Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Noboru Iwayama is active.

Publication


Featured researches published by Noboru Iwayama.


Journal of Logic Programming | 2000

Computing abduction by using TMS with top-down expectation

Noboru Iwayama; Ken Satoh

Abstract We present a method to compute abduction in logic programming. We translate an abductive framework into a normal logic program with integrity constraints and show the correspondence between generalized stable models and stable models for the translation of the abductive framework. Abductive explanations for an observation can be found from the stable models for the translated program by adding a special kind of integrity constraint for the observation. Then, we show a bottom-up procedure to compute stable models for a normal logic program with integrity constraints. The proposed procedure excludes the unnecessary construction of stable models on early stages of the procedure by checking integrity constraints during the construction and by deriving some facts from integrity constraints. Although a bottom-up procedure has the disadvantage of constructing stable models not related to an observation for computing abductive explanations in general, our procedure avoids the disadvantage by expecting which rule should be used for satisfaction of integrity constraints and starting bottom-up computation based on the expectation. This expectation is not only a technique to scope rule selection but also an indispensable part of our stable model construction because the expectation is done for dynamically generated constraints as well as the constraint for the observation.


international workshop on extensions of logic programming | 1992

A Correct Goal-directed Proof Procedure for a General Logic Program with Integrity Constraints

Ken Satoh; Noboru Iwayama

We present a correct goal-directed procedure for consistent logic program with integrity constraints in stable model semantics [5]. Although there are correct bottom-up procedures for every general logic program [13, 4, 15, 7] to compute stable models, there are no proposed correct goal-directed procedure for every general logic program. Our proposed procedure is correct not only for successful derivation but also for finite failure. This procedure is an extension of Eshghis procedure [3] which is correct for every call-consistent logic program, and can be regarded as a combination of the model elimination procedure [10] and consistency checking in updates of implicit deletions [14].


Archive | 1995

Transformation pattern generating device and encryption function device

Ryota Akiyama; Naoya Torii; Noboru Iwayama; Kenichi Utsumi


Archive | 1995

Software charging system and software data utilization permitting device

Takayuki Hasebe; Naoya Torii; Noboru Iwayama; Masahiko Takenaka; Masahiro Matsuda


Archive | 2000

Chat system and method for delivering additional information via another independent network

Tatsuro Matsumoto; Noboru Iwayama


Archive | 2000

Status change notification system for use in chat system channel

Noboru Iwayama; Kenichi Sasaki; Tatsuro Matsumoto; Hitoshi Yamauchi; Hidenobu Ito; Kazuki Matsui


Archive | 1995

Method and device for utilizing data content

Noboru Iwayama; Naoya Torii; Takayuki Hasebe; Masahiko Takenaka; Masahiro Matsuda


JICSLP | 1992

A Query Evaluation Method for Abductive Logic Programming.

Ken Satoh; Noboru Iwayama


international conference on lightning protection | 1991

Computing Abduction by Using the TMS.

Ken Satoh; Noboru Iwayama


Archive | 2001

Advertising method and advertising device

Noboru Iwayama; Madoka Mitsuoka; Youji Kohda

Collaboration


Dive into the Noboru Iwayama's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ken Satoh

National Institute of Informatics

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge