<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Prover-independent Axiom Selection for Automated Theorem Proving in Ontohub</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Eugen Kuksa</string-name>
          <email>eugenk@informatik.uni-bremen.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Till Mossakowski</string-name>
          <email>till@iws.cs.uni-magdeburg.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Bremen</institution>
          ,
          <addr-line>Bremen</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Magdeburg</institution>
          ,
          <addr-line>Magdeburg</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>56</fpage>
      <lpage>68</lpage>
      <abstract>
        <p>In recent years, formalised large theories in form of ontologies, system speci cations or mathematical libraries with thousands of sentences have become more and more common. Automatically proving properties in such theories is an important task in research as well as in industry, for instance, as part of system speci cations. However, automated theorem provers struggle nding proofs when there are too many axioms available. This paper presents and investigates two approaches to reduce the load on automated theorem provers by preselecting axioms: 1) a generalisation of the SInE selection heuristics to arbitrary rst-order provers, and 2) frequent item set mining. These selection methods are implemented in the web application Ontohub. One of the implementations' usefulness is validated while others' is refuted by an evaluation on well-known benchmarks for automated theorem proving.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>the AI method of frequent item set mining (which we will employ for axiom selection). Section 3 presents the
axiom selection algorithms whose implementation is described brie y in section 4 and evaluated in section 5.
Afterwards, section 6 gives an overview of related work while section 7 concludes this paper.
2
2.1</p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <sec id="sec-2-1">
        <title>Ontohub</title>
        <p>
          Ontohub [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] is an open source repository engine for managing distributed logical theories. While Ontohub
focuses on ontologies, it supports arbitrary logical theories, let them be ontologies, models, speci cations, or
others. The distributed nature enables communities to share and exchange their contributions easily. Ontohub
supports (among others) rst-order logic based on the TPTP format [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] It also supports various structuring and
modularity constructs and inter-theory (concept) mappings, building on the OMG-standardized DOL language.
        </p>
        <p>Ontohub has several distinctive features. The following list gives a short overview of them.</p>
        <p>Di erent repositories organise logical theories. For each repository, access rights and ownership can be
managed on a per-user or per-team basis.</p>
        <p>
          Logical theories (and all other les) are versioned. The underlying git1 [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] version control system is an
integral part of Ontohub. This feature allows the user to browse through the history of the repository and
inspect any change in any le.
        </p>
        <p>Ontohub features an integrated editor for logic theories, which however may also be edited outside of
Ontohub: les can either be uploaded via the web front end or via git with SSH.</p>
        <p>Ontohub is fully linked-data compliant. One and the same URL can be used for referencing a logical
theory, downloading its de ning le or examining it in a user-friendly presentation in the browser. The
representation served by Ontohub depends on the requested MIME-type.</p>
        <p>Logical theories can be modular and distributed, which means they can be structured into many simpler
theories depending on each other.</p>
        <p>
          As in BioPortal [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] and the NeOn Toolkit [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], logical theories can be aligned and combined along alignments.
Logical relations like interpretations of theories, conservative extensions, etc. between logical theories are
supported.
        </p>
        <p>
          Diverse structuring languages are supported, including DOL2 [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] and CASL [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
        </p>
        <p>As a novel contribution of this work, logical theories may contain conjectures which Ontohub recognises.</p>
        <p>There is an interface for proving these with di erent parametrisations.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Hets</title>
        <p>
          Ontohub itself does only little analysis of logical theories. Instead, we use the Heterogeneous Tool Set (Hets)3 [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]
as a back end to parse and evaluate a logical theory. Hets features a RESTful web API: As soon as a logical
theory is sent to Hets's HTTP server with the command to parse it, it analyses the theory le and answers the
request with an XML or JSON representation of its details. Ontohub then parses the answer, post-processes it
and then stores the theory's details in the database. The whole evaluation process is done asynchronously in the
background, so that the user can still work with the web application.
        </p>
        <p>
          Currently, Hets has an interface to several rst-order automated provers (ATPs) as, for example, SPASS [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ],
E [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], Darwin [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], and via the MathServe Broker [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ]: Vampire [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. Similar to the analysis of logical theories,
Hets can be called to run a proof attempt via the RESTful web API.
        </p>
        <p>Hets also features user interfaces other than the web API, for example, a graphical user interface, a stateless
command line interface or an interactive command prompt, but we do not use them in the context of Ontohub.</p>
        <p>1Git is a popular decentralised version control system, usually utilised in software development. Many open source software
projects use git in combination with Github: https://github.com (last checked: 13 June 2016).</p>
        <p>2Details on DOL and its background can be found on http://dol-omg.org (last checked: 13 June 2016).
3Details on HETS can be found on http://hets.eu (last checked: 13 June 2016).</p>
        <p>Before starting this work, Ontohub was not able to recognise conjectures in a logical theory. Hets, however,
already provided proving functionality and thus, its analysis of the theory already discovered conjectures.
However, Hets's proving interface has not been suitable for the use with Ontohub yet. For the preparation of the
axiom selection, adjustments of Hets's interface and the creation of an infrastructure for proving conjectures in
Ontohub were required.</p>
        <p>
          By this work, Ontohub nds conjectures (called theorems for simplicity) and allows the user to run proof
attempts with each of Hets's ATP that are suitable for the logic translation's target logic. For each nished
proof attempt, Ontohub provides an overview of its details like the time it took, the axioms that were used and
the prover's output. It is even possible to run multiple proof attempts in parallel with di erent ATP which yields
a higher success rate [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
2.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Frequent Item Set Mining</title>
        <p>
          Frequent item set mining [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] is a method commonly used for market basket analysis. It aims at revealing
regularities in the shopping behaviour of customers of, for example, supermarkets and online shops: It nds
products that are usually bought together. From a more technical perspective, it can also be used for dependence
analysis. In the context of axiom selection, our approach is to nd sentences that have symbols in common and
hence are related to each other. This section brie y presents the basic notions of frequent item set mining.
Details of implementations are not relevant at this point. The following de nitions are based on Borgelt's lecture
slides [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] on frequent item set mining.
        </p>
        <p>De nition 2.1 Let B = fi1; : : : ; img be a set of items. B is called the item base. A subset I B of the item base
is called an item set. A multiset4 T = ft1; : : : ; tng with 8m 2 f1; : : : ; kg : tm B is called a transaction database
over B. An element tm of T is called a transaction over B.</p>
        <p>Items are these entities whose occurrence together with other entities is analysed, for example, shopping
products. A transaction database can be, for example, a collection of purchases in a shop over a given period of
time. Note that the same transaction can occur multiple times in a transaction database because it is de ned as
a multiset. In practice, the item base is often given implicitly as the union of all the item sets in the transaction
database.</p>
        <p>De nition 2.2 Let T = ft1; : : : ; tng be a transaction database, I
t 2 T covers I i I t. We de ne the multiset KT (I) ..= ft 2 T j I</p>
        <sec id="sec-2-3-1">
          <title>B an item set of an item base. A transaction</title>
          <p>tg with the characteristic
8t 2 KT (I) : multiplicityKT (I)(t) = multiplicityT (t)
meaning that each element of KT (I) occurs as many times in KT (I) as it occurs in T . KT (I) is called the cover
of I with respect to T .</p>
          <p>The cover is the multiset of transactions that cover the given item set. It is a tool for de ning two of the
central notions of this topic: the absolute and the relative support.</p>
          <p>De nition 2.3 sT (I) ..= j KT (I) j is the absolute support</p>
          <p>T (I) ..= n1 j KT (I) j is the relative support of I with respect to T .
of</p>
          <p>I
with
respect
to</p>
          <p>T .</p>
          <p>The support is the number or fraction of transactions in the transaction database that cover an item set. It
is also called the absolute or relative frequency.</p>
          <p>De nition 2.4 Given
the size of the transaction base n 2 N</p>
          <p>an item base B = fi1; : : : ; img
a transaction database T = ft1; : : : ; tng
and the minimum support of either smin 2 f0; : : : ; ng
or R
min 2 [0; 1]</p>
          <p>N
4A multiset (also called a bag) M is an unordered collection of elements. It can contain the same elements multiple times. How
many times an element is included is given by the function multiplicityM : M ! N.
frequent item set mining is about nding the set of frequent item sets:</p>
          <p>
            There are algorithms which compute the set of frequent item sets e ciently. In the worst case, the time
complexity is exponential in the number of items. However, algorithms used in practice, like FP-Growth [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ],
Eclat [
            <xref ref-type="bibr" rid="ref29">29</xref>
            ] and Apriori [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ], prune the search space in a way that mining is not only feasible but also nishes
quickly with real world data. Except for some special cases, FP-Growth is the fastest algorithm in general [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ].
3
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Axiom Selection Algorithms</title>
      <p>The basic idea of many selection methods is to nd sentences that share a symbol with the already selected
sentences. Standing out, SInE concentrates on the characteristics of de nitions: They describe more special
terms by using more general terms. It assumes that the more general terms occur more often in a theory.</p>
      <p>An entirely di erent observation we made when manually solving mathematics-textbook exercises is that
sentences are probably relevant if they share many symbols with the conjecture or the already selected sentences.
This section covers axiom selection ideas based on this observation which are novel contributions of this work.</p>
      <p>In the sequel, let symbols(') denote the set of non-logical symbols of a rst-order sentence '.
3.1</p>
      <sec id="sec-3-1">
        <title>SInE</title>
        <p>
          SInE operates heuristically on the syntax of rst-order sentences and was rst implemented in the Vampire
Prover. It was rst developed in Hoder's masters thesis `Automated Reasoning in Large Knowledge Bases'. It
entered the public as an implementation in Python with the Vampire V9 and E 0.999 as a back end at
CASCJ45 [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. Later, an implementation was included in both, the Vampire Prover and the E Theorem Prover. A
detailed description of the algorithm can be found in [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. This section only reiterates the original work while
being formulated slightly di erently since the de nitions are also needed for the axiom selection methods with
frequent item set mining.
        </p>
        <p>be sentences. Furthermore, let
be the conjecture. Let
De nition 3.1 Let k 2 N, s be a symbol, ',
trigger Sym Sen be an arbitrary relation.</p>
        <p>1. s is 0-step triggered i s 2 symbols( ).</p>
        <sec id="sec-3-1-1">
          <title>2. ' is k + 1-step triggered i s is k-step triggered and trigger(s; ').</title>
          <p>3. s is k-step triggered i there is a k-step triggered ' and s 2 symbols(').
This recursive de nition can be illustrated as follows:
3
s0
trigger
'1
3
s1
trigger
'2
3
: : :
We now de ne a trigger relation as needed for Def. 3.1.</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>De nition 3.2 The commonness of a symbol s, denoted by occ(s), is the number of axioms which contain s.</title>
        </sec>
        <sec id="sec-3-1-3">
          <title>Note that (quanti ed) variables are not treated as symbols.</title>
          <p>De nition 3.3 Let s be a symbol, ' be an axiom, 1 t 2 R the tolerance parameter, 1 g 2 N the generality
threshold parameter. Let furthermore slcs 2 symbols(') with for all s 2 symbols(') : occ(slcs) occ(s) be the
least common symbol of '. The trigger relation of SInE is de ned as: trigger(s; ') i s 2 symbols(') and (either
occ(s) g or occ(s) t occ(slcs)).</p>
          <p>This means that either a sentence is triggered because it contains very uncommon symbols (due to the
generality threshold; occ(s) g) or it is triggered by its least common symbol (or as close to it as the tolerance
allows; occ(s) t occ(slcs)).</p>
          <p>SInE then selects all axioms that are at most d-step triggered given a d 2 N[f1g as the depth limit parameter.
5The used SInE version and more information about it is available at http://www.cs.man.ac.uk/~hoderk/sine/. Last checked:
13 June 2016.
3.2</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Simple Axiom Selection using Frequent Item Set Mining</title>
        <p>Finding sentences that share many symbols with the conjecture is similar to nding frequent item sets: Frequent
item set mining answers the question which items occur often in combination.</p>
        <p>De nition 3.4 Let smin 2 N and min 2 [0; 1] R be a minimum absolute respectively relative support. Let
T = (A; C) be a theory consisting of a set of axioms A and a set of conjectures C. Let the multiset
be a transaction database and let the set</p>
        <p>T = fsymbols(') j ' 2 A [ Cg</p>
        <p>Frequent symbol set mining helps nding the symbols that occur together in a sentence and that occur in the
conjecture or the already selected sentences as well. One can then select the sentences that have all the symbols
of the frequent symbol sets. This would, however, ignore the short sentences which have less symbols than the
absolute minimum support. To consider them as well, one can select all the short sentences that share a symbol
with the already selected sentences.</p>
        <p>De nition 3.5 Let F be a set of frequent symbol sets for the corresponding theory (A; C) with a de ned minimum
support. Let s be a symbol and ' 2 A be an axiom while 2 C is the conjecture. Let 2 n 2 N be a minimal
symbol set size, t 2 N be a short axiom tolerance, d 2 N [ f1g be a depth limit.</p>
        <p>1. ' is 0-step selected i j symbols(') j &lt; n + t.
2. s is 0-step selected i s 2 symbols( ).
3. S 2 F is selection-enabled i n</p>
        <p>j S j.</p>
        <sec id="sec-3-2-1">
          <title>4. ' is k + 1-step selected i</title>
          <p>there is some S 2 F with: S is selection-enabled and S
s.
symbols(') and s 2 S for a k-step selected symbol
5. s is k-step selected i ' is k-step selected and s 2 symbols('), for k
1.</p>
        </sec>
        <sec id="sec-3-2-2">
          <title>Then, the union of j-step selected axioms for all j d form the nal axiom selection.</title>
          <p>This de nition describes a simple axiom selection idea that was implemented in Ontohub in this work. The
recursive de nition can be illustrated as follows:</p>
          <p>F</p>
          <p>F
2</p>
          <p>2
3
s0 2 S0
symbols('1)
3
s1 2 S1
symbols('2)
3
: : :
3.3</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>SInE with Frequent Symbol Set Mining</title>
        <p>Another idea to circumvent the problem of short sentences is to combine frequent item set mining with SInE.
The k-step-trigger relation from Def. 3.1 is modi ed. Apart from this de nition, the SInE algorithm is used as
is.</p>
        <p>De nition 3.6 Let k 2 N, s; s0 be symbols, ', be sentences. Furthermore, let be the conjecture,
trigger Sym Sen be a relation and F be the set of frequent symbol sets for the corresponding theory with
a de ned minimum support. Let 1 2 R be a tolerance value.
1. s is 0-step triggered i s 2 symbols( ).
2. s is k-step-trigger-enabled i there is an S 2 F : fsk; sg
with sk being k-step triggered
and for all s0 2 S : occ(s0) occ(smcs)
where smcs 2 S is the most common symbol of S.</p>
        <sec id="sec-3-3-1">
          <title>3. ' is k + 1-step triggered i s is k-step-trigger-enabled and trigger(s; ').</title>
          <p>4. s is k-step triggered i ' is k-step triggered and s 2 symbols(').</p>
          <p>F</p>
          <p>S
F
This recursive de nition can be illustrated as follows (note that the condition involving smcs is not illustrated):
3</p>
          <p>2
s00 2 S0 3 s0</p>
          <p>This de nition says that not the symbols that occur in a triggered sentence are allowed to trigger further
axioms. Instead, those symbols are allowed that occur in a frequent symbol set in combination with a symbol
from a triggered sentence. Additionally, only the most common symbols (with a tolerance) of such a frequent
symbol set may trigger an axiom. Specifying a high tolerance value allows any symbol from such a set to
trigger. The evaluation of SInE showed that there were still many axioms selected and the idea was to reduce
the selection even further.
4</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Implementation</title>
      <p>The described axiom selection methods were implemented in Ontohub which is based on the web framework
Ruby on Rails. One of Ontohub's basic features is the analysis of logical theories which recognises sentences and
symbols inside the sentences. These are stored in a relational database and queried when an axiom selection
heuristic is invoked.</p>
      <p>In our implementation, association objects are stored in the database such that SInE's commonness values
and the frequent symbol sets don't need to be re-computed. Furthermore, the minimal tolerance parameter of
SInE for each axiom/symbol combination for the symbol to trigger the axiom is saved. This way, the axiom
selection of consecutive proof attempts with di erent parametrisations of our selection methods or for di erent
conjectures in the same logical theory is very e cient.</p>
      <p>
        The axiom selections that are using frequent symbol set mining are based on the mining algorithm FP-Growth.
The FP-Growth application itself is implemented in C by Borgelt6 [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and invoked from Ontohub's Ruby code.
5
5.1
      </p>
    </sec>
    <sec id="sec-5">
      <title>Evaluation</title>
      <sec id="sec-5-1">
        <title>Setup</title>
        <p>
          The axiom selection was evaluated on rst-order logic with the MPTP20787 [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] benchmark which is used in the
TPTP format and is based on the Mizar Mathematical Library (MML) [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
        </p>
        <p>Each problem of the MPTP2078 benchmark comes in a `bushy' and a `chainy' version. The `bushy' version
contains only the axioms that are used in a human-made proof while the `chainy' version contains all axioms
that were introduced in the MML before the conjecture. Proof attempts were started for each problem in both
versions without any axiom selection. Their results are used as a baseline: The problems that could not be solved
in the bushy category are considered too hard for the used ATP with the given resources because the bushy
ones only contain axioms which contribute to a known human-made proof. The other ones are the ones whose
corresponding chainy version might be solved with an appropriate axiom selection. For evaluating the axiom
selection methods, only the chainy versions were used. The problems that could be solved in the chainy category
without an axiom selection are supposed to be also provable with an axiom selection. An axiom selection is
6The FP-Growth implementations sources or binaries for various systems can be downloaded from http://borgelt.net/fpgrowth.
html (last checked: 13 June 2016).</p>
        <p>7Information about the MPTP2078 benchmark is available on http://wiki.mizar.org/twiki/bin/view/Mizar/MpTP2078 (last
checked: 13 June 2016).
parameter
generality threshold g
depth limit d
tolerance value t
symbol set tolerance
min. absolute support smin
short axiom tolerance t
minimal symbol set size n</p>
        <p>SInE
considered not e ective if fewer conjectures can be proven using it than without using it in the chainy category.
It is possible that a selection hides axioms that are relevant for a proof and, hence, leads to no conclusion.
However, a well performing selection should enable proving more conjectures by selecting all the relevant axioms
and hiding only irrelevant ones.</p>
        <p>The experiments were conducted on an instance of Ontohub speci cally set up for this work. This instance
runs on a machine with two Intel R Xeon R E5-2667 v2 processors with HyperThreading (resulting in 32 logical
processor cores) typically clocked at 3.3 GHz along with 256 GB of RAM.</p>
        <p>For analysis and proving, 30 Hets instances were used in parallel. This puts heavy load on 30 of the cores.
The asynchronous (to the web interface) processing of Hets responses is done by another 30 Ruby processes.
Their workload alternates with that of the Hets processes, such that no additional cores are used extensively at
the same time. The web user interface's workload is very low. During the evaluation, it is only called by Hets
to fetch the theory les and it does not put heavy use to another core. In total 30 cores were used completely
and one additional core was used with little load. This leaves one spare processor core for other tasks. During
the experiments, processor utilisation of around 70% was observed.</p>
        <p>For the benchmark, SPASS v3.7 and the E Theorem Prover 1.8 were used. These are among the best-rated
rst-order provers. Since E features an own implementation of SInE, this was not activated by only using the
parameters -xAuto -tAuto among (soft) CPU time and memory limiting as well as input and output parameters.</p>
        <p>The parameters for the axiom selections are shown in Table 1. Proof attempts were made with each
combination of these parameters. Each of the provers was given a timeout of 10 seconds.</p>
        <p>During the run with the rst SInE with Frequent Symbol Set Mining con guration, a very slow runtime
behaviour was observed for some examples. The selection for these examples was cancelled after about eight
hours of selection runtime. As a consequence, a timeout for the axiom selection was implemented: If the axiom
selection itself took longer than two minutes, the proof attempt was cancelled. The choice of two minutes
is arbitrary. The selection timeout must be chosen considerably large to make sure that much CPU time is
consumed because it was measured using wall clock time. The controlled environment ensured that no other
CPU-hungry processes were running other than the axiom selection and proving (which are limited to less than
one process per core). Hence, it is unlikely that other processes used much CPU time that should have been
given to the selection for a perfect timing evaluation (as it would have happened by measuring CPU time instead
of wall clock time). The selection timeout has to be much longer than the chosen proving timeout, though,
because we want to analyse the selection run time as well. An axiom selection that consequently takes this much
longer than proving a conjecture is not an acceptable method because the goal is not only to enable proofs but
also shorten the overall proving time which includes the axiom selection.
5.2</p>
      </sec>
      <sec id="sec-5-2">
        <title>Results</title>
        <p>In the MPTP2078 benchmark, only 2044 problems are non-trivial. The other 34 conjectures are equal to an
axiom and could be proved by Hets during static analysis using re exivity of an entailment relation without
invoking an external prover. Only the 2044 non-trivial problems were used for the axiom selection method
evaluation.</p>
        <p>The rst gures in this section show stacked column charts of the performance: Figure 1 shows how many
problems could be solved using SInE. The same goes for Figure 2 using SInE with Frequent Symbol Set Mining.
Finally, Figure 3 shows the performance of the Simple Axiom Selection using Frequent Item Set Mining.</p>
        <p>
          Top-rated rst-order provers return a status of the proof attempt telling the result in a single word. These
statuses are de ned in the SZS ontology [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. The most common statuses used by provers are
(i) THM (Theorem): All models of the axioms are models of the conjecture.
(ii) CSA (CounterSatis able): Some models of the axioms are models of the conjecture's negation.
(iii) TMO (Timeout): The prover exceeded the time limit.
        </p>
        <p>Of these statuses, `THM' and `CSA' indicate a successful prover run, while `TMO' shows that the prover did not
nish successfully. There are more such values indicating failures which are actually used by software, but ATP
only use the two values `THM' and `CSA' in case of success. We extended this ontology8 by a status speci cally
for proving with reduced axiom sets:
(iv) CSAS (CounterSatis ableWithSubset): Some models of the selected axioms are models of the conjecture's
negation.</p>
        <p>If a refutation of the conjecture is found using a strict subset of the axioms (which means that the prover returns
with `CSA'), we do not know whether the conjecture is really false or we have excluded an axiom that is crucial to
a potentially existing proof. If the prover returns with `THM', we know by monotonicity of entailment relations
that the found proof is also a proof with the full axiom set.</p>
        <p>When a prover returns with a proof (marked in the diagrams as `THM') or a refutation (marked as `CSA'), a
problem is considered solved. When it returns with a refutation while only a true subset of the axioms was used
(marked as `CSAS'), or with a proving timeout (marked as `TMO (Prover)') or when the axiom selection takes
more than two minutes (marked as `TMO (Selection)'), the problem is considered still unsolved.</p>
        <p>8Our modi ed SZS ontology can be found on http://ontohub.org/meta/proof_statuses.
2000
y
h
s
u
B
.,,.()10110 .,,.()10120 .,,.()01210 .,,.()01220 .,,.()02110 .,,.()20120 .,,.()20210
Axiom Selection Parameters ( , smin, t)
)
0
.
2
,
2
.,
0
2
(
(a) E Theorem Prover
(b) SPASS</p>
        <p>To interpret the results properly, we need to know the size of the benchmarks. For implementation reasons,
there is no very easy way to count the symbols including duplicates. So, only the distinct symbols are taken into
account. This is regarded as a su cient approximation for interpreting the results.</p>
        <p>The MPTP2078 benchmark in the bushy version has between 2 and 232 axioms per problem. Its average is
31:5 axioms with a standard deviation of 23:4. It has between 2 and 93 distinct symbols per problem with an
average of 18:8 and a standard deviation of 12:1. Counting the distinct symbols per axiom, there are between 0
and 26 symbols, 2:9 on average with a standard deviation of 2:7.</p>
        <p>The chainy version of the MPTP2078 has between 10 and 4563 axioms per problem. The average axiom count
is 1876:4 with a standard deviation of 1288:6. The number of distinct symbols per problem ranges from 5 to 784
with an average of 266:7 and a standard deviation of 229:2. In the axioms, there are between 0 and 26 distinct
symbols, 4:9 on average with a standard deviation of 3:1.</p>
        <p>Inspecting Figure 1, one can see that the E Theorem Prover improves by about 50% for most of the
parametrisations of SInE (45% on average) compared to the chainy versions without any selection. SPASS also performs
much better with a selection than without one: Its manages to solve 64% more problems on average across the
SInE parametrisations. As a side note, the E Theorem Prover performs better than SPASS, even when
comparing the E Theorem Prover without preselecting axioms against the best result with the selection for SPASS.
Considering all SInE parametrisations, 769 problems could be solved, 330 of them could not be solved without
an axiom selection. Without axiom selection, 444 problems could be solved.</p>
        <p>For both provers, the number of `CSA' and `CSAS' results is negligible. For the largest tolerance value without
a depth limit, meaning (t; d) = (2:0; 1), the axiom selection takes more than two minutes for 294 examples.
These examples have 2165:5 axioms on average with a standard deviation of 1680:1, ranging from 51 to 4563 and
332:5 distinct symbols on average with a standard deviation of 298:7, ranging from 12 to 784. This means that
not only the largest problems take long during axiom selection but also some of the small problems. Having a
timeout on some of the small problems may be a result of a high CPU load caused by other tasks performed on
the hardware. It is imaginable that the timeout at the larger problems is due to the problem size, though.
2000
Axiom Selection Parameters (smin, t)
(b) SPASS
2000
s
m
o
ixA1500
d
e
t
c
lee1000
s
f
o
r
eb 500
m
u
N
0
yh ) )5 ) )5 ) )5 ) )5 iyn
suB .,0 ,.01 ,.2 ,.21 ,.5 .,15 .,0 ,.0 ah</p>
        <p>(1 ( (1 ( (1 ( (2 (2 C
limit and a limit of 5 increases with a growing tolerance value. As expected, the number of selected axioms
highly increases with a growing tolerance value.</p>
        <p>Considering the evaluation results, of the three selection methods, SInE clearly is the only usable method for
large theories. The methods based on frequent symbol set mining take too much time for large problems and
sometimes even for small problems. Even if the selection itself nishes quickly, the selected axioms do not enable
proving considerably more conjectures. SInE on the other hand, allows to prove signi cantly more conjectures.
For this reason, only SInE will be kept in Ontohub.
6</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Related Work</title>
      <p>
        Axiom selection was actively researched in the recent years. A simple algorithm called RedAx [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] was
developed to provide evidence for the e ectiveness of preselected axioms when proving. SRASS [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] is a more
sophisticated semantically operating algorithm to nd the right axioms for a proof. MePo [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] as part of
Isabelle/Sledgehammer [
        <xref ref-type="bibr" rid="ref16 ref18">16, 18</xref>
        ] which is adding axioms that share a feature with the conjecture or already added
axioms in several iterations. In each iteration, a pass mark is increased which makes it harder for axioms to
be added to the selection. This method was followed by MaSh [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] to improve Isabelle/Sledgehammer's axiom
selection with machine learning methods that rank axioms by the amount and kind of features they share with
the conjecture and takes into account previous proofs in the same theory. Alama et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] use learning in MOR,
in particular kernel methods, to determine how similar sentences are to each other and uses these similarity
values to nd feature weights and to eventually rank the available axioms. SInE [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] is a heuristic that, similarly
to MePo, iteratively adds axioms to the selection that share symbols with the conjecture or already selected
axioms. Instead of increasing a pass mark, it only selects axioms that contain symbols whose number of
occurrences in the overall theory meets certain requirements. This method proved very successful by executing fast
and enabling about as many proofs as some learning methods.
      </p>
      <p>Because of saving intermediate information in a database, our implementation of SInE is very e cient for
consecutive runs, although because of the implementation in Ruby and because of being bound to a relational
database the rst run performs slower than an implementation with native/compiled code such as it exists
directly in Vampire or E. One notable feature is the prover-independent operability of the axiom selection. This
implementation is usable with any prover that interfaces with Hets.
7</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusions and Future Work</title>
      <p>An implementation of axiom selection heuristics was presented: the already existing SInE and two methods
based on frequent item set mining. These are implemented in the combination of the web application Ontohub
and Hets and run independently of the selected prover, which is a rst step towards an implementation of
logicindependent axiom selections in Ontohub. Currently, this implementation is compatible to every Hets-interfaced
rst-order prover. The evaluation of the selection methods showed once again the e ectiveness of the SInE
algorithm but also revealed that frequent item set mining is not an appropriate tool for selecting axioms because
of the slow computation of frequent item sets.</p>
      <p>Future work in this eld should extend the feature of independence such that the axiom selections operate
independently of the logic as well. A new evaluation could feature a comparison between SInE as it is implemented
in provers to the SInE implementation of Ontohub, measuring the performance of consecutive axiom selections
that are applied to the same theory (with di erent conjectures) such that the commonness values can be read from
the database. Also learning methods could be incorporated into the selection, e.g. learning the best parameters
for SInE or entirely learning-based methods similar to MaSh or MOR could be incorporated. This is very
promising in the context of Ontohub because of its repository structure which stores information on every logical
theory including proof attempts { both successful and failed.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Charu</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Aggarwal</surname>
          </string-name>
          and Jiawei Han.
          <source>Frequent Pattern Mining</source>
          . Springer Publishing Company, Incorporated,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Rakesh</given-names>
            <surname>Agrawal</surname>
          </string-name>
          and
          <string-name>
            <given-names>Ramakrishnan</given-names>
            <surname>Srikant</surname>
          </string-name>
          .
          <article-title>Fast Algorithms for Mining Association Rules</article-title>
          .
          <source>In Proc. 20th int. conf. very large data bases, VLDB</source>
          , volume
          <volume>1215</volume>
          , pages
          <fpage>487</fpage>
          {
          <fpage>499</fpage>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Jesse</given-names>
            <surname>Alama</surname>
          </string-name>
          , Tom Heskes, Daniel Kuhlwein, Evgeni Tsivtsivadze, and
          <string-name>
            <given-names>Josef</given-names>
            <surname>Urban</surname>
          </string-name>
          .
          <article-title>Premise Selection for Mathematics by Corpus Analysis and Kernel Methods</article-title>
          .
          <source>Journal of Automated Reasoning</source>
          ,
          <volume>52</volume>
          (
          <issue>2</issue>
          ):
          <volume>191</volume>
          {
          <fpage>213</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Egidio</given-names>
            <surname>Astesiano</surname>
          </string-name>
          , Michel Bidoit, Helene Kirchner, Bernd Krieg-Bruckner,
          <string-name>
            <surname>Peter D Mosses</surname>
            ,
            <given-names>Donald</given-names>
          </string-name>
          <string-name>
            <surname>Sannella</surname>
            , and
            <given-names>Andrzej</given-names>
          </string-name>
          <string-name>
            <surname>Tarlecki</surname>
          </string-name>
          .
          <article-title>CASL: The Common Algebraic Speci cation Language</article-title>
          .
          <source>Theoretical Computer Science</source>
          ,
          <volume>286</volume>
          (
          <issue>2</issue>
          ):
          <volume>153</volume>
          {
          <fpage>196</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Peter</given-names>
            <surname>Baumgartner</surname>
          </string-name>
          , Alexander Fuchs, and
          <string-name>
            <given-names>Cesare</given-names>
            <surname>Tinelli</surname>
          </string-name>
          .
          <article-title>Darwin: A Theorem Prover for the Model Evolution Calculus</article-title>
          . In Stephan Schulz, Geo Sutcli e, and Tanel Tammet, editors,
          <source>IJCAR Workshop on Empirically Successful First Order Reasoning (ESFOR (aka S4))</source>
          ,
          <source>Electronic Notes in Theoretical Computer Science</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Sascha</surname>
            <given-names>Bohme and Tobias</given-names>
          </string-name>
          <string-name>
            <surname>Nipkow</surname>
          </string-name>
          .
          <article-title>Sledgehammer: Judgement Day</article-title>
          .
          <source>In Automated Reasoning</source>
          , pages
          <volume>107</volume>
          {
          <fpage>121</fpage>
          . Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Christian</given-names>
            <surname>Borgelt</surname>
          </string-name>
          .
          <source>Frequent Pattern Mining. Lecture slides</source>
          . URL http://www.borgelt.net/teach/fpm/ slides.html.
          <source>last checked: 13 June</source>
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Peter</given-names>
            <surname>Haase</surname>
          </string-name>
          , Holger Lewen, Rudi Studer, Duc Thanh Tran, Michael Erdmann, Mathieu dAquin, and
          <string-name>
            <given-names>Enrico</given-names>
            <surname>Motta</surname>
          </string-name>
          .
          <article-title>The Neon Ontology Engineering Toolkit</article-title>
          . WWW,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Jiawei</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Jian</given-names>
            <surname>Pei</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Yiwen</given-names>
            <surname>Yin</surname>
          </string-name>
          .
          <article-title>Mining Frequent Patterns Without Candidate Generation</article-title>
          .
          <source>In ACM Sigmod Record</source>
          , volume
          <volume>29</volume>
          , pages
          <fpage>1</fpage>
          <lpage>{</lpage>
          12. ACM,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Krystof</given-names>
            <surname>Hoder</surname>
          </string-name>
          and
          <string-name>
            <given-names>Andrei</given-names>
            <surname>Voronkov</surname>
          </string-name>
          .
          <article-title>Sine Qua Non for Large Theory Reasoning</article-title>
          .
          <source>In Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31 - August 5</source>
          ,
          <year>2011</year>
          . Proceedings, pages
          <volume>299</volume>
          {
          <fpage>314</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11] Daniel Kuhlwein, Jasmin Christian Blanchette, Cezary Kaliszyk, and Josef Urban.
          <article-title>MaSh: Machine Learning for Sledgehammer</article-title>
          .
          <source>In Interactive Theorem Proving</source>
          , pages
          <volume>35</volume>
          {
          <fpage>50</fpage>
          . Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Eugen</given-names>
            <surname>Kuksa</surname>
          </string-name>
          and
          <string-name>
            <given-names>Till</given-names>
            <surname>Mossakowski</surname>
          </string-name>
          .
          <article-title>Ontohub | version control, linked data and theorem proving for ontologies</article-title>
          .
          <source>In FOIS 2016</source>
          . To appear.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Jia</given-names>
            <surname>Meng</surname>
          </string-name>
          and Lawrence C Paulson.
          <article-title>Lightweight Relevance Filtering for Machine-Generated Resolution Problems</article-title>
          .
          <source>Journal of Applied Logic</source>
          ,
          <volume>7</volume>
          (
          <issue>1</issue>
          ):
          <volume>41</volume>
          {
          <fpage>57</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Till</given-names>
            <surname>Mossakowski</surname>
          </string-name>
          .
          <article-title>Heterogeneous Speci cation and the Heterogeneous Tool Set</article-title>
          . University of Bremen Germany,
          <year>2005</year>
          . Habilitation thesis.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Till</surname>
            <given-names>Mossakowski</given-names>
          </string-name>
          , Mihai Codescu, Fabian Neuhaus, and
          <string-name>
            <given-names>Oliver</given-names>
            <surname>Kutz</surname>
          </string-name>
          .
          <article-title>The Distributed Ontology, Modeling, and Speci cation Language - DOL. In A. Koslow and A</article-title>
          . Buchsbaum, editors, The Road to
          <article-title>Universal Logic, volume II of Studies in Universal Logic</article-title>
          . Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Tobias</surname>
            <given-names>Nipkow</given-names>
          </string-name>
          , Lawrence C Paulson, and Markus Wenzel. Isabelle/HOL:
          <article-title>A Proof Assistant for HigherOrder Logic</article-title>
          , volume
          <volume>2283</volume>
          . Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Natalya</surname>
            <given-names>F Noy</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nigam H Shah</surname>
          </string-name>
          , Patricia L Whetzel,
          <string-name>
            <surname>Benjamin Dai</surname>
          </string-name>
          , Michael Dorf, Nicholas Gri th, Clement Jonquet, Daniel L Rubin,
          <string-name>
            <surname>Margaret-Anne</surname>
            <given-names>Storey</given-names>
          </string-name>
          , Christopher G Chute, et al.
          <article-title>BioPortal: Ontologies and Integrated Data Resources at the Click of a Mouse</article-title>
          .
          <source>Nucleic acids research</source>
          , page
          <year>gkp440</year>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Lawrence</surname>
            <given-names>C Paulson</given-names>
          </string-name>
          and
          <article-title>Jasmin Christian Blanchette</article-title>
          .
          <article-title>Three Years of Experience With Sledgehammer, a Practical Link Between Automatic and Interactive Theorem Provers</article-title>
          . IWIL-
          <year>2010</year>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>Alexandre</given-names>
            <surname>Riazanov</surname>
          </string-name>
          and
          <string-name>
            <given-names>Andrei</given-names>
            <surname>Voronkov</surname>
          </string-name>
          .
          <article-title>The Design and Implementation of VAMPIRE</article-title>
          .
          <source>AI communications</source>
          ,
          <volume>15</volume>
          (
          <issue>2</issue>
          , 3):
          <volume>91</volume>
          {
          <fpage>110</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Piotr</given-names>
            <surname>Rudnicki</surname>
          </string-name>
          .
          <article-title>An Overview of the Mizar Project</article-title>
          .
          <source>In Proceedings of the 1992 Workshop on Types for Proofs and Programs</source>
          , pages
          <volume>311</volume>
          {
          <fpage>330</fpage>
          ,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Stephan</given-names>
            <surname>Schulz</surname>
          </string-name>
          .
          <source>System Description: E 1</source>
          .8. In Ken McMillan,
          <string-name>
            <given-names>Aart</given-names>
            <surname>Middeldorp</surname>
          </string-name>
          , and Andrei Voronkov, editors,
          <source>Proc. of the 19th LPAR, Stellenbosch</source>
          , volume
          <volume>8312</volume>
          <source>of LNCS</source>
          , pages
          <volume>735</volume>
          {
          <fpage>743</fpage>
          . Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Sutcli e. The SZS Ontologies for Automated Reasoning Software</article-title>
          . In G. Sutcli e, P. Rudnicki,
          <string-name>
            <given-names>R.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Konev</surname>
          </string-name>
          , and S. Schulz, editors,
          <source>Proceedings of the LPAR Workshops: Knowledge Exchange: Automated Provers and Proof Assistants, and The 7th International Workshop on the Implementation of Logics, number 418 in CEUR Workshop Proceedings</source>
          , pages
          <volume>38</volume>
          {
          <fpage>49</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <article-title>Geo Sutcli e. The 4th ijcar automated theorem proving system competition{casc-j4</article-title>
          .
          <source>Ai Communications</source>
          ,
          <volume>22</volume>
          (
          <issue>1</issue>
          ):
          <volume>59</volume>
          {
          <fpage>72</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <article-title>Geo Sutcli e and Alexander Dvorsky. Proving Harder Theorems by Axiom Reduction</article-title>
          .
          <source>In FLAIRS Conference</source>
          , pages
          <volume>108</volume>
          {
          <fpage>113</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Geo</surname>
            <given-names>Sutcli e and Yury</given-names>
          </string-name>
          <string-name>
            <surname>Puzis. SRASS - A Semantic Relevance</surname>
          </string-name>
          <article-title>Axiom Selection System</article-title>
          .
          <source>In Automated Deduction{CADE-21</source>
          , pages
          <fpage>295</fpage>
          {
          <fpage>310</fpage>
          . Springer,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Geo</surname>
            <given-names>Sutcli e</given-names>
          </string-name>
          , Jurgen Zimmer, and
          <string-name>
            <given-names>Stephan</given-names>
            <surname>Schulz</surname>
          </string-name>
          .
          <article-title>TSTP Data-Exchange Formats for Automated Theorem Proving Tools. Distributed Constraint Problem Solving and Reasoning in Multi-Agent Systems</article-title>
          ,
          <volume>112</volume>
          :
          <fpage>201</fpage>
          {
          <fpage>215</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Linus</given-names>
            <surname>Torvalds</surname>
          </string-name>
          and
          <string-name>
            <given-names>Junio</given-names>
            <surname>Hamano</surname>
          </string-name>
          .
          <source>Git: Fast Version Control System</source>
          ,
          <year>2010</year>
          . http://git-scm.
          <source>com last checked: 13 June</source>
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Christoph</surname>
            <given-names>Weidenbach</given-names>
          </string-name>
          , Dilyana Dimova, Arnaud Fietzke, Rohit Kumar,
          <string-name>
            <given-names>Martin</given-names>
            <surname>Suda</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Patrick</given-names>
            <surname>Wischnewski</surname>
          </string-name>
          .
          <source>SPASS Version 3.5. In Automated Deduction{CADE-22</source>
          , pages
          <fpage>140</fpage>
          {
          <fpage>145</fpage>
          . Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>Mohammed</given-names>
            <surname>Javeed</surname>
          </string-name>
          <string-name>
            <surname>Zaki</surname>
          </string-name>
          , Srinivasan Parthasarathy, Mitsunori Ogihara, and
          <string-name>
            <given-names>Wei</given-names>
            <surname>Li</surname>
          </string-name>
          .
          <article-title>New Algorithms for Fast Discovery of Association Rules</article-title>
          .
          <source>In KDD</source>
          , volume
          <volume>97</volume>
          , pages
          <fpage>283</fpage>
          {
          <fpage>286</fpage>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Ju</surname>
          </string-name>
          <article-title>rgen Zimmer and Serge Autexier. The MathServe System for Semantic Web Reasoning Services</article-title>
          . In
          <source>Automated Reasoning</source>
          , pages
          <volume>140</volume>
          {
          <fpage>144</fpage>
          . Springer,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>