<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <article-id pub-id-type="doi">10.1613/JAIR.4062</article-id>
      <title-group>
        <article-title>Towards Practicable Defeasible Reasoning for ABoxes (Extended Abstract)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jonas Haldimann</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Magdalena Ortiz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mantas Šimkus</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Logic and Computation, TU Wien</institution>
          ,
          <addr-line>1040 Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Cape Town and CAIR</institution>
          ,
          <addr-line>Cape Town</addr-line>
          ,
          <country country="ZA">South Africa</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>1551</volume>
      <issue>3</issue>
      <fpage>3</fpage>
      <lpage>6</lpage>
      <abstract>
        <p>Reasoning with rules that allow for exceptions has been a longstanding challenge in knowledge representation. The KLM paradigm has been successful for defeasible reasoning in propositional logics, but its application to Description Logics (DLs) has been challenging. Many approaches to terminological reasoning with defeasible inclusions have been proposed, but reasoning about ABoxes is still largely unexplored. In this paper, we consider defeasible inclusions in the expressive DL ℒℐ with closed predicates, but restrict the inclusions in a way that circumvents some of the challenges faced by related approaches. We also consider the data complexity of defeasible reasoning, which, to our knowledge, had not yet been analysed. Unfortunately, our approach is hard for the second level of the polynomial hierarchy, but we identify a restricted fragment that enables tractable reasoning.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;defeasible reasoning</kwd>
        <kwd>rational closure</kwd>
        <kwd>ABoxes</kwd>
        <kwd>complexity of reasoning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Defeasible reasoning, that is, reasoning with rules that allow for exceptions, has been a longstanding
challenge in knowledge representation. The KLM paradigm for defeasible reasoning [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] has been
successful in propositional logics [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5">2, 3, 4, 5</xref>
        ], providing a principled approach that is not as computationally
expensive as other NMR formalisms. Extending this approach to DLs is clearly appealing, and it has
received significant attention in the literature [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6, 7, 8, 9, 10, 11, 12</xref>
        ]. But the focus of these works has
been almost exclusively on inferring defeasible inclusions from TBoxes. Data-centric reasoning services,
such as defeasible instance checking in the presence of ABoxes, have been largely overlooked and, to
our knowledge, the data complexity of defeasible inferences about ABox objects remained unexplored.
      </p>
      <p>
        In our recent paper [13], we consider the expressive DL ℒℐ with closed predicates, which already
allows some simple non-monotonic reasoning and which generalizes nominals [14, 15]; this is one
of the most expressive DLs that can be decided in ExpTime. We add defeasible inclusions to ℒℐ
knowledge bases and give them an exceptionality based semantics in the style of Rational Closure [16]
and the equivalent system Z [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The classical part of the knowledge base (KB) remains unrestricted,
providing the full power of the DL to draw conclusions about both named and unnamed objects, but
the defeasible inclusions are syntactically restricted in a way that they can draw inferences only about
the ABox individuals. The result is a simple formalism that allows to draw defeasible inferences about
specific objects, and where the combined complexity of these inferences is not higher than for classical
reasoning in the underlying DL. Unfortunately, this is not the case for data complexity: we show that
credulous and sceptical entailment are both intractable. Simply restricting the DL is not enough to
regain tractability, since changing the assignment of defeasible concepts to an individual can afect the
defeasible assignment of its neighbours, which rules out the existence of a unique preferred model.
Nevertheless, we identify a restricted fragment that allows for defeasible instance checking in a time
that is polynomial in the size of the ABox.
      </p>
      <p>Existing defeasible semantics for DLs based on rational closure neglect all defeasible information
for the unnamed objects implied by the existential axioms, sometimes leading to counterintuitive
inferences. To our knowledge, the only adequate solution so far is limited to the very inexpressive ℰ ℒ.
Our approach fully circumvents the issue of typicality of anonymous objects: since defeasible inferences
do not allow inferring new facts about unnamed objects, there is no need to decide how to apply the
defeasible inclusions to them. While we do not solve the problem, we do avoid its nontransparent and
sometimes counterintuitive aspects. We believe this is a reasonable compromise. Unnamed objects in
an interpretation intuitively describe structures that should be as general as possible, and we have not
seen many realistic examples that really call for defeasible inferences over anonymous objects.</p>
    </sec>
    <sec id="sec-2">
      <title>2. The Formalism</title>
      <p>In this section, we formally define our DL knowledge bases with defeasible inclusions which are concept
inclusions that hold for typical, but not necessarily all elements of the domain. Unlike a ‘strict’ concept
inclusion  ⊑ , a defeasible inclusion  ⊏  may have exceptions, i.e., in a model ℐ of  ⊏  some
elements of ℐ may not be in ℐ ; these ar∼e considered exceptional. ∼</p>
      <p>Our key design choice is to make sure that defeasible inclusions apply only to objects that are
explicitly named in the knowledge base, and therefore anonymous objects whose existence may be
implied by concept inclusions can be treated as non-exceptional. This will be ensured by means of rooted
concepts, which are concept expressions that are ‘guarded’ by closed predicates. For closed predicates 
and  in NCc ⊆ N C and NRc ⊆ N R, respectively, the term ℐ |=  means that ℐ , ℐ only contain an
individual if explicitly mentioned. In our formalisms, defeasible inclusions are restricted to have rooted
concepts in the antecedents.</p>
      <p>Definition 1. A concept  is rooted if one the following is satisfied: 1.  ∈ NCc , 2.  of the form 1 ⊓ 2
and at least one of 1, 2 is rooted, 3.  of the form 1 ⊔ 2 and both 1, 2 are rooted, or 4.  of the
form ∃. with  ∈ NRc or − ∈ NRc .</p>
      <p>A defeasible concept inclusion (DCI) is an expression  ∼⊏ , where ,  are concepts and  is rooted.
A knowledge base (KB) is a tuple  = ( , , ), where  is a TBox,  is a set of defeasible inclusions,
and  is an ABox.</p>
      <p>
        Example 1 (adapted from [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]). Consider the knowledge that red blood cells (RBC) usually have a
nucleus, but mammalian red blood cells (MRBC) typically do not have a nucleus; and of course mammalian
red blood cells are a subclass of red blood cells. 1, 2, 3 are red blood cells and 3 is additionally a
mammalian red blood cell. Furthermore, we assume the knowledge about RBC and MRBC to be
complete for 1, 2, 3. This situation can be described by the knowledge base  = ( , , ) with  =
{RBC (1), RBC (2), RBC (3), MRBC (3)},  = {MRBC ⊑ RBC , ∃hasNucleus.⊤ ⊑ EN }, and
 = {RBC ∼⊏ ∃hasNucleus.⊤, MRBC ∼⊏ ¬∃hasNucleus.⊤} where MRBC and RBC are closed
predicates.
      </p>
      <p>
        We will now define the semantics of a KB  = ( , , ) as the interpretations ℐ where ℐ |=  ,
ℐ |= , and ℐ complies with the defeasible inclusions in  as much as possible. To properly define
the latter, following the definition of system Z, the first step is to define the notion of tolerance, which
generalizes a similar concept for propositional rules [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>Definition 2. We write ℐ,  |=  ∼⊏ , if  ∈ (¬ ⊔ )ℐ . For a set  of defeasible inclusions, we write
ℐ,  |= , if ℐ,  |=  ∼⊏  for all  ∼⊏  ∈ . A defeasible inclusion  ∼⊏  is tolerated by a set  of
defeasible inclusions and a TBox  , if there is an interpretation ℐ and an object  ∈ ∆ ℐ such that ℐ |=  ,
 ∈ ( ⊓ )ℐ and ℐ,  |= .</p>
      <p>For a set  of defeasible inclusions and a TBox  construct the following sequence:
(i) Let 0 contain all  ∼⊏  ∈  such that  ∼⊏  is tolerated by  and  .
(ii) Foℓ′r =allℓ ∖&gt;(0,0le∪t · ·· ∪ℓ contℓa−1in)a.ll  ∼⊏  ∈ ℓ′ such that  ∼⊏  is tolerated by ℓ′ and  , where
Let  be the smallest integer such that +1 = ∅. Then (0, . . . , , ∞) with ∞ = ′+1 is called
the tolerance partition of  (w.r.t.  ).</p>
      <p>Let ℐ be an interpretation such that ℐ |= ∞ ∪  and assume  ∈ ∆ ℐ . We let rank, (ℐ, ) be defined
as follows. If ℐ,  |= , then rank, (ℐ, ) = 0. Otherwise, rank, (ℐ, ) is the biggest  ∈ {1, . . . , +1}
such that ℐ,  ̸|= −1 .</p>
      <p>Intuitively, rank, (ℐ, ) tells us to what extent the defeasible inclusions are satisfied at  in ℐ.
If rank, (ℐ, ) = 0, then  is non-exceptional and satisfies all inclusions in . If rank, (ℐ, ) =
 + 1, then  is highly exceptional: it violates some inclusion in , which stores the most specific
defeasible inclusions of . Note that the rootedness condition guarantees that unnamed objects have
rank, (ℐ, ) = 0.</p>
      <p>Let ∆  be the set of individuals occurring explicitly in an ABox . We can now compare the extent
to which interpretations satisfy defeasible inclusions:
Definition 3. Assume a KB  = ( , , ). Let (0, . . . , , ∞) be the tolerance partition of 
w.r.t.  . An interpretation ℐ is called -admissible, if ℐ |=  , ℐ |= , and ℐ |= ∞. Assume a pair
ℐ,  of -admissible interpretations. We write ℐ ≺   , if the following holds:
• rank, (ℐ, ) ≤ rank , ( , ) for all individuals  ∈ ∆ , and
• rank, (ℐ, ) &lt; rank, ( , ) for some individual  ∈ ∆ .</p>
      <p>A -admissible interpretation  is called a minimal model of , if there exists no -admissible
interpretation ℐ such that ℐ ≺   .</p>
      <p>Example 2. Consider  from Example 1. The tolerance partition of  is (0, 1) with 0 = {RBC ∼⊏
∃hasNucleus .⊤} and 1 = {MRBC ∼⊏ ¬∃hasNucleus .⊤}.</p>
      <p>Let ℐ be an interpretation with ℐ |=  ∪  and ℐ |= (∃hasNucleus .⊤)(1), ℐ |=
(¬∃hasNucleus .⊤)(2), ℐ |= (∃hasNucleus .⊤)(3). We have rank, (ℐ, 1) = 0, since ℐ, 1 |= . We
have rank, (ℐ, 2) = 1, because ℐ violates an inclusion in 0 for 2.</p>
      <p>Observe that even KBs that have a canonical model may have more than one minimal model. Therefore,
we consider sceptical and credulous entailment of assertions in the minimal models. Sceptical entailment
over the minimal models accepts only conclusions that hold in all minimal models, while credulous
entailment accepts conclusions that hold in at least one minimal model.</p>
      <p>For this formalism, we show the following complexity results.</p>
      <p>Theorem 1. Credulous and sceptical entailment of assertions is ExpTime-complete in combined complexity.
In data complexity, credulous and sceptical entailment of assertions is Σ 2 -complete and Π 2 -complete,
respectively.</p>
      <p>This complexity is too high for applications involving large ABoxes, hence we identify a restricted
fragment of our formalism that has tractable data complexity.</p>
      <p>Definition 4 (Local KBs). A complex concept  is closed if all concept and role names occurring in it are
closed. An ordinary inclusion  ⊑  or a defeasible inclusion  ∼⊏  is called local, if every quantified
concept of the form ∃. or ∀. occurring in  or  is closed. A knowledge base  = ( , , ) is local
if every defeasible inclusion in  and every inclusion in  is local.</p>
      <p>The intuition of local inclusions is that they can only describe an object and its immediate
surroundings. While they can use quantifiers on closed roles and predicates, which can be evaluated by
looking up the assertions in the ABox, they cannot be afected by the assignment of open concepts in
neighbouring nodes. This will allow us to answer queries about an object without the need to consider
the assignments of open concepts for all objects in .</p>
      <p>Theorem 2. Let  be a local KB and  be an assertion. Checking whether  sceptically (or credulously,
resp.) entails () is polynomial in data complexity and in  NP in combined complexity.
3. Related Work and Conclusions
We have presented a defeasible reasoning framework over ABoxes based on rational closure, identifying
a tractable fragment where queries can be eficiently answered.</p>
      <p>
        Despite the many works that extend DLs with defeasible reasoning based on rational closure,
reasoning about ABoxes is still lacking. While rational closure extends well to DLs with the disjoint model
union property [10, 17], it struggles with DLs that include individuals and closed predicates. Stable
rational closure has been proposed for more expressive logics like ℛℐ [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], and although our
approach appears compatible in specific cases, a thorough comparison remains pending. Unlike most
related methods, our framework avoids the quantification neglect problem by design, since it applies
only to named individuals in the ABox. Prior solutions to this problem exist only for lightweight logics
such as ℰ ℒ⊥ [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>While our method sidesteps the issue of quantification neglect, it does sufer from other limitations
of rational closure, like inheritance blocking. Future work includes exploring more general solutions
to quantification neglect and how alternative semantics could be adapted for tractable reasoning,
potentially inspired by approaches like ℒ [18, 19].</p>
    </sec>
    <sec id="sec-3">
      <title>Acknowledgments</title>
      <p>This work was partially supported by the Austrian Science Fund (FWF) projects PIN8884924, P30873
and 10.55776/COE12.</p>
    </sec>
    <sec id="sec-4">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kraus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lehmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Magidor</surname>
          </string-name>
          ,
          <article-title>Nonmonotonic reasoning, preferential models and cumulative logics</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>44</volume>
          (
          <year>1990</year>
          )
          <fpage>167</fpage>
          -
          <lpage>207</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E. W.</given-names>
            <surname>Adams</surname>
          </string-name>
          ,
          <article-title>The Logic of Conditionals: An Application of Probability to Deductive Logic</article-title>
          , Synthese Library, Springer Science+Business Media, Dordrecht,
          <year>1975</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Pearl</surname>
          </string-name>
          , System
          <string-name>
            <surname>Z</surname>
          </string-name>
          :
          <article-title>A natural ordering of defaults with tractable applications to nonmonotonic reasoning</article-title>
          , in: R. Parikh (Ed.),
          <source>Proceedings of the 3rd Conference on Theoretical Aspects of Reasoning about Knowledge</source>
          , Pacific Grove, CA, USA,
          <year>March 1990</year>
          , Morgan Kaufmann,
          <year>1990</year>
          , pp.
          <fpage>121</fpage>
          -
          <lpage>135</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lehmann</surname>
          </string-name>
          ,
          <article-title>Another perspective on default reasoning</article-title>
          , Ann. Math. Artif. Intell.
          <volume>15</volume>
          (
          <year>1995</year>
          )
          <fpage>61</fpage>
          -
          <lpage>82</lpage>
          . doi:
          <volume>10</volume>
          .1007/BF01535841.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Komo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Beierle</surname>
          </string-name>
          ,
          <article-title>Nonmonotonic reasoning from conditional knowledge bases with system W, Ann</article-title>
          . Math. Artif. Intell.
          <volume>90</volume>
          (
          <year>2022</year>
          )
          <fpage>107</fpage>
          -
          <lpage>144</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10472-021-09777-9.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Bonatti</surname>
          </string-name>
          ,
          <article-title>Rational closure for all description logics</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>274</volume>
          (
          <year>2019</year>
          )
          <fpage>197</fpage>
          -
          <lpage>223</lpage>
          . doi:
          <volume>10</volume>
          . 1016/J.ARTINT.
          <year>2019</year>
          .
          <volume>04</volume>
          .001.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pensel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Turhan</surname>
          </string-name>
          ,
          <article-title>Reasoning in the defeasible description logic  - computing standard inferences under rational and relevant semantics</article-title>
          ,
          <source>Int. J. Approx. Reason</source>
          .
          <volume>103</volume>
          (
          <year>2018</year>
          )
          <fpage>28</fpage>
          -
          <lpage>70</lpage>
          . doi:
          <volume>10</volume>
          . 1016/J.IJAR.
          <year>2018</year>
          .
          <volume>08</volume>
          .005.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Casini</surname>
          </string-name>
          , T. A. Meyer, K. Moodley,
          <string-name>
            <given-names>U.</given-names>
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Varzinczak</surname>
          </string-name>
          ,
          <article-title>Introducing defeasibility into OWL ontologies</article-title>
          , in: M. Arenas, Ó. Corcho, E. Simperl,
          <string-name>
            <given-names>M.</given-names>
            <surname>Strohmaier</surname>
          </string-name>
          , M. d'Aquin,
          <string-name>
            <given-names>K.</given-names>
            <surname>Srinivas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Groth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumontier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Heflin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Thirunarayan</surname>
          </string-name>
          , S. Staab (Eds.),
          <source>The Semantic Web - ISWC 2015 - 14th International Semantic Web Conference</source>
          , Bethlehem, PA, USA, October
          <volume>11</volume>
          -
          <issue>15</issue>
          ,
          <year>2015</year>
          , Proceedings,
          <string-name>
            <surname>Part</surname>
            <given-names>II</given-names>
          </string-name>
          , volume
          <volume>9367</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2015</year>
          , pp.
          <fpage>409</fpage>
          -
          <lpage>426</lpage>
          . doi:
          <volume>10</volume>
          . 1007/978-3-
          <fpage>319</fpage>
          -25010-6_
          <fpage>27</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>