Some Notes on Knowledge Assimilation in Deductive Databases

This paper is intended to serve as a background for studies in the field of knowledge assimilation in deductive databases. Rather than presenting a formal theory or a technical methodology, it provides a largely informal overview of some of the constituent issues of knowledge assimilation. Various tasks of knowledge assimilation, particularly those related to the integrity-preserving satisfaction of update requests, are discussed. Also the use of abductive logic programming for knowledge assimilation is addressed. Close interrelationships of seemingly disconnected tasks such as query answering, updating, default reasoning, belief revision, and of the underlying inference principles of deduction and abduction, are pointed out. Particular attention is paid to the various kinds of hypotheses used in abductive logic programming for implementing knowledge assimilation.

[1]  M. Howard Williams,et al.  A Path Finding Method for Constraint Checking in Deductive Databases , 1989, Data Knowl. Eng..

[2]  E. F. Codd,et al.  A relational model of data for large shared data banks , 1970, CACM.

[3]  Isamu Kobayashi,et al.  Validating database updates , 1984, Inf. Syst..

[4]  Hendrik Decker,et al.  Integrity Checking in Deductive Databases - the Ultimate Method? , 1994, Australasian Database Conference.

[5]  Neil Tennant On having bad contractions, or: no room for recovery , 1997 .

[6]  Luís Moniz Pereira,et al.  Prolegomena to Logic Programming for Non-monotonic Reasoning , 1996, NMELP.

[7]  Robert A. Kowalski,et al.  The Iff Proof Procedure for Abductive Logic Programming , 1997, J. Log. Program..

[8]  Krzysztof R. Apt,et al.  Logic Programming and Negation: A Survey , 1994, The Journal of Logic Programming.

[9]  Michael Stonebraker,et al.  Implementation of integrity constraints and views by query modification , 1975, SIGMOD '75.

[10]  Wolffried Stucky,et al.  Integrity checking in data base systems , 1983, Inf. Syst..

[11]  Randy Goebel,et al.  Theorist: A Logical Reasoning System for Defaults and Diagnosis , 1987 .

[12]  Eduardo B. Fernandez,et al.  Database Security and Integrity , 1981 .

[13]  Peter A. Flach Inductive Logic Databases: From Extensional to Intensional Knowledge , 1997, DOOD.

[14]  Philip T. Cox,et al.  Causes for Events: Their Computation and Applications , 1986, CADE.

[15]  Volker Küchenhoff On the Efficient Computation of the Difference Between Concecutive Database States , 1991, DOOD.

[16]  Peter Gärdenfors,et al.  Belief Revision , 1995 .

[17]  Mark Wallace,et al.  Using Weakest Preconditions to Simplify Integrity Constraint Checking , 1993, Australian Database Conference.

[18]  Phan Minh Dung,et al.  An Argumentation-Theoretic Foundations for Logic Programming , 1995, J. Log. Program..

[19]  Michael Leuschel,et al.  Partial Deduction of the Ground Representation and its Application to Integrity Checking , 1995, ILPS.

[20]  Raymond Reiter On the Integrity of Typed First Order Data Bases , 1979, Advances in Data Base Theory.

[21]  Teodor C. Przymusinski On the Declarative Semantics of Deductive Databases and Logic Programs , 1988, Foundations of Deductive Databases and Logic Programming..

[22]  J. J. Florentin,et al.  Consistency Auditing of Databases , 1974, Comput. J..

[23]  Anthony Tomasic,et al.  View Update Translation via Deduction and Annotation , 1988, ICDT.

[24]  Mark Wallace Compiling Integrity Checking into Update Procedures , 1991, IJCAI.

[25]  Drew McDermott,et al.  Introduction to artificial intelligence , 1986, Addison-Wesley series in computer science.

[26]  Peter Gärdenfors,et al.  On the logic of theory change: Partial meet contraction and revision functions , 1985, Journal of Symbolic Logic.

[27]  Peter Gärdenfors,et al.  Belief Revision: Contents , 1992 .

[28]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[29]  John Wylie Lloyd,et al.  Foundations of Logic Programming , 1987, Symbolic Computation.

[30]  Mary-Anne Williams,et al.  Applications of Belief Revision , 1996, Transactions and Change in Logic Databases.

[31]  Allen Ginsberg Knowledge-Base Reduction: A New Approach to Checking knowledge Bases for Inconsistency and Redundancy , 1988, AAAI.

[32]  Robert A. Kowalski,et al.  Towards a Unified Agent Architecture that Combines Rationality with Reactivity , 1996, Logic in Databases.

[33]  Leon Sterling,et al.  An Integrated Interpreter for Explaining Prolog's Successes and Failures , 1989, International Workshop on Meta-Programming in Logic.

[34]  Robert A. Kowalski,et al.  Using Meta-Logic to Reconcile Reactive with Rational Agents , 1995, PAAM.

[35]  M. Kendall,et al.  The Logic of Scientific Discovery. , 1959 .

[36]  M E Orlowska,et al.  Advances in Database Research - Proceedings of the 4th Australian Database Conference, ADC '93, Griffith University, Brisbane, Queensland, Australia, February 1-2, 1993 , 1993, ADC.

[37]  Edmund M. Clarke,et al.  Fast Maintenance of Semantic Integrity Assertions Using Redundant Aggregate Data , 1980, VLDB.

[38]  Sin Yeung Lee,et al.  Further Improvements on Integrity Constraint Checking for Stratifiable Deductive Databases , 1996, VLDB.

[39]  Paolo Mancarella,et al.  Knowledge Assimilation and Abduction , 1990, Truth Maintenance Systems.

[40]  Hendrik Decker,et al.  On Generalized Cover Axioms , 1991, ICLP.

[41]  Michael Hammer,et al.  Efficient monitoring of database assertions , 1978, SIGMOD '78.

[42]  Raymond Reiter,et al.  Towards a Logical Reconstruction of Relational Database Theory , 1982, On Conceptual Modelling.

[43]  Hendrik Decker,et al.  How to Tackle Schema Validation by View Updating , 1996, EDBT.

[44]  Jeffrey D. Ullman,et al.  A survey of deductive database systems , 1995, J. Log. Program..

[45]  Hendrik Decker,et al.  Drawing Updates From Derivations , 1990, ICDT.

[46]  John Grant,et al.  Logic-based approach to semantic query optimization , 1990, TODS.

[47]  Robert A. Kowalski,et al.  Abduction Compared with Negation by Failure , 1989, ICLP.

[48]  Chandrabose Aravindan,et al.  Knowledge base dynamics, Abduction and Databases updates , 1995, J. Appl. Non Class. Logics.

[49]  Koichi Furukawa,et al.  Using Definite Clauses and Integrity Constraints as the Basis for a Theory Formation Approach to Diagnostic Reasoning , 1986, ICLP.

[50]  Jean-Marie Nicolas,et al.  An Outline of BDGEN: A Deductive DBMS , 1983, IFIP Congress.

[51]  Antoni Olivé Integrity Constraints Checking In Deductive Databases , 1991, VLDB.

[52]  Jack Minker Foundations of deductive databases and logic programming , 1988 .

[53]  Hendrik Decker,et al.  A Uniform Approach to Constraint Satisfaction and Constraint Satisfiability in Deductive Databases , 1988, EDBT.

[54]  Verónica Dahl Logic Programming as a Representation of Knowledge , 1983, Computer.

[55]  Donald D. Chamberlin,et al.  Functional specifications of a subsystem for data base integrity , 1975, VLDB '75.

[56]  Richard A. Frost,et al.  A Step Towards the Automatic Maintenance of the Semantic Integrity of Databases , 1983, Comput. J..

[57]  Robert A. Kowalski,et al.  A Theorem-Proving Approach to Database Integrity , 1988, Foundations of Deductive Databases and Logic Programming..

[58]  Hendrik Decker The Range Form of Databases and Queries or: How to Avoid Floundering , 1989, ÖGAI.

[59]  Antonis C. Kakas,et al.  Hypothetico-deductive Reasoning , 1992, FGCS.

[60]  Hendrik Decker,et al.  Abduction for knowledge assimilation in deductive databases , 1997, Proceedings 17th International Conference of the Chilean Computer Science Society.

[61]  Liz Sonenberg,et al.  Integrity Constraint Checking in Stratified Databases , 1987, J. Log. Program..

[62]  John McCarthy First Order Theories of Individual Concepts and Propositions. , 1979 .

[63]  Ravi S. Sandhu,et al.  On Five Definitions of Data Integrity , 1993, Database Security.

[64]  Raymond Reiter,et al.  A Logic for Default Reasoning , 1987, Artif. Intell..

[65]  Carlo Zaniolo,et al.  Stable models and non-determinism in logic programs with negation , 1990, PODS.

[66]  Robert A. Kowalski,et al.  The Limitaions of Logic and Its Role in Artificial Intelligence , 1989, Foundations of Knowledge Base Management.

[67]  Lawrence J. Henschen,et al.  Maintaining state constraints in relational databases: a proof theoretic basis , 1989, JACM.

[68]  Hendrik Decker,et al.  Hypothetical Query Answering in First-Order Databases , 1995, SCAI.

[69]  A. G. Fraser,et al.  Integrity of a Mass Storage Filing System , 1969, Comput. J..

[70]  Robert A. Kowalski,et al.  Logic for problem solving , 1982, The computer science library : Artificial intelligence series.

[71]  Tomasz Imielinski,et al.  Integrity checking for multiple updates , 1985, SIGMOD '85.

[72]  Maurice V. Wilkes,et al.  On preserving the integrity of data bases , 1972, Comput. J..

[74]  Ulrike Griefahn,et al.  Top-Down Integrity Constraint Checking for Deductive Databases , 1990, ICLP.

[75]  Bertram Raphael,et al.  The use of theorem-proving techniques in question-answering systems , 1968, ACM National Conference.

[76]  Gabriel M. Kuper,et al.  Constraint query languages (preliminary report) , 1990, PODS '90.

[77]  T. Coffey,et al.  Logic for verifying public-key cryptographic protocols , 1997 .

[78]  Jorge B. Bocca,et al.  MegaLog - A platform for developing Knowledge Base Management Systems , 1991, DASFAA.

[79]  Hendrik Decker,et al.  On Explanations in Deductive Databases , 1991, FMLDO.

[80]  Troels Andreasen,et al.  A Practical Approach to Hypothetical Database Queries , 1998, Transactions and Change in Logic Databases.

[81]  Jennifer Widom,et al.  Querying Semistructured Heterogeneous Information , 1995, J. Syst. Integr..

[82]  Jean-Marie Nicolas,et al.  Integrity Checking in Deductive Data Bases , 1977, Logic and Data Bases.

[83]  Stefano Ceri,et al.  Rules in database systems , 1996, CSUR.

[84]  Harry E. Pople,et al.  Session 6 Theorem Proving and Logic: I I ON THE MECHANIZATION OF ABDUCTIVE LOGIC , 2006 .

[85]  Keith L. Clark,et al.  Negation as Failure , 1987, Logic and Data Bases.

[86]  John Mylopoulos,et al.  Foundations of Knowledge Base Management , 1989, Topics in Information Systems.

[87]  Robert A. Kowalski Logic for Data Description , 1977, Logic and Data Bases.

[88]  Hendrik Decker,et al.  An Extension of SLD by Abduction and Integrity Maintenance for View Updating in Deductive Databases , 1996, Joint International Conference and Symposium on Logic Programming.

[89]  Sarit Kraus,et al.  Nonmonotonic Reasoning, Preferential Models and Cumulative Logics , 1990, Artif. Intell..

[90]  Jack Minker,et al.  Perspectives in Deductive Databases , 1988, J. Log. Program..

[91]  Lawrence J. Henschen,et al.  Compiling Constraint-Checking Programs from First-Order Formulas , 1982, Advances in Data Base Theory.

[92]  Gabriel M. Kuper,et al.  Constraint Query Languages , 1995, J. Comput. Syst. Sci..

[93]  Robert A. Kowalski,et al.  Problems and Promises of Computational Logic , 1990 .

[94]  Jack Minker,et al.  Logic and Databases: A Deductive Approach , 1984, CSUR.

[95]  Jack Minker,et al.  Informative and Cooperative Answers in Databases Using Integrity Constraints , 1987, Natural Language Understanding and Logic Programming Workshop.

[96]  W. W. Armstrong,et al.  Dependency Structures of Data Base Relationships , 1974, IFIP Congress.

[97]  Paolo Mancarella,et al.  Database Updates through Abduction , 1990, VLDB.

[98]  Ramasamy Uthurusamy,et al.  Data mining and knowledge discovery in databases , 1996, CACM.

[99]  Francesca Toni,et al.  Reduction of Abductive Logic Programs to Normal Logic Programs , 1995, ICLP.

[100]  J. W. LLOYD,et al.  Making Prolog more Expressive , 1984, J. Log. Program..

[101]  Jürgen Dix,et al.  A Framework for Representing and Characterizing Semantics of Logic Programs , 1992, KR.

[102]  Hendrik Decker,et al.  A Slick Procedure for Integrity Checking in Deductive Databases , 1994, ICLP.

[103]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[104]  Marvin Minsky,et al.  Logical vs. analogical or symbolic vs. connectionist or neat vs. scruffy , 1991 .

[105]  Naftaly H. Minsky On interaction with data bases , 1974, SIGFIDET '74.

[106]  David Poole,et al.  Explanation and prediction: an architecture for default and abductive reasoning , 1989, Comput. Intell..

[107]  Hendrik Decker,et al.  Some Steps Towards a DBMS-based KBMS , 1986, IFIP Congress.

[108]  Hendrik Decker,et al.  Improving Integrity Checking by Compiling Derivation Paths , 1993, Australian Database Conference.

[109]  Dennis McLeod,et al.  Semantic integrity in a relational data base system , 1975, VLDB '75.

[110]  Tom Stearns,et al.  LAN times guide to security and data integrity , 1996 .

[111]  Jack Minker,et al.  Logic and Databases: Past, Present, and Future , 1997, AI Mag..

[112]  David Poole,et al.  A Logical Framework for Default Reasoning , 1988, Artif. Intell..

[113]  Serge Abiteboul,et al.  Transactions and integrity constraints , 1985, PODS '85.

[114]  Subrata Kumar Das,et al.  Deductive Databases and Logic Programming , 1992 .

[115]  John McCarthy,et al.  Applications of Circumscription to Formalizing Common Sense Knowledge , 1987, NMR.

[116]  Jennifer Widom,et al.  Constraint checking with partial information , 1994, PODS.

[117]  Philip A. Bernstein,et al.  Fast methods for testing quantified relational calculus assertions , 1982, SIGMOD '82.