๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Verification of non-monotonic knowledge bases

โœ Scribed by Neli P Zlatareva


Book ID
114155097
Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
93 KB
Volume
21
Category
Article
ISSN
0167-9236

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Dynamic updates of non-monotonic knowled
โœ J.J. Alferes; J.A. Leite; L.M. Pereira; H. Przymusinska; T.C. Przymusinski ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 215 KB

In this paper we investigate updates of knowledge bases represented by logic programs. In order to represent negative information, we use generalized logic programs which allow default negation not only in rule bodies but also in their heads. We start by introducing the notion of an update P รˆ U of

Verification and validation of Bayesian
โœ Eugene Santos Jr. ๐Ÿ“‚ Article ๐Ÿ“… 2001 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 218 KB

Knowledge-base V&V primarily addresses the question: ``Does my knowledge-base contain the right answer and can I arrive at it?'' One of the main goals of our work is to properly encapsulate the knowledge representation and allow the expert to work with manageable-sized chunks of the knowledge-base.

Verification and correctness issues for
โœ Grigoris Antoniou ๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 147 KB

Anomalies such as redundant, contradictory, or deficient knowledge in a knowledge base indicate possible errors. Various methods for detecting such anomalies have been introduced, analyzed, and applied in the past years, but they usually deal with rule-based systems. So far, little attention has bee

Foundation and application of knowledge
โœ Alun D. Preece; Rajjan Shinghal ๐Ÿ“‚ Article ๐Ÿ“… 1994 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 1020 KB

Anomalies such as redundant, contradictory, and deficient knowledge in a knowledge base are symptoms of probable errors. Detecting anomalies is a well-established method for verifying knowledge-based systems. Although many tools have been developed to perform anomaly detection, several important iss