• Aucun résultat trouvé

July7,2015 AntoineAmarilli ,MichaelBenedikt Open-WorldFiniteQueryAnsweringwithNumberRestrictions

N/A
N/A
Protected

Academic year: 2022

Partager "July7,2015 AntoineAmarilli ,MichaelBenedikt Open-WorldFiniteQueryAnsweringwithNumberRestrictions"

Copied!
92
0
0

Texte intégral

(1)

Introduction Context and result Proof ideas Conclusion

Open-World Finite Query Answering with Number Restrictions

Antoine Amarilli1,2, Michael Benedikt2

1Télécom ParisTech, Paris, France

2University of Oxford, Oxford, United Kingdom

July 7, 2015

1/15

(2)

Introduction Context and result Proof ideas Conclusion

Open-world query answering (QA)

Open-worldquery answering:

RelationalinstanceI(ground facts),correctbutincomplete Boolean conjunctivequeryq

Consider all possiblecompletionsJI

Isqcertain, i.e., holds on all completions? If yes,I|=unrq

(3)

Introduction Context and result Proof ideas Conclusion

Constraints

Impose constraintson the possible completions Inclusion dependencies: some facts imply more facts:

xdEmployee(x,d)⇒ ∃yAdvises(x,y,d) Employee[1,2]Advises[1,3]

Unaryinclusion dependencies (UIDs): one shared position Functional dependencies(FDs): uniqueness constraints:

xxydAdvises(x,y,d)Advises(x,y,d)x=x Advises[2,3]Advises[1]

Consider allJ⊇Ithat satisfy the constraints

Is qcertain on all such completions? If yes, I,Σ|=unr q

3/15

(4)

Introduction Context and result Proof ideas Conclusion

Constraints

Impose constraintson the possible completions Inclusion dependencies: some facts imply more facts:

xdEmployee(x,d)⇒ ∃yAdvises(x,y,d) Employee[1,2]Advises[1,3]

Unaryinclusion dependencies (UIDs): one shared position

Functional dependencies(FDs): uniqueness constraints:

xxydAdvises(x,y,d)Advises(x,y,d)x=x Advises[2,3]Advises[1]

Consider allJ⊇Ithat satisfy the constraints

Is qcertain on all such completions? If yes, I,Σ|=unr q

(5)

Introduction Context and result Proof ideas Conclusion

Constraints

Impose constraintson the possible completions Inclusion dependencies: some facts imply more facts:

xdEmployee(x,d)⇒ ∃yAdvises(x,y,d) Employee[1,2]Advises[1,3]

Unaryinclusion dependencies (UIDs): one shared position Functional dependencies(FDs): uniqueness constraints:

xxydAdvises(x,y,d)Advises(x,y,d)x=x Advises[2,3]Advises[1]

Consider allJ⊇Ithat satisfy the constraints

Is qcertain on all such completions? If yes, I,Σ|=unr q

3/15

(6)

Introduction Context and result Proof ideas Conclusion

Constraints

Impose constraintson the possible completions Inclusion dependencies: some facts imply more facts:

xdEmployee(x,d)⇒ ∃yAdvises(x,y,d) Employee[1,2]Advises[1,3]

Unaryinclusion dependencies (UIDs): one shared position Functional dependencies(FDs): uniqueness constraints:

xxydAdvises(x,y,d)Advises(x,y,d)x=x Advises[2,3]Advises[1]

Consider allJ⊇Ithat satisfy the constraints

|

(7)

Introduction Context and result Proof ideas Conclusion

Finite vs infinite

Instance: List of adviser–advisee pairs: Advises(a,b), . . . UID: Each advisee advises someone

Advises[2]Advises[1]

FD: Each advisee has only one adviser Advises[2]Advises[1]

Query: Are all advisers themselves advised by someone?

q is not certain:

Advises(a,b),Advises(b,b2),Advises(b2,b3), . . . q is certain on all finite completions

FiniteQA: only finite completions. If yes,I,Σ|=fin q

Σ finitely controllable: ∀I∀q,I,Σ|=fin q iffI,Σ|=unr q

4/15

(8)

Introduction Context and result Proof ideas Conclusion

Finite vs infinite

Instance: List of adviser–advisee pairs: Advises(a,b), . . . UID: Each advisee advises someone

Advises[2]Advises[1]

FD: Each advisee has only one adviser Advises[2]Advises[1]

Query: Are all advisers themselves advised by someone?

q is not certain:

Advises(a,b),Advises(b,b2),Advises(b2,b3), . . . q is certain on all finite completions

FiniteQA: only finite completions. If yes,I,Σ|=fin q

Σ finitely controllable: ∀I∀q,I,Σ|=fin q iffI,Σ|=unr q

(9)

Introduction Context and result Proof ideas Conclusion

Finite vs infinite

Instance: List of adviser–advisee pairs: Advises(a,b), . . . UID: Each advisee advises someone

Advises[2]Advises[1]

FD: Each advisee has only one adviser Advises[2]Advises[1]

Query: Are all advisers themselves advised by someone?

q is not certain:

Advises(a,b),Advises(b,b2),Advises(b2,b3), . . . q is certain on all finite completions

FiniteQA: only finite completions. If yes,I,Σ|=finq

Σ finitely controllable: ∀I∀q,I,Σ|=fin q iffI,Σ|=unr q

4/15

(10)

Introduction Context and result Proof ideas Conclusion

Finite vs infinite

Instance: List of adviser–advisee pairs: Advises(a,b), . . . UID: Each advisee advises someone

Advises[2]Advises[1]

FD: Each advisee has only one adviser Advises[2]Advises[1]

Query: Are all advisers themselves advised by someone?

q is not certain:

Advises(a,b),Advises(b,b2),Advises(b2,b3), . . . q is certain on all finite completions

(11)

Introduction Context and result Proof ideas Conclusion

Table of contents

1 Introduction

2 Context and result

3 Proof ideas

4 Conclusion

5/15

(12)

Introduction Context and result Proof ideas Conclusion

Existing results

(Finite) open-world query answering is undecidable for IDs and FDs [Calì et al., 2003]

IDs alone arefinitely controllable [Rosati, 2006] Infinite open-world query answering is decidable for UIDsand FDs [Calì et al., 2012]

but not finitely controllable(see above; [Rosati, 2006]) (Finite) open-world query answering is decidable for IDs and FDs with relations of arity2

[Pratt-Hartmann, 2009, Ibáñez-García et al., 2014]

(13)

Introduction Context and result Proof ideas Conclusion

Existing results

(Finite) open-world query answering is undecidable for IDs and FDs [Calì et al., 2003]

IDs alone arefinitely controllable [Rosati, 2006]

Infinite open-world query answering is decidable for UIDsand FDs [Calì et al., 2012]

but not finitely controllable(see above; [Rosati, 2006]) (Finite) open-world query answering is decidable for IDs and FDs with relations of arity2

[Pratt-Hartmann, 2009, Ibáñez-García et al., 2014]

6/15

(14)

Introduction Context and result Proof ideas Conclusion

Existing results

(Finite) open-world query answering is undecidable for IDs and FDs [Calì et al., 2003]

IDs alone arefinitely controllable [Rosati, 2006]

Infinite open-world query answering is decidable for UIDsand FDs [Calì et al., 2012]

but not finitely controllable(see above; [Rosati, 2006])

(Finite) open-world query answering is decidable for IDs and FDs with relations of arity2

[Pratt-Hartmann, 2009, Ibáñez-García et al., 2014]

(15)

Introduction Context and result Proof ideas Conclusion

Existing results

(Finite) open-world query answering is undecidable for IDs and FDs [Calì et al., 2003]

IDs alone arefinitely controllable [Rosati, 2006]

Infinite open-world query answering is decidable for UIDsand FDs [Calì et al., 2012]

but not finitely controllable(see above; [Rosati, 2006]) (Finite) open-world query answering is decidable for IDs and FDs with relations of arity2

[Pratt-Hartmann, 2009, Ibáñez-García et al., 2014]

6/15

(16)

Introduction Context and result Proof ideas Conclusion

Problem and main result

Study finite QAfor UIDs and FDs onarbitrary signatures Is it decidable? What is thecomplexity?

Theorem

Finite open-world query answering for UIDs and FDs has

PTIMEdata complexity and NP-completecombined complexity.

(17)

Introduction Context and result Proof ideas Conclusion

Problem and main result

Study finite QAfor UIDs and FDs onarbitrary signatures Is it decidable? What is thecomplexity?

Theorem

Finite open-world query answering for UIDs and FDs has

PTIMEdata complexity and NP-completecombined complexity.

7/15

(18)

Introduction Context and result Proof ideas Conclusion

Main idea

Find which UIDs and FDs are implied over finite instances

This isPTIME[Cosmadakis et al., 1990]

Itdiffersfrom unrestricted implication

Finite closure: add all finitely implied dependencies

Taking the finite closureensure finite controllability?

Theorem

For any instanceI, conjunctive queryq, UIDs and FDsΣ, lettingΣ be the finite closureofΣ,

we have I,Σ|=fin q iff I,Σ|=unrq.

(19)

Introduction Context and result Proof ideas Conclusion

Main idea

Find which UIDs and FDs are implied over finite instances

This isPTIME[Cosmadakis et al., 1990]

Itdiffersfrom unrestricted implication

Finite closure: add all finitely implied dependencies

Taking the finite closureensure finite controllability?

Theorem

For any instanceI, conjunctive queryq, UIDs and FDsΣ, lettingΣ be the finite closureofΣ,

we have I,Σ|=fin q iff I,Σ|=unrq.

8/15

(20)

Introduction Context and result Proof ideas Conclusion

Main idea

Find which UIDs and FDs are implied over finite instances

This isPTIME[Cosmadakis et al., 1990]

Itdiffersfrom unrestricted implication

Finite closure: add all finitely implied dependencies

Taking the finite closureensure finite controllability?

Theorem

For anyinstance I, conjunctive queryq, UIDs and FDsΣ, lettingΣ be the finite closureofΣ,

(21)

Introduction Context and result Proof ideas Conclusion

Table of contents

1 Introduction

2 Context and result

3 Proof ideas

4 Conclusion

9/15

(22)

Introduction Context and result Proof ideas Conclusion

Rephrasing the result

Assume that the UIDs and FDs Σare finitely closed

Assume that aninfinite completionJ satisfiesΣbut notq

Construct a finite completionJ satisfying Σbut not q: StartwithI

FollowJandadd factsto satisfy theUIDsofΣ... ... usingfinitely many elements(reuse them) ... but respecting theFDsofΣ

... and without makingqinadvertantly true

(23)

Introduction Context and result Proof ideas Conclusion

Rephrasing the result

Assume that the UIDs and FDs Σare finitely closed Assume that aninfinite completionJ satisfiesΣbut notq

Construct a finite completionJ satisfying Σbut not q: StartwithI

FollowJandadd factsto satisfy theUIDsofΣ... ... usingfinitely many elements(reuse them) ... but respecting theFDsofΣ

... and without makingqinadvertantly true

10/15

(24)

Introduction Context and result Proof ideas Conclusion

Rephrasing the result

Assume that the UIDs and FDs Σare finitely closed Assume that aninfinite completionJ satisfiesΣbut notq

Construct a finite completionJ satisfying Σbut not q:

StartwithI

FollowJandadd factsto satisfy theUIDsofΣ...

... usingfinitely many elements(reuse them) ... but respecting theFDsofΣ

... and without makingqinadvertantly true

(25)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

Reuseelements orextendprevious case –skipped

0. Solve the problem!

Exemplified soon

11/15

(26)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

Reuseelements orextendprevious case –skipped

0. Solve the problem!

Exemplified soon

(27)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

Reuseelements orextendprevious case –skipped

0. Solve the problem!

Exemplified soon

11/15

(28)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

Reuseelements orextendprevious case –skipped

0. Solve the problem!

Exemplified soon

(29)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

Reuseelements orextendprevious case –skipped

0. Solve the problem!

Exemplified soon

11/15

(30)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

Reuseelements orextendprevious case –skipped

0. Solve the problem!

Exemplified soon

(31)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

Reuseelements orextendprevious case –skipped

0. Solve the problem!

Exemplified soon

11/15

(32)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

Reuseelements orextendprevious case –skipped

(33)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

Reuseelements orextendprevious case –skipped

0. Solve the problem!

Exemplified soon

11/15

(34)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

(35)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

Reuseelements orextendprevious case –skipped

0. Solve the problem!

Exemplified soon

11/15

(36)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

(37)

Introduction Context and result Proof ideas Conclusion

Constructing the finite completion

Makeassumptions, we lift them from bottom to top:

5. Assume that the queryq is acyclic

e.g., ∃xy R(x)S(x,y) but not∃xyz R(x,y)S(y,z)T(z,x)

Product withgroup of high girthinspired by [Otto, 2002] –skipped

4. Assume that there are only unary FDs e.g., R[1]→R[2]but not R[1,3]→R[2]

Recombinationof elements inpatternswhen reusing –skipped

3. Assume a certain reversibility propertyon the UIDs and FDs

DecompositionofUIDsbased on [Cosmadakis et al., 1990] –skipped

2. Assume we have the trivial query

Exemplified soon

1. Assume that the relations all have arity two

Reuseelements orextendprevious case –skipped

0. Solve the problem!

Exemplified soon

11/15

(38)

Introduction Context and result Proof ideas Conclusion

0. Satisfying UIDs and UFDs in arity-two

R S

(39)

Introduction Context and result Proof ideas Conclusion

0. Satisfying UIDs and UFDs in arity-two

e

R S

a

b c

d

12/15

(40)

Introduction Context and result Proof ideas Conclusion

0. Satisfying UIDs and UFDs in arity-two

R S

R[2] S[1]⊆

S[2] R[1]⊆

a

b c

d

UIDs:

(41)

Introduction Context and result Proof ideas Conclusion

0. Satisfying UIDs and UFDs in arity-two

e

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

S[1] S[2]→→

a

b c

d

UIDs:

UFDs:

12/15

(42)

Introduction Context and result Proof ideas Conclusion

0. Satisfying UIDs and UFDs in arity-two

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

a

b c

d

UIDs:

UFDs:

(43)

Introduction Context and result Proof ideas Conclusion

0. Satisfying UIDs and UFDs in arity-two

e

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

S[1] S[2]→→

a

b c

d

UIDs:

UFDs:

12/15

(44)

Introduction Context and result Proof ideas Conclusion

0. Satisfying UIDs and UFDs in arity-two

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

a

b c

d

UIDs:

UFDs:

(45)

Introduction Context and result Proof ideas Conclusion

0. Satisfying UIDs and UFDs in arity-two

e

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

S[1] S[2]→→

a

b c

d

UIDs:

UFDs:

12/15

(46)

Introduction Context and result Proof ideas Conclusion

0. Satisfying UIDs and UFDs in arity-two

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

a

b c

d

UIDs:

UFDs:

(47)

Introduction Context and result Proof ideas Conclusion

2. Adding acyclic queries

R[2] S[1]⊆

S[2] R[1]⊆

UIDs:

and UFDs...

a b

c d

f e

13/15

(48)

Introduction Context and result Proof ideas Conclusion

2. Adding acyclic queries

R[2] S[1]⊆

S[2] R[1]⊆

UIDs:

a b

c d

f e

(49)

Introduction Context and result Proof ideas Conclusion

2. Adding acyclic queries

R[2] S[1]⊆

S[2] R[1]⊆

UIDs:

and UFDs...

a b

c d

f e

query:

!

13/15

(50)

Introduction Context and result Proof ideas Conclusion

2. Adding acyclic queries

R[2] S[1]⊆

S[2] R[1]⊆

UIDs:

a b

c d

f e

query:

(51)

Introduction Context and result Proof ideas Conclusion

2. Adding acyclic queries

R[2] S[1]⊆

S[2] R[1]⊆

UIDs:

and UFDs...

a b

c d

f e

query:

13/15

(52)

Introduction Context and result Proof ideas Conclusion

2. Adding acyclic queries

R[2] S[1]⊆

S[2] R[1]⊆

UIDs:

a b

c d

f e

query:

(53)

Introduction Context and result Proof ideas Conclusion

Table of contents

1 Introduction

2 Context and result

3 Proof ideas

4 Conclusion

14/15

(54)

Introduction Context and result Proof ideas Conclusion

Summary

Finiteopen-world query answering with:

relational instance arbitrary aritysignature UIDsandFDs

conjunctive query

We have finite controllabilityup to finite closure Future work:

Simplifythe proof

More expressivefrontier-one logics [Ibáñez-García et al., 2014] Finite controllability and closure forpath FDsin arity-two?

Thanks for your attention!

(55)

Introduction Context and result Proof ideas Conclusion

Summary

Finiteopen-world query answering with:

relational instance arbitrary aritysignature UIDsandFDs

conjunctive query

We have finite controllabilityup to finite closure

Future work:

Simplifythe proof

More expressivefrontier-one logics [Ibáñez-García et al., 2014] Finite controllability and closure forpath FDsin arity-two?

Thanks for your attention!

15/15

(56)

Introduction Context and result Proof ideas Conclusion

Summary

Finiteopen-world query answering with:

relational instance arbitrary aritysignature UIDsandFDs

conjunctive query

We have finite controllabilityup to finite closure Future work:

Simplifythe proof

More expressivefrontier-one logics [Ibáñez-García et al., 2014]

Finite controllability and closure forpath FDsin arity-two?

Thanks for your attention!

(57)

Introduction Context and result Proof ideas Conclusion

Summary

Finiteopen-world query answering with:

relational instance arbitrary aritysignature UIDsandFDs

conjunctive query

We have finite controllabilityup to finite closure Future work:

Simplifythe proof

More expressivefrontier-one logics [Ibáñez-García et al., 2014]

Finite controllability and closure forpath FDsin arity-two?

Thanks for your attention!

15/15

(58)

References I

Calì, A., Gottlob, G., and Pieris, A. (2012).

Towards more expressive ontology languages: The query answering problem.

Artif. Intel., 193.

Calì, A., Lembo, D., and Rosati, R. (2003).

On the decidability and complexity of query answering over inconsistent and incomplete databases.

InPODS.

Cosmadakis, S. S., Kanellakis, P. C., and Vardi, M. Y. (1990).

Polynomial-time implication problems for unary inclusion

(59)

References II

Ibáñez-García, Y., Lutz, C., and Schneider, T. (2014).

Finite model reasoning in Horn description logics.

InKR.

Otto, M. (2002).

Modal and guarded characterisation theorems over finite transition systems.

InLICS.

Pratt-Hartmann, I. (2009).

Data-complexity of the two-variable fragment with counting quantifiers.

Inf. Comput., 207(8).

2/7

(60)

References III

Rosati, R. (2006).

On the decidability and finite controllability of query processing in databases with incomplete information.

InPODS.

(61)

1. Supporting arbitrary arity

R S

1 2

3

When no UFDs: reuseelements from suitable positions

Mustsaturateinitially to make sure such elements exist

With UFDs: bijectivemaps within ⇄-classes

4/7

(62)

1. Supporting arbitrary arity

e

R S

a

b c

d

1 2

3

f

g

When no UFDs: reuseelements from suitable positions

Mustsaturateinitially to make sure such elements exist

With UFDs: bijectivemaps within ⇄-classes

(63)

1. Supporting arbitrary arity

e

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

S[1] S[2]→→

a

b c

d

UIDs:

UFDs:

1 2

3

f

g

When no UFDs: reuseelements from suitable positions

Mustsaturateinitially to make sure such elements exist

With UFDs: bijectivemaps within ⇄-classes

4/7

(64)

1. Supporting arbitrary arity

e

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

S[1] S[2]→→

a

b c

d

UIDs:

UFDs:

1 2

3

f

g

When no UFDs: reuseelements from suitable positions

Mustsaturateinitially to make sure such elements exist

With UFDs: bijectivemaps within ⇄-classes

(65)

1. Supporting arbitrary arity

e

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

S[1] S[2]→→

a

b c

d

UIDs:

UFDs:

1 2

3

f

g

When no UFDs: reuseelements from suitable positions

Mustsaturateinitially to make sure such elements exist

With UFDs: bijectivemaps within ⇄-classes

4/7

(66)

1. Supporting arbitrary arity

e

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

S[1] S[2]→→

a

b c

d

UIDs:

UFDs:

1 2

3

f

g

When no UFDs: reuseelements from suitable positions

Mustsaturateinitially to make sure such elements exist

With UFDs: bijectivemaps within ⇄-classes

(67)

1. Supporting arbitrary arity

e

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

S[1] S[2]→→

a

b c

d

UIDs:

UFDs:

1 2

3

f

g

When no UFDs: reuseelements from suitable positions

Mustsaturateinitially to make sure such elements exist

With UFDs: bijectivemaps within ⇄-classes

4/7

(68)

1. Supporting arbitrary arity

e

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

S[1] S[2]→→

a

b c

d

UIDs:

UFDs:

1 2

3

f

g

With UFDs: bijectivemaps within ⇄-classes

(69)

1. Supporting arbitrary arity

e

R S

R[2] S[1]⊆

S[2] R[1]⊆

R[1] R[2]→

S[1] S[2]→→

a

b c

d

UIDs:

UFDs:

1 2

3

f

g

When no UFDs: reuseelements from suitable positions

Mustsaturateinitially to make sure such elements exist With UFDs: bijectivemaps within ⇄-classes

4/7

(70)

3. From reversible to arbitrary UIDs and UFDs

⊆ ⊆

⊆ ⊆

R

S

T U

UIDs can bedecomposed in reversiblesubsets The subsets can be solved independently Relies on the finite implicationconstruction [Cosmadakis et al., 1990]

(71)

3. From reversible to arbitrary UIDs and UFDs

⊆ ⊆

⊆ ⊆

R

S

T U

UIDs can bedecomposed in reversiblesubsets The subsets can be solved independently Relies on the finite implicationconstruction [Cosmadakis et al., 1990]

5/7

(72)

3. From reversible to arbitrary UIDs and UFDs

⊆ ⊆

R

S

T U

UIDs can bedecomposed in reversiblesubsets The subsets can be solved independently Relies on the finite implicationconstruction [Cosmadakis et al., 1990]

(73)

3. From reversible to arbitrary UIDs and UFDs

⊆ ⊆

R

S

T U

UIDs can bedecomposed in reversiblesubsets The subsets can be solved independently Relies on the finite implicationconstruction [Cosmadakis et al., 1990]

5/7

(74)

3. From reversible to arbitrary UIDs and UFDs

R S

T U

UIDs can bedecomposed in reversiblesubsets The subsets can be solved independently Relies on the finite implicationconstruction [Cosmadakis et al., 1990]

(75)

3. From reversible to arbitrary UIDs and UFDs

R S

T U

UIDs can bedecomposed in reversiblesubsets The subsets can be solved independently Relies on the finite implicationconstruction [Cosmadakis et al., 1990]

5/7

(76)

4. From UFDs to FDs

a

b c

d e

Create initially many reusable elements Reuse them innew combinations

Dense interpretations lemma:

linearly many elements givesuper-linearly many combinations

(77)

4. From UFDs to FDs

a

b c

d e

S[2] ⊆ R[2]

UID:

Create initially many reusable elements Reuse them innew combinations

Dense interpretations lemma:

linearly many elements givesuper-linearly many combinations

6/7

(78)

4. From UFDs to FDs

a

b c

d e

S[2] ⊆ R[2]

UID:

R[1,3] → R[2]

FD:

Create initially many reusable elements Reuse them innew combinations

Dense interpretations lemma:

linearly many elements givesuper-linearly many combinations

(79)

4. From UFDs to FDs

a

b c

d e

S[2] ⊆ R[2]

UID:

R[1,3] → R[2]

FD:

Create initially many reusable elements Reuse them innew combinations

Dense interpretations lemma:

linearly many elements givesuper-linearly many combinations

6/7

(80)

4. From UFDs to FDs

a

b c

d e

S[2] ⊆ R[2]

UID:

R[1,3] → R[2]

FD:

a'

b' c'

d' e'

Create initially many reusable elements Reuse them innew combinations

Dense interpretations lemma:

linearly many elements givesuper-linearly many combinations

(81)

4. From UFDs to FDs

a

b c

d e

S[2] ⊆ R[2]

UID:

R[1,3] → R[2]

FD:

a'

b' c'

d' e'

Create initially many reusable elements Reuse them innew combinations

Dense interpretations lemma:

linearly many elements givesuper-linearly many combinations

6/7

(82)

4. From UFDs to FDs

a

b c

d e

S[2] ⊆ R[2]

UID:

R[1,3] → R[2]

FD:

a'

b' c'

d' e'

Create initially many reusable elements Reuse them innew combinations

Dense interpretations lemma:

linearly many elements givesuper-linearly many combinations

(83)

4. From UFDs to FDs

a

b c

d e

S[2] ⊆ R[2]

UID:

R[1,3] → R[2]

FD:

a'

b' c'

d'

e' Create initially many reusable elements Reuse them innew combinations

Dense interpretations lemma:

linearly many elements givesuper-linearly many combinations

6/7

(84)

4. From UFDs to FDs

a

b c

d e

S[2] ⊆ R[2]

UID:

R[1,3] → R[2]

FD:

a'

b' c'

d' e' Create initially many reusable elements

(85)

5. From acyclic queries to arbitrary queries

e

d f

b

a c

Product with a group of high girth[Otto, 2002] Must betweakedto avoid violating FDs

7/7

(86)

5. From acyclic queries to arbitrary queries

e

d f

b

a c

S[2] ⊆ R[1]

UID:

S[2] ⊆ R[2]

Product with a group of high girth[Otto, 2002] Must betweakedto avoid violating FDs

(87)

5. From acyclic queries to arbitrary queries

e

d f

b

a c

S[2] ⊆ R[1]

UID:

S[2] ⊆ R[2]

Product with a group of high girth[Otto, 2002] Must betweakedto avoid violating FDs

7/7

(88)

5. From acyclic queries to arbitrary queries

e

d f

b

a c

S[2] ⊆ R[1]

UID:

S[2] ⊆ R[2]

query:

Product with a group of high girth[Otto, 2002] Must betweakedto avoid violating FDs

(89)

5. From acyclic queries to arbitrary queries

e

d f

e'

d' f'

b

a c

b'

a' c'

S[2] ⊆ R[1]

UID:

S[2] ⊆ R[2]

Product with a group of high girth[Otto, 2002] Must betweakedto avoid violating FDs

7/7

(90)

5. From acyclic queries to arbitrary queries

e

d f

e'

d' f'

b

a c

b'

a' c'

S[2] ⊆ R[1]

UID:

S[2] ⊆ R[2]

Product with a group of high girth[Otto, 2002] Must betweakedto avoid violating FDs

(91)

5. From acyclic queries to arbitrary queries

e

d f

e'

d' f'

b

a c

b'

a' c'

S[2] ⊆ R[1]

UID:

S[2] ⊆ R[2]

Product with a group of high girth[Otto, 2002] Must betweakedto avoid violating FDs

7/7

(92)

5. From acyclic queries to arbitrary queries

e

d f

e'

d' f'

b

a c

b'

a' c'

S[2] ⊆ R[1]

UID:

S[2] ⊆ R[2]

Références

Documents relatifs

We focus on the ITS dataset (IT Support dataset), a set of natural language questions asking for IT support from within IBM , where each question is as- sociated with an URL, the

While query answering with Description Logics (DLs) is now well-developed, this is much less the case for reasoning services that support ontology engineering and target query

We demonstrate how openQA can be used to implement, integrate, evaluate and instantiate question answering systems easily by combining two state-of-the-art question

We hence integrate two extensions of classical ontology-based query answering, motivated by the often temporal and/or fuzzy nature of real-world data.. We also propose an algorithm

endomorphism, open continuous map, complete Heyting homomor- phism, strong graph homomorphism, Hausdorff property.. The authors gratefully acknowledge the support of

The second type of query, called fuzzy conjunctive query, asks for the best entailment degree ; i.e., the largest possible degree d such that every model of the ontology has a match

We can then obtain hints to the upper model concepts and roles of interest by mapping question verbs onto domain concepts and then try to match the roles defined for the upper

OA journals should and can enjoy the same sophisticated online publishing technology and powerful marketing tools used by the journals of large international publishers which make