{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T10:33:50Z","timestamp":1649154830337},"reference-count":40,"publisher":"Cambridge University Press (CUP)","issue":"1","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AIEDAM"],"published-print":{"date-parts":[[2015,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Reuse has long been a major goal of the knowledge engineering community. We present a case study of the reuse of constraint knowledge acquired for one problem solver, by two further problem solvers. For our analysis, we chose a well-known benchmark knowledge base (KB) system written in CLIPS, which was based on the propose and revise problem-solving method and which had a lift\/elevator KB. The KB contained four components, including constraints and data tables, expressed in an ontology that reflects the propose and revise task structure. Sufficient trial data was extracted manually to demonstrate the approach on two alternative problem solvers: a spreadsheet (Excel) and a constraint logic solver (ECLiPSe). The next phase was to implement ExtrAKTor, which automated the process for the whole KB. Each KB that is processed results in a working system that is able to solve the corresponding configuration task (and not only for elevators). This is in contrast to earlier work, which produced abstract formulations of the problem-solving methods but which were unable to perform reuse of actual KBs. We subsequently used the ECLiPSe solver on some more demanding vertical transport configuration tasks. We found that we had to use a little-known propagation technique described by Le Provost and Wallace (1991). Further, our techniques did not use any heuristic \u201cfix\u201d\u2019 information, yet we successfully dealt with a \u201cthrashing\u201d problem that had been a key issue in the original vertical transit work. Consequently, we believe we have developed a widely usable approach for solving this class of parametric design problem, by applying novel constraint-based problem solvers to data and formulae stored in existing KBs.<\/jats:p>","DOI":"10.1017\/s0890060414000134","type":"journal-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T12:35:11Z","timestamp":1396355711000},"page":"1-18","source":"Crossref","is-referenced-by-count":3,"title":["Reuse of constraint knowledge bases and problem solvers explored in engineering design"],"prefix":"10.1017","volume":"29","author":[{"given":"Peter M.D.","family":"Gray","sequence":"first","affiliation":[]},{"given":"Trevor","family":"Runcie","sequence":"additional","affiliation":[]},{"given":"Derek","family":"Sleeman","sequence":"additional","affiliation":[]}],"member":"56","published-online":{"date-parts":[[2014,4,1]]},"reference":[{"key":"S0890060414000134_ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13520-0_22"},{"key":"S0890060414000134_ref25","unstructured":"Menzies T. (1998). Evaluation issues for problem solving methods. Proc. Knowledge Acquisition Workshop \u201998, Banff, Canada."},{"key":"S0890060414000134_ref30","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1996.0017"},{"key":"S0890060414000134_ref3","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1996.0022"},{"key":"S0890060414000134_ref6","doi-asserted-by":"crossref","unstructured":"Corsar D. , & Sleeman D. (2007). KBS development through ontology mapping and ontology driven acquisition. Proc. 4th Int. Conf. Knowledge Capture. New York: ACM.","DOI":"10.1145\/1298406.1298412"},{"key":"S0890060414000134_ref2","volume-title":"Constraint Logic Programming Using ECLiPSe","author":"Apt","year":"2007"},{"key":"S0890060414000134_ref26","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1996.0018"},{"key":"S0890060414000134_ref32","first-page":"105","volume-title":"Research and Development in Intelligent Systems XXV, Proc. AI-2008","author":"Runcie","year":"2008"},{"key":"S0890060414000134_ref34","unstructured":"Schreiber G. , Wielinga B. , De Hoog R. , Van de Velde W. , & Anjewierden A. (1994). CML: the Common KADS conceptual modeling language. Proc. EKAW94, Lecture Notes in Computer Science, Vol. 867, pp. 1\u201325. Berlin: Springer."},{"key":"S0890060414000134_ref10","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060410000569"},{"key":"S0890060414000134_ref1","doi-asserted-by":"publisher","DOI":"10.1017\/S089006040800022X"},{"key":"S0890060414000134_ref13","unstructured":"Graner N. , & Sleeman D. (1993). MUSKRAT: a multistrategy knowledge refinement and acquisition toolbox. Proc. 2nd Int. Workshop on Multistrategy Learning, pp. 107\u2013119."},{"key":"S0890060414000134_ref7","unstructured":"ECLiPSe (2010). The ECLiPSe constraint programming system home page. Accessed at http:\/\/eclipseclp.org\/ and http:\/\/www.sourceforge.net\/projects\/eclipse-clp on December 20, 2013."},{"key":"S0890060414000134_ref28","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060402164043"},{"key":"S0890060414000134_ref39","unstructured":"Yost G.R. (1994). Sisyphus 1993\u2014Configuring Elevator Systems, Technical Report. SMI."},{"key":"S0890060414000134_ref40","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1996.0016"},{"key":"S0890060414000134_ref9","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060403171041"},{"key":"S0890060414000134_ref16","volume-title":"Building Expert Systems","author":"Hayes-Roth","year":"1983"},{"key":"S0890060414000134_ref38","volume-title":"Constraint Satisfaction in Logic Programming","author":"Van Hentenryck","year":"1989"},{"key":"S0890060414000134_ref21","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060498121133"},{"key":"S0890060414000134_ref8","doi-asserted-by":"crossref","unstructured":"Embury S.M. , & Gray P.M.D. (1995). Planning complex updates to satisfy constraint rules using a constraint logic search engine. Proc. RIDS \u201995 2nd Int. Workshop on Rules in Database Systems, Lecture Notes in Computer Science, Vol. 985, pp. 230\u2013244. New York: Springer\u2013Verlag.","DOI":"10.1007\/3-540-60365-4_130"},{"key":"S0890060414000134_ref14","doi-asserted-by":"crossref","unstructured":"Gray P.M.D. , & Kemp G.J.L. (2006). Capturing quantified constraints in FOL, through interaction with a relationship graph. Proc. EKAW 2006, Podebrady, Lecture Notes in Artificial Intelligence, Vol. 4248, pp. 19\u201326. New York: Springer\u2013Verlag.","DOI":"10.1007\/11891451_4"},{"key":"S0890060414000134_ref11","unstructured":"Fensel D. , & Motta E. (1998). Structured development of problem solving methods. Proc. 11th Knowledge Acquisition for Knowledge-Based Systems Workshop, Banff, Canada."},{"key":"S0890060414000134_ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10601-008-9047-y"},{"key":"S0890060414000134_ref27","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060409990047"},{"key":"S0890060414000134_ref23","doi-asserted-by":"crossref","unstructured":"Martin J. , Martinez T. , & Fages F. (2011). Procedural code generation vs static expansion in modelling languages for constraint programming. Recent Advances in Constraints, Lecture Notes in Artificial Intelligence, Vol. 6384, pp. 38\u201358. Springer\u2013Verlag","DOI":"10.1007\/978-3-642-19486-3_3"},{"key":"S0890060414000134_ref15","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060410000636"},{"key":"S0890060414000134_ref29","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1996.0021"},{"key":"S0890060414000134_ref18","doi-asserted-by":"crossref","unstructured":"Hui K. , & Gray P.M.D. (2000). Developing finite domain constraints\u2014a data model approach. Proc. Computational Logic\u2014CL 2000, pp. 448\u2013462. London: Springer.","DOI":"10.1007\/3-540-44957-4_30"},{"key":"S0890060414000134_ref31","unstructured":"Runcie T. (2008). Reuse of knowledge bases and problem solvers explored in the VT domain. PhD Thesis, University of Aberdeen, Department of Computing Science."},{"key":"S0890060414000134_ref5","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060409990023"},{"key":"S0890060414000134_ref33","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1996.0015"},{"key":"S0890060414000134_ref4","volume-title":"The CommonKADS Library for Expertise Modeling","author":"Breuker","year":"1994"},{"key":"S0890060414000134_ref22","first-page":"95","article-title":"VT: an expert designer that uses knowledge-based backtracking","volume":"8","author":"Marcus","year":"1988","journal-title":"AI Magazine"},{"key":"S0890060414000134_ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(93)90047-K"},{"key":"S0890060414000134_ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-7122-9_8"},{"key":"S0890060414000134_ref36","unstructured":"SMI. (2003). elvis [Computer software]. Accessed at http:\/\/protege.stanford.edu\/plugins\/psmtab\/psmtab_download.html"},{"key":"S0890060414000134_ref35","doi-asserted-by":"crossref","unstructured":"Sleeman D. , Runcie T. , & Gray P.M.D. (2006). Reuse: revisiting Sisyphus-VT. Proc. Managing Knowledge in a World of Networks, EKAW 2006, Podebrady, Lecture Notes in Artificial Intelligence, Vol. 4248, pp. 59\u201366. New York: Springer.","DOI":"10.1007\/11891451_9"},{"key":"S0890060414000134_ref19","unstructured":"ICPARC. (2003). ECLIPSE constraint library manual, Imperial College London. Accessed at http:\/\/eclipseclp.org\/doc\/libman\/index.html on December 20, 2013."},{"key":"S0890060414000134_ref37","unstructured":"SMI. (2010). PSMTab [Computer software]. Accessed at http:\/\/protege.stanford.edu\/plugins\/psmtab\/PSMTab.html"}],"container-title":["Artificial Intelligence for Engineering Design, Analysis and Manufacturing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/S0890060414000134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T03:35:37Z","timestamp":1565321737000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/S0890060414000134\/type\/journal_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,2]]}},"alternative-id":["S0890060414000134"],"URL":"https:\/\/doi.org\/10.1017\/s0890060414000134","relation":{},"ISSN":["0890-0604","1469-1760"],"issn-type":[{"value":"0890-0604","type":"print"},{"value":"1469-1760","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}