<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Connection-Minimal Abduction in ℰ ℒ via Translation to FOL</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Extended Abstract</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fajar Haifani</string-name>
          <email>fajar.haifani@mpi-inf.mpg.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Patrick Koopmann</string-name>
          <email>patrick.koopmann@tu-dresden.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sophie Tourret</string-name>
          <email>sophie.tourret@inria.fr</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christoph Weidenbach</string-name>
          <email>christoph.weidenbach@mpi-inf.mpg.de</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Graduate School of Computer Science</institution>
          ,
          <addr-line>66123 Saarbrücken</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Theoretical Computer Science, Technische Universität Dresden</institution>
          ,
          <addr-line>01062 Dresden</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Max-Planck-Institut für Informatik</institution>
          ,
          <addr-line>Saarland Informatics Campus, 66123 Saarbrücken</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Université de Lorraine</institution>
          ,
          <addr-line>CNRS, Inria, LORIA, Nancy</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Abduction is about finding extensions to a knowledge base that are suficient to imply a given entailment. Specifically, in the context of description logics (DPs), we consider an ontology  of background knowledge, an axiom  s.t.  ̸|=  (called the observation), and we want to compute a suitable set ℋ of axioms called hypothesis such that  ∪ ℋ |=  [1]. Abduction as a reasoning problem has a long history [2] and has several applications: for example, it can be used to explain missing entailments of an ontology [3, 4, 5], to repair incomplete knowledge bases [6], and to provide possible explanations for unexpected observations [7]. We consider the special case of TBox abduction in the lightweight description logic ℰℒ, where the observation is an ℰℒ concept inclusion 1 ⊑ 2 and the background knowledge is an ℰℒ TBox  . To avoid useless answers, abduction problems usually come with further restrictions on the solution space and/or minimality criteria that help sort the chaf from the grain. We argue that existing minimality notions sufer from certain limitations, and introduce connection minimality as a new notion that overcomes the limitations of earlier notions. Furthermore, we developed and evaluated a method to compute connection-minimal solutions in practice. Our criterion follows Occam's razor by rejecting hypotheses that use concept inclusions unrelated to the problem at hand. To illustrate, consider the following TBox about relationships in academia: ∃employment.ResearchPosition ⊓ ∃qualification.Diploma ⊑ Researcher, ∃writes.ResearchPaper ⊑ Researcher, Doctor ⊑ ∃qualification.PhD, Professor ≡ Doctor ⊓ ∃employment.Chair, FundsProvider ⊑ ∃writes.GrantApplication }.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>entailment include the following</p>
      <p>ℋ1 = {PhD ⊑ Diploma, Chair ⊑ ResearchPosition}
ℋ2 = {Doctor ⊑ FundsProvider, GrantApplication ⊑ ResearchPaper}.</p>
      <p>We argue that ℋ1 is preferable over ℋ2, because ℋ2 is less linked to the observation. Indeed, for
any two concepts 1 and 2 such that a entails 1 ⊑ ∃writes.2, a hypothesis {Doctor ⊑
1, 2 ⊑ ResearchPaper} could be created (consider for instance that a additionally entails
Poet ⊑ ∃writes.Poetry), since neither 1 nor 2 need to be connected to either Professor or
Researcher. Our new minimality notion discards ℋ2, and favors ℋ1 as connection-minimal.</p>
      <p>Intuitively, for an observation 1 ⊑ 2, connection minimality only accepts those hypotheses
which ensure that every CI in the hypothesis is connected to both 1 and 2 in  . The definition
of connection minimality is based on the following ideas:
1 Hypotheses for the abduction problem have to create a connection between 1 and 2, in
the form of a concept  that satisfies  ∪ ℋ |= 1 ⊑ ,  ⊑ 2.
2 To ensure that Occam’s razor is followed, we want this connection to be based on concepts
1 and 2 for which we already have  |= 1 ⊑ 1, 2 ⊑ 2.
3 We additionally want to make sure that the connecting concepts are not more complex
than necessary, and that ℋ only contains CIs that directly connect parts of 2 to parts of
1 by closely following their structure.</p>
      <p>We call  a connecting concept: A concept  connects 1 to 2 in  if and only if  |= 1 ⊑ 
and  |=  ⊑ 2. Note that if  |= 1 ⊑ 2 then both 1 and 2 are connecting concepts
from 1 to 2, and if  ̸|= 1 ⊑ 2, it means no concept connects them.</p>
      <p>
        In the above example, we would use a |= 1 ⊑ 1 and a |= 2 ⊑ 2 where
1
2
=
=
∃qualification.PhD ⊓ ∃employment.Chair
∃qualification.Diploma ⊓ ∃employment.ResearchPosition ⊓ Researcher
from which we construct the hypothesis ℋ1 by linking the fillers of the existential restrictions.
In the full paper, we define the connection between 1 and 2 formally using a relaxed notion
of homomorphism between the description trees of 2 and 1. We show that this notion of
minimality is deeply connected with the generation of prime-implicates in first-order logic [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
That is, using a translation scheme from abduction problems to first-order clauses, we are able to
reconstruct the connection-minimal hypotheses using the prime implicates of the translation. In
addition to soundness and completeness, we show a quadratic bound on the depth of the terms
occurring in the prime implicates, which gives us a termination condition for our method, and
ensures completeness for hypotheses that are both connection-minimal and subset-minimal.
      </p>
      <p>
        We implemented a prototype of our method consisting of two components: a Java component
that takes care of preprocessing, translation into first-order logic, and construction of the
hypotheses from prime implicates, and a first-order reasoning component that uses a modified
version of the theorem prover SPASS [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] for the prime implicate generation. The prototype was
evaluated on a set of ontologies from the medical domain for which we generated abduction
problems in diferent ways, show-casing the practicality of our approach. The full paper has
been accepted at IJCAR 2022 [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>Acknowledgments: This work was supported by the Deutsche Forschungsgemeinschaft
(DFG), Grant 389792660 within TRR 248.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>C.</given-names>
            <surname>Elsenbroich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Sattler</surname>
          </string-name>
          ,
          <article-title>A case for abductive reasoning over ontologies</article-title>
          ,
          <source>in: Proceedings of the OWLED'06 Workshop on OWL: Experiences and Directions</source>
          ,
          <year>2006</year>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>216</volume>
          /submission_25.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C. S.</given-names>
            <surname>Peirce</surname>
          </string-name>
          , Deduction, induction, and hypothesis,
          <source>Popular science monthly 13</source>
          (
          <year>1878</year>
          )
          <fpage>470</fpage>
          -
          <lpage>482</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          ,
          <article-title>Two ways of explaining negative entailments in description logics using abduction</article-title>
          ,
          <source>in: Informal Proceedings of the 2nd Workshop on Explainable Logic-Based Knowledge Representation (XLoKR-</source>
          <year>2021</year>
          <article-title>) co-located with the 18th international Conference on Principles of Knowledge Representation and Reasoning (KR-</article-title>
          <year>2021</year>
          ),
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>İ.</given-names>
            <surname>İ. Ceylan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Lukasiewicz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Malizia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Molinaro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vaicenavicius</surname>
          </string-name>
          ,
          <article-title>Explanations for negative query answers under existential rules</article-title>
          , in: D.
          <string-name>
            <surname>Calvanese</surname>
          </string-name>
          , E. Erdem, M. Thielscher (Eds.),
          <source>Proceedings of KR</source>
          <year>2020</year>
          , AAAI Press,
          <year>2020</year>
          , pp.
          <fpage>223</fpage>
          -
          <lpage>232</lpage>
          . URL: https://doi.org/10. 24963/kr.2020/23. doi:
          <volume>10</volume>
          .24963/kr.2020/23.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ortiz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Simkus</surname>
          </string-name>
          , G. Stefanoni,
          <article-title>Reasoning about explanations for negative query answers in DL-Lite</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Artif</surname>
          </string-name>
          .
          <source>Intell. Res</source>
          .
          <volume>48</volume>
          (
          <year>2013</year>
          )
          <fpage>635</fpage>
          -
          <lpage>669</lpage>
          . URL: https: //doi.org/10.1613/jair.3870. doi:
          <volume>10</volume>
          .1613/jair.3870.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>F.</given-names>
            <surname>Wei-Kleiner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Dragisic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Lambrix</surname>
          </string-name>
          ,
          <article-title>Abduction framework for repairing incomplete ℰ ℒ ontologies: Complexity results and algorithms</article-title>
          ,
          <source>in: Proceedings of the Twenty-Eighth AAAI Conference on Articfiial Intelligence</source>
          , AAAI Press,
          <year>2014</year>
          , pp.
          <fpage>1120</fpage>
          -
          <lpage>1127</lpage>
          . URL: http: //www.aaai.org/ocs/index.php/AAAI/AAAI14/paper/view/8239.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Obeid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Obeid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Moubaiddin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Obeid</surname>
          </string-name>
          ,
          <article-title>Using description logic and Abox abduction to capture medical diagnosis</article-title>
          , in: F. Wotawa, G. Friedrich,
          <string-name>
            <surname>I. Pill</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Koitz-Hristov</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          Ali (Eds.),
          <source>Advances and Trends in Artificial Intelligence. From Theory to Practice</source>
          , Springer International Publishing, Cham,
          <year>2019</year>
          , pp.
          <fpage>376</fpage>
          -
          <lpage>388</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Marquis</surname>
          </string-name>
          ,
          <article-title>Extending abduction from propositional to first-order logic</article-title>
          , in: P. Jorrand, J. Kelemen (Eds.),
          <source>Fundamentals of Artificial Intelligence Research</source>
          , International Workshop FAIR '91,
          <string-name>
            <surname>Smolenice</surname>
          </string-name>
          , Czechoslovakia, September 8-
          <issue>13</issue>
          ,
          <year>1991</year>
          , Proceedings, volume
          <volume>535</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>1991</year>
          , pp.
          <fpage>141</fpage>
          -
          <lpage>155</lpage>
          . URL: https://doi.org/10. 1007/3-540-54507-7_
          <fpage>12</fpage>
          . doi:
          <volume>10</volume>
          .1007/3-540-54507-7\_
          <fpage>12</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Weidenbach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hillenbrand</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Rusev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Topic</surname>
          </string-name>
          , System description:
          <source>Spass Version 3</source>
          .0, in: F. Pfenning (Ed.),
          <source>Automated Deduction - CADE-21, 21st International Conference on Automated Deduction, Bremen, Germany, July 17-20</source>
          ,
          <year>2007</year>
          , Proceedings, volume
          <volume>4603</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2007</year>
          , pp.
          <fpage>514</fpage>
          -
          <lpage>520</lpage>
          . URL: https: //doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -73595-3_
          <fpage>38</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -73595-3\_
          <fpage>38</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>F.</given-names>
            <surname>Haifani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tourret</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Weidenbach</surname>
          </string-name>
          ,
          <article-title>Connection-minimal abduction in ℰ ℒ via translation to fol</article-title>
          ,
          <source>in: Proceedings of IJCAR 2022, Lecture Notes in Computer Science</source>
          , Springer,
          <year>2022</year>
          . To appear.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>