<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <article-id pub-id-type="doi">10.1007/978-3-319-49493-7\_5</article-id>
      <title-group>
        <article-title>Why not? Developing ABox Abduction beyond Repairs</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Anselm Haak</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Patrick Koopmann</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yasir Mahmood</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anni-Yasmin Turhan</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Data Science Group, Paderborn University</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Knowledge Representation Group, Paderborn University</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Knowledge in Artificial Intelligence, Vrije Universiteit Amsterdam</institution>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>9885</volume>
      <fpage>3</fpage>
      <lpage>6</lpage>
      <abstract>
        <p>Abduction is the task of computing a suficient extension of a knowledge base (KB) that entails a conclusion not entailed by the original KB. It serves to compute explanations, or hypotheses, for such missing entailments. While this task has been intensively investigated for perfect data and under classical semantics, less is known about abduction when erroneous data results in inconsistent KBs. In this paper we define a suitable notion of abduction under repair semantics, and propose a set of minimality criteria that guides abduction towards 'useful' hypotheses. We provide initial complexity results on deciding existence of and verifying abductive solutions with these criteria, under diferent repair semantics and for the description logics DL-Lite and ℰℒ ⊥.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Description logics</kwd>
        <kwd>Abduction</kwd>
        <kwd>Repair semantics</kwd>
        <kwd>Inconsistency-tolerant reasoning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the context of description logic knowledge bases, the task of abduction is prominently used to explain
missing consequences. In general, given a theory and an observation, that is a formula not entailed over
the theory, abduction asks for a hypothesis, which is a collection of statements to add to the theory
in order to entail the observation. For description logics, such hypotheses are often computed for a
knowledge base and some kind of Boolean query. This general task has been intensively investigated
for description logics in many variants, depending on whether it is about extending the TBox [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1, 2, 3</xref>
        ],
the ABox [
        <xref ref-type="bibr" rid="ref10 ref4 ref5 ref6 ref7 ref8 ref9">4, 5, 6, 7, 8, 9, 10</xref>
        ], both at the same time [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ], or operating on the level of concepts [13, 14].
Prominent results range from complexity analysis [
        <xref ref-type="bibr" rid="ref1 ref6 ref8 ref9">13, 6, 1, 8, 9</xref>
        ] to implemented systems [
        <xref ref-type="bibr" rid="ref1 ref10 ref12 ref2 ref3">1, 2, 12, 3, 10</xref>
        ],
that are sometimes integrated into user frontends [15, 16].
      </p>
      <p>
        If abduction is applied to compute explanations, often minimality criteria for the hypotheses are
imposed to obtain “feasible” explanations. For example, it can be required that hypotheses are
subsetminimal to facilitate small explanations [
        <xref ref-type="bibr" rid="ref1 ref6">6, 1</xref>
        ]. Similarly, it can be of interest when generating
explanations, to limit the hypotheses to a particular signature. It has been shown that in this setting, referred
to as signature-based abduction, the complexity can be higher [
        <xref ref-type="bibr" rid="ref12 ref6 ref9">6, 12, 9</xref>
        ].
      </p>
      <p>In practical ontology-based applications, data is rarely free of errors and thus, the data that populates
the ABox in the description logic KB can easily become inconsistent. In such cases, everything would
follow from the KB, but meaningful reasoning can be regained by resorting to some kind of
inconsistencytolerant, i.e. non-monotonic, semantics such as repair semantics [17, 18] or defeasible semantics [19, 20,
21]. Repair semantics rely on restoring consistent versions of an inconsistent KB by removing minimal
sets of conflicting ABox statements. Such a restored version is known as an ABox repair. Depending
on which, of the possibly many, repairs are considered for reasoning, diferent repair semantics have
been defined and investigated in the literature mainly for ontology-mediated query answering (OMQA)
settings, see [22] for an overview. Three fundamental repair semantics entail a Boolean query, if it
holds w.r.t. some repair (brave semantics), w.r.t. all repairs (AR semantics) or w.r.t. the intersection of all
repairs (IAR semantics), respectively.</p>
      <p>
        While explanations of query entailment under repair semantics have been investigated, explaining
query non-entailment under these semantics has been addressed to a much lesser extent. In particular,
ABox abduction under repair semantics has not been studied thoroughly. In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] the explanation of
negative query entailment is defined as an abductive task and investigated for DL-Lite albeit under
the classical semantics. The works on abduction under repair semantics build on their basic notions.
Abduction over inconsistent DL-Lite KBs is studied in [23] for IAR semantics. They devise several
minimality criteria and focus rather on computation algorithms for cases that are tractable w.r.t.
data complexity. In [24], the authors define explanations for positive and negative query entailment
under repair semantics. They investigate the data complexity of verifying (preferred) explanations for
DL-Liteℛ and brave, AR and IAR semantics and show (in)tractability. We build on notions introduced
in their paper and extend some of their results. A closely related setting is studied in [25] for variants
of Datalog± . The authors concentrate on showing how removal of facts in order to restore consistency,
causes the non-entailment of the query and thus take a somewhat complementary view to [24].
      </p>
      <p>In this paper we study ABox abduction under repair semantics. We focus on flat ABox abduction,
where the hypotheses use atomic concepts only and where the observation is a Boolean instance query
(BIQ). We first need to adapt the basic definitions for abduction to the inconsistency-tolerant setting (in
Section. 3). Using repair semantics results in some subtle diferences in comparison to abduction under
classical semantics. To address these, we make some conceptual contributions to adapt to the new
setting. Since reasoning with the generated hypotheses is using repair semantics, we do not require the
hypothesis itself to be consistent. This can lead to more ABox abduction results, obviously. We extend
the set of common minimality criteria for hypotheses to new ones that are dedicated to limit the (efect
of) conflicts.</p>
      <p>
        We show also some initial complexity results for two prominent decision problems introduced for
abduction [
        <xref ref-type="bibr" rid="ref6 ref9">6, 9</xref>
        ]. Given a KB and an observation, the existence problem, is to decide whether a hypothesis
exists at all and the verification problem, is to decide whether a given set of statements is a hypothesis.
We examine these problems for flat ABox abduction using observations that are atomic BIQs in regard
of brave and AR semantics for the DLs ℰ ℒ⊥ and DL-Lite. Additionally, we cover the cases of preferred
hypotheses that are subset-minimal or cardinality-minimal and also whether or not the signature is
restricted.
      </p>
      <p>It turns out (in Section 4) that the existence problem considered without a signature restriction is
trivial under brave semantics, but for AR semantics its complexity drops to that of the complement
of brave entailment. Furthermore, deciding existence under signature restrictions keeps the same
complexity of entailment for brave semantics, but for AR semantics it increases by one complexity level
in the polynomial hierarchy for ℰ ℒ⊥.</p>
      <p>The verification problem (treated in Section 5) does not become trivial for unrestricted signatures, but
has the same complexity as entailment for general and ≤ -minimal hypotheses. In case subset-minimality
is required for hypotheses, we show that a more heterogeneous complexity landscape unfolds. For
instance, brave semantics incurs no or moderate increase in complexity depending on the DL.
All of the omitted proofs and proof details can be found in the long version of the paper [26].</p>
    </sec>
    <sec id="sec-2">
      <title>2. Preliminaries</title>
      <p>For a general introduction to description logics, we refer to the description logic textbook [27]. We
assume familiarity with computational complexity [28], in particular with the complexity classes
NL, P, NP, coNP and  2P. Additionally, DP is the class of decision problems representable as the
intersection of a problem in NP and a problem in coNP.
2.1. The Description Logics Considered: ℰ ℒ⊥ and DL-Lite</p>
      <sec id="sec-2-1">
        <title>The syntax of ℰ ℒ⊥ concepts is given by</title>
        <p>::=  ⊓  | ∃. |  | ⊤ | ⊥,
where  and  range over all concept and role names, respectively. ℰ ℒ⊥ TBoxes contain finitely many
concept inclusions  ⊑  for ℰ ℒ⊥ concepts  and .</p>
        <p>We consider the DL-Lite dialects DL-Liteℛ and DL-Litecore. In DL-Liteℛ (underlying the OWL 2
QL profile), TBoxes may contain concept inclusions of the form  ⊑  and role inclusions of the form
 ⊑ , where , ,  and  are generated by the following grammar:
 ::=  | ∃,
 ::=  | ¬,
 ::=  | − ,
 ::=  | ¬,
where  and  range over all concept and role names, respectively. Then DL-Litecore restricts DL-Liteℛ
by disallowing role inclusions, so only concept inclusions of the above form are allowed.</p>
        <p>We study instance queries (IQs), which consist of a (complex) concept and a variable: (). Boolean
instance queries (BIQs) are IQs that use an individual name instead of a variable: ().</p>
        <p>For the rest of the paper, the general term DL-Lite refers to either DL-Litecore or DL-Liteℛ. We
do so, since all of our results apply to both DLs, as our proofs only use properties shared by both DLs:
(1) entailment of atomic BIQs is NL-complete under Brave and coNP-complete under AR semantics,
(2) for a TBox  , subset-minimal  -inconsistent ABoxes  are of size 2, where  is  -inconsistent, if
⟨ , ⟩ |= ⊥, and (3) for a TBox  and atomic BIQ  , minimal  -supports of  are of size 1, where a
 -support of  is an ABox  with ⟨ , ⟩ |= .</p>
        <sec id="sec-2-1-1">
          <title>2.2. Repair Semantics</title>
          <p>If a knowledge base is inconsistent, repair semantics can “restore” consistent versions and admit
meaningful reasoning again. As it is common, we consider ABox repairs. We define these as well as
two common kinds of repair semantics next.</p>
          <p>Let  = ⟨ , ⟩ be an inconsistent knowledge base and  be a Boolean (conjunctive) query. A repair
of  is a subset ℛ ⊆  such that ⟨ , ℛ⟩ ̸|= ⊥ and there is no strict superset ℛ′ ⊃ ℛ with these
properties. The somewhat dual notion is a conflict or conflict set , which is a subset of the ABox that is
 -inconsistent and subset-minimal with this property. We denote by Conf() the set of conflicts of .
We recall entailment under brave [17] and AR semantics [18]:
•  |=Brave  if and only if there exists some repair ℛ of  such that ⟨ , ℛ⟩ |= .</p>
          <p>•  |=AR  if and only if ⟨ , ℛ⟩ |=  for every repair ℛ of .</p>
          <p>The complexity of query entailment under repair semantics is well understood [29]. Precisely, checking
entailment of atomic BIQs under Brave semantics is NL-complete for DL-Lite and NP-complete for
ℰ ℒ⊥ in combined complexity, whereas under AR semantics it is coNP-complete for both DLs.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. ABox Abduction for Inconsistent KBs</title>
      <p>The central task of abduction is to compute abductive hypotheses. We define these for non-entailed
BIQs under repair semantics.</p>
      <p>Definition 1. Let  = ⟨ , ⟩ be an inconsistent KB,  be an atomic BIQ (called an observation) and
 ∈ {Brave, AR} such that  ̸|=  . Then, a pair ⟨, ⟩ is called an -abduction problem. A solution
for such a problem, called -hypothesis, is an ABox ℋ such that ⟨ ,  ∪ ℋ⟩ |=  . An -hypothesis
ℋ is called
1. flat, if ℋ contains no complex concepts;
2. over  , if ℋ uses only names from signature  , where  is a set of concept, role and individual
names;
3. conflict-confining, if Conf(⟨ ,  ∪ ℋ⟩) = Conf().</p>
      <p>Note that for an -abduction problem ⟨, ⟩ we require that  is inconsistent and  ̸|=  . So, we
consider only the so-called promise problem, i.e. the problem restricted to these particular inputs. The
restriction aligns with the intuition that one asks for an -hypothesis if it is already known that the
knowledge base is inconsistent and the observation is not -entailed in . In contrast, if we instead
assume that  is consistent and  is not entailed by  under classical semantics, we obtain classical
abduction problems. In this case, we call an ABox ℋ hypothesis for  under classical semantics, if
⟨ ,  ∪ ℋ⟩ ̸|= ⊥ and ⟨ ,  ∪ ℋ⟩ |= .</p>
      <p>While the first two properties of -hypotheses from Definition 1 are standard for abduction, the last
one adapts the idea of a hypothesis not introducing any inconsistencies to the setting, where the KB is
already inconsistent to begin with. It can equivalently be defined by requiring that ⟨ , ℛ ∪ ℋ⟩ ̸|= ⊥ for
every repair ℛ of . Note that this property might not always be desired. We consider the following
reasoning problems for a given -abduction problem.</p>
      <sec id="sec-3-1">
        <title>Definition 2 (Reasoning Problems). Given an -abduction problem ⟨, ⟩. 1. The existence problem asks whether ⟨, ⟩ has a solution; 2. The verification problem asks whether a given ABox ℋ is a hypothesis for ⟨, ⟩.</title>
        <p>To obtain hypotheses that are meaningful for explanation purposes, minimality criteria that yield
preferred hypotheses have been defined already for abduction under classical semantics. We restate
some of them and extend this set of criteria to also treat conflicts.</p>
        <p>Definition 3. Let  ∈ {Brave, AR}, ⟨, ⟩ be an -abduction problem, where  = ⟨ , ⟩, and let ℋ
be an -hypothesis for ⟨, ⟩. Considering ⪯ ∈ {⊆, ≤}, ℋ is called
1. ⪯-minimal, if there is no -hypothesis ℋ ′ for ⟨, ⟩ such that ℋ ′ ≺ ℋ;
2. ⪯ -minimal, if there is no -hypothesis ℋ′ for ⟨, ⟩ such that Conf(⟨ ,  ∪ ℋ′⟩) ≺</p>
        <p>Conf(⟨ ,  ∪ ℋ⟩).</p>
        <p>We use the term subset-minimal for ⊆ -minimal and cardinality-minimal for ≤ -minimal. For any
(reasonable) combinations of repair semantics, the above properties, and minimality criteria, we consider
the corresponding computational problems introduced in Definition 2.</p>
        <p>Under certain repair semantics, already standard reasoning tasks such as query answering can
behave in unexpected ways. This also holds true for abduction of ⊆ -minimal AR-hypotheses, due to
reasoning being inherently non-monotonic in this case, as the following interesting efect illustrates.
More precisely, the set of AR-hypotheses for a given AR-abduction problem ⟨, ⟩ does not need to be
convex with respect to the subset-relation. We illustrate this by a small example KB  = ⟨ , ∅⟩ and
ABoxes 1 ⊊  2 ⊊  3 such that ⟨ , 1⟩ |=AR () and ⟨ , 3⟩ |=AR (), but ⟨ , 2⟩ ̸|=AR ().
This can be achieved by defining the TBox and the ABoxes as follows:
 := {1 ⊓ 2 ⊑ ⊥, 1 ⊓ 2 ⊑ ⊥, 1 ⊓ 1 ⊑ , 2 ⊓ 1 ⊑ ,  ⊑ },
1 := {1(), 2(), 1()}, 2 := 1 ∪ {2()}, 3 := 2 ∪ {()}
This efect implies that ⊆ -minimality cannot be checked locally by only considering subsets that remove
one assertion at a time. Instead, one seems to need a global check for all subsets.</p>
        <p>In classical abduction, one further considers semantically minimal hypotheses ℋ, for which there
exists no hypothesis ℋ′ such that ⟨ ,  ∪ ℋ⟩ |= ℋ′, but ⟨ ,  ∪ ℋ′⟩ ̸|= ℋ. We argue that while such
a minimality criterion is natural for AR-semantics, its meaning is unclear for Brave-hypotheses. For
instance, what does semantic minimality tell about two Brave-hypotheses entailing the observation,
but in possibly diferent repairs? Further exploration of this minimality criterion is therefore left for
future work.
DL-Lite
ℰℒ⊥</p>
        <p>Brave
AR
Brave
AR
general
Trivial</p>
        <p>NL
Trivial
coNP
signature ≤-min</p>
        <p>NL
in  2P</p>
        <p>NP
 2P</p>
        <p>Verification</p>
        <p>⊆-min</p>
        <p>NL
coNP</p>
        <p>NP
coNP</p>
        <p>NL</p>
        <p>DP
DP-hard, in Π2P
DP-hard, in Π2P</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Existence Problem</title>
      <p>We study in this section the complexity of the existence problem for both ℰ ℒ⊥
and without a given signature, under brave and AR semantics. Observe that for  ∈ {Brave, AR},
the existence of any -hypothesis implies the existence of a minimal one for all of the introduced
minimality criteria. Therefore, we only consider the existence problem for general -hypotheses. We
begin with the case where no signature is given. Further, the fact that the singleton set containing only
and DL-Lite, with
the observation can be a hypothesis leads to the problem degenerating to a special case of entailment,
or even becoming trivial. This also lends additional motivation to study the signature-based setting
next, where such trivial hypotheses can be prevented.</p>
      <sec id="sec-4-1">
        <title>4.1. Unrestricted Signature Hypothesis — Admitting Trivial Hypotheses</title>
        <p>As we only consider atomic BIQs as observations  , the set {} is an ABox and, therefore, a candidate
for a hypothesis for  . We study in this section how this trivial hypothesis afects the complexity of the
existence problem for -hypotheses, where  ∈ {Brave, AR}.</p>
        <p>Let ⟨, ⟩
the set ℋ = {}
be an -abduction problem, where  = ⟨ , ⟩. In case of  = Brave, it is easy to see that
is a Brave-hypothesis for ⟨, ⟩ , as  is contained in some repairs of ⟨ ,  ∪ {}⟩ .
Hence, a Brave-hypothesis always exists. The case of AR semantics is slightly more interesting, as an
AR-hypothesis need not exist in general, even if trivial hypotheses are allowed. Interestingly, in this
case the complexity of the existence problem becomes a special case of AR entailment that has the
same complexity as non-entailment under brave semantics for both DLs. In case of ℰ ℒ⊥, this means
that checking existence of AR-hypotheses has the same complexity as AR entailment. In contrast, for
DL-Lite this gives a complexity of coNL = NL, which is the complexity of brave entailment.
Lemma 4. Let ⟨, ⟩
 ̸|=Brave ¬. 1</p>
        <p>be an AR-abduction problem. The following are equivalent: (1) there is an
ARhypothesis for ⟨, ⟩ , (2) {} is an AR-hypothesis for ⟨, ⟩ , (3) {} is conflict-confining for
, and (4)
DL-Lite. Moreover, the problem is trivial for Brave-hypotheses in both DLs.</p>
        <p>Theorem 5. The existence problem for AR-hypotheses is coNP-complete for ℰ ℒ⊥ and NL-complete for
not conflict-confining.</p>
        <p>Note that the equivalence of {}</p>
        <p>being an AR-hypothesis for  and {}
means that this result applies both to general and conflict-confining AR-hypotheses. The set
being conflict-confining
a conflict-confining AR-hypothesis also implies that there is a conflict-confining Brave-hypothesis

{}
being
remains open: There are cases where there is a conflict-confining Brave-hypothesis for
(namely {} ). Still, the complexity of the existence problem for conflict-confining Brave-hypothesis
 , but {} is
1Here, entailment of ¬ has the usual meaning, even if negation is not in the logical language.
As we just have seen, checking existence of hypotheses without additional restrictions degenerates to
entailment, or even a special case of entailment, because the observation itself can be a hypothesis. A
natural way to prevent this is to restrict the signature of hypotheses, that is, only consider hypothesis
over some signature  as defined in Definition 1.</p>
        <p>We begin by characterizing the complexity for consistent KBs under classical semantics. It turns out
that this classical abduction problem is NP-complete. Then we consider the setting with inconsistent
KBs under repair semantics and prove that the NP-membership still holds under brave semantics.
However, the complexity rises to  2P-complete under AR semantics.</p>
        <p>Theorem 6. For ℰ ℒ⊥, the existence problem for hypotheses under classical semantics over a given signature
 is NP-complete.</p>
        <p>The Inconsistent Case. Now we analyse the case of inconsistent KBs and repair semantics.
Theorem 7. For ℰ ℒ⊥, the existence problem for -hypotheses over a given signature  is (1) NP-complete
for  = Brave, and (2)  2P-complete for  = AR.</p>
        <p>Proof. For (1): An NP-algorithm for the problem can guess a hypothesis ℋ over the signature  and, at
the same time, guess a repair ℛ of the ABox. Then, verify that ⟨ , ℛ ∪ ℋ⟩ ̸|= ⊥ and ⟨ , ℛ ∪ ℋ⟩ |= 
in polynomial time. The NP-hardness can be shown by slightly adapting the reduction in Theorem 6,
adding an artificial inconsistency over fresh concepts not in .</p>
        <p>For (2): The following algorithm shows  2P-membership: Guess a set ℋ such that for all repairs
ℛ of ⟨ ,  ∪ ℋ⟩, we have ⟨ , ℛ⟩ |=  . This requires NP-time to guess the set ℋ and an NP-oracle
to guess a repair ℛ as a counter example to the entailment, thus resulting in  2P-membership. For
hardness, we reduce from the standard  2P-complete problem QBF2: Instances of QBF2 are of the
form  := ∃ ∀ ′, where  ′ is a Boolean formula over variables  =  ∪ . Without loss of
generality, we can assume that  ′ = ¬ for some Boolean formula  in CNF. The problem asks
whether  is valid (or true). We construct the following KB  = ⟨ , ⟩, using concept names
 = {, ¯ |  ∈ } ∪ { |  ∈  } ∪ { |  ∈ } ∪ {  ,  ¯, }. The TBox  contains the
following sets of axioms:
{ ⊓ ¯ ⊑ ⊥ |  ∈ }
{ℓ ⊑  | ℓ ∈ ,  ∈ }
{⊓∈  ⊑  ,  ⊓  ¯ ⊑ ⊥}
{ ⊑ , ¯ ⊑  |  ∈  }
{⊓∈  ⊓  ¯ ⊑ }</p>
        <p>(ensures a valid assignment over ),
(each clause is satisfied),
(the formula  is satisfied),
(hypotheses over  are assignments over  ), and
(confirm the above with a concept name ).</p>
        <p>Further, let  := {(), ¯() |  ∈ } ∪ { ¯()} for an individual name . Finally, let
 := {} ∪ {, ¯ |  ∈  } and  := (). Now ⟨, ⟩ together with the signature  is the
desired abduction problem.</p>
        <p>We first observe that ⟨, ⟩ is a valid AR-abduction problem: Obviously,  |= ⊥ when  is
nonempty, due to both () and ¯() being present in the ABox for every  ∈ . Also,  ̸|=AR  , as
 does neither involve the concept name  nor any of the concept names , ¯, or  for  ∈  . The
following claim states correctness of the reduction.</p>
        <p>Claim 1.  is true if and only if  has an AR-hypothesis over the signature  in .</p>
        <p>Claim Proof. “=⇒”: Suppose  is true. Then there is an assignment  ⊆ Lit( ) such that for all
assignments  ⊆ Lit() , ¬[, ] is true. Here, Lit(·) denotes the set of literals over a given set of
variables. We construct an AR-hypothesis for  from . Let ℋ = {() |  ∈ }. Obviously, ℋ is
an ABox over  . Also, it does not violate any axiom of the form  ⊓ ¯ ⊑ ⊥, since  is an assignment.</p>
        <p>We prove that ⟨ ,  ∪ ℋ⟩ |=AR  . Consider any repair ℛ of ⟨ ,  ∪ ℋ⟩. As ⟨ , ℛ⟩ ̸|= ⊥, ℛ does
not violate any axiom of the form  ⊓ ¯ ⊑ ⊥. Hence, ℛ ∩ {(), ¯() |  ∈ } corresponds
to (potentially partial) assignments ℛ ⊆  and ℛ over  and , respectively. We first prove that
⟨ , ℛ⟩ ̸|=  (). Suppose to the contrary, that ⟨ , ℛ⟩ |=  (). As ℛ is consistent with  , this only
happens by triggering the axiom ⊓∈  ⊑  , and in turn an axiom of the form ℓ ⊑  for each
clause  ∈  . But this means that ℛ ∪ ℛ, and hence also  ∪ ℛ, is a satisfying assignment for  , which
is a contradiction to ¬[, ] being true for all assignments  over . Indeed, as this argument covers the
case ℛ = , subset-maximality of repairs further yields that ℋ ⊆ ℛ . Moreover, subset-maximality
together with the fact that ⟨ , ℛ⟩ ̸|=  () yields that  ¯() ∈ ℛ. Consequently, ⟨ , ℛ⟩ |= ().</p>
        <p>“⇐=”: Suppose  is false. Then, for each assignment  ⊆ Lit( ) , there is an assignment  ⊆ Lit()
such that ¬[, ] is false or, equivalently, [, ] is true. The latter can be stated as: each clause  ∈ 
contains some literal ℓ ∈  with ℓ ∈  ∪ .</p>
        <p>We now prove that  does not have any AR-hypothesis over  in . For contradiction, assume that
ℋ ⊆ { () |  ∈ Lit( )} is such a hypothesis and consider any repair ℛ of ⟨ ,  ∪ ℋ⟩. As ℛ does
not violate any axiom of the form  ⊓ ¯ ⊑ ⊥, the subset ℛ := ℛ ∩ {(), ¯() |  ∈  }
corresponds to a potentially partial assignment ℛ over  . On the other hand, as ⟨ , ℛ⟩ |= (), we
also have ⟨ , ℛ⟩ |= ⊓∈ (). Therefore, ℛ contains at least one assertion from {(), ¯()}
for each  ∈  , i.e. that ℛ is a full assignment over  . By our assumption, there is an assignment 
over  s.t. [ ℛ, ] is true.</p>
        <p>Let ℛ := ℛ ∪ {ℓ() | ℓ ∈ }. Obviously, ℛ does not violate any of the disjointness axioms
in  , as it does not contain  ¯() and ℛ ∪  is an assignment over . This further means that
⟨ , ℛ⟩ ̸|= (). Furthermore, ℛ is subset-maximal: As both ℛ and  are full assignments, we
cannot add any assertion of the form () or ¯() for  ∈  without violating one of the
disjointness axioms. Also, as [ ℛ, ] is true, we have ⟨ , ℛ⟩ |=  (). Hence, we also cannot add
 ¯() without violating the corresponding disjointness axiom. This shows that ℛ is a repair of
⟨ ,  ∪ ℋ⟩ that does not entail , contradicting our assumption.</p>
        <p>This proves the correctness of the claim and establishes the theorem. ■</p>
        <p>We now turn to DL-Lite, where we show that checking existence for Brave-hypotheses has the same
complexity as Brave entailment.</p>
        <p>Theorem 8. For DL-Lite, the existence problem for Brave-hypotheses over a given signature  is
NLcomplete.</p>
        <p>Regarding AR-semantics for DL-Lite, it is easy to see that  2P-membership can be shown in the
same way as for ℰ ℒ⊥ in the proof of Theorem 7. Determining the precise complexity for this case
remains open for now.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Verification Problem</title>
      <p>The verification problem does not become quite as easy even without restricting the signature, so even if
trivial hypotheses are allowed. Interestingly, we even show that in case of ⊆ -minimality the complexity
goes beyond that of entailment under repair semantics in some cases. We begin with the case of general
and ≤ -minimal hypotheses for ℰ ℒ⊥, where the complexity of the corresponding entailment problem is
inherited.</p>
      <p>Lemma 9. For ℰ ℒ⊥, the verification problem for -hypotheses is (1) NP-complete for  = Brave, and (2)
coNP-complete for  = AR. This also applies to ≤-minimal hypotheses.</p>
      <p>We prove next that the complexity of verification rises to DP-completeness for ⊆ -minimal
hypotheses. The complexity gap between verifying ⊆ and ≤ hypotheses seems somewhat surprising at first.
Nevertheless, the “lower” complexity of verifying ≤ -minimal hypothesis can be explained by observing
that a ≤-minimal hypothesis has size one (namely, {} itself).</p>
      <p>Theorem 10. For ℰ ℒ⊥, verification for ⊆ -minimal Brave-hypotheses is DP-complete, whereas verification
for AR-hypotheses is DP-hard and in Π2P.</p>
      <p>Proof. For membership, observe that ℋ is a ⊆ -minimal -hypothesis if and only if (1) ⟨ ,  ∪ ℋ⟩ |= 
and (2) for all subsets ℋ′ ⊊ ℋ , we have ⟨ ,  ∪ ℋ⟩ ̸|   . In the case of Brave-hypotheses, (1) is
=
instance checking for ℰ ℒ⊥ and hence in NP, while (2) can be checked in coNP by universally guessing
a subset ℋ′ and repair ℛ of ⟨ ,  ∪ ℋ′⟩ and checking that ⟨ , ℛ⟩ ̸|=  in polynomial time. Hence, the
problem is contained in DP. Analogous reasoning under AR semantics yields that (1) can be checked in
coNP, whereas checking (2) requires an oracle to decide non-entailment under AR semantics for each
ℋ′ ⊆ ℋ. This shows coNP NP-membership.</p>
      <p>For hardness, we reduce from a combination of instance checking and its complement problem to
our verification of hypotheses. Given an instance ⟨,  1,  2⟩, the problem asks whether  |=  1
and  ̸|   2, where  ∈ {Brave, AR}. This problem is DP-complete because the first question
=
is NP-complete and the second question is coNP-complete under Brave semantics and vice versa
under AR semantics. For the reduction, assume  1 = (),  2 = (), and  = ⟨ , ⟩. We
construct a KB ′, an observation  , and a hypothesis ℋ as illustrated next. Let ′ := ⟨ ′, ⟩ with
 ′ =  ∪ { ⊑ ,  ⊓  ⊓  ⊑ },  := (), and ℋ := {(), ()} for fresh concepts , , .
The instance is a valid abduction problem, since ′ ̸|=  (in particular, due to ()). Intuitively, ℋ
is a Brave-hypothesis for  in ′ if and only if  |=Brave () and ℋ is subset-minimal if and only if
 ̸|=Brave (). It remains to show correctness, i.e., ℋ is a ⊆ -minimal hypothesis for  in ′ if and
only if  |=Brave  1 and  ̸|=Brave  2.</p>
      <p>We conclude by observing that the above correctness proof works if we replace every Brave-entailment
by AR-entailment.</p>
      <p>We now turn to the case of DL-Lite. We begin by an observation on ⊆ -minimal (and ≤ -minimal)
Brave-hypotheses, namely that they always have cardinality 1.</p>
      <p>Lemma 11. For DL-Lite, if ℋ is a ⊆ -minimal or ≤ -minimal Brave-hypothesis for some Brave-abduction
problem ⟨, ⟩, then |ℋ| = 1.</p>
      <p>The next theorem establishes the complexity of the verification problem for Brave-hypotheses in
DL-Lite, in the general, ≤-minimal and ⊆-minimal case.</p>
      <p>Theorem 12. For DL-Lite, the verification problem for general, ≤ -minimal and ⊆ -minimal
Bravehypotheses is NL-complete.</p>
      <p>Finally, we turn towards the case of AR semantics.</p>
      <p>Theorem 13. For DL-Lite, the verification problem for AR-hypotheses is (1) coNP-complete for general
and ≤-minimal hypotheses, and (2) DP-hard for ⊆-minimal ones with membership in Π 2P.
Proof. General hypotheses: Regarding membership, observe that the question can be answered by
checking whether ⟨ ,  ∪ ℋ⟩ |=AR  . Hence, the complexity follows from that of AR-entailment for
DL-Lite. For hardness, we reuse the following reduction from unsatisfiability and AR-entailment [ 24].
Let  = { 1, . . . , } over propositions  = {1, . . . , }, where the  are clauses. We construct
 = ⟨ , ⟩ using a single concept name  and role names  = {, ,  }, where
 = {∃ −</p>
      <p>⊑ ¬∃ − , ∃ ⊑ ¬∃ − , ∃ ⊑ ¬∃ − , ∃ ⊑ }, and
 = { ( , ) |  ∈  } ∪ { ( , ) | ¬ ∈  } ∪ { (,  ) |  ≤ }.</p>
      <p>Moreover, let  := (). It is known that  |=AR () if and only if  is unsatisfiable [ 24]. To show
hardness of the verification problem at hand, let ℋ := { (,  ) |  ≤ } and ′ := ⟨ ,  ∖ ℋ⟩. Clearly,
ℋ is an AR-hypothesis for  in  ′ if and only if ⟨ ,  ∪ ℋ⟩ |=AR  if and only if  is unsatisfiable.</p>
      <p>Cardinality-minimal hypotheses: For membership, recall that for a given AR-abduction problem ⟨, ⟩ ,
the singleton set {} is a solution if and only if there is any solution by Lemma 4. Hence, we can use
the algorithm for general hypotheses and additionally check that |ℋ| = 1, yielding coNP-membership.</p>
      <p>For hardness, we again adapt the reduction from unsatisfiability to AR-entailment. In particular, we
modify the given CNF-formula before applying the reduction to ensure that a specific singleton ABox
is an AR-hypothesis if and only if the CNF-formula is unsatisfiable. Let  = { 1, . . . , } over variables
 = {1, . . . , }. Define</p>
      <p>′ :=  ∪ {+1} for 1 ≤  ≤ ,
′+1 := ¬+1 ∨ +2, and
′+2 := ¬+2
and let  1 := {′1, . . . , ′</p>
      <p>+1} and  2 :=  1 ∪{′+2}. Analogously to the construction of  from  in the
hardness proof for general hypotheses above, we construct knowledge bases  = ⟨ , ⟩ from   for
 ∈ {1, 2}. Further, define 2′ := ⟨ , 2 ∖ { (, +2)}⟩. In order to show coNP-hardness, it remains
to show that ⟨2′, ()⟩ is a valid AR-abduction problem and ℋ = { (, +2)} is a (≤ -minimal)
solution to it if and only if  is unsatisfiable.</p>
      <p>Subset-minimal hypotheses: We can prove Π2P-membership similar to the case of ℰ ℒ⊥ in Theorem 10.
For DP-hardness, we reuse the above reduction but first introduce some terminology. Given a formula
 in CNF, a collection  ⊆  of clauses is a minimal unsatisfiable subset (MUS) of  if  is unsatisfiable
but  ′ is satisfiable for every  ′ ⊂  . It can be observed that the subset-minimal AR-hypotheses ℋ
for  in ′ correspond precisely to MUSes  ℋ for  by taking  ∈  ℋ ⇐⇒  (,  ) ∈ ℋ. Then,
the claim follows by observing that the problem to decide if a set of clauses is a MUS is DP-hard [30].
For hardness, we reuse the reduction from above and encode a given set  into the hypothesis as
ℋ = { (,  ) |  ∈ }.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion and Future Work</title>
      <p>Summary. In this paper, we provided an initial study on ABox abduction under repair semantics building
on the work from [23]. Our main contributions include new minimality criteria for preferred hypotheses
w.r.t. inconsistent KBs and initial complexity results for the existence and the verification problem
for flat ABox abduction and atomic BIQs as observations. Our results on combined complexity show
that with an unrestricted signature, the complexity can be lower than for the entailment under repair
semantics, while signature restrictions can make the problems computationally harder. Verification
stays as hard as deciding classical entailment, but the choice of minimality criteria can increase the
complexity (e.g., ⊆-minimality).</p>
      <p>Future Work. For our initial setting considered, we have a complete picture of the complexity regarding
Brave semantics, whereas the complexity analysis for AR semantics has some gaps. It seems that these
gaps can be explained by the non-convex behavior of AR-hypotheses that was illustrated in Section 3.
We plan to explore these efects further and complete the complexity landscape for the considered
problems and more expressive formulas as observations. Moreover, the complexity when considering
conflict-confining hypotheses also remains open for certain cases, even for Brave-semantics. Having
established a complete picture regarding the combined complexity, we also intend to see the efect of a
ifxed TBox by considering the data complexity. One can observe that several results from the current
paper already transfer to the data complexity since the employed reductions result in a fixed TBox.</p>
      <p>
        There are many directions for future work regarding extensions of the fairly limited initial setting
studied here. One particularly interesting direction is to explore the related problems from the literature
on abduction, such as necessity and relevance of axioms in hypotheses, which have been treated to
a certain extent in [24]. Moreover, the abduction problem with size restrictions has been considered
before in propositional logic [31, 32]. In our setting, it seems interesting to impose size restrictions for
a hypothesis but also for the corresponding set of conflicts. Additionally, the signature-based settings
considered previously only restrict concepts and roles [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. This has the efect that the hypotheses may
get exponentially large already for ℰ ℒ⊥. It is therefore worth exploring whether the inconsistency of
KBs poses any additional challenges resulting in another blow-up. We also aim to define a suitable and
meaningful notion of semantically minimal hypothesis under repair semantics in future work.
      </p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>We thank the anonymous reviewers for insightful comments and constructive feedback. The third
author appreciates funding by DFG grant TRR 318/1 2021 – 438445824.</p>
    </sec>
    <sec id="sec-8">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools.
Representation and Reasoning, KR 2020, AAAI Press, 2020, pp. 592–602. URL: https://doi.org/10.
24963/kr.2020/59.
[13] M. Bienvenu, Complexity of abduction in the ℰ ℒ family of lightweight description logics, in:
Proceedings of the Eleventh International Conference on Principles of Knowledge Representation
and Reasoning, KR 2008, AAAI Press, 2008, pp. 220–230. URL: http://www.aaai.org/Library/KR/
2008/kr08-022.php.
[14] B. Glimm, Y. Kazakov, M. Welt, Concept abduction for description logics, in: Proceedings of the
35th International Workshop on Description Logics (DL 2022) co-located with Federated Logic
Conference (FLoC 2022), Haifa, Israel, August 7th to 10th, 2022, 2022. URL: https://ceur-ws.org/
Vol-3263/paper-11.pdf.
[15] C. Alrabbaa, S. Borgwardt, T. Friese, A. Hirsch, N. Knieriemen, P. Koopmann, A. Kovtunova,
A. Krüger, A. Popovic, I. S. R. Siahaan, Explaining reasoning results for OWL ontologies with evee,
in: Proceedings of the 21st International Conference on Principles of Knowledge Representation
and Reasoning, KR 2024, AAAI Press, 2024. URL: https://doi.org/10.24963/kr.2024/67.
[16] J. Boborová, J. Kloc, M. Homola, J. Pukancová, Towards CATS: A modular ABox abduction solver
based on black-box architecture (extended abstract), in: Proceedings of the 37th International
Workshop on Description Logics (DL 2024), volume 3739 of CEUR Workshop Proceedings,
CEURWS.org, 2024. URL: https://ceur-ws.org/Vol-3739/abstract-8.pdf.
[17] M. Bienvenu, R. Rosati, Tractable approximations of consistent query answering for robust
ontology-based data access, in: F. Rossi (Ed.), IJCAI 2013, Proceedings of the 23rd International
Joint Conference on Artificial Intelligence, Beijing, China, August 3-9, 2013, IJCAI/AAAI, 2013, pp.
775–781. URL: http://www.aaai.org/ocs/index.php/IJCAI/IJCAI13/paper/view/6904.
[18] D. Lembo, M. Lenzerini, R. Rosati, M. Ruzzi, D. F. Savo, Inconsistency-tolerant query answering in
ontology-based data access, J. Web Semant. 33 (2015) 3–29. doi:10.1016/J.WEBSEM.2015.04.
002.
[19] G. Casini, T. A. Meyer, K. Moodley, U. Sattler, I. Varzinczak, Introducing defeasibility into OWL
ontologies, in: Proceedings of the 14th International Semantic Web Conference, volume 9367 of
Lecture Notes in Computer Science, Springer, 2015, pp. 409–426. doi:10.1007/978-3-319-25010-6\
_27.
[20] P. A. Bonatti, M. Faella, I. M. Petrova, L. Sauro, A new semantics for overriding in description
logics, Artif. Intell. 222 (2015) 1–48. doi:10.1016/J.ARTINT.2014.12.010.
[21] M. Pensel, A. Turhan, Reasoning in the defeasible description logic ℰ ℒ - computing standard
inferences under rational and relevant semantics, Int. J. Approx. Reason. 103 (2018) 28–70. doi:10.
1016/J.IJAR.2018.08.005.
[22] M. Bienvenu, A short survey on inconsistency handling in ontology-mediated query answering,</p>
      <p>Künstliche Intell. 34 (2020) 443–451. doi:10.1007/S13218-020-00680-9.
[23] J. Du, K. Wang, Y. Shen, Towards tractable and practical abox abduction over inconsistent
description logic ontologies, in: Proceedings of the Twenty-Ninth AAAI Conference on Artificial
Intelligence, AAAI Press, 2015, pp. 1489–1495. URL: https://doi.org/10.1609/aaai.v29i1.9393.
[24] M. Bienvenu, C. Bourgaux, F. Goasdoué, Computing and explaining query answers over
inconsistent DL-Lite knowledge bases, Journal of Artificial Intelligence Research 64 (2019) 563–644.
[25] T. Lukasiewicz, E. Malizia, C. Molinaro, Explanations for negative query answers under
inconsistency-tolerant semantics, in: Proceedings of the Thirty-First International Joint
Conference on Artificial Intelligence, IJCAI-22, ijcai.org, 2022, pp. 2705–2711. doi: 10.24963/IJCAI.
2022/375.
[26] A. Haak, P. Koopmann, Y. Mahmood, A.-Y. Turhan, Why not? developing abox abduction beyond
repairs, CoRR abs/2507.21955 (2025). arXiv:2507.21955.
[27] F. Baader, I. Horrocks, C. Lutz, U. Sattler, An Introduction to Description Logic, Cambridge</p>
      <p>University Press, 2017.
[28] N. Pippenger, Theories of computability, Cambridge University Press, 1997.
[29] M. Bienvenu, C. Bourgaux, Inconsistency-tolerant querying of description logic knowledge bases,
in: Reasoning Web: Logical Foundation of Knowledge Graph Construction and Query Answering</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>F.</given-names>
            <surname>Wei-Kleiner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Dragisic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Lambrix</surname>
          </string-name>
          ,
          <article-title>Abduction framework for repairing incomplete ℰ ℒ ontologies: Complexity results and algorithms</article-title>
          ,
          <source>in: Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence</source>
          , AAAI Press,
          <year>2014</year>
          , pp.
          <fpage>1120</fpage>
          -
          <lpage>1127</lpage>
          . URL: http://www.aaai.org/ ocs/index.php/AAAI/AAAI14/paper/view/8239.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wan</surname>
          </string-name>
          , H. Ma,
          <article-title>Practical TBox abduction based on justification patterns</article-title>
          ,
          <source>in: Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>1100</fpage>
          -
          <lpage>1106</lpage>
          . URL: http: //aaai.org/ocs/index.php/AAAI/AAAI17/paper/view/14402.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.</given-names>
            <surname>Haifani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tourret</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Weidenbach</surname>
          </string-name>
          ,
          <article-title>Connection-minimal abduction in ℰ ℒ via translation to FOL</article-title>
          , in: J.
          <string-name>
            <surname>Blanchette</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Kovács</surname>
          </string-name>
          , D. Pattinson (Eds.),
          <source>Proceedings of the 11th International Joint Conference on Automated Reasoning IJCAR 2022</source>
          , volume
          <volume>13385</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2022</year>
          , pp.
          <fpage>188</fpage>
          -
          <lpage>207</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>031</fpage>
          -10769-6_
          <fpage>12</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Klarman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Endriss</surname>
          </string-name>
          , S. Schlobach,
          <article-title>ABox abduction in the description logic ℒ</article-title>
          ,
          <source>Journal of Automated Reasoning</source>
          <volume>46</volume>
          (
          <year>2011</year>
          )
          <fpage>43</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>K.</given-names>
            <surname>Halland</surname>
          </string-name>
          , K. Britz, ABox abduction in ℒ
          <article-title>using a DL tableau, in: Proceedings of the South African Institute for Computer Scientists</article-title>
          and Information Technologists Conference, SAICSIT '12,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2012</year>
          , p.
          <fpage>51</fpage>
          -
          <lpage>58</lpage>
          . URL: https: //doi.org/10.1145/2389836.2389843. doi:
          <volume>10</volume>
          .1145/2389836.2389843.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ortiz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Simkus</surname>
          </string-name>
          , G. Stefanoni,
          <article-title>Reasoning about explanations for negative query answers in DL-Lite</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Artif</surname>
          </string-name>
          .
          <source>Intell. Res</source>
          .
          <volume>48</volume>
          (
          <year>2013</year>
          )
          <fpage>635</fpage>
          -
          <lpage>669</lpage>
          . URL: https://doi.org/10.1613/jair.3870. doi:
          <volume>10</volume>
          .1613/jair.3870.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Del-Pinto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          , ABox abduction via forgetting in ℒ,
          <source>in: Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence</source>
          , AAAI Press,
          <year>2019</year>
          , pp.
          <fpage>2768</fpage>
          -
          <lpage>2775</lpage>
          . URL: https://doi.org/10.1609/aaai.v33i01.
          <fpage>33012768</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>İ.</given-names>
            <surname>İ. Ceylan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Lukasiewicz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Malizia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Molinaro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vaicenavicius</surname>
          </string-name>
          ,
          <article-title>Explanations for negative query answers under existential rules</article-title>
          ,
          <source>in: Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning</source>
          ,
          <source>KR</source>
          <year>2020</year>
          , AAAI Press,
          <year>2020</year>
          , pp.
          <fpage>223</fpage>
          -
          <lpage>232</lpage>
          . URL: https://doi.org/10.24963/kr.2020/23.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          ,
          <article-title>Signature-based abduction with fresh individuals and complex concepts for description logics</article-title>
          ,
          <source>in: Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, ijcai.org</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>1929</fpage>
          -
          <lpage>1935</lpage>
          . URL: https://doi.org/10.24963/ijcai.
          <year>2021</year>
          /266.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Homola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pukancová</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Boborová</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Balintová</surname>
          </string-name>
          , Merge, explain, iterate
          <article-title>: A combination of MHS and MXP in an ABox abduction solver</article-title>
          ,
          <source>in: Proceedings of the 18th European Conference on Logics in Artificial Intelligence, JELIA</source>
          <year>2023</year>
          , volume
          <volume>14281</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2023</year>
          , pp.
          <fpage>338</fpage>
          -
          <lpage>352</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>031</fpage>
          -43619-2_
          <fpage>24</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.</given-names>
            <surname>Elsenbroich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Sattler</surname>
          </string-name>
          ,
          <article-title>A case for abductive reasoning over ontologies</article-title>
          ,
          <source>in: Proceedings of the OWLED'06 Workshop on OWL: Experiences and Directions</source>
          ,
          <year>2006</year>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>216</volume>
          /submission_25.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P.</given-names>
            <surname>Koopmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Del-Pinto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tourret</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <article-title>Signature-based abduction for expressive description logics</article-title>
          ,
          <source>in: Proceedings of the 17th International Conference on Principles of Knowledge</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>