<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Linked Open Piracy</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Willem</forename><forename type="middle">R</forename><surname>Van Hage</surname></persName>
							<email>fw.r.van.hage@vu.nl</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">VU University Amsterdam</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">V</forename><surname>Eronique Malais</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Elsevier Content Enrichment Center (CEC)</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marieke</forename><surname>Van Erp</surname></persName>
							<email>marieke.van.erpg@vu.nl</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">VU University Amsterdam</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Linked Open Piracy</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">D47744D1A267D0FACECFCADA6431814B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T08:54+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>There is an abundance of semi-structured reports on events being written and made available on the World Wide Web on a daily basis. These reports are primarily meant for human use. In this paper we present a new linked data set and a method for automatically adding such RDF metadata to semi-structured reports to speed up the creation of geographical mashups and visual analytics applications. We showcase our method on piracy attack reports issued by the International Chamber of Commerce (ICC-CCS). We show how the semantic representation makes it possible to easily analyze and visualize the aggregated reports to answer domain questions. Our pipeline includes conversion of the reports to RDF, linking their parts to external resources from the Linked Open Data cloud and exposing them to the Web.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>In this paper we present a new data set on the Web of Data, Linked Open Piracy (LOP), how it was constructed, and how it can be used to answer complex questions about piracy. We expose descriptions of piracy attacks at sea published on the Web by the International Chamber of Commerce's International Maritime Bureau (ICC-CCS IMB) <ref type="foot" target="#foot_0">3</ref> and the US National Geospatial-Intelligence Agency (NGA) <ref type="foot" target="#foot_1">4</ref> as Linked Data RDF <ref type="foot" target="#foot_2">5</ref> .</p><p>LOP can be seen as an Open Government Data <ref type="foot" target="#foot_3">6</ref> initiative for intergovernmental data. The goal of Open Government Data is to reduce the time to do analytics and mashups with open government data. The piracy reports are, like most open government data, published in a human readable format <ref type="foot" target="#foot_4">7</ref> . We show how we can reduce the commonly acknowledged bottleneck of data preprocessing time in the workow from question to answer. This format and type of publication (following a given pattern for a year of publication, daily update of the webpage) makes it an ideal test case for automatic RDF event extraction; the topic of the reports is also of contemporary socio-economic concern and are related to research questions that go beyond what classic data mining can easily answer. We therefore chose to take this example as a showcase for the feasibility and usability of event extraction coupled with novel research question answering methods.</p><p>We represent LOP data in RDF with the Simple Event Model (SEM) <ref type="bibr" target="#b6">[7]</ref> and demonstrate that an event model is not only an intuitive way of representing (inter)governmental data, but also a powerful tool for data integration. We evaluate the usefulness of SEM as a model for Open Government Data by answering complex domain questions derived from authorities in the domain of piracy analysis, namely UNITAR UNOSAT and the ICC-CCS IMB. We use SWI-Prolog<ref type="foot" target="#foot_5">8</ref> to extract event descriptions from the web, represent them in SEM and store them in a ClioPatria RDF repository <ref type="bibr" target="#b9">[10]</ref> extended with the SWI-Prolog space package <ref type="bibr" target="#b7">[8]</ref> for spatial and temporal indexing. The entire ICC-CCS data set is hosted as Linked Data, all URIs in the data set are resolvable. A SPARQL endpoint is available at http://semanticweb.cs.vu.nl/lop/sparql/.</p><p>This paper is organized as follows. In Section 2, we show how we created RDF event descriptions from web pages. In Section 3, we discuss the modeling of the events in SEM. In Section 4, we show example domain questions from UNOSAT that can easily be answered using our event representation. In Section 5, we discuss related work and in Section 6, we conclude with a discussion and future plans.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Screen Scraping</head><p>We start crawling of the ICC-CCS IMB webpage with the links to the yearly archives in the menu of the Live Piracy Map page. Figure <ref type="figure" target="#fig_0">1</ref>  <ref type="bibr">(top)</ref> shows what an ICC-CCS piracy report looks like. The reports are semi-structured, and concern seven predened types of events: Hijacked, Boarded, Robbed, Attempted, Fired Upon, Suspicious (vessel spotted) and Kidnapped. The reports contains a eld for the vessel type of the ship broadcasting the report; although the types of the vessels are often recurring, this eld is lled manually, which gives rise to spelling variations (e.g., redupon vs red upon) and a lack of certainty in terms of coverage; a new ship type could be lled in any day. The description of the event itself is done in full text, without a specic formatting except that it is preceded, in the same eld, by the geographic and temporal coordinates of the event. The geographic and temporal coordinates are repeated in an independent eld each.</p><p>For each of these pages we follow all the links in the descriptions of the placemarks on the overview map, returning us one semi-structured description pages for each event. We fetch the various elds from these pages using XPath queries and Prolog rules for value conversion and xing irregularities. In this way we fetch: (1) The IMB's attack number, which consists of the year and a counter. From this we generate an event identier by prepending a namespace and by appending a sux whenever there are duplicate attack numbers in a year;</p><p>(2) The date of the attack, which we convert to ISO 8601 format; (3) The vessel type, which we map to URIs with rules that normalize a few spelling variations of the types. (4) The location detail, which we use as a label for the place of the event; <ref type="bibr" target="#b4">(5)</ref> The attack type, which we map to URIs in the same way as the vessel type; <ref type="bibr" target="#b5">(6)</ref> The incident details, which we convert to a comment describing the event itself. The rst line is split into a time and place indication. These are used as backup sources to derive the date and location, should the parsing of elds 2, 4 and 7 fail; <ref type="bibr" target="#b6">(7)</ref> The longitude and latitude of the placemark on the map insert. These are used as coordinates of a generated anonymous place (i.e., without a URI) for the event. The time fetched from the date (3) or narrative <ref type="bibr" target="#b5">(6)</ref> eld has a number of dierent representations in the source pages. Some time indications are in local time, while others are in UTC. Often there is no indication of the time zone. For many events the indicated time is 00:00 (midnight) to denote the time of attack is unknown. These inconsistencies in the time notation, in combination with the fact that there are few events on the same day, led us to the decision to use the date without a time indication whenever there is ambiguity about the time.</p><p>To demonstrate that representing extracted events in SEM aids the integration of data sources, we take another set of piracy reports and integrate these with the IMB reports. For this, we use the Worldwide Threat to Shipping re-ports by the US National Geospatial-Intelligence Agency describing 36 piracy events between 26 March 2010 and 16 April 2010. 31 of these events overlap with the IMB reports. The remaining 5 come from other sources: Reuters (2) <ref type="foot" target="#foot_6">9</ref> , UKMTO <ref type="foot" target="#foot_7">10</ref> , MSCHOA <ref type="foot" target="#foot_8">11</ref> , and ReCAAP<ref type="foot" target="#foot_9">12</ref> . These reports are (re)posted on many websites, some of which are plain-text representations of the reports, while others add some additional layout tags to separate the place, time, and state of the ship during the attack from the narrative. Two example NGA reports are shown in Figure <ref type="figure" target="#fig_0">1 (bottom)</ref>.</p><p>By changing the XPath and grammar rules to suit the dierent structure of the NGA reports we were able to recognize the same 7 attributes we got from the IMB website. The event terminology is nearly the same as on the IMB website, except there is a distinction between boardings and robberies. There is also some extra information in 34 of the 36 reports about the state of the ship during the attack, (e.g., moored or underway). For some of the events there are no explicit coordinates of the location of the event, but there is a textual description, for example, \approximately 150NM northwest of Port Victoria, Seychelles". For these events we look up the coordinates of Port Victoria using GeoNames<ref type="foot" target="#foot_10">13</ref> , which returns RDF. From this location we use trigonometry along the geoid with the haversine formula in the specied direction. For example, in the case of 150NM northwest we compute the coordinates 150 minutes of angle at a bearing of 315 degrees. We treated time in the NGA reports in the same way as in the IMB reports, reducing them to an ISO 8061 date.</p><p>We match the NGA reports to the IMB reports by picking the nearest event that occurred on the same day that has compatible actor types, i.e., when the types are not the same, one has to be sem:subTypeOf the other. This enables us to automatically map 30 of the 31 overlapping reports correctly. We store these matches with an owl:sameAs property between the two matching events. We believe the single unmatched report was mistakingly identied as a distinct IMB report, because it is extremely similar to another report (the same date, place, time, victim vessel type, and similar narrative) which has a matching IMB report. Therefore, we believe there should only have been 30 overlapping reports, which we were all able to match.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Event Representation in SEM</head><p>We use the set of 7 elements (see Section 2) extracted per report to generate a semantic event description using SEM. We generate a URI for the event described in each report and a URI for the victim ship, which we represent as a sem:Actor, based on the IMB attack number (nr. 1). The date (nr. 2) is attached to the Based on the distribution of the piracy events, we grouped particular sections of the world together. This grouping is only specic to the piracy event domain.</p><p>The attack type (nr. 5) is modeled analogously to the vessel type as a sem:EventType, which is attached to the event using the sem:eventType property. The event type robbery that we found in the NGA set was modeled as a sem:subTypeOf the IMB event type boarding. The mooring and underway vessel states are modeled as additional event types of the piracy event using sem:eventType properties attached to the event. All event types used in this data set are sem:subTypeOf the piracy event type, poseidon:etype piracy. The narrative of the report (nr. 6) is attached to the event as a rdfs:comment. The WGS84 coordinates (nr. 7) are assigned to the blank node with the W3C WGS84 vocabulary. Additional ship names are attached to the sem:Actor using the ais:name property, a domain-specic label for ship names.</p><p>We create local URIs to represent the types of the extracted events and the types of their participants (e.g., poseidon:etype hijacked or poseidon:atype yacht). The SEM piracy events are aligned with WordNet 2.0<ref type="foot" target="#foot_11">15</ref> , 3.0<ref type="foot" target="#foot_12">16</ref> , OpenCyc<ref type="foot" target="#foot_13">17</ref> and Freebase<ref type="foot" target="#foot_14">18</ref> . WordNet gives us the advantage of relating dierent lexical variations to a unique URI e.g., mapping highjacking and hijacking to hijacking. This can also be used to automatically transform piracy descriptions to types. As WordNet has a hierarchy of hyponym relations between synsets (e.g., a tankership is a hyponym of cargoship) we can do hyponym inference.</p><p>We can not map all of our types to any one of these three vocabularies, but by mapping to all three of them we get a good coverage of our domain-specic type vocabulary. Our data set contains 73 ActorTypes and 26 EventTypes, which is too few to make it worthwhile to use an automatic mapping method, so we manually created the following mappings: 70 skos:closeMatch (24 to Freebase, 24 to OpenCyc, 25 to WordNet);10 skos:broadMatch (5 to OpenCyc, 4 to WordNet, 1 to Freebase); 33 skos:relatedMatch (13 to OpenCyc, 11 to WordNet, 9 to Freebase). A \related" relation hold for example between WordNet's to re and the event type red upon, because to re only conveys part of the meaning.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Answering Domain Questions</head><p>In this section, we show how the SEM representation simplies answering domain questions through visualizations and analyses. We rst show how the enriched data could be used to recreate UNOSAT questions. Then we show the added value of the mappings and hierarchies in an additional set of domain questions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4.1</head><p>Rebuilding UNOSAT Reports</p><p>The analysis performed and compiled for the UNOSAT reports <ref type="bibr" target="#b4">[5]</ref> have mostly been carried out manually and sometimes with the aid of a GIS. The analyses are thorough and insightful, but do require painstaking manual sifting through the data because only the unprocessed attack reports are used. Human researchers then plot these data on maps, and assign attack types to them. With the RDF version and the mappings to the VLIZ economic zones and geospatial reasoning the analyses that require a combination of data sources can be sped up immensely. SPARQL and Prolog rules make many complex questions as simple as a graph query. The conclusion of map 1 in the UNOSAT 2009 Q1 report, namely that the attacks have shifted southward and extended further east-west along the axis of the International Recommended Transit Corridor (IRTC)<ref type="foot" target="#foot_15">19</ref> can be reproduced by combining plotting the attacks on a map along with information about the IRTC. This is illustrated in Figure <ref type="figure" target="#fig_2">3</ref>, a time animation in KML is available online <ref type="foot" target="#foot_16">20</ref> . Although more coastguard and marine vessels are present in the recommended corridor, pirates also know that there are more ships there, hence more chances of nding a victim.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Additional Questions</head><p>We start with an easy visualization of number of attacks per region per year (top left Figure <ref type="figure">4</ref>). We can see that the most active regions are the Gulf of Aden, Indonesia, India and East Africa. The graph also shows that Indonesia used to be the most active region, but sometime in 2007 activity in the Gulf of Aden and East Africa have become the regions with most piracy activity.</p><p>Although the narrative section of each report are not split up and represented in RDF yet, we can give some ideas on dierences in weapon use by comparing the number of occurrences of the terms \guns" and \knives" in the dierent reports. For instance, there are no reports that mention knives in the Gulf of Aden region at all, while there are 109 in the Indonesia region while there are 85 that mention guns in the Gulf of Aden and only 25 in Indonesia. The pie charts in Figure <ref type="figure">4</ref> show an overview of ve weapons types. In order to properly analyse these we will use more sophisticated NLP techniques in future work.</p><p>If we further look into the four most active areas, we can use the ship type mapping to compare dierences in ships attacked in dierent regions. The stacked bar chart in Figure <ref type="figure">4</ref> immediately highlights the dierence between Indonesia and the other areas, namely that in the Indonesia region far more tugs  are attacked than in the other regions. In the Gulf of Aden, for a larger number of attacks the ship type of the victim is not known. Interestingly, the attacks on bulk carriers has been declining in the Asian regions until 2009, whereas it was on the rise in the African regions. In order to explain this, extra information is needed, for example on the number of ship movements in these areas.</p><p>Unfortunately, such data is not openly available.</p><p>We can also split out the attacks by types of attack to see whether pirates take a dierent approach in dierent regions. Plotting these statistics in a graph, split out per region, has the advantage that one can quickly see the dierences, whereas plotting these on a map still requires interpretation from the user. Here, the region clustering shows its merit. In the last series of charts in Figure <ref type="figure">4</ref>, one can see that signicant dierences exist between the regions in the types of attacks. In Asia, for example, far more often ships are boarded (which often also means robbed) than in the African regions. In the Gulf of Aden attacks have become more aggressive and more often victim ships are red upon. In the Gulf of Aden, also more attempted hijackings occur than elsewhere.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Related Work</head><p>This work essentially describes an Open Government Data project, like data.gov <ref type="bibr" target="#b1">[2]</ref> and data.gov.uk <ref type="bibr" target="#b2">[3]</ref>, with the exception that data are intergovernmental. The case we present deals with scraping event description from web pages. In the past we have done similar work with dierent types of data sources, such as user ratings of museum pieces <ref type="bibr" target="#b8">[9]</ref>, historical events <ref type="bibr" target="#b5">[6]</ref>, and Automatic Identication System NMEA ship data for the recognition of ship behavior from trajectories and background knowledge from the Web <ref type="bibr" target="#b10">[11]</ref>. This is accomplished with the SWI-Prolog space package <ref type="bibr" target="#b7">[8]</ref>, which is similar to Franz Inc.'s Common Lispbased AllegroGraph system<ref type="foot" target="#foot_17">21</ref> . We use SEM to describe our events, because it is a simple but not spartan model. A very similar model is LODE, which has been used for the extraction of events from Wikipedia timelines <ref type="bibr" target="#b3">[4]</ref>. Both SEM and LODE focus on the \Who does what, where and when?", but LODE does not contain a typing system, whereas SEM does. An example of a much richer event model is part of the CIDOC-CRM. The purpose of CIDOC-CRM is the integration of meta data about (museum) artifacts. A description of an integration method that, like the work presented in this paper, also combines space, time and semantics, using CIDOC-CRM can be found in <ref type="bibr" target="#b0">[1]</ref>. The SEM specication<ref type="foot" target="#foot_18">22</ref> contains mappings to LODE and CIDOC-CRM.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusions and Future Work</head><p>We have shown that the ideas behind the Open Government Data initiative can also be applied to information sources from intergovernmental organizations without the need for changing their entire information workow. Automatic conversion of online open data can bring their data to the Web and help these organizations with their business by making it easier to answer questions about their data. In this case study, the representation we use is the Simple Event Model, which helps to integrate spatio-temporal reasoning with web semantics. SEM has an appropriate level of abstraction for the integration of piracy event data: it is more general than the dierences between the data sources taken into account in this paper, but still specic enough to answer domain-specic questions. This modularity of the exible event extraction set allows us to combine data sources with relatively little change in the code base. We have shown that dierent data sources provide dierent aspects of an event, and their combination allows for interesting and serendipitous data analysis. As future work, we aim at doing further natural language processing on each report's content description in plain text in order to extract more information: the types of weapons used during the attack, the number of pirate boats and pirates, the intervention of a coalition war ship or helicopter, the outcome of the attack which would help to answer even more domain questions. Also, we would like to investigate the possibility to interlink the Linked Open Piracy data set with news items on the World Wide Web. This would provide additional background information to the semantic event descriptions, but also a semantic description of the news articles on the Web.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Example of an IMB piracy report (top) and two NGA piracy reports (bottom)</figDesc><graphic coords="3,169.71,282.03,276.26,63.46" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>FurtherFig. 2 .</head><label>2</label><figDesc>Fig. 2. The complete RDF graph of a piracy report modeled in SEM including mappings to types in WordNet 3.0, a VLIZ exclusive economic zone, its corresponding GeoNames country, and its Piracy Region.</figDesc><graphic coords="5,143.71,154.78,75.84,65.78" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Attacks plotted in Google Earth.</figDesc><graphic coords="6,177.99,115.84,259.36,132.98" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Victim Types per Region Attack Types per Region Weapon Types Number of Attacks per Region</head><label></label><figDesc></figDesc><table><row><cell>Number.of.Attacks</cell><cell>40 60 80 100 120</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Gulf of Aden East Africa India Indonesia Caribbean East_Asia Europe Middle_East North_America</cell><cell>Gulf of Aden</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>South_America</cell><cell>rpgs</cell><cell>guns</cell><cell>automatic weapons</cell></row><row><cell></cell><cell>20</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>South_East_Asia</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>West_Africa</cell><cell>sticks</cell><cell>knives</cell></row><row><cell></cell><cell>Year</cell><cell>2005</cell><cell>2006</cell><cell>2007</cell><cell>2008</cell><cell>2009</cell><cell>2010</cell></row><row><cell cols="8">Fig. 4. Number of attacks reported per region per year, weapon types per region,</cell></row><row><cell cols="8">victim types per region and attack types per region.</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_0">http://www.icc-ccs.org/home/imb</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_1">NGA, http://www.nga.mil/portal/site/maritime/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_2">LOP, http://semanticweb.cs.vu.nl/lop</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_3">http://data-gov.tw.rpi.edu/wiki/Open_Government_Data</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_4">A notable exception is data.gov.uk where the data are exposed directly as machine friendly RDF.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_5">SWI-Prolog, http://www.swi-prolog.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="9" xml:id="foot_6">Reuters, http://www.reuters.com/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="10" xml:id="foot_7">UK Maritime Trade Operations,http://www.mschoa.org/Links/Pages/UKMTO.aspx</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="11" xml:id="foot_8">The Maritime Security Center { Horn of Africa, http://www.mschoa.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="12" xml:id="foot_9">The Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in Asia, http://www.recaap.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="13" xml:id="foot_10">GeoNames search, http://sws.geonames.org/search</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="15" xml:id="foot_11">WordNet 2.0, http://www.w3.org/2006/03/wn/wn20/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="16" xml:id="foot_12">WordNet 3.0, http://semanticweb.cs.vu.nl/lod/wn30/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="17" xml:id="foot_13">OpenCyc, http://sw.opencyc.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="18" xml:id="foot_14">Freebase, http://{www|rdf}.freebase.com/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="19" xml:id="foot_15">http://www.icc-ccs.org/news/163-coalition-warships-set-up-maritimesecurity-patrol-area-in-the-gulf-of-aden</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="20" xml:id="foot_16">  20  http://semanticweb.cs.vu.nl/poseidon/piracy_reports_2005-2010.kmz</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="21" xml:id="foot_17">http://www.franz.com/agraph/allegrograph/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="22" xml:id="foot_18">SEM, http://semanticweb.cs.vu.nl/2009/11/sem/</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Acknowledgements</head><p>This work has been carried out as a part of the Poseidon project and the Agora project. Work in the Poseidon project was done in cooperation with Thales Nederland, under the responsibilities of the Embedded Systems Institute (ESI). The Poseidon project is partially supported by the Dutch Ministry of Economic Affairs under the BSIK03021 program. The Agora project is funded by NWO in the CATCH programme, grant 640.004.801. We would like to thank Davide Ceolin, Juan Manuel Coleto, and Vincent Osinga for their signicant contributions. We thank the ICC-CCS IMB and the NGA for providing the open piracy reports.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Methodology for CIDOC CRM based data integration with spatial data</title>
		<author>
			<persName><forename type="first">G</forename><surname>Hiebel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Hanke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Hayek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">38th Annual Conference on Computer Applications and Quantitative Methods in Archaeology</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">The data-gov wiki: A semantic web portal for linked government data</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">D</forename><surname>Li Ding</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Mcguinness</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hendler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Magidson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">8th International Semantic Web Conference (ISWC 2009)</title>
				<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Put in your postcode, out comes the data: A case study</title>
		<author>
			<persName><forename type="first">T</forename><surname>Omitola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Koumenides</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Popov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Salvadores</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Szomszor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Berners-Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Gibbins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Hall</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Schraefel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Shadbolt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">7th Extended Semantic Web Conference</title>
				<meeting><address><addrLine>ESWC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010. 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Lode: Linking open descriptions of events</title>
		<author>
			<persName><forename type="first">R</forename><surname>Shaw</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Troncy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Hardman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">4th Annual Asian Semantic Web Conference (ASWC&apos;09)</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Analysis of somali pirate activity in</title>
		<author>
			<persName><surname>Unosat</surname></persName>
		</author>
		<ptr target="http://unosat-maps.web.cern.ch/unosat-maps/SO/Piracy/2009/UNOSAT_Somalia_Pirates_Analysis_Q1_2009_23April09_v1.pdf" />
		<imprint>
			<date type="published" when="2009-04">2009. April 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Automatic heritage metadata enrichment with historic events</title>
		<author>
			<persName><forename type="first">M</forename><surname>Van Erp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Oomen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Segers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Van Den Akker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Aroyo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Jacobs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Legêne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Van Der Meij</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Van Ossenbruggen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Schreiber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Museums and the Web</title>
				<imprint>
			<date type="published" when="2011">2011. 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Design and use of the Simple Event Model (SEM)</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">R</forename><surname>Van Hage</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Malais E</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Segers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Hollink</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Schreiber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Web Semantics</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="128" to="136" />
			<date type="published" when="2011-07">July 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">The space package: Tight integration between space and semantics</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">R</forename><surname>Van Hage</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wielemaker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Schreiber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Transactions in GIS</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Semantically-Enhanced Recommendations in Cultural Heritage</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
		<respStmt>
			<orgName>Technische Universiteit Eindhoven</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">SWI-Prolog and the web, volume Theory Theory and Practice of Logic Programming</title>
		<author>
			<persName><forename type="first">J</forename><surname>Wielemaker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Van Der Meij</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>Cambridge University Press</publisher>
			<biblScope unit="page" from="363" to="392" />
			<pubPlace>Cambridge</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">An integrated approach for visual analysis of a multi-source moving objects knowledge base</title>
		<author>
			<persName><forename type="first">N</forename><surname>Willems</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">R</forename><surname>Van Hage</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Vries</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Janssens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Malais E</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Geographical Information Science</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="1" to="16" />
			<date type="published" when="2010-09">Sept. 2010</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
