<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Entailment-based Axiom Pinpointing in Debugging Incoherent Terminologies</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yuxin Ye</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dantong Ouyang</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jing Su</string-name>
          <email>sujing11@mails.jlu.edu.cn</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>College of Computer Science and Technology, Jilin University</institution>
          ,
          <addr-line>Changchun 130012</addr-line>
          ,
          <country country="CN">China</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education</institution>
          ,
          <addr-line>Changchun 130012</addr-line>
          ,
          <country country="CN">China</country>
        </aff>
      </contrib-group>
      <fpage>105</fpage>
      <lpage>115</lpage>
      <abstract>
        <p>One of the major problems of axiom pinpointing for incoherent terminologies is the precise positioning within the conflict axioms. In this paper we present a formal notion for the entailment-based axiom pinpointing of incoherent terminologies, where the parts of an axiom is defined by atomic entailment. Based on these concepts, we prove the one-to-many relationship between existing axiom pinpointing with the entailment-based axiom pinpointing. For its core task, calculating minimal unsatisfiable entailment, we provide algorithms for OWL DL terminologies using incremental strategy and Hitting Set Tree algorithm. The feasibility of our method is shown by case study and experiment evaluations.</p>
      </abstract>
      <kwd-group>
        <kwd>ontology debugging</kwd>
        <kwd>description logics</kwd>
        <kwd>pinpointing</kwd>
        <kwd>MUPS</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Ontology debugging becomes a challenging task for ontology modelers since the
improvement of expressivity of ontology language and ontology scale[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Axiom
pinpointing [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] is an important mean for ontology debugging. Any approach
which can detect a set of axioms in the terminology that lead to logic conflict is
belong to axiom pinpointing. It can be categorized into MSSs (maximally
satisfiable sub-TBox), MUPS (minimal unsatisfiable sub-TBox) and justification. For
finding maximally concept-satisfiable terminologies, Meyer[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] proposes a tableau
like procedure for terminologies represented in ALC. The approach of Meyer is
extended by Lam[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] to get a fine-grained axiom pinpointing for ALC
terminologies. In addition, several methods have been proposed to calculate the MUPS.
Schlobach and Cornet[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] provide complete algorithms for unfoldable ALC-TBox
based on minimization of axioms for MUPS, then Schlobach[
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ] presents a
framework for the debugging of logically contradicting terminologies. Parsia[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
extends Schlobach[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] to more expressive DLs. Baader[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] presents automata-based
algorithms for reasoning in DLs with the pinpointing formula whose minimal
valuations correspond to the MUPS. From the perspective of unsatisfiability,
justification is the MUPS of an unsatisfiable concept. Kalyanpur has explored the
dependencies between unsatisfiable classes[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and proposed several approaches
for computing all justifications of an entailment in an OWL-DL ontology[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
Debugging tasks in OWL ontologies are in general computationally hard, so some
optimization techniques are introduced for ontology debugging such as heuristic
method[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] of identifying common errors and inferences, and modularization[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
for large ontologies. On the whole, various approaches achieve the result sets
of axioms responsible for an unsatisfiable concept or a incoherent terminology.
Hasse[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] provides a set of criteria for comparing between different approaches
related to ontology debugging directly or indirectly, and that none of the
surveyed approaches is universally applicable for any application scenario. Axiom
pinpointing identifies conflict axioms, but practical problems remain. It is not
clear which parts of axioms lead to the conflicts. and some contradictions would
be lost[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. In this paper, we try to give other notion of axiom pinpointing for
incoherent terminologies, and define algorithms for this task.
      </p>
      <p>The rest of this paper is organized as follows. In section 2 we briefly introduce
the drawback of MUPS. Then the formal definitions about fine-grained axiom
pinpointing, and the link with axiom pinpointing are presented in section 3.
Section 4 presents algorithm for calculating the minimal unsatisfiable entailment.
Section 5 analyzes the fine-grained axiom pinpointing with a case study and
evaluates the algorithm by experimenting with common ontologies. Finally, we
conclude the paper in section 6.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Drawback of MUPS</title>
      <p>
        Axiom pinpointing[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] has been introduced in description logics to help the
user to understand the reasons why consequences hold and to remove unwanted
consequences by computing minimal subsets of the terminology that have the
consequence. The axiom pinpointing we discuss in this paper is MUPS[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. It’s
useful for relating sets of axioms to the unsatisfiability of specific concept.
Definition 1 (MUPS[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]). A TBox T 0 ⊆ T is a minimal unsatisfiability
preserving sub-TBox (MUPS) for C in T if C is unsatisfiable in T 0, and C is
satisfiable in every sub-TBox T 00 ⊂ T 0. The set of all MUPS of C in T is
denoted as mups(T , C).
      </p>
      <p>Most existing approaches can obtain the different fine-grained problematic
axioms on the basis of axiom pinpointing as none of these approaches define
exactly what they mean by parts of axioms. Further, some logic contradictions
would be lost with axiom pinpointing since it does not point out the specific
location within the axioms of the logic contradiction. Let us use an example to
illustrate these limitations.
Example 1. A TBox T1 consists of the following axioms (α1 − α6), where A and
B are base concepts, A1, ..., A6 are named concepts, and r and s are roles:
α1 : A1 v A2 u ∃r.A2 u A3
α2 : A2 v A u B
α3 : A3 v ∀r.(¬B u ¬A)
α4 : A4 v ∀r.A u ∀s.B u A5
α5 : A5 v ∃r.¬A u A6
α6 : A6 v ∃s.¬B</p>
      <p>Consider the above example, by using standard DL TBox reasoning, it can
be shown that the concept A1 and A4 are unsatisfiable. Analyzing concept A1,
the existing approaches identify {α1, α2, α3} the only MUPS for A1 in T1, but it
is not clear whether A2 or ∃r.A2 of α1 contradicts with α3. In addition, it hides
crucial information, e.g., that unsatisfiability of A1 depends on all parts of α2
or α3. For A4, {α4, α5} is the only MUPS for A4 in T1, which on behalf of the
error caused by ∀r.A of α4 and ∃r.¬A of α5. Actually, ∀s.B of α4, A6 of α5 and
∀s.¬B of α6 also lead to the unsatisfiability of A4, which would not be involved
in the reason of unsatisfiability of A4 since MUPS can not pinpoint the location
of conflict, i.e., some unsatisfiable (or incoherent) reasons would be ignored by
axiom pinpointing. We will use this example to explain our debugging methods.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Entailment and MUE</title>
      <p>This section presents the main technical contribution of the paper. We would
like to provide a framework for entailment-based axiom pinpointing. We will
present the formal definitions which involve MUE, then show the relationship
between MUPS and MUE. The second subsection is concerned with how to get
all components w.r.t. axiom and terminology.
3.1</p>
      <sec id="sec-3-1">
        <title>Formal Definitions</title>
        <p>To compensate the limitations of axiom pinpointing, we introduce the notion
of fine-grained axiom pinpointing and link it to description logic-based systems.
Whereas the definitions of fine-grained axiom pinpointing are independent of the
choice of a particular Description Logic.</p>
        <p>
          Definition 2 (Entailment[
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]). Given a logical language L, an entailment
states a relation between an terminology T and an axiom α ∈ L. We use T α
to denote that the ontology T entails the axiom α. Alternatively, we say that α is
a consequence of the terminology T under entailment relation . The entailment
relation is said to be a standard one if and only if α is always holds in any model
in which the terminology T holds, i.e., for any model I, I T ⇒ I α.
Definition 3 (Atomic Entailment). Let T be a terminology and β be an
axiom such that T β. We call is an atomic entailment between T and β if
{β} has no consequence but β. Alternatively, β is an atomic consequence of T .
        </p>
        <p>We denote by E (T ) and E (α) the set of all atomic consequences of terminology
T and {α}, respectively. If a terminology T is incoherent, then for any axiom
β, T β, i.e., a standard entailment is explosive. Thus, we require E (T ) =
Sα∈T E (α) if T is incoherent, and E (α) = {α} if the axiom α has no model.
Intuitively, an atomic consequence of an axiom is a part of the axiom, and set
of all atomic consequences of an axiom contains all parts of the axiom.
Definition 4 (MUE). Let C be an unsatisfiable concept in terminology T . A
sub-TBox Tc ⊆ E (T ) is a minimal unsatisfiable entailment for C in T if C is
unsatisfiable in Tc, and C is satisfiable in every sub-TBox Tc0 ⊂ Tc.</p>
        <p>The entailment-based axiom pinpointing inferential service is the problem of
computing MUE. We denote by mue(T , C) the set of MUE of C in terminology
T . In the terminology of Reiter’s diagnosis each mue(T , C) is a collection of
conflict sets. The following are the MUE for our example TBox T1:
mue(T1, A1) = {{A1 v ∃r.A2, A1 v A3, A2 v A, A3 v ∀r.¬A},</p>
        <p>{A1 v ∃r.A2, A1 v A3, A2 v B, A3 v ∀r.¬B}}
mue(T1, A4) = {{A4 v ∀r.A, A4 v A5, A5 v ∃r.¬A},</p>
        <p>{A4 v ∀s.B, A4 v A5, A5 v A6, A6 v ∃s.¬B}}</p>
        <p>MUE can be regarded as the fine-grained axiom pinpointing for MUPS. The
relationship between axiom pinpointing and our pinpointing is established by
Theorem 1, i.e., the one-to-many relationship between MUPS and MUE.
Theorem 1 (MUPS-to-MUEs relationship). Let C be an unsatisfiable
concept in terminology T . Then:
(1) If C is unsatisfiable in T , then C is unsatisfiable in E (T ).
(2) for every M ∈ mups(T , C), there is a K ∈ mue(T , C) s.t. K ⊆ E (M).
(3) for any M1, M2 ∈ mups(T , C) and K1, K2 ∈ mue(T , C) where M1 6= M2,
K1 ⊆ E (M1) and K2 ⊆ E (M2), we have K1 6= K2.</p>
        <p>Proof. We prove (1), (2) and (3) in order.
(1) According to the definition of atomic entailment, If an axiom α ∈ T has no
model, E (α)={α}. Otherwise, we can prove {α} and E (α) are equivalent with
the axiom decomposition which is described in next subsection. In general, T
and E (T ) are equivalent.
(2) Since M ⊆ mups(T , C), we have C is unsatisfiable in E (M). Thus, mue(M, C) =
mups(E (M), C), and for every K ∈ mue(M, C), we get K ⊆ E (M).
(3) Suppose K ∈ mue(T , C), M1, M2 ∈ mups(T , C) (M1 6= M2) s.t. K ⊆
E (M1) and K ⊆ E (M2). Thus, there exists a sub-TBox T 0 ⊆ T s.t. K ⊆ E (T 0)
and K * E (T 00) for every T 00 ⊂ T 0. Then C is unsatisfiable in T 0, T 0 ⊆ M1
and T 0 ⊆ M2. Since M1, M2 ∈ mups(T , C), we get T 0 = M1 = M2 which
contradicts with the assumption.</p>
        <p>It is characteristic of our axiom pinpointing, in the sense to be made more
precise, to uniquely identify each logical contradiction. For example, TBox T =
{A1 v AuBuA2, A2 v ¬Au¬B}, T is the only MUPS of A1 while mue(T , A1) =
{{A1 v A, A1 v A2, A2 v ¬A}, {A1 v B, A1 v A2, A2 v ¬B}}, which a
MUPS has two MUE corresponding to. In this regard, entaiment-based axiom
pinpointing is an extension of axiom pinpointing that MUE covers also the same
unsatisfiable reasons of MUPS.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Syntactic Decomposition for Atomic Entailment</title>
        <p>As previously mentioned, the theory of entailment-based axiom pinpointing is
built on atomic entailment. For an incoherent terminology, we need to know the
atomic entailments of each axiom instead. We give a syntactic decomposition
notion to achieve this goal.</p>
        <p>We give an overview of different kind of transformations that calculate the
set of atomic entailment for an axiom in a terminology. Given a terminology
T and an axiom α : C v D where C is a atomic concept, apply the following
transformation rules to α in each step (all rules of each step are correct3):
Step 1: (GCIs) Considering all such axioms C1 v D1, ..., Cn v Dn in T where
Ci(1 ≤ i ≤ n) is a complex description, let D0 = (¬C1 tD1)u...u(¬Cn tDn),
do C0 v D u D0, then transform D and D0, respectively.</p>
        <p>Step 2: (Negation normal form, NNF) Push all negation signs as far as possible
into the description, using de Morgan’s rules and usual rules for quantifiers4.
Step 3: Repeated use of distributive law : C1 t (C2 u C3) = (C1 t C2) u (C1 t C3),
∀R.(C1 t (C2 u C3)) = ∀R.((C1 t C2) u (C1 t C3)), ∃R.(C1 u (C2 t C3)) =
∃R.((C1 u C2) t (C1 u C3)).</p>
        <p>Step 4: Repeated use of following rules: ∀R.(C1uC2) = ∀R.C1u∀R.C2, ∃R.(C1t
C2) = ∃R.C1 t ∃R.C2.</p>
        <p>The transformation process always terminates and we end up with D =
D1 u ... u Dm and D0 = D10 u ... u Dn0 where constructor u can only appear in
λR.Y of Di(1 ≤ i ≤ m) and Dj0 (1 ≤ j ≤ n) while λ is constructor ∃, ≥ n, or
≤ n. Therefor, for any model I, I {α : C v D} ⇒ I C v Di(1 ≤ i ≤ m),
and C v Di has no entailment but itself. Consequently, {C v D1, ..., C v Dm}
is the set of atomic entailment of α. Similarly, {C v D1, ..., C v Dm, C v
D10, ..., C v Dn0} is the set of atomic entailment of α in terminology T . Both the
result of syntactic decomposition and the axiom have the same name and base
symbols. Moreover, Since the result is obtained by a sequence of replacement
steps, i.e., by replacing equals by equals. Therefore, E (α) and α are syntactically
and semantically equivalent, i.e., the result is the set of all atomic entailments
of α. The atomic entailments of a terminology can be calculated by merging all
axioms’s. In example TBox T1, E (α1) = {A1 v A2, A1 v ∃r.A2, A1 v A3}.</p>
        <p>
          On the other hand, using a rule L = R above, it means R is obtained from
L. We can mark R’s label is L. Thus, keeping track of the transformations that
occur during the processing step i.e. we can pinpoint the position of atomic
entailment in original axiom.
3 All these rules are correct and have been proved in the Description Logic
Handbook[
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
4 ¬(¬A) = A, ¬(∃R.A) = ∀R.¬A, ¬(∀R.A) = ∃R.¬A, ¬(≥ nR.A) =≤ (n−1)R.A, ¬(≤
nR.A) =≥ (n + 1)R.A, ¬(C1 t C2) = ¬C1 u ¬C2, ¬(C1 u C2) = ¬C1 t ¬C2.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Algorithms for Entailment-based Axiom Pinpointing</title>
      <p>In this section, we discuss the algorithm for finding all MUE of an unsatisfiable
concept. The algorithm we provide is reasoner-independent, in the sense that
the DL reasoner is solely used as an oracle to determine concept satisfiability
w.r.t a terminology. we provide the formal specification of the algorithm.</p>
      <p>The ALL MUE(T , C, M, E) algorithm receives a local terminology T , a
concept C, a local conflict M and a set of axioms E related to M directly5, and
outputs the set of all minimal subsets T 0 ⊆ E (T ∪E) such that C is
unsatisfiable in T 0 ∪ M . The algorithm works in three main steps: first, it utilizes
CONFLICT HST to computes all related minimal contradiction of M from E
for C; Then recursive call to the algorithm with the new parameters T , M , and
E for each related conflict we have obtained in previous step; Finally, combining
the consequences of all recursive calls and obtain the final result. The loop in
the second step is a main component of algorithm, which calculates the input
parameters for next recursive call, it is mainly to do the following tasks: first
of all, adding the obtained related conflict m to the original conflict M to get
the new local conflict M 0; Then, selecting axioms from T which is only related
to the named symbols in m (because m has included all axioms related to M )
dented by the new related axioms set A for the new local conflict M 0; Last, get
a new terminology T 00 by removing A from T .</p>
      <p>We can get all MUE of C in terminology T by calling ALL MUE(T , C, ∅, ∅).
Thus, the algorithm process guarantees three points as follows:
(a) Both axioms and named symbols of the input terminologies T , M and E
are mutually disjoint.
(b) M ⊆ M for every M ∈ mue(T ∪M ∪E, C) if C is unsatisfiable in T ∪M ∪E.
(c) C is satisfiable in T ∪ M if M is not a MUE for C in T ∪ M ∪ E.
Theorem 2. Given an unsatisfiable concept C in a terminology T , R returned
by ALL MUE(T , C, ∅, ∅) is the set of all MUE for C.</p>
      <p>Theorem 3. The CONFLICT HST(T , C, M, E) algorithm output all minimal
subset E0 ⊆ E such that C is unsatisfiable in T ∪ M ∪ E0, and C is satisfiable
in T ∪ M ∪ E00 for every E00 ⊂ E0.</p>
      <p>
        The CONFLICT HST(N, F, HS, C, T , M, E) algorithm generates a Hitting
Set Tree [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] with root node N , where a set F of conflict sets and a set HS
of Hitting Sets are global, and outputs F . Initially, N, F and HS are empty,
calling SINGLE CONFLICT algorithm to get a value r for root node N if r is
not empty. Then, generates the HST with root node N . In the loop, the algorithm
generates a new node N 0 and a new edge e links N and N 0 in each iteration.
Calling SINGLE CONFLICT algorithm to obtain a value for the new node, and
we mark the new node with 0√0 if the value is empty.
5 We say a TBox T 0 is directly related to the TBox T if all named symbols of T 0 is a
subset of the signatures of T .
Algorithm: ALL MUE(T , C, M, E)
Input: a terminology T , a concept C, a terminology M , a terminology E
Output: all minimal subsets of E(T ∪E) conflict with M w.r.t. C R
R ← ∅;
T 0 ← T ;
E0 ← E;
if M = ∅ then
      </p>
      <p>A ← {α ∈ T | α has the form C v D};
T 0 ← T − A;</p>
      <p>E0 ← E(A);
if C is unsatisfiable in M then /* M is a MUE of C */
R ← {M };
return R;
H ← ∅;
CONFLICT HST(∅, H, ∅, C, T 0, M, E0);
if H = ∅ then /* H = ∅ means M is a MUE of C */
R ← {M };
return R;
for m ∈ H do</p>
      <p>M 0 ← M ∪ m; /* update the current MUE M of C */
S ← Sig(m) − D(M 0) − B(T 0 ∪ M 0);/*Select the related symbols of M 0*/
A ← {α ∈ T 0 | α has the form C0 v D0 where C0 ∈ S};
T 00 ← T 0 − A;
R0 ← ALL MUE(T 00, C, M 0, E(A));</p>
      <p>R ← R ∪ R0;
return R;</p>
      <p>/* The algorithm start with M = ∅ */</p>
      <p>Two pruning strategy to the algorithm in order to reduce the size of HST and
eliminate extraneous satisfiability tests. One is closing, if there exists a Hitting
Set h in HS such that the path of N 0 is a superset of h, close node N 0 and the
value is not computed for N 0 nor are any succor nodes generated, as indicted by
a 0×0. The other one is reusing nodes: if there exists a node value k in F such
that k and the path of N 0 are disjoint, set k as the value of N 0 directly without
recalculation.</p>
      <p>The SINGLE CONFLICT(T , C, M, E) algorithm outputs a subset of E. In
the loop, the algorithm removes an axiom from E in each iteration and check
whether the concept C is satisfiable w.r.t. T ∪ M ∪ E, in which case the axiom
is added to R and reinserted into E. The process continues until all axioms in
E have been tested. Finally, R is returned as output.</p>
      <p>Theorem 4. The SINGLE CONFLICT(T , C, M, E) algorithm output a
minimal subset R ⊆ E such that C is unsatisfiable in T ∪ M ∪ R, and C is satisfiable
in T ∪ M ∪ R0 for every R0 ⊂ R.</p>
      <p>Proof. Let R be the output of algorithm SINGLE CONFLICT(T , C, M, E). If
C is satisfiable in T ∪ M ∪ E, we get R = ∅. Otherwise, C is unsatisfiable in
T ∪ M ∪ R upon termination. Suppose there exists a subset R0 ⊂ R such that
C is unsatisfiable in T ∪ M ∪ R0. Then, removing the axiom in R − R0 after the
Algorithm: CONFLICT HST(N, F, HS, T , C, M, E)
Input: a node N , a set of conflict sets F , a set of hitting sets HS,</p>
      <p>a terminology T , a concept C, a terminology M , a terminology E
Output: input F
if N = ∅ then
r ←SINGLE CONFLICT(T , C, M, E);
if r = ∅ then</p>
      <p>return;
L(N ) ← r;
F ← { }</p>
      <p>r ;
for α ∈ L(N ) do
create a new node N 0 and set L(N 0) ← ∅;
create a new edge e =&lt; N, N 0 &gt; with L(e) ← α;
if there exists a set h ∈ HS s.t. h ⊆ P(N ) ∪ {α} then</p>
      <p>L(N 0) ←0 × 0;
continue;
else if there exists a set k ∈ F s.t. k ∩ P(N ) = ∅ then</p>
      <p>L(N 0) ← k;</p>
      <p>CONFLICT HST(N 0, F, HS, T , C, M, E − {α});
else
m ← SINGLE CONFLICT(T , C, M, E − {α});
if m = ∅ then</p>
      <p>L(N 0) ←0 √ 0;
HS ← HS ∪ {P(N ) ∪ {α}};
L(N 0) ← m;
F ← F ∪ {m};</p>
      <p>CONFLICT HST(N 0, F, HS, T , C, M, E − {α});
removal of R0, we get C is satisfiable in T ∪ M ∪ R0, which contradicts with the
assumption.</p>
      <p>The problem of finding minimal Hitting Sets is known to be NP-COMPLETE,
our algorithm is associated with the size of the element in mue(T , C). In this
case, Let n be the cardinality of mue(T , C) and S = {k1, ..., kn} be the value
set of the size of its elements, the number of calls to SINGLE CONFLICT and
satisfiability tests involved is at most k1 · ... · kn.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Evaluation</title>
      <p>Our algorithms for fine-grained axiom pinpointing have been realized in JAVA
(JDK 1.6)using Pellet as the black-box reasoner. Tests are performed on a
standard Windows operating system (Intel(R) Core(TM)i5-3470 CPU @ 3. 20GHz,
8. 00GB).</p>
      <p>Before providing an evaluation of our algorithm, we briefly want to discuss
a case study from Pizza. Then, we give the experimental results of common
ontologies.</p>
      <p>Example 2. IceCream is an unsatisfiable concept in ontology P izza.
IceCream v F ood u ∃hasT opping.F ruitT opping disjoint(IceCream, P izza)
F ruitT opping v P izzaT opping disjoint(IceCream, P izzaT opping)
P izzaT opping v F ood role hasT opping : domain P izza
IceCream in P izza ontology has only one MUE M:
M = {IceCream v ∃hasT opping.F ruitT opping, disjoint(IceCream, P izza),
role hasT opping : domain P izza}</p>
      <p>For unsatisfiable concept IceCream, taking away any single axiom from
M makes IceCream satisfiable, while M is not a MUPS since IceCream v
∃hasT opping.F ruitT opping is only a part of original axiom of IceCream, which
pinpoint the accurate component of contradiction within the axioms. As a
consequence, the MUE indeed helped in some cases.</p>
      <p>We have performed some preliminary experiments. We evaluated the method
on five real-life OWL-DL ontologies vary in size, complexity and expressivity:
Koala, MadCow, Pizza, MGED, DICE. The basic information of our
experimental ontologies are depicted in Table 1, the results of test ontologies are
summarized in Table 2.</p>
      <p>According to Table 1 and Table 2, the results show that the scale of
ontology and number of unsatisfiable concepts introduce an increase in the running
time w.r.t. the fine-grained axiom pinpointing procedure. In the case of Koala
and MadCow ontology, where the number of axioms related to an unsatisfiable
concept are small (less than 10), the program ends in a very short period of
time. However, for DICE ontology, where axioms responsible for an
unsatisfiable concept are large in number (nearly 100), the running time of procedure is
longer.
Note. Columns are: the terminology T , the expressivity of termminology
(L(T )), number of named symbols (|D(T )|), number of base symbols (|B(T )|),
number of roles (|R|), number of axioms (|T |), number of unsatisfiable
concepts (|UT |).
Note. Rows are: the test terminology (T ), the sum of MUE of all unsatisfiable
concepts in terminology (|MUE(T )|), the execution time of ALL MUE
algorithm for all unsatisfiable concepts in terminology where the unit is millisecond
(Time).
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>In order to pinpoint debugging more accurately, we use the entailments to
replace the corresponding axioms, then identify a minimal unsatisfiable subset of
entailments for the new terminology. A new formal definition of MUE have be
provided in this paper. At the same time, we presented a black-box pinpointing
algorithm to solve it. Experimental results on common ontologies show that our
axiom pinpointing provides incoherent terminology with more accurate
incoherent reasons without losing contradictions masked by MUPS, and the performance
of our algorithm is influenced by the size of related axioms directly. For future
work, we plan to adopt the dependency between concepts, investigate different
kinds of selection function, that hopefully improve the efficiency of
entailmentbased axiom pinpointing.</p>
      <p>Acknowledgments. This work was supported in part by NSFC under Grant
Nos. 61272208, 61133011, 41172294, 61170092; Jilin Province Science and
Technology Development Plan under Grant Nos.201201011.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Lambrix</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>G.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horridge</surname>
            .
            <given-names>M.</given-names>
          </string-name>
          , (eds):
          <source>Proceedings of the First International Workshop on Debugging Ontologies and Ontology Mappings</source>
          , (Galway, Ireland),
          <source>LECP 79</source>
          , Linko¨ping University Electronic Press (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , Rafael Pen˜aloza, R.:
          <article-title>Automata-Based Axiom Pinpointing</article-title>
          .
          <source>In: 4th international joint conference on Automated Reasoning</source>
          , pp.
          <fpage>226</fpage>
          -
          <lpage>241</lpage>
          . Springer-Verlag Berlin, Heidelberg (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. Meyer,T.,
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Booth</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J.Z.</given-names>
          </string-name>
          :
          <article-title>Finding Maximally Satisfiable Terminologies for the Description Logic ALC</article-title>
          .
          <source>In: 21st National Conference on Artificial Intelligence</source>
          , pp.
          <fpage>269</fpage>
          -
          <lpage>274</lpage>
          . AAAI press (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Lam</surname>
            ,
            <given-names>S.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sleeman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasconcelos</surname>
            ,
            <given-names>W.:</given-names>
          </string-name>
          <article-title>A Fine-Grained Approach to Resolving Unsatisfiable Ontologies</article-title>
          .
          <source>In: 2006 IEEE/WIC/ACM International Conference on Web Intelligence</source>
          , pp.
          <fpage>428</fpage>
          -
          <lpage>434</lpage>
          . IEEE Computer Society Washington (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Schlobach</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cornet</surname>
          </string-name>
          , R.:
          <article-title>Non-Standard Reasoning Services for the Debugging of Description Logic Terminologies</article-title>
          .
          <source>In: 18th international joint conference on Artificial intelligence</source>
          , pp.
          <fpage>355</fpage>
          -
          <lpage>360</lpage>
          . Morgan Kaufmann Publishers Inc (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Schlobach</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Diagnosing Terminologies</article-title>
          .
          <source>In: 20th national conference on Artificial intelligence</source>
          , pp.
          <fpage>670</fpage>
          -
          <lpage>675</lpage>
          . AAAI Press (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Schlobach</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>Z.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cornet</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harmelen</surname>
            ,
            <given-names>F.V.</given-names>
          </string-name>
          :
          <article-title>Debugging Incoherent Terminologies</article-title>
          .
          <source>J. Automated Reasoning</source>
          .
          <volume>39</volume>
          (
          <issue>3</issue>
          ),
          <fpage>317</fpage>
          -
          <lpage>349</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalyanpur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Debugging OWL Ontologies</article-title>
          .
          <source>In: 14th International Conference on World Wide Web</source>
          , pp.
          <fpage>633</fpage>
          -
          <lpage>640</lpage>
          . ACM Press, New York (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kalyanpur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendler</surname>
          </string-name>
          , J.:
          <article-title>Debugging Unsatisfiable Concepts in OWL Ontologies</article-title>
          .
          <source>J. Web Semantics</source>
          .
          <volume>3</volume>
          (
          <issue>4</issue>
          ),
          <fpage>268</fpage>
          -
          <lpage>293</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Kalyanpur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirin</surname>
          </string-name>
          , E.:
          <article-title>Finding All Justifications of OWL DL Entailments</article-title>
          .
          <source>In: 6th international The semantic web and 2nd Asian conference on Asian semantic web conference</source>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>280</lpage>
          . Springer-Verlag Berlin, Heidelberg (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rector</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Drummond</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seidenberg</surname>
          </string-name>
          . J.:
          <string-name>
            <surname>Debugging OWL-DL Ontologies</surname>
          </string-name>
          :
          <article-title>A Heuristic Approach</article-title>
          . In: 4th International Semantic Web Conference, pp.
          <fpage>745</fpage>
          -
          <lpage>757</lpage>
          . Springer-Verlag (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Du</surname>
            ,
            <given-names>J.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>G.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ji</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          :
          <article-title>Goal-Directed Module Extraction for Explaining OWL DL Entailments</article-title>
          . In: 8th International Semantic Web Conference, pp.
          <fpage>163</fpage>
          -
          <lpage>179</lpage>
          . Springer-Verlag (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Haase</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>G.L.</given-names>
          </string-name>
          :
          <article-title>An Analysis of Approaches to Resolving Inconsistencies in DLbased Ontologies</article-title>
          . In: International Workshop on Ontology Dynamics, pp.
          <fpage>97</fpage>
          -
          <lpage>109</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Horridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Justification Masking in Ontologies</article-title>
          .
          <source>In: 13th International Conference on the Principles of Knowledge Representation and Reasoning</source>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , et al.:
          <article-title>The Description Logic Handbook: Theory, Implementation and Application</article-title>
          .
          <source>Second Edition</source>
          . Cambridge University Press (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Reiter</surname>
          </string-name>
          , R.:
          <article-title>A Theory of Diagnosis from First Principles</article-title>
          .
          <source>J. Artificial Intelligence</source>
          ,
          <volume>32</volume>
          (
          <issue>1</issue>
          ),
          <fpage>57</fpage>
          -
          <lpage>95</lpage>
          (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Haase</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harmelen</surname>
            ,
            <given-names>F.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>Z.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stuckenschmidt</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sure</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>A Framework for Handling Inconsistency in Changing Ontologies</article-title>
          .
          <source>In: 4th International Semantic Web Conference</source>
          , pp.
          <fpage>353</fpage>
          -
          <lpage>367</lpage>
          . Springer-Verlag Berlin, Heidelberg (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>