SlideShare uma empresa Scribd logo
1 de 23
Default Logics for Plausible Reasoning with Controversial Axioms Thomas Scharrenbach (*) , Claudia d'Amato (**) ,  Nicola Fanizzi (**) , Rolf Grütter (*) , Bettina Waldvogel (*)  and Abraham Bernstein (***) (*) Swiss Federal Institute for  Forest, Snow and Landscape Research WSL,   Zürcherstrasse 111,  8903 Birmensdorf,  Switzerland (***) University of Zurich  Department of Informatics   Binzmühlestrasse 14, 8050 Zurich,  Switzerland (**) Università degli Studi di Bari Department of Computer Science Via E. Orabona, 4 - 70125  Bari  Italy 4 th  International Workshop on  Ontology Dynamics – IWOD 2010
Forest? Snow? Landscape ? ,[object Object]
Spatial planning
... ,[object Object]
Forest management
... ,[object Object]
Glaciers
...
...with many happy-ends ,[object Object]
Lack domain knowledge
Build conflict-tolerant system
Revise  from time to time  ,[object Object]
Produce  inconsistent  KB
Don't care about ontologies
Care about  their  knowledge   Don't think about why it does not collapse! Just keep on hammering! ,[object Object],[object Object],A Never-Ending story
Desired Properties ,[object Object],Soft Strict
Default Logic Based  D -Transformation ,[object Object]
Justifications J 1 C      = B      A, C      B, C      Ø A J 2 D      = B      A, C      B, C      Ø A, J 3 E      = B      A, C      B, C      Ø A, D      C D      C, D      C J 4 D      = C      B, D      C, D      Ø B J 4 D      = C      B, D      C, D      Ø B, E      D Minimal sets of axioms that explain an entailment Root justifications do not depend on other justifications B A G F E D A C C B D C D B
Splitting justifications provide partitions for Default Logics B      A, Unsat Splitting J 1 C      = J 4 D      = C      B, C      B, C    Ø A D      C, D    Ø B Gamma-Set:  unsat concept  in signature Theta-Set:  unsat concept  not in signature Root justifications do not depend on other justifications B A G F E D A C C B D C D B
[object Object],Default TBox B      A, J 1 C      = C      B, C      B, B    Ø A D      C, D    Ø B J 4 D      = B      A, J 1 C      = C      B, C      B, B    Ø A D      C, D    Ø B J 4 D      = transform all Theta that are not in Gamma transform all Gamma for which Theta is empty add remaining axioms to first partition next Partition WHILE  not Splitting-Sets empty  DO DONE Algorithm   [Scharrenbach et al.:DL2010] C B B A C A G F D C E D D B
[object Object],[object Object],Default TBox C B B A C A G F D C E D D B G F G F E D E D
Default TBox Optimization  [Scharrenbach et al:IWOD2010] : ,[object Object],[object Object],[object Object],G F C B B A C A G F D C E D D B G F G F E D E D E D D B D B D B
Default TBox ,[object Object],Optimization  [Scharrenbach et al:IWOD2010] : ,[object Object],C B B A C A G F D C E D D B G F G F E D E D C A C A D C D C

Mais conteúdo relacionado

Mais procurados

Machine learning Lecture 2
Machine learning Lecture 2Machine learning Lecture 2
Machine learning Lecture 2Srinivasan R
 
Selected topics in Bayesian Optimization
Selected topics in Bayesian OptimizationSelected topics in Bayesian Optimization
Selected topics in Bayesian Optimizationginsby
 
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...SSA KPI
 
Lesson 27: The Fundamental Theorem of Calculus
Lesson 27: The Fundamental Theorem of CalculusLesson 27: The Fundamental Theorem of Calculus
Lesson 27: The Fundamental Theorem of CalculusMatthew Leingang
 
Tree distance algorithm
Tree distance algorithmTree distance algorithm
Tree distance algorithmTrector Rancor
 
Prolog programming
Prolog programmingProlog programming
Prolog programmingHarry Potter
 
Pixel Relationships Examples
Pixel Relationships ExamplesPixel Relationships Examples
Pixel Relationships ExamplesMarwa Ahmeid
 
Pert 05 aplikasi clustering
Pert 05 aplikasi clusteringPert 05 aplikasi clustering
Pert 05 aplikasi clusteringaiiniR
 
Discrete Mathematics with Applications 4th Edition Susanna Solutions Manual
Discrete Mathematics with Applications 4th Edition Susanna Solutions ManualDiscrete Mathematics with Applications 4th Edition Susanna Solutions Manual
Discrete Mathematics with Applications 4th Edition Susanna Solutions ManualHayfaVaughan
 
A New Hendecagonal Fuzzy Number For Optimization Problems
A New Hendecagonal Fuzzy Number For Optimization ProblemsA New Hendecagonal Fuzzy Number For Optimization Problems
A New Hendecagonal Fuzzy Number For Optimization Problemsijtsrd
 
Dealing with Constraints in Estimation of Distribution Algorithms
Dealing with Constraints in Estimation of Distribution AlgorithmsDealing with Constraints in Estimation of Distribution Algorithms
Dealing with Constraints in Estimation of Distribution AlgorithmsFacultad de Informática UCM
 
Dr azimifar pattern recognition lect2
Dr azimifar pattern recognition lect2Dr azimifar pattern recognition lect2
Dr azimifar pattern recognition lect2Zahra Amini
 
Problem Solving by Computer Finite Element Method
Problem Solving by Computer Finite Element MethodProblem Solving by Computer Finite Element Method
Problem Solving by Computer Finite Element MethodPeter Herbert
 
Lesson 30: The Definite Integral
Lesson 30: The  Definite  IntegralLesson 30: The  Definite  Integral
Lesson 30: The Definite IntegralMatthew Leingang
 
Image segmentation 3 morphology
Image segmentation 3 morphologyImage segmentation 3 morphology
Image segmentation 3 morphologyRumah Belajar
 

Mais procurados (19)

Machine learning Lecture 2
Machine learning Lecture 2Machine learning Lecture 2
Machine learning Lecture 2
 
Selected topics in Bayesian Optimization
Selected topics in Bayesian OptimizationSelected topics in Bayesian Optimization
Selected topics in Bayesian Optimization
 
Iterative deepening search
Iterative deepening searchIterative deepening search
Iterative deepening search
 
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...
 
Shape Analysis
Shape AnalysisShape Analysis
Shape Analysis
 
Lesson 27: The Fundamental Theorem of Calculus
Lesson 27: The Fundamental Theorem of CalculusLesson 27: The Fundamental Theorem of Calculus
Lesson 27: The Fundamental Theorem of Calculus
 
Tree distance algorithm
Tree distance algorithmTree distance algorithm
Tree distance algorithm
 
Unit 2
Unit 2Unit 2
Unit 2
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
 
Pixel Relationships Examples
Pixel Relationships ExamplesPixel Relationships Examples
Pixel Relationships Examples
 
Pert 05 aplikasi clustering
Pert 05 aplikasi clusteringPert 05 aplikasi clustering
Pert 05 aplikasi clustering
 
Discrete Mathematics with Applications 4th Edition Susanna Solutions Manual
Discrete Mathematics with Applications 4th Edition Susanna Solutions ManualDiscrete Mathematics with Applications 4th Edition Susanna Solutions Manual
Discrete Mathematics with Applications 4th Edition Susanna Solutions Manual
 
A New Hendecagonal Fuzzy Number For Optimization Problems
A New Hendecagonal Fuzzy Number For Optimization ProblemsA New Hendecagonal Fuzzy Number For Optimization Problems
A New Hendecagonal Fuzzy Number For Optimization Problems
 
Dealing with Constraints in Estimation of Distribution Algorithms
Dealing with Constraints in Estimation of Distribution AlgorithmsDealing with Constraints in Estimation of Distribution Algorithms
Dealing with Constraints in Estimation of Distribution Algorithms
 
Dr azimifar pattern recognition lect2
Dr azimifar pattern recognition lect2Dr azimifar pattern recognition lect2
Dr azimifar pattern recognition lect2
 
Admissible Labelings
Admissible LabelingsAdmissible Labelings
Admissible Labelings
 
Problem Solving by Computer Finite Element Method
Problem Solving by Computer Finite Element MethodProblem Solving by Computer Finite Element Method
Problem Solving by Computer Finite Element Method
 
Lesson 30: The Definite Integral
Lesson 30: The  Definite  IntegralLesson 30: The  Definite  Integral
Lesson 30: The Definite Integral
 
Image segmentation 3 morphology
Image segmentation 3 morphologyImage segmentation 3 morphology
Image segmentation 3 morphology
 

Semelhante a Default Logics for Plausible Reasoning with Controversial Axioms

NCE, GANs & VAEs (and maybe BAC)
NCE, GANs & VAEs (and maybe BAC)NCE, GANs & VAEs (and maybe BAC)
NCE, GANs & VAEs (and maybe BAC)Christian Robert
 
Stochastic Control/Reinforcement Learning for Optimal Market Making
Stochastic Control/Reinforcement Learning for Optimal Market MakingStochastic Control/Reinforcement Learning for Optimal Market Making
Stochastic Control/Reinforcement Learning for Optimal Market MakingAshwin Rao
 
A Simple Algorithm for Minimal Unsatisfiable core
A Simple Algorithm for Minimal Unsatisfiable coreA Simple Algorithm for Minimal Unsatisfiable core
A Simple Algorithm for Minimal Unsatisfiable corePvc Pvc
 
Typing quantum superpositions and measurement
Typing quantum superpositions and measurementTyping quantum superpositions and measurement
Typing quantum superpositions and measurementAlejandro Díaz-Caro
 
Set theory and relation
Set theory and relationSet theory and relation
Set theory and relationankush_kumar
 
20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilers20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilersComputer Science Club
 
ds 10-Binary Tree.ppt
ds 10-Binary Tree.pptds 10-Binary Tree.ppt
ds 10-Binary Tree.pptkhitishlpu
 
Mm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithmsMm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithmsEellekwameowusu
 
Succinct Data Structure for Analyzing Document Collection
Succinct Data Structure for Analyzing Document CollectionSuccinct Data Structure for Analyzing Document Collection
Succinct Data Structure for Analyzing Document CollectionPreferred Networks
 
3 grechnikov
3 grechnikov3 grechnikov
3 grechnikovYandex
 
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...inventionjournals
 
Declare Your Language: Constraint Resolution 1
Declare Your Language: Constraint Resolution 1Declare Your Language: Constraint Resolution 1
Declare Your Language: Constraint Resolution 1Eelco Visser
 

Semelhante a Default Logics for Plausible Reasoning with Controversial Axioms (20)

NCE, GANs & VAEs (and maybe BAC)
NCE, GANs & VAEs (and maybe BAC)NCE, GANs & VAEs (and maybe BAC)
NCE, GANs & VAEs (and maybe BAC)
 
CDT 22 slides.pdf
CDT 22 slides.pdfCDT 22 slides.pdf
CDT 22 slides.pdf
 
Stochastic Control/Reinforcement Learning for Optimal Market Making
Stochastic Control/Reinforcement Learning for Optimal Market MakingStochastic Control/Reinforcement Learning for Optimal Market Making
Stochastic Control/Reinforcement Learning for Optimal Market Making
 
Slides
SlidesSlides
Slides
 
A Simple Algorithm for Minimal Unsatisfiable core
A Simple Algorithm for Minimal Unsatisfiable coreA Simple Algorithm for Minimal Unsatisfiable core
A Simple Algorithm for Minimal Unsatisfiable core
 
Typing quantum superpositions and measurement
Typing quantum superpositions and measurementTyping quantum superpositions and measurement
Typing quantum superpositions and measurement
 
Set theory and relation
Set theory and relationSet theory and relation
Set theory and relation
 
20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilers20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilers
 
ds 10-Binary Tree.ppt
ds 10-Binary Tree.pptds 10-Binary Tree.ppt
ds 10-Binary Tree.ppt
 
CMU_13
CMU_13CMU_13
CMU_13
 
Mm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithmsMm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithms
 
Succinct Data Structure for Analyzing Document Collection
Succinct Data Structure for Analyzing Document CollectionSuccinct Data Structure for Analyzing Document Collection
Succinct Data Structure for Analyzing Document Collection
 
Normalization
NormalizationNormalization
Normalization
 
3 grechnikov
3 grechnikov3 grechnikov
3 grechnikov
 
L2
L2L2
L2
 
MUMS Undergraduate Workshop - A Biased Introduction to Global Sensitivity Ana...
MUMS Undergraduate Workshop - A Biased Introduction to Global Sensitivity Ana...MUMS Undergraduate Workshop - A Biased Introduction to Global Sensitivity Ana...
MUMS Undergraduate Workshop - A Biased Introduction to Global Sensitivity Ana...
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
 
Declare Your Language: Constraint Resolution 1
Declare Your Language: Constraint Resolution 1Declare Your Language: Constraint Resolution 1
Declare Your Language: Constraint Resolution 1
 

Mais de Rommel Carvalho

Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big DataOuvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big DataRommel Carvalho
 
Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...Rommel Carvalho
 
Proposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos PúblicosProposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos PúblicosRommel Carvalho
 
Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...Rommel Carvalho
 
Mapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federalMapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federalRommel Carvalho
 
Ciência de Dados no Combate à Corrupção
Ciência de Dados no Combate à CorrupçãoCiência de Dados no Combate à Corrupção
Ciência de Dados no Combate à CorrupçãoRommel Carvalho
 
Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...Rommel Carvalho
 
Filiação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federaisFiliação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federaisRommel Carvalho
 
Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...Rommel Carvalho
 
Detecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de comprasDetecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de comprasRommel Carvalho
 
Identificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAIIdentificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAIRommel Carvalho
 
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...Rommel Carvalho
 
URSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-inURSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-inRommel Carvalho
 
Integração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado FederalIntegração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado FederalRommel Carvalho
 
Dados Abertos Governamentais
Dados Abertos GovernamentaisDados Abertos Governamentais
Dados Abertos GovernamentaisRommel Carvalho
 
Modeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain AwarenessModeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain AwarenessRommel Carvalho
 
Probabilistic Ontology: Representation and Modeling Methodology
Probabilistic Ontology: Representation and Modeling MethodologyProbabilistic Ontology: Representation and Modeling Methodology
Probabilistic Ontology: Representation and Modeling MethodologyRommel Carvalho
 
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule LanguageSWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule LanguageRommel Carvalho
 
Tractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description LogicsTractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description LogicsRommel Carvalho
 

Mais de Rommel Carvalho (20)

Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big DataOuvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
 
Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...
 
Proposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos PúblicosProposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos Públicos
 
Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...
 
Mapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federalMapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federal
 
Ciência de Dados no Combate à Corrupção
Ciência de Dados no Combate à CorrupçãoCiência de Dados no Combate à Corrupção
Ciência de Dados no Combate à Corrupção
 
Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...
 
Filiação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federaisFiliação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federais
 
Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...
 
Detecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de comprasDetecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de compras
 
Identificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAIIdentificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAI
 
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
 
A GUI for MLN
A GUI for MLNA GUI for MLN
A GUI for MLN
 
URSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-inURSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-in
 
Integração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado FederalIntegração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado Federal
 
Dados Abertos Governamentais
Dados Abertos GovernamentaisDados Abertos Governamentais
Dados Abertos Governamentais
 
Modeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain AwarenessModeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain Awareness
 
Probabilistic Ontology: Representation and Modeling Methodology
Probabilistic Ontology: Representation and Modeling MethodologyProbabilistic Ontology: Representation and Modeling Methodology
Probabilistic Ontology: Representation and Modeling Methodology
 
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule LanguageSWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
 
Tractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description LogicsTractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description Logics
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Default Logics for Plausible Reasoning with Controversial Axioms

  • 1. Default Logics for Plausible Reasoning with Controversial Axioms Thomas Scharrenbach (*) , Claudia d'Amato (**) , Nicola Fanizzi (**) , Rolf Grütter (*) , Bettina Waldvogel (*) and Abraham Bernstein (***) (*) Swiss Federal Institute for Forest, Snow and Landscape Research WSL, Zürcherstrasse 111, 8903 Birmensdorf, Switzerland (***) University of Zurich Department of Informatics Binzmühlestrasse 14, 8050 Zurich, Switzerland (**) Università degli Studi di Bari Department of Computer Science Via E. Orabona, 4 - 70125 Bari Italy 4 th International Workshop on Ontology Dynamics – IWOD 2010
  • 2.
  • 4.
  • 6.
  • 8. ...
  • 9.
  • 12.
  • 14. Don't care about ontologies
  • 15.
  • 16.
  • 17.
  • 18. Justifications J 1 C   = B  A, C  B, C  Ø A J 2 D   = B  A, C  B, C  Ø A, J 3 E   = B  A, C  B, C  Ø A, D  C D  C, D  C J 4 D   = C  B, D  C, D  Ø B J 4 D   = C  B, D  C, D  Ø B, E  D Minimal sets of axioms that explain an entailment Root justifications do not depend on other justifications B A G F E D A C C B D C D B
  • 19. Splitting justifications provide partitions for Default Logics B  A, Unsat Splitting J 1 C   = J 4 D   = C  B, C  B, C  Ø A D  C, D  Ø B Gamma-Set: unsat concept in signature Theta-Set: unsat concept not in signature Root justifications do not depend on other justifications B A G F E D A C C B D C D B
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Ignore conflicts: Partition scheme from Lehmann's Default Logic
  • 27. Find optimal solutions: Minimal D -t ransformation
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. T D = {E  D, G  F, C  Ø A, D  Ø B } U 0 = {B  A}, U 1 = {C  B} U 2 = {D  C }
  • 33. DT 2  D  B
  • 34.
  • 35. T D = {E  D, G  F, C  Ø A, D  C } U 0 = {B  A}, U 1 = {C  B} U 2 = {D  Ø B }
  • 36. DT 1  D  B DT 1  D  Ø B
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Not designed for Default TBoxes
  • 42. Need nonetheless be evaluated
  • 43.
  • 44. No removal of axioms needed
  • 45. Minimize number of inferences invalidated
  • 46.
  • 47. Choose solution that minimizes remaining conflicts
  • 48. Optimal solution depends on instantiation
  • 49.
  • 50. Slide 397: That's it for the moment... ... and thanks for your attention ... any feedback is greatly appreciated
  • 51. Data Sustainability SQL GIS WS SQL GIS WS OWL OWL OWL data Domain Specific Search Domain Specific Search Domain Specific Search ta data meta meta data DNL Birmensdorf CSCF Neuchatel BAFU Berne
  • 52.

Notas do Editor

  1. Welcome to my talk about „Plausible Reasoning with Controversial Axioms“. I am Thomas Scharrenbach and I will now present you joint work that I did with my colleages from WSL Rolf Grütter and Bettina Waldvogel, colleages from Bari, Claudia d'Amato and Nicola Fanizzi and last but not least, Avi Bernstein from the University of Zurich. This is a position paper, so I will not be able to present the underlying methods in too much detail. However, we are using this methods for ontology evolution, and it happens that I will present some of the methods used in this paper in more detail at the Workshop on Ontology Dynamics which takes place tomorrow.
  2. Before I start with my talk, you might be wondering what forest, snow and landscape might have to do with plausible reasoning. Well, research at WSL is roughly categorized by these three topics. We, for example, create and maintain the Swiss national forest inventroy. Other groups try to figure out how to predict and prevent the occurrence of avalanches whereas people from my resaerch unit deal with the monitoring of endagered species but also spatial planning---also with regard to protect people from natural hazards. All these people at WSL have one thing in common: they produce tons of data. This can be in the scope of a research project. But we also collect and maintain data on the order of public authorities such as the Swiss Federal Office for the Environment.
  3. For all these data we would like to have a formal meta-data description. This meta-data description, in turn is realized in OWL2-ontologies. When creating these ontologies, we face a common problem. There are two parties involved: Knowledge engineers and Domain Experts. The goal is to formalize the knowledge of the domain expert within an OWL2-ontology. Yet, Domain Experts tend to build highly inconsistent knowledge bases. On the other hand, Knowledge engineers build consistent knowledge bases but lack the detailed knowledge. Furthermore, if I start telling my colleagues at WSL about ontologies they look at me as if I were from Mars. Well, I am not from Mars and neither are you. At WSL, our strategy is to offer the Domain Experts a simple way of building ontologies which is tolerant to modelling errors. Furthermore, this procedure shall keep all information that was provided by the Domain Experts. We only revise the knowledge base from time to time, because Domain Experts do not like to find that pieces of the knowldege they contributed have just been deleted.
  4. To sum up, when letting Domain Experts construct an ontology, we define some properties that we find useful: The ontology shall not infer anything unsatisfiable. Modelling errors are hidden from the Domain Experts. No information that was provided by the Domain Experts shall be deleted. We will not change the formalism for knowledge representation. If we started with OWL2-EL, for example, we want to end up with OWL2-EL. This refers ONLY to using OWL2 for knowledge representation, whereas we change the inference process, as we will see later on. Other properties are that the procedure shall work autonomous and preserve as much of the implicit information as possible. We require the first properties to be strictly kept whereas the last properties are considered as soft. This implies that we, for example, give higher precedence to explicitly stated axioms than to inferred knowledge.
  5. To achieve these properties we defined the so-called Delta-transformation. This Delta-transformation maps a TBox to a so-called Default TBox. We invalidate unwanted inferences such as unsatisfiability by separating those axioms that cause unsatisfiability. For the separation we use Default Logics as interpreted by Lehmann. As done in Lukasiewicz Probabilistic Description Logics, we keep axioms that are not involved in a conflict in a separate TBox. We introduced a simple splitting scheme which allows to compute the partitions for the Default TBox without having to do additional satisfiability checks. We could further optimize the method by not transforming all trouble causing axioms. This potentially saves some inferences we would loose otherwise, but comes at the price that finding solutions becomes non-deterministic. However, following this optimization strategy alone has some disadvantage. There may still reside conflicts in the knowlege base. Although they do not cause any trouble when performing reasoning, we would like to get ird of them, because they might confuse the Domain Experts working with the ontology. The present work deals with exactly that problem: How can we overcome the uncertainty of different solutions regarding minimizing number of conflicts as well as the number of inferences invalidated.
  6. Consider TBox axioms. These have the form B is subsumed by A where A and B are ---possibly complex---concepts. In Default Logics the set of axioms is partitioned into the partitions U_0, ..., U_N such that the most general information is contained in U_0 and the most specific axioms are conatined in U_N. The trick about Lehmann's Default Logics is that this order of specifity can be determined solely by the axioms themselves. How does that work? I will explain this to you by an example TBox that infers some concepts unsatisfiable. You can find this example also in the paper. We introduce a remainder set D_n in which we store all currently valid axioms. In the beginning the first remainder set D_0 is the TBox itself. For the first partition, we now take all axioms for which both the subconcept as well as the superconcept are satisfiable. TODO ExAMPLE
  7. I will now give you a quick overview over the unsat splitting. First of all, we work on root unsat justifications. An unsat justification is a minimal set of axioms that explains an unsatisfiability. A root unsat justification does not depend on any other justification. Assume the simple TBox in the upper right corner. Black arrows stand for concept subsumption whereas red arrows represent disjoints. For example, this arrow means A is subsumed by B whereas this arow means D is disjoint with B. We separate the root unsat justifications such into two sets: The Gamma-set, in red, contains all axioms that contain the concept that is unsatisfiable w.r.t. to this very justification. The Theta-set, in blue, contains the remaining axioms of that very justification. We can now use this simple splitting to compute the Default TBox without any further unsatisfiability checks. All the satisfiability checks have already been done by computing the justifications.
  8. Consider TBox axioms. These have the form B is subsumed by A where A and B are ---possibly complex---concepts. In Default Logics the set of axioms is partitioned into the partitions U_0, ..., U_N such that the most general information is contained in U_0 and the most specific axioms are conatined in U_N. The trick about Lehmann's Default Logics is that this order of specifity can be determined solely by the axioms themselves. How does that work? I will explain this to you by an example TBox that infers some concepts unsatisfiable. You can find this example also in the paper. We introduce a remainder set D_n in which we store all currently valid axioms. In the beginning the first remainder set D_0 is the TBox itself. For the first partition, we now take all axioms for which both the subconcept as well as the superconcept are satisfiable. TODO ExAMPLE
  9. I will omit the details of the algorithm for creating partitions, since it is not relevant for this wowk. For the simple TBox in the example, we receive the following TBox: We have three partitions, U0, U1 and U2 and a so-called Universal TBox T-Delta. Each partition together with T-Delta is coherent. For the reasoning part we could, in principle, do Default Logics reasoning, but we would like to avoid the additional complexity. Our goal is to simply ignore conflicts. As such we consider the union of all deductive closures as the deductive closure of the whole Default TBox. ---Pause--- There is another issue we did not address so far. We put all axioms form the root justifications into the partitions and receive a single unique solution. Well, we can do better:
  10. It suffices to put only two axioms of each root unsat justification into two different partitions. In that case we showed that we loose less inferences. We can, for example, put axiom D disjoint with B into the Universal TBox. It now occurs not only in partition U2, but in all partitions. The choice, however, which axioms to put into the partitions and which axioms to put into the Universal TBox is non-deterministic. Optimizing, hence, introduces some uncertainty into the whole process.
  11. A second example would be choosing not to transform axioms C disjoint with A and C subsumed by D but put them in the Universal TBox instead.
  12. To sum up, we first identify all the axioms that are involved in conflicts by computing the unsat justifications. We resovle the root unsat justifications by using methods from Lehmann's Default Logics and Lukasiewicz Probabilistic Description Logics. In particular, some ofthe trouble-causing axioms are separated during reasoning. We finally have to optimize the actual choice which axioms to put in the partitions and which axioms can be left in the Universal TBox. This last step effectively introduces some uncertainty for the reasoning capabilities of the resulting Default TBox which we have to overcome.
  13. If we just perform inference counting we can end up with weird situations. Consider the following Default TBox which was the first optimized solution I just presented. To our definition, this Default TBox DT-1 has two entailments: On the one hand we infer that B is subsumed by D on the other hand, we infer the opposite. This contradiction does not cause problems when reasoning. We never consider both entailments at the same time, because they originate from two different partitions. Yet, it is not quite obvious for a Domain Expert that we allow for such conflicts. Classical Default Logics reasoning could overcome this issue, but as I said, we want to avoid the additional overhead. Fortunately, in this example we can provide a solution in which the conflict is no longer present. The second possible solution DT-2 does not contain the conflict. However, this means that is has one inference less than DT-1. If we now just assessed solutions by inference counting, then we would clearly choose solution one, that is the one containing the conflict. Hence need a performance measure that takes into account the quality of a solution regarding the number of conficts still present.
  14. We recently came up with the idea of assessing the quality of a possible solution by its information content. In computer science, in particular in information theory, information content is measured by the entropy. How can we benefit from an entropy based measure? Well, assume that a conflict is still present. That is, we are still able to infer that B is subsumed by D as well as the complement of B is subsumed by D. If we assert an instance to D, then we infer two assertions: One for B and one for the complement of B. In case there is no conflict, we can infer the assertion to only one of both concepts, that is to either B or its complement. Considering the assertions as a random variable, the conflict case is more similar to an uniform distribution whereas the non-conflicting case is more different from the uniform distribution. The entropy, in turn, measures how much the actual distribution of a random variable differs from the uniform distribution. The higher the entropy the larger the difference. We hence propose to assess solutions regarding the entropy of a Default TBox in presence of an instantiation, that is an ABox.
  15. To define the entropy on a TBox or a Default Tbox---the procedure works on any set of axioms for which we have a proper inference mechanism---we define the entropy on a set of axioms. This requires to define a probability mass function on axioms. Based on a concept representation of an axiom, we propose to use the following definition: The probability of an axiom is the normalized sum of the instances under which the axiom becomes true. This is the case when the instance i can either be asserted to A or to the complement of B. Alpha serves here as the normalization constant and I is an indicator function. As I stated before the idea is that presence of conflicts increase the entropy whereas absence of conflicts reduces them.
  16. There have been made proposals measuring the quality of an ontology. Most of these have been desigend for evaluation the quality of ontology modularization. Modularization, in contrast to Default Logics, tries to split up the ontology into independent sub-units. We try to avoid this independence as much as possible. However, the most relevant to this work is, to the best of our knowledge, the entropy measure defined by Doran et al. It solely relies upon the structure of the ontology. We could, in principle, treat the different partitions as modules and hence apply this measure. Yet it would not be useful for minimizing the number of conflicts. We still have to evaluate whether other measures can do the job, but we strongly assume that this is not the case, because none of these measures was designed for minimizing the number of conflicts.
  17. To conclude, we are indeed able to perform reasoning on ontologies that contain controversial axioms. We can keep all explicitly stated information and ignore potential conflicts. The solution to reasoning is not deterministic but is subject to an optimization process. Conflicts are ignored during reasoning but can still be present. We hence have ot optimize regarding the number of conflicts and the number of inferences that we invalidate. We showed that this requires a more sophisiticated measure than simply counting inferences. Existing methods for evaluating ontologies were not designed to assess Default Tboxes regarding a minimal number of conflicts. We suggest to assess the quality of solutions by their information content and proposed an entropy-based measure that evaluates the quality of a Default TBox solution in the presence of a TBox.
  18. There is still plenty of work to do. First of all, we have to improve the scalability of computing all justifications for an entailment. Most relevant to this work, we will have to investigate further quality measures to have a solid basis for choosing the proper measure. We also have to evaluate this approach on real people. It is not granted that Domain Experts will accept the approach. Last but not least, we may apply this method to other domains such as, for example, ontology mapping.
  19. So, I will come to an end now, before you are all die of powerpoint-poisoning. I thank you for your attention and would appreciate your comments and questions.