[1990] Proceedings of the 2nd International IEEE Conference on Tools for Artificial Intelligence

6-9 Nov. 1990

Filter Results

Displaying Results 1 - 25 of 123
  • Proceedings of the 2nd International IEEE Conference on Tools for Artificial Intelligence (Cat. No.90CH2915-7)

    Publication Year: 1990
    Request permission for commercial reuse | |PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • The state-of-art AI research in Japan

    Publication Year: 1990
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (55 KB)

    Summary form only given. The state-of-the-art of artificial intelligence (AI) in Japan is reviewed, and attention given to the current results of the fifth-generation project. The technical aspects of AI research are examined, and the computational power of the fifth-generation computer system compared to that of the current workstation in the use of various AI frameworks. The Japanese rationale f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved register allocation algorithm for the WAM model

    Publication Year: 1990, Page(s):651 - 657
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (416 KB)

    An improved adaptable unification order algorithm is presented. It is used in register allocation for a Warren abstract machine (WAM) Prolog implementation. The algorithm is based on the division of a clause into chunks. The purpose is to generate better Prolog codes for programs so that they have fewer instructions and data movements in execution. It is realized by a good conflict handling algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hypothesis generation in conflict based diagnosis

    Publication Year: 1990, Page(s):301 - 307
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (548 KB)

    A probabilistic model for conflict-based diagnostic problem solving is presented. This model provides an objective measure for ranking hypotheses. Based on the probabilistic model, an algorithm which generates plausible diagnostic hypotheses in decreasing order of their probabilities is presented. Some possible uses of the algorithm are discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speculative search: An efficient search algorithm for limited memory

    Publication Year: 1990, Page(s):194 - 200
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (640 KB)

    The authors present a novel algorithm, speculative branch and bound, for performing heuristic search in restricted memory. Speculative branch-and-bound combines elements of best-first and depth-first searches. The authors describe the search and a variant, SIDA* that is analogous to A*. They show how they are related to such searches as IDA* and MA* show how to add pruning to SIDA* and give perfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial intelligence R&D: the ISS strategy

    Publication Year: 1990, Page(s):647 - 650
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (360 KB)

    The authors provide a survey of the artificial intelligence (AI) R&D projects undertaken by the Institute of Systems Science (ISS) of the National University of Singapore. They also describe ISS's AI R&D strategies as well as the AI tools developed for various industrial projects such as the machine translation project with IBM, the connectionist troubleshooting expert system for an inerti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A forward-chaining multiple-context reasoner and its application to logic design

    Publication Year: 1990, Page(s):386 - 392
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (512 KB)

    The authors present an extended production system architecture which can deal with forward reasoning in multiple contexts. The proposed architecture consists of a compiler of clauses and defaults into a Rete-like network, a Rete-based inference engine, and an assumption-based truth maintenance system (ATMS). The inference engine gives intermediate justifications to the ATMS and stores intermediate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building models for qualitative prediction of system dynamic behavior

    Publication Year: 1990, Page(s):294 - 300
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (692 KB)

    The authors present a method of automatically constructing a model or a set of constraints from domain principles for solving the dynamic behavior of a mechanical system through qualitative simulation. The following issues are emphasized: (1) the extraction of a necessary and sufficient set of system constraints which provides the minimum uncertainty associated with qualitative simulation, and (2)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tool for building decision-support-oriented expert systems

    Publication Year: 1990, Page(s):537 - 543
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (448 KB)

    The expert system (ES) tool DECISION-T was built to test the authors' ideas on what characteristics an ES should have and how to reflect them consistently within a system. Concepts such as decision-support-oriented expert systems (DSO-ESs), the interrupt inference process, global-blackboard-based distributed problem solving, knowledge-based modeling, and data extraction are introduced. Multiple kn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive extension of domain datatypes

    Publication Year: 1990, Page(s):189 - 193
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (512 KB)

    Knowledge-based systems can be adapted interactively by non-programming experts to only a limited degree. The authors present an approach that delivers an additional layer of adaptability to such users. The added functionality allows the user to construct and specify the semantics of new domain terms, where these terms may refer to domain entities, characteristics or relations. The approach depend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-directed query processing in expert database systems

    Publication Year: 1990, Page(s):640 - 646
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (632 KB)

    The quality of an answer to a database query can be enhanced by utilizing semantic knowledge such that an expert would use if he/she were to answer the query. A system capable of utilizing such expert knowledge in a deductive database paradigm is presented. A given query is reformulated to reduce the cost of evaluation, to generate a subset of answers in the shortest amount of time, and/or to gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaffolding the RETE network

    Publication Year: 1990, Page(s):378 - 385
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (736 KB)

    Scaffolding is a novel method for improving conjunctive match efficiency that incorporates a TMS (truth maintenance system) into an RETE matcher, thereby exploiting match redundancy between separate runs. The resulting inactivations are reactivations of the data dependencies replace expensive RETE testing with simpler, less costly NETL-like propagations. Experimental results obtained by profiling ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method that combines inductive learning with exemplar-based learning

    Publication Year: 1990, Page(s):31 - 37
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (632 KB)

    A learning approach that combines inductive learning with exemplar-based learning is described. In the method, a concept is represented by two parts: a generalized abstract description and a set of exemplars (exceptions). Generalized descriptions represent the principles of concepts, whereas exemplars represent the exceptional or rare cases. The method is an alternative for solving the problem of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Super-TC: an efficient generic algorithm for processing the instantiated transitive-closure queries in deductive database systems

    Publication Year: 1990, Page(s):841 - 847
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2576 KB)

    A generic algorithm is presented, suitable for processing an important class of recursive queries, the so-called instantiated transitive-closure (TC) queries. The most important characteristics of this algorithm is that it reads any data-page from the system's disk at most once, i.e., the worst-case I/O behavior of this algorithm is linear with respect to the number of pages storing the database. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical comparison of ID3 and HONNs for distortion invariant object recognition

    Publication Year: 1990, Page(s):577 - 582
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (436 KB)

    The authors present results of experiments comparing the performance of the ID3 symbolic learning algorithm with a higher-order neural network (HONN) in the distortion invariant object recognition domain. In this domain, the classification algorithm needs to be able to distinguish between two objects regardless of their position in the input field, their in-plane rotation, or their scale. It is sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How could a shell improve the maintainability of expert systems?

    Publication Year: 1990, Page(s):290 - 291
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (104 KB)

    The author points out two important areas in which next-generation expert system shells could contribute to alleviate some of the problems associated with the maintenance of large expert systems: (1) supporting the development of a consistent domain model, and (2) improving the structure and the modularity of the rule base. The knowledge base of an expert system consists of a model of the problem ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting data parallelism for efficient execution of logic programs with large knowledge bases

    Publication Year: 1990, Page(s):674 - 681
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (732 KB)

    A model is presented which is designed to exploit the data parallelism present in associative computers for the efficient execution of logic programs with very large knowledge bases. A scheme is described for a logical data structure representation incorporating a direct interface between lists and vectors. This interface allows the partial integration of symbolic and numerical computation on exis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schema survival rates and heuristic search in genetic algorithms

    Publication Year: 1990, Page(s):322 - 327
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (400 KB)

    Genetic algorithms are a relatively new paradigm for search in artificial intelligence. It is shown that, for certain kinds of search problems, called permutation problems, the ordinary rule for intermixing the genes between two organisms leads to longer search chains than are necessary. A schema is a partially completed organism. Its order is the number of fixed components and its length is the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cooperation and communication framework for distributed problem solving

    Publication Year: 1990, Page(s):530 - 536
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (396 KB)

    A novel cooperative computation model, Cellula, is proposed, with particular attention given to group organisation and inter-/intragroup communication. This model is designed on two principles. First, it has a facility for abstraction of group behaviors, which makes it possible to cope with recursive problem decomposition. Second, it has a facility (based on blackboard communication) for inter-/in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global knowledge about local dependencies in an integrated database environment

    Publication Year: 1990, Page(s):783 - 791
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (596 KB)

    Modeling concepts and methodologies used for the representation of virtual entities in an object-oriented global data manager of an integrated database environment are considered. These concepts strive to encapsulate knowledge, needed when unifying heterogeneously modeled entities, into a number of object types. With the aid of this knowledge, local dependencies can be made visible to the global d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A graphical constraint-based production system environment

    Publication Year: 1990, Page(s):181 - 188
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (696 KB)

    A novel and effective graphical approach to visually programming rules based on constraints is given. It is shown how constraints can be visualized for rule programming applications and mechanically converted to and from operational tests. User experiments are described that establish the intuitiveness of the pictorial constraint-based rule encodings over a conventional textual language such as OP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing verifiable expert systems

    Publication Year: 1990, Page(s):878 - 884
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (508 KB)

    With the long-range goal of developing a practical methodology for complete verification and validation of expert systems, the authors have investigated methods for designing knowledge bases so that they can be easily verified. These methods are based on extensions of traditional software verification technology and on emerging artificial intelligence programming technology. After discussing the b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relationships in an object knowledge representation model

    Publication Year: 1990, Page(s):632 - 638
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (596 KB)

    SHOOD, an object-oriented model, in which every attribute is a relationship, is discussed. Vertical relationships structuring knowledge (e.g., specialization) and horizontal relationships linking pieces of knowledge (e.g., composition) are distinguished. Here, object hierarchies (vertical) and interobject links (horizontal) are treated equally. Often, only one of these aspects is fully developed. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal neural logic networks

    Publication Year: 1990, Page(s):372 - 376
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (316 KB)

    Neural logic networks are generalized to cater to logical systems where the validity of rules and facts changes with time. To construct a temporal network, the validity of rules and facts is collected at a selection of time instances to determine the connecting weights of the respective instances. The weight of the temporal network is then defined as functions that would produce the known values w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high level compiling implementation of PARLOG based on extended graph rewriting

    Publication Year: 1990, Page(s):507 - 510
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (252 KB)

    An extended graph rewriting computational model is proposed which can implement logic variables, nondeterminism, OR-parallelism, and guard calls of PARLOG very efficiently. It is pointed out that the methods for implementing PARLOG based on this model are better than those in other related research works View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.