2,178 results on '"Description logics"'
Search Results
2. Finite-Model Reasoning for Graph Queries and Description Logics
- Author
-
Murlak, Filip, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Console, Marco, editor, and Konev, Boris, editor
- Published
- 2025
- Full Text
- View/download PDF
3. KRAFT: Leveraging Knowledge Graphs for Interpretable Feature Generation
- Author
-
Bouadi, Mohamed, Alavi, Arta, Benbernou, Salima, Ouziri, Mourad, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Barhamgi, Mahmoud, editor, Wang, Hua, editor, and Wang, Xin, editor
- Published
- 2025
- Full Text
- View/download PDF
4. LLM-Driven Knowledge Extraction in Temporal and Description Logics
- Author
-
Duranti, Damiano, Giorgini, Paolo, Mazzullo, Andrea, Robol, Marco, Roveri, Marco, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Alam, Mehwish, editor, Rospocher, Marco, editor, van Erp, Marieke, editor, Hollink, Laura, editor, and Gesese, Genet Asefa, editor
- Published
- 2025
- Full Text
- View/download PDF
5. Matching Expectations in Ensembles: Connecting Verifiable Credentials and the Semantic Web
- Author
-
Sürmeli, Jan, Yilmaz, Sergen, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, and Margaria, Tiziana, editor
- Published
- 2025
- Full Text
- View/download PDF
6. Rewriting the Infinite Chase for Guarded TGDs.
- Author
-
Benedikt, Michael, Buron, Maxime, Germano, Stefano, Kappelmann, Kevin, and Motik, Boris
- Subjects
- *
COMPUTER logic , *POWER distribution networks , *DESCRIPTION logics , *DISCRETE mathematics , *DATA structures , *GRAPH labelings - Published
- 2024
- Full Text
- View/download PDF
7. Isaac Watts (1674–1748): logic and the "moral discipline of the mind" in the early Enlightenment.
- Author
-
Corneanu, Sorana
- Subjects
- *
DESCRIPTION logics , *ENLIGHTENMENT , *LOGIC , *PROTESTANTS , *MODERATION - Abstract
In this paper I aim to explain the approach to the nature and aims of logic in the work of Isaac Watts (1674–1748): Logick: Or, the Right Use of Reason in the Enquiry after Truth (1725). I discuss Watts's notion that the guidance and regulation of the acts and powers of the mind is the proper province of logic, as well as the pedagogical ambitions of his logical works. I focus on the cure of the imagination, which is one member of the more general cure of the intellectual powers that logic under this description seeks. I also provide the historical contexts that are apt to illuminate these features of an early Enlightenment logic: I situate Watts within the early modern development of an approach to logic as a therapeutic art of thinking; and I suggest that the pedagogical nature of Watts's work is indebted to a specific tradition of Protestant practical divinity that fed into the pedagogical practices of early eighteenth-century English religious dissent, which Watts embraced. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
8. A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification.
- Author
-
Zeshan, Furkh, dar, Zaineb, Ahmad, Adnan, and Malik, Tariq
- Subjects
- *
ENCRYPTION protocols , *DESCRIPTION logics , *SEMANTIC Web , *DATA encryption , *MANUAL labor - Abstract
IoT devices produce a vast amount of data ranging from personal to sensitive information. Usually, these devices remain connected to the internet so protecting the information produced by them is crucial. Since most of the IoT devices are resource-constrained, they must be supported with lightweight encryption standards to protect information. Recent research has used the concept of context awareness to select the most suitable data encryption standard based on the device resources along with the required information confidentiality level. However, to effectively use the context information, it is required to be organized explicitly while considering the dynamic nature of IoT systems. In this regard, ontology-based systems effectively reduce the volume of manual work while recommending solutions. Currently, these systems cannot work with precision due to multiple uncertain factors of IoT sensory data. To overcome this challenge, this research proposes a fuzzy ontology-based context-aware system to protect IoT device information with the help of an encryption algorithm that considers device capabilities and user priorities regarding the data confidentiality. In order to automate the recommendation process, Semantic Web Rule Language (SWRL) rules and fuzzy logic are used, whereas, Description Logic and RDF Query Language is used to evaluate the results. The evaluation results confirm that the proposed method can produce results according to human perception by significantly increasing the accuracy of prediction. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Complexity and scalability of defeasible reasoning in many-valued weighted knowledge bases with typicality.
- Author
-
Alviano, Mario, Giordano, Laura, and Dupré, Daniele Theseider
- Subjects
DESCRIPTION logics ,MULTILAYER perceptrons ,MANY-valued logic ,SEMANTICS (Philosophy) ,LOGIC programming ,KNOWLEDGE base - Abstract
Weighted knowledge bases for description logics with typicality under a 'concept-wise' multi-preferential semantics provide a logical interpretation of MultiLayer Perceptrons. In this context, Answer Set Programming (ASP) has been shown to be suitable for addressing defeasible reasoning in the finitely many-valued case, providing a |$\varPi ^{p}_{2}$| upper bound on the complexity of the problem, nonetheless leaving unknown the exact complexity and only providing a proof-of-concept implementation. This paper fulfills the lack by providing a |${P^{NP[log]}}$| -completeness result and new ASP encodings that deal with both acyclic and cyclic weighted knowledge bases with large search spaces, as assessed empirically on synthetic test cases. The encodings are used to empower a reasoner for computing solutions and answering queries, possibly interacting with ASP Chef for obtaining an interactive visualization. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Capability knowledge base query to allocate process resources for master recipe formulation.
- Author
-
Winter, Michael, Klausmann, Tobias, and Kleinert, Tobias
- Subjects
DESCRIPTION logics ,ARTIFICIAL intelligence ,KNOWLEDGE base ,MANUFACTURING processes ,OWLS - Abstract
Copyright of Automatisierungstechnik is the property of De Gruyter and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
11. Guest Editorial: On the Convergence of Enterprise Modelling and Knowledge Graphs.
- Author
-
Buchmann, Robert Andrei, Opdahl, Andreas, and Grossmann, Georg
- Subjects
GRAPH neural networks ,LANGUAGE models ,KNOWLEDGE graphs ,DESCRIPTION logics ,HIGH performance computing ,PRAGMATICS ,ONTOLOGIES (Information retrieval) - Abstract
This document is a guest editorial from the journal "Enterprise Modelling & Information Systems Architectures" discussing the convergence of enterprise modeling and knowledge graphs. It emphasizes the need to reconnect diagrammatic enterprise modeling and engineering-oriented knowledge structuring. The editorial explores the use of knowledge graphs in enterprise modeling and introduces three papers that showcase different views on how enterprise models and ontologies or semantic graphs can support each other. The document aims to demonstrate the growing research on the convergence between enterprise modeling and knowledge graphs. Additionally, there is a list of references for articles and papers related to enterprise modeling, knowledge graphs, and ontology-driven conceptual modeling. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
12. John Brown as Launcelot: The Influence of Tennyson on Herman Melville’s “<italic>The Portent</italic>”.
- Author
-
Fenton, Jamie
- Subjects
- *
AMERICAN Civil War, 1861-1865 , *DESCRIPTION logics , *MARGINALIA , *ROMANCE fiction , *WAR poetry , *POETICS ,SLAVE rebellions - Abstract
This article examines the influence of Alfred Tennyson's poem "The Lady of Shalott" on Herman Melville's poem "The Portent." The author argues that Melville's poem shows clear signs of being influenced by Tennyson's work, particularly in terms of its syntax and metaphorical logic. The article provides evidence from Melville's personal library and compares the two poems to support this claim. Additionally, the article discusses Melville's interest in English poetry during the Civil War and how he used Tennyson's poetry to shape his own aesthetic beliefs. It also explores the themes of history, poetry, and the Civil War in Melville's work. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
13. Smart Anonymity: a mechanism for recommending data anonymization algorithms based on data profiles for IoT environments.
- Author
-
Neves, Flávio, Souza, Rafael, Lima, Wesley, Raul, Wellison, Bonfim, Michel, and Garcia, Vinicius
- Subjects
- *
DATA privacy , *RANDOM forest algorithms , *INTERNET privacy , *DESCRIPTION logics , *INTERNET of things - Abstract
The internet of things (IoT) has seen rapid expansion, but this growth brings significant privacy challenges due to the large amounts of data generated by myriad IoT devices. To address these challenges, this study introduces Smart Anonymity, a method that determines the optimal data anonymization algorithm for a dataset by assessing its unique features. The solution leverages OWL ontologies grounded in description logic (DL), which facilitates inconsistency checks and the discovery of new facts for data validation. Additionally, machine learning (ML) is incorporated to improve the accuracy of these classifications. ML is also instrumental in recommending suitable anonymization algorithms, with the random forest algorithm being employed explicitly for this purpose. The findings from this research indicate that Smart Anonymity effectively improves user privacy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Inferential Interpretations of Many-Valued Logics.
- Author
-
Molick, Sanderson
- Subjects
- *
MATRICES (Mathematics) , *DESCRIPTION logics , *ALGEBRA , *HOMOMORPHISMS , *MATHEMATICAL models - Abstract
Non-Tarskian interpretations of many-valued logics have been widely explored in the logic literature. The development of non-tarskian conceptions of logical consequence set the theoretical foundations for rediscovering well-known (Tarskian) many-valued logics. One may find in distinct authors many novel interpretations of many-valued systems. They are produced through a type of procedure which consists in altering the semantic structure of Tarskian many-valued logics in order to output a non-Tarskian interpretation of these logics. Through this type of transformation the paper explores a uniform way of transforming finitely many-valued Tarskian logics into their non-Tarskian interpretation. Some general properties of carrying out this type of procedure are studied, namely the dualities between these logics and the conditions under which negation-explosive and negation-complete Tarskian logics become non-explosive. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Proof Theory and Decision Procedures for Deontic STIT Logics.
- Author
-
Lyon, Tim S. and van Berkel, Kees
- Subjects
PROOF theory ,DESCRIPTION logics ,CALCULI ,REASONING ,ALGORITHMS - Abstract
This paper provides a set of cut-free complete sequent-style calculi for deontic STIT (‘See To It That’) logics used to formally reason about choice-making, obligations, and norms in a multi-agent setting. We leverage these calculi to write a proof-search algorithm deciding deontic, multi-agent STIT logics with (un)limited choice and introduce a loop-checking mechanism to ensure the termination of the algorithm. Despite the acknowledged potential for deontic reasoning in the context of autonomous, multi-agent scenarios, this work is the first to provide a syntactic decision procedure for this class of logics. Our proofsearch procedure is designed to provide verifiable witnesses/certificates of the (in)validity of formulae, which permits an analysis of the (non)theoremhood of formulae and act as explanations thereof. We show how the proof system and decision algorithm can be used to automate normative reasoning tasks such as duty checking (viz. determining an agent’s obligations relative to a given knowledge base), compliance checking (viz. determining if a choice, considered by an agent as potential conduct, complies with the given knowledge base), and joint fulfillment checking (viz. determining whether under a specified factual context an agent can jointly fulfill all their duties). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Ontology of active and passive environmental exposure.
- Author
-
Vámos, Csilla, Scheider, Simon, Sonnenschein, Tabea, and Vermeulen, Roel
- Subjects
DESCRIPTION logics ,BEHAVIORAL sciences ,HEALTH behavior ,ENVIRONMENTAL exposure ,COMPUTER science ,RDF (Document markup language) - Abstract
Exposure is a central concept of the health and behavioural sciences needed to study the influence of the environment on the health and behaviour of people within a spatial context. While an increasing number of studies measure different forms of exposure, including the influence of air quality, noise, and crime, the influence of land cover on physical activity, or of the urban environment on food intake, we lack a common conceptual model of environmental exposure that captures its main structure across all this variety. Against the background of such a model, it becomes possible not only to systematically compare different methodological approaches but also to better link and align the content of the vast amount of scientific publications on this topic in a systematic way. For example, an important methodical distinction is between studies that model exposure as an exclusive outcome of some activity versus ones where the environment acts as a direct independent cause (active vs. passive exposure). Here, we propose an information ontology design pattern that can be used to define exposure and to model its variants. It is built around causal relations between concepts including persons, activities, concentrations, exposures, environments and health risks. We formally define environmental stressors and variants of exposure using Description Logic (DL), which allows automatic inference from the RDF-encoded content of a paper. Furthermore, concepts can be linked with data models and modelling methods used in a study. To test the pattern, we translated competency questions into SPARQL queries and ran them over RDF-encoded content. Results show how study characteristics can be classified and summarized in a manner that reflects important methodical differences. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. A Hardware Approach For Accelerating Inductive Learning In Description Logic.
- Author
-
Algahtani, Eyad
- Subjects
DESCRIPTION logics ,MACHINE learning ,ARTIFICIAL neural networks ,LOGIC programming ,INDUCTION (Logic) - Abstract
The employment of Machine Learning (ML) techniques in embedded systems has seen constant growth in recent years, especially for black-box ML techniques (such as Artificial Neural Networks (ANNs)). However, despite the successful employment of ML techniques in embedded environments, their performance potential is constrained by the limited computing resources of their embedded computers. Several hardware-based approaches were developed (e.g., using FPGAs and ASICs) to address the constraints of limited computing resources. The scope of this work focuses on improving the performance for Inductive Logic Programming (ILP) on embedded environments. ILP is a powerful logic-based ML technique that uses logic programming to construct human-interpretable ML models, where those logic-based ML models are capable of describing complex and multi-relational concepts. In this work, we present a hardware-based approach that accelerates the hypothesis evaluation task for ILPs in embedded environments that use Description Logic (DL) languages as their logic-based representation. In particular, we target the \(\mathcal {ALCQ}^{\mathcal {(D)}}\) language. According to experimental results (through an FPGA implementation), our presented approach has achieved speedups up to 48.7-fold for a disjunction of 32 concepts on 100 M individuals, where the baseline performance is the sequential CPU performance of the Raspberry Pi 4. For role and concrete role restrictions, the FPGA implementation achieved speedups up to 2.4-fold (for MIN cardinality role restriction on 1M role assertions); all FPGA implemented role and concrete role restrictions have achieved similar speedups. In the worst-case scenario, the FPGA implementation achieved either a similar or slightly better performance than the baseline (for all DL operations); the worst-case scenario resulted from using small datasets such as: using conjunction and disjunction on < 100 individuals, and using role and concrete (float/string) role restrictions on < 100,000 assertions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. ON TWO-VARIABLE GUARDED FRAGMENT LOGIC WITH EXPRESSIVE LOCAL PRESBURGER CONSTRAINTS.
- Author
-
CHIA-HSUAN LU and TAN, TONY
- Subjects
DESCRIPTION logics ,DETERMINISTIC algorithms ,LOGIC ,COUNTING ,SIGNS & symbols - Abstract
We consider the extension of the two-variable guarded fragment logic with local Presburger quantifiers. These are quantifiers that can express properties such as "the number of incoming blue edges plus twice the number of outgoing red edges is at most three times the number of incoming green edges" and captures various description logics with counting, but without constant symbols. We show that the satisfiability problem for this logic is EXP-complete. While the lower bound already holds for the standard two-variable guarded fragment logic, the upper bound is established by a novel, yet simple deterministic graph-based algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. The role of ontologies and knowledge in Explainable AI.
- Author
-
Confalonieri, Roberto, Kutz, Oliver, Calvanese, Diego, Alonso-Moral, Jose Maria, and Zhou, Shang-Ming
- Subjects
ARTIFICIAL intelligence ,LANGUAGE models ,DESCRIPTION logics ,DECISION support systems ,ARTIFICIAL neural networks ,DEEP learning ,ONTOLOGIES (Information retrieval) - Abstract
The editorial discusses the importance of Explainable Artificial Intelligence (XAI) in developing trustworthy AI systems, emphasizing the need for explanations to enhance system robustness, prevent bias, and increase user trust. The special issue focuses on the role of ontologies and knowledge in XAI, showcasing research on ontology extensions, explanation ontologies, data journeys, user-centered explanations, and separability in Ontology-based Data Management. The accepted papers demonstrate the utilization of ontologies, knowledge graphs, and knowledge representation in advancing the field of XAI, offering diverse perspectives on achieving explainability in AI systems. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
20. Searching for explanations of black-box classifiers in the space of semantic queries.
- Author
-
Liartis, Jason, Dervakos, Edmund, Menis-Mastromichalakis, Orfeas, Chortaras, Alexandros, and Stamou, Giorgos
- Subjects
DESCRIPTION logics ,KNOWLEDGE graphs ,ARTIFICIAL intelligence ,REVERSE engineering ,MACHINE learning - Abstract
Deep learning models have achieved impressive performance in various tasks, but they are usually opaque with regards to their inner complex operation, obfuscating the reasons for which they make decisions. This opacity raises ethical and legal concerns regarding the real-life use of such models, especially in critical domains such as in medicine, and has led to the emergence of the eXplainable Artificial Intelligence (XAI) field of research, which aims to make the operation of opaque AI systems more comprehensible to humans. The problem of explaining a black-box classifier is often approached by feeding it data and observing its behaviour. In this work, we feed the classifier with data that are part of a knowledge graph, and describe the behaviour with rules that are expressed in the terminology of the knowledge graph, that is understandable by humans. We first theoretically investigate the problem to provide guarantees for the extracted rules and then we investigate the relation of "explanation rules for a specific class" with "semantic queries collecting from the knowledge graph the instances classified by the black-box classifier to this specific class". Thus we approach the problem of extracting explanation rules as a semantic query reverse engineering problem. We develop algorithms for solving this inverse problem as a heuristic search in the space of semantic queries and we evaluate the proposed algorithms on four simulated use-cases and discuss the results. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Empowering standardization of cancer vaccines through ontology: enhanced modeling and data analysis.
- Author
-
Zheng, Jie, Li, Xingxian, Masci, Anna Maria, Kahn, Hayleigh, Huffman, Anthony, Asfaw, Eliyas, Pan, Yuanyi, Guo, Jinjing, He, Virginia, Song, Justin, Seleznev, Andrey I., Lin, Asiyah Yu, and He, Yongqun
- Subjects
- *
CANCER vaccines , *DESCRIPTION logics , *DATA analysis , *DATA modeling , *ONTOLOGY - Abstract
Background: The exploration of cancer vaccines has yielded a multitude of studies, resulting in a diverse collection of information. The heterogeneity of cancer vaccine data significantly impedes effective integration and analysis. While CanVaxKB serves as a pioneering database for over 670 manually annotated cancer vaccines, it is important to distinguish that a database, on its own, does not offer the structured relationships and standardized definitions found in an ontology. Recognizing this, we expanded the Vaccine Ontology (VO) to include those cancer vaccines present in CanVaxKB that were not initially covered, enhancing VO's capacity to systematically define and interrelate cancer vaccines. Results: An ontology design pattern (ODP) was first developed and applied to semantically represent various cancer vaccines, capturing their associated entities and relations. By applying the ODP, we generated a cancer vaccine template in a tabular format and converted it into the RDF/OWL format for generation of cancer vaccine terms in the VO. '12MP vaccine' was used as an example of cancer vaccines to demonstrate the application of the ODP. VO also reuses reference ontology terms to represent entities such as cancer diseases and vaccine hosts. Description Logic (DL) and SPARQL query scripts were developed and used to query for cancer vaccines based on different vaccine's features and to demonstrate the versatility of the VO representation. Additionally, ontological modeling was applied to illustrate cancer vaccine related concepts and studies for in-depth cancer vaccine analysis. A cancer vaccine-specific VO view, referred to as "CVO," was generated, and it contains 928 classes including 704 cancer vaccines. The CVO OWL file is publicly available on: http://purl.obolibrary.org/obo/vo/cvo.owl, for sharing and applications. Conclusion: To facilitate the standardization, integration, and analysis of cancer vaccine data, we expanded the Vaccine Ontology (VO) to systematically model and represent cancer vaccines. We also developed a pipeline to automate the inclusion of cancer vaccines and associated terms in the VO. This not only enriches the data's standardization and integration, but also leverages ontological modeling to deepen the analysis of cancer vaccine information, maximizing benefits for researchers and clinicians. Availability: The VO-cancer GitHub website is: https://github.com/vaccineontology/VO/tree/master/CVO. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. DECLARE d : A Polytime LTL f Fragment.
- Author
-
Bergami, Giacomo
- Subjects
- *
DESCRIPTION logics , *BUSINESS process management , *ARTIFICIAL intelligence , *PLEONASM , *INTERNET security - Abstract
This paper considers a specification rewriting meachanism for a specific fragment of Linear Temporal Logic for Finite traces, DECLAREd, working through an equational logic and rewriting mechanism under customary practitioner assumptions from the Business Process Management literature. By rewriting the specification into an equivalent formula which might be easier to compute, we aim to streamline current state-of-the-art temporal artificial intelligence algorithms working on temporal logic. As this specification rewriting mechanism is ultimately also able to determine with the provided specification is a tautology (always true formula) or a formula containing a temporal contradiction, by detecting the necessity of a specific activity label to be both present and absent within a log, this implies that the proved mechanism is ultimately a SAT-solver for DECLAREd. We prove for the first time, to the best of our knowledge, that this fragment is a polytime fragment of LTLf, while all the previously-investigated fragments or extensions of such a language were in polyspace. We test these considerations over formal synthesis (Lydia), SAT-Solvers (AALTAF) and formal verification (KnoBAB) algorithms, where formal verification can be also run on top of a relational database and can be therefore expressed in terms of relational query answering. We show that all these benefit from the aforementioned assumptions, as running their tasks over a rewritten equivalent specification will improve their running times, thus motivating the pressing need of this approach for practical temporal artificial intelligence scenarios. We validate such claims by testing such algorithms over a Cybersecurity dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Unification in the Description Logic Without the Top Concept Modulo Cycle-Restricted Ontologies
- Author
-
Baader, Franz, Fernández Gil, Oliver, Hartmanis, Juris, Founding Editor, van Leeuwen, Jan, Series Editor, Hutchison, David, Editorial Board Member, Kanade, Takeo, Editorial Board Member, Kittler, Josef, Editorial Board Member, Kleinberg, Jon M., Editorial Board Member, Kobsa, Alfred, Series Editor, Mattern, Friedemann, Editorial Board Member, Mitchell, John C., Editorial Board Member, Naor, Moni, Editorial Board Member, Nierstrasz, Oscar, Series Editor, Pandu Rangan, C., Editorial Board Member, Sudan, Madhu, Series Editor, Terzopoulos, Demetri, Editorial Board Member, Tygar, Doug, Editorial Board Member, Weikum, Gerhard, Series Editor, Vardi, Moshe Y, Series Editor, Goos, Gerhard, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Benzmüller, Christoph, editor, Heule, Marijn J.H., editor, and Schmidt, Renate A., editor
- Published
- 2024
- Full Text
- View/download PDF
24. Answering Temporal Conjunctive Queries over Description Logic Ontologies for Situation Recognition in Complex Operational Domains
- Author
-
Westhofen, Lukas, Neurohr, Christian, Jung, Jean Christoph, Neider, Daniel, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Finkbeiner, Bernd, editor, and Kovács, Laura, editor
- Published
- 2024
- Full Text
- View/download PDF
25. AI methods for productions.
- Author
-
Kleinert, Tobias, Brecher, Christian, and Fimmers, Christian
- Subjects
MACHINE learning ,ARTIFICIAL intelligence ,SHIELDED metal arc welding ,GAS metal arc welding ,DESCRIPTION logics - Published
- 2024
- Full Text
- View/download PDF
26. Are Ancient Logics Explosive?
- Author
-
Tkaczyk, Marcin
- Subjects
- *
DESCRIPTION logics , *MATHEMATICAL logic , *PERIPATETICS , *ANCIENT philosophy , *RELIGIOUS orthodoxy - Abstract
The twentieth-century logical mainstream, derived from works by Łukasiewicz and Scholz, pictures the history of logic for the most part as the prehistory of Boolean–Fregean mathematical logic. Particularly, with respect to classical propositional calculus, the Stoic logic has been pictured as an early stage of it and Aristotle's or the Peripatetics' logic as a theory that assumes it. Although it was not emphasised, it follows that the ancient logics contain the principle of explosion. In the endmost quarter of the twentieth century, a competitive view began to spread to the effect that the ancient systems of logic were paraconsistent or relevantistic. In the twenty-first century, the latter view prevails and has every chance of becoming a new orthodoxy. It is claimed that although in Łukasiewicz's argument for the classicality of ancient logics, there are gaps, it may be demonstrated that the ancient logics contain the principle of explosion. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. The RDF2vec family of knowledge graph embedding methods.
- Author
-
Portisch, Jan and Paulheim, Heiko
- Subjects
KNOWLEDGE graphs ,DESCRIPTION logics ,LANGUAGE models ,MACHINE learning ,RANDOM walks - Abstract
Knowledge graph embeddings represent a group of machine learning techniques which project entities and relations of a knowledge graph to continuous vector spaces. RDF2vec is a scalable embedding approach rooted in the combination of random walks with a language model. It has been successfully used in various applications. Recently, multiple variants to the RDF2vec approach have been proposed, introducing variations both on the walk generation and on the language modeling side. The combination of those different approaches has lead to an increasing family of RDF2vec variants. In this paper, we evaluate a total of twelve RDF2vec variants on a comprehensive set of benchmark models, and compare them to seven existing knowledge graph embedding methods from the family of link prediction approaches. Besides the established GEval benchmark introducing various downstream machine learning tasks on the DBpedia knowledge graph, we also use the new DLCC (Description Logic Class Constructors) benchmark consisting of two gold standards, one based on DBpedia, and one based on synthetically generated graphs. The latter allows for analyzing which ontological patterns in a knowledge graph can actually be learned by different embedding. With this evaluation, we observe that certain tailored RDF2vec variants can lead to improved performance on different downstream tasks, given the nature of the underlying problem, and that they, in particular, have a different behavior in modeling similarity and relatedness. The findings can be used to provide guidance in selecting a particular RDF2vec method for a given task. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. First-Order Temporal Logic on Finite Traces: Semantic Properties, Decidable Fragments, and Applications.
- Author
-
Artale, Alessandro, Mazzullo, Andrea, and Ozaki, Ana
- Subjects
FIRST-order logic ,DESCRIPTION logics ,KNOWLEDGE representation (Information theory) ,AUTOMATED planning & scheduling - Abstract
Formalisms based on temporal logics interpreted over finite strict linear orders, known in the literature as finite traces, have been used for temporal specification in automated planning, process modelling, (runtime) verification and synthesis of programs, as well as in knowledge representation and reasoning. In this article, we focus on first-order temporal logic on finite traces. We first investigate preservation of equivalences and satisfiability of formulas between finite and infinite traces, by providing a set of semantic and syntactic conditions to guarantee when the distinction between reasoning in the two cases can be blurred. Moreover, we show that the satisfiability problem on finite traces for several decidable fragments of first-order temporal logic is ExpSpace-complete, as in the infinite trace case, while it decreases to NExpTime when finite traces bounded in the number of instants are considered. This leads also to new complexity results for temporal description logics over finite traces. Finally, we investigate applications to planning and verification, in particular by establishing connections with the notions of insensitivity to infiniteness and safety from the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. EXPLORING NON-REGULAR EXTENSIONS OF PROPOSITIONAL DYNAMIC LOGIC WITH DESCRIPTION-LOGICS FEATURES.
- Author
-
BEDNARCZYK, BARTOSZ
- Subjects
PROPOSITION (Logic) ,DESCRIPTION logics ,DATABASES - Abstract
We investigate the impact of non-regular path expressions on the decidability of satisfiability checking and querying in description logics extending ALC. Our primary objects of interest are ALC
reg and ALCvpl , the extensions of ALC with path expressions employing, respectively, regular and visibly-pushdown languages. The first one, ALCreg , is a notational variant of the well-known Propositional Dynamic Logic of Fischer and Ladner. The second one, ALCvpl , was introduced and investigated by Löding and Serre in 2007. The logic ALCvpl generalises many known decidable non-regular extensions of ALCreg . We provide a series of undecidability results. First, we show that decidability of the concept satisfiability problem for ALCvpl is lost upon adding the seemingly innocent Self operator. Second, we establish undecidability for the concept satisfiability problem for ALCvpl extended with nominals. Interestingly, our undecidability proof relies only on one single non-regular (visibly-pushdown) language, namely on r# s# := {rn sn | n ∈ N} for fixed role names r and s. Finally, in contrast to the classical database setting, we establish undecidability of query entailment for queries involving non-regular atoms from r #s #, already in the case of ALC-TBoxes. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
30. Bayesian-knowledge driven ontologies: A framework for fusion of semantic knowledge under uncertainty and incompleteness.
- Author
-
Santos Jr., Eugene, Jurmain, Jacob, and Ragazzi, Anthony
- Subjects
- *
ONTOLOGIES (Information retrieval) , *DESCRIPTION logics , *DISTRIBUTION (Probability theory) , *SEMANTIC Web , *ONTOLOGY , *LOGIC design - Abstract
The modeling of uncertain information is an open problem in ontology research and is a theoretical obstacle to creating a truly semantic web. Currently, ontologies often do not model uncertainty, so stochastic subject matter must either be normalized or rejected entirely. Because uncertainty is omnipresent in the real world, knowledge engineers are often faced with the dilemma of performing prohibitively labor-intensive research or running the risk of rejecting correct information and accepting incorrect information. It would be preferable if ontologies could explicitly model real-world uncertainty and incorporate it into reasoning. We present an ontology framework which is based on a seamless synthesis of description logic and probabilistic semantics. This synthesis is powered by a link between ontology assertions and random variables that allows for automated construction of a probability distribution suitable for inferencing. Furthermore, our approach defines how to represent stochastic, uncertain, or incomplete subject matter. Additionally, this paper describes how to fuse multiple conflicting ontologies into a single knowledge base that can be reasoned with using the methods of both description logic and probabilistic inferencing. This is accomplished by using probabilistic semantics to resolve conflicts between assertions, eliminating the need to delete potentially valid knowledge and perform consistency checks. In our framework, emergent inferences can be made from a fused ontology that were not present in any of the individual ontologies, producing novel insights in a given domain. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Meta-Interpretive LEarning with Reuse.
- Author
-
Wang, Rong, Sun, Jun, Tian, Cong, and Duan, Zhenhua
- Subjects
- *
DESCRIPTION logics , *INDUCTION (Logic) , *LOGIC programming , *MACHINE learning , *CONCEPT mapping , *GRAPH algorithms - Abstract
Inductive Logic Programming (ILP) is a research field at the intersection between machine learning and logic programming, focusing on developing a formal framework for inductively learning relational descriptions in the form of logic programs from examples and background knowledge. As an emerging method of ILP, Meta-Interpretive Learning (MIL) leverages the specialization of a set of higher-order metarules to learn logic programs. In MIL, the input includes a set of examples, background knowledge, and a set of metarules, while the output is a logic program. MIL executes a depth-first traversal search, where its program search space expands polynomially with the number of predicates in the provided background knowledge and exponentially with the number of clauses in the program, sometimes even leading to search collapse. To address this challenge, this study introduces a strategy that employs the concept of reuse, specifically through the integration of auxiliary predicates, to reduce the number of clauses in programs and improve the learning efficiency. This approach focuses on the proactive identification and reuse of common program patterns. To operationalize this strategy, we introduce MILER, a novel method integrating a predicate generator, program learner, and program evaluator. MILER leverages frequent subgraph mining techniques to detect common patterns from a limited dataset of training samples, subsequently embedding these patterns as auxiliary predicates into the background knowledge. In our experiments involving two Visual Question Answering (VQA) tasks and one program synthesis task, we assessed MILER's approach to utilizing reusable program patterns as auxiliary predicates. The results indicate that, by incorporating these patterns, MILER identifies reusable program patterns, reduces program clauses, and directly decreases the likelihood of timeouts compared to traditional MIL. This leads to improved learning success rates by optimizing computational efforts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Evaluating Datalog Tools for Meta-reasoning over OWL 2 QL.
- Author
-
QURESHI, HAYA MAJID and FABER, WOLFGANG
- Subjects
DESCRIPTION logics ,KNOWLEDGE base ,LOGIC programming ,OWLS ,INFORMATION storage & retrieval systems - Abstract
Metamodeling is a general approach to expressing knowledge about classes and properties in an ontology. It is a desirable modeling feature in multiple applications that simplifies the extension and reuse of ontologies. Nevertheless, allowing metamodeling without restrictions is problematic for several reasons, mainly due to undecidability issues. Practical languages, therefore, forbid classes to occur as instances of other classes or treat such occurrences as semantically different objects. Specifically, meta-querying in SPARQL under the Direct Semantic Entailment Regime uses the latter approach, thereby effectively not supporting meta-queries. However, several extensions enabling different metamodeling features have been proposed over the last decade. This paper deals with the Metamodeling Semantics (MS) over OWL 2 QL and the Metamodeling Semantic Entailment Regime (MSER), as proposed in Lenzerini et al. (2015, Description Logics) and Lenzerini et al. (2020, Information Systems 88 , 101294), Cima et al. (2017, Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics , 1–6). A reduction from OWL 2 QL to Datalog for meta-querying was proposed in Cima et al. (2017, Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics , 1–6). In this paper, we experiment with various logic programming tools that support Datalog querying to determine their suitability as back-ends to MSER query answering. These tools stem from different logic programming paradigms (Prolog, pure Datalog, Answer Set Programming, Hybrid Knowledge Bases). Our work shows that the Datalog approach to MSER querying is practical also for sizeable ontologies with limited resources (time and memory). This paper significantly extends Qureshi and Faber (2021, International Joint Conference on Rules and Reasoning , Springer, 218–233.) by a more detailed experimental analysis and more background. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Automated Reasoning
- Author
-
Benzmüller, Christoph, Heule, Marijn J.H., and Schmidt, Renate A.
- Subjects
Automated reasoning ,Logic ,Logic and verification ,Modal and temporal logics ,Proof theory ,Interactive proof systems ,Description logics ,Equational logic and rewriting ,First-order logic ,Higher order logic ,Programming logic ,Separation logic ,Intuitionistic Logics ,Deontic Logic ,Non-classical Logics ,Theorem Proving ,Satisfiability Solving ,Modal Logics ,Rewriting ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation ,thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ,thema EDItEUR::U Computing and Information Technology::UK Computer hardware - Abstract
This two-volume set of LNAI 14739-14740 constitute the proceedings of the 12th International Joint Conference on Automated Reasoning, IJCAR 2024, held in Nancy, France, during July 3-6, 2024. The 39 full research papers and 6 short papers presented in this book were carefully reviewed and selected from 115 submissions. The papers focus on the following topics: theorem proving and tools; SAT, SMT and Quantifier Elimination; Intuitionistic Logics and Modal Logics; Calculi, Proof Theory and Decision Procedures; and Unification, Rewriting and Computational Models. This book is open access.
- Published
- 2024
- Full Text
- View/download PDF
34. Ontological analysis in the problems of container applications threat modelling
- Author
-
A. I. Brazhuk and E. V. Olizarovich
- Subjects
computer systems ,container applications ,system analysis ,information security ,threat modelling ,ontologies ,automatic reasoning ,description logics ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Objectives. The main purpose of the work is the experimental verification of the method of automatic threat modelling based on the ontological approach using the example of multicomponent container applications presented in the form of data flow diagrams.Methods. Methods of ontological modelling and knowledge management are used in the work. The Web Ontology Language is used to represent knowledge; automatic reasoning based on description logics is used for threat modelling.Results. A machine-readable set (dataset) of 200 data flow diagrams is developed; each diagram is obtained from the configuration of a real container application and is presented as an ontology and a knowledge graph. An ontological two-level domain-specific threat model of container applications is formed. An experiment is conducted to compare the coverage by threats using the common approach and using domain-specific threats for created dataset. For 95 % of the diagrams, the domain-specific threat model showed the coverage similar or greater than the common approach.Conclusion. The results of the experiment prove the suitability and effectiveness of the ontological approach for automatic threat modelling. The created dataset can be used for various research in the field of automation of threat modelling.
- Published
- 2023
- Full Text
- View/download PDF
35. Stable Model Semantics for Guarded Existential Rules and Description Logics: Decidability and Complexity.
- Author
-
GOTTLOB, GEORG, HERNICH, ANDRÉ, KUPKE, CLEMENS, and LUKASIEWICZ, THOMAS
- Subjects
DESCRIPTION logics ,SEMANTICS ,POLYNOMIAL time algorithms ,SEMANTICS (Philosophy) ,NEGATION (Logic) - Abstract
This work investigates the decidability and complexity of database query answering under guarded existential rules with nonmonotonic negation according to the classical stable model semantics. In this setting, existential quantification is interpreted via Skolem functions, and the unique name assumption is adopted. As a first result, we show the decidability of answering first-order queries based on such rules by a translation into the satisfiability problem for guarded second-order formulas having the tree-model property. To obtain precise complexity results for unions of conjunctive queries, we transform the original problem in polynomial time into an intermediate problem that is easier to analyze: query answering for guarded disjunctive existential rules with stratified negation.We obtain precise bounds for the general setting and for various restricted settings. We also consider extensions of the original formalism with negative constraints, keys, and the possibility of negated atoms in queries. Finally, we show how the above results can be used to provide decidability and complexity results for a natural adaptation of the stable model semantics to description logics such as ELHI and the DL-Lite family. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
36. Logics for Conceptual Data Modelling: A Review
- Author
-
Fillottrani, Pablo R. and Keet, C. Maria
- Subjects
conceptual data modelling ,eer ,uml ,description logics ,owl ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Information modelling for databases and object-oriented information systems avails of conceptual data modelling languages such as EER and UML Class Diagrams. Many attempts exist to add logical rigour to them, for various reasons and with disparate strengths. In this paper we aim to provide a structured overview of the many efforts. We focus on aims, approaches to the formalisation, including key dimensions of choice points, popular logics used, and the main relevant reasoning services. We close with current challenges and research directions.
- Published
- 2024
- Full Text
- View/download PDF
37. QGMS: A query growth model for personalization and diversification of semantic search based on differential ontology semantics using artificial intelligence.
- Author
-
Deepak, Gerard and Santhanavijayan, Arumugam
- Subjects
- *
SEMANTICS , *ARTIFICIAL intelligence , *DIVERSIFICATION in industry , *DESCRIPTION logics , *AFFECTIVE computing , *ONTOLOGIES (Information retrieval) , *SWARM intelligence , *ONTOLOGY - Abstract
The inclusion of collective intelligence through a semantic focused affective computing can incorporate intelligence to web search and ensure its compliance with the Web 3.0. In this article, a query growth model with inclusive and exclusive ontology semantics has been proposed for diversification of query recommendation in semantic search. The ontology semantics include query augmented ontology generation, agent‐driven attractor‐distractor generation to yield a merged ontology, and endowment of merged ontology by using hybridization of a series of knowledge bases. The strategy further includes the formulation of a semantic network and entity leveraging based on description logics (DLs) to improve the quality of query recommendation. A novel hierarchical entropy cognitive similarity covariance model has been proposed for yielding the most appropriate recommendable query words. The strategy also encompasses the user‐click information for capturing the current user intents to improve the quality queries recommended in semantic search, and thereby incorporate personalization. Experimentations are conducted for the CHiC dataset and the Spring 2006 Query Log dataset and an average accuracy of 96.27% and 92.01%, respectively, with a very low false discovery rate of 0.06 and 0.1 for the respective datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Analyzing Natural-Language Knowledge Under Uncertainty on the Basis of Description Logics.
- Author
-
Kryvyi, S. and Hoherchak, H.
- Subjects
- *
DESCRIPTION logics , *MACHINE learning , *FIRST-order logic , *PROPOSITION (Logic) , *FUZZY logic , *NATURAL language processing , *LOGIC - Abstract
The article overviews the means for describing and formally analyzing natural-language text knowledge under uncertainty. We consider a family of classic attribute languages and logics based on them, their properties, problems, and solution tools. We also overview propositional n-valued logics and fuzzy logics, their syntax and semantics. Based on the considered logical constructions, we propose syntax and set-theoretic interpretation of n-valued description logic ALCQn that provides the means for describing concept intersection, union, complement, value restrictions, and qualitative and quantitative constraints. We consider the means for solving key problems of reasoning over such logics: executability, augmentation, equivalence, and disjunctivity. As an algorithm for calculating the executability degree, we consider an extension of the tableau algorithm often used for first-order logic with solving simple numerical constraints. We prove that the algorithm is terminal, complete, and non-contradictory. We also provide several applications for the formal representation in natural language processing, including extending results of machine learning models, combining knowledge from multiple sources and formally describing uncertain facts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Weighted knowledge bases with typicality and defeasible reasoning in a gradual argumentation semantics.
- Author
-
Alviano, Mario, Giordano, Laura, and Dupré, Daniele Theseider
- Subjects
- *
DESCRIPTION logics , *MULTILAYER perceptrons , *MANY-valued logic , *WEIGHTED graphs , *KNOWLEDGE graphs , *KNOWLEDGE base - Abstract
Weighted knowledge bases for description logics with typicality provide a logical interpretation of MultiLayer Perceptrons, based on a "concept-wise" multi-preferential semantics. On the one hand, in the finitely many-valued case, Answer Set Programming (ASP) has been shown to be suitable for addressing defeasible reasoning from weighted knowledge bases for the boolean fragment of ALC. On the other hand, the semantics of weighted knowledge bases with typicality, in their different variants, have suggested some new gradual argumentation semantics, as well as an approach for defeasible reasoning over a weighted argumentation graph, building on the gradual semantics and, specifically on the φ-coherent semantics. In this paper, we explore the relationships between weighted knowledge bases and weighted argumentation graphs, to develop proof methods for defeasible reasoning over an argumentation graph under the φ-coherent semantics, in the finitely-valued case. We establish a mapping from a weighted argumentation graph to a weighted knowledge base as well as a lower bound on the complexity of the problem of verifying graded implications over an argumentation graph in the φ-coherent semantics. We also consider a mapping from weighted knowledge bases to weighted argumentation graphs, and provide an ASP implementation and some experimental results. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. adultcentrism and the children's classroom: if you want to teach them you must know who they are.
- Author
-
eslava, edgar
- Subjects
- *
DESCRIPTION logics , *PHILOSOPHY teachers , *ACADEMIC programs , *PRACTICE (Philosophy) , *SEMINARS - Abstract
The paper addresses academic adultcentrism from the perspective of the pre-service instruction and practice of philosophy teachers, based on the experience we have gained while leading a Didactic of Philosophy seminar for a Philosophy and Letters academic program where students are engaged in the designing, implementation and evaluation of academic material and class performance for K-12 schools. After giving a brief presentation of the context in which philosophy teaching takes place, and a description of the logic and horizon that set the basis of our seminar, we define and discuss four particular ways in which adultcentrism permeates the preparation and performance of philosophy classes for classrooms with students ranging from 8 to 15 years old: cognitive, epistemic, pedagogical and disciplinary adultcentrism. As well as some of the ways in which, as part of the seminar, the students and the instructor have devised to address and overcome the adultcentrism problems. At the end of the discussion, an auto-critical note is included in order to show the limits of our own practices and base ground, as well as a way to define new necessary approaches and perspectives required to address both the problems we found to be at the bottom of current teaching practices. As well as n our own expectations, methods and ways to deal with those issues with our pre-service young colleagues. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. ANALYZING NATURAL-LANGUAGE KNOWLEDGE IN UNCERTAINTY ON THE BASIS OF DESCRIPTION LOGICS.
- Author
-
KRYVYI, S. and HOHERCHAK, H.
- Abstract
The article overviews the means for describing and formally analyzing naturallanguage text knowledge under uncertainty. We consider a family of classic attribute languages and logics based on them, their properties, problems, and solution tools. We also give an overview of propositional n-valued logics and fuzzy logics, their syntax, and semantics. Based on the considered logical constructions, we propose syntax and set-theoretic interpretation of n-valued description logic ALCQ
n that provides means for describing concept intersection, union, complement, value restrictions, and qualitative and quantitative constraints. We consider the means for solving key problems of reasoning over such logics: executability, augmentation, equivalence, and disjunctivity. As an algorithm for calculating executability degree, we consider an extension of the tableau algorithm often used for first-order logic with solving simple numerical constraints. We prove that the algorithm is terminal, complete, and noncontradictory. We also provide several applications for the provided formal representation in natural language processing, including extending results of machine learning models, combining knowledge from multiple sources, and formally describing uncertain facts. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
42. Revision of prioritized EL ontologies.
- Author
-
Mohamed, Rim, Loukil, Zied, Gargouri, Faiez, and Bouraoui, Zied
- Subjects
DESCRIPTION logics ,THEORY of knowledge ,ONTOLOGY ,ONTOLOGIES (Information retrieval) ,POLYNOMIAL time algorithms - Abstract
In this paper, we investigated the evolution of prioritized E L ontologies in the presence of new information that can be certain or uncertain. We propose an extension of E L description logic, named E L ⊥ + , within possibility theory to encode such knowledge. This extension provides a natural way to deal with the ordinal scale and represent knowledge in a way that can handle incomplete information and conflicting data. We provided a polynomial algorithm for computing the possibilistic entailment. Then, we defined the evolution process at the semantic and syntactic levels. Interestingly enough, we show that the syntactical algorithm is done in polynomial time. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. Deciding Subsumption in Defeasible with Typicality Models
- Author
-
de Camargo e Souza Câmara, Igor, Turhan, Anni-Yasmin, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Gaggl, Sarah, editor, Martinez, Maria Vanina, editor, and Ortiz, Magdalena, editor
- Published
- 2023
- Full Text
- View/download PDF
44. Merge, Explain, Iterate: A Combination of MHS and MXP in an ABox Abduction Solver
- Author
-
Homola, Martin, Pukancová, Júlia, Boborová, Janka, Balintová, Iveta, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Gaggl, Sarah, editor, Martinez, Maria Vanina, editor, and Ortiz, Magdalena, editor
- Published
- 2023
- Full Text
- View/download PDF
45. A Short Introduction to SHACL for Logicians
- Author
-
Ortiz, Magdalena, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Hansen, Helle Hvid, editor, Scedrov, Andre, editor, and de Queiroz, Ruy J.G.B., editor
- Published
- 2023
- Full Text
- View/download PDF
46. Learning Permutation-Invariant Embeddings for Description Logic Concepts
- Author
-
Demir, Caglar, Ngonga Ngomo, Axel-Cyrille, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Crémilleux, Bruno, editor, Hess, Sibylle, editor, and Nijssen, Siegfried, editor
- Published
- 2023
- Full Text
- View/download PDF
47. Semantic Matchmaking for Argumentative Intelligence in Ubiquitous Computing
- Author
-
Fasciano, Corrado, Ruta, Michele, Scioscia, Floriano, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Agapito, Giuseppe, editor, Bernasconi, Anna, editor, Cappiello, Cinzia, editor, Khattak, Hasan Ali, editor, Ko, InYoung, editor, Loseto, Giuseppe, editor, Mrissa, Michael, editor, Nanni, Luca, editor, Pinoli, Pietro, editor, Ragone, Azzurra, editor, Ruta, Michele, editor, Scioscia, Floriano, editor, and Srivastava, Abhishek, editor
- Published
- 2023
- Full Text
- View/download PDF
48. A Building Performance Simulation-Based Investigation on Fault Tolerance of Sequences of Operation for VAV AHU Systems.
- Author
-
Torabi, Narges, Gunay, H. Burak, O'Brien, William, and Ferreira, Shane
- Subjects
- *
FAULT-tolerant control systems , *CLOSED loop systems , *INDOOR air quality , *DESCRIPTION logics , *FAULT zones , *FAULT-tolerant computing - Published
- 2023
49. Attempts at a Description: Rose English's Plato's Chair and the Hear Tell.
- Author
-
Kelleher, Joe
- Subjects
- *
DESCRIPTION logics , *PERFORMANCE , *THEATER , *SOUND recording & reproducing - Abstract
At a commercial gallery in London in 2019 I'm listening to audio recordings of Rose English's 1980s performance Plato's Chair, while a video of the show is projected on the wall ahead. The effect is of the performer describing what she is doing as she does it, the description displaced from one medium or occasion to another. Although, what she appears to be doing – for all her constant motion – is enacting a kind of hiatus while she ponders her next move, alone with herself, removed from her audience, thinking it all through and using words to do so. Description attempts to move things along. At play here, a certain – or uncertain – mimetics. Pleasures, for sure, for those who were there, or are placed there now. And a theatrical know-how – comedy, melodrama, opera-dance, and dressage all get a try-out – which is rooted in repertoire, but which ponders how to proceed. She is at once, she says, a comedian and philosopher. Which is to say also, ironist. In her book-length study of our ordinary acts of self-description, The Words of Selves (2000), Denise Riley locates in irony a 'political astringency' that corrodes 'excessively vaunted' categories, such as the human. But she finds irony also arising spontaneously within injury, compelled into intensities of self-contemplation. The injury, for instance, of one – as human as they come – who describes to me, on the phone, a tree outside her window. 'I don't know what to call it'. Description goes around. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
50. Conjunctive query answering over unrestricted OWL 2 ontologies.
- Author
-
Igne, Federico, Germano, Stefano, and Horrocks, Ian
- Subjects
DESCRIPTION logics ,OWLS ,KNOWLEDGE base ,EXPRESSIVE language ,ONTOLOGY ,ONTOLOGIES (Information retrieval) ,PUBLIC key cryptography - Abstract
Conjunctive Query (CQ) answering is a primary reasoning task over knowledge bases. However, when considering expressive description logics, query answering can be computationally very expensive; reasoners for CQ answering, although heavily optimized, often sacrifice expressive power of the input ontology or completeness of the computed answers in order to achieve tractability and scalability for the problem. In this work, we present a hybrid query answering architecture that combines various services to provide a CQ answering service for OWL. Specifically, it combines scalable CQ answering services for tractable languages with a CQ answering service for a more expressive language approaching the full OWL 2. If the query can be fully answered by one of the tractable services, then that service is used, to ensure maximum performance. Otherwise, the tractable services are used to compute lower and upper bound approximations. The union of the lower bounds and the intersection of the upper bounds are then compared. If the bounds do not coincide, then the "gap" answers are checked using the "full" service. These techniques led to the development of two new systems: (i) RSAComb, an efficient implementation of a new tractable answering service for RSA (role safety acyclic) (ii) ACQuA, a reference implementation of the proposed hybrid architecture combining RSAComb, PAGOdA, and HermiT to provide a CQ answering service for OWL. Our extensive evaluation shows how the additional computational cost introduced by reasoning over a more expressive language like RSA can still provide a significant improvement compared to relying on a fully-fledged reasoner. Additionally, we show how ACQuA can reliably match the performance of PAGOdA, a state-of-the-art CQ answering system that uses a similar approach, and can significantly improve performance when PAGOdA extensively relies on the underlying fully-fledged reasoner. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.