<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards Even More Irresistible Axiom Weakening?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Roberto Confalonieri</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pietro Galliani</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oliver Kutz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Daniele Porello</string-name>
          <email>daniele.porello@cnr.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Guendalina Righetti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nicolas Troquard</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Free University of Bozen-Bolzano</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Axiom weakening is a technique that allows for a ne-grained repair of inconsistent ontologies. Its main advantage is that it repairs ontologies by making axioms less restrictive rather than by deleting them, employing the use of re nement operators. In this paper, we build on previously introduced axiom weakening for ALC, and make it much more irresistible by extending its de nitions to deal with SROIQ, the expressive and decidable description logic underlying OWL 2 DL. We extend the de nitions of re nement operator to deal with SROIQ constructs, in particular with role hierarchies, cardinality constraints and nominals, and illustrate its application. Finally, we discuss the problem of termination of an iterated weakening procedure.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The traditional approach to repairing inconsistent ontologies amounts to
identify problematic axioms and to remove them (e.g., [
        <xref ref-type="bibr" rid="ref10 ref11 ref19 ref4">19, 11, 10, 4</xref>
        ]). Whilst this
approach is su cient to guarantee that the obtained ontology is consistent, it
tends to lead to information loss as a secondary e ect. For instance, let us assume
that our ontology contains the following axioms:
      </p>
      <sec id="sec-1-1">
        <title>Polygamist v Person u</title>
      </sec>
      <sec id="sec-1-2">
        <title>Polygamist v MarriedPerson</title>
        <p>2 married :Person</p>
      </sec>
      <sec id="sec-1-3">
        <title>MarriedPerson v Person u</title>
        <p>1 married :Person u
1 married :Person
Polygamist(mary)
(1)
(2)
(3)
(4)
According to a classical approach, repairing such an ontology can be done by
removing any of the four axioms. However, by removing axiom (1) or (2), we
would abandon the polygamist essence of the ontology, by removing axiom (3)
we would abandon the more classical view about marriage, and removing axiom
(4) trivialises the concept Polygamist. Ideally one wants to preserve as much
? Copyright c 2020 for this paper by its authors. Use permitted under Creative
Commons License Attribution 4.0 International (CC BY 4.0).
information as possible, and replace these axioms by weaker versions thereof
instead of removing them.</p>
        <p>
          Approaches to repair ontologies more gently via axiom weakening were
proposed in the literature [
          <xref ref-type="bibr" rid="ref2 ref20 ref7 ref8">8, 7, 20, 2</xref>
          ]. In [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], concept re nement in EL++ ontologies
is introduced in the context of concept invention. A concept re nement
operator to generalise EL++ concepts is proposed and its properties are analysed.
This line of work was continued in [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] where the authors de ne an abstract
re nement operator for generalising and specialising ALC concepts, and
weakening ALC axioms. Crucially, they propose a repairing ontology procedure that
solves inconsistencies by weakening axioms and not by removing them. In [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ],
the authors present general theoretical results for axiom weakening in
Description Logics (and instatiations of their approach for the case of EL). In particular
they show that the repairing procedure always yields a consistent ontology in,
at most, exponential number of iterations. Practical applications are proposed
for EL ontologies.
        </p>
        <p>
          Re nement operators in Description Logic have been studied with
application to Machine Learning [
          <xref ref-type="bibr" rid="ref14 ref15 ref16 ref5">5, 15, 14, 16</xref>
          ]. Concept re nement operators [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] come
in two avours. A generalisation operator wrt. an ontology O is a function that
associates with a concept C a set O(C) of concepts which are `super-concepts'
of C. Dually, a specialisation operator wrt. an ontology O is a function that
associates with a concept C a set O(C) of concepts which are `sub-concepts' of
C. The notions of `super', and `sub-concept' are here implicitly de ned by the
respective functions, rather than by a purely syntactic procedure. Intuitively,
a concept D is a generalised super-concept of concept C wrt. to ontology O if
in every model of the ontology the extension of D subsumes the extension of
C. So for instance, the concept 9has component:Carbon is a generalisation of
LivingBeing and = 2 has bodypart:Legs is a specialisation of LivingBeing
(assuming an appropriate background ontology O).
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ], the authors showed that re nement operators enjoy a few properties
that make them suitable for implementation of axiom weakening. In particular,
deciding whether a concept is a re nement of another concept has the same
worst-case complexity as deciding concept subsumption in the underlying logic.
Re nement operators are then used to weaken axioms, and to repair
inconsistent ontologies. Experimentally, it is shown that repairing ontologies via axiom
weakening maintains signi cantly more information than repairing ontologies
via axiom deletion, using e.g., measures that evaluate preservation of taxonomic
structure. In [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], ontology repairs via concept re nements and axiom weakening
is used to merge two mutually inconsistent ontologies.
        </p>
        <p>
          In this paper, we extend re nement operators and axiom weakening of [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]
to deal with SROIQ, the logical underpinning of W3C OWL2, with the
intention to make the approach more widely applicable. We also provide a proof of
almost-certain termination of the ontology repairing procedure based on axiom
weakening, originally proposed in [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ], and extended here to deal with SROIQ.
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>
        From a formal point of view, an ontology is a set of formulas in an appropriate
logical language with the purpose of describing a particular domain of interest.
We brie y introduce SROIQ; for full details see [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The syntax of SROIQ is
based on three disjoint sets NC , NR, NI of concept names, role names, and
individual names, respectively. The set of SROIQ roles and concepts is generated
by the grammar
      </p>
      <p>R; S ::= U j E j r j r</p>
      <p>;
C ::= ? j &gt; j A j :C j C u C j C t C j 8R:C j 9R:C j</p>
      <p>n S:C j n S:C j 9S:Self j fig ;
where U and E are the universal role and empty role respectively, r 2 NR, S is
simple (see further) in the RBox R, A 2 NC , n is a non-negative integer, and
i 2 NI . In the following, L(NC ; NR; NI ) and Lr(NR), denote respectively the
set of concepts and roles that can be built over NC , NR, NI in SROIQ. We
denote by nnf(C) the negation normal form of the concept C.</p>
      <p>The size of a concept in L(NC ; NR; NI ) will be useful in the proofs. We de ne
it precisely next.</p>
      <p>De nition 1. The size jCj of a concept C is inductively de ned as follows. For
C 2 NC [ f&gt;; ?g, jCj = 1. For i 2 NI , jfigj = 1. For R 2 NR, j9R:Self j = 2.
Then for R 2 NR and an arbitrary C, j:Cj = 1 + jCj; jC u Dj = jC t Dj =
1 + jCj + jDj; j9R:Cj = j8R:Cj = 1 + jCj, and for a non-negative integer n,
j n R:Cj = j n R:Cj = log(n) + 1 + jCj.</p>
      <p>
        A TBox T is a nite set of concept inclusions (GCIs) of the form C v D where
C and D are concepts. It is used to store terminological knowledge regarding
the relationships between concepts. An ABox A is a nite set of formulas of the
form C(a), R(a; b), :R(a; b), a = b, and a 6= b, which express knowledge about
objects in the knowledge domain. An RBox R is a nite set of role inclusions
(RIA) R v S, complex role inclusions R1 R2 v S, and disjoint(R; S) (R and S
simple, see next), where R, R1, R2, and S are roles. A role R 2 NR is simple in
R if it is not implied by any composition of roles; it is non-simple otherwise. An
inverse role R is simple if R is simple. We take U and E as simple. (Transitive,
re exive, irre exive, symmetric, and asymmetric roles can be de ned through
appropriate TBox or RBox axioms.) A SROIQ ontology O = T [ R [ A is
de ned by a TBox T , an RBox R, and an ABox A, where the R is assumed to
be regular, cf. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        The semantics of SROIQ is de ned through interpretations I = ( I ; I ),
where I is a non-empty domain, and I is a function mapping every individual
name to an element of I , each concept name to a subset of the domain, and
each role name to a binary relation on the domain; see [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] for details. The
interpretation I is a model of the ontology O if it satis es all the axioms in O.
      </p>
      <p>Given two concepts C and D, we say that C is subsumed by D wrt. the
ontology O (C vO D) if CI DI for every model I of O, where we write CI for
the extension of the concept C according to I. We write C O D when C vO D
and D vO C. C is strictly subsumed by D wrt. O (C @O D) if C vO D and
C 6 O D. Given two roles, R and S, R is subsumed by S wrt. the ontology O
(R vO S) if RI SI for every model I of O. We may use the shortcuts R O S
and R @O S with the obvious interpretation.</p>
      <p>De nition 2. Let O be a SROIQ ontology. The set of subconcepts of O is
given by
sub(O) = f&gt;; ?g [</p>
      <p>[ sub(C) [
C(a)2O</p>
      <p>[
CvD2O
sub(C) [ sub(D) ;
where sub(C) is the set of subconcepts in C.</p>
      <p>We now de ne the upward and downward cover sets of concept names and
atomic roles respectively. Intuitively, the upward cover of the concept C collects
the most speci c subconcepts of O that subsume C; conversely, the downward
cover of C collects the most general subconcepts from O subsumed by C. The
interpretation of the upward and downcover covers of atomic roles is similar.
The concepts in sub(O) are some concepts that are relevant in the context of
O, and that are used as building blocks for generalisations and specialisations.
The properties of sub(O) guarantee that the upward and downward cover sets
are nite.</p>
      <p>De nition 3. Let O = T [R[A be an ontology. Let C be a concept, the upward
cover and downward cover of C wrt. O are:</p>
      <p>UpCovO(C) := fD 2 sub(O) j C vO D and
DownCovO(C) := fD 2 sub(O) j D vO C and</p>
      <p>UpCovO(r) := fs 2 NR [ NR [ fE; U g j r vO s and
DownCovO(r) := fs 2 NR [ NR [ fE; U g j s vO r and
s; s0 are simple in Rg:
s; s0 are simple in Rg:
Let n be a non-negative integer:</p>
      <p>UpCovO(n) := fn; n + 1g;
DownCovO(n) :=
(fn
fng
1; ng
when n &gt; 1
when n = 0:
In and of themselves, UpCovO and DownCovO miss `interesting' re nements.
Example 1. Let NC = fA; B; Cg and O = fA v Bg. Then sub(O) = fA; B; &gt;; ?g.
Now UpCovO(A u C) = fAg. Iterating, we get UpCovO(A) = fA; Bg and
UpCovO(B) = fB; &gt;g. We could reasonably expect B u C to be also a
generalisation of A u C wrt. O but it will be missed by the iterated application
of UpCovO, because B u C 62 sub(O). Similarly, UpCovO(9R:A) = f&gt;g, even
though we could expect 9R:B to be a generalisation of 9R:A.</p>
      <p>To take care of these omissions, we introduce generalisation and specialisation
operators that will recursively exploit the structural complexity of the concept
being re ned.</p>
      <p>Let " and # be two functions with domain L(NC ; NR; NI )[Lr(NR)[N. They
map every concept to an element of the powerset of L(NC ; NR; NI ), every role
to an element of the powerset of Lr(NR), and every non-negative integers to the
powerset of N. We de ne ";#, the abstract re nement operator, by induction on
the structure of concept descriptions as shown in Table 1.</p>
      <p>We now de ne concrete re nement operators from the abstract operator ";#.
De nition 4. The generalisation operator and specialisation operator are
dened, respectively, as</p>
      <p>O = UpCovO;DownCovO
and</p>
      <p>O = DowCovO;UpCovO :
Returning to Example 1, notice that for NC = fA; B; Cg and O = fA v Bg, we
now have O(A u C) = fA u C; B u C; A u &gt;; Ag.</p>
      <p>
        Some comments are in order about Table 1. As in [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] the domain of O
and O is the set of concepts in negative normal form. In practice it can be
extended straightforwardly to all concepts by modifying the clause ";#(:A) with
";#(:C) = fnnf(:C0) j C0 2 #(C)g [ "(:C). The cases of 8R:C and 9R:C were
already present for ALC in [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. Here, they are amended with the possibility to
re ne the R-role. Speci c cases have been added to deal with SROIQ concepts
and roles constructs.
      </p>
      <p>De nition 5. Given a DL concept C, its i-th re nement iteration by means of
";# (viz., "i;#(C)) is inductively de ned as follows:
{
{
"0;#(C) = fCg;
"j;+#1(C) =
"j;#(C) [ SC02 "j;#(C) ";#(C0),
j
0.</p>
      <p>The set of all concepts reachable from C by means of ";# in a nite number of
steps is ";#(C) = Si 0 "i;#(C):
2.1</p>
      <p>Basic properties</p>
      <sec id="sec-2-1">
        <title>Some basic properties about O and</title>
        <p>useful in the remainder of this paper.
Lemma 1. For every ontology O:</p>
      </sec>
      <sec id="sec-2-2">
        <title>O will help to build intuition, and will be</title>
        <p>";#(r ) = fs j s 2 "(r); s 2 NRg [ fs j s 2 "(r); s 2 NR g
";#(U ) = "(U )
";#(E) = "(E)
1. generalisation: if X 2 O(Y ) then Y vO X</p>
        <p>specialisation: if X 2 O(Y ) then X vO Y
2. cover nontriviality: if C 6 O &gt; then there exists some D 2 UpCovO(C)
such that C @O D, and if C 6 O ? then there exists some D 2 DownCovO(C)
such that D @O C
3. cover triviality: if C O &gt; then &gt; 2 UpCovO(C), and if C O ? then
? 2 DownCovO(C)
4. trivial generalisability: &gt; 2 O(C), U 2 O(r)
5. fgaelnseerhaoloisdastipoencialnisiatebnileistys:: ?O2(C)Oi(sC)n,iEte2 O(r)</p>
        <p>specialisation niteness: O(C) is nite
Lemma 2. L(NC ; NR; NI ) is closed under O and O. If C 2 L(NC ; NR; NI )
then every re nement in O(C) and O(C) is also in L(NC ; NR; NI ).
Proof. (Sketch) The possibly delicate cases involve the re nements of roles. The
condition on the upcover and downcover of a role R to contain only simple
roles (cf. De nition 3) forces that every re nement of a role is simple. So, the
restriction to simple roles guarantees that, e.g., ";#( n R:C) and ";#( n R:C)
are in SROIQ, as no complex role may appear in the scope of the cardinality
restriction.</p>
        <p>Notice that, by dropping that condition, we may have that, e.g., for roles
p; q; r; s and axioms r v s, p q v s in O, when generalising from ( n r:C) to
( n s:C) we violate the simplicity condition for roles in cardinality restrictions.
tu
2.2</p>
        <p>Complexity
We now analyse the computational aspects of the re nement operators.
De nition 6. Given a SROIQ ontology O and concepts C; D, the problems</p>
        <p>O-membership and O-membership ask whether D 2 O(C) and D 2 O(C),
respectively.</p>
        <p>
          The re nement operators O and O are e cient, in the sense that
deciding O-membership and O-membership is not harder than deciding concept
subsumption in SROIQ. Recall that subsumption in SROIQ is
N2ExpTimecomplete [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. We can show that O-membership and O-membership belong
to the same complexity class.
        </p>
        <p>Theorem 1.</p>
        <p>O-membership and</p>
        <p>O-membership are N2ExpTime-complete.</p>
        <p>Proof. (Sketch) We sketch the case of O-membership. The case of
O-membership is analogous.</p>
        <p>
          For proving hardness, we rst show that deciding whether C0 2 UpCoverO(C)
is as hard as concept subsumption. Then we show that O-membership is just
as hard. The proofs are identical to the ones in [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
        </p>
        <p>For the upper bound, we rst establish the complexity of computing the
sets UpCoverO(C), DownCoverO(C), UpCoverO(r), DownCoverO(r). It su ces to
check for every D 2 sub(O) whether D 2 UpCovO(C), or D 2 DownCovO(C),
and collect those concepts for which the answer is positive. Each check can be
done with at most 1 + 4j sub(O)j calls to a SROIQ subsumption sub-routine
in non-deterministic double exponential time. The size of sub(O) is linear in the
size of T [ A. An analogous exhaustive check of all roles in NR [ fU; Eg permits
to compute UpCovO(r), and DownCovO(r). Checking whether a role s is simple
in R can be done e ciently.</p>
        <p>Finally, we can decide O-membership resorting to at most jCj (one for every
subconcept and role in C) computations of the sets UpCovO(r), DownCovO(r),</p>
        <sec id="sec-2-2-1">
          <title>UpCoverO(C0) and DownCoverO(C0), where jC0j jCj.</title>
          <p>Overall, the problem of deciding whether D 2 O(C) can be simulated by
a deterministic oracle Turing machine with a polynomial number of calls to an
N2ExpTime oracle.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Repairing Ontologies</title>
      <p>Our re nement operators can be used as components of a method for repairing
inconsistent SROIQ ontologies by weakening, instead of removing, problematic
axioms. In this paper, we do not re ne the RBox, so the regularity of the role
hierarchy remains intact in weakened ontologies.</p>
      <p>
        Given an inconsistent ontology O = T [ A [ R, we proceed as described
in Algorithm 1. We rst need to nd a consistent subontology Oref of O to
serve as reference ontology to be able to compute a non-trivial upcover and
downcover. One approach is to pick a random maximally consistent subset of O,
FindMaximallyConsistentSet(O), and choose it as reference ontology Oref; another
is to choose the intersection of all maximally consistent subsets of O (e.g., [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]).
      </p>
      <p>Once a reference ontology Oref has been chosen, and as long as O is
inconsistent, we select a \bad axiom" FindBadAxiom(O) (in T [ A) and replace it
with a random weakening of it with respect to Oref. We can randomly samples a
number of (or all the) minimally inconsistent subsets of axioms I1; I2; : : : Ik O
and return one axiom in T [ A from the ones occurring the most often.</p>
      <p>The set of all weakenings of an axiom with respect to a reference ontology is
de ned as follows:
De nition 7 (Axiom weakening). Let O = T [ A [ R be a SROIQ ontology
and be an axiom in T [ A. The set of (least) weakenings of is the set gO( ),
such that:
{ gO(C v D) = fC0 v D j C0 2 O(C)g [ fC v D0 j D0 2 O(D)g;
{ gO(C(a)) = fC0(a) j C0 2 O(C)g;
{ gO(R(a; b)) = fR0(a; b) j R0 2 O(R)g;
{ gO(:R(a; b)) = f:R0(a; b) j R0 2 O(R)g;
{ gO(a = b) = fa = b; ? v &gt;g;
{ gO(a 6= b) = fa 6= b; ? v &gt;g.</p>
      <p>The subprocedure WeakenAxiom( ; Oref) randomly returns one axiom in gOref ( ).
For every subsumption or assertional axiom , the axioms in the set gOref ( ) are
indeed weaker than , in the sense that { given the reference ontology Oref {
entails them (and the opposite is not guaranteed).</p>
      <p>Lemma 3. For every subsumption or assertional axiom
j=O 0.
, if 0 2 gO( ), then
Proof. Suppose C0 v D0 2 gO(C v D). Then, by de nition of gO and Lemma 1.1,
C0 v C and D v D0 are inferred from O. Thus, by transitivity of subsumption,
we obtain that C v D j=O C0 v D0. For the weakening of assertions, the result
follows immediately from Lemma 1.1 again.
tu</p>
      <p>Clearly, substituting an axiom with one axiom from gO( ) cannot diminish
the set of interpretations of an ontology: if I is an interpretation that satis es
the axioms of ontology before such a replacement, I satis es the same axioms
even after it. By Lemma 1.4, any subsumption axiom is a nite number of</p>
      <sec id="sec-3-1">
        <title>Algorithm 1 RepairOntologyWeaken(O)</title>
        <p>Oref FindMaximallyConsistentSet(O)
while O is inconsistent do
bad FindBadAxiom(O)
weaker WeakenAxiom( bad, Oref)</p>
        <p>O O n f badg [ f weakerg
end while</p>
        <p>Return O
weakenings away from the trivial axiom ? v &gt;. This holds also for equality and
inequality ABox axioms. Any assertional axiom C(a) is also a nite number of
generalisations away from the trivial assertion &gt;(a). Similarly, every assertional
axioms R(a; b) and :R(a; b) are a nite number of generalisations away from the
trivial assertions U (a; b) and :E(a; b), respectively.</p>
        <p>Example 2. Consider the ontology O containing the inconsistent set of axioms
1-4 in the introduction. Suppose that FindBadAxiom(O) returns axiom 3 as the
most problematic one. According to our de nitions, a possible weakening of the
axiom returned by WeakenAxiom(3; Oref) may be MarriedPerson v Person u
2 married :Person u 1 married :Person. Replacing axiom 3 with its weakening,
the resulting ontology is consistent.</p>
        <p>Example 3. Imagine that the RBox of both our reference ontology Oref and the
ontology O contains the following axioms: parent of v ancestor of ; father of v
parent of ; mother of v parent of ; parent of parent of v grandparent;
disjoint(parent of ; grandparent); parent of child of :
And imagine that O includes also the following statements, which cause
inconsistency: father of (bob; mary) (1); mother of (mary; alice) (2); child of (alice; bob) (3)
A possible resolution of the inconsistency could be the weakening of axiom (3):
WeakenAxiom((3); Oref) : ancestor of (alice; bob).
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Iterated re nements and termination</title>
      <p>
        As noted by Lemma 1.5 the set of \one-step" re nements of a concept is always
nite. Moreover, Lemma 1.4 indicates that every concept can be re ned in a
nite number of iterations to &gt; (or ?). Nonetheless, an iterated application of
the re nement operator can lead to cases of non-termination. For instance, given
an ontology de ned as O = fA v 9r:Ag, if we generalise the concept A wrt. O
it is easy to see that we can obtain an in nite chain of generalisations that never
reaches &gt;, i.e., A vO 9r:A vO 9r:9r:A : : : For practical reasons this may need
to be avoided, or mitigated. Running into this non-termination `problem' is not
new in the DL literature. In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], the problem occurs in the context of nding a
least common subsumer of DL concepts. Di erent solutions have been proposed
to avoid this situation. Typically, some assumptions are made over the structure
of the TBox, or a xed role depth of concepts is considered. In the latter view, it
is possible to restrict the number of nested quanti ers in a concept description to
a xed constant k, to forbid generalisations/specialisations already picked along
a chain from being picked again, and to introduce the de nition of role depth
of a concept to prevent in nite re nements. If this role depth upper bound is
reached in the re nement of a concept, then &gt; and ? are taken as generalisation
and specialisation of the given concept respectively.
      </p>
      <p>Another possibility is to abandon certain termination and adopt almost-sure
termination, that is, termination with probability 1. The idea is to associate
probabilities to the re nement `branches' available at each re nement step.</p>
      <p>In what follows we will show that, indeed, if we start from any concept
C and choose uniformly at random a generalisation out of its set of possible
generalisations (or a re nement out of its set of re nements: the proofs are
entirely symmetrical) we will almost surely reach &gt; (?) within a nite number
of steps. This implies at once that an axiom will almost surely not be inde nitely
weakened by our procedure, and that Algorithm 1 will almost surely terminate.</p>
      <p>The key ingredient of the proof is Lemma 4, which establishes an
upperbound on the rate of growth of the set of possible generalisations (re nements)
along a chain.</p>
      <p>De nition 8. Let O be a SROIQ ontology and let C 2 sub(O). Then let
F (C) = j O(C)j be the number of generalisations of C, let F 0(C) = j O(C)j
be the number of specialisations of C and let G(C) = max(fjC0j j C0 2 O(C) [</p>
      <p>O(C)g) be the maximum size of any generalisation or specialisation of C.
By setting an upper bound to the size of (C) and (C), part 1 of the following
lemma may in particular be seen as a quantitative version of Lemma 1.5.
Lemma 4. Let O be a SROIQ ontology and let C be any concept (not
necessarily in sub(O)). Furthermore, let k = j sub(O)j + 2jNRj + 2 and q =
max(fjCj; jnnf(:C)j j C 2 sub(Og). Then
1. F (C); F 0(C) 3kjCj;
2. G(C) jCj + q.</p>
      <p>Proof. The full proof via structural induction is lengthy but presents no
particular di culties. The intuition behind it is the following: by our de nitions, in a
generalisation/specialisation step we essentially select a single subcomponent C0
(or r) of the current expression C and we replace it with some element of sub(O)
(or of NR [NR ). But these two sets are nite, and the number of subcomponents
of an expression C increases linearly with the size of C. Thus, the number of
possible generalisations/specialisations of C increases linearly with the size of
C, and every generalisation/specialisation step increases the size of the resulting
expression by some at most constant amount.
tu
We can now prove our required result by showing that, even though the size of
the concept expression { and, therefore, the number of possible generalizations
{ grows with every generalization step, it grows slowly enough that the
generalization chain will almost surely eventually pick an element in the upcover of the
current concept which is strictly more general than it. Thus, &gt; will be almost
surely reached in a nite number of steps.</p>
      <p>Theorem 2. Let O be a SROIQ ontology, let C be any SROIQ concept, and
let (Ci)i2N be a sequence of concepts such that C0 = C and each Ci+1 is chosen
randomly in O(Ci) according to the uniform distribution.</p>
      <p>Then, with probability 1, there exists some i 2 N such that Ci = &gt;.
Proof. Let us rst prove that, if C 6 O &gt;, there is almost surely some Ci in the
chain such that Ci O &gt; (and, therefore, such that Ci0 O &gt; for all i0 &gt; i).</p>
      <p>By the previous lemma, we know that O(Ci) contains at most 3kjCij
concepts. Furthermore, for every concept Ci such that Ci 6 O &gt; there exists at least
one C0 2 UpCovO(Ci) O(Ci) such that C @O C0 (c.f., Lemma 1.2): therefore,
the probability that the successor of Ci will be some Ci+1 2 UpCovO(Ci) such
that Ci @O Ci+1 is at least 1=(3kjCij). Now let jC0j = N : since Ci+1 2 O(Ci),
we then have that jCij qi + N . Therefore, the probability that at step i we
do not select randomly an element of UpCovO(Ci) that is strictly more general
than Ci will be at most 3k3(kq(iq+i+NN) ) 1 = i+i +`` for ` = N=q and = 1=(3kq).
But then the probability that we never select a strictly more general element
from the upcover will be at most Qi1=0 i+i +`` = 0,3 and thus our generalisation
sequence C = C0 vO C1 vO C2 : : : will almost surely contain some Ci such
that Ci+1 2 UpCovO(Ci) sub(O) and C vO Ci @O Ci+1. By the same
argument, the generalisation sequence starting from Ci+1 will almost surely
eventually reach some Cj+1 2 sub(O) with C @O Ci+1 @O Cj+1, and so forth; and by
applying this line of reasoning j sub(O)j times, we will almost surely eventually
reach some concept D O &gt;, as required.</p>
      <p>Now let us consider a generalisation chain D = D0 vO D1 vO D2 : : :, where
as before every Di+1 is chosen randomly among (D), starting from some concept
D O &gt;. Now, since D O &gt; and D vO Di for all i, &gt; 2 UpCovO(Di) O(Di)
for all i (c.f., Lemma 1.3). Thus, at every iteration step i we have a probability of
at least 1=j (Di)j that Di+1 = &gt;; and if we let N 0 = jDj, by the previous results
we obtain at once that j (Di)j iq + N 0, and hence that the probability that we
do not end up generalising Di to &gt; is at most (3k(iq + N 0) 1)=(3k(iq + N 0)),
and nally that the probability that we never reach &gt; is Qi1=0 3k3(ki(qi+q+NN0)0) 1 =
Q1 i+`0 0 = 0 where `0 = N 0=q and 0 = 1=3kq.</p>
      <p>i=0 i+`0
tu</p>
      <p>Note that, by our de nitions, &gt; can be further generalized to all elements
of its upcover (that is, all concepts of sub(O) which are equivalent to &gt; with
respect to O), and similarly ? can be further specialized to other concepts in
its downcover. If this behaviour is unwanted, it is easy to force the upcover of &gt;
to contain only &gt;, and likewise for ?; but regardless of this, our results imply
3 One way to verify this is to observe that the series Pi1=0(log(i + ` ) log(i + `))
diverges to minus in nity. This in turn may be veri ed by noting that Pi1=0(log(i +
` ) log(i + `)) Pi1=0(log(i + d`e ) log(i + d`e)) = Pi1=d`e(log(i )
log(i)), because log(i + ` ) log(i + `) log(i + d`e ) log(i + d`e), and then
showing that Pi1=d`e(log(i ) log(i)) = Pi1=d`e log(i) log(i ) diverges to plus
in nity by means of the integral method: the terms of the series are all positive, and
RdU`e log(x) log(x )dx goes to in nity when U goes to in nity. Since the integral
diverges, so does the series, which gives us our conclusion.
at once that every axiom will almost surely be weakened into &gt; v ? in a nite
number of weakening steps.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Outlook</title>
      <p>
        We presented a set of re nement operators covering most aspects of the full
SROIQ language. Further additions to the general rules of re nements may
be studied, e.g. those governing re nements of roles that can be obtained by
considering complex roles in the up and down covers. Re nement operators have
so far been implemented for the ALC fragment. This implementation will need
to be extended to deal with the SROIQ re nement operators presented here.
As done in [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] for ALC ontologies, this will allow us to run experiments to
evaluate the usefulness of SROIQ ontology ne repairs via axiom weakening.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>An Introduction to Description Logic</article-title>
          . Cambridge University Press (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kriegel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nuradiansyah</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , Pen~aloza, R.:
          <article-title>Making repairs in description logics more gentle</article-title>
          .
          <source>In: Principles of Knowledge Representation and Reasoning: Proceedings of the Sixteenth International Conference, KR</source>
          <year>2018</year>
          , Tempe, Arizona,
          <volume>30</volume>
          <fpage>October</fpage>
          - 2
          <source>November</source>
          <year>2018</year>
          . pp.
          <volume>319</volume>
          {
          <issue>328</issue>
          (
          <year>2018</year>
          ), https://aaai.org/ ocs/index.php/KR/KR18/paper/view/18056
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , Kusters, R.:
          <source>Nonstandard Inferences in Description Logics: The Story So Far</source>
          , pp.
          <volume>1</volume>
          {
          <fpage>75</fpage>
          . Springer New York, New York, NY (
          <year>2006</year>
          ), https://doi.org/ 10.1007/0-387-31072-X_
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , Pen~aloza, R.,
          <string-name>
            <surname>Suntisrivaraporn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Pinpointing in the description logic EL+</article-title>
          .
          <source>In: Proc. of KI 2007. LNCS</source>
          , vol.
          <volume>4667</volume>
          , pp.
          <volume>52</volume>
          {
          <fpage>67</fpage>
          . Springer (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Badea</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , Nienhuys-Cheng, S.:
          <article-title>A re nement operator for description logics</article-title>
          . In: Cussens,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Frisch</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.M.</surname>
          </string-name>
          <article-title>(eds.) Inductive Logic Programming</article-title>
          , 10th International Conference,
          <string-name>
            <surname>ILP</surname>
          </string-name>
          <year>2000</year>
          , London, UK,
          <source>July 24-27</source>
          ,
          <year>2000</year>
          ,
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <year>1866</year>
          , pp.
          <volume>40</volume>
          {
          <fpage>59</fpage>
          . Springer (
          <year>2000</year>
          ), https://doi.org/10. 1007/3-540-44960-4\_
          <fpage>3</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Blockeel</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramon</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shavlik</surname>
            ,
            <given-names>J.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tadepalli</surname>
          </string-name>
          , P. (eds.):
          <article-title>Inductive Logic Programming</article-title>
          , 17th International Conference, ILP 2007,
          <article-title>Corvallis</article-title>
          ,
          <string-name>
            <surname>OR</surname>
          </string-name>
          , USA, June 19-21,
          <year>2007</year>
          ,
          <source>Revised Selected Papers, Lecture Notes in Computer Science</source>
          , vol.
          <volume>4894</volume>
          . Springer (
          <year>2008</year>
          ), https://doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -78469-2
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Confalonieri</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eppe</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schorlemmer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          , Pen~aloza, R.,
          <string-name>
            <surname>Plaza</surname>
          </string-name>
          , E.:
          <article-title>Upward Re nement Operators for Conceptual Blending in the Description Logic EL++</article-title>
          .
          <source>Annals of Mathematics and Arti cial Intelligence</source>
          <volume>82</volume>
          (
          <issue>1- 3</issue>
          ),
          <volume>69</volume>
          {
          <fpage>99</fpage>
          (
          <year>2018</year>
          ), https://www.sciencedirect.com/science/article/abs/pii/ S0952197615002006
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Du</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fu</surname>
            ,
            <given-names>X.:</given-names>
          </string-name>
          <article-title>A practical ne-grained approach to resolving incoherent owl 2 dl terminologies</article-title>
          .
          <source>In: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management</source>
          . pp.
          <volume>919</volume>
          {
          <issue>928</issue>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>The even more irresistible SROIQ</article-title>
          . In: Doherty,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Mylopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Welty</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.A</surname>
          </string-name>
          . (eds.)
          <source>Proceedings, Tenth International Conference on Principles of Knowledge Representation and Reasoning</source>
          ,
          <source>Lake District of the United Kingdom, June 2-5</source>
          ,
          <year>2006</year>
          . pp.
          <volume>57</volume>
          {
          <fpage>67</fpage>
          . AAAI Press (
          <year>2006</year>
          ), http://www. aaai.org/Library/KR/2006/kr06-
          <fpage>009</fpage>
          .php
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Kalyanpur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grau</surname>
            ,
            <given-names>B.C.</given-names>
          </string-name>
          :
          <article-title>Repairing unsatis able concepts in OWL ontologies</article-title>
          .
          <source>In: ESWC</source>
          . vol.
          <volume>6</volume>
          , pp.
          <volume>170</volume>
          {
          <fpage>184</fpage>
          . Springer (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Kalyanpur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendler</surname>
          </string-name>
          , J.:
          <article-title>Debugging unsatis able classes in OWL ontologies</article-title>
          .
          <source>Web Semantics: Science, Services and Agents on the World Wide Web</source>
          <volume>3</volume>
          (
          <issue>4</issue>
          ),
          <volume>268</volume>
          {
          <fpage>293</fpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Kazakov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>RIQ and SROIQ are harder than SHOIQ</article-title>
          .
          <source>In: Principles of Knowledge Representation and Reasoning: Proceedings of the Eleventh International Conference, KR</source>
          <year>2008</year>
          , Sydney, Australia,
          <source>September 16-19</source>
          ,
          <year>2008</year>
          . pp.
          <volume>274</volume>
          {
          <issue>284</issue>
          (
          <year>2008</year>
          ), http://www.aaai.org/Library/KR/2008/kr08-
          <fpage>027</fpage>
          .php
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>van der Laag</surname>
            ,
            <given-names>P.R.</given-names>
          </string-name>
          , Nienhuys-Cheng, S.H.:
          <article-title>Completeness and properness of re nement operators in inductive logic programming</article-title>
          .
          <source>The Journal of Logic Programming</source>
          <volume>34</volume>
          (
          <issue>3</issue>
          ),
          <volume>201</volume>
          {
          <fpage>225</fpage>
          (
          <year>1998</year>
          ), http://www.sciencedirect.com/science/article/pii/ S0743106697000770
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hitzler</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Foundations of re nement operators for description logics</article-title>
          .
          <source>In: Blockeel et al. [6]</source>
          , pp.
          <volume>161</volume>
          {
          <issue>174</issue>
          , https://doi.org/10.1007/ 978-3-
          <fpage>540</fpage>
          -78469-2\_
          <fpage>18</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hitzler</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A re nement operator based learning algorithm for the ALC description logic</article-title>
          .
          <source>In: Blockeel et al. [6]</source>
          , pp.
          <volume>147</volume>
          {
          <issue>160</issue>
          , https://doi.org/10. 1007/978-3-
          <fpage>540</fpage>
          -78469-2\_
          <fpage>17</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hitzler</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Concept learning in description logics using re nement operators</article-title>
          .
          <source>Machine Learning</source>
          <volume>78</volume>
          (
          <issue>1-2</issue>
          ),
          <volume>203</volume>
          {
          <fpage>250</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruzzi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savo</surname>
            ,
            <given-names>D.F.</given-names>
          </string-name>
          :
          <article-title>Inconsistency-tolerant semantics for description logics</article-title>
          .
          <source>In: Proc. of RR 2010. LNCS</source>
          , vol.
          <volume>6333</volume>
          , pp.
          <volume>103</volume>
          {
          <fpage>117</fpage>
          . Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Porello</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Troquard</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , Pen~aloza, R.,
          <string-name>
            <surname>Confalonieri</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galliani</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Two Approaches to Ontology Aggregation Based on Axiom Weakening</article-title>
          . In: Lang,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (ed.)
          <source>Proceedings of the Twenty-Seventh International Joint Conference on Arti - cial Intelligence</source>
          ,
          <source>IJCAI 2018, July 13-19</source>
          ,
          <year>2018</year>
          , Stockholm, Sweden. pp.
          <year>1942</year>
          {
          <year>1948</year>
          . ijcai.
          <source>org</source>
          (
          <year>2018</year>
          ), https://doi.org/10.24963/ijcai.
          <year>2018</year>
          /268
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Schlobach</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cornet</surname>
          </string-name>
          , R.:
          <article-title>Non-standard reasoning services for the debugging of description logic terminologies</article-title>
          .
          <source>In: Proc. of IJCAI-03</source>
          . pp.
          <volume>355</volume>
          {
          <fpage>362</fpage>
          . Morgan Kaufmann (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Troquard</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Confalonieri</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galliani</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , Pen~aloza, R.,
          <string-name>
            <surname>Porello</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Repairing Ontologies via Axiom Weakening</article-title>
          . In: McIlraith,
          <string-name>
            <given-names>S.A.</given-names>
            ,
            <surname>Weinberger</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.Q</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the Thirty-Second AAAI Conference on Arti cial Intelligence</source>
          ,
          <source>(AAAI-18)</source>
          , New Orleans, Louisiana, USA, February 2-
          <issue>7</issue>
          ,
          <year>2018</year>
          . pp.
          <year>1981</year>
          {
          <year>1988</year>
          . AAAI Press (
          <year>2018</year>
          ), https://www.aaai.org/ocs/index.php/AAAI/AAAI18/ paper/view/17189
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>