<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Adding Context to Tableaux for DLs</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Weili Fu</string-name>
          <email>weili.fu77@googlemail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rafael Peñaloza</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Theoretical Computer Science</institution>
          ,
          <addr-line>TU Dresden</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We consider the problem of reasoning with ontologies where every axiom is associated to a context, and contexts are related through a total order. These contexts could represent, for example, a degree of trust associated to the axiom, or a level of granularity for the knowledge provided. We describe an extension of tableaux-based decision procedures into methods that compute the best-fitting context for the consequences of an ontology, and apply it to the tableaux algorithm for ALC. We also describe an execution strategy that preserves most of the standard optimizations used in modern DL reasoners.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Several non-standard reasoning tasks for DL ontologies can be described as
repeated standard reasoning, over some of its sub-ontologies. This is the case, for
example, in axiom-pinpointing [
        <xref ref-type="bibr" rid="ref12 ref14 ref3">14,12,3</xref>
        ], where the tasks is to identify the class
of sub-ontologies entailing a consequence, or access control [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], where users are
assigned views to specific subontologies, and one wants to decide which users
can or cannot deduce some implicit consequence.
      </p>
      <p>One can think of the sub-ontologies over which standard reasoning is
performed as contextual views to the whole ontology. The task is then to partition
the contexts into those that entail and those that do not entail the desired
consequence. An obvious way to solve this task is to test each of the potentially
exponentially many sub-ontologies for the consequence, and classify them
according to the result. However, it is possible to exploit the structure of the set
of contexts to obtain a more efficient method.</p>
      <p>
        Notice that every set of sub-ontologies defines a partial ordering via the
superset relationship: O O0 iff O0 O. This partial order can always be
extended to a lattice in which every context is join-prime [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. It has been shown
that there is an element in this lattice, called the boundary, such that the
following holds for every context O represented by a label `O: O entails the
consequence iff `O [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. If the lattice is distributive, then the boundary can
be computed in polynomial time on the size of the input ontology [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        So far, all the methods implemented for computing boundaries are based on
a black-box approach, in which an unmodified reasoner is called repeatedly until
the boundary has been found. In fact, attempts to produce a glass-box approach
for e.g. axiom-pinpointing [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], where the reasoner is modified to directly compute
the boundary, encounter the problem that most of the optimizations used in
implemented DL reasoners do not work in the modified procedures, making the
glass-box approaches much less efficient than black-box ones. Moreover,
glassbox extensions are not even guaranteed to terminate.
      </p>
      <p>
        In this paper we focus on a special case in which the contexts are linearly
ordered. That is, for every pair of sub-ontologies O; O0, either O O0 or O0 O.
This simple setting still covers a wide variety of applications, such as
possibilistic reasoning [
        <xref ref-type="bibr" rid="ref11 ref13">13,11</xref>
        ], trust management, or granularity reasoning. We develop a
glass-box approach for extending tableau-based decision algorithms into
procedures that compute the boundary for the consequence decided by the original
tableaux. A prioritization ordering of the rule applications of these procedures
ensures that the boundary-computation procedure behaves almost identically to
the original tableau. This entails not only termination of the algorithm, but also
that most of the optimization techniques used by modern DL reasoners are still
applicable to the extensions. An additional benefit of our method is that it can
deal with arbitrary blocking conditions, without losing its correctness.
      </p>
      <p>The paper is divided as follows. We first introduce the basic reasoning
problems we are interested in, followed by a general notion of tableaux. In Section 4
we describe the labeled extensions of tableaux, that output a boundary for the
desired property, and provide the prioritization ordering that ensures that these
extensions behave well. We wrap up by arguing that our approach can be seen as
a special case of incremental reasoning, and hence should be easy to implement
in modern DL reasoners.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Basic Definitions</title>
      <p>We start by introducing the general notion of consequence properties that are
decided by general tableaux. To avoid unnecessary confusion, we present slightly
simplified versions of the notions of consequence properties and tableaux, which
suffice for the goals of this paper. We consider also a general notion of axioms,
which can e.g. be assertions, GCIs, or concept definitions.</p>
      <p>Definition 1. Let O be a set of axioms, and let Pfin(O) denote the set of all
finite subsets of O. A consequence property (c-property) is a set P Pfin(O)
such that O 2 P implies O0 2 P for every O O0.</p>
      <p>Intuitively, c-properties model consequence relations in logic that are monotonic;
i.e. they describe which sets of axioms have or entail a desired consequence. For
example, one can consider the set O of all concept- and role-assertions in the
DL ALC and Pexa the set of all inconsistent ALC ABoxes. If Oexa is the ABox
having the assertions
ax1 : :9r:B(a)
ax2 : (:A u B)(b)
ax3 : 8r:A(a)
ax4 : r(a; b) (1)
then Oexa 2 Pexa; that is, Oexa is inconsistent. In general, we will call the sets
O 2 Pfin(O) ontologies.</p>
      <p>For several applications, axioms cannot be considered to have all equal
importance, but are provided with a label that represents the context to which they
belong. We consider only labels that come from a finite totally ordered set (L; ).
For the rest of this paper, we will denote the elements of L as `0; `1; : : : ; `k, with
the implicit ordering `i `j iff i j. In particular, `0 is the least- and `k is the
greatest-element of L.</p>
      <p>We will use the elements of the set L to define different contexts of an
ontology. Depending on the specific application at hand, these contexts can have
different meanings, such as access rights, level of expertise, trustworthiness,
necessity degree, etc.</p>
      <p>Every axiom t in an ontology O is assigned a label lab(t) 2 L, which expresses
the contexts from which this axiom can be accessed. An ontology extended with
such a labeling function lab will be called a labelled ontology. Each element ` 2 L
defines the context sub-ontology</p>
      <p>O ` := ft 2 O j lab(t)
`g:
Clearly, if ` `0, then O `0 O `. Conversely, every ontology O defines an
element O 2 L (called the label of O), given by O := minflab(t) j t 2 Og. It
follows from this definition that O O0 whenever O0 O.</p>
      <p>For a given labeled ontology, we want to compute the so-called boundary of
the c-property P. Intuitively, the boundary divides the contexts where P follows
from those where it does not follow.</p>
      <p>Definition 2. Let O be a labeled ontology and P a c-property. An element
is called a (O; P)-boundary if for every element ` 2 L the following holds:
2 L
`
iff</p>
      <p>O ` 2 P.</p>
      <p>When it is clear from the context, we will usually omit the prefix (O; P), and
call this a boundary.</p>
      <p>Continuing with our example, let the label of every axiom appearing in (1)
be lab(axi) = `i; 1 i 4. The (Oexa; Pexa)-boundary is then `2 since the
subontology O `2 = f:A u B(b); 8r:A(a); r(a; b)g is inconsistent, while the ontology
O `3 = f8r:A(a); r(a; b)g is consistent, i.e. does not belong to Pexa.</p>
      <p>
        It was shown in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] that if O 2 P, then the (O; P)-boundary always exists,
is unique, and can be computed using axiom-pinpointing techniques. Given an
ontology O that belongs to a c-property P, a minimal (w.r.t. set inclusion)
subontology O0 O that still belongs to P is called a MinA for O; P.1 If O1; : : : ; Om
are all the MinAs for O; P, then
= maxf Oi j 1
i
mg
(2)
is the (O; P)-boundary. However, using this method for computing the boundary
may result in an unnecessary overhead. In our running example, we can see
that fax1; ax2; ax4g and fax2; ax3; ax4g are the MinAs for Oexa; Pexa. The second
      </p>
      <sec id="sec-2-1">
        <title>1 These minimal sub-ontologies are also called justifications [9].</title>
        <p>
          MinA has label `2. If we happen to compute this second MinA first, then there is
no need to continue computing MinAs, as it is clear that any new MinA O0 must
contain the axiom ax1, and hence have label `1 &lt; `2. This new MinA will have no
influence in the computation of the maximum from Equation (2). This problem
is in fact more pronounced than what the example shows, since a single ontology
can have exponentially many MinAs [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], and the boundary can be computed by
a black-box algorithm that calls a decision procedure for P at most k = jLj
times; namely, once for each ` 2 L, to decide whether or not O ` 2 P.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>General Tableaux</title>
      <p>
        In this section we recall some of the notions of general tableaux [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. We use V
and D to denote two disjoint, countably infinite sets of variables and constants,
respectively. A signature is a set of predicate symbols, where each predicate
P 2 is equipped with an arity. A -assertion is of the form P (a1; : : : ; an)
where P 2 is an n-ary predicate and a1; : : : ; an 2 D. Similarly, a -pattern
is of the form P (x1; : : : ; xn) where P 2 and x1; : : : ; xn 2 V. Whenever the
signature is clear from the context, we simply say pattern (assertion). Given a
set of assertions A (resp. patterns B), cons(A) (resp. var(B)) denotes the set of
constants (resp. variables) occurring in A (resp. B).
      </p>
      <p>A substitution is a mapping : V ! D, where V 2 Pfin(V). In this case,
we say that is a substitution on V. The substitution on V 0 extends on V if
V V 0 and (x) = (x) for all x 2 V . If B is a set of patterns with var(B) V ,
then B denotes the set of assertions obtained from B by replacing each variable
by its image over the substitution .</p>
      <p>Definition 3. Let O be a set of axioms. A tableau for O is a tuple S = ( ; R; C)
where
– is a signature,
– R is a set of expansion rules of the form (B0; N ) ! fB1; : : : ; Bmg, where
B0; : : : ; Bm are finite sets of -patterns and N 2 Pfin(O), and input rules
of the form t ! B, where t 2 O and B is a finite set of -assertions, and
– C is a set of finite sets of -patterns, called clashes.</p>
      <p>Given an expansion rule R : (B0; N ) ! fB1; : : : ; Bmg, the variable y is a fresh
variable in R if it occurs in one of the sets B1; : : : ; Bm but not in B0.</p>
      <p>An S-state is a pair S = (A; O) where A is a finite set of assertions and O is
a finite set of axioms. The tableau algorithm works on sets of S-states. It starts
with the set M = f ;</p>
      <p>( ; O)g and uses the rules in R to modify this set. Each rule
application picks an S-state S from M and replaces it by finitely many new
S-states that extend the first component of S. When no rules are applicable,
then it tests whether the resulting set of S-states contains a clash; in that case,
it accepts the ontology, and rejects it otherwise.</p>
      <p>Definition 4. An input rule t ! B is applicable to an S-state (A; O) if t 2 O
and B 6 A. An expansion rule R : (B0; N ) ! fB1; : : : ; Bmg is applicable to an
S-state (A; O) with substitution on var(B0) if (i) N O, (ii) B0 A, and
(iii) for every 1 i m and every substitution 0 on var(B0 [ Bi) extending
we have Bi 0 6 A.</p>
      <p>Given a set of S-states M, application of an input rule R to S = (A; O) 2 M
yields the set M0 = (MnfSg)[f(A[B; O)g; application of an expansion rule R
to S = (A; O) 2 M with yields M0 = (M n fSg) [ f(A [ Bi ; O) j 1 i mg,
where is a substitution that extends and maps the fresh variables of R to
distinct new constants. If M0 is obtained from M by a rule application, we write
M !S M0. M is saturated if there is no M0 with M !S M0.</p>
      <p>The S-state (A; O) contains a clash if there is a C 2 C and a substitution
on var(C) with C A. M is full of clashes if every S 2 M contains a clash.</p>
      <p>A simple example of a tableau is the one for deciding inconsistency of ALC
ABoxes. Its clashes are all the sets fD; :Dg, where D is a concept name. It has
different expansion rules dealing with the constructors of ALC. For example, the
rules for existential restrictions and disjunction are as follows:</p>
      <p>R9 : (f9r:C(x)g; ;) ! ffr(x; y); C(y)gg;</p>
      <p>Rt : (fC t D(x)g; ;) ! ffC(x)g; fD(x)gg:
It also has input rules, for dealing with the ABox axioms used. For example, for
concept assertions, we use</p>
      <p>Ra : C(a) ! fC(a)g;
where a is the constant representing the individual name a.</p>
      <p>A tableau is correct for a c-property P if every chain of rule applications
starting with M0 = f(;; O)g eventually reaches a saturated set of S-states M
(i.e. it terminates) and it holds that O 2 P iff M is full of clashes.</p>
      <p>
        In general, tableaux are not guaranteed to terminate, as their expansion rules
may trigger the applicability of new expansion rules. This happens, for instance,
in the tableaux algorithm for deciding inconsistency w.r.t. general TBoxes. To
avoid this problem, a blocking condition is usually introduced. Intuitively,
blocking disallows the application of a rule, whenever its application would not lead
to the production of any new clashes; that is, when further expansions would not
change the acceptance status of the input ontology. Several blocking conditions—
like e.g. subset blocking [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], equality blocking [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], pairwise blocking [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], etc—have
been studied in the literature. Rather than trying to define and deal with each
of these conditions independently, we consider a general notion of blocking.
      </p>
      <p>A blocking condition is simply a set of finite sets of -assertions and
patterns, using only the variables from var(B0). Intuitively, these describe the
situations in which the rule should not be applied. Every expansion rule is then
extended with a blocking condition B, and the rule applicability condition is
restricted to satisfy additionally (iv) A 2= B . The notions of saturated sets of
Sstates and correctness w.r.t. a c-property are adapted accordingly. For example,
the subset blocking condition disallowing the applicability of the existential rule
in ALC is described by the set of all finite sets of -assertion and -patterns B
where the only variable used is x and such that there exist constants a1; : : : ; an
and roles r1; : : : ; rn such that ri(ai; ai + 1) for all i; 1 i &lt; n, ri(an; x), and
fC j C(x) 2 Bg fC j C(a1) 2 Bg.</p>
      <p>In the next section, we show how to transform tableaux that are correct for
a c-property P into procedures that directly compute the (O; P)-behaviour, for
any given ontology O. We focus first on tableaux without any blocking condition,
which can be used for deciding consistency of ALC ABoxes. Later on, we show
how to extend this construction to tableaux with blocking conditions, allowing
us to reason w.r.t. general TBoxes also.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Boundary Extensions of General Tableaux</title>
      <p>Given a tableau S that is correct for the c-property P, we show how to construct
an algorithm that computes the boundary for P. For the moment, we focus
on tableaux without blocking conditions, but later describe how to deal with
blocking also.</p>
      <p>For an input labeled ontology O, the modified algorithm also works on sets of
S-states, but every assertion a occurring in the first component of an S-state is
also equipped with a label lab(a); we call this a labeled S-state. The application
of rules must take the labels of the assertions and axioms into account.</p>
      <p>If A is a set of labeled assertions and ` 2 L, then we say that an assertion
a is `-insertable into A if either (i) a 2= A or (ii) a 2 A but ` &gt; lab(a). Given
a set B of (unlabeled) assertions and a set A of labeled assertions, the set of
`-insertable elements of B into A is</p>
      <p>ins`(B; A) := fb 2 B j b is `-insertable into Ag:
The `-insertion of these elements into A yields the set of labeled assertions
A d` B := A [ ins`(B; A), where each assertion a 2 A n ins`(B; A) keeps its
old label lab(a), each assertion in ins`(B; A) n A is labeled with `, and the label
of each assertion b 2 A \ ins`(B; A) is updated to `.</p>
      <p>Definition 5. The input rule t ! B is labeled applicable to a labeled S-state
S = (A; O) if t 2 O and inslab(t)(B; A) 6= ;. An expansion rule of the form
R : (B0; N ) ! fB1; : : : ; Bmg is labeled applicable to a labeled S-state (A; O)
with substitution on var(B0) if (i) N O, (ii) B0 A, and (iii) for every
1 i m and every substitution 0 on var(B0 [ Bi) extending we have
ins`(Bi 0; A) 6= ;, where ` := minflab( ) j = b ; b 2 B0 or = s; s 2 N g. We
call this ` the degree of the rule application.</p>
      <p>Given a set of labeled S-states M, the labeled application of the input rule R
to S = (A; O) 2 M yields the set M0 = (M n fSg) [ f(A dlab(t) B; O)g; labeled
application of the expansion rule R to S = (A; O) 2 M with yields the new set
M0 = (M n fSg) [ f(A d` Bi ; O) j 1 i mg, where ` is the degree of the rule
application, defined above, and is a substitution that extends and maps the
fresh variables of R to distinct new constants. If M0 is obtained from M by a
labeled rule application, we write M !Slab M0. M is labeled saturated if there
is no M0 with M !Slab M0.
( ; O)g !Slab M such</p>
      <p>Consider a finite chain of labeled rule applications f ;
that M is labeled saturated. The label of an assertion appearing in M expresses
the contexts that can derive this assertion. A clash in an S-state depends on the
joint presence of possibly several assertions; thus, we need to find the contexts
from which all of these assertions can be derived: this is given by the minimum
of the labels of all these assertions. To decide the property P, it suffices to have
one clash per S-state S; hence, we are only interested in the maximum of the
labels of all the clashes in a given state. As every S-state in M is required to
have at least one clash, we again compute the minimum of the labels obtained
from each S-state. We formalize this next.</p>
      <p>Definition 6. A set of assertions A0 is called a clash set in a labeled S-state
S = (A; O) if there is a clash C 2 C and a substitution on var(C) with A0 = C .
The label of this clash set is `A0 = minflab(a) j a 2 A0g.</p>
      <p>Given a set of labeled S-states M = fS1; : : : ; Sng, the clash degree induced
by M is `M := minfmaxf`A0 j A0 is a clash set in Sig j 1 i ng</p>
      <p>
        It can be shown, using similar techniques to the ones developed in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] for
pinpointing extensions of general tableaux that the clash degree is always the
boundary for the c-property decided by the original tableau.
      </p>
      <p>Theorem 7. Let P be a c-property on O and S a correct tableau for P. For
every ontology O 2 Pfin(O) the following holds:
for every finite chain of rule applications f(;; O)g !Slab M with M
labeled saturated, the clash degree `M induced by M is a (O; P)-boundary.
Notice that this result does not depend on the order in which rules are applied.
From a given set of S-states, several rules could be applicable, but the
correctness of the labeled extension does not depend on which one is chosen first. This
is an important feature of tableaux and their extensions, as it allows
optimizations based on the choice of an ordering that leads to shorter chains of rule
applications.</p>
      <p>
        Unfortunately, this general approach for extending tableaux into
boundarycomputation methods also inherits some of the negative properties of pinpointing
extensions of tableaux. In particular, (i) the labeled extension of a terminating
tableau is not guaranteed to terminate (see [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] for an example), and (ii) even if
it terminates, the labeled extension needs to run until saturation to guarantee
that the clash label computed is indeed the boundary. The second point is used
as an argument against glass-box approaches, as it disallows one of the most
basic optimizations for tableaux, namely stopping the application of expansion
rules on states where a clash has already been detected.
      </p>
      <p>We now show that if we prioritize rule applications with a higher degree,
then both of these problems disappear. Moreover, the same approach will allow
us to deal with general blocking conditions in Section 4.2.
By definition, the boundary is the largest context from which the c-property
can be derived. A simple idea to compute this boundary is then to try to first
produce all the assertions that can be derived from a context—that is, from all
the axioms having a label greater or equal to some `i—before applying rules that
use axioms with a smaller label. We implement this idea by prioritizing labeled
rule applications with a higher degree.</p>
      <p>Definition 8. The ordered extension of a tableau S is the labeled extension of
S where, if several rules are applicable to a set of labeled S-states M, then one
rule application having the highest degree is applied.</p>
      <p>We write M !Sord M0 if M0 is obtained from M by an ordered rule
application. M is ordered saturated if there is no M0 with M !Sord M0.
Several rule applications may have the same (highest) degree. In that case, it
is irrelevant which one of these is chosen. This prioritization ordering has the
consequence that the degree of successive rule applications is non-increasing.
Lemma 9. Let M0 !Sord M1 !Sord M2. If M2 is obtained by applying a rule
with degree ` to M1, and M1 is obtained by applying a rule with degree `0 to
M0, then ` `0.</p>
      <p>Proof. M1 differs from M0 by having some S-states S1; : : : ; Sm that modify
the assertional component of a S-state S 2 M0 in the following way: some new
assertions labeled with `0 are added, and some existing assertions get their label
increased to `0. In any case, all assertions appearing in some S-state of M1 with
label greater than `0 are also in an S-state of M0. If ` &gt; `0, then all the assertions
and axioms used to execute the rule M1 !Sord M2 have a label strictly greater
than `0, and hence this rule was applicable also to an S-state in M0. But ` &gt; `0
implies that `0 would not be applied, since it violates the prioritization ordering.
hence ` `0.
tu</p>
      <p>A simple consequence of this lemma is that the labels of assertions appearing
in the S-states are never modified by further ordered rule applications, as such
modification would imply a rule application with a higher degree than the rule
that originally created the assertion. This means that a rule is only ordered
applicable if it adds new assertions to the S-state, and thus, for any set of
S( ; O)g a rule is ordered applicable iff it
states reachable from the initial set f ;
is applicable in the original sense of Definition 4, as described by the following
theorem.</p>
      <p>Theorem 10. Let S be a tableau over O and O 2 Pfin(O). For every set of
labeled S-states M, it holds that
f(;; O)g !Sord M
iff
f(;; O `)g !S M,
where ` is the smallest label appearing in M.</p>
      <p>In particular, if S terminates in every input—as is the case for every tableau that
is correct for some c-property—then its ordered extension must also terminate.
Corollary 11. The ordered extension of any terminating tableau is terminating.</p>
      <p>More interesting, the execution of the ordered extension can be stopped as
soon as the set of S-states M is full of clashes, as further rule applications will
not modify the clash degree.</p>
      <p>Corollary 12. Let M; M0 be sets of S-states such that M is full of clashes and
f(;; O)g !Sord M !Sord M0. Then `M = `M0 .
4.2</p>
      <p>
        Dealing with Blocking
Consider now a tableau with blocking conditions associated to its rules, that
is correct for a property P. In general, the same blocking condition cannot be
used for restricting rule applications in its labeled extension. This would lead
to a clash degree that may be strictly smaller than the actual boundary that
this extension tries to compute, as can be seen by a simple adaptation from the
examples provided in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] for subset blocking and in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] for equality blocking.
The reason for this is that, since the blocking condition is independent of the
labels used, it might be that the assertions that trigger the blocking of a rule
application may depend on different contexts.
      </p>
      <p>
        To solve this problem, a modification of the blocking condition that also takes
into account the labels was proposed in [
        <xref ref-type="bibr" rid="ref10 ref4">10,4</xref>
        ]. However, it is not clear whether
more complex blocking conditions would require a more elaborate labeled
extension. Moreover, we want to produce a boundary-computing algorithm that
works for any kind of blocking condition that fits our very general framework.
      </p>
      <p>Fortunately, if we consider the prioritized rule-application ordering of ordered
extensions of tableaux, we can use Theorem 10 and Corollary 12 to show that
the same blocking conditions yield a correct computation of the boundary.</p>
      <p>To define the labeled extensions of tableaux with blocking, we adapt the
notion of labeled applicability of a rule to take into account the blocking
condition. An expansion rule R with a blocking condition B is labeled applicable to a
labeled S-state (A; O) if it satisfies the three conditions from Definition 5 and
additionally (iv) A 2= B.</p>
      <p>If a tableau with blocking is correct for a c-property P, then it terminates on
every input and when it reaches a saturated set of S-states, this is full of clashes
iff the input ontology satisfied the property. We thus have the following result.
Theorem 13. Let P be a c-property on O and S a correct tableau (with
blocking) for P. For every ontology O 2 Pfin(O) the following holds:
– the ordered extension of S terminates on O; that is, there is no infinite chain
of rule applications f(;; O)g !Sord M1 !Sord M2 !Sord : : :;
– for every chain of rule applications f(;; O)g !Sord M with M labeled
saturated, the clash degree `M induced by M is a (O; P)-boundary.</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>We have presented a general approach for extending general tableaux algorithms
that can decide a c-property P, into methods that can compute the boundary
for P w.r.t. to a set of linearly ordered contexts. Our approach can be used for
extending the tableau-based algorithm for deciding consistency of ALC ABoxes
w.r.t. general TBoxes, but is not limited to this logic. In fact, adding transitive
and inverse roles, or considering more complex blocking conditions would not be
a problem for our framework. However, our notion of general tableaux requires a
monotonic extension of the consequences deduced, and cannot identify previously
introduced individuals in a clean way. In future work we will study whether we
can construct a tableau for reasoning in full SROIQ(D).</p>
      <p>Our approach follows the lines of pinpointing extensions of tableaux, but has
several advantages over these, mainly due to the simplicity of the linear ordering.
By prioritizing the rule applications according to their degree—applying rules
with higher degree first—we obtained an algorithm that does not differ much
from the original tableau. The main intuition behind this prioritization of the
rule applications is that it deduces all the consequences from a context higher
in the ordering before testing contexts defined by a smaller label. Labeled rule
applications using this ordering never modify the label of a previously
existing assertion, and always add new assertions with non-increasing labels. Thus,
chains of ordered rule applications correspond to rule applications of the original
tableau. This in particular ensures that termination of a tableau transfers to its
ordered extension, a property that is not shared by pinpointing extensions, or
extensions based on lattices that are not linearly ordered.</p>
      <p>The execution of ordered extensions of tableaux can be seen as incremental
reasoning: given an ontology O, the ordered extension first saturates the tableau
using only the axioms having the greatest label `n. If this produces a set of
Sstates that is full of clashes, then we know that `n is the boundary for (O; P).
Otherwise, it adds the axioms with label `n 1, and continues the tableau
execution. Since several DL reasoners now implement incremental reasoning (e.g.
Pellet,2 FaCT++,3 or CEL4 ), we believe that an implementation of our
glassbox approach for reasoning in DLs with linearly ordered contexts will be a simple
step.</p>
      <sec id="sec-5-1">
        <title>2 http://clarkparsia.com/pellet/</title>
        <p>3 http://code.google.com/p/factplusplus/
4 http://lat.inf.tu-dresden.de/systems/cel/</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buchheit</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hollunder</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Cardinality restrictions on concepts</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>88</volume>
          (
          <issue>1-2</issue>
          ),
          <fpage>195</fpage>
          -
          <lpage>213</lpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Knechtel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peñaloza</surname>
          </string-name>
          , R.:
          <article-title>Context-dependent views to axioms and consequences of semantic web ontologies</article-title>
          .
          <source>Journal of Web Semantics 12-13</source>
          ,
          <fpage>22</fpage>
          -
          <lpage>40</lpage>
          (
          <year>April 2012</year>
          ), available at http://dx.doi.org/10.1016/j.websem.
          <year>2011</year>
          .
          <volume>11</volume>
          .006
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peñaloza</surname>
          </string-name>
          , R.:
          <article-title>Automata-based axiom pinpointing</article-title>
          .
          <source>Journal of Automated Reasoning</source>
          <volume>45</volume>
          (
          <issue>2</issue>
          ),
          <fpage>91</fpage>
          -
          <lpage>129</lpage>
          (
          <year>August 2010</year>
          ), special Issue:
          <article-title>Selected Papers from IJCAR 2008</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peñaloza</surname>
          </string-name>
          , R.:
          <article-title>Axiom pinpointing in general tableaux</article-title>
          .
          <source>Journal of Logic and Computation</source>
          <volume>20</volume>
          (
          <issue>1</issue>
          ),
          <fpage>5</fpage>
          -
          <lpage>34</lpage>
          (
          <year>February 2010</year>
          ), special Issue: Tableaux and Analytic Proof Methods
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peñaloza</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Suntisrivaraporn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Pinpointing in the description logic EL+</article-title>
          . In: Hertzberg,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Beetz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Englert</surname>
          </string-name>
          ,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 30th German Annual Conference on Artificial Intelligence (KI'07). Lecture Notes in Artificial Intelligence</source>
          , vol.
          <volume>4667</volume>
          , pp.
          <fpage>52</fpage>
          -
          <lpage>67</lpage>
          . Springer-Verlag, Osnabrück, Germany (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Davey</surname>
            ,
            <given-names>B.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Priestley</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          :
          <article-title>Introduction to Lattices and Order</article-title>
          . Cambridge University Press,
          <volume>2</volume>
          <fpage>edn</fpage>
          . (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>A description logic with transitive and inverse roles and role hierarchies</article-title>
          .
          <source>Journal of Logic and Computation</source>
          <volume>9</volume>
          (
          <issue>3</issue>
          ),
          <fpage>385</fpage>
          -
          <lpage>410</lpage>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tobies</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Practical reasoning for very expressive description logics</article-title>
          .
          <source>Journal of the Interest Group in Pure and Applied Logic</source>
          <volume>8</volume>
          (
          <issue>3</issue>
          ),
          <fpage>239</fpage>
          -
          <lpage>264</lpage>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kalyanpur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirin</surname>
          </string-name>
          , E.:
          <article-title>Finding all justifications of OWL DL entailments</article-title>
          . In: Aberer,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Choi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.S.</given-names>
            ,
            <surname>Noy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.F.</given-names>
            ,
            <surname>Allemang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.I.</given-names>
            ,
            <surname>Nixon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.J.B.</given-names>
            ,
            <surname>Golbeck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Mika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Maynard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Mizoguchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Schreiber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Cudré-Mauroux</surname>
          </string-name>
          , P. (eds.)
          <source>Proc. of the 6th Int. Semantic Web Conf. and 2nd Asian Semantic Web Conf. (ISWC'07,ASWC'07)</source>
          . LNCS, vol.
          <volume>4825</volume>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>280</lpage>
          . Springer-Verlag, Busan, Korea (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , Meyer, T.,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J.Z.</given-names>
          </string-name>
          :
          <article-title>Computing maximally satisfiable terminologies for the description logic ALC with GCIs</article-title>
          . In: Parsia,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            ,
            <surname>Toman</surname>
          </string-name>
          ,
          <string-name>
            <surname>D</surname>
          </string-name>
          . (eds.)
          <source>Proc. of the 2006 Description Logic Workshop (DL'06)</source>
          . Lake District, UK (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Lesot</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Couchariere</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bouchon-Meunier</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rogier</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          :
          <article-title>Inconsistency degree computation for possibilistic description logic: An extension of the tableau algorithm</article-title>
          .
          <source>In: Proceedings of the Annual Meeting of the North American Fuzzy Information Processing Society (NAFIPS</source>
          <year>2008</year>
          ). pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . IEEE Computer Society Press (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalyanpur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Debugging OWL ontologies</article-title>
          . In: Ellis,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Hagino</surname>
          </string-name>
          , T. (eds.)
          <source>Proc. of the 14th Int. Conf. on World Wide Web (WWW'05)</source>
          . pp.
          <fpage>633</fpage>
          -
          <lpage>640</lpage>
          . ACM (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J.Z.:</given-names>
          </string-name>
          <article-title>A tableau algorithm for possibilistic description logic</article-title>
          . In: Domingue,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Anutariya</surname>
          </string-name>
          , C. (eds.)
          <source>Proceedings of the 3rd Asian Semantic Web Conference (ASWC 2008). Lecture Notes in Computer Science</source>
          , vol.
          <volume>5367</volume>
          , pp.
          <fpage>61</fpage>
          -
          <lpage>75</lpage>
          . Springer-Verlag (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Schlobach</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cornet</surname>
          </string-name>
          , R.:
          <article-title>Non-standard reasoning services for the debugging of description logic terminologies</article-title>
          . In: Gottlob,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Walsh</surname>
          </string-name>
          , T. (eds.)
          <source>Proc. of the 18th Int. Joint Conf. on Artificial Intelligence (IJCAI'03)</source>
          . pp.
          <fpage>355</fpage>
          -
          <lpage>362</lpage>
          . Morgan Kaufmann, Los Altos, Acapulco, Mexico (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>