>> I'm curious how this : 
>> http://ctat.pact.cs.cmu.edu/docs/ctat_2_1/cog_tutor_jess_tools.html#why_not 
>> can be achieved.
>> It is something that require a modification of Jess ?

Most likely.

And Ernest is correct, too.  I actually was invited to attend the 2006
"LearnLab" at Carnegie Mellon as part of the prep for my PhD.  I got
to meet the folks who created the Cognitive Tutor software, and I
asked them about several such "oddities" in their software.  As it
turns out, they did modify Jess's source code to produce custom
behaviors.  In order for the tutor to do its reasoning, it needs to
backward chain through the nodes of possible operations in the problem
space.  However, the CM folks couldn't get Jess's backward chaining to
"work properly", so they hacked the source.  The most egregious of
which was to actually fire individual rules on-demand -- essentially
circumventing the purpose of having a rule engine.  Its hard to
disparage such an apparently impressive body of work, but there it is.

Cheers,
Jason

-----------------------------------------------------------
Morris Technical Solutions LLC
[EMAIL PROTECTED]
(517) 304-5883


--------------------------------------------------------------------
To unsubscribe, send the words 'unsubscribe jess-users [EMAIL PROTECTED]'
in the BODY of a message to [EMAIL PROTECTED], NOT to the list
(use your own address!) List problems? Notify [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to