• Aucun résultat trouvé

Importing Ontologies with Hidden Content

N/A
N/A
Protected

Academic year: 2022

Partager "Importing Ontologies with Hidden Content"

Copied!
12
0
0

Texte intégral

(1)

Importing Ontologies with Hidden Content

Bernardo Cuenca Grau and Boris Motik Computing Laboratory

University of Oxford, UK

1 Introduction

The Web Ontology Language (OWL) and its revision OWL 2 are widely used ontology languages whose formal underpinnings are given by description logics (DLs). OWL ontologies are used, for example, in several countries to describe electronic patient records (EPR). Patients’ data typically involves descriptions of human anatomy, medical conditions, drugs, and so on. These domains have been described in well-established reference ontologies such SNOMED-CT and GALEN. In order to save resources, increase interoperability between applica- tions, and rely on experts’ knowledge, an EPR application should preferably reuse these reference ontologies. For example, assume that a reference ontology Kh describes concepts such as the “ventricular septum defect.” An EPR appli- cation might reuse the concepts and roles fromKhto define its own ontologyKv

of concepts such as “patients having a ventricular septum defect.” It is gener- ally accepted that ontology reuse should be modular—that is, the axioms ofKv

should not affect the meaning of the symbols reused from Kh [1, 2].

To enable reuse, OWL allows Kv to import Kh. OWL reasoners deal with imports by merging the axioms of the two ontologies; thus, to process Kv∪ Kh, an EPR application would require physical access to the axioms of Kh. The vendor of Kh, however, might be reluctant to distribute the axioms of Kh, as doing this might allow competitors to plagiarizeKh. Moreover,Khmight contain information that is sensitive from a privacy point of view. Finally, the vendor of Khmight impose different costs on parts ofKh. To reflect this situation, we call the ontologyKh hidden and, by analogy,Kv visible.

To enable reuse without providing physical access to the axioms,Khcould be made accessible via an oracle (i.e., a limited query interface), thus allowingKv

to import Kh “by query.” In this paper, we study import-by-query algorithms, which can solve certain reasoning tasks onKv∪ Khby accessing onlyKvand the oracle. We focus on schema reasoning problems, such as concept subsumption and satisfiability; this is in contrast to the information integration [3] and peer- to-peer [4] scenarios, which focus on the reuse of data.

In our recent work [5], we studied the import-by-query problem when the oracle query language is concept satisfiability (or, equivalently, concept sub- sumption). We showed that no import-by-query algorithm exists even ifKv and Kh are expressed in the lightweight DL EL [6]. This negative result holds if Kv reuses an atomic role from Kh, so we studied the case whenKv reuses only atomic concepts fromKhin a modular way [2]. We presented an import-by-query

(2)

algorithm for the case when the aforementioned assumptions are satisfied and Kv and Kh are expressed in SROIQ[7] and SRIQ [8], respectively. We also proposed an algorithm that is better suited for practice for the case where Kh is expressed in a Horn DL. Finally, we extended these results to the case when Kv reuses atomic roles fromKhin a syntactically restricted way.

The conditions in [5] on the usage of imported roles, however, can be limiting in practice, so in this paper we investigate ways of relaxing them. In particular, we study a different oracle query language that is based on ABox query an- swering, rather than concept subsumption or concept satisfiability checking. We present an import-by-query algorithm that uses such a query language and that is applicable ifKvandKhare expressed inELand the only restriction is thatKv

imports concepts and roles from Kh in a modular way. We also establish links between this result and the negative result from [5]. In particular, we show that, if the axioms ofKv involving the roles imported fromKh are weakly acyclic [9], an import-by-query algorithm based on concept subsumption exists.

2 Preliminaries

In this section, we present an overview of the DL EL[6] and a suitable reason- ing algorithm. For simplicity, we restrict ourselves to the basic version of EL;

however, our results can be easily extended to EL++. We also recapitulate the notion of locality [2], which ensures modular ontology reuse. Finally, we define a restricted form of ELaxioms that guarantees locality.

2.1 The Description Logic EL

The syntax of EL is defined w.r.t. a signature, which is the union of disjoint countable sets ofatomic concepts, atomic roles, andindividuals. The set ofEL concepts is the smallest set containing >, ⊥, A, C1uC2, and ∃r.C, for A an atomic concept,C,C1, and C2 ELconcepts, andran atomic role.

Aconcept inclusion(GCI) has the formC1vC2forC1andC2ELconcepts, and aconcept equivalence C1≡C2is an abbreviation forC1vC2andC2vC1. A TBox T is a finite set of GCIs. An assertion has the form C(a) or r(a, b), for C an ELconcept, r an atomic role, and a and b individuals. An axiom is either a GCI or an assertion. An ABox A is a finite set of assertions. An EL knowledge base is a pair K=hT,Aiwhere T is a TBox andAis an ABox. For αa concept, an axiom, or a set of axioms,sig(α) is thesignature ofα—that is, the set of atomic concepts, roles, and individuals occurring inα.

The semantics ofEL is given by means of interpretations. The definitions of an ELinterpretation I= (4II), satisfaction of an axiom, TBox, ABox, or KBS in an interpretationI (writtenI|=S), entailment of an axiom αfrom S (writtenS |=α), and concept subsumption (writtenK |=CvD), are standard and can be found in [6].ClassificationofKis the problem of determining whether K |=CvD for eachC, D∈sig(K)∪ {>,⊥}. For each satisfiableELknowledge base K =hT,Ai, it is well known that hT,Ai |= C vD iff hT,∅i |=C vD;

hence, classification is usually considered w.r.t. a TBox only.

(3)

Table 1.ELRules

R1

If ∃r.C(x)∈ Ai andr(x, xC)∈ A/ i

then Ai+1:=Ai∪ {r(x, xC)}.

R2

If 1. A1u. . .uAku ∃r1.B1u. . .u ∃rm.BmvC∈ T withk≥0 andn≥0, and 2. Aicontains individualsx, y1, . . . , ymsuch that

2.1{Aj(x)|1≤j≤k} ∪ {rj(x, yj), Bj(yj)|1≤j≤m} ⊆ Ai, and 2.2C(x)∈ A/ i

then Ai+1:=Ai∪ {C(x)}.

2.2 Reasoning with EL Knowledge Bases

We next present two algorithms for reasoning with ELKBs. First, we present the algorithm sat(T,A) that can be used to compute ABox assertions entailed byT ∪ A. Then, we show how to usesat(T,A) to obtain theEL classification algorithmel(T). These algorithms are similar to the one in [10] and can be seen as a minor variation of the algorithm in [6].

LetΓ be a signature. Then,BC(Γ) is the set of basic concepts forΓ, which is the smallest set of EL concepts containing >, ⊥, all atomic concepts in Γ, and all concepts of the form∃r.C such thatr∈Γ andC∈Γ∪ {>,⊥}.1AnEL TBoxT is in normal form if every GCIα∈ T is of the form

C1u. . .uCn vD (1)

with n ≥ 1, and where Ci and D are basic concepts for sig(T). An ELABox A is innormal form if, in each assertion C(a)∈ A, the concept C is basic for sig(A). AnELKBK=hT,Aiis innormal form if bothT andAare in normal form. Given an ABox Ain normal form and Γ ⊆sig(A), we denote withA|Γ

the set of assertions C(a) andr(a, b) inAsuch thatC∈BC(Γ) andr∈Γ. For each conceptC∈sig(T), letxCbe an individual uniquely associated with C. The algorithm sat(T,A) accepts an ELTBoxT and ABox Aand produces a sequenceA0, . . .Anof ABoxes, called arun, s.t. the following conditions hold:

1. A0:=A ∪ {C(xC)|C∈sig(T)}.

2. Ai is obtained fromAi−1by applying a rule from Table 1 for each 1≤i≤n.

3. No rule from Table 1 is applicable to An.

For eachT andA, the ABoxAn is unique across all runs ofsat(T,A), so we often writesat(T,A) =An. Furthermore, by modifying slightly the proofs from [6] and [10], it is straightforward to show that the following properties hold:

– P1: For each TBoxT, ABoxA, basic concept C forsig(T), and each indi- vidualxin A, we haveC(x)∈sat(T,A) if and only ifT ∪ A |=C(x).

– P2: For all TBoxesT andT0, and all ABoxesAandA0,

• A ⊆sat(T ∪ T0,∅) impliessat(T,A)⊆sat(T ∪ T0,∅), and

• A0⊆sat(T,A) impliessat(T,A ∪ A0)⊆sat(T,A).

1 Note that this notion of basic concept differs from the one introduced in [6].

(4)

The algorithmel(T) accepts a TBox T and returnsC vD for each pair of conceptsCandDfromsig(T)∪ {>,⊥}such thatD(xC)∈sat(T,∅). Properties P1and P2straightforwardly imply thatCvD∈el(T) iffT |=CvD.

2.3 Locality

When a TBoxTvreuses a TBoxTh, it is commonly accepted [1, 2] thatTvshould not affect the meaning of the symbols reused from Th—that is, Tv∪ Th|=α should implyTh|=αfor each axiomαcontaining only the reused symbols. This is guaranteed ifTv is local w.r.t. the set of concepts and rolesΓ imported from Th[2]. More precisely, forΓ a signature such that{>,⊥} ⊆Γ, a TBoxT islocal w.r.t.Γ if, for each interpretationI such that XI =∅for each atomic concept and each atomic roleX /∈Γ, we haveI|=T.

AnELTBox T in normal form is safe forΓ ifsig(C1u. . .uCn)6⊆Γ for each axiom of the form (1) inT. It is easy to see thatT is then local forΓ.

3 Importing Ontologies by Query

To illustrate the notion of import-by-query, Table 2 shows a TBox Th whose axioms are to be kept hidden, but that is reused in a visible TBoxTv. The TBox Th provides concepts describing the structure of organs such as Heart, and medical conditions associated to them such as CHD(congenital heart defect), VSD (ventricular septum defect), and AS (aortic stenosis). Furthermore, the rolepartrelates organs with their parts, andcondrelates organs with medical conditions. The former role is used to define concepts such asHeart (an organ one of whose parts is the tricuspid valve); the latter is used to define concepts such asCHD Heart(a heart with a congenital heart disorder) andVSD Heart (a heart with a ventricular septal defect). The shared symbols ofTh are written in bold font. The TBoxTh might also contain nonshared symbols; however, for simplicity, we do not show any axioms involving such symbols. The TBox Tv

provides the concept Pat representing patients, and it defines types of patients by relating the organs from Th with the patients using the hasOrgan role. In addition,Tv extends the list of defects inTh byEA(Ebstein’s anomaly), which is a congenital heart defect in which the opening of the tricuspid valve is displaced (axiomsδ7andδ8), and defines a patient with tricuspid valve disease (TVD Pat) as a patient with a heart that has a congenital heart defect and an abnormal tricuspid valve (δ9). The symbols private to Tv are written in italic font.

As already mentioned, we assume thatTv is local w.r.t. the imported sym- bols. For example, δ1 is local w.r.t. {CHD Heart} because δ1 is satisfied in any interpretation that interprets the nonshared symbols as∅. Note also that, according to the definition in Section 2,Tv is safe for the imported signature.

We next introduce two types oforacles, which are responsible for advertising the shared signatureΓ ofThand answering queries w.r.t.Th.

(5)

Table 2.Example Knowledge Bases Hidden Knowledge BaseTh

γ1CHD Heart≡Heartu ∃cond.CHD γ2 VSD Heart≡Heartu ∃cond.VSD

γ3 VSDvCHD

γ4 ASvCHD

γ5 HeartvOrganu ∃part.Tric Valve Visible Knowledge BaseTv

δ1 CHD Pat≡Patu ∃hasOrgan.CHD Heart δ2 VSD Pat≡Patu ∃hasOrgan.VSD Heart

δ3 AS Pat≡Patu ∃hasOrgan.(Heartu ∃cond.AS) δ4 EA Pat≡Patu ∃hasOrgan.EA Heart

δ5 EAvCHD

δ6 EA Heart≡Heartu ∃cond.EA δ7Heartu ∃cond.EAv ∃part.Ab Tric Valve

δ8 Ab Tric Valve≡Tric Valveu ∃part.Displ Opening

δ9 TVD Pat≡Patu ∃hasOrgan.(CHD Heartupart.Ab Tric Valve)

Definition 1. Let T be an EL TBox and Γ be s.t. {>,⊥} ⊆Γ ⊆sig(T). A subsumptionoracleΩTs is a function that, for each pair ofELconceptsCand D with sig(C)⊆Γ andsig(D)⊆Γ, returns a Boolean value as follows:

sT(C, D) =

t ifT |=CvD f otherwise

An ABox query oracle ΩTa is a function that, for each normalized EL ABox A with sig(A)⊆Γ, a concept C ∈BC(Γ), and an individual xoccurring inA, returns a Boolean value as follows:

aT(A, C, x) =

t ifhT,Ai |=C(x) f otherwise

Without any further qualification, the generic termoracle refers either to the subsumption of the ABox query oracle.

A subsumption oracle is able to answer subsumption queries between (possi- bly complex)ELconcepts, and it is analogous to the concept satisfiability oracle we considered in [5]. Concept subsumption is available as a reasoning service in all DL reasoners known to us, so it provides us with a natural oracle query language. Our results from [5], however, suggest that the way in which the roles from Th are used inTv must be restricted in import-by-query algorithms based on subsumption oracles; we summarize these results in Section 4.

As we show in Section 5, the use of ABox query oracles allows us to overcome these limitations. Intuitively, an ABox query accepts an ABox A containing only symbols inΓ and “completes it” with the (basic) concepts overΓ that are entailed byA ∪ Th. Roughly speaking, the ABox represents the information that has already been deduced; when “handed over” to the oracle, the oracle then completes the ABox with the relevant information entailed byTh.

(6)

An import-by-query (classification) algorithm checks the subsumption rela- tions between the atomic concepts insig(Tv) w.r.t.Tv∪ Th by using an oracle.

Definition 2. An import-by-query algorithm takes as input an EL TBox Tv

and an oracle ΩTh with sig(Tv)∩sig(Th)⊆Γ, and it returns C vD for each C andD such that {C, D} ⊆sig(Tv)∪ {>,⊥} andTv∪ Th|=CvD.

4 Import-by-Query and Subsumption Oracles

We next summarize our results from [5]. We first show that no general import- by-query algorithm based on subsumption oracles exists.

Theorem 3. No import-by-query algorithm based on subsumption oracles exists, if Tv andTh are in EL,Γ contains only one atomic role, andTv is local inΓ. Proof. Assume that an import-by-query algorithm exists that terminates on all inputs, and considerTvas in (2) withΓ ={r}. Clearly,Tvis local w.r.t.Γ. Since the algorithm terminates, the number of questions posed to any subsumption oracle is bounded by some integerm, and the quantifier depth of each concept C passed to the oracle is bounded by an integern, where bothmandndepend only onΓ andTv. LetTh1 andTh2be as in (3) and (4), respectively.

Tv ={Av ∃r.A} (2)

Th1=∅ (3)

Th2={ ∃r. . . .∃r

| {z }

.> v ⊥ }

n+ 1 times (4)

For each C with sig(C)⊆Γ and quantifier depth at mostn , Th1|=Cv ⊥ iff Th2|=Cv ⊥, soΩTs1

h(C,⊥) =ΩTs2

h(C,⊥). When applied to Tv and ΩTs1 h, the algorithm returns the same value as when applied to Tv and ΩTs2

h. Since Tv∪ Th16|=Av ⊥butTv∪ Th2|=Av ⊥, it does not satisfy Definition 2. ut This negative result relies on the presence of an atomic rolerin the reused signature Γ and the fact that r is used in Tv in a “cyclic” axiom A v ∃r.A.

To circumvent this problem, we studied in [5] the case where Γ contains only atomic concepts and proposed an import-by-query algorithm that applies even whenTv andThare given in a very expressive DL.

In [5] we also studied the case where both concepts and roles are imported, but with the condition thatsig(C)⊆Γ for each concept C appearing in Tv in the scope of a quantifier overrfromΓ. For example, ifr∈Γ, thenTvis allowed contain the concept∃r.Aonly ifA∈Γ. The algorithm in [5] for this case applies to very expressive DLs. In our example, the conditions in [5] allow us to write axiomsδ1–δ5, which together withThallow us to concludeVSD Pat vCHD Pat (usingδ1, δ2 andδ5) andAS Pat vCHD Pat (usingδ1 andδ3).

In order to express axioms such asδ5–δ9, we next investigate ways of relaxing the conditions from [5]. In Section 5, we study the design of import-by-query

(7)

Table 3.AdditionalELRule for an ABox Query Oracle

R3

If for some individualxC inAi and conceptD∈BC(Γ), ΩaTh(Ai|Γ, D, xC) =tandD(xC)∈ A/ i

thenAi+1:=Ai∪ {D(xC)}.

algorithms based on ABox query oracles. We show that, ifTv andThare inEL, no restrictions other than locality are needed to ensure existence of an import- by-query algorithm. This investigation will also provide us with insight on how to relax the syntactic restrictions from [5] when using subsumption oracles.

5 Import-by-Query with ABox Query Oracles

We next present the import-by-query algorithm ibqa(Tv, ΩaT

h), which accepts a normalizedELTBoxTv and an ABox query oracleΩTa

h s.t.Tv is safe forΓ. Let sata(Tv,A, ΩTah) be the same as sat(Tv,A) (see Section 2), with the difference that rule R3 shown Table 3 is applied alongside rules R1 and R2 from Table 1. We next prove certain properties of this algorithm.

Lemma 4. Let Aa =sata(Tv,∅, ΩTah) and Ael =sat(Tv∪ Th0,∅), where Th0 is the result of transforming Th into normal form. The following properties hold:

– Soundness:Aa ⊆ Ael;

– Completeness: For each C ∈ sig(Tv) and D ∈ BC(sig(Tv)), we have that D(xC)∈ Aelimplies D(xC)∈ Aa.

Proof (Soundness).LetA0, . . . ,An withAn =Aa be a run ofsata(Tv,∅, ΩTa

h).

We show by induction on the rule applications thatAi ⊆ Aelfor each 0≤i≤n.

The induction base (i= 0) follows from the initialization conditions of both algo- rithms. Assume now thatAi−1⊆ Aeland letAibe obtained fromAi−1by a rule application. If either R1 or R2 is applied, propertyP2from Section 2 implies that Ai⊆ Ael. Assume that R3 extendsAi−1withD(xC). Then,C∈Γ;D∈BC(Γ);

and, by the induction hypothesis,Ai−1|Γ ⊆ Ael. Also,ΩTa

h(Ai−1|Γ, D, xC) =t, which impliesTh0∪ Ai−1|Γ |=D(xC). But then, propertyP1from Section 2 im- plies that D(xC) ∈ sat(Th0,Ai−1|Γ). Since Ai−1|Γ ⊆ Ael, by P2 we have that sat(Th0,Ai−1|Γ)⊆ Ael, which implies our claim. ut Proof (Completeness).LetA0, . . . ,AnwithAn=Aelbe a run ofsat(Tv∪ Th0,∅).

ForAj occurring in the run andΣa signature, let

AjkΣ ={D(xC)∈ Aj| {C, D} ⊆BC(Σ)} ∪ {r(xC, xD)∈ Aj| {r, C, D} ⊆Σ}.

Completeness follows immediately from statement 2 of the following claim.

CLAIM: The following conditions hold for eachAj with 1≤j≤n:

1. Aj ⊆ Aa∪sat(Th0,Aa|Γ).

(8)

2. Ajksig(Tv)⊆ Aa. 3. IfD(xC)∈ Aj, then

(a) C∈sig(Th0) impliesD∈BC(sig(Th0)), and (b) C∈sig(Tv)\Γ impliesD∈sig(Tv).

4. Ifr(xC, xD)∈ Aj, then

(a) r∈sig(Tv)\Γ impliesC∈sig(Tv)\Γ,

(b) r∈Γ andD∈sig(Tv)\Γ implyC∈sig(Tv)\Γ, and (c) r∈sig(Tv) andC∈sig(Tv)\Γ implyD∈sig(Tv).

The proof is by induction on the rule applications. For the induction base (j= 0), we haveA0={C(xC)|C∈sig(Tv∪ Th0)}. Statements 1–3 hold straight- forwardly, and statement 4 is vacuously true. Assume now that statements 1–4 hold forAj−1 and consider an application of a rule that derivesAj.

Assume that R1 is applied to∃r.D(xC)∈ Aj−1and that it derivesr(xC, xD).

By the induction hypothesis, ∃r.D(xC)∈ Aa or ∃r.D(xC)∈sat(Th0,Aa|Γ). If

∃r.D(xC)∈ Aa, then r(xC, xD) ∈ Aa because R1 is not applicable to Aa, so statement 1 holds. If∃r.D(xC)∈sat(Th0,Aa|Γ), thenr(xC, xD)∈sat(Th0,Aa|Γ) because R1 is not applicable tosat(Th0,Aa|Γ), so statement 1 also holds. IfC,D, andrare all insig(Tv), by the induction hypothesis∃r.D(xC)∈ Aa; since R1 is not applicable to Aa, we haver(xC, xD)∈ Aa, so statement 2 holds. Statement 3 holds vacuously. Note that the contrapositive of statement 3a is as follows (*):

r∈sig(Tv)\Γ orD ∈sig(Tv)\Γ imply C∈sig(Tv)\Γ. Now (*) immediately implies statements 4a and 4b. Finally, statement 3b implies statement 4c.

Assume now that R2 is applied to an axiom α ∈ Tv ∪ Th0 of the form A1u. . .uAku ∃r1.B1u. . .u ∃rm.BmvDand that it derivesD(xC). Then, in- dividualsyE1, . . . , yEminAj−1exist such thatAi(xC)∈ Aj−1for each 1≤i≤k, and {r`(xC, yE`), B`(yE`)} ⊆ Aj−1 for each 1≤`≤m. Statement 4 holds vac- uously, so we next prove 1–3, depending on whetherαbelongs toTh0 or Tv.

– α ∈ Th0. Statement 3 holds trivially. Consider each assertion Ai(xC) with 1≤i≤n. By the induction hypothesis, we haveAi(xC)∈ Aa∪sat(Th0,Aa|Γ).

IfAi(xC)∈ Aa, sinceα∈ Th0, we haveAi∈Γ, soAi(xC)∈ Aa|Γ. Thus, we haveAi(xC)∈sat(Th0,Aa|Γ). By a completely analogous argument, we have {r`(xC, yE`), B`(yE`)} ⊆sat(Th0,Aa|Γ) for each 1≤`≤mas well. But then, since R2 is not applicable tosat(Th0,Aa|Γ), we haveD(xC)∈sat(Th0,Aa|Γ), so statement 1 holds. Statement 2 is vacuously true ifC6∈Γ orD6∈BC(Γ).

Otherwise, by statement 1 and propertyP1, we haveTh0∪ Aa|Γ |=D(xC);

since R3 is not applicable toAa, we haveD(xC)∈ Aa, so statement 2 holds.

– α∈ Tv. Note thatTv is safe forΓ, so we have these possibilities:

• Ai ∈/ Γ for some 1≤i ≤k. By the contrapositive of statement 3a, we haveC∈sig(Tv)\Γ.

• r`6∈Γ for some 1≤`≤m. By statement 4a, we haveC∈sig(Tv)\Γ.

• B` ∈/ Γ and r` ∈ Γ for some 1 ≤ ` ≤ m. By the contrapositive of statement 3a,yE` ∈sig(Tv)\Γ; however, by statement 4b,C∈sig(Tv)\Γ. Since C ∈ sig(Tv)\Γ, statement 4c implies E` ∈ sig(Tv). But then, by statement 2, allAi(xC),r`(xC, yE`), andB`(yE`) are inAa. Since R2 is not applicable toAa,D(xC)∈ Aa, which implies statements 1 and 2. Statements 3a and 3b respectively hold sinceC6∈sig(Th0) andD∈BC(sig(Tv)). ut

(9)

The algorithm ibqa(Tv, ΩaT

h) returns C v D for each pair of concepts C andD fromsig(T)∪ {>,⊥}such thatD(xC)∈sata(T,∅, ΩTa

h).

Theorem 5. The algorithm ibqa(Tv, ΩaT

h) is an import-by-query algorithm, and it can be implemented such that it runs in time polynomial in the size of Tv

with a polynomial number of calls toΩTa

h.

Proof. The size ofBC(sig(Tv)) is quadratic in the size ofTv. Each application of R1, R2, or R3 adds an assertion of the formC(a) orr(a, b) forC∈BC(sig(Tv)).

Since no rule removes assertions from A, the total number of rule applications is polynomial. Thus, the algorithm can be implemented such that it runs in polynomial time with a polynomial number of calls to the oracle. Since Th0 is obtained fromThthrough normalization, for all conceptsCandDwith{C, D} ⊆ sig(Th)∪sig(Tv)∪ {>,⊥}we haveTv∪ Th|=CvDiffTv∪ Th0|=CvD. LetAa andAelbe as in Lemma 4. Ifibqa(Tv, ΩTa

h) returnsCvD, thenD(xC)∈ Aa; the soundness property of Lemma 4 implies D(xC) ∈ Ael; thus, el(Tv ∪ Th0) returnsCvD; hence,Tv∪ Th0|=CvD; finally,Tv∪ Th|=CvD. The converse direction holds analogously by the completeness property of Lemma 4. ut

6 Weakly Acyclic Knowledge Bases

We next present an import-by-query algorithm based on subsumption oracles where Tv needs to satisfy weaker conditions than those in [5]. Our results rely on the notion ofweak acyclicity borrowed from database dependency theory [9].

This condition prohibits cyclic existential quantification over the roles imported fromTh, which invalidates the proof of Theorem 3. In our example, weak acyclic- ity allow us to represent all axiomsδ1–δ9and hence to entailEA Pat vCHD Pat (usingδ4–δ6) andEA Pat vTVD Pat (usingδ4–δ7 andδ9).

6.1 Weak Acyclicity

Let [A] =A forA an atomic concept, and let [∃r.D] =r.

Definition 6. Let Γ be a signature such that {>,⊥} ⊆Γ, and let T be anEL TBox in normal form. The dependency graph for T w.r.t. Γ is the smallest graph that contains a node wX for each symbol X ∈ sig(T) and the following edges for each axiom C1u. . .uCnvD inT and each 1≤i≤n:

– an unlabeled edgehw[Ci], w[D]i, and

– another edgehw[Ci], w[E]ilabeled with ? ifD of the form ∃r.E withr∈Γ. T is weakly acyclic w.r.t. Γ if, in each cycle in the dependency graph for T w.r.t.Γ, all edges are unlabeled.

It can be readily checked using Definition 6 that our example TBox Tv in Table 2 is weakly acyclic w.r.t. the imported signature.

(10)

Table 4.AdditionalELRule for oracleΩs

R3’

If for some individualxC inAi and conceptD∈BC(Γ), ΩTsh(con(xC,Ai, Γ), D) =tandD(xC)∈ A/ i

thenAi+1:=Ai∪D(xC).

LetΓ be a signature andAan ABox occurring in a run ofsata(Tv,∅, ΩTah).

Then A contains a harmful cycle for Γ if assertions ri(xCi−1, xCi) ∈ A with 1≤i≤nexist such thatxCn=xC0,Ci∈sig(Tv) for each 0≤i≤n, andri ∈Γ for each 1 ≤i≤n. As we show next, if Tv is weakly acyclic w.r.t. Γ, then no ABox occurring in a run ofsat(Tv,∅, ΩTa

h) contains a cycle harmful forΓ. Lemma 7. Let Tv be weakly acyclic w.r.t. Γ, and let Aa = sata(Tv,∅, ΩaTh).

Then, Aa does not contain a cycle that is harmful forΓ.

Proof (Sketch).LetGbe the dependency graph forTvw.r.t.Γ, andA0, . . . ,Ana run ofsata(Tv,∅, ΩTa

h) such thatAn=Aa. The following claim can be straight- forwardly shown by induction on the number of rule applications:

CLAIM: The following properties hold for eachAi with 1≤i≤n:

1. if D(xC) ∈ Ai and {C, D} ⊆BC(sig(Tv)\Γ), then w[D] is reachable inG fromw[C]; in addition, ifD is of the form ∃r.E, then w[E] is reachable inG fromw[C] via a path containing a labeled edge;

2. if r(xC, xD)∈ Ai, {C, D} ⊆sig(Tv)\Γ, andr∈Γ, thenw[D] is reachable fromw[C] via a path containing a labeled edge.

The lemma follows from statement 2 and the fact thatTv is weakly acyclic. ut

6.2 An Import-by-Query Algorithm The algorithmibqs(Tv, ΩTs

h) accepts a normalizedELTBoxTvthat is safe and weakly acyclic forΓ, and an oracleΩTs

h. Letsats(Tv,A, ΩTa

h) be the same as sat(Tv,A) with the difference that rule R3’ in Table 4 is applied alongside rules R1 and R2. ForΣa signature andAan ABox not containing cycles harmful for Σ, the conceptcon(xC,A, Σ) used in rule R3’ is inductively defined as follows:

con(xC,A, Σ) =



 d

D(xC)∈A|Σ

D ifC∈Σ

d

D(xC)∈A|Σ

D u d

r(xC,yE)∈A|Σ

∃r.con(yE,A, Σ) otherwise

SinceAdoes not contain cycles harmful for Σ, induction is well-founded. Intu- itively,con(xC,A, Σ) represents the “rolled-up” part ofA|Σ reachable fromxC. The algorithm ibqs(Tv, ΩsT

h) then returns C vD for each pair of conceptsC andD such that{C, D} ⊆sig(T)∪ {>,⊥}andD(xC)∈sats(T,∅, ΩTs

h).

Lemma 8. For each signature Γ, each EL TBox Tv that is safe and weakly acyclic for Γ, and each ELTBox Th such that sig(Tv)∩sig(Th)⊆Γ, we have sats(Tv,∅, ΩTs

h) =sata(Tv,∅, ΩTa

h).

(11)

Proof (Sketch).The lemma is a consequence of the following claim together with the fact that both algorithms are identical except for the rule R3’.

CLAIM: For each signature Γ, ABox A not containing cycles harmful for Γ, individualxinA, and conceptD∈BC(Γ), we have

Th∪ A|Γ |=D(x) if and only ifTh|=con(x,A, Γ)vD.

To prove this claim, letQxbe a fresh concept uniquely associated with each individualxinA|Γ. LetT0 be a TBox containing the axiomQxC vDfor each D(xC)∈ A|Γ, and QxD v ∃r.QyE for each r(xD, yE)∈ A|Γ with D /∈Γ. It is easy to show thatTh∪ A|Γ |=D(x) iffD(x)∈el(Th0∪ T0), forTh0the normalized version ofTh. SinceA|Γ does not contain cycles harmful forΓ, by induction on the structure ofcon(x,A, Γ), we have thatcon(x,A, Γ) is obtained fromQxby unfolding the relevant conceptsQy with their definitions inT0. ut Theorem 9. The algorithmibqs(Tv, ΩTs

h)is an import-by-query algorithm and it can be implemented such that it runs in time exponential in the size ofTv with a polynomial number of calls to ΩTs

h.

Proof. The algorithm is an import-by-query algorithm by Lemma 8 and Theorem 5. Finally, just like in the proof of Theorem 5, rules R1, R2, and R3’ can only be applied a polynomial number of times. The inductive definition ofcon(x,A, Γ), however, involves constructing a tree of polynomial depth and branching factor, the size of which can be at most exponential in the size ofA|Γ. ut

7 Related and Future Work

In a P2P setting, [4] consider the problem of answering a query qover KBsKv and Kh and mappings Mby reformulating q as queries that can be evaluated overKvandKhin isolation. The query reformulation algorithm accesses onlyKv

andM; thus,qcan be answered using an oracle forKh. In this setting, however, a satisfiableKh cannot affect the subsumption of concepts inKv (see [5] for an example); thus, the results in [4] are not applicable to schema reasoning.

Another possibility for the owner of Th to restrict access only to symbols in Γ is to publish a uniform interpolant ThΓ of Th w.r.t. Γ [11]—an ontology ThΓ such that sig(ThΓ)⊆ Γ, Th |= ThΓ and ThΓ |= C vD iff Th |=C vD for all concepts C andD withsig(C)∪sig(D)⊆Γ. PublishingThΓ, however, may reveal more information aboutThthan what is strictly needed. For example, for Γ ={r, B}, Tv ={Av ∃r.B} and Th ={∃r.∃r.B vB}, the interpolantThΓ is equal toTh; thus, publishingThΓ reveals entire contents of the hidden ontology Th. In contrast, an import-by-query algorithm reveals only thatTh6|=∃r.Bv ⊥ and Th 6|=∃r.BvB; hence it does not reveal the actual syntactic structure of Th. Thus, enabling the reuse ofThthrough import-by-query preserves the hidden content ofTh to a higher degree than if reuse were enabled by publishingThΓ.

We are currently working on extending the results presented in this paper to DLs more expressive thanEL.

(12)

References

[1] Lutz, C., Walther, D., Wolter, F.: Conservative Extensions in Expressive Descrip- tion Logics. In: Proc. IJCAI. (2007) 453–458

[2] Cuenca Grau, B., Horrocks, I., Kazakov, Y., Sattler, U.: Modular Reuse of Ontolo- gies: Theory and Practice. Journal of Artificial Intelligence Research31(2008) 273–318

[3] Lenzerini, M.: Data Integration: A Theoretical Perspective. In: Proc. PODS.

(2002) 233–246

[4] Calvanese, D., De Giacomo, G., Lembo, D., Lenzerini, M., Rosati, R.: What to Ask to a Peer: Ontolgoy-based Query Reformulation. In: Proc. KR. (2004) 469–478

[5] Cuenca Grau, B., Motik, B., Kazakov, Y.: Import-by-Query: Ontology Reasoning under Access Limitations. In: Proc. IJCAI, AAAI Press (2009) To Appear.

[6] Baader, F., Brandt, S., Lutz, C.: Pushing theEL Envelope. In: Proc. IJCAI,.

(2005) 364–369

[7] Kutz, O., Horrocks, I., Sattler, U.: The Even More IrresistibleSROIQ. In: Proc.

KR. (2006) 68–78

[8] Horrocks, I., Kutz, O., Sattler, U.: The irresistibleSRIQ. In: Proc. of OWLED.

(2005)

[9] Kolaitis, P.G., Panttaja, J., Tan, W.C.: The complexity of data exchange. In:

PODS. (2006) 30–39

[10] Motik, B., Horrocks, I.: Individual Reuse in Description Logic Reasoning. In:

Proc. of IJCAR 2008. Volume 5195 of LNAI., Springer (2008) 242–258

[11] Konev, B., Walter, D., Wolter, F.: Forgetting and uniform interpolation in large- scale description logic terminologies. In: Proc. IJCAI, AAAI Press (2009) To Appear.

Références

Documents relatifs

[j -invariant] Let k be an algebraically closed field of characteristic different from 2

Delano¨e [4] proved that the second boundary value problem for the Monge-Amp`ere equation has a unique smooth solution, provided that both domains are uniformly convex.. This result

Let X be a n-dimensional compact Alexandrov space satisfying the Perel’man conjecture. Let X be a compact n-dimensional Alexan- drov space of curvature bounded from below by

[1] S. Groemer, On some mean values associated with a randomly selected simplex in a convex set, Pacific J. Groemer, On the average size of polytopes in a convex set, Geom. Zhang,

For a Banach algebra A, its second dual A 00 is (-1)-weakly amenable if A 0 is a Banach A 00 -bimodule and the rst cohomology group of A 00 with coecients in A 0 is zero, i.e.. In

Under suitable boundary conditions and assuming a maximum principle for the interior points, we obtain a uniform convergence similar to that of Theorem 1.1.. Theorem 2.1 below can

• the WRMC algorithm through Propositions 2.1 (consistency of the estimation), 2.2 (asymptotic normality), and 2.3 (a first partial answer to the initial question: Does waste

• Le CO 2 contenu dans l'air se dissout dans la solution ; on peut raisonnablement supposer que la quantité est proportionnelle au volume de solution de soude (dissolution