Information about user interactions with Cyberenvironment components is captured and used to provide project documentation and to support coordination, alerts, subscriptions, and knowledge network recommendations.








Funding for ECID technology development comes from the National Science Foundation and the Office of Naval Research.


Interested in ECID?  Join the ecid-support list by sending email to majordomo@ncsa.uiuc.edu   with the phrase "subscribe ecid-support" in the body of the email.

Cyberenvironment components log descriptions of user interactions, which are captured as metadata represented using the Resource Description Framework (RDF) via NCSA’s Tupelo 2 Toolkit. RDF metadata and URI-based globally unique identifiers allow the cyberenvironment to merge information from multiple components and build provenance networks describing complex user activities.


For example, a provenance network might show relationships between two data objects and a meta-workflow. Associating data objects with their roles as input and output to steps in the provenance graph makes it possible to infer the derivation of "data2" from "data1." By adding nodes and arcs to this kind of graph, we link user interactions in discussion forums with tool use patterns in workflows (see CyberIntegrator), to provide targeted recommendations (see CI-KNOW) and other contextual user support.