Skip to main content

Extending Defeasible Reasoning Beyond Rational Closure

  • Conference paper
  • First Online:
Artificial Intelligence Research (SACAIR 2023)

Abstract

The KLM framework is a well known extension of classical logic for incorporating defeasible reasoning. Central to the KLM framework is rational closure, recognized as the most conservative approach to defeasible reasoning. Rational closure operates through two complementary paradigms: model-theoretic and formula-theoretic. This paper concentrates on the model-theoretic dimension, known as minimal ranked entailment. Unfortunately, the practical implementation of minimal ranked entailment remains largely impractical due to high computational and storage demands. To address this, we present reduced minimal ranked entailment, an optimization that employs reduced ordered binary decision diagrams to eliminate redundant information, thereby enhancing computational efficiency and reducing memory requirements. We further demonstrate that this optimized approach significantly facilitates the practical application and development of model-theoretic extensions of rational closure. This is illustrated through our own Bayesian refinement of minimal ranked entailment, which conceptualizes defeasible entailment as a form of conditional probability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Often likened to the transition in an academic career, before and after securing a permanent university position.

  2. 2.

    A DI can also defeat a classical formula, though this would make it redundant.

  3. 3.

    Many BDD libraries also include optimizations like garbage collection, a process that frees up memory by removing nodes that are no longer in use.

  4. 4.

    It is crucial to emphasize that this refers to the models of \( \alpha \) devoid of extraneous information, meaning they contain exclusively the atoms found in \( \alpha \).

References

  1. Akers: Binary decision diagrams. IEEE Trans. Comput. C-27(6), 509–516 (1978). https://doi.org/10.1109/TC.1978.1675141

  2. Bayes, T.: An essay towards solving a problem in the doctrine of chances. Philos. Trans. Roy. Soc. London 53, 370–418 (1763)

    Google Scholar 

  3. Ben-Ari, M.: Propositional logic: formulas, models, tableaux. In: Ben-Ari, M. (ed.) Mathematical Logic for Computer Science, pp. 7–47. Springer, London (2012). https://doi.org/10.1007/978-1-4471-4129-7_2

    Chapter  MATH  Google Scholar 

  4. Bollig, B., Wegener, I.: Improving the variable ordering of OBDDs is NP-complete. IEEE Trans. Comput. 45(9), 993–1002 (1996). https://doi.org/10.1109/12.537122

    Article  MATH  Google Scholar 

  5. Bryant, R.E.: Graph-based algorithms for Boolean function manipulation. IEEE Trans. Comput. C-35(8), 677–691 (1986). https://doi.org/10.1109/TC.1986.1676819

  6. Bryant, R.E.: Binary decision diagrams: an algorithmic basis for symbolic model checking (2019). https://api.semanticscholar.org/CorpusID:202740601

  7. Casini, G., Meyer, T., Varzinczak, I.: Taking defeasible entailment beyond rational closure. In: Calimeri, F., Leone, N., Manna, M. (eds.) JELIA 2019. LNCS (LNAI), vol. 11468, pp. 182–197. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-19570-0_12

    Chapter  Google Scholar 

  8. Drechsler, R., Becker, B., Göckel, N.: Genetic algorithm for variable ordering of OBDDs. In: IEE Proceedings of the Computers and Digital Techniques, vol. 143, pp. 364–368 (1996). https://doi.org/10.1049/ip-cdt:19960789

  9. Freund, M.: Preferential reasoning in the perspective of Poole default logic. Artif. Intell. 98(1–2), 209–235 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  10. Giordano, L., Gliozzi, V., Olivetti, N., Pozzato, G.: Semantic characterization of rational closure: from propositional logic to description logics. Artif. Intell. 226, 1–33 (2015). https://doi.org/10.1016/j.artint.2015.05.001, https://www.sciencedirect.com/science/article/pii/S0004370215000673

  11. Goldszmidt, M., Pearl, J.: System-Z+: a formalism for reasoning with variable-strength defaults. In: Proceedings of the Ninth National Conference on Artificial Intelligence, AAAI 1991, vol. 1, p. 399–404. AAAI Press (1991)

    Google Scholar 

  12. Kraus, S., Lehmann, D., Magidor, M.: Nonmonotonic reasoning, preferential models and cumulative logics. Artif. Intell. 44(1), 167–207 (1990). https://doi.org/10.1016/0004-3702(90)90101-5, https://www.sciencedirect.com/science/article/pii/0004370290901015

  13. Laplace, P.S.: Théorie Analytique des Probabilités. Courcier (1812)

    Google Scholar 

  14. Lee, C.Y.: Representation of switching circuits by binary-decision programs. Bell Syst. Tech. J. 38(4), 985–999 (1959). https://doi.org/10.1002/j.1538-7305.1959.tb01585.x

    Article  MathSciNet  Google Scholar 

  15. Lehmann, D.: Another perspective on default reasoning. Ann. Math. Artif. Intell. 15, 61–82 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  16. Lehmann, D., Magidor, M.: What does a conditional knowledge base entail? Artif. Intell. 55(1), 1–60 (1992). https://doi.org/10.1016/0004-3702(92)90041-U, https://www.sciencedirect.com/science/article/pii/000437029290041U

  17. Pearl, J.: System Z: a natural ordering of defaults with tractable applications to nonmonotonic reasoning. In: Proceedings of the 3rd Conference on Theoretical Aspects of Reasoning about Knowledge, TARK 1990, pp. 121–135. Morgan Kaufmann Publishers Inc., San Francisco (1990)

    Google Scholar 

  18. Rudell, R.: Dynamic variable ordering for ordered binary decision diagrams. In: Proceedings of 1993 International Conference on Computer Aided Design (ICCAD), pp. 42–47 (1993). https://doi.org/10.1109/ICCAD.1993.580029

  19. Valiant, L.G.: The complexity of enumeration and reliability problems. SIAM J. Comput. 8(3), 410–421 (1979). https://doi.org/10.1137/0208032

    Article  MathSciNet  MATH  Google Scholar 

  20. Wolpert, D., Macready, W.: No free lunch theorems for optimization. IEEE Trans. Evol. Comput. 1(1), 67–82 (1997). https://doi.org/10.1109/4235.585893

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luke Slater .

Editor information

Editors and Affiliations

Appendices

A Rational Closure Algorithms

Algorithm 6
figure f

BaseRank

Algorithm 7
figure g

RationalClosure

Algorithm 8
figure h

MinimalRank

Algorithm 9
figure i

MinimalEntailment

B Irredundant Base Rank Algorithms

Algorithm 10
figure j

IrredundantBaseRank

Algorithm 11
figure k

IrredundantRationalClosure

C Proof of Properties for Naive Bayes Entailment

Theorem 1

Naive bayes entailment is not LM-rational.

Reflexivity. Reflexivity stipulates that all formulas should be defeasible consequences of themselves, a condition generally met by any defeasible entailment relation.

$$\begin{aligned} (Ref) \ \ \mathcal {K}\mid \approx \alpha \mid \!\sim \alpha \end{aligned}$$
(4)

Lemma 1

Naive bayes entailment satisfies reflexivity.

Proof

Naive bayes entailment identifies the most statistically probable minimal models consistent with any evidential fragment in \(\llbracket \alpha \rrbracket \). It is therefore guaranteed to return a set of models that each satisfy \(\alpha \).

Left Logical Equivalence. Left logical equivalence posits that if two formulas are logically equivalent, then their respective defeasible consequences must also be identical.

$$\begin{aligned} (LLE) \ \ \frac{\alpha \equiv \beta , \ \ \mathcal {K}\mid \approx \alpha \mid \!\sim \beta }{\mathcal {K}\mid \approx \beta \mid \!\sim \gamma } \end{aligned}$$
(5)

Lemma 2

Naive bayes entailment satisfies left logical equivalence.

Proof

Should \(\alpha \equiv \beta \), it follows by definition that \(\llbracket \alpha \rrbracket = \llbracket \beta \rrbracket \), indicating identical evidential fragments. Naive bayes entailment will therefore return the same models for both \(\alpha \) and \(\beta \).

Right Weakening. Right weakening asserts that if \(\beta \) is a defeasible consequence of \(\alpha \), then any formula that is logically equivalent to \(\beta \) must likewise be a defeasible consequence of \(\alpha \).

$$\begin{aligned} (RW) \ \ \frac{\mathcal {K}\mid \approx \alpha \mid \!\sim \beta , \ \ \beta \models \gamma }{\mathcal {K}\mid \approx \alpha \mid \!\sim \gamma } \end{aligned}$$
(6)

Lemma 3

Naive bayes entailment satisfies right weakening.

Proof

If \(\mathcal {K}\mid \approx \alpha \mid \!\sim \beta \), then all models returned by naive bayes entailment satisfy \(\beta \). Given that \(\beta \models \gamma \), it follows by definition that \(\llbracket \beta \rrbracket \subseteq \llbracket \gamma \rrbracket \), thereby ensuring that each model also satisfies \(\gamma \).

And. And dictates that the conjunction of any defeasible consequences of a formula should likewise be a defeasible consequence of that formula.

$$\begin{aligned} (And) \ \ \frac{\mathcal {K}\mid \approx \alpha \mid \!\sim \beta , \ \ \mathcal {K}\mid \approx \alpha \mid \!\sim \gamma }{\mathcal {K}\mid \approx \alpha \mid \!\sim \beta \wedge \gamma } \end{aligned}$$
(7)

Lemma 4

Naive bayes entailment satisfies and.

Proof

If every model returned by naive bayes entailment for \(\alpha \) satisfies both \(\beta \) and \(\gamma \), then they are guaranteed to satisfy \(\beta \wedge \gamma \).

Or. Or states that a defeasible consequence of two individual formulas should also be a defeasible consequence of their disjunction.

$$\begin{aligned} (Or) \ \ \frac{\mathcal {K}\mid \approx \alpha \mid \!\sim \gamma , \ \ \mathcal {K}\mid \approx \beta \mid \!\sim \gamma }{\mathcal {K}\mid \approx \alpha \vee \beta \mid \!\sim \gamma } \end{aligned}$$
(8)

Lemma 5

Naive bayes entailment does not satisfy or.

Proof

Consider \(\mathcal {K}= \{\texttt {a} \mid \!\sim \texttt {b}, \texttt {c} \rightarrow \texttt {a}, \texttt {c} \mid \!\sim \lnot \texttt {b}, \texttt {d} \rightarrow \texttt {c}, \texttt {d} \mid \!\sim \texttt {e}, \texttt {f} \rightarrow \texttt {a}, \texttt {f} \mid \!\sim \lnot \texttt {b} \}\), Fig. 7 shows a corresponding reduced \(\mathcal {R}^{\mathcal {K}}_{RC}\). Naive bayes entailment identifies \(\texttt {f}{} \texttt {e}\overline{\texttt {d}}{} \texttt {c}\overline{\texttt {b}}{} \texttt {a}\) and \(\overline{\texttt {f}}{} \texttt {e}\overline{\texttt {d}}{} \texttt {c}\overline{\texttt {b}}{} \texttt {a}\) as most probable for c, making \(\mathcal {K}\mid \approx _{NB} \texttt {c} \mid \!\sim \texttt {e}\) true. Naive bayes entailment also identifies \(\texttt {f}{} \texttt {e}\overline{\texttt {d}}{} \texttt {c}\overline{\texttt {b}}{} \texttt {a}\) as most probable for f, making \(\mathcal {K}\mid \approx _{NB} \texttt {f} \mid \!\sim \texttt {e}\) true. However, the most probable models for \(\texttt {c} \vee \texttt {f}\) are \(\texttt {f}{} \texttt {e}\overline{\texttt {d}}\overline{\texttt {c}}\overline{\texttt {b}}{} \texttt {a}\) and \(\texttt {f}\overline{\texttt {e}}\overline{\texttt {d}}\overline{\texttt {c}}\overline{\texttt {b}}{} \texttt {a}\), making \(\mathcal {K}\mid \approx _{NB} \texttt {c} \vee \texttt {f} \mid \!\sim \texttt {e}\) false.

Fig. 7.
figure 7

Reduced minimal ranked interpretation \(\mathcal {R}^{\mathcal {K}}_{RC}\).

Cautious Monotonicity. Cautious monotonicity posits that the integration of newly deduced information should not negate or undermine any previously inferable conclusions.

$$\begin{aligned} (CM) \ \ \frac{\mathcal {K}\mid \approx \alpha \mid \!\sim \beta , \ \ \mathcal {K}\mid \approx \alpha \mid \!\sim \gamma }{\mathcal {K}\mid \approx \alpha \wedge \beta \mid \!\sim \gamma } \end{aligned}$$
(9)

Lemma 6

Naive bayes entailment does not satisfy cautious monotonicity.

Proof

Consider again the knowledge from the previous proof. Both \(\mathcal {K}\mid \approx _{NB} \texttt {c} \mid \!\sim \texttt {e}\) and \(\mathcal {K}\mid \approx _{NB} \texttt {c} \mid \!\sim \lnot \texttt {d}\) are true. However, naive bayes entailment identifies \(\texttt {f}{} \texttt {e}\overline{\texttt {d}}{} \texttt {c}\overline{\texttt {b}}{} \texttt {a}\), \(\overline{\texttt {f}}{} \texttt {e}\overline{\texttt {d}}{} \texttt {c}\overline{\texttt {b}}{} \texttt {a}\), \(\texttt {f}{} \texttt {e}{} \texttt {d}{} \texttt {c}\overline{\texttt {b}}{} \texttt {a}\), and \(\overline{\texttt {f}}{} \texttt {e}{} \texttt {d}{} \texttt {c}\overline{\texttt {b}}{} \texttt {a}\) as most probable for \(\texttt {c} \wedge \texttt {e}\), making \(\mathcal {K}\mid \approx _{NB} \texttt {c} \wedge \texttt {e} \mid \!\sim \lnot \texttt {d}\) false.

Rational Monotonicity. Rational monotonicity asserts that incorporating information which was not previously negated by existing knowledge should not cause the retraction of any prior conclusions.

$$\begin{aligned} (RM) \ \ \frac{\mathcal {K}\mid \approx \alpha \mid \!\sim \gamma , \ \ \mathcal {K}\not \mid \approx \alpha \mid \!\sim \lnot \beta }{\mathcal {K}\mid \approx \alpha \wedge \beta \mid \!\sim \gamma } \end{aligned}$$
(10)

Lemma 7

Naive bayes entailment does not satisfy rational monotonicity.

Proof

Proving that naive bayes entailment doesn’t satisfy cautious monotonicity concurrently establishes its non-compliance with rational monotonicity.

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Slater, L., Meyer, T. (2023). Extending Defeasible Reasoning Beyond Rational Closure. In: Pillay, A., Jembere, E., J. Gerber, A. (eds) Artificial Intelligence Research. SACAIR 2023. Communications in Computer and Information Science, vol 1976. Springer, Cham. https://doi.org/10.1007/978-3-031-49002-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49002-6_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49001-9

  • Online ISBN: 978-3-031-49002-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics