A selected artificial intelligence bibliography for operations researchers
Article
- 86 Downloads
- 6 Citations
Abstract
We have compiled a selected, classified, and annotated Artificial Intelligence bibliography specifically addressed to an operations research audience. The bibliography includes approximately 450 references from the areas of search (including heuristics and games), automatic deduction (including theorem proving, logic programming, and logical aspects of databases), planning, learning, and knowledge-based systems (with numerous specific applications to management, engineering, science, medicine, and other fields). We have also added a general references section, as well as a special section on Artificial Intelligence/Operations Research interfaces.
Keywords
Artificial Intelligence General Reference Operation Research Logic Programming Special Section
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- [1]Bramer, M.A. and D. Bramer,The Fifth Generation: An Annotated Bibliography, Addison-Wesley, Reading, MA, 1984.Google Scholar
- [2]Gevarter, W.B.,Artificial Intelligence, Expert Systems, Computer Vision, and Natural Language Processing, Noyes Publications, Park Ridge, NJ, 1984.Google Scholar
- [3]Glover, F., Future paths for integer programming and links to artificial intelligence,Computers and Operations Research 13(5) (1987) 533–549.Google Scholar
- [4]Gonzalez, R.C. and P. Wintz,Digital Image Processing, Addison-Wesley, Reading, MA, 1977.Google Scholar
- [5]Papadimitriou, C.H., An algorithm for shortest path motion in three dimensions,Information Processing Letters 20 (1985) 259–263.Google Scholar
- [6]Pratt, W.K.,Digital Image Processing, Wiley, New York, 1978.Google Scholar
- [7]Rylko, H.M.,Artificial Intelligence: bibliographic summaries of the select literature, Vol. I, A Report Store Consensus Bibliography, Lawrence, KS, 1984.Google Scholar
- [8]Rylko, H.M.,Artificial Intelligence: bibliographic summaries of the select literature, Vol. II, A Report Store Consensus Bibliography, Lawrence, KS, 1985.Google Scholar
- [9]Wagner, H.,Principles of Management Science, Prentice-Hall, Englewood Cliffs, NJ, 1970.Google Scholar
- [10]Andrew, A.M.,Artificial Intelligence, Abacus Press, 1983. (Vol. 3 in the Cybernetics and Systems Series, J. Rose, series ed.)Google Scholar
- [11]Barr, A. and E.A. Feigenbaum,The Handbook of Artificial Intelligence, Vol. I, William Kaufman, Los Altos, CA, 1981.Google Scholar
- [12]Barr, A. and E.A. Feigenbaum,The Handbook of Artificial Intelligence, Vol. II, William Kaufman, Los Altos, CA, 1982.Google Scholar
- [13]Bramer, M.A. and D. Bramer,The Fifth Generation: An Annotated Bibliography, Addison-Wesley, Reading, MA, 1984.Google Scholar
- [14]Charniak, E. and D.V. McDermott,Introduction to Artificial Intelligence, Addison-Wesley, Reading, MA, 1985.Google Scholar
- [15]Clocksin, W.F. and C.S. Mellish,Programming in PROLOG, Springer-Verlag, New York, 1981.Google Scholar
- [16]Cohen, P.R. and E.A. Feigenbaum,The Handbook of Artificial Intelligence, Vol. III, William Kaufman, Los Altos, CA, 1982.Google Scholar
- [17]Dreyfus, H.L. and S.E. Dreyfus,Mind over Machine, MacMillan/The Free Press, New York, 1985.Google Scholar
- [18]Feigenbaum, E.A. and J. Feldman, eds.,Computers and Thought, McGraw-Hill, New York, 1963.Google Scholar
- [19]Feigenbaum, E.A. and P. McCorduck,The Fifth Generation: Artificial Intelligence and Japan's Computer Challenge to the World, Addison-Wesley, Reading, MA, 1983.Google Scholar
- [20]Fischler, M.A. and O. Firschein,Intelligence: the Eye, the Brain and the Computer, Addison-Wesley, Reading, MA, 1977.Google Scholar
- [21]Giannesini, F., H. Hanoui, R. Pasero and M. van Caneghem,PROLOG, Addison-Wesley, Reading, MA, 1986.Google Scholar
- [22]Nilsson, N.J.,Problem-solving Methods in Artificial Intelligence, McGraw-Hill, New York, 1971.Google Scholar
- [23]Nilsson, N.J.,Principles of Artificial Intelligence, Tioga, Palo Alto, CA, 1980.Google Scholar
- [24]Rich, E.,Artificial Intelligence, McGraw-Hill, New York, 1983.Google Scholar
- [25]Rylko, H.M.,Artificial Intelligence: bibliographic summaries of the select literature, Vol. I, A Report Store Consensus Bibliography, Lawrence, KS, 1984.Google Scholar
- [26]Rylko, H.M.,Artificial Intelligence: bibliographic summaries of the select literature, Vol. II, A Report Store Consensus Bibliography, Lawrence, KS, 1985.Google Scholar
- [27]O'Shea, T. and M. Eisenstadt,Artificial Intelligence: Tools, Techniques and Applications, Harper and Row, New York, 1984.Google Scholar
- [28]Scientific Datalink, The Scientific Datalink Index to Artificial Intelligence Research (1954–1984) and (1985 supplement), Comtex Scientific Corporation, New York, (Authors, Titles, Abstracts, Subjects).Google Scholar
- [29]Simon, H.A.,Science of the Artificial, M.I.T. Press, Cambridge, MA, 1969.Google Scholar
- [30]Winograd, T., R. Davis, S.E. Dreyfus and B. Smith, Expert systems: how far can they go?,Proceedings of IJCAI 9 (1985) 1306–1309.Google Scholar
- [31]Winston, P.H.,Artificial Intelligence, Addison-Wesley, Reading, MA, 1984, 2nd edition.Google Scholar
- [32]Winston, P.H. and R.H. Brown,Arificial Intelligence: An MIT Perspective, Vols. 1 and 2, M.I.T. Press, Cambridge, MA, 1979.Google Scholar
- [33]Blair, C.E., R.G. Jeroslow and J.K. Lowe, Some results and experiments in programming techniques for propositional logic,Computers and Operations Research 13(5) (1986) 633–645.Google Scholar
- [34]Glover, F., Future paths for integer programming and links to artificial intelligence,Computers and Operations Research 13(5) (1986) 533–549.Google Scholar
- [35]Grant, T.J., Lessons for O.R. from A.I.: a scheduling case study,Journal of the Operational Research Society 37(1) (1986) 41–57.Google Scholar
- [36]Jeroslow, R.G., An extension of mixed-integer programming models and techniques to some database and Artificial Intelligence settings, Technical Report, College of Management, Georgia Institute of Technology, March 1987.Google Scholar
- [37]Kusiak, A., Applications of operational research models and techniques in flexible manufacturing systems,European Journal of Operational Research 24(3) (1986) 336–345.Google Scholar
- [38]Kusiak, A., Artificial intelligence and operations research in flexible manufacturing systems,INFOR 25(1) (1987) 2–12.Google Scholar
- [39]O'Keefe, R.M., Expert systems and operational research — mutual benefits,Journal of the Operational Research Society 36(2) (1985) 125–129.Google Scholar
- [40]Paul, R.J. and G.I. Doukidis, Further developments in the use of artificial intelligence techniques which formulate simulation problems,Journal of the Operational Research Society 37(8) (1986) 787–810.Google Scholar
- [41]Phelps, R.I., Artificial intelligence, an overview of similarities with O.R.,Journal of the Operational Research Society 37(1) (1986) 13–20.Google Scholar
- [42]Radermacher, F.J., ed.,Proceedings of the International Conference on multi-attribute decision-making via OR-based expert systems, West Germany, April 1987.Google Scholar
- [43]Reggia, J.A., D.S. Nau and Y. Peng, A formal model of diagnostic inference I: problem formulation and decomposition,Information Sciences 37 (1985) 227–256.Google Scholar
- [44]Reggia, J.A., D.S. Nau and Y. Wang, A formal model of diagnostic inference II: algorithmic solution and application,Information Sciences 37 (1985) 257–285.Google Scholar
- [45]Shaw, M.J. and A.B. Whinston, Applications of artificial intelligence to planning and scheduling in flexible manufacturing, in A. Kusiak ed.,Flexible Manufacturing Systems: Methods and Studies, North-Holland, Amsterdam (1986) 223–242.Google Scholar
- [46]Amarel, S., An approach to heuristic problem-solving and theorem proving in the propositional calculus, in: J. Hart and S. Tahasu, eds.,Systems and Computer Science, University of Toronto Press, Toronto, 1967.Google Scholar
- [47]Evans, T.G., A heuristic program to solve geometric analogy problems, in: M. Minsky, ed.,Semantic Information Processing, M.I.T. Press, Cambridge, MA, 1963.Google Scholar
- [48]Kowalski, R., AND/OR graphs, theorem proving graphs, and bidirectional search,Machine Intelligence 7 (1972) 167–194.Google Scholar
- [49]Kowalski, R.A.,Logic for Problem Solving, Elsevier, New York, 1979.Google Scholar
- [50]Laurière, J.L., A language and a program for stating and solving combinatorial problems,Artificial Intelligence 10 (1978) 29–127.Google Scholar
- [51]Levi, G. and F. Sirovich, Generalized AND/OR graphs,Artificial Intelligence 7 (1976) 243–259.Google Scholar
- [52]Vanderbrug, G.J., Problem representations and formal properties of heuristic search,Information Sciences 2 (1976) 279–307.Google Scholar
- [53]Fisher, M.L., Worst-case analysis of heuristic algorithms,Management Science 26 (1980) 1–17.Google Scholar
- [54]Graham, R.L., E.L. Lawler, J.K. Lenstra and A.H.G. Rinnooy Kan, Optimization and approximation in deterministic sequencing and scheduling: a survey,Annals of Discrete Mathematics 5 (1979) 287–326.Google Scholar
- [55]Groner, R., M. Groner and W.F. Bischof, eds.,Methods of Heuristics, Lawrence Erlbaum Associates Publishers, 1983.Google Scholar
- [56]Hu, T.C. and E.S. Kuh, Theory and concepts of circuit layout, in: T.C. Hu and E.S. Kuh, eds.,VLSI Circuit Layout: Theory and Design, IEEE Press, New York, 1985.Google Scholar
- [57]Johnson, D.S., Approximation algorithms for combinatorial problems,Journal of Computer and System Sciences 9 (1976) 256–278.Google Scholar
- [58]Kusiak, A., ed.,Flexible Manufacturing Systems: Methods and Studies, North-Holland, Amsterdam, 1986.Google Scholar
- [59]Lenat, D.B., Discovery in mathematics as heuristic search, Ph.D. Dissertation, Computer Science Department, Carnegie-Mellon University, 1977.Google Scholar
- [60]Lenat, D.B., The nature of heuristics, Computer Science Department, Stanford University, 1980.Google Scholar
- [61]Lin, S., Computer solutions of the travelling salesman problem,Bell Systems Technical Journal 44 (1965) 2245–2269.Google Scholar
- [62]Minsky, M., Heuristic aspects of the Artificial Intelligence problem, Group Report No. 34-55, Lincoln Laboratory, MIT (ASTIA Doc. No. AS236885), Lexington, MA, 1956.Google Scholar
- [63]Mueller-Merbach, H., Heuristic methods: structures, applications, computational experience, in: R. Cottle and J. Krarup, eds.,Optimization Methods for Resource Allocation, English Universities Press, London, 1974, 401–416.Google Scholar
- [64]Newell, A. and H.A. Simon, Heuristic problem solving: the next advance in Operations Research,Operations Research 6(1) (1958).Google Scholar
- [65]Newell, A. and H.A. Simon,Human Problem Solving, Prentice-Hall, Englewood Cliffs, NJ, 1972.Google Scholar
- [66]Pearl, J., Heuristic search theory: a survey of recent results,Proceedings of IJCAI 7, (1981) 24–28.Google Scholar
- [67]Pearl, J.,Search and Heuristics, North-Holland, Amsterdam, 1983.Google Scholar
- [68]Pearl, J.,Heuristics: Intelligent Search Strategies for Computer Problem Solving, Addison-Wesley, Reading, MA, 1984.Google Scholar
- [69]Pohl, I., Practical and theoretical considerations in heuristic search algorithms, in: E.W. Elcock and D. Michie, eds.,Machine Intelligence 8, Wiley, New York, 1977, 55–72.Google Scholar
- [70]Slagle, J.R.,Artificial Intelligence: The Heuristic Programming Approach, McGraw-Hill, New York, 1971.Google Scholar
- [71]Sussman, G. and R. Stallman, Heuristic techniques in computer-aided circuit analysis,IEEE Transactions on Circuits and Systems, CAS 22(11) (1975) 857–865.Google Scholar
- [72]Thompson, G.L., Heuristic programming: theory and computation, in: J.F. Pierce, ed.,Operations Research and the Design of Management Information Systems, Techn. Ass. of the Pulp and Paper Industry, New York, 1967.Google Scholar
- [73]Zadeh, L.A., Approximate reasoning based on fuzzy logic,Proceedings of IJCAI 6 (1979) 1004–1010.Google Scholar
- [74]Deo, N. and C. Pang, Shortest path algorithms: taxonomy and annotations, CS-80-057, Computer Science Department, Washington State University, 1971.Google Scholar
- [75]Gallo, G. and S. Pallottino, Shortest path methods: a unifying approach,Mathematical Programming Studies 26 (1986) 38–64.Google Scholar
- [76]Horowitz, E. and S. Sahni,Fundamentals of Computer Algorithms, Computer Science Press, Potomac, MD, 1978.Google Scholar
- [77]Tarjan, R.E., Depth-first search and linear graph algorithms,SIAM Journal of Computing 1 (1972) 146–160.Google Scholar
- [78]Bagchi, A. and A. Mahanti, Search algorithms under different kinds of heuristics — a comparative study,Journal of ACM 30(1) (1983) 1–21.Google Scholar
- [79]Camerini, P.M. and F. Maffioli, Heuristically guided algorithm fork-parity matroid problems,Discrete Mathematics 21 (1978) 103–116.Google Scholar
- [80]Chakrabarti, P.P., S. Ghose and S.C. De Sarkar, Heuristic search through islands,Artificial Intelligence 29 (1986) 339–347.Google Scholar
- [81]De Champeaux, B. and L. Sint, An improved bi-directional heuristic search algorithm,Journal of ACM 24 (1977) 177–191.Google Scholar
- [82]Dechter, R. and J. Pearl, Generalized best first strategies and the optimality ofA*,Journal of ACM 32 (1985) 505–536.Google Scholar
- [83]Hart, P.E., N.J. Nilsson and B. Raphael, A formal basis for the heuristic determination of minimum test paths,IEEE Transactions on Systems and Cybernetics SSC-4(2) (1968) 100–107.Google Scholar
- [84]Hart, P.E., N.J. Nilsson and B. Raphael, Correction to a formal basis for the heuristic determination of minimum cost paths,SIGART Newsletter 37 (1972) 28–29.Google Scholar
- [85]Ibaraki, T., The power of dominance relations in branch-and-bound algorithms,Journal of ACM 24(2) (1977) 264–279.Google Scholar
- [86]Ibaraki, T., Branch-and-bound procedures and state space representation of combinatorial optimization problems,Information and Control 36 (1978 a) 1–27.Google Scholar
- [87]Ibaraki, T.,M-depth search in branch-and-bound algorithms,International Journal on Computers and Information Science 7 (1978 b) 315–373.Google Scholar
- [88]Kernighan, B.W. and S. Lin, An efficient heuristic procedure for partitioning graphs,Bell Systems Technical Journal 29 (February 1970) 291–307.Google Scholar
- [89]Korf, R.E., Depth-first iterative-deepening: an optimal admissible tree search,Artificial Intelligence 27 (1985) 97–109.Google Scholar
- [90]Krishnamurthy, B., An improved min-cut algorithm for partitioning VLSI networks,IEEE Transactions on Computers C-33(5) (May 1984) 438–446.Google Scholar
- [91]Laurierè, J.L., A language and a program for stating and solving combinatorial problems,Artificial Intelligence 10 (1978) 29–127.Google Scholar
- [92]Lawler, E.L. and D.E. Wood, Branch-and-bound methods: a survey,Operations Research 14 (1966) 699–719.Google Scholar
- [93]Lin, S., Computer solutions of the travelling salesman problem,Bell Systems Technical Journal 44 (1965) 2245–2269.Google Scholar
- [94]Martelli, A., On the complexity of admissible search heuristics,Artificial Intelligence 8 (1977) 1–13.Google Scholar
- [95]Mérő, L., Some remarks on heuristic search algorithms,Proceedings IJCAI 7 (1981) 572–574.Google Scholar
- [96]Mitten, L.G., Branch-and-bound methods: general formulation and properties,Operations Research 18 (1970) 23–34.Google Scholar
- [97]Montanari, U., Heuristically guided search and chromosome matching,Artificial Intelligence 1 (1970) 227–245.Google Scholar
- [98]Morin, T.L. and R.E. Marsten, Branch and bound strategies for dynamic programming,Operations Research 24 (1976) 611–627.Google Scholar
- [99]Nemhauser, G.L., A generalized permanent label setting algorithm for the shortest path between specified nodes,Journal of Mathematical Analysis and Applications 38 (1972) 328–334.Google Scholar
- [100]Pearl, J., Knowledge versus search: a quantitative analysis usingA*,Artificial Intelligence 20 (1983) 1–13.Google Scholar
- [101]Pearl, J.,Heuristics: Intelligent Search Strategies for Computer Problem Solving, Addison-Wesley, Reading, MA, 1984.Google Scholar
- [102]Pohl, I., First results on the effect of error in heuristic search, in: B. Meltger and D. Michie, eds.,Machine Intelligence 5, Elsevier, New York, 1970, 219–236.Google Scholar
- [103]Amarel, S., An approach to heuristic problem-solving and theorem proving in the propositional calculus, in: J. Hart and S. Tahasu, eds.,Systems and Computer Science, University of Toronto Press, Toronto, 1967.Google Scholar
- [104]Bagchi, A. and A. Mahanti, AND/OR graph heuristic search methods,Journal of ACM 32 (1985) 1–27.Google Scholar
- [105]Chang, C.L. and J.R. Slagle, An admissible and optimal algorithm for searching AND/OR graphs,Artificial Intelligence 2 (1971) 117–128.Google Scholar
- [106]Dechter, R. and J. Pearl, Generalized best first search strategies and the optimality ofA*,Journal of ACM 32 (1985) 505–536.Google Scholar
- [107]Hinxmann, A.I., Problem reduction and the two-dimensional trim-loss problem, in:Proceedings Summer Conference on Artificial Intelligence and Simulation of Behaviour, Department of Artificial Intelligence, University of Edinburgh, Scotland, 1976.Google Scholar
- [108]Kowalski, R., AND/OR graphs, theorem proving graphs, and bidirectional search,Machine Intelligence 7 (1972) 167–194.Google Scholar
- [109]Kumar, V. and L.N. Kanal, A general branch-and-bound formulation for understanding and synthesizing AND/OR tree search procedures,Artificial Intelligence 21 (1983) 179–198.Google Scholar
- [110]Martelli, A. and U. Montanari, Additive AND/OR graphs,Proceedings IJCAI 3(1973) 1–11.Google Scholar
- [111]Martelli, A. and U. Montanari, Optimizing decision trees through heuristically guided search,Communications of ACM 21 (1978) 1025–1039.Google Scholar
- [112]Nilsson, N.J., Searching problem solving and game-playing trees for minimal cost solutions, in: A.J.H. Morrell, ed.,Information Processing 68, Vol. 2, North-Holland, Amsterdam, 1969, 1556–1562.Google Scholar
- [113]Raiffa, H.,Decision Analysis, Addison-Wesley, Reading, MA, 1968.Google Scholar
- [114]Vanderbrug, G.J. and J. Minker, State-space, problem-reduction and theorem proving — some relationships,Communications of ACM 18 (1975) 107–115.Google Scholar
- [115]Bagchi, A. and A. Mahanti, Search algorithms under different kinds of heuristics — a comparative study,Journal of ACM 30(1) (1983) 1–21.Google Scholar
- [116]Dechter, R. and J. Pearl, Generalized best first strategies and the optimality ofA*,Journal of ACM 32 (1985) 505–536.Google Scholar
- [117]Gaschnig, J., Performance measurement and analysis of certain search heuristics, Ph.D. Dissertation, Computer Science Department, Carnegie-Mellon University, 1979.Google Scholar
- [118]Gelperin, D., On the optimality ofA*,Artificial Intelligence 8(1) (1977) 69–76.Google Scholar
- [119]Harris, L.R., The heuristic search under conditions of error,Artificial Intelligence 5(3) (1974) 217–134.Google Scholar
- [120]Hart, P.E., N.J. Nilsson and B. Raphael, A formal basis for the heuristic determination of minimum test paths,IEEE Transactions on Systems Science and Cybernetics SSC-4(2) (1968) 100–107.Google Scholar
- [121]Huyn, N., R. Dechter and J. Pearl, Probabilistic analysis of the complexity ofA*,Artificial Intelligence 15 (1980) 241–254.Google Scholar
- [122]Karp, R.M., The probabilistic analysis of some combinatorial search algorithms, in: J.F. Traub, ed.,Algorithms and Complexity: New Directions and Recent Results, Academic Press, New York, 1976, 1–19.Google Scholar
- [123]Knuth, D.E., Estimating the efficiency of backtrack programs,Mathematics of Computation 24 (1975) 121–136.Google Scholar
- [124]Munyer, J., Some results on the complexity of heuristic search in graphs, Technical Report HP-76-2, Information Sciences Department, University of California, Santa Cruz, 1976.Google Scholar
- [125]Pearl, J., Knowledge versus search: a quantitative analysis usingA*,Artificial Intelligence 20 (1983) 1–13.Google Scholar
- [126]Pohl I., First results on the effect of error in heuristic search, in: B. Meltger and D. Michie, eds.,Machine Intelligence 5, Elsevier, New York, 1970, 219–236.Google Scholar
- [127]Vanderbrug, G.J., Problem representations and formal properties of heuristic search,Information Sciences 2 (1976) 279–307.Google Scholar
- [128]Banerji, R.B.,Artificial Intelligence: A Theoretical Approach, North-Holland, Amsterdam, 1980.Google Scholar
- [129]Ernst, G.W. and M.M. Goldstein, Mechanical discovery of classes of problem-solving strategies,Journal of ACM 29(1) (1982) 1–23.Google Scholar
- [130]Gaschnig, J., A problem similarity approach to devising heuristics: first results,Proceedings IJCAI 6 (1979) 301–307.Google Scholar
- [131]Geoffrion, A.M., Elements of large scale mathematical programming. Part I: Concepts, in: A.M. Geoffrion, ed.,Perspectives in Optimization, Addison-Wesley, Reading, MA, 1972, 25–48.Google Scholar
- [132]Guida, G. and M. Somalvico, A method for computing heuristics in problem solving,Information Sciences 19 (1979) 251–259.Google Scholar
- [133]Kibler, D., Natural generation of admissable heuristics, Department of Computer Science, University of California at Irvine, 1982.Google Scholar
- [134]Lenat, D.B., EURISKO: A program that learns new heuristics and domain concepts. The nature of heuristics III: program design and results,Artificial Intelligence 21(1–2) (1983) 61–98.Google Scholar
- [135]Maffioli, F., M.G. Speranza and C. Vercellis, Randomized algorithms: an annotated bibliography,Annals of Operations Research 1 (1984) 331–345.Google Scholar
- [136]Mitchell, T.M., R. Utgoff, B. Nudel and R.B. Banerji, Learning problem solving heuristics through practice,Proceedings of IJCAI 7 (1981) 127–134.Google Scholar
- [137]Pearl, J., On the discovery and generation of certain heuristics,The UCLA Computer Science Quarterly 10(2) (1982) 121–132, Reprinted inAI Magazine (Winter/Spring 1983) 23–33.Google Scholar
- [138]Valtorta, M., A result on the computational complexity of heuristic estimates for theA* algorithm, Department of Conputer Science, Duke University, Durham, NC, 1981.Google Scholar
- [139]Waterman, D., Generalization of learning techniques for automating the learning of heuristics,Artificial Intelligence 1 (1970) 121–170.Google Scholar
- [140]Bacharach, M.,Economics and the Theory of Games, McMillan, London, 1976.Google Scholar
- [141]Berge, C.,Théorie Générale des jeux à n Personnes, Mem. des Sciences Math. 138, Gauthier-Villars, Paris, 1957.Google Scholar
- [142]Berlekamp, E.R., J.H. Conway and R.K. Guy,Winning Ways for your Mathematical Plays, Academic Press, New York, 1982.Google Scholar
- [143]Brams, S.J.,Game Theory and Politics, The Free Press, New York, 1975.Google Scholar
- [144]Gillies, D.B., Solutions to general non-zero-sum games,Annals of Mathematics Studies 40, Princeton University Press, Princeton, NJ, 1959, 47–85.Google Scholar
- [145]Kaplan, E.L.,Mathematical Programming and Games, Wiley, New York, 1982.Google Scholar
- [146]Luce, R.D. and H. Raiffa,Games and Decisions, Wiley, New York, 1957.Google Scholar
- [147]Owen, G.,Game Theory, W.B. Saunders, Philadelphia, 1968.Google Scholar
- [148]Shapley, L.S. and M. Shubik, Characteristic function, core and stable sets,Game Theory in Economics, Ch. 6, Rand Corporation Report R-904/6-NSF, 1973.Google Scholar
- [149]Von Neumann, J. and O. Morgenstern,Theory of Games and Economic Behavior, Princeton University Press, Princeton, NJ, 1944, 1967, 1983.Google Scholar
- [150]Acosta, A., Conditions for pathological search on MIN-MAX games, Master's thesis, Department of Engineering Systems, School of Engineering and Applied Science, University of California, Los Angeles, 1982.Google Scholar
- [151]Beal, D., An analysis of minimax, in: M.R.B. Clarke, ed.,Advances in Computer Chess 2, University Press, Edinburgh, 1980, 103–109.Google Scholar
- [152]Beal, D., Benefits of minimax search, in: M.R.B. Clarke, ed.,Advances in Computer Chess 3, Pergamon, Elmsford, NY, 1982, 17–24.Google Scholar
- [153]Berliner, H.J., TheB* tree search algorithm: a best-first proof procedure,Artificial Intelligence 12(1) (1979) 23–40.Google Scholar
- [154]Campbell, M.S. and T.A. Marshland, A comparison of minimax tree search algorithms,Artificial Intelligence 20(4) (1983) 347–367.Google Scholar
- [155]Hart, T.P. and D.J. Edwards, The tree prune (TP) algorithm,M.I.T. Artificial Intelligence Project Memo #30, R.L.E. and Computation Center, M.I.T., Cambridge, MA, 1961.Google Scholar
- [156]Ibaraki, T., Generalization of Alpha-Beta and SSS* search procedures,Artificial Intelligence 29 (1986) 73–117.Google Scholar
- [157]Knuth, D.E. and R.W. Moore, An analysis of Alpha-Beta pruning,Artificial Intelligence 6(4) (1975) 293–326.Google Scholar
- [158]Nau, D.S., An investigation of the causes of pathology in games, Technical Report TR-999, Computer Science Department, University of Maryland, 1981.Google Scholar
- [159]Nau, D.S., Pathology on game trees: a summary of results,Proceedings 1st National Conference on Artificial Intelligence (1980) 102–104.Google Scholar
- [160]Nau, D.S., Pathology on game trees revisited and an alternative to minimaxing,Artificial Intelligence 21(1–2) (1983) 221–244.Google Scholar
- [161]Newell, A., J.C. Shaw and H.A. Simon, Chess-playing programs and the problem of complexity,IBM Journal of Research and Development 2 (1958) 320–355.Google Scholar
- [162]Nilsson, N.J., Searching problem solving and game-playing trees for minimal cost-solutions, in: A.J.H. Morrell, ed.,Information Processing, North-Holland, Amsterdam, 1969, 1556–1562.Google Scholar
- [163]Pearl, J., Asymptotic properties of minimax trees and game searching procedures,Artificial Intelligence 14(2) (1980) 113–138.Google Scholar
- [164]Pearl, J., On the nature of pathology in game searching,Artificial Intelligence 20(4) (1983) 427–453.Google Scholar
- [165]Pearl, J., The solution for the branching factor of the Alpha-Beta pruning algorithm and its optimality,Communications of ACM 25(8) (1982) 559–564.Google Scholar
- [166]Roizen, I. and J. Pearl, A minimax algorithm better than Alpha-Beta? Yes and no,Artificial Intelligence 21(1–2) (1983) 199–220.Google Scholar
- [167]Slagle, J.R. and J.K. Dixon, Experiments with some programs that search game trees,Journal of ACM 16(2) (1969) 189–207.Google Scholar
- [168]Stockman, G., A minimax algorithm better than Alpha-Beta?Artificial Intelligence 12(2) (1979) 179–196.Google Scholar
- [169]Tarsi, M., Optimal search on some game trees,Journal of ACM 30(3) (1983) 389–396.Google Scholar
- [170]Verstraete, R., Models for game trees with independent terminal values, Technical Report UCLA-ENG-82-48, Cognitive Systems Laboratory, University of California, Los Angeles, 1982.Google Scholar
- [171]Berliner, H.J., A chronology of computer chess and its literature,Artificial Intelligence 10(2) (1978) 201–214.Google Scholar
- [172]Kister, J., P. Stein, S. Ulam, W. Walden and M. Wells, Experiments in chess,Journal of ACM 4 (1957) 174–177.Google Scholar
- [173]Korf, R.E., A program that learns to solve Rubik's cube,Proceedings of the 2nd AAAI Conference, Pittsburg, PA, 1982, 164–167.Google Scholar
- [174]Levy, D. and M. Newborn,All About Chess and Computers, Computer Science Press, Rockville, MD, 1982.Google Scholar
- [175]Newell, A., J.C. Shaw and H.A. Simon, Chess-playing programs and the problem of complexity,IBM Journal of Research and Development 2 (1958) 320–355.Google Scholar
- [176]Quinlan, J., Knowledge-based system for locating missing high cards in bridge,Proceedings of IJCAI 6 (1979) 705–707.Google Scholar
- [177]Samuel, A.L., Some studies in machine learning using the game of checkers,IBM Journal of Research and Development 3 (1959) 211–229.Google Scholar
- [178]Samuel, A.L., Some studies in machine learning using the game of checkers II — recent progress,IBM Journal of Research and Development 11(6) (1967) 601–617.Google Scholar
- [179]Shannon, C.E., Programming a computer for playing chess,Philosophical Magazine 41(7) (1950) 256–275.Google Scholar
- [180]Welsh, D.E.,Computer Chess, W.C. Brown, Dubuque, IA, 1984.Google Scholar
- [181]Wilkins, D., Using plans in chess,Proceedings of IJCAI 6 (1979) 960–967.Google Scholar
- [182]Baudet, G.M., On the branching factor of the Alpha-Beta pruning algorithm,Artificial Intelligence 10(2) (1978) 173–199.Google Scholar
- [183]Bratko, J. and M. Gams, Error analysis of the minimax principle, in: M.R.B. Clarke, ed.,Advances in Computer Chess 3, Pergamon, Elmsford, NY, 1982, 1–15.Google Scholar
- [184]Fuller, S.H., J. Gaschnig and J.J. Gillogly, An analysis of the Alpha-Beta pruning algorithm, Department of Computer Science Report, Carnegie-Mellon University, 1973.Google Scholar
- [185]Knuth, D.E. and R.W. Moore, An analysis of the Alpha-Beta pruning,Artificial Intelligence 6(4) (1975) 293–326.Google Scholar
- [186]Newborn, M., The efficiency of the Alpha-Beta search on trees with branch-dependent terminal node scores,Artificial Intelligence 8(2) (1977) 137–153.Google Scholar
- [187]Noe, T., A comparison of the Alpha-Beta and SCOUT algorithms using the game of Kalah, Technical Report UCLA-ENG-80-17, Cognitive Systems Laboratory, University of California, Los Angeles, 1980.Google Scholar
- [188]Pearl, J., The solution for the branching factor of the Alpha-Beta pruning algorithm and its optimality,Communications of ACM 25(8) (1982) 559–564.Google Scholar
- [189]Roizen, I., On the average number of terminal nodes examined by Alpha-Beta, Technical Report UCLA-ENG-81-01, Cognitive Systems Laboratory, University of California, Los Angeles, 1981.Google Scholar
- [190]Andrews, P.B., Theorem proving via general matings,Journal of ACM 28(2) (April 1981) 193–214.Google Scholar
- [191]Bibel, W., A comparative study of several proof procedures,Artificial Intelligence 18 (1982) 269–293.Google Scholar
- [192]Bibel, W.,Automated Theorem Proving, Vieweg, Braunschweig, 1982.Google Scholar
- [193]Biermann, A.W., Automatic programming: a tutorial on formal methodologies,Journal of Symbolic Computation 1 (1985) 119–142.Google Scholar
- [194]Bledsoe, W.W., Non-resolution theorem proving,Artificial Intelligence 9 (1977) 1–35.Google Scholar
- [195]Bobrow, D.G., ed., Special issue on non-monotonic logic,Artificial Intelligence 13(1,2) (1980).Google Scholar
- [196]Boyer, R.S. and J.S. Moore,A Computational Logic, Academic Press, New York, 1979.Google Scholar
- [197]Chang, C.L. and R.C. Lee,Symbolic logic and Mechanical Theorem Proving, Academic Press, New York, 1973.Google Scholar
- [198]Cohen, P.R. and E.A. Feigenbaum,The Handbook of Artificial Intelligence, Vol. III, William Kaufman, Los Altos, CA, 1982.Google Scholar
- [199]Davis, M. and H. Putnam, A computing procedure for quantification theory,Journal of ACM 7(3) (1960) 201–215.Google Scholar
- [200]Gelernter, H., Realization of a geometry theorem proving machine, in: E.A. Feigenbaum and J. Feldman, eds.,Computers and Thought, McGraw-Hill, New York, 1963, 134–152.Google Scholar
- [201]Kowalski, R.A., A proof procedure using connection graphs,Journal of ACM 22 (1975) 572–595.Google Scholar
- [202]Lewis, H.R. and C.H. Papadimitriou,Elements of the Theory of Computation, Prentice-Hall, Englewood Cliffs, NJ, 1981.Google Scholar
- [203]Loveland, D.,Automated Theorem Proving: A Logical Basis, North-Holland, Amsterdam, 1978.Google Scholar
- [204]Lusk, E.L. and R.A. Overbeck, Reasoning about equality,Journal of Automated Reasoning 1 (1985) 209–228.Google Scholar
- [205]Manna, Z.,Mathematical Theory of Computation, McGraw-Hill, New York, 1974.Google Scholar
- [206]Manna, Z. and R. Waldinger,The Logical Basis for Computer Programming, Vol. 1: Deductive Reasoning, Addison-Wesley, Reading, MA, 1985.Google Scholar
- [207]McCharen, J., R. Overbeck and L. Wos, Problems and experiments for and with automated theorem-proving programs,IEEE Transactions on Computation C-25 (1976).Google Scholar
- [208]Newell, A. and H.A. Simon, The logic theory machine,IRE Transactions on Information Theory 2 (1956) 61–79.Google Scholar
- [209]Nilsson, N.J.,Principles of Artificial Intelligence, Tioga, Palo Alto, CA, 1980.Google Scholar
- [210]Parrelo, B.D., W.C. Kabat and L. Wos, Job-shop scheduling using automated reasoning: A case study of the car sequencing problem,Journal of Automated Reasoning 2(1) (1986) 1–42.Google Scholar
- [211]Paul, E., Equational methods in first order predicate calculus,Journal of Symbolic Computation 1 (1985) 7–29.Google Scholar
- [212]Robinson, J.A.,Logic: Form and Function, Edinburgh University Press, Edinburgh, 1979.Google Scholar
- [213]Siekmann, J. and G. Wrightson, eds.,Automation of Reasoning 1: Classical Papers on Computational Logic 1957–1966, Symbolic Computation, Springer-Verlag, Heidelberg, 1983.Google Scholar
- [214]Siekmann, J. and G. Wrightson, eds.,Automation of Reasoning 2: Classical Papers on Computational Logic 1967–1970, Symbolic Computation, Springer-Verlag, Heidelberg, 1983.Google Scholar
- [215]Wang, H., Towards mechanical mathematics,IBM Journal of Research and Development 4 (1960) 2–22.Google Scholar
- [216]Wos, L., R. Overbeck, E. Lusk and J. Boyle,Automated Reasoning: Introduction and Applications, Prentice-Hall, Englewood Cliffs, NJ, 1984.Google Scholar
- [217]Wos, L., F. Pereira, R. Hong, R.S. Boyer, J.S. Moore, W.W. Bledsoe, L.J. Henschen, B.G. Buchanan, G. Wrightson and C. Green, An overview of automated reasoning and related fields,Journal of Automated Reasoning 1 (1985) 5–48.Google Scholar
- [218]Wu, W.-T., Basic principles of mechanical theorem proving in elementary geometries,Journal of Automated Reasoning 2 (1986) 221–252.Google Scholar
- [219]Freuder, E.C., Synthesizing constraint expressions,Communications of ACM 21(11) 1978.Google Scholar
- [220]Gaschnig, J., A general backtrack algorithm that eliminates most redundant tests,Proceedings of the International Conference on Artificial Intelligence, Cambridge, MA (1977) 457.Google Scholar
- [221]Gaschnig, J., Performance measurement and analysis of certain search algorithms, Ph.D. thesis, Department of Computer Science, Carnegie-Mellon University (May, 1979).Google Scholar
- [222]Haralick, R.M., Scene analysis: homomorphism and arrangements, in: Hanson and Reisman, eds.,Machine Vision, Academic Press, New York, 1978.Google Scholar
- [223]Haralick, R.M. and G.L. Elliott, Increasing tree search efficiency for constraint satisfaction problems,Artificial Intelligence 14 (1980) 263–313.Google Scholar
- [224]Haralick, R.M. and J. Kartus, Arrangements, homomorphisms and discrete relaxation,IEEE Transactions on Systems, Man and Cybernetics SMC-8 (August 1978) 600–612.Google Scholar
- [225]Haralick, R.M. and L. Shapiro, The consistent labeling problem: PartI,IEEE Transactions on Pattern Analysis and Machine Intelligence 1(2) (April 1979) 173–184.Google Scholar
- [226]Haralick, R.M. and L. Shapiro, The consistent labeling problem: Part II,IEEE Transactions on Pattern Analysis and Machine Intelligence 2(3) (1980) 193–203.Google Scholar
- [227]Haralick, R.M., L.S. Davis, A. Rosenfeld and D.L. Milgram, Reduction operations for constraint satisfaction,Information Sciences 14 (1978) 199–219.Google Scholar
- [228]Kowalski, R.A., A proof procedure using connection graphs,Journal of ACM 22 (October 1975) 572–595.Google Scholar
- [229]Mackworth, A.K., Consistency in networks of relations,Artificial Intelligence 8(1) (1977) 99–118.Google Scholar
- [230]Mackworth, A.K. and E.C. Freuder, The complexity of some polynomial network consistency algorithms for constraint satisfaction problems,Artificial Intelligence 25 (1985) 65–74.Google Scholar
- [231]McGregor, J.J., Relational consistency algorithms and their applications in finding subgraph and graph isomorphisms,Information Sciences 19 (1979) 229–250.Google Scholar
- [232]Mohr, R. and T.C. Henderson, Arc and path consistency revisisted,Artificial Intelligence 28 (1986) 225–233.Google Scholar
- [233]Montanari, U., Networks of constraints: fundamental properties and applications to picture processing,Information Sciences 7 (1976) 95–132.Google Scholar
- [234]Nudel, B., Consistent-labeling problems and their algorithms: expected-complexities and theory-based heuristics,Artificial Intelligence 21 (1983) 135–178.Google Scholar
- [235]Rosenfeld, A., R. Hummel and S. Zucker, Scene labeling by relaxation operations,IEEE Transactions on Systems, Man and Cybernetics SMC-6 (1976) 420–423.Google Scholar
- [236]Shapiro, L.G. and R.M. Haralick, Structural descriptions and inexact matching,IEEE Transactions on Pattern Analysis and Machine Intelligence 3 (1981) 504–519.Google Scholar
- [237]Ullman, J.R., An algorithm for subgraph homomorphisms,Journal of ACM 23(1) (1976) 31–42.Google Scholar
- [238]Waltz, D.L., Generating semantic descriptions from drawings of scenes with shadows, MAC AI-TR-271, M.I.T. 1972.Google Scholar
- [239]Aspvall, B., M.F. Plass and R.E. Tarjan, A linear-time algorithm for testing the truth of certain quantified Boolean formulas,Information Processing Letters 8 (1979) 121–123.Google Scholar
- [240]Balas, E. and J.N. Hooker, Applying polyhedral methods to logical inference, paper presented at the TIMS/ORSA meeting, New Orleans, LA, May 1987.Google Scholar
- [241]Blair, C.E., R.G. Jeroslow and J.K. Lowe, Some results and experiments in programming techniques for propositional logic,Computers and Operations Research 13(5) (1986) 633–645.Google Scholar
- [242]Bugrara, K. and C.A. Brown, On the average case analysis of some satisfiability model problems,Information Sciences 40 (1986) 21–37.Google Scholar
- [243]Chang, C.L. and R.C. Lee,Symbolic Logic and Mechanical Theorem Proving, Academic Press, New York, 1973.Google Scholar
- [244]Cook, S.A., The complexity of theorem-proving procedures,Proceedings 3rd ACM Symposium on Theory of Computing (May 1971) 151–158.Google Scholar
- [245]Davis, M. and H. Putnam, A computing procedure for quantification theory,Journal of ACM 7 (1960) 201–215.Google Scholar
- [246]Desrosiers, J., B. Jaumard and L. Le Bars, Algorithms for the satisfiability problem, GERAD-HEC Research Report, to appear.Google Scholar
- [247]Franco, J., Probabilistic analysis of the pure literal heuristic for the satisfiability problem,Annals of Operations Research 1 (1984) 273–289.Google Scholar
- [248]Franco, J., On the probabilistic performance of algorithms for the satisfiability problem,Information Processing Letters 23 (1986) 103–106.Google Scholar
- [249]Franco, J. and M. Paull, Probabilistic analysis of the Davis—Putman procedure for solving the satisfiability problem,Discrete Applied Mathematics 5 (1983) 77–87.Google Scholar
- [250]Gallo, G. and G.P. Urbani, New algorithms for the satisfiability problem, Nota Scientifica 5-87-6, Dipartimen to Informatica, Universitá di Pisa, March 1987.Google Scholar
- [251]Goldberg, A., P.W. Purdom and C.A. Brown, Average time analyses of simplified Davis—Putnam procedures,Information Processing Letters 15(2, 6) (September 1982) 72–75 (Errata 16 (1983) 213).Google Scholar
- [252]Hammer, P.L. and S. Rudeanu,Boolean Methods in Operations Research and Related Areas, Springer-Verlag, Heidelberg, 1968.Google Scholar
- [253]Hansen, P. and B. Jaumard, Algorithms for the maximum satisfiability problem, RUTCOR Research Report, Rutgers University, November 1987.Google Scholar
- [254]Hansen, P., B. Jaumard and M. Minoux, A linear-expected time algorithm for deriving all logical conclusions implied by a set of Boolean inequalities,Mathematical Programming 34 (1986) 223–231.Google Scholar
- [255]Jeroslow, R.G., Ten lectures on mixed integer model formulations for logic-based decision support, Technical Report, College of Management, Georgia Institute of Technology, March 1987 (to appear in theAnnals of Discrete Mathematics).Google Scholar
- [256]Johnson, D.S., Approximation algorithms for combinatorial problems,Journal of Computer and System Sciences 9 (1976) 256–278.Google Scholar
- [257]Karp, R.M., Reducibility among combinatorial problems, in: R.G. Miller and J.W. Thatcher, eds.,Complexity of Computer Computations, Plenum press, New York (1972) 85–104.Google Scholar
- [258]Lieberherr, K.J., Algorithmic extremal problems in combinatorial optimization,Journal of Algorithms 3 (1982) 225–244.Google Scholar
- [259]Lieberherr, K.J. and E. Specker, Complexity of partial satisfaction,Journal of ACM 28(2) (1981) 411–421.Google Scholar
- [260]Nilsson, N.J., Probabilistic logic,Artificial Intelligence 28 (1986) 71–88.Google Scholar
- [261]Petreschi, R. and B. Simeone, A switching algorithm for the solution of quadratic Boolean equations,Information Processing Letters 11 (1980) 193–198.Google Scholar
- [262]Purdom, P.W., Evaluating search methods analytically,Proceedings National Conference on Artificial Intelligence, Pittsburg, PA (1982) 124–127.Google Scholar
- [263]Purdom, P.W., Search rearrangement backtracking and polynomial average time,Artificial Intelligence 21 (1983) 117–133.Google Scholar
- [264]Purdom, P.W. and C. Brown, The pure literal rule and polynomial average time,SIAM Journal of Computing 14(4) (November 1985) 943–953.Google Scholar
- [265]Rudeanu, S.,Boolean Functions and Equations, North-Holland, Amsterdam, 1974.Google Scholar
- [266]Schaefer, T.J., The complexity of satisfiability problems,Proceedings 10th Annual ACM Symposium on Theory of Computing (1978) 216–226.Google Scholar
- [267]Shostak, R.E., Refutation graphs,Artificial Intelligence 7 (1976) 51–64.Google Scholar
- [268]Simeone, B., Consistency of quadratic Boolean equations and the König-Egerváry property for graphs,Annals of Discrete Mathematics 25 (1985) 281–290.Google Scholar
- [269]Tovey, C.A., A simplified NP-complete satisfiability problem,Discrete Applied Mathematics 8 (1984) 85–89.Google Scholar
- [270]Arvind, V. and S. Biswas, An O(n 2) algorithm for the satisfiability problem of a subset of propositional sentences in CNF that includes all Horn sentences,Information Processing Letters 24 (1987) 67–69.Google Scholar
- [271]Dowling, W.F. and J.H. Gallier, Linear-time algorithms for testing the satisfiability of propositional Horn formulae,Journal of Logic Programming 3 (1984) 267–284.Google Scholar
- [272]Henschen, L.J., Semantic resolution for Horn sets,IEEE Transactions on Computers 25(8) (1976).Google Scholar
- [273]Henschen, L. and L. Wos, Unit refutations and Horn sets,Journal of ACM 21(4) (1974) 590–605.Google Scholar
- [274]Jaumard, B. and B. Simeone, On the complexity of the maximum satisfiability problem for Horn formulas,Information Processing Letters 26 (1987/88) 1–4.Google Scholar
- [275]Jones, N.D. and W.T. Laaser, Complete problems for deterministic polynomial time,Theoret. Computer Science 3 (1976) 105–117.Google Scholar
- [276]Lewis, H.R., Renaming a set of clauses as a Horn set,Journal of ACM 25(1) (January 1978) 134–135.Google Scholar
- [277]Mannila, H. and K. Mehlhorn, A fast algorithm for renaming a set of clauses as a Horn set,Information Processing Letters 21 (1985) 269–272.Google Scholar
- [278]Sykora, O., An optimal algorithm for renaming a set of clauses into the Horn set,Computer and Artificial Intelligence 4(1) (1985) 37–43.Google Scholar
- [279]Tärnlund, S.A., Horn clause computability,BIT 17 (1977) 215–216.Google Scholar
- [280]Yamasaki, S. and S. Doshita, The satisfiability problem for a class consisting of Horn sentences and some non-Horn sentences in proportional (sic!) logic,Information and Control 59 (1983) 1–12.Google Scholar
- [281]Yamasaki, S., M. Yoshida, S. Doshita and M. Hirata, A new combination for input and unit deductions for Horn sentences,Information Processing Letters 18 (1984) 209–213.Google Scholar
- [282]Dilger, W. and A. Janson, Intelligent backtracking in deduction systems by means of extended unification graphs,Journal of Automated Reasoning 2 (1986) 43–62.Google Scholar
- [283]Eder, E., Properties of substitutions and unifications,Journal of Symbolic Computation 1 (1985) 31–46.Google Scholar
- [284]Fages, F. and G. Huet, Unification and matching in equational theories,CAAP 83, Lecture Notes in Computer Science 159, Springer-Verlag, Heidelberg, 1983.Google Scholar
- [285]Martelli, A. and U. Montanari, An efficient unification algorithm,ACM Transactions on Programming Languages of Systems 4(2) (1982) 258–282.Google Scholar
- [286]Morokhovets, M.K., A modified unification procedure,Cybernetics 20(20) 1 (1984) 147–152.Google Scholar
- [287]Paterson, M.S. and M.N. Wegman, Linear unification,Journal of Computers and System Sciences 16(1978) 158–167.Google Scholar
- [288]Apt, K.R. and M.H. Van Emden, Contributions to the theory of logic programming,Journal of ACM 29(3) (July 1982) 841–862.Google Scholar
- [289]Balbin, I. and K. Lecot,Logic Programming: A Classified Bibliography, Wildgrass Books, Fitzroy, Australia, 1985.Google Scholar
- [290]Clark, K.L., Negation as failure, in: H. Gallaire and J. Minker, eds.,Logic and Databases, Plenum Press, New York, 1978, 293–322.Google Scholar
- [291]Clark, K.L. and S.A. Tärnlund,Logic Programming, Academic Press, New York, 1982.Google Scholar
- [292]Clocksin, W.F. and C.S. Mellish,Programming in PROLOG, Springer-Verlag, Heidelberg, 1981.Google Scholar
- [293]Coelho, H. and L.M. Pereira, Automated reasoning in geometry theorem proving with PROLOG,Journal of Automated Reasoning 2(4) (1986) 329–390.Google Scholar
- [294]Colmerauer, A., H. Hanoui, P. Russel and R. Pasero, Un système de communication homme-machine en Francais, Groupe de Recherche en Intelligence Artificielle, Université d'Aix-Marseille, 1973.Google Scholar
- [295]Gabbay, D.M. and M.J. Sergot, Negation as inconsistency, Department of Computing Reports, Imperial College of Science and Technology, London, England, 1984.Google Scholar
- [296]Gallaire, H. and J. Minker, eds.,Logic and Databases, Plenum Press, New York, 1978.Google Scholar
- [297]Gallier, J.H. and S. Raatz, Logic programming and graph rewriting, Research Report, Department of Computer and Information Science, University of Pennsylvania, May 1985.Google Scholar
- [298]Hayes, P.J., Computation and deduction,Proceedings 2nd Symposium on Mathematical Foundation of Computer Science, Czechoslovak Academy of Sciences (1973) 105–118.Google Scholar
- [299]Hogger, C.J.,Introduction to Logic Programming, APIC Studies in Data Processing 21, Academic Press, New York, 1984.Google Scholar
- [300]Jaffar, J., J.L. Lassez and J.W. Lloyd, Completeness of the negation as failure rule,Proceedings of IJCAI 8, 1983.Google Scholar
- [301]Kowalski, R.A., Predicate logic as a programming language, in: J.L. Rosenfeld, ed.,Information Processing 74, North-Holland, Amsterdam, 1974, 569–574.Google Scholar
- [302]Kowalski, R.A., Algorithm = Logic + Control,Communications of ACM 22(7) (July 1979) 424–436.Google Scholar
- [303]Kowalski, R.A.,Logic for Problem Solving, Elsevier, New York, 1979.Google Scholar
- [304]Kowalski, R.A. and D. Kuehner, Linear resolution with selection function,Artificial Intelligence 2 (1970) 227–260.Google Scholar
- [305]Lloyd, J.W.,Foundations of Logic Programming, Symbolic Computation, Springer-Verlag, Berlin, 1984.Google Scholar
- [306]Pereira, L.M., Logic control with logic,Proceedings 1st International Logic Programming Conference, Luminy, France (September, 1982).Google Scholar
- [307]Robinson, J.A.,Logic: Form and Function, Edinburgh University Press, Edinburgh, 1979.Google Scholar
- [308]Van Emden, M.H. and R.A. Kowalski, The semantics of predicate logic as a programming language,Journal of ACM 23(4) (1976) 733–742.Google Scholar
- [309]Warren, D.H.D., L.M. Pereira and F. Pereira, PROLOG — the language and its implementation compared with LISP,Proceedings of the Symposium on Artificial Intelligence and Programming Languages (ACM); SIGPLAN Notices 12(8); andSIGART Newsletter 64 (1977) 109–115.Google Scholar
- [310]Warren, D.H.D. and M. Van Caneghem,Logic Programming and its Applications, Albex, Norwood, NJ, 1985.Google Scholar
- [311]Aho, A.V., C. Beeri and J.D. Ullman, The theory of joins in relational databases,ACM Transactions on Database Systems (4,3) (September, 1979) 297–314.Google Scholar
- [312]Aho, A.V., Y. Sagiv and J.D. Ullman, Equivalence among relational expressions,SIAM Journal on Computing 8(2) (1979) 218–246.Google Scholar
- [313]Asirelli, P., M. De Santis and A. Martelli, Integrity constraints in logic databases,Journal of Logic Programming 3 (1985) 221–232.Google Scholar
- [314]Ausiello, G., A. D'Atri and D. Sacca, Graph algorithms for functional dependency manipulation,Journal of ACM 30(4) (1983) 752–766.Google Scholar
- [315]Chandra, A.K. and D. Harel, Horn clause queries and generalizations,Journal of Logic Programming 1 (1985) 1–15.Google Scholar
- [316]Chang, C.L., Deduce 2: Further investigations of deductions in relational databases, in: H. Gallaire and J. Minker, eds.,Logic and Databases, Plenum Press, New York, 1978, 201–236.Google Scholar
- [317]Colmerauer, A. and J.F. Pique, About natural logic, in: H. Gallaire, J. Minker and J.M. Nicolas, eds.,Advances in Database Theory, Vol. 1, Plenum Press, New York, 1981, 343–345.Google Scholar
- [318]Delobel, C. and R.G. Casey, Decomposition of a database and the theory of Boolean switching functions,IBM Journal of Research and Development 17(5) (September 1973) 484–485.Google Scholar
- [319]Demolombe, R., Estimation of the number of triples satisfying a query expressed in predicate calculus language,Proceedings 6th International Conference on Very Large Data Bases, IEEE, Montreal (October 1980) 55–63.Google Scholar
- [320]Fagin, R., Horn clauses and database dependencies,Journal of ACM 29(4) (1982) 952–985.Google Scholar
- [321]Gallaire, H., Impacts of logic on data bases,Proceedings 7th International Conference on Very Large Data Bases (Cannes, France, September 9–11), IEEE, New York (1981) 248–259.Google Scholar
- [322]Gallaire, H. and J. Minker,Logic and Databases, Plenum Press, New York, 1978.Google Scholar
- [323]Gallaire, H., J. Minker and J.M. Nicolas, Logic and databases: a deductive approach,Computing Surveys 16(2) (1984) 153–185.Google Scholar
- [324]Gardarin, G. and M. Melkanoff, Proving consistency of database transactions,Proceedings 5th International Conference on Very Large Data Bases (Rio de Janeiro, October 3–5), IEEE, New York (1979) 291–298.Google Scholar
- [325]Gray, P.,Logic, Algebra and Databases, Ellis Horwood Series on Computers and their Applications, Wiley, Chichester, 1984.Google Scholar
- [326]Henschen, L.J., W.W. McCune and S.A. Naqvi, Compiling constraint checking programs from first order formulas, in: H. Gallaire, J. Minker and J.M. Nicolas, eds.,Advances in Database Theory, Vol. 2, Plenum Press, New York, 1984, 145–169.Google Scholar
- [327]Jacobs, B.E., On database logic,Journal of ACM 29(2) (April 1982) 310–332.Google Scholar
- [328]Kellog, C., P. Klahr and L. Travis, Deductive planning and path finding for relational databases, in: H. Gallaire and J. Minker, eds.,Logic and Databases, Plenum Press, New York, 1978, 179–200.Google Scholar
- [329]Maier, D., A.O. Mendelzon and Y. Sagiv, Testing implications of data dependencies,ACM Transactions on Database Systems 4(4) (1979) 455–469.Google Scholar
- [330]Maier, D., Y. Sagiv and M. Yannakakis, On the complexity of testing implications of functional and join dependencies,Journal of ACM 28(4) (1981) 680–695.Google Scholar
- [331]Minker, J., An experimental relational data base system based on logic, in: H. Gallaire and J. Minker, eds.,Logic and Databases, Plenum Press, New York, 1978, 107–147.Google Scholar
- [332]Naqvi, S.A. and L.J. Henschen, On compiling queries in recursive first order databases,Journal of ACM 31(1) (January 1984) 47–85.Google Scholar
- [333]Reiter, R., Equality and domain closure in first order databases,Journal of ACM 27(2) (April 1980) 235–249.Google Scholar
- [334]Sacca, D., Closures of databases hypergraphs,Journal of ACM 32(4) (1985) 774–803.Google Scholar
- [335]Sagiv, Y., Quadratic algorithms for minimizing joins in restricted relational expressions,SIAM Journal on Computing 12(2) (1983) 316–328.Google Scholar
- [336]Sagiv, Y., An algorithm for inferring multivalued dependencies with an application to propositional logic,Journal of ACM 27(2) (1980) 250–262.Google Scholar
- [337]Sagiv, Y., C. Delobel, D.S. Parker and R. Fagin, An equivalence between relational database dependencies and a subclass of propositional logic,Journal of ACM 28(3) (1981) 435–453.Google Scholar
- [338]Ullman, J.D.,Principles of Database Systems, 2nd ed., Computer Science Press, Potomac, MD, 1982.Google Scholar
- [339]Vardi, M.Y., The decision problem for database dependencies,Information Processing Letters 12(5) (1981) 251–254.Google Scholar
- [340]Warren, D.H.D., Efficient processing of interactive relational database queries expressed in logic,Proceedings 7th International Conference on Very Large Data Bases, Cannes, France (1981) 272–281.Google Scholar
- [341]Fikes, R.E. and N.J. Nilsson, STRIPS: a new approach to the application of theorem proving to problem solving,Artificial Intelligence 2 (1971) 189–208.Google Scholar
- [342]Fikes, R.E., P.E. Hart and N.J. Nilsson, Learning and executing generalized robot plans,Artificial Intelligence 3 (1972) 251–288.Google Scholar
- [343]Hax, A.C. and J.J. Golovin, Hierarchical production planning systems, in: A.C. Hax, ed.,Studies in Operations Management, North-Holland, Amsterdam, 1978.Google Scholar
- [344]Hayes-Roth, B. and F. Hayes-Roth, A cognitive model of planning,Cognitive Science 3 (1979) 275–310.Google Scholar
- [345]Hayes-Roth, B., A blackboard architecture for control,Artificial Intelligence 26 (1985) 251–321.Google Scholar
- [346]McDermott, D.V., Planning and action,Cognitive Science 2(2) (1978) 71–109.Google Scholar
- [347]Sacerdoti, E.D., Planning in a hierarchy of abstraction spaces,Proceedings of IJCAI 3 (1973) 412–422.Google Scholar
- [348]Sacerdoti, E.D., The nonlinear nature of plans,Proceedings of IJCAI 4 (1975) 206–294.Google Scholar
- [349]Sacerdoti, E.D.,A Structure for Plans and Behavior, Elsevier, New York, 1977.Google Scholar
- [350]Stefik, M., Planning with constraints (MOLGEN: part 1),Artificial Intelligence 16 (1981) 111–140.Google Scholar
- [351]Stefik, M., Planning with constraints (MOLGEN: part 2),Artificial Intelligence 16 (1981) 141–170.Google Scholar
- [352]Wilensky, R.,Planning and Understanding: A Computational Approach to Human Reasoning, Addison-Wesley, MA, 1983.Google Scholar
- [353]Allen, J.F. and J.A. Koomen, Planning using a temporal world model,Proceedings of IJCAI 8 (1983) 742–747.Google Scholar
- [354]McDermott, D.V., A temporal logic for reasoning about processes and plans,Cognitive Science 6 (1982) 101–155.Google Scholar
- [355]Wilkins, D., Domain-independent planning: representation and plan generation,Artificial Intelligence 22 (1984) 269–301.Google Scholar
- [356]Corkill, D.D. and V.R. Lesser, The use of meta-level control for coordination in a distributed problem solving,Proceedings of IJCAI 8 (1983) 748–756.Google Scholar
- [357]Davis, R. and R.G. Smith, Negotiation as a metaphor for distributed problem-solving,Artificial Intelligence 20 (1983) 63–109.Google Scholar
- [358]Kornfeld, W.A., Combinatorially implosive algorithms,Communications of ACM 25(10) (October 1982) 734–738.Google Scholar
- [359]Lesser, V.R. and D.D. Corkill, Functionally-accurate, cooperative distributed systems,IEEE Transactions on Systems, Man and Cybernetics SMC-11(1) (1981) 81–96.Google Scholar
- [360]Carbonell, J.G., R.S. Michalski and T.M. Mitchell, An overview of machine learning, in: R.S. Michalski, J.G. Carbonell and T.M. Mitchell, eds.,Machine Learning, Tioga Press, Palo Alto, 1983, 3–23.Google Scholar
- [361]Farquhar, P.H., Application of utility theory in artificial intelligence research, in: Y. Sawaragi, ed.,Multiple Criteria Decision-Making, Springer-Verlag, New York, to appear.Google Scholar
- [362]Forsyth, R. and R. Dada,Machine Learning Applications in Expert Systems and Information Retrieval, Wiley, New York, 1986.Google Scholar
- [363]Langley, P., Learning to search: from weak methods to domain specific heuristics,Cognitive Science 9(2) (1985) 217–261.Google Scholar
- [364]Michalski, R.S., J.G. Carbonell and T.M. Mitchell, eds.,Machine Learning, Vol. 1, Tioga, Palo Alto, CA, 1983.Google Scholar
- [365]Michalski, R.S., J.G. Carbonell and T.M. Mitchell, eds.,Machine Learning, Vol. 2, Morgan Kaufmann, Los Altos, CA, 1986.Google Scholar
- [366]Mitchell, T.M., J.G. Carbonell and R.S. Michalski,Machine Learning: A Guide to Current Research, Academic Press, New York, 1986.Google Scholar
- [367]Breiman, L., J. Friedman, R. Olshun and C. Stone,Classification and Regression Trees, Wadsworth, Belmont, CA, 1984.Google Scholar
- [368]Fu, K.S., ed.,Applications of Pattern Recognition, CRC Press, Boca Ratón, FL, 1982.Google Scholar
- [369]Nandhakumar, N. and J.K. Aggarwal, The artificial intelligence approach to pattern recognition — a perspective and an overview,Pattern Recognition 18(6) (1985) 383–389.Google Scholar
- [370]Quinlan, J.R., Inductive inference as a tool for the construction of high performance program, in: R. Michalski, J. Carbonell and T.M. Mitchell, eds.,Machine Learning: An Artificial Intelligence Approach, Tioga Press, Palo Alto, CA, 1984.Google Scholar
- [371]Quinlan, J.R., Induction of decision trees,Machine Learning 1(1) (1986) 81–106.Google Scholar
- [372]Holland, J.H., K.J. Holyoak, R.E. Nisbett and P.R. Thagard,Induction: Processes of Inference, Learning and Discovery, M.I.T. Press, Bradford, MA, 1986.Google Scholar
- [373]Johnson, M.K. and L. Hasher, Human learning and memory, in: M.R. Rosenzweig and L.W. Porter, eds.,Annual Review of Psychology, Stanford, CA, 1987, 631–638.Google Scholar
- [374]Laird, J.E., P.S. Rosenbloom and A. Newell, Chunking in SOAR: the anatomy of a general learning mechanism,Machine Learning 1(1) (1986) 11–46.Google Scholar
- [375]⋆ Lenat, D., EURISKO: A program that learns new heuristics and domain concepts. The nature of heuristics III: program design and results,Artificial Intelligence 21(1–2) (1983) 61–98.Google Scholar
- [376]Mitchell, T.M., Generalization as search,Artificial Intelligence 18(2) (1982) 203–226.Google Scholar
- [377]Ackley, D.H. and G.E. Hinton, A learning algorithm for Boltzmann machines,Cognitive Science 9 (1985) 147–169.Google Scholar
- [378]Feldman, J.A. and D.H. Ballard, Connectionist models and their properties,Cognitive Science 6 (1982) 205–254.Google Scholar
- [379]McClelland, J.L., D.E. Rumelhart and PDP Research Group, eds.,Parallel Distributed Processing: Explorations in the Microstructure of Cognition, M.I.T. Press, Cambridge, MA, 1985.Google Scholar
- [380]Grefenstette, J., ed.,Proceedings of the International Conference on Genetic Algorithms and Their Applications, Pittsburgh, PA, 1985.Google Scholar
- [381]Holland, J.H.,Adaptation in Natural and Artificial Systems, University of Michigan Press, Michigan, 1975.Google Scholar
- [382]Smith, S.F., Adaptive learning systems, in: R. Forsyth, ed.,Expert Systems, Principles and Case Studies, Chapman and Hall, Ltd., New York, 1984.Google Scholar
- [383]Buchanan, B.G., Research on expert systems,Machine Intelligence, Wiley, New York, 1982, 269–300.Google Scholar
- [384]Duda, R.O. and E.H. Shortliffe, Expert systems research,Science 220 (1983) 262–268.Google Scholar
- [385]Hayes-Roth, F., D.A. Waterman and D. Lenat, eds.,Building Expert Systems, Addison-Wesley, Reading, MA, 1983.Google Scholar
- [386]Klahr, P., and D.A. Waterman, eds.,Expert Systems, Addison-Wesley, Reading, MA, 1986.Google Scholar
- [387]Michie, D., ed.,Expert Systems in the Micro-Electronic Age, Edinburgh University Press, Edinburgh, 1980.Google Scholar
- [388]Reitman, W., ed.,Artificial Intelligence Applications for Business, Ablex, Norwood, NJ, 1984.Google Scholar
- [389]Stefik, M., J. Aikins, R. Balzer, J. Benoit, L. Birnbaum, F. Hayes-Roth and E.H. Sacerdoti, The organization of expert systems: a tutorial,Artificial Intelligence 18 (1982) 135–173.Google Scholar
- [390]Waterman, D.A., ed.,A Guide to Expert Systems, Addison-Wesley, Reading, MA, 1986.Google Scholar
- [391]Weiss, S.M. and C.A. Kulikowski,A Practical Guide to Designing Expert Systems, Rowman and Allanheld, Totowa, NJ, 1984.Google Scholar
- [392]Winston, P.H. and K.A. Prendergast,The AI Business, M.I.T. Press, Bradford, MA, 1984.Google Scholar
- [393]Fischer, E.L., An AI-Based methodology for factory design,AI Magazine (Fall 1986) 72–85.Google Scholar
- [394]Fox, B.R. and K.G. Kempf, Opportunistic scheduling for robotic assembly,Proceedings IEEE International Conference on Robotics and Automation, 1985, 880–889.Google Scholar
- [395]Fox, M.S. and S.F. Smith, ISIS: a knowledge-based system for factory scheduling,Expert Systems 1 (1984) 25–49.Google Scholar
- [396]Gilmore, J.F. and A.C. Semeco, Terrain navigation through knowledge-based route planning,Proceedings of IJCAI 9 (1985) 1086–1088.Google Scholar
- [397]Goldstein, I.P. and R.B. Roberts, NUDGE — a knowledge-based scheduling program,Proceedings of IJCAI 5 (1977) 257–263.Google Scholar
- [398]Kastner, J., C. Apte, J. Griesmier, S.J. Hong, M. Karnaugh, E. Mays and Y. Tozawa, A knowledge-based consultant for financial marketing,AI Magazine 7(5) (Winter 1986) 71–79.Google Scholar
- [399]Lynch, F., C. Marshall, D.E. O'Connor and M. Kiskiel, AI in manufacturing at Digital,AI Magazine 7(5) (Winter 1986) 53–57.Google Scholar
- [400]⋆ McDermott, D., A temporal logic for reasoning about processes and plans,Cognitive Science 6 (1982) 101–155.Google Scholar
- [401]Miller, D., R.J. Firby and T. Dean, Deadlines, travel time and robot problem solving,Proceedings of IJCAI 9 (1985) 1052–1054.Google Scholar
- [402]Murphy, F.H. and E.A. Stohr, An intelligent system for formulating linear programs,Decision Support Systems 2(1) (March 1986) 39–47.Google Scholar
- [403]O'Connor, D.E., Using expert systems to manage change and complexity in manufacturing, in: W. Reitman, ed.,Artificial Intelligence Applications for Business, Ablex, Norwood, NJ, 1984.Google Scholar
- [404]Orciuch, E. and J. Frost, ISA: an intelligent scheduling assistant,IEEE Computer Society, Proceedings 1st Conference on AI Applications, 1984.Google Scholar
- [405]Ow, P.S. and S.F. Smith, Viewing scheduling as an opportunistic problem-solving process,this volume.Google Scholar
- [406]⋆ Paul. R.J. and G.I. Doukidis, Further developments in the use of artificial intelligence techniques which formulate simulation problems,Journal of the Operational Research Society 37(8) (1986) 787–810.Google Scholar
- [407]Sathi, A., T.E. Morton and S.F. Roth, Callisto: an intelligent project management system,AI Magazine 7(5) (Winter 1986) 34–52.Google Scholar
- [408]Scarl, E., Applications of a non-rule knowledge-based system to NASA scheduling and monitoring problems,IECEC Proceedings San Francisco (August 1984).Google Scholar
- [409]Smith, S.F., M.S. Fox and P.S. Ow, Constructing and maintaining detailed production plans: investigations into the development of knowledge-based factory scheduling systems,AI Magazine (Fall 1986) 45–61.Google Scholar
- [410]Sugie, M., D. Menzilcioglu and H.T. Kung, CAR guide — onboard computer for automobile route guidance,Proceedings National Computer Conference, 1984, 695–706.Google Scholar
- [411]Tonge, F.M., Summary of a heuristic line balancing procedure, in: E.A. Feigenbaum and J. Feldman, eds.,Computers and Thought, McGraw-Hill, New York, 1983.Google Scholar
- [412]Buchanan, B.G. and E.A. Feigenbaum, DENDRAL and META-DENDRAL,Artificial Intelligence 11 (1978) 5–24.Google Scholar
- [413]Engelmore, R. and A. Terry, Structure and function of the CRYSALIS system,Proceedings of IJCAI 6 (1979) 250–256.Google Scholar
- [414]Erman, L.D., F. Hayes-Roth, V.R. Lesser and D.R. Reddy, The HEARSAY-II speech understanding system: integrating knowledge to resolve uncertainty,Computing Surveys 12(2) (June 1980) 213–253.Google Scholar
- [415]McCracken, D., Representation and efficiency in a production system for speech understanding,Proceedings of IJCAI 6 (1979) 556–561.Google Scholar
- [416]Campbell, A., V. Hollister, R.O. Duda and P.E. Hart, Recognition of a hidden mineral deposit by an artificial intelligence program,Science 217 (1982) 927–929.Google Scholar
- [417]Davis, R., H. Austin, I. Carlbom, B. Frawley, P. Pruchnik, R. Sneiderman and J. Gilreath, The DIPMETER ADVISOR system,Proceedings of IJCAI 8 (1983) 122–129.Google Scholar
- [418]Descotte, Y. and J.C. Latombe, GARI: a problem solver that plans how to machine mechanical parts,Proceedings of IJCAI 7 (1981) 776–772.Google Scholar
- [419]Gallanti, M., G. Guida, L. Spampinato and A. Stefanini, Representing procedural knowledge in expert systems: an application to process control,Proceedings of IJCAI 9 (1985) 345–352.Google Scholar
- [420]Geneseretti, M.R., The use of design descriptions in automated diagnosis,Artificial Intelligence 24 (1984) 411–436.Google Scholar
- [421]Konolige, K., An inference net compiler for the PROSPECTOR rule-based consultation system,Proceedings of IJCAI 6 (1979) 487–489.Google Scholar
- [422]Weiss, S., C. Kulikowski, C. Apte, M. Uschold, J. Patchette, R. Brigham and B. Spitzer, Building expert systems for controlling complex programs,Proceedings of NCAI 2, Pittsburgh, PA, 1982, 322–326.Google Scholar
- [423]Buchanan, B.G. and E.H. Shortliffe, (eds.),Rule-Based Expert Systems: The MYCIN Experiments of the Stanford Heuristic Programming Project, Addison-Wesley, Reading, MA, 1985.Google Scholar
- [424]Clancey, W.J. and R. Letsinger, NEOMYCIN: reconfiguring a rule-based expert system for application to teaching,Proceedings of IJCAI 7 (1981) 829–836.Google Scholar
- [425]Frienland, P., Knowledge-based experiment design in molecular genetics,Proceedings of IJCAI 6 (1979) 285–288.Google Scholar
- [426]Shortliffe, E.H., A.C. Scott, M.B. Bischoff, A.B. Campbell, W. Van Mellerd and C.D. Jacobs, ONCOCIN: an expert system for oncology protocol management,Proceedings of IJCAI 7 (1981) 876–881.Google Scholar
- [427]Balzer, R., L. Erman, P. London and C. Williams, HEARSAY-III: a domain-independent framework for expert systems,Proceedings of NCAI 1 (August 1980) 108–110.Google Scholar
- [428]Feigenbaum, E.A., B.G. Buchanan and J. Lederberg, On generality and problem solving: a case study using the DENDRAL program, in: B. Meltzer and D. Michie, eds.,Machine Intelligence 6, Elsevier, New York, 1971.Google Scholar
- [429]Neches, R., W.R. Swartout and J. Moore, Explainable (and maintainable) expert systems,Proceedings of IJCAI 9 (1985) 382–389.Google Scholar
- [430]Nii, H.P., J.J. Anton, E.A. Feigenbaum and A.J. Rockmore, Signal-to-symbol transformation: HASP/SIAP case study,AI Magazine (1982) 23–35.Google Scholar
- [431]Ow, P.S. and S.F. Smith, Two design principles for knowledge-based systems,Decision Sciences (July 1987).Google Scholar
- [432]Quinlan, J., Knowledge-based system for locating missing high cards in bridge,Proceedings of IJCAI 6 (1979) 705–707.Google Scholar
- [433]Swartout, W.R., Explaining and justifying expert consulting programs,Proceedings of IJCAI 7 (1981) 815–823.Google Scholar
- [434]Bachant, J. and J. McDermott, R1 revisited: four years in the trenches,AI Magazine (Fall 1984) 21–32.Google Scholar
- [435]McDermott, J., R1's formative years,AI Magazine 2(2) (Summer 1981) 21–29.Google Scholar
- [436]McDermott, J., R1: a rule-based configurer of computer systems,Artificial Intelligence 19(1) (September 1982) 39–88.Google Scholar
- [437]McDermott, J., Domain knowledge and the design process,Design Studies 3(1) (January 1982).Google Scholar
- [438]Polit, S., R1 and beyond: technology transfer at DEC,AI Magazine (Winter 1985) 76–78.Google Scholar
- [439]Rosenbloom, P.S., J.E. Laird, J. McDermott, A. Newell and E. Orciuch, R1-SOAR: an experiment in knowledge-intensive programming in a problem-solving architecture,IEEE Transactions on Pattern Analysis and Machine Intelligence 7(5) (1985) 561–569.Google Scholar
- [440]Scown, S.J.,The Artificial Intelligence Experience: An Introduction, Digital Equipment Corporation, 1985.Google Scholar
- [441]Van de Brug, A., J. Bachant and J. McDermott, The taming of R1,IEEE Expert (Fall 1986) 33–39.Google Scholar
- [442]Bonissone, P.P., Plausible reasoning: coping with uncertainty in expert systems, in: S.C. Shapiro, ed.,Encyclopedia of Artificial Intelligence, Wiley, New York, 1986.Google Scholar
- [443]Cheeseman, P., In defense of probability,Proceedings of 9th International Joint Conference on AI, Los Angeles, CA, 1985.Google Scholar
- [444]Henrion, M., Uncertainty in artificial intelligence: is probability epistemologically and heuristically adequate?Expert Systems and Expert Judgement, Proceedings of the NATO Advanced Research Workshop, Porto, Portugal, August 1986.Google Scholar
- [445]Kanal, L.N. and J. Lemmer, eds.,Uncertainty in AI, North-Holland, Amsterdam, 1986.Google Scholar
- [446]Spiegelhalter, D.J., A statistical view of uncertainty in expert systems, in: W. Gale, ed.,AI and Statistics, Addison-Wesley, Reading, MA, 1986, 17–55.Google Scholar
- [447]Duda, R.O., P.E. Hart and N.J. Nilsson, Subjective Bayesian methods for rule-based inference systems,AFIPS Conference Proceedings, New York, June 1976, 1075–1082.Google Scholar
- [448]Jeroslow, R.G., On monotone chaining procedures of the CF type, Technical Report, College of Management, Georgia Institute of Technology, 1985.Google Scholar
- [449]Negoita, C.V.,Expert Systems and Fuzzy Systems, Benjamin/Cummings Publishing Co., Menlo Park, CA, 1985.Google Scholar
- [450]Pearl, J., Fusion, propagation, and structuring belief networks,Artificial Intelligence 29(3) (September 1986) 241–288.Google Scholar
- [451]Shafer, G.,A Mathematical Theory of Evidence, Princeton University Press. Princeton, 1976.Google Scholar
- [452]Shachter, R.D., Evaluating influence diagrams,Operations Research (to appear in 1987).Google Scholar
- [453]Shortliffe, E.H. and B.G. Buchanan, A model of inexact reasoning in medicine, in: B.G. Buchanan and E.H. Shortliffe, eds.,Rule-Based Expert Systems, Addison-Wesley, Reading, MA, 1984, 233–262.Google Scholar
- [454]Zadeh, L.A., Making computers think like people,IEEE Spectrum (August 1984) 26–32.Google Scholar
- [455]Tong, R.M. and D.G. Shapiro, Experimental investigations of uncertainty in a rule-based system for information retrieval,International Journal of Man-Machine Studies 17 (March 1985) 265–282.Google Scholar
- [456]Wise, B., An experimental comparison of uncertain inference systems, Ph.D. thesis, Department of Engineering and Public Policy, Carnegie-Mellon University, 1986.Google Scholar
- [457]Yadrick, R.M., D.S. Vaughan, B.M. Perrin, P.D. Kempf and K.G. Kempf, Evaluation of uncertain interference models I: PROSPECTOR,2nd Workshop on Uncertainty AAAI, 1986.Google Scholar
Copyright information
© J.C. Baltzer AG, Scientific Publishing Company 1988