<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Advanced Languages of Terms for Ontologies</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Philippe Balbiani</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Diéguez</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Çiğdem Gencer</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Faculty of Arts and Sciences. Istanbul Aydın University</institution>
          ,
          <addr-line>Istanbul</addr-line>
          ,
          <country country="TR">Turkey</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institut de recherche en informatique de Toulouse. CNRS-INPT-UT3, Université de Toulouse</institution>
          ,
          <addr-line>Toulouse</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Laboratoire d'étude et de recherche en informatique d'Angers. University of Angers</institution>
          ,
          <addr-line>Angers</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper is about the integration in a unique formalism of knowledge representation languages such as those provided by description logic languages and rule-based reasoning paradigms such as those provided by logic programming languages. We aim at creating an hybrid formalism where description logics constructs are used for defining concepts that are given as arguments to the predicates of the logic programs.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. A Short Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. A Case Study</title>
      <p>Examining role-based access control and organization-based access control, we present a case
study motivating the combination of logic programming with description logics that we are
seeking for.
Access of subjects to objects in a computer system are permitted in accordance with a
security policy embodied in an access control database. Many computer systems use the access
control matrix model to represent security policies [31]. Formally, an access control matrix is
a structure consisting of a set of subjects (users, processes, etc), a set of objects (files, tables,
etc) and binary relations ()∈ between objects and subjects giving to subjects permissions
to access objects. In this setting, asserting that subject  possesses permission  on object 
comes down to asserting that  holds for  and .</p>
      <p>
        Access control with a lot of subjects is space-consuming. To reduce the cost of
security, within the context of role-based access control (RBAC), it has been proposed that
access control administrators treat sets of subjects as instances of a concept called role1 [38].
Formally, an RBAC-structure consists of a set of subjects, a set of objects, a set of roles,
a binary relation  between subjects and roles defining the roles of subjects and binary
relations ()∈ between objects and roles giving to roles permissions to access objects. In
this setting, asserting that subject  has role  comes down to asserting that  holds for 
and , whereas asserting that role  possesses permission  on object  comes down to
asserting that  holds for  and . It is possible to refine the RBAC model by including
the concept of role hierarchy which allows permissions to be inherited through it. This
hierarchy is specified by means of assertions of the form ′⊑′′ where ′ and ′′ are roles.
To put it simply, the idea behind RBAC is the following: in a computer system, subject 
possesses a permission  on object  if and only if there are roles 0, . . . ,  such that  holds
for  and 0, for all positive integers ≤ , − 1⊑ has been asserted and  holds for  and .
RBAC with a lot of objects is space-consuming. To reduce the cost of security, within
the context of organization-based access control (OrBAC), it has been proposed that RBAC
administrators treat sets of objects as instances of a concept called view [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Formally, an
OrBAC-structure consists of a set of subjects, a set of objects, a set of roles, a set of views, a
binary relation  between subjects and roles defining the roles of subjects, a binary relation 
between objects and views defining the views of objects and binary relations ()∈ between
views and roles giving to roles permissions to access views. In this setting, asserting that
object  has view  comes down to asserting that  holds for  and , whereas asserting
that role  possesses permission  on view  comes down to asserting that  holds for 
and . It is possible to refine the OrBAC model by including the concept of view hierarchy
which allows permissions to be inherited through it. This hierarchy is specified by means of
assertions of the form ′⊑′′ where ′ and ′′ are views. To put it simply, the idea behind
OrBAC is the following: in a computer system, subject  possesses a permission  on object
 if and only if there are roles 0, . . . ,  and there are views 0, . . . ,  such that  holds
for  and 0 and  holds for  and 0, for all positive integers ≤ , − 1⊑ has been
asserted and for all positive integers ≤ , − 1⊑ has been asserted and  holds for  and .
1The roles in RBAC should not be mistaken for the roles in description logics. In RBAC security policies, roles
correspond to sets of subjects, whereas in description logic frames, roles correspond to binary relations.
It is a great pity that neither RBAC, nor OrBAC allow atomic assertions of the form
(, ) where  and  are, respectively, Boolean combinations of roles and Boolean
combinations of views. By using assertions of that form, one may more succinctly define more
precise access control policies. For instance, to say that subjects having the role  but not
having the role ′ possess a permission  on objects having the view  but not having the
view ′, one can simply assert that  holds for  ∧ ¬′ and  ∧ ¬′ instead of asserting that
 holds for ′′ and ′′ where ′′ is a new role such that for all subjects , (, ′′) if and only
if (, ) and not (, ′) and ′′ is a new view such that for all objects , (, ′′) if and only
if (, ) and not (, ′).
      </p>
      <p>
        Finally, it is also a great pity that neither RBAC, nor OrBAC allow conditional
assertions of the form (, )←  (′, ′). By using conditional assertions of that form, one
may more succinctly define more precise access control policies. For instance, to say that
subjects having the role  possess a permission  on objects having the view  if subjects
having the role ′ possess a permission  on objects having the view ′, one can simply
say that (, )←  (′, ′). This is particularly interesting when  does not denote
a permission, but an obligation corresponding to the permission denoted by 2. In that
case, a conditional assertion like (, )←  (, ) expresses the deontic rule saying
that subjects having the role  possess the permission  on objects having the view  if
subjects having the role  possess the corresponding obligation  on objects having the view .
Knowledge representation languages such as those provided by description logic
languages [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] (allowing expressions of the form ⊑ where  and  are complex concepts) and
rule-based reasoning paradigms such as those provided by logic programming languages [26, 34]
(allowing expressions of the form  ←  1, . . . ,   where  ,  1, . . .,   are atoms) are well-known
and widely used in Computer Science and Artificial Intelligence. Their integration in a
unique formalism would be a natural solution for many application problems requiring the
following features: allowing rule-based systems to use the vocabulary specified in ontologies
and supplementing ontological definitions by rules. Hybrid knowledge bases are the main
approaches proposed so far. They integrate some aspects of description logic and some aspects
of logic programming [
        <xref ref-type="bibr" rid="ref23">23, 24, 32, 35</xref>
        ]. Nevertheless, they hardly address all aspects of our aim:
the development of an hybrid formalism where description logics constructs are used for
defining concepts that are given as arguments to the predicates of the logic programs.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Syntax</title>
      <sec id="sec-3-1">
        <title>We introduce the syntax of our hybrid formalism.</title>
        <sec id="sec-3-1-1">
          <title>3.1. Complex Concepts</title>
          <p>Let VAR be a countable set of variable concepts (with typical members denoted ,  , etc). Let
CON be a countable set of constant concepts (with typical members denoted , , etc) and
2We are assuming the deontic principle saying that permissions are implied by their corresponding obligations [37].
ROL be a countable set of constant roles (with typical members denoted , , etc). The set of
complex concepts (with typical members denoted , , etc) is defined by the rule 3
• ::= |  | ⊤ | (⊓) | ∃.,
where  ranges over VAR,  ranges over CON and  ranges over ROL. We adopt standard
rules for omission of the parentheses. A complex concept  is VAR-free if  contains no
occurrence of a variable concept. A complex concept  is ROL-free if  contains no occurrence
of a constant role. For all ∈N, the concept construct (∃.) is inductively defined as follows
for each ∈ROL:
• if =0 then (∃.)::=,
• otherwise, (∃.)::=∃.(∃.)− 1.</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>3.2. Substitutions</title>
          <p>
            A substitution is a function from VAR to the set of all complex concepts equal to the identity
function on a cofinite subset of VAR [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ]. To apply a substitution  to a complex concept 
amounts to replace each occurrence in  of a variable concept ∈VAR by the corresponding
complex concept  ().
          </p>
        </sec>
        <sec id="sec-3-1-3">
          <title>3.3. Inclusions and Equations</title>
          <p>Concept inclusions are expressions of the form ⊑ (read “ is contained in ”) for all complex
concepts , . Concept equations are expressions of the form = (read “ is equal to ”)
for all complex concepts , .</p>
        </sec>
        <sec id="sec-3-1-4">
          <title>3.4. Clauses</title>
          <p>Let PRE be a countable set of predicate symbols (with typical members denoted , , etc). For
all ∈PRE, let ar() be the arity of . An atom is an expression of the form (1, . . . , ar())
(read “ holds for 1, . . ., ar()”) where  is a predicate symbol and 1, . . ., ar() are complex
concepts. Clauses are expressions of the form  1, . . . ,  ←  1, . . . ,   (read “if  1, . . .,   then
either  1, . . ., or  ”) where  1, . . .,  ,  1, . . .,   are atoms. Definite clauses are clauses of
the form  ←  1, . . . ,  , unit clauses are clauses of the form  ← and definite goals are clauses
of the form ←  1, . . . ,  .</p>
        </sec>
        <sec id="sec-3-1-5">
          <title>3.5. Assertions</title>
          <p>
            Let IND be a countable set of individual constants (with typical members denoted , , etc).
A concept assertion is an expression of the form : (read “ belongs to ”) where  is a
VAR-free complex concept and  is an individual constant. A role assertion is an expression
of the form :(, ) (read “ is -related to ”) where ∈ROL and  and  are individual
constants.
3The set of complex concepts we define here is the one of description logic ℰℒ [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ]. Most of our definitions can be
easily adapted to cases where other description logics are considered instead of description logic ℰℒ [
            <xref ref-type="bibr" rid="ref15 ref6 ref8">6, 8, 15</xref>
            ].
          </p>
        </sec>
        <sec id="sec-3-1-6">
          <title>3.6. Deductive Ontologies</title>
          <p>A T-box is a finite set of concept inclusions and concept equations. A program is a finite set of
clauses. An A-box is a finite set of concept assertions and role assertions. A deductive ontology
is a triple ( , Π , ) consisting of a T-box  , a program Π and an A-box .</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Semantics</title>
      <p>We introduce the semantics of our hybrid formalism4.</p>
      <sec id="sec-4-1">
        <title>4.1. Frames and Var-interpretations</title>
        <p>The semantics is defined in terms of frames, i.e. structures (, , ) where  is a nonempty
set, : CON →−  ( ) and : ROL →−  ( ×  ). In a frame (, , ), for all
∈ROL,
• the -image of a subset  of  is the set of all ∈ such that there exists ∈ such that
()(, ),
• the -pre-image of a subset  of  is the set of all ∈ such that there exists ∈ such
that ()(, ),
• the domain of  is the set of all ∈ such that there exists ∈ such that ()(, ),
• the range of  is the set of all ∈ such that there exists ∈ such that ()(, ).
Obviously, in a frame (, , ), for all ∈ROL, the domain of  is the -pre-image of
 and the range of  is the -image of  . A var-interpretation on a frame (, , ) is a
function  : VAR →−  ( ). For all frames (, , ), the value of the complex concept 
with respect to a var-interpretation  on (, , ) is the subset ‖‖ of  defined by
• ‖‖ = (),
• ‖‖ =(),
• ‖⊤‖ = ,
• ‖⊓‖ =‖‖ ∩ ‖‖ ,
• ‖∃.‖ ={ ∈  : there exists ∈ such that ()(, ) and ∈‖‖ }.
Obviously, ‖‖ does not depend on  when  is VAR-free. In that case, ‖‖ will be
denoted ‖‖.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Pre-interpretations</title>
        <p>A pre-interpretation on a frame (, , ) is a function : PRE →−  (( )⋆) such that
for all ∈PRE, ()⊆ ( )ar(). For all frames (, , ) and for all pre-interpretations 
on (, , ), the value of an atom (1, . . . , ar()) with respect to a var-interpretation 
on (, , ) is the element |(1, . . . , ar())| in {0, 1} such that
• if () contains (‖1‖ , . . . , ‖ar()‖ ) then |(1, . . . , ar())| =1,
• otherwise, |(1, . . . , ar())| =0.
4In this paper, for all sets , () denotes the set of all subsets of , ⋆ denotes the set of all tuples of elements
of  and for all ∈N,  denotes the set of all -tuples of elements of .</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Ind-interpretations</title>
        <p>An ind-interpretation on a frame (, , ) is a function : IND →−  . For all frames
(, , ) and for all ind-interpretations  on (, , ), the value of a concept assertion
: is the element |:| in {0, 1} such that
• if ‖‖ contains () then |:|=1,
• otherwise, |:|=0,
• if () contains ((), ()) then |:(, )|=1,
• otherwise, |:(, )|=0.
and the value of a role assertion :(, ) is the element |:(, )| in {0, 1} such that</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Models</title>
        <p>For all T-boxes  , a  -model (or a model of  ) is a frame (, , ) such that for all
varinterpretations  on (, , ),
• for all concept inclusions ⊑ in  , ‖‖ ⊆‖ ‖ ,
• for all concept equations = in  , ‖‖ =‖‖ .</p>
        <p>| 1| =1, . . ., or | | =1,
• for all concept assertions : in , |:|=1,
• for all role assertions :(, ) in , |:(, )|=1.</p>
        <p>For all deductive ontologies ( , Π , ), a ( , Π , )-model (or a model of ( , Π , )) is a
structure (, , , , ) consisting of a  -model (, , ), a pre-interpretation  on
(, , ) and an ind-interpretation  on (, , ) such that for all var-interpretations 
on (, , ),</p>
        <p>• for all clauses  1, . . . ,  ←  1, . . . ,   in Π , if | 1| =1, . . ., | | =1 then either
Notice that in a model (, , , , ) of a deductive ontology ( , Π , ), for all
varinterpretations  on (, , ),
• for all definite clauses  ←  1, . . . ,   in Π , if | 1| =1, . . ., | | =1 then | | =1,
• for all unit clauses  ← in Π , | | =1,
• for all definite goals ←  1, . . . ,   in Π , either | 1| =0, . . ., or | | =0.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Correspondence Theory</title>
      <sec id="sec-5-1">
        <title>We briefly present the correspondence theory of our hybrid formalism.</title>
        <p>
          Although of limited expressive power, concept constructs can be used for
characterizing classes of frames. As observed by [
          <xref ref-type="bibr" rid="ref6">6, 39</xref>
          ], description logic languages are modal languages
in disguise. Therefore, the following relationships that can be easily established for all frames
(, , ) will not come as a surprise:
(1) (, , ) is a model of  ⊑∃.⊤ if and only if () is serial5,
(2) (, , ) is a model of ∃.⊤⊑ if and only if () is empty,
(3) (, , ) is a model of  ⊑∃. if and only if () is reflexive 6,
(4) (, , ) is a model of ∃. ⊑ if and only if () is included in the identity
relation on  ,
(5) (, , ) is a model of ∃. ⊑∃.∃. if and only if () is dense7,
(6) (, , ) is a model of ∃.∃. ⊑∃. if and only if () is transitive8,
(7) (, , ) is a model of ∃.∃.⊤⊑ if and only if the -pre-image of the -pre-image
of  is empty,
(8) (, , ) is a model of ∃. =∃. if and only if () is equal to (),
(9) (, , ) is a model of ⊓⊑ if and only if () and () do not intersect,
(10) (, , ) is a model of ⊑ if and only if () is included in (),
(11) (, , ) is a model of ∃. ⊑ if and only if the domain of  is included in (),
(12) (, , ) is a model of ∃. ⊑∃.( ⊓ ) if and only if the range of  is included
in ().
        </p>
        <p>Within our setting, elementary conditions — like “() is serial”, “() is empty”, etc — are
ifrst-order conditions that can be expressed as sentences in a function-free first-order language
with equality based on a set of unary predicate symbols in one-to-one correspondence with
CON and a set of binary predicate symbols in one-to-one correspondence with ROL. As a
result, the following decision problems are of interest:
— deciding elementary definability (DED): given a T-box  , determine whether there
exists an elementary condition  such that for all frames (, , ),  holds in
(, , ) if and only if (, , ) is a model of  ,
— deciding concept definability (DCD): given an elementary condition  , determine
whether there exists a T-box  such that for all frames (, , ), (, , ) is
a model of  if and only if  holds in (, , ),
— deciding elementary equivalence (DEE): given a T-box  and an elementary condition
 , determine whether for all frames (, , ), (, , ) is a model of  if and only
if  holds in (, , ).</p>
        <p>
          DED, DCD and DEE stem from the corresponding definability problems in modal logics [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
It is not known whether DED, DCD and DEE are decidable9.
5That is to say, for all ∈ , there exists ∈ such that ()(, ).
6That is to say, for all ∈ , ()(, ).
7That is to say, for all , ∈ , if ()(, ) then there exists ∈ such that ()(, ) and ()(, ).
8That is to say, for all , ∈ , if there exists ∈ such that ()(, ) and ()(, ) then ()(, ).
9Description logic languages being modal languages in disguise [
          <xref ref-type="bibr" rid="ref6">6, 39</xref>
          ], the undecidability of DED, DCD and
DEE are immediate consequences of Chagrova’s Theorems [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] when description logic ℒ is considered instead
of description logic ℰℒ.
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Deciding Inclusions and Equations</title>
      <p>We present decision problems about concept inclusions and concept equations.
Let  be a T-box.</p>
      <p>A concept inclusion ⊑ is a logical consequence of  (denoted  |=⊑) if for all
 -models (, , ) and for all var-interpretations  on (, , ), ‖‖ ⊆‖ ‖ . A
concept equation = is a logical consequence of  (denoted  |==) if for all  -models
(, , ) and for all var-interpretations  on (, , ), ‖‖ =‖‖ . As a result, the
following decision problems are of interest:
— deciding concept inclusions (DCI): given a concept inclusion ⊑, determine whether
 |=⊑,
— deciding concept equations (DCE): given a concept equation =, determine whether
 |==.</p>
      <p>
        If  is VAR-free then DCI and DCE are in P [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]10. Otherwise, it is not known whether
DCI and DCE are decidable.
      </p>
    </sec>
    <sec id="sec-7">
      <title>7. Deciding Consequences and Answers</title>
      <p>We present decision problems about logical consequences and correct answers.
Let ( , Π , ) be a deductive ontology.</p>
      <p>A clause  1, . . . ,  ←  1, . . . ,   is a logical consequence of ( , Π , ) (denoted
( , Π , )|= 1, . . . ,  ←  1, . . . ,  ) if for all ( , Π , )-models (, , , , ) and
for all var-interpretations  on (, , ), if | 1| =1, . . ., | | =1 then either | 1| =1, . . .,
or | | =1. Notice that a definite clause  ←  1, . . . ,   is a logical consequence of ( , Π , )
if and only if for all ( , Π , )-models (, , , , ) and for all var-interpretations
 on (, , ), if | 1| =1, . . ., | | =1 then | | =1, a unit clause  ← is a logical
consequence of ( , Π , ) if and only if for all ( , Π , )-models (, , , , ) and for all
var-interpretations  on (, , ), | | =1 and a definite goal ←  1, . . . ,   is a logical
consequence of ( , Π , ) if and only if for all ( , Π , )-models (, , , , ) and for
all var-interpretations  on (, , ), either | 1| =0, . . ., or | | =0. As a result, the
following decision problems are of interest:
— deciding definite clauses (DDC): given a definite clause  ←  1, . . . ,  , determine
whether ( , Π , )|= ←  1, . . . ,  ,
— deciding unit clauses (DUC): given</p>
      <p>
        ( , Π , )|= ← ,
10See [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] when other description logics are considered instead of description logic ℰℒ.
      </p>
      <p>a
unit clause  ← ,
determine
whether
— deciding definite goals (DDG): given a definite goal ←  1, . . . ,  , determine whether
( , Π , )|=←  1, . . . ,  .</p>
      <p>A substitution  is a correct answer for the definite goal ←  1, . . . ,   with respect to ( , Π , )
if for all ( , Π , )-models (, , , , ) and for all var-interpretations  on (, , ),
| ( 1)| =1, . . ., | ( )| =1. As a result, the following decision problem is of interest:
— deciding correct answers (DCA): given a definite goal ←  1, . . . ,  , determine whether
there exists a correct answer for ←  1, . . . ,   with respect to ( , Π , ).</p>
      <p>DDC, DUC, DDG and DCA stem from the corresponding derivability problems in logic
programming [26, 34]. It is not known whether DDC, DUC, DDG and DCA are decidable11.</p>
    </sec>
    <sec id="sec-8">
      <title>8. A Research Program</title>
      <p>
        We present a research program. As can be seen from its presentation, this research program
covers diferent aspects of description logics and logic programming: recursion theory with
(RP1), computational complexity with (RP2), model theory and fixpoint theory with (RP3),
automated deduction with (RP4) and non-monotonic reasoning with (RP5). Needless to say,
to carry out it, one must neither work in isolation, nor lose sight of the possible applications of
the hybrid formalism developed in this paper. In other respect, with respect to expressivity, one
must also compare this formalism to the main approaches proposed so far. These approaches
include the above-mentioned hybrid knowledge bases [
        <xref ref-type="bibr" rid="ref23">23, 24, 30, 32, 35</xref>
        ]. They also include
approaches such as the existential rule framework [
        <xref ref-type="bibr" rid="ref13">13, 36</xref>
        ].
      </p>
      <sec id="sec-8-1">
        <title>8.1. Turing-completeness</title>
        <p>Our hybrid formalism can be seen as a programming language. It is not known whether it
is Turing-complete. When description logic ℒ is considered instead of description logic
ℰ ℒ, the Turing-completeness of our hybrid formalism can be easily proved by means of a
reduction from the Turing-completeness of Minsky machines. Hence, the following item in our
research program: (RP1) separate the description logics that do give rise to a Turing-complete
hybrid formalism from the description logics that do not. In particular, find simple and natural
conditions on concept inclusions, concept equations and clauses such that deductive ontologies
satisfying them give rise to a Turing-complete hybrid formalism.</p>
      </sec>
      <sec id="sec-8-2">
        <title>8.2. Tractability</title>
        <p>
          The success of the logic programming languages comes from the fact that it is relatively easy to
define Turing-incomplete restrictions of clauses that can be used as a domain-specific language
taking advantage of eficient algorithms developed for them [
          <xref ref-type="bibr" rid="ref19">19, 29</xref>
          ]. Thus, the following item
11When description logic ℒ is considered instead of description logic ℰℒ, the undecidability of DDC, DUC,
DDG and DCA can be easily proved by means of reductions from the undecidability of the reachability problem
in Minsky machines.
in our research program: (RP2) for the description logics that do not give rise to a
Turingcomplete hybrid formalism, separate those that do give rise to a hybrid formalism tractable in
polynomial time from those that do not. In particular, find simple and natural conditions on
concept inclusions, concept equations and clauses such that deductive ontologies satisfying
them give rise to a hybrid formalism tractable in polynomial time.
        </p>
      </sec>
      <sec id="sec-8-3">
        <title>8.3. Declarative and Fixpoint Semantics</title>
        <p>In logic programming, the declarative semantics of programs is given by the usual semantics
of first-order logic. It is defined in terms of Herbrand interpretations [ 26, 34]. In this setting,
given a program, the main result is the standard characterization of its Herbrand models as the
pre-fixpoints of some continuous mapping associated to it. Consequently, the following item
in our research program: (RP3) develop the declarative and fixpoint semantics of our hybrid
formalism. In particular, given a deductive ontology, characterize its Herbrand models as the
pre-fixpoints of some continuous mapping associated to it.</p>
      </sec>
      <sec id="sec-8-4">
        <title>8.4. Procedural Semantics</title>
        <p>
          In logic programming, the refutation procedure of interest is called SLD-resolution where an
inference step is based on the unifiability between the selected atom in a given definite goal
and the left side of a variant of a definite clause in a given program. Hence, the following item
in our research program: (RP4) develop the procedural semantics of our hybrid formalism. In
particular, considering the unification problem in description logics with empty T-boxes [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ],
adapt the related unification algorithms to the context of our hybrid formalism 12. In this respect,
the tools and techniques developed in [
          <xref ref-type="bibr" rid="ref10 ref11 ref2">2, 10, 11, 27, 28, 40</xref>
          ] might be useful.
        </p>
      </sec>
      <sec id="sec-8-5">
        <title>8.5. Negation</title>
        <p>By using conditional assertions of the form  1, . . . ,  ←  1, . . . ,  , not( 1), . . . , not( )
where  1, . . .,  ,  1, . . .,  ,  1, . . .,   are atoms, one may write more expressive deductive
ontologies. For instance, in our example about security policies, the deontic principle
saying that every non-prohibited access is permitted and the deontic principle saying that every
non-compulsory access is optional can be expressed by the following conditional assertions:
• perm(,  )← not(proh(,  )),
• opti(,  )← not(comp(,  )).</p>
        <p>
          In logic programming, the declarative semantics of a program containing, possibly, negation in
the right side of clauses is given by the so-called answer set semantics. It is defined in terms
of stable models [
          <xref ref-type="bibr" rid="ref21">21, 25, 33</xref>
          ]. In this setting, the question of the existence of stable models for
a given program is of the utmost interest. Thus, the following item in our research program:
(RP5) develop the answer set semantics of our hybrid formalism when programs contain,
possibly, negation in the right side of their clauses.
12The computability of the unification problem with arbitrary T-boxes is not known. In other respect, when
description logic ℒ is considered instead of description logic ℰℒ, the computability of the unification problem
either with empty T-boxes, or with arbitrary T-boxes is not known too.
        </p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>9. Last Words</title>
      <p>
        Our idea of an hybrid formalism where description logics constructs are used for defining
concepts that are given as arguments to the predicates of the logic programs has only one
ancestor: the formalism developed in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. In this formalism, Boolean constructs are used
for defining expressions that are given as arguments to the predicates of the logic programs,
allowing clauses of the form
• adder(, , , ,  ∨ )← halfAdder(, , ,  ), halfAdder(, , ,  ),
• halfAdder(, , ⊕ , ∧ )← .
where ,  , ,  ,  ,  and  denote propositional variables, ∨, ⊕ and ∧ denote the
Boolean constructs of, respectively, disjunction, exclusive disjunction and conjunction and
adder and halfAdder are predicate symbols of, respectively, arity 5 and arity 4. Obviously,
the Boolean expressions  ∨ , ⊕  and ∧ used in these clauses can be seen as
ROLfree complex concepts when description logic ℒ is considered instead of description logic ℰ ℒ.
Knowledge representation languages such as those provided by description logic
languages and rule-based reasoning paradigms such as those provided by logic programming
languages are well-known and widely used in Computer Science and Artificial Intelligence.
Therefore, it is quite amazing that their integration in a unique formalism similar to the
formalism proposed by [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] has not been put forward during the last 30 years. A narrow-minded
explanation would consist of saying that this lack of interest is the result of the lack of
importance of hybrid formalisms such as the one introduced in this paper. The case study
presented in Section 2 indicates that this lack of interest might just be the result of a lack of
imagination. Indeed, we believe that it is time to give space to advanced languages of terms for
ontologies as introduced in Sections 3 and 4, to consider the decision problems presented in
Sections 5, 6 and 7 and to address the research program presented in Section 8.
      </p>
    </sec>
    <sec id="sec-10">
      <title>Acknowledgments</title>
      <p>Special acknowledgement is heartily granted to Stéphane Demri, Esra Erdem, Luis Fariñas del
Cerro, Andreas Herzig, Rosalie Iemhof, George Metcalfe, Mojtaba Mojtahedi, Linh Anh Nguyen,
Christophe Ringeissen, Maryam Rostamigiv, Renate Schmidt and Tinko Tinchev for their
feedback. We also make a point of strongly thanking the referees for their useful suggestions.
programming with description logics for the semantic web’. Artificial Intelligence 172 (2011)
1495–1539.
[24] Eiter, T., Ianni, G., Lukasiewicz, T., Schindlauer, R. ‘Well-founded semantics for description
logic programs in the semantic web’. ACM Transactions on Computational Logic 12 (2011)
article 11.
[25] Erdem, E. Theory and Applications of Answer Set Programming. Doctoral thesis of the</p>
      <p>University of Texas at Austin (2002).
[26] Gabbay, D., Hogger, C., Robinson, J. Handbook of Logic in Artificial Intelligence and Logic</p>
      <p>Programming. Volume 5: Logic Programming. Oxford University Press (1998).
[27] Gencer, Ç. ‘Description of modal logics inheriting admissible rules for K4’. Logic Journal
of the IGPL 10 (2002) 401–411.
[28] Gencer, Ç., de Jongh, D. ‘Unification in extensions of K4’. Logic Journal of the IGPL 17
(2009) 159–172.
[29] Gottlob, G., Papadimitriou, C. ‘On the complexity of single-rules datalog queries’.
Information and Computation 183 (2003) 104–122.
[30] Grosof, B., Horrocks, I., Volz, R., Decker, S. ‘Description logic programs: combining logic
programs with description logic’. In: Proceedings of the 12th International Conference on World
Wide Web. ACM (2003) 48–57.
[31] Lampson, B. ‘Protection’. Operating Systems Review 8 (1974) 18–24.
[32] Levy, A., Rousset, M.-C. ‘Combining Horn rules and description logics in CARIN’. Artificial</p>
      <p>Intelligence 104 (1998) 165–209.
[33] Lifschitz, V. ‘What is answer set programming’. In: Proceedings of the Twenty-Third AAAI
Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence
(2008) 1594–1597.
[34] Lloyd, J. Foundations of Logic Programming. Springer (1987).
[35] Motik, B., Rosati, R. ‘Reconciling description logics and rules’. Journal of the ACM 57 (2010)
article 30.
[36] Mugnier, M.-L., Thomazo, M. ‘An introduction to ontology-based query answering with
existential rules’. In: Reasoning Web. Springer (2014) 245–278.
[37] Parent, X., van der Torre, L. Introduction to Deontic Logic and Normative Systems. College</p>
      <p>Publications (2018).
[38] Sandhu, R., Coyne, E., Feinstein, H., Youman, C. ‘Role-based access control models’. IEEE</p>
      <p>Computer 29 (1996) 38–47.
[39] Schild, K. ‘A correspondence theory for terminological logics: preliminary report’. In:
Proceedings of the Twelfth International Joint Conference on Artificial Intelligence. Morgan
Kaufmann (1991) 466–471.
[40] Sofronie-Stokkermans, V. ‘On unification for bounded distributive lattices’. ACM
Transactions on Computational Logic 8 (2007) article 12.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Abou</given-names>
            <surname>El Kalam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>El</surname>
          </string-name>
          <string-name>
            <surname>Baida</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Balbiani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Benferhat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Cuppens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Deswarte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Miège</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Saurel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Trouessin</surname>
          </string-name>
          , G. '
          <article-title>Organization based access control'</article-title>
          .
          <source>In: Proceedings POLICY</source>
          <year>2003</year>
          . IEEE (
          <year>2003</year>
          )
          <fpage>120</fpage>
          -
          <lpage>131</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Alizadeh</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ardeshir</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balbiani</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mojtahedi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          '
          <article-title>Unification types in Euclidean modal logics'</article-title>
          .
          <source>Logic Journal of the IGPL doi.org/10</source>
          .1093/jigpal/jzab036.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          '
          <article-title>Terminological cycles in a description logic with existential restrictions'</article-title>
          .
          <source>In: Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence</source>
          . Morgan Kaufmann (
          <year>2003</year>
          )
          <fpage>325</fpage>
          -
          <lpage>330</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brandt</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          '
          <article-title>Pushing the ℰ ℒ envelope'</article-title>
          .
          <source>In: Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence</source>
          . Morgan Kaufmann (
          <year>2005</year>
          )
          <fpage>364</fpage>
          -
          <lpage>369</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <article-title>The Description Logic Handbook</article-title>
          .
          <source>Theory, Implementation and Applications</source>
          . Cambridge University Press (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          '
          <article-title>Description logic'</article-title>
          .
          <source>In: Handbook of Modal Logic. Elsevier</source>
          (
          <year>2007</year>
          )
          <fpage>757</fpage>
          -
          <lpage>819</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morawska</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          '
          <article-title>Unification in the description logic ℰ ℒ'</article-title>
          .
          <source>In: Rewriting Techniques and Applications</source>
          . Springer (
          <year>2009</year>
          )
          <fpage>350</fpage>
          -
          <lpage>364</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nutt</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          '
          <article-title>Basic description logics'</article-title>
          .
          <source>In: The Description Logic Handbook. Theory, Implementation and Applications</source>
          . Cambridge University Press (
          <year>2003</year>
          )
          <fpage>47</fpage>
          -
          <lpage>100</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Snyder</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          '
          <article-title>Unification theory'</article-title>
          ,
          <source>In: Handbook of Automated Reasoning, Elsevier</source>
          (
          <year>2001</year>
          )
          <fpage>439</fpage>
          -
          <lpage>526</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Balbiani</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gencer</surname>
          </string-name>
          , Ç. '
          <article-title>Unification in epistemic logics'</article-title>
          .
          <source>Journal of Applied Non-Classical Logics</source>
          <volume>27</volume>
          (
          <year>2017</year>
          )
          <fpage>91</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Balbiani</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gencer</surname>
          </string-name>
          , Ç.,
          <string-name>
            <surname>Rostamigiv</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tinchev</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          '
          <article-title>About the unification type of K+□ ⊥'</article-title>
          .
          <source>Annals of Mathematics and Artificial Intelligence doi.org/10</source>
          .1007/s10472-021-09768-w.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Ben</given-names>
            <surname>Abbès</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Scheuermann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Meilender</surname>
          </string-name>
          , T.,
          <string-name>
            <surname>d'Aquin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          '
          <article-title>Characterizing modular ontologies'</article-title>
          . In: Workshop on Modular Ontologies (WoMO)
          <year>2012</year>
          .
          <article-title>CEUR-WS.org (</article-title>
          <year>2012</year>
          )
          <fpage>16</fpage>
          -
          <lpage>27</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Bienvenu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leclère</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mugnier</surname>
            ,
            <given-names>M.-L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rousset</surname>
          </string-name>
          , M.-C.
          <article-title>'Reasoning with ontologies'</article-title>
          .
          <source>In: A Guided Tour of Artificial Intelligence Research</source>
          . Springer (
          <year>2020</year>
          )
          <fpage>185</fpage>
          -
          <lpage>215</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Büttner</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simonis</surname>
          </string-name>
          , H. '
          <article-title>Embedding Boolean expressions into logic programming'</article-title>
          .
          <source>Journal of Symbolic Computation</source>
          <volume>4</volume>
          (
          <year>1987</year>
          )
          <fpage>191</fpage>
          -
          <lpage>205</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Giacomo</surname>
          </string-name>
          , G. '
          <article-title>Expressive description logics'</article-title>
          .
          <source>In: The Description Logic Handbook. Theory, Implementation and Applications</source>
          . Cambridge University Press (
          <year>2003</year>
          )
          <fpage>178</fpage>
          -
          <lpage>218</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Chagrov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chagrova</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          '
          <article-title>The truth about algorithmic problems in correspondence theory'</article-title>
          .
          <source>In: Advances in Modal Logic</source>
          . Vol.
          <volume>6</volume>
          .
          <string-name>
            <given-names>College</given-names>
            <surname>Publications</surname>
          </string-name>
          (
          <year>2006</year>
          )
          <fpage>121</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alghamdi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmidt</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walther</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          '
          <article-title>Ontology extraction for large ontologies via modularity and forgetting'</article-title>
          .
          <source>In: Proceedings of the 10th International Conference on Knowledge Capture. ACM</source>
          (
          <year>2019</year>
          )
          <fpage>45</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Cuenca</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Kazakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <surname>U.</surname>
          </string-name>
          '
          <article-title>A logical framework for modularity of ontologies'</article-title>
          .
          <source>In: Proceedings of the 20th International Joint Conference on Artificial Intelligence</source>
          . Morgan Kaufmann (
          <year>2007</year>
          )
          <fpage>298</fpage>
          -
          <lpage>303</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Dantsin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gottlob</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voronkov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          '
          <article-title>Complexity and expressive power of logic programming'</article-title>
          .
          <source>ACM Computing Surveys</source>
          <volume>33</volume>
          (
          <year>2001</year>
          )
          <fpage>374</fpage>
          -
          <lpage>425</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Del-Pinto</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmidt</surname>
          </string-name>
          , R. '
          <article-title>ABox abduction via forgetting in ALC'</article-title>
          .
          <source>In: Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence</source>
          .
          <source>AAAI</source>
          (
          <year>2019</year>
          )
          <fpage>2768</fpage>
          -
          <lpage>2775</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Diéguez</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Temporal Answer Set Programming</article-title>
          .
          <source>Doctoral thesis of the University of A Coruña</source>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Donini</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          '
          <article-title>Complexity of reasoning'</article-title>
          .
          <source>In: The Description Logic Handbook. Theory, Implementation and Applications</source>
          . Cambridge University Press (
          <year>2003</year>
          )
          <fpage>101</fpage>
          -
          <lpage>141</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ianni</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukasiewicz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schindlauer</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tompits</surname>
          </string-name>
          , H. '
          <article-title>Combining answer set</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>