<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards Practical Deletion Repair of Inconsistent DL-programs?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Thomas Eiter</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michael Fink</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Daria Stepanova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Information Systems Vienna University of Technology Favoritenstraße 9-11</institution>
          ,
          <addr-line>A-1040 Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Nonmonotonic Description Logic (DL-) programs couple nonmonotonic logic programs with DL-ontologies through queries in a loose way which may lead to inconsistency, i.e., lack of an answer set. Recently defined repair answer sets remedy this but a straightforward computation method lacks practicality. We present a novel evaluation algorithm for deletion repair answer sets based on support sets, which reduces evaluation of DL-LiteA ontology queries to constraint matching. This leads to significant performance gains towards inconsistency management in practice.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        The need for combining rules with ontologies has led to different approaches (see [12]
and references therein). Among them Nonmonotonic Description Logic (DL-) programs
[8] embody a loose coupling of rules and a DL-knowledge base (i.e., ontology) which
the rules can query through special DL-atoms. As the ontology may be enriched before
query evaluation, a bidirectional flow of information enables one to solve advanced
reasoning tasks on top of ontologies. On the other hand, the information flow may lead
to inconsistency, that is, cause a DL-program to lack answer sets (i.e., models).
Example 1. Consider the DL-program in Figure 1, which represents information
about children of a primary school and their parents in simplistic form [7]. It has an
ontology O consisting of a concept taxonomy (TBox) T in (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )-(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) and a set A of
assertions (ABox), i.e. facts, about individuals in (
        <xref ref-type="bibr" rid="ref4">4</xref>
        )-(
        <xref ref-type="bibr" rid="ref6">6</xref>
        ). The rules P contain further
facts (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ), (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) and proper rules: (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ) determines fathers from the ontology, upon feeding
information to it; (
        <xref ref-type="bibr" rid="ref10">10</xref>
        ) checks, informally, against them for local parent information
(ischildof ) that a child has surely not two fathers, unless it is adopted; finally (
        <xref ref-type="bibr" rid="ref11">11</xref>
        )-(
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
single out contact persons for children (by default, the parents); for adopted children,
fathers in O are omitted if some other contact exists. Inconsistency arises as john, who
is not provably adopted, has pat as father by the ontology, and by the local information
possibly also alex .
      </p>
      <p>An inconsistent program may be unusable since it yields no answer set. To cope with
this, notions of DL-program repair (under different semantics) have been formalized
? Supported by the Austrian Science Fund (FWF) project P24090</p>
      <p>
        over a family ontology
O =
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) Child v 9hasParent (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) Adopted v Child (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) Female v :Male
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) Male(pat ) (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) Male(john) (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) hasParent (john; pat )
8 (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) ischildof (john; alex ); (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) boy(john); 9
P = &gt;&gt;&gt;&gt;&gt;&gt;&lt;&gt; ((91)0)h?asfathneort(XD;LY[;)AdoDptLed[ M](aXle);]Y1b o6=y;YM2;ahlaes](faYth);eDr(LX[;; hYa1s)P;iasrcehniltd]o(Xf(;XY;)Y; 2); &gt;&gt;&gt;&gt;&gt;&gt;=&gt;
&gt;&gt;&gt;&gt;&gt;&gt;&gt;: ((1112)) coomnitta(cnXto(;tXYD;)LY[)ChDiLldD[;]LA[b;dohoyap;steP:daM]r(eaXnle)t];]((ZYX26=;);YY);; hnaostfaotmheitr((XX;;YY));; contact (X; Z) &gt;&gt;&gt;&gt;&gt;&gt;;&gt;
recently [7]. They give rise to so-called repair answer sets under the supposition of
suitable changes to the ABox (data) of the ontology. As for repair computation, however,
a natural realization of corresponding algorithms turns out to be too naive and does not
scale for practical applications due to large number of ABoxes to be checked in general.
      </p>
      <p>We thus propose an alternative approach for repair answer set computation which
is based on the notion of support sets. Intuitively, a support set for a ground DL-atom
a = DL[ ; Q](t) is a set of assertions which together with the original TBox is sufficient
for the given DL-query Q(t) to be derived.</p>
      <p>Our basic method is to precompute small support sets for each DL-atom on a
nonground level. Then during the DL-program evaluation, for each candidate interpretation
the ground instantiations of the support sets are effectively obtained. These help to prune
the answer set search space and they are also used for the ABox repair construction.</p>
      <p>This approach is particularly attractive for DL-LiteA ontologies, for which it scales
much better then the naive approach [7], as the number of necessary support sets is small
and they are easy to compute.</p>
      <p>
        Our contributions on DL-program repair computation are:
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) We formally establish support sets as sound and complete structures for DL-atom
evaluation avoiding ontology access. Moreover, this characterization is faithfully lifted
to the nonground level, enabling scalability of exploitation.
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) Nonground support sets for DL-atoms over DL-LiteA ontologies can not only
be efficiently computed, but also turn out to be small. We utilize this fact to devise
an algorithm for the effective computation of deletion repairs of DL-programs under
so-called p semantics and discuss potential generalizations.
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) We report experimental results obtained implementing our approach and
evaluating its scalability on a set of benchmark scenarios; they provide evidence for the
effectiveness of the method.
2
      </p>
      <p>Preliminaries
We start with briefly recalling DL-programs and repair answer sets; see [8; 7] for details.
Syntax. A DL-program is a pair = hO; Pi of a finite ontology O and a finite set of
rules P defined as follows.</p>
      <p>O is a DL-knowledge base (or ontology) over a signature o = hI; C; Ri with a set
I of individuals, a set C of concept names and a set R of role names. We assume here
throughout that O = T [ A is a consistent DL-LiteA KB [3] with a TBox T and ABox
A, which are sets of axioms capturing taxonomic resp. factual knowledge. Concepts C
and roles R obey the following syntax, where A 2 C is an atomic concept and U 2 R
is an atomic role:</p>
      <p>C ! A j 9R B ! C j :C R ! U j U S ! R j :R</p>
      <p>TBox axioms are of the form C v B and R v S (inclusion axiom), or (func R)
(functionality axiom). ABox contains positive and negative fact assertions.</p>
      <p>When the distinction between concepts and roles is immaterial, P denotes a possibly
negated predicate from C [ R and P is the opposite of P , i.e. P = :P and :P = P .</p>
      <p>
        The logic program part P of = hO; Pi consists of the rules r of the form
a1 _ : : : _ an
b1; : : : ; bk; not bk+1; : : : ; not bm ;
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
where each ai, 0 i n, is an lp-atom and each bi 1 i m, is either an lp-atom or
a DL-atom; here
      </p>
      <p>an lp-atom is a first-order atom p(t) with predicate p from a set P of predicate
names disjoint with C and R, and constants from the set C = I;
a DL-atom a(t) is of form DL[ ; Q](t), where
= S1 op1 p1; : : : ; Sm opm pm;
m
0;
is such that, for 1 i m, Si 2 C [ R, opi 2 f]; [g is an update operator, and
pi 2 P is an input predicate of the same arity as Si—intuitively, opi = ] (resp., opi = [)
increases Si (resp., :Si) by the extension of pi; Q(t) is a DL-query, which is either of
the form (i) C(t), where C is a concept and t is a term; (ii) R(t1; t2), where R is a role
and t1; t2 are terms; or (iii) :Q0(t) where Q0(t) is from (i)-(ii). We skip (t) for t = 1 .
If n = 0, the rule is a constraint.</p>
      <p>
        Example 2 (cont’d). A DL-atom DL[Male ] boy ; Male](Y ) contained in the rule (
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
of Example 1 first enriches the concept M ale in O by the extension of the predicate boy
in P via ], and then queries the concept Male over the modified ontology.
Semantics. The semantics of a DL-program = hO; Pi is defined in terms of its
grounding gr( ) = hO; gr(P)i over C, i.e., gr(P) contains all ground instances of
rules r in P over C. In the remainder, by default we assume that is ground.
      </p>
      <p>
        A (Herbrand) interpretation of is a set I HB of ground atoms, where HB is
the usual Herbrand base w.r.t. C and P; I satisfies an lp-atom a, if a 2 I and a DL-atom
a of the form (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) if
      </p>
      <p>O [</p>
      <p>I (a) j= Q(c)
where I (a) = Sim=1 Ai(I), and</p>
      <p>Ai(I) = fSi(t) j pi(t) 2 Ig, for opi = ];
Ai(I) = f:Si(t) j pi(t) 2 Ig, for opi = [.</p>
      <p>Satisfaction of a DL-rule r resp. set P of rules by I is then defined as usual, where
I satisfies not bj if I does not satisfy bj ; I satisfies , if it satisfies each r 2 P. We
denote that I satisfies (is a model of) an object o (atom, rule, etc.) by I j=Oo.
1 We disregard here for simplicity the less used constraints-operator \ and subsumption queries.
Example 3 (cont’d). In Example 1, I = fischildof (john; alex ), boy (john)g
satisfies a = DL[Male ] boy ; Male](john), since O [ I (a) j= Male(john), while
I 6j=ODL[; Adopted ](john), as the input list is empty and O 6j= Adopted (john).</p>
      <p>An ( p-)answer set of = hT [ A; Pi is any interpretation I that is a -minimal
model of the p-reduct FILP , which maps any set P of rules and I HB to the rule
set PFLP = frFLP j r 2 gr(P)g, where rFILP = r if the body of r is satisfied, i.e.,</p>
      <p>I I
I j=O bi, for all bi, 1 i k and I 6j=O bj , for all k &lt; j m; otherwise, rFILP is
void.</p>
      <p>
        A DL-program is inconsistent, if it has no answer set. An interpretation I is an
( p-)deletion repair answer set of = hT [ A; Pi, if it is an p-answer set of some
0 = hT [ A0; Pi where A0 A; any such A0 is called a deletion repair of .
Example 4 (cont’d). As mentioned, is inconsistent; if we drop (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) from A, then
I = fboy (john); ischildof (john; alex ), contact (john; pat )g is an answer set. Along
with the facts (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) and (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) the p-reduct PFILP contains the ground rule (
        <xref ref-type="bibr" rid="ref11">11</xref>
        ), where X and
Y are substituted by john and pat respectively. The interpretation I1 = fboy (john);
ischildof (john; alex )g is a deletion repair answer set with a deletion repair A01 =
fMale(pat ); Male(john)g.
      </p>
      <p>In DL-LiteA ontologies, inconsistency arises by few assertions.</p>
      <p>Proposition 1 (cf. [3]). In DL-LiteA given a TBox T every -minimal ABox A such
that T [ A is inconsistent fulfills jAj 2.</p>
      <p>From this result it is not hard to establish that 3 distinct constants occur in such an A.
3</p>
      <p>Support Sets
In this section, we introduce support sets for DL-atoms. Intuitively, a support set for a
DL-atom d = DL[ ; Q](t) is a portion of its input that, together with ABox assertions,
is sufficient to conclude that the query Q(t) will evaluate to true, i.e, that given a subset
I0 I of an interpretation I and a set A0 A of ABox assertions from the ontology, we
can conclude that I j=O Q(t). The evaluation of d w.r.t. I reduces then to test whether
some support set S = I0 [ A0 exists; to this end, a sufficient collection of such sets S
can be precomputed and stored. Fortunately, for DL-LiteA this is efficiently possible.</p>
      <p>To simplify matters and avoid dealing with I0 separately, it is convenient to introduce
input assertions as follows.</p>
      <p>Definition 1. Given a DL-atom d = DL[ ; Q](t), we call Pp(c) an input assertion for
d, if P p 2 , 2 f]; [g and c 2 C, where Pp is a fresh ontology predicate; Ad is
the set of all such assertions.</p>
      <p>For a TBox T and DL-atom d, let then Td = T [ fPp v P j P ] p 2 g [ fPp v
:P j P [p 2 g, and for an interpretation I, let OdI = Td [A[fPp(t) 2 Ad j p(t) 2 Ig.
Then we have:
I j=O d iff I j=OdI DL[ ; Q](t) iff OdI j= Q(t).</p>
      <p>Proposition 2. For every O = T [ A, DL-atom d = DL[ ; Q](t) and interpretation I,</p>
      <p>
        Unlike (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), in OdI there is a clear distinction between native assertions and input
assertions of d w.r.t. I (via facts Pp and axioms Pp v (:)P ), mirroring the lp-input of d.
      </p>
      <p>Now, in view of the property that in DL-LiteA a single assertion is sufficient to
derive a query [3] from a consistent ontology, we obtain support sets as follows.
Definition 2 (Ground Support Sets). Given a ground DL-atom d = DL[ ; Q](t), a
set S of assertions from A [ Ad is a support set for d w.r.t. an ontology O = T [ A, if
either (i) S = fP (c)g and Td [ S j= Q(t), or (ii) S = fP (c); P 0(d)g such that Td [ S
is inconsistent, where c [ d has at most three distinct constants; by SuppO(d) we denote
the set of all such S.</p>
      <p>Support sets are linked to interpretations by the following notion.</p>
      <p>Definition 3. A support set S of a DL-atom d is coherent with an interpretation I, if for
each Pp(c) 2 S it holds that p(c) 2 I.</p>
      <p>Example 5 (cont’d). The set fhasParent (john; pat )g is a support set for the DL-atom
DL[; hasParent ](john; pat ) w.r.t. O, and so is fMale(pat )g for the DL-atom a =
DL[Male ] boy ; Male](pat ). Moreover, fMaleboy (pat )g is in SuppO(a) but
incoherent with minimal models of .</p>
      <p>The evaluation of d w.r.t. I then reduces to the search for coherent support sets.
Proposition 3. Let d be a ground DL-atom, let O = T [ A be an ontology, and let I be
an interpretation. Then, I j=O d iff some S 2 SuppO(d) exists s.t. S is coherent with I.</p>
      <p>As a simple consequence, we get:
Corollary 1. Given a ground DL-atom d and an ontology O, there exists an
interpretation I such that I j=O d iff SuppO(d) 6= ;.
3.1</p>
      <p>Nonground Support Sets
Using support sets, we can completely eliminate the ontology access for the evaluation
of DL-atoms. In a naive approach, one precomputes all support sets for all ground
DL-atoms with respect to relevant ABoxes, and then uses them during the repair answer
set computation. This does not scale in practice, since support sets may be computed
that are incoherent with all candidate repair answer sets.</p>
      <p>An alternative is to fully interleave the support set computation with the search
for repair answer sets. Here we construct coherent ground support sets for each
DLatom and interpretation on the fly. As the input to a DL-atom may change in different
interpretations, its support sets must be recomputed, however, since reuse may not be
possible; effective optimizations are not immediate.</p>
      <p>A better solution is to precompute support sets on a nonground level, that is,
schematic support sets, prior to repair computation. Furthermore, in that we may leave
the concrete ABox open; the support sets for a DL-atom instance are then easily obtained
by syntactic matching. This leads to the following definition.</p>
      <p>Definition 4 (Support Set for Nonground DL-atom). Let d(X) = DL[ ; Q](X) be
a DL-atom and T be a TBox. Let V = fX; Y; Zg be distinct variables such that X V
and let C = fa; b; cg. A nonground support set for d w.r.t. T is a set S = fP (Y )g
resp. S = fP (Y ); P 0(Y 0)g such that (i) Y ; Y 0 V and (ii) for each substitution
: V ! C, the instance S = fP (Y )g (resp. S = fP (Y ); P 0(Y 0 )g) is a support
set for d(X ) w.r.t. OC = T [ AC, where AC is the set of all possible assertions over C.</p>
      <p>Here AC takes care of any possible ABox, by considering the maximal ABox
(as O O0 implies SuppO(d) SuppO0 (d)); three variables suffice as at most three
different constants are involved.</p>
      <p>Example 6 (cont’d). Certainly fhasParent (X; Y )g is a nonground support set for the
DL-atom DL[; hasParent ](X; Y ), and so are fMale(X)g and fMaleboy (X)g for the
DL-atom a(X) = DL[Male ] boy ; Male](X). But also, fMaleboy (X); Female(X)g
is a nonground support set for a(X).</p>
      <p>Nonground support sets S are sound, i.e. each instance S that matches with A [ Ad
is a support set of the ground DL-atom d w.r.t. O = T [ A; they are also complete,
i.e., every support set S of a ground DL-atom d w.r.t. O = T [ A results as such
an instance, and thus can be determined by syntactic matching. Clearly, support sets
as defined above may be subsumed by other support sets (e.g., fA(X); R(X; Y )g by
fA(X)g) and removed; for space reasons, we omit further discussion here. In the next
section, we discuss how to compute a sufficient set of nonground support sets.
3.2</p>
      <p>Determining Nonground Support Sets
Our technique for computing the nonground support sets is based on TBox classification,
which is one of the main ontology reasoning tasks. This reasoning service computes
complete information about the TBox constraints specified at the conceptual level.</p>
      <p>More formally, given a TBox T over a signature o, the TBox classification Clf (T )
determines all subsumption relations P v (:)P 0 between concepts and roles P; P 0 in
o that are entailed by T . This can be exploited for our goal to compute nonground
support sets, more precisely a complete family S of such sets. Here completeness of
S for a (non-ground) DL-atom d(X) w.r.t. O means that for every : X ! I and
S 2 SuppO(d(X )), some S0 2 S exists s.t. S = S0 0, for some extension 0 of to V .</p>
      <p>TBox classification is well studied in Description Logics [1]. For example, [9]
discusses it for E L w.r.t. concept hierarchy, and [10] studies it for the OWL 2 QL profile.</p>
      <p>Respective algorithms are thus suitable and also easily adapted for the computation of
(a complete family of) nonground support sets for a DL-atom d(X) w.r.t. O. In principle,
one can exploit Proposition 2 and resort to Td, i.e., compute the classification Clf (Td),
and determine nonground support sets of d(X) proceeding similar as for computing
minimal conflict sets [10]. To determine inconsistent support sets, perfect rewriting [3]
can be done over Pos(T ), i.e., the TBox obtained from T by substituting all negated
concepts (roles) :C (:R, :9R, :9R ) with positive replacements C (R, 9R, 9R ).</p>
      <p>In practice (and as in our implementation), it nonetheless can be worthwhile to
compute Clf (T ) first, as it is reusable for all DL-atoms. The additional axioms in Td,
i.e., those of form Pp v (:)P (according to the update operators), are handled when
determining the nonground support sets for a particular DL-atom from Clf (T ).</p>
      <p>Algorithm 1: SupRAnsSet : all deletion repair answer sets</p>
      <p>Input: =hT [ A; Pi</p>
      <p>Output: f lpRAS( )
(a) compute a complete set S of nongr. supp. sets for the DL-atoms in
(b) for I^ 2 AS( ^ ) do
(c)
(d)
(e)
(f)
(g)
(h)
end
end</p>
      <p>if SIg^r(a) = ; then pick next I^
end
A0 A n Sa02Dn SIg^r(a0);
if pFND (I^; hT [ A0; Pi) then output I^j
Dp fa j ea 2 I^g; Dn 2 fa j nea 2 I^g; SIg^r Gr(S; I^; A);</p>
      <p>^ ^
if SIgr(a) 6= ; for a 2 Dp and every S 2 SIgr(a) for a 2 Dn fulfills S \ A 6= ; then
for all a 2 Dp do
if some S 2 SIg^r(a) exists s.t. S \ A = ; then pick next a
else remove each S from SIg^r(a) s.t. S \ A \ Sa02Dn SIg^r(a0) 6= ;
Example 7 (cont’d). Consider the DL-atom a = DL[Male ] boy ; Male](X) in our
running example. For computing a complete family S of nonground support sets for a w.r.t.
O, we may refer to Ta = T [ fMaleboy v Maleg and its classification Clf (Ta). Hence,
S1 = fMale(X)g and S2 = fMaleboy (X)g are the only unary nonground support sets
of a. Further nonground support sets are obtained by computing minimal conflict sets,
yielding fP (X); :P (X)g for each P 2 C [ R, as well as fMaleboy (X); :Male(X)g,
fMale(X); Female(X)g, and fMaleboy (X); Female(X)g. However, since we are
interested in completeness w.r.t. O and O is consistent, pairs not involving input assertions
can be dropped (as they will not have a match in A). The remaining two sets are supersets
of S2, therefore S = fS1; S2g is a complete family of support sets for a w.r.t. O.
4</p>
      <p>Repair Answer Set Computation
We are now ready to describe our algorithm for computing deletion repair answer sets
with the use of support sets. DL-programs are evaluated usually (as in DLVHEX) by
means of a rewriting ^ of gr( ), where DL-atoms a are replaced by ordinary atoms ea
(replacement atoms), together with a guess on their truth by additional ‘choice’ rules
ea _ nea, where nea stands for negation of ea. We denote interpretations of ^ by I^, and
use I^j to denote their restriction to the original language of .</p>
      <p>A basic algorithm for computing repair answer sets was given in [7]. It checks
whether candidates I^ (i.e., answer sets of ^ ) yield repair answer sets by solving a
corresponding ontology repair problem (ORP). Intuitively, solutions to an ORP correspond to
(potentially) modified ABoxes A0 (not necessarily obtained by deletion, i.e. subsets of
A) such that all DL-atoms evaluate as guessed in I^ (formally I^ is a compatible set of
hT [ A0; Pi, cf. [7]); they are computed through multiple calls to the external ontology
via a query interface to evaluate DL-atoms under varying ABoxes. A final foundedness
check (subset minimality of I^j w.r.t.
answer sets.</p>
      <p>Our new algorithm SupRAnsSet (see Algorithm 1), avoids instead multiple interface
calls and merely needs to access the ontology once. Given a (ground) DL-program
for input, SupRAnsSet proceeds as follows. We start (a) by computing a complete
family S of nonground support sets for each DL-atom. Afterwards the replacement
program ^ is created and its answer sets are computed one by one. Once an answer
set I^ of ^ is found (b), we first determine the sets of DL-atoms Dp (resp. Dn) that are
guessed true (resp. false) in I^. Next, for all ground DL-atoms in Dp [ Dn, the function
Gr(S; I^; A) instantiates S to relevant ground support sets, i.e., that are coherent with
I^ and match with A [ Aa. We then check in (c) for atoms in Dp (resp. Dn) without
support (resp. input only support). If either is the case, we skip to (b), the next model
candidate, since no repair exists for the current one. Otherwise, in a loop (d) over atoms
in Dp—except for those supported input only (e)—we remove support sets S that are
conflicting w.r.t. Dn. Intuitively, this is the case if S hinges on an assertion 2 A
that also supports some atom a0 2 Dn (hence needs to be deleted; note that due to
consistency of A, even inconsistent support of a0 leaves no choice). If this operation
leaves the atom from Dp under consideration without support (check at (f)), then no
repair exists and the next model candidate is considered. Otherwise (exiting the loop
at (g)), a potential deletion repair A0 is obtained from A by removing assertions that
occur in any support set for some atom a0 2 Dn. An eventual check (h) for foundedness
(minimality) w.r.t. A0 determines whether a deletion repair answer set has been found.
Example 8 (cont’d). Suppose fea; nebg I^ for a = DL[; hasParent ](john; pat ) and
b = DL[Male ] boy ; Male](pat ). Then, SIg^r(a)= ffhasParent (john; pat )gg we get
to the else part of Step (e) where nothing is removed from SIg^r(a), since SIg^r(b) =
ffMale(pat )gg and SIg^r(a) \ SIg^r(b) = ;. Hence, at Step (g) we must drop Male(pat )
from A to make I^ a deletion repair answer set.</p>
      <p>As can be shown, algorithm SupRAnsSet correctly computes the deletion repair answer
sets of the input DL-program. For the completeness part, i.e., that all deletion repair
answer sets are indeed produced, the following proposition is crucial.</p>
      <p>Proposition 4. Given a DL-program , let I^ be an answer set of ^ such that I = I^j
is an answer set of = hT [ A; Pi. If I^ is a compatible set for 0 = hT [ A0; Pi
where A0 A, then I is an answer set for 0 = hT [ A0; Pi.</p>
      <p>Armed with this result, we establish the correctness result.</p>
      <p>Theorem 1 SupRAnsSet is sound and complete w.r.t. deletion repair answer sets.</p>
    </sec>
    <sec id="sec-2">
      <title>5 Implementation and Experiments</title>
      <p>We implemented Algorithm SupRAnsSet within the DLVHEX evaluation framework2,
which allows us to effectively compute deletion repair answer sets for DL-LiteA. In
2 http://www.kr.tuwien.ac.at/research/systems/dlvhex
order to profit from existing DLVHEX data structures (e.g. for parsing) and optimization
methods (such as nogood learning, etc.), we pursued a declarative ASP approach to
realize SupRAnsSet . This applies to (a) computing complete nonground support families
and to (b) searching candidate deletion repair answer sets and deletion repairs.</p>
      <p>As for (a), we use a (stratified) logic program that intuitively mimics perfect rewriting
to compute classifications relevant for support set computation on top. The logic program
reifies concepts (roles, etc.), as well as positive replacements. Facts express
subsumptions in Pos(T ), their contra-positives, and the duality of concepts (roles, etc.) and
positive replacements of their negation. A simple rule transitively closes the subsumption
relation; support sets are naturally expressed (and thus computed), using unary and
binary predicates to represent respective support for a DL-atom, the query and relevant
concepts (roles) as from the input signature.</p>
      <p>Concerning (b), non-ground rules (see below) are added to ^ for the purpose of
filtering candidate deletion repair answer sets as done by SupRAnsSet . Therefore, the
language of ^ is extended to include support set information. For any nonground support
set S that covers a ground DL-atom a, the additional rules are of the form:
SA
r(S); nea;
supa
r(S); ea; not SA;
ea; not supa ;
where r(S) is a suitable representation of S, i.e., using predicates p(X) for input
assertions Pp(X), resp. pP (X) (npP (X)) for ABox assertions P (X) (:P (X)).
Furthermore, pP , npP , and supa are fresh predicates not in P, and SA refers to npP (X)
(resp. pP (X)) if S \ A 6= ; and the assertion is positive (resp. negative), otherwise it
is void. With further constraints pP (X); npP (X), the resulting program intuitively
prunes candidates I^, resp. encodes deletion repair candidates, according to SupRAnsSet .
Experimental Setup. We have evaluated the approach by comparing it with ordinary
answer set computation on two scenarios. They were run on a Linux server with two
12-core AMD 6176 SE CPUs/128GB RAM using DLVHEX 2.3.0; a timeout of 120 secs
was set for each run.</p>
      <p>
        Family Benchmark. The first benchmark is derived from our running example. We fixed
two ABoxes with A50 and A1000, of different size, where A50 contains 50 children (7
adopted), 20 female and 32 male adults; and twenty times that many for A1000. Every
child has at most two parents of different sex and the number of children per parent varies
from 1 to 3. Rules (
        <xref ref-type="bibr" rid="ref11">11</xref>
        ) and (
        <xref ref-type="bibr" rid="ref12">12</xref>
        ), not involved in conflicts, have been dropped from P.
Instances are varied in terms of facts over I included in P by increasing the probability
p=100 (p ranges from 5 to 35): for every child c, one additional fact isChildOf (c; p)
is added with probability p=100 for a random male adult non-parent; as well boy(c) is
included with probability p=100.
      </p>
      <p>Network Benchmark. In the second scenario a network is described by a fixed ontology
O using a relation edge. Some nodes might be broken or blocked. There are overall 70
nodes, (among them 23 broken and rest available). There are 68 edges (among them 5
forbidden). The TBox encodes that if an edge is forbidden, then its endpoint must be
blocked, and if a node is known to be broken, then it is automatically blocked, moreover
blocked nodes are not available:</p>
      <p>
        p AS A50 rep ASA1000 rep p ASPconnrep ASPguessrep
5 (25) 0.12 (0) 0.19 (0) 63.93 (0) 36.70 (0) 10 (25) 0.19 (0) 0.13 (0) 0.48 (0) 0.16 (0)
10 (25) 0.12 (0) 0.19 (0) 63.77 (0) 37.59 (0) 20 (25) 0.19 (0) 0.44 (0) 0.48 (0) 0.37 (0)
15 (25) 0.12 (0) 0.20 (0) 63.98 (0) 38.29 (0) 30 (25) 0.19 (0) 1.28 (0) 0.51 (0) 0.86 (0)
20 (25) 0.12 (0) 0.20 (0) 63.90 (0) 39.17 (0) 40 (25) 0.19 (0) 2.36 (0) 0.53 (0) 1.31 (0)
25 (25) 0.12 (0) 0.20 (0) 63.82 (0) 39.97 (0) 50 (25) 0.19 (0) 5.60 (0) 0.57 (0) 3.00 (0)
30 (25) 0.12 (0) 0.21 (0) 63.97 (0) 40.77 (0) 60 (25) 0.19 (0) 8.83 (0) 0.60 (0) 5.03 (0)
35 (25) 0.12 (0) 0.21 (0) 63.18 (0) 41.41 (0) 70 (25) 0.19 (0) 15.92 (0) 0.64 (0) 7.27 (0)
80 (25) 0.20 (0) 25.89 (0) 0.69 (0) 11.45 (0)
time in seconds for first ordinary and 90 (25) 0.20 (0) 37.33 (0) 0.75 (0) 16.95 (0)
deletion repair answer set 100 (25) 0.20 (0) 55.43 (0) 0.87 (0) 16.38 (0)
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) go(X; Y ) open(X); open(Y ); DL[; edge](X; Y ):
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) route(X; Z) route(X; Y ); route(Y; Z):
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) route(X; Y ) go(X; Y ); not DL[Block ] block ; forbid ](X; Y ):
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) open(X) _ block (Y ) node(X); not DL[; :Avail ](X):
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) negIs(X) node(X); route(X; Y ); X 6= Y:
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) ? node(X); not negIs(X):
Intuitively, (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) recursively determine routes over non-blocked (open) nodes;
where (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) expresses that by default a route is recommended unless it is known to be
forbidden. Rule (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) amounts to guessing for each node not known to be unavailable,
whether it is blocked or not, i.e. it contains nondeterminism, which makes rule processing
challenging. Rules (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) and (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) encode the requirement that no input node is isolated w.r.t.
the resulting routes.
      </p>
      <p>
        The program Pconn contains the same random node facts as Pguess and facts in(n)
and out (n), either for each node n with equal probability (i.e., in with p = 1=2, out ,
otherwise). It contains the rules (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) above, and variants of (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) and (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ):
(30) route(X; Y ) go(X; Y ); not DL[; forbid ](X; Y ):
(40) open(X) node(X); not DL[; :Avail ](X):
(60) ? in(X); out (Y ); not route(X; Y ):
Intuitively, rather than guessing, (40) expresses that each node is open by default unless
known to be unavailable, and by (60) the program checks whether each in-node is
connected to all out-nodes (thus ensuring they are available, i.e. not blocked).
Results. The results that we obtained for these settings are given in Table 1. Instances
are grouped by the probability (the value p) used for generating them. For each p, 25
instances were generated and their average running time (in seconds) to compute a first
answer set and deletion repair answer set is reported. The naive approach [7] has not been
implemented (but expectedly would time out for even the smallest problem instances).
      </p>
      <p>Despite a small overhead for computation of deletion repair answer sets compared to
ordinary ones the results for the family problem with A50 scale well. For A1000 the first
repair answer set is found quicker then the inconsistency is identified during ordinary
answer set computation. Liberal safety [5] exploited in the experiments improves greatly
the running time both for repair and ordinary answer set computation modes.</p>
      <p>
        In the Network domain, as expected, running times grow exponentially with the
instance size for Pguess due to the guessing rule (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ). Employing a default in Pconn rather
than guessing scales linearly, however. For Pconn we also considered different splits
(rather than p = 1=2) between in and out , although without significant change.
      </p>
      <p>Additionally, our approach has been evaluated on inconsistent programs over the
LUBM3 ontology; more precisely, over a DL-LiteA version together with a fixed,
generated4 ABox (1 university with over 500 students, 50 courses and 29 teaching
assistants). Rules encode default reasoning under constraints: teaching assistants (TAs)
are normally students, and TAs must not take the exam of a course they teach. Facts
takesExam(c1; c2) have been randomly added to the program with a probability between
0:05 to 0:2. A first repair answer set is found for all instances within 4 seconds, while
detecting inconsistency with ordinary answer set computation takes about 1 minute.</p>
      <p>These results indicate the effectiveness of our approach for practical settings.
6</p>
      <p>Conclusion
Support sets reduce the evaluation of DL-atoms over DL-LiteA ontologies to constraint
matching, providing a base for effective deletion repair answer set computation under
psemantics. Our results, and in particular algorithm SupRAnsSet , easily extend to other
semantics, e.g., weak repair answer sets [7], and to other notions of repairs. Furthermore,
support sets are used in a companion work to compute answer sets of HEX-programs
[6]. As external atoms lack an explicit data part (ABox), support sets ought to be more
abstract, which makes direct efficient usage less clear; repair is an open issue.</p>
      <p>Note that algorithm SupRAnsSet constructs in its search all maximal deletion
repairs, i.e., -maximal repairs A0 A that admit an answer set (however, it also may
construct non-maximal repairs). In this regard it is similar to work on ABox cleaning [11;
13]. There, an inconsistent ontology (with consistent TBox) is repaired by identifying
and eliminating minimal conflict sets causing, i.e., explaining, the inconsistency, thus
resulting in maximal deletion repairs. However, our setting and work differ
fundamentally: (i) the ontology is consistent and inconsistency arises only through the interface
of DL-atoms, and (ii) several DL-atom queries have to be considered (entailment or
non-entailment) under different potential ABox updates.</p>
      <p>More remotely related to our work are approaches for explaining positive and
negative answers to conjunctive queries in DL-Lite [4; 2], as they apply the perfect
reformulation algorithm [3] and then extract explanations in a nontrivial way.</p>
      <p>In ongoing work, we consider restricted repairs [7] and an extension of our approach
to other DLs like E L. While no small complete support families exist for E L in general,
this might still apply for practically relevant fragments. Furthermore incomplete support
families can be used for optimization (caching) to reduce access to an E L reasoner.
3 http://swat.cse.lehigh.edu/projects/lubm/
4 http://code.google.com/p/combo-obda/</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F.</given-names>
          </string-name>
          :
          <article-title>The Description Logic Handbook: Theory, Implementation, and Applications</article-title>
          . Cambridge University Press, New York, NY, 2nd edn. (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Borgida</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodriguez-Muro</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Explanation in DL-Lite</article-title>
          . In: Baader,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Lutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Motik</surname>
          </string-name>
          ,
          <string-name>
            <surname>B</surname>
          </string-name>
          . (eds.)
          <article-title>Description Logics</article-title>
          .
          <source>CEUR Workshop Proc.</source>
          , vol.
          <volume>353</volume>
          . CEURWS.org (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomo</surname>
            ,
            <given-names>G.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Tractable reasoning and efficient query answering in description logics: The DL-Lite family</article-title>
          .
          <source>J. Autom. Reasoning</source>
          <volume>39</volume>
          (
          <issue>3</issue>
          ),
          <fpage>385</fpage>
          -
          <lpage>429</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ortiz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simkus</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stefanoni</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>The complexity of explaining negative query answers in DL-Lite</article-title>
          . In: Brewka,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Eiter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>McIlraith</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.A</surname>
          </string-name>
          . (eds.)
          <source>Principles of Knowledge Representation and Reasoning: Proc. of 13th International Conference, KR 2012</source>
          , pp.
          <fpage>583</fpage>
          -
          <lpage>587</lpage>
          . AAAI Press (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fink</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krennwallner</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Redl</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Liberal safety for answer set programs with external sources</article-title>
          . In: desJardins,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Littman</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.L</surname>
          </string-name>
          . (eds.)
          <source>Proc. of 27th Conf. on Artificial Intelligence (AAAI '13)</source>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>275</lpage>
          . AAAI Press (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fink</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Redl</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stepanova</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Exploiting support sets for answer set programs with external evaluations</article-title>
          . In: Brodley,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Stone</surname>
          </string-name>
          , P. (eds.)
          <source>Proc. 28th Conf. on Artificial Intelligence (AAAI '14)</source>
          , AAAI Press (
          <year>2014</year>
          ), To appear.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fink</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stepanova</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Data repair of inconsistent dl-programs</article-title>
          . In: Rossi,
          <string-name>
            <surname>F</surname>
          </string-name>
          . (ed.)
          <source>Proc. 23rd International Joint Conf. on Artificial Intelligence (IJCAI-13)</source>
          , pp.
          <fpage>869</fpage>
          -
          <lpage>876</lpage>
          . AAAI Press/IJCAI (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ianni</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukasiewicz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schindlauer</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tompits</surname>
          </string-name>
          , H.:
          <article-title>Combining answer set programming with description logics for the Semantic Web</article-title>
          .
          <source>J. Artificial Intelligence</source>
          <volume>172</volume>
          (
          <fpage>12</fpage>
          -
          <lpage>13</lpage>
          ),
          <fpage>1495</fpage>
          -
          <lpage>1539</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kazakov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , Kro¨tzsch,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Simancik</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.</surname>
          </string-name>
          :
          <article-title>The incredible ELK - from polynomial procedures to efficient reasoning with E L ontologies</article-title>
          .
          <source>J. Autom. Reasoning</source>
          <volume>53</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>61</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santarelli</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savo</surname>
            ,
            <given-names>D.F.</given-names>
          </string-name>
          :
          <article-title>A graph-based approach for classifying OWL 2 QL ontologies</article-title>
          . In: Eiter,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Glimm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Kazakov</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          , Kro¨tzsch, M. (eds.)
          <article-title>Description Logics</article-title>
          .
          <source>CEUR Workshop Proc.</source>
          , vol.
          <volume>1014</volume>
          , pp.
          <fpage>747</fpage>
          -
          <lpage>759</lpage>
          . CEUR-WS.org (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Masotti</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruzzi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Practical ABox cleaning in DL-Lite (progress report)</article-title>
          . In: Rosati,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Rudolph</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Zakharyaschev</surname>
          </string-name>
          , M. (eds.)
          <article-title>Description Logics</article-title>
          . CEUR Workshop Proce., vol.
          <volume>745</volume>
          .
          <string-name>
            <surname>CEUR-WS.org</surname>
          </string-name>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
          </string-name>
          , R.:
          <article-title>Reconciling Description Logics and Rules</article-title>
          .
          <source>Journal of the ACM</source>
          <volume>57</volume>
          (
          <issue>5</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>62</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Rosati</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruzzi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Graziosi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Masotti</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Evaluation of techniques for inconsistency handling in OWL 2 QL ontologies</article-title>
          . In: Cudre´
          <article-title>-</article-title>
          <string-name>
            <surname>Mauroux</surname>
          </string-name>
          , et al. (eds.)
          <source>International Semantic Web Conference (2). Lecture Notes in Computer Science</source>
          , vol.
          <volume>7650</volume>
          , pp.
          <fpage>337</fpage>
          -
          <lpage>349</lpage>
          . Springer (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>