Intelligent debugging of utility constraints in configuration knowledge bases

A. Felfernig*, M. Mandl, M. Schubert

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Knowledge-based configurators support customers in preference construction processes related to complex products and services. In this context utility constraints (scoring rules) play an important role. They determine the order in which configurations are presented to customers. In many cases utility constraints are faulty, i.e., calculate configuration rankings which are not expected and accepted by marketing and sales experts. The repair of these constraints is extremely time-consuming and often an error-prone task. In this paper we present an approach which effectively supports automated debugging and repair of faulty utility constraint sets. This approach allows us to automatically take into account intended rankings of configurations specified by marketing and sales experts.

Original languageEnglish
Title of host publicationINFORMATIK 2010 - Service Science - Neue Perspektiven fur die Informatik, Beitrage der 40. Jahrestagung der Gesellschaft fur Informatik e.V. (GI)
Pages767-772
Number of pages6
Publication statusPublished - 1 Dec 2010
Externally publishedYes
Event40th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Service Science - Neue Perspektiven fur die Informatik, INFORMATIK 2010 - Leipzig, Germany
Duration: 27 Sep 20101 Oct 2010

Publication series

NameINFORMATIK 2010 - Service Science - Neue Perspektiven fur die Informatik, Beitrage der 40. Jahrestagung der Gesellschaft fur Informatik e.V. (GI)
Volume1

Conference

Conference40th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Service Science - Neue Perspektiven fur die Informatik, INFORMATIK 2010
CountryGermany
CityLeipzig
Period27/09/101/10/10

ASJC Scopus subject areas

  • Information Systems

Fingerprint Dive into the research topics of 'Intelligent debugging of utility constraints in configuration knowledge bases'. Together they form a unique fingerprint.

Cite this