• Keine Ergebnisse gefunden

Description Logic

N/A
N/A
Protected

Academic year: 2022

Aktie "Description Logic"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Faculty of Computer Science Institute of Theoretical Computer Science, Chair of Automata Theory

Description Logic

Winter Semester 2017/18

Exercise Sheet 8 6th December 2017

Prof. Dr.-Ing. Franz Baader, Dr.-Ing. Stefan Borgwardt

Exercise 8.1 Recall the tableau algorithm forALCN with blocking, and the example that shows non-termination when using the≤-rulewithout pruning. At each step of the algorithm, write down the multisetµ(A)for the current ABoxA, and explain why the termination proof fails in this case.

Exercise 8.2 Prove that the tableau algorithm forALCN is sound and complete.

Exercise 8.3 We extend the tableau algorithm fromALCN toALCQby modifying the≥-rule and the≤-rule as follows:

The≥-rule

Condition: Acontainsa:(≥n r.C), but there are nondistinct individualsb1, . . . ,bn with{(a,bi):r,bi:C|1≤i≤n} ⊆ A, andais not blocked

Action: A −→ A ∪ {(a,di):r,di:C |1 ≤ i≤ n} ∪ {di 6= dj |1 ≤ i< j≤ n}, whered1, . . . ,dnare new individual names

The≤-rule

Condition: Acontainsa:(≤n r.C), and there aren+1distinct individualsb0, . . . ,bn with{(a,bi):r,bi:C|0≤i≤n} ⊆ A

Action: A −→prune(A,bj)[bj 7→bi]∪ {bi =bj}fori6=jsuch that, ifbjis a root individual, then so isbi

For the knowledge base CvE ,

a:(≤1r.(DuE)), (a,b):r, b:CuD, (a,c):r, c:DuE, c:¬C , determine whether it is consistent, and whether the proposed algorithm detects this.

Exercise 8.4 LetT be an acyclic TBox in NNF, and letTvbe obtained fromT by replacing each definitionA≡ C∈ T withAvC. Prove that every concept name A0is satisfiable w.r.t.T iff it is satisfiable w.r.t.Tv. Does this also hold for the acyclic TBox{A≡Cu ¬B, B≡P, C≡P}?

Exercise 8.5 Use theALC-Worldsalgorithm to decide satisfiability of the concept nameA0w.r.t. the following simple TBox:

{A0≡ A1uA2, A1≡ ∃r.A3, A3 ≡P, A2≡ A4uA5, A4≡ ∃r.A6, A6 ≡Q, A5≡ A7uA8, A7≡ ∀r.A4, A8 ≡ ∀r.A9, A9≡ ∀r.A10, A10≡ ¬P}

Draw the recursion tree of a successful run and of an unsuccessful run. Does the algorithm return a positive or a negative result on this input?

1

Referenzen

ÄHNLICHE DOKUMENTE

  Different individual names denote different domain objects.   Usually NOT adopted in DL and first- order settings

As solving this problem exactly is time-consuming, a greedy evaluation procedure is used for approximating the quality of intermediate leader solution candidates, which is described

We mention theoretical work on prediction properties of Pad´e approximants and related algorithms like the epsilon algorithm, and the iterated Aitken and Theta algorithms

(We only report these for the case where relative risk aversion is equal to 2; the results for the high risk aversion economies were almost identical.) Note that in the …ve

Submit until July 2nd 2020, 2:00 pm in the ILIAS.. Review in the exercise course on July

Closed-Orbit Bilinear-Exponential Analysis (COBEA) is an algorithm to decompose monitor-corrector response matrices into (scaled) beta optics values, phase advances, scaled

According to our proposed approach, during DDoS attack scenarios, most packets are generated by attackers, so the packet score value is higher than the packet score value during

• If the whole story keeps on confusing you all the time, we will try to clear up some things on