KIT REPORT 111 Deriving Inference Rules for Description Logics: a Rewriting Approach into Sequent Calculi Véronique Royer ONERA–CERT 2 AV. EDOUARD BELIN-BP 4025 F-31055 TOULOUSE e-mail: [email protected] J. Joachim Quantz TECHNISCHE UNIVERSITÄT BERLIN PROJEKT KIT-BACK, FR 5–12 FRANKLINSTR. 28/29, D–10587 BERLIN 10 e-mail: [email protected] December 1993 Abstract Description Logics (DL) can be investigated under different perspectives. The aim of this report is to provide the basis for a tighter combination of theoretical investigations with issues arising in the actual implementation of DL systems. We propose to use inference rules, derived via the Sequent Calculus, as a new method for specifying terminological inference algorithms. This approach combines the advantages of the tableaux methods and the normalize-compare algorithms that have been predominant in terminological proof theory so far. In our paper presented at JELIA’92 we proposed a generic method for deriving complete sets of inference rules for DL. The method relies upon translations into Sequent Calculus and systematic rewriting of sequent proofs. We illustrated our method on a relatively restricted terminological logic. In this report the approach is extended to the more expressive logic underlying Back V5. It turns out that concept-forming operators involving equality and role-forming operators considerably increase the complexity of our rewriting strategy. The derived inference rules can be used in two ways for the characterization of DL systems: first, the incompleteness of systems can be documented by listing those rules that have not been implemented; second, the reasoning strategy can be described by specifying which rules are applied forward and which backward. Contents 1 Introduction 2 2 Description Logics 2.1 The Roots of Description Logics : : : : 2.2 Theoretical Investigations : : : : : : : 2.3 Implemented Systems and Applications 2.4 Extending Description Logics : : : : : 3 Inference Rules and Sequent Calculus 3.1 Motivating Axiomatic Characterizations : : : : : : : : 3.2 Methodology for Deriving Complete Inference Systems 3.3 Technicalities on Sequent Calculi : : : : : : : : : : : 4 Concept Subsumption without Equality 4.1 Conjunction and Disjunction : : : : 4.2 Quantification : : : : : : : : : : : 4.3 Negation : : : : : : : : : : : : : : 5 Concept Subsumption with Equality 5.1 Elimination of Quantifiers and Creation of the Proof Lexique 5.2 Introduction of Complete Equality Assumptions : : : : : : : 5.3 Axiomatization of Numerical Operators : : : : : : : : : : : 5.4 Axiomatization of Extensional Operators : : : : : : : : : : 6 Role Subsumption 6.1 The Propositional Fragment : : 6.2 Domain and Range Restrictions 6.3 Role Composition and Inversion 7 Conclusion and Future Work 7.1 The Impact of Complex Roles on Concept Subsumption 7.2 Object Recognition : : : : : : : : : : : : : : : : : : : 7.3 Flexible Inference Strategies : : : : : : : : : : : : : : : : : : : 4 4 6 12 14 :::::: :::::: :::::: 15 15 17 19 :::::::::::::::: :::::::::::::::: :::::::::::::::: 21 22 23 27 : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 31 32 49 53 55 :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: 59 60 61 68 : : : : : : : : ::::: ::::: ::::: References 79 79 82 83 85 A Proofs for Numerical Operators A.1 Formulae with Only One Creative Term : : : : : : : : : : A.2 Formulae with exactly two eigen-parameter-creating terms B Survey of Inference Rules :::: :::: 89 89 96 111 1 1 INTRODUCTION 2 Γ j=DL iff iff iff Γ `DL Γ Γ j=FOL iff `SC Figure 1: The commutative diagram underlying our approach to inference rule derivation. 1 Introduction In this paper we conclude our work on deriving inference rules for Description Logics (DL) started in [Royer, Quantz 92] and [Royer, Quantz 93]. The aim of our investigation was to provide a complete axiomatization of the expressive DL underlying the implementation of the DL system BACK V5 [Hoppe et al. 93]. It turned out that this enterprise was a lot more complex than we had originally expected. Though we are thus not completely satisfied with the results presented in this report, we think that they are interesting enough to be published in the current form. We hope that our work will be continued by others, and will eventually reach a more stable and complete status. Let us briefly sketch the main difficulties of our work. The basic idea is to find a complete set of inference rules for DL which allows a constructive characterization of the set of consequences of a given set of DL formulae. Thus our inference rules typically have the form 1 ; : : : ; n * expressing that we can infer the DL formula if we already have inferred the DL formulae 1 ; : : :; n . Most researchers working on DL will have no problems to give examples for such inference rules. The main problem is to show that a given list of inference rules is complete for a particular DL. In [Royer, Quantz 92] we have demonstrated how the Sequent Calculus (SC) for First-Order Logic (FOL) can be used to obtain a complete set of inference rules for a restricted DL. Consider the commutative diagram shown in Figure 1.1 We know that a DL formula can be translated into an FOL formula ( ). That is we know Γ j=DL iff Γ j=FOL Γ j=FOL iff Γ `SC If we now can show that Γ `SC 1 iff Γ `DL The following argument is presented more carefully in Section 3. 3 we immediately get the desired completeness Γ j=DL iff Γ `DL Thus our main task was to prove that for every SC proof of an FOL translation of a DL formula there is a corresponding DL proof of . We thus had found a systematic way for deriving inference rules for DL—we just had to look at SC proofs in order to construct corresponding DL inference rules. Unfortunately, being systematic does not guarantee simplicity. As it turned out, SC proofs for some DL constructs showed a high degree of complexity. The main cause for this complexity is that these DL constructs cannot be translated into pure FOL, but rather require eqality statements, i.e. are translated into FOL= . Consequently, we need to consider proofs in SC= to deal with these constructs. One way of coping with this difficulty is to introduce some simplifying assumptions about the role-forming operators. In addition to the problem to the problem of concept subsumption we investigate role subsumption and object recognition, i.e. derivation of descriptions. The derivation of inference rules performed in this report can thus be divided into five subtasks with varying degree of complexity:2 1. A DL containing only concept-forming operators without equality and no role-forming operators is investigated in Section 4. We regard the inference rules for this DL as complete. 2. A DL containing concept-forming operators with equality but no roleforming operators is investigated in Section 5. This task is almost completed, but there are still some open questions. 3. Inference rules for role subsumption are derived in Section 6. This derivation is performed by a straightforward case analysis guaranteeing completeness. 4. Some inference rules for a DL containing role-forming operators and concept-forming operators involving equality are listed in Section 7.1. The presentation is only sketchy though, and a thorough investigation is still lacking. 5. For object recognition we present the most important inference rules (Section 7.2 without specifying the rules needed for complex case reasoning, however. As should be obvious from these remarks we do not offer technical proofs regarding the completeness of our axiomatization. Nevertheless we think that the technique 2 Note that complexity here refers to the task of deriving inference rules and not to the computation of subsumption itself. 4 2 DESCRIPTION LOGICS used in this report is, due to its systematicity, appropriate for deriving a complete set of inference rules. One further issue before we begin our detailed description of the method. The main motivation for our investigation of inference rules is the implementation of DL systems. Obviously, the behavior of such systems should reflect the underlying logic. In other words, given a set of DL formulae Γ we want to query the system whether a particular DL formula is entailed, and we expect the answer to correlate with the formal entailment relation Γ j=DL . To achieve this we could also use tableaux methods, i.e. we could try to prove the inconsistency of Γ [ : . This approach has the disadvantage, however, that costly computations are performed at query time. In several application, such as information retrieval, it is more appropriate to compute consequences already at assertion time (see Section 3 for more details). Note that the inference rules of the form sketched above can be used in both directions: they can be used to infer whenever 1 ; : : : ; n already have been inferred; or they can be used backward, i.e. when trying to prove one proof would be to prove 1 ; : : :; n . This is important, because we might choose different formats of rules, depending on the direction in which we want to apply the rules. We will address this issue in Section 7.3. Before we begin the derivation of inference rules we give a short introduction into Description Logics (Section 2) and into the Sequent Calculus and our rewrite approach based on it (Section 3). 2 Description Logics 2.1 The Roots of Description Logics The field of Knowledge Representation (KR) originated in the late 1960’s and found its first paradigm in Semantic Networks as proposed in [Quillian 68]. Quillian assumed semantic memory to be general memory, underlying such diverse cognitive activities as language understanding and perception. The intimate connection between his work and research in psychology and linguistics is typical for this early phase of KR—it was assigned the task of modeling the human ability to use information for intelligent activities such as natural language understanding, perception, planning, etc. Consequently, psychological experiments were conducted to determine the cognitive adeqacy of the proposed formalisms [Collins, Quillian 69]. The second paradigm of KR was created by Minky’s seminal paper on Frames [Minsky 75]. Minsky’s original goal was to account for the effectiveness of common-sense reasoning in real-world tasks — to a large degree motivated by “human” models borrowed from psychology or text linguistics. 2.1 The Roots of Description Logics 5 Though not obvious on first sight, there is a close resemblance between Semantic Nets and Frames. A semantic net consists of nodes that are connected by labelled links. Some of these links, the so called ISA-Links indicate specialization, while others stand for other relations holding between the nodes. A key idea of Semantic Nets is the notion of inheritance: the links attached to a node are inherited to its specializations. Due to their graphical notation and the inheritance principle, Semantic Nets thus allow a compact representation of the complex dependencies between pieces of information. The frames correspond to the nodes in a semantic net, the ISA-Link is represented by the subframe relation, and the labelled links are modeled by slots and fillers (a slot correponds to the labelled link, the filler to the node to which the link points). Note that inheritance from frames to subframes mirrors the inheritance via ISA-Links in Semantic Networks. Though both representation formats are thus very similar, there are also important differences. Semantic Nets are more appropriate for conveying the general structure of the represented information, especially interconnections and dependencies; a frame representation, on the other hand, focuses not so much on the overall structure but on the basic units and the information locally associated with each frame. Note that this difference between both formalisms is not an issue of expressive adequacy but one of structural adequacy. Both Semantic Nets and Frames are ancestors of Description Logics and all three approaches to KR have much in common. There are, however, essential characteristics of DL that distinguish them from their ancestors—the basic difference concerns the attitude towards theoretical foundations and towards the question of what is constitutive for a representation formalism. In the second half of the 1970’s representation languages from the area of Semantic Nets, Frames, or Scripts were seriously attacked in a number of papers for their apparent lack of formal rigor (e.g., [Woods 75] and [Hayes 77]). The key issue was the relationship between Knowledge Representation and Formal Logic. Note that Quillian located his semantic memory between natural languages and symbolic logic [Quillian 68, p. 230]. This opinion clearly implies that Semantic Nets are superior to Predicate Logic with respect to expressive adequacy. One apparent problem we face here is the missing entailment relation for Semantic Nets or Frames—how do we know whether a semantic net contains more information than another? Of course, this boils down to the question of how we know what exactly a semantic net or a frame means? Hayes answers this question by mapping frame definitions into FOL formulae [Hayes 80], and thus shows that Frames are not superior to FOL with respect to expressive adequacy. Two remarks seem in order here. First, the above argumentation is, at least to a certain degree, circular—we do not know what formulae in a formalism mean unless we define a notion of entailment; given such a notion of entailment we have a logic; thus all representation formalisms are logics. Second, 6 2 DESCRIPTION LOGICS if representation formalisms are reducible to FOL it does not mean that they are dispensable. It just means that they are not superior to FOL with respect to expressive adequacy, but they stil can be with respect to structural or computational adequacy. Reducibility to FOL is rather an advantage because it guarantees applicability of the tools for theoretical investigations developed in Formal Logic. To draw an analogy to Programming Languages—nobody would discard a programming language just because it can be compiled into an already existing language. On the contrary, the new language has to be compiled into Machine Code ultimately, and it is confined to the limits of theoretical computability as expressed by Turing Machines, the Lambda Calculus, etc. Brachman endorsed the logic-oriented view on Knowledge Representation in his early papers on Semantic Nets [Brachman 77] and [Brachman 79]. Instead of formalizing Semantic Nets in terms of FOL, however, he examined in detail, what the constructs used in them were supposed to represent. There are two important results of his investigations: for one thing, Brachman proposes to distinguish several levels in the discussion of knowledge representation systems, namely the implementational, the logical, the epistemological, the conceptual, and the linguistic level. In addition, he proposes KL-ONE as a formalism on the epistemological level and presents its basic elements or epistemological primitives. An overview over the basic features of the KL-ONE formalism circulated in the beginning of the 80’s and was finally published in [Brachman, Schmolze 85]. In the following years several DL systems have been developed incorporating different dialects but similar with respect to the underlying representation philosophy. The respective formalisms and systems were called KL-ONE alike systems, term subsumption systems, concept logics, terminological logics, and description logics. 2.2 Theoretical Investigations Though Brachman mentioned the importance of a formal semantics in his papers, it took some years before Description Logics were thoroughly investigated from a theoretical point of view. Schmolze and Israel presented a formal semantics for KL-ONE in [Schmolze, Israel 83]. In the same year Brachman and Levesque raised the question of tractability of KR formalisms [Brachman, Levesque 84]. In the late 1980’s several results were obtained concerning the tractability of different DLs. In order to understand these results we now have to take a closer look on the theoretical foundations of DL. In DL one typically distinguishes between terms and objects as basic language entities from which three kinds of formulae can be formed: definitions, descriptions, and rules (see the sample modeling on page 13 below). A definition has the : form tn = t and expresses the fact that the name tn is used as an abbreviation for the term t. A list of such definitions is often called terminology (hence also the 2.2 Theoretical Investigations 7 name Terminological Logics). All DL dialects provide two types of terms, namely concepts (unary predicates) and roles (binary predicates), but they differ with respect to the term-forming operators they contain. Common concept-forming operators are: conjunction (c1 u c2 ), disjunction (c1 t c2 ), and negation (: c), as well as quantified restrictions [Quantz 92] such as value restrictions (8r:c), which stipulate that all fillers for a role r must be of type c, or number restricitions (n r:c or n r:c), stipulating that there are at least or at most n role-fillers of type c for r. Role-forming operators are, besides conjunction, disjunction, and negation, role composition (r1 .r2), transitive closure (r+ ), inverse roles (r ) and domain or range restrictions (cjr or rjc ). In a description, an object is described as being an instance of a concept (o :: c), or as being related to another object by a role (o1 :: r:o2 ). Rules have the form c1 ) c2 and stipulate that each instance of the concept c1 is also an instance of the concept c2. The following syntax specifies the DL we will ultimately investigate in this report (cn and rn are concept names and role names respectively): ! c;r ! > ; ? ; cn ; : c ; c1 u c2 ; c1 t c2 ; 8r:c1 ; n r:c ; n r:c ; r:fo1; :::; on g ; fo1; :::; on g_ r ! >r; ?r ; ; rn ; : r ; r1 u r2 ; r1 t r2 ; r1 ; r1 .r2 ; c jr1 ; r1jc ! t1 v t2 ; o :: c t c For this language a model-theoretic semantics can be given where a model M of a set of DL-formulae Γ is a pair hD; [[]]I i. [[]]I maps concepts into subsets of D, roles into subsets of D D, and object-names injectively into D, in accordance with the following equations (we use r(d) to denote fe : hd; ei 2 rg): >]]I I [[?]] I [[t1 u t2 ]] I [[t1 t t2 ]] I [[:c]] I [[8r:c]] I [[n r:c]] I [[n r:c]] I [[r:fo1 ; :::; on g]] _ I [[fo1 ; :::; on g ]] I [[>r]] I [[?r]] I [[:r]] [[ = D = ; = [[t1 ]] = = = = = = = = = = I \ [[t2 ]]I I I [[t1 ]] [ [[t2 ]] D n [[c]]I fd 2 D : [[r]]I (d) [[c]]I g fd 2 D : j[[r]]I (d) \ [[c]]I j ng fd 2 D : j[[r]]I (d) \ [[c]]I j ng fd 2 D : f[[o1]]I ; :::; [[on]]I g [[r]]I (d)g f[[o1]]I ; :::; [[on ]]I g DD ; I (D D) n [[r]] 2 DESCRIPTION LOGICS 8 I I [[r1 :r2 ]] I [[cjr]] I [[rj ]] [[r1 ]] c = = = = fhd; ei 2 D D : he; di 2 [[r]]I g I I [[r1 ]] [[r2 ]] I I [[r]] \ ([[c]] D) I I [[r]] \ (D [[c]] ) Satisfaction of formulae is then defined as follows: M j= t2 v t1 iff M j= o :: c iff I [[t ]]I 1 I I [[o]] 2 [[c]] [[t2 ]] A structure M is a model of a formula iff M j= ; it is a model of a set of formulae Γ iff it is a model of every formula in Γ. A formula is entailed by a set of formulae Γ (written Γ j=DL ) iff every structure which is a model of Γ is also a model of . In addition to the notation defined above, we will use the following notational conventions: n r n r 9r:c def = def = def = r:o def cn = c c1 ) c2 def : = = def = n r:> n r:> 1 r:c r:fog cn v c; c v c1 v c2 cn Clearly, this logic is a subset of First-Order Logic with Equality. We can make this precise by specifying a translation of DL-formulae into FOL-formulae (cf. also [Schmolze, Israel 83] and [Royer, Quantz 92]). The set of concept-names (resp. role-names) is bijectively mapped into a set of unary predicate symbols (resp. binary predicate symbols); object-names are bijectively mapped into constants. Let j be the corresponding bijection. We define the translation function as follows: a concept-name (or a primitive concept component) c is translated into xC (x), where C denotes the unary predicate symbol representing c (C = j (c)); similarily, a role-name (or a primitive role component) r is translated into xyR(x; y ), where R denotes the binary predicate symbol representing r (R = j (r)); object-names are translated into constants. We then define translation of arbitrary terms and DL-formulae: > ? :c def = def = def = x(True) (True is as special propositional letter) x(False) (False is a special propositional letter) x(:C (x)) 2.2 Theoretical Investigations c1 u c2 c1 t c2 8r:c def = def = def = n r:c def diff(y1 ; : : :; yn ) def = = n r:c def equ(y1 ; : : :; yn ) def r:o o1 ; :::; on _ >r ?r :r r1 u r2 r1 t r2 r r1:r2 c jr rjc v c2 r1 v r2 c1 o :: c = x(c1(x) ^ c2 (x)) x(c1(x) _ c2 (x)) x(8yr(x)(y) ! c(y)) x(9y1 : : :yn r(x)(y1) ^ c(y1) : : : r(x)(yn) ^ c(yn ) ^ diff(y1; : : : ; yn )) ^i6 j (:(yi = yj )) x(9y1 : : :yn 1 r(x)(y1) ^ c(y1) : : : r(x)(yn 1 ) ^ c(yn 1 ) ! equ(y1 ; : : :; yn 1 )) _i6 j (yi = yj ) x(r(x; o)) x(x = o1 _ ::: _ x = on) xy(True) xy(False) xy(:R(x)(y)) xy(r1 (x)(y) ^ r2 (x)(y)) xy(r1 (x)(y) _ r2 (x)(y)) xy(r(y; x)) xy(9zr1(x)(z) ^ r2(z)(y)) xy(r(x)(y) ^ c(x)) xy(r(x)(y) ^ c(y)) 8x(c1(x) ! c2(x)) 8x8y(r1(x)(y) ! r2(x)(y)) = + + = def = def = def = def = def = def = def = def = def = def = def = def = def = def = 9 + + = c(o) Note that, by beta-reduction, the lambda abstractions are eliminated from the translation of DL formulae. Thus DL formulae are translated into pure FOL formulae. There are basically two main reasoning components in a DL system: the classifier computes subsumption between terms, i.e., whether Γ j=DL t2 v t1; the recognizer computes whether an object is an instance of a concept, i.e., whether Γ j=DL o :: c. Since recognition is partly reducible to classification theoretical research focuses usually on the problem of subsumption. The first classifiers were specified as structural subsumption algorithms [Schmolze, Israel 83]. The basic idea underlying structural subsumption is to transform terms into canonical normal forms and then structurally comparing them. 2 DESCRIPTION LOGICS 10 Structural subsumption algorithms are therefore also referred to as normalizecompare algorithms. Let us take a closer look at these algorithms following the presentation in [Nebel 90]. The algorithm SUBSUMES has to decide whether a term t1 subsumes a term t2 with respect to a given terminology. A terminology is a list of definitions satisfying the following restrictions: 1. for each term-name there is at most one definition; 2. each term-name used in a definition is either primitive or has been defined in a preceding definition. The second condition ensures the non-cyclicity of terminologies.3 Now given two terms t1 and t2, and a terminology Γ a first normalization is obtained by replacing each term-name occurring in t1 and t2 by its definition until both terms contain only primitive components and quantified restrictions. Note that this is done recursively, so that also terms occurring in the restrictions do not contain any names. This normalization step is called abstraction from term introductions in [Nebel 90, p. 60]. Note that this normalization step performs the inheritance of information from terms to its subterms. In a second step normalization rules capturing the semantics of term-forming operators are applied. For example, all value-restrictions for the same role are unified to obtain a single value-restriction: 8r:c1 u 8r:c2 ! 7 N 8r:c1 u c2 Other examples for normalization rules include the computation of incoherence due to conflicting number-restrictions or the inheritance of restrictions to subroles and superroles according to the monotonic properties of the quantifiers (cf. [Quantz 92]): m r u n r ! 7N ? 8r1:c ! 7 N 8r2:c n r1 ! 7 N n r2 (if m > n) (if r2 v r1 ) (if r1 v r2 ) The application of these rules yields a canonical normalform for each term. In order to determine subsumption, these normalforms are structurally compared. Note that there is a general tradeoff between normalization and comparison: the more inferences are drawn in normalization, the less inferences have to be drawn in comparison, and vice versa. In BACK V5 the strategy is to determine for each 3 The problem of cyclic definitions is discussed in [Nebel 90, Ch. 5], [Baader 90], and [Dionne et al. 93]. 2.2 Theoretical Investigations 11 relevant role the most specific number and value-restriction in the normalization phase. Thus it can be guaranteed that in the comparison phase the restrictions have to be compared only locally. There is one severe drawback of normalize-compare algorithms—though it is in general straightforward to prove the correctness of such algorithms there is no method for proving their completeness. In fact, most normalize-compare algorithms are incomplete which is usually demonstrated by giving examples for subsumption relations which are not detected by the algorithm. At the end of the 1980’s tableaux methods, as known from FOL, cf. [Sundholm 83, p. 180ff], were applied to DL, e.g. [Donini et al. 91a, Donini et al. 91b]. The resulting subsumption algorithms had the advantage of providing an excellent basis for theoretical investigations. Not only was their correctness and completeness easy to prove, they also allowed a systematic study of the decidability and the tractability of different DL dialects. The main disadvantage of tableaux-based subsumption algorithms is that they are not constructive but rather employ refutation techniques. Thus in order to prove the subsumption c2 v c1 it is proven that the term c1 u : c2 is inconsistent, i.e. that o :: c1 u : c2 is not satisfiable. In most existing systems, on the other hand, inference rules are more seen as production rules, which are used to pre-compute part of the consequences of the initial information. This corresponds more closely to Natural Deduction or Sequent Calculi, two deduction systems also developed in the context of FOL. In [Royer, Quantz 92] we have shown how sequent rules for DL can be derived by rewriting the corresponding FOL proofs. We thereby obtained a set of inference rules which can be used as a basis for specifying normalize-compare algorithms, for proving their correctness and completeness, and to characterize the inferential behavior of (even incomplete) DL systems. In the following sections we will apply this framework to the expressive DL underlying BACK V5. To summarize these theoretical issues, we can say that DLs are characterized by a particular stance towards the essentials of KR-formalisms—in order to call something a KR formalism 1. it has to be a formal language in the sense that there is a formal specification of its syntax; 2. it has to have a formal semantics which defines an entailment relation on formulae; 3. there have to be (efficient) algorithms computing entailment between formulae. 2 DESCRIPTION LOGICS 12 2.3 Implemented Systems and Applications From the beginning on, research in DL was praxis-oriented in the sense that the development of DL systems and their use in applications was one of the primary interests. In the first half of the 1980’s several systems were developed that might be called in retrospection first-generation DL systems. In the second half of the 1980’s three systems were developed which are still in use, namely BACK, CLASSIC, and LOOM. The LOOM system [MacGregor 91] is being developed at USC/ISI and focuses on the integration of a variety of programming paradigms aiming at a general purpose knowledge representation system. CLASSIC [Brachman et al. 91] is an ongoing AT&T development. Favoring limited expressiveness for the central component it is attempted to keep the system compact and simple so that it potentially fits into a larger, more expressive system. The final goal is the development of a deductive, object-oriented database manager. BACK [Hoppe et al. 93] is intended to serve as the kernel representation system of AIMS (Advanced Information Management System), in which tools for semantic modeling, defining schemata, manipulating data, and querying, will be replaced by a single high-level description interface. To avoid a “tool-box-like” approach, all interaction with the information repository occurs through a uniform knowledge representation system, namely BACK, which thus acts as a mediating layer between the domain-oriented description level and the persistency level. The cited systems share the notion of DL knowledge representation as being the appropriate basis for expressive and efficient information systems [Patel-Schneider 87]. In contrast to the systems of the first generation, these second generation DL systems are full-fledged systems developed in long-term projects and used in various applications. The systems of the second generation take an explicit stance to the problem that subsumption determination is at least NP-hard or even undecidable for sufficiently expressive languages: CLASSIC offers a very restricted DL and almost complete inference algorithms, whereas LOOM provides a very expressive language but is incomplete in many respects. Recently, the KRIS system has been developed, which uses tableaux-based algorithms and provides complete algorithms for a very expressive DL [Baader et al. 92]. KRIS might thus be the first representative of a third generation of DL systems, though there are not yet enough experiences with realistic applications to judge the adequacy of this new approach.4 In order to get a better understanding of these systems let us take a look at the modeling scenario assumed for applications. An application in DL is basically a domain modeling, i.e. a list of definitions, rules, and descriptions (a set of DLformulae Γ). Consider the highly simplified domain modeling below, whose net representation is shown in Figure 2. One role and five concepts are defined, out of 4 The missing constructiveness of the refutation oriented tableaux algorithms (see above) leads to problems with respect to object recognition and retrieval. 2.3 Implemented Systems and Applications 1..in company 13 product produces high risk company conc_1 1.. in pro du ce s chemical product all chemical company chemoplant biological product ces produ toxiplant toxipharm biograin 1..1 produces Figure 2: The net representation of the sample domain. ‘conc 1’ is the concept 9produces:chemical product. which four are primitive (only necessary, but no sufficient conditions are given). Furthermore, the modeling contains one rule and four object descriptions. product chemical product biological product company produces chemical company 9produces:chemical product toxipharm biograin chemoplant toxiplant v > v product v product u : chemical product v 1 produces:product v: domain(company) = company u 8produces:chemical product ! high risk company :: :: :: :: chemical product biological product chemical company 1 produces u produces:toxipharm In DL, such a modeling is regarded as a set of formulae Γ. Given the formal semantics of a DL, such a set of formulae will entail other formulae, i.e., there is an entailment relation Γ j= . Now the service provided by DL systems is basically to answer queries whether some formula is entailed by a modeling Γ. The following list contains examples for the types of queries that can be answered 2 DESCRIPTION LOGICS 14 by a DL system like BACK: Γ j= t1 v t2 Is a term t1 more specific than a term t2, i.e., is t1 subsumed by t2? In the sample modeling, the concept ‘chemical company’ is subsumed by ‘high risk company’, i.e., every chemical company is a high risk company. Γ j= t1 u t2 v ? Are two terms t1 and t2 incompatible or disjoint? In the sample modeling, the concepts ‘chemical product’ and ‘biological product’ are disjoint, i.e., no object can be both a chemical and a biological product. Γ j= o :: c Is an object o an instance of concept c (object classification)? In the sample modeling, ‘toxiplant’ is recognized as a ‘chemical company’. Γ j= o1 :: r:o2 Are two objects o1,o2 related by a role r, i.e., is o2 a role-filler for r at o1 ? In the sample modeling, ‘toxipharm’ is a role-filler for the role ‘produces’ at ‘toxiplant’. Γ j= X :: c Which objects are instances of a concept c (retrieval)? In the sample modeling, ‘chemoplant’ and ‘toxiplant’ are retrieved as instances of the concept ‘high risk plant’. Γ[ fg j= ? Is a description inconsistent with the modeling (consistency check)? With respect to the sample modeling, the description chemoplant :: produces:biograin is inconsistent, i.e., ‘biograin’ cannot be produced by ‘chemoplant’. This very general scenario can be refined by considering generic application tasks such as information retrieval, diagnosis, or configuration. 2.4 Extending Description Logics Research in DL was originally concerned with the set of epistemological primitives presented in [Brachman, Schmolze 85], but the interest in extending DL to integrate results from other fields of AI increased considerably in the last years. The integration of rule-based reasoning into DL was suggested very early in [Owsnicki-Klewe 88]. It turned out, however, that the so-called implication-links or rules which have been implemented in BACK, CLASSIC, and LOOM, differ from the rules of rule-based system with respect to their logical, monotonic character 15 and thus function more as constraints then as production rules [Schild 89]. As a consequence, no conflict resolution strategies have to be devised. Thus the integration of rules kept very close to the original paradigm of DL. The epistemological primitives of KL-ONE were meant to be ontologically neutral, i.e., it should be possible to use them for the definition of concepts belonging to arbitrary ontological categories. It became quickly obvious, however, that certain ontological areas need additional term-forming operators which specifically reflect the ontological structure of these areas. Schmiedel proposed an integration of DL, Shoham’s temporal logic, and Allen’s interval calculus to support the modeling of temporal knowledge in a DL system [Schmiedel 90]. Schmiedel’s ideas were taken up by Schild, who developed a restricted tense-logical extension of DL, which constituted an optimal tradeoff between expressiveness and computational complexity [Schild 91]. An integration of this tense-logical extension into the BACK system is described in [Fischer 92]. Another topic of discussion concerned the integration of defeasible knowledge into DL. In the traditional framework of DL all information is regarded as strict. This is obviously a restriction much too strong for most domain: most of our knowledge is expressable only as rules that allow for exceptions or as rules with a certain degree of reliability. In order to capture this kind of information the integration of probabilistic rules [Heinsohn, Owsnicki-Klewe 88, Heinsohn 91] and of defaults [Baader, Hollunder 92, Quantz, Royer 92, Baader, Hollunder 93, Quantz, Ryan 93] was suggested. Other envisaged extensions of DL include the integration of generalized quantifiers [Quantz 92], of part-whole relations and collective entities in general [Franconi 92], of epistemic operators [Donini et al. 92], and of test/compute functions [Kortüm 93]. In this report we will contend ourselves with an axiomatization of the DL presented on page 7. Our method can in principle be applied to all extensions which are translatable into First-Order Logic. 3 Inference Rules and Sequent Calculus 3.1 Motivating Axiomatic Characterizations In the AIMS project that underlies the development of the BACK system, typical application scenarios involve first modeling the domain knowledge by terminological definitions. In a second step, the concepts and roles defined in the terminology are used to enter descriptions of domain objects and to retrieve objects matching given descriptions. Given such a framework, it is advantageous to precompute information that is implicitly given in order to speed up the query-answering in the retrieval phase. Thus in the current BACK implementation (cf. [Hoppe et al. 93] 16 3 INFERENCE RULES AND SEQUENT CALCULUS ) the subsumption relations between all concepts and roles of the terminology are computed and stored, as well as the most specific description for each object. This way, most queries can be answered by simple table-look-ups, and only in some cases reasoning is necessary to answer a query (see [Kindermann 90] for details). Inference systems provide a syntactic characterization for precomputing implicitly given information. They allow the presentation and the derivation of information in a constructive and modular way. So inference systems have been heavily used not only for logical Proof Theory but also in Software Engineering (specification methods are most often based on inference rules [Jones 90]). Similar motivations also inspire the tradition of least fixed point semantics in Deductive Databases. The idea is to provide an axiomatic semantics by defining the closure of the extensional part of the database under an operator (immediate consequence operator) which formalizes the execution in forward chaining of the database intensional rules, seen as production or inference rules [Kowalski, van Emden 76, Apt et al. 86]. More recently, Borgida also promoted the idea of an axiomatic definition of DL by analogy with the type systems of programming languages [Borgida 92]. He shows how to define DL in terms of Natural Deduction rules. However, his approach goes only part of the way—no effort is made in the paper to prove the completeness of the inference system wrt the classical denotational semantics of DL. In a quite different context, namely consistency checking in knowledge validation, Hors and Rousset stress the need for complete axiomatizations of DL [Hors, Rousset 93]. Finally, papers by Dionne et al., for example [Dionne et al. 93], inspired by the theory of programming languages, develop algebraic semantics for simple DL (no negation, no number restriction). Though not an explicit axiomatization, the approach also emphasizes the idea of “computable” semantics, i.e. semantics which can be interpreted as specifications of subsumption algorithms. In summary, we briefly list some of the advantages of defining axiomatic semantics for DL: Modularity: This is one classical advantage of inference systems, such as Natural Deduction or Sequent Calculi, which obey the principle of axiomatizing each language constructor by one specific set of rules. This is particularly interesting in the view of an incremental development of knowledge representation languages. Deductive Capacity: This is in the spirit of a constructive, generative approach to knowledge base systems, where part of the consequences of the initial knowledge is pre-computed by means of inference rules seen as production rules. This essentially contrasts with the approach of Tableaux Methods 3.2 Methodology for Deriving Complete Inference Systems 17 [Hollunder, Nutt 90, Donini et al. 91a], which exploit refutation techniques (reducing subsumption provability to unsatisfiability). These methods are appropriate for proof-checking, i.e. verifying at query-time that some formula is entailed by some others. They are not cut out for deriving relevant consequences at assert-time. Guidelines for Implementation: We also think that implementations can benefit from axiomatic semantics of DL. It can help to derive so-called NormalizeCompare algorithms [Nebel 90]. Implementations based on NormalizeCompare algorithms are in general ad-hoc and lack a methodology for defining a right notion of “normal forms”. An axiomatic semantics can help to choose an appropriate notion of normal forms. Intuitively “normal forms” are most likely to be produced by the inference rules deriving formulae of the form c1 u c2 v c3 . This corresponds to some kind of “vivification” of the knowledge base [Etherington et al. 89]. Then the “compare” part of the algorithm can be computed by using the “introduction” rules of the form c1 v c2* q(c1 ) v q(c2), where q denotes some role restriction quantifier (see [Royer, Quantz 92] for more details). Characterization of Implemented Systems: In order to guarantee efficient performance, implemented algorithms are often incomplete. At least the degree of incompleteness should be indicated by specifying which inference rules are applied by the algorithms and which are not. Furthermore, it can be indicated for each rule whether it is applied at assert-time or at query-time. Finally, the inference rules can serve as a basis for flexible implementations in which the inference process can be guided from the outside. We see this as one of the major research issues in DL in the near future. 3.2 Methodology for Deriving Complete Inference Systems Motivating the Use of Sequent Calculi We present briefly the main characteristics of Gentzen’s Sequent Calculi. For complete and excellent presentations the reader is referred to [Sundholm 83, Gallier 86, Girard et al. 89] . A sequent is a meta-formula Γ ) ∆, where both the “antecedent” Γ and the “succedent” ∆ are sets of first-order formulae. Intuitively, the sequent Γ ) ∆ is meant to encode the entailment relation j=L Γ^ ! ∆_ , where Γ^ is the conjunction of the formulae of Γ and ∆_ is the disjunction of the formulae of ∆ . Formally, the notion of (classical) satisfaction for the sequent Γ ) ∆ is defined as the satisfaction in First-Order Logic of the formula Γ^ ! ∆_ . Γ ) ∆ is said valid iff every first-order structure satisfies the formula Γ^ ! ∆_ ; it is called falsifiable otherwise. As usual, these notions can be generalized to obtain 18 3 INFERENCE RULES AND SEQUENT CALCULUS satisfiability and falsifiability wrt a given set of assumption (proper axioms). If Σ is a set of sequents and is an individual sequent, then is said valid wrt Σ iff every first-order structure satisfying all the sequents of Σ also satisfies . Sequent Calculi are deduction systems (systems of inference rules) aiming at axiomatizing the above notion of validity. Their main interest lies in a systematic and principled approach to Proof Theory. First, the proof process in Sequent Calculi is seen as a morphism of the set of formulae into the set of proofs. In classical first-order Sequent Calculi this gives rise to the Subformula Property— one can restrict to proofs built only with subformulae of either axiom sequents or the initial sequent to be proved. Due to this property, the proofs can be searched in a closed universe of formulae known in advance. Furthermore, there is a systematic search procedure for proofs. It consists in simplifying the sequents by eliminating successively the top-most connectors and quantifiers of the formulae appearing in the sequents, until axiom schemata or assumptions are reached. The strategic aspects concern the choices of the subformulae on which the connector elimination will be performed and in what ordering. The connector elimination is made possible just because the Sequent Calculi axiomatize them individually (as opposed to the Hilbert-style calculi). For each connector two specific rules are provided, the so-called left and right rules, respectively giving necessary and sufficient provability conditions when the formula containing the given connector appears as antecedent or succedent. All these rules can be applied either as elimination rules (backwards from the conclusion to the assumptions) or as introduction rules (forwards from the assumptions to the conclusion) of the corresponding connectors. In Section 4.2 we will show how a sequent proof proceeds. Note that these remarkable properties of Sequent Calculi have been already recognized as extremely useful in the domain of Software Engineering. Sequent Calculi or Natural Deduction systems (which are intuitionistic Sequent Calculi) are widely used for the specification of programming languages, program verification, and type checking [Paulson 87]; there the proofs are interpreted as correct constructions of formulae from an initial set of axioms. Here, we want to promote the same kind of approach for knowledge representation languages. How to Guarantee Completeness? The idea is to rely on sound and complete Sequent Calculi axiomatizations of FirstOrder Logic without (FOL) or with Equality (FOL= ) [Sundholm 83, Gallier 86]. We use SC to refer to some sound and complete Sequent Calculus for FOL. A general methodology for obtaining sound and complete inference systems for any logical language L is to translate the formulae of L (L-formulae) into first-order formulae (provided L is translatable into FOL), and then to identify necessary and sufficient conditions of provability in SC of the FOL translations 3.3 Technicalities on Sequent Calculi 19 from the formulae encoding L-formulae [Girard et al. 89]. More precisely, let (L,j=L ) be some logical language L together with its entailment relation j=L. Let us also suppose that L is translatable into FOL,5 i.e. there exists a first-order language FL and a translation function 7! from L to FL such that: Γ j=L , Γ j=FL Given some translation = , and some proof tree T( ) of in SC, let us assume that T can be rewritten into a tree T’, whose root is still but whose nodes are all formulae encoding L-formulae (formulae of the form f for some L-formula f). Then, up to decoding, the resulting tree T’ is a proof tree of in an inference system constituted of all the inference rules encoding the elementary construction steps of T’. If this rewriting process succeeds systematically, i.e. for all formulae of L and one proof tree for each of them, then the collection of all inference rules, used in all the rewritten trees T, is a complete set of inference rules for L. This key idea is exploited methodically for deriving complete inference systems for subsumption in DL. Technically, the task is to rewrite systematically SC proofs of (the translation of) subsumption formulae into proofs containing only sequents encoding terminological formulae. In the following sections we show how to apply the method on classical language constructs. Depending on the complexity of the first-order fragment needed to encode terminological formulae, different Sequent Calculi will be used. We first present the derivation method for language constructs translatable into First-Order Logic without Negation and Equality. Then we show how to proceed with constructs involving Negation or Equality. Remarks: In [Cas91] a translation of DL in the sequent formalism was already used, but in a quite different perspective. Linear Sequent Calculus6 was used to formalize a “tractable” notion of subsumption, i.e. a more “intuitionistic” notion of subsumption relying on Linear Logic rather than classical First-Order Logic. 3.3 Technicalities on Sequent Calculi Figure 3 shows the particular Sequent Calculus SC on which this paper is based. It is sound and complete for FOL, as shown in [Gallier 86]. A Sequent Calculus for FOL= , SC= , is obtained from SC by adding the equality axioms for identity, substitution, and functional substitution: `SC 5 Γ)a=a This condition is fulfilled by every DL we know. They all admit natural translations into first-order languages. 6 A sequent calculus for Linear Logic [Girard 87]. 3 INFERENCE RULES AND SEQUENT CALCULUS 20 Operator left-rule Weakening Γ ∆ Γ; ∆ Contraction Γ;; ∆ Γ; ∆ right-rule ) ) ) ) Γ ∆ Γ ∆; ) ) );;∆ );∆ Γ Γ Axiom/Cut-Rule Γ; ) ∆; _ Γ; ∆ ; Γ; ∆ Γ; ∆ ^ Γ;; ∆ Γ; ∆ ! Γ; ∆ ; Γ ;∆ Γ; ∆ : Γ; ∆ Γ ∆; 8 Γ; 9 Γ;A(a) ∆ Γ; xA(x) ∆ ) _ ) ) ) ) ) _ )∆; ;Γ)∆; Γ)∆;^ Γ ) ! ) ) ) ! Γ; ∆; Γ ∆; ) ) : )∆; :)∆ Γ Γ; 8xA(x);A(t))∆ Γ;8xA(x))∆ 9 ) Γ ∆;; Γ ∆; ) ^ ) ) ) Γ1 ; ∆1 ; Γ2 ∆2 ; Γ1 ;Γ2 ∆1 ;∆2 ) ) ) ) 8 Γ ∆;A(a) Γ ∆; xA(x) Γ)∆;9xA(x) )∆;A(t);9xA(x) Γ Figure 3: The Sequent Calculus SC. “a” stands for a parameter (called “eigenparameter” or “eigen-variable”) which does not appear in the lower sequent; “t” stands for a term appearing in the lower sequent (we thus consider pure proofs [Gallier 86]). `SC Γ; s1 = t1; :::; sn = tn; P (s1; :::; sn) ) P (t1; :::; tn) `SC s1 = t1; :::; sn = tn ) f (s1; :::; sn) = f (t1; :::; tn) In this paper we will also use SCNNF , a sequent calculus for formulae in Negation Normal Form (NNF).7 SCNNF is obtained from SC by eliminating the negation rules and replacing the logical axiom schema Γ; ) ∆; by the following four schemata: ) ∆; Γ; ; : ) ∆ Γ; Γ; : Γ ) ∆; : ) ∆; ; : Two essential properties of SC are of strategic importance in our axiomatization work: the Subformula Property, stating that the Cut Rule can be eliminated unless 7 A formula is in NNF iff the negation symbols appear only in front of atomic subformulae. 21 it is applied to initial assumptions, and the Normalization Property, which allows the restriction to “normal” proofs where the quantification rules are applied before the propositional rules. This latter property requires some syntactic conditions, for example that the sequents are in NNF.8 Proposition 1 Cut Elimination Theorem [Girard et al. 89] Let S be a set of sequents (proper axioms) and s an individual sequent. S `SC s iff there is a proof in SCof s whose leaves are either logical axioms or (instances of) proper axioms of S, and where the Cut Rule is only applied with one premise being a proper axiom. Proposition 2 Normalization Property [Gallier 86] Any NNF sequent provable in SCNNF from some set of assumptions ∆ has a normal proof, i.e. a proof consisting, top-down from the root to the leaves, of: first-order steps involving applications of the quantification rules or the structural rules, except from Weakening, propositional steps, Cut-Rule applications with one proper axiom of ∆ and one sequent whose complexity (in terms of height of a normal proof) is less than the root sequent. 4 Concept Subsumption without Equality We will split our investigation of concept subsumption into three parts. We start with a fragment which can be translated into pure First-Order Logic, i.e. without using equality axioms. In the next section we will then investigate concept forming operators whose translation involves equality. Both sections deal with DL fragments in which only primitive roles are allowed. After having discussed role subsumption in Section 6, we will briefly address the impact of complex role terms on concept subsumption (Section 7.1). In this section we will thus study the following fragment: ! > ; ? ; cn ; : c ; c1 u c2 ; c1 t c2 8r:c ; 9r:c ; :9r:c r ! rn ; r1 u r2 ! c1 v c2 ; r1 v r2 c 8 One other condition is that the sequents contain only prenex formulae, which is not the case for the sequent translations of terminological formulae. The NNF condition will be true for terminological languages without negations or negation restricted to primitive concepts. 22 4 CONCEPT SUBSUMPTION WITHOUT EQUALITY anything > and c1 u c2 or c1 t c2 not :c nothing all some no ? 8r:c 9r:c :9r:c Figure 4: Concrete names for the term-forming operators of TL. Note that this DL fragment can be translated into pure First-Order Logic, i.e. without using equality axioms. In addition to the abstract syntax used for DL we will also use names to refer to the various term-forming operators. The correspondence between these names and the concrete syntax is shown in Figure 4 for the fragment under consideration in this section. Thus we will call terms of the form 8r:c all terms, for example. In this section we will restrict our attention to inference rules relevant for determining concept subsumption, i.e. for deriving formulae c1 v c2 . We start by considering concept conjunction and disjunction (Section 4.1), then take into account the quantifiers all and some(Section 4.2), and finally investigate negation and no(Section 4.3). 4.1 Conjunction and Disjunction The translation of a subsumption formula c1 v c2 results in the following equivalent sequents: ; ) 8(x)c1(x) ! c2(x) ; ) c1(a) ! c2(a) c1(a) ) c2 (a) by definition 8 right ! right Note that the elimination of the right universal quantifier introduces a new parameter “a”, called an eigen-variable. Generally, the rules 9-left and 8-right, introducing new eigen-variables, contribute the so-called proof lexique, i.e. the set of parameters used for further instantiations via the 9-right and 8-left rules. To simplify the notation, we will usually omit the translation function. Typically, we will simply write :::; c1 (a) ) c2 (a) instead of :::; c1 (a) ) c2 (a). The arrow * will be used for terminological inference rules. The correct syntax is: Prem * Con, where Prem represents the list of premises (separated simply by commas, to be taken conjunctively) and Con the conclusion of the rule. The symbol Prem * ) Con is the abbreviation for Prem *Con and Con * Prem (meaning that the rule is reversible). For the propositional fragment of the terminological language TL without negation, the subsumption formulae are trivially isomorphic to the propositional 4.2 Quantification 23 fragment of SC without its two negation rules. No significant rewriting is necessary here. The following complete set of rules is immediately obtained, for concept subsumption.9 From the axiom group of SC we get the logical axiom (2); the Weakening rules give (3 and (4); from the ^-right rule and _-left rule we obtain the conjunction (5) and disjunction (6) rules respectively; the Cut-Rule of SC gives the Cumulative Transitivity (7): c1 c1 c1 v c2; c1 c2 v c1 ; c3 c1 v c2 ; c2 u c3 v v v v v c2 c2 c3 c1 c4 * cv c * c1 u c2 v c1 t c3 * c1 u c3 v c2 * c1 v c2 t c3 * ) c1 v c2 u c3 * ) c2 t c3 v c1 * c1 u c3 v c4 * ?v c * cv > (1) (2) (3) (4) (5) (6) (7) (8) (9) Note that we have assumed implicitly that c u c = c and c t c = c. So we can omit the explicit Contraction rules of SC.10 Consequently, the axiom *c v c is implied by (2). Similarly, simple transitivity c1 v c2 , c2 v c3 * c1 v c3 is just a special case of (7), i.e. Cumulative Transitivity. The following equivalences can also be derived, using Cut rules and the axioms for ? and > for the left to right direction, and simple weakenings for the converse direction: c1 c1 v v c2 c2 * ) * ) c1 u > v c2 c1 v c2 t ? 4.2 Quantification We now consider the quantified part of the language TL without negation, i.e. formulae containing all and some. They are translated into sequents with quantifiers. The derivation of inferences rules for these constructs will require more rewriting efforts. The general idea is to use classical proof strategy called “lifting”—any first-order proof can be obtained by “lifting” a propositional proof, i.e. by adding quantification steps on top of it. In SCNNF , the formal justification of lifting is given by the Normalization Property (cf. Section 3.3). We ignore negation in the beginning since this guarantees trivially that all formulae are in NNF. 9 Note that we do not specify the rules for commutativity and associativity of conjunction and disjunction. 10 The sequents are seen as sets of formulae rather than lists. 4 CONCEPT SUBSUMPTION WITHOUT EQUALITY 24 (10) (9) (8) (7) (6) (5) (4) (3) (2) (1) `SC c1(b) ) c2(b) `SC r1(a; b) ) r2(a; b) `SC r1(a; b); c1(b) ) c2(b) `SC r1(a; b); c1(b) ) r2(a; b) `SC r1(a; b); c1(b) ) r2(a; b) ^ c2(b) `SC r1(a; b); c1(b) ) r2(a; b) ^ c2(b); 9r2:c2(a) `SC r1(a; b); c1(b) ) 9r2:c2(a) `SC 9r1:c1(a) ) 9r2:c2(a) `SC ) 9r1:c1(a) ! 9r2:c2(a) `SC ) 8x9r1:c1(x) ! 9r2:c2(x)) `TL 9r1:c1 v 9r2:c2 Figure 5: SC assumption c1 v c2 assumption r1 v r2 left-Weakening left-Weakening ^-right right-Weakening 9-right 9-left !-right 8-right decoding derivation of 9r1 :c1 v 9r2 :c2 . Finally, we will use one more technicality, purely specific to the terminological context. Indeed, as there is no way in terminological theories to express mutual propositional interactions between roles and concepts, one can separate the proofs of role terms and concept terms in the propositional fragment. Lemma 1 (Separation Lemma) Let be a propositional sequent of the form r; c ) c; r where c, c are formulae corresponding to the translations of concept terms different from ? and > and r , r are formulae corresponding to the translations of role terms. Let ∆ be a set of sequents representing terminological formulae (assumptions). Then ∆ `SC iff ∆ `SC c ) c or ∆ `SC r ) r . Example of Derivations In Figure 5, we show the derivation of the inference rule corresponding to the monotonicity property of some: c1 v c2; r1 v r2 * 9r1 :c1 v 9r2 :c2 It is important to note that the derivation trees may be searched either top-down or bottom-up. They are obtained by a systematic (sometimes long) case analysis about the possible ways of reducing the (first-order) conclusion sequent to propositional ones (corresponding to admissible axioms in the terminological setting). Let us give the intuition of the process. We are searching for necessary and sufficient conditions for formulae of the form 9r1 :c1 v 9r2 :c2 . The corresponding sequent is (1) in Figure 5. The only SC rule applicable to (1) is the 8-right rule, 4.2 Quantification 25 giving the equivalent sequent (2). Then, the only rule applicable to (2) is !-right. This gives the equivalent sequent (3) of the form: 9yr1(a; y) ^ c1(y) ) 9zr2(a; z) ^ c2(z) At this step, two rules are applicable to (3): either 9-left for eliminating 9y or 9-right for eliminating 9z. Let us examine the second choice. By 9-right, the variable z can only be substituted by a parameter t already appearing in the current sequent (in the current “proof lexique”), i.e. by a, y or z ; then the succedent of (3) becomes r2(a; t) ^ c2 (t). The ^-rule gives two sequents to prove, one being 9y(r1(a; y) ^ c1(y)) ) r2(a; t); 9z(r2(a; z) ^ c2(z)) Now the only rule applicable is 9-left, eliminating y with a new eigen-variable b. We end up with the sequent: r1 (a; b); c1(b) ) r2 (a; t); 9z (r2 (a; z ) ^ c2(z )) where t = a, y or z . One can show that this sequent is unprovable propositionally, unless c1 v ?. Indeed, trying to prove the propositional subsequent r1 (a; b); c1 (b) ) r2 (a; t) is only possible, due to the Separation Lemma, by proving one of the following sequents ) ; r1 (a; b) ) r2 (a; t) c1 (b) The first sequent is provable by the assumption c1 v ?. The latter sequent can only be proved using assumptions about roles (no insconsistent role is allowed in TL). But all role assumptions in TL give sequents of the form r1 (x; y ) ) r2 (x; y ), i.e. with the same first and second argument.11 This shows that the sequent is only provable independently of the particular instance r2(a; t) ^ c2(t). This leads back to the initial choice step for (3). Applying systematically the second choice for quantifier elimination leads to an infinite loop and no proof. This dead-end illustrates a wrong strategy in Sequent Calculi—the use of quantifier elimination rules which do not create parameters before rules contributing to the creation of the proof lexique. Going back to the first choice, the 9-left rule eliminates y by replacing it by a new parameter b. We get the sequent (4). This gives a new substitution possibility 11 This would be different with more complex role operators like composition or inversion. 26 4 CONCEPT SUBSUMPTION WITHOUT EQUALITY for z , z := b, giving (5). The lifting strategy corresponds to the passage from (5) to (6): reducing the provability of the first-order sequent (5) to the provability of the propositional sequent (6). (7) and (8) result from (6) by the ^-right rule. Then the Separation Lemma gives the sequents (9) and (10), each one provable by correct terminological assumptions. In summary, the case analysis gives the following necessary and sufficient conditions: 9r1 :c1 v 9r2 :c2 is provable iff either (c1 v c2 and r1 v r2) or c1 v ? are provable. Complete Characterization of TL (First-Order Fragment) Considering all possible ways of introducing quantifiers into propositional sequents given by axioms of the form c1 v c2 , c1 u c2 v c3 , c3 v c1 t c2 or c3 u c4 v c1 t c2, in order to recover quantified subsumption formulae, yields the following complete characterization of first-order terminological entailment in TL1 (non-propositional rules only): >v c cv ? c1 v c2; r2 v r1 c1 v c2; r1 v r2 c2 u c1 v ?; r1 v r2 > v c2 t c1; r1 v r2 c1 u c2 v c3 ; r3 v r1; r3 v r2 c3 v c1 t c2 ; r3 v r1; r3 v r2 c1 u c2 v c3 ; r2 v r1; r2 v r3 c3 v c1 t c2 ; r2 v r1; r2 v r3 * ) * ) * * * * * * * * > v 8r:c 9r:c v ? 8r1:c1 v 8r2:c2 9r1:c1 v 9r2:c2 8 r2:c2 u 9 r1:c1 v ? > v 9r2:c2 t 8r1:c1 8r1:c1 u 8r2:c2 v 8r3:c3 9r3:c3 v 9r1:c1 t 9r2:c2 8r1:c1 u 9r2:c2 v 9r3:c3 8r3:c3 v 9r1:c1 t 8r2:c2 (10) (11) (12) (13) (14) (15) (16) (17) (18) (19) Let us say a word about the complexity and effectiveness of the method. In SC, it is possible to create infinite proof lexiques, by arbitrary long quantifier elimination chains. This is typically the case with sequents of the form 8x9yP (x; y ); ) . Every substitution of 8x, (by 8-left) can be followed by an elimination of the 9y, which creates a new eigen-parameter (by 9-left). The process can be repeated infinitely, by substituting again the initial 8x with the new parameter. This situation is also possible with our terminological sequents, for example with formulae like 8r1:(9r2:c) . Here, the axiomatization work is effective, because one can foresee the size of the proof lexique needed to prove a given subsumption formula. The key point is that quantification in terminological formulae arises only through role restriction, thus non-quantified concept terms always come with chains of role terms. One can then prove that the number of quantifier eliminations needed 4.3 Negation 27 for proving a given formula is bounded by the maximal length of role restriction chains. Here, in absence of role composition (or constructs able to “shrink” or modify the role restriction chains), it is enough to eliminate quantifiers uniformly in the subformulae participating in the proof. This explains why the inference rules in TL lift uniformly one quantifier at a time. For role composition, which can shrink role chains, e.g. r1 (a,b) ^ r2 (b,c) ! r1 .r2 (a,c), non-uniform lifting becomes possible, however: c1 v c2 * 8r1:8r2:c1 v 8r1.r2:c2 4.3 Negation We will now consider the effect of including negation into the DL fragment on the derivation process. There are three possibilities to integrate negation into DL: 1. negation restricted to atomic concepts, 2. implicit negation, 3. full negation. Negation Restricted to Primitive Concepts For tractability reasons, an explicit negation constructor, whose translation is given def by :c = x:c(x),12 is often restricted to primitive concepts (atomic concept terms) only. Adding “primitive negation” does not change neither the preceding approach nor the results. The derivation method, as well as its formal justification in the sequent formalism, still works for exactly the same reasons as before (the translations into sequents will be in NNF). Essentially, the only inference rules to be added correspond to the additional logical axiom schemata of SCNNF . * cu:cv ? * >v ct:c (20) (21) Then, for example, the contraposition rule c1 v c2 * : c2 v : c1 can be proved from the assumption c1 v c2 by cutting successively with the logical axioms c2 u : c2 v ? and > v c1 t : c1 . Note that we thus use the symbol ‘:’ both for the negation of DL terms and for the negation of formulae. 12 FOL 4 CONCEPT SUBSUMPTION WITHOUT EQUALITY 28 Implicit Negations If the fragment does not contain full negation, but implicit negation due to operators like no, the sequent translations are no more guaranteed to be in in NNF. As the Normalization Property holds no more, the arguments made above fail—the lifting process is not necessarilyy complete. The difficulty is overcome by exploiting the : terminological equivalence :9r:c = 8r:: c and by axiomatizing no indirectly, by the set of rules for all. The method for obtaining a complete axiomatization for no is to take a complete set of inference rules for all, to replace uniformly c by : c in every inference rule, and to rewrite them without explicit negations.13 Technically, the rewriting process is also achieved in the sequent formalism, using the negation rules of SC, i.e. once again up to the translation of terminological formulae into sequents. For example, let us consider the following rule (for the sake of simplicity, the restrictions are for the same role ): c1 u c2 v c3 * 8r:c1 u 8r:c2 v 8r:c3 and replace 8r:c1 by :9r:c1. Substituting : c1 for c1 gives the rule : c1 u c2 v c3 * :9r:c1 u 8r:c2 v 8r:c3 Eliminating negation is done by the negation rules of SC (on the sequent translation), giving the new terminological rule: c2 v c t c1 * :9r:c1 u 8r:c2 v 8r:c This kind of rewriting will produce the three next rules from (16), i.e. the additivity rule of all. c2 v c3 t c1 ; r3 c3 v c2 t c1 ; r3 c1 u c3 v c2 ; r3 v r1 ; r3 v v r1 ; r3 v v r1 ; r3 v r2 r2 r2 * :9r1:c1 u 8r2 :c2 v 8r3 :c3 * :9r1:c1 u :9r2:c2 v :9r3 :c3 * 8r1:c1 u :9r2 :c2 v :9r3 :c3 The systematic rewriting ends up in a complete axiomatization of no consisting of 11 rules. The large number of rules is due to the lack of explicit negation. All the De Morgan rules and the equivalences between no, all, and some need to be encoded implicitly in the rules. Full Negation If full negation is allowed, tractability may become problematic, but axiomatization is far simpler! But, formally, one can no more rely on SCNNF (the arguments 13 Note that this approach does not work for languages containing full negation. 4.3 Negation 29 exploiting the Normalization Property are false outside SCNNF ). As usual, the difficulty is overcome by showing that the language with full negation is equivalent to the language with negation restricted to atomic terms. The trick is to give a complete set of inference rules for transforming formulae with arbitrary negations into formulae in Negation Normal Form. First, the propositional fragment of TL is extended by the negation rules from SC: c1 u c2 v c3 c1 v c3 t c2 * ) * ) c1 v c3 t : c2 c1 u : c2 v c3 (22) (23) From these new rules, together with the rules of TL1 one obtains easily (propositionally) the classical De Morgan rules and the duality rules between all and some: * * * * * :: c =: c :(c1 u c2) =: : c1 t : c2 :(c1 t c2) =: : c1 u : c2 :9r:c =: 8r:: c :8r:c =: 9r:: c (24) (25) (26) (27) (28) These five rules are exactly what is needed to put arbitrary terminological terms into NNF, i.e. terms having negations only in front of primitive (atomic) concept terms. Using them as conversion rules (in the left to right direction), one gets a decidable procedure for converting arbitrary terminological terms into NNF (obviously the conversion preserves the logical semantics).14 However, the five conversion rules above cannot be directly taken as an inference system for transforming subsumption formulae into formulae in NNF. It is further necessary to : turn every conversion rule for terms, c1 =c2 , into a left-rule, c3 v c1 t c4 * ) c3 v c2 t c4, and a right-rule, c1 u c3 v c4 * c u c v c . Then the resulting set ) 2 3 4 of rules yields an inference system, `NNF , for transforming arbitrary formulae into NNF. Finally, a complete axiomatization for a DL containing full negation is obtained by adding the rules of `NNF to any complete axiomatization of the language without negation. In Figure 6 we list the inference rules for concept subsumption in the language investigated in this section. 14 The expression “Negation Normal Form” is here used in a generic sense, for the sake of simplicity. Strictly speaking, NNF for sequents, NNF for terminological terms, or NNF for subsumption formulae are three different notions, applying to different syntactic entities. 4 CONCEPT SUBSUMPTION WITHOUT EQUALITY 30 c c > (1) (9) ? c1 u c2 c1 t c2 (5) (4) (22) > ? (8) c1 u c2 (3) (7) (23) c1 t c2 (6) :c (24) (14) (20) (24) (21) (15) (10) (2) (26) (16) (18) (25) (26) 8r:c 9rc : c 8r:c 9r:c (11) (25) (27) (28) (19) (27) (12) (17) (28) (13) Figure 6: Inference rules for concept subsumption. The operator in the rows is the outmost operator of the subsumed concept term, whereas the operator in the columns is the outmost operator of the subsuming concept term. 31 n r:c n r:c atleast atmost fills oneof R:S S_ Figure 7: Names of the additional concept-forming operators in TL= 5 Concept Subsumption with Equality In this section we derive inference rules for a DL fragment containing operators which cannot be translated into pure FOL but require a First-Order Logic with Equality. We call this fragment TL= :15 ! > ; ? ; cn ; : c ; c1 u c2 ; c1 t c2 ; 8r:c ; n r:c ; n r:c ; r:fo1; :::; on g ; fo1; :::; on g_ r ! rn ; r1 u r2 ! c1 v c2 ; r1 v r2 c The names of the additional concept-forming operators are shown in Figure 4.3. Note that the quantifiers some and no investigated in the previous section are just special cases of atleast and atmost. We can define them as follows: 9r:c :9r : c def = def = 1 r:c 0 r:c Consequently, we will not consider some and no terms in our derivations, but restrict ourselves to the quantifiers all, atleast, and atmost. All the provability conditions are necessarily to be found by following a standard procedure: 1. Creation of a finite proof lexique by eliminating left-existentials and rightuniversals (see Section 5.1). 2. Putting all possible, finitely many instantiation cases in the sequent by eliminating right-existentials and left-universals systematically wrt the proof lexique (see Section 5.1). 3. Introduction of finitely many equality assumptions (see Section 5.2). 4. Decidable provability test for the resulting propositional sub-sequents (see Sections 5.3 and 5.4). 15 Note that the n in n r:c must be greater than 0. 5 CONCEPT SUBSUMPTION WITH EQUALITY 32 Creative Instantiation atleast-left atleast-right atmost-right atmost-left all-right all-left Figure 8: Contribution of operators to the proof lexique. The first three steps can thus be seen as preparations for the complex case analysis performed in the fourth step. They allow to restrict the case analysis to propositional subsequents. 5.1 Elimination of Quantifiers and Creation of the Proof Lexique We begin with some remarks concerning the terminology we will use in the following. We call terms occurring in the subsumed term of a subsumption formula left terms and terms occurring in the subsuming term right terms. Thus, in the sequent translations left terms occur in the antecedent and right terms in the succedent of a sequent. In analogy to the standard FOL terminology, a concept term is in prenex form iff it is of the form q1:q2::::qn(c), where c is a propositional concept term, and qi denotes arbitrary role or numerical restriction operators. Then the integer n is called the quantification degree of the term. The quantification degree counts the number of role restrictions in a given prenex term, not the total number of FOL quantifiers necessary to the FOL translation. For non-prenex concept terms, the notion of quantification degree is defined as the maximal length of role restriction chains. Formally, it is defined by the following conditions: degree(c) = 0 if c is a propositional concept term; degree(q.r.(c1 c2 )) = 1 + max(degree(c1),degree(c2 )), where q.r... stands for any role restriction operator and (: :) for any boolean operator. Finally, we distinguish creation rules and instantiation rules in the process of quantifier elimination. We call the SC rules 8-right and 9-left creation rules because they indroduce new parameters in the sequents, the so-called eigen-parameters. Similarly we call the SC rules 8-left and 9-right instantiation rules because they do not create new eigen-parameters, but instead use the parameters of the current proof lexique in order to instantiate the variables of the quantified expressions (left universals and right existentials). 5.1 Elimination of Quantifiers and Creation of the Proof Lexique 33 For eliminating quantifiers in the numerical restrictions atmost or atleast several applications of quantification rules of the same type are needed. Typically, n successive creation (resp. instantiation) rules are needed to eliminate quantification in a left n r:c (resp. a left term n 1 r:c). To simplify our presentation we will often refer to such a sequence of creation (or instantiation) rules as if it were a single creation (or instantiation) rule. Figure 8 show how the concept-forming operators investigated in the following contribute to the proof lexique. On Substitutions We recall that the substitution axioms for the calculus SC= NNF are obtained from the following classical substitution axiom, by applying all possible negation rules on x = y , (x) or (y ): (x); x = y ) (y) (classical substitution axiom) In the following, we will call substitution the process of applying one Cut wrt one substitution axiom. For example, if some sequent contains, up to negation rules, a left equality x = y and a left term (x), then is provable if the sequent 0 obtained from by replacing (x) by (y) is provable. = ; x = y; (x) ) 0 = ; x = y; (y) ) is obtained by a Cut Rule applied to 0 and one substitution axiom. Substitution is relevant only wrt two eigen-variables (parameters coming from creative rules 9-left and 8-right) not for parameters coming from instantiation rules (9-right and 8-left). In the latter case, the effect of the substitution can be reproduced simply by an adequate instantiation. Lemma 2 Substitution is useless when applied to parameters coming from a noncreative quantifier elimination rule (i.e. 9-right or 8-left). On Relevant Instantiations We now investigate general properties of the instantiation rules 8-left and 9-right in the terminological sequents. Basically, we will show that under some assumptions about the proof strategy, it is useless to apply the instantiations rules if the assignment function of variables to actual parameters is not injective or does not use exclusively eigen-parameters. The assumption is that only one level of quantifier elimination is considered. Let be some terminological sequent. Let us call B the set of eigen-parameters occurring in (parameters either produced by previous creative quantifier elimination or by terms with constant parameters like oneof). Thus the current proof 5 CONCEPT SUBSUMPTION WITH EQUALITY 34 lexique is B [ X where X is the set of all variables occurring in the quantified terms of . Let us assume that the proof lexique will remain constant in the subsequent proof steps. This means no further creative quantifier elimination will be done during the proof. Definition 1 Let be a terminological sequent. An instantiation closure of is a sequent C obtained from by 1. unfolding first some left atleast, right atmost, left some, or right all terms, thus creating a set B of eigen-parameters; 2. replacing every left n r:c by a finite list (conjunction) of expressions of the n+1 (r(a; x ) ^ c(x )) ! equ(~x), where ~x is an injective instantiation form ^ii= i i =1 into B ; 3. replacing every right n r:c by a finite list (disjunction) of expressions of the =n+1 form ^ii= (r(a; xi) ^ c(xi )) ^ dif (~ x), where ~x is an injective instantiation 1 into B ; 4. replacing every left 8r:c by a finite list (conjunction) of expressions of the form r(a; x) ! c(x) where x 2 B ; 5. replacing every right 9r:c by a finite list (disjunction) of expressions of the form r(a; x) ^ c(x), where x 2 B . Proposition 3 A terminological sequent is provable in SC= NNF by considering only quantifier elimination of degree 1 iff one instantiation closure of is provable in SC= NNF . Before presenting the proof details, we give some preliminary remarks. One can restrict to normal proofs, by the Normalization Property of SC= NNF . Then the quantification steps, coming after the preliminary creative elimination rules, involve only eliminations of left universals or right existentials. By Weakenings, one can always assume that all the possible rules for eliminating the left universals or right existentials (a finite number of instantiation rules) are applied to , with possible repetitions in the application of one given instantiation rule (as many as required for the proof16). Let ) be the resulting sequent. Note that the instantiation rules concern uniquely left atmost, right atleast, left all, or right some terms. Important logical symmetries exist between these different constructors, which justify that in all the forthcoming proofs we will restrict to left all and left atmost terms. This is justified, since left atmost and right atleast terms behave identically: after quantifier elimination and some boolean manipulations, 16 By finiteness of the proofs, for each rule there are only finitely many repetitions. 5.1 Elimination of Quantifiers and Creation of the Proof Lexique 35 they both introduce right role and concept terms. Left atmost terms introduce left equalities, right atleast terms introduce right inequalities. As we reason in the NNF fragment of SC, we do not have the negation rules explicitly to make left equalities and right inequalities equivalent. But they behave nevertheless identically because negation rules are implicitly encoded into the identity and equality axioms (in particular, the substitution axioms are given in both forms: with left equality and right inequality, see above p. 33). Left all and right some do behave identically only wrt role terms (they both produce right role terms); they behave identically for concept terms up to negation. They are not equivalent in SC= NNF , but any proof for degree-1 quantified formulae with one right some can be rewritten into a proof with one left all and vice versa. atmost Notation: We write ( n:r:c)(~x)(a) for the expression resulting from quantifier elimination upon the left term n r:c(a), wrt the instantiation function ~x (a is the eigen-parameter used to eliminate the top-level universal in the FOLtranslation of the given subsumption formula). atmost n:r:c)(~x)(a) ( = ^ii n r(a; x ) ^ c(x )) ! equ(~x) i i = =1 ( Proof: After these preliminary remarks we can now deliver the proof for Proposition 3. I. Non injective instantiation functions: Let us first assume that one left atmost is instantiated non-injectively (non-injective instantiation functions concern only numerical operators). We get to prove a sequent ) of the form 1 ; (atmost n:r:c)(~x) ) 1 where one disjunct of equ(~x) is an identity x = x . If in a subsequent proof step the !-left rule is applied to that term ( n:r:c)(~x), then the sequent 1; equ(~x) ) 1 must be proved. By applying _-left rules, one must prove in particular the sequent 1 ; x = x ) 1 . This sequent is provable iff 1 ) 1 is provable!17 This shows that the proof is independent of the term ( n:r:c)(~x). II. Instantiations by non-eigen-parameters: It means that some instantiation parameters do not belong to the set of current eigen-parameters B . One proves, by induction about the number of such parameters, that the same proof conditions can atmost atmost Proofs by substitutions wrt x=x or by cuts wrt the identity axiom ; ) x = x give directly 1 ) 1 . Other possibilities could be by using an equality axiom x = x ) x = x or x = x; x 6= x ) ;, which implies that x 6= x occurs in 1 or x = x occurs in 1 . In the first case, x 6= x may only come from a left atleast or the negation of a left oneof; in the second case, x = x may only 17 come from right atmost or right oneof terms. In both cases, the (in)equality involves necessarily two syntactically distinct eigen-parameters (they come from creative quantifier eliminations). 5 CONCEPT SUBSUMPTION WITH EQUALITY 36 be obtained by considering only terms instantiated with eigen-parameters from B (i.e. instantiation rules by eigen-parameters). II.1 Induction Basis: The proof involves terms for which all instantiation parameters, but one variable parameter x1 , are taken from B . We assume that the formula is not provable without terms in x1 . In the case where only left all terms 8ri:ci, for i = 1; : : : ; n, every one with instantiation parameter x1, may contribute to the proof, then one can assume that no left equality x1 = b; b 2 B occurs during the proof. (Otherwise, no equality being introduced by atmost terms, the possible occurences of x1 = b may come only through inessential cuts; then, let us consider the dual sequents with the corresponding inequality x1 6= b). Then, there is no means to link, through substitutions, terms with the argument x1 with other terms having parameter in B . We get to prove a collection of sequents of the form: n ) n ; ^i2I (ci(x1 )) ) r1 (a; x1); :::; rn (a; x1); n ^i21;nnI (rk (a; x1)); n for any indexing subsetI 1; n n; c1 (x1); :::; cn(x1 ) ) ; where n ) n is ) without the left terms 8ri :ci (x1). Therefore x1 does not occur in n ) n . The proof proceeds necessarily by Constant Separation, proving either subsequents containing terms in x1 or subsequents containing terms in B . The first alternative holds for all the sequents, otherwise the proof is independent of x1 . In particular the first sequent must be proved by the subsequent ; ) r1 (a; x1); :::; rn (a; x1) From this sequent one gets a proof condition of the form: >r v rj t ... t rk , where >r means the top-most role, a constructor similar to > for concepts. This is not a legal condition in the languages so far considered which contain no >r. NB: If the language would allow >r and disjunctive roles, the proposition holds nevertheless, only in this case. The provability of the initial formula results from some inconsistency property between the all terms solely. An equivalent proof could be obtained by instantiating x1 by any eigen-parameter of B 18 as well. Now, assuming that at least one left ( n:r:c)(~x) contributes to the proof, the sequent 1; x1 = xi ) 1 must be proved, where 1 ) 1 is not provable. One can assume that no proof working with x1 = xi may arise by direct equality axioms because this would require a left inequality x1 6= xi in 1 or a right equality x1 = xi in 1. (Indeed, such (in)equalities come necessarily from left atleast or atmost B is always non-empty as it contains at least the paramater created by the elimination of the outer-most right universal used in the translation of the initial subsumption formula. 18 5.1 Elimination of Quantifiers and Creation of the Proof Lexique 37 right atmost terms, which have been consequently unfolded by creative quantifier elimination rules, so come with eigen-parameters of B . If one inessential cut wrt a left x1 6= xi has been introduced, then let us consider the dual sequent with the left x1 = xi .) The remaining possibility is by a substitution axiom. This means taking another left equality x1 = yj (or right inequality) from another left ( p:r’:c’)(~y) (or a right ( n:r’:c’)(~y)). Then the sequent atmost atleast 1 ; equ(~x); equ(~y) ) 1 must be proved. This implies that x1 = ~x \ ~y and both ~x n x1 and ~y n x1 take elements from the subset B 0 B constituted of the eigen-parameters created by some m r1 :c1. (So that the corresponding dif (B ) provides with appropriate inequalities. Again we can ignore the inessential cuts that could have been introduced, because they always give rise to sequents with no more equalities than those provided by the dif terms). Then, we get the condition n + p + 1 m. Unfolding the two atmost terms gives in particular the sequents (together with similar sequents with role terms instead of concept terms): 2; x1 = yj ) 2; c(x1 ) 2 ; x1 = xi ) 2; c’(x1) 2 ) 2; c(x1 ); c’(x1 ) where 2 ) 2 is the sequent obtained from ) by eliminating (atmost n:r:c)(~ x) and (atmost p:r’:c’)(~y). Note also that 2 contains the terms c1 (xi) and c1 (yj ) (resulting from the unfolding of m r1 :c1). Assuming that 2 ) 2 contains no term in x1 anymore, the first sequent gives the proof condition c1 v c and a similar condition for the role term. This shows that the initial sequent contains a subsequent corresponding to the simple inconsistency formula: n + 1 m; c1 v c; r1 v r * m r1 :c1 u n r:c v ? Then it is easy to see that a simpler proof can be done without any instantiation parameter outside B and with the unfolding of one unique atmost (see Section (A.1) for technical details). Note that the condition > v c t c’ given by the third sequent is not significant for the proof. If 2 ) 2 still contains other terms in x1, we can assume that these terms come either from left atmost or left all. Then it is easy to check that one gets sequents like n ; x1 = xi ) c(x1); n where n contains no term in x1, and where n contains a list of terms ci (x1 ) , only one of which comes from a left atleast, the others coming from all terms exclusively. 5 CONCEPT SUBSUMPTION WITH EQUALITY 38 Then the proof conditions correspond to inconsistency schemata of the following form, which can also be proved by choosing instantiation rules wrt B exclusively (see also (A.1)): n + 1 m; c1 u c2 v c; : : : * m r1:c1 u 8r2 :c2 u ... u n r:c v ? II.2 Induction Step: In the case where several instantiation parameters, x1; x2 ; :::, are non-eigen-parameters, then again the significant case is when these parameters come from instantiation rules applied to left terms ( ni:ri:ci)(x~i), for i = 1; : : :; n. Let us consider the proof conditions for the sequent atmost n; equ(x~1); :::; equ(x~n) ) n resulting from the unfolding of all the left atmost terms having instantiation parameters outside B , xi 2 x~i. The proof being dependent on the xi ’s, there must be a chain b = x1; x1 = x2; x2 = x3 :::; xp = b0 such that the sequent n; b = x1 ; x1 = x2; x2 = x3:::; xp = b0 ) n resulting from the precedent one by _-rules, is provable but not n ) n (n and n contain no parameter outside B ). Let us consider one such length-minimal chain. Then one can easily check that all the parameters of the x~i except from the xi’s, b and b0 in particular, are to be taken from the same subset B 0 of the eigenparameters created by one left n r:c (same as case II.1). Hence the cardinality conditions ni < m. In particular, assuming the equation b = x1 belongs to equ(x~1), by the unfolding of n1 r1 :c1 , one gets at least to prove the sequent: n ; x1 = x2; x3 = x4:::; xp = b0 ) n; c1 (x1) and one similar sequent with r1 (x1). The situation becomes basically the same as in II.1; the proof simply reduces to one inconsistency schema between one atleast (with possibles all terms) and one atmost. 2 In the general situation where the proof lexique may grow during the proof process (which means elimination of nested quantifications), the same arguments still hold for proving that the instantiation functions can be chosen to be injective (cf. case I of the previous proof). Corollary 4 For proving terminological sequents, one can always assume that the instantiation rules are applied wrt injective instantiation functions. When no complex role operators are considered, then Case II of the precedent proof can be generalized by induction over the quantification degree (cf. next 5.1 Elimination of Quantifiers and Creation of the Proof Lexique 39 section). The major difficulties however for extending Case II arise when heterogeneous quantification degrees are possible between the different concept terms of the subsumption formula. As quantification depth is related to role restriction, the changes concern only the role conditions. Possible generalizations of the proposition need specific discussions according to what kinds of role operators are actually contained in the terminological language. The extension to role composition seems to cause no problem. (But no formal proof is given here.) Finally, the results here show that the right strategy for quantifier elimination is to apply the creation rules before the instantiation rules. This is a quite classical strategy in Sequent Calculus, justified here by Proposition 3 for quantified formulae of degree 1. On Breadth-First Proof Strategy The depth of quantifier eliminations and the global proof strategy are now discussed. The point is to show that one degree of quantification at a time needs to be considered for the axiomatization work, in absence of any complex roles (i.e. without role operators which are able to modify the structure of role chains). This property is of extreme importance because it will allow to restrict to search for inference rules of homogeneously quantified formulae with quantification degree equal to 1. In this section, we will prove a preliminary property about the way quantifier eliminations can be applied. Namely, we will show that one can restrict to proofs where the elimination of top-level quantifiers by instantiation rules can be done wrt the set of eigen-parameters created by the creation rules applying to top-level terms. This justifies proof strategies where the first steps consist in eliminating the top-level role restriction operators, for all the terms which need quantifier elimination in the proof. Intuitively, this leads to some kind of breadth-first strategy for quantifier elimination. In the next section, we will show that one can furthermore restrict to “homogeneous quantifier elimination” strategies, where the same quantification degree is eliminated homogeneously for all the concept terms. First, we introduce the notion of level of a concept term in a given subsumption formula as being the total number of role restriction operators it is bound to in the formula. Definition 2 Given a subsumption formula or a concept term and an occurrence of a concept term c in , the level of c in , written level(c,) is the integer defined inductively by the following conditions: level(c, c2 v c1 ) = level(c, c1 ) if c occurs in c1 , level(c, c2 c2 ) if c occurs in c2, v c1) = level(c, level(c, c) = 0, level(c, : c) = 0, level(c, c u c’) = 0, level(c, c t c’) = 0 5 CONCEPT SUBSUMPTION WITH EQUALITY 40 level(c, q.r.c’) = 1 + level(c, c’) where q denotes any role restriction operator. The level of a role term r occurring in a subsumption formula is the level of the encapsulating concept term (q.r.c) in which it occurs in . Proposition 5 (Breadth-First Strategy) Let be the terminological sequent corresponding to some subsumption formula . is provable in SC= NNF wrt some terminological theory Γ if there exists a finite collection of sequents (i )i2I such that, for every i 2 I : 1. the FOL formulae of i are the FOL translations of concept terms occurring in with level 1 or 0; 2. i is provable in SC= NNF wrt Γ. Proof: Similarly as the definition of level for concept terms, the notion of level of one eigen-parameter in a given terminological sequent proof is defined as being the total number of role restriction operators in the field of which it occurs at creation time (i.e. at application of the creative rule introducing it). For example, the sequent translation of the left term 8r1 :(n r2 :c)(x) will provide with terms r1(x,y), r2 (y; bi) and c(bi ) where the eigen-parameters bi ’s will be of common level 2. As usual, we assume normal proofs for NNF sequents. We write ) to denote the sequent obtained from the initial subsumption formula (sequent ) after all the quantifier elimination steps have been performed. Note that ) is obtained from by syntactic rewritings similar to those described in Definition 1. Let us now state some preliminary remarks about the form taken by ) . 1. The creation rules replace the quantified term q r : c(x), by adding both role and concept terms r(x,b) and c(b), where b is a new eigen-parameter, to the original sequent. It is easy to see that the terms are added to the left-hand side of the sequent, except from concept terms created by right all terms. Typically, ; n r:c(x) ) gives the equivalent sequent ; r(x; b1); c(b1); :::; r(x; bn); c(bn); dif (~b) ) where the bi ’s are new eigen-parameters. 2. On the other hand, instantiation rules applied to quantified terms q r : c(x), result in splitting the original sequents into several new ones: some containing the role terms r(x,y), some others containing the concept terms c(y), for every parameter y . (In general, the instantiated role and concept terms go 5.1 Elimination of Quantifiers and Creation of the Proof Lexique to the right-hand side of the sequent.) Typically, ; n r:c(x) collection of sequents, in particular the sequents where 41 ) gives a ; n r:c(x) ) ; r(x; y) ; n r:c(x) ) ; c(y) y is instantiated by a parameter occurring in the prof lexique of ; n r:c(x) ) . Let us now consider one top-level left atmost term (of level 0) in the sequent and let us assume that this term has been unfolded into ) . Thus n r:c(a) contributes a term ( n:r:c)(~x)(a), where c is possibly quantified.19 We write 1 ) 1 for the sequent obtained by eliminating ( n:r:c)(~x)(a) in ) : atmost atmost ) (atmost n:r:c)(~ x)(a) = = 1 ; (atmost n:r:c)(~x)(a) ) 1 equ(~x) ! ^ii n1 (r(a; xi) ^ c(xi)) = = Let us assume that the quantifier elimination is done by instantiating some variable of ( n:r:c)(~x), say x1 , by the eigen-parameter c of level l, where l > 1. Eliminating the boolean connectors in ( n:r:c)(~x), we get to prove in particular atmost atmost 1 ) r(a; c); 1 NB: By construction, c has been introduced by a creation rule upon a term of degree at least 2, (qn... (q2.r2 .(q1.r1.c))..), where q1 corresponds to one creative quantifier (left atleast left some or right atmost). In the following, the role or concept terms introduced by creation rules will be called creative terms. They are of the form ri (u; v ) or ci (v ) where v is an eigen-parameter. Note also that the creative role terms occur necessarily in 1 . Let us now reason about the different proof possibilities for 1 ) r(a; c); 1 assuming that 1 ) 1 is not itself provable. The next (necessarily propositional) steps must lead to at least one role subsequent which cannot be proved independently of r(a; c). 1. Let us assume that there is one subsequent, occurring at some step in the proof for ) , whose proof depends on r(a; c) and which involves necessarily the contribution of at least one role term introduced by creative quantifier elimination. (No subsequent containing r(a; c) can be proved without creative role terms.) Two cases arise according to whether the proof depends on the creative role term r1 (x1 ; c) introduced at the creation of c (b) or not (a). 19 The argument a is the eigen-parameter created by the elimination of the top-level right universal variable used in the FOL translation of the considered subsumption formula. 42 5 CONCEPT SUBSUMPTION WITH EQUALITY (a) Then the relevant creative terms for proving r(a; c) are of the form r’(u; v ) where v is syntactically different from c. r’(u; v ) belongs to 1 . Let us assume that one subsequent is provable, with both r(a; c) and r’(u; v ) (but the sequent without one of them is not provable). The proof succeeds if and only if one left equality c = v is introduced20. One possibility is when a preliminary inessential cut wrt c = v has been performed. This means that the above sequent yields the two sequents 1 ; v = c ) 1 ; v 6= c ) r(a; c); 1 ; r’(u; v ) 2 1 r(a; c); 1 In the second sequent no substitution is possible to make v and c logically equal, hence it must be proved without r’(u; v ). As there are only finitely many other candidates for creative role terms in 1 , by the same kind of reasoning one eventually gets to prove the sequent: 1 ; u1 6= a; :::; un 6= a ) r(a; c); 1 where no more proofs are possible by subsequents containing r(a; c) and at least one creative role term of 1 . The second possibility is when the equality is introduced by means of the left term equ(~x) coming from the unfolding of some left atmost, where c = v is one disjunct of equ(~x). Then, the unfolding gives other sequents which do not contain equ(~x) but contain instead role or concept terms with parameters different from c (because one may restrict to injective ~x, so ~x has at least two distinct elements). Finally, this shows that there must be one subsequent which must be proved with r(a; c) but without any creative role term of 1 . (b) Let us assume now that there is one subsequent whose proof depends on r(a; c) and involves the role term r1 (x1; c) introduced at the creation of c. c being of level at least 2, it comes with a role chain r1(x1 ; c); r2 (x2; x1). If x1 is also an eigen-parameter, x1 = b1, then the same kind of reasoning as previously applies to r(a; c) and r1(b1 ; c). Since level(b1) = level(c)-1, b1 cannot be syntactically equal to a, therefore one inessential cut wrt b1 = a or one equ(~x) containing b1 = a is necessary. In both cases, there is one other sequent, almost similar to , but with b1 6= a, which gets unprovable with r(a; c) and r1 (x1; c) together. We get the same conclusion as precedently. 20 The case of right inequality, being quite similar, is omitted. 5.1 Elimination of Quantifiers and Creation of the Proof Lexique 43 2. Let us now consider a subsequent whose proof depends on r(a; c) and non-creative role terms exclusively. Being non-creative, these role terms go to the right-hand side (cf. preliminary remarks). p ) p ) r’(u; y ); r(a; c); p c’(y ); r(a; c); p (In the second sequent the concept term goes possibly to the left-hand side if it comes from a left all.) For the same reasons as in the precedent cases, one can assume that the instantiation rules for introducing r’(u; y ) and c’(y ) have been donedirectly wrt (u; y ) := (a; c). Let us consider a minimal set of left terms ni ri :ci or 8ri :ci , i = 1:::k , which contribute to the proof of wrt r(a; c). We use p ) p to denote the sequent obtained from ) by eliminating these terms. One gets to prove the sequent p ) r1 (a; c); :::; ri (a; c); :::; rk (a; c); r(a; c); p; such that it is provable without creative role terms, hence without p , from ; ) r1(a; c); :::; ri (a; c); :::; rk (a; c); r(a; c) If the language does not contain >r, this sequent is unprovable because it requires some forbidden proof condition: >r v r1 t ... t rk . 2 Corollary 6 Any terminological sequent can be proved by applying the quantifier elimination rules of degree 1 (quantifier elimination of the first quantification degree for level-0 terms) and the rules for level-0 role terms, before the quantifier elimination rules for the concept terms of level greater or equal to 1. Proof: The instantiation rules for the top-level terms (level-0 terms, corresponding to the first degree of quantifier elimination) can be done by means of level-1 eigen-parameters, i.e. parameters created by the first degree of creative quantifier elimination. As a result, using the Separation Principle between concept and role sequents, the propositional steps which apply to role terms of level 0 can be permuted with any inference rule (quantifier elimination or propositional rule) applied to any concept term of level greater than 1. Consequently, the proof can be rewritten into a non-normal proof, where all the proof steps for concept terms of level greater than 1 are delayed, coming after the degree one quantifier elimination 44 5 CONCEPT SUBSUMPTION WITH EQUALITY rules (for level-0 concept terms) and the propositional steps for level-0 role terms. 2 Corollary 7 The following strategy is sound and complete for proving any subsumption formula . 1. Applications of degree-1 creation rules on level-0 terms of ; 2. Applications of degree-1 instantiation rules on level-0 terms of , with instantiation functions which are injective in the set of eigen-parameters created in step (1); 3. Applications of inessential cuts wrt the set of eigen-parameters created at step (1); 4. Propositional proofs for role terms of level 0; 5. Proofs of subsumption formulae (i )i2I , where each i is a subsumption formula constituted of level-1 or level-0 terms from . No quantifier elimination applies in the ongoing proof to level-0 terms of i . Proof: The last steps in the proof of Proposition 5 have shown that the instantiation rules of degree 1 (elimination of the first degree of quantification for level-0 terms) and the rules applied to level-0 role terms can be permuted with the other steps of the proof, i.e. the quantifier elimination rules for the concept terms of level greater than 1. The same property obviously holds for the creative quantifier elimination for level-0 terms (because the creative rules are independent from the others). This shows that one can rewrite the original proof into a proof where all eliminations of degree-1 quantification, creative or non-creative, are performed at the beginning of the proof. Then, the resulting proof gives rise to a collection Σ of sequents containing level-1 concept terms and possibly remaining level-0 terms, the terms needing no quantifier elimination in the original proof. The point is to show that the sequents of Σ correspond to terminological subsumption formulae. Let us now consider one such sequent . The concept terms of ; c1(a1 ); c2(a2); ci (ai), etc. all have eigen-parameters of level 0 or 1 as arguments. has the form: :::; cj (aj ); ::: ) :::; ci (ai); ::: Every subsequent quantifier elimination step applied to a term ci (ai ) in will create a new proof lexique B (ai). One shows that the proof steps of the subterms in ai can be separated from the proof steps of the subterms in aj , whenever these can be considered “distinct”, i.e. whenever the inequality ai 6= aj can be assumed. The result will be that the instantiation rules applied to subterms of ci (ai ) can be done wrt B (ai), i.e. the 5.1 Elimination of Quantifiers and Creation of the Proof Lexique 45 forthcoming quantification steps for subterms in ci (ai) are independent of quantification steps of cj (aj ).(More precisely, one can show that any instantiation rule for a top-level term of ci can be done wrt B (ai ) and so on by induction.) The formal justification is to show that the inessential cuts occurring in the propositional part of the initial proof tree for can be permuted with the quantification rules occurring in . The key point is to show that whenever a subterm t1 in some c1(a) is instantiated by an eigen-parameter created by a subterm t2 of some c2 (b), then the proof succeeds for the corresponding role terms iff some equality assumption between a and b holds. If this equality assumption a = b is introduced after the instantiation of t1, then t1 cannot contribute to any proof of the dual sequent obtained by the inessential cut which contains the inequality a 6= b. For that sequent, other subterms of c1 than t1 must be unfolded. Therefore, the inessential cut wrt a = b can be permuted with all the quantification steps for c1 (a) and c2 (b). Consequently, the initial proof tree for can be rewritten into an equivalent proof tree where: 1. all the inessential cuts wrt the level-0 or level-1 eigen-parameters occurring in are performed at first, 2. the remaining steps correspond to normal proof steps, without inessential cuts wrt level-1 or level-0 eigen-parameters. Then any subtree obtained at step (2) corresponds to a sequent of the following form (written in rather free notation): ^i;j2I (ai = aj )); ci(ai); ck (ak) ) cj (aj ); cn (an); ::: The equalities in the list (^ii 1p (ai = bi ) induce an equivalence relation R between the set of parameters (ai; i 2 I ). It is easy to prove that the above is provable ( = = iff there is a subsequent containing only concept terms belonging to the same equivalence class C of the relation R (because of the form of terminological axioms which corresponds to subsumption formulae between concepts or roles): ^i;j2C (ai = aj )); ci (ai); ::: ) ( cj (aj ); ::: By substitution axioms, this sequent is equivalent to the following one for any representative a of the equivalence class C : ^i;j2C (ai = aj )); ci(a); ::: ) cj (a); ::: This sequent corresponds exactly to the subsumption formula ci ( u ... v cj t .... 2 The preceding results are unfortunately false, when more expressive languages are considered. This is the case for languages with role operators acting as “role-chainshrinking” operators, like composition or >r. (Counterexamples to Proposition 5 are easily constructed from the preceding proof). 5 CONCEPT SUBSUMPTION WITH EQUALITY 46 On Homogeneous Lifting We are now ready to prove the final property about the strategical aspects, namely that homogeneous lifting, or, in this case, homogeneous quantifier elimination, is a sound and complete strategy for terminological languages with Equality and without complex roles. Indeed, in absence of any “role-chain-shrinking” operator, no proof possibility may arise between terms having different quantification degree, except from pure propositional proofs. Definition 3 A subsumption formula is called homogeneously quantified iff all its level-0 concept terms have the same degree of quantification. Definition 4 Given an arbitrary subsumption formula , is a homogeneous subformula of iff is a subsumption formula constituted of concept terms occurring in , whose levels in are the same. Proposition 8 (Homogeneous Lifting) Let Γ be a terminological theory; let be a subsumption formula. is provable wrt Γ iff there exists a finite collection of subsumption formulae (i)i2I such that, for every i 2 I : 1. i is a homogeneous subformula of , constituted of concept terms either of level 0 or of level 1; 2. i is provable wrt Γ. Corollary 9 The quantified fragment of TL= can be axiomatized by homogeneous inference rules of degree 1. The benefit of the Corollary is clearly a significant reduction in the axiomatization effort. As already mentioned in the previous section, homogeneous lifting is not valid for languages possessing complex role operators. For example, the following valid inference rule could not be proved by a homogeneous lifting strategy. The peculiarity comes from the role condition which is “free” while the concept condition depends on the creative terms. c2 v c; >r v r * 9r1 :(2 r2:c2 ) u 1 r:c v ? Non-boolean role operators, like role composition, invalidate also Proposition 5. One typical example is the following inference rule for role composition: * (8r1 .r2:c) v 8r1 :8r2:c In general one cannot even estimate a general bound for the depth of quantifier elimination if the role operators can shrink arbitrarily the length of role chains (like, for example, the transitive closure role). 5.1 Elimination of Quantifiers and Creation of the Proof Lexique 47 Proof: We now prove Proposition 8. The point is to show that in Corollary 7, the subsumption formulae i ’s can be chosen to be homogeneous subformulae of the initial subsumption. This means that the i ’s must contain exclusively either level-0 terms or level-1 terms of the initial formula. In order to prove that, we will show that no necessary proof condition can arise between level-0 concept terms and level-1 concept terms. Let us again consider a normal proof of the initial subsumption formula . can be rewritten into a proof 0 satisfying Corollary 5, where all eliminations of degree-1 quantifier are performed at first. Let us assume that the initial formula contains at least one level-0 term t1, to which no quantifier elimination will ever apply in , and one quantified term t2 which needs quantifier elimination in . Let us assume that derives some proof condition between t1 and (subterms of) t2 . In the following, we assume that t1 = c’(a) and that t2 provides at least two terms written r(a; b) and c(b). We will show that whenever some terminological sequent containing a concept term c’ is provable without applying any quantification rule to c’ then it is provable propositionally or independently of c’. This is proved by induction about the complexity of sequent proofs, in terms of the total number of quantifier elimination steps in the given proof. Only the arguments for the induction step are presented; the induction basis is quite similar. Two cases arise according to whether the alleged proof condition between t1 and t2 involves terms coming exclusively from creation rules (Case I) or not (Case II). I. Creative Terms Only (Induction Step): There is a proof condition where no non-creative quantified term is involved. Basically we get to prove sequents like n ; r1 (a; b1); c1(b1 ); :::; rn(a; bn); cn(bn) ) c’(a); n::: where no non-creative term comes in, where one possible negation rule has been applied to c’, and where n ) n denotes the sequent obtained from the initial subsumption formula by eliminating the n creative terms necessary to obtain the proof condition for t1. By Separation of role and concept conditions, 1 is either provable by the role subsequent or the concept subsequent. We exclude the case where r v ?r or ci v ? or c’ v ?, because in each case the proof works by the inconsistency of one single term t1 or t2 (every creative term with inconsistent role or concept is an inconsistent term). Let us assume that 1 is proved by the concept subsequent. Let us also assume that the set fci , i = 1 to ng is a minimal set such that the condition c1 u ... u cn v c’ holds. To get this condition, preliminary left equalities of the form bi = a must be introduced. As non-creative terms may only contribute, the required equalities come from inessential cuts. Then, one sequent in which no equality bi = a is available must be proved. This sequent is no more provable by the previous concept condition. Thus we have to prove 2 48 5 CONCEPT SUBSUMPTION WITH EQUALITY 2 n; b1 6= a; ::::; bn 6= a; r1(a; b1); :::; rn (a; bn) ) c’(a); n::: No proof condition may now arise by the role subsequents (because the possible role condition are forbidden conditions like ri v ?r). Thus 2 is provable by 3 3 n ; b1 6= a; ::::; bn 6= a; ) c’(a); n::: In 3 we can also get rid of the inequalities bi 6= a. Indeed, they cannot be used in substitution axioms. They possibly lead to identity axioms like bi 6= a; a = bi in the two following cases. The first case, is when the equality a = bi comes from a left atmost; then, there is a sequent without the equality, but with left role or concept terms instead, which has the form 3 and must be proved without the inequalities bi = a. The second case is when a left oneof introduces a left equality a = c; oneof being a creative term, c is syntactically different from b; even if one inessential cut is introduced to match b and c, there is a similar sequent where the proof can no more proceed by the equality axiom. Eventually, 3 is provable by a sequent corresponding to a sequent of smaller complexity: n ; ) c’(a); n::: The rest follows by induction hypothesis. II. Non-Creative Terms (Induction Step): At least one non-creative term t2 contributes to the proof. Let us assume that t2 = ( n:r:c)(~x)(a). We get to prove sequents 1 , 2 , 3 atmost 1 n ; equ(~x); ::: ) 2 n ; ::: ) 3 n ; ::: ) c’(a); ::::; n c’(a); r(a; x); :::; n c’(a); c(x); ::::; n where n ) n denotes the sequent obtained by eliminating the non-creative terms necessary to get the proof condition for c’. Let us first assume that the proof condition for c’is obtained from a sequent like 1. If the proof is independent of equ(~x), the situation reduces to a formula of smaller complexity. Whenever some equality from equ(~x) is necessary, it must be of the form x = a which means that a 2 ~x; all the sequents of the form 2 must be proved with the role terms r(a; x) otherwise we get again to prove nonhomogeneous formulae of smaller complexity. For x = a, the proof of 2 reduces to the proof of one role subsequent contained in n ) r(a; a); n. Such a sequent cannot be proved by admissible role conditions unless a left equality b = a is available. If b = a comes from an inessential cut, then the dual sequent with the inequality b 6= a gets unprovable with r(a; a). Instead we have to prove n; :::; b 6= a ) c’(a); :::; n 5.2 Introduction of Complete Equality Assumptions 49 which corresponds to a sequent of smaller complexity. As shown in the precedent case, one can get rid of the inequality b 6= a, so that the proof reduces to a sequent of smaller complexity. Otherwise b = a comes from another non creative term : : : r1:c1. The sequent like 3, obtained in the unfolding of this term by choosing the concept term c1(a), cannot be proved by its role part; it must be proved by its concept part, which again corresponds to a sequent of smaller complexity. In all these cases, the initial sequent is provable by a sequent of smaller complexity. Then, by induction hypothesis, it gets provable propositionally or independently of c’. Let us now assume that the proof condition for c’ comes from sequents of the form 2 or 3 . If the proof condition for c’ comes from the sequent 2, then 2 is provable without r(a; x) and the proof reduces to a sequent of smaller complexity. The last case is when the proof condition for c’ comes exclusively from a sequent of the form 3, where all the non-creative terms contribute by concept terms only (no right role term, no left equality). The condition is of the form c1 u ... v c’ t c t .... Let us consider a minimal set of concept terms leading to such a condition. This supposes that the arguments x of the terms like c(x) are made equal to a, through appropriate substitutions. To do this, as no equality from the equ(~x) components is assumed available, at least one inessential cut must be introduced. Then, the dual sequent, with the corresponding inequality, failed to be proved unless the proof is independent of c’. Then it is easy to see that all the sequents 1, 2 , and 3 are provable independently from c’. 2 5.2 Introduction of Complete Equality Assumptions Now that the quantifiers steps have been performed, we end up with a proof lexique which will remain constant in all the remaining steps occurring before final cuts with proper axioms (assumptions). The major change from the languages without Equality concerns the use of inessential cuts in the proof trees. This makes the search space more complex in the sense that the Subformula Property remains true up to the extension of the notion of subformulae to equalities or inequalities between parameters of the proof lexique. The problem is how to perform the inessential cuts, in other words what equalities or inequalities are to be introduced in order to manage the proof. First we will show how the presence of equality assumptions in the sequents influence the proof strategy. Then, we will show that one has to introduce equality and inequality assumptions which are complete, i.e. giving complete knowledge about whether or not two arbitrary parameters are equal. 50 5 CONCEPT SUBSUMPTION WITH EQUALITY Proof Strategy with Equality Assumptions Let us start with a preliminary remark on inessential cuts. When applied in backward chaining (i.e. from the conclusion to be proved to premisses as sufficient conditions), an inessential cut is: 1 ; b = d ) 1; 2 ) b = d; 2 1 ; 2 ) 1; 2 Considering normal proofs21, in the propositional fragment only, there is no loss of generality in applying inessential cuts as follows: ; b = d ) ; ; b 6= d ); ) Indeed, by weakenings, any proof of 1 ; b = d ) 1 is a proof of ; b = d ) where 1 and 1 (the same holds with b 6= d). Conversely, all the normal proofs of ; b = d ) are necessarily proofs of one of its subsequents 1 ; b = d ) 1 (because assuming normal proofs, before application of “terminal” cuts i.e. cuts with proper axioms, the only formulae in the proof which are not subformulae of the initial sequent are equality or inequality formulae). In all the following , we will always consider inessential cuts of this type. Case Where a Single Term Creates Eigen-Parameters. We first show that inessential cuts are useless for searching inference rules for formulae containing one unique term creating eigen-parameters (one left atleast or one right atmost). Introduction of new equality assumptions makes no change in the provability conditions of the original sequent. Let us assume that = ; n r:c ) is a sequent containing one unique left atleast and no right atmost. Let us also assume that ) is not provable. By the 9-left rule, is equivalent to ) where = i=n (r(a; b ) ^ c(b )); dif (b ; :::; b ) . i i 1 n i=1 Any introduction of new equality or inequality formulae is made through an inessential cut on parameters of the proof lexique, say (b1; b2 ). (Inessential cut upon parameters not in the proof lexique is nonsense: it could only contribute to a proof not involving the atleast term; which is contrary to the initial assumption.) Thus we get: is provable if both ; b1 = b2 ) and ) b1 = b2; are provable. The former sequent is verified because its subsequent dif (b1 ; :::; bn); b1 = b2 ) ; is trivially provable (no condition about the other terms arises). The latter sequent is equivalent to the initial sequent (by :-right and left contraction on the inequality :(b1 = b2) in dif (b1; :::; bn)). Thus, inessential cuts are useless. They don’t give any new proof condition. P 21 I.e. proofs without non-inessential cuts. By the Normalization Property in Sequent Calculus with Equality, one can restrict to normal proofs. 5.2 Introduction of Complete Equality Assumptions 51 Lemma 3 Subsumption formulae with one single term creating eigen-parameters can be proved without inessential cuts. Case Where At Least Two Terms Create Eigen-Parameters. Things are different when two atleast terms are simultaneously present as antecedents in the subsumption formula (sequent). Indeed, inessential cuts will now introduce equality or inequality assumptions not redundant nor inconsistent with the information contained in the subterms dif (:::) coming from the atleast terms. Typically, let us assume that the antecedent of = ) contains two terms p r1 :c1 and q r2:c2 . Two sets of parameters are introduced by the 9-left rules: B = b1 ; :::; bp and D = d1 ; :::; dq coming with respective conditions dif (B ) and dif (D). Inessential cuts can contribute with new sequents, not equivalent to the initial ones and with consistent antecedents, only if they bear on couples of parameters (bi ; di ). Then ) is provable if both ; bi = dj ) and ; bi 6= dj ) are provable. Then new proof conditions may arise because the assumption bi = dj in the former sequent allows for possible substitution of parameters. For example, if = c1 (b); c2(d); b = d ) c(b), then by applying a Cut (backwards) with the substitutivity axiom c2 (b); b = d ) c2 (d) one obtains the sufficient proof condition c1 u c2 v c (through the sequent c1 (b); c2 (b) ) c(b)). This proof strategy fails for sequents containing no equality assumptions. For example, the sequent c1 (b); c2(d); (b 6= d) ) c(b) is (propositionally) provable only by separating the subsequents according to the different constant names, i.e. either c1(b) ) c(b) or c2 (d) ) ; are provable. Here no appeal to substitution axioms is possible for making concept terms telling of the same objects. The preceding remarks justify the following lemma for propositional proofs in linear sequents, i.e. sequents containing neither left disjunctions nor right conjunctions. Definition 5 A sequent ) is linear iff there is no disjunctive formula in and no conjunctive formula in . Lemma 4 (Constant Separation Principle) If a terminological sequent is linear and does not contain any equality assumption in the antecedent (symmetrically, any inequality assumption in the succedent) then the sequent is provable propositionally only if one of its subsequents constituted of terms telling of the same parameter name is provable. Proof: If the sequent is both disjunction- and conjunction-free, and no substitution axiom is applicable, then a propositional proof (in the NNF version) arises only through cuts with terminological axioms which “tell” necessarily about the 52 5 CONCEPT SUBSUMPTION WITH EQUALITY same individual. (NB: the proposition is obviously in non terminological context!) 2 This becomes false with left disjunctions and right conjunctions, because the _left and ^-right rule make the sequents split into two new ones, with different antecedents or succedents. The ^-right rule makes the sequents split into two new ones, with the same antecedents. For example, the sequent C1 (a); C2(b) ) C3 (a) ^ C4 (b); C5(b) is equivalent (by ^-right) to the sequents C1(a); C2(b) ) C3(a); C5(b) C1(a); C2(b) ) C4(b); C5(b) If C2 (b) ) C5(b) is not valid, the first sequent must be proved by C1 (a) ) C3(a) and the second one by C2 (b) ) C4(b); C5(b). Complete Equality Assumptions Definition 6 Let be a sequent. Let b and d be two distinct parameters in . We say that (b; d) is decidable in iff either b = d or b 6= d occur in the antecedent list or the succedent list of the sequent . Otherwise (b; d) is indecidable. We say that a sequent is equality-complete (in short, complete) iff every couple of distinct parameters (b,d) of is decidable in . An equality complete extension of ) is an equality complete sequent containing and as antecedent and succedent, respectively, and differing from ) by equalities or inequalities only. By the negation rules, one can always assume that equalities or inequalities appear in the antecedent list only. We now show that the search space for proving a given sequent can be restricted to the space of all the equality complete sequents containing it, instead of all the sequents resulting from it by arbitrary equality/inequality assumptions. Proposition 10 A sequent is propositionally provable iff a subset of equality complete sequents extending are provable. Thus the search space for provability conditions of can be restricted to all its equality complete extensions. Proof: The proof simply proceeds by showing that proving a sequent ) , in which b = d is indecidable, can be done by proving both ; b = d ) and ; b 6= d ) . In other words, there is no loss of generality in performing the inessential cut wrt b = d. 5.3 Axiomatization of Numerical Operators 53 In the following we consider only propositional proof trees and backward proof strategies. Thus cut rules are meant backwards, from conclusion to premisses. Proof trees for ) can be classified according to whether or not they use an inessential cut upon b = d. Precisely, ) is either provable without using an inessential cut upon b = d or the two sequents ; b = d ) and ; b 6= d ) are both provable. We show that the proofs without inessential cuts will be also encountered by assuming the inessential cut. If the proof for ) does not use inessential cuts upon b = d, then it proceeds necessarily without substitution wrt b = d (c(b); b = d ) c(d)) and without the identity axiom (or equivalent version) b = d; b 6= d ) ; (because neither b = d nor b 6= d may ever appear in the antecedent). The same proof conditions necessarily also arise by considering both sequents ; b 6= d ) and ; b = d ) . Indeed, with ; b 6= d ) , no cut with a substitutivity axiom on b = d is possible, because this would require that the top (goal to be proved) sequent already contained the equation b = d, contrarily to the indecidability assumption for (b; d). If ; b 6= d ) enables a proof possibility by an identity axiom b = d; b 6= d ) ;, this means that a left term b = d (up to negation rules) emerges during the proof after some connector elimination (typically, from left atmost). The same term would also emerge during the proof (assuming that formula is necessary for the proof) of the dual sequent ; b = d ) , but then no proof succeeds with the identity axiom. In other words, proof conditions for ) without inessential cut on b = d will also be found by proving ; b 6= d ) and ; b 6= d ) . This shows that ) is provable iff ; b 6= d ) and ; b 6= d ) are both provable. In each case, provability conditions are found by examining extension of ) in which b = d is decidable. The proposition is obtained by generalizing the reasoning to more parameters. 2 5.3 Axiomatization of Numerical Operators After these preparing sections we will now derive the inference rules for the numerical operators atleast and atmost. We obtain the following rules for inconsistency and redundancy: cv cv ? * > v n r:c ? * n r:c v ? (29) (30) Some of these rules can be taken over from the corresponding rules for some and its negation. In fact we have the following equivalencies between atleast and 5 CONCEPT SUBSUMPTION WITH EQUALITY 54 atmost, on the one hand, and some and all on the other: * * * * 1 r:c =: 9r:c 1 r:c =: :8r:: c 0 r:c =: 8r:: c 0 r:c =: :9r:c (31) (32) (33) (34) These rules already indicate the negation duality between atleast and atmost: m = n 1 * :n r:c =: m r:c m = n + 1 * : n r:c =: m r:c (35) (36) Due to this negation duality we have various formats for most inference rules involving atleast and atmost. Consider, for example, the monotonicity rule for atleast: q p; c1 v c2 ; r1 v r2 * p r1 :c1 v q r2 :c2 (37) We can move the negated right-hand atleast to the left (38), the negated left-hand atleast to the right (39), or both (40). q < p; c1 v c2; r1 v q < p; c1 v c2; r1 v p q; c2 v c1; r2 v r2 r2 r1 * q r2 :c2 u p r1 :c1 v ? * > v q r2 :c2 t p r1:c1 * p r1:c1 v q r2 :c2 (38) (39) (40) In the following we will only specify rules in the inconsistency format, i.e. with ? on the right-hand side. To find all inconsistency schemes, we have to systematically investigate all conjunctive combinations of atleast, atmost, and all. Given the equivalence between atmost and all (33) we obtain the following inconsistency between atleast and all: c2 u c1 v ?; r1 v r2 * n r1:c1 u 8r2 :c2 v ? (41) In addition to these rules we obtain inference rules from the interaction of atleast, atmost, and all in conjunctive terms. The detailed derivations for these rules are given in the appendix (Section A). Here we just summarize the resulting rules. Below are the rules for Modus Ponens in inconsistency form (42), as well as Modus Ponens for atleast (43) and for atmost(44): q < p; r q p; r q p; r v 1 v 1 v 1 ; r ;r r ;r v 1 v 1 v r2 r1 2 2 ; r ;c r ;c r3 c1 u c3 3 3 v 1 u c3 v 1 u c3 v c2 c2 c2 * q r :c * p r :c * q r :c 2 1 2 u p r1:c1 u 8r3:c3 v ? (42) (43) 1 u 8r3 :c3 v q r2 :c2 (44) 2 u 8r3 :c3 v p r1 :c1 2 5.4 Axiomatization of Extensional Operators 55 The following rule is the terminological part of the object-level abstraction over closed role-filler sets: r1 v r2; , v r1r3 ; c1 v * n r1:c1 u n r2 :> v 8r3 :c2 c2 (45) Furthermore, we have the general additivity rule wrt a single atleast term Pi k (pi) < n; ri v r; c v c t c t : : : t ck i = =1 1 * 2 (46) n r:c u p1 r1:c1 u p2 r2:c2 u : : : u pk rk :ck v ? and the additivity for atmost wrt disjunction: r v r1 ; r v r2 * p r1 :c1 u q r2 :c2 v p + q r:c1 t c2 (47) Then there is additive Modus Ponens: p + q < n; r v r1 ; r v r2; r3 v r1 ; r4 v r2 ; c3 u d1 v c1 ; c4 u d2 v * n r:d1 t d2 u q r1:c1 u p r2:c2 u 8r3:c3 u 8r4:c4 v ? c2 (48) There are a number of additional rules derivable, which are all reducible, however, to the Union/Intersection rule: r1 u r2 v r3 u r4; r1 t r2 v r3 t r4; c1 u c2 v c3 u c4 ; c1 t c2 k+n<p+q * p r1:c1 u q r2:c2 u k r3:c3 u n r4:c4 v ? v c3 t c4 ; (49) Note that this rule can in fact be generalized to an arbitrary number of numerical restrictions (see Section A). 5.4 Axiomatization of Extensional Operators We repeat the definition of the extensional operators oneof and fills. fo1; :::; on g_ r:fo1 ; :::; on g def = def = x(x = o1 _ : : : x = on) x(r(x)(o1 ) ^ ::: ^ r(x)(on)) Furthermore most systems offer the notational convention r:o def = r:fog 56 5 CONCEPT SUBSUMPTION WITH EQUALITY We can immediately note the following equivalence: n = jS j * r:S : n r:S _ = (50) which allows us to restrict our axiomatization effort to oneof. The following rules can be derived for oneof terms not occurring in quantified terms: S T * S_ v T _ * S _ u T _ =: (S \ T )_ (51) (52) oneof differs notably from the numerical restrictions because it is not quantified. By the property of homogeneous lifting, one can at first state that there is no proof possibility arising between a non-quantified oneof term and a role restriction term, except from pure propositional proofs. The question is now whether there exist new inference rules for quantified oneof terms, i.e. terms where oneof is encapsulated in some role restriction operator, and rules others than the rules inherited from the fragment with numerical restrictions. When encapsulated in numerical restrictions qn r : S _ , oneofintroduces equalities between the elements of S and the role fillers of r. This is always a creative introduction (elements of S are constant parameters—they contribute to the creation of the proof lexique). Thus S _ modifies the proof lexique and the notion of equality complete sequents. In particular the equality assumptions, not only between the parameters created by quantifier eliminations in the atleast terms, but also between the constant parameters of the oneof terms, must be taken into account. Below we examine the proof conditions for quantified oneof terms. Proof Conditions For a Single Encapsulated Oneof Term Let us assume that the oneof term occurs in an atmost term (e.g. p r:S _) and is essential to the proof. Regarding the concept terms, the contributions of the p r:S _ term is by means of right equalities: x = oi, for oi 2 S . There is at least one sequent which is not provable without the right x = oi . By considering the particular sequents where no equality between oi and the other parameters of the lexique is assumed, then the proof can only be between x = oi and one identical equality coming from one left term directly (i.e. not via substitutions). This means that there must be one other oneof term in the formula, providing with left equalities, i.e. one oneof encapsulated within an atleast or an all term. The reasoning is similar for other quantified terms. In general, we can show that no formula containing only one single quantified oneof term is provable, unless this formula is inconsistent or the formula is provable independent of the oneof term. 5.4 Axiomatization of Extensional Operators 57 It is easy to see that an inconsistency can only arise from the demands of an atleast term for n distinct fillers and the maximal cardinality of a oneof term: jS j < n * n r:S _ v ? (53) Correspondingly we have the following rule for redundancy of atmost restrictions: jS j n * > v n r:S _ (54) A oneof term occurring in a value restriction implies a maximum restriction: n jS j; r2 v r1 * 8r1 :S _ v n r2 :> (55) Oneof Terms Occurring in one Atleast and one Atmost Term To prove inconsistency of p r:S _ u q r:T _, where S = fs1; : : : ; sm g and T = ft1; : : : ; tng we get to prove sequents like (_-left rules being already applied): ^ii n1 bi = ti; equ(~x) ) ; ^ii 1n bi = ti ) xj = s1; :::; xj = smforj = 1:::p + 1: As shown above, q r:T _ is only consistent if q n. Immediately, one sees that there must be at least n distinct elements of T, otherwise n r:T _ is inconsistent. Assuming the contrary, i.e. n jS j m , then the proof proceeds by case analysis + = + = on ~x and the possible equality completions. By assuming no equality assumption between B [ T and S , but B = T , one proves that ~x must be necessarily included in B [ T = B , that T must be included in S . Eventually, the inference reduces to the composition of the monotonicity rule between oneof terms and the inconsistency schema between atleast and atmost. Hence, no new inference rule arises! The property generalizes easily with one oneof term encapsulated in an atmost and several non-oneof terms. Arbitrary Proofs with Quantified Oneof Let us consider formulae with mixed terms, some quantified oneof terms together with some quantified non-oneof terms. Again we will prove some “homogeneity property”, namely that the proof depends either only on the quantified oneof terms or only on the non-oneof terms. Intuitively, this is because “equalities prove equalities” and “concept terms prove concept terms”. In the following we assume that the contribution of the oneof term duely involves Equality reasoning, i.e. that the formula could not be proved in the fragment without Equality. This means that somehow the equalities coming from the oneof terms are effectively used for substitutions, equality axioms or equality assumptions in the introduction of inessential cuts. 5 CONCEPT SUBSUMPTION WITH EQUALITY 58 Let B be the set of parameters created by the non-oneof terms, let D be the set of eigen-parameters created by the oneof terms. Let us consider the collection of equality complete sequents in which no equality assumption is made between B and D (hence intuitively B and D are kept disjoint). Atmost Terms. Let us first consider the coexistence of one p r1 :c and one q r2:S _ in an arbitrary formula. Let us assume that the formula is not provable without p r1:c. Then there is one (equality complete) sequent in which unfolding the term p r1 :c and q r2 :S _ results either in a proof by p r1 :c alone—i.e. one sequent of type 2 shown on page 99 when equ(~x) is unprovable—or in a proof by one sequent of type 4 shown on page 99 where both equ(~x) and equ(~y) are provable. ~y takes one element into B , and because no equality between B and D exists, then the sequent ) c(y) must be proved by the subformula B constituted of the terms telling only on the parameters from B , that 1. If is equalities coming from the oneof terms. But c(y) is an equality term, therefore such sequents are unprovable. This means that ~y is necessarily included into D and the proof is independent of the oneof terms. 2. Then there is at least one sequent ) _s2S (x = s); c(y ) to be proved and ) (_s2S (x = s)) is unprovable (otherwise the proof is independent from p r1 :c). As the left equalities cannot contribute by substitutions, the former sequent is equivalent to ) c(y ). Assuming that is disjunction free, then by Constant Separation, it comes that ) c(y ) must be proved for all y 6= x. For y = x, again because the right x = s cannot be used for substitutions, then also ) c(x). Moreover, by the same argments as in the previous case one shows that ~y must be necessarily included in D. Then the formula is provable without q r2:S _ . The same reasoning holds also wrt several atmost terms, by generalizing to (~y), one non-empty right expression obtained after the quantifier elimination of several p r1:c (i.e. some part not exclusively made of left equ(~z)). All and Atleast Terms. Now let us assume that contains only quantified oneof contributing by left equalities, i.e. 8r2 :T _ or q r2 :T _. In one case, the equality means x 2 T , in the other B T . Again we assume that no equality assumption is made between the parameters created by the oneof terms (B ) and the others (D). Then we get to prove sequents of the form: ; 0 ) (~y) where contains the equalities from the T _ term and 0 only tells on parameters from D. Assuming again that is disjunction free, then by Constant Separation the proof proceeds by either one subsequent telling on the parameters of B [ T or one subsequent 59 telling on the parameters of D: ) c(~yB;T ) or 0 ) c(~yD ). But the first sequent is unprovable because contains no left concept term and was just chosen to contained ones. Thus the proof is necessarily independent from the oneof term. 6 Role Subsumption In this section we will derive inference rules for role subsumption. We consider the following role-forming operators: >r ?r r1 u r2 r1 t r2 :r c jr rjc r r1 :r2 def = def = def = def = def = def = def = def = def = xyTrue xyFalse xy(r1 (x)(y) ^ r2 (x)(y)) xy(r1 (x)(y) _ r2 (x)(y)) xy(:r(x)(y)) xy(r(x)(y) ^ c(x)) xy(r(x; y) ^ c(y)) xy(r(y)(x)) xy(9zr1(x)(z) ^ r2 (z)(y)) Note that we do not consider the transitive closure of roles for the obvious reason that it is not translatable into FOL. Note further that the normalize-compare algorithm for role subsumption presented in [Quantz 90] is not complete as conjectured in that paper. Besides incompleteness due to the trans operator there are additional incompletenesses wrt the operators of the fragment considered here. We will first analyze the propositional fragment of roles, then we will consider the domain (c jr) and the range operator (rjc ), and finally turn our attention towards role composition (r1 .r2 ) and inversion (r ). We will proceed systematically by analyzing the different possibilities for having a subsumption r1 v r2 —we look at every combination between the outmost role-forming operators in r1 and r2 (treating the constants as 0-ary role-forming operators). We start with a translation of the DL subsumption formula under consideration to which !-right, 8-right, ^-left, and _-right have already been applied. For illustration consider the subsumption scheme r1 u r2 v r3 t r4 . We would start with the sequent R1 (a)(b); R2(a)(b) ) R3 (a)(b); R4(a)(b) We thus skip the following derivation: ; ) 8x8yR1(x)(y) ^ R2(x)(y) ! R3(x)(y) _ R4(x)(y) 6 ROLE SUBSUMPTION 60 ; ) R1 (a)(b) ^ R2 (a)(b) ) R1 (a)(b); R2(a)(b) ) R1 (a)(b); R2(a)(b) ) R1 (a)(b) ^ R2(a)(b) ! R3 (a)(b) _ R4 (a)(b) R3 (a)(b) _ R4(a)(b) R3 (a)(b) _ R4(a)(b) R3 (a)(b); R4(a)(b) Note that the Ri used in the sequents are translations of possibly complex DL roles, i.e. they may contain terms themselves (therefore our writing R(a)(b) instead of R(a; b)). Our proofs will look for the substitutions of the Ri which make the sequent valid. Note finally that we are interested in a somewhat minimal list of inference rules. We are thus not interested in deriving inference rules which are already covered by more general inference rules. We will call such inference rules redundant and the corresponding proofs trivial. For example an inference rule like * r1 u r2 v r1 does not say anything interesting about the interaction between an outmost inv operator on the right-hand side, and an outmost and operator on the left-hand side, since it is just a special instance of the inference rule * r1 u r2 v r1 We will, however, list inference rules which are redundant in the sense that a set of other inference rules taken together will also produce the desired inference. Though these rules are redundant they are important from the perspective of an efficient implementation of DL systems. We will usually indicate the rules which are redundant in this sense. Figure 9, at the end of this section on page 78, contains all inference rules derived for role subsumption. 6.1 The Propositional Fragment For the propositional fragment, i.e. the top role (>r), the bottom role (?r), role conjunction (r1 u r2 ), role disjunction (r1 t r2 ), and role negation (: r), we can simply take over the results from concept subsumption. For convenience we here list again all the rules without giving their derivations, however:22 * * 22 : r= r r v >r (56) (57) Again, we do not give the rules for commutativity and associativity of conjunction and disjunction. 6.2 Domain and Range Restrictions r1 r1 v v r2; r1 v r1 v r3 r2 v v r2 r4 r1 v r3; r2 v r4 r2 r1 v r1; r3 v v r3; r2 v r1 r4 r1 r2; r2 u r3 61 * ) * * * * * * * * * * * * * * * r1 v r2 u r3 r1 v r2 t r3 : r= ::r >r =: r t : r >r =: : ?r ?r v r r1 u r3 v r2 r1 u r3 v r4 : r u : r = ?r r1 u r2 v r3 u r4 r1 u r2 v r1 t r3 : r1 u : r2 =: : (r1 t r2) r2 t r3 v r1 r1 t r2 v r3 t r4 : r1 t : r2 =: : (r1 u r2) : >r =: ?r (58) (59) (60) (61) (62) (63) (64) (65) (66) (67) (68) (69) (70) (71) (72) (73) 6.2 Domain and Range Restrictions The domain operator (cjr) restricts the first element of a role, the range operator (rjc) restricts the second. These role-forming operators thus allow the use of concepts in the definitions of roles. We will now consider the interaction of these operators with the operators from the propositional fragment. Since domain and range behave very similar (their translations are almost identical), we will consider their interaction in parallel. Usually, the derivations for domain carry over to range. r1 v c jr2 This is translated into SC as R1(a)(b) ) R2 (a)(b) ^ C (a) We thus have to prove the sequents R1 (a)(b) ) R2 (a)(b) R1 (a)(b) ) C (a) If we assume that there is no further information available about R1 , the second sequent is only provable if C = xTrue(x). We thus obtain the inference rule > v c; r1 v r2 * r1 v c jr2 (74) 6 ROLE SUBSUMPTION 62 r1 v r2 jc In analogy to the derivation for domain we obtain > v c; r1 v r2 * r1 v r2jc (75) c jr1 v r2 The translation of this subsumption scheme is: R1 (a)(b); C (a) ) R2 (a)(b) If we do not take into account further information about R2 this is provable if R1 (a)(b) ) R2 (a)(b) Note that the corresponding inference rule r1 v r2 * cjr1 v r2 (76) is redundant, since it follows from (87), (95), and (65). r1 jc v r2 Again in analogy to the domain derivation we obtain r1 v r2 * r 1 jc v r 2 (77) which is redundant, since it follows from (88), (98), and (65). >r v c jr Translates into True ) C (a) ^ R(a)(b) which is provable only if C = xTrue(x) and R = xyTrue(x)(y ). We thus obtain the inference rule > v c; >r v r * >r v cjr (78) which follows also from (74) and (56), and is thus redundant. >r v rjc In analogy to the domain case we obtain > v c; >r v r * >r v rjc which follows from (75) and (56), and is thus redundant. (79) 6.2 Domain and Range Restrictions 63 c jr v >r Is covered by (57). rjc v >r Is covered by (57). ?r v cjr Is covered by (63). ?r v rjc Is covered by (63). c jr v ?r Is translated into R(a)(b); C (a) ) False which is provable if R = xyFalse or C rv cv = xFalse. We thus obtain ?r * cjr v ?r ? * cjr v ?r (80) (81) But we also have to check whether the information in R and C taken together can be incoherent. Clearly, this can only be the case if C contains information about there being no b such that R(a)(b). Thus if C = x:9zR(x)(z ) we obtain: R(a)(b); :9zR(a)(z) ) False This yields the inference rule cv 0 r1:>; r2 v r1 * cjr2 v ?r (82) rjc v ?r In analogy to the domain case we obtain the inference rules rv cv ?r * rjc v ? ?r * rjc v ? (83) (84) 6 ROLE SUBSUMPTION 64 Furthermore we have to check the sequent R(a)(b); C (b) ) False for interactions between R and C . But here we have to find a substitute for which negates the existence of an a such that R(a)(b). We thus assume C x:9zR(z)(x) and obtain: C = R(a)(b); :9zR(z)(a) ) False yielding the inference rule cv 0 r1:>; r2 v r1 r2 jc * v ?r (85) Note that we can also chose to substitute C by x:9zR1 (x)(z ), i.e. without role inversion, and instead assume R = xyR1 (y )(x). We then get the inference rule cv 0 r1 :>; r2 v r1 r2 jc * v ?r (86) r1 u r2 v c jr3 This subsumption translates into the two sequents R1 (a)(b); R2(a)(b) ) R3 (a)(b) R1 (a)(b); R2(a)(b) ) C (a) To prove these sequent we have to assume that either R1 or R2 contain a domain restriction. Assume R1 = xyR4 (x)(y ) ^ C1 (x). Then the strongest way to prove R3 is to use both R4 and R2 , thus letting R3 = xyR5 (x)(y ) ^ R6 (x)(y ): R4 (a)(b) ) R5 (a)(b) R2 (a)(b) ) R6 (a)(b) C1(a) ) C (a) We thus obtain the inference rule r1 v r2; r3 v r4; c1 v c2 * c1 jr1 u r3 v c2 j(r2 u r4) (87) r1 u r2 v r3 jc The proof is analogous to the domain case and yields: r1 v r2; r3 v r4; c1 v c2 * r1 jc1 u r3 v (r2 u r4 )jc2 (88) 6.2 Domain and Range Restrictions 65 c jr1 v r2 u r3 This subsumption translates into C (a); R1(a)(b) ) R2 (a)(b) ^ R3(a)(b) We can thus use C (a) to prove a domain term in R2, and R1 to prove the remaining role term in R2 and R3 . In other words, we can prove the sequent C (a); R4(a)(b); R5(a)(b) ) C1 (a) ^ R6 (a)(b) ^ R3 (a)(b) from the following sequents C (a) ) C1 (a) R4 (a)(b) ) R6 (a)(b) R5 (a)(b) ) R3 (a)(b) We thereby obtain the inference rule r1 v r2; r3 v r4; c1 v c2 * c1 j(r1 u r3 ) v c2 jr2 u r4 (89) r1 jc v r2 u r3 In analogy to the domain case we obtain the inference rule rule r1 v r2; r3 v r4; c1 v c2 * (r1 u r3 )jc1 v r2jc2 u r4 (90) r1 t r2 v c jr3 We obtain the translation R1 (a)(b) _ R2 (a)(b) ) R3 (a)(b) ^ C (a) Splitting this sequent we obtain four sequents to prove R1 (a)(b) R1 (a)(b) R2 (a)(b) R2 (a)(b) ) ) ) ) R3 (a)(b) C (a) R3 (a)(b) C (a) Thus both R1 and R2 must contain domain information and must also support R3 . The resulting inference rule is thus just a special case of (70) and hence redundant. r1 t r2 v r3jc No inference rule in analogy to the domain case. 6 ROLE SUBSUMPTION 66 c jr1 v r2 t r3 This is translated into R1 (a)(b); C (a) ) R2 (a)(b); R3(a)(b) We can prove this non-trivially if we subsitute R1 = xyR4 (x)(y ) _ R5 (x)(y ) and R2 = xyR6 (x)(y ) ^ C1 (x). This yields the sequent R4 (a)(b) _ R5(a)(b); C (a) ) R6 (a)(b) ^ C1(a); R3(a)(b) Applying the _-left rule we obtain R4 (a)(b); C (a) ) R6(a)(b) ^ C1 (a); R3(a)(b) R5 (a)(b); C (a) ) R6(a)(b) ^ C1 (a); R3(a)(b) Applying the ^-right rule twice we finally obtain R4 (a)(b); C (a) R4 (a)(b); C (a) R5 (a)(b); C (a) R5 (a)(b); C (a) ) ) ) ) R6 (a)(b); R3(a)(b) C1(a); R3 (a)(b) R6 (a)(b); R3(a)(b) C1(a); R3 (a)(b) These seqents are provable from the sequents R4 (a)(b) ) R6 (a)(b) C (a) ) C1(a) R5 (a)(b) ) R6 (a)(b) We can thus state the following inference rule r1 v r2; r3 v r4; c1 v c2 * c1 j(r1 t r3) v c2 jr2 t r4 (91) r1 jc v r2 t r3 In analogy to the domain case we obtain the inference rule r1 v r2; r3 v r4; c1 v c2 * (r1 t r3 )jc1 v r2jc2 t r4 (92) : r1 v cjr2 Translates into :R1(a)(b) ) R2(a)(b) ^ C (a) R1 would thus have to contain C as a negated range and the negated R2 . But since the external : will change the internal ^ into a _, we cannot prove this sequent nontrivially. 6.2 Domain and Range Restrictions 67 : r1 v r2jc In analogy to the domain case there is no inference rule. c jr1 v : r2 Translates into R1(a)(b); C (a) ) :R2 (a)(b) To prove this nontrivially R2 had to contain the negative domain C and the negative R1 . Thus letting R2 = xy:R3 (x)(y) ^ :C1 (x) we obtain the sequent R1 (a)(b); C (a) ) :(:R3 (a)(b) ^ :C1 (a)) whose negation normal form is R1 (a)(b); C (a) ) R3 (a)(b); C1(a)) which is provable from R1 (a)(b) ) R3 (a)(b) C (a) ) C1 (a)) We thus obtain the inference rule r1 v r2; c1 v c2 * c1 jr1 v : (: c2 j: r2) (93) r1 jc v : r2 In analogy to the domain case we obtain the rule r1 v r2; c1 v c2 * r1 jc1 v : (: r2j: c2 ) c1 jr1 v c2 jr2 This translates into R1 (a)(b); C1(a) ) R2 (a)(b) ^ C2(a) We thus obtain by the separation lemma R1 (a)(b) ) R2 (a)(b) C1 (a) ) C2 (a) (94) 6 ROLE SUBSUMPTION 68 and hence r1 v r2; c1 v c2 * c1 jr1 v c2 jr2 But if R1 contains itself domain information, i.e. if R1 we can prove the sequent for C2 = xC4 (x) ^ C5(x): = (95) xyR3 (x)(y) ^ C3 (x), R3(a)(b); C3(a); C1(a) ) R2 (a)(b) ^ C4(a) ^ C5 (a) from the sequents R3 (a)(b) ) R2 (a)(b) C3(a) ) C4(a) C1(a) ) C5(a) Note that the above sequent can be translated into DL formulae in two ways, and that we thus obtain two inference rules v r2; c1 v c2; c3 v r1 v r2; c1 v c2 ; c3 v r1 r1 jc1 c4 c4 * * c3 j(c1 jr1) v (c2 u c4 ) jr2 (c1 u c3) jr1 v c4 j(c2 jr2) (96) (97) v r2jc2 In analogy to the domain case we obtain the inference rules r1 v r2 ; c1 r2; c1 v c2 ; c3 v r1 v v r1 v r2; c1 v c2 ; c3 v c2 c4 c4 * * * r1 jc1 v r2 jc2 (r1 jc1 )jc3 v r2 j(c2 u c4) r1j(c1 u c3 ) v (r2jc2 )jc4 (98) (99) (100) 6.3 Role Composition and Inversion We now turn our attention towards role composition (r1 .r2 ) and role inversion (r ). As will become obvious these role-forming operators interact especially with the domain and range operators. We will first derive the rules for inv and then for comp. r1 v r2 Is translated into R1 (a)(b) ) R2 (b)(a) 6.3 Role Composition and Inversion 69 which is provable if either R1 or R2 contains an inverse role, yielding two possible provability conditions: R3 (b)(a) ) R2 (b)(a) R1 (a)(b) ) R4 (a)(b) We thereby obtain the inference rules r1 r1 r1 v v r2 r2 * * r1 r1 v v r2 r2 (101) (102) v r2 Is translated into R1 (b)(a) ) R2 (a)(b) We thus have the same choice as in the previous case and obtain similar inference rules: r1 v r2 r1 v r2 * * r1 r1 v r2 v r2 (103) (104) >r v r Translates into True ) R(b)(a) which is provable if R = xyTrue. We thus obtain the inference rule >r v r * >r v r r (105) v >r Is covered by (57). ?r v r Is covered by (63). r v ?r Translates into R(b)(a) ) False which is provable if R = xyFalse. We thus obtain the inference rule r v ?r * r v ?r (106) 6 ROLE SUBSUMPTION 70 r1 u r2 v r3 Is translated into R1 (a)(b); R2(a)(b) ) R3 (b)(a) To prove this we have to substitute: R3 = xyR6 (x)(y ) ^ R7 (x)(y ), R1 xyR4 (y)(x), R2 = xyR5 (y)(x): R4 (b)(a); R5(b)(a) ) R6 (b)(a) ^ R7 (b)(a) = which is provable from the sequents R4 (b)(a) ) R6 (b)(a) R5 (b)(a) ) R7 (b)(a) We thus obtain the inferenc rule r1 r1 v r2; r3 v r4 * r1 u r3 v (r2 u r4 ) (107) v r2 u r3 Translates into R1 (b)(a) ) R2 (a)(b) ^ R3 (a)(b) In analogy to the previous case we obtain the inference rule r1 v r2; r3 v r4 * (r1 u r3 ) v r2 u r4 (108) r1 t r2 v r3 Translates into R1 (a)(b) _ R2(a)(b) ) R3 (b)(a) We can then substitute R1 = xyR4 (y )(x), R2 = xyR5 (y )(x), and finally R3 = xyR6 (x)(y) _ R7 (x)(y) thus having to prove R4 (b)(a) _ R5(b)(a) ) R6(b)(a); R7(b)(a) which is, according to _-left, reducible to R4 (b)(a) ) R6 (b)(a); R7(b)(a) R5 (b)(a) ) R6 (b)(a); R7(b)(a) We thus obtain the prove conditions R4 (b)(a) ) R6 (b)(a) R5 (b)(a) ) R7 (b)(a) and thus the inferenc rule r1 v r2; r3 v r4 * r1 t r3 v (r2 t r4 ) (109) 6.3 Role Composition and Inversion r3 71 v r1 t r2 Translates into R1 (b)(a) ) R2 (a)(b); R3(a)(b) In analogy to the previous case we obtain the inference rule r1 v r2; r3 v r4 * (r1 t r3 ) v r2 t r4 (110) : r1 v r2 Gives which is provable if R1 :R1(a)(b) ) R2(b)(a) = xyR3 (y)(x) and R2 = xy:R4 (x)(y): :R3(b)(a) ) :R4(b)(a) We thus obtain the inference rule r1 r1 v r2 * : r1 v (: r2 ) (111) v : r2 Translates into R1(b)(a) ) :R2 (a)(b) In analogy to the previous case we obtain the inference rule r1 v r2 * (: r1 ) v : r2 (112) c jr1 v r2 Translates into R1 (a)(b); C (a) ) R2 (b)(a) The C (a) can be used to prove information stemming from a range restriction in R2 . Note that the arguments in R1 and R2 are inverted, and that we thus have to substitute R2 = xyR3 (y )(x) ^ C1(y ) yielding the sequent R1 (a)(b); C (a) ) R3 (a)(b) ^ C1 (a) which is provable from the sequents R1 (a)(b) ) R3 (a)(b) C (a) ) C1 (a) This gives the inference rule r1 v r2; c1 v c2 * c1 jr1 v (r2 jc2 ) (113) 6 ROLE SUBSUMPTION 72 r1 v cjr2 Is translated into R1 (b)(a) ) R2 (a)(b); C (a) In analogy to the previous case we obtain the inference rule r1 v r2; c1 v c2 * v c2 jr2 (r1 jc1 ) (114) r1 jc v r2 In analogy to the domain case we obtain the inference rule r1 r1 v r2; c1 v c2 * r1 jc1 v (c2 jr2 ) (115) v r2jc In analogy to the domain case we obtain the inference rule r1 r1 v r2; c1 v c2 * (c1 jr1 ) v r2jc2 (116) v r2 Translates into R1 (b)(a) ) R2 (b)(a) which can be reconverted into ) 8x8yR1(x)(y) ! R2(x)(y) We thus obtain the inference rule r1 v r2 * r1 v r2 r1 v r2 .r3 Translates into R1 (a)(b) ) 9zR2(a)(z) ^ R3 (z)(b) for which no non-trivial proof exists. (117) 6.3 Role Composition and Inversion 73 r1 .r2 v r3 Translates into 9zR1(a)(z) ^ R2(z)(b) ) R3(a)(b) Again there is no non-trivial proof for this sequent. >r v r1.r2 Translates into True ) 9zR1(a)(z) ^ R2 (z)(b) which is provable if we substitute R1 = xyTrue and R2 = xyTrue, giving True ) 9zTrue We thus obtain the inference rule >r v r1; >r v r2 * >r v r1 .r2 (118) r1 .r2 v >r Is covered by (57). ?r v r1.r2 Is covered by (63). r1 .r2 v ?r Translates into 9zR1(a)(z) ^ R2(z)(b) ) False which is provable form one of the following sequents: R1(a)(c) ) False R2 (c)(b) ) False We thus obtain the inference rules: r1 r2 v ?r * v ?r * r1 .r2 r1 .r2 v ?r v ?r (119) (120) 6 ROLE SUBSUMPTION 74 But we also have to check whether information in R1 and R2 can interact in a way which makes this sequent provable. This is clearly the case if R1 and R2 contain incompatible information about z . If we substitute R1 = xyR3 (x)(y ) ^ C1(y ) and R2 = xyR4 (x)(y ) ^ C2 (x) we obtain 9zR3(a)(z) ^ C1(z) ^ R4(z)(b) ^ C2(z) ) False which is provable if we have an axiom C1 (a); C2(a) ) False We thus obtain the inference rule c1 u c2 v ? * (>rjc1 ).(c2 j>r) =: ?r r1 u r2 v r3 .r4 Translates into R1 (a)(b); R2(a)(b) ) 9zR3(a)(z) ^ R4 (z)(b) for which no non-trivial proof exists. r1 .r2 v r3 u r4 9zR1(a)(z) ^ R2(z)(b) ) R3(a)(b) ^ R4(a)(b) No non-trivial proof exists. r1 t r2 v r3 .r4 Translates into R1(a)(b) _ R2 (a)(b) ) 9zR3(a)(z) ^ R4 (z)(b) for which no non-trivial proof exists. r1 .r2 v r3 t r4 9zR1(a)(z) ^ R2(z)(b) ) R3(a)(b); R4(a)(b) No non-trivial proof exists. (121) 6.3 Role Composition and Inversion 75 : r1 v r2.r3 Translates into :R1(a)(b) ) 9zR2(a)(z) ^ R3(z)(b) for which no non-trivial proof exists. r1 .r2 v : r3 9zR1(a)(z) ^ R2(z)(b) ) :R3(a)(b) Again, no non-trivial proof exists. c jr1 v r2.r3 Translates into R1(a)(b); C (a) ) 9zR2 (a)(z) ^ R3 (z)(b) which is provable if we substitute R1 = xy 9zR4 (x)(z ) ^ R5 (z )(y ) and also R2 = xyR6 (x)(y) ^ C1 (x). We then obtain the sequent 9zR4(a)(z) ^ R5(z)(b); C (a) ) 9zR6(a)(z) ^ C1(a) ^ R3(z)(b) Applying 9-left and ^-left yields R4(a)(c); R5 (c)(b); C (a) ) 9zR6(a)(z) ^ C1(a) ^ R3 (z)(b) We now have to choose an appropriate instantiation for the existentially quantified z on the right-hand side. Obviously c is the correct choice: R4 (a)(c); R5(c)(b); C (a) ) R6 (a)(c) ^ C1(a) ^ R3 (c)(b) This sequent is provable from the sequents R4 (a)(c) ) R6 (a)(c) R5 (c)(b) ) R3 (c)(b) C (a) ) C1 (a) We thus obtain the inference rule r1 v r2; r3 v r4; c1 v c2 * c1 j(r1 .r3 ) v c2 jr2 .r4 (122) 6 ROLE SUBSUMPTION 76 r1 .r2 v c jr3 Translates into R1 (a)(c); R2(c)(b) ) R3 (a)(c) ^ C (a) In analogy to the previous case we obtain the inference rule r1 v r2; r3 v r4; c1 v c2 * c1 jr1 .r3 v c2 j(r2.r4) (123) r1 jc v r2.r3 In analogy to the domain case we obtain the equivalence r1 v r2; r3 v r4; c1 v c2 * c1 j(r1 .r3) v c2 jr2 .r4 (124) r1 .r2 v r3jc In analogy to the domain case we obtain the inference rule r1 r1 v r2; r3 v r4; c1 v c2 * r1jc1 .r3 v (r2.r4)jc2 (125) v r2.r3 Translates into R1 (b)(a) ) 9zR2(a)(z) ^ R3 (z)(b) In order to prove this we have to split R1 into a composition, for example by R1 = xy9zR4 (x)(z) ^ R5(z)(y). Note that on the left-hand side we thus have a “chain” from b to a. To get a similar chain on the right-hand side we have to inverse both R2 and R3 , thus substituting R2 = xyR6 (y )(x) and R3 = xyR7 (y )(x). This gives the sequent 9zR4(b)(z) ^ R5(z)(a) ) 9zR6(z)(a) ^ R7(b)(z) Application of 9-left, ^-left, and 9-right yield R4(b)(c); R5 (c)(a) ) R6 (c)(a) ^ R7(b)(c) which is provable from R4(b)(c) ) R7 (b)(c) R5(c)(a) ) R6 (c)(a) We thus obtain the inference rule r1 v r2 ; r3 v r4 * (r1 .r3 ) v r4 .r2 (126) 6.3 Role Composition and Inversion 77 r1 .r2 v r3 In analogy to the previous case we obtain the inference rule r1 v r2; r3 v r4 * r1 .r3 v (r4.r2 ) (127) r1 .r2 v r3 .r4 Translates into 9zR1(a)(z) ^ R2(z)(b) ) 9zR3(a)(z) ^ R4(z)(b) Applying 9-left, ^-left, 9-right, and ^-right, we obtain two sequents R1 (a)(c); R2(c)(b) ) R3(a)(c) R1 (a)(c); R2(c)(b) ) R4(c)(b) which are provable from the axioms R1 (a)(c) ) R3 (a)(c) R2 (c)(b) ) R4 (c)(b) We thus obtain the inference rule * r1 .r2 v r3 .r4 (128) Note that we can also substitute R1 = xy 9wR5 (x)(w) ^ R6 (w)(y ), R3 = xyR7 (x)(y), and R4 = xy9wR8 (x)(w) ^ R9 (w)(y). The resulting sequent r1 v r3 ; r2 v r4 is 9z9wR5(a)(w) ^ R6(w)(z) ^ R2(z)(b) ) 9zR7(a)(z) ^ 9wR8(z)(w) ^R9(w)(b) Applying first 9-left and ^-left twice, and then 9-right twice, we obtain R5 (a)(c); R6(c)(d); R2 (d)(b) ) 9zR7(a)(z) ^ 9wR8(z)(w) ^ R9(w)(b) R5 (a)(c); R6(c)(d); R2 (d)(b) ) R7(a)(c) ^ R8 (c)(d) ^ R9(d)(b) This sequent is provable from R5 (a)(c) ) R7 (a)(c) R6 (c)(d) ) R8 (c)(d) R2 (d)(b) ) R9 (d)(b) Obviously the above sequent is translatable into two DL formulae, thus giving two inference rules: r1 r1 v r2; r3 v r4; r5 v v r2; r3 v r4; r5 v r6 r6 * * (r1 .r3 ).r5 v r2.(r4 .r6) r1.(r3 .r5) v (r2 .r4 ).r6 (129) (130) 6 ROLE SUBSUMPTION 78 r r >r (56) (57) ?r r1 u r2 r1 t r2 :r c jr rjc (58) (59) (60) (74) (75) (101) (102) (61) (62) (78) (79) (105) (68) (69) (87) (88) (107) (71) (72) >r ?r r1 u r2 (64) (65) (70) :r (60) rjc r r1 .r2 r1.r2 (118) (63) r1 t r2 c jr r (76) (77) (103) (104) (66) (73) (80) (81) (82) (83) – (86) (106) (119) (120) (121) (67) (69) (89) (109) (72) (91) (111) (93) (90) (92) (94) (108) (110) (112) (95) (96) (97) (113) (122) (98) (99) (100) (115) (124) (114) (116) (117) (126) (123) (125) (127) (128) (129) (130) Figure 9: Inference rules for role subsumption. The operator in the rows is the outmost operator of the subsumed role term, whereas the operator in the columns is the outmost operator of the subsuming role term. 79 7 Conclusion and Future Work We have presented a systematic approach for deriving DL inference rules via the Sequent Calculus. Whereas this approach is feasible for DL fragments translatable into plain First-Order Logic, derivations for a fragment containing numerical operators turn out to be rather complex. Furthermore, the impact of complex roles on concept subsumption and the derivation of inference rules for object recognition remain to be investigated. We see our work as a solid basis for the development of flexible DL systems. To continue this work it would be necessary to devise adequate normalforms and to transform our inference rules into corresponding normalization and comparison rules. This has already been done for a restricted fragment in [Royer, Quantz 92, Sect. 5]. In this section we will briefly sketch those issues concerning inference rules which we did not cover in the previous sections. We begin with the impact of complex roles on concept subsumption, then consider the task of deriving inference rules for object recognition, and finally address the problem of how to construct flexible DL systems on the basis of the derived inference rules. 7.1 The Impact of Complex Roles on Concept Subsumption To take into account the complex role-forming operators investigated in the previous section we have to reconsider the analysis of the constructs 8r:c, 9r:c, n r:c, n r:c, and r:S , since in Sections 4 and 5 we have assumed that the roles r are not complex. In the following we will consider for each of these constructs the impact of each role-forming opererator. We will not execute a complete case analysis, however, and we have thus no proof for the completeness of the inference rules presented in this section. Furthermore we restrict to a simple presentation of the inference rules omitting all redundancies. all A term containing a value restriction for the top role is subsumed by this value restriction. c1 v c2 * 8>r:c1 v c2 (131) A value restriction for the bottom role is redundant since there can be no fillers for this role anyhow: * > v 8?r:c (132) 7 CONCLUSION AND FUTURE WORK 80 The value restriction of a role disjunction is implied by the disjunction of their respective value restrictions. c1 t c2 v c3; r3 v r1 t r2 * 8r1:c1 u 8r2:c2 v 8r3:c3 (133) Value restrictions subsuming the range of a role are redundant, i.e. the range of a role can be taken as the “default” value restriction. * > v 8rjc:c (134) As already mentioned in the previous section value restrictions for role compositions can be transformed into embedded value restrictions and vice versa. * 8r1.r2 :c =: 8r1 :(8r2 :c) (135) A value restriction for a role chain r.r is subsumed by that value restriction or it has no fillers for r: * 8r.r :c v c t 0 r:> (136) some An existential restriction for the top role is redundant, an existential restriction for the bottom role is inconsistent: * > v 9>r:c * 9?r:c v ? (137) (138) An existential restriction for a role is subsumed by the domain of that role. * 9cjr:> v c (139) As for value restrictions existential restrictions for role compositions can be transformed into embedded existential restrictions and vice versa. * 9r1.r2 :c =: 9r1 :(9r2 :c) (140) atleast We obtain rules corresponding to the ones derived for the some operator: * > v n >r:c * n ?r:c v ? * n c jr:> v c (141) (142) (143) An embedded minimum restriction gives a minimum restriction for role composition: * m r1:(n r2 :c) v n r1 .r2:c (144) 7.1 The Impact of Complex Roles on Concept Subsumption 81 atmost Due to the negation duality between atleast and atmost both operators behave symmetrically wrt redundancy and inconsistency. Thus a maximum restriction is redundant for the bottom role and can be inconsistent for the top role: * 0 >r:c v ? * > v n ?r:c (145) (146) A combination of a maximum restriction and a maximum restriction embedded in a value restriction gives an upper bound for role compositions: * m r1 :> u 8r1:(n r2:c) v m n r1 .r2 :c (147) fills fills terms are redundant for the top role and inconsistent for the bottom role: * > v >r :S * ?r :S v ? (148) (149) Fillers occurring at two roles are also fillers for the conjunction of these roles: S3 = S1 \ S2 * r1 :S1 u r2 :S2 v r1 u r2:S3 (150) Negation of fills terms is equivalent to a filler term for the negated role, and fillers occurring at two disjoint roles yield inconsistency. * (:r):o =: : (r:o) S1 \ S2 6= ; * r:S1 u :r:S2 v ? (151) (152) fills terms for a role are subsumed by the domain of that role. * c jr:S v c (153) Similarly, concepts which are subsumed by some concepts and have fillers for a role, also have the fillers for the role with the domain being that concept: * c u r:o v c jr:o (154) fills terms for role compositions are subsumed by an existential restriction with an embedded atomic fills term: o 2 S * r1:r2:S v 9r1:(r2:o) (155) A filler for an inverse role implies an existential restriction: * r :o v 9r :(9r:(r :o)) (156) 7 CONCLUSION AND FUTURE WORK 82 7.2 Object Recognition Whereas so far we have only considered subsumption formulae, we will now present inference rules required for object recognition, i.e. for deriving description o :: c. Note that DL systems generally do not use object information for determining subsumption. We will therefore not consider the impact of descriptions on subsumption formulae in the following. Formally it would thus be more adequate to define the entailment relation for subsumptions and descriptions separately, e.g. as Γ j= t1 v t2 iff all models of the subsumption formulae in Γ are models of t1 v t2 ; Γ j= o :: c iff all models of Γ are models of o :: c. First we need to establish a connection between object recognition and concept subsumption in general: o :: c1; c1 v * c2 o :: c2 (157) The we have to analyze the various concept-forming operators for the existence of object-specific roles. Obviously, every object is an instance of the top concept:23 * o :: > (158) Different formulae describing the same object are interpreted conjunctively, therefore they can be merged into a single description by using concept conjunction: o :: c1; o :: c2 * ) o :: c1 u c2 (159) There are two obvious rules for instanceship wrt extensional concepts, namely o2S o 62 S * * o :: o :: S_ : S_ (160) (161) The following rule, usually called forward propagation, captures the connection between value restrictions and typing of role fillers. o1 :: 8r:c; o1 :: r:o2 * o2 :: c (162) Note that this rule can be transformed into the rules o1 :: 8r:c; o2 :: : c o1 :: r:o2 ; o2 :: c * * o1 :: : (r:o2 ) o1 :: 9r:c (163) (164) The second rule can be further generalized to o :: r:fo1; : : : ; on g; o1 :: c; : : :; on :: c 23 * o :: n r:c (165) Symmetrically, no object is an instance of the bottom concpet. We will not address the issue of inconsistent descriptions in the following, however. 7.3 Flexible Inference Strategies 83 We also need a rule for taking into account the impact of role-filler types on roles containing range restrictions: o1 :: r:o2 ; o2 :: c o1 :: rjc :o2 * (166) Note that the corresponding rule for domain is redundant since we already have the subsumption rule * c u r:o v c jr:o Finally we have two rules for fillers of role compositions and inverse roles: o1 :: r1 :o2; o2 :: r2 :o3 o1 :: r:o2 * * o1 :: r1:r2 :o3 o2 :: r :o1 (167) (168) Obviously these rules are not complete for object recognition. They are incomplete with respect to case reasoning, for example, which can be easily checked by considering the examples presented in [Donini et al. 92] and [Royer, Quantz 94]. In order to capture the case reasoning required in these examples we would have to introduce disjunction of descriptions. The following rule, for example, introduces such disjunctions: o :: 8r:fo1 ; : : :; on g_ ; o :: 9r:c * o1 :: c _ : : : _ on :: c which could then be used by a rule as o :: r:fo1 ; : : :; on g; o1 :: c _ : : : _ on :: c * o :: 9r:c Since case reasoning is notoriously complex, it has been suggested to weaken the semantics in order to avoid these complexities [Donini et al. 92, Royer, Quantz 94]. 7.3 Flexible Inference Strategies To conclude our investigation on inference rules for DL we will now sketch their usefulness for the implementation of DL systems providing flexible inference strategies. As mentioned in Section 2 most existing DL systems follow the normalizecompare approach. In order to determine whether t1 v t2 both terms are first normalized and then structurally compared. One advantage of this approach is that the normalforms of terms can be cached and reused in later comparisons. Thus information is precompiled in order to speed up query answering. Given a set of inference rules, most rules can be used for normalization as well as for comparison. Consider, for example, the rule c1 u c2 v c3; r2 v r1; r2 v r3 * 8r1 :c1 u 9r2:c2 v 9r3 :c3 7 CONCLUSION AND FUTURE WORK 84 This rule can be immediately used for comparison between two concepts—if a concept contains the term 9r3:c3 , we have to check whether the other concept contains the terms 8r1 :c1 and 9r2:c2 and then test the subsumption relations between the respective roles and concepts. For normalization, however, we would rather use the following format: N 7! 9r1:c1; 8r2:c2 7! 9r1:c1 u c2 Intuitively this rule says that the term 9r1 :c1 u c2 should be included into a normalform whenever 9r1 :c1 and 8r2 :c2 are contained in the normalform and r1 v r2 r1 v r2 holds. In [Royer, Quantz 92, Sect. 5] we have shown that a particular partitioning of the rules into normalization and comparison rules yields vivid normal forms and is therefore complete. Due to the wide range of applications in which DL systems can be used, however, a fixed inference strategy seems problematic. Whereas a precompilation of information might be advantageous in Information Technology in order to guarantee fast retrievals, in Natural Language Processing it seems more adequate to perform only limited normalizations. The basic idea of flexible inference strategies is thus to explicitly represent most of the inference rules in a normalization and a comparison format, and then to allow the choice of different combinations of normalization and comparison rules. This would also allow to switch off rules completely if they are not required in a particular application.24 The main theoretical problem is then to prove completeness and termination of the different possible combinations of normalization and comparison rules. Acknowledgements During our work on inference rules we have benefitted from discussions with Franz Baader, Alex Borgida, Martin Fischer, Bob MacGregor, Albrecht Schmiedel, and Philippe Volle. 24 Obviously the choice of a particular inference strategy for a given application is supposed to be made by the developer of the DL system and not by the knowledge engineer using the system. REFERENCES 85 References [Apt et al. 86] K.Apt, H.Blair, A.Walker, “Toward a theory of declarative knowledge”, in Workshop on Foundations of Deductive Databases, 1986 [Baader 90] F. Baader, “Terminological Cycles in KL-ONE-Based Knowledge Representation Languages”, in AAAI’90, 621–626 [Baader, Hollunder 92] F. Baader, B. Hollunder, “Embedding Defaults into Terminological Knowledge Representation Formalisms”, in [Nebel et al. 92], 306– 317 [Baader, Hollunder 93] F. Baader, B. Hollunder, How to Prefer More Specific Defaults in Terminological Default Logic, IJCAI 93, 669–674 [Baader et al. 92] F. Baader, B. Hollunder, B. Nebel, H.J. Profitlich, E. Franconi, “An Empirical Analysis of Optimization Techniques for Terminological Representation Systems”, in [Nebel et al. 92], 270–281 [Bobrow, Collins 75] D.G. Bobrow, A.M. Collins (eds), Representation and Understanding: Studies in Cognitive Science, New York: Academic Press, 1975 [Borgida 92] A.Borgida, “From Type systems to Knowledge representation: Natural Semantics Specifications for Description Logics”, Int. Jour. of Intelligent and Cooperative Information Systems 1, 93–126, 1992 [Brachman 77] R.J. Brachman, “What’s in a Concept: Structural Foundations for Semantic Networks”, International Journal of Man-Machine Studies 9, 127– 152, 1977 [Brachman 79] R.J. Brachman, “On the Epistemological Status of Semantic Networks”, in [Findler 79], 3–50 [Brachman, Levesque 84] R.J. Brachman, H. Levesque, “The Tractability of Subsumption in Frame-Based Description Languages”, AAAI’84, 34–37 [Brachman, Schmolze 85] R.J. Brachman, J.G. Schmolze, “An Overview of the KL-ONE Knowledge Representation System” Cognitive Science 9, 171–216, 1985 [Brachman et al. 91] R. Brachman, D.L. McGuiness, P.F. Patel-Schneider, L. Alperin Resnick, A. Borgida, “Living with CLASSIC”, in [Sowa 91] [Cas91] J.Castaing, “A New Formalisation of Subsumption in Frame-Based Representation System”, in KR’91, 78–88. [Collins, Quillian 69] A. Collins, M.R. Quillian, “Retrieval Time from Semantic Memory”, Journal of Verbal Learning and Verbal Behavior 8, 241–248 1969 [Dionne et al. 93] R. Dionne, E. Mays, F. Oles, “The Equivalence of ModelTheoretic and Structural Subsumption in Description Logics”, to appear in IJCAI’ 93 [Donini et al. 91a] F.M. Donini, M. Lenzerini, D. Nardi, W. Nutt, “The Complexity of Concept Languages”, KR’91, 151–162 [Donini et al. 91b] F.M. Donini, M. Lenzerini, D. Nardi, W. Nutt, “Tractable Concept Languages” IJCAI-91, 458–463 86 REFERENCES [Donini et al. 92] F.M. Donini, M. Lenzerini, D. Nardi, A. Schaerf, W. Nutt, “Adding Epistemic Operators to Concept Languages”, in [Nebel et al. 92], 342– 353 [Etherington et al. 89] D. Etherington , A. Borgida, R. Brachman, “Vivid Knowledge and Tractable Reasoning”, IJCAI’ 89, [Findler 79] N.V. Findler (Ed.), Associative Networks: Representation and Use of Knowledge by Computers, New York: Academic Press, 1979 [Fischer 92] M. Fischer, The Integration of Temporal Operators into a Terminological Representation System, KIT-Report 99, Technische Universität Berlin, 1992 [Franconi 92] E. Franconi, “Collective Entities and Relations in Concept Languages”, AAAI Fall Symposium’92, Issues in Description Logics: Users meet Developers, 31–35 [Gabbay, Guenthner 83] D. Gabbay, F. Guenthner (eds), Handbook of Philosophical Logic, Vol. I: Elements of Classical Logic, Dordrecht: Reidel, 1983 [Gallier 86] J.Gallier, Logic for Computer Science: Foundations of Automatic Theorem Proving, New York: Harper and Row, 1986. [Girard 87] J.Y. Girard, “Linear Logic”, Theoretical Computer Science 50, 1–102, 1987 [Girard et al. 89] J.Y. Girard, Y. Laffont, P. Taylor, Proofs and Types, Cambridge: Cambridge University Press, 1989 [Hayes 77] P.J. Hayes, “In Defense of Logic”, IJCAI-77, 559–565 [Hayes 80] P.J. Hayes, “The Logic of Frames”, in [Metzing 80], 46–61 [Heinsohn 91] J. Heinsohn, “A Hybrid Approach for Modeling Uncertainty in Terminological Logics”, in [Kruse, Siegel 91], 198–205 [Heinsohn, Owsnicki-Klewe 88] J. Heinsohn, B. Owsnicki-Klewe, “Probabilistic Inheritance and Reasoning in Hybrid Knowledge Representation Systems”, in [Hoeppner 88], 51–60, [Hoeppner 88] W. Hoeppner (Ed.), Proceedings of GWAI’88, Berlin: Springer, 1988 [Hollunder, Nutt 90] B. Hollunder, W. Nutt, “Subsumption Algorithms for Concept Languages”, DFKI: Research Report RR-90-04, 1990 [Hoppe et al. 93] T. Hoppe, C. Kindermann, J.J. Quantz, A. Schmiedel, M. Fischer, BACK V5 Tutorial & Manual, KIT Report 100, Technische Universität Berlin, 1993 [Hors, Rousset 93] P. Hors, M.C. Rousset, “Consistency of Structured Knowledge : a formal framework based on Description Logics”, personal communication, paper submitted to EUROVAV. [Jones 90] C. Jones, Systematic Software Development using VDM, Prentice Hall, 1990 [Kindermann 90] C. Kindermann, “Class Instances in a Terminological Framework–an Experience Report”, in [Marburger 90], 48–57 REFERENCES 87 [Kortüm 93] G. Kortüm, How To Compute 1+1? A Proposal for the Integration of External Functions and Computed Roles into BACK, KIT Report 103, Technische Universität Berlin, 1993 [Kowalski, van Emden 76] R. Kowalski, M.H. van Emden, “The Semantics of Predicate Logic as a Programming Language”, Journal of ACM 23(4), 1976 [Kruse, Siegel 91] R. Kruse, P. Siegel (eds), Symbolic and Quantitative Approaches to Uncertainty, Proceedings of the European Conference ECSQAU, Berlin: Springer, 1991 [MacGregor 91] R. MacGregor, “Using a Description Classifier to Enhance Deductive Inference”, in Proceedings Seventh IEEE Conference on AI Applications, 141–147, Miami, Florida, February, 1991, [Marburger 90] H. Marburger (Ed.), Proceedings of GWAI-90, Berlin: Springer, 1990 [Metzing 80] D. Metzing (Ed.), Frame Conceptions and Text Understanding, Berlin: de Gruyter, 1980 [Minsky 68] M. Minsky (Ed.), Semantic Information Processing, Cambridge (Mass): MIT Press, 1968 [Minsky 75] M. Minsky, “A Framework for Representing Knowledge”, in [Winston 75], 211–277 [Napoli 93] A. Napoli (Ed.), Proceedings of the IJCAI’93 Workshop on ObjectBased Representation Systems, 1993 [Nebel 90] B. Nebel, Reasoning and Revision in Hybrid Representation Systems, Berlin: Springer, 1990 [Nebel et al. 92] B. Nebel, C. Rich, W. Swartout, Principles of Knowledge Representation and Reasoning: Proceedings of the Third International Conference (KR92), San Mateo: Morgan Kaufmann, 1992 [Owsnicki-Klewe 88] B. Owsnicki-Klewe, “Configuration as a Consistency Maintenance Task”, in [Hoeppner 88], 77–87 [Patel-Schneider 87] P.F. Patel-Schneider, An Approach to Practical ObjectBased Knowledge Representation, Technical Report 68, Schlumberger Palo Alto Research, 1987 [Paulson 87] L. Paulson, Logic and Computation: interactive proofs with Cambridge LCF, Cambridge Press, 1987 [Pearce, Wagner 92] D. Pearce, G. Wagner (eds), Logics in AI, Proceedings of JELIA’92, Berlin: Springer, 1992 [Quantz 90] J. Quantz, Modeling and Reasoning with Defined Roles in BACK, KIT-Report 84, Technische Universität Berlin, 1990 [Quantz 92] J.J. Quantz, “How to Fit Generalized Quantifiers into Terminological Logics”, ECAI-92, 543–547 [Quantz, Royer 92] J.J. Quantz, V. Royer, “A Preference Semantics for Defaults in Terminological Logics”, in [Nebel et al. 92],294–305 88 REFERENCES [Quantz, Ryan 93] J.J. Quantz, M. Ryan, Preferential Default Description Logics KIT-Report 110, Technische Universität Berlin, 1993 [Quillian 68] M.R, Quillian, “Semantic Memory”, in [Minsky 68], 216–270 [Royer, Quantz 92] V. Royer, J.J. Quantz, “Deriving Inference Rules for Terminological Logics”, in [Pearce, Wagner 92], 84–105 [Royer, Quantz 93] V. Royer, J.J. Quantz, “Axiomatization of Description Logics”, in [Napoli 93], 67–79 [Royer, Quantz 94] V. Royer, J.J. Quantz, “On Intuitionistic Query Answering in Description Bases”, Submitted for Publication [Schild 89] K. Schild, Towards a Theory of Frames and Rules, KIT Report 76, Technische Universität Berlin, 1989 [Schild 91] K. Schild, A Tense-Logical Extension of Terminological Logics, KIT Report 92, Technische Universität Berlin, 1991 [Schmiedel 90] A. Schmiedel, “A Temporal Terminological Logic”, AAAI’90, 640–645, 1990 [Schmolze, Israel 83] J. Schmolze, D. Israel, “KL-ONE: Semantics and Classification”, in BBN Annual Report, Rep.No. 5421, 27–39, 1983 [Sowa 91] J. Sowa (Ed.), Principles of Semantic Networks: Explorations in the Representation of Knowledge, 1991 [Sundholm 83] G. Sundholm, “Systems of Deduction”, in [Gabbay, Guenthner 83], 133–188 [Winston 75] P.H. Winston (Ed.), The Psychology of Computer Vision, New York: McGraw-Hill, 1975 [Woods 75] W.A. Woods, “What’s in A Link: Foundations for Semantic Networks” in [Bobrow, Collins 75], 35–82 89 A Proofs for Numerical Operators In the following we assume that all the numerical restrictions participate effectively in the proof (the formulae obtained by eliminating some of the numerical restriction terms are assumed to be not provable). We also asume that all the quantifier elimination steps have already been performed. As explained at the beginning of Section 5, we will only consider all, atleast, and atmost in the following, since some is just a special case of atleast. A.1 Formulae with Only One Creative Term As shown in Section 5.2, no inessential cuts need to be considered during the proof search. By the property of homogeneous lifting, no proof possibility arises between oneof terms and role restrictions (except by propositional proofs). Thus the possibly provable subsumption formulae consist of a left atleast together with one or several right atleast, left atmost, or left all. Note that the right atleast can be rewritten as a left atmost, which leaves only two cases to check. Negation duality between atmost and atleast We first examine the provability conditions of formulae of the form p r1:c1 u q r2:c2 v ? By Proposition 3, we know that the sequent is provable iff its instantiation closure is provable. This gives a first provability condition: q + 1 p. (Otherwise, there is no injective instantiation function for atmost, thus the formula is provable only if p r1 :c1 is inconsistent, which we suppose not to be the case). We get to prove a sequent like: ^ii==1n (r1(a; bi) ^ c1(bi)); dif (~b); 8~x(^jj==n1 (r1(a; xj ) ^ c1(xj )) ! equ(~x) ) ; n where ^jj = x) is an abbreviation denoting the complete =1 (r2 (a; xj ) ^ c2 (xj )) ! equ(~ q:r2:c2 )(~x) all the injective instantiation functions ~x upon ~b. list of terms ( Necessarily, assuming normal proofs, the original sequent is provable iff ^ii==n1 (r1(a; bi) ^ c1(bi)); dif (~b); (^jj==1n (r2(a; xj ) ^ c2(xj )) ! equ(~x) ) ; atmost The proof continuation is necessarily propositional. Besides the standard steps for eliminating the ^-connectors, which are assumed to be already done, the next step can only be an elimination of !. Let us assume that the term on which !-left is applied is the particular instantiation of the ( ::)(x~0). One gets a first sequent to prove: atmost ^ii n1 (r1(a; bi) ^ c1(bi)); dif (~b); equ(~x) ) ; = = A PROOFS FOR NUMERICAL OPERATORS 90 which is trivially valid by the choice of ~x itself. Then, the second sequent to prove is: ^ii n r a; bi) ^ c1 (bi)); dif (~b) ) ^jj = =1 ( 1 ( n r a; xj ) ^ c2 (xj )) = =1 ( 2 ( It is straightforward to deduce the proof conditions c1 v c2 and r1 v r2. If several instantiated terms are unfolded during the proof, with different sets ~x, then by an easy induction, one easily checks that the same proof conditions arise. With about the same kind of manipulations, one obtaines easily the proof of the formula: q < p; c2 v c1 ; r2 v * > v p r1:c1 t q r2 :c2 r1 (39) Similarly, the inconsistency schema between one atleast term and and one all term is derived very easily. c1 u c2 v ?; r1 v * n r1:c1 u 8r2 :c2 v ? r2 (41) The preceding inference rules establish not only the inconsistency condition between atmost and atleast, but also the negation duality between atmost and atleast. One important outcome is that in the following we can restrict to inconsistency formulae i.e. formulae with inconsistent succedent ? (alternatively, sequents with empty succedents). Indeed, the former result together with the negation principles for the other role restrictions all and some induce the following lemma. Lemma 5 Every subsumption formula in TL= can be rewritten into an equivalent inconsistency formula, provided that its succedent is homogeneously quantified. Proof: The upper-level quantified terms in subsumption formulae correspond to role restrictions. By the Negation and De Morgan rules, one can rewrite any formula having a role restriction in the succedent into an equivalent formula having the corresponding dual term in the antecedent. 2 Below are the rules capturing inconsistency between atleast and atmost (38), and between atleast and all(41, partition between between atleast and atmost(39), the negation duality between atmost and atleast (35,36), and monotonicity for atleast (37) and for atmost(40): q < p; c1 v c2 ; r1 v c2 u c1 v ?; r1 v q + 1 p; c2 v c1 ; r2 v r2 r2 r1 * q r2 :c2 u p r1:c1 v ? * 8r2 :c2 u p r1:c1 v ? * > v q r2:c2 t p r1 :c1 (38) (41) (39) A.1 Formulae with Only One Creative Term m=n 1 m=n+1 q p; c1 v c2 ; r1 v r2 p q; c2 v c1 ; r2 v r1 * * * * 91 :n r:c =: m r:c : n r:c =: m r:c p r1:c1 v q r2:c2 p r1:c1 v q r2:c2 (35) (36) (37) (40) Modus Ponens Now we examine inconsistency formula of the form atmost(: : : ) u atleast(: : : ) u all(: : : ) v ? by assuming that no strict subformula is provable. By Proposition 3 we consider the instantiation closure of the sequent corresponding to the above formula. We then get a sequent of the form: a; bi) ^ c1 (bi)); dif (~b) j =n ^j=1 (r2(a; xj ) ^ c2(xj )) ! equ(~x); r3(a; y) ! c(y) ^ii n r = =1 ( 1 ( ) ; where by convention the terms instantiated by ~x and y represent the list of all possible corresponding instantiations, with ~x an injective substitution into ~b and y an element of ~b . This gives the first condition q + 1 p (otherwise, ~x cannot be injective and the proof is independent of q r2 :c2). We will use in the following p to denote the formula ^ii= =1 (r1 (a; bi )). Now the proof search proceeds by choosing a (correctly) instantiated atmost term and eliminating the implication connector.25 One gets one sequent of the form ; r3 (a; y) ! c3(y); equ(~x) ) ; which is trivially valid because of the choice of ~x (every equality is of the form bi = bj and thus is provable with the corresponding inequality in dif (~b)). One gets another sequent of the form: ; r3 (a; y) ! c3 (y) ) ^jj n r a; xj ) ^ c2(xj )) = =1 ( 2 ( Elimination of all the conjunction connectors provides the sequents ; r3 (a; y) ! c3 (y) ) ; r3 (a; y) ! c3 (y) ) r2 (a; xj ) c2 (xj ) If there exists one xj such that both sequents are provable without one left expression (r3 (a; y ) ! c3 (y )), then the proof reduces to a simple inconsistency schema between p r1 :c1 and q r2 :c2 . We thus assume the contrary; in particular c1 6v c2 . 25 Note that the other terms remain in the formula—for the sake of brevity, we omit to write them explicitly. A PROOFS FOR NUMERICAL OPERATORS 92 Then for all the xj , one needs to unfold some expression of the list (r3(a; y ) ! c3 (y )). Let us call yj the particular instantiation chosen for y in the second sequent. One gets to prove the sequents: ; c3 (y ) ) c2 (xj ) and ) r3(xj ); c2 (xj ). To prove both sequents under the assumption c1 6v c2, one must choose y = xj . One obtains the condition c1 u c3 v c2 from the first sequent and the condition r1 v r3 from the latter one26 . Finally, the first sequent gives the two sequents ; c3(y ) ) r2 (a; xj ) and ) r3 (a; y); r2 (a; xj ). From the first sequent, by separation between role and concept sequents, one gets the condition r1 v r2 (unless ; c3 (y ) ) ; is provable, but in this case the proof reduces to the inconsistency between p r1:c1 and 8r3 :c3 ). From the second sequent one gets no new necessary condition (if role disjunction is available, the condition r1 v r3 t r2 could be obtained for the choice y = xj , but this condition is redundant with previous conditions r1 v r2 and r1 v r3). To summarize, we obtain Modus Ponens in inconsistency form (42), as well as Modus Ponens for atleast (43) and for atmost(44): q < p; r q p; r q p; r v 1 v 1 v 1 ; r ;r r ;r v 1 v 1 v r2 r1 2 2 ; r ;c r ;c r3 c1 u c3 3 3 v 1 u c3 v 1 u c3 v c2 c2 c2 * q r :c * p r :c * q r :c 2 1 2 u p r1:c1 u 8r3:c3 v ? (42) (43) 1 u 8r3 :c3 v q r2 :c2 (44) 2 u 8r3 :c3 v p r1 :c1 2 Additivity Rules wrt one single atleast term Now let us examine the cases where several left atmost coexist in the antecedent with one single atleast. We basically consider formulae of the form: n r:c u p r1:c1 u q r2:c2 v ? Because of Proposition 3 one can restrict to instantiation-closed sequents. This gives the first conditions: p<n and q<n. We call ) ; the instantiation-closed sequent obtained from the precedent subsumption formula. If the proof appeals only to instantiations of one unique subterm atmost, we are in the same situation as before. Let us suppose that the proof uses instantiations of both atmost terms. p:r1 :c1)(~x) and one term We get a sequent containing one term ( ( q:r2:c2 )(~y). After application of !-left, we get four sequents to prove: atmost ; equ(~x); equ(~y) ; equ(~x) ; equ(~y) atmost ) ) ) ) ; ^ii ^jj ^ii a; xi) ^ c1 (xi)) a; yj ) ^ c2 (yj )) 1 j (r1 (a; xi) ^ c1 (xi )); ^j p q = +1 ( 1( =1 = +1 ( 2( =1 p = + =1 r r q a; yj ) ^ c2(yj )) = +1 ( 2( =1 r The choice of y is thus dependent of xj . If y were chosen globally, independently of the particular xj , then we would have obtained only simple inconsistency schemata. 26 A.1 Formulae with Only One Creative Term 93 As the instantiation functions are injective into the set B of eigen-parameters created by the atleast term in , the three first sequents are trivially valid (because dif (B~ ); equ(~x) ) ; and dif (B~ ); equ(~y) ) ;). We thereby get the conditions p + 1 n and q + 1 n. The other proof conditions can thus come only from the fourth sequent (we will call this sequent 4 in the following). One gets conditions like ) c1(x); c2 (y ) i.e. sequents with right disjunctions to prove. If the proof proceeds without _-left rules, then by the Constant Separation lemma for disjunctions, one gets to prove either ) c1(x) or ) c2(y ) (by choosing x 6= y , which one can always assume because of p; q 1). Then the proof reduces to a simple inconsistency schema between c, c1 , and c2 . Consequently, possible new proof conditions come only by considering proofs with application of _-left rules or ^-right rules. It means that either c is disjunctive (then _-left rules are applied for eliminating the disjunction) or c1 or c2 are conjunctive (then ^-right rules are applied for eliminating the conjunction). Case where c contains one disjunction. Now, let us first assume that c is in disjunctive form: c = d1 t d2 , where d1 and d2 are disjunction free. Let us assume that c1 and c2 are conjunction free. By exhaustive applications of _-left rules, we get to prove (up to variable renaming) a collection of sequents m , for m ranging from 0 to n: m; (atmost p:r1 :c1 )(~x); (atmost q:r2 :c2)(~y) ) ; n i=m i=n where m = ^ii= =1 (r(a; bi )); ^i=1 (d1 (bi )); ^i=m+1 (d2 (bi )). m counts the numbers of elements affected to d1 in the partition of c between d1 and d2 . In the following, for some given m we write D1 for the set of eigen-parameters for d1, D1 = fbi : 1 i mg, and D2 for the set of eigen-parameters for d2, D2 = fbj : m + 1 j ng. For each value of m, the proof relies as before upon some sequent: m ) ^ii p a; xi) ^ c1 (xi)); ^jj = +1 ( 1( =1 r q a; yj ) ^ c2 (xj )) = +1 ( 2( =1 r for some particular choices of ~x and ~y depending locally on m. 1. For the limit cases m = 0 and m = n, whatever the choices of ~x and ~y are, there is always one couple (x; y ); x 6= y . The corresponding sequent (after the elimination of the conjunctions) is provable by Constant Separation (by assumption, m is disjunction free). So we get at least conditions ri v r and dj v ci , for j = 1; 2. In the following we assume that neither dj v c1, for j = 1; 2, nor dj v c2 , for j = 1; 2, prove uniformely all the sequents (otherwise, we obtain the simple inconsistency schema). A PROOFS FOR NUMERICAL OPERATORS 94 2. For m p, ~x takes necessarily one element x2 in D2, then the sequents obtained from 4 by fixing c1 (x2 ) cannot be proved by ) c1 (x2). By Constant Separation, for all y different from x2 we get to prove ) c2(y ) and ) r2(y ). This gives r v r2 and arbitrary conditions dj v c2 , for j = 1 or j = 2 or both. When both conditions arise a simple inconsistency is obtained between q r2 :c2 and n r:c. We assume the contrary. 3. The case where d1 v c1, d1 v c2, d2 6v c1, and d2 6v c2 is excluded by considering m = n (the sequents with distinct x and y are unprovable!). Hence we get d1 v c1, d2 v c2, d1 6v c2 , and d2 6v c1 . 4. To respect these conditions, the existence of one couple (x; y ) such that x 6= y; x 2 ~x \ D2; y 2 ~y \ D1, is impossible (because again an unprovable sequent would be obtained). Hence, for all m, ~x and ~y must be locally chosen such that either ~x is included in D1 or ~y is included in D2. For m p, ~y must be necessarily included in D2. We get the necessary condition q + 1 n m, i.e. p + q + 1 n. Then all the sequents m, for m p, are proved with the terms r2 and c2 wrt the current conditions. 5. Finally, for n m = q , ~y cannot be chosen to be included in D2; there is one y 2 D1 and ~x D1. Then the sequents m ) r1(x); c2 (y ), x 6= y , are provable iff m ) r1 (x) is provable. This gives the final condition r v r1. Then it is straightforward to check that all sequents m are indeed proved! We get the Additivity Rule: p + q < n; r v r1; r v r2 ; c v c1 t c2 * n r:c u q r1:c1 u p r2:c2 v ? By the negation duality between atleast and atmost, we get as corollary the additivity principles of atmost wrt disjunction. r v r1; r v r2 * p r1 :c1 u q r2:c2 v p + q r:c1 t c2 Case where c1 contains one conjunction. Let us assume that c1 = c1a u c1b. By ^-right 4 gives: ) ^ii q a; xi) ^ (c1a u c1b)(xi)); ^jj = +1 ( 1( =1 r p a; yj ) ^ c2(xj )) = +1 ( 2( =1 r which can be further transformed as follows ) ^ii 1q 1 (r1 (a; xi) ^ c1a(xi) ^ c1b(xi)); ^jj p1 1 (r2 (a; yj ) ^ c2 (xj )) ) (^ii q1 1 (r1 (a; xi) ^ c1a(xi))) ^ (^ii 1q 1 (r1 (a; xi) ^ c1b(xi))); = + = = + = = + = = + = A.1 Formulae with Only One Creative Term ^jj ) ^ii ^jj ) ^ii ) ^ii 95 a; yj ) ^ c2 (xj )) r a; xi) ^ c1a(xi )) ^ ^ii q1 1 (r1(a; xi) ^ c1b (xi)); r a; yj ) ^ c2 (xj )) 1 j p 1 (r1 (a; xi) ^ c1a(xi )); ^j 1 (r2 (a; yj ) ^ c2 (xj )) 1 j p 1 (r1 (a; xi) ^ c1b (xi)); ^j 1 (r2 (a; yj ) ^ c2 (xj )) p = +1 ( 2( =1 q p r = +1 ( 1( =1 = +1 ( 2( =1 q = + = = + =1 q = + = = + =1 = + = This reduces to proving both formulae, with conjunction free terms in the upper bound numerical restrictions: n r:c u q r1:c1a u p r2:c2 v ? n r:c u q r1:c1b u p r2:c2 v ? From the results in the previous paragraph we get for each formula conditions c v c1a t c2 and c v c1b t c2. By summing up these conditions, again one derives the proof condition c v c1 t c2 . No new rule comes out but the precedent ones. Complete proof by structural induction. Formally, the complete proof for arbitrary formulae will work by structural induction on the roles and concept terms, by considering that the terms quantified by lower bounds (resp. by upper bounds) numerical restrictions atleast (resp. atmost) are in Disjunctive Normal Form (resp. Conjunctive Normal Form). The induction steps proceeds, exactly as in the two cases above, by reducing to proofs of simpler formulae either obtained by disjunction elimination in c (then one needs to consider all the sequents m where the antecedent describes a possible partition of B among the disjuncts of c) or conjunction elimination of c1 or c2 (then one needs to consider proving the formula for all the conjuncts). In each case, local proof conditions of the form d v c1a t c2 are obtained, d being some disjunct of c, c1a being some conjunct of c1. The combination of the local proof conditions gives always the general condition c v c1 t c2 . General Additivity Rules. We now examine the generalization to more than two atmost terms. Let us consider formulae with k atmost terms: n r:c u p1 r1:c1 u p2 r2:c2 u : : : u pk rk :ck v ? P k We prove by induction on n+ ii= =1 (pi ) that the formula is provable iff cis subsumed by a disjunction of the ci such that the corresponding restriction numbers sum up to strictly less than n. The reasoning proceeds again by assuming c in disjunctive form and combining the different conditions obtained in the different partition of B among the disjuncts of c. (The details are left to the reader—the reasoning exploits the same principles as those explained before). A PROOFS FOR NUMERICAL OPERATORS 96 To summarize, we obtain the general additivity rule wrt a single atleast term Pi k (pi) < n; ri v r; c v c t c t : : : t ck i = =1 * 1 2 (46) n r:c u p1 r1:c1 u p2 r2:c2 u : : : u pk rk :ck v ? and the additivity for atmost wrt disjunction: r v r1; r v r2 * p r1 :c1 u q r2:c2 v p + q r:c1 t c2 (47) Formulae with several all terms If several all terms coexist, they also contribute by left implicative terms, more precisely they contribute by right role terms and left concept terms. So assuming a total of h unfolding steps of instantiated all terms, we get to prove sequents generalizing the four next sequents to an arbitrary number of role/concept terms: ; c3 (y) ; c3 (y) ) ) ) ) r2(a; xj ) r2(a; xj ); r3 (a; y ) c2 (xj ) c2 (xj ); r3 (a; y ) The conditions are similar to simple Modus Ponens: the choice of the y ’s must depend on the x’s for realizing exact matching between the parameters. The introduction of one term 8r:c modifies the proof of the additivity rules by possibly weakening the subsumption relation dj v ci by c u dj v ci . Typically, one gets additive Modus Ponens like: p + q < n; r v r1; r v r2 ; r3 v r1; r4 v r2 ; c3 u d1 v c1 ; c4 u d2 v * n r:d1 t d2 u q r1:c1 u p r2:c2 u 8r3:c3 u 8r4:c4 v ? c2 (48) A.2 Formulae with exactly two eigen-parameter-creating terms By duality between atleast and atmost, we only consider formulae of the form: c u q r1 :c1 u p r2 :c2 v ? The need for homogeneous quantifier elimination induces that c is made of role restrictions. So c consists only of atmost or all terms. Given the results of Section 5.2 one can restrict to equality-complete sequents (i.e. sequents in which b = d is decidable for every couple of parameters). The point being that all equality complete extensions must be checked. A.2 Formulae with exactly two eigen-parameter-creating terms 97 It is straightforward to check that no inessential cut wrt an equality inside B or D (typically, bi = bj or bi = bi) is relevant (we get on the one hand a sequent with trivially inconsistent antecedent, on the other hand the same sequent as the one before cut). Similarly, if bi = di belongs already to the sequent, then any inessential cut wrt bi = dj , for j 6= i, produces one sequent with bi = dj ; bi 6= bj and another trivially provable by inconsistency of the antecedent (containing bi = dj and bi = di , reducing to di = dj by substitution). Up to some renaming, one can always assume that the inessential cuts involved in the proof introduce a set of equalities/inequalities such that bi = dj is decidable for every index i and j . We write (B D)k in the resulting formula: k denotes the number of equalities of (B D)k , all the other terms are inequalities. We also assume that the equalities (B D)k are bi = di ; i k . We get to prove sequents of the form ; (B D)r ) ; where r ranges from 0 to min(p; q). Furthermore, because of Proposition 3, one has to consider instantiation closed sequents only. We therefore introduce the following notations: B D 1 2 B D)k Br Dr k c ( = fb1; b2; :::; bpg fd1; :::; dqg = ((r1 ( = = = = = = a; b1); :::; r1(a; bp)); (c1 (b1); :::; c1(bp)); dif (B~ )) produced by creative quantifier elimination applied to p r1 :c1 ~ )) ((r1 (a; d1 ); :::; r1 (a; dq )); (c1 (d1 ); :::; c1 (dq )); dif (D 2 is the left expression produced by q r2:c2 ^ii==k1 (bi = di ) ^k6=l (bk 6= dl ) fbi : 8i rg fdi : 8i rg 1 ^ 2 ^ (B D)k denotes the instantiation closure of , the sequent expression for c. In conclusion of all these preliminary remarks, proving the initial formula reduces min(p;q) : to proving the collection of sequents (k )kk= =0 k k = = k ; c ) ; 1 ; 2; (B D)k Then the proof proceeds by case analysis on the possible forms for c. We will always assume that 1; 2 ) ; is not provable. Thus all the forthcoming proofs will necessarily decompose some expression in c . Proving formulae p r1:c1 u q r2:c2 u We get to prove all sequents of the form k r3:c3 v ? r ; (atmost k:r3 :c3 )(~x) ) ; 98 A PROOFS FOR NUMERICAL OPERATORS Let us consider one particular instantiation of the atmost term, wrt ~x, used during the proof (recall that ~x is injective over B [ C , cf. Proposition 3). The two sequents to prove are: r ; equ(~x) ) ; r ) ^ii k a; xi); c3 (xi)) = +1 ( 3( =1 r (We will not consider the trivial cases where c1 or c2 is subsumed by ?.) For r = 0, the elements of B and D are made distinct, so the first sequent is proved by the subsequent dif (B [ D); equ(~x ) ;. When r 6= 0, some elements of B and D are made equal. There are two cases depending on whether or not the proof exploits the terms c1 and c2 or just the equality/inequality terms of the sequent. In the first case the sequent can be proved by the subsequent b1 = d1 ; c1(b1 ); c2(d1 ) ) ; This gives one sufficient condition: c1 u c2 v ?. Then, for r 6= 0, the second sequent is proved by its antecedent being inconsistent. The case r = 0 gives the remaining conditions: r1 v r3 , c1 v c3 and similar conditions for r2 and c2 . For the second case assume that c1 u c2 v ? does not hold. Then the first sequent can only be proved by its subsequent: dif (B ); dif (C ); (B D)r ; equ(~x) ) ; If ~x is totally included in B (or D), then the proof works by dif (B ); equ(~x) ) ;. Then the second sequent is easily seen to be proved by r1 v r3 and c1 v c3. We end up with the classical negation duality between atmost and atleast. New conditions are obtained only from ~x taking elements both from B and D. Take x1 = bi and x2 = dj . Let us try to prove the sequent obtained from the first sequent above: dif (B ); dif (C ); (B D)r ; bi = dj ) ; By completeness of (B D)r , it is easy to see that the proof only fails if i = j r. Hence to be provable for every r ~x must be chosen such that it contains no pair fbi; dig, hence the condition k + 1 p + q r, and more generally k + 1 max(p; q). Let us assume that p = min(p; q ) and q = max(p; q ). Let us consider the case where p < k + 1 q . Hence the proof does not reduce to a simple inconsistency schema wrt the single term p r1c1 . For the case r = p, when B is “embedded” into D, ~x takes necessarily one element d 2 D n Br . One gets to prove, from the second sequent r ) r ) r3 (d) c3 (d) A.2 Formulae with exactly two eigen-parameter-creating terms Assuming no use of right disjunction for c3and r3 , one gets the conditions r2 and c2 v c3 , hence a simple inconsistency schema wrt q r2 c2. 99 v r3 If some right disjunction occurs, say for c3, meaning that c3 = c1a t c1b is decomposed, one may get the weaker condition c2 v c1a instead of c2 v c3. Then the inference results from the simple inconsistency schema between q r2 :c2 and k r3c1b and the monotonicity schema for atmost. We conclude these considerations with the following Lemma: Lemma 6 The subsumption formula p r1:c1 u q r2:c2 u k r3:c3 v ? is provable iff one of the following conditions holds: k < p, r1 v r3, c1 v c3 k < q, r2 v r3, c2 v c3 k < p + q, r1 v r3, r2 v r3, c1 v c3, c2 v c3 By the way we have proved the following lemma: Lemma 7 dif (B ); dif (D); (B D)r ; equ(~x) pair (bi; di ); i r. ) ; is provable iff ~x contains no Proving formulae p r1:c1 u q r2:c2 u k r3 :c3 u n r4:c4 v ? We have to search for provability conditions of sets of sequents r , with r min(p; q), like: 1 ; 2; (B D)r ; (atmost k:r3 :c3)(~x); (atmost n:r4 :c4 )(~y) ) ; In the following, we assume that the proof does not reduce to the precedent case. Thus at least two atmost expressions are unfolded, with two different instantiation vectors ~x and ~y. If ~x and ~y are equal, or ~x ~y, then k n; by contraction everything happens as if one single atmost were unfolded; the situation is the same as with one single atmost. Thus in all the following we assume that ~x and ~y are not included in each other. We have to prove four sequents (1,: : : ,4): 1 r ; equ(~x); equ(~y) 2 r ; equ(~y) 3 r ; equ(~x) 4 r ) ) ) ) ; ^ii ^jj ^ii ^jj k n k n r3(a; xi); c3 (xi )) r4 (a; yj ); c4 (yj )) r3(a; xi); c3 (xi )); r4 (a; yj ); c4 (yj )) = +1 ( =1 = +1 ( =1 = +1 ( =1 = +1 ( =1 A PROOFS FOR NUMERICAL OPERATORS 100 The proof for 1 requires more clever analysis because the presence of double equalities in the antecedent may open new proof possibilities via substitutions. But by the assumption about equality-complete sequents things remain quite simple. Let us assume that neither r ; equ(~x) ) ; nor r ; equ(~y) ) ; is provable. There is a pair (bk ; dk ) 2 ~x such that k r and a pair (bu ; du ) 2 ~y such that u r. Then the subssequent r ; bk = dk ; bu = du ) ; from 1 is unprovable! Thus at least one of ~x and ~y is provable alone wrt (B D)r . Again, k + 1 p + p r. Now let us assume that r ; equ(~x) ) ; is provable but not r ; equ(~y) ) ;. ~y contains some (bu ; du); u r. 1 and 3 are trivially proved but not 2. 2 gives all the sequents r ; equ(~y) ) c3(x) and r ; equ(~y) ) r3(a; x), 8x 2 ~x. All the sequents obtained by eliminating the _ connector in equ(~y) are trivially proved (antecedent inconsistent) except from the (bu ; du ). Thus the only significant sequents 2 are of the form: r ; bu = du ) c3 (x); 8x (and similarly for the role sequents). But r ; bu = du ) c3(x) is (by contraction) equivalent to r ) c3 (x). Moreover, if r ; equ(~y) ) ; is not provable, then 2 reduces to the collection of sequents r ) c3(x) and r ) r3(x); then 4 is proved by 2. The proof for 4 requires elimination of the right conjunctions. 4 splits into four new types of sequents, for all the possible pairs (i; j ) i k + 1; j n + 1: 4a 4 b 4 c 4 d r r r r ) ) ) ) r3 (a; xi); r4 (a; yj ) r3 (a; xi); c4 (yj ) c3(xi ); r4(a; yj ) c3(xi ); c4 (yj ) Due to the absence of any role forming operators in the first sequent, the only proof possibilities are by assumptions ri v rj 1 i 2; 3 j 4. By the Separation Principle for role/concept sequents, if for some j neither r1 v rj nor r2 v rj , then it means that the proof must be independent from m rj :cj ; contrarily to the initial assumption. Then we have ri v r3 and ri v r4 for 1 i 2. In the following, like in Section A.1 we distinguish the cases where the sequents contain left disjunction and right conjunction or not. This is because the terminal steps in the proofs usually apply the Constant Separation Principle (cf. Lemma 4), which works with sequents free of left disjunction or right conjunction. Again, the general proof will proceed by structural induction on the disjunctive structure of the terms appearing in lower bounds numerical restrictions and on the conjunctive structure of the terms appearing in upper bounds numerical restrictions. We begin with proofs without _-left and ^-right rules, then consider proofs with _-left rules, and finally investigate proofs with ^-right rules. Proofs without _-left and ^-right rules. We first assume that r1 , c1, r2, and c2 are free of disjunction and that r3, c3 , r4 , and c4 are free of conjunction. Therefore, no _-left rule and no ^-right rule are applied and the Constant Separation principle A.2 Formulae with exactly two eigen-parameter-creating terms 101 is safely applicable. Furthermore we always assume that p and q are greater than 2. (Otherwise there is no proof with atmost terms—~x and ~y are identical and take all the parameters b; d; in the case where b = d is assumed, 1 is unprovable!) For each sequent r one of ~x , ~y must be provable: k + 1orn + 1 p + q r. Let us assume that q = min(p; q ). In the sequent 0 , i.e. when no equation bi = di is assumed, both ~x and ~y are provable. Assuming, there are two elements x 6= y , one gets to prove from 4d: 0 ) c3 (x); c4(y). The proof proceeds necessarily by Constant Separation, giving conditions cj v ci , i, j = 1 or 2. When there are elements common to ~x and ~y, the 4d sequents 0 ) c3 (x); c4(x) give also conditions like ci v c3 t c4 , i= 1 or 2. From sequents r ) c3 (x); c4(x) one can also get (by substitution wrt an equality of (B D)r ) the condition c1 u c2 v c3 t c4. In all the following we assume that the proof does not proceed by a simple inconsistency schema wrt one atleast term; this means we do have neither c1 v c3 , nor c1 v c4 , nor c2 v c3 , nor c2 v c4 . c1 v c or c1 v c uniformely over all sequents r , for c = c3 or c4 . Then, by summing up the local conditions found for all the sequents r , one must get maximal conditions which are (boolean) combinations of: c1 u c2 v c3, c1 u c2 v c4, c1 t c2 v c3, c1 t c2 v c4 c1 v c3 t c4, c2 v c3 t c4, c1 v c3 u c4, c2 v c3 u c4 Case 1: Both c3 and c4 have maximal conditions c1 u c2 v cj . This means that we do not have ci v cj (1 i 2; 3 j 4) in a sequent r , because then the condition c1 u c2 v cj will be subsumed by ci v cj . But, for the sequent 0, we have no equality assumption at all ; the sequent 0 ) c3 (x); c4 (y ), with x = 6 y, is necessarily proved by Constant Separation and gives conditions ci v cj . Consequently for at least one of c1 or c2 c1 u c2 v cj is not a maximal condition. Case 2: c3 has maximal condition c1 u c2 v c3 . In order to avoid a proof by c1 v c3 or c2 v c3 , one must insure that there is no sequent r in which ~x alone is provable with some x not belonging to Br [ Dr . For r k , the above situation where ~x is provable and included in Br [ Dr is not possible. If ~x were provable, but not ~y, then the sequent 2 should be proved, with at least one x outside Br [ Dr ; a condition ci v c3 would arise, contrarily to the assumption. Two cases arise. 1. Let us first assume that ~x is not provable but ~y is; then 3 must be proved. This gives the new condition n + 1 p + q k . One gets conditions c1 v c4 or c2 v c4 (c1 u c2 v c4 is excluded by taking r = 0). One gets both conditions if ~y is large enough to take elements from B n Dr and D n Br , i.e. A PROOFS FOR NUMERICAL OPERATORS 102 when n + 1 > p. Otherwise, c1 v c4 or c2 v c4 alone makes the inference reducing to a simple inconsistency schema wrt one of the atleast terms. Finally, the role conditions for r4 are similar to the conditions for c4; both r1 v r4 and r2 v r4 can be derived unless reduction to a simple inconsistency schema is possible. 2. Now let us assume that both ~x and ~y are provable wrt r (r k ), then 4 alone is to be proved. Again, one gets n + 1 p + q k . One element x of ~x is necessarily outside Br [ Dr ; the corresponding sequents r ) c3 (x); c4(y ) cannot be proved by r ) c3(x) (ci v c3 is forbidden). Thus r ) c4 (y ), for all y 6= x, r ) r4 (y ) for all y , and r ) c3(x); c4 (x) if x 2 ~x \ ~y, have to be proved. If r = 0 in particular, because Br [ Dr is empty, all the sequents 0 ) c3 (x) are unprovable, then the proof reduces to a proof by c4 and r4 with 3. One gets the conditions c1 v c4 and c2 v c4 (excluding the conjunctive condition c1 u c2 v c4 by Case 1) unless ~y is included in B or D (then a simple inconsistency arises). The roles conditions follow. We end up with Left Additivity of atleast wrt disjunction: (r1 v r3 or r2 v r3 or r1 u r2 v r3 ); r1 * v r4; r2 v r4; k + n < p + q 1 p r1:c1 u q r2:c2 u k r3:c1 u c2 u n r4:c1 t c2 v ? Case 3: Both c1 and c2 have maximal conditions ci v c3 t c4. To obtain these maximal conditions, no condition ci v c3 or ci v c4 must arise in any r : For r = 0, both ~x and ~y are provable. Assuming ~x and ~y not included in each other, one can choose two elements x 6= y , x 2 ~x n ~y and y 2 ~y n ~x. The corresponding sequent from 4d must be necessarily proved by Constant Separation, giving the forbidden conditions ci v cj for j = 3 and j = 4. Thus no proof arises in this case, except proofs independent from c3 or c4 , and thus reducible to a simple inconsistency schema. Case 4: c2 has maximal condition c2 v c3 t c4 . In order to obtain the maximal condition c2 v c3 t c4 , but neither c2 v c3 nor c2 v c4 , the only possibility, in absence of any left disjunction, is to prove sequents like r ) c3 (x); c4 (x) with x 2 D. 1. We first assume that there is some element d 2 D \ ~x \ ~y and r = 0. d is the unique element of D \ ~x \ ~y. If there were two of them, d1 ; d2, then the sequent 0 ) c3 (d1 ); c4(d2 ) should be proved, giving necessarily one forbidden condition. For x 6= d the sequent 0 ) c3(x); c4 (d) is necessarily proved by Constant Separation and c3 . This means that ~x n fdg B . The same holds for ~y. Then k and n p, c1 v c3 and c1 v c4 . A.2 Formulae with exactly two eigen-parameter-creating terms 103 The role conditions are obtained from the sequents 4b and 4c by choosing d as argument of cj and x or y different from d, one gets r1 v r3, r1 v r4 . It remains to prove the sequents 0 ) c3 (d); r4(d) and 0 ) r3(d); c4(d). One gets r2 v r3 and r2 v r4. For the other sequents r , if p < q , the same kind of reasoning may still hold with D n Dr instead of D. But if q p, then for r = q , necessarily one of ~x and ~y is provable in q , hence k + 1 p or n + 1 p. Then the proof reduces to a simple inconsistency schema between c1 and c3 or c4 . 2. Now assuming ~x \ ~y \ D = ; and r = 0, then we cannot have sequents like 0 ) c3 (x); c4(y) where x and y both belong to D and are distinct, otherwise some forbidden condition c2 v cj would arise by Constant Separation. Then one of ~x or ~y must be included in B , say ~x, then the conditions c1 v c3 , r1 v r3, k + 1 p are derived. The proof reduces to a simple inconsistency schema. We finally obtain Weak Right Additivity: p < q; k p; n p; c1 v c3 u c4; c2 v c3 t c4 ; r1 v r3; r1 v r4 ; r2 v r3 ; r2 v r4 * p r1:c1 u q r2:c2 u k r3:c3 u n r4:c4 v ? NB: The rule is called “weak” because the assumptions about the number restrictions are not maximal. The general Right Additivity cannot be derived without assuming proofs with left disjunctions (see proofs with disjunctions below). Case 5: c1 has maximal condition c1 v c3 u c4 . The case where both c1 and c2 have maximal conditions ci v c3 u c4 will be considered in Case 7. The case where neither c2 v c4 nor c2 v c3 corresponds to the precedent case. In the following, we assume that c2 v c4 holds but not c2 v c3 . (The situation also corresponds to c1 t c2 v c4 and not c1 t c2 v c3 (cf Case 6).) To avoid the forbidden condition c2 v c3 one must insure that there is no sequent r in which ~x is provable alone and takes elements from D n Dr . For r k, if ~x is provable then it takes necessarily one element from D n Dr and then ~y must be provable also. Otherwise ~y is provable alone. Two cases arise. 1. Assume that both ~x and ~y are provable in r and x 2 ~x \ (D n Dr ). As usual the condition k + n < p + q is obtained. Then the sequent r ) c3(x); c4 (y ) and r ) c3 (x); r4 (y ) have to be proved independently of c3 (x). One gets arbitrary conditions for c4 and r4 . A PROOFS FOR NUMERICAL OPERATORS 104 2. Only ~y is provable in r . This is the same as above. For r > k , ~y alone provable means that n + 1 max(p; q ) and the proof reduces to a simple inconsistency schema. Otherwise, ~y is not provable (n + 1 > max(p; q )); then ~x is provable, takes no element outside from D n Dr and the proof proceeds by 2. All role conditions for r1 may come (including r2 v r3 ). We obtain Partial Right Additivity k + n + 1 p + q; (r1 v r3 or r2 v r3 or r1 u r2 v r3 ); r1 v r4; r2 v r4; c1 v c3 ; c1 v c4 ; c2 v c4; * p r1:c1 u q r2:c2 u k r3:c3 u n r4:c4 v ? Case 6: c3 has maximal condition c1 t c2 v c3 . If c4 has also the same maximal condition, this is Case 7. Otherwise, as already mentioned, the situation reduces to Case 5. Case 7: Both c3 and c4 have maximal conditions c1 t c2 v cj . Then all the conditions ci v cj are satisfied, which means that all the concept parts of the sequents are trivially verified. Then the proofs relies only upon role conditions. By pure logical symmetry between role terms and concept terms, one can repeat the same reasonings as in the precedeing Cases 1-5 and derive the same conditions up to the inversion between role and concept terms. For example, then both maximal conditions r1 u r2 v r3 and r1 u r2 v r4 are impossible (cf. Case 1). If r3 has the maximal condition r1 u r2 v r3 , then an inference schema similar to those derived in Case 2 are obtained. One gets Left Role Additivity: r1 u r2 v r3; r1 v r4; r2 v r4; c1 t c2 v c3; c1 t c2 v c4; k+n+1p+q k * p r1:c1 u q r2:c2 u k r3:c3 u n r4:c4 v ? We would get also the Weak Right Role Additivity schema for roles and Partial Right Role Additivity if role disjunction were allowed. Case 8: Both c1 and c2 have maximal conditions ci v c3 u c4. c1 v c3 u c4 and c2 v c3 u c4 is equivalent to the list of conditions c1 v c3 , c1 v c4, c2 v c3 , c2 v c4 . This is equivalent to c1 t c2 v c3 and c1 t c2 v c4 . This is Case 7. Proofs with _-left Rules. We now consider the more general case where the concept and role terms are possibly in disjunctive forms. This does not reduce to the precedent case, because the _-left rules give a collection of sequents of the form r to prove, instead of a single one, therefore offering more proof combination A.2 Formulae with exactly two eigen-parameter-creating terms 105 possibilities. The only possible change from the disjunction-free proofs comes from the application of the Constant Separation Principle to concept terms or role terms (if there is role disjunction). But, by the symmetries between concept and role terms one can restrict at first to the case where one only has concept disjunction. (Then rules for roles with disjunction will be obtained by applying the logical symmetry as already shown above). We here consider only the case where c1 = c1at c1b . There is no loss of generality in doing so (by induction wrt to the number of disjunctive connectors in the antecedents). In fact one shows here that the rules for formulae with disjunctions are necessarily obtained by some algebraic combinations of the rules for disjunction-free formulae. The combination operation can be run as often as one “fixed point” is not obtained, i.e., as long as the set of proof conditions is not stable. Due to the symmetry between roles and concepts, the algebraic manipulations must also operate by inversion of role and concept conditions. Elimination of the disjunctions yields a collection of sequents ( e ), quite similar to , except from the antecedents which are now of the form (up to variable renaming): e = 1; 2 , where a; b1); :::; r2(a; bp); (c1a(b1); :::; c1a(be); c1b(be 1 ; :::; c1b(bp)); dif (B~ )) and 0 e p. Then, for each sequent one can search for proof conditions in a 1 = (r1( + similar way as in the disjunction-free case. We define (E; F ) as being the partition of B defining the breakdown of c1 among its disjuncts c1a and c1b in a given sequent e : B = E [ F; E \ F = ;. We will first consider the special cases in which e = 0 or e = p, and then the inconsistency schemata for c1a and c1b . Limit cases e = 0 or e = p. For these limit values of e, the sequents reduce to the disjunction free case, with c1 = c1a or c1= c1b . We get locally conditions coming from the previous cases, one for c1a in place of c1 , the other for c1b in place of c1. This means that the global proof conditions are at least obtained by some “algebraic”, consistent combinations of the local conditions for 0 and p. In some sense, the global conditions belong to the algebraic closure of the set of conditions for left disjunction free formulae. Let us examine what algebraic conditions are possibly obtained. It is easy to see that the algebraic closure is strictly bigger than the initial set. 1. exchanging the roles of c3 and c4 , gives the new proof conditions, called Union/Intersection Schema: c1a u c2 v c3 , c1a t c2 v c4 , c1b u c2 v c4 , c1b t c2 v c3 By summing up, one gets the following conditions: A PROOFS FOR NUMERICAL OPERATORS 106 k + n + 1 p + q, c1 u c2 v c3 u c4 , c1 t c2 v c3 t c4 Similarly, applying Left Additivity with both c1 = c1a t c1b and r1 = r1a t r1b gives the symmetrical proof conditions for Union/Intersection: r1 u r2 v r3 u r4 , r1 t r2 v r3 t r4, c1 u c2 v c3 u c4, c1 t c2 v c3 t c4 2. The combination of two Partial Right Additivity rules, by exchanging the roles of c3 and c4 , gives as new rule the Right Additivity Schema: r1 v r3; r2 v r4; r1 v r4; r2 v r4; c1 v c3 u c4 ; c2 v c3 t c4; k+n<p+q * p r1:c1 u q r2:c2 u k r3:c3 u n r4:c4 v ? This is obtained by adding the concept conditions when the Left Additivity Schema is applied for (c1 = c1a , c2): c1a 6v c3 , c1a v c4, c2 v c3 , c2 v c4 ; the concept conditions when the Left additivity schema is applied for (c1 = c1b , c2 ) and the roles of c3 and c4 are inverted: c1b 6v c4 , c1b v c3, c2 v c3, c2 v c4 3. Assuming that r1 is also disjunctive, r1= r1a t r1b , the same reasoning as in (1) applies simultaneously for c1 and r1 yielding the full Right Additivity Schema with completely symmetrical conditions for roles and concepts r1 v r3 u r4; r2 v r3 t r4; c1 v c3 u c4; c2 k+n<p+q+1 v c3 t c4 ; * p r1:c1 u q r2:c2 u k r3:c3 u n r4:c4 v ? 4. If the same schemata are used, without exchanging the roles of c3 and c4, then by left additivity of concept disjunction, one gets the same schema for c1a t c1b as well. 5. Combination of Left Additivity and Inconsistency gives Left Additivity or Union/Intersection. For Example: n min(p; q); c1b u c2 v c4; c1b t c2 v c3 ; c1a v c3 ; k + 1 p * c1 u c2 v c3 u c4; c1 t c2 v c3 t c4 A.2 Formulae with exactly two eigen-parameter-creating terms 107 It is easy to see that all the combinations give one of the above rules except for the case where two inconsistency schemata are combined for c1a and c1b . Indeed, in all other cases, complete conditions for the concept and role terms are obtained, i.e. complete classification information about all the role and concept terms involved in the formula. It is then easy to check the satisfaction of the remaining sequents for other values of e, 0 < e < p. This step is not worked out here; it causes no particular problem and one checks easily that Right Additivity and Union/Intersection are indeed valid inference rules. But the combination of two different inconsistency schemata gives only conditions about c1. We exclude the case where similar inconsistency schemata are obtained for c1a and c1b (if the inconsistency is between (c1a , c) and (c1b , c) for the same c, then we get a simple inconsistency schema between c1 and c). If 0 is proved by inconsistency between c1a and c3 and p is proved by inconsistency between c1b and c4, one gets the conditions: k+1 , n+1 p , r1 v r3 , r1 v r4 , c1a v r3 , c1b v r4 but c1a6v c4, c1b6v c3. The resulting conditions do not characterize c2 nor r2 . Here more reasoning is needed to obtain complete proof conditions. In the following, we focus on that case. We will show that no new inference schema but the precedent ones will be derived. Proofs by Inconsistency Schemata for c1a and c1b. The initial conditions are like: c1a v c3 , c1b v c4 , c1a 6v c4 , c1b 6v c3 , k+1 p , n+1 p. Then c1 v c3 t c4 is obtained as maximal condition for c1 (c1 6v c3 , c1 6v c4). We now consider the sequents e , for arbitrary values of e, 0 < e < p. We first begin by checking the provability conditions for the pairs (x; y ) in B B . By the assumptions about c1a and c1b it is easy to see that in all the sequents re where both ~x and ~y are provable, then there cannot be any couple (xf ; ye ) ~ xx~y, xf 6= ye , xf 2 F n Dr , xe 2 F n Dr (otherwise the sequent er ) c3(xf ); c4(ye ) would give one forbidden condition c1b v c3 or c1a v c4 ). This means that either ~x D [ E [ Fr or ~y D [ F [ Er . (Er , Fr denote the subsets of E and F whose elements are equated to some elements of D in re ). For r = 0, one gets k + 1 q + e = p + q f or n + 1 q + f = p + q f . Consequently, with an adequate choice of e = n or f = k , the necessary condition k + n < p + q is always obtained. Now let us examine what conditions come for c2 . They result from the sequents of 4 with parameters (x; y ) such that one of x and y belongs to D. 1. We first prove that there must be necessarily conditions for c2 otherwise the proof reduces to a simple inconsistency schema wrt p r1 :c1 . No necessary condition about c2 will be derived iff in all the sequents re , one of ~x or ~y is included in B [ Dr . Let us assume this is the case. Let us take r = 0 and k = e: in 0e, either ~x or ~y is included in B ; if it is ~x then ~x E (because c1b 6v c3 ) but then k + 1 e; so ~y F (because c1a 6v c3) and 108 A PROOFS FOR NUMERICAL OPERATORS n + 1 f = p e = p k. One gets k + n + 1 p and one inconsistency schema between c1 and the two atmost terms. The same holds for role conditions. 2. Let us assume that we do not get both conditions c2 v c3 and c2 v c4 . Let us assume that c2 6v c3. Then both c2 6v c3 and c1b 6v c3 . This means that there is no sequent re in which ~x is provable alone and ~x takes an element of (D [ F ) n Er (i.e. whenever there is an element x in D [ F , it must be equated to some element of E to keep consistent with the assumptions). (a) If one gets the conjunctive condition c1 u c2 v c3 , then for r = 0 the proof must proceed with c4 (same reasoning as in Case 2); for e = k; r = 0, to respect c4 6v c1a then ~y must be included in F [ D, then n + 1 p k and one gets a simple inconsistency schema between c1 and c3 t c4. (b) Let us assume that c2 6v c3 and q n. If q n p 1; n = q +e0; e0 p q 1. Let us consider qp f , where f = n, D is embedded in F (Dr = D = Fr F ), but there is no equality assumption between E and D. Then if ~y is provable, it takes necessarily one element ye outside Fr [ Dr . By c1a 6v c4, necessarily ~x must be provable and necessarily included in E (to avoid the forbidden conditions about c3 ). Then k + 1 p f; k + n < p. One gets again an inconsistency schema between c1 and c3 t c4 . (c) Let us assume that c2 6v c3 and n < q . One gets an inconsistency schema between c3 and c2 unless r2 6v r4 . In that case, by symmetry between roles and concepts in b2, one gets that r2 6v r4 is possible only if k < q . Then, by choosing e = k and making E included in D by suitable equality assumptions, then ~x takes at least one element from F , hence it cannot be provable alone. The proof necessarily proceeds by ~y in 2 or in 4 . If 2 is to be proved, to satisfy the concept condition in ee ) c4(y) ~y must be included in D [ F ; to satisfy the role conditions ee ) r4 (y), ~y must be included in F . Then again n + 1 p k! If 4 is to be proved with ~x is provable in ee , then k + 1 = e + 1 q + f , i.e. p + 1 q . Then there is an element xf in F such that er ) c3 (xf ) is unprovable). The same sequents as before must be proved for all y , except possibly for xf if xf is the unique element of ~x \ ~y; As xf 2 F once again one gets n + 1 f = p k . To conlude this case, we always get both conditions c2 v c3 and c2 v c4. By symmetry, the same reasoning holds for the role conditions. One finally gets Right Additivity or Inconsistency. A.2 Formulae with exactly two eigen-parameter-creating terms 109 Proofs with ^-right rules. The final case is when proofs require ^-right rules. This means that the roles and concepts coming from the atmost terms can possibly be in conjunctive form. One can proceed with structural induction like in Section A.1. Then the rules for conjunctive c3 or c4 will again be obtained by combining the local proofs conditions obtained in above for each conjunct. One can easily check that the combinations will not produce new rules (the set of conditions already obtained is closed). For example, if c3 = c1a t c1b, the combination of conditions given by Right Additivity, one for (c1a, c4 ) and the other for (c1b , c4 ), by inversing the roles of c1 and c2, gives again the Union/Intersection rule. Summary of the inference rules for general terms We have proved one important constructive property, which states intuitively that all the proof conditions for p r1:c1 u q r2:c2 u k r3:c3 u n r4:c4 v ? are necessarily combinations of the proof conditions given by the three inference rules obtained for the disjunction/conjunction free terms. Proposition 11 The set of proof conditions for the subsumption formula, p r1:c1 u q r2:c2 u k r3:c3 u n r4:c4 v ? contains the set of proof conditions obtained for terms without left disjunction and right conjunction and is closed under the following operations: 1. combination of arbitrary proof conditions for the disjuncts of the terms encapsulated in atleast operators; 2. combination of arbitrary proof conditions for the conjuncts of the terms encapsulated in atmost operators; 3. inversion of role/ concept conditions. We give below the most general rules, with symmetrical conditions for roles and concepts. One easily sees Left Additivity and Right Additivity are subsumed by Union/Intersection (49). r1 u r2 v r3; r1 t r2 v r4; c1 u c2 v c3; c1 t c2 v c4; k+n<p+q * p r1:c1 u q r2:c2 u k r3:c3 u n r4:c4 v ? A PROOFS FOR NUMERICAL OPERATORS 110 r1 r1 u r2 v r3 t r4; r2 v r3 u r4; c1 v c3 t c4; c2 v c3 u c4 ; k+n<p+q * p r1:c1 u q r2:c2 u k r3:c3 u n r4:c4 v ? v r3 u r4; r1 t r2 v r3 t r4; c1 u c2 v c3 u c4 ; c1 t c2 k+n<p+q * p r1:c1 u q r2:c2 u k r3:c3 u n r4:c4 v ? v c3 t c4 ; (49) Generalization to an arbitrary number of numerical restrictions With Left Additivity and Right Additivity we get exactly the terminological approximations (lower and upper bounds) of the exact cardinality equations of Set Theory: card(X [ Y ) card(X ) + card(Y ) card(X \ Y ) When X is intuitively assimilated to the set fb : r(a; b) ^ c1(b)g and Y fb : r(a; b) ^ c2(b)g: = to the set 1. Left Additivity gives the lower bound approximation: card(X ) + card(Y ) card(X \ Y ) card(X [ Y ) p r:X u q r:Y u k r:X u Y v p + q k r:X t Y 2. Right Additivity gives the upper bound approximation: card(X ) + card(Y ) card(X \ Y ) card(X [ Y ) p r:X u q r:Y u k r:X u Y v p + q k r:X t Y By combining the Righ and Left Additivity rules, one can prove the general subsumption formulae which represent the lower/upper bound approximations of the general cardinality laws of Set Theory: card([ii 1n Xi ) = = = X ( j 1;j 2;:::;jk k 1)k+1 (card(\ii= =1 (Xji ))) We illustrate this by showing the derivation of the law for a three-set union. card(X1 [ X2 [ X3 ) card(X1 ) + card(X2 ) + card(X3 ) card(X1 \ X2 ) card(X2 \ X3 ) card(X3 \ X1 ) +card(X1 \ X2 \ X3 ) With X = c1 t c2 , Y = c3, and n = p + q k , one gets: = 111 p r:c1 t c2 u q r:c3 u k r:c1 t c2 u c3 v n r:c1 t c2 t c3 One can replace the subterm p r:c1 t c2 , and p = u + v w, by the subterm: u r:c1 u v r:c2 u w r:c1 u c2 One can replace the subterm k r:c1 t c2 u c3 , and k = f + g h and the fact that (c1 t c2 ) u c3 is equivalent to (c1 u c3) t (c2 u c3), by the subterm: f r:c1 u c3 u g r:c2 u c3 u h r:c1 u c2 u c3 Finally we get the formula: u r:c1 u v r:c2 u q r:c3 u w r:c1 u c2u f r:c1 u c3 u g r:c2 u c3 u h r:c1 u c2 u c3 v n r:c1 t c2 t c3 with the numerical constraints: n = (u + v + q ) + h (w + f + g ) NB: lower bound estimates for odd number unions are counted positively and upper bound estimates for even number unions are counted negatively. This is quite consistent with the lower bound approximation of the exact set theoretical law. The same kind of reasoning would yield the upper bound approximation, by inversing the roles of atmost and atleast, but keeping the same numerical constraints. The generalization to the general rules for arbitrary unions is left to the reader (easy induction). Generalization to all terms This is quite similar to the section with one single atleast term. 8r:c may only contribute by weakening the subsumption relations c1 v c2 by c1 u c v c2 . Basically, any one of the previous rules can be weakened by the addition of all terms, changing the basic identity axiom c1 t c2 v c1 t c2 into (c3 u c1a) t (c4 u c1b) v c1 t c2 with c3 u c1a v c1 and c4 u c1b v c2. B Survey of Inference Rules In this section we list for each term-forming operator the inference rules in which it occurs. Rules for atomic terms are listed under atomic concepts and atomic roles. B SURVEY OF INFERENCE RULES 112 all >v c c1 v c2 ; r2 v r1 c2 u c1 v ?; r1 v r2 > v c2 t c1; r1 v r2 c1 u c2 v c3 ; r3 v r1 ; r3 v r2 c1 u c2 v c3 ; r2 v r1 ; r2 v r3 c3 v c1 t c2 ; r2 v r1 ; r2 v r3 q c2 u c1 v ?; r1 v r2 p; r1 v r2; r1 v r3; c1 u c3 v c2 q p; r1 v r2; r1 v r3; c1 u c3 v c2 r1 v r2 ; , v r1r3 ; c1 v c2 n jS j; r2 v r1 c1 v c2 c1 t c2 v c3; r3 v r1 t r2 o1 :: 8r:c; o1 :: r:o2 o1 :: 8r:c; o2 :: : c * ) * * * * * * * * * * * * > v 8r:c (10) 8r1:c1 v 8r2:c2 (12) 8 r2:c2 u 9 r1:c1 v ? (14) > v 9r2:c2 t 8r1:c1 (15) 8r1:c1 u 8r2:c2 v 8r3:c3 (16) 8r1:c1 u 9r2:c2 v 9r3:c3 (18) 8r3:c3 v 9r1:c1 t 8r2:c2 (19) :9r:c =: 8r:: c (27) : :8r:c = 9r:: c (28) : 1 r:c = :8r:: c (32) : 0 r:c = 8r:: c (33) n r1:c1 u 8r2:c2 v ? (41) p r1:c1 u 8r3:c3 v q r2:c2 (43) * * * * * * * * * * q r2:c2 u 8r3:c3 v p r1:c1 (44) n r1:c1 u n r2:> v 8r3:c2(45) 8r1:S _ v n r2:> (55) 8>r:c1 v c2 (131) r > v 8?:c (132) 8r1:c1 u 8r2:c2 v 8r3:c3 (133) > v 8rjc:c (134) : 8r1.r2:c = 8r1:(8r2:c) (135) 8r.r :c v c t 0 r:> (136) m r1:> u 8r1:(n r2:c) v m n r1.r2:c (147) * * o2 :: c o1 :: : (r:o2 ) (162) (163) and (Concepts) c1 v c1 c2 ; c1 v v c2 c3 * * * ) c1 u c2 v c1 t c3 c1 u c3 v c2 c1 v c2 u c3 (2) (3) (5) 113 c1 v c2 ; c2 u c3 v c2 u c1 v ?; r1 v c1 u c2 v c3 ; r3 v r1; r3 v c1 u c2 v c3 ; r2 v r1; r2 v c4 r2 r2 r3 c1 u c2 v c3 c1 v c3 t c2 q < p; c1 v c2; r1 v r2 c2 u c1 v ?; r1 v r2 c2 u c1 v ?; r1 v r2 q < p; r1 v r2 ; r1 v r3 ; c1 u c3 v c2 q p; r1 v r2 ; r1 v r3 ; c1 u c3 v c2 q p; r1 v r2 ; r1 v r3 ; c1 u c3 v c2 r1 v r2; , v r1 r3 ; c1 v c2 r v r1 ; r v r2 * * * * * * ) * ) * * * * * c1 u c3 v c4 8r2:c2 u 9r1:c1 v ? 8r1:c1 u 8r2:c2 v 8r3:c3 8r1:c1 u 9r2:c2 v 9r3:c3 cu:cv ? c1 v c3 t : c2 c1 u : c2 v c3 :(c1 u c2) =: : c1 t : c2 :(c1 t c2) =: : c1 u : c2 q r2:c2 u p r1:c1 v ? n r1:c1 u 8r2:c2 v ? n r1:c1 u 8r2:c2 v ? (7) (14) (16) (18) (20) (22) (23) (25) (26) (38) (41) (41) * q r2 :c2 u p r1 :c1 u 8r3 :c3 v ? (42) * p r1:c1 u 8r3 :c3 v q r2:c2 (43) * * * * S1 \ S2 6= ; * o :: c1 ; o :: c2 * ) q r2:c2 u 8r3:c3 v p r1:c1 (44) n r1:c1 u n r2:> v 8r3:c2 (45) p r1:c1 u q r2:c2 v p + q r:c1 t c(47) 2 : _ _ _ S u T = (S \ T ) (52) r:S1 u :r:S2 v ? (152) o :: c1 u c2 (159) and (Roles) v r2; r1 v r1 v r1 v r2 ; r2 u r3 v r3 r2 r4 v r3; r2 v r4 v r2; r3 v r4; c1 v c2 r1 r1 r1 * ) r1 v r2 u r3 * r1 u r3 v r2 * r1 u r3 v r4 * r u : r =: ?r * r1 u r2 v r3 u r4 * r1 u r2 v r1 t r3 * : r1 u : r2 =: : (r1 t r2 ) * : r1 t : r2 =: : (r1 u r2 ) * c1 jr1 u r3 v c2 j(r2 u r4) (58) (64) (65) (66) (67) (68) (69) (72) (87) B SURVEY OF INFERENCE RULES 114 r1 v r1 v r1 v r1 v r2 ; r3 v r2 ; r3 v r2 ; r3 v r2; c1 v v c2 v c2 v c2 v c4 r1 v r2; c1 v c2 ; c3 v c4 r1 v r2; c1 v c2 ; c3 v c4 r1 v r2; c1 v c2 ; c3 v c4 r1 v r2 ; r3 v r4 r1 v r2 ; r3 v r4 c1 u c2 v ? S3 = S1 \ S2 * r1 jc1 u r3 v (r2 u r4)jc2 * c1 j(r1 u r3 ) v c2 jr2 u r4 * (r1 u r3 )jc1 v r2jc2 u r4 * c3 j(c1 jr1 ) v (c2 u c4) jr2 * (c1 u c3 )jr1 v c4 j(c2 jr2) * (r1 jc1 )jc3 v r2j(c2 u c4) * r1 j(c1 u c3 ) v (r2 jc2 )jc4 * r1 u r3 v (r2 u r4 ) * (r1 u r3 ) v r2 u r4 * (>rjc1 ).(c2 j>r) =: ?r * r1 :S1 u r2 :S2 v r1 u r2:S3 r4 ; c1 r4 ; c1 r4 ; c1 c2 ; c3 (88) (89) (90) (96) (97) (99) (100) (107) (108) (121) (150) anyrole > v c; >r v r > v c; >r v r >r v r >r v r1; >r v r2 c1 v c2 * * * * * * * * * * * * * * rv >r >r =: r t : r >r =: : ?r : >r =: ?r >r v c jr >r v rjc >r v r >r v r1.r2 8>r:c1 v c2 > v 9>r:c 9?r:c v ? > v n >r:c 0 >r:c v ? > v >r :S (57) (61) (62) (73) (78) (79) (105) (118) (131) (137) (138) (141) (145) (148) anything >v c > v c2 t c1; r1 v r2 * cv > * ) > v 8r:c * > v 9r2 :c2 t 8r1 :c1 * >v ct:c (9) (10) (15) (21) 115 q < p; c1 v c2 ; r1 v r2 r1 v r2 ; , v r1r3 ; c1 v c2 jS j n n jS j; r2 v r1 > v c; r1 v r2 > v c; r1 v r2 > v c; >r v r > v c; >r v r * * * * * * * * cv ? * * * * * * * * > v q r2:c2 t p r1:c1 n r1:c1 u n r2:> v 8r3:c2 > v n r:S _ 8r1:S _ v n r2:> r1 v c jr2 r1 v r2 jc >r v c jr >r v rjc > v n r:c > v 8?r:c > v 8rjc:c > v 9>r:c > v n >r:c > v n ?r:c > v >r :S o :: > (39) (45) (54) (55) (74) (75) (78) (79) (29) (132) (134) (137) (141) (146) (148) (158) atleast cv ? * n r:c v ? * 1 r:c =: 9r:c * 1 r:c =: :8r:: c m = n 1 * :n r:c =: m r:c m = n + 1 * : n r:c =: m r:c q p; c1 v c2; r1 v r2 * p r1:c1 v q r2 :c2 q < p; c1 v c2; r1 v r2 * q r2:c2 u p r1 :c1 v ? q < p; c1 v c2; r1 v r2 * > v q r2 :c2 t p r1 :c1 q < p; r1 v r2 ; r1 v r3 ; c1 u c3 v c2 * q r2:c2 u p r1 :c1 u 8r3 :c3 v ? q p; r1 v r2 ; r1 v r3 ; c1 u c3 v c2 * p r1:c1 u 8r3 :c3 v q r2 :c2 r1 v r2 ; , v r1 r3; c1 v c2 * n r1 :c1 u n r2:> v 8r3 :c2 n = jS j * r:S =: n r:S _ jS j < n * n r:S _ v ? * > v n >r:c (30) (31) (32) (35) (36) (37) (38) (39) (42) (43) (45) (50) (53) (141) B SURVEY OF INFERENCE RULES 116 o1 :: c; : : :; on :: c * n ?r:c v ? * n cjr:> v c * m r1:(n r2:c) v n r1.r2 :c * o :: n r:c (142) (143) (144) (165) atmost cv ? * > v n r:c (29) : * 0 r:c = 8r:: c (33) : * 0 r:c = :9r:c (34) : m = n 1 * :n r:c = m r:c (35) : m = n + 1 * : n r:c = m r:c (36) q < p; c1 v c2 ; r1 v r2 * q r2 :c2 u p r1:c1 v ? (38) q < p; c1 v c2 ; r1 v r2 * > v q r2:c2 t p r1 :c1 (39) p q; c2 v c1 ; r2 v r1 * p r1 :c1 v q r2 :c2 (40) q < p; r1 v r2; r1 v r3; c1 u c3 v c2 * q r2 :c2 u p r1:c1 u 8r3 :c3 v ? (42) q p; r1 v r2; r1 v r3; c1 u c3 v c2 * q r2 :c2 u 8r3:c3 v p r1 :c1 (44) (45) r1 v r2 ; , v r1r3 ; c1 v c2 * n r1:c1 u n r2 :> v 8r3 :c2 r v r1; r v r2 * p r1 :c1 u q r2:c2 v p + q r:c1 t c2 (47) jS j n * > v n r:S _ (54) n jS j; r2 v r1 * 8r1 :S _ v n r2 :> (55) c v 0 r1 :>; r2 v r1 * c jr2 v ?r (82) c v 0 r1 :>; r2 v r1 * r2 jc v ?r (85) c v 0 r1 :>; r2 v r1 * r2 jc v ?r (86) * 8r.r :c v c t 0 r:> (136) * 0 >r:c v ? (145) r * > v n ?:c (146) * m r1 :> u 8r1 :(n r2 :c) v m n r1.r2:c (147) Atomic Concepts * cv c (1) 117 c1 v c2 * * * * * * cv > ?v c :: c =: c 8>r:c1 v c2 9cjr:> v c n cjr:> v c (9) (8) (24) (131) (139) (143) Atomic Roles * r =: r * r v >r * r =: : : r * ?r v r * r1 v cjr2 * r1 v r2jc * cjr1 v r2 * r1 jc v r2 * r1 v r2 * r1 v r2 * r1 v r2 * r1 v r2 (56) (57) (60) (63) (74) (75) (76) (77) (101) (102) (103) (104) * >r v r1 .r2 * r1.r2 v ?r * r1.r2 v ?r * (>rjc1 ).(c2 j>r) =: ?r (118) (119) (120) (121) c1 j(r1 .r3) v c2 jr2 .r4 c1 jr1 .r3 v c2 j(r2.r4 ) c1 j(r1 .r3) v c2 jr2 .r4 r1jc1 .r3 v (r2 .r4)jc2 (r1 .r3 ) v r4 .r2 r1 .r3 v (r4 .r2 ) (122) (123) (124) (125) (126) (127) > v c; r1 v r2 > v c; r1 v r2 r1 v r2 r1 v r2 r1 v r2 r1 v r2 r1 v r2 r1 v r2 comp r2 v r1 v r1 v r1 v r1 v >r v r1; >r v r2 r1 v ?r r2 v ?r c1 u c2 v ? r c2 j>; c1 u c2 v ?; r2 ; r3 v r4 ; c1 v c2 r2 ; r3 v r4 ; c1 v c2 r2 ; r3 v r4 ; c1 v c2 r2 ; r3 v r4 ; c1 v c2 r1 v r2 ; r3 v r4 r1 v r2 ; r3 v r4 * * * * * * B SURVEY OF INFERENCE RULES 118 r1 r1 v v r1 r2 ; r3 r2 ; r3 v r3; r2 v v r4; r5 v v r4; r5 v r4 r6 r6 o 2S o1 :: r1:o2 ; o2 :: r2 :o3 * * * * * * * * * * r1 .r2 v r3 .r4 (r1 .r3).r5 v r2 .(r4.r6 ) r1 .(r3.r5 ) v (r2.r4).r6 8r1.r2:c =: 8r1:(8r2:c) 8r.r :c v c t 0 r:> 9r1.r2:c =: 9r1:(9r2:c) m r1:(n r2:c) v n r1.r2:c m r1:> u 8r1:(n r2:c) v m n r1.r2:c r1 :r2 :S v 9r1:(r2:o) o1 :: r1 :r2 :o3 (128) (129) (130) (135) (136) (140) (144) (147) (155) (167) domain > v c; r1 v r2 r1 v r2 > v c; >r v r > v c; >r v r r v ?r cv ? c v 0 r1 :>; r2 v r1 r1 v r2; r3 v r4 ; c1 v c2 r1 v r2; r3 v r4 ; c1 v c2 r1 v r2; r3 v r4 ; c1 v c2 r1 v r2 ; c1 v c2 r1 v r2 ; c1 v c2 r1 v r2; c1 v c2 ; c3 v c4 r1 v r2; c1 v c2 ; c3 v c4 r1 v r2 ; c1 v c2 r1 v r2 ; c1 v c2 r1 v r2 ; c1 v c2 r1 v r2 ; c1 v c2 r1 v r2; r3 v r4 ; c1 v c2 r1 v r2; r3 v r4 ; c1 v c2 * * * * * * * * * * * * * * * * * * * * * v cjr2 c jr1 v r2 >r v c jr >r v rjc c jr v ? c jr v ? c jr2 v ?r c1 jr1 u r3 v c2 j(r2 u r4 ) c1 j(r1 u r3 ) v c2 jr2 u r4 c1 j(r1 t r3 ) v c2 jr2 t r4 c1 jr1 v : (: c2 j: r2 ) c1 jr1 v c2 jr2 c3 j(c1 jr1) v (c2 u c4 ) jr2 (c1 u c3) jr1 v c4 j(c2 jr2) c1 jr1 v (r2 jc2 ) (r1 jc1 ) v c2 jr2 r1 jc1 v (c2 jr2 ) (c1 jr1 ) v r2 jc2 c1 j(r1.r3 ) v c2 jr2.r4 c1 jr1 .r3 v c2 j(r2 .r4 ) 9cjr:> v c r1 (74) (76) (78) (79) (80) (81) (82) (87) (89) (91) (93) (95) (96) (97) (113) (114) (115) (116) (122) (123) (139) 119 * n cjr:> v c * cjr:S v c * c u r:o v c jr:o (143) (153) (154) fills n = jS j * * * S3 = S1 \ S2 * * S1 \ S2 6= ; * * * o 2S * * o1 :: 8r:c; o1 :: r:o2 * o1 :: 8r:c; o2 :: : c * o1 :: r:o2 ; o2 :: c * o1 :: c; : : :; on :: c * o1 :: r:o2 ; o2 :: c * o1 :: r1 :o2; o2 :: r2 :o3 * o1 :: r:o2 * : n r:S _ > v >r :S ?r :S v ? r1 :S1 u r2 :S2 v r1 u r2 :S3 : (:r):o = : (r:o) r:S1 u :r:S2 v ? c jr:S v c r:S = c u r:o v c jr:o r1 :r2:S v 9r1 :(r2 :o) r :o v 9r :(9r:(r :o)) o2 :: c o1 :: : (r:o2) o1 :: 9r:c o :: n r:c o1 :: rjc :o2 o1 :: r1:r2:o3 o2 :: r :o1 (50) (148) (149) (150) (151) (152) (153) (154) (155) (156) (162) (163) (164) (165) (166) (167) (168) inv cv cv 0 r1:>; r2 v r1 0 r1 :>; r2 v r1 r1 v r2 r1 v r2 r1 v r2 r1 v r2 >r v r r v ?r r1 v r2 ; r3 v r4 * r2jc v ?r * r2jc v ?r * r1 v r2 * r1 v r2 * r1 v r2 * r1 v r2 * >r v r * r v ?r * r1 u r3 v (r2 u r4 ) (85) (86) (101) (102) (103) (104) (105) (106) (107) B SURVEY OF INFERENCE RULES 120 r1 v r1 v r1 v r1 v r1 v r1 v r1 v r1 r1 v v r2 ; r3 v r2 ; r3 v r2 ; r3 v r2 ; c1 v r2 ; c1 v r2 ; c1 v r2 ; c1 v r1 v r2 ; r3 v r2 ; r3 v r4 r4 r4 c2 c2 c2 c2 r2 r4 r4 o1 :: r:o2 * (r1 u r3 ) v r2 u r4 * r1 t r3 v (r2 t r4 ) * (r1 t r3 ) v r2 t r4 * c1 jr1 v (r2 jc2 ) * (r1 jc1 ) v c2 jr2 * r1 jc1 v (c2 jr2 ) * (c1 jr1 ) v r2 jc2 * r1 v r2 * (r1 .r3) v r4 .r2 * r1 .r3 v (r4 .r2) * 8r.r :c v c t 0 r:> * r :o v 9r :(9r:(r :o)) * o2 :: r :o1 (108) (109) (110) (113) (114) (115) (116) (117) (126) (127) (136) (156) (168) norole r v ?r cv ? c v 0 r1 :>; r2 v r1 r v ?r cv ? c v 0 r1 :>; r2 v r1 c v 0 r1 :>; r2 v r1 r v ?r r1 v ?r r2 v ?r c1 u c2 v ? * * * * * * * * * * * * * * * * * * * >r =: : ?r ?r v r : r u : r = ?r : >r =: ?r c jr v ?r c jr v ?r c jr2 v ?r rjc v ?r rjc v ?r r2 jc v ?r r2 jc v ?r r v ?r r1 .r2 v ?r r1 .r2 v ?r : (>rjc1 ).(c2 j>r) = ?r > v 8?r:c 9?r:c v ? n ?r:c v ? > v n ?r:c (62) (63) (66) (73) (80) (81) (82) (83) (84) (85) (86) (106) (119) (120) (121) (132) (138) (142) (146) 121 * ?r :S v ? (149) not (Concepts) * * c1 u c2 v c3 * ) c1 v c3 t c2 * ) * * * * * * m=n 1 * m=n+1 * * o 62 S * o1 :: 8r:c; o2 :: : c * cu:cv ? >v ct:c c1 v c3 t : c2 c1 u : c2 v c3 :: c =: c :(c1 u c2) =: : c1 t : c2 :(c1 t c2) =: : c1 u : c2 :8r:c =: 9r:: c 1 r:c =: :8r:: c 0 r:c =: :9r:c :n r:c =: m r:c : n r:c =: m r:c : (:r):o = : (r:o) o :: : S _ o1 :: : (r:o2 ) (20) (21) (22) (23) (24) (25) (26) (28) (32) (34) (35) (36) (151) (161) (163) not (Roles) r1 r1 v r2; c1 v c2 v r2; c1 v c2 r1 v r2 r1 v r2 * * * * * * * * * * * : ::r >r =: : ?r : r u : r = ?r : r1 u : r2 =: : (r1 t r2) : r1 t : r2 =: : (r1 u r2) : >r =: ?r r= c1 jr1 v : (: c2 j: r2 ) r1 jc1 v : (: r2 j: c2 ) : r1 v (: r2 ) (: r1 ) v : r2 : (:r):o = : (r:o) (60) (62) (66) (69) (72) (73) (93) (94) (111) (112) (151) B SURVEY OF INFERENCE RULES 122 nothing * cv ? * ) c2 u c1 v ?; r1 v r2 * * cv ? * cv ? * q < p; c1 v c2; r1 v r2 * c2 u c1 v ?; r1 v r2 * q < p; r1 v r2 ; r1 v r3 ; c1 u c3 v c2 * jS j < n * * * * S1 \ S2 6= ; * ?v c 9r:c v ? 8 r2:c2 u 9 r1:c1 v ? cu:cv ? > v n r:c n r:c v ? q r2:c2 u p r1:c1 v ? n r1:c1 u 8r2:c2 v ? q r2:c2 u p r1:c1 u 8r3:c3 v ? n r:S _ v ? n ?r:c v ? 0 >r:c v ? ?r :S v ? r:S1 u :r:S2 v ? (8) (11) (14) (20) (29) (30) (38) (41) (42) (53) (142) (145) (149) (152) Objects * ) * o :: c1 ; o :: c2 * ) o2S * o2 6 S * o1 :: 8r:c; o1 :: r:o2 * o1 :: 8r:c; o2 :: : c * o1 :: r:o2 ; o2 :: c * o :: r:fo1 ; : : : ; on g; o1 :: c; : : : ; on :: c * o1 :: r:o2 ; o2 :: c * o1 :: r1 :o2 ; o2 :: r2 :o3 * o1 :: r:o2 * o :: c1 ; o :: c2 o :: c1 u c2 o :: > o :: c1 u c2 o :: S _ o :: : S _ o2 :: c o1 :: : (r:o2 ) o1 :: 9r:c o :: n r:c o1 :: rjc :o2 o1 :: r1 :r2 :o3 o2 :: r :o1 (157) (158) (159) (160) (161) (162) (163) (164) (165) (166) (167) (168) oneof n = jS j * r:S : n r:S _ = (50) 123 ST * * jS j < n * jS j n * n jS j; r2 v r1 * o2S * o 62 S * S_ v T _ S _ u T _ =: (S \ T )_ n r:S _ v ? > v n r:S _ 8r1:S _ v n r2:> o :: S _ o :: : S _ (51) (52) (53) (54) (55) (160) (161) or (Concepts) c1 v c2 c2 v c1; c3 v c1 > v c2 t c1; r1 v r2 c3 v c1 t c2 ; r3 v r1 ; r3 v r2 c3 v c1 t c2 ; r2 v r1 ; r2 v r3 c1 u c2 v c3 c1 v c3 t c2 q < p; c1 v c2 ; r1 v r v r1 ; r v r2 r2 * c1 u c2 v c1 t c3 * c1 v c2 t c3 * ) c2 t c3 v c1 * > v 9r2:c2 t 8r1 :c1 (2) (4) (6) (15) * 9r3 :c3 v 9r1:c1 t 9r2 :c2 (17) * * * ) * ) * * * * * * 8r3:c3 v 9r1:c1 t 8r2:c2 (19) >v ct:c (21) c1 v c3 t : c2 (22) c1 u : c2 v c3 (23) : :(c1 u c2) = : c1 t : c2 (25) : :(c1 t c2) = : c1 u : c2 (26) : :9r:c = 8r:: c (27) > v q r2:c2 t p r1:c1 (39) p r1:c1 u q r2:c2 v p + q r:c1 t c2 (47) 8r.r :c v c t 0 r:> (136) or (Roles) v r2 v r1; r3 v r1 r1 r2 * r1 v r2 t r3 * >r =: r t : r * r1 u r2 v r1 t r3 * : r1 u : r2 =: : (r1 t r2 ) * r2 t r3 v r1 (59) (61) (68) (69) (70) B SURVEY OF INFERENCE RULES 124 r1 v r3 ; r2 v r4 v r2; r3 v r4; c1 v c2 v r2; r3 v r4; c1 v c2 r1 v r2 ; r3 v r4 r1 v r2 ; r3 v r4 c1 t c2 v c3 ; r3 v r1 t r2 r1 r1 * r1 t r2 v r3 t r4 * : r1 t : r2 =: : (r1 u r2) * c1 j(r1 t r3) v c2 jr2 t r4 * (r1 t r3 )jc1 v r2jc2 t r4 * r1 t r3 v (r2 t r4) * (r1 t r3 ) v r2 t r4 * 8r1:c1 u 8r2 :c2 v 8r3 :c3 (71) (72) (91) (92) (109) (110) (133) range > v c; r1 v r2 r1 v r2 r v ?r c v 0 r1 :>; r2 v r1 c v 0 r1 :>; r2 v r1 r1 v r2; r3 v r4 ; c1 v c2 r1 v r2; r3 v r4 ; c1 v c2 r1 v r2; r3 v r4 ; c1 v c2 r1 v r2 ; c1 v c2 r1 v r2 ; c1 v c2 r1 v r2; c1 v c2 ; c3 v c4 r1 v r2; c1 v c2 ; c3 v c4 r1 v r2 ; c1 v c2 r1 v r2 ; c1 v c2 r1 v r2 ; c1 v c2 r1 v r2 ; c1 v c2 c1 u c2 v ? r1 v r2; r3 v r4 ; c1 v c2 r1 v r2; r3 v r4 ; c1 v c2 o1 :: r:o2; o2 :: c * r1 v r2 jc * r1 jc v r2 * rjc v ? * r2 jc v ?r * r2 jc v ?r * r1 jc1 u r3 v (r2 u r4 )jc2 * (r1 u r3 )jc1 v r2jc2 u r4 * (r1 t r3 )jc1 v r2jc2 t r4 * r1 jc1 v : (: r2 j: c2 ) * r1 jc1 v r2 jc2 * (r1 jc1 )jc3 v r2 j(c2 u c4) * r1j(c1 u c3 ) v (r2 jc2 )jc4 * c1 jr1 v (r2 jc2 ) * (r1 jc1 ) v c2 jr2 * r1 jc1 v (c2 jr2 ) * (c1 jr1 ) v r2 jc2 * (>rjc1 ).(c2 j>r) =: ?r * c1 j(r1.r3 ) v c2 jr2.r4 * r1 jc1 .r3 v (r2 .r4 )jc2 * > v 8rjc:c * o1 :: rjc:o2 (75) (77) (83) (85) (86) (88) (90) (92) (94) (98) (99) (100) (113) (114) (115) (116) (121) (124) (125) (134) (166) some cv ? * ) 9r:c v ? (11) c1 v c2 ; r1 c2 u c1 v ?; r1 > v c2 t c1; r1 c3 v c1 t c2; r3 v r1 ; r3 c1 u c2 v c3; r2 v r1 ; r2 c3 v c1 t c2; r2 v r1 ; r2 v v v v v v * * * * * * * * * * * * * * o 2S * * o1 :: r:o2 ; o2 :: c * r2 r2 r2 r2 r3 r3 125 9r1:c1 v 9r2:c2 8 r2:c2 u 9 r1:c1 v ? > v 9r2:c2 t 8r1:c1 9r3:c3 v 9r1:c1 t 9r2:c2 8r1:c1 u 9r2:c2 v 9r3:c3 8r3:c3 v 9r1:c1 t 8r2:c2 :9r:c =: 8r:: c :8r:c =: 9r:: c 1 r:c =: 9r:c 0 r:c =: :9r:c > v 9>r:c 9?r:c v ? 9cjr:> v c 9r1.r2:c =: 9r1:(9r2:c) r1 :r2 :S v 9r1:(r2 :o) r :o v 9r :(9r:(r :o)) o1 :: 9r:c (13) (14) (15) (17) (18) (19) (27) (28) (31) (34) (137) (138) (139) (140) (155) (156) (164)
© Copyright 2025 Paperzz