This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Parallel Identities for Managing Open Government Data
May-June 2012 (vol. 27 no. 3)
pp. 55-62
James P. McCusker, Rensselaer Polytechnic Institute
Timothy Lebo, Rensselaer Polytechnic Institute
Cynthia Chang, Rensselaer Polytechnic Institute
Deborah L. McGuiness, Resssselaer Polytechnic Institute
Paulo Pinheiro da Silva, University of Texas at El Paso
Data consumers must be able to trust the data's provenance. A descriptive model enables consumers to make informed choices about data sources.

1. D. Robinson et al., “Government Data and the Invisible Hand,” Yale J. Law and Technology, vol. 11, 2009, p. 160.
2. T. Lebo et al., “Producing and Using Linked Open Government Data in the TWC LOGD Portal,” Linking Government Data, D. Wood ed., Springer, 2011, pp. 51–72.
3. E.T. O'Neill, “FRBR: Functional Requirements for Bibliographic Records,” Library Resources & Technical Services, vol. 46, no. 4, 2002, pp. 150–159.
4. C. Sayers, and A. Karp, Computing the Digest of an RDF Graph, tech. report HPL-2003-235, Mobile and Media Systems Laboratory, HP Laboratories, 2004.
5. B. Wilson et al., “Hierarchical Catalog Records: Implementing a FRBR Catalog,” D-Lib Magazine, vol. 11, no. 10, 2005.
1. S. Hellmann et al., Report on Knowledge Extraction from Structured Sources, tech. report Deliverable 3.1.1, LOD2—Creating Knowledge Out of Interlinked Data, 2011.
2. T. Lebo et al., “Producing and Using Linked Open Government Data in the TWC LOGD Portal,” Linking Government Data, D. Wood ed., Springer, 2011, pp. 51–72.
3. L. Moreau et al., “The Open Provenance Model Core Specification (V1. 1),” Future Generation Computer Systems, vol. 27, no. 6, 2010, pp. 743–756.
4. D. McGuinness et al., “PML 2: A Modular Explanation Interlingua,” Proc. 2007 AAAI Workshop Explanation-Aware Computing (Exact 07), AAAI, 2007, pp. 49–55.
5. E.T. O'Neill, “FRBR: Functional Requirements for Bibliographic Records,” Library Resources & Technical Services, vol. 46, no. 4, 2002, pp. 150–159.
6. C. Sayers, and A. Karp, Computing the Digest of an RDF Graph, tech. report HPL-2003-235, Mobile and Media Systems Laboratory, HP Laboratories, 2004.
7. M. Altman, “A Fingerprint Method for Scientific Data Verification,” Advances in Computer and Information Sciences and Eng., Sobh, T., ed., Springer, 2008, pp. 311–316.
8. F. Lefèbvre, J. Czyz, and B. Macq, “A Robust Soft Hash Algorithm for Digital Image Signature,” Proc. Int'l Conf. Image Processing (ICIP 03), vol. 2, IEEE Press, 2003, pp. 495–498.

Index Terms:
cooperative game theory, core, Shapley value, complexity
Citation:
James P. McCusker, Timothy Lebo, Cynthia Chang, Deborah L. McGuiness, Paulo Pinheiro da Silva, "Parallel Identities for Managing Open Government Data," IEEE Intelligent Systems, vol. 27, no. 3, pp. 55-62, May-June 2012, doi:10.1109/MIS.2012.5
Usage of this product signifies your acceptance of the Terms of Use.