<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Framework for Reasoning with Expressive Continuous Fuzzy Description Logics</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Giorgos</forename><surname>Stoilos</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Electrical and Computer Engineering</orgName>
								<orgName type="institution">National Technical University of Athens</orgName>
								<address>
									<postCode>15780</postCode>
									<settlement>Zographou</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Giorgos</forename><surname>Stamou</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Electrical and Computer Engineering</orgName>
								<orgName type="institution">National Technical University of Athens</orgName>
								<address>
									<postCode>15780</postCode>
									<settlement>Zographou</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Framework for Reasoning with Expressive Continuous Fuzzy Description Logics</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">4ADF800D69FFCDFE869D6F486C78602D</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T23:18+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the current paper we study the reasoning problem for fuzzy SI (f-SI) under arbitrary continuous fuzzy operators. Our work can be seen as an extension of previous works that studied reasoning algorithms for f-SI, but focused on specific fuzzy operators, e.g. fKD-SI and of reasoning algorithms for less expressive fuzzy DLs, like fL-ALC and fP -ALC (fuzzy ALC under the Lukasiewicz and product fuzzy operators, respectively). We show how transitivity can be handled for all the range of continuous fuzzy DLs and discuss about blocking and correctness in this setting. Based on these analysis, we present a unifying framework for reasoning over the class of continuous fuzzy DLs. Finally use the results to prove decidability of several fuzzy SI DLs.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Although, DLs are considerably expressive they have limitations especially when it comes to modelling domains where imprecise or vague information is present, thus fuzzy extensions to DLs have been proposed <ref type="bibr">[13,</ref><ref type="bibr" target="#b19">12,</ref><ref type="bibr" target="#b15">8,</ref><ref type="bibr" target="#b9">2]</ref>. Fuzzy DLs are envisioned to be useful for several applications that face such knowledge and today there is a great deal of effort to apply them in several domains like multimedia analysis and interpretation <ref type="bibr">[11]</ref>, multimedia retrieval <ref type="bibr" target="#b14">[7]</ref>, and semantic interoperability (ontology alignment) <ref type="bibr">[3]</ref>. For example, in multimedia analysis in order to use semantically rich technologies one has to map from the semanticless numerical values that are extracted by analysis algorithms (e.g. the color, the texture, the shape or other low-level related features) to more high level (fuzzy/vague) concepts like blue, red, smooth, rough, long, small, overlapping, etc. More precisely, we could say that region reg 1 is blue to a degree 0.8 and smoothly textured to a degree 0.7 <ref type="bibr">[11]</ref>. Then we can use DL axioms deducing high level assertions about the various image regions.</p><p>Up to now many reasoning algorithms for fuzzy DLs have been presented. Straccia <ref type="bibr">[13]</ref> presented a tableaux reasoning algorithm for f KD -ALC (fuzzy ALC under the Zadeh fuzzy operators: x ∧ y min(x, y), x ∨ y max(x, y), ¬x 1 − x and x → y max(1 − x, y)). This was later extended to very expressive fuzzy DLs, like f KD -SI and f KD -SHIN by Stoilos et al. <ref type="bibr" target="#b19">[12]</ref>, by investigating and extending the classical rule for transitivity (∀ + ) in the fuzzy setting. Then Straccia presented reasoning algorithms for fuzzy DLs that use other fuzzy operators than the Zadeh ones. Firstly, a reasoning algorithm for f L -ALCf (fuzzy ALCf under the Lukasiewicz operators: x ∧ y max(0, x + y − 1), x ∨ y min(1, x + y), ¬x 1 − x and x → y min(1, 1 − x + y)) <ref type="bibr" target="#b21">[14]</ref>, while finally Bobillo and Straccia extended the approach to f P -ALCf <ref type="bibr" target="#b9">[2]</ref> (fuzzy ALCf under the product logic operators: (x ∧ y)</p><p>x • y, x ∨ y x + y − x • y, ¬x 1 − x and x → y 1 if x ≤ y, y/x otherwise). These algorithms are based on tableaux procedures, and its application creates a set of inequations that need to be solved, which is different than f KD -DLs which are purely tableaux-based. Obviously, a general framework for reasoning with fuzzy DLs allowing for a more general class of fuzzy operators is required. A first such attempt for ALC had already been made by Trest &amp; Molitor <ref type="bibr">[15]</ref>, nevertheless they did not provide a clear idea on how or if the system of inequations created can actually be solved in practice. Recently, Bobillo and Straccia <ref type="bibr">[1]</ref> have presented an algorithm for reasoning with f-ALC over arbitrary left-continuous fuzzy operators.</p><p>Although the literature on fuzzy-DLs is flourishing it is quite evident that several open issues exist. More precisely, there is currently no known algorithm for (very) expressive fuzzy DLs, like fuzzy SI, that allow for transitive and inverse roles, and at the same time allow for fuzzy operators other than the Zadeh operators, needless to say a unifying framework for reasoning over all continuous fuzzy DLs. In order to extend the algorithms to such fuzzy DLs the semantics of the respective constructors, like transitivity and inverse roles need to be studied and understood <ref type="bibr" target="#b19">[12]</ref>. Furthermore, as we will see in Section 4.2, our investigation has shown that there are some very difficult issues related to termination (blocking condition) and correctness of the respective algorithms. In this paper we try to tackle with these issue providing a unifying framework for reasoning in fuzzy SI extended with arbitrary continuous fuzzy operators.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Fuzzy Set Theory</head><p>While in classical set theory an element either belongs to a set or not, in fuzzy set theory elements belong only to a certain degree. More formally, let X be a set of elements. A fuzzy subset A of X, is defined by a membership function µ A (x), or simply A(x) <ref type="bibr" target="#b13">[6]</ref>. This function assigns any x ∈ X to a value between 0 and 1 that represents the degree in which this element belongs to X. In this new framework the classical set theoretic and logical operations are performed by special mathematical functions. More precisely fuzzy complement is a unary operation of the form c : [0, 1] → [0, 1], fuzzy intersection and union are performed by two binary functions of the form t :</p><formula xml:id="formula_0">[0, 1] × [0, 1] → [0, 1] and u : [0, 1] × [0, 1] → [0, 1], called</formula><p>t-norm and t-conorm operations <ref type="bibr" target="#b13">[6]</ref>, respectively, and fuzzy implication also by a binary function, J : [0, 1] × [0, 1] → [0, 1]. In order to produce meaningfull fuzzy complements, conjunctions, disjunctions and implications, these functions must satisfy certain mathematical properties. For example the operators must satisfy the following boundary properties, c(0) = 1, c(1) = 0, t(1, a) = a and u(0, a) = a. Due to space limitations we cannot present all the properties that these functions should satisfy, but rather the reader is referred to <ref type="bibr" target="#b13">[6]</ref>. In the following we will refer to a collection of fuzzy operators c, t, u, J as a fuzzy quadruple and c, t, u as a fuzzy triple.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">A Fuzzy Extension of the SI DL</head><p>In this section, we briefly introduce a fuzzy extension of the SI DL, which we call f-SI.</p><p>As usual we have an alphabet of distinct concept names (C), role names (R) and individual names (I). Following <ref type="bibr">[13,</ref><ref type="bibr" target="#b19">12]</ref>, we only extend classical assertions by allowing for degrees of truth, thus creating fuzzy assertions, while no other syntactic extensions are performed. This has the effect that f-SI-roles and f-SIconcepts are defined by the usual abstract syntax:</p><formula xml:id="formula_1">C, D −→ ⊥ | ⊤ | A | C ⊓ D | C ⊔ D | ∃R.C | ∀R.C, R −→ S | S − .</formula><p>The semantics are provided by the means of fuzzy interpretations <ref type="bibr">[13]</ref>. A fuzzy interpretation as a pair I = (Δ I , • I ), which maps 1. an individual a ∈ I to an element a I ∈ Δ I , 2. a concept name A ∈ C to a membership function</p><formula xml:id="formula_2">A I : Δ I → [0, 1], 3. a role name R ∈ R to a membership function R I : Δ I × Δ I → [0, 1].</formula><p>For example, if a ∈ Δ I then A I (a) gives the degree that the object a belongs to the fuzzy concept A, e.g. A I (a) = 0.8. The notions of a TBox, RBox and knowledge base are defined in the usual way. On the other hand An f-SI ABox is a finite set of fuzzy assertions <ref type="bibr">[13]</ref> of the form (a : C)⊲⊳n or ((a, b) : R)⊲⊳n, where ⊲⊳ ∈ {≥, ≤} and n ∈ [0, 1]. In the following ⊲⊳ − denotes the reflection of inequalities; e.g., the reflection of ≥ is ≤ and that of ≤ is ≥. Table <ref type="table">1</ref> summarizes the semantics of f-SI-concepts, f-SI-roles and satisfiability of TBox, RBox and ABox axioms.</p><p>An f-SI knowledge base Σ = T , R, A is satisfiable (unsatisfiable) iff there exists (does not exist) a fuzzy interpretation I which satisfies all axioms in Σ. An f-SI-concept C is n-satisfiable w.r.t. Σ iff there exists a model I of Σ in which there exists some a ∈ Δ I such that C I (a) = n, and n</p><formula xml:id="formula_3">∈ (0, 1]. A fuzzy concept C is subsumed by D w.r.t. Σ iff in every model I of Σ we have ∀d ∈ Δ I , C I (d) ≤ D I (d). An f-SI ABox A is consistent (inconsistent) w.r.t. a</formula><p>TBox T and an RBox R if there exists (does not exist) a model I of T and R which satisfies every assertion in A. Given a concept or role axiom or a fuzzy assertion, Ψ , we say that Σ entails Ψ , writing Σ |= Ψ iff every model I of Σ satisfies Ψ . The greatest lower bound of an assertion Φ w.r.t. Σ is defined as,</p><formula xml:id="formula_4">glb(Σ, Φ) = sup{n | Σ |= Φ ≥ n}, where sup ∅ = 0. Constructor Syntax Semantics top ⊤ ⊤ I (a) = 1 bottom ⊥ ⊥ I (a) = 0 general negation ¬C (¬C) I (a) = c(C I (a)) conjunction C ⊓ D (C ⊓ D) I (a) = t(C I (a), D I (a)) disjunction C ⊔ D (C ⊔ D) I (a) = u(C I (a), D I (a)) exists restriction ∃R.C (∃R.C) I (a) = sup b∈Δ I {t(R I (a, b), C I (b))} value restriction ∀R.C (∀R.C) I (a) = inf b∈Δ I {J (R I (a, b), C I (b))} inverse role R − (R − ) I (b, a) = R I (a, b) concept subsumption C ⊑ D C I (a) ≤ D I (a) concept equivalence C ≡ D C I (a) = D I (a) transitive roles Trans(R) ∀a, c ∈ Δ I R I (a, c) ≥ sup b∈Δ I {t(R I (a, b), R I (b, c))} concept assertion (a : C)⊲⊳n C I (a I )⊲⊳n, ⊲⊳ ∈ {≥, &gt;, ≤, &lt;} role assertion ((a, b) : R)⊲⊳n R I (a I , b I )⊲⊳n</formula><p>Table <ref type="table">1</ref>. Semantics of f-SI-concepts and f-SI-roles</p><p>In the following we restrict our attention only to witnessed (un)satisfiability. As it is known in the fuzzy DL literature <ref type="bibr">[4,</ref><ref type="bibr">1]</ref> when allowing for general fuzzy operators, the resulting f-DL might lack the finite model property. A model is called witnessed if for (∀R.C)</p><formula xml:id="formula_5">I (a) = n there is some b ∈ Δ I such that J (R I (a, b), C I (b)) = n, i.</formula><p>e. an object that witnesses the degree of a in (∀R.C) I .</p><p>Moreover, we will use the notation f J -SI, where J is a fuzzy implication, to refer to a fuzzy DL that uses specific fuzzy operators. For example, f L -SI denotes the fuzzy SI DL that uses the set of Lukasiewicz operators. On the other hand with f * -SI we refer to all the family of continuous fuzzy-SI.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Reasoning with Expressive Fuzzy DLs</head><p>In the current section we will investigate two of what we believe are the most difficult problems in the development of a correct (sound and complete) reasoning algorithm for expressive fuzzy DLs, that also allow for arbitrary continuous fuzzy operators. Firstly, we investigate how to handle transitivity, i.e. how to extend the ∀ + -rule <ref type="bibr" target="#b12">[5]</ref> in f * -SI. Thus, our investigation has extends the one in <ref type="bibr" target="#b19">[12]</ref> for f KD -SI. Secondly, we also investigate on blocking conditions <ref type="bibr" target="#b12">[5]</ref> and their applicability in the fuzzy setting. The latter one is a very difficult issue and it was the main reason that reasoning algorithms for expressive DLs using arbitrary continuous norms have not been presented until now.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Transitivity and role hierarchies in Fuzzy Description Logics</head><p>Stoilos et al. <ref type="bibr" target="#b19">[12]</ref> presented a reasoning algorithm for f KD -DLs that allow for transitive roles by extending the classical results for handling transitivity <ref type="bibr" target="#b12">[5]</ref>.</p><p>More precisely, they show that in f KD -DLs if (∀R.C) I (a I ) ≥ n and R transitive, then (∀R.(∀R.C)) I (a I ) ≥ n. Using this property they proposed the ∀ + -rule for f KD -SI. In order to provide a similar rule for f * -SI this result needs to be extended. By using properties of fuzzy operators the following can be shown: From this Lemma we can note that in the case of S-implications, the fuzzy triple must additionally satisfy the De Morgan laws in order for the respective ∀ + -rule to work properly.</p><p>Furthermore, Stoilos et al. <ref type="bibr" target="#b19">[12]</ref> show that in the case of fuzzy DLs, apart from value restrictions a similar property holds for existential restrictions as well. More precisely they show that in f KD -DLs if (∃R.C) I (a) ≤ n and R is transitive, then (∃R.(∃R.C)) I (a) ≤ n. It is straightforward to expect that a similar property would generally hold for f * -SI. Again, by using properties of fuzzy operators we obtain the following: As can be seen in this case no distinction between R-and S-implications has to be made since the type of fuzzy implication now is irrelevant.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Blocking in Fuzzy Description Logics</head><p>In <ref type="bibr" target="#b19">[12]</ref> the authors show how to extend the classical blocking condition to the family of f KD -DLs with transitive roles. More precisely, the expansion is terminated when two individuals on some path of roles are asserted to belong to the same set of fuzzy assertions. They also show that this blocking condition is sufficient when reasoning with f KD -DLs since we can restrict our attention only to a finite set of degrees. For example, from (a : C ⊓ D) ≥ 0.8 one can safely infer (a : C) ≥ 0.8 and (a : D) ≥ 0.8, since ⊓ is interpreted as min and min(0.8, 0.8) ≥ 0.8. Finally, they show that the cycle creation technique <ref type="bibr" target="#b12">[5]</ref> can also be used: More precisely, to create a correct model from On the other hand, when reasoning with f * -DLs one has to consider all possible membership degrees. More precisely, from (a : C ⊓ D) ≥ 0.8 we cannot infer (a : C) ≥ 0.8 and (a : D) ≥ 0.8, since for example under the product t-norm, 0.8 • 0.8 &lt; 0.8. To the contrary we have to infer (a : C) ≥ n 1 and (a : D) ≥ n 2 , with the constraints t(n 1 , n 2 ) ≥ 0.8 and 0 ≤ n 1 , n 2 ≤ 1. Straccia and Bobillo presented reasoning algorithms for f L -ALC and f P -ALCf that allow for GCIs <ref type="bibr" target="#b21">[14,</ref><ref type="bibr" target="#b9">2]</ref> revising the blocking condition from <ref type="bibr" target="#b19">[12]</ref>. Roughly speaking, an individuals c is blocked by a if they share fuzzy assertions with the same concepts and the degrees are either both the same rational from [0, 1] or (variable) degree n from [0, 1]. Similarly as before, if for some individual b, (b, c) : R ≥ n , then in the constructed model one has to create a new edge R I (b I , a I ) = r new that points from b I to the node that blocks c I . At the current point we argue that this condition alone might not be sufficient to show the correctness of the procedure. More precisely, the constrains on the degrees that have been created by the application of the algorithm might be such that no degree r new could be selected in order for all the constraints to be satisfied.</p><p>Suppose for example that in an application of the tableaux algorithm for a specific KB the following assertions have been created for some </p><formula xml:id="formula_6">I )) = sup{x | t(r new , x) ≤ t(r new , C I (b I ))} = sup{x | x ≤ C I (b I )} = C I (b I ) = 0.6,</formula><p>which is absurd. Consequently, when we construct a model out of a set of blocked fuzzy assertions in f * -SI it might be the case that different degrees than the ones computed by the algorithm have to be used. In the previous case the degrees have to be such that n 1 ≥ n 3 . Nevertheless, it is currently not clear whether such new degrees can always be safely assumed. More precisely, it might the case that the relation n 3 &lt; n 1 is imposed by other assertions (constraints) in the ABox and thus we cannot select other values in the construction of the model.</p><p>Intuitively, the only assertions that can affect the membership degrees of individuals to concepts are those that exist originally in the ABox and that contain specific values from [0, 1]. Taking this into consideration we propose a more safe approach to blocking in f-SI. Intuitively, our blocking condition is such that the at the point that blocking is allowed the set of inequalities is sufficiently unconstrained in order to ensure that the correct membership degrees in the constructed model can indeed be found. The formal condition that gives this property is the depth of the node in the tree w.r.t. the nested quantifiers that exist in our original KB. More precisely, if k is the largest number of consecutive nested quantifiers in our KB, then the depth of the node should be at least k + 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">A Framework for Reasoning with Fuzzy SI</head><p>In the current section we will provide a general framework for reasoning in f * -SI. The fuzzy tableau we present here can be seen as an extension of the fuzzy tableau presented in <ref type="bibr" target="#b19">[12]</ref> for f KD -SI, in the sense that we do not make specific assumptions about the fuzzy operators used but we use arbitrary ones. One consequence is that we cannot make usual assumption, like for example that concepts exist in their negation normal form (NNF). For a fuzzy concept D we use sub(D) to denote the set of subconcepts of D. Finally, for a KB Σ we define:</p><formula xml:id="formula_7">sub(Σ) = ∪ (a:D)≥n∈A sub(D) ∪ C D∈T sub(C) ∪ sub(D).</formula><p>Definition 1. If Σ is an f * -SI knowledge base, R A is the set of roles occurring in A and R together with their inverses and I A is the set of individuals in A, a fuzzy tableau T for Σ, is defined to be a quadruple (S, L, E, V) such that: S is a set of elements, L : S × sub(Σ) → [0, 1] maps each element and concept, that is a member of sub(Σ), to the membership degree of that element to the concept, E : R A × S × S → [0, 1] maps each role of R A and pair of elements to the membership degree of the pair to the role, and V :</p><formula xml:id="formula_8">I A → S maps individuals occurring in A to elements in S. For all s, t ∈ S, C, D ∈ sub(Σ), n, n 1 , n 2 ∈ (0, 1] and R ∈ R A , T satisfies: Rule Description eq if 1. A, ⊲⊳, n ∈ L(x) ( R, ⊲⊳, n ∈ L( x, y )) and 2. ux:A⊲⊳n ∈ X (u (x,y):R ⊲⊳n ∈ X ) then X → X ∪ {ux:A⊲⊳n} (X → X ∪ {u (x,y):R ⊲⊳n}) ¬ if 1. ¬C, ⊲⊳, n ∈ L(x) 2. and C, ⊲⊳ − , n ∈ L(x) with n ≤ c(n) ∈ X then L(x) → L(x) ∪ { C, ⊲⊳ − , n } and X → X ∪ {n ⊲⊳ − c(n)} ≥ if 1. C1 C2, ≥, n ∈ L(x), x is not indirectly blocked, and 2. { C1, ≥, n1 , C2, ≥, n1 } L(x) with t(n1, n2) ≥ n ∈ X then L(x) → L(x) ∪ { C1, ≥, n1 , C2, ≥, n2 } and X → X ∪ {t(n1, n2) ≥ n} ≤</formula><p>dually to the ≥ -rule, i.e. replace ≥ by ≤ and the t-norm (t) with a t-conorm u.</p><formula xml:id="formula_9">≥ if 1. C1 C2, ≥, n ∈ L(x), x is not indirectly blocked, and 2. { C1, ≥, n1 , C2, ≥, n2 } ∩ L(x) = ∅ with u(n1, n2) ≥ n ∈ X then L(x) → L(x) ∪ {C} for some C ∈ { C1, ≥, n1 , C2, ≥, n2 } and X → X ∪ {u(n1, n2) ≥ n} ≤</formula><p>dually to the ≥ -rule, i.e. replace ≥ by ≤ and t with u.</p><formula xml:id="formula_10">∃ ≥ if 1. ∃R.C, ≥, n ∈ L(x), x is not blocked, and 2. x has no R ≥n 1 -neighbour with C, ≥, n2 ∈ L(y) and t(n1, n2) ≥ n ∈ X then create a new node y with L( x, y ) = { R, ≥, n1 }, L(y) = { C, ≥, n2 },</formula><p>and</p><formula xml:id="formula_11">X → X ∪ {t(n1, n2) ≥ n} ∀ ≤</formula><p>dually to the ∃ ≥ -rule, i.e. replace ≥ by ≤ (except for R, ≥, n1 ) and t with J .</p><formula xml:id="formula_12">∀ ≥ if 1. ∀R.C, ≥, n ∈ L(x),</formula><p>x is not indirectly blocked, and 2.</p><p>x has an R ≥n -neighbour y with C, ≥, n2 ∈ L(y) and {u (x,y):R ≤ n1,</p><formula xml:id="formula_13">J (n1, n2) ≥ n} ⊆ X then L(y) → L(y) ∪ { C, ≥, n2 }, and X → X ∪ {u (x,y):R ≤ n1, J (n1, n2) ≥ n} ∃ ≤ if 1. ∃R.C, ≤, n ∈ L(x), x is not indirectly blocked, 2. x has an R ≥n 1 -neighbour y with C, ≤, n ∈ L(y), t(n1, n2) ≤ n ∈ X and then L(y) → L(y) ∪ { C, ≤, n2 }, and X → X ∪ {t(n1, n2) ≤ n} ∀+ if 1. ∀R.C, ≥, n ∈ L(x)</formula><p>, with Trans(R), x is not indirectly blocked, and 2. x has a R ≥n -neighbour y with, ∀R.C, ≥, n2 ∈ L(y), and</p><formula xml:id="formula_14">{u (x,y):R ≤ n1, J (n1, n2) ≥ n} ⊆ X then L(y) → L(y) ∪ { ∀R.C, ≥, n }, and X → X ∪ {u (x,y):R ≤ n1, J (n1, n2) ≥ n} ∃+ if 1. ∃R.C, ≤, n ∈ L(x), with Trans(R), x is not indirectly blocked, 2. x has a R ≥n 1 -neighbour y with, ∃R.C, ≤, n2 ∈ L(y), t(n1, n2) ≤ n ∈ X and then L(y) → L(y) ∪ { ∃R.C, ≤, n2 }, and X → X ∪ {t(n1, n2) ≤ n} if 1. C D ∈ T , x is not indirectly blocked, and 2. { C, ≤, n1 , D, ≥, n2 } L(x), with n1 ≤ n2 ∈ X then L(x) → L(x) ∪ { C, ≤, n1 , D, ≥, n2 } and X → X ∪ {n1 ≤ n2}</formula><p>Table <ref type="table">2</ref>. Tableaux expansion rules for f * -SI</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">On the Decidability of Continuous Fuzzy DLs</head><p>As is if obvious from the above, the application of expansion rules creates a system of inequations. Straccia <ref type="bibr" target="#b21">[14]</ref> proposed the use of optimisation techniques for solving such a system: Definition 3. An optimization problem can be formalized as follows:</p><formula xml:id="formula_15">minimize f (x) subject to g i (x) ≤ b i , 1 ≤ i ≤ m</formula><p>where x = (x 1 , . . . , x n ), x i ∈ R is a vector of variables, f is called the objective function and g i are the constraint functions.</p><p>Depending on the form of f and g i , as well as the constraints imposed on x we obtain different types of optimization problems. If for all x i , a ≤ x i ≤ b holds, then the problem is called bounded ; if</p><formula xml:id="formula_16">x i ∈ Z it is called integer ; If x i ∈ Z, x j ∈ R, with 1 ≤ i = j ≤ m,</formula><p>the problem is called mixed integer. On the other hand depending on the form of f, g i we obtain a (i) linear programming problem, if f, g i are linear functions, (ii) quadratic, (iii) convex if some g i is an arbitrary nonquadratic function but still convex, or (iv) non-convex. These characterizations are essential in order to determine the difficulty of the problem. For example, the Simplex algorithm <ref type="bibr">[9]</ref> is a very successful method for solving mixed integer linear systems. On the other hand for arbitrary functions the problem becomes highly complex and usually one requires that all g i are convex in order to guarantee that the method will reach a global minimum.</p><p>Straccia <ref type="bibr" target="#b21">[14]</ref> showed that reasoning in f L -ALC and f KD -ALC can be formalized as a bounded Mixed Integer Linear Programming (bMILP) problem <ref type="bibr" target="#b17">[10]</ref>. This is because, for example, under the Lukasiewicz t-norm from t(x, y) = max(0, x+y−1) ≥ n we (roughly) obtain a linear constraint x+y−1 ≥ n together with some integer contrains which analyze the " max " function. Subsequently, Straccia and Bobillo <ref type="bibr" target="#b9">[2]</ref> showed that reasoning in f P -ALC could be formalized as a bounded Mixed Integer Quadratic Programming (bMIQP) problem <ref type="bibr" target="#b17">[10]</ref>. These methods can still be used in our framework as long as the norm operators used can be analyzed to form a bMILP or a bMIQP problem. Moreover, all inference problems can be reduced to KB (un)satisfiability as follows: Let f Rei -SI be the fuzzy SI DL that uses the Lukasiewicz negation, the product t-norm the probabilistic sum and the Reichenbach S-implication.</p><formula xml:id="formula_17">C is n-satisfiable w.r.t. Σ iff min x = 0 under T , R, A ∪ {(a : C) ≥ n} C ⊑ D w.r.t. Σ iff min x = 0 under T , R, A ∪ {(a : C) ≥ x 1 , (a : D) ≤ x 2 } and X = {x ≥ x 1 − x 2 }. Σ |= a : C ≥ n iff min x under T , R, A ∪ {a : C ≤ n − ɛ} ,</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem 2 (Decidability of f Rei -SI). The tableaux algorithm together with a bMIQP solver consist of a decision procedure for the inference problems of f</head><formula xml:id="formula_18">Rei -SI.</formula><p>Nevertheless, in the current paper we have given an overall framework for reasoning in expressive fuzzy DLs extended with arbitrary continuous t-norms. Unfortunately, most norm functions have a very complex form which cannot be analyzed into linear or quadratic functions. Consider for example the family of Frank t-norms: t(x, y) = log s</p><formula xml:id="formula_19">( 1 + (s x −1)(s y −1) s−1</formula><p>) , s &gt; 0, s = 1. As we can note the parameters appear as exponents inside a logarithm.  Table <ref type="table">3</ref>. The fuzzy logic resulting by the Weber, Yu and Schweizer &amp; Sklar operators.</p><formula xml:id="formula_20">" max[0, (1 + λ)(x + y − 1) − λxy] max[0, (x 2 + y 2 − 1) 1 2 ] t-conorm min " 1, x + y − λ 1+λ xy " min (1, x + y + λxy) 1-max[0, ((1 − x) 2 + (1 − y) 2 − 1) 1 2 ] S-impl. min(1, 1 − x + y 1+λ + λxy 1+λ ) min[1, 1 − x + (λ + 1)y − λxy] 1-max[0, (x 2 + (1 − y) 2 − 1) 1 2 ] R-impl. min(1, 1−x+(1+λ)y 1+λx ) min[1,<label>(1+λ)</label></formula><p>Nevertheless, there are still some norms or restrictions of them whose function can be analyzed into mixed integer linear constraints. Table <ref type="table">3</ref> summarizes a few that we were able to identify. Note that different fuzzy implications define a different fuzzy DL. Consequently, we have the following results. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusions</head><p>In the current paper we attempt to tackle with the problem of reasoning with expressive fuzzy DLs that used arbitrary fuzzy operators. To accomplish our goals firstly, we have investigated the properties of the semantics of transitive roles when these are used in value and existential restrictions. This greatly extends the results that have been presented in <ref type="bibr" target="#b19">[12]</ref> for transitivity in fuzzy DLs which use the min − max operators. Secondly, we have dealt with the non-termination problem. We have seen that finding a correct and sufficient blocking condition for such fuzzy DLs is considerably difficult, which justifies the fact that reasoning with expressive fuzzy DLs was an open problem for many years. We have analyzed these difficulties and have proposed a safe blocking condition. Nevertheless, it is still an open question whether a more relaxed condition can indeed be employed. Subsequently, using our investigations we developed a tableaux reasoning algorithm for deciding the satisfiability problem for an f * -SI KB. Subsequently, we prove the soundness, completeness and termination of the algorithm. Finally, we show how one can use this algorithm to provide practical reasoning by using bMILP and bMIQP solvers as suggested in <ref type="bibr" target="#b21">[14,</ref><ref type="bibr" target="#b9">2]</ref>. Overall, we have proved decidability of the fuzzy DLs f L -SI, f P -SI, f WR -SI, f WS -SI, f YR -SI, f YS -SI, f Rei -SI, f SS 2 S -SI and f SS 2 R -SI.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>Some, examples of fuzzy operators are the Lukasiewicz negation, c L (a) = 1 − a, tnorm, t L (a, b) = max(0, a + b − 1), t-conorm, u L (a, b) = min(1, a + b), and implication, J L (a, b) = min(1, 1 − a + b), the Gödel norms t G (a, b) = min(a, b), u G (a, b) = max(a, b), and implication J G (a, b) = b if a &gt; b, 1 otherwise, the products norms, t P (a, b) = a • b, u P (a, b) = a + b − a • b the Goguen implication J P (a, b) = b a if a &gt; b, 1 otherwise, and the Kleene-Dienes implication (KD-implication), J KD (a, b) = max(1 − a, b).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Lemma 1 .</head><label>1</label><figDesc>If (∀R.C) I (a) ≥ n, Trans(R) then, (∀R.(∀R.C)) I (a) ≥ n if the fuzzy implications is either an R-implication, or an S-implications and the fuzzy triple c, t, u satisfies the De Morgan laws.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Lemma 2 .</head><label>2</label><figDesc>If (∃R.C) I (a) ≤ n and Trans(R) then, (∃R.(∃R.C)) I (a) ≤ n holds.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>(a : C) ≥ 0.8, (a : ∃R.C) ≥ 0.8, ((a, b) : R) ≥ 0.8, (b : C) ≥ 0.8, (b : ∃R.C) ≥ 0.8, one can discard b (since it is blocked by a) and create the cycle R I (a I , a I ) ≥ 0.8.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>individual b: (b : C) ≥ n 1 , (b : ∃R.C) ≥ n 2 and (b : ∀R.(∃R.C)) ≥ n 3 . Moreover, suppose that there is also another node c with similar assertions, thus blocked by b, and that the algorithm has computed the following values: n 1 = 0.6, n 2 = 0.4, n 3 = 0.3. To create a model we discard c and create the cycle R I (b I , b I ) = r new . It is not difficult to see that, in the constructed model, if we use the values that have been computed by the algorithm for degrees of C I (b I ), (∃R.C) I (b I ) and (∀R.(∃R.C)) I (b I ), then no degree r new can be found that satisfies all constraints. More precisely, for (∀R.(∃R.C)) I (b I ) = 0.3 (and considering R-implications) 1 it should hold that: 0.3 = J (r new , (∃R.C) I (b</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Theorem 1 (</head><label>1</label><figDesc>where ɛ is an arbitrary small degree, be solvedglb(Σ, a : C) = n iff min x = n under T , R, A ∪ {a : C ≤ x}Consequently, we have the following: Decidability of f L -SI and f P -SI). The tableaux algorithm together with a bMILP (resp. bMIQP) solver consist of a decision procedure for the inference problems of f L -SI (resp. f P -SI).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Theorem 3 (</head><label>3</label><figDesc>Decidability of f WS -SI, f WR -SI, f YS -SI, f YR -SI, f SS 2 S -SI and f SS 2 R -SI). The tableaux algorithm together with a bMIQP solver consist of a decision procedure for the inference problems of f WR -SI, f WS -SI, f YR -SI, f YS -SI, f SS 2 S -SI and f SS 2 R -SI.</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">Can also be shown for many S-implications.</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 2 (Completion-Forest).</head><p>A completion-forest F for an f * -SI KB Σ = T , A, R is a collection of trees whose distinguished roots are arbitrarily connected by edges and which also allows for a set of inequality constraints X . Each node x is labelled with a set L(x) = { C, ⊲⊳, n }, where C ∈ sub(Σ), ⊲⊳ ∈ {≥ , ≤} and n is either a degree from [0, 1] or a variable degree, i.e. a variable taking values in [0, 1]. Each edge x, y is labelled with a set L( x, y ) = { R, ⊲⊳, n }, where R ∈ R A are (possibly inverse) roles occurring in A.</p><p>If nodes x and y are connected by an edge x, y with R, ⊲⊳, n ∈ L( x, y ), then y is called an R ⊲⊳n -successor of x and x is called an R ⊲⊳n -predecessor of y. If y is an R ⊲⊳n -successor or an Inv(R) ⊲⊳n -predecessor of x, then y is called an R ⊲⊳n -neighbour of x. As usual, ancestor is the transitive closure of predecessor.</p><p>A node x is blocked iff it is not a root node and it is either directly or indirectly blocked. A node x is directly blocked iff none of its ancestors are blocked, it has an ancestor y such that L(x) and L(y) are equivalent, written</p><p>for all 1 ≤ i ≤ k and both n i and n i are variable degrees or the same rational from (0, 1] and the level of y is greater than the largest number of consecutive nested quantifiers found in concepts of Σ. Finally, a node x is indirectly blocked iff one of its predecessor is blocked.</p><p>A completion-forest F is said to contain a clash iff the system X of inequations has no solution, or for some node x, L(x) contains one of the following triples ⊥, ≥, n , ⊤, ≤, n , with n &gt; 0 or n &lt; 1, respectively.</p><p>For an f * -SI KB Σ = T , A, R , the algorithm initialises a forest F to contain (i) a root node x ai , for each individual a i ∈ I A occurring in A, labelled with L(x) such that C i , ⊲⊳, n ∈ L(x ai ) for each assertion of the form (a i : C i )⊲⊳n ∈ A, (ii) an edge x ai , x aj , for each assertion ((a i , a j ) : R i )⊲⊳n ∈ A, labelled with L( x ai , x aj ) such that R i , ⊲⊳, n ∈ L( x ai , x aj ), and (iii) a system of inequations X to contain u (xa i ,xa j ):R ⊲⊳n for each ((a i , a j ) : R i )⊲⊳n ∈ A. Furthermore, the algorithm expands R by adding an axiom Trans(Inv(R)) for each Trans(R) ∈ R. F is then expanded by repeatedly applying the completion rules from Table <ref type="table">2</ref> stopping when none of them is applicable (saying that F is complete) and adding necessary constraints 0 ≤ n ≤ 1 for each new degree n that is created during expansion, as well as constraints 0 &lt; ɛ ≤ 1 for any degree ɛ added due to normalization. The application of expansion rules adds inequalities in X which after F is complete should be solved by a suitable solution method, computing a value for each variable degree u a:A , u (a,b):R and n that appears in X , respectively. The algorithm answers 'Σ is satisfiable' iff the completion rules can be applied in such a way that they yield a complete and clash-free completionforest (a completion-forest that is both complete and no clash condition appears), and 'Σ is unsatisfiable' otherwise. <ref type="table">2</ref> can be applied to Σ such that they yield a complete and clash-free augmented completion forest.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Lemma 4. Let Σ be an f * -SI KB. Then, (i) when started for Σ the tableaux algorithm consisting of the expansion rules of Table 2 terminates; (ii) Σ has a fuzzy tableau if and only if the expansion rules of Table</head></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">⊥) = 0 and L(s</title>
		<author>
			<persName><surname>L(s</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">⊤) = 1 for all s ∈ S, 2. if L(s, ¬C)⊲⊳n, then L(s, C)⊲⊳ − n , where n ⊲⊳ − c</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">≥ n then L(s, C) ≥ n 1 , L(s, E) ≥ n 2 with t</title>
		<author>
			<persName><forename type="first">C</forename><surname>If L(s</surname></persName>
		</author>
		<imprint>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
	<note>n 2 ) ≥ n</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">≤ n 2 with u(n 1 , n 2 ) ≤ n, 5. if L(s, C ⊔ E) ≥ n then L(s, C) ≥ n 1 , L(s, E) ≥ n 2 with u(n 1 , n 2 ) ≥ n, 6. if L(s, C ⊓ E) ≤ n then L(s, C) ≤ n 1 , L(s, E) ≤ n 2 with t(n 1 , n 2 ) ≤ n, 7. if L(s, ∀R.C) ≥ n, then E(R, s, t ) ≤ n 1 , L(t, C) ≥ n 2 with J (n 1 , n 2 ) ≥ n, 8. if L(s, ∃R.C) ≤ n, then either E(R, s, t ) = n 1 ≤ n or L(t, C) ≤ n 2 with t</title>
		<author>
			<persName><forename type="first">C ⊔ E) ≤</forename><surname>If L(s</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">E)</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
		</imprint>
	</monogr>
	<note>) ≤ n</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">≥ n, then there exists t ∈ S such that E(R, s, t ) ≥ n 1 , L(t, C) ≥ n 2 with t(n 1 , n 2 ) ≥ n, 10. if L(s, ∀R.C) ≤ n, then there exists t ∈ S such that E(R, s, t ) ≤ n 1 , L(t</title>
		<author>
			<persName><forename type="first">∃r</forename><surname>If L(s</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">C) ≤ n 2 with t</title>
				<imprint>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
	<note>) ≤ n</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">≥ n and Trans(R), then E(R, s, t ) ≤ n 1 and L(t, ∀R.C) ≥ n 2 with J (n 1 , n 2 ) ≥ n, 12. if L(s, ∃R.C) ≤ n and Trans(R), then E(R, s, t ) = n 1 ≤ n or L(t, ∀R</title>
		<author>
			<persName><forename type="first">∀r</forename><surname>If L(s</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">.C) ≤ n 2 with t</title>
				<imprint>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
	<note>) ≤ n</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">t ) ≥ n iff E(Inv(R), t, s ) ≥ n</title>
		<author>
			<persName><forename type="first">S</forename><surname>E(r</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">)⊲⊳n ∈ A, then L(V(a), C)⊲⊳n</title>
				<editor>
			<persName><forename type="first">C</forename></persName>
		</editor>
		<imprint/>
	</monogr>
	<note>14. if</note>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">V</forename><surname>If ; R)⊲⊳n ∈ A, Then E(r</surname></persName>
		</author>
		<author>
			<persName><forename type="first">)</forename></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>; C ⊑ D ∈ T</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>(s</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>) ≤ L(s</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename></persName>
		</author>
		<imprint>
			<biblScope unit="volume">16</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">An f * -SI KB Σ is satisfiable by a witnessed model, iff there exists a fuzzy tableau for Σ</title>
		<imprint/>
	</monogr>
	<note>Lemma 3</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Fuzzy description logics with general t-norms and datatypes</title>
		<author>
			<persName><forename type="first">Fernando</forename><surname>Bobillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Umberto</forename><surname>Straccia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fuzzy Sets and Systems</title>
				<imprint>
			<publisher>Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A fuzzy description logic with product t-norm</title>
		<author>
			<persName><forename type="first">Fernando</forename><surname>Bobillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Umberto</forename><surname>Straccia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE International Conference on Fuzzy Systems (Fuzz-IEEE-07)</title>
				<meeting>the IEEE International Conference on Fuzzy Systems (Fuzz-IEEE-07)<address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Resolution of conflicts among ontology mappings: a fuzzy approach</title>
		<author>
			<persName><forename type="first">Alfio</forename><surname>Ferrara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Davide</forename><surname>Lorusso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Giorgos</forename><surname>Stamou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Giorgos</forename><surname>Stoilos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vassilis</forename><surname>Tzouvaras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tassos</forename><surname>Venetis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd International Workshop on Ontology Matching (OM 2008)</title>
				<meeting>the 3rd International Workshop on Ontology Matching (OM 2008)<address><addrLine>Karlsruhe, Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Making fuzzy description logic more general</title>
		<author>
			<persName><forename type="first">P</forename><surname>Hajek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">154</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="15" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">A description logic with transitive and inverse roles and role hierarchies</title>
		<author>
			<persName><forename type="first">I</forename><surname>Horrocks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Sattler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Logic and Computation</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="385" to="410" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Fuzzy Sets and Fuzzy Logic: Theory and Applications</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">J</forename><surname>Klir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Yuan</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1995">1995</date>
			<publisher>Prentice-Hall</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A model of multimedia information retrieval</title>
		<author>
			<persName><forename type="first">Carlo</forename><surname>Meghini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fabrizio</forename><surname>Sebastiani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Umberto</forename><surname>Straccia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the ACM</title>
		<imprint>
			<biblScope unit="volume">48</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="909" to="970" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Scalable querying services over fuzzy ontologies</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Z</forename><surname>Pan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Stamou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Stoilos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Thomas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International World Wide Web Conference (WWW 2008)</title>
				<meeting>the International World Wide Web Conference (WWW 2008)<address><addrLine>Beijing</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Combinatorial Optimization: Algorithms and Complexity</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Papadimitriou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Steiglitz</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1982">1982</date>
			<publisher>Prentice-Hall</publisher>
			<pubPlace>Englewood Cliffs, New Jersey</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Foundations of Integer Programming</title>
		<author>
			<persName><forename type="first">H</forename><surname>Salkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kamlesh</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1988">1988</date>
			<pubPlace>North-Holland</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Image indexing and retrieval using expressive fuzzy description logics</title>
		<author>
			<persName><forename type="first">N</forename><surname>Simou</surname></persName>
		</author>
		<author>
			<persName><surname>Th</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Athanasiadis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Stoilos</surname></persName>
		</author>
		<author>
			<persName><surname>Kollias</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Signal, Image and Video Processing</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="321" to="335" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>Springer</note>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Reasoning with very expressive fuzzy description logics</title>
		<author>
			<persName><forename type="first">Giorgos</forename><surname>Stoilos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Giorgos</forename><surname>Stamou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vassilis</forename><surname>Tzouvaras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jeff</forename><forename type="middle">Z</forename><surname>Pan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ian</forename><surname>Horrocks</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Artificial Intelligence Research</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="273" to="320" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Reasoning within fuzzy description logics</title>
		<author>
			<persName><forename type="first">U</forename><surname>Straccia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Artificial Intelligence Research</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="137" to="166" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Mixed integer programming, general concept inclusions and fuzzy description logics</title>
		<author>
			<persName><forename type="first">U</forename><surname>Straccia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Bobillo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th Conference of the European Society for Fuzzy Logic and Technology (EUSFLAT-07)</title>
				<meeting>the 5th Conference of the European Society for Fuzzy Logic and Technology (EUSFLAT-07)</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="213" to="220" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A description logic for vague knowledge</title>
		<author>
			<persName><forename type="first">C</forename><surname>Tresp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Molitor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">proc of the 13th European Conf. on Artificial Intelligence (ECAI-98)</title>
				<meeting>of the 13th European Conf. on Artificial Intelligence (ECAI-98)</meeting>
		<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="361" to="365" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
