<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Proposal of a Graph-Oriented Approach to Verication of XTT2 Rule Bases ?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Agata Ligƒza</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Grzegorz J. Nalepa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antoni Ligƒza</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Automatics, AGH University of Science and Technology</institution>
          ,
          <addr-line>Al. Mickiewicza 30, 30-059 Krakw</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The main focus of this paper is on the discussion of formal rule verication using graph-based approach. XTT2 is a custom rule representation method, that introduces a structured rule base composed of extended decision tables linked in a tree-like structure. Considering the complex nature of the XTT2 structure, only the local, table level verication has been considered so far. However, graph-oriented verication is a powerful solution to the analysis of rule-based systems. It can be applied to provide global verication of the XTT2 knowledge bases. The principal idea consists in representing XTT2 rules as a directed hypergraph. All of rule formulas are transformed into vertices and appropriate hyperarcs are determined. This restructuring of the XTT2 knowledge base allows to provide verication using graph algorithms. Preliminary evaluation of this approach shows that the graph-oriented verication is a promising solution to provide a formal analysis of XTT2 rules.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Rule-based systems (RBS) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] are an important class of intelligent systems [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
Their formal description allows for a formal analysis of important system
properties. Therefore, it is possible to ensure their quality and safety at the early
design stages.
      </p>
      <p>
        The main focus of the paper is the formal verication of rules [
        <xref ref-type="bibr" rid="ref3 ref4">3,4</xref>
        ]. Formal
rule properties have to be considered w.r.t. to a given knowledge
formalization format. Therefore, the rule formalization for the XTT representation is
given [
        <xref ref-type="bibr" rid="ref5 ref6">5,6</xref>
        ]. The representation introduces a structured rule base composed of
extended decision tables linked in a tree-like structure. The rule formalization
is given using the ALSV(FD) logic [
        <xref ref-type="bibr" rid="ref1 ref7">1,7</xref>
        ]. Considering the complex nature of the
XTT knowledge base structure, so far only local, table level verication has been
provided.
      </p>
      <p>The approach proposed in this paper uses graph-based representation.
Graphoriented verication is a powerful solution to the analysis of rule-based systems.
It can be applied to provide global verication of the XTT2 knowledge bases.
? The paper is carried out within the AGH UST Project No. 10.10.120.105.
The principal idea consists in representing XTT2 rules as a directed hypergraph.
All of rule formulas are transformed into vertices and appropriate hyperarcs are
determined. This restructuring of the XTT2 knowledge base allows to provide
a verication using graph algorithms. Preliminary evaluation of this approach
shows that the graph-oriented verication is a promising solution to provide a
formal analysis of XTT2 rules. In the paper a practical example is provided.
2</p>
    </sec>
    <sec id="sec-2">
      <title>XTT2 Rule Language Formalization</title>
      <p>
        The formalization for XTT 2 representation is based on ALSV(FD) logic [
        <xref ref-type="bibr" rid="ref1 ref6 ref7">1,7,6</xref>
        ].
The ALSV(FD) provides a much higher expressive power than the propositional
calculus, while providing tractable inference. Therefore, a format of rule is more
complex. In a general case, rule expressed by attributive logic is represented as
(1)
rule(i) : ψ ∧
      </p>
      <p>A1 ∈ t1 ∧ A2 ∈ t2 ∧ · · · ∧ An ∈ tn
−→
retract(B1 = b1, B2 = b2, . . . , Bb = bb)
assert(C1 = c1, C2 = c2, . . . , Cc = cc)
H1 = h1, H2 = h2, . . . , Hh = hh
next(j), else(k)
(1)</p>
      <p>In (1) a formula ψ describes context. A1 ∈ t1 ∧ A2 ∈ t2 ∧ · · · ∧ An ∈ tn is
a precondition formula. Cj (j = 1, . . . , c) and Bi (i = 1, . . . , b) correspond to
facts to assert and to retract from the knowledge base. Conclusions (decisions
or actions) are represented by H1 = h1, H2 = h2, . . . , Hh = hh. There is also a
control statement introducing the next or alternative rule.</p>
      <p>
        In the case of XTT 2 representation, the logical rule format is as follows:
r : (A1 ∝1 V1) ∧ (A2 ∝2 V2) ∧ · · · ∧ (An ∝n Vn) −→ RHS,
(2)
where ∝i∈ {=, 6=, ∈, ∈/} for simple attributes (taking single values) and ∝i∈ {=
, 6=, ⊆, ⊇, ∼, 6∼} for general attributes (taking set values). The form of RHS is
as in (1). For more details on the XTT2 rule formalization using ALSV(FD)
see [
        <xref ref-type="bibr" rid="ref6 ref7">7,6</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Basic Formal Analysis of XTT Rules</title>
      <p>The quality of a rule-based system is dependent on the quality of a knowledge
base. What is more important, anomalies in the set of rules could result in
serious faults in system’s responses. Therefore the analysis of knowledge base is
an important step during development of a rule-based system.</p>
      <p>
        The issues of verication and validation were discussed by many authors.
Dierences in their approaches to V&amp;V start at the denition level. In this
paper verication and validation processes are dened as follows:
Verication is a process in early design phase, aimed at checking if the system
meets its constraints and requirements ([
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref8 ref9">8,9,10,11,12</xref>
        ]).
      </p>
      <p>
        Testing is a process aimed at analyzing the system work, by comparing system
responses to known responses for special input data ([
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]).
      </p>
      <p>
        Validation is a case of testing, aimed at checking if the system meets user’s
requirements ([
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]).
      </p>
      <p>
        A summary of analysis techniques and tools is presented in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        The classication of potential errors and deformation of knowledge base
was also widely discussed, with some practical taxonomies of anomalies given
(see [
        <xref ref-type="bibr" rid="ref1 ref14">14,1</xref>
        ]). In this paper, from the formal point of view, rule anomalies are be
divided into three main categories: 1) incompleteness, 2) indeterminism , and 3)
overdeveloped set of rules .
      </p>
      <p>Let the knowledge base be described by rules:
r1 : Ψ1 → h1
r2 : Ψ2 → h2
.
.</p>
      <p>
        .
rn : Ψn → hn
(3)
Completeness ensures that for any input state the system reacts and
produces some response (conclusion, decision or action) ([
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]). In other words,
the system with the set of rules (3) is logically complete if a disjunction of
preconditions is a tautology: |= Ψ1 ∨ Ψ2 ∨ . . . ∨ Ψn The knowledge base
is incomplete, when unreachable, or dead-end rules exist in a rule set, or
some rules are missing.
      </p>
      <p>
        Determinism guarantees that the system always produces the same reaction
for the same input data. In other words for any input state the system
nds a unique solution ([
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]). From the formal point of view the set (3)
is indeterministic if there exists a state described by formula ψ, such that
simultaneously φ |= Ψ1 and φ |= Ψ2 and h1 6= h2 ([
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]).
      </p>
      <p>The system is indeterministic, if there are contradictory rules in knowledge
base. Inconsistency also is a cause of indeterminism.</p>
      <p>Minimal number of rules indicates a set of rules without redundant,
subsumed rules. What is more, the set of rules should produce the same reactions
as a overdeveloped set.</p>
      <p>
        All of above features completeness, determinism, minimal number of rules
should be provided to assure reliability, safety and eciency of the rule-base
system ([
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]). The XTT2 representation introduces a structure of knowledge base
by identifying rule contexts. Implicitly the context is identied with an extended
decision table. Isolation of contexts allows to provide local analysis contexts
can be veried separately. In practice, the analysis of the XTT knowledge base is
provided by HalVA Verication Framework [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. The main purpose of the
framework is the local verication. HalVA in implemented in Prolog. The verication
framework was developed as a plug-in of the HeaRT inference engine [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. The
HalVA provides the verication of completeness, contradiction and subsumption.
What is more, the number of rules can be reduced. HalVA verication is focused
on a local level, the schema of the XTT table is considered.
      </p>
      <p>
        All of verication procedures are based on inference rules for ALSV(FD)
introduced in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. For state described by φ a precondition (Ai ∝i Vi) (where
∝i∈ {=, 6=, ∈, ∈/} for the simple attribute and ∝i∈ {=, 6=, ⊆, ⊇, ∼, 6∼} for the
general attribute, i = 1, . . . , n) is satised, if simultaneously:
      </p>
    </sec>
    <sec id="sec-4">
      <title>Vi is a value from the domain of Ai,</title>
      <p>φAi is a value from the domain of Ai, where φAi is a value of attribute Ai
in formula φ,
a formula (Ai = φAi ) is a logical consequence of a formula (Ai ∝i Vi).</p>
      <p>The basic idea in the verication of completeness consists in checking all input
states. Domains of attributes are considered. The Cartesian product of domains
determine all states for the context (table). For every tuple corresponding to
an input state, the algorithm checks if preconditions of any rule are satised. If
there is no rule to execute, the considered state is reported as uncover. Based on
all uncovered states, a proposal of a new rule is given. The analysis ends, when
all states are checked. Since domains of attributes are nite, the verication
procedure terminates after a nite number of discrete steps.</p>
      <p>Verication of contradiction is based on a pairwise comparison of rules. Two
rules, executable in the same time (for the same state), are taken into
consideration. The comparison concerns the right-hand side of rules. If conclusions are
inconsistent, the conict is reported. The verication procedure stops when all
possible comparisons are done.</p>
      <p>The pairwise comparison of rules is also used to verify subsumption. However,
the analysis concerns both sides of rules. One rule is subsumed by another, if its
preconditions are more specic, but simultaneously conclusions are more general.
The verication procedure nds two rules in the context (table), executable for
the same state. Then checks, whether there is relation between conclusions. The
algorithm provides all comparisons. This strategy allows to detect identical rules.
In this case, a rule is reported as subsuming another and the other subsuming
the rst one.</p>
      <p>
        HalVA allows to reduce an overdeveloped set of rules. The reduction can be
done by using the dual resolution ([
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]). If rules produce the same conclusions
and in the precondition part exists at least one the same formula, the remaining
formulas are joined into one. All possible reductions are reported. What is more,
proposals of new rules are introduced.
      </p>
      <p>Unfortunately, solutions provided by HalVA are limited. The serious issue is
computational complexity of provided algorithms. Verication of completeness
could cause a combinatorial explosion, if domains of attributes are outsized. The
other technique the pairwise comparison of rules is also dependent on a size
of the considered case. Generally, to verify a set of n rules, n2 comparisons
need to be done. What is most important, all of HalVA verication features are
focused on a local analysis. The limitation of the scope indicates a verication of
some context (implicitly a table) only. Therefore, HalVA procedures can point
out anomalies in some specic area. Unfortunately, the problem of the global
quality of the knowledge base remains unsolved. This is where the new approach
proves to be useful.
4</p>
      <p>Graph-oriented Verication Solution Proposal
To verify rule-based systems in global scope the graph-oriented approach is
introduced. The main concept consists in representing XTT2 rules as a directed
hypergraph. Necessary basic denitions are introduced bellow.</p>
      <p>Let X = {x1, x2, . . . , xn} be a nite set, and let E = (Ei|i ∈ I) be a family
of subsets of X. The family E is said to be a hypergraph on X if
1. Ei 6= ∅ (i ∈ I)
2. [ Ei = X.</p>
      <p>
        i∈I
The couple H = (X, E ) is called a hypergraph. |X| = n is called the order of
this hypergraph. The elements x1, x2, . . . , xn are called the vertices and the sets
E1, E2, . . . , Em are called the edges ([
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]).
      </p>
      <p>A hypergraph is presented in Fig. 1. For directed edges (hyperarcs) initial
and terminal endpoints can be pointed out (vide Fig. 2).</p>
      <p>
        Let a hypergraph G = (X, E ) be considered (vide Fig. 3). The outer
demidegree d+G(x) of a vertex x is dened as the number of arcs having x as their
initial endpoint ([
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]). On the other hand, the inner demi-degree dG−(x) of a
vertex x is dened as the number of arcs having x as their terminal endpoint
([
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]). A vertex x is said to be a source, if dG−(x) = 0. A vertex x is said to be
a sink, if d+G(x) = 0.
      </p>
      <p>Fig. 2. A hyperarc E = {v1(i), . . . , vn(i), v1(t) . . . , vm(t)}. Vertices: v1(i), . . . , vn(i) are initial
endpoints and v1(t), . . . , vm(t) are terminal endpoints of the hyperarcs</p>
      <p>
        For a directed hypergraph H = (X, E ) the incidence matrix is a matrix
((aij ))m×n with m rows that represent the edges of H and n columns that
represent the vertices of H, such that ([
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]):
aij =

 −1 if xj ∈ Ei and xj is an inital endpoint of Ei
      </p>
      <p>1 if xj ∈ Ei and xj is an terminal endpoint of Ei
 0 if xj ∈/ Ei
Incidence matrix for the hypergraph in the Fig. 3 is introduced in Table 1.</p>
      <p>To provide verication using the graph theory an appropriate transformation
of XTT rules needs to be done. The rst step is to determine vertices. If vertices
correspond to all possible values from domains of attributes, it causes a
combinatorial explosion for outsized domains. Therefore, not single values, but whole
formulas are transformed into vertices. However, using formulas to describe
vertices results in an additional assumption. The graph-oriented approach can be
provided, if the table-level verication of completeness is done.</p>
      <p>There are three classes of vertices in the graph representation of rules:
sources : the source corresponds to a formula (Ai ∝i Vi), where the attribute
Ai is used only in a precondition part of rules.
sinks : the sink corresponds to conclusion part of rules.
others : all of others vertices, which are neither source nor the sinks, are
related to formulas (Ai ∝i Vi), where attribute Ai appears in both a
precondition and a conclusion part of rules.</p>
      <p>The assumption of local verication of completeness ensures the absence of
isolated vertices. Therefore, for the source x: d+G(x) &gt; 0, for the sink x: dG−(x) &gt; 0,
and for others x: d+(x) &gt; 0 and d−(x) &gt; 0. In this representation, a rule from
the knowledge base is transformed into a hyperarc. The rule also determines
the direction of the hyperarc. Therefore, each rule has a unique representation.
Initial endpoints of the hyperarc are related to formulas in a precondition part
of the rule. The hyperarc is terminated in several ways. Firstly, if a conclusion in
the rule is related to a sink, the sink becomes a terminal endpoint of the
hyperarc. Secondly, if an attribute in a conclusion appears in a clause in a precondition
part of other rule and if the clause is more general than the conclusion, the
vertex related to the clause terminates the hyperarc. Finally, if control statements
(next, else ) are introduced in the rule, appropriate vertices (clauses) become
terminators of the hyperarc.
r1 A in [a1, a2] B set b1 C set c1
r2 A eq a3 B set b2 C set c2</p>
      <p>The hypergraph for the system is presented in Fig. 4. Let the XTT2 system
be described by rules r1, r2 and r3 (vide Table 2). The attribute A appears
only in a precondition part. On the other hand, attributes B and D appear in a
decision part. Therefore, a hypergraph for the system has vertices:
v1: (A in [a1, a2])
v2: (A eq a3)
v3: (B set b1)
v4: (B set b2)
v5: (C eq c1)
v6: (C set c2)
v7: (D eq d1)</p>
      <p>
        The introduced representation of rules allows to dene anomalies of the
knowledge base as follows ([
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]):
Inconsistency exists if there exists a path from vertex X to its exclusive
vertex ¬X ([
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]).
      </p>
      <p>Contradiction exists if two paths from vertex X to vertices Y and ¬Y exist
in the graph.</p>
      <p>Redundancy exists if at least two dierent paths from vertex X to Y exist.
Circularity exists if there is a cycle in the graph.</p>
      <p>Unreachability exists if a vertex which is not the beginning of a path to any
output node and is not the end of a path from any input node can be found
in the graph.</p>
      <p>Locally veried inconsistency, contradiction and redundancy assure
correctness of rules in the table scope only. The new representation of rules allows to
examine paths in the graph. Deformed ones are reported. However, the vital
question is the global verication of completeness. Local analysis of
verication is helpful, but it is not limitative in the global scope. Fortunately,
graphoriented approach allows to detect unreachable formula or dead-end formula
main sources of incompleteness.</p>
      <p>As it was mentioned earlier, if the vertex v ∈ V is neither the source nor the
sink, its outer and inner demi-degree are greater than zero. If d+(v) = 0 and
d−(v) &gt; 0, the vertex is a dead-end formula. On the other hand, if d+(v) &gt; 0
and d−(v) = 0, the vertex is a unreachable formula.</p>
      <p>
        The graph-oriented verication is a powerful solution to the analysis of
rulebased systems. It can be applied to provide a global verication of the XTT2
knowledge bases ([
        <xref ref-type="bibr" rid="ref22 ref23 ref5 ref6">5,22,6,23</xref>
        ]). The most important feature of this approach is its
ability to verify completeness in a global scope.
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Verication Example</title>
      <p>
        Consider the thermostat control system ([
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]). The general schema of the system
is presented in Fig. 5. Tables dt and th are considered. The subsystem will be
transformed into a hypergraph (vide Fig. 6).
      </p>
      <p>The hypergraph related to the subsystem is presented as an incidence matrix
(vide Table 3). Let the deformation during the knowledge acquisition phase
be introduced. The altered knowledge base could be described by hypergraph
where vertices 3 and 4 are modied as shown in the parentheses. Locally the
knowledge base is still valid: it is complete and there is no contradiction or
redundancy. However, consider the global scope: vertices 1, 2, 5, 6, 7 and 8 are
sources; vertices 9 and 10 are sinks. Demi-degrees (inner and outer) of other
vertices 3 and 4 should be greater than zero. Unfortunately, the vertex 4 is
deformed. Its inner demi-degree equals zero. There is no path from any source
to this vertex. It is an unreachable formula . Therefore, the knowledge base is
globally incomplete.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Concluding Remarks and Future Work</title>
      <p>In this paper a graph-based representation for XTT2 rules is proposed. It is
aimed at the graph-oriented verication, which is a powerful solution to the
analysis of rule-based systems. It can be applied to provide global verication of
the XTT2 knowledge bases. In the paper a practical example is provided, and a
preliminary evaluation of the approach is given.</p>
      <p>In the global verication of XTT2, formulas in precondition and decision
parts are transformed into vertices. Adequate hyperarcs are determined. The
analysis of hypergraph structure allows to detect unreachable and dead-end
formulas. This allows for a more ecient analysis of completeness of the rule base.</p>
      <p>The research presented in the paper is work in progress. Detection of
redundancy or contradiction needs to examine paths in the hypergraph. This is a more
dicult problem than the analysis of structure of the hypergraph. The
correlation between vertices on a path needs to be checked. Therefore, this method
should be improved. Another important question is reconstructing the system
from the hypergraph. At the moment the transformation to hypergraph is not
entirely reversible. Yet another issue is the global inference support based on
the hypergraph structure. Apparently, in this approach the inference can be
optimized on both the table level and global level.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Ligƒza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Logical Foundations for Rule-Based Systems</article-title>
          . Springer-Verlag, Berlin, Heidelberg (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Hopgood</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          :
          <article-title>Intelligent Systems for Engineers and Scientists. 2nd edn</article-title>
          . CRC Press, Boca Raton London New York Washington, D.C. (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Liebowitz</surname>
          </string-name>
          , J., ed.:
          <source>The Handbook of Applied Expert Systems</source>
          . CRC Press, Boca Raton (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Giarratano</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Riley</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Expert Systems. Principles and Programming. Fourth edition edn</article-title>
          .
          <source>Thomson Course Technology</source>
          , Boston, MA, United
          <string-name>
            <surname>States</surname>
          </string-name>
          (
          <year>2005</year>
          ) ISBN 0-534-38447-1.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Nalepa</surname>
            ,
            <given-names>G.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ligƒza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A visual edition tool for design and verication of knowledge in rule-based systems</article-title>
          .
          <source>Systems Science</source>
          <volume>31</volume>
          (
          <issue>3</issue>
          ) (
          <year>2005</year>
          )
          <fpage>103109</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Nalepa</surname>
            ,
            <given-names>G.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ligƒza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Hekate methodology, hybrid engineering of intelligent systems</article-title>
          .
          <source>International Journal of Applied Mathematics and Computer Science</source>
          (
          <year>2009</year>
          )
          <article-title>accepted for publication.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Nalepa</surname>
            ,
            <given-names>G.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ligƒza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Xtt+ rule design using the alsv(fd)</article-title>
          . In
          <string-name>
            <surname>Giurca</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Analyti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wagner</surname>
          </string-name>
          , G., eds.
          <source>: ECAI 2008: 18th European Conference on Articial Intelligence: 2nd East European Workshop on Rule-based applications, RuleApps2008: Patras, 22 July</source>
          <year>2008</year>
          , Patras, University of Patras (
          <year>2008</year>
          )
          <fpage>1115</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Tepandi</surname>
          </string-name>
          , J.:
          <article-title>Verication, testing, and validation of rule-based expert systems</article-title>
          .
          <source>Proceedings of the 11-th IFAC World Congress</source>
          (
          <year>1990</year>
          )
          <fpage>162167</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Andert</surname>
            ,
            <given-names>E.P.</given-names>
          </string-name>
          :
          <article-title>Integrated Knowledge-Based System Design and Validation for Solving Problems in Uncertain Environments</article-title>
          .
          <source>International Journal of Man-Machine Studies</source>
          <volume>36</volume>
          (
          <issue>2</issue>
          ) (
          <year>1992</year>
          )
          <fpage>357373</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Nazareth</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          :
          <article-title>Issues in the Verication of Knowledge in Rule-Based Systems</article-title>
          .
          <source>International Journal of Man-Machine Studies</source>
          <volume>30</volume>
          (
          <issue>3</issue>
          ) (
          <year>1989</year>
          )
          <fpage>255271</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Nguyen</surname>
            ,
            <given-names>T.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perkins</surname>
            ,
            <given-names>W.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laey</surname>
            ,
            <given-names>T.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pecora</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Checking an Expert Systems Knowledge Base for Consistency and Completeness</article-title>
          . In: IJCAI. (
          <year>1985</year>
          )
          <fpage>375378</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Suwa</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scott</surname>
            ,
            <given-names>C.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shortlie</surname>
            ,
            <given-names>E.H.</given-names>
          </string-name>
          :
          <article-title>Completeness and consistency in rulebased expert system</article-title>
          .
          <source>In: Rule-Based Expert Systems</source>
          . Addison-Wesley Publishing Company (
          <year>1985</year>
          )
          <fpage>159170</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Wentworth</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Knaus</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aougab</surname>
          </string-name>
          , H.:
          <article-title>Verication, Validation and Evaluation of Expert Systems</article-title>
          . World Wide Web electronic publication: http://www.tfhrc.gov/advanc/vve/cover.htm
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Vermesan</surname>
            ,
            <given-names>A.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Coenen</surname>
          </string-name>
          , F., eds.
          <source>: Validation and Verication of Knowledge Based Systems. Theory, Tools and Practice</source>
          . Kluwer Academic Publisher, Boston (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Ligƒza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Logical Support for Design of Rule-Based Systems</article-title>
          . Reliability and
          <string-name>
            <given-names>Quality</given-names>
            <surname>Issues</surname>
          </string-name>
          .
          <source>ECAI'96 Workshop on Validation, Verication and Renement of Knowledge-Based Systems</source>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Ligƒza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Logical Foundations for Rule-Based Systems. Uczelniane wydawnictwa Naukowo-Dydaktyczne AGH w Krakowie (</article-title>
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Ligƒza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nalepa</surname>
            ,
            <given-names>G.J.:</given-names>
          </string-name>
          <article-title>Proposal of a formal verication framework for the xtt2 rule bases</article-title>
          .
          <source>In: CMS'09: Computer Methods and Systems 267 November</source>
          <year>2009</year>
          , Krakw, Poland, AGH University of Science and Technology, Cracow, Oprogramowanie
          <string-name>
            <surname>Naukowo-Techniczne</surname>
          </string-name>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Nalepa</surname>
            ,
            <given-names>G.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ligƒza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaczor</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , Furma«ska, W.T.:
          <article-title>Hekate rule runtime and design framework</article-title>
          . In Adrian Giurca,
          <string-name>
            <given-names>Grzegorz J.</given-names>
            <surname>Nalepa</surname>
          </string-name>
          , G.W., ed.
          <source>: Proceedings of the 3rd East European Workshop on Rule-Based Applications (RuleApps</source>
          <year>2009</year>
          ) Cottbus, Germany,
          <year>September 21</year>
          ,
          <year>2009</year>
          , Cottbus, Germany (
          <year>2009</year>
          )
          <fpage>2130</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Nalepa</surname>
            ,
            <given-names>G.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ligƒza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          : HeKatE Methodology,
          <source>Hybrid Engineering of Intelligent Systems. Int. J. Appl. Math. Comput. Sci</source>
          .
          <volume>18</volume>
          (
          <issue>3</issue>
          ) (
          <year>2009</year>
          )
          <fpage>115</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Berge</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Graphs and Hypergraphs</article-title>
          . Elsevier Science Ltd (
          <year>1985</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Arman</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Richards</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rine</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Structural and Syntactic Fault Correction Algorithms in Rule-Based Systems</article-title>
          .
          <source>International Journal od Computing and Information Sciences</source>
          <volume>2</volume>
          (
          <issue>1</issue>
          ) (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Nalepa</surname>
            ,
            <given-names>G.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ligƒza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>XTT+ Rule Design Using the ALSV(FD)</article-title>
          .
          <source>In: RuleApps</source>
          . (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Nalepa</surname>
            ,
            <given-names>G.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ligƒza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>On ALSV Rules Formulation and Inference</article-title>
          .
          <source>In: FLAIRS Conference</source>
          .
          <article-title>(</article-title>
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>