A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
T his paper deals with computing circumscription in the case of Horn data with additional protection (indefinite data), an intermediate investigation between Reiter'sr esult on predicate completion and ... Lifschitz'se fforts to makeg eneral (formula) circumscription more efficient as a computational tool. ... McCarthy's  later version of circumscription, called formula circumscription, does subsume protected circumscription, but it is not clear that Reiter'sw ork extends to allowo ne to compute efficiently ...doi:10.1016/s0743-1066(85)80002-9 fatcat:pcspjcihtvcybdkayh6f2fm5ji
In addition, future advances in computing cir cumscription can be mapped to improvements in computing theory revisions, and vice versa. ... This paper shows that model-based the ory revision is actually expressible as a form of circumscription. ... The theory revision approach should en joy computational advantages over circumscription, be cause the theory revision approach does not retain any information about previous states of the world. ...dblp:conf/ijcai/Winslett89 fatcat:yhgsvdtagjdwdo3jnj2djmruci
protected circumscription. ... completion and Lifschitz efforts to make general (for- mula) circumscription more efficient as a computational tool. ...
Subrahmanian and Lu  have extended the concept of protected circumscription. ... Minker and Perlis  introduced protected circumsctiption and demonstrated how one can compute in this theory with logic programs. ...doi:10.1016/0743-1066(93)90028-f fatcat:zs5h4ximffdfvapevyr6rvs4fm
Lecture Notes in Computer Science
This approach allows to express many representational and computational tasks in knowledge representation -for example computation of abductive explanations and models with respect to logic programming ... prototype system is described whose core functionality is, based on propositional logic, the elimination of second-order operators, such as Boolean quantifiers and operators for projection, forgetting and circumscription ... Our method then subsumes a variety of tasks: Computation of uniform interpolants, QBF and SAT solving, as well as computation of certain forms of abductive explanations, of propositional circumscription ...doi:10.1007/978-3-642-41524-1_17 fatcat:zzzgdm5icjf65jtutn7eqwlqsa
A second-order circumscription operator then enables nonmonotonic reasoning on the changes implied by a formula. ... Related work Circumscription dates back to  . We use an instanciation of unified circumscription, a new flavor of circumscription which generalises  . ... We combine general domain circumscription (GDC) [9, 14] and parallel predicate circumscription  . ...doi:10.4204/eptcs.306.17 fatcat:fnccj5gdyzd6fpm5gpoi25lusq
We show that such a model is an adequate tool for generating intended interpretations, and also for problems that cannot be satisfactorily solved by circumscription. ... , pointwise, variable, prioritized, protected). ... Implementation: "heuristie computer". OBJECT LEVEL : Axioms + theorems in a well de fined formal system -geometry . ...dblp:conf/ijcai/Zadrozny87 fatcat:qp6eljfgizcvna3i5adls6uamq
This article is protected by copyright. All rights reserved. ... The finding of left atria diverticula (LAD) on cardiac Computed Tomography (CT) images obtained from patients with atrial fibrillation (AF) referred for pulmonary vein isolation is not uncommon. ... They have a circumscriptive ostium and their body shows a variable morphology including cystic, sac like, tubular, and hooked shaped. ...doi:10.1111/jce.14581 pmid:32445428 fatcat:3srmy3rponandoeuvj46zsgwqu
The proof theory appeals to arguments (consistent sets of assumptions) which may conflict with each other and be protected from each other. ... The main theorem describes the effect of the circumscription that solves the frame problem in the pres- ence of ramifications. ...
Circumscription formalizes such preference relations by associating propositional theories with minimal models. ... Lee and Lin (2006) studied theoretical properties of the computational problem associated with circumscription. ... More specifically, the idea of circumscription is to minimize the extension of some predicates. ...arXiv:1707.01423v1 fatcat:6fnygfwx5vfrxkuzvpfc5lpfim
B) A 3 × 3 mm image, immediately adjacent to the previous image, consistent with circumscript inflammatory changes in the epiploic fat of the left flank with a small quantity of free fluid. ... Physical examination Ethical responsibilities Protection of persons and animals. The authors declare that no experiments were performed on humans or animals for this study. Data confidentiality. ...doi:10.1016/j.rgmxen.2015.10.003 fatcat:n7kr3irkuvfmzluu3gpwzhrbri
Lecture Notes in Computer Science
In particular, I will show that if we adopt the event calculus as our logical formalism and employ abductive logic programming as our theorem proving technique, then the computation performed mirrors closely ... Many of the computational concepts central to the literature on partial order planning, such as threats, protected links, promotions and demotions [Chapman, 1987] , [Penberthy & Weld, 1992] , turn out ... Happens(a,t) ≡ def Happens(a,t,t) The frame problem is overcome through circumscription. ...doi:10.1007/3-540-63912-8_101 fatcat:khujelm2knhgldpl636vzpcroa
Tumor diameter, PPAD administration, PTBE and tumor site were closely correlated with early postoperative seizures; PTBE and PPAD administration were risk and protective factors, respectively. ... The correlation of the 14 clinical factors (gender, tumor site, dyskinesia, peritumoral brain edema (PTBE), tumor diameter, pre-and postoperative prophylaxes, surgery time, tumor adhesion, circumscription ... All the patients had been diagnosed by head magnetic resonance imaging and/or computed tomography scans, and the gross tumor volume, tumor site and any peritumoral brain edema (PTBE) were preliminarily ...doi:10.3892/mco.2015.493 pmid:26137257 pmcid:PMC4471514 fatcat:4c6iyveedrfrpj3l23amhmhvdy
The basic principle has been developed from that underlying Kelley's tables for the computation of partial correlations. P. T. YOUNG (Illinois) 641. CALKINS, M. ... The task which the study of circumscript attributes sets for itself is the working out of a new "dynamology." ...doi:10.1037/h0067001 fatcat:suaqqh5vinaf7gwwr6i3o7xyfu
Natural Gas - Extraction to End Use
This has an impact on contract prices and the consumer must be protected against significant variations in prices. ... Financial ratios are open to different explanations depending on the tacit knowledge that people have of the company, and the reasons to compute them  . ...doi:10.5772/54131 fatcat:ngvuejoubjckjli4zlymw4l4wm
« Previous Showing results 1 — 15 out of 1,423 results