In logic, there are various normal forms for formulae;for example, disjunctive and conjunctive normal form for formulae of propositional logic or prenex normal form for formulae of predicate logic. there are algorithm...
详细信息
ISBN:
(纸本)9783540877295
In logic, there are various normal forms for formulae;for example, disjunctive and conjunctive normal form for formulae of propositional logic or prenex normal form for formulae of predicate logic. there are algorithms for 'reducing' a given formula to a semantically equivalent formula in normal form. Normal forms are used in a variety of contexts including proofs of completeness, automated theorem proving, logicprogramming etc. In this paper, we develop a normal form for unitary Euler diagrams with shading. We give an algorithm for reducing a given Euler diagram to a semantically equivalent diagram in normal form and hence a decision procedure for determining whether two Euler diagrams are semantically equivalent. Potential applications of the normal form include clutter reduction and automated theorem proving in systems based on Euler diagrams.
In this paper, we propose a strategy language for designing schemes of constraint solver collaborations: a set of strategy operators enables one to design several kinds of collaborations. We exemplify the use of this ...
详细信息
ISBN:
(纸本)3540420711
In this paper, we propose a strategy language for designing schemes of constraint solver collaborations: a set of strategy operators enables one to design several kinds of collaborations. We exemplify the use of this language by describing some well known techniques for solving constraints over finite domains and non-linear constraints over real numbers via collaboration of solvers.
the proceedings contain 74 papers. the topics discussed include: ElectroLab: electronic laboratory system;evaluation of a numerical model using COMSOL multi-physics package;interactive design modules for logic design ...
ISBN:
(纸本)9781467394314
the proceedings contain 74 papers. the topics discussed include: ElectroLab: electronic laboratory system;evaluation of a numerical model using COMSOL multi-physics package;interactive design modules for logic design course;an algorithm for human modeling in information technology multimedia using human biometrics found in golden ratio, vitruvian man and Neufert;syllabus design for multimedia art and engineering education - problem oriented approach;an evaluation of an integrated e-portfolio model: the case of Bahrain teachers college;programming unplugged: bridging CS unplugged activities gap for learning key programming concepts;the effect of using a developed spoken social networking website on instructional technology students attitudes and habits in Egypt;the use of e-learning system in learning about architecture;and the impact of e-books on the printed books: e-books popularity, growth and future.
Recursion-free Constrained Horn Clauses (CHCs) are logic-programming problems that can model safety properties of programs with bounded iteration and recursion. In addition, many CHC solvers reduce recursive systems t...
详细信息
Recursion-free Constrained Horn Clauses (CHCs) are logic-programming problems that can model safety properties of programs with bounded iteration and recursion. In addition, many CHC solvers reduce recursive systems to a series of recursion-free CHC systems that can each be solved efficiently. In this paper, we define a novel class of recursion-free systems, named Clause-Dependence Disjoint (CDD), that generalizes classes defined in previous work. the advantage of this class is that many CDD systems are smaller than systems which express the same constraints but are part of a different class. this advantage in size allows CDD systems to be solved more efficiently than their counterparts in other classes. We implemented a CHC solver named SHARA. SHARA solves arbitrary CHC systems by reducing the input to a series of CDD systems. Our evaluation indicates that SHARA outperforms state-of-the-art implementations in many practical cases.
this paper describes FAULTY, a default prover for a decidable subset of predicata calculus. FAULTY is based on McDermott's and Doyle's Nonmonotonic logic I und avoids the well-known weakness of this logic by a...
详细信息
the proceedings contain 26 papers. the special focus in this conference is on Practical Aspects of Declarative Languages. the topics include: the role of declarative languages in mining biological databases;light and ...
ISBN:
(纸本)3540003894
the proceedings contain 26 papers. the special focus in this conference is on Practical Aspects of Declarative Languages. the topics include: the role of declarative languages in mining biological databases;light and fast applicative algorithms for computational linguistics;data mining the yeast genome in a lazy functional language;an integrated information system powered by prolog;iterable abstract pattern matching for java;reconstructing the evolutionary history of indo-European languages using answer set programming;logic programs for querying inconsistent databases;a CLP-based tool for computer aided generation and solving of Maths exercises;type-based xml processing in logicprogramming;garbage collection algorithms for java-based prolog engines;solving combinatorial problems with a constraint functional logic language;logic programs as compact denotations and lambda goes to Hollywood.
this paper is to address high-level authorization specifications and its efficient implementation in object oriented database scenario. Premchand Ambhore is with higher and technical education, maharashtra state, indi...
详细信息
ISBN:
(纸本)9780769528670
this paper is to address high-level authorization specifications and its efficient implementation in object oriented database scenario. Premchand Ambhore is with higher and technical education, maharashtra state, india, Email:pbambhore@***. the rest of the paper is organized as follows. Section 2 specifies object oriented database system;section 3 incorporates authorization rules into database and section 4 maps the specification into a logicprogramming language and implements the language. Section 5 concludes the paper. the integration of object-oriented programming concepts with databases is one of the most significant advances in the evolution of database system, therefore the problems involved in providing data security for object oriented databases have been receiving very great attention from researchers. As a matter of fact, data are the most sensitive part of any system and its loss or compromise can have disastrous consequences. We discuss three different types of access: Discretionary access control (DAC), Mandatory access control (MAC) and role. based access control (RBAC) in Relational DBMS and object oriented data bases. We have identified some of the issues and current proposals;current security models in object oriented database systems and outline possible direction issues for future research.
this paper presents the design and implementation of logic language interface on conventional network database systems which provide network data structure and navigational data manipulation language. this interface p...
详细信息
Withthe recent release of the movie AI, there is interest in artificial intelligence and in just how far we can take computational intelligence. this paper discusses the advances made in the computational intelligenc...
详细信息
ISBN:
(纸本)0819444898
Withthe recent release of the movie AI, there is interest in artificial intelligence and in just how far we can take computational intelligence. this paper discusses the advances made in the computational intelligence arena and brings perspective to what may be possible in the future.
A research software platform is developed that is based on the Actor Prolog concurrent object-oriented logic language and a state-of-the-art Prolog-to-Java translator for experimenting withthe intelligent visual surv...
详细信息
ISBN:
(纸本)9789897580949
A research software platform is developed that is based on the Actor Prolog concurrent object-oriented logic language and a state-of-the-art Prolog-to-Java translator for experimenting withthe intelligent visual surveillance. We demonstrate an example of the application of the method to the monitoring of anomalous human behaviour that is based on the logical description of complex human behaviour patterns and special kinds of blob motion statistics. the logic language is used for the high-level (semantic) analysis of graphs of tracks of moving blobs;the graphs are supplied by low-level analysis algorithms implemented in a special built-in class of Actor Prolog. the blob motion statistics is collected by the low-level analysis procedures that are of the need for the discrimination of running people, people riding bicycles, and cars in a video scene. the first-order logic language is used for implementing the fuzzy logical inference based on the blob motion statistics.
暂无评论