77 research outputs found

    The Complexity of Reasoning for Fragments of Default Logic

    Get PDF
    Default logic was introduced by Reiter in 1980. In 1992, Gottlob classified the complexity of the extension existence problem for propositional default logic as \SigmaPtwo-complete, and the complexity of the credulous and skeptical reasoning problem as SigmaP2-complete, resp. PiP2-complete. Additionally, he investigated restrictions on the default rules, i.e., semi-normal default rules. Selman made in 1992 a similar approach with disjunction-free and unary default rules. In this paper we systematically restrict the set of allowed propositional connectives. We give a complete complexity classification for all sets of Boolean functions in the meaning of Post's lattice for all three common decision problems for propositional default logic. We show that the complexity is a hexachotomy (SigmaP2-, DeltaP2-, NP-, P-, NL-complete, trivial) for the extension existence problem, while for the credulous and skeptical reasoning problem we obtain similar classifications without trivial cases.Comment: Corrected versio

    The complexity of theorem proving in autoepistemic logic

    Get PDF
    Autoepistemic logic is one of the most successful formalisms for nonmonotonic reasoning. In this paper we provide a proof-theoretic analysis of sequent calculi for credulous and sceptical reasoning in propositional autoepistemic logic, introduced by Bonatti and Olivetti [5]. We show that the calculus for credulous reasoning obeys almost the same bounds on the proof size as Gentzen's system LK. Hence proving lower bounds for credulous reasoning will be as hard as proving lower bounds for LK. This contrasts with the situation in sceptical autoepistemic reasoning where we obtain an exponential lower bound to the proof length in Bonatti and Olivetti's calculus

    Depositional setting, provenance and tectonic-volcanic setting of Eocene-Recent deep-sea sediments of the oceanic Izu-Bonin forearc, NW Pacific (IODP Expedition 352)

    Get PDF
    New biostratigraphical, geochemical, and magnetic evidence is synthesized with IODP Expedition 352 shipboard results to understand the sedimentary and tectono-magmatic development of the Izu–Bonin outer forearc region. The oceanic basement of the Izu–Bonin forearc was created by supra-subduction zone seafloor spreading during early Eocene (c. 50–51 Ma). Seafloor spreading created an irregular seafloor topography on which talus locally accumulated. Oxide-rich sediments accumulated above the igneous basement by mixing of hydrothermal and pelagic sediment. Basaltic volcanism was followed by a hiatus of up to 15 million years as a result of topographic isolation or sediment bypassing. Variably tuffaceous deep-sea sediments were deposited during Oligocene to early Miocene and from mid-Miocene to Pleistocene. The sediments ponded into extensional fault-controlled basins, whereas condensed sediments accumulated on a local basement high. Oligocene nannofossil ooze accumulated together with felsic tuff that was mainly derived from the nearby Izu–Bonin arc. Accumulation of radiolarian-bearing mud, silty clay, and hydrogenous metal oxides beneath the carbonate compensation depth (CCD) characterized the early Miocene, followed by middle Miocene–Pleistocene increased carbonate preservation, deepened CCD and tephra input from both the oceanic Izu–Bonin arc and the continental margin Honshu arc. The Izu–Bonin forearc basement formed in a near-equatorial setting, with late Mesozoic arc remnants to the west. Subduction-initiation magmatism is likely to have taken place near a pre-existing continent–oceanic crust boundary. The Izu–Bonin arc migrated northward and clockwise to collide with Honshu by early Miocene, strongly influencing regional sedimentation

    Genome-wide association study of eosinophilic granulomatosis with polyangiitis reveals genomic loci stratified by ANCA status

    Get PDF
    Eosinophilic granulomatosis with polyangiitis (EGPA) is a rare inflammatory disease of unknown cause. 30% of patients have anti-neutrophil cytoplasmic antibodies (ANCA) specific for myeloperoxidase (MPO). Here, we describe a genome-wide association study in 676 EGPA cases and 6,809 controls, that identifies 4 EGPA-associated loci through conventional case-control analysis, and 4 additional associations through a conditional false discovery rate approach. Many variants are also associated with asthma and six are associated with eosinophil count in the general population. Through Mendelian randomisation, we show that a primary tendency to eosinophilia contributes to EGPA susceptibility. Stratification by ANCA reveals that EGPA comprises two genetically and clinically distinct syndromes. MPO+ ANCA EGPA is an eosinophilic autoimmune disease sharing certain clinical features and an HLA-DQ association with MPO+ ANCA-associated vasculitis, while ANCA-negative EGPA may instead have a mucosal/barrier dysfunction origin. Four candidate genes are targets of therapies in development, supporting their exploration in EGPA

    Guarding a Walled Garden — Semantic Privacy Preferences for the Social Web

    No full text

    Rule-Based Policy Representations and Reasoning

    No full text
    Trust and policies are going to play a crucial role in enabling the potential of many web applications. Policies are a well-known approach to protecting security and privacy of users in the context of the Semantic Web: in the last years a number of policy languages were proposed to address different application scenarios. The first part of this chapter provides a broad overview of the research field by accounting for twelve relevant policy languages and comparing them on the strength of ten criteria which should be taken into account in designing every policy language. By comparing the choices designers made in addressing such criteria, useful conclusions can be drawn about strong points and weaknesses of each policy language. The second part of this chapter is devoted to the description of the Protune framework, a system for specifying and cooperatively enforcing security and privacy policies on the Semantic Web developed within the network of excellence REWERSE. We describe the framework’s functionalities, provide details about their implementation, and report the results of performance evaluation experiments
    corecore