<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462005000200002</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[CRIB: A Method for Integrity Constraint Checking on Knowledge Bases]]></article-title>
<article-title xml:lang="es"><![CDATA[CRIB: Método para la Comprobación de Restricciones de Integridad en Bases de Conocimiento]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Clemente]]></surname>
<given-names><![CDATA[Julia]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[de Antonio]]></surname>
<given-names><![CDATA[Angélica]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ramírez]]></surname>
<given-names><![CDATA[Jaime]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universidad de Alcalá de Henares Escuela Universitaria Politécnica ]]></institution>
<addr-line><![CDATA[Madrid Spain]]></addr-line>
</aff>
<aff id="A02">
<institution><![CDATA[,Universidad Politécnica de Madrid Facultad de Informática ]]></institution>
<addr-line><![CDATA[Madrid Spain]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2005</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2005</year>
</pub-date>
<volume>8</volume>
<numero>4</numero>
<fpage>265</fpage>
<lpage>280</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462005000200002&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462005000200002&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462005000200002&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[The necessity of verification tools for Knowledge Based-Systems (KBSs), that help to guarantee a certain degree of quality and reliability of these systems will increase in the future when more critical systems are developed in areas such as industry, science, business, etc. One of the objectives of the KBSs verification is to assure the consistency and completeness of the Knowledge Base (KB). In this paper, a technique to detect possible inconsistencies or conflicting situations between the objects of the KB is described, and a tool called CRIB, that implements this technique, is presented. The generality of this technique, based on the checking of the Integrity Constraints (ICs) declared on the KB, will allow to apply it to different kinds of KBSs. In addition, the flexibility and the power of the ICs specification language will make it possible to detect a wide range of inconsistencies in a KB.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[La necesidad de herramientas de verificación para Sistemas Basados en el Conocimiento (SBCs), que ayuden a garantizar un cierto grado de calidad y fiabilidad de estos sistemas aumentará en el futuro conforme más sistemas críticos sean desarrollados en áreas tales como la industria, la ciencia, los negocios, etc. Uno de los objetivos de la verificación de SBCs es asegurar la consistencia y la completitud de la Base de Conocimientos (BC). En este artículo se describe una técnica para detectar posibles inconsistencias o situaciones conflictivas entre los objetos de la BC, y se presenta una herramienta llamada CRIB, que implementa esta técnica. La generalidad de esta técnica, basada en la comprobación de las Restricciones de Integridad (Rls) declaradas en la BC, permite aplicarla a diferentes tipos de SBCs. Asimismo, la flexibilidad y la potencia del lenguaje de especificación de RIs hará posible detectar un amplio abanico de inconsistencias en una BC.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Verification]]></kwd>
<kwd lng="en"><![CDATA[Knowledge Based-System]]></kwd>
<kwd lng="en"><![CDATA[Consistency]]></kwd>
<kwd lng="es"><![CDATA[Verificación]]></kwd>
<kwd lng="es"><![CDATA[Sistema Basado en el Conocimiento]]></kwd>
<kwd lng="es"><![CDATA[Consistencia]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4">Art&iacute;culos</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>CRIB: A Method for Integrity Constraint Checking on Knowledge Bases</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><i>CRIB: M&eacute;todo para la Comprobaci&oacute;n de Restricciones de Integridad en Bases de Conocimiento</i></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Julia Clemente<sup>1</sup>, Ang&eacute;lica de Antonio<sup>2</sup> and Jaime Ram&iacute;rez<sup>2</sup></b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><i>1 Universidad de Alcal&aacute; de Henares    <br>   Escuela Universitaria Polit&eacute;cnica    ]]></body>
<body><![CDATA[<br>   Departamento de Autom&aacute;tica    <br>   Campus Universitario. Ctra. Madrid&#150;Barcelona, Km. 33,600    <br>   28871 Alcal&aacute; de Henares, Madrid, Spain    <br> e&#150;mail: <a href="mailto:julia@aut.alcala.es">julia@aut.alcala.es</a></i></font></p>     <p align="center"><font face="verdana" size="2"><i>2 Facultad de Inform&aacute;tica.    <br>   Universidad Polit&eacute;cnica de Madrid.    <br> 28660 Boadilla del Monte, Madrid, Spain.    <br> e&#150;mail: <a href="mailto:angelica@fi.upm.es">angelica@fi.upm.es</a>, <a href="mailto:jramirez@fi.upm.es">jramirez@fi.upm.es</a></i></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><u>Article received on october 15, 2003; accepted 01 february 28,2005</u></font></p>     ]]></body>
<body><![CDATA[<p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">The necessity of verification tools for Knowledge Based&#150;Systems (KBSs), that help to guarantee a certain degree of quality and reliability of these systems will increase in the future when more critical systems are developed in areas such as industry, science, business, etc. One of the objectives of the KBSs verification is to assure the consistency and completeness of the Knowledge Base (KB). In this paper, a technique to detect possible inconsistencies or conflicting situations between the objects of the KB is described, and a tool called CRIB, that implements this technique, is presented. The generality of this technique, based on the checking of the Integrity Constraints (ICs) declared on the KB, will allow to apply it to different kinds of KBSs. In addition, the flexibility and the power of the ICs specification language will make it possible to detect a wide range of inconsistencies in a KB.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Verification, Knowledge Based&#150;System, Consistency.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2">La necesidad de herramientas de verificaci&oacute;n para Sistemas Basados en el Conocimiento (SBCs), que ayuden a garantizar un cierto grado de calidad y fiabilidad de estos sistemas aumentar&aacute; en el futuro conforme m&aacute;s sistemas cr&iacute;ticos sean desarrollados en &aacute;reas tales como la industria, la ciencia, los negocios, etc. Uno de los objetivos de la verificaci&oacute;n de SBCs es asegurar la consistencia y la completitud de la Base de Conocimientos (BC). En este art&iacute;culo se describe una t&eacute;cnica para detectar posibles inconsistencias o situaciones conflictivas entre los objetos de la BC, y se presenta una herramienta llamada CRIB, que implementa esta t&eacute;cnica. La generalidad de esta t&eacute;cnica, basada en la comprobaci&oacute;n de las Restricciones de Integridad (Rls) declaradas en la BC, permite aplicarla a diferentes tipos de SBCs. Asimismo, la flexibilidad y la potencia del lenguaje de especificaci&oacute;n de RIs har&aacute; posible detectar un amplio abanico de inconsistencias en una BC.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Palabras Clave:</b> Verificaci&oacute;n, Sistema Basado en el Conocimiento, Consistencia.</font></p>     <p align="justify">&nbsp;</p>     <p align="justify"><font size="2" face="verdana"><a href="/pdf/cys/v8n4/v8n4a2.pdf" target="_blank">DESCARGAR ARTICULO EN FORMATO PDF</a></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1. <b>Plaza, E.:</b> KBS Validation: From Tools to Methodology. IEEE Expert, vol. 8, No. 3. 1993, pp. 45&#150;47.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038532&pid=S1405-5546200500020000200001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2. <b>Hoppe, T., and Meseguer, P.</b>: VVT Terminology: A proposal. IEEE Expert, Vol. 8, No. 3, 1993, pp. 48&#150;55.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038533&pid=S1405-5546200500020000200002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3. <b>Laurent, J.:</b> Proposals for a valid terminology in KBS Validation. Proceedings ECAI 92, 1992, pp. 829&#150;834.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038534&pid=S1405-5546200500020000200003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4. <b>Adrion, W.:</b> Validation, verification, and testing of computer software. ACM Computer Surveys, vol. 14, No. 2, 1982, pp. 159&#150;192.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038535&pid=S1405-5546200500020000200004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5. <b>ANSI/IEEE Standard 729, Standard Glossary of Software Engineering Terminology:</b> 1983.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038536&pid=S1405-5546200500020000200005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6. <b>Suen Ch. Y., Grogono P.D., and Shinghal. R.:</b> Verifying, Validating, and Measuring the performance of Expert Systems. Expert Systems With Applications, Vol. 1, No. 2, 1990, pp. 93&#150;102.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038537&pid=S1405-5546200500020000200006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7. <b>Green, C., and Keyes, M.</b>: Verification and Validation of expert systems. Proceedings Western Conference on Expert Systems, 1987, pp. 38&#150;43.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038538&pid=S1405-5546200500020000200007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8. <b>Rousset, M.:</b> On the Consistency of Knowledge Bases: The COVADIS System. Proceedings ECAI 88, 1988, pp. 79&#150;84.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038539&pid=S1405-5546200500020000200008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9. <b>Ginsberg, A.</b>: Knowledge&#150;Base Reduction: A New Approach to checking Knowledge Bases for Inconsistency and Redundancy. Proceedings AAAI&#150;88, 1988, pp. 585&#150;589.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038540&pid=S1405-5546200500020000200009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10. <b>Beauvieux, A., and Dague, P.:</b> A General Consistency (Checking and Restoring) Engine for Knowledge Bases. Proceedings ECAI 90, 1990, pp. 77&#150;82.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038541&pid=S1405-5546200500020000200010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11. <b>Loiseau, S.:</b> Refinement of Knowledge Bases Based on Consisten y Proceedings ECAI 92, 1992, pp. 845&#150;849.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038542&pid=S1405-5546200500020000200011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12. <b>Meseguer, P.:</b> lncremental Verification of Rule&#150;Based Expert Systems. Proceedings ECAI 92, 1992, pp. 840&#150;844.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038543&pid=S1405-5546200500020000200012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">13. <b>Van Melle, W., Shortliffe, H., and Buchanan:</b> G. , EMYCIN: A Knowledge Engineer's Tool for Constructing Rule&#150;Based Systems. Rule&#150;Based Expert Systems, Addison&#150;Wesley. 1984, pp. 301&#150;313.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038544&pid=S1405-5546200500020000200013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">14. <b>Suwa, M., Scott, A.C., and Shortliffe, E.H.:</b> An approach to verifying completeness and consistency in a rule based expert system. Al Magazine, fall 82, 1982, pp. 16&#150;21.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038545&pid=S1405-5546200500020000200014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">15. <b>Steinmetz R. and Theissen S.</b>: Integration of Petri Nets into a Tool for Consistency Checking of Expert Systems with Rule&#150;Based Knowledge Representation. Proceedings 6th. Workshop on Petri nets, 1985, pp. 35&#150;52.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038546&pid=S1405-5546200500020000200015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">16. <b>Murata T., and Matsuyama K.:</b> Inconsistency Check of a Set of Clauses Using Petri Net Reductions: EECS #86&#150;12 Dept. Universityof Illinois at Chicago, Technical Report 1986.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038547&pid=S1405-5546200500020000200016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">17. <b>Meseguer, P.:</b> A New Method to checking Rule Bases for Inconsistency: A Petri Net Approach. Proceedings ECAI 90,1990, pp. 437&#150;442.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038548&pid=S1405-5546200500020000200017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">18. <b>He X., Chu W. C., Yang H., and Yang S. J. H.:</b> A New Approach to Verify Rule&#150;Based Systems using Petri Nets. Proceedings of the Twenty&#150;Third Annual Intemational Computer Software and Applications Conference (Cat. No.99CB37032). IEEE Comput. Soc, Los Alamitos, CA, USA; xx+478: 1999, pp. 462&#150;467.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038549&pid=S1405-5546200500020000200018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">19. <b>Nguyen, T.A, Perkins, W.A., and Pecora, D.:</b> Knowledge Base Verification. Al Magazine, vol. 8, No. 2, 1987, pp. 69&#150;75.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038550&pid=S1405-5546200500020000200019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">20. <b>Nguyen T.A.:</b> Verifying Consistency of Production Systems. Proceedings of the 3rd. conference on Artificial Intelligence Aplications, 1987, pp. 4&#150;8.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038551&pid=S1405-5546200500020000200020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">21. <b>Nazareth D.L.:</b> An Analysis of Techniques for Verification of Lodical Correctness in Rule Based Systems, Ph D. diss., Departament of Managerial Studies, Case Westem Reserve University. Cleveland, Ohio, 1988.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038552&pid=S1405-5546200500020000200021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">22. <b>Nazareth D.L</b>., Kennedy M.H.: Static and dynamic verification, Validation and testing: The Evolution of a Discipline. Procedings of the AAA'90 on Knowledge&#150;Based Systems Validation, Verification and Testing, Boston, 1990.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038553&pid=S1405-5546200500020000200022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">23. <b>Barr V.B.:</b> Incorporating Uncertainty in a DAG&#150;Based Approach to Static and Dynamic Verification of Rule&#150;Based Systems. Proceedings of the AAAI'93 Workshop on Knowledge&#150;Based Systems Validation, Verification and testing, 1993, pp. 129&#150;130.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038554&pid=S1405-5546200500020000200023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">24. <b>Ramaswamy M., Sarkar S., and Chen Ye Sho:</b> Using directed hypergraphs to verify rule&#150;based expert systems. IEEE Transactions on Knowledgeand Data Engineering, vol. 9, No. 2, 1997, pp. 221&#150;237.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038555&pid=S1405-5546200500020000200024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">25. <b>Gursaran G. S., Kanungo S., and Sinha A. K.:</b> Rule&#150;base content verification using a digraph&#150;based modelling approach. Artificial Intelligence in Engineering, vol 13, No. 3, pp. 321&#150;336.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038556&pid=S1405-5546200500020000200025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">26. <b>de Antonio, A:</b> Sistema para la verificaci&oacute;n estructural y detecci&oacute;n de inconsistencias en Bases de Conocimientos, Trabajo Fin de Carrera, FIM, UPM, 1990.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038557&pid=S1405-5546200500020000200026&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">27. <b>Dahl M., and Williamson K.:</b> A verification Strategy for Long&#150;term Maintenance of Large Rule&#150;Based Systems. Workshop Notes of the AAAI'92 WorkShop on Verification and Validation of expert Systems, 1992.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038558&pid=S1405-5546200500020000200027&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">28. <b>Ayel M.:</b> Protocols for Consistency Checking in Expert System Knowledge Bases. Proceedings of the th. European Conference on Artificial Intelligence (ECAI'88) 1988, pp. 220&#150;225.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038559&pid=S1405-5546200500020000200028&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">29. <b>Ayel M.,</b> and Laurent J. P.: SACCO&#150;SYCOJET: Two Different Ways of Verifying Knowledged&#150;Based Systems. Validation, Verification and Test of Knowledge&#150;Based Systems: John Wiley Publishers, 1991, pp. 63&#150;76.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038560&pid=S1405-5546200500020000200029&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">30. <b>de Kleer J.:</b> An Assumption Based TMS. Artificial Intelligence vol. 28, No. 2, 1986, pp. 127&#150;162.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038561&pid=S1405-5546200500020000200030&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">31. <b>de Antonio, A:</b> Una interpretaci&oacute;n Algebraica de la Verificaci&oacute;n de Sistemas basados en el Conocimiento, Ph.D. diss, Facultad de Inform&aacute;tica, Universidad Polit&eacute;cnica de Madrid, 1994.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038562&pid=S1405-5546200500020000200031&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">32. <b>Laita L. M., Roanes&#150;Lozano E., Roanes&#150;Mac&iacute;as E., and D&iacute;az A.:</b> From Computer Algebra to Al. Application to Verification and Automated Proving in Multi Valued Logics Knowledge Systems. Proceedings of the SEKE&#150;97, 1997, pp. 295&#150;301.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038563&pid=S1405-5546200500020000200032&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">33. <b>Laita L. M., Roanes Lozano E., de Ledesma L, and Maojo V.:</b> Computer Algebra based Verification and knowledge extraction in RBS application to Medical Fitness criteria. Proceedings of the EUROVAD'99, 1999.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038564&pid=S1405-5546200500020000200033&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">34. <b>Antoniou, G.:</b> Verification and Correctness Issues for Nonmonotonic Knowledge Bases. International Journal of Intelligent Systems,Vol. 12, No. 10, 1997, pp. 725&#150;738.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038565&pid=S1405-5546200500020000200034&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">35. <b>Wu C. H., and Lee S. J.:</b> Knowledge Verification with an Enhanced High&#150;Level Petri&#150;Net Model. IEEE Expert, Sep/Oct, 1997, pp. 73&#150;80.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038566&pid=S1405-5546200500020000200035&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">36. <b>O'Leary D. E.:</b> Verification of uncertain knowledge based systems: an empirical verification approach. Management Science. Vol. 42, No. 12, 1996, pp. 1663&#150;1675.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038567&pid=S1405-5546200500020000200036&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">37. <b>Lee S., and O'Keefe R. M.:</b> Subsumption anomalies in hybrid knowledge based systems. Intemational Joumal of Expert Systems, Vol. 6, No. 3, 1993, pp. 299&#150;320.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038568&pid=S1405-5546200500020000200037&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">38. <b>Mukherjee R., Gamble R. F., and Parkinson J. A.:</b> Classifying and detecting anomalies in hybrid knowledge&#150;based systems. Decision&#150;Support&#150;Systems, Vol. 21, No. 4, 1997, pp. 231&#150;251.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038569&pid=S1405-5546200500020000200038&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">39. <b>Carde&ntilde;osa, J., and Juristo, N.:</b> General Overview of the Valid Project. Proceedings European Symposium on the Validation and Verification of Knowledge Based Systems, EUROVAV'93, 1993, pp. 53&#150;67.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038570&pid=S1405-5546200500020000200039&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">40. <b>VALID team, Deliverable D4:</b> VETA definition, in ESPRIT II 2148 VALID project, 1989.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038571&pid=S1405-5546200500020000200040&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">41. <b>VALID team, Deliverable D10:</b> Report on Valid Environment. ESPRIT II 2148 VALID project, 1990.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038572&pid=S1405-5546200500020000200041&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">42. <b>Mart&iacute;nez, L:</b> CCR2: Un Modelo Gen&eacute;rico de Representaci&oacute;n del Conocimiento. Trabajo Fin de Carrera, FIM, UPM, 1993.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2038573&pid=S1405-5546200500020000200042&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Plaza]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[KBS Validation: From Tools to Methodology]]></article-title>
<source><![CDATA[IEEE Expert]]></source>
<year>1993</year>
<volume>8</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>45-47</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hoppe]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Meseguer]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[VVT Terminology: A proposal]]></article-title>
<source><![CDATA[IEEE Expert]]></source>
<year>1993</year>
<volume>8</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>48-55</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Laurent]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Proposals for a valid terminology]]></article-title>
<source><![CDATA[KBS Validation: Proceedings ECAI 92]]></source>
<year>1992</year>
<page-range>829-834</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Adrion]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Validation, verification, and testing of computer software]]></article-title>
<source><![CDATA[ACM Computer Surveys]]></source>
<year>1982</year>
<volume>14</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>159-192</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="">
<collab>ANSI/IEEE Standard 729</collab>
<source><![CDATA[Standard Glossary of Software Engineering Terminology]]></source>
<year>1983</year>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suen]]></surname>
<given-names><![CDATA[Ch. Y]]></given-names>
</name>
<name>
<surname><![CDATA[Grogono]]></surname>
<given-names><![CDATA[P.D]]></given-names>
</name>
<name>
<surname><![CDATA[Shinghal]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Verifying, Validating, and Measuring the performance of Expert Systems]]></article-title>
<source><![CDATA[Expert Systems With Applications]]></source>
<year>1990</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>93-102</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Green]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Keyes]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Verification and Validation of expert systems]]></source>
<year>1987</year>
<conf-name><![CDATA[ Proceedings Western Conference on Expert Systems]]></conf-name>
<conf-loc> </conf-loc>
<page-range>38-43</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rousset]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[On the Consistency of Knowledge Bases: The COVADIS System]]></source>
<year>1988</year>
<page-range>79-84</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ginsberg]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Knowledge-Base Reduction: A New Approach to checking Knowledge Bases for Inconsistency and Redundancy]]></source>
<year>1988</year>
<page-range>585-589</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beauvieux]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Dague]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[A General Consistency (Checking and Restoring) Engine for Knowledge Bases]]></source>
<year>1990</year>
<page-range>77-82</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Loiseau]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Refinement of Knowledge Bases Based on Consisten y Proceedings ECAI 92]]></source>
<year>1992</year>
<page-range>845-849</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meseguer]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[lncremental Verification of Rule-Based Expert Systems]]></source>
<year>1992</year>
<page-range>840-844</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van Melle]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Shortliffe]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Buchanan]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[EMYCIN: A Knowledge Engineer's Tool for Constructing Rule-Based Systems. Rule-Based Expert Systems, Addison-Wesley]]></source>
<year>1984</year>
<page-range>301-313</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suwa]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Scott]]></surname>
<given-names><![CDATA[A.C]]></given-names>
</name>
<name>
<surname><![CDATA[Shortliffe]]></surname>
<given-names><![CDATA[E.H]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An approach to verifying completeness and consistency in a rule based expert system]]></article-title>
<source><![CDATA[Al Magazine]]></source>
<year>1982</year>
<numero>82</numero>
<issue>82</issue>
<page-range>16-21</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Steinmetz]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Theissen]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Integration of Petri Nets into a Tool for Consistency Checking of Expert Systems with Rule-Based Knowledge Representation: Proceedings 6th]]></source>
<year>1985</year>
<page-range>35-52</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Murata]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Matsuyama]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Inconsistency Check of a Set of Clauses Using Petri Net Reductions: EECS #86-12 Dept]]></source>
<year>1986</year>
<publisher-name><![CDATA[Universityof Illinois at Chicago]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meseguer]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[A New Method to checking Rule Bases for Inconsistency: A Petri Net Approach]]></source>
<year>1990</year>
<page-range>437-442</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Chu]]></surname>
<given-names><![CDATA[W. C]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[S. J. H]]></given-names>
</name>
</person-group>
<source><![CDATA[A New Approach to Verify Rule-Based Systems using Petri Nets]]></source>
<year>1999</year>
<conf-name><![CDATA[ Proceedings of the Twenty-Third Annual Intemational Computer Software and Applications Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>462-467</page-range><publisher-loc><![CDATA[Los Alamitos^eCA CA]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[T.A]]></given-names>
</name>
<name>
<surname><![CDATA[Perkins]]></surname>
<given-names><![CDATA[W.A]]></given-names>
</name>
<name>
<surname><![CDATA[Pecora]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Knowledge Base Verification]]></article-title>
<source><![CDATA[Al Magazine]]></source>
<year>1987</year>
<volume>8</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>69-75</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[T.A]]></given-names>
</name>
</person-group>
<source><![CDATA[erifying Consistency of Production Systems]]></source>
<year>1987</year>
<conf-name><![CDATA[ Proceedings of the 3rd. conference on Artificial Intelligence Aplications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>4-8</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nazareth]]></surname>
<given-names><![CDATA[D.L]]></given-names>
</name>
</person-group>
<source><![CDATA[An Analysis of Techniques for Verification of Lodical Correctness in Rule Based Systems, Ph D. diss.]]></source>
<year>1988</year>
<publisher-loc><![CDATA[Cleveland^eOhio Ohio]]></publisher-loc>
<publisher-name><![CDATA[Departament of Managerial Studies, Case Westem Reserve University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nazareth]]></surname>
<given-names><![CDATA[D.L]]></given-names>
</name>
<name>
<surname><![CDATA[Kennedy]]></surname>
<given-names><![CDATA[M.H]]></given-names>
</name>
</person-group>
<source><![CDATA[Static and dynamic verification, Validation and testing: he Evolution of a Discipline. Procedings of the AAA'90 on Knowledge-Based Systems Validation, Verification and Testing]]></source>
<year>1990</year>
<publisher-loc><![CDATA[Boston ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barr]]></surname>
<given-names><![CDATA[V.B]]></given-names>
</name>
</person-group>
<source><![CDATA[Incorporating Uncertainty in a DAG-Based Approach to Static and Dynamic Verification of Rule-Based Systems: Proceedings of the AAAI'93 Workshop on Knowledge-Based Systems Validation, Verification and testing]]></source>
<year>1993</year>
<page-range>129-130</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramaswamy]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Chen Ye]]></surname>
<given-names><![CDATA[Sho]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Using directed hypergraphs to verify rule-based expert systems]]></article-title>
<source><![CDATA[IEEE Transactions on Knowledgeand Data Engineering]]></source>
<year>1997</year>
<volume>9</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>221-237</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gursaran]]></surname>
<given-names><![CDATA[G. S]]></given-names>
</name>
<name>
<surname><![CDATA[Kanungo]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Sinha]]></surname>
<given-names><![CDATA[A. K]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Rule-base content verification using a digraph-based modelling approach]]></article-title>
<source><![CDATA[Artificial Intelligence in Engineering]]></source>
<year></year>
<volume>13</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>321-336</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[de Antonio]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Sistema para la verificación estructural y detección de inconsistencias en Bases de Conocimientos]]></source>
<year>1990</year>
<publisher-name><![CDATA[FIM, UPM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dahl]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Williamson]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[A verification Strategy for Long-term Maintenance of Large Rule-Based Systems: Workshop Notes of the AAAI'92 WorkShop on Verification and Validation of expert Systems]]></source>
<year>1992</year>
</nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ayel]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Protocols for Consistency Checking in Expert System Knowledge Bases]]></source>
<year>1988</year>
<conf-name><![CDATA[ Proceedings of the th. European Conference on Artificial Intelligence (ECAI'88)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>220-225</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ayel]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Laurent]]></surname>
<given-names><![CDATA[J. P]]></given-names>
</name>
</person-group>
<source><![CDATA[SACCO-SYCOJET: Two Different Ways of Verifying Knowledged-Based Systems. Validation, Verification and Test of Knowledge-Based Systems]]></source>
<year>1991</year>
<page-range>63-76</page-range><publisher-name><![CDATA[John Wiley Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[de Kleer]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An Assumption Based TMS]]></article-title>
<source><![CDATA[Artificial Intelligence]]></source>
<year>1986</year>
<volume>28</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>127-162</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[de Antonio]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Una interpretación Algebraica de la Verificación de Sistemas basados en el Conocimiento]]></source>
<year>1994</year>
<publisher-name><![CDATA[Facultad de Informática, Universidad Politécnica de Madrid]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Laita]]></surname>
<given-names><![CDATA[L. M]]></given-names>
</name>
<name>
<surname><![CDATA[Roanes-Lozano]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Roanes-Macías]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Díaz]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[From Computer Algebra to Al. Application to Verification and Automated Proving in Multi Valued Logics Knowledge Systems: Proceedings of the SEKE-97]]></source>
<year>1997</year>
<page-range>295-301</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Laita]]></surname>
<given-names><![CDATA[L. M]]></given-names>
</name>
<name>
<surname><![CDATA[Roanes Lozano]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[de Ledesma]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Maojo]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer Algebra based Verification and knowledge extraction in RBS application to Medical Fitness criteria: Proceedings of the EUROVAD'99]]></source>
<year>1999</year>
</nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Antoniou]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Verification and Correctness Issues for Nonmonotonic Knowledge Bases]]></article-title>
<source><![CDATA[International Journal of Intelligent Systems]]></source>
<year>1997</year>
<volume>12</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>725-738</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[C. H]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[S. J]]></given-names>
</name>
</person-group>
<source><![CDATA[Knowledge Verification with an Enhanced High-Level Petri-Net Model: IEEE Expert]]></source>
<year>1997</year>
<page-range>73-80</page-range></nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[O'Leary]]></surname>
<given-names><![CDATA[D. E]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Verification of uncertain knowledge based systems: an empirical verification approach]]></article-title>
<source><![CDATA[Management Science]]></source>
<year>1996</year>
<volume>42</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>1663-1675</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[O'Keefe]]></surname>
<given-names><![CDATA[R. M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Subsumption anomalies in hybrid knowledge based systems]]></article-title>
<source><![CDATA[Intemational Joumal of Expert Systems]]></source>
<year>1993</year>
<volume>6</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>299-320</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mukherjee]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Gamble]]></surname>
<given-names><![CDATA[R. F]]></given-names>
</name>
<name>
<surname><![CDATA[Parkinson]]></surname>
<given-names><![CDATA[J. A]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[lassifying and detecting anomalies in hybrid knowledge-based systems]]></article-title>
<source><![CDATA[Decision-Support-Systems]]></source>
<year>1997</year>
<volume>21</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>231-251</page-range></nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cardeñosa]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Juristo]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[General Overview of the Valid Project: Proceedings European Symposium on the Validation and Verification of Knowledge Based Systems, EUROVAV'93]]></source>
<year>1993</year>
<page-range>53-67</page-range></nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="">
<collab>VALID team, Deliverable D4</collab>
<source><![CDATA[VETA definition, in ESPRIT II 2148 VALID project]]></source>
<year>1989</year>
</nlm-citation>
</ref>
<ref id="B41">
<label>41</label><nlm-citation citation-type="">
<collab>VALID team, Deliverable D10</collab>
<source><![CDATA[Report on Valid Environment: ESPRIT II 2148 VALID project]]></source>
<year>1990</year>
</nlm-citation>
</ref>
<ref id="B42">
<label>42</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martínez]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[CCR2: Un Modelo Genérico de Representación del Conocimiento]]></source>
<year>1993</year>
<publisher-name><![CDATA[FIM, UPM]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
