On 9/16/13 6:29 AM, aj...@virginia.edu wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'd suggest that perhaps the confusion arises because "This instance is (not) 'valid' 
according to that ontology." might be inferred from an instance and an ontology (under certain 
conditions), and that's the soul of what we're asking when we define constraints on the data. 
Perhaps OWL can be used to express conditions of validity, as long as we represent the quality 
"valid" for use in inferences.

Based on the results of the RDF Validation workshop [1], validation is being expressed today as SPARQL rules. If you express the rules in OWL then unfortunately you affect downstream re-use of your ontology, and that can create a mess for inferencing and can add a burden onto any reasoners, which are supposed to apply the OWL declarations.

One participant at the workshop demonstrated a system that used the OWL "constraints" as constraints, but only in a closed system. I think that the use of SPARQL is superior because it does not affect the semantics of the classes and properties, only the instance data, and that means that the same properties can be validated differently for different applications or under different contexts. As an example, one community may wish to say that their metadata can have one and only one dc:title, while others may allow more than one. You do not want to constrain dc:title throughout the Web, only your own use of it. (Tom Baker and I presented a solution to this on the second day as Application Profiles [2], as defined by the DC community).

kc
[1] https://www.w3.org/2012/12/rdf-val/agenda
[2] http://www.w3.org/2001/sw/wiki/images/e/ef/Baker-dc-abstract-model-revised.pdf


- ---
A. Soroka
The University of Virginia Library

On Sep 13, 2013, at 11:00 PM, CODE4LIB automatic digest system wrote:

Also, remember that OWL does NOT constrain your data, it constrains only the 
inferences that you can make about your data. OWL operates at the ontology 
level, not the data level. (The OWL 2 documentation makes this more clear, in 
my reading of it. I agree that the example you cite sure looks like a 
constraint on the data... it's very confusing.)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
Comment: GPGTools - http://gpgtools.org

iQEcBAEBAgAGBQJSNwe2AAoJEATpPYSyaoIkwLcIAK+sMzy1XkqLStg94F2I40pe
0DepjqVhdPnaDS1Msg7pd7c7iC0L5NhCWd9BxzdvRgeMRr123zZ3EmKDSy8XZiGf
uQyXlA9cOqpCxdQLj2zXv5VHrOdlsA1UAGprwhYrxOz/v3xQ7b2nXusRoZRfDlts
iadvWx5DhLEb2+uVl9geteeymLIVUTzm8WnUITEE7by2HAQf9VlT9CrQSVQ21wLC
hvmk47Nt8WIGyPwRh1qOhvIXLDLxD9rkBSC1G01RhzwvctDy88Tmt2Ut47ZREScP
YUz/bf/qxITzX2L7tE35s2w+RUIFIFc4nJa3Xhp0wMoTAz5UYMiWIcXZ38qfGlY=
=PJTS
-----END PGP SIGNATURE-----

--
Karen Coyle
kco...@kcoyle.net http://kcoyle.net
m: 1-510-435-8234
skype: kcoylenet

Reply via email to