<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Connection Method for a Defeasible Extension of ALC</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Centro de Informatica</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Universidade Federal de Pernambuco</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Brazil</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>fredg@cin.ufpe.br</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Univ. Artois</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>France</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Computer Science Division</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stellenbosch University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>South Africa</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Italy varzinczak@cril.fr</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>In this paper, we propose a connection method a la Bibel for an exception-tolerant extension of ALC. As for the language, we assume ALC extended with a typicality operator on concepts, which is a variant of defeasible DLs studied in the literature over the past decade and in which most of these can be embedded. We revisit the de nition of matrix representation of a knowledge base and establish the conditions for a given axiom to be provable from it. In particular, we show how term substitution is dealt with and de ne a suitable condition of blocking in the presence of typicality operators. We show that the calculus terminates and that it is sound and complete w.r.t. a DL version of the preferential semantics widely adopted in non-monotonic reasoning.</p>
      </abstract>
      <kwd-group>
        <kwd>Description logic</kwd>
        <kwd>defeasible reasoning</kwd>
        <kwd>connection method</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The problem of modelling exceptions in ontologies and reasoning meaningfully in
their presence has received a great deal of attention over the past decade. Among
the emblematic approaches put forward in the literature feature Giordano et al.'s
description logics of typicality [
        <xref ref-type="bibr" rid="ref24 ref25 ref28">24,25,28</xref>
        ], Britz et al.'s defeasible subsumption
relations [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">9,10,8</xref>
        ], Bonatti et al.'s light-weight DLs of normality [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">5,4,6</xref>
        ], besides
Casini and Straccia's seminal work on the computational counterpart of
nonmonotonic entailment in DLs [
        <xref ref-type="bibr" rid="ref18 ref19">18,19</xref>
        ] and its implementation [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. These
investigations have given rise to a whole family of defeasible description logics of
varying expressive power and with the ability to handle exceptions at both the
modelling and reasoning levels in a number of ways [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref16 ref20 ref3 ref30">3,11,12,13,16,20,30</xref>
        ].
      </p>
      <p>One of the interesting features of some of the aforementioned approaches
is the fact that, depending on the underlying DL that is assumed and given
Copyright © 2021 for this paper by its authors. Use permitted under Creative
Commons License Attribution 4.0 International (CC BY 4.0).
certain conditions on how exceptionality (or typicality) is expressed, the kind
of non-monotonic reasoning that is performed can be reduced to (a polynomial
number of calls to) classical entailment check. Therefore, the study of automated
deduction for the various avours of defeasible DLs, as well as its potential
reduction to classical reasoning, remains a relevant research topic in the area.</p>
      <p>
        The development of proof methods for defeasible description logics has, in
a sense, followed on the footsteps of those for classical DLs. As a result, the
majority of existing decision procedures for reasoning with defeasible ontologies
are based on semantic tableaux [
        <xref ref-type="bibr" rid="ref12 ref14 ref25 ref27 ref31">12,14,25,27,31</xref>
        ]. Notwithstanding the commonly
extolled virtues of tableau systems, there are equally viable alternatives in the
literature on automated theorem proving (ATP). One prominent example is the
connection method (CM), de ned by Bibel in the late '70s [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], which earned
good reputation in the eld of ATP in the '80s and '90s and has enjoyed a recent
revival in the context of (classical) modal and description logics [
        <xref ref-type="bibr" rid="ref21 ref22">21,22</xref>
        ].
      </p>
      <p>
        The connection method consists in a direct proof procedure of which the
main internal structure is a matrix representation of the knowledge base and
associated query. It was designed having as a guideline a more parsimonious usage
of memory during proof search. Indeed, contrary to tableaux and resolution, the
connection method does not create intermediate clauses or sentences along the
way, keeping its search space con ned to the boundaries of the matrix it started
o with. The rst connection calculus for description logics, ALC -CM, has been
proposed by Freitas and Otten [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. It incorporates several features of most DL
proof systems such as blocking, absence of variables, uni cation and Skolem
functions. Moreover, a C++ implementation of the calculus, Raccoon [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ], has
been developed.5 Worthy of mention is the fact that, in spite of not incorporating
any of the optimisations commonly done for DL tableaux systems, Raccoon
performed competitively when reasoning over ALC ontologies in comparison to
cutting-edge highly-optimised tableau-based reasoners which had ranked high in
past competitions of DL reasoners (see https://goo.gl/V9Ewkv for details).
      </p>
      <p>The present paper aims to make the rst steps in the design of connection
methods for reasoning over defeasible ontologies. In particular, we aim at
providing a concrete calculus for a version of defeasible DL frequently considered in
the literature that can be used to endow Raccoon with basic non-monotonic
reasoning features. We hope our constructions will serve as a springboard for the
development of the connection method in defeasible DLs of varying expressive
power and further extensions of Raccoon.</p>
      <p>In this paper, we shall assume the reader's familiarity with the di erent DL
families, in particular with ALC. The remaining of the text is structured as
follows: in Section 2, we present the defeasible extension of ALC we build on
in this work; Section 3 is the heart of the paper and introduces our connection
method for reasoning with defeasible ontologies, of which the inner workings
are illustrated with a worked-out example in Section 4; Section 5 concludes the
paper with a discussion and possible directions for further investigation.
5 https://github.com/dmfilho/raccoon</p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries: The Defeasible Description Logic ALC</title>
      <p>
        The defeasible DL ALCH [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] is an extension of ALCH with typicality
operators on both complex concepts and role names. Intuitively, a concept
expression of the form C denotes the most typical (alias normal) objects in the
class C, whereas a role expression of the form r, with r an atomic role,
denotes the most typical instances of the relationship represented by r. To give
a glimpse of ALCH 's expressive power, the TBox axioms Muggle v :Wizard,
HalfBloodWizard v 9casts:Spellu: Wizard, and Wizard v 9 attachedWith:Wand
specify, respectively, that \typical muggles are not wizards", \half-blood wizards
cast spells but are not typical wizards", and \typical wizards have a typical
attachment with a wand". The RBox axiom masterOf v attachedWith states that
\to be a master of (a wand) means to be typically attached with (that wand)".
Furthermore, the ABox assertion : attachedWith(lordVoldemort; elderWand)
formalises the intuition that lordVoldemort is not typically attached with elderWand.
      </p>
      <p>
        In this paper, we shall nevertheless focus on the fragment ALC of ALCH
without role hierarchies and allowing for typicality of concepts, only. The reason
for this choice is three-fold: rst, it simpli es many of the technical de nitions
and results to be presented below; second, the fragment we here consider is
strongly related to the defeasible DL ALC + T of Giordano et al. [
        <xref ref-type="bibr" rid="ref24 ref25 ref28">24,25,28</xref>
        ] and
to the extension of ALC with defeasible subsumption by Britz et al. [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8,9,10</xref>
        ],
which have become, in a sense, the prototypical defeasible DLs in the recent
literature, and third, the de nition of a proof method for this fragment not based
on semantic tableaux is a problem that is interesting in its own right. (Needless
to say, the work we report on here can naturally serve as a springboard for the
de nition of connection methods for more expressive defeasible DLs.)
      </p>
      <p>The ( nite) sets of concept, role and individual names are denoted,
respectively, with C, R, and I. With A; B; : : : we denote atomic concepts, with r; s; : : :
role names, and with a; b; : : : individual names. Complex concepts of ALC are
denoted with C; D; : : : and are built according to the following grammar:
C ::= C j &gt; j ? j :C j C u C j C t C j 8R:C j 9R:C j C
(1)</p>
      <p>The de nitions of axiom, GCI, assertion, TBox and ABox are as in the
classical ALC case. If T and A are, respectively, a TBox and an ABox, with K = (T ; A)
we denote henceforth a knowledge base (alias ontology).</p>
      <p>Example 1 (Wizarding World Scenario). Assume we are interested in modeling
facts about the wizarding world and its wonderful features. We have the atomic
concepts C = fMuggle; Wizard; Spellg representing, respectively, the class of
muggles, wizards, and spells. As for the set of atomic roles, we have the singleton
R = fcastsg, representing a cast of a spell (done by a wizard). The set of
individuals I is fhermione; oculusReparog. Below we have an example of an ALC
knowledge base K = (T ; A) for the wizarding world scenario.</p>
      <p>The semantics of ALC extends that of classical ALC and is in terms of
partially-ordered structures called ordered interpretations. Before introducing
these, we recall a few notions.</p>
      <p>A binary relation is a strict partial order if it is irre exive and transitive. If &lt;
is a strict partial order on a given set X, with min&lt; X =def fx 2 X j there is no
y 2 X s.t. y &lt; xg we denote the minimal elements of X w.r.t. &lt;. A strict partial
order on a set X is well-founded if for every ; 6= X0 X, we have min&lt; X0 6= ;.
De nition 1 (Ordered interpretation). An ALC ordered interpretation
is a tuple O =def h O; O; &lt;Oi s.t. h O; Oi is a classical ALC interpretation, &lt;O
O O is a well-founded strict partial order.</p>
      <p>Given O = h O; O; &lt;Oi, the intuition of O and O is the same as in a
standard ALC interpretation. The intuition underlying the ordering &lt;O is that
it plays the role of a preference relation (or normality ordering): the objects
that are lower down in the ordering &lt;O are deemed more normal (or typical)
than those higher up in &lt;O. Within the context of (the interpretation of) a
concept C, &lt;O therefore allows us to single out the most normal representatives
falling under C, which is the intuition of the semantics of concepts of the form C:
De nition 2 (Semantics). An ordered interpretation O = h O; O; &lt;Oi
interprets the classical constructors in the usual way. Typicality-based concepts are
interpreted as ( C)O =def min&lt;O CO.</p>
      <p>Hence, to be a typical element of a concept amounts to being one of the most
preferred elements in the interpretation of that concept.</p>
      <p>The de nition of satisfaction of a statement by an ordered interpretation O,
denoted as O , carries over from the classical case. If X is a set of statements,
with O X we denote the fact O satis es each statement in X, in which case
we say O is a model of X. We say O is a model of a knowledge base K = (T ; A),
denoted O K, if O is a model of both T and A.</p>
      <p>Given a knowledge base K and a statement , we say that K preferentially
entails , denoted K j= , if, for every O such that O K, we have O .
3</p>
    </sec>
    <sec id="sec-3">
      <title>The Connection Method for ALC</title>
      <p>
        The connection method (CM) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] consists in a validity procedure (in opposition
to refutation procedures such as tableaux and resolution), i.e., it tries to prove
whether a formula (query) is valid directly. If X = f'1; : : : ; 'ng is a ( nite) set
of rst-order formulae, then in order to check whether X j= , for some
rstorder formula , the validity of the formula ('1 ^ : : : ^ 'n) ! (X ! ), i.e.,
of :X _ , must be proven. Hence, CM requires the conversion of formulae into
the disjunctive normal form (DNF). Of course, when moving to the DL case,
the crux of the matter is precisely how to express the negation of the knowledge
base, along with doing away with variables and Skolem functions.
      </p>
      <p>
        ALC -CM [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] was the rst CM proposed for DLs. Among its main features
is the fact it requires neither variables in the initial representation of the axioms
nor Skolem functions. Moreover, it includes a blocking solution to ensure
termination, as commonly done in the eld, and the de nition of -substitution as a
suitable replacement for variable uni cation.
      </p>
      <p>In this section, we introduce a connection method for ALC , which we
henceforth call ALC -CM. It inherits the ALC -CM blocking, and deals with
typicality by building an auxiliary structure which stands for the preference relation.
3.1</p>
      <p>Matrix Representation
The connection method requires formulae to be represented as matrices,
composed of clauses, which are conjunctions of literals, possibly negated. To better
handle concepts built using the typicality operator , we introduce below a
typicality normal form (TNF).</p>
      <p>De nition 3 (Pure disjunction and pure conjunction). A pure
disjunction (D) and a pure conjunction (E^) are recursively de ned as follows:
D ::= C j :C j D t D j 8R:C</p>
      <p>E^ ::= C j :C j E u E^ j 9R:C
^</p>
      <p>
        Pure disjunctions/conjunctions save memory and simplify proofs, see [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
De nition 4 (Typicality normal form). Let E^ be a pure conjunction, D be
a pure disjunction, r be a role name, A and B be atomic concepts, and a and b
be individual names. A TBox axiom is in typicality normal form (TNF) if it
is in one of the forms below:
1. E^ v D;
2. A v 9r:B;
3. 8r:A v B;
4. A v B;
5. A v : B;
6. : A v B;
7.
      </p>
      <p>A v B.</p>
      <p>An ABox axiom is in TNF if it is in one of the forms: (i) A(a), (ii) :A(a),
(iii) r(a; b), or :r(a; b). A knowledge base (KB) is in TNF if all its axioms are
in TNF. A query is in TNF if the queried axiom and the KB are in TNF.</p>
      <p>The TNF allows us to deal only with axioms in speci c forms so that our
matrix representation is simple and straightforward. An example of this
simplicity is the restriction on concept assertions: only assertions with atomic concepts
are allowed. Whether typical concept assertions or other assertions with complex
concepts are present in the ABox, these assertions can be rewritten and these
concepts relocated to the TBox as a subsumption axiom.</p>
      <p>Proposition 1. Let K be an ALC knowledge base. There exists an ALC
knowledge base K0 in TNF such that if O is a model of K0, then O for all 2 K.</p>
      <p>
        Since the method is designed to check for the validity of a knowledge base
(or query), we represent it as a `disjunction set'. This set contains the original
axioms negated, although DLs do not allow for the negation of axioms to be
expressed. One way to solve this problem is to represent the knowledge base as
a single set, instantiating the TBox axioms, so that the TBox can be dropped.
This process is similar to the unfolding technique done by Baader et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]; here
we chose to keep variables in order to avoid unnecessarily long matrices.
De nition 5 (Negation of a knowledge base). If K = (T ; A) is a knowledge
base, its negation is the set
      </p>
      <p>def
:K=f9x(Du:E)(x) j D v E 2 T and x is a new variableg[f: j
2 Ag (2)
De nition 6 (Literal and clause). A literal has one of the forms A(x),
r(x; y), or their negations, where A is an atomic concept, r is an atomic role,
and x, y are variables or individuals. A clause is a set of literals. A &lt;-clause
is a pair C&lt; =def hC; &lt;i, where C is a clause and &lt; is an auxiliary relation on
variables or individuals.</p>
      <p>The &lt;-clauses are obtained from axioms containing a typicality operator, as
per the rules in Table 1. A clause C which is not related to a relation &lt; can be
seen as the &lt;-clause hC; ;i.</p>
      <p>De nition 7 (Matrix representation and graphical matrix). Let K be a
knowledge base and :K its negation. A &lt;-matrix M &lt; is the set of &lt;-clauses
mapped from the axioms in :K as shown in Table 1. The graphical matrix of
M &lt; displays clauses as columns; the relation &lt; (the union of the relations of all
&lt;-clauses in M &lt;) associated to the matrix is shown as a lattice next to it.
De nition 8 (Path, connection, -substitution and -complementary
connection). A path through a &lt;-matrix M &lt; is a set composed by one literal
of each clause in M &lt;. A connection is a pair of literals fE; :Eg with the
same concept or role name, but complementary to each other. A -substitution
assigns each variable with an individual or another variable. The application of
a -substitution to a literal is an application to its variables, i.e., (E(x)) =
E( (x)) and (r(x; y)) = r( (x); (y)). A -complementary connection is a
pair fE(x); :E(y)g or fr(x; v); :r(y; u)g, where (x) = (y) and (v) = (u).
The complement L of a literal L is :E, if L = E, and E, if L = :E.
De nition 9 (Set of concepts). If x is a variable or an individual, (x)=def fE 2
C j E(x) 2 Pathg is the set of concepts of x containing all concepts related
to x in a path.</p>
      <p>De nition 10 (Admissible -substitution, preference condition). Let
be a term substitution. We say is admissible if the preference condition holds.
The condition is de ned as follows: let x and y be variables or individuals in
M &lt;, and &lt; be the union of the relations of all &lt;-clauses in M &lt;. Then, the
preference condition holds after a -substitution if f(x; y),(y; x)g \ &lt;+ = ;,
with &lt;+ the transitive closure of &lt;.</p>
      <p>We now formally de ne the ALC connection calculus (ALC -CM). The novelty
here with regard to the previous classical DL-oriented calculus ALC -CM is
twofold: (i ) the introduction of a new structure, the purpose of which is to denote
a preference relation, and (ii ) the preference condition, which checks whether, in
a candidate connection, the variables involved (if any) are incomparable w.r.t.
the auxiliary ordering; in this case, the connection is allowed. By doing so, the
calculus conforms to the preferential semantics de ned in Section 2.
De nition 11 (Multiplicity). Let M &lt; be a &lt;-matrix and C&lt; be a &lt;-clause
in M &lt;. The multiplicity is a function : M &lt; ! N that assigns to each
&lt;clause in M &lt; a natural number denoting the number of copies of that clause in
the matrix. Let iC&lt; be the i-th copy of the clause C&lt;, 1 i (C&lt;). We say
that C&lt; =def f1C&lt;; ; (C&lt;) C&lt;g is the set of copies of C&lt; and</p>
      <p>M &lt; =def M &lt; [</p>
      <p>[
C&lt;2M&lt;</p>
      <p>C&lt;
is the &lt;-matrix M &lt; combined with the clause copies.</p>
      <p>De nition 12 (Blocking condition). Let (x ) be a new individual, i.e.,
(x ) 62 I. If ( (x )) ( (x 1)), then (x ) is blocked.</p>
      <p>De nition 13 (ALC -CM calculus). Let M &lt; be a &lt;-matrix and let 2 M
be a &lt;-clause (or the query &lt;-clause). The rules of the ALC connection calculus
(ALC -CM) are as in Figure 1.</p>
      <p>
        The rules in Figure 1 are applied in an analytical, bottom-up way and the
basic structure is the tuple hC; M &lt;; Pathi, where clause C is the open
subgoal, M &lt; is the &lt;-matrix, and Path is the active path. When the Copy rule is
applied, it has to be followed by the Extension or the Reduction rule. (Freitas
and Varzinczak [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] give examples of copying and blocking and we shall not do
so here.)
De nition 14 (Matrix validity). Let K be a knowledge base and M &lt; the
&lt;-matrix of the negation of K. We say that M &lt; is valid if K j= ?.
Theorem 1 (Matrix characterization). A &lt;-matrix M &lt; is valid i there
exists a multiplicity , an admissible -substitution and a set of connections
S such that every path through M &lt; contains a -complementary connection
f (L1); (L2)g 2 S.
      </p>
      <p>The tuple h ; ; Si, where , , and S are as referred to in Theorem 1, is
called an ordered matrix proof.</p>
      <p>De nition 15 (Preferential connection proof ). Let hC; M &lt;; Pathi be a
connection calculus tuple. A preferential connection proof for this tuple</p>
      <sec id="sec-3-1">
        <title>Start Rule (St)</title>
      </sec>
      <sec id="sec-3-2">
        <title>Reduction Rule (Red)</title>
      </sec>
      <sec id="sec-3-3">
        <title>Axiom (Ax)</title>
        <p>fg; M &lt;; Path
C1; M &lt;
; M &lt;;; fg ; with C1 2 fC j hC; &lt;0i 2 g</p>
        <p>C; M &lt;; Path [ fL2g
C [ fL1g; M &lt;; Path [ fL2g
; with (L1) = (L2)
Extension Rule (Ext) C1 n fL2g; M &lt;; Path [ fL1g</p>
        <p>C [ fL1g; M &lt;; Path</p>
        <p>C; M &lt;; Path</p>
        <p>;
with (L1) = (L2)
Copy Rule (Cop) C0 [ fL1g; M &lt; [ fC2&lt;00 g; Path</p>
        <p>C [ fL1g; M &lt;; Path
;
where C2&lt;00 is a copy of C1&lt;0 ; L2 2 C2&lt;00 ; (L1) = (L2); and the blocking condition holds
Fig. 1. The ALC
-CM calculus.
(also said the preferential connection proof for the &lt;-matrix M &lt;) is the
application of the rules of the calculus to the initial tuple h ; M &lt;; i (i.e., with C
and Path initially empty), using an admissible -substitution s.t. all leaves are
axioms (Ax).</p>
        <p>Theorem 2 (Termination). Let M &lt; be a &lt;-matrix. Every sequence of rule
applications starting with the tuple h ; M &lt;; i terminates.</p>
        <p>Theorem 3 (Soundness). If there exists a preferential connection proof for
h ; M &lt;; i with an admissible -substitution, then there is a multiplicity s.t.
every path through M &lt; contains a -complementary connection.</p>
        <p>Theorem 4 (Completeness). If every path through M &lt; contains a
-complementary connection, then there is a preferential connection proof for h ; M &lt;; i.
4</p>
        <sec id="sec-3-3-1">
          <title>Example of Proof</title>
          <p>In Example 1, assume we want to know whether Hermione is a Muggle, but not
a typical one. We can express this query as (Muggle u : Muggle)(hermione).</p>
          <p>Let us transform the query into TNF. As it is a concept assertion, it is
replaced by N1(hermione), adding Muggle u : Muggle v N1 in the knowledge
base. Next, we rewrite this new axiom, based on the fact that A u N v C; B v N
is a satis ability-preserving rewriting of AuB v C. We end up with the following
knowledge base:</p>
          <p>T =
&gt;8 Muggle v :Wizard; &gt;9
&gt;&lt;9casts:Spell v Wizard;=&gt;
&gt;:&gt; M:ugMgleugugNle2vvNN21; &gt;;&gt;</p>
          <p>A =
8
&lt;</p>
          <p>Muggle(hermione);</p>
          <p>Spell(oculusReparo);
:casts(hermione; oculusReparo);
9
=</p>
          <p>The query N1(hermione) is a logical consequence of K if the matrix M (:K) [
ffN1(hermione)gg is valid. The resulting matrix and its partial order are below:
2 M(x0) M(x1) c(x2; y1)
6
666 :M(e) M(y0) S(y1)
6
4 W(x0) W(x1) :W(x2)
3
:M(x4) M(y3)</p>
          <p>7
:N2(x4) :N2(x5) N1(h) 777
7
5
:M(h) :S(r) :c(h; r)
x0
x1
x4</p>
          <p>x5
M(x3)
N2(x3)
:N1(x3)</p>
          <p>y3
e
y0</p>
          <p>With the relation at hand, we are able to restrict the -substitutions. For
instance, in the example in Figure 2, we cannot do a -substitution for e and x0
because (e; x0) 2 &lt;, and it would violate the preference condition. However, we
can do a -substitution for e and x4. When we carry out this last substitution,
the lattice of the preference relation is modi ed during the construction of the
path to accommodate the -substitution, as shown in Figure 3.</p>
          <p>x0</p>
          <p>x1
fe; x4g
y0
x5
y3</p>
          <p>A proof in this method can be built in two equivalent ways: a simpler matrix
with connections and a proof in the calculus. In Figure 4, we show the proof
using the former: the matrix, the -substitution, and the nal partial order. In
the gure, connections have been numbered to represent the order in which they
were built.</p>
          <p>The same proof using the calculus is shown in Figure 5.
2</p>
          <p>:M(e)
6
6
6 M(x0)
6
6
4</p>
          <p>W(x0)</p>
          <p>M(x1)</p>
          <p>S(y1)
:M(h)</p>
          <p>:S(r)
M(y0) c(x2; y1) 7fy1=rg</p>
          <p>6fy1=rg
W(x1)</p>
          <p>8fy3=eg
4fx0=hg
2
:c(h; r)</p>
          <p>M(x3)
Nfx24(=xh3g)3
Fig. 5. Connection proof in calculus style. The arrows copy the two subproofs generated
after the extension rule Ext (y). It must also include the -substitution and partial order
of Figure 4 (not duplicated here for the sake of space).</p>
        </sec>
        <sec id="sec-3-3-2">
          <title>Concluding Remarks</title>
          <p>
            In this work, we have de ned a connection method for ALC , a commonly
considered fragment of the defeasible description logic ALCH [
            <xref ref-type="bibr" rid="ref31">31</xref>
            ]. The calculus
extends the one by Freitas and Otten, ALC -CM [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ], in a number of aspects:
(i ) it complies with the preferential-DL semantics developed by Britz et al. and
by Giordano et al. and which is widely assumed in the literature on reasoning
with defeasible ontologies; (ii ) it relies on a tailor-made normal form we
introduced to cater for typicality in concepts, and (iii ) it includes a new internal
structure, namely a preference relation on objects, which is built during the proof
process and allows for an elegant handling of connections involving typicality.
          </p>
          <p>As already alluded to in the introduction, the work here reported makes the
rst steps in the study of connection methods as viable alternatives for reasoning
with defeasible ontologies. It is therefore part of a broader long-term agenda.
Immediate next steps stemming from the present work are: (i ) extending the
method to the full language of ALCH , in particular to handle typicality of role
names and in role hierarchies, and (ii ) endowing Raccoon with the ability to
reason over defeasible extensions of ALC.</p>
          <p>
            The reader conversant with preferential reasoning would have noticed that
in this work we assume preferential entailment, which is a Tarskian notion of
consequence and therefore monotonic. As pointed out in the literature on
nonmonotonic reasoning, preferential entailment is not always enough for reasoning
defeasibly with exceptions. Stronger, more robust, forms of entailment are often
called for and one particular de nition thereof, namely the rational closure of a
defeasible ontology has been thoroughly investigated in the context of defeasible
ALC [
            <xref ref-type="bibr" rid="ref18 ref28 ref8">8,18,28</xref>
            ]. Nevertheless, a case has been made for sticking to preferential
reasoning in some contexts [
            <xref ref-type="bibr" rid="ref26">26</xref>
            ] or for investigating weaker forms of
rationality [
            <xref ref-type="bibr" rid="ref23 ref7">7,23</xref>
            ], which suggests the debate around rational closure being the baseline
for defeasible reasoning remains, in a sense, open.
          </p>
          <p>In any case, the aforementioned approaches to the computation of the
rational closure of a defeasible knowledge base rely on a number of calls to a classical
(monotonic) reasoner and therefore the availability of a method for preferential
reasoning in ALC as the one we propose here is an important step in the
investigation of stronger forms of entailment in the presence of typicality operators.</p>
          <p>
            The limitations of adopting a single preference ordering in modelling object
typicality have already been pointed out by Britz and Varzinczak [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ]. They
introduce a notion of context in a multi-preference semantics making it
possible for some objects to be more typical than others w.r.t. a context, but less
typical w.r.t. a di erent one. Part of our research agenda is therefore to
extend the method here proposed to deal with multiple preference relations. The
tableau system of Britz and Varzinczak can serve as a springboard with which
to investigate such an extension to contextual defeasible reasoning.
          </p>
        </sec>
        <sec id="sec-3-3-3">
          <title>Acknowledgments</title>
          <p>This study has been nanced in part by the Coordenac~ao de Aperfeicoamento
de Pessoal de N vel Superior - Brasil (CAPES) - Finance Code 001. It also has
been supported in part by the project Reconciling Description Logics and
NonMonotonic Reasoning in the Legal Domain (PRC CNRS{FACEPE, France{Brazil).
Fred Freitas is partially supported by a Research Productivity grant provided by
the Brazilian funding agency National Council for Scienti c and Technological
Development { CNPq.</p>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <string-name>
            <given-names>A Basic</given-names>
            <surname>Description</surname>
          </string-name>
          <string-name>
            <surname>Logic</surname>
          </string-name>
          , p.
          <volume>10</volume>
          {
          <fpage>49</fpage>
          . Cambridge University Press (
          <year>2017</year>
          ). https://doi.org/10.1017/9781139025355.002
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Bibel</surname>
          </string-name>
          , W.:
          <source>Automated Theorem Proving. Vieweg Verlag, Wiesbaden</source>
          (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Rational closure for all description logics</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>274</volume>
          ,
          <fpage>197</fpage>
          {
          <fpage>223</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faella</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrova</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sauro</surname>
            ,
            <given-names>L.:</given-names>
          </string-name>
          <article-title>A new semantics for overriding in description logics</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>222</volume>
          ,
          <issue>1</issue>
          {
          <fpage>48</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faella</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sauro</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Defeasible inclusions in low-complexity DLs</article-title>
          .
          <source>Journal of Arti cial Intelligence Research</source>
          <volume>42</volume>
          ,
          <volume>719</volume>
          {
          <fpage>764</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sauro</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>On the logical properties of the nonmonotonic description logic DLN</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>248</volume>
          ,
          <fpage>85</fpage>
          {
          <fpage>111</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Booth</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Conditional inference under disjunctive rationality</article-title>
          . In:
          <string-name>
            <surname>Leyton-Brown</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <source>Mausam (eds.) Proceedings of the 35th AAAI Conference on Arti cial Intelligence</source>
          . pp.
          <volume>6227</volume>
          {
          <fpage>6234</fpage>
          .
          <string-name>
            <surname>AAAI</surname>
          </string-name>
          (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Casini</surname>
          </string-name>
          , G., Meyer, T.,
          <string-name>
            <surname>Moodley</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Principles of KLM-style defeasible description logics</article-title>
          .
          <source>ACM Transactions on Computational Logic</source>
          <volume>22</volume>
          (
          <issue>1</issue>
          ) (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heidema</surname>
          </string-name>
          , J., Meyer, T.:
          <article-title>Semantic preferential subsumption</article-title>
          . In: Lang,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Brewka</surname>
          </string-name>
          ,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 11th International Conference on Principles of Knowledge Representation and Reasoning (KR)</source>
          . pp.
          <volume>476</volume>
          {
          <fpage>484</fpage>
          . AAAI Press/MIT Press (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Britz</surname>
          </string-name>
          , K., Meyer, T.,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Semantic foundation for preferential description logics</article-title>
          . In: Wang,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Reynolds</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of the 24th Australasian Joint Conference on Arti cial Intelligence</source>
          . pp.
          <volume>491</volume>
          {
          <fpage>500</fpage>
          . No. 7106
          <string-name>
            <surname>in</surname>
            <given-names>LNAI</given-names>
          </string-name>
          , Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Introducing role defeasibility in description logics</article-title>
          . In: Michael,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Kakas</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 15th European Conference on Logics in Arti cial Intelligence (JELIA)</source>
          . pp.
          <volume>174</volume>
          {
          <fpage>189</fpage>
          . No. 10021
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Toward defeasible SROIQ</article-title>
          .
          <source>In: Proceedings of the 30th International Workshop on Description Logics</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Contextual rational closure for defeasible ALC</article-title>
          .
          <source>Annals of Mathematics and Arti cial Intelligence</source>
          <volume>87</volume>
          (
          <issue>1-2</issue>
          ),
          <volume>83</volume>
          {
          <fpage>108</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Preferential tableaux for contextual defeasible ALC</article-title>
          . In: Cerrito,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Popescu</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 28th International Conference on Automated Reasoning with Analytic Tableaux and Related Methods (TABLEAUX)</source>
          . pp.
          <volume>39</volume>
          {
          <fpage>57</fpage>
          . No. 11714
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Preferential tableaux for contextual defeasible ALC</article-title>
          . In: Cerrito,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Popescu</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <source>Automated Reasoning with Analytic Tableaux and Related Methods - 28th International Conference, TABLEAUX</source>
          <year>2019</year>
          , London, UK, September 3-
          <issue>5</issue>
          ,
          <year>2019</year>
          ,
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>11714</volume>
          , pp.
          <volume>39</volume>
          {
          <fpage>57</fpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Casini</surname>
          </string-name>
          , G., Meyer, T.,
          <string-name>
            <surname>Moodley</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nortje</surname>
          </string-name>
          , R.:
          <article-title>Relevant closure: A new form of defeasible reasoning for description logics</article-title>
          . In: Ferme,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Leite</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 14th European Conference on Logics in Arti cial Intelligence (JELIA)</source>
          . pp.
          <volume>92</volume>
          {
          <fpage>106</fpage>
          . No. 8761
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Casini</surname>
          </string-name>
          , G., Meyer, T.,
          <string-name>
            <surname>Moodley</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Introducing defeasibility into OWL ontologies</article-title>
          . In: Arenas,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Corcho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            ,
            <surname>Simperl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Strohmaier</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>d'Aquin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srinivas</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Groth</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumontier</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , He in, J.,
          <string-name>
            <surname>Thirunarayan</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staab</surname>
          </string-name>
          , S. (eds.)
          <source>Proceedings of the 14th International Semantic Web Conference (ISWC)</source>
          . pp.
          <volume>409</volume>
          {
          <fpage>426</fpage>
          . No. 9367
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Casini</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Straccia</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Rational closure for defeasible description logics</article-title>
          . In: Janhunen,
          <string-name>
            <surname>T.</surname>
          </string-name>
          , Niemela, I. (eds.)
          <source>Proceedings of the 12th European Conference on Logics in Arti cial Intelligence (JELIA)</source>
          . pp.
          <volume>77</volume>
          {
          <fpage>90</fpage>
          . No. 6341
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          ,
          <source>SpringerVerlag</source>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Casini</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Straccia</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Defeasible inheritance-based description logics</article-title>
          .
          <source>Journal of Arti cial Intelligence Research (JAIR) 48</source>
          ,
          <fpage>415</fpage>
          {
          <fpage>473</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Casini</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Straccia</surname>
          </string-name>
          , U., Meyer, T.:
          <article-title>A polynomial time subsumption algorithm for nominal safe ELO? under rational closure</article-title>
          .
          <source>Information Sciences</source>
          <volume>501</volume>
          ,
          <volume>588</volume>
          {
          <fpage>620</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Freitas</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Otten</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>A Connection Calculus for the Description Logic ALC</article-title>
          .
          <source>In: 29th Canadian Conference on Arti cial Intelligence</source>
          . pp.
          <volume>243</volume>
          {
          <fpage>256</fpage>
          . Springer, Victoria,
          <string-name>
            <surname>BC</surname>
          </string-name>
          , Canada (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Freitas</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varzinczak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Cardinality restrictions within description logic connection calculi</article-title>
          . In: Benzmuller,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ricca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Parent</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            ,
            <surname>Roman</surname>
          </string-name>
          ,
          <string-name>
            <surname>D</surname>
          </string-name>
          . (eds.) Rules and Reasoning - Second International Joint Conference,
          <source>RuleML+RR</source>
          <year>2018</year>
          ,
          <article-title>Luxembourg</article-title>
          ,
          <source>September 18-21</source>
          ,
          <year>2018</year>
          ,
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>11092</volume>
          , pp.
          <volume>65</volume>
          {
          <fpage>80</fpage>
          . Springer (
          <year>2018</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -99906- 7 5, https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -99906-7\_
          <fpage>5</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Freund</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Injective models and disjunctive relations</article-title>
          .
          <source>Journal of Logic and Computation</source>
          <volume>3</volume>
          (
          <issue>3</issue>
          ),
          <volume>231</volume>
          {
          <fpage>247</fpage>
          (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Giordano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gliozzi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olivetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pozzato</surname>
          </string-name>
          , G.:
          <article-title>Preferential description logics</article-title>
          . In: Dershowitz,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Voronkov</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>Logic for Programming, Arti cial Intelligence, and Reasoning (LPAR)</article-title>
          . pp.
          <volume>257</volume>
          {
          <fpage>272</fpage>
          . No. 4790
          <string-name>
            <surname>in</surname>
            <given-names>LNAI</given-names>
          </string-name>
          , Springer (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Giordano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gliozzi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olivetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pozzato</surname>
          </string-name>
          , G.:
          <article-title>ALC + T : a preferential extension of description logics</article-title>
          .
          <source>Fundamenta Informaticae</source>
          <volume>96</volume>
          (
          <issue>3</issue>
          ),
          <volume>341</volume>
          {
          <fpage>372</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Giordano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gliozzi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olivetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pozzato</surname>
          </string-name>
          , G.:
          <article-title>Preferential vs rational description logics: which one for reasoning about typicality?</article-title>
          <source>In: Proceedings of the European Conference on Arti cial Intelligence (ECAI)</source>
          . pp.
          <volume>1069</volume>
          {
          <issue>1070</issue>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Giordano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gliozzi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olivetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pozzato</surname>
          </string-name>
          , G.:
          <article-title>A non-monotonic description logic for reasoning about typicality</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>195</volume>
          ,
          <fpage>165</fpage>
          {
          <fpage>202</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Giordano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gliozzi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olivetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pozzato</surname>
          </string-name>
          , G.:
          <article-title>Semantic characterization of rational closure: From propositional logic to description logics</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>226</volume>
          ,
          <issue>1</issue>
          {
          <fpage>33</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>Melo</given-names>
            <surname>Filho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Freitas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Otten</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.:</surname>
          </string-name>
          <article-title>RACCOON: A Connection Reasoner for the Description Logic ALC</article-title>
          .
          <source>In: 21st International Conference on Logic for Programming</source>
          ,
          <source>Arti cial Intelligence and Reasoning</source>
          . vol.
          <volume>46</volume>
          , pp.
          <volume>200</volume>
          {
          <fpage>211</fpage>
          . EasyChair, Maun, Botswana (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Pensel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turhan</surname>
            ,
            <given-names>A.Y.</given-names>
          </string-name>
          :
          <article-title>Reasoning in the defeasible description logic EL? { computing standard inferences under rational and relevant semantics</article-title>
          .
          <source>International Journal of Approximate Reasoning</source>
          <volume>112</volume>
          ,
          <issue>28</issue>
          {
          <fpage>70</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Varzinczak</surname>
          </string-name>
          , I.:
          <article-title>A note on a description logic of concept and role typicality for defeasible reasoning over ontologies</article-title>
          .
          <source>Logica Universalis</source>
          <volume>12</volume>
          (
          <issue>3-4</issue>
          ),
          <volume>297</volume>
          {
          <fpage>325</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>