By Topic

Knowledge and Data Engineering, IEEE Transactions on

Issue 1 • Date Feb 1995

Filter Results

Displaying Results 1 - 13 of 13
  • Reasoning in inconsistent knowledge bases

    Publication Year: 1995 , Page(s): 177 - 189
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1104 KB)  

    Databases and knowledge bases could be inconsistent in many ways. For example, during the construction of an expert system, we may consult many different experts. Each expert may provide us with a group of rules and facts which are self-consistent. However, when we coalesce the facts and rules provided by these different experts, inconsistency may arise. Alternatively, knowledge bases may be incon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the reliability of AI planning software in real-time applications

    Publication Year: 1995 , Page(s): 4 - 13
    Cited by:  Papers (15)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (908 KB)  

    We define the reliability of a real-time system incorporating AI planning programs as the probability that, for each problem-solving request issued from the environment, the embedded system can successfully plan and execute a response within a specified real-time deadline. A methodology is developed for evaluating the reliability of such systems taking into consideration the fact that, other than ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structuring knowledge in vague domains

    Publication Year: 1995 , Page(s): 120 - 136
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1340 KB)  

    We propose a model for structuring knowledge in vague and continuous domains where similarity plays a role in coming up with plausible inferences. The model consists of two levels, one of which is an inference network with nodes representing concepts and links representing roles connecting concepts, and the other is a microfeature-based replica of the first level. Based on the interaction between ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data partition and parallel evaluation of Datalog programs

    Publication Year: 1995 , Page(s): 163 - 176
    Cited by:  Papers (4)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1212 KB)  

    Parallel bottom-up evaluation provides an alternative for the efficient evaluation of logic programs. Existing parallel evaluation strategies are neither effective nor efficient in determining the data to be transmitted among processors. In this paper, we propose re different strategy, for general Datalog programs, that is based on the partitioning of data rather than that of rule instantiations. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrity constraints in the information source tracking method

    Publication Year: 1995 , Page(s): 106 - 119
    Cited by:  Papers (5)  |  Patents (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1076 KB)  

    We study the issue of integrity constraints in the Information Source Tracking (IST) method. The IST method is an approach to the management of uncertain data in database systems. The main idea behind IST is that database information is supplied, or confirmed, by information sources. The accuracy of data is modeled by the reliability of the contributing information sources. In practice, informatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linearizing some recursive logic programs

    Publication Year: 1995 , Page(s): 137 - 149
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (996 KB)  

    We give a sufficient condition under which the least fixpoint of the equation X=a+f(X)X equals the least fixpoint of the equation X=a+f(a)X. We then apply that condition to recursive logic programs containing chain rules: we translate it into a sufficient condition under which a recursive logic program containing n⩾2 recursive calls in the bodies of the rules is equivalent to a linear program ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating knowledge acquisition: a propositional approach to representing expertise as an alternative to repertory grid technique

    Publication Year: 1995 , Page(s): 53 - 67
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1440 KB)  

    Repertory grid technique plays a central role in the elicitation methodology of many well-reported knowledge acquisition tools or workbenches. However, the dependability of these systems is low where the technique breaks down or proves inadequate due to limited expressive power and other problems. The paper introduces an alternate approach based on Personal Construct Theory that elicits an expert'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the reliability of artificial intelligence planning systems by analyzing their failure recovery

    Publication Year: 1995 , Page(s): 14 - 25
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1200 KB)  

    As planning technology improves, artificial intelligence planners are being embedded in increasingly complicated environments: ones that are particularly challenging even for human experts. Consequently, failure is becoming both increasingly likely for these systems (due to the difficult and dynamic nature of the new environments) and increasingly important to address (due to the systems' potentia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A meta-level control architecture for production systems

    Publication Year: 1995 , Page(s): 44 - 52
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (820 KB)  

    Recent production system applications have been experiencing exceedingly difficult software maintenance problems. This is because the control of rule firings has been buried in the production rules themselves. To cope with this problem, we propose a meta-level control architecture for production systems, where procedural programming languages, such as Lisp and C, are employed to explicitly describ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extended Petri net model for normal logic programs

    Publication Year: 1995 , Page(s): 150 - 162
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1004 KB)  

    This paper presents an application of the concepts of siphons (deadlocks) and inhibitor arcs in Petri net theory to logic programs with negations. More specifically, an extended Petri net is used to model function-free normal logic programs. In this model, because of the presence of inhibitor arcs, the arbitrary applications of firing rule may cause a contradictory situation. We suggest two direct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Response time analysis of EQL real-time rule-based systems

    Publication Year: 1995 , Page(s): 26 - 43
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1512 KB)  

    Real-time rule-based expert systems are embedded decision systems that must respond to changes in the environments within stringent timing constraints. Given a program p, the response time analysis problem is to determine the response time of p. This problem consists of: determining whether or not the execution of p always terminates in bounded time; and computing the maximal execution time of p. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compiling conceptual graphs

    Publication Year: 1995 , Page(s): 68 - 81
    Cited by:  Papers (9)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1100 KB)  

    The paper addresses problems in conceptual graph implementation: subsumption and classification in a taxonomy. Conceptual graphs are typically stored using a directed acyclic graph data structure based on the partial order over conceptual graphs. We give an improved algorithm for classifying conceptual graphs into this hierarchy. It prunes the search space in the database using the information gat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge model for unifying deductive and non-deductive heterogeneous databases

    Publication Year: 1995 , Page(s): 82 - 105
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1764 KB)  

    A new, much-needed knowledge model for integrating heterogeneous knowledge represented by independently developed deductive rules and diverse data models has been developed and is presented. It has the strength and expressiveness necessary to unify seemingly disparate, autonomous components. Separate components, including rules, are modeled as functional units. A complete set of relationships, or ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Knowledge and Data Engineering (TKDE) informs researchers, developers, managers, strategic planners, users, and others interested in state-of-the-art and state-of-the-practice activities in the knowledge and data engineering area.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Jian Pei
Simon Fraser University

Associate Editor-in-Chief
Xuemin Lin
University of New South Wales

Associate Editor-in-Chief
Lei Chen
Hong Kong University of Science and Technology