<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Finite Model Reasoning in Horn-S HI Q</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yazm´ın Iban˜ ez-Garc´ıa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Carsten Lutz</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Thomas Schneider</string-name>
          <email>tschneiderg@informatik.uni-bremen.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>KRDB Research Centre, Free Univ. of Bozen-Bolzano</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Univ.</institution>
          <addr-line>Bremen</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Finite model reasoning in expressive DLs such as ALCQI and SHIQ requires non-trivial algorithmic approaches that are substantially differerent from algorithms used for reasoning about unrestricted models. In contrast, finite model reasoning in the inexpressive fragment DL-LiteF of ALCQI and SHIQ is algorithmically rather simple: using a TBox completion procedure that reverses certain terminological cycles, one can reduce finite subsumption to unrestricted subsumption. In this paper, we show that this useful technique extends all the way to the popular and much more expressive Horn-SHIQ fragment of SHIQ.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Description logics (DLs) that include inverse roles and some form of counting such
as functionality restrictions lack the finite model property (FMP) and, consequently,
reasoning w.r.t. the class of finite models (finite model reasoning) does not coincide with
reasoning w.r.t. the class of all models (unrestricted reasoning). On the one hand, this
distinction is becoming increasingly important since DLs are nowadays regularly used
in database applications, where models are generally assumed to be finite. On the other
hand, finite model reasoning is rarely used in practice, mainly because for many popular
DLs that lack the FMP, no algorithmic approaches to finite model reasoning are known
that lend themselves towards efficient implementation.</p>
      <p>
        Typical examples include the expressive DLs ALCQI and S HIQ, which are both a
fragment of the OWL2 DL ontology language. While finite model reasoning in ALCQI
and S HIQ are known to have the same complexity as unrestricted reasoning, namely
EXPTIME-complete [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], the algorithmic approaches to the two cases are rather different.
For unrestricted reasoning, there is a wide range of applicable algorithms such as tableau
and resolution calculi, which often perform rather well in practical implementations. For
finite model reasoning, all known approaches rely on the construction of some system
of inequalities [
        <xref ref-type="bibr" rid="ref3 ref9">3,9</xref>
        ], and then solve this system over the integers; the crux is that the
system of inequalities is of exponential size in the best case, and consequently it is far
from obvious how to come up with efficient implementations. Note that the same is true
for the two-variable fragment of first-order logic with counting quantifiers (C2), into
which DLs such as ALCQI and S HIQ can be embedded [
        <xref ref-type="bibr" rid="ref12 ref13">12,13</xref>
        ], that is, all known
approaches to finite model reasoning in C2 rely on solving (at least) exponentially large
systems of inequalities.
      </p>
      <p>
        Interestingly, the situation is quite different on the other end of the expressive power
spectrum. DL-Lite F is a very inexpressive DL that is used in database applications,
but lacks the FMP because it still includes inverse roles and functionality restrictions.
Building on a technique that was developed in a database context by Cosmadakis,
Kanellakis, and Vardi to decide the implication of inclusion dependencies and functional
dependencies in the finite [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], Rosati has shown that finite model reasoning in DL-LiteF
can be reduced (in polynomial time) to unrestricted reasoning in DL-LiteF [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. In
fact, the reduction is conceptually simple and relies on completing the TBox by finding
certain cyclic inclusions and ‘reversing’ them. For example, the cycle
9r
v 9s
9s
v 9r
(funct r )
(funct s )
that consists of existential restrictions in the ‘forward direction’ and functionality
statements in the ‘backwards direction’ would lead to the addition of the reversed cycle
9s v 9r
9r v 9s
(funct r)
(funct s):
As a consequence, finite model reasoning in DL-LiteF does not require any new
algorithmic techniques and can be implemented as efficiently as unrestricted reasoning. Given
that DL-LiteF is a very small fragment of ALCQI and SHIQ, these observations raise
the question whether the cycle reversion technique extends also to larger fragments of
these DLs. In particular, DL-LiteF is a ‘Horn DL’, and such logics are well-known to be
algorithmically more well-behaved than non-Horn DLs such as ALCQI and SHIQ.
Maybe this is the reason why cycle reversion works for DL-LiteF ?
      </p>
      <p>
        In this paper, we show that the cycle reversion technique extends all the way to
the expressive Horn-SHIQ fragment of SHIQ, which is rather popular in database
applications [
        <xref ref-type="bibr" rid="ref11 ref2 ref5 ref6">6,11,5,2</xref>
        ] and properly extends DL-LiteF and other relevant Horn fragments
such as E LIF . In particular, we show that finite satisfiability in Horn-SHIQ can be
reduced to unrestricted satisfiability in Horn-SHIQ by completing the TBox with
reversed cycles in the style of Cosmadakis et al. and of Rosati. While the reduction
technique is essentially the same as for DL-LiteF , the construction of a finite model in the
correctness proof is much more subtle and demanding. Another crucial difference to the
DL-LiteF case is that, when completing Horn-SHIQ TBoxes, the cycles that have to be
considered can be of exponential length, and thus the reduction is not polynomial. On first
glance, this of course casts a doubt on the practical relevance of the proposed reduction.
Still, we are confident that our approach will lead to implementable algorithms for finite
model reasoning in Horn-SHIQ. Specifically, the state-of-the-art of efficient reasoning
in Horn description logics is to use so-called consequence based calculi, as introduced
for Horn-SHIQ in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and implemented for example in the reasoners CEL, CB, and
ELK [
        <xref ref-type="bibr" rid="ref1 ref7 ref8">1,7,8</xref>
        ]. Instead of first completing the TBox and then handing over the completed
TBox to a reasoner, it seems well possible to integrate the reversion of cycles directly as
an inference rule into such a calculus. This avoids the detection of cycles by uninformed,
brute-force search, and instead searches for cycles in the consequences that have already
been computed by the calculus, anyway. Since the efficiency of consequence-based
calculi are largely due to the fact that, for typical inputs, the set of derived consequences
is relatively small, we expect that this will work well in practical applications. For now,
though, we leave it as future work to work out the details of such a calculus.
      </p>
      <p>Some proof details are deferred to the appendix of the long version of the paper, to
be found at http://www.informatik.uni-bremen.de/tdki/research/papers.html</p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>
        The original definition of Horn-SHIQ is based on a notion of polarity and somewhat
unwieldy [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]; alternative definitions have been proposed later, see for example [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. For
brevity, we directly introduce Horn-SHIQ TBoxes in a certain normal form similar to
the one used in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>Let NC and NR be countably infinite and disjoint sets of concept names and role
names. A Horn-SHIQ TBox T is a set of concept inclusions (CIs) that can take the
following forms:
K v A</p>
      <p>K v ?</p>
      <p>K v 9r:K0</p>
      <p>K v 8r:K0</p>
      <p>K v (6 1 r K0)</p>
      <p>K v (&gt; n r K0)
where K and K0 denote a conjunction of concept names, A a concept name, r a
(potentially inverse) role, and n 1. Throughout the paper, we will deliberately confuse
conjunctions of concept names and sets of concept names. The empty conjunction is
abbreviated to &gt;.</p>
      <p>
        It was observed in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] that, for the purposes of deciding unrestricted satisfiability, the
above form can be assumed without loss of generality; that is, every Horn-SHIQ TBox
T conformant with the original definition in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] can be converted in polynomial time
into a TBox T 0 in the above form such that for all concept names A in T , we have that
A is satisfiable w.r.t. T iff A is satisfiable w.r.t. T 0. It is straightforward to verify that all
necessary transformations, such as coding out role hierarchies and transitive roles do not
rely on unrestricted models to be available and thus, the introduced TBox normal form
can be assumed w.l.o.g. also for finite satisfiability.
      </p>
      <p>The semantics for Horn-SHIQ is given as usual in terms of interpretations I. For a
given TBox T and a concept inclusion C v D, we write T j= C v D if I j= C v D
for all models I of T , and T j= n C v D if the same holds for all finite models. We
recall that, in Horn-SHIQ, (un)satisfiability and subsumption can be mutually reduced
to each other in polynomial time, and that this also holds in the finite. The following
examples show that, in Horn-SHIQ, finite and unrestricted reasoning do not coincide.
Example 1. Let T = f A v 9r:B; B v 9r:B; B v (6 1 r &gt;); A u B v ? g. Then
A is satisfiable w.r.t. T , but not finitely satisfiable. In fact, when d 2 AI in some model
I of T , then the CI B v 9r:B and functionality assertion on r enforces an infinite
chain r(d; d1); r(d1; d2); : : : with d 2 AI , d 62 BI and d2; d3; 2 BI .
Let T 0 = fA1 v 9r:A2; A2 v 9r:(A1 u B); &gt; v (6 1 r &gt;)g. The reader might want
to convince herself that T 6j</p>
      <p>0 = A1 v B, but T 0 j= n A1 v B.</p>
      <p>Eliminating At-Least Restrictions
The usual normal form for Horn-SHIQ does not comprise at-least restrictions, that is,
CIs of the form K v (&gt; n r K0) are not allowed. This is achieved by replacing each
such CI with</p>
      <p>K v 9r:Bi;</p>
      <p>Bi v K0;</p>
      <p>Bi u Bj v ?
1
i &lt; j
n
(1)
where each Bi is a fresh concept name. If infinite models are admitted, it is quite easy to
see that this translation preserves the satisfiability of all concept names in T , exploiting
the tree model property of Horn-SHIQ. For finite satisfiability, the same construction
works, but a more refined argument is needed to show this.</p>
      <p>Proposition 2. Let T 0 be obtained from T by replacing the CI K v (&gt; n r K0) with
the CIs (1), and let A be a concept name from T . Then A is finitely satisfiable w.r.t. T iff
A is finitely satisfiable w.r.t. T 0.</p>
      <p>Proof. The “if” direction is trivial since every model of T 0 is also a model of T . For the
“only if” direction, let I be a finite model of T with AI 6= ;. We construct a finite model
J of T 0 with AJ 6= ; by taking n copies of I and ‘rewiring’ all role edges across the
concept names Bi can be interpreted in a non-conflicting way.</p>
      <p>Specifically, since I satisfies K v (&gt; n r K0) we can choose a function succ :
KI f0; : : : ; n 1g ! I such that the following conditions are satisfied:
– for all d 2 KI and i &lt; n: (d; succ(d; i)) 2 rI and succ(d; i) 2 (K0)I ;
– for all d 2 KI and i &lt; j &lt; n: succ(d; i) 6= succ(d; j).</p>
      <sec id="sec-2-1">
        <title>Then define the desired interpretation J by setting</title>
        <p>J = fdi j d 2</p>
        <p>I and i &lt; ng
EJ = fdi j d 2 EI and i &lt; ng
BiJ = fdi j d 2</p>
        <p>I g
sJ = f(di; ei) j (d; e) 2 sI and i &lt; ng
for all E 2 NC n fB0; : : : ; Bn 1g
for all i &lt; n
for all s 2 NR n frg
rJ = f(di; ei) j (d; e) 2 rI ; i &lt; n; and d 2= KI or e 6= succ(d; j) for any jg
[ f(di; e(i+j) mod n) j (d; e) 2 rI ; i; j &lt; n; and e = succ(d; j)g
It remains to verify that J is indeed a model of T 0. Clearly, the CIs in (1) are satisfied.
Moreover, it is not hard to verify that all concept inclusions in T are satisfied by J ,
using the fact that I is a model of T and the construction of J . o
From now on, we can thus safely assume that TBoxes do not contain at-least restrictions.
Note that the above translation is polynomial only if the numbers n in at-least restrictions
are coded in unary. The same is of course true in unrestricted reasoning with
HornSHIQ, where typically the same normal form is used.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Reduction to Unrestricted Satisfiability</title>
      <p>We give a reduction of finite satisfiability to unrestricted satisfiability based on the
completion of TBoxes with certain reversed cycles. Let T be a Horn-SHIQ TBox.
A finmod cycle in T is a sequence K1; r1; K2; r2; : : : ; rn 1; Kn; with K1; : : : ; Kn
conjunctions of concept names and r1; : : : ; rn 1 (potentially inverse) roles that satisfies
Kn = K1 and</p>
      <p>T j= Ki v 9ri:Ki+1 and T j= Ki+1 v (6 1 ri Ki)
for 1
i &lt; n:
By reversing a finmod cycle K1; r1; K2; r2; : : : ; rn 1; Kn in a TBox T , we mean to
extend T with the concept inclusions</p>
      <p>Kj+1 v 9rj :Kj and Kj v (6 1 rj Kj+1)
Thus, (A1 u B); r; A2; r; (A1 u B) is a finmod cycle in T 0, which is reversed to</p>
      <sec id="sec-3-1">
        <title>Another finmod cycle in T 0 is A1; r; A2; r; A1, reversed to</title>
        <p>A2 v 9r :A1;</p>
        <p>A1 v 9r :A2;</p>
        <p>A2 v (6 1 r A1);</p>
        <p>A1 v (6 1 r A2):
Note that Tf0 contains A1 v 9r :A2, A2 v 9r:(A1 u B), and A2 v (6 1 r A1).
Consequently Tf0 j= A1 v B, in correspondence with T 0 j= n A1 v B.</p>
        <p>The following result is the main result of this paper. It shows that TBox completion
indeed provides a reduction from finite satisfiability to unrestricted satisfiability.
Theorem 4. Let T be a Horn-SHIQ TBox and A a concept name. Then A is finitely
satisfiable w.r.t. T iff A is satisfiable w.r.t. the completion Tf of T .</p>
        <p>The “only if” direction of Theorem 4 is an immediate consequence of the observation
that all CIs added by the TBox completion are actually entailed by the original TBox in
finite models.</p>
        <p>Lemma 5. Let K1; r1; : : : ; rn 1; Kn a finmod cycle in T , then for every 1
T j= n Ki+1 v 9ri :Ki and T j= n Ki v (6 1 ri Ki+1).
i &lt; n,
jKiI j = jKiI+1j, KI</p>
        <p>i
verify that KiI (6 1 ri Ki+1)I and KiI+1
Proof. We have to show that, if K1; r1; : : : ; rn 1; Kn is a finmod cycle in T and I is a
finite model of T , then KiI (6 1 ri Ki+1)I and KiI+1 (9ri :Ki)I for 1 i &lt; n.
We first note that, by the semantics of Horn-SHIQ, we must have jK1I j jKnI j,
thus Kn = K1 yields jK1I j = = jKnI j. Fix some i with 1 i &lt; n. Using
(9ri:Ki+1)I , and KiI+1 (6 1 ri Ki)I , it is now easy to
o
(9ri :Ki)I , as required.</p>
        <p>The “if” direction of Theorem 4 is much more demanding to prove. It requires to
construct a finite model of A and T based on the assumption that there is a (possibly
infinite) model of A and Tf . Such a construction is presented in the next section.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Constructing Finite Models</title>
      <p>We show that the completion Tf of T captures all finite entailments of T , that is, we
prove the “if” direction of Theorem 4 above.</p>
      <p>Assume that the concept name A is satisfiable w.r.t. Tf . Let CN(T ) denote the set of
concept names used in T . A subset t CN(T ) is a type for T if there is a (potentially
infinite) model I of T and a d 2 I such that tpI (d) := fA 2 CN(T ) j d 2 AI g
is identical with t. We use TP(T ) to denote the set of all types for T . Our aim is to
construct a finite model I of Tf (and thus also of T ) that realizes all types in TP(T ).
Note that since A is satisfiable w.r.t. Tf , there is a type t for T with A 2 t. Since this
type is realized in the finite model I of T that we construct, it follows that A is finitely
satisfiable w.r.t. T as desired.</p>
      <p>Before we give details of the construction of I, we introduce some relevant notation
and preliminary results. For all t; t0 2 TP(Tf ) and roles r, we write
– t !r t0 if Tf j= t v 9r:t0 and t0 is maximal with this property;
– t !r1 t0 if t !r t0 and Tf j= t0 v (6 1 r t);
– t 1$r1 t0 if t !r1 t0 and t0 !r1 t.
– t )r1 t0 if t !r1 t0 and there are s t and s0</p>
      <p>Tf j= t0 v 9r :t does not hold.
t0 such that s 1$r1 s0, but
A type partition is a set P</p>
      <sec id="sec-4-1">
        <title>TP(T ) that is minimal with the following conditions:</title>
        <p>– P is non-empty;
– if t 2 P and t 1$r1 t0, then t0 2 P .</p>
        <p>We set P P 0 if there are t 2 P and t0 2 P 0 with t0 ( t. We will later be referring
to the strict partial order that is obtained by taking the transitive closure of , denoted
by +. A proof of the following observation can be found in the appendix.
Lemma 6.</p>
        <p>+ is a strict partial order.</p>
        <p>As a last bit of notation, if
= s 1$r1 s0, then we use
to denote s0 1$r1</p>
        <p>Constructing the Model
We construct I by starting with an initial interpretation and then exhaustively applying
four completion steps that we denote with (c1) to (c4). While constructing the sequence,
we will make sure that the following invariants are satisfied:
(i1) for each d 2 I , we have tpI (d) 2 TP(Tf );
(i2) if (d; d0) 2 rI , then tpI (d) !r tpI (d0) or tpI (d0) !r
(i3) if Tf j= K v (6 1 r K0), then I j= K v (6 1 r K0).
tpI (d);
We shall prove in Section 4.2 that each of the steps (c1) to (c4) indeed preserves these
invariants.</p>
        <p>The initial interpretation I is defined by introducing an element for every type,
intepreting the concept names in the obvious way, and interpreting all role names as
empty: I = TP(Tf ); AI = ft 2 TP(Tf ) j A 2 tg; rI = ;. The four completion steps
are described in detail below. We prefer to apply rules with smaller numbers, that is, if
completion steps (ci) and (cj) are both applicable and i &lt; j, then we apply (ci) first.
(c1) Select a d 2 I such that tpI (d) )r1 t, and d 2= (9r:t)I .</p>
        <p>Add a fresh domain element e, and modify the extension of concept and role names
such that tpI (e) = t and (d; e) 2 rI .
(c2) Select a type partition P that is minimal w.r.t. the order +, a
s 2 P , and an element d 2 I such that d 2 sI and d 2= (9r:s0)I .
For each s 2 P , set ns = jfd 2
Reserve fresh domain elements</p>
        <p>I j d 2 sI gj. Let nmax = maxfns j s 2 P g.
:= fds;i j s 2 P and ns &lt; i
nmaxg:</p>
      </sec>
      <sec id="sec-4-2">
        <title>For each s 2 P , define a set of s-instances</title>
        <p>Is = fd 2</p>
        <p>I j d 2 sI g [ fds;i j ns &lt; i</p>
        <p>nmaxg:
= s 1$r1 s0 with s; s0 2 P separately. Thus, fix such
To proceed, we treat each
a . Define</p>
        <p>R := f(d; e) 2 rI j d 2 sI and e 2 s0I g:
We first note that it is a consequence of invariant (i3) that
( ) the relation R is functional and inverse functional.</p>
        <p>In fact, let (d; e1); (d; e2) 2 R . Then (d; e1); (d; e2) 2 rI , d 2 sI , and e1; e2 2
s0I . By , we have Tf j= s v (6 1 r s0). Thus, (i3) yields e1 = e2. Inverse
functionality can be shown analogously.</p>
        <p>Let R1 be the domain of R , and let R2 be the range. By ( ), we have jR1 j = jR2 j.
By definition of , we have jIsj = jIs0 j. Moreover, R1 Is and R2 Is0 . We can
thus choose a bijection between Is n R1 and Is0 n R2 . Now extend I as follows:
add all domain elements in ;
extend rI with , for each = s 1$r1 s0;
extend rI with the converse of , for each = s 1$r1 s0;
interpret concept names so that tpI (ds;i) = s for all ds;i 2
.
(c3) Select a d 2 I such that tpI (d) !r1 t and d 2= (9r:t)I .</p>
        <p>Add a fresh domain element e, and modify the extension of concept and role names
such that tpI (e) = t and (d; e) 2 rI .
(c4) Select a d 2 I such that tpI (d) !r t and d 2= (9r:t)I .</p>
        <p>Add the edge (d; t) to rI , where t is the element for the type t introduced in the
initial interpretation I.</p>
        <p>We briefly discuss the main effects of prioritizing the completion steps. It is important to
prefer (c1) over (c2): together with the preference of type partitions that are minimal w.r.t.</p>
        <p>+ in (c2), this ensures that when (c2) is executed on type partition P , = s 1$r1 s0
with s; s0 2 P , and d 2 Is n R1 , then not only tpI (d) s, but actually tpI (d) = s.
This central property, put as Lemma 7 below, is essential to guarantee preservation
of invariants (i2) and (i3) by execution of (c2). Preferring (c1) and (c2) over (c3)
ensures that, when (c3) is executed, then there are no s tpI (d) and s0 t such that
s 1$r1 s0; and preferring (c3) over (c4) ensures that, when (c4) is executed, then we
have Tf 6j= tpI (d) v (6 1 r t). These statements are provided here only to help in
understanding the model construction. A formal proof is omitted at this point, but it can
be recovered from the proofs given in the subsequent sections.
Application of (c1) preserves all invariants. It is obvious that the invariants (i1) and
(i2) are preserved with each single application of (c1). We have to show that the same
is true for (i3). Assume that completion processed d 2 I with tpI (d) )r1 t, and that
e is the fresh domain element added. Assume to the contrary of what is to be shown
that Tf j= K v (6 1 r K0) and there is a e0 2 I distinct from e such that d 2 KI ,
(d; e0) 2 rI , and e; e0 2 K0I . According to (i2), we distinguish the following cases:
– tpI (d) !r tpI (e0)</p>
        <p>Then Tf j= tpI (d) v 9r:tpI (e0) and tpI (e0) is maximal with this property. Since
tpI (d) !r t, we additionally have Tf j= tpI (d) v 9r:t. Since K tpI (d) and
e; e0 2 K0I implies K0 tpI (e0) \ t, a simple semantic argument shows that
Tf j= K v 9r:(tpI (e0) [ t). The maximality of tpI (e0) thus implies t tpI (e0),
in contradiction to the fact that d 2= (9r:t)I was true before the completion step.
– tpI (e0) !r tpI (d).</p>
        <p>Then Tf j= tpI (e0) v 9r :tpI (d) and, additionally, we have Tf j= tpI (d) v 9r:t.
Since K tpI (d) and K0 tpI (e0) \ t, a simple semantic argument shows that
Tf j= tpI (e0) v t. Since tpI (e0) is a type for Tf by (i1), it follows that t tpI (e0).</p>
        <p>This contradicts the fact that d 2= (9r:t)I was true before the completion step.</p>
        <sec id="sec-4-2-1">
          <title>Application of (c2) preserves all invariants. Invariant (i1) is clearly preserved by</title>
          <p>each single application of (c2). We have to prove that the same is true for (i2) and (i3).
First, we show that the following property holds:</p>
        </sec>
        <sec id="sec-4-2-2">
          <title>Lemma 7. If</title>
          <p>= s 1$r1 s0 and d 2 Is n R1 , then tpI (d) = s.</p>
          <p>To show that (i2) is preserved by step (c2), consider an arbitrary pair (d; d0) 2 rI that
has been added in a step (c2). Hence (d) = d0, i.e., there is some = s 1$r1 s0 such
that d 2 Is n R1 and d0 2 Is0 n R2 . From Lemma 7, we obtain tpI (d) = s. Analogously,
considering 0 = s0 1$r1 s and the fact d0 2 Is0 n R2 = Is0 n R10 , we obtain from
Lemma 7 that tpI (d0) = s0. Consequently, s 1$r1 s0 yields tpI (d) !r tpI (d0) and
tpI (d0) !r tpI (d).</p>
          <p>We now show that (i3) is preserved by step (c2). Let Tf j= K v (6 1 r K0), and
assume to the contrary of what is to be shown that, after some application of (c2), there
are (d; d1); (d; d2) 2 rI with d 2 KI , d1; d2 2 K0I , and d1 6= d2. We distinguish the
following cases:
– (d; d1) was added by an application of (c2), (d; d2) was not. By the former, there is
= s 1$r1 s0 such that d 2 Is n R1 , d1 2 Is0 n R2 , and (d; d1) 2 . By Lemma 7,
d 2 Is n R1 yields tpI (d) = s. Moreover, d1 2 Is0 n R2 implies d1 2 Is0 n R1 ,
and thus another application of Lemma 7 yields tpI (d1) = s0.</p>
          <p>Since (d; d2) was not added by step (c2), (i2) gives the following subcases:
tpI (d) !r tpI (d2). Thus Tf j= tpI (d) v 9r:tpI (d2) and tpI (d2) is maximal
with this property. Since tpI (d) = s and by , Tf j= tpI (d) v 9r:tpI (d2).
Using the facts that Tf j= K v (6 1 r K0), K tpI (d) = s, K0 tpI (d2),
and K0 tpI (d1) = s0, an easy semantic argument shows that Tf j= tpI (d) v
9r:(tpI (d2) [ s0). The maximality of tpI (d2) thus yields s0 tpI (d2). Thus,
d 2 (9r:s0)I was true before step (c2) was applied, which is a contradiction to
d 2= R1 .
tpI (d2) !r tpI (d). Then Tf j= tpI (d2) v 9r :s. By , we have Tf j= s v
9r:s0. Since K s, K tpI (d2), K tpI (d1) = s0, and Tf j= K v (6
1 r K0), a simple semantic argument shows that s0 tpI (d2). This again
means that d 2 (9r:s0)I was true before step (c2) was applied, in contradiction
to d 2= R1 .
– both (d; d1) and (d; d2) were added by an application of (c2). Then there are 1 and
2, such that, for i 2 f1; 2g, we have
i = si 1$r1 s0i;
(d; di) 2
i ;
d 2 Isi n R1i ;
di 2 Is0i n R2i :
Applying Lemma 7 to i and d 2 Isi n R1i yields si = tpI (d), for i 2 f1; 2g.
Consequently, s1 = s2. We next show s01 = s02, thus 1 = 2.</p>
          <p>For uniformity, we use s to denote s1 and s2. From i, we obtain Tf j= s v 9r:si
and si is maximal with this property, for i 2 f1; 2g. Note that di 2 Is0i n R2i
implies di 2 Is0i n R1 . Applications of Lemma 7 to i and di 2 Is0i n R1 yield
i i
tpI (di) = si. Using the facts that Tf j= s v 9r:si for i 2 f1; 2g, K tpI (d) = s,
K0 tpI (di) = si for i 2 f1; 2g, and Tf j= K v (6 1 r K0), an easy semantic
argument shows that Tf j= s v 9r:(s1 [ s2). The maximality of s1 and s2 thus
implies s1 = s2 as desired.</p>
          <p>Hence, 1 = 2 and (d; d1); (d; d2) 2 1 . Since 1 is a bijection, we obtain
d1 = d2, a contradiction.</p>
        </sec>
        <sec id="sec-4-2-3">
          <title>Application of (c3) and (c4) preserves all invariants. It is obvious that the invariants</title>
          <p>(i1) and (i2) are preserved with each single application of (c3) or (c4). To show that the
same is true for (i3), we can use the same proof as for (c1) because the assumptions of
(c3) and (c4) differ from that of (c1) in weakening tpI (d) )r1 t to tpI (d) !r1 t and
tpI (d) !r t, respectively, which is sufficient for that proof.
4.3</p>
          <p>Termination of Model Construction
We show that the constructed interpretation I is indeed finite.</p>
          <p>Proposition 8.</p>
          <p>I is finite.</p>
          <p>Proof. To analyze the termination of the construction of I, we associate a certain directed
tree T = (V; E) with the model I that makes explicit the way in which I was constructed.
Note that only the completion steps (c1) to (c3) introduce new domain elements and
that (c1) and (c3) introduce a single new element with each application whereas (c2)
introduces a whole (finite) set of fresh elements. Also note that each application of a
completion step is triggered by a single domain element d for which some existential
restriction is not yet satisfied. Now, the tree T is defined as follows:
– V consists of all subsets of I that were introduced together by a single application
of one of the completion steps (c1) to (c3); additionally, the set of all elements in
the initial interpretation I is a node in V (in fact, the root node);
– the edge (v; v0) is included in E if the elements in v0 were introduced by an
application of a completion step to an element d of v. We call this element the trigger of v0
and denote it with dv0 .</p>
          <p>To show that I is finite, it clearly suffices to show that V is finite. The outdegree of T
is finite since every rule application introduces only finitely many elements. By Ko¨nig’s
Lemma, it thus remains to show that T is of finite depth. We first note that an easy
analysis of the completion steps (c1) to (c3) reveals the following property:
( ) if (v1; v2); (v2; v3) 2 E, then there are d0; : : : ; dk 2 v2 and roles r0; : : : ; rk 1 s.t.
tpI (di) !r1i tpI (di+1) for all i &lt; k.</p>
          <p>d0 = dv2 2 v1, d1; : : : ; dk 2 v2, and dk = dv3 2 v2;
Now assume towards a contradiction that the depth of T is larger than 2jTP(Tf )j + 1
and choose a concrete path v1 vn with v1 the root of T and n &gt; 2jTP(Tf )j + 1. This
path gives rise to a corresponding sequence of triggers dv1 ; : : : ; dvn . Since the length
of this sequence exceeds 2jTP(Tf )j, there must be i; j with 1 i &lt; j n and such
that tpI (dvi ) = tpI (dvj ) and j &gt; i + 1. By applying ( ) multiple times, we obtain a
sequence of domain elements d0; : : : ; dk and roles r0; : : : ; rk 1 such that
1. d0 = dvi 2 vi 1, d1 2 vi, and dp = dvj 2 vj 1;
2. tpI (d`) !r1` tpI (d`+1) for ` &lt; k.
3. d0; : : : ; dk contains all elements dvi ; : : : ; dvj .</p>
          <p>Since tpI (dvi ) = tpI (dvj ) and by Point 2, tpI (d0); r0; : : : ; rk 1; tpI (dk) is a finmod
cycle in Tf . Since all finmod cycles in Tf have been reversed, we have
tpI (d0) 1$r10 tpI (d1) 1$r11
1 1
$rn 1 tpI (dn):
(y)
In the appendix, we prove the following claim:
Claim. If step (c1) or step (c3) is triggered by d 2 I and generates a new element
e 2 I , then there is no role r such that tpI (d) 1$r1 tpI (e).</p>
          <p>Since dvi 2 vi 1 and d1 2 vi, d1 was generated by the application of a completion step
triggered by d0. By (y) and the claim, this completion step must be (c2). By definition
of (c2) and (y), all elements d1; : : : ; dk have been introduced by exactly this application
of (c2). This leads to a contradiction: we have d1 2 vi and dk 2 vj 1, and since
j &gt; i + 1, vi 6= vj 1. Consequently, d1 and dk were introduced by different applications
of completion steps. o
tpI (d) !r tpI (d0). Then Tf j= tpI (d) v 9r:tp(d0) and tp(d0) is maximal
with this property. Since Tf j= K v 8r:K0, we have that Tf j= tpI (d) v
9r:tp(d0) [ K0, and the maximality of tp(d0) yields K0 tp(d0), and thus
d0 2 K0I .
tpI (d0) !r tpI (d). Then Tf j= tpI (d0) v 9r :tpI (d). Together with Tf j=
K v 8r:K0, we topbIt(adin0)Tafnjd=thtupsI (dd0 02) vKK0I .0. Since tpI (d0) 2 TP(Tf ) by (i1),
we obtain K0
– C = (6 1 r K)0. Follows from (i3).
o
5</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>
        We have presented a reduction from finite satisfiability in Horn-SHIQ to unrestricted
satisfiability, extending the technique introduced for DL-LiteF in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. As discussed
in the introduction, we believe that our technique is a more suitable basis for efficient
implementation than the techniques for full ALCQI and SHIQ based on exponentially
large systems of inequalities.
      </p>
      <p>As future work, we plan to develop a consequence based calculus for finite
satisfiability in Horn-SHIQ and to extend the results obtained in this paper from finite
satisfiability to answering conjunctive queries over ABoxes, assuming finite models.
While we believe that the constructions given in this paper can be easily extended to
instance query answering over ABoxes, the treatment of full conjunctive queries requires
significant modification of the model construction.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Suntisrivaraporn. CEL -</surname>
          </string-name>
          <article-title>a polynomial-time reasoner for life science ontologies</article-title>
          .
          <source>In Proc. of IJCAR-06</source>
          , volume
          <volume>4130</volume>
          <source>of LNCS</source>
          , pages
          <fpage>287</fpage>
          -
          <lpage>291</lpage>
          . Springer,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>M.</given-names>
            <surname>Bienvenu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>First-order rewritability of atomic queries in Horn description logics</article-title>
          .
          <source>In Proc. of IJCAI-13. IJCAI/AAAI</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          .
          <article-title>Finite model reasoning in description logics</article-title>
          .
          <source>In Proc. of KR-96</source>
          , pages
          <fpage>292</fpage>
          -
          <lpage>303</lpage>
          . Morgan Kaufmann,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>S.S.</given-names>
            <surname>Cosmadakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.C.</given-names>
            <surname>Kanellakis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.Y.</given-names>
            <surname>Vardi</surname>
          </string-name>
          .
          <article-title>Polynomial-time implication problems for unary inclusion dependencies</article-title>
          .
          <source>J. ACM</source>
          ,
          <volume>37</volume>
          (
          <issue>1</issue>
          ):
          <fpage>15</fpage>
          -
          <lpage>46</lpage>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>T.</given-names>
            <surname>Eiter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ortiz</surname>
          </string-name>
          , M. Sˇimkus, T.-K. Tran, and
          <string-name>
            <given-names>G.</given-names>
            <surname>Xiao</surname>
          </string-name>
          .
          <article-title>Towards practical query answering for Horn-SHIQ</article-title>
          .
          <source>In Proc. of DL-12</source>
          , volume
          <volume>846</volume>
          <source>of CEUR-WS.org</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>U.</given-names>
            <surname>Hustadt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Motik</surname>
          </string-name>
          , and
          <string-name>
            <given-names>U.</given-names>
            <surname>Sattler</surname>
          </string-name>
          .
          <article-title>Reasoning in description logics by a reduction to disjunctive datalog</article-title>
          .
          <source>J. Autom. Reasoning</source>
          ,
          <volume>39</volume>
          (
          <issue>3</issue>
          ),
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kazakov</surname>
          </string-name>
          .
          <article-title>Consequence-driven reasoning for Horn SHIQ ontologies</article-title>
          .
          <source>In Proc. of IJCAI-09</source>
          , pages
          <fpage>2040</fpage>
          -
          <lpage>2045</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kazakov</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Kr o¨tzsch, and</article-title>
          <string-name>
            <surname>F.</surname>
          </string-name>
          <article-title>Simancˇ´ık. Unchain my E L reasoner</article-title>
          .
          <source>In Proc. of DL-11</source>
          , volume
          <volume>745</volume>
          <source>of CEUR-WS.org</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Sattler</surname>
          </string-name>
          , and
          <string-name>
            <surname>L. Tendera.</surname>
          </string-name>
          <article-title>The complexity of finite model reasoning in description logics</article-title>
          .
          <source>Information and Computation</source>
          ,
          <volume>199</volume>
          :
          <fpage>132</fpage>
          -
          <lpage>171</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>Non-uniform data complexity of query answering in description logics</article-title>
          .
          <source>In Proc. of KR-12</source>
          . AAAI Press,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>M. Ortiz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Rudolph</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <article-title>Sˇ imkus. Query answering in the Horn fragments of the description logics SHOIQ and SROIQ</article-title>
          .
          <source>In Proc. of IJCAI-11</source>
          , pages
          <fpage>1039</fpage>
          -
          <lpage>1044</lpage>
          . IJCAI/AAAI,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. L.
          <string-name>
            <surname>Pacholski</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Szwast</surname>
            , and
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Tendera</surname>
          </string-name>
          .
          <article-title>Complexity results for first-order two-variable logic with counting</article-title>
          .
          <source>SIAM J. Comput.</source>
          ,
          <volume>29</volume>
          (
          <issue>4</issue>
          ):
          <fpage>1083</fpage>
          -
          <lpage>1117</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. I.
          <string-name>
            <surname>Pratt-Hartmann</surname>
          </string-name>
          .
          <article-title>Complexity of the two-variable fragment with counting quantifiers</article-title>
          .
          <source>J. of Logic, Language and Information</source>
          ,
          <volume>14</volume>
          (
          <issue>3</issue>
          ):
          <fpage>369</fpage>
          -
          <lpage>395</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>Finite model reasoning in DL-Lite</article-title>
          .
          <source>In Proc. of ESWC-08</source>
          , volume
          <volume>5021</volume>
          <source>of LNCS</source>
          , pages
          <fpage>215</fpage>
          -
          <lpage>229</lpage>
          . Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>