A probabilistic version of geometry is introduced. The fifth postulate of Euclid (Playfair's axiom) is adopted in the following probabilistic form: consider a line and a point not on the line-there is exactly one line through the point... more
This white paper introduces and defines a novel, open-source human-machine interaction protocol— the Causal Completeness Constraint Framework (C³F). Traditional AI interaction models treat "hallucinations" as a random, intractable bug.... more
The paper presents an iterative version of join-tree clustering that applies the message passing of join-tree clustering algorithm to join-graphs rather than to join-trees, itera tively. It is inspired by the success of Pearl's belief... more
The $\mathbf{LMT^{\rightarrow}}$ sequent calculus was introduced in Santos (2016). This paper presents a Termination proof and a new (more direct) Completeness proof for it. $\mathbf{LMT^{\rightarrow}}$ is aimed to be used for proof... more
In this paper, we conduct a thorough investigation into the reasoning capabilities of Large Language Models (LLMs), focusing specifically on the Open Pretrained Transformers (OPT) models as a representative of such models. Our study... more
We propose a methodology for investigating how well NLP systems handle meaning preserving syntactic variations. We start by presenting a method for the semi automated creation of a benchmark where entailment is mediated solely by meaning... more
This book constitutes the refereed proceedings of the 7th International Semantic Web Conference, ISWC 2008, held in Karlsruhe, Germany, during October 26-30, 2008. The volume contains 43 revised full research papers selected from a total... more
Available remedies to challenge arbitral awards in Pakistan are modification, remission, annulment and revocation of recognition and enforcement. Arbitration is a method through which disputing parties resolve their disputes outside the... more
We present a unified, formal account of AI agent behavior based on Local Uniform Generativity (LUG), a finitary meta-foundation in which evaluation proceeds by local, uniform, bounded-radius updates with primitive-recursive seeding and... more
Software-Defined Networking (SDN) centralizes control and improves programmability, but this also increases vulnerability to large-scale threats such as DDoS. Conventional intrusion detection systems often fail in this context due to... more
Formal reasoning about concurrent programs is usually done with the assumption that the underlying memory model is sequentially consistent, i.e. the execution outcome is equivalent to an interleaving of instructions according to the... more
Please help me to use Isabelle. This is a proof of Riemann hypothesis.
The performance of ontology matching algorithms is evaluated using F-measure, precision and recall which in turn rely on the availability of the ground truth. Typically, the ground truth generation process is manual, subjective and time... more
This paper presents Unified Dynamic Approximation Equation (UDAE) version 3.0, upgrading artificial intelligence systems from single-core spectrum models to dual-core networked architectures, establishing the theoretical foundation for... more
Most automated reasoning tasks with practical applications can be automatically reformulated into a constraint solving task. A constraint programming platform can thus act as a unique, underlying engine to be reused for multiple automated... more
in industrial and domestic considerations, tippers can pull a variety of products including gravel, grain, sand, fertilizer, heavy rocks, etc. The older dropping trolley or dumper has been conceived by observing the difficulty in... more
Tipper has lots of applications in today's world. I n industrial and domestic considerations, tippers c an haul a variety of products including gravel, potato es, grain, sand, compost, heavy rocks, etc. By cons idering wide scope of... more
Abstract. We describe a matching algorithm for terms built over flexible arity function symbols and context, function, sequence, and individual variables. The algorithm is called a context sequence matching algorithm. Context variables... more
This paper proposes a technique to limit the number of possible terms to be considered in quantifier instantiation. One of the major hurdles that SMT solvers face when dealing with quantifiers is that there are simply too many terms to... more
The administrator of current IT environments is facing a continuous increase in the complexity that s/he needs to handle. S/he can be compared to a power jet pilot sitting in front of a console with a plenty of gouges, leds, counters,... more
Sycophancy in neural networks-defined as the tendency of advanced models, particularly Large Language Models (LLMs), to excessively agree with or flatter users-has surfaced as a significant threat to the reliability, objectivity, and... more
Higher education remains in the midst of transformation because Artificial Intelligence continues to enhance institutional handling of admissions alongside student guidance and research operations. AI tools in admissions exams... more
CLIP is an implementation of CLP(Intervals) which has been designed to be verifiably correct in the sense that the answers it returns are mathematically correct solutions to the underlying arithmetic constraints. This fundamental design... more
Analyzing array-based computations to determine data dependences is useful for many applications including automatic parallelization, race detection, computation and communication overlap, verification, and shape analysis. For sparse... more
Analyzing array-based computations to determine data dependences is useful for many applications including automatic parallelization, race detection, computation and communication overlap, verification, and shape analysis. For sparse... more
In several aspects of the fuzzy sets theory and its applications, it is convenient to do some manipulations on the formulas that are proposed in order to obtain some enhancements in methods such as in design and implementation. Currently,... more
A shallow semantical embedding of Input/Output logic in classical higher-order logic is presented, and shown to be faithful (sound an complete). This embedding has been implemented in the higher-order proof assistant Isabelle/HOL. We... more
The foundations of forcing theory are reworked to streamline the presentation and to show how the most basic results are applicable in very general contexts.
Number of vehicles on our roads is increasing day by day, also the technology has developed but the safety factor is always needed to be considered. Now a day’s vehicles come fitted with lots of safety features. One of the essential... more
Mariana Olezza (IIEP/UBA), Javier Legris (IIEP/UBA/CONICET) - Peirce on logical machines and semiotics. Abstract: In the dawn of symbolic logic, Charles S. Peirce (1839–1914) discussed the logical machines devised at that time in a short... more
The paper presents a fuzzy expert system that possesses the ability to self-learn, self-correct and self-expand. These features embellish the expert system with the capability to cope effectively with the ever-changing industrial... more
Tree automata completion is a technique for the verification of infinite state systems. It has already been used for the verification of cryptographic protocols and the prototyping of Java static analysers. However, as for many other... more
Di Indonesia, bitcoin merupakan bentuk mata uang digital (e-money) dan alat transaksi pembayaran yang sudah digunakan oleh sebagian masyarakat. Hal tersebut perlu mendapatkan perhatian, khususnya dari Bank Indonesia. Lain dari pada itu,... more
Industri Keuangan Syari'ah (IKS) dalam menjalankan aktifitasnya harus mematuhi sejumlah aturan yang memuat berbagai prinsip syari'ah yang diaktualisasikan dalam bentuk fatwa yang dikeluarkan oleh Dewan Syari'ah Nasional (DSN).... more
This research was conducted at IAIN Raden Intan Bandar Lampung which is aimed at revealing the influence of leadership on the lecturers' professionalism and teaching-learning quality. The study uses a quantitative approach through... more
In recent years backtrack search algorithms for propositional satisfiability (SAT) have been the subject of dramatic improvements. These improvements allowed SAT solvers to successfully solve instances with thousands or tens of thousands... more
This paper summarises and gives an overview of the development of the ΩMEGA system during the 12 years of funding by the SFB 378. The research objective of the ΩMEGA project has been to lay the foundation complex, heterogenous, but well... more
Non-classical logics are used in a wide spectrum of disciplines, including artificial intelligence, computer science, mathematics, and philosophy. The de-facto standard infrastructure for automated theorem proving, the TPTP World,... more
This paper presents the Dr.Doodle system, an interactive theorem prover that uses diagrammatic representations. The assumption underlying this project is that, for some domains (principally geometry), diagrammatic reasoning is easier to... more
For the whole class of linear term rewriting systems and for each integer k, we define k-bounded rewriting as a restriction of the usual notion of rewriting. We show that the problem of the existence of an infinite k-bounded derivation,... more
Bounded rewriting for linear term rewriting systems has been defined in (I. Durand, G. Sénizergues, M. Sylvestre. Termination of linear bounded term rewriting systems. Proceedings of the 21st International Conference on Rewriting... more
We propose a method which allows us to develop tableaux modulo theories using the principles of superdeduction, among which the theory is used to enrich the deduction system with new deduction rules. This method is presented in the... more
The use of formal methods provides confidence in the correctness of developments. Yet one may argue about the actual level of confidence obtained when the method itself -or its implementation -is not formally checked. We address this... more
We develop a formal proof of the ML type inference algorithm, within the Coq proof assistant. We are much concerned with methodology and reusability of such a mechanization. This proof is an essential step toward the certification of a... more
EU-IST Integrated Project (IP) IST-2003-506826 SEKT Deliverable D3.6.1(WP3.6) In this document, we present a framework for inconsistent ontology diagnosis and repair by defining a number of new non-standard reasoning services to explain... more
Evolutionary algorithms or computations (EC) are commonly used for solving problems such as optimization and reverse engineering of complex systems. In this paper, we present bio-inspired approach in a process of evolving design for the... more
The PV solar energy development has already emerged as both framework and keystone to sustainable development in 21st century which is being offered as a boon for a clean pathway of renewable sustainable source amid mounting climate... more
As it appeared in the first and second editions of this Encyclopedia, this article dealt with machine-and assembly-language programming as if they were dead or dying, and the article aspired to do little more than deliver a eulogy before... more
As it appeared in the first and second editions of this Encyclopedia, this article dealt with machine-and assembly-language programming as if they were dead or dying, and the article aspired to do little more than deliver a eulogy before... more