11,802 research outputs found

    Coherent Integration of Databases by Abductive Logic Programming

    Full text link
    We introduce an abductive method for a coherent integration of independent data-sources. The idea is to compute a list of data-facts that should be inserted to the amalgamated database or retracted from it in order to restore its consistency. This method is implemented by an abductive solver, called Asystem, that applies SLDNFA-resolution on a meta-theory that relates different, possibly contradicting, input databases. We also give a pure model-theoretic analysis of the possible ways to `recover' consistent data from an inconsistent database in terms of those models of the database that exhibit as minimal inconsistent information as reasonably possible. This allows us to characterize the `recovered databases' in terms of the `preferred' (i.e., most consistent) models of the theory. The outcome is an abductive-based application that is sound and complete with respect to a corresponding model-based, preferential semantics, and -- to the best of our knowledge -- is more expressive (thus more general) than any other implementation of coherent integration of databases

    A Review of integrity constraint maintenance and view updating techniques

    Get PDF
    Two interrelated problems may arise when updating a database. On one hand, when an update is applied to the database, integrity constraints may become violated. In such case, the integrity constraint maintenance approach tries to obtain additional updates to keep integrity constraints satisfied. On the other hand, when updates of derived or view facts are requested, a view updating mechanism must be applied to translate the update request into correct updates of the underlying base facts. This survey reviews the research performed on integrity constraint maintenance and view updating. It is proposed a general framework to classify and to compare methods that tackle integrity constraint maintenance and/or view updating. Then, we analyze some of these methods in more detail to identify their actual contribution and the main limitations they may present.Postprint (published version

    Finding problems in knowledge bases using modal logics

    Get PDF
    In this paper I propose that it is suitable to consider some statements that an expert makes during knowledge elicitation as being statements in a modal logic. This approach gives us several advantages in finding inconsistencies between a knowledge base and an expert's intuition in her field. I illustrate this approach by using the modal logic VC, a logic of counterfactual conditionals. In an appendix, I give brief details of theorem proving in VC

    Towards a non monotonic description logics model

    Get PDF
    In order to deal with the Ontology Change problem and considering an environment where Description Logics (DLs) are used to describe ontologies, the question of how to integrate distributed ontologies appears to be in touch with Belief Revision since DL terminologies may define same concept descriptions of a not necessarily same world model. A possible alternative to reason about these concepts is to generate unique concept descriptions in a different terminology. This new terminology needs to be consistently created, trying to deal with the minimal change problem, and moreover, yielding a non-monotonic layer to express ontological knowledge in order to be further updated with new distributed ontologies.VII Workshop de Agentes y Sistemas Inteligentes (WASI)Red de Universidades con Carreras en Informática (RedUNCI

    A database management capability for Ada

    Get PDF
    The data requirements of mission critical defense systems have been increasing dramatically. Command and control, intelligence, logistics, and even weapons systems are being required to integrate, process, and share ever increasing volumes of information. To meet this need, systems are now being specified that incorporate data base management subsystems for handling storage and retrieval of information. It is expected that a large number of the next generation of mission critical systems will contain embedded data base management systems. Since the use of Ada has been mandated for most of these systems, it is important to address the issues of providing data base management capabilities that can be closely coupled with Ada. A comprehensive distributed data base management project has been investigated. The key deliverables of this project are three closely related prototype systems implemented in Ada. These three systems are discussed
    • …
    corecore