A query evaluation method for abductive logic programming:
Abstract: "We present a query evaluation method for abduction. In artificial intelligence, abduction has been recognized as important human reasoning and has been applied in various fields [3]. In logic programming, Eshgi and Kowalski [3] introduce abduction to handle negation as failure and Ka...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Tokyo, Japan
1992
|
Schriftenreihe: | Shin-Sedai-Konpyūta-Gijutsu-Kaihatsu-Kikō <Tōkyō>: ICOT technical report
756 |
Schlagworte: | |
Zusammenfassung: | Abstract: "We present a query evaluation method for abduction. In artificial intelligence, abduction has been recognized as important human reasoning and has been applied in various fields [3]. In logic programming, Eshgi and Kowalski [3] introduce abduction to handle negation as failure and Kakas and Mancarella [5,6] extend the framework to include any arbitrary abducible predicate. We have already proposed a correct bottom-up procedure to compute abduction. However, this procedure is not suitable for a query evaluation. Although [6] proposes a query evaluation method by extending the procedure in [3], there is a problem of incorrectness in the procedure in [3] and the problem is inherited to the procedure in [6]. Moreover, their procedures can only handle a limited class of integrity constraints Our proposed procedure in this paper is correct for any consistent abductive framework. If the procedure succeeds, there is a set of hypotheses which satisfies a query, and if the procedure finitely fails, there is no such set. We can guarantee correctness since we adopt a forward evaluation of rules and check consistency of 'implicit deletion' [8]. Thanks to the forward evaluation of rules, we can also handle any form of integrity constraints. |
Beschreibung: | 18 S. |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV010956637 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 960919s1992 |||| 00||| engod | ||
035 | |a (OCoLC)27482858 | ||
035 | |a (DE-599)BVBBV010956637 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-91G | ||
100 | 1 | |a Satoh, Ken |d 1959- |e Verfasser |0 (DE-588)134075757 |4 aut | |
245 | 1 | 0 | |a A query evaluation method for abductive logic programming |c K. Satoh & M. Iwayama |
264 | 1 | |a Tokyo, Japan |c 1992 | |
300 | |a 18 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Shin-Sedai-Konpyūta-Gijutsu-Kaihatsu-Kikō <Tōkyō>: ICOT technical report |v 756 | |
520 | 3 | |a Abstract: "We present a query evaluation method for abduction. In artificial intelligence, abduction has been recognized as important human reasoning and has been applied in various fields [3]. In logic programming, Eshgi and Kowalski [3] introduce abduction to handle negation as failure and Kakas and Mancarella [5,6] extend the framework to include any arbitrary abducible predicate. We have already proposed a correct bottom-up procedure to compute abduction. However, this procedure is not suitable for a query evaluation. Although [6] proposes a query evaluation method by extending the procedure in [3], there is a problem of incorrectness in the procedure in [3] and the problem is inherited to the procedure in [6]. Moreover, their procedures can only handle a limited class of integrity constraints | |
520 | 3 | |a Our proposed procedure in this paper is correct for any consistent abductive framework. If the procedure succeeds, there is a set of hypotheses which satisfies a query, and if the procedure finitely fails, there is no such set. We can guarantee correctness since we adopt a forward evaluation of rules and check consistency of 'implicit deletion' [8]. Thanks to the forward evaluation of rules, we can also handle any form of integrity constraints. | |
650 | 4 | |a Logic programming | |
700 | 1 | |a Iwayama, Noboru |e Verfasser |4 aut | |
830 | 0 | |a Shin-Sedai-Konpyūta-Gijutsu-Kaihatsu-Kikō <Tōkyō>: ICOT technical report |v 756 |w (DE-604)BV010923438 |9 756 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-007328750 |
Datensatz im Suchindex
_version_ | 1804125443915251712 |
---|---|
any_adam_object | |
author | Satoh, Ken 1959- Iwayama, Noboru |
author_GND | (DE-588)134075757 |
author_facet | Satoh, Ken 1959- Iwayama, Noboru |
author_role | aut aut |
author_sort | Satoh, Ken 1959- |
author_variant | k s ks n i ni |
building | Verbundindex |
bvnumber | BV010956637 |
ctrlnum | (OCoLC)27482858 (DE-599)BVBBV010956637 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02280nam a2200313 cb4500</leader><controlfield tag="001">BV010956637</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">960919s1992 |||| 00||| engod</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)27482858</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV010956637</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Satoh, Ken</subfield><subfield code="d">1959-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)134075757</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A query evaluation method for abductive logic programming</subfield><subfield code="c">K. Satoh & M. Iwayama</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Tokyo, Japan</subfield><subfield code="c">1992</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">18 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Shin-Sedai-Konpyūta-Gijutsu-Kaihatsu-Kikō <Tōkyō>: ICOT technical report</subfield><subfield code="v">756</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Abstract: "We present a query evaluation method for abduction. In artificial intelligence, abduction has been recognized as important human reasoning and has been applied in various fields [3]. In logic programming, Eshgi and Kowalski [3] introduce abduction to handle negation as failure and Kakas and Mancarella [5,6] extend the framework to include any arbitrary abducible predicate. We have already proposed a correct bottom-up procedure to compute abduction. However, this procedure is not suitable for a query evaluation. Although [6] proposes a query evaluation method by extending the procedure in [3], there is a problem of incorrectness in the procedure in [3] and the problem is inherited to the procedure in [6]. Moreover, their procedures can only handle a limited class of integrity constraints</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Our proposed procedure in this paper is correct for any consistent abductive framework. If the procedure succeeds, there is a set of hypotheses which satisfies a query, and if the procedure finitely fails, there is no such set. We can guarantee correctness since we adopt a forward evaluation of rules and check consistency of 'implicit deletion' [8]. Thanks to the forward evaluation of rules, we can also handle any form of integrity constraints.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logic programming</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Iwayama, Noboru</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Shin-Sedai-Konpyūta-Gijutsu-Kaihatsu-Kikō <Tōkyō>: ICOT technical report</subfield><subfield code="v">756</subfield><subfield code="w">(DE-604)BV010923438</subfield><subfield code="9">756</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007328750</subfield></datafield></record></collection> |
id | DE-604.BV010956637 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T18:01:39Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-007328750 |
oclc_num | 27482858 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | 18 S. |
publishDate | 1992 |
publishDateSearch | 1992 |
publishDateSort | 1992 |
record_format | marc |
series | Shin-Sedai-Konpyūta-Gijutsu-Kaihatsu-Kikō <Tōkyō>: ICOT technical report |
series2 | Shin-Sedai-Konpyūta-Gijutsu-Kaihatsu-Kikō <Tōkyō>: ICOT technical report |
spelling | Satoh, Ken 1959- Verfasser (DE-588)134075757 aut A query evaluation method for abductive logic programming K. Satoh & M. Iwayama Tokyo, Japan 1992 18 S. txt rdacontent n rdamedia nc rdacarrier Shin-Sedai-Konpyūta-Gijutsu-Kaihatsu-Kikō <Tōkyō>: ICOT technical report 756 Abstract: "We present a query evaluation method for abduction. In artificial intelligence, abduction has been recognized as important human reasoning and has been applied in various fields [3]. In logic programming, Eshgi and Kowalski [3] introduce abduction to handle negation as failure and Kakas and Mancarella [5,6] extend the framework to include any arbitrary abducible predicate. We have already proposed a correct bottom-up procedure to compute abduction. However, this procedure is not suitable for a query evaluation. Although [6] proposes a query evaluation method by extending the procedure in [3], there is a problem of incorrectness in the procedure in [3] and the problem is inherited to the procedure in [6]. Moreover, their procedures can only handle a limited class of integrity constraints Our proposed procedure in this paper is correct for any consistent abductive framework. If the procedure succeeds, there is a set of hypotheses which satisfies a query, and if the procedure finitely fails, there is no such set. We can guarantee correctness since we adopt a forward evaluation of rules and check consistency of 'implicit deletion' [8]. Thanks to the forward evaluation of rules, we can also handle any form of integrity constraints. Logic programming Iwayama, Noboru Verfasser aut Shin-Sedai-Konpyūta-Gijutsu-Kaihatsu-Kikō <Tōkyō>: ICOT technical report 756 (DE-604)BV010923438 756 |
spellingShingle | Satoh, Ken 1959- Iwayama, Noboru A query evaluation method for abductive logic programming Shin-Sedai-Konpyūta-Gijutsu-Kaihatsu-Kikō <Tōkyō>: ICOT technical report Logic programming |
title | A query evaluation method for abductive logic programming |
title_auth | A query evaluation method for abductive logic programming |
title_exact_search | A query evaluation method for abductive logic programming |
title_full | A query evaluation method for abductive logic programming K. Satoh & M. Iwayama |
title_fullStr | A query evaluation method for abductive logic programming K. Satoh & M. Iwayama |
title_full_unstemmed | A query evaluation method for abductive logic programming K. Satoh & M. Iwayama |
title_short | A query evaluation method for abductive logic programming |
title_sort | a query evaluation method for abductive logic programming |
topic | Logic programming |
topic_facet | Logic programming |
volume_link | (DE-604)BV010923438 |
work_keys_str_mv | AT satohken aqueryevaluationmethodforabductivelogicprogramming AT iwayamanoboru aqueryevaluationmethodforabductivelogicprogramming |