2000
DOI: 10.1016/s0169-023x(99)00038-5
|View full text |Cite
|
Sign up to set email alerts
|

An algorithm for maintaining working memory consistency in multiple rule firing systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2003
2003
2018
2018

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…It is 10-20 times faster than the standard lisp implementation distributed by Carnegie Mellon University. These methods break the interference cycle in several places, which make the selected compatible rule set have a relative small amount of rule instantiations (Perraju et al, 2000;Cheng et al, 2010;Kao, 2012;Wang et al, 2011). Therefore, it is necessary to get further promotion because of the small amount of parallelism.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It is 10-20 times faster than the standard lisp implementation distributed by Carnegie Mellon University. These methods break the interference cycle in several places, which make the selected compatible rule set have a relative small amount of rule instantiations (Perraju et al, 2000;Cheng et al, 2010;Kao, 2012;Wang et al, 2011). Therefore, it is necessary to get further promotion because of the small amount of parallelism.…”
Section: Related Workmentioning
confidence: 99%
“…The multiple rule firing method introduced in this paper is based on the idea of request access control of Perraju et al (2000), and only needs to process WMEs and negative tokens which are to be accessed directly without considering the concept of weak pattern (Perraju et al, 2000). Besides, this method uses data structure NegTokenRef to store the related information of the negative tokens in the master server which is different from directly accessing the alpha memories of the local Rete network to deal with the access requests of the negative tokens.…”
Section: Workflow Of Multiple Rule Firingmentioning
confidence: 99%