<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Module-theoretic properties of reachability modules for S RI Q</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Riku Nortje</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Katarina Britz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Thomas Meyer</string-name>
          <email>tmeyerg@csir.co.za</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Center for Arti cial Intelligence Research, University of KwaZulu-Natal and CSIR Meraka Institute</institution>
          ,
          <country country="ZA">South Africa</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In this paper we investigate the module-theoretic properties of ? and &gt;-reachability modules in terms of inseparability relations for the DL SRIQ. We show that, although these modules are not depleting or self-contained, they share the robustness properties of syntactic locality modules and preserve all justi cations for an entailment.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Modularization plays an important part in the design and maintenance of large
scale ontologies. Modules are loosely de ned as subsets of ontologies that cover
some topic of interest, where the topic of interest is de ned by a set of symbols.
Extracting minimal modules is computationally expensive and even undecidable
for expressive DLs [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. Therefore, the use of approximation techniques and
heuristics plays an important role in the e cient design of algorithms. Syntactic
locality [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], because of its excellent model theoretic properties, has become an
ideal heuristic and is widely used in a diverse set of algorithms [
        <xref ref-type="bibr" rid="ref14 ref2 ref5">14, 2, 5</xref>
        ].
      </p>
      <p>
        Suntisrivaraporn [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] showed that, for the DL E L+, ?-locality module
extraction is equivalent to the reachability problem in directed hypergraphs. Nortje
et al. [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ] extended the reachability problem to include &gt;-locality and
introduced bidirectional reachability modules as a subset of ?&gt; -locality modules.
This work was further extended to the DL SROIQ Nortje et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] who showed
that extracting ?&gt; -reachability modules is equivalent to extracting frontier
graphs in hypergraphs. Reachability modules are not only of importance in
hypergraph-based reasoning support for TBoxes [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], but are potentially smaller
than syntactic locality modules.
      </p>
      <p>In this paper we investigate the module-theoretic properties of reachability
modules for the DL SRIQ. We show that these modules are not self-contained
or depleting but they are robust under vocabulary restrictions, vocabulary
extensions, replacement and joins. By showing that reachability modules preserve
all justi cations for entailments, we show that depleting modules are su cient
for preserving all justi cations but not necessary.</p>
      <p>In Section 2 we give a brief introduction to the DL SRIQ and
modularization as de ned by inseparability relations. Section 3 introduces a normal form
for SRIQ TBoxes as well as the rules necessary to transform any such TBox to
normal form. In Section 4 we introduce both ?- and &gt; reachability modules and
investigate all their module theoretic properties in terms of inseperability
relations. All proofs of the work presented appears in the accompanying appendix.
Lastly in Section 5 we conclude this paper with a short summary of the results.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>
        In this section we give a brief introduction to modularization and the DL SRIQ
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] with its syntax and semantics listed in Table 2. NC and NR denote disjoint
sets of atomic concept names and role names. The set NR includes the universal
role whilst NC excludes the &gt; and ? concepts. For a complete de nition of
SRIQ, refer to Horrocks et al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], and for Description Logics refer to [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Constructs
atomic concept
role
inverse role
universal role
role composition
top
bottom
negation
conjunction
disjunction
exist restriction
value restriction
self restriction
atmost restriction
atleast restriction
Axiom
concept inclusion
role inclusion
re exivity
irre exivity
disjointness</p>
      <p>Syntax Semantics</p>
      <p>C CI 2 I ; C 2 NC
R RI I I ; R 2 NR
R R I = f(y; x) j (x; y) 2 RI g; R 2 NR</p>
      <p>U U I = I I
R1 : : : Rn f(x; z) j (x; y1) 2 R1I ^ (y1; y2) 2 R2I ^ : : :</p>
      <p>^(yn; z) 2 RnI; n 2; Ri 2 NRg
&gt; &gt;I = I
? ?I = ;
:C (:C)I = I n CI
C1 u C2 (C1 u C2)I = C1I \ C2I
C1 t C2 (C1 t C2)I = C1I [ C2I
9R:C fx j (9y)[(x; y) 2 RI ^ y 2 CI ]g
8R:C fx j (8y)[(x; y) 2 RI ! y 2 CI ]g
9R:Self fx j (x; x) 2 RI g
6 nR:C fx j #fy j (x; y) 2 RI ^ y 2 CI g 6 ng
&gt; nR:C fx j #fy j (x; y) 2 RI ^ y 2 CI g &gt; ng
Syntax Semantics</p>
      <p>C1 v C2 C1I C2I
R1 : : : Rn v Rn+1 (R1 : : : Rn)I RI ; n 1</p>
      <p>Ref (R) f(x; x) j x 2 I g RI</p>
      <p>Irr(R) f(x; x) j x 2 I g \ RI = ;</p>
      <p>Dis(R; S) SI \ RI = ;</p>
      <p>Table 1. Syntax and semantics of SRIQ</p>
      <p>
        Module extraction is the process of extracting subsets of axioms from TBoxes
that are self contained with respect to some criteria. These sets of axioms, called
modules, may be used for various purposes such as reuse, optimization and error
pinpointing amongst others [
        <xref ref-type="bibr" rid="ref14 ref4">4, 14</xref>
        ].
      </p>
      <p>De nition 1. (Module for the arbitrary DL L) Let L be an arbitrary
description language, O an L ontology, and a statement formulated in L. Then,
O0 O is a module for
if O0 j= .</p>
      <p>in O(a -module in O) whenever: O j=
if and only</p>
      <p>De nition 1 is su ciently general so that any subset of an ontology preserving
a statement of interest is considered a module, the entire ontology is therefore a
module in itself.</p>
      <p>
        Di erent use cases usually result in di erent notions of what the de nition
and characteristics of a module should be. Modules are often de ned via the
notion of conservative extensions. Given some signature (a set of concept and
role names) and a set of axioms, a conservative extension of this set is simply
one that implies all the same consequences over the signature. More formally:
De nition 2. (Conservative extension [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]) Let T and T1 be two TBoxes
such that T1 T , and let be a signature. Then
{ T is a -conservative extension of T1 if, for every
      </p>
      <p>have T j= i T1 j= .
{ T is a conservative extension of T1 if T is a
for = Sig(T1).
with Sig( )</p>
      <p>, we
-conservative extension of T1</p>
      <p>Given that both sets of axioms imply the same consequences for a given
signature we may then use the smaller set whenever we wish to reason over
this signature. A closely related notion to conservative extensions is that of
inseparability.</p>
      <p>
        De nition 3. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] T1 and T2 are -concept name inseparable, written T1 c
T2, if for all - concept names C; D, it holds that T1 j= C v D if and only if
T2 j= C v D.
      </p>
      <p>
        De nition 4. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] T1 and T2 are -subsumption inseparable, written T1 s T2,
if for all terms X; Y that are concepts or roles over , it holds that T1 j= X v Y
if and only if T2 j= X v Y .
      </p>
      <sec id="sec-2-1">
        <title>De nition 5. [13] Let T be a TBox, M a signature. We call M</title>
        <p>{ an S -module of T if M S T .
{ a self-contained S -module of T if M
S
{ a depleting S -module of T if ;
S</p>
        <p>[Sig(M) T .
[Sig(M) T n M.</p>
      </sec>
      <sec id="sec-2-2">
        <title>T , S an inseparability relation and</title>
        <p>
          Modules may therefore be characterized by some inseparability criteria. It
is of interest how modules de ned this way would behave under di erent use
case scenarios. For this purpose, several properties of inseparability relations [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]
have been investigated in the literature, which allows us to compare di erent
de nitions of modules. Given a TBox T and a module M T for a signature
, we are interested in the following inseparability properties:
{ Robustness under vocabulary restrictions implies that when we wish to
restrict the symbols from further we do not need to import a di erent
module and may continue to use M.
{ Robustness under vocabulary extension implies that should we wish to add
new symbols to that do not appear in T we do not need to use a di erent
module but may use M.
{ Robustness under replacement ensures that the result of importing M into a
TBox T1 is a module of the result of importing T into T1. This is also called
module coverage and refers to the fact that importing a module does not
a ect its property of being a module.
{ Robusness under joins implies that if T and T1 are inseparable w.r.t. and
all the terms they share are from , then each of them are inseparable with
their union w.r.t. .
        </p>
        <p>
          More formally:
De nition 6. [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] The inseparability relation S is called
{ robust under vocabulary restrictions if, for all TBoxes T1, T2 and all
signatures , 0 with 0, the following holds: if T1 S 0 T2, then T1 S T2.
{ robust under vocabulary extensions if, for all TBoxes T1, T2 and all signatures
, 0 with 0 \ (Sig(T1) [ Sig(T2)) , the following holds: if T1 S T2,
then T1 S 0 T2.
{ robust under replacement if, for all TBoxes T1, T2 and all signatures and
every TBox T with Sig(T ) \ (Sig(T1) [ Sig(T2)) , the following holds:
if T1 S T2 then T1 [ T S T2 [ T .
{ robust under joins if, for all TBoxes T1, T2 and all signatures with Sig(T )\
        </p>
        <p>Sig(T2) , if T1 S T2 then Ti S T1 [ T2, for i = 1; 2.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Normal Form</title>
      <p>In this section we introduce a normal form for SRIQ TBoxes. We utilize
normalization in order to simplify the de nitions, to ease the understanding of the
work that follows, as well as to simplify the presentation of proofs.
De nition 7. Given Bi 2 (NC [ f&gt;g), Ci 2 (NC [ f?g), D 2 f9R:B;
nR:B; 9R:Self g, with R; S; Ri; Si role names from NR or their inverses and
n &gt; 1, a SRIQ TBox T is in normal form if every axiom 2 T is in one of
the following forms:
1: B1 u : : : u Bn v C1 t : : : t Cm
3: B1 u : : : u Bn v D
5: R1 v R2
7: Dis(R1; R2)
2: D v C1 t : : : t Cm
4: R1 : : : Rn v Rn+1
6: D1 v D2</p>
      <p>
        In order to normalize a SRIQ TBox T we repeatedly apply the normalization
rules from Table 2. Each application of a rule rewrites an axiom into its equivalent
normal form. It is easy to see that the application of every rule ensures that the
normalized TBox is a conservative extension of the original. We note that the
SRIQ axiom Ref (R) is represented by its equivalent &gt; v 9R:Self and Irr(R)
by 9R:Self v ? [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
Theorem 1. Exhaustively applying the rules from Table 2 to any SRIQ TBox
T results in a SRIQ TBox T 0 in normal form. The normalization process can
be completed in linear time in the number of axioms.
      </p>
      <p>Example 1. Let 1 = B v :C, and 2 = :A v B. Then, 1 may be normalized
by application of rule NR2 to 1N = B u C v ? since :C = :C t ?. 2 may be
normalized by application of rule NR1 to 2N = &gt; v B [ A since :A = :A u &gt;.</p>
      <p>For the rest of this paper we assume that all TBoxes are in normal form.</p>
    </sec>
    <sec id="sec-4">
      <title>Reachability Modules</title>
      <p>
        Deciding conservative extensions has been shown to be computationally
expensive or even undecidable for relatively inexpressive DLs. Therefore, an
approximation of these modules, based on syntax, called syntactic locality modules [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
has been introduced. Given a normalized TBox T , the de nition of syntactic
locality can be simpli ed to the following:
De nition 8. (Normalized Syntactic Locality) Let
T a normalized SRIQ TBox. An axiom is ?-local w.r.t.
if 2 Ax( )? ( 2 Ax( )&gt;), as de ned in the grammar:
be a signature and
(&gt;-local w.r.t )
?-Locality
Ax( )? ::= C? v C j w? v R j Dis(S?; S) j Dis(S; S?)
Con?( ) ::= A? j C? u C j C u C? j 9R?:C j 9R:C? j 9R?:Self j
&gt; nR?:C j&gt; nR:C?
&gt;-Locality
Ax( )&gt; ::= C v C&gt; j w v R&gt;
Con&gt;( ) ::= A&gt; j C&gt; t C j C t C&gt; j 9R&gt;:C&gt; j&gt; nR&gt;:C&gt; j
      </p>
      <p>9R&gt;:Self
In the grammar, we have that A?; A&gt; 62 is an atomic concept, R? (resp.
S?) is either an atomic role (resp. a simple atomic role) not in or the inverse
of an atomic role (resp. of a simple atomic role) not in , C is any concept, R
is any role, S is any simple role, and C? 2 Con?( ), C&gt; 2 Con&gt;( ). We also
denote by w? a role chain w = R1 : : : Rn such that for some i with 1 i n,
we have that Ri is (possibly inverse of ) an atomic role not in . A TBox T is
?-local (&gt;-local) w.r.t. if is ?-local (&gt;-local) w.r.t. for all 2 T .</p>
      <p>Algorithm 1 may be used to extract both the minimal ? and &gt;-locality based
modules for a signature S.</p>
      <p>
        A variant of ?-syntactic locality modules called ?-reachability based modules
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] is based on the reachability problem in directed hypergraphs. Hypergraphs
[
        <xref ref-type="bibr" rid="ref15 ref9">9, 15</xref>
        ] are a generalization of graphs and have been studied extensively since the
1970s as a powerful tool for modelling many problems in Discrete Mathematics.
We extend the work done by Nortje et al.[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and de ne reachability for SRIQ
TBoxes. We then continue to show that these modules share all the robustness
properties of locality modules and therefore is well suited to be used in the
ontology reuse scenario.
      </p>
      <p>T
De nition 9. (?-Reachability) Let T be a SRIQ TBox in normal form and</p>
      <p>Sig(T ) a signature. The set of ?-reachable names in T w.r.t. , denoted
by ?, is de ned inductively as follows:
{ For every x 2 ( [ f&gt;g) we have x 2 T ?.
{ For every inclusion axiom ( L v R) 2 T , if Sig( L)
y 2 Sig( R) is also in T &gt;.</p>
      <p>T</p>
      <p>
        ? then every
Algorithm 1 (Module Extraction Algorithm for SRIQ [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ])
Procedure extract module(O; S)
Input: O: ontology; S: signature;
Output: O1: a module for S in O
1 : O1 := ;; O2 := O
2 : while not empty(O2) do
3 : := select axiom(O2)
4 : if local( , S [ Sig(O1)) then
5 : O2 := O2 n f g
6 : else
7 : O1 := O1 [ f g
8 : O2 := O n O1
9 : end if
10 : end while
11 : return O1
rETAevhxaeiecorhymsaebsatixoloiiftofytmhamell ofod:ru=Tmle?Df-Loriresva(TcRh;aoRSbvle)seru2cahxT.itohamarets SisiTgd(?e-nLroe)taecdhabbyTleT?whw?eeneacvaneldlr fisRTc;?aSl-lgreedacthheaTb?l?e-..
      </p>
      <p>It is self-evident from De nition 8 that an axiom is ?-reachable w.r.t
exactly when it is not ?-local w.r.t. . Similarly we de ne an axiom to be
&gt;-reachable exactly when it is not &gt;-local.</p>
      <p>T
De nition 10. (&gt;-Reachability) Let T be a SRIQ TBox in normal form and</p>
      <p>Sig(T ) a signature. The set of &gt;-reachable names in T w.r.t. , denoted
by &gt;, is de ned inductively as follows:
{ For every x 2 ( [ ?) we have that x 2 T &gt;.
{ For all inclusion axioms ( L v R) 2 T , if</p>
      <p>R = ?, or
R is of the form A1 t : : : t An and all Ai 2 T &gt;, or</p>
      <p>R has any other form and there exists some x 2 Sig( R) \
then every y 2 Sig( L) is also in T &gt;.</p>
      <p>T
&gt;
Every axiom := L v R such that, R = ?, or R is of the form A1 t : : : t
aaSArxineigo(aamnlwRsda)iysa\slldeATnTio&gt;t&gt;2e,-dwreebaTycch&gt;aTal,lbole&gt;rTaa&gt;nnRd-drehfaiaRscsh;cSaaabnlgllyeed.oAtthhleleTra&gt;&gt;xfi-o.orremTmahscehaoanfsbdetithlitetohyfeformaerlmoledxuDislTeitss&gt;f(o-sRrroe;maSTce)ho2axvbeTl2er
.</p>
      <p>It is easy to show that ?-reachability modules are equivalent to ?-locality
modules. However, by the de nition of &gt;-reachability we observe that these are
not equivalent to &gt;-locality modules.
Example 2. Let T be a TBox such that T = f 1; 2; 3; 4g, with 1 := A v
9r:D1; 2 := B v nr:D2; 3 := 9r:&gt; v C; 4 := D1 v D2 and let =
fCg. Then T &gt; = f 1; 2; 3g but the &gt;-locality module for T w.r.t. is
f 1; 2; 3; 4g.</p>
      <p>The di erence stems from the fact that in 1 and 2 the &gt;-reachability
of r does not ensure the &gt;-reachability of D1 and D2 respectively. This occurs
because, given an axiom = L v R, &gt;-locality ensure that if is &gt;-local then
so are all of the symbols in Sig( ), whereas &gt;-reachability is de ned such that
the &gt;-reachability of only guarantees that all symbols of L and only some
symbols of R will be &gt;-reachable. Thus &gt;-reachability based modules are at
most the size of &gt;-locality modules but in general could be substantially smaller.
Similar to ?&gt; -locality modules we note that reachability module extraction
may also be alternated until a xpoint is reached. These modules are denoted
by T ?&gt; .</p>
      <p>
        In order to investigate the module-theoretic properties of reachability
modules, we follow a similar approach to Sattler et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and de ne inseparability
di erent from that of conservative extensions. We say that T1 and T2 are
inseparable if their modules are equivalent, that is, a module extraction algorithm
returns the same output for each of them. We de ne the following inseparability
relations for reachability modules:
De nition 11. Let T1 and T2 be TBoxes and
are:
a signature. Then T1 and T2
{
{
{
      </p>
      <p>T2
?&gt;
?&gt; .
&gt; reachability inseparable, denoted by T1 &gt; T2, if T1
? reachability inseparable, denoted by T1 ? T2, if T1
reachability inseparable, denoted by T1 ?&gt;
&gt; = T2
? = T2
T2, if T1
&gt;;
?;
?&gt;
=</p>
      <p>Firstly we show that &gt;-reachability modules are subsumption inseparable.
Concept inseparability follows as a special case of subsumption inseparability.
Lemma 1. Let T be a SRIQ TBox, and Sig(T ) a signature. Then T j=
C v D if and only if T &gt; j= C v D for arbitrary SRIQ concept descriptions
C and D such that Sig(C) [ Sig(D) .</p>
      <p>Corollary 1. Let T be a normalized SRIQ TBox, Sig(T ) a signature and
S an inseparability relation from De nitions 3 and 4. Then T &gt; S T . T &gt;
is therefore a S -module of T .</p>
      <p>We show by way of counter example that T &gt; is not a self-contained or
depleting S module of T when T &gt; 6= Sig(T &gt;).</p>
      <p>Example 3. Let T be a TBox such that T = f 1 = A v 9r:D1; 2 = B v
nr:D2; 3 = 9r:&gt; v C; 4 = D1 v D2g, and let = fCg. Then T &gt; =
f 1; 2; 3g, = [ Sig(T &gt;) = fA; B; C; r; D1; D2g =6 T &gt;. But T j= D1 v
D2 and T &gt; 6j= D1 v D2. Therefore T &gt; is not a self-contained c -module of
T . Similarly, T n T &gt; j= 4 6= ; with = D1; D2 and D1; D2 2 . Therefore,
T &gt; is not a depleting c -module of T .</p>
      <p>Before investigating the robustness properties of reachability modules we
introduce some lemmas to aid us in the proofs that follow.
x. In particular T
x</p>
      <p>.
0 then T
x</p>
      <p>T
x = T1
x.</p>
      <sec id="sec-4-1">
        <title>Lemma 4. Let</title>
        <p>and xb2e fa&gt;n;s?iggn.aTtuhreen, T(1T1a[ndT2T)2 bxe =SRT1IQx TBoxes with Sig(T1) \
Sig(T2) [ T2 x.
Proposition 1. For x 2 f&gt;; ?g, x-reachability is robust under replacement.
Proposition 2. For x 2 f&gt;; ?g, x-reachability is robust under vocabulary
extensions.</p>
        <p>Proposition 3. For x 2 f&gt;; ?g, x-reachability is robust under vocabulary
restrictions.</p>
        <p>Proposition 4. For x 2 f&gt;; ?g, x-reachability is robust under joins.</p>
        <p>
          Reachability modules therefore share all the robustness properties listed.
However, we have seen that these modules are neither depleting nor self-contained
modules. Amongst other things, the depleting and self-contained nature of
modules are utilised in order to nd all MinAs (justi cations) for an entailment [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
De nition 12. Let T be a SRIQ Tbox and M T . M is a MinA (justi
cation) for T j= C v D if M j= C v D and there exists no M1 M such that
M1 j= C v D.
        </p>
        <p>We show that although our modules do not share these properties they do
contain all MinAs for a given signature.</p>
        <p>Theorem 2. Let T be a normalized SRIQ TBox and a signature such that</p>
        <p>Sig(T ). Then for arbitrary concept descriptions C; D, such that T j= C v
D and Sig(C) [ Sig(D) T &gt; we have that T &gt; contains all MinAs for
T j= C v D.</p>
        <p>
          The proof to show that T ?&gt; modules share all the robustness properties
of T &gt; modules follows from the above lemmas and follows the proof for ?&gt;
locality modules by Sattler, et al. [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>We have investigated the module-theoretic properties of reachability modules
for SRIQ TBoxes. Reachability modules di er from syntactic locality
modules in that they are not self-contained or depleting. One application of the
self-contained and depleting nature of locality modules is the nding of all
justications for entailments. However, in terms of nding justi cations, by showing
that reachability modules do preserve all justi cations for entailments, we have
shown that these properties are su cient but that they are not necessary.</p>
      <p>We did preliminary investigations into the size di erence between locality
and reachability modules. We extracted a random sample of 1000 modules from
each of the Pizza, Nci, Nap and Xylocopa v4 ontologies. Reachability modules
were between 2.5% and 33% smaller than locality modules with an average of
22% reduction in size across all ontologies tested.</p>
      <p>Our focus for future research is to do an in-depth empirical evaluation on
di erences with respect to size and performance between extracting reachability
modules for SRIQ and existing syntactic locality methods. We also plan to
extend these results to SROIQ.</p>
      <p>Acknowledgments We wish to thank the reviewers for their contributions and
insightful comments. This work was partially funded by Project number 247601,
Net2: Network for Enabling Networked Knowledge, from the
FP7-PEOPLE2009-IRSES call. This work is based upon research supported in part by the
National Research Foundation of South Africa (UID 85482, IFR2011032700018).</p>
    </sec>
    <sec id="sec-6">
      <title>Proofs for Theorems and Lemmas</title>
      <p>Theorem 1 Exhaustively applying the rules from Table 2 to any SRIQ TBox
T results in a SRIQ TBox T 0 in normal form. The normalization process can
be completed in linear time in the number of axioms.</p>
      <p>Proof: We show that any SRIQ TBox can be converted to an equivalent normal
form as follows:
{ Step 1 - -elimination: Rule NR11 may be applied at most once for each
axiom in the TBox. No other rule introduces new axioms that contain
equivalences. Therefore the elimination of all equivalences from the TBox will
require linear time and add at most a linear number of axioms.
{ Step 2 - 8-elimination: Applying rule NR7 to every occurrence of a universal
restriction in any axiom, irrespective of order, will result in the elimination of
all universal restrictions within that axiom. Nested restrictions are handled
recursively as they are removed and inserted into the added axioms as C^.
There are a constant number of universal restrictions per axiom and therefore
the application of rule NR7 will run in constant time, with each application
adding a constant number of new axioms. Therefore eliminating all universal
restrictions across all axioms will require linear time and add at most a linear
number of new axioms.
{ Step 3 - 6-elimination: Applying rule NR10 to every occurrence of an atmost
restriction in any axiom, irrespective of order, will result in the elimination
of all atmost restrictions within that axiom. Nested restrictions are handled
recursively as needed. There are a constant number of atmost restrictions per
axiom and therefore the application of rule NR10 will run in constant time.
Therefore eliminating all atmost restrictions across all axioms will require
linear time.
{ Step 4 - Complex role- ller elimination: At the start of this step there are
no universal or at most restrictions. We eliminate all complex role llers by
applying rules NR8 and NR9 to all axioms. There are a constant number
of complex role llers per axiom, therefore the application of these rules
requires constant time per axiom and will add at most a constant number
of axioms. Therefore, removing all complex role llers from an ontology by
using rules NR8 and NR9 will require at most linear time and add a linear
number of new axioms.
{ Step 5 - :-elimination and u, t-simpli cation: At this step there are no
existential restriction or at-least restriction with complex role llers. Given
any axiom = ( L v R), in a left to right fashion we apply the rules as
follows:
1. Apply rules NR1, NR3, NR6 to L until L consists of an existential
restriction, an at-least restriction or the conjunction of concept names.
There are a constant number of complex concept description, negations,
disjunctions and conjunctions in L, each of these rules either eliminates
a negation, removes a complex concept description or eliminates a
disjunction. There are a constant number of times each of these operations
may be applied. Rules NR3 and NR6 each add a constant number of
axioms. Therefore, L can be processed in constant time for each axiom.
2. Apply rules NR2, NR4, NR5 to R until R consists of an existential
restriction, an at-least restriction or a disjunction of concept names.
There are a constant number of times each of these operations may be
applied. Rules NR4 and NR5 each add a constant number of axioms.</p>
      <p>Therefore, L can be processed in constant time for each axiom.
These rules are applied repeatedly until no further processing may be
applied to either L and R. Since each step can be completed in constant
time and add at most a constant number of new axioms, normalization can
be completed in linear time in the number of axioms with at most a linear
increase in the number of axioms. 2
Lemma 1 Let T be a SRIQ TBox, and Sig(T ) a signature. Then T j=
C v D if and only if T &gt; j= C v D for arbitrary SRIQ concept descriptions
C and D such that Sig(C) [ Sig(D) .</p>
      <p>Proof: We have to prove two parts. First: If T &gt; j= C v D then T j= C v D.
This follows directly from the fact that T &gt; T and that SRIQ is monotonic.</p>
      <p>Conversely, we show that, if T j= C v D then T &gt; j= C v D. Assume the
contrary, that is, assume T j= C v D but that T &gt; 6j= C v D. Then there
must exist an interpretation I and an individual w 2 I such that I is a model
of T &gt; and w 2 CI n DI . Modify I to I0 by setting xI0 := I for all concept
names x 2 Sig(T ) n T &gt;, and rI0 := I I for all roles names r 2 Sig(T )n
&gt; and leaving everything else unchanged. We show that I0 is a model of
T &gt;. For all := L v R, with 2 T &gt;, we have that:
{ If R is such that Sig( R) T &gt; we have that ( R)I = ( R)I0 since it
does not change the interpretation of any symbols.
{ If R is an existential restriction of the form 9r:A with y 2 Sig( R) n T &gt;,
then (y)I0 = I or (y)I0 = I I depending on whether y is a role or
concept name. In both cases we have that ( R)I ( R)I0 .
{ If R is an at-least restriction of the form nr:A with y 2 Sig( R) n T &gt;,
then (y)I0 = I or (y)I0 = I I depending on whether y is a role or
concept name. In both cases we have that ( R)I ( R)I0 .
{ If R is of the form 9R:Self with R 2 T &gt; we have that ( R)I = ( R)I0
since it does not change the interpretation of the symbol R.
{ If is of the form Dis(R; S) then by de nition it is always in T &gt;, thus
R; S 2 T &gt;. Therefore, the interpretation of alpha does not change.
&gt; and Sig( L) 2
&gt;. Now for every</p>
      <p>&gt; and thus</p>
      <p>T
= ( L v R) 2
T n T
In all cases ( L)I = ( L)I0 since 2 T
( L)I0 ( R)I0 . Thus, I0 is a model for T</p>
      <p>&gt; we have:
{
{</p>
      <p>R is a concept name and RI0 =
R is a role name and RI0 = I</p>
      <p>I , or</p>
      <p>I , or
{ R is a disjunction of the form A1 t : : : t An with at least one Ai 62 T &gt;,
thus AiI0 = I and RI0 = A1I [ : : : [ I [ : : : [ AIn = I , or
{ R is an existential restriction 9r:A1, thus rI0 = I I and A1I0 = I so
that (9r:A1)I0 = I , or
{ R is 9r:Self , thus rI0 = I I so that (9r:Self )I0 = I , or
{ R is an atleast restriction nr:A2, thus rI0 = I I , A2I0 = I and
j I j n so that ( nr:A2)I0 = I . This follows from the fact that for any
concept description nr:A, j I j j(r:A)I j n for it to be satis able.
Since for all cases LI0 RI0 , we conclude that I0 is a model for T . But I and
I0 correspond on all symbols y 2 (Sig(D) [ Sig(C)) T &gt; and therefore
DI0 = DI and CI0 = CI . Now since CI = CI0 and w 2 CI we have that
w 2 CI0 n DI0 and hence T 6j= C v D, contradicting the assumption. 2
and 0 be signatures, x 2 f&gt;; ?g and T a
is naontd 0Tisxnroetacharbealec,htahbelne theisn notis nTotx re0arcehaacbhlaeb.le.</p>
      <p>Lemma 2 Let be an axiom,
SRIQ TBox. Then:
1. Assume that there is some axiom 2 T x such that 62 T 0 x. Therefore,
twheishiasvae ctohnattradiicstinoont by0TLexmrmeaach2a.1blseinbcuet that it0. iTshuTs,xTreaxchabTle.0 xB. uAt
similar argument is used to show that T x T1 x and T1 x T x.
2. For every T we have that 0 \ Sig( ) . Therefore, from Lemma 2.2
we have that whenever T is not reachable it is also not 0 reachable
and we have that T 0 x contains at most all those axioms in T x. Thus,
T 0 x T x.
3. L0etreac=habTle.x,Si n0c=e T 0T1xTa1nadnd S2i(gT(T\)T1)S.Aigs(sTu1m) ewe hisaverebaychthabelienbduutctnivoet
de nition of x reachability that 0. But by Lemma 2.1 we have that
whenever is not 0 reachable then it is also not reachable. Therefore,
T x contains at most all those axioms in T1 x. Thus, T x T1 x.</p>
      <sec id="sec-6-1">
        <title>Lemma 4 Let</title>
        <p>and xbe2afn&gt;s;i?gnga.tTuhree,nT(1Ta1n[dTT22) bxe =SRT1IQx TBoxes with Sig(T1) \
Sig(T2) [ T2 x.
Proof: Let M = (T1 [ T2) x, M1 = T1 x, M2 = T2 x. Now T1 T1 [ T2 thus
by Lemma 3.3 we have that M1 M. Similarly M2 M and thus M1 [M2
M [ M which gives us M1 [ M2 M. Let 0 = [ T1x [ T2x. To show that
M M1 [ M2 we note that, when extracting these modules, the order in which
axioms are extracted are irrelevant. We therefore assume that any algorithm rst
extracts axioms in M1 [M2 then tests all other axioms for 0T1x[T2 -reachability.
Consider any axiom 2 (T1 [ T2) n (M1 [ M2). If 2 T1 then 2 T1 n M1 and
stTai2tsxenm\oetSnitgTt(o1x)d[erive,re(taackhe[anbtlehT.2axNt[owixsTpn1rxeo)cto\nSdT1iitxgio([n)Sirge(aTc2h[)a\blTeS1xiwg.e(TTm1h)aunsipbyulaLitmeemptlmhieiass
2.2 we have that is not [ T2 [ T1x reachable. The case where 2 T2 is
treated analogously. 2
Proposition 1 For x 2 f&gt;; ?g, x-reachability is robust under replacement.
Proof: Let Sig(T ) \ (Sig(T1) [ Sig(T2))
Sig(Ti) , for i = 1; 2. Now we have:
. This implies that Sig(T ) \
(T [ T1) x == TT2 xx[ T1 xx ((LPermecmonad4it)ion)</p>
        <p>= (T2 [ T[ )T x (Lemma 4) 2
Proposition 2 For x 2 f&gt;; ?g, x-reachability is robust under vocabulary
extensions.</p>
        <p>Proof: Let 0 \ (Sig(T1) [ Sig(T2))
00 = \ 0 (which implies 00
and T1
and 00
x T2 i.e., T1 x = T2 x. Let
0). Then we have that:
T1 0x = T1 0x0( )
= (T1 x) 0x0 (Lemma 3.1)
= (T2 x) 0x0 (Precondition)
= T2 0x0 (Lemma 3.1)
= T2 0x( )
As for equality ( ), set inclusion is due to 0 \ Sig(T1) = 00 and the
combination of Lemma 3.2 and Lemma 3.3, and the converse is due to 00 0 and
Lemma 3.1. Equality ( ) is justi ed analogously. 2
Proposition 3 For x 2 f&gt;; ?g, x-reachability is robust under vocabulary
restrictions.</p>
        <p>Proof: Follows from the fact that we have robustness under vocabulary
extensions. 2
Proposition 4 For x 2 f&gt;; ?g, x-reachability is robust under joins.
Proof: For i = 1; 2, let Mi = Ti x with Sig(T1) \ Sig(T2) , and let
M = (T1 [ T2) x. The precondition says that M1 = M2 . It is clear from
Lemma 3.3 that M Mi. It su ces to show M M1. Take any axiom
cas2e (T12[TT12)nnMM1,1.thItenremaisinnsotto shMowx1 rtehaacthablies nsiontce M[ 1 M=x1Tr1eaxch.aIbnlec.aIsne
2 T2 n M1, we also have that 2 T2 n M2 because M1 = M2. This means
that is not [ Mx2 reachable therefore not [ Mx1 reachable. 2
Theorem 2 Let T be a normalized SRIQ TBox and a signature such that</p>
        <p>Sig(T ). For arbitrary concept descriptions C; D such that T j= C v D and
Sig(C) [ Sig(D) T &gt; we have that T &gt; contains all MinAs for T j= C v D.
Proof: Assume that T j= C v D for some Sig(C) [ Sig(D) T &gt;, but there
is a MinA M for T j= C v D that is not contained in T &gt;. If C v D is a
tautology then M must be empty with M T &gt;. Thus, we assume that C v D
is not a tautology. Since M 6 T &gt;, there must be an axiom 2 M n T &gt;.
De ne M1 := M \ T &gt;. M1 is a strict subset of M since 62 M1. There are
two cases, either M1 = ; or it contains at least one axiom.</p>
        <p>In the case where M1 = ;, de ne T1 = T n T &gt; with M T1. Now since
M j= C v D we have by monotinocity that T1 j= C v D. Since T1 T we have
by Lemma 3.3 that T1 &gt; T &gt; and thus that T1 &gt; = ;. But by Lemma 1
we have that T1 &gt; j= C v D if, and only if, T1 j= C v D. Since C v D is not a
tautology we have that T1 &gt; 6j= C v D and thus that M 6j= C v D.</p>
        <p>In the case where M1 6= ; we claim that M1 j= C v D, which contradicts
the fact that M is a MinA for T j= C v D.</p>
        <p>We use proof by contraposition to show this. Assume that M1 6j= C v D, i.e.,
there is a model I1 of M1 such that CI1 6 DI1 . We modify I1 to I by setting
yI := I1 for all concept names y 2 Sig(T ) n T &gt;, and rI := I1 I1 for all
rCoIles=nCamI1essinrc2eSSiigg((CT)) n TT &gt;&gt;.. IWt efohllaovwes DthIat=CDI I61 DsinIc.eItSriegm( Dai)ns to bTe&gt;sh,oawnnd
that I is indeed a model of M, and therefore satis es all axioms = ( L v R)
i(n )MI=,in(cl)uId1i.nOg th.eIrfwise=tDheirse(Rarre; Rtw2)o tphoesnsibbyilidtieesn:ition Sig( ) T &gt; so that
{
{</p>
        <p>Therefore I is a model for M. But since CI 6
proving the contrapositive.</p>
        <p>DI we have that M 6j= C v D</p>
        <p>2</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F</given-names>
          </string-name>
          . (eds.):
          <article-title>The description logic handbook: theory, implementation, and applications</article-title>
          . Cambridge University Press, New York, NY, USA (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Cuenca</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Halaschek-Wiener</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Kazakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Suntisrivaraporn</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          :
          <article-title>Incremental Classi cation of Description Logic Ontologies</article-title>
          .
          <source>Tech. rep. (</source>
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Cuenca</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Kazakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <surname>U.</surname>
          </string-name>
          :
          <article-title>Just the right amount: extracting modules from ontologies</article-title>
          . In: Williamson,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Zurko</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of the 16th International Conference on World Wide Web (WWW '07)</source>
          . pp.
          <volume>717</volume>
          {
          <fpage>726</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Cuenca</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Kazakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <surname>U.</surname>
          </string-name>
          :
          <article-title>Modular Reuse of Ontologies: Theory and Practice</article-title>
          .
          <source>Journal of Arti cial Intelligence Research (JAIR) 31</source>
          ,
          <fpage>273</fpage>
          {
          <fpage>318</fpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Del</given-names>
            <surname>Vescovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Parsia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            ,
            <surname>Schneider</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          :
          <article-title>The modular structure of an ontology: atomic decomposition and module count</article-title>
          . In: O.
          <string-name>
            <surname>Kutz</surname>
          </string-name>
          , T.S. (ed.)
          <source>Proc. of WoMO-11. Frontiers in AI and Appl.</source>
          , vol.
          <volume>230</volume>
          , pp.
          <volume>25</volume>
          {
          <fpage>39</fpage>
          . IOS Press (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Horridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Laconic and precise justi cations in owl</article-title>
          .
          <source>In: In Proc. of ISWC-08</source>
          , volume
          <volume>5318</volume>
          <source>of LNCS</source>
          . pp.
          <volume>323</volume>
          {
          <issue>338</issue>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>The irresistible SRIQ</article-title>
          .
          <source>In: In Proc. of OWL: Experiences and Directions</source>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Konev</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walther</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Modular ontologies</article-title>
          .
          <source>chap. Formal Properties of Modularisation</source>
          , pp.
          <volume>25</volume>
          {
          <fpage>66</fpage>
          . Springer-Verlag, Berlin, Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Nguyen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pretolani</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markenzon</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>On some path problems on oriented hypergraphs</article-title>
          .
          <source>Theoretical Informatics and Applications</source>
          <volume>32</volume>
          (
          <issue>1-2</issue>
          -3),
          <volume>1</volume>
          {
          <fpage>20</fpage>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Nortje</surname>
          </string-name>
          , R.:
          <article-title>Module extraction for inexpressive description logics</article-title>
          .
          <source>Master's thesis</source>
          , University of South Africa (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Nortje</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , Meyer, T.:
          <article-title>Bidirectional reachability-based modules</article-title>
          .
          <source>In: Proceedings of the 2011 International Workshop on Description Logics (DL2011)</source>
          .
          <source>CEUR Workshop Proceedings</source>
          , CEUR-WS (
          <year>2011</year>
          ), http://ceur-ws.org
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Nortje</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , Meyer, T.:
          <article-title>A normal form for hypergraph-based module extraction for SROIQ</article-title>
          . In: Gerber,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Taylor</surname>
          </string-name>
          , K., Meyer, T.,
          <string-name>
            <surname>Orgun</surname>
          </string-name>
          , M. (eds.) Australasian Ontology Workshop 2009 (AOW
          <year>2009</year>
          ).
          <article-title>Ceur-ws</article-title>
          , vol.
          <volume>969</volume>
          , pp.
          <volume>40</volume>
          {
          <fpage>51</fpage>
          . CEUR, Melbourne, Australia (
          <year>2012</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>969</volume>
          /proceedings.pdf
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schneider</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zakharyaschev</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Which kind of module should I extract</article-title>
          ? In: Grau,
          <string-name>
            <given-names>B.C.</given-names>
            ,
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Motik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <surname>U</surname>
          </string-name>
          . (eds.)
          <article-title>Description Logics</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>477</volume>
          .
          <string-name>
            <surname>CEUR-WS.org</surname>
          </string-name>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Suntisrivaraporn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Polynomial-Time Reasoning Support for Design and Maintenance of Large-Scale Biomedical Ontologies</article-title>
          .
          <source>Ph.D. thesis</source>
          , Technical University of Dresden (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Thakur</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tripathi</surname>
          </string-name>
          , R.:
          <article-title>Complexity of Linear Connectivity Problems in Directed Hypergraphs</article-title>
          . Linear Connectivity Conference pp.
          <volume>1</volume>
          {
          <issue>12</issue>
          (
          <year>2001</year>
          )
          <article-title>2 M1. Since M1 T &gt;, all symbols in Sig( L) are also in T &gt; and possibly some symbols of Sig( R) may not</article-title>
          be in T &gt;.
          <article-title>Consequently, I1 and I coincide on the names occurring in L and since I1 is a model of M1, we have that ( L)I = ( L)I1</article-title>
          and
          <string-name>
            <surname>( R)I1 ( R)I . Therefore ( L)I ( R)I</surname>
          </string-name>
          .
          <fpage>62</fpage>
          <lpage>M1</lpage>
          .
          <article-title>Since 2 M, we have that 62 T &gt;</article-title>
          , and hence is not T &gt;
          <article-title>- reachable.</article-title>
          <string-name>
            <surname>Thus</surname>
          </string-name>
          ,
          <article-title>R is a concept name and RI0 = I , or R is a role name and RI0 = I I , or R is a disjunction of the form A1 t : : : t An with at least one Ai 62 T &gt;, thus AiI0 = I and RI0 = A1I [ : : : [ I [ : : : [ AIn = I , or R is an existential restriction 9r:A1, thus rI0 = I I and A1I0 = I so that (9r:A1)I0 = I , or R is 9r:Self , thus rI0 = I I so that (9r:Self )I0 = I , or R is an atleast restriction nr:A2, thus rI0 = I I , A2I0 = I and j I j n so that ( nr:A2)I0 = I . This follows from the fact that for any concept description nr:A, j I j j(r:A)I j n for it to be satis able</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>By de nition of</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>( R)I =</surname>
          </string-name>
          <article-title>I1</article-title>
          .
          <string-name>
            <surname>Hence ( L)I ( R)I .</surname>
          </string-name>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>