SlideShare a Scribd company logo
Nominal Schemas for Integrating Rules and
                Description Logics

Markus Krötzsch1   Frederick Maier2               Adila Krisnadhi2   Pascal Hitzler2
                                 1 University   of Oxford
                   2 Kno.e.sis   Center – Wright State University


             The 24th Description Logic Workshop – Barcelona, 2011
Nominal Schema as An Extension of Standard DLs



• Sufficient expressivity for standard DLs to incorporate (Datalog)
  rule-based modeling.
• Seamless integration with standard DLs.
     • Syntax is not hybrid, i.e., completely DL-based.
     • Easy to incorporate in current OWL standard.

• Semantics is not complicated.
• Decidable.
     • A large tractable fragment is identified.




               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   2
What is Nominal Schema?


• Nominal-like DL syntax.
     • {v} where v is a variable.

• Semantically behaves like DL-safe variable (without hybrid combination
  with rule syntax)
     • Treated as a “macro” representing named individuals in the knowledge
       base.

• Results in the paper:
     • N2ExpTime-completeness of SROIQV = SROIQ + nominal schema,
       i.e., no harder than SROIQ. (V is to indicate nominal schema extension).
     • Tractable fragment of DLs SROELV n (n ≥ 0).
     • Expressing DL-safe datalog with nominal schema




               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   3
Example

• Consider the (hybrid) knowledge base K :

       hasParent(x, y) ∧ hasParent(x, z) ∧ married(y, z) → C (x)
       hasParent(mary, john)
       (∃hasParent.∃married.{john})(mary)




              Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   4
Example

• Consider the (hybrid) knowledge base K :

        hasParent(x, y) ∧ hasParent(x, z) ∧ married(y, z) → C (x)
        hasParent(mary, john)
        (∃hasParent.∃married.{john})(mary)

• FOL semantics of SWRL: K |= C (mary)
     • Undecidable in general




               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   4
Example

• Consider the (hybrid) knowledge base K :

        hasParent(x, y) ∧ hasParent(x, z) ∧ married(y, z) → C (x)
        hasParent(mary, john)
        (∃hasParent.∃married.{john})(mary)

• FOL semantics of SWRL: K |= C (mary)
     • Undecidable in general

• DL-safe rules semantics: K |= C (mary),
     • John’s spouse is not named by any constant.
     • K |= C (mary) if z is DL-safe while x and y can be arbitrary values




               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   4
Example

• Consider the (hybrid) knowledge base K :

        hasParent(x, y) ∧ hasParent(x, z) ∧ married(y, z) → C (x)
        hasParent(mary, john)
        (∃hasParent.∃married.{john})(mary)

• FOL semantics of SWRL: K |= C (mary)
     • Undecidable in general

• DL-safe rules semantics: K |= C (mary),
     • John’s spouse is not named by any constant.
     • K |= C (mary) if z is DL-safe while x and y can be arbitrary values

• With nominal schemas, the rule can be expressed as:
  ∃hasParent.{z} ∃hasParent.∃married.{z} C

               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   4
SROIQV = SROIQ + Nominal Schema (Syntax)




• Signature of SROIQV: NI , NC , Nr , NV .

• Concept expression:

          C ::=      | ⊥ | NC | {NI } | {NV } | ¬C | C                        C|C           C|
                  ∃R.C | ∀R.C | ∃S.Self |                   k S.C |         k S.C

  k ∈ N, R (S) is a (simple) SROIQ role, incl. the universal role U .

• Knowledge base axioms are as usual as in SROIQ with regular RBoxes




              Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   5
SROIQV = SROIQ + Nominal Schema (Semantics)


• Standard semantics for concept and roles with variables interpreted as
  placeholder of named individuals:
     • embed a restricted form of variable assignment to the interpretation;
     • equivalent to replacing nominal schemas with finitely many nominals they
       can represent and applying the standard SROIQ semantics to the result.

• ground(α): the set of all axioms obtained by uniformly replacing nominal
  schemas in α with nominals in NI
  ground(KB) := α∈KB ground(α)

• I |= α iff I |= ground(α) and I |= KB iff I |= ground(KB).

• Satisfaction and entailment are defined as usual.

• Grounding does not affect restrictions on simplicity and regularity.


               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   6
Complexity of reasoning in SROIQV

• Grounding provides direct (and naive) approach for reasoning in
  SROIQV:
     • yields exponentially larger SROIQ KB after grounding;
     • (not tight) complexity upper bound is exponentially larger than that of
       SROIQ, i.e., N3ExpTime.

• N2ExpTime-hardness follows from SROIQ.
• Retaining N2ExpTime upper bound by extending the N2ExpTime
  upper bound proof for SROIQ from [Kazakov, KR08]: exponential
  reduction to satisfiability of theories of C 2 (two-variable fragment of FOL
  with counting quantifiers) that is in NExpTime
     • transform axioms (except complex RIAs) into normal form
     • eliminate RIAs using automata construction
     • express remaining axioms as C 2 theories


               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   7
N2ExpTime upper bound


• Given a SROIQV KB, depth of ground(KB) = depth of KB.

• ground(KB) is in SROIQ, hence the exponential reduction applies.

• The resulting C 2 theories T is equisatisfiable to ground(KB) that is
  equisatisfiable with KB

• The size of T is bounded by a function that is linear in the size of
  ground(KB) and exponential in the depth of KB.

• The size of ground(KB) is exponential in the size of KB.

• Thus, the size of T is bounded exponentially in the size and depth of KB

• Satisfiability of T is in NExpTime, hence satisfiability of KB is in
  N2ExpTime


               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   8
A tractable fragment: consideration


• Consider adding nominal schemas to the tractable SROEL
• Normalization destroys complex dependencies between nominal schemas.
     • Exponential blow up due to grounding nominal schemas is unavoidable.

• Limiting the occurrences of all nominal schemas (with global constant
  from the language) trivially yields to tractability.
• Non-trivial tractability result: only limit (globally) the occurrences of
  problematic nominal schemas
     • no limit on occurrences of safe nominal schemas.
     • inspired from tree-shapedness notion from the rule language ELP
       [Krötzsch,et.al., ISWC08]




               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   9
Safe Environment of Nominal Schema

        x, y, z ∈ NV
        ∃reviews.({x}             ∃hasAuthor.{y}                 ∃atVenue.{z})
           ∃submits.(∃hasAuthor.{y}                          ∃atVenue.{z})
           ∃hasConflictingAssignedPaper.{x}

                                                      v


                                          x                       u


                                                      y



                                                      z
            Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   10
Safe Environment of Nominal Schema

        p ∈ NI     y, z ∈ NV
        ∃reviews.({p}            ∃hasAuthor.{y}                 ∃atVenue.{z})
           ∃submits.(∃hasAuthor.{y}                         ∃atVenue.{z})
          ∃hasConflictingAssignedPaper.{p}

                                                      v


                         p                p                       u


                                                      y



                                                      z
           Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   10
Safe Environment of Nominal Schema

     p ∈ NI      y, z ∈ NV
     ∃reviews.({p}              ∃hasAuthor.{y}                {p}        ∃atVenue.{z})
        ∃submits.(∃hasAuthor.{y}                          ∃atVenue.{z})
        ∃hasConflictingAssignedPaper.{p}

                                                         v


                            p                p                       u


                                                         y



                                                         z
              Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   10
Safe Environment
• An occurrence of a nominal schema {x} in a concept C is safe if
     • C has a sub-concept of the form {a} ∃R.D for some a ∈ NI
     • D contains the occurrence of {x} but no other occurrence of any nominal
       schema.

• {a}   ∃R.D is a safe environment S(a, x) for this occurrence of {x}.
• A nominal schema {x} is safe for a SROIQV TBox axiom C                                            D if
     • {x} does not occur in D, and
     • at most one occurrence of {x} in C is not safe.




              Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   11
Safe Environment
• An occurrence of a nominal schema {x} in a concept C is safe if
     • C has a sub-concept of the form {a} ∃R.D for some a ∈ NI
     • D contains the occurrence of {x} but no other occurrence of any nominal
       schema.

• {a}   ∃R.D is a safe environment S(a, x) for this occurrence of {x}.
• A nominal schema {x} is safe for a SROIQV TBox axiom C                                            D if
     • {x} does not occur in D, and
     • at most one occurrence of {x} in C is not safe.
• The DL SROELV n :
     • concept/roles: SROIQV concepts/roles using only , ⊥, , ∃, Self, U ,
       {a}, nominal schemas
     • no , ¬, ∀, number restrictions, inverse roles
     • TBox axioms: SROIQV TBox axioms with SROELV n concept/roles,
       and at most n nominal schemas are not safe for each axiom.
     • KB axioms: uses only SROELV n axioms

              Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   11
Transformation Example (1)
• Assume KB has only p, a, b as named individuals. Consider an axiom α:
          ∃reviews.(({p}           ∃hasAuthor.{y})               ({p}       ∃atVenue.{z}))
              ∃submits.(∃hasAuthor.{y} ∃atVenue.{z})
              ∃hasConflictingAssignedPaper.{p}




              Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   12
Transformation Example (1)
• Assume KB has only p, a, b as named individuals. Consider an axiom α:
           ∃reviews.(({p}           ∃hasAuthor.{y})               ({p}       ∃atVenue.{z}))
               ∃submits.(∃hasAuthor.{y}                     ∃atVenue.{z})
               ∃hasConflictingAssignedPaper.{p}

• For each nominal schema {x} safe for α with safe environments Si (ai , x),
  i = 1, . . . , , introduce a fresh concept name Ox,α
     • Oy,α , Oz,α




               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   12
Transformation Example (1)
• Assume KB has only p, a, b as named individuals. Consider an axiom α:
           ∃reviews.(({p}           ∃hasAuthor.{y})               ({p}       ∃atVenue.{z}))
               ∃submits.(∃hasAuthor.{y} ∃atVenue.{z})
               ∃hasConflictingAssignedPaper.{p}

• For each nominal schema {x} safe for α with safe environments Si (ai , x),
  i = 1, . . . , , introduce a fresh concept name Ox,α
• For each individual c in KB, add polynomially many ground axioms (                                for
  empty conjunction):
                                  ∃U .Si (ai , c)       ∃U .({c}        Ox,α )
                            i=1




               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   12
Transformation Example (1)
• Assume KB has only p, a, b as named individuals. Consider an axiom α:
           ∃reviews.(({p}           ∃hasAuthor.{y})               ({p}       ∃atVenue.{z}))
               ∃submits.(∃hasAuthor.{y} ∃atVenue.{z})
               ∃hasConflictingAssignedPaper.{p}

• For each nominal schema {x} safe for α with safe environments Si (ai , x),
  i = 1, . . . , , introduce a fresh concept name Ox,α
• For each individual c in KB, add polynomially many ground axioms (                                for
  empty conjunction):
                                  ∃U .Si (ai , c)       ∃U .({c}        Ox,α )
                            i=1

                    ∃U .({p}      ∃hasAuthor.{p})          ∃U .({p}      Oy,α )
                    ∃U .({p}      ∃hasAuthor.{a})          ∃U .({a}       Oy,α )
                    ∃U .({p}      ∃hasAuthor.{b})          ∃U .({b}      Oy,α )
                       ∃U .({p}      ∃atVenue.{p})         ∃U .({p}      Oz,α )
                       ∃U .({p}      ∃atVenue.{a})         ∃U .({a}       Oz,α )
                       ∃U .({p}      ∃atVenue.{b})         ∃U .({b}      Oz,α )

               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   12
Transformation Example (2)



        ∃reviews.(({p}         ∃hasAuthor.{y})               ({p}       ∃atVenue.{z}))
           ∃submits.(∃hasAuthor.{y}                    ∃atVenue.{z})
            ∃hasConflictingAssignedPaper.{p}



• Let C be the LHS of α. For each nominal schema {x} safe for α:
     • replace all safe occurrences S(a, x) in C by {a}




              Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   13
Transformation Example (2)



       ∃reviews.{p}
           ∃submits.(∃hasAuthor.Oy,α                    ∃atVenue.Oz,α )
           ∃hasConflictingAssignedPaper.{p}



• Let C be the LHS of α. For each nominal schema {x} safe for α:
     • replace all safe occurrences S(a, x) in C by {a}
     • replace the non-safe occurrence (if any) of {x} in C by Ox,α




              Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   13
Transformation Example (2)


       ∃reviews.{p}
          ∃submits.(∃hasAuthor.Oy,α                     ∃atVenue.Oz,α )
           ∃U .Oy,α      ∃U .Oz,α
           ∃hasConflictingAssignedPaper.{p}



• Let C be the LHS of α. For each nominal schema {x} safe for α:
     • replace all safe occurrences S(a, x) in C by {a}
     • replace the non-safe occurrence (if any) of {x} in C by Ox,α
     • add a new conjunct ∃U .Ox,α to C .




              Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   13
Transformation Example (2)


        ∃reviews.{p}
           ∃submits.(∃hasAuthor.Oy,α                     ∃atVenue.Oz,α )
            ∃U .Oy,α      ∃U .Oz,α
            ∃hasConflictingAssignedPaper.{p}



• Let C be the LHS of α. For each nominal schema {x} safe for α:
     • replace all safe occurrences S(a, x) in C by {a}
     • replace the non-safe occurrence (if any) of {x} in C by Ox,α
     • add a new conjunct ∃U .Ox,α to C .

• After the above steps, C has only nominal schemas (if any) that are not safe for
  α. We thus ground α.


               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   13
Tractability Result



• Given a SROELV n knowledge base KB, the size of KB after unfolding
  is exponential in n and polynomial in the size of KB before unfolding.

• KB before transformation is equisatisfiable with KB after transformation.

• A knowledge base is unsatisfiable iff it entails {a}                           ⊥ for arbitrary
  a ∈ NI .

• KB after transformation is in SROEL(×).

• Instance retrieval for SROEL(×) is polynomial [Krötzsch, IJCAI11].

• If n is constant, satisfiability of KB is P-complete.




              Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   14
Expressing DL-safe Rules with Nominal Schemas


• dl(C (t)) := ∃U .({t}            C)

• dl(R(s, t)) := ∃U .({s}             ∃R.{t})

• dl(p(t1 , . . . , tk )) := ∃U .(∃p1 .{t1 }           ···     ∃pk .{tk })

• dl(B → H ) :=          F∈B    dl(F )        dl(H )

• For a set of DL-safe rules RB, dl(RB) :=                          B→H ∈RB        dl(B → H ).

• RB is semantically equivalent dl(RB)

• If RB is a set of n-variable rules with n constant, then satisfiability of
  RB is P-complete.



                 Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   15
Summary



• Conclusion:
    • Nominal schemas provides sufficient expressivity to incorporate rule-based
      modeling.
         • DL-safe datalog with arbitrary arity is covered.
    • SROIQV is no harder than SROIQ
    • Tractable reasoning is possible with SROELV n .


• Outlook:
    • Concrete serialization formats (currently proposed).
    • Deferred grounding for inference algorithms (ongoing work).




                Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   16
Thank you!
Recall: N2ExpTime upper bound proof from SROIQ



1   SROIQ axioms can be transformed in linear time into normal form
    where R(i) , S1 , S2 ∈ Nr , S1 , S2 simple:

          A    ∀R.B                      Ai            Bj                                S1       S2
          A      n S.B                    A ≡ {a}                                       R1        R−
          A      n S.B                    A ≡ ∃S.Self                   R1 ◦ · · · ◦ Rn           R

2   For each non-simple role R, construct an NFA AR that accepts all role
    chains (viewed as strings) that imply R
      • The number of states of AR is bounded exponentially in the depth of KB:
        maximum cardinality of any strict linear order of role names that witnesses
        regularity of KB.



               Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   18
Recall: N2ExpTime upper bound proof from SROIQ (cont.)

3   Drop complex RIAs and replace each A                         ∀R.B with axioms (with NFA
    AR = (QR , NR , ∆R , q0R , FR )):
                                                                                          S
       {A    Xq0R } ∪ {Xq            B | q ∈ FR } ∪ {Xq                 ∀S.Xq | q → q ∈ ∆R }

    For each axiom A          ∀R.B:
      • The number of new axioms is linearly bounded by |QR | + |∆R |
      • |∆R | is linearly bounded by |QR | and |Nr |
      • |QR | is exponentially bounded by the depth of KB

    The overall size of KB after adding new axioms is now bounded by a
    function that is linear in the size of original KB and exponential in the
    depth of original KB

4   Rewrite KB into C 2 (not increase the size of KB)



                Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011   19

More Related Content

What's hot

Collision Detection In 3D Environments
Collision Detection In 3D EnvironmentsCollision Detection In 3D Environments
Collision Detection In 3D Environments
Ung-Su Lee
 
CPSC 125 Ch 1 sec 4
CPSC 125 Ch 1 sec 4CPSC 125 Ch 1 sec 4
CPSC 125 Ch 1 sec 4
David Wood
 
Probabilistic information retrieval models & systems
Probabilistic information retrieval models & systemsProbabilistic information retrieval models & systems
Probabilistic information retrieval models & systems
Selman Bozkır
 

What's hot (20)

Collision Detection In 3D Environments
Collision Detection In 3D EnvironmentsCollision Detection In 3D Environments
Collision Detection In 3D Environments
 
On Nets and Meshes
On Nets and MeshesOn Nets and Meshes
On Nets and Meshes
 
ICME 2013
ICME 2013ICME 2013
ICME 2013
 
Probabilistic Retrieval TFIDF
Probabilistic Retrieval TFIDFProbabilistic Retrieval TFIDF
Probabilistic Retrieval TFIDF
 
(α ψ)- Construction with q- function for coupled fixed point
(α   ψ)-  Construction with q- function for coupled fixed point(α   ψ)-  Construction with q- function for coupled fixed point
(α ψ)- Construction with q- function for coupled fixed point
 
CPSC 125 Ch 1 sec 4
CPSC 125 Ch 1 sec 4CPSC 125 Ch 1 sec 4
CPSC 125 Ch 1 sec 4
 
Stability criterion of periodic oscillations in a (15)
Stability criterion of periodic oscillations in a (15)Stability criterion of periodic oscillations in a (15)
Stability criterion of periodic oscillations in a (15)
 
Metric Embeddings and Expanders
Metric Embeddings and ExpandersMetric Embeddings and Expanders
Metric Embeddings and Expanders
 
Sara el hassad
Sara el hassadSara el hassad
Sara el hassad
 
ABC: How Bayesian can it be?
ABC: How Bayesian can it be?ABC: How Bayesian can it be?
ABC: How Bayesian can it be?
 
Probabilistic information retrieval models & systems
Probabilistic information retrieval models & systemsProbabilistic information retrieval models & systems
Probabilistic information retrieval models & systems
 
1404.1503
1404.15031404.1503
1404.1503
 
Error Estimates for Multi-Penalty Regularization under General Source Condition
Error Estimates for Multi-Penalty Regularization under General Source ConditionError Estimates for Multi-Penalty Regularization under General Source Condition
Error Estimates for Multi-Penalty Regularization under General Source Condition
 
Md2521102111
Md2521102111Md2521102111
Md2521102111
 
High-Performance Approach to String Similarity using Most Frequent K Characters
High-Performance Approach to String Similarity using Most Frequent K CharactersHigh-Performance Approach to String Similarity using Most Frequent K Characters
High-Performance Approach to String Similarity using Most Frequent K Characters
 
Understanding distributed calculi in Haskell
Understanding distributed calculi in HaskellUnderstanding distributed calculi in Haskell
Understanding distributed calculi in Haskell
 
Information in the Weights
Information in the WeightsInformation in the Weights
Information in the Weights
 
Processing Reachability Queries with Realistic Constraints on Massive Network...
Processing Reachability Queries with Realistic Constraints on Massive Network...Processing Reachability Queries with Realistic Constraints on Massive Network...
Processing Reachability Queries with Realistic Constraints on Massive Network...
 
Information in the Weights
Information in the WeightsInformation in the Weights
Information in the Weights
 
Locality-sensitive hashing for search in metric space
Locality-sensitive hashing for search in metric space Locality-sensitive hashing for search in metric space
Locality-sensitive hashing for search in metric space
 

Similar to Nominal Schema DL 2011

Description logics
Description logicsDescription logics
Description logics
R A Akerkar
 
ECO_TEXT_CLUSTERING
ECO_TEXT_CLUSTERINGECO_TEXT_CLUSTERING
ECO_TEXT_CLUSTERING
George Simov
 

Similar to Nominal Schema DL 2011 (20)

LDA on social bookmarking systems
LDA on social bookmarking systemsLDA on social bookmarking systems
LDA on social bookmarking systems
 
Сергей Кольцов —НИУ ВШЭ —ICBDA 2015
Сергей Кольцов —НИУ ВШЭ —ICBDA 2015Сергей Кольцов —НИУ ВШЭ —ICBDA 2015
Сергей Кольцов —НИУ ВШЭ —ICBDA 2015
 
Probabilistic Retrieval Models - Sean Golliher Lecture 8 MSU CSCI 494
Probabilistic Retrieval Models - Sean Golliher Lecture 8 MSU CSCI 494Probabilistic Retrieval Models - Sean Golliher Lecture 8 MSU CSCI 494
Probabilistic Retrieval Models - Sean Golliher Lecture 8 MSU CSCI 494
 
leanCoR: lean Connection-based DL Reasoner
leanCoR: lean Connection-based DL ReasonerleanCoR: lean Connection-based DL Reasoner
leanCoR: lean Connection-based DL Reasoner
 
Metody logiczne w analizie danych
Metody logiczne w analizie danych Metody logiczne w analizie danych
Metody logiczne w analizie danych
 
Pl vol1
Pl vol1Pl vol1
Pl vol1
 
Canini09a
Canini09aCanini09a
Canini09a
 
Description logics
Description logicsDescription logics
Description logics
 
Pl vol1
Pl vol1Pl vol1
Pl vol1
 
Closed-Form Solutions in Low-Rank Subspace Recovery Models and Their Implicat...
Closed-Form Solutions in Low-Rank Subspace Recovery Models and Their Implicat...Closed-Form Solutions in Low-Rank Subspace Recovery Models and Their Implicat...
Closed-Form Solutions in Low-Rank Subspace Recovery Models and Their Implicat...
 
Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)
 
block-mdp-masters-defense.pdf
block-mdp-masters-defense.pdfblock-mdp-masters-defense.pdf
block-mdp-masters-defense.pdf
 
ECO_TEXT_CLUSTERING
ECO_TEXT_CLUSTERINGECO_TEXT_CLUSTERING
ECO_TEXT_CLUSTERING
 
Latent Dirichlet Allocation
Latent Dirichlet AllocationLatent Dirichlet Allocation
Latent Dirichlet Allocation
 
Semantic Parsing with Combinatory Categorial Grammar (CCG)
Semantic Parsing with Combinatory Categorial Grammar (CCG)Semantic Parsing with Combinatory Categorial Grammar (CCG)
Semantic Parsing with Combinatory Categorial Grammar (CCG)
 
Hak ontoforum
Hak ontoforumHak ontoforum
Hak ontoforum
 
PAGOdA poster
PAGOdA posterPAGOdA poster
PAGOdA poster
 
Threshold network models
Threshold network modelsThreshold network models
Threshold network models
 
1606751772-ds-lecture-6.ppt
1606751772-ds-lecture-6.ppt1606751772-ds-lecture-6.ppt
1606751772-ds-lecture-6.ppt
 
Discreate structure presentation introduction
Discreate structure presentation introductionDiscreate structure presentation introduction
Discreate structure presentation introduction
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Nominal Schema DL 2011

  • 1. Nominal Schemas for Integrating Rules and Description Logics Markus Krötzsch1 Frederick Maier2 Adila Krisnadhi2 Pascal Hitzler2 1 University of Oxford 2 Kno.e.sis Center – Wright State University The 24th Description Logic Workshop – Barcelona, 2011
  • 2. Nominal Schema as An Extension of Standard DLs • Sufficient expressivity for standard DLs to incorporate (Datalog) rule-based modeling. • Seamless integration with standard DLs. • Syntax is not hybrid, i.e., completely DL-based. • Easy to incorporate in current OWL standard. • Semantics is not complicated. • Decidable. • A large tractable fragment is identified. Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 2
  • 3. What is Nominal Schema? • Nominal-like DL syntax. • {v} where v is a variable. • Semantically behaves like DL-safe variable (without hybrid combination with rule syntax) • Treated as a “macro” representing named individuals in the knowledge base. • Results in the paper: • N2ExpTime-completeness of SROIQV = SROIQ + nominal schema, i.e., no harder than SROIQ. (V is to indicate nominal schema extension). • Tractable fragment of DLs SROELV n (n ≥ 0). • Expressing DL-safe datalog with nominal schema Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 3
  • 4. Example • Consider the (hybrid) knowledge base K : hasParent(x, y) ∧ hasParent(x, z) ∧ married(y, z) → C (x) hasParent(mary, john) (∃hasParent.∃married.{john})(mary) Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 4
  • 5. Example • Consider the (hybrid) knowledge base K : hasParent(x, y) ∧ hasParent(x, z) ∧ married(y, z) → C (x) hasParent(mary, john) (∃hasParent.∃married.{john})(mary) • FOL semantics of SWRL: K |= C (mary) • Undecidable in general Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 4
  • 6. Example • Consider the (hybrid) knowledge base K : hasParent(x, y) ∧ hasParent(x, z) ∧ married(y, z) → C (x) hasParent(mary, john) (∃hasParent.∃married.{john})(mary) • FOL semantics of SWRL: K |= C (mary) • Undecidable in general • DL-safe rules semantics: K |= C (mary), • John’s spouse is not named by any constant. • K |= C (mary) if z is DL-safe while x and y can be arbitrary values Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 4
  • 7. Example • Consider the (hybrid) knowledge base K : hasParent(x, y) ∧ hasParent(x, z) ∧ married(y, z) → C (x) hasParent(mary, john) (∃hasParent.∃married.{john})(mary) • FOL semantics of SWRL: K |= C (mary) • Undecidable in general • DL-safe rules semantics: K |= C (mary), • John’s spouse is not named by any constant. • K |= C (mary) if z is DL-safe while x and y can be arbitrary values • With nominal schemas, the rule can be expressed as: ∃hasParent.{z} ∃hasParent.∃married.{z} C Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 4
  • 8. SROIQV = SROIQ + Nominal Schema (Syntax) • Signature of SROIQV: NI , NC , Nr , NV . • Concept expression: C ::= | ⊥ | NC | {NI } | {NV } | ¬C | C C|C C| ∃R.C | ∀R.C | ∃S.Self | k S.C | k S.C k ∈ N, R (S) is a (simple) SROIQ role, incl. the universal role U . • Knowledge base axioms are as usual as in SROIQ with regular RBoxes Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 5
  • 9. SROIQV = SROIQ + Nominal Schema (Semantics) • Standard semantics for concept and roles with variables interpreted as placeholder of named individuals: • embed a restricted form of variable assignment to the interpretation; • equivalent to replacing nominal schemas with finitely many nominals they can represent and applying the standard SROIQ semantics to the result. • ground(α): the set of all axioms obtained by uniformly replacing nominal schemas in α with nominals in NI ground(KB) := α∈KB ground(α) • I |= α iff I |= ground(α) and I |= KB iff I |= ground(KB). • Satisfaction and entailment are defined as usual. • Grounding does not affect restrictions on simplicity and regularity. Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 6
  • 10. Complexity of reasoning in SROIQV • Grounding provides direct (and naive) approach for reasoning in SROIQV: • yields exponentially larger SROIQ KB after grounding; • (not tight) complexity upper bound is exponentially larger than that of SROIQ, i.e., N3ExpTime. • N2ExpTime-hardness follows from SROIQ. • Retaining N2ExpTime upper bound by extending the N2ExpTime upper bound proof for SROIQ from [Kazakov, KR08]: exponential reduction to satisfiability of theories of C 2 (two-variable fragment of FOL with counting quantifiers) that is in NExpTime • transform axioms (except complex RIAs) into normal form • eliminate RIAs using automata construction • express remaining axioms as C 2 theories Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 7
  • 11. N2ExpTime upper bound • Given a SROIQV KB, depth of ground(KB) = depth of KB. • ground(KB) is in SROIQ, hence the exponential reduction applies. • The resulting C 2 theories T is equisatisfiable to ground(KB) that is equisatisfiable with KB • The size of T is bounded by a function that is linear in the size of ground(KB) and exponential in the depth of KB. • The size of ground(KB) is exponential in the size of KB. • Thus, the size of T is bounded exponentially in the size and depth of KB • Satisfiability of T is in NExpTime, hence satisfiability of KB is in N2ExpTime Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 8
  • 12. A tractable fragment: consideration • Consider adding nominal schemas to the tractable SROEL • Normalization destroys complex dependencies between nominal schemas. • Exponential blow up due to grounding nominal schemas is unavoidable. • Limiting the occurrences of all nominal schemas (with global constant from the language) trivially yields to tractability. • Non-trivial tractability result: only limit (globally) the occurrences of problematic nominal schemas • no limit on occurrences of safe nominal schemas. • inspired from tree-shapedness notion from the rule language ELP [Krötzsch,et.al., ISWC08] Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 9
  • 13. Safe Environment of Nominal Schema x, y, z ∈ NV ∃reviews.({x} ∃hasAuthor.{y} ∃atVenue.{z}) ∃submits.(∃hasAuthor.{y} ∃atVenue.{z}) ∃hasConflictingAssignedPaper.{x} v x u y z Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 10
  • 14. Safe Environment of Nominal Schema p ∈ NI y, z ∈ NV ∃reviews.({p} ∃hasAuthor.{y} ∃atVenue.{z}) ∃submits.(∃hasAuthor.{y} ∃atVenue.{z}) ∃hasConflictingAssignedPaper.{p} v p p u y z Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 10
  • 15. Safe Environment of Nominal Schema p ∈ NI y, z ∈ NV ∃reviews.({p} ∃hasAuthor.{y} {p} ∃atVenue.{z}) ∃submits.(∃hasAuthor.{y} ∃atVenue.{z}) ∃hasConflictingAssignedPaper.{p} v p p u y z Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 10
  • 16. Safe Environment • An occurrence of a nominal schema {x} in a concept C is safe if • C has a sub-concept of the form {a} ∃R.D for some a ∈ NI • D contains the occurrence of {x} but no other occurrence of any nominal schema. • {a} ∃R.D is a safe environment S(a, x) for this occurrence of {x}. • A nominal schema {x} is safe for a SROIQV TBox axiom C D if • {x} does not occur in D, and • at most one occurrence of {x} in C is not safe. Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 11
  • 17. Safe Environment • An occurrence of a nominal schema {x} in a concept C is safe if • C has a sub-concept of the form {a} ∃R.D for some a ∈ NI • D contains the occurrence of {x} but no other occurrence of any nominal schema. • {a} ∃R.D is a safe environment S(a, x) for this occurrence of {x}. • A nominal schema {x} is safe for a SROIQV TBox axiom C D if • {x} does not occur in D, and • at most one occurrence of {x} in C is not safe. • The DL SROELV n : • concept/roles: SROIQV concepts/roles using only , ⊥, , ∃, Self, U , {a}, nominal schemas • no , ¬, ∀, number restrictions, inverse roles • TBox axioms: SROIQV TBox axioms with SROELV n concept/roles, and at most n nominal schemas are not safe for each axiom. • KB axioms: uses only SROELV n axioms Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 11
  • 18. Transformation Example (1) • Assume KB has only p, a, b as named individuals. Consider an axiom α: ∃reviews.(({p} ∃hasAuthor.{y}) ({p} ∃atVenue.{z})) ∃submits.(∃hasAuthor.{y} ∃atVenue.{z}) ∃hasConflictingAssignedPaper.{p} Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 12
  • 19. Transformation Example (1) • Assume KB has only p, a, b as named individuals. Consider an axiom α: ∃reviews.(({p} ∃hasAuthor.{y}) ({p} ∃atVenue.{z})) ∃submits.(∃hasAuthor.{y} ∃atVenue.{z}) ∃hasConflictingAssignedPaper.{p} • For each nominal schema {x} safe for α with safe environments Si (ai , x), i = 1, . . . , , introduce a fresh concept name Ox,α • Oy,α , Oz,α Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 12
  • 20. Transformation Example (1) • Assume KB has only p, a, b as named individuals. Consider an axiom α: ∃reviews.(({p} ∃hasAuthor.{y}) ({p} ∃atVenue.{z})) ∃submits.(∃hasAuthor.{y} ∃atVenue.{z}) ∃hasConflictingAssignedPaper.{p} • For each nominal schema {x} safe for α with safe environments Si (ai , x), i = 1, . . . , , introduce a fresh concept name Ox,α • For each individual c in KB, add polynomially many ground axioms ( for empty conjunction): ∃U .Si (ai , c) ∃U .({c} Ox,α ) i=1 Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 12
  • 21. Transformation Example (1) • Assume KB has only p, a, b as named individuals. Consider an axiom α: ∃reviews.(({p} ∃hasAuthor.{y}) ({p} ∃atVenue.{z})) ∃submits.(∃hasAuthor.{y} ∃atVenue.{z}) ∃hasConflictingAssignedPaper.{p} • For each nominal schema {x} safe for α with safe environments Si (ai , x), i = 1, . . . , , introduce a fresh concept name Ox,α • For each individual c in KB, add polynomially many ground axioms ( for empty conjunction): ∃U .Si (ai , c) ∃U .({c} Ox,α ) i=1 ∃U .({p} ∃hasAuthor.{p}) ∃U .({p} Oy,α ) ∃U .({p} ∃hasAuthor.{a}) ∃U .({a} Oy,α ) ∃U .({p} ∃hasAuthor.{b}) ∃U .({b} Oy,α ) ∃U .({p} ∃atVenue.{p}) ∃U .({p} Oz,α ) ∃U .({p} ∃atVenue.{a}) ∃U .({a} Oz,α ) ∃U .({p} ∃atVenue.{b}) ∃U .({b} Oz,α ) Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 12
  • 22. Transformation Example (2) ∃reviews.(({p} ∃hasAuthor.{y}) ({p} ∃atVenue.{z})) ∃submits.(∃hasAuthor.{y} ∃atVenue.{z}) ∃hasConflictingAssignedPaper.{p} • Let C be the LHS of α. For each nominal schema {x} safe for α: • replace all safe occurrences S(a, x) in C by {a} Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 13
  • 23. Transformation Example (2) ∃reviews.{p} ∃submits.(∃hasAuthor.Oy,α ∃atVenue.Oz,α ) ∃hasConflictingAssignedPaper.{p} • Let C be the LHS of α. For each nominal schema {x} safe for α: • replace all safe occurrences S(a, x) in C by {a} • replace the non-safe occurrence (if any) of {x} in C by Ox,α Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 13
  • 24. Transformation Example (2) ∃reviews.{p} ∃submits.(∃hasAuthor.Oy,α ∃atVenue.Oz,α ) ∃U .Oy,α ∃U .Oz,α ∃hasConflictingAssignedPaper.{p} • Let C be the LHS of α. For each nominal schema {x} safe for α: • replace all safe occurrences S(a, x) in C by {a} • replace the non-safe occurrence (if any) of {x} in C by Ox,α • add a new conjunct ∃U .Ox,α to C . Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 13
  • 25. Transformation Example (2) ∃reviews.{p} ∃submits.(∃hasAuthor.Oy,α ∃atVenue.Oz,α ) ∃U .Oy,α ∃U .Oz,α ∃hasConflictingAssignedPaper.{p} • Let C be the LHS of α. For each nominal schema {x} safe for α: • replace all safe occurrences S(a, x) in C by {a} • replace the non-safe occurrence (if any) of {x} in C by Ox,α • add a new conjunct ∃U .Ox,α to C . • After the above steps, C has only nominal schemas (if any) that are not safe for α. We thus ground α. Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 13
  • 26. Tractability Result • Given a SROELV n knowledge base KB, the size of KB after unfolding is exponential in n and polynomial in the size of KB before unfolding. • KB before transformation is equisatisfiable with KB after transformation. • A knowledge base is unsatisfiable iff it entails {a} ⊥ for arbitrary a ∈ NI . • KB after transformation is in SROEL(×). • Instance retrieval for SROEL(×) is polynomial [Krötzsch, IJCAI11]. • If n is constant, satisfiability of KB is P-complete. Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 14
  • 27. Expressing DL-safe Rules with Nominal Schemas • dl(C (t)) := ∃U .({t} C) • dl(R(s, t)) := ∃U .({s} ∃R.{t}) • dl(p(t1 , . . . , tk )) := ∃U .(∃p1 .{t1 } ··· ∃pk .{tk }) • dl(B → H ) := F∈B dl(F ) dl(H ) • For a set of DL-safe rules RB, dl(RB) := B→H ∈RB dl(B → H ). • RB is semantically equivalent dl(RB) • If RB is a set of n-variable rules with n constant, then satisfiability of RB is P-complete. Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 15
  • 28. Summary • Conclusion: • Nominal schemas provides sufficient expressivity to incorporate rule-based modeling. • DL-safe datalog with arbitrary arity is covered. • SROIQV is no harder than SROIQ • Tractable reasoning is possible with SROELV n . • Outlook: • Concrete serialization formats (currently proposed). • Deferred grounding for inference algorithms (ongoing work). Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 16
  • 30. Recall: N2ExpTime upper bound proof from SROIQ 1 SROIQ axioms can be transformed in linear time into normal form where R(i) , S1 , S2 ∈ Nr , S1 , S2 simple: A ∀R.B Ai Bj S1 S2 A n S.B A ≡ {a} R1 R− A n S.B A ≡ ∃S.Self R1 ◦ · · · ◦ Rn R 2 For each non-simple role R, construct an NFA AR that accepts all role chains (viewed as strings) that imply R • The number of states of AR is bounded exponentially in the depth of KB: maximum cardinality of any strict linear order of role names that witnesses regularity of KB. Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 18
  • 31. Recall: N2ExpTime upper bound proof from SROIQ (cont.) 3 Drop complex RIAs and replace each A ∀R.B with axioms (with NFA AR = (QR , NR , ∆R , q0R , FR )): S {A Xq0R } ∪ {Xq B | q ∈ FR } ∪ {Xq ∀S.Xq | q → q ∈ ∆R } For each axiom A ∀R.B: • The number of new axioms is linearly bounded by |QR | + |∆R | • |∆R | is linearly bounded by |QR | and |Nr | • |QR | is exponentially bounded by the depth of KB The overall size of KB after adding new axioms is now bounded by a function that is linear in the size of original KB and exponential in the depth of original KB 4 Rewrite KB into C 2 (not increase the size of KB) Krötzsch, Maier, Krisnadhi, and Hitzler. Nominal Schemas for Integrating Rules and DLs — DL2011 19