<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Axiomatizing ℰℒgKfp-General Concept Inclusions in the Presence of Untrusted Individuals</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Daniel Borchmann</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>TU Dresden</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>To extract terminological knowledge from data, Baader and Distel have proposed an efective method that allows for the extraction of a base of all valid general concept inclusions of a given finite interpretation. In previous works, to be able to handle small amounts of errors in our data, we have extended this approach to also extract general concept inclusions which are “almost valid” in the interpretation. This has been done by demanding that general concept inclusions which are “almost valid” are those having only an allowed percentage of counterexamples in the interpretation. In this work, we shall further extend our previous work to allow the interpretation to contain both trusted and untrusted individuals, i. e. individuals from which we know and do not know that they are correct, respectively. The problem we then want to solve is to find a compact representation of all terminological knowledge that is valid for all trusted individuals and is almost valid for all others.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Constructing description logic knowledge bases is an expensive, time-consuming
and often cumbersome task. The main reason for this is that it almost always has
to be conducted by human experts, since they provide the means to (more or less)
reliably transform informally stated knowledge into a formal reformulation. Thus,
methods to assist human experts in constructing these ontologies would be highly
helpful. For example, one could provide a first, rough approximation of the desired
knowledge base, i. e. a sketch of the ontology, that the expert then could build upon.</p>
      <p>
        The extraction of such first knowledge bases is a widely studied topic.
Interesting approaches in this direction have been proposed by Völker and Niepert [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
with their method of Statistical Schema Induction, which relies on methods from
data mining to extract certain terminological axioms from data given as a set
of RDF triples. Another approach has been discussed by Baader and Distel [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],
which proposes a method to extract a finite base of all valid ℰℒK-general concept
inclusions (GCIs) of a given finite interpretation, relying on methodology from
the mathematical field of formal concept analysis. Such a finite base could then
be used as a starting point for the terminological part of a future knowledge base.
      </p>
      <p>The latter approach has a particular appeal: since bases are complete in the sense
that all valid GCIs expressible in ℰℒK already follow from it, such a base provides
* Supported by DFG Graduiertenkolleg 1763 (QuantLA)
all the knowledge which is present in the data. However, this approach also has
a drawback: since only valid GCIs are considered, even very rare counterexamples
could invalidate otherwise correct (and useful) GCIs, leading the algorithm to
come up with a lot of special cases to circumvent such errors.</p>
      <p>
        Thus, based upon the approach of Baader and Distel, the author has developed
an extension that allows for finding finite bases of “almost valid” GCIs of a given
ifnite interpretation [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">8, 6, 7</xref>
        ], an extension which turns out to be somehow similar
to Statistical Schema Induction. To define the notion of “almost valid”, we use the
notion of confidence from data mining [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]: GCIs are “almost valid” if and only if their
confidence is high enough. In other words, the amount of counterexamples for such
a GCI has to be rather small compared to all individuals to which this GCIs applies.
      </p>
      <sec id="sec-1-1">
        <title>However, within this extension, all individuals in a given interpretation are</title>
        <p>suspected to be erroneous, an assumption which may not be correct in general.</p>
      </sec>
      <sec id="sec-1-2">
        <title>We thus extend these results in the present work to include the possibility that we</title>
        <p>“trust” certain individuals, i. e. that we state a-priori that they are correct as they
are. This implies that all GCIs which are invalidated by such trusted individuals
are false in our original domain of interest, and should thus not be included in an
according knowledge base.</p>
        <p>
          The target description logic we would like to consider is ℰℒK, i. e. we would like
to extract bases of ℰℒK-GCIs which are “almost valid” for untrusted individuals
and valid for trusted individuals. However, due to technical reasons, we have to
take a detour and need to also consider ℰℒgKfp, an extension of ℰℒK by means of
cyclic concept descriptions. More precisely, we shall show in this work how to find
bases of ℰℒgKfp-GCIs in the presence of untrusted individuals. To then obtain from
this base of ℰℒgKfp-GCIs a base of ℰℒK-GCIs we can use results from [
          <xref ref-type="bibr" rid="ref10 ref6">6, 10</xref>
          ] showing
theses ℰℒgKfp-bases can efectively be turned into equivalent ℰℒK-bases. However,
due to space restrictions, we shall not consider this transformation here.
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>The paper is structured as follows. Firstly, we shall introduce the necessary</title>
        <p>
          notions from the field of description logics as they are needed in this work. More
precisely, we shall introduce the logics ℰℒK and ℰℒgKfp as well as the notion of
model-based most-specific concept descriptions from [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Then, in Section 3, we
shall give a formalization of “almost valid” GCIs and the notion of “trusted” and
“untrusted” individuals. Based upon this, we shall give a first finite base of all such
        </p>
      </sec>
      <sec id="sec-1-4">
        <title>GCIs in Section 4.3, and extend this result in Section 4.4 to allow us to perform this computation by means of formal concept analysis. Finally, we close this work by some conclusions and outlook on future work.</title>
        <p>2</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <sec id="sec-2-1">
        <title>We introduce the necessary definitions from the field of description logics that are</title>
        <p>necessary for our further considerations. More precisely, we shall introduce the
description logics ℰℒK and ℰℒgKfp in Section 2.1 as well as the notion of general
concept inclusions in Section 2.2. In Section 2.3 we shall discuss the notion of
model-based most-specific concept descriptions .</p>
        <sec id="sec-2-1-1">
          <title>Let  and  be two disjoint sets. An ℰℒ-concept description  is formed</title>
          <p>according to the rule</p>
          <p>::  | J |  [  | D.
where  P  and  P . An ℰℒK-concept description is either K or an ℰℒ-concept
description.</p>
        </sec>
        <sec id="sec-2-1-2">
          <title>The semantics of ℰℒK-concept descriptions are defined through the notion of</title>
          <p>interpretations. An interpretation ℐ p ℐ , ℐ q consists of a set  ℐ of individuals
and an interpretation function ℐ which maps concept names  P  to subsets
ℐ of  ℐ and role name  P  to subsets ℐ of  ℐ  ℐ .</p>
        </sec>
        <sec id="sec-2-1-3">
          <title>The interpretation function ℐ can naturally be extended to all ℰℒK-concept</title>
          <p>descriptions ,  in the usual way, i. e.</p>
          <p>Kℐ</p>
          <p>H,</p>
          <p>Jℐ
 ℐ ,
p [ qℐ
ℐ X ℐ ,
pD.qℐ</p>
          <p>t  P  ℐ | D P  ℐ : p, q P ℐ ^  P ℐ u,
where  P . We shall call the set ℐ the extension of  in ℐ. For each  P  ℐ
we shall say that  satisfies  if and only if  P ℐ .</p>
        </sec>
        <sec id="sec-2-1-4">
          <title>The main distinction between ℰℒgKfp and ℰℒK is that the former allows for cyclic</title>
          <p>concept descriptions. More formally, let  be a set disjoint to both  and .
We call this set the set of defined concept names . A concept definition is then an
expression of the form  , where  P  and  is an ℰℒK-concept description
which can use in the place of concept names from  also concept names from
. Let  be a finite set of concept definitions where each defined concept names
appears exactly once on the left-hand side of a concept definition in  . Then 
is called a cyclic TBox. We define p q as the set of all concept names from 
that appear in some concept definition in  .</p>
        </sec>
        <sec id="sec-2-1-5">
          <title>Then, an ℰℒgfp-concept description is defined as a pair p,  q, where  is a</title>
          <p>cyclic TBox and  P  appears on the left-hand side of a concept definition
p q P  . An ℰℒgKfp-concept description is either of the form K or is an
ℰℒgfp-concept description.</p>
        </sec>
        <sec id="sec-2-1-6">
          <title>As an example of an ℰℒgKfp-concept description we can consider the concept</title>
          <p>description , where

p, t</p>
          <p>Cat [ Dhunts.
Mouse [ Dhunts. uq.</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>Intuitively,  represents all cats hunting a mouse which again hunts a cat — a</title>
        <p>common situation in the old cartoon series “Tom and Jerry.” In other words, given
an interpretation ℐ, the semantics of  can be understood as follows: let ℐ and
ℐ be the -maximal subsets of  ℐ such that
– all individuals in ℐ satisfy Cat and have a hunts-successor in ℐ , and
– all individuals in ℐ satisfy Mouse and have a hunts-successor in ℐ .</p>
      </sec>
      <sec id="sec-2-3">
        <title>It can be shown that those maximal sets always exist. We then define ℐ : ℐ .</title>
        <sec id="sec-2-3-1">
          <title>To define the semantics for ℰℒgKfp formally and in general, it is necessary to</title>
          <p>
            resolve the cyclic dependencies within ℰℒgKfp-concept descriptions. This is done
using greatest fixpoint semantics [
            <xref ref-type="bibr" rid="ref13 ref2">13, 2</xref>
            ]. Since the exact definition of the semantics
          </p>
          <p>K
of ℰℒgfp exceeds the space available for this publication, we leave out the details
and refer the reader to the corresponding publications.
2.2</p>
          <p>General Concept Inclusions</p>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>Terminological knowledge is represented in the form of general concept inclusions</title>
        <p>(GCIs). These are expressions of the form   , where  and  are concept
descriptions. We speak of ℰℒK-GCIs if both  and  are ℰℒK-concept descriptions,
and likewise for other description logics.</p>
      </sec>
      <sec id="sec-2-5">
        <title>The semantics of GCIs is again defined via interpretations. We say that an</title>
        <p>interpretation ℐ is a model of a GCI    if and only if ℐ  ℐ . If ℐ is a model
of   , then we shall also say that    is valid in ℐ. If    is valid in
every possible interpretation we shall say that  is subsumed by . This fact is
commonly also denoted by    (as a statement, not an expression).</p>
        <sec id="sec-2-5-1">
          <title>If ℒ is a set of GCIs and    is another GCI, then we say that ℒ entails</title>
          <p>  and write ℒ |ù p  q, if and only if for every interpretation  which
is a model of all GCIs in ℒ,  is also a model of   .</p>
        </sec>
      </sec>
      <sec id="sec-2-6">
        <title>Since we are going to extract terminological knowledge from interpretations,</title>
        <p>we can ask for the set of all ℰℒgKfp-GCIs for which ℐ is a model. We shall denote
this set Thpℐq and call it the theory of ℐ. A base of ℐ is a set ℬ  Thpℐq such that
every GCI from Thpℐq is already entailed by ℬ.
2.3</p>
        <p>Model-Based Most-Specific Concept Descriptions</p>
        <sec id="sec-2-6-1">
          <title>Let us fix a finite interpretation ℐ p ℐ , ℐ q. A first attempt to extract termino</title>
          <p>logical knowledge from ℐ is to consider the set Thpℐq of all valid ℰℒK-GCIs of ℐ.</p>
        </sec>
        <sec id="sec-2-6-2">
          <title>However, it is quite easy to see that the number of valid ℰℒK-GCIs of ℐ is infinite</title>
          <p>in general, for if    is such a GCI, then D.  D. for  P  is a valid
ℰℒK-GCI as well. Therefore, we cannot simply use the set Thpℐq as a TBox for
an ontology. Instead, we try to find a finite base ℬ of Thpℐq. Such a base would
contain the same information as Thpℐq, and since it is finite it could be used as a</p>
        </sec>
      </sec>
      <sec id="sec-2-7">
        <title>TBox for an ontology. One of the main results from [10] is to prove that such bases always exist, and also to give an efective method to compute them. These results have been achieved using formal concept analysis [11].</title>
      </sec>
      <sec id="sec-2-8">
        <title>The central notion that has been introduced in [10] for bringing together the</title>
        <p>description logic ℰℒK and formal concept analysis is the one of model-based
mostspecific concept descriptions . Roughly, for a set    ℐ we are looking for a
concept description that describes the individuals in  in the best way possible.</p>
        <sec id="sec-2-8-1">
          <title>More formally, we call an ℰℒK-concept description  a model-based most-specific concept description for  (in ℰℒK) if and only if</title>
          <p>–   ℐ and
– for all ℰℒK-concept descriptions  such that   ℐ , it is true that   .</p>
        </sec>
      </sec>
      <sec id="sec-2-9">
        <title>It is clear that, if a model-based most-specific concept description for  exists, it is</title>
        <p>unique up to equivalence. In this case, we shall denote it with ℐ , since computing
model-based most-specific concept descriptions is somehow “dual” to computing
extensions ℐ of concept descriptions . If  is a concept description, we shall
write ℐℐ instead of pℐ qℐ , and likewise for ℐℐ pℐ qℐ for    ℐ .</p>
      </sec>
      <sec id="sec-2-10">
        <title>However, it may happen that model-based most-specific concept descriptions</title>
        <p>in ℰℒK may not exists. To see this, consider the example interpretation</p>
        <p>H, 
t  u,  ℐ
t  u, ℐ
t p, q u.</p>
        <sec id="sec-2-10-1">
          <title>Then all ℰℒK-concept descriptions D.D.. . . D.J have the set  t  u in their</title>
          <p>
            extension, but there does not exist a most specific one. On the other hand, it can be
seen quite easily that the ℰℒgKfp-concept description p, t  D. uq is a
modelbased most-specific concept description of , if we consider ℰℒgfp instead of ℰℒK in
K
the above definition. Indeed, this not a coincidence, as the following result shows.
Theorem 1 (Lemma 4.5 of [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]). Let ℐ be a finite interpretation and    ℐ .
Then there exists a model-based most-specific concept description of  in ℰℒgKfp.
          </p>
        </sec>
      </sec>
      <sec id="sec-2-11">
        <title>Because of this result we shall implicitly assume from now on that we are talking</title>
        <p>about model-based most-specific concept descriptions in ℰℒgKfp.</p>
      </sec>
      <sec id="sec-2-12">
        <title>Before we continue, let us note two facts about model-base most-specific concept</title>
        <p>
          descriptions. Firstly, if  is an ℰℒgKfp-concept description, then   ℐℐ is always
a valid GCI of ℐ. Furthermore, ℐℐ is subsumed by , again for each ℰℒgKfp-concept
description . Establishing these two facts is not dificult, see [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Confidence and Trusted Individuals</title>
      <sec id="sec-3-1">
        <title>Recall that we have fixed a finite interpretation ℐ. A first attempt to learn termi</title>
        <p>nological knowledge from ℐ was to consider Thpℐq. However, this approach is not
really applicable if we regard this interpretation as somehow faulty, in the sense
that for certain individuals we are not quite sure whether their concept names or
role successors are correct.</p>
        <sec id="sec-3-1-1">
          <title>Example 2. In [9] the approach by Baader and Distel has been applied to an</title>
          <p>interpretation ℐDBpedia that has been extracted from RDF Triples from the
DBpedia data set by considering the child-relation only. This interpretation had 5262
individuals and ThpℐDBpediaq can be axiomatized by 1252 GCIs.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>However, the GCI Dchild.J  Person was found not to be valid in ℐDBpedia,</title>
        <p>because of the presence of 4 erroneous counterexamples. However, such a GCI
would be considered correct, and it would be preferable if it could be learned,
too. Furthermore, 2547 individuals in ℐDBpedia were positive examples for this</p>
      </sec>
      <sec id="sec-3-3">
        <title>GCI, i. e. they satisfied both Dchild.J and Person. One could then argue that the</title>
      </sec>
      <sec id="sec-3-4">
        <title>4 counterexamples are “not enough” to invalidate the GCI Dchild.J  Person, i. e.</title>
        <p>this GCI should have been learned as well.</p>
        <sec id="sec-3-4-1">
          <title>However, it might be the case that for certain individuals we are indeed sure</title>
          <p>that the are correct. These individuals we shall call trusted individuals, whereas
the other ones are called untrusted individuals.</p>
          <p>Example 3. We consider a classical example here. Suppose that we want to learn
terminological knowledge about birds, and we consider all GCIs were the number
of counterexamples is “small” compared to the number of positive examples (we
shall give a formalization for this shortly). Then, the GCI Birds  Flies could be
extracted from the data set, as counterexamples to this are quite rare (penguins,
ostriches and the like). However, these counterexamples are proper counterexamples,
i. e. they are correct.</p>
        </sec>
      </sec>
      <sec id="sec-3-5">
        <title>We can understand the set of all untrusted individuals as a subinterpretation of ℐ.</title>
        <p>Definition 4. Let ℐ
ℐ is an interpretation 
p ℐ , ℐ q be a finite interpretation. A subinterpretation of</p>
        <p>p  ,  q such that
i.     ℐ ,
ii. t  P  |  P  u t  P  |  P ℐ u for all  P   , and
iii. t  P   | p, q P  u  t  P  ℐ | p, q P ℐ u for all  P   and  P .</p>
        <sec id="sec-3-5-1">
          <title>As already stated in the introduction, we are interested in extracting a compact</title>
          <p>representation of all GCIs of ℐ which hold for all trusted individuals and are “almost
valid” for all untrusted ones. To formalize the notion of “almost valid”, we shall
make use of the notion of confidence as follows.</p>
          <p>Definition 5. Let ℐ be a finite interpretation, and let    be an ℰℒgKfp-GCI.
Then the confidence of    in ℐ is defined as
confℐ p  q :
#1
|p[qℐ|
|ℐ|
if ℐ</p>
          <p>H
otherwise</p>
        </sec>
      </sec>
      <sec id="sec-3-6">
        <title>It can be seen quite easily that confℐ p  q is the largest number  ¤ 1 such</title>
        <p>that
|p [ qℐ | ¥  |ℐ |.</p>
        <sec id="sec-3-6-1">
          <title>We shall now formally define the set of GCIs we are interested in.</title>
          <p>Definition 6. Let ℐ be a finite interpretation, let  be a subinterpretation of ℐ
and let  P r0, 1s. The set of confident GCIs in ℐ with untrusted individuals  is
defined to be the following set of ℰℒgKfp-GCIs:</p>
          <p>Thpℐ,  q :
t    | ℐ z   ℐ z</p>
          <p>and |p [ qℐ X   | ¥  |ℐ X   | u.</p>
        </sec>
      </sec>
      <sec id="sec-3-7">
        <title>Note that we cannot define Thpℐ,  q to consist of all GCIs satisfying conf p </title>
        <p>q ¥  instead of |p [ qℐ X   | ¥  |ℐ X   |. This is because ℐ X   
is not true in general. However, if one restricts one attention to closed
subinterpretations  , i. e. subinterpretations where no role edges exist between elements
from   and  ℐ z  and vice versa, then ℐ X    is indeed true, as it
has been shown in [10, Lemma 6.12].</p>
        <p>
          Another observation about Thpℐ,  q is that this set is not necessarily closed
under entailment. In other words, it is possible that Thpℐ,  q |ù p  q but
p  q R Thpℐ,  q. However, we can consider GCIs in Thpℐ,  q as valid
in a certain domain of interest, and counterexamples in  as erroneous. Then
p  q R Thpℐ,  q, which just means that the amount of counterexamples in
 is too high, indicates that either the data ℐ is not suficiently good enough for
learning    (if it is not valid in our domain) or that some GCIs in Thpℐ,  q
are actually not valid in our domain. In both cases, further refinement is necessary,
for the first case by checking completeness with respect to the underlying domain
of interest [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], and in the second case by finding reasons for errors in Thpℐ,  q,
for example using axiom pinpointing [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
4
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Axiomatizing GCIs in the Presence of Untrusted</title>
    </sec>
    <sec id="sec-5">
      <title>Individuals</title>
      <p>
        We shall now show how to axiomatize Thpℐ,  q. To this end, we show in
Sections 4.3 and 4.4 how one can compute finite bases of Thpℐ,  q, i. e. finite sets
ℬ  Thpℐ,  q such that all GCIs in Thpℐ,  q are already entailed by ℬ. To this
end, we shall make use of results obtained by Baader and Distel [
        <xref ref-type="bibr" rid="ref10 ref3">10, 3</xref>
        ], which are
introduced in Section 4.2. As these results make use of formal concept analysis,
we shall first introduce some notions of it first.
4.1
      </p>
      <p>Formal Concept Analysis</p>
      <sec id="sec-5-1">
        <title>Formal concept analysis is a subfield of mathematical order theory that is usually</title>
        <p>concerned with investigating diferent representations of complete lattices. However,
is has also been used in diferent areas, as in data mining and classification.</p>
      </sec>
      <sec id="sec-5-2">
        <title>The fundamental notion of formal concept analysis [11] is the one of a formal</title>
        <p>context. A formal context is a triple K p, , q where  and  are sets and
    . Intuitively, we think of the set  as the set of objects, the set  as the set
of attributes, and of the set  as an incidence relation between objects and attributes.</p>
        <sec id="sec-5-2-1">
          <title>If  P  and  P  , we say that  has the attribute  if and only if p, q P . A for</title>
          <p>mal context L p, ,  q is a subcontext of K if and only if   ,   ,   .</p>
        </sec>
        <sec id="sec-5-2-2">
          <title>For a set of objects   , we can ask for the set 1 of common attributes of</title>
          <p>all objects in , i. e.
1
t  P  | @ P  : p, q P  u.</p>
        </sec>
        <sec id="sec-5-2-3">
          <title>The set 1 is called the derivation of  in K. Dually, we define for    the set</title>
          <p>1 of all objects satisfying all attributes in .</p>
        </sec>
      </sec>
      <sec id="sec-5-3">
        <title>In the formal context K we can ask the question whether an object  that has all</title>
        <p>attributes from a set 1 always also has all attributes from a set 2, i. e. whether
it is true that  P 11 implies  P 12. We can formalize this question as follows: we
call a pair p1, 2q with 1, 2   an implication, usually written as 1 Ñ 2.</p>
        <sec id="sec-5-3-1">
          <title>We shall say that the implication 1 Ñ 2 is valid in K if and only if 11  12.</title>
        </sec>
        <sec id="sec-5-3-2">
          <title>The set of all implications 1 Ñ 2 with 1, 2   is denoted by Impp q, and</title>
          <p>the set of all valid implications of K is called its theory and is denoted by ThpKq.</p>
        </sec>
        <sec id="sec-5-3-3">
          <title>A set ℒ  Impp q of implications entails an implication 1 Ñ 2 if and only if</title>
          <p>for all contexts in which ℒ is true, the implication 1 Ñ 2 is true as well. A set ℒ </p>
        </sec>
        <sec id="sec-5-3-4">
          <title>ThpKq is called a base of K if and only if all valid implications of K are entailed by ℒ.</title>
        </sec>
        <sec id="sec-5-3-5">
          <title>It is obvious that we can extend each set   ThpKq to a base of K, provided</title>
          <p>that K is finite. We call ℒ  ThpKq a base with background knowledge  if and
only if ℒ Y  is a base of K. If  H, then bases with background knowledge 
are just bases of K.</p>
        </sec>
        <sec id="sec-5-3-6">
          <title>A particularly interesting base is the so called canonical base CanpK, q of</title>
        </sec>
        <sec id="sec-5-3-7">
          <title>K, for some given background knowledge . Making the definition of this base</title>
          <p>
            understandable is hardly possible in the given amount of space, and we refer the
reader to [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ] for further details. However, we still note that it is well known that
          </p>
        </sec>
        <sec id="sec-5-3-8">
          <title>CanpK, q is a base of smallest cardinality with background knowledge , i. e.</title>
          <p>every set of implications with less elements than CanpK, q cannot be a base of</p>
        </sec>
        <sec id="sec-5-3-9">
          <title>K with background knowledge .</title>
          <p>4.2</p>
          <p>Results by Baader and Distel</p>
        </sec>
      </sec>
      <sec id="sec-5-4">
        <title>To connect description logics with formal concept analysis, Baader and Distel make</title>
        <p>use of the notion of of model-based most-specific concept descriptions, and define a
formal context Kℐ which captures all relevant information on the valid ℰℒgKfp-GCIs
of ℐ. For this, we define
ℐ :
t K u Y  Y t D.ℐ |  P ,    ℐ , 
H u.</p>
        <sec id="sec-5-4-1">
          <title>The set ℐ has the particular property that all model-based most-specific concept</title>
          <p>
            descriptions in ℐ are expressible in terms of ℐ [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]: let us denote for a set   ℐ
with d  the concept description that is either J, when  is empty, or 1 [ . . . [ ,
when  t 1, . . . ,  u. Then a concept description  is expressible in terms of
ℐ if and only if there exists a set   ℐ such that  d  .
          </p>
        </sec>
        <sec id="sec-5-4-2">
          <title>Having defined the set ℐ , we can introduce the notion of the induced context of</title>
          <p>ℐ. This is the formal context Kℐ p ℐ , ℐ , ∇q, where for all  P  ℐ and  P ℐ ,
it is true that ∇ if and only if  P ℐ .</p>
        </sec>
        <sec id="sec-5-4-3">
          <title>The derivation operators in Kℐ , the interpretation function ℐ and model-based</title>
          <p>most-specific concept descriptions are closely related.</p>
          <p>Proposition 7. Let    ℐ ,    . Then ℐ
the derivations are conducted in Kℐ .</p>
          <p>
            With some more technical machinery it can even be shown that pd qℐℐ d 2 is
true for each   ℐ , i. e. model-based most-specific concept descriptions and the
derivation operators in the induced context of ℐ are closely related. This connection
also extends to the canonical base of Kℐ and ℰℒgKfp-bases of ℐ.
d 1 and 1
pd qℐ , where
Theorem 8 (5.13 and 5.18 of [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]). Let ℐ be a finite interpretation and define
ℐ
          </p>
          <p>t t  u Ñ t  u | ,  P ℐ ,    u.</p>
          <p>Then the set
ℬCan :</p>
          <p>t l   pl  qℐℐ | p Ñ  2q P CanpKℐ , ℐ q u
is a finite ℰℒgKfp-base of ℐ of minimal cardinality.</p>
        </sec>
        <sec id="sec-5-4-4">
          <title>Note that the set ℐ contains knowledge which is trivially true in every interpre</title>
          <p>tation, but not necessarily in every formal context. More precisely, if   , then
we do not need to state this GCI explicitly in a base. However, the corresponding
implication t  u Ñ t  u may not necessarily be valid in every formal context,
and therefore bases of K have to contain information to entail such implications.</p>
        </sec>
        <sec id="sec-5-4-5">
          <title>However, we are only interested in bases of ℐ, which is why we add the set ℐ as</title>
          <p>background knowledge.
4.3</p>
          <p>A First Finite Base</p>
        </sec>
      </sec>
      <sec id="sec-5-5">
        <title>The aim of this section is to provide a first result for axiomatizing the interpretation</title>
        <p>ℐ with untrusted individuals  . To this end we shall make use of ideas from M.</p>
      </sec>
      <sec id="sec-5-6">
        <title>Luxenburger’s theory of partial implications in formal contexts [12]. Due to space</title>
        <p>restrictions, however, we shall not recall his ideas in the original setting here, but
shall discuss them in the appropriate reformulation to our setting only.</p>
      </sec>
      <sec id="sec-5-7">
        <title>The two ideas from Luxenburger’s work we shall make use of are actually quite simple. First of all, we observe that</title>
        <sec id="sec-5-7-1">
          <title>Therefore, to finitely axiomatize the set Thpℐ,  q, i. e. to find a finite set</title>
        </sec>
        <sec id="sec-5-7-2">
          <title>Thpℐ,  q that entails all GCIs in Thpℐ,  q, it sufices to find a finite base</title>
        </sec>
        <sec id="sec-5-7-3">
          <title>Thpℐ,  qz Thpℐq, since then the set</title>
          <p>ℬ 
 of
Thpℐq  Thpℐ,  q.</p>
          <p>ℬCan Y 
will be a finite base of Thpℐ,  q.</p>
        </sec>
        <sec id="sec-5-7-4">
          <title>We thus concentrate on finding such a finite base  of Thpℐ,  qz Thpℐq, i. e. on finding a finite set   Thpℐ,  qz Thpℐq which already entails all GCIs in Thpℐ,  qz Thpℐq. For this, we make two observations for GCIs p  q P</title>
          <p>Thpℐ,  qz Thpℐq.</p>
        </sec>
      </sec>
      <sec id="sec-5-8">
        <title>Firstly, it is true that</title>
        <p>p  q P Thpℐ,  q ðñ pℐℐ  ℐℐ q P Thpℐ,  q.</p>
        <sec id="sec-5-8-1">
          <title>This is mainly due to the fact that ℐℐℐ ℐ and p [  qℐ pℐℐ [  ℐℐ qℐ</title>
          <p>are true for all ℰℒgKfp-concept descriptions ,  , as can be seen easily from the
definition of model-based most-specific concept descriptions. We thus obtain
ℐ z   ℐ z</p>
          <p>ðñ ℐℐℐ z   ℐℐℐ z 
|p [ qℐ X   | ¥  |ℐ X   | ðñ |pℐℐ [ ℐℐ qℐ X   | ¥  |ℐℐℐ X   |</p>
        </sec>
        <sec id="sec-5-8-2">
          <title>Secondly, if ℬ is a base of Thpℐq, then</title>
          <p>ℬ Y t ℐℐ  ℐℐ u |ù p  q,
since ℬ |ù p  ℐℐ q, and ℐℐ  .</p>
        </sec>
      </sec>
      <sec id="sec-5-9">
        <title>Thus, let us define</title>
        <p>Confpℐ, ,  q : t ℐℐ  ℐℐ | pℐℐ  ℐℐ q P Thpℐ,  q u,</p>
        <sec id="sec-5-9-1">
          <title>It has been shown in [10] that if ℐ is finite, there exist only finitely many diferent</title>
          <p>model-based most-specific concept descriptions up to equivalence. Therefore, we
immediately obtain the following result:
Theorem 9. Let ℐ be a finite interpretation,  be a subinterpretation of ℐ and
 P r0, 1s. If ℬ is a finite base of ℐ, then the set</p>
          <p>ℬ Y Confpℐ, ,  q
is a finite base of Thpℐ,  q.
4.4</p>
          <p>Computing a Base by means of FCA
The result of the previous section provides us with an efective method to compute
bases of confident GCIs in the presence of trusted and untrusted individuals. In
this section, we shall extend these result to allow us a computation of such a base
using methods from formal concept analysis. More precisely, we shall see that we
can view our initial data ℐ and  as a certain formal context, and computing a
base of ℐ with untrusted individuals  can then be understood as computing a
certain set of implications from this context.</p>
          <p>There are two reasons why we are interested in such a transformation. Firstly, the
overall goal of our considerations is to adapt the algorithm of attribute exploration
from formal concept analysis to our setting of extracting terminological knowledge
from interpretations (see also Section 5). Secondly, such a reformulation might
allow us to use high performance algorithms from the field of data mining to support
us in our task, because the field of formal concept analysis can be understood as
a theoretical foundation of data mining [15].</p>
        </sec>
      </sec>
      <sec id="sec-5-10">
        <title>The actual transformation is now quite simple: as for general concept inclusions,</title>
        <p>we can define the notion of confidence for implications as well, i. e. if K is a formal
context and  Ñ  an implication then confKp Ñ q : 1 if 1 H and
confKp Ñ q |p Y q1|{|1| otherwise. We shall denote with ImppKq the set
of all implications from Impp q which have confidence at least  in K.</p>
        <sec id="sec-5-10-1">
          <title>The transformation then uses the induced context Kℐ of ℐ and asserts that a certain set of implications yields a base of Thpℐ,  q.</title>
          <p>Theorem 10. Let ℐ be a finite interpretation,  be a subinterpretation of ℐ and
 P r0, 1s. Let us denote for    ℐ with Kℐ | the subcontext of Kℐ restricted to
the object set , and let us define</p>
          <p>If then ℒ   is complete for  , then</p>
          <p>ℒ : t l   l  | p Ñ q P ℒ u</p>
        </sec>
      </sec>
      <sec id="sec-5-11">
        <title>A proof of this theorem can be found in Section A of the appendix.</title>
        <p>5</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusions and Further Work</title>
      <p>In this work we have presented an extension to our previous work of axiomatizing
general concept inclusions using confidence, that takes into account the existence
of trusted individuals from which we can be sure that their properties in the given
data are correct. Essentially, we not only consider general concept inclusions whose
confidence is high enough, but we also require for such general concept inclusions
that they are not falsified by trusted individuals. For these general concept
inclusions we have discussed the existence and the computation of bases. In particular,
we have shown that we can utilize methodology from the field of formal concept
analysis to obtain such bases. This has the particular appeal that in the long run we
might be able to utilize fast data mining algorithms to compute bases of confident
general concept inclusions which respect trusted individuals.</p>
      <p>
        The considerations we have presented in this work are part of a larger attempt
to apply the algorithm of attribute exploration from formal concept analysis to
our setting of confident general concept inclusions. This algorithm has been used
before to complete knowledge bases [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Essentially, the algorithm generates logical
consequences which can be drawn from the given knowledge and asks the expert
for their validity. If the expert declines, then the given knowledge is incomplete
and the expert has to provide additional information. This algorithm is repeated
as long as new consequences can be generated.
      </p>
      <p>An attribute exploration algorithm in the setting of confident general concept
inclusions would provide an attempt to solve the issue of rare counterexamples which
comes from the heuristic approach of confident general concept inclusions, as it has
been indicated in Example 3: if we consider all general concept inclusions whose
conifdence is “high enough”, we may neglect certain counterexamples which are appear
seldom in the data but are correct otherwise. An attribute exploration algorithm
could help to resolve this issue by consulting the expert whether certain confident
general concept inclusions are valid or not. If the expert is then asked a general
concept inclusion which has rare counterexample, the expert could add (or mark) these
counterexamples as trusted individuals, thus prohibiting the algorithm from
considering them as errors. Thus, the approach of confident general concept inclusions may
benefit from an attribute exploration algorithm, and its design is part of future work.</p>
      <sec id="sec-6-1">
        <title>Acknowledgments The author is deeply grateful for the thorough, constructive and motivating comments by the anonymous reviewers, who helped improving the quality of this work.</title>
      </sec>
      <sec id="sec-6-2">
        <title>Antoniou et al. Vol. 6643. Lecture Notes in Computer Science. Springer,</title>
        <p>2011, pp. 124–138. isbn: 978-3-642-21033-4.
[15] Mohammed Javeed Zaki and Mitsunori Ogihara. “Theoretical foundation of
association rules”. In: SIGMOD’98 Workshop on Research Issues in Data
Mining and Knowledge Discovery (SIGMOD-DMKD’98). 1998, pp. 1–8.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Proofs for Section 4.4</title>
      <sec id="sec-7-1">
        <title>For completeness, we provide the proofs we have omitted in Section 4.4.</title>
        <p>The main idea of the proof is to show that set d ℒ satisfies d ℒ |ù ℬCan Y</p>
        <sec id="sec-7-1-1">
          <title>Confpℐ, ,  q, and thus Theorem 9 yields the desired result. A crucial cornerstone</title>
          <p>in this argumentation is the following lemma.</p>
          <p>Lemma 11. Let  be a set of concept descriptions, and let ℒ  Impp q and
p Ñ  q P Impp q. Then ℒ |ù p Ñ  q implies d ℒ |ù pd   d  q, where
l ℒ : t l   l  | p Ñ  q P ℒ u.</p>
          <p>Proof. Let  p  ,  q be an interpretation such that  |ù d ℒ. Let us define
a formal context K , p  , , ∇q via</p>
          <p>∇ ðñ  P 
for all  P   ,  P  .</p>
          <p>We shall show now that K , |ù ℒ. Let p Ñ  q P ℒ. Then pd q  pd  q ,
since  |ù d ℒ. It is not hard to see that pd q 1, where the derivation has
been done in K , . Therefore, it is true that 1   1, and thus K , |ù p Ñ  q.</p>
          <p>Since ℒ |ù p Ñ  q, it is true that K , |ù p Ñ  q, i. e. 1   1. As
pd q 1, it is thus true that pd q  pd  q , i. e. d ℒ |ù pd   d  q.
Theorem 11. Let ℐ be a finite interpretation,  be a subinterpretation of ℐ and
 P r0, 1s. Let us denote for    ℐ with Kℐ | the subcontext of Kℐ restricted to
the object set , and let us define
If ℒ   is complete for  , then
is a base of Thpℐ,  q.</p>
        </sec>
      </sec>
      <sec id="sec-7-2">
        <title>Proof. We need to show two claims, namely</title>
        <p>i. d ℒ  Thpℐ,  q and
ii. d ℒ is complete for Thpℐ,  q.</p>
        <p>: ImppKℐ |  q X ThpKℐ | ℐz  q.</p>
        <p>l ℒ : t l   l  | p Ñ q P ℒ u</p>
        <p>For the first claim we need to show that for every GCI pd   d  q P d ℒ it
is true that
i. |pd  [ d  qℐ X   | ¥  |pd qℐ X   |
ii. pd qℐ z   pd  qℐ z</p>
        <p>|p Y  q1 X   | ¥  |1 X   |
Since pd qℐ
1, we obtain</p>
        <p>|plp Y  qqℐ X   | ¥  |pl qℐ X   |,
and from dp Y  q</p>
        <p>d  [ d  it follows immediately that
|pl  [ l  qℐ X   | ¥  |pl qℐ X   |
as required.</p>
        <sec id="sec-7-2-1">
          <title>For the second subclaim, we observe that 1z    1z  , since  Ñ  is</title>
          <p>valid in the formal context Kℐ | ℐz  . Since 1 pd qℐ and  1 pd  qℐ the
claim follows.</p>
          <p>We have therefore shown that d ℒ  Thpℐ,  q.</p>
          <p>We now show that d ℒ is complete for Thpℐ,  q. To this end, we shall show that
i. d ℒ |ù pd   pd  qℐℐ q for all   ℐ , in particular, d ℒ |ù ℬCan;
ii. d ℒ |ù Confpℐ, ,  q.
ℒ |ù p Ñ  2q.</p>
          <p>By Lemma 11, it follows that ℒ |ù pd   pd  2qq. Since pd  2q
obtain the validity of the subclaim.</p>
        </sec>
        <sec id="sec-7-2-2">
          <title>For the second subclaim, let pℐℐ  ℐℐ q P Confpℐ, ,  q. We define  :</title>
          <p>ℐ ,  : ℐ . Then  ℐ d  1 and  ℐ d  1, so
pd  qℐℐ , we
ℒ |ù pl  1  l  1q.</p>
        </sec>
        <sec id="sec-7-2-3">
          <title>We show that ℒ |ù p 1 Ñ  1q. For this we recall that</title>
          <p>|pℐℐ [ ℐℐ qℐ X   | ¥  |pℐℐ qℐ X   |</p>
        </sec>
        <sec id="sec-7-2-4">
          <title>Now since d  1</title>
          <p>ℐ
ℐℐ and d  1
ℐℐ , we obtain
|pl  1 [ l  1qℐ X   | ¥  |pl  1qℐ X   |</p>
        </sec>
      </sec>
      <sec id="sec-7-3">
        <title>As shown before, this implies that</title>
        <p>|p 1 Y  1q1 X   | ¥  | 2 X   |,
where the derivations are conducted in Kℐ . In other words, it is true that
confKℐ|  p 1 Ñ  1q ¥ .</p>
        <p>Thus, ℒ |ù p 1 Ñ  1q, and Lemma 11 implies d ℒ |ù pd  1  d  1q, thus
d ℒ |ù p ℐ   ℐ q pℐℐ  ℐℐ q, as required.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Imielinski</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Swami</surname>
          </string-name>
          . “
          <article-title>Mining Association Rules between Sets of Items in Large Databases”</article-title>
          .
          <source>In: Proceedings of the ACM SIGMOD International Conference on Management of Data</source>
          .
          <year>1993</year>
          , pp.
          <fpage>207</fpage>
          -
          <lpage>216</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Franz</given-names>
            <surname>Baader</surname>
          </string-name>
          . “
          <article-title>Terminological Cycles in a Description Logic with Existential Restrictions”</article-title>
          .
          <source>In: Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence . (Acapulco</source>
          , Mexico). Ed.
          <article-title>by Georg Gottlob and Toby Walsh</article-title>
          . Morgan Kaufmann,
          <year>2003</year>
          , pp.
          <fpage>325</fpage>
          -
          <lpage>330</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Franz</given-names>
            <surname>Baader</surname>
          </string-name>
          and
          <string-name>
            <given-names>Felix</given-names>
            <surname>Distel</surname>
          </string-name>
          .
          <article-title>“A Finite Basis for the Set of ℰℒ-Implications Holding in a Finite Model”</article-title>
          .
          <source>In: Proceedings of the 6th International Conference on Formal Concept Analysis. (Montreal</source>
          , Canada).
          <source>Ed. by Raoul Medina and Sergei A. Obiedkov</source>
          . Vol.
          <volume>4933</volume>
          . Lecture Notes in Computer Science. Springer,
          <year>2008</year>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Franz</given-names>
            <surname>Baader</surname>
          </string-name>
          and
          <string-name>
            <given-names>Rafael</given-names>
            <surname>Peñaloza</surname>
          </string-name>
          . “Axiom Pinpointing in General Tableaux”. In: TABLEAUX. Ed. by
          <source>Nicola Olivetti</source>
          . Vol.
          <volume>4548</volume>
          . Lecture Notes in Computer Science. Springer,
          <year>2007</year>
          , pp.
          <fpage>11</fpage>
          -
          <lpage>27</lpage>
          . isbn:
          <fpage>978</fpage>
          -3-
          <fpage>540</fpage>
          -73098-9.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Franz</given-names>
            <surname>Baader</surname>
          </string-name>
          et al. “
          <article-title>Completing Description Logic Knowledge Bases using Formal Concept Analysis”</article-title>
          .
          <source>In: Proceedings of the Twentieth International Joint Conference on Artificial Intelligence</source>
          . AAAI Press,
          <year>2007</year>
          , pp.
          <fpage>230</fpage>
          -
          <lpage>235</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Daniel</given-names>
            <surname>Borchmann</surname>
          </string-name>
          .
          <article-title>Axiomatizing Confident ℰ ℒgKfp-GCIs of Finite Interpretations</article-title>
          .
          <source>Report MATH-AL-08-2012</source>
          . Dresden, Germany: Chair of Algebraic Structure Theory, Institute of Algebra, Technische Universität Dresden,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Daniel</given-names>
            <surname>Borchmann</surname>
          </string-name>
          .
          <article-title>Axiomatizing ℰℒK-Expressible Terminological Knowledge from Erroneous Data</article-title>
          . to appear
          <source>in: Proceedings of the Seventh Internation Conference on Knowledge Capture</source>
          ,
          <string-name>
            <surname>KCAP</surname>
          </string-name>
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Daniel</given-names>
            <surname>Borchmann</surname>
          </string-name>
          .
          <source>On Condfient GCIs of Finite Interpretations . LTCSReport</source>
          <volume>12</volume>
          -
          <fpage>06</fpage>
          . See http://lat.inf.tu-dresden.de/research/reports. html. Dresden:
          <article-title>Institute for Theoretical Computer Science</article-title>
          , TU Dresden,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Daniel</given-names>
            <surname>Borchmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>Felix</given-names>
            <surname>Distel</surname>
          </string-name>
          . “
          <article-title>Mining of ℰ ℒ-GCIs”</article-title>
          . In: ICDM Workshops. Ed.
          <article-title>by Myra Spiliopoulou et al</article-title>
          . IEEE,
          <year>2011</year>
          , pp.
          <fpage>1083</fpage>
          -
          <lpage>1090</lpage>
          . isbn:
          <fpage>978</fpage>
          -0-
          <fpage>7695</fpage>
          -4409-0.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Felix</given-names>
            <surname>Distel</surname>
          </string-name>
          .
          <article-title>“Learning Description Logic Knowledge Bases from Data Using Methods from Formal Concept Analysis”</article-title>
          .
          <source>PhD thesis</source>
          .
          <source>TU Dresden</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Bernhard</given-names>
            <surname>Ganter</surname>
          </string-name>
          and
          <string-name>
            <given-names>Rudolf</given-names>
            <surname>Wille</surname>
          </string-name>
          .
          <source>Formal Concept Analysis: Mathematical Foundations</source>
          . Berlin-Heidelberg: Springer,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Michael</given-names>
            <surname>Luxenburger</surname>
          </string-name>
          . “Implikationen,
          <article-title>Abhängigkeiten und Galois-Abbildungen”</article-title>
          .
          <source>PhD thesis</source>
          .
          <source>TH Darmstadt</source>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Bernhard</given-names>
            <surname>Nebel</surname>
          </string-name>
          . “Terminological Cycles:
          <article-title>Semantics and Computational Properties”</article-title>
          . In:
          <article-title>Principles of Semantic Networks</article-title>
          . Morgan Kaufmann,
          <year>1991</year>
          , pp.
          <fpage>331</fpage>
          -
          <lpage>362</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Johanna</given-names>
            <surname>Völker</surname>
          </string-name>
          and
          <string-name>
            <given-names>Mathias</given-names>
            <surname>Niepert</surname>
          </string-name>
          . “
          <article-title>Statistical Schema Induction”</article-title>
          .
          <source>In: The Semantic Web: Research and Applications - 8th Extended Semantic Web Conference, Proceedings, Part I. (Heraklion</source>
          , Crete, Greece). Ed.
          <article-title>by Grigoris For the first subclaim, we observe that confKℐ|  p Ñ  q ¥  for all p Ñ  q P ℒ, i</article-title>
          . e.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>