<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Adding Context to Tableaux for DLs</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Weili</forename><surname>Fu</surname></persName>
							<email>weili.fu77@googlemail.com</email>
							<affiliation key="aff0">
								<orgName type="department">Theoretical Computer Science</orgName>
								<orgName type="institution">TU Dresden</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rafael</forename><surname>Peñaloza</surname></persName>
							<email>penaloza@tcs.inf.tu-dresden.de</email>
							<affiliation key="aff0">
								<orgName type="department">Theoretical Computer Science</orgName>
								<orgName type="institution">TU Dresden</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Adding Context to Tableaux for DLs</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">4807366BB4548310B3A6F536182E5EDA</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T23:09+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We consider the problem of reasoning with ontologies where every axiom is associated to a context, and contexts are related through a total order. These contexts could represent, for example, a degree of trust associated to the axiom, or a level of granularity for the knowledge provided. We describe an extension of tableaux-based decision procedures into methods that compute the best-fitting context for the consequences of an ontology, and apply it to the tableaux algorithm for ALC. We also describe an execution strategy that preserves most of the standard optimizations used in modern DL reasoners.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Several non-standard reasoning tasks for DL ontologies can be described as repeated standard reasoning, over some of its sub-ontologies. This is the case, for example, in axiom-pinpointing <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b2">3]</ref>, where the tasks is to identify the class of sub-ontologies entailing a consequence, or access control <ref type="bibr" target="#b1">[2]</ref>, where users are assigned views to specific subontologies, and one wants to decide which users can or cannot deduce some implicit consequence.</p><p>One can think of the sub-ontologies over which standard reasoning is performed as contextual views to the whole ontology. The task is then to partition the contexts into those that entail and those that do not entail the desired consequence. An obvious way to solve this task is to test each of the potentially exponentially many sub-ontologies for the consequence, and classify them according to the result. However, it is possible to exploit the structure of the set of contexts to obtain a more efficient method.</p><p>Notice that every set of sub-ontologies defines a partial ordering ≤ via the superset relationship: O ≤ O iff O ⊆ O. This partial order can always be extended to a lattice in which every context is join-prime <ref type="bibr" target="#b5">[6]</ref>. It has been shown that there is an element ν in this lattice, called the boundary, such that the following holds for every context O represented by a label O : O entails the consequence iff O ≤ ν <ref type="bibr" target="#b1">[2]</ref>. If the lattice is distributive, then the boundary can be computed in polynomial time on the size of the input ontology <ref type="bibr" target="#b2">[3]</ref>.</p><p>So far, all the methods implemented for computing boundaries are based on a black-box approach, in which an unmodified reasoner is called repeatedly until the boundary has been found. In fact, attempts to produce a glass-box approach for e.g. axiom-pinpointing <ref type="bibr" target="#b3">[4]</ref>, where the reasoner is modified to directly compute the boundary, encounter the problem that most of the optimizations used in implemented DL reasoners do not work in the modified procedures, making the glass-box approaches much less efficient than black-box ones. Moreover, glassbox extensions are not even guaranteed to terminate.</p><p>In this paper we focus on a special case in which the contexts are linearly ordered. That is, for every pair of sub-ontologies O, O , either O ⊆ O or O ⊆ O. This simple setting still covers a wide variety of applications, such as possibilistic reasoning <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b10">11]</ref>, trust management, or granularity reasoning. We develop a glass-box approach for extending tableau-based decision algorithms into procedures that compute the boundary for the consequence decided by the original tableaux. A prioritization ordering of the rule applications of these procedures ensures that the boundary-computation procedure behaves almost identically to the original tableau. This entails not only termination of the algorithm, but also that most of the optimization techniques used by modern DL reasoners are still applicable to the extensions. An additional benefit of our method is that it can deal with arbitrary blocking conditions, without losing its correctness.</p><p>The paper is divided as follows. We first introduce the basic reasoning problems we are interested in, followed by a general notion of tableaux. In Section 4 we describe the labeled extensions of tableaux, that output a boundary for the desired property, and provide the prioritization ordering that ensures that these extensions behave well. We wrap up by arguing that our approach can be seen as a special case of incremental reasoning, and hence should be easy to implement in modern DL reasoners.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Basic Definitions</head><p>We start by introducing the general notion of consequence properties that are decided by general tableaux. To avoid unnecessary confusion, we present slightly simplified versions of the notions of consequence properties and tableaux, which suffice for the goals of this paper. We consider also a general notion of axioms, which can e.g. be assertions, GCIs, or concept definitions. then O exa ∈ P exa ; that is, O exa is inconsistent. In general, we will call the sets O ∈ P f in (O) ontologies.</p><p>For several applications, axioms cannot be considered to have all equal importance, but are provided with a label that represents the context to which they belong. We consider only labels that come from a finite totally ordered set (L, ≤). For the rest of this paper, we will denote the elements of L as 0 , 1 , . . . , k , with the implicit ordering i ≤ j iff i ≤ j. In particular, 0 is the least-and k is the greatest-element of L.</p><p>We will use the elements of the set L to define different contexts of an ontology. Depending on the specific application at hand, these contexts can have different meanings, such as access rights, level of expertise, trustworthiness, necessity degree, etc.</p><p>Every axiom t in an ontology O is assigned a label lab(t) ∈ L, which expresses the contexts from which this axiom can be accessed. An ontology extended with such a labeling function lab will be called a labelled ontology. Each element ∈ L defines the context sub-ontology</p><formula xml:id="formula_0">O ≥ := {t ∈ O | lab(t) ≥ }. Clearly, if ≤ , then O ≥ ⊆ O ≥ . Conversely, every ontology O defines an element λ O ∈ L (called the label of O), given by λ O := min{lab(t) | t ∈ O}. It follows from this definition that λ O ≤ λ O whenever O ⊆ O.</formula><p>For a given labeled ontology, we want to compute the so-called boundary of the c-property P. Intuitively, the boundary divides the contexts where P follows from those where it does not follow. Definition 2. Let O be a labeled ontology and P a c-property. An element ν ∈ L is called a (O, P)-boundary if for every element ∈ L the following holds:</p><formula xml:id="formula_1">≤ ν iff O ≥ ∈ P.</formula><p>When it is clear from the context, we will usually omit the prefix (O, P), and call this ν a boundary.</p><p>Continuing with our example, let the label of every axiom appearing in (1) be lab(ax i ) = i , 1 ≤ i ≤ 4. The (O exa , P exa )-boundary is then 2 since the subontology O ≥ 2 = {¬A B(b), ∀r.A(a), r(a, b)} is inconsistent, while the ontology O ≥ 3 = {∀r.A(a), r(a, b)} is consistent, i.e. does not belong to P exa .</p><p>It was shown in <ref type="bibr" target="#b1">[2]</ref> that if O ∈ P, then the (O, P)-boundary always exists, is unique, and can be computed using axiom-pinpointing techniques. Given an ontology O that belongs to a c-property P, a minimal (w.r.t. set inclusion) subontology O ⊆ O that still belongs to P is called a MinA for O, P. <ref type="foot" target="#foot_0">1</ref> If O 1 , . . . , O m are all the MinAs for O, P, then</p><formula xml:id="formula_2">ν = max{λ Oi | 1 ≤ i ≤ m}<label>(2)</label></formula><p>is the (O, P)-boundary. However, using this method for computing the boundary may result in an unnecessary overhead. In our running example, we can see that {ax 1 , ax 2 , ax 4 } and {ax 2 , ax 3 , ax 4 } are the MinAs for O exa , P exa . The second MinA has label 2 . If we happen to compute this second MinA first, then there is no need to continue computing MinAs, as it is clear that any new MinA O must contain the axiom ax 1 , and hence have label 1 &lt; 2 . This new MinA will have no influence in the computation of the maximum from Equation ( <ref type="formula" target="#formula_2">2</ref>). This problem is in fact more pronounced than what the example shows, since a single ontology can have exponentially many MinAs <ref type="bibr" target="#b4">[5]</ref>, and the boundary can be computed by a black-box algorithm that calls a decision procedure for P at most k = |L| times; namely, once for each ∈ L, to decide whether or not O ≥ ∈ P.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">General Tableaux</head><p>In this section we recall some of the notions of general tableaux <ref type="bibr" target="#b3">[4]</ref>. We use V and D to denote two disjoint, countably infinite sets of variables and constants, respectively. A signature Σ is a set of predicate symbols, where each predicate P ∈ Σ is equipped with an arity. A Σ-assertion is of the form P (a 1 , . . . , a n ) where P ∈ Σ is an n-ary predicate and a 1 , . . . , a n ∈ D. Similarly, a Σ-pattern is of the form P (x 1 , . . . , x n ) where P ∈ Σ and x 1 , . . . , x n ∈ V. Whenever the signature is clear from the context, we simply say pattern (assertion). Given a set of assertions A (resp. patterns B), cons(A) (resp. var(B)) denotes the set of constants (resp. variables) occurring in A (resp. B).</p><p>A substitution is a mapping σ : V → D, where V ∈ P f in (V). In this case, we say that σ is a substitution on V. The substitution </p><formula xml:id="formula_3">θ on V extends σ on V if V ⊆ V and θ(x) = σ(x) for all x ∈ V . If B is</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Given an expansion rule</head><formula xml:id="formula_4">R : (B 0 , N ) → {B 1 , . . . , B m }, the variable y is a fresh variable in R if it occurs in one of the sets B 1 , . . . , B m but not in B 0 .</formula><p>An S-state is a pair S = (A, O) where A is a finite set of assertions and O is a finite set of axioms. The tableau algorithm works on sets of S-states. It starts with the set M = {(∅, O)} and uses the rules in R to modify this set. Each rule application picks an S-state S from M and replaces it by finitely many new S-states that extend the first component of S. When no rules are applicable, then it tests whether the resulting set of S-states contains a clash; in that case, it accepts the ontology, and rejects it otherwise.</p><formula xml:id="formula_5">Definition 4. An input rule t → B is applicable to an S-state (A, O) if t ∈ O and B ⊆ A. An expansion rule R : (B 0 , N ) → {B 1 , . . . , B m } is applicable to an S-state (A, O) with substitution ρ on var(B 0 ) if (i) N ⊆ O, (ii) B 0 ρ ⊆ A,</formula><p>and (iii) for every 1 ≤ i ≤ m and every substitution ρ on var(B 0 ∪ B i ) extending ρ we have</p><formula xml:id="formula_6">B i ρ ⊆ A.</formula><p>Given a set of S-states M, application of an input rule</p><formula xml:id="formula_7">R to S = (A, O) ∈ M yields the set M = (M\{S})∪{(A∪B, O)}; application of an expansion rule R to S = (A, O) ∈ M with ρ yields M = (M \ {S}) ∪ {(A ∪ B i σ, O) | 1 ≤ i ≤ m},</formula><p>where σ is a substitution that extends ρ and maps the fresh variables of R to distinct new constants. If M is obtained from M by a rule application, we write</p><formula xml:id="formula_8">M → S M . M is saturated if there is no M with M → S M .</formula><p>The S-state (A, O) contains a clash if there is a C ∈ C and a substitution ρ on var(C) with Cρ ⊆ A. M is full of clashes if every S ∈ M contains a clash.</p><p>A simple example of a tableau is the one for deciding inconsistency of ALC ABoxes. Its clashes are all the sets {D, ¬D}, where D is a concept name. It has different expansion rules dealing with the constructors of ALC. For example, the rules for existential restrictions and disjunction are as follows:</p><formula xml:id="formula_9">R ∃ : ({∃r.C(x)}, ∅) → {{r(x, y), C(y)}}, R : ({C D(x)}, ∅) → {{C(x)}, {D(x)}}.</formula><p>It also has input rules, for dealing with the ABox axioms used. For example, for concept assertions, we use</p><formula xml:id="formula_10">R a : C(a) → {C(a)},</formula><p>where a is the constant representing the individual name a.</p><p>A tableau is correct for a c-property P if every chain of rule applications starting with M 0 = {(∅, O)} eventually reaches a saturated set of S-states M (i.e. it terminates) and it holds that O ∈ P iff M is full of clashes.</p><p>In general, tableaux are not guaranteed to terminate, as their expansion rules may trigger the applicability of new expansion rules. This happens, for instance, in the tableaux algorithm for deciding inconsistency w.r.t. general TBoxes. To avoid this problem, a blocking condition is usually introduced. Intuitively, blocking disallows the application of a rule, whenever its application would not lead to the production of any new clashes; that is, when further expansions would not change the acceptance status of the input ontology. Several blocking conditionslike e.g. subset blocking <ref type="bibr" target="#b0">[1]</ref>, equality blocking <ref type="bibr" target="#b6">[7]</ref>, pairwise blocking <ref type="bibr" target="#b7">[8]</ref>, etc-have been studied in the literature. Rather than trying to define and deal with each of these conditions independently, we consider a general notion of blocking.</p><p>A blocking condition is simply a set of finite sets of Σ-assertions and Σpatterns, using only the variables from var(B 0 ). Intuitively, these describe the situations in which the rule should not be applied. Every expansion rule is then extended with a blocking condition B, and the rule applicability condition is restricted to satisfy additionally (iv) A / ∈ Bρ. The notions of saturated sets of Sstates and correctness w.r.t. a c-property are adapted accordingly. For example, the subset blocking condition disallowing the applicability of the existential rule in ALC is described by the set of all finite sets of Σ-assertion and Σ-patterns B where the only variable used is x and such that there exist constants a 1 , . . . , a n and roles r 1 , . . . , r n such that r i (a i , a i + 1) for all i, 1 ≤ i &lt; n, r i (a n , x), and</p><formula xml:id="formula_11">{C | C(x) ∈ B} ⊆ {C | C(a 1 ) ∈ B}.</formula><p>In the next section, we show how to transform tableaux that are correct for a c-property P into procedures that directly compute the (O, P)-behaviour, for any given ontology O. We focus first on tableaux without any blocking condition, which can be used for deciding consistency of ALC ABoxes. Later on, we show how to extend this construction to tableaux with blocking conditions, allowing us to reason w.r.t. general TBoxes also.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Boundary Extensions of General Tableaux</head><p>Given a tableau S that is correct for the c-property P, we show how to construct an algorithm that computes the boundary for P. For the moment, we focus on tableaux without blocking conditions, but later describe how to deal with blocking also.</p><p>For an input labeled ontology O, the modified algorithm also works on sets of S-states, but every assertion a occurring in the first component of an S-state is also equipped with a label lab(a); we call this a labeled S-state. The application of rules must take the labels of the assertions and axioms into account.</p><p>If A is a set of labeled assertions and ∈ L, then we say that an assertion a is -insertable into A if either (i) a / ∈ A or (ii) a ∈ A but &gt; lab(a). Given a set B of (unlabeled) assertions and a set A of labeled assertions, the set of -insertable elements of </p><formula xml:id="formula_12">B into A is ins (B, A) := {b ∈ B | b is -insertable into A}.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The -insertion of these elements into</head><formula xml:id="formula_13">= (M \ {S}) ∪ {(A B i σ, O) | 1 ≤ i ≤ m},</formula><p>where is the degree of the rule application, defined above, and σ is a substitution that extends ρ and maps the fresh variables of R to distinct new constants. If M is obtained from M by a labeled rule application, we write M → S lab M . M is labeled saturated if there is no M with M → S lab M .</p><p>Consider a finite chain of labeled rule applications {(∅, O)} * − → S lab M such that M is labeled saturated. The label of an assertion appearing in M expresses the contexts that can derive this assertion. A clash in an S-state depends on the joint presence of possibly several assertions; thus, we need to find the contexts from which all of these assertions can be derived: this is given by the minimum of the labels of all these assertions. To decide the property P, it suffices to have one clash per S-state S; hence, we are only interested in the maximum of the labels of all the clashes in a given state. As every S-state in M is required to have at least one clash, we again compute the minimum of the labels obtained from each S-state. We formalize this next. Definition 6. A set of assertions A is called a clash set in a labeled S-state S = (A, O) if there is a clash C ∈ C and a substitution ρ on var(C) with A = Cρ.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The label of this clash set is</head><formula xml:id="formula_14">A = min{lab(a) | a ∈ A }.</formula><p>Given a set of labeled S-states M = {S 1 , . . . , S n }, the clash degree induced by</p><formula xml:id="formula_15">M is M := min{max{ A | A is a clash set in S i } | 1 ≤ i ≤ n}</formula><p>It can be shown, using similar techniques to the ones developed in <ref type="bibr" target="#b3">[4]</ref> for pinpointing extensions of general tableaux that the clash degree is always the boundary for the c-property decided by the original tableau. Notice that this result does not depend on the order in which rules are applied. From a given set of S-states, several rules could be applicable, but the correctness of the labeled extension does not depend on which one is chosen first. This is an important feature of tableaux and their extensions, as it allows optimizations based on the choice of an ordering that leads to shorter chains of rule applications.</p><p>Unfortunately, this general approach for extending tableaux into boundarycomputation methods also inherits some of the negative properties of pinpointing extensions of tableaux. In particular, (i) the labeled extension of a terminating tableau is not guaranteed to terminate (see <ref type="bibr" target="#b3">[4]</ref> for an example), and (ii) even if it terminates, the labeled extension needs to run until saturation to guarantee that the clash label computed is indeed the boundary. The second point is used as an argument against glass-box approaches, as it disallows one of the most basic optimizations for tableaux, namely stopping the application of expansion rules on states where a clash has already been detected.</p><p>We now show that if we prioritize rule applications with a higher degree, then both of these problems disappear. Moreover, the same approach will allow us to deal with general blocking conditions in Section 4.2.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Prioritized Rule Applications</head><p>By definition, the boundary is the largest context from which the c-property can be derived. A simple idea to compute this boundary is then to try to first produce all the assertions that can be derived from a context-that is, from all the axioms having a label greater or equal to some i -before applying rules that use axioms with a smaller label. We implement this idea by prioritizing labeled rule applications with a higher degree. Definition 8. The ordered extension of a tableau S is the labeled extension of S where, if several rules are applicable to a set of labeled S-states M, then one rule application having the highest degree is applied.</p><p>We write M → S ord M if M is obtained from M by an ordered rule application. M is ordered saturated if there is no M with M → S ord M .</p><p>Several rule applications may have the same (highest) degree. In that case, it is irrelevant which one of these is chosen. This prioritization ordering has the consequence that the degree of successive rule applications is non-increasing.</p><formula xml:id="formula_16">Lemma 9. Let M 0 → S ord M 1 → S ord M 2 . If M 2 is</formula><p>obtained by applying a rule with degree to M 1 , and M 1 is obtained by applying a rule with degree to M 0 , then ≤ .</p><p>Proof. M 1 differs from M 0 by having some S-states S 1 , . . . , S m that modify the assertional component of a S-state S ∈ M 0 in the following way: some new assertions labeled with are added, and some existing assertions get their label increased to . In any case, all assertions appearing in some S-state of M 1 with label greater than are also in an S-state of M 0 . If &gt; , then all the assertions and axioms used to execute the rule M 1 → S ord M 2 have a label strictly greater than , and hence this rule was applicable also to an S-state in M 0 . But &gt; implies that would not be applied, since it violates the prioritization ordering. hence ≤ .</p><p>A simple consequence of this lemma is that the labels of assertions appearing in the S-states are never modified by further ordered rule applications, as such modification would imply a rule application with a higher degree than the rule that originally created the assertion. This means that a rule is only ordered applicable if it adds new assertions to the S-state, and thus, for any set of Sstates reachable from the initial set {(∅, O)} a rule is ordered applicable iff it is applicable in the original sense of Definition 4, as described by the following theorem.</p><p>Theorem 10. Let S be a tableau over O and O ∈ P f in (O). For every set of labeled S-states M, it holds that</p><formula xml:id="formula_17">{(∅, O)} * − → S ord M iff {(∅, O ≥ )} * − → S M,</formula><p>where is the smallest label appearing in M.</p><p>In particular, if S terminates in every input-as is the case for every tableau that is correct for some c-property-then its ordered extension must also terminate.</p><p>Corollary 11. The ordered extension of any terminating tableau is terminating.</p><p>More interesting, the execution of the ordered extension can be stopped as soon as the set of S-states M is full of clashes, as further rule applications will not modify the clash degree.</p><p>Corollary 12. Let M, M be sets of S-states such that M is full of clashes and</p><formula xml:id="formula_18">{(∅, O)} * − → S ord M * − → S ord M . Then M = M .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Dealing with Blocking</head><p>Consider now a tableau with blocking conditions associated to its rules, that is correct for a property P. In general, the same blocking condition cannot be used for restricting rule applications in its labeled extension. This would lead to a clash degree that may be strictly smaller than the actual boundary that this extension tries to compute, as can be seen by a simple adaptation from the examples provided in <ref type="bibr" target="#b9">[10]</ref> for subset blocking and in <ref type="bibr" target="#b3">[4]</ref> for equality blocking. The reason for this is that, since the blocking condition is independent of the labels used, it might be that the assertions that trigger the blocking of a rule application may depend on different contexts.</p><p>To solve this problem, a modification of the blocking condition that also takes into account the labels was proposed in <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b3">4]</ref>. However, it is not clear whether more complex blocking conditions would require a more elaborate labeled extension. Moreover, we want to produce a boundary-computing algorithm that works for any kind of blocking condition that fits our very general framework.</p><p>Fortunately, if we consider the prioritized rule-application ordering of ordered extensions of tableaux, we can use Theorem 10 and Corollary 12 to show that the same blocking conditions yield a correct computation of the boundary.</p><p>To define the labeled extensions of tableaux with blocking, we adapt the notion of labeled applicability of a rule to take into account the blocking condition. An expansion rule R with a blocking condition B is labeled applicable to a labeled S-state (A, O) if it satisfies the three conditions from Definition 5 and additionally (iv) A / ∈ B. If a tableau with blocking is correct for a c-property P, then it terminates on every input and when it reaches a saturated set of S-states, this is full of clashes iff the input ontology satisfied the property. We thus have the following result.</p><p>Theorem 13. Let P be a c-property on O and S a correct tableau (with blocking) for P. For every ontology O ∈ P f in (O) the following holds:</p><p>the ordered extension of S terminates on O; that is, there is no infinite chain of rule applications {(∅, O)} → S ord M 1 → S ord M 2 → S ord . . .; for every chain of rule applications {(∅, O)} * − → S ord M with M labeled saturated, the clash degree M induced by M is a (O, P)-boundary.</p><p>We have presented a general approach for extending general tableaux algorithms that can decide a c-property P, into methods that can compute the boundary for P w.r.t. to a set of linearly ordered contexts. Our approach can be used for extending the tableau-based algorithm for deciding consistency of ALC ABoxes w.r.t. general TBoxes, but is not limited to this logic. In fact, adding transitive and inverse roles, or considering more complex blocking conditions would not be a problem for our framework. However, our notion of general tableaux requires a monotonic extension of the consequences deduced, and cannot identify previously introduced individuals in a clean way. In future work we will study whether we can construct a tableau for reasoning in full SROIQ(D).</p><p>Our approach follows the lines of pinpointing extensions of tableaux, but has several advantages over these, mainly due to the simplicity of the linear ordering. By prioritizing the rule applications according to their degree-applying rules with higher degree first-we obtained an algorithm that does not differ much from the original tableau. The main intuition behind this prioritization of the rule applications is that it deduces all the consequences from a context higher in the ordering before testing contexts defined by a smaller label. Labeled rule applications using this ordering never modify the label of a previously existing assertion, and always add new assertions with non-increasing labels. Thus, chains of ordered rule applications correspond to rule applications of the original tableau. This in particular ensures that termination of a tableau transfers to its ordered extension, a property that is not shared by pinpointing extensions, or extensions based on lattices that are not linearly ordered.</p><p>The execution of ordered extensions of tableaux can be seen as incremental reasoning: given an ontology O, the ordered extension first saturates the tableau using only the axioms having the greatest label n . If this produces a set of Sstates that is full of clashes, then we know that n is the boundary for (O, P). Otherwise, it adds the axioms with label n−1 , and continues the tableau execution. Since several DL reasoners now implement incremental reasoning (e.g. Pellet,<ref type="foot" target="#foot_1">2</ref> FaCT++,<ref type="foot" target="#foot_2">3</ref> or CEL<ref type="foot" target="#foot_3">4</ref> ), we believe that an implementation of our glassbox approach for reasoning in DLs with linearly ordered contexts will be a simple step.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Definition 1 .</head><label>1</label><figDesc>Let O be a set of axioms, and let P f in (O) denote the set of all finite subsets of O. A consequence property (c-property) is a set P ⊆ P f in (O) such that O ∈ P implies O ∈ P for every O ⊆ O . Intuitively, c-properties model consequence relations in logic that are monotonic; i.e. they describe which sets of axioms have or entail a desired consequence. For example, one can consider the set O of all concept-and role-assertions in the DL ALC and P exa the set of all inconsistent ALC ABoxes. If O exa is the ABox having the assertions ax 1 : ¬∃r.B(a) ax 2 : (¬A B)(b) ax 3 : ∀r.A(a) ax 4 : r(a, b) (1)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>a set of patterns with var(B) ⊆ V , then Bσ denotes the set of assertions obtained from B by replacing each variable by its image over the substitution σ. Definition 3. Let O be a set of axioms. A tableau for O is a tuple S = (Σ, R, C) where -Σ is a signature, -R is a set of expansion rules of the form (B 0 , N ) → {B 1 , . . . , B m }, where B 0 , . . . , B m are finite sets of Σ-patterns and N ∈ P f in (O), and input rules of the form t → B, where t ∈ O and B is a finite set of Σ-assertions, and -C is a set of finite sets of Σ-patterns, called clashes.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Definition 5 .</head><label>5</label><figDesc>A yields the set of labeled assertions A B := A ∪ ins (B, A), where each assertion a ∈ A \ ins (B, A) keeps its old label lab(a), each assertion in ins (B, A) \ A is labeled with , and the label of each assertion b ∈ A ∩ ins (B, A) is updated to . The input rule t → B is labeled applicable to a labeled S-state S = (A, O) if t ∈ O and ins lab(t) (B, A) = ∅. An expansion rule of the form R : (B 0 , N ) → {B 1 , . . . , B m } is labeled applicable to a labeled S-state (A, O) with substitution ρ on var(B 0 ) if (i) N ⊆ O, (ii) B 0 ρ ⊆ A, and (iii) for every 1 ≤ i ≤ m and every substitution ρ on var(B 0 ∪ B i ) extending ρ we have ins (B i ρ , A) = ∅, where := min{lab(α) | α = bρ, b ∈ B 0 or α = s, s ∈ N }. We call this the degree of the rule application. Given a set of labeled S-states M, the labeled application of the input rule R to S = (A, O) ∈ M yields the set M = (M \ {S}) ∪ {(A lab(t) B, O)}; labeled application of the expansion rule R to S = (A, O) ∈ M with ρ yields the new set M</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Theorem 7 .</head><label>7</label><figDesc>Let P be a c-property on O and S a correct tableau for P. For every ontology O ∈ P f in (O) the following holds: for every finite chain of rule applications {(∅, O)} * − → S lab M with M labeled saturated, the clash degree M induced by M is a (O, P)-boundary.</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">These minimal sub-ontologies are also called justifications<ref type="bibr" target="#b8">[9]</ref>.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">http://clarkparsia.com/pellet/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">http://code.google.com/p/factplusplus/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">http://lat.inf.tu-dresden.de/systems/cel/</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Cardinality restrictions on concepts</title>
		<author>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Buchheit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Hollunder</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">88</biblScope>
			<biblScope unit="issue">1-2</biblScope>
			<biblScope unit="page" from="195" to="213" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Context-dependent views to axioms and consequences of semantic web ontologies</title>
		<author>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Knechtel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Peñaloza</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.websem.2011.11.006</idno>
		<ptr target="http://dx.doi.org/10.1016/j.websem.2011.11.006" />
	</analytic>
	<monogr>
		<title level="j">Journal of Web Semantics</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="22" to="40" />
			<date type="published" when="2012-04">April 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Automata-based axiom pinpointing</title>
		<author>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Peñaloza</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Selected Papers from IJCAR 2008</title>
				<imprint>
			<date type="published" when="2010-08">August 2010</date>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="page" from="91" to="129" />
		</imprint>
	</monogr>
	<note>special Issue</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Axiom pinpointing in general tableaux</title>
		<author>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Peñaloza</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Tableaux and Analytic Proof Methods</title>
				<imprint>
			<date type="published" when="2010-02">February 2010</date>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="5" to="34" />
		</imprint>
	</monogr>
	<note>special Issue:</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Pinpointing in the description logic EL +</title>
		<author>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Peñaloza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Suntisrivaraporn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 30th German Annual Conference on Artificial Intelligence (KI&apos;07)</title>
		<title level="s">Lecture Notes in Artificial Intelligence</title>
		<editor>
			<persName><forename type="first">J</forename><surname>Hertzberg</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Beetz</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Englert</surname></persName>
		</editor>
		<meeting>the 30th German Annual Conference on Artificial Intelligence (KI&apos;07)<address><addrLine>Osnabrück, Germany</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">4667</biblScope>
			<biblScope unit="page" from="52" to="67" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Introduction to Lattices and Order</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">A</forename><surname>Davey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Priestley</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>University Press</publisher>
		</imprint>
	</monogr>
	<note>2 edn</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A description logic with transitive and inverse roles and role hierarchies</title>
		<author>
			<persName><forename type="first">I</forename><surname>Horrocks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Sattler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Logic and Computation</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="385" to="410" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Practical reasoning for very expressive description logics</title>
		<author>
			<persName><forename type="first">I</forename><surname>Horrocks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Sattler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tobies</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the Interest Group in Pure and Applied Logic</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="239" to="264" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Finding all justifications of OWL DL entailments</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kalyanpur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Parsia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Horridge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Sirin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 6th Int. Semantic Web Conf. and 2nd Asian Semantic Web Conf. (ISWC&apos;07,ASWC&apos;07)</title>
		<title level="s">LNCS</title>
		<editor>
			<persName><forename type="first">K</forename><surname>Aberer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Choi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><forename type="middle">F</forename><surname>Noy</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Allemang</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><forename type="middle">I</forename><surname>Lee</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><forename type="middle">J B</forename><surname>Nixon</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Golbeck</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Mika</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Maynard</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Mizoguchi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Schreiber</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Cudré-Mauroux</surname></persName>
		</editor>
		<meeting>of the 6th Int. Semantic Web Conf. and 2nd Asian Semantic Web Conf. (ISWC&apos;07,ASWC&apos;07)<address><addrLine>Busan, Korea</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">4825</biblScope>
			<biblScope unit="page" from="267" to="280" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Computing maximally satisfiable terminologies for the description logic ALC with GCIs</title>
		<author>
			<persName><forename type="first">K</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Meyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Z</forename><surname>Pan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 2006 Description Logic Workshop (DL&apos;06)</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Parsia</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">U</forename><surname>Sattler</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Toman</surname></persName>
		</editor>
		<meeting>of the 2006 Description Logic Workshop (DL&apos;06)<address><addrLine>Lake District, UK</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Inconsistency degree computation for possibilistic description logic: An extension of the tableau algorithm</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Lesot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Couchariere</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Bouchon-Meunier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Rogier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Annual Meeting of the North American Fuzzy Information Processing Society</title>
				<meeting>the Annual Meeting of the North American Fuzzy Information Processing Society<address><addrLine>NAFIPS</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society Press</publisher>
			<date type="published" when="2008">2008. 2008</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Debugging OWL ontologies</title>
		<author>
			<persName><forename type="first">B</forename><surname>Parsia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Sirin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kalyanpur</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 14th Int. Conf. on World Wide Web (WWW&apos;05)</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Ellis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Hagino</surname></persName>
		</editor>
		<meeting>of the 14th Int. Conf. on World Wide Web (WWW&apos;05)</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="633" to="640" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">A tableau algorithm for possibilistic description logic</title>
		<author>
			<persName><forename type="first">G</forename><surname>Qi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Z</forename><surname>Pan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd Asian Semantic Web Conference (ASWC 2008)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">J</forename><surname>Domingue</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Anutariya</surname></persName>
		</editor>
		<meeting>the 3rd Asian Semantic Web Conference (ASWC 2008)</meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">5367</biblScope>
			<biblScope unit="page" from="61" to="75" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Non-standard reasoning services for the debugging of description logic terminologies</title>
		<author>
			<persName><forename type="first">S</forename><surname>Schlobach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Cornet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 18th Int. Joint Conf. on Artificial Intelligence (IJCAI&apos;03)</title>
				<editor>
			<persName><forename type="first">G</forename><surname>Gottlob</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Walsh</surname></persName>
		</editor>
		<meeting>of the 18th Int. Joint Conf. on Artificial Intelligence (IJCAI&apos;03)<address><addrLine>Los Altos, Acapulco, Mexico</addrLine></address></meeting>
		<imprint>
			<publisher>Morgan Kaufmann</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="355" to="362" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
