• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Sun Xuejiao and Liu Jinglei. On the Satisfiability and Consistency for CP-nets[J]. Journal of Computer Research and Development, 2012, 49(4): 754-762.
Citation: Sun Xuejiao and Liu Jinglei. On the Satisfiability and Consistency for CP-nets[J]. Journal of Computer Research and Development, 2012, 49(4): 754-762.

On the Satisfiability and Consistency for CP-nets

More Information
  • Published Date: April 14, 2012
  • The conditional preference networks (CP-nets) is a simple and intuitive graphical tool for representing conditional ceteris paribus (all else being equal) preference statements over the values of a set of variables, which has become a research hotspot in artificial intelligence field recently. However, by now there are few works to address its characteristics of satisfiability and consistency, and there are neither strict definition of them, further discussion of their relationships, nor a general algorithm to get a satisfactory ranking. By analyzing the relationships between satisfiability and consistency, two algorithms are proposed to judge the satisfiability and to generate the satisfactory ranking for any structured binary-valued CP-nets. Firstly, by constructing an induced graph of CP-nets and studying its properties, the related theorems on satisfiability and consistency are obtained. Secondly, by analyzing the relations between them, a conclusion is drawn that the satisfiability for CP-nets is equivalent to its consistency. Therefore, the satisfactory ranking for any structured binary-valued CP-nets can be generated with the method of topology sort. What’s more, the syntax, semantics and some definitions of CP-nets are collated and introduced. All these studies can be seen as the improvement and refinement of Boutilier’s related works, and can deepen the basic theory research of CP-nets.
  • Related Articles

    [1]Li Mingyue, Luo Xiangyang, Chai Lixiang, Yuan Fuxiang, GanYong. City-Level IP Geolocation Method Based on Network Node Clustering[J]. Journal of Computer Research and Development, 2019, 56(3): 467-479. DOI: 10.7544/issn1000-1239.2019.20170473
    [2]Wang Changda, Huang Lei, Liu Zhifeng. Information Hiding Algorithm of IP Covert Timing Channels and Its Performance Analysis[J]. Journal of Computer Research and Development, 2016, 53(5): 988-999. DOI: 10.7544/issn1000-1239.2016.20150063
    [3]Wang Zhiwei and Zhang Wei. ID Based Signature Scheme from Strong RSA Assumption in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(2): 302-306.
    [4]Gao Haiying. Provable Secure ID-Based Authenticated Key Agreement Protocol[J]. Journal of Computer Research and Development, 2012, 49(8): 1685-1689.
    [5]Zhou Yousheng, Sun Yanbin, Qing Sihan, Yang Yixian. An Efficient ID-Based Verifiably Encrypted Signature Scheme[J]. Journal of Computer Research and Development, 2011, 48(8): 1350-1356.
    [6]Lai Xin, Huang Xiaofang, He Dake. An ID-Based Efficient Signcryption Key Encapsulation Scheme[J]. Journal of Computer Research and Development, 2009, 46(5): 857-863.
    [7]Zhou Ling, Sun Yamin. Research on Multicast Routing Algorithm for Mobile IP Based on Bone Node Set[J]. Journal of Computer Research and Development, 2008, 45(7): 1126-1132.
    [8]Wang Li, Xu Mingwei, and Xu Ke. On the Deployment Approach of IPSec and IP Filter in Routers[J]. Journal of Computer Research and Development, 2006, 43(3): 375-380.
    [9]Qu Haipeng, Li Dequan, Su Purui, Feng Dengguo. An IP Traceback Scheme with Packet Marking in Blocks[J]. Journal of Computer Research and Development, 2005, 42(12): 2084-2092.
    [10]Wu Yichuan, Huang Kui, Zheng Jianping, Sun Limin, and Cheng Weiming. An Adaptive Robust TCP/IP Header Compression Algorithm[J]. Journal of Computer Research and Development, 2005, 42(4): 655-661.

Catalog

    Article views (763) PDF downloads (453) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return