“…For example, the user can use direct approaches that extract immediate properties of resources (Christodoulou et al , 2015; Eddamiri et al , 2019), or immediate resources (Paulheim and Fümkranz, 2012), or even walks and paths (Ristoski and Paulheim, 2016; De Vries, 2013). Furthermore, the user could either: - extract the incoming and outgoing relations and entities such as Depth Limited Crawling (DLC) (Grimnes et al , 2008; Lösch et al ., 2012; Bach, 2008);
- extract the frequent patterns from the RDF graph (Čebirić et al , 2015; Zneika et al , 2015; Zneika et al , 2016);
- extract a sequential pattern mining process (d’Aquin and Jay, 2013) to explore and add additional information from the linked open data; and
- extract a subgraph by generating a set of logical rules from RDF data and remove triples (Joshi et al , 2012; Joshi et al , 2013; Eddamiri et al , 2018a).
…”