• Aucun résultat trouvé

Towards Defeasible SROIQ

N/A
N/A
Protected

Academic year: 2022

Partager "Towards Defeasible SROIQ"

Copied!
13
0
0

Texte intégral

(1)

Katarina Britz1and Ivan Varzinczak2,1

1 CSIR-SU CAIR, Stellenbosch University, South Africa

2 CRIL, Univ. Artois & CNRS, France abritz@sun.ac.za, varzinczak@cril.fr

Abstract. We present a decidable extension of the Description LogicSROIQ that supports defeasible reasoning in the KLM tradition, and extends it through the introduction of defeasible roles. The semantics of the resulting DLdSROIQ extends the classical semantics with a parameterised preference order on binary relations in a domain of interpretation. This allows for the use of defeasible roles in complex concepts, as well as in defeasible concept and role subsumption, and in defeasible role assertions. Reasoning overdSROIQontologies is made pos- sible by a translation of entailment to concept satisfiability relative to an RBox only. A tableau algorithm then decides on consistency ofdSROIQ-concepts in the preferential semantics.

Keywords: SROIQ, non-monotonic reasoning, preferential semantics

1 Introduction

SROIQ[20] is an expressive, yet decidable Description Logic (DL) that serves as semantic foundation for the OWL 2 profile, on which several ontology languages of various expressivity are based. However,SROIQstill allows for meaningful, decid- able extension, as new knowledge representation requirements are identified. A case in point is the need to allow for exceptions and defeasibility in reasoning over logic-based ontologies [4, 3, 2, 8, 6, 7, 10, 12–14, 17, 18, 27]. Yet,SROIQdoes not allow for the direct expression of and reasoning with different aspects of defeasibility.

Given the special status of subsumption in DLs in particular, and the historical im- portance of entailment in logic in general, past research efforts in this direction have focused primarily on accounts of defeasible subsumption and the characterisation of defeasible entailment. Semantically, the latter usually take as point of departure or- derings on a class of first-order interpretations, whereas the former usually assume a preference order on objects of the domain.

In this paper, we propose a decidable extension ofSROIQthat supports defeasible knowledge representation and reasoning over defeasible ontologies. Our proposal builds on previous work to resolve two important ontological limitations of the preferential approach to defeasible reasoning in DLs — the assumption of a single preference order on all objects in the domain of interpretation, and the assumption that defeasibility is intrinsically linked to argument form [9, 10].

We achieve this by extendingSROIQwith nonmonotonic reasoning features in the concept language, in subsumption statements and in role assertions via an intuitive

(2)

notion of normality for roles. This parameterises the idea of preference while at the same time introducing the notion of defeasible class membership. Defeasible subsump- tion allows for the expression of statements of the form “Cis usually subsumed byD”, for example, “Chenin blanc winesare usuallyunwooded”. In our extended language dSROIQ, we can now also refer directly to, for example, “Chenin blanc wines that usually havea wood aroma”. We can also combine these seamlessly, as in: “Chenin blanc wines thatusually havea wood aromaare usuallywooded”. Note that this can- not be expressed in terms of defeasible subsumption alone, nor can it be expressed w.l.o.g. using a typicality operator on concepts. This is because the semantics of the expression is inextricably tied to the two distinct uses of the term ‘usually’. Another defeasible construct that adds to the expressivity ofdSROIQis defeasible role inclu- sion, e.g. “having a given geographic style usually implies having that region as origin”.

dSROIQalso includes defeasible role assertions, such as defeasible functionality or defeasible disjointness, and defeasible number- andSelf-restrictions.

The remainder of the paper is structured as follows: In Section 2 we introduce the syntax and semantics of the extended languagedSROIQ. Section 3 covers a number of rewriting and elimination results required for effective reasoning with dSROIQ knowledge bases, and which are needed for the tableau algorithm presented in Sec- tion 4. The main results of the paper are Theorem 1, which reduces concept satisfiability indSROIQto concept satisfiability relative to only an RBox, and Theorem 2, which establishes the correctness of the tableau procedure. The latter result is established only for the restriction ofdSROIQwhich excludes role composition in defeasible RIAs.

Space considerations prevent us from providing a summary of the required logi- cal background. We shall therefore assume the reader’s familiarity with DLs in gen- eral [1] and withSROIQin particular [20], as well as with the preferential approach to non-monotonic reasoning [23, 24, 28]. Whenever necessary, we refer the reader to the definitions and results in the relevant literature.

2 Defeasible SROIQ

2.1 Defeasibility in RBoxes

LetRbe a set of role names, and letudenote theuniversal role. The set of all roles is given byR := R∪ {r | r ∈ R} ∪ {u}. We denote roles withr, s, . . ., possibly with subscripts. Moreover, letinv : R −→ Rbe such thatinv : r 7→ r, ifr ∈ R, inv:r7→s, ifr=s, andinv:u7→u.

Letr1, . . . , rn, r ∈R\ {u}. Aclassical role inclusion axiomis a statement of the formr1◦ · · · ◦rnvr. Adefeasible role inclusion axiomhas the formr1◦ · · · ◦rn@r, read “usually,r1◦ · · · ◦rnis included inr”. A finite set of role inclusion axioms (RIAs) is called arole hierarchyand is denoted byRh.

Definition 1 ((Non-)Simple Role).Letr∈Rand letRhbe a role hierarchy. Thenr isnon-simpleinRhiff:

1. There isr1◦ · · · ◦rnvrorr1◦ · · · ◦rn@rinRhsuch thatn >1, or 2. There issvrors@rinRhsuch thatsis non-simple, or

(3)

3. inv(r)is non-simple.

WithRnwe denote the set ofnon-simpleroles inRh.Rs:=R\Rnis the set ofsimple roles inRh.

Intuitively, simple roles are those that are not implied by the composition of roles.

They are needed to restrict the type of roles in certain concept constructors (see below), thereby preserving decidability [20].

Definition 2 (Regular Hierarchy).A role hierarchyRhisregularif there is a strict partial order<onRnsuch that:

1. s < riffinv(s)< r, for everyr, sinRn, and

2. every role inclusion inRhis of one of the forms: (1a)r◦r vr, (1b)r◦r@r, (2a)inv(r) vr, (2b)inv(r)@r, (3a) s1◦ · · · ◦sn v r, (3b)s1◦ · · · ◦sn@r, (4a)r◦s1◦ · · · ◦sn vr, (4b)r◦s1◦ · · · ◦sn@r, (5a)s1◦ · · · ◦sn◦r vr, (5b)s1◦· · ·◦sn◦r@r, wherer∈R(i.e., a role name), andsi< r, fori= 1, . . . , n.

(Regularity prevents a role hierarchy from inducing cyclic dependencies, which are known to lead to undecidability.)

Aclassical role assertionis a statement of the formFun(r)(functionality),Ref(r) (reflexivity),Irr(r)(irreflexivity),Sym(r)(symmetry),Asy(r)(asymmetry),Tra(r)(tran- sitivity), andDis(r, s)(role disjointness), where r, s6= u. Adefeasible role assertion is a statement of the formdFun(r)(ris usually functional),dRef(r)(ris usually re- flexive),dIrr(r)(ris usually irreflexive),dSym(r)(ris usually symmetric),dAsy(r) (ris usually asymmetric),dTra(r)(ris usually transitive), anddDis(r, s)(randsare usually disjoint), also withr, s6=u. WithRawe denote a finite set of role assertions.

Given a role hierarchyRh, we say thatRaissimplew.r.t.Rhif all rolesr, sappear- ing in statements of the formIrr(r),dIrr(r),Asy(r),dAsy(r),Dis(r, s)ordDis(r, s)are simple inRh(see Definition 1).

AdSROIQRBox is a setR:=Rh∪ Ra, whereRhis a regular hierarchy and Rais a set of role assertions which is simple w.r.t.Rh.

2.2 Defeasibility in Concepts and in TBoxes

LetCbe a set of (atomic)concept namesdisjoint fromRand of which N, the set of nominals, is a subset. We use A, B, . . ., possibly with subscripts, to denote concept names. A nominal will also be denoted byo, possibly with subscripts.

Definition 3 (dSROIQConcepts). The set of dSROIQ complex concepts is the smallest set such that>,⊥and everyA ∈ Care concepts, and ifC andDare con- cepts,r ∈ R,s ∈ Rs, andn∈ N, then¬C (concept complement),CuD(concept conjunction),CtD (concept disjunction),∀r.C (value restriction),∃r.C (existential restriction),Wr.C (defeasible value restriction),|r.C (defeasible existential restric- tion),∃r.Self (self restriction),|r.Self (defeasible self restriction),≥ ns.C (at-least restriction), ≤ ns.C (at-most restriction), & ns.C (defeasible at-least restriction), .ns.C(defeasible at-most restriction) are also concepts. WithCwe denote the set of all complex concepts.

(4)

Note that everySROIQconcept is adSROIQconcept, too. We shall useC, D . . ., possibly with subscripts, to denote complexdSROIQconcepts.

GivenC, D∈C,CvDis aclassical general concept inclusion, read “Cis sub- sumed byD”. (C ≡Dis an abbreviation for bothC v DandD vC.)C@Dis a defeasible general concept inclusion, read “Cisusuallysubsumed byD”. AdSROIQ TBoxT is a finite set of general concept inclusions (GCIs), whether classical or defea- sible.

LetIbe a set ofindividual namesdisjoint from bothCandR. GivenC∈C,r∈R anda, b ∈ I, an individual assertionis an expression of the forma : C,(a, b) : r, (a, b) :¬r,a=bora6=b. AdSROIQABoxAis a finite set of individual assertions.

LetAbe an ABox,T be a TBox andRan RBox. Aknowledge base(alias ontology) is a tupleKB:=hA,R,T i.

2.3 Preferential Semantics

We shall anchor our semantic constructions in the well-known preferential approach to non-monotonic reasoning [23, 24, 28] and its extensions [5, 9, 11], especially those to the DL case [8, 16, 25].

LetX be a set and let<be a strict partial order onX. Withmin<X :={x∈X | there is noy∈X s.t.y < x}we denote theminimal elementsofX w.r.t.<. With#X we shall denote thecardinalityofX.

Definition 4 (Ordered Interpretation). Anordered interpretationis a tuple O :=

h∆OO,≺O,Oiin whichh∆OOiis aSROIQinterpretation withAO ⊆ ∆O, for everyA ∈C,AO a singleton for everyA∈ N,rO ⊆ ∆O ×∆O, for allr ∈R, and aO ∈ ∆O, for every a ∈ I, ≺O is a strict partial order on ∆O, and O:=

hO1, . . . ,O#Ri, whereOi ⊆rOi ×rOi , fori = 1, . . . ,#R, and such that≺O and eachOi satisfy the smoothness condition [23]. Moreover, for anyr, r1, r2∈R\ {u}, Ointerpretsorderings on role inversesandon role compositionsas follows:

Or:={((y1, x1),(y2, x2))|((x1, y1),(x2, y2))∈ Or}, andOr1◦r2:={((x1, y1), (x2, y2))|for somez1,z2[((x1, z1),(x2, z2)) ∈Or1 and((z1, y1),(z2, y2)) ∈Or2], and for noz1,z2[((x2, z2),(x1, z1))∈Or1and((z2, y2),(z1, y1))∈Or2]}.

LetrO|xi :=rOi ∩({x} ×∆O)(i.e., the restriction of the domain ofrOi to{x}). The in- terpretation function·OinterpretsdSROIQconcepts in the following way (whenever it is clear which component ofOis used, we shall drop the subscript inOi ):

>O :=∆O; ⊥O:=∅; (¬C)O:=∆O\CO; (CuD)O :=CO∩DO; (CtD)O :=CO∪DO;

(∀r.C)O :={x|rO(x)⊆CO}; (Wr.C)O :={x|minO(rO|x)(x)⊆CO};

(∃r.C)O :={x|rO(x)∩CO6=∅}; (|r.C)O :={x|minO(rO|x)(x)∩CO 6=∅};

(∃r.Self)O:={x|(x, x)∈rO}; (|r.Self)O :={x|(x, x)∈minO(rO|x)};

(≥nr.C)O :={x|#rO(x)∩CO≥n}; (≤nr.C)O :={x|#rO(x)∩CO ≤n};

(&nr.C)O :={x|# minO(rO|x)(x)∩CO} ≥n;

(.nr.C)O :={x|# minO(rO|x)(x)∩CO≤n}.

(5)

It is not hard to see that, analogously to the classical case,Wand|, as well as&

and., are duals to each other.

Definition 5 (Satisfaction).LetO=h∆OO,≺O,Oiand letr1, . . . , rn, r, s∈R, C, D∈C, anda, b∈I. Thesatisfaction relationis defined as follows:

OrvsifrO⊆sO; Or@sifminOrO ⊆sO;

Or1◦ · · · ◦rnvrif(r1◦ · · · ◦rn)O ⊆rO; Or1◦ · · · ◦rn@rifminO(r1

· · · ◦rn)O ⊆rO;

OFun(r)ifrOis a function;OdFun(r)if for allx,# minO(rO|x)(x)≤1;

O Ref(r)if{(x, x)|x∈∆O} ⊆rO; O dRef(r)if for everyx∈ minOO, (x, x)∈rO;

OIrr(r)ifrO∩ {(x, x)|x∈∆O}=∅; OdIrr(r)if for everyx∈minOO, (x, x)∈/ rO;

OSym(r)ifinv(r)O ⊆rO; OdSym(r)ifminO(r)O ⊆rO;

OAsy(r)ifrO∩inv(r)O =∅; OdAsy(r)ifminOrO∩minO(r)O =∅;

OTra(r)if(r◦r)O ⊆rO; OdTra(r)ifminO(r◦r)O⊆rO;

ODis(r, s)ifrO∩sO =∅; OdDis(r, s)ifminOrO∩minOsO =∅;

OCvDifCO⊆DO; OC@DifminOCO ⊆DO;

O a : C ifaO ∈ CO; O (a, b) : rif (aO, bO) ∈ rO; O (a, b) : ¬r if O 6(a, b) :r; Oa=bifaO=bO; Oa6=bifO 6a=b.

IfOα, then we sayOsatisfiesα.Osatisfies a set of statements or assertionsX (denotedOX) ifOαfor everyα∈X, in which case we sayOis amodelofX.

We sayC ∈ C issatisfiable w.r.t.KB = hA,R,T iif there is a modelOofKBs.t.

CO 6=∅, andunsatisfiableotherwise.

A statementαis (classically)entailedby a knowledge baseKB, denotedKB |=α, if every model ofKBsatisfiesα.

3 Reasoning with dSROIQ Knowledge Bases

As for classical SROIQ[20, Lemma 7], it is possible to eliminate an ABox Aby compiling all individual assertions inAas follows:

1. LetN0 :=N∪ {oa|aappears inA}(i.e., extend the signature with new nominals);

2. LetA0:={a:C∈ A} ∪ {a:∃r.ob|(a, b) :r∈ A} ∪ {a:∀r.¬ob|(a, b) :¬r∈ A} ∪ {a:¬ob|a6=b∈ A};

3. For everyC∈C, letC0 :=Cud

a:D∈A0∃u.(oauD).

It is then easy to see thatCis satisfiable w.r.t.hA,R,T iif and only ifC0is satisfi- able w.r.t.h∅,R,T i, which allows us to assume from now on and w.l.o.g. that ABoxes have been eliminated.

Next, in the same way that most of the classical role assertions can equivalently be replaced by GCIs or RIAs, under our preferential semantics, all of our defeasible role assertions, with the exception ofdAsy(·)anddDis(·), can be reduced to defeasible RIAs in the following way.dFun(r)can be replaced by> v.1r.>— to be ‘usually functional’ means only non-normal arrows can break functionality. (Note that, since

(6)

the number restriction is unqualified,rneed not be simple.)dRef(r)anddIrr(r)can, respectively, be replaced with>@∃r.Selfand>@¬∃r.Self.dSym(r)can be reduced tor@randdTra(r)tor◦r@r. Furthermore, note thatdAsy(r)can be reduced to dDis(r, r)(cf. Definition 5). Hence, from now on we can assume, w.l.o.g., that the set of role assertionsRacontains only statements of the formDis(r, s)anddDis(r, s).

Next, we observe that defeasible concept inclusions can be made classical by in- troducing a new role name r to encode≺at the object level. This is similar to the SROIQencoding of the typicality operator of Giordano et al. [16, 15].

Finally, we can apply the same procedure for eliminating both the TBox and the universal role u defined for classical SROIQ[20, Lemma 8][26], extended to the case ofdSROIQconcepts. Hence, from now on we can assume TBoxes (as well as occurrences ofutherein) have been eliminated.

The next theorem summarises the reduction outlined in this section:

Theorem 1. Satisfiability of dSROIQ-concepts w.r.t. TBoxes, ABoxes and RBoxes can be polynomially reduced to satisfiability of dSROIQ-concepts w.r.t. RBoxes in which all role assertions are of the formDis(r, s)anddDis(r, s).

It is known that classical RIAs with role composition on the LHS can be eliminated via automata-based procedures [21] or regular expressions [29]. Hence, we can assume w.l.o.g. that all classical RIAs are of the formr v s, with r, s ∈ R\ {u}. Whether analogous procedures for getting rid of role composition on the LHS ofdefeasibleRIAs are devisable and, if so, feasible in practice, is an open question that we leave for future investigation. (Roughly, the automaton used to ‘memorise’ role-pathsr1, . . . , rnin the classical case must be carefully adapted in order to also recognise preferred role-paths so that a normal r1, . . . , rn-path warrants the existence of ans-path, whenever r1◦ . . .◦rn@sfollows fromR). Hence, in the remainder of the paper, we shall make the assumption that all defeasible RIAs are of the formr@s, forr, s ∈ R\ {u} (and thereforeRcontains no assertions of the formdTra(·)— see above).

Furthermore, note that the special role namerused in the internalisation of defea- sible concept inclusions does not appear inW-,|-,&- or.-concepts or in defeasible RIAs, forr∈/R.

4 A Tableau Proof Procedure for dSROIQ

We shall now present a tableau-based algorithm for deciding consistency ofdSROIQ- concepts w.r.t. an RBox. Thanks to the results in Section 3, it also allows for checking concept satisfiability w.r.t. knowledge basesKB=hA,R,T i.

The algorithm extends that forSROIQ[20] to deal with defeasible constructs and also works by generating a completion graph, which, if complete and clash-free (see below), can be used to construct a (possibly infinite) model for the input concept and the RBox.

Withnnf(C)we denote thenegation normal form(NNF) ofC∈C, i.e., the result of transformingCinto an equivalent concept by pushing negation inwards and applying De Morgan’s laws as well as the duality between∀and∃,≥and≤,Wand|, and&

(7)

and.. Note that in NNF negation occurs only in front of concept names or in front of

∃r.Selfor|r.Self.

IfC∈C,sub(C)denotes the set of all (syntactic)sub-conceptsofC(includingC itself), andclos(C)is the smallest set containingC that is closed under sub-concepts and negation:clos(C) :={D|D∈sub(C)} ∪ {nnf(¬D)|D∈sub(C)}.

Definition 6 (Completion Graph).LetC ∈Cbe in NNF and such that the universal roleudoes not occur inC, and letRbe an RBox. Acompletion graphforCw.r.t.R is a directed graphG:=hV, E, M,L,N,6.

=iwhereV is a set ofnodes,E⊆V ×V is a set ofedges,M ⊆E×Eis arelation on edges,L(·)is alabelling functiondefined by:

1. for everyv ∈ V,L(v) ⊆ clos(C)∪N∪ {≤ mr.D | ≤ nr.D ∈ clos(C)and m≤n} ∪ {.mr.D|.nr.D∈clos(C)andm≤n};

2. for everye= (v, v0)∈E,L(e)⊆R\ {u};

3. for everym= (e, e0)∈M,L(m)⊆ L(e)∩ L(e0), N ⊆E×R, with(e, r)∈ N only ifr∈ L(e), and6.

=⊆V×V is a symmetric relation.

Intuitively,N tells us whether(v, v0)is anormalr-edge among those leavingv. It is used along withM in the model-unravelling phase to construct a preference relation for each role name. (For the sake of readability, we shall henceforth write L(v, v0) andL((v, v0),(u, u0))instead ofL((v, v0))andL(((v, v0),(u, u0))).)M is the explicit construction of the skeleton of the preference relation on the edges, and is used to construct the model resulting from the unravelling of the completion graph.

If(v, v0)∈E, thenv0is asuccessorofv, andvis apredecessorofv0.Ancestoris the transitive closure of predecessor, anddescendantis the transitive closure of succes- sor. We sayv0 is anr-successorofvifr ∈ L(v, v0).v is anr-predecessorofv0ifv0 is anr-successor ofv.Neighbour(resp.r-neighbour) is the union of successor (resp.

r-successor) and predecessor (r-predecessor). Ifr∈R\ {u},C ∈Candv∈V inG, then

rG(v, C) :={v0|(v, v0)∈E, r∈ L(v, v0), andC∈ L(v0)}

denotes allr-successors ofvwithCin their label, and

rGN(v, C) :=rG(v, C)∩ {v0 |((v, v0), r)∈ N }

denotes (intuitively) ther-successors ofvwithCin their label that are accessible via anr-edge which is minimal amongr-edges leavingv.

Definition 7 (Clash).LetG = hV, E, M,L,N,6.

=ibe a completion graph. We sayG contains aclashif there are nodesv, v0, v00, v1, . . . , vk, v10, . . . , vk0 ∈V such that:

1. ⊥ ∈ L(v), or for someA∈C,{A,¬A} ⊆ L(v);

2. r∈ L(v, v)and¬∃r.Self∈ L(v);

3. r∈ L(v, v),((v, v), r)∈ N and¬|r.Self∈ L(v);

4. Dis(r, s)∈ Ra,(v, v0)∈Eand{r, s} ⊆ L(v, v0);

5. dDis(r, s)∈ Ra,(v, v0)∈E,{r, s} ⊆ L(v, v0)and((v, v0), r),((v, v0), s)∈ N; 6. ≤nr.C ∈ L(v)and{v0, . . . , vn} ⊆rG(v, C), wherevi6.

=vjfor0≤i < j ≤n;

(8)

7. .nr.C ∈ L(v)and{v0, . . . , vn} ⊆rGN(v, C), wherevi6.

=vjfor0≤i < j≤n;

8. ((v, v0), r)∈ N andr∈ L((v, v00),(v, v0));

9. r∈ L((vi, vi0),(vi+1, vi+10 )), fori= 1, . . . , k−1, andvk =v1,vk0 =v01, or 10. for someo∈N,v6.

=v0ando∈ L(v)∩ L(v0).

In order to ensure termination of the algorithm in the presence of transitive roles, we extend the standard (classical)blockingtechnique [19, 22] to the case of our richer structures as follows:

Definition 8 (Blocking).LetG=hV, E, M,L,N,6.

=ibe a completion graph andv∈ V. IfL(v)∩N 6= ∅, thenv is anominalnode; otherwisevis ablockablenode. We sayvislabel blockedifvhas ancestorsv0,uandu0such that:

1. (v0, v),(u0, u)∈Eand there is a pathu, . . . , v0, vwithu, . . . v0, vblockable;

2. L(v) =L(u),L(v0) =L(u0)andL(v0, v) =L(u0, u);

3. for allr∈ L(v0, v),((v0, v), r)∈ N iff((u0, u), r)∈ N;

4. for every(x, y)such that((x, y),(v0, v))∈M, there is(x0, y0)such that

L(x) = L(x0),L(y) = L(y0),L(x, y) = L(x0, y0),((x0, y0),(u0, u)) ∈ M and L((x0, y0),(u0, u)) =L((x, y),(v0, v)).

5. for every(x, y)such that((v0, v),(x, y))∈M, there is(x0, y0)such that

L(x) = L(x0),L(y) = L(y0),L(x, y) = L(x0, y0),((u0, u),(x0, y0)) ∈ M and L((u0, u)(x0, y0)) =L((v0, v),(x, y)).

If (1)–(5) hold, we say ublocksv. We sayv ∈ V isblockedif either (a) v is label blocked, or (b)vis blockable and there is(v0, v) ∈ Esuch thatv0 is blocked. Ifv is blocked but is not label blocked, then we sayvisindirectly blocked.

LetCbe the concept of which the satisfiability w.r.t. an RBoxRone wants to check, and leto1, . . . , okbe the nominals occurring inC. The tableau algorithm is initialised with a completion graphG = h{v0, v1, . . . , vk},∅,∅,L,∅,∅i, whereL(v0) := {C}, L(vi) := {oi}, for1 ≤ i ≤ k. We then expand G by decomposing concepts in its nodes through the application of the expansion rules in Figures 1–3. These rules are repeatedly applied until either no more rules are applicable or a clash (Definition 7) is found. In either case, we say the completion graph iscomplete. The algorithm returns

“Cis satisfiable w.r.t.R”, if the result of the application of the expansion rules toC andRis a complete and clash-free graph, and “Cis unsatisfiable w.r.t.R”, otherwise.

Note that the rules in Figure 1 are the same as the corresponding ones forSROIQ modulo the new definitions of blocking (see Definition 8), and of merging and pruning (see below). The rules in Figure 3 deal specifically with our new non-monotonic con- structs. The rules in Figure 2 correspond to those classical rules that had to be modified in the light of our richer semantics. We here detail the case of the∃-rule, from which the respective explanations for theSelf-,≥- andNN-rules can be constructed. Unlike in the|-rule, we cannot assume the newly addedr-edge is minimal amongr-successors ofv. We therefore need to consider the additional possibility that the newr-edge is not normal. (This has to be dealt with explicitly in order to ensure soundness of the algo- rithm.) Therefore, when creating a newr-successor, there are two possibilities: either (i) the new edge is normal among ther-edges leavingv, in which case the result is the

(9)

u-rule:

if C1uC2∈ L(v),vis not indirectly blocked, and{C1, C2} 6⊆ L(v) then L(v) :=L(v)∪ {C1, C2}

t-rule:

if C1tC2∈ L(v),vis not indirectly blocked,{C1, C2} ∩ L(v) = then L(v) :=L(v)∪ {C0}, for someC0∈ {C1, C2}

∀-rule:

if ∀r.C∈ L(v),vis not indirectly blocked,r∈ L(v, v0),C /∈ L(v0) then L(v0) :=L(v0)∪ {C}

ch-rule:

if nr.C∈ L(v),vis not indirectly blocked,r∈ L(v, v0), and{C,nnf(¬C)} ∩ L(v0) = then L(v0) :=L(v0)∪ {C0}, for someC0∈ {C,nnf(¬C)}

≤-rule:

if nr.C∈ L(v),vis not indirectly blocked,#rG(v, C)> n, and

there arev1, v2s.t.r∈ L(v, v1)∩ L(v, v2),C∈ L(v1)∩ L(v2),but notv16.

=v2

then a. ifv1is a nominal node, thenmerge(v2, v1),

b. else ifv2is a nominal node or an ancestor ofv1, thenmerge(v1, v2) c. elsemerge(v2, v1)

o-rule:

if for someoNthere arev, v0s.t.o∈ L(v)∩ L(v0)and notv6.

=v0 then merge(v, v0)

Fig. 1.Classical expansion rules fordSROIQ.

same as that of applying the|-rule, or (ii) it is not normal, in which case there must be a most preferredr-edge, which is also more preferred than the newly created one.

(This splitting is of the same nature as that in thet-rule, fitting the purpose of a proof by cases.) The additional indexkin the≥- andNN-rules serve a similar purpose.

The result ofprune(v)inG =hV, E, M,L,N,6.

=iis a new completion graph con- structed fromG as follows: (1) For every successorv0 ofv,E := E\ {(v, v0)}and ifv0 is blockable, thenprune(v0); (2)V := V \ {v}. (We assume these changes are propagated toL,M,N and6.

=in the expected way.) The result ofmerge(v0, v)inG =hV, E, M,L,N,6.

=iis a new completion graph constructed fromGin the following way (conditions (d)–(f) in both clauses (1) and (2) below are used to preserve the relative normality of the edges):

1. For everyus.t.(u, v0)∈E:

(a) if{(v, u),(u, v)} ∩E=∅, thenE:=E∪ {(u, v)}andL(u, v) :=L(u, v0);

(b) if(u, v)∈E, thenL(u, v) :=L(u, v)∪ L(u, v0);

(c) if(v, u)∈E, thenL(v, u) :=L(v, u)∪ {inv(r)|r∈ L(u, v0)};

(d) if(x, y)∈Eand((x, y),(u, v0))∈M, thenM :=M \ {((x, y),(u, v0))} ∪ {((x, y),(u, v))}andL((x, y),(u, v)) :=L((x, y),(u, v))∪L((x, y),(u, v0));

(e) if(x, y)∈Eand((u, v0),(x, y))∈M, thenM :=M \ {((u, v0),(x, y))} ∪ {((u, v),(x, y))}andL((u, v),(x, y)) :=L((u, v),(x, y))∪L((u, v0),(x, y));

(f) if((u, v0), r)∈ N, thenN :=N ∪ {((u, v), r)};

(g) E:=E\ {(u, v0)};

2. For every nominal nodeus.t.(v0, u)∈E:

(a) if{(v, u),(u, v)} ∩E=∅, thenE:=E∪ {(v, u)}andL(v, u) :=L(v0, u);

(b) if(v, u)∈E, thenL(v, u) :=L(v, u)∪ L(v0, u);

(c) if(u, v)∈E, thenL(u, v) :=L(u, v)∪ {inv(r)|r∈ L(v0, u)};

(10)

∃-rule:

if ∃r.C∈ L(v),vis not blocked, and there is nov0s.t.r∈ L(v, v0)andC∈ L(v0)

then 1. create a new nodev0and edge(v, v0)withL(v0) :={C},L(v, v0) :={r}andN:=N ∪ {((v, v0), r)}

or 2. create two new nodesv0, v00and new edges(v, v0),(v, v00)withL(v0) :={C},L(v, v0) :={r}, M:=M∪ {((v, v00),(v, v0))},L((v, v00),(v, v0)) :={r}andN:=N ∪ {((v, v00), r)}

Self-rule:

if ∃r.Self∈ L(v),vis not blocked, andr /∈ L(v, v)

then 1. add an edge(v, v), if it does not exist,L(v, v) :=L(v, v)∪ {r}, andN:=N ∪ {((v, v), r)}

or 2. create a nodev0and edges(v, v),(v, v0),L(v, v) :=L(v, v)∪ {r},L(v, v0) :={r}, M:=M∪ {((v, v0),(v, v))},L((v, v0),(v, v)) :={r}, andN:=N ∪ {((v, v0), r)}

≥-rule:

if nr.C∈ L(v),vis not blocked, and there are nov1, . . . , vns.t.r∈ L(v, vi),C∈ L(vi), i= 1, . . . , n, andvi6.

=vj, for1i < jn, and eachviis not blocked ifvis not blockable then a. guessk∈ {0, . . . , n},

b. createknew nodesv1, . . . , vkand edges(v, vi), fori= 1, . . . , k, withL(v, vi) :={r}, L(vi) :={C}andN:=N ∪ {((v, vi), r)},

c. create2(nk)new nodesvk+1, . . . , vnandvk+10 , . . . , v0nand edges(v, vi)and(v, v0i), fori=k+ 1, . . . , n, withL(vi) :={C},L(v, vi) :={r},L(v, v0i) :={r},

M:=M∪ {((v, vi0),(v, vi))},L((v, vi0),(v, vi)) :={r}andN:=N ∪ {((v, v0i), r)}, and d. setvi6.

=vj, for1i < jn NN-rule:

if 1. nr.C∈ L(v),vis not blockable,r∈ L(v0, v),v0is blockable, andC∈ L(v0) 2. there is nom∈ {1, . . . , n}s.t.mr.C∈ L(v)and s.t. there aremnominalr-successors

v1, . . . , vmofvwithC∈ L(vi)andvi6.

=vjfor all1i < jm

then a. guessm∈ {1, . . . , n}, setL(v) :=L(v)∪ {.mr.C}and guessk∈ {0, . . . , m}, b. createknew nodesv1, . . . , vkand edges(v, vi), fori= 1, . . . , k, withL(v, vi) :={r},

L(vi) :={C, oi}with eachoiNnew inGandN:=N ∪ {((v, vi), r)},

c. create2(mk)new nodesvk+1, . . . , vmandv0k+1, . . . , vm0 and edges(v, vi)and(v, v0i), for i=k+ 1, . . . , m, withL(v, vi) :={r},L(vi) :={C, oi}, with eachoiNnew inG,L(v, vi0) :={r}, M:=M∪ {((v, vi0),(v, vi))},L((v, vi0),(v, vi)) :={r}andN:=N ∪ {((v, v0i), r)}, and

d. setvi6.

=vj, for1i < jm

Fig. 2.New classical expansion rules fordSROIQ.

(d) if(x, y)∈Eand((x, y),(v0, u))∈M, thenM :=M \ {((x, y),(v0, u))} ∪ {((x, y),(v, u))}andL((x, y),(v, u)) :=L((x, y),(v, u))∪L((x, y),(v0, u));

(e) if(x, y)∈Eand((v0, u),(x, y))∈M, thenM :=M \ {((v0, u),(x, y))} ∪ {((v, u),(x, y))}andL((v, u),(x, y)) :=L((v, u),(x, y))∪L((v0, u),(x, y));

(f) if((v0, u), r)∈ N, thenN :=N ∪ {((v, u), r)};

(g) E:=E\ {(v0, u)};

3. L(v) :=L(v)∪ L(v0);

4. 6.

= :=6.

=∪{(v, w)|v06.

=w}; and 5. prune(v0).

As in the classical case, in order to ensure termination of the tableau algorithm, one has to assign higher priorities to certain rules. Here we assume the following strategy is adopted: Theo-rule is applied with the highest priority; theNN- anddNN-rules are applied before the≤- and.-rules; the other rules are applied with a lower priority.

Theorem 2. LetC∈Cand letRbe an RBox.

1. The algorithm terminates if started withnnf(C)andR;

2. When exhaustively applied tonnf(C)andR, the expansion rules yield a complete and clash-free completion graph iffCis satisfiable w.r.t.R.

(11)

Rh-rule:

if r∈ L(v, v0),vis not indirectly blocked and eitherrvs∈ Ror bothr@s∈ Rand((v, v0), r)∈ N then L(v, v0) :=L(v, v0)∪ {s}

|-rule:

if |r.C∈ L(v),vis not blocked and there is nov0s.t.r∈ L(v, v0),C∈ L(v0)and((v, v0), r)∈ N then create a new nodev0and edge(v, v0)withL(v0) :={C},L(v, v0) :={r}andN:=N ∪ {((v, v0), r)}

dSelf-rule:

if |r.Self∈ L(v),vis not blocked and eitherr /∈ L(v, v)or((v, v), r)∈ N/

then add a new edge(v, v), if required,L(v, v) :=L(v, v)∪ {r}, andN:=N ∪ {((v, v), r)}

W-rule:

if Wr.C∈ L(v),vis not indirectly blocked,r∈ L(v, v0),((v, v0), r)∈ NandC /∈ L(v0) then L(v0) :=L(v0)∪ {C}

dch-rule:

if .nr.C∈ L(v),vis not indirectly blocked,r∈ L(v, v0),((v, v0), r)∈ Nand {C,nnf(¬C)} ∩ L(v0) =

then L(v0) :=L(v0)∪ {C0}, for someC0∈ {C,nnf(¬C)}

&-rule:

if &nr.C∈ L(v),vis not blocked, and there are nov1, . . . , vns.t.r∈ L(v, vi),((v, vi), r)∈ N, C∈ L(vi), fori= 1, . . . , n, and s.t.vi6.

=vj, for1i < jn, and eachviis not blocked ifvis not blockable

then creatennew nodesv1, . . . , vnwithL(v, vi) ={r},N:=N ∪ {((v, vi), r)},L(vi) ={C}, fori= 1, . . . , n, and setvi6.

=vj,1i < jn .-rule:

if .nr.C∈ L(v),vis not indirectly blocked,#rGN(v, C)> n, and there arev1, v2s.t.

r∈ L(v, v1)∩ L(v, v2),((v, v1), r),((v, v2), r)∈ N,C∈ L(v1)∩ L(v2)but notv16.

=v2

then a. ifv1is a nominal node, thenmerge(v2, v1), else

b. ifv2is a nominal node or an ancestor ofv1, thenmerge(v1, v2) c. elsemerge(v2, v1)

dNN-rule:

if 1. .nr.C∈ L(v),vis not blockable,r∈ L(v0, v),v0is blockable andC∈ L(v0)

2. there is nom∈ {1, . . . , n}s.t..mr.C∈ L(v)and s.t. there aremnominal nodesv1, . . . , vmwith (v, vi)E,r∈ L(v, vi),((v, vi), r)∈ N,C∈ L(vi), fori= 1, . . . , m, and withvi6.

=vj, for all1i < jm

then a. guessm∈ {1, . . . , n}and setL(v) :=L(v)∪ {.mr.C}

b. createmnew nodesv01, . . . , vm0 withL(v, vi0) :={r},N:=N ∪ {((v, v0i), r)|1in}, L(v0i) :={C, oi}, withoiNnew inG,i= 1, . . . , m, and setv0i6.

=v0j,1i < jm

Fig. 3.Defeasible expansion rules fordSROIQ.

5 Summary and Future Work

The main contributions of the present paper are: (i) a meaningful extension ofSROIQ with defeasible reasoning constructs in the concept language, in both concept and role inclusions, and in role assertions, together with an intuitive KLM-style preferential se- mantics; (ii) a translation of the entailment problem w.r.t.dSROIQknowledge bases to concept satisfiability relative to an RBox only, and (iii) a terminating, sound and complete tableau-based algorithm for checking concept satisfiability w.r.t. dSROIQ RBoxes.

As for the next steps, we have (i) extending the tableau procedure to allow role composition in defeasible RIAs, (ii) an analysis of the computational complexity of con- cept satisfiability fordSROIQ, (iii) an investigation of the correspondence between dSROIQand an extension of the OWL 2 RDF semantics3, and (iv) the definition of an appropriate notion ofnon-monotonicentailment fordSROIQontologies.

3https://www.w3.org/TR/2012/REC-owl2-rdf-based-semantics-20121211

(12)

References

1. Baader, F., Calvanese, D., McGuinness, D., Nardi, D., Patel-Schneider, P. (eds.): The De- scription Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, 2 edn. (2007)

2. Bonatti, P., Faella, M., Petrova, I., Sauro, L.: A new semantics for overriding in description logics. Artificial Intelligence 222, 1–48 (2015)

3. Bonatti, P., Faella, M., Sauro, L.: Defeasible inclusions in low-complexity DLs. Journal of Artificial Intelligence Research 42, 719–764 (2011)

4. Bonatti, P., Lutz, C., Wolter, F.: The complexity of circumscription in description logic. Jour- nal of Artificial Intelligence Research 35, 717–773 (2009)

5. Boutilier, C.: Conditional logics of normality: A modal approach. Artificial Intelligence 68(1), 87–154 (1994)

6. Britz, K., Casini, G., Meyer, T., Moodley, K., Varzinczak, I.: Ordered interpretations and entailment for defeasible description logics. Tech. rep., CAIR, CSIR Meraka and UKZN, South Africa (2013),http://tinyurl.com/cydd6yy

7. Britz, K., Casini, G., Meyer, T., Varzinczak, I.: Preferential role restrictions. In: Proceedings of the 26th International Workshop on Description Logics. pp. 93–106 (2013)

8. Britz, K., Meyer, T., Varzinczak, I.: Semantic foundation for preferential description logics.

In: Wang, D., Reynolds, M. (eds.) Proceedings of the 24th Australasian Joint Conference on Artificial Intelligence. pp. 491–500. No. 7106 in LNAI, Springer (2011)

9. Britz, K., Varzinczak, I.: Defeasible modalities. In: Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK). pp. 49–60 (2013)

10. Britz, K., Varzinczak, I.: Introducing role defeasibility in description logics. In: Michael, L., Kakas, A. (eds.) Proceedings of the 15th European Conference on Logics in Artificial Intelligence (JELIA). pp. 174–189. No. 10021 in LNCS, Springer (2016)

11. Britz, K., Varzinczak, I.: Preferential modalities revisited. In: Proceedings of the 16th Inter- national Workshop on Nonmonotonic Reasoning (NMR) (2016)

12. Casini, G., Meyer, T., Moodley, K., Sattler, U., Varzinczak, I.: Introducing defeasibility into OWL ontologies. In: Arenas, M., Corcho, O., Simperl, E., Strohmaier, M., d’Aquin, M., Srinivas, K., Groth, P., Dumontier, M., Heflin, J., Thirunarayan, K., Staab, S. (eds.) Proceed- ings of the 14th International Semantic Web Conference (ISWC). pp. 409–426. No. 9367 in LNCS, Springer (2015)

13. Casini, G., Straccia, U.: Rational closure for defeasible description logics. In: Janhunen, T., Niemelä, I. (eds.) Proceedings of the 12th European Conference on Logics in Artificial Intelligence (JELIA). pp. 77–90. No. 6341 in LNCS, Springer-Verlag (2010)

14. Casini, G., Straccia, U.: Defeasible inheritance-based description logics. Journal of Artificial Intelligence Research (JAIR) 48, 415–473 (2013)

15. Giordano, L., Gliozzi, V.: Encoding a preferential extension of the description logic SROIQ intoSROIQ. In: Foundations of Intelligent Systems. pp. 248–258. No. 9384 in LNCS, Springer (2015)

16. Giordano, L., Gliozzi, V., Olivetti, N., Pozzato, G.:ALC+T: a preferential extension of description logics. Fundamenta Informaticae 96(3), 341–372 (2009)

17. Giordano, L., Gliozzi, V., Olivetti, N., Pozzato, G.: A non-monotonic description logic for reasoning about typicality. Artificial Intelligence 195, 165–202 (2013)

18. Giordano, L., Gliozzi, V., Olivetti, N., Pozzato, G.: Semantic characterization of rational clo- sure: From propositional logic to description logics. Artificial Intelligence 226, 1–33 (2015) 19. Heuerding, A., Seyfried, M., Zimmermann, H.: Efficient loop-check for backward proof search in some non-classical propositional logics. In: Miglioli, P., Moscato, U., Mundici,

(13)

D., Ornaghi, M. (eds.) Proceedings of the 5th International Workshop on Theorem Prov- ing with Analytic Tableaux and Related Methods (TABLEAUX). pp. 210–225. No. 1071 in LNAI, Springer (1996)

20. Horrocks, I., Kutz, O., Sattler, U.: The even more irresistibleSROIQ. In: Doherty, P., My- lopoulos, J., Welty, C. (eds.) Proceedings of the 10th International Conference on Principles of Knowledge Representation and Reasoning (KR). pp. 57–67. Morgan Kaufmann (2006) 21. Horrocks, I., Sattler, U.: Decidability ofSHIQwith complex role inclusion axioms. Artifi-

cial Intelligence 160, 79–104 (2004)

22. Horrocks, I., Sattler, U., Tobies, S.: Reasoning with individuals for the description logic SHIQ. In: MacAllester, D. (ed.) Proceedings of the 17th International Conference on Au- tomated Deduction (CADE). pp. 482–496. No. 1831 in LNCS, Springer (2000)

23. Kraus, S., Lehmann, D., Magidor, M.: Nonmonotonic reasoning, preferential models and cumulative logics. Artificial Intelligence 44, 167–207 (1990)

24. Lehmann, D., Magidor, M.: What does a conditional knowledge base entail? Artificial Intel- ligence 55, 1–60 (1992)

25. Quantz, J., Royer, V.: A preference semantics for defaults in terminological logics. In: Pro- ceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR). pp. 294–305 (1992)

26. Schild, K.: A correspondence theory for terminological logics: Preliminary report. In: Pro- ceedings of the 12th International Joint Conference on Artificial Intelligence (IJCAI). pp.

466–471 (1991)

27. Sengupta, K., Alfa Krisnadhi, A., Hitzler, P.: Local closed world semantics: Grounded cir- cumscription for OWL. In: Aroyo, L., Welty, C., Alani, H., Taylor, J., Bernstein, A., Kagal, L., Noy, N., Blomqvist, E. (eds.) Proceedings of the 10th International Semantic Web Con- ference (ISWC). pp. 617–632. No. 7031 in LNCS, Springer (2011)

28. Shoham, Y.: Reasoning about Change: Time and Causation from the Standpoint of Artificial Intelligence. MIT Press (1988)

29. Simanˇcík, F.: Elimination of complex RIAs without automata. In: Proceedings of the 25th International Workshop on Description Logics. CEUR, vol. 846 (2012)

Références

Documents relatifs

Under this situation our main contribution is a brief study of the nature and status of intentional reasoning following the hypothesis that intentional reasoning is a form of

We define a (naïve) tableau- based algorithm for checking preferential consistency of contextual defeasible knowledge bases, a central piece in the definition of other forms

Therefore, this research focused on a qualitative comparison of the degree of explainability of defeasible argumentation and non-monotonic fuzzy reasoning in a real-world

For reasoning, we first provide a method of reducing satisfiability checking and conjunctive query answering in Hi(Horn-SROIQ) to the corresponding reasoning tasks in Horn-SROIQ

Preferential extensions of classical logics provide a promising foun- dation on which to base notions of entailment for defeasible reasoning.. In this talk I will give an overview

School of Engineering and Information Technology University of New South Wales, Canberra..

Note that if we are confronted with a strict query (classical inclusion axiom C v D), one can determine if it is in the Rational Closure of the KB by checking if it is

rational closure, into DLs on the other hand, we have defined two new constraints, a defeasible subclass relation and a defeasible mandatory participation, that are appro- priate