Using KBS verification techniques to demonstrate the existence of rule anomalies in ADBs

A. V. Pai, R. F. Gamble, Robert Plant

Research output: Contribution to journalArticle

Abstract

As the field of verification and validation for knowledge-based systems (KBSs) has matured, much information, technology, and theory has become available. Though not all of the problems with respect to KBSs have been solved, many have been identified with solutions that can be used in an analogous manner in situations where the application is not necessarily a traditional KBS. As one example, the `active' component in an active database (ADB) consists of rules that execute as a result of database accesses and updates. In this paper, we demonstrate that anomalies found to impact the correctness of a KBS can also exist in ADBs. We first compare the rule structure of a KBS with the rule structures of various ADBs. To show their existence, we convert the rule syntax of the ADBs into a consistent format for analysis and anomaly detection. Once converted, we apply KBS verification techniques to isolate these anomalies. Due to the more increasing use of triggered rules in ADBs, this work illustrates the danger these anomalies can pose and the ever increasing need for ADB verification techniques to exist.

Original languageEnglish (US)
Pages (from-to)627-638
Number of pages12
JournalInformation and Software Technology
Volume41
Issue number10
DOIs
StatePublished - Jul 15 1999

Fingerprint

Knowledge based systems
Information theory
Information technology

ASJC Scopus subject areas

  • Information Systems
  • Software

Cite this

Using KBS verification techniques to demonstrate the existence of rule anomalies in ADBs. / Pai, A. V.; Gamble, R. F.; Plant, Robert.

In: Information and Software Technology, Vol. 41, No. 10, 15.07.1999, p. 627-638.

Research output: Contribution to journalArticle

Pai, A. V. ; Gamble, R. F. ; Plant, Robert. / Using KBS verification techniques to demonstrate the existence of rule anomalies in ADBs. In: Information and Software Technology. 1999 ; Vol. 41, No. 10. pp. 627-638.
@article{cfc7af9f94a3446ea115255e4a8b0ce1,
title = "Using KBS verification techniques to demonstrate the existence of rule anomalies in ADBs",
abstract = "As the field of verification and validation for knowledge-based systems (KBSs) has matured, much information, technology, and theory has become available. Though not all of the problems with respect to KBSs have been solved, many have been identified with solutions that can be used in an analogous manner in situations where the application is not necessarily a traditional KBS. As one example, the `active' component in an active database (ADB) consists of rules that execute as a result of database accesses and updates. In this paper, we demonstrate that anomalies found to impact the correctness of a KBS can also exist in ADBs. We first compare the rule structure of a KBS with the rule structures of various ADBs. To show their existence, we convert the rule syntax of the ADBs into a consistent format for analysis and anomaly detection. Once converted, we apply KBS verification techniques to isolate these anomalies. Due to the more increasing use of triggered rules in ADBs, this work illustrates the danger these anomalies can pose and the ever increasing need for ADB verification techniques to exist.",
author = "Pai, {A. V.} and Gamble, {R. F.} and Robert Plant",
year = "1999",
month = "7",
day = "15",
doi = "10.1016/S0950-5849(99)00017-8",
language = "English (US)",
volume = "41",
pages = "627--638",
journal = "Information and Software Technology",
issn = "0950-5849",
publisher = "Elsevier",
number = "10",

}

TY - JOUR

T1 - Using KBS verification techniques to demonstrate the existence of rule anomalies in ADBs

AU - Pai, A. V.

AU - Gamble, R. F.

AU - Plant, Robert

PY - 1999/7/15

Y1 - 1999/7/15

N2 - As the field of verification and validation for knowledge-based systems (KBSs) has matured, much information, technology, and theory has become available. Though not all of the problems with respect to KBSs have been solved, many have been identified with solutions that can be used in an analogous manner in situations where the application is not necessarily a traditional KBS. As one example, the `active' component in an active database (ADB) consists of rules that execute as a result of database accesses and updates. In this paper, we demonstrate that anomalies found to impact the correctness of a KBS can also exist in ADBs. We first compare the rule structure of a KBS with the rule structures of various ADBs. To show their existence, we convert the rule syntax of the ADBs into a consistent format for analysis and anomaly detection. Once converted, we apply KBS verification techniques to isolate these anomalies. Due to the more increasing use of triggered rules in ADBs, this work illustrates the danger these anomalies can pose and the ever increasing need for ADB verification techniques to exist.

AB - As the field of verification and validation for knowledge-based systems (KBSs) has matured, much information, technology, and theory has become available. Though not all of the problems with respect to KBSs have been solved, many have been identified with solutions that can be used in an analogous manner in situations where the application is not necessarily a traditional KBS. As one example, the `active' component in an active database (ADB) consists of rules that execute as a result of database accesses and updates. In this paper, we demonstrate that anomalies found to impact the correctness of a KBS can also exist in ADBs. We first compare the rule structure of a KBS with the rule structures of various ADBs. To show their existence, we convert the rule syntax of the ADBs into a consistent format for analysis and anomaly detection. Once converted, we apply KBS verification techniques to isolate these anomalies. Due to the more increasing use of triggered rules in ADBs, this work illustrates the danger these anomalies can pose and the ever increasing need for ADB verification techniques to exist.

UR - http://www.scopus.com/inward/record.url?scp=0032626727&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0032626727&partnerID=8YFLogxK

U2 - 10.1016/S0950-5849(99)00017-8

DO - 10.1016/S0950-5849(99)00017-8

M3 - Article

AN - SCOPUS:0032626727

VL - 41

SP - 627

EP - 638

JO - Information and Software Technology

JF - Information and Software Technology

SN - 0950-5849

IS - 10

ER -