Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Cyc
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Applications== In 2001, [[GlaxoSmithKline]] was funding the Cyc, though for unknown applications.<ref>{{Cite news |last=HILTZIK |first=MICHAEL A. |date=2001-06-21 |title=Birth of a Thinking Machine |url=https://www.latimes.com/archives/la-xpm-2001-jun-21-mn-12881-story.html |archive-url=https://web.archive.org/web/20191213220632/https://www.latimes.com/archives/la-xpm-2001-jun-21-mn-12881-story.html |archive-date=13 Dec 2019 |access-date=2017-11-29 |work=Los Angeles Times |language=en-US |issn=0458-3035}}</ref> In 2007, the [[Cleveland Clinic]] has used Cyc to develop a [[natural language query|natural-language query]] interface of biomedical information on [[Cardiothoracic surgery|cardiothoracic surgeries]].<ref>{{Cite web |title=Case Study: A Semantic Web Content Repository for Clinical Research |url=http://www.w3.org/2001/sw/sweo/public/UseCases/ClevelandClinic/ |access-date=2018-02-28 |website=www.w3.org |language=en-US}}</ref> A query is parsed into a set of [[CycL]] fragments with open variables.<ref>{{Cite journal|last1=Lenat|first1=Douglas|last2=Witbrock|first2=Michael|last3=Baxter|first3=David|last4=Blackstone|first4=Eugene|last5=Deaton|first5=Chris|last6=Schneider|first6=Dave|last7=Scott|first7=Jerry|last8=Shepard|first8=Blake|date=2010-07-28|title=Harnessing Cyc to Answer Clinical Researchers' Ad Hoc Queries|journal=AI Magazine|language=en|volume=31|issue=3|page=13|doi=10.1609/aimag.v31i3.2299|issn=0738-4602|doi-access=free}}</ref> The [[MIPT Terrorism Knowledge Base|Terrorism Knowledge Base]] was an application of Cyc that tried to contain knowledge about "terrorist"-related descriptions. The knowledge is stored as statements in mathematical logic. The project lasted from 2004 to 2008.<ref>{{cite journal |author1=Chris Deaton |author2=Blake Shepard |author3=Charles Klein |author4=Corrinne Mayans |author5=Brett Summers |author6=Antoine Brusseau |author7=Michael Witbrock |author8=Doug Lenat |year=2005 |title=The Comprehensive Terrorism Knowledge Base in Cyc |url=https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=b401fba6ece3a959b49aa5dfa2d04b54912bfa3c |journal=Proceedings of the 2005 International Conference on Intelligence Analysis |citeseerx=10.1.1.70.9247}}</ref><ref>{{cite tech report|id=AFRL-RI-RS-TR-2008-125 |date=April 2008 |title=Terrorism Knowledge Base (TKB) Final Technical Report|url=https://www.researchgate.net/publication/235042082_Terrorism_Knowledge_Base_TKB|author1=Douglas B. Lenat |author2=Chris Deaton|institution=[[Air Force Research Laboratory Information Directorate]]|publication-place=Rome Research Site, [[Rome, New York]] }}</ref> [[Lycos]] used Cyc for search term disambiguation, but stopped in 2001.<ref>{{Cite web |date=2015-09-05 |title=Computer to Save World? |url=http://www.cyc.com/about/media-coverage/computer-save-world/ |access-date=2024-12-15 |archive-url=https://web.archive.org/web/20150905165226/http://www.cyc.com/about/media-coverage/computer-save-world/ |archive-date=5 September 2015 }}</ref> CycSecure was produced in 2002,<ref>{{Cite web |date=April 8, 2002 |title=Cyc in use |url=https://www.computerworld.com/article/1354418/cyc-in-use.html |access-date=2024-12-15 |website=Computerworld |language=en-US}}</ref> a network vulnerability assessment tool based on Cyc, with trials at the US [[United States Strategic Command|STRATCOM]] Computer Emergency Response Team.<ref>{{Cite journal |last1=Shepard |first1=Blake |last2=Matuszek |first2=Cynthia |last3=Fraser |first3=C. Bruce |last4=Wechtenhiser |first4=William |last5=Crabbe |first5=David |last6=Güngördü |first6=Zelal |last7=Jantos |first7=John |last8=Hughes |first8=Todd |last9=Lefkowitz |first9=Larry |last10=Witbrock |first10=Michael |last11=Lenat |first11=Doug |last12=Larson |first12=Erik |date=2005-07-09 |title=A knowledge-based approach to network security: applying Cyc in the domain of network risk assessment |url=https://dl.acm.org/doi/abs/10.5555/1620092.1620110 |journal=Proceedings of the 17th Conference on Innovative Applications of Artificial Intelligence - Volume 3 |series=IAAI'05 |location=Pittsburgh, Pennsylvania |publisher=AAAI Press |pages=1563–1568 |isbn=978-1-57735-236-5}}</ref> One Cyc application has the stated aim to help students doing math at a 6th grade level.<ref>{{Cite journal|last1=Lenat|first1=Douglas B.|last2=Durlach|first2=Paula J.|date=2014-09-01|title=Reinforcing Math Knowledge by Immersing Students in a Simulated Learning-By-Teaching Experience|journal=International Journal of Artificial Intelligence in Education|language=en|volume=24|issue=3|pages=216–250|doi=10.1007/s40593-014-0016-x|issn=1560-4292|doi-access=free}}</ref> The application, called MathCraft,<ref>{{Cite web|url=http://www.mathcraft.ai|title=Mathcraft by Cycorp|website=www.mathcraft.ai|access-date=2017-11-29}}</ref> was supposed to play the role of a fellow student who is slightly more confused than the user about the subject. As the user gives good advice, Cyc allows the avatar to make fewer mistakes.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)