Information Evaluation in fusion: a case study. Laurence Cholvy. ONERA Centre de Toulouse, BP 4025, 2 av Ed Belin, Toulouse, France

Size: px
Start display at page:

Download "Information Evaluation in fusion: a case study. Laurence Cholvy. ONERA Centre de Toulouse, BP 4025, 2 av Ed Belin, Toulouse, France"

Transcription

1 Information Evaluation in fusion: a case study Laurence Cholvy ONERA Centre de Toulouse, BP 4025, 2 av Ed Belin, Toulouse, France cholvy@cert.fr Abstract. This paper examines a case study of information fusion 1.. It focuses on some recommendations dened by NATO relatively to information evaluation in intelligence. These recommendations, written in natural language, are ambiguous and imprecise and we discuss the fact that they dene a scale for evaluating information. We then propose a model of information evaluation, which takes into account the main notions which underline the recommendations and we show its use in the fusion process. Keywords: application, information fusion 1 Introduction An important step in the intelligence gathering process is the fusion of information provided by several sources. The objective of this process is to build an up-to-date and correct view of the current situation with the overall available information in order to make adequate decisions. Moreover, to succeed in this process, it is important to associate with each available information, some attributes like the number of the sources that support it, their reliability, the degree of truth of the information etc. For the moment, these attributes are managed by the human operator when he fuses information provided by the dierent sources. But there is no real methodology to do this in a formal manner. And, when relaying this fusion process to a machine, we need to develop formal denitions and algorithms to manage these attributes in addition to fusing information. Furthermore, in a context of interoperability where dierent systems exchange information, common denitions of these attributes have to be shared. The Standardization Agreements (STANAG) 2022 of North Atlantic Treaty Organization (NATO) denes a framework for such common denitions. The aim of this paper is to analyse the STANAG 2022 recommendations about information evaluation and to dene a formal and non ambiguous system for evaluating information. Indeed, as it will be shown, the present recommendations, written in natural language are rather ambiguous and imprecise and are subject to discussion. 1 This work was supported by SPOTI (Service des Programmes d'observation de Telecommunication et d'information) grant DTIM/PTF/001/01.02

2 Consequently, the main contribution of this paper is not a new theory for information fusion, but is to show how to adapt some existing theory to the case of information evaluation in intelligence agreeing with recommendations of NATO. This paper is organized as follows. Section 2 presents STANAG 2022 recommendations. It also lists some criticisms that can be done and points out the main notions that underline these recommendations. Section 3 presents a formal model for evaluating information which tends to agree with these notions. Section 4 shows the application of this model in information fusion process. An example is described in section 5. Finally, section 6 is devoted to a discussion. 2 Discussion on STANAG 2022 recommendations The Annex to STANAG 2022 (Edition 8) [1] explicitly mentions that the aim of information evaluation is to indicate the degree of condence that may be placed in any item of information which has been obtained for intelligence. (...) This is achieved by adopting an alphanumeric system of rating which combines a measurement of the reliability of the source of information with a measurement of the credibility of that information when examined in the light of existing knowledge. Examining the whole text leads us to point out that the two main notions of this evaluation system are the reliability of the sources and the credibility of the information. These notions are dened in the STANAG 2022 recommendations, as follows: Reliability of the source is designated by a letter between A and F signifying various degrees of condence as indicated below. { a source is evaluated A if it is completely reliable. It refers to a tried and trusted source which can be depended upon with condence { a source is evaluated B if it is usually reliable. It refers to a source which has been successfully used in the past but for which there is still some element of doubt in particular cases. { a source is evaluated C if it is fairly reliable. It refers to a source which has occasionally been used in the past and upon which some degree of condence can be based. { a source is evaluated D if it is not usually reliable. It refers to a source which has been used in the past but has proved more often than not unreliable. { a source is evaluated E if it is unreliable. It refers to a source which has been used in the past and has proved unworthy of any condence. { a source is evaluated F if its reliability cannot be judged. It refers to a source which has not been used in the past. Credibility of information is designated by a number between 1 and 6 signifying varying degrees of condence as indicated below. { If it can be stated with certainty that the reported information originates from another source than the already existing information on the same subject, then it is classied as \conrmed by other sources" and rated 1.

3 { If the independence of the source of any item of information cannot be guaranteed, but if, from the quantity and quality of previous reports, its likelihood is nevertheless regarded as suciently established, then the information should be classied as \probably true" and given a rating of 2. { If, despite there being insucient conmation to establish any higher degree of likelihood, a freshyly reported item of information does not conict with the previously reported behaviour pattern of the target, the item may be classied as \possibly true" and given a rating of 3. { An item of information which tends to conict with the previously reported or established behaviour pattern of an intelligence target should be classied as \doubtful" and given a rating of 4 { An item of information which positively contradicts previously reported information or conicts with the established behaviour pattern of an intelligence target in a marked degree should be classied as \improbable" and given a rating of 5 { An item of information is given a rating of 6 if its truth cannot be judged. The previous denitions of information evaluation can be discussed. Indeed, since they are given in natural language, they are quite imprecise and ambiguous. Let us discuss three points. According to the previous recommendations, the reliability of a source is dened in reference to its use in the past. It can be measured for example, as the ratio of the number of times it gave a true information to the number of times it gave information. However, this denition does not take into account the actual environment of use of the information source. For instance, even if it is known to be reliable, an infra-red sensor loose reliability when it rains. Concerning the credibility of information, it seems that the rating dened according to the recommendations does not qualify an unique property. For instance, how should we note an item of information supported by several sources of information which is also conictual with some already registered information? According to these denitions, this item should be given a rating of 1 and should also be given a rating of 5. Furthermore, according to the recommendations, a rating of 6 should be given to an item whose truth cannot be judged. This suppposes that the other ratings (1...5) concern the evaluation of the truth of information. If so, rating of 1 should be given to a true information. But, as it is dened, rating of 1 should be given to an item supported by at least two sources. This is questionable since, the dierent sources (even if they agree) may emit false information. However, even if the previous recommendations can be discussed, one can see that the three main notions which underline the evaluation system are : { the number of sources that support an information { their reliability { the fact that the information tends to conict or conicts with some available information

4 These three characteristics are independent. For instance, two sources, one being fully reliable and the other not usually reliable may have emitted the same piece of information. Furthermore, this piece of information may be contradictory with another piece of information. In the following, we present a model of evaluation which takes into account the number of the sources and their reliability but which does not make a distinction between \tending to conict" and \conicting". In this model, that unique notion of conict is represented by the property of inconsistency. 3 Proposal for a formal model of evaluation In order to dene an evaluation as close as possible to the one recommended by the STANAG, an information evaluation will still be a pair. But the meaning of the two members of that pair will be dierent. This meaning is given below. We consider a propositional language L, used to express information. Information will then be formulas of L. M od(f ) will demote the set of models of the formula F. We consider several sources of information which deliver information about an observed situation. Each source of information is associated with its degree of reliability, which is a letter belonging to fa; :::; Eg depending on the fact that this source is judged more or less reliable. Notice that this denition could be rened by dening the degree of reliability of a source according to the probability that this source gives true information in the current context of use. Rening this denition is not necessary for the following. Each information emitted by a source is stored in a database DB with its evaluation as dened by the following denition. Denition. The evaluation of a formula F, denoted eval(f ), is a pair < V; m >, such that : { V is a vector of letters belonging to fa; B; C; D; Eg. The length of this vector indicates the number of sources which support the information and the contents of the vector reects their reliability degrees. { m is an integer which is equal to 1 i the information is consistent with the other avalaible information stored in DB or equal to 2 else. Examples. The evaluation < (A); 1 > is associated with an information which has been emitted by a completely reliable source and which is consistent with the current state of DB. The evaluation < (A; C); 2 > is associated with an information which is supported by two sources, one being completely reliable, the other one being fairly reliable, and which is inconsistent with the current state of DB. One can notice that in a given state of DB, the evaluation of an information is unique. However, an information evaluation may change during time as it will be shown in the following.

5 4 Application of this model in fusion In this section, we show how to apply this previous model is the process of information fusion. That process is the following: as soon as an item of information is emitted by a source (sensor, human), it is stored in DB with its appropriate evaluation. From time to time, queries are asked to DB in order to make decisions. Besides DB, we also have a set of constraints, IC, stating what is true for certain in the real world. For instance IC may contain the following rules if the observed object is a plane, then it is not an helicopter, if a vehicule moves north, then it does not move south, etc Registering an information into DB Let us consider an information F emitted by a source whose reliability is r. The following algorithm describes the registration, in DB, of F associated with its evaluation. { If F is not yet stored in DB. F is consistent with DB [ IC. Then F is stored in DB with the evaluation << r >; 1 >. F is inconsistent with DB [ IC. Then F is stored in DB with the evaluation << r >; 2 >. Let S i = ffi 1 ni ; :::Fi g (i = 1...n) the minimal subsets of DB inconsistent with F [ IC. Then 8i = 1:::n 8j = 1:::n i, if the evaluation of Fi j was < V j i ; m > then it is updated and becomes < Vi j ; 2 >. { If F is already stored in DB. Assume that F is stored in DB with the evaluation << V >; m >. Then this evaluation becomes < V 0 ; m > where V 0 is the vector obtained by agregating V with r. Notice that the length of the vector has been incremented by 1 (indeed, one more source supports F ), but m is not changed : even if one more source emitted F, this does not change the fact that F is (or not) consistent with DB [ IC. Remark. In this last case, we should also check the independance of the dierent sources of information which have emitted F. But, in order to simplify the presentation of the model, we assume independence of these sources. So, nally DB is a nite set of formulas associated with their evaluation. We can then write DB = f< F 1 ; eval(f 1 ) > :::: < F n ; eval(f n ) >g. 4.2 Querying DB The problem is now to answer a query addressed to DB. Let Q be a formula expressing this query. We denote jjqjj DB;IC the answer to Q addressed to DB under the constraints IC.

6 In the following, we show that given IC, DB can be associated with an unique consistent set of formulas of L, denoted merge(db; IC) and we will dene jjqjj DB;IC according to the satisfaction of Q in this set. merge(db; IC) is here dened by extending a majority merging operator by taking into account weigthed sum instead of sum. The weigths here will be numbers (5, 4, 3, 2, 1) which intend to represent, on a numerical scale, the dierent degrees of reliability of the sources (A, B, C, D, E). Denition of W We recall here some denitions introduced by Konieczny and Pino-Perez [2] [3] and adapt them for our purpose. Let db 1...db n be n sets of formulas of L and IC a set of integrity constraints. Konieczny and Pino-Perez dened a majority merging operator, denoted ;IC, such that the set of models of the information source which is obtained from merging db 1... db n with this operator, is semantically characterized by: M od( ;IC ([db 1 ; :::; db n ])) = min [db 1 :::dbn ] (Mod(IC)) [db 1:::db n] is a total pre-order on M od(ic) dened by: w [db 1:::db n] w 0 i d (w; [db 1 :::db n ]) d (w 0 ; [db 1 :::db n ]) with d (w; [db 1 :::db n ]) = nx i=1 min d(w; w 0 ) w 0 2Mod(db i) where d(w; w 0 ) is the Hamming distance (i.e, the number of propositional letters whose valuation diers from w to w 0 ). In other words, when merging db 1 :::db n with the operator ;IC, the result is semantically characterized by the models of IC which are minimal according to the pre-order [db 1;:::;db n]. As Konieczny and Pino-Perez explicitely mentionned it in conclusion of [2], this merging operator ;IC can be extended by taking into account a weigthed sum instead a simple sum However, the properties of this operator remain to be studied. In the following, we suggest such an extension, which fully agrees with the weighted model-tting approach of Revesz [4] to the revision of a (possibly inconsistent) weighted knowldege-base by a formula. We assume now that any db i is associated with an integer denoted r(db i ). We dene W;IC by : M od( W;IC ([db 1 ; :::; db n ])) = min W [db 1 :::dbn ] (M od(ic)) W [db 1:::db n] is a total pre-order on M od(ic) dened by:

7 with i.e, w W [db 1:::db n] w 0 i d W (w; [db 1 :::db n ]) d W (w 0 ; [db 1 :::db n ]) d W (w; [db 1 :::db n ]) = d W (w; [db 1 :::db n ]) = nx i=1 nx i=1 min d(w; w 0 ):r(db i ) w 0 2Mod(db i) r(db i ): min d(w; w 0 ) w 0 2Mod(db i) Denition of merge(db; IC). Consider DB = f< F 1 ; eval(f 1 ) > :::: < F n ; eval(f n ) >g. For i = 1:::n, let us denote eval(f i ) =< (d 1 i :::dpi i ); m i >, Then we associate DB with db 1 1 :::dbp 1 1 :::db1 n :::dbpn n where : { 8i = 1:::n, db 1 i = db2 i = ::: = dbpi i = ff i g { 8j = 1:::p i, r(db j i ) = 5 (resp; 4; 3; 2; 1) iff dj i = A (resp; B; C; D; E) merge(db; IC) is the consistent set of formulas of L so that M od(merge(db; IC)) = W;IC ([db 1 1 :::dbpn n ]) Denition of the answer to Q When addressed to DB, the answer to query Q is dened by: jjqjj DB;IC = Y ES iff j= merge(db; IC)! Q jjqjj DB;IC = N O iff j= merge(db; IC)! :Q jjqjj DB;IC =? else An alternative to answers denition. According to the approach adopted here, one can check that, in order to remain as close as possible to the recommendations, we have considered a second attribute in the evaluation of a piece of information, intending to represent its degree of inconsistency, but this attribute is not useful: the conictual aspect of an information is taken into account in the fusion process when querying the database. However, since the conictual aspect of an information seems to be important for intelligence, we suggest to modify the denition of answers as it is done in [5]. There, we suggest to associate answers with explanations as follows. Let Q be a query, the possible answers that the evaluator can generate are: { Yes, and there is no proof against it (resp, No, and there is no proof against it) when some source prove Q and no other source provide :Q.

8 { Yes, by majority (resp, No, by majority) when the number of the sources which prove Q (resp, :Q) is strictly greater than the number of the sources which provide :Q (resp, Q) { Don't know, due to a balanced inconsistency when the number of the sources which provides Q is equal to the number of the sources which provide :Q. { Dont't know, due to a lack of information when no source provide Q nor :Q. In the rst case, the explanation means that the information Q is supposed to be true and this is not conictual. In the second case, the explanation means that even if, by the majority merging process, Q is supposed to be true, this is somewhat conictual. In the third case, the explanation means that Q is highly conictual and the majority vote cannot help to decide. We do not give more detail about this alternative denition. 5 An exemple We assume a propositional language with letters a; b and c. And we assume a set of constraints IC = f:a _ :b; :a _ :cg. For instance, a could mean the observed object is a plane, b could mean the observed object is an helicopter and c could mean the altitude of the observed object is less than 3 km We consider four information sources called One; T wo; T hree and F our, whose reliability are respectively A, B, C and D. We consider the following ow of emissions: At this step, we have One emits b, then T wo emits a, then T hree emits a, then F our emits c, then One emits c. DB = f< a; < (B; C); 2 >>; < b; < (A); 2 >>; < c; < (D; A); 2 >>g The questions that raise are: is a true? is b true? is c true?... By the previous denitions, we can dene: db 1 1 = fag and r(db 1 1) = 4 db 2 1 = fag and r(db2 1 ) = 3 db 1 2 = fbg and r(db 1 2) = 5 db 1 3 = fcg and r(db 1 3) = 2 db 2 3 = fcg and r(db 2 3) = 5 The ve models of IC are: w 1 = fa; :b; :cg; w 2 = f:a; b; cg; w 3 = f:a; b; :cg, w 4 = f:a; :b; cg and w 5 = f:a; :b; :cg. Then we can compute the following distances:

9 d W (w 1 ; [db 1 1 :::db2 3]) = 12 d W (w 2 ; [db 1 1 :::db2 3]) = 7 d W (w 3 ; [db 1 1 :::db2 3]) = 14 d W (w 4 ; [db 1 1 :::db2 3]) = 12 d W (w 5 ; [db 1 1 :::db2 3 ]) = 19 Thus, M erge(db; IC) = w 2 = f:a; b; cg. Then nally, jjajj DB;IC = N O, jjbjj DB;IC = Y ES, jjcjj DB;IC = Y ES. Coming back to the intuitive meaning we gave to letters, it would mean that, given what has been registered in DB until now by the dierent sources and given their reliability, the most plausible answer is that the observed object is not a plane, it is an helicopeter which ies at less than 3km high. 6 Discussion This works intended to formalize some informal recommendations about information evaluation in information fusion. Most of the informal notions underlying the recommendations have been given a formal interpretation. However, some of them have not yet been taken into account. For instance, in this present work, we made no dierence between \being conictual" and \tending to be conictual". This last notion assumes that there is a scale for dening conicts. In the present work, this scale is binary and the formal notion which represents the conict is the logical inconsistency. Extension to graded conict is foreseen in future work. Another point which has been left aside is the total ignorance about the reliability of a given source, which was a case forseen in the recommendations. In the present formalization, it seems dicult to represent that. Indeed, which number can be attached to a source whose reliability is not known? That is an open question. However, this formalization proved that the second attribute in the evaluation of an information is not necessary. Thus, the evaluation of an information could be simplied and memorizing only the number of the sources that emitted it and their reliability is enough. As for the method of fusion, we have chosen a weighted majority because it takes into account the number of the sources and their reliability. If the number of the sources had not been so important, we could have chosen a method taking into account the reliability of the sources only (see [6], [7], [8] for instance). As for arbitration merging operator as characterized in [2] or [3], it does not consider as essential the number of sources which support an information. As for implementation issues, in order to automatically compute the answers to queries, we suggest to slightly modify the query-evaluator dened in [9] by taking into account the reliability of the sources. That extension is obvious. However, it must be recalled that this evaluator is valid only in some particular case. More specically, when 8i = 1:::n 8j = 1:::p i db i [ IC is equivalent to a set of atomic formulas, which is the case of the example given in section 5.

10 References 1. Annex to STANAG 2022 (Edition 8) North Atlantic Treaty Organization (NATO) Information Handling Services, DODSID, Issue DW S. Konieczny and R. Pino-Perez. On the logic of merging. In Principles of Knowledge Representation and Reasoning (KR'98), pages 488{498, S. Konieczny and R. Pino-Perez. Merging with Integrity Constraints In Proceedings of ESCQARU'99 4. P. Z. Revesz. On the semantics of arbitration. In International Journal of Algebra and Computation, vol 7, no 2, pp 130{160, L. Cholvy and C. Garion. Answering queries addressed to several databases according to a majority merging approach Submitted to publication. 6. C. Baral and S. Kraus and J. Minker and V.S. Subrahmanian. Combining multiple knowledge bases. IEEE Trans. on Knowledge and Data Engineering, 3(2), L. Cholvy. Proving theorems in a multi-sources environment. Proceedings of IJCAI, C. Liau. A conservative Approach to Distributed Belief Fusion Proceedings of FUSION, L. Cholvy and C. Garion. Answering queries addressed to merged databases: a query evaluator which implements a majority approach. In M-S Hacid, Z.W. Ras, D.A. Zighed, and Y. Kodrato, editors, Proc. of ISMIS-2002, LNAI n o 2366, p 131{139. Springer, june 2002.

Information Evaluation: Discussion about STANAG 2022 Recommendations

Information Evaluation: Discussion about STANAG 2022 Recommendations Information Evaluation: Discussion about STANAG 2022 Recommendations Laurence Cholvy ONERA Centre de Toulouse BP 4025, 2 avenue Edouard Belin 31055 Toulouse FRANCE cholvy@cert.fr Vincent Nimier ONERA Centre

More information

A Preference Semantics. for Ground Nonmonotonic Modal Logics. logics, a family of nonmonotonic modal logics obtained by means of a

A Preference Semantics. for Ground Nonmonotonic Modal Logics. logics, a family of nonmonotonic modal logics obtained by means of a A Preference Semantics for Ground Nonmonotonic Modal Logics Daniele Nardi and Riccardo Rosati Dipartimento di Informatica e Sistemistica, Universita di Roma \La Sapienza", Via Salaria 113, I-00198 Roma,

More information

Encoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic

Encoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic Encoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic Salem Benferhat CRIL-CNRS, Université d Artois rue Jean Souvraz 62307 Lens Cedex France benferhat@criluniv-artoisfr

More information

Conflict-Based Merging Operators

Conflict-Based Merging Operators Proceedings, Eleventh International Conference on Principles of Knowledge Representation and Reasoning (2008) Conflict-Based Merging Operators Patricia Everaere Sébastien Konieczny Pierre Marquis LIFL

More information

An Alternative To The Iteration Operator Of. Propositional Dynamic Logic. Marcos Alexandre Castilho 1. IRIT - Universite Paul Sabatier and

An Alternative To The Iteration Operator Of. Propositional Dynamic Logic. Marcos Alexandre Castilho 1. IRIT - Universite Paul Sabatier and An Alternative To The Iteration Operator Of Propositional Dynamic Logic Marcos Alexandre Castilho 1 IRIT - Universite Paul abatier and UFPR - Universidade Federal do Parana (Brazil) Andreas Herzig IRIT

More information

Stochastic dominance with imprecise information

Stochastic dominance with imprecise information Stochastic dominance with imprecise information Ignacio Montes, Enrique Miranda, Susana Montes University of Oviedo, Dep. of Statistics and Operations Research. Abstract Stochastic dominance, which is

More information

Merging Stratified Knowledge Bases under Constraints

Merging Stratified Knowledge Bases under Constraints Merging Stratified Knowledge Bases under Constraints Guilin Qi, Weiru Liu, David A. Bell School of Electronics, Electrical Engineering and Computer Science Queen s University Belfast Belfast, BT7 1NN,

More information

An Egalitarist Fusion of Incommensurable Ranked Belief Bases under Constraints

An Egalitarist Fusion of Incommensurable Ranked Belief Bases under Constraints An Egalitarist Fusion of Incommensurable Ranked Belief Bases under Constraints Salem Benferhat and Sylvain Lagrue and Julien Rossit CRIL - Université d Artois Faculté des Sciences Jean Perrin Rue Jean

More information

brels: A System for the Integration of Knowledge Bases

brels: A System for the Integration of Knowledge Bases brels: A System for the Integration of Knowledge Bases Paolo Liberatore and Marco Schaerf Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 113, I-00198, Roma, Italy

More information

Laboratoire d'informatique Fondamentale de Lille

Laboratoire d'informatique Fondamentale de Lille Laboratoire d'informatique Fondamentale de Lille Publication IT { 314 Operators with Memory for Iterated Revision Sebastien Konieczny mai 1998 c L.I.F.L. { U.S.T.L. LABORATOIRE D'INFORMATIQUE FONDAMENTALE

More information

Splitting a Default Theory. Hudson Turner. University of Texas at Austin.

Splitting a Default Theory. Hudson Turner. University of Texas at Austin. Splitting a Default Theory Hudson Turner Department of Computer Sciences University of Texas at Austin Austin, TX 7872-88, USA hudson@cs.utexas.edu Abstract This paper presents mathematical results that

More information

Quota and Gmin Merging Operators

Quota and Gmin Merging Operators Quota and Gmin Merging Operators Patricia Everaere Sébastien Konieczny Pierre Marquis CRIL - Université d Artois 62307 Lens, France {everaere, konieczny, marquis}@cril.univ-artois.fr Abstract In this paper,

More information

current set (database, belief set) and none of the elements b l, 1 l n, belongs to the current set then, in the case of rule (1), the item a should be

current set (database, belief set) and none of the elements b l, 1 l n, belongs to the current set then, in the case of rule (1), the item a should be Annotated revision programs Victor Marek Inna Pivkina Miros law Truszczynski Department of Computer Science, University of Kentucky, Lexington, KY 40506-0046 marek inna mirek@cs.engr.uky.edu Abstract Revision

More information

Collective obligations, commitments and individual. obligations: a preliminary study. Laurence Cholvy and Christophe Garion.

Collective obligations, commitments and individual. obligations: a preliminary study. Laurence Cholvy and Christophe Garion. Collective obligations, commitments and individual obligations: a preliminary study Laurence Cholvy and Christophe Garion ONERA Toulouse 2 avenue Edouard Belin BP 4025, 31055 Toulouse Cedex 4 email: fcholvy,

More information

Knowledge Discovery. Zbigniew W. Ras. Polish Academy of Sciences, Dept. of Comp. Science, Warsaw, Poland

Knowledge Discovery. Zbigniew W. Ras. Polish Academy of Sciences, Dept. of Comp. Science, Warsaw, Poland Handling Queries in Incomplete CKBS through Knowledge Discovery Zbigniew W. Ras University of orth Carolina, Dept. of Comp. Science, Charlotte,.C. 28223, USA Polish Academy of Sciences, Dept. of Comp.

More information

Integrating State Constraints and Obligations in Situation Calculus

Integrating State Constraints and Obligations in Situation Calculus Integrating State Constraints and Obligations in Situation Calculus Robert Demolombe ONERA-Toulouse 2, Avenue Edouard Belin BP 4025, 31055 Toulouse Cedex 4, France. Robert.Demolombe@cert.fr Pilar Pozos

More information

Arguing and Explaining Classifications

Arguing and Explaining Classifications Arguing and Explaining Classifications Leila Amgoud IRIT CNRS 118, route de Narbonne 31062, Toulouse, France amgoud@irit.fr Mathieu Serrurier IRIT CNRS 118, route de Narbonne 31062, Toulouse, France serrurier@irit.fr

More information

A generic framework for resolving the conict in the combination of belief structures E. Lefevre PSI, Universite/INSA de Rouen Place Emile Blondel, BP

A generic framework for resolving the conict in the combination of belief structures E. Lefevre PSI, Universite/INSA de Rouen Place Emile Blondel, BP A generic framework for resolving the conict in the combination of belief structures E. Lefevre PSI, Universite/INSA de Rouen Place Emile Blondel, BP 08 76131 Mont-Saint-Aignan Cedex, France Eric.Lefevre@insa-rouen.fr

More information

Computing the acceptability semantics. London SW7 2BZ, UK, Nicosia P.O. Box 537, Cyprus,

Computing the acceptability semantics. London SW7 2BZ, UK, Nicosia P.O. Box 537, Cyprus, Computing the acceptability semantics Francesca Toni 1 and Antonios C. Kakas 2 1 Department of Computing, Imperial College, 180 Queen's Gate, London SW7 2BZ, UK, ft@doc.ic.ac.uk 2 Department of Computer

More information

Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department Universi

Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department Universi Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department University of Kentucky Lexington, KY 40506-0046 fpaweljmirekg@cs.engr.uky.edu

More information

A Split-combination Method for Merging Inconsistent Possibilistic Knowledge Bases

A Split-combination Method for Merging Inconsistent Possibilistic Knowledge Bases A Split-combination Method for Merging Inconsistent Possibilistic Knowledge Bases Guilin Qi 1,2, Weiru Liu 1, David H. Glass 2 1 School of Computer Science Queen s University Belfast, Belfast BT7 1NN 2

More information

Updating Disjunctive Databases via Model. Trees. John Grant. Computer and Information Sciences, Towson State University.

Updating Disjunctive Databases via Model. Trees. John Grant. Computer and Information Sciences, Towson State University. Updating Disjunctive Databases via Model Trees John Grant Computer and Information Sciences, Towson State University Jaros law Gryz Computer Science Department, University of Maryland, College Park Jack

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

A Framework for Merging Qualitative Constraints Networks

A Framework for Merging Qualitative Constraints Networks Proceedings of the Twenty-First International FLAIRS Conference (2008) A Framework for Merging Qualitative Constraints Networks Jean-François Condotta, Souhila Kaci and Nicolas Schwind Université Lille-Nord

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

Annotated revision programs

Annotated revision programs Annotated revision programs Victor Marek Inna Pivkina Miros law Truszczyński Department of Computer Science, University of Kentucky, Lexington, KY 40506-0046 marek inna mirek@cs.engr.uky.edu Abstract Revision

More information

Potential Cases, Methodologies, and Strategies of Synthesis of. Solutions in Distributed Expert Systems. Minjie Zhang

Potential Cases, Methodologies, and Strategies of Synthesis of. Solutions in Distributed Expert Systems. Minjie Zhang Potential Cases, Methodologies, and Strategies of Synthesis of Solutions in Distributed Expert Systems Minjie Zhang School of Computer, and Information Sciences Edith Cowan University, WA 6027, Australia

More information

Chapter 4: Classical Propositional Semantics

Chapter 4: Classical Propositional Semantics Chapter 4: Classical Propositional Semantics Language : L {,,, }. Classical Semantics assumptions: TWO VALUES: there are only two logical values: truth (T) and false (F), and EXTENSIONALITY: the logical

More information

Adding a temporal dimension to a logic. Abstract. We introduce a methodology whereby an arbitrary logic system L can be enriched

Adding a temporal dimension to a logic. Abstract. We introduce a methodology whereby an arbitrary logic system L can be enriched Adding a temporal dimension to a logic system MARCELO FINGER and DOV M. GABBAY Imperial College, Department of Computing January 11, 1993 Abstract. We introduce a methodology whereby an arbitrary logic

More information

Nested Epistemic Logic Programs

Nested Epistemic Logic Programs Nested Epistemic Logic Programs Kewen Wang 1 and Yan Zhang 2 1 Griffith University, Australia k.wang@griffith.edu.au 2 University of Western Sydney yan@cit.uws.edu.au Abstract. Nested logic programs and

More information

Default Reasoning and Belief Revision: A Syntax-Independent Approach. (Extended Abstract) Department of Computer Science and Engineering

Default Reasoning and Belief Revision: A Syntax-Independent Approach. (Extended Abstract) Department of Computer Science and Engineering Default Reasoning and Belief Revision: A Syntax-Independent Approach (Extended Abstract) Dongmo Zhang 1;2, Zhaohui Zhu 1 and Shifu Chen 2 1 Department of Computer Science and Engineering Nanjing University

More information

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v 250) Contents 2 Vector Spaces 1 21 Vectors in R n 1 22 The Formal Denition of a Vector Space 4 23 Subspaces 6 24 Linear Combinations and

More information

Incompatibility Paradoxes

Incompatibility Paradoxes Chapter 22 Incompatibility Paradoxes 22.1 Simultaneous Values There is never any difficulty in supposing that a classical mechanical system possesses, at a particular instant of time, precise values of

More information

Halpern situations incomparable as far as normality or likelihood goes. For example, one situation may be better in one dimension but worse in another

Halpern situations incomparable as far as normality or likelihood goes. For example, one situation may be better in one dimension but worse in another Journal of Articial Intelligence Research 7 (1997) 1{24 Submitted 2/97; published 7/97 Dening Relative Likelihood in Partially-Ordered Preferential Structures Joseph Y. Halpern Cornell University, Computer

More information

Introduction to Metalogic 1

Introduction to Metalogic 1 Philosophy 135 Spring 2012 Tony Martin Introduction to Metalogic 1 1 The semantics of sentential logic. The language L of sentential logic. Symbols of L: (i) sentence letters p 0, p 1, p 2,... (ii) connectives,

More information

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins.

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins. On-line Bin-Stretching Yossi Azar y Oded Regev z Abstract We are given a sequence of items that can be packed into m unit size bins. In the classical bin packing problem we x the size of the bins and try

More information

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) Contents 1 Vector Spaces 1 1.1 The Formal Denition of a Vector Space.................................. 1 1.2 Subspaces...................................................

More information

Knowledge representation DATA INFORMATION KNOWLEDGE WISDOM. Figure Relation ship between data, information knowledge and wisdom.

Knowledge representation DATA INFORMATION KNOWLEDGE WISDOM. Figure Relation ship between data, information knowledge and wisdom. Knowledge representation Introduction Knowledge is the progression that starts with data which s limited utility. Data when processed become information, information when interpreted or evaluated becomes

More information

Prime Forms and Minimal Change in Propositional Belief Bases

Prime Forms and Minimal Change in Propositional Belief Bases Annals of Mathematics and Artificial Intelligence manuscript No. (will be inserted by the editor) Prime Forms and Minimal Change in Propositional Belief Bases J. Marchi G. Bittencourt L. Perrussel Received:

More information

Discrete Probability and State Estimation

Discrete Probability and State Estimation 6.01, Spring Semester, 2008 Week 12 Course Notes 1 MASSACHVSETTS INSTITVTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.01 Introduction to EECS I Spring Semester, 2008 Week

More information

From Constructibility and Absoluteness to Computability and Domain Independence

From Constructibility and Absoluteness to Computability and Domain Independence From Constructibility and Absoluteness to Computability and Domain Independence Arnon Avron School of Computer Science Tel Aviv University, Tel Aviv 69978, Israel aa@math.tau.ac.il Abstract. Gödel s main

More information

Genuine atomic multicast in asynchronous distributed systems

Genuine atomic multicast in asynchronous distributed systems Theoretical Computer Science 254 (2001) 297 316 www.elsevier.com/locate/tcs Genuine atomic multicast in asynchronous distributed systems Rachid Guerraoui, Andre Schiper Departement d Informatique, Ecole

More information

Static Analysis Techniques for. Predicting the Behavior of Database Production Rules. Alexander Aiken. Jennifer Widom. Joseph M.

Static Analysis Techniques for. Predicting the Behavior of Database Production Rules. Alexander Aiken. Jennifer Widom. Joseph M. tatic Analysis Techniques for Predicting the Behavior of Database Production Rules Alexander Aiken Jennifer Widom Joseph M. Hellerstein IBM Almaden Research Center 650 Harry Road an Jose, CA 95120 faiken,widomg@almaden.ibm.com,

More information

Propositional Logic Review

Propositional Logic Review Propositional Logic Review UC Berkeley, Philosophy 142, Spring 2016 John MacFarlane The task of describing a logical system comes in three parts: Grammar Describing what counts as a formula Semantics Defining

More information

Proof techniques (section 2.1)

Proof techniques (section 2.1) CHAPTER 1 Proof techniques (section 2.1) What we have seen so far: 1.1. Theorems and Informal proofs Argument: P 1 P n Q Syntax: how it's written Semantic: meaning in a given interpretation Valid argument:

More information

Introduction to Metalogic

Introduction to Metalogic Philosophy 135 Spring 2008 Tony Martin Introduction to Metalogic 1 The semantics of sentential logic. The language L of sentential logic. Symbols of L: Remarks: (i) sentence letters p 0, p 1, p 2,... (ii)

More information

Conciliation through Iterated Belief Merging

Conciliation through Iterated Belief Merging Conciliation through Iterated Belief Merging Olivier Gauwin Sébastien Konieczny Pierre Marquis CRIL CNRS Université d Artois, Lens, France {gauwin, konieczny, marquis}@cril.fr Abstract Two families of

More information

Combining Answer Sets of Nonmonotonic Logic Programs

Combining Answer Sets of Nonmonotonic Logic Programs Combining Answer Sets of Nonmonotonic Logic Programs Chiaki Sakama 1 and Katsumi Inoue 2 1 Department of Computer and Communication Sciences Wakayama University, Sakaedani, Wakayama 640-8510, Japan sakama@sys.wakayama-u.ac.jp

More information

Towards an operator for merging taxonomies

Towards an operator for merging taxonomies Towards an operator for merging taxonomies Amélie Cordier 1 and Jean Lieber 234 and Julien Stevenot 234 Abstract. The merging of knowledge bases is a fundamental part of the collaboration in continuous

More information

On the Use of an ATMS for Handling Conflicting Desires

On the Use of an ATMS for Handling Conflicting Desires On the Use of an ATMS for Handling Conflicting Desires Leila Amgoud and Claudette Cayrol Institut de Recherche en Informatique de Toulouse 118, route de Narbonne 31062 Toulouse, France {amgoud, ccayrol}@irit.fr

More information

Math 42, Discrete Mathematics

Math 42, Discrete Mathematics c Fall 2018 last updated 10/10/2018 at 23:28:03 For use by students in this class only; all rights reserved. Note: some prose & some tables are taken directly from Kenneth R. Rosen, and Its Applications,

More information

WHAT REASONABLE FIRST-ORDER QUERIES ARE PERMITTED BY TRAKHTENBROT'S THEOREM? Arnon Avron and Joram Hirschfeld. Raymond and Beverly Sackler

WHAT REASONABLE FIRST-ORDER QUERIES ARE PERMITTED BY TRAKHTENBROT'S THEOREM? Arnon Avron and Joram Hirschfeld. Raymond and Beverly Sackler WHAT REASONABLE FIRST-ORDER QUERIES ARE PERMITTED BY TRAKHTENBROT'S THEOREM? Arnon Avron and Joram Hirschfeld Raymond and Beverly Sackler Faculty of Exact Sciences School of Mathematical Sciences Tel Aviv

More information

Anew index of component importance

Anew index of component importance Operations Research Letters 28 (2001) 75 79 www.elsevier.com/locate/dsw Anew index of component importance F.K. Hwang 1 Department of Applied Mathematics, National Chiao-Tung University, Hsin-Chu, Taiwan

More information

your eyes is more reliable than the information about the position of the object coming from your ears. But even reliable sources such as domain exper

your eyes is more reliable than the information about the position of the object coming from your ears. But even reliable sources such as domain exper A logic for reasoning with inconsistent knowledge Nico Roos Research Institute for Knowledge Systems Tongersestraat 6 P. O. Box 463, 6200 AL Maastricht The Netherlands This paper has been published in

More information

CHAPTER 4 CLASSICAL PROPOSITIONAL SEMANTICS

CHAPTER 4 CLASSICAL PROPOSITIONAL SEMANTICS CHAPTER 4 CLASSICAL PROPOSITIONAL SEMANTICS 1 Language There are several propositional languages that are routinely called classical propositional logic languages. It is due to the functional dependency

More information

Stabilizing Boolean Games by Sharing Information

Stabilizing Boolean Games by Sharing Information John Grant Sarit Kraus Michael Wooldridge Inon Zuckerman Stabilizing Boolean Games by Sharing Information Abstract. We address the issue of manipulating games through communication. In the specific setting

More information

1 The Well Ordering Principle, Induction, and Equivalence Relations

1 The Well Ordering Principle, Induction, and Equivalence Relations 1 The Well Ordering Principle, Induction, and Equivalence Relations The set of natural numbers is the set N = f1; 2; 3; : : :g. (Some authors also include the number 0 in the natural numbers, but number

More information

On flexible database querying via extensions to fuzzy sets

On flexible database querying via extensions to fuzzy sets On flexible database querying via extensions to fuzzy sets Guy de Tré, Rita de Caluwe Computer Science Laboratory Ghent University Sint-Pietersnieuwstraat 41, B-9000 Ghent, Belgium {guy.detre,rita.decaluwe}@ugent.be

More information

This second-order avor of default logic makes it especially useful in knowledge representation. An important question is, then, to characterize those

This second-order avor of default logic makes it especially useful in knowledge representation. An important question is, then, to characterize those Representation Theory for Default Logic V. Wiktor Marek 1 Jan Treur 2 and Miros law Truszczynski 3 Keywords: default logic, extensions, normal default logic, representability Abstract Default logic can

More information

Optimal Rejuvenation for. Tolerating Soft Failures. Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi.

Optimal Rejuvenation for. Tolerating Soft Failures. Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi. Optimal Rejuvenation for Tolerating Soft Failures Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi Abstract In the paper we address the problem of determining the optimal time

More information

Inconsistency-Tolerance in Knowledge-Based Systems by Dissimilarities

Inconsistency-Tolerance in Knowledge-Based Systems by Dissimilarities Inconsistency-Tolerance in Knowledge-Based Systems by Dissimilarities Ofer Arieli 1 and Anna Zamansky 2 1 Department of Computer Science, The Academic College of Tel-Aviv, Israel. oarieli@mta.ac.il 2 Institute

More information

Measuring the Good and the Bad in Inconsistent Information

Measuring the Good and the Bad in Inconsistent Information Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence Measuring the Good and the Bad in Inconsistent Information John Grant Department of Computer Science, University

More information

Iterated Belief Change: A Transition System Approach

Iterated Belief Change: A Transition System Approach Iterated Belief Change: A Transition System Approach Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.ca Abstract We use

More information

Uncertainty and Rules

Uncertainty and Rules Uncertainty and Rules We have already seen that expert systems can operate within the realm of uncertainty. There are several sources of uncertainty in rules: Uncertainty related to individual rules Uncertainty

More information

Then RAND RAND(pspace), so (1.1) and (1.2) together immediately give the random oracle characterization BPP = fa j (8B 2 RAND) A 2 P(B)g: (1:3) Since

Then RAND RAND(pspace), so (1.1) and (1.2) together immediately give the random oracle characterization BPP = fa j (8B 2 RAND) A 2 P(B)g: (1:3) Since A Note on Independent Random Oracles Jack H. Lutz Department of Computer Science Iowa State University Ames, IA 50011 Abstract It is shown that P(A) \ P(B) = BPP holds for every A B. algorithmically random

More information

Logic and Philosophical Logic. 1 Inferentialism. Inferentialism and Meaning Underdetermination

Logic and Philosophical Logic. 1 Inferentialism. Inferentialism and Meaning Underdetermination Logic and Philosophical Logic Inferentialism and Meaning Underdetermination AC Paseau alexanderpaseau@philosophyoxacuk 28 January 2019 In the rst half of today's class, we looked at Tarski's account of

More information

1 Introduction In this paper we propose a framework for studying the process of database revision. Revisions that we have in mind are specied by means

1 Introduction In this paper we propose a framework for studying the process of database revision. Revisions that we have in mind are specied by means Revision programming Victor W. Marek Miros law Truszczynski Department of Computer Science University of Kentucky Lexington, KY 40506-0027 Abstract In this paper we introduce revision programming a logic-based

More information

Abstract. In this paper we present a query answering system for solving non-standard

Abstract. In this paper we present a query answering system for solving non-standard Answering Non-Standard Queries in Distributed Knowledge-Based Systems Zbigniew W. Ras University of North Carolina Department of Comp. Science Charlotte, N.C. 28223, USA ras@uncc.edu Abstract In this paper

More information

Non-elementary Lower Bound for Propositional Duration. Calculus. A. Rabinovich. Department of Computer Science. Tel Aviv University

Non-elementary Lower Bound for Propositional Duration. Calculus. A. Rabinovich. Department of Computer Science. Tel Aviv University Non-elementary Lower Bound for Propositional Duration Calculus A. Rabinovich Department of Computer Science Tel Aviv University Tel Aviv 69978, Israel 1 Introduction The Duration Calculus (DC) [5] is a

More information

2 Transition Systems Denition 1 An action signature consists of three nonempty sets: a set V of value names, a set F of uent names, and a set A of act

2 Transition Systems Denition 1 An action signature consists of three nonempty sets: a set V of value names, a set F of uent names, and a set A of act Action Languages Michael Gelfond Department of Computer Science University of Texas at El Paso Austin, TX 78768, USA Vladimir Lifschitz Department of Computer Sciences University of Texas at Austin Austin,

More information

for Propositional Temporal Logic with Since and Until Y. S. Ramakrishna, L. E. Moser, L. K. Dillon, P. M. Melliar-Smith, G. Kutty

for Propositional Temporal Logic with Since and Until Y. S. Ramakrishna, L. E. Moser, L. K. Dillon, P. M. Melliar-Smith, G. Kutty An Automata-Theoretic Decision Procedure for Propositional Temporal Logic with Since and Until Y. S. Ramakrishna, L. E. Moser, L. K. Dillon, P. M. Melliar-Smith, G. Kutty Department of Electrical and Computer

More information

Plan Modication versus Plan Generation: A Complexity-Theoretic Perspective. German Research Center for Articial Intelligence (DFKI)

Plan Modication versus Plan Generation: A Complexity-Theoretic Perspective. German Research Center for Articial Intelligence (DFKI) Plan Modication versus Plan Generation: A Complexity-Theoretic Perspective Bernhard Nebel Jana Koehler German Research Center for Articial Intelligence (DFKI) Stuhlsatzenhausweg 3, D-6623 Saarbrucken,

More information

Quasi-merging and Pure-arbitration on Information for the Family of Adaptive Logics ADM

Quasi-merging and Pure-arbitration on Information for the Family of Adaptive Logics ADM Quasi-merging and Pure-arbitration on Information for the Family of Adaptive Logics ADM Giuseppe Primiero Giuseppe.Primiero@UGent.be Centre for Logic and Philosophy of Science, Ghent University, Belgium

More information

Trichotomy Results on the Complexity of Reasoning with Disjunctive Logic Programs

Trichotomy Results on the Complexity of Reasoning with Disjunctive Logic Programs Trichotomy Results on the Complexity of Reasoning with Disjunctive Logic Programs Mirosław Truszczyński Department of Computer Science, University of Kentucky, Lexington, KY 40506, USA Abstract. We present

More information

On the equivalence of logic-based argumentation systems

On the equivalence of logic-based argumentation systems On the equivalence of logic-based argumentation systems Leila Amgoud Srdjan Vesic IRIT CNRS, 118 route de Narbonne 31062 Toulouse Cedex 9, France amgoud@irit.fr, vesic@irit.fr Abstract. Equivalence between

More information

if and only if t ;; (A) t ;; (B), t ;+ (A) t ;+ (B), t +; (A) t ++ (B), and t ++ (A) t ++ (B). To make a description more adequate, we can perform one

if and only if t ;; (A) t ;; (B), t ;+ (A) t ;+ (B), t +; (A) t ++ (B), and t ++ (A) t ++ (B). To make a description more adequate, we can perform one Intervals (Pairs of Fuzzy Values), Triples, etc.: Can We Thus Get an Arbitrary Ordering? Vladik Kreinovich Computer Science, University of Texas, El Paso, TX 79968, USA, vladik@cs.utep.edu Masao Mukaidono

More information

Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for en

Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for en Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for enlargements with an arbitrary state space. We show in

More information

On 3-valued paraconsistent Logic Programming

On 3-valued paraconsistent Logic Programming Marcelo E. Coniglio Kleidson E. Oliveira Institute of Philosophy and Human Sciences and Centre For Logic, Epistemology and the History of Science, UNICAMP, Brazil Support: FAPESP Syntax Meets Semantics

More information

A Theory of Forgetting in Logic Programming

A Theory of Forgetting in Logic Programming A Theory of Forgetting in Logic Programming Kewen Wang 1,2 and Abdul Sattar 1,2 and Kaile Su 1 1 Institute for Integrated Intelligent Systems 2 School of Information and Computation Technology Griffith

More information

SEQUENTIAL EQUILIBRIA IN BAYESIAN GAMES WITH COMMUNICATION. Dino Gerardi and Roger B. Myerson. December 2005

SEQUENTIAL EQUILIBRIA IN BAYESIAN GAMES WITH COMMUNICATION. Dino Gerardi and Roger B. Myerson. December 2005 SEQUENTIAL EQUILIBRIA IN BAYESIAN GAMES WITH COMMUNICATION By Dino Gerardi and Roger B. Myerson December 2005 COWLES FOUNDATION DISCUSSION AER NO. 1542 COWLES FOUNDATION FOR RESEARCH IN ECONOMICS YALE

More information

Super Logic Programs Stefan Brass, Jurgen Dix, Teodor Przymusinski 12/97 Fachberichte INFORMATIK Universitat Koblenz-Landau Institut fur Informatik, Rheinau 1, D-56075 Koblenz E-mail: researchreports@infko.uni-koblenz.de,

More information

A New Approach to Knowledge Base Revision in DL-Lite

A New Approach to Knowledge Base Revision in DL-Lite A New Approach to Knowledge Base Revision in DL-Lite Zhe Wang and Kewen Wang and Rodney Topor School of ICT, Griffith University Nathan, QLD 4111, Australia Abstract Revising knowledge bases (KBs) in description

More information

Inverting Proof Systems for Secrecy under OWA

Inverting Proof Systems for Secrecy under OWA Inverting Proof Systems for Secrecy under OWA Giora Slutzki Department of Computer Science Iowa State University Ames, Iowa 50010 slutzki@cs.iastate.edu May 9th, 2010 Jointly with Jia Tao and Vasant Honavar

More information

Behavioural theories and the proof of. LIENS, C.N.R.S. U.R.A & Ecole Normale Superieure, 45 Rue d'ulm, F{75230 Paris Cedex 05, France

Behavioural theories and the proof of. LIENS, C.N.R.S. U.R.A & Ecole Normale Superieure, 45 Rue d'ulm, F{75230 Paris Cedex 05, France Behavioural theories and the proof of behavioural properties Michel Bidoit a and Rolf Hennicker b b a LIENS, C.N.R.S. U.R.A. 1327 & Ecole Normale Superieure, 45 Rue d'ulm, F{75230 Paris Cedex 05, France

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence Propositional Logic [1] Boolean algebras by examples U X U U = {a} U = {a, b} U = {a, b, c} {a} {b} {a, b} {a, c} {b, c}... {a} {b} {c} {a, b} {a} The arrows represents proper inclusion

More information

is a model, supported model or stable model, respectively, of P. The check can be implemented to run in linear time in the size of the program. Since

is a model, supported model or stable model, respectively, of P. The check can be implemented to run in linear time in the size of the program. Since Fixed-parameter complexity of semantics for logic programs Zbigniew Lonc? and Miros law Truszczynski?? Department of Computer Science, University of Kentucky Lexington KY 40506-0046, USA flonc, mirekg@cs.engr.uky.edu

More information

Lifting to non-integral idempotents

Lifting to non-integral idempotents Journal of Pure and Applied Algebra 162 (2001) 359 366 www.elsevier.com/locate/jpaa Lifting to non-integral idempotents Georey R. Robinson School of Mathematics and Statistics, University of Birmingham,

More information

Logic Databases (Knowledge Bases)

Logic Databases (Knowledge Bases) 491 Knowledge Representation Logic Databases (Knowledge Bases) Marek Sergot Department of Computing Imperial College, London January 2011 v1.0e Database/knowledge base as model We have a language L in

More information

Reasoning: From Basic Entailments. to Plausible Relations. Department of Computer Science. School of Mathematical Sciences. Tel-Aviv University

Reasoning: From Basic Entailments. to Plausible Relations. Department of Computer Science. School of Mathematical Sciences. Tel-Aviv University General Patterns for Nonmonotonic Reasoning: From Basic Entailments to Plausible Relations Ofer Arieli Arnon Avron Department of Computer Science School of Mathematical Sciences Tel-Aviv University Tel-Aviv

More information

ROYAL INSTITUTE OF TECHNOLOGY KUNGL TEKNISKA HÖGSKOLAN. Department of Signals, Sensors & Systems

ROYAL INSTITUTE OF TECHNOLOGY KUNGL TEKNISKA HÖGSKOLAN. Department of Signals, Sensors & Systems The Evil of Supereciency P. Stoica B. Ottersten To appear as a Fast Communication in Signal Processing IR-S3-SB-9633 ROYAL INSTITUTE OF TECHNOLOGY Department of Signals, Sensors & Systems Signal Processing

More information

Lecture 3: Semantics of Propositional Logic

Lecture 3: Semantics of Propositional Logic Lecture 3: Semantics of Propositional Logic 1 Semantics of Propositional Logic Every language has two aspects: syntax and semantics. While syntax deals with the form or structure of the language, it is

More information

Electronic Notes in Theoretical Computer Science 18 (1998) URL: 8 pages Towards characterizing bisim

Electronic Notes in Theoretical Computer Science 18 (1998) URL:   8 pages Towards characterizing bisim Electronic Notes in Theoretical Computer Science 18 (1998) URL: http://www.elsevier.nl/locate/entcs/volume18.html 8 pages Towards characterizing bisimilarity of value-passing processes with context-free

More information

Improved Algorithms for Module Extraction and Atomic Decomposition

Improved Algorithms for Module Extraction and Atomic Decomposition Improved Algorithms for Module Extraction and Atomic Decomposition Dmitry Tsarkov tsarkov@cs.man.ac.uk School of Computer Science The University of Manchester Manchester, UK Abstract. In recent years modules

More information

1 Introduction Tasks like voice or face recognition are quite dicult to realize with conventional computer systems, even for the most powerful of them

1 Introduction Tasks like voice or face recognition are quite dicult to realize with conventional computer systems, even for the most powerful of them Information Storage Capacity of Incompletely Connected Associative Memories Holger Bosch Departement de Mathematiques et d'informatique Ecole Normale Superieure de Lyon Lyon, France Franz Kurfess Department

More information

STGs may contain redundant states, i.e. states whose. State minimization is the transformation of a given

STGs may contain redundant states, i.e. states whose. State minimization is the transformation of a given Completely Specied Machines STGs may contain redundant states, i.e. states whose function can be accomplished by other states. State minimization is the transformation of a given machine into an equivalent

More information

How to Pop a Deep PDA Matters

How to Pop a Deep PDA Matters How to Pop a Deep PDA Matters Peter Leupold Department of Mathematics, Faculty of Science Kyoto Sangyo University Kyoto 603-8555, Japan email:leupold@cc.kyoto-su.ac.jp Abstract Deep PDA are push-down automata

More information

Data Cleaning and Query Answering with Matching Dependencies and Matching Functions

Data Cleaning and Query Answering with Matching Dependencies and Matching Functions Data Cleaning and Query Answering with Matching Dependencies and Matching Functions Leopoldo Bertossi 1, Solmaz Kolahi 2, and Laks V. S. Lakshmanan 2 1 Carleton University, Ottawa, Canada. bertossi@scs.carleton.ca

More information

The Value of the Four Values. April 5, Abstract. In his well-known paper \How computer should think" ([Be77b]) Belnap argues that four

The Value of the Four Values. April 5, Abstract. In his well-known paper \How computer should think ([Be77b]) Belnap argues that four The Value of the Four Values Ofer Arieli Department of Computer Science School of Mathematical Sciences Tel-Aviv University Ramat-Aviv 69978, Israel. Email: ofera@math.tau.ac.il Arnon Avron Department

More information

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques Two Lectures on Advanced Topics in Computability Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. oded@wisdom.weizmann.ac.il Spring 2002 Abstract This text consists

More information

signicant in view of the fact that in many applications existential queries are of main interest. It also plays an important role in the problem of nd

signicant in view of the fact that in many applications existential queries are of main interest. It also plays an important role in the problem of nd On the Relationship Between CWA, Minimal Model and Minimal Herbrand Model Semantics Michael Gelfond Halina Przymusinska Teodor Przymusinski March 3, 1995 Abstract The purpose of this paper is to compare

More information