• Aucun résultat trouvé

The complete CLA 2012 proceedings

N/A
N/A
Protected

Academic year: 2022

Partager "The complete CLA 2012 proceedings"

Copied!
369
0
0

Texte intégral

(1)

Proceedings of the Ninth International Conference on Concept Lattices and Their Applications

CLA Conference Series

http://cla.inf.upol.cz

(2)
(3)

The Ninth International Conference on Concept Lattices and Their Applications

CLA 2012

Fuengirola (M´ alaga), Spain October 11–14, 2012

Edited by Laszlo Szathmary

Uta Priss

(4)

Copyright c2012 by paper authors.

Copying permitted only for private and academic purposes.

This volume is published and copyrighted by its editors.

Technical Editor:

Laszlo Szathmary,szathmary.laszlo@inf.unideb.hu

Page count: xii+357 Impression: 75 Edition: 1st First published: 2012

Printed version published by:

Universidad de M´alaga (Dept. Matem´atica Aplicada), Spain ISBN 978–84–695–5252–0

(5)

CLA 2012 was organized by the Universidad de M´alaga (Dept. Matem´atica Aplicada)

Steering Committee

Radim Belohlavek Palacky University, Olomouc, Czech Republic Sadok Ben Yahia Facult´e des Sciences de Tunis, Tunisia Jean Diatta Universit´e de la R´eunion, France Peter Eklund University of Wollongong, Australia Sergei O. Kuznetsov State University HSE, Moscow, Russia Michel Liqui`ere LIRMM, Montpellier, France

Engelbert Mephu Nguifo LIMOS, Clermont-Ferrand, France

Program Chairs

Laszlo Szathmary University of Debrecen, Hungary

Uta Priss Ostfalia University, Wolfenb¨uttel, Germany

Program Committee

Jaume Baixeries Polytechnical University of Catalonia

Radim Belohlavek Palacky University, Olomouc, Czech Republic Sadok Ben Yahia Faculty of Sciences, Tunis, Tunisia

Karell Bertet University of La Rochelle, France Fran¸cois Brucker University of Marseille, France Claudio Carpineto Fondazione Ugo Bordoni, Roma, Italy Pablo Cordero Universidad de M´alaga, Spain

Felix Distel TU Dresden, Germany

Florent Domenach University of Nicosia, Cyprus Mireille Ducass´e IRISA/INSA Rennes, France

Ramon Fuentes-Gonzalez Universidad Publica de Navarra, Spain Cynthia Vera Glodeanu TU Dresden, Germany

Marianne Huchard LIRMM, University of Montpellier 2, France Vassilis G. Kaburlasos TEI of Kavala, Greece

Mehdi Kaytoue LIRIS/INSA Lyon, France

Stanislav Krajci University of P.J. Safarik, Kosice, Slovakia Marzena Kryszkiewicz Warsaw University of Technology, Poland Sergei O. Kuznetsov State University HSE, Moscow, Russia Jes´us Medina-Moreno University of Cadiz, Spain

Rokia Missaoui UQO, Gatineau, Canada

(6)

Lhouari Nourine LIMOS, University of Clermont Ferrand, France Sergei Obiedkov State University HSE, Moscow, Russia

Jan Outrata Palacky University, Olomouc, Czech Republic Pascal Poncelet LIRMM, Montpellier, France

Camille Roth EHESS, Paris, France

Baris Sertkaya SAP Research Center, Dresden, Germany Henry Soldano Universit´e of Paris 13, France

Gerd Stumme University of Kassel, Germany

Petko Valtchev Universit´e du Qu´ebec `a Montr´eal, Canada

Additional Reviewers

Zeina Azmeh LIRMM, University of Montpellier 2, France

Daniel Borchmann TU Dresden, Germany

Stephan Doerfel University of Kassel, Germany

Xavier Dolques INRIA Rennes, France

Robert J¨aschke L3S Research Center, Hannover, Germany

Local Organizing Committee

Manuel Ojeda-Aciego (chair) Universidad de M´alaga, Spain Pablo Cordero Universidad de M´alaga, Spain Inma P. Cabrera Universidad de M´alaga, Spain

(7)

Preface

Invited Contributions

Some results on the L-Fuzzy Concept Analysis. . . 1 Ana Burusco

Multi-adjoint concept lattices. . . 3 Jes´us Medina

Data characteristics and their relation to closed patterns discovery

algorithms . . . 5 Engelbert Mephu Nguifo

On the names of implication. . . 7 Sergei O. Kuznetsov

Long Papers

A Generalized Next-Closure Algorithm – Enumerating Semilattice

Elements from a Generating Set . . . 9 Daniel Borchmann

Hermes: an efficient algorithm for building Galois sub-hierarchies. . . 21 Anne Berry, Marianne Huchard, Amedeo Napoli and Alain Sigayret

Mining Concepts from Incomplete Datasets Utilizing Matrix Factorization 33 Lenka Piskov´a, ˇStefan Pero, Tom´aˇs Horv´ath and Stanislav Krajˇci

Learning Model Transformations from Examples using FCA: One for

All or All for One?. . . 45 Hajer Saada, Xavier Dolques, Marianne Huchard, Cl´ementine

Nebut and Houari Sahraoui

Annotating Lattice Orbifolds with Minimal Acting Automorphisms . . . 57 Tobias Schlemmer

Fuzzy formal concept analysis via multilattices: first prospects and results 69 J. Medina and J. Ruiz-Calvino

An interpretation of the L-Fuzzy Concept Analysis as a tool for the

Morphological Image and Signal Processing . . . 81 Cristina Alcalde, Ana Burusco and Ram´on Fuentes-Gonz´alez

(8)

Contexts. . . 93 L’ubom´ır Antoni, Stanislav Krajˇci, Ondrej Kr´ıdlo, Bohuslav Macek

and Lenka Piskov´a

Concepts and Types – An Application to Formal Language Theory. . . 103 Christian Wurm

Distributed Closed Pattern Mining in Multi-Relational Data based on

Iceberg Query Lattices: Some Preliminary Results. . . 115 Hirohisa Seki and Sho-ich Tanimoto

Attribute Dependencies in a Fuzzy Setting . . . 127 Cynthia Vera Glodeanu

How Relational Concept Analysis Can Help to Observe the Evolution

of Business Class Models. . . 139 A. Osman Gu´edi, A. Miralles, B. Amar, C. Nebut, M. Huchard and

T. Libourel

Finding Errors in New Object Intents . . . 151 Artem Revenko and Sergei O. Kuznetsov

Adapting Fuzzy Formal Concept Analysis for Fuzzy Description Logics . . 163 Felix Distel

Computing Functional Dependencies with Pattern Structures. . . 175 Jaume Baixeries, Mehdi Kaytoue and Amedeo Napoli

Computing minimal generators from implications: a logic-guided approach 187 P. Cordero, M. Enciso, A. Mora and M. Ojeda-Aciego

Conceptual analysis of complex system simulation data for decision

support: Application to aircraft cabin design . . . 199 Nizar Messai, Cassio Melo, Mohamed Hamdaoui, Dung Bui and

Marie-Aude Aufaure

A Hybrid Classification Approach based on FCA and Emerging

Patterns – An application for the classification of biological inhibitors . . . 211 Yasmine Asses, Aleksey Buzmakov, Thomas Bourquard, Sergei O.

Kuznetsov and Amedeo Napoli

The dependence graph of a lattice. . . 223 Karell Bertet

LinkingL-Chu correspondences and completely latticeL-ordered sets. . . . 233 Ondrej Kr´ıdlo and Manuel Ojeda-Aciego

(9)

with heterogeneous conjunctors. . . 245 Jan Konecny, Jes´us Medina and Manuel Ojeda-Aciego

A contribution to semantic indexing and retrieval based on FCA – An

application to song datasets . . . 257 V´ıctor Codocedo, Ioanna Lykourentzou and Amedeo Napoli

Efficient Vertical Mining of Minimal Rare Itemsets . . . 269 Laszlo Szathmary, Petko Valtchev, Amedeo Napoli and Robert Godin

Multiple Keyword Pattern Matching using Position Encoded Pattern

Lattices. . . 281 Fritz J. Venter, Bruce W. Watson and Derrick G. Kourie

Factor analysis of sports data via decomposition of matrices with grades . 293 Radim Belohlavek and Marketa Krmelova

Impact of Boolean factorization as preprocessing methods for

classification of Boolean data. . . 305 Radim Belohlavek, Jan Outrata and Martin Trnecka

The lattice of all betweenness relations: Structure and properties. . . 317 Laurent Beaudou, Mamadou Moustapha Kant´e and Lhouari Nourine

Using Taxonomies on Objects and Attributes to Discover Generalized

Patterns . . . 327 L´eonard Kwuida, Rokia Missaoui and Jean Vaillancourt

Short Papers

Formal Concept Analysis Applied to Transcriptomic Data. . . 339 Mehwish Alam, Adrien Coulet, Amedeo Napoli and Malika

Sma¨ıl-Tabbone

WebGeneKFCA: an On-line Conceptual Analysis Tool for Genomic

Expression Data . . . 345 Jos´e Mar´ıa Fern´andez-Calabozo, Carmen Pel´aez-Moreno and

Francisco J. Valverde-Albacete

Concept Lattices and Median Networks. . . 351 Uta Priss

Author Index

. . . 355

(10)
(11)

The Ninth International Conference “Concept Lattices and Applications (CLA 2012)” is held in Fuengirola (M´alaga), Spain from October 11th until October 14th 2012. CLA 2012 is aimed at providing to everyone interested in Formal Concept Analysis and more generally in Concept Lattices or Galois Lattices, students, professors, researchers and engineers, a global and an advanced view of some of the latest research trends and applications in this field. As the di- versity of the selected papers shows, there is a wide range of theoretical and practical research directions, in the field of data and knowledge processing, such as data mining, knowledge discovery, knowledge representation, reasoning, pat- tern recognition, together with logic, algebra and lattice theory.

This volume includes the selected papers and the abstracts of the 4 invited talks. This year there were initially 44 submissions from which 28 papers were accepted as full papers and 3 papers as short papers. We would like to thank the authors for their work, often of very good quality, the members of the program committee and the external reviewers without whose tremendous efforts this conference would not have been possible. This is evidence of the growing quality and importance of CLA, highlighting its leading position in the field.

We would like to thank the financial support that this conference has received from the Research Promotion Programme of the Universidad de M´alaga. We would also like to thank the steering committee of CLA for giving us the op- portunity of leading this edition of CLA, the conference participants for their participation and support, and people in charge of the organization.

Finally, we also should not forget that the conference was managed (quite easily) with the Easychair system, paper submission, selection, and reviewing, and that Jan Outrata has offered his files for preparing the proceedings.

October 2012 Laszlo Szathmary

Uta Priss Program Chairs of CLA 2012

(12)
(13)

Ana Burusco

Dpt. Autom´atica y Computaci´on, Univ. P´ublica de Navarra Campus de Arrosad´ıa, 31006 - Pamplona (Spain)

burusco@unavarra.es

Abstract. The main goal of this talk is the study of some extensions of the Formal Concept Analysis to the L-fuzzy case as the interval-valued L-fuzzy contexts or the K-labeled L-fuzzy contexts. These results are applied to the extraction of information when we do not have all the necessary elements replacing the absent values by means of implications between attributes associated with labels. I will show an application to the diagnosis of the short-circuits produced in an electrical network. Moreover, using a fuzzy tolerance relationR, certain fuzzy relations are characterized as solutions of X CR =X,proving that they can be determined by means of the L-fuzzy concepts associated with the K-labeled L-fuzzy contexts. In the last part of the talk the L-fuzzy context sequences are studied using OWA operators. A particular case of this situation appears when we want to study the evolution of an L-fuzzy context in time.

(14)
(15)

Jes´us Medina

Dept. Mathematics, University of C´adiz, Spain? jesus.medina@uca.es

Abstract. Multi-adjoint concept lattices were introduced [2,3] as a new general ap- proach to formal concept analysis, in which the philosophy of the multi-adjoint para- digm [1,4] to formal concept analysis is applied. With the idea of providing a general framework in which different approaches could be conveniently accommodated, the authors worked in a general non-commutative environment; and this naturally lead to the consideration of adjoint triples, also called implication triples or bi-residuated structure as the main building blocks of a multi-adjoint concept lattice.

In recent years there has been an increased interest in studying formal concept analysis on the perspective of using non-commutative conjunctors. This is not a mere mathe- matical generalization, but a real need since, for instance, when one learns a conjunction from examples it is not unusual that the resulting conjunction does not satisfy com- mutativity. Different authors have argued in favour of considering non-commutative conjunctors. Actually, there exist quite reasonable examples of non-commutative and even non-associative conjunctors defined on a regular partition of the unit interval.

Hence, the possibility of considering non-commutative conjunctors provides more flex- ibility and increases the number of applications.

This is one of the properties that the multi-adjoint concept lattice framework offers.

Another important feature is that different preferences among the set of attributes or/and objects can be considered.

Moreover, this framework has been extended following different lines and has been applied to define general extensions of fuzzy rough sets theory, to solve fuzzy relation equations, etc.

References

1. P. Julian, G. Moreno, and J. Penabad. On fuzzy unfolding: A multi-adjoint ap- proach. Fuzzy Sets and Systems, 154(1):16–33, 2005.

2. J. Medina, M. Ojeda-Aciego, and J. Ruiz-Calvi˜no. Formal concept analysis via multi-adjoint concept lattices. Fuzzy Sets and Systems, 160(2):130–144, 2009.

3. J. Medina, M. Ojeda-Aciego, and J. Ruiz-Calvi˜no. On multi-adjoint concept lat- tices: definition and representation theorem.Lecture Notes in Artificial Intelligence, 4390:197–209, 2007.

4. J. Medina, M. Ojeda-Aciego, and P. Vojt´aˇs. Similarity-based unification: a multi- adjoint approach. Fuzzy Sets and Systems, 146:43–62, 2004.

?Partially supported by Spanish Ministry of Science and FEDER funds through project TIN09-14562-C05-03 and Junta de Andaluca project P09-FQM-5233.

(16)
(17)

patterns discovery algorithms

Engelbert Mephu Nguifo

LIMOS, Clermont University, Blaise Pascal University and CNRS Clermont-Ferrand, France

mephu@isima.fr

Abstract. Closed frequent patterns discovery remains a challenge in data mining.

During the last decade, different works on data mining algorithms have based their performance evaluation on one dataset characteristic: its density (or on the contrary its sparseness). The incoming of massive datasets in different applications, points out the important goal to design efficient algorithms. The density measurement have shown to be a direction to reach such goal, especially when dealing with formal context of concept lattices. This talk will discuss this notion and describe some metrics defined to characterize dataset density for patterns discovery purpose.

References

1. Yahia, S.B., Hamrouni, T., Nguifo, E.M.: Frequent closed itemset based algorithms:

a thorough structural and analytical survey. SIGKDD Explor. Newsl. 8(1) (June 2006) 93–104

2. Boley, M., Grosskreutz, H.: Approximating the number of frequent sets in dense data. Knowl. Inf. Syst.21(1) (October 2009) 65–89

3. Emilion, R., L´evy, G.: Size of random galois lattices and number of closed frequent itemsets. Discrete Appl. Math.157(13) (July 2009) 2945–2957

4. Flouvat, F., Marchi, F., Petit, J.M.: A new classification of datasets for frequent itemsets. J. Intell. Inf. Syst.34(1) (February 2010) 1–19

5. Kuznetsov, S.O., Obiedkov, S.A.: Comparing performance of algorithms for gener- ating concept lattices. Journal of Experimental & Theoretical Artificial Intelligence 14(2-3) (2002) 189–216

6. Hamrouni, T., Yahia, S.B., Nguifo, E.M.: Looking for a structural characterization of the sparseness measure of (frequent closed) itemset contexts. Information Sciences (0) (2012) –

7. N´egrevergne, B., Termier, A., M´ehaut, J.F., Uno, T.: Discovering closed frequent itemsets on multicore: Parallelizing computations and optimizing memory accesses.

In: HPCS. (2010) 521–528

8. Uno, T., Asai, T., Uchida, Y., Arimura, H.: An efficient algorithm for enumerating closed patterns in transaction databases. In: In Proc. DS ’04, LNAI 3245. (2004) 16–31

(18)
(19)

Sergei O. Kuznetsov Higher School of Economics, Moscow

skuznetsov@hse.ru

Abstract.We discuss relationships of attribute implications to various tools in com- puter science and artificial intelligence: functional dependencies, horn theories, emer- gent patterns, disjunctive version spaces, and concept-based hypotheses. The intractabil- ity of computing implication bases seems to be the main challenge for the use of im- plications in analyzing large data collections. Alternatives to generation of implication bases such as lazy-learning classification, target-driven generation of classifiers, and sampling are considered.

(20)
(21)

A Generalized Next-Closure Algorithm – Enumerating Semilattice Elements

from a Generating Set

Daniel Borchmann TU Dresden, Institute of Algebra daniel.borchmann@mailbox.tu-dresden.de

Abstract. A generalization of the well known Next-Closure algorithm is presented, which is able to enumerate finite semilattices from a generating set. We prove the correctness of the algorithm and apply it on the computation of the intents of a formal context.

1 Introduction

Next-Closure is one of the best known algorithms in Formal Concept Analysis [8]

to compute the concepts of a formal context. In its general form it is able to efficiently enumerate the closed sets of a given closure operator on a finite set.

This generality might be a drawback concerning efficiency compared to other algorithms like Close-by-One [1,9,11]. On the other hand, the general formulation of Next-Closure widens its field of application. However, there are still applications where Next-Closure might be useful, but is not applicable, because a closure operator on a finite set is not explicitly available. One such example might be the computation of concepts of a fuzzy formal context [3]. In those cases most often an ad hoc variation of Next-Closure can be constructed. The aim of this paper is to provide a generalization of Next-Closure which covers those cases, and may even go beyond them.

As it turns out, Next-Closure is not about enumerating closed sets of a closure operator, even not on an abstract ordered set. The algorithm is merely about enumerating elements of a certain semilattice, given as an operation together with a generating set. This observation shall turn out to be quite natural.

It has to be noted that there have been prior attempts to generalize Next- Closure to a more general setting [7]. But this approach is, as far as the author can tell, not related to the one presented in this paper.

This paper is organized as follows. First of all we shall revisit the original version of Next-Closure, together with the basic definitions. Then we present our generalized version working on semilattices, together with a complete proof of its correctness. Then we show how this generalized form is indeed a generalization of the original Next-Closure. Additionally, we present another algorithm for enumerating the intents of a given formal context, which is very similar to Close-by-One. Finally, we give some outlook on further questions which might be interesting within this line of research.

c 2012 by the paper authors. CLA 2012, pp. 9–20. Copying permitted only for private and academic purposes. Volume published and copyrighted by its editors.

Local Proceedings in ISBN 978–84–695–5252–0,

Universidad de M´alaga (Dept. Matem´atica Aplicada), Spain.

(22)

2 The Next-Closure Algorithm

Before we are going to discuss our generalized form of Next-Closure, let us revisit the original version as it is given in [6,8]. To make our discussion a bit more consistent, we shall allow ourselves a minor deviation from the standard description of the algorithm, which we shall mention explicitly.

Let𝑀 be a finite set and let𝑐:Pp𝑃q ÝÑPp𝑃qbe a function such that a) 𝑐is idempotent, i.e.𝑐p𝑐p𝐴qq “𝑐p𝐴qfor all𝐴Ď𝑀,

b) 𝑐is monotone, i.e. if𝐴Ď𝐵, then 𝑐p𝐴q Ď𝑐p𝐵qfor all𝐴, 𝐵Ď𝑀, and c) 𝑐is extensive, i.e.𝐴Ď𝑐p𝐴qfor all𝐴Ď𝑀.

The mapping 𝑐is then said to be aclosure operatoron 𝑃. A set𝐴Ď𝑀 is called closed (with respect to 𝑐)if𝐴𝑐p𝐴q, and theimage of𝑐is defined as

𝑐rPp𝑀qs:“ t𝑐p𝐴q |𝐴Ď𝑀u.

Without loss of generality, let 𝑀“ t1, . . . , 𝑛ufor some𝑛PN. For two sets 𝐴, 𝐵P𝑐rPp𝑀qswith𝐴𝐵 and𝑖P𝑀 we say that𝐴islectically smaller than 𝐵 at position𝑖if and only if

𝑖“minp𝐴 𝛥 𝐵q and 𝑖P𝐵,

where 𝐴 𝛥 𝐵“ p𝐴z𝐵q Y p𝐵z𝐴qdenotes thesymmetric difference of𝐴 and𝐵.

We shall write𝐴ă𝑖𝐵 if𝐴is lectically smaller than𝐵 at position𝑖. Finally, we say that𝐴islectically smaller than𝐵, for𝐴, 𝐵P𝑐rPp𝑀qs, if𝐴𝐵 or𝐴ă𝑖𝐵 for some𝑖P𝑀. We shall write𝐴ĺ𝐵 in this case.

It has to be noted that, in contrast to our definition, the lectic order is normally defined for all sets𝐴, 𝐵Ď𝑀 in the very same spirit as given above.

However, as we shall see, this is not necessary, which is why we have restricted our definition to closed sets only.

Now let us define for𝐴P𝑐rPp𝑀qsand𝑖P𝑀

𝐴𝑖:“𝑐pt𝑗P𝐴|𝑗ă𝑖u Y t𝑖uq. Then we have the following result.

Theorem 1 (Next-Closure [6]). Let𝐴P𝑐rPp𝑀qs. Then the next closed set 𝐴`P𝑐rPp𝑀qs after𝐴 with respect to the lectic order ĺ, if it exists, is given by

𝐴`𝐴𝑖 with 𝑖P𝑀 being maximal with𝐴ă𝑖 𝐴𝑖.

This is the original version of Next-Closure, as it is given in [6,8]. Therein, the term “next closed set” has the obvious meaning, namely

𝐴`“minăt𝐵P𝑐rPp𝑀qs |𝐴ă𝐵u.

(23)

Our generalization now starts with the following observation: the set𝐴𝑖 can be seen as the smallest closed set containing botht𝑗P𝐴|𝑗ă𝑖uandt𝑖u, or equivalently, both 𝑐pt𝑗 P𝐴 | 𝑗 ă𝑖uq and 𝑐pt𝑖uq. This means that we can rewrite𝐴𝑖as

𝐴𝑖𝑐pt𝑗P𝐴|𝑗 ă𝑖uq _𝑐pt𝑖uq,

where 𝑋 _𝑌 is the smallest closed set containing both 𝑋, 𝑌 P 𝑐rPp𝑀qs, the supremum of 𝑋 and 𝑌, which is simply given by 𝑋 _𝑌𝑐p𝑋 Y𝑌q. This observation suggests to consider Next-Closure on abstract algebraic structures with a binary operation _with some certain properties, namely onsemi-lattices.

To do so we need a more general notion of 𝑐pt𝑖uq, since we do not necessarily deal with subsets, and a more general notion oft𝑗P𝐴|𝑗ă𝑖u, which likewise might not be expressible in a more general setting. Finally, we need to find a starting point for our enumeration, which is𝑐pHqin the original description of Next-Closure, but may vary in other cases. Luckily, all this is possible and quite natural, as we shall see in the next section.

3 Generalizing Next-Closure for Semilattices

The aim of this section is to present a generalization of the Next-Closure algorithm that works on semilattices. For this recall that a semilattice 𝐿“ p𝐿,_q is an algebraic structure with a binary operation_which is associative, commutative and idempotent. It is well known that by

𝑥ď𝐿𝑦 :ðñ 𝑥_𝑦𝑦, p𝑥, 𝑦P𝐿q

an order relation on 𝐿 is defined in such a way that for every two elements 𝑎, 𝑏P𝐿the element𝑎_𝑏is the least upper bound of both𝑎and𝑏 with respect toď𝐿.

For the remainder of this section let 𝐿 “ p𝐿,_q be an arbitrary but fixed semilattice. Furthermore, letp𝑥𝑖|𝑖P𝐼qbe an enumeration of a finite generating sett𝑥𝑖|𝑖P𝐼u Ď𝐿of𝐿. Finally, letď𝐼 be a total order on𝐼.

Definition 1. Let 𝑎, 𝑏P𝐿 and let𝑖P𝐼. Set

𝛥𝑎,𝑏:“ t𝑗P𝐼| p𝑥𝑗ď𝐿𝑎and𝑥𝑗­ď𝐿𝑏qor p𝑥𝑗 ­ď𝐿𝑎 and𝑥𝑗 ď𝐿𝑏q u. We then define

𝑎ă𝑖𝑏 :ðñ 𝑖“min𝛥𝑎,𝑏 and𝑥𝑖ď𝐿𝑏.

Furthermore we write𝑎ă𝑏 if 𝑎ă𝑖𝑏 for some 𝑖P𝐼 and write 𝑎ď𝑏 if𝑎𝑏 or 𝑎ă𝑏.

One can see the similarity of this definition to the one of the lectic order.

Here, the set 𝛥𝑎,𝑏 generalizes 𝑎 𝛥 𝑏and𝑥𝑖 ď𝐿 𝑏 somehow represents the fact that𝑖P𝑏, or equivalentlyt𝑖u Ď𝑏, in the special case of𝐿“Pp𝑀qand𝑖P𝑀.

Note that if 𝑎ă𝑖𝑏 and𝑘P𝐼 with𝑘ă𝐼 𝑖, then 𝑥𝑘 ď𝐿𝑎 ðñ 𝑥𝑘ď𝐿𝑏.

(24)

This observation is quite useful and will be used in some of the proofs later on.

The first thing we want to consider now are two easy results stating thatď is a total order relation on𝐿extendingď𝐿.

Lemma 1. The relationăis irreflexive and transitive. Furthermore, for every two elements𝑎, 𝑏P𝐿with 𝑎𝑏, it is either𝑎ă𝑏 or𝑏ă𝑎.

Proof. If𝑎𝑏, then the set𝛥𝑎,𝑏 defined above is empty, therefore we cannot have𝑎ă𝑖 𝑎for some𝑖P𝐼. This shows the irreflexivity ofă. Let us now consider the transitivity ofă. For this let𝑎, 𝑏, 𝑐P𝐿,𝑖, 𝑗P𝐼and suppose that𝑎ă𝑖𝑏and 𝑏ă𝑗 𝑐. We have to show that𝑎ă𝑐. Let us consider the following cases.

Case 𝑖ă𝐼 𝑗.We have𝑥𝑖­ď𝐿𝑎and𝑥𝑖ď𝐿 𝑏because of𝑎ă𝑖𝑏. Due to𝑖ă𝐼 𝑗 it follows that 𝑥𝑖 ď𝐿 𝑐. Suppose that there exists 𝑘P𝐼, 𝑘 ă𝐼 𝑖 with𝑥𝑘 ď𝐿 𝑎 and 𝑥𝑘 ­ď𝐿 𝑐. Then if 𝑥𝑘 ­ď𝐿 𝑏 we would have 𝑥𝑘 ­ď𝐿 𝑎 because of 𝑘 ă𝐼 𝑖, a contradiction. But if 𝑥𝑘 ď𝐿 𝑏, then 𝑥𝑘 ď𝐿 𝑐 because of 𝑘 ă𝐼 𝑖 ă𝐼 𝑗, again a contradiction. Thus we have shown that𝑎ă𝑐.

Case 𝑗 ă𝐼 𝑖. We have 𝑥𝑗 ­ď𝐿 𝑏, 𝑥𝑗 ď𝐿 𝑐 because of 𝑏 ă𝑗 𝑐. Due to 𝑗 ă𝐼 𝑖 it follows that𝑥𝑗 ­ď𝐿 𝑎. Now if there were a 𝑘 P𝐼, 𝑘 ă𝐼 𝑗 with 𝑥𝑘 ď𝐿 𝑎and 𝑥𝑘­ď𝐿𝑐, then 𝑥𝑘 ď𝐿𝑏 would imply𝑥𝑘 ď𝐿 𝑐and𝑥𝑘­ď𝐿𝑏would imply𝑥𝑘­ď𝐿𝑎, analogously to the first case, a contradiction. Hence such a𝑘cannot exist and 𝑎ă𝑐.

Case𝑖𝑗.This cannot occur since otherwise𝑥𝑖ď𝐿𝑏, because of𝑎ă𝑖𝑏, and 𝑥𝑖­ď𝐿𝑏, because of𝑏ă𝑖𝑐, a contradiction.

Overall we have shown that𝑎ă𝑐 in any case and thereforeăis a transitive relation.

Finally let𝑎, 𝑏P𝐿with𝑎𝑏. Then becauset𝑥𝑖|𝑖P𝐼uis a generating set, the set𝛥𝑎,𝑏 is not empty, since otherwise 𝑎𝑏. With𝑖:“min𝛥𝑎,𝑏 we either have𝑎ă𝑖𝑏 if𝑥𝑖ď𝐿𝑏and𝑏ă𝑖 𝑎otherwise.

Lemma 2. Let𝑎, 𝑏P𝐿 with 𝑎ď𝐿𝑏. Then𝑎ď𝑏. In particular, if 𝑎ď𝐿 𝑐 and 𝑏ď𝐿𝑐 for𝑎, 𝑏, 𝑐P𝐿, then 𝑎_𝑏ď𝑐.

Proof. We show𝑥𝑖 ď𝐿 𝑎 ùñ 𝑥𝑖 ď𝐿 𝑏 for all 𝑖P𝐼. This shows 𝑏 ­ă𝑎, hence 𝑎ď𝑏by Lemma 1. Now if 𝑥𝑖ď𝐿𝑎, then because of𝑎ď𝐿𝑏 we see that𝑥𝑖ď𝐿 𝑏 and the claim is proven.

The next step towards a general notion of Next-Closure is to provide a generalization of‘.

Definition 2. Let 𝑎P𝐿 and𝑖P𝐼. Then define 𝑎𝑖:“ ł

𝑗ă𝐼𝑖 𝑥𝑗ď𝐿𝑎

𝑥𝑗_𝑥𝑖.

With all these definitions at hand we are now ready to formulate and prove the promised generalization. For this, we generalize the proof of Next-Closure as it is given in [8, page 67].

(25)

Lemma 3. Let 𝑎, 𝑏P𝐿and𝑖, 𝑗P𝐼. Then the following statements hold:

i) 𝑎ă𝑖𝑏, 𝑎ă𝑗𝑐, 𝑖ă𝐼 𝑗 ùñ 𝑐ă𝑖𝑏.

ii) 𝑎ă𝑎𝑖 if𝑥𝑖­ď𝐿𝑎.

iii) 𝑎ă𝑖𝑏 ùñ 𝑎𝑖ď𝑏.

iv) 𝑎ă𝑖𝑏 ùñ 𝑎ă𝑖𝑎𝑖.

Proof. i) It is𝑥𝑖­ď𝐿𝑎and due to𝑖ă𝐼 𝑗 we get𝑥𝑖­ď𝐿𝑐as well. Furthermore, 𝑥𝑖 ď𝐿 𝑏 because of 𝑎ă𝑖 𝑏. Now if there would exist a𝑘 P𝐼 with 𝑘ă𝐼 𝑖 such that 𝑥𝑘 ď𝐿 𝑐, 𝑥𝑘 ­ď𝐿𝑏, then𝑥𝑘ď𝐿 𝑎because of𝑘ă𝐼 𝑖 and𝑥𝑘 ­ď𝐿𝑎 because of 𝑘ă𝐼 𝑖ă𝐼 𝑗, a contradiction. With the same argumentation a contradiction follows from the assumption that there exists a𝑘P𝐼,𝑘ă𝐼 𝑖 with𝑥𝑘­ď𝐿𝑐, 𝑥𝑘 ď𝐿𝑏. In sum we have shown𝑐ă𝑖𝑏, as required.

ii) We have 𝑥𝑖 ­ď𝐿 𝑎 and𝑥𝑖 ď𝐿 𝑎𝑖. Furthermore, for 𝑘 P 𝐼, 𝑘 ă𝐼 𝑖 and 𝑥𝑘 ď𝐿𝑎we have 𝑥𝑘 ď𝐿𝑎𝑖by definition. This shows𝑎ă𝑎𝑖.

iii) Let𝑎ă𝑘𝑏 for some𝑘P𝐼. ThenŽ

𝑗ă𝐼𝑘,𝑥𝑗ď𝐿𝑎𝑥𝑗ď𝐿𝑏 and𝑥𝑘ď𝐿𝑏, hence with Lemma 2 we get𝑎𝑘ď𝑏.

iv) Let𝑎ă𝑖𝑏. Then𝑥𝑖­ď𝐿𝑎and with (ii) we get𝑎ă𝑎𝑖. By (iii),𝑎𝑖ď𝑏.

If for 𝑘 P𝐼, 𝑘 ă𝐼 𝑖 it holds that 𝑥𝑘 ď𝐿 𝑎𝑖and 𝑥𝑘 ­ď𝐿 𝑎, then we also have 𝑥𝑘ď𝐿𝑎𝑖ď𝐿𝑏, i.e. 𝑥𝑘 ď𝐿𝑏, contradicting the minimality of𝑖.

Theorem 2 (Next-Closure for Semilattices). Let 𝑎 P 𝐿. Then the next element𝑎`P𝐿 with respect toă, if it exists, is given by

𝑎`𝑎𝑖 with 𝑖P𝐼 being maximal with𝑎ă𝑖𝑎𝑖.

Proof. Let

𝑎`“minăt𝑏P𝐿|𝑎ă𝑏u

be the next element after𝑎with respect toă. Then𝑎ă𝑖𝑎` for some𝑖P𝐼 and by Lemma 3.iv we get𝑎ă𝑖𝑎𝑖and with Lemma 3.iii we see𝑎𝑖ď𝑎`, hence 𝑎𝑖𝑎`. The maximality of𝑖 follows from Lemma 3.i.

To find the correct element𝑖P𝐼such that𝑎`𝑎𝑖we can utilize Lemma 3.ii.

Because of this result, only elements𝑖P𝐼 with𝑥𝑖­ď𝐿𝑎have to be considered, a technique which is also known for the original form of Next-Closure.

However, to make the above theorem practical for enumerating the elements of a certain semilattice, one has to start with some element, preferably the smallest element in𝐿 with respect toď. This element must also be minimal in𝐿with respect to ď𝐿, by Lemma 2. Since t𝑥𝑖 | 𝑖 P 𝐼u is a generating set of 𝐿, and 𝑎ď𝑎_𝑏for all 𝑎, 𝑏P𝐿, the minimal elements of𝐿with respect toď𝐿 must be among the elements𝑥𝑖,𝑖P𝐼. So to find the first element of𝐿 with respect toď, find all minimal elements int𝑥𝑖|𝑖P𝐼uand choose the smallest element with respect toďfrom them. But because of𝑥𝑖 ď𝑥𝑗 if and only if𝑗 ă𝐼 𝑖, one just has to take the largest index𝑗with respect toă𝐼 to find the smallest element in 𝐿with respect toď.

(26)

As a final remark for this section note that the sett𝑥𝑖|𝑖P𝐼umust always include the_-irreducible elements of𝐿. These are all those elements𝑎P𝐿that cannot be represented as a join of other elements, or, equivalently,

t𝑏P𝐿|𝑏ă𝐿 𝑎u “ H or ł

𝑏ă𝐿𝑎

𝑏ă𝐿𝑎.

It is also easy to see that the set of_-irreducible elements of𝐿is also sufficient, i. e. that it is a generating set of𝐿.

4 Computing the Intents of a Formal Context

We have seen an algorithm that is able to enumerate the elements of a semilattice from a given generating set. We have also claimed that this is a generalization of Next-Closure, which we want to demonstrate in this section. Furthermore, we want to give another example of an application of this algorithm, namely the computation of the intents of a given formal context.

Firstly, let us reconstruct the original Next-Closure algorithm from Theorem 2 and the corresponding definitions. For this let𝑀 be a finite set and let𝑐 be a closure operator on𝑀“ t0, . . . , 𝑛´1u, say. We then apply Theorem 2 to the semilattice𝑃 “ p𝑐rPp𝑀qs,_q. We immediately see thatď𝑃 “ Ďand thată𝑖 is the usual lectic order on𝑃. Then the set

t𝑐pt𝑖uq |𝑖P𝑀u Y t𝑐pHq u

is a finite generating set of𝑃 and we can define 𝑥𝑖 :“𝑐pt𝑖uqand𝑥𝑛 :“𝑐pHq, i.e.𝐼“ t0, . . . , 𝑛u. For a closed set𝐴Ď𝑀 and𝑖P𝐼 then follows

𝐴𝑖“ ł

𝑗ă𝑖 𝑥𝑗Ď𝐴

𝑥𝑖_𝑥𝑖

𝑐p ď

𝑥𝑗ă𝑖𝑗Ď𝐴

𝑥𝑗q _𝑥𝑖

𝑐

t𝑐pt𝑗uq |𝑗ă𝑖, 𝑗P𝐴uq _𝑐pt𝑖uq

𝑐pt𝑗 |𝑗ă𝑖, 𝑗P𝐴uq _𝑐pt𝑖uq

𝑐pt𝑗 |𝑗ă𝑖, 𝑗P𝐴u Y t𝑖uq

which is the original definition of‘for Next-Closure. Furthermore, it is𝐴𝑛𝐴 since𝑐pHq Ď𝐴 for each closed set𝐴. We therefore do not need to consider𝑥𝑛

when looking for the next closed set, and indeed, the only reason why𝑥𝑛𝑐pHq has been included is that it is the smallest closed set in𝑃. All in all, we see that Next-Closure is a special case of Theorem 2.

However, for a closure operator 𝑐on a finite set𝑀 it seems more natural to consider the semilattice𝑃 “ p𝑐rPp𝑀qs,Xq, because the intersection of two closed sets of𝑐 again yields a closed set of𝑐. One sees thatď𝑃 “ Ě. As a generating

(27)

set we take the set ofX-irreducible elementst𝑋𝑖|𝑖P𝐺ufor some index set𝐺.

Let𝐴, 𝐵 P𝑐rPp𝑀qsand letă𝐺 be a linear ordering on𝐺. Then𝐴ă𝐵 if and only if there exists𝑖P𝐺such that

𝑖“mint𝑗 P𝐺| p𝑋𝑖Ě𝐴, 𝑋𝑖Ğ𝐵qorp𝑋𝑖 Ğ𝐴, 𝑋𝑖Ě𝐵q u and 𝑋𝑖Ě𝐵 and‘is just given by

𝐴𝑖“ č

𝑗ă𝐺𝑖 𝑋𝑗Ě𝐴

𝑋𝑗X𝑋𝑖.

Now note that ‘ does not need the closure operator𝑐 anymore. This means that if the computation of 𝑐 is very costly and theX-irreducible elements (or a superset thereof) is known, this approach might be much more efficient. In general, however, it is not known how to efficiently determine theX-irreducible closed sets of𝑐. But if 𝑐 is given as the ¨2 operator of a formal context, these irreducible elements can be determined quickly [8]. We shall describe this idea in more detail.

Let𝐺and 𝑀 be two finite sets and let𝐽 Ď𝐺ˆ𝑀. We then call the triple K :“ p𝐺, 𝑀, 𝐽q a formal context, 𝐺 the objects of the formal context and 𝑀 theattributes of the formal context. For𝑔 P𝐺and𝑚P𝑀 we write𝑔 𝐽 𝑚 for p𝑔, 𝑚q P𝐽 and say that object𝑔 has attribute𝑚.

Let𝐴Ď𝐺and𝐵Ď𝑀. We then define thederivationsof𝐴 and𝐵 to be 𝐴1:“ t𝑚P𝑀 | @𝑔P𝐴:𝑔 𝐽 𝑚u

𝐵1:“ t𝑔P𝐺| @𝑚P𝐵:𝑔 𝐽 𝑚u.

Then the¨2 operator is just the twofold derivation of a given set of attributes. It turns out that this is indeed a closure operator, and that every closure operator can be represented as a¨2 operator of a suitable formal context [4,8]. The closed sets of¨2, i.e. all sets𝐵Ď𝑀 with𝐵𝐵2, are called theintentsofKand shall be denoted by IntpKq. It is clear from the previous remarks that pIntpKq,Xq is a semilattice.

The advantage of representing a closure operator is that the X-irreducible elements of pIntpKq,Xq can be directly read off from the format context. As discussed in [8], the set

t t𝑔u1 |𝑔P𝐺u

contains the irreducible elements we are looking for, except𝑀(note that the order relation onpIntpKq,Xq isĚ.) Furthermore, it is possible to omit certain objects 𝑔 fromKwithout changing IntpKq. Every object𝑔P𝐺can be omitted fromK for which the sett𝑔u1 is either equal to𝑀 or can be represented as a proper intersection of other setst𝑔1u1, . . . ,t𝑔𝑛u1 for some elements𝑔1, . . . , 𝑔𝑛P𝐺. It is also clear that if there exist two distinct objects𝑔1 and𝑔2 witht𝑔1u1“ t𝑔2u1, that we can remove one of them without changing IntpKq. A formal context for which no such objects exist is called object clarified andobject reduced. If K“ p𝐺, 𝑀, 𝐽qis an object clarified and object reduced formal context, then the

(28)

Listing 1.1.Compute the Next Intent of a Formal Context

0 define next-intent(K“ p𝐺, 𝑀, 𝐽q,𝐴)

1 for 𝑔P𝐺, descending

2 if t𝑔u1Ğ𝐴 then

3 let (𝐵 := 𝐴𝑔)

4 if @P𝐺, ℎă𝐺𝑔,tu1Ğ𝐴:tu1Ğ𝐵 then

5 return 𝐵

6 end if

7 end let

8 end if

9 end for

10 return nil

11 end

sett t𝑔u1|𝑔P𝐺uis exactly the set ofX-irreducible intents ofK, except for the set𝑀.

The algorithm described above now takes the following form when applied to the semilatticepIntpKq,Xq. As index set we choose the set𝐺of object of the given formal context, ordered byă𝐺. For every object𝑔P𝐺we set𝑥𝑔:“ t𝑔u1. Then the sett𝑥𝑔|𝑔P𝐺uis a generating set of the semilatticepIntpKqzt𝑀u,Xq, which we want to enumerate (since we get the set𝑀 for free). For𝐴being an intent ofKand𝑔P𝐺we have

𝐴𝑔:“ č

tu1Ě𝐴 ă𝐺𝑔

tu1X t𝑔u1

and as the first intent we take 𝑀. For an intent𝐴Ď𝑀 of Kwe then have to find the maximal object𝑔P𝐺(with respect toă𝐺) such that𝐴ă𝑔𝐴𝑔. This is equivalent to𝑔 being maximal witht𝑔u1 Ğ𝐴and@P𝐺, ℎă𝐺 𝑔 :tu1Ě 𝐴 ðñ tu1Ě𝐴𝑔. However, the direction “ùñ” is clear, hence we only have to ensure

@P𝐺, ℎă𝐺𝑔:tu1Ğ𝐴 ùñ tu1Ğ𝐴𝑔.

All these considerations yield the algorithm shown in Listing 1.1. Of course, the derivations of the formt𝑔u1 should not be computed every time they are needed but rather stored somewhere for reuse.

Let us simplify Listing 1.1 a bit further. If 𝐴is an intent ofK, then for𝑔P𝐺 it is true that

t𝑔u1Ğ𝐴 ðñ 𝑔R𝐴1. This is because

t𝑔u1Ě𝐴 ùñ t𝑔u2Ď𝐴1 ùñ 𝑔P𝐴1

(29)

Listing 1.2.Simplified version of Listing 1.1

0 define next-intent(K“ p𝐺, 𝑀, 𝐽q,𝐴)

1 for 𝑔P𝐺, descending

2 if 𝑔R𝐴1 then

3 let (𝐵 := 𝐴𝑔)

4 if 𝐵1X𝐺𝑔Ď𝐴1X𝐺𝑔 then

5 return 𝐵

6 end if

7 end let

8 end if

9 end for

10 return nil

11 end

and

𝑔P𝐴1 ùñ t𝑔u Ď𝐴1 ùñ t𝑔u1Ě𝐴2𝐴,

and thereforet𝑔u1 Ě𝐴 ðñ 𝑔P𝐴1, i. e.t𝑔u1Ğ𝐴 ðñ 𝑔R𝐴1. Using this, we can simplify the condition

@P𝐺, ℎă𝐺𝑔,tu1Ğ𝐴:tu1 Ğ𝐵 to

@P𝐺, ℎă𝐺𝑔:P𝐵1 ùñ P𝐴1

or equivalently to𝐵1X𝐺𝑔Ď𝐴1X𝐺𝑔, where𝐺𝑔:“ tP𝐺|ă𝐺 𝑔u. This leads to the algorithm of Listing 1.2.

Curiously enough, this algorithm is now very similar to Close-by-One. To make this similarity more apparent, let us give a brief description of the algorithm Close-by-One. In contrast to Next-Closure, which enumerates the intents of the formal contextK, Close-by-One enumerates theformal concepts ofK. These are pairsp𝐶, 𝐷qof sets𝐶Ď𝐺, 𝐷Ď𝑀 such that𝐶1𝐷 and𝐷1𝐶. The set of all formal concepts ofKis denoted byBpKq. The formal conceptsBpKqofKcan be ordered by

p𝐶1, 𝐷1q ď p𝐶2, 𝐷2q ðñ 𝐶1Ď𝐶2p ðñ 𝐷2Ď𝐷1q.

It turns out that the setpBpKq,ďq forms a(complete) lattice, i. e. an ordered set such that for each set of formal concepts there exists a smallest upper and a largest lower bound. This lattice is also called theconcept latticeofK.

Close-by-One now performs a depth-first search in this lattice to compute all formal concepts ofK. Following the description of [10], the main part of the work is done by the function generate-from, as it is described in Listing 1.3.

To simplify the description of this function, we again assume that the set 𝑀 of

(30)

Listing 1.3.Close-by-One [10]

0 define generate-from(K“ p𝐺, 𝑀, 𝐽q,p𝐶, 𝐷q,ℓ)

1 output p𝐶, 𝐷q

2

3 if 𝐷𝑀 or ą |𝑀| then

4 return

5 end if

6

7 for 𝑚P tℓ, . . . , 𝑛u, ascending

8 if 𝑚R𝐷 then

9 let (𝐸 := 𝐶X t𝑚u1,

10 𝐹 := 𝐸1)

11 if 𝐹X𝑀𝑚Ď𝐷X𝑀𝑚 then

12 generate-from(p𝐸, 𝐹q,𝑚`1)

13 end if

14 end let

15 end if

16 end for

17 end

18

19 define all-concepts(K“ p𝐺, 𝑀, 𝐽q)

20 generate-from(K,pH1,H2q,1)

21 end

attributes ofKis just the set𝑀 “ t1, . . . , 𝑛u. Furthermore, if𝑚P𝑀, we define 𝑀𝑚:“ t1, . . . , 𝑚´1u.

We can now spot some similarities between the functions next-intentfrom Listing 1.2 and generate-from. The most striking similarity to note is the occurrence of the same tests in both functions: “𝐵1X𝐺𝑔Ď𝐴1X𝐺𝑔” in line 4 of Listing 1.2, and “𝐹X𝑀𝑚Ď𝐷X𝑀𝑚” in line 11 of Listing 1.3. If we substitute the definitions of the involved variables, these tests get the following form:

next-intent: p𝐴X t𝑔u1q1X𝐺𝑔Ď𝐴1X𝐺𝑔

generate-from:p𝐶X t𝑚u1q1X𝑀𝑚Ď𝐶1X𝑀𝑚

So except that we consider sets of objects in the functionnext-intentand sets of attributes in the functiongenerate-from, both test conditions are the same.

Still, the functions next-intent andgenerate-from are very different in how they compute the next intent and formal concept, respectively. While next-intent computes for a given intent just a new one,generate-from per- forms a depth-first search and enumerateall formal concepts ofK.

5 Conclusion

We have seen a natural generalization of the Next-Closure algorithm to enumerate elements of a semilattice from a generating set. We have proven the algorithm to

(31)

be correct and applied it to the standard task of computing the intents of a given formal context, yielding a another algorithm to accomplish this. This algorithm turned out to have a lot of similarity to Close-by-One.

There are still some interesting ideas one might want to look at.

Firstly, a variation of the original Next-Closure algorithm is able to compute the canonical base of a formal context, a very compact representation of its impli- cational knowledge. It would be interesting to know whether the generalization given in this paper gives more insight into the computation, and therefore into the nature of the canonical base. This is, however, quite a vague idea.

Secondly, the algorithm discussed above to compute the intents of a formal context enumerates them in a certain order, which might or might not be a lectic one. Understanding this order relation might be fruitful, especially with respect to the complexity results obtained recently which consider enumerating pseudo-intentsof a formal context in lectic order [5].

Thirdly, there exists a variant of the Next-Closure algorithm that is able to compute intents of a formal contextup to symmetry[8, Theorem 51]. Given a set 𝛤 ofautomorphismsof a formal context, this variant is able to compute for each orbit of intents under 𝛤 exactly one representative. It would be interesting to know whether we can find a variant of our generalized Next-Closure algorithm that accomplishes the same thing.

Finally, and more technically, it might be interesting to look for other ap- plications of our general algorithm. As already mentioned in the introduction, the enumeration of fuzzy concepts of a fuzzy formal context might be worth investigating (and it might be interesting comparing it to [2]).

Acknowledgments

The author is grateful for the useful comments of the anonymous reviewers, especially for pointing out the similarity of Listing 1.1 to Close-by-One, which the author had overlooked.

References

1. Simon Andrews. In-Close, a fast algorithm for computing formal concepts. In Sebas- tian Rudolph, Frithjof Dau, and Sergei O. Kuznetsov, editors,ICCS Supplementary Proceedings, Moscow, 2009.

2. Radim Belohlávek, Bernard De Baets, Jan Outrata, and Vilém Vychodil. Computing the Lattice of All Fixpoints of a Fuzzy Closure Operator. IEEE T. Fuzzy Systems, 18(3):546–557, 2010.

3. Radim Belohlávek and Vilém Vychodil. Attribute Implications in a Fuzzy Setting.

In Rokia Missaoui and Jürg Schmid, editors,ICFCA, volume 3874 ofLecture Notes in Computer Science, pages 45–60. Springer, 2006.

4. Daniel Borchmann. Decomposing Finite Closure Operators by Attribute Explo- ration. InICFCA 2011, Supplementary Proceedings, 2011.

(32)

5. Felix Distel. Hardness of Enumerating Pseudo-intents in the Lectic Order. In Léonard Kwuida and Baris Sertkaya, editors,ICFCA, volume 5986 ofLecture Notes in Computer Science, pages 124–137. Springer, 2010.

6. Bernhard Ganter. Two basic algorithms in concept analysis. FB4-Preprint Nr. 831, 1984.

7. Bernhard Ganter and Klaus Reuter. Finding all closed sets: A general approach.

Order, 8(3):283–290, 1991.

8. Bernhard Ganter and Rudolph Wille. Formal Concept Analysis: Mathematical Foundations. Springer, Berlin-Heidelberg, 1999.

9. Sergei O. Kuznetsov. A fast algorithm for computing all intersections of objects in a finite semi-lattice. Automatic Documentation and Mathematical Linguistics, 27:11–21, 1993.

10. Jan Outrata and Vilém Vychodil. Fast algorithm for computing fixpoints of galois connections induced by object-attribute relational data. Inf. Sci., 185(1):114–127, 2012.

11. Vilém Vychodil, Petr Krajča, and Jan Outrata. Advances in algorithms based on CbO. In Marzena Kryszkiewicz and Sergei Obiedkov, editors,Concept Lattices and Their Application, pages 325–337, 2010.

(33)

Galois sub-hierarchies

Anne Berry1, Marianne Huchard2, Amedeo Napoli3, and Alain Sigayret1

1 LIMOS - CNRS UMR 6158 - Universit´e Clermont-Ferrand II (France)??

{berry, sigayret}@isima.fr

2 LIRMM - CNRS UMR 5506 - Universit´e de Montpellier II - Montpellier (France) huchard@lirmm.fr

3 LORIA - CNRS UMR7503 - Vandoeuvre-l`es-Nancy (France) amedeo.napoli@loria.fr

Abstract. Given a relation R ⊆ O × A on a set O of objects and a set A of attributes, the Galois sub-hierarchy (also called AOC-poset) is the partial order on the introducers of objects and attributes in the corresponding concept lattice. We present a new efficient algorithm for building a Galois sub-hierarchy which runs inO(min{nm, nα}), where n is the number of objects or attributes,m is the size of the relation, andnαis the time required to perform matrix multiplication (currently α= 2.376).

1 Introduction

Galois lattices (also called concept lattices) are a powerful tool for data modeling.

Such a lattice is built on a relation between a set of objects and a set of attributes.

The main drawback of this structure is that it may have an exponential size in the numbern of objects or attributes. A canonical sub-order of the lattice, its Galois sub-hierarchy (GSH, also called AOC-Poset), of much smaller size, is recommended whenever possible. This GSH preserves only the key elements of the lattice: object-concepts and attribute-concepts (also called introducers); the number of these key elements is at most equal to the total numbernof objects and attributes.

Galois sub-hierarchies were introduced in software engineering by Godin et al.

[10] for class hierarchy reconstruction and successfully applied in later research work (see e.g. [15]). The AOC-poset (Attribute/Object Concepts poset [9]) has been used in applications of FCA to non-monotonic reasoning and domain theory [12], and to produce classifications from linguistic data [18, 20]. Specific parts of the GSH (mainly attribute-concepts) have been used in several works, including approaches for refactoring a class hierarchy [14] and recently for extracting a feature tree from a set of products in Software Product Lines [21].

?? Research partially supported by the French Agency for Research under the DEFIS program TODO, ANR-09-EMER-010.

c 2012 by the paper authors. CLA 2012, pp. 21–32. Copying permitted only for private and academic purposes. Volume published and copyrighted by its editors.

Local Proceedings in ISBN 978–84–695–5252–0,

Universidad de M´alaga (Dept. Matem´atica Aplicada), Spain.

(34)

Three algorithms for building GSH already exist:Ares[7],Ceres[14], and Pluton [1]. Each of them has a time complexity ofO(n3), and they are some- what complicated. Their comparative experimental running times were investi- gated in [1].

In this paper, we present a new algorithm for building Galois sub-hierarchies, which we callHermes, with a better complexity.Hermesruns inO(nm) time, where m is the size of the relation, and is very easy to understand and imple- ment. With more effort invested in the implementation, Hermes can be made to run inO(nα) (i.e.O(n2.376)) time, which is the time for performing matrix mul- tiplication. Hermes works by simplifying and then extending the input relation into a relation which contains in a compact fashion all the necessary information on the elements of the GSH.

The paper is organized as follows: after this introduction, we give some no- tations and definitions. Section 3 briefly outlines how previous algorithms work.

Section 4 proves some preliminary results and presents the algorithmic tools nec- essary to ensure our good complexity. Section 5 describes and analyzes in detail the successive steps of our algorithmic process. Section 6 gives the algorithm.

Section 7 describes the special case for chordal bipartite relations, where the final relation can easily be obtained inO(n2) time. We conclude in Section 8.

2 Definitions and notations

The different communities handling Galois lattices and Galois sub-hierarchies use various notations. Here, we will use algebraic notations detailed below.

Given two finite setsO(of ’objects’) andA(of ’attributes’), a binaryrelation R ⊆ O × Aindicates which objects of O are associated with which attributes ofA.Ois called thestarting setof the relation. We will denoten=|O|+|A|

andm=|R|. For (x, y)∈ R, we will say thatxis an antecedentofy, andy is animageofx. Forx∈ O,R(x) ={y∈ A |(x, y)∈ R}is theimage set(row) of x, and for y ∈ A, R−1(y) = {x ∈ O |(x, y) ∈ R} is the antecedent set (column) of y. Note that notation x0 is used in FCA [9] forR(x) andR1(x).

The termlinewill be indifferently used for row and column. The triple (O,A,R) is called acontext.

A maximal rectangle of R, also called a concept, is a maximal Cartesian sub-product of R, i.e. X ×Y such that ∀x ∈ X, ∀y ∈ Y, (x, y) ∈ R and

∀w ∈ O −X, ∃y ∈ Y | (w, y) 6∈ R and ∀z ∈ A −Y, ∃x ∈ X | (x, z) 6∈ R. X is called the extent and Y theintent of conceptX×Y, which is denoted (X, Y). In our examples, we may omit set brackets when the meaning is clear.

The extent and intent of conceptCwill be denotedExtent(C)andIntent(C).

The concepts, ordered by inclusion on their extents (or dually by inclusion on their intents) form a latticeL(R) called aGalois latticeor aconcept lattice.

For two concepts C andC0,C <L(R)C0 will denote Extent(C)⊂Extent(C0). A lattice is represented by itsHasse diagram, where reflexivity and transitivity edges are omitted.

(35)

Anobject-conceptis a conceptCxwhichintroducessome objectx:xis in the extent ofCx but is not in the extent of any smaller concept C0 <L(R) Cx. Dually, anattribute-conceptis a conceptCy whichintroducessome attribute y:yis in the intent ofCybut is not in the intent of any greater conceptC0 >L(R)

Cy. Thus, the intent of object-conceptCx isR(x), and the extent of attribute- concept Cy is R1(y). Object-concepts and attribute-concepts are also called introducer concepts or simply introducers. Objects are introduced from bottom to top and attributes from top to bottom inL(R). A given concept may introduce several objects and/or attributes. Note that [9] uses arrow relations to characterize the relationship between attribute-concepts and object-concepts, but without referring to Galois sub-hierarchies.

A relation is said to beclarifiedwhen it has no identical lines. A relation is said to bereducedwhen it is clarified and has no line which is the intersection of several other lines. When a relation is reduced, the irreducible elements of the lattice are exactly the introducers, whereas in a non-reduced relation there will be extra introducers.

H(R) denotes theGalois sub-hierarchy (GSH) of relation R, defined by the set of introducer concepts ordered as in L(R). H(R) is then a sub-order of L(R). The elements of H(R) are generally labeled by the objects and/or attributes they introduce, defining thesimplified labeling. The same simplified labeling applies to L(R), in which some concepts may have an empty label.

<H(R) will be used to compare two elements of H(R), as <L(R) is used for L(R).

A linear extensionof a partially ordered setP is a total order in whichP is included.

Running example. Figure 1 shows the Galois lattice L(R) (as drawn by Context Explorer [24]) and the Galois sub-hierarchyH(R) of relationR. In L(R), concept (1, acdeg) introduces 1 (simplified la- bel: 1), concept (1346, c) introduces c(simplified la- bel: c), and concept (3, abcdf g) introduces 3 and b (simplified label: 3, b). All these concepts are inH(R);

concept (13, acdg) introduces nothing (simplified la- bel empty) and as such is not inH(R).

R a b c d e f g 1 × × × × ×

2 × × × ×

3 × × × × × ×

4 × ×

5 ×

6 × ×

7 × × ×

8 × × × ×

3 Previous algorithms

We present a brief description of the existing algorithms for building Galois sub- hierarchies; all run in O(n3) time, where n stands for the number of objects and attributes in the input relation. The reader is referred to the corresponding publications for detailed descriptions and to [1] for a comparative experimental study of those algorithms.

Pruned lattice. [10]

Pruned lattice is the name given to a Galois sub-hierarchy by [10] which is, to our best knowledge, the first paper defining this structure. [10] considers a specific

Références

Documents relatifs

problem in the framework of Aubin viability theory as expounded in [11], enabling us to determine immunotherapy feedback protocol (control) laws by using the technical aid of

Next, by using a property that holds the contingent derivative in checking local uniqueness, we prove a new result, characterizing local observability in terms of sequences..

Informally, a function from tuples to real numbers is computable if we can compute f (x) for each computable tuple x.. For each computable tuple, we only know

In this section, we will give some properties of these Green functions that we will need later. The proof of the following lemma is based on elementary potential theory on the

Concept lattices of RDF graphs In [10], in addition to the RDF graph, a formal context corresponding to the background knowledge is considered. This context has a set of resources

To achieve the characterization of order dependencies with FCA, we propose to represent the partial order Π X = (T, ≺ X ) associated to each subset of at- tribute X ⊆ U as a

Simi- larity dependencies (SDs) generalize functional dependencies through the use of a tolerance relation instead of an equivalence relation between values of tuples for a given set

quite simple, and has been used by Lindig [11] to (sequentially) compute the concept lattice of a formal context: to compute the canonical base, we compute the lattice of all