<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Proceedings of the Tenth International Conference on Concept Lattices and Their Applications</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>CLA Conference Series</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2013</year>
      </pub-date>
      <fpage>1983</fpage>
      <lpage>2013</lpage>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Laboratory L3i, University of La Rochelle, France
ISBN 978{2{7466{6566{8</p>
    </sec>
    <sec id="sec-2">
      <title>The Tenth International Conference on Concept Lattices and Their Applications</title>
    </sec>
    <sec id="sec-3">
      <title>La Rochelle, France October 15{18, 2013</title>
      <p>Edited by
CLA 2013
c paper author(s), 2013, for the included papers
c Manuel Ojeda-Aciego, Jan Outrata, Editors, for the volume
Copying permitted only for private and academic purposes.</p>
      <p>This work is subject to copyright. All rights reserved. Reproduction or
publication of this material, even partial, is allowed only with the editors' permission.
Page count:
Impression:
Edition:
First published: 2013
xii+306
50
1st
Published and printed by:
Laboratory L3i, University of La Rochelle, France</p>
      <sec id="sec-3-1">
        <title>Organization</title>
        <p>CLA 2013 was organized by the Laboratory L3i, University of La Rochelle.</p>
        <sec id="sec-3-1-1">
          <title>Steering Committee</title>
          <p>Radim Belohlavek
Sadok Ben Yahia
Jean Diatta
Peter Eklund
Sergei O. Kuznetsov
Engelbert Mephu Nguifo
Amedeo Napoli</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>Program Chairs</title>
          <p>Manuel Ojeda-Aciego
Jan Outrata</p>
        </sec>
        <sec id="sec-3-1-3">
          <title>Program Committee</title>
          <p>Cristina Alcalde
Jaume Baixeries
Radim Belohlavek
Sadok Ben Yahia
Anne Berry
Karell Bertet
Ana Burusco
Claudio Carpineto
Pablo Cordero
Jean Diatta
Felix Distel
Vincent Duquenne
Sebastien Ferre
Bernhard Ganter
Alain Gely
Robert Godin
Marianne Huchard
Dmitry I. Ignatov
Vassilis G. Kaburlasos
Jan Konecny
Stanislav Krajci
Palacky University, Olomouc, Czech Republic
Faculte des Sciences de Tunis, Tunisia
Universite de la Reunion, France
University of Wollongong, Australia
State University HSE, Moscow, Russia
LIMOS, University Blaise Pascal, Clermont-Ferrand,
France
INRIA NGE/LORIA, Nancy, France
Universidad de Malaga, Spain
Palacky University, Olomouc, Czech Republic
Univ del Pais Vasco, San Sebastian, Spain
Polytechnical University of Catalonia, Spain
Palacky University, Olomouc, Czech Republic
Faculte des Sciences de Tunis, Tunisia
LIMOS, Universite de Clermont Ferrand, France
L3i, Universite de La Rochelle, France
Universidad de Navarra, Pamplona, Spain
Fondazione Ugo Bordoni, Roma, Italy
Universidad de Malaga, Spain
Universite de la Reunion, France
TU Dresden, Germany
Universite Pierre et Marie Curie, Paris, France
Irisa/Universite de Rennes 1, France
TU-Dresden, Germany
University of Metz, France
Univeristy of Montreal, Canada
LIRMM, Montpellier, France
State University HSE, Moscow, Russia
TEI, Kavala, Greece
Palacky University, Olomouc, Czech Republic
University of P.J. Safarik, Kosice, Slovakia
Sergei O. Kuznetsov
Leonard Kwuida
Jesus Medina
Engelbert Mephu Nguifo
Rokia Missaoui
Amedeo Napoli
Lhouari Nourine
Sergei Obiedkov
Uta Priss
Olivier Raynaud
Sebastian Rudolph
Baris Sertkaya
Laszlo Szathmary
Petko Valtchev
Francisco Valverde
State University HSE, Moscow, Russia
Bern University of Applied Science, Switzerland
Universidad de Cadiz, Spain
LIMOS, University Blaise Pascal, Clermont Ferrand,
France
UQO, Gatineau, Canada
INRIA NGE/LORIA, Nancy, France
LIMOS, Universite de Clermont Ferrand, France
State University HSE, Moscow, Russia
Ostfalia University of Applied Sciences,
Wolfenbuttel, Germany
LIMOS, University of Clermont Ferrand, France
Institute AIFB, University of Karlsruhe, Germany
SAP Research Center, Dresden, Germany
University of Debrecen, Hungary
Universite du Quebec a Montreal, Canada
Universidad Nacional de Educacin a Distancia,
UNED Spain</p>
        </sec>
        <sec id="sec-3-1-4">
          <title>Additional Reviewers</title>
          <p>Michel Liquiere LIRMM, Montpellier, France
Mar a Eugenia Cornejo Pin~ero Universidad de Cadiz, Spain
Eloisa Ram rez Poussa Universidad de Cadiz, Spain
Alexis Irlande Universidad Nacional de Colombia, Colombia
Juan Carlos D az Moreno Universidad de Cadiz, Spain
Nader Mohamed Jelassi LIMOS, Clermont Universite, France &amp; URPAH,</p>
          <p>Faculty of Tunis, Tunisia</p>
        </sec>
        <sec id="sec-3-1-5">
          <title>Organization Committee</title>
          <p>Karell Bertet (chair)</p>
          <p>L3i, Universite de La Rochelle, France
Dwiajeng Andayani Universite de La Rochelle, France
Romain Bertrand L3i, Universite de La Rochelle, France
Mickael Coustaty L3i, Universite de La Rochelle, France
Ngoc Bich Dao L3i, Universite de La Rochelle, France
Christophe Demko L3i, Universite de La Rochelle, France
Cyril Faucher L3i, Universite de La Rochelle, France
Nathalie Girard LI, Universite de Tours, France
Clement Gurin L3i, Universite de La Rochelle, France
Muhammad Muzzamil Luqman L3i, Universite de La Rochelle, France
Jean-Marc Ogier L3i, Universite de La Rochelle, France
Christophe Rigaud L3i, Universite de La Rochelle, France
Kathy Theuil L3i, Universite de La Rochelle, France
Muriel Visani L3i, Universite de La Rochelle, France
CryptoLat - a Pedagogical Software on Lattice Cryptomorphisms and
Lattice Properties : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : :
Florent Domenach
A lattice-free concept lattice update algorithm based on *CbO : : : : : : : : : : 261</p>
          <p>Jan Outrata</p>
        </sec>
        <sec id="sec-3-1-6">
          <title>Short Papers</title>
          <p>Applying User-Guided, Dynamic FCA to Navigational Searches for
Earth Science Data and Documentation : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 275</p>
          <p>Bruce R. Barkstrom
A Collaborative Approach for FCA-Based Knowledge Extraction : : : : : : : : 281</p>
          <p>My Thao Tang and Yannick Toussaint
Towards Description Logic on Concept Lattices : : : : : : : : : : : : : : : : : : : : : : : 287</p>
          <p>Julia V. Grebeneva, Nikolay V. Shilov and Natalia O. Garanina
Computing Left-Minimal Direct Basis of implications : : : : : : : : : : : : : : : : : : 293
Pablo Cordero, Manuel Enciso, Angel Mora and Manuel</p>
          <p>Ojeda-Aciego
Comparing Performance of Formal Concept Analysis and Closed
Frequent Itemset Mining Algorithms on Real Data : : : : : : : : : : : : : : : : : : : : 299</p>
          <p>Lenka Piskova and Tomas Horvath
Author Index : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 305
Formal concept analysis has, for many years, laid claim to providing a formal
basis for an applied lattice theory. With the many di erent formalisms and
implementations, and their applications available today, this claim is stronger
than ever, as witnessed by increasing amount and range of publications in the
area.</p>
          <p>The International Conference \Concept Lattices and Their Applications (CLA)"
is being organized since 2002 with the aim of bringing together researchers
working on various approaches for studying and practically applying concept lattices.
The main aim of CLA is to bring together researchers (students, professors,
engineers) involved in all aspects of the study of concept lattices, from theory to
implementations and practical applications. As the diversity of the selected
papers shows, there is a wide range of theoretical and practical research directions,
ranging from algebra and logic to pattern recognition and knowledge discovery.
The Tenth edition of CLA was held in La Rochelle, France from October 15th
to October 18th, 2013. The event was organized and hosted by the Laboratory
L3i, University of La Rochelle.</p>
          <p>This volume includes the selected papers and the abstracts of 4 invited talks.
This year there were initially 37 submissions from which 22 included papers
were accepted as full papers and 5 as short papers. Thus, the program of the
conference consisted of four keynote talks given by the following distinguished
researchers: Ralph Freese, Bart Goethals, Michel Grabisch and Vincent Duquenne,
together with twenty-seven communications, including the full and short papers,
authored by researchers from thirteen countries (Belgium, Chile, Cyprus, Czech
Republic, Djibouti, Estonia, France, Germany, Mexico, Russia, Slovakia, Spain
and USA).</p>
          <p>The papers were reviewed by members of the Program Committee with the help
of the additional reviewers listed overleaf. We would like to thank them all for
their valuable assistance. It is planned that a selection of extended versions of
the best papers will be published in a renowned journal, after being subjected
again to a peer review.</p>
          <p>The success of such an event is mainly due to the hard work and dedication of a
number of people, and the collaboration of several institutions. We want to thank
the contributing authors, who submitted high quality works, to acknowledge the
help of members of the CLA Steering Committee, who gave us the opportunity
of chairing this edition, and to thank the Program Committee, the additional
reviewers, and the local Organization Committee. All of them deserve many
thanks for having helped to attain the goal of providing a balanced event with
a high level of scienti c exchange and a pleasant environment.</p>
          <p>We would also like to thank the following institutions, which have helped the
organization of the 10th CLA International Conference: Region of Poitou-Charentes,
Department of Charente Maritime, City of La Rochelle and University of La
Rochelle.</p>
          <p>Last but not least, most of our bureaucratic tasks related to paper submission,
selection, and reviewing have been minimized thanks to the EasyChair
conference system, and we should therefore not forget to mention its help after the list
of \o cial sponsors".</p>
          <p>October 2013
Manuel Ojeda-Aciego</p>
          <p>Jan Outrata</p>
          <p>Program Chairs of CLA 2013</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Pro jective Lattices</title>
        <p>Ralph Freese
Department of Mathematics, University of Hawaii</p>
        <p>Honolulu, HI 96822, USA
ralph@math.hawaii.edu
A lattice L is projective in a variety V of lattices if whenever
(1)
(2)
f : K</p>
        <p>L
g : L → K
is an epimorphism, there is a homomorphism
such that f (g(a)) = a for all a ∈ L.</p>
        <p>
          Projective lattices are characterized in [
          <xref ref-type="bibr" rid="ref12 ref24 ref3">3</xref>
          ] by four conditions. This talk will
discuss two of them that are of current interest.
        </p>
        <p>If g in (2) is only required to be order-preserving, it is called an isotone
section of the epimorphism (1). We will characterize which lattices L have an
isotope section for every epimorphism (1). We will use this to characterize when
the ordinal (linear) sum of two projective lattices in V will be projective and
give some surprising examples.</p>
        <p>
          The second of the four conditions characterizing projectivity we will discuss
is join refinement and the dependency relation; the so-called D-relation. This
condition and some closely related concepts are used in many parts of lattice
theory. Besides free lattice, projective lattices and finitely presented lattices, it
has applications to transferable lattices, congruence lattices of lattices,
representing finite lattices as congruence lattices of finite algebras, and ordered direct
bases in database theory [
          <xref ref-type="bibr" rid="ref1 ref10 ref11 ref2 ref23">1, 2</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>Carti cation: from Similarities to Itemset</title>
      </sec>
      <sec id="sec-3-4">
        <title>Frequencies</title>
        <p>Bart Goethals
University of Antwerp, Belgium</p>
        <p>bart.goethals@ua.ac.be
Abstract. We propose a transformation method to circumvent the problems with high
dimensional data. For each object in the data, we create an itemset of the k-nearest
neighbors of that object, not just for one of the dimensions, but for many views of
the data. On the resulting collection of sets, we can mine frequent itemsets; that is,
sets of points that are frequently seen together in some of the views on the data.
Experimentation shows that nding clusters, outliers, cluster centers, or even subspace
clustering becomes easy on the carti ed dataset using state-of-the-art techniques in
mining interesting itemsets.</p>
        <p>Cooperative Games on Lattices</p>
        <p>In cooperative game theory, for a given set of players N, TU-games are functions
v : 2N → R which express for each nonempty coalition S ⊆ N of players the best they
can achieve by cooperation.</p>
        <p>In the classical setting, every coalition may form without any restriction, i.e., the
domain of v is indeed 2N . In practice, this assumption is often unrealistic, since some
coalitions may not be feasible for various reasons, e.g., players are political parties with
divergent opinions, or have restricted communication abilities, or a hierarchy exists
among players, and the formation of coalitions must respect the hierarchy, etc.</p>
        <p>
          Many studies have been done on games defined on specific subdomains of 2N , e.g.,
antimatroids [
          <xref ref-type="bibr" rid="ref1 ref10">1</xref>
          ], convex geometries [
          <xref ref-type="bibr" rid="ref12 ref13 ref24 ref25 ref3 ref4">3, 4</xref>
          ], distributive lattices [
          <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
          ], or others [
          <xref ref-type="bibr" rid="ref11 ref14 ref2 ref23 ref26 ref5">2, 5</xref>
          ]. In
this paper, we mainly deal with the case of distributive lattices. To this end, we assume
that there exists some partial order on N describing some hierarchy or precedence
constraint among players, as in [
          <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
          ]. We say that a coalition S is feasible if the coalition
contains all its subordinates, i.e., i ∈ S implies that any j i belongs to S as well. Then
feasible coalitions are downsets, and by Birkhoff’s theorem, form a distributive lattice.
From now on, we denote by F the set of feasible coalitions, assuming that 0/ , N ∈ F .
        </p>
        <p>The main problem in cooperative game theory is to define a rational solution of the
game, that is, supposing that the grand coalition N will form, how to share among its
members the total worth v(N). The core is the most popular solution concept, since it
ensures stability of the game, in the sense that no coalition has an incentive to deviate
from the grand coalition. For a game v on a family F of feasible coalitions, the core is
defined by</p>
        <p>
          C (v) = {x ∈ Rn | x(S) ≥ v(S), ∀S ∈ F , x(N) = v(N)}
where x(S) is a shorthand for ∑i∈S xi. When F = 2N , the core is either empty or a convex
bounded polyhedron. However, for games whose cooperation is restricted, the study of
the core becomes much more complex, since it may be unbounded or even contain
no vertices (see a survey in [
          <xref ref-type="bibr" rid="ref16 ref28 ref7">7</xref>
          ]). For the case of games with precedence constraints,
it is known that the core is always unbounded or empty, but contains no line (i.e., it
has vertices). The problem arises then, to select a significant bounded part of the core
as a reasonable concept of solution, since unbounded payments make no sense. We
propose to select a bounded face of the core. A systematic study of bounded faces is
done through the concept of normal collections.
        </p>
        <p>We also present some results when F is not a distributive lattice, but a set lattice
closed under intersection, or a regular set system.</p>
        <p>Lastly, we introduce games on concept lattices, show that this induces in fact two
games, and give some results on the core.</p>
        <p>
          Vincent Duquenne
CNRS-IMJ / C&amp;O, Université Pierre et Marie Curie,
4 place Jussieu, 75005 Paris, France
Abstract. Following [
          <xref ref-type="bibr" rid="ref1 ref10 ref11 ref2 ref23">1,2</xref>
          ] we report on applications of Lattice Analysis either
for deciphering data or for clarifying abstract lattices. Here, lattices are often
considered as implication models that can be summarized with canonical basis
[
          <xref ref-type="bibr" rid="ref1 ref10 ref12 ref13 ref14 ref24 ref25 ref26 ref3 ref4 ref5">3,1,4,5</xref>
          ] or (semi) lattice cores [
          <xref ref-type="bibr" rid="ref1 ref10">1</xref>
          ]. In a more symmetric way decompositions
through lattice congruence / tolerance relations are used for real data analysis as
well as for getting understandable structures of abstract lattices [6,7 and below].
        </p>
        <p>
          As for the needed algorithms, many efforts have been done to “overtake” the
NEXT-CLOSURE algorithms since their discovery in 1984 [
          <xref ref-type="bibr" rid="ref14 ref26 ref5">5</xref>
          ]. For implications
the fees may involve an exponential explosion in memory. We will just try to
give some visions of what could be next in doing with(-out) NEXT-CLOSURE.
        </p>
        <p>Hence in a fresh original spirit of the early eighties, for all these and further
developments we still promote “more simplicity with more structure” (and
tolerances ...) for deepening the concept systems and lattice applications.</p>
        <p>Keywords: closure operator, lattice, canonical basis of implications, quasi /
pseudo-closed, (semi) lattice cores, perspectivities / arrows, congruences /
tolerances, combinatorial exhaustive enumeration, NEXT-CLOSURE algorithms.
Fig. 1. Peasants x possessions. Lattice gluing decomposable, hence substitution properties...</p>
        <p>From : Models of possessions and Lattice Analysis, Social Sci. Information (1995).</p>
        <p>A Collaborative Approach for FCA-Based Knowledge Extraction
Finally, all the strategies are suggested to the expert with their impacts (Table
2) so that the expert can consider choosing one strategy. Once the expert makes
a choice, the system will update the lattice accordingly.
3</p>
        <sec id="sec-3-4-1">
          <title>Experiment of Removing A Concept</title>
          <p>We experimented our approach for extracting knowledge from a real text corpus
of Fibromuscular Dysplasia extracted from PubMed1. The corpus consists of
400 texts.</p>
          <p>
            In the preprocessing step, we used SemRep ([
            <xref ref-type="bibr" rid="ref20 ref32">11</xref>
            ]) to annotate the texts. 2402
annotation objects were identified from the corpus, of which only 668 objects
are shown in the right or left side of a triplet relationship and 481 objects on the
right side. 36 different relationships are identified in these texts. Given an
annotation (object1, relationship, object2), we consider object1 as an object
and the name of the relation is concatenated with object2 to become a binary
attribute of object1. For example, Fibromuscular Dysplasia is an object and
ISA Disease is one of its attributes. SemRep annotation process can be noisy
but, of course, no automatic tool is perfect. Moreover, any annotation process
could annotate the texts, including manual annotation. This is one of our goals
to take the advantage of expert interaction in the construction of the knowledge
model.
          </p>
          <p>Next, we built a Java script to transform the set annotations into a formal
context. The lattice was produced by Galicia2 and exported as the XML
document. The context built from our corpus contains 481 objects, 545 attributes
formed by the association of the relationship of the object with which it relates.
The lattice contains 523 concepts and the longest path from the Top to the
Bottom is 7.</p>
          <p>Then, we implemented a system with operation removing a concept from
a lattice. When an expert, during the evaluation phase, asks for removing a
concept, the system suggests a list of strategies and makes explicit their impacts
on the lattice (lists of modified, deleted and new concepts) to the expert. Once
the expert chooses one strategy, the system will update the lattice accordingly.</p>
          <p>The required time for the expert to remove concepts has not yet been
evaluated. Our experience shows that a judicious choice of a strategy in order to
remove concepts has a strong impact on the speed of convergence towards a
satisfactory knowledge model.
4</p>
        </sec>
        <sec id="sec-3-4-2">
          <title>Conclusion and Perspective</title>
          <p>We presented a collaborative approach for FCA-based knowledge extraction. Our
study shows how domain experts and machines can collaborate in building and
changing a lattice. The system handles changes in a lattice and keeps a trace
1 http://www.ncbi.nlm.nih.gov/pubmed
2 http://sourceforge.net/projects/galicia/</p>
          <p>My Thao Tang and Yannick Toussaint
from the previous lattice. In that way, experts know the impact of a change.
Our iterative and interactive approach takes advantage from FCA and reduces
limitations due to the use of a formal method to model a complex cognitive
process.</p>
          <p>This approach opens several perspectives. We can do more to help the expert.
Refining the cost function associated to changes can make easier the choice
of one strategy. Tagging concepts that the expert agrees with and wants to
keep unchanged all along the process could reduce the number of the suggested
strategies. Performing several changes at once needs also more investigations.</p>
        </sec>
      </sec>
      <sec id="sec-3-5">
        <title>Towards Description Logic on Concept Lattices?</title>
        <p>J.V. Grebeneva, N.V. Shilov, and N.O. Garanina</p>
        <p>A.P. Ershov Institute of Informatics Systems,
Lavren’ev av., 6, Novosibirsk 630090, Russia j.grebeneva@gmail.com,</p>
        <p>shilov@iis.nsk.su, garanina@iis.nsk.su
Abstract. In this position paper we start with a motivation of our study
of modal/description logics with values in concept lattices. Then we give
a brief survey of approaches to lattice-valued modal and/or description
logics. After that we study some methods of context symmetrization,
because the description logic on concept lattices is defined for symmetric
co ntexts only. We conclude with a list of problems related to comparison
of different lattice-valued modal/description logics, different variants of
context symmetrization and resulting description logics, decidability and
axiomatization of these logics.
1
Let us start with an example that can explain our interest to study of polymodal
and/or description logics with values in concept lattices. For it let us first fix
some moment of time and let (1) U RL be the set of all Uniform Resource Locator
that are valid (exist) at this moment, (2) Key be the set of all Key-words in any
existing language that are conceivable in this time, (3) F , S and T be binary
relations on U RL × Key that are implemented in some (non-real we assume)
search engines First, Second and Third at the same moment of time that we
fixed above.</p>
        <p>
          Then let Sh&amp;Ga be the set of all web-sites (their URL’s hereinafter) that
a search engine First finds by two key-words Shilov and Garanina; In terms
of Formal Concept Analysis (FCA) [
          <xref ref-type="bibr" rid="ref13 ref25 ref4">4</xref>
          ] Sh&amp;Ga = {Shilov, Garanina}0 in the
following formal context F = (U RL, KW, F ). Similarly, let Gr — be the set
of all web-sites that Second finds by searching for a single key-word Grebeneva;
in FCA terms one can write Gr = {Grebeneva}0 in the next one formal context
S = (U RL, Key, S).
        </p>
        <p>Assume that we need to know all sites Sh&amp;Ga \ Gr that are found by
First by key-words Shilov and Garanina but that (according to Third) does
not contain any word that is common for all sites that are found by
Second for the key-word Grebeneva. In terms of set theory expanded by
FCAderivatives the desired set can be written as U RLSh&amp;Ga \ U RL0G0 r, where ‘ 0’
? This research is supported by Integration Grant Mathematical and methodological
aspects of intellectual Information Systems n.15/10 of Siberian Branch, Russian
Academy of Science.
c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA
2013, pp. 287{292, ISBN 978{2{7466{6566{8, Laboratory L3i, University of La
Rochelle, 2013. Copying permitted only for private and academic purposes.
represents derivative in the formal context T = (U RL, Key, F ). Recall that
U RLSh&amp;Ga = {Shilov, Garanina}0 in KG, U RLGr = {Grebeneva}0 in KY . So
we can not write the following equality</p>
        <p>U RLSh&amp;Ga\Gr = {Shilov, Garanina}0 \ {Grebeneva}000,
but have to write another one</p>
        <p>U RLSh&amp;Ga\Gr = {Shilov, Garanina}↓F \ {Grebeneva}↓S↑T ↓T ,
where ‘↓F ’ represents the lower derivative in the context F, ‘↓S’ — the lower
derivative in the context S, and ‘↓T ’ and ‘ ↑T ’ — the lower and upper derivatives
in the context T. We believe that it would be nice to process queries like this one
but (unfortunately) modern search engines can not do it; a part of the reason for
this inability is due to lack of theory for processing such multi-context queries.</p>
        <p>
          At the same time polymodal and/or descriptive logics (DL) [
          <xref ref-type="bibr" rid="ref1 ref10">1</xref>
          ] provide
language for presentation of queries as above. In particular, if T d denotes the inverse
of the binary relation T , then Sh&amp;Ga \ Gr may be represented in syntax of a
polymodal logic by the following formula
        </p>
        <p>[F ](Shilov&amp;Garanina) &amp; ¬[T ][T d][S]Grebeneva
or in syntax of a description logic as the following concept term</p>
        <p>∀F.(Shilov u Garanina) u ¬∀T.∀T d.∀S.Grebeneva.</p>
        <p>
          An interpretation of FCA constructs in DL has been studied in [
          <xref ref-type="bibr" rid="ref16 ref28 ref7">7</xref>
          ]. In these
studies DL has been extended by FCA-derivatives and provided with Kripke
semantics; as a result all concept terms are interpreted by sets of objects, not by
concepts (or their extents), a lattice-theoretic structure of formal concepts (that
is so important advantage of FCA) is lost.
        </p>
        <p>
          A variant of description logic (namely ALC, Attribute Language with
Complements) with values in concept lattices was defined in [
          <xref ref-type="bibr" rid="ref17 ref29 ref8">8</xref>
          ] but without a concept
negation; the concept negation was defined only in concept lattices for symmetric
contexts (i.e. in contexts where sets of objects and attributes are equal and the
binary relation is symmetric). It implies that if we would like to define concept
lattice semantics for the DL concept term above, we have to symmetrize contexts
F, S and T in some manner. In this position paper we present some preliminary
results of our studies of ways of context symmetrization, formulate and discuss
some topics that need more research.
2
        </p>
        <sec id="sec-3-5-1">
          <title>Lattice-valued Modal and Description Logics</title>
          <p>
            Modal and Description Logic are closely related but different research paradigms:
they have different syntax and pragmatic, but very closely related semantics (in
spite of different terminology). Lattice-valued modal logics were introduced in
[
            <xref ref-type="bibr" rid="ref11 ref12 ref2 ref23 ref24 ref3">3, 2</xref>
            ] by M.C. Fitting. They were studied in the cited papers from a
prooftheoretic point of view. Later several authors attempted study of these logics
from algebraic perspective [
            <xref ref-type="bibr" rid="ref14 ref15 ref18 ref26 ref27 ref30 ref5 ref6 ref9">5, 6, 9</xref>
            ]. Basic definitions related to modal logics on
lattices and completeness theorems can be found in [
            <xref ref-type="bibr" rid="ref14 ref26 ref5">5</xref>
            ].
          </p>
          <p>
            Description Logic (DL) is a logic for reasoning about concepts. But there
is also an algebraic formalism developed around concepts in terms of concept
lattices, namely Formal Concept Analysis (FCA). In this section we recall in brief
definition of description logic ALC on concept lattices of (symmetric) contexts
and some properties that follow from this definition, please refer [
            <xref ref-type="bibr" rid="ref17 ref29 ref8">8</xref>
            ] for full
details. We use notation and definitions for Description Logics from [
            <xref ref-type="bibr" rid="ref1 ref10">1</xref>
            ]1. For the
basics and notation of Formal Concept Analysis, please, refer to [
            <xref ref-type="bibr" rid="ref13 ref25 ref4">4</xref>
            ].
          </p>
          <p>
            Semantics of description logics on concept lattices comes from
lattice-theoretic characterization of ‘positive’ (i.e. without negation) concept constructs (for
close world semantics) that is given in the following proposition [
            <xref ref-type="bibr" rid="ref17 ref29 ref8">8</xref>
            ].
Proposition 1. Let (Δ, Υ ) be a terminological interpretation and P (Δ) = (2Δ,
∅, ⊆, Δ, ∪, ∩) be the complete lattice of subsets of Δ. Then semantics of ALC
positive concept constructs &gt;, ⊥, t, u, ∀, and ∃ enjoys the following properties
in P (Δ): (1) Υ (&gt;) = sup P (Δ), and Υ (⊥) = inf P (Δ); (2) Υ (X t Y ) =
sup(Υ (X), Υ (Y )), and Υ (X uY ) = inf(Υ (X), Υ (Y )); (3) Υ (∀R. X) = sup{S ∈
P (Δ) : ∀s ∈ S∀t ∈ Δ((s, t) ∈ Υ (R) ⇒ t ∈ Υ (X))}, (4) Υ (∃R. X) = sup{S ∈
P (Δ) : ∀s ∈ S∃t ∈ Δ((s, t) ∈ Υ (R) &amp; t ∈ Υ (X))}.
          </p>
          <p>Conceptual interpretation is a formal context provided by an interpretation
function.</p>
          <p>Definition 1.</p>
          <p>Conceptual interpretation is a four-tuple (G, M, I, Υ ) where (G, M, I) is a
formal context, and an interpretation function Υ = ICS ∪ IRS, where CS and RS
are standard concept and role symbols, and (1) ICS : CS → B(G, M, I) maps
concept symbols to formal concepts, (2) IRS : RS → 2(G×G)∪(M×M) maps role
symbols to binary relations. A formal context (G, M, I) or conceptual
interpretation (G, M, I, Υ ) is said to be homogeneous (symmetric) if G = M (and binary
relation I is symmetric in addition).</p>
          <p>
            Semantics of ALC positive concept constructs &gt;, ⊥, t, u, ∀, and ∃ as well
as semantics of negative construct ¬ are defined in [
            <xref ref-type="bibr" rid="ref17 ref29 ref8">8</xref>
            ] as follows.
Definition 2.
          </p>
          <p>
            Let (G, M, I, Υ ) be a conceptual interpretation, K be a formal context (G, M, I),
and B = (K) be the concept lattice of K. The interpretation function Υ can be
extended to all role terms in a terminological interpretation ((G ∪ M ), Υ ) in
the standard manner so that Υ (R) is a binary relation on (G ∪ M ) for every
role term R. The interpretation function Υ can be extended to all positive ALC
concept terms as follows. (1) Υ (&gt;) = sup B and Υ (⊥) = inf B; (2) Υ (X t
Y ) = sup(Υ (X), Υ (Y )), and Υ (X u Y ) = inf(Υ (X), Υ (Y )); (3) Let Υ (X) =
1 But we use Υ instead of ‘·’ for terminological interpretation function for readability.
(Ex0, In0) ∈ B. Then (a) Υ (∀R. X) = supK {(Ex, In) ∈ B : ∀o ∈ Ex ∀a ∈
In ∀o0 ∈ G ∃a0 ∈ M ((o, o0) ∈ Υ (R) ⇒ o0 ∈ Ex0, (a, a0) ∈ Υ (R), and a0 ∈ In0)},
(b) I(∃R. X) = supK {(Ex, In) ∈ B : ∀o ∈ Ex ∀a ∈ In ∃o0 ∈ G ∀a0 ∈
M ((a, a0) ∈ Υ (R) ⇒ (o, o0) ∈ Υ (R), o0 ∈ Ex0, and a0 ∈ In0)}. In addition, if K
is a symmetric context and Υ (X) = (Ex, In) ∈ B, then Υ (¬X) = (In, Ex).
The following proposition [
            <xref ref-type="bibr" rid="ref17 ref29 ref8">8</xref>
            ] states that for any conceptual interpretation every
positive ALC concept term is an element of concept lattice; in addition, if an
interpretation is symmetric then this fact holds for all ALC concept terms.
Proposition 2. For any conceptual interpretation (G, M, I, Υ ), for every
positive ALC concept term X, semantics Υ (X) is an element of B(G, M, I). For
any symmetric conceptual interpretation (D, D, I, Υ ), for every ALC concept
term X, semantics Υ (X) is an element of B(D, D, I).
3
          </p>
        </sec>
        <sec id="sec-3-5-2">
          <title>Ways to Build a Symmetric Context</title>
          <p>
            The above proposition 2 leads to the following idea: to define semantics of ALC
with values in an arbitrary concept lattice by isomorphic embedding of the
background context into a symmetric one in such a way that for the positive fragment
of ALC the original semantics and the induced semantics equal each other.
Below we examine some opportunities how to “symmetrize” a given context, i.e.
to build a symmetric context from an arbitrary given background context.
Below we are going to study how to build a symmetric context from a given one
by set-theoretic and algebraic manipulations with a binary relation of the
context. Without loss of generality we may assume that the background context is
reduced [
            <xref ref-type="bibr" rid="ref13 ref25 ref4">4</xref>
            ] and has disjoint sets of objects and attributes.
          </p>
          <p>Let K := (G, M, I) be a reduced context where G ∩ M = ∅ and Kd =
(M, G, I−) be its dual context. Let also use the following notation for binary
relations (on M and/or G): (1) ∅ be the empty binary relation, (2) × be a total
binary relation, (3) E be the identity binary relation, (4) Ec be the complement
for E. We would like to combine the cross-tables of K and the dual context
G M
Kd into the symmetric one in the following way: G ? I . Let us represent
M I−1 ?
the above cross-table in a shorter way as K?d K? and denote the corresponding
symmetric context by K◦ := (G◦, M◦, I◦). Recall that B(G, M, I) is the concept
lattice of the context K, B(G◦, M◦, I◦) is the concept lattice of the context K◦.
Let us use the standard notation ‘0’ for derivatives in the background context K
but (for distinction) the notation ‘◦’ for derivatives in the symmetric one. We
are going to fill question quadrants by different combinations of ∅, ×, E and
Ec. Below we study 9 of these 16 combinations.</p>
          <p>Case 1. K∅d K∅ . It is the disjoint union of K and Kd. The concept lattice
.</p>
          <p>
            B(K◦) = B(K ∪ Kd) is a horizontal sum [
            <xref ref-type="bibr" rid="ref13 ref25 ref4">4</xref>
            ], i.e. the union of two sublattices
B(K) and B(Kd), such that B(K) ∩ B(Kd) = {⊥, &gt;}.
          </p>
          <p>
            Case 2. K×d ∅K . The concept lattice of this context is isomorphic to the
vertical sum [
            <xref ref-type="bibr" rid="ref13 ref25 ref4">4</xref>
            ] of the concept lattices B(Kd) and B(K) (where the concept
lattice B(Kd) is upper than B(K)).
          </p>
          <p>Case 3. (∅,×). This case is the same like a previous, but we have to swap
components of the vertical sum.</p>
          <p>
            Case 4. K×d K× . We have here the direct sum K + Kd of contexts K and Kd
[
            <xref ref-type="bibr" rid="ref13 ref25 ref4">4</xref>
            ] and the concept lattice of the sum is isomorphic to the product of the concept
lattices B(K) × B(Kd). A pair (A, B) is a concept of the direct sum (K + Kd)
iff (A ∩ G, B ∩ M ) is a concept of K and (A ∩ M, B ∩ G) is a concept of Kd. It
implies that isomorphism is given by (A, B) 7→ ((A ∩ G, B ∩ M ), (A ∩ M, B ∩ G)).
          </p>
          <p>Case 5. KEd EK . Let (X, Y ) ∈ B(K◦) be a concept and let X = A ∪. B where
A ⊆ G, B ⊆ M . We have the following cases:
(1) B = ∅. Let X = A. If |A| = 1, then (X, Y ) = ({a}, {a} ∪ A0), and (X, Y ) =
(A, A0) otherwise.
(2) A = ∅. Let X = B. If |B| = 1, then (X, Y ) = ({b}, {b} ∪ B0), and (X, Y ) =
(B, B0) otherwise.
(3) |B| = 1 and A 6= ∅. Let X = A ∪ {b}. If {b} ∈ A0 and |A| = 1, then (X, Y ) =
( a A
{ } ∪ {b}, {a} ∪ {b}), and if {b} ∈ A0 | | &gt; 1, then (X, Y ) = (A ∪ {b}, {b}).
(4) |B| &gt; 1 and A 6= ∅. Let |B| &gt; 1, then X = A ∪ B. If B ⊆ {a}0 and | | = 1,
A
then (X, Y ) = ({a} ∪ B, {a}).</p>
          <p>Case 6. K∅d EK . This case is a very similar to the previous one.
(1) B = ∅. (X, Y ) = (A, A0).
(2) A = ∅. If |B| = 1 then (X, Y ) = ({b}, {b} ∪ B0) else (X, Y ) = (B, B0).
(3) |B| = 1. If {b} ∈ A0, we have (X, Y ) = (A ∪ {b}, {b}).
(4) |B| &gt; 1. All the concepts in this case will be either &gt; or ⊥.</p>
          <p>Case 7. (E,∅). This case is similar to the previous.</p>
          <p>Case 8. K×d EK . Let us use subcases as in the case 5.
(1) B = ∅. (X, Y ) = (A, G ∪ A0).
(2) A = ∅. If |B| = 1, then (X, Y ) = ({b}, {b} ∪ B0), and (X, Y ) = (B, B0)
otherwise.
(3) |B| = 1. If {b} ∈ A0, then (X, Y ) = (A ∪ {b}, {b} ∪ {b}0), else (X, Y ) =
(A ∪ {b}, {b}0).
(4) |B| &gt; 1. (X, Y ) = (A ∪ B, B0).</p>
          <p>Case 9. (E,×). This case is similar to the case 8.
4
Now we are ready to formulate several topics and problems that we consider
natural and important for further research.</p>
          <p>
            In [
            <xref ref-type="bibr" rid="ref14 ref26 ref5">5</xref>
            ] the definition for modal logics with values in a given finite distributive
lattice L is presented. This definition is easy to expand on polymodal logics.
In section 2 we represented the definition for description logic ALC (that can
be considered as a polymodal version of K) with values in concept lattices of
symmetric contexts. Assume that K is a finite symmetric context; then B(K)
is a finite lattice, but it may not be a distributive lattice. Question: Assuming
that B(K) is a finite distributive lattice, whether ALC with values in B(K) is a
polymodal B(K)-ML?
          </p>
          <p>In section 2 we represented the definition for description logic ALC with
values in concept lattices of symmetric contexts and for positive fragment of
ALC with values in arbitrary concept lattices. Questions: (1) Is decidable or
axiomatizable the positive fragment of ALC with values in concept lattices? (2)
Is decidable or axiomatizable ALC with values in concept lattices of symmetric
contexts?</p>
          <p>In the section 3 we examine 9 of 16 variants of context symmetrization.
Topics for further research are following: (1) to study the remaining 7 cases
of context symmetrization and isomorphic embedding with Ec in one or two
free quadrants; (2) to examine under which embedding from these in these 16
the induced semantics of the positive fragment of ALC is equal to the original
semantics.</p>
        </sec>
      </sec>
      <sec id="sec-3-6">
        <title>Computing Left-Minimal Direct Basis of implications</title>
        <p>Pablo Cordero, Manuel Enciso, Angel Mora, and Manuel Ojeda-Aciego</p>
        <p>University of Ma´laga, Spain.</p>
        <p>
          e-mail: {pcordero,enbciso}@uma.es, {amora,aciego}@ctima.uma.es
Abstract. The most popular basis in Formal Concept Analysis is the
Duquenne-Guigues basis, which ensure minimality in the number of
dependencies and it is built with pseudo-intents, and some method to
calculate these basis from an arbitrary set of implications have been
introduced. We propose in this paper, an automated method to calculate a
left-minimal direct basis from the set of all implications built between a
closed set and its corresponding minimal generators. The new basis also
has the minimal property demanded in the Duquenne-Guigues basis. It
is minimal in the cardinal of the set of implications, and minimal in the
size of the left-hand side of the implications.
1
Formal Concept Analysis [
          <xref ref-type="bibr" rid="ref17 ref29 ref8">8</xref>
          ] has shown to be a powerful framework to discover
knowledge inside date sets. It provides a solid and formal theory which enhances
other well known approaches. The main element of FCA community are binary
relations between objects and attributes, which are described using matrixes
(contexts) and represent the appearance of the attributes in the corresponding
objects. One outstanding element in FCA is attribute implication, which is used
to specify a constraint in the context. Thus we write an implication between
attribute sets X and Y in the form X →Y whenever any object in the context
which has all the attributes in X also has all the attributes in Y .
        </p>
        <p>
          Attribute implication can be managed syntactically using Armstrong’s
Axioms [
          <xref ref-type="bibr" rid="ref1 ref10">1</xref>
          ], a sound and complete inference system. This axiomatic system allows
us to derive new attribute implications that hold in a given context. This
“inference” relation leads to the following problem: How to characterize the minimal
set of implications for a given set of implications? Among the different basis
notions, the Duquenne-Guigues basis [
          <xref ref-type="bibr" rid="ref18 ref30 ref9">9</xref>
          ] also called stem basis seems has to be
cited because of their widely acceptation in the FCA area and because of its
minimality notion (w.r.t. the number of implications). Nevertheless, minimality
in the number of implications is a criteria that may be enhanced.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref14 ref26 ref5">5</xref>
          ] K. Bertet and B. Monjardet provided a set of orthogonal
characteristics of the basis and established the equivalence of five definitions presented
by different authors in several areas which correspond with the same notion of
basis.
c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA
2013, pp. 293{298, ISBN 978{2{7466{6566{8, Laboratory L3i, University of La
Rochelle, 2013. Copying permitted only for private and academic purposes.
In [
          <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
          ] we present a method to compute all the closed sets and its minimal
generators from a context. This information allows us to built a set of
implications whose left had side is a minimal generator and with its closed set in the
right hand side. We propose in this paper a definition of basis with the good
minimality property of Duquenne-Guigues basis and the characteristics of the above
implications: minimal information in the left had side and a fast computation of
attributes closures from them.
        </p>
        <p>We also introduce an automated method to calculate from a set of
implications a left-minimal direct basis. The new method is based on the Simplification
Logic for Funcional Dependency SLFD [?], a sound and complete inference
system for implications. The main characteristics of SLFD is that its inference system
is not built around the transitivity rule, like other well known Armstrong-like
axiomatic systems for implications.</p>
        <p>
          The work is organized as follows. In Section 2 we summarize preliminary
concepts and results on FCA concerning implications, basis, etc. In Section 3 we
outline the automated method that we have proposed in [
          <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
          ] for the computation
of minimal generators and we introduce a new method to calculate the
leftminimal direct basis from the original set of implications. The paper ends with
a Conclusion Section.
2
        </p>
        <sec id="sec-3-6-1">
          <title>Background</title>
          <p>
            We will use the well-kwon notation used on Formal Concept Analysis (FCA) [
            <xref ref-type="bibr" rid="ref17 ref29 ref8">8</xref>
            ].
For the analysis of the information contained in the context K = (G, M, I), a
direction is the study of the pair (closed sets - minimal generators). The set
of attributes A is said to be a minimal generator (mingen) if, for all set of
attributes X ⊆ A if X00 = A00 then X = A.
          </p>
          <p>
            A relevant notion in the framework of Formal Concept Analysis is the concept
of attribute implication [
            <xref ref-type="bibr" rid="ref17 ref29 ref8">8</xref>
            ]. This area is devoted to obtain knowledge from a
context that is a table in which attributes and objects are related. An attribute
implication is an expression A → B where A and B are sets of attributes. A
context satisfies A → B if every object that has all the attributes in A has also
all the attributes in B. It is well known that the sets of attribute implications
that are valid in a context satisfies the Armstrong’s Axioms. Although the two
interpretations of formulas (functional dependency and attribute implication)
are different, they have the same concept of semantic entailment. [
            <xref ref-type="bibr" rid="ref11 ref2 ref23">2</xref>
            ]
          </p>
          <p>Alternatively, attribute implications allow us to capture all the information
which can be deduced from a context. The set of all valid implications in a
context may be syntactically managed by means of the following inference system
known as Armstrong’s axioms. An implication basis of K is defined as a set L
of implications of K from which any valid implication for K can be deduced by
using Armstrong rules.</p>
          <p>
            The goal is to obtain an implication basis with minimal size. This condition
is satisfied by the so-called Duquenne-Guigues (or stem) basis [
            <xref ref-type="bibr" rid="ref18 ref30 ref9">9</xref>
            ]. However,
the definition of the Duquenne-Guigues basis refers to minimality only in the
cardinality of the set of formulas, but as we have showed in [
            <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
            ] with an illustrative
example, redundant attributes use to appear in this kind of minimal basis.
          </p>
          <p>
            In the following, a summary of some interesting result of this survey are
showed. More specifically we present the definitions of some characteristics
studied in the survey that will be used to identify the kind of basis we introduce in
this paper. In the practice, it is interesting considering some properties [
            <xref ref-type="bibr" rid="ref14 ref26 ref5">5</xref>
            ] related
with minimality of them, in order to achieve efficiency.
          </p>
          <p>Definition 1. A set of implications Γ it is said
– minimal or non-redundant if Γ \ {X → Y } is not equivalent to Γ .
– minimum if if it is of least cardinality, that is, | Γ |≤| Γ 0 | for all set of
implications Γ 0 equivalent to Γ .
– optimal if || Γ ||≤|| Γ 0 || for all set of implications Γ 0 equivalent to Γ , where
the size of Γ is defined as
|| Γ ||=</p>
          <p>X
{X→Y ∈Γ }
(| X | + | Y |)</p>
          <p>And finally the two characteristics that constitutes the center of our basis
are introduced:
Definition 2. Let Γ = {X0 → Y0, . . . Xn → Yn} be a set of implications, it is
said a left-minimal basis if there does not exist a Xi → Yi and a subset Xi0 ( Xi
such that Γ \ {Xi → Yi} ∪ {Xi0 → Yi} is equivalent to Γ .</p>
          <p>A set of implications Γ and is said direct if for all implication A → B the set
A ∪ B is a closed set w.r.t. Γ .
3</p>
        </sec>
        <sec id="sec-3-6-2">
          <title>Obtaining basis from minimal generators</title>
          <p>
            Some methods to obtain generators of closed sets have been studied in [
            <xref ref-type="bibr" rid="ref16 ref21 ref22 ref28 ref33 ref34 ref7">7, 12,
13</xref>
            ]. Moreover, minimal generators [
            <xref ref-type="bibr" rid="ref19 ref20 ref31 ref32">10, 11</xref>
            ] appear in the literature under different
names in various fields, for instance they are the minimal keys of the tables in
relational databases. In [
            <xref ref-type="bibr" rid="ref22 ref34">13</xref>
            ], the authors emphasize the importance of studying
minimal generators although “they have been paid little attention so far in the
FCA literature”.
          </p>
          <p>
            We agree with these authors about the importance of the study of closed sets
and minimal generators. They constitute a source of essential information to
analyze a formal context. As we mention in the introduction, in [
            <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
            ] we illustrated
the use of the Simplification paradigm to guide the search of all minimal
generator sets. Thus, we introduce a method named MinGen [
            <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
            ] which computes a list
of all pairs Φ =&lt;closed set, minimal generators&gt; from an arbitrary set of
implications The goal of this paper can be considered as the reserve direction of
the way we presented there. We will introduce a method to transform these set of
pairs into a basis, preserving two good properties (fast computation of attribute
closure and minimal left hand side in the implications) and providing
minimality in the number of implications.Thus, our goal is to achieve from the minimal
generators and closed sets a basis of implications fulfilling left-minimality and
directness.
          </p>
          <p>
            In the literature, the most cited algorithm to compute Duquenne-Guigues
basis is the Ganter Algorithm [
            <xref ref-type="bibr" rid="ref17 ref29 ref8">8</xref>
            ]. Algorithm 1 is an adaptation of the algorithm
showed in [
            <xref ref-type="bibr" rid="ref12 ref24 ref3">3</xref>
            ] to compute a Duquenne-Guigues basis from a set of LSI (labelled
set of items) [
            <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
            ], and we obtain a Duquenne-Guigues basis.
          </p>
          <p>Algorithm 1: Algorithm for computing a Duquenne-Guigues basis
input : An LSI Φ
output: A Duquenne-Guigues basis
T := ∅;
foreach hB, mg(B)i ∈ Φ do</p>
          <p>foreach A ∈ mg(B) do T := T ∪ {A → B}
repeat</p>
          <p>S := T ;
foreach A → B, C → D ∈ T such that A C and B 6⊆ C do</p>
          <p>T := T r {C → D};
if B ∪ C 6= D then T := T ∪ {BC → D}
until T = S ;
S := ∅;
foreach A → B ∈ T do S := S ∪ {A → B r A};
return S</p>
          <p>
            In the following example, we show how to link the above algorithm with the
work presented in [
            <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
            ].
          </p>
          <p>
            Example 1. For the input T = {ab → c, ac → bd, b → d, d → c}, Algorithm
MinGen 0 (see [
            <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
            ]) returns Φ = {&lt; abcd, {ab, ac, ad} &gt;, &lt; bcd, {b} &gt;, &lt; cd, {d} &gt;
} and from here Algorithm 1 renders Γ = {d → cd, b → bcd, ac → abcd}, which
corresponds to a Duquenne-Guigues basis.
          </p>
          <p>The following theorem ensures the minimality (w.r.t. the cardinality) of the
Duquenne-Guigues basis.</p>
          <p>Theorem 1. Any Duquenne-Guigues basis is a minimum basis.</p>
          <p>In the following, we describe the algorihtm 2 to calculate a Left-Minimal
Direct Basis based on Algorithm 1. The algorithm is polynomial and it is described
searching a good understanding. Of course, an implementation using lectic order
would improve considerably its efficiency.</p>
          <p>First, we consider the following equivalence rules.</p>
          <p>Definition 3 (Aggregation rules). Let A, B, C and D be sets of attributes.
1. If A ⊆ C then {A → B, C → D} ≡ {A → B, BC → D r B}.
2. If A ⊆ C ⊆ A ∪ B then {A → B, C → D} ≡ {A → BD}.
Algorithm 2: Algorithm for computing a Left-Minimal Direct Basis
input : An LSI Φ
output: A Minimal Direct Basis
T := ∅;
foreach hB, mg(B)i ∈ Φ do</p>
          <p>foreach A ∈ mg(B) do T := T ∪ {(A, A → B)}
repeat</p>
          <p>S := T ;
foreach (M, A → B), (N, C → D) ∈ T such that A</p>
          <p>T := T r {(N, C → D)};
if B ∪ C 6= D then T := T ∪ {(N, BC → D)}
until T = S ;
S := ∅;
foreach (M, A → B) ∈ T do S := S ∪ {M → B r M };
return S
C and B 6⊆ C do</p>
          <p>We let for an extended version of this paper the proof that these equivalences
rules are derived rules of equivalences presented in Theorem ??.</p>
          <p>We propose in the Algorithm 2 the use of the two aggregation rules for
reducing the number of implications and also the consequent of implications.
Theorem 2. Let T = {(M1, A1 → B1), . . .} be a set of pairs with minimal
generators and implications obtained from minimal generators and closed sets.
The exhaustive application of the two Aggregation rules produces a left-minimal
direct basis.</p>
          <p>
            Example 2. Let T = {b → agh, d → a, bn → h, ab → def g, abc → djk} be
a set of implications, Algorithm MinGen 0 ([
            <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
            ]) returns a list with closed sets
and their minimal generators, Φ = {&lt; abdef gh, {b} &gt;, &lt; abcdef ghkj, {bc} &gt;,
&lt; abdef ghn, {bn} &gt;, &lt; abcdef ghkn, {bcn} &gt;, &lt; ad, {d} &gt;}
          </p>
          <p>In the first step of the Algorithm 2 with Φ we build T = {(b, b→abdefgh),
(bc,bc →abcdefghkj), (bn, bn → abdef ghn), (bcn, bcn → abcdef ghkn), (d, d →
ad)}.</p>
          <p>Then, we apply the Aggregation rules foreach couple of elements in T . At
the end of these comparisons, we have T = {(b, b → abdef gh), (bc, abcdef gh →
abcdef ghkj), (d, d → ad)}. And from this, in the last foreach of the Algorithm 2,
it renders the following left-minimal direct basis S = {b → adef gh, bc →
adef ghkj, d → a}.</p>
          <p>By the other side, Algorithm 1 return the following Duquenne-Guigues basis
{b → adef gh, abcdef gh → kj, d → a} which in a minimal basis, but not a
left-minimal one.
4
In this paper we present an algorithm which allows the transformation of a set
of all closed sets and their corresponding minimal generators into a left-minimal
direct basis. The study about the soundness, completeness, and complexity of
the algorithms proposed are left to a extended paper.</p>
          <p>The new method uses some equivalences deduced in the SLFD Logic and
follows the Lectic order to traverse the list of minimal generators and implications
associated and return a set of implications but with good properties.</p>
          <p>
            As future work we propose to extend the Duquenne-Guigues basis definition
to consider a generalized fuzzy extension of implications. We propose the
definition introduced in [
            <xref ref-type="bibr" rid="ref11 ref2 ref23">2</xref>
            ] that has been shown to be the most general one. In [
            <xref ref-type="bibr" rid="ref13 ref25 ref4">4</xref>
            ] a
non trivial extension of the SLFD Logic for the generalized definition of fuzzy
functional dependency was introduced. The generalized version of the SLFD Logic will
be used to develop a method to get basis for the generalized fuzzy implications.
          </p>
        </sec>
        <sec id="sec-3-6-3">
          <title>Acknowledgment</title>
          <p>Supported by Grants TIN2011-28084 of the Science and Innovation Ministry of
Spain, and No. P09-FQM-5233 of the Junta de Andaluc´ıa.</p>
        </sec>
        <sec id="sec-3-6-4">
          <title>References</title>
        </sec>
      </sec>
      <sec id="sec-3-7">
        <title>Comparing Performance of Formal Concept</title>
      </sec>
      <sec id="sec-3-8">
        <title>Analysis and Closed Frequent Itemset Mining</title>
      </sec>
      <sec id="sec-3-9">
        <title>Algorithms on Real Data</title>
        <p>Lenka Piskov´a, Tom´aˇs Horv´ath</p>
        <p>University of Pavol Jozef Sˇafa´rik, Koˇsice, Slovakia
lenka.piskova@student.upjs.sk, tomas.horvath@upjs.sk
Abstract. In this paper, an experimental comparison of publicly
available algorithms for computing intents of all formal concepts and mining
frequent closed itemsets is provided. Experiments are performed on real
data sets from UCI Machine Learning Repository and FIMI Repository.</p>
        <p>
          Results of experiments are discussed at the end of the paper.
1
Formal Concept Analysis (FCA) [
          <xref ref-type="bibr" rid="ref18 ref30 ref9">9</xref>
          ] is a method for analysing data in the form of
a table with applications in many disciplines.A formal concept is a formalization
of the concept of a “concept” which consists of two parts, a set of objects which
forms its extension and a set of attributes which forms its intension [
          <xref ref-type="bibr" rid="ref46">25</xref>
          ].
Formal concepts can be ordered according to the subconcept-superconcept relation
resulting in a concept lattice.
        </p>
        <p>
          Frequent itemset mining (FIM) introduced in [
          <xref ref-type="bibr" rid="ref1 ref10">1</xref>
          ] was proposed as a method
for market basket analysis. The identification of sets of items (itemsets) which
often occur together in a database (the frequency is not less than a user defined
minimum support threshold) is one of the basic tasks in Data Mining. When
the minimum support is set low, a huge number of itemsets is generated. To
overcome this problem, closed and maximal frequent itemsets were proposed.
        </p>
        <p>
          FCA and FIM are two research fields that are closely related to each other
[
          <xref ref-type="bibr" rid="ref41">20</xref>
          ]. Naturally, they address similar problems, e.g. selecting important concepts
versus finding interesting patterns in data. Moreover, they inspire each other
(Iceberg concept lattice which is the set of all frequent concepts connected with
the subconcept-superconcept relation [
          <xref ref-type="bibr" rid="ref44">23</xref>
          ]).
        </p>
        <p>
          Finding the set of all intents (of formal concepts) is equivalent to finding
the set of all closed frequent itemsets using a minimum support equal to zero
[
          <xref ref-type="bibr" rid="ref41">20</xref>
          ]. Nonetheless, there is no experimental comparison between algorithms for
computing formal concepts and algorithms for mining frequent closed itemsets.
The aim of this paper is to provide such comparison on real-world data.
2
The problem of generating formal concepts and/or a concept lattice has been
well studied and many algorithms have been proposed [
          <xref ref-type="bibr" rid="ref17 ref29 ref8">8</xref>
          ], [
          <xref ref-type="bibr" rid="ref36">15</xref>
          ], [
          <xref ref-type="bibr" rid="ref38">17</xref>
          ], [
          <xref ref-type="bibr" rid="ref42">21</xref>
          ], [
          <xref ref-type="bibr" rid="ref43">22</xref>
          ]. A
c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA
2013, pp. 299{304, ISBN 978{2{7466{6566{8, Laboratory L3i, University of La
Rochelle, 2013. Copying permitted only for private and academic purposes.
comparative performance study of algorithms for building concept lattices can
be found in [
          <xref ref-type="bibr" rid="ref19 ref31">10</xref>
          ] and [
          <xref ref-type="bibr" rid="ref37">16</xref>
          ]. In this paper we will focus only on those algorithms
which compute the set of all formal concepts (frequent closed itemsets) only.
Therefore, we do not compare our results with [
          <xref ref-type="bibr" rid="ref19 ref31">10</xref>
          ] and [
          <xref ref-type="bibr" rid="ref37">16</xref>
          ].
        </p>
        <p>
          The fastest algorithms for computing formal concepts are FCbO [
          <xref ref-type="bibr" rid="ref35">14</xref>
          ] and
InClose [
          <xref ref-type="bibr" rid="ref11 ref2 ref23">2</xref>
          ] which are based on the CbO algorithm [
          <xref ref-type="bibr" rid="ref36">15</xref>
          ]. In the competition between
FCA algorithms at ICCS 20091 FCbO took the first place and the runner-up was
In-Close. The improvement of In-Close algorithm [
          <xref ref-type="bibr" rid="ref12 ref24 ref3">3</xref>
          ] was developed in response
to the competition to outperform FCbO, but our results show that FCbO still
performs better. A parallel variant of FCbO was also proposed [
          <xref ref-type="bibr" rid="ref35">14</xref>
          ], however, we
consider only the serial version in this paper.
        </p>
        <p>
          Implementations of algorithms for mining closed frequent itemsets were
experimentally compared2 and presented at FIMI’03 and FIMI’04 workshops [
          <xref ref-type="bibr" rid="ref21 ref33">12</xref>
          ].
The best of the tested algorithms ([
          <xref ref-type="bibr" rid="ref14 ref26 ref5">5</xref>
          ], [
          <xref ref-type="bibr" rid="ref22 ref34">13</xref>
          ], [
          <xref ref-type="bibr" rid="ref39">18</xref>
          ], [
          <xref ref-type="bibr" rid="ref40">19</xref>
          ], [
          <xref ref-type="bibr" rid="ref45">24</xref>
          ], [
          <xref ref-type="bibr" rid="ref47">26</xref>
          ]) was FP-Close
[
          <xref ref-type="bibr" rid="ref22 ref34">13</xref>
          ] although it gave a segmentation fault for 4 out of 14 data sets.
        </p>
        <p>
          In this paper, we provide an experimental comparison of 10 algorithms on
real-world data sets whose implementations are publicly available, two of them
compute formal concepts (FCbO and In-Close2) and the remaining 8 generate
closed frequent itemsets ([
          <xref ref-type="bibr" rid="ref14 ref26 ref5">5</xref>
          ], [
          <xref ref-type="bibr" rid="ref15 ref27 ref6">6</xref>
          ], [
          <xref ref-type="bibr" rid="ref16 ref28 ref7">7</xref>
          ], [
          <xref ref-type="bibr" rid="ref22 ref34">13</xref>
          ], [
          <xref ref-type="bibr" rid="ref39">18</xref>
          ], [
          <xref ref-type="bibr" rid="ref40">19</xref>
          ], [
          <xref ref-type="bibr" rid="ref45">24</xref>
          ]).
3
We have carried out a number of experiments for several real-world data sets to
compare FCA and FIM algorithms that are publicly available. The
characteristics of selected data sets [
          <xref ref-type="bibr" rid="ref13 ref25 ref4">4</xref>
          ], [
          <xref ref-type="bibr" rid="ref20 ref32">11</xref>
          ] are shown in the table 1.
        </p>
        <p># Transactions # Items Density (%) Small/Big</p>
        <p>Accidents
Car Evaluation</p>
        <p>Connect
Kosarak
Mushroom</p>
        <p>Retail
Tic-tac-toe
340183
1728
67557
990002
8124
88162
958
468
25
129
41270
119
16469
29
33.8
28
43
8.1
23
10.3
34</p>
        <p>Big
Small
Big
Big
Small
Big
Small</p>
        <p>The experiments were conducted on the computing node with 16 cores equipped
with 24 GB RAM memory running GNU/Linux openSUSE 12.1.</p>
        <p>The measured times are CPU times. Each algorithm was run three times
for each data set and the given minimum support threshold value to get the
most accurate results. All reported times are the average times of the three
1 http://www.upriss.org.uk/fca/fcaalgorithms.html
2 http://fimi.ua.ac.be/experiments/
runs. The output was turned off, i.e. the results of algorithms (intents of formal
concepts/frequent closed itemsets) were neither written to a file nor to the screen.</p>
        <p>Some of the algorithms were originally developed to mine closed frequent
itemsets. For Apriori, Carpenter and Eclat we have set the flag -tc to mine
closed frequent itemsets. Similarly, we have used the flag -fci for Mafia.</p>
        <p>The input file of In-Close2 is in the cxt (formal context) format while the
input of other algorithms is in the standard FIMI format - each line represents a
list of attributes of an object/a list of items in a transaction. The disadvantage
of In-Close2 is that unlike other algorithms it also computes extents of formal
concepts (in addition to their intents).</p>
        <p>Some algorithms had problems on certain data sets. For mushroom, Apriori
gets killed, Carpenter outputs an incorrect number of closed frequent itemsets
(238827), DCI Closed does not calculate the result in a reasonable time (we have
stopped the computation after a few hours). In-Close2 gives an incorrect number
of formal concepts (59343) for tic-tac-toe.</p>
        <p>For kosarak, FPClose is either aborted due to the invalid pointer or gives
segmentation fault for the support 0.8% and supports less than or equal to 0.6%. For
retail with minsup = 0, Apriori gets killed, Carpenter gives an incorrect number
of closed frequent itemsets (2186693) and DCI Closed is aborted. In-Close2 gives
segmentation fault for the supports lower or equal to 60% on accidents and for
all supports except for 90% on connect.</p>
        <p>We have compared the performance of the algorithms for mining intents of
all formal concepts, i.e. closed frequent itemsets using minsup = 0 (typical task
in FCA) on small data sets. The results are depicted in the table 2. Arguably,
FCbO is the best algorithm for the given task, it is the fastest algorithm for car
and mushroom and the third fastest for tic-tac-toe. LCM and Eclat perform well
on these data sets, too. Considering also the results on retail with minsup = 0,
LCM is the fastest algorithm and the runner-up are Eclat and FPClose.</p>
        <p>
          For kosarak, in our experimental testing FPClose failed while FPClose was
the fastest algorithm for low as well as high values of support in [
          <xref ref-type="bibr" rid="ref21 ref33">12</xref>
          ]. Our results
on other data sets correspond to some extent to the results in [
          <xref ref-type="bibr" rid="ref21 ref33">12</xref>
          ].
        </p>
        <sec id="sec-3-9-1">
          <title>Conclusion</title>
          <p>We have experimentally compared algorithms for computing intents of formal
concepts and algorithms for mining closed frequent itemsets on real-world data.
Our experimental testing has no clear winner for different data sets and minimum
support threshold setting. In our opinion, DCI Closed behaves well although it
had some problems on the mushroom data set and the retail data set with
minsup = 0. On small data sets, the fastest algorithm is FCbO.
Acknowledgements: This work was partially supported by the research grants
VEGA 1/0832/12 and the Center of knowledge and information systems in
Koˇsice (ITMS 26220220158).</p>
        </sec>
        <sec id="sec-3-9-2">
          <title>References</title>
          <p>1. R. Agrawal, T. Imielinski, A. Swami: Mining association rules between sets of items
in large databases. SIGMOD, 1993.</p>
        </sec>
      </sec>
      <sec id="sec-3-10">
        <title>Author Index</title>
        <p>Alam, Mehwish, 237
Alcalde, Cristina, 225
Antoni, Lubom r, 117
Astudillo, Hernan, 163
Baixeries, Jaume, 33
Barbot, Nelly, 175
Barkstrom, Bruce R., 275
Bazin, Alexandre, 45
Bertet, Karell, 81
Burusco, Ana, 225
Buzmakov, Aleksey, 199
Caro-Contreras, David Ernesto, 141
Chekol, Melisachew Wudage, 237
Codocedo, V ctor, 163
Cordero, Pablo, 293
D az, Juan Carlos, 225
De Causmaecker, Patrick, 57
De Wannemacker, Stefan, 57
Dolques, Xavier, 129
Domenach, Florent, 93
Duquenne, Vincent, 7
Egho, Elias, 199
Enciso, Manuel, 293
Freese, Ralph, 1
Fuentes-Gonzalez, Ramon, 225
Ganascia, Jean-Gabriel, 45
Garanina, Natalia O., 287
Glodeanu, Cynthia Vera, 69
Gnatyshak, Dmitry V., 249
Goethals, Bart, 3
Grabisch, Michel, 5
Grebeneva, Julia V., 287
Guerin, Clement, 81
Ignatov, Dmitry I., 249
Jay, Nicolas, 199
Kaytoue, Mehdi, 33
Konecny, Jan, 153
Krdlo, Ondrej, 105, 117
Krajci, Stanislav, 117
Krmelova, Marketa, 187
Kuznetsov, Sergei O., 199, 249
Le Ber, Florence, 129
Medina, Jesus, 225
Mendez-Vazquez, Andres, 141
Miclet, Laurent, 175
Mihalcin, Patrik, 117
Miralles, Andre, 9
Mora, Angel, 293
Napoli, Amedeo, 33, 163, 199, 237
Nebut, Clementine, 9
Ojeda-Aciego, Manuel, 105, 153, 293
Osman Guedi, Abdoulkader, 9
Outrata, Jan, 261
Pelaez-Moreno, Carmen, 211
Piskova, Lenka, 299
Prade, Henri, 175
Rassi, Chedy, 199
Revel, Arnaud, 81
Shilov, Nikolay V., 287
Stanley, Renzo, 163
Tang, My Thao, 281
Torim, Ants, 21
Toussaint, Yannick, 281
Trnecka, Martin, 187
Valverde-Albacete, Francisco Jose, 211
CLA 2013, Proceedings of the Tenth International
Conference on Concept Lattices and Their Applications
Laboratory L3i &amp;
Computer Sciences, Image Processing and Intercation Lab
University of La Rochelle
Avenur Michel Crepeau
17042 La Rochelle Cedex 1</p>
        <p>France
Page count:
50</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Baader F.,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          ,
          <string-name>
            <surname>D. Nardi D.McGuinness</surname>
            ,
            <given-names>and P.</given-names>
          </string-name>
          <string-name>
            <surname>Patel-Schneider</surname>
          </string-name>
          (editors).
          <source>The Description Logic Handbook: Theory,Implementation and Applications</source>
          . Cambridge University Press,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Fitting M.C.</surname>
          </string-name>
          <article-title>Many-valued modal logics II. Fund</article-title>
          . Inform.,
          <year>1992</year>
          , v.
          <volume>17</volume>
          , p.
          <fpage>5573</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Fitting M.C.</surname>
          </string-name>
          <article-title>Many-valued modal logics</article-title>
          .
          <source>Fund</source>
          . Inform.,
          <year>1991</year>
          , v.
          <volume>15</volume>
          , p.
          <fpage>235254</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Ganter</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wille</surname>
            <given-names>R</given-names>
          </string-name>
          .
          <article-title>Formal Concept Analysis</article-title>
          .
          <source>Mathematical Foundations</source>
          . Springer Verlag,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Maruyama</surname>
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Algebraic</surname>
          </string-name>
          <article-title>Study of Lattice-Valued Logic and Lattice-Valued Modal Logic</article-title>
          .
          <source>In ICLA'09 Proceedings of the 3rd Indian Conference on Logic and Its Applications. Lecture Notes in Computer Science</source>
          . Springer-Verlag Berlin, Heidelberg 2009, v.
          <volume>5378</volume>
          , p.
          <fpage>170</fpage>
          -
          <lpage>184</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Maruyama</surname>
            <given-names>Y.</given-names>
          </string-name>
          <article-title>Reasoning about Fuzzy Belief and Common Belief: With Emphasison Incomparable Beliefs</article-title>
          .
          <source>In Proceedings of the 22nd International Joint Conference on Artificial Intelligence. AAAI Press/International Joint Conferences on Artificial Intelligence</source>
          , Menlo Park, California,
          <year>2011</year>
          , Vol.
          <volume>2</volume>
          , p.
          <fpage>1008</fpage>
          -
          <lpage>1013</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Shilov</surname>
            <given-names>N.V. Garanina N.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Anureev</surname>
            <given-names>I.S.</given-names>
          </string-name>
          <article-title>Combining Two Formalism for Reasoning about Concepts</article-title>
          .
          <source>Proceedings of the 2007 International Workshop on Description Logics (DL2007)</source>
          ,
          <source>Brixen Italy</source>
          ,
          <year>2007</year>
          . CEUR Workshop Proceedings v.
          <volume>250</volume>
          . p.
          <fpage>459</fpage>
          -
          <lpage>466</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Shilov</surname>
            <given-names>N.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Han S</surname>
          </string-name>
          .
          <article-title>-Y. A proposal of Description Logic on Concept Lattices</article-title>
          .
          <source>Proceedings of the Fifth International Conference on Concept Lattices and their Applications</source>
          ,
          <year>2007</year>
          . CEUR Workshop Proceedings, v.
          <volume>331</volume>
          ,
          <year>2008</year>
          , p.
          <fpage>165</fpage>
          -
          <lpage>176</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Shi H.-X.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Wang G</surname>
          </string-name>
          .
          <article-title>-J. Lattice-valued modal propositional logic and its completeness</article-title>
          .
          <source>Science China, Information Sciences</source>
          .
          <year>2010</year>
          , v.
          <volume>53</volume>
          (
          <issue>11</issue>
          ), p.
          <fpage>2230</fpage>
          -
          <lpage>2239</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          1. William W. Armstrong,
          <article-title>Dependency structures of data base relationships</article-title>
          ,
          <source>Proc. IFIP Congress</source>
          . North Holland, Amsterdam:
          <fpage>580</fpage>
          -
          <lpage>583</lpage>
          ,
          <year>1974</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Radim</given-names>
            <surname>Belohla</surname>
          </string-name>
          <article-title>´vek, and Vil´em Vychodil, Functional Dependencies of Data Tables Over Domains with Similarity Relations</article-title>
          ,
          <source>Proc. of the 2nd Indian International Conference on Artificial Intelligence</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Radim</given-names>
            <surname>Belohla</surname>
          </string-name>
          <article-title>´vek, and Vil´em Vychodil, Formal Concept Analysis with Constraints by Closure Operators</article-title>
          , Lecture Notes in Computer Science,
          <volume>4068</volume>
          :
          <fpage>131</fpage>
          -
          <lpage>143</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          4. Radim Belohla´vek, Pablo Cordero,
          <string-name>
            <given-names>Manuel</given-names>
            <surname>Enciso</surname>
          </string-name>
          ,
          <article-title>A´ngel Mora, and Vil´em Vychodil, An Efficient Reasoning Method for Dependencies over Similarity</article-title>
          and
          <source>Ordinal Data, Lecture Notes in Computer Science</source>
          ,
          <volume>7647</volume>
          :
          <fpage>408</fpage>
          -
          <lpage>419</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          5.
          <string-name>
            <given-names>K.</given-names>
            <surname>Bertet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Monjardet</surname>
          </string-name>
          ,
          <article-title>The multiple facets of the canonical direct unit implicational basis</article-title>
          ,
          <source>Theor. Comput. Sci.</source>
          ,
          <volume>411</volume>
          (
          <fpage>22</fpage>
          -24):
          <fpage>2155</fpage>
          -
          <lpage>2166</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Pablo</given-names>
            <surname>Cordero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Manuel</given-names>
            <surname>Enciso</surname>
          </string-name>
          ,
          <article-title>A´ngel Mora, Manuel Ojeda-Aciego, Computing Minimal Generators from Implications: a Logic-guided Approach</article-title>
          ,
          <string-name>
            <surname>CLA</surname>
          </string-name>
          <year>2012</year>
          :
          <fpage>187</fpage>
          -
          <lpage>198</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          7.
          <string-name>
            <given-names>A.</given-names>
            <surname>Day</surname>
          </string-name>
          ,
          <article-title>The lattice theory of functional dependencies and normal decompositions</article-title>
          ,
          <source>International Journal of Algebra and Computation</source>
          ,
          <volume>2</volume>
          : pp.
          <fpage>209</fpage>
          -
          <lpage>431</lpage>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          8.
          <string-name>
            <given-names>B.</given-names>
            <surname>Ganter</surname>
          </string-name>
          ,
          <article-title>Two basic algorithms in concept analysis</article-title>
          ,
          <source>Technische Hochschule, Darmstadt</source>
          ,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          9.
          <string-name>
            <given-names>J.L.</given-names>
            <surname>Guigues</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Duquenne</surname>
          </string-name>
          ,
          <article-title>Familles minimales d'implications informatives r´esultant d'un tableau de donn´ees binaires</article-title>
          ,
          <source>Math. Sci. Humaines</source>
          :
          <volume>95</volume>
          ,
          <fpage>5</fpage>
          -
          <lpage>18</lpage>
          ,
          <year>1986</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          10.
          <string-name>
            <given-names>L.</given-names>
            <surname>Szathmary</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Napoli</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , ZART:
          <string-name>
            <given-names>A Multifunctional</given-names>
            <surname>Itemset Mining Algorithm</surname>
          </string-name>
          ,
          <source>Proc. of the 6th Intl. Conf. on Concept Lattices and Their Applications (CLA '08)</source>
          :
          <fpage>47</fpage>
          -
          <lpage>58</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          11.
          <string-name>
            <given-names>L.</given-names>
            <surname>Szathmary</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Valtchev</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Napoli</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Godin</surname>
          </string-name>
          ,
          <article-title>Efficient Vertical Mining of Frequent Closures and Generators</article-title>
          , LNCS
          <volume>5772</volume>
          :
          <fpage>393</fpage>
          -
          <lpage>404</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          12.
          <string-name>
            <surname>C. Frambourg</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Valtchev</surname>
            , and
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Godin</surname>
          </string-name>
          ,
          <article-title>Merge-based computation of minimal generators</article-title>
          .
          <source>Discrete Mathematics, LNCS</source>
          <volume>3596</volume>
          :
          <fpage>181</fpage>
          -
          <lpage>194</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          13. K. Nehm´e, P. Valtchev,
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Rouane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Godin</surname>
          </string-name>
          ,
          <article-title>On Computing the Minimal Generator Family for Concept Lattices and Icebergs</article-title>
          , LNCS
          <volume>3403</volume>
          :
          <fpage>192</fpage>
          -
          <lpage>207</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          2. S. Andrews: In-Close,
          <article-title>a fast algorithm for computing formal concepts</article-title>
          .
          <source>ICCS</source>
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          3.
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Andrews: In-Close2, a High Performance Formal Concept Miner</article-title>
          .
          <source>ICCS</source>
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          4.
          <string-name>
            <given-names>K.</given-names>
            <surname>Bache</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lichman: UCI Machine Learning</surname>
          </string-name>
          <string-name>
            <surname>Repository</surname>
          </string-name>
          ,
          <year>2013</year>
          , http://archive.ics.uci.edu/ml, University of California, Irvine, School of Information and Computer Sciences.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          5.
          <string-name>
            <surname>Ch</surname>
          </string-name>
          . Borgelt:
          <article-title>Efficient Implementations of Apriori and Eclat</article-title>
          . IEEE ICDM Workshop on FIMI (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          6.
          <string-name>
            <surname>Ch. Borgelt</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Nogales-Cadenas</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Carmona-Saez</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Pascual-Montano</surname>
          </string-name>
          :
          <article-title>Finding Closed Frequent Item Sets by Intersecting Transactions</article-title>
          .
          <source>EDBT</source>
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          7.
          <string-name>
            <given-names>D.</given-names>
            <surname>Burdick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Calimlim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Flannick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gehrke</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          <article-title>Yiu: MAFIA: A Performance Study of Mining Maximal Frequent Itemsets</article-title>
          .
          <source>IEEE ICDM Workshop on FIMI</source>
          (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          8.
          <string-name>
            <given-names>B.</given-names>
            <surname>Ganter</surname>
          </string-name>
          :
          <article-title>Two basic algorithms in concept analysis</article-title>
          .
          <source>(Technical Report FB4- Preprint No. 831)</source>
          .
          <source>TH Darmstadt</source>
          ,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          9.
          <string-name>
            <given-names>B.</given-names>
            <surname>Ganter</surname>
          </string-name>
          , R. Wille:
          <article-title>Formal concept analysis</article-title>
          :
          <source>Mathematical foundations</source>
          . Springer,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          10.
          <string-name>
            <given-names>R.</given-names>
            <surname>Godin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Missaoui</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>Alaoui: Incremental concept formation algorithms based on Galois (concept) lattice</article-title>
          .
          <source>Computational Intelligence</source>
          , vol.
          <volume>1</volume>
          (
          <issue>2</issue>
          ),
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>11. FIMI Repository, http://fimi.ua.ac.be/data/.</mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          12.
          <string-name>
            <given-names>B.</given-names>
            <surname>Goethals</surname>
          </string-name>
          , M. J.
          <source>Zaki: Advances in Frequent Itemset Mining Implementations: Report on FIMI03. SIGKDD Explorations</source>
          , vol.
          <volume>6</volume>
          (
          <issue>1</issue>
          ),
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          13. G. Grahne,
          <string-name>
            <surname>J.</surname>
          </string-name>
          <article-title>Zhu: Efficiently Using Prefix-trees in Mining Frequent Itemsets</article-title>
          .
          <source>IEEE ICDM Workshop on FIMI</source>
          (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          14.
          <string-name>
            <given-names>P.</given-names>
            <surname>Krajca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Outrata</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <article-title>Vychodil: Advances in algorithms based on CbO</article-title>
          .
          <source>CLA</source>
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          15.
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          :
          <article-title>A Fast Algorithm for Computing All Intersections of Objects in a Finite Semi-lattice</article-title>
          .
          <source>Automatic Documentation and Mathematical Linguistics</source>
          , vol.
          <volume>27</volume>
          (
          <issue>5</issue>
          ),
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          16.
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Obiedkov</surname>
          </string-name>
          <article-title>: Comparing Performance of Algorithms for Generating Concept Lattices</article-title>
          .
          <source>Journal of Experimental and Theoretical Artificial Intelligence</source>
          , vol.
          <volume>14</volume>
          (
          <issue>2-3</issue>
          ),
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          17.
          <string-name>
            <surname>Ch</surname>
          </string-name>
          . Lindig:
          <article-title>Fast Concept Analysis</article-title>
          .
          <source>Working with Conceptual Structures - Contributions to ICCS</source>
          <year>2000</year>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          18. G. Liu,
          <string-name>
            <given-names>H.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. X.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wei</surname>
          </string-name>
          ,
          <string-name>
            <surname>X.</surname>
          </string-name>
          <article-title>Xiao: AFOPT: An Efficient Implementation of Pattern Growth Approach</article-title>
          . IEEE ICDM Workshop on FIMI (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          19.
          <string-name>
            <surname>C. Lucchese</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Orlando</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <article-title>Perego: DCI Closed: A Fast and Memory Efficient Algorithm to Mine Frequent Closed Itemsets</article-title>
          .
          <source>IEEE ICDM Workshop on FIMI</source>
          (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          20.
          <string-name>
            <given-names>B.</given-names>
            <surname>Martin</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          <article-title>Euklund: From Concepts to Concept Lattice: A Border Algorithm for Making Covers Explicit</article-title>
          . ICFCA,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          21.
          <string-name>
            <surname>E. M.</surname>
          </string-name>
          <article-title>Norris: An Algorithm for Computing the Maximal Rectangles in a Binary Relation</article-title>
          . Revue Roumaine de Math´ematiques Pures et Appliqu´ees, vol.
          <volume>23</volume>
          (
          <issue>2</issue>
          ),
          <year>1978</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          22. L.
          <string-name>
            <surname>Nourine</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <article-title>Raynaud: A fast algorithm for building lattices</article-title>
          .
          <source>Information Processing Letters</source>
          , vol.
          <volume>71</volume>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          23. G. Stumme,
          <string-name>
            <given-names>R.</given-names>
            <surname>Taouil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bastide</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Pasquier</surname>
          </string-name>
          , L. Lakhal:
          <article-title>Computing Iceberg Concept Lattices with Titanic</article-title>
          .
          <source>Journal on Knowledge and Data Engineering</source>
          , vol.
          <volume>42</volume>
          (
          <issue>2</issue>
          ),
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          24. T. Uno,
          <string-name>
            <given-names>T.</given-names>
            <surname>Asai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Uchida</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>Arimura: LCM: An Efficient Algorithm for Enumerating Frequent Closed Item Sets</article-title>
          .
          <source>IEEE ICDM Workshop on FIMI</source>
          (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          25. R. Wille:
          <article-title>Restructuring lattice theory: An approach based on hierarchies of concepts</article-title>
          .
          <source>Ordered Sets</source>
          , vol.
          <volume>83</volume>
          ,
          <year>1982</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          26.
          <string-name>
            <surname>M. J. Zaki</surname>
          </string-name>
          :
          <article-title>Scalable algorithms for association mining</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engeneering</source>
          , vol.
          <volume>12</volume>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>