<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Logic-Based Ranking of Assertions in Inconsistent ABoxes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Horacio Tellez Perez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jef Wijsen</string-name>
          <email>jef.wijseng@umons.ac.be</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Mons</institution>
          ,
          <country country="BE">Belgium</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper concerns the problem of inconsistency in knowledge bases caused by ABox assertions. If such inconsistency occurs, users may be asked to rate the truthfulness of one or more ABox assertions. A potential di culty is that users may not well understand how di erent ABox assertions interact (and possibly con ict) with one another through the TBox axioms. We therefore introduce a principled framework that uses TBox axioms for inferring positive and negative support for ABox assertions. This leads to a system of linear equations whose solution enhances the user's truthfulness rating by means of logical information from the TBox.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Motivation</title>
      <p>Inconsistency is an important and recurrent problem in today's database and
knowledge-base systems. Data errors are practically unavoidable in systems that
integrate data coming from di erent sources. Two approaches to tackle this
problem are data cleaning and consistent query answering (CQA) [Wij19]. The latter
approach uses the notion of repair, which is a consistent knowledge base obtained
by making some minimal amount of data corrections. A repair is conceptually
not di erent from a cleaned knowledge base. However, whereas the process of
data cleaning is supposed to end in a single cleaned knowledge base, the CQA
approach allows for the possibility of multiple repairs (or possible worlds). In the
Description Logics framework, di erent repairs correspond to di erent ABoxes,
each one consistent with respect to a given xed TBox. When we move from a
single-world perspective to a possible-worlds perspective, di erent semantics for
logical reasoning become possible [BR13,LLR+10,LB16,BBG14,GM12,CLP18].
Eventually, all these semantics address the following central problem: Given a
logical sentence ', assign some degree of truthfulness to '. Is ' true in some,
most, or all repairs? What is the probability of ' being true? Is there strong
support for|or resistance against|the sentence '? Throughout this paper, we
use the term \truthfulness" in a loose and informal way; we could have used
other terms instead: credibility, veracity, accuracy. . .</p>
      <p>In this paper, we present a new principled framework for evaluating the
relative truthfulness of ABox assertions (i.e., the sentence ' is an ABox assertion
in our framework). By relative, we mean that we are merely interested in
ranking ABox assertions: Given two ABox assertions and , is more, less, or
equally truthful than ? Our framework is di erent from CQA in that it does
not use the notion of repair. The framework assumes that there is some
initial weight function over the ABox assertions, called credibility function, which
models the opinion of domain experts concerning the truthfulness of assertions.
In their assessments, however, experts may have di culties to fully understand
and take into account the logic that is expressed by, possibly extensive, TBoxes.
To overcome this di culty, we propose an automated mathematical method for
adjusting the experts' initial credibility function by taking into account the
ontological logic of the TBox: strong logical support for an assertion should increase
its credibility, while strong logical support for : should decrease 's
credibility. Eventually, our method results in a ranking of ABox assertions in terms of
truthfulness, taking into account both the experts' credibility function and the
TBox logic. In our framework, we assume that the TBox has been validated by
a multitude of experts and is therefore error-free.</p>
      <p>This paper is organized as follows. Section 2 presents a guiding example.
Section 3 discusses related work. Section 4 introduces our general theoretical
framework, and Section 5 presents a particular instantiation of this framework.
Section 6 studies in more detail some theoretical questions and computational
tasks raised by this instantiation. Finally, Section 7 concludes the paper.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Motivating Example</title>
      <p>Consider the following knowledge base K0 = hT0; A0i.</p>
      <p>T0 =
8 Professor v Person; 9
&gt;&gt;&lt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; SSPttuueddrseeonnntt vvv P::eCPrrosooufnres;ses;or; =&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</p>
      <p>9teaches v Professor;
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;:&gt; 99at9etaatetctnhedenssds vvv SCCtoouuudrresseen;t; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;;</p>
      <p>A0 =
8 John : Professor 9
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&lt;&gt; DAKBvR2a ::: SCCtoouuudrresseent &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=&gt;</p>
      <p>(John; DB2) : teaches
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;:&gt;&gt; ((JB(oAhovnba;;;KKIARR))) ::: aaatttttteeennndddsss &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;;</p>
      <p>This knowledge base is inconsistent, because from (John; KR) : attends, we
can infer John : Student by means of the axiom 9attends v Student. Then, by
means of the axiom Student v :Professor, we can infer John : :Professor, which
obviously contradicts the rst assertion in A0. In conclusion, (John; KR) : attends
and John : Professor contradict one another. The vertices in the directed graph
of Fig. 1 are the assertions of A0. A red-colored edge from to means that
refutes . On the other hand, a green-colored edge from to means that
supports . For example, from (John; DB2) : teaches we can infer John : Professor
by means of the axiom 9teaches v Professor. Therefore, (John; DB2) : teaches
supports John : Professor. In this example, we assumed that domain experts
esteemed that assertions in the ABox were equally credible, represented by a
value of 1. Then, our proposed method updates values by balancing the value
of each assertion with respect to the values of 's refuters and supporters.
Refuters and supporters of , respectively, lower and increase 's value by an
amount that is proportional to their own value. In Fig. 1, we see that John :
Professor is attributed a higher value than (John; KR) : attends because it has
more supporters and less refuters.</p>
      <p>Figure 2 shows the e ect of adding Ava : Professor to A0. One can observe
that the values of the assertions (Ava; IA) : attends and Ava : Student have gone
down because of con icts with the new assertion.</p>
      <p>Since supporters and refuters are single assertions in this simple example,
they can be represented in a directed graph. In our general framework, however,
supporters and refuters will be sets of assertions. For example, if A u B v :C
is a TBox assertion, then the set f(i; A), (i; B)g is a refuter of (i; C), but neither
(i; A) nor (i; B) is a refuter on its own.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Related Work</title>
      <p>In Description Logics, di erent repairs correspond to di erent ABoxes, each
one consistent with respect to a given xed TBox. When we move from a
single ABox to a set of possible ABoxes, di erent semantics for logical reasoning
become possible, including brave semantics [BR13], ABox Repair (AR) and
Intersection ABox Repair (IAR) semantics [LLR+10]. These semantics can be
enriched by taking into account notions of cardinality [LB16], preference [BBG14],
or probability [GM12,CLP18]. Some works [DQ15,TBB+17] in the Description
Logics community have already investigated the problems of nding the best
repairs according to some criteria, and of extracting consistent information that
best complies with speci c needs. Sik Chun Lam et al. have proposed logic-based
methods for repairing TBox axioms of unsatis able ontologies [LPSV06a], as well
as numerical methods for rewriting and ranking problematic axioms [LPSV06b].</p>
      <p>Ranking the nodes of some sort of knowledge graph in terms of interest,
quality, or preference is a recurrent problem in many disciplines. Solving these
problems requires to somehow quantify the nodes and their interactions. A
quantitative approach, rather than a qualitative one, has been used in argumentation
frameworks [AB13,BDKM16,BCPR12,Rad18,HT17], belief revision [SSF16], the
Web [Kle99,PBMW99], and social networks [dKD08,TND10].
4</p>
    </sec>
    <sec id="sec-4">
      <title>Theoretical Framework</title>
      <p>Throughout this paper, we will assume that TBoxes are satis able. That is,
for every TBox T , the knowledge base hT ; ;i is consistent. If a knowledge base
hT ; Ai is inconsistent, we will assume that the inconsistency is caused by one
or more assertions in A. When humans are faced with such an inconsistent
knowledge base hT ; Ai, they may not be able to quickly pinpoint the \wrong"
assertion(s) in A, because the inconsistency may only become apparent after an
involved reasoning process that uses many axioms and assertions. We present
a method for ranking assertions such that higher-ranked assertions are more
\truthful" than lower-ranked assertions. Signi cantly, the ranking only requires
some super cial input from the user, who is modeled by the notion of a credibility
function, which is a mapping from A to R. Such a credibility function will be
combined with TBox assertions to result in the desired ranking. All de nitions
that follow are relative to a xed knowledge base hT ; Ai in some xed Description
Logic.</p>
      <sec id="sec-4-1">
        <title>Refuters and supporters</title>
        <p>We de ne what it means for a set B of assertions to support or refute an assertion
not in B. In our framework, assertions will be higher ranked if they have strong
supporters and no strong refuters.</p>
        <p>De nition 1. The following de nitions are relative to a knowledge base hT ; Ai,
and an assertion 2 A.</p>
        <p>A refuter of is an inclusion-minimal subset B of A with the property that
hT ; Bi is consistent and hT ; B [ f gi is inconsistent.</p>
        <p>A supporter of is an inclusion-minimal subset B of A with the property
that hT ; Bi is consistent, 62 B, and hT ; Bi j= .</p>
        <p>Example 1. Let T = fA v C; A v :Dg. Let A = fa : A; a : D; a : Cg. Then,
{ fa : Ag is a refuter of a : D, and a supporter of a : C.</p>
        <p>{ fa : Cg is neither a refuter nor a supporter of a : A.</p>
        <p>Proposition 1. Let hT ; Ai be a knowledge base in a monotonic Description
Logic, and let 2 A. Then,
1. distinct refuters of are not comparable by set inclusion;
2. distinct supporters of are not comparable by set inclusion; and
3. if B is a refuter of and B0 is a supporter of , then B and B0 are not
comparable by set inclusion.</p>
        <p>Proof. The proof of the rst two items is straightforward. We next prove the
last item. Assume B is a refuter of , and B0 is a supporter of . Consequently,
(a) hT ; Bi is consistent;
(b) hT ; B [ f gi is inconsistent;
(c) hT ; B0i is consistent; and
(d) hT ; B0i j= .</p>
        <p>From (c) and (d), it follows hT ; B0 [ f gi is consistent.</p>
        <p>We rst show B * B0. Assume for a contradiction that B B0, hence
B[f g B0[f g. From (b) and our assumption that the underlying Description
Logic is monotonic, it follows that hT ; B0 [ f gi is inconsistent, a contradiction.</p>
        <p>Finally, we show B0 * B. Assume for a contradiction B0 B. From (d) and
our assumption that the underlying Description Logic is monotonic, it follows
hT ; Bi j= . By (a), it follows hT ; B [ f gi is consistent, which contradicts (b).</p>
      </sec>
      <sec id="sec-4-2">
        <title>Aggregated credibility</title>
        <p>As explained in the beginning of Section 4, we assume a credibility function
mapping every assertion in A to a real number that can be thought of as the
truthfulness associated by an expert to the assertion .</p>
        <p>We will assume that the credibility function induces a function f from 2A to
R by means of some aggregation operator . Examples of are min, max, avg,
sum. In the theoretical development, we will abstract away from the aggregation
operator and treat f as a basic construct. To keep our framework exible
and general, we do not impose any restrictions on the choice of the credibility
function, which can be instantiated and adapted later on to t a particular
setting, for example, as a probability distribution.</p>
      </sec>
      <sec id="sec-4-3">
        <title>ABox assessment</title>
        <p>An ABox assessment for an ABox A is a total function : A ! R. Informally,
our goal is to de ne such that if two ABox assertions are logically con icting,
then the assertion with the higher -value is preferred.</p>
        <p>Although credibility functions and ABox assessments are both mappings from
A to R, it is important to understand that they are conceptually distinct. In
particular, ABox assessments improve credibility functions by taking into account
the axioms of the TBox, via the notions of refuter and supporter de ned
previously.</p>
        <p>Informally, we want that for every 2 A, its value under is greater if has
strong supporters, and smaller if has strong refuters. Here, the strength of a
supporter or refuter is recursively determined by the aggregated -values of its
elements. This can be expressed as follows, where denotes some proportionality
that will be made explicit later on:
( )</p>
        <p>X</p>
        <p>B is a
supporter
of</p>
        <p>X
B is a
refuter
of
0</p>
        <p>X
2B</p>
        <p>1
( )A
0</p>
        <p>X
2B</p>
        <p>1
( )A :
(1)
The expression at the righthand of will be abbreviated ( ). Informally,
( ) sums over all supporters and refuters of . The formulas for supporters
and refuters are signed positively and negatively respectively. The magnitude
of each supporter's or refuter's contribution is proportional to its aggregated
credibility and ABox assessment values. It is signi cant that (1) is recursive, in
the sense that appears at both the lefthand and righthand of .</p>
        <p>To shorten notations, we de ne mappings T : A ! 2A and F : A ! 2A, as
follows:</p>
        <p>T ( ) := fB
F ( ) := fB</p>
        <sec id="sec-4-3-1">
          <title>A j B is a supporter of g;</title>
        </sec>
        <sec id="sec-4-3-2">
          <title>A j B is a refuter of g: Informally, one can think of T and F as True and False respectively. B 2 T ( ) is shorthand for \B is a supporter of ," and B 2 F ( ) is shorthand for \B is</title>
          <p>a refuter of ". Obviously, the complexity of computing T and F will depend
on the underlying Description Logic.</p>
          <p>To have a more compact form for ( ), we de ne an indicator function I
from fT; F g 2A A A to f0; 1g:</p>
          <p>I(L; B; ; ) =
1 if 2 B and B 2 L( )
0 otherwise
(2)
Thus, I(T; B; ; ) is one if B is a supporter of that contains , and is zero
otherwise. Likewise, I(F; B; ; ) is one if B is a refuter of that contains ,
and is zero otherwise. Note incidentally that = implies I(L; B; ; ) = 0,
because does not belong to a supporter or a refuter of itself. Then, for 2 A,
0
(3)</p>
        </sec>
      </sec>
      <sec id="sec-4-4">
        <title>Ranking of ABox assertions</title>
        <p>An ABox assessment induces a ranking of an ABox, as follows: is ranked
higher than if ( ) &gt; ( ); and is ranked equal to if ( ) = ( ). Two
ABox assessments 1 and 2 are rank-equivalent, denoted 1 2, if they rank
assertions in the same way, that is, if for all ; 2 A, 1( ) &gt; 1( ) if and
only if 2( ) &gt; 2( ). It is easily veri ed that if 1 2, then 1( ) = 1( )
implies 2( ) = 2( ). Obviously, is an equivalence relation on the set of
all ABox assessments. In our study, we will be primarily interested in the set
of ABox assessments modulo . That is, we are not so much interested in the
real numbers in the range of two di erent ABox assessments, but rather in their
induced rankings.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Framework Instantiation</title>
      <p>We will assume A = f 1; : : : ; N g. In this section, we elaborate an instantiation
of the framework in Section 4. With the previous abbreviations, Eq. (1) reads as
( i) ( i). We will instantiate as a linear proportionality, i.e., for some
numbers a; b; c with a 6= 0:
8 a
&gt;
&gt;&gt;&lt; a
&gt;
&gt;
&gt;: a
( 1) = b
( 2) = b
.
.</p>
      <p>.
( N ) = b
( 1) + c
( 2) + c
( N ) + c
(4)
A more natural formulation may introduce only two numbers d; e and impose
( i) = d ( i) + e for 1 i N . This is tantamount to xing a = 1. The
choice for using three numbers was made for reasons of exibility, but is not
fundamental.</p>
      <p>B A</p>
      <p>Since we think of (1) as a positive proportionality, we require that a and b
have the same sign, say both positive. Let Af be the square N N matrix such
that for 1 i; j N ,</p>
      <p>Aif;j := X f (B) (I(T; B; i; j )</p>
      <p>I(F; B; i; j )) :
It is easily veri ed that for every i 2 f1; : : : ; N g, Aif;i = 0.</p>
      <p>For i 2 f1; : : : ; N g, we introduce a variable xi for the unknown ( i). We
de ne X = x1 x2 xN |. Then, using (3), the system of equations (4) can be
equivalently written as follows:
(5)
(6)
(7)
where 1 is the square identity matrix. Equation (6) has a unique solution if and
only if the matrix a 1 b Af (which does not depend on c) is non-singular (i.e.,
is invertible). In that case, the solution ABox assessment is given by:
X = a 1
b Af
1
c c
c |</p>
      <p>We should pick c 6= 0 to avoid the all-zero solution. Indeed, if a 1 b Af
is non-singular and c = 0, then the solution to (7) yields the ABox assessment
such that ( 1) = ( 2) = = ( N ) = 0, which obviously is of no interest
for ranking ABox assertions.</p>
      <p>Then, it is easily veri ed that for xed values of a and b, di erent choices for
c lead to rank-equivalent solutions. Therefore, we can choose c = 1 without loss
of generality, in which case in the solution, xi is the sum of all elements in the
ith row of a 1 b Af 1. Two signi cant questions remain:
1. For which values of a and b is the square matrix a 1 b Af non-singular,
such that (7) gives us a unique ABox assessment? Obviously, a 1 b Af
is invertible if and only if 1 ab Af is invertible. Therefore, only the ratio
between a and b matters in our subsequent analysis.
2. Are ABox assessments obtained for di erent values of a; b rank-equivalent?</p>
      <sec id="sec-5-1">
        <title>Graph-theoretical view</title>
        <p>From a graph-theoretical viewpoint, Af can be interpreted as an edge-weighted
directed graph whose vertices are the assertions of the ABox. This view is used in
Figures 1 and 2. An edge from j to i (i 6= j) has weight Aif;j . The task is then
to assign a real number to each vertex such that the resulting graph satis es the
sort of equilibrium expressed by (4). The ratio between a and b determines how
strongly a vertex is impacted (supported or refuted) by its incoming edges. The
question arising is whether an equilibrium (4) can be attained for some values of
a; b. It is equally important to examine the robustness of such an equilibrium (if
it exists) with respect to rank-equivalence. Ideally, di erent ABox assessments
obtained by small parameter changes should be close modulo rank-equivalence.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Solving the Instantiated Framework</title>
      <p>In Section 5, we presented the matrix equation (6) whose unique solution, if it
exists, yields an ABox assessment. This matrix equation has parameters a; b. A
remaining problem is how to pick appropriate values for these parameters. One
solution could be to choose values for a; b in an empirical fashion, relying, for
instance, on information obtained from some learning experience. Although we
have conducted some experiments (cf. Figures 1 and 2), a thorough empirical or
experimental validation is left for future research. Instead, we will focus more on
theoretical aspects in the current paper. In Section 6.1, we will show a
parameterization scheme for a; b that guarantees the existence of a solution for (6): pick
a b &gt; 0. What is probably more important is that when the ratio a=b grows,
the ABox assessments obtained for di erent a; b become all rank-equivalent.
Informally, the parameterization scheme converges to a unique ABox assessment
modulo rank-equivalence.
6.1</p>
      <sec id="sec-6-1">
        <title>Solution Existence</title>
        <p>Note that all diagonal elements in a 1 b Af are equal to a. The invertibility of
a 1 b Af can be guaranteed by (some form of) diagonal dominance, a concept
that is easily grasped and has turned out to be useful in applications [Var76].
An example is the Levy-Desplanques theorem recalled next.</p>
      </sec>
      <sec id="sec-6-2">
        <title>Theorem 1 (Levy-Desplanques). A square N</title>
        <p>N matrix A is invertible if
for every i 2 f1; : : : ; N g, jaiij &gt; PjN=1jaij j.</p>
        <p>j6=i
all i 2 f1; : : : ; N g, we have jaj &gt; jbj</p>
        <p>From Theorem 1, it immediately follows that (7) has a unique solution if for
PN</p>
        <p>j=1 Aif;j . This is illustrated by Example 2.</p>
        <p>Example 2. Assume four assertions 1; 2; 3; 4 such that 1 and 2 support
one another, while 3 and 4 refute one another. Take b = 1. If we assume
f (f ig) = 1 for 1 i 4, we obtain:
Then,</p>
        <p>20 1 0
It follows from Theorem 1 that this matrix is invertible for a &gt; 1, giving the
following solution:
Although distinct values for a lead to di erent ABox assessments, it is signi cant
to observe that a 1 1 &gt; a +11 (a &gt; 1), and therefore all these ABox assessments
are rank-equivalent: ( 1) = ( 2) &gt; ( 3) = ( 4). It is intuitively correct
that the two assertions that mutually attack one another loose credibility.
tu</p>
        <p>The invertibility of a 1
is recalled next.</p>
        <p>b Af may also follow from Banach's Lemma, which
Theorem 2 (Banach's Lemma). Let M be a square matrix with the property
that kM k &lt; 1 for some operator norm k k. Then the matrix 1 M is invertible
and (1 M ) 1 = 1 + M + M 2 + M 3 + .</p>
        <p>Therefore, if we x a = 1 and pick b su ciently small (which is analogous
to xing b = 1 and picking a su ciently large), then the matrix 1 b Af is
invertible, and 1 b Af 1 = 1 + Af + . If we limit ourselves to the two
most signi cant terms in this expansion, we get X = 1 + Af 1 1 1 | as an
approximate solution for (7). The ranking obtained by this solution is intuitively
meaningful, because it ranks i based on the sum of the elements in the ith row
of Af ; in this row, supporters have a positive sign, and refuters a negative sign.
6.2</p>
      </sec>
      <sec id="sec-6-3">
        <title>Convergence Towards a Fixed Ranking</title>
        <p>So it turns out that (6) has a unique solution with a; b 0 whenever the ratio
a=b is su ciently large. A desirable property is that di erent solutions be
rankequivalent, as was the case in Example 2. We now show that this property indeed
holds true beyond some threshold value for a=b.</p>
        <p>The notion of rank-equivalence obviously extends to any two vectors of real
numbers: two such vectors A; B of the same length N are rank-equivalent if for
all 1 i; j N , ai &lt; aj if and only if bi &lt; bj . The proof of the following
theorem is in Appendix A. Since, as argued before, only the ratio between a
and b matters in our analysis, we can x b and let a increase in the following
theorem.</p>
        <p>Theorem 3 (Convergence). Let M be an N N matrix whose diagonal
elements are zero. Let b; c 2 R. Consider the following equation with real-number
parameter a:
a , the equation (8) has a unique solution; and
{ for all a1; a2 a , if X1 and X2 are solutions to (8) for parameters a1 and
a2 respectively, then X1 and X2 are rank-equivalent.</p>
        <p>Moreover, such a bound a can be computed in polynomial time in the size of N .</p>
        <p>Informally, Theorem 3 tells us that for all choices of b and c, there is a
threshold value a such that all choices of a satisfying a a lead to the same
ABox assessment modulo rank-equivalence.
We discuss the computational complexity of solving (6). The main di culty is
the computation of the non-diagonal elements in Af , which are de ned by (5).
Given i and j , this requires nding every B A such that j 2 B and B
is a supporter or refuter of i. In general, the number of supporters or refuters
can be exponential in the size of A, because an ABox of size 2N can have 2NN
supporters or refuters not comparable by set inclusion. However, in practice, a
xed upper bound on the size of supporters or refuters may be implied by the
TBox, in a way captured by the following de nition.</p>
        <p>De nition 2. We say that a TBox T is con ict-bounded if there exists a
polynomial-time computable positive integer m such that for every
knowledgebase hA; T i and 2 A, if B is a refuter or supporter of , then jBj m.</p>
        <p>Con ict-boundedness arises in practice. For example, for every DL-Lite TBox,
every supporter or refuter has cardinality 1 because each con ict in DL-Lite
involves at most two assertions. Con ict-boundedness is also guaranteed in E L?nr
(E L? with non-recursive empty concepts) de ned in [Ros11].</p>
        <p>Theorem 4. Let T be a con ict-bounded TBox such that ABox consistency
with respect to T can be checked in polynomial time. Then, for every ABox A,
the matrix Af can be computed in polynomial time (in the size of A) if f is
polynomial-time computable.</p>
        <p>Proof. Let N := jAj. Recall that Af is an N N matrix given by (5). Since
T is con ict-bounded, say with bound m, for every B A, if jBj &gt; m,
then I(T; B; i; j ) = I(F; B; i; j ) = 0. Therefore, the sum in (5) must only
consider subsets B A with jBj m, which are polynomially many and
polynomial-time computable. Furthermore, since ABox consistency checking is
in polynomial time by the hypothesis of the theorem, it can be tested in
polynomial time whether any such B containing j is a supporter or a refuter of
i (or neither of both). The computation of f (B) is also in polynomial time by
the hypothesis of the theorem. It is now obvious that any entry of Af can be
computed in polynomial time.
tu</p>
        <p>An inspection of the preceding proof reveals that Theorem 4 remains valid if,
throughout its statement, we replace polynomial time by some higher complexity
upper bound (e.g., polynomial space or exponential time).</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Summary and Future Work</title>
      <p>In this work, we have proposed a novel framework to rank the assertions of an
inconsistent ABox in terms of their degree of truthfulness. This ranking takes
into account an expert's credibility function as well as the logical axioms of the
TBox. The theoretical framework can work with any Description Logic, but to
gain computational tractability, restrictions have to be imposed.</p>
      <p>The framework is implementable using existing libraries for matrix operations
and description logics. In the future, we aim to extend our prototype in order to
empirically evaluate our theory.</p>
      <p>A next step is to use our framework for repairing database and
knowledgebase systems. Our ranking of ABox assertions can be extended in several ways
to a ranking of repairs, using some notion of Pareto optimality. For example, if
two facts and contradict one another and is ranked higher than , then a
repair containing is preferred over a repair containing (all other facts being
equal). This brings us in the realm of prioritized database repairing [Wij19],
which we see as a promising way to enrich existing DL repair semantics (like
IAR and AR). By narrowing the search space of possible repairs, we may also
hope to gain e ciency compared to existing repair semantics.</p>
      <p>Acknowledgments We thank the anonymous reviewers for their helpful
comments.</p>
      <p>A</p>
    </sec>
    <sec id="sec-8">
      <title>Proof of Theorem 3</title>
      <p>Proof (of Theorem 3). Clearly, if xc is the solution to
with c &gt; 0, and x1 is the solution to
(a 1
b
By the Levy-Desplanques theorem, for every a a0, the matrix a 1 b M is
invertible. For every a a0, we write xa for the unique solution of the equation
(a 1
b</p>
      <p>M ) X = 1 1
1 | :
For a a0, de ne ij (a) := xia xja, where xia is the ith coordinate of xa.</p>
      <p>We will show that there is a value a a0 such that for all a1; a2 a , for
all 1 i &lt; j N , ij (a1) and ij (a2) have the same sign, which implies that
xa1 and xa2 are rank-equivalent.</p>
      <p>De ne the following matrix Sji in function of a, for 1
i</p>
      <p>N :
(Sji(a))`k =
((a 1
1
b M )`k if k 6= i
if k = i</p>
      <sec id="sec-8-1">
        <title>That is, Sji is obtained from a 1 b</title>
        <p>1 1 1 |. By Cramer's Rule, we have
M by replacing the ith column with
and consequently
xia =</p>
        <p>det Sji(a)
det (a 1 b M )</p>
        <p>
          ;
ij(a) =
det Sji(a)
det (a 1
det Sjj(a)
b M )
:
(9)
(
          <xref ref-type="bibr" rid="ref13 ref21">10</xref>
          )
(
          <xref ref-type="bibr" rid="ref18">11</xref>
          )
(
          <xref ref-type="bibr" rid="ref3 ref9">12</xref>
          )
(
          <xref ref-type="bibr" rid="ref1 ref5">13</xref>
          )
pij(ak) = det Sji(ak)
det Sjj(ak)
for all ak 2 V and 1
i &lt; j
        </p>
        <p>N . The set
fpij(ak) j 1
i &lt; j</p>
        <p>N; 1
k</p>
        <p>N + 1g
can be computed in polynomial time in N , because it involves N (N + 1)
determinants (i.e., det Sji(ak) for 1 i N and 1 k N + 1), each of which can
be computed in polynomial time in N . For all 1 i &lt; j N , the polynomial
pij can be computed from f(a1; pij(a1)), . . . , (aN+1; pij(aN+1))g in polynomial
time using, for example, Lagrange interpolation. The number of polynomials to
compute is N(N 1) (i.e., polynomially many), and each of them has at most
2
Since the determinants det ( ) are polynomial expressions, the following are all
polynomials of degree at most N :
{ pi(a) = det Sji(a) ;
{ pj(a) = det Sjj(a) ; and
{ p(a) = det (a 1 b M ).</p>
        <p>If a a0, then since the polynomial p(a) does not vanish, the sign of ij(a) is
fully determined by the expression
det Sji(a)</p>
        <p>det Sjj(a) :</p>
        <p>Let pij = pi pj for 1 i &lt; j N . We determine a such that for all a a
and for all 1 i &lt; j N , the sign of pij(a) does not change (i.e., is either
always positive or always negative). Note that the sign of pij not changing is
equivalent to the sign of pji not changing, so we can assume i &lt; j without loss
of generality.</p>
        <p>In the remainder of the proof, we show that the desired a exists and can be
computed in polynomial time in N . Pick N +1 real numbers V = fa1; : : : ; aN+1g,
all greater than a0. Compute
N coe cients. We will represent the polynomial pij by its coe cients, i.e., by
h(pij )0; : : : ; (pij )nij i where each (pij )` is the coe cient of degree `, and nij N
is the polynomial's degree. We now de ne aij as
aij := max a0; 2 +
By Cauchy's bound on positive real roots of polynomials, if x0 is a root of pij ,
then x0 &lt; aij . This implies that if a1; a2 &gt; aij , then pij (a1) and pij (a2) have
the same sign (i.e., either both positive or both negative), and therefore, by
de nition of ij , we have xia1 &lt; xja1 if and only if xia2 &lt; xja2 . Finally, let
a = 1 mi&lt;ajx N aij ;
which can be computed in polynomial time. By our construction, if follows that
for all a1; a2 &gt; a , the solutions xa1 ; xa2 exist and are rank-equivalent.</p>
        <p>Finally, we incidentally note that a slightly better bound is obtained by
letting</p>
        <p>:
This concludes the proof.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [AB13]
          <article-title>Leila Amgoud and Jonathan Ben-Naim. Ranking-based semantics for argumentation frameworks</article-title>
          . In Weiru Liu,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Subrahmanian</surname>
          </string-name>
          , and Jef Wijsen, editors,
          <source>Scalable Uncertainty Management - 7th International Conference, SUM 2013</source>
          , Washington, DC, USA, September
          <volume>16</volume>
          -
          <issue>18</issue>
          ,
          <year>2013</year>
          . Proceedings, volume
          <volume>8078</volume>
          of Lecture Notes in Computer Science, pages
          <volume>134</volume>
          {
          <fpage>147</fpage>
          . Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [BBG14]
          <string-name>
            <given-names>Meghyn</given-names>
            <surname>Bienvenu</surname>
          </string-name>
          , Camille Bourgaux, and
          <string-name>
            <given-names>Francois</given-names>
            <surname>Goasdoue</surname>
          </string-name>
          .
          <article-title>Querying inconsistent description logic knowledge bases under preferred repair semantics</article-title>
          . In Carla E. Brodley and Peter Stone, editors,
          <source>Proceedings of the Twenty-Eighth AAAI Conference on Arti cial Intelligence, July 27 -31</source>
          ,
          <year>2014</year>
          ,
          <string-name>
            <given-names>Quebec</given-names>
            <surname>City</surname>
          </string-name>
          , Quebec, Canada, pages
          <volume>996</volume>
          {
          <fpage>1002</fpage>
          . AAAI Press,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [BCPR12] Richard Booth, Martin Caminada, Mikolaj Podlaszewski, and
          <string-name>
            <given-names>Iyad</given-names>
            <surname>Rahwan</surname>
          </string-name>
          .
          <article-title>Quantifying disagreement in argument-based reasoning</article-title>
          . In Wiebe van der Hoek, Lin Padgham,
          <string-name>
            <surname>Vincent Conitzer</surname>
          </string-name>
          , and Michael Winiko , editors,
          <source>International Conference on Autonomous Agents and Multiagent Systems, AAMAS</source>
          <year>2012</year>
          , Valencia, Spain, June 4-8,
          <year>2012</year>
          (3 Volumes), pages
          <fpage>493</fpage>
          {
          <fpage>500</fpage>
          .
          <string-name>
            <surname>IFAAMAS</surname>
          </string-name>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [BDKM16]
          <string-name>
            <given-names>Elise</given-names>
            <surname>Bonzon</surname>
          </string-name>
          , Jero^me Delobelle, Sebastien Konieczny, and
          <string-name>
            <given-names>Nicolas</given-names>
            <surname>Maudet</surname>
          </string-name>
          .
          <article-title>A comparative study of ranking-based semantics for abstract argumentation</article-title>
          . In Dale Schuurmans and Michael P. Wellman, editors,
          <source>Proceedings of the Thirtieth AAAI Conference on Arti cial Intelligence</source>
          ,
          <source>February 12-17</source>
          ,
          <year>2016</year>
          , Phoenix, Arizona, USA, pages
          <volume>914</volume>
          {
          <fpage>920</fpage>
          . AAAI Press,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [BR13]
          <string-name>
            <given-names>Meghyn</given-names>
            <surname>Bienvenu</surname>
          </string-name>
          and
          <string-name>
            <given-names>Riccardo</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>Tractable approximations of consistent query answering for robust ontology-based data access</article-title>
          . In Francesca Rossi, editor,
          <source>IJCAI 2013, Proceedings of the 23rd International Joint Conference on Arti cial Intelligence</source>
          , Beijing, China,
          <source>August 3-9</source>
          ,
          <year>2013</year>
          , pages
          <fpage>775</fpage>
          {
          <fpage>781</fpage>
          . IJCAI/AAAI,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [CLP18]
          <string-name>
            <given-names>Marco</given-names>
            <surname>Calautti</surname>
          </string-name>
          , Leonid Libkin, and
          <string-name>
            <given-names>Andreas</given-names>
            <surname>Pieris</surname>
          </string-name>
          .
          <article-title>An operational approach to consistent query answering</article-title>
          . In Jan Van den Bussche and Marcelo Arenas, editors,
          <source>Proceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems</source>
          , Houston, TX, USA, June 10-15,
          <year>2018</year>
          , pages
          <fpage>239</fpage>
          {
          <fpage>251</fpage>
          . ACM,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [dKD08] Cristobald de Kerchove and Paul Van Dooren.
          <article-title>The pagetrust algorithm: How to rank web pages when negative links are allowed</article-title>
          ?
          <source>In Proceedings of the SIAM International Conference on Data Mining, SDM 2008, April 24-26</source>
          ,
          <year>2008</year>
          , Atlanta, Georgia, USA, pages
          <volume>346</volume>
          {
          <fpage>352</fpage>
          .
          <string-name>
            <surname>SIAM</surname>
          </string-name>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [DQ15]
          <string-name>
            <given-names>Jianfeng</given-names>
            <surname>Du</surname>
          </string-name>
          and
          <string-name>
            <given-names>Guilin</given-names>
            <surname>Qi</surname>
          </string-name>
          .
          <article-title>Tractable computation of representative ABox repairs in description logic ontologies</article-title>
          . In Songmao Zhang, Martin Wirsing, and Zili Zhang, editors, Knowledge Science, Engineering and Management - 8th
          <source>International Conference, KSEM</source>
          <year>2015</year>
          , Chongqing, China,
          <source>October 28- 30</source>
          ,
          <year>2015</year>
          , Proceedings, volume
          <volume>9403</volume>
          of Lecture Notes in Computer Science, pages
          <volume>28</volume>
          {
          <fpage>39</fpage>
          . Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [GM12]
          <string-name>
            <given-names>Sergio</given-names>
            <surname>Greco</surname>
          </string-name>
          and
          <string-name>
            <given-names>Cristian</given-names>
            <surname>Molinaro</surname>
          </string-name>
          .
          <article-title>Probabilistic query answering over inconsistent databases</article-title>
          . Ann. Math. Artif. Intell.,
          <volume>64</volume>
          (
          <issue>2-3</issue>
          ):
          <volume>185</volume>
          {
          <fpage>207</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [HT17]
          <string-name>
            <given-names>Anthony</given-names>
            <surname>Hunter</surname>
          </string-name>
          and
          <string-name>
            <given-names>Matthias</given-names>
            <surname>Thimm</surname>
          </string-name>
          .
          <article-title>Probabilistic reasoning with abstract argumentation frameworks</article-title>
          .
          <source>J. Artif. Intell. Res.</source>
          ,
          <volume>59</volume>
          :
          <fpage>565</fpage>
          {
          <fpage>611</fpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>[Kle99] Jon</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Kleinberg</surname>
          </string-name>
          .
          <article-title>Authoritative sources in a hyperlinked environment</article-title>
          .
          <source>J. ACM</source>
          ,
          <volume>46</volume>
          (
          <issue>5</issue>
          ):
          <volume>604</volume>
          {
          <fpage>632</fpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [LB16]
          <string-name>
            <given-names>Andrei</given-names>
            <surname>Lopatenko</surname>
          </string-name>
          and
          <string-name>
            <given-names>Leopoldo E.</given-names>
            <surname>Bertossi</surname>
          </string-name>
          .
          <article-title>Complexity of consistent query answering in databases under cardinality-based and incremental repair semantics (extended version)</article-title>
          .
          <source>CoRR, abs/1605.07159</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [LLR+10]
          <string-name>
            <surname>Domenico</surname>
            <given-names>Lembo</given-names>
          </string-name>
          , Maurizio Lenzerini, Riccardo Rosati, Marco Ruzzi, and Domenico Fabio Savo.
          <article-title>Inconsistency-tolerant semantics for description logics</article-title>
          . In Pascal Hitzler and Thomas Lukasiewicz, editors,
          <source>Web Reasoning and Rule Systems - Fourth International Conference, RR</source>
          <year>2010</year>
          , Bressanone/Brixen, Italy,
          <source>September 22-24</source>
          ,
          <year>2010</year>
          . Proceedings, volume
          <volume>6333</volume>
          of Lecture Notes in Computer Science, pages
          <volume>103</volume>
          {
          <fpage>117</fpage>
          . Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>[LPSV06a] Sik Chun</surname>
            <given-names>Lam</given-names>
          </string-name>
          , Je
          <string-name>
            <given-names>Z.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <surname>Derek H. Sleeman</surname>
          </string-name>
          , and
          <article-title>Wamberto Weber Vasconcelos. A ne-grained approach to resolving unsatis able ontologies</article-title>
          .
          <source>In 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI</source>
          <year>2006</year>
          ),
          <fpage>18</fpage>
          -
          <lpage>22</lpage>
          December 2006,
          <string-name>
            <given-names>Hong</given-names>
            <surname>Kong</surname>
          </string-name>
          , China, pages
          <volume>428</volume>
          {
          <fpage>434</fpage>
          . IEEE Computer Society,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>[LPSV06b] Sik Chun</surname>
            <given-names>Lam</given-names>
          </string-name>
          , Je
          <string-name>
            <given-names>Z.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <surname>Derek H. Sleeman</surname>
          </string-name>
          , and Wamberto Weber Vasconcelos.
          <article-title>Ontology inconsistency handling : Ranking and rewriting axioms</article-title>
          .
          <source>Technical report</source>
          , University of Aberdeen,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [PBMW99]
          <string-name>
            <given-names>Lawrence</given-names>
            <surname>Page</surname>
          </string-name>
          , Sergey Brin, Rajeev Motwani, and
          <string-name>
            <given-names>Terry</given-names>
            <surname>Winograd</surname>
          </string-name>
          .
          <article-title>The pagerank citation ranking: Bringing order to the web</article-title>
          .
          <source>Technical Report 1999-66</source>
          ,
          <string-name>
            <surname>Stanford</surname>
            <given-names>InfoLab</given-names>
          </string-name>
          ,
          <year>November 1999</year>
          .
          <article-title>Previous number = SIDL-WP1999-0120.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [Rad18]
          <string-name>
            <given-names>Badran</given-names>
            <surname>Raddaoui</surname>
          </string-name>
          .
          <article-title>On the measure of con icts: an argumentation-based framework</article-title>
          .
          <source>J. Appl. Non Class. Logics</source>
          ,
          <volume>28</volume>
          (
          <issue>2-3</issue>
          ):
          <volume>240</volume>
          {
          <fpage>259</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [Ros11]
          <string-name>
            <given-names>Riccardo</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>On the complexity of dealing with inconsistency in description logic ontologies</article-title>
          . In Toby Walsh, editor,
          <source>IJCAI 2011, Proceedings of the 22nd International Joint Conference on Arti cial Intelligence</source>
          , Barcelona, Catalonia, Spain,
          <source>July 16-22</source>
          ,
          <year>2011</year>
          , pages
          <fpage>1057</fpage>
          {
          <fpage>1062</fpage>
          . IJCAI/AAAI,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>[SSF16] Gerardo</surname>
            <given-names>I. Simari</given-names>
          </string-name>
          , Paulo Shakarian, and
          <string-name>
            <surname>Marcelo</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Falappa</surname>
          </string-name>
          .
          <article-title>A quantitative approach to belief revision in structured probabilistic argumentation</article-title>
          . Ann. Math. Artif. Intell.,
          <volume>76</volume>
          (
          <issue>3-4</issue>
          ):
          <volume>375</volume>
          {
          <fpage>408</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [TBB+17]
          <string-name>
            <surname>Abdelmoutia</surname>
            <given-names>Telli</given-names>
          </string-name>
          , Salem Benferhat, Mustapha Bourahla, Zied Bouraoui, and
          <string-name>
            <given-names>Karim</given-names>
            <surname>Tabia</surname>
          </string-name>
          .
          <article-title>Polynomial algorithms for computing a single preferred assertional-based repair</article-title>
          .
          <source>Kunstliche Intell</source>
          .,
          <volume>31</volume>
          (
          <issue>1</issue>
          ):
          <volume>15</volume>
          {
          <fpage>30</fpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>[TND10] Vincent</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Traag</surname>
            ,
            <given-names>Yurii E.</given-names>
          </string-name>
          <string-name>
            <surname>Nesterov</surname>
          </string-name>
          , and Paul Van Dooren.
          <article-title>Exponential ranking: Taking into account negative links</article-title>
          . In Leonard Bolc, Marek Makowski, and Adam Wierzbicki, editors, Social Informatics - Second International Conference, SocInfo
          <year>2010</year>
          , Laxenburg, Austria,
          <source>October 27-29</source>
          ,
          <year>2010</year>
          . Proceedings, volume
          <volume>6430</volume>
          of Lecture Notes in Computer Science, pages
          <volume>192</volume>
          {
          <fpage>202</fpage>
          . Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [Var76]
          <string-name>
            <surname>Richard</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Varga</surname>
          </string-name>
          .
          <article-title>On recurring theorems on diagonal dominance</article-title>
          .
          <source>Linear Algebra and its Applications</source>
          ,
          <volume>13</volume>
          (
          <issue>1</issue>
          ):1 {
          <issue>9</issue>
          ,
          <year>1976</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [Wij19]
          <string-name>
            <given-names>Jef</given-names>
            <surname>Wijsen</surname>
          </string-name>
          .
          <article-title>Foundations of query answering on inconsistent databases</article-title>
          .
          <source>SIGMOD Rec</source>
          .,
          <volume>48</volume>
          (
          <issue>3</issue>
          ):6{
          <fpage>16</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>