9,961 research outputs found
Recommended from our members
Efficient recursion termination for function-free horn logic
We present an efficient scheme to terminate infinite recursion in function-free Horn logic. In [BW84], Brough and Walker show that a preorder linear resolution with a goal termination strategy is incomplete, i.e. it must miss some answers. Their theory is true if left-recursion is allowed. The crucial assumption underlying Brough and Walker's theory is that the order of literals in a clause should not be altered. This assumption, however, is not necessary in programs that do not contain any extra-logical features such as the 'cut' symbol of Prolog. This is because the order of literals does not affect the correctness of such programs, only their efficiency. In this paper, we show that left-recursion can always be eliminated. The idea is to transform loops of the input set into safe loops, that are left-recursion free. Consequently, the goal termination strategy guarantees to always terminate properly with all possible answers; thus, it is complete in the domain of safe loops. We further show that all rules in a safe loop can be transformed into rules that begin with a base literal. This permits the implementation of a simple scheme to carry out the goal termination strategy more efficiently. The basic idea of this scheme is to distribute the history containing all executed goals over assertions, rather than maintaining it as a centralized data structure. This reduces the amount of work performed during execution
Recommended from our members
Performance analysis of a message-oriented knowledge-base
First-order Horn logic is a useful formalism to design knowledge-based systems. When implemented on a sequential von Neumann computer, the main limitation of such systems is performance. We present a message-driven model for function-free Horn logic, where the knowledge base is represented as a network of logical processing elements communicating with one another exclusively through messages. The lack of centralized control and centralized memory makes this model suitable to implementation on a highly-parallel asynchronous computer architecture.The primary contribution of this paper is a performance analysis of this message-driven system and a comparison with a sequential resolution scheme using backtracking. For both approaches, closed form expressions for the performance results are derived and compared
Recommended from our members
A unifying approach for queries and updates in deductive databases
This dissertation presents a unifying approach to process (recursive) queries and updates in a deductive database. To improve query performance, a combined top-down and bottom-up evaluation method is used to compile rules into iterative programs that contain relational algebra operators. This method is based on the lemma resolution that retains previous results to guarantee termination.Due to locality in database processing, it is desirable to materialize frequently used queries against views of the database. Unfortunately, if updates are allowed, maintaining materialized view tables becomes a major problem. We propose to materialize views incrementally, as queries are being answered. Hence views in our approach are only partially materialized. For such views, we design algorithms to perform updates only when the underlying view tables are actually affected.We compare our approach to two conventional methods for dealing with views: total materialization and query-modification. The first method materializes the entire view when it is defined while the second recomputes the view on the fly without maintaining any physical view tables. We demonstrate that our approach is a compromise between these two methods and performs better than either one in many situations.It is also desirable to be able to update views just like updating base tables. However, view updates are inherently ambiguous and the semantics of update propagation on recursively defined views were not well understood in the past. Using dynamic logic programming and lemma resolution, we are able to define the semantics of recursive view updates. These are expressed in the form of update translators specified by the database administrator when the view is defined. To guarantee completeness, we identify a subset of safe update translators. We prove that this subset of translators always terminate and are complete
A Collaborative B2E Based on A P2P Platform
Companies, large and small, are rapidly adopting Business-to-Employee (B2E) applications hoping to improve productivity of their work force. However, most B2E applications do not provide a good sense of community and lack of collaboration and interaction among its users. Consequently, employees are not motivated to fully utilize the contents and information provided by these applications. Peer-to-peer (P2P) computing is proven to be a good platform that provides and supports community by empowering users to collaborate and interact with one another. In this paper, we propose an approach to provide collaboration in B2E applications based on a P2P platform
A Knowledge Assimilation Schema for Acquiring Technical Knowledge
It has always been a challenge for business students to acquire technical knowledge. Such challenges are more pronounced at urban minority universities where many returning students often have additional obstacles that prevent them from learning as traditional students do. In response to the situation, we have developed a learning tool, called the Knowledge Assimilation Schema (KAS), that guides students to focus on the development of their knowledge structures rather than the collection of isolated knowledge entities. The learning tool has two major components: a knowledge representation framework that facilitates structural understanding and a knowledge acquisition process that steers deeper learning. Initial feedback and results from KAS have shown a noticeable improvement in conceptual learning of technical subjects, especially among nontraditional students
Modulation of Ca2+-dependent anion secretion by protein kinase C in normal and cystic fibrosis pancreatic duct cells
AbstractThe study investigated the role of protein kinase C (PKC) in the modulation of agonist-induced Ca2+-dependent anion secretion by pancreatic duct cells. The short-circuit current (ISC) technique was used to examine the effect of PKC activation and inhibition on subsequent ATP, angiotensin II and ionomycin-activated anion secretion by normal (CAPAN-1) and cystic fibrosis (CFPAC-1) pancreatic duct cells. The ISC responses induced by the Ca2+-mobilizing agents, which had been previously shown to be attributed to anion secretion, were enhanced in both CAPAN-1 and CFPAC-1 cells by PKC inhibitors, staurosporine, calphostin C or chelerythrine. On the contrary, a PKC activator, phorbol 12-myristate 13-acetate (PMA), was found to suppress the agonist-induced ISC in CFPAC-1 cells and the ionomycin-induced ISC in CAPAN-1 cells. An inactive form of PMA, 4αd-phorbol 12,13-didecanote (4αD), was found to exert insignificant effect on the agonist-induced ISC, indicating a specific effect of PMA. Our data suggest a role of PKC in modulating agonist-induced Ca2+-dependent anion secretion by pancreatic duct cells. Therapeutic strategy to augment Ca2+-activated anion secretion by cystic fibrosis pancreatic duct cells may be achieved by inhibition or down-regulation of PKC
Assuring E-Commerce Business Activities
Trust is imperative for conducting online transactions. To reduce online risks and foster trust, assurance service providers, such as TRUSTe, BBBonline, and WebTrust, audit online businesses to assure their compliance with principles and criteria for e-commerce business activities. Of these assurance service providers, WebTrust offers the most comprehensive services, including programs for business to consumer and business to business transactions, certification authorities (CA) and service providers. WebTrust jointly developed by the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA) offers best practices and a framework of measurable controls for electronic businesses, and thus, fosters online trust and confidence that are critical to the success of electronic commerce. As e-commerce matures, WebTrust will play an increasingly important role in CA-based e-commerce as well as in the applications service provider industry
- …