We focus on the problem of specialization in a description logics (DL) representation, specifically the ALN language. Standard approaches to learning in these representations are based on bottom-up algorithms that emp...
详细信息
We focus on the problem of specialization in a description logics (DL) representation, specifically the ALN language. Standard approaches to learning in these representations are based on bottom-up algorithms that employ the lcs operator, which, in turn, produces overly specific (overfitting,) and still redundant concept definitions. In the dual (top-down) perspective, this issue can be tackled by means of an ILP downward operator. Indeed, using a mapping from DL descriptions onto a clausal representation, we define a specialization operator computing maximal specializations of a concept description on the grounds of the available positive and negative examples.
Constraint logic programming (CLP) has been used to model programs and transition systems for the purpose of verification problems. In particular, it has been used to model timed safety automata (TSA). In this paper, ...
详细信息
Constraint logic programming (CLP) has been used to model programs and transition systems for the purpose of verification problems. In particular, it has been used to model timed safety automata (TSA). In this paper, we start with a systematic translation of TSA into CLP. The main contribution is an expressive assertion language and a CLP inference method for proving assertions. A distinction of the assertion language is that it can specify important properties beyond traditional safety properties. We highlight one important property: that a system of processes is symmetric. The inference mechanism is based upon the well-known method of tabling in logic programming. It is distinguished by its ability to use assertions that are not yet proven, using a principle of coinduction. Apart from given assertions, the proof mechanism can also prove implicit assertions such as discovering a lower or upper bound of a variable. Finally, we demonstrate significant improvements over state-of-the-art systems using standard TSA benchmark examples.
Content management is a confusing term used in several contexts. We define content management as the organizing of information (for a specific purpose) available in a system. We present the mixer method that uses serv...
详细信息
Content management is a confusing term used in several contexts. We define content management as the organizing of information (for a specific purpose) available in a system. We present the mixer method that uses servlet technology and the model-view-controller design pattern as a way to accomplish content management in a system. The heart of the mixer method is mixer which is a novel helper tool based on a template engine design philosophy. In order to validate our method we show how to solve the problem of separating Java code and HTML code in servlet programming. In our opinion the existing solutions are either too complex or not complete. The mixer method elegantly decouples the data access code, business logic code, and data presentation. Our work shows that the mixer method is easy to learn and to use. We have tested and used the mixer method successfully in large university courses dealing with content management and HTTP server side programming.
Heap management is responsible for the allocation of heap segments to a running application. When the logic of the heap management is left to the application programmer, as it is the case with programming languages li...
详细信息
Heap management is responsible for the allocation of heap segments to a running application. When the logic of the heap management is left to the application programmer, as it is the case with programming languages like C and C++, a number of problems may arise. One kind of problems related to imperfect heap management is that of memory leaks, which happen when heap segments become inaccessible before they are deallocated. Closely related to that problem, from the standpoint of programmer's operations, is the problem of corrupted heap due to redundant attempts to deallocate the same heap segment that has been previously allocated. This work presents a method for detecting such flaws in heap management. Our method is based on traces collected during the execution of an application and their off-line analysis in order to determine the presence of memory leaks and redundant deallocations of the same heap segment. When our method is applied to component-based embedded software, it allows to locate the component that had allocated heap memory and did not deallocate it before exiting, as well as the components that are responsible for the redundant deallocation of heap segments.
Integration of autonomous sources of information is one of the most important problems in implementation of the global information systems. This paper considers multidatabase systems as one of the typical architecture...
详细信息
Integration of autonomous sources of information is one of the most important problems in implementation of the global information systems. This paper considers multidatabase systems as one of the typical architectures of global information services and addresses a problem of storing and processing inconsistent information in such systems. A new data model proposed in the paper separates sure from inconsistent information and introduces a system of elementary operations on the containers with sure and inconsistent information. A review of the implementation aspects in an environment of a typical relational database management system concludes the paper.
In this paper, a new embedded OTP bit-cell (Neobit) is presented for one-/multiple-time programming (OTP/MTP) application, which is fabricated by using a generic logic process. Without additional processing or extra f...
详细信息
In this paper, a new embedded OTP bit-cell (Neobit) is presented for one-/multiple-time programming (OTP/MTP) application, which is fabricated by using a generic logic process. Without additional processing or extra fabrication cost, this single-poly NVM can be implemented in various CMOS technologies such as logic, mixed-mode, analog, RF, HV and etc. Due to its easy incorporation with any IC design, this single-poly NVM can be comprehensively used for program storage in micro controllers, device identification in IC cards and network IC, code storage in RFID tag, fuse device in memory redundancy, and RC trimming in analog/RF circuits.
The paper is concerned with the research of the possibilities for applying programmed logical controllers (known as industrial controllers) in safety-critical systems. A two channel structure, "2-out-of 2", ...
详细信息
The paper is concerned with the research of the possibilities for applying programmed logical controllers (known as industrial controllers) in safety-critical systems. A two channel structure, "2-out-of 2", is offered due to which a concrete solution is presented that shows the application of industrial controllers for realization of technical appliances with "fail-safe" behavior. By analysing the offered structure, we aim to present indicators of reliability and safety. Research has been done of the indicators that have been drawn to our attention, and the results are discussed.
Whilst the vision of a robust service-oriented architecture (SOA) is very seductive it engenders many technical challenges. The main challenge is the development and support of runtime cross-standard service activatio...
详细信息
Whilst the vision of a robust service-oriented architecture (SOA) is very seductive it engenders many technical challenges. The main challenge is the development and support of runtime cross-standard service activation and interoperation. Such interoperation will provide a vital stepping-stone towards the integration of the emerging SOA standards and legacy services - those developed using existing middleware architectures such as DCOM, CORBA, J2EE, Web service, JXTA, and Jini. Much related works already exist including WSIF framework, which provides APIs to support design-time invocation of cross-standard Web services deployed on multiple SOAP packages. However, this paper focuses on a runtime self-regenerative mechanism related to adaptive service invocation code. The paper will present a runtime service adaptation mechanism, which supports end-users to dynamically adapt to variations in the execution environment, without altering their original design, crossing multiple standards (both synchronous and asynchronous invocation models) and middleware architectures. This paper also introduces a proposed "Polyarchical Middleware" architecture to support such self-regenerative service adaptation. An illustrative example will be used to describe the approach and the current implementation. The paper will conclude with general remarks and mention of further work.
This paper describes a database mediation system based on XML related technologies. Descriptions of its architecture, its key metadata and the processes that are used to answer user queries are included. The system us...
详细信息
This paper describes a database mediation system based on XML related technologies. Descriptions of its architecture, its key metadata and the processes that are used to answer user queries are included. The system uses XQuery to represent the mappings between the global schema and local schemas. XQuery is used to translate user queries on the global virtual database to queries on local data sources. The advantage of using XQuery over specialized logic or programming languages is improved standardization and a powerful descriptive capability for the data.
This work presents the application of a new methodology for the production of neural logic networks into two real-world problems from the medical domain. Namely, we apply grammar guided genetic programming using cellu...
详细信息
This work presents the application of a new methodology for the production of neural logic networks into two real-world problems from the medical domain. Namely, we apply grammar guided genetic programming using cellular encoding for the representation of neural logic networks into population individuals. The application area is consisted of the diagnosis of diabetes and the diagnosis of the course of hepatitis patients. The system is proved able to generate arbitrarily connected and interpretable evolved solutions leading to potential knowledge extraction.
暂无评论