A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
Other analyses on policy based systems include the identification of conflicting policies and policy efficiency evaluation and improvement. ... In this work, we present a discussion and classification of recent research on verification techniques for policy based systems. ... This analysis is implemented through the use of an abductive constraint logic programming system, A-system 1  . ...doi:10.1109/uic-atc.2017.8397415 dblp:conf/uic/KarafiliPL17 fatcat:l7uv7ct6djf5vapb7cyq73zo5i
Analyses based on Pos that use binary decision diagrams (BDDs) have been shown to be efficient for a wide range of practical programs. ... In this paper we develop reasoning techniques for programs in a linear functional language, linPCF, based on their operational behaviour. ...
Handbook of Software Engineering and Knowledge Engineering
In this paper we survey recent work on the use of abduction as a knowledge-based reasoning technique for analysing software specifications. ... We then focus on two applications of abduction in software engineering, namely, analysis and revision of specifications. ... Acknowledgements Many thanks to Tim Menzies and Ken Satoh for providing useful insights about their respective abductive approaches, to Tony Kakas for useful discussions about abduction and abductive tools ...doi:10.1142/9789812389718_0037 fatcat:xb3d225c7zgyfojj62vuvcdpci
Lecture Notes in Computer Science
The implementation is straightforward and seems to provide for abduction, the most efficient of known implementations; the price, however, is a limited use of negations. ... Assumptions and abduction are especially useful for language processing, and we can show how HYPROLOG works seamlessly together with the grammar notation provided by the underlying Prolog system. ... This work was supported by the CONTROL project, funded by the Danish Natural Science Research Council; we also gratefully acknowledge support from Canada's NSERC Discovery Grant program. ...doi:10.1007/11562931_14 fatcat:ryrnilnr5ndgzffhi45gv7w7hq
Abduction with integrity constraints is one example of hypothesis-based reasoning which can be implemented directly in Prolog and CHR with a straightforward use of available and efficiently implemented ... Constraint Handling Rules (CHR) is an extension to Prolog which opens up a spectrum of hypothesis-based reasoning in logic programs without additional interpretation overhead. ... Most known systems are based on metalevel architectures which means that abductive logic programs are interpreted by other logic programs rather than being compiled in an efficient way. ...doi:10.1016/j.jal.2008.10.004 fatcat:vci2qqbucjawdje55gc6cxw2ge
Logic Programming 35 (1998), no. 1, 1-37. Summary: “Program analysis based on abstract interpretation has proven very useful in compilation of constraint and logic program- ming languages. ... Systems Sci., 157, Springer, Berlin, 1997. The paper under review is an overview of the author’s and R. F. Stark’s results on proof systems capturing the operational seman- tics of logic programming. ...
The AI Magazine
Her main research interests are abductive logic and the connection between philosophy of science and AI. ... Sasikumar, for his valuable comments on this review. ... as a formal system for reasoning about programs. ...doi:10.1609/aimag.v23i1.1613 dblp:journals/aim/Aliseda02 fatcat:4gvqgglrsjh3heizr3i4xt3vcm
In this paper, we aim at providing guidance on choosing an algorithm or tool when confronted with the issue of computing explanations in propositional logic-based abduction. ... Keywords Abductive reasoning · Model-based diagnosis · Abductive diagnosis Applied Intelligence (2020) 50:1558-15 2 7 Published online: 2 2020 January 8 A = Damaged pump, Broken filter, Cooler leaks, Cooler ... Ng and Mooney  have conducted an empirical analysis comparing the general abduction system ACCEL to a set of problems in plan recognition as well as consistency model-based and setcovering  ...doi:10.1007/s10489-019-01575-5 fatcat:og3manfccfcofgcd6zywsehwo4
Lecture Notes in Computer Science
Abduction in Logic Programming started in the late 80s, early 90s, in an attempt to extend logic programming into a framework suitable for a variety of problems in Artificial Intelligence and other areas ... The system translates the case bases and the current case into an abductive logic program. ... ABDUAL: Abduction in extended LP  proposes the ABDUAL framework, an abductive framework based on extended logic programs. ...doi:10.1007/3-540-45628-7_16 fatcat:purq4epxdvbpdcno5r7duilxxa
Abduction in Logic Programming started in the late 80s, early 90s, in an attempt to extend logic programming into a framework suitable for a variety of problems in Artificial Intelligence and other areas ... The system translates the case bases and the current case into an abductive logic program. ... ABDUAL: Abduction in extended LP  proposes the ABDUAL framework, an abductive framework based on extended logic programs. ...doi:10.1093/logcom/2.6.719 fatcat:3voi2rfiujdsrllrrgbhbf2qzq
A case study on security policy analysis in distributed coalition networks is described, as an example of many applications of this system. ... We present a general-purpose distributed abductive logic programming system for multi-agent hypothetical reasoning with confidentiality. ... In a Role-based Access Control (RBAC) system, the permission of an action depends on the role(s) assigned to the subject. ...doi:10.4230/lipics.iclp.2011.175 dblp:conf/iclp/MaRBL11 fatcat:rk3nxbmbqvhbxfo3ysff6ydmfq
In this work, we show the processing time of a state-of-the-art logic-based RTE system can be significantly reduced by replacing its search-based axiom injection (abduction) mechanism by that based on ... However, there is a tradeoff between adding more knowledge data for improved RTE performance and maintaining an efficient RTE system, as such a big database is problematic in terms of the memory usage ... Our contributions are summarized as follow: 2 • We propose to combine KBC with a logic-based RTE system for efficient and scalable reasoning. • We develop an efficient abduction plugin for Coq, which we ...doi:10.1609/aaai.v33i01.33017410 fatcat:3aic4w6zpffe5h65bjiadqvq2q
In this work, we show the processing time of a state-of-the-art logic-based RTE system can be significantly reduced by replacing its search-based axiom injection (abduction) mechanism by that based on ... However, there is a tradeoff between adding more knowledge data for improved RTE performance and maintaining an efficient RTE system, as such a big database is problematic in terms of the memory usage ... Our contributions are summarized as follow: 2 • We propose to combine KBC with a logic-based RTE system for efficient and scalable reasoning. • We develop an efficient abduction plugin for Coq, which we ...arXiv:1811.06203v1 fatcat:kacd6r7cangtfelnvkowt5g5ai
Based on a set of structural attributes extracted from the system models, our meta-approach trains a machine learning classifier that forecasts the most runtime efficient abduction technique given a new ... Abduction offers an intuitive concept for diagnostic reasoning relying on the notion of logical entailment. ... We evaluated the algorithm selection method within an empirical set-up based on seven abductive reasoning methods and two benchmarks. ...doi:10.1007/s10489-018-1171-9 fatcat:varekjenirbtvgkkp6plodbmju
Theory: Semantic Foundations, Formalisms, Non- monotonic Reasoning, Knowledge Representation; Implementation: Compilation, Memory Management, Virtual Machines, Parallelism; Environments: Program Analysis ... Related Paradigms: Abductive Logic Programming, Inductive Logic Programming, Constraint Logic Programming, Answer-Set Programming; Applications: Databases, Data Integration and Federation, Software Engineering ... We address this challenge by developing an agent architecture and reasoning algorithms based on Answer Set Programming (ASP). ...doi:10.1017/s1471068414000581 fatcat:6fczd6mhxjcutozkk6t23lvn5e
« Previous Showing results 1 — 15 out of 12,996 results