336 research outputs found

    Coherent Integration of Databases by Abductive Logic Programming

    Full text link
    We introduce an abductive method for a coherent integration of independent data-sources. The idea is to compute a list of data-facts that should be inserted to the amalgamated database or retracted from it in order to restore its consistency. This method is implemented by an abductive solver, called Asystem, that applies SLDNFA-resolution on a meta-theory that relates different, possibly contradicting, input databases. We also give a pure model-theoretic analysis of the possible ways to `recover' consistent data from an inconsistent database in terms of those models of the database that exhibit as minimal inconsistent information as reasonably possible. This allows us to characterize the `recovered databases' in terms of the `preferred' (i.e., most consistent) models of the theory. The outcome is an abductive-based application that is sound and complete with respect to a corresponding model-based, preferential semantics, and -- to the best of our knowledge -- is more expressive (thus more general) than any other implementation of coherent integration of databases

    The KB paradigm and its application to interactive configuration

    Full text link
    The knowledge base paradigm aims to express domain knowledge in a rich formal language, and to use this domain knowledge as a knowledge base to solve various problems and tasks that arise in the domain by applying multiple forms of inference. As such, the paradigm applies a strict separation of concerns between information and problem solving. In this paper, we analyze the principles and feasibility of the knowledge base paradigm in the context of an important class of applications: interactive configuration problems. In interactive configuration problems, a configuration of interrelated objects under constraints is searched, where the system assists the user in reaching an intended configuration. It is widely recognized in industry that good software solutions for these problems are very difficult to develop. We investigate such problems from the perspective of the KB paradigm. We show that multiple functionalities in this domain can be achieved by applying different forms of logical inferences on a formal specification of the configuration domain. We report on a proof of concept of this approach in a real-life application with a banking company. To appear in Theory and Practice of Logic Programming (TPLP).Comment: To appear in Theory and Practice of Logic Programming (TPLP

    Spectral norm of products of random and deterministic matrices

    Full text link
    We study the spectral norm of matrices M that can be factored as M=BA, where A is a random matrix with independent mean zero entries, and B is a fixed matrix. Under the (4+epsilon)-th moment assumption on the entries of A, we show that the spectral norm of such an m by n matrix M is bounded by \sqrt{m} + \sqrt{n}, which is sharp. In other words, in regard to the spectral norm, products of random and deterministic matrices behave similarly to random matrices with independent entries. This result along with the previous work of M. Rudelson and the author implies that the smallest singular value of a random m times n matrix with i.i.d. mean zero entries and bounded (4+epsilon)-th moment is bounded below by \sqrt{m} - \sqrt{n-1} with high probability.Comment: One uncited reference removed from the bibliography. Journal version to appear in PTRF

    Functional protection by acute phase proteins alpha(1)-acid glycoprotein and alpha(1)-antitrypsin against ischemia/reperfusion injury by preventing apoptosis and inflammation.

    Get PDF
    BACKGROUND: Ischemia followed by reperfusion (I/R) causes apoptosis, inflammation, and tissue damage leading to organ malfunction. Ischemic preconditioning can protect against such injury. This study investigates the contribution of the acute phase proteins alpha(1)-acid glycoprotein (AGP) and alpha(1)-antitrypsin (AAT) to the protective effect of ischemic preconditioning in the kidney. METHODS AND RESULTS: Exogenous AGP and AAT inhibited apoptosis and inflammation after 45 minutes of renal I/R in a murine model. AGP and AAT administered at reperfusion prevented apoptosis at 2 hours and 24 hours, as evaluated by the presence of internucleosomal DNA cleavage, terminal deoxynucleotidyl transferase-mediated dUTP nick end-labeling, and the determination of renal caspase-1- and caspase-3-like activity. AGP and AAT exerted anti-inflammatory effects, as reflected by reduced renal tumor necrosis factor-alpha expression and neutrophil influx after 24 hours. In general, these agents improved renal function. Similar effects were observed when AGP and AAT were administered 2 hours after reperfusion but to a lesser extent and without functional improvement. Moreover, I/R elicited an acute phase response, as reflected by elevated serum AGP and serum amyloid P (SAP) levels after 24 hours, and increased hepatic acute phase protein mRNA levels after 18 hours of renal reperfusion. CONCLUSIONS: We propose that the antiapoptotic and anti-inflammatory effects of AGP and AAT contribute to the delayed type of protection associated with ischemic preconditioning and other insults. This mechanism is potentially involved in the course of many clinical conditions associated with I/R injury. Moreover, exogenous administration of these proteins may provide new therapeutic means of treatmen

    Postulates for Revocation Schemes

    Get PDF
    In access control frameworks with the possibility of delegating permissions and administrative rights, delegation chains can form. There are di erent ways to treat these delegation chains when revoking rights, which give rise to di erent revocation schemes. Hagstr om et al. [11] proposed a framework for classifying revocation schemes, in which the di erent revocation schemes are de ned graph-theoretically. At the outset, we identify multiple problems with Hagstr om et al.'s de nitions of the revocation schemes, which can pose security risks. This paper is centered around the question how one can systematically ensure that improved de nitions of the revocation schemes do not lead to similar problems. For this we propose to apply the axiomatic method originating in social choice theory to revocation schemes. Our use of the axiomatic method resembles its use in belief revision theory. This means that we de ne postulates that describe the desirable behaviour of revocation schemes, study which existing revocation frameworks satisfy which postulates, and show how all de ned postulates can be satis ed by de ning the revocation schemes in a novel way

    FO(ID) as an Extension of DL with Rules

    Full text link

    Retrieval effectiveness of written and spoken queries : an experimental evaluation

    Get PDF
    With the fast growing speech technologies, the world is emerging to a new speech era. Speech recognition has now become a practical technology for real world applications. While some work has been done to facilitate retrieving information in speech format using textual queries, the characteristics of speech as a way to express an information need has not been extensively studied. If one compares written versus spoken queries, it is intuitive to think that users would issue longer spoken queries than written ones, due to the ease of speech. Is this in fact the case in reality? Also, if this is the case, would longer spoken queries be more effective in helping retrieving relevant document than written ones? This paper presents some new findings derived from an experimental study to test these intuitions
    • …
    corecore