<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An ABox Revision Algorithm for the Description Logic E L?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Liang Chang</string-name>
          <email>changl.guet@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Uli Sattler</string-name>
          <email>sattler@cs.manchester.ac.uk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tianlong Gu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology</institution>
          ,
          <addr-line>Guilin, 541004</addr-line>
          ,
          <country country="CN">China</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>School of Computer Science, The University of Manchester</institution>
          ,
          <addr-line>Manchester, M13 9PL</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Revision of knowledge bases (KBs) expressed in description logics (DLs) has gained a lot of attention lately. Existing revision algorithms can be divided into two groups: model-based approaches (MBAs) and formula-based approaches (FBAs). MBAs are ne-grained and independent of the syntactical forms of KBs; however, they only work for some restricted forms of the DL-Lite family. FBAs can deal with more expressive DLs such as SHOIN , but they are syntax-dependent and not ne-grained. In this paper, we present a new method for instancelevel revision of KBs. In our algorithm, a non-redundant depth-bounded model is rstly constructed for the KB to be revised; then a revision process based on justi cations is carried out on this model by treating a model as a set of assertions; nally the resulting model is mapped back to a KB which will be returned by the algorithm. Our algorithm is syntax-independent and ne-grained, and works for the DL EL?.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Description logics (DLs) are playing a central role in the Semantic Web, serving
as the basis of the W3C-recommended Web ontology language OWL [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The
main strength of DLs is that they o er considerable expressive power going far
beyond propositional logic, while reasoning is still decidable.
      </p>
      <p>
        Traditionally DLs have been used for representing and reasoning about
knowledge of static application domains [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Recently, however, there are some research
works focused on dynamic aspects of knowledge bases (KBs) based on DL. One
typical application background for these research works is ontology evolution
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], where the goal is to incorporate new information N into an original
ontology K and guarantee the consistency of resulting ontology K0. This problem is
also called KB revision in arti cial intelligence [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Another typical application
background is reasoning about actions [
        <xref ref-type="bibr" rid="ref3 ref6">3, 6</xref>
        ], where the purpose is to bring the
KB up to date when the world is changed by the execution of actions which are
described by DL assertions. This problem is called KB update [
        <xref ref-type="bibr" rid="ref10 ref12 ref15">10, 12, 15</xref>
        ]. In this
paper we investigate the revision problem.
      </p>
      <p>
        A KB K based on DL is generally composed of two parts: a TBox T for
representing intensional knowledge, and an ABox A for representing extensional
knowledge. Let K = hT ; Ai be an original KB and N a set of new information,
then there are three types of revision problems based on DLs: (1) TBox revision,
where N consists of TBox assertions only and A is empty [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ]; (2) ABox
revision, where N consists of ABox assertions only and T is assumed to be xed
[
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ]; (3) KB revision, where N consists of both TBox assertions and ABox
assertions [
        <xref ref-type="bibr" rid="ref18 ref19 ref5">5, 18, 19</xref>
        ]. In this paper we focus on the ABox revision problem.
      </p>
      <p>
        In order to capture the basic ideas and properties of revision, some postulates
were proposed and well-studied in the literature [
        <xref ref-type="bibr" rid="ref1 ref12 ref8">1, 12, 8</xref>
        ]. According to these
postulates, a revision operator or algorithm should hold the following properties:
R1: must preserve the consistency of KBs;
R2: must entail the new information and preserve the protected part;
R3: should not change the original KB if there is no con ict;
R4: should be independent of the syntactical forms of KBs; and
R5: should guarantee a minimal change.
      </p>
      <p>
        Among these properties the last one is not precisely speci ed, since there are
di erent approaches to de ne minimality for di erent applications; it is
wellaccepted that there is no general notion of minimality that will do the right
thing under all circumstances [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>According to the semantics adopted for de ning minimality, existing revision
operators and algorithms can be divided into two groups: model-based approaches
(MBAs) and formula-based approaches (FBAs).</p>
      <p>
        In model-based approaches, the semantics of minimal change is de ned by
measuring the distance between the models of new information N and the models
of original KB K [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. An advantage of MBAs is that they are independent of the
syntactical forms of the KB. However, although they work well for propositional
logic, it is di cult to adapt them to DLs. Until now, they are only applied in
the DL-Lite family for revision problems [
        <xref ref-type="bibr" rid="ref13 ref17 ref18">13, 17, 18</xref>
        ].
      </p>
      <p>
        In formula-based approaches, the semantics of minimal change is re ected in
the minimality of formulas which will be changed. One group of FBAs is based
on the deductive closure of KBs; they are powerful enough to guarantee
syntaxindependent but only works for restricted forms of DL-Lite [
        <xref ref-type="bibr" rid="ref14 ref5">5, 14</xref>
        ]. Another group
of FBAs is based on justi cations; they and capable for processing DLs such as
SHOIN , but are syntax-dependent and not ne-grained [
        <xref ref-type="bibr" rid="ref16 ref19">16, 19</xref>
        ].
      </p>
      <p>
        In this paper we present a new method for ABox revision problem. Compared
to MBAs and the FBAs based on deductive closures, our method is capable to
support the DL E L?. Compared to the FBAs based on justi cations, our method
is syntax-independent and ne-grained for the minimal change principle. The
proofs of all of our technical results are given in the technical report [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>The Description Logic E L?</title>
      <p>
        The DL E L? extends E L with bottom concept (and consequently disjointness
statements) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Let NC , NR and NI be disjoint sets of concept names, role
names and individual names, respectively. E L?-concepts are built according to
the syntax rule C ::= &gt; j ? j A j C u D j 9r:C, where A 2 NC , r 2 NR, and C; D
range over E L?-concepts.
      </p>
      <p>The semantics is de ned by means of an interpretation I = ( I ; I ), where
the interpretation domain I is a non-empty set composed of individuals, and I
is a function which maps each concept name A 2 NC to a set AI I , maps each
role name r 2 NR to a binary relation rI I I , and maps each individual
name a 2 NI to an individual aI 2 I . The function I is inductively extended
to arbitrary concepts by setting &gt;I := I , ?I := ;, (C u D)I := CI \ DI , and
(9r:C)I := fx 2 I j there exists y 2 I such that (x; y) 2 rI and y 2 CI g.</p>
      <p>A TBox T is a nite set of general concept inclusions (GCIs) of the form C v
D, where C and D are concepts. An ABox A is a nite set of concept assertions
of the form C(a) and role assertions of the form r(a; b), where a; b 2 NI , r 2 NR
and C is a concept. A knowledge base (KB) is a pair K = hT ; Ai.</p>
      <p>The satisfaction relation \j=" is de ned inductively as follows: I j= C v D
i CI DI ; I j= T i I j= X for every X 2 T ; I j= C(a) i aI 2 CI ; I j=
r(a; b) i (aI ; bI ) 2 rI ; and I j= A i I j= X for every X 2 A.</p>
      <p>I is a model of a KB K = hT ; Ai if I j= T and I j= A. We use mod(K) to
denote the set of models of a KB K. Two KBs K1 and K2 are equivalent (written
K1 K2) i mod(K1) = mod(K2).</p>
      <p>A KB K = hT ; Ai is consistent (or A is consistent w.r.t. T ) if mod(K) 6= ;.
A KB K entails a GCI, assertion or ABox X (written K j= X) if I j= X for
every I 2 mod(K). It is obvious that K is inconsistent i K j= &gt; v ? i K j=
?(a) for some individual name a occurring in K. We say that K entails a clash
if K is inconsistent.</p>
      <p>Let X be a concept, GCI, ABox assertion, TBox, ABox or KB, then NCX
(resp., NRX and NIX ) is the set of concept names (resp., role names and individual
names) occurring in X, and sig(X) = NCX [ NRX [ NIX .</p>
      <p>For any concept C, the role depth rd(C) is the maximal nesting depth of \9"
in C. Let X be an ABox or TBox, sub(X) = fC j C(a) 2 Xg if X is an ABox,
and sub(X) = S fC; Dg if X is a TBox, then the depth of X is de ned as</p>
      <p>CvD2X
depth(X) = maxfrd(C) j C 2 sub(X)g.
3</p>
    </sec>
    <sec id="sec-3">
      <title>ABox Revision for E L?</title>
      <p>Firstly we de ne the ABox revision problem in E L? as follows.</p>
      <p>De nition 1. An E L? KB K = hT ; Ai and an ABox N is a revision setting if
N is consistent w.r.t. T .</p>
      <p>A KB K0 = hT ; A0i is a solution for a revision setting K = hT ; Ai and N if
K0 is consistent and K0 j= N .</p>
      <p>In a revision setting, K = hT ; Ai is called original KB and N is new
information. The task is to incorporate new information into original KB while
preserving the TBox T and guaranteeing the consistency of KB.</p>
      <p>If we only consider the requirements on solutions speci ed in the above
definition, then a straightforward solution for a revision setting K = hT ; Ai and N
is the KB K00 = hT ; N i. However, obviously it is not a \good" solution, since
information contained in the ABox A is completely lost. Therefore, besides the
two necessary requirements, we hope that a solution has the properties speci ed
by R3-R5 in Section 1 of the paper. In the following subsections, we will show
that existing revision approaches not work well for E L? with respect to these
properties, and then illustrate our method by an example.
3.1</p>
      <p>
        Model-based Approaches
MBAs de ne revision operators over the distance between interpretations [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
Let K N be the set of models for the solution of revision setting, then K N
is generated by choosing models of hT ; N i that are minimally distant from the
models of K, i.e.,
K
      </p>
      <p>N = fJ 2 mod(hT ; N i) j there exists I 2 mod(K) such that dist(I; J ) =
minfdist(I0; J 0) j I0 2 mod(K); J 0 2 mod(hT ; N i)g g:</p>
      <p>Let be the set of concept names and role names occurring in K and N .
There are four di erent approaches for measuring the distance dist(I; J ):
{ dist]s(I; J ) = ]fX 2 j XI 6= XJ g,
{ dists (I; J ) = fX 2 j XI 6= XJ g,
{ dist]a(I; J ) = sum ](XI XJ ),</p>
      <p>X2
{ dista (I; J ; X) = XI</p>
      <p>
        XJ for every X 2
where XI XJ = (XI n XJ ) [ (XJ n XI ). Distances under dist]s and dist]a are
natural numbers and are compared in the standard way. Distances under dists
are sets and are compared by set inclusion. Distances under dista are compared
as follows: dista (I1; J1) dista (I2; J2) i dista (I1; J1; X) dista (I2; J2; X)
for every X 2 . It is assumed that all models have the same interpretation
domain and the same interpretation on individual names. In [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], the above four
di erent semantics are denoted as G]s, Gs , G]a, and Ga respectively.
      </p>
      <p>
        It was shown that, under these semantics, the ABox revision problem in
DLLite su ers from inexpressibility (i.e., the result of revision cannot be expressed
in DL-Lite) [
        <xref ref-type="bibr" rid="ref13 ref5">5, 13</xref>
        ]. The reason is that the authors hope to compute a KB K0 =
hT ; A0i such that mod(K0) = K N , and the minimality principle of change
intrinsically introduces implicit disjunction which is not supported by DL-Lite.
      </p>
      <p>
        Since E L? does not support disjunction, it is obvious that it su ers from the
same problem of inexpressibility. However, in this paper, we do not require the
solution to be a single KB. In the case that implicit disjunction is introduced by
the revision process, we will generate more than one KBs Ki0 (1 i n) such
that S mod(Ki0) = K N . As a result, the cause for inexpressibility studied
1 i n
in [
        <xref ref-type="bibr" rid="ref13 ref5">5, 13</xref>
        ] is avoided here.
      </p>
      <p>There are two reasons for us to permit multi solutions. Firstly, in some
applications, what we care about is to check whether an assertion ' holds or not
after the revision process. In this case, we can represent all the possible solutions
as a set of KBs, and check whether ' holds or not in each KB. Secondly, the
implicit disjunction introduced by revision process means that there are di erent
possible results for the revision process. We can compute and represent all the
possible results as a set of KBs and let the user or experts to select the best one.</p>
      <p>
        However, although the inexpressibility problem studied in [
        <xref ref-type="bibr" rid="ref13 ref5">5, 13</xref>
        ] can be
solved by permitting multi solutions (or disjunctive KB), if we adopt MBAs,
then there exists another cause of inexpressibility for ABox revision in EL?.
Example 1. Consider the revision setting K1 = hT ; A1i and N = fE(a)g, where
      </p>
      <p>T = fA v 9R:A; A v C; E u 9R:A v ?g; A1 = fA(a)g:</p>
      <p>Firstly, we apply the semantics Gs and G]s. Let = fA; C; E; Rg. It is obvious
that, for any interpretations I 2 mod(K1) and J 2 mod(hT ; N i), it must be
AI 6= AJ and EI 6= EJ . Therefore, fA; Eg is the minimal set of signatures
whose interpretations must be changed. So, under both Gs and G]s, we have that
K1 N = fJ 2 mod(hT ; N i) j there exists I 2 mod(K1) such that</p>
      <p>For every positive integer k, construct an interpretation Jk = ( Jk ; Jk ) as
follows: Jk = fx1; :::; xkg, aJk = x1, AJk = ;, EJk = fx1g, CJk = fx1; :::; xkg,
and RJk = f(x1; x2), ..., (xk 1; xk), (xk; xk)g. It is obvious that Jk 2 mod(hT ; N i).
Furthermore, let Ik = ( Ik ; Ik ) be an interpretation with Ik = Jk , aIk =
aJk , AIk = fx1; :::; xkg, EIk = ;, CIk = CJk , and RIk = RJk . Then it is obvious
that Ik 2 mod(K1) and consequently Jk 2 K1 N .</p>
      <p>For every positive integer k, construct another interpretation Jk0 = ( Jk0 ; Jk0 )
as follows: Jk0 = fx1; :::; xkg, aJk0 = x1, AJk0 = ;, EJk0 = fx1g, CJk0 = fx1; :::; xkg,
and RJk0 = f(x1; x2), ..., (xk 1; xk)g. Then, although Jk0 2 mod(hT ; N i), there
is no interpretation Ik0 2 mod(K1) with RIk0 = RJk0 . So, we have Jk0 2= K1 N .</p>
      <p>Now, suppose solution for the revision setting under Gs and G]s is a nite
number of KBs Ki0 = hT ; A0ii (1 i n) such that S mod(Ki0) = K1 N .
1 i n
Consider the case that k 2. From Jk 2 K1 N , there must be some solution
Ki0 = hT ; A0ii (1 i n) such that Jk 2 mod(Ki0). At the same time, from Jk0
2= K1 N , we have Jk0 2= mod(Ki0). Therefore, the ABox A0i must contain some
concept assertion X(a) such that the role depth rd(X) equals k. Since the value
of k can be in nitely big, such an ABox does not exist. In other words, solutions
under the semantics Gs and G]s can not be expressed.</p>
      <p>Secondly, we apply the semantics Ga and G]a. It is obvious that, for any
interpretations I 2 mod(K1) and J 2 mod(hT ; N i), it must be aI 2 AI , aJ 2 EJ ,
aJ 2= AJ , and aI 2= EI . Therefore, under G] , we have minfdist]a(I0; J 0) j I0 2
a
mod(K1); J 0 2 mod(hT ; N i)g = 2; under Ga , we have minfdista (I0; J 0; X)j
I0 2 mod(K1); J 0 2 mod(hT ; N i)g = fag for X 2 fA; Eg, and minfdista (I0; J 0,
X) j I0 2 mod(K1); J 0 2 mod(hT ; N i)g = ; for X 2
Ga and G]a, we have
n fA; Eg. So, under both
K1</p>
      <p>N = fJ 2 mod(hT ; N i) j there exists I 2 mod(K1) such that</p>
      <p>AI</p>
      <p>AJ = EI</p>
      <p>EJ = faI g; and</p>
      <p>We can construct a KB K10 = hT , fE(a); C(a); R(a; a)gi that satis es mod(K10)
= K1 N . Therefore, under both Ga and G]a, K10 is a solution for the revision
setting. However, this solution is very strange, since there seems to be no \good"
reason to enforce the assertion R(a; a) to hold.
tu</p>
      <p>To sum up, there are four notions of computing models in existing MBAs.
For the ABox revision problem in E L?, two notions su er from inexpressibility
and the other two notions are semantically questionable.
3.2</p>
      <p>
        Formula-based Approaches
There are two typical formula-based approaches. The rst one is based on
deductive closures [
        <xref ref-type="bibr" rid="ref14 ref5">5, 14</xref>
        ]. Given an ABox revision setting K = hT ; Ai and N , it
rstly calculates the deductive closure of A w.r.t. T (denoted clT (A)), and then
computes a maximal subset of clT (A) that does not con ict with N and T . This
method works for restricted forms of DL-Lite, where the ABox A only contains
assertions of the form A(a), 9R(a) and R(a; b), with A and R concept names
or role names. With such an assumption, clT (A) is nite and can be calculated
e ectively. However, it does not work for E L?, since in our revision setting we
allow any assertion constructed on E L? concepts occurring in the ABox A.
      </p>
      <p>
        The second FBA is based on justi cations [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Given an ABox revision
setting K = hT ; Ai and N , it rstly constructs a KB K0 = hT ; A [ N i and
nds all the minimal subsets of K0 that entail a clash (i.e., all justi cations for
clashes); then it computes a minimal set R A which contains at least one
element from each justi cation; nally it returns K0 = hT ; (A [ N ) n Ri as a
solution. Obviously this approach can deal with E L?. However, as shown by the
following examples, it is neither ne-grained nor syntax-independent.
Example 2. Consider the revision setting K1 = hT ; A1i and N described in the
previous example. It is obvious that hT ; A1 [ N i j= ?(a) and for which there is
only one justi cation J = fA v 9R:A; E u 9R:A v ?; A(a); E(a)g. Since T is
protected and E(a) 2 N , our only choice is to remove A(a) from A1 [ N and
get a solution K10 = hT ; fE(a)gi.
      </p>
      <p>This solution is not so good, since it loses many information which is entailed
by K1 and not con icted with N , such as the assertions C(a) and 9R:C(a). tu
Example 3. Consider another revision setting K2 = hT ; A2i and N , where A2 =
fA(a); C(a); 9R:C(a)g. Apply the FBA based on justi cations again, we will get
a solution K20 = hT ; fE(a); C(a); 9R:C(a)gi.</p>
      <p>Since the KBs K1 and K2 are logically equivalent, it is unhelpful that we get
two di erent solutions w.r.t. the same new information N . tu</p>
      <p>To sum up, for ABox revision in EL?, existing FBAs either can not be applied
directly, or can be applied but is syntax-dependent and not ne-grained.
3.3</p>
      <p>Our Approach
Our method is composed of three steps. Given an ABox revision setting K =
hT ; Ai and N , we rstly construct a non-redundant depth-bounded model G
(called k-MW in this paper) for the initial KB K, and treat G as an ABox AG
which contains some auxiliary variables. Then we execute a justi cation-based
revision process on the KB K0 = hT ; AGi plus the new information N , and get
a consistent KB K0 = hT ; (AG n R) [ N i. Finally we map AG n R back into an
ABox A0 by \rolling up" auxiliary variables, and get a solution K0 = hT ; A0 [N i.
Example 4. Consider the revision setting K1 = hT ; A1i and N described in
Example 1. Firstly, since maxfdepth(K1); depth(N )g = 1, we will introduce
two variables x1; x2, and construct a 1-MW G for the KB K1 (details will
be given in Section 4.1 and 4.2). By treating G as an ABox, we get AG =
fA(a); C(a); R(a; x1); A(x1); C(x1); R(x1; x2); A(x2); C(x2)g:</p>
      <p>Secondly, for the clash hT ; AG [N i j= ?(a), there are two justi cations: J1 =
fA v 9R:A; Eu9R:A v ?; E(a); A(a)g and J2 = fEu9R:A v ?; E(a); R(a; x1),
A(x1)g. Since T is protected and E(a) 2 N , we can get two possible minimal
repairs for removing the clash: R1 = fA(a); A(x1)g and R2 = fA(a); R(a; x1)g.
However, since R2 contains a role assertion R(a; x1) where x1 a variable, all the
information related to x1 will be lost if we apply R2 as a repair. Therefore, we
choose R1 as the repair and get a consistent KB K0 = hT ; (AG n R1) [ N i =
hT ; fC(a); R(a; x1); C(x1); R(x1; x2); A(x2); C(x2)g [ N i.</p>
      <p>Finally, by rolling up variables occurring in the ABox of K0, we get a solution
K0 = hT ; fC(a); 9R:(C u 9R:(A u C))(a); E(a)gi. tu</p>
      <p>In our solution, information contained in K1 is inherited as more as possible.
Furthermore, as we will see later, since the depth-bounded model G constructed
in the rst step is non-redundant, our solution is syntax-independent.
4</p>
    </sec>
    <sec id="sec-4">
      <title>ABox Revision Algorithm for E L?</title>
      <p>Before presenting our revision algorithm, we introduce three procedures which
will be used in the revision algorithm.
4.1</p>
      <p>Calculating Witness for Knowledge Base
The rst procedure will construct a possibly redundant depth-bounded model
for the initial KB based on a structure named revision graph.</p>
      <p>A revision graph for EL? is a directed graph G = (V; E; L), where
{ V is a nite set of nodes composed of individual names and variables;
{ E V V is a set of edges satisfying:
there is no edge from variables to individual names, and
for each variable y 2 V , there is at most one node x with hx; yi 2 E;
{ each node x 2 V is labelled with a set of concepts L(x); and
{ each edge hx; yi 2 E is labelled with a set of role names L(hx; yi);
furthermore, if y is a variable then ]L(hx; yi) = 1.</p>
      <p>For each edge hx; yi 2 E, we call y a successor of x and x a predecessor of
y. Descendant is the transitive closure of successor.</p>
      <p>For any node x 2 V , we use level(x) to denote the level of x in the graph, and
de ne it inductively as follows: level(x) = 0 if x is an individual name, level(x)
= level(y) + 1 if x is a variable with a predecessor y, and level(x) = +1 if x is
a variable without predecessor.</p>
      <p>Procedure 1 Given a KB K = hT ; Ai and a non-negative integer k, construct
a revision graph G = (V; E; L) by the following steps:
Step 1. Initialize the graph G as:
{ V = NIK,
{ L(a) = fC j C(a) 2 Ag for each node a 2 V ,
{ E = fha; bi j there is some R with R(a; b) 2 Ag,
{ L(ha; bi) = fR j R(a; b) 2 Ag for each edge ha; bi 2 E.</p>
      <p>Step 2. Expand the graph by applying the following rules, until none of these
rules is applicable:
GCIInd-rule: if x 2 NIK, C v D 2 T , D 2= L(x), and hT ; Ai j= C(x), then
set L(x) = L(x) [ fDg.</p>
      <p>GCIV ar-rule: if x 2= NIK, C v D 2 T , D 2= L(x), and hT ; fE(x) j E 2</p>
      <p>L(x)gi j= C(x), then set L(x) = L(x) [ fDg.
u-rule: if C1 u C2 2 L(x), and fC1; C2g * L(x), then set L(x) = L(x) [
fC1; C2g.
9-rule: if 9R:C 2 L(x), x has no successor z with C 2 L(z), and level(x)
k, then introduce a new variable z, set V = V [ fzg, E = E [ fhx; zig,
L(z) = fCg, and L(hx; zi) = fRg.</p>
      <p>Step 3. Return the graph G = (V; E; L).</p>
      <p>Given any KB K = hT ; Ai and non-negative integer k, we call the revision
graph G returned by Procedure 1 a k-role-depth-bounded witness (k-W) for K.</p>
      <p>Revision graphs can be seen as ABoxes with variables. Given a revision graph
G = (V; E; L), we call AG = S fC(x) j C 2 L(x)g [ S fR(x; y) j R 2
x2V hx;yi2E
L(hx; yi)g as the ABox representation of G, and call G as the revision-graph
representation of AG.</p>
      <p>Proposition 1. Let G = (V; E; L) be a k-W for a KB K = hT ; Ai, and let AG
be the ABox representation of G. Then, for any ABox assertion with sig( )
sig(K) and depth( ) k, K j= i h;; AGi j= .
A k-W of KB possibly contains some redundant information which will make two
logically equivalent KBs have di erent witnesses. In this subsection, we introduce
a procedure to remove these redundant information.</p>
      <p>A graph B = (V 0; E0; L0) is a branch of a revision graph G if B is a tree and
a subgraph of G.</p>
      <p>A branch B1 = (V1; E1; L1) is subsumed by another branch B2 = (V2; E2; L2)
if B1 and B2 have the same root node, ](V1 \ V2) = 1, and there is a function
f : V1 ! V2 such that: f (x) = x if x is the root node, L1(x) L2(f (x)) for
every node x 2 V1, hf (x); f (y)i 2 E2 for every edge hx; yi 2 E1, and L1(hx; yi)
L2(hf (x); f (y)i) for every edge hx; yi 2 E1.</p>
      <p>A branch B is redundant in G if every node in B except the root is a variable,
and B is subsumed by another branch in G.</p>
      <p>Procedure 2 Given a KB K = hT ; Ai and a non-negative integer k, let G =
(V; E; L) be a k-W for K, construct a revision graph G0 = (V 0; E0; L0) by the
following steps:
Step 1. Initialize the graph G0 = (V 0; E0; L0) as
{ V 0 = V , E0 = E, L0(hx; yi) = L(hx; yi) for every hx; yi 2 E0, and
{ L0(x) = fC 2 L(x) j C is a concept nameg for every x 2 V 0.</p>
      <p>Step 2. Prune G0 by the following rule until the rule is not applicable:
R-rule: if there is a redundant branch B = (VB; EB; LB) in G0, then set</p>
      <p>E0 = E0 n EB and V 0 = V 0 n (VB n fxBg), where xB is the root of B.
Step 3. Return the graph G0.</p>
      <p>For any KB K and non-negative integer k, we call the graph G0 returned by
Procedure 2 a k-role-depth-bounded minimal witness (k-MW) for K.
Proposition 2. Let G0 be a k-MW for a KB K = hT ; Ai, and let AG0 be the
ABox representation of G0. Then, for any ABox assertion with sig( ) sig(K)
and depth( ) k, K j= i h;; AG0 i j= .</p>
      <p>The following proposition states that, for any logically equivalent KBs K
and K0, their k-MW are identical up to variable renaming in the case that k is
su ciently large.</p>
      <p>Proposition 3. Let Ki = hT ; Aii (i = 1; 2) be two consistent KBs, let k be an
integer with k depth(T ), k depth(A1) and k depth(A2), and let Gi =
(Vi; Ei; Li) be a k-MW for Ki (i = 1; 2). If mod(K1) = mod(K2), then there is
a bijection f : V1 ! V2 such that
{ f (x) = x if x is an individual name,
{ L1(x) = L2(f (x)) for every node x 2 V1,
{ hx; yi 2 E1 i hf (x); f (y)i 2 E2, and
{ L1(hx; yi) = L2(hf (x); f (y)i) for every edge hx; yi 2 E1.</p>
      <p>Transforming a Witness Back into a Knowledge Base
In this subsection we introduce a procedure to transform a revision graph into
an ABox without variables.
hT ; AG i j= A.</p>
      <p>Procedure 3 Given a TBox T and a revision graph G = (V; E; L), construct
an ABox by the following steps:
Step 1. Delete from V all the variables which are not descendants of any
individual names in G.</p>
      <p>Step 2. Roll up the graph G by applying the following substeps repeatedly, until
there is no variable contained in V :
1. Select a variable y 2 V that has no successor.
2. Let x be the predecessor of y.
3. If L(y) 6= ;, then let Cy be the concept d C, else let Cy be &gt;.
Proposition 4. For any revision graph G and TBox T , let A be the ABox
returned by Procedure 3, and let AG be the ABox representation of G. Then,</p>
      <p>Algorithm 1 Given a revision setting K = hT ; Ai and N , given a non-negative
integer k, construct a nite number of KBs by the following steps:
Step 1. If A [ N is consistent w.r.t. T , then return K0 = hT ; A [ N i, else
continue the following steps.</p>
      <p>Step 2. Construct a k-MW G for K.</p>
      <p>Step 3. Let AG be the ABox representation of G. Calculate all the (AG ; N
)repairs R1; :::; Rn for clash w.r.t. T .</p>
      <p>Step 4. For each Ri (1 i n) do the following operations:
1. Construct an ABox Ai = AG n Ri.
2. Let Gi be the revision-graph representation of Ai. Call Procedure 3 to
generate an ABox A0i by taking T and Gi as inputs.</p>
      <p>The following theorems state that our algorithm satis es the properties
speci ed by R1-R4 in Section 1 of the paper.</p>
      <p>Theorem 1. For any revision setting K = hT ; Ai and N , let K0 = hT 0; A0i be
any KB returned by Algorithm 1. Then, (1) K0 is consistent, (2) K0 j= N and
T 0 = T , and (3) A0 = A [ N if A [ N is consistent w.r.t. T .</p>
      <p>Theorem 2. Given any two revision settings Ki = hT ; Aii and Ni (i = 1; 2),
and any integer k such that k depth(X) for X 2 fT ; A1; A2; N1; N2g. If K1
K2 and hT ; N1i hT ; N2i, then for any KB K10 returned by Algorithm 1 for the
revision setting K1 and N1, there must be a KB K20 returned by the algorithm
for the revision setting K2 and N2 such that K10 K20.</p>
      <p>Theorem 2 is based on Proposition 3 where k is required to be su ciently
large. Theorem 1 has no requirement on k; the rst result of it is based on
Proposition 4, and the other two results are obvious from the algorithm.</p>
      <p>In our algorithm, the k-MW G for the KB K is in fact a non-redundant
k-depth-bounded model for K. Therefore, our revision process works on
negrained representation of models and guarantees the minimal change principle
in a ne-grained level. So, our algorithm satis es the property speci ed by R5.
Theorem 3. For any revision setting K = hT ; Ai and N , assume the role depth
of every concept occurring in K and N is bounded by some integer k, then
Algorithm 1 runs in time exponential with respect to the size of K and N .
5</p>
      <p>Conclusion
We studied instance level KB revision in E L?. There are two main families of
approaches to revision: model-based ones and formula-based ones. We illustrated
that they both have disadvantages and are inappropriate for E L?. We presented
a new method for the revision problem. Our method is closer in spirit to the
formula-based approaches, but it also inherits some ideas of model-based ones.
We showed that our algorithm behaves well for E L? in that it satis es the
postulates proposed in the literature for revision operators.</p>
      <p>For future work, we will extend our method to support ABox revision in
E L++. Another work is to formalize the notion of minimality of change. Finally,
we will make an optimization to the algorithm and test the feasibility of it in
practice.</p>
      <p>Acknowledgments. This work was partially supported by the National
Natural Science Foundation of China (Nos. 61363030, 61262030) and the China
Scholarship Council.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Alchourron</surname>
            ,
            <given-names>C. E.</given-names>
          </string-name>
          , Gardenfors,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Makinson</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          :
          <article-title>On the logic of theory change: partial meet contraction and revision functions</article-title>
          .
          <source>J. Symbolic Logic</source>
          ,
          <volume>50</volume>
          (
          <issue>2</issue>
          ):
          <fpage>510</fpage>
          -
          <lpage>530</lpage>
          ,
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F.</given-names>
          </string-name>
          :
          <article-title>The description logic handbook: theory, implementation and applications</article-title>
          . Cambridge University Press, Cambridge,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milicic</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter.</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Integrating description logics and action formalisms: rst results</article-title>
          .
          <source>In Proc. of AAAI'05</source>
          ,
          <fpage>572</fpage>
          -
          <lpage>577</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brandt</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Pushing the EL Envelope</article-title>
          .
          <source>In Proc. of IJCAI'05</source>
          ,
          <fpage>364</fpage>
          -
          <lpage>369</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kharlamov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nutt</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zheleznyakov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Evolution of DL-lite knowledge bases</article-title>
          .
          <source>In Proc. of ISWC'10</source>
          ,
          <fpage>112</fpage>
          -
          <lpage>128</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <issue>6</issue>
          .
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shi</surname>
            ,
            <given-names>Z.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>T.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>L.Z.</given-names>
          </string-name>
          :
          <article-title>A family of dynamic description logics for representing and reasoning about actions</article-title>
          .
          <source>J. Automated Reasoning</source>
          ,
          <volume>49</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>52</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <issue>7</issue>
          .
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>T.L.</given-names>
          </string-name>
          :
          <article-title>Algorithm for adapting cases represented in a tractable description logic</article-title>
          ,
          <year>2014</year>
          . arXiv:
          <volume>1405</volume>
          .
          <fpage>4180</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Flouris</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plexousakis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antoniou</surname>
          </string-name>
          , G.:
          <article-title>On applying the AGM theory to DLs and OWL</article-title>
          .
          <source>In Proc. of ISWC'05</source>
          ,
          <fpage>216</fpage>
          -
          <lpage>231</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Flouris</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Manakanatas</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondylakis</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plexousakis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antoniou</surname>
          </string-name>
          , G.:
          <article-title>Ontology change: classi cation and survey</article-title>
          .
          <source>Knowledge Eng. Review</source>
          ,
          <volume>23</volume>
          (
          <issue>2</issue>
          ):
          <fpage>117</fpage>
          -
          <lpage>152</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Giacomo</surname>
            ,
            <given-names>G.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poggi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
          </string-name>
          , R.:
          <article-title>On the update of description logic ontologies at the instance level</article-title>
          .
          <source>In Proc. of AAAI'06</source>
          ,
          <fpage>1271</fpage>
          -
          <lpage>1276</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harmelen</surname>
            ,
            <given-names>F.V.</given-names>
          </string-name>
          :
          <article-title>From SHIQ and RDF to OWL: the making of a web ontology language</article-title>
          .
          <source>J. of Web Semantics</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <fpage>7</fpage>
          -
          <lpage>26</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Katsuno</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mendelzon</surname>
            ,
            <given-names>A. O.</given-names>
          </string-name>
          :
          <article-title>On the di erence between updating a knowledge base and revising it</article-title>
          .
          <source>In Proc. of KR'91</source>
          ,
          <fpage>387</fpage>
          -
          <lpage>394</lpage>
          ,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kharlamov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zheleznyakov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Capturing instance level ontology evolution for DL-Lite</article-title>
          .
          <source>In Proc. of ISWC'11</source>
          ,
          <fpage>321</fpage>
          -
          <lpage>337</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savo</surname>
            ,
            <given-names>D. F.</given-names>
          </string-name>
          :
          <article-title>On the evolution of the instance level of DL-Lite knowledge bases</article-title>
          .
          <source>In Proc. of DL'11</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milicic</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Updating description logic ABoxes</article-title>
          .
          <source>In Proc. of KR'06</source>
          ,
          <fpage>46</fpage>
          -
          <lpage>56</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haase</surname>
            ,
            <given-names>P</given-names>
          </string-name>
          , Huang,
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Ji</surname>
          </string-name>
          <string-name>
            <given-names>Q</given-names>
            ,
            <surname>Pan</surname>
          </string-name>
          <string-name>
            <surname>J. Z.</surname>
          </string-name>
          , Volker J.
          <article-title>: A kernel revision operator for terminologies - algorithms and evaluation</article-title>
          .
          <source>In Proc. of ISWC'08</source>
          ,
          <fpage>419</fpage>
          -
          <lpage>434</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Du</surname>
          </string-name>
          , J.:
          <article-title>Model-based revision operators for terminologies in description logics</article-title>
          .
          <source>In Proc. of IJCAI'09</source>
          ,
          <fpage>891</fpage>
          -
          <lpage>897</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Topor</surname>
            ,
            <given-names>R.W.:</given-names>
          </string-name>
          <article-title>A new approach to knowledge base revision in DL-Lite</article-title>
          .
          <source>In Proc. of AAAI'10</source>
          ,
          <fpage>369</fpage>
          -
          <lpage>374</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Wiener</surname>
            ,
            <given-names>C. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Katz</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Belief base revision for expressive description logics</article-title>
          .
          <source>In Proc. of OWLED'06</source>
          ,
          <fpage>10</fpage>
          -
          <lpage>11</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>