a diferent encoding scheme, or some other reasons. In this paper, we study the semantics of redirection and examine if redirection indicates how entities in the LOD cloud evolve. More specifically, we focus on entities in the identity graphs: subgraphs in the semantic web restricted to identity links. The entities we study are from sameAs.cc, an identity graph extracted from a crawl of the semantic web in 2015. Our analytical results include an examination of edges and chains of redirection as well as a statistical analysis of the redirection behavior of sampled entities. Additionally, we present properties of the graphs formed by redirection relations.</p>
      </abstract>
      <kwd-group>
        <kwd>identity graphs</kwd>
        <kwd>knowledge graph evolution</kwd>
        <kwd>semantic web evolution</kwd>
        <kwd>identity crisis</kwd>
        <kwd>redirection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The semantic web is a decentralised world-wide information space for sharing machine-readable
data about entities and their relations. This information space contains a vast and rapidly
increasing quantity of scientific, corporate, government, and crowd-sourced data openly published
on the Web. Open Data plays a catalyst role in the way structured information is exploited on a
large scale. In this space, resources are identified by global identifiers called Uniform Resource
Identifiers (URI). A traditional view of digitally preserving these resources is by “pickling and
locking them away” for future use, like groceries, but this conflicts with their evolution. Instead,
when resources change or become outdated, a common (and even recommended) solution to
the “curation problem” (i.e. repairing data imperfections) is to redirect the user or agent to a
new location. We investigate how such redirections can indicate the evolution of entities in the
cloud of linked open data.</p>
      <p>LGOBE
∗Corresponding author.
https://shuai.ai/research (S. Wang); http://www.joe-raad.com/ (J. Raad); https://peterbloem.nl/ (P. Bloem);</p>
      <p>Semantic web resources can be divided into two main categories1: information resources
whose essential characteristics can be conveyed in a message (e.g. web pages, documents),
and non-information resources that are outside the information space of the Web (e.g.
Amsterdam, Tim Berners-Lee, the concept of color). When dereferencing an outdated URI of a
non-information resource such as the city of Amsterdam (e.g. https://dbpedia.org/resource/A
msterdam), it is best practice [1] to redirect the user or agent to the information resource about
this city (e.g. https://dbpedia.org/page/Amsterdam) using the HTTP response code 303 known
as ‘see other’.</p>
      <p>In practice, redirections through 3XX response codes are not limited to such cases, and are
as well used to prevent information loss when a URI can no longer be dereferenced. Precisely,
redirecting between two information resources (e.g. in case of a website’s update) or between
two non-information resources (e.g. for preserving backwards compatibility when an RDF
dataset is updated). As the semantic web develops, such redirection links capture the information
evolution between URIs. In fact, when dereferencing a URI there can be multiple intermediate
URIs involved in the redirection. For instance, Figure 1 illustrates diferent scenarios that occur
in practice when dereferencing URIs 2. It shows five entities of an RDF graph:  0,  3,  6,  8, and
 9 that are connected by any object property, represented in this figure with the black edges (in
this paper we will restrict to owl:sameAs identity links). Red edges represent HTTP redirection
links, showing for instance a redirection from  3 to  5 with an intermediate redirection to  4.
The links from  0 are an example of redirections that ultimately lead to an error (e.g. because of
an 4XX response code when dereferencing  2), illustrated as a cross-out node. Finally, this figure
shows another case where two resources ( 6 and  9) are redirected to the same URI ( 7), before
reaching  10, which faces a timeout error (denoted using a question mark) when attempting to
resolve the URI it redirects to.</p>
      <p>0
 3
 6
1See https://www.w3.org/2001/tag/doc/httpRange-14/2007-05-31/HttpRange-14 for more details about URIs,
dereferencing, redirection, (non-)information resources, and their relations.
2See Section 3.2 and Table 1 for our annotation of diferent scenarios.</p>
      <p>Although these redirection mechanisms are an integral part of the architecture of the web,
and are part of the best practice guidelines for linked data, the semantics of such redirection
is unclear. It is tempting to identify a redirection with an implicit statement of identity: the
source of the redirection is semantically equivalent to the target of the redirection, it is only the
location of the resource is diferent. In this paper we set out to clarify the semantic intent of
redirections as they are being used in practice.</p>
      <p>We investigate how redirection can indicate the evolution of entities in the cloud of linked
open data (i.e. the LOD cloud). More specifically, we focus on redirection of entities in subgraphs
that are restricted to identity links between entities (such as o w l : s a m e A s ). When considering the
URIs identical to entities in these subgraphs, there can be ambiguity and unwanted consequences
due to the semantics of identity links. We study the following two research questions.</p>
      <p>RQ1: Can we approximate the implicit semantics of redirection?</p>
      <p>For this question, we examine sampled edges and chains of redirection. We classify the
scenarios of redirection and estimate the proportion of redirection that can be interpreted as
identity links.</p>
      <p>RQ2: What are the properties and structure of the redirection graphs?
To answer this question, we study the redirection graphs by performing a statistical analysis
and examining their graph-theoretical properties, followed by a discussion about its impact on
the LOD cloud.</p>
      <p>Our main contributions are as follows:3
1. four redirection graphs corresponding to diferent sampling methods using the s a m e a s . c c
identity graph;
2. 4,000 semi-automatically annotated edges (as pairs of URIs) in the uniformly sampled
redirection graph;
3. a qualitative study of the semantics of redirection in the identity graphs;
4. a quantitative study of properties of the redirection graphs.</p>
      <p>The paper is organised as follows. In Section 2, we present related work on redirection and
identity graphs. Section 3 introduces the new redirection graphs, based on which we sample
data for analysis. Section 4 studies the semantics of redirection. The analysis of the redirection
graphs is discussed in Section 5 followed by conclusions and future work in Section 6.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>As a domain with a strong focus on unambiguous identifiers and meaning, semantic web
research has been sufering from an ill-defined sense of identity [ 2]. This crisis becomes even
worse when taking into account the impact of the evolution of datasets on the identity links.
The identity crisis was already studied by Halpin, et al. [3] in 2009. They propose to study how
an HTTP resource responds to a GET request, including how they redirect to new URIs (both
the hash convention and the HTTP 303 redirection). However, this work did not retrieve or
3The source code can be found at https://github.com/shuaiwangvu/redirection. The datasets were published online
at https://doi.org/10.5281/zenodo.7225383 with DOI 10.5281/zenodo.7225383.
study any data from the web, nor performed any quantitative assessment on the reliability of
interpreting redirection as identity relations.</p>
      <p>The evolution of datasets can result in missing URIs. De Melo presented an initial analysis
in 2013 and revealed that, for the BTC2011 sameAs triples, 205,231 out of 1,055,626 unique
DBpedia URIs did not exist in the DBpedia 3.7 dataset [4]. This analysis shows that around
19.4% of entities no longer existed after only two years since their first publication. The paper
also investigated the reasons for this. For example, URIs with incorrectly escaped titles, i.e.
using a diferent encoding scheme than DBpedia itself, resulted in URIs that do not exist in
DBpedia. Secondly, since Wikipedia is a living resource, articles may be deleted, merged, or
renamed. Thus, many URIs no longer exist in DBpedia.</p>
      <p>Regino et al. [5] studied semantically broken links. These are newly added links between
the new URIs of the subjects or objects that may have evolved. When the evolved URIs refer
to diferent real-world entities, the change of semantics would result in errors (thus the name
“semantically broken links”). For example, a link between  3 and  4 in Figure 1 could be such an
example if  5 refers to a diferent real-world entity. They studied the links between Wikidata
and GeoNames and two versions of DBpedia. While their analysis found some semantically
broken links, their approach cannot be scaled to the web since they only studied English entities
and rely on WordNet and BabelNet as background knowledge for the determination of similarity
by analyzing on their labels. Moreover, tracking every version of entities in each dataset is not
practically feasible.</p>
      <p>To the best of our knowledge, the latest web scale examination of the identity graphs dates
back to the 2015 crawl of the web4. It consists of 558.9M o w l : s a m e A s links between about 179.7M
entities [6]. However, this graph is now outdated, and as far as the authors are aware, there is
no quality assessment of its entities, in comparison to the presence of multiple assessment of its
links. In contrast, the current paper aims at addressing the importance of dynamics in identity
graphs.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Data Preparation</title>
      <p>In this paper, we extract our entities from the s a m e a s . c c dataset [6]. This identity graph
represents a subgraph restricted to owl:sameAs links of the 2015 LOD Laundromat dataset [7]
that covers more than 650K datasets. We refer to this identity graph as  . Section 3.1 provides
details of sampling. Based on the sampled entities, we construct the redirection graphs in
Section 3.2. Finally, in Section 3.3 we sample 4,000 edges and 100 chains of redirection in the
redirection graph based on uniformly sampled entities. These datasets will be analyzed in
Section 4 and 5 to answer our research questions.</p>
      <sec id="sec-3-1">
        <title>3.1. Sampling from identity graphs</title>
        <p>
          For this study, four samples were created. The first sample   is created by randomly choosing
100K entities from  . The remaining three samples contains 20K entities each, with the goal of
studying the presence of a correlation between the size of the connected components of  (CC)
4The resulting identity graph and its related research results are hosted at https://sameas.cc.
and the semantics of redirection. In  , the set of entities in a CC refer to an equivalence class
(i.e. set of entities that refer to the same real-world entity). These entities were sampled equally
from CCs containing only 2 entities, ones containing 3 to 10 entities, and CCs with more than
10 entities. We refer to these samples as   (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) ,   (
          <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6 ref7">3−10</xref>
          ) and   (&gt;10) , respectively.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Constructing the redirection graphs</title>
        <p>
          We analyse the URI of the sampled entities by sending an HTTP GET request. If the response
status code is HTTP 200, we label it as OK. If it is a 400+ HTTP error indicating a client error,
we label it as ‘Not Found’ (NF). Otherwise, if the entity is a literal or the request fails, we label
it with ‘Error’ (ER). We use the label ‘Timeout’ (TO) if the request times out. In practice, some
URI takes longer to connect or read. Hence, we increase the timeout threshold in three steps.
We first set the connection timeout to 0.01 second and read timeout parameters to 0.05 second.
We collect all URIs with a timeout for processing in the next step and add labels to the rest.
We then use the parameters 0.5 and 2.5 seconds and again collect those that faced a timeout.
Finally, our last attempt uses 5 and 25 seconds as parameters. As for cases with redirection we
used the history in the response to check if redirection happens. Thus, we include also HTTP
300 (redirection with multiple choice), 301 (moved permanently), 307 (temporal redirect), 308
(permanent redirect), etc. We label the remaining as ‘Redirect Until Timeout’ (RUT). Similar
as above, we label URIs that redirect as either ‘Redirect Until Not Found’ (RUNF), ‘Redirect
Until Error’ (RUE), or ‘Redirect Until Found’ (RUF). We create an edge in the redirection graph
for each redirection. Similarly to the uniform sampling, we name this graph   for  , and
similarly we name the three redirection graphs   (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) ,   (
          <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6 ref7">3−10</xref>
          ) , and   (&gt;10) corresponding
to the sampled entities   (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) ,   (
          <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6 ref7">3−10</xref>
          ) , and   (&gt;10) , respectively.
        </p>
        <p>All the scripts were written in Python5. We performed all the HTTP GET requests on a cluster
on August 23, 2022. The cluster has 32 CPUs of Intel Xeon E5-2630 v3 (2.40GHz) with 256GB of
memory running Ubuntu 18.04.6. Its downloading speed is 871.56 MB/s. The construction of
the redirection graphs took 33.5 hours in total.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Sampling edges and chains for manual analysis</title>
        <p>To understand what these redirections are about, we sampled 4,000 edges from   . These edges
are stored in a file as pairs of URIs. Moreover, we track the redirection behavior of 100 entities
whose number of hops of redirection is greater than two. These chains will then be manually
analyzed in the next section.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Implicit Semantics of Redirection</title>
      <p>Next, we estimate the implicit semantics of each of these redirections (RQ1). In this section, we
perform a qualitative analysis of redirection in the identity graphs. More specifically, Section
4.1 studies pairs of redirection and Section 4.2 provides details of our manual assessment of
chains of redirection.
5All the code and scripts are open source in the repository at https://github.com/shuaiwangvu/redirection.</p>
      <sec id="sec-4-1">
        <title>4.1. Analysing pairs of redirection</title>
        <p>In this section, we study the nature of redirection links. For this, we sample 4,000 redirection
links from   for semi-automatic analysis. Figure 2 illustrates the proportion of diferent cases.
We found that 39.1% of URIs in   redirect to their https equivalent. A further 4.7% of URIs only
difer from their redirect by encoding, while another 1.3% in   redirects to URIs only difer
in upper/lower case. Together, this amounts to 45.1% of redirects that are mainly concerned
with engineering technicalities. A second very common case are the updates of namespaces
in the same domain (33.0%). For example, https://www.worldcat.org/oclc/67950327 redirects
to https://www.worldcat.org/title/pro-patria/oclc/67950327. We surmise that these are the
result of dataset evolution. A specific case of intra-namespace redirections are the 12.1% that
redirects from a DBpedia resource to a DBpedia page (but not the inverse). For example, https:
//dbpedia.org/resource/Rimula_californiana to http://dbpedia.org/page/Rimula_californiana.
These are redirects from a representation to a description6. In addition, we found some cases
where some sufixes are added to the original URIs (12.7%), including ‘.json’ (4.0%) and ‘.rdf’
(0.1%). Another 0.6% is about automatic truncation of fragment of hash URIs (i.e. the hash
convention). Finally, various other cases make up the remaining 8.6%, with new URIs updated
with ids and names, embedded queries, mistaken encoding, or other complex cases.</p>
        <p>Our analysis shows that the HTTPS protocol has been widely adopted over the past years. It
is likely that the semantics are preserved if they only difer by the choice of protocol. Similarly, if
two URIs only difer by encoding or upper/lower case in their names, they are also likely to refer
to the same real-life entities. This sums up to 45.1% (colored red, indicating identity preserving).
As for redirection from non-information resources to information resources, only less than 1%
concerns hash convention. We also observed at least 4.1% redirects to its corresponding files
(with sufix of .json or .rdf) or from DBpedia resources to the corresponding pages (12.1%). This
6In the sense of https://www.w3.org/TR/cooluris.
sums up to 16.8% (colored cyan, indicating non-identity preserving). Given all the results, our
best approximation is that between 45.1% and 83.2% (100%-16.8%) of redirection links can indeed
be taken as identity links.</p>
        <p>This primitive analysis shows that the semantics of redirection is rich in practice and requires
further investigation with more detailed semi-automatic analysis. Given our analysis that a
sizeable share of redirects (up to over half of them) cannot be reliably assumed to signify an
identity link, we conclude that redirection should not be used to update outdated mappings
without further refinement or manual assessment.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Analysing chains of redirection</title>
        <p>Next, we perform an analysis of chains of redirection in   . On average, redirection chains
have 1.7 hops. More precisely, entities redirected before timeout (RUT) take on average 1.7
hops to reach. Those redirected until not found (RUNF) take 1.6 hops. Those redirected until
found (RUF) take 1.8 hops on average. Finally, there are only few redirected until error (RUE)
with an average of 1.5 hops. Given the little diference we observed between each category, we
uniformly sample 100 chains of redirection across these categories.</p>
        <p>We extract 100 chains of redirection with at least 2 hops. Our manual examination shows
that the individual redirections in these chains are rarely restricted to a specific type (from
Section 4.1) but rather mix multiple types. This makes it very dificult to classify these chains.
We also observe that these redirections mostly happen within a domain (85%). Among these
chains, redirects within the domain wikidata.org is most common (28%). Redirection between
DBpedia’s resources, pages, and their various encodings are also very common (26%). Moreover,
these chains are among the longest in our sample with an average number of hops of 3.2. Other
domains that occur frequently in these chains are b i b s o n o m y . o r g (5%) and v i a f . o r g (1%).
1 The valid entities include RUF (redirected until found), OK (found with HTTP 200)
2 The rest are invalid entities, including ER (error), TO (timeout), RUT (redirected until timeout),
RUNF (redirected until not found), RUE (redirected until error), and NF (not found).</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Analyzing the Redirection Graphs</title>
      <p>Table 1 shows an analysis of the behavior of HTTP GET request when applying our redirection
typology to  (see Section 3.2 for the name of each column). When sampled uniformly, only
33.7% of the URIs are valid entities: information of the URI can be found (HTTP 200) with
or without redirection (i.e. the sum of the ‘OK’ and ‘RUF’ column).7 Surprisingly, this result
implies that only around 1% of the URIs return meaningful information directly. A comparison
of the column ‘OK’ with ‘RUF’ shows that redirection is a well adapted means to provide
updated information for outdated URIs. In contrast, a disappointing 66.3% of entities are invalid:
URIs that led to an error, could not be found, or resulted in a timeout (even after a few hops
of redirection). When examining sampling w.r.t. connected components (CCs) of diferent
sizes, we observe that the proportion of valid URIs decreases as the size of the CC increases.
Correspondingly, the opposite trend shows for columns labelled ‘NF’ (not found), ‘TO’ (time
out), ‘RUNF’ (redirect until not found), or ‘RUE’ (error). This would suggest that large connected
components are a signature of poorly maintained subsets of URIs. This could be associated
to the greater proportion of invalid entities as the size of CC increases. This might provide a
useful heuristic for LOD maintenance.</p>
      <p>
        Table 2 presents an analysis on how entities in   ,   (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) ,   (
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6 ref7">3−10</xref>
        ) , and   (&gt;10) are
redirected. Over half of the entities are involved in redirection when sampled uniformly. The
average hops of redirect is around 1.71. We observed that   (
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6 ref7">3−10</xref>
        ) has a cycle of two entities
redirecting to each other. The longest paths can be as many as 8 hops. Our manual examination
shows that they are all about redirections between URIs involving DBpedia resources and pages.
      </p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>In this paper, we investigated diferent scenarios when URIs are redirected. We studied the
semantics by examining edges and chains of redirection. The intuition behind redirects in
the LOD cloud is that they preserve identity. Our analysis in section 4.1 shows that this is
indeed the case for a large proportion of redirects sampled from the sameas.cc dataset, with 45%
being almost certainly identity preserving, possibly up to 83%. In short, the answer to our first
research question is that identity is indeed a plausible estimate of the semantics of redirects.
However, given that for somewhere between 17-55% of redirects it is unclear whether they are
identity preserving, we suggest that redirection should not be used to update outdated dataset
mappings without further refinement or manual assessment.</p>
      <p>In answer our second research question, concerning the properties and structure of the
redirection graphs, we found that without any redirects, only 1% of all sampled URIs return
meaningful information directly, rising to 33% after redirection. This means that a disappointing
66% of all URI’s end in error, failure or timeout at the end of their redirection chain. Furthermore,
such failure cases are more frequent in larger connected components, suggesting that such
7As with the sameas.cc graph, we discovered a small number of literals. They were included as exceptions in the
‘ER’ column.
large connected identity components are indicative of poor maintenance, which may serve as a
useful heuristic for LOD repair.</p>
      <p>Section 4.1 presented an analysis of sampled redirection links. In future work, we would
like to compare this distribution against existing identity links and study how similar they are.
This could provide further evidence how we can take certain redirection links as identity links.
Moreover, the identity graph we used is now considerably outdated. We could create a new
updated identity graph and study redirects of sampled entities.</p>
      <p>This paper restricted the analysis to entities in the identity graph. In future work, we would
like to remove this restriction and compare against the redirection of URIs in the LOD cloud.
Finally, it could be interesting to examine how redirection can help update existing mappings.</p>
      <p>A possible use case could be to use a select a portion of redirection links for the refinement of
identity graphs. Our analysis in Section 4.1 shows that 45.1% are considered identity-preserving.
They could be used by refinement algorithms as additional information to improve the accuracy
[8].</p>
      <p>Finally, a reason that only around 1% of URIs still remain informative without redirection
is that most URIs are managed by centralized registries, identity providers, and certificate
authorities. Alternatively, Decentralized Identifiers (DIDs) [ 9] enable verifiable, decentralized
digital identity. This could potentially be one of the means to resolve the issue of redirect for
outdated URIs.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>This project is a part of the MaestroGraph project, which is supported by the NWO TOP grant.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Hyland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Atemezing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Villazón-Terrazas</surname>
          </string-name>
          ,
          <article-title>Best Practices for Publishing Linked Data</article-title>
          ,
          <source>Technical Report</source>
          , W3C Working Group,
          <year>2014</year>
          . Online; accessed
          <issue>19</issue>
          <year>October 2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Verborgh</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Vander Sande, The Semantic Web identity crisis: in search of the trivialities that never were</article-title>
          ,
          <source>Semantic Web Journal</source>
          <volume>11</volume>
          (
          <year>2020</year>
          )
          <fpage>19</fpage>
          -
          <lpage>27</lpage>
          . URL: https://ruben.verborgh.
          <article-title>org/a rticles/the-semantic-web-identity-crisis/</article-title>
          .
          <source>doi:1 0 . 3 2 3 3 / S W - 1</source>
          <volume>9 0 3 7 2 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>H.</given-names>
            <surname>Halpin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Presutti</surname>
          </string-name>
          ,
          <article-title>An ontology of resources: Solving the identity crisis</article-title>
          ,
          <source>in: ESWC</source>
          <year>2009</year>
          , volume
          <volume>5554</volume>
          ,
          <year>2009</year>
          , pp.
          <fpage>521</fpage>
          -
          <lpage>534</lpage>
          .
          <source>doi:1 0 . 1 0</source>
          <volume>0 7 / 9 7 8 - 3 - 6 4 2 - 0 2 1 2 1 - 3</volume>
          \ _ 3
          <fpage>9</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>G. de Melo</surname>
          </string-name>
          ,
          <article-title>Not quite the same: Identity constraints for the web of linked data</article-title>
          ,
          <source>in: AAAI</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Regino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. C.</given-names>
            dos
            <surname>Reis</surname>
          </string-name>
          ,
          <article-title>Discovering semantically broken links in LOD datasets</article-title>
          ,
          <source>in: Proceedings of the 6th Workshop on Managing the Evolution and Preservation of the Data Web (MEPDaW)</source>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>W.</given-names>
            <surname>Beek</surname>
          </string-name>
          , et al.,
          <article-title>sameas. cc: The closure of 500m owl: sameas statements</article-title>
          ,
          <source>in: European semantic web conference ESWC</source>
          , Springer,
          <year>2018</year>
          , pp.
          <fpage>65</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Beek</surname>
          </string-name>
          , et al.,
          <article-title>LOD laundromat: a uniform way of publishing other people's dirty data</article-title>
          ,
          <source>in: ISWC</source>
          , Springer,
          <year>2014</year>
          , pp.
          <fpage>213</fpage>
          -
          <lpage>228</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>