Open Access. Powered by Scholars. Published by Universities.®

Life Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Life Sciences

Characterizations Of Classes Of Programs By Three-Valued Operators, Anthony K. Seda, Pascal Hitzler Dec 1999

Characterizations Of Classes Of Programs By Three-Valued Operators, Anthony K. Seda, Pascal Hitzler

Computer Science and Engineering Faculty Publications

Several important classes of normal logic programs, including the classes of acyclic, acceptable, and locally hierarchical programs, have the property that every program in the class has a unique two-valued supported model. In this paper, we call such classes unique supported model classes. We analyse and characterize these classes by means of operators on three-valued logics. Our studies will motivate the definition of a larger unique supported model class which we call the class of Phi-accessible programs. Finally, we show that the class of Phi -accessible programs is computationally adequate in that every partial recursive function can be implemented by …


On-Line Bayesian Tree-Structured Transformation Of Hidden Markov Models For Speaker Adaptation, Shaojun Wang, Yunxin Zhao Dec 1999

On-Line Bayesian Tree-Structured Transformation Of Hidden Markov Models For Speaker Adaptation, Shaojun Wang, Yunxin Zhao

Kno.e.sis Publications

This paper presents a new recursive Bayesian learning approach for transformation parameter estimation in speaker adaptation. Our goal is to incrementally transform (or adapt) the entire set of HMM parameters for a new speaker or new acoustic enviroment from a small amount of adaptation data. By establishing a clustering tree of HMM Gaussian mixture components, the finest affine transformation parameters for individual HMM Gaussian mixture components can be dynamically searched. The on-line Bayesian learning technique proposed in our recent work is used for recursive maximum a posteriori estimation of affine transformation parameters. Speaker adaptation experiments using a 26-letter English alphabet …


Efficient Support For Decision Flows In E-Commerce Applications, Richard Hull, Francois Llirbat, Jianwen Su, Guozhu Dong, Bharat Kumar, Gang Zhou Oct 1999

Efficient Support For Decision Flows In E-Commerce Applications, Richard Hull, Francois Llirbat, Jianwen Su, Guozhu Dong, Bharat Kumar, Gang Zhou

Kno.e.sis Publications

In the coming era of segment-of-one marketing, decisions about business transactions will be quite intricate, so that customer treatments can be highly individualized, reflecting customer preferences, targeted business objectives, etc. This paper describes a paradigm called “decision flows” for specifying a form of incremental decision-making that can combine a myriad of diverse business factors and be executed in near-realtime. Starting with initial input, a decision flow will iteratively gather and derive additional information until a conclusion is reached. Decision flows can be specified in a rules-based manner that generalizes so-called “business rules” but provides more structure than traditional expert systems. …


Critical It Role In Healthcare: National Agenda, Applications, And Technologies, Jack Corley, Warren Karp, Amit P. Sheth Oct 1999

Critical It Role In Healthcare: National Agenda, Applications, And Technologies, Jack Corley, Warren Karp, Amit P. Sheth

Kno.e.sis Publications

We share a widely-held vision that tomorrow's health care will be delivered by a distributed team using a knowledge based process that is focused on prevention and wellness. Caregivers will be able to treat and monitor patients where and when needed, capturing data as a natural byproduct of care delivery. Clinical teams with a wide range of skills and expertise will deliver consistent, quality care based on timely, situation-specific knowledge and guidance derived from outcomes evidence. That same knowledge will support advances in healthcare research and education. Home care and remote medicine will increase, reducing the need for high-cost hospitalization. …


A Multilevel Secure Workflow Management System, Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krzysztof J. Kochut, John A. Miller Jun 1999

A Multilevel Secure Workflow Management System, Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krzysztof J. Kochut, John A. Miller

Kno.e.sis Publications

The Department of Defense (DoD) needs multilevel secure (MLS) workflow management systems to enable globally distributed users and applications to cooperate across classification levels to achieve mission critical goals. An MLS workflow management system that allows a user to program multilevel mission logic, to securely coordinate widely distributed tasks, and to monitor the progress of the workflow across classification levels is required. In this paper, we present a roadmap for implementing MLS workflows and focus on a workflow builder that is a graphical design tool for specifying such workflows.


How Proteins Fold, Flex, And Bind Other Molecules, Leslie A. Kuhn, Volker Schnecke, Michael L. Raymer, Paul C. Sanschagrin Apr 1999

How Proteins Fold, Flex, And Bind Other Molecules, Leslie A. Kuhn, Volker Schnecke, Michael L. Raymer, Paul C. Sanschagrin

Kno.e.sis Publications

No abstract provided.


Data Integration By Describing Sources With Constraint Databases, Xun Cheng, Guozhu Dong, Tzekwan Lau, Jianwen Su Mar 1999

Data Integration By Describing Sources With Constraint Databases, Xun Cheng, Guozhu Dong, Tzekwan Lau, Jianwen Su

Kno.e.sis Publications

We develop a data integration approach for the efficient evaluation of queries over autonomous source databases. The approach is based on some novel applications and extensions of constraint database techniques. We assume the existence of a global database schema. The contents of each data source are described using a set of constraint tuples over the global schema; each such tuple indicates possible contributions from the source. The “source description catalog” (SDC) of a global relation consists of its associated constraint tuples. Such a method of description is advantageous since it is flexible to add new sources and to modify existing …


Efficient Mining Of Partial Periodic Patterns In Time Series Database, Jiawei Han, Guozhu Dong, Yiwen Yin Mar 1999

Efficient Mining Of Partial Periodic Patterns In Time Series Database, Jiawei Han, Guozhu Dong, Yiwen Yin

Kno.e.sis Publications

Partial periodicity search, i.e., search for partial periodic patterns in time-series databases, is an interesting data mining problem. Previous studies on periodicity search mainly consider finding full periodic patterns, where every point in time contributes (precisely or approximately) to the periodicity. However, partial periodicity is very common in practice since it is more likely that only some of the time episodes may exhibit periodic patterns.

We present several algorithms for efficient mining of partial periodic patterns, by exploring some interesting properties related to partial periodicity, such as the Apriori property and the max-subpattern hit set property, and by shared mining …


Exploring Cost Constraints On Stem Elongation In Plants Using Phenotypic Manipulation, Don Cipollini, Jack C. Schultz Feb 1999

Exploring Cost Constraints On Stem Elongation In Plants Using Phenotypic Manipulation, Don Cipollini, Jack C. Schultz

Biological Sciences Faculty Publications

Negative associations between individual life‐history traits of an organism are referred to as life‐history trade‐offs (Stearns 1992; Zera et al. 1998). The existence of costly trade‐offs is thought to have favored the evolution of phenotypic plasticity as a mechanism through which organisms can account for environmental heterogeneity while modulating costs and benefits incurred by fixed allocation to competing functions (Bradshaw 1965; Stearns 1992; Sultan 1995; Dudley and Schmitt 1996; Pigliucci 1996). In plants, the ability to modify stem elongation in response to environmental cues appears to be a classic form of adaptive phenotypic plasticity (Sultan 1995; Gedroc et al. 1996). …


Multivalued Mappings, Fixed-Point Theorems And Disjunctive Databases, Pascal Hitzler, Anthony K. Seda Jan 1999

Multivalued Mappings, Fixed-Point Theorems And Disjunctive Databases, Pascal Hitzler, Anthony K. Seda

Computer Science and Engineering Faculty Publications

In this paper, we discuss the semantics of disjunctive programs and databases and show how multivalued mappings and their fixed points arise naturally within this context. A number of fixed-point theorems for multivalued mappings are considered, some of which are already known and some of which are new. The notion of a normal derivative of a disjunctive program is introduced. Normal derivatives are normal logic programs which are determined by the disjunctive program. Thus, the well-known single-step operator associated with a normal derivative is single-valued, and its fixed points can be found by well-established means. It is shown how fixed …


Maintaining Transitive Closure Of Graphs In Sql, Guozhu Dong, Leonid Libkin, Jianwen Su, Limsoon Wong Jan 1999

Maintaining Transitive Closure Of Graphs In Sql, Guozhu Dong, Leonid Libkin, Jianwen Su, Limsoon Wong

Kno.e.sis Publications

It is common knowledge that relational calculus and even SQL are not expressive enough to express recursive queries such as the transitive closure. In a real database system, one can overcome this problem by storing a graph together with its transitive closure and maintaining the latter whenever updates to the former occur. This leads to the concept of an incremental evaluation system, or IES.

Much is already known about the theory of IES but very little has been translated into practice. The purpose of this paper is to fill in this gap by providing a gentle introduction to and …


Infoharness: Managing Distributed, Heterogeneous Information, Kshitij Shah, Amit P. Sheth Jan 1999

Infoharness: Managing Distributed, Heterogeneous Information, Kshitij Shah, Amit P. Sheth

Kno.e.sis Publications

Today, important information is scattered in so many places, formats, and media, that getting the right information at the right time and place is an extremely difficult task. Developing a single software product, for example, includes the creation of documents ranging from the requirements specification and project schedules to marketing presentations, multimedia tutorials, and more. Each document may be created by a different person using a different tool, and each may be stored in a different place. InfoHarness is an information integration system, platform, and tool set that addresses these problems, managing huge amounts of heterogeneous information in a distributed …


Processes Driving The Networked Economy, Amit P. Sheth, Will Van Der Aalst, I. Budak Arpinar Jan 1999

Processes Driving The Networked Economy, Amit P. Sheth, Will Van Der Aalst, I. Budak Arpinar

Kno.e.sis Publications

The authors propose that an organic workflow-process technology will power the evolution of information system architectures. The authors outline three likely stages of architectural evolution in the context of a networked economy and discuss critical gaps in the current technology with respect to their envisioned future.