TY - JOUR
T1 - Using KBS verification techniques to demonstrate the existence of rule anomalies in ADBs
AU - Pai, A. V.
AU - Gamble, R. F.
AU - Plant, R. T.
N1 - Funding Information:
This research was supported in part by the U.S. Department of Energy, contract #DEAC22-93BC14894 and DARPA CAETI program, contract #N66001-95-C-8628.
PY - 1999/7/15
Y1 - 1999/7/15
N2 - As the field of verification and validation for knowledge-based systems (KBSs) has matured, much information, technology, and theory has become available. Though not all of the problems with respect to KBSs have been solved, many have been identified with solutions that can be used in an analogous manner in situations where the application is not necessarily a traditional KBS. As one example, the `active' component in an active database (ADB) consists of rules that execute as a result of database accesses and updates. In this paper, we demonstrate that anomalies found to impact the correctness of a KBS can also exist in ADBs. We first compare the rule structure of a KBS with the rule structures of various ADBs. To show their existence, we convert the rule syntax of the ADBs into a consistent format for analysis and anomaly detection. Once converted, we apply KBS verification techniques to isolate these anomalies. Due to the more increasing use of triggered rules in ADBs, this work illustrates the danger these anomalies can pose and the ever increasing need for ADB verification techniques to exist.
AB - As the field of verification and validation for knowledge-based systems (KBSs) has matured, much information, technology, and theory has become available. Though not all of the problems with respect to KBSs have been solved, many have been identified with solutions that can be used in an analogous manner in situations where the application is not necessarily a traditional KBS. As one example, the `active' component in an active database (ADB) consists of rules that execute as a result of database accesses and updates. In this paper, we demonstrate that anomalies found to impact the correctness of a KBS can also exist in ADBs. We first compare the rule structure of a KBS with the rule structures of various ADBs. To show their existence, we convert the rule syntax of the ADBs into a consistent format for analysis and anomaly detection. Once converted, we apply KBS verification techniques to isolate these anomalies. Due to the more increasing use of triggered rules in ADBs, this work illustrates the danger these anomalies can pose and the ever increasing need for ADB verification techniques to exist.
UR - http://www.scopus.com/inward/record.url?scp=0032626727&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0032626727&partnerID=8YFLogxK
U2 - 10.1016/S0950-5849(99)00017-8
DO - 10.1016/S0950-5849(99)00017-8
M3 - Article
AN - SCOPUS:0032626727
VL - 41
SP - 627
EP - 638
JO - Information and Software Technology
JF - Information and Software Technology
SN - 0950-5849
IS - 10
ER -