14 research outputs found
A Rational and Efficient Algorithm for View Revision in Databases
The dynamics of belief and knowledge is one of the major components of any
autonomous system that should be able to incorporate new pieces of information.
In this paper, we argue that to apply rationality result of belief dynamics
theory to various practical problems, it should be generalized in two respects:
first of all, it should allow a certain part of belief to be declared as
immutable; and second, the belief state need not be deductively closed. Such a
generalization of belief dynamics, referred to as base dynamics, is presented,
along with the concept of a generalized revision algorithm for Horn knowledge
bases. We show that Horn knowledge base dynamics has interesting connection
with kernel change and abduction. Finally, we also show that both variants are
rational in the sense that they satisfy certain rationality postulates stemming
from philosophical works on belief dynamics
A New Rational Algorithm for View Updating in Relational Databases
The dynamics of belief and knowledge is one of the major components of any
autonomous system that should be able to incorporate new pieces of information.
In order to apply the rationality result of belief dynamics theory to various
practical problems, it should be generalized in two respects: first it should
allow a certain part of belief to be declared as immutable; and second, the
belief state need not be deductively closed. Such a generalization of belief
dynamics, referred to as base dynamics, is presented in this paper, along with
the concept of a generalized revision algorithm for knowledge bases (Horn or
Horn logic with stratified negation). We show that knowledge base dynamics has
an interesting connection with kernel change via hitting set and abduction. In
this paper, we show how techniques from disjunctive logic programming can be
used for efficient (deductive) database updates. The key idea is to transform
the given database together with the update request into a disjunctive
(datalog) logic program and apply disjunctive techniques (such as minimal model
reasoning) to solve the original update problem. The approach extends and
integrates standard techniques for efficient query answering and integrity
checking. The generation of a hitting set is carried out through a hyper
tableaux calculus and magic set that is focused on the goal of minimality.Comment: arXiv admin note: substantial text overlap with arXiv:1301.515
Compilability of Abduction
Abduction is one of the most important forms of reasoning; it has been
successfully applied to several practical problems such as diagnosis. In this
paper we investigate whether the computational complexity of abduction can be
reduced by an appropriate use of preprocessing. This is motivated by the fact
that part of the data of the problem (namely, the set of all possible
assumptions and the theory relating assumptions and manifestations) are often
known before the rest of the problem. In this paper, we show some complexity
results about abduction when compilation is allowed
On the Complexity of Finding Second-Best Abductive Explanations
While looking for abductive explanations of a given set of manifestations, an
ordering between possible solutions is often assumed. The complexity of
finding/verifying optimal solutions is already known. In this paper we consider
the computational complexity of finding second-best solutions. We consider
different orderings, and consider also different possible definitions of what a
second-best solution is
Self-duality of bounded monotone boolean functions and related problems
AbstractIn this paper we examine the problem of determining the self-duality of a monotone boolean function in disjunctive normal form (DNF). We show that the self-duality of monotone boolean functions with n disjuncts such that each disjunct has at most k literals can be determined in O(2k2k2n) time. This implies an O(n2logn) algorithm for determining the self-duality of logn-DNF functions. We also consider the version where any two disjuncts have at most c literals in common. For this case we give an O(n4(c+1)) algorithm for determining self-duality
Unique key Horn functions
Given a relational database, a key is a set of attributes such that a value
assignment to this set uniquely determines the values of all other attributes.
The database uniquely defines a pure Horn function , representing the
functional dependencies. If the knowledge of the attribute values in set
determines the value for attribute , then is an implicate
of . If is a key of the database, then is an implicate
of for all attributes .
Keys of small sizes play a crucial role in various problems. We present
structural and complexity results on the set of minimal keys of pure Horn
functions. We characterize Sperner hypergraphs for which there is a unique pure
Horn function with the given hypergraph as the set of minimal keys.
Furthermore, we show that recognizing such hypergraphs is co-NP-complete
already when every hyperedge has size two. On the positive side, we identify
several classes of graphs for which the recognition problem can be decided in
polynomial time.
We also present an algorithm that generates the minimal keys of a pure Horn
function with polynomial delay. By establishing a connection between keys and
target sets, our approach can be used to generate all minimal target sets with
polynomial delay when the thresholds are bounded by a constant. As a byproduct,
our proof shows that the Minimum Key problem is at least as hard as the Minimum
Target Set Selection problem with bounded thresholds.Comment: 12 pages, 5 figure