2016
DOI: 10.1007/978-3-319-28228-2_2
|View full text |Cite
|
Sign up to set email alerts
|

The KB Paradigm and Its Application to Interactive Configuration

Abstract: The knowledge base paradigm aims to express domain knowledge in a rich formal language, and to use this domain knowledge as a knowledge base to solve various problems and tasks that arise in the domain by applying multiple forms of inference. As such, the paradigm applies a strict separation of concerns between information and problem solving.In this paper, we analyze the principles and feasibility of the knowledge base paradigm in the context of an important class of applications: interactive configuration pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…The specification language supported by IDP is an extension of first-order logic (FO) with types, inductive definitions, aggregates, arithmetic and partial functions, denoted FO(T,ID,Agg,Arit,PF) [20]. We only make use of the subset of FO(T,ID,Agg,Arit,PF) called FO(ID), which extends FO only with inductive definitions.…”
Section: B Fo(id) and Some Idp Inferencesmentioning
confidence: 99%
See 1 more Smart Citation
“…The specification language supported by IDP is an extension of first-order logic (FO) with types, inductive definitions, aggregates, arithmetic and partial functions, denoted FO(T,ID,Agg,Arit,PF) [20]. We only make use of the subset of FO(T,ID,Agg,Arit,PF) called FO(ID), which extends FO only with inductive definitions.…”
Section: B Fo(id) and Some Idp Inferencesmentioning
confidence: 99%
“…When a loop is detected, the query vertex causing the loop (by having the same label as a query vertex that is an ancestor of it) is labelled either with f or u, depending on whether the loop is over a negation (i.e. there is an f-labelled edge in the path connecting the two vertices with the same label) or not (lines [16][17][18][19][20]. u-labels can also propagate towards the root of the graph (line 28).…”
Section: Algorithm 2 Communication Procedures Initializationmentioning
confidence: 99%
“…It has been used to analyze security issues in several contexts, with an emphasis on formal approaches that allow intuitive modelling of the involved knowledge [Decroix et al 2013, Heyman 2013. The model expansion engine, and various other types of inference, have been used for interactive configuration [Van Hertum et al 2016, 2017.…”
Section: In Practicementioning
confidence: 99%