<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Reasoning with contextual defeasible ALC</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Katarina Britz</string-name>
          <email>abritz@sun.ac.za</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Varzinczak</string-name>
          <email>varzinczak@cril.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CAIR, Stellenbosch University</institution>
          ,
          <country country="ZA">South Africa</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>CRIL, Université d'Artois &amp; CNRS</institution>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <fpage>4</fpage>
      <lpage>17</lpage>
      <abstract>
        <p>In recent work, we addressed an important limitation in previous extensions of description logics to represent defeasible knowledge, namely the restriction in the semantics of defeasible concept inclusion to a single preference order on objects of the domain. Syntactically, this limitation translates to a contextagnostic notion of defeasible subsumption, which is quite restrictive when it comes to modelling different nuances of defeasibility. Our point of departure in our recent proposal allows for different orderings on the interpretation of roles. This yields a notion of contextual defeasible subsumption, where the context is informed by a role. In the present paper, we extend this work to also provide a proof-theoretic counterpart and associated results. We define a (naïve) tableaubased algorithm for checking preferential consistency of contextual defeasible knowledge bases, a central piece in the definition of other forms of contextual defeasible reasoning over ontologies, notably contextual rational closure.</p>
      </abstract>
      <kwd-group>
        <kwd>description logics defeasible reasoning contexts tableaux</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Description logics (DLs) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] are central to many modern AI and database applications
since they provide the logical foundation of formal ontologies. Yet, as classical
formalisms, DLs do not allow for the proper representation of and reasoning with
defeasible information, as shown up in the following example from the access-control domain:
employees have access to classified information; interns (who are also employees) do
not; but graduate interns do. From a naïve (classical) formalisation of this scenario, one
concludes that the class of interns is empty (just as that of graduate interns). But while
concept unsatisfiability has been investigated extensively in ontology debugging and
repair, our research problem here goes beyond that.
      </p>
      <p>
        The past 25 years have witnessed many attempts to introduce defeasible-reasoning
capabilities in a DL setting, usually drawing on a well-established body of research
on non-monotonic reasoning (NMR). These comprise the so-called preferential
approaches [
        <xref ref-type="bibr" rid="ref13 ref14 ref15 ref22 ref23 ref24 ref26 ref27 ref29 ref30 ref38 ref39">13–15, 23, 24, 22, 26, 27, 29, 30, 38, 39</xref>
        ], circumscription-based ones [
        <xref ref-type="bibr" rid="ref40 ref6 ref7">6, 7, 40</xref>
        ],
as well as others [
        <xref ref-type="bibr" rid="ref2 ref25 ref3 ref31 ref32 ref33 ref36 ref37 ref42 ref5">2, 3, 5, 25, 31–33, 36, 37, 42</xref>
        ].
      </p>
      <p>Preferential extensions of DLs turn out to be particularly promising. There a notion
of defeasible subsumption @ is introduced, the intuition of a statement of the form C @D
being that “usually, C is subsumed by D” or “the normal Cs are Ds”. The semantics
is in terms of an ordering on the set of objects allowing us to identify the most normal
elements in C with the minimal C-instances w.r.t. the ordering.</p>
      <p>
        The assumption of a single ordering on the domain of interpretation does not allow
for different, possibly incompatible, notions of defeasibility in subsumption resulting
from the fact that a given object may be more exceptional than another in some context
but less exceptional in another. Defeasibility therefore introduces a new facet of
contextual reasoning not present in deductive reasoning. In recent work [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] we addressed this
limitation by allowing different orderings on objects, using preference relations on role
interpretations [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Here we complete the picture by also providing a proof-theoretic
counterpart and associated results.
      </p>
      <p>After setting up the notation and our access-control example in Section 2, we give
a summary of our context-based defeasible DL (Section 3). In Section 4, we define a
tableau-based algorithm for checking consistency of contextual defeasible knowledge
bases. The paper concludes with a discussion on future directions of investigation.
2</p>
      <p>Notation and an example
We assume finite and pairwise disjoint sets C, R and I standing for, respectively,
concept, role and individual names. With A; B; : : : we denote concept names, with r; s; : : :,
role names, and with a; b; : : :, individual names. In the access-control scenario above
we could have, for example, C = fClassi ed; Employee; Graduate; Intern; ResAssocg,
R = fhasAcc; hasJob; hasQuag, and I = fanne; bill; chris; doc123g, with the
respective obvious intuitions. Complex concepts are denoted C; D; : : :</p>
      <p>Figure 1 depicts an interpretation for our access-control example with domain I =
fxi j 0 i 11g, and interpreting the elements of the vocabulary as follows:
Classi edI = fx10g, EmployeeI = fx0; x4; x5; x9g, GraduateI = fx4; x5; x6; x9g,
InternI = fx0; x4g, ResAssocI = fx5; x6; x7g, hasAccI = f(x4; x10); (x9; x10);
(x6; x10); (x6; x11)g, hasJobI = f(x0; x3); (x4; x3); (x9; x3); (x5; x1); (x6; x1)g, and
hasQuaI = f(x4; x8); (x9; x8); (x5; x2); (x6; x2); (x7; x2)g. Further, anneI = x5,
billI = x0, chrisI = x6, and doc123I = x10.</p>
      <p>The knowledge base KB = T [ A, with T and A as below, is a first stab at
formalising our access-control example:
T =
8
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
&lt;</p>
    </sec>
    <sec id="sec-2">
      <title>Intern v Employee;</title>
      <p>Employee v 9hasJob:&gt;;</p>
      <p>Graduate v hasQua:&gt;;</p>
      <p>Employee v 9hasAcc:Classi ed;
&gt; Intern v :9hasAcc:Classi ed; &gt;
&gt;&gt;&gt; Intern u Graduate v 9hasAcc:Classi ed; &gt;&gt;&gt;
&gt;&gt;:&gt;&gt;&gt;&gt; RReseAs Asssoscocvv:GErmadpuloayteee; ;&gt;&gt;&gt;&gt;&gt;&gt;
9
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
=</p>
      <p>A =</p>
      <p>
        It is not hard to see that this knowledge base is satisfiable and to check that KB j=
Intern v ?. Incoherence of the knowledge base is but one of the (many) reasons to go
defeasible. Armed with a notion of defeasible subsumption of the form C @ D [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], of
which the intuition is “normally, C is subsumed by D”, formalised by the adoption of
hJ
hJ
hJ
hQ
hQ
      </p>
      <p>EmpI
x0(b)</p>
      <p>IntI
x4
x9
hA
hA
x1
hJ
x5(a)
hJ hQ</p>
      <p>
        hA
a preferential semantics à la Shoham [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ], we can give a more refined formalisation
of our scenario example with KB = T [ D [ A, where T and D are given below (D
standing for a defeasible TBox) and A is as above:
T =
8&lt; Intern v Employee; =9
      </p>
      <p>Employee v 9hasJob:&gt;;
: Graduate v hasQua:&gt; ;</p>
      <p>D =</p>
      <p>Then, one could ask whether intern research associates are usually graduates, and
whether they should usually have access to classified information. It soon becomes
clear that modelling defeasible information is more challenging than modelling
classical information, and that it becomes problematic when defeasible information relating
to different contexts are not modelled independently.</p>
      <p>Suppose, for example, that Chris is a graduate research associate who is also an
employee, and Anne is a research associate who is neither a graduate nor an employee.
In any preferential model of the defeasible KB, both Chris and Anne are exceptional in
the class of research associates. This follows because Chris is an exceptional research
associate w.r.t. employment status, and Anne is an exceptional research associate w.r.t.
qualification. Also, in any preferential model of KB Chris and Anne are either
incomparable, or one of them is more normal than the other. Since context has not been taken
into account, there is no model in which Anne is more normal than Chris w.r.t.
employment, but Chris is more normal than Anne w.r.t. qualification.
3</p>
      <p>
        Contextual defeasible ALC
Contextual defeasible ALC (dALC) smoothly combines in a single logical framework
the following features: all classical ALC constructs; defeasible value and existential
restrictions [
        <xref ref-type="bibr" rid="ref12 ref17">12, 17</xref>
        ]; defeasible concept inclusions [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], and context [
        <xref ref-type="bibr" rid="ref18 ref21">18, 21</xref>
        ].
      </p>
      <p>Let C, R and I be as before. Complex dALC concepts are denoted C; D; : : :, and are
built according to the rules:</p>
      <p>C ::= &gt; j ? j C j (:C) j (C u C) j (C t C) j (9r:C) j (8r:C) j ( |r:C) j (Wr:C)</p>
      <p>With LdALC we denote the language of all dALC concepts (including all ALC
concepts). Again, when writing down elements of LdALC , we shall omit parentheses
whenever they are not necessary for disambiguation. An example of dALC concept
is ResAssoc u (WhasAcc::Classi ed) u (9hasAcc:Classi ed), denoting those research
associates whose normal access is only to non-classified info but who also turn out to
have some (exceptional) access to a classified document.</p>
      <p>
        The semantics of dALC is anchored in the well-known preferential approach to
non-monotonic reasoning [
        <xref ref-type="bibr" rid="ref34 ref35 ref41">34, 35, 41</xref>
        ] and its extensions [
        <xref ref-type="bibr" rid="ref10 ref11 ref16 ref19 ref20 ref8 ref9">8–11, 16, 19, 20</xref>
        ], especially
those in DLs [
        <xref ref-type="bibr" rid="ref15 ref17 ref28 ref38 ref43">15, 17, 28, 38, 43</xref>
        ].
      </p>
      <p>Let X be a set. With #X we denote the cardinality of X. A binary relation is a strict
partial order if it is irreflexive and transitive. If &lt; is a strict partial order on X, with
min&lt; X =def fx 2 X j there is no y 2 X s.t. y &lt; xg we denote the minimal elements
of X w.r.t. &lt;. A strict partial order on a set X is well-founded if for every ; =6 X0 X,
min&lt; X0 6= ;.</p>
      <p>Definition 1 (Ordered interpretation). An ordered interpretation is a tuple O =def
h O; O; Oi such that:
– h
–</p>
      <p>O; Oi is an ALC interpretation, with AO O, for each A 2 C, rO
O O, for each r 2 R, and aO 2 O, for each a 2 I, and</p>
      <p>O=def h rO1 ; : : : ; rO#R i, where rOi riO riO, for i = 1; : : : ; #R, and such
that each rOi is a well-founded strict partial order.</p>
      <p>
        Given O = h O; O; Oi, the intuition of O and O is the same as in a
standard ALC interpretation. The intuition underlying each of the orderings in O is that
they play the role of preference relations (or normality orderings), in a sense similar
to the preference orders introduced by Shoham [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ] in a propositional setting, and
investigated by Kraus et al. [
        <xref ref-type="bibr" rid="ref34 ref35">34, 35</xref>
        ] and others [
        <xref ref-type="bibr" rid="ref10 ref11 ref13 ref26 ref9">9–11, 13, 26</xref>
        ]: The pairs (x; y) that are
lower down in the ordering rOi are deemed as most normal (or typical, or expected, or
conventional) in the context of (the interpretation of) ri.
Definition 2 (Interpretation of concepts). Let O = h O; O; Oi, let r 2 R and, for
each x 2 O, let rOjx =def rO \ (fxg O) (i.e., the restriction of the domain of rO
      </p>
      <p>EmpO</p>
      <p>IntO
x4
x9
hA
hA
ClassO</p>
      <p>GradO
hQ
hA
x11
x7</p>
      <p>RAO
to fxg). The interpretation function O interprets dALC concepts as follows:
&gt;O =def</p>
      <p>O;
?O =def ;;
(:C)O =def</p>
      <p>O n CO;
(C u D)O =def CO \ DO;</p>
      <p>(C t D)O =def CO [ DO;
(9r:C)O =def fx 2
( |r:C)O =def fx 2
(Wr:C)O =def fx 2</p>
      <p>O j rO(x) \ CO 6= ;g; (8r:C)O =def fx 2
O j rO(x)</p>
      <p>COg;
O j min rO (rOjx)(x) \ CO 6= ;g;
O j min rO (rOjx)(x)</p>
      <p>COg:</p>
      <p>Analogously to the classical case, W and | are dual to each other. As an example, in
the ordered interpretation O of Figure 2, we have that ( |hasAcc:Classi ed)O = ; =
(: WhasAcc::Classi ed)O, whereas (9hasAcc:Classi ed)O = fx6g.</p>
      <p>Defeasible ALC also adds contextual defeasible subsumption statements to
knowledge bases. Given C; D 2 LdALC and r 2 R, a statement of the form C @ rD is a
(contextual) defeasible concept inclusion (DCI), read “C is usually subsumed by D in the
context r”. A dALC defeasible TBox D (or dTBox D for short) is a finite set of DCIs. A
dALC classical TBox T (or TBox T for short) is a finite set of (classical) subsumption
statements C v D (i.e., T may contain defeasible concept constructs, but not defeasible
concept inclusions). Given T , D and A, with KB =def T [ D [ A we denote a dALC
knowledge base, a.k.a. a defeasible ontology, an example of which is given below:
T =</p>
    </sec>
    <sec id="sec-3">
      <title>Intern v Employee;</title>
      <p>Employee v 9hasJob:&gt;;
&gt; Graduate v hasQua:&gt;; &gt;
&gt;: ResAssoc v WhasAcc::Classi ed ;&gt;</p>
      <p>D =
rO =def f(x; y) j there is (x; z) 2 rO s.t. for all (y; v) 2 rO; ((x; z); (y; v)) 2
rOg:
The satisfaction relation</p>
      <p>is defined as follows:
O
O</p>
      <p>C v D
a : C
if</p>
      <p>CO</p>
      <p>DO;
if
aO 2 CO;</p>
      <p>O
O
min O CO</p>
      <p>r
(aO; bO) 2 rO:</p>
      <p>DO;
If O , then we say O satisfies . O satisfies a dALC knowledge base KB, written
O KB, if O for every 2 KB, in which case we say O is a model of KB.
We say KB is preferentially consistent if it admits a model. We say C 2 LdALC (resp.
r 2 R) is satisfiable w.r.t. KB if there is a model O of KB s.t. CO 6= ; (resp. rO 6= ;).</p>
      <p>One can check that the interpretation O in Figure 2 satisfies the above knowledge
base. To help in seeing why, Figure 3 depicts the contextual orderings on objects
(represented with dotted arrows) induced from those on roles in O as specified in Definition 3.</p>
      <p>O</p>
      <p>EmpO
x3
x8</p>
      <p>IntO</p>
      <p>ClassO
x2
hQ</p>
      <p>GradO
hQ
hA
x11
hQ x6(c)
hQ x7</p>
      <p>RAO</p>
      <p>It follows from Definition 3 that, if rO= ;, i.e., if no r-tuple is preferred to another,
then @ r reverts to a context-agnostic classical v. A similar observation holds for
individual concept inclusions: if (C u 9r:&gt;)O = ;, then C @ rD reverts to C v D.
This reflects the intuition that the context r is taken into account through the preference
order on rO. In the absence of any preference, the context becomes irrelevant. This
also shows why the classical counterpart of @ r is independent of r — context is taken
into account in the form of a preference order, but preference has no bearing on the
semantics of v.</p>
      <p>Contextual defeasible subsumption @ r can also be viewed as defeasible
subsumption based on a preference order on objects in the domain of rO obtained from rO.
Non-contextual defeasible subsumption can then be obtained as a special case by
introducing a new role name r and axiom &gt; v 9r:&gt;.</p>
      <p>Given a dALC knowledge base KB, a fundamental task from the standpoint of
knowledge representation and reasoning is that of deciding which statements follow
from KB and which do not.</p>
      <p>Definition 4 (Preferential entailment). A statement
dALC knowledge base KB, written KB j=pref , if O
is preferentially entailed by a
for every O s.t. O KB.</p>
      <p>The following lemma shows that deciding preferential entailment of GCIs and
assertions can be reduced to dALC knowledge base satisfiability, a result that will be used
in the definition of a tableau system in Section 4. Its proof is analogous to that of its
classical counterpart in the DL literature and we shall omit it here:
Lemma 1. Let KB be a dALC knowledge base and let a be an individual name not
occurring in KB. For every C; D 2 LdALC , KB j= C v D iff KB j= C u :D v ? iff
KB [ fa : C u :Dg is unsatisfiable. Moreover, for every b 2 I and every C 2 LdALC ,
KB j= b : C iff KB [ fb : :Cg is unsatisfiable.</p>
      <p>It turns out that deciding preferential entailment of DCIs too can be reduced to dALC
knowledge base satisfiability, but first, we introduce the tableau-based algorithm for
deciding preferential consistency.
4</p>
      <p>
        Tableau for preferential reasoning in dALC
In this section, we define a tableau method for deciding preferential consistency of
a dALC knowledge base. Our terminology and presentation follow those of Baader et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
in the classical case.
      </p>
      <p>We start by observing that, for every ordered interpretation O and every C; D 2
LdALC , O C v D if and only if O &gt; v :C t D. In that respect, we can assume
w.l.o.g. that all GCIs in a TBox are of the form &gt; v E, for some E 2 LdALC .</p>
      <p>Note also that we can assume w.l.o.g. that the ABox is not empty, for if it is, one
can add to it the trivial assertion a : &gt;, for some new individual name a. It is easy to
see that the resulting (non-empty) ABox is preferentially equivalent to the original one.
Definition 5 (Subconcepts). Let C 2 LdALC . The set of subconcepts of C, denoted
sub(C), is defined inductively as follows:
– If C = A, for A 2 C [ f&gt;; ?g, then sub(C) =def fAg;
– If C = C1 u C2 or C = C1 t C2, then sub(C) =def fCg [ sub(C1) [ sub(C2);
– If C = :D or C = 9r:D or C = 8r:D or C = |r:D or C = Wr:D, then
sub(C) =def fCg [ sub(D).</p>
      <p>Given a knowledge base KB = T [ D [ A, the set of subconcepts of KB is defined as
sub(KB) =def sub(T ) [ sub(D) [ sub(A), where
sub(T ) =def SCvD2T (sub(C) [ sub(D))
sub(A) =def Sa:C2A sub(C)</p>
      <p>(sub(C) [ sub(D))</p>
      <p>We say that an individual name a appears in an ABox A if A contains an assertion
of the form a : C, (a; b) : r or (b; a) : r, for some C 2 LdALC , r 2 R and b 2 I.
Definition 6 (a-concepts). Let A be an ABox and let a be an individual name
appearing in A. With conA(a) =def fC j a : C 2 Ag we denote the set of concepts that a is
an instance of w.r.t. A.</p>
      <p>
        We are now ready for the definition of the expansion rules for dALC-concepts. They
are shown in Figure 4. The u-, t-, 8-, and T -rules work as in the classical case [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ],
whereas the remaining rules handle the additional dALC constructs according to our
preferential semantics. We shall explain them in more detail below. Before doing so,
we need a few more definitions, in particular of what it means for an individual to be
blocked, as tested by the 9-, |-, and @ -rules and needed to ensure termination of the
algorithm we shall present.
      </p>
      <p>As can be seen in the expansion rules, our tableau method makes use of a few
auxiliary structures, which are built incrementally during the search for a model of the
input knowledge base. The first one is a partial order on pairs of individuals rA, for
each r 2 R. Its purpose is to build the skeleton of an r-preference relation on pairs of
individual names appearing in an ABox A. In the unravelling of the complete
clashfree ABox (see below), if there is any, r is used to define a preference relation on the</p>
      <p>A
interpretation of role r in the constructed ordered interpretation.</p>
      <p>The second auxiliary structure is a pre-order Ar on individual names, for each
r 2 R. It fits the purpose of keeping track of which individuals are to be seen as more
normal (or typical) relative to others in the application of the @ -rule (see Figure 4)
rsaovtehllaitngtheofatshseocmiaoteddel, rAde-olirvdeerrianngicnadnucbeed comrpthleatteids (fbayiththfuel to-ruArle.)(Tanhdis, ipnoitnhte wuinl-l
be made more clearly in the explanation of the relevant rules. In particular, the reason
why Ar is a pre-order and not a partial order like rA will be explained in the soundness
proof.) Intuitively, r corresponds to the converse of the preference order introduced</p>
      <p>A
in Definition 3.</p>
      <p>Finally, the third structure used in the expansion rules is a labelling function Ar(a)
mapping an individual name a to the set of concepts a ought to be a minimal instance
of in the context r w.r.t. the ABox A. The purpose of Ar(a) is threefold: (i) it is needed
to ensure the minimal elements of a concept C inherit all defeasible properties encoded
in the DCIs (see @ -rule); (ii) it flags that every individual more preferred than a should
be marked as :C, as performed by the min-rule, and (iii) it plays a role in the blocking
condition (see below) to prevent the generation of an infinite chain of increasingly more
normal elements in r . Note that r , r and r (a) are only used in the inner workings</p>
      <p>A A A A
of the tableau and are not accessible to the user.</p>
      <p>Definition 7 (r-ancestor). Let A be an ABox, a; b 2 I, and r 2 R. If (a; b) : r 2 A, we
say b is an r-successor of a and a is an r-predecessor of b. The transitive closure of the
r-predecessor (resp. r-successor) relation is called r-ancestor (resp. r-descendant).
Definition 8 ( r -ancestor). Let A be an ABox, a; b 2 I, and r 2 R. If (a; b) 2 r ,
we say b is a r A-successor of a and a is an r -predecessor of b. The transitive closure
A
of the r -predAecessor (resp. r -successor) rAelation is called r -ancestor (resp. r</p>
      <p>A A A A
descendant).</p>
      <p>The following definition is used in the expansion rules of Figure 4 to ensure termination:
Definition 9 (Blocking). Let A be an ABox, a; b 2 I, and let r and r be as above.
A A
We say that b is blocked by a in A in the context r if (1) a is either an r-ancestor or a
inArA-ainfcietssetolfroorf sbo, m(2e) rc-oannAce(bst)or ocronrA-(aan)c,easntdor(3o)f bAris(bb)lockeAdr(bay).soWmeesainydbiviisdbulaolc.ked</p>
      <p>A</p>
      <p>The u-, t-, 8-, and T -rules in Figure 4 are as in the classical case and need no
further explanation.</p>
      <p>The |-rule creates a most preferred (relative to individual a) r-link to a new
individual falling under concept C. Notice that this is achieved by just adding an assertion
(a; d) : r to A, for d new in A, since there shall never be (a; e) with (ae; ad) 2 rA.</p>
      <p>The W-rule is analogous to the 8-rule, but propagates a concept C only to those
individuals across preferred r-links (i.e., r-links that are minimal in r ).
A</p>
      <p>The 9-rule handles the creation of an r-successor without the information whether
such an r-link is relatively preferred or not. In this case, both possibilities have to be
explored, which is formalised by the or-branching in the rule. In one case, a preferred
r-link is created just as in the |-rule; in the other, an r-link is created along with an
extra one which is then set as more preferred to it (in rA).</p>
      <p>The @ -rule handles the presence of DCIs in the knowledge base, which have a
global behaviour just as the GCIs in T . Given an individual name a, it abides by a DCI
C @ rD if at least one of the following three possibilities holds: (i) a is not in C; or
(ii) a falls under C but there is another instance of C that is more preferred than a,
or (iii) a is in D. This is captured by the or-like branch in the rule. Moreover, we
need to check whether the node is not blocked in order to prevent the creation of an
infinitely descending chain of increasingly more preferred objects. (This is needed to
ensure termination of the algorithm and also that the preference relation on pairs of
objects created when unraveling an open tableau is well-founded.)</p>
      <p>The min-rule ensures that every individual that is more preferred than a typical
instance of C is marked as an instance of :C.</p>
      <p>Finally, the -rule takes care of completing rA based on the information in Ar so
that the ordering on objects induced by that on pairs that r gives rise to coincides with
itsheneoerddeerdinbgecoanusoebjaetctthsegievnednobfyt htheetasbtrliecatuveerxseicountioofn, ArAr.A(SisedeiasclsaordDedefiannidtioonnl3y.) TrAhiiss
used to define an ordering on objects against which to check satisfiability of DCIs.
Definition 10 (Complete and clash-free ABox). Let A be an ABox. We say A contains
a clash if there is some a 2 I and C 2 LdALC such that fa : C; a : :Cg A. We say
A is clash-free if it does not contain a clash. A is complete if it contains a clash or if
none of the expansion rules in Figure 4 is applicable to A.</p>
      <p>Let ndexp( ) denote a function taking as input a clash-free ABox A, a
nondeterministic rule R from Figure 4, and an assertion 2 A such that R is applicable to
in A. In our case, the nondeterministic rules are the t-, 9- and @ -rules. The function
returns a set ndexp(A; R; ) containing each of the possible ABoxes resulting from the
application of R to in A.</p>
      <p>The tableau-based procedure for checking consistency of a dALC knowledge base
KB = T [ D [ A is given in Algorithm 1 below. It uses Function Expand to apply the
respectively, the sequences h A . Given an Ar1B; o:x:: A; Ar#R i and h A A i
rules in Figure 4 to A w.r.t. T arn1;d: D:: ; rA#R i, h A , with A, Ar1a;n:d: : A; wr#eRde.note,</p>
      <sec id="sec-3-1">
        <title>Algorithm 1: Consistent(KB)</title>
        <p>Input: A dALC knowledge base KB = T [ D [ A
1 if Expand(KB) 6= ; then
2 return “Consistent”
3 else
4</p>
        <p>return “Inconsistent”</p>
      </sec>
      <sec id="sec-3-2">
        <title>Function Expand(KB)</title>
        <p>Input: A dALC knowledge base KB = T [ D [ A
1 if A is not complete then
2 Select a rule R that is applicable to A;
3 if R is a nondeterministic rule then
4 Select an assertion 2 A to which R is applicable;
5 if there is A0 2 ndexp(A; R; ) with Expand(T [ D [ A0) 6= ; then
6 return Expand(T [ D [ A0)
Theorem 1. Algorithm 1 is sound and complete w.r.t. preferential consistency of dALC
knowledge bases.</p>
        <p>Corollary 1. Our tableau-based algorithm is a decision procedure for satisfiability
of dALC knowledge bases.
5</p>
        <p>Concluding Remarks
The tableau procedure presented here can be implemented as a proof procedure for
checking consistency of contextual defeasible knowledge bases. It can also be used to
perform preferential (and modular) entailment checking, and hence also used as part
of an algorithm to determine rational closure. In its current form the complexity of the
naïve procedure is doubly-exponential, with an optimal proof procedure currently under
investigation.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P</given-names>
          </string-name>
          . (eds.):
          <source>The Description Logic Handbook: Theory, Implementation and Applications</source>
          . Cambridge University Press,
          <volume>2</volume>
          <fpage>edn</fpage>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hollunder</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>How to prefer more specific defaults in terminological default logic</article-title>
          . In: Bajcsy,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (ed.)
          <source>Proceedings of the 13th International Joint Conference on Artificial Intelligence (IJCAI)</source>
          . pp.
          <fpage>669</fpage>
          -
          <lpage>675</lpage>
          . Morgan Kaufmann Publishers (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hollunder</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Embedding defaults into terminological knowledge representation formalisms</article-title>
          .
          <source>Journal of Automated Reasoning</source>
          <volume>14</volume>
          (
          <issue>1</issue>
          ),
          <fpage>149</fpage>
          -
          <lpage>180</lpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>An Introduction to Description Logic</article-title>
          . Cambridge University Press (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faella</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrova</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sauro</surname>
            ,
            <given-names>L.:</given-names>
          </string-name>
          <article-title>A new semantics for overriding in description logics</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>222</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>48</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faella</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sauro</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Defeasible inclusions in low-complexity DLs</article-title>
          .
          <source>Journal of Artificial Intelligence Research</source>
          <volume>42</volume>
          ,
          <fpage>719</fpage>
          -
          <lpage>764</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>The complexity of circumscription in description logic</article-title>
          .
          <source>Journal of Artificial Intelligence Research</source>
          <volume>35</volume>
          ,
          <fpage>717</fpage>
          -
          <lpage>773</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Booth</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Casini</surname>
          </string-name>
          , G., Meyer, T.,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>On the entailment problem for a logic of typicality</article-title>
          .
          <source>In: Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI)</source>
          . pp.
          <fpage>2805</fpage>
          -
          <lpage>2811</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Booth</surname>
          </string-name>
          , R., Meyer, T.,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>PTL: A propositional typicality logic</article-title>
          .
          <source>In: Fariñas del Cerro</source>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Herzig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Mengin</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 13th European Conference on Logics in Artificial Intelligence (JELIA)</source>
          . pp.
          <fpage>107</fpage>
          -
          <lpage>119</lpage>
          . No. 7519
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Booth</surname>
          </string-name>
          , R., Meyer, T.,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.:</given-names>
          </string-name>
          <article-title>A propositional typicality logic for extending rational consequence</article-title>
          . In: Fermé,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Gabbay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Simari</surname>
          </string-name>
          ,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (eds.)
          <article-title>Trends in Belief Revision and Argumentation Dynamics</article-title>
          ,
          <source>Studies in Logic - Logic and Cognitive Systems</source>
          , vol.
          <volume>48</volume>
          , pp.
          <fpage>123</fpage>
          -
          <lpage>154</lpage>
          .
          <article-title>King's College Publications (</article-title>
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Boutilier</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Conditional logics of normality: A modal approach</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>68</volume>
          (
          <issue>1</issue>
          ),
          <fpage>87</fpage>
          -
          <lpage>154</lpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Casini</surname>
          </string-name>
          , G., Meyer, T.,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Preferential role restrictions</article-title>
          .
          <source>In: Proceedings of the 26th International Workshop on Description Logics</source>
          . pp.
          <fpage>93</fpage>
          -
          <lpage>106</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heidema</surname>
          </string-name>
          , J., Meyer, T.:
          <article-title>Semantic preferential subsumption</article-title>
          . In: Lang,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Brewka</surname>
          </string-name>
          ,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 11th International Conference on Principles of Knowledge Representation and Reasoning (KR)</source>
          . pp.
          <fpage>476</fpage>
          -
          <lpage>484</lpage>
          . AAAI Press/MIT Press (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heidema</surname>
          </string-name>
          , J., Meyer, T.:
          <article-title>Modelling object typicality in description logics</article-title>
          . In: Nicholson,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <surname>X</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 22nd Australasian Joint Conference on Artificial Intelligence</source>
          . pp.
          <fpage>506</fpage>
          -
          <lpage>516</lpage>
          . No. 5866
          <string-name>
            <surname>in</surname>
            <given-names>LNAI</given-names>
          </string-name>
          , Springer (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Britz</surname>
          </string-name>
          , K., Meyer, T.,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Semantic foundation for preferential description logics</article-title>
          . In: Wang,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Reynolds</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of the 24th Australasian Joint Conference on Artificial Intelligence</source>
          . pp.
          <fpage>491</fpage>
          -
          <lpage>500</lpage>
          . No. 7106
          <string-name>
            <surname>in</surname>
            <given-names>LNAI</given-names>
          </string-name>
          , Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Defeasible modalities</article-title>
          .
          <source>In: Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK)</source>
          . pp.
          <fpage>49</fpage>
          -
          <lpage>60</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Introducing role defeasibility in description logics</article-title>
          . In: Michael,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Kakas</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 15th European Conference on Logics in Artificial Intelligence (JELIA)</source>
          . pp.
          <fpage>174</fpage>
          -
          <lpage>189</lpage>
          . No. 10021
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Context-based defeasible subsumption for dSROIQ</article-title>
          .
          <source>In: Proceedings of the 13th International Symposium on Logical Formalizations of Commonsense Reasoning</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>From KLM-style conditionals to defeasible modalities, and back</article-title>
          .
          <source>Journal of Applied Non-Classical Logics (JANCL) 28(1)</source>
          ,
          <fpage>92</fpage>
          -
          <lpage>121</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Preferential accessibility and preferred worlds</article-title>
          .
          <source>Journal of Logic</source>
          , Language and Information (JoLLI)
          <volume>27</volume>
          (
          <issue>2</issue>
          ),
          <fpage>133</fpage>
          -
          <lpage>155</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Rationality and context in defeasible subsumption</article-title>
          . In: Ferrarotti,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Woltran</surname>
          </string-name>
          , S. (eds.)
          <source>Proceedings of the 10th International Symposium on Foundations of Information and Knowledge Systems (FoIKS)</source>
          . pp.
          <fpage>114</fpage>
          -
          <lpage>132</lpage>
          . No. 10833
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Casini</surname>
          </string-name>
          , G., Meyer, T.,
          <string-name>
            <surname>Moodley</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Introducing defeasibility into OWL ontologies</article-title>
          . In: Arenas,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Corcho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            ,
            <surname>Simperl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Strohmaier</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>d'Aquin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srinivas</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Groth</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumontier</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heflin</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thirunarayan</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staab</surname>
          </string-name>
          , S. (eds.)
          <source>Proceedings of the 14th International Semantic Web Conference (ISWC)</source>
          . pp.
          <fpage>409</fpage>
          -
          <lpage>426</lpage>
          . No. 9367
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Casini</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Straccia</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Rational closure for defeasible description logics</article-title>
          . In: Janhunen,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Niemelä</surname>
          </string-name>
          , I. (eds.)
          <source>Proceedings of the 12th European Conference on Logics in Artificial Intelligence (JELIA)</source>
          . pp.
          <fpage>77</fpage>
          -
          <lpage>90</lpage>
          . No. 6341
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer-Verlag (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Casini</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Straccia</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Defeasible inheritance-based description logics</article-title>
          .
          <source>Journal of Artificial Intelligence Research (JAIR) 48</source>
          ,
          <fpage>415</fpage>
          -
          <lpage>473</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Donini</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
          </string-name>
          , R.:
          <article-title>Description logics of minimal knowledge and negation as failure</article-title>
          .
          <source>ACM Transactions on Computational Logic</source>
          <volume>3</volume>
          (
          <issue>2</issue>
          ),
          <fpage>177</fpage>
          -
          <lpage>225</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Giordano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gliozzi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olivetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pozzato</surname>
          </string-name>
          , G.:
          <article-title>Preferential description logics</article-title>
          . In: Dershowitz,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Voronkov</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>Logic for Programming</article-title>
          ,
          <source>Artificial Intelligence, and Reasoning (LPAR)</source>
          . pp.
          <fpage>257</fpage>
          -
          <lpage>272</lpage>
          . No. 4790
          <string-name>
            <surname>in</surname>
            <given-names>LNAI</given-names>
          </string-name>
          , Springer (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Giordano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gliozzi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olivetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pozzato</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Reasoning about typicality in preferential description logics</article-title>
          . In: Hölldobler,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Lutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Wansing</surname>
          </string-name>
          , H. (eds.)
          <source>Proceedings of the 11th European Conference on Logics in Artificial Intelligence (JELIA)</source>
          . pp.
          <fpage>192</fpage>
          -
          <lpage>205</lpage>
          . No. 5293
          <string-name>
            <surname>in</surname>
            <given-names>LNAI</given-names>
          </string-name>
          , Springer (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Giordano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gliozzi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olivetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pozzato</surname>
          </string-name>
          , G.:
          <article-title>ALC + T : a preferential extension of description logics</article-title>
          .
          <source>Fundamenta Informaticae</source>
          <volume>96</volume>
          (
          <issue>3</issue>
          ),
          <fpage>341</fpage>
          -
          <lpage>372</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Giordano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gliozzi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olivetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pozzato</surname>
          </string-name>
          , G.:
          <article-title>A non-monotonic description logic for reasoning about typicality</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>195</volume>
          ,
          <fpage>165</fpage>
          -
          <lpage>202</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Giordano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gliozzi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olivetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pozzato</surname>
          </string-name>
          , G.:
          <article-title>Semantic characterization of rational closure: From propositional logic to description logics</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>226</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>33</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Governatori</surname>
          </string-name>
          , G.:
          <article-title>Defeasible description logics</article-title>
          . In: Antoniou,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Boley</surname>
          </string-name>
          , H. (eds.)
          <article-title>Rules and Rule Markup Languages for the Semantic Web</article-title>
          . pp.
          <fpage>98</fpage>
          -
          <lpage>112</lpage>
          . No. 3323
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Grosof</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Volz</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Decker</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Description logic programs: Combining logic programs with description logic</article-title>
          .
          <source>In: Proceedings of the 12th International Conference on World Wide Web (WWW)</source>
          . pp.
          <fpage>48</fpage>
          -
          <lpage>57</lpage>
          . ACM (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Heymans</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vermeir</surname>
            ,
            <given-names>D.:</given-names>
          </string-name>
          <article-title>A defeasible ontology language</article-title>
          . In: Meersman,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Tari</surname>
          </string-name>
          ,
          <string-name>
            <surname>Z</surname>
          </string-name>
          . (eds.) CoopIS/DOA/ODBASE. pp.
          <fpage>1033</fpage>
          -
          <lpage>1046</lpage>
          . No. 2519
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Kraus</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Magidor</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Nonmonotonic reasoning, preferential models and cumulative logics</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>44</volume>
          ,
          <fpage>167</fpage>
          -
          <lpage>207</lpage>
          (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Magidor</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>What does a conditional knowledge base entail?</article-title>
          <source>Artificial Intelligence</source>
          <volume>55</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>60</lpage>
          (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Padgham</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , T.:
          <article-title>A terminological logic with defaults: A definition and an application</article-title>
          . In: Bajcsy,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (ed.)
          <source>Proceedings of the 13th International Joint Conference on Artificial Intelligence (IJCAI)</source>
          . pp.
          <fpage>662</fpage>
          -
          <lpage>668</lpage>
          . Morgan Kaufmann Publishers (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ji</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          :
          <article-title>Extending description logics with uncertainty reasoning in possibilistic logic</article-title>
          . In: Mellouli,
          <string-name>
            <surname>K</surname>
          </string-name>
          . (ed.)
          <source>Proceedings of the 9th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty</source>
          . pp.
          <fpage>828</fpage>
          -
          <lpage>839</lpage>
          . No. 4724
          <string-name>
            <surname>in</surname>
            <given-names>LNAI</given-names>
          </string-name>
          , Springer (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Quantz</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Royer</surname>
          </string-name>
          , V.:
          <article-title>A preference semantics for defaults in terminological logics</article-title>
          .
          <source>In: Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR)</source>
          . pp.
          <fpage>294</fpage>
          -
          <lpage>305</lpage>
          (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Quantz</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Preferential default description logics</article-title>
          .
          <source>Tech. rep.</source>
          , TU Berlin (
          <year>1993</year>
          ), www.tu-berlin.de/fileadmin/fg53/KIT-Reports/
          <year>r110</year>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Sengupta</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alfa</surname>
            <given-names>Krisnadhi</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Hitzler</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          :
          <article-title>Local closed world semantics: Grounded circumscription for OWL</article-title>
          . In: Aroyo,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Welty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Alani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Taylor</surname>
          </string-name>
          , J.,
          <string-name>
            <surname>Bernstein</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kagal</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Noy</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Blomqvist</surname>
          </string-name>
          , E. (eds.)
          <source>Proceedings of the 10th International Semantic Web Conference (ISWC)</source>
          . pp.
          <fpage>617</fpage>
          -
          <lpage>632</lpage>
          . No. 7031
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Shoham</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Reasoning about Change: Time and Causation from the Standpoint of Artificial Intelligence</article-title>
          . MIT Press (
          <year>1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Straccia</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Default inheritance reasoning in hybrid KL-ONE-style logics</article-title>
          . In: Bajcsy,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (ed.)
          <source>Proceedings of the 13th International Joint Conference on Artificial Intelligence (IJCAI)</source>
          . pp.
          <fpage>676</fpage>
          -
          <lpage>681</lpage>
          . Morgan Kaufmann Publishers (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Varzinczak</surname>
          </string-name>
          , I.:
          <article-title>A note on a description logic of concept and role typicality for defeasible reasoning over ontologies</article-title>
          .
          <source>Logica Universalis</source>
          <volume>12</volume>
          (
          <issue>3-4</issue>
          ),
          <fpage>297</fpage>
          -
          <lpage>325</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>