<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Computing the lcs w.r.t. General EL+-TBoxes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Anni-Yasmin Turhan?</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Benjamin Zarrie</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>turhan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>zarriessg@tcs.inf.tu-dresden.de</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Chair for Automata Theory Institute for Theoretical Computer Science Technische Universitat Dresden</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Recently, exact conditions for the existence of the least common subsumer (lcs) computed w.r.t. general EL-TBoxes have been devised [13]. This paper extends these results and provides necessary and su cient conditions for the existence of the lcs w.r.t. EL+-TBoxes. We show decidability of the existence in PTime and polynomial bounds on the maximal role-depth of the lcs, which in turn yields a computation algorithm for the lcs w.r.t. EL+-TBoxes.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        In the area of Description Logics (DLs) the least common subsumer (lcs) is an
inference that is applied to a collection of concepts and yields a complex concept
that captures all commonalities of the input concepts. Unfortunately, the lcs
doesn't need to exist, if computed w.r.t. general EL-TBoxes [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Let's consider
the TBox axioms:
      </p>
      <sec id="sec-1-1">
        <title>Woman v Human u 9has-Grandparent:Woman;</title>
      </sec>
      <sec id="sec-1-2">
        <title>Man v Human u 9has-Grandparent:Man;</title>
      </sec>
      <sec id="sec-1-3">
        <title>Human v 9has-Parent:Human:</title>
        <p>ple:
We want to compute the lcs of Woman and Man. Both are Human and have
Grandparents that are Woman or Man, respectively. This leads to a cyclic de nition and
thus the least common subsumer cannot be captured by a nite EL-concept, since
this would need to express the cycle.</p>
        <p>The DL EL+ allows, in addition to EL, for role inclusion axioms as for
exam</p>
        <p>
          In fact, for cyclic de nitorial EL-TBoxes exact conditions for the existence of
the lcs have been devised [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. For the case of general EL-TBoxes such conditions
were shown recently in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. In this paper we want to extend these results to EL+.
Since in EL+ no expressive power on the level of concepts is added compared to
EL and every general EL-TBox is also a general EL++-TBox, the non-existence of
the lcs w.r.t. to general TBoxes carries over to EL .
        </p>
        <p>
          There are also several approaches to compute the lcs even in the presence of
general TBoxes. In [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] an extension of EL with greatest xpoints was introduced,
where the lcs concepts always exist. Computation algorithms for approximate
solutions for the lcs were devised in [
          <xref ref-type="bibr" rid="ref11 ref6">6, 11</xref>
          ] and were also extended to EL+ [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
The last two methods simply compute the lcs-concept up to a given k, a bound
on the maximal nestings of quanti ers. If the lcs exists and a large enough k
was given, then these methods yield the exact solutions. However, to obtain the
least common subsumer by these methods in practice, a decision procedure for
the existence of the lcs w.r.t. general EL+-TBoxes and a method for computing
a su cient bound k is still needed. This paper provides this method for the lcs.
Similar to the case of approximate solutions for the lcs [
          <xref ref-type="bibr" rid="ref11 ref8">8, 11</xref>
          ], it also turns out
in our case that the results shown for EL (in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]) can be easily extended to EL+.
        </p>
        <p>In this paper we rst introduce basic notions for the DL EL+ and its canonical
models, which serve as a basis for the characterization of the lcs in the subsequent
sections. There we show that the characterization can be used to verify whether
a given common subsumer is indeed the least one and show that the size of the
lcs, if it exists, is polynomially bounded in the size of the input. These results
yield a decision procedure for the existence problem for the lcs in EL+. The
paper ends with some conclusions.
2
2.1</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>The Description Logic EL+
Let NC and NR be disjoint sets of concept and role names. Let A 2 NC and
r 2 NR. EL-concepts are built according to the syntax rule</p>
      <p>C ::= &gt; j A j C u D j 9r:C</p>
      <p>An interpretation I = ( I ; I ) consists of a non-empty domain I and a
function I that assigns subsets of I to concept names and binary relations on</p>
      <p>
        I to role names. The function is extended to complex concepts in the usual
way. For a detailed description of the semantics of DLs see [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Let C, D denote EL-concepts. A general concept inclusion (GCI) is an
expression of the form C v D. The DL EL+ allows also for role inclusion axioms
(RIAs) of the form r1 ::: rn v r with n 1 and ri 2 NR for i = 1; :::; n and
r 2 NR. A (general) TBox T is a nite set of GCIs and an RBox R is a nite
set of RIAs. An ontology O consists of a TBox T and an RBox R, denoted by
O = (T ; R).1
1 Since we only use the DL EL+, we write `concept' instead of `EL-concept' and assume
all TBoxes and RBoxes to be written in EL+ in the following.</p>
      <sec id="sec-2-1">
        <title>A GCI C v D is satis ed in an interpretation I i CI</title>
        <p>on roles is interpreted as
DI . The
operator
rI
sI := f(d; f ) j 9e 2</p>
        <p>I s.t. (d; e) 2 rI ^ (e; f ) 2 sI g:
A RIA r1 ::: rn v r is satis ed in an interpretation I if r1I ::: rnI rI . An
interpretation I is a model of T , if it satis es all GCIs in T . An interpretation
I is a model of R if it satis es all RIAs in R. I is a model of an ontology
O = (T ; R) if I is a model of T and R.</p>
        <p>An important reasoning task considered for DLs w.r.t. TBoxes and RBoxes
is subsumption. A concept C is subsumed by a concept D w.r.t. an ontology O
(denoted by C vO D) i CI DI holds in all models I of O. A concept C
is equivalent to a concept D w.r.t. O (denoted by C O D) i C vO D and
D vO C hold. Similarly, a concept C is subsumed by a concept D w.r.t. an
RBox R (denoted by C vR D) i CI DI holds in all models I of R.</p>
        <p>
          Subsumption w.r.t. ontologies can be decided for EL+ in polynomial time [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
Based on subsumption the inference we are interested in, the least common
subsumer (lcs) is de ned.
        </p>
        <p>De nition 1 (least common subsumer). Let C; D be concepts and O an
ontology. The concept E is the lcs of C, D w.r.t. O (lcsO(C; D)) if the properties
1. C vO E and D vO E, and
2. C vO F and D vO F implies E vO F .
are satis ed. If a concept E satis es Property 1 it is a common subsumer of C
and D w.r.t. O.</p>
        <p>The lcs in a DL that o ers conjunction is unique up to equivalence, thus we
speak of the lcs. In contrast to this, common subsumers are not unique, thus we
write F 2 csO(C; D).</p>
        <p>The role depth (rd(C)) of a concept C denotes the maximal number of
nestings of 9 in C. If in De nition 1 the concepts E and F have a role-depth bound
less than or equal k, then E is the role-depth bounded lcs (k-lcsO(C; D)) of C
and D w.r.t. O, which is also unique up to equivalence.
2.2</p>
        <p>
          Canonical Models and Simulation Relations
The correctness proof of the computation algorithms for the lcs depends on
the characterization of subsumption. In case of the lcs in EL without a TBox,
homomorphisms between syntax trees of concepts [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] were used. A
characterization w.r.t. general EL-TBoxes using canonical models and simulations was given
in [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. This characterization was extended to EL+ and RBoxes in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>Let X be a concept, a TBox, an RBox or an ontology, then sub(X) denotes
the subconcepts in X.</p>
        <p>
          De nition 2 (canonical model [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]). Let C be a concept and O = (T ; R) an
ontology. The canonical model IC;O of C and O is de ned as follows:
{ IC;O := fdC g [ fdC0 j 9r:C0 2 sub(C) [ sub(T )g;
{ AIC;O := fdD j D vO Ag, for all A 2 NC;
{ rIC;O := f(dD; dD0 ) j D vO 9r:D0 for D0 2 sub(T ) or
        </p>
        <p>D vR 9r:D0 for D0 2 sub(C)g for all r 2 NR:
To identify properties of canonical models we use simulation relations between
interpretations.</p>
        <p>De nition 3 (simulation). Let I1 and I2 be interpretations. S I1
is called a simulation from I1 to I2 if the following conditions are satis ed:
I2
1. For all concept names A 2 NC and all (e1; e2) 2 S it holds: e1 2 AI1 implies
e2 2 AI2 .
2. For all role names r 2 NR and all (e1; e2) 2 S and all f1 2 I1 with
(e1; f1) 2 rI1 there exists f2 2 I2 such that (e2; f2) 2 rI2 and (f1; f2) 2 S.
To denote an interpretation I together with a particular element d 2 I we write
(I; d). It holds that (I; d) is simulated by (J ; e) (written as (I; d) . (J ; e)) if
there exists a simulation S I J with (d; e) 2 S. The relation . is
a preorder, i.e. it is re exive and transitive. (I; d) is simulation-equivalent to
(J ; e) (written as (I; d) ' (J ; e)) if (I; d) . (J ; e) and (J ; e) . (I; d) holds.</p>
        <p>
          Now we summarize some important properties of canonical models in EL+
that were shown in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>Lemma 1. Let C be a concept and O an ontology.
1. IC;O is a model of O.
2. For all models I of O and all d 2 I holds:</p>
        <p>d 2 CI i (IC;O; dC ) . (I; d).
3. C vO D i dC 2 DIC;O i (ID;O; dD) . (IC;O; dC ).</p>
        <p>This lemma gives us a characterization of subsumption by means of canonical
models. In order to employ it for the characterization of the lcs, we need to recall
some operations on interpretations.</p>
        <p>Starting from an element of the domain of an interpretation as the root, the
interpretation can be unraveled into a possibly in nite tree. The nodes of the tree
are words that correspond to paths starting in d. The word = dr1d1r2d2r3::: is
a path in an interpretation I if the domain elements di and di+1 are connected
via riI+1 for all i.</p>
        <p>De nition 4 (tree unraveling of an interpretation). Let I be an
interpretation w.r.t. names from NC and NR with d 2 I . The tree unraveling Id of I
in d is de ned as follows:</p>
        <p>Id := fdr1d1r2:::rndn j (di; di+1) 2 riI+1 ^ 0
i &lt; n ^ d0 = dg;
AId := f d0 j d0 2</p>
        <p>Id ^ d0 2 AI g; for all A 2 NC;
rId := f( ; rd0) j ( ; rd0) 2</p>
        <p>Id</p>
        <p>Id g; for all r 2 NR:
The length of an element 2 Id (denoted by j j), is the number of role names
occurring in . If is of the form dr1d1r2:::rmdm, then dm is the tail of denoted
by tail( ) = dm. The interpretation Id` denotes the nite subtree rooted in d of
the tree unraveling Id containing all elements up to depth `. Such a tree can be
translated into an `-characteristic concept of an interpretation (I; d).
De nition 5 (characteristic concept). Let (I; d) be an interpretation. The
`-characteristic concept X`(I; d) is de ned as follows: 2</p>
        <p>X0(I; d) := lfA 2 NC j d 2 AI g
X`(I; d) := X0(I; d) u l lf9r:X` 1(I; d0) j (d; d0) 2 rI g</p>
        <p>r2NR
Another operation that we will use later is the product of two interpretations
that is de ned as follows.</p>
        <p>De nition 6 (product of interpretations). Let I and J be interpretations.
The product interpretation I J is de ned by</p>
        <p>I J :=</p>
        <p>I</p>
        <p>J ;
AI J := f(d; e) j (d; e) 2</p>
        <p>I J ^ d 2 AI ^ e 2 AJ g, for all A 2 NC;
rI J := f((d; e); (f; g)) j ((d; e); (f; g)) 2
I J</p>
        <p>I J
^ (d; f ) 2 rI ^ (e; g) 2 rJ g, for all r 2 NR:
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Existence of Least Common Subsumers</title>
      <p>In this section we develop a decision procedure for the problem whether for two
given concepts and a given ontology the least common subsumer of these two
concepts w.r.t. the given ontology exists. If not stated otherwise, the two input
concepts are denoted by C and D and the ontology by O.</p>
      <p>
        We follow the method used in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], which is based on operations and relations
on canonical models. The only di erence compared to the setting in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] is the
presence of RIAs in the RBox. Fortunately, canonical models of concepts w.r.t.
GCIs and RIAs with the properties given in Lemma 1 can also be obtained as
in the case where we have only GCIs. Therefore, the results shown for EL in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]
can be easily adopted to the case of EL+.
      </p>
      <p>
        Similar to the approach used in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] we proceed by the following steps:
1. Devise a method to identify lcs-candidates for the lcs. The set of
lcscandidates is a possibly in nite set of common subsumers of C and D w.r.t.
O, such that if the lcs exists then one of these lcs-candidates actually is the lcs.
      </p>
      <p>2. Characterize the existence of the lcs. Find a condition such that the
problem whether a given common subsumer of C and D w.r.t. O is least (w.r.t. vO),
can be decided by testing this condition.
2 For a set M of concepts we write d M as shorthand for dF 2M F . If M is empty,
then d M is equal to &gt;.</p>
      <p>3. Establish an upper bound on the role-depth of the lcs. We give a bound `
such that if the lcs exists, then it has a role-depth less than or equal `. By the
use of such an upper bound one needs to check only for nitely many of the
lcs-candidates if they are least (w.r.t. vO).</p>
      <p>The next subsection addresses the rst two problems, afterwards we show
that such a desired upper bound exists.
3.1</p>
      <p>
        Characterizing the Existence of the lcs
The characterization presented here is based on the product of canonical models.
This product construction is adopted from [
        <xref ref-type="bibr" rid="ref3 ref9">3, 9</xref>
        ] where it was used to compute
the lcs in EL with gfp-semantics and in the DL EL , respectively.
      </p>
      <p>To obtain the k-lcsO(C; D) we build the product of the canonical models
(IC;O; dC ) and (ID;O; dD) and then take the k-characteristic concept of this
product model.</p>
      <p>Lemma 2. Let k 2 N.
1. Xk(IC;O ID;O; (dC ; dD)) 2 csO(C; D).
2. Let E 2 csO(C; D) with rd(E) k.</p>
      <p>It holds that Xk(IC;O ID;O; (dC ; dD)) vO E.</p>
      <p>
        In the proof we only need to refer to the canonical models and its properties
given in Lemma 1, thus the proof is a straightforward variant of the one given
in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>In the following we use Xk(IC;O ID;O; (dC ; dD)) as a representation of the
k-lcsO(C; D). It is implied by Lemma 2 that the set of k-characteristic concepts
of the product model (IC;O ID;O; (dC ; dD)) for all k is the set of lcs-candidates
for the lcsO(C; D), which can be stated as follows.</p>
      <p>Corollary 1. The lcsO(C; D) exists i there exists a k 2 N such that for all
` 2 N: k-lcsO(C; D) vO `-lcsO(C; D).</p>
      <p>Obviously, this condition does not yield a decision procedure for the problem
whether the k-lcsO(C; D) is the lcs, since subsumption cannot be checked for
in nitely many ` in nite time.</p>
      <p>Next, we address step 2 and show a condition on the common subsumers
that decides whether a common subsumer is least or not. The main idea is that
the product model (IC;O ID;O; (dC ; dD)) captures all commonalities of the
input concepts C and D. Thus we need to compare the canonical models of the
common subsumers and the product model by using simulation-equivalence '.
(IC;O
Lemma 3. Let E be a concept. E</p>
      <p>O lcsO(C; D) i</p>
      <p>ID;O; (dC ; dD)) ' (IE;O; dE).</p>
      <p>Proof sketch. For any F 2 csO(C; D) it holds by Lemma 1, Claim 3 that
(IF;O; dF ) is simulated by (IC;O; dC ) and by (ID;O; dD) and therefore also by
(IC;O ID;O; (dC ; dD)).</p>
      <p>Assume that (IE;O; dE ) is simulation-equivalent to the product model. We
need to show that E O lcsO(C; D). By transitivity of . it is implied that
(IF;O; dF ) . (IE;O; dE ) and E vO F by Lemma 1. Therefore E O lcsO(C; D).</p>
      <p>For the other direction assume E O lcsO(C; D). It has to be shown that
(IE;O; dE ) simulates the product model. Let J(dC;dD) be the tree unraveling of
the product model. Since E is more speci c than the k-characteristic concepts
of the product model for all k (by Corollary 1), (IE;O; dE ) simulates the
subk
tree J(dC;dD) of J(dC;dD) limited to elements up to depth k, for all k. For each
k
k we consider the maximal simulation from J(dC;dD) to (IE;O; dE ). Note that
((dC ; dD); dE ) is contained in any of these simulations. Let be an element of
J(dC;dD) at an arbitrary depth `. We show how to determine the elements of
IE;O , that simulate this xed element . Let Sn( ) be the maximal set of
elements from IE;O that simulate in each of the trees J(ndC;dD) with n `. We
can observe that the in nite sequence (S`+i( ))i=0;1;2;::: is decreasing (w.r.t. ).
Therefore at a certain depth we reach a xpoint set. This xpoint set exists for
any . It can be shown that the union of all these xpoint sets yields a simulation
from the product model to (IE;O; dE ).</p>
      <p>By the use of Lemma 3 it can be veri ed whether a given common subsumer is
the least one or not, which we illustrate by an example.</p>
      <p>Example 1. Consider the following TBox
with O1 = (T1; ;) and now the following extended ontology
In Figure 1 we can see that</p>
      <p>T1 = fC v E u 9r:C;</p>
      <p>D v E u 9r:D;</p>
      <p>E v 9s:Eg
O2 = (T1; fs s v rg)</p>
      <p>E u 9s:E 2 csO1 (C; D);
but this concept is not the lcs of C and D, because its canonical model cannot
simulate the product model (IC;O1 ID;O1 ; (dC ; dD)). The concept E, however,
is the lcs of C and D w.r.t. O2. We have (IC;O2 ID;O2 ; (dC ; dD)) . (IE;O2 ; dE )
since (dC ; dD) and (dE ; dE ) are simulated by dE .</p>
      <p>The characterization of the existence of the lcs given in Corollary 1 can be
reformulated using Lemma 3.</p>
      <p>Corollary 2. The lcsO(C; D) exists i there exists a k such that the canonical
model of Xk(IC;O ID;O; (dC ; dD)) w.r.t. O simulates (IC;O ID;O; (dC ; dD)).
This corollary still doesn't yield a decision procedure for the existence problem,
since the depth k is still unrestricted. Such a restriction will be developed in the
next section.
(dC ; dD)
(dE; dE)
2 EI
In this section we show that, if the lcs exists, its role-depth is bounded by the
size of the product model. First, consider again the ontology O2 from Example 1,
where E vO2 9r:E holds, which results in an r-loop in the product model through
the element (dE; dE) with the same name appearing in both components.
Furthermore, the cycles in the product model involving the roles r and s are exactly
those captured by the canonical model IE;O2 . Therefore E O2 lcsO2 (C; D). On
this observation we build our general method.</p>
      <p>We call elements (dF ; dF 0 ) 2 IC;O ID;O synchronous if F = F 0 and
asynchronous otherwise. The structure of (IC;O ID;O; (dC ; dD)) can now be
simpli ed by considering only synchronous successors of synchronous elements.</p>
      <p>In order to nd a number k, such that the product model is simulated by the
canonical model of K = Xk(IC;O ID;O; (dC ; dD)), we rst represent the model
(IK;O; dK ) as a subtree of the tree unraveling of the product model J(dC;dD)
with root (dC ; dD). We construct this representation by extending the subtree
k
J(dC;dD) by new tree models at depth k. We need to ensure that the resulting
k
interpretation, denoted by Jb(dC;dD), is a model of O, that is simulation-equivalent
to (IK;O; dK ). The elements 2 J(kdC;dD) with j j = k that we extend and the
corresponding trees we append to them are selected as follows: Let M be a
conjunction of concept names and 9s:F 2 sub(O). If 2 M J(kdC;dD) and M vO
9r:F , then we append the tree unraveling of the canonical model I9r:F;O. Note
that the role names s and r can be di erent due to the presence of RIAs in O.
Furthermore, we consider elements that have a tail that is a synchronous element.
If tail( ) = (dF ; dF ), then F is called tail concept of . To select the elements
with a synchronous tail, that we extend by the canonical model of their tail
k
concept, we use embeddings of J(dC;dD) into (IK;O; dK ). Let H = fZ1; :::; Zng
k
be the set of all functional simulations Zi from J(dC;dD) to (IK;O; dK ) with
Zi((dC ; dD)) = dK . We say that with tail concept F is matched by Zi if</p>
      <sec id="sec-3-1">
        <title>Zi( ) 2 F IK;O . The set of elements</title>
        <p>J(kdC;dD) with j j = k, that are
matched by a functional simulation Zi is called matching set, denoted by M(Zi).
Now consider the set M(H) := fM(Z1); :::; M(Zn)g. If is contained in all
maximal matching sets from M(H), then we extend by the tree unraveling
of the canonical model of its tail concept w.r.t. O. Intuitively, this condition
corresponds to a minimization of changes which is required since the canonical
model we want to obtain is minimal w.r.t. .. We can show that the resulting
k
interpretation Jb(dC;dD) has the desired properties.</p>
        <p>Lemma 4. Let K = Xk(IC;O</p>
        <p>k
Jb(dC;dD) ' (IK;O; dK ).</p>
        <p>k</p>
        <p>ID;O; (dC ; dD)). Jb(dC;dD) is a model of O and
Having this representation of the canonical model of the k-lcsO(C; D) at hand,
we rst show a su cient condition for the existence of the lcs.</p>
        <p>Corollary 3. If all cycles in (IC;O ID;O; (dC ; dD)), that are reachable from
(dC ; dD) consist of synchronous elements, then the lcsO(C; D) exists.
Proof sketch. There exists an ` 2 N such that all paths in the tree unraveling
J(dC;dD) of (IC;O ID;O; (dC ; dD)) starting in (dC ; dD) have a maximal
asynchronous pre x up to length `, i.e., if there exists an element at depth ` + 1,
then it is a synchronous element. Consider the number</p>
        <p>m := max(frd(F ) j F 2 sub(O) [ fC; Dgg):
We unravel (IC;O ID;O; (dC ; dD)) up to depth ` + m + 1 such that we get
`+m+1. Now it is ensured that the corresponding model Jb(`d+Cm;d+D1) contains
J(dC;dD)
all paths with a maximal asynchronous pre x up to length `. It is implied
that Jb(`d+Cm;d+D1) = J(dC;dD). From Lemma 4 and from Corollary 2 it follows that
X`+m+1(IC;O</p>
        <p>ID;O; (dC ; dD)) is the lcs.</p>
        <p>As seen in Example 1 for O2, this is not a necessary condition for the existence
of the lcs. Since although the lcs of C and D exists w.r.t. O2, the product model
has also a cycle involving the asynchronous element (dC ; dD).</p>
        <p>Another consequence of Lemma 4 is, that if the product model (IC;O
ID;O; (dC ; dD)) has only asynchronous cycles reachable from (dC ; dD), then the
k
lcsO(C; D) does not exist. Since in this case J(dC;dD) is in nite but Jb(dC;dD) is
k
ID;O; (dC ; dD)) to Jb(dC;dD) never
nite for all k 2 N, a simulation from (IC;O
exists for all k.</p>
        <p>The interesting case is where there are both asynchronous and synchronous
cycles reachable from (dC ; dD) in the product model. In this case we choose a k
that is large enough and then check whether the corresponding canonical model
of Xk(IC;O ID;O; (dC ; dD)) w.r.t. O simulates the product model.</p>
        <p>We show in the next lemma that the role-depth of the lcsO(C; D), if it exists,
can be bounded by a polynomial, that is quadratic in the size of the product
model.</p>
        <p>Lemma 5. Let m := max(frd(F ) j F 2 sub(O)[fC; Dgg) and n := j IC;O ID;O j.
If lcsO(C; D) exists then (IC;O ID;O; (dC ; dD)) . Jb(nd2C+;dmD+) 1.
Proof sketch. Assume lcsO(C; D) exists. From Corollary 2 and Lemma 4 it follows
that there exists a number ` such that
(IC;O</p>
        <p>`
ID;O; (dC ; dD)) . Jb(dC;dD):
(1)
Every path in Jb(`dC;dD) has a maximal asynchronous pre x of length `. From
`
depth ` + 1 on there are only synchronous elements in the tree Jb(dC;dD). From
(1) it follows that every path p in (IC;O ID;O; (dC ; dD)) starting in (dC ; dD), is
`
simulated by a corresponding path p` in Jb(dC;dD) also starting in (dC ; dD). The
simulation chain of p and p` is depicted in Figure 2. The idea of a simulation
`
chain is to use the simulating path p` to construct a simulating path in Jb(dC;dD)
(also starting in (dC ; dD)) with a maximal asynchronous pre x of length n2,
where n2 is the number of pairs of elements from IC;O ID;O . Intuitively, if p` has
a maximal asynchronous pre x that is longer than n2, then there must be pairs
in the simulation chain that occur more than once. These are used to construct
a simulating path with a shorter maximal asynchronous pre x step-wise. After
a nite number of steps the result is a simulating path, such that all pairs
consisting of asynchronous elements in the corresponding simulation chain are
`
pairwise distinct. Therefore we need only asynchronous elements from Jb(dC;dD)
up to depth n2 to simulate the product model. Then we add m + 1 to n2 to
ensure that Jb(nd2C+;dmD+) 1 contains all paths from J(dC;dD) starting in (dC ; dD), that
have a maximal asynchronous pre x of length n2. As argued above Jb(nd2C+;dmD+) 1
simulates (IC;O</p>
        <p>ID;O; (dC ; dD)).</p>
        <p>Using Lemma 3 and Lemma 5 we can now show the main result of this paper.
Theorem 1. Let C; D be concepts and O an EL+-ontology. It is decidable in
polynomial time whether the lcsO(C; D) exists. If the lcsO(C; D) exists then it
can be computed in polynomial time.</p>
        <p>
          Proof. First we compute the bound k as given in Lemma 5 and then the
kcharacteristic concept K of (IC;O ID;O; (dC ; dD)). The canonical model of K
can be build according to De nition 2 in polynomial time [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Next we check
whether (IC;O ID;O; (dC ; dD)) . (IK;O; dK ) holds, which can be done in
polynomial time. If yes, K is the lcs by Lemma 3 and if no, the lcs doesn't exist by
Lemma 5.
        </p>
        <p>
          The results from this section can be easily generalized to the lcs of an arbitrary
set of concepts M = fC1; :::; Cmg w.r.t. an ontology O. But in this case the size
of the lcs is already exponential w.r.t. an empty TBox [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. In this general case
we have to take the product model
(IC1;O
        </p>
        <p>ICm;O; (dC1 ;
; dCm ));
whose size is exponential in the size of M and O, as input for the methods
introduced in this section. Then the same steps as for the binary version can be
applied.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusions and Future Work</title>
      <p>
        In this paper we have studied the conditions for the existence of the lcs, if
computed w.r.t. EL+-ontologies. In this setting the lcs doesn't need to exist. We
showed that the existence problem of the lcs of two concepts is decidable in
polynomial time. Furthermore, we showed that the role-depth of the lcs can be
bounded by a polynomial. This upper bound k can be used to compute the lcs, if
it exists. Otherwise the computed concept can still serve as an approximation [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        Future work on the practical side includes to improve the described procedure
in order to obtain a practical algorithm such that an appropriate
implementation can be integrated into existing tools [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] for computing generalizations. On
the theoretical side, we would like extend the results towards the computation
of most speci c concepts of individuals w.r.t. to ontologies consisting of general
TBoxes and cyclic ABoxes. Furthermore, we will also consider these
generalization inferences w.r.t. ontologies formulated in more expressive Horn-DLs than
EL+.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P</given-names>
          </string-name>
          . (eds.):
          <article-title>The Description Logic Handbook</article-title>
          : Theory, Implementation, and
          <string-name>
            <surname>Applications</surname>
          </string-name>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , Kusters, R.,
          <string-name>
            <surname>Molitor</surname>
          </string-name>
          , R.:
          <article-title>Computing least common subsumers in description logics with existential restrictions</article-title>
          . pp.
          <volume>96</volume>
          {
          <fpage>101</fpage>
          . Stockholm, Sweden (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Least common subsumers and most speci c concepts in a description logic with existential restrictions and terminological cycles</article-title>
          . In: Gottlob,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Walsh</surname>
          </string-name>
          , T. (eds.)
          <source>Proceedings of the 18th International Joint Conference on Arti cial Intelligence</source>
          . pp.
          <volume>319</volume>
          {
          <fpage>324</fpage>
          . Morgan Kaufman (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A graph-theoretic generalization of the least common subsumer and the most speci c concept in the description logic EL</article-title>
          . In: Hromkovic,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Nagl</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of the 30th International Workshop on Graph-Theoretic Concepts in Computer Science (WG 2004). Lecture Notes in Computer Science</source>
          , vol.
          <volume>3353</volume>
          , pp.
          <volume>177</volume>
          {
          <fpage>188</fpage>
          . Springer-Verlag (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brandt</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Pushing the EL envelope</article-title>
          .
          <source>In: Proceedings of the Nineteenth International Joint Conference on Arti cial Intelligence IJCAI-05</source>
          . Morgan-Kaufmann Publishers (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sertkaya</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turhan</surname>
          </string-name>
          , A.-Y.:
          <article-title>Computing the least common subsumer w</article-title>
          .r.t.
          <article-title>a background terminology</article-title>
          .
          <source>Journal of Applied Logic</source>
          <volume>5</volume>
          (
          <issue>3</issue>
          ),
          <volume>392</volume>
          {
          <fpage>420</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Ecke</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turhan</surname>
          </string-name>
          , A.-Y.:
          <article-title>Optimizations for the role-depth bounded least common subsumer in EL+</article-title>
          . In: Klinov,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Horridge</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of OWL: Experiences and Directions Workshop. CEUR Workshop Proceedings</source>
          , vol.
          <volume>849</volume>
          .
          <string-name>
            <surname>CEUR-WS.org</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ecke</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turhan</surname>
          </string-name>
          , A.-Y.:
          <article-title>Role-depth bounded least common subsumers for EL+ and ELI</article-title>
          . In: Kazakhov,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Wolter</surname>
          </string-name>
          ,
          <string-name>
            <surname>F</surname>
          </string-name>
          . (eds.)
          <source>Proc. of Description Logics Workshop. CEUR</source>
          , vol.
          <volume>846</volume>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piro</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Enriching EL-concepts with greatest xpoints</article-title>
          .
          <source>In: Proceedings of the 19th European Conference on Arti cial Intelligence (ECAI10)</source>
          . IOS Press (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Deciding inseparability and conservative extensions in the description logic EL</article-title>
          .
          <source>Journal of Symbolic Computation</source>
          <volume>45</volume>
          (
          <issue>2</issue>
          ),
          <volume>194</volume>
          {
          <fpage>228</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. Pen~aloza, R.,
          <string-name>
            <surname>Turhan</surname>
          </string-name>
          , A.-Y.:
          <article-title>A practical approach for computing generalization inferences in EL</article-title>
          . In: Grobelnik,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Simperl</surname>
          </string-name>
          , E. (eds.)
          <source>Proceedings of the 8th European Semantic Web Conference (ESWC'11). Lecture Notes in Computer Science</source>
          , Springer-Verlag (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Pokrywczynski</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walther</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Deciding the logical di erence problem for EL with role inclusions</article-title>
          .
          <source>In: Proc. of the International Workshop on Ontologies: Reasoning and Modularity (WORM'08)</source>
          , Tenerife, Spain.
          <source>CEUR-WS</source>
          Vol-
          <volume>348</volume>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Zarrie</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turhan</surname>
          </string-name>
          , A.-Y.:
          <article-title>Most speci c generalizations w</article-title>
          .r.t. general
          <article-title>EL-TBoxes</article-title>
          .
          <source>In: Proceedings of the 23rd International Joint Conference on Arti cial Intelligence (IJCAI'13)</source>
          . AAAI Press, Beijing, China (
          <year>2013</year>
          ), to appear.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Zarrie</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turhan</surname>
          </string-name>
          , A.-Y.:
          <article-title>Most speci c generalizations w</article-title>
          .r.t.
          <source>general EL-TBoxes. LTCS-Report 13-06</source>
          , Chair of Automata Theory, Institute of Theoretical Computer Science, Technische Universitat Dresden, Dresden, Germany (
          <year>2013</year>
          ), see http:// lat.inf.tu-dresden.de/research/reports.html.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>