Maintaining constraint-based applications

  • Tomas Eric Nordlander
  • , Eugene C. Freuder
  • , Richard J. Wallace

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

Many knowledge-based applications require knowledge maintenance to keep the application functional throughout its lifecycle. In this paper we present iCAM, a constraint-based knowledge maintenance system that operates in a hospital's material management domain. iCAM uses consistency algorithms to assist users in placing orders and making order corrections, and to ensure that maintenance activities are consistent with the department's ordering environment. This approach allows iCAM to interact with the user to revise orders and/or to update the knowledge base. For the user, there is not much distinction between these two tasks. This is one of iCAM's greatest strengths; order corrections and knowledge maintenance are carried out in a similar manner, since both are based on inconsistencies with respect to the existing knowledge base. iCAM has various constraint types that support physical and policy restrictions. It also allows maintenance to be done by a number of users while maintaining the integrity of the knowledge base by a system of role restrictions.

Original languageEnglish
Title of host publicationK-CAP'07
Subtitle of host publicationProceedings of the Fourth International Conference on Knowledge Capture
PublisherAssociation for Computing Machinery (ACM)
Pages79-86
Number of pages8
ISBN (Print)9781595936431
DOIs
Publication statusPublished - 28 Oct 2007
Event4th International Conference on Knowledge Capture, K-CAP 2007 - Whistler, BC, Canada
Duration: 28 Oct 200731 Oct 2007

Publication series

NameK-CAP'07: Proceedings of the Fourth International Conference on Knowledge Capture

Conference

Conference4th International Conference on Knowledge Capture, K-CAP 2007
Country/TerritoryCanada
CityWhistler, BC
Period28/10/0731/10/07

Keywords

  • Consistency algorithms
  • Constraint programming
  • Knowledge acquisition
  • Knowledge maintenance

Fingerprint

Dive into the research topics of 'Maintaining constraint-based applications'. Together they form a unique fingerprint.

Cite this