Rodney William Topor

Rodney William Topor
Griffith University · School of Information and Communication Technology (ICT)

About

100
Publications
4,419
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,467
Citations

Publications

Publications (100)
Article
Ontology engineering and maintenance require (semi-)automated ontology change operations. Intensive research has been conducted on TBox and ABox changes in description logics (DLs), and various change operators have been proposed in the literature. Existing operators largely fall into two categories: syntaxbased and model-based.While each approach...
Article
Forgetting is an important tool for reducing ontologies by eliminating some redundant concepts and roles while preserving sound and complete reasoning. Attempts have previously been made to address the problem of forgetting in relatively simple description logics (DLs), such as DL-Lite and extended . However, the issue of forgetting for ontologies...
Conference Paper
In this study, we investigate and present a new index structure, Triangular Decomposition Tree (TD-tree), which can efficiently store and query temporal data in modern database applications. TD-tree is based on spatial representation of interval data and a recursive triangular decomposition of this space. A bounded number of intervals are stored in...
Article
Full-text available
The need for efficient access and management of time dependent data in modern database applications is well recognised and researched. Existing access methods are mostly derived from the family of spatial R-tree indexing techniques. These techniques are particularly not suitable to handle data involving open ended intervals, which are common in tem...
Conference Paper
Revising knowledge bases (KBs) in description logics (DLs) in a syntax-independent manner is an important and nontrivial problem for ontology management and DL communities. Several attempts have been made to adapt classical modelbased belief revision/update techniques to DLs, but they are restricted in several ways. In particular, they rarely inves...
Article
In this paper, we propose two new approaches to forgetting for [Ascr ][Lscr ][Cscr ] based on the well-known tableau algorithm. The first approach computes the result of forgetting by rolling up tableaux, and also provides a decision algorithm for the existence of forgetting in [Ascr ][Lscr ][Cscr ]. When the result of forgetting does not exist, we...
Article
Revising knowledge bases (KBs) in description logics (DLs) in a syntax-independent manner is an important, nontrivial problem for the ontology management and DL communities. Several attempts have been made to adapt classical modelbased belief revision and update techniques to DLs, but they are restricted in several ways. In particular, they do not...
Conference Paper
Temporal and spatio-temporal data are present in many modern application systems, including monitoring moving objects. Such systems produce enormous volume of data, and therefore efficient indexing method is crucial. In this paper, we investigate and present a new concept based on virtual index structure, which can efficiently query such data. Conc...
Article
Revising knowledge bases (KBs) in description logics (DLs) in a syntax-independent manner is an important, nontrivial problem for the ontology management and DL communities. Several attempts have been made to adapt classical model-based belief revision and update techniques to DLs, but they are restricted in several ways. In particular, they do not...
Article
To support the reuse and combination of ontologies in Semantic Web applications, it is often necessary to obtain smaller ontologies from existing larger ontologies. In particular, applications may require the omission of certain terms, e. g., concept names and role names, from an ontology. However, the task of omitting terms from an ontology is cha...
Conference Paper
The notion of uniform interpolation for description logic ALC\mathcal{ALC} has been introduced in [9]. In this paper, we reformulate the uniform interpolation for ALC\mathcal{ALC} from the angle of forgetting and show that it satisfies all desired properties of forgetting. Then we introduce an algorithm for computing the result of forgetting in con...
Conference Paper
Forgetting is an important tool for reducing ontologies by eliminating some concepts and roles while preserving sound and complete reasoning. Attempts have previously been made to address the problem of forgetting in relatively simple description logics (DLs) such as DL-Lite and extended \({\mathcal {EL}}\). The ontologies used in these attempts we...
Conference Paper
We address the revision problem for knowledge bases (KBs) in Description Logics (DLs). This problem has received much attention in the ontology management and DL communities, but the existing proposals are restricted in several ways. In this paper we develop a formal framework for revision of DL-Lite KBs, using techniques that are analogous to thos...
Conference Paper
To support the reuse and combination of ontologies in Semantic Web applications, it is often necessary to obtain smaller ontologies from existing larger ontologies. In particular, applications may require the omission of many terms, e.g., concept names and role names, from an ontology. However, the task of omit- ting terms from an ontology is chall...
Conference Paper
Full-text available
With the increasing number of ontologies available on the web, the problem of merging ontologies from different sources to interoperate applications becomes important. This paper presents a novel approach for merging of light-weight ontologies based on answer set programming (ASP) and linguistic background knowledge. ASP provides a declarative exec...
Conference Paper
Full-text available
With the increasing number of ontologies available on the web, the problem of merging ontologies from different sources to interoperate applications becomes important. This paper presents a novel approach for merging of light-weight ontologies based on answer set programming (ASP) and linguistic background knowledge. ASP provides a declarative exec...
Article
Full-text available
Several proposals have been put forward to support distributed agent cooperation in the Semantic Web, by allowing concepts and roles in one ontology be reused in another ontology. In general, these proposals reduce the autonomy of each ontology by defining the semantics of the ontology to depend on the semantics of the other ontologies. We propose...
Conference Paper
In this paper, we propose a new heuristic algorithm called the QIBC algorithm that improves the privacy of sensitive knowledge (as itemsets) by blocking more inference channels. We show that the existing sanitizing algorithms for such task have fundamental drawbacks. We show that previous methods remove more knowledge than necessary for unjustified...
Chapter
We extend the concept of domain independence from queries and databases to disjunctive databases. Informally, a domain independent disjunctive database is one for which the set of correct answers to any domain independent query is independent of the domains of variables in the database statements. We prove that every allowed stratified disjunctive...
Conference Paper
The language of dl-programs is a latest effort in developing an expressive representation for Web-based ontologies. It allows to build answer set programming (ASP) on top of description logic and thus some attractive features of ASP can be employed in the design of the Semantic Web architecture. In this paper we first generalize dl-programs by allo...
Article
The problem of finding contained rewritings of queries using views is of great importance in mediated data integration systems. In this paper, we first present a general approach for finding contained rewritings of unions of conjunctive queries with arbitrary built-in predicates. Our approach is based on an improved method for testing conjunctive q...
Article
We study the design issues of data-centric XML documents where (1) there are no mixed contents, i.e., each element may have some subelements and attributes, or it may have a single value in the form of a character string, but not a mixture of strings and subelements and/or attributes, (2) the ordering of subelements is of no significance. We provid...
Article
Full-text available
Mining transaction databases for association rules usually generates a large number of rules, most of which are unnecessary when used for subsequent prediction. In this paper we define a rule set for a given transaction database that is much smaller than the association rule set but makes the same predictions as the association rule set by the conf...
Article
Full-text available
Health informatics is increasingly of interest due to its potential in making our health care systems safer. The term 'health or medical informatics' refers to the “application of information technologies to optimise information management within all aspects of health care delivery". A research project has been initiated to explore the effectivenes...
Article
We define an optimal class association rule set to be the minimum rule set with the same predictive power of the complete class association rule set. Using this rule set instead of the complete class association rule set we can avoid redundant computation that would otherwise be required for mining predictive association rules and hence improve the...
Article
This paper presents an efficient linear-time sequential algorithm for constructing Hamiltonian paths between two given vertices in meshes with horizontal size m and vertical size n. The algorithm first partitions the given mesh into a number of submeshes in constant steps, and then constructs a Hamiltonian cycle or path in each submesh and combines...
Article
We present four efficient parallel algorithms for computing a nonequijoin, called range-join, of two relations on N-dimensional mesh-connected computers. Range-joins of relations R and S are an important generalization of conventional equijoins and band-joins and are solved by permutation-based approaches in all proposed algorithms. In general, aft...
Conference Paper
Full-text available
The problem of finding contained rewritings of queries using views is of great importance in mediated data integration systems. In this paper, we first present a general approach for finding contained rewritings of unions of conjunctive queries with arbitrary built-in predicates. Our approach is based on an improved method for testing conjunctive q...
Article
The problem of rewriting queries using views has important applications in data integration, query optimization, and physical data independence maintenance. Previous researchers have proposed rewriting algorithms for queries and views that are Datalog programs or conjunctive queries with arithmetic comparisons such as x < y and y 10. We present a m...
Conference Paper
Full-text available
We study the problem of computing classification rule sets from relational databases so that accurate predictions can be made on test data with missing attribute values. Traditional classifiers perform badly when test data are not as complete as the training data because they tailor a training database too much. We introduce the concept of one rule...
Article
Full-text available
Mining transaction databases for association rules usually generates a large number of rules, most of which are unnecessary when used for subsequent prediction. In this paper we define a rule set for a given transaction database that is much smaller than the association rule set but makes the same predictions as the association rule set by the conf...
Conference Paper
. In extended relational databases, queries and integrity constraints often contain interpreted variables and built-in relations. We extend previous work on semantic query containment for extended relational databases to handle disjunctive constrained tuple-generating dependencies (DCTGDs) which include almost all well-known classes of integrity co...
Conference Paper
In this paper, we present two efficient parallel algorithms for computing a non-equijoin, range-join, of two relations an N-dimensional mesh-connected computers. The proposed algorithms uses the data-shifting approach to effectively permute every sorted subset of relation S to each processor in turn recursively in dimensions from low to high, where...
Conference Paper
We define an optimal class association rule set to be the minimum rule set with the same predictive power of the complete class association rule set. Using this rule set instead of the complete class association rule set we can avoid redundant computation that would otherwise be required for mining predictive association rules and hence improve the...
Conference Paper
Mining transaction databases for association rules usually generates a large number of rules, most of which are unnecessary when used for subsequent prediction. In this paper we define a rule set for a given transaction database that is much smaller than the association rule set but makes the same predictions as the association rule set by the conf...
Conference Paper
Mining quantitative association rules is an important topic of data mining since most real world databases have both numerical and categorical attributes. Typical solutions involve partitioning each numerical attribute into a set of disjoint intervals, interpreting each interval as an item, and applying standard boolean association rule mining. Com...
Article
We present global and local algorithms for generating traversals of arbitrary trees with the property that the maximum number of edges between successive nodes in any traversal is three, and that this is the best possible result. We describe the application of such traversals to parallel computing. Keywords Algorithms, concurrent tree traversal, in...
Article
Full-text available
We describe the relationship between inheritance with overriding in an object-oriented database language, Gulog, and negation. We present a translation from Gulog programs to Datalog programs with negation and show that evaluating queries in the translation yields correct answers with respect to the original program. Keywords: object-oriented, inhe...
Article
Full-text available
. In object-oriented languages, multiple inheritance can cause ambiguities when methods of the same name are inherited from more than one superclass of a given class. In C++, qualifiers can be used to explicitly state which method should be inherited. We describe a mathematical foundation for an object-oriented language that uses qualifiers or role...
Article
Full-text available
We present a simple model for deductive objectoriented systems with inheritance and overriding. In this model we define a declarative semantics based on preferred minimal models, we present bottom-up and top-down procedures for query evaluation, and we note that these procedures are sound with respect to the declarative semantics. 1 Introduction Th...
Article
This paper proposes a parallel algorithm to compute the range-join of two relations on N -dimensional torus computers. The algorithm efficiently permutes all subsets of one relation to each processor in turn, where they are joined with the subset of the other relation at that processor using a local range-join algorithm. The analysis shows that the...
Article
This paper presents an efficient parallel algorithm for computing the mutual range-join of N sets of data on shared-nothing hypercube computers. The algorithm repeatedly joins each set to the join result of the preceding sets. Each join is performed on all processors of the hypercube in parallel. The algorithm efficiently partitions the first set e...
Article
this paper, we analyse and compare the performance of two extreme forms of pipeline parallelism, assuming a limited amount of main memory available on a distributed shared memory computer. We show how to construct an intermediate form of pipeline parallelism that fully exploits the available main memory to achieve better performance than either ext...
Article
We present a simple algorithm for constructing Hamiltonian cycles on trees together with additional edges between leaves, compute the number of such additional edges required for complete k-ary trees of given depth, show this number is minimal over all Hamiltonian cycles, and present an algorithm that determines the successor of each node in the cy...
Article
This paper presents an improved parallel hash-based join algorithm on a hypercube computer in the presence of double skew. We describe a load balancing technique to evenly distribute both join relations across all processors in order to deal with double skew effectively. Moreover, we propose a permutation join method which reduces main memory requi...
Conference Paper
This paper presents an efficient parallel algorithm for computing the mutual range-join of N sets of numbers on shared-nothing hypercube computers. The algorithm iteratively joins each set to the mutual range-join of the preceding sets. Each join is performed on all processors of the hypercube in parallel. The algorithm uses a global sorting method...
Article
This paper proposes three efficient parallel algorithms for computing the range-join of two relations on a two-dimensional n Theta m mesh-connected computer, where n and m are the numbers of the rows and columns respectively. The proposed algorithms sort all subsets of both relations, and then efficiently permute all sorted subsets of one relation...
Article
This paper presents an efficient parallel algorithm for computing the mutual range-join of N sets of numbers on shared-nothing hypercube computers. The algorithm iteratively joins each set to the mutual range-join of the preceding sets. Each join is performed on all processors of the hypercube in parallel. The algorithm uses a global sorting method...
Conference Paper
We extend our previous mathematical foundation for a deductive object-oriented language called Gulog to include arithmetic and aggregate operators. We describe the semantics of the extended language and present a corresponding query evaluation procedure.
Article
This paper proposes three efficient parallel algorithms for computing the range-join of two relations on two-dimensional n x m mesh-connected computers, where n and m are the numbers of the rows and columns respectively. After sorting all subsets of both relations, all proposed algorithms permute all sorted subsets of one relation to each processor...
Article
Full-text available
We consider the problem of repeatedly evaluating the same (computationally expensive) query to a database that is being updated between successive query requests. In this situation, it should be possible to use the difference between successive database states and the answer to the query in one state to reduce the cost of evaluating the query in th...
Article
Full-text available
We consider the problem of repeatedly evaluating the same (computationally expensive) query to a database that is being updated between successive query requests. In this situation, it should be possible to use the difference between successive database states and the answer to the query in one state to reduce the cost of evaluating the query in th...
Article
We consider the theory of database queries on a relational data model that includes a set of fixed relations used to model arithmetic comparisons and operations. We describe how to extend several natural query languages such as first-order logic, Datalog, and stratified Datalog to apply to databases in this model, and show that their relative expre...
Article
Object-oriented database systems provide expressive power and the potential for reuse, extensibility and modifiability. Relational and deductive database systems provide a simple logical semantics and the ability to represent complex derived information. Many proposals have been made for database systems that offer both sets of features, and some c...
Article
Full-text available
We present declarative and procedural semantics for a deductive object-oriented language, Gulog. The declarative semantics is based on preferred minimal models. We describe both bottom-up and top-down query evaluation procedures and show that they are sound with respect to the declarative semantics. The results contribute to our understanding of th...
Article
This paper proposes a parallel algorithm to compute the range-join of two relations on N-dimensional torus computers. The algorithm efficiently permutes all subsets of one relation to each processor in turn, where they are joined with the subset of the other relation at that processor using a local range-join algorithm. The analysis shows that the...
Conference Paper
Full-text available
We present a proposed query language for extended entity relationship schemas. The language improves on previous proposals by using only concepts explicitly in a given schema. It includes quantiers and aggregates to allow complex queries to be expressed, and it allows derived subtypes, attributes and relation- ships to be dened and used in queries....
Conference Paper
We consider the addition of set-valued methods and multiple inheritance to a simple deductive object-oriented language we defined and studied previously. We show how the previously defined declarative semantics can be extended to provide a natural semantics for inheritance and overriding in this more general setting, and similarly extend our previo...
Article
We consider the theory of database queries on a relational data model that includes a set of fixed relations used to model arithmetic comparisons and operations. We describe how to extend several natural query languages such as first-order logic, Datalog, and stratified Datalog to to apply to databases in this model, and show that their relative ex...
Conference Paper
Full-text available
We present a procedure for deriving the weakest precondition for a data- base update and an integrity constraint. We show how to simplify the weak- est precondition to produce a condition to be evaluated before the update is performed. This provides an ecient means to ensure that database updates maintain integrity constraints.
Article
Not all queries in relational calculus can be answered sensibly when disjunction, negation, and universal quantification are allowed. The class of relation calculus queries or formulas that have sensible answers is called the domain independent class which is known to be undecidable. Subsequent research has focused on identifying large decidable su...
Article
Not all queries in relational calculus can be answered sensibly when disjunction, negation, and universal quantification are allowed. The class of relation calculus queries or formulas that have sensible answers is called the domain independent class which is known to be undecidable. Subsequent research has focused on identifying large decidable su...
Article
We introduce and study the concept of domain independence to characterize the class of reasonable databases. A domain independent database is one for which the set of correct answers to an atomic query is independent of the domains of variables in the database statements. In particular, we prove that every “allowed” stratified database is domain in...
Article
We propose criteria that any rule for inferring negative information from disjunctive databases should satisfy, and examine existing rules from this viewpoint. We then present a new inference rule, the ‘disjunctive database rule’ (DDR), and compare it to the existing rules with respect to the criteria. In particular, the DDR is equivalent to the CW...
Article
We prove the correctness of a simplification method for checking static integrity constraints in stratified deductive databases.
Article
This paper studies the class of deductive databases for which the result of query evaluation is independent of the domains of variables in database clauses. We first describe the class of domain-independent formulas in proof-theoretic terms. A new recursive subclass of ‘allowed’ formulas is defined and its properties studied. It is shown that every...
Conference Paper
Not all queries in relational calculus can be answered “sensibly” once disjunction, negation, and universal quantification are allowed. The class of relational calculus queries, or formulas, that have “sensible” answers is called the domain independent class, which is known to be undecidable. Subsequent research has focused on identifying large dec...
Article
This paper is the third in a series providing a theoretical basis for deductive database systems. A deductive database consists of closed typed first order logic formulas of the form A ← W, where A is an atom and W is a typed first order formula. A typed first order formula can be used as a query, and a closed typed first order formula can be used...
Article
This paper provides a theoritical basis for deductive database systems. A deductive database consists of closed typed first order logic formulas of the form A ← W, where A is an atom and W is a typed first order formula. A typed first order formula can be used as a query, and a closed typed first order formula can be used as an integrity constraint...
Article
This paper introduces extended programs and extended goals for logic programming. A clause in an extended program can have an arbitrary first-order formula as its body. Similarly, an extended goal can have an arbitrary first-order formula as its body. The main results of the paper are the soundness of the negation as failure rule and SLDNF-resoluti...
Article
A simple derivation of a general solution to the problem of detecting the termination of a distributed computation is presented.
Article
Previous algorithms presented to solve the eight queens problem have generated the set of all solutions. Many of these solutions are identical after applying sequences of rotations and reflections. In this paper we present a simple, clear, efficient algorithm to generate a set of fundamental (or distinct) solutions to the problem.
Article
Several functional programs for generating permutations represented as linear linked lists are presented. Exact formulas for the storage used by some of these programs are derived and compared with the theoretical lower bound. Two different programs are shown to be optimal with respect to this measure. Problems considered include generation of all...
Article
Parameter passing mechanisms are developed for optional, repeatable, and varying type parameters. For optional parameters, a programmer-defined default value is passed when the actual parameter is not present; in addition, the called procedure may determine ...
Article
This paper presents a relatively simple proof of a nontrivial algorithm for marking all the nodes of a list structure. The proof separates properties of the algorithm from properties of the data on which it operates and is a significant application of the method of intermittent assertions.
Article
This thesis is concerned with ways of proving the correctness of computer programs. The first part of the thesis presents a new method for doing this. The method, called continuation induction, is based on the ideas of symbolic execution, the description of a given program by a virtual program, and the demonstration that these two programs are equi...
Conference Paper
We consider the problem of repeatedly evaluating the same (computationally expensive) query to a database that is being updated between successive query requests. In this situation, it should be possible to use the difference between successive database states and the answer to the query in one state to reduce the cost of evaluating the query in th...
Article
Full-text available
We propose a framework for heterogeneous multi-context systems, in which a special kind of semantic/implicit bridge rules are introduced. Traditional bridge rules in heterogeneous multi-context systems may make the syntax and the semantics of a context more complex, e.g., in the approach of [3] an agent may have to facing a context composed by a de...
Article
Forgetting is a useful tool for tailoring ontologies by reducing the number of concepts and roles, while preserving sound and complete reasoning. Some attempts have been made to address the problem of forgetting in some relatively simple description logics (DLs) such as DL-Lite and extended EL . Ontologies in those works are mostly expressed as TBo...

Network

Cited By