Compromised Updates in Labelled Databases
نویسنده
چکیده
This paper presents a logical system, CIULDS, as a labelled realization to our approach of Compromising Interfering Updates. The approach proposes a method for handling logically con icting inputs into knowledge bases, via restricting their consequences. The main idea is to update the database with as many consistent consequences of the inputs as possible, in the case that the inputs themselves are not allowed to be kept in it. And in the case that a revision applies, the idea is to keep as many as possible of the consistent consequences of the retracted sentences as a compromise. The reconciliation of con icting inputs follows some speci ed postulates for compromised revision. CIULDS is based on the Labelled Deductive Systems framework (LDS). In CIULDS we take advantage of LDS's labelling facility, to control the derivation process of the compromised consequences. We embed in the labelling propagation conditions, which act on the inference rules, part of the control mechanism for the compromised approach. This mechanism helps the update operations to perform the reconciliation of con icting inputs. The update operations invoke a speci c revision method, which applies some compromising criteria for achieving the revised labelled database, whenever con icts arise. In this paper, we present brie y our main motivations and we introduce the speci cation of our approach, for the case of database updates. We present CIULDS, by decribing informally its main features and de nitions. Finally, we summarize the system's main properties.
منابع مشابه
On reconciling conflicting updates (a compromised revision approach)
This thesis proposes a method for handling logically con icting inputs into knowledge bases in a compromised way. The method revises nite bases which are subjected to some integrity constraints, and performs a reconciliation of the con icting data, by allowing the consistent logical consequences of the given up database elements or inputs, to update the database as a compromise. Since justi cat...
متن کاملUpdating Atomic Information in Labelled Database Systems ( Extended Abstract )
This paper investigates the applications of Labelled Deductive Systems (LDS) as a framework for the development of a computational formalism for the description of active historical databases. This formalism is then applied to the study of retroactive updates. The propositional temporal logic USV/'Z for temporal validity is presented and we prove its soundness and completeness. The historical d...
متن کاملUpdating Atomic Information in Labelled Database Systems ( Extended
This paper investigates the applications of Labelled Deductive Systems (LDS) as a framework for the development of a computational formalism for the description of active historical databases. This formalism is then applied to the study of retroactive updates. The propositional temporal logic USV/Z for temporal validity is presented and we prove its soundness and completeness. The historical da...
متن کاملStateful Applied Pi Calculus
We extend the applied pi calculus with state cells, which are used toreason about protocols that store persistent information. Examples are protocolsinvolving databases or hardware modules with internal state. We distinguish be-tween private state cells, which are not available to the attacker, and public statecells, which arise when a private state cell is compromised by the at...
متن کاملUpdates in Treatment Modalities and Techniques on Compromised Alveolar Ridge Augmentation for Successful Dental Implant Therapy
Installation of dental implants is often hindered by compromised alveolar ridge which requires augmentation. Several methods including autogenous bone graft, guided bone regeneration, and distraction osteogenesis are implied to restore the compromised alveolar ridge. This chapter reviews treatment modalities and techniques of alveolar ridge augmentation. Recent development and updates in this f...
متن کامل