Towards combining rules and ontologies for the Semantic Web, nonmonotonic Description Logic Programs (dl-programs) have been proposed as a powerful formalism to couple nonmonotonic logic programming and Description Lo...
详细信息
Towards combining rules and ontologies for the Semantic Web, nonmonotonic Description Logic Programs (dl-programs) have been proposed as a powerful formalism to couple nonmonotonic logic programming and Description Logic reasoning on a clear semantic basis. In this paper, we present cq-programs, which enhance dl-programs with conjunctive queries (CQ) and union of conjunctive queries (UCQ) over Description Logics knowledge bases, as well as with disjunctive rules. The novel formalism has two advantages. First, it offers increased expressivity because it allows for (U)CQs in the bodies of the rules. The (U)CQs allow one to access unnamed individuals in the rules and they increase the expressivity of the formalism, as evident from the increase in complexity from NEXP to 2-EXP. And second, when implemented as a combination between a logic programming system and a DL-reasoner, this integration of rules and ontologies gives rise to strategies for optimizing calls to the DL-reasoner, by exploiting specific support for (U)CQs. To this end, we present equivalence preserving transformations which can be used for program rewriting, and we present respective generic rewriting algorithms. Experimental results for a cq-program prototype show that this can lead to significant performance improvements, and suggest that cq-programs and program rewriting provide a useful basis for dl- and cq-program optimization.
HEX programs were originally introduced as a general framework for extending declarative logic programming, under the stable model semantics, with the possibility of bidirectionally accessing external sources of knowl...
详细信息
ISBN:
(纸本)9783939897170
HEX programs were originally introduced as a general framework for extending declarative logic programming, under the stable model semantics, with the possibility of bidirectionally accessing external sources of knowledge and/or computation. The original framework, however, does not deal satisfactorily with stateful external environments: the possibility of predictably influencing external environments has thus not yet been considered explicitly. This paper lifts HEX programs to ACTHEX programs: ACTHEX programs introduce the notion of action atoms, which are associated to corresponding functions capable of actually changing the state of external environments. The execution of specific sequences of action atoms can be declaratively programmed. Furthermore, ACTHEX programs allow for selecting preferred actions, building on weights and corresponding cost functions. We introduce syntax and semantics of ACTHEX programs;ACTHEX programs can successfully be exploited as a general purpose language for the declarative implementation of executable specifications, which we illustrate by encodings of knowledge bases updates, action languages, and an agent programming language. A system capable of executing ACTHEX programs has been implemented and is publicly available.
In this paper, we describe the architecture of a web-based predictive text editor being developed for the controlled natural language PENG ASP. This controlled language can be used to write non-monotonic specification...
详细信息
ISBN:
(纸本)9783319102238
In this paper, we describe the architecture of a web-based predictive text editor being developed for the controlled natural language PENG ASP. This controlled language can be used to write non-monotonic specifications that have the same expressive power as answerset Programs. In order to support the writing process of these specifications, the predictive text editor communicates asynchronously with the controlled natural language processor that generates lookahead categories and additional auxiliary information for the author of a specification text. The text editor can display multiple sets of lookahead categories simultaneously for different possible sentence completions, anaphoric expressions, and supports the addition of new content words to the lexicon.
Rule-based declarative formalisms enjoy several advantages when compared with imperative solutions, especially when dealing with AI-based application development: solid theoretical bases, no need for algorithm design ...
详细信息
ISBN:
(纸本)9783319999067;9783319999050
Rule-based declarative formalisms enjoy several advantages when compared with imperative solutions, especially when dealing with AI-based application development: solid theoretical bases, no need for algorithm design or coding, explicit and easily modifiable knowledge bases, executable declarative specifications, fast prototyping, quick error detection, modularity. For these reasons, ways for combining declarative paradigms, such as answer set programming (ASP), with traditional ones have been significantly studied in the recent years;there are however relevant contexts, in which this road is unexplored, such as development of real-time games. In such a setting, the strict requirements on reaction times, the presence of computer-human interactivity and a generally increased impedance between the two development paradigms make the task nontrivial. In this work we illustrate how to embed rule-based reasoning modules into the well-known Unity game development engine. To this end, we present an extension of EmbASP, a framework to ease the integration of declarative formalisms with generic applications. We prove the viability of our approach by developing a proof-of-concept Unity game that makes use of ASP-based AI modules.
In this paper, we propose an implementation of a maintenance scheduler for cloud infrastructures. Live migration associated with maintenance work is important to ensure service continuity for all virtual machines in a...
详细信息
ISBN:
(纸本)9781728102184
In this paper, we propose an implementation of a maintenance scheduler for cloud infrastructures. Live migration associated with maintenance work is important to ensure service continuity for all virtual machines in an infrastructure. However, executing the migration process when the machines are under heavy load negatively affects cloud users' businesses, such as by degrading performance and extending downtime. We can avoid this by finding an appropriate time period for live migration and performing the migration then. This idea is convenient for cloud users but inconvenient for cloud providers, that is, maintenance work should be completed as soon as possible for security reasons. To satisfy both the users' convenience and providers' requirements, we designed a maintenance scheduling problem to find the appropriate time period and to shorten the maintenance work period. Since it is a large-scale combinatorial optimization problem with complex constraints on maintenance requirements, we described the constraints by using answer set programming and implemented a maintenance scheduler on the basis of a divide-and-conquer approach to reduce the computational complexity exponentially. We evaluated our scheduler by using information on a real configuration of a commercial cloud infrastructure. While a naive approach to solving the maintenance scheduling problem could not find any feasible solutions within a realistic amount of time and memory, our implementation generated the best maintenance schedule for 1032 physical machines and 14208 virtual machines in 206 s with a memory usage of 1086 MB.
In a ubiquitous system, there are several interacting computational objects which use each others' resources. As the number of resources and their consumers grow in such systems, the delay that the consumers exper...
详细信息
ISBN:
(纸本)9783642228759
In a ubiquitous system, there are several interacting computational objects which use each others' resources. As the number of resources and their consumers grow in such systems, the delay that the consumers experience for obtaining control over resources increases with an existing rule-based resource allocation technique. Distributing the resource allocation, however, complicates the nature of deadlocks that may arise and requires more sophisticated techniques as compared to a setup with central control. The goal of this paper is to generalize the current resource allocation method to a distributed setting and, in particular, to propose an approach for handling deadlocks in this case.
The goal of this article is to foster modular program development in answer set programming using a Gaifman-Shapiro-style module architecture. More specifically, a method for verifying the equivalence of logic program...
详细信息
The goal of this article is to foster modular program development in answer set programming using a Gaifman-Shapiro-style module architecture. More specifically, a method for verifying the equivalence of logic program modules is devised and proved correct. The idea is to adapt a translation-based verification technique, which was originally devised for complete programs only, for program modules. In addition, optimization strategies are addressed in order to exploit the modular structure of programs in verification tasks. A number of experiments on verification strategies are also conducted using lpeq which implements the verification method for the smodels system. The preliminary experimental results reported in this article suggest that the modularization of equivalence verification leads to potential time savings especially if the modules involved share a common context.
In this paper(1), we propose a security methodology that automates the process of security zone specification and high-level network security requirements elicitation. We define a set of formalized rules derived from ...
详细信息
ISBN:
(纸本)9781450359337
In this paper(1), we propose a security methodology that automates the process of security zone specification and high-level network security requirements elicitation. We define a set of formalized rules derived from the principles of complete mediation, least privileges and the Clark-Wilson lite formal model making our approach traceable and verifiable. We implemented the methodology in answer set programming to automatically compute an optimal network security zone model considering the cost of the security solution. A use case study of an e-commerce enterprise network infrastructure illustrates our methodology.
In this paper we show how CR-Prolog, a recent extension of A-Prolog, was used in the successor of USA-Advisor (USA-Smart) in order to improve the quality of the plans returned. The general problem that we address is t...
详细信息
ISBN:
(纸本)3540222537
In this paper we show how CR-Prolog, a recent extension of A-Prolog, was used in the successor of USA-Advisor (USA-Smart) in order to improve the quality of the plans returned. The general problem that we address is that of improving the quality of plans by taking in consideration statements that describe "most desirable" plans. We believe that USA-Smart proves that CR-Prolog provides a simple, elegant, and flexible solution to this problem, and can be easily applied to any planning domain. We also discuss how alternative extensions of A-Prolog can be used to obtain similar results.
In this work we propose a multi-valued extension of logic programs under the stable models semantics where each true atom in a model is associated with a set of justifications. These justifications are expressed in te...
详细信息
In this work we propose a multi-valued extension of logic programs under the stable models semantics where each true atom in a model is associated with a set of justifications. These justifications are expressed in terms of causal graphs formed by rule labels and edges that represent their application ordering. For positive programs, we show that the causal justifications obtained for a given atom have a direct correspondence to (relevant) syntactic proofs of that atom using the program rules involved in the graphs. The most interesting contribution is that this causal information is obtained in a purely semantic way, by algebraic operations (product, sum and application) on a lattice of causal values whose ordering relation expresses when a justification is stronger than another. Finally, for programs with negation, we define the concept of causal stable model by introducing an analogous transformation to Gelfond and Lifschitz's program reduct. As a result, default negation behaves as "absence of proof" and no justification is derived from negative literals, something that turns out convenient for elaboration tolerance, as we explain with a running example.
暂无评论