Lattice Operations on Terms over Similar Signatures

09/04/2017
by   Hassan Aït-Kaci, et al.
0

Unification and generalization are operations on two terms computing respectively their greatest lower bound and least upper bound when the terms are quasi-ordered by subsumption up to variable renaming (i.e., t_1≼ t_2 iff t_1 = t_2σ for some variable substitution σ). When term signatures are such that distinct functor symbols may be related with a fuzzy equivalence (called a similarity), these operations can be formally extended to tolerate mismatches on functor names and/or arity or argument order. We reformulate and extend previous work with a declarative approach defining unification and generalization as sets of axioms and rules forming a complete constraint-normalization proof system. These include the Reynolds-Plotkin term-generalization procedures, Maria Sessa's "weak" unification with partially fuzzy signatures and its corresponding generalization, as well as novel extensions of such operations to fully fuzzy signatures (i.e., similar functors with possibly different arities). One advantage of this approach is that it requires no modification of the conventional data structures for terms and substitutions. This and the fact that these declarative specifications are efficiently executable conditional Horn-clauses offers great practical potential for fuzzy information-handling applications.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/27/2023

Fuzzy order-sorted feature logic

Order-Sorted Feature (OSF) logic is a knowledge representation and reaso...
research
12/22/2019

A Deep Neuro-Fuzzy Network for Image Classification

The combination of neural network and fuzzy systems into neuro-fuzzy sys...
research
07/02/2021

Computing Fuzzy Rough Set based Similarities with Fuzzy Inference and Its Application to Sentence Similarity Computations

Several research initiatives have been proposed for computing similarity...
research
12/16/2021

Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics

Biometric authentication is one of the promising alternatives to standar...
research
04/14/2020

Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis

Control Flow Graph (CFG) similarity analysis is an essential technique f...
research
07/12/2021

Separating Data Examples by Description Logic Concepts with Restricted Signatures

We study the separation of positive and negative data examples in terms ...

Please sign up or login with your details

Forgot password? Click here to reset