Results for ' Querying Databases'

984 found
Order:
  1.  22
    Paraconsistent logic and query answering in inconsistent databases.C. A. Middelburg - 2024 - Journal of Applied Non-Classical Logics 34 (1):133-154.
    This paper concerns the paraconsistent logic LPQ⊃,F and an application of it in the area of relational database theory. The notions of a relational database, a query applicable to a relational database, and a consistent answer to a query with respect to a possibly inconsistent relational database are considered from the perspective of this logic. This perspective enables among other things the definition of a consistent answer to a query with respect to a possibly inconsistent database without resort to database (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  26
    On database query languages for K-relations.Floris Geerts & Antonella Poggi - 2010 - Journal of Applied Logic 8 (2):173-185.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  18
    Querying several conflicting databases.Laurence Cholvy & Christophe Garion - 2004 - Journal of Applied Non-Classical Logics 14 (3):295-327.
    This paper addresses the problem of querying several databases considered as a whole. Assuming that the different databases share a common data description language, the problem that arises is to consistently answer queries even if the database contents are contradictory. The main contribution of this paper is the specification of a query-evaluator for answering closed and open general queries addressed to several databases and for providing explanations about the results. For doing so, we first specify a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  31
    Exact query reformulation with first-order ontologies and databases.Enrico Franconi, Volha Kerhet & Nhung Ngo - 2012 - In Luis Farinas del Cerro, Andreas Herzig & Jerome Mengin (eds.), Logics in Artificial Intelligence. Springer. pp. 202--214.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  13
    Querying temporal and spatial constraint networks in PTIME☆☆A preliminary version of this paper appeared in the proceedings of AAAI-99. A different version of this paper (aimed at a database audience) appeared in the proceedings of the workshop STDBM99. [REVIEW]Manolis Koubarakis & Spiros Skiadopoulos - 2000 - Artificial Intelligence 123 (1-2):223-263.
  6. 2 interpretations of queries to incomplete information databases.Me Orlowska - 1988 - South African Journal of Philosophy-Suid-Afrikaanse Tydskrif Vir Wysbegeerte 7 (2):126-131.
    No categories
     
    Export citation  
     
    Bookmark  
  7.  10
    Question answering and database querying: Bridging the gap with generalized quantification.Antonio Badia - 2007 - Journal of Applied Logic 5 (1):3-19.
  8.  25
    Combining totalitarian and Ceteris Paribus semantics in database preference queries.Rui da Silva Neves & Souhila Kaci - 2010 - Logic Journal of the IGPL 18 (3):464-483.
    Preference queries from databases aim to retrieve the best answers w.r.t. user's requirements. The integration of preferences in database queries has known many advances in the last decade. Most of works however are based on comparative preference statements obeying more or less strong semantics. Representing and reasoning about comparative preference statements has also been widely investigated in Artificial Intelligence. In this paper, we bridge the two frameworks and develop a simple and unified framework to reason about preferences in database (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Querying linguistic trees.Catherine Lai & Steven Bird - 2010 - Journal of Logic, Language and Information 19 (1):53-73.
    Large databases of linguistic annotations are used for testing linguistic hypotheses and for training language processing models. These linguistic annotations are often syntactic or prosodic in nature, and have a hierarchical structure. Query languages are used to select particular structures of interest, or to project out large slices of a corpus for external analysis. Existing languages suffer from a variety of problems in the areas of expressiveness, efficiency, and naturalness for linguistic query. We describe the domain of linguistic trees (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  10.  14
    The effect of knowledge-of-external-representations upon performance and representational choice in a database query task.Beate Grawemeyer & Richard Cox - 2004 - In A. Blackwell, K. Marriott & A. Shimojima (eds.), Diagrammatic Representation and Inference. Springer. pp. 351--354.
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  64
    Approximate databases: a support tool for approximate reasoning.Patrick Doherty, Martin Magnusson & Andrzej Szalas - 2006 - Journal of Applied Non-Classical Logics 16 (1-2):87-117.
    This paper describes an experimental platform for approximate knowledge databases called the Approximate Knowledge Database, based on a semantics inspired by rough sets. The implementation is based upon the use of a standard SQL database to store logical facts, augmented with several query interface layers implemented in JAVA through which extensional, intensional and local closed world nonmonotonic queries in the form of crisp or approximate logical formulas can be evaluated tractably. A graphical database design user interface is also provided (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  22
    Insider attack detection in database with deep metric neural network with Monte Carlo sampling.Gwang-Myong Go, Seok-Jun Bu & Sung-Bae Cho - 2022 - Logic Journal of the IGPL 30 (6):979-992.
    Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user’s queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes a deep (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13. A New Method for Fuzzy Query Processing in Relational Database System.Chen Shyiming & Lin Yunshyang - 2002 - In Robert Trappl (ed.), Cybernetics and Systems. Austrian Society for Cybernetics Studies. pp. 33--1.
    No categories
     
    Export citation  
     
    Bookmark  
  14.  35
    Extended order-generic queries.Oleg V. Belegradek, Alexei P. Stolboushkin & Michael A. Taitslin - 1999 - Annals of Pure and Applied Logic 97 (1-3):85-125.
    We consider relational databases organized over an ordered domain with some additional relations — a typical example is the ordered domain of rational numbers together with the operation of addition. In the focus of our study are the first-order queries that are invariant under order-preserving “permutations” — such queries are called order-generic. It has recently been discovered that for some domains order-generic FO queries fail to express more than pure order queries. For example, every order-generic FO query over rational (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  15. Erotetic Logic as a Specification Language for Database Queries.Gary James Jason - 1987 - Dissertation, Kansas State University
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  42
    (1 other version)Jeffrey D. Ullman. Principles of database systems. Second edition. Computer software engineering series. Computer Science Press, Rockville, Md., 1982, vii + 484 pp. - David Maier. The theory of relational databases. Computer Science Press, Rockville, Md., 1983, xv + 637 pp. - Ashok K. Chandra and David Harel. Computable queries for relational data bases. Journal of computer and system sciences, vol. 21 , pp. 156–178. [REVIEW]J. A. Makowsky - 1986 - Journal of Symbolic Logic 51 (4):1079-1084.
  17. What reasonable first-order queries are permitted by Trakhtenbrot's theorem?Arnon Avron - unknown
    Around 1950, B.A. Trakhtenbrot proved an important undecidability result (known, by a pure accident, as \Trakhtenbrot's theorem"): there is no algorithm to decide, given a rst-order sentence, whether the sentence is satis able in some nite model. The result is in fact true even if we restrict ourselves to languages that has only one binary relation Tra63]. It is hardly conceivable that at that time Prof. Trakhtenbrot expected his result to in uence the development of the theory of relational (...) query languages, but it did. This perhaps is not surprising in view of the following two facts: 1) The theory of relational databases is strongly rooted in logic and can easily be abstracted to make it a branch of mathematical logic. 2) The main interest in the theory of relational databases is in nite relations. In the rst section we explain those two points in more detail. Then, in section 2 of the present paper, we discuss the question: \What constitutes a reasonable query to a database?" The discussion naturally leads to a certain class of queries, known as the \domain independent" queries, as an ideal query language. At this point Trakhtenbrot's theorem appears as a major obstacle, since it easily implies that this ideal class is undecidable. Real query languages cannot be allowed to have this property. Section 3 outlines then several possible ways to circumvent this di culty. The following section explains the.. (shrink)
     
    Export citation  
     
    Bookmark  
  18.  24
    Evolutionary Reinforcement Learning for Adaptively Detecting Database Intrusions.Seul-Gi Choi & Sung-Bae Cho - 2020 - Logic Journal of the IGPL 28 (4):449-460.
    Relational database management system is the most popular database system. It is important to maintain data security from information leakage and data corruption. RDBMS can be attacked by an outsider or an insider. It is difficult to detect an insider attack because its patterns are constantly changing and evolving. In this paper, we propose an adaptive database intrusion detection system that can be resistant to potential insider misuse using evolutionary reinforcement learning, which combines reinforcement learning and evolutionary learning. The model (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  16
    Progressive Filtering Approach for Query by Humming System Through Empirical Mode Decomposition and Multiresolution Histograms.Nagappa U. Bhajantri & Trisiladevi C. Nagavi - 2015 - Journal of Intelligent Systems 24 (2):265-275.
    This research work proposes an implementation of adept content-based music retrieval technique that attempts to address the demands of the rising availability of digital music. The primary objective of this research work is to balance the perilous impact of non-relevant songs through progressive filtering for query by humming music information retrieval system. The PF is a technique of searching in manifolds for problem solving through reduced search space. A new strategy for empirical mode decomposition analysis is adopted, and outcomes are (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  35
    Databases for criminal intelligence analysis: Knowledge representation issues. [REVIEW]Robert Ayres - 1997 - AI and Society 11 (1-2):18-35.
    Criminal intelligence data poses problems for conventional database technology. It has little structure or homogeneity and queries may involve looking for unknown associations between entities; such open-ended queries cannot be made in current systems. Finally, the data must be presented in an intuitively simple fashion for both investigative and evidential purposes. We discuss a database system which uses a labelled graph as its data model. This approach obviates the need for schema design, allows queries which look for associations between entities (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  5
    Conservation Laws in Quantum Database Search.Li-Yi Hsu & Ching-Hsu Chen - 2024 - Foundations of Physics 54 (5):1-13.
    Recently, the correspondence between the air track scenario and quantum database search algorithm was revealed. The conservation laws of linear momentum and nonlinear kinetic energy in the former case, which involve sequential elastic collisions, have their analogs in the latter case. Obviously, probability normalization combined with the Born rule serves as an analog for kinetic energy conservation. Here we explore the linear conservation laws in a generic quantum database search. Regarding the non-uniform distribution of the marked state, the uneven state (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  17
    On the expressibility and the computability of untyped queries.Jose Maria Turull Torres - 2001 - Annals of Pure and Applied Logic 108 (1-3):345-371.
    The work of Chandra and Harel contained in Chandra and Harel 156–178) can be considered as the beginning of the construction of a theoretical framework in which the computability and the complexity of queries to relational databases could be studied. In the definition of the class CQ of computable queries, the authors included untyped queries , that is, queries whose answers are relations of possibly different arities on different relational structures or databases. However, it seems that in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  23.  28
    Retractions in the Engineering Field: A Study on the Web of Science Database.Priscila Rubbo, Caroline Lievore Helmann, Celso Bilynkievycz dos Santos & Luiz Alberto Pilatti - 2019 - Ethics and Behavior 29 (2):141-155.
    This study assesses the retractions of scientific articles in engineering journals indexed on the Web of Science from 1945 to 2015. The data set was built based on documents containing the keywords retracted, retraction, withdrawal, or redress. We used database exploration techniques, including Structured Query Language and analysis of variance, for data analysis. We analyzed 238 retractions published by 117 journals. The most common reason for retraction was unethical research, and higher impact factors journals tended to publish more retractions. In (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  24.  44
    A logical framework for view updating in indefinite databases.Luciano Caroprese, Irina Trubitsyna, Miroslaw Truszczyński & Ester Zumpano - 2019 - Logic Journal of the IGPL 27 (6):777-811.
    This paper introduces and studies a declarative framework for updating views over indefinite databases. An indefinite database is a database with null values that are represented, following the standard database approach, by a single null constant. Typically a database is represented by a single set of facts |$D$| that model what is known to be true. This paper proposes a model of an indefinite extensional database that is more expressive with respect to the closed-world assumption (CWA) adapted for the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25. Prototyping a Browser for a Listed Buildings Database with Semantic MediaWiki.Michael Kohlhase - unknown
    Listed buildings, even if they are not top landmarks, are increasingly attracting visitors. People express interest in hidden gems in their neighborhood or along their travel itinerary, and in the history of the building they live in. All required data has been meticulously collected by the offices for historical monuments but is not flexibly accessible. In Bremen, the database of buildings (with location, map of the estate, construction history, architect, photos) is searchable and browsable online3, but that only helps users (...)
    No categories
     
    Export citation  
     
    Bookmark  
  26.  33
    Design of a New Distributed NoSQL Database with Distributed Hash Tables.Agustín San Román Guzmán, Diego Valdeolmillos, Alberto Rivas, Angélica González Arrieta & Pablo Chamoso - 2022 - Logic Journal of the IGPL 30 (4):566-577.
    Databases play a fundamental role in today’s world, being used by most companies, especially those that offer services through the Internet. Today there is a wide variety of database models, each adapted for use according to the specific requirements of each application. Traditionally, the relational models with centralized architectures have been used mostly due to their simplicity and general-purpose query language, which made relational systems suitable for almost any application. However, with the growth of the Internet in recent decades, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  25
    The serializability problem for a temporal logic of transaction queries.Walter Hussak - 2008 - Journal of Applied Non-Classical Logics 18 (1):67-78.
    We define the logic FOTLT(n), to be a monadic monodic fragment of first-order linear temporal logic, with 2n propositions representing the read and write steps of n two-step concurrent database transactions and a time-dependent predicate representing queries giving the sets of data items accessed by those read and write steps at given points in time. The models of FOTLT(n) contain interleaved sequences of the steps of infinitely many occurrences of the n transactions accessing unlimited data over time. A property of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  57
    Problems of equivalence, categoricity of axioms and states description in databases.Tatjana L. Plotkin, Sarit Kraus & Boris I. Plotkin - 1998 - Studia Logica 61 (3):347-366.
    The paper is devoted to applications of algebraic logic to databases. In databases a query is represented by a formula of first order logic. The same query can be associated with different formulas. Thus, a query is a class of equivalent formulae: equivalence here being similar to that in the transition to the Lindenbaum-Tarski algebra. An algebra of queries is identified with the corresponding algebra of logic. An algebra of replies to the queries is also associated with algebraic (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  29. ITS for Data Manipulation Language (DML) Commands Using SQLite.Mahmoud Jamal Abu Ghali & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (3):57-92.
    In many areas, technology has facilitated many things, diagnosing diseases, regulating traffic and teaching students in schools rely on Intelligent systems to name a few. At present, traditional classroom-based education is no longer the most appropriate in schools. From here, the idea of intelligent e-learning for students to increase their culture and keep them updated in life began. E-learning has become an ideal solution, relying on artificial intelligence, which has a footprint in this through the development of systems based on (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  54
    Human-centred decision support: The IDIOMS system. [REVIEW]J. G. Gammack, T. C. Fogarty, S. A. Battle, N. S. Ireson & J. Cui - 1992 - AI and Society 6 (4):345-366.
    The requirement for anthropocentric, or human-centred decision support is outlined, and the IDIOMS management information tool, which implements several human-centred principles, is described. IDIOMS provides a flexible decision support environment in which applications can be modelled using both ‘objective’ database information, and user-centred ‘subjective’ and contextual information. The system has been tested on several real applications, demonstrating its power and flexibility.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  79
    Pseudo-finite homogeneity and saturation.Jorg Flum & Martin Ziegler - 1999 - Journal of Symbolic Logic 64 (4):1689-1699.
    When analyzing database query languages a roperty, of theories, the pseudo-finite homogeneity property, has been introduced and applied (cf. [3]). We show that a stable theory has the pseudo-finite homogeneity property just in case its expressive power for finite states is bounded. Moreover, we introduce the corresponding pseudo-finite saturation property and show that a theory fails to have the finite cover property if and only if it has the pseudo-finite saturation property.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  32. A mathematical introduction to logic.Herbert Bruce Enderton - 1972 - New York,: Academic Press.
    A Mathematical Introduction to Logic, Second Edition, offers increased flexibility with topic coverage, allowing for choice in how to utilize the textbook in a course. The author has made this edition more accessible to better meet the needs of today's undergraduate mathematics and philosophy students. It is intended for the reader who has not studied logic previously, but who has some experience in mathematical reasoning. Material is presented on computer science issues such as computational complexity and database queries, with additional (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   123 citations  
  33.  22
    Examination and diagnosis of electronic patient records and their associated ethics: a scoping literature review.Tim Jacquemard, Colin P. Doherty & Mary B. Fitzsimons - 2020 - BMC Medical Ethics 21 (1):1-13.
    BackgroundElectronic patient record (EPR) technology is a key enabler for improvements to healthcare service and management. To ensure these improvements and the means to achieve them are socially and ethically desirable, careful consideration of the ethical implications of EPRs is indicated. The purpose of this scoping review was to map the literature related to the ethics of EPR technology. The literature review was conducted to catalogue the prevalent ethical terms, to describe the associated ethical challenges and opportunities, and to identify (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  34.  28
    Business ethics searches: A socioeconomic and demographic analysis of U.S. Google Trends in the context of the 2008 financial crisis.Christophe Faugère & Olivier Gergaud - 2017 - Business Ethics: A European Review 26 (3):271-287.
    A socioeconomic and demographic analysis of U.S. Google Trends for queries about Business Ethics and Greed is proposed in the context of the 2008 financial crisis. The framework is grounded in the ethical decision-making literature. Two models using micro and macro-type variables are tested using GLM and GEE regression techniques. The frequency of these Google queries varies positively with the ratio of females, educational attainment, younger adult age, some measures of economic hardship or inequalities, and the lesser the weight of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  28
    ページ情報エージェントの組織化による Web 検索エンジンの適応インタフェース.Murase Fumihiko Yamada Seiji - 2001 - Transactions of the Japanese Society for Artificial Intelligence 16:46-54.
    In this paper, we develop an organization method of page information agents for adaptive interface between a user and a Web search engine. Though a Web search engine indicates a hit list of Web pages to user’s query using a large database, they includes many useless ones. Thus a user has to select useful Web pages from them with page information indicated on the hit list, and actually fetch the Web page for investigating the relevance. Unfortunately, since the page information (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  20
    Outcomes of clinical ethics support near the end of life: A systematic review.Joschka Haltaufderheide, Stephan Nadolny, Marjolein Gysels, Claudia Bausewein, Jochen Vollmann & Jan Schildmann - 2020 - Nursing Ethics 27 (3):838-854.
    Background: Clinical ethics support services have been advocated in recent decades. In clinical practice, clinical ethics support services are often requested for difficult decisions near the end of life. However, their contribution to improving healthcare has been questioned and demands for evaluation have been put forward. Research indicates that there are considerable challenges associated with defining adequate outcomes for clinical ethics support services. In this systematic review, we report findings of qualitative studies and surveys, which have been conducted to evaluate (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  37.  25
    ChatGPT or Gemini: Who Makes the Better Scientific Writing Assistant?Hatoon S. AlSagri, Faiza Farhat, Shahab Saquib Sohail & Abdul Khader Jilani Saudagar - forthcoming - Journal of Academic Ethics:1-15.
    The rapid evolution of scientific research has created a pressing need for efficient and versatile tools to aid researchers. While using artificial intelligence (AI) to write scientific articles is unethical and unreliable due to the potential for inaccuracy, AI can be a valuable tool for assisting with other aspects of research, such as language editing, reference formatting, and journal finding. Two of the latest AI-driven assistants that have become indispensable assets to scientists are ChatGPT and Gemini (Bard). These assistants offer (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  86
    Combining argumentation and bayesian nets for breast cancer prognosis.Matt Williams & Jon Williamson - 2006 - Journal of Logic, Language and Information 15 (1):155-178.
    We present a new framework for combining logic with probability, and demonstrate the application of this framework to breast cancer prognosis. Background knowledge concerning breast cancer prognosis is represented using logical arguments. This background knowledge and a database are used to build a Bayesian net that captures the probabilistic relationships amongst the variables. Causal hypotheses gleaned from the Bayesian net in turn generate new arguments. The Bayesian net can be queried to help decide when one argument attacks another. The Bayesian (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  27
    Addressing the information technology skills shortage in developing countries: Tapping the pool of disabled users.Vesper Owei, Abiodun O. Bada & Manny Aniebonam - 2006 - Journal of Information, Communication and Ethics in Society 4 (2):77-89.
    Developing countries are endeavoring to advance into the 21st century information age. Their progress, however, is hamstrung by the dire lack of trained, skilled and knowledgeable IS workers who are able to interact with online and off‐line information sources. These countries can tap from the rich intellectual capital lying dormant within the ranks of disabled people to boost the pool of IS workers in their societies. However, before developing countries can draw on the information systems capabilities of disabled workers, these (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  14
    An interlocking-directorates monitoring system.Marek Pawlak - 2010 - Journal for Perspectives of Economic Political and Social Integration 16 (1-2):121-154.
    An interlocking-directorates monitoring system The subject of the study was interlocking directorates in Polish joint stock companies. In order to explore this area a monitoring system has been developed which consists of a database and query system. Data is automatically introduced from printed announcements into the MySQL database using PHP scripts.The phenomenon of interlocking directorates in Polish joint stock companies is comparable with other countries. Board members in Poland are significantly younger than, for example, in the USA. Women constitute an (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  16
    Research trends and hotspot analysis of age-related hearing loss from a bibliographic perspective.Qingjia Cui, Na Chen, Cheng Wen, Jianing Xi & Lihui Huang - 2022 - Frontiers in Psychology 13.
    BackgroundUp-to-date information about the trends of age-related hearing loss and how this varies between countries is essential to plan for an adequate health-system response. Therefore, this study aimed to assess the research hotpots and trends in ARHL and to provide the basis and direction for future research.Materials and methodsThe Web of Science Core Collection database was searched and screened according to the inclusion criteria during 2002–2021. Bibliometric analyses were conducted by CiteSpace software and VOSviewer software.ResultsThe query identified 1,496 publications, which (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  48
    On the relation between SPARQL1.1 and Answer Set Programming.Axel Polleres & Johannes Peter Wallner - 2013 - Journal of Applied Non-Classical Logics 23 (1-2):159-212.
    In the context of the emerging Semantic Web and the quest for a common logical framework underpinning its architecture, the relation of rule-based languages such as Answer Set Programming (ASP) and ontology languages such as the Web Ontology Language (OWL) has attracted a lot of attention in the literature over the past years. With its roots in Deductive Databases and Datalog though, ASP shares much more commonality with another Semantic Web standard, namely the Simple Protocol and RDF Query Language (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  22
    新聞記事コーパスでの単語出現特徴を利用した観光イベント情報の検索支援.内山 将夫 小作 浩美 - 2004 - Transactions of the Japanese Society for Artificial Intelligence 19:225-233.
    We have been developed a support system to interactively search certain articles of users' interest on the World Wide Web without their hesitating over query choices. Especially we have been implementing an effective application system to enable tourists to easily find special event information of their interest and to enjoy their own tours. This system also enables developers of each system to provide them with the means of easily constructing an initial database and automatically updating it. As events are generally (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  11
    Optimization of an Intelligent Music-Playing System Based on Network Communication.Liaoyan Zhang - 2021 - Complexity 2021:1-11.
    Streaming media server is the core system of audio and video application in the Internet; it has a wide range of applications in music recommendation. As song libraries and users of music websites and APPs continue to increase, user interaction data are generated at an increasingly fast rate, making the shortcomings of the original offline recommendation system and the advantages of the real-time streaming recommendation system more and more obvious. This paper describes in detail the working methods and contents of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  12
    Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks.Mei Sun, Yuyan Guo, Dongbing Zhang & MingMing Jiang - 2021 - Complexity 2021:1-13.
    Vehicular ad hoc network is a multihop mobile wireless communication network that can realize many vehicle-related applications through multitop communication. In the open wireless communication environment, security and privacy protection are important contents of VANET research. The most basic method of VANET privacy protection is anonymous authentication. Even through, there are many existing schemes to provide anonymous authentication for VANETs. Many existing schemes suffer from high computational cost by using bilinear pairing operation or need the assistance of the trust authorities (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46. On the application of formal principles to life science data: A case study in the Gene Ontology.Jacob Köhler, Anand Kumar & Barry Smith - 2004 - In Köhler Jacob, Kumar Anand & Smith Barry (eds.), Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics 2994). Springer. pp. 79-94.
    Formal principles governing best practices in classification and definition have for too long been neglected in the construction of biomedical ontologies, in ways which have important negative consequences for data integration and ontology alignment. We argue that the use of such principles in ontology construction can serve as a valuable tool in error-detection and also in supporting reliable manual curation. We argue also that such principles are a prerequisite for the successful application of advanced data integration techniques such as ontology-based (...)
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  47.  29
    Some Model Theory of Guarded Negation.Vince Bárány, Michael Benedikt & Balder ten Cate - 2018 - Journal of Symbolic Logic 83 (4):1307-1344.
    The Guarded Negation Fragment (GNFO) is a fragment of first-order logic that contains all positive existential formulas, can express the first-order translations of basic modal logic and of many description logics, along with many sentences that arise in databases. It has been shown that the syntax of GNFO is restrictive enough so that computational problems such as validity and satisfiability are still decidable. This suggests that, in spite of its expressive power, GNFO formulas are amenable to novel optimizations. In (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  76
    Increasing efficiency and well-being? a systematic review of the empirical claims of the double-benefit argument in socially assistive devices.Jochen Vollmann, Christoph Strünck, Annika Lucht & Joschka Haltaufderheide - 2023 - BMC Medical Ethics 24 (1):1-14.
    BackgroundSocially assistive devices (care robots, companions, smart screen assistants) have been advocated as a promising tool in elderly care in Western healthcare systems. Ethical debates indicate various challenges. One of the most prevalent arguments in the debate is the double-benefit argument claiming that socially assistive devices may not only provide benefits for autonomy and well-being of their users but might also be more efficient than other caring practices and might help to mitigate scarce resources in healthcare. Against this background, we (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  17
    Polynomial games and determinacy.Tomoyuki Yamakami - 1996 - Annals of Pure and Applied Logic 80 (1):1-16.
    Two-player, zero-sum, non-cooperative, blindfold games in extensive form with incomplete information are considered in this paper. Any information about past moves which players played is stored in a database, and each player can access the database. A polynomial game is a game in which, at each step, all players withdraw at most a polynomial amount of previous information from the database. We show resource-bounded determinacy of some kinds of finite, zero-sum, polynomial games whose pay-off sets are computable by non-deterministic polynomial-time (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  50. The ImmPort Antibody Ontology.William Duncan, Travis Allen, Jonathan Bona, Olivia Helfer, Barry Smith, Alan Ruttenberg & Alexander D. Diehl - 2016 - Proceedings of the International Conference on Biological Ontology 1747.
    Monoclonal antibodies are essential biomedical research and clinical reagents that are produced by companies and research laboratories. The NIAID ImmPort (Immunology Database and Analysis Portal) resource provides a long-term, sustainable data warehouse for immunological data generated by NIAID, DAIT and DMID funded investigators for data archiving and re-use. A variety of immunological data is generated using techniques that rely upon monoclonal antibody reagents, including flow cytometry, immunofluorescence, and ELISA. In order to facilitate querying, integration, and reuse of data, standardized (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 984