>> I'm curious how this : >> http://ctat.pact.cs.cmu.edu/docs/ctat_2_1/cog_tutor_jess_tools.html#why_not >> can be achieved. >> It is something that require a modification of Jess ?
Most likely. And Ernest is correct, too. I actually was invited to attend the 2006 "LearnLab" at Carnegie Mellon as part of the prep for my PhD. I got to meet the folks who created the Cognitive Tutor software, and I asked them about several such "oddities" in their software. As it turns out, they did modify Jess's source code to produce custom behaviors. In order for the tutor to do its reasoning, it needs to backward chain through the nodes of possible operations in the problem space. However, the CM folks couldn't get Jess's backward chaining to "work properly", so they hacked the source. The most egregious of which was to actually fire individual rules on-demand -- essentially circumventing the purpose of having a rule engine. Its hard to disparage such an apparently impressive body of work, but there it is. Cheers, Jason ----------------------------------------------------------- Morris Technical Solutions LLC [EMAIL PROTECTED] (517) 304-5883 -------------------------------------------------------------------- To unsubscribe, send the words 'unsubscribe jess-users [EMAIL PROTECTED]' in the BODY of a message to [EMAIL PROTECTED], NOT to the list (use your own address!) List problems? Notify [EMAIL PROTECTED] --------------------------------------------------------------------
