<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Average</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Concept Forgetting in ALCOI -Ontologies using an Ackermann Approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yizheng Zhao</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Renate A. Schmidt</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>The University of Manchester</institution>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <volume>37</volume>
      <issue>82</issue>
      <abstract>
        <p>We present a method for forgetting concept symbols in ontologies speci ed in the description logic ALCOI. The method is an adaptation and improvement of a second-order quanti er elimination method developed for modal logics and used for computing correspondence properties for modal axioms. It follows an approach exploiting a result of Ackermann adapted to description logics. Important features inherited from the modal approach are that the inference rules are guided by an ordering compatible with the elimination order of the concept symbols. This provides more control over the inference process and reduces non-determinism, and the size of the search space. The method is extended with a new case splitting inference rule, and several simpli cation rules. Compared to related forgetting and uniform interpolation methods for description logics, the method can handle inverse roles, nominals and ABoxes. Compared to the modal approach on which it is based, it is more e cient in time and has higher success rates. The method has been implemented in Java using the OWL API. Preliminary experimental results show that the order in which the concept symbols are eliminated signi cantly a ects the success rate and e ciency.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Ontology-based technologies provide novel ways of building knowledge
processing systems and play an important role in many di erent areas, both in research
projects but also in industry applications. Big ontologies contain however large
numbers of symbols and knowledge modelled in them is rich and inevitably
heterogeneous. Thus there are situations, where it is useful to be able to restrict
the ontology to a subset of the signature and forget those symbols which do not
belong to the subset, for example, when an ontology needs to be analysed by
an ontology engineer to gain an understanding of the information represented
in it. Another example is a scenario where ontologies are distributed at separate
remote sites and information is exchanged via agents. Since the vocabularies
known to the agents at the di erent sites will vary, communication between the
agents needs to be limited to using the common language to avoid ambiguity
and confusion caused by the inconsistency of the vocabularies being used. At
this point, it would be bene cial if the signature symbols in one ontology that
are not known to the other agents can be eliminated without losing information
required for the communication. In other words, signature symbols belonging
to only one of the ontologies are forgotten, and communication is restricted to
information expressed in the shared language of the agents' ontologies. Another
use of forgetting is restricting the vocabulary of an ontology to more general
concept symbols, and forgetting those that are more speci c, to create a
summary of the ontology [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. Situations where ontologies are published, shared, or
disseminated, but some sensitive parts described in terms of particular signature
symbols needs to be kept con dential or unseen to the receiver, is a potential
application of forgetting [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. This is relevant for medical and military uses, and
uses in industry to ensure proprietary information can be kept hidden.
      </p>
      <p>
        The contribution of this paper is the presentation of a method for forgetting
concept symbols in ontologies speci ed in the description logic ALCOI. ALCOI
extends the description logic ALC with nominals and inverse roles. Forgetting
concept symbols for ALCOI is a topic where no method is available yet, but a
number of related methods exist. Forgetting can be viewed as the problem dual
to uniform interpolation. A lot of recent work has been focussed on uniform
interpolation of mainly TBoxes represented in several description logics, ranging
from ones with more limited expressivity, such as DL-Lite [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] and E L [
        <xref ref-type="bibr" rid="ref20 ref22">20, 22</xref>
        ]
and E L-extensions [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], to more expressive ones, such as ALC [
        <xref ref-type="bibr" rid="ref13 ref14 ref19 ref21 ref30">21, 30, 19, 14, 13</xref>
        ],
ALCH [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], SIF [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] and SHQ [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        Forgetting can however also be viewed as a second-order quanti cation
problem, which is the view we take in this paper. In second-order quanti er
elimination, the aim is to eliminate existentially quanti ed predicate symbols in order
to translate second-order formulae into equivalent formulae in rst-order logic [
        <xref ref-type="bibr" rid="ref23 ref24 ref26 ref28 ref4 ref5 ref6 ref7 ref8">5,
6, 8, 4, 7, 26, 23, 24, 28</xref>
        ]. In uniform interpolation the aim is to eliminate symbols
too, though it is not required that the result is logically equivalent to the
corresponding formula in second-order logic, only that all important consequences
are preserved.
      </p>
      <p>
        Our method is adapted from a method, called Msqel, designed for modal
logic to compute rst-order frame correspondence properties for modal axioms
and rules [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. The adaptation exploits the close relationship between
description logics and modal logics [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. Our method contributes three novel aspects.
It is the rst method for forgetting concept symbols from ontologies speci ed
in the description logic ALCOI. It inherits from Msqel the consideration of
elimination orders, which has been shown to improve the success rate and make
it succeed on a wider range for problems in the modal logic corresponding to
ALCOI [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. The success rate and its scope is further improved by the
incorporation of a new case splitting rule and generalised simpli cation rules. Results of
an empirical evaluation show improved success rates and performance for these
techniques.
2
      </p>
      <p>De nition of ALCOI and Other Basic De nitions
Let NC and NR be the set of atomic concepts and the set of atomic roles,
respectively, and let NO be the set of nominals. ALCOI-concepts have one of
these forms:</p>
      <p>a j ? j &gt; j A j :C j C t D j C u D j 9R:C j 9R :C j 8R:C j 8R :C,
where a 2 NO, A 2 NC , R 2 NR, and C and D are arbitrary ALCOI-concepts.
R denotes the inverse of the role R. By de nition, R is expressively the same
as R.</p>
      <p>An ontology usually consists of two parts, namely a TBox and an ABox. A
TBox contains a set of axioms of the form C v D or C D, where C and D are
concepts. A concept de nition C D can be expressed by two general inclusion
axioms C v D and D v C. In ALCOI, ABox axioms can be expressed as
inclusions in the TBox: a concept assertion C(a) can be expressed as a v C, and
a role assertion R(a; b) as a v 9R:b. In this paper, we treat the ABox axioms as
inclusions, consequently in our considerations ALCOI-ontologies are assumed
to contain TBox axioms only.</p>
      <p>We de ne an interpretation I for ALCOI over the signature (NC , NR, NO) as
the pair h I ;:I i, where I is a non-empty set that represents the interpretation
domain, and :I is the interpretation function that assigns to every nominal a 2
NO a singleton set aI I ; to every concept symbol A 2 NC a subset AI
of I ; and to every role symbol R 2 NR a subset RI of I I . We specify
the semantics of ALCOI-concepts by extending the interpretation function to
the following:</p>
      <p>?I = ;
(8R:C)I = fx 2
(9R:C)I = fx 2
(:C)I =</p>
      <p>I nCI</p>
      <p>(C t D)I = CI [ DI
I j 8y:(x; y) 2 RI ! y 2 CI g</p>
      <p>I j 9y:(x; y) 2 RI ^ y 2 CI g
(R )I = f(y; x) 2</p>
      <p>I</p>
      <p>I j (x; y) 2 RI g</p>
      <p>The semantics of the TBox-axioms is de ned as follows: an interpretation I
satis es C v D i CI DI , and I satis es C D i CI DI . If O is a set
of TBox axioms, I is a model of O i it satis es every axiom in O, denoted by
I j= O.</p>
      <p>In the rest of the paper, we also need the following de nitions. A clause is a
disjunction of ALCOI-concepts. Let A be a concept symbol and let I and I0 be
interpretations. We say I and I0 are A-equivalent, if I and I0 coincide but di er
possibly in the valuation assigned to A. This means their domains coincide, i.e.,</p>
      <p>I = I0 , and for each symbol s in the signature except for A, sI = sI0 . More
generally, suppose = fA1; : : : ; Amg NC , I and I0 are -equivalent, if I
and I0 are the same but di er possibly in the valuations assigned to the concept
symbols in .
3</p>
    </sec>
    <sec id="sec-2">
      <title>Forgetting as Second-Order Quanti er Elimination</title>
      <p>We are interested in forgetting concept symbols in axioms of an ontology O of
TBox axioms. Let sig(O) denote the signature of O.</p>
      <p>De nition 1. Let O and O0 be ALCOI-ontologies and let = fA1; : : : ; Amg be
a set of concept symbols. O0 is the result of forgetting the symbols in from O,
if sig(O0)
sig(O)n</p>
      <p>and for any interpretation I,
I j= O
i</p>
      <p>I0 j= O0 for some interpretation I0
-equivalent to I.</p>
      <p>The symbols in are the symbols to be forgotten. We refer to them as the
non-base symbols and the symbols in sig(O)n as the base symbols. The result
of forgetting a concept symbol A from O is the result of forgetting fAg from O.</p>
      <p>
        The result of forgetting a symbol A from an ontology O can be represented
as 9X OXA in the extension of the language with existentially quanti ed concept
variables. OXA is our notation for substituting every occurrence of A is O by X.
In general, for the target language which extends the (source) language of the
logic under consideration with existential quanti cation of predicate symbols, the
result of forgetting always exists. The challenge of forgetting, as a computational
problem, is to nd an ontology O0 (without any occurrences of X) in the source
language (without second-order quanti cation) that is equivalent to 9X OXA ,
where O is expressed in the source language. Finding such an ontology O0 that
is equivalent to 9X OXA is an instance of the second-order quanti er elimination
problem. Forgetting a concept symbol A is thus the problem of eliminating the
existential quanti er 9X from 9X OXA . In the following, we slightly informally
say the aim is to eliminate the symbol A from O. For this we apply second-order
quanti er elimination techniques to the axioms of O in order to forget A (the
non-base symbol). In particular, we are going to exploit an adaptation of a result
of Ackermann [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], which is known as Ackermann's Lemma in the literature on
second-order quanti er elimination [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>Theorem 1 (Ackermann's Lemma for ALCOI). Let O be an
ALCOIontology, let C be a concept expression and suppose the concept symbol A does
not occur in C. Let I be an arbitrary ALCOI-interpretation. (i) If A occurs
only positively in O, then I j= OCA i for some interpretation I0 A-equivalent
to I, I0 j= A v C; O. (ii) If A occurs only negatively in O then I j= OCA i for
some interpretation I0 A-equivalent to I, I0 j= C v A; O.
4</p>
    </sec>
    <sec id="sec-3">
      <title>The Forgetting Method DSQEL</title>
      <p>Our forgetting method is called Dsqel, which is short for Description logics
Second-order Quanti er ELimination.</p>
      <p>Figure 1 outlines the basic routine of the Dsqel method to forget concept
symbols in ALCOI-ontologies O. Once receiving the input ontology and a set
of concept symbols to forget, the method proceeds as follows. In Phase 1, a
preprocessing step is performed to transform the axioms into a set of clauses.
This is done by replacing all inclusions C v D by :C t D, and all equivalences
C D by :C t D and :D t C. Inexpensive equivalence-preserving syntactic
simpli cation rules are also applied in this phase to simplify clauses. For
example, C t (C u D) is simpli ed to C. Phase 2 counts the number of positive
(and negative) occurrences of each concept symbol in . Using these counts an
1. Transform ontology O to clausal representation N := clause(O).
2. Process every concept symbol A in and check the frequency of A in
polarity terms to generate the ordering .
3. Guided by , apply the Dsqel calculus to each of the concept symbols
in to produce the ontology O0 (with clauses interpreted in the obvious
way as inclusions).
4. Apply the simpli cation rules provided to O0 if needed and return the
resultant ontology containing the symbols only in sig(O0)n .
ordering is de ned on the symbols in . This ordering determines the order
in which the symbols in are eliminated in the next phase. Phase 3 applies the
Dsqel calculus described in the next section to the non-base symbols in one
by one, starting with the symbol A largest in the ordering . To forget A the
inference rules of the Dsqel calculus are applied to the axioms containing A.
Then the next largest non-base symbol is eliminated, and so on.</p>
      <p>Forgetting a concept symbol may lead to a change of the polarities of the
occurrences of the remaining -symbols, and a new elimination order may have
to be computed based on the refreshed polarity counts, before the forgetting
method to continues. This means Phase 2 and Phase 3 will be alternately and
repeatedly executed with recomputed elimination orders. If the largest current
concept symbols to be eliminated could not be completely eliminated by Dsqel,
then a di erent ordering not attempted before will be used. In the case that all
possible orderings have been tried and every attempt to eliminate all non-base
symbols using Dsqel is not successful, the method returns failure, because it
was unable to solve the problem. On the other hand, when after a call of Dsqel
the set returned does not contain any non-base symbols, then this is the result
of forgetting from O.</p>
      <p>Phase 4 subsequently applies further simpli cation rules and transforms the
resulting axioms to simpler representations.</p>
      <p>Di erent elimination orders of concept symbols applied may lead to di erent
but equivalent results. The results can be viewed (when the remaining non-base
symbols are existentially quanti ed) as equivalent representations of 9 O.</p>
      <p>What is returned by the algorithm, if it terminates successfully, is a
(possibly empty) ontology with all occurrences of the non-base symbols eliminated.
I.e., what is returned is an ontology speci ed in terms of only the symbols in
sig(O)n .</p>
      <p>
        There are situations where our method does not succeed, for instance, when
no forgetting result nitely expressible in ALCOI exists. This means the method
is not complete, but since no complete method can exist for forgetting, as
considered in this paper, this is to be expected. Concept forgetting is already not
always computable for the description logic E L [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. We also note that concept
symbols cannot be eliminated by our method does not necessarily mean that
provided:
      </p>
      <p>Purify:
provided:</p>
      <p>N; C1 t A; : : : ; Cn t A
(N AC1t:::t Cn ):C:1;C::1:;;C::n:;::Cn
(i) A is a non-base symbol,
(ii) A does not occur in any of the Ci,
(iii) A is strictly maximal wrt. each Ci, and
(iv) N is negative with respect to A.</p>
      <p>N
(N:A&gt;):&gt;:&gt;
(i) A is a non-base symbol in N , and
(ii) N is negative with respect to A.
they are ineliminable. It might be the case that they are eliminable, but simply
our method is unable to nd a solution.</p>
      <p>
        We can show Dsqel algorithm is correct and is guaranteed to terminate.
This follows as an adaptation of the correctness and termination of the Msqel
procedure proved in [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], since all adaptations of Msqel to Dsqel preserve
logical equivalence and the calculus given in the next section is correct and
terminates.
5
      </p>
    </sec>
    <sec id="sec-4">
      <title>The DSQEL Forgetting Calculus</title>
      <p>The order in which the non-base symbols are eliminated is determined by the
ordering computed in Phase 2 of the Dsqel algorithm. We say a concept
symbol A is strictly maximal with respect to a concept C if for any concept
symbol B (6= A) in C, A B.</p>
      <p>A concept C is positive (negative) with respect to a concept symbol A i all
occurrences of A in C are positive (negative). A set of concepts N is positive
(negative) with respect to a concept symbol A i all occurrences of A in N are
positive (negative).</p>
      <p>The Ackermann rule and the Purify rule, given in Figure 2, are the forgetting
rules in the Dsqel calculus, which will lead to the elimination of a non-base
concept symbol. Both of them have to meet particular requirements on the form
of the concepts to which they apply. N is a set of ALCOI-clauses, and by
NCD, we mean the set obtained from N by substituting the expression C for
all occurrences of D in N , where C and D are both ALCOI-concepts. The
inference rules in the Dsqel calculus are restricted by a set of side-conditions;
for example, the side-conditions of the Ackermann rule require that A must be a
non-base symbol and does not occur in C1; : : : ; Cn, no non-base symbol occurring
in Ci (1 i n) is larger than A under the ordering , and every occurrence
of A in N must be negative. The Purify rule can be seen as a special case of
the Ackermann rule, since it eliminates the non-base symbols that occur only
negatively, that is, when there are no positive occurrences of A.</p>
      <p>Surfacing:</p>
      <p>N; C t 8R :D</p>
      <p>N; 8R ; :C t D
provided: (i) A is the largest non-base symbol in C t 8R :D,
(ii) A does not occur in C, and
(iii) A occurs positively in 8R :D.</p>
      <p>Skolemization:</p>
      <p>N; :a t :8R :C
N; :a t :8R ::b; :b t</p>
      <p>C
provided: (i) A is the largest non-base symbol in :a t :8R :C,
(ii) A occurs positively in :8R :C, and
(iii) b is a new nominal.</p>
      <p>Clausify:</p>
      <p>N; C t :(D1 t ::: t Dn)</p>
      <p>N; C t D1; :::; C t Dn
provided: (i) A is the largest non-base symbol in C t :(D1 t ::: t Dn),
(ii) A occurs positively in D1 t ::: t Dn.</p>
      <p>Sign Switching:</p>
      <p>N
(N:AA):A:A
provided: (i) N is closed with respect to the other rules,
(ii) A is the largest non-base symbol in N , and
(iii) Sign switching wrt. A has not been performed before.</p>
      <p>
        The rules in Figure 3, are used to rewrite the formulae so they can be
transformed into the form where either the Ackermann rule or the Purify rule is
applicable. To apply these rules, the positive occurrences of the non-base symbol rst
have to be made `individually isolated'. In addition, every positive occurrence
of the non-base symbol must occur at the top level as a literal in a clause [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ],
that is, they must not occur under a quanti er restriction operator or any other
logical operator except for disjunction. This is done by repeatedly using the
surfacing rule. By R , we mean the composition of a sequence of roles and by R ;
we mean the composition of the sequence of inverses of the roles in R with the
order in the sequence reversed.
      </p>
      <p>The Skolemization rule rewrites the existential expression in a clause of the
form :a t :8R :C, where a is a nominal. The implicit existential quanti er in
:8R :C is Skolemized by introducing a new Skolem constant (nominal) b.</p>
      <p>The clausify rule transforms a concept of the form C t :(D1 t ::: t Dn) into
a set of clauses.</p>
      <p>The Sign switching rule is used to switch the polarity of a non-base symbol. It
is applicable only when no other rules in the calculus are applicable with respect
to this non-base symbol and the Sign switching rule has not been performed on
this non-base symbol before.</p>
      <p>Case Splitting:</p>
      <p>N; :a t C1 t ::: t Cn</p>
      <p>N; :a t C1 j ::: j N; :a t Cn
provided: (i) A is the largest non-base symbol in :a t C1 t ::: t Cn,
(ii) A occurs positively in C1 t ::: t Cn.</p>
      <p>A novelty in the Dsqel calculus is the case splitting inference rule given in
Figure 4. It splits a clause of the form :a t C1 t ::: t Cn into smaller subclauses
:a t C1, :a t C2, ..., :a t Cn. A single clause :a t C, together with N , forms a
case. The original formula means that at least one of the disjuncts Ci (1 i
n) is true for a. The bene ts of the case splitting rule are twofold. On the one
hand, the case splitting rule makes up for a limitation of the Skolemization rule,
because it splits a disjunction with more than two disjuncts into several smaller
cases, which the Skolemization rule is able to handle. On the other hand, our
tests show it reduces the search space and increases the success rate.</p>
      <p>Condensing I:</p>
      <p>N C t 8R 1 :8R 1; : : : : 8R n :8R n; :(C t D)</p>
      <p>N C t D t 8R 1 ?
provided: (i) C and D are arbitrary concepts, and
(ii) i 1 for 1 i n</p>
      <p>N C t 8R 1 :8R 1; : : : : 8R n :8R n; :(C t D)</p>
      <p>N C t D t 8R n ?
provided: (i) C and D are arbitrary concepts, and
(ii) i n for 1 i n</p>
      <p>Fig. 5. Sample simpli cation rule</p>
      <p>We also introduced several simpli cation rules to transform more expressions
so that inference rules become applicable, they keep expressions in simpler forms
for e ciency, and most importantly, they lead to success of forgetting in more
cases. Figure 5 displays two cases of the simpli cation rules, called Condensing I,
with which one can handle clauses of a particular pattern where other existing
methods fail.
6</p>
    </sec>
    <sec id="sec-5">
      <title>Empirical Results</title>
      <p>In order to evaluate how the Dsqel method behaves on real-life ontologies, we
implemented it in Java using the OWL API and applied the implementation to
a set of ontologies from the NCBO BioPortal1, a large repository of biomedical
ontologies. The experiments were run on a machine with an Intelr Coretm
i74790 processor, and four cores running at up to 3.60 GHz and 8 GB of
DDR31600 MHz RAM.</p>
      <p>Since Dsqel handles expressivity as far as ALCOI, the ontologies for our
evaluation were restricted to their ALCOI-fragments, and axioms outside of the
scope of ALCOI were dropped from the ontologies. Consequently, we used 292
ontologies from the repository for our evaluation. We ran the experiments on
each ontology 100 times and averaged the results to explore how forgetting was
in uenced by the number of the concept symbols in an ontology. A timeout of
1000 seconds was used.</p>
      <p>To t with possible needs of applications, we conducted experiments where
we forget 10%, 30%, and 50% of the concept symbols in the ontologies. The
Dsqel algorithm processes each non-base symbol and counts the number of
their positive (and negative) occurrences. Based on these counts, an elimination
order is generated by a heuristic algorithm. In order to see how the elimination
order a ects the performance of the calculus, we ran two sets of experiments,
where we omitted the analysis of the elimination order for one set, and applied
the analysis to the other set. The evaluation results with respect to forgetting
10%, 30%, 50% of the concept symbols in the ontologies, without and with the
analysis of the elimination order, are shown in Table 1.</p>
      <p>It can be seen that, the analysis of the elimination order leads to a decrease in
the average duration of the runs of every experiment, which means that it takes
shorter time to complete the same task than when analysis of the elimination
order is not performed. It is evident that the analysis for the elimination order
has brought a positive e ect on the overall success rate (increase by 8.1%) and
the timeout rate (decrease by 5.9%).</p>
      <p>
        Evaluations of more aspects are being conducted at the moment. These
evaluations are focussed on, for example, how the case splitting rule makes a di erence
to the behaviour of the Dsqel calculus, and how our method compares to the
related methods of Scan [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], Dls [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], Dls [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], Sqema [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], Msqel [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], and
LETHE [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] for computing uniform interpolants, in terms of the success rate
and e ciency (duration and timeouts).
1 http://bioportal.bioontology.org/
Probably the most important early work on the elimination of second-order
quanti ers is that of Ackermann [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] in 1935. Only in 1992, Gabbay and Ohlbach [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
developed the rst practical algorithm, called Scan. Scan is a resolution-based
second-order quanti er elimination algorithm and can be used to forget predicate
symbols from rst-order logic formulae [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
      </p>
      <p>
        It has been shown that the Scan algorithm is complete and terminates for
modal axioms belonging to the famous Sahlqvist class [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In 1994, the
hierarchical theorem proving method was developed by Bachmair et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and it
has been shown that it can be used to solve second-order quanti cation
problems. Around the same time, in 1995, Szalas [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] described a di erent algorithm
for the second-order quanti er elimination problem, which exploits Ackermann's
Lemma. The method was further extended to the Dls algorithm by Doherty et
al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Dls uses a generalised version of Ackermann's Lemma and allows the
elimination of existential second-order quanti ers from second-order formulae,
and obtaining corresponding rst-order equivalents. Nonnengart and Szalas [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]
generalised the main result underlying the Dls algorithm to include xpoints.
Based on this work, Doherty et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] proposed the Dls algorithm, which
attempts the derivation of either an equivalent rst-order formula or a xpoint
formula from the original formula. Dls and Dls are Ackermann-based
secondorder quanti er elimination methods. Ackermann-based second-order quanti er
elimination was rst applied to description logics in [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] by Szalas, where
description logics were extended by a form of second-order quanti cation over concepts.
More recently, Conradie et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] introduced the Sqema algorithm, which is also
an Ackermann-based method but for modal logic formulae. It is specialised to
nd correspondences between modal formulae and hybrid modal logic
formulae (and rst-order formulae). Schmidt [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] has extended Sqema and developed
Msqel as a re nement. A key novelty is the use of elimination orders, and the
presentation of second-order quanti er elimination as an abstract calculus.
      </p>
      <p>
        Investigation of forgetting as uniform interpolation in more expressive
description logics was started in [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] and [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The rst approach to compute
uniform interpolations for ALC-TBoxes was presented in [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. It is a tableau-based
approach, where a disjunctive normal form is required for the representation of
the TBox-axioms and the uniform interpolants are incrementally approximated.
It was shown in [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] that deciding the existence of uniform interpolants that
can be nitely represented in ALC without xpoints is 2-ExpTime-complete
and in the worst case, the size of uniform interpolants is triple exponential with
respect to the size of the original TBox. The rst goal-oriented method based
on clausal resolution was presented in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] for computing uniform interpolants
of ALC-TBoxes, where experimental results show the practicality for real-life
ontologies. Koopmann and Schmidt presented another resolution-based method
exploiting structural transformation to compute uniform interpolants of
ALContologies, which uses xpoint operators to make uniform interpolants nitely
representable [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The method has been further extended to handle ALCH [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
SIF [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], SHQ [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], and ALC with ABoxes [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
8
      </p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion and Future Work</title>
      <p>We have presented a second-order quanti er elimination method, called Dsqel,
for forgetting concept symbols in ontologies speci ed in the description logic
ALCOI.</p>
      <p>It is adapted from Msqel, an Ackermann-based second-order quanti er
elimination method for a multi-modal tense logic with second-order quanti cation.
The method is enhanced with new inference and simpli cation rules. The
adaptation was motivated for the purpose of applying the second-order quanti er
elimination techniques to the area of knowledge representation, where
description logics provide important logical formalisms.</p>
      <p>We have had a prototype implementation of our forgetting method, fully
realising the Dsqel method. It is known that the success of a forgetting problem
is highly dependent on, apart from the calculus itself, the non-base symbols to
be forgotten, and the elimination order which the method follows. The evaluation
results of rst experiments reported in this paper show promising and very good
success rates for concept symbol forgetting.</p>
      <p>Optimisation to both the calculus and the implementation is underway. One
optimisation being investigated is the incorporation of more simpli cation rules
in order to increase the e ciency and success rate further. We are also currently
working on nding a heuristic algorithm using a dynamic way of ordering the
non-base symbols, because the elimination of a particular concept symbol may
a ect the optimality of the elimination order, and thus computing a new order
may be bene cial. Research shows that the order in which the inference rules
are applied is signi cant because, as we observed, it is a main factor a ecting
the e ciency of the method.</p>
      <p>Extending the method to handle ontologies going expressively further than
ALCOI is a direction of the ongoing research. To explore how the forgetting of
role symbols can be incorporated into our method is also of interest.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>W.</given-names>
            <surname>Ackermann</surname>
          </string-name>
          .
          <article-title>Untersuchungen uber das Eliminationsproblem der mathematischen Logik</article-title>
          .
          <source>Mathematische Annalen</source>
          ,
          <volume>110</volume>
          (
          <issue>1</issue>
          ):
          <volume>390</volume>
          {
          <fpage>413</fpage>
          ,
          <year>1935</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>L.</given-names>
            <surname>Bachmair</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ganzinger</surname>
          </string-name>
          , and
          <string-name>
            <given-names>U.</given-names>
            <surname>Waldmann</surname>
          </string-name>
          .
          <article-title>Refutational theorem proving for hierarchic rst-order theories</article-title>
          .
          <source>Applicable Algebra in Engineering, Communication and Computing</source>
          ,
          <volume>5</volume>
          (
          <issue>3</issue>
          -4):
          <volume>193</volume>
          {
          <fpage>212</fpage>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>C.</given-names>
            <surname>Bernardo</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Motik</surname>
          </string-name>
          . B.:
          <article-title>Reasoning over ontologies with hidden content: The importby-query approach</article-title>
          .
          <source>J. Arti cial Intelligence Research</source>
          ,
          <volume>45</volume>
          :
          <fpage>197</fpage>
          {
          <fpage>255</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>W.</given-names>
            <surname>Conradie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Goranko</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Vakarelov</surname>
          </string-name>
          .
          <article-title>Algorithmic correspondence and completeness in modal logic. I. the core algorithm SQEMA</article-title>
          .
          <source>Logical Methods in Computer Science</source>
          ,
          <volume>2</volume>
          (
          <issue>1</issue>
          ),
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>P.</given-names>
            <surname>Doherty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Lukaszewicz</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Szalas</surname>
          </string-name>
          .
          <article-title>Computing circumscription revisited: A reduction algorithm</article-title>
          .
          <source>Journal of Automated Reasoning</source>
          ,
          <volume>18</volume>
          (
          <issue>3</issue>
          ):
          <volume>297</volume>
          {
          <fpage>336</fpage>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>P.</given-names>
            <surname>Doherty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Lukaszewicz</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Szalas</surname>
          </string-name>
          .
          <article-title>General domain circumscription and its e ective reductions</article-title>
          .
          <source>Fundam</source>
          . Inf.,
          <volume>36</volume>
          (
          <issue>1</issue>
          ):
          <volume>23</volume>
          {
          <fpage>55</fpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Gabbay</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Ohlbach</surname>
          </string-name>
          .
          <article-title>Quanti er elimination in second{order predicate logic</article-title>
          .
          <source>In Principles of Knowledge Representation and Reasoning (KR92)</source>
          , pages
          <fpage>425</fpage>
          {
          <fpage>435</fpage>
          . Morgan Kaufmann,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>D. M. Gabbay</surname>
            ,
            <given-names>R. A.</given-names>
          </string-name>
          <string-name>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Szalas. Second Order</surname>
          </string-name>
          <article-title>Quanti er Elimination: Foundations, Computational Aspects and Applications</article-title>
          . College Publications,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>V.</given-names>
            <surname>Goranko</surname>
          </string-name>
          , U. Hustadt,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Vakarelov</surname>
          </string-name>
          .
          <article-title>SCAN is complete for all sahlqvist formulae</article-title>
          .
          <source>In Relational and Kleene-Algebraic Methods in Computer Science</source>
          , volume
          <volume>3051</volume>
          of Lecture Notes in Computer Science, pages
          <volume>149</volume>
          {
          <fpage>162</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>B.</given-names>
            <surname>Konev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Walther</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>Model-theoretic inseparability and modularity of description logic ontologies</article-title>
          .
          <source>Arti cial Intelligence</source>
          ,
          <volume>203</volume>
          (
          <issue>0</issue>
          ):
          <volume>66</volume>
          {
          <fpage>103</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>B.</given-names>
            <surname>Konev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Walther</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>Forgetting and uniform interpolation in extensions of the description logic EL</article-title>
          .
          <source>In Proceedings of the 22nd International Workshop on Description Logics (DL</source>
          <year>2009</year>
          ), Oxford, UK,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          .
          <article-title>Forgetting concept and role symbols in ALCHontologies</article-title>
          . In Logic for Programming,
          <source>Arti cial Intelligence, and Reasoning</source>
          , volume
          <volume>8312</volume>
          of Lecture Notes in Computer Science, pages
          <volume>552</volume>
          {
          <fpage>567</fpage>
          . Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          .
          <article-title>Implementation and evaluation of forgetting in ALC-ontologies</article-title>
          .
          <source>In Proceedings of the 7th International Workshop on Modular Ontologies (WoMo</source>
          <year>2013</year>
          ), volume CEUR-WS/Vol-1081
          <source>of CEUR Workshop Proceedings</source>
          , pages
          <fpage>1</fpage>
          <lpage>{</lpage>
          12. CEUR-WS.org,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          .
          <article-title>Uniform interpolation of ALC-ontologies using xpoints</article-title>
          .
          <source>In Frontiers of Combining Systems</source>
          , volume
          <volume>8152</volume>
          of Lecture Notes in Computer Science, pages
          <volume>87</volume>
          {
          <fpage>102</fpage>
          . Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          .
          <article-title>Count and forget: Uniform interpolation of SHQ-Ontologies</article-title>
          .
          <source>In Automated Reasoning - IJCAR 2014. Proceedings</source>
          , pages
          <volume>434</volume>
          {
          <fpage>448</fpage>
          . Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt. LETHE</surname>
          </string-name>
          :
          <article-title>A saturation-based tool for nonclassical reasoning</article-title>
          ,
          <year>2015</year>
          . Manuscript, submitted.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          .
          <article-title>Saturation-based forgetting in the description logic</article-title>
          <source>SIF</source>
          ,
          <year>2015</year>
          . This volume.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          .
          <article-title>Uniform interpolation and forgetting ALContologies with aboxes</article-title>
          .
          <source>In Proceedings of AAAI Conference on Arti cial Intelligence</source>
          , pages
          <fpage>175</fpage>
          {
          <fpage>181</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>M.</given-names>
            <surname>Ludwig</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Konev</surname>
          </string-name>
          .
          <article-title>Towards practical uniform interpolation and forgetting for ALC tboxes</article-title>
          .
          <source>In Proceedings of the 26th International Workshop on Description Logics (DL-2013)</source>
          , volume
          <volume>1014</volume>
          <source>of CEUR-WS</source>
          , pages
          <volume>377</volume>
          {
          <fpage>389</fpage>
          . CEUR-WS.org,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>C. Lutz</surname>
            ,
            <given-names>I. Seylan</given-names>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>An automata-theoretic approach to uniform interpolation and approximation in the description logic EL</article-title>
          .
          <source>In Principles of Knowledge Representation and Reasoning: KR</source>
          <year>2012</year>
          . AAAI Press,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>Foundations for uniform interpolation and forgetting in expressive description logics</article-title>
          .
          <source>In Proceedings of IJCAI 2011</source>
          , pages
          <fpage>989</fpage>
          {
          <fpage>995</fpage>
          . IJCAI/AAAI,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>N.</given-names>
            <surname>Nikitina</surname>
          </string-name>
          .
          <article-title>Forgetting in general EL terminologies</article-title>
          .
          <source>In Description Logics</source>
          , volume
          <volume>745</volume>
          <source>of CEUR Workshop Proceedings. CEUR-WS.org</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>A.</given-names>
            <surname>Nonnengart</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Szalas</surname>
          </string-name>
          .
          <article-title>A xpoint approach to second-order quanti er elimination with applications to correspondence theory</article-title>
          .
          <volume>24</volume>
          :
          <issue>307</issue>
          {
          <fpage>328</fpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Ohlbach</surname>
          </string-name>
          .
          <article-title>SCAN|elimination of predicate quanti ers</article-title>
          . In M. A.
          <string-name>
            <surname>McRobbie and J. K</surname>
          </string-name>
          . Slaney, editors,
          <source>Automated Deduction: In proceedings of CADE-13</source>
          , volume
          <volume>1104</volume>
          <source>of Lecture Notes in Arti cial Intelligence</source>
          , pages
          <fpage>161</fpage>
          {
          <fpage>165</fpage>
          . Springer,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>K.</given-names>
            <surname>Schild</surname>
          </string-name>
          .
          <article-title>A correspondence theory for terminological logics: Preliminary report</article-title>
          .
          <source>In Proceedings of IJCAI'91</source>
          , pages
          <fpage>466</fpage>
          {
          <fpage>471</fpage>
          . Morgan Kaufmann,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          .
          <article-title>The Ackermann approach for modal logic, correspondence theory and second-order reduction</article-title>
          .
          <source>Journal of Applied Logic</source>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          ):
          <volume>52</volume>
          {
          <fpage>74</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>A.</given-names>
            <surname>Szalas</surname>
          </string-name>
          .
          <article-title>On the correspondence between modal and classical logic: an automated approach</article-title>
          .
          <source>Journal of Logic and Computation</source>
          ,
          <volume>3</volume>
          :
          <fpage>605</fpage>
          {
          <fpage>620</fpage>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>A.</given-names>
            <surname>Szalas</surname>
          </string-name>
          .
          <article-title>Second-order reasoning in description logics</article-title>
          .
          <source>Journal of Applied NonClassical Logics</source>
          ,
          <volume>16</volume>
          (
          <issue>3-4</issue>
          ):
          <volume>517</volume>
          {
          <fpage>530</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>K.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Topor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G.</given-names>
            <surname>Antoniou</surname>
          </string-name>
          .
          <article-title>Concept and role forgetting in ALC ontologies</article-title>
          .
          <source>In The Semantic Web - ISWC</source>
          <year>2009</year>
          , volume
          <volume>5823</volume>
          of Lecture Notes in Computer Science, pages
          <volume>666</volume>
          {
          <fpage>681</fpage>
          . Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <given-names>K.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Topor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Z.</given-names>
            <surname>Pan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G.</given-names>
            <surname>Antoniou</surname>
          </string-name>
          .
          <article-title>Eliminating concepts and roles from ontologies in expressive description logics</article-title>
          .
          <source>Computational Intelligence</source>
          ,
          <volume>30</volume>
          (
          <issue>2</issue>
          ):
          <volume>205</volume>
          {
          <fpage>232</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Topor</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Pan</surname>
          </string-name>
          .
          <article-title>Forgetting for knowledge bases in DLlite</article-title>
          .
          <source>In The Semantic Web: Research and Applications</source>
          , volume
          <volume>5021</volume>
          of Lecture Notes in Computer Science, pages
          <volume>245</volume>
          {
          <fpage>257</fpage>
          . Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>