<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Model-Theoretic View on Preferences in Declarative Specifications of Search Problems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alireza Ensan</string-name>
          <email>aensan@sfu.ca</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eugenia Ternovska</string-name>
          <email>ter@sfu.ca</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Heng Liu</string-name>
          <email>liuhengl@sfu.ca</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Simon Fraser University</institution>
          ,
          <country country="CA">Canada</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Automated decision making often requires solving difficult and primarily NP-hard problems. In many AI applications (e.g., planning, robotics, recommender systems), users can assist decision making by specifying their preferences over some domain of interest. To take preferences into account, we take a model-theoretic approach to both computations and preferences. Computational problems are characterized as model expansion, that is the logical task of expanding an input structure to satisfy a specification. The uniformity of the modeltheoretic approach allows us to link preferences and computations by introducing a framework of a prioritized model expansion. The main technical contribution is an analysis of the impact of preferences on the computational complexity of model expansion. We also discuss how prioritized model expansion can be related to other preference-based declarative programming paradigms. Finally, we study an application of our framework for the case where some information about preferences is missing.</p>
      </abstract>
      <kwd-group>
        <kwd>Preference Modeling</kwd>
        <kwd>Model Expansion</kwd>
        <kwd>Model Theory</kwd>
        <kwd>Descriptive Complexity</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Solving computationally hard problems (e.g., NP-hard) is in the core of many AI tasks.
Due to the significant progress in performance of modern solvers, finding solutions of
such problems (e.g., planning, travelling salesman, graph colouring, etc.) has become
feasible in many applications. Automated reasoning in intelligent systems often
generates a multitude of acceptable results. For example, in the context of resource
management, consider the prominent problem of Airport Gate Scheduling [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] that, in a
nutshell, is the task of assigning flight arrivals and departures to different gates of an
airport. The problem can be formalized as a Constraint Satisfaction Problem (CSP).
Some variations of the problem are NP-hard and have been encoded as scheduling or
clique partitioning that itself can be transformed to graph colouring problem [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
Model expansion [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] is the logical task of expanding a mathematical structure (a
problem instance) to a solution structure that satisfies a formula (problem specification). The
formula can be written in any specification language with a model-theoretic semantics.
The authors showed that other declarative frameworks such as satisfiability problem
(SAT), CSP, and answer set programming (ASP) can be encoded as model expansion.
By distinguishing between problem instances and problem specifications, model
expansion provides a robust modelling framework and establishes a connection to Descriptive
Complexity [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>In many industrial applications, a decision maker may be inclined toward a subset of
results. The preferred alternatives can be chosen in automated decision making. For
instance, in the Airport Gate Scheduling problem, there could be some preferences for
scheduling gates. A certain gate may be preferred to be assigned domestic flights rather
than international flights. For language-independent solving, it is crucial to connect
model expansion to a preference framework.</p>
      <p>
        Since preferences play a key role in AI, a large number of frameworks for handling
preferences have been proposed during the last two decades such as [
        <xref ref-type="bibr" rid="ref21 ref23 ref26 ref28 ref5 ref7 ref8">8, 23, 7, 21, 5,
28, 26</xref>
        ]. These proposals are often language-dependent because they are added to a host
formal language such as ASP [
        <xref ref-type="bibr" rid="ref13 ref8">8, 13</xref>
        ] or default logic [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>In this paper, we propose a model-theoretic approach to handle preferences associated
to a model expansion. The main motivation of our work is to connect model theory,
descriptive complexity, and preference modelling to study computationally hard
optimization problems. To the best our knowledge this is the first proposal of this kind in
the literature. We aim to construct a language-independent preference framework that
can be added to any declarative language (e.g., SAT, CSP, and ASP) which can be
encoded as a model expansion. Toward this goal, we introduce the notion of a prioritized
model expansion that extends model expansion by adding a set of preferences of a
decision maker. Preferences can be expressed as priorities over ground atoms and then
generalized to structures.</p>
      <p>
        Using a model-theoretic approach has promising advantages from both modelling and
application viewpoints. For the modelling purposes, properties of model theory [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] can
be used to identify certain syntactic fragments of a logic for answering tractable queries
with preferences. Moreover, given that model expansion underlines all predominant
declarative frameworks such as ASP, SAT, and CSP, prioritized model expansion can
model the main preference-based declarative frameworks such as [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ], etc. From a
practical perspective, by viewing preferences as first order structures, we can use model
theory to study properties of preferences and deal with practical cases in declarative
programs such as when some information is missing (similar to null values in database
systems). We do it by introducing the notion of an incomplete preference term that
prioritizes some domain elements when some values are unknown. For example, in Airport
Gate Scheduling, a decision maker states that gate number 2 is not the worst option for
domestic flights, while it is not known what the best option is. We address the problem
of finding preferred solutions of search problems in the presence of incomplete
preferences. We argue that this problem can be viewed as query answering over incomplete
databases. It was demonstrated in [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] that, under some conditions, computing certain
answers can equivalently be done using a naive evaluation, that is by evaluating queries
directly on incomplete relational databases, by considering unknown values as domain
elements. The equivalence is due to the preservation theorems [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. The main
advantage is that naive evaluations drop the computational complexity of computing certain
answers dramatically.
      </p>
      <p>
        A model-theoretic view on modular systems with preferences was presented in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
The authors argued that their proposal can express preference statements in other
formalisms such as CP-nets [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. They used Codd’s relational algebra [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] to combine
modules with preferences. The combination was static – the authors did not focus on the
model expansion and its computational complexity.
      </p>
      <p>Our main contributions are as follows. First, we propose the notion of prioritized model
expansion that is a declarative framework for specifying computational problems with
preferences. Second, we discuss that adding preference even in the simplest formulation
leads to the rise of computational complexity of kP -complete (kth level in the
polynomial hierarchy) model expansions. Third, we study the relations of some
preferencebased frameworks with prioritized model expansion. We apply the computational
complexity result of the task to obtain similar results for those frameworks. Fourth, a method
to deal with incomplete information about preferences is proposed. Finally, we show
that preservation theorems can be used for finding preferred solutions of problems with
incomplete preferences.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>A -structure A = (A; R1A; :::; RnA) is a tuple where = fR1; :::; Rng is a relational
vocabulary that is a set of non-logical relation symbols Ri with associated arity ki, A is
a domain, and for any Ri 2 , RiA is called the interpretation of Ri and RiA Aki . For
a formula in any logic L, vocab( ) denotes the set of vocabulary symbols that appear
in . A boolean query Q over -structures is defined as a mapping from the set of all
-structures to f0,1g. A boolean query Q can be related to a model checking task such
that for a formula ' in logic L and vocab(') = , Q'(A) = 1 if and only if A j= '
where A is a -structure.</p>
      <p>
        Model expansion (MX) is the task of expanding a structure to satisfy a formula in any
logic L [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. Let us fix a finite relational vocabulary and a domain Dom.
      </p>
      <sec id="sec-2-1">
        <title>Definition 1 (Model Expansion MXI ; )</title>
        <sec id="sec-2-1-1">
          <title>Input: formula in logic L, input vocabulary vocab( ), and a -structure I over</title>
          <p>domain Dom,
Find a structure A where A j= and expands I. (The decision version: is there a
structure A such that A j= and A expands I?)
We call A an expansion structure of MXI ; . Any expansion structure A is a
structure with domain Dom.</p>
          <p>
            For any logic L, the data complexity of (the decision version of) model expansion (MX)
is always in-between model checking (MC) and satisfiability (SAT). For example, for
first-order logic, MC is AC0, MX is NP-complete, SAT is undecidable. The combined
complexity of model expansion for first-order logic is NEXPTIME. A complexity
analysis of the three tasks (MC, MX, SAT) for several logics of interest was performed in
[
            <xref ref-type="bibr" rid="ref24">24</xref>
            ]. Note that, when the input vocabulary is empty, MX is often called model
generation, and if the input vocabulary is equal to the vocabulary of formula , it is equivalent
to model checking.
          </p>
          <p>A variety of problems in AI such as the Airport Gate Scheduling problem can be
reduced to graph colouring that is a widely discussed NP-hard problem. Graph colouring
can be characterized as a first-order model expansion ( i.e, the problem specification is
in first-order logic) as follows.</p>
          <p>Example 1 Let binary relation E denotes edges relation between vertices and unary
relation symbols R; G, and B denote red, green, and blue colours respectively. The
formula specifies three-graph colouring</p>
          <p>= 8x [(R(x) _ B(x) _ G(x))
^:((R(x) ^ B(x)) _ (R(x) ^ G(x)) _ (B(x) ^ G(x)))]
^ 8x8y [E(x; y) (:(R(x) ^ R(y))
^:(B(x) ^ B(y)) ^ :(G(x) ^ G(y)))]:
A graph G = (V; E) is an instance structure with vocabulary = fEg and domain</p>
        </sec>
        <sec id="sec-2-1-2">
          <title>V that is the set of vertices. The model expansion MXGE; finds expansion structure A</title>
          <p>(i.e., three-colouring of G) that interprets symbols R; B, and G satisfying . Note that</p>
        </sec>
        <sec id="sec-2-1-3">
          <title>R; B, and G are implicitly second-order-9 quantified.</title>
          <p>G
(zV };|EG{; RA; BA; GA) j= :
| {z }</p>
          <p>A
In order to study the computational aspect of prioritized model expansion, we employ
the notion of a Turing machine as the model of computation.</p>
        </sec>
        <sec id="sec-2-1-4">
          <title>Definition 2 Oracle ML is a Turing machine M augmented by an oracle tape that can</title>
          <p>decide whether some input string x in the oracle tape belongs to a language L.
Let X be a complexity class.</p>
          <p>Notation 1 P X is the class of languages (complexity class) that can be computed by a
deterministic Turing machine with an oracle in X.</p>
          <p>Notation 2 co-X is the complexity class of decision problems whose complements are
in X.</p>
          <p>The polynomial hierarchy (PH) that is a hierarchy of complexity classes is defined as
P = 0P = 0P = 0P , kP+1 = NP kP , kP+1 = P kP , and kP+1 = coNP kP for
k &gt; 0.
3</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Prioritized Model Expansion</title>
      <p>In this section, we introduce the notion of prioritized model expansion which is model
expansion with a collection of preferences of a decision maker. To model preferences,
we define preference expression as an order over a set of ground atoms. We study the
computational complexity of solving problems related to prioritized model expansions
including Dominant Structure (i.e., given two structures, whether one is preferred to
another), Optimal Expansion (i.e., given a structure, if it is an optimal expansion of a
model expansion task), and Goal-Oriented Optimal Expansion (i.e., deciding if there
is an optimal expansion satisfying a certain goal). At the end of this section, we define
preference term as a generalization of preference expressions.</p>
      <p>Preference Expression
Let us fix a domain Dom. Consider k first order variables x1; :::; xk over Dom,
vocabulary , and k-ary R 2 . A k-ary tuple a = (a1; :::; ak) is an assignment to an ordered
set of variables x = (x1; :::; xk) such that for 1 i k, ai 2 Dom. We use the symbol
a[xi] to denote value ai. R(a) is called a ground atom where a 2 Domk. A preference
expression P is an order on a set of ground atoms.</p>
      <p>Definition 3 (Preference Expression) A preference expression P is a pair P = (S ; wP
) where S is the set of all ground atoms of vocabulary over domain Dom and wP is
a preorder on S .</p>
      <p>For ground atoms R(a) and T (b) where R; T 2 , k-ary tuple a 2 Domk, and k0-ary
tuple b 2 Domk0 , R(a) wP T (b) is read as R(a) is preferred to T (b). Also, R(a)
is called strictly preferred to T (b) with notation R(a) AP T (b) if R(a) wP T (b) is
true and T (b) wP R(a) does not hold. Also, R(a) P T (b) if R(a) wP T (b) and
T (b) wP R(a).</p>
      <p>Example 2 Consider a graph G = (V; E) and three colours R; B, and G as in
Example 1. Suppose P = (S ; wP ) where domain V = fv1; v2; :::vng is a finite set of nodes,
= fE; R; G; Bg, and R(v1) P R(v2) AP R(v3) states that it is equally preferred
to have v1 and v2 with red colour and either of which is strictly preferred to v3 with red
colour. Also, G(v2) A B(v3) denotes that having v2 with green colour is favoured to
blue v3.</p>
      <p>
        The relation between ground atoms can be lifted to a preference order among structures.
The idea of comparing two sets based on the preference on their members has been
widely discussed in different domains such as in database systems [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ] and even beyond
the realm of theoretical computer science such as in economic studies and decision
theories [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Inspired by [
        <xref ref-type="bibr" rid="ref1 ref35">35, 1</xref>
        ], here, we introduce three different methods to construct
a relation P from wP among -structures with domain Dom as follows.
Definition 4 (Preference Relation on Structures)
Given a preference expression P = (S ; wP ), let A and B be two -structures with
domain Dom,
wp
      </p>
      <p>P B iff for all R; S 2
– Weak Pareto (WP). A and for all a 2 RA and all
b 2 SB, R(a) wP S(b).
– Upper Bound Dominance (UBD). A uPbd B iff for all S 2 and for all b 2 SB,
for some R 2 , there is a such that a 2 RA and R(a) wP S(b).
– Element Dominance (ED) A ePd B iff for some R; S 2 , there is b 2 SB and
there is a 2 RA such that R(a) wP S(b) and there is not c for some T 2 such
that c 2 T B and T (c) AP R(a).</p>
      <p>
        To build a one-to-one correspondence between our preference model and other
preference frameworks in the literature, e.g., [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ], [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ], [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], etc, we use one of preference
semantics Weak Pareto, Upper Bound Dominance, or Element Dominance. Defining
these different semantics contributes to the flexibility and generality of our proposal in
which a variety of optimization problems can be encoded. We discuss this generality in
more details in section 4.
aTnhde BstricyPt vAersdiooensonfot hyPolwd.hAereisyd2omfiwnapn,tutbodB,ebdagseisd doenfisneemd aanstiAcs &gt;yyPwhBerief yA2 fyPwpB,
ubd, edg when A &gt;yP B. Also, we say A is dominant to B with notation A &gt;P B when
there is y 2 f wp, ubd, edg such that A &gt;yP B.
      </p>
      <p>The problem of deciding if A is dominant is called Dominant Structure problem that is
characterized as follows.</p>
      <p>Definition 5 (Dominant Structure)
Input: a preference expression P = (S ; wP ) and -structures A and B with domain</p>
      <sec id="sec-3-1">
        <title>Dom, Question: is A &gt;P B?</title>
        <p>Proposition 1 Solving Dominant Structure problem is polynomial in the size of Dom.
Proof. As stated by Definition 4, at most, we compare all tuples in RA and RB for all
R 2 . The total possible number of k-ary tuples is jDomjk where k is the maximum
arity of predicate symbols in . Therefore, O(jDomj2k) comparisons are required for
each R 2 . Thus, deciding if A &gt;P B is in m O(jDomj2k) (polynomial in the size
of Dom) where m is the number of elements in .</p>
        <p>We remark that the vocabulary is fixed and our discussion on computational
complexity is focused on data complexity.
3.2</p>
        <p>Prioritized Model Expansion
A prioritized model expansion (PMX) is the problem of finding the most preferred
expansion structures with respect to preferences.</p>
        <p>Definition 6 (Prioritized Model Expansion)</p>
        <sec id="sec-3-1-1">
          <title>Input: a formula , input vocabulary vocab( ), a -structure I, and a preference</title>
          <p>expression P = (S ; wP ), Find structure A such that A is an expansion structure of</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>MXI ; and there is not an expansion structure B such that B &gt;P A.</title>
          <p>Notation 3 The problem of prioritized model expansion is denoted by I ; = (MXI ; ; P )
where MXI ; is a model expansion and P = (S ; wP ) is a preference expression.</p>
          <p>I ; .</p>
          <p>Definition 7 Any solution to a problem of prioritized model expansion
an optimal expansion of</p>
        </sec>
        <sec id="sec-3-1-3">
          <title>I ; is called</title>
          <p>In the rest of this subsection, we study some decision problems that can be associated to
a prioritized model expansion. The Optimal Expansion problem asks whether a given
structure is an optimal expansion of a prioritized model expansion.</p>
          <p>Definition 8 (Optimal Expansion)</p>
        </sec>
        <sec id="sec-3-1-4">
          <title>Input: a -structure A and a prioritized model expansion I ;</title>
          <p>= vocab( ) and P = (S ; wP ) is a preference expression.</p>
        </sec>
        <sec id="sec-3-1-5">
          <title>Question: Is A an optimal expansion of I ; ?</title>
          <p>= (MXI ; ; P ) where
Proposition 2 Let model checking of (given a structure A, decide if A j= ) in
MX
co-NIP;Y .be in the complexity class Y . Solving the problem of Optimal Expansion is in
Proof. The complementary problem is deciding if there is an expansion structure B
such that B &gt;P A. The complementary problem can be solved by a non-deterministic
polynomial Turing machine guessing B with access to an oracle in Y that decides if B is
an expansion of MXI ; (that includes checking if B expands I in polynomial time and
if B j= in the complexity Y ) and based on Proposition 1, in polynomial time checks
if B &gt;P A. Thus, the complementary problem is in NPY and the original problem is in
co-NPY .</p>
          <p>
            One of the common tasks in many AI applications is to determine if a certain goal is
achieved by solutions of a problem, e.g., in planning [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ]. In the context of prioritized
model expansion, it can be translated into whether there is an optimal expansion that
satisfies a formula. The problem is formulated as follows.
          </p>
          <p>Definition 9 (Goal-Oriented Optimal Expansion)
Input: a prioritized model expansion I ; = (MXI ; ; P ) where
P = (S ; wP ) is a preference expression, and a formula such that</p>
        </sec>
        <sec id="sec-3-1-6">
          <title>R1(a1) ^ ::: ^ Rl(al) where Ri 2 and Ri(ai) is a ground atom for 1 Question: Is there an optimal expansion A of I ; such that A j= ?</title>
          <p>= vocab( ) and
is of the form
i l.</p>
          <p>Proposition 3 Let solving the Optimal Expansion problem of I ; = (MXI ; ; P )
be in the complexity class X. Solving the problem of Goal-Oriented Optimal Expansion
is in NPX .</p>
          <p>Proof. First, we non-deterministically guess a -structure A and in polynomial time
check if ai 2 RiA, for 1 i l, that can be done by means of a non-deterministic
polynomial Turing machine. Second, we check whether our guess is an optimal
expansion that is in the complexity class X by the assumption. Thus, the problem can be
solved by a non-deterministic polynomial Turing machine using an oracle in X. Hence,
the problem is in NPX .</p>
          <p>
            Goal-Oriented Optimal Expansion problem can be generalized to finding an optimal
expansion that satisfies a formula in a logic L . In this case, the complexity of model
checking in logic L (i.e., given a structure A if A j= ?) taken into account. However,
for the sake of simplicity, in this paper, we consider the goal as a conjunction of
ground atoms and it can be verified in polynomial time if a structure A satisfies .
It was discussed in [
            <xref ref-type="bibr" rid="ref27">27</xref>
            ] that any boolean query computable in NP can be expressed as a
first order model expansion MXI ; where is a first order formula. Based on Fagin’s
theorem [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ], NP is the class of boolean queries expressible in existential second order
logic (9SO). This shows that a first order MX and existential second order logic have the
same expressive power. Similarly, the polynomial hierarchy is the set of boolean queries
expressible in second order logic and any query computable in kP can be encoded as
MXI ; where is a formula of the form Q1; :::; Qk 1 such that for 1 i k,
Qi is a second order quantifier where Qi = 8 for k is odd and Q = 9 otherwise, and
          </p>
          <p>is a first order formula. Therefore, when a decision version of a model expansion
MXI ; is in kP , model checking of is in kP 1 and based on Proposition 2, solving
Optimal Expansion (MXI ; ; P ) is in kP . The following result shows the impact of
introducing preferences on Goal-Oriented Optimal Expansion for kP -complete model
expansions.</p>
          <p>Theorem 1 Let the decision version of a model expansion be
lem of Goal-Oriented Expansion Structure is kP+1-complete.
kP -complete. The
probProof. The membership to kP+1 follows from the results of Proposition 2,
Proposition 3, and properties of model expansion. Since the model expansion is in kP , the
complexity of model checking of is in kP 1. Therefore, Pbased on proposition 2,
the complexity of Optimal Expansion problem is in co-NP k 1 that is equal to
kP .</p>
          <p>P
Also, based on Proposition 3, Goal-Oriented Optimal Expansion problem is in NP k</p>
          <p>P
or NP k that is equal to kP+1. For the proof of hardness, we consider the following
steps.</p>
          <p>
            First, we show that the problem of deciding the existence of minimal solutions of an
abductive logic program [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ] satisfying a goal can be reduced to Goal-Oriented
Optimal Expansion similar to preferred logic programs [
            <xref ref-type="bibr" rid="ref33">33</xref>
            ]. An abductive logic program is
defined as ALP = hH; M; Pi over a set A of propositional atoms where P is a logic
program, H A is called the hypothesis and M A [ f:aja 2 Ag is the
manifestation. A solution to ALP is a set N H such that there is a stable model S of P [ N
and M S. A solution N is called (H) minimal if there is not a solution N 0 such that
N 0 N . For a given hypothesis h 2 H, deciding if there is a minimal solution N such
that h 2 N is 2P -complete.
          </p>
          <p>
            Second, consider an abductive logic program ALP = hH; M; Pi. Let us define a logic
program P0 as a set of rules of the form r : R(a) :S(b) for any R(a) wP S(b) such
that S(b) 2 H. Rule r indicates the less preferred ground atom (i.e., S(b)) belongs to
the set of hypothesis atoms H. Define P = P [ P0. The existence of a stable model
of a logic program is NP-complete and it can be translated into the decision version
of a model expansion as it was shown in [
            <xref ref-type="bibr" rid="ref27">27</xref>
            ]. The problem of finding if there is a
H minimal solution of ALP can be reduced to deciding whether there is an optimal
expansion in (MXI; ; P ) where P is translated into MXI; based on [
            <xref ref-type="bibr" rid="ref27">27</xref>
            ]. Assume
X1 and X2 are two stable models of P . If X1 is preferred to X2 with respect to one
of preference semantics in Definition 4, there is R(a) 2 X1 and S(b) 2 X2 such that
R(a) wP S(b). So, we have X1 \ H X2 \ H and therefore, any preferred answer set
is H minimal. Hence, finding a minimal solution of hH; M; Pi is equivalent to finding
an optimal expansion of I ; that satisfies a goal M . Thus, Goal-Oriented Optimal
Expansion for a NP-complete MX is 2P -complete.
          </p>
          <p>
            Third, for model expansions in the higher levels of the polynomial hierarchy, consider
the following. kP -complete problems can be encoded as a combined logic program [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ].
          </p>
          <p>= (Pg; Pt) is called a combined logic program where Pg and Pt are logic programs
over a set of propositional variables G and T respectively. M is a model of if it is a
stable model of Pg and there is not a stable model N of Pt such that M \ G = N \ T .
The decision version of this problem is 2P -complete. Recursively, the existence of a
model of a combined program in depth 2 defined as 2 = (Pg2 ; (Pg1 ; Pt)) is 3P
complete and similarly, in depth k, the existence of a model of (Pgk 1 ; k 2) is kP
complete. We introduce abductive combined program as C = hH; M; i where =
(Pg; Pt) is a combined logic program. W is a solution of C if there is a model S of
(Pg [ W; Pt) such that M S. W is minimal if there is not a solution W 0 such that
W 0 W .</p>
          <p>Lemma 1 The problem of deciding if C = hH; M; ki for a given h 2 H has a
minimal solution containing h is kP+1-complete.</p>
          <p>
            Proof: The proof includes a translation from a quantified boolean formula (QBF) to C
for k = 2 and then by induction on k for k &gt; 2, the result follows. Let ' be a boolean
formula in CNF and X = fx1; :::; xmg, W = fw1; :::; wmg, X0 = fx01; :::; x0mg,
Y = fy1; :::; yng, and Z = fz1; :::; zlg be a set of boolean variables in '. Let t, h, and f
be also boolean variables. Consider Pg as a set of rules of the form ft xi; x0ig, fwi
xig, fwi x0ig, ft y1; :::yn; hg, andff l1; :::; lrg where :(l1^; :::; ^lr) 2 '
similar to [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ]. For X [ X0 H, a H-minimal solution of hH; ftg [ W; Pgi does
not contain f and it has either xi or x0i. On the other hand, similar to [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ], assume Pt
determines the truth value of a set of boolean variables Z. Also, for each clause C 2 ',
suppose that Pt includes a set of rules of the form t :C and f :f; t that means
t must not be in any stable model of Pt. This implies that the validity of 9X8Y 9Z' is
equivalent to the existence of a H-minimal solution of C that contains h. So, for k = 2,
the existence of a minimal solution to an abductive combined logic program containing
an atom h is 3P -complete.
          </p>
          <p>Finally, according to the previous steps and Lemma 1, finding a minimal solution of
an abductive combined logic program in level k can be translated into a Goal-Oriented
Optimal Expansion where the model expansion is kP -complete and hence the result
follows.</p>
          <p>Theorem 1 presents an important consequence of adding preferences to a kP -complete
model expansion. For the problem of deciding if there is an expansion that satisfies a
goal , adding preferences leads to a jump in the polynomial hierarchy. So, the
preference relation between expansion structures derived from a preference expression can
not be translated into axiomatization in polynomial time unless P=NP or the
polynomial hierarchy collapses.</p>
          <p>Example 3 Consider the problem of graph colouring that was described as model
expansion in Example 1. Let G = (V; E) be the input graph where V = fv1; v2; v3; v4; v5g
and EG = f(v1; v2); (v1; v3); (v2; v3); (v2; v4); (v4; v5); (v3; v5)g. Assume that we
prefer red colour for v1. Also, v4 with red colour is favoured to v5 with red colour and blue
v2 is preferred to green v2. These preference statements can be encoded by a preference
expression P such that R(v1) AP B(v1) and R(v1) AP G(v1). Also, R(v4) AP R(v5)
and B(v2) AP G(v2). The prioritized model expansion G; = (MXG; ; P ) where</p>
        </sec>
        <sec id="sec-3-1-7">
          <title>MXG; is the characterization of three-colouring for input graph G and P is the preference expression. The input graph G has 18 possible three-colourings. Among these solutions, A is an optimal expansion of G (based on Element Dominance semantics) where RA = fv1; v4g, BA = fv2; v5g, and GA = fv3g.</title>
          <p>3.3</p>
          <p>
            Preference Term
In this subsection, we extend the notion of a preference expression by introducing
preference term that is an order on the domain of a first order variable. Preference terms
can be related to the concept of preferences in relational database systems. However,
unlike databases [
            <xref ref-type="bibr" rid="ref23">23</xref>
            ], where the goal is to find the most preferred records in a table,
here we aim to find preferred expansion structures. A preference relation among
tuples (and therefore among ground atoms that is specified as a preference expression)
is derived from a set of preference terms. The usefulness of defining preferences over
domains of variables is to deal with incomplete information about preferences that will
be discussed in details in Section 5. A preference term p is defined as follows.
Definition 10 (Preference Term)
A preference term p is a pair p = (A; ) where A is a set and
is a preorder over A.
          </p>
          <p>For a; b 2 A, a b means that a is preferred to b. Also, a b if a b and b a.
Moreover, a b (a is strictly preferred to b) when a b and b a does not hold.
Consider first order variables x1; :::; xk. The symbol dom(x) denotes the domain of x.
Assume we are given k preference terms px1 = (dom(x1); 1); :::; pxk = (dom(xk); k
). A preference relation over k-ary tuples a and b is constructed from px1 ; :::; pxk as
follows.</p>
          <p>Definition 11 (Preference Relation on Tuples)
Given a set of preference terms P = fpx1 ; :::; pxk g and two k-ary tuples a and b, we
say that a is preferred to b with respect to P, notation a P b, iff for all pi 2 P,
a[xi] i b[xi].</p>
          <p>A preference expression P can be constructed from a set of preference terms P such
that for a predicate symbol R, R(a) wP R(b) if and only if a P b. Prioritized model
expansion then is extended to I ; = (MXI ; ; P) where P is derived from a set
of preference terms and the semantics of optimal expansion is exactly as before.
4</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Prioritized Model Expansion and Declarative Specifications of</title>
    </sec>
    <sec id="sec-5">
      <title>Optimization Problems</title>
      <p>In this section we study some examples of declarative specification of optimization
problems that can be encoded as a prioritized model expansion and the associated
computational complexity can be determined by the result of Theorem 1.</p>
      <p>
        First, consider a prioritized logic program (PLP) [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] as one of the first examples of
logic programming with preferences. A PLP is a pair (P r; ) where P r is a standard
logic program with stable model semantics and is a set of preference relations among
atoms of the form of a b that means a is preferred to b. The transitive closure of
is denoted by c. The reflexive transitive binary relation w among answer sets of P r is
defined as: X1 w X2 if there exist a 2 X1 X2 and b 2 X2 X1 where (a b) 2 c
and there is not d 2 X1 X2 such that (b d) 2 c. X is called a preferred answer
set if there is not an answer set Y such that Y A X. The following result states that any
PLP can be encoded as a prioritized model expansion and presents the computational
complexity of corresponding prioritized model expansion.
Theorem 2 A PLP = (P r; ) can be expressed by a prioritized model expansion
      </p>
      <p>I; = (MXI; ; P ) where I represents P r, characterizes the stable model
semantics, and P is a preference expression representing c such that A is an optimal
expansion of I; if and only if there is a preferred answer set M in that can be
constructed in polynomial time from A. Deciding the existence of an optimal
expansion of I; that satisfies a goal and a preferred answer set of PLP satisfying are</p>
      <sec id="sec-5-1">
        <title>2P -complete.</title>
        <p>
          Proof. can be viewed as a preference expression in PMX and a program P r as a first
order model expansion. According to [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ], there is a correspondence between
expansion structures of MXI ; and stable models of P r such that any stable model of P r
can be one-to-one mapped in polynomial time to an answer set of P r and vice versa.
Optimal expansions of I; are computed based on Element Dominance semantics
that is the same as the notion of preferred answer sets in PLP. Also, since the
computational complexity of brave reasoning (i.e., the existence of an answer set that satisfies
a conjunction of atoms) is NP-complete, based on Theorem 1, deciding if there is a
preferred answer sets of that satisfies is 2P -complete.
        </p>
        <p>
          Second, an ASO program [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] is a pair (Pg; R) where Pg is a generating logic program
and R is a set of rules of the form r : C1 &gt; ::: &gt; Ck a1; :::; an; not b1; :::; not bm.
In each rule, ai and bi are literals. Also, Ci is a combination of atoms integrated through
conjunction, disjunction, default negation (not) and strong negation (:) that must
appear only before atoms. Ci &gt; Cj body means that if body is satisfied, Ci is preferred
to Cj . Given a set of l rules r1; :::; rl, each answer set M of Pg is associated with a
satisfaction vector d(M ) = hd1(M ); :::; dl(M )i where di(M ) is called satisfaction degree
of M in ri. Satisfaction degree denotes the minimum j of Cj s in ri that are satisfied
by M . Preorder preference relation is defined over satisfaction degrees of a rule rk
and two answer sets M1 and M2 as dk(M1) dk(M2) when q is the minimum i for
all Cis in M1 and s is the minimum j for all Cj s in M2 and q &lt; s. Let M1 and M2 be
two answer sets of Pg. M1 is preferred to M2 with respect to R (notation M1 M2)
if for all i l, di(M1) di(M2). The relation between ASO and prioritized model
expansion is formulated as follows.
        </p>
        <p>Theorem 3 Let ASO = (Pg; R) be an ASO program where Pg is disjunctive program
and R is a set of preference rules. There is a prioritized model expansion I; =
(MXI; ; P ) where specifies the stable model semantics and I represents Pg such that
each optimal expansion A of I; can be mapped in polynomial time to a preferred
answer set of ASO. The problem of deciding if there is an optimal expansion of I;
that satisfies a goal or there is a solution of ASO satisfying is 3P -complete.
Proof. An ASO program can be translated into a PLP (P r ; ) where P r is the union
of Pg and a set of rules r1 and r2 where for each rule r 2 R of the form C1 &gt; C2
body(r), we have r1 : n1 C1; body(r) and r2 : n2 C2; body(r) and n2 n1 is
in . Therefore, based on Theorem 3, ASO can be converted into a prioritized model
expansion. Since the existence of a an answer set that satisfies a set of ground atoms
is 2P -complete ( i.e., brave reasoning in disjunctive logic programs with stable model
semantics), deciding the existence of a solution of ASO that satisfies a goal formula
is 3P -complete.</p>
        <p>
          Finally, our proposal can be also connected to a variety of other preference frameworks
such as CP-nets [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] that model conditional preferences. A CP-net can be translated into
an ASO (see [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]) and hence based on Theorem 4 can be encoded as a prioritized model
expansion. Also, in the context of planning, preferences about temporal properties of
plans can be converted into a logic program with preferences [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ] and thus to a
prioritized model expansion (based on the result of Theorem 3).
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5 Incomplete Preferences</title>
      <p>
        In this section, we focus on handling incomplete preference statements associated to
search problems that are common in many practical cases. For example, assume that
for buying a car, the customer believes that the red colour is not the best option and it
is not the last choice either. In this example, some information is not known, that is to
determine what colour is better or worse than red. Dealing with missing information
is a broad field of study in database systems and declarative programming frameworks
[
        <xref ref-type="bibr" rid="ref19 ref29">19, 29</xref>
        ]. The information incompleteness might be caused by updating databases [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ],
exchanging information [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], incomplete knowledge of the user about entire domain of
interest, etc. The notion of an incomplete preference term is defined as follows.
Definition 12 (Incomplete Preference Term)
An incomplete preference term pixnc is a pair pixnc = (dom(x) [ ?; ) where
preorder on dom(x) [ ? and ?= f?1; :::; ?mg is a set of nulls.
is a
An element ?j 2? represents a missing (or unknown) domain element in pixnc and e i
?j means that value e assigned to xi is preferred to something that is unknown or e is
not the worst option to choose for xi. Likewise, ?j i e means that e is not the best
value of xi.
      </p>
      <p>We define valuation v(pixnc) as a function v : dom(x) [ ?! dom(x) that assigns
elements in dom(x) to members of ? appearing in pixnc such that v(e) = e for any
e 2 dom(x) and v(?i) 2 dom(x) for any ?i2?.</p>
      <p>
        A preference term px = (dom(x); ) can be viewed as a first order structure with
vocabulary and domain dom(x). An incomplete preference term corresponds to the
well known notion of incomplete databases in which some fields value are null [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. The
completion of an incomplete preference term under closed world semantics is the set of
all possible preference terms that are constructed by assignment of domain elements to
nulls.
      </p>
      <sec id="sec-6-1">
        <title>Definition 13 The completion of an incomplete preference term pixnc under closed world</title>
        <p>semJapnixtniccKs,=notva(tipoixnnc)JjpvixnicsKa, ivsadlueafitnioedn as. a set of preference terms as follows:</p>
      </sec>
      <sec id="sec-6-2">
        <title>Example 4 Assume vocabulary fcarg with variables model, colour, and fuel that spec</title>
        <p>ifies properties of a car. A car dealership has a set of cars that is equivalent to an
interpretation of car. Let fFord, Toyota, Hondag be the domain of model and fred, black,
white, grayg be the domain of colour. Also, fuel can be gas, diesel, or electric. A set
of preference terms are defined as follows. pm = (dom(m); m) where m denotes
the model and Honda m Toyota m Ford, and pc = (dom(c); c) is an incomplete
preference term over possible colours of a car where ?1 c red that means that red is
not the best colour. Also, pf = (dom(f ); f ) where gas f diesel and gas f electric
indicating the favorite cars are those using gas instead of electric power or diesel. For a
valuation v where v(?1)=black, a black Honda with gas fuel is favoured to an electric
red Ford.</p>
        <p>Model expansion task can be coupled with incomplete preference terms as follows.
Definition 14 Incomplete prioritized model expansion is denoted by a pair Iinc; =
(MXI ; ; Pinc) where MXI ; is a model expansion and Pinc = fpixn1c; :::; pixnkcg is a set
of incomplete preference terms.</p>
        <p>The completion of an incomplete prioritized model expansion is defined as follows.
tDicesfi(ndietnioonte1d5byThe Icinoc;mpK)leitsioanseotf of Ipinrci;or=itiz(eMd XmIod;el; ePxpinac)nsuinodnesrdcelfionseedd
awsoJrldIinsce;mKan=(MXI ; ; JPincKJ) where JPincK = fJpixn1cK; :::; JpixnkcKg.
oSptrtui mctaulreexApanissicoanlloefdaalln op0t2imJal Iienxc;paKn.sDioenteormfiniIinncg; if =agi(vMenXsItru;c;tuPreinci)s aifn Aoptiismaanl
expansion of an incomplete prioritized model expansion is defined as follows.</p>
        <sec id="sec-6-2-1">
          <title>Definition 16 ( Optimal Expansion of Incomplete PMX) Input: a -structure A with</title>
          <p>
            domain Dom and an incomplete prioritized model expansion Iinc; = (MXI ; ; Pinc)
where = vocab( ) and Pinc = fpixn1c; :::; pixnkcg is a set of incomplete preference terms,
Question: Is A an optimal expansion of Iinc; ?
Recall that one of the advantages of using model-theoretic semantics is to utilize model
theory [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]. Here we employ some results of model theory including preservation
theorems to study the computational complexity of Optimal Expansion of incomplete
prioritized model expansion. Preservation theorems show the relations between syntactic and
semantic restrictions of first order formulas [
            <xref ref-type="bibr" rid="ref30">30</xref>
            ]. Results are not limited to first order
logic and have been extended to first order logic with fixed point [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ], Datalog [
            <xref ref-type="bibr" rid="ref32">32</xref>
            ], etc.
We aim to show that the problem of dominant structure in the presence of incomplete
preferences can be reduced to naive evaluation of a formula over an incomplete
structure and by using preservation properties of first order sentences and results in [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ] to
solve the problem of dominant structure with incomplete preferences in polynomial in
the size of Dom. Before proceeding, we remind the formal definition of homomorphism
and preservation of a formula. Assume A and B are two -structures. Let dom(A) and
dom(B) be the domain of A and B. A function h : dom(A) ! dom(B) such that for
each R 2 and for all (a1; :::an) (ai 2 dom(A) for 1 i n), if (a1; :::an) 2 RA,
then (h(a1); :::; h(an) 2 RB), is called a homomorphism from A to B. Let be a
firstorder sentence (all variables are bounded by a quantifier). We say that is preserved
under homomorphism if for any structure A such that A j= , then for all structures B
that there is a homomorphism h from A to B, B j= .
          </p>
          <p>
            Let ?= f?1; :::; ?ng be a set of constants (nulls) and be a vocabulary of symbols. An
-structure C with domain Dom [ ? is called an incomplete structure. Each element of
? is a null value that represents a missing domain value. Given a first order sentence
and a structure C, the model checking task (query evaluation) is to decide whether C j=
. Naive model checking, according to [
            <xref ref-type="bibr" rid="ref29">29</xref>
            ], treats null values as domain elements. It
was discussed in [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ] that evaluating queries directly on incomplete relational databases
is equivalent to standard evaluation of queries if some syntactic restrictions are imposed
to the query language.
          </p>
        </sec>
      </sec>
      <sec id="sec-6-3">
        <title>Theorem 4 Let model checking of in MXI ; be in the complexity class C. Solving</title>
        <p>the problem of Optimal Expansion of Incomplete prioritized model expansion is in
coNPC.</p>
        <p>Proof. In order to prove Theorem 4, it suffices to show that for two -structures A
and B with domain Dom, A Pinc B can be decided in polynomial time in the size
of Dom and the rest is only to follow the steps taken in the proof of Proposition 2.
To this end, we take the following steps. First, we construct an incomplete structure
called preference structure as follows. Let pixn1c = (dom(x1) [ ?; 1) be an
incomplete preference term. We construct the following incomplete -structure C with
domain Dom0 = Dom [ ? as follows. Consider vocabulary = fp1; SA; SBg and
p1C = f(a1; a2)ja1; a2 2 Dom0 and a1 1 a2g. Also, SA = RA. Define SB1 = RB and
SB2 = faj9b 2 SB1; a[x2; :::; xn] = b[x2; :::; xn] ^ a[x1] 2?g. Let define SB = SB1 [ SB2.
Predicate p1 represents incomplete preferences among values of variable x1, SA is the
set of all tuples in RA, and SB is the set of all tuples in RB plus all tuples in B whose
value of x1 is replaced by a null.</p>
        <p>Second, by slightly abuse of notation, valuation v(C) means valuation of any null value
in C similar to the valuation of a preference term. Valuation v is a strong onto
homomorphism ( v is a surjective function) from C to C0 where dom(C) = Dom [ ? and
dom(C0) = Dom. The symbol JCK denotes the set of all C0 where there is a valuation v
(strong onto homomorphism) such that v(C) = C0. Any C0 2 JCK is called a completion
of C under closed world semantics.</p>
        <p>
          Third, according to Definition 4, Definition 10, and Definition 11, the task of deciding if
B is preferred to A can be reduced to evaluation of whether C j= 8x18x(SA(x1; x)) !
9y1y(SB)(y1; y) ^ p1(y1; x1)) where x = (x2; :::xn) and y = (y2; :::; yn). It was
discussed in [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] that a positive first order formula ' (with no negation) with a guard
of the form of 8x(R(x) ! '), where R is a relation, is preserved under strong onto
homomorphism. is a positive formula with a guard and completion of C under closed
world semantics is equivalent to a set of structures to which there is a strong onto
homomorphism from C. Thus, instead of evaluating all completions of C, we can naively
evaluate . Since naive evaluation is in polynomial time in the size of Dom, evaluation
of over all completions of C is polynomial in the size of Dom. Hence, deciding if
pixnc1 A is polynomial in the size of Dom.
        </p>
        <p>B
For a set of incomplete preference terms Pinc = fpixn1c; :::; pixnkcg, by induction on the
number of incomplete preference terms, deciding B Pinc A is polynomial in the size
of Dom. The immediate result similar to Proposition 1 is that for a model expansion
MXI; with model checking of in the complexity C, deciding if a given structure is
a preferred expansion based on a set of incomplete preference terms is in co-NPC. The
following result immediately follows from Theorem 4.</p>
        <p>Corollary 1 Let solving the decision version of model expansion MXI ; be kp-complete.
Solving the problem of Goal-Oriented Optimal Expansion with incomplete prioritized
model expansion is kp+1-complete.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>We proposed a novel language-independent preference framework and connected it
to model expansion for characterizing preference-based computational decision and
search problems. We demonstrated that adding preferences raises the computational
complexity of deciding the existence of an expansion structure satisfying a goal.
Additionally, we introduced a new method to model incomplete preferences and used model
theory results, namely preservation theorems, to find preferred expansions more
efficiently. In future work, we will devise an algorithm that solves prioritized model
expansion using generic solvers empowered by propagators. The solver would provide
symbolic explanations for rejecting and accepting models, and would follow a preferred
computation path to prune the search space.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Amgoud</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vesic</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Repairing preference-based argumentation frameworks</article-title>
          .
          <source>In: IJCAI</source>
          . pp.
          <fpage>665</fpage>
          -
          <lpage>670</lpage>
          .
          <string-name>
            <surname>Citeseer</surname>
          </string-name>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Atserias</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dawar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolaitis</surname>
          </string-name>
          , P.G.:
          <article-title>On preservation under homomorphisms and unions of conjunctive queries</article-title>
          .
          <source>Journal of the ACM (JACM) 53(2)</source>
          ,
          <fpage>208</fpage>
          -
          <lpage>237</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Baier</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McIlraith</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          :
          <article-title>Planning with preferences</article-title>
          .
          <source>AI</source>
          Magazine
          <volume>29</volume>
          (
          <issue>4</issue>
          ),
          <fpage>25</fpage>
          -
          <lpage>37</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Bhasker</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Samad</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The clique-partitioning problem</article-title>
          .
          <source>Computers &amp; Mathematics with Applications</source>
          <volume>22</volume>
          (
          <issue>6</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          (
          <year>1991</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Bienvenu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fritz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McIlraith</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          :
          <article-title>Specifying and computing preferred plans</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>175</volume>
          (
          <issue>7-8</issue>
          ),
          <fpage>1308</fpage>
          -
          <lpage>1345</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Bogaerts</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Janhunen</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tasharrofi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Stable-unstable semantics: beyond np with normal logic programs</article-title>
          .
          <source>Theory and Practice of Logic Programming</source>
          <volume>16</volume>
          (
          <issue>5-6</issue>
          ),
          <fpage>570</fpage>
          -
          <lpage>586</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Boutilier</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brafman</surname>
            ,
            <given-names>R.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Domshlak</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hoos</surname>
            ,
            <given-names>H.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poole</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Cp-nets: A tool for representing and reasoning with conditional ceteris paribus preference statements</article-title>
          .
          <source>J. Artif. Intell. Res.(JAIR) 21</source>
          ,
          <fpage>135</fpage>
          -
          <lpage>191</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Brewka</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , Niemela¨,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Truszczynski</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Answer set optimization</article-title>
          .
          <source>In: IJCAI</source>
          . vol.
          <volume>3</volume>
          , pp.
          <fpage>867</fpage>
          -
          <lpage>872</lpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Censor</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Pareto optimality in multiobjective problems</article-title>
          .
          <source>Applied Mathematics and Optimization</source>
          <volume>4</volume>
          (
          <issue>1</issue>
          ),
          <fpage>41</fpage>
          -
          <lpage>59</lpage>
          (
          <year>1977</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Keisler</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          :
          <source>Model theory</source>
          , vol.
          <volume>73</volume>
          .
          <string-name>
            <surname>Elsevier</surname>
          </string-name>
          (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Codd</surname>
            ,
            <given-names>E.F.</given-names>
          </string-name>
          :
          <article-title>Extending the database relational model to capture more meaning</article-title>
          .
          <source>ACM Transactions on Database Systems (TODS) 4</source>
          (
          <issue>4</issue>
          ),
          <fpage>397</fpage>
          -
          <lpage>434</lpage>
          (
          <year>1979</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Delgrande</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Expressing preferences in default logic</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>123</volume>
          (
          <issue>1</issue>
          ),
          <fpage>41</fpage>
          -
          <lpage>87</lpage>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Delgrande</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tompits</surname>
          </string-name>
          , H.:
          <article-title>Logic programs with compiled preferences</article-title>
          .
          <source>arXiv preprint cs/0003028</source>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Dorndorf</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Drexl</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nikulin</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pesch</surname>
          </string-name>
          , E.:
          <article-title>Flight gate scheduling: State-ofthe-art and recent developments</article-title>
          .
          <source>Omega</source>
          <volume>35</volume>
          (
          <issue>3</issue>
          ),
          <fpage>326</fpage>
          -
          <lpage>334</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gottlob</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
          </string-name>
          , N.:
          <article-title>Abduction from logic programs: Semantics and complexity</article-title>
          .
          <source>Theoretical computer science 189(1-2)</source>
          ,
          <fpage>129</fpage>
          -
          <lpage>177</lpage>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Elmasri</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Navathe</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Fundamentals of database systems</article-title>
          .
          <source>Pearson</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Ensan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ternovska</surname>
          </string-name>
          , E.:
          <article-title>Modular systems with preferences</article-title>
          .
          <source>In: IJCAI</source>
          . pp.
          <fpage>2940</fpage>
          -
          <lpage>2947</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Fagin</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Generalized first-order spectra and polynomial-time recognizable sets (</article-title>
          <year>1974</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Gelfond</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Logic programming and reasoning with incomplete information</article-title>
          .
          <source>Annals of mathematics and artificial intelligence</source>
          <volume>12</volume>
          (
          <issue>1</issue>
          ),
          <fpage>89</fpage>
          -
          <lpage>116</lpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Gheerbrant</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Libkin</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirangelo</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Naive evaluation of queries over incomplete databases</article-title>
          .
          <source>ACM Transactions on Database Systems (TODS) 39(4)</source>
          ,
          <volume>31</volume>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Gonzales</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perny</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dubus</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          :
          <article-title>Decision making with multiple objectives using gai networks</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>175</volume>
          (
          <issue>7-8</issue>
          ),
          <fpage>1153</fpage>
          -
          <lpage>1179</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Immerman</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          :
          <article-title>Descriptive complexity</article-title>
          . Graduate texts in computer science, Springer (
          <year>1999</year>
          ). https://doi.org/10.1007/978-1-
          <fpage>4612</fpage>
          -0539-5, http:// dx.doi.org/10.1007/978-1-
          <fpage>4612</fpage>
          -0539-5
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Kießling</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Foundations of preferences in database systems</article-title>
          .
          <source>In: Proceedings of the 28th international conference on Very Large Data Bases</source>
          . pp.
          <fpage>311</fpage>
          -
          <lpage>322</lpage>
          . VLDB Endowment (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Kolokolova</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            , Y., Mitchell,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ternovska</surname>
          </string-name>
          , E.:
          <article-title>On the complexity of model expansion</article-title>
          .
          <source>In: Proc., 17th Int'l Conf. LPAR</source>
          . pp.
          <fpage>447</fpage>
          -
          <lpage>458</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Libkin</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Data exchange and incomplete information</article-title>
          . In:
          <article-title>Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems</article-title>
          . pp.
          <fpage>60</fpage>
          -
          <lpage>69</lpage>
          . ACM (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Mindolin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chomicki</surname>
          </string-name>
          , J.:
          <article-title>Contracting preference relations for database applications</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>175</volume>
          (
          <issue>7-8</issue>
          ),
          <fpage>1092</fpage>
          -
          <lpage>1121</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27] Mitchell,
          <string-name>
            <given-names>D.G.</given-names>
            ,
            <surname>Ternovska</surname>
          </string-name>
          , E.:
          <article-title>A framework for representing and solving np search problems</article-title>
          . In: AAAI. pp.
          <fpage>430</fpage>
          -
          <lpage>435</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Pini</surname>
            ,
            <given-names>M.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rossi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Venable</surname>
            ,
            <given-names>K.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walsh</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Incompleteness and incomparability in preference aggregation: Complexity results</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>175</volume>
          (
          <issue>7-8</issue>
          ),
          <fpage>1272</fpage>
          -
          <lpage>1289</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Reiter</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Towards a logical reconstruction of relational database theory</article-title>
          .
          <source>In: On conceptual modelling</source>
          , pp.
          <fpage>191</fpage>
          -
          <lpage>238</lpage>
          . Springer (
          <year>1984</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Rosen</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weinstein</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Preservation theorems in finite model theory</article-title>
          .
          <source>In: Logic and computational complexity</source>
          . pp.
          <fpage>480</fpage>
          -
          <lpage>502</lpage>
          . Springer (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Rossman</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Existential positive types and preservation under homomorphisms</article-title>
          .
          <source>In: Logic in Computer Science</source>
          ,
          <year>2005</year>
          .
          <source>LICS 2005. Proceedings. 20th Annual IEEE Symposium on</source>
          . pp.
          <fpage>467</fpage>
          -
          <lpage>476</lpage>
          . IEEE (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Rudolph</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thomazo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Expressivity of datalog variants-completing the picture</article-title>
          .
          <source>In: 25th IICAI</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Sakama</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Inoue</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Prioritized logic programming and its application to commonsense reasoning</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>123</volume>
          (
          <issue>1</issue>
          ),
          <fpage>185</fpage>
          -
          <lpage>222</lpage>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Son</surname>
            ,
            <given-names>T.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pontelli</surname>
          </string-name>
          , E.:
          <article-title>Planning with preferences using logic programming</article-title>
          .
          <source>In: Logic Programming and Nonmonotonic Reasoning</source>
          , pp.
          <fpage>247</fpage>
          -
          <lpage>260</lpage>
          . Springer (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Staworko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chomicki</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marcinkowski</surname>
          </string-name>
          , J.:
          <article-title>Prioritized repairing and consistent query answering in relational databases</article-title>
          .
          <source>Annals of Mathematics and Artificial Intelligence</source>
          <volume>64</volume>
          (
          <issue>2-3</issue>
          ),
          <fpage>209</fpage>
          -
          <lpage>246</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>