<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>ABox Abduction for Description Logics: The Case of Multiple Observations</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Júlia Pukancová</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Homola</string-name>
          <email>homola@fmph.uniba.sk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Comenius University in Bratislava Faculty of Mathematics</institution>
          ,
          <addr-line>Physics, and Informatics, Mlynská dolina, 84248 Bratislava</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>We develop an ABox abduction algorithm for description logics based on Reiter's minimal hitting set algorithm. It handles abduction problems with multiple observations and it supports the class of explanations allowing atomic and negated atomic concept and role assertions. As shorter explanations are preferred, the algorithm computes shorter explanations first and allows to limit their length. The algorithm is sound and complete for this class of explanations and for any given maximal length of explanations. In this paper we specifically focus on computing explanations for abduction problems with multiple observations, for which we explore two distinct approaches. The DL expressivity is limited only by the DL reasoner that our algorithm calls as a black box. We provide an implementation on top of Pellet, which is a full OWL 2 reasoner, so the expressivity is up to SROIQ. We evaluate the implementation on three different ontologies.</p>
      </abstract>
      <kwd-group>
        <kwd>description logics</kwd>
        <kwd>abduction</kwd>
        <kwd>implementation</kwd>
        <kwd>evaluation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The goal of abduction [
        <xref ref-type="bibr" rid="ref20 ref5">20,5</xref>
        ] is to explain why a set of axioms O (called observation)
does not follow from a knowledge base K: an explanation for O is another set of axioms
E s.t. O follows from KäE . ABox abduction, i.e. the case when both O and E are limited
to ABox axioms, has found applications in areas such as diagnostic reasoning [
        <xref ref-type="bibr" rid="ref16 ref21 ref5">16,21,5</xref>
        ]
or multimedia interpretation [
        <xref ref-type="bibr" rid="ref2 ref6">6,2</xref>
        ].
      </p>
      <p>
        On the other hand, general-purpose ABox abduction solvers, especially for more
expressive DLs are still underdeveloped. Some approaches are based on translation, e.g.,
Klarman et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and Du et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] rely on a translation to first-order and modal logic,
respectively to logic programs. The former work is purely theoretical, it is sound and
complete, but limited to ALC. The latter has some interesting computational results
but it is only complete w.r.t. a specific Horn fragment of S HIQ. Other works, e.g., of
Halland and Britz [
        <xref ref-type="bibr" rid="ref11 ref12">12,11</xref>
        ] and Ma et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] directly exploit DL tableau reasoning, but
their expressivity is still limited to ALC and ALCI. The former work is a theoretical
proposal, it is sound, but not complete. The latter was implemented, but soundness or
completeness is not shown. An ABox abduction service based on backward chaining
of DL-safe rules [
        <xref ref-type="bibr" rid="ref2 ref6">6,2</xref>
        ] is part of RacerPro [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. To our best knowledge, soundness and
completeness results are not known. An interesting proposal based on forgetting was
recently developed by Del-Pinto and Schmidt [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Their work includes an implementation,
it is sound and complete for ALC, and it handles semantic, not just syntactic minimality.
      </p>
      <p>
        Building on ideas of Halland and Britz [
        <xref ref-type="bibr" rid="ref11 ref12">11,12</xref>
        ], we have developed an ABox
abduction solver AAA [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] based on Reiter’s [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] Minimal Hitting Set (MHS) algorithm.
AAA supports atomic and negated atomic concept and role assertions in explanations. It
uses a DL reasoner as a black box, hence it handles any DL expressivity supported by the
reasoner – Pellet in case of our implementation. It also exploits optimization techniques
suggested by Reiter such as model reuse and pruning.
      </p>
      <p>In this paper, we extend our previous results as follows: (a) we develop two distinct
approaches for computing explanations for abduction problems with multiple
explanations; (b) we incorporate a limitation on maximum length of explanations and improve
effective exploration of the search space, starting from more desired (i.e., shorter)
explanations; (c) we conduct preliminary empirical evaluation, specifically focusing on
the comparison of the two multiple-observation approaches and on evaluation of the
implemented optimization techniques.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>
        For brevity we will only introduce the ALCHO DL [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] which contains all features
essential to our approach – especially due to constructions involved in handling multiple
observations and role explanations. The lowest expressivity that the DL reasoner used
in our abduction algorithm should support is ALCO. Role hierarchies are not strictly
needed, but without them the number of explanations involving roles is limited.
      </p>
      <p>A DL vocabulary consists of three countable mutually disjoint sets: set of
individuals NI = ^a; b; §`, set of atomic concepts NC = ^A; B; §`, and set of roles
NR = ^R; S; §`. Complex ALCHO concepts are recursively constructed as stated in
Table 1, where C, D are ALCHO concepts, R, S are roles, and a, b are individuals. A
TBox T is a finite set of GCIs and RIAs, and an ABox A is a finite set of concept, role
or negated role assertions, as given in Table 1. A knowledge base is a pair K = .T ; A/.
By the negation of any assertion ', i.e. ', we mean C.a/ for ' = C.a/, R.a; b/ for
' = R.a; b/, and R.a; b/ for ' = R.a; b/. Let A = ^' Ý ' Ë A` for any ABox A.</p>
      <p>An interpretation of a knowledge base K is a pair I = . I ; I /, where I  ^`,
and I is an interpretation function s.t. aI Ë I for a Ë NI, AI Ó I for A Ë NC, and
RI Ó I  I for R Ë NR. Interpretation of complex concepts is inductively defined
in Table 1. I satisfies an axiom ' (I ô ') as given in Table 1. I is a model of K if it
satisfies all axioms included in K; K is consistent if there is a model I of K. A concept
C is satisfiable w.r.t. K if there is a model I of K s.t. CI  ^`. An axiom ' is entailed
by K (K ô ') if for every model I of K it holds that I ô '. A set of axioms O is entailed
by K (K ô O) if K ô ' for all ' Ë O.</p>
      <p>
        Entailment and consistency checking are inter-reducible: e.g., for an ABox assertion
', K ô ' if and only if K ä ^'` is inconsistent. There is a number of DL reasoners
[
        <xref ref-type="bibr" rid="ref14 ref15 ref24 ref25 ref26 ref7">14,15,25,24,7,26</xref>
        ] for consistency checking, using the tableau algorithm (TA) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        In DL we distinguish between TBox and ABox abduction [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], the latter is of our
interest in this paper. An ABox abduction problem is a pair P = .K; O/, where K is
a DL knowledge base and O is a set of ABox assertions. A set of ABox assertions
E is an explanation of P if K ä E ô O. If O = ^O` we call P = .K; O/ a
singleobservation abduction problem, and we also denote it by P = .K; O/. Otherwise P is
called a multiple-observation abduction problem.
      </p>
      <p>
        Not all explanations are acceptable [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. We will require an explanation E of P to
be explanatory (K ¡ô O), consistent (E ä K is consistent), and relevant (for each Oi Ë
O: E ¡ô O ). Even after ruling out such undesired explanations, there can still be too
i
many of them. Therefore some notion of minimality is often used. We will use syntactic
minimality: an explanation E of P is minimal if there is no other explanation E ¨ of P
s.t. E ¨ × E .
      </p>
      <p>In this work we are interested in explanations in form of atomic and negated atomic
ABox assertions. More specifically, we require E Ó ^A.a/; A.a/; R.a; b/; R.a; b/ Ý
A Ë NC; R Ë NR; a; b Ë NI`. This class of explanations will be denoted AnRn. The
subset of this class, which only contains explanatory, consistent, relevant, and minimal
explanations will be denoted AnRnCER;sub.</p>
      <p>Note that for any abduction problem P = .K; O/ both K and O are finite and the
class of explanations is defined w.r.t. their finite combined signature, hence there is only
finitely many explanations in either of these classes for any abduction problem P .
3</p>
    </sec>
    <sec id="sec-3">
      <title>ABox Abduction with Single Observation</title>
      <p>
        To compute explanations for single-observation abduction problems we build on our
previous work [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] which in turn extends the works of Halland and Britz [
        <xref ref-type="bibr" rid="ref11 ref12">12,11</xref>
        ] and
the seminal work of Reiter [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>
        In order to find an explanation for an ABox abduction problem P = .K; O/ we need
to find a set of ABox assertions E such that K ä E ô O, i.e., such that K ä E ä ^O`
is inconsistent. This can be done by finding a hitting set [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] of the collection M of all
models of K ä ^O` and then negating each assertion in the hitting set.
      </p>
      <p>To stay within the class AnRn we will rely on ABox encoding of models. ABox
encoding of I is MI = ^C.a/ Ý I ô C.a/; CË ^A; A`; A Ë NC; a Ë NI` ä ^R.a; b/ Ý I ô
R.a; b/; R Ë NR; a; b Ë NI` ä ^R.a; b/ Ý I ô R.a; b/; R Ë NR; a; b Ë NI`. Similarly
as above, each K and O have a finite combined signature, hence each ABox encoding
is finite. What is more, MI is not necessary homomorphic with the original model I;
it ignores the anonymous part of the model (on purpose). Hereafter we automatically
assume the ABox encoding whenever we talk about models.</p>
      <p>
        According to Reiter [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], hitting sets are found by constructing a HS-tree T =
.V ; E; L/, a labelled tree which contains negated models of K ä ^O` as node-labels
and whose edges are labelled by ABox assertions contained in their parent node.
HStree has the property that the node label L.n/ and the union of the edge-labels H .n/ on
the path from root r to each node n is disjoint. If n cannot be extended by any successor
satisfying this property then H .n/ corresponds to a hitting set.
      </p>
      <p>
        Additional pruning conditions apply on the HS-tree [
        <xref ref-type="bibr" rid="ref22 ref23">23,22</xref>
        ]. The most obvious case
is when a node n already corresponds to a hitting set H .n/ and there is another node n¨
with H .n/ Ó H .n¨/. Any such n¨ can be pruned. For further conditions refer to literature
[
        <xref ref-type="bibr" rid="ref22 ref23">23,22</xref>
        ]. A pruned HS-tree (i.e., one on which all pruning conditions were applied), once
completed, contains all minimal hitting sets [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>Theorem 1. Given an ABox abduction problem P = .K; O/. Let M be a set of all
models of K ä ^O` and let T = .V ; E; L/ be a pruned HS-tree for a collection of sets
^M Ý M Ë M`. Then ^H .n/ Ý n Ë V is a leaf in T that is not pruned` is the collection
of all minimal explanations of P .</p>
      <p>
        The Single Observation Abduction algorithm (SOA) is given in Algorithm 1. This
is a simplified and shortened pseudocode with some details omitted. For a more detailed
version please refer to our previous report [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>
        The algorithm takes a knowledge base K and an observation O as first two inputs.
One improvement w.r.t. the previous work [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] is that the search can be limited only
to explanations up to certain length, this is done by the third parameter l. The current
version also implements model reuse [
        <xref ref-type="bibr" rid="ref22 ref23">23,22</xref>
        ] and it has a few additional improvements,
notably it adds additional pruning, but the details are beyond the scope of this paper.
      </p>
      <p>The last two parameters are auxiliary and they are only relevant when the algorithm is
called as a subroutine to find explanations for multiple-observation abduction problems.
In the single-observation case they will be set to O = ^O` and some new individual s0
(w.r.t. both K and O).</p>
      <p>The algorithm first tries to obtain a model of K ä ^O` to use M as a label for the
root node r. If there is none (i.e., K ô O) no (explanatory) explanations exist. Otherwise,
successors of r are initialized and the tree is traversed breadth-first down to the depth l.
For each node, we first evaluate H .n/. If it is inconsistent, irrelevant, or pruning applies,
the node is pruned.</p>
      <p>Next, if K ä ^O` ä H .n/ has a model, it is used to label n, otherwise we have found
an explanation which is stored. Finally, after the desired depth l is fully traversed, all
explanations are returned.</p>
      <p>The algorithm calls the external solver (TA) on lines 1, 10, 11 and 15 though some
TA calls can be saved thanks to model reuse. Also, while pruning ensures minimality,
we have also filtered out all undesired explanations, hence the following result.
Theorem 2. Let P = .K; O/ be a single-observation ABox abduction problem, l g 1,
and s0 a new individual w.r.t. K and O. SOA(K; O; l; ^O`; s0) terminates, and it is sound
and complete w.r.t. all explanations of P of the class AnRnCER;sub up to the length l.</p>
      <p>In addition, if we remove the length limitation (i.e., we set l to Ø), the algorithm
still terminates as the depth of the HS-tree is also bound by the number of possible
ABox assertions. In such a case the algorithm finds all explanations of the input ABox
abduction problem.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Handling Multiple Observations</title>
      <p>We now extend SOA to handle multiple observations. This algorithm is called ABox
Abduction Algorithm (AAA). In fact, we explore two versions, one based on reducing
the set of observations to a single observation (AAAR), the other based on splitting the
multiple-observation problem into separate single-observation subproblems (AAAS).
4.1</p>
      <sec id="sec-4-1">
        <title>Reduction</title>
        <p>An observation consisting of multiple concept assertions involving the same individual,
say O = ^C1.a/; § ; Cn.a/`, can be easily reduced to an equivalent single observation
O¨ = C1 à 5 à Cn.a/. Cases involving multiple individuals or even role assertions are
less straightforward, but in DLs featuring nominals they may be encoded as follows.
Lemma 1. Let P = .K; O/ be a multiple-observation ABox abduction problem with
O = ^C1.a1/; § ; Cn.an/; R1.b1; c1/; § ; Rm.bm; cm/; Q1.d1; e1/; § ; Ql.dl; el/`,
where C are concepts, Ri; Qj Ë NR and ai; bj ; cj ; dk; ek Ë NI for i Ë [1; n], j Ë [1; m],
i
k Ë [1; l]. Let E Ó ^A.a/; A.a/; R.a; b/; R.a; b/ Ý A Ë NC; R Ë NR; a; b Ë NI`. Let
P ¨ = .K; O¨/ be a single-observation ABox abduction problem with O¨ = X.s0/, s.t. s0
is new w.r.t. K, O, and E , and</p>
        <p>X =.^a1` á C1/ à 5 à .^an` á Cn/
à .^b1` á ÇR1:^c1`/ à 5 à .^bm` á ÇRm:^cm`/
à .^d1` á ÅQ1:^e1`/ à 5 à .^dl` á ÅQl:^el`/ :
Then E is an explanation of P if and only if it is an explanation of P ¨.</p>
        <p>Notice that the lemma rules out explanations involving the individual s0 introduced
during the reduction. If this is not the case P ¨ may indeed have more explanations than
P . These unwanted explanations need to be filtered out.</p>
        <p>Example 1. Let K = ^A Þ B; C Þ D`, and O = ^B.a/; D.b/`. The only explanation
of P = .K; O/ is E1 = ^A.a/; C.b/`. Using the reduction we obtain P ¨ = .K; O¨/ with
O¨ = .^a` á B/ à .^b` á D/.s0/. However, besides for E1 which is an explanation
of P ¨ courtesy of Lemma 1, in addition E2 = ^A.s0/; C.s0/`, E3 = ^A.a/; C.s0/`, and
E4 = ^A.s0/; C.b/` are explanations of P ¨.</p>
        <p>The AAAR algorithm is listed in Algorithm 2. It takes a knowledge base K, a set
of observations O, and a length upper bound l g 1 as inputs. It reduces the set O to a
single observation O¨ according to Lemma 1 and passes the reduced single-observation
abduction problem to SOA.</p>
        <p>Algorithm 2 AAAR (K,O,l): AAA based on Reduction
Require: knowledge base K, set of observations O = ^C1.a1/; § ; Cn.an/; R1.b1; c1/; § ;</p>
        <p>Rm.bm; cm/;Q1.d1; e1/; § ;Ql.dl; el/`, max length of an explanation l
Ensure: set SE of all explanations of P = .K; O/ of the class AnRnCER;sub up to the length l
1: s0 } new individual w.r.t. K and O
2: X } .^a1` á C1/ à 5 à .^an` á Cn/
à .^b1` á ÇR1:^c1`/ à 5 à .^bm` á ÇRm:^cm`/
à .^d1` á ÅQ1:^e1`/ à 5 à .^dl` á ÅQl:^el`/
3: O¨ } X.s0/
4: SE } SOA(K; O¨; l; O; s0)</p>
      </sec>
      <sec id="sec-4-2">
        <title>5: return SE</title>
        <p>Instead of filtering the unwanted explanation involving the auxiliary individual s0 ex
post, AAAR passes s0 to SOA as the fifth parameter. SOA then excludes the assertions
involving s0 already from the models returned by TA, reducing the HS-tree.</p>
        <p>Since for multiple-observation abduction the relevance needs to be checked w.r.t.
all observations AAAR also passes the original set of observations O to SOA as the
fourth parameter. Observing that SOA handles the auxiliary parameters correctly, the
correctness of AAAR is then a consequence of the correctness of SOA.
Theorem 3. Let P = .K; O/ be a multiple-observation ABox abduction problem, and
let l g 1. Then AAAR (K,O,l) terminates, and it is sound and complete w.r.t. all
explanations of P of the class AnRnCER;sub up to the length l.</p>
        <p>As for SOA, if we remove the depth limitation, the algorithm finds all explanations
of the input ABox abduction problem.
4.2</p>
      </sec>
      <sec id="sec-4-3">
        <title>Splitting into Subproblems</title>
        <p>
          A multiple-observation abduction problem may also be solved by splitting P into n
subproblems Pi = .Ki; Oi/ and answering each Pi separately using SOA. If there is no
bound on length, this is quite easy: we simply combine the results in terms of union
with some additional filtering [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. But the partial explanations may overlap or even
repeat. If a length bound l is given, we need to run SOA up to l for each subproblem,
and only then combine the results. Only this assures all explanations up to the length l
for P (plus possibly some which are longer). This may seem as unnecessary overhead
compared to AAAR but as we show below, sometimes it may be useful.
        </p>
        <p>AAAS algorithm is listed in Algorithm 3. It receives a knowledge base K,
observations O = ^O1; § ; On`, and a length upper bound l g 1 as inputs.</p>
        <p>The algorithm initializes an empty collection which will be used to accumulate
the partial results returned by SOA and a dummy new individual s0 (lines 1–2).</p>
        <p>We cannot just directly use K in each subproblem Pi, as we may miss explanations
involving individuals from other observations. Hence K¨ is used, obtained by adding
ñ.a/ into K for all such individuals a (line 3).</p>
        <p>The algorithm then loops through Oi Ë O (lines 4–11) and calls SOA for K¨, Oi
and l. We also pass the set of observations O (due to relevance checks) and a dummy
new individual s0 to SOA as auxiliary parameters. If one of the observations cannot be
explained (SOA returned ^`) then neither the whole set O can be explained (line 7).</p>
        <p>Observe that O and O ä ^Oi Ë O Ý K ô O ` have the same set of explanations.
i
Therefore if SOA returned "nothing to explain" for some Oi the result is
simply excluded from . If this happens for all Oi Ë O, the overall result is "nothing
to explain".</p>
        <p>If is non-empty the explanations of P are computed as unions E1 ä 5 ä Em,
combining all possible Ei from each SEi Ë with the others (line 15). While SOA already
did some filtering of the partial results, supersets, irrelevance, and inconsistence may
have been introduced by unifying them, hence they are filtered out (line 16).</p>
        <p>Finally, also AAAS is correct up to any length l. And if the length limitation is
removed, the algorithm finds all explanations of the input ABox abduction problem.
Theorem 4. Let P = .K; O/ be a multiple-observation ABox abduction problem, and
let l g 1. Then AAAS (K,O,l) terminates, and it is sound and complete w.r.t. all
explanations of P of the class AnRnCER;sub up to the length l.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Evaluation</title>
      <p>
        We have implemented the ABox abduction algorithm into the AAA solver. For
implementation details, see our previous report [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. The implementation is available at:
http://dai.fmph.uniba.sk/~pukancova/aaa/ . We present evaluation
results with the aim to compare the two versions of the multiple-observation algorithm.
5.1
      </p>
      <sec id="sec-5-1">
        <title>Dataset and Methodology</title>
        <p>
          We have chosen three ontologies for the evaluation: Family ontology (our own small
ontology of family relations)1, Coffee ontology by Carlos Mendes2, and LUBM (Lehigh
University Benchmark [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]). The parameters of the ontologies are stated in Table 2.
        </p>
        <p>On each input we ran AAA iteratively, rising maximal explanation length (i.e. the
maximal depth of the HS-tree). The following properties were recorded from each run:
time of execution, number of explanations, number of the nodes in the HS-tree, number
of TA calls, number of reused models, number of pruned nodes.</p>
        <p>Apart from exceptional cases all experiments were repeated 10 times on the same
input and the results were averaged. All experiments were executed both allowing and
disallowing loops (i.e., reflexive role assertions) in explanations. For the lack of space
1 http://dai.fmph.uniba.sk/~pukancova/aaa/ont/
2 https://gist.githubcom/cmendesce/56e1e16aee5a556a186f512eda8dabf3
we report only the former in this paper. On average, the experiments with loops took
243.24 % more time and found 26.99 % more explanations.</p>
        <p>All experiments were done on a 6-core 3.2 GHz AMD Phenom™ II X6 1090T
Processor, 8 GB RAM, running Ubuntu 17.10, Linux 4.13.0, while the maximum Java heap
size was set to 4GB. We have used the GNU time utility to measure the CPU time
consumed by AAA while running in user mode, summed over all threads.
The algorithm was executed once on each ontology with a specifically chosen
observation set, each consisting of three assertions: ^Father.jack/; Mother.eva/; Person.f red/`
for Family ontology, ^Milk.a/; Cof f ee.b/; Pure.c/` for Coffee ontology, ^Person.jack/;
Employee.jack/; Publication.a/` for LUBM. The aim was to compare the reduction (R)
and the splitting (S) approach therefore all experiments were run with either option.</p>
        <p>The experiment was processed up to the depth 3, as even in this depth the algorithm
ran out of memory in half of the cases. The reason for this is that the observations contain
multiple individuals which increases the search space. Most runs were repeated 10 times,
with four exceptions: LUBM (R and S), depth 3 and Coffee (R), depth 3 as these runs
ran out of memory; and Coffee (S) as the execution time was too high.</p>
        <p>In Figure 1 the execution times for each ontology and both approaches are plotted.
These times are also stated in Table 3 with the numbers of the computed explanations
in each experiment. The out-of-memory cases show the time when the memory was
exceeded. The average deviation in time between runs was 2.66 % for the splitting approach
and 1.6 % for the reduction approach.</p>
        <p>LUBM (S)
LUBM (R)
Coffee (S)
Coffee (R)
Family (S)</p>
        <p>Family (R)
1
2</p>
        <p>3</p>
        <p>For each run of the algorithm, a number of pruned nodes, reused models and TA
calls was recorded. In Figure 2 a proportion of these numbers for each experiment is
plotted (for depths for which memory was not exceeded).</p>
        <p>The execution time is always higher for the splitting approach than for the reduction
approach (ignoring the out-of-memory cases). Indeed this is because in the splitting
approach the length limit is applied to each subproblem separately. Thus, also some
explanations longer than the limit are computed (as unions of the separate results obtained
for each subproblem).</p>
        <p>From one point of view, the reduction approach is more efficient, as for a length limit
l it always assures all the explanations up to l, and in our experiments it always reached
lower time than the splitting approach for the same limit l.</p>
        <p>On the other hand, we observed that the splitting approach may often find higher
numbers of explanations much more quickly, e.g. in Table 3 (Family ontology). AAAR
found all 9 explanations up to length 3 in 79.68 seconds. AAAS found 7 of these in
4.54 seconds (after depth 1) and it already found 144 explanations in 21.78 seconds
(after depth 2). In fact, it took slightly longer to run it to depth 3 (19.48 minutes) but
during this time it found the 9 explanations up to the length 3 together with additional
804 longer explanations. Though we cannot characterize this additional explanations in
any way (apart from being sound), this approach may be suitable for some applications,
where completeness is not a high priority, and the main goal is to compute as much
explanations as possible.
6</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>
        We have described a sound and complete ABox abduction algorithm that handles
multiple observations, and supports the class of explanations including atomic and negated
atomic concept and role assertions. Unlike the previous works which can only support
(or are complete up to) limited DL expressivity [
        <xref ref-type="bibr" rid="ref11 ref12 ref18 ref19">18,12,11,19</xref>
        ], our algorithm plugs in
a DL reasoner as a black box, hence the DL expressivity is only limited by the used
reasoner. We have provided an implementation based on Pellet [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], thus the
expressivity ranges up to SROIQ. MHS is NP-complete [
        <xref ref-type="bibr" rid="ref17 ref23">23,17</xref>
        ] hence the overall combination
inherits the higher complexity of the used DL starting at ExpTime for ALCHO [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        In this paper we have predominantly focused on extending our algorithm and
implementation to handle multiple-observation abduction problems. We have developed and
evaluated two distinct approaches. Our evaluation shows applicability of the approach,
particularly when looking for explanations of lower lengths (i.e. those most preferred)
and with a smaller number of involved individuals. The evaluation also shows how the
implemented optimization techniques are essential in reducing the search space. Note
that this is only our first attempt at an implementation, in the future we would like to
plug in and compare different reasoners, but also to explore possible improvements in
the MHS algorithm [
        <xref ref-type="bibr" rid="ref27 ref8">8,27</xref>
        ] to further boost the performance.
      </p>
      <p>Acknowledgments. This work was supported by the Slovak national project VEGA
1/0778/18. Júlia Pukancová is also supported by an extraordinary scholarship awarded
by Faculty of Mathematics, Physics, and Informatics, Comenius University in Bratislava,
and by the Comenius University grant no. UK/266/2018. We would like to thank to
anonymous reviewers from previous DL workshops for valuable suggestions.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F</given-names>
          </string-name>
          . (eds.):
          <article-title>The Description Logic Handbook: Theory, Implementation, and Applications</article-title>
          . Cambridge University Press (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Castano</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Espinosa</surname>
            <given-names>Peraldí</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>I.S.</given-names>
            ,
            <surname>Ferrara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Karkaletsis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Kaya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Möller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Montanelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Petasis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Wessel</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Multimedia interpretation for dynamic ontology evolution</article-title>
          .
          <source>Journal of Logic and Computation</source>
          <volume>19</volume>
          (
          <issue>5</issue>
          ),
          <fpage>859</fpage>
          -
          <lpage>897</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Del-Pinto</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmidt</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          :
          <article-title>Forgetting-based abduction in ALC</article-title>
          .
          <source>In: Proceedings of the Workshop on Second-Order Quantifier Elimination and Related Topics (SOQE</source>
          <year>2017</year>
          ), Dresden, Germany.
          <source>CEUR-WS</source>
          , vol.
          <year>2013</year>
          , pp.
          <fpage>27</fpage>
          -
          <lpage>35</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Du</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shen</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J.Z.</given-names>
          </string-name>
          :
          <article-title>Towards practical ABox abduction in large description logic ontologies</article-title>
          .
          <source>Int. J. Semantic Web Inf. Syst</source>
          .
          <volume>8</volume>
          (
          <issue>2</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>33</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Elsenbroich</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>A case for abductive reasoning over ontologies</article-title>
          .
          <source>In: Proceedings of the OWLED*06 Workshop on OWL: Experiences and Directions</source>
          , Athens, GA, USA. CEUR-WS, vol.
          <source>2016</source>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Espinosa</given-names>
            <surname>Peraldí</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.S.</given-names>
            ,
            <surname>Kaya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Möller</surname>
          </string-name>
          , R.:
          <article-title>Formalizing multimedia interpretation based on abduction over description logic aboxes</article-title>
          .
          <source>In: Proceedings of the 22nd International Workshop on Description Logics (DL</source>
          <year>2009</year>
          ), Oxford, UK.
          <source>CEUR-WS</source>
          , vol.
          <volume>477</volume>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Glimm</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stoilos</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Hermit: An OWL 2 reasoner</article-title>
          .
          <source>Journal of Automated Reasoning</source>
          <volume>53</volume>
          (
          <issue>3</issue>
          ),
          <fpage>245</fpage>
          -
          <lpage>269</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Greiner</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wilkerson</surname>
            ,
            <given-names>R.W.:</given-names>
          </string-name>
          <article-title>A correction to the algorithm in reiter's theory of diagnosis</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>41</volume>
          (
          <issue>1</issue>
          ),
          <fpage>79</fpage>
          -
          <lpage>88</lpage>
          (
          <year>1989</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Guo</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heflin</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>LUBM: A benchmark for OWL knowledge base systems</article-title>
          .
          <source>Journal of Web Semantics</source>
          <volume>3</volume>
          (
          <issue>2-3</issue>
          ),
          <fpage>158</fpage>
          -
          <lpage>182</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Haarslev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hidde</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Möller</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wessel</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The RacerPro knowledge representation and reasoning system</article-title>
          .
          <source>Semantic Web</source>
          <volume>3</volume>
          (
          <issue>3</issue>
          ),
          <fpage>267</fpage>
          -
          <lpage>277</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Halland</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Abox abduction in ALC using a DL tableau</article-title>
          . In: 2012 South African Institute of Computer Scientists and Information Technologists Conference, SAICSIT '12,
          <string-name>
            <surname>Pretoria</surname>
          </string-name>
          , South Africa. pp.
          <fpage>51</fpage>
          -
          <lpage>58</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Halland</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Naïve ABox abduction in ALC using a DL tableau</article-title>
          .
          <source>In: Proceedings of the 2012 International Workshop on Description Logics</source>
          ,
          <string-name>
            <surname>DL</surname>
          </string-name>
          <year>2012</year>
          , Rome, Italy.
          <source>CEUR-WS</source>
          , vol.
          <volume>846</volume>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Hladik</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Model</surname>
          </string-name>
          , J.:
          <article-title>Tableau systems for SHIO and SHIQ</article-title>
          . In: Haarslev,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Möller</surname>
          </string-name>
          ,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (eds.)
          <source>Proc. of the 17th Int. Workshop on Description Logics (DL</source>
          <year>2004</year>
          ).
          <article-title>CEUR-WS</article-title>
          , vol.
          <volume>104</volume>
          , pp.
          <fpage>168</fpage>
          -
          <lpage>177</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>The fact system</article-title>
          .
          <source>In: Automated Reasoning with Analytic Tableaux and Related Methods</source>
          , International Conference, TABLEAUX '98,
          <string-name>
            <surname>Oisterwijk</surname>
          </string-name>
          , The Netherlands,
          <source>Proceedings. LNCS</source>
          , vol.
          <volume>1397</volume>
          , pp.
          <fpage>307</fpage>
          -
          <lpage>312</lpage>
          . Springer (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Using an expressive description logic: FaCT or fiction</article-title>
          ?
          <source>In: Proceedings of the Sixth International Conference on Principles of Knowledge Representation and Reasoning (KR'98)</source>
          , Trento, Italy. pp.
          <fpage>636</fpage>
          -
          <lpage>649</lpage>
          . AAAI (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Hubauer</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Legat</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seitz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Empowering adaptive manufacturing with interactive diagnostics: A multi-agent approach</article-title>
          .
          <source>In: Advances on Practical Applications of Agents and Multiagent Systems - 9th International Conference on Practical Applications of Agents and Multiagent Systems, PAAMS</source>
          <year>2011</year>
          , Salamanca, Spain. pp.
          <fpage>47</fpage>
          -
          <lpage>56</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Karp</surname>
            ,
            <given-names>R.M.:</given-names>
          </string-name>
          <article-title>Reducibility among combinatorial problems</article-title>
          .
          <source>In: Proceedings of a symposium on the Complexity of Computer Computations</source>
          , IBM Thomas J. Watson Research Center, Yorktown Heights, New York. pp.
          <fpage>85</fpage>
          -
          <lpage>103</lpage>
          (
          <year>1972</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Klarman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Endriss</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schlobach</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>ABox abduction in the description logic ALC</article-title>
          .
          <source>Journal of Automated Reasoning</source>
          <volume>46</volume>
          (
          <issue>1</issue>
          ),
          <fpage>43</fpage>
          -
          <lpage>80</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Ma</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>An ABox abduction algorithm for the description logic ALCI</article-title>
          .
          <source>In: Intelligent Information Processing VI - 7th IFIP TC 12 International Conference, IIP</source>
          <year>2012</year>
          ,
          <article-title>Guilin, China</article-title>
          .
          <source>Proceedings. IFIP AICT</source>
          , vol.
          <volume>385</volume>
          , pp.
          <fpage>125</fpage>
          -
          <lpage>130</lpage>
          . Springer (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Peirce</surname>
            ,
            <given-names>C.S.</given-names>
          </string-name>
          :
          <article-title>Deduction, induction, and hypothesis</article-title>
          .
          <source>Popular science monthly 13</source>
          ,
          <fpage>470</fpage>
          -
          <lpage>482</lpage>
          (
          <year>1878</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Pukancová</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Homola</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Abductive reasoning with description logics: Use case in medical diagnosis</article-title>
          .
          <source>In: Proceedings of the 28th International Workshop on Description Logics (DL</source>
          <year>2015</year>
          ), Athens, Greece.
          <source>CEUR-WS</source>
          , vol.
          <volume>1350</volume>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Pukancová</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Homola</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Tableau-based ABox abduction for the ALCHO description logic</article-title>
          .
          <source>In: Proceedings of the 30th International Workshop on Description Logics</source>
          , Montpellier, France.
          <source>CEUR-WS</source>
          , vol.
          <source>1879</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Reiter</surname>
          </string-name>
          , R.:
          <article-title>A theory of diagnosis from first principles</article-title>
          .
          <source>Artificial intelligence</source>
          <volume>32</volume>
          (
          <issue>1</issue>
          ),
          <fpage>57</fpage>
          -
          <lpage>95</lpage>
          (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Shearer</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Hermit: A highly-efficient OWL reasoner</article-title>
          .
          <source>In: Proceedings of the Fifth OWLED Workshop on OWL: Experiences and Directions</source>
          , Karlsruhe, Germany.
          <source>CEUR-WS</source>
          , vol.
          <volume>432</volume>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Sirin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cuenca Grau</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalyanpur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Katz</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Pellet: A practical OWL-DL reasoner</article-title>
          .
          <source>Journal of Web Semantics</source>
          <volume>5</volume>
          (
          <issue>2</issue>
          ),
          <fpage>51</fpage>
          -
          <lpage>53</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Steigmiller</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liebig</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glimm</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Konclude: system description</article-title>
          .
          <source>Journal of Web Semantics</source>
          <volume>27</volume>
          ,
          <fpage>78</fpage>
          -
          <lpage>85</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Wotawa</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A variant of reiter's hitting-set algorithm</article-title>
          .
          <source>Information Processing Letters</source>
          <volume>79</volume>
          (
          <issue>1</issue>
          ),
          <fpage>45</fpage>
          -
          <lpage>51</lpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>