<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Optimal ABox Repair w.r.t. Static ℰℒ TBoxes: from Quantified ABoxes back to ABoxes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Extended Abstract</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Franz Baader</string-name>
          <email>franz.baader@tu-dresden.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Patrick Koopmann</string-name>
          <email>patrick.koopmann@tu-dresden.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Kriegel</string-name>
          <email>francesco.kriegel@tu-dresden.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Adrian Nuradiansyah</string-name>
          <email>adrian.nuradiansyah@tu-dresden.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rich ⊑ Famous }</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Theoretical Computer Science, Technische Universität Dresden</institution>
          ,
          <addr-line>01062 Dresden</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Errors in Description Logic (DL) ontologies are often detected when a reasoner computes unwanted consequences. The question is then how to repair the ontology such that the unwanted consequences no longer follow, preferably such that as many of the other consequences as possible are preserved. ABox repair deals with the situation where the data (expressed by an ABox) may contain errors, while the schema (expressed by a TBox) is assumed to be correct. For example, the ontology ( , ), where says that rich people are famous and that Ben has a rich parent whose name is Jerry. A repair request ℛ is now a finite set of concept assertions, which each repair must not entail. For example, each repair for ℛ = { ∃parent .(Rich ⊓ Famous )(BEN ) } must not imply that Ben has a rich and famous parent. Classical approaches for ontology repair are based on removing axioms that are responsible for the undesired entailments [1, 2, 3, 4, 5, 6]. In the present example, we might remove any of the two ABox axioms in order to satisfy the repair request. However, this removes more information than necessary. Extending on our previous work in [7, 8], our approach in [9] preserves more information than the classical ones since, instead of just removing axioms, we may also introduce anonymous copies of individuals. Specifically, every repair must only logically follow from the input ontology (and need not be a subset as in the classical approaches). The result of the repair process is then a quantified ABox (qABox) with existentially quantified variables, which are like anonymous individuals in OWL1 or nulls in database systems. For the present example, such a repair could be the following qABox:</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Ontology repair</kwd>
        <kwd>Description logic EL</kwd>
        <kwd>ABox approximation</kwd>
        <kwd>Most specific concept</kwd>
        <kwd>Complexity</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>= { parent (BEN , JERRY ), Rich (JERRY ) },</p>
      <p>∃ {}. { parent (BEN , ), Famous (), Rich (JERRY ) }.</p>
      <p>In contrast to the classical approaches, it preserves both the information that Ben has a famous
parent and that Jerry is rich.</p>
      <p>
        More specifically, in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] we consider ontologies and repair requests formulated in ℰℒ, and
develop methods to compute repairs that are optimal in the sense that they preserve a maximal
subset of some family of Boolean queries. Specifically, we there consider Boolean instance
queries (IQ), which are ℰℒ concept assertions, and Boolean conjunctive queries (CQ). IQ-repairs
are characterized based on IQ-entailment: a qABox ∃ 1. 1 IQ-entails another qABox ∃ 2. 2
w.r.t.  if every Boolean IQ entailed by ∃ 2. 2 w.r.t.  is also entailed by ∃ 1. 1 w.r.t.  .
An IQ-repair of a qABox ∃ .  is a qABox that is IQ-entailed w.r.t.  by ∃ .  and does
not entail w.r.t.  any of the the axioms in the repair request. Such a repair is optimal if no
other repair IQ-entails it without itself being IQ-entailed by it. CQ-repairs can be similarly
characterized based on entailed Boolean CQs, but note that CQ-entailment coincides with
classical entailment (based on models) because the TBox is fixed. Since each Boolean IQ is also
a Boolean CQ but not vice versa, CQ-entailment is stronger than IQ-entailment, and so each
CQ-repair is an IQ-repair but the converse does not hold. The repair in our example is both an
optimal IQ-repair and an optimal CQ-repair. In general, while optimal IQ-repairs always exist,
optimal CQ-repairs are only guaranteed to exist w.r.t. cycle-restricted TBoxes [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        A downside of the approach in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] is that, despite being part of the OWL standard, DL systems
ofer no or only limited support for anonymous individuals. It is thus desirable to find repairs
in form of classical ABoxes, which constitutes the research question in our current ESWC 2022
paper [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Such (optimal) ABox repairs are defined like (optimal) IQ-repairs, but using classical
entailment instead of IQ-entailment and are restricted to being classical ℰℒ ABoxes.
      </p>
      <p>In the above example, we can avoid the quantified variable  if we use the ABox axiom
∃parent .Famous(BEN ). But this is not always possible. Assume that instead of  , we have
the TBox</p>
      <p>′ = { ∃parent .Rich ⊑ Famous, Famous ≡ ∃ friend .Famous }
and our repair request is ℛ′ = { Famous(BEN ) }. An optimal IQ-repair for this repair request
is the qABox
∃ . 1 = ∃ {, }. { parent (BEN , ), Rich(JERRY ), friend (BEN , ), friend (, ) },
but no classical ABox is IQ-equivalent to it w.r.t.  ′.</p>
      <p>The reason is that, due to the cyclic role assertion friend (, ), the qABox ∃ . 1
entails (∃friend .)⊤(BEN ) for every  ≥ 0, which cannot be captured by a classical ABox,
and this cycle is also not covered by the TBox. If we replace the last axiom in  ′ by
Famous ⊑ ∃friend .Famous, we obtain ∃ . 2 = ∃ . (1 ∪ {Famous()}) as optimal
IQ-repair. Even though 2 still contains friend (, ), it is IQ-equivalent to the classical
ABox { (∃parent .⊤)(BEN ), Rich(JERRY ), (∃friend .Famous)(BEN ) } w.r.t. the modified
TBox  ′. The entailments (∃friend .)Famous(BEN ) for all  ≥ 0 are now produced by the
the assertion (∃friend .Famous)(BEN ) together with the last TBox axiom.</p>
      <p>
        These examples demonstrate that optimal repairs in form of classical ABoxes may not always
exist, and that it is not obvious to see when they do. As main contribution of our ESWC 2022
paper [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], we show how to decide the existence of such optimal ABox repairs in exponential
time, and how to compute in double-exponential time all such repairs in case they exist. There
may exist up to exponentially many such repairs, and each repair can be up to double-exponential
in size, measured w.r.t. the original (quantified) ABox, the TBox, and the repair request. For
data complexity, however, each repair is of at most single-exponential size.
      </p>
      <p>
        Our approach for showing these results roughly proceeds as follows. First of all, we observe
that classical entailment between a qABox and an ABox coincides with so-called IRQ-entailment,
which is slightly stronger than IQ-entailment by additionally taking role assertions between
named individuals into account. Thus, if we want to characterize the optimal ABox repairs of a
(quantified) ABox w.r.t. classical entailment, we can investigate IRQ-repairs instead. In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] we
present two methods for computing optimal IQ-repairs: canonical IQ-repairs, which are easier
to handle in formal proofs, and optimized IQ-repairs, which are IQ-equivalent sub-qABoxes of
the canonical repairs that are of exponential size only in the worst case and can thus often be
computed within reasonable time bounds. In the present paper, we show that both methods can
be used without adaptations to compute all optimal IRQ-repairs. This is by chance since our
definition of canonical IQ-repairs does not generate new role assertions between individuals and
preserves as many of them as possible, although this is not necessary for IQ-entailment. (Such
a result might not hold for other sets of IQ-repairs.) Note that, due to the diferent entailment
relations, not every canonical IQ-repair that is IRQ-optimal is also IQ-optimal.
      </p>
      <p>Each optimal IRQ-repair is a representation of an optimal ABox repair, but we still need to
transform it. For this purpose, we introduce the notion of an optimal ABox approximation of a
given qABox, which is an ABox that entails the same concept assertions and role assertions, i.e., is
IRQ-equivalent to the qABox. A given qABox may not have an optimal ABox approximation, but
if it does, then this approximation is unique up to equivalence. In particular, if an optimal
IRQrepair has an optimal ABox approximation, then it is an optimal ABox repair. Conversely, every
optimal ABox repair can be obtained in this way. Thus, the set of optimal ABox approximations
of all optimal IRQ-repairs is the set of all optimal ABox repairs. Contrary to the IQ- and
IRQ-repairs, not every ABox repair is entailed by an optimal one. This corresponds to the
optimal IRQ-repairs that do not have an optimal ABox approximation. These could still be
transformed into an ABox by unfolding up to a fixed role depth. Increasing the role depth then
always leads to better ABox repairs.</p>
      <p>
        Furthermore, we investigate the problems of deciding the existence of and of computing
optimal ABox approximations. The first step is to transfer the qABox into a specific form, called
pre-approximation, which is saturated w.r.t. the TBox and consists of the original role assertions
between named individuals and, for each named individual , a sub-qABox ℬ. We prove that
the original qABox has an optimal ABox approximation if all the named individuals  have a
most specific concept  in ℬ w.r.t. the TBox. The optimal ABox approximation is then obtained
by replacing each ℬ with () in the pre-approximation. We use the results from [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] to
test the existence of the most specific concept (msc) in polynomial time and to generate the at
most exponentially large msc. The latter implies that an optimal ABox approximation is, up to
equivalence, of at most exponential size w.r.t. the size of the qABox. Given that the optimal
IRQ-repairs itself are of exponential size in the worst case, this yields the complexity upper
bounds for testing the existence and computing optimal ABox repairs mentioned above.
      </p>
      <p>
        The full paper is published in the proceedings of the 19th Extended Semantic Web Conference
(ESWC 2022) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The accompanying technical report with detailed proofs is available in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
Acknowledgments
This work was partially supported by the AI competence center ScaDS.AI Dresden/Leipzig and
the Deutsche Forschungsgemeinschaft (DFG), Grant 430150274, and Grant 389792660 within
TRR 248.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Schlobach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Cornet</surname>
          </string-name>
          ,
          <article-title>Non-standard reasoning services for the debugging of description logic terminologies</article-title>
          ,
          <source>in: IJCAI-03, Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence, Acapulco, Mexico, August</source>
          <volume>9</volume>
          -
          <issue>15</issue>
          ,
          <year>2003</year>
          , Morgan Kaufmann,
          <year>2003</year>
          , pp.
          <fpage>355</fpage>
          -
          <lpage>362</lpage>
          . URL: http://ijcai.org/Proceedings/03/Papers/053.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>B.</given-names>
            <surname>Parsia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Sirin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kalyanpur</surname>
          </string-name>
          ,
          <article-title>Debugging OWL ontologies</article-title>
          ,
          <source>in: Proceedings of the 14th international conference on World Wide Web, WWW</source>
          <year>2005</year>
          , Chiba, Japan, May
          <volume>10</volume>
          -14,
          <year>2005</year>
          , ACM,
          <year>2005</year>
          , pp.
          <fpage>633</fpage>
          -
          <lpage>640</lpage>
          . URL: https://doi.org/10.1145/1060745.1060837.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Meyer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Booth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Z.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <article-title>Finding maximally satisfiable terminologies for the description logic ℒ</article-title>
          ,
          <source>in: Proceedings, The Twenty-First National Conference on Artificial Intelligence and the Eighteenth Innovative Applications of Artificial Intelligence Conference, July 16-20</source>
          ,
          <year>2006</year>
          , Boston, Massachusetts, USA, AAAI Press,
          <year>2006</year>
          , pp.
          <fpage>269</fpage>
          -
          <lpage>274</lpage>
          . URL: http://www.aaai.org/Library/AAAI/
          <year>2006</year>
          /aaai06-
          <fpage>043</fpage>
          .php.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Schlobach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Cornet</surname>
          </string-name>
          ,
          <string-name>
            <surname>F. van Harmelen</surname>
          </string-name>
          ,
          <article-title>Debugging incoherent terminologies</article-title>
          ,
          <source>J. Autom. Reason</source>
          .
          <volume>39</volume>
          (
          <year>2007</year>
          )
          <fpage>317</fpage>
          -
          <lpage>349</lpage>
          . URL: https://doi.org/10.1007/s10817-007-9076-z.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kalyanpur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Parsia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Horridge</surname>
          </string-name>
          , E. Sirin,
          <article-title>Finding all justifications of OWL DL entailments</article-title>
          ,
          <source>in: The Semantic Web, 6th International Semantic Web Conference, 2nd Asian Semantic Web Conference</source>
          ,
          <string-name>
            <surname>ISWC</surname>
          </string-name>
          <year>2007</year>
          +
          <article-title>ASWC 2007, Busan</article-title>
          , Korea,
          <source>November 11-15</source>
          ,
          <year>2007</year>
          , volume
          <volume>4825</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2007</year>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>280</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -76298-0_
          <fpage>20</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Suntisrivaraporn</surname>
          </string-name>
          ,
          <article-title>Debugging SNOMED CT using axiom pinpointing in the description logic ℰℒ+</article-title>
          ,
          <source>in: Proceedings of the Third International Conference on Knowledge Representation in Medicine</source>
          , Phoenix, Arizona, USA, May 31st - June 2nd,
          <year>2008</year>
          , volume
          <volume>410</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2008</year>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>410</volume>
          /Paper01.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Kriegel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nuradiansyah</surname>
          </string-name>
          ,
          <article-title>Privacy-preserving ontology publishing for ℰℒ instance stores</article-title>
          ,
          <source>in: Logics in Articfiial Intelligence - 16th European Conference, JELIA</source>
          <year>2019</year>
          , Rende, Italy, May 7-
          <issue>11</issue>
          ,
          <year>2019</year>
          , Proceedings, volume
          <volume>11468</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2019</year>
          , pp.
          <fpage>323</fpage>
          -
          <lpage>338</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -19570-0_
          <fpage>21</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Kriegel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nuradiansyah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Peñaloza</surname>
          </string-name>
          ,
          <article-title>Computing compliant anonymisations of quantified ABoxes w</article-title>
          .r.t. ℰℒ policies,
          <source>in: The Semantic Web - ISWC 2020 - 19th International Semantic Web Conference</source>
          , Athens, Greece, November 2-
          <issue>6</issue>
          ,
          <year>2020</year>
          , Proceedings,
          <string-name>
            <surname>Part</surname>
            <given-names>I</given-names>
          </string-name>
          , volume
          <volume>12506</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2020</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>20</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -62419-
          <issue>4</issue>
          _
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Kriegel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nuradiansyah</surname>
          </string-name>
          ,
          <article-title>Computing optimal repairs of quantified ABoxes w</article-title>
          .r.t. static ℰℒ TBoxes, in:
          <source>Automated Deduction - CADE 28 - 28th International Conference on Automated Deduction, Virtual Event, July 12-15</source>
          ,
          <year>2021</year>
          , Proceedings, volume
          <volume>12699</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2021</year>
          , pp.
          <fpage>309</fpage>
          -
          <lpage>326</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -79876-5_
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Borgwardt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Morawska</surname>
          </string-name>
          , SAT Encoding of Unification in ℰℒℋ+ w.r.t. Cycle-Restricted Ontologies,
          <source>in: Automated Reasoning - 6th International Joint Conference, IJCAR</source>
          <year>2012</year>
          ,
          <article-title>Manchester</article-title>
          ,
          <string-name>
            <surname>UK</surname>
          </string-name>
          , June 26-29,
          <year>2012</year>
          . Proceedings, volume
          <volume>7364</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2012</year>
          , pp.
          <fpage>30</fpage>
          -
          <lpage>44</lpage>
          . URL: https://doi.org/10.1007/ 978-3-
          <fpage>642</fpage>
          -31365-
          <issue>3</issue>
          _
          <fpage>5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Kriegel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nuradiansyah</surname>
          </string-name>
          ,
          <article-title>Optimal ABox repair w</article-title>
          .r.t. static
          <article-title>ℰℒ TBoxes: from quantified ABoxes back to ABoxes</article-title>
          , in: 19th Extended Semantic Web Conference,
          <string-name>
            <surname>ESWC</surname>
          </string-name>
          <year>2022</year>
          , Hersonissos, Greece, May 29 - June 2,
          <year>2022</year>
          , Proceedings, volume
          <volume>13261</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2022</year>
          , pp.
          <fpage>130</fpage>
          -
          <lpage>146</lpage>
          . URL: https://doi. org/10.1007/978-3-
          <fpage>031</fpage>
          -06981-
          <issue>9</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zarrieß</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Turhan</surname>
          </string-name>
          ,
          <article-title>Most specific generalizations w</article-title>
          .r.t.
          <source>general ℰℒ-TBoxes, in: IJCAI 2013, Proceedings of the 23rd International Joint Conference on Artificial Intelligence</source>
          , Beijing, China,
          <source>August 3-9</source>
          ,
          <year>2013</year>
          , IJCAI/AAAI,
          <year>2013</year>
          , pp.
          <fpage>1191</fpage>
          -
          <lpage>1197</lpage>
          . URL: http://www.aaai. org/ocs/index.php/IJCAI/IJCAI13/paper/view/6709.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Kriegel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nuradiansyah</surname>
          </string-name>
          ,
          <article-title>Optimal ABox Repair w</article-title>
          .r.t.
          <article-title>Static ℰℒ TBoxes: from Quantified ABoxes back to ABoxes (Extended Version)</article-title>
          ,
          <source>LTCS-Report 22-01</source>
          , Chair of Automata Theory, Institute of Theoretical Computer Science, Technische Universität Dresden, Dresden, Germany,
          <year>2022</year>
          . URL: https://doi.org/10.25368/
          <year>2022</year>
          .65.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>