336 research outputs found
Coherent Integration of Databases by Abductive Logic Programming
We introduce an abductive method for a coherent integration of independent
data-sources. The idea is to compute a list of data-facts that should be
inserted to the amalgamated database or retracted from it in order to restore
its consistency. This method is implemented by an abductive solver, called
Asystem, that applies SLDNFA-resolution on a meta-theory that relates
different, possibly contradicting, input databases. We also give a pure
model-theoretic analysis of the possible ways to `recover' consistent data from
an inconsistent database in terms of those models of the database that exhibit
as minimal inconsistent information as reasonably possible. This allows us to
characterize the `recovered databases' in terms of the `preferred' (i.e., most
consistent) models of the theory. The outcome is an abductive-based application
that is sound and complete with respect to a corresponding model-based,
preferential semantics, and -- to the best of our knowledge -- is more
expressive (thus more general) than any other implementation of coherent
integration of databases
The KB paradigm and its application to interactive configuration
The knowledge base paradigm aims to express domain knowledge in a rich formal
language, and to use this domain knowledge as a knowledge base to solve various
problems and tasks that arise in the domain by applying multiple forms of
inference. As such, the paradigm applies a strict separation of concerns
between information and problem solving. In this paper, we analyze the
principles and feasibility of the knowledge base paradigm in the context of an
important class of applications: interactive configuration problems. In
interactive configuration problems, a configuration of interrelated objects
under constraints is searched, where the system assists the user in reaching an
intended configuration. It is widely recognized in industry that good software
solutions for these problems are very difficult to develop. We investigate such
problems from the perspective of the KB paradigm. We show that multiple
functionalities in this domain can be achieved by applying different forms of
logical inferences on a formal specification of the configuration domain. We
report on a proof of concept of this approach in a real-life application with a
banking company. To appear in Theory and Practice of Logic Programming (TPLP).Comment: To appear in Theory and Practice of Logic Programming (TPLP
Spectral norm of products of random and deterministic matrices
We study the spectral norm of matrices M that can be factored as M=BA, where
A is a random matrix with independent mean zero entries, and B is a fixed
matrix. Under the (4+epsilon)-th moment assumption on the entries of A, we show
that the spectral norm of such an m by n matrix M is bounded by \sqrt{m} +
\sqrt{n}, which is sharp. In other words, in regard to the spectral norm,
products of random and deterministic matrices behave similarly to random
matrices with independent entries. This result along with the previous work of
M. Rudelson and the author implies that the smallest singular value of a random
m times n matrix with i.i.d. mean zero entries and bounded (4+epsilon)-th
moment is bounded below by \sqrt{m} - \sqrt{n-1} with high probability.Comment: One uncited reference removed from the bibliography. Journal version
to appear in PTRF
Functional protection by acute phase proteins alpha(1)-acid glycoprotein and alpha(1)-antitrypsin against ischemia/reperfusion injury by preventing apoptosis and inflammation.
BACKGROUND: Ischemia followed by reperfusion (I/R) causes apoptosis, inflammation, and tissue damage leading to organ malfunction. Ischemic preconditioning can protect against such injury. This study investigates the contribution of the acute phase proteins alpha(1)-acid glycoprotein (AGP) and alpha(1)-antitrypsin (AAT) to the protective effect of ischemic preconditioning in the kidney. METHODS AND RESULTS: Exogenous AGP and AAT inhibited apoptosis and inflammation after 45 minutes of renal I/R in a murine model. AGP and AAT administered at reperfusion prevented apoptosis at 2 hours and 24 hours, as evaluated by the presence of internucleosomal DNA cleavage, terminal deoxynucleotidyl transferase-mediated dUTP nick end-labeling, and the determination of renal caspase-1- and caspase-3-like activity. AGP and AAT exerted anti-inflammatory effects, as reflected by reduced renal tumor necrosis factor-alpha expression and neutrophil influx after 24 hours. In general, these agents improved renal function. Similar effects were observed when AGP and AAT were administered 2 hours after reperfusion but to a lesser extent and without functional improvement. Moreover, I/R elicited an acute phase response, as reflected by elevated serum AGP and serum amyloid P (SAP) levels after 24 hours, and increased hepatic acute phase protein mRNA levels after 18 hours of renal reperfusion. CONCLUSIONS: We propose that the antiapoptotic and anti-inflammatory effects of AGP and AAT contribute to the delayed type of protection associated with ischemic preconditioning and other insults. This mechanism is potentially involved in the course of many clinical conditions associated with I/R injury. Moreover, exogenous administration of these proteins may provide new therapeutic means of treatmen
Postulates for Revocation Schemes
In access control frameworks with the possibility of delegating
permissions and administrative rights, delegation chains can form. There
are di erent ways to treat these delegation chains when revoking rights,
which give rise to di erent revocation schemes. Hagstr om et al. [11] proposed
a framework for classifying revocation schemes, in which the di erent
revocation schemes are de ned graph-theoretically. At the outset, we identify
multiple problems with Hagstr om et al.'s de nitions of the revocation
schemes, which can pose security risks. This paper is centered around the
question how one can systematically ensure that improved de nitions of the
revocation schemes do not lead to similar problems. For this we propose to
apply the axiomatic method originating in social choice theory to revocation
schemes. Our use of the axiomatic method resembles its use in belief revision
theory. This means that we de ne postulates that describe the desirable behaviour
of revocation schemes, study which existing revocation frameworks
satisfy which postulates, and show how all de ned postulates can be satis ed
by de ning the revocation schemes in a novel way
Retrieval effectiveness of written and spoken queries : an experimental evaluation
With the fast growing speech technologies, the world is emerging to a new speech era. Speech recognition has now become a practical technology for real world applications. While some work has been done to facilitate retrieving information in speech format using textual queries, the characteristics of speech as a way to express an information need has not been extensively studied. If one compares written versus spoken queries, it is intuitive to think that users would issue longer spoken queries than written ones, due to the ease of speech. Is this in fact the case in reality? Also, if this is the case, would longer spoken queries be more effective in helping retrieving relevant document than written ones? This paper presents some new findings derived from an experimental study to test these intuitions
- …