82,853 research outputs found
Beliefs and Conflicts in a Real World Multiagent System
In a real world multiagent system, where the
agents are faced with partial, incomplete and
intrinsically dynamic knowledge, conflicts are
inevitable. Frequently, different agents have
goals or beliefs that cannot hold simultaneously.
Conflict resolution methodologies have to be
adopted to overcome such undesirable occurrences.
In this paper we investigate the application of
distributed belief revision techniques as the support
for conflict resolution in the analysis of the
validity of the candidate beams to be produced
in the CERN particle accelerators.
This CERN multiagent system contains a higher
hierarchy agent, the Specialist agent, which
makes use of meta-knowledge (on how the conflicting
beliefs have been produced by the other
agents) in order to detect which beliefs should be
abandoned. Upon solving a conflict, the Specialist
instructs the involved agents to revise their
beliefs accordingly.
Conflicts in the problem domain are mapped into
conflicting beliefs of the distributed belief revision
system, where they can be handled by
proven formal methods. This technique builds
on well established concepts and combines them
in a new way to solve important problems. We
find this approach generally applicable in several
domains
Coherent Integration of Databases by Abductive Logic Programming
We introduce an abductive method for a coherent integration of independent
data-sources. The idea is to compute a list of data-facts that should be
inserted to the amalgamated database or retracted from it in order to restore
its consistency. This method is implemented by an abductive solver, called
Asystem, that applies SLDNFA-resolution on a meta-theory that relates
different, possibly contradicting, input databases. We also give a pure
model-theoretic analysis of the possible ways to `recover' consistent data from
an inconsistent database in terms of those models of the database that exhibit
as minimal inconsistent information as reasonably possible. This allows us to
characterize the `recovered databases' in terms of the `preferred' (i.e., most
consistent) models of the theory. The outcome is an abductive-based application
that is sound and complete with respect to a corresponding model-based,
preferential semantics, and -- to the best of our knowledge -- is more
expressive (thus more general) than any other implementation of coherent
integration of databases
Phenomenological Psychopathology and Psychiatric Classification
In this chapter, I provide an overview of phenomenological approaches to psychiatric classification. My aim is to encourage and facilitate philosophical debate over the best ways to classify psychiatric disorders. First, I articulate phenomenological critiques of the dominant approach to classification and diagnosis—i.e., the operational approach employed in the Diagnostic and Statistical Manual of Mental Disorders (DSM-5) and the International Classification of Diseases (ICD-10). Second, I describe the type or typification approach to psychiatric classification, which I distinguish into three different versions: ideal types, essential types, and prototypes. I argue that despite their occasional conflation in the contemporary literature, there are important distinctions among these approaches. Third, I outline a new phenomenological-dimensional approach. I show how this approach, which starts from basic dimensions of human existence, allows us to investigate the full range of psychopathological conditions without accepting the validity of current diagnostic categories
Datalog± Ontology Consolidation
Knowledge bases in the form of ontologies are receiving increasing attention as they allow to clearly represent both the available knowledge, which includes the knowledge in itself and the constraints imposed to it by the domain or the users. In particular, Datalog ± ontologies are attractive because of their property of decidability and the possibility of dealing with the massive amounts of data in real world environments; however, as it is the case with many other ontological languages, their application in collaborative environments often lead to inconsistency related issues. In this paper we introduce the notion of incoherence regarding Datalog± ontologies, in terms of satisfiability of sets of constraints, and show how under specific conditions incoherence leads to inconsistent Datalog ± ontologies. The main contribution of this work is a novel approach to restore both consistency and coherence in Datalog± ontologies. The proposed approach is based on kernel contraction and restoration is performed by the application of incision functions that select formulas to delete. Nevertheless, instead of working over minimal incoherent/inconsistent sets encountered in the ontologies, our operators produce incisions over non-minimal structures called clusters. We present a construction for consolidation operators, along with the properties expected to be satisfied by them. Finally, we establish the relation between the construction and the properties by means of a representation theorem. Although this proposal is presented for Datalog± ontologies consolidation, these operators can be applied to other types of ontological languages, such as Description Logics, making them apt to be used in collaborative environments like the Semantic Web.Fil: Deagustini, Cristhian Ariel David. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Bahía Blanca. Instituto de Ciencias e Ingeniería de la Computación. Universidad Nacional del Sur. Departamento de Ciencias e Ingeniería de la Computación. Instituto de Ciencias e Ingeniería de la Computación; ArgentinaFil: Martinez, Maria Vanina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Bahía Blanca. Instituto de Ciencias e Ingeniería de la Computación. Universidad Nacional del Sur. Departamento de Ciencias e Ingeniería de la Computación. Instituto de Ciencias e Ingeniería de la Computación; ArgentinaFil: Falappa, Marcelo Alejandro. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Bahía Blanca. Instituto de Ciencias e Ingeniería de la Computación. Universidad Nacional del Sur. Departamento de Ciencias e Ingeniería de la Computación. Instituto de Ciencias e Ingeniería de la Computación; ArgentinaFil: Simari, Guillermo Ricardo. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Bahía Blanca. Instituto de Ciencias e Ingeniería de la Computación. Universidad Nacional del Sur. Departamento de Ciencias e Ingeniería de la Computación. Instituto de Ciencias e Ingeniería de la Computación; Argentin
Estimating Impact and Frequency of Risks to Safety and Mission Critical Systems Using CVSS
Many safety and mission critical systems depend on the correct and secure operation of both supportive and core software systems. E.g., both the safety of personnel and the effective execution of core missions on an oil platform depend on the correct recording storing, transfer and interpretation of data, such as that for the Logging While Drilling (LWD) and Measurement While Drilling (MWD) subsystems. Here, data is recorded on site, packaged and then transferred to an on-shore operational centre. Today, the data is transferred on dedicated communication channels to ensure a secure and safe transfer, free from deliberately and accidental faults. However, as the cost control is ever more important some of the transfer will be over remotely accessible infrastructure in the future. Thus, communication will be prone to known security vulnerabilities exploitable by outsiders. This paper presents a model that estimates risk level of known vulnerabilities as a combination of frequency and impact estimates derived from the Common Vulnerability Scoring System (CVSS). The model is implemented as a Bayesian Belief Network (BBN)
Evaluation of elicitation methods to quantify Bayes linear models
The Bayes linear methodology allows decision makers to express their subjective beliefs and adjust these beliefs as observations are made. It is similar in spirit to probabilistic Bayesian approaches, but differs as it uses expectation as its primitive. While substantial work has been carried out in Bayes linear analysis, both in terms of theory development and application, there is little published material on the elicitation of structured expert judgement to quantify models. This paper investigates different methods that could be used by analysts when creating an elicitation process. The theoretical underpinnings of the elicitation methods developed are explored and an evaluation of their use is presented. This work was motivated by, and is a precursor to, an industrial application of Bayes linear modelling of the reliability of defence systems. An illustrative example demonstrates how the methods can be used in practice
Workplace Dispute Resolution and the Management of Individual Conflict —A Thematic Analysis of Five Case Studies
This Acas funded report explores the management of individual conflict and the resolution of employment disputes in five organisations drawing on over one hundred hours of interview data gathered from discussions with HR practitioners, line and operational managers, employee representatives, and trained mediators. In light of increased concern over the impact of employment disputes on public expenditure, economic performance and employee well-being, substantial policy attention has been paid to the ways in which organisations respond to workplace conflict. In particular, there has been an increased focus on the potential for earlier intervention in order to resolve conflict through the use of alternative approaches such as mediation. Surprisingly, there has been relatively little contemporary academic research into these important issues. Therefore, this thematic review aims to provide new insights into the challenges faced by organisations in managing conflict
- …