Results 1  10
of
71
Using Temporal Logics to Express Search Control Knowledge for Planning
 ARTIFICIAL INTELLIGENCE
, 1999
"... Over the years increasingly sophisticated planning algorithms have been developed. These have made for more efficient planners, but unfortunately these planners still suffer from combinatorial complexity even in simple domains. Theoretical results demonstrate that planning is in the worst case in ..."
Abstract

Cited by 275 (11 self)
 Add to MetaCart
Over the years increasingly sophisticated planning algorithms have been developed. These have made for more efficient planners, but unfortunately these planners still suffer from combinatorial complexity even in simple domains. Theoretical results demonstrate that planning is in the worst case intractable. Nevertheless, planning in particular domains can often be made tractable by utilizing additional domain structure. In fact, it has long been acknowledged that domain independent planners need domain dependent information to help them plan effectively. In this
An Analysis of FirstOrder Logics of Probability
 Artificial Intelligence
, 1990
"... : We consider two approaches to giving semantics to firstorder logics of probability. The first approach puts a probability on the domain, and is appropriate for giving semantics to formulas involving statistical information such as "The probability that a randomly chosen bird flies is greater than ..."
Abstract

Cited by 272 (18 self)
 Add to MetaCart
: We consider two approaches to giving semantics to firstorder logics of probability. The first approach puts a probability on the domain, and is appropriate for giving semantics to formulas involving statistical information such as "The probability that a randomly chosen bird flies is greater than .9." The second approach puts a probability on possible worlds, and is appropriate for giving semantics to formulas describing degrees of belief, such as "The probability that Tweety (a particular bird) flies is greater than .9." We show that the two approaches can be easily combined, allowing us to reason in a straightforward way about statistical information and degrees of belief. We then consider axiomatizing these logics. In general, it can be shown that no complete axiomatization is possible. We provide axiom systems that are sound and complete in cases where a complete axiomatization is possible, showing that they do allow us to capture a great deal of interesting reasoning about prob...
Reaching Agreements Through Argumentation: A Logical Model and Implementation
 Artificial Intelligence
, 1998
"... In a multiagent environment, where selfmotivated agents try to pursue their own goals, cooperation cannot be taken for granted. Cooperation must be planned for and achieved through communication and negotiation. We present a logical model of the mental states of the agents based on a representatio ..."
Abstract

Cited by 227 (11 self)
 Add to MetaCart
In a multiagent environment, where selfmotivated agents try to pursue their own goals, cooperation cannot be taken for granted. Cooperation must be planned for and achieved through communication and negotiation. We present a logical model of the mental states of the agents based on a representation of their beliefs, desires, intentions, and goals. We present argumentation as an iterative process emerging from exchanges among agents to persuade each other and bring about a change in intentions. We look at argumentation as a mechanism for achieving cooperation and agreements. Using categories identified from human multiagent negotiation, we demonstrate how the logic can be used to specify argument formulation and evaluation. We also illustrate how the developed logic can be used to describe different types of agents. Furthermore, we present a general Automated Negotiation Agent which we implemented, based on the logical model. Using this system, a user can analyze and explore differe...
A KnowledgeBased Approach to Planning with Incomplete Information and Sensing
, 2002
"... In this paper we present a new approach to the problem of planning with incomplete information and sensing. Our approach is based on a higher level, "knowledgebased," representation of the planner's knowledge and of the domain actions. In particular, in our approach we use a set of formulae from a ..."
Abstract

Cited by 84 (6 self)
 Add to MetaCart
In this paper we present a new approach to the problem of planning with incomplete information and sensing. Our approach is based on a higher level, "knowledgebased," representation of the planner's knowledge and of the domain actions. In particular, in our approach we use a set of formulae from a firstorder modal logic of knowledge to represent the planner's incomplete knowledge state. Actions are then represented as updates to this collection of formulae. Hence, actions are being modelled in terms of how they modify the knowledge state of the planner rather than in terms of how they modify the physical world. We have constructed a planner to utilize this representation and we use it to show that on many common problems this more abstract representation is perfectly adequate for solving the planning problem, and that in fact it scales better and supports features that make it applicable to much richer domains and problems.
Efficient Checking of Temporal Integrity Constraints Using Bounded History Encoding
, 1995
"... : We present an efficient implementation method for temporal integrity constraints formulated in Past Temporal Logic. Although the constraints can refer to past states of the database, their checking does not require that the entire database history be stored. Instead, every database state is extend ..."
Abstract

Cited by 73 (6 self)
 Add to MetaCart
: We present an efficient implementation method for temporal integrity constraints formulated in Past Temporal Logic. Although the constraints can refer to past states of the database, their checking does not require that the entire database history be stored. Instead, every database state is extended with auxiliary relations that contain the historical information necessary for checking constraints. Auxiliary relations can be implemented as materialized relational views. 1 Introduction Integrity constraints form an essential part of every database application. It is customary to distinguish between two kinds of constraints: static and temporal (or dynamic). Static constraints refer to the current state of the database, e.g.,"every manager is also an employee ", while temporal constraints may refer to past and future states in addition to the current state, e.g., "salaries of employees should never decrease" or "once a student drops out of the Ph.D. program, she should not be readmit...
FIPA Communicative Act Library Specification
, 2001
"... This document contains specifications for structuring the FIPA Communicative Act Library (FIPA CAL) including: status of a FIPAcompliant communicative act, maintenance of the library and inclusion criteria. This document is primarily concerned with defining the structure of the FIPA CAL and the req ..."
Abstract

Cited by 66 (0 self)
 Add to MetaCart
This document contains specifications for structuring the FIPA Communicative Act Library (FIPA CAL) including: status of a FIPAcompliant communicative act, maintenance of the library and inclusion criteria. This document is primarily concerned with defining the structure of the FIPA CAL and the requirements for a proposed communicative act to be included in the library. The elements of the library are listed in this document. This document also contains the formal basis of FIPA ACL semantics in the annex for the semantic characterization of each FIPA communicative act. 2000 Foundation for Intelligent Physical Agents FIPA Communicative Act Library 2 2 Overview This document focuses on the organization, structure and status of the FIPA Communicative Act Library, FIPA CALand discusses the main requirements that a communicative act must satisfy in order to be FIPAcompliant. The objectives of standardizing and defining a library of FIPA compliant communicative acts are: . To help ensure interoperability by providing a standard set of composite and macro communicative acts, derived from the FIPA primitive communicative acts, . To facilitate the reuse of composite and macro communicative acts, and, . To provide a welldefined process for maintaining a set of communicative acts and act labels for use in the FIPA ACL. In the following, we present the basic principles of the FIPA CAL. These princ iples help to guarantee that the CAL is stable, that there are public rules for the inclusion and maintenance of the CAL and that developers seeking communicative acts for their applications can use the CAL. 2.1 Status of a FIPACompliant Communicative Act The definition of a communicative act belonging to the FIPA CAL is normative. That is, if a given agent implements one of ...
Predicative Recursion and Computational Complexity
, 1992
"... The purpose of this thesis is to give a "foundational" characterization of some common complexity classes. Such a characterization is distinguished by the fact that no explicit resource bounds are used. For example, we characterize the polynomial time computable functions without making any direct r ..."
Abstract

Cited by 45 (3 self)
 Add to MetaCart
The purpose of this thesis is to give a "foundational" characterization of some common complexity classes. Such a characterization is distinguished by the fact that no explicit resource bounds are used. For example, we characterize the polynomial time computable functions without making any direct reference to polynomials, time, or even computation. Complexity classes characterized in this way include polynomial time, the functional polytime hierarchy, the logspace decidable problems, and NC. After developing these "resource free" definitions, we apply them to redeveloping the feasible logical system of Cook and Urquhart, and show how this firstorder system relates to the secondorder system of Leivant. The connection is an interesting one since the systems were defined independently and have what appear to be very different rules for the principle of induction. Furthermore it is interesting to see, albeit in a very specific context, how to retract a second order statement, ("inducti...
On the Feasibility of Checking Temporal Integrity Constraints
, 1995
"... We analyze the computational feasibility of checking temporal integrity constraints formulated in some sublanguages of firstorder temporal logic. Our results illustrate the impact of the quantifier pattern on the complexity of this problem. The presence of a single quantifier in the scope of a temp ..."
Abstract

Cited by 38 (6 self)
 Add to MetaCart
We analyze the computational feasibility of checking temporal integrity constraints formulated in some sublanguages of firstorder temporal logic. Our results illustrate the impact of the quantifier pattern on the complexity of this problem. The presence of a single quantifier in the scope of a temporal operator makes the problem undecidable. On the other hand, if no quantifiers are in the scope of a temporal operator and all the quantifiers are universal, temporal integrity checking can be done in exponential time. 1 Introduction As temporal databases become more widely used in practice [27, 28], the need arises to address database integrity issues that are specific to such databases. In particular, it is necessary to generalize the standard notion of static integrity (involving single database states) to temporal integrity (involving sequences of database states). This work is the first attempt to date to analyze the computational feasibility of checking temporal integrity constrain...
Deep Sequent Systems for Modal Logic
 ARCHIVE FOR MATHEMATICAL LOGIC
"... We see a systematic set of cutfree axiomatisations for all the basic normal modal logics formed by some combination the axioms d,t,b,4, 5. They employ a form of deep inference but otherwise stay very close to Gentzen’s sequent calculus, in particular they enjoy a subformula property in the litera ..."
Abstract

Cited by 28 (4 self)
 Add to MetaCart
We see a systematic set of cutfree axiomatisations for all the basic normal modal logics formed by some combination the axioms d,t,b,4, 5. They employ a form of deep inference but otherwise stay very close to Gentzen’s sequent calculus, in particular they enjoy a subformula property in the literal sense. No semantic notions are used inside the proof systems, in particular there is no use of labels. All their rules are invertible and the rules cut, weakening and contraction are admissible. All systems admit a straightforward terminating proof search procedure as well as a syntactic cut elimination procedure.