<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Steering Committee</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
				<date type="published" when="2013-10">October 2013</date>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Radim</forename><surname>Belohlavek</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Sergei</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Engelbert</forename><forename type="middle">Mephu</forename><surname>Nguifo</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Amedeo</forename><surname>Napoli</surname></persName>
							<email>amedeo.napoli@loria.fr</email>
							<affiliation key="aff59">
								<orgName type="laboratory">LIRMM</orgName>
								<orgName type="institution">CNRS et Univ. Montpellier)</orgName>
								<address>
									<addrLine>161, rue Ada</addrLine>
									<postCode>F-34392</postCode>
									<settlement>Montpellier Cdx</settlement>
								</address>
							</affiliation>
							<affiliation key="aff63">
								<orgName type="laboratory">LORIA (CNRS</orgName>
								<orgName type="institution">Inria Nancy Grand Est -Université de Lorraine)</orgName>
								<address>
									<postBox>P. 239</postBox>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Dpt. of Mathematics</orgName>
								<orgName type="institution">University of Cádiz</orgName>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Grabisch</orgName>
								<address>
									<settlement>Michel</settlement>
								</address>
							</affiliation>
							<affiliation key="aff58">
								<orgName type="department">Tetis/Irstea</orgName>
								<address>
									<addrLine>Maison de la télédétection, 500 rue JF Breton</addrLine>
									<postCode>34093, Cdx</postCode>
									<settlement>Montpellier</settlement>
								</address>
							</affiliation>
							<affiliation key="aff62">
								<orgName type="institution" key="instit1">Université de Lyon</orgName>
								<orgName type="institution" key="instit2">CNRS</orgName>
								<orgName type="institution" key="instit3">INSA-Lyon</orgName>
								<address>
									<addrLine>LIRIS. UMR5205</addrLine>
									<postCode>F-69621</postCode>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff72">
								<orgName type="institution">LORIA</orgName>
								<address>
									<addrLine>BP 70239</addrLine>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="laboratory">IRIT</orgName>
								<orgName type="institution">Université Paul Sabatier</orgName>
								<address>
									<addrLine>118 route de Narbonne</addrLine>
									<postCode>31062</postCode>
									<settlement>Toulouse cedex 9</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="department">Departamento de Teoría de la Señal y de</orgName>
								<orgName type="institution">Comunicaciones</orgName>
							</affiliation>
							<affiliation key="aff78">
								<orgName type="institution">Universidad Carlos III de Madrid</orgName>
								<address>
									<postCode>28911</postCode>
									<settlement>Leganés</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="department">Dpt. Automática y Computación</orgName>
								<orgName type="institution">Univ. Pública de Navarra. Spain</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Manuel</forename><surname>Ojeda-Aciego</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Program</forename><surname>Committee</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Ana</forename><surname>Burusco</surname></persName>
							<email>burusco@unavarra.es</email>
							<affiliation key="aff58">
								<orgName type="department">Tetis/Irstea</orgName>
								<address>
									<addrLine>Maison de la télédétection, 500 rue JF Breton</addrLine>
									<postCode>34093, Cdx</postCode>
									<settlement>Montpellier</settlement>
								</address>
							</affiliation>
							<affiliation key="aff62">
								<orgName type="institution" key="instit1">Université de Lyon</orgName>
								<orgName type="institution" key="instit2">CNRS</orgName>
								<orgName type="institution" key="instit3">INSA-Lyon</orgName>
								<address>
									<addrLine>LIRIS. UMR5205</addrLine>
									<postCode>F-69621</postCode>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff72">
								<orgName type="institution">LORIA</orgName>
								<address>
									<addrLine>BP 70239</addrLine>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="laboratory">IRIT</orgName>
								<orgName type="institution">Université Paul Sabatier</orgName>
								<address>
									<addrLine>118 route de Narbonne</addrLine>
									<postCode>31062</postCode>
									<settlement>Toulouse cedex 9</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="department">Departamento de Teoría de la Señal y de</orgName>
								<orgName type="institution">Comunicaciones</orgName>
							</affiliation>
							<affiliation key="aff78">
								<orgName type="institution">Universidad Carlos III de Madrid</orgName>
								<address>
									<postCode>28911</postCode>
									<settlement>Leganés</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="department">Dpt. Automática y Computación</orgName>
								<orgName type="institution">Univ. Pública de Navarra. Spain</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Pablo</forename><surname>Cordero</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Sebastien</forename><surname>Ferre</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Alain</forename><surname>Gély</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Robert</forename><surname>Godin</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Olivier</forename><surname>Raynaud</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Juan</forename><surname>Carlos</surname></persName>
							<email>juancarlos.diaz@uca.es</email>
						</author>
						<author>
							<persName><forename type="first">Díaz</forename><surname>Moreno</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Jan</forename><surname>Outrata</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Ralph</forename><surname>Freese</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Bart</forename><surname>Goethals</surname></persName>
							<email>bart.goethals@ua.ac.be</email>
						</author>
						<author>
							<persName><forename type="first">Michel</forename><surname>Grabisch</surname></persName>
							<email>michel.grabisch@univ-paris1.fr</email>
						</author>
						<author>
							<persName><forename type="first">Vincent</forename><surname>Duquenne</surname></persName>
							<email>duquenne@math.jussieu.fr</email>
						</author>
						<author>
							<persName><forename type="first">A</forename><forename type="middle">Osman</forename><surname>Guédi</surname></persName>
							<affiliation key="aff57">
								<orgName type="institution">Université de Djibouti</orgName>
								<address>
									<addrLine>Avenue Georges Clémenceau BP</addrLine>
									<postCode>1904</postCode>
									<settlement>Djibouti</settlement>
									<region>REP</region>
								</address>
							</affiliation>
							<affiliation key="aff58">
								<orgName type="department">Tetis/Irstea</orgName>
								<address>
									<addrLine>Maison de la télédétection, 500 rue JF Breton</addrLine>
									<postCode>34093, Cdx</postCode>
									<settlement>Montpellier</settlement>
								</address>
							</affiliation>
							<affiliation key="aff59">
								<orgName type="laboratory">LIRMM</orgName>
								<orgName type="institution">CNRS et Univ. Montpellier)</orgName>
								<address>
									<addrLine>161, rue Ada</addrLine>
									<postCode>F-34392</postCode>
									<settlement>Montpellier Cdx</settlement>
								</address>
							</affiliation>
							<affiliation key="aff61">
								<orgName type="institution">Universitat Politècnica de Catalunya</orgName>
								<address>
									<postCode>08032</postCode>
									<settlement>Barcelona</settlement>
									<country>Catalonia</country>
								</address>
							</affiliation>
							<affiliation key="aff62">
								<orgName type="institution" key="instit1">Université de Lyon</orgName>
								<orgName type="institution" key="instit2">CNRS</orgName>
								<orgName type="institution" key="instit3">INSA-Lyon</orgName>
								<address>
									<addrLine>LIRIS. UMR5205</addrLine>
									<postCode>F-69621</postCode>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff63">
								<orgName type="laboratory">LORIA (CNRS</orgName>
								<orgName type="institution">Inria Nancy Grand Est -Université de Lorraine)</orgName>
								<address>
									<postBox>P. 239</postBox>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
								</address>
							</affiliation>
							<affiliation key="aff71">
								<orgName type="institution">Universidad Técnica Federico Santa María</orgName>
								<address>
									<addrLine>Av. España</addrLine>
									<postCode>1680</postCode>
									<settlement>Valparaíso</settlement>
									<country key="CL">Chile</country>
								</address>
							</affiliation>
							<affiliation key="aff72">
								<orgName type="institution">LORIA</orgName>
								<address>
									<addrLine>BP 70239</addrLine>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff73">
								<orgName type="laboratory">IRISA</orgName>
								<orgName type="institution">University Rennes</orgName>
							</affiliation>
							<affiliation key="aff74">
								<orgName type="institution">ENSSAT</orgName>
								<address>
									<addrLine>6 rue Kerampont</addrLine>
									<postCode>22305</postCode>
									<settlement>Lannion</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="laboratory">IRIT</orgName>
								<orgName type="institution">Université Paul Sabatier</orgName>
								<address>
									<addrLine>118 route de Narbonne</addrLine>
									<postCode>31062</postCode>
									<settlement>Toulouse cedex 9</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="department">Departamento de Lenguajes y Sistemas Informáticos Univ</orgName>
								<orgName type="institution">Nacional de Educación a Distancia</orgName>
								<address>
									<addrLine>c/ Juan del Rosal</addrLine>
									<postCode>16. 28040</postCode>
									<settlement>Madrid</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="department">Departamento de Teoría de la Señal y de</orgName>
								<orgName type="institution">Comunicaciones</orgName>
							</affiliation>
							<affiliation key="aff78">
								<orgName type="institution">Universidad Carlos III de Madrid</orgName>
								<address>
									<postCode>28911</postCode>
									<settlement>Leganés</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff79">
								<orgName type="department">Dpt. Matemática Aplicada</orgName>
								<orgName type="institution">Universidad del País Vasco UPV/EHU</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="department">Dpt. Automática y Computación</orgName>
								<orgName type="institution">Univ. Pública de Navarra. Spain</orgName>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Dpt. of Mathematics</orgName>
								<orgName type="institution">University of Cádiz</orgName>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">Fuentes-González</orgName>
								<address>
									<addrLine>Ramon, 225 Ganascia, Jean-Gabriel, 45 Garanina, Natalia O., Cynthia Vera</addrLine>
									<postCode>287</postCode>
									<settlement>Glodeanu</settlement>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Grabisch</orgName>
								<address>
									<settlement>Michel</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">A</forename><surname>Miralles</surname></persName>
							<affiliation key="aff58">
								<orgName type="department">Tetis/Irstea</orgName>
								<address>
									<addrLine>Maison de la télédétection, 500 rue JF Breton</addrLine>
									<postCode>34093, Cdx</postCode>
									<settlement>Montpellier</settlement>
								</address>
							</affiliation>
							<affiliation key="aff62">
								<orgName type="institution" key="instit1">Université de Lyon</orgName>
								<orgName type="institution" key="instit2">CNRS</orgName>
								<orgName type="institution" key="instit3">INSA-Lyon</orgName>
								<address>
									<addrLine>LIRIS. UMR5205</addrLine>
									<postCode>F-69621</postCode>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff72">
								<orgName type="institution">LORIA</orgName>
								<address>
									<addrLine>BP 70239</addrLine>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="laboratory">IRIT</orgName>
								<orgName type="institution">Université Paul Sabatier</orgName>
								<address>
									<addrLine>118 route de Narbonne</addrLine>
									<postCode>31062</postCode>
									<settlement>Toulouse cedex 9</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="department">Departamento de Teoría de la Señal y de</orgName>
								<orgName type="institution">Comunicaciones</orgName>
							</affiliation>
							<affiliation key="aff78">
								<orgName type="institution">Universidad Carlos III de Madrid</orgName>
								<address>
									<postCode>28911</postCode>
									<settlement>Leganés</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="department">Dpt. Automática y Computación</orgName>
								<orgName type="institution">Univ. Pública de Navarra. Spain</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
							<affiliation key="aff59">
								<orgName type="laboratory">LIRMM</orgName>
								<orgName type="institution">CNRS et Univ. Montpellier)</orgName>
								<address>
									<addrLine>161, rue Ada</addrLine>
									<postCode>F-34392</postCode>
									<settlement>Montpellier Cdx</settlement>
								</address>
							</affiliation>
							<affiliation key="aff63">
								<orgName type="laboratory">LORIA (CNRS</orgName>
								<orgName type="institution">Inria Nancy Grand Est -Université de Lorraine)</orgName>
								<address>
									<postBox>P. 239</postBox>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Dpt. of Mathematics</orgName>
								<orgName type="institution">University of Cádiz</orgName>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Grabisch</orgName>
								<address>
									<settlement>Michel</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">C</forename><surname>Nebut</surname></persName>
							<affiliation key="aff59">
								<orgName type="laboratory">LIRMM</orgName>
								<orgName type="institution">CNRS et Univ. Montpellier)</orgName>
								<address>
									<addrLine>161, rue Ada</addrLine>
									<postCode>F-34392</postCode>
									<settlement>Montpellier Cdx</settlement>
								</address>
							</affiliation>
							<affiliation key="aff63">
								<orgName type="laboratory">LORIA (CNRS</orgName>
								<orgName type="institution">Inria Nancy Grand Est -Université de Lorraine)</orgName>
								<address>
									<postBox>P. 239</postBox>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Dpt. of Mathematics</orgName>
								<orgName type="institution">University of Cádiz</orgName>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Grabisch</orgName>
								<address>
									<settlement>Michel</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ants</forename><surname>Torim</surname></persName>
							<email>ants.torim@ttu.ee</email>
							<affiliation key="aff57">
								<orgName type="institution">Université de Djibouti</orgName>
								<address>
									<addrLine>Avenue Georges Clémenceau BP</addrLine>
									<postCode>1904</postCode>
									<settlement>Djibouti</settlement>
									<region>REP</region>
								</address>
							</affiliation>
							<affiliation key="aff61">
								<orgName type="institution">Universitat Politècnica de Catalunya</orgName>
								<address>
									<postCode>08032</postCode>
									<settlement>Barcelona</settlement>
									<country>Catalonia</country>
								</address>
							</affiliation>
							<affiliation key="aff71">
								<orgName type="institution">Universidad Técnica Federico Santa María</orgName>
								<address>
									<addrLine>Av. España</addrLine>
									<postCode>1680</postCode>
									<settlement>Valparaíso</settlement>
									<country key="CL">Chile</country>
								</address>
							</affiliation>
							<affiliation key="aff73">
								<orgName type="laboratory">IRISA</orgName>
								<orgName type="institution">University Rennes</orgName>
							</affiliation>
							<affiliation key="aff74">
								<orgName type="institution">ENSSAT</orgName>
								<address>
									<addrLine>6 rue Kerampont</addrLine>
									<postCode>22305</postCode>
									<settlement>Lannion</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="department">Departamento de Lenguajes y Sistemas Informáticos Univ</orgName>
								<orgName type="institution">Nacional de Educación a Distancia</orgName>
								<address>
									<addrLine>c/ Juan del Rosal</addrLine>
									<postCode>16. 28040</postCode>
									<settlement>Madrid</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff79">
								<orgName type="department">Dpt. Matemática Aplicada</orgName>
								<orgName type="institution">Universidad del País Vasco UPV/EHU</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">Fuentes-González</orgName>
								<address>
									<addrLine>Ramon, 225 Ganascia, Jean-Gabriel, 45 Garanina, Natalia O., Cynthia Vera</addrLine>
									<postCode>287</postCode>
									<settlement>Glodeanu</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jaume</forename><surname>Baixeries</surname></persName>
							<affiliation key="aff57">
								<orgName type="institution">Université de Djibouti</orgName>
								<address>
									<addrLine>Avenue Georges Clémenceau BP</addrLine>
									<postCode>1904</postCode>
									<settlement>Djibouti</settlement>
									<region>REP</region>
								</address>
							</affiliation>
							<affiliation key="aff61">
								<orgName type="institution">Universitat Politècnica de Catalunya</orgName>
								<address>
									<postCode>08032</postCode>
									<settlement>Barcelona</settlement>
									<country>Catalonia</country>
								</address>
							</affiliation>
							<affiliation key="aff71">
								<orgName type="institution">Universidad Técnica Federico Santa María</orgName>
								<address>
									<addrLine>Av. España</addrLine>
									<postCode>1680</postCode>
									<settlement>Valparaíso</settlement>
									<country key="CL">Chile</country>
								</address>
							</affiliation>
							<affiliation key="aff73">
								<orgName type="laboratory">IRISA</orgName>
								<orgName type="institution">University Rennes</orgName>
							</affiliation>
							<affiliation key="aff74">
								<orgName type="institution">ENSSAT</orgName>
								<address>
									<addrLine>6 rue Kerampont</addrLine>
									<postCode>22305</postCode>
									<settlement>Lannion</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="department">Departamento de Lenguajes y Sistemas Informáticos Univ</orgName>
								<orgName type="institution">Nacional de Educación a Distancia</orgName>
								<address>
									<addrLine>c/ Juan del Rosal</addrLine>
									<postCode>16. 28040</postCode>
									<settlement>Madrid</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff79">
								<orgName type="department">Dpt. Matemática Aplicada</orgName>
								<orgName type="institution">Universidad del País Vasco UPV/EHU</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">Fuentes-González</orgName>
								<address>
									<addrLine>Ramon, 225 Ganascia, Jean-Gabriel, 45 Garanina, Natalia O., Cynthia Vera</addrLine>
									<postCode>287</postCode>
									<settlement>Glodeanu</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mehdi</forename><surname>Kaytoue</surname></persName>
							<email>mehdi.kaytoue@insa-lyon.fr</email>
							<affiliation key="aff58">
								<orgName type="department">Tetis/Irstea</orgName>
								<address>
									<addrLine>Maison de la télédétection, 500 rue JF Breton</addrLine>
									<postCode>34093, Cdx</postCode>
									<settlement>Montpellier</settlement>
								</address>
							</affiliation>
							<affiliation key="aff62">
								<orgName type="institution" key="instit1">Université de Lyon</orgName>
								<orgName type="institution" key="instit2">CNRS</orgName>
								<orgName type="institution" key="instit3">INSA-Lyon</orgName>
								<address>
									<addrLine>LIRIS. UMR5205</addrLine>
									<postCode>F-69621</postCode>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff72">
								<orgName type="institution">LORIA</orgName>
								<address>
									<addrLine>BP 70239</addrLine>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="laboratory">IRIT</orgName>
								<orgName type="institution">Université Paul Sabatier</orgName>
								<address>
									<addrLine>118 route de Narbonne</addrLine>
									<postCode>31062</postCode>
									<settlement>Toulouse cedex 9</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="department">Departamento de Teoría de la Señal y de</orgName>
								<orgName type="institution">Comunicaciones</orgName>
							</affiliation>
							<affiliation key="aff78">
								<orgName type="institution">Universidad Carlos III de Madrid</orgName>
								<address>
									<postCode>28911</postCode>
									<settlement>Leganés</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="department">Dpt. Automática y Computación</orgName>
								<orgName type="institution">Univ. Pública de Navarra. Spain</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alexandre</forename><surname>Bazin</surname></persName>
							<email>alexandre.bazin@lip6.fr</email>
						</author>
						<author>
							<persName><forename type="first">Jean-Gabriel</forename><surname>Ganascia</surname></persName>
							<email>jean-gabriel@ganascia.name</email>
						</author>
						<author>
							<persName><forename type="first">Patrick</forename><surname>De Causmaecker</surname></persName>
							<email>patrick.decausmaecker@kuleuven-kulak.be</email>
						</author>
						<author>
							<persName><forename type="first">Stefan</forename><surname>De Wannemacker</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Cynthia</forename><forename type="middle">Vera</forename><surname>Glodeanu</surname></persName>
							<email>cynthia-vera.glodeanu@tu-dresden.de</email>
						</author>
						<author>
							<persName><forename type="first">Clément</forename><surname>Guérin</surname></persName>
							<email>clement.guerin@univ-lr.fr</email>
						</author>
						<author>
							<persName><forename type="first">Karell</forename><surname>Bertet</surname></persName>
							<email>karell.bertet@univ-lr.fr</email>
						</author>
						<author>
							<persName><forename type="first">Arnaud</forename><surname>Revel</surname></persName>
							<email>arnaud.revel@univ-lr.fr</email>
						</author>
						<author>
							<persName><forename type="first">Florent</forename><surname>Domenach</surname></persName>
							<email>domenach.f@unic.ac.cy</email>
						</author>
						<author>
							<persName><forename type="first">Renzo</forename><surname>Stanley</surname></persName>
							<email>rstanley@inf.utfsm.cl</email>
							<affiliation key="aff57">
								<orgName type="institution">Université de Djibouti</orgName>
								<address>
									<addrLine>Avenue Georges Clémenceau BP</addrLine>
									<postCode>1904</postCode>
									<settlement>Djibouti</settlement>
									<region>REP</region>
								</address>
							</affiliation>
							<affiliation key="aff61">
								<orgName type="institution">Universitat Politècnica de Catalunya</orgName>
								<address>
									<postCode>08032</postCode>
									<settlement>Barcelona</settlement>
									<country>Catalonia</country>
								</address>
							</affiliation>
							<affiliation key="aff71">
								<orgName type="institution">Universidad Técnica Federico Santa María</orgName>
								<address>
									<addrLine>Av. España</addrLine>
									<postCode>1680</postCode>
									<settlement>Valparaíso</settlement>
									<country key="CL">Chile</country>
								</address>
							</affiliation>
							<affiliation key="aff73">
								<orgName type="laboratory">IRISA</orgName>
								<orgName type="institution">University Rennes</orgName>
							</affiliation>
							<affiliation key="aff74">
								<orgName type="institution">ENSSAT</orgName>
								<address>
									<addrLine>6 rue Kerampont</addrLine>
									<postCode>22305</postCode>
									<settlement>Lannion</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="department">Departamento de Lenguajes y Sistemas Informáticos Univ</orgName>
								<orgName type="institution">Nacional de Educación a Distancia</orgName>
								<address>
									<addrLine>c/ Juan del Rosal</addrLine>
									<postCode>16. 28040</postCode>
									<settlement>Madrid</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff79">
								<orgName type="department">Dpt. Matemática Aplicada</orgName>
								<orgName type="institution">Universidad del País Vasco UPV/EHU</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">Fuentes-González</orgName>
								<address>
									<addrLine>Ramon, 225 Ganascia, Jean-Gabriel, 45 Garanina, Natalia O., Cynthia Vera</addrLine>
									<postCode>287</postCode>
									<settlement>Glodeanu</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hernán</forename><surname>Astudillo</surname></persName>
							<affiliation key="aff57">
								<orgName type="institution">Université de Djibouti</orgName>
								<address>
									<addrLine>Avenue Georges Clémenceau BP</addrLine>
									<postCode>1904</postCode>
									<settlement>Djibouti</settlement>
									<region>REP</region>
								</address>
							</affiliation>
							<affiliation key="aff61">
								<orgName type="institution">Universitat Politècnica de Catalunya</orgName>
								<address>
									<postCode>08032</postCode>
									<settlement>Barcelona</settlement>
									<country>Catalonia</country>
								</address>
							</affiliation>
							<affiliation key="aff71">
								<orgName type="institution">Universidad Técnica Federico Santa María</orgName>
								<address>
									<addrLine>Av. España</addrLine>
									<postCode>1680</postCode>
									<settlement>Valparaíso</settlement>
									<country key="CL">Chile</country>
								</address>
							</affiliation>
							<affiliation key="aff73">
								<orgName type="laboratory">IRISA</orgName>
								<orgName type="institution">University Rennes</orgName>
							</affiliation>
							<affiliation key="aff74">
								<orgName type="institution">ENSSAT</orgName>
								<address>
									<addrLine>6 rue Kerampont</addrLine>
									<postCode>22305</postCode>
									<settlement>Lannion</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="department">Departamento de Lenguajes y Sistemas Informáticos Univ</orgName>
								<orgName type="institution">Nacional de Educación a Distancia</orgName>
								<address>
									<addrLine>c/ Juan del Rosal</addrLine>
									<postCode>16. 28040</postCode>
									<settlement>Madrid</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff79">
								<orgName type="department">Dpt. Matemática Aplicada</orgName>
								<orgName type="institution">Universidad del País Vasco UPV/EHU</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">Fuentes-González</orgName>
								<address>
									<addrLine>Ramon, 225 Ganascia, Jean-Gabriel, 45 Garanina, Natalia O., Cynthia Vera</addrLine>
									<postCode>287</postCode>
									<settlement>Glodeanu</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Víctor</forename><surname>Codocedo</surname></persName>
							<email>victor.codocedo@loria.fr</email>
							<affiliation key="aff58">
								<orgName type="department">Tetis/Irstea</orgName>
								<address>
									<addrLine>Maison de la télédétection, 500 rue JF Breton</addrLine>
									<postCode>34093, Cdx</postCode>
									<settlement>Montpellier</settlement>
								</address>
							</affiliation>
							<affiliation key="aff62">
								<orgName type="institution" key="instit1">Université de Lyon</orgName>
								<orgName type="institution" key="instit2">CNRS</orgName>
								<orgName type="institution" key="instit3">INSA-Lyon</orgName>
								<address>
									<addrLine>LIRIS. UMR5205</addrLine>
									<postCode>F-69621</postCode>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff72">
								<orgName type="institution">LORIA</orgName>
								<address>
									<addrLine>BP 70239</addrLine>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="laboratory">IRIT</orgName>
								<orgName type="institution">Université Paul Sabatier</orgName>
								<address>
									<addrLine>118 route de Narbonne</addrLine>
									<postCode>31062</postCode>
									<settlement>Toulouse cedex 9</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="department">Departamento de Teoría de la Señal y de</orgName>
								<orgName type="institution">Comunicaciones</orgName>
							</affiliation>
							<affiliation key="aff78">
								<orgName type="institution">Universidad Carlos III de Madrid</orgName>
								<address>
									<postCode>28911</postCode>
									<settlement>Leganés</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="department">Dpt. Automática y Computación</orgName>
								<orgName type="institution">Univ. Pública de Navarra. Spain</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nelly</forename><surname>Barbot</surname></persName>
							<affiliation key="aff57">
								<orgName type="institution">Université de Djibouti</orgName>
								<address>
									<addrLine>Avenue Georges Clémenceau BP</addrLine>
									<postCode>1904</postCode>
									<settlement>Djibouti</settlement>
									<region>REP</region>
								</address>
							</affiliation>
							<affiliation key="aff61">
								<orgName type="institution">Universitat Politècnica de Catalunya</orgName>
								<address>
									<postCode>08032</postCode>
									<settlement>Barcelona</settlement>
									<country>Catalonia</country>
								</address>
							</affiliation>
							<affiliation key="aff71">
								<orgName type="institution">Universidad Técnica Federico Santa María</orgName>
								<address>
									<addrLine>Av. España</addrLine>
									<postCode>1680</postCode>
									<settlement>Valparaíso</settlement>
									<country key="CL">Chile</country>
								</address>
							</affiliation>
							<affiliation key="aff73">
								<orgName type="laboratory">IRISA</orgName>
								<orgName type="institution">University Rennes</orgName>
							</affiliation>
							<affiliation key="aff74">
								<orgName type="institution">ENSSAT</orgName>
								<address>
									<addrLine>6 rue Kerampont</addrLine>
									<postCode>22305</postCode>
									<settlement>Lannion</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="department">Departamento de Lenguajes y Sistemas Informáticos Univ</orgName>
								<orgName type="institution">Nacional de Educación a Distancia</orgName>
								<address>
									<addrLine>c/ Juan del Rosal</addrLine>
									<postCode>16. 28040</postCode>
									<settlement>Madrid</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff79">
								<orgName type="department">Dpt. Matemática Aplicada</orgName>
								<orgName type="institution">Universidad del País Vasco UPV/EHU</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">Fuentes-González</orgName>
								<address>
									<addrLine>Ramon, 225 Ganascia, Jean-Gabriel, 45 Garanina, Natalia O., Cynthia Vera</addrLine>
									<postCode>287</postCode>
									<settlement>Glodeanu</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Laurent</forename><surname>Miclet</surname></persName>
							<affiliation key="aff57">
								<orgName type="institution">Université de Djibouti</orgName>
								<address>
									<addrLine>Avenue Georges Clémenceau BP</addrLine>
									<postCode>1904</postCode>
									<settlement>Djibouti</settlement>
									<region>REP</region>
								</address>
							</affiliation>
							<affiliation key="aff61">
								<orgName type="institution">Universitat Politècnica de Catalunya</orgName>
								<address>
									<postCode>08032</postCode>
									<settlement>Barcelona</settlement>
									<country>Catalonia</country>
								</address>
							</affiliation>
							<affiliation key="aff71">
								<orgName type="institution">Universidad Técnica Federico Santa María</orgName>
								<address>
									<addrLine>Av. España</addrLine>
									<postCode>1680</postCode>
									<settlement>Valparaíso</settlement>
									<country key="CL">Chile</country>
								</address>
							</affiliation>
							<affiliation key="aff73">
								<orgName type="laboratory">IRISA</orgName>
								<orgName type="institution">University Rennes</orgName>
							</affiliation>
							<affiliation key="aff74">
								<orgName type="institution">ENSSAT</orgName>
								<address>
									<addrLine>6 rue Kerampont</addrLine>
									<postCode>22305</postCode>
									<settlement>Lannion</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="department">Departamento de Lenguajes y Sistemas Informáticos Univ</orgName>
								<orgName type="institution">Nacional de Educación a Distancia</orgName>
								<address>
									<addrLine>c/ Juan del Rosal</addrLine>
									<postCode>16. 28040</postCode>
									<settlement>Madrid</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff79">
								<orgName type="department">Dpt. Matemática Aplicada</orgName>
								<orgName type="institution">Universidad del País Vasco UPV/EHU</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">Fuentes-González</orgName>
								<address>
									<addrLine>Ramon, 225 Ganascia, Jean-Gabriel, 45 Garanina, Natalia O., Cynthia Vera</addrLine>
									<postCode>287</postCode>
									<settlement>Glodeanu</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Henri</forename><surname>Prade</surname></persName>
							<affiliation key="aff58">
								<orgName type="department">Tetis/Irstea</orgName>
								<address>
									<addrLine>Maison de la télédétection, 500 rue JF Breton</addrLine>
									<postCode>34093, Cdx</postCode>
									<settlement>Montpellier</settlement>
								</address>
							</affiliation>
							<affiliation key="aff62">
								<orgName type="institution" key="instit1">Université de Lyon</orgName>
								<orgName type="institution" key="instit2">CNRS</orgName>
								<orgName type="institution" key="instit3">INSA-Lyon</orgName>
								<address>
									<addrLine>LIRIS. UMR5205</addrLine>
									<postCode>F-69621</postCode>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff72">
								<orgName type="institution">LORIA</orgName>
								<address>
									<addrLine>BP 70239</addrLine>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="laboratory">IRIT</orgName>
								<orgName type="institution">Université Paul Sabatier</orgName>
								<address>
									<addrLine>118 route de Narbonne</addrLine>
									<postCode>31062</postCode>
									<settlement>Toulouse cedex 9</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="department">Departamento de Teoría de la Señal y de</orgName>
								<orgName type="institution">Comunicaciones</orgName>
							</affiliation>
							<affiliation key="aff78">
								<orgName type="institution">Universidad Carlos III de Madrid</orgName>
								<address>
									<postCode>28911</postCode>
									<settlement>Leganés</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="department">Dpt. Automática y Computación</orgName>
								<orgName type="institution">Univ. Pública de Navarra. Spain</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francisco</forename><forename type="middle">J</forename><surname>Valverde-Albacete</surname></persName>
							<affiliation key="aff57">
								<orgName type="institution">Université de Djibouti</orgName>
								<address>
									<addrLine>Avenue Georges Clémenceau BP</addrLine>
									<postCode>1904</postCode>
									<settlement>Djibouti</settlement>
									<region>REP</region>
								</address>
							</affiliation>
							<affiliation key="aff61">
								<orgName type="institution">Universitat Politècnica de Catalunya</orgName>
								<address>
									<postCode>08032</postCode>
									<settlement>Barcelona</settlement>
									<country>Catalonia</country>
								</address>
							</affiliation>
							<affiliation key="aff71">
								<orgName type="institution">Universidad Técnica Federico Santa María</orgName>
								<address>
									<addrLine>Av. España</addrLine>
									<postCode>1680</postCode>
									<settlement>Valparaíso</settlement>
									<country key="CL">Chile</country>
								</address>
							</affiliation>
							<affiliation key="aff73">
								<orgName type="laboratory">IRISA</orgName>
								<orgName type="institution">University Rennes</orgName>
							</affiliation>
							<affiliation key="aff74">
								<orgName type="institution">ENSSAT</orgName>
								<address>
									<addrLine>6 rue Kerampont</addrLine>
									<postCode>22305</postCode>
									<settlement>Lannion</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="department">Departamento de Lenguajes y Sistemas Informáticos Univ</orgName>
								<orgName type="institution">Nacional de Educación a Distancia</orgName>
								<address>
									<addrLine>c/ Juan del Rosal</addrLine>
									<postCode>16. 28040</postCode>
									<settlement>Madrid</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff79">
								<orgName type="department">Dpt. Matemática Aplicada</orgName>
								<orgName type="institution">Universidad del País Vasco UPV/EHU</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">Fuentes-González</orgName>
								<address>
									<addrLine>Ramon, 225 Ganascia, Jean-Gabriel, 45 Garanina, Natalia O., Cynthia Vera</addrLine>
									<postCode>287</postCode>
									<settlement>Glodeanu</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Carmen</forename><surname>Peláez-Moreno</surname></persName>
							<email>carmen@tsc.uc3m.es</email>
							<affiliation key="aff58">
								<orgName type="department">Tetis/Irstea</orgName>
								<address>
									<addrLine>Maison de la télédétection, 500 rue JF Breton</addrLine>
									<postCode>34093, Cdx</postCode>
									<settlement>Montpellier</settlement>
								</address>
							</affiliation>
							<affiliation key="aff62">
								<orgName type="institution" key="instit1">Université de Lyon</orgName>
								<orgName type="institution" key="instit2">CNRS</orgName>
								<orgName type="institution" key="instit3">INSA-Lyon</orgName>
								<address>
									<addrLine>LIRIS. UMR5205</addrLine>
									<postCode>F-69621</postCode>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff72">
								<orgName type="institution">LORIA</orgName>
								<address>
									<addrLine>BP 70239</addrLine>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="laboratory">IRIT</orgName>
								<orgName type="institution">Université Paul Sabatier</orgName>
								<address>
									<addrLine>118 route de Narbonne</addrLine>
									<postCode>31062</postCode>
									<settlement>Toulouse cedex 9</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="department">Departamento de Teoría de la Señal y de</orgName>
								<orgName type="institution">Comunicaciones</orgName>
							</affiliation>
							<affiliation key="aff78">
								<orgName type="institution">Universidad Carlos III de Madrid</orgName>
								<address>
									<postCode>28911</postCode>
									<settlement>Leganés</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="department">Dpt. Automática y Computación</orgName>
								<orgName type="institution">Univ. Pública de Navarra. Spain</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">C</forename><surname>Alcalde</surname></persName>
							<email>c.alcalde@ehu.es</email>
							<affiliation key="aff57">
								<orgName type="institution">Université de Djibouti</orgName>
								<address>
									<addrLine>Avenue Georges Clémenceau BP</addrLine>
									<postCode>1904</postCode>
									<settlement>Djibouti</settlement>
									<region>REP</region>
								</address>
							</affiliation>
							<affiliation key="aff61">
								<orgName type="institution">Universitat Politècnica de Catalunya</orgName>
								<address>
									<postCode>08032</postCode>
									<settlement>Barcelona</settlement>
									<country>Catalonia</country>
								</address>
							</affiliation>
							<affiliation key="aff71">
								<orgName type="institution">Universidad Técnica Federico Santa María</orgName>
								<address>
									<addrLine>Av. España</addrLine>
									<postCode>1680</postCode>
									<settlement>Valparaíso</settlement>
									<country key="CL">Chile</country>
								</address>
							</affiliation>
							<affiliation key="aff73">
								<orgName type="laboratory">IRISA</orgName>
								<orgName type="institution">University Rennes</orgName>
							</affiliation>
							<affiliation key="aff74">
								<orgName type="institution">ENSSAT</orgName>
								<address>
									<addrLine>6 rue Kerampont</addrLine>
									<postCode>22305</postCode>
									<settlement>Lannion</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="department">Departamento de Lenguajes y Sistemas Informáticos Univ</orgName>
								<orgName type="institution">Nacional de Educación a Distancia</orgName>
								<address>
									<addrLine>c/ Juan del Rosal</addrLine>
									<postCode>16. 28040</postCode>
									<settlement>Madrid</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff79">
								<orgName type="department">Dpt. Matemática Aplicada</orgName>
								<orgName type="institution">Universidad del País Vasco UPV/EHU</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">Fuentes-González</orgName>
								<address>
									<addrLine>Ramon, 225 Ganascia, Jean-Gabriel, 45 Garanina, Natalia O., Cynthia Vera</addrLine>
									<postCode>287</postCode>
									<settlement>Glodeanu</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Díaz</surname></persName>
							<affiliation key="aff59">
								<orgName type="laboratory">LIRMM</orgName>
								<orgName type="institution">CNRS et Univ. Montpellier)</orgName>
								<address>
									<addrLine>161, rue Ada</addrLine>
									<postCode>F-34392</postCode>
									<settlement>Montpellier Cdx</settlement>
								</address>
							</affiliation>
							<affiliation key="aff63">
								<orgName type="laboratory">LORIA (CNRS</orgName>
								<orgName type="institution">Inria Nancy Grand Est -Université de Lorraine)</orgName>
								<address>
									<postBox>P. 239</postBox>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Dpt. of Mathematics</orgName>
								<orgName type="institution">University of Cádiz</orgName>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Grabisch</orgName>
								<address>
									<settlement>Michel</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">R</forename><surname>Fuentes-González</surname></persName>
							<affiliation key="aff58">
								<orgName type="department">Tetis/Irstea</orgName>
								<address>
									<addrLine>Maison de la télédétection, 500 rue JF Breton</addrLine>
									<postCode>34093, Cdx</postCode>
									<settlement>Montpellier</settlement>
								</address>
							</affiliation>
							<affiliation key="aff62">
								<orgName type="institution" key="instit1">Université de Lyon</orgName>
								<orgName type="institution" key="instit2">CNRS</orgName>
								<orgName type="institution" key="instit3">INSA-Lyon</orgName>
								<address>
									<addrLine>LIRIS. UMR5205</addrLine>
									<postCode>F-69621</postCode>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff72">
								<orgName type="institution">LORIA</orgName>
								<address>
									<addrLine>BP 70239</addrLine>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="laboratory">IRIT</orgName>
								<orgName type="institution">Université Paul Sabatier</orgName>
								<address>
									<addrLine>118 route de Narbonne</addrLine>
									<postCode>31062</postCode>
									<settlement>Toulouse cedex 9</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="department">Departamento de Teoría de la Señal y de</orgName>
								<orgName type="institution">Comunicaciones</orgName>
							</affiliation>
							<affiliation key="aff78">
								<orgName type="institution">Universidad Carlos III de Madrid</orgName>
								<address>
									<postCode>28911</postCode>
									<settlement>Leganés</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="department">Dpt. Automática y Computación</orgName>
								<orgName type="institution">Univ. Pública de Navarra. Spain</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">J</forename><surname>Medina</surname></persName>
							<email>jesus.medina@uca.es</email>
							<affiliation key="aff59">
								<orgName type="laboratory">LIRMM</orgName>
								<orgName type="institution">CNRS et Univ. Montpellier)</orgName>
								<address>
									<addrLine>161, rue Ada</addrLine>
									<postCode>F-34392</postCode>
									<settlement>Montpellier Cdx</settlement>
								</address>
							</affiliation>
							<affiliation key="aff63">
								<orgName type="laboratory">LORIA (CNRS</orgName>
								<orgName type="institution">Inria Nancy Grand Est -Université de Lorraine)</orgName>
								<address>
									<postBox>P. 239</postBox>
									<postCode>F-54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy</settlement>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Dpt. of Mathematics</orgName>
								<orgName type="institution">University of Cádiz</orgName>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Grabisch</orgName>
								<address>
									<settlement>Michel</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><surname>Spain</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Dmitry</forename><forename type="middle">V</forename><surname>Gnatyshak</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Dmitry</forename><forename type="middle">I</forename><surname>Ignatov</surname></persName>
							<email>dignatov@hse.ru</email>
						</author>
						<author>
							<persName><forename type="first">David</forename><surname>Ernesto</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Melisachew</forename><surname>Chekol</surname></persName>
						</author>
						<author>
							<persName><surname>Wudage</surname></persName>
						</author>
						<author>
							<persName><roleName>Víctor</roleName><surname>Codocedo</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">Palacký University</orgName>
								<address>
									<settlement>Olomouc</settlement>
									<country key="CZ">Czech Republic</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">Sadok Ben Yahia Faculté</orgName>
								<orgName type="institution">Sciences de Tunis</orgName>
								<address>
									<country key="TN">Tunisia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="institution">Jean Diatta Université de la Réunion</orgName>
								<address>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="institution">Peter Eklund University of Wollongong</orgName>
								<address>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff4">
								<orgName type="institution">State University HSE</orgName>
								<address>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff5">
								<orgName type="institution" key="instit1">LIMOS</orgName>
								<orgName type="institution" key="instit2">University Blaise Pascal</orgName>
								<address>
									<settlement>Clermont-Ferrand</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff6">
								<orgName type="institution">INRIA NGE/LORIA</orgName>
								<address>
									<settlement>Nancy</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff7">
								<orgName type="institution">Universidad de Málaga</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff8">
								<orgName type="institution" key="instit1">Jan</orgName>
								<orgName type="institution" key="instit2">Outrata Palacký University</orgName>
								<address>
									<settlement>Olomouc</settlement>
									<country key="CZ">Czech Republic</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff9">
								<orgName type="institution">Cristina Alcalde Univ del Pais Vasco</orgName>
								<address>
									<settlement>San Sebastián</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff10">
								<orgName type="institution" key="instit1">Jaume</orgName>
								<orgName type="institution" key="instit2">Baixeries Polytechnical University of Catalonia</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff11">
								<orgName type="institution">Radim Belohlavek Palacký University</orgName>
								<address>
									<settlement>Olomouc</settlement>
									<country key="CZ">Czech Republic</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff12">
								<orgName type="laboratory">Anne Berry LIMOS</orgName>
								<orgName type="institution">Sadok Ben Yahia Faculté des Sciences de Tunis</orgName>
								<address>
									<country key="TN">Tunisia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff13">
								<orgName type="institution">Université de Clermont Ferrand</orgName>
								<address>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff14">
								<orgName type="department">Karell Bertet L3i</orgName>
								<orgName type="institution">Université de La Rochelle</orgName>
								<address>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff15">
								<orgName type="institution">Universidad de Navarra</orgName>
								<address>
									<settlement>Pamplona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff16">
								<orgName type="institution" key="instit1">Claudio</orgName>
								<orgName type="institution" key="instit2">Carpineto Fondazione Ugo Bordoni</orgName>
								<address>
									<settlement>Roma</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff17">
								<orgName type="institution">Universidad de Málaga</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff18">
								<orgName type="institution" key="instit1">Jean</orgName>
								<orgName type="institution" key="instit2">Diatta Université de la Réunion</orgName>
								<address>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff19">
								<orgName type="institution">Felix Distel TU Dresden</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff20">
								<orgName type="institution">Vincent Duquenne Université Pierre et Marie Curie</orgName>
								<address>
									<settlement>Paris</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff21">
								<orgName type="institution" key="instit1">Irisa</orgName>
								<orgName type="institution" key="instit2">Université de Rennes 1</orgName>
								<address>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff22">
								<orgName type="institution">Bernhard Ganter TU-Dresden</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff23">
								<orgName type="institution">University of Metz</orgName>
								<address>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff24">
								<orgName type="institution">Univeristy of Montreal</orgName>
								<address>
									<country key="CA">Canada</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff25">
								<orgName type="department">Marianne Huchard LIRMM</orgName>
								<orgName type="institution">Dmitry I. Ignatov State University HSE</orgName>
								<address>
									<settlement>Montpellier, Moscow</settlement>
									<country>France, Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff26">
								<orgName type="institution">Vassilis G. Kaburlasos TEI</orgName>
								<address>
									<settlement>Kavala</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff27">
								<orgName type="institution" key="instit1">Jan</orgName>
								<orgName type="institution" key="instit2">Konecny Palacký University</orgName>
								<address>
									<settlement>Olomouc</settlement>
									<country key="CZ">Czech Republic</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff28">
								<orgName type="institution">Stanislav Krajci University of P.J. Safarik</orgName>
								<address>
									<settlement>Kosice</settlement>
									<country key="SK">Slovakia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff29">
								<orgName type="institution">State University HSE</orgName>
								<address>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff30">
								<orgName type="institution">Léonard Kwuida Bern University of Applied Science</orgName>
								<address>
									<country key="CH">Switzerland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff31">
								<orgName type="institution">Jesús Medina Universidad de Cádiz</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff32">
								<orgName type="department">Engelbert Mephu Nguifo LIMOS</orgName>
								<orgName type="institution">University Blaise Pascal</orgName>
								<address>
									<settlement>Clermont Ferrand</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff33">
								<orgName type="institution" key="instit1">Rokia</orgName>
								<orgName type="institution" key="instit2">Missaoui UQO</orgName>
								<address>
									<settlement>Gatineau</settlement>
									<country key="CA">Canada</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff34">
								<orgName type="laboratory">Lhouari Nourine LIMOS</orgName>
								<orgName type="institution">Amedeo Napoli INRIA NGE/LORIA</orgName>
								<address>
									<settlement>Nancy</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff35">
								<orgName type="institution">Université de Clermont Ferrand</orgName>
								<address>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff36">
								<orgName type="institution">Sergei Obiedkov State University HSE</orgName>
								<address>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff37">
								<orgName type="institution">Uta Priss Ostfalia University of Applied Sciences</orgName>
								<address>
									<settlement>Wolfenbüttel</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff38">
								<orgName type="institution" key="instit1">LIMOS</orgName>
								<orgName type="institution" key="instit2">University of Clermont Ferrand</orgName>
								<address>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff39">
								<orgName type="institution" key="instit1">Sebastian Rudolph Institute AIFB</orgName>
								<orgName type="institution" key="instit2">University of Karlsruhe</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff40">
								<orgName type="institution">Baris Sertkaya SAP Research Center</orgName>
								<address>
									<settlement>Dresden</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff41">
								<orgName type="institution">Laszlo Szathmary University of Debrecen</orgName>
								<address>
									<country key="HU">Hungary</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff42">
								<orgName type="institution">Petko Valtchev Université du Québec à Montréal</orgName>
								<address>
									<country key="CA">Canada</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff43">
								<orgName type="institution">Francisco Valverde Universidad Nacional de Educacin a Distancia</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff44">
								<orgName type="institution">UNED Spain</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff45">
								<orgName type="department">Michel Liquière LIRMM</orgName>
								<orgName type="institution">María Eugenia Cornejo Piñero Universidad de Cádiz</orgName>
								<address>
									<settlement>Montpellier</settlement>
									<country>France, Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff46">
								<orgName type="institution">Eloisa Ramírez Poussa Universidad de Cádiz</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff47">
								<orgName type="institution">Alexis Irlande Universidad Nacional de Colombia</orgName>
								<address>
									<country key="CO">Colombia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff48">
								<orgName type="institution">Universidad de Cádiz</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff49">
								<orgName type="institution" key="instit1">Nader Mohamed Jelassi LIMOS</orgName>
								<orgName type="institution" key="instit2">Clermont Université</orgName>
								<address>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff50">
								<orgName type="department">Faculty of Tunis</orgName>
								<orgName type="institution">URPAH</orgName>
								<address>
									<country key="TN">Tunisia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff51">
								<address>
									<settlement>Belgium, Chile, Djibouti</settlement>
									<region>Mexico</region>
									<country>Cyprus, Czech Republic, Estonia, France, Germany, Russia, Slovakia, Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff52">
								<orgName type="department">Department of Charente Maritime</orgName>
								<orgName type="institution" key="instit1">City of La Rochelle</orgName>
								<orgName type="institution" key="instit2">University of La</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff53">
								<orgName type="department">Department of Mathematics</orgName>
								<orgName type="institution">University of Hawaii Honolulu</orgName>
								<address>
									<postCode>96822</postCode>
									<region>HI</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff54">
								<orgName type="institution">University of Antwerp</orgName>
								<address>
									<country key="BE">Belgium</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff55">
								<orgName type="department">Paris School of Economics</orgName>
								<orgName type="institution">Université Paris</orgName>
								<address>
									<addrLine>106-112, Bd de l&apos;Hôpital</addrLine>
									<postCode>75013</postCode>
									<settlement>Paris</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff56">
								<orgName type="laboratory">CNRS-IMJ / C&amp;O</orgName>
								<orgName type="institution">Université Pierre et Marie Curie</orgName>
								<address>
									<addrLine>4 place Jussieu</addrLine>
									<postCode>75005</postCode>
									<settlement>Paris</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff60">
								<orgName type="institution">Tallinn University of Technology</orgName>
								<address>
									<addrLine>Ehitajate tee 5</addrLine>
									<postCode>19086</postCode>
									<settlement>Tallinn</settlement>
									<country key="EE">Estonia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff64">
								<orgName type="laboratory">Laboratoire d&apos;Informatique de Paris</orgName>
								<orgName type="institution">Université Pierre et Marie Curie</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff65">
								<address>
									<settlement>Paris</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff66">
								<orgName type="department" key="dep1">CODeS &amp; iMinds</orgName>
								<orgName type="department" key="dep2">ITEC</orgName>
								<orgName type="institution">KU Leuven</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff67">
								<orgName type="department">Department of Computerscience KULAK</orgName>
								<orgName type="institution">Katholieke Universiteit Leuven</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff68">
								<orgName type="institution">Technische Universität Dresden</orgName>
								<address>
									<postCode>01062</postCode>
									<settlement>Dresden</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff69">
								<orgName type="laboratory" key="lab1">L3i</orgName>
								<orgName type="laboratory" key="lab2">Laboratory in Computer Science, Image and Interaction</orgName>
								<orgName type="institution">University of La Rochelle</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff70">
								<orgName type="department">Computer Science Department</orgName>
								<orgName type="institution">University of Nicosia</orgName>
								<address>
									<addrLine>46 Makedonitissas Ave</addrLine>
									<postCode>1700</postCode>
									<settlement>Nicosia</settlement>
									<country key="CY">Cyprus</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff82">
								<orgName type="institution">National Research University Higher School of Economics</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff83">
								<orgName type="institution">Díaz</orgName>
								<address>
									<addrLine>Juan Carlos, 225 De Causmaecker</addrLine>
									<settlement>Patrick</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff84">
								<orgName type="department">De Wannemacker</orgName>
								<orgName type="institution">Stefan</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff85">
								<orgName type="department">Dolques</orgName>
								<address>
									<addrLine>Xavier, 129 Domenach, 93 Duquenne</addrLine>
									<settlement>Florent, Vincent</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff86">
								<orgName type="department">Egho</orgName>
								<orgName type="institution">Elias</orgName>
								<address>
									<addrLine>199 Enciso, Manuel, 293 Freese</addrLine>
									<settlement>Ralph</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">Gnatyshak</orgName>
								<orgName type="institution" key="instit2">Dmitry V</orgName>
								<address>
									<addrLine>249 Goethals</addrLine>
									<settlement>Bart</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff90">
								<orgName type="department">Grebeneva</orgName>
								<orgName type="institution">Julia V</orgName>
								<address>
									<addrLine>287 Guérin</addrLine>
									<settlement>Clément</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff91">
								<orgName type="institution" key="instit1">Horvath</orgName>
								<orgName type="institution" key="instit2">Tomas</orgName>
								<address>
									<addrLine>299 Huchard, Marianne</addrLine>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff92">
								<orgName type="institution" key="instit1">Ignatov</orgName>
								<orgName type="institution" key="instit2">Dmitry I</orgName>
								<address>
									<addrLine>249 Jay</addrLine>
									<postCode>129</postCode>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff93">
								<orgName type="institution">Nicolas</orgName>
								<address>
									<addrLine>199 Kaytoue, 33</addrLine>
									<settlement>Mehdi</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff94">
								<orgName type="institution">Konecny</orgName>
								<address>
									<addrLine>Jan, 153 Kr dlo</addrLine>
									<postCode>105, 117</postCode>
									<settlement>Ondrej</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff95">
								<orgName type="institution">Krajçi</orgName>
								<address>
									<postCode>117</postCode>
									<settlement>Stanislav</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff96">
								<orgName type="department">Krmelova</orgName>
								<orgName type="institution">Kuznetsov</orgName>
								<address>
									<addrLine>Marketa, Sergei O., 199, 249 Le Ber, 129 Medina</addrLine>
									<postCode>187, 225</postCode>
									<settlement>Florence, Jesús</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff97">
								<orgName type="department">Mendez-Vazquez</orgName>
								<orgName type="institution">Patrik</orgName>
								<address>
									<addrLine>Andres, 141 Miclet, Laurent, 175 Mihalčin, 117 Miralles, André</addrLine>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff98">
								<orgName type="department">Mora</orgName>
								<orgName type="institution">Nebut</orgName>
								<address>
									<addrLine>Angel, 293 Napoli, Amedeo, 33, 163</addrLine>
									<postCode>199, 237</postCode>
									<settlement>Clémentine</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff99">
								<orgName type="institution">Ojeda</orgName>
								<address>
									<addrLine>-Aciego, Manuel, 105, 293 Osman Guédi</addrLine>
									<postCode>153</postCode>
									<settlement>Abdoulkader</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff100">
								<orgName type="department">Outrata</orgName>
								<address>
									<addrLine>Jan, 261 Peláez-Moreno, 211 Pisková, Lenka, 299 Prade, Henri, 175 Raïssi, Revel</addrLine>
									<postCode>199</postCode>
									<settlement>Carmen, Chedy, Arnaud</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff101">
								<orgName type="laboratory">Shilov</orgName>
								<orgName type="institution">Nikolay V</orgName>
								<address>
									<addrLine>287 Stanley, 163 Tang, My Thao, 281 Torim, Ants</addrLine>
									<settlement>Renzo</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff102">
								<orgName type="institution">Toussaint</orgName>
								<address>
									<addrLine>Yannick, 281 Trnecka, Martin, 187 Valverde-Albacete</addrLine>
									<postCode>211</postCode>
									<settlement>Francisco José</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Steering Committee</title>
					</analytic>
					<monogr>
						<imprint>
							<date type="published" when="2013-10">October 2013</date>
						</imprint>
					</monogr>
					<idno type="MD5">615FFA9743771B00F889E176CCD6C39C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T04:40+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>closure operator</term>
					<term>lattice</term>
					<term>canonical basis of implications</term>
					<term>quasi / pseudo-closed</term>
					<term>(semi) lattice cores</term>
					<term>perspectivities / arrows</term>
					<term>congruences / tolerances</term>
					<term>combinatorial exhaustive enumeration</term>
					<term>NEXT-CLOSURE algorithms Class model</term>
					<term>class model factorization</term>
					<term>Formal Concept Analysis</term>
					<term>Relational Concept Analysis Dedekind numbers</term>
					<term>anti-monotonic functions</term>
					<term>antichains</term>
					<term>complete distributive lattices Knowledge discovery</term>
					<term>Formal Concept Analysis</term>
					<term>Fuzzy data concept lattice</term>
					<term>Java implementation</term>
					<term>immediate successors</term>
					<term>Limited Object Access algorithm</term>
					<term>comicbooks Lattice Cryptomorphisms</term>
					<term>Lattice Properties</term>
					<term>Pedagogy formal concept analysis</term>
					<term>lattice generation</term>
					<term>neural networks</term>
					<term>dendrites</term>
					<term>maximal rectangles Formal concept analysis</term>
					<term>Knowledge discovery in databases</term>
					<term>Conceptual knowledge discovery</term>
					<term>Intangible Cultural Heritage</term>
					<term>Documentation analogical proportion</term>
					<term>lattice</term>
					<term>factorization formal concept analysis</term>
					<term>pattern structures</term>
					<term>projections</term>
					<term>sequential pattern structures</term>
					<term>sequences formal concept analysis</term>
					<term>triclustering</term>
					<term>triadic data</term>
					<term>data mining</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Formal concept analysis has, for many years, laid claim to providing a formal basis for an applied lattice theory. With the many different formalisms and implementations, and their applications available today, this claim is stronger than ever, as witnessed by increasing amount and range of publications in the area. The International Conference "Concept Lattices and Their Applications (CLA)" is being organized since 2002 with the aim of bringing together researchers working on various approaches for studying and practically applying concept lattices. The main aim of CLA is to bring together researchers (students, professors, engineers) involved in all aspects of the study of concept lattices, from theory to implementations and practical applications. As the diversity of the selected papers shows, there is a wide range of theoretical and practical research directions, ranging from algebra and logic to pattern recognition and knowledge discovery. The Tenth edition of CLA was held in La Rochelle, France from October 15th to October 18th, 2013. The event was organized and hosted by the Laboratory L3i, University of La Rochelle. This volume includes the selected papers and the abstracts of 4 invited talks. This year there were initially 37 submissions from which 22 included papers were accepted as full papers and 5 as short papers. Thus, the program of the conference consisted of four keynote talks given by the following distinguished researchers: Ralph Freese, Bart Goethals, Michel Grabisch and Vincent Duquenne, together with twenty-seven communications, including the full and short papers, authored by researchers from thirteen countries</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>1</p><p>Introduction</p><p>Designing class models for information systems, databases or programs is a common activity, that usually involves domain experts and designers. Their task consists in capturing the domain concepts, and organizing them in a relevant specialization structure with adequate abstractions and avoiding redundant concepts. Formal Concept Analysis (FCA) and its variant Relational Concept Analysis (RCA) have been proposed to assist this elaboration phase, so as to introduce new abstractions emerging from the identied domain concepts, and to set up a factorization structure avoiding duplication. FCA classies entities having characteristics <ref type="foot" target="#foot_0">1</ref> , while RCA also takes into account the fact that entities are linked by relations. The concept lattices produced can be exploited so as to obtain the generalization structure for the class model. Nevertheless, while this whole factorization structure of a class model is a mathematical object with strong theoretical properties, its practical use might suer from limitations due to the large size of the obtained lattices. In such a case, domain experts might be overwhelmed by the produced information making it dicult (or even impossible) to use it to improve the class model.</p><p>In this paper we want to assess, in a real case study, the size of the factorization results, in order to have a solid foundation for proposing practical recommendations, tools or approaches. We work with a kind of "worst case" of RCA application, by using all the modeling elements and not limiting our investigation to some elements (like classes and attributes, or classes and operations). We show, via various selected graphics, how RCA behaves. Our experiments indicate which congurations are tractable, admitting that some tools present results in a ne way, and which congurations lead to quite unusable results.</p><p>The rest of the paper is structured as follows. Section 2 briey explains how FCA and RCA can contribute to a class model design. Section 3 settles the environment for our experiments and introduces our case study. Section 4 presents and discusses the obtained results. Section 5 presents related work, and section 6 concludes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Concept lattices in class model refactoring</head><p>In this section, we explain how concept lattices implement and reveal the underlying factorization structure of a class model. We also show how this property can be exploited for class model refactoring, and in particular: generating new reusable abstractions that improve the class organization and understanding, especially for domain experts, limiting attribute and role duplication.</p><p>Formal Concept Analysis <ref type="bibr">[5]</ref> is a mathematical framework that groups entities sharing characteristics: entities are described by characteristics (in a Formal Context), and FCA builds (formal) concepts from this description. In Relational Concept Analysis (RCA) <ref type="bibr">[9]</ref>, the data description consists of several Formal Contexts and relations. The main principle of RCA is to iterate on FCA application, and the concepts learnt during one iteration for one kind of entity are propagated through the relations to the other kinds of entities. The concepts are provided with a partial order which is a lattice. In the obtained concept lattices, we distinguish merged concepts and new concepts. A merged concept is a concept that has more than one entity in its simplied extent. This means that the entities of the simplied extent share the same description. A new concept is a concept that has an empty simplied extent. This means that no entity has exactly the simplied intent of the concept as set of characteristics: Entities of the whole extent own the characteristics of the simplied intent in addition to other characteristics.</p><p>To apply FCA to class models, we encode the elements of a class model into formal contexts. For example, we provide a context describing the classes by their attributes. The FCA approach then reveals part of the factorization structure and supports part of the refactoring process by using a straightforward description of UML elements. For example, we can discover new concepts for classes interpreted as new super-classes, factorizing two attributes. Nevertheless this approach does not fully exploit the deep structure of the class model. Let us take the example of Figure <ref type="figure" target="#fig_122">1(a)</ref>. The attribute name is duplicated in classes B1 and B2, and FCA can generate the model of Figure <ref type="figure" target="#fig_0">1</ref>(b) that introduces a new class (here manually named NamedElement) that factorizes this attribute. However, FCA does not compute the factorization that can be found in Figure <ref type="figure" target="#fig_122">1(c</ref>), in which a class called SuperA factorizes the two associations from A1 to B1 and from A2 to B2, being given that now B1 and B2 have an ancestor NamedElement. Extracting abstractions using this deep structure can be done with RCA, which builds the entire factorization structure, including information on the elements (classes, attributes, associations) and their relations. RCA uses the fact that classes are linked through associations. In the rst iteration step, RCA computes the factorization in Figure <ref type="figure" target="#fig_0">1</ref>(b), and then propagates the new concept NamedElement through the association between classes. Then the factorization of Figure <ref type="figure" target="#fig_122">1(c</ref>) is computed during the next iteration steps. The process stops there since a xpoint is found (no new abstractions can be found).</p><p>The obtained structure contains no duplication, and improves the organization of the model. However, when applied on large data, RCA may result in the introduction of many new concepts , that may be too abstract, and/or too many to be analyzed. That is why in the next sections, we investigate on a case study the behavior of RCA for a large class model corresponding to an actual information system. Our objective is to determine if RCA remains suitable for large class models, and how to congure RCA to obtain exploitable results. <ref type="bibr">3</ref> The Pesticides class model and experimental setup Our case study is a class model which is part of a project from the Irstea institute, called Environmental Information System for Pesticides (EIS-Pesticides). It aims at designing an information system centralizing knowledge and information produced by two teams: a Transfer team in charge of studying the pesticide transfers from plots to rivers and a Practice team which mainly works on the agricultural practices of the farmers. The domain analysis has been carried on during series of meetings with one team or both teams. Fifteen versions of this class model have been created during this analysis. Figure <ref type="figure" target="#fig_1">2</ref> shows the number of model elements over the versions. Our tool is based on the Modeling Tool Objecteering<ref type="foot" target="#foot_2">2</ref> and the framework eRCA <ref type="foot" target="#foot_3">3</ref> . eRCA has been extended for computing metrics. In this paper we focus on a conguration (part of the meta-model) including the following entities described in formal contexts: classes, associations, operations (very few in the Pesticides model), roles and attributes. Their characteristics are their names. The relations describe: which class owns which attribute, which class owns which operation, which class owns which role, which association owns which role and which type (class) has a role. When applying RCA to this conguration, we obtain 5 concept lattices, one for each formal context. We also consider four parameterizations for this conguration depending on whether we take into account navigability and undened elements. If a navigability is indicated on an association, meaning that objects from the source know objects from the target (not the reverse), taking into account navigability (denoted by Nav) results in the following encoding: the source class owns the corresponding role, but the target class does not own any role corresponding to that association. Not taking into account navigability (denoted by noNav) means that the source class and the target class own their respective role in the association. In the modeling tool, unnamed roles are named "undened". We can choose to include this "undened" name in the contexts (denoted by <ref type="bibr">Undef)</ref> or not (denoted by noUndef). <ref type="bibr">4</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Results</head><p>In this section, we report the main results that we obtain. We consider two special iteration steps: step 1 (close to FCA application) and step 6 (where paths of length 6 in the model are followed, meaning that abstractions on classes created at step 1 have been exploited to create other class abstractions through roles and associations). At step 1 for example, common name attributes are used to nd new superclasses. At step 4, new superclasses can be found as shown in Figure <ref type="figure" target="#fig_0">1</ref>(c), and 2 steps later, new super-associations can be found from the class concepts found at step 4. We examine, for classes and associations, which are the main elements of the model, metrics on new class concepts and new associations concepts (Section 4.1), then on merge class and association concepts (Section 4.2). Execution time is presented in Section 4.3, and we conclude this part by giving indications about the number of steps when the process reaches the xpoint.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">New abstractions</head><p>We focus rst on the new concepts that appear in the class lattice and in the association lattice. They will be interpreted as new superclasses or as new generalizations of associations. In a collaborative work, these concepts are presented to the experts who use some of them to improve the higher levels of the class model with domain concepts not explicit until then. This is why their number is important; if too many new abstractions are presented to the experts, these experts might be overwhelmed by the quantity, preventing a relevant and ecient use of the method. Figure <ref type="figure" target="#fig_7">3</ref> (left-hand side) shows the new concepts in the class lattice (thus the new superclasses) at step 1, when paths of size 1 have been traversed. For example, this means that if some classes have attributes (or roles) of the same name in common, those attributes (or roles) will certainly be grouped in a new class concept. This new class concept can be presented to the expert to control if this corresponds to a new relevant class abstraction (or superclass). We notice that Nav parameterizations produce less new concepts than noNav ones. This is due to the fact that noNav parameterizations induce much more circuits in the analyzed data, increasing the number of RCA steps and the number of generated concepts. The number of new concepts decreases as the analysis process progresses.</p><p>Step 1</p><p>Step 6 Fig. <ref type="figure" target="#fig_7">3</ref>. New class abstractions created at step 1 and 6 v.s. the number of initial classes</p><p>In the best case (of percentage of new superclasses), 32% of new potential superclasses will be presented to the experts, for the model V11 which contains 170 classes, giving 54 new potential superclasses. In the worst case, we have 112% of new potential superclasses, for V0 model, which has 34 classes, thus only 38 new potential superclasses are found. At this stage, we do not see a serious dierence between the four parameterizations.</p><p>Results obtained at step 6 are much more dicult to deal with. Figure <ref type="figure" target="#fig_7">3</ref> (right-hand-side) shows that the two parameterizations noNav (generating more cycles in data) give results that will need serious ltering to separate relevant new concepts from the large set of new concepts . Nav parameterizations will produce less than one and a half the initial number of classes, while noNav parameterizations can produce up to 10998 class concepts, really requiring either additional post-treatments or avoiding to generate all the concepts.</p><p>Figure <ref type="figure" target="#fig_8">4</ref> (left-hand side) shows the new concepts in the association lattice at step 1. They represent associations that are at a higher level of abstraction. Experts can examine them, to see if they can replace a set of low-level associations. In Nav parameterizations, at most 15 higher level associations are presented to experts; in noNav parameterizations, the number grows until 32, remaining very reasonable to analyze.</p><p>Figure <ref type="figure" target="#fig_8">4</ref> (right-hand side) shows the new concepts in the association lattice at step 6. It highlights the fact that, at this step, the number of these concepts may explode, and it is especially high in the last versions of the class model, in which we initially have many associations. The number of new association concepts, in Nav parameterizations, is less than a hundred, and it still remains reasonable (even if it is higher than in step 1), but in noNav parameterizations it dramatically grows and may reach about 9500 concepts.</p><p>Step 1</p><p>Step 6 Fig. <ref type="figure" target="#fig_8">4</ref>. New association abstractions created at step1 and 6 v.s. the number of initial associations <ref type="bibr">4.2</ref> Merged concepts</p><p>Merged concepts are concepts which introduce several entities (e.g classes or associations) in their extent. Such entities share exactly the same description in the model. For example, a merge class concept can group classes that have exactly the same name attributes. This common description is rst detected at step 1, then it does not change because the following steps rene the description by adding new relational characteristics and concepts; entities remain introduced in the same concepts. For classes and associations, the merged concept number is the same for the four analysis congurations. For experts, analyzing a merged concept consists in reviewing the simplied extent and examining if the entities (class or association) have been exhaustively described or eectively correspond to a same domain concept. Figure <ref type="figure" target="#fig_9">5</ref> (left-hand side) presents metrics for merge class concepts. V5 and V6 have a higher percentage of merged concepts because during analysis, a package has been duplicated at step 5 for refactoring purpose. The duplicated classes have been removed at step V7. In the other cases, there are not so much merge class concepts to be presented to the experts, between 0% and 2%, giving a maximum of two classes. This often corresponds to classes with incomplete description, that the experts should develop into more details. The low number of such cases makes the task of experts easy.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ratio # merge class concepts on # initial classes</head><p>Ratio # merge association concepts on # initial associations Fig. <ref type="figure" target="#fig_9">5</ref>. Merge class concept and merge association concepts vs. initial elements Figure <ref type="figure" target="#fig_9">5</ref> (right-hand side) presents metrics for merge association concepts. The percentage of merge association concepts is higher than the percentage of merge class concepts. This is explained by the fact that associations are only described by roles, that occasionally share the same names (identical to some class names). It varies between about 2% and 18%, meaning that at most 10 merge association concepts are presented to the experts for evaluation, making a little bit more complicated the analysis task compared to the case of classes, but it remains very reasonable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4.3</head><p>Execution time, used RAM and total number of steps</p><p>Experimentations have been performed on a cluster composed of 9 nodes, each one having 8 processors Intel (R) Xeon (R) CPU E5335 @ 2.00GHz with 8 Go of RAM. The operating system was Linux (64 bits) and the programs are written in Java. Figure <ref type="figure" target="#fig_11">6</ref> shows the execution time in seconds, at step 1 and at step 6. At step 1, the execution time for the two Nav parameterizations are below 6 seconds, while for the two noNav parameterizations, for some versions (especially when there are more associations, like in the last versions) it may reach about 13 seconds. At step 6, the execution time for the two Nav parameterizations are below 8 seconds. But for the noNav parameterizations, we notice longer executions, up to 10 minutes. However, such a task does not require an instantaneous answer, and has not to be carried out too many times. Even if it occurs during an expert meeting, it can be admitted to spend a few minutes for constructing the concept lattices.  <ref type="table" target="#tab_0">1</ref> shows the RAM used during execution, here again, noNav parameterizations are the worst, reaching about 2 GigaBytes of used memory. In the case of Nav parameterizations, it is interesting to observe that there is not a signicant dierence between step 1 and step 6.</p><p>Step 1</p><p>Step 6 Fig. <ref type="figure" target="#fig_11">6</ref>. Execution time at step 1 and 6 (in seconds)</p><p>Figure <ref type="figure" target="#fig_4">7</ref> shows, for the Nav-noUndef parameterization the total number of steps needed to reach the x-point, and the size of a longest path with no repeated arcs (such a path can be a cycle). We observe that the step number (from 6 to 16) is always below the size of the longest simple path which gives in our context a practical upper bound to the number of steps. This means that if we dispose in the future of relevant ltering strategies, we can envisage studying new concepts appearing after step 6. Step number (rst) and longest simple path size (second) in C2, Nav-noUndef parameterization <ref type="bibr">4.4 Discussion</ref> During this study, we observed that analyzing merge class concepts and merge association concepts was a feasible task in all parameterizations. The analysis of new class concepts and new associations concepts is more dicult. Nav parameterizations produce exploitable results with a maximum of about 50 class concepts (resp. about 30 new association concepts) to be examined at step 1.</p><p>At step 6, experts may have to face from one to three hundreds of new class concepts (resp. about one hundred of new association concepts). Execution time and used memory are not problematic issues and we get a practical upper bound to the number of steps in this kind of data, which is given by the size of a longest simple path. These observations may be the starting point of an ecient steering method for a collaborative class model construction. The objective of such a method would be to insert between each model release, an RCA-based analysis, in order to accelerate the discovery of new abstractions, and the completion of elements (highlighting of the merged concepts ). Both the concepts and the structure of the lattice are useful for the experts to determine which relevant modications should be applied. The strength of the lattice representation is that it provides a structure adapted to the task of choosing the right new abstractions, since concepts can be presented following the specialization order, depending of what is the demand of experts.</p><p>Known eects of some parameterizations can serve to favor dierent steering strategies. The longest simple path size gives a bound on the step number, giving an heuristic to decide when to stop the RCA process, with an idea about how far we are from the convergence. Nav parameterizations can be easily controlled by looking, at each step, the appearing concepts (and marking the non-relevant ones to avoid nding them again at next steps). If information is expected from NoNav parameterizations, experts have to be very careful because many concepts will be created. A particular sub-order of the concept lattice (the AOC-poset), induced by the concepts that introduce an entity or a characteristic, might oer an important reduction of the produced concept numbers, without loosing main information about factorization.</p><p>Another track is limiting input data, for example by removing attributes that have limited semantic value and to group concepts declaring few attributes.</p><p>There are of course some limits to the generalization of our conclusions. The class model is mainly a data model (very few operations), destined to build a database schema and we study various versions of a same class model. Nevertheless, the Pesticides model is a classical model, representative of the models that are built in the environmental eld. <ref type="bibr">5</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Related work</head><p>The use of FCA in the domain of class model refactoring has a long and rich history in the literature. As far as we know, it has been introduced in the seminal paper of Godin et al. <ref type="bibr">[6]</ref> for extracting abstract interfaces from a Smalltalk class hierarchy and extensions of the work have been published in <ref type="bibr">[7]</ref>. Other approaches have been proposed, that take into account more information extracted from source code like super calls and method signatures in <ref type="bibr">[2]</ref>.</p><p>In <ref type="bibr">[1]</ref>, authors report an application of RCA to several medium-size class models of France Télécom (now Orange Labs). The RCA conguration was composed of classes, methods, attributes, and associations. Classes have no description; attributes are described by name, multiplicity and initial value; methods are described by name and method body; associations are described by names, role name and information like multiplicity and navigability. Associations are connected to their origin and destination classes, classes are connected to the attributes and operations they own, attributes are connected to classes that are their type, etc. The class models contain a few dozens of classes and the new concepts to be examined by experts varies from a few concepts to several hundreds.</p><p>In <ref type="bibr">[11]</ref> detailed gures are given. In the largest project (57 classes), the number of new concepts was 110 for the classes, 9 for the associations and 59 for the properties. In this paper, we have several class models that are greater in terms of number of classes and we reify the role notion, rather than encoding it in the association description, with the risk of having more produced concepts. We discard technical description (like multiplicity which has no strong semantics).</p><p>We also analyze the merged concepts, another interesting product of RCA.</p><p>In <ref type="bibr">[8]</ref>, RCA has been applied on an excerpt of the class model of the Jetsmiles software of JETSGO society <ref type="foot" target="#foot_5">4</ref> . The class model excerpt is composed of only 6 classes, connected by 9 associations, and about 30 attributes. Attributes and roles are mixed, and classes are connected by a relational context to attributes-+roles, while attributes+roles are connected by another relational context to their type (when it is a class). The UML elements are described by many technical features: multiplicity, visibility, being "abstract", initial value, etc. A posttreatment analyzes the built concepts in order to keep the most relevant ones. The class concept lattice contains about 35 concepts while the attribute+role concept lattice has about 25 concepts. In <ref type="bibr">[8]</ref>, the size of the class model is very small. We suspect that using the conguration with many technical elements would not be scalable in the case of the Pesticides model.</p><p>RCA has been experimented on two Ecore models, two Java programs and ve UML models in <ref type="bibr">[4]</ref>. The used conguration is composed of the classes and the properties (including attributes and roles) described by their names and their connections. To report some representative results of this experiment, in Apache Common Collections, which is composed of 250 classes, RCA nds 34 new class concepts and less than 80 new property concepts; in UML2 metamodel, which is composed of 246 classes and 615 properties, RCA extracts 1534 new class concepts and 998 new property concepts. In this experiment, associations were not encoded, contrary to what we do. Nevertheless an explosion of the concept number yet appears. In our case, we introduce associations in the conguration, and we show, that with some precautions as annotating by navigability and naming the roles, refactoring with data including the associations may remain feasible.</p><p>A more recent study <ref type="bibr">[3]</ref> compared three strategies of FCA/RCA application to part of the open-source Java Salome-TMF software which comprises 37 classes and 142 attributes <ref type="foot" target="#foot_6">5</ref> . In the RCA strategy (ARC-Name), a formal context includes the classes (no description), a formal context describes the attributes by their names and the hyperonyms of their names, and relations connect classes and their attributes (and reversely). ARC-Name produces 33 new class concepts, and 3 merge class concepts, 21 new attribute concepts and 13 merge attribute concepts. Java softwares do not have associations and it is dicult to generalize these results to the general case of class models. Compared to this work, here we do not use linguistic information, this will be done in a future work, nevertheless the terms in the model are not technical identiers but rather do-main terms carefully selected by the expert group, thus there are less problems in using them directly.</p><p>Here we use the same class models as in <ref type="bibr">[10]</ref> where RCA based metrics were proposed to assist a designer during the evolution of the class model in indicating him the evolution of the level of description and the level of abstraction.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion and perspectives</head><p>In this paper, we describe the most advanced study of the application of RCA on class models, so as to obtain a relevant factorization structure. We apply RCA on several versions of the model of the same information system (from 40 to 170 classes), and we study the impact of several parameters in the application. The objective was to observe RCA on real-sized class models, so as to draw conclusions, mainly on its scalability. The experiment shows that taking into account the navigability, it is still possible to analyze the newly introduced abstractions. Consequently, RCA can be considered to scale to real-size models, if it is adequately parameterized. However, the produced results remain quite large to analyze, and new strategies can be settled to face the number of concepts to analyze.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Software engineering has a long tradition of graphical modeling, there are many different diagram types like flowcharts, BPMN, ERD and even languages like UML containing over dozen diagram types. Most of these diagrams have elements connected with directed or non-directed connections. Each element is represented as a node and each connection as a line between these nodes. While this approach is easy to understand and apply, methods of Formal Concept Analysis (FCA) like Galois sub hierarchies (GSH) can represent the same information in a more concise way, significantly reducing the number of graphical elements. This is achieved because a single node in GSH diagram can represent several elements (it can have many labels) and a line can represent many connections. This conforms to the "reduce redundant data-ink" principle from E. Tufte's classic work on visual information displays <ref type="bibr">[19]</ref>. GSH diagram makes it easy to see which elements have same connections and which element has a subset of other elements connections inviting interesting comparisons.</p><p>GSH diagrams are most natural to use when there are two types of elements and connections between these (a bipartite graph). This applies to the UML use case diagram that describes actors, use cases and connections between them. A study presented here compares the GSH approach with the UML use case diagram. There is also a brief overview about describing the connections between use cases and data tables with diagrams, information present in CRUD matrix, another traditional software engineering artifact.</p><p>1. GSH diagrams show nodes (concepts), connections between them and labels from the sets G and M attached to the nodes. Each element from G and M has exactly one corresponding label. 2. g ∈ G is connected to m ∈ M iff there is an upward path from label g to label m or they are labels of the same node. 3. If g 1 , g 2 ∈ G and there is an upward path from g 1 to g 2 then the set of elements g 2 is connected to, g 2 , is a subset of g 1 . 4. Dually, if m 1 , m 2 ∈ M and there is a downward path from m 1 to m 2 then the set of elements m 2 is connected to, m 2 , is a subset of m 1 . 5. If g 1 , g 2 ∈ G and g 1 and g 2 are labels of the same node then g 2 = g 1 . 6. Dually, if m 1 , m 2 ∈ M and m 1 and m 2 are labels of the same node then m 2 = m 1 . There are several tools for concept lattice generation: Concept Explorer <ref type="bibr">[24]</ref>, ToscanaJ <ref type="bibr">[4]</ref>, GaLicia <ref type="bibr">[20]</ref>. Of these, only GaLicia supports Galois subhierarchies, but its labeling scheme is not convenient for our purposes as its labels contain full concept intents and extents, therefore same element can appear many times in different labels. Two freely available tools were developed as bachelor theses, supervised by the author. One is GSH builder by Kristo Aun <ref type="bibr">[3]</ref>, another is GSH by Maarja Raud <ref type="bibr">[15]</ref>. Both generate GSH diagrams that show the labels, not extents or intents.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Use Cases and Actors</head><p>Use Case modeling is a common tool for specifying functional requirements. An actor is something with behavior (person, computer system) who interacts with our system. A use case is a collection of related success and failure scenarios that describe an actor using a system to support a goal <ref type="bibr">[13]</ref>. A detailed description of the use case is given in a text document while the use case diagram shows a general overview: actors and their relationships to use cases. Use case diagram can also show include and extend relations between use cases. A use case diagram is a diagram type within Unified Modeling Language. There are many books written about the topic including <ref type="bibr">[16]</ref> and <ref type="bibr">[13]</ref>.</p><p>Following example (Figure <ref type="figure" target="#fig_1">2</ref>) is redrawn from Craig Larmans partial use case diagram describing NextGen sales system: a computerized application used to record sales and handle payments in a retail store <ref type="bibr">[13]</ref>(pp. <ref type="bibr">29,</ref><ref type="bibr">71)</ref>. This is a basic use case diagram showing use cases, actors and connections between them.  Figure <ref type="figure" target="#fig_7">3</ref> shows a GSH diagram, equivalent to the use case diagram from Figure <ref type="figure" target="#fig_1">2</ref>. It is more concise with only 5 nodes and 2 lines, compared to 14 nodes and 14 lines from Figure <ref type="figure" target="#fig_1">2</ref>. A comparison of diagram types based on counting the number of visual elements may seem simplistic but it is in accordance with the principle stated by E. Tufte in his influential work on information displays <ref type="bibr">[19]</ref>: " erase redundant data-ink, within reason". Possible reasons for redundancy being: "giving a context and order to complexity, facilitating comparisons over various parts of data, perhaps crafting an aesthetic balance." It is much easier to see from GSH diagrams the actors that are related to same use cases, for example Accounting System, Tax Calculator and Payment Authorization System. GSH diagram makes also visible subset relationships between the use case sets that actors participates in, for example Cashier can do anything that a HR System can do. Therefore GSH diagram both reduces the data ink and compares favorably with the use case diagram in giving a context and order to complexity and facilitating comparisons over various parts of data.</p><p>Use case diagrams can contain relations between the use cases or between the actors. Relating use cases is described by C. Larman <ref type="bibr">[13]</ref> as "an optional step to possibly improve their comprehension or reduce duplication" GSH diagram showing relations between actors and use cases can not contain this information. Figure <ref type="figure" target="#fig_8">4</ref> presents an example about generalization and include relationships. Generalization is shown as a relation with a big arrowhead from less general subtype to more general supertype. Subtype inherits relations that its supertypes have. Actor Moderator is a subtype of an actor User and thus inherits its connection to Post a comment use case. Generalization relation between use cases is defined dually. Generalization relations can be used to reduce the number of connections within the use case diagrams. While defining formal contexts we add inherited relations to the subtypes.</p><p>Include and extend relations between use cases describe sub-functionality: more complex use case includes the behavior of a smaller use case. They allow to introduce different levels of abstraction: A. Cockburn <ref type="bibr">[6]</ref> defines three common levels of abstraction: summary, user goal (default level) and sub-function level.</p><p>He also mentions very high summary (used rarely) and too low (should not be used) abstraction levels. S. Ambler recommends to avoid more than two levels of use case associations <ref type="bibr">[1]</ref>. Use cases Post a comment and Delete inappropriate comment include a common Log in sub-functionality. Use case Manage comments includes use cases Post a comment and Delete inappropriate comment. Levels of abstraction different from the default user goal level are shown through UML stereotypes.</p><p>Extend and include arrows correspond to the direction of reference within the use case documentation. In the case of an include relation, use case containing the sub-functionality has a reference to it, in the case of an extend relation, the sub-functionality has a reference to the use case containing it. Extend relation is treated here as an include relation going to the opposite direction.</p><p>A method used here to deal with the include and extend relations is to focus on a single level of abstraction (preferably user goal or summary). Use cases at higher or lower levels of abstractions are removed and their relations to actors are added to the use cases they have include/extend relations with. This can introduce superfluous relations: it is impossible to deduce from the use case diagram if a particular actor from the higher level use case participates in certain sub-functionality or not, use case text has to be examined for that.   <ref type="figure" target="#fig_8">4</ref>) has been flattened as described to the user goal abstraction level through the removal of generalization and include relations and is now in the form that can be used for GSH generation.</p><p>GSH diagrams scale well when the number of use cases increases. tation had entire use case model split into four use case diagrams containing 25 use cases, 3 actors and 30 connections between actors and use cases. These 4 diagrams are not reproduced here due to limited space. Equivalent GSH diagram contains 5 nodes and 4 lines. That is a significant improvement in conciseness. In the previous examples GSH diagrams have all been simpler (less nodes, less connections) than use case diagrams. It is easy to see that GSH diagram can have no more nodes than the corresponding use case diagram as each GSH node must have at least one label and labels don't repeat. However, for certain contexts, GSH diagram can have more connections than the corresponding use case diagram, as shown in the following example.</p><p>Figure <ref type="figure" target="#fig_4">7</ref> shows a formal context with 16 connections and a corresponding GSH diagram with 18 connections. That raises a question if GSH diagrams are really simpler than use case diagrams for practical applications. Following study tries to answer this.</p><p>A B C D 1 x x 2 x x 3 x x 4 x x 5 x x 6</p><p>x x 7 x x x x Fig. <ref type="figure" target="#fig_4">7</ref>. A formal context with a corresponding GSH diagram that has more lines than the number of original connections.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Study</head><p>A study of 87 student projects, that were presented to the author for 2012 "Introduction to information systems" course, was completed to compare the use case and GSH diagrams. Student projects contained the analysis documentation for a freely chosen information system, including use case diagrams. Some of these projects were done in groups and were larger and there was also a variation of effort and quality. For all these projects a corresponding GSH diagram was generated, based on its use case diagram.</p><p>Some diagrams contained generalization relations between actors. In this case sub-actors inherited all the relations from super-actors in the corresponding formal context. Some diagrams contained include relationships between use cases. For these cases, only use cases at the user goal level were kept, use cases included in these and their connections with actors were merged into the user goal level use cases as described in the previous section. Use case and connection counts are for diagrams after removing the use cases not at the user goal level of abstraction but before the removal of generalization relations. Generalization relation is counted as one line.</p><p>Table <ref type="table" target="#tab_0">1</ref>. Results of the study. U C: number of use cases, A: number of actors, L: number of lines in the use case diagram, GSHC : number of concepts in GSH, GSHL: number of lines in GSH. Ratio between the average number of elements of the use case diagrams and the GSH diagrams is (U C + A + L)/GSH C+L = 3.72. Figure <ref type="figure" target="#fig_12">8</ref> shows the scatter plot of student projects showing the number of visual elements on use case and GSH diagrams. It is easy to see that in all cases GSH diagram was simpler than use case diagram, as all the data points lie below the diagonal (U C + A + L) = GSH C+L line. This confirms that, at least for the information systems with 30 or less use cases, GSH diagrams are much more concise than the use case diagrams.</p><formula xml:id="formula_0">U C A U C + A L U C + A + L GSHC</formula><p>Use case diagrams have their own advantages. They are easier to sketch and modify by hand and they are easier to decompose into several diagrams. That seems to suggest complementary roles for use case and GSH diagrams, use case diagrams for quick sketching and GSH diagrams for a well-formated and concise view of the system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">CRUD matrix</head><p>Use cases are not only connected to the actors who require such a functionality but they operate on data tables. GSH diagrams are useful for modeling these connections too. CRUD matrix is a well known artifact of software engineering that describes relations between data tables and use cases. It is described in several popular books about systems design <ref type="bibr">[7]</ref> and databases <ref type="bibr">[14]</ref>. Use of CRUD matrix as a basis for GSH diagrams was described by author in <ref type="bibr">[18]</ref>. It is shortly summarized here to show the usefulness of GSH diagrams for different software engineering activities. There are 4 basic actions performed on data tables by use cases: (C)reate, (R)ead, (U)pdate, (D)elete. In some variations use cases are replaced with actors or business processes.</p><p>Table <ref type="table" target="#tab_2">2</ref> contains a CRUD matrix for a simplified library system. Columns correspond to data tables and rows to use cases. Letters c, r, u, d inside the cells of the matrix correspond to 4 basic actions. For example, use case Add New Task reads data from the table Employee and creates (adds) new data to the table Task. We can think of a CRUD matrix as defining dependencies between use case layer and data layer. To describe only dependencies we introduce a new binary matrix where all entries with no actions in the original CRUD matrix are replaced with 0 and all entries with at least one action are replaced with 1. We refer to such a matrix as a usage matrix. Table <ref type="table" target="#tab_3">3</ref> is a usage matrix for Table <ref type="table" target="#tab_2">2</ref>.</p><p>It is obvious that usage matrix, and therefore GSH diagram, can be generated automatically from CRUD matrix. That kind of tool could provide visual representation of CRUD matrix without extra effort from the tool user.</p><p>Figure <ref type="figure" target="#fig_13">9</ref> is a GSH diagram based on the usage matrix from Table <ref type="table" target="#tab_3">3</ref>. From the GSH diagram it is much easier to see the elements with same dependencies, like use cases Add loan and Return loaned book and disconnected subsystems, like use case Manage Readers with data table Reader. GSH diagrams are also helpful for detecting hidden similarities/isomorphisms between different contexts. It is   <ref type="table" target="#tab_3">3</ref>.</p><p>much easier to see that GSH diagrams from Figures <ref type="figure" target="#fig_122">1 and 9</ref> are isomorphic than that matrices from Figure <ref type="figure" target="#fig_0">1</ref> and Table <ref type="table" target="#tab_3">3</ref> are isomorphic.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Related work</head><p>The use of methods of FCA for software engineering is not a novel idea. A thorough survey of FCA support for software engineering activities is given in <ref type="bibr">[17]</ref>. Most of such research is about extracting potential class hierarchies from different contexts. Dolques et al <ref type="bibr">[8]</ref> propose a FCA-based method for simplifying use case diagrams through the introduction of new generalizations. The result of this method is a refactored use case diagram. Their method preserves the information of include and extend relations. Reduction of diagram elements seems to be smaller than with GSH based method reviewed here though these results are hard to compare exactly as they present them in the terms of edge density (ratio of existing edges to all possible edges). It is possible that the edge density goes down while the actual number of edges increases when new generalized use cases and actors are introduced.</p><p>Wolfgang Hesse and Thomas Tilley <ref type="bibr">[12]</ref> use a concept lattice connecting use cases and "things" as a tool for identifying candidate classes for object oriented design. There has been much research into using FCA and GSH for class hierarchy design <ref type="bibr">[10]</ref>, <ref type="bibr">[11]</ref>. Algorithms for GSH generation are compared in the article by Arévalo et al <ref type="bibr">[2]</ref>, a newer algorithm Hermes is presented by Berry et al <ref type="bibr">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusions</head><p>GSH diagrams can be a concise replacement for UML use case diagrams. In our study they had 3.7 times less visual elements. GSH diagrams are likely to be useful wherever there are connections between two types of elements: actors and use cases, use cases and data tables, use cases and classes, business processes and use cases and so on.</p><p>One area for further research is the software engineering activity of grouping elements into subsystems. Similar use cases can be grouped into functional subsystems, similar data tables can be grouped into registers. GSH and concept lattice diagrams can help here by organizing elements by similar connections. Use cases that depend on the same data tables are likely to be similar. Grouping elements with similar connections into same subsystems would also help to minimize the connections at subsystem level. GSH diagrams can also be used to visualize the subsystem level connections, thus promising to be a quite universal tool for software engineering.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>In the relational database model, functional dependencies (FDs) are among the most popular types of dependencies <ref type="bibr">[19]</ref> since they indicate a functional relation between sets of attributes: the values of a set of attributes are determined by the values of another set of attributes. To handle errors and uncertainty in real-world data, alternatives exist. Approximate Dependencies <ref type="bibr">[12]</ref> are FDs that hold in a part -which is user defined-of the database. Purity Dependencies <ref type="bibr">[15]</ref> express the relationship on the relative impurity induced by two partitions of the table (generated by two sets of attributes). If the impurity is zero, we have a FD.</p><p>These generalizations do not necessarily capture the semantics of some patterns that may hold in a dataset. This motivates the definition of "Similarity Dependencies", which can be seen as a generalization of Functional Dependencies, but un-crispring the basic definition of FDs: similar values of an attribute determine similar values of another attribute. Similarity has been considered for FDs under several terms, e.g. fuzzy FDs <ref type="bibr">[3]</ref>, matching dependencies <ref type="bibr">[16]</ref>, constraint generating dependencies <ref type="bibr">[2]</ref>. Moreover, it is still an active topic of research in the database community <ref type="bibr">[4,</ref><ref type="bibr">8,</ref><ref type="bibr">16,</ref><ref type="bibr">17]</ref>.</p><p>The main objective of the present article is to give a characterization of similarity dependencies within FCA <ref type="bibr">[10]</ref>, thanks to the formalism of pattern structures <ref type="bibr">[9]</ref>. Indeed, characterizing and computing FDs is strongly related to lattice theory and FCA. For example, the lattice characterization of a set of FDs is studied in <ref type="bibr">[5,</ref><ref type="bibr">6,</ref><ref type="bibr">7]</ref>, while a characterization within a formal context in FCA is proposed in <ref type="bibr">[10]</ref>. The latter is based on a binarization, which is the transformation of the original set of data into a binary context. To overcome the burden usually induced by such a transformation, pattern structures <ref type="bibr">[9]</ref> have emerged as a valuable alternative to avoid arbitrary transformations and complexity problems <ref type="bibr">[1]</ref>.</p><p>Accordingly, our purpose here is threefold. Firstly, we propose a definition of Similarity Dependencies, and secondly a formalization based on pattern structures in FCA, avoiding a transformation of data into a binary table. It follows that classical algorithms of FCA can be -almost directly-applied to compute similarity dependencies. This work is based on <ref type="bibr">[1]</ref> where FDs are characterized thanks to pattern structures, and on <ref type="bibr">[13]</ref> where similarity is introduced in pattern structures as a tolerance relation (reflexive, symmetric, but not transitive). Finally, we also report preliminary experiments showing the capabilities of the approach.</p><p>The paper is organized as follows. In Section 2 we introduce the definition of Functional, Approximate and Purity Dependencies. In Section 3 we propose a definition and a characterization of Similarity Dependencies with pattern structures. Finally, Section 4 reports preliminary experimental results showing the capabilities of our approach.</p><p>2 Functional, Approximate and Purity Dependencies</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Notation</head><p>We deal with datasets which are sets of tuples. Let U be a set of attributes and Dom be a set of values (a domain). For the sake of simplicity, we assume that Dom is a numerical set. A tuple t is a function t : U → Dom and then a table T is a set of tuples. Usually a table is presented as a matrix, as in the table of Example 1, where the set of tuples (or objects) is T = {t 1 , t 2 , t 3 , t 4 } and U = {a, b, c, d} is the set of attributes.</p><p>The functional notation allows to associate an attribute with its value. We define the functional notation of a tuple for a set of attributes X as follows, assuming that there exists a total ordering on U. Given a tuple t ∈ T and X = {x 1 , x 2 , . . . , x n } ⊆ U, we have:</p><formula xml:id="formula_1">t(X) = t(x 1 ), t(x 2 ), . . . , t(x n ) In Example 1, we have t 2 ({a, c}) = t 2 (a), t 2 (c) = 4, 4 .</formula><p>In this paper, the set notation is usually omitted and we write ab instead of {a, b}.</p><p>Example 1. This is an example of a table</p><formula xml:id="formula_2">T = {t 1 , t 2 , t 3 , t 4 }, based on the set of attributes U = {a, b, c, d}. id a b c d t 1 1 3 4 1 t 2 4 3 4 3 t 3 1 8 4 1 t 4 4 3 7 3</formula><p>We are also dealing with the set of partitions of a set. Let S be any arbitrary finite set, then, Part(S) is the set of all possible partitions that can be formed with S. The set of partitions of a set is a lattice <ref type="bibr">[11]</ref>. We recall that partitions can also be considered as equivalence classes induced by an equivalence relation. Now, we define the set of the "maximal subsets" of a set.</p><p>Definition 1. Given a finite base set S and X = {X 1 , X 2 , . . . , X n } a set of subsets of S, a subset X i is maximal in X if there does not exist any other subset X j in X such that X i ⊂ X j . Then X M ax is the set of the maximal subsets of X.</p><p>For example, let S = {a, b, c} and X = {{a, b}, {b, c}, {a}, {b}}. Then X is a subset of ℘ (S) the powerset of S, but not all elements of X are maximal subsets.</p><p>Indeed, X M ax = {{a, b}, {b, c}}. Moreover, we define the function max S which applies to a set of sets such as X and returns the set of maximal subsets of X, i.e. X M ax . Definition 2. Given a finite set S and a subset X = {X 1 , X 2 , . . . , X n } of ℘ (S), the function max S returns the set X M ax of maximal subsets of X:</p><formula xml:id="formula_3">max S (X) = X M ax = {X i ∈ X | X j ∈ X : X i ⊂ X j }</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Functional Dependencies</head><p>We now introduce functional dependencies (FDs).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3 ([19]</head><p>). Let T be a set of tuples (or a data table), and X, Y ⊆ U. A functional dependency (FD) X → Y holds in T if:</p><formula xml:id="formula_4">∀t, t ∈ T : t(X) = t (X) ⇒ t(Y ) = t (Y )</formula><p>For example, the functional dependencies a → d and d → a hold in the table of Example 1, whereas the functional dependency a → c does not hold since t 2 (a) = t 4 (a) but t 2 (c) = t 4 (c).</p><p>There is an alternative way of considering Functional Dependencies using partitions of the set of tuples T . Taking a set of attributes X ⊆ U, we define the partition of tuples induced by this set as follows.</p><p>Definition 4. Let X ⊆ U be a set of attributes in a table T . Two tuples t i and t j in T are equivalent w.r.t. X when:</p><formula xml:id="formula_5">t i ∼ t j ⇐⇒ t i (X) = t j (X)</formula><p>Then, the partition of T induced by X is a set of equivalence classes:</p><formula xml:id="formula_6">Π X (T ) = {c 1 , c 2 , . . . , c m } For example, if we consider the table in Example 1, we have Π a (T ) = {{t 1 , t 3 }, {t 2 , t 4 }}.</formula><p>Given X, Π X (T ) is a partition or alternatively an equivalence relation. Then we have:</p><formula xml:id="formula_7">1. Π X (T ) = T , for all X ⊆ U. 2. c i ∩ c j = ∅ for all c i , c j ∈ Π X (T ), i = j.</formula><p>The classes in a partition induced by X are disjoint and they cover all the tuples in T . The set of all partitions of a set T is Part(T ). We can also notice that the set of partitions of any set Part(T ) induces an ordering relation ≤:</p><formula xml:id="formula_8">∀P i , P j ∈ Part(T ) : P i ≤ P j ⇐⇒ ∀c ∈ P i : ∃c ∈ P j : c ⊆ c</formula><p>For example: {{t 1 }, {t 2 }, {t 3 , t 4 }} ≤ {{t 1 }, {t 2 , t 3 , t 4 }}. According to the partitions induced by a set of attributes, we have an alternative way of defining the necessary and sufficient conditions for a functional dependency to hold:</p><formula xml:id="formula_9">Proposition 1 ([12]). A functional dependency X → Y holds in T if and only if Π Y (T ) ≤ Π X (T ).</formula><p>Again, taking the table in Example 1, we have that a → d holds and that Approximate Dependencies <ref type="bibr">[12]</ref>. In a table, there may be some tuples that prevent a functional dependency from holding. Those tuples can be seen as exceptions (or errors) for that dependency. Removing such tuples allows the dependency to exist: then a threshold can be set to define a set of "approximate dependencies" holding in a table. For example, a threshold of 10% means that all functional dependencies holding after removing up to 10% of the tuples of a table are valid approximate dependencies. The set of tuples to be removed for validating a functional dependency does not need to be the same for each approximate dependency. Considering in Example 2 the dependency M onth → Av.T emp, we can check that 6 tuples should be removed before verifying the dependency: we keep only one tuple for Month 1 and one tuple for Month 5 (actually just as if we remove "duplicates"). Then, if the threshold is equal to or larger than 75%, M onth → Av.T emp is a valid Approximate Dependency.</p><formula xml:id="formula_10">Π d ≤ Π a since Π a (T ) = {{t 1 , t 3 }, {t 2 , t 4 }} and Π d (T ) = {{t 1 , t 3 }, {t</formula><p>Purity Dependencies <ref type="bibr">[15]</ref> are a generalization of the relationship between partitions induced by the left-hand side and right-hand side of a functional dependency. These dependencies are based on the relative impurity measure of two partitions. In order to compute this impurity measure, we need a concave and subadditive function defined on the interval [0, 1] (for example, the binary entropy function). The intuition about this measure is that it computes how much those partitions disagree, i.e. how far two partitions π and σ are from fulfilling the relation π ≤ σ. If the impurity measure is zero (or close to zero), then π ≤ σ.</p><p>For example, the impurity measure (details on this measure are given in <ref type="bibr">[14]</ref>) of partition {{1, 2, 3}, {4, 5}} w.r.t. partition {{1, 2}, {3, 4, 5}} is 5.6, whereas the impurity measure of partition {{1, 3}, {2, 5}, {4}} w.r.t. partition {{1, 2}, {3, 4, 5}} is 8.2. In the first pair of partitions, only tuple 3 is misplaced, i.e. moving 3 from one partition to another leads to the the same partitions, whereas in the second example, the number of misplaced elements is larger (2, 3, and 4 should be moved).</p><p>An important feature of this measure is that if a partition is finer than another, then, their relative impurity measure is exactly 0. This implies that a purity dependency X → Y holds if and only if the relative impurity of Π X (T ) w.r.t. Π Y (T ) is below a user-defined threshold. Therefore, if Π Y (T ) ≤ Π X (T ), a functional dependency is a valid purity dependency, regardless of the threshold.</p><p>For example, we consider all the possible dependencies having the attribute Average Temperature in their right-hand side. The purpose of this choice is to find out which attributes determine the values of the average temperature (Av. Temp.) in Example 2. Considering Approximate Dependencies, we introduce the two metrics # Tuples and Percentage: # Tuples denotes the minimal number of tuples that must be removed from the dataset for allowing the dependency to hold, and Percentage denotes the percentage that # Tuples represents for the whole dataset. For example, the Approximate Dependency M onth → Av.T emp holds when we remove at least 6 (well-chosen) tuples, which represent 75% of the whole dataset. As for the purity measure, we use the measure of relative entropy of two partitions described in <ref type="bibr">[14]</ref>. If we examine the dependency M onth → Av.T emp, we should the relative entropy of the partitions induced by Month and Av. Temp., which are, respectively:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Example 3. Dependencies with</head><formula xml:id="formula_11">Π M onth = {{t 1 , t 2 , t 5 , t 6 }, {t 3 , t 4 , t 7 , t 8 }} Π Av.T emp. = {{t 1 }, {t 2 }, {t 3 }, {t 4 }, {t 5 }, {t 6 }, {t 7 }, {t 8 }}</formula><p>Then, the relative entropy of Π M onth and Π Av.T emp. is 12.98, i.e. the largest of the conditional entropies that are computed. Actually the number of tuples that need to be reallocated for Π Av.T emp. ≤ Π M onth is significantly large. It is also significant that the number of tuples that need to be removed for the dependency Y ear, City → Av.T emp to hold is zero and that the relative entropy of Π Y ear,City and Π Av.T emp. is zero as well. The Functional Dependency Y ear, City → Av.T emp holds because there is no pair of tuples t i , t j such that t i (Y ear, City) = t j (Av.T emp.), i.e. there is no need to remove any tuple to verify this dependency. In addition the relative entropy of Π Y ear,City and Π Av.T emp. is zero, because the partitions induced by both sides, Π Y ear,City and Π Av.T emp are exactly the same: {{t 1 }, {t 2 }, {t 3 }, {t 4 }, {t 5 }, {t 6 }, {t 7 }, {t 8 }}. Therefore, the relation Π Y ear,City ≤ Π Av.T emp holds, i.e. the relative entropy is zero and this dependency trivially holds.</p><p>Yet, the intuition about this dataset is that the "Average Temperature" depends, to some extent, on the location and the month, i.e. given a city and a month, we should be able to predict the average temperature. But this intuitive relationship is somehow difficult to deduce with Approximate and Purity Dependencies. For example, the metrics for the dependency M onth, City → Av.T emp indicate that 4 tuples must be removed (50% of the dataset) for checking this dependency, or alternatively, the relative entropy of the partitions Π M onth,City and Π Av.T emp is 4.0. Considering the number of tuples, removing 50% of the whole dataset is a lot, especially if the intuition tells that this dependency should hold. Considering the entropy rate, the smallest entropy rate is zero and the largest computed rate is 12.98. Thus, it seems difficult to deduce the right threshold in each case.</p><p>Instead of considering measures that deal with the sets of tuples as a whole, dependencies could be directly related with the notion of "similarity": if two tuples have similar values for the attributes Month and City, then they should have a similar value for the attribute Av. Temp. This can be interpreted as follows: if two cities are close enough and the corresponding months are also close enough, then the average temperature in the cities should be close enough or "similar" as well. In such a context, "having similar values" depends on the type of the attributes. For temperatures it mean that the absolute difference of the values is less than a given threshold. For months, it could mean that they are adjacent. For cities, it could mean that their locations are close enough.</p><p>Such a kind of dependency would provide more control and a more intuitive explanation of the relations existing between attributes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Similarity Dependencies</head><p>First, we define a tolerance relation in a set S: Definition 5. θ ⊆ S × S is a tolerance relation if:</p><p>1. ∀s i ∈ S : s i θs i (reflexivity) 2. ∀s i , s j ∈ S : s i θs j ⇐⇒ s j θs i (symmetry) A tolerance relation is not necessarily transitive and induces blocks of tolerance: Definition 6. Given a set S, a subset K ⊆ S, and a tolerance relation θ ⊆ S×S, K is a block of tolerance of θ if:</p><formula xml:id="formula_12">1. ∀x, y ∈ K : xθy (pairwise correspondence) 2. ∀z ∈ K, ∃u ∈ K : ¬(zθu) (maximality)</formula><p>All elements in a tolerance block are in pairwise correspondence, and the block is maximal with respect to the relation θ. The set of all tolerance blocks induced by a tolerance relation θ on the set S is denoted by S/θ (by analogy with the notation of equivalence classes). S/θ is a set of maximal subsets of S and as such, S/θ ∈ ℘ ( ℘ (S)). Thus we have:</p><formula xml:id="formula_13">Property 1. ∀K i , K j ∈ S/θ : K i K j and K j K i for all i = j</formula><p>Then, we define a partial ordering on the set of all possible tolerance relations in a set S as follows: Definition 7. Let θ 1 and θ 2 two tolerance relations in the set S. We say that</p><formula xml:id="formula_14">θ 1 ≤ θ 2 if and only if ∀K i ∈ S/θ 1 : ∃K j ∈ S/θ 2 : K i ⊆ K j</formula><p>This relation is a partial ordering and induces a lattice where the meet and join operations of two tolerance relations θ 1 and θ 2 , or, equivalently, on the sets of blocks of tolerance of θ 1 and θ 2 are: Definition 8. Let θ 1 and θ 2 two tolerance relations in the set S.</p><formula xml:id="formula_15">θ 1 ∧ θ 2 = θ 1 ∩ θ 2 = max S ({k i ∩ k j | k i ∈ S/θ 1 , k j ∈ S/θ 2 }) θ 1 ∨ θ 2 = θ 1 ∪ θ 2 = max S (S/θ 1 ∪ S/θ 2 )</formula><p>The meet θ 1 ∧ θ 2 is the set of pairwise intersections of all blocks in S/θ 1 and S/θ 2 , and then removing intersections that are not maximal. The join is simpler as it consists in simply joining the blocks of tolerance in S/θ 1 and S/θ 2 and then removing the unions that are not maximal.</p><p>An example of a tolerance relation is the similarity that can be defined within a set of integer values as follows. Given two integer values v 1 , v 2 and a threshold (user-defined):</p><formula xml:id="formula_16">v 1 θv 2 ⇐⇒ |v 1 − v 2 | ≤ .</formula><p>For example, when S = {1, 2, 3, 4, 5} and = 2, then S/θ = {{1, 2, 3}, {2, 3, 4}, {3, 4, 5}}. S/θ is not a partition as transitivity does not apply.</p><p>We now come back to the set of tuples T and the set of attributes M . For each attribute m ∈ M , we define a tolerance relation on the values of that attribute: θ m . The set of tolerance blocks induced by the tolerance relation of the attribute m is T /θ m . All the tuples in a tolerance block K ∈ T /θ m are similar one to the other according to their values w;r.t. the attribute m. </p><formula xml:id="formula_17">t i θ m t j ⇐⇒ |t i (m) − t j (m)| ≤ .</formula><p>Now, assuming that = 1 in example 1, we have:</p><formula xml:id="formula_18">T /θ a = {{t 1 , t 3 }, {t 2 , t 4 }}, T /θ b = {{t 1 , t 2 , t 4 }, {t 3 }}, T /θ c = {{t 1 , t 2 , t 3 }, {t 4 }} and S/θ d = {{t 1 , t 3 }, {t 2 , t 4 }}.</formula><p>We can also extend this definition to sets of attributes. Given X ⊆ U, the similarity relation θ X is defined as follows:</p><formula xml:id="formula_19">(t i , t j ) ∈ θ X ⇐⇒ ∀m ∈ X : (t i , t j ) ∈ θ m</formula><p>Two tuples are similar w.r.t. a set of attributes X if and only if they are similar w.r.t. each attributes in X. We now can define a similarity dependency:</p><formula xml:id="formula_20">Definition 9. Let X, Y ⊆ U: X → Y is a similarity dependency iff: ∀t i , t j ∈ T : t i θ X t j ⇒ t i θ Y t j</formula><p>In the case of a functional dependency, X → Y holds if and only if, for each pair of tuples having the same value w.r.t. the attributes in X, then, they have the same value w.r.t. the attributes in Y .</p><p>In the case of a similarity dependency, X → Y holds if and only if, for each pair of tuples having similar values w.r.t. the attributes in X, then, they have similar values w.r.t. the attributes in Y .</p><p>Example 5. We revisit the table in Example 4 and we define the tolerance relation:</p><formula xml:id="formula_21">t i θ m t j ⇐⇒ |t i (m)−t j (m)| ≤ 2. Then the following similarity dependencies hold: a → d, ab → d, abc → d, ac → d, b → d, bc → d, c → d.</formula><p>It is interesting to notice that b → d is a similarity dependency but not a functional dependency, as t 1 (b) = t 2 (b) and t 1 (d) = t 2 (d). Because of the same pair of tuples, the similarity dependency bcd → a does not hold, as t 1 θ bcd t 2 but we do not have</p><formula xml:id="formula_22">t 1 θ a t 2 , since |t 1 (a) − t 2 (a)| 2.</formula><p>By contrast, the functional dependency bcd → a holds because there is no pair of tuples t i , t j such that t i (bcd) = t j (bcd). The only similarity dependency that holds is M onth, City → Av.T emp, using the following similarity measures for each attribute:</p><formula xml:id="formula_23">x θ M onth y ⇐⇒ |x − y| ≤ 0, x θ Y ear y ⇐⇒ |x − y| ≤ 0, x θ City y ⇐⇒ distance(x, y) ≤ 500 and x θ Av.T emp y ⇐⇒ |x − y| ≤ 10.</formula><p>The similarity imposes that the month and year must be the same, whereas the distance between cities should be less than 500 kilometers and the difference between average temperatures should be less than 10 degrees (all these values are of course arbitrary).</p><p>In particular, considering the tuples t 1 , t 2 : t 1 θ M onth,City t 2 since t 1 (M onth) = t 2 (M onth) = 1 and t 1 (City) = t 2 (City) = M ilan . From the other side, we have that t 1 θ Av.T emp. t 2 since |36.4 − 33.8| ≤ 10.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Computing Similarity Dependencies with Pattern Structures</head><p>A pattern structure allows one to apply FCA directly on non-binary data <ref type="bibr">[9]</ref>. Formally, let G be a set of objects, let (D, ) be a meet-semi-lattice of potential object descriptions and let δ : G −→ D be a mapping associating each object with its description. </p><formula xml:id="formula_24">A = g∈A δ(g) d = {g ∈ G|d δ(g)}.</formula><p>These operators form a Galois connection between (℘(G), ⊆) and (D, ). Pattern concepts of (G, (D, ), δ) are pairs of the form (A, d), A ⊆ G, d ∈ (D, ), such that A = d and A = d . For a pattern concept (A, d), d is a pattern intent and is the common description of all objects in A, the pattern extent. When partially ordered by</p><formula xml:id="formula_25">(A 1 , d 1 ) ≤ (A 2 , d 2 ) ⇔ A 1 ⊆ A 2 (⇔ d 2 d 1 )</formula><p>, the set of all concepts forms a complete lattice called pattern concept lattice.</p><p>Thanks to the formalism of pattern structures, similarity dependencies can be characterized (and computed) in an elegant manner. Firstly, the description of an attribute m ∈ M is given by δ(m) = G/θ m which is given by the set of tolerance blocks w.r.t. θ m and G = T . As tolerance relations can be ordered as presented and discussed in Definitions 7 and 8, then descriptions can be ordered within a lattice.</p><p>Then, a dataset can be represented as a pattern structure (M, (D, ), δ) where M is the set of original attributes, and (D, ) is the set of sets of blocks of tolerance over G provided with the meet operation defined in Definition 8.</p><p>An example of concept formation is given as follows. Starting from the set {a, c} ⊆ M and assuming that t i θ m t j ⇐⇒ |t i (m)−t j (m)| ≤ 2 for all attributes:</p><formula xml:id="formula_26">{a, c} = δ(a) δ(c) = {{t 1 , t 3 }, {t 2 , t 4 }} {{t 1 , t 2 , t 3 }, {t 4 }} = {{t 1 , t 3 }, {t 2 }, {t 4 }} {{t 1 , t 3 }, {t 2 }, {t 4 }} = {m ∈ M |{{t 1 , t 3 }, {t 2 }, {t 4 }} δ(m)} = {a, c}</formula><p>This pattern concept lattice allows us to characterize all similarity dependencies holding in M :</p><formula xml:id="formula_27">Proposition 2. A similarity dependency X → Y holds in a table T if and only if: {X} = {XY } in the pattern structure (M, (D, ), δ).</formula><p>Proof. First of all, we notice that (t, t ) ∈ {X} if and only if t(X)θ X t (X), since (t, t ) ∈ {X} if and only if ∀x ∈ X : t(x)θ x t (x), if and only if t(X)θ X t (X). We also notice that {X, Y } ⊆ {X} . (⇒) We prove that if X → Y holds in T , then, {X} = {X, Y } , that is, {X} ⊆ {X, Y } . We take an arbitrary pair (t, t ) ∈ {X} , that is: t(X)θ X t (X).</p><p>Since X → Y holds, it implies that t(XY )θ XY t (XY ), and this implies that (t, t ) ∈ {X, Y } . (⇐) We take an arbitrary pair t, t ∈ T such that t(X)θ X t (X). Therefore, we have that (t, t ) ∈ {X} , and by hypothesis, (t, t ) ∈ {XY } , that is: t(XY )θ XY t (XY ). Since this is for all pairs t, t ∈ T such that t(X) = t (X), this implies that X → Y holds in T .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Experiments</head><p>Dataset description. Electronic sport denotes the extreme practice of video games where so-called cyber-athletes compete in world-wide tournaments. As for any sport, such professionals are surrounded by sponsors and practice within professional teams. These professional games are even broadcast by commentators over specialized TV channels <ref type="bibr">[18]</ref>. StarCraft II (Blizzard Entertainment) is the most competitive video game. Since e-sport is a digital entertainment, one can easily find game statistics and recording in great numbers on the Web. We list more than 209, 000 games between two opponents and their associated statistics (attributes). For each game, we derive two tuples (one for each of the players involved). Each player in a game (tuple) is described by 31 attributes such as his faction, the result, and several indicators of his game play. Experimental settings. The final dataset has about 400, 000 tuples described by 31 attributes with different domain types (Boolean, qualitative, and numerical). For attributes with Boolean or non-ordered qualitative domains, the similarity parameters are set to 0 as for classical FDs, since we do not have similarity constraints between their values. For the others, parameters are set by an expert of the domain, helped with the distribution of that attribute values. Thanks to the genericity of pattern structures, we slightly modified the very simplistic Java version of CloseByOne used in <ref type="bibr">[1]</ref> for extracting classical FDs. The only modification lies in building the descriptions, i.e. producing tolerance blocks instead of partitions over the set of objects. We experimented on 1.8GHz and 4GB of RAM machines. Preliminary results. We build first several different sub-datasets with randomly chosen set of tuples and different subsets of attributes. We report execution times for extracting pattern concepts (and their count) to characterize functional dependencies and similarity dependencies for three datasets in Figure <ref type="figure" target="#fig_0">1</ref>. We also report the average number of tolerance classes of each attribute (that allows to build their description). In Figure <ref type="figure" target="#fig_0">1</ref> (a), the dataset is composed of qualitative and not comparable attributes only. Thus, we set the similarity parameters to 0 and observe that extracting FDs and SDs requires the same amount of time and returns the same concepts (since setting the similarity parameter to 0 leads to partitions). Naturally, the number of tolerance blocks is high, corresponding to the cardinality of attribute domains. We added more attributes, among which 5 numerical, and introduce the similarity parameters, see Figure <ref type="figure" target="#fig_0">1</ref> (b) and (c). The number of tolerance blocks is still high since it is an average for all attributes, and attribute domains are very dense. We notice that there are more concepts to characterize SDs than FDs. This is due to our choice of similarity parameters. Finally, we face memory issues when computing pattern concepts for SDs, when the algorithms terminates for FDs. This is due to our pattern implementations, i.e. how a pattern is represented in the memory. We used striped partitions, i.e. not store any part of size 1, which can strongly reduce the pattern size in memory. For FDs, this experimentally happens more often than for SDs, due to the relaxation of the equality constraint. We need to investigate other pattern implementations. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>We discussed how Functional, Approximate and Purity Dependencies may not capture some relationships among attributes that intuitively exist in a dataset. We presented alternatively Similarity Dependencies, to express relationships between attributes based on a similarity measure that depends on the semantics of each attribute. We showed that similarity dependencies are easily characterized in FCA with pattern structures and we gave a preliminary experimental study. Future work is in concern with a deeper investigation of the best in-memory pattern representations for fast and scalable computation, the introduction of a minimal support as well as a qualitative evaluation of similarity dependencies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Various fields, such as artificial intelligence, data mining and databases, are concerned with the problem of finding implications between sets of attributes describing objects. Formal concept analysis offers a sound mathematical framework to help develop algorithms that compute implications. As it has been shown in <ref type="bibr">[3]</ref>, the set of implications of minimum cardinality needed to obtain all the interesting information can be found by enumerating attribute sets known as pseudo-intents. The best-known algorithm for the computation of pseudo-intents is Next Closure <ref type="bibr">[4]</ref>, in which pseudo-intents are enumerated following a total order on attribute sets called lectic order. The problem of enumerating pseudointents in lectic order has been studied in <ref type="bibr">[2]</ref> and found to be CONP-complete. The same work has been unable to find a lower bound to the complexity of this problem once the restriction on the order is removed. This indicates that the order plays an important role and that using a weaker order could potentially yield interesting results. This prompted us to study an algorithm based on the same principles as Next Closure but with a partial order on the attribute sets instead of a linear order. We are inspired by the multiple algorithms for the related problem of enumerating formal concepts that make use of the lattice structure of the problem. There already are approaches that do not make use of the lectic order for pseudo-intents, such as the attribute incremental algorithm that has been introduced in <ref type="bibr">[8]</ref>, or the divide-and-conquer approach in [9] but we will not compare it to our own in this work as their nature differs.</p><p>After an overview of the notations in formal concept analysis and a brief recall of Next Closure, we will present our algorithm. In a second part, we will show that it can be modified to compute not only the Duquenne-Guigues basis but also the Luxenburger basis. The functioning of the algorithm will then be illustrated by means of a small example.</p><p>In formal concept analysis, data is represented by a triple C = (O, A, R), called formal context, where O is a set of objects, A a set of binary attributes and R ⊆ O × A a relation assigning a set of attributes to each object. An object o is said to be described by an attribute set A iff (o, a) ∈ R for every a ∈ A.</p><p>Two derivation operators are commonly employed and defined as follows :</p><formula xml:id="formula_28">. : 2 A → 2 O A = {o ∈ O | ∀a ∈ A, (o, a) ∈ R}<label>(1)</label></formula><p>.</p><formula xml:id="formula_29">: 2 O → 2 A O = {a ∈ A | ∀o ∈ O, (o, a) ∈ R}<label>(2)</label></formula><p>The compositions of these two operators are closure operators and we will use the notation . for both. A set A is said to be closed if A = A . A closed attribute set is called an intent and a closed object set an extent. An attribute set A is a pseudo-intent if it is not an intent and P ⊂ A for all pseudo-intents P ⊂ A. The set B = {A → A | A is a pseudo-intent}, called the canonical basis, is a set of implications of minimum cardinality such that every implication that holds in the context can be inferred from it through the application of the Armstrong rules. That is, it is the minimum number of implications containing all information on the relations between attribute sets in the context.</p><p>Computing the canonical basis of a context thus requires the enumeration of its pseudo-intents. This presents some challenges as the number of pseudo-intents can be exponential in the size of the context (the number of attributes), as shown in <ref type="bibr">[5]</ref>. Moreover, whether pseudo-intents can be enumerated without intents is still an open problem and the number of intents can itself be exponential in the number of pseudo-intents.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Next Closure</head><p>The most known algorithm for computing the canonical basis is Ganter's Next Closure <ref type="bibr">[4]</ref>. For an arbitrary linear order &lt; on A, a linear order, called lectic order, ≤ lec on attribute sets is defined as follows:</p><formula xml:id="formula_30">A ≤ lec B ⇔ min(A∆B) ∈ B</formula><p>∆ is the symmetric difference. The implicational closure of an attribute set A with respect to a set of implications L, usually noted L(A), is the smallest superset of A such that, for every X ⊆ L(A), we have</p><formula xml:id="formula_31">X → Y ∈ L ⇒ Y ⊆ L(A).</formula><p>The implicational closure is a closure operator. The implicational pseudo-closure of an attribute set A, noted L − (A), is the smallest superset of A such that, for every X ⊂ L(A), we have</p><formula xml:id="formula_32">X → Y ∈ L ⇒ Y ⊆ L(A).</formula><p>It is shown that both intents and pseudo-intents are closed under B − . Next Closure, in its original form, computes closed sets for a given closure operator. Applied to the computation of pseudo-intents, it goes through implicationally pseudo-closed subsets of A in lectic order and checks whether the result is an intent or a pseudo-intent. The lectic order being linear, every set is computed once and only once. For an attribute set A and an attribute i, the operator ⊕ is defined as follows :</p><formula xml:id="formula_33">A ⊕ i = B − ({a ∈ A | a ≤ i} ∪ {i})</formula><p>The closed set that immediately follows A in the lectic order is A ⊕ i with i maximal such that min((A ⊕ i) \ A). For each set closed under B − , Next Closure tests whether it is an intent or a pseudo-intent and then constructs the next set with the operator ⊕ until it reaches A. Numerous optimizations can be added to reduce the number of implicational closures. For example, as proposed in <ref type="bibr">[8]</ref>, if N ext(A) = A ⊕ i = B and min(B \ A) &lt; max(A) then we can continue as if A ⊕ i had been rejected by Next Closure. It is the only one we will consider here as it is specific to Next Closure and has no incidence on our algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Algorithm</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Principles</head><p>We consider the lattice Φ = ({A = B − (A) | A ⊆ A}, ⊆) of attribute sets closed under B − ordered by the inclusion relation. Enumerating pseudo-intents is enumerating all the elements of Φ and testing whether they are intents or pseudointents. As with other enumeration problems, we want to make sure every element is found once and only once. The other great FCA problem, computing the formal concepts of a context, can be viewed as the enumeration of the elements of ({B(A) | A ⊆ A}, ⊆). It has been extensively studied (see <ref type="bibr">[6]</ref> for a comparison of different algorithms) and various approaches have been proposed for both generating elements from previous ones and checking whether an attribute set has already been found (or even preventing the generation of redundant sets). Surprisingly, it seems only Next Closure is commonly used for the problem of pseudo-intents, non-batch algorithms excluded. Indeed, it is very efficient in that the lectic order on attribute sets allows for the generation of the next set without stocking more than the current set and the total order ensures we do not generate them more than once. However, we feel that the fact that sets are not always generated by one of their subsets is a weakness for some applications, such as data mining. We propose to modify Next Closure with techniques from some algorithms for formal concepts that make use of the lattice structure.</p><p>The lectic order has the interesting property that a set B is greater than all its subsets. If B ∈ Φ is supposed to be generated by a single set, it should be one that is easily identifiable such as its lectically greatest subset A ∈ Φ. For any two A and B in Φ, we shall use A B to denote the fact that A is the lectically greatest subset of B closed under B − or, equivalently, that B is generated from A. We say that A is the predecessor of B and B is a successor of A.</p><p>Proposition 1. The relation defines a spanning tree of the neighbouring graph of Φ.</p><p>Proof. Any non-empty set B has at least one strict subset in Φ. We call A its lectically greatest subset in Φ. The lectic order respects the inclusion relation so there is no C such that A ⊂ C ⊂ B and A is a lower cover of B. Since every non-empty B ∈ Φ has a single lower cover A such that A B, the successor relation defines a spanning tree of the neighbouring graph of Φ. Proposition 2. For any two A, B ∈ Φ, the attribute set B is an upper cover of A if and only if B = B − (A ∪ {i}) for every i ∈ B \ A.</p><p>Proof. If B is an upper cover of A, then there is no</p><formula xml:id="formula_34">C such that A ⊂ B − (C) ⊂ B. We have B − (A ∪ {i}) ⊆ B when i ∈ B \ A, so B = B − (A ∪ {i}) for all i ∈ B \ A.</formula><p>If B = B − (A ∪ {i}) for every i ∈ B \ A, given that A ∪ {i} is the smallest subset of B that contains both A and i, then there is no superset of A that is a strict subset of B.</p><p>Attribute sets are generated according to the tree, starting from ∅. The recursive nature of the definition of a pseudo-intent prevents us from computing a set before the computation of all its subsets. The lectic order solves this problem efficiently but our tree contains only the knowledge of the lectically greatest subset. In order to make sure that every subset has been found first, we propose to consider attribute sets in order of increasing cardinality. This way, when an intent or pseudo-intent of cardinality n is considered, we are sure that all pseudo-intents of cardinality n − 1 have been found.</p><formula xml:id="formula_35">Proposition 3. If i &lt; min(A) and A ⊂ A ⊕ i, then A ⊕ i has a subset in Φ that is lectically greater than A. Proof. If i &lt; min(A), then B − ({a ∈ A | a ≤ i} ∪ {i}) = B − ({i}). If A ⊂ A ⊕ i,</formula><p>then {i} is a pseudo-intent that is a subset of A ⊕ i and is lectically greater than A.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 1 Successors(A)</head><p>1: Successors = ∅ 2: for every attribute i greater than min(A) do 3:</p><formula xml:id="formula_36">B = A ⊕ i 4: if A ⊂ B then 5: if i = min(B \ A) and ∀j ∈ B \ A, A ⊕ j = B then 6: Successors = Successors ∪ {B} 7:</formula><p>end if 8:</p><p>end if 9: end for 10: return Successors Proposition 4. For any two attribute sets A and B such that</p><formula xml:id="formula_37">A ⊂ B, A B ⇔ ∀i ∈ B \ A, A ⊕ i = B. Proof. If ∀i ∈ B \ A, A ⊕ i = B, then B has no subset in Φ lectically greater than A. As such, ∀i ∈ B \ A, A ⊕ i = B ⇒ A B. If A B and ∃i ∈ B \ A such that A ⊕ i ⊂ B, then B has a subset in Φ lectically greater than A, which contradicts the hypothesis. As such, A B ⇒ ∀i ∈ B \ A, A ⊕ i = B.</formula><p>So, in order to generate all the successors of A, it suffices to compute A ⊕ i for every i greater than min(A). If a resulting attribute set is an upper cover of A it is a successor.</p><p>Testing whether a new attribute set B = A ⊕ i is a successor of A is easy as we know A ⊕ j for every j ∈ B \ A. Algorithm 1 uses this to compute the successors of an attribute set.</p><p>If an attribute set B is a pseudo-intent, it is a ∧-irreducible element of Φ. That is, it has a single upper cover. If B = B − (A), the set B is the lectically next set after B if max(A) ≤ min(A \ A). That way, if an attribute set is a pseudo-intent, we do not have to explicitly compute its successors.</p><p>Algorithm 2 uses Algorithm 1 to go through the intents and pseudo-intents of the context and compute its canonical basis. It starts with ∅ and computes the closure of all the attribute sets of the same cardinality simultaneously before generating their successors. However, when an intent A is considered and its successors generated, only the pseudo-intents of cardinality lesser than |A| + 1 have been found so the A ⊕ i computed at this point might be different from the final A ⊕ i. For example, if |A ⊕ i| − |a| = 2, an implication B → C with |B| = |A| + 1 and B ⊂ A ⊕ i will change the result. For this reason, we must split Algorithm 1 into two parts. First, the sets A ⊕ i are computed for all i once every intent of cardinality |A| have been found. Then, when A ⊕ i is considered as a Candidate, we must check whether it is still logically closed and, if it is, test whether it is a successor with Proposition 4. for every attribute set A of cardinality Card in Candidates do 7:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 2 Computing the Duquenne-Guigues Basis</head><p>if A = B − (A) and it is a successor of its generator then 8: for every set C in Intents do 22:</p><formula xml:id="formula_38">B = A 9: if A = B then 10: B = B ∪</formula><formula xml:id="formula_39">Candidates = Candidates ∪ {C ⊕ i | i ∈ A and i = min((C ⊕ i) \ C)} 23:</formula><p>end for 24:</p><p>Card = Card + 1 25: end while 26: return B Proposition 5. Algorithm 2 terminates and produces the canonical basis of the context.</p><p>Proof. An attribute set can only be used to generate attribute sets of greater cardinality. The set of attributes is finite, so the algorithm terminates when it reaches A.</p><p>Every element of Φ, except ∅, has a lower neighbour that is a predecessor in the spanning tree. If we generate the attribute sets along the tree, the lattice Φ being complete, every one of its elements is considered at least once. If an attribute set A is not equal to B − (A) it is not a pseudo-intent so all pseudointents are found.</p><p>During Algorithm 2, Algorithm 1 is applied to every intent to generate attribute sets. Their closure is then computed. As such, Algorithm 2 is in O(|Φ| × (X + Y )) where X is the complexity of computing the closure of a set and Y = |A| × L is the complexity of generating successors that depends on the complexity L of the saturation algorithm used. A study of algorithms for computing the implicational closure and their use in our problem can be found in <ref type="bibr">[1]</ref>. Note that, since every potential pseudo-intent P is constructed from an intent I with I ⊂ P , computing P can be done on the subcontext containing the objects of I .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Improvements</head><p>Additional reduction of the number of implicational closures required to compute the base can be achieved by making use of the property that every attribute set is constructed by adding an attribute to one of its subsets.</p><formula xml:id="formula_40">Proposition 6. If B = A ⊕ i is a successor of A with i = min(B \ A), then B ⊕ j = A ⊕ j for every attribute j &lt; i. Proof. If j &lt; i, then B − ({b ∈ B | b &lt; j} ∪ {j}) = B − ({a ∈ A | a &lt; j} ∪ {j}) because i = min(B \ A). Thus, we have B ⊕ j = A ⊕ j.</formula><p>This lets us use the knowledge acquired on a set A to reduce the number of necessary logical closures on its supersets. Indeed, for any B = A ⊕ i with i = min(B \ A), the set B ⊕ j is already known for every attribute lesser than i. This means that, in order to compute the successors of B, we need only to use the ⊕ operator with attributes greater than i.</p><p>We can also use the fact that there are pseudo-intents P such that P = A, which means that no object of the context is described by P . Indeed, for an intent A such that A A ⊕ i, there are two possibilities for i. If i ∈ o∈A {o} , meaning there is at least an object described by A ∪ {i}, the set A ⊕ i is either an intent or a pseudo-intent. If i ∈ A \ o∈A {o} , meaning no object is described by A ∪ {i}, the closure of A ⊕ i is A and, for any superset B of A, the set B ⊕ i is either equal to A ⊕ i or A. This means that computing B ⊕ i is unnecessary for every successors B of A in the spanning tree.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Computing a Base for Partial Implications</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Luxenburger Basis</head><p>A partial implication between two attribute sets A and B, otherwise called association rule, is a relation of the form A → s,c B where s is called the support and c the confidence. It means that s% of the objects of the context are described by A and that c% of them are also described by B. Implications, as defined in Section 2, are partial implications with a confidence of 100%. An attribute set A having the same support as A , the confidence and support of a partial implication A → s,c B can be derived from A → s,c B . As such, to obtain a basis for partial implications, one needs only to know the intents of the formal context.</p><p>It has been shown in <ref type="bibr">[7]</ref> that a minimal basis for partial implications, called Luxenburger basis, is obtained by considering a set {A → s,c B | A = A and B = B } that forms a spanning tree of the neighbouring graph of the intent lattice such that A is the conclusion of a single partial implication.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Modification of the Algorithm</head><p>In Algorithm 2, every attribute set is generated from a single intent with the exception of some essential intents that lectically follow a pseudo-intent. We would like those intents to be constructed from their lectically greatest subset that is an intent instead of just their lectically greatest subset. Let us suppose that we have an intent A and a pseudo-intent B such that A B and B B . The lectically greatest intent that is a subset of B is either A or a superset of A so it can be constructed by adding attributes of B \ A to A.</p><p>Algorithm 3 computes C for a given A, B and B .</p><p>Algorithm 3 Lectically Greatest Sub-Intent</p><formula xml:id="formula_41">1: C = A 2: for every attribute i in B \ A in increasing order do 3: if B(C ∪ {i}) = B then 4: C = C ∪ {i} 5:</formula><p>end if 6: end for 7: return C Proposition 7. Algorithm 3 terminates and computes the lectically greatest intent that is a subset of B Proof. There is a finite number of attributes and the loop goes through them in a total order so the algorithm terminates. The attribute set it returns, C, is either A or closed under B(.), so it is an intent. It is the implicational closure of a subset of B and it is not equal to B so we have C ⊂ B . Let us suppose that there is an intent D ⊂ B lectically greater than C with i = min(C∆D). The attribute i is such that B(X ∪ {i}) ⊂ B for any A ⊆ X ⊆ D so the algorithm must have added it to C and we have C = D.</p><p>Thus, the algorithm returns C, the greatest intent that is a subset of B .</p><p>If, in Algorithm 2, we maintain the spanning tree we used to generate attribute sets, it is easy to apply Algorithm 3 to every intent that lectically follows a pseudo-intent. If we change the predecessor of those intents to the attribute set computed by Algorithm 3 we obtain a spanning tree of Φ in which the predecessor of every intent is an intent. As A also has a unique predecessor, it gives us the Luxenburger basis of the context along with the Duquenne-Guigues basis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Example</head><p>We apply Algorithm 2 on the following context with a &lt; b &lt; c &lt; d &lt; e : The algorithm starts with ∅. It is closed so we generate its successors.</p><formula xml:id="formula_42">∅ ⊕ e = e ∅ ⊕ d = d ∅ ⊕ c = c ∅ ⊕ b = b ∅ ⊕ a = a</formula><p>The set of Candidates is then {a, b, c, d, e}. Among them, only a is a pseudointent with a = ab so we add a → ab to the basis. Moreover, ab lectically follows a so we add ab to Candidates. Its lectically greatest subset that is an intent is b. We then generate the successors of b, c, d and e. There are no attributes greater than min(e) = e so e has no successors.</p><formula xml:id="formula_43">b ⊕ e = be c ⊕ e = ce d ⊕ e = de b ⊕ d = bd c ⊕ d = cd b ⊕ c = bc</formula><p>The set of Candidates is then {ab, bc, bd, be, cd, ce, de}. Among them, bc, be and cd are pseudo-intents so we add bc → bcd, be → bde and cd → bcd to B. The set bcd lectically follows bc so we add bcd to Candidates. Its lectically greatest subset that is an intent is bd. We then generate the successors of ab, bd, ce and de. The set de has no successors for the same reasons as the set e in the previous step and we already know that c ⊕ d = cd so ce ⊕ d is known and ce has no successors.</p><formula xml:id="formula_44">ab ⊕ e = abde bd ⊕ e = bde ab ⊕ d = abd ab ⊕ c = abcd</formula><p>The set of Candidates is then {abd, bcd, bde}. Among them, abd is a pseudo intent so we add abd → abcde to B. The set abcde lectically follows abd so we add abcde to Candidates. Its lectically greatest subset that is an intent is ab. We then generate the successors of bcd and bde. We already know bd ⊕ c so we also know bde ⊕ c. As such, computing bde ⊕ c is not needed and no other attribute is available so bde has no successors.</p><p>bcd ⊕ e = bcde</p><p>The set of Candidates is then {bcde, abcde}. Only bcde has a cardinality of 4 and it is a pseudo-intent so we add bcde → abcde to B. There are no new intents so we continue with the elements of Candidates of cardinality 5. The set abcde is an intent and has no successors since it is equal to A.</p><p>The algorithm stops having produced the following implications :</p><formula xml:id="formula_45">-a → ab -bc → bcd -be → bde -cd → bcd -abd → abcde -bcde → abcde</formula><p>This is the Duquenne-Guigues basis of the context. In addition, the following spanning tree of the intent lattice has been constructed : It corresponds to the following set of partial implications : To compute it, Algorithm 3 has been used a total of 3 times.</p><formula xml:id="formula_46">-∅ → 1,0.6 b -∅ → 1,0.4 c -∅ → 1,0.6 d -∅ → 1,0.</formula><p>To compute the Duquenne-Guigues basis of this context, our algorithm has performed 16 logical closures. Since the version of Next Closure using the optimizations presented in Section 2.1 would have performed only 15, it is more efficient in this case. However, on the context presented in Figure <ref type="figure" target="#fig_7">3</ref>, our algorithm needs only 16 logical closures while Next Closure performs 19 of them. This is due to the fact that attributes are not considered if they have been used to generate an implication P → A and this context has a number of pairs of attribute that never appear together. This leads us to believe that our algorithm may be more efficient in those kinds of cases. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>We proposed an algorithm that computes the Duquenne-Guigues basis of a formal context. It makes use of the lattice structure of the set of both intents and pseudo-intents in a fashion similar to that of algorithms for computing the concept lattice. The construction of attribute sets is inspired by Next Closure, the most common batch algorithm for computing pseudo-intents, in that it uses the lectic order to ensure the uniqueness of generated sets while avoiding going through what has already been computed. We showed that the algorithm can easily be modified, without much loss complexity-wise, to produce both the Duquenne-Guigues and the Luxenburger bases. Those two bases together are sought after in the domain of association rules mining where it is crucial to obtain a minimal number of rules. They are usually derived from the set of frequent concepts that has to be computed first and, to the best of our knowledge, no algorithm is able to compute them both directly and at the same time without a significant increase in complexity.</p><p>Some improvements can be made on the generation of the attribute sets. Most notably, the inclusion test in Algorithm 1 could be done during the computation of the implicational closure and multiple closures could be realized simultaneously. The fact that attribute sets are effectively generated following a partial order instead of a total order could also permit some degree of parallelization. Such optimizations will be the subject of further research on our part.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Intervals of Anti-Monotonic Functions</head><p>A Boolean valued function on the subsets of a set N , in short a Boolean function, is said to be anti-monotonic iff it is true for at most one of any two sets A and B for which A B ⊆ N holds. A Boolean function is said to be monotonic iff the fact that it is true for a set B implies that it is true for any subset of B. There is a natural bijection between the set of monotonic functions and the set of antimonotonic functions through the maximal true sets (e.g. <ref type="bibr">[3]</ref>). Note furthermore that there is a bijection between anti-monotonic functions and antichains: the true sets of an anti-monotonic function form an antichain, i.e. a set of subsets of N such that no member set is included in another member set. In this paper we will use the antichain to denote an anti-monotonic function. We will denote the set of anti-monotonic functions on the set N ⊂ N by AM F (N ). We will use Greek letters to denote elements of AM F (N ) and Roman capitals to denote subsets of N , e.g. for A ⊆ B, B ⊆ A, α = {A, B} ∈ AM F (N ). Unless otherwise stated, N = {1, . . . n} will be the set of the first n positive integers, and in this case we will occasionally use the notation AM F (n) ≡ AM F (N ). The size of AM F (N ) or AF M (n) is the n-th number of Dedekind <ref type="bibr">[8]</ref>. This size is known for values of n up to n = 8 <ref type="bibr">[4]</ref>. Asymptotic expansions have been developed building on the size of the middle layer <ref type="bibr">[6,</ref><ref type="bibr">5]</ref>.</p><p>Example 1. For N = {1, 2}, the Boolean function 2 N → B, {∅ → f alse, {∅} → f alse, {1} → true, {2} → true, {1, 2} → f alse} is anti-monotonic. The antichain of true sets is given by {{1}, {2}}. This antichain will be used to denote the antimonotonic function.</p><p>For finite N , anti-monotonic functions form a finite distributive lattice with the join, meet and partial order given by</p><formula xml:id="formula_47">α ∨ β = max(α ∪ β)<label>(1)</label></formula><formula xml:id="formula_48">α ∧ β = max{A ∩ B|A ∈ α, B ∈ β} (2) α ≤ β ⇔ ∀A ∈ α : ∃B ∈ β : A ⊆ B<label>(3)</label></formula><formula xml:id="formula_49">(⇔ α ∨ β = β ⇔ α ∧ β = α),</formula><p>where for a general set S of subsets of N , max(S) is the set containing only the largest sets in S according to ⊆. A comprehensive textbook on Boolean functions is <ref type="bibr">[2]</ref>. A recent study on counting non-equivalent monotone Boolean functions is found in <ref type="bibr">[1]</ref>. Our antichains correspond to the notion of minimal sets playing an important role in the latter paper. A first analysis of intervals and decomposition is in <ref type="bibr">[9]</ref>. We will make extensive use of the intervals in this lattice. For two antichains α, β ∈ AM F (N ), the closed interval with bounds α and β is given by</p><formula xml:id="formula_50">[α, β] = {χ ∈ AM F (N )|α ≤ χ ≤ β}.<label>(4)</label></formula><p>Analogous definitions hold for (half)open intervals. Note that these intervals are empty in case α ≤ β, in particular in case of non comparable α and β.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Disconnected Intervals</head><p>Given two intervals [ρ 1 , ρ 2 ] and [ρ 1 , ρ 2 ] in AM F (N ), we have</p><formula xml:id="formula_51">{χ ∨ χ |χ ∈ [ρ 1 , ρ 2 ], χ ∈ [ρ 1 , ρ 2 ]} = [ρ 1 ∨ ρ 1 , ρ 2 ∨ ρ 2 ].<label>(5)</label></formula><p>We will use the notation</p><formula xml:id="formula_52">[ρ 1 , ρ 2 ] ∨ [ρ 1 , ρ 2 ] ≡ [ρ 1 ∨ ρ 1 , ρ 2 ∨ ρ 2 ].<label>(6)</label></formula><p>A fundamental property in the decomposition of intervals is related to the concept of (dis)-connectedness. Two intervals are said to be disconnected if the decomposition in equation 6 is unique. Two intervals are connected if they are not disconnected. If two intervals are disconnected, we will call the join of these intervals direct: </p><formula xml:id="formula_53">Definition 1. The interval [ρ 1 ∨ ρ 1 , ρ 2 ∨ ρ 2 ]</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Decomposition Theorem</head><p>The decomposition of intervals is based on the following Theorem 1, which is actually valid in a general distributive lattice.</p><p>Lemma 1. For two anti-monotonic functions α, β ∈ AM F (N ) we have</p><formula xml:id="formula_54">[α ∧ β, α ∨ β] = [α ∧ β, α] [α ∧ β, β].<label>(7)</label></formula><p>Proof. It is clear that for</p><formula xml:id="formula_55">χ α ∈ [α ∧ β, α] and χ β ∈ [α ∧ β, β], we have χ α ∨ χ β ∈ [α ∧ β, α ∨ β]. Moreover, since χ β ∧ α ≤ β ∧ α, we have χ α = (χ α ∨ χ β ) ∧ α and similarly χ β = (χ α ∨ χ β ) ∧ β. For χ ∈ [α ∧ β, α ∨ β] we have χ ∧ α ∈ [α ∧ β, α], χ ∧ β ∈ [α ∧ β, β] and (χ ∧ α ∨ χ ∧ β) = χ ∧ (α ∨ β) = χ.<label>(8)</label></formula><p>More generally we have Theorem 1. For three anti-monotonic functions α, β, ρ</p><formula xml:id="formula_56">∈ AM F (N ) such that ρ ∈ [α ∧ β, α ∨ β] we have [ρ, α ∨ β] = [ρ, α ∨ ρ] [ρ, β ∨ ρ].<label>(9)</label></formula><p>Proof. Note that (α∨ρ)∧(β ∨ρ) = (α∧β)∨ρ = ρ so that the interval</p><formula xml:id="formula_57">[ρ, α∨β] = [ρ, (α ∨ ρ) ∨ (β ∨ ρ)] satisfies the conditions of Lemma 1. Any χ ∈ [ρ, α ∨ β] has the unique decomposition χ = (χ ∧ (α ∨ ρ)) ∨ (χ ∧ (β ∨ ρ)).</formula><p>Theorem 1 can be strengthened as Theorem 2. For three anti-monotonic functions α, β, ρ </p><formula xml:id="formula_58">∈ AM F (N ) such that ρ ∈ [α ∧ β, α ∨ β] we have [ρ, α ∨ β] = [ρ ∧ α, α] [ρ ∧ β, β]. (<label>10</label></formula><formula xml:id="formula_59">) Proof. Any χ ∈ [ρ, α∨β] satisfies χ = (χ∧α)∨(χ∧β), with χ∧α ∈ [ρ∧α, α], χ∧ β ∈ [ρ ∧ β, β]. Any χ = χ α ∨ χ β with χ α ∈ [ρ ∧ α, α], χ β ∈ [ρ ∧ β, β] is in [ρ, α ∨ β]. Furthermore χ∧α = (χ α ∧α)∨(χ β ∧α) where χ α ∧α = χ α (since χ α ∈ [ρ∧α, α]) and χ β ∧ α ≤ β ∧ α (since χ β ∈ [ρ ∧ β, β]) so that χ β ∧ α ≤ ρ ∧ α ≤ χ α ,</formula><formula xml:id="formula_60">This implies that [ρ ∧ α, α] → [ρ, ρ ∨ α] : χ → ρ ∨ χ defines an isomorphism with inverse [ρ, ρ ∨ α] → [ρ ∧ α, α] : χ → α ∧ χ.</formula><p>Corollary 2. For two anti-monotonic functions ρ 1 , ρ 2 = ∨ i∈I α i with ∀i, j ∈ I :</p><formula xml:id="formula_61">α i ∧ α j ≤ ρ 1 , we have [ρ 1 , ρ 2 ] = i∈I [ρ 1 , ρ 1 ∨ α i ] (11) = i∈I [ρ 1 ∧ α i , α i ]. (<label>12</label></formula><formula xml:id="formula_62">)</formula><p>Proof. The proof follows from a simple iteration over the indices i ∈ I, applying Theorems 1 and 2 for each component α i , i ∈ I.</p><p>In the following, we will use the notation o ρ,γ for any two anti-monotonic functions ρ ≥ γ to denote the largest χ for which χ ∧ ρ = γ. A general partition of an interval is given by Theorem 3.</p><formula xml:id="formula_63">Theorem 3. For anti-monotonic functions ρ 1 ≤ ρ ≤ ρ 2 [ρ 1 , ρ 2 ] = ∪ γ∈[ρ1,ρ] [γ, o ρ,γ ∧ ρ 2 ].<label>(13)</label></formula><p>The intervals [γ, o ρ,γ ∧ ρ 2 ] for γ ≤ ρ are disjoint and nonempty.</p><formula xml:id="formula_64">Proof. For each γ ∈ [ρ 1 , ρ] consider the set S γ = {χ ∈ [ρ 1 , ρ 2 ]|χ ∧ ρ = γ}. These sets are disjoint. Since for each χ ∈ [ρ 1 , ρ 2 ], we have χ ∧ ρ ∈ [ρ 1 , ρ],</formula><p>the union of these sets is the whole interval. γ is a lower bound on S γ . Since (χ 1 ∧ ρ = γ and χ 2 ∧ ρ = γ) ⇒ (χ 1 ∨ χ 2 ) ∧ ρ = γ, the set has exactly one maximal element. We denote this element in the case of ρ 2 = {N } by o ρ,γ . Since, in addition, </p><formula xml:id="formula_65">χ 1 ∧ ρ = γ, χ 2 ∧ ρ = γ ⇒ (χ 1 ∧ χ 2 ) ∧ ρ = γ,</formula><formula xml:id="formula_66">o ρ,γ = γ\ρ (<label>14</label></formula><formula xml:id="formula_67">)</formula><p>where˜denotes the dual in the lattice AM F (N ).</p><p>Note 1. Note that the theorems so far, including the proofs, did not refer explicitly to anti-monotonic functions. In fact, they only relied on the properties of the operators ∧ and ∨ and are seen to be valid in any complete distributive lattice.</p><p>The following sections specifically refer to the definition of an anti-monotonic function as a function on subsets of a superset. Although we believe, the following properties, especially Theorem 4, can be generalized as well, we for now restrict the discussion to the space AM F (N ).</p><p>In what follows, disconnectedness of intervals turns out to be related to a corresponding property of the top of the interval.</p><p>Definition 2. Given two anti-monotonic functions ρ, α ∈ AM F (N ) with ρ ≤ α. Two sets A, B ∈ α are said to be connected with respect to ρ if and only if {A ∩ B} ≤ ρ. Connectedness of such sets is denoted by C ρ (A, B). C ρ (., .) defines a graph with the sets of α as vertices. The vertices of each connected component of this graph correspond to a subset of α and thus to an anti-monotonic function.</p><p>We will refer to these anti-monotonic functions as the connected components of α with respect to ρ and denote the set of such components by C ρ,α .</p><p>We now have</p><formula xml:id="formula_68">Corollary 3. For anti-monotonic functions ρ 1 , ρ 2 ∈ AM F (N ) with ρ 1 ≤ ρ 2 [ρ 1 , ρ 2 ] = χ∈Cρ 1 ,ρ 2 [ρ 1 ∧ χ, χ].<label>(15)</label></formula><p>Proof. The proof follows immediately from Corollary 2. In what follows, we will use the following notations Definition 3. Let ρ 1 , ρ 2 ∈ AM F (N ), ρ 1 ≤ ρ 2 . We use the notion of level λ l in the interval [ρ 1 , ρ 2 ] to denote maximal anti-monotonic functions consisting of elements of a specific size l, and we introduce the (.) + and (.) − operators to transform functions from one level to a neighboring level, as follows:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Corollary 3 leads to</head><formula xml:id="formula_69">λ l = {A ⊆ N |ρ 1 ∨ {A} ∈]ρ 1 , ρ 2 ], |A| = l}(∀l ≥ 0),<label>(16)</label></formula><formula xml:id="formula_70">α + = {X ∈ λ l+1 |∀x ∈ X : X\{x} ∈ λ l ⇒ X\{x} ∈ α}, (∀α ⊆ λ l , ∀l ≥ 0),(<label>17</label></formula><formula xml:id="formula_71">)</formula><formula xml:id="formula_72">α − = {X ∈ λ l−1 |∃A ∈ α : X ⊆ A}, (∀α ⊆ λ l , ∀l &gt; 0). (<label>18</label></formula><formula xml:id="formula_73">)</formula><p>Note that in Definition 3, in (17) α + ⊆ λ l+1 and in (18</p><formula xml:id="formula_74">) α − ⊆ λ l−1 ,</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Decomposition of a General Interval into Computationally Easy Intervals</head><p>We will now use decomposition to compute the size of any interval. Theorem 4 builds on the following Lemma.</p><formula xml:id="formula_75">Lemma 2. Let ρ 1 , ρ 2 ∈ AM F (N ), ρ 1 ≤ ρ 2 and χ ∈ [ρ 1 , ρ 2 ]</formula><p>. Then χ has the following unique decomposition:</p><formula xml:id="formula_76">χ = ρ 1 ∨ χ 0 ∨ χ 1 ∨ χ 2 ∨ . . . ,<label>(19)</label></formula><p>where ∀l ≥ 0 :</p><formula xml:id="formula_77">χ l ⊆ λ l , χ − l+1 ≤ χ l , χ l+1 ≤ χ + l .</formula><p>Proof. We start from the decomposition in sets of specific levels:</p><formula xml:id="formula_78">χ = (χ ∩ ρ 1 ) ∨ (χ ∩ λ 0 ) ∨ (χ ∩ λ 1 ) ∨ (χ ∩ λ 2 ) ∨ . . . (χ ∩ λ s−1 ) ∨ (χ ∩ λ s ) (<label>20</label></formula><formula xml:id="formula_79">)</formula><p>where s is the size of the largest set in χ. We now set χ l = ∅ for l &gt; s. Further, let χ s = χ ∩ λ s and note that the decomposition does not change if we add χ − s to the sets of level s − 1.</p><formula xml:id="formula_80">χ = (χ ∩ ρ 1 ) ∨ (χ ∩ λ 0 ) ∨ (χ ∩ λ 1 ) ∨ (χ ∩ λ 2 ) ∨ . . . (χ ∩ λ s−1 ∨ χ − s ) ∨ χ s . (<label>21</label></formula><formula xml:id="formula_81">)</formula><p>This suggests the recursive definition ∀l ∈ {0, . . . , s − 1} :</p><formula xml:id="formula_82">χ l = (χ ∩ λ l ) ∨ χ − l+1 (<label>22</label></formula><formula xml:id="formula_83">)</formula><formula xml:id="formula_84">leading to χ = (χ ∩ ρ 1 ) ∨ χ 0 ∨ χ 1 ∨ χ 2 ∨ . . . χ s−1 ∨ χ s (<label>23</label></formula><formula xml:id="formula_85">)</formula><p>and since χ ≥ ρ 1 :</p><formula xml:id="formula_86">χ = ρ 1 ∨ χ 0 ∨ χ 1 ∨ χ 2 ∨ . . . χ s−1 ∨ χ s . (<label>24</label></formula><formula xml:id="formula_87">)</formula><p>The inequalities in <ref type="bibr">(19)</ref> now follow immediately from <ref type="bibr">(22)</ref> and Definition 3.</p><p>Given the decomposition <ref type="bibr">(19)</ref>, it follows immediately that χ s = χ∩λ s .</p><formula xml:id="formula_88">χ s−1 ≥ χ − s implies χ − s ⊆ χ s−1 . Furthermore, necessarily χ ∩ λ s−1 ⊆ χ s−1 so that we find χ s−1 ≥ χ − s ∨ (χ ∩ λ s−1 )</formula><p>. Since any set in χ s−1 not dominated by a set in χ s is necessarily in χ, we have χ s−1 ≤ χ − s ∨ (χ ∩ λ s−1 ) and equality follows. Recursive application of this reasoning proves uniqueness.</p><formula xml:id="formula_89">Theorem 4. For ρ 1 , ρ 2 ∈ AM F (N ) with ρ 1 ≤ ρ 2 , we have |[ρ 1 , ρ 2 ]| = α1⊆λ1 α3⊆α ++ 1 α5⊆α ++ 3 . . . 2 |λ0|−|α − 1 |+|α + 1 |−|α − 3 |+|α + 3 |−|α − 5 |...<label>(25)</label></formula><p>=</p><formula xml:id="formula_90">α0⊆λ0 α2⊆α ++ 0 α4⊆α ++ 2 . . . 2 |α + 0 |−|α − 2 |+|α + 2 |−|α − 4 |... .<label>(26)</label></formula><p>Proof. Note that the number of non trivial summations in <ref type="bibr">(25)</ref> and ( <ref type="formula" target="#formula_90">26</ref>) is always finite: there is a maximal level for any finite interval, above this level α ++ will be empty and the contribution in the power of 2 will be zero. Given the decomposition in Lemma 2, and a list of specific levels l 1 &lt; l 2 &lt; . . . &lt; l k where σ li ⊆ λ li are given such that</p><formula xml:id="formula_91">∀l i , l i+1 : σ −di li+1 ≤ σ li and ∀l i−1 , l i : σ li ≤ σ +di−1 li−1</formula><p>where d i = l i+1 − l i and α +/−d = (. . . ((α +/− ) +/− ) . . . ) +/− (d operators (.) +/− ), one can ask for the set of χ decomposing according to <ref type="bibr">(19)</ref> such that ∀i : χ li = σ li . This set has a lower bound</p><formula xml:id="formula_92">χ b = ρ 1 ∨ σ −l0 l0 ∨ σ −(l0−1) l0 . . . ∨ σ l0 ∨ σ −d0 l1 ∨ σ −(d0−1)<label>l1</label></formula><p>. . . and an upper bound χ t = ρ 1 ∨λ 0 ∨λ 1 . . .∨λ l0−1 ∨σ l0 ∨σ + l0 ∨σ +2 l0 . . .∨σ +(l1−l0−1) l0 ∨ σ l1 ∨ σ + l1 . . .. In fact, all elements in the interval [χ b , χ t ] satisfy this requirement. In the case of all odd, respectively all even, levels given, summing the sizes of all such intervals over all possible specifications σ 2l+1 , respectively σ 2l , results in the expansions of the Theorem. Example 6. As a simple application of Theorem 4, consider intervals of the form I N = [{∅}, N  2 ] where, for convenience, we use the notation N k to denote the set of subsets of size k of a set N = {1, 2, ..., n}. I N is seen to have only two nonempty levels. Indeed, λ 0 = {}, λ 1 is the set of all singletons of elements of N and</p><formula xml:id="formula_93">λ 2 = N 2 . Since λ 0 = {}, for each α 1 ⊆ λ 1 we have α − 1 = {}, while α + 1 = span(α1)<label>2</label></formula><p><ref type="foot" target="#foot_17">1</ref> . We find</p><formula xml:id="formula_94">|I N | = α1⊆λ1 2 |λ0|−|α − 1 |+|α + 1 | = S⊆N 2 ( |S| 2 ) = n i=0 n i 2 ( i 2 ) ,<label>(27)</label></formula><p>which is the well known formula for the number of labeled graphs with at most n nodes (Sloane series A006896 <ref type="bibr">[7]</ref>). This identity becomes obvious when we apply the alternative expression:</p><formula xml:id="formula_95">|I N | = α2⊆λ2 2 |λ1|−|α − 2 |<label>(28)</label></formula><p>= graphs g on n vertices</p><formula xml:id="formula_96">2 n−|vertices in g| = n i=0 |graphs covering {1, 2, ..., i}| n i 2 n−i . (<label>29</label></formula><formula xml:id="formula_97">)</formula><p>5 A Recursion Formula for the Size of the Complete Space</p><p>The previous sections were concerned with the structure of arbitrary intervals.</p><p>In this section, we present a formula for the size of AM F (n + k), k ≥ 0 summing over the space AM F (n). The formula is used to generate an efficient algorithm to compute the size of AM F (n + 2) from AM F (n). We start from the following observation, using the operator × defined as</p><formula xml:id="formula_98">2 ∀χ ∈ AM F (N ), S ⊂ N, S ∩ N = ∅ : χ × {S} = {X ∪ S|X ∈ χ}.<label>(30)</label></formula><p>Example 7. For χ = {{1}, {2, 3}, {3, 4}} and S = {5, 6, 7} we have according to this definition χ × {S} = {{1, 5, 6, 7}, {2, 3, 5, 6, 7}, {3, 4, 5, 6, 7}}.</p><p>We can now prove Lemma 3. Given n, k &gt; 0, N = {1, . . . , n} and K n = {n + 1, . . . , n + k}, for each χ ∈ AM F (N ∪ K) there exists exactly one sequence {χ</p><formula xml:id="formula_99">{S} |S ⊆ K n } of functions in AM F (N ) such that χ = S⊆Kn χ S × {S},<label>(31)</label></formula><formula xml:id="formula_100">∀S ⊆ K n : χ S ∈ AM F (N ), (32) ∀S, S ⊆ K n : S ⊆ S ⇒ χ S ≥ χ S .<label>(33)</label></formula><p>Proof. For each</p><formula xml:id="formula_101">S ⊆ K n define χ S = {X\K n |X ∈ χ, S ⊆ X} Corollary 4. For finite N, K ⊆ N, N ∩ K = ∅ as in Lemma 3, the size of AM F (N ∪K) is equal to the number of homomorphisms (2 K , ⊆) → (AM F (N ), ≥ ).</formula><p>Now consider the restricted homomorphisms (2 K \{∅, K}, ⊆) → (AM F (N ), ≥ ), i.e fix χ S for any S ∈ {∅, N }. Any such restricted homomorphism can be completed by components χ 0 ≥ k∈K χ {k} and χ N ≤ k∈K χ N \{k} . We define coefficients P N,K,ρ0,ρ N as follows Definition 4. For finite N, K ⊆ N, N ∩K = ∅, and for ρ 0 , ρ N ∈ AM F (N ), ρ 0 ≥ ρ N , P N,K,ρ0,ρ N is the number of homomorphisms f :</p><formula xml:id="formula_102">(2 K \{∅, K}, ⊆) → ([ρ N , ρ 0 ], ≥ ) such that k∈K f ({k}) = ρ 0 and k∈K f (N \{k}) = ρ N</formula><p>and we find</p><formula xml:id="formula_103">Theorem 5. For finite N, K ⊆ N, N ∩ K = ∅, |AM F (N ∪ K)| = ρ0≥ρ N ∈AM F (N ) |[∅, ρ N ]|P N,K,ρ0,ρ N |[ρ 0 , {N }]|. (<label>34</label></formula><formula xml:id="formula_104">)</formula><p>Proof. Any restricted homomorphism f can be extended by elements of the intervals [∅, ρ N ] and [ρ 0 , {N }], and any extension results in a different function in AM F (N ∪ K).</p><p>The P-coefficients are in general hard to compute. In the special case of |K| = 2 however, the following property leads to a simple algorithm.</p><p>Property 1. For finite N, K ⊆ N, N ∩ K = ∅, |K| = 2, we have</p><formula xml:id="formula_105">P N,K,ρ0,ρ N = 2 |C ρ N \ρ 0 ,ρ 0 \ρ N | .<label>(35)</label></formula><p>Proof. Let K = {k 1 , k 2 }. The coefficient is the number of solutions to the simultaneous equations</p><formula xml:id="formula_106">χ {k1} ∨ χ {k2} = ρ 0 ,<label>(36)</label></formula><formula xml:id="formula_107">χ {k1} ∧ χ {k2} = ρ N .<label>(37)</label></formula><p>Let A, B ⊆ ρ 0 \ρ N such that C ρ N (A, B), i.e. {A ∩ B} ≤ (ρ N \ρ 0 ). Then A and B must be in at least one of χ {k1} or χ {k2} due to (36) and in at most one due to (37). On the other hand, any set A in ρ 0 \ρ N must be in either χ {k1} or χ {k2} and can not be in both.</p><p>We thus obtain the formula</p><formula xml:id="formula_108">|AM F (n + 2)| = ρ0≥ρn∈AM F (n) |[∅, ρ n ]||[ρ 0 , {N }]|2 C ρn \ρ 0 ,ρ 0 \ρn .<label>(38)</label></formula><p>A Java implementation of Algorithm 2 , summing over non equivalent functions only for ρ N in AM F (6), allowed to compute AM F (8) in 40 hours on a Macbook Pro. Note that the order of summation can be chosen such as to minimize the number of evaluations of the interval sizes |[ρ 0 , {N }]|. Indeed, although the sizes of these intervals could be computed through the mapping Size of the representative of the class of the dual of ρ 0 , these transformations still are computationally intensive. In this paper, we analyzed intervals in the space of anti-monotonic functions. Some structural properties were derived which allowed decomposition. We used the properties of intervals to derive a formula allowing efficiently computing the size of any interval in spaces with values of n up to 7. Finally, we derived an expansion of the size of the (n+k)th space based on an enumeration of the space n. The terms in this expansion are products of sizes of intervals multiplied by coefficients which we termed 'P-coefficients of order k'. P-coefficients of order 2 turn out to be efficiently computable, and the resulting formula, combined with a reduction to nonequivalent anti-monotonic functions, allowed computing the 8th number of Dedekind on a very standard laptop in less than two days.</p><p>The results in sections 1 − 3 were obtained using the operators ∧ and ∨ only and are thus valid for any distributive lattice. The proofs of the results in sections 4, 5 explicitly relied on properties of sets. It is not hard to see that there are more general equivalents of these formulae. We plan to extend the analysis of intervals and derive the more general equivalents in a forthcoming paper.</p><p>The success in computing |AM F (8)| on a basic laptop naturally leads to the question how far a more sophisticated hardware could take us towards computing |AM F (9)|. We are presently undertaking such an attempt, but new idea's will be needed to succeed. Computing |AM F (9)| using P-coefficients of order 2 according to Algorithm 2 involves enumerating AM F (7) × nonequivalent AM F <ref type="bibr">(7)</ref> which is exactly 2414682040998 × 490013148 = 1183225948328495041704 terms. Each term would require computing a second order P-coefficient and multiplying two interval sizes of intervals in AM F <ref type="bibr">(7)</ref>. There would be 490013148 such interval sizes to compute.</p><p>More promising is the study of the P-coefficients of higher order. Algorithm 2 for n = 6 equipped with a fast evaluator for order 3 P-coefficients could produce |AM F (9)|. Study of these higher order P-coefficients hence is on our research agenda.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Attribute exploration <ref type="bibr">[1]</ref> allows the interactive determination of the implications holding between the attributes of a given context. However, there are situations when the object set of a context is too large (possibly infinite) or difficult to enumerate. With the examples (possibly none) of our knowledge we build the object set of the context step-by-step. The stem base of this context, that is a minimal set of non-redundant implications from which all the implications of the context follow, is built stepwise and we are asked whether the implications of the base are true. If an implication holds, then it is added to the stem base. If however, an implication does not hold, then we have to provide a counterexample. While performing an attribute exploration we have to be able to distinguish between true and false implications and to provide correct counterexamples for false implications. This is a crucial point since the algorithm is naive and will believe whatever we tell it. Once a decision was taken about the validity of an implication, the choice cannot be reversed. Therefore, the counterexamples may not contradict the so-far confirmed implications. The procedure ends when all implications of the current stem base hold in general. This way we obtain an object set which is representative for the entire theory, that may also be infinite.</p><p>The exploration process can be shortened by taking some background knowledge <ref type="bibr">[2]</ref> into account that the user has at the beginning of the exploration.</p><p>As many data sets contain fuzzy data, it is a natural wish to generalise attribute exploration to the fuzzy setting. In <ref type="bibr">[3]</ref> we have already shown how this can be done. It turned out that we have to make some restrictions on the implications (using the globalisation as the hedge) in order to be able to perform a successful attribute exploration. In this paper we generalise the fuzzy attribute exploration to the case with background knowledge. The main work starts in Section 3 where we show how non-redundant bases can be obtained while using background knowledge. The theory for the exploration is developed in Section 4 including an appropriate algorithm. In Section 5 we use a real-world data set to illustrative both exploration with and without background knowledge.</p><p>It should be mentioned that there is some overlap with results presented in the authors PhD thesis <ref type="bibr">[4]</ref>, see Chapter 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Crisp Attribute Exploration</head><p>We assume basic familiarities with Formal Concept Analysis <ref type="bibr">[1]</ref>.</p><p>In the introductory section we have already explained the principle of attribute exploration. However, we have not yet presented its key to success. This is, why we do not have to reconsider already confirmed implications after adding new objects to the context. Proposition 1. ( <ref type="bibr">[1]</ref>) Let K be a context and P 1 , P 2 , . . . , P n be the first n pseudointents of K with respect to the lectic order. If K is extended by an object g the object intent g ↑ of which respects the implications P i → P ↓↑ i , i ∈ {1, . . . , n}, then P 1 , P 2 , . . . , P n are also the lectically first n pseudo-intents of the extended context.</p><p>Attribute exploration was successfully applied in both theoretical and practical research domains. On the one hand it facilitated the discovery of implications between properties of mathematical structures, see for example <ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref>. On the other hand it was also used in real-life scenarios, for instance in chemistry <ref type="bibr">[8]</ref>, information systems <ref type="bibr">[9]</ref>, etc.</p><p>In case the user knows some implications between the attributes in advance, attribute exploration with background knowledge <ref type="bibr">[10,</ref><ref type="bibr">2]</ref> can be applied. Using background knowledge in the exploration will considerably reduce the time of the process as the user has to answer less questions and provide less counterexamples.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Formal Fuzzy Concept Analysis</head><p>Due to lack of space we omit the introduction of some basic notions from fuzzy logic, fuzzy sets and Fuzzy Formal Concept Analysis. We assume that the reader is familiar with these notions and refer to standard literature. For fuzzy theory we refer to <ref type="bibr">[11,</ref><ref type="bibr">12]</ref>, in particular, notions like residuated lattices with hedges and L-sets can be found for instance in <ref type="bibr">[13]</ref>. For Fuzzy Formal Concept Analysis see <ref type="bibr">[14,</ref><ref type="bibr">15]</ref> but also <ref type="bibr">[16,</ref><ref type="bibr">17]</ref>. The theory about Fuzzy Formal Concept Analysis with hedges can be found in <ref type="bibr">[13]</ref>. In this section we only present some notions concerning lectic order, attribute implications and the computation of their nonredundant bases.</p><p>We start with the fuzzy lectic order <ref type="bibr">[18]</ref> which is defined as follows: Let L = {l 0 &lt; l 1 &lt; • • • &lt; l n = 1} be the support set of some linearly ordered residuated lattice and M = {1, 2, . . . , m} the attribute set of an L-context (G, M, I). For (x, i), (y, j) ∈ M × L, we write (x, l i ) ≤ (y, l j ) :⇐⇒ (x &lt; y) or (x = y and l i ≥ l j ).</p><p>We define</p><formula xml:id="formula_109">B ⊕ (x, i) := ((B ∩ {1, 2, . . . , x − 1}) ∪ { li /x}) ↓↑ for B ∈ L M and (x, i) ∈ M × L. Furthermore, for B, C ∈ L M , we define B &lt; (x,i) C by B ∩ {1, . . . , x − 1} = C ∩ {1, . . . , x − 1} and B(x) &lt; C(x) = l i .<label>(1)</label></formula><p>We say that B is lectically smaller than C, written B &lt; C, if B &lt; (x,i) C for some (x, i) satisfying <ref type="bibr">(1)</ref>. As in the crisp case, we have that B + := B ⊕ (x, i) is the least intent which is greater than a given B with respect to &lt; and (x, i) is the greatest with B &lt; (x,i) B ⊕ (x, i) (for details we refer to <ref type="bibr">[18]</ref>).</p><p>Fuzzy Implications and Non-redundant Bases. Fuzzy attribute implications were studied in a series of papers by Bělohlávek and Vychodil <ref type="bibr">[19,</ref><ref type="bibr">20]</ref>. We denote by S(A, B) the truth value of "the L-set A is a subset of the L-set B". Futher, (−) * denotes the hedge of a residuated lattice L, i.e., (−) * : L → L is a map satisfying a * ≤ a, (a → b) * ≤ a * → b * , a * * = a * and 1 * = 1 for every a, b ∈ L. Typical examples for the hedge are the identity, i.e., a * := a for all a ∈ L, and the globalisation, i.e., a * := 0 for all a ∈ L \ {1} and a * := 1 if and only if a = 1.</p><p>A fuzzy attribute implication (over the attribute set M ) is an expression A ⇒ B, where A, B ∈ L M . The verbal meaning of A ⇒ B is: "if it is (very) true that an object has all attributes from A, then it also has all attributes from B". The notions "being very true", "to have an attribute", and the logical connective "if-then" are determined by the chosen L. For an L-set N ∈ L M of attributes, the degree</p><formula xml:id="formula_110">||A ⇒ B|| N ∈ L to which A ⇒ B is valid in N is defined as ||A ⇒ B|| N := S(A, N ) * → S(B, N ).</formula><p>If N is the L-set of all attributes of an object g, then ||A ⇒ B|| N is the truth degree to which A ⇒ B holds for g. For N ⊆ L M , the degree Due to the large number of implications in a formal context, one is interested in the stem base of the implications. Neither the existence nor the uniqueness of the stem base for a given L-context are guaranteed in general <ref type="bibr">[20]</ref>.</p><formula xml:id="formula_111">||A ⇒ B|| N ∈ L to which A ⇒ B holds in N is defined by ||A ⇒ B|| N := N ∈N ||A ⇒ B|| N . For an L-context (G, M, I), let I g ∈ L M (g ∈ G) be</formula><p>Let T be a set of fuzzy attribute implications. An L-set of attributes</p><formula xml:id="formula_112">N ∈ L M is called a model of T if ||A ⇒ B|| N = 1 for each A ⇒ B ∈ T . The set of all models of T is denoted by Mod(T ) := {N ∈ L M | N is a model of T }. The degree ||A ⇒ B|| T ∈ L to which A ⇒ B semantically follows from T is defined by ||A ⇒ B|| T := ||A ⇒ B|| Mod(T ) . T is called complete in (G, M, I) if ||A ⇒ B|| T = ||A ⇒ B|| (G,M,I) for each A ⇒ B. If T is complete and no proper subset of T is complete, then T is called a non-redundant basis. Theorem 1. ([20]) T is complete iff Mod(T ) = Int(G * , M, I).</formula><p>As in the crisp case the stem base of a given L-context can be obtained through the pseudo-intents. P ⊆ L M is called a system of pseudo-intents if for each P ∈ L M we have: P ∈ P ⇐⇒ (P = P ↓↑ and ||Q ⇒ Q ↓↑ || P = 1 for each Q ∈ P with Q = P ).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem 2. ([20]</head><p>) T := {P ⇒ P ↓↑ | P ∈ P} is complete and non-redundant. If (−) * is the globalisation, then T is unique and minimal.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Adding background knowledge to the stem base</head><p>The user may know some implications between attributes in advance. We will call such kind of implications background implications. In this section we will focus on finding a minimal list of implications, which together with the background implications will describe the structure of the concept lattice.</p><p>The theory about background knowledge for the crisp case was developed in <ref type="bibr">[2]</ref> and a more general form of it in <ref type="bibr">[10]</ref>. The results from <ref type="bibr">[2]</ref> for implication bases with background knowledge follow by some slight modifications of the results about implication bases without background knowledge presented in <ref type="bibr">[1]</ref>. The same applies for the fuzzy variant of this method. Hence, if we choose the empty set as the background knowledge, we obtain the results from <ref type="bibr">[19,</ref><ref type="bibr">20]</ref>.</p><p>We start by investigating the stem bases of L-contexts relative to a set of background implications. Afterwards we show how some notions and results for fuzzy implications and their stem bases change for our new setting.</p><p>The attribute sets of L-contexts and the residuated lattices L will be considered finite. Further, L is assumed to be linearly ordered. Definition 1. Let K be a finite L-context and let L be a set of background attribute implications. A set B of fuzzy attribute implications of K is called Lcomplete if every implication of K is entailed by L ∪ B. We call B, L-nonredundant if no implication A ⇒ B from B is entailed by (B \ {A ⇒ B}) ∪ L. If B is both L-complete and L-non-redundant, it is called an L-base.</p><p>Note that if we have L = ∅ in the above definition, then all L-notions are actually the notions introduced for sets of fuzzy implications. This remark holds also for the other notions introduced in this section.</p><p>For any set L of background attribute implications and any attribute L-set X ∈ L M we define an L-set X L ∈ L M and an L-set X Ln ∈ L M for each non-negative integer n by</p><formula xml:id="formula_113">X L := X ∪ {B ⊗ S(A, X) * | A ⇒ B ∈ L}, X Ln := X, n = 0, (X Ln−1 ) L , n ≥ 1.</formula><p>An operator L on these sets is defined by</p><formula xml:id="formula_114">L(X) := ∞ n=0 X Ln .<label>(3)</label></formula><p>From <ref type="bibr">[20]</ref> we know that L(−) is an L * -closure operator for a finite set M of attributes and a finite residuated lattice L.</p><p>Definition 2. For an L-context (G, M, I), a subset P ⊆ L M is called a system of L-pseudo-intents of (G, M, I) if for each P ∈ L M the following holds P ∈ P ⇐⇒ (P = L(P ) = P ↓↑ and ||Q ⇒ Q ↓↑ || P = 1 for each Q ∈ P : Q = P ).</p><p>As in the case without background knowledge, the usage of the globalisation simplifies the definition of the system of L-pseudo-intents. We have that P ⊆ L M is a system of pseudo-intents if P ∈ P ⇐⇒ (P = L(P ) = P ↓↑ and Q ↓↑ ⊆ P for each Q ∈ P with Q P ).</p><p>Theorem 3. The set B L := {P ⇒ P ↓↑ | P is an L-pseudo-intent} is an L-base of K. We call it the L-Duquenne-Guigues-base or the L-stem base.</p><p>Proof. First note that all implications from B L are implications of (G, M, I). We start by showing that B L is complete, i. </p><formula xml:id="formula_115">||N ⇒ N ↓↑ || N = S(N, N ) * → S(N ↓↑ , N ) = 1 * → S(N ↓↑ , N ) = S(N ↓↑ , N ) = 1,</formula><p>which is a contradiction because N does not respect this implication.</p><p>To finish the proof, we still have to show that B L is L-non-redundant. To this end let P ⇒ P ↓↑ ∈ B L . We show that this implication is not entailed by L := (B L \ {P ⇒ P ↓↑ }) ∪ L. As P = L(P ), it is obviously a model of L. We have ||Q ⇒ Q|| P = 1 for every L-pseudo-intent Q ∈ P different from P since P is an L-pseudo-intent. Therefore, P ∈ Mod(L). We also have that ||P ⇒ P ↓↑ || P = S(P ↓↑ , P ) = 1 and thus P is not a model of B L ∪ L. Hence, we have</p><formula xml:id="formula_116">||P ⇒ P ↓↑ || (G,M,I) = ||P ⇒ P ↓↑ || B L ∪L = ||P ⇒ P ↓↑ || L , showing that L is not complete and thus B L ∪ L is non-redundant.</formula><p>In general we write P ⇒ P ↓↑ \ {m ∈ M | P (m) = P ↓↑ (m)} instead of P ⇒ P ↓↑ .</p><p>Note that computing the stem-base and closing the implications from it with respect to the operator L(−) will yield a different set of implications than the L-stem-base. Let us take a look at the following example.</p><p>Example 1. Consider the L-context given in Figure <ref type="figure" target="#fig_0">1</ref>. In order to ensure that its stem-base and L-stem-base exist, we use the globalisation. Further, we use the Gödel logic. The stem-base is displayed in the left column of  of the stem-base with respect to the operator L(−), we obtain implications of the form L(P ) ⇒ P ↓↑ , which are displayed in the right column of the figure. As one easily sees, the latter set of implications and the L-stem-base are different.</p><p>The set {L(P ) ⇒ P ↓↑ | P is a pseudo-intent with L(P ) = P ↓↑ } contains an additional implication, namely {a, b, c} ⇒ d.</p><p>For developing our theory about fuzzy attribute exploration with background knowledge, the following results are useful. First, the set of all intents and all L-pseudo-intents is an L * -closure system, as stated below. Due to lack of space we omit the proofs of the following two lemmas. Lemma 2. Let (G, M, I) be an L-context, let L be a set of fuzzy implications of (G, M, I). Further, let P and Q be intents or L-pseudo-intents such that S(P, Q) * ≤ S(P ↓↑ , P ∩ Q) and S(Q, P ) * ≤ S(Q ↓↑ , P ∩ Q).</p><p>Then, P ∩ Q is an intent.</p><p>Note that if we choose the globalisation for (−) * , then P ∩ Q is an intent provided that P and Q are (L-pseudo-)intents with P Q and Q P . Now we are interested in the closure of an L-set with respect to the implications of the L-base B L . Therefore, we first define for each L-set X ∈ L M and each non-negative integer n the L-sets X L • , X L • n ∈ L M as follows:</p><formula xml:id="formula_117">X L • := X ∪ {B ⊗ S(A, X) * | A ⇒ B ∈ B L , A = X}, X L • n := X, n = 0, (X L • n−1 ) L • , n ≥ 1.</formula><p>Further, we define an operator L • (−) on these sets by</p><formula xml:id="formula_118">L • (X) := ∞ n=0 X L • n .<label>(4)</label></formula><p>Lemma 3. If (−) * is the globalisation, then L • given by (4) is an L * -closure operator and {L • (X) | X ∈ L M } coincides with the set of all L-pseudo-intens and intents of (G, M, I).</p><p>Remark 1. Note that for a general hedge, L • (−) does not need be an L * -closure operator. For instance, choose the Goguen structure and the identity for the hedge (−) * . Further, let L := { 0.3 /y ⇒ y}. Then,</p><formula xml:id="formula_119">L • ({ 0.2 /y})(y) ≥ ({ 0.2 /y}) L • (y) = { 0.2 /y} ∪ {y ⊗ (0.3 → 0.2)} = { 0.2 /y} ∪ { 0.</formula><p>(66) /y} = { 0.(66) /y}, and L • ({ 0.3 /y})(y) = { 0.3 /y}. Hence, L • (−) does not satisfy the monotony property, because we have</p><formula xml:id="formula_120">{ 0.2 /y} ⊆ { 0.3 /y} but L • ({ 0.2 /y}) L • ({ 0.3 /y}).</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Attribute exploration with background knowledge</head><p>Particularly appealing is the usage of background knowledge in the exploration process. This proves itself to be very useful and time saving for the user. He/she will have to answer less questions, as the algorithm does not start from scratch. Due to Remark 1 and the fact that we are only able to perform a successful attribute exploration if the chosen hedge is the globalisation, we will consider only this hedge in this section. In order to arrive at the exploration with background knowledge we will present the lectic order, the "key proposition" and an appropriate algorithm for attribute exploration in this setting.</p><p>The lectic order is defined analogously as in Section 2, see <ref type="bibr">(1)</ref>. The only difference lies in the definition of "⊕". This time we are using the L * -closure operator (−) L • instead of (−) ↓↑ . Theorem 4. The lectically first intent or L-pseudo-intent is ∅ L • . For a given L-set A ∈ L M , the lectically next intent or L-pseudo-intent is given by the L-set A⊕(m, l), where (m, l) ∈ M ×L is the greatest tuple such that A &lt; (m,l) A⊕(m, l). The lectically last intent or L-pseudo-intent is M . Now we are prepared to present the main proposition regarding attribute exploration with background knowledge in a fuzzy setting.</p><p>Proposition 2. Let L be a finite, linearly ordered residuated lattice with globalisation. Further, let P be the unique system of L-pseudo-intents of a finite L-context K with P 1 , . . . , P n ∈ P being the first n L-pseudo-intents in P with respect to the lectic order. If K is extended by an object g, the object intent g ↑ of which respects the implications from L ∪ {P i ⇒ P ↓↑ i | i ∈ {1, . . . , n}}, then P 1 , . . . , P n remain the lectically first n L-pseudo-intents of the extended context.</p><p>Proof. Let K = (H, M, J) be the initial context and let (G, M, I) be the extended context, namely G = H ∪ {g} and J = I ∩ (H × M ). To put it briefly, since g I is a model of P i ⇒ P JJ i for all i ∈ {1, . . . , n} we have that P JJ i = P II i . By the definition of L-pseudo-intents and the fact that every L-pseudo-intent Q of (H, M, J) with Q ⊂ P i is lectically smaller than P i , we have that P 1 , . . . , P n are the lectically first n L-pseudo-intents of (G, M, I).</p><p>We now have the key to a successful attribute exploration with background knowledge in the fuzzy setting, at least when we use the globalisation. With this result we are able to generalise the attribute exploration algorithm as presented by Algorithm 1. Its input is the L-context K, the residuated lattice L and the set of background implications L. The first intent or L-pseudo-intent is the empty set. If it is an intent, add it to the set of intents of the context. Otherwise, ask the expert whether the implication is true in general. If so, add this implication to the L-stem base, otherwise ask for a counterexample and add it to the context (line 2 − 11). Until A is different from M , repeat the following steps: Search for the largest attribute i in M with its largest value l such that A(i) &lt; l. For this attribute compute its closure with respect to the L • (−)-closure operator given by (4) and check whether the result is the lectically next intent or L-pseudointent (line 12 − 16). Thereby, A i := A ∩ {1, . . . , i − 1}. In lines 17 − 25 we repeat the same procedure as in lines 2 − 11.</p><p>The algorithm generates interactively the L-stem base of the L-context. We enumerate the intents and pseudo-intents in the lectic order. Due to Proposition 2 we are allowed to extend the context by objects whose object intents respect the already confirmed implications. This way, the L-pseudo-intents already contained in the stem base do not change. Hence, the algorithm is sound and correct.</p><p>Algorithm 1: FuzzyExploration(K, L, L) </p><formula xml:id="formula_121">1 L := ∅; A := ∅; 2 if A = A ↓↑ then 3 add A to</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Illustrative example</head><p>For our illustrative example we will consider the data from Figure <ref type="figure" target="#fig_1">2</ref>. The objects are different universities from Germany and the attributes are indicators rating these institutions. Study situation overall: M.Sc. students were asked about their overall rating of their studies. IT-infrastructure: the availability of subject-specific software, PC pools and wifi were taken into account. Courses offered: amount of courses and the interdisciplinary references were relevant. Possibility of studying: timing of the courses and content of the curriculum were decisive. Passage to M.Sc.: clearly formulated admission requirements and assistance of the students with the organisational issues were relevant.</p><p>Suppose we want to explore the implications between the attributes from the L-context from Figure <ref type="figure" target="#fig_1">2</ref>. We also know some examples, namely the TUs. These will be the objects of the L-context we start with. Further, we heard from others that the implications {a, b} ⇒ c, d ⇒ { 0.5 /a, e}, {a, e} ⇒ {c, d} and a ⇒ { 0.5 /b, 0.5 /c, 0.5 /e} hold. These will be considered the set of background implications L. The exploration process is displayed in the left column of Figure <ref type="figure" target="#fig_7">3</ref>. The first L-pseudo-intent is ∅ and we ask the expert whether ∅ ⇒ ∅ ↓↑ holds. This is not the case and a counterexample is Uni Bochum. For implications that hold, for instance in step no. 3, the expert answers just "yes" and the implication is added to the L-base. Afterwards, the validity of the implication induced by the next L-pseudo-intent is asked, and so on. The algorithm continues until we reach M as an intent or L-pseudo-intent. In our case, however, the algorithm stops at step no. 10. This is due to the fact that the implications induced by the L-pseudo-intents after {b, 0.5 /d} are confirmed by the implications from the background knowledge. The result of the exploration is an extended context, namely Fig. <ref type="figure" target="#fig_1">2</ref>. The data is an extract from the data published in the journal Zeit Campus in January 2013. The whole data can be found under https://bit.ly/ZCinsr-informatik.</p><p>that contains our initial examples and the counterexamples we (or the expert) has entered. We also obtain an L-base consisting of the background implications L and the implications we have confirmed during the exploration process.</p><p>In the right column of Figure <ref type="figure" target="#fig_7">3</ref> the exploration without background knowledge is displayed. One immediately sees that there are 4 additional steps. The first difference between the explorations appears in step no. 8. Without using background knowledge we have to answer the implication from the right column, while this implication is already confirmed if we use background knowledge. The exploration without background knowledge yields the same extended context whereas the stem base contains the implications we have confirmed during the process.</p><p>no. expl. w. background know.</p><p>simple expl.</p><p>1 Q: {} ⇒ { 0.5 /a, 0.5 /c, 0.5 /d} Q: {} ⇒ { 0.5 /a, 0.5 /c, 0.5 /d} E: no, ex. Uni Bochum E: no, ex. Uni Bochum 2 Q: {} ⇒ { 0.5 /c, 0.5 /d} Q: {} ⇒ { 0.5 /c, 0.5 /d} E: no, ex. Uni Duisburg E: no, ex. Uni Duisburg 3 Q: {} ⇒ 0.5 /d Q: {} ⇒ 0.5 /d E: yes E: yes 4 Q: { 0.5 /d, 0.5 /e} ⇒ 0.5 /b Q: { 0.5 /d, 0.5 /e} ⇒ 0.5 /b E: no, ex. Uni Bielefeld E: no, ex. Uni Bielefeld 5 Q: { 0.5 /b, 0.5 /d} ⇒ 0.5 /e Q: { 0.5 /b, 0.5 /d} ⇒ 0.5 /e E: no, ex. Uni Erlangen E: no, ex. Uni Erlangen 6 Q: { 0.5 /d, e} ⇒ 0.5 /c Q: { 0.5 /d, e} ⇒ 0.5 /c E: yes E: yes 7 Q: { 0.5 /a, 0.5 /b, 0.5 /c, 0.5 /d, e} ⇒ b Q: { 0.5 /a, 0.5 /b, 0.5 /c, 0.5 /d, e} ⇒ b E: no, ex. Uni Saarbrücken E: no, ex. Uni Saarbrücken 8 Q: { 0.5 /a, 0.5 /b, 0.5 /c, d, e} ⇒ {a, c} Q: d ⇒ { 0.5 /a, 0.5 /c, e} E: no, ex. Uni Heidelberg E: yes 9 Q: {c, 0.5 /d} ⇒ {a, 0.5 /b, d, 0.5 /e} Q: { 0.5 /a, 0.5 /b, 0.5 /c, d, e} ⇒ {a, c} E: yes E: no, ex. Uni Heidelberg 10 Q: {b, 0.5 /d} ⇒ { 0.5 /a, 0.5 /c} Q: {c, 0.5 /d} ⇒ {a, 0.5 /b, d, 0.5 /e} E: yes E: yes exploration stopped. 11 Q: {b, 0.5 /d} ⇒ { 0.5 /a, 0.5 /c, 0.5 /e} E: yes 12 Q: {a, 0.5 /d} ⇒ { 0.5 /b, 0.5 /c, 0.5 /e} E: yes 13 Q: {a, 0.5 /b, 0.5 /c, 0.5 /d, e} ⇒ {c, d} E: yes 14 Q: {a, b 0.5 /c, 0.5 /d, 0.5 /e} ⇒ {c, d, e} E: yes exploration stopped.</p><p>Fig. <ref type="figure" target="#fig_7">3</ref>. Exploration with and without background knowledge.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>A Galois lattice, or concept lattice, is a graph providing a representation of all the possible associations between a set of objects, or observations, and their describing attributes. Lattices can be queried, browsed and therefore provide a smart way to represent and retrieve information through a description context. Although they have been introduced a long time ago <ref type="bibr">[1]</ref>, they were hardly considered helpful for information retrieval before the end of the twentieth century and the work of <ref type="bibr">[9,</ref><ref type="bibr">3,</ref><ref type="bibr">18]</ref> due to an exponential computational time issue. Even today, using concept lattices to handle a large set of objects described by an even wider set of attributes can be challenging. Indeed, it is still not trivial to use lattice's properties in a big development project, mainly because of the lack of available software frameworks. Being in need of such a tool to browse and query a dataset on comic books, described by an ontology <ref type="bibr">[10]</ref>, we propose an efficient Java implementation for the calculation of the immediate successors of a concept (i.e. to get the closest refined concepts according to the description of the starting point). This paper is organized as follows. After introducing our motivations in part 2, the third section reminds how are calculated the immediate successors in the state of the art. The next section details the implemented algorithm and how it has been done in order to be as effective as possible. Section 5 shows some experimentations related to the classical immediate successors algorithm. Finally the last section concludes this paper and brings up some perspectives on our ongoing work.</p><p>We are developing a multi-faceted solution to automatically analyze comic books in a) an image processing point of view <ref type="bibr">[19]</ref>, b) a semantic point of view <ref type="bibr">[10]</ref>. One key point is the possibility for a user to retrieve comic books panels, the rectangular frames in which the pictures are drawn, similar to an input query, based on the semantic description of each panel from the dataset <ref type="bibr">[11]</ref>. Two panels may share the same kind of content, such as speech balloons, spoken words, objects, characters or even some localized pixel's visual features (e.g colors, textures, shapes, etc.). They can be of the same shape, at the same location in the page or in the narration, drawn by the same person or come from the same volume (Table <ref type="table" target="#tab_0">1</ref> and Fig. <ref type="figure" target="#fig_0">1</ref> show an example of what could be such shared properties). Possibilities are only limited by the ability of our system to recognize and deduce information. All these heterogeneous pieces of description have to be expressed in a way that can be interrogated and browsed efficiently.   <ref type="table" target="#tab_0">1</ref>. Credit <ref type="bibr">[5]</ref> One way to browse data is to guide the user by a relevance feedback mechanism as it can classically be seen in content based image retrieval (CBIR) <ref type="bibr">[20]</ref> and machine learning <ref type="bibr">[21]</ref>. To an input query, which can be a panel or a set of features, follows a loop of interactions between the computer and the final user that will guide him, hopefully sooner than later, to his answer. At each step, the system returns a set of result panels that share the same attributes, weighted by the estimated relevance of these attributes to the query. The user is then invited to label the panels based on what he considers to be important in his query. The relevant (resp. irrelevant) features are identified with the right (resp. wrong) labeled results, their weight is dynamically adjusted, so the query can be refined to produce a more accurate output. The interaction loop between the user and the system goes on and on until the user is satisfied.</p><p>The structure of concept lattices seems to fit particularly well to the task as each concept is made of a set of panels described by a shared set of attributes. The output can be composed of panels from several distinct concepts, chosen for the weight of their attributes. The user is then guided through the lattice structure by his choices without being aware of the underlying mechanism.</p><p>As we were working with the Java language, we started looking for a way to handle lattices that could easily be integrated to the main solution. The set of observations is meant to be quite large as it does not become very interesting to retrieve data until the volume gets critical. Because of the extreme heterogeneity of comic books' panels, the growth of the observation set (the pictures) automatically implies the growth of the attribute set (the description of those pictures). Therefore, the implementation has to be efficient when dealing with large sets of both attributes and observations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">State of the art</head><p>More formally, a concept lattice is defined from a binary table, also denoted a formal context, (O, I, (α, β)) where O is the set of objects, I the set of attributes, α(A) the set of attributes shared by a subset A of objects, and β(B) the set of objects sharing a subset B of attributes. Each node of a concept lattice is denoted a concept (A, B), i.e. a maximal objects-attributes correspondence, verifying α(A) = B and β(B) = A. A is called the extent of the concept, and B its intent. Two formal concepts (A 1 , B 1 ) and (A 2 , B 2 ) are in relation in the lattice when they verify the following extension-generalization property:</p><formula xml:id="formula_122">(A 1 , B 1 ) ≤ (A 2 , B 2 ) ⇔ A 1 ⊆ A 2 (equivalent to B 1 ⊇ B 2 )</formula><p>The whole set of formal concepts fitted out by the order relation ≤ is called a concept lattice or a Galois lattice because it verifies the lattice properties, and the cover relation ≺ corresponds to the Hasse diagram of the lattice. The concepts ⊥ = (O, α(O)) and = (β(I), I) respectively correspond to the bottom and the top of the concept lattice. See the book of Ganter and Wille <ref type="bibr">[8]</ref> for a more complete description of formal concept lattices.</p><p>Numerous generation algorithms have been proposed in the literature <ref type="bibr">[16,</ref><ref type="bibr">7,</ref><ref type="bibr">2,</ref><ref type="bibr">17]</ref>. All of these proposed algorithms have a polynomial complexity with respect to the number of concepts (at best quadratic in <ref type="bibr">[17]</ref>). The complexity is therefore determined by the size of the lattice (i.e. the number of concepts in the lattice), this size being exactly bounded by 2 |O+I| in the worst case (when the table context is a diagonal matrix of zeros) and by |O+I| in the best case (diagonal matrix of ones). A formal and experimental comparative study of the different algorithms has been published in <ref type="bibr">[13]</ref>. Although all these algorithms generate the same lattice, they propose different strategies. Ganter's NextClosure <ref type="bibr">[7]</ref> is the reference algorithm that determines the concepts in lectical order (next, the concepts may be ordered by ≤ or ≺ to form the concept lattice) while Bordat's algorithm <ref type="bibr">[2]</ref> is the first algorithm that computes directly the Hasse diagram of the lattice, by computing immediate successors for each concept, starting from the bottom concept, until all concepts are generated. Immediate successor calculation is appropriate for an on-demand generation inside the structure, useful for a navigation without generating the whole set of concepts.</p><p>Bordat's algorithm, independently rediscovered by <ref type="bibr">[14]</ref>, is issued from a corollary of Bordat's theorem <ref type="bibr">[2]</ref> stating that (A , B ) is an immediate successor of a concept (A, B) if and only if A is inclusion-maximal in the following set system F A defined on the objects set O by:</p><formula xml:id="formula_123">F A = {β(x) ∩ A : x ∈ I\B}<label>(1)</label></formula><p>Immediate successors algorithm first generates the set system F A in a linear time ; then inclusion-maximal subsets of F A can easily be computed in O(|O| 3 ), using an inclusion graph for example. Notice that the inclusion-maximal subsets problem is known to be resolved in O(|O| 2,5 ) using sophisticated data structures ( <ref type="bibr">[15,</ref><ref type="bibr">12]</ref>).</p><p>It is possible to consider the restriction of a concept lattice to the attributes set. Indeed, a nice result establishes that any concept lattice is isomorphic to the closure lattice defined on the set I of attributes, where each concept is restricted to its attributes part. The closure lattice is composed of all closures -i.e. fixed points -for the closure operator ϕ = α • β. Using the closure lattice instead of the whole concept lattice gives rise to a storage improvement, for example in case of large amount of objects. See the survey of Caspard and Monjardet <ref type="bibr">[4]</ref> for more details about closure lattices.</p><p>Closure lattices can be generated by an extension of Bordat's algorithm (see Alg. 1) issued from a reformulation of Bordat's Theorem. Indeed, each immediate successor B of a closure B is obtained by</p><formula xml:id="formula_124">B = α(A ) with A ∈ F A . Since A = β(x) ∩ A = β(x) ∩ β(B) = β(x + B), thus B = α(A ) = α(β(x + B)) = ϕ(x + B).</formula><p>Therefore, immediate successors of a closure B are inclusion-minimal subsets in a set system F B defined on the attributes set I by:</p><formula xml:id="formula_125">F B = {ϕ(x + B) : x ∈ I\B}<label>(2)</label></formula><p>The Limited Object Access algorithm (see Algorithm  <ref type="bibr">[6]</ref> for a complete description. The key idea behind this algorithm is to improve its efficiency by counting the objects, inspired from relational databases. Instead of considering the subset of observations as the extent of a subset of attributes, the computation of the inclusion-maximal subsets on F A is made considering only its cardinality, and an incremental strategy. Four cases have to be considered to test, for each attribute x of I\B and each already inserted potential successor X ⊆ I\B, the inclusion between ϕ(B + X) and ϕ(B + x):</p><formula xml:id="formula_126">1. Merge x with X when ϕ(B + x) = ϕ(B + X). 2. Eliminate x as potential successor of B when ϕ(B + x) ⊃ ϕ(B + X)</formula><p>3. Eliminate X as potential successor of B when ϕ(B + x) ⊂ ϕ(B + X) 4. Insert x as potential successor of B when x is neither eliminated or merged with X.</p><p>The inclusion test between ϕ(B + X) and ϕ(B + x) can easily be performed using the count function c and the following proposition from <ref type="bibr">[6]</ref>.</p><formula xml:id="formula_127">Proposition 1 ([6]): ϕ(B + X) ⊆ ϕ(B + x) ⇐⇒ c(B + X + x) = c(B + X)<label>(3)</label></formula><p>The count function c associates to any subset X of attributes the cardinality of the subset β(X):</p><formula xml:id="formula_128">c(X) = |β(X)| (4) ϕ(B) = B + {x ∈ I\B : c(B) = c(B + x)}<label>(5)</label></formula><p>The count function corresponds to the notion of support introduced in association rule-mining, and is in particular used by Titanic algorithm <ref type="bibr">[22]</ref>.</p><p>It has been proven to be effective on a large amount of objects with a complex-  The ability of the algorithm to handle huge sets of data is very interesting. The impact of the number of observations on the performances can be limited, depending on the implementation of c, using for example multiple keys and robust algorithms used in databases that do not need to load all data for computing a cardinality <ref type="bibr">[6]</ref>.</p><formula xml:id="formula_129">ity of O((|I| − |B|) 2 * O(c(B + X))).</formula><formula xml:id="formula_130">if c(B + x) = c(B + X) then if c(B + X + x) = c(B + x) then replace X by X + x in SuccB; add=false; break; end end \\ Case 2: Eliminate x as potential successor if c(B + x) &lt; c(B + X) then if c(B + X + x) = c(B + x) then add=false; break; end end \\ Case 3: Eliminate X as potential successor if c(B + x) &gt; c(B + X) then if c(B + X + x) = c(B + X) then delete X from</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Implementation</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Data structures</head><p>We choose to implement the Limited Object Access algorithm in Java. The performance of the Limited Object Access presented in <ref type="bibr">[6]</ref> comes from a PHP/MySQL implementation, backed up by the efficient SQL indexation system. Its behavior without the help of SQL remains to be seen.</p><p>While profiling the execution of a naive implementation, conducted without paying attention to optimization, we noticed that up to 86% of the computation time was used for the calculation of the candidate sets of attributes' extent. The extent of a set of attributes is the intersection of the extents of each of its elements. It appears that the most time consuming step of the extent calculation (up to 87% of the running time) is the intersection of two sets of elements. While it only takes around 50 microseconds to perform, the calls pile grows fast with the size of the dataset, resulting in a delivery time of full seconds, even minutes. A particular attention must be paid to the optimization of the extent calculation, both in terms of calls amount and processing time.</p><p>The number of calls is limited to three for a foreach loop, as c(B+x), c(B+X) and c(B + X + x) are consistent and can be computed once and for all at the beginning of the second loop. If they were not, the count function would have been called up to 8 times (2 times per if, plus 2 times for the last if).</p><p>Classical Java containers, like HashSet or TreeSet, are well suited for the task of storing the observations and attributes but are a bit too sophisticated for the representation of a simple context's binary table. In fact, observations do not necessarily have to be directly manipulated to compute the extent, a fortiori its cardinality, of a set of attributes. Assuming that the observations are sorted in a final order, each of them can be represented by its index in this order. So the extent of an attribute becomes a binary word whose length is the cardinality of the observations set. In this word, a 1 (resp. a 0) means this index's observation is (resp. is not) part of the extent. Java, as many programming languages, has a BitSet class to manipulate and execute operations over such data type.</p><p>The extent (resp. intent) of each attribute (resp. observation) of the context is computed and stored as a binary word once and for all at the beginning of the execution. Then, the extent of a set of attributes can be computed using a logical AND on the successive extents of all of its elements (see Table <ref type="table" target="#tab_2">2</ref>). The immediate benefit comes from the rapidity of the AND operation, performed in less than one microsecond (with a complexity of O(E(n/w)), n being the length of the bitset and w the size of the memory words used to store the basic AND operations). It is more than 50 times as fast as an intersection between two TreeSets for the same number of calls. Furthermore, this sticks to the primal boolean representation of a context (see Table <ref type="table" target="#tab_0">1</ref>) and the lattice (nor any part of it) does not have to be generated at any time.</p><p>Each attribute and each object is mapped to its bit index in the binary word for output readability purpose.</p><formula xml:id="formula_131">p1 p2 p3 p4 p5 contains:balloon 1 1 1 1 0 shape:high 1 0 0 1 0 contains:tree 0 0 0 1 1 Extent 0 0 0 1 0 Table 2.</formula><p>Extent of the set of attributes {b, h, t}</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Experiment</head><p>The dataset is made of 848 comic books panels, the observations, and two kinds of attributes. The first category, made of 100 attributes, is shared by the whole set of observations with a proportion going from 2 to 11 attributes for an average of 7. 28 attributes are assigned to a single observation. The second category includes the first one and adds 3433 attributes, leading to an average distribution of 15 attributes per observation. 3403 out of the 3533 attributes belong to less than 3 observations. Only 15 are shared by more than 100 objects.</p><p>As this system is meant to be used in a browsing context through relevance feedback, it has to be efficient going both ways from a concept (towards its successors and its predecessors). We ran our algorithm both on the calculation of the immediate successors of the bottom concept ⊥ and the immediate predecessors of the top concept . We computed the latter as the immediate successors of ⊥ on the inverted context (which is rigorously the same thing as calculating the immediate predecessors of in the regular context -see Fig. <ref type="figure" target="#fig_123">2 and 3</ref>). We choose ⊥ as starting point because, according to our dataset, it is the concept that is supposed to have the most immediate successors.</p><p>Table <ref type="table" target="#tab_3">3</ref> shows the processing times in seconds of the classical immediate successors algorithm and the Limited Object Access algorithm, both tuned with TreeSet and BitSet data structures for different scenarios corresponding to different complexity values. Processes have been run on a 8GB DDR3 machine, powered by a 2.7GHz quad core Xeon. The results show a significant improvement of the computation time which can be attributed, for one part, to LOA and, for the other part, to the use of binary words.  </p><formula xml:id="formula_132">[] [p1, p2, p3, p4, p5] [w] [p2, p5] [t] [p4, p5] [m] [p3, p5] [b] [p1, p2, p3, p4] [m, t, w] [p5] [b, w] [p2] [b, h, m, t, w] [] [b, h, t] [p4] [b, m] [p3] [b, h] [p1, p4]</formula><formula xml:id="formula_133">[] [b, h, m, t, w] [p5] [m, t, w] [p4] [b, h, t] [p3] [b, m] [p2] [b, w] [p4, p5] [t] [p3, p5] [m] [p2, p5] [w] [p1, p2, p3, p4, p5] [] [p1, p4] [b, h] [p1, p2, p3, p4] [b]</formula><p>Fig. <ref type="figure" target="#fig_7">3</ref>. Concept lattice generated from the inversion of the context presented in Table <ref type="table" target="#tab_0">1</ref> Intent: Observations, Extent: Attributes</p><p>The bitset improvement over the LOA implementation shows a reduction of the execution time going from 14 to over 900 times. The calculation of the immediate predecessors of over the set of 3533 attributes is the worst possible case as it results in 848 different concepts of one observation, each of them with a set of around 20 attributes. The running time is almost entirely taken by the million of extent calculations, which is why the gain is more spectacular here.</p><p>A test on 500 randomly picked concepts has been run over the third dataset (|O| = 100, |I| = 848) resulting in a mean processing time of 0.18 second.</p><p>Computation time shrinkage is minimized on the classical method as the optimization only applies on the closure operation, which is a fraction of the global computation time.</p><p>We deal here with computation times kept below the second on a reasonable machine. This starts to be interesting in terms of human-machine interaction capabilities where at least a dozen of concept's immediate successors have to be calculated at each step.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion and ongoing work</head><p>We presented an efficient Java implementation of the immediate successors calculation. The short processing times on quite large datasets are promising and make the query by navigation through a lattice possible. The source code will be made available soon, along a full Java library to handle lattices.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Acknowledgment</head><p>This work was supported by the European Regional Development Fund, the region Poitou-Charentes (France), the General Council of Charente Maritime (France) and the town of La Rochelle (France).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>This article, together with the software, originates from an observation about the current state of research in the lattice and the FCA communities. Lattice theory dates back to the works of Dedekind, Birkhoff <ref type="bibr">[7]</ref> and Öre <ref type="bibr">[19]</ref>, and is a rich field in which FCA is deeply and fundamentally rooted. Despite that fact, relatively few studies in FCA takes advantage of lattice properties to enhance their results. This dichotomy of the two communities is apparent in the research interests: on the one hand, researchers from the graph and ordered set communities are focusing on equivalence theorem and characterizations, while on the other hand data mining researchers are more focused on practical or practically oriented results.</p><p>Although it is natural that this dichotomy exists because of the nature of each community's focus of interest, it is the author's suggestion that improvement of the communication between the two communities may produce a synergistic effect. The study of lattice cryptomorphisms and lattice properties is important for many reasons: other than giving a better understanding of the tools being used, it was shown to lead to the discovery of efficient algorithms in counting the number of Moore families <ref type="bibr">[16]</ref> or calculating the stem basis <ref type="bibr">[6]</ref> for example.</p><p>There are two main purposes for this software: first, to promote and to give a better understanding of the many shapes and forms of lattices thanks to an incremental approach -any change made in any equivalent cryptomorphism is transcribed to the other cryptomorphisms. Second, to help familiarize users to fundamental latticial properties that are recalculated after any modification. Its purpose is pedagogical for both students and researchers. Students can learn and get a better understanding on what is happening during the construction of the lattice and the implicational basis, while researchers can test hypotheses and find small illustrating examples. The program is written in C and is freely available (executable and source code) at http://www.cs.unic.ac.cy/ florent/software.htm</p><p>This paper is organized as follows: we start in Sec. 2 by describing the software itself. Sec 3 will recall the well-known definitions of lattices and some of the existing cryptomorphisms implemented in CryptoLat, together with a short explanation on how the equivalence is done. Finally, we compare in Sec. 5 Cryp-toLat with already existing software.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Description of CryptoLat</head><p>CryptoLat software is structured around a model view controller type of software architecture: each cryptomorphism described in Sec. 3 is a view with which the user can interact. The model is the reduced context associated with a Moore family on which all the calculations are based. When a view is updated, by adding or deleting a Sperner family for example, then the Moore family associated is calculated, the associated concept lattice, together with all the properties, is computed, and the other views get updated.</p><p>Depending on which view getting updated, the process may involve different steps. If the overhanging list or the Sperner village change, then first the Moore family associated with the new list, and the reduced context is then calculated. Similarly, if the input is an arbitrary set system, then the closure system is calculated as in Sec. 3.2. If the input is on the set of implications, since implications are usually on the set of attributes, the corresponding Moore family will be dual to the previous ones. From the reduced context, we are using Closed by One algorithm to calculate the concept lattice.</p><p>Fig. <ref type="figure" target="#fig_0">1</ref> shows a screen shot of the software with the five different views: the Moore family on top, the context as a datagrid, the list of implications, the list of overhanging and the list of Sperner families. The drawing of the lattice is done with a simple algorithm that optimise the position of each concept depending on the number (and position) of concepts covered.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Cryptomorphisms of Lattices</head><p>In this section, we present the different cryptomorphisms of lattices implemented in CryptoLat in details; we do not claim to be exhaustive, so we refer the readers to <ref type="bibr">[9]</ref> for a survey on those cryptomorphisms. Since we are describing implementations, the following descriptions needs only to be for the finite case. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Lattice and Irreducible Elements</head><p>Different yet equivalent definitions for lattices exist: here, we will define a lattice (L, ∧, ∨) as a set L with two binary operators satisfying the following four properties:</p><formula xml:id="formula_134">-Associativity: x ∧ (y ∧ z) = (x ∧ y) ∧ z and x ∨ (y ∨ z) = (x ∨ y) ∨ z -Commutativity: x ∧ y = y ∧ x and x ∨ y = y ∨ x -Idempotence: x ∧ x = x and x ∨ x = x -Absorption: x ∧ (y ∨ x) = x and x ∨ (y ∧ x) = x</formula><p>One can associate an order on the elements of L to these operators as follow: ∀x, y ∈ L, x ≤ y if x ∧ y = x or, equivalently, x ∨ y = y. Fig. <ref type="figure" target="#fig_1">2</ref> shows a lattice having six elements using its Hasse diagram representation: the elements of L are depicted by nodes in the plane, and a line segment connects the nodes corresponding to a covering pair x ≺ y (i.e. x ≤ y and ∀z, x ≤ z ≤ y implies x = z or y = z), where the node representing y is placed 'higher' in the plane than the node representing x.</p><p>Some elements of lattices are of particular interest: in any lattice, we have a minimal element, usually denoted by 0 L or ⊥, and a maximal element 1 L or . Irreducible elements of the lattice are also the subject of studies since they constitute minimal generating sets, and are often used to characterize classes of lattices. An element j of L is join-irreducible if j = ∨X then j ∈ X, or, Let J L and M L be the sets of join and meet-irreducible of L.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Moore Family and Closure Operator</head><p>Let S be a finite set. A closure system (or Moore family) C on S is a family of subsets of S satisfying S ∈ C and, for all A, B ∈ C, A ∩ B ∈ C. A closure system is a lattice with the following operations:</p><formula xml:id="formula_135">-C 1 ∧ C 2 = C 1 ∩ C 2 -C 1 ∨ C 2 = ∩{C ∈ C : C 1 ∪ C 2 ⊆ C}</formula><p>Let A be an arbitrary set system on a set S. Then one can associate a closure system C A to A:</p><formula xml:id="formula_136">C A = {∩{A i : A i ∈ A}} ∪ {S} Example 1 (continued). The family {∅, {G 0 }, {G 1 }, {G 2 }, {G 1 , G 2 }, {G 0 , G 1 , G 2 }},</formula><p>with the operators previously defined, constitute a lattice isomorphic to the lattice of Fig. <ref type="figure" target="#fig_1">2</ref>.</p><p>Another fundamental cryptomorphism of lattice concerns closure operators. A closure operator on a set S is a map σ : P(S) → P(S) satisfying ∀X, Y ⊆ S:</p><formula xml:id="formula_137">-Isotone: X ⊆ Y ⇒ σ(X) ⊆ σ(Y ) -Extensive: X ⊆ σ(X) -Idempotent: σ(σ(X)) = σ(X)</formula><p>These three properties together are equivalent to extensivity and path independence property <ref type="bibr">[20]</ref>:</p><formula xml:id="formula_138">σ(X ∪ Y ) = σ(σ((X) ∪ σ((Y )).</formula><p>The well-known equivalence between closure operators and closure systems is the following: given the closure system C, the associated closure operator is σ C (X) = ∩{C ∈ C : X ⊆ C}. Conversely, given a closure operator σ, the associated closure system is the set of fixed points of σ, i.e. C σ = {X ⊆ S : X = σ(X)}.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Context Associated with a Lattice</head><p>One of the most celebrated cryptomorphism in the FCA community is the one between a lattice and a binary relation, also known as the basic theorem of Formal Concept Analysis <ref type="bibr">[3,</ref><ref type="bibr">13]</ref>.</p><p>Formally, a context (G, M, I) is a binary relation I between a set of objects G and a set of attributes M . One can associate the Galois connection between P(G) and P(M ) to this binary relation as</p><formula xml:id="formula_139">∀A ⊆ G, B ⊆ M , A = {m ∈ M : ∀g ∈ A, (g, m) ∈ I} B = {g ∈ G : ∀m ∈ B, (g, m) ∈ I}</formula><p>The lattice associated with the context (G, M, I), also called the concept lattice or Galois lattice, is the set of all concepts (A, B), with A = B and B = A, together with the order (A 1 , B 1 )</p><formula xml:id="formula_140">≤ (A 2 , B 2 ) ⇐⇒ A 1 ⊆ A 2 ( ⇐⇒ B 1 ⊇ B 2 )</formula><p>. Conversely, any lattice L is isomorphic to the Galois lattice of the context (J L , M L , ≤), also called the reduced context.</p><p>Two other binary relations, the arrows relations, on P(J) × P(M ) are often used for characterization theorems. Let j ∈ J, m ∈ M , we define:</p><formula xml:id="formula_141">-j ↑ m ⇐⇒ j ≤ m and j &lt; m + -j ↓ m ⇐⇒ j ≤ m and j − &lt; m -j m ⇐⇒ j ↑ m and j ↓ m</formula><p>Example 1 (continued). The lattice associated with the context of Fig. <ref type="figure" target="#fig_7">3</ref> is isomorphic to the lattice of Fig. <ref type="figure" target="#fig_1">2</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Implications</head><p>An implicational system I on S is a binary relation on P(S), and if (A, B) ∈ I, we denote it A → I B or A → B if no confusion is possible. We say that A implies B or A → B is an implication (of I). A complete implicational system I is an implicational system on P(S) satisfying, ∀A, B, C, D ⊆ S:</p><formula xml:id="formula_142">-B ⊆ A implies A → B; -A → B and B → C imply A → C; -A → B and C → D imply (A ∪ C) → (B ∪ D).</formula><p>[2] showed that a one-to-one correspondence between closure operators and complete implicational system exists. The closure system associated to a complete implicational system is</p><formula xml:id="formula_143">C I = {C ⊆ S : ∀X ⊆ S, [X ⊆ C and X → Y ] ⇒ Y ⊆ C}, while the implicational system associated to a closure mapping is {X → Y : Y ⊆ σ(X)}.</formula><p>Example 1 (continued). The complete implicational system associated with the lattice in Fig. <ref type="figure" target="#fig_1">2</ref>  As the above example shows, many implications in a complete implicational system can be redundant: in our example, it is evident that if we have c → e then we have b, c → e. So smaller implicational system allowing a smaller representation of a complete implicational system is of interest. We say that an implicational system Σ is a generating system for I if any implication of I can be obtained from Σ by applying recursively the rules defining a complete implicational system. A minimal generating system for I is called a basis for I, and a minimum basis is called a canonical basis.</p><p>One particular basis, called the stem basis <ref type="bibr">[15]</ref>, can be directly defined: the stem basis is made of all implications X → σ(X) − X, with X a critical set. A set </p><formula xml:id="formula_144">Q ⊆ S is called a quasi-closed set if Q ∈ C and C + {Q} is a closure system, and Q is a F -quasi-closed set if Q is quasi-closed and σ(Q) = F . So a set C ⊆ S is critical if there exists F ∈ C such that C is a minimal F -quasi-closed set.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5">Overhanging Relation</head><p>An overhanging relation O is a binary relation on P(S) that was originated in <ref type="bibr">[1]</ref> in consensus theory on trees under the term of nesting, and was generalized in <ref type="bibr">[12]</ref> to any lattice. We will indifferently write (A, B) ∈ O or A O B to signify that a set A is overhanged in B. An overhanging relation satisfies the following properties:</p><formula xml:id="formula_145">-for all A, B ∈ S, A O B implies A ⊂ B; -for all A, B, C ∈ S, A ⊂ B ⊂ C implies [A O C ⇐⇒ A O B or B O C]; -for all A, B ∈ S, A O (A ∪ B) implies (A ∩ B) O B.</formula><p>We showed in <ref type="bibr">[12]</ref> that overhanging relations and closure operators (and so lattices) are in a one-to-one correspondence by associating the overhanging relation defined as A O B ⇐⇒ A ⊂ B and σ(A) ⊂ σ(B) to any closure operator, and, conversely, associating the closure operator σ(X) = {x ∈ S : x O c X ∪ {x}} to any overhanging relation. In fact, an overhanging relation can be seen as a kind of negative implication, as given by the equivalence that A → B if and only if (A, A ∪ B) ∈ O Example 1 (continued). The overhanging relation associated with the lattice of Fig. <ref type="figure" target="#fig_1">2</ref> is as follows:</p><formula xml:id="formula_146">∅ O b ∅ O c ∅ O d ∅ O b, c ∅ O b, d ∅ O c, d ∅ O b, c, d b O b, c b O b, d b O b, c, d c O b, c c O c, d c O b, c, d d O b, d d O c, d d O b, c, d c, d O b, c, d</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.6">Sperner Family</head><p>A Sperner family F on S is a family s.t. ∀X, Y ∈ F, X and Y are incomparable for set inclusion. A Sperner village V = (F 1 , ..., F n ) on S is a set of n Sperner families. The equivalence between a closure operator and a Sperner village is obtained as follows: given σ closure operator, for any x ∈ S we create the Sperner family C x = {X ⊆ S : x ∈ σ(X) and X minimal for that property}. Conversely, the closure operator associated with V is defined as σ(X) = {x ∈ S : X contains a set of C x }.</p><p>Example 1 (continued). The Sperner village equivalent with our running example is the following Fig. <ref type="figure" target="#fig_8">4</ref>. When we add to the existing Sperner village the Sperner family {{e}, {b, c}}, the software computes the smallest Sperner village possible from the existing village together with the new family, and from this Sperner village finds the associated concept lattice. Fig. <ref type="figure" target="#fig_9">5</ref> shows the results. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Properties of lattices</head><p>The main focus of the software concerns the dependency between the different cryptomorphisms associated with lattices. In the same pedagogical spirit, we also implemented different properties of lattices and elements of lattices, briefly described in Tab. 1 and in Tab. 2 for completeness sake. We refer the readers to <ref type="bibr">[11,</ref><ref type="bibr">14,</ref><ref type="bibr">22]</ref> for more information on lattices and lattice properties.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Existing Software</head><p>All of the software mentioned in Table <ref type="table" target="#tab_3">3</ref> have different goals. In terms of ease of use, Concept Explorer is the closest to our goal, but offers limited functionalities. OpenFCA is similar to Concept Explorer, offering an interesting, web based and intuitive approach to context creation, lattice visualization and attribute exploration. FCAstone's main purpose is file formats conversion to improve interoperability between FCA and graph editing. The other software (Galicia, ToscanaJ, Lattice Miner, FCART) were designed to push the boundaries of the scalability of analysis and lattice drawing. Research wise, Formal Concept Analysis Research Toolbox (FCART) is a particularly interesting approach of a universal Tthere is a ranking function r :</p><formula xml:id="formula_147">L → N such that ∀x, y ∈ L, x ≺ y implies r(y) = r(x) + 1 Upper semi-modular ∀x, y ∈ L: x ∧ y ≺ x ⇒ y ≺ x ∨ y Lower semi-modular ∀x, y ∈ L: y ≺ x ∨ y ⇒ x ∧ y ≺ x Modular Upper and lower semi-modular Distributive ∀x, y, z ∈ L, x ∧ (y ∨ z) = (x ∧ y) ∨ (x ∧ z) Semi-distributive ∀x, y, z ∈ L, we have both x ∧ y = x ∧ z ⇒ x ∧ y = x ∧ (y ∨ z) and x ∨ y = x ∨ z ⇒ x ∨ y = x ∨ (y ∧ z) Families of Lattices Chain ∀x ∈ L, x = 0L, x ∈ JL Hierarchy ∀x ∈ S, {x} ∈ L and ∀A, B ∈ L, A ∩ B ∈ {∅, A, B} Weak hierarchy ∀x ∈ S, {x} ∈ L and ∀A, B, C ∈ L, A∩B ∩C ∈ {A∩B, A∩C, B ∩C} Boolean Isomorphic to the power set of some set Complemented Lattices Complemented ∀x ∈ L, ∃y ∈ L: x ∧ y = 0L and x ∨ y = 1L Uniquely complemented The complement is unique Pseudo-complemented ∀x ∈ L, ∃y ∈ L: x ∧ y = 0L and ∀z ∈ L, x ∧ z = 0L ⇒ z ≤ y Relatively comple- mented Any [u, v] is relatively complemented, i.e. ∀x in [u, v], ∃y such that x ∧ y = u and x ∨ y = v Uniquely relatively com- plemented The complement in [u, v] is unique Sectionally comple- mented Any [0L, v] is complemented</formula><p>Other Lattices Properties δ-hard ∀j, j ∈ JL, jδj , i.e. there exists x ∈ L such that j ≤ x, j ≤ x and j &lt; j ∨ x δ-strong</p><p>The transitive graph of the δ relation is complete Sperner poset L is ranked, and the size of the maximal antichain is equal to the maximal size rank Table <ref type="table" target="#tab_2">2</ref>. List of elements properties</p><formula xml:id="formula_148">x is distributive ∀y, z ∈ L, x ∨ (y ∧ z) = (x ∨ y) ∧ (x ∨ z) x is standard ∀y, z ∈ L, y ∧ (x ∨ z) = (y ∧ x) ∨ (y ∧ z) x is neutral ∀y, z ∈ L, (x ∧ y) ∨ (y ∧ z) ∨ (x ∧ z) = (x ∨ y) ∧ (x ∨ z) ∧ (y ∨ z) x is an articulation point ∀y ∈ L, either x ≤ y or y ≤ x x is join-prime x ≤ a ∨ b implies x ≤ a or x ≤ b x is meet-prime a ∧ b ≤ x implies a ≤ x or b ≤ x</formula><p>integrated environment to lattice construction and Formal Concept Analysis techniques, where one can test new algorithms for drawing lattice for example. Many other cryptomorphisms of concept lattices exist but are not implemented yet. For example, <ref type="bibr">[4]</ref> proved that we can associate a minimal separator of the co-bipartite graph to every concept of the concept lattice, and <ref type="bibr">[16]</ref> showed a bijection between Moore families and ideal colour sets of the coloured poset. Similarly we are planning to increase the number of properties available, adding for example the dismantlable property (one can repeatedly remove a doubly irreducible element until the lattice becomes a chain) or being a convex geometry (∅ ∈ L and ∀x ∈ L, there is a unique minimal (for inclusion) generator of x). the lattice drawing component is also under consideration, to be enhance and more user friendly.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>CRL-Chu correspondences</head><p>Ondrej Krídlo 1 and Manuel Ojeda-Aciego 2</p><p>1 University of Pavol Jozef Šafárik, Košice, Slovakia 2 Dept. Matemática Aplicada, Univ. Málaga, Spain</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Morphisms have been suggested <ref type="bibr">[7]</ref> as fundamental structural properties for the modelling of, among other applications, communication, data translation, and distributed computing. Our approach can be seen within a research topic linking concept lattices with the theory of Chu spaces <ref type="bibr">[10,</ref><ref type="bibr">11]</ref>; in the latter, it is shown that the notion of state in Scott's information system corresponds precisely to that of formal concepts in FCA with respect to all finite Chu spaces, and the entailment relation corresponds to association rules (another link between FCA with database theory) and, specifically, on the identification of the categories associated to certain constructions.</p><p>Other researchers have studied as well the relationships between Chu constructions and L-fuzzy FCA. For instance, in <ref type="bibr">[1]</ref> FCA is linked to both ordertheoretic developments in the theory of Galois connections and to Chu spaces; as a result, not surprisingly from our previous works, they obtain further relationships between formal contexts and topological systems within the category of Chu systems. Recently, Solovyov, in <ref type="bibr">[9]</ref>, extends the results of <ref type="bibr">[1]</ref> to clarify the relationships between Chu spaces, many-valued formal contexts of FCA, lattice-valued interchange systems and Galois connections.</p><p>This work is based on the notion, introduced by Mori in <ref type="bibr">[8]</ref>, of Chu correspondences as morphisms between formal contexts. This categorical approach has been used in previous works <ref type="bibr">[3,</ref><ref type="bibr">5,</ref><ref type="bibr">6]</ref>. For instance, in <ref type="bibr">[6]</ref>, the categories associated to L-formal contexts and L-CLLOS were defined and a constructive proof was given of the equivalence between the categories of L-formal contexts with L-Chu correspondences as morphisms and that of completely lattice L-ordered sets and their corresponding morphisms. Similar results can be found in <ref type="bibr">[2]</ref>, where a new notion of morphism on formal contexts resulted in a category equivalent to both the category of complete algebraic lattices and Scott continuous functions, and a category of information systems and approximable mappings.</p><p>We are concerned with the category of fuzzy formal contexts and λ-Chu correspondences, built on the basis of a residuation-preserving isotone Galois connection λ. Then, the corresponding extension of the notion of bond between contexts is generalized to this framework, and its properties are studied.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head><p>2.1 Residuated lattice Definition 1. A complete residuated lattice is an algebra L, ∧, ∨, 0, 1, ⊗, → where -L, ∧, ∨, 0, 1 is a complete lattice with the top 1 and the bottom 0, -L, ⊗, 1 is a commutative monoid, -⊗, → is an adjoint pair, i.e. for any a, b, c ∈ L: </p><formula xml:id="formula_149">a ⊗ b ≤ c is equivalent to a ≤ b → c Definition 2. A complete residuated lattice L = L, ∧, ∨, 0, 1, ⊗, →</formula><formula xml:id="formula_150">L B → L A and ↓: L A → L B , is de- fined as follows ↑ (f )(a) = b∈B (f (b) → r(b, a)) for any f ∈ L B and a ∈ A, ↓ (g)(b) = a∈A (g(a) → r(b, a)) for any g ∈ L A and b ∈ B.</formula><p>Lemma 2. Let ↑, ↓ be a pair of derivation operators defined on an L-fuzzy formal context C. A pair ↑, ↓ forms a Galois connection between complete lattices of all L-sets of objects L B and attributes L A . Definition 5. Let C = B, A, L, r be an L-fuzzy formal context. A formal concept is a pair of L-sets f, g ∈ L B × L A such that ↑ (f ) = g and ↓ (g) = f . The set of all L-concepts of C will be denoted as FCL(C). The object (resp. attribute) part of any concept is called extent (resp. intent). The sets of all extents or intents of C will be denoted as Ext(C) or Int(C), respectively.</p><p>2.3 L-Bonds and L-Chu correspondences Definition 6. Let X and Y be two sets. An L-multifunction from X to Y is said to be a mapping from X to L Y .</p><formula xml:id="formula_151">Definition 7. Let C i = B i , A i , L, r i for i ∈ {1, 2} be two L-fuzzy formal con- texts. A pair of L-multifunctions ϕ = ϕ L , ϕ R such that -ϕ L : B 1 −→ Ext(C 2 ), -ϕ R : A 2 −→ Int(C 1 ), where ↑ 2 (ϕ L (o 1 ))(a 2 ) = ↓ 1 (ϕ R (a 2 ))(o 1 ) for any (o 1 , a 2 ) ∈ B 1 × A 2 , is said to be an L-Chu correspondence between C 1 and C 2 . A set of all L-Chu corresepondences between C 1 and C 2 will be denoted by L-ChuCors(C 1 , C 2 ). Definition 8. Let C i = B i , A i , L, r i for i ∈ {1, 2} be two L-fuzzy formal con- texts. An L-multifunction β : B 1 −→ Int(C 2 ), such that β t : A 2 −→ Ext(C 1 ), where β t (a 2 )(o 1 ) = β(o 1 )(a 2 ) for any (o 1 , a 2 ) ∈ B 1 × A 2 , is said to be an L- bond. A set of all L-bonds between C 1 and C 2 will be denoted by L-Bonds(C 1 , C 2 ). Lemma 3. Let C i = B i , A i , L, r i for i ∈ {1</formula><p>, 2} be two L-fuzzy formal contexts. The sets L-Bonds(C 1 , C 2 ) and L-ChuCors(C 1 , C 2 ) form complete lattices and, moreover, there exists a dual isomorphism between them.</p><p>3 Residuation-preserving isotone Galois connections Definition 9. An isotone Galois connection between two complete lattices</p><formula xml:id="formula_152">L 1 = (L 1 , ≤ 1 ) and L 2 = (L 2 , ≤ 2 ) is a pair of monotone mappings λ = λ L , λ R with λ L : L 1 −→ L 2 and λ R : L 2 −→ L 1 such that, for any k 1 ∈ L 1 and k 2 ∈ L 2 , the following equivalence holds k 1 ≤ 1 λ R (k 2 ) ⇐⇒ λ L (k 1 ) ≤ 2 k 2 .<label>(1)</label></formula><p>The general theory of adjunctions provides the following result:</p><formula xml:id="formula_153">Lemma 4. Let λ L , λ R be an isotone Galois connection, then for all k 1 ∈ L 1 and k 2 ∈ L 2 λ R (k 2 ) = {m ∈ L 1 : λ L (m) ≤ 2 k 2 } (2) λ L (k 1 ) = {m ∈ L 2 : k 1 ≤ 1 λ R (m)}<label>(3)</label></formula><p>Definition 10. An isotone Galois connection λ between two complete residuated lattices</p><formula xml:id="formula_154">L 1 = (L 1 , ⊗ 1 , → 1 ) and L 2 = (L 2 , ⊗ 2 , → 2</formula><p>) is said to be a residuationpreserving isotone Galois connection if for any k 1 , m 1 ∈ L 1 and k 2 , m 2 ∈ L 2 the following equalities hold:</p><formula xml:id="formula_155">λ L (k 1 ⊗ 1 m 1 ) = λ L (k 1 ) ⊗ 2 λ L (m 1 ) (4) λ R (k 2 ⊗ 2 m 2 ) = λ R (k 2 ) ⊗ 1 λ R (m 2 ) (<label>5</label></formula><formula xml:id="formula_156">)</formula><formula xml:id="formula_157">k 2 → 2 λ L (m 1 ) ≥ 2 λ L (λ R (k 2 ) → 1 m 1 )<label>(6)</label></formula><p>The set of all residuation-preserving isotone Galois connections from L 1 to L 2 will be denoted as</p><formula xml:id="formula_158">CRL(L 1 , L 2 ).</formula><p>There is no need to consider other →-preserving rules, since they follow from the previous ones, as stated by the following lemmas.</p><p>Lemma 5. For all k ∈ L 1 and m ∈ L 2 the following equality holds</p><formula xml:id="formula_159">k → 1 λ R (m) = λ R (λ L (k) → 2 m)<label>(7)</label></formula><p>Proof. Consider the following chain of equivalences</p><formula xml:id="formula_160">l ⊗ 1 k ≤ 1 λ R (m)<label>(1)</label></formula><formula xml:id="formula_161">⇐⇒ λ L (l ⊗ 1 k) ≤ 2 m (4) ⇐⇒ λ L (l) ⊗ 2 λ L (k) ≤ 2 m (adj) ⇐⇒ λ L (l) ≤ 2 λ L (k) → 2 m</formula><p>As a result, we can write</p><formula xml:id="formula_162">k → 1 λ R (m) = {l ∈ L 1 : l ⊗ 1 k ≤ λ R (m)} = {l ∈ L 1 : λ L (l) ≤ λ L (k) → 2 m} (2) = λ R (λ L (k) → 2 m)</formula><p>It is worth to note that this proof does not work in the case of (6) because, for the construction of λ L , one had to use (3) instead of (2).</p><p>Lemma 6. For all k i , m i ∈ L i for i ∈ {1, 2}, the following inequalities hold</p><formula xml:id="formula_163">λ L (k 1 → 1 m 1 ) ≤ 2 λ L (k 1 ) → 2 λ L (m 1 ) (8) λ R (k 2 → 2 m 2 ) ≤ 1 λ R (k 2 ) → 1 λ R (m 2 )<label>(9)</label></formula><p>Proof. By the adjoint property and the following chain of inequalities</p><formula xml:id="formula_164">λ L (k 1 → 1 m 1 ) ⊗ 2 λ L (k 1 ) (4) = λ L ((k 1 → 1 m 1 ) ⊗ 1 k 1 ) ≤ 2 λ L (m 1 )</formula><p>Similarly, we obtain the other one.</p><p>Below, we recall the notion of fixpoint of a Galois connection, the definition is uniform to the different types of Galois connection, either antitone or isotone, or with any other extra requirement.</p><p>Definition 11. Let λ be a Galois connection between complete residuated lattices L 1 and L 2 . The set of all fixpoints of λ is defined as</p><formula xml:id="formula_165">FP λ = { k 1 , k 2 ∈ L 1 × L 2 : λ L (k 1 ) = k 2 , λ R (k 2 ) = k 1 }. Lemma 7. Given λ ∈ CRL(L 1 , L 2 )</formula><p>, the set of its fixpoints can be provided with the structure of complete residuated lattice</p><formula xml:id="formula_166">Φ λ = FP λ , ∧, ∨, 0, 1, ⊗, → where 0 = λ R (0 2 ), 0 2 , 1 = 1 1 , λ L (1 1</formula><p>) , and ⊗ and → are defined componentwise.</p><p>Proof. We have to check just that the componentwise operations provide a residuated structure to the set of fixed point of λ.</p><p>Conditions ( <ref type="formula" target="#formula_50">4</ref>) and ( <ref type="formula" target="#formula_51">5</ref>) allow to prove that componentwise product ⊗ is a closed operation in FP λ , whereas condition (6) allows to prove that the componentwise implication is a closed operation in FP λ .</p><p>It is not difficult to show that, in fact, FP λ , ⊗, 1 is a commutative monoid: commutativity and associativity follow directly; for the neutral element just consider the following chain of equalities: For any</p><formula xml:id="formula_167">k 1 , k 2 ∈ FP λ holds k 1 , k 2 ⊗ 1 1 , λ L (1 1 ) = k 1 ⊗ 1 1 1 , λ L (k 1 ) ⊗ 2 λ L (1 1 ) = k 1 , λ L (k 1 ⊗ 1 1 1 ) = k 1 , λ L (k 1 ) = k 1 , k 2</formula><p>The adjoint property follows by definition.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">CRL-Chu correspondences and their category</head><p>In this section, the notion of L-Chu correspondence is generalized on the basis of a residuation-preserving isotone Galois connection λ. The formal definition is the following:</p><formula xml:id="formula_168">Definition 12. Let C i = B i , A i , L i , r i for i ∈ {1, 2} be two fuzzy formal contexts, and consider λ ∈ CRL(L 1 , L 2 ). A pair of fuzzy multifunctions ϕ = ϕ L , ϕ R of types ϕ L : B 1 −→ Ext(C 2 ) and ϕ R : A 2 −→ Int(C 1 )</formula><p>such that for any (o 1 , a 2 ) ∈ B 1 × A 2 the following inequality holds</p><formula xml:id="formula_169">λ L (↓ 1 (ϕ R (a 2 ))(o 1 )) ≤ 2 ↑ 2 (ϕ L (o 1 ))(a 2 ) (<label>10</label></formula><formula xml:id="formula_170">)</formula><p>is said to be a λ-Chu correspondence.</p><p>Note that <ref type="bibr">(10)</ref> </p><formula xml:id="formula_171">is equivalent to ↓ 1 (ϕ R (a 2 ))(o 1 ) ≤ 1 λ R (↑ 2 (ϕ L (o 1 ))(a 2 )).</formula><p>It is not difficult to check that the definition of λ-Chu correspondence generalizes the previous one based on a complete (residuated) lattice L; formally, we have the following Definition 13. Let X be an arbitrary set. Mapping id X defined by id X (x) = x for any x ∈ X is said to be an identity mapping on X.</p><p>Lemma 8. Any L-Chu correspondence is a id L , id L -Chu correspondence.</p><p>We are now in position to define the category of parameterized fuzzy formal contexts and λ-Chu correspondences between them: Definition 14. We introduce a new category whose objects are parameterized fuzzy formal contexts B, A, L, r and λ-Chu correspondences between them.</p><p>The identity arrow of an object B, A, L, r is the id L , id L -Chu correspondence ι such that</p><formula xml:id="formula_172">-ι L (o) = ↓↑ (χ o ) for any o ∈ B -ι R (a) = ↑↓ (χ a )</formula><p>for any a ∈ A -where χ x (x) = 1 and χ x (y) = 0 for any y = x.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Composition of arrows</head><formula xml:id="formula_173">3 λ, ϕ : C 1 → C 2 and µ, ψ : C 2 → C 3 where C i = B i , A i , L i , r i for i ∈ {1, 2, 3} is defined as: -( µ, ψ • λ, ϕ ) L (o 1 ) = ↓ 3 ↑ 3 (ψ L+ (ϕ L (o 1 ))) -( µ, ψ • λ, ϕ ) R (a 3 ) = ↑ 1 ↓ 1 (ϕ R+ (ψ R (a 3 )))</formula><p>where, for any</p><formula xml:id="formula_174">(o i , a i ) ∈ B i × A i , i ∈ {1, 3}, ψ L+ (ϕ L (o 1 ))(o 3 ) = o2∈B2 ψ(o 2 )(o 3 ) ⊗ 3 µ L (ϕ L (o 1 )(o 2 )) ϕ R+ (ψ R (a 3 ))(a 1 ) = a2∈A2 ϕ R (a 2 )(a 1 ) ⊗ 1 λ R (ψ R (a 3 )(a 2 ))</formula><p>Obviously, one has to check that the proposed notions of composition and identity are well-defined, and this is stated in the following lemmas.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Lemma 9. The identity arrow of any fuzzy formal context</head><formula xml:id="formula_175">B, A, L, r is a id L , id L -Chu correspondence. Lemma 10. Consider λ, ϕ : C 1 → C 2 and µ, ψ : C 2 → C 3 , then µ, ψ • λ, ϕ is a (µ • λ)-Chu correspondence. Moreover, composition of λ-correspondences is associative.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">λ-Bonds and λ-direct product of two contexts</head><p>We proceed with the corresponding extension of the notion of bond between contexts, and the study of its properties.</p><formula xml:id="formula_176">Definition 15. Given a multifunction ω : X → (L 1 × L 2 ) Y , its projections ω i for i ∈ {1, 2} are defined by ω i (x)(y) = k i , provided that ω(x)(y) = (k 1 , k 2 ).</formula><p>Transposition of such multifunction is defined by ω t (y)(x) = ω(x)(y).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 16. Given two fuzzy formal contexts</head><formula xml:id="formula_177">C i = B i , A i , L i , r i , i ∈ {1, 2}, and λ ∈ CRL(L 1 , L 2 ). A λ-bond is a multifunction β : B 1 → (L 1 × L 2 ) A2 such that, for any (o 1 , a 2 ) ∈ B 1 × A 2 : β 2 (o 1 ) is an intent of C 2<label>(11)</label></formula><formula xml:id="formula_178">(β t ) 1 (a 2 ) is an extent of C 1 (<label>12</label></formula><formula xml:id="formula_179">)</formula><formula xml:id="formula_180">β 1 (o 1 )(a 2 ) ≤ 1 λ R (β 2 (o 1 )(a 2 )) or equivalently λ L (β 1 (o 1 )(a 2 )) ≤ 2 β 2 (o 1 )(a 2 )<label>(13)</label></formula><p>The known relation between L-bonds and L-Chu correspondences is preserved in the λ-case. Formally, Lemma 11. Let β be a λ-bond between two fuzzy contexts</p><formula xml:id="formula_181">C i = B i , A i , L i , r i for i ∈ {1, 2}. Then ϕ β defined as ϕ βL (o 1 ) = ↓ 2 (β 2 (o 1 ))<label>(14)</label></formula><formula xml:id="formula_182">ϕ βR (a 2 ) = ↑ 1 ((β t ) 1 (a 2 )) (<label>15</label></formula><formula xml:id="formula_183">)</formula><p>is λ-Chu correspondence.</p><p>Proof. By calculation</p><formula xml:id="formula_184">↑ 2 (ϕ βL (o 1 ))(a 2 ) (14) = ↑ 2 ↓ 2 (β 2 (o 1 ))(a 2 ) (11) = β 2 (o 1 )(a 2 ) (13) ≥ λ L (β 1 (o 1 )(a 2 )) = λ L ((β t ) 1 (a 2 )(o 1 )) (12) = λ L (↓ 1 ↑ 1 ((β t ) 1 (a 2 ))(o 1 )) (15) = λ L (↓ 1 (ϕ βR (a 2 ))(o 1 ))</formula><p>Lemma 12. Let L 1 , L 2 be two complete residuated lattices satisfying the double negation law and let λ ∈ CRL(L 1 , L 2 ). Then Φ λ satisfies double negation law.</p><p>Proof. Consider an arbitrary k 1 , k 2 ∈ FP λ . We have that, by definition,</p><formula xml:id="formula_185">¬¬ k 1 , k 2 = ( k 1 , k 2 → 0) → 0 = ( k 1 , k 2 → λ R (0 2 ), 0 2 ) → λ R (0 2 ), 0 2 = (k 1 → 1 λ R (0 2 )) → 1 λ R (0 2 ), (k 2 → 2 0 2 ) → 2 0 2</formula><p>The result for the second component is obvious; for the first one, taking into account that (λ R (0 2 ), 0 2 ) is a fixed point, we have</p><formula xml:id="formula_186">λ L (k 1 ) = k 2 = (k 2 → 2 0 2 ) → 2 0 2 = k 2 → 2 λ L λ R (0 2 ) → 2 λ L λ R (0 2 ) (6) ≥ 2 λ L (λ R λ L (λ R (k 2 ) → 1 λ R (0 2 )) → 1 λ R (0 2 )) ( ) = λ L ((λ R (k 2 ) → 1 λ R (0 2 )) → 1 λ R (0 2 )) = λ L ((k 1 → 1 λ R (0 2 )) → 1 λ R (0 2 )) ( * ) ≥ 2 λ L (k 1 )</formula><p>where equality ( ) follows because, by Lemma 7, λ R (k 2 ) → 1 λ R (0 2 ) is a closed value in L 1 for the composition λ R λ L , and inequality ( * ) follows from the monotonicity of λ L . As a result of the previous chain we obtain the following equality</p><formula xml:id="formula_187">λ L (k 1 ) = λ L ((k 1 → 1 λ R (0 2 )) → 1 λ R (0 2 ))</formula><p>and, again by Lemma 7, since k 1 and λ R (0 2 ) are closed for λ R λ L , as a result</p><formula xml:id="formula_188">(k 1 → 1 λ R (0 2 )) → 1 λ R (0 2 ) is closed too, and k 1 = (k 1 → 1 λ R (0 2 )) → 1 λ R (0 2 ).</formula><p>We are now ready to include the characterization result on the structure of λ-bonds, but we have to introduce the notion of λ-direct product of contexts.</p><formula xml:id="formula_189">Definition 17. Let C i = B i , A i , L i , r i for i ∈ {1, 2} be two fuzzy formal contexts, λ ∈ CRL(L 1 , L 2 ) and L 1 , L 2 satisfy the double negation law. The fuzzy formal context B 1 × A 2 , B 2 × A 1 , Φ λ , ∆ λ where ∆ λ ((o 1 , a 2 ), (o 2 , a 1 )) = ¬(λ 1 (r 1 )) → λ 2 (r 2 (o 2 , a 2 )</formula><p>) is said to be the λ-direct product of C 1 and C 2 , where</p><formula xml:id="formula_190">λ 1 (k) = λ R λ L (k), λ L (k) for all k ∈ L 1 (16) λ 2 (k) = λ R (k), λ L λ R (k) for all k ∈ L 2 (17) Lemma 13. Let C 1 ∆ λ C 2 be the λ-direct product of fuzzy formal contexts C 1 and C 2 , and λ ∈ CRL(L 1 , L 2 ). For any extent of C 1 ∆ λ C 2 there exists a λ-bond between C 1 and C 2 . Proof. Let β, γ be a concept of C 1 ∆ λ C 2 . Then β ∈ FP B1×A2 λ ⊆ (L 1 ×L 2 ) B1×A2 . β(o 1 , a 2 ) = ↓ ∆ λ (γ)(o 1 , a 2 ) = o2∈B2 a1∈A1 (γ(o 2 , a 1 ) → ∆ λ ((o 1 , a 2 ), (o 2 , a 1 ))) = o2∈B2 a1∈A1 (γ(o 2 , a 1 ) → (¬λ 1 (r 1 (o 1 , a 1 ))) → λ 2 (r 2 (o 2 , a 2 )))</formula><p>Then</p><formula xml:id="formula_191">β 1 (o 1 , a 2 ) = o2∈B2 a1∈A1 (γ 1 (o 2 , a 1 ) → 1 (¬λ R λ L (r 1 (o 1 , a 1 ))) → 1 λ R (r 2 (o 2 , a 2 ))) = o2∈B2 a1∈A1 ((γ 1 (o 2 , a 1 ) ⊗ 1 ¬λ R λ L (r 1 (o 1 , a 1 ))) → 1 λ R (r 2 (o 2 , a 2 ))) (7) = o2∈B2 a1∈A1 λ R (λ L (γ 1 (o 2 , a 1 ) ⊗ 1 ¬λ R λ L (r 1 (o 1 , a 1 ))) → 2 r 2 (o 2 , a 2 )) = λ R ( o2∈B2 a1∈A1 (λ L (γ 1 (o 2 , a 1 ) ⊗ 1 ¬λ R λ L (r 1 (o 1 , a 1 ))) → 2 r 2 (o 2 , a 2 ))) = λ R ( o2∈B2 ( a1∈A1 (λ L (γ 1 (o 2 , a 1 ) ⊗ 1 ¬λ R λ L (r 1 (o 1 , a 1 )))) → 2 r 2 (o 2 , a 2 ))) = λ R ( o2∈B2 (σ(o 1 )(o 2 ) → 2 r 2 (o 2 , a 2 ))) = λ R (↑ 2 (σ(o 1 ))(a 2 ))</formula><p>Similarly</p><formula xml:id="formula_192">β 2 (o 1 , a 2 ) = o2∈B2 a1∈A1 ((γ 2 (o 2 , a 1 ) ⊗ 2 ¬λ L λ R (r 2 (o 2 , a 2 ))) → 2 λ L (r 1 (o 1 , a 1 )))<label>(6)</label></formula><formula xml:id="formula_193">≥ 2 o2∈B2 a1∈A1 λ L (λ R (γ 2 (o 2 , a 1 ) ⊗ 2 ¬λ L λ R (r 2 (o 2 , a 2 ))) → 2 r 1 (o 1 , a 1 )) ≥ 2 λ L ( o2∈B2 a1∈A1 (λ R (γ 2 (o 2 , a 1 ) ⊗ 2 ¬λ L λ R (r 2 (o 2 , a 2 ))) → 1 r 1 (o 1 , a 1 ))) = λ L ( a1∈A1 ( o2∈B2 (λ R (γ 2 (o 2 , a 1 ) ⊗ 2 ¬λ L λ R (r 2 (o 2 , a 2 )))) → 1 r 1 (o 1 , a 1 ))) = λ L ( a1∈A1 (τ (a 2 )(a 1 ) → 1 r 1 (o 1 , a 1 ))) = λ L (↓ 1 (τ (a 2 ))(o 1 ))</formula><p>Then let us define a multifunction β :</p><formula xml:id="formula_194">B 1 −→ (L 1 × L 2 ) A2 as follows β 2 (o 1 ) = ↑ 2 (σ(o 1 )) ( β t ) 1 (a 2 ) = ↓ 1 (τ (a 2 ))</formula><p>where σ and τ are multifunctions above. We see that</p><formula xml:id="formula_195">β 2 (o 1 ) is the intent of C 2 , ( β t ) 1 (a 2 ) is the extent of C 1 and moreover β(o 1 , a 2 ) ∈ FP λ , hence λ L (β 1 (o 1 , a 2 )) = β 2 (o 1 , a 2 ) and λ L (( β t ) 1 (a 2 )(o 1 )) = λ L (↓ 1 (τ (a 2 ))) ≤ 2 β 2 (o 1 , a 2 ) = λ L (β 1 (o 1 , a 2 )) = λ L λ R (↑ 2 (σ(o 1 ))(a 2 )) ≤ 2 ↑ 2 (σ(o 1 ))(a 2 ) = β 2 (o 1 )(a 2 )</formula><p>Therefore β is a λ-bond between C 1 and C 2 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Motivation example</head><p>Lets have two tables of the following data. First table of students, school subjects and study results. Second table of universities (or areas of study) and their requirements for results of students. We would like to find the assignment of students and universities that depends on study results and requirements of universities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>S Math Phi Chem Bio</head><formula xml:id="formula_196">Anna A A B C Boris C B A B Cyril D E B C U CS Tech Med Math Ex G W Phi G Ex G Chem W Ex Ex Bio W W Ex</formula><p>First table is filled by degrees from well known structure {A,B,C,D,E,F} where A is best and F means failed. Second one is filled by degrees {Ex,G,W} that means Ex-excelent, G-good, W-weak. Now lets define a λ-translation between such truth-degrees structures.</p><formula xml:id="formula_197">A B C D E F λ L (−) Ex G W W W W Ex G W λ R (−) A B C λ L , λ R</formula><p>is an isotone Galois connection. In fact, λ L , λ R is a residuationpreserving isotone Galois connection over Lukasiewicz logic, whose set of fixpoints is</p><formula xml:id="formula_198">FP λ = {(A, Ex); (B, G); (C, W)}</formula><p>The λ-direct product S∆ λ U is the following table that has 510 concepts. Lets simplify the table with translation (A,Ex) as 1, (B,G) as 0.5 and (C,W) as 0. 1 1 0.5 0 1 1 1 0.5 1 1 1 1 1 1 1 1 1 1 1 0.5 1 1 1 1 1 1 1 1 1 1 0.5 0 1 1 1 1 1 1 1 0.5 1 1 0.5 0 1 1 0.5 0 0 0.5 1 0.5 0.5 1 1 1 1 1 1 1 1 1 1 1 0.5 1 1 1 1 1 1 1 1 1 1 1 0 0.5 1 0.5 1 1 1 1 0.5 1 1 1 0 0.5 1 0.5 0 0.5 1 0.5 0 0 0.5 0 0.5 0.5 1 0.5 1 1 1 1 1 1 1 1 0.5 0.5 1 0.5 1 1 1 1 1 1 1 1 0 0 0.5 0 1 1 1 1 0.5 0.5 1 0.5 0 0 0.5 0 0 0 0.5 0 Extents of S∆ λ U are tables of the form students×universities and intents are tables of the form subjects×subjects. One of the concepts that their intents has 1 on diagonal (it means that any subject is assigned to itself) is shown below.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Med Tech CS</head><formula xml:id="formula_199">Anna B,G B,G A,Ex Boris A,Ex B,G C,W Cyril B,G B,G C,W Math Phi Chem Bio Math A,Ex A,Ex B,G C,W Phi B,G A,Ex A,Ex B,G Chem C,W B,G A,Ex B,G Bio C,W B,G A,Ex B,G</formula><p>Such concept should be translated into {1; 0.5; 0} structure.</p><p>Med Tech CS Anna 0.5 0.5 1 Boris 1 0.5 0 Cyril 0.5 0.5 0 Math Phi Chem Bio Math 1 1 0.5 0 Phi 0.5 1 1 0.5 Chem 0 0.5 1 0.5 Bio 0 0.5 1 0.5</p><p>Now we can see the result. Due to results of students and requirements of universities we can advise Anna to study Computer science; similarly, we can advise Boris to study Medicine or Technical area; finally, it is hard to advise anything to Cyril. The assignment is right as it is obvious from study results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Relaxing the connection</head><p>Let's change the λ-connection between such truth degrees structures as follows:</p><formula xml:id="formula_200">A B C D E F λ L (−) Ex G G W W W Ex G W λ R (−) A B D</formula><p>The set of fixpoints is FP λ = {(A, Ex); (B, G); (D, W)} such that is easy to translate (A, Ex) as 1, (B, G) as 0.5 and (D, W) as 0. The direct product is shown below, and has 104 concepts.</p><p>1 1 1 1 1 1 1 1 1 1 0.5 0.5 1 1 0.5 0.5 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0.5 0.5 1 1 0.5 0.5 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0.5 0.5 1 0.5 0.5 0.5 1 0.5 1 1 1 1 1 1 1 1 1 1 1 1 0.5 0.5 1 0.5 0.5 0.5 1 0.5 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0.5 0.5 1 1 0 0 0.5 0.5 0 0 0.5 0.5 0.5 0.5 1 1 1 1 1 1 1 1 1 1 0 0 0.5 0.5 0 0 0.5 0.5 0.5 0.5 1 1 1 1 1 1 1 1 1 1</p><p>We have chosen one with 1-diagonal in the intent.</p><formula xml:id="formula_201">Med Tech CS Anna B,G A,Ex A,Ex Boris A,Ex A,Ex B,G Cyril B,G B,G D,W Math Phi Chem Bio Math A,Ex A,Ex B,G B,G Phi A,Ex A,Ex A,Ex A,Ex Chem B,G B,G A,Ex B,G Bio B,G B,G B,G B,G</formula><p>Translating the context into {1; 0.5; 0} structure, we obtain Med Tech CS Anna 0.5 1 1 Boris 1 1 0.5 Cyril 0.5 0.5 0 Math Phi Chem Bio Math 1 1 0.5 0.5 Phi 1 1 1 0.5 Chem 0.5 0.5 1 0.5 Bio 0.5 0.5 0.5 0.5</p><p>It can seen that our advice is more generous but still coincide to input data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusion</head><p>We continue our study of the general notion of L-Chu correspondence by introducing the category CRL-ChuCors incorporating residuation to the underlying complete lattice L, specifically, on the basis of a residuation-preserving isotone Galois connection λ. Then, the L-bonds are generalized within this same framework, and its structure is related to that of the extent of a suitably defined λ-direct product. A first relationship between extents of λ-direct product have been proved; it is expected to find a proof of the stronger result which states an isomorphism between the extents of the λ-direct product and the λ-bonds between C 1 and C 2 . Potential applications are primary motivations for further future work, for instance, to consider possible classes of formal L-contexts induced from existing datamining notions, and study its associated categories. Abstract. The second order formal context is a formal context such that its object and attribute sets are disjoint unions of object and attribute sets of external formal contexts. Every subset of object or attribute set will be evaluated from concept lattice of corresponding external formal context. The paper provides a method how to compute such second order formal concepts by using of bonds between external formal contexts or by using of heterogeneous formal contexts methods. Last part of the paper shows how this structure generalizes homogenic fuzzy formal context and its derivation operators.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Formal Concept Analysis of higher order</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Motivation example</head><p>Imagine the following situation as a motivation. Lets have a group of people that everybody knows each other (schoolmates, co-workers, etc.). All of them are going to travel somewhere together and you (as an organizer of the trip) would like to know their requirements for accommodation. Consider the following formal context. Set of objects represents a group of co-workers (Anna, Bob, Cyril, David, Erik). Set of attributes expresses their requirements (TV, Wellness, Closeness to a city center, Restaurant in a hotel). An example of such context is in the following table. Lets denote the following table as P as preferences.</p><formula xml:id="formula_202">P TV W Ce R Anna • • • Bob • • • • Cyril • • • • David • • • Erik • • • •</formula><p>A particular formal concept of the given context describes a set of co-workers such that these people together have a common requirements for accommodation.</p><p>In addition, there are another two formal contexts. The first one describes a friendship relation inside the group of such people (denoted as F). The second one describes a situation about hotels and services they offer (denoted as H). </p><formula xml:id="formula_203">F Anna Bob Cyril David Erik Anna • • • Bob • • • • • Cyril • • • • • David • • • • Erik • • • • H TV W C R H1 • • • • H2 • • • H3 • H4 • • •</formula><p>All contexts are filled by truth degrees from the following set {• = true, • = middle, " " = false}. Computing of L-concepts is based on Lukasiewicz logic. Now, we aim at connecting such table data with known intercontextual mechanisms in order to obtain closed sets of friends from F that are able to stay in any of a closed set of hotels from H. The hotels of this closed set offer as much requirements from P as it gets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Basics</head><p>Formal Concept Analysis (FCA) as an applied Lattice Theory <ref type="bibr">[7]</ref> has become a very useful tool for discovering of hidden knowledge inside a data of objectattribute table, so called formal contexts. Fundamental construction of FCA is a Galois connection between complete lattices of all subsets of objects and attributes. A Galois connection consists of two mappings such that a composition of these mappings form a closure operators on each subsets of complete lattice. Pair of closed subset of objects and subset of attributes connected to each other by the Galois connection is called formal concept. The set of formal concepts forms a complete lattice. The mentioned notions were generalized over a fuzzy logic based on a complete residuated lattice. The notions of order, Galois connection and complete lattice were also generalized by Bělohlávek in <ref type="bibr">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr">[5]</ref><ref type="bibr">[6]</ref>.</p><p>Definition 1. Complete residuated lattice is an algebra L, ∧, ∨, 0, 1, ⊗, → , where -L, ∧, ∨, 0, 1 is a complete lattice with top 1 and bottom 0, -L, ⊗, 1 is a commutative monoid, -⊗, → is an adjoint pair, i.e. Lemma 1. Let ↑, ↓ be a pair of derivation operators defined on an L-fuzzy formal context B, A, r . A pair ↑, ↓ forms a Galois connection between complete lattices of all L-sets of objects L B and attributes L A . Definition 4. Let C = B, A, r be an L-fuzzy formal context. Formal concept is a pair of L-sets f, g ∈ L B × L A such that ↑ (f ) = g and ↓ (g) = f . The set of all L-concepts of C will be denoted by FCL(C). Object or attribute part of any concept is called extent or intent. Sets of all extents or intents of C will be denoted as Ext(C) or Int(C), respectively.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Bonds and Chu correspondences</head><p>FCA provides the useful methods how to connect two formal contexts. A structure of the so called Chu correspondence was introduced by Mori <ref type="bibr">[13,</ref><ref type="bibr">14]</ref> that is very close to the notion of bond <ref type="bibr">[7]</ref>. The notions of Chu correspondence and bond were extended into L-fuzzy Chu correspondence and L-bond in <ref type="bibr">[8]</ref>. The corresponding notions are introduced now.</p><formula xml:id="formula_204">Definition 5. Let C i = B i , A i , r i for i ∈ {1, 2} be two L-fuzzy formal contexts. Pair of L-multimappings ϕ = ϕ L , ϕ R such that -ϕ L : B 1 −→ Ext(C 2 ), -ϕ R : A 2 −→ Int(C 1 ), where ↑ 2 (ϕ L (o 1 ))(a 2 ) =↓ 1 (ϕ R (a 2 ))(o 1 ) for any (o 1 , a 2 ) ∈ B 1 × A 2 ,</formula><p>is said to be an L-Chu correspondence between C 1 and C 2 . Set of all L-Chu correspondences between L-contexts C 1 and C 2 will be denoted by L-ChuCors(C 1 , C 2 ).</p><formula xml:id="formula_205">Definition 6. Let C i = B i , A i , r i for i ∈ {1, 2} be two L-fuzzy formal contexts. L-multimapping β : B 1 −→ Int(C 2 ), such that β t : A 2 −→ Ext(C 1 ), where β t (a 2 )(o 1 ) = β(o 1 )(a 2 ) for any (o 1 , a 2 ) ∈ B 1 × A 2 ,</formula><p>is said to be an L-bond. Set of all L-bonds beyween L-contexts C 1 and C 2 will be denoted by</p><formula xml:id="formula_206">L-Bonds(C 1 , C 2 ). Lemma 2. Let C i = B i , A i , r i for i ∈ {1, 2} be two L-fuzzy formal contexts. Each set L-Bonds(C 1 , C 2 ) and L-ChuCors(C 1 , C 2 )</formula><p>forms a complete lattice and, moreover, there exists a dual isomorphism between them.</p><p>The dual isomorphism between bonds and Chu correspondences is based on the following construction. Consider two L-fuzzy formal contexts</p><formula xml:id="formula_207">C i = B i , A i , r i for i ∈ {1, 2} and let β ∈ L-Bonds(C 1 , C 2 ), then ϕ βL , ϕ βR such that for any (o 1 , a 2 ) ∈ B 1 × A 2 ϕ βL (o 1 ) =↓ 2 (β(o 1 )) and ϕ βR (a 2 ) =↑ 1 (β t (a 2 )) is an L-Chu correspondence from L-ChuCors(C 1 , C 2 ).</formula><p>On the other hand, let ϕ ∈ L-ChuCors(C 1 , C 2 ). Then β ϕ defined as</p><formula xml:id="formula_208">β ϕ (o 1 )(a 2 ) =↓ 1 (ϕ R (a 2 ))(o 1 ) =↑ 2 (ϕ L (o 1 ))(a 2 ) for any (o 1 , a 2 ) ∈ B 1 × A 2 is an L-bond from L-Bonds(C 1 , C 2 ).</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Categorical relationship to fuzzy Galois connection</head><p>Categories ChuCors and L-ChuCors of classical or fuzzy formal contexts and classical or fuzzy Chu correspondences are described in <ref type="bibr">[9,</ref><ref type="bibr">13]</ref>. Important categorical property of * -autonomism is also proved in mentioned papers. The continuation of categorical research in <ref type="bibr">[10]</ref> resulted in a categorical equivalence of L-ChuCors and a category L-CLLOS of so called completely lattice L-ordered sets and monotone fuzzy Galois connections. Equivalence is proved by constructing of equivalence functor between these categories.</p><p>Definition 7. Lets define a functor Γ : L-ChuCors −→ L-CLLOS in the following way:</p><formula xml:id="formula_209">1. Γ (C) = L-FCL(C), ≈ , for any L-context C 2. Γ (ϕ) = λ ϕ L , λ ϕ R for any ϕ ∈ L-ChuCors(C 1 , C 2 ) such that λ ϕ L : FCL(C 1 ) −→ FCL(C 2 ) and λ ϕ R : FCL(C 2 ) −→ FCL(C 1 ) λ ϕ L ( f, ↑ 1 (f ) ) = ↓ 2 ↑ 2 (ϕ L+ (f )), ↑ 2 (ϕ L+ (f )) λ ϕ R ( ↓ 2 (g), g ) = ↓ 1 (ϕ R+ (g)), ↑ 1 ↓ 1 (ϕ R+ (g)) for any two L-concepts f, ↑ 1 (f ) ∈ FCL(C 1 ) and ↓ 2 (g), g ∈ FCL(C 2 ),</formula><p>where for any multifunction ω :</p><formula xml:id="formula_210">X −→ L Y is ω + : L X −→ L Y defined as ω + (f )(y) = x∈X f (x) ⊗ ω(x)(y) for any f ∈ L X and y ∈ Y .</formula><p>In <ref type="bibr">[10]</ref> is proved that Γ is the equivalence functor. Hence, it holds for the particular two L-concepts that</p><formula xml:id="formula_211">f, ↑ 1 (f ) 1 λ ϕ R ( ↓ 2 (g), g ) = λ ϕ L ( f, ↑ 1 (f ) ) 2 ↓ 2 (g), g . Lemma 3. Consider two L-contexts C i = B i , A i , r i for i ∈ {1, 2} and let ϕ ∈ L-ChuCors(C 1 , C 2 ). A functor Γ (ϕ) is a fuzzy Galois connection between FCL(C 1 ), ≈ 1 , 1 and FCL(C * 2 ), ≈ 2 , 2 where C * 2 = A 2 , B 2 , r t 2 .</formula><p>Proof. Due to order reversing of dual L-context C * 2 for any two L-concepts we obtain f,</p><formula xml:id="formula_212">↑ 1 (f ) 1 λ ϕ R ( ↓ 2 (g), g ) = ↓ 2 (g), g 2 λ ϕ L ( f, ↑ 1 (f ) ) .</formula><p>3 Formal concept analysis of second order</p><p>Once we have introduced preliminaries, the formal context of second order and the corresponding results are presented now in details.</p><p>Definition 8. Consider two non-empty index sets I and J and an L-fuzzy formal context i∈I B i , j∈J A j , r , whereby</p><formula xml:id="formula_213">-B i1 ∩ B i2 = ∅ for any i 1 , i 2 ∈ I, -A j1 ∩ A j2 = ∅ for any j 1 , j 2 ∈ J, -r : i∈I B i × j∈J A j −→ L.</formula><p>Moreover, consider two non-empty sets of L-contexts notated</p><formula xml:id="formula_214">-{C i = B i , T i , p i : i ∈ I} -{D j = O j , A j , q j : j ∈ J}. Formal context of second order is a tuple i∈I B i , {C i ; i ∈ I}, j∈J A j , {D j ; j ∈ J}, (i,j)∈I×J r i,j , where r i,j : B i × A j −→ L defined as r i,j (o, a) = r(o, a) for any o ∈ B i and a ∈ A j .</formula><p>In what follows, consider the below used notation. Lets have an L-set f :</p><formula xml:id="formula_215">i∈I X i −→ L for a non-empty universe set X = i∈I X i , where X i1 ∩ X i2 = ∅ for any i 1 , i 2 ∈ I. Then f i : X i −→ L is defined as f i (x) = f (x) for an arbitrary x ∈ X i and i ∈ I.</formula><p>With the help of functor Γ , we define the mappings between products of fuzzy concept lattices of objects and attributes formal contexts of the following form: Definition 9. Lets define the mappings ⇑, ⇓ as follows</p><formula xml:id="formula_216">⇑: i∈I FCL(C i ) −→ j∈J FCL(D j ) and ⇓: j∈J FCL(D j ) −→ i∈I FCL(C i ) ⇑ (Φ) j = i∈I λ ijL (Φ i ), for any Φ ∈ i∈I FCL(C i ) ⇓ (Ψ ) i = j∈J λ ijR (Ψ j ), for any Ψ ∈ j∈J FCL(D j ) such that λ ij = λ ijL , λ ijR = Γ (ϕ ρij ), where ρ ij = {β ∈ L-Bonds(C i , D j ) : (∀(o i , a j ) ∈ B i × A j )β(o i )(a j ) ≤ r ij (o i , a j )}. Lemma 4. Let { f, g } ∪ { f k , g k : k ∈ K} be a non-empty set of L-concepts of any L-context and K be a non-empty index set. Then f, g k∈K f k , g k = k∈K ( f, g f k , g k ).</formula><p>Proof. Let the L-context be of the form B, A, r . Hence</p><formula xml:id="formula_217">f, g k∈K f k , g k = o∈B f (o) → k∈K f k (o) = o∈B f (o) → k∈K f k (o) = k∈K o∈B f (o) → f k (o) = k∈K f, g f k , g k .</formula><p>Lemma 5. Pair of mappings ⇑, ⇓ forms a Galois connection between complete lattices i∈I FCL(C i ), I and j∈J FCL(D j ), J . Proof. Proof is provided in fuzzy ordering as a generalization of classical one.</p><formula xml:id="formula_218">Ψ J ⇑ (Φ) = j∈J (Ψ j j ⇑ (Φ) j ) = j∈J Ψ j j i∈I λ ijL (Φ i ) = i∈I j∈J (Ψ j j λ ijL (Φ i )) = i∈I j∈J (Φ i i λ ijR (Ψ j )) = i∈I Φ i i j∈J λ ijR (Ψ j ) = i∈I (Φ i i ⇓ (Ψ ) i ) = Φ I ⇓ (Ψ ).</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Simplification</head><p>In this subsection will be presented a method that simplifies the previous consideration.</p><formula xml:id="formula_219">Definition 10. Let C i = B i , A i , r i for i ∈ {1</formula><p>, 2} be two L-fuzzy contexts and let β be an arbitrary L-bond between C 1 and C 2 . Consider the following pair of mappings ↑ β :</p><formula xml:id="formula_220">L B1 −→ L A2 and ↓ β : L A2 −→ L B1 such that ↑ β (f )(a) = o∈B1 (f (o) → β(o)(a)), ↓ β (g)(o) = a∈A2 (g(a) → β(o)(a))</formula><p>for any f ∈ L B1 and g ∈ L A2 . Lemma 6. Let C i = B i , A i , r i for i ∈ {1, 2} be two L-fuzzy contexts and let β be an arbitrary L-bond between C 1 and C 2 . A pair ↑ β , ↓ β forms a Galois connection between complete lattices Ext(C 1 ), ≤ and Int(C 2 ), ≤ , where ≤ is ordering based on fuzzy sets inclusion.</p><p>Proof. Proof of the fact that ↑ β , ↓ β forms a Galois connection between L B1 , ≤ and L A2 , ≤ is simple, ↑ β , ↓ β is a pair of derivation operators for L-context B 1 , A 2 , β r , where binary L-relation β r is defined as</p><formula xml:id="formula_221">β r (o 1 , a 2 ) = β(o 1 )(a 2 )</formula><p>. Now, we will show that ↑ β , ↓ β is a pair of mappings between complete lattices of extents and intents of C 1 and C 2 , respectively. First, let f be an extent of C 1 .</p><formula xml:id="formula_222">↑ β (f )(a) = o∈B1 (f (o) → β(o)(a)) = o∈B1 (f (o) →↑ 2 (ϕ βL (o))(a)) = o∈B1 f (o) → b∈B2 (ϕ βL (o)(b) → r 2 (b, a)) = b∈B2 o∈B1 (f (o) → (ϕ βL (o)(b) → r 2 (b, a))) = b∈B2 o∈B1 ((ϕ βL (o)(b) ⊗ f (o)) → r 2 (b, a))) = b∈B2 o∈B1 (ϕ βL (o)(b) ⊗ f (o)) → r 2 (b, a)) = b∈B2 (ϕ βL+ (f )(b) → r 2 (b, a))) =↑ 2 (ϕ βL+ (f ))(a). So ↑ β (f ) is an intent of C 2 .</formula><p>Proof of ↓ β (g) is an extent of C 1 is easy to obtain similarly with equality</p><formula xml:id="formula_223">β(o)(a) =↓ 1 (ϕ βR (o))(a).</formula><p>We define an L-context such that its L-concept lattice is isomorphic to a complete lattice of all second order formal concepts. Definition 11. Let K be a second order formal context of the form</p><formula xml:id="formula_224">K = i∈I B i , {C i : i ∈ I}, j∈J A j , {D j : j ∈ J}, (i,j)∈I×J r ij . Lets define an L-context K K = i∈I B i , j∈J A j , (i,j)∈I×J ρ ij ,</formula><p>where</p><formula xml:id="formula_225">ρ ij = {β ∈ L-Bonds(C i , D j ) : (∀(o i , a j ) ∈ B i × A j )β(o i )(a j ) ≤ r ij (o i , a j )}. Lemma 7. Concept lattices of K and K are isomorphic. Proof. Let Φ, Ψ be an L-concept of K and o ∈ B i . Φ i (o) = (↓ K (Ψ )) i (o) = j∈J a∈Aj (Ψ j (a) → ρ ij (o)(a)) = j∈J a∈Aj (Ψ j (a) →↓ i (ϕ ρij R (a))(o)) = j∈J ↓ i (ϕ ρij R+ (Ψ j ))(o). Φ i = (↓ K (Ψ )) i = j∈J ↓ i (ϕ ρij R+ (Ψ j )) = j∈J ext(λ ϕρ ij R (Ψ j )) = ext j∈J λ ϕρ ij R (Ψ j ) = ext(⇓ (Ψ ) i ),</formula><p>Formal Concept Analysis of higher order where Ψ j = ↓ j (Ψ j ), Ψ j for any j ∈ J. Then Φ =⇓ (Ψ ) and Φ, Ψ is a second order concept of K.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Motivation example -solution</head><p>The motivation example introduced in Section 1 can be considered as the second order formal context {Anna,Bob,Cyril,David,Eva}, F, {TV,W,Ce,R}, H, r , whereby r represents the L-relation from P. Firstly, we find a bond ρ that is the closest to r.</p><formula xml:id="formula_226">P TV W Ce R Anna • • • Bob • • • • Cyril • • • • David • • • Erik • • • • ρ(P) TV W Ce R Anna • • • Bob • • • • Cyril • • • • David • Erik •</formula><p>There are just six (instead of twenty-eight L-concepts of P) L-concepts of ρ(P) such that we can easily convert into the form of second order concepts. The following table contains the list of the all second order concepts.</p><formula xml:id="formula_227">concepts of F concepts of H {•/A, •/B, •/C, •/D, •/E} {•/TV, •/W, •/Ce, •/R} {•/A, •/B, •/C, •/D, •/E} {•/H1, /H2, •/H3, •/H4} {•/A, •/B, •/C, •/D, •/E} { /TV, /W, •/Ce, /R} { /A, •/B, •/C, /D, /E} {•/H1, •/H2, •/H3, •/H4} {•/A, •/B, •/C, •/D, •/E} {•/TV, /W, •/Ce, •/R} {•/A, •/B, •/C, /D, /E} {•/H1, /H2, •/H3, •/H4} {•/A, •/B, •/C, /D, /E} {•/TV, /W, •/Ce, •/R} {•/A, •/B, •/C, /D, /E} {•/H1, /H2, /H3, •/H4} {•/A, •/B, •/C, /D, /E} {•/TV, •/W, •/Ce, •/R} {•/A, •/B, •/C, •/D, •/E} {•/H1, /H2, /H3, •/H4} { /A, •/B, •/C, /D, /E} {•/TV, •/W, •/Ce, •/R} {•/A, •/B, •/C, •/D, •/E} {•/H1, /H2, /H3, /H4}</formula><p>The first concept can be interpreted as follows. Friends Bob and Cyril with their common requirements should stay in hotel H1. They should stay also in H3 and H4 with a little relaxation of their requirements. The fourth concept is saying that Anna as a very lonely person should stay in H1 or H4. The second concept includes the whole group of co-workers who have very poor common requirements. Thus, all people should stay in an arbitrary hotel together.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Connection to heterogeneous formal contexts</head><p>The fruitful idea is to view the second order formal context in terms of a heterogeneous formal context proposed in <ref type="bibr">[2]</ref>. The corresponding notions of the underlying structures are introduced now. Definition 12. Heterogeneous formal context is a tuple B, A, P, R, U, V, , where -B and A are non-empty sets,</p><formula xml:id="formula_228">-P = { P b,a , ≤ P b,a : (b, a) ∈ B × A} is a system of posets, -R is a mapping from B × A such that R(b, a) ∈ P b,a for any b ∈ B and a ∈ A, -U = { U b , ≤ U b : b ∈ B} and V = { V a , ≤ Va : a ∈ A} are systems of complete latices, - = {• b,a : (b, a) ∈ B × A} is a system of isotone and left-continuous mappings • b,a : U b × V a −→ P b,a .</formula><p>Lets describe our situation in terms of heterogeneous formal contexts. Below is the translation:</p><p>-B and A will be the index sets I and J, -complete lattices U i or V j for any (i, j) ∈ B × A = I × J will be the complete lattices Ext(C i ), ≤ and Int(D j ), ≤ , -P i,j will be a complete lattice of all fuzzy relations from L Bi×Aj , -any value of relation r will be a binary relation</p><formula xml:id="formula_229">r(i, j) = r i,j ∈ L Bi×Aj , -operation • i,j : Ext(C i ) × Int(D j ) −→ L Bi×Aj is defined as (f • i,j g)(b, a) = f (b) ⊗ g(a)</formula><p>for any f ∈ Ext(C i ) and g ∈ Int(D j ) and any (b, a) ∈ B i × A j . The mapping • i,j is isotone due to isotonicity of ⊗.</p><formula xml:id="formula_230">Lemma 8. The mapping • i,j is left-continuous. Proof. Let (f k • g)(b, a) = f k (b) ⊗ g(a) ≤ m for all k ∈ K and for some (b, a) ∈ B × A and m ∈ L. It is equivalent to inequality f k (b) ≤ g(a) → m for all k ∈ K. Hence, k∈K f k (b) ≤ g(a) → m and it is equivalent to k∈K f k • g (b, a) = k∈K f k (b) ⊗ g(a) ≤ m.</formula><p>Proof of left-continuity of the second argument is similar.</p><p>Definition 13. Lets define a pair of derivation operators , of the following form : i∈I Ext(C i ) → j∈J Int(D j ) and : j∈J Int(D j ) → i∈I Ext(C i ) defined for heterogeneous formal context mentioned above as follows:</p><formula xml:id="formula_231">(Φ) j = {g ∈ Int(D j ) : (∀i ∈ I)Φ i • i,j g ≤ r i,j } (Ψ ) i = {f ∈ Ext(C i ) : (∀j ∈ J)f • i,j Ψ j ≤ r i,j } for any Φ ∈ i∈I Ext(C i ) and any Ψ ∈ j∈J Int(D j ). Lemma 9. Let K = i∈I B i , {C i ; i ∈ I}, j∈J A j , {D j ; j ∈ J}, (i,j)∈I×J r i,j be a second order formal context. Then ↑ K (Φ) ≤ (Φ) and ↓ K (Ψ ) ≤ (Ψ ) for any Φ ∈ i∈I Ext(C i ) and Ψ ∈ j∈J Int(D j ).</formula><p>Proof. Let j ∈ J be arbitrary.</p><formula xml:id="formula_232">↑ K (Φ) j (a) = i∈I o∈Bi (Φ i (o) → ρ ij (o)(a)) = {g ∈ Int(D j ) : (∀i ∈ I)(∀o ∈ B i )Φ i (o) ⊗ g(a) ≤ ρ ij (o)(a)}. Then ↑ K (Φ) j = {g ∈ Int(D j ) : (∀i ∈ I)(∀o ∈ B i )Φ i • ij g ≤ ρ ij } because of ρ ij ≤ r ij ≤ {g ∈ Int(D j ) : (∀i ∈ I)(∀o ∈ B i )Φ i • ij g ≤ r ij } = (Φ) j .</formula><p>Hence ↑ K (Φ) ≤ (Φ). Similarly for ↓ K and .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Connections to standard homogenic fuzzy operators</head><p>In this part, we focus on an appropriate generalization of the standard homogenic fuzzy formal concept derivation operators in two different ways.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.1">Singleton connection</head><p>Lemma 10. Lets have an L-fuzzy formal context {x}, L, λ , where for an arbitrary</p><formula xml:id="formula_233">k ∈ L is ⊥ x = λ(x, k) = k. Any value k ∈ L is an extent of ⊥ x .</formula><p>Proof. Let k be an arbitrary value from L. Similarly for ↓ K =↓.</p><formula xml:id="formula_234">↓↑ (k)(x) = m∈L (↑ (k)(m) → m) = m∈L ( x∈{x} (k → m) → m) = m∈L:m≥k (1 → m) ∧ m∈L:m&lt;k ((k → m) → m) = m∈L:m≥k m ∧ m∈L:m&lt;k ((k → m) → m) = m∈L:m≥k m = k (L is a complete lattice) (k → m) → m ≥ k (closure property) m∈L:m&lt;k ((k → m) → m) ≥ k = k So ↓↑ (k) = k for any k ∈ L.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.2">= connection</head><p>Moreover, an another connection is presented in this subsection. The connection is based on the fact that concept lattice of X, X, = is isomorphic to L X in the case that L is closed under double negation law.</p><p>Lemma 12. Lets have an L-fuzzy formal context X = X, X, = , where L is closed under double negation law. Then any L-set from L X is closed in X . Proof. Index sets I and J are singletons in this case. So due to previous lemma</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proof. Lets have an arbitrary</head><formula xml:id="formula_235">L-set f ∈ L X . ↑ (f )(x) = y∈X (f (y) → (y = x)) = y∈X:y =x (f (y) → 1) ∧ (f (x) → (x = x)) = 1 ∧ ¬f (x) = ¬f (x) Then ↓↑ (f )(x) = ¬¬f (x) = f (x).</formula><formula xml:id="formula_236">Φ ∈ Ext(B) = L B . ⇑ (Φ) =↑ ρ (f ) where ρ = {β ∈ L-Bonds(B, A) : β ≤ r}.</formula><p>Because of the previous lemma we know that any row and column or r is closed in B and A, respectively. Hence r ∈ L-Bonds(B, A) and r = ρ.</p><p>Finally ↑ K =↑. Similarly for ↓ K =↓.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>AOC-posets: a scalable alternative to Concept</head><p>Lattices for Relational Concept Analysis Xavier Dolques Based on FCA, it produces more results than the latter but also an increase in complexity. Besides, in numerous applications of FCA, AOC-posets are used rather than lattices in order to reduce combinatorial problems. An AOC-poset is a subset of the concept lattice considering only concepts introducing an object or an attribute. AOC-posets are much smaller and easier to compute than concept lattices and still contain the information needed to rebuild the initial data. This paper introduces a modication of the RCA process based on AOC-posets rather than concept lattices. This work is motivated by a big set of relational data on river streams to be analysed. We show that using AOC-poset on these data provides a reasonable concept number.</p><p>1 Introduction</p><p>Relational Concept Analysis (RCA) <ref type="bibr">[1]</ref> is based on iterative use of the classical Formal Concept Analysis algorithm to handle relational data: formal objects are described with formal attributes as in FCA, and with their relationships with other formal objects. Because RCA groups formal objects using relationships to formal objects at any distance, it often comes with a combinatorial explosion, and patterns of interest are dicult to extract from the huge set of built concepts.</p><p>Various strategies can be used to cope with this complexity, including separating the initial formal object sets into smallest ones after a rst analysis, or introducing queries <ref type="bibr">[2]</ref>. Here we propose to adapt the RCA process in order to use only posets of concepts introducing objects or attributes (AOC-poset) rather than to build full concept lattices at each step of the process. Indeed AOC-posets are smaller and easier to compute than concept lattices <ref type="bibr">[3]</ref> and their sets of concepts have interesting properties for extracting implication rules. The context of this research is the FRESQUEAU project 1 which aims at developing new methods for studying, comparing and exploiting all the parameters available concerning streams and water areas. The data we deal with have been collected during 3 years over 40 sites in the Alsace plain. Two other data sets are available on the Rhin-Meuse district (North-east of France, 3400 sites, 10 years) and on the Rhône-Méditerranée district (South-east of France, 18000 sites, 40 years). In a previous work, FCA has been used for classifying characteristics of aquatic species <ref type="bibr">[4]</ref>. RCA is now used for discovering relationships between those species characteristics and the characteristics of their habitat.</p><p>To perform this analysis, we propose to adapt RCA relying on AOC-poset. We show that this approach provides a reasonable concept number in our case.</p><p>The paper is organized as follows. Section 2 gives some useful denitions for our presentation. Section 3 details the RCA process based on AOC-poset. Section 5 presents the data set and results that can be obtained with AOCposets. Related work is presented in section 6 and section 7 concludes the paper opening some perspectives of this work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">FCA Basics</head><p>Formal Concept Analysis (FCA) <ref type="bibr">[5]</ref> aims at extracting an ordered set of concepts from a dataset, called a Formal Context, composed of objects described by attributes. We will denote by K = (G, M, I) a formal context, where </p><formula xml:id="formula_237">I ⊆ G × M.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>× ×</head><p>Ani.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>× × ×</head><p>Ano.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>×</head><p>Ant.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>× × ×</head><p>Aph.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>× × ×</head><p>Ase.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>× × ×</head><p>Ath.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>× × × ×</head><p>describes animals by characteristics they may own. The considered animals here are macro-invertebrates that can be found in rivers. We took the examples of the following kinds of animals : Ancylus (Anc.), Anisus (Ani.), Anodonta (Ano.), Anthomyiidae (Ant.), Aphelocheirus (Aph.), Asellus (Ase.) and Athericidae (Ath.).</p><p>Given a K = (G, M, I) formal context, a formal concept is a C = (Extent(C), Intent(C)) pair where:  For simplicity's sake, most lattice representations show attributes (resp. objects) solely where they are introduced. They are said to show the simplied intents and simplied extents which will be denoted respectively Intent S (C) and Extent S (C) for a given concept C.</p><formula xml:id="formula_238">Extent(C) = {g ∈ G|∀m ∈ Intent(C), (g, m) ∈ I} is the extent of the concept, Intent(C) = {m ∈ M|∀g ∈ Extent(C), (g, m) ∈ I} is the intent of the concept. Given two formal concepts C 1 = (E 1 , I 1 ) and C 2 = (E 2 , I 2 ) of K, the concept specialization order ≤ s is dened by C 1 = (E 1 , I 1 ) ≤ s C 2 = (E 2 , I 2 ) if and only if E 1 ⊆ E 2 (and equivalently I 2 ⊆ I 1 ).</formula><p>Let C K be the set of all concepts of a K formal context. This set of concepts provided with the (C K , ≤ s ) specialization order has a lattice structure, and is called the concept lattice associated with K.</p><p>Left-hand side of Fig. <ref type="figure" target="#fig_0">1</ref> shows the concept lattice associated with the formal context of Table <ref type="table" target="#tab_0">1</ref>. In several FCA applications (e.g. in <ref type="bibr">[3,</ref><ref type="bibr">6]</ref>; only the object concepts (which introduce at least one object) and the attribute concepts (which introduce at least one attribute) are used. In Fig. <ref type="figure" target="#fig_0">1</ref> (left-hand side), ca_5 and ca_8 are examples of object concepts; ca_1 and ca_2 are examples of attribute concepts; ca_9, ca_10 and ca_11 do not introduce any object or any attribute.</p><p>The so-called AOC-poset (for Attribute-Object-Concept poset) is the suborder of (C K , ≤ s ) restricted to object-concepts and attribute-concepts. It is also called Galois Sub-Hierarchy, a term we consider less explicit. Right-hand side of Fig. <ref type="figure" target="#fig_0">1</ref> shows the AOC-poset for the context of Table <ref type="table" target="#tab_0">1</ref>. One may have a large dierence of complexity between the two structures, because the concept lattice may have 2 min(|G|,|M|) concepts, while the number of concepts in the AOC-poset is bounded by |G| + |M|. </p><formula xml:id="formula_239">K = {K i } i=1,...,n is a set of K i = (G i , M i , I i ) contexts R = {r j } j=1,...,m is a set of r j relations where r j ⊆ G i1 × G i2 for some i 1 , i 2 ∈ {1, . . . , n}.</formula><p>An example of a RCF is composed of an Animal context, denoted K Animals (Table <ref type="table" target="#tab_0">1</ref>), a Site context, denoted K Sites (Table at the left-hand side of Fig. <ref type="figure" target="#fig_1">2</ref>), and a contains relation, denoted r contains (Table <ref type="table" target="#tab_2">2</ref>). Sites are determined by locations on a river where samples are done; two kinds of samples are here considered: physico-chemical samples that measure physical and chemical properties of the water (e.g. temperature or presence of a chemical compound) and biological samples that measure the level of life. </p><formula xml:id="formula_240">× × × Site1 × × × × Site2 × × × × Site3 × × ×</formula><p>When objects of a category (e.g. Sites) are connected to objects of another category (e.g. Animals) via a relation (e.g. contains), concepts formed on top of objects of the latter category can be used to form concepts on top of objects of the former category. Let us for example consider the AOC-poset of the righthand side of Fig. <ref type="figure" target="#fig_0">1</ref> and the ca_8 concept which groups animals with a transversal distribution on banks (Att5), namely Ancylus (Anc.), Anisus (Ani.) and Asellus (Ase.). Now Site1, Site2 and Site3 can be grouped because they contain at least one animal with Att5, that is at least one animal in Extent(ca_8), e.g. Ancylus (Anc.) for Site 1 (Table <ref type="table" target="#tab_2">2</ref>). In RCA, this relationship between objects of a category and concepts formed on objects of another category is implemented thanks to scaling operators. This results in the creation of special attributes called relational attributes. For a given r relation in a given analysis, its associated scaling operator is denoted by ρ(r). Now, since we rely on AOC-posets, the existential scaling operator is dened slightly dierently from <ref type="bibr">[7]</ref>. Nevertheless the reference <ref type="bibr">[7]</ref> can be read to have more details on the RCA process which is simplied below for space reasons.</p><formula xml:id="formula_241">NH4 SO4 Site0 × × Site1 × Site2 × × Site3 cs_0 SO4 Site1 cs_1 Site3 cs_2 NH4 Site0 Site2</formula><p>Denition 2 (Existential scaling operator). Let K = (G, M, I) be a context, and r a relation, where G is the domain of r, G ir is the range of r, and K ir = (G ir , M ir , I ir ) is another context. Let also C ir be a set of concepts<ref type="foot" target="#foot_29">2</ref> built on K ir . The S ∃ existential scaling operator is applied to the context K, denoted by S ∃ (K, r, C ir ) = K + = (G + , M + , I + ), with:</p><formula xml:id="formula_242">I + = {(o, ∃r(C)) | o ∈ G, C ∈ C ir , r(o) ∩ Extent(C) = ∅}</formula><p>Table <ref type="table" target="#tab_3">3</ref> shows S ∃ (K Sites , contains, C Animals ) where C Animals is the set of concepts of the AOC-poset of right-hand side of Fig. <ref type="figure" target="#fig_0">1</ref>. In this case I + contains (Site3, ∃ contains(ca_5)) and (Site3, ∃ contains(ca_7)) because Site3 contains one animal from the extent of these two concepts. </p><formula xml:id="formula_243">∃contains ca_0 ca_1 ca_2 ca_3 ca_4 ca_5 ca_6 ca_7 ca_8 Site0 × × × × × × Site1 × × × × × × × Site2 × × × × × × × × Site3 × × × × ×</formula><p>Then, for each K context of K, the apposition of K (denoted by symbol '|') with the respective results of the scaling upon each r j of R with G as domain (1 ≤ j ≤ k) and the chosen ρ(r j ), is used to build a new set of concepts (notations are taken from Def. 2). This apposition is the relational extension of the K context considering ρ and a set of concepts C which is a union of concept sets including C ir j , 1 ≤ j ≤ k:</p><formula xml:id="formula_244">E ρ,C (K) = K | S ρ(r1) (K, r 1 , C ir 1 ) | . . . | S ρ(r k ) (K, r k , C ir k )</formula><p>By extension, E * ρ,C (K) denotes the relational extension of K, which is composed of all the relational extensions of all K i in K (and C is a union of concept sets associated with all ranges of all relations).</p><formula xml:id="formula_245">E * ρ,C (K) = {E ρ,C (K 1 ), . . . , E ρ,C (K n )}.</formula><p>For example a relational extension of our K example is composed of Table <ref type="table" target="#tab_0">1</ref> (no outgoing relation), and the left table of Fig. <ref type="figure" target="#fig_1">2</ref> apposed to Table <ref type="table" target="#tab_3">3</ref>. The AOC-poset built from this extended context is shown on gure 3. Now a whole construction process consists in building a (possibly innite) sequence of contexts and AOC-posets associated with (K, R) and ρ. The rst set of contexts (step 0) is K 0 = K. The contexts of step p are used to build the associated AOC-posets. The C p set composed of the sets of the concepts of AOC-posets at step p is used to calculate the relational extension. The set of contexts at step p+1 is dened using the relational extension:</p><formula xml:id="formula_246">K p+1 = E * ρ,Cp (K).</formula><p>Considering independently the contexts: for some i ∈ {1, . . . , |K|} the i-th context at the step p + 1 is the relational extension of the context of the same rank with the concepts from step p:</p><formula xml:id="formula_247">K 0 i = K i , K p+1 i = E ρ,Cp (K i ).</formula><p>The dierence here with classical RCA is that we rely on K i and concepts of the AOC-posets of step p to build K p+1 i , rather than on K p i and lattices of step p. In our example, K 0 = (K Animals , K Sites ) and R = {contains} (see Table <ref type="table" target="#tab_2">2</ref> In this simple example, the following steps do not produce any new concept (a x-point is reached). This process will be denoted by RCA-AOC in the following. <ref type="bibr">4</ref> Extracting Implication Rules Implication rules are implications that are veried by the whole data set considered. Some implication rules can be extracted from the AOC-poset concepts by considering their simplied intent. An attribute a from the simplied intent of a concept C is an attribute that is not contained in the intent of any concept more general than C i.e. the set of all the objects sharing a is the extent of C. The objects from the extent also all share the attributes of the full intent of C, but they may not be the only ones. By consequence, for every object o in the data set the presence of a for a given object o implies the presence of all the attributes from the intent of C.</p><p>For instance in Fig. <ref type="figure" target="#fig_0">1</ref> we can consider the concept ca_7. Intent(ca_7) = {Att1 , Att0 , Att5 } and Intent S (ca_7) = {Att1 } which means that in all the dataset the rule Att1 → Att0 ∧ Att5 is veried.</p><p>All the concepts with no empty simplied intent can be found in the AOCposet meaning that all the rules having one element at the left hand side can be found with an AOC-poset.</p><p>Extracting rules from an existing AOC-poset is straightforward as it consists in reading the simplied intent and the full intent of each concept. The concept order permits to extract rules ordered by support, the rules extracted from the most general concepts having a larger support than more specic rules. The use of RCA permits to use relational attributes in implication rules.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>5</head><p>A case study</p><p>We rely on a large database collecting data on Alsatian streams and water areas (North-east of France) <ref type="bibr">[8]</ref>, but more data are available through the current FRESQUEAU project, concerning larger areas and periods. The data are either issued from samples (e.g. physical, chemical and biological data collected on stream sites), synthetic data (e.g. biological indices, land cover) or general information issued from the literature (e.g. information about the aquatic species living in the streams). More precisely in this paper we work with three tables. The rst one gives values of 27 physico-chemical parameters (e.g. temperature, pH, SO4, NH4, organic matters) collected on 49 stream sites. The second table gives the level of population for 197 macro-invertebrates (e.g. Ancylus, Anisus, Anodonta ) collected on the same 49 sites. The third one describes the macroinvertebrates with 22 dierent life traits, i.e. their characteristics and functioning, e.g life cycle, reproduction mode, etc. each life trait being represented by several modalities (e.g. for the life trait life cycle there are two possible modalities : less than a year or more than a year ). The sum of the modalities for all life traits is 116. We look for rules combining life traits and physico-chemical parameters, e.g. the M modality of the T life trait is associated with a high value of the C physico-chemical parameter . We modeled our data within 4 formal contexts: stream sites, physico-chemical parameters, life traits and macro-invertebrates and we considered the three relations between them that are described by our tables: level of physico-chemical parameter, population of macro-invertebrates and life trait of macro-invertebrates. The relations being originally numerical ones we applied a preprocessing to separate values into a few classes. So the level of physico-chemical parameter relation has been split into 5 binary relations describing 5 dierent levels, the population of macro-invertebrates relation has also been split into 5 dierent binary relations and the life trait of macro-invertebrates relation has been split into 6 binary relations. This binarisation process has been accomplished under the guidance of a domain expert.</p><p>Applying RCA on this data led to a combinatorial explosion that forced us to try other methods of classication as our implementation could not sustain the number of concepts created reaching the limits of time and size. On this same data RCA-AOC gives a result in a few seconds, and can then be used on much bigger data sets. The implementation of RCA-AOC relies on the same algorithm as RCA except for the use of the Hermes algorithm <ref type="bibr">[9]</ref> for building AOC-posets instead of an FCA algorithm.</p><p>From the obtained AOC-posets we extracted two sets of rules: the rules with a physico-chemical character on the left hand side and the rules with animal traits on the left hand side.</p><p>We obtained 49179 rules for the rst set and 56 for the second one. The difference is coming from the granularity of data which is dierent for the physicochemical characters and the biological characters. It comes directly from the choices of the binarization guided by domain experts in order to support the extraction of rules in one direction. Here the goal is to infer biological characters from physico-chemical characters, the former being more expensive to measure than the latter.</p><p>The rule presented below is one rule extracted from the experimental data with a support of 67% of the considered sites. For any site of the data set the presence of the component Lig at a concentration of level 1 implies the presence of animals at a concentration of level 2 that have the trait identied by the code FR4 (modality diapause or dormancy of trait resistance kind ) with an anity of 0 and the trait identied by the code SA1 (modality fresh water of the trait salinity ) with an anity of 3.</p><p>The levels that are referred here are dened specically to each physicochemical character, each animal species, and each biological character. For the physico-chemical characters they are usually attached to a level of concentration. The same goes for the animals presence. For the biological characters it refers to an anity of the species to the modality of a particular biological trait (e.g. for its habitat, an animal may have a stronger anity with sand than gravel, but may be found in both of them).</p><p>Although the modeling can be considered as naive and several approaches could be used to limit the number of concepts, we saw here that RCA has a scale issue as we are only working on a small part of the data. Using AOC-poset allows to handle big data without exploding the number of concepts. Besides, reducing the number of concepts means that the extracted information is also reduced. For the stream site concepts, from which we extract the rules, the AOC-poset keeps the interesting data as we still have the concepts where each attribute is introduced and their order. For the macro-invertebrates however, several concepts are lost that represent combinations of shared life traits. We still have to measure the impact of the missing concepts on the results but it would seem appropriate to combine the RCA-AOC approach with a more traditional lattice building approach that would compute the relevant concepts for the macro-invertebrates while keeping the number of stream site concepts low with AOC-poset. Other approaches to integrate relations in FCA have been proposed, including power context family <ref type="bibr">[10]</ref>, and Logical Concept Analysis <ref type="bibr">[11]</ref>. The originality of RCA is to compute in iterative manner (with a possible stop at each step) several concept lattices from data represented in relational format. The concept lattices are connected by links that abstract the relations between objects. Several operators, borrowed to Description Logics, build the links between concepts.</p><p>The original RCA framework, using whole concept lattices, has been used to the analysis and modernization of UML elements <ref type="bibr">[12,</ref><ref type="bibr">13]</ref>, namely in class diagrams and in use case diagrams. In <ref type="bibr">[14]</ref>, concept lattices exploit relations between methods and between methods and attributes to detect and x design defects. Model transformations are learned from transformation examples thanks to several kinds of relations between model elements (e.g. between elements inside a model, transformation links between source elements and target elements) <ref type="bibr">[15]</ref>. In <ref type="bibr">[16]</ref>, relations between abstract tasks in an abstract orchestration are used to classify relevant Web services to instantiate the tasks. Other applications can be found in ontology engineering <ref type="bibr">[17,</ref><ref type="bibr">18,</ref><ref type="bibr">19]</ref>. In these applications, the datasets are medium-size guarantying the feasibility of the approach. In the FRESQUEAU project, we have larger sets of data where AOC-posets are more suitable than concept lattices. Furthermore, for some issues we want to deal with in the project, like extracting part of the implication rules, AOC-posets are relevant because they contain all the concepts that introduce attributes.</p><p>To our best knowledge, the AOC-posets have been introduced by Godin et al <ref type="bibr">[3]</ref> in the domain of software engineering (object-oriented programming). The AOC-poset has also been used in applications of FCA to non-monotonic reasoning and domain theory <ref type="bibr">[20]</ref> and to produce classications from linguistic data <ref type="bibr">[21,</ref><ref type="bibr">22]</ref>. Specic parts of the AOC-poset (mainly the attribute-concepts part) are used in several works. They include approaches for rebuilding class hierarchy <ref type="bibr">[23]</ref> and a recent study for extracting feature tree (in the domain of software product lines) from a set of products <ref type="bibr">[24]</ref>.</p><p>Many approaches exist to extract logical rules from data either in a supervised context for building decision tree <ref type="bibr">[25]</ref> or classication rules <ref type="bibr">[26]</ref> or in an unsupervised context for association rules learning. Our approach is unsupervised, but AOC-posets only allows the extraction of association rules of condence 1.</p><p>However, the scaling operation permits to consider dierent kinds of granularity for the relations between the concepts. The relational aspect of the approach permits the extraction of rules from complex relational data which would require to be transformed by propositionalization approaches <ref type="bibr">[27]</ref> for many learning approaches. It also could be compared to Inductive Logic Programming <ref type="bibr">[28]</ref> in some ways as it will result in rst order logic formulas. ILP being a supervised approach, its goal diers as it will try to nd the right premise for a given conclusion. The expressivity of the results of our approach are far more restricted than with ILP, even with all the scaling operators that can be imagined, leading to better performances but with a restricted output language.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusion</head><p>This paper has introduced a RCA process based on AOC-poset in order to deal with computational complexity over big datasets. AOC-posets reduce the number of concepts, with no information lost as the context can still be retrieved from an AOC-poset. In the future we will work on specifying the convergence conditions of AOC-poset based RCA. Indeed, more complex datasets may include cycles between objects. Convergence is ensured with the RCA specication from <ref type="bibr">[7]</ref> where the set of concepts used at each step is the set of concepts of the whole lattice. With AOC-poset the convergence is not guaranteed when there are cycles between objects. We also will develop a tool for vizualising the results and assisting their exploration. Finally the approach will be tested on the various datasets of the FRESQUEAU project, and compared with other approaches for relational data mining such as statistical approaches <ref type="bibr">[29]</ref> or propositionalization <ref type="bibr">[27]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Formal Concept Analysis (FCA) refers to a mathematized and formal humancentered way to analyze data. It can be described as an ontology-based Lattice Theory. This theory describes ways of visualizing patterns, generate implications, and representing generalizations and dependencies <ref type="bibr">[1]</ref>. The theory makes use of a binary relation between objects and attributes, which plays a fundamental role in the understanding of human model conceptualization. FCA formalizes all these ideas, and gives a mathematical framework to work on them <ref type="bibr">[2]</ref>.</p><p>The Concept Lattice is mainly used to represent and describe hierarchies between data clusters (formal concepts or classes), which are inherent in the perceived information. A formal concept can be regarded also as a data cluster, in which certain attributes are all shared by a set of objects. The Concept Lattice is the main subject of the theory of FCA, and it was rst introduced in the early eighties by Rudolf Wille <ref type="bibr">[2,</ref><ref type="bibr">3]</ref>. Over time, FCA has become a powerful theory for many interesting applications. Examples of these are in the data analysis of Frequent Closed Itemsets <ref type="bibr">[4]</ref>, association rules and Functional/Conditional hierarchies discovery <ref type="bibr">[5,</ref><ref type="bibr">6,</ref><ref type="bibr">7]</ref>. For all these reasons, concept lattice generation is an important topic in FCA research <ref type="bibr">[8,</ref><ref type="bibr">9,</ref><ref type="bibr">10,</ref><ref type="bibr">11,</ref><ref type="bibr">12,</ref><ref type="bibr">13,</ref><ref type="bibr">14,</ref><ref type="bibr">15]</ref>. However, the main drawback of concept lattices generation is the exponential size of the concept lattice and its generation complexity <ref type="bibr">[16]</ref>.</p><p>In this work, we present a Morphological Neural Network based method to generate the Concept Lattice. This batch method is capable of generating the Hasse diagram, and it is a bottom-up generation algorithm. With that in mind, this work is organized as follows. Section 2 is an elementary description of FCA Theory. Next, section 3 is a short introduction on how the Single Lattice Layer Perceptron (SLLP) works. In section 4, a description on how to compute the Maximal Rectangles is given. In this section, we also dene a link between SLLP and the design of a classier for maximal anti-chains search. Section 5 shows a comparison between PIRA and other known algorithms.</p><p>2 Basic Denitions</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Formal Concept Analysis (FCA)</head><p>First, it is necessary to dene the concept of a formal context <ref type="bibr">[3]</ref>. Denition 1. A binary formal context K is a triple (G, M, I). In this mathematical structure, G and M are two nite sets, called objects and attributes respectively, and I ⊆ G × M is a binary relation over G and M, named the incidence of K.</p><p>In order to dene formal concepts of the formal context (G,M,I), it is necessary to dene two derivation operators, named Galois connectors. Denition 2. For an arbitrary subsets A ⊆ G and B ⊆ M :</p><formula xml:id="formula_248">A := {m ∈ M | (g, m) ∈ I, ∀g ∈ A} B := {g ∈ G | (g, m) ∈ I, ∀m ∈ B}</formula><p>These two derivation operators satisfy the following three conditions over arbitrary subsets</p><formula xml:id="formula_249">A 1 , A 2 ⊆ G and B 1 , B 2 ⊆ M : 1. A 1 ⊆ A 2 then A 2 ⊆ A 1 dually B 1 ⊆ B 2 then B 2 ⊆ B 1 2. A 1 ⊆ A 1 and A 1 = A 1 dually B 1 ⊆ B 1 and B 1 = B 1 3. A 1 ⊆ B 1 ⇐⇒ B 1 ⊆ A 1</formula><p>Next, the denition of a formal concept idea, which represents the building unit of FCA. Denition 3. Let K be a formal context, K := (G, M, I). A formal concept C of K is dened as a pair C = (A, B), A ⊆ G and B ⊆ M , where the following conditions are satised, A = B and A = B, where A is named the extent and B is named the intent of the formal concept (A, B).</p><p>Next, we will show some useful notions from Lattice Theory <ref type="bibr">[17,</ref><ref type="bibr">18]</ref> to understand the algebraic structure generated by those derivation operators and the formal concept idea. Denition 4. A Partially Ordered Set (Poset) is a set X in which there is a binary relation between elements of X, ≤, with the following properties:</p><p>1. ∀x, x ≤ x (Reexive). 2. if x ≤ y and y ≤ x, then x = y (Antisymmetric). 3. if x ≤ y and y ≤ z, then x ≤ z (Transitive).</p><p>Formal Concepts can be partially ordered by inclusion. And for any pair C i , C j have a unique greatest lower bound and a unique least upper bound. Then, the set of all formal concept in K, ordered by inclusion, is known as a Concept Lattice. Next denition links some denitions with the Formal Concept notion.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Denition 5. (Rectangles in K)</head><formula xml:id="formula_250">. Let A ∈ G and B ∈ M , a rectangle in K is a pair (A, B) such that A × B ⊆ I .</formula><p>Given the set of Rectangles in K, a special kind of rectangles are dened as follows: Denition 6. (Maximal Rectangles). A rectangle (A 1 , B 1 ) is maximal if and only if there does not exist another valid rectangle</p><formula xml:id="formula_251">(A 2 , B 2 ) in K such that A 1 ⊆ A 2 or B 1 ⊆ B 2 .</formula><p>From here, we have the formal concept as a maximal rectangle. Theorem 1. (A, B) is a formal concept of K if and only if (A, B) is a maximal rectangle in K. Now, the following denitions are going to be useful for the proposed bottom-up approach of FCA generation. Denition 7. Let K := (G, M, I) and A ⊆ G. A is said to be an object derivative anti-chain set if and only if A 1 A 2 and A 2 A 1 for any two distinct</p><formula xml:id="formula_252">A 1 , A 2 ∈ A. Dually, for B ⊂ M nd B 1 B 2 for any two distinct B 1 , B 2 in B.</formula><p>We will denote as D a derivative anti-chain and as A(K) the set of all antichains in K. All sets in which the super/subconcept order is not satised for any distinct elements of the set is called anti-chain set. Denition 8. D + is a maximal derivative anti-chain i there does not exist other D ∈ A(K) such that D ⊃ D + . There exists a maximal derivative antichain for objects and one for attributes.</p><p>Finally, we use a simple upward closed set denition. Denition 9. Upward closed set. Let (L, ≤) be a poset P . A set S ⊆ L is said to be upward closed if ∀x, y ∈ S with y ≥ x implies that y ∈ S.</p><p>Using these denitions of anti-chains, maximal rectangles and upward closed set, it is possible to device a bottom-up approach by means of dendritic neuronal networks.</p><p>3 Lattice-Based Neural Networks (LBNN).</p><p>Articial Neural Networks (ANN ) are models of learning and automatic processing inspired by the nervous system. The features of ANN make them quite suitable for applications where there is no prior pattern that can be identied, and there is only a basic set of input examples (previously classied or not). They are also highly robust to noise, failure of elements in the ANN, and,nally, they are parallelizable. As we said early, our work is related with LBNN, which is also considered an Articial Neural Network, and are inspired in recent advances in the neurobiology and biophysics of neural computation (author?) <ref type="bibr">[19,</ref><ref type="bibr">20]</ref>.</p><p>The theory of LBNN is actively used in classication <ref type="bibr">[21,</ref><ref type="bibr">20,</ref><ref type="bibr">22]</ref>, clustering <ref type="bibr">[23]</ref>, associative memories <ref type="bibr">[24,</ref><ref type="bibr">25]</ref>, fuzzy logic <ref type="bibr">[26]</ref>, among others <ref type="bibr">[27,</ref><ref type="bibr">28]</ref>. Basically, in the LBNN model, an input layer receives external data, and subsequent layers perform the necessary functions to generate the desired outputs. Single Lattice Layer Perceptrons (SLLP), also named Dendritic Single Layer Perceptron, are basically a classier in which there exists a set of input neurons, a set of output neurons, and a set of dendrites growing from the output neurons. Those dendrites are connected with the input set by some axons from those input neurons. A training set congures those outputs based on the maxima and minima operations derived from the morphological algebra (R, +, , ). FCA and Mathematical Morphology common algebraic framework: Erosion, dilatation, morphological operators, valuations, an many other functions in concept lattices have been previously studied <ref type="bibr">[29]</ref>.</p><p>In SLLP, a set of n input neurons N 1 , . . . , N n accepts input x = (x 1 , ..., x n ) ∈ R n . An input neuron provides information through axonal terminals to the dendritic trees of output neurons. A set of O output neurons is represented by O 1 , ..., O m . The weight of an axonal terminal of neuron N i connected to the k th dendrite of the O j output neuron is denoted by w ijk , in which, the superscript ∈ {0, 1} represents an excitatory = 1 or a inhibitory = 0 input to the dendrite. The k th dendrite of O j will respond to the total value received from the N input neurons set, and it will accept or reject the given input. Dendrite computation is the most important operation in LBNN. The following equation τ j k (x), from SLLP, corresponds to the computation of the k th dendrite of the j st output neuron <ref type="bibr">[21]</ref>.</p><formula xml:id="formula_253">τ j k (x) = p jk i∈I(k) ∈L (−1) 1− (x i + w ijk )</formula><p>Where x is the input value of neurons N 1 , ..., N n and x i is the the value of the input neuron N i . I(k) ⊆ 1, ..., n represents the set of all input neurons with synaptic connection on the k th dendrite of O j . The number of terminal axonal bers on N i that synapse on a dendrite of O j is at most two, since (i) ⊆ {0, 1} . Finally, the last involved element is p jk ∈ {−1, 1} and it denotes the excitatory (p jk = 1) or inhibitory (p jk = =1) response of the k th dendrite of O j to the received input. All the values τ j k (x) are passed to the neuron cell body. The value computation of O j is a function that computes all its dendrites values. The total value received by O j is given by <ref type="bibr">[21]</ref>:</p><formula xml:id="formula_254">τ j (x) = p j * Kj k=1 τ j k (x)</formula><p>In this SLLP model, K j is the set of all dendrites of O j , p j = ±1 represents the response of the cell body to the received input vector. At this point, we know that p j = 1 means that the input is accepted and p j = =1 means that the cell body rejects the received input vector. The last statement related with O j correspond to an activation function f , namely</p><formula xml:id="formula_255">y j = f [τ j (x)]. f [τ j (x)] = 1 ⇐⇒ τ (x) ≥ 0 0 ⇐⇒ τ (x) &lt; 0<label>(1)</label></formula><p>As, we mention early, dendrites congurations is computed using a training set. For this, they use merge and elimination methods <ref type="bibr">[17]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">PIRA Algorithm.</head><p>In PIRA-LBNN model for nding upward-closed set elements, a set of binary patterns are represented by G . Thus, the binary representation of a formal context is itself a set of patterns, in which the derivative of each object is an element x ∈ G . Then, we can dene each element x = (x 1 , ..., x n ) ∈ G as a binary vector. This allows us to dene a simple class classication rule to nd maximal rectangles, and in an equivalent way the maximal anti-chains.</p><p>In PIRA algorithm we search all the rectangles with maximum width or height from each formal concept founded. There are two ways to achieve our goal. It means that = 1 or = 0 depending on whether it is calculating, a supremum or an inmum, by using excitatory or inhibitory dendrites. Thus, p jk is also a constant, p jk = 1 or p jk = −1 and it denotes the excitatory or inhibitory response of the k th dendrite of M j to the received input, and another remarkable statement is the fact that we only need to connect zeros as axonal branches. The simplest way to compute the value of the k th dendrite derived from the SLLP equations, is:</p><formula xml:id="formula_256">τ j k (x) = i∈I(k) (x i )<label>(2)</label></formula><p>This equation, where τ j k (x) is the value of the computation of the k th dendrite of the j th output neuron given a input x, I(k) ⊆ {1, ..., n} is the set of input neurons with terminal bers that synapse the k th dendrite of our output neuron. We realize that all weights w ijk are equal to zero, this is, for our upward closed set classier, we only need to store zero values from the input patterns in the training step. Our goal is that the output of our classication neuron be x ∈ C 1 . This is achieved by processing elements from higher to lower cardinality, Specically, each dendrite k corresponds with one maximal antichain intent to be tested, I(k) is the incidence set of positions where the value of the maximal rectangle is zero for the pattern represented by the k dendrite. We get the state value of M j computing the minimum value of all it's dendrites. Again, as the SLLP, each τ j k (x) is computed, and it is passed to the cell body of M j . Then we can get the total value received by our output neuron as follows:</p><formula xml:id="formula_257">τ j (x) = τ j k (x)<label>(3)</label></formula><p>We realize that the activation function is not required since f [τ j (x)] = τ j (x) where τ j (x) = 1 if x y for all y ∈ C 1 and τ j (x) = 0 if x ≤ y for some y ∈ C 1 . As we mentioned above x is a maximal rectangles if and only if x y and y x for all y ∈ C 1 . Using the previous statement we can ensure that half of the work is done, and the second test, y x, will be performed by processing data in a particular order. In our case, we use cardinality order ensuring that each new computed row is not a superset of the previously computed rows.</p><p>As we said before, the idea is to use our LBNN structure to classify maximal rectangles. When we start computing a formal concept, our structure is empty, this means there are not dendrites or axonal connections. So, the rst step is to add each element with the maximal cardinality as a pattern to learn. Algorithm 1 shows how an element is added to our LBNN for maximal rectangles learning. First, algorithm 1 receives as parameter the LBNN which is being trained and a binary vector. As we will see below, this binary vector has been proven as an antichain element. Algorithm 1, rst grows a new dendrite k th in our output neuron O j . Every column in x is checked, if that property is not contained by the object x, then an axonal branch grows from the i position of the input neuron set to the new dendrite. This operation is represented by addAxonalBranch calling. We can assure that we will not misclassify formal concepts in the processed context. The algorithm 2 shows how to compute the Concept Lattice by computing Maximal Antichain Sets recursively. Next, in a third step, if the maximal cardinality of the elements in G' is equal to the Supremum intent cardinality, it adds a link between Supremum and Inmum, and stops. Otherwise, it adds all the elements in G' with the maximal cardinality, to the dendritical neural network structure. Those elements are maximal rectangles in the given binary context. The fourth step is used to check the remaining elements. If an element derivative does not exist already, as an intent, and the evaluation 3 says that it is a maximal rectangle, then, it adds the object and its derivative as a new maximal rectangle. Otherwise, if the element derivative already exists, it is added to the previously formal concept as its extent. In the last step, it processes each maximal rectangle that has been found. If that element is already contained in the lattice, it adds a link between Inmum and the previous element created in the lattice. Otherwise, it adds that link and processes that formal concept recursively. Then, it adds this new element to the lattice structure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 2 Compute Maximal Rectangles</head><p>At this point, it computes all the concepts given by the binary context, but B(K) cardinality is bounded by an exponential complexity. A simple way to avoid this issue is to use a Binary Tree to store and recover all elements inB(K). Basically, this binary tree works as a hash function using the concept of intent in their binary representation. Then, it searches, nds and adds any intent in |M | steps. In addition, the processing order enables us to generate the edges of the Hasse diagram without additional computing steps. Therefore, the process of generating the concept lattice and Hasse diagram presented in this paper has an expected polynomial delay time <ref type="bibr">[16]</ref> for maximal anti-chains search.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Computational Experiments.</head><p>As shown in <ref type="bibr">[16]</ref>, many parameters are involved in the performance and running time of an algorithm. For our tests, we considered the number of objects, the number of attributes, the density of the context and the worst case for contexts of M × M . Where density is the least percentaje of binary relations for each object in K. Those parameters were tested independently. Four algorithms were selected to compare the Dendritical algorithm performance. Implementations were performed in java.</p><p>Figure <ref type="figure" target="#fig_0">1</ref> shows the execution time behavior for a formal context with 10% density and 100 attributes. Here, the V-axis represent the running time of each algorithm in ms, and the H-axis the total number of objects under constant number of attributes. The test was performed by increasing the number of objects from one thousand to twenty thousand, with a random distribution and 10% of density.</p><p>We can verify that Bordat algorithm and our algorithm have the best performance when the number of objects increase with respect to the attributes.  Figure <ref type="figure" target="#fig_1">2</ref> shows the increase in execution time when the number of attributes increases. All datasets for this test has a 10% density and 1000 objects, and the number of attributes is increasing from ten to one hundred, and, the number of formal concepts is growing too. Here we can notice that Bordat and Dendritical algorithms, are faster than Godin, Nourrine and Valtchev algorithms. We can also notice that Dendritical execution time behavior is faster when the number of objects grows.</p><p>Figure <ref type="figure" target="#fig_7">3</ref> shows the increase in execution time when the density percentage becomes higher. All datasets has 1000 objects and 100 attributes and when the density grows the number of formal concepts grows too. As we mention, density is mainly the percentage of attributes for all the objects in the formal context.  Here, we notice that when the density grows Dendritical is closer and even faster than the other algorithms. Figure <ref type="figure" target="#fig_8">4</ref> shows running time for zero diagonal contexts where |G| = |M| and yields the complete lattice, which means 2 |M | formal concepts. In this kind of formal contexts, we can see a clear running time superiority of the dendritical algorithm. Finally, table <ref type="table" target="#tab_0">1</ref> shows some examples of time complexity at each algorithm step. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>In this paper, we presented an algorithm based on the main idea of maximal rectangles, using the cardinality notion and the dendritical classier. We have also compared it with some known algorithms for the construction of Concept Lattices.</p><p>From the tests presented in this paper, we can see that as the number of objects grows, our algorithm time execution is higher than Bordat or other methods, but it could be a better choice when the density or the number of attributes is high. Also, the results shows a good performance for the M × M contexts in the worst case scenario, which demonstrates the feasibility of our algorithm on some kinds of datsets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Isotone L-bonds</head><p>Jan Konecny 1 and Manuel Ojeda-Aciego 2 1 University Palacky Olomouc, Czech Republic ‹ 2 Dept. Matemática Aplicada, Univ. Málaga, Spain ‹‹ Abstract. L-bonds represent relationships between formal contexts. We study properties of these intercontextual structures w.r.t. isotone conceptforming operators in fuzzy setting. We also focus on the direct product of two formal fuzzy contexts and show conditions under which a bond can be obtained as an intent of the product. In addition, we show that the previously studied properties of their antitone counterparts can be easily derived from the present results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Formal Concept Analysis (FCA) has become a very active research topic, both theoretical and practical, for formally describing structural and hierarchical properties of data with "object-attribute" character. It is this wide applicability which justifies the need of a deeper knowledge of its underlying mechanisms: and one important way to obtain this extra knowledge turns out to be via generalization and abstraction.</p><p>A number of different approaches have presented towards a generalization of the framework and scope of FCA and, nowadays, one can find papers which extend the theory by using ideas from rough set theory <ref type="bibr">[21,</ref><ref type="bibr">15,</ref><ref type="bibr">14]</ref>, possibility theory <ref type="bibr">[8]</ref>, fuzzy set theory <ref type="bibr">[1,</ref><ref type="bibr">2]</ref>, the multi-adjoint framework <ref type="bibr">[16,</ref><ref type="bibr">17,</ref><ref type="bibr">19]</ref> or heterogeneous approaches <ref type="bibr">[6,</ref><ref type="bibr">18]</ref>.</p><p>Goguen argued in <ref type="bibr">[10]</ref> that concepts should be studied transversally, transcending the natural boundaries between sciences and humanities, and proposed category theory as a unifying language capable of merging different apparently disparate approaches. Krotzsch <ref type="bibr">[13]</ref> suggested a categorical treatment of morphisms, understood as fundamental structuring blocks, in order to model, among other applications, data translation, communication, and distributed computing.</p><p>In this paper, we deal with an extremely general form of L-fuzzy Formal Concept Analysis, based on categorical constructs and L-fuzzy sets. Particularly, our approach originated in relation to a previous work <ref type="bibr">[12]</ref> on the notion of Chu correspondences between formal contexts, which led to obtaining information about the structure of L-bonds in such a generalized framework. In this paper, we study properties of L-bonds w.r.t. isotone concept-forming operators in a fuzzy setting. We also focus on the direct product of two formal fuzzy contexts and show conditions under which a bond can be obtained as an extent of the product. In addition, we show that the previously studied properties of their antitone counterparts can be easily derived from the present results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head><p>We use complete residuated lattices as basic structures of truth-degrees. A complete residuated lattice is a structure L " xL, ^, _, b, Ñ, 0, 1y such that Elements a of L are called truth degrees. Operations b (multiplication) and Ñ (residuum) play the role of (truth functions of) "fuzzy conjunction" and "fuzzy implication". Furthermore, we define the complement of a P L as</p><formula xml:id="formula_258">a " a Ñ 0<label>(1)</label></formula><p>An L-set (or fuzzy set) A in a universe set X is a mapping assigning to each x P X some truth degree Apxq P L where L is a support of a complete residuated lattice. The set of all L-sets in a universe X is denoted L X , or L X if the structure of L is to be emphasized.</p><p>The operations with L-sets are defined componentwise. For instance, the intersection of L-sets A, B P L X is an L-set A X B in X such that pA X Bqpxq " Apxq^Bpxq for each x P X, etc. An L-set A P L X is also denoted t Apxq {x | x P Xu. If for all y P X distinct from x 1 , x 2 , . . . , x n we have Apyq " 0, we also write t Apx1q {x 1 , Apx2q {x 1 , . . . , Apxnq {x n u.</p><p>An L-set A P L X is called crisp if Apxq P t0, 1u for each x P X. Crisp Lsets can be identified with ordinary sets. For a crisp A, we also write x P A for Apxq " 1 and x R A for Apxq " 0. An L-set A P L X is called empty (denoted by H) if Apxq " 0 for each x P X. For a P L and A P L X , the L-sets a b A P L X , a Ñ A ,A Ñ a, and A in X are defined by</p><formula xml:id="formula_259">pa b Aqpxq " a b Apxq, (2) pa Ñ Aqpxq " a Ñ Apxq, (<label>3</label></formula><formula xml:id="formula_260">) pA Ñ aqpxq " Apxq Ñ a,<label>(4)</label></formula><p>Apxq " Apxq Ñ 0.</p><p>(</p><formula xml:id="formula_261">)<label>5</label></formula><p>An L-set A P L X is called an a-complement if A " a Ñ B for some B P L X . Binary L-relations (binary fuzzy relations) between X and Y can be thought of as L-sets in the universe X ˆY . That is, a binary L-relation I P L XˆY between a set X and a set Y is a mapping assigning to each x P X and each y P Y a truth degree Ipx, yq P L (a degree to which x and y are related by I).</p><p>The composition operators are defined by</p><formula xml:id="formula_262">pA ˝Bqpx, yq " ł f PF Apx, f q b Bpf, yq,<label>(6)</label></formula><formula xml:id="formula_263">pA Ž Bqpx, yq " ľ f PF Apx, f q Ñ Bpf, yq,<label>(7)</label></formula><formula xml:id="formula_264">pA Ż Bqpx, yq " ľ f PF Bpf, yq Ñ Apx, f q. (<label>8</label></formula><formula xml:id="formula_265">)</formula><p>An L-context is a triplet xX, Y, Iy where X and Y are (ordinary) sets and I P L XˆY is an L-relation between X and Y . Elements of X are called objects, elements of Y are called attributes, I is called an incidence relation. Ipx, yq " a is read: "The object x has the attribute y to degree a."</p><p>Consider the following pairs of operators induced by an L-context xX, Y, Iy. First, the pair xÒ, Óy of operators Ò : L X Ñ L Y and Ó : L Y Ñ L X is defined by</p><formula xml:id="formula_266">C Ò pyq " ľ xPX Cpxq Ñ Ipx, yq, D Ó pxq " ľ yPY Dpyq Ñ Ipx, yq.<label>(9)</label></formula><p>Second, the pair xX, Yy of operators X :</p><formula xml:id="formula_267">L X Ñ L Y and Y : L Y Ñ L X is defined by C X pyq " ł xPX Cpxq b Ipx, yq, D Y pxq " ľ yPY Ipx, yq Ñ Dpyq,<label>(10)</label></formula><p>Third, the pair x ^, _ y of operators ^:</p><formula xml:id="formula_268">L X Ñ L Y and _ : L Y Ñ L X is defined by C ^pyq " ľ xPX Ipx, yq Ñ Cpxq, D _ pxq " ł yPY Dpyq b Ipx, yq,<label>(11)</label></formula><p>for C P L X , D P L Y .</p><p>To emphasize that the operators are induced by I, we also denote the operators by xÒ I , Ó I y, xX I , Y I y, and x^I , _ I y. Furthermore, denote the corresponding sets of fixpoints by BpX Ò , Y Ó , Iq, BpX X , Y Y , Iq, and BpX ^, Y _ , Iq, i.e.</p><formula xml:id="formula_269">BpX Ò , Y Ó , Iq " txC, Dy P L X ˆLY | C Ò " D, D Ó " Cu, BpX X , Y Y , Iq " txC, Dy P L X ˆLY | C X " D, D Y " Cu, BpX ^, Y _ , Iq " txC, Dy P L X ˆLY | C ^" D, D _ " Cu.</formula><p>The sets of fixpoints are complete lattices, called L-concept lattices associated to I, and their elements are called formal concepts. </p><formula xml:id="formula_270">A system of L-sets V Ď L X is called an L-interior system if -V is closed under b-multiplication, i.e.</formula><p>for every a P L and C P V we have a b C P V ; -V is closed under union, i.e. for C j P V (j P J) we have</p><formula xml:id="formula_271">Ť jPJ C j P V . V Ď L X is called an L-closure system if -V is closed under left Ñ-multiplication (or Ñ-shift), i.e.</formula><p>for every a P L and C P V we have a Ñ C P V (here, a Ñ C is defined by pa Ñ Cqpiq " a Ñ Cpiq for i " 1, . . . , n); -V is closed under intersection, i.e. for C j P V (j P J) we have Ş jPJ C j P V .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Weak L-bonds</head><p>This section introduces some new notions studied in this work. To begin with, we introduce the notion of weak L-bonds as a convenient generalization of bond. </p><formula xml:id="formula_272">ExtpX X 1 , Y Y 2 , βq Ď ExtpX X 1 , Y Y 1 , I 1 q and IntpX X 1 , Y Y 2 , βq Ď IntpX X 2 , Y Y 2 , I 2 q.</formula><p>This notion can be put in relation with that of i-morphism.</p><formula xml:id="formula_273">Definition 2. A mapping h : V Ñ W from an L-interior system V Ď L X into an L-interior system W Ď L Y is called an i-morphism if it is a b-and Ž -morphism, i.e. if</formula><p>-hpa b Cq " a b hpCq for each a P L and C P V ; -hp Ž kPK C k q " Ž kPK hpC k q for every collection of C k P V (k P K). An i-morphism h : V Ñ W is said to be an extendable i-morphism if h can be extended to an i-morphism of L X to L Y , i.e. if there exists an i-morphism h 1 : L X Ñ L Y such that for every C P V we have h 1 pCq " hpCq;</p><p>The following results will be used hereafter.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Lemma 1 ([5]</head><p>). </p><formula xml:id="formula_274">1. For V Ď L X , if h : V Ñ L Y is</formula><formula xml:id="formula_275">i-morphisms IntpX X 1 , Y Y 1 , I 1 q to IntpX X 2 , Y Y 2 , I 2 q.</formula><p>Proof. We show procedures to obtain the i-morphism from a weak L-bond and vice versa.</p><p>"ñ": Let β be a weak L-bond between</p><formula xml:id="formula_276">K 1 " xX 1 , Y 1 , I 1 y and K 2 " xX 2 , Y 2 , I 2 y. By Definition 1 we have IntpX X 1 , Y Y 2 , βq Ď IntpX X 2 , Y Y 2 , I<label>2</label></formula><p>q; thus by Lemma 1(3) there exists <ref type="bibr">(1)</ref>. Then β " I 1 ˝Si is a weak L-bond by Lemma 1(3) and Lemma 1(4).</p><formula xml:id="formula_277">S i P L Y1ˆY2 such that β " I 1 ˝Si . The induced opeator X Si is an extendable i-morphism IntpX X 1 , Y Y 1 , I 1 q to IntpX X 2 , Y Y 2 , I 2 q by Lemma 1(2). "ð": For an extendable i-morphism f : IntpX X 1 , Y Y 1 , I 1 q Ñ IntpX X 2 , Y Y 2 , I 2 q there is an L-relation S i s.t. f pBq " B X S i for each B P IntpX X 1 , Y Y 1 , I 1 q by Lemma 1</formula><p>One can check that these two procedures are mutually inverse. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>#</head><p>x ^y if x " 1 or y " 1, 0 otherwise, for each x, y P L. One can easily see that x b Ž j y j " Ž j px b y j q and thus an adjoint operation Ñ exists such that xL, ^, _, b, Ñ, 0, 1y is a complete residuated lattice. Namely, Ñ is given as follows:</p><formula xml:id="formula_278">x Ñ y " $ ' &amp; ' % 1 if x ď y, y if x " 1, b otherwise, for each x, y P L. Consider I 1 " `a˘a nd I 2 " `b˘.</formula><p>One can check that, we have Extptxu X , tyu Y , I 1 q " Extptxu X , tyu Y , I 2 q " tt b {xu, xu and, trivially, Intptxu X , tyu Y , I 2 q " Intptxu X , tyu Y , I 2 q. Thus I 2 is a weak L-bond between I 1 and I 2 w.r.t. xX, Yy.</p><p>On the other hand, I 2 is not a weak L-bond between I 1 and I 2 w.r.t. x^, _y since Extptxu ^, tyu _ , I 1 q " tH, t a {xuu Ğ tH, t b {xuu " Extptxu ^, tyu _ , I 2 q.</p><p>Theorem 2. The system of all weak L-bonds is an L-interior system. Proof. From properties of i-morphism.</p><p>[ \</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Strong L-bonds</head><p>We provide a stronger version of the previously studied weak L-bond, naturally named strong L-bond. The following lemma introduces equivalent definitions of strong L-bonds.</p><formula xml:id="formula_279">Definition 3. A strong L-bond between two L-contexts K 1 " xX 1 , Y</formula><p>Lemma 2. The following propositions are equivalent:</p><formula xml:id="formula_280">(a) β is a strong L-bond between K 1 " xX 1 , Y 1 , I 1 y and K 2 " xX 2 , Y 2 , I 2 y. (b) β satisfies both ExtpX 1 , Y _ 2 , βq Ď ExtpX 1 , Y _ 1 , I 1 q and IntpX X 1 , Y Y 2 , βq Ď IntpX X</formula><p>2 , Y Y 2 , I 2 q. (c) β " S e ˝I2 " I 1 ˝Si for some S e P L X1ˆX2 and S i P L Y1ˆY2 .</p><p>Proof. (a) ô (b): By use of the Lemma 1(3) and ( <ref type="formula" target="#formula_50">4</ref>).</p><p>(a) ô (c): By definitions.</p><p>[ \ In this case, this stronger notion can be related with the c-morphisms, introduced below:</p><formula xml:id="formula_281">Definition 4. A mapping h : V Ñ W from a L-closure system V Ď L X into an L-closure system W Ď L Y is called a c-morphism if it is a Ñ-and Ź -morphism, i.e. if -hpa Ñ Cq " a Ñ hpCq for each a P L and C P V ; -hp Ź kPK C k q " Ź kPK hpC k q for every collection of C k P V (k P K); -if C is an a-complement then hpCq is an a-complement.</formula><p>For formally establishing the relationship, the two following results are recalled:</p><formula xml:id="formula_282">Lemma 3 ([4]). 1. If h : V Ñ L Y is an extendable c-morphism then there exists an L-relation A P L XˆY such that hpCq " C Ż A for every C P L Y . 2. Let A P L XˆY , the mapping h A : L X Ñ L Y defined by h A pCq " C Ż A p"</formula><p>C ^A q is an extendable c-morphism.</p><formula xml:id="formula_283">Theorem 3. The strong L-bonds between K 1 " xX 1 , Y 1 , I 1 y and K 2 " xX 2 , Y 2 , I 2 y are in one-to-one correspondence with extendable c-morphisms ExtpX X 2 , Y Y 2 , I 2 q to ExtpX X 1 , Y Y 1 , I 1 q.</formula><p>Proof. We show procedures to obtain the c-morphism from a strong L-bond and vice versa. "ñ": Let β be a strong L-bond between K 1 " xX 1 , Y 1 , I 1 y and K 2 " xX 2 , Y 2 , I 2 y. By Lemma 2 there is S e P L X1ˆX2 such that β "</p><formula xml:id="formula_284">S i ˝I2 . The induced operator Y Si is an extendable c-morphism ExtpX X 2 , Y Y 2 , I 2 q to ExtpX X 1 , Y Y 1 , I 1 q by Lemma 3(2). "ð": For extendable c-morphism f : ExtpX Ò 2 , Y Ó 2 , I 2 q Ñ ExtpX X 1 , Y Y 1 , I 1 q there is an L-relation S e s.t. f pBq " B Y S i for each A P ExtpX X</formula><p>2 , Y Y 2 , I 2 q by Lemma 3 <ref type="bibr">(1)</ref>. Then β " S e ˝I2 is a strong L-bond by Lemma 2.</p><p>One can check that these two procedures are mutually inverse.</p><p>[ \ Theorem 4. The system of all strong L-bonds is an L-interior system.</p><p>Proof. Using Lemma 2 (b), it is an intersection of the L-interior systems from Theorem 2.</p><p>[ \</p><formula xml:id="formula_285">Definition 5. Let K 1 " xX 1 , Y 1 , I 1 y, K 2 " xX 2 , Y 2 , I 2 y be L-contexts. The direct product of K 1 and K 2 is defined as the L-context K 1 'K 2 " xX 2 ˆY1 , X 1 ˆY2</formula><p>, ∆y with ∆pxx 2 , y 1 y, xx 1 , y 2 yq " I 1 px 1 , y 1 q b I 2 px 2 , y 2 q.</p><p>Theorem 5. The intents of K 1 ' K 2 are L-bonds between K 1 and K 2 .</p><p>Proof. We have</p><formula xml:id="formula_286">φ X px 1 , y 2 q " ł φpx 2 , y 1 q b ∆pxx 2 , y 1 y, xx 1 , y 2 yq " ł xx2,y1y φpx 2 , y 1 q b I 1 px 1 , y 1 q b I 2 px 2 , y 2 q " ł y1PY1 ł x2PX2 φpx 2 , y 1 q b I 1 px 1 , y 1 q b I 2 px 2 , y 2 q " ł y1PY1 I 1 px 1 , y 1 q b ł x2PX2 φpx 2 , y 1 q b I 2 px 2 , y 2 q " ł y1PY1 I 1 px 1 , y 1 q b pφ T ˝I2 qpy 1 , y 2 q " pI 1 ˝φT ˝I2 qpx 1 , y 2 q.</formula><p>Now, notice that pI 1 ˝φT q ˝I2 " I 1 ˝pφ T ˝I2 q " β is a strong L-bond by Lemma 2.</p><p>[ \ Remark 1. It is worth mentioning that not every strong L-bond is included in IntppX 1 ˆY2 q X , pX 2 ˆY1 q Y , ∆q since there are isotone L-bonds which are not of the form of I 1 ˝φT ˝I2 . For instance, using the same structure of truth degrees and I 1 as in Example 1, obviously I 1 is L-bond on K 1 (i.e. between K 1 and K 1 ), but IntppX 1 ˆY2 q X , pX 2 ˆY1 q Y , ∆q contains only H.</p><p>The end of proof of the Theorem 5 also explains which L-bonds are intents of K 1 ' K 2 :</p><p>Corollary 1. The intents of K 1 ' K 2 are exactly those L-bonds between K 1 and K 2 which can be decomposed as I 1 ˝φT ˝I2 for some φ P L X2ˆY1 .</p><p>Remark 2 (Relationship to the antitone case in <ref type="bibr">[12]</ref>).</p><p>Assuming the double negation law, we have the equality ExtpX Ò , Y Ó , Iq " ExtpX X , Y Y , Iq. Thus, for a strong L-bond β P L X1ˆY2 " S e ˝I2 " I 1 ˝Si between K 1 and K 2 we have β " S e Ž I 2 " I 1 Ż S i being an antitone L-bond between K 1 and K 2 .</p><p>Remark 3. Some papers <ref type="bibr">[9,</ref><ref type="bibr">12]</ref> have considered direct products in the crisp and the fuzzy settings, respectively, for the antitone case. In <ref type="bibr">[12]</ref> conditions are specified under which antitone L-bonds are present in the concept lattice of the direct product. Corollary 1 and Remark 2 provide a simplification of these conditions. The concept lattice of a direct product K 1 b K 2 defined as in <ref type="bibr">[12]</ref> i.e. K 1 b K 2 " xX 2 ˆY1 , X 1 ˆY2 , ∆y with ∆pxx 2 , y 1 y, xx 1 , y 2 yq " I 1 px 1 , y 1 q Ñ I 2 px 2 , y 2 q p" I 2 px 2 , y 2 q Ñ I 1 px 1 , y 1 qq induces concept-forming operator φ Ò ∆ for which we have</p><formula xml:id="formula_287">φ Ò ∆ px 1 , y 2 q " ľ xx1,y2yPX1ˆY2 φpx 2 , y 1 q Ñ r I 1 px 1 , y 1 q Ñ I 2 px 2 , y 2 qs " ľ xx2,y1yPX1ˆY2 I 1 px 1 , y 1 q Ñ pφpx 2 , y 1 q Ñ I 2 px 2 , y 2 qq " ľ x2PX2 ľ y1PY1 I 1 px 1 , y 1 q Ñ pφpx 2 , y 1 q Ñ I 2 px 2 , y 2 qq " ľ y1PY1 I 1 px 1 , y 1 q Ñ ľ x2PX2 pφpx 2 , y 1 q Ñ I 2 px 2 , y 2 qq " ľ y1PY1 I 1 px 1 , y 1 q Ñ pφ T Ž I 2 qpy 1 , y 2 q " ľ y1PY1 pφ T Ž I 2 qpy 1 , y 2 q Ñ I 1 px 1 , y 1 q " rI 1 Ż pφ T Ž I 2 qspx 1 , y 2 q " r I 1 Ž pφ T Ž I 2 qspx 1 , y 2 q " r I 1 Ž pφ T Ž I 2 qspx 1 , y 2 q " rp I 1 ˝φT q Ž I 2 qspx 1 , y 2 q " r p I 1 ˝φT ˝ I 2 qspx 1 , y 2 q</formula><p>Whence an antitone L-bond is an intent of the concept lattice of K 1 b K 2 iff it is possible to write it as p I 1 ˝φT ˝ I 2 q i.e. if its complement is an intent of</p><formula xml:id="formula_288">K 1 ' K 2 .</formula><p>We studied L-bonds with respect to isotone concept-forming operators, computation of L-bonds using dirrect products, and the relationship of these results to the previous results on antitone L-bonds.</p><p>The present results can be easily generalized to a setting in which extents, intents and the context relation use different structures of truth-degrees. We will bring this generalization in an extended version of the paper.</p><p>Our future research in this area includes the the study of yet another type of (extendable) i-morphisms and c-morphisms. In <ref type="bibr">[11]</ref>, another type of morphism is described: the a-morphism. In contrast to the morphisms used in this paper, the a-morphisms are antitone, and their study could shed more light on antitone fuzzy bonds.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The Chilean National Council of Culture and Arts<ref type="foot" target="#foot_34">1</ref> (CNCA) has undergone the mission of documenting the intangible cultural heritage (ICH) of different small zones of the country in the context of a world-wide UNESCO<ref type="foot" target="#foot_35">2</ref> crusade to incentivize governments and NGOs to properly maintain our cultural knowledge. The ICH, as drafted in the Convention for the Safeguarding of the Intangible Cultural Heritage<ref type="foot" target="#foot_36">3</ref> refers to "traditions or living expressions inherited from our ancestors and passed on to our descendants, such as oral traditions, performing arts, social practices, rituals, festive events, knowledge and practices concerning nature and the universe or the knowledge and skills to produce traditional crafts".</p><p>To survey the ICH, the CNCA maintains several "documenters" who meet artists, artisans and other actors of the folkloric stage. Each documenter fills a "file" containing several semi-structured and text-free fields which are later registered in a relational database (DB). This database is later consulted by curators (usually domain experts) who fix problems in data definitions or storage. The CNCA has requested help in two specific aspects. Given the difficulty of documenting very different domains in ICH, the design of a data schema to support its documentation is a hard task which leads to inconsistencies in its model. Currently, the data schema used by the CNCA was designed by a computer engineer with some knowledge on the domain. However, as the ICH documentation process expanded to other cultural domains ("music", "folk festivals", "crafts", etc.) the data schema became too general and some modifications were requested to enable a higher level of details. The CNCA requested to analyse the data schema in order to find "modular" partitions on the model corresponding to different domains in ICH. Thus, each module can be maintained by a related domain-expert avoiding the risk of information conflict.</p><p>The second request derives from the fact that, since the ICH documentation is a multi-organizational endeavour motivated by UNESCO, it is expected that data collected by CNCA will be integrated with other databases later on. Because of this, CNCA has asked aid to obtain an ontological schema from its current data schema which can be used for linked data publication.</p><p>In this work we propose a novel knowledge discovery in databases process guided by formal concept analysis (also, referred to as conceptual knowledge discovery in databases CKDD <ref type="bibr">[1]</ref>) approach to deal with both requirements. We analyse the current data schema definition to construct a concept lattice through FCA in which we apply different techniques to find the modules representing ICH domains. The contributions of this work are firstly, to present a real-world experience using FCA and concept lattices to achieve a task as important as heritage documentation and secondly, the description of a process to elicit an ontological schema from a relational DB schema which can be of benefit in different applications.</p><p>The remainder of this article is organised as follows: Section 2 presents the CKDD process while Sections 3, 4 and 5 detail each of its steps. Section 6 describes the case study of applying the CKDD process over the CNCA database for ICH documentation. Finally, Section 7 presents a discussion on related work and concludes the paper.</p><p>2 Formal concept analysis and knowledge discovery in databases.</p><p>We propose an iterative and human-centred approach to overcome both requirements of the CNCA based on Conceptual Knowledge Discovery in Databases (CKDD) <ref type="bibr">[1]</ref>. CKDD is a tool to support humans in the discovery and extraction of knowledge from large collections of data where the conceptual representation of knowledge is a key aspect <ref type="bibr">[12]</ref>. Fig. <ref type="figure" target="#fig_0">1</ref>: FCA-based KDD process for CNCA Figure <ref type="figure" target="#fig_0">1</ref> presents a 3-step CKDD process designed to take a database schema and convert it into a knowledge base. The process contains a loop between the interpretation and the FCA step in which domain expert knowledge is included. Notice that to avoid conflicts with the CNCA data, we only extract information from the database and never modify it. In the following sections we provide a detailed description of each step and sub-tasks developed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Database</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">First Step of the CKKD process: Data preprocessing</head><p>The first step starts by extracting the database schema and ends when it is converted to a formal context. Currently, most of the relational database management systems are based on the relational model constituted by tables and their relations (there are actually more elements in a relational model which are not of first interest here). We provide an adapted definition of the relational schema model as described in <ref type="bibr">[2]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Relational data schema model</head><p>A relational schema S = {R 1 , R 2 , ..., R |S| } is defined as a set of tables or "relation schemas" R i (A 1 , A 2 , ..., A ni ) consisting of a table name R i and a list of n i fields A j which define value assignments of the domain dom(A j ) to an entry in the table. The notation R i .A j stands for the field A j in table R i . An entry in a table is defined as an ordered n-tuple of values denoted by t</p><formula xml:id="formula_289">[R i ] =&lt; v 1 , v 2 , ..., v ni &gt;</formula><p>where each value is denoted as t[A j ] = v j ∈ dom(A j ) ∪ {N U LL}. N U LL indicates that the value is unknown for the field in the entry. The relation state r(R i ) = {t 1 , t 2 , ..., t ri } of table R i denotes its total set of entries. In a table R i , the set of fields SK ⊂ R i denotes a superkey which identifies a tuple as unique. A primary key P K is defined as a superkey where |SK| = 1 and |.| denotes set cardinality, i.e. P K is a single field and we say that R i .P K is the primary key of table R i the value of which unequivocally identifies an entry in table R i . Finally, a field R 1 .F K is called a foreign key iff R 1 .F K = R 2 .P K which indicates a relation between R 1 and R 2 . In the particular case of the CNCA database for ICH documentation, a notion of inheritance of tables is supported. We define this as </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Formal context definition</head><p>Considering data schema S = {R 1 , R 2 , ..., R |S| } and the tables of the form R i (A 1 , A 2 , ..., A ni ) composed by the fields A j , we define the formal context K = (S, A, I) where</p><formula xml:id="formula_290">A = Ri∈S R i .A j I = {(R i , A j ) / ∀R i ∈ S, ∀A j ∈ R i }</formula><p>Formal context K is composed by tables in the set S (all the tables or a sub-set of them), the set of fields A (composed by the set of all fields from all tables considered in S) and the relation set I (the relations between tables in S and their fields in A). Notice that we define a formal context by making the correspondences object-table and attribute-field. To avoid confusions, in this work we differentiate between these correspondences by using different font faces for objects or attributes and for tables or fields. Along with the formal context, we also define the following rules of attribute integration based on the characteristics of the fields:</p><p>-The special attribute id represents all primary keys: id ∈ A , (R i , id) ∈ I ∀R i ∈ S. -Fields with the same name are integrated into a single attribute (e.g. attribute name represents Agent.name and Ritual .name)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Relational attribute scaling</head><p>In the context of FCA, foreign keys correspond to relational attributes. For example, in Figure <ref type="figure" target="#fig_1">2</ref> we do not say "table Ritual contains a foreign key" (as in the case of Ritual contains a primary key), but rather "Ritual is related to Agent by a foreign key". Such kind of attributes cannot be included in a binary formal context. To deal with relational attributes, we scale them and treat them as normal attributes in the lines of <ref type="bibr">[11]</ref>. We do so by prepending the prefix related to: to the name of the table where the foreign key directs to (e.g. in the formal context in Table <ref type="table" target="#tab_0">1</ref>, we say that the object Ritual contains the attribute related to:Agent). This is formalized as  This step receives a formal context and ends when a concept lattice is constructed. Figure <ref type="figure" target="#fig_7">3</ref>(a) shows the concept lattice calculated for the formal context in Table <ref type="table" target="#tab_0">1</ref>. Along with the concept lattice, the original formal context is sent to step 3 to allow modifications in it for further iterations of the process. We develop two tasks related to the identification of elements which would help in the redesign of the data schema.</p><formula xml:id="formula_291">R j .F K = R i .P K; R i , R j ∈ S ⇒ related to:R i ∈ A ∧ (R j ,</formula><formula xml:id="formula_292">× × × × × × × IndividualAgent × × × × × × × × × CollectiveAgent × × × × × × × × × FestiveEvent × × × × × × × Ritual × × × × × ×</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Attribute concept identification</head><p>The attribute concept of attribute A j is defined by µA j = (A j , A j ), where () is the derivation operator in FCA <ref type="bibr">[3]</ref>. The identification of attribute concepts is rather simple and we do it by navigating from the top to the bottom of the lattice. Attribute concepts are the most general concepts in the lattice containing a given attribute. In our case, the attribute concept of a given field contains the largest set of tables related to it. This is important since, as we will describe in the next step of interpretation, we process each field separately in order to create the ontological schema. Attribute concepts make this simpler as for each field we only need one concept and not the whole lattice.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Extensional stability calculation:</head><p>Since we are looking to enhance the design of a data schema in the database, within the lattice we would like to have only those concepts which group together in their extents tables of the same domain. This would allow us to address the modularization of information per domain issue which is one of the request of the CNCA, assuming that tables in the same domain are likely to share similar fields.</p><p>In order to do so, we use the notion of extensional stability as firstly described in <ref type="bibr">[6]</ref> and later in <ref type="bibr">[10]</ref> as a way to measure "the probability of a concept to preserve its extent after leaving out an arbitrary number of attributes".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Third Step of the CKDD process: Interpretation</head><p>The final step receives a formal context and its associated concept lattice where each attribute concept is identified and each formal concept contains an extensional stability value. Since CKDD is an iterative process, this step has two possible outputs. If the expert decides to make another iteration, the process goes back to step 2 sending a modified version of the formal context received including feedback of the expert. If the expert decides to end the process, this will create an "ontological schema" which will be stored in a knowledge base and the process ends. For the iteration, there are two tasks to perform: Question creation/answering and Modularization. The task which transforms the concept lattice into an ontological schema ends the process. A further step of annotation which converts the entries in tables into linked data using the ontological schema can be considered, but for the sake of space we have left it out of this paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Question creation and answering</head><p>We use extensional stability as an indicator of how related are tables within a given concept extent. A lower stability indicates that those tables are grouped more as an accident (for example, because of the misuse of a single (or several) field name(s)) rather than because they belong to the same domain. We look for unstable attribute concepts because they are the most general concepts containing a given attribute, so they are those that relate more tables together. Moreover, we can create questions for the expert to answer in the hope they provide information to "break" the attribute concept and separate domains.</p><p>Consider the example in Figure <ref type="figure" target="#fig_7">3</ref>(a) in which two domains are illustrated. The first relates events while the second relates people and communities. The most unstable attribute concepts (extensional stability of 0.5) correspond to those labelled with the attributes background and place. In the case of place, it only contains one table meaning that "breaking" this concept does not help in separating domains <ref type="foot" target="#foot_38">4</ref> . The attribute concept of background contains four objects, namely FestiveEvent, Agent, IndividualAgent and CollectiveAgent for which FestiveEvent belongs to a different domain than the others.</p><p>Regarding the questions posed to the expert, we have:</p><p>1. Would you like to assign attribute to all the objects? 2. Would you like to eliminate the attribute from a single/a set of objects/s? 3. Would you like to split attribute into different attributes for different objects?</p><p>If the expert selects option 1, the attribute will be shared by every object and hence, it will be placed as part of the intent of the top of the lattice (like id and name in Figure <ref type="figure" target="#fig_121">3(a)</ref>). In the case of option 2, the attribute is erased from the formal context and hence, its attribute concept is removed. With option 3, we can recommend the partition of the attribute by looking at the sub-concepts of the attribute concept. Then, a new attribute is created for each partition made while the original attribute disappears. Consider A i to be the attribute for which the expert has to answer a question. For each option we can define a new formal context as follows:</p><p>1. Option 1:</p><formula xml:id="formula_293">K A = (S, A, I ∪ {(R, A i ); ∀R ∈ S}) 2. Option 2: K A = (S, A\{A i }, I\{(R, A i ; )∀R ∈ S})</formula><p>3. Option 3: Let A j be the splits of attribute A i assigned to objects R j , then</p><formula xml:id="formula_294">K A = (S, (A\{A i }) ∪ A j , I\{(R, A i ); ∀R ∈ S} ∪ {(R j , A j )})</formula><p>In the example, the expert selected option 3 splitting background into an attribute for FestiveEvent (practice background) and another for the Agents (records). This example is actually an extract of a real case study where the expert realized that the term "background" was used with multiple meanings and that it should be separated into an attribute registering the history of past events and another for the official records of people. Figure <ref type="figure" target="#fig_7">3</ref>(b) presents the concept lattice created from the formal context yielded by this decision.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Modularization</head><p>The expert may choose to perform this task disregarding answering questions. We start from the already processed concept lattice L and find its sublattices such as L i ∩ L j = { , ⊥} where L i , L j are sublattices of L and , ⊥ represent the top and the bottom of L respectively. We achieve this by obtaining the connected graphs from the lattice once and ⊥ are removed. Each sublattice is a candidate to represent a domain which must be labelled by the expert. The label is included into the formal context as a special attribute of the form domain:Label with relations to all the objects in the sublattice. The concept lattice is later recalculated. Figure <ref type="figure" target="#fig_7">3</ref>(b) depicts the final form of the lattice for the running example. Finally, the expert may also be interested in merging more than one sublattice into a single domain. In that case, the special attribute is added to all objects in the set of sublattices selected by the expert.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3">Ontological schema creation</head><p>The final task of the process derives an ontological model from the concept lattice that can be used for data integration and linked data publication. This is done Table <ref type="table" target="#tab_2">2</ref>: Formal concept translation into RDF triples. Triples in the third column are created for the elements described in the second column within the formal concepts in the first column by creating a set of RDF triples<ref type="foot" target="#foot_39">5</ref> for given elements in the formal concepts of the lattice. Table <ref type="table" target="#tab_2">2</ref> shows this conversion where for example, in the first row it is shown that for the top concept, all the tables in its extent are modelled as RDFS classes<ref type="foot" target="#foot_40">6</ref>  <ref type="bibr">[7]</ref>. For simplicity purposes, Table <ref type="table" target="#tab_2">2</ref> only presents a part of the total set of triples created considering the top , the bottom ⊥ and attribute µA j concepts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Case study: CNCA Intangible Cultural Heritage Database</head><p>The database schema of the CNCA for ICH documentation consists of nearly 300 tables, however only 27 tables were selected by the experts on the basis of their representative and multi-disciplinary knowledge. Selected tables consider descriptions of agents, collective agents, festive events, culinary manifestations, geolocations and more. The formal context derived from the database contains 27 objects, 56 attributes, and 25 relational attributes. Figure <ref type="figure" target="#fig_8">4</ref> depicts the concept lattice built from this formal context. Table <ref type="table" target="#tab_3">3</ref>: Iterations made for the case study Table <ref type="table" target="#tab_3">3</ref> shows the actions taken by the domain expert during 9 iterations of the CKDD process. We distinguished between facts, questions and actions. Facts represent database assertions which are displayed for helping the expert in decision taking. For example, in iteration 1 the expert is presented with the facts: "71% of the objects contain the attribute name" and "The attribute name has a value in 100% of the entries in the objects where it appears". The first fact helps the expert to understand that name is actually very common among the objects and can easily be extended to the whole object set. The second fact combines information from the DB and the concept lattice to tell the expert that in all the entries t which contain the field name (represented by the attribute name), the value t[name] is different than N U LL. This indicates him that the attribute should not be removed from any object. Questions and actions were already detailed in Section 5.1.</p><p>In iterations 3 and 4 the expert split the attribute background ("antecedentes" in Spanish). This attribute appears in several objects (46% of object set) through all the domains, however with different semantics. Finally, the expert created the attributes historical background, records, practice background and culinary background. In iteration 5 and 6, the expert decided to eliminate some attributes from the object set. For example, the relation related to:Commune which represented a foreign key in the database, was not being used in 3 tables from which it was removed. Finally, in iterations 7, 8 and 9 the expert labelled the modules as subdomains of ICH FestiveFeatures, Geo and AgentFeatures. Modelling semantic relations in DBs is proposed in <ref type="bibr">[8]</ref> where the author presents a framework to formalize semantics in a lexical database. A lexical database maintains information about concepts and their semantic position w.r.t. each other (hypernymy or meronymy). In general, relational DBs do not share the same characteristics nor structure as lexical databases, allowing to store more heterogeneous data. In <ref type="bibr">[9]</ref> the same author proposes an algebra for relational DBs which can be interpreted also in terms of a formal context in FCA. A similar idea was proposed by <ref type="bibr">[5]</ref> where the author uses the algebra to translate a relational database into a family of formal contexts to benefit from both, the simplicity of the relational model description and the power of FCA in analysis. By contrast, our approach is more straightforward since we are not interested in data operations using the concept lattice, but rather in a direct translation of the data schema. Thus, we do not work with the entries in the tables of the database. In our approach we use the concept lattice as a support for guiding the redesign process in which a domain expert is the main provider of knowledge.</p><p>To conclude, in this article we have presented an application of a conceptual knowledge discovery in databases process designed to redesign and convert a database schema into an ontological model. The process is heavily human centred as it considers a domain expert as the main source of knowledge to guide the process. To support him, we use formal concept analysis with a formal context created from the set of tables and fields extracted from the database schema. The concept lattice calculated from this formal context is used to analyse the schema and create questions which the user should answer. Each question has an associated set of actions aimed at redesigning the database schema model.</p><p>The application is implemented over an excerpt of the Chilean National Council of Culture and Arts (CNCA) database for intangible cultural heritage documentation. Currently, we are implementing the process in full scale including more domain experts. Future work include the annotation process of data using the ontological schema created which has already been considered, however not described in this article. As pointed out by one of the reviewers of this work, the approach presented in this article may also be applied in the context of software engineering, specifically in code re-factoring and object-model re-engineering <ref type="bibr">[4]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Analogical proportions and the factorization of 1 Introduction</head><p>Analogical reasoning <ref type="bibr">[1]</ref> plays an important role in human reasoning. It enables us to draw plausible conclusions by exploiting parallels between situations, and as such has been studied in AI for a long time, e.g., <ref type="bibr">[2,</ref><ref type="bibr">3]</ref> under various approaches <ref type="bibr">[4]</ref>. A key pattern which is associated with the idea of analogical reasoning is the notion of analogical proportions, i. e. statements of the form 'A is to B as C is to D'. However, it is only in the last decade that researchers working in computational linguistics have started to study these proportions in a formal way <ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref>. More recently, analogical proportions have been shown as being of particular interest for classification tasks <ref type="bibr">[8]</ref> or for solving IQ tests <ref type="bibr">[9]</ref>. Moreover, in the last five years, there has been a number of works, e.g., <ref type="bibr">[10,</ref><ref type="bibr">11]</ref> studying the propositional logic modeling of analogical proportions. The logical view of an analogical proportion amounts to expressing that the difference between A and B (resp. B and A) is the same as the difference between C and D (resp. D and C). Although it can be proved that, beside symmetry, this view agrees with a crucial postulate of analogical proportions, namely that one can exchange B and C in the proportion (as well as A and D), it is not straightforward to see that it holds. In fact, a genuine parallel can be made between analogical proportions and numerical proportions. It suggests that since factorization plays a key role in geometric proportions (which equal two ratios of integers), factorization also makes sense for analogical proportions. This idea is investigated here in the abstract setting of lattices.</p><p>In order to do this, we go back to a factorization-based formalization of analogical proportions proposed in <ref type="bibr">[12,</ref><ref type="bibr">13]</ref>. On this basis, these authors proposed a definition of analogical proportions in different settings such as sets, sets of sequences, set of trees, and lattices. As shown in this paper their definition suggested for the lattice setting is incomplete. We then correct and complete this definition. We show that it encompasses the Boolean lattice case that corresponds to the propositional logic encoding of analogical proportions. We then study the more general setting of distributive lattices, identify canonical proportions, and show how analogical proportions can be decomposed into canonical ones, before discussing the solving of analogical proportion equations, a key issue for application to algorithms for analogical reasoning. We also illustrate the approach in the case of a distributive lattice induced by fuzzy sets.</p><p>The paper is organized as follows. The next section provides the necessary background on lattices and on analogical proportions. Section 3 establishes the basic form of analogical proportions in distributive lattices, which is illustrated on Boolean and on graded proportions, and then investigates their basic properties. Section 4 introduces the notion of canonical proportions and takes advantage of them for studying the composition and the decomposition of analogical proportions. Section 5 discusses the resolution of analogical equations, and briefly studies the transitivity of analogical proportions.</p><p>This paper is a preliminary investigation into the connexions between lattices and analogical proportion. In particular, we are interested in detecting analogical proportions in concept lattices (e.g. see <ref type="bibr">[20]</ref>). However, since these lattices are generally non distributive, we will have to investigate which of the properties demonstrated here still hold true in concept lattices, and which of them have to be abandoned or weakened. A few hints are given in Sections 3 and 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Background: Lattices and analogical proportions</head><p>Lattices. They are mathematical structures commonly encountered in the semantics of representation and programming languages, in formal concept analysis, machine learning, data mining, and in other areas of computer sciences.</p><p>(L, ∨, ∧, ≤) is a lattice when <ref type="bibr">[14]</ref>: i) L has at least two elements, ii) ∧ and ∨ are two binary internal operations, both idempotent, commutative, associative, and satisfying the absorption laws. A lattice is distributive when u</p><formula xml:id="formula_295">∨ (v ∧ w) = (u ∨ v) ∧ (u ∨ w), or equivalently u ∧ (v ∨ w) = (u ∧ v) ∨ (u ∧ w)</formula><p>for all u, v and w in L. A bounded lattice has a greatest (or maximum) and least (or minimum) element, denoted and ⊥. A bounded lattice is complemented if each element x has a complementary y such that x ∧ y = ⊥ and x ∨ y = . A distributive, bounded and complemented lattice is called a Boolean lattice.</p><p>Duality theorem. If a theorem T is true in a lattice, then the dual of T is also true. This dual is obtained by replacing all occurrences of ∧ (resp. ∨, ≤) by ∨ (resp. ∧, ≥).</p><p>Examples. Analogical proportions. They are characterized by three axioms. They acknowledge the symmetrical role played by the pairs (A, B) and (C, D) in the proportion 'A is to B as C is to D', and enforce the idea that B and C can be interchanged if the proportion is valid, just as in the equality of two numerical ratios where means can be exchanged. This view dates back to Aristotle <ref type="bibr">[15]</ref>. A third, optional, axiom insists on the unicity of the solution x = B for completing the analogical proportion A : B :: A : x . These axioms are studied in <ref type="bibr">[16]</ref>. Example. Let us take the lattice (2 Σ , ∪, ∩, ⊆), where Σ is a finite set {a, . . . , n}. Σ may be for example a set of Boolean properties, and a subset of Σ can be used to characterize some object described by the corresponding properties. The four objects described by the subsets x = {a, b, e}, y = {b, c, e}, z = {a, d, e} and t = {c, d, e} are in analogical proportion in this order. Indeed, it suggests an intuitive meaning for 'is to': To transform x into y, one has to remove property a and to include property c; namely x \ y = {a} and y \ x = {c}. z is transformed into t by exactly the same operations; namely z \ t = {a} and t \ z = {c}. Such a view of the relation linking x, y, z, t is clearly symmetrical, and satisfies the exchange of the means: namely x \ z = {b}, z \ x = {d} and y \ t = {b}, t \ y = {d}. This idea that x (resp. y) differs from y (resp. x) in the same way as z (resp. t) differs from t (resp. z) is at the core of the definition of the analogical proportion x : y :: z : t in the Boolean setting <ref type="bibr">[10]</ref>, as further discussed in the following.</p><p>Proportions in commutative semigroups. Stroppa and Yvon <ref type="bibr">[12,</ref><ref type="bibr">13]</ref> have given another definition of the analogical proportion, based on the notion of factorization, when the set of objects is a commutative semigroup (X, ⊕).</p><p>Definition 2 A 4-tuple (x, y, z, t) in a commutative semigroup (X, ⊕) is an AP x : y :: z : t when:</p><p>1) either (y, z) ∈ {(x, t), (t, x)}, 2) or there exists</p><formula xml:id="formula_296">(x 1 , x 2 , t 1 , t 2 ) ∈ X 4 such that x = x 1 ⊕ x 2 , y = x 1 ⊕ t 2 , z = t 1 ⊕ x 2 and t = t 1 ⊕ t 2 .</formula><p>This definition satisfies the two basic axioms of the analogical proportion (Definition 1). For example, in (X, ⊕) = (N + , ×), with x 1 = 2, x 2 = 3, t 1 = 5 and t 2 = 7, one has (2×3) : (2×7) :: (5×3) :: (5×7), i.e. 6 : 14 :: 15 : 35, a numerical geometric analogical proportion. Note that this particular proportion corresponds equivalently to the equality: 6 × 35 = 14 × 15.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Analogical proportion in lattices</head><p>In this section, we are interested in studying how the definition of an analogical proportion by factorization applies to lattices. In particular we are wondering whether the equivalence of the two formulations in the preceding example can be transposed to this algebraic structure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Definition</head><p>Considering that a lattice (L, ∨, ∧) is both a commutative semigroup (L, ∨) and (L, ∧), we define an analogical proportion as follows.</p><p>Definition 3 A 4-tuple (x, y, z, t) in (L, ∨, ∧) is an AP (x : y :: z : t) when:</p><p>1) there exists</p><formula xml:id="formula_297">(x 1 , x 2 , t 1 , t 2 ) ∈ X 4 such that x = x 1 ∨ x 2 , y = x 1 ∨ t 2 , z = t 1 ∨ x 2 and t = t 1 ∨ t 2 ,</formula><p>2) and there exists (</p><formula xml:id="formula_298">x 1 , x 2 , t 1 , t 2 ) ∈ X 4 such that x = x 1 ∧ x 2 , y = x 1 ∧ t 2 , z = t 1 ∧ x 2 and t = t 1 ∧ t 2 .</formula><p>Note that when x 2 = t 2 then y = x and z = t and that when x 1 = t 1 then y = t and z = x. Hence we can have (y, z) = (x, t) or (y, z) = (t, x).</p><p>Examples. (a) In (N + , gcd, lcm, |), we have (20 : 4 :: 60 : 12), with x 1 = 20, x 2 = t 1 = 60, t 2 = 12, x 1 = t 2 = 4, x 2 = 20 and t 1 = 12. (b) In the lattice S of closed intervals on R, we have ([0, 3] : {3} :: [0, 4] : <ref type="bibr">[3,</ref><ref type="bibr">4]</ref>) with</p><formula xml:id="formula_299">x 1 = {3}, x 2 = {0}, t 1 = [3, 4], t 2 = ∅, x 1 = [0, 3], x 2 = [0, 4], t 1 = [0, 4] and t 2 = [3, 4].</formula><p>Proposition 1 A 4-tuple (x, y, z, t) in (L, ∨, ∧) is an AP (x : y :: z : t) iff: The antisymmetry of ≤ implies that x = (x ∧ y) ∨ (x ∧ z). We show the other equalities in the same manner.</p><formula xml:id="formula_300">x = (x ∧ y) ∨ (x ∧ z) x = (x ∨ y) ∧ (x ∨ z) y = (x ∧ y) ∨ (y ∧ t) y = (x ∨ y) ∧ (y ∨ t) z = (z ∧ t) ∨ (x ∧ z) z = (z ∨ t) ∧ (x ∨ z) t = (z ∧ t) ∨ (y ∧ t) t = (z ∨ t) ∧ (y ∨ t) Proof.<label>(</label></formula><p>The above definition applies to general lattices. In this paper, we focus on distributive lattices, since most of the properties to come require this property.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Boolean lattices</head><p>Every finite Boolean lattice is isomorphic to the lattice (X, ∪, ∩, ⊆), where X is a finite set. When considering this lattice, the quantities involved in Definition 1 can be described more precisely (see <ref type="bibr">[16,</ref><ref type="bibr">17]</ref>), as explained below. The link with Definition 3 is made by taking<ref type="foot" target="#foot_44">4</ref> .: x 1 = c∪e, x 2 = a∪e, t 1 = d∪e and t 2 = b ∪ e, and by duality:</p><formula xml:id="formula_301">x 1 = d ∩ f , x 2 = b ∩ f , t 1 = c ∩ f and t 2 = ā ∩ f .</formula><p>It is also easy to check that this definition is equivalent to Definition 3.</p><p>b c e a d f It is worth noticing that the above result has a nice interpretation in practice. Let us view x, y, z, t as subsets of properties that hold true in four different situations. It is then clear that a is the subset of properties that are true in the first situation, but false in the second one, and again true in the third situation and false in the fourth one. Conversely, b is the subset of properties that are false in the first situation, true in the second one, and again false in the third situation and true in the fourth one. Besides, c (resp. d) is the set of properties that are true for both the first and the second situations and false for the third and the fourth ones (resp. false for the first and the second situations and true for the third and the fourth ones. In other words, the disjoint subsets a, b, c, d, e, f have the following interpretations a = x \ y = z \ t, b = y \ x = t \ z, c ∪ e = x ∩ y, d ∪ e = z ∩ t, where e = x ∩ y ∩ z ∩ t is the set of properties that are true in all situations (and f the set of properties that are false in all situations); see Figure <ref type="figure" target="#fig_0">1</ref>. Thus, one can say that x, y, z, and t are respectively factorized under the form of pairs of disjoint subsets, namely (a, c ∪ e) for x, (b, c ∪ e) for y, (a, d ∪ e) for z, and (b, d ∪ e) for x, which perfectly parallels the equality of two numerical ratios of the form α×γ β×γ = α×δ β×δ . Moreover, the above decomposition using the partition of the referential into six subsets exactly corresponds to the truth table of the analogical proportion in a propositional setting <ref type="bibr">[10,</ref><ref type="bibr">18]</ref> defined equivalently by</p><p>x : y :: z : t = (x ∧ ¬y) ≡ (z ∧ ¬t) ∧ (y ∧ ¬x) ≡ (t ∧ ¬z) or x : y ::</p><formula xml:id="formula_302">z : t = (x ∧ t) ≡ (y ∧ z) ∧ (x ∨ t) ≡ (y ∨ z).</formula><p>Indeed, in the Boolean lattice associated to the two truth values 0, 1, x : y :: z : t is true (i.e., is equal to '1') for the six patterns (x, y, z, t) = (1, 0, 1, 0), (x, y, z, t) = (0, 1, 0, 1), (x, y, z, t) = (1, 1, 0, 0), (x, y, z, t) = (0, 0, 1, 1), (x, y, z, t) = (1, 1, 1, 1) and (x, y, z, t) = (0, 0, 0, 0), and false for the ten other possible patterns which are (x, y, z, t) = (1, 0, 0, 1), (x, y, z, t) = (0, 1, 1, 0) and the eight patterns having an odd number of '1' and '0' (e.g., (x, y, z, t) = (0, 0, 1, 0) or (x, y, z, t) = (0, 1, 1, 1)). The six above patterns which make x : y :: z : t true clearly correspond to the subsets a, b, c, d, e, f .</p><p>The case of graded properties Analogical proportions have been also extended when properties are graded on a chain which is finite, or such as the unit interval [0, 1] <ref type="bibr">[19]</ref>. For instance, a property may be half-true. Then, in the case of a finite chain with three elements {0, ω, 1}, two views make sense, for which the patterns having truth value '1' are respectively -the 15 patterns, that includes the 6 of the binary case (1, 0, 1, 0), (0, 1, 0, 1),</p><p>(1, 1, 0, 0), (0, 0, 1, 1), (1, 1, 1, 1), (0, 0, 0, 0), together with their 9 counterparts</p><p>(ω, 0, ω, 0), (0, ω, 0, ω), (1, ω, 1, ω), (ω, 1, ω, 1), (ω, ω, 0, 0), (0, 0, ω, ω), (1, 1, ω, ω), (ω, ω, 1, 1), (ω, ω, ω, ω)</p><p>-the 15 above patterns together with the 4 additional ones (1, ω, ω, 0), (0, ω, ω, 1), (ω, 0, 1, ω), (ω, 1, 0, ω).</p><p>In the second view, we acknowledge the fact that when there is a change from x to y there is the same change from z to t, and otherwise there is no change between x and y, and between z and t, but also the fact that the proportion still holds when the change from x to y has the same direction and intensity as the change from z to t (considering that ω is exactly in the "middle" between 0 and 1). It is easy to see that the lattice-based definition proposed here agrees with the first view only, while the 4 additional patterns do not make analogical proportions.</p><p>In the case of the unit interval [0, 1], this leads to the following graded view of the analogical proportion:</p><p>x : y ::</p><formula xml:id="formula_303">z : t = min(1 − | min(x, t) − min(y, z)|, 1 − | max(x, t) − max(y, z)|).</formula><p>It is easy to see that the above definition is a direct counterpart of the second form of the propositional expression of the analogical proportion given above. Moreover, it is equal to 1 only for the 15 patterns mentioned above.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Basic properties</head><p>We show here that in distributive lattices, a 4-tuple in analogical proportion is such that "the product of the means is equal to the product of the extremes".</p><p>Proposition 3 In a distributive lattice, (x : y :: z : t) is an AP iff: The next property is a stronger result: the four values of the bounds in the preceding property are actually only two.</p><formula xml:id="formula_304">y ∧ z ≤ x ≤ y ∨ z, x ∧ t ≤ y ≤ x ∨ t, x ∧ t ≤ z ≤ x ∨ t and y ∧ z ≤ t ≤ y ∨ z<label>(1</label></formula><p>Proposition 4 In a distributive lattice, (x : y :: z : t) is an analogical proportion iff x ∨ t = y ∨ z and x ∧ t = y ∧ z.</p><p>Proof. (⇒). Using the expressions of x, y, z and t given by Proposition 1, we easily check that x ∨ t = y ∨ z and x ∧ t = y ∧ z. (⇐). By absorption law and distributivity, we have</p><formula xml:id="formula_305">x = x ∧ (x ∨ t) = x ∧ (y ∨ z) = (x ∧ y) ∨ (x ∧ z).</formula><p>The other equations of Proposition 1 can be obtained in a similar way.</p><p>Comment 1. In <ref type="bibr">[13,</ref><ref type="bibr">7]</ref>, an incomplete definition of a proportion in a lattice has been given. Actually, only four equalities of Definition 3 were given, and only four equalities of Proposition 1 were demonstrated (in a different manner than here). This definition was flawed, since for example in the lattice ({0, 1}, ∨, ∧) it would have given (0 : 1 :: 1 : 1) as a proportion, although it does not satisfy the basic axioms. In the particular case of Boolean lattices, Proposition 4 has been shown in <ref type="bibr">[10]</ref>.</p><p>Comment 2. If the lattice is not distributive, Proposition 4 is not an equivalence, but an implication. For example, let us consider the elements x = [2, 3], y = <ref type="bibr">[2,</ref><ref type="bibr">6]</ref>, z = <ref type="bibr">[8,</ref><ref type="bibr">9]</ref> and t= <ref type="bibr">[6,</ref><ref type="bibr">9]</ref> of the lattice of closed intervals on R. We have x ∨ t = y ∨ z and x ∧ t = y ∧ z but the conditions of Definition 3 are not satisfied. We are currently studying in general lattices and concept lattices the properties of what can be called a weak analogical proportion, namely the fact that four elements are linked by the equalities x ∨ t = y ∨ z and x ∧ t = y ∧ z.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Determinism</head><p>The first and second axioms of Definition 1 are straightforwardly verified by Definition 3. What about the third axiom? Proposition 5 (Determinism in a distributive lattice) Let x and y be two elements of a distributive lattice, the equation in z: (x : x :: y : z) has the unique solution z = y. This is also true for the equation (x : y :: x : z).</p><p>Proof. Let us consider a solution z of (x : x :: y : z). From Proposition 4, we have</p><formula xml:id="formula_306">x ∧ z = x ∧ y and x ∨ z = x ∨ y .</formula><p>(2)</p><p>Besides, using absorption law, z = (x∨z)∧z. Consequently, using (2) and distributivity, z = (x ∨ y) ∧ z = (x ∧ z) ∨ (y ∧ z). Then, using (2), distributivity and absorption, we can conclude:</p><formula xml:id="formula_307">z = (x ∧ y) ∨ (y ∧ z) = (x ∨ z) ∧ y = (x ∨ y) ∧ y = y.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Composition and decomposition of analogical equations</head><p>We present in this section a particular case of analogical proportion which will be shown later (see section 4) to be a "building block" of the general proportion.</p><p>Proposition 6 (Canonical proportions) Let y and z be two arbitrary elements of a lattice. Then the following analogical proportion is true:</p><formula xml:id="formula_308">y : y ∨ z :: y ∧ z : z . (<label>3</label></formula><formula xml:id="formula_309">)</formula><p>Proof.</p><p>Equations of Proposition 4 are straightforwardly satisfied.</p><p>In the following, we will call this particular analogical proportion a canonical analogical proportion (CAP ). Note that the previous property holds in general lattices, not only distributive lattices.</p><p>In general, analogical proportions in a lattice are not canonical, such as (14 : 21 :: 10 : 15) in (N + , gcd, lcm, |).</p><p>Note that a canonical proportion can be written in eight different forms (see Definition 1), by applying the axioms of analogical proportion. We suppose in the following that one of the two particular following forms are used: y : y ∨ z :: y ∧ z : z or z : y ∨ z :: y ∧ z : y. This form is called the CAP 1 form, as opposed to the CAP 2 one: y : y ∧ z :: y ∨ z : z or z : y ∧ z :: y ∨ z : y.</p><p>We are interested in here in defining primitive proportions, that will be used as "building blocks" of the general proportion. This is done in particular to enlighten primitive chunks in a process of reasoning by analogy. Definition 4 Let a = (x, y, z, t) and A = (X, Y, Z, T ) be two 4-tuples of a distributive lattice (L, ∨, ∧). We define the ∨ -composition and the ∧ -composition of these two 4-tuples as the 4-tuples:</p><formula xml:id="formula_310">a ∨ A = (x ∨ X, y ∨ Y, z ∨ Z, t ∨ T ) and a ∧ A = (x ∧ X, y ∧ Y, z ∧ Z, t ∧ T )</formula><p>Note that these operations are commutative and associative. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proof.</head><p>Using Proposition 4 and distributivity.</p><p>This property is a generalisation of a property in Boolean lattices, shown in <ref type="bibr">[10]</ref>. Analogical proportions are not closed for general composition, as shown below.</p><p>Note that the composition of two AP 's is not necessarily an AP (nor is the composition of an AP and a SAP ) and that the composition of two CAP 's is not necessarily an AP .</p><p>Proposition 8 In a distributive lattice, for every AP a 1 there exists a SAP 1 a 2 and a SAP 2 a 3 such that a 1 = a 2 ∨ a 3 . There also exists a SAP 1 a 3 and a SAP 2 a 4 such that a 1 = a 3 ∧ a 4 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proof.</head><p>We check that (x : y :: z : t) is the ∧ -composition of (x ∨ y) : (x ∨ y) :: (z ∨ t) : (z ∨ t) and (x ∨ z) : (y ∨ t) :: (x ∨ z) : (y ∨ t), by proposition 1. It is also the ∨ -composition of (x ∧ y) : (x ∧ y) :: (z ∧ t) : (z ∧ t) and (x ∧ z) : (y ∧ t) ::</p><formula xml:id="formula_311">(x ∧ z) : (y ∧ t).</formula><p>Proposition 9 In a distributive lattice, for every AP a 1 there exists a CAP 1 a 2 and a CAP 2 a 3 such that a 1 = a 2 ∨ a 3 . There exists also a CAP 1 a 3 and a CAP 2 a 4 such that a 1 = a 3 ∧ a 4 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proof.</head><p>We check that (x : y :: z : t) is the ∨ -composition of (x ∧ y) : y ::</p><formula xml:id="formula_312">(x ∧ y ∧ z ∧ t) : (y ∧ t) and (x ∧ z) : (x ∧ y ∧ z ∧ t) :: z : (z ∧ t) and the ∧ -composition of (x ∨ y) : y :: (x ∨ y ∨ z ∨ t) : (y ∨ t) and (x ∨ z) : (x ∨ y ∨ z ∨ t) :: z : (z ∨ t).</formula><p>Proposition 10 In a distributive lattice, for every AP a 1 there exists a CAP 1 a 2 such that a 1 ∨ a 2 is a CAP 2.</p><p>Proof. Let a1 = (x : y :: z : t), and take a2 = ((z ∧t) : z :: (x∧y ∧z ∧t) : (x∧z)).</p><p>We have to show that [x∨(z∧t)] : (y∨z) :: z : [t∨(x∧z)]. According to property 1, we show equivalently the two equalities:</p><formula xml:id="formula_313">[x ∨ (z ∧ t)] ∨ [t ∨ (x ∧ z)] = (y ∨ z) ∨ z and [x ∨ (z ∧ t)] ∧ [t ∨ (x ∧ z)] = (y ∨ z) ∧ z. For the second: x ∨ (z ∧ t)] ∧ [t ∨ (x ∧ z) = [(x ∨ z) ∧ (x ∨ t)] ∧ [(t ∨ x) ∧ (t ∨ z)] = (x ∨ z) ∧ (t ∨ z) ∧ (x ∨ t) = z ∧ (x ∨ t) = z ∧ (y ∨ z).</formula><p>The first equality has a similar demonstration.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Resolution of analogical equations. Transitivity</head><p>In this section, we answer the following question: given three elements of an AP , can we find the fourth one? This is an important issue in analogical reasoning.</p><p>Let us suppose that in a distributive lattice we know three elements a, m and M . We are looking for an x satisfying the couple of equations:</p><formula xml:id="formula_314">a ∨ x = M and a ∧ x = m (4)</formula><p>This is a more general question that wondering whether the analogical equation Proof. Firstly, we show that x∧a = m with the equalities:</p><formula xml:id="formula_315">x∧a = [(M ∧ a)∨m]∧a = (M ∧ a ∧ a) ∨ (m ∧ a) = ( a ∧ a) ∨ m = m.</formula><p>Secondly, the equality x ∨ a = M is demonstrated in the same manner, using M ≤ ( a ∨ a) instead of ( a ∧ a) ≤ m. Then x = (M ∧ a) ∨ m is the solution.</p><p>Thirdly, we show in the same manner that x = (m ∨ a) ∧ M is a solution to (4). Since the solution is unique, the property is demonstrated.</p><p>When two or three elements are comparable, the solutions of the analogical equation are severely constrained.</p><p>Proposition 13 Let x, y, z and t be four elements of a distributive lattice such as (x : y :: z : t). If the three first elements are comparable then this AP is a SAP or a CAP . More precisely, (x : y :: z : t) is 1) (y ∧ z : y :: z : y ∨ z) if x ≤ y ∧ z, and (y ∨ z : y ::</p><formula xml:id="formula_316">z : y ∧ z) if x ≥ y ∨ z. In particular, it is a SAP 1 if y ≤ z ≤ x or x ≤ z ≤ y, and a SAP 2 if z ≤ y ≤ x or x ≤ y ≤ z 2) a CAP 1 (resp. CAP 2 )if z ≤ x ≤ y (resp. y ≤ x ≤ z).</formula><p>Proof.</p><p>1) We have from (1) y ∧ z ≤ x ≤ y ∨ z. Let us consider the case where x ≤ y ∧ z. We then have x = y ∧ z and we can easily check that t = y ∨ z is solution of equations x ∨ t = y ∨ z and x ∧ t = y ∧ z. Then, using Propositions 4 and 11, t = y ∨ z is the unique solution of (y ∧ z : y :: z : t). Moreover, if x ≤ z ≤ y, t = y ∨ z = y and then x = z. The other cases have a similar demonstration.</p><p>2) If z ≤ x ≤ y, y = x ∨ t and z = x ∧ t using Proposition 4,</p><p>3) The reasoning is similar to the previous one.</p><p>In the Boolean case, we recall a previous result.</p><p>Proposition <ref type="bibr">14 ([16]</ref>) The analogical equation in t: (x : y :: z : t) has a solution in a Boolean lattice if and only if y ∩ z ⊆ x ⊆ y ∪ z. In this case, the unique solution is t = ((y ∪ z)\x) ∪ (y ∩ z).</p><p>Finally, let us investigate transitivity, which propagates (dis)similarity. In the Boolean case, (a : b) :: (c : d) :: (e : f ) holds for general proportions <ref type="bibr">[10]</ref>. In the distributive case, CAP 1 (resp. CAP 2) are transitive. Proof is omitted due to space limitation.</p><p>Proposition 15 (Transitivity of CAP ) If (x : (x ∨ t) :: (x ∧ t) : t) and ((x∧t) : t :: u : v) are two canonical proportions of form CAP 1 (resp. CAP 2), then x : (x ∨ t) :: u : v is a canonical proportion of form CAP 1 (resp. CAP 2).</p><p>Conjecture 1 (Non transitivity of proportions) If (x : y :: z : t) and (z : t :: u : v) are two analogical proportions in a distributive lattice, it does not necessarily imply that (x : y :: u : v) is an analogical proportion.</p><p>We have not found any example to show this property, albeit the transitivity seems impossible to prove. Therefore, the non transitivity in a general distributive lattice is a conjecture. However, we have found an example to show that transitivity doesn't hold in general in a non transitive lattice.</p><p>We have not found any counter example to show this property. We conjecture there is no transitivity in distributive lattices. Indeed, in a non distributive lattice, transitivity does not holds, as shown in the following example. In S (see section 2) we have [0, 3] : {3} :: {0} : ∅ by considering Definition 3 and <ref type="bibr">4]</ref> and t 2 = {4}. However, [0, 3] : {3} :: [0, 4] : {4} is not true because it is impossible to satisfy the second condition of Definition 3. Indeed, if there exists four elements</p><formula xml:id="formula_317">x 1 = {3}, x 2 = {0}, t 1 = ∅, t 2 = ∅, x 1 = x 2 = [0, 3], t 1 = {0} and t 2 = {3}. Similarly, we have {0} : ∅ :: [0, 4] : {4} using x 1 = ∅, x 2 = {0}, t 1 = {4}, t 2 = ∅, x 1 = {0}, x 2 = [0, 4], t 1 = [0,</formula><formula xml:id="formula_318">x 1 , x 2 , t 1 and t 2 of S such that [0, 3] = x 1 ∧ x 2 , {0} = x 1 ∧ t 2 , [0, 4] = t 1 ∧ x 2 and {4} = t 1 ∧ t 2 , the closed interval t 2 contains 0 and 4 and then [0, 4] ⊂ t 2 . Moreover, [0, 4] ⊂ t 1 . Consequently, t 1 ∧ t 2 = {4}.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>The results of this paper provide a better understanding of analogical proportions in the general setting of lattices structures. In particular, it relates a factorization-based view of analogical proportions to its propositional logical reading in the case of Boolean lattices. For graded proportions, where the underlying lattice of grades is a chain, it leads to consider that the only fully valid logical proportions are of the form x : y :: x : y (and x : x :: y : y ) where x and y are elements in the chain. It acknowledges the fact that the change should be exactly the same on both sides of the proportion in order to make it (completely) valid, an idea which is for instance (successfully) at work in <ref type="bibr">[9]</ref>. The paper has also introduced canonical forms of analogical proportions that are instrumental in the decomposition of analogical proportions in distributive lattices. The unicity of the solution of an analogical proportion equation when it exists, is a important property that is preserved in distributive lattices, and which enables us to generate accurate conclusions.</p><p>Generally speaking, the results presented should be useful to design algorithms helping to propagate information in lattices, especially for purposes of reasoning and learning. Moreover, in <ref type="bibr">[20]</ref> a first attempt has been provided for relating analogical proportions to formal concept analysis, and searching for analogical proportions that may hold in a formal context by exploiting the lattice structure of the set of formal concepts. This study of analogical proportions in lattice structures should contribute in the long range to a clearer view of the links between these formalizations of the two key cognitive processes that are conceptual categorization and analogical reasoning.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Boolean Factor Analysis of Multi-Relational Data</head><p>Marketa Krmelova, Martin Trnecka</p><p>Data Analysis and Modeling Lab (DAMOL) Department of Computer Science, Palacky University, Olomouc marketa.krmelova@gmail.com, martin.trnecka@gmail.com</p><p>Abstract. The Boolean factor analysis is an established method for analysis and preprocessing of Boolean data. In the basic setting, this method is designed for finding factors, new variables, which may explain or describe the original input data. Many real-world data sets are more complex than a simple data table. For example almost every web database is composed from many data tables and relations between them.</p><p>In this paper we present a new approach to the Boolean factor analysis, which is tailored for multi-relational data. We show our approach on simple examples and also propose future research topics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Many data sets are Boolean by nature, that is, they contain only 0s and 1s. For example, any data recording the presence (or absence) of variables in observations are Boolean. Boolean data can be seen as a binary data table (or matrix or formal context) C, where the rows represent objects and the columns represent attributes of these objects. Between objects and attributes exists an incidence relation with meaning that an object i has an attribute j and this fact is represented by one in the Boolean table, i.e. C ij = 1. If an object i has not an attribute j, than C ij = 0. Many real-word data sets are more complex that a simple data table. Usually, they are composed from many data tables, which are interconnected by relations. An example of such data can be found in almost every sector of human activity. We call this kind of data multi-relational data. In this kind of data, this relations are crucial, because they represent additional information about the relationship between data tables and this information is important for understanding data as a whole.</p><p>The Boolean factor analysis (BFA) is used for many data mining purposes. The basic task in the BFA is to find new variables, called factors, which may explain or describe original single input data. Finding factors is obviously an important step for understanding and managing data. Boolean nature of data is in this case beneficial especially from the standpoint of interpretability of the results. On the other hand BFA is suitable for single input Boolean data table with just one relation between objects and attributes. The main aim of this work is to present the BFA of multi-relational data, which takes into account relations between data tables and extract more detailed information from this complex data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries and basic notions</head><p>We assume familiarity with the basic notions of FCA <ref type="bibr">[3]</ref>. In this work, we use the binary matrix terminology, because it is more convenient from our point of view. Consider an n × m object-attribute matrix C with entries C ij ∈ {0, 1} expressing whether an object i has an attribute j or not, i.e. C can be understood as a binary relation between objects and attributes. Because there is no danger of confusion we can consider this matrix as a formal context X, Y, C , where X represents a set of n objects and Y represents a set of m attributes.</p><p>A formal concept of X, Y, C is any pair E, F consisting of E ⊆ X (socalled extent) and F ⊆ Y (so-called intent) satisfying</p><formula xml:id="formula_319">E ↑ = F and F ↓ = E where E ↑ = {y ∈ Y | for each x ∈ X : x, y ∈ C}, and F ↓ = {x ∈ X | for each y ∈ Y : x, y ∈ C}.</formula><p>The goal of the BMF (the idea from <ref type="bibr">[1,</ref><ref type="bibr">6]</ref>) is to find decomposition</p><formula xml:id="formula_320">C = A • B<label>(1)</label></formula><p>of I into a product of an n × k object-factor matrix A over {0, 1}, a k × m matrix B over {0, 1}, revealing thus k factors, i.e. new, possibly more fundamental attributes (or variables), which explain original m attributes. We want k &lt; m and, in fact, k as small as possible in order to achieve parsimony: The n objects described by m attributes via C may then be described by k factors via A, with B representing a relationship between the original attributes and the factors. This relation can be interpreted in the following way: an object i has an attribute j if and only if there exists a factor l such that i has l (or, l applies to i) and j is one of the particular manifestations of l.</p><p>The product • in ( <ref type="formula" target="#formula_28">1</ref>) is a Boolean matrix product, defined by</p><formula xml:id="formula_321">(A • B) ij = k l=1 A il • B lj ,<label>(2)</label></formula><p>where denotes maximum (truth function of logical disjunction) and • is the usual product (truth function of logical conjunction). For example the following matrix can be decomposed into two Boolean matrices with k &lt; m.</p><formula xml:id="formula_322">  1 1 0 1 1 1 1 0 1   =   0 1 1 1 1 0   • 1 0 1 1 1 0</formula><p>The least k for which an exact decomposition C = A • B exists is in the Boolean matrix theory called the Boolean rank (or Schein rank).</p><p>An optimal decomposition of the Boolean matrix can be found via Formal concept analysis. In this approach, the factors are represented by formal concepts, see <ref type="bibr">[2]</ref>. The aim is to decompose the matrix C into a product A F • B F of Boolean matrices constructed from a set F of formal concepts associated to C. Let</p><formula xml:id="formula_323">F = { A 1 , B 1 , . . . , A k , B k } ⊆ B(X, Y, C),</formula><p>where B(X, Y, C) represents set of all formal concepts of context X, Y, C . Denote by A F and B F the n × k and k × m binary matrices defined by</p><formula xml:id="formula_324">(A F ) il = 1 if i ∈ A l 0 if i / ∈ A l (B F ) lj = 1 if j ∈ B l 0 if j / ∈ B l</formula><p>for l = 1, . . . , k. In other words, A F is composed from characteristic vectors A l .</p><p>Similarly for B F . The set of factors is a set F of formal concepts of X, Y, C , for which holds C = A F • B F . For every C such a set always exists. For details see <ref type="bibr">[2]</ref>. Interpretation factors as a formal concepts is very convenient for users and we follow this point of view in our work. Because a factor can be seen as a formal concept, we can consider the intent part (denoted by intent(F )) and the extent part (denoted by extent(F )) of the factor F .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Related work</head><p>The Boolean matrix factorization (or decomposition), also known as the Boolean factor analysis, has gained interest in the data mining community during the past few years.</p><p>In the literature, we can find a wide range of theoretical and application papers about the Boolean factor analysis. The overview of the Boolean matrix theory can be found in <ref type="bibr">[8]</ref>. A good overview from the BMF viewpoint is in e.g. <ref type="bibr">[12]</ref>. For our work is the most important <ref type="bibr">[2]</ref>, where were first used formal concepts as factors.</p><p>Several heuristic algorithms for the BMF were proposed. In our work we adopt algorithm GreConD <ref type="bibr">[2]</ref> (originally called Algorithm 2), but there exist several different approaches, which use so-called "tiles" in Boolean data <ref type="bibr">[4]</ref>, hyper-rectangles <ref type="bibr">[15]</ref> or which introduce some noise <ref type="bibr">[12,</ref><ref type="bibr">10]</ref> in Boolean data.</p><p>From wide range of applications papers let us mentioned only <ref type="bibr">[13]</ref> and <ref type="bibr">[14]</ref>, where the BMF is used for solving the Role mining problem.</p><p>In the literature, there can be found several methods for the latent factor analysis of ordinal data and also of multi-relational data <ref type="bibr">[9]</ref>, but using these methods for Boolean data has proved to be inconvenient many times.</p><p>The BMF of multi-relational data is not directly mentioned in any previous work. Indirectly, it is mentioned, in a very specific form, in <ref type="bibr">[11]</ref> as Joint Subspace Matrix Factorization, where there are two Boolean matrices, which both share the same rows (or columns). The main aim is to find a set of shared factors (factors common for both matrices) and a set of specific factors (factors which are either in first or second matrix, not in both). This can be viewed as particular, very limited setting of our work.</p><p>From our point of view are also relevant works <ref type="bibr">[5,</ref><ref type="bibr">7]</ref>. These introduce the Relational formal concept analysis (RCA), i.e. the Formal concept analysis on multi-relational data. Our approach is different from the RCA. In our approach, we extract factors from each data table and connect these factors into more general factors. In RCA, they iteratively merge data tables into one in the following way: in each step they computed all formal concepts of one data table and these concepts are used as additional attributes for the merged data table. After obtaining a final merged data table, all formal concepts are extracted. Let us mention that our approach delivers more informative results than a simple use of BMF on merged data table from RCA, moreover getting merged data table is computationally hard.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Boolean factor analysis of multi-relational data</head><p>In this section we describe our basic problem setting. We have two Boolean data tables C 1 and C 2 , which are interconnected with relation R C1C2 . This relation is over the objects of first data table C 1 and the attributes of second data table C 2 , i.e. it is an objects-attributes relation. In general, we can also define an objectsobjects relation or an attributes-attributes relation. Our goal is to find factors, which explain the original data and which take into account the relation R C1C2 between data tables. Definition 1. Relation factor (pair factor) on data tables C 1 and C 2 is a pair</p><formula xml:id="formula_325">F i 1 , F j 2 ,</formula><p>where</p><formula xml:id="formula_326">F 1 i ∈ F 1 and F j 2 ∈ F 2 (F i denotes set of factors of data table C i ) and satisfying relation R C1C2 .</formula><p>There are several ways how to define the meaning of "satisfying relation" from Definition 1. We will define the following three approaches (this definition holds for an object-attribute relation, other types of relations can be defined in similar way):</p><formula xml:id="formula_327">-F i 1 and F j 2 form pair factor F i 1 , F j 2 if holds: k∈extent(F i 1 ) R k = ∅ and k∈extent(F i 1 ) R k ⊆ intent(F j 2 ),</formula><p>where R k is a set of attributes, which are in relation with an object k. This approach we called narrow (it is analogy of the narrow operator in <ref type="bibr">[7]</ref>).</p><p>-F i 1 and F j 2 form pair factor</p><formula xml:id="formula_328">F i 1 , F j 2 if holds:     k∈extent(F i 1 ) R k   ∩ intent(F j 1 )   = ∅.</formula><p>We called this approach wide (it is analogy of the wide operator in <ref type="bibr">[7]</ref>).</p><p>-for any α ∈ [0, 1], F i 1 and F j 2 form pair factor F i 1 , F j 2 if holds:</p><formula xml:id="formula_329">k∈extent(F i 1 ) R k ∩ intent(F j 2 ) k∈extent(F i 1 ) R k ≥ α.</formula><p>We called it an α-approach.</p><p>Remark 1. It is obvious, that for α = 0 and replacing ≥ by &gt;, we get the wide approach and for α = 1, we get the narrow one.</p><p>Lemma 1. For α 1 &gt; α 2 holds, that a set of relation factors counted by α 1 is a subset of a set of relation factors obtained with α 2 .</p><p>We demonstrate our approach to factorisation of mutli-relational Boolean data by a small illustrative example.</p><p>Example 1. Let us have two data tables C W (Table <ref type="table" target="#tab_0">1</ref>) and C M (Table <ref type="table" target="#tab_2">2</ref>). C W represents women and their characteristics and C M represents men and their characteristics.    <ref type="table" target="#tab_3">3</ref>) between the objects of first the data table and the attributes of the second data table. In this case, it could be a relation with meaning "woman looking for a man with the characteristics". Remark 2. Generally, nothing precludes the object-object relation (whose meaning might be "woman likes a man") and the attribute-attribute relation (whose meaning might be "the characteristics of women are compatible with the characteristics of men in the second data table <ref type="table">"</ref>). </p><formula xml:id="formula_330">× × Becky × × Claire × × × Daphne × × × × Moreover, we consider relation R C W C M (Table</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Factors of data</head><formula xml:id="formula_331">-F M 1 = {Ben, Carl}, {undergraduate, wants kids} -F M 2 = {Adam}, {athlete, is attractive} -F M 3 = {Adam, Carl}, {athlete} -F M 4 = {Dave},</formula><p>{wants kids, is attractive} These factors were obtained via GreConD algorithm from <ref type="bibr">[2]</ref>. We have two sets of factors (formal concepts), first set</p><formula xml:id="formula_332">F W = {F 1 W , F 2 W , F 3 W } factorising data table C W and F M = {F 1 M , F 2 M , F 3 M } factorising data table C M . Now we use so far unused relation R C W C M , between C W and C M to joint factors of C W with factors of C M into relational factors.</formula><p>For the above defined approaches we get results which are shown below. We write it as binary relations, i.e F i W and F j M belongs to relational factor F i W , F j M iff F i W and F j M are in relation:</p><formula xml:id="formula_333">Narrow approach F 1 M F 2 M F 3 M F 4 M F 1 W × F 2 W F 3 W × Wide approach F 1 M F 2 M F 3 M F 4 M F 1 W × × F 2 W × × × × F 3 W × 0.6-approach F 1 M F 2 M F 3 M F 4 M F 1 W × F 2 W × F 3 W × 0.5-approach F 1 M F 2 M F 3 M F 4 M F 1 W × × F 2 W × F 3 W ×</formula><p>The relational factor in form F i W , F j M can be interpreted in the following ways:</p><p>-Women, who belong to extent of F i W like men who belong to extent of F j M . Specifically in this example, we can interpret factor F 1 W , F 1 M , that Abby and Daphne should like Ben and Carl.</p><p>-Women, who belong to extent of F i W like men with characteristic in intent of F j M . Specifically in this example, we can interpret factor F 1 W , F 1 M , that Abby and Daphne should like undergraduate men, who want kids.</p><p>-Women, with characteristic from intent F i W like men who belong to extent F j M . Specifically in this example, we can interpret factor F 1 W , F 1 M , that undergraduate, attractive women, who want kids should like Ben and Carl.</p><p>-Women, with characteristic from intent F i W like men with characteristic in intent of F j M . Specifically in this example, we can interpret factor F 1 W , F 1 M , that undergraduate, attractive women, who want kids should like undergraduate men, who want kids.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Interpretation of the relation between F i</head><p>W and F j M is driven by used approach. If we obtain factor F i W , F j M by narrow approach, we can interpret relation between F i W and F j M : "women who belong to F i W , like men from F M j completely". For example factor F 1 W , F 1 M can be interpreted: "All undergraduate attractive women, who want kids, wants undergraduate men, who want kids."</p><p>If we obtain factor F i W , F j M by wide approach, we can interpret the relation between F i W and F j M : "women who belong to F i W , like something about the men from F M j ". For example F 2 W , F 1 M can be interpreted: "All athlete woman, who want kids, like undergraduate men or man, who want kids."</p><p>If we get F i W , F j M by α-approach with value α, we interpret the relation between F i W and F j M as: "women from F i W , like men from F M j enough", where α determines measurement of tolerance.  For each factor, we take the extent of this factor and compute concept in C 1 , which contains this extent. Similarly for intents of factors and concepts in C 2 . For example one of the factors of R C W C M from Example 1 is: {Becky, Daphne}, {athlete, wants kids} .</p><formula xml:id="formula_334">extent(F j1 2 &amp;F j2 2 ) = extent(F j1 2 ) ∪ extent(F j2 2 ) and intent(F j1 2 &amp;F j2 2 ) = intent(F j1 2 ) ∩ intent(F j2 2 ), instead of F i 1 , F j1 2 and F i 1 , F j2</formula><p>Relational factor computed from this factor will be {Becky, Daphne}, {athlete, wants kids} , {Carl}, {athlete, undergraduate, wants kids} . This approach seems to be better in terms of that we get pair of concepts for every factors, but we do not get an exact decomposition of data tables C 1 and C 2 . Moreover this approach can not be extended to n-ary relations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">n-tuple relational factors, n-ary relations</head><p>Above approaches can be generalized for more than two data tables. In this generalization, we do not get factor pairs, but generally factor n-tuples. Now we extend Definition 1 to general definition of relational factor.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 2. Relation factor on data tables</head><formula xml:id="formula_335">C 1 , C 2 , . . . C n is a n-tuple F i1 1 , F i2 2 , . . . F in n , where F ij j ∈ F j where j ∈ {1, . . . , n} (F j denotes set of factors of data table C j ) and satisfying relations R C l C l+1 or R C l+1 C l for l ∈ {1, . . . , n − 1}.</formula><p>We considered only binary relations between data tables, for which holds, that there exists only one relation interconnecting data tables C i and C i+1 for i ∈ {1, . . . , n − 1}. We left more general relations into the extended version of this paper. Let us mentioned, that this generalization of our approach is possible in the opposite of Remark 5. We show n-tuple relational factors on example.</p><p>Example 2. Let data table C P (Table <ref type="table" target="#tab_41">4</ref>) represents people and their characteristic, C R (Table <ref type="table">5</ref>) represents restaurants and their characteristics and C C (Table <ref type="table" target="#tab_42">6</ref>) represents which ingredients are included in national cuisines.      One of the relational factors, which we get by 0.5-approach, is</p><formula xml:id="formula_336">Adam × × Ben × × Carol × × Dale × × Emily × Frank × Gabby × × Table 5: C R luxury ordinal expensive cheap Restaurant 1 × × Restaurant 2 × × Restaurant 3 × × Restaurant 4 × × Restaurant 5 × ×</formula><formula xml:id="formula_337">Greek × × × × × × × × × × × × Chinese × × × × × × × × × × × × × × French × × × × × × × × × × × × × × × Indian × × × × × × × × × Czech × × × × × × × × × × × × × × Spanish × × × × × × × × × × × Mexican × × × × × × × × × × × Italian × × × × × × × × × × × × American × × × × × × × × × Japanese × × × × German × × × × × × × ×</formula><formula xml:id="formula_338">Adam × × × × × × Ben × × × × × × × Carol × × × × × × × × × × Dale × × × × × × × × × Emily × × × × × × × Frank × × × × × Gabby × × × × × Relation R C P C C (</formula><formula xml:id="formula_339">Restaurant 1 × × × × × Restaurant 2 × × × × × × Restaurant 3 × × × × Restaurant 4 × × × × Restaurant 5 × × × ×</formula><formula xml:id="formula_340">F i R Extent Intent F 1 R {Restaurant 4, Restaurant 5} {ordinal, cheap} F 2 R {Restaurant 1, Restaurant 2} {luxury, expensive} F 3 R {Restaurant 3} {luxury, cheap}</formula><formula xml:id="formula_341">F 1 P , F 11 C , F 3 R</formula><p>and could be interpreted as "men would enjoy eating in luxury restaurants where the meals are cheap". Another factor is F 3 P , F 2 C , F 1 R and could be interpreted as "women enjoy eating in ordinal cheap restaurants".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Representation of connection between factors</head><p>We can represent the relational factors via graph (n-partite). See Figure <ref type="figure" target="#fig_0">1</ref>, which presents the results from the previous example. Each group of nodes (F i P , F i C , F i R ) represents factors of a specific data table. Between two nodes, there is an edge iff factors representing nodes satisfy the input relation. Relational factor is path between nodes, which include at most one node from each group. For example,</p><formula xml:id="formula_342">F 2 P , F 3 C , F 1</formula><p>R is a relational factor because there is an edge between nodes F 2 P and F 3 C and between F 3 C and F 1 R .</p><formula xml:id="formula_343">F 1 P F 2 P F 3 P F 4 P F 5 P F 1 C F 2 C F 3 C F 4 C F 5 C F 6 C F 7 C F 8 C F 9 C F 10 C F 11 C F 12 C F 13 C F 14 C F 15 C F 16 C F 17 C F 1 R F 2 R F 3 R F 1 C F 2 C F 3 C F 4 C F 5 C F 6 C F 7 C F 8 C F 9 C F 10 C F 11 C F 12 C F 13 C F 14 C F 15 C F 16 C F 17 C</formula><p>Fig. <ref type="figure" target="#fig_0">1</ref>: Representation factors connections via graph.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion and Future Research</head><p>In this paper we present the new approach to BMF of multi-relational data, i.e. data which are composed from many data tables and relations between them. This approach, as opposed from to BMF, takes into account the relations and uses these relations to connect factors from individual data tables into one complex factor, which delivers more information than the simple factors.</p><p>A future research shall include the following topics: generalization multirelational Boolean factorization for ordinal data, especially data over residuated lattices. Design an effective algorithm for computing relational factors. Develop new approaches for connecting factors which utilize statistical methods and last but not least drive factor selection in the second data table, using information about factors in the first one and relation between them, for obtaining more relevant data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>On Projections of Sequential Pattern Structures</head><p>(with an application on care trajectories)</p><p>Aleksey Buzmakov 1,2 , Elias Egho 1 , Nicolas Jay 1 , Sergei O. Kuznetsov 2 , Amedeo Napoli 1 , and Chedy Raïssi <ref type="formula" target="#formula_28">1</ref>1 LORIA (CNRS -Inria NGE -U. de Lorraine), Vandoeuvre-lès-Nancy, France 2 National Research University Higher School of Economics, Moscow, Russia {aleksey.buzmakov, chedy.raissi}@inria.fr, {elias.egho, nicolas.jay, amedeo.napoli}@loria.fr, skuznetsov@hse.ru Abstract. In this paper, we are interested in the analysis of sequential data and we propose an original framework based on FCA. For that, we introduce sequential pattern structures, an original specification of pattern structures for dealing with sequential data. Sequential pattern structures are given by a subsumption operation between set of sequences, based on subsequence matching. To avoid a huge number of resulting concepts, domain knowledge projections can be applied. The original definition of projections is revised in order to operate on sequential pattern structures in a meaningful way. Based on the introduced definition, several projections of sequential pattern structures involving domain or expert knowledge are defined and discussed. This projections are evaluated on a real dataset on care trajectories where every hospitalization is described by a heterogeneous tuple with different fields. The evaluation reveals interesting concepts and justify the usage of introduced projections of sequential pattern structures. This research work provides a new and efficient extension of FCA to deal with complex data, which can be an alternative to the analysis of sequential datasets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Introduction</head><p>Analysis of sequential data is a challenging task. In the last two decades, the main emphasis has been on developing efficient mining algorithms with effective pattern representations for sequences of itemsets <ref type="bibr">[1]</ref><ref type="bibr">[2]</ref><ref type="bibr">[3]</ref><ref type="bibr">[4]</ref>. The traditional sequential pattern mining algorithms generate a large number of frequent sequences while a few of them are truly relevant. Moreover, in some particular cases, only sequential patterns of a certain type are of interest and should be mined first. Are we able to develop a framework for taking into account only patterns of required types? Furthermore, in many cases sequential data are described by sequences with complex elements, e.g. a text is a sequence of syntactic trees. To process such kind of data with existing algorithms, elements of sequences can be scaled into itemsets as it is done in the case of multilevel multidimensional data <ref type="bibr">[5]</ref>. However, in this case it is rather difficult to introduce expert requirements within a sequence, which leads to even a larger set of resulting patterns.</p><p>We approach this problem with FCA and pattern structures <ref type="bibr">[6,</ref><ref type="bibr">7]</ref>. FCA is successfully used for analysis of sequential data <ref type="bibr">[8,</ref><ref type="bibr">9]</ref>. Moreover, it allows one to use different measures of interestingness for the resulting patterns (concepts). Pattern structures allows to directly process sequential data without a scaling step. Furthermore, there are projections of pattern structures, which were introduced in order to simplify the computation of pattern lattices, by simplifying descriptions. Moreover, projections can be efficiently used as special domain knowledge requirements, allowing to reduce the number of irrelevant patterns. We generalize the original definitions of projections, in order to deal with projections respecting domain knowledge. For example, sequences of length 1 are rare useful but they cannot be excluded by the original definition of projections.</p><p>The rest of the paper is organized as follows. In Section 1 we remind FCA, pattern structures and measures of concept interestingness. Section 2 states the problem of complex sequences analysis and introduces sequential pattern structures. In Section 3, first, the generalization of projections is defined, and, second, some projections specific to sequential pattern structures are introduced and analyzed. And finally before concluding the paper, we discuss an experimental evaluation in Section 4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">FCA and Pattern Structures</head><p>FCA <ref type="bibr">[6]</ref> is a mathematical formalism having many applications in data analysis. Pattern structures is a generalization of FCA for dealing with complex structures, such as sequences or graphs <ref type="bibr">[7]</ref>. Definition 1. A pattern structure is a triple (G, (D, ), δ), where G is a set of objects, (D, ) is a complete meet-semilattice of descriptions and δ : G → D maps an object to a description.</p><p>The lattice operation in the semilattice ( ) corresponds to the similarity between two descriptions. Standard FCA can be presented in terms of pattern structures. In this case, G is the set of objects, the semilattice of descriptions is (℘(M ), ), where a description is a set of attributes, with the operation corresponding to the set intersection (℘(M ) denotes the powerset of M ). If x = {a, b, c} and y = {a, c, d} then x y = x ∩ y = {a, c}. The mapping δ : G → ℘(M ) is given by, δ(g) = {m ∈ M | (g, m) ∈ I}, and returns the description for a given object as a set of attributes.</p><p>The Galois connection for (G, (D, ), δ) is defined as follows:</p><formula xml:id="formula_344">A := g∈A δ(g), for A ⊆ G d := {g ∈ G | d δ(g)}, for d ∈ D</formula><p>The Galois connection makes a correspondence between sets of objects and descriptions. Given a set of objects A, A returns the description which is common to all objects in A. And given a description d, d is the set of all objects whose description subsumes d. More precisely, the partial order (or the subsumption order) on D ( ) is defined w.r. As in standard FCA, a pattern concept corresponds to the maximal set of objects A whose description subsumes the description d, where d is the maximal common description for objects in A. The set of all concepts can be partially ordered w.r.t. partial order on extents (dually, intent patterns, i.e ), within a concept lattice. An example of a pattern structure is given and described in the next sections. It can be noticed that Table <ref type="table" target="#tab_0">1</ref> defines a pattern structure, while the corresponding lattice is depicted in Figure <ref type="figure" target="#fig_0">1</ref>.</p><p>It is worth mentioning, that the size of the concept lattice can be exponential w.r.t. to the number of objects, and, thus, we need a special ranking method to select the most interesting concepts for further analysis. Several techniques are considered in <ref type="bibr">[10]</ref>, where it is shown that stability index <ref type="bibr">[11]</ref> is more reliable in noisy data. Thus, we use this index in our current work. </p><p>Stability measures how much the concept depends on the initial dataset. The larger the stability the more objects can be deleted from the context without affecting the intent of the concept, i.e. the intent of the most stable concepts are likely to be a characteristic pattern of a studied phenomena rather than an artifact of a data set.</p><p>After a brief general description of the analysis with pattern structures, the analysis of sequential data can be specified.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Sequential Pattern Structures</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">An Example of Sequential Data</head><p>Imagine that we have medical trajectories of patients, i.e. sequences of hospitalizations, where every hospitalization is described by a hospital name and a set of procedures. An example of sequential data on medical trajectories with three patients is given in Table <ref type="table" target="#tab_0">1</ref>. There are a set of procedures P = {a, b, c, d}, a An important task is to find the "characteristic" sequences of procedures and associated hospitals in order to improve hospitalization planning, optimize clinical processes or detect anomalies. This sequences can be found by searching for the most stable concepts in the lattice corresponding to a pattern structure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Partial Order on Complex Sequences</head><p>A sequence is constituted of elements from an alphabet. The classical subsequence matching task requires no special properties of the alphabet. Several generalizations of the classical case were made by introducing a subsequence relation based on itemset alphabet <ref type="bibr">[8]</ref> or on multidimensional and multilevel alphabet <ref type="bibr">[5]</ref>, scaled to itemset alphabet as well. Both these alphabets are certain semilattices, and, thus, we generalize the previous cases, requiring for an alphabet to form a general semilattice (E, E )<ref type="foot" target="#foot_51">1</ref> . Thanks to pattern structure formalism we are able to process in a unified way all types of sequential datasets with poset-shaped alphabet. However, some sequential data can have connections between elements, e.g. <ref type="bibr">[12]</ref>, and, thus, cannot be immediately processed by our approach.</p><p>Definition 4. A sequence is an ordered list of e ∈ (E, E ), such that e = ⊥ E .</p><p>Here, ∀e ∈ E, ⊥ E = ⊥ E E e. The bottom element is required by the lattice structure but provide us with no useful information (it matches to any other element), thus, it is excluded from the sequences. In the same way, in mining of sequences of itemsets the empty itemset cannot be a proper element <ref type="bibr">[2]</ref>. Definition 5. A sequence t = t 1 ; ...; t k is a subsequence of a sequence s = s 1 ; ...; s n , denoted t ≤ s, iff k ≤ n and there exist j 1 , ..j k such that 1 ≤ j 1 &lt; j 2 &lt; ... &lt; j k ≤ n and for all i ∈ {1, 2, ..., k}, t i E s ji (⇔ t i E s ji = t i ). Fig. <ref type="figure" target="#fig_122">1:</ref> The concept lattice for the pattern structure given by Table <ref type="table" target="#tab_0">1</ref>. Concept intents reference to sequences in Tables <ref type="table" target="#tab_66">1 and 2</ref>.   <ref type="table" target="#tab_0">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Subsequences</head><p>With complex sequences and such kind of subsequences the computational procedure can be difficult, thus, to simplify the procedure, only "contiguous" subsequences are considered, where only the order of consequent elements is taken into account, i.e. given j 1 in Definition 5, j i = j i−1 +1 for all i ∈ {2, 3, ..., k}. Such a restriction makes sens for our data, because a hospitalization is a discrete event and it is likely that the next hospitalization has a relation with the previous one, for example, hospitalizations for treating aftereffects of chemotherapy. Below the word "subsequence" refers to "contiguous" subsequence.</p><p>Example 1. In the running example (Section 2.1), the alphabet is E = T H ×℘(P ) with the similarity operation (h 1 , P 1 ) (h 2 , P 2 ) = (h 1 h 2 , P 1 ∩ P 2 ), where h 1 , h 2 ∈ T H are hospitals and P 1 , P 2 ∈ ℘(P ) are sets of procedures. Thus, the sequence ss 1 in Table <ref type="table" target="#tab_2">2</ref> is a subsequence of p 1 in Table <ref type="table" target="#tab_0">1</ref> because if we set j i = i + 1 (Definition 5) then ss 1 1 p 1 j1 ('CH' is an ancestor for H 1 and {c, d} ⊆ {c, d}), ss 1 2 p 1 j2 (the same hospital and {b} ⊆ {b, a}) and ss 1 3</p><formula xml:id="formula_346">p 1 j3</formula><p>('*' is an ancestor for anything and {d} ⊆ {d}).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Meet-semilattice of Sequences</head><p>Using the previous definitions, we can precisely define the sequential pattern structures that are used for representing and managing sequences. For that, we make an analogy with pattern structures for graphs where the meet-semilattice operation respects subgraph isomorphism <ref type="bibr">[13]</ref>. Thus, we introduce a sequential meet-semilattice respecting subsequence relation. Let us consider S as the set of all sequences based on an alphabet (E, E ). S is partially ordered w.r. Example 2. The sequential pattern structure for our example (Subsection 2.1) is (G, (D, ), δ), where G = p 1 , p 2 , p 3 is the set of patients, (D, ) is the semilattice of sequential descriptions, and δ is the mapping (shown in Table <ref type="table" target="#tab_0">1</ref>) associating a patient in G to a description in D. Figure <ref type="figure" target="#fig_0">1</ref> shows the resulting lattice of sequential pattern concepts for this particular pattern structure.</p><p>The set of all possible subsequences for a given sequence can be rather large. Thus, it is more efficient and readable to keep a pattern d ∈ D as a set of only maximal sequences d, d = {s ∈ d | s * ∈ d : s * ≥ s}. In the rest of the paper, every pattern is given only by the set of its maximal sequences. For example, p 2 p 3 = ss 6 , ss 7 , ss 8 (see Tables <ref type="table" target="#tab_66">1 and 2</ref>), i.e. ss 6 , ss 7 , ss 8 is the set of all maximal sequences specifying the intersection result of two sets of sequences p 2 and p 3 , in the same way ss 6 , ss 7 , ss 8 p 1 = ss 4 , ss 5 . Note that representing a pattern by the set of all maximal sequences allows for an efficient implementation of the intersection " " of two patterns. The next proposition is follows from this subsection and Definition 5.</p><p>Proposition 1. Given (G, (D, ), δ) and x, y ∈ D, x y if and only if ∀s x ∈ x there is a sequence s y ∈ y, such that s x ≤ s y .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Projections of Sequential Pattern Structures</head><p>Pattern structures can be hard to process due to the usually large number of concepts in the concept lattice and the complexity of the involved similarity operation (make the parallel with the graph isomorphism problem). Moreover, a given pattern structure can produce a lattice with a lot of patterns which are not interesting for an expert. Can we save computational time by avoiding the construction of unnecessary patterns? Projections of pattern structures "simplify" to some degree the computation and allow one to work with a reduced description. In fact, projections can be considered as constraints (or filters) on patterns respecting certain mathematical properties. These mathematical properties ensure that the projection of a lattice is a lattice where projected concepts have certain correspondence to original ones. Moreover, the stability measure of projected concepts never decreases w.r.t the corresponding concepts. We introduce projections on sequential patterns, revising them from <ref type="bibr">[7]</ref>. An extended definition of projections w.r.t. the definition in <ref type="bibr">[7]</ref> should be provided in order to deal with interesting projections for real-life sequential datasets. Note that in <ref type="bibr">[7]</ref> ψ((G, (D, ), δ)) = (G, (D, ), ψ • δ). Now we should show that (D ψ , ψ ) is a semilattice. Proposition 2. Given a semilattice (D, ) and a projection ψ, for all x, y ∈ D ψ(x y) = ψ(ψ(x) y).</p><formula xml:id="formula_347">Proof. 1. ψ(x) x, thus, x, y (x y) (ψ(x) y) ψ(ψ(x) y) 2. x y ⇒ ψ(x) ψ(y), thus, ψ(x y) ψ(ψ(x) y) 3. ψ(x y) ψ(x) y = ψ(x y) ψ(x) ψ(x y) y = ψ(x y) y ψ(x y),</formula><p>then (ψ(x) y) ψ(x y) and ψ(ψ(x) y) ψ(ψ(x y)) = ψ(x y) 4. From ( <ref type="formula" target="#formula_29">2</ref>) and (3) follows that ψ(x y) = ψ(ψ(x) y).</p><formula xml:id="formula_348">Corollary 1. X 1 ψ X 2 ψ • • • ψ X N = ψ(X 1 X 2 • • • X N )</formula><p>Corollary 2. Given a semilattice (D, ) and a projection ψ, (D ψ , ψ ) is a semilattice, i.e. ψ is commutative, associative and idempotent.</p><p>The concepts of a pattern structure and a projected pattern structure are connected with the next proposition, following from Corollary 1:</p><formula xml:id="formula_349">Proposition 3. An extent in ψ((G, (D, ), δ)) is an extent in (G, (D, ), δ). An intent in ψ((G, (D, ), δ)) is of the form ψ(d)</formula><p>, where d is the intent of the concept with the same extent.</p><p>Moreover, preserving extents of some concepts, projections cannot decrease the stability of the projected concepts, i.e. if the projection preserves a stable concept, then its stability (Definition 3) can only increase. Proof. Concepts c and c have the same extent. Thus, according to Definition 3, in order to prove the proposition statement, it is enough to prove that for any subset A ⊆ Ext(c), if A = Int(c) in the original pattern structure, then A = Int(c) in the projected one. It can be proven from contrary.</p><p>Suppose that ∃A ⊂ Ext(c) such that A = Int(c) in the original pattern structure and A = Int(c) in the projected one. Then there is a descendant concept d of c in the projected pattern structure such that A = Int( d) in the projected lattice. Then there is an original concept d for the projected concept d with the same Ext(d). Then A Int(d) Int(c) and, so, A cannot be equal to Int(c) in the original lattice. Contradiction.</p><p>No we are going to present two projections of sequential pattern structures. The first projection comes from the following observation. In many cases it may be more interesting to analyze quite long subsequences rather than short one. This kind of projections is called Minimal Length Projection (MLP) and it depends on the minimal allowed length parameter l for the sequences in a pattern. The corresponding function ψ maps a pattern without short sequences to itself, and a sequence with short sequences to the pattern containing only long sequences, ψ(d) = {s ∈ d | length(s) &gt; l}. Later, propositions 1 and 5 stay that MLP is coherent with Definition 6.</p><p>Example 3. If we prefer common subsequences of length ≥ 3, then between p 2 and p 3 in Table <ref type="table" target="#tab_0">1</ref> there is only one maximal common subsequence, ss 6 in Table <ref type="table" target="#tab_2">2</ref>, while ss 7 and ss 8 are too short to be considered. Figure <ref type="figure" target="#fig_123">2a</ref> shows the lattice corresponding the projected pattern structure (Table <ref type="table" target="#tab_0">1</ref>) with patterns of length more or equal to 3. Proposition 5. MLP is a monotone, contractive and idempotent function on the semilattice (D, ).</p><p>Proof. The contractivity and idempotentcy are quite clear from the definition. Remains the proof for monotonicity.</p><p>If X Y where X and Y are sets of sequences then for every sequence x ∈ X there is a sequence y ∈ Y such that x ≤ y (Proposition 1). We should show that ψ(X) ψ(Y ), or in other words for every sequence x ∈ ψ(X) there is a sequence y ∈ ψ(Y ), such that x ≤ y. Given x ∈ ψ(X), since ψ(X) is a subset of X and X Y , then there is a sequence y ∈ Y such that x ≤ y, with |y| ≥ |x| ≥ l (l is a parameter of MLP), and thus, y ∈ ψ(Y ).</p><p>The second projection of a sequential pattern structure is connected to a projection of an alphabet semilattice, (E, E ).</p><p>Example 4. An expert is interested in finding sequential patterns on how a patient changes hospitals, but he has little interest in procedures. Thus, any element of the alphabet lattice, containing a non-empty set of procedures can be projected to the element with the same hospital but with the empty set of procedures.</p><p>Example 5. An expert is interested in finding sequential patterns containing some information about the hospital in every hospitalization, and the corresponding procedures, i.e. hospital field in the patterns cannot be equal to the element "any hospital", denoted * , e.g., ss 5 is an invalid pattern, while ss 6 is a valid pattern in Table <ref type="table" target="#tab_2">2</ref>. Thus, any element of the alphabet semilattice with * hospital can be projected to the ⊥ E . Figure <ref type="figure" target="#fig_123">2b</ref> shows the lattice corresponding to the projected pattern structure (Table <ref type="table" target="#tab_0">1</ref>), where projection comes from the projection of the alphabet semilattice.</p><p>Below we formally define how the alphabet projection of a sequential pattern structure should be processed. Intuitively, every sequence in a pattern should be substituted with another sequence, by applying the alphabet projection to all its elements. However, the result can be an incorrect sequence, because ⊥ E is forbidden to be in a sequence, thus, sequences in a pattern should be "developed" w.r.t. ⊥ E , as it is explained below. Fig. <ref type="figure" target="#fig_1">2</ref>: The projected concept lattices for the pattern structure given by Table <ref type="table" target="#tab_0">1</ref>.</p><p>Concept intents refer to the sequences in Tables <ref type="table" target="#tab_66">1 and 2</ref>.</p><p>Definition 7. Given an alphabet (E, E ), an alphabet projection ψ and a sequence s based on E, the projection of the sequence ψ(s) is the sequence s such that, si = ψ(s i ) (s i is the i-th element of sequence s).</p><p>Here, it should be noted that s can be incoherent with Definition 4, since it allows ⊥ E to be an element. For simplicity, we allow this incoherence here. Definition 8. Given an alphabet (E, E ), an alphabet projection ψ, and a pattern d ∈ D, an alphabet-projected pattern d = ψ(d), is the set of sequences obtained by the following procedure. For every sequence s ∈ d, the projection of s is computed (Definition 7) and, then, the projection of the sequence is substituted by the set of its maximal subsequences containing no ⊥. All the resulting sequences constitute the set d, and d is the set of maximal sequences in d. Example 6. {ss 6 } is an alphabet-projected pattern for the pattern {ss 10 }, where alphabet lattice projection is given in Example 5.</p><p>{ [CH, {c, d}] } is an alphabet-projected pattern for the pattern {ss 2 }, where alphabet lattice projection is given by projecting every element with medical procedure b to the element with the same hospital and with the same set procedures excluding b. The projected sequence of sequence ss 2 is [CH, {c, d}]; [ * , {}]; [ * , {d}] , but [ * , {}] = ⊥ E , and, thus, in order to project the pattern {ss 2 } the projected sequence is substituted by its maximal subsequences, i.e.</p><formula xml:id="formula_350">ψ({ [CH, {c, d}]; [ * , {b}]; [ * , {d}] }) = { [CH, {c, d}] }.</formula><p>Proposition 6. Considering an alphabet (E, E ), the projection of an alphabet ψ, a sequential pattern structure (G, (D, ), δ), the procedure given by Definition 8 is monotone, contractive and idempotent.</p><p>Proof. This procedure is idempotent, since the projection of the alphabet is idempotent. It is contractive because for a pattern d, for any sequences s ∈ d, the projection of the sequence s = ψ(s) is a subsequence of s. In the Definition 8 the projected sequences should be substituted by its maximal subsequences in order to avoid ⊥ E , building the sets {s i }. Thus, s is a supersequence for any si , and, so, the projected pattern d = ψ(d) is subsumed by the pattern d.</p><p>Finally, we should show monotonicity. Given two patterns x, y ∈ D, such that x y, i.e. ∀s x ∈ x, ∃s y ∈ y : s x ≤ s y , consider the projected sequence of s x , ψ(s x ). As s x ≤ s y for some s y then for some j 0 &lt; j 1 &lt; j |s x | (see Definition 5)</p><formula xml:id="formula_351">s x i E s y ji (i ∈ 1, 2, ..., |s x |), then ψ(s x i ) E ψ(s y ji )</formula><p>(by the monotonicity of the alphabet projection), i.e. projected sequence preserve the subsequence relation. Thus, the alphabet projection of the pattern preserve pattern subsumption relation, ψ(x) ≤ ψ(y) (Proposition 1), i.e. the alphabet projection is monotone.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Sequential Pattern Structure Evaluation</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Implementation</head><p>Nearly all state-of-the-art FCA algorithms can be adapted to process pattern structures. We adapted AddIntent algorithm <ref type="bibr">[14]</ref>, as the lattice structure is important for us to calculate stability (see the algorithm for calculating stability in <ref type="bibr">[15]</ref>). To compute the semilattice operation ( , ) between two sets of sequences S = {s 1 , ...s n } and T = {t 1 , ..., t m }, S T is calculated according to Section 2.3, i.e. maximal sequences among all maximal common subsequences for any pair of s i and t j . To find all common subsequences of two sequences, the following observations is useful. If ss = ss 1 ; ...; ss l is a subsequence of s = s 1 ; ...; s n with j s i = k s +i (Definition 5: k s is the index difference from which ss is a subsequence of s) and a subsequence of t = t 1 ; ...; t m with j t i = k t + i (likewise), then for any index i ∈ {1, 2, ..., l}, ss i E (s j s i t j t i ). Thus, to find maximal common subsequences between s and t, we, first, align s and t in all possible ways, and then for every alignment we compute the resulting intersection and keep only the maximal ones.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Experiments and Discussion</head><p>The experiments are carried out on an "Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz" computer with 8Gb of memory under the Ubuntu 12.04 operating system. The algorithms are not parallelized and are coded in C++.</p><p>The dataset considered here comes from a French healthcare system <ref type="bibr">[16]</ref>. Each elements of a sequence has a "complex" nature. This dataset contains 2400 patients suffering from cancer. Every patient is described as a sequence of hospitalizations without any timestamps. The hospitalization is a tuple with three fields: (i) healthcare institution (e.g. University Hospital of Paris (CHU P aris )), (ii) reason of the hospitalization (e.g. a cancer disease), and (iii) set of medical procedures that the patient underwent. An example of a medical trajectory of a patient is [CHUP aris, Cancer, {P1, P2}]; [CHNancy, Chemo, {}]; [CHNancy, Chemo, {}] . This sequence represents a patient trajectory with three hospitalizations. It expresses that the patient was first admitted to the University Hospital of Paris (CHU P aris ) for a cancer problem as the reason, and underwent procedures P 1 and P 2 . Then he had two consequent hospitalizations in Central Hospital of Nancy (CH N ancy ) in order to do chemotherapy with no additional procedures.</p><p>For this dataset the computation of the whole lattice is infeasible. However a medical expert is not interested in all possible patterns, but rather in patterns which answer his analysis question(s). First of all, the patterns of length 1 are unlikely to be of interest for him. Thus, we use the MLP projection of length 2 or 3 taking into account the small average length of the sequences in the dataset.</p><p>For the search of patterns containing only information about reasons and medical procedures, we should project every alphabet element on the element with the same reason and the same set of procedures, but substitute hospitalization institution by the most general element in the corresponding taxonomy. Moreover, we do not want to allow reason to be empty, i.e. all such elements should be projected onto ⊥ E . In this case computation takes 18 seconds producing a lattice with around 34700 concepts. One of the stable concepts has the following intent [Cancer, {App.}]; [Ch.P rep, {}]; [Chemo, {}] , specifying that a cancer was found during the appendix removal surgery, followed by a chemotherapy. This patterns highlight a discovered fact that acute appendicitis has been shown to occur antecedent to cancer within three years because of a carcinoma in colon or rectum <ref type="bibr">[17]</ref>.</p><p>To find patterns revealing dependences between hospitals and reasons all the procedures should be removed from each alphabet element and elements with most general hospital and/or with most general reason should be projected to ⊥ E . The computation of the corresponding lattice takes 10 seconds, producing around 4200 concepts. [Region Lorraine, Cancer]; [Clinic in Lorraine, Chemo] is among stable concepts which is rather interesting, because the patients detected cancer somewhere in Region A but then went to exactly the same clinic for chemotherapy. It suggests that the department can lack from clinics for chemotherapy or the quality of the clinic is high.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusion</head><p>In this paper, we present sequential pattern structures, an original specification of pattern structures able to deal with complex sequences. Projections of sequential pattern structures allow us to efficiently build concept lattices, by specifying expert demands. To be able to introduce interesting projections, their classical definition is extended. This extension allows us to introduce special projections for sequential pattern structures. The introduced projections are efficiently used for analysis of a dataset on care trajectories.</p><p>There are two main directions for future work. First, a study on properties of generalized projections within the overall framework of FCA should be carried out. Second, projections of sequential pattern structures can be deeper analyzed, for producing even more interesting and readable patterns.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Spectral Lattices of reducible matrices over completed idempotent semifields 1 Motivation</head><p>The eigenvectors and eigenspaces over certain naturally ordered semirings called dioids seem to be intimately related to multi-valued extensions of Formal Concept Analysis <ref type="bibr">[1]</ref>. For instance <ref type="bibr">[2,</ref><ref type="bibr">3]</ref> prove that formal concepts are optimal factors for decomposing a matrix with entries in complete residuated semirings. Notice the strong analogy to the SVD, with formal concepts taking the role of pairs of left and right eigenvectors. Indeed, <ref type="bibr">[4]</ref> prove that, at least on a particular kind of dioids, the idempotent semifields, formal concepts are related to the eigenvectors of the unit in the semiring. This result, however, cannot be unified with the former both for theoretical reasons, since idempotent semifields are incomplete (see below), as well as for practical reasons, since the carrier set of idempotent semifields is almost never included in [0, 1] .</p><p>A possible way forward is to develop these theories under the common framework of the L-fuzzy sets, where L is any complete lattice <ref type="bibr">[5]</ref>. Such an endeavour has already been called for <ref type="bibr">[6]</ref>, although it remains unfulfilled, hence this paper has a two-fold aim:</p><p>1. to clarify the spectral theory over completed idempotent semifields, and 2. to take steps towards a common framework for the interpretation of L-Formal Concept Analysis as a spectral construction.</p><formula xml:id="formula_352">FJVA</formula><p>First steps have been taken in this direction with the development of a spectral theory of irreducible matrices <ref type="bibr">[7]</ref> over complete idempotent semifields, whose summary we include below, but the general case, here presented, shows a more intimate relation to lattice theory.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1">Dioids and their spectral theory</head><p>A semiring is an algebra S = S, ⊕, ⊗, , e whose additive structure, S, ⊕, , is a commutative monoid and whose multiplicative structure, S\{ }, ⊗, e , is a monoid with multiplication distributing over addition from right and left and with additive neutral element absorbing for ⊗, i.e. ∀a ∈ S, ⊗ a = .</p><p>Let M n (S) be the semiring of square matrices over a semiring S with the usual operations. Given A ∈ M n (S) the right (left) eigenproblem is the task of finding the right eigenvectors v ∈ S n×1 and right eigenvalues ρ ∈ S (respectively left eigenvectors u ∈ S 1×n and left eigenvalues λ ∈ S) satisfying:</p><formula xml:id="formula_353">u ⊗ A = λ ⊗ u A ⊗ v = v ⊗ ρ<label>(1)</label></formula><p>The left and right eigenspaces and spectra are the sets of these solutions:</p><formula xml:id="formula_354">Λ(A) = {λ ∈ S | U λ (A) = { n }} P(A) = {ρ ∈ S | V ρ (A) = { n }} U λ (A) = {u ∈ S 1×n | u ⊗ A = λ ⊗ u} V ρ (A) = {v ∈ S n×1 | A ⊗ v = v ⊗ ρ} U(A) = λ∈Λ(A) U λ (A) V(A) = ρ∈P(A) V ρ (A)<label>(2)</label></formula><p>Since Λ(A) = P(A t ) and U λ (A) = V λ (A t ) , from now on we will omit references to left eigenvalues, eigenvectors and spectra, unless we want to emphasize differences.</p><p>With so little structure it might seem hard to solve (1), but a very generic solution based in the concept of transitive closure A + and transitive-reflexive closure A * of a matrix is given by the following theorem: Theorem 1 (Gondran and Minoux, [8, Theorem 1]). Let A ∈ S n×n . If A * exists, the following two conditions are equivalent:</p><formula xml:id="formula_355">1. A + .i ⊗ µ = A * .i ⊗ µ for some i ∈ {1 . . . n}, and µ ∈ S. 2. A + .i ⊗ µ (and A * .i ⊗ µ) is an eigenvector of A for e , A + .i ⊗ µ ∈ V e (A)</formula><p>. In <ref type="bibr">[7]</ref> this result was made more specific in two directions: on the one hand, by focusing on particular types of completed idempotent semirings-semirings with a natural order where infinite additions of elements exist so transitive closures are guaranteed to exist and sets of generators can be found for the eigenspacesand, on the other hand, by considering more easily visualizable subsemimodules than the whole eigenspace-a better choice for exploratory data analysis.</p><p>Specifically, every commutative semiring accepts a canonical preorder, a ≤ b if and only if there exists c ∈ D with a ⊕ c = b . A dioid is a semiring D where this relation is actually an order. Dioids are zerosumfree and entire, that is they have no non-null additive or multiplicative factors of zero. Commutative complete dioids are already complete residuated lattices. Similarly, semimodules over complete commutative dioids are also complete lattices.</p><p>An idempotent semiring is a dioid whose addition is idempotent, and a selective semiring one where the arguments attaining the value of the additive operation can be identified. </p><formula xml:id="formula_356">R max,+ = R ∪ { −∞ }, max, +, −∞, 0</formula><p>Of the semirings above, only the boolean lattice and the fuzzy semirings are complete dioids, since the rest lack the top element as an adequate inverse for the bottom in the order.</p><p>The second important feature of spectra over complete dioids, as proven in <ref type="bibr">[7]</ref>, is that the set of eigenvalues on complete dioids is extended with respect to the incomplete case, and it makes sense to distinguish those which are associated to finite eigenvectors, the proper eigenvalues P p (A), and those associated with non-finite eigenvectors, the improper eigenvalues P(A)\P p (A).</p><p>Moreover, as said above, the eigenspaces of matrices over complete dioids have the structure of a complete lattice. But since these lattices may be continuous and difficult to represent we introduce the more easily-represented eigenlattices L ρ (A) and L λ (A), complete finite sublattices of the eigenspaces to be used as scaffolding in visual representations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.2">Completed idempotent semifields and their spectral theory</head><p>A semiring is a semifield if there exists a multiplicative inverse for every element a ∈ S, notated as a −1 , and radicable if the equation a b = c can be solved for a. As exemplified above, idempotent semifields are incomplete in their natural order. Luckily, there are procedures for completing such structures <ref type="bibr">[9]</ref> and we will not differentiate between complete or completed structures, Example 2. The maxplus R max,+ and minplus R min,+ semifields can be completed as,</p><formula xml:id="formula_357">1. the completed Minplus semifield, R min,+ = R ∪ {−∞, ∞}, min, +, −•, ∞, 0 . 2. the completed Maxplus semifield, R max,+ = R∪{−∞, ∞}, max, + , −•, −∞, 0 ,</formula><p>In this notation we have ∀c, −∞ + c = −∞ and ∞ + c = ∞, which solves several issues in dealing with the separately completed dioids. These two completions are inverses R min,+ = R −1 max,+ , hence order-dual lattices. Indeed they are better jointly called the max-min-plus semiring R min, + max,+ .</p><p>In fact, idempotent semifields K = K, ⊕ , ⊕, ⊗ , ⊗, • −1 , ⊥, e, , appear as enriched structures, the advantage of working with them being that meets can be expressed by means of joins and inversion as a ∧ b = (a −1 ⊕ b −1 ) −1 . On a practical note, residuation in complete commutative idempotent semifields can be expressed in terms of inverses, and this extends to eigenspaces.</p><p>Given A ∈ M n (S), the network (weighted digraph) induced by</p><formula xml:id="formula_358">A, N A = (V A , E A , w A ), consists of a set of vertices V A = n, a set of arcs , E A = {(i, j) | A ij = S }</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>, and a weight w</head><formula xml:id="formula_359">A : V A × V A → S, (i, j) → w A (i, j) = a ij .</formula><p>This allows us to apply intuitively all notions from networks to matrices and vice versa, like the underlying graph G A = (V A , E A ), the set of paths Π + A (i, j) between nodes i and j or the set of cycles C + A . Matrix A is irreducible if every node of V A is connected to every other node in V A though a path, otherwise it is reducible.</p><p>We will use the spectra of irreducible matrices as a basic block for that of reducible matrices: if</p><formula xml:id="formula_360">C + A is the set of cycles of A then µ ⊕ (A) = ⊕{µ ⊕ (c) | c ∈ C + A } is their aggregate cycle mean. For finite µ ⊕ (A), let Ã+ = (A ⊗ µ ⊕ (A) −1 )</formula><p>+ be the normalized transitive closure of A, and define the set of (right) fundamental eigenvectors of irreducible A for ρ as FEV ρ</p><formula xml:id="formula_361">(A) = { Ã+ •i | Ã+ ii = e} , with left fundamental eigenvectors FEV ρ (A t ) = FEV ρ (A) t . Then,<label>Theorem 2 ((Right</label></formula><p>) spectral theory for irreducible matrices, <ref type="bibr">[7]</ref>). Let A ∈ M n (K) be an irreducible matrix over a complete commutative selective radicable semifield. Then:</p><formula xml:id="formula_362">1. Λ(A) = K\{⊥} = P(A) . 2. Λ p (A) = {µ ⊕ (A)} = P p (A) . 3. If ρ ∈ P(A)\P p (A), then V ρ (A) = {⊥ n , n } = L ρ (A) . 4. If ρ = µ ⊕ (A) &lt; , then V ρ (A) = FEV ρ (A) K ⊃ L ρ (A) = FEV ρ (A) 3 .</formula><p>In this paper we try and find analogue results to Theorem 2 for the reducible case. First, we completely describe the spectra with Theorem 3 in Section 3.1. Then, we provide in Section 3.2 a bottom-up construction of the eigenspaces of certain reducible matrices from that of their irreducible blocks, using from Section 2.2 a recursive scheme to render matrices over idempotent semifields into specialised Upper Frobenius Normal Forms (UFNF). Finally, we discuss our findings in Section 4 and relate them to previous approaches.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Some partial orders and lattices</head><p>In this paper we assume familiarity with basic order notions as described in <ref type="bibr">[1,</ref><ref type="bibr">10]</ref>. We only introduce notation when departing from there.</p><p>Recall that every set V with |V | = n elements and a total order ≤ ⊆ V × V is isomorphic to a lattice called the chain of n elements, V, ≤ ∼ = n . When the relation is the empty order relation ∅ ∈ V × V , it is called an anti-chain of n elements, V, ∅ ∼ = n . Lattice 1 ∼ = 1 is the vacuously-ordered singleton. Lattice 2 is the boolean lattice isomorphic to chain 2. Lattice 3 is a lattice lying at the heart of completed semifields, the 3-bounded lattice-ordered group ⊥ &lt; e &lt; , isomorphic to chain 3.</p><p>If set of order ideals of a poset P is O(P ), then Proposition 1 ( [10, Chap. 1]). Let P, ≤ be a finite poset. Then O(P ), ⊆ is a lattice obtained by the embedding ϕ :</p><formula xml:id="formula_363">P → O(P ), ϕ(x) =↓ x , with ∀A 1 , A 2 ∈ O(P ), A 1 ∨ A 2 = A 1 ∪ A 2 and A 1 ∧ A 2 = A 1 ∩ A 2 .</formula><p>Note that x ≤ y in P if and only if ↓ x ⊆↓ y in O(P ). Furthermore, O(P ) can be obtained systematically from the ordered set in a number of cases:</p><p>Proposition 2 ( [10, Chap. 1]). Let P, ≤ be a finite poset. Then 1.</p><formula xml:id="formula_364">O(P ⊕ 1) ∼ = O(P ) ⊕ 1 and O(1 ⊕ P ) ∼ = 1 ⊕ O(P ) . 2. O(P 1 P 2 ) ∼ = O(P 1 ) × O(P 2 ) . 3. O(P d ) ∼ = F(P ) ∼ = O(P ) d . 4. O(n) ∼ = n ⊕ 1 ∼ = 1 ⊕ n . 5. O(n) ∼ = 2 n .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">An inductive structure for reducible matrices</head><p>Recall that a digraph (or directed graph), is a pair G = (V, E) with V a set of vertices and E ⊆ V × V a set of arcs (directed edges), ordered pairs of vertices, such that for every i, j ∈ V there is at most one arc (i, j) ∈ E . If (i, j) ∈ E then we say that "i is a predecessor of j" or "j is a successor of i", and E ∈ M n (B) is the associated relation of G. If there is a walk from a vertex i to a vertex j in G we say that "i has access to j" or j is reachable from i, i j . Hence, reachability is the transitive closure of the associated relation, = E + <ref type="bibr">[11]</ref>. However, vertices j ∈ V with no incoming or outgoing arcs cannot be part of any cycle, hence j j for such nodes, so it is not reflexive, in general. ( ∩I V ) is the reflexive restriction of , that is, the biggest reflexive relation included in it.</p><p>If there is a walk from a vertex i to vertex j in G or viceversa we say that i and j are connected, i j ∨ j i. Connectivity is the symmetric closure of the reachability relation: its transitive, reflexive restriction is an equivalence relation on V G whose classes are called the (dis)connected components of G . Note that each of the (outwards) disconnected components is actually (inwards) connected. Let K ≥ 1 be the number of disconnected components of G. Then V and E are partitioned into the subsets of vertices {V k } K k=1 and arcs</p><formula xml:id="formula_365">{E k } K k=1 of each disconnected component k V k = V , V k ∩ V l = ∅, k = l, k E k = E, E k ∩ E l = ∅, k = l and we may write G = K k=1 G k is a disjoint union of graphs. G is called connected itself if K = 1 .</formula><p>On the other hand, since reachability is transitive by construction, its symmetric, reflexive restriction i j ⇔ i j ∧ j i is a refinement of connectivity called strong connectivity. Its equivalence classes are the strongly connected components of G . For each disconnected component G k , let R k be the number of its strongly connected components. If R k = 1 then the k-th component is strongly connected, otherwise just connected and composed of a number of strongly connected components itself. G is strongly connected</p><formula xml:id="formula_366">itself if K = R = 1 .</formula><p>Given a digraph G = (V, E), the reduced or condensation digraph, G = (V , E) is induced by the set V = V / of strongly connected components, and C, C ∈ V , (C, C ) ∈ E iff there exists one arc (i, j) ∈ E for some i ∈ C, j ∈ C and we say that component C has access to C , and write C C . It is well known that G = (V , E) is a partially ordered set called a directed acyclic graph (dag).</p><p>Given a matrix A ∈ M n (S), its condensation digraph is the partial order of strong connectivity classes G A = (V A , E A ), as in Figure <ref type="figure" target="#fig_123">2b</ref> in Example 4, of its associated digraph G A = (V A , E A ) . This can be proven by means of an Upper Frobenius Normal Form (UFNF) <ref type="bibr">[12]</ref>, a structure for matrices that we intend to specialise and use as a scheme for structural induction over reducible matrices.</p><p>In the following, for a set of indices V x ⊆ n we write P (V x ) for a permutation of it, and E xy is an empty matrix of conformal dimension most of the times represented on matrix patterns as elliptical dots.</p><p>Lemma 1 (Recursive Upper Frobenius Normal Form, UFNF). Let A ∈ M n (S) be a matrix over a semiring and G A its condensation digraph. Then, 1. (UFNF 3 ) If A has zero lines it can be transformed by a simultaneous row and column permutation of V A into the following form:</p><formula xml:id="formula_367">P t 3 ⊗ A ⊗ P 3 =     E ιι • • • • E αα A αβ A αω • • A ββ A βω • • • E ωω    <label>(3)</label></formula><p>where: either A αβ or A αω or both are non-zero, and either A αω or A βω or both are non-zero. Furthermore, P 3 is obtained concatenating permutations for the indices of simultaneously zero columns and rows V ι , the indices of zero columns but non-zero rows V α , the indices of zero rows but non-zero columns V ω and the rest V β as P 3 = P (V ι )P (V α )P (V β )P (V ω ) . 2. (UFNF 2 ) If A has no zero lines it can be transformed by a simultaneous row and column permutation P 2 = P (A 1 ) . . . P (A k ) into block diagonal UFNF</p><formula xml:id="formula_368">P t 2 ⊗ A ⊗ P 2 =      A 1 • . . . • • A 2 . . . • . . . . . . . . . . . . • • . . . A K     <label>(4)</label></formula><p>where {A k } K k=1 , K ≥ 1 are the matrices of connected components of G A .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">(UFNF 1 ) If</head><p>A is reducible with no zero lines and a single connected component it can be simultaneously row-and column-permuted by P 1 to</p><formula xml:id="formula_369">P t 1 ⊗ A ⊗ P 1 =      A 11 A 12 • • • A 1R • A 22 • • • A 2R . . . . . . . . . . . . • • • • • A RR     <label>(5)</label></formula><p>where A rr are the matrices associated to each of its R strongly connected components (sorted in a topological ordering), and P 1 = P (A 11 ) . . . P (A RR ) .</p><p>The particular choice of UFNF is clarified by the following Lemma, since the condensation digraph will prove important later on: Lemma 2 (Scheme for structural induction over reducible matrices). Let A ∈ M n (S) be a matrix over an entire zerosumfree semiring and G A its condensation digraph. Then:</p><formula xml:id="formula_370">1. If A is irreducible then G A ∼ = 1 . 2. If A is in UFNF 2 then G A = G A k . 3. If A is in UFNF 3 then G A = G A ββ . 4. G A t = (G A ) d .</formula><p>Note that for A in UFNF 1 , G A may be any connected ordered set.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Results</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Generic results for reducible matrices</head><p>The following lemma clarifies the order relation between eigenvectors in ordered semimodules, Lemma 3. Let X be a naturally-ordered semimodule. 1. Vectors with incomparable supports are incomparable. 2. If X is further complete, vectors with incomparable saturated supports are incomparable.</p><p>Proof. Let v and w be two vectors in X . Comparability of supports lies in the ⊆ relation: if supp(v) supp(w) then supp(v) ⊆ supp(w) and supp(w) ⊆ supp(v) . Therefore from supp(v) ∩ supp(w)</p><formula xml:id="formula_371">C = ∅ we have v(supp(v) ∩ supp(w) C ) = ⊥ and w(supp(v) ∩ supp(w) C ) = ⊥ , hence v ≤ w . Similarly, from supp(w) ∩ supp(v) C = ∅ we have w ≤ v , therefore v w .</formula><p>Claim 2 is likewise argued on the support taking the role of n, and the saturated support taking the role of the original support.</p><p>Let A ∈ M n (S) be a matrix and G A be its condensation digraph. Consider a class C r ∈ V A and call</p><formula xml:id="formula_372">V u = ( C ∈↓Cr C )\C r , V d = ( C ∈↑Cr C )\C r and V p = V A \(V u ∪ C r ∪ V d )</formula><p>the sets of upstream, downstream and parallel vertices for C r , respectively. Using permutation P r = P (V u )P (C r )P (V p )P (V d ) we may suppose a blocked form of A(C r ) like the one in Fig. <ref type="figure" target="#fig_0">1</ref> without loss of generality. Notice that any of V u , V d or V p may be empty. However, if V u (resp. V d ) is not of null dimension, then A ur (resp. A rd ) cannot be empty. Proposition 3. Let A ∈ M n (K) be a matrix over a complete commutative selective radicable semifield with C + A = ∅. Then a scalar ρ &gt; ⊥ is a proper eigenvalue of A if and only if there is at least one class in its condensation</p><formula xml:id="formula_373">digraph C r ∈ G A such that ρ = µ ⊕ (A rr ) . A(Cr) =     Auu Aur Aup A ud • Arr • A rd • • App A pd • • • A dd     (a) Blocked form of A(CR) Vu Vr Vp V d Aur Aup A ud A rd A pd (b) Digraph of A(CR)</formula><p>Fig. <ref type="figure" target="#fig_0">1</ref>: Matrix A focused on C r , A(C r ) = P r t ⊗ A ⊗ P r and associated digraph. The loops at each node, consisting of (possibly empty) A uu , A rr , A pp , A dd are not shown.</p><p>Proof. The proof, for instance, in <ref type="bibr">[8]</ref> extends even to ρ = ,.</p><p>The proper spectrum is clarified by: Lemma 4. Let A ∈ M n (S) be a reducible matrix over a complete radicable selective semifield. Then, there are no other finite eigenvectors in V ρ (A) contributed by Ãρ than those selected by the critical circuits in</p><formula xml:id="formula_374">C r ∈ V A such that µ ⊕ (A rr ) = ρ , FEV f (A) = ∪ Cr∈V A {( Ãρ ) + •i | i ∈ V c r , µ ⊕ (A rr ) = ρ} .</formula><p>Proof. If ρ = µ ⊕ (A rr ), from Proposition 3 we see that the finite eigenvectors mentioned really belong in V ρ (A). If ρ &gt; µ ⊕ (A rr ) then ( Ãρ rr )</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>+</head><p>ii &lt; e = ( Ãρ rr ) * ii hence the columns selected by C r do not generate eigenvectors. If ρ &lt; µ ⊕ (A rr ) then ( Ãρ rr )</p><p>+ ij = and whether those classes with cycle mean ρ are upstream or downstream of C r the only value that is propagated is , hence the eigenvectors are all saturated.</p><p>Theorem 3 (Spectra of generic matrices). Let A ∈ M n (D) be a reducible matrix over an entire zerosumfree semiring. Then,</p><formula xml:id="formula_375">1. If C + A = ∅ then P(A) = P p (A) = { } . 2. If C + A = ∅ and further D is a complete selective radicable semifield, (a) If zc(A) = ∅ then P(A) = K and P p (A) = {⊥}∪{µ ⊕ (A rr ) | C r ∈ V A } . (b) If zc(A) = ∅ then P(A) = K\{⊥} and P p (A) = {µ ⊕ (A rr ) | C r ∈ V A } . Proof. First, call zc(A) the set of empty columns of A. If G A has no cycles C + A = ∅, claim 1 follows from a result in [7] . But if C + A = ∅ then by Proposition 3, P p (A) ⊇ {µ ⊕ (A rr ) | C r ∈ V A }</formula><p>and no other non-null proper eigenvalues may exist by Lemma 4. ⊥ is only proper when zc(A) = ∅ hence claims 2a and 2b follow.</p><p>Translating to UFNF terms: Corollary 1. Let A ∈ M n (K) be a matrix over a complete selective radicable semifield with C + A = ∅. Then P(A) = K\{⊥} and</p><formula xml:id="formula_376">P p (A) = {µ ⊕ (A rr ) | C r ∈ V A }, unless A is in UFNF 3 and zc(A) = ∅ whence ⊥ ∈ P p (A) ⊆ P(A) too.</formula><p>Proof. If A is irreducible or in UFNF 1 or UFNF 2 it has no empty columns or rows. This can only happen in UFNF 3 in which case the result follows from Theorem 3.</p><p>Since this solves entirely the description of the spectrum, only the description of the eigenspaces is left pending.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Eigenspaces of matrices in UFNF 1</head><p>In this section we offer an instance of how the UFNF can be used to obtain, inductively, the spectrum of reducible matrices.</p><p>If for every parallel condensation class C p ⊆ V A in A(C r ) illustrated in C r of Fig. <ref type="figure" target="#fig_0">1</ref> A up = E up or A pd = E pd or both, then A is in UFNF 1 with a single connected block. In this case, we can relate the order of the eigenvectors to the condensation digraph: define the support of a class supp(C) as the support of any of the non-null eigenvectors it induces in A. Lemma 5. Let A ∈ M n (S) be a matrix in UFNF 1 over a complete zerosumfree semiring. Then, for any class</p><formula xml:id="formula_377">C r ∈ V A , supp(C r ) = {C lr | C lr ∈ ↓ C r } .</formula><p>Proof. Since A rr is irreducible, if ρ = µ ⊕ (A rr ) then for any v r ∈ V ρ (A rr ) we have that supp(v r ) = V r , hence V r ⊆ supp(C r ) . Also, since S is complete and zerosumfree ( Ãρ ) + rr exists and is full <ref type="bibr">[7]</ref>. Since ( Ãρ )</p><formula xml:id="formula_378">+ uu</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ãρ</head><p>ur must have a full column for any C lr ∈↓ C r meaning precisely that C r is downstream from C lr , the product ( Ãρ )</p><formula xml:id="formula_379">+ uu Ãρ ur<label>( Ãρ )</label></formula><p>+ rr for the nodes in C lr is non-null and V lr ⊆ supp(C r ) .</p><p>Lemma 5 establishes a bijection between the supports of condensation classes and downsets in G A which is actually an isomorphism of orders, Proposition 4. Let A ∈ M n (K) be a matrix over a commutative complete selective radicable semifield admitting an UFNF 1 . Then</p><formula xml:id="formula_380">1. Each class C r ∈ V A generates a distinct saturated eigenvector, v r . 2. {v r | C r ∈ V A } ∼ = G A . Proof. Let v ∈ V ρ (A) where ρ = µ ⊕ (A rr ) then by Lemma 5 supp(v) =↓ C r , hence v r = v ∈ V ρ (A)</formula><p>is the unique saturated eigenvector, since sat-supp ( v) = supp( v) = supp(C), and the bijection follows. By Lemma 3, claim 2 the order relation between classes is maintained between eigenvectors, whence the order isomorphism in claim 2.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>We call FEV</head><formula xml:id="formula_381">1, (A) = {v r | C r ∈ V A } the set of of saturated fundamental eigenvectors of A. Notice that V A t = V A but E A t = E d A , so FEV 1, (A t ) ∼ = G d A .</formula><p>For every finite ρ ∈ P p (A) we define the critical nodes</p><formula xml:id="formula_382">V c ρ = {i ∈ n | ( Ãρ ) + ii = e} and FEV 1,f ρ (A) = {( Ãρ ) + •i | i ∈ V c ρ } the (maybe partially) finite fundamental eigenvectors of ρ. Next, let δ −1 ρ (ρ ) = e if ρ = ρ and δ −1 ρ (ρ ) = otherwise. for ρ ∈ P(A) the set of (right) fundamental eigenvectors of A in UFNF 1 for ρ as FEV 1 ρ (A) = ∪ ρ ∈P(A) {δ −1 ρ (ρ ) ⊗ FEV 1,f ρ (A)} .<label>(6)</label></formula><p>This definition absorbs two cases, actually, Lemma 6. Let A ∈ M n (K) be a matrix over a commutative complete selective radicable semifield admitting an UFNF 1 . Then, 1. for</p><formula xml:id="formula_383">ρ ∈ P(A)\P p (A) , FEV 1 ρ (A) = FEV 1, (A) . 2. for ρ ∈ P p (A), ρ = , FEV 1 ρ (A) = FEV 1,f ρ (A)∪FEV 1, (A) \( ⊗ FEV 1,f ρ (A)) . 3. for ρ ∈ P(A), ρ = , FEV 1, (A) = ⊗ FEV 1 ρ (A).</formula><p>Proof. If ρ ∈ P(A)\P p (A), then for all ρ ∈ K, δ −1 ρ (ρ ) = . By Proposition 4 claim 1 follows as we range ρ ∈ P p (A) . Similarly, when ρ ∈ P p (A), those classes whose ρ = ρ supply a single saturated eigenvector. However, if ρ = ρ, then δ −1 ρ (ρ ) = e obtains the (partially) finite fundamental eigenvectors FEV 1,f ρ (A), the saturated eigenvectors of which cannot be considered fundamental, since they can be obtained from FEV 1,f ρ (A) linearly, and will not appear in FEV 1 ρ (A). Claim 3 is a corollary of the other two. Call V (A) = FEV 1, (A) K the saturated eigenspace of A , then Corollary 2. Let A ∈ M n (K) be a matrix over a commutative complete selective radicable semifield admitting an UFNF 1 . Then, 1. For ρ ∈ P(A), V (A) ⊆ V ρ (A) . 2. For ρ ∈ P(A)\P p (A), furthermore,V (A) = V ρ (A) .</p><p>Proof. Since we have FEV 1, (A) ⊆ V ρ (A), then V (A) ⊆ V ρ (A) . For ρ ∈ P(A)\P p (A), FEV 1 ρ (A) = FEV 1, (A) by Lemma 6, so claim 2 follows.</p><p>Hence, V (A) provides a common "scaffolding" for every eigenspace, while the peculiarities for proper eigenvalues are due to the finite eigenvectors. Also, since V (A) is a complete lattice, FEV 1, (A) ⊆ V (A) is actually a lattice embedding, Proposition 5. Let A ∈ M n (K) be a matrix over a commutative complete selective radicable semifield admitting an UFNF 1 . Then 1. For ρ ∈ P(A)\P p (A),</p><formula xml:id="formula_384">U (A) = FEV 1, (A t ) t 2. for all ρ ∈ P p (A), ρ &lt; U λ (A) = FEV 1 λ (A t ) t K V ρ (A) = FEV 1 ρ (A) K . Proof. If v r ∈ FEV 1, (A) then λv r = λ( v r ) = v r , whence V (A) = FEV 1, (A) 3 .</formula><p>In fact, the generation process may proceed on only a subsemiring of K which need not even be complete. For instance, we may use any of the isomorphic copies of 2 embedded in K, for instance {⊥, k} ∼ = 2, with k = ⊥ . Since the number of saturated eigenvectors is finite, being identical to the number of condensation classes, we only have to worry about binary joins and</p><formula xml:id="formula_385">meets. Recall that v r ∨v k = v r ⊕ v k and v r ∧v k = v r ⊕ v k = (v r ) −1 ⊕ (v k ) −1 −1 . Then supp(v r ⊕ v k ) = supp(v r ) ∪ supp(v k ) and also supp(v r ⊕ v k ) = supp c v r ∪ supp c v k c = supp(v r ) ∩ supp(v k ) for C r , C k ∈ V A and Proposition 1 gives the result. For ρ ∈ P p (A), FEV 1 ρ (A) ⊆ V ρ (A) implies that FEV 1 ρ (A) K ⊆ V ρ (A)</formula><p>, and Corollary 4 ensures that no finite vectors are missing. And dually for left eigenspaces. This actually proves that FEV 1 ρ (A) is join-dense in V ρ (A). As already mentioned, V ρ (A) is a hard-to-visualize semimodule. An eigenspace schematics is a modified order diagram where the saturated eigenspace is represented in full but the rays generated by finite eigenvalues {κ ⊗ ( Ãρ )</p><formula xml:id="formula_386">+ •i | i ∈ V c</formula><p>r , ρ = µ ⊕ (A rr )} are drawn with discontinuous lines, as in the examples below.</p><p>We are now introducing another representation inspired by <ref type="bibr">(7)</ref>: we define the (left) right eigenlattices of A for (λ ∈ Λ(A)) ρ ∈ P(A) as</p><formula xml:id="formula_387">L λ (A) = FEV 1 ρ (A t ) t 3 L ρ (A) = FEV 1 ρ (A) 3 .</formula><p>Example 3 (Spectral lattices of irreducible matrices). Since irreducible matrices are in UFNF 1 with a single class, FEV 0 µ⊕(A) (A) = FEV 1 µ⊕(A) (A). For ρ ∈ P(A)\P p (A) we have FEV 0, (A) = { n }, whence G A ∼ = 1 and V (A) = {⊥ n , n } ∼ = 2. For ρ ∈ P p (A), ρ &lt; , as proven in <ref type="bibr">[7]</ref>, V ρ (A) is finitely generable from FEV 0 ρ (A), but the form of the eigenspace and eigenlattice for Λ p (A) = {µ ⊕ (A)} = P p (A) depends on the critical cycles and the eigenvectors they induce.</p><p>Example 4. Consider the matrix A ∈ M n (R max,+ ) from [13, p. 25.7, example 2] in UFNF 1 depicted in Fig. <ref type="figure" target="#fig_1">2</ref>.(a). The condensed graph G A in Fig. <ref type="figure" target="#fig_1">2</ref>  Note that node 4 does not generate an eigenvector in either spectrum, since it does not belong to a critical cycle. Therefore Λ p (A 3 ) = P p (A 3 ) = {2, 1, 0, −3} each left eigenspace is the span of the set of eigenvectors chosen from distinct critical cycles for each class of </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>.(b) has for vertex set</head><formula xml:id="formula_388">V A = {C 1 = {1}, C 2 = {2, 3, 4}, C 3 = {5, 6, 7}, C 4 = {8}} , so consider the strongly connected components G A kk = (C k , E ∩ C k × C k ), 1 ≤ k ≤ 4. Their maximal cycle means are µ k = µ ⊕ (A kk ) : µ 1 = 0, µ 2 = 2, µ 3 = 1 and µ 4 = −3 , respectively, corresponding to critical circuits: C c (G A11 ) = {1 } , C c (G A22 ) = {2 → 3 → 2} , C c (G A33 ) = {5 , 6 → 7 → 6} , C c (G A44 ) = {8 } . A3 =             0 • 0 • 7 • • • • • 3 0 • • • • • 1 • • • • • • • 2 • • • • • 10 • • • • 1 0 • • • • • • • • 0 • • • • • −1 2 • 23 • • • • • • • −3             (a) A reducible matrix in UFNF1</formula><formula xml:id="formula_389">          0 • 0 1 −2 • • • 6 • −1 0 −3 • • • 5 • • • • 0 −1 −2 20 • • • • −3 0 −1 21 • • • • −2 1 0 22 • • • • • • • 0           (c) Left fundamental eigenvectors 1 2 3 5 6 7 8             0 −3 −2 6 5 4 • 0 1 • • • • −1 0 • • • • 0 1 • • • • • • 0 −1 −2 • • • −3 0 −1 • • • −2 1 0 • • • • • • 0            <label>(</label></formula><formula xml:id="formula_390">A: U µ1 (A) = ( Ã3 µ1 ) + 1• , U µ2 (A) = ( Ã3 µ2 ) + 2• , U µ3 (A) = ( Ã3 µ3 ) + {5,</formula><formula xml:id="formula_391">V µ1 (A) = ( Ã3 µ1 ) + •1 , V µ2 (A) = ( Ã3 µ2 ) + •2 , V µ3 (A) = ( Ã3 µ3 ) + •{5,6}</formula><p>, and V µ4 (A) = ( Ã3 µ4 ) + •8 -as described by the column vectors of Fig. <ref type="figure" target="#fig_1">2</ref></p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>.(d).</head><p>The saturated eigenspace is easily represented by means of an order diagram-Hasse diagram-as that of Fig. <ref type="figure" target="#fig_1">2</ref>.(e). Note how it is embedded in that of any proper eigenvalue like ρ = 2 in Fig. <ref type="figure" target="#fig_1">2</ref>.(f). Since the representation of continuous eigenspaces is problematic, we draw schematics of them, as in Fig. <ref type="figure" target="#fig_1">2</ref>.(f). Fig. <ref type="figure" target="#fig_1">2</ref>.(g) shows a schematic view of the union of the eigenspaces for proper eigenvalues</p><formula xml:id="formula_392">V(A 3 ) = ∪ ρ∈P p (A) V ρ (A 3 ) .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Discussion</head><p>In this paper, we have discussed the spectrum of reducible matrices with entries in completed idempotent semifields. To the extent of our knowledge, this was pioneered in <ref type="bibr">[14]</ref> and both <ref type="bibr">[7]</ref> and this paper can be understood as systematic explorations to try and understand what was stated in there. For this purpose, the consideration of particular UFNF forms for the matrices has been crucial: while the description in <ref type="bibr">[14]</ref> is combinatorial ours is constructive.</p><p>The usual notion of spectrum as the set of eigenvectors with more than one (null) eigenvector appears in this context as too weak: when a matrix has at least one cycle then all the values in the semifield (except the bottom ⊥) belong to the spectrum. If the matrix has at least one empty column (resp. empty row) and a cycle then all of the semifield is the spectrum. Rather than redefine the notion of spectrum we have decided to introduce the proper spectrum as the set of eigenvalues with at least one vector with finite support.</p><p>Regarding the eigenspaces, we found not only that they are complete continuous lattices for proper eigenvalues, but also that they are finite (complete) lattices for improper eigenvalues. Looking for a device to represent the information within each proper eigenspace we focus on the fundamental eigenvectors of an irreducible matrix for each eigenvalue: those with unit values in certain of their coordinates. The span of those eigenvectors by the action of the 3-bounded lattice-ordered group generates the finite eigenlattices. Interestingly, since improper eigenvectors only have non-finite coordinates, their span by the 3-blog is exactly the same finite lattice as their span by the whole semifield itself.</p><p>With these building blocks it is easy to build finite lattices for reducible matrices of any UFNF description, as exemplified above. We believe this will be a useful technique to understand and visualize the concept lattices of formal contexts with entries in an idempotent semifield and other dioids.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The fundamentals of mathematical morphology (initiated by G. Matheron <ref type="bibr">[18]</ref> and J. Serra <ref type="bibr">[22]</ref>), are in the set theory, the integral geometry and the lattice algebra. This methodology is used in the recent years in general contexts related to activities as the information extraction in digital images, the noise elimination or the pattern recognition.</p><p>The generalization of this theory, in order to consider fuzzy subsets as objects, was given in <ref type="bibr">[5-9, 16, 17]</ref> using L-fuzzy sets as images and structuring elements, which was called fuzzy morphological image processing.</p><p>On the other hand, the fuzzy property-oriented concept lattice framework <ref type="bibr">[15]</ref> arises as a fuzzy generalization of Rough Set Theory and in which a set of objects and a set of attributes are assumed, following the view point of Formal Concept Analysis. This theory has been considered to solve fuzzy relation equations <ref type="bibr">[12]</ref> and important results, in order to obtain the whole set of solutions, are given.</p><p>Recently, both theories, fuzzy mathematical morphology and fuzzy propertyoriented concept lattice, have been related <ref type="bibr">[1]</ref>, extending the initial relation given in <ref type="bibr">[2]</ref>.</p><p>In mathematical morphology, the usual procedure is, given a structuring image, to obtain the dilation and the erosion from an initial image. But what happen if we lose the original image or, simply, we have not got it because we only know its corresponding dilation or erosion, how can the original image be obtained? This paper studies the problem of objects retrieval in the framework of mathematical morphology. It is usual that there is noise in the transmission of information or, in several cases, it is easier to send a kind of image than another one. Hence, the received object is not equal to the original one. Note that this problem is also related to other settings, such as object recognition.</p><p>Specifically, we focus on solving the problem of obtaining the original object A from another one received B, assuming a structuring image and that B is the dilation or the erosion of the original image A. For that, this problem will be written as a fuzzy relation equation and the relationship introduced in <ref type="bibr">[1]</ref> and the results given in <ref type="bibr">[12]</ref> will be used to solve it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head><p>This section recalls the fuzzy property-oriented concept lattice framework <ref type="bibr">[15]</ref>, fuzzy mathematical morphology <ref type="bibr">[5-9, 16, 17]</ref>, the relationship beetween them, introduced in <ref type="bibr">[1]</ref>, and fuzzy relation equations <ref type="bibr">[21]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">L-fuzzy property-oriented concept lattice</head><p>In this framework a complete residuated lattice (L, ∨, ∧, * , I, 0, 1, ≤ ? ) is considered as algebraic structure. Moreover, a fuzzy (formal) context is assumed, (X, Y, R), where R : X × Y → L is a fuzzy relation between the sets X and Y , where X can be interpreted as a set of objects and Y as a set of properties (attributes).</p><p>Given a fuzzy context (X, Y, R), two mappings R ∃ : L X → L Y and R ∀ : L Y → L X can be defined as:</p><formula xml:id="formula_393">R ∃ (A)(y) = sup{A(x) * R(x, y) | x ∈ X} (1) R ∀ (B)(x) = inf{I(R(x, y), B(y)) | y ∈ Y }<label>(2)</label></formula><p>for all A : X → L, B : Y → L, x ∈ X and y ∈ Y , where I is the residuated implication associated with the conjunctor * . Examples of these operators are given in <ref type="bibr">[3,</ref><ref type="bibr">19]</ref>. As a first result, the pair (R ∃ , R ∀ ) forms an isotone Galois connection <ref type="bibr">[13]</ref>. Therefore, a property-oriented concept (or, a concept based on rough set theory)</p><formula xml:id="formula_394">of (X, Y, R) is a pair (A, B) ∈ L X × L Y such that B = R ∃ (A) and A = R ∀ (B).</formula><p>The set of all property-oriented concepts of (X, Y, R) is denoted by P(X, Y, R) and it is a complete lattice <ref type="bibr">[15]</ref>, which is called the property-oriented concept lattice of (X, Y, R) (or, the concept lattice of (X, Y, R) based on rough set theory) <ref type="bibr">[15]</ref>. For that isotone Galois connection (R ∃ , R ∀ ) and lattice P(X, Y, R) interesting properties have been proven, e.g., in <ref type="bibr">[3,</ref><ref type="bibr">4,</ref><ref type="bibr">13,</ref><ref type="bibr">15]</ref>. This relation provides that the dilation and erosion have the properties of the isotone Galois connection (R ∃ , R ∀ ). The following result shows the connection between the outstanding morphological elements and the L-fuzzy propertyoriented concepts.</p><p>Theorem 1. Let S ∈ L X and its associated relation R S ∈ L X×X , the following statements are equivalent:</p><p>1. The pair (A, B) ∈ L X × L X is an L-fuzzy property-oriented concept of the context (L, X, X, R S ).</p><formula xml:id="formula_395">2. A is S-closed (i.e. ε S • δ S (A) = A) and B is the S-dilation of A. 3. B is S-open (i.e. δ S • ε S (B) = B) and A is the S-erosion of B.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4">Systems of fuzzy relation equations</head><p>Systems of fuzzy relation equations have been widely studied, for instance in <ref type="bibr">[10,</ref><ref type="bibr">11,</ref><ref type="bibr">20]</ref>. This section recalls these kind of systems for which a residuated lattice (L, ∨, ∧, * , I, 0, 1, ≤) is fixed.</p><p>A system of fuzzy relation equations with sup- * -composition (SFRE * ), is the following system of equations</p><formula xml:id="formula_396">A i • R = B i , or u∈U (A i (u) * R(u, v)) = B i (v), i ∈ {1, . . . , n}<label>(3)</label></formula><p>where R ∈ L U ×V is an unknown fuzzy relation, A 1 , . . . , A n ∈ L U and B 1 , . . . , B n ∈ L V . Its counterpart is a system of fuzzy relation equations with inf-I-composition (SFREI), that is,</p><formula xml:id="formula_397">A * j R = D j or v∈V I(A j (v), R(u, v)) = D j (u), j ∈ {1, . . . , m}<label>(4)</label></formula><p>considered with respect to an unknown fuzzy relation R ∈ L U ×V and the fuzzy subsets A * 1 , . . . , A * m ∈ L V and D 1 , . . . , D m ∈ L U . Given the universes U = {u 1 , . . . , u m } and V = {v 1 , . . . , v n }, an unknown fuzzy relation R ∈ L U ×V and two arbitrarily chosen fuzzy subsets of respective universes A <ref type="formula" target="#formula_48">3</ref>) can be written as</p><formula xml:id="formula_398">1 . . . , A n ∈ L U , B 1 , . . . , B n ∈ L V . If an element of V is fixed, v ∈ V , A i (u j ) = a ij for i ∈ {1, . . . , n}, j ∈ {1, . . . , m}, R(u j , v) = x j , B i (v) = b i , then System (</formula><formula xml:id="formula_399">a 11 * x 1 ∨ • • • ∨ a 1m * x m = b 1 . . . . . . . . . . . . a n1 * x 1 ∨ • • • ∨ a nm * x m = b n<label>(5)</label></formula><p>Consequently, for each v ∈ V , we obtain a column of R, thus, solving n SFRE * systems, we will obtain the unknown relation. In order to obtain a SFREI system where the considered universes U , V and the unknown fuzzy relation R ∈ L U ×V are as in the previous system, an element of U is fixed, u ∈ U , fuzzy subsets A * 1 , . . . , A * m ∈ L V , D 1 , . . . , D m ∈ L U are assumed, such that A * j (v i ) = a ij for i ∈ {1, . . . , n}, j ∈ {1, . . . , m}, R(u, v i ) = y i and D j (u) = d j . Therefore, System (4) can be written as</p><formula xml:id="formula_400">I(a 11 , y 1 ) ∧ • • • ∧ I(a n1 , y n ) = d 1 . . . . . . . . . . . . I(a 1m , y 1 ) ∧ • • • ∧ I(a nm , y n ) = d m<label>(6)</label></formula><p>Therefore, for each u ∈ U , we obtain a row of R, thus, solving m SFRE→ systems, the unknown relation will be obtained.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Images and signals retrieval</head><p>This section introduces an application of fuzzy relation equation to objects retrieval in the fuzzy mathematical morphology setting. From the relationship between fuzzy mathematical morphology and fuzzy property-oriented concept lattice, recalled in Section 2.3, and the relationship between fuzzy property-oriented concept lattice and fuzzy relation equations <ref type="bibr">[12]</ref>, we will solve the problem of obtaining the original object A : X → L from another one received B : X → L and a fixed structuring image S : X → L. Specifically, given an image B : X → L, we can consider a structuring image S : X → L and ask if there exists A : X → L such that δ S (A) = B and, if there exists, how to obtain it. Analogously, for each image A : X → L, we can ask if there exists B : X → L such that ε S (B) = A, for a structured image S, and, if there exists, how to obtain it.</p><p>First of all, we will write this mathematical morphology problem in terms of fuzzy relation equations.</p><p>Given a finite subset X 0 = {x 1 , . . . , x n } of X, an image B : X 0 → L and a structuring image S : X 0 → L, if we want to obtain an image A : X 0 → L such that δ S (A) = B, then we need to solve the following system:</p><formula xml:id="formula_401">R S (x 1 , x 1 ) * A(x 1 ) ∨ • • • ∨ R S (x n , x 1 ) * A(x n ) = b 1 . . . . . . . . . . . . R S (x 1 , x n ) * A(x 1 ) ∨ • • • ∨ R S (x n , x n ) * A(x n ) = b n<label>(7)</label></formula><p>in which B(x i ) = b i , for all i ∈ {1, . . . , n}.</p><p>Analogously, given an image A : X 0 → L and a structuring image S : X 0 → L, obtaining an image B : X 0 → L, such that ε S (B) = A, is equivalent to solve the system:</p><formula xml:id="formula_402">I(R S (x 1 , x 1 ), B(x 1 )) ∧ • • • ∧ I(R S (x 1 , x n ), B(x n )) = a 1 . . . . . . . . . . . . I(R S (x n , x 1 ), B(x 1 )) ∧ • • • ∧ I(R S (x n , x n ), B(x n )) = a n<label>(8)</label></formula><p>Next, several results will be presented in the fuzzy mathematical morphology framework, based on the properties introduced in <ref type="bibr">[12]</ref>. The first one is about the solvability of Systems ( <ref type="formula" target="#formula_54">7</ref>) and (8).</p><p>Theorem 2. Given a finite subset X 0 ⊆ X and B ∈ L X0 , defined by B(x i ) = b i , for each i ∈ {1, . . . , n}. System (7) can be solved if and only if B is S-open in X 0 . In that case, ε S (B) ∈ L X0 is the greatest solution.</p><p>Analogously, given A ∈ L X0 , defined by A(x i ) = a i , for each i ∈ {1, . . . , n}. System (8) can be solved if and only if A is S-closed in X 0 . In that case, δ S (A) ∈ L X0 is the least solution.</p><p>As a consequence, if the values b i satisfy that δ S (A)(x i ) = b i ∈ L, for all i ∈ {1, . . . , n}, then we can find a solution A ∈ L X0 of System <ref type="bibr">(7)</ref>. Analogously, if ε S (B)(x i ) = a i ∈ L is known for all i ∈ {1, . . . , n}, then we can find B ∈ L X0 solving System <ref type="bibr">(8)</ref>.</p><p>The second result relates the independent term and greatest solution to a property-oriented concept.</p><p>Theorem 3. System (7) can be solved if and only if (ε S (B), B) is an L-fuzzy property-oriented concept of the context (L, X 0 , X 0 , R S ), where B ∈ L X0 is defined by B(x i ) = b i , for all i ∈ {1, . . . , n}.</p><p>Similarly, System (8) can be solved if and only if (A, δ S (A)) is an L-fuzzy property-oriented concept of the context (L, X 0 , X 0 , R S ), where A ∈ L X0 is defined by A(x i ) = a i , for all i ∈ {1, . . . , n}. Now, we present an application to digital signals.</p><p>Example 1. Let us assume the set X = {0, 1, 2, . . . , 21, 22} ⊆ Z, the linear structure L = {0, 0.1, 0.2, . . . , 0.9, 1}, the mapping B : X → L, which is represented in Figure <ref type="figure" target="#fig_0">1</ref>, and the structuring set S = {−1, 0, 1}. Note that B can be interpreted as a 1-D discrete signal. From this environment a system of fuzzy relation equations similar to System <ref type="bibr">(7)</ref> is considered, in order to obtain a signal A with dilation B.</p><p>First of all, we need to check if this system has a solution. Hence, we consider the context (L, X, X, R S ), where the fuzzy relation R S ⊆ X × X is defined, for each (x, y) ∈ X × X, as</p><formula xml:id="formula_403">R S (x, y) = S(y − x) = 1 if |y − x| ≤ 1 0 otherwise Since the signal B is S-open in X, that is (δ S • ε S )(B) = B</formula><p>, by Theorems 2 and 3, we have that the considered system has, at least, one solution and the greatest solution A g is ε S (B), which is given in Figure <ref type="figure" target="#fig_1">2</ref> and defined as</p><formula xml:id="formula_404">ε S (B)(x) = inf{I(R S (x, y), B(y)) | y ∈ X} = inf{B(y) | |y − x| ≤ 1}</formula><p>for all x ∈ X. Moreover, (A g , B) is a fuzzy property-oriented concept. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 2. Greatest solution</head><p>It is clear, in Example 1, that the original signals A may not be the greatest solution, but another one of the proposed system. In order to obtain the whole set of solutions the following result is introduced and can be proven from <ref type="bibr">[12]</ref>.</p><formula xml:id="formula_405">Theorem 4. Given an S-open object B ∈ L X0 , if A ∈ L X0</formula><p>is the original object, such that δ S (A) = B, then either A &lt; A ≤ ε S (B) for some (A , B ) lower neighbour of (ε S (B), B) in P(X 0 , X 0 , R S ); or A &lt; ε S (B) and A is incomparable with A , for all (A , B ) lower neighbour of (ε S (B), B) in P(X 0 , X 0 , R S ).</p><p>Analogously, given an S-closed object A ∈ L X0 , if B ∈ L X0 is the original object, such that ε S (B) = A, then either δ S (A) ≤ B &lt; B for some upper neighbour (A , B ) of (A, δ S (A)) in P(X 0 , X 0 , R S ); or δ S (A) &lt; B and B is incomparable with B , for all (A , B ) upper neighbour of (A, δ S (A)) in P(X 0 , X 0 , R S ).</p><p>Therefore, Theorem 4 can be applied in order to obtain the whole set of solutions of the system given in Example 1. However, we need to remark that, since straightforward ε S (B) ≤ B, we have that A g is the solution closest to B. Hence, considering the greatest solution can be a good election.</p><p>The following example focus on images retrieval.</p><p>Example 2. We consider a two dimensional pixelated image. Hence, X = Z 2 , L = {0, 1} and the mappings A : Z 2 → L are interpreted as two dimensional images. The elements of X are denoted as</p><formula xml:id="formula_406">x = (x 1 , x 2 ) ∈ R 2 .</formula><p>In this case, the image B : Z 2 → L, given in Figure <ref type="figure" target="#fig_7">3</ref>, is obtained and we want to retrieve the original image or a good approximation. The structuring binary image S is the unit ball:</p><formula xml:id="formula_407">S = {(x 1 , x 2 ) ∈ Z × Z | x 1 + x 2 ≤ 1}</formula><p>given in Figure <ref type="figure" target="#fig_8">4</ref>. Therefore, by the previous results, the greatest solution A g : Z 2 → L, associated with B and the structuring image, is the best approximation of B. That is, the image closer to B. This image is given in Figure <ref type="figure" target="#fig_9">5</ref> and it is defined as: there exists (y 1 , y 2 ) ∈ Z 2 such that B((y 1 , y 2 )) = 0 and (y 1 − x 1 ) + (y 2 − x 2 ) ≤ 1 1 otherwise By Theorem 3, the pair (A, B) is a property-oriented concept of the context ({0, 1}, Z 2 , Z 2 , R S ). However, in this case, the considered original image is not the greatest solution A g but a solution less than it. This is given in Figure <ref type="figure" target="#fig_11">6</ref>. This is not a problem, but it shows that it is also interesting to compute the whole set of solutions. Theorem 4 provides an interesting mechanism to get all the solutions of Systems ( <ref type="formula" target="#formula_54">7</ref>) and ( <ref type="formula" target="#formula_55">8</ref>), although another more operative results will be studied in the future.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions and future work</head><p>In mathematical morphology, the usual procedure is, given a structuring image, to obtain the dilation and the erosion of an original image. This paper have We have shown that this problem is associated with solving systems of fuzzy relation equations. Therefore, the results given in <ref type="bibr">[12]</ref> and the relationship introduced in <ref type="bibr">[1]</ref> have been used to obtain the original image or a good approximation. Moreover, we have introduced some results focus on searching the whole set of possible original images.</p><p>In the future, more properties and applications will be studied, for instance in object recognition.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A Study on the Correspondence between FCA and ELI Ontologies</head><p>Melisachew Wudage Chekol, Mehwish Alam, and Amedeo Napoli LORIA (INRIA, CNRS, and Université de Lorraine) France {melisachew.chekol,mehwish.alam,amedeo.napoli}@inria.fr Abstract. The description logic EL has been used to support ontology design in various domains, and especially in biology and medicine. EL is known for its efficient reasoning and query answering capabilities. By contrast, ontology design and query answering can be supported and guided within an FCA framework. Accordingly, in this paper, we propose a formal transformation of ELI (an extension of EL with inverse roles) ontologies into an FCA framework, i.e. KELI, and we provide a formal characterization of this transformation. Then we show that SPARQL query answering over ELI ontologies can be reduced to lattice query answering over KELI concept lattices. This simplifies the query answering task and shows that some basic semantic web tasks can be improved when considered from an FCA perspective.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Relying on Semantic Web (SW) languages and principles, several ontologies have been created in various domains, especially, in biology and medicine. In addition to that, since the conception of linked data publishing principles, over 295 linked (open) datasets have been produced <ref type="foot" target="#foot_57">1</ref> . Querying these data is mainly done through the W3C recommended query language SPARQL<ref type="foot" target="#foot_58">2</ref> .</p><p>In parallel, knowledge discovery in data represented by means of objects and their properties can be done using formal concept analysis (FCA) <ref type="bibr">[9]</ref>. Concept lattices can reveal hidden relations within data and can be used for organizing and classifying data. A survey of the benefits of FCA to SW and vice versa has been proposed in <ref type="bibr">[14]</ref>. As mentioned in that paper, a few of these benefits ranges from knowledge discovery, ontology completion, to computing subsumption hierarchy of least common subsumers. Additionally, studies in <ref type="bibr">[7]</ref> and <ref type="bibr">[12]</ref> are based on FCA for managing SW data while finite models of description logics (as EL) are explored in <ref type="bibr">[3,</ref><ref type="bibr">4]</ref>. All these studies propose methods to use FCA in the analysis of SW data. Nevertheless, none of them offer a precise way of representing SW data within a formal context. We deem it necessary to provide mathematically founded methods to formalize the representation and the analysis of SW data.</p><p>In this work, we focus particularly on ELI (an extension of EL with inverse roles) ontologies. EL is one of OWL 2 profiles (OWL 2 EL). In fact, OWL 2 EL is used mainly for designing large biomedical ontologies such as SNOMED-CT<ref type="foot" target="#foot_59">3</ref> , and the NCI thesaurus <ref type="foot" target="#foot_60">4</ref> . A common feature of these ontologies is that they possess large concept hierarchies that can be queried with SPARQL. Answering SPARQL queries is done by binding variables of the query into terms of the queried ontology. However, including inferred data in the query answers requires either a reasoner to infer all implicit data or query rewriting using regular expression patterns (that enable navigation in a hierarchy) <ref type="bibr">[10]</ref>. The latter obliges the user to know the nuts and bolts of SPARQL. To overcome these difficulties, we reduce SPARQL query answering in ELI ontologies into query answering in concept lattices along with the transformation of the queried ontology into a formal context. Querying a concept lattice appears to be a less complex task than using SPARQ. Further, the lattice organization, i.e., partial ordering, can help understanding the relations between data and visualization of SW data.</p><p>Overall, in this paper, we work towards (i) a formal characterization of the translation of ontologies into a formal context, (ii) minimizing the difficulty of SPARQL query answering over ontologies into LQL (Lattice Query Language) query answering over concept lattices, and finally (iii) providing organization of SPARQL query answers with the use of concept lattices.</p><p>Outline: after presenting the basics of ELI, SPARQL and FCA ( §2), we show how to transform ELI ontologies into formal contexts ( §3). We then present a query language for concept lattices called LQL ( §4). Therefore, SPARQL query answering over ELI ontologies can be reduced to LQL query answering over K ELI concept lattices ( §5). Finally, we present the related works ( §6) along with a summary of concluding remarks ( §7).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head><p>In this section, we provide a very brief and intuitive introduction of the description logic ELI and FCA. For a detailed discussion, we refer the readers to <ref type="bibr">[11,</ref><ref type="bibr">2,</ref><ref type="bibr">9,</ref><ref type="bibr">6]</ref>.</p><p>In to arbitrary class descriptions is defined inductively <ref type="bibr">[2]</ref>.</p><p>SPARQL is a W3C recommended query language <ref type="bibr">[13]</ref> based on simple graph patterns. It allows variables to be bound to components in the queried graph. In addition, operators akin to relational joins, unions, left outer joins, selections, and projections can be combined to build more expressive queries. Queries are formed from query patterns which in turn are defined inductively from path patterns, i.e., tuple t ∈ UBV × e × UBLV, with V a set of variables disjoint from UBL (URIs, Blank nodes and Literals -are used to identify values such as strings, integers and dates.), and e is regular path expression. Path patterns grouped together using operators AND (.) and UNION form query patterns. Definition 1. A query pattern q is inductively defined as:</p><formula xml:id="formula_408">q ::= UBV × e × UBLV | q 1 . q 2 | {q 1 } UNION {q 2 } e ::= | U | V | e 1 /e 2 | e 1 e 2 | e + | e *</formula><p>A SPARQL SELECT query can be formed according to the following syntax: SELECT W FROM O WHERE {q}. The FROM clause identifies the queried ontology O on which the query will be evaluated, WHERE contains a query pattern q that the query answers should satisfy and SELECT singles out the answer variables W ∈ V from the query pattern. For this work, we consider only AND and UNION SPARQL queries.</p><p>A formal context represents data using objects, attributes, and their relationships. Formally, it is a triple K = (G, M, I) where G a set of objects, M a set of attributes, and I ⊆ G × M is a relation. A derivation operator ( ) is used to compute formal concepts of a context. Given a set of objects, the operator derives common attributes of these objects and vice versa. A set of formal concepts ordered with the set inclusion relation form a concept lattice <ref type="bibr">[6]</ref>.</p><p>In the next section, we show the transformation of ELI ontologies into formal contexts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Transforming ELI Ontologies into Formal Contexts</head><p>In the following, we introduce some terms and notions that we use. Materialization (closure) refers to computing the deductive closure of an ontology (alternatively, making all implicitly stored data explicit by using inference) <ref type="bibr">[15]</ref>. Ontology completion <ref type="bibr">[5]</ref> -refers to computing the closure of the ontology and adding additional instances by following class inclusions in the TBox (for instance, if Actor is a subclass of Artist and the instance Tom is an Actor, add another instance who is not an Actor but is an Artist. In this case, if an instance is not known, one can use anonymous resource to identify the unknown instance). Loss of semantics-the transformation of an ontology into a formal context results in loss of semantics if the context mixes TBox (schema axioms) and ABox (instance) data and if the concept lattice obtained from the formal context does not maintain the class hierarchy. Before presenting how a ELI ontology can be transformed into a formal context, we motivate our approach with an example. Starting with Example 1, one can ask whether it is possible to obtain a formal context from the ontology O while maintaining its semantics. The problem here is that DLs and FCA work on different assumptions, i.e, while DL languages are based on the open world assumption (OWA), FCA relies on the closed world assumption (CWA). The former permits to specify only known data whereas the later demands all data should be explicitly specified. To slightly close the gap between these two worlds:</p><p>-one can generate the formal context from the closure of the ontology. However, this approach fails when it is not possible to compute the closure of the ontology as this is the case for ontologies created from a DL language equipped with negation and disjunction constructs<ref type="foot" target="#foot_62">5</ref> , and -before transforming the ontology into a formal context, complete the ontology. A drawback of the second approach is that it adds unnecessary data, consequently, giving unwanted results when querying.  To this end, our main objective is to come up with an approach which transforms an ontology into a formal context while maintaining the semantics. Accordingly, a formal context corresponding to the ontology in Example 1 has an associated lattice that looks like the one in Figure <ref type="figure" target="#fig_122">1a</ref>. From this onwards, when we speak of this lattice, we refer to it as the target lattice. The target lattice maintains the semantics because: the class hierarchy of the ontology (TBox) is the same as that of the lattice, and the instance (ABox) and schema (TBox) part of the ontology are treated separately as discussed in Section 3.2.</p><p>In the following, we provide various formal contexts associated with the ontology in Example 1. For the sake of readability, we shorten concept and individual names as: ActorsFromNewYork (AFNY), FilmProducer (Prd), Actor (Act), Artist (Art), Person (Per), and tomCruise (tC). Consider the following transformations:</p><p>Naive approach: materialized ABox AFNY Prd Act Art Per</p><formula xml:id="formula_409">tC x x x x x</formula><p>This formal context is obtained from the materialized ABox of the ontology. It does not include subclass relations as they can be acquired using attribute exploration <ref type="bibr">[9]</ref>. But unfortunately, the resulting lattice considers all the attributes to be equivalent, implying loss of semantics, as it can be seen from the lattice in Figure <ref type="figure" target="#fig_123">2b</ref>.</p><p>Direct approach: materialized ABox and TBox  <ref type="figure" target="#fig_123">2a</ref>. As it can be seen, it does not maintain the semantics because the concept hierarchy is different from that of our target lattice (in Figure <ref type="figure" target="#fig_122">1a</ref>). In other words, the concept hierarchy of the concept lattice is different from that of the ontology (in Example 1). Everything is mixed: attributes are also objects and vice versa. Obviously, it is possible to find several other ways of transforming an ontology into a formal context. To avoid any semantic loss, we propose an another approach, where we separately manage the transformation of ABox and TBox assertions. In FCA, attribute exploration is used to discover implicit knowledge. In that, given a concept lattice, a domain expert is asked a series of questions to produce implications that correspond to DL like inclusion axioms. Ontologies contain instance and schema data, where the latter is similar to implications of concept lattices. Hence, when transforming, individuals in the ABox to become objects and concept names to become attributes, besides, assertions in the ABox are transformed into relations. Additionally, class inclusions of the TBox become background implications. The overall transformation pro-cedure leads to a formal context with respect to existing knowledge (this is also known as background implications according to <ref type="bibr">[8]</ref>). This procedure is formally described in definition 2.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Proposal</head><p>To transform a ELI knowledge base KB = T , A into a formal context K = (G, M, I), the schema axioms in the TBox become background implications L((G, M, I)) and the ABox assertions become objects, attributes and relations. To elaborate, in K, individuals in the ABox constitute objects G, class names in the ABox and TBox yield attributes in M , and ABox assertions create relations between objects and attributes I ⊆ G × M . Here, we consider acyclic TBoxes so as to avoid class names becoming objects in a context. </p><formula xml:id="formula_410">K AFNY Prd Act Art Per tC x L = { AFNY → Act, Prd → Art, Act → Art, Art → Per }</formula><p>Construction of concept lattices: there are several algorithms that can compute concept lattices associated with a formal context. Some of these are discussed in the literature <ref type="bibr">[9,</ref><ref type="bibr">6]</ref> and have also been implemented. They work on an empty implication base. Thus, most are not suitable for contexts with background implications. In <ref type="bibr">[8]</ref>, the author provides an algorithm for attribute exploration with background implications. This technique can be employed for our purpose. As a result, the concept lattice associated with the formal context and background implications of Example 2 is depicted in Figure <ref type="figure" target="#fig_122">1b</ref>.</p><p>Next we show that concept lattices associated with ELI ontologies can be queried by LQL -lattice query language.</p><p>4 Querying Concept Lattice SPARQL query answering over ELI ontologies can be considered as lattice query answering over K ELI concept lattices. To do this, we need to introduce a query language for concept lattices. Each node in a lattice can be seen as a query formed by a conjunction of: a concept intent and a concept extent. Intuitively, querying concept lattices amounts to fetching the objects given a set of attributes as query constants, alternatively, fetching the attributes given a set of objects as query constants or terms. Query terms can be connected using the logical operators: AND and OR to form a complex term. A term is either a set of objects called object term (OT) or a set of attributes called attribute term (AT). Based on the definitions of object and attribute terms, we introduce LQL queries. In this paper, we do not address the problem of negation in the query (and thus set difference).</p><p>Definition 4 (LQL -Lattice Query Language). Given an object term OT, an attribute term AT, and variables x, y ∈ V where V is a finite set of variables, an LQL query can take the following forms: q(y) = (OT, y); q(x) = (x, AT); q() = (OT, AT ) q(y), q(x), and q() do not necessarily correspond to formal concepts, only when OT and AT are closed sets. If OT is a closed set in q(y) = (OT, y), then y corresponds to the intent associated with OT. The same thing happens with x when AT is a closed set in q(x) = (x, AT). For evaluating x and y in every possible case we do the following:</p><p>-if OT = {g}, then y = {g} , i.e., all attributes that are associated with the object g.</p><formula xml:id="formula_411">-if OT = {g 1 } AND {g 2 }, then y = {g 1 , g 2 } -if OT = {g 1 } OR {g 2 }, then y = {g 1 } ∪ {g 2 }</formula><p>Similarly, the evaluation of q(x) = (x, AT) is given as follows:</p><p>-if AT = {m}, then x = {m} , i.e., all objects that are associated with the attribute m.</p><formula xml:id="formula_412">-if AT = {m 1 } AND {m 2 }, then x = {m 1 , m 2 } -if AT = {m 1 } OR {m 2 }, then x = {m 1 } ∪ {m 2 }</formula><p>Finally, the evaluation of q() = (OT, AT) is:</p><p>-true if OT = AT or AT = OT and false otherwise.  -For q 1 (x) = (x, {actor} AND {comedian} AND {writer}), we have x = {JerrySeinf eld}. -q 2 (x) = (x, {writer} OR {director}), we have x = {DavidSchwimmer, W illSmith, JerrySeinf eld}. -q 3 (y) = ({JustinT imberlake} AND {W illSmith}, y), we have y = {actor, musician}. -q 4 (y) = ({DavidSchwimmer} OR {JustinT imberlake}, y), we have y = {actor, director, musician}.</p><p>The complexity of answering LQL queries is polynomial in the size of the formal context, i.e., O|(G, M, I)|. The advantage of LQL over SPARQL is that, it allows to compute the least upper bound and greatest lower bound of query answers. We now present one important part of this work which is reducing SPARQL query answering over ELI ontologies into LQL query answering over K ELI concept lattices.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">SPARQL query answering over ontologies vs LQL query answering over concept lattices</head><p>Recently, SPARQL has been extended with different entailment regimes and regular path expressions <ref type="foot" target="#foot_63">6</ref> . The semantics of SPARQL relies on the definition of basic graph pattern matching that is built on top of simple entailment <ref type="bibr">[10]</ref>. However, it may be desirable to use SPARQL to query triples entailed from subclass, subproperty, range, domain, and other relations which can be represented using DL schema languages such as ELI. The SPARQL specification defines the results of queries based on simple entailment. The specification also presents a general parametrized definition of graph pattern matching that can be expanded to other entailments beyond simple entailment. Query answering under an entailment regime can be achieved via: (1) materialization (computing the deductive closure of the queried graph), (2) rewriting the queries using the schema, and</p><p>(3) hybrid (combining materialization and query rewriting) <ref type="bibr">[10]</ref>. SELECT ?x WHERE {? x a A r t i s t . }</p><p>Under simple entailment evaluation of a SPARQL query, the answers of Q over O is empty, i.e., Q(O) = ∅. For the reason that, simple entailment is based on graph matching which requires the variable ?x in the query to be bound with a term in the graph. Since there is no term where it can be bound to, the result is empty. However, under higher entailment regimes (such as the RDFS entailment <ref type="bibr">[10]</ref>) the result of Q is non-empty because inferred instances obtained through reasoning are taken into account for computing the answers. To get a non-empty answers for the above query, one can use one of the following approaches:</p><p>1. Materialization: involves all implicit data to be computed before the evaluation of the query. This can be done by using a DL reasoner. Consequently, in Example 1, the materialization of O is O . Thus, the evaluation of</p><formula xml:id="formula_413">Q over O is Q (O) = {tomCruise}. 2.</formula><p>Query rewriting: is the task of converting a SPARQL query into one that involves schema axioms. It can be done using SPARQL property paths (a.k.a. regular path expressions). For instance, the above query can be rewritten as:</p><p>SELECT ?x WHERE {? x a/ * A r t i s t . }</p><p>This query Q selects all instances of Artist and that of its subclasses by navigating through the subclass relation ( * ). The rewriting can be evaluated over O to obtain Q (O) = {tomCruise}.</p><p>In summary, materialization requires a reasoner to expand the knowledge base, the complexity of this task depends on the type of the schema language. On the other hand, query rewriting requires modifying query patterns using SPARQL property paths. This also results in a further jump in the complexity of query answering.</p><p>As described above, unlike SPARQL query answering over ontologies, query answering over a concept lattice is relatively easier. Due to the fact that once the concept lattice is obtained from the ontology, LQL can be used to query the lattice. Consequently, alleviating those expensive tasks. The above SPARQL query can be converted into an LQL query as: q(x) = (x, Artist). The evaluation of this query over a concept lattice obtained from O is as expected</p><formula xml:id="formula_414">Q (O) = {tomCruise}.</formula><p>The complexity of SPARQL query answering over ELI ontologies is larger than that of LQL query answering over K ELI concept lattices. Since, the expressive power of SPARQL is superior than that of LQL. For ELI ontologies a query language like LQL is sufficient to retrieve individuals (or objects) and classes (or attributes).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Related work</head><p>To date, several studies have been carried out to assess the relevance and benefits of FCA for DL <ref type="bibr">[5,</ref><ref type="bibr">3,</ref><ref type="bibr">4,</ref><ref type="bibr">14,</ref><ref type="bibr">7,</ref><ref type="bibr">12]</ref>. Notably, the work in <ref type="bibr">[14]</ref> presents a survey on the advantageous of FCA for DL ontologies. Accordingly, some of the benefits that FCA can bring to the DL world include: knowledge discovery, extended subsumption hierarchy (of conjunctions of concepts) <ref type="bibr">[1]</ref>, subsumption hierarchy of least common subsumers, exploring finite models <ref type="bibr">[3,</ref><ref type="bibr">4]</ref>, role assertion analysis, supporting bottom-up construction and completion of ontologies. Since the survey, other studies, <ref type="bibr">[7]</ref> and <ref type="bibr">[12]</ref>, have carried out experiments to characterize and analyse SW data using FCA tools. The former provides an entry point to a linked data using questions in a way that can be navigated. It gives a translation of an RDF graph into a formal context where the subject of an RDF triple becomes the object, a composition of the predicate and object of the triple becomes an attribute. The latter obliges the user to specify objects and attributes of a context. With that, it creates SPARQL queries to extract content from linked data in order to populate the formal context. Despite the fact that all these works have employed FCA techniques, to the best of our knowledge, none of them provide a formal and precise translation of ontologies into a formal context as we did here.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusion</head><p>In this work, firstly, we have proposed a formal transformation of ELI ontologies into formal contexts. This enables to benefit from some advantages that FCA may offer to the DL world. Then we have shown that SPARQL query answering over ELI ontologies can be considered as lattice query answering over K ELI concept lattices. This alleviates some reasoning and query rewriting tasks that are required for SPARQL query answering.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Recently analysis of triadic data attracts more and more attention in Data Mining community <ref type="bibr">[1,</ref><ref type="bibr">2,</ref><ref type="bibr">3,</ref><ref type="bibr">4,</ref><ref type="bibr">5]</ref>. One particular example is mining of so-called folksonomies, structures composed by three sets: users, objects and tags. One of the first attempts of such an analysis <ref type="bibr">[1]</ref> was done within the framework of Formal Concept Analysis (FCA) <ref type="bibr">[6]</ref>, namely in Triadic Formal Concept Analysis (TCA) <ref type="bibr">[7]</ref>. Triclustering methods, which are objects of our study, allow one to simultaneously discover three-component homogeneous groups in the considered three-sets. For example, these triclusters can be used for community detection <ref type="bibr">[8]</ref> and recommender algorithms <ref type="bibr">[9]</ref>. As a consequence, we would like to investigate peculiarities and reveal advantages and drawbacks of various triclustering approaches to choose the optimal one depending on the task.</p><p>In this paper we compare the following triclustering methods: object-attributecondition triclustering (2 modifications including new one) <ref type="bibr">[10,</ref><ref type="bibr">11]</ref>, TriBox <ref type="bibr">[2]</ref>, spectral triclustering <ref type="bibr">[11]</ref> and Trias algorithm <ref type="bibr">[1]</ref>. Even though there are some recent efficient <ref type="bibr">[12]</ref> and even more general algorithms than Trias <ref type="bibr">[13]</ref>, it is well-known to the FCA community and sometimes outperforms its competitors <ref type="bibr">[12]</ref>. Moreover, the aim of the paper is not in comparison of different algorithms for triadic formal concepts generation, but it is rather in comparison of the original patterns with their various approximations (triclusters) in terms of the introduced quality measures. We also suggest investigating different matrix decomposition approaches, e.g. Boolean ones <ref type="bibr">[3,</ref><ref type="bibr">4]</ref>, in a further study; note that Boolean matrix factorization can be considered as an approach to the reduction of the number of the resulting triconcepts.</p><p>The rest of the paper is organised as follows. In section 2 we give main definitions and describe the triclustering methods selected for the comparison. Section 3 describes all the experiments and their results on real and synthetic data along with specially introduced quality measures. Section 4 concludes the paper and indicates some further research direction.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Triclustering models and methods</head><p>Object-attribute-condition triclustering (OAC-triclustering) is based on Formal Concept Analysis <ref type="bibr">[6]</ref> and its triadic extension, Triadic Formal Concept Analysis (TCA) <ref type="bibr">[7]</ref>. In this paper we consider 2 types of OAC-triclustering: box operator based (box OAC-triclustering) <ref type="bibr">[10]</ref>, and prime operator based (prime OAC-triclustering). The latter is introduced in this paper. The set of triclusters is generated one by one and complete enumeration strategy is used.</p><p>First, we recall some basic notions of Formal Concept Analysis (FCA) <ref type="bibr">[6]</ref>. Let G and M be sets, called the set of objects and attributes, respectively The concepts, ordered by (A 1 , B 1 ) ≥ (A 2 , B 2 ) ⇐⇒ A 1 ⊇ A 2 form a complete lattice, called the concept lattice B(G, M, I).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Object-attribute-condition triclustering</head><p>Here let us define the box operators and describe box OAC-triclustering. We use a slightly different introduction of the main TCA notions because of their further technical usage.</p><p>Let K = (G, M, B, I) be a triadic context, where G, M , and B are sets, and I is a ternary relation: I ⊆ G × M × B. In addition to set of objects, G, and set of attributes, M , we have B, a set of conditions. Derivation (prime) operators for a triple ( g, m, b) ∈ I from triadic context K can be defined as follows: The density of a tricluster T = (X, Y, Z) is defined as the fraction of all triples of I in X × Y × Z:</p><formula xml:id="formula_415">g := { (m, b) | ( g, m, b) ∈ I}<label>(2)</label></formula><formula xml:id="formula_416">ρ(T ) := |I ∩ (X × Y × Z)| |X||Y ||Z|<label>(5)</label></formula><p>Definition 2. The tricluster T is called dense iff its density is not less than some predefined threshold, i.e. ρ(T ) ≥ ρ min .</p><p>Let us elaborate on the structure of box operator based triclusters. Suppose K = (G, M, B, I) is a triadic context, and the triple ( g, m, b) ∈ I is considered. Then object g will be added to</p><formula xml:id="formula_417">g iff {(g, m, b) | b ∈ B ∧ (g, m, b) ∈ I} = ∅ ∨ {(g, m, b) | m ∈ M ∧(g, m, b) ∈ I} = ∅.</formula><p>It is clear that this condition is equivalent to the one in eq. ( <ref type="formula" target="#formula_50">4</ref>), and can be easily illustrated (Fig. <ref type="figure" target="#fig_0">1</ref>): if at list one of the elements from "grey" cells is an element of I, then g is added to g .</p><p>The idea of box OAC-triclustering is to enumerate all triples of the ternary relation I for a context K generating a box operator based tricluster for each. If generated tricluster T was not added to the set of all triclusters T on previous steps, then T is added to T . It is possible to implement hash-fuctions for triclusters in order to significantly optimize computational time by simplifying the comparison of triclusters. Also a minimal density threshold can be used.</p><p>Prime OAC-triclustering extends the biclustering method from <ref type="bibr">[14]</ref> to the triadic case. It uses prime operators (eq. 3) to generate triclusters. Prime based OAC-triclusters are more dense than box operator based ones. Their structure is illustrated on Fig. <ref type="figure" target="#fig_1">2</ref>: every element corresponding to the "grey" cell is an element of I. Thus, prime operator based OAC-triclusters in a threedimensional matrix form contain a cross-like structure of ones.</p><p>It may also be useful to implement hash functions for triclusters.</p><p>Algorithm 1 Algorithm for prime OAC-triclustering.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">TriBox method</head><p>The TriBox method <ref type="bibr">[2]</ref> implements an optimization approach in tricluster generation. Suppose K = (G, M, B, I) is a triadic context. The idea is to select some triple of I, take it for the initial tricluster, and then to modify its extent, intent, and modus so that they covered a significant part of the context while maintaining high density. Thus, TriBox aims at finding a set of triclusters T = {T = (X, Y, Z)} that maximize the criterion 6. The resulting triclusters compose locally optimal solution for the trade-off problem between the density and the volume of various possible triclusters.</p><formula xml:id="formula_418">f (T ) = ρ(T ) 2 |X||Y ||Z|<label>(6)</label></formula><p>Once again, hash-functions for triclusters may be used for optimizations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Spectral triclustering method</head><p>Spectral triclustering method <ref type="bibr">[11]</ref> is based on the graph partition problem. The idea is to represent the given triadic context as a tripartite graph and then recursively divide it. To find an optimal partitioning spectral clustering uses the second minimal eigenvector of the Laplacian matrix.</p><p>Let us elaborate on this technique. Suppose K = (G, M, B, I) is a triadic context First we need to transform K into tripartite graph Γ = V, E . Since I is a ternary relation it is only possible to represent K as a tripartite hypergraph without the loss of information. The following transformation technique is considered: V := G M B, for each triple (g, m, b) ∈ I edges (g, m), (g, b) and (m, b) are added to E to form an undirected non-weighted graph. As the result some additional triples will be added to I after inverse transformation. Still it is clear that these triples will be added only in ,,dense" areas of I thus possibly filling missing values and "optimizing" tricontext for methods aiming at finding formal concepts. Thus this technique is acceptable for solving the problem.</p><p>After the transformation Laplacian matrix is built for Γ :</p><formula xml:id="formula_419">L ij =      degree(v i ), if i = j −1, if i = j and ∃ edge (v i , v j ) 0, otherwise<label>(7)</label></formula><p>where v i is the i th vertex of V.</p><p>The second minimal eigenvector of L is an optimal solution of the continuous variant of the optimal partition problem for Γ (finding the minimal set Ẽ ⊆ E so that the graph Γ = (V, E \ Ẽ) is not connected). The sign of each component of this vector indicates one of the 2 new connected components. For convenience we find the optimal partition vector as the approximation of the obtained vector by setting its components to ±1 values.</p><p>In order to avoid partitioning of dangling vertices or small subgraphs the generalized eigenvalue problem must be considered ( <ref type="bibr">[11]</ref>, Appendix I):</p><formula xml:id="formula_420">Lv = λDv (<label>8</label></formula><formula xml:id="formula_421">)</formula><p>where D is a diagonal matrix containing vertices' degrees on the main diagonal. Also, some minimum size constraint can be used to avoid too deep partitioning. Since spectral triclustering is not able to generate the same tricluster more than once, it is not necessary to use hash functions to speed up the calculations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4">Trias method</head><p>Formally, Trias [1] is a method for finding triadic formal concepts that are closed 3-sets. Since triadic formal concepts can be interpreted as absolutely dense triclusters, this method was added to the study.</p><p>Trias is based on the NextClosure algorithm that enumerates all formal concepts of the dyadic context in lexicographical order. In Trias this approach is extended to the triadic case and minimal support constraints are added (triclusters with too small extent, intent or modus are skipped).</p><p>As well as spectral triclustering, Trias is not able to generate the same tricluster more than once.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Experiments</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Noise-tolerance.</head><p>In order to test noise-tolerance of the algorithms 26 triadic contexts have been generated. The initial context contains 30 objects, 30 attributes, 30 conditions, and 3 non-overlapping 10 × 10 × 10 cuboids of ones on the main diagonal in its three-dimensional matrix form. Then this context has been sequentially noised by the inversions with the probability of an inversion of a triple varying from 0.1 to 0.5 with 0.1 interval (the latter context can be called uniform context, because probability of (g, m, b) ∈ I is equal for every triple). There have been 5 such series of context. Table <ref type="table" target="#tab_0">1</ref> contains the average number of triples and total density for these sets of contexts. The noise tolerance of an algorithm has been defined as the ability to build triclusters similar to initial cuboids. We used the Jaccard similarity coefficient to find the most similar tricluster t for the given cuboid c and their similarity. Total similarity has been defined as follows (C is a number of cuboids):</p><formula xml:id="formula_422">sim(c) = 1 C c C c=c1 max t=t1,...,t T |G c ∩ G t | |G c ∪ G t | |M c ∩ M t | |M c ∪ M t | |B c ∩ B t | |B c ∪ B t |<label>(9)</label></formula><p>Following size measure for spectral triclustering has been chosen:</p><formula xml:id="formula_423">Size(X, Y, Z) = |X| + |Y | + |Z| |G| + |M | + |B|<label>(10)</label></formula><p>s min has been set to 0.34 to stop at the triclusters of correct size. All of the methods have been implemented by authors and incorporated in a single triclustering toolbox in order to make the comparison more accurate. The toolbox has been implemented in C# using MS Visual Studio 2010/2012. All the experiments have been performed on Windows 7 SP1 x64 system equipped with an Intel Core i7-2600 @ 3.40GHz processor and 8 GB of RAM. AlgLib<ref type="foot" target="#foot_67">1</ref> library was used for eigenvalue decomposition.</p><p>The results of the experiments are represented on Figure <ref type="figure" target="#fig_7">3</ref>. It is clear that every method has managed to successfully find initial cuboids, but the results quickly deteriorate for most of methods with the growth of inversion probability. TriBox has shown the best results as it tries to optimize the density-volume trade-off (which most probably is the best for the areas of the former cuboids for small error probability). Though prime OAC-triclustering has been also rather noise-tolerant, it generated significantly more triclusters (most likely the high number of triclusters is the reason for these results). All the other methods have been unable to provide significant results for noisy contexts. Moreover, as it was expected, no adequate triclusters were generated by any of the methods for the contexts with inversion probability 0.5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Time, quantity, coverage, density and diversity.</head><p>The experiments on the computation time, triclusters count, coverage, density, and diversity were conducted on the following contexts (Table <ref type="table" target="#tab_2">2</ref>):   in at least one of the triclusters of the resulting set. To define diversity we will use a binary function of 2 triclusters intersect(T i , T j ) that equals to 1 if both triclusters T i and T j have nonempty intersection of the sets of contained triples, and 0 otherwise. It is also possible to define intersect for the sets of objects, attributes and conditions. For instance, intersect G (T i , T j ) is equal to 1 if triclusters T i and T j have nonempty intersection of their extents, and 0 otherwise. Now we can define diversity of the tricluster set T :</p><formula xml:id="formula_424">diversity(T ) = 1 − j i&lt;j intersect(T i , T j ) |T |(|T |−1) 2<label>(11)</label></formula><p>The diversity for the sets of objects, attributes or conditions is similarly defined.</p><p>Table <ref type="table" target="#tab_3">3</ref> contains the results for the experiments. The following values for parameters were selected:</p><p>1. OAC-triclustering: ρ min = 0 2. SpecTric: </p><formula xml:id="formula_425">s min = 0 3. Trias: τ G = τ M = τ B = 0</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Results</head><p>Trias is one of the most time consuming algorithms compared in the paper along with TriBox and SpecTric for large contexts. Though the resulting triclusters (triconcepts) can easily be interpreted their number and small size make it impossible to understand the general structure of the context. Since all triconcepts have been generated and thus every triple has been covered, the coverage is equal to 1. Since the concepts are small general diversity is rather high. Still, the set diversity depends on the size of the corresponding set: the smaller the set -the greater the chance of intersection and the lower the diversity.</p><p>Examples of the triconcepts for the IMDB context: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>We compared several different triclustering approaches and showed that there is no algorithm-winner with respect to the considered criteria. Also, we can conclude that either (dense) prime OAC-triclustering or TriBox is a good alternative for TCA approach because the total number of triclusers for real data example is drastically less than the number of triconcepts. The proposed algorithm has a good scalability on real-world data and shows acceptable noise-tolerance level. Probably investigated spectral hierarchical partitioning of ternary relations can be a good alternative of concept-based triclustering as a tool for fast exploratory (preliminary) analysis.</p><p>Our further work on triclustering will go in the following directions:</p><p>-developing a unified theoretical framework for n-clustering, -mixing several constraint-based approaches to triclustering (e.g., mining dense triclusters first and then frequent tri-sets in them), -finding better approaches for estimating tricluster's density, -taking into account the nature of real-world data for optimization (their sparsity, value distribution, etc.). -investigation of the existing approaches and developing their extensions to triadic numerical data for comparison purposes, -applying triclustering in recommender systems and social network analysis.</p><p>The lattice is required for the computation and the present lattice of input data before the introduction of new objects would be required for the update of the lattice when adding the objects. However, that lattice can be large, the application may not store it (it can be even impossible due to space requirements) or it can be stored at different (presentation) place than the computation place, or there can be other drawbacks and difficulties of keeping the whole lattice. Moreover, handling of the other changes of input data like deletion or alteration (i.e. changing of values of attributes) of existing objects would call for more or less (depending on the particular algorithm) extensive modifications of the incremental algorithm.</p><p>In the following we propose efficient algorithm for updating the concept lattice, i.e. computing the lattice changes resulting by input data changes, from the present (already processed) and new objects only, not requiring the concept lattice of present objects. The algorithm results as a modification of Kuznetsov's Close-by-One (CbO) algorithm <ref type="bibr">[8]</ref><ref type="bibr">[9]</ref><ref type="bibr">[10]</ref> for computing the set of all formal concepts or any of its recent derivatives including FCbO <ref type="bibr">[14]</ref>, PCbO <ref type="bibr">[7]</ref> or PFCbO <ref type="bibr">[6]</ref>. When introducing new objects to input data the modified algorithm computes and outputs the resulting new and modified formal concepts only and the respective changes in the lattice order relation (pairs of formal concepts to be created or deleted). Note that (1) new formal concept here is a concept in new data with (some of the) introduced objects in its object set (extent) and attribute set (intent) not equal to intent of any concept in the data before the update and modified formal concept is a concept in new data with the same intent as some existing concept in data before update and enlarging its extent by (some of the) introduced objects, other formal concepts in new data are called old; (2) since the concept lattice (before update) is not required by the algorithm the computed changes in the lattice order relation are output only and have to be applied where the (part of the) lattice is stored and (3) introducing new objects to input data cannot result in removal of formal concepts from the concept lattice <ref type="bibr">[4,</ref><ref type="bibr">15]</ref>. Moreover, considering instead the new objects to be some of the objects of input data to be deleted from the data, the present objects to be the set of objects of input data after the deletion and the computed formal concepts to be resulting concepts to remove or modify together with the "inverse" changes of the lattice order relation, we have easily handled also the change of input data consisting of deleting existing objects. The change by altering objects can be handled by first deleting the objects and then by introducing the altered objects, interpreting the output formal concepts accordingly. Finally, changes of input data by introducing new and deleting or altering existing attributes are completely analogical and can be handled (better than by altering objects) by an algorithm re-described with objects and attributes switched or by the present algorithm with objects and attributes switched in input data (transposed data) and in output formal concepts.</p><p>The algorithm is described in Section 2, for the case of changing input data by introducing new objects, including an illustrative example. In Section 3 we present an experimental evaluation of performance of the algorithm and a com-parison with AddIntent algorithm <ref type="bibr">[12]</ref>, which is considered one of the up-to-date most efficient incremental algorithms for computing concept lattice.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">The algorithm</head><p>We describe the algorithm as a modification of Fast Close-by-One (FCbO) algorithm <ref type="bibr">[14]</ref>, as it happens to be one of the up-to-date most efficient (sequential/serial) derivatives of CbO <ref type="bibr">[5]</ref>. In essence, the modification equally applies also to other CbO derivatives and CbO itself. A deep knowledge of FCbO is not required in the description, however, basic knowledge is beneficial. The modification consists of two parts: (1) computing new and modified formal concepts only when introducing new objects to input data and (2) determining changes in the lattice order relation. We describe the parts separately in Sections 2.1 and 2.2.</p><p>In the descriptions below we assume the reader is familiar with basics of FCA, see <ref type="bibr">[2,</ref><ref type="bibr">3]</ref> for reference. Input object-attribute data (formal context) is denoted by the triplet X, Y, I , with assumed finite nonempty sets of objects X = {0, 1, . . . , m} and attributes Y = {0, 1, . . . , n}, and I ⊆ X × Y being an incidence relation with x, y ∈ I saying that object x ∈ X has attribute y ∈ Y . Concept-forming operators defined on I as usual <ref type="bibr">[3]</ref> are denoted by ↑ I : 2 X → 2 Y and ↓ I : 2 Y → 2 X , B(X, Y, I) denotes the set of all formal concepts in I and ≤ the partial order relation on B(X, Y, I) forming together a concept lattice.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">New and modified concepts</head><p>In this section we describe how to compute new and modified formal concepts when introducing new objects to input data. Let us suppose we are introducing to input data X, Y, I (finite nonempty set of) new objects X N = {m + 1, . . . , m } not present in X (X N ∩ X = ∅), sharing (finite nonempty set of) attributes Y N = {i, . . . , k}. We do not assume any overlap of Y N and Y (Y N can contain new attributes not present in Y ) but in usual scenario of introducing new objects to input data we have Y N ⊆ Y . Denote the incidence relation between X N and Y N by N ⊆ X N × Y N and the new input data with new objects added by the triplet X , Y , I , where</p><formula xml:id="formula_426">X = X ∪ X N = {0, . . . , m }, Y = Y ∪ Y N = {0, . . . , n }, n = k if k &gt; n and n = n otherwise, and I ⊆ X ×Y such that I ∩(X ×Y ) = I, I ∩ (X N × Y N ) = N and I ∩ (X × (Y N \ Y )) = I ∩ (X N × (Y \ Y N )) = ∅.</formula><p>Hence I is the union of I and N both extended to X and Y .</p><p>First, observe that attributes of Y N which are not shared by any of objects X N cannot participate in any new nor modified formal concept of B(X , Y , I ), with the exception of formal concept Y ↓ I , Y . Hence we will assume in the following, without loss of generality, that all attributes of Y N are shared by at least one object from X N . For an algorithm for computing new and modified formal concepts only it is then sufficient to process only attributes Y N . Now, for any B = B ↓ I ↑ I ⊆ Y N , if B = B = B ↓ I ↑ I then the formal concept A , B ∈ B(X , Y , I ) with the same intent B = B as formal concept A , B ∈ B(X, Y, I) is a modified formal concept enlarging the extent of The procedure accepts as its arguments a formal concept A, B (an initial formal concep t), an attribute y ∈ Y N (first attribute to be processed) and a set {N y ⊆ Y | y ∈ Y } of subsets of attributes Y (see <ref type="bibr">[14]</ref> for the meaning of the set), and uses local variables queue as a temporary storage for computed formal concepts and M y (y ∈ Y ) as sets of attributes which are used in pl ace of the third argument for further invocations of the procedure. After invocation, the procedure recursively descends through the space of new and modified formal concepts of X , Y , I resulted by adding new objects X N described by attributes Y N to X, Y, I .</p><p>When invoked with A, B and y ∈ Y N (first attribute to be processed) and</p><formula xml:id="formula_427">{N y | y ∈ Y }, UpdateFastGenerateFrom first checks if (A ∩ X) ↑ I equals B (line 1</formula><p>), in which case, if further (A∩X) ⊂ A (line 2), A, B is a modified formal concept (see above) and it is listed as such. In the other case, A, B is a new formal concept. Then the procedure behaves exactly as the original procedure FastGenerateFrom, see <ref type="bibr">[14]</ref> for full description, with the exception that it goes through attributes j ∈ Y N only (line 13). Let us recall that the set Y j ⊆ Y is defined by</p><formula xml:id="formula_428">Y j = {y ∈ Y | y &lt; j}.</formula><p>In order to list all new and modified formal concepts of X , Y , I which are not formal concepts of X, Y, I , each of them exactly once, we invoke Up-dateFastGenerateFrom with ∅ ↓ I , ∅ ↓ I ↑ I , y being the first attribute in Y N and {N y = ∅ | y ∈ Y } as its initial arguments. The correctness of Algorithm 1 follows from the correctness of FCbO algorithm <ref type="bibr">[14]</ref> and the above description of its modification.</p><p>Example 1. We illustrate Algorithm 1 on the following example. Consider an input data given in an usual way (rows correspond to objects, columns to attributes and table entries indicate whether an object has an attribute) by the upper part, rows 0 to 2, of the table depicted below (left). The data induces 8 formal concepts C 1 to C 8 depicted on the right.</p><formula xml:id="formula_429">I 0 1 2 3 4 5 0 × × × 1 × × × × 2 × × × 3 × × × 4 × × × × C1 = {0, 1, 2}, ∅ , C5 = {0}, {0, 2, 3} , C2 = {0, 2}, {0} , C6 = {1, 2}, {1, 5} , C3 = {2}, {0, 1, 5} , C7 = {1}, {1, 3, 4, 5} , C4 = ∅, {0, 1, 2, 3, 4, 5} , C8 = {0, 1}, {3} . C * 1 = {0, 1, 2, 3, 4}, ∅ , C * 6 = {1, 2, 3}, {1, 5} , C * 2 = {0, 2, 4}, {0} , C11 = {1, 3}, {1, 3, 5} , C * 5 = {0, 4}, {0, 2, 3} , C * 8 = {0, 1, 3, 4}, {3} , C9 = {4}, {0, 2, 3, 5} , C12 = {1, 3, 4}, {3, 5} , C10 = {2, 4}, {0, 5} , C13 = {1, 2, 3, 4}, {5} .</formula><p>Now we introduce to the data two new objects represented by rows 3 and 4 of the lower part of the table. The introduction results in induction of 5 new formal concepts C 9 to C 13 and 5 modified formal concepts C * depicted below the old formal concepts. The concepts are listed down-right in order in which they are listed by procedure UpdateFastGenerateFrom.</p><p>Remark 1. Algorithm 1 can be easily used to list all formal concepts of input data X , Y , I incrementally, i.e. processing the data object by object, as incremental algorithms for computing concept lattice do. Namely, we invoke procedure UpdateFastGenerateFrom with initial arguments repeatedly for each object i ∈ X = {0, . . . , n }, setting X, Y, I := {0, . . . , i − 1},</p><formula xml:id="formula_430">i−1 j=0 {j} ↑ I , I ∩ ({0, . . . , i − 1} × i−1 j=0 {j} ↑ I ) , X N := {i}, Y N := {i} ↑ I and N := X N × Y N</formula><p>for each invocation, and filter out listed modified formal concepts listing new formal concepts only. Such a computation of all formal concepts of data is, however, quite inefficient due to many repeated (though efficient) computations of formal concepts listed as modified by procedure UpdateFastGenerateFrom, see the performance evaluation in Section 3. The concepts are, moreover, filtered out from the listing but, however, necessary to compute in order to decide whether a concept is new or modified. Incremental algorithms iterate over (so far) incrementally computed and stored concept lattice to decide and compute new formal concepts which is more efficient. On the other hand, as discussed in introduction Section 1, the concept lattice is required for the computation and must be stored by the incremental algorithms, while Algorithm 1 requires input data only/instead and does not need to store anything.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Lattice order relation</head><p>In this section we describe how to determine the changes in the concept lattice order relation which need to be done with the addition of new formal concepts to the lattice. Note that the modified formal concepts cannot raise a change in the relation since attribute set (intent) of a modified concept remains unchanged with introduction of new objects to input data, as discussed above.</p><p>In order to determine the changes in concept lattice order relation by the modified FCbO algorithm introduced in previous Section 2.1, we first have to determine the concept lattice order relation alone since the FCbO algorithm, as well as the modification, computes the set of formal concepts of input data only. So, in the following, we describe an extension of Fast Close-by-One (FCbO) algorithm <ref type="bibr">[14]</ref> to determine the concept lattice order relation ≤ on the set of all formal concepts B(X, Y, I) of input data X, Y, I computed by the original algorithm, i.e. making an algorithm for computing concept lattice of X, Y, I . In fact, we will not determine the whole order relation but rather its cover relation. Recall that the cover relation on B(X, Y, I) for ≤ is defined such that a formal</p><formula xml:id="formula_431">concept A 2 , B 2 covers a formal concept A 1 , B 1 if A 1 , B 1 ≤ A 2 , B 2 and there is no formal concept A 3 , B 3 distinct from both A 1 , B 1 and A 2 , B 2 such that A 1 , B 1 ≤ A 3 , B 3 ≤ A 2 , B<label>2</label></formula><p>, i.e. the cover relation is the transitive reduct of ≤. And since we do not store and use the computed concept lattice in our algorithm for updating the lattice, we will not store and use the computed formal concepts nor the concept lattice order cover relation in the extended FCbO algorithm as well. Besides listing the formal concepts, we will only list the pairs of formal concepts to be created or deleted in the relation at the place where it is stored.</p><p>We now describe how to extend FCbO algorithm, as described in <ref type="bibr">[14]</ref>, to determine the concept lattice order cover relation on the set of computed formal concepts, i.e. to compute concept lattice. We can use the pseudocode in Algorithm 1 if we look apart from the modifications to FCbO introduced there (the check whether A, B is new or modified formal concept between lines 1 and 6 and going through attributes from Y N only at line 12), in which case we obtain the original procedure FastGenerateFrom from <ref type="bibr">[14]</ref>. We will need a little knowledge of FCbO (or CbO) now. The algorithm, see the pseudocode of procedure UpdateFastGenerateFrom, computes a formal concept C, D = A ∩ {j} ↓ , (A ∩ {j} ↓ ) ↑ (lines 14 and 15) from a formal concept A, B for all attributes j ∈ Y such that y ≤ j ≤ n which are not present in B (lines 12 and 13). Certainly C, D ≤ A, B . If C, D passes the canonicity test (line 16) and is listed we list the pair C, D , A, B as to be created in the cover relation in spite of that the formal concepts in it need not fulfill the definition of cover relation. We do it since a test for the fulfilment would be too expensive compared to that in the case of nonfulfilment we will list the pair later again as to be deleted from the relation.</p><p>Next, since further formal concepts C ∩ {j } ↓ , (C ∩ {j } ↓ ) ↑ are computed from C, D in the next recursive invocation of(Update)FastGenerateFrom for attributes j ≥ j + 1 (j + 1 is passed in y argument in the invocation, line 20), in order to list pairs E, F , C, D to be created in the cover relation, we determine formal concepts E, F = C ∩ {i} ↓ , (C ∩ {i} ↓ ) ↑ for all attributes j − 1 ≥ i ≥ 0 (which are not present in D). Due to the order in which formal concepts are computed by FCbO, formal concepts E, F were already computed (and listed) in some of the previous stages of the algorithm before the computation of C, D . However, since formal concepts are not stored in FCbO nor in our extension, we have to compute the concepts E, F repeatedly. Again, formal concepts E, F , C, D in the pairs need not fulfill the definition of cover relation. Here, however, we can use a cheap test known from Lindig's NextNeighbor algorithm <ref type="bibr">[11]</ref>, but limited to attributes 0, . . . , j − 1 ∈ Y . The test is based on the fact that a formal concept <ref type="bibr">[11]</ref>). If the test passes, we list the pair E, F , C, D as to be created in the cover relation. We do it even for formal concepts in the pair which pass the test and do not fulfill the definition of cover relation due to the limitation of the test to attributes 0, . . . , j − 1 ∈ Y for the same reason as above for pairs C, D , A, B . To resolve these cases we simply, together with listing the pair E, F , C, D , list as to be deleted from the relation the pair E, F , A, B which does not fulfill the definition of the relation and could have been listed as to be created in the cover rela-tion in this or the previous stage (previous recursive invocation of procedure (Update)FastGenerateFrom) of the extended algorithm. The justification of this and that all such pairs will be listed as to be deleted from the cover relation is postponed to the full version of the paper.</p><formula xml:id="formula_432">C, D = Y ↓ , Y covers a for- mal concept E, F = C ∩ {i} ↓ , (C ∩ {i} ↓ ) ↑ , i ∈ D iff (C ∩ {k} ↓ ) ↑ = F for all attributes k ∈ F \ D (cf. Theorem 1 in</formula><p>The modified procedure LatticeFastGenerateFrom, which implements the above presented ideas to procedure FastGenerateFrom to extend FCbO algorithm to determine the concept lattice order cover relation on the set of formal concepts computed by FCbO, i.e. to compute concept lattice, is depicted in Algorithm 2. As with the procedure UpdateFastGenerateFrom in Section 2.1, we describe only the modifications introduced to FastGenerateFrom.</p><p>The original FCbO algorithm remains in essence intact, including its arguments and local variables, all the modifications to original procedure FastGen-erateFrom are in the computed formal concept C, D processing part before the recursive call of the procedure (line 28), between lines 16 and 29. First note that the listing of C, D moved from the beginning of the procedure (see Algorithm 1) here, resulting effectively in the need to list the formal concept passed in the initial invocation of the procedure before the invocation. Note also that this move does not change the order of listed formal concepts. Then, after listing the pair C, D , A, B as to be created in the cover relation, between lines 18 and 27, formal concepts E, F = C ∩{i} ↓ , (C ∩{i} ↓ ) ↑ , i ∈ D covered by C, D are re-computed (lines 20 and 21) and listed in pairs E, F , C, D as to be created in the cover relation, for attributes j − 1 ≥ i ≥ 0. The test of covering (line 23) is performed using the min local variable in a slightly modified form borrowed from the original description of Lindig's NextNeighbor algorithm in <ref type="bibr">[11]</ref>. With listing of E, F , C, D , the pair E, F , A, B is listed as to be deleted from the cover relation as discussed above.</p><p>In order to output concept lattice of X, Y, I , that means to list all formal concepts of X, Y, I , each of them exactly once, together with all pairs of formal concepts to create or delete (if the pair exists) in order to obtain the cover relation of concept lattice of X, Y, I , each pair of formal concepts in the cover relation listed exactly once, we first list ∅ ↓ , ∅ ↓↑ and then invoke Lat-ticeFastGenerateFrom with ∅ ↓ , ∅ ↓↑ , y = 0 and {N y = ∅ | y ∈ Y } as its initial arguments. The correctness of Algorithm 2 follows from the correctness of FCbO algorithm <ref type="bibr">[14]</ref> and the above description of its extension. Determination of changes in (the cover relation of) concept lattice of X, Y, I needed to be done in reaction to the introduction of new objects to input data is then a matter of merging the Algorithms 1 and 2. In addition to that we list, for each new formal concept C, D computed from formal concept A, B (or C, D = ∅ ↓ I , ∅ ↓ I ↑ I ) and its generator E, F = C ∩ X, (C ∩ X) ↑ I , with listing of C, D also pairs F ↓ I , F , C, D as to be created in the cover relation and F ↓ I , F , A, B as to be deleted from the cover relation. The pairs will then not be listed in the extension introduced in procedure LatticeFast-GenerateFrom. Due to space limitations of the paper, the merged algorithm is postponed to the full version of the paper.</p><p>Next (to the right) to the lattice there is then the concept lattice and below the listing of the 8 formal concepts the listing of the 5 new formal concepts C 9 to C 13 and changes in the cover relation after the introduction of the two new objects to the data. The changes are depicted in bold face in the lattice and the listing of concepts and pairs of concepts in the changes are again listed down-right in order in which they would be listed by a procedure describing the merged algorithm. •|X|), because when "introducing" all objects to empty data it actually performs FCbO. The complexity of Algorithm 2 is in the worst case |Y | factor higher but on average it performs a constant factor slower than FCbO (and ramification of the worst-case time complexity of FCbO itself remains a challenging open problem <ref type="bibr">[14]</ref>).</p><p>We have run several experiments to evaluate the performance of Algorithms 1 and 2 and also the merged algorithm. For listing all formal concepts or concept lattice of input data we also compared the algorithms with AddIntent incremental algorithm <ref type="bibr">[12]</ref> for computing concept lattice. In the comparison, we also run Algorithm 1 and the merged algorithm in the way processing input data incrementally as mentioned in Remark 1, for the sake of presenting more fair comparison with true incremental algorithm, though such usage of our algorithms is not efficient (as mentioned in the remark).</p><p>In the experiments, we used our implementations of the presented algorithms in ANSI C, which are modifications of our (performance efficient) FCbO algorithm implementation used for performance evaluation in <ref type="bibr">[14]</ref>, while the implementation of AddIntent algorithm was borrowed from one of the authors of <ref type="bibr">[12]</ref>.  The experiments were run on otherwise idle 32-bit i386 hardware (2× Intel Xeon 3.2 GHz, 3 GB RAM) and we were interested in the performance of all algorithms measured by running time. We have run the algorithms on synthetic randomly generated data with various size and percentage of ×s in the table (fill ratio, with normal distribution) as well as with three selected real benchmark datasets from the UCI Machine Learning Repository <ref type="bibr">[1]</ref>.</p><p>In the first set of experiments we evaluated Algorithm 1 for updating the set of all formal concepts (computing new and modified concepts) when introducing new objects to input data. The performance for introducing a single new object (with randomly generated attributes) to random data with 100000 objects is illustrated in Figure <ref type="figure" target="#fig_0">1</ref>. The graphs show the dependency of time required to compute the update on the number of attributes, of data with fixed table fill ratio 5 % (the graph on the left) and on the fill ratio of tables with fixed 150 attributes (the graph in the middle). Figure <ref type="figure" target="#fig_0">1</ref> (right) then illustrates the performance for introducing a growing number of new objects to random data with the number of objects being 100000 minus the number of the new objects, 200 attributes and 5 % table fill ratio. Note that the number of new objects in the graph is in logarithmic scale. The illustration for the benchmark datasets, of the performance of introducing a growing number of last objects of the data to the data without the objects, is presented in Figure <ref type="figure" target="#fig_1">2</ref> (right). In the graph the solid line is for data with objects ordered as in the original dataset and the dashed line is for data with randomly ordered objects (the time is an average from three orderings).</p><p>We can see from the graphs showing the performance of updating the set of all formal concepts when introducing a single new object to the data (Figure <ref type="figure" target="#fig_0">1</ref>,  left and middle) that this operation is extremely fast compared to computing all formal concepts which took 7061 seconds for 500 attributes and 355 seconds for fill ratio 10 %! The reason is of course computing only a bare fraction of new and modified formal concepts among all concepts. Introducing more new objects (Figure <ref type="figure" target="#fig_0">1</ref>, right, and Figure <ref type="figure" target="#fig_1">2</ref>) is much faster too, up to a limit of the number of new objects depending on the total number of objects in data and then being close to the time of computing all formal concepts (compare for benchmark datasets with FCbO times in Table <ref type="table" target="#tab_0">1</ref>). Note also that running times for mushroom dataset differ for original and random orderings of objects.</p><p>In the second set of experiments we evaluated Algorithm 2 for determining the cover relation of concept lattice of input data. The performance for random data is illustrated in Figure <ref type="figure" target="#fig_7">3</ref>. The graph on the left shows the dependency of required time on the number of attributes, of data with 10000 objects and fixed table fill ratio 5 %, the graph in the middle shows the dependency on the fill ratio of tables with 1000 objects and fixed 100 attributes. The graphs show also the comparison with AddIntent algorithm and the original FCbO algorithm; the solid line is for Algorithm 2, the dashed line is for AddIntent and the dotted line is for FCbO. The performance for the benchmark datasets is presented in Table <ref type="table" target="#tab_0">1</ref>. Again, the times are given for data with objects ordered as in the original dataset and for data with randomly ordered objects (the time is an average from three orderings), and we also put information on size, fill ratio and the number of all formal concepts for each dataset.</p><p>From the graphs we can see that Algorithm 2 considerably outperforms AddIntent algorithm on synthetic random data (in particular for higher fill ratio of data table), while for real benchmark datasets this must not always be the case (T10I4D100K, closely mushroom). This, however, heavily depends on the concept lattice structure (size of the cover relation) of the datasets. We can also Finally, the comparison of performance of Algorithm 1 and the merged algorithm with AddIntent, of computing the set of all formal concepts or concept lattice when processing input data incrementally as mentioned in Remark 1, is presented in Figure <ref type="figure" target="#fig_7">3</ref> (right) and Table <ref type="table" target="#tab_2">2</ref>. The graph shows the performance for the data with 10000 objects and fixed table fill ratio 5 % from the preceding evaluation of Algorithm 2 (the time is an average from three random orderings of objects); the solid line is for the merged algorithm, the dashed line is for AddIntent and the dotted line is for Algorithm 1. In the table we also put, for our algorithms, for the sake of comparison, the numbers of formal concepts computed in total (for original ordering of objects in datasets).</p><p>The results are really interesting here. For the real benchmark datasets AddIntent algorithm significantly outperforms our algorithms, see Table <ref type="table" target="#tab_2">2</ref>. This was expected since, as hinted by Remark 1, the algorithms are not designed and ment to be used as incremental algorithms (processing objects one by one). What is, however, very surprising is that on synthetic random data both Algorithm 1 and the merged algorithm considerably outperform AddIntent and, moreover, computing concept lattice (determining cover relation) takes just a little more time than computing the set of formal concepts only. It seems that the usage of the algorithms as incremental algorithms, after all, deserves more attention!</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>We have introduced algorithms for updating the set of all formal concepts of object-attribute relational data when the data change (new objects or attributes are introduced or existing are deleted or altered) by computing only new and modified formal concepts and for determining the concept lattice order relation, i.e. computing concept lattice of the data. Together the algorithms form an algorithm for updating concept lattice of object-attribute data from the data only, not requiring the possibly large concept lattice computed before the update as the so-called incremental (update) algorithms do. The algorithms result as modification or extension of FCbO algorithm for computing the set of all formal concepts of data and the modifications can be equally applied to any other recent algorithms (PCbO, PFCbO) derived from Kuznetsov's CbO algorithm. The experimental evaluation of performance of the algorithms have shown that the update is performed by the first algorithm significantly faster than re-computing all formal concepts or whole concept lattice and that the second algorithm is performance comparable to incremental algorithms for computing concept lattice.</p><p>The future research will be focused on further experimental and real-world application use evaluation of the algorithms and performance comparison with other incremental (update) algorithms for computing concept lattice. This section discusses the basis for creating a taxonomic classification network. The first subsection notes that a disciplinary taxonomist provides the a priori categories for the taxonomy. This subsection also provides examples of categories for two kinds of Earth science data. These categories depend on the disciplines providing the data. Thus, this paper treats them as axiomatic. The second subsection provides a formal discussion of the AIC and AIU data structures. The third subsection deals with a rough scaling analysis of a taxonomic network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">The Axiomatic Disciplinary Basis for a Taxonomy</head><p>The a priori basis for creating a taxonomy for an archive's collection lies in the scientific disciplines that produce the IO's. As with the OAIS RM, we assume that the IO's are atomic so they have no internal components that the archive records. In Earth science, IO's may be physical objects, such as biological or geological specimens. They may include hand-written or printed observational records or technical reports. Finally, Earth science IO's may be digital files, the bulk of which contain numerical values based on measurements from automated instruments.</p><p>A second axiomatic basis is the Formal Context (FC) formed by all the IO's in the archive. The union of the IO's forms the extent of this FC. Its intent is the union of all the IO attributes.</p><p>The NOAA Emergency Response Imagery Collection is an archive of digital images taken by an automated camera mounted on an aircraft <ref type="bibr">[2]</ref>. The aircraft flew one or two days after disastrous storms. There have been about twenty storms in the last decade that were disastrous enough to lead to aircraft missions. These included Hurricane Katrina in 2005 and Hurricane Sandy in 2012. Each mission produces three kinds of IO's: high resolution gif images, low resolution gif thumbnails, and zipped files containing collections of images. The archive's curators organize the images in a zipped file in a sequence along an aircraft flight path.</p><p>The ERI project provides a web site through which emergency responders, such as federal disaster coordinators or insurance adjustors can download IO's. These users evaluate the storm damage and plan appropriate action based on the images. Altogether, the total collection probably contains about 60,000 IO's. Each IO has an ID, a storm name, a data collection date, and a text storm centroid location. The high resolution and thumbnail gif's have four latitude/longitude positions at the corners of each image. With eleven attributes for most of the files, there will be about 660,000 attributes (11 × 60, 000) in the Formal Context intent for this collection's IO's.</p><p>In the taxonomic network, the AIC's that lie in the first level below the root refer to images from specific storms. Thus, these collections include images from storms such as Hurricanes Katrina, Ike, or Sandy. In the level below that, each storm AIC has two collections. One is an AIC for a collection of images in coarse geographic bins. Those images include the high-resolution gif images and the thumbnails. The second AIC is a collection of zipped files along the flight paths. The AIC's that are children of each geographic bin AIC contain AIC's with one high resolution image and one low-resolution image. The AIC's below the one with the flight path collection contain AIU's based on an individual flight path. The network replicates this layered AIC structure across the entire collection of IO's. Even so, each PFC is unique.</p><p>For biological specie classification, the categories for the AIC's are Kingdoms, Subkingdoms, Classes, Orders, Families, Genera, Species, and Races. The individual specimens in an archive's biological specimen collection are the IO's in the AIU's.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">A Formal Definition of AIC's and AIU's</head><p>A disciplinary taxonomist creates AIP's and AIU's. This is a familiar process in biology. <ref type="bibr">[3] [p. viii]</ref> notes that such a "grouping . . . though based on natural characters and relationships is not governed by any rule drawn from nature for determining just what [. . .attributes] shall be sufficient to constitute a Specie, a Genus or a Family. These groups are, therefore, necessarily more or less arbitrary and depend upon the judgement of scientific experts."</p><p>The AIC's and AIU's are vertices in a graph. The pseudo code in the Taxonomy Network Data Structure provides a pointer-based formalization of the relationship between the AIC's and the AIU's. If all of the PFC's in the graph were diagonal, each object in the PFC would have only one unique attribute. The taxonomic graph would collapse to a tree. There would be a unique edge that linked each AIC to each of its children. When the parent PFC is not diagonal, the formal concepts formed from the PFC create a lattice that links parents to their children. For a taxonomic network, the lattice must provide a unique path from a parent to each of its children. would need to match the attributes of her sample against the standard attributes that identify the particular specie within a probable Genus.</p><p>The search behavior of a disciplinary specialist differs markedly from that of an individual with an unclear target for his or her search. A person browsing needs a recommender site rather than a navigational one <ref type="bibr">[4]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">User-Guided Navigational Searches</head><p>The taxonomic classification approach expects that a user can identify a useful IO based on the taxonomy network traversal. If the user obtains his or her goal, then the search terminates successfully. If the user recognizes that the search is not likely to reach the target, he or she can back up to a higher level and make different selections. Thus, we expect the user search to be iterative. In addition, the user can get tired of searching and terminate the interaction. The following pseudo code outlines the search algorithm. The user-guided navigational search algorithm outlined in the pseudo code starts at the root AIP. The loop moves down the taxonomic AIP graph from the root at Level 0 to deeper levels where the user can find the desired target IO. The first step for the user is to prune the selected AIP attributes to create a pruned formal context. In pruning, the user removes attributes regarded as irrelevant to finding the target IO. Pruning the static Formal Context removes the irrelevant columns and thereby produces a smaller Formal Context. The pruning also removes any rows that contain no objects after removal of the attribute columns. The pseudo code for the NSN subalgorithm provides the logic for lines 5 and 6 of this listing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>User-Guided Navigational</head><p>Nearest Superset Navigation (NSN) Subalgorithm </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>This paper shows how a taxonomic classification with FCA can fit within the OAIS RM's standard structure for information packages in an Archive of Earth science data. The scaling analysis of the computational load of user-guided navigation and dynamic FCA needs refinement. Even so, it suggests that this approach is affordable. <ref type="bibr">[2]</ref> shows that a navigational approach similar to one derived from this algorithm offers an alternative to the conventional metadata query approach for selecting IO's from an archive of Earth science data. concepts result from this noise, (2) experts are not satisfied with the resulting knowledge model and wish it to be more in accordance with their needs, i.e. the application that will use the knowledge model.</p><p>The rest of the paper is structured as follows. Firstly, section 2 explains how the system and experts collaborate in building and changing the lattice, illustrates the approach by removing a concept from a lattice. Next, section 3 presents experimental results. Finally, section 4 concludes with a summary and draws perspectives.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Collaboration for Changing A Lattice</head><p>In our approach, experts do not have access to the formal context; they can browse concepts, run through subsumption paths, look at extents and intents of concepts. Then, they express their wishes to change the lattice using operations. An operation on the lattice is a kind of retro-engineering: experts select an operation on the lattice (ex: remove this concept), the system assesses the impact of the change, suggests different strategies and then, for the chosen strategy, calculates what to change in data for the new lattice to meet the requirements. The lattice is then built accordingly. Experts repeat the process until they reach an agreement between the model and their knowledge.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Defining Operations on a Lattice</head><p>We list basic changes on a lattice to add or remove one element from the lattice (Table <ref type="table" target="#tab_0">1</ref>). There could be more complex operations such as merging two concepts into one, splitting one concept into two sub-concepts, creating a common concept for a set of concepts... For each operation, we need to define an algorithm to compute the set of possible strategies to perform the change, to identify related changes in the lattice, to rank them according to a cost function and to keep a trace in a history. Adding or removing objects or properties in a formal context motivated the development of incremental algorithms to update a lattice <ref type="bibr">[6]</ref><ref type="bibr">[7]</ref><ref type="bibr">[8]</ref><ref type="bibr">[9]</ref>. Concept removing is somehow complex: several strategies are possible and impacts on other concepts in the lattice (side effects). We detail this operation to explain our approach in the next part.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Removing a Concept from a Lattice</head><p>Removing a concept while keeping the lattice structure means moving it down to one of its children or up to one of its parents. These solutions correspond to what we call different strategies.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Object</head><p>Add an object to a lattice Remove an object from a lattice Add an object to a concept Remove an object from a concept Attribute Add an attribute to a lattice Remove an attribute from a lattice Add an attribute to a concept Remove an attribute from a concept Add an attribute to an object Remove an attribute from an object Concept Add a concept to a lattice Remove a concept from a lattice Add a supper concept to a concept Remove a supper concept from a concept Add a sub concept to a concept Remove a sub concept from a concept  We benefit from incremental algorithms that have been implemented to build lattices ( <ref type="bibr">[6]</ref>, <ref type="bibr">[8]</ref>) not only to avoid complete recalculation of the lattice but also for identifying the different possible strategies to perform a given change in the current lattice. Incremental algorithms, at the i th step, produce the concept set or diagram graph for i first objects of the context. The new object i + 1 th is dynamically added by modifying the existing lattice without recomputing the whole lattice from scratch. ( <ref type="bibr">[8]</ref>)</p><p>Let us explain our approach through the algorithm for moving concept down -Strategy 1. In Strategy 1, the set of objects and the set of properties remain unchanged. Only the relation I is enriched. Moreover, a new closed set (Extent(C), Intent(C child )) is a formal concept of the new lattice L * .</p><p>From the new closed set (Extent(C), Intent(C child )) and the existing lattice L, we generate the new lattice L * by identifying the categories of concepts. The new lattice is obtained from the existing lattice by taking, deleting or modifying some concepts and creating new concepts. Thus, concepts are classified into four Finally, all the strategies are suggested to the expert with their impacts (Table <ref type="table" target="#tab_2">2</ref>) so that the expert can consider choosing one strategy. Once the expert makes a choice, the system will update the lattice accordingly.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Experiment of Removing A Concept</head><p>We experimented our approach for extracting knowledge from a real text corpus of Fibromuscular Dysplasia extracted from PubMed<ref type="foot" target="#foot_73">1</ref> . The corpus consists of 400 texts.</p><p>In the preprocessing step, we used SemRep ( <ref type="bibr">[11]</ref>) to annotate the texts. 2402 annotation objects were identified from the corpus, of which only 668 objects are shown in the right or left side of a triplet relationship and 481 objects on the right side. 36 different relationships are identified in these texts. Given an annotation (object1, relationship, object2), we consider object1 as an object and the name of the relation is concatenated with object2 to become a binary attribute of object1. For example, Fibromuscular Dysplasia is an object and ISA Disease is one of its attributes. SemRep annotation process can be noisy but, of course, no automatic tool is perfect. Moreover, any annotation process could annotate the texts, including manual annotation. This is one of our goals to take the advantage of expert interaction in the construction of the knowledge model.</p><p>Next, we built a Java script to transform the set annotations into a formal context. The lattice was produced by Galicia<ref type="foot" target="#foot_74">2</ref> and exported as the XML document. The context built from our corpus contains 481 objects, 545 attributes formed by the association of the relationship of the object with which it relates. The lattice contains 523 concepts and the longest path from the Top to the Bottom is 7.</p><p>Then, we implemented a system with operation removing a concept from a lattice. When an expert, during the evaluation phase, asks for removing a concept, the system suggests a list of strategies and makes explicit their impacts on the lattice (lists of modified, deleted and new concepts) to the expert. Once the expert chooses one strategy, the system will update the lattice accordingly.</p><p>The required time for the expert to remove concepts has not yet been evaluated. Our experience shows that a judicious choice of a strategy in order to remove concepts has a strong impact on the speed of convergence towards a satisfactory knowledge model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion and Perspective</head><p>We presented a collaborative approach for FCA-based knowledge extraction. Our study shows how domain experts and machines can collaborate in building and changing a lattice. The system handles changes in a lattice and keeps a trace from the previous lattice. In that way, experts know the impact of a change. Our iterative and interactive approach takes advantage from FCA and reduces limitations due to the use of a formal method to model a complex cognitive process.</p><p>This approach opens several perspectives. We can do more to help the expert. Refining the cost function associated to changes can make easier the choice of one strategy. Tagging concepts that the expert agrees with and wants to keep unchanged all along the process could reduce the number of the suggested strategies. Performing several changes at once needs also more investigations.</p><p>represents derivative in the formal context T = (U RL, Key, F ). Recall that U RL Sh&amp;Ga = {Shilov, Garanina} in K G , U RL Gr = {Grebeneva} in K Y . So we can not write the following equality U RL Sh&amp;Ga\Gr = {Shilov, Garanina} \ {Grebeneva} , but have to write another one U RL Sh&amp;Ga\Gr = {Shilov, Garanina} ↓F \ {Grebeneva} ↓S ↑T ↓T , where '↓ F ' represents the lower derivative in the context F, '↓ S ' -the lower derivative in the context S, and '↓ T ' and ' ↑ T ' -the lower and upper derivatives in the context T. We believe that it would be nice to process queries like this one but (unfortunately) modern search engines can not do it; a part of the reason for this inability is due to lack of theory for processing such multi-context queries.</p><p>At the same time polymodal and/or descriptive logics (DL) <ref type="bibr">[1]</ref> provide language for presentation of queries as above. In particular, if T d denotes the inverse of the binary relation T , then Sh&amp;Ga \ Gr may be represented in syntax of a polymodal logic by the following formula An interpretation of FCA constructs in DL has been studied in <ref type="bibr">[7]</ref>. In these studies DL has been extended by FCA-derivatives and provided with Kripke semantics; as a result all concept terms are interpreted by sets of objects, not by concepts (or their extents), a lattice-theoretic structure of formal concepts (that is so important advantage of FCA) is lost. A variant of description logic (namely ALC, Attribute Language with Complements) with values in concept lattices was defined in <ref type="bibr">[8]</ref> but without a concept negation; the concept negation was defined only in concept lattices for symmetric contexts (i.e. in contexts where sets of objects and attributes are equal and the binary relation is symmetric). It implies that if we would like to define concept lattice semantics for the DL concept term above, we have to symmetrize contexts F, S and T in some manner. In this position paper we present some preliminary results of our studies of ways of context symmetrization, formulate and discuss some topics that need more research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Lattice-valued Modal and Description Logics</head><p>Modal and Description Logic are closely related but different research paradigms: they have different syntax and pragmatic, but very closely related semantics (in spite of different terminology). Lattice-valued modal logics were introduced in <ref type="bibr">[3,</ref><ref type="bibr">2]</ref> by M.C. Fitting. They were studied in the cited papers from a prooftheoretic point of view. Later several authors attempted study of these logics from algebraic perspective <ref type="bibr">[5,</ref><ref type="bibr">6,</ref><ref type="bibr">9]</ref>. Basic definitions related to modal logics on lattices and completeness theorems can be found in <ref type="bibr">[5]</ref>.</p><p>Description Logic (DL) is a logic for reasoning about concepts. But there is also an algebraic formalism developed around concepts in terms of concept lattices, namely Formal Concept Analysis (FCA). In this section we recall in brief definition of description logic ALC on concept lattices of (symmetric) contexts and some properties that follow from this definition, please refer <ref type="bibr">[8]</ref> for full details. We use notation and definitions for Description Logics from <ref type="bibr">[1]</ref> <ref type="foot" target="#foot_75">1</ref> . For the basics and notation of Formal Concept Analysis, please, refer to <ref type="bibr">[4]</ref>.</p><p>Semantics of description logics on concept lattices comes from lattice-theoretic characterization of 'positive' (i.e. without negation) concept constructs (for close world semantics) that is given in the following proposition <ref type="bibr">[8]</ref>. Semantics of ALC positive concept constructs , ⊥, , , ∀, and ∃ as well as semantics of negative construct ¬ are defined in <ref type="bibr">[8]</ref> as follows. The following proposition <ref type="bibr">[8]</ref> states that for any conceptual interpretation every positive ALC concept term is an element of concept lattice; in addition, if an interpretation is symmetric then this fact holds for all ALC concept terms.</p><p>Proposition 2. For any conceptual interpretation (G, M, I, Υ ), for every positive ALC concept term X, semantics Υ (X) is an element of B(G, M, I). For any symmetric conceptual interpretation (D, D, I, Υ ), for every ALC concept term X, semantics Υ (X) is an element of B(D, D, I).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Ways to Build a Symmetric Context</head><p>The above proposition 2 leads to the following idea: to define semantics of ALC with values in an arbitrary concept lattice by isomorphic embedding of the background context into a symmetric one in such a way that for the positive fragment of ALC the original semantics and the induced semantics equal each other. Below we examine some opportunities how to "symmetrize" a given context, i.e. to build a symmetric context from an arbitrary given background context. Below we are going to study how to build a symmetric context from a given one by set-theoretic and algebraic manipulations with a binary relation of the context. Without loss of generality we may assume that the background context is reduced <ref type="bibr">[4]</ref> and has disjoint sets of objects and attributes. In <ref type="bibr">[5]</ref> the definition for modal logics with values in a given finite distributive lattice L is presented. This definition is easy to expand on polymodal logics. In section 2 we represented the definition for description logic ALC (that can be considered as a polymodal version of K) with values in concept lattices of symmetric contexts. Assume that K is a finite symmetric context; then B(K) is a finite lattice, but it may not be a distributive lattice. Question: Assuming that B(K) is a finite distributive lattice, whether ALC with values in B(K) is a polymodal B(K)-ML?</p><p>In section 2 we represented the definition for description logic ALC with values in concept lattices of symmetric contexts and for positive fragment of ALC with values in arbitrary concept lattices. Questions: (1) Is decidable or axiomatizable the positive fragment of ALC with values in concept lattices? (2) Is decidable or axiomatizable ALC with values in concept lattices of symmetric contexts?</p><p>In the section 3 we examine 9 of 16 variants of context symmetrization. Topics for further research are following: <ref type="bibr">(1)</ref> to study the remaining 7 cases of context symmetrization and isomorphic embedding with E c in one or two free quadrants; (2) to examine under which embedding from these in these 16 the induced semantics of the positive fragment of ALC is equal to the original semantics.</p><p>In <ref type="bibr">[6]</ref> we present a method to compute all the closed sets and its minimal generators from a context. This information allows us to built a set of implications whose left had side is a minimal generator and with its closed set in the right hand side. We propose in this paper a definition of basis with the good minimality property of Duquenne-Guigues basis and the characteristics of the above implications: minimal information in the left had side and a fast computation of attributes closures from them.</p><p>We also introduce an automated method to calculate from a set of implications a left-minimal direct basis. The new method is based on the Simplification Logic for Funcional Dependency SL FD [?], a sound and complete inference system for implications. The main characteristics of SL FD is that its inference system is not built around the transitivity rule, like other well known Armstrong-like axiomatic systems for implications.</p><p>The work is organized as follows. In Section 2 we summarize preliminary concepts and results on FCA concerning implications, basis, etc. In Section 3 we outline the automated method that we have proposed in <ref type="bibr">[6]</ref> for the computation of minimal generators and we introduce a new method to calculate the leftminimal direct basis from the original set of implications. The paper ends with a Conclusion Section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Background</head><p>We will use the well-kwon notation used on Formal Concept Analysis (FCA) <ref type="bibr">[8]</ref>.</p><p>For the analysis of the information contained in the context K = (G, M, I), a direction is the study of the pair (closed sets -minimal generators). The set of attributes A is said to be a minimal generator (mingen) if, for all set of attributes X ⊆ A if X = A then X = A.</p><p>A relevant notion in the framework of Formal Concept Analysis is the concept of attribute implication <ref type="bibr">[8]</ref>. This area is devoted to obtain knowledge from a context that is a table in which attributes and objects are related. An attribute implication is an expression A → B where A and B are sets of attributes. A context satisfies A → B if every object that has all the attributes in A has also all the attributes in B. It is well known that the sets of attribute implications that are valid in a context satisfies the Armstrong's Axioms. Although the two interpretations of formulas (functional dependency and attribute implication) are different, they have the same concept of semantic entailment. <ref type="bibr">[2]</ref> Alternatively, attribute implications allow us to capture all the information which can be deduced from a context. The set of all valid implications in a context may be syntactically managed by means of the following inference system known as Armstrong's axioms. An implication basis of K is defined as a set L of implications of K from which any valid implication for K can be deduced by using Armstrong rules.</p><p>The goal is to obtain an implication basis with minimal size. This condition is satisfied by the so-called Duquenne-Guigues (or stem) basis <ref type="bibr">[9]</ref>. However, the definition of the Duquenne-Guigues basis refers to minimality only in the cardinality of the set of formulas, but as we have showed in <ref type="bibr">[6]</ref> with an illustrative example, redundant attributes use to appear in this kind of minimal basis.</p><p>In the following, a summary of some interesting result of this survey are showed. More specifically we present the definitions of some characteristics studied in the survey that will be used to identify the kind of basis we introduce in this paper. In the practice, it is interesting considering some properties <ref type="bibr">[5]</ref> related with minimality of them, in order to achieve efficiency. And finally the two characteristics that constitutes the center of our basis are introduced: Definition 2. Let Γ = {X 0 → Y 0 , . . . X n → Y n } be a set of implications, it is said a left-minimal basis if there does not exist a X i → Y i and a subset</p><formula xml:id="formula_433">X i X i such that Γ \ {X i → Y i } ∪ {X i → Y i } is equivalent to Γ .</formula><p>A set of implications Γ and is said direct if for all implication A → B the set A ∪ B is a closed set w.r.t. Γ .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Obtaining basis from minimal generators</head><p>Some methods to obtain generators of closed sets have been studied in <ref type="bibr">[7,</ref><ref type="bibr">12,</ref><ref type="bibr">13]</ref>. Moreover, minimal generators <ref type="bibr">[10,</ref><ref type="bibr">11]</ref> appear in the literature under different names in various fields, for instance they are the minimal keys of the tables in relational databases. In <ref type="bibr">[13]</ref>, the authors emphasize the importance of studying minimal generators although "they have been paid little attention so far in the FCA literature".</p><p>We agree with these authors about the importance of the study of closed sets and minimal generators. They constitute a source of essential information to analyze a formal context. As we mention in the introduction, in <ref type="bibr">[6]</ref> we illustrated the use of the Simplification paradigm to guide the search of all minimal generator sets. Thus, we introduce a method named MinGen <ref type="bibr">[6]</ref> which computes a list of all pairs Φ =&lt;closed set, minimal generators&gt; from an arbitrary set of implications The goal of this paper can be considered as the reserve direction of the way we presented there. We will introduce a method to transform these set of pairs into a basis, preserving two good properties (fast computation of attribute closure and minimal left hand side in the implications) and providing minimality in the number of implications.Thus, our goal is to achieve from the minimal generators and closed sets a basis of implications fulfilling left-minimality and directness.</p><p>In the literature, the most cited algorithm to compute Duquenne-Guigues basis is the Ganter Algorithm <ref type="bibr">[8]</ref>. Algorithm 1 is an adaptation of the algorithm showed in <ref type="bibr">[3]</ref> to compute a Duquenne-Guigues basis from a set of LSI (labelled set of items) <ref type="bibr">[6]</ref>, and we obtain a Duquenne-Guigues basis. In the following example, we show how to link the above algorithm with the work presented in <ref type="bibr">[6]</ref>.</p><p>Example 1. For the input T = {ab → c, ac → bd, b → d, d → c}, Algorithm MinGen 0 (see <ref type="bibr">[6]</ref>) returns Φ = {&lt; abcd, {ab, ac, ad} &gt;, &lt; bcd, {b} &gt;, &lt; cd, {d} &gt; } and from here Algorithm 1 renders Γ = {d → cd, b → bcd, ac → abcd}, which corresponds to a Duquenne-Guigues basis.</p><p>The following theorem ensures the minimality (w.r.t. the cardinality) of the Duquenne-Guigues basis.</p><p>Theorem 1. Any Duquenne-Guigues basis is a minimum basis.</p><p>In the following, we describe the algorihtm 2 to calculate a Left-Minimal Direct Basis based on Algorithm 1. The algorithm is polynomial and it is described searching a good understanding. Of course, an implementation using lectic order would improve considerably its efficiency.</p><p>First, we consider the following equivalence rules. direct basis. The study about the soundness, completeness, and complexity of the algorithms proposed are left to a extended paper. The new method uses some equivalences deduced in the SL FD Logic and follows the Lectic order to traverse the list of minimal generators and implications associated and return a set of implications but with good properties.</p><p>As future work we propose to extend the Duquenne-Guigues basis definition to consider a generalized fuzzy extension of implications. We propose the definition introduced in <ref type="bibr">[2]</ref> that has been shown to be the most general one. In <ref type="bibr">[4]</ref> a non trivial extension of the SL FD Logic for the generalized definition of fuzzy functional dependency was introduced. The generalized version of the SL FD Logic will be used to develop a method to get basis for the generalized fuzzy implications.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Comparing Performance of Formal Concept Analysis and Closed Frequent Itemset Mining</head><p>Algorithms on Real Data Lenka Pisková, Tomáš Horváth</p><p>University of Pavol Jozef Šafárik, Košice, Slovakia lenka.piskova@student.upjs.sk, tomas.horvath@upjs.sk Abstract. In this paper, an experimental comparison of publicly available algorithms for computing intents of all formal concepts and mining frequent closed itemsets is provided. Experiments are performed on real data sets from UCI Machine Learning Repository and FIMI Repository. Results of experiments are discussed at the end of the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Formal Concept Analysis (FCA) <ref type="bibr">[9]</ref> is a method for analysing data in the form of a table with applications in many disciplines.A formal concept is a formalization of the concept of a "concept" which consists of two parts, a set of objects which forms its extension and a set of attributes which forms its intension <ref type="bibr">[25]</ref>. Formal concepts can be ordered according to the subconcept-superconcept relation resulting in a concept lattice.</p><p>Frequent itemset mining (FIM) introduced in <ref type="bibr">[1]</ref> was proposed as a method for market basket analysis. The identification of sets of items (itemsets) which often occur together in a database (the frequency is not less than a user defined minimum support threshold) is one of the basic tasks in Data Mining. When the minimum support is set low, a huge number of itemsets is generated. To overcome this problem, closed and maximal frequent itemsets were proposed.</p><p>FCA and FIM are two research fields that are closely related to each other <ref type="bibr">[20]</ref>. Naturally, they address similar problems, e.g. selecting important concepts versus finding interesting patterns in data. Moreover, they inspire each other (Iceberg concept lattice which is the set of all frequent concepts connected with the subconcept-superconcept relation <ref type="bibr">[23]</ref>).</p><p>Finding the set of all intents (of formal concepts) is equivalent to finding the set of all closed frequent itemsets using a minimum support equal to zero <ref type="bibr">[20]</ref>. Nonetheless, there is no experimental comparison between algorithms for computing formal concepts and algorithms for mining frequent closed itemsets. The aim of this paper is to provide such comparison on real-world data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Compared Algorithms</head><p>The problem of generating formal concepts and/or a concept lattice has been well studied and many algorithms have been proposed <ref type="bibr">[8]</ref>, <ref type="bibr">[15]</ref>, <ref type="bibr">[17]</ref>, <ref type="bibr">[21]</ref>, <ref type="bibr">[22]</ref> comparative performance study of algorithms for building concept lattices can be found in <ref type="bibr">[10]</ref> and <ref type="bibr">[16]</ref>. In this paper we will focus only on those algorithms which compute the set of all formal concepts (frequent closed itemsets) only. Therefore, we do not compare our results with <ref type="bibr">[10]</ref> and <ref type="bibr">[16]</ref>.</p><p>The fastest algorithms for computing formal concepts are FCbO <ref type="bibr">[14]</ref> and In-Close <ref type="bibr">[2]</ref> which are based on the CbO algorithm <ref type="bibr">[15]</ref>. In the competition between FCA algorithms at ICCS 2009<ref type="foot" target="#foot_79">1</ref> FCbO took the first place and the runner-up was In-Close. The improvement of In-Close algorithm <ref type="bibr">[3]</ref> was developed in response to the competition to outperform FCbO, but our results show that FCbO still performs better. A parallel variant of FCbO was also proposed <ref type="bibr">[14]</ref>, however, we consider only the serial version in this paper.</p><p>Implementations of algorithms for mining closed frequent itemsets were experimentally compared<ref type="foot" target="#foot_80">2</ref> and presented at FIMI'03 and FIMI'04 workshops <ref type="bibr">[12]</ref>. The best of the tested algorithms ( <ref type="bibr">[5]</ref>, <ref type="bibr">[13]</ref>, <ref type="bibr">[18]</ref>, <ref type="bibr">[19]</ref>, <ref type="bibr">[24]</ref>, <ref type="bibr">[26]</ref>) was FP-Close <ref type="bibr">[13]</ref> although it gave a segmentation fault for 4 out of 14 data sets.</p><p>In this paper, we provide an experimental comparison of 10 algorithms on real-world data sets whose implementations are publicly available, two of them compute formal concepts (FCbO and In-Close2) and the remaining 8 generate closed frequent itemsets ( <ref type="bibr">[5]</ref>, <ref type="bibr">[6]</ref>, <ref type="bibr">[7]</ref>, <ref type="bibr">[13]</ref>, <ref type="bibr">[18]</ref>, <ref type="bibr">[19]</ref>, <ref type="bibr">[24]</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Experimental Evaluation</head><p>We have carried out a number of experiments for several real-world data sets to compare FCA and FIM algorithms that are publicly available. The characteristics of selected data sets <ref type="bibr">[4]</ref>, <ref type="bibr">[11]</ref> are shown in the table 1. The experiments were conducted on the computing node with 16 cores equipped with 24 GB RAM memory running GNU/Linux openSUSE 12.1.</p><p>The measured times are CPU times. Each algorithm was run three times for each data set and the given minimum support threshold value to get the most accurate results. All reported times are the average times of the three runs. The output was turned off, i.e. the results of algorithms (intents of formal concepts/frequent closed itemsets) were neither written to a file nor to the screen. Some of the algorithms were originally developed to mine closed frequent itemsets. For Apriori, Carpenter and Eclat we have set the flag -tc to mine closed frequent itemsets. Similarly, we have used the flag -fci for Mafia.</p><p>The input file of In-Close2 is in the cxt (formal context) format while the input of other algorithms is in the standard FIMI format -each line represents a list of attributes of an object/a list of items in a transaction. The disadvantage of In-Close2 is that unlike other algorithms it also computes extents of formal concepts (in addition to their intents).</p><p>Some algorithms had problems on certain data sets. For mushroom, Apriori gets killed, Carpenter outputs an incorrect number of closed frequent itemsets (238827), DCI Closed does not calculate the result in a reasonable time (we have stopped the computation after a few hours). In-Close2 gives an incorrect number of formal concepts (59343) for tic-tac-toe.</p><p>For kosarak, FPClose is either aborted due to the invalid pointer or gives segmentation fault for the support 0.8% and supports less than or equal to 0.6%. For retail with minsup = 0, Apriori gets killed, Carpenter gives an incorrect number of closed frequent itemsets (2186693) and DCI Closed is aborted. In-Close2 gives segmentation fault for the supports lower or equal to 60% on accidents and for all supports except for 90% on connect. We have compared the performance of the algorithms for mining intents of all formal concepts, i.e. closed frequent itemsets using minsup = 0 (typical task in FCA) on small data sets. The results are depicted in the table 2. Arguably, FCbO is the best algorithm for the given task, it is the fastest algorithm for car and mushroom and the third fastest for tic-tac-toe. LCM and Eclat perform well on these data sets, too. Considering also the results on retail with minsup = 0, LCM is the fastest algorithm and the runner-up are Eclat and FPClose. Other tests were performed on big data sets and the performance of algorithms was tested for various values of support. Figures <ref type="figure" target="#fig_123">1 and 2</ref> show the timings for the algorithms on the accidents, connect, kosarak and retail data sets. The performance of the FCbO algorithm is average on big data sets except for kosarak. Eclat, DCI Closed and FPClose are good choice in the case of dense data sets (accidents, connect). However, the runtime of most algorithms increases dramatically with decreasing minimum support on these data sets. Afopt, DCI Closed and LCM are suitable for sparse data sets (kosarak, retail) although the Afopt algorithm is not able to handle the retail data set for minsup = 0. The timings for In-Close2 on kosarak are not included, because the computation took several hours just for high values of support .</p><p>For kosarak, in our experimental testing FPClose failed while FPClose was the fastest algorithm for low as well as high values of support in <ref type="bibr">[12]</ref>. Our results on other data sets correspond to some extent to the results in <ref type="bibr">[12]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>We have experimentally compared algorithms for computing intents of formal concepts and algorithms for mining closed frequent itemsets on real-world data. Our experimental testing has no clear winner for different data sets and minimum support threshold setting. In our opinion, DCI Closed behaves well although it had some problems on the mushroom data set and the retail data set with minsup = 0. On small data sets, the fastest algorithm is FCbO. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Peasants x possessions. Lattice gluing decomposable, hence substitution properties... From : Models of possessions and Lattice Analysis, Social Sci. Information (1995).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Perm(5) quotiented by the meet of its maximal congruences: "having the same complements". From : On permutation lattices, Mathematical Social Sciences (1994).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Example of factorization in class models</figDesc><graphic coords="23,228.72,433.32,173.00,78.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. The number of model elements over the various versions</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. Step number (rst) and longest simple path size (second) in C2, Nav-noUndef parameterization</figDesc><graphic coords="29,203.88,346.32,207.58,84.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 1 Fig. 1 .</head><label>11</label><figDesc>Figure 1 presents a simple formal context where G = {1, 2, 3, 4, 5, 6} and M = {a, b, c, d, e, f } and its corresponding GSH diagram.</figDesc><graphic coords="34,278.07,547.60,191.33,96.51" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Use case diagram. Actors, like System Administrator, are shown as stick figures. Use cases, like Manage Users, are shown as ovals. Actors participation within a use case is shown as a line. Spatial arrangement conveys no information here, unlike in diagrams of FCA.</figDesc><graphic coords="35,167.75,439.26,276.80,164.29" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. GSH diagram showing connections between use cases and actors.</figDesc><graphic coords="36,134.68,115.70,346.00,110.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Use case diagram with generalization and include relations.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 5</head><label>5</label><figDesc>Figure5shows how previous diagram (Figure4) has been flattened as described to the user goal abstraction level through the removal of generalization and include relations and is now in the form that can be used for GSH generation.GSH diagrams scale well when the number of use cases increases. Figure 6 is based on the example project Chair in University from the course "Introduction to information systems" in Tallinn University of Technology. Original documen-</figDesc><graphic coords="37,185.05,368.10,242.19,172.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head>Fig. 5 .</head><label>5</label><figDesc>Figure5shows how previous diagram (Figure4) has been flattened as described to the user goal abstraction level through the removal of generalization and include relations and is now in the form that can be used for GSH generation.GSH diagrams scale well when the number of use cases increases. Figure 6 is based on the example project Chair in University from the course "Introduction to information systems" in Tallinn University of Technology. Original documen-</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_11"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. Labelled line diagram for Chair in University information system.</figDesc><graphic coords="38,185.05,346.62,242.19,141.41" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_12"><head>Fig. 8 .</head><label>8</label><figDesc>Fig. 8. Scatter plot showing the number of visual elements (use case and GSH diagrams) for the 87 student projects.</figDesc><graphic coords="40,150.45,180.22,311.40,265.13" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_13"><head>Fig. 9 .</head><label>9</label><figDesc>Fig. 9. Labelled line diagram based on Table3.</figDesc><graphic coords="42,134.68,255.61,346.00,116.62" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_14"><head>Example 4 .</head><label>4</label><figDesc>Let us define a tolerance relation on an attribute m ∈ {a, b, c, d} as follows:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_15"><head>Example 6 .</head><label>6</label><figDesc>Going back to example 2, let us compute the Similarity Dependencies that hold and that have the attribute Av. Temp. in their right-hand side). Dependency Holds Month -&gt; Av. Temp N Month, Year -&gt; Av. Temp N Month, City -&gt; Av. Temp Y Year -&gt; Av. Temp N Year, City -&gt; Av. Temp N City -&gt; Av. Temp N</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_16"><head></head><label></label><figDesc>Then (G, (D, ), δ) is a pattern structure. Elements of D are patterns and are ordered thanks to a subsumption relation : ∀c, d ∈ D, c d ⇐⇒ c d = c. A pattern structure (G, (D, ), δ) is based on two derivation operators (•) . For A ⊆ G and d ∈ (D, ):</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_17"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Experimental results (X-axis represents the number of objects/tuples)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_18"><head></head><label></label><figDesc>A pair (E, I) where E ⊆ O and I ⊆ A is called a formal concept of the context if I = E and E = I . A formal concept (A, B) is said more general than a concept (C, D) if C ⊂ A or B ⊂ D. The set of all concepts of a given context ordered in this way is a complete lattice called concept lattice of the context. An implication is a relation between two attribute sets A and B, denoted by A → B. An implication A → B is said to hold in a context if every object described by A is also described by B. We write A ≡ B if A → B and B → A. The implication A → A always holds in the context.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_19"><head>1: Card = 0 2 :</head><label>2</label><figDesc>Candidates = {∅} 3: B = ∅ 4: while Candidates = ∅ do 5: Intents = ∅ 6:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_20"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Context 1</figDesc><graphic coords="65,270.24,115.70,74.89,68.82" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_21"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Spanning Tree of the Lattice of Intents of Context 1</figDesc><graphic coords="66,248.03,342.30,119.31,112.18" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_22"><head></head><label></label><figDesc>6 e -b → 0.6,0.33 ab -b → 0.6,0.66 bd -c → 0.4,0.5 ce -d → 0.6,0.66 de -ab → 0.2,0 abcde -bd → 0.4,0.5 bcd -bd → 0.4,0.6 bde</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_23"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Context 2</figDesc><graphic coords="67,269.60,261.09,76.16,120.43" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_24"><head>Theorem 4</head><label>4</label><figDesc>allows to compute intervals in AM F (N ) for |N | = 7, and computes all intervals for |N | = 6 in milliseconds.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_25"><head>2 )</head><label>2</label><figDesc>an L-set of attributes such that I g (m) = I(g, m) for each m ∈ M . Clearly, I g corresponds to the row labelled g in (G, M, I). We define the degree ||A ⇒ B|| (G,M,I) ∈ L to which A ⇒ B holds in (each row of) K = (G, M, I) by ||A ⇒ B|| K := ||A ⇒ B|| N , where N := {I g | g ∈ G}. Denote by Int(G * , M, I) the set of all intents of B(G * , M, I). The degree ||A ⇒ B|| B(G * ,M,I) ∈ L to which A ⇒ B holds in (the intents of) B(G * , M, I) is defined by ||A ⇒ B|| B(G * ,M,I) := ||A ⇒ B|| Int(G * ,M,I) . (Lemma 1. ([20]) For each fuzzy attribute implication A ⇒ B it holds that ||A ⇒ B|| (G,M,I) = ||A ⇒ B|| B(G * ,M,I) = S(B, A ↓↑ ).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_26"><head></head><label></label><figDesc>e., ||A ⇒ B|| B L ∪L = ||A ⇒ B|| (G,M,I) for every fuzzy implication A ⇒ B. By Equation (2) follows ||A ⇒ B|| (G,M,I) = ||A ⇒ B|| Int(G * ,M,I) . Hence, it is sufficient to prove that ||A ⇒ B|| B L ∪L = ||A ⇒ B|| Int(G * ,M,I) for every fuzzy attribute implication A ⇒ B. For any L-set N ∈ L M , N ⇒ L(N ) is entailed by L, therefore we have N = L(N ). Each intent N ∈ Int(G * , M, I) is a model of B L . Now let N ∈ Mod(B L ) and assume that N = N ↓↑ , i.e., N is not an intent. Since N ∈ Mod(B L ) we have ||Q ⇒ Q ↓↑ || N = 1 for every L-pseudo-intent Q ∈ P. By definition, N is an L-pseudo-intent and hence N ⇒ N ↓↑ belongs to B L . But now, we have</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_27"><head>Figure 1 . 5 /</head><label>15</label><figDesc>For the background implications L := {b ⇒ a, d ⇒ a, {a, c} ⇒ b} we obtain the L-stembase displayed in the middle column of the figure. If we close the pseudo-intents a ⇒ a, d ⇒ a, b, c, c, 0.5 /d ⇒ a, b, d, a, d ⇒ b, c, c, 0.5 /d ⇒ a, b, d, a, 0.5 /d ⇒ b, c, d, c, 0.5 /d ⇒ a, b, d, b ⇒ a, c, d, a, d ⇒ b, c, a, b ⇒ c, d, a, 0.5 /d ⇒ b, c, d, a, b ⇒ c, d. a, 0.5 /d ⇒ b, c, d, a, c ⇒ b, d. a, b, c ⇒ d.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_28"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. An L-context and its different stem bases.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_29"><head></head><label></label><figDesc>study situation IT-infra-courses possibility of passage to overall</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_31"><head>1 :</head><label>1</label><figDesc>2), introduced by Demko and Bertet in 2011, is another extension of Bordat's immediate successors gen-Name: Immediates Successors Data: A context K = (O, I, (α, β)) ; A closure B of the closure lattice of K Result: The immediate successors of B in the closure lattice begin Init the set system FB with ∅; foreach x ∈ I\B do Add ϕ(x + B) to FB end Succ=minimal inclusion subsets of FB; return Succ end Algorithm Immediate successors algorithm eration. Please refer to</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_32"><head></head><label></label><figDesc>This has to be compared to the complexity of the classical immediate successors algorithm in O(|I| 2 * |O|). Name: Immediates Successors LOA Data: A context K = (O; I, (α, β)) ; A closed set B of the closed set lattice (CI , ⊆) of K Result: The immediate successors of B in the lattice begin Init the set system SuccB with ∅; foreach x ∈ I \ B do add = true; foreach X ∈ SuccB do \\ Case 1: Merge x and X in the same potential successor</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_33"><head>Fig. 2 .</head><label>2</label><figDesc>Fig.2. Concept lattice generated from the context presented in Table1. Intent: Attributes, Extent: Observations</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_34"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. CryptoLat software with the different views displaying our running example</figDesc><graphic coords="107,134.68,116.70,362.42,230.06" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_35"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Example of a lattice with 6 elements</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_36"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. The reduced context, together with the arrows relations, associated with our running example.</figDesc><graphic coords="109,264.16,436.07,87.04,60.03" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_37"><head></head><label></label><figDesc>is the following: c → e; d → e; b, c → d; b, c → e; bc → d, e; b, d → c; b, d → e; b, d → c, e; b, e → c; b, e → d; b, e → c, d; c, d → b; c, d → e; c, d → b, e; c, d, e → b; b, d, e → c; b, c, e → d; b, c, d → e;</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_38"><head>Example 1 (</head><label>1</label><figDesc>continued). Canonical basis associated with the lattice of Fig.2. b, e → c, d; c → e; d → e; c, d, e → b;</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_39"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Sperner village associated with our running example.</figDesc><graphic coords="111,260.86,520.11,93.64,51.70" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_40"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Screenshot of the software after adding a new Sperner family</figDesc><graphic coords="112,134.68,116.70,370.08,217.79" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_41"><head></head><label></label><figDesc>such that for any value k ∈ L holds ¬¬k = k where ¬k = k → 0 is said to be endowed with double negation law. Lemma 1. Let L be a complete residuated lattice satisfying the double negation law. Then for any k, m ∈ L holds ¬k → m = ¬m → k. 2.2 Basics of Fuzzy FCA Definition 3. An L-fuzzy formal context C is a triple B, A, L, r , where B, A are sets, L is a complete residuated lattice, and r : B × A → L is an L-fuzzy binary relation. Definition 4. Let C = B, A, L, r be an L-fuzzy formal context. A pair of derivation operators ↑, ↓ of the form ↑:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_42"><head></head><label></label><figDesc>Ondrej Krídlo, Patrik Mihalčin, Stanislav Krajči and Lubomír Antoni University of Pavol Jozef Šafárik, Košice, Slovakia</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_43"><head>a</head><label></label><figDesc>⊗ b ≤ c is equivalent to a ≤ b → c for any a, b, c ∈ L. Definition 2. L-fuzzy formal context C is a triple B, A, r , where r : B × A → L is an L-fuzzy binary relation and L is the complete residuated lattice. Definition 3. Let B, A, r be an L-fuzzy formal context. Lets define a pair of derivation operators ↑, ↓ of the form ↑: L B −→ L A and ↓: L A −→ L B , where ↑ (f )(a) = b∈B (f (b) → r(b, a)) for any f ∈ L B and a ∈ A, ↓ (g)(b) = a∈A (g(a) → r(b, a)) for any g ∈ L A and b ∈ B.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_44"><head>Lemma 11 .</head><label>11</label><figDesc>Lets have an L-fuzzy formal context C = B, A, r with derivation operators ↑, ↓ . Lets have a second order formal context K = b∈B {b}, {⊥ b : b ∈ B}, a∈A {a}, {⊥ * a : a ∈ A}, (b,a)∈B×A r(b, a) . Then concept lattices of C and K are isomorphic. Proof. Let Φ ∈ b∈B Ext(⊥ b ). By previous lemma is easy to see that Φ ∈ L B . Moreover r(b, a) for any (b, a) ∈ B × A as an arbitrary value from L is an extent of ⊥ b and intent of ⊥ * a = L, {a}, t λ . Hence any r(b, a) ∈ L-Bonds(⊥ b , ⊥ * a ). ↑ K (Φ)(a) = b∈B ↑ r(b,a) (Φ(o)) = b∈B (Φ(o) → r(o, a)) =↑ (Φ)(a).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_45"><head>Lemma 13 .</head><label>13</label><figDesc>Lets have an L-fuzzy formal context C = B, A, r , where L is closed under double negation law. Concept lattice of C is isomorphic to a concept lattice of second order formal context K = B, B, A, A, r , where B = B, B, = and A = A, A, = .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_47"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Concept Lattice of animals (left), AOC poset AOC animals (right)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_48"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Formal Context of Sites KSites (left), AOC-poset of Sites (right)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_49"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. AOC-posets for the KSites formal context and the C Animals set of concepts, existential scaling</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_50"><head></head><label></label><figDesc>Site ∃lvl1 .Lig ∃lvl2 .(Animal ∃aff0 .(Trait FR4 ) ∃aff3 .(Trait SA1 ))</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_52"><head></head><label></label><figDesc>e u r a l N e t w o r k P , P a t t e r n x OUTPUT: Updated P D e n d r i t e k = a d d N e w D e n d r i t e (P) FOR EACH e l e m e n t i n x IF g e t V a l u e ( e l e m e n t ) = 0 i = g e t P o s i t i o n ( e l e m e n t ) a d d A x o n a l B r a n c h ( k , i ) END END END if the input x ∈ D + . The training step is to nd the set D +</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_53"><head></head><label></label><figDesc>INPUT : A B i n a r y C o n t e x t K : ( G,M, I ) , K −Supremum , K −Infimum , L a t t i c e OUTPUT: I n t e n t H a s h S e t M a x i m a l _ R e c t a n g l e s STEP 1 :I n i t :LBNN Upward S t r u c t u r e M a x i m a l _ R e c t a n g l e s STEP 2 :S o r t G by d e r i v a t i v e h i g h e r t o l o w e r C a r d i n a l i t y STEP 3 :IF maximal c a r d i n a l i t y i s e q u a l t o K −Supremum i n t e n t i o n c a r d i n a l i t yAdd L i n k f r o m K −Supremum t o K −InfimumRETURN Add , a s p o s i t i v e d e n d r i t e s , a l l e l e m e n t s w i t h maximal c a r d i n a l i t y i n G' t o LBNN . STEP 4 : F o r e a c h r e m a i n i n g e l e m e n t i n G IF M a x i m a l _ R e c t a n g l e s d o e s n o t c o n t a i n s e l e m e n t ' AND Upward e v a l u a t i o n e l e m e n t ' i s 1 t h e n : add , a s d e n d r i t e , e l e m e n t t o LBNN c r e a t e Formal C o n c e p t w i t h : e l e m e n t u n i o n K −infimum a s e x t e n t e l e m e n t ' a s i n t e n t add t h i s new f o r m a l c o n c e p t t o : M a x i m a l _ R e c t a n g l e s OTHER IF M a x i m a l _ R e c t a n g l e s c o n t a i n s e l e m e n t add e l e m e n t t o p r e v i o u s l y Formal C o n c e p t c r e a t e d . STEP 5 : F o r e a c h R e c t a n g l e i n M a x i m a l _ R e c t a n g l e s IF L a t t i c e d o e s n o t c o n t a i n s R e c t a n g l e add R e c t a n g l e t o L a t t i c e add a L i n k f r o m R e c t a n g l e t o K −Infimum Compute Maximal R e c t a n g l e s w i t h : G = G / R e c t a n g l e e x t e n t M = R e c t a n g l e i n t e n t I = P r o j e c t i o n K −Supremum R e c t a n g l e a s a K −Infimum L a t t i c e ELSE add a L i n k f r o m p r e v i o u s l y c r e a t e d R e c t a n g l e i n G l o b a l _ M a x i m a l _ R e c t a n g l e s t o K −Infimum Algorithm 3 Main Function INPUT : B i n a r y C o n t e x t (G,M, I ) OUTPUT: L a t t i c e L S t e p 1 : Get Maximum and Infimum e l e m e n t s . F o r m a l C o n c e p t max = getMax (G,M, I ) F o r m a l C o n c e p t min = g e t M i n (G,M, I ) a d d C o n c e p t ( L , max ) , a d d C o n c e p t ( L , min ) STEP 2 : Get maximal R e c t a n g l e s From min M a x R e c t a n g l e s = Compute Maximal R e c t a n g l e s w i t h : G/ min . e x t e n t , min . i n t e n t , I −Proj , the rst step creates a new dendritic neural network. It is initialized with one output neuron, n = |intent| and k = 0, where the number of input neurons is n, and each input neuron represents one attribute element in M . The second step is used to get the G set ordered by attribute cardinality.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_54"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. Growing objects number.</figDesc><graphic coords="161,148.70,375.21,144.97,87.34" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_55"><head>Figure 2 .</head><label>2</label><figDesc>Figure 2. Growing attributes number</figDesc><graphic coords="161,321.69,365.24,144.97,87.34" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_56"><head>Figure 3 .</head><label>3</label><figDesc>Figure 3. Growing density percentage</figDesc><graphic coords="162,148.70,144.57,144.97,87.34" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_57"><head>Figure 4 .</head><label>4</label><figDesc>Figure 4. MxM worst case contexts</figDesc><graphic coords="162,321.69,144.57,144.97,87.34" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_58"><head></head><label></label><figDesc>(i) xL, ^, _, 0, 1y is a complete lattice, i.e. a partially ordered set in which arbitrary infima and suprema exist; (ii) xL, b, 1y is a commutative monoid, i.e. b is a binary operation which is commutative, associative, and a b 1 " a for each a P L; (iii) b and Ñ satisfy adjointness, i.e. a b b ď c iff a ď b Ñ c. 0 and 1 denote the least and greatest elements. The partial order of L is denoted by ď. Throughout this work, L denotes an arbitrary complete residuated lattice.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_59"><head>For a concept</head><label></label><figDesc>lattice BpX , Y , Iq, where x , y is either of xÒ, Óy, xX, Yy, or x^, _y, denote the corresponding sets of extents and intents by ExtpX , Y , Iq and IntpX , Y , Iq. That is, ExtpX , Y , Iq " tC P L X | xC, Dy P BpX , Y , Iq for some Du, IntpX , Y , Iq " tD P L Y | xC, Dy P BpX , Y , Iq for some Cu,</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_60"><head>Definition 1 .</head><label>1</label><figDesc>A weak L-bond between two L-contexts K 1 " xX 1 , Y 1 , I 1 y and K 2 " xX 2 , Y 2 , I 2 y w.r.t. xX, Yy is an L-relation β P L X1ˆY2 s.t.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_61"><head></head><label></label><figDesc>L-bonds w.r.t. x^, _y defined similarly as in Definition 1, i.e. an L-relation β P L X1ˆY2 s.t. ExtpX 1 , Y _ 2 , βq Ď ExtpX 1 , Y _ 1 , I 1 q and IntpX 1 , Y _ 2 , βq Ď IntpX 2 , Y _ 2 , I 2 q. Note that the weak L-bonds w.r.t. xX, Yy are different from L-bonds w.r.t. x^, _y as the following example shows. Example 1. Consider L a finite chain containing a ă b with b defined as follows: x b y "</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_62"><head></head><label></label><figDesc>(a) Concept lattice created from the data schema example (b) Concept lattice after the expert's decision (attribute background split into practice background and records) including domain labels</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_63"><head>Fig. 3 :</head><label>3</label><figDesc>Fig. 3: Concept lattices for CNCA (before and after the expert's decision)</figDesc><graphic coords="182,137.76,366.74,166.07,142.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_64"><head>Fig. 4 :</head><label>4</label><figDesc>Fig. 4: Concept lattice from the ICH database schemaIteration Attribute Action 1 name Assign to all tables 2 description Assign to all tables 3 background Split the attribute 4 background Split the attribute 5 related to:Commune Eliminate from some tables 6 related to:Localization Eliminate from some tables 7 -Domain labelling 8 -Domain labelling 9 -Domain labelling</figDesc><graphic coords="184,107.04,98.54,399.69,180.15" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_65"><head>Figure 5 Fig. 5 :</head><label>55</label><figDesc>Fig. 5: Concept lattice after 9 iterations</figDesc><graphic coords="185,116.83,232.64,377.98,113.63" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_66"><head></head><label></label><figDesc>(a) (2 Σ , ∩, ∪, ⊆), where Σ is a finite set (alphabet), is a Boolean lattice. (b) (N + , gcd, lcm, |) where (x | y) iff x divides y is a distributive lattice, with the minimum element 1 but no maximum element. (c) The set S of closed intervals on R, including ∅ and R, is a non-distributive lattice when ∧ is the intersection and [a, b] ∨ [c, d] = [min(a, c), max(b, d)], where min and max are defined according to the order in R.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_67"><head>Definition 1 ( 1 ) 2 )</head><label>112</label><figDesc>Analogical proportion) An analogical proportion 3 (AP ) on a set X is a quaternary relation on X, i.e. a subset of X 4 . An element of this subset, written A : B :: C : D , which reads 'A is to B as C is to D', must obey the following two axioms: Symmetry of 'as': A : B :: C : D ⇔ C : D :: A : B Exchange of means: A : B :: C : D ⇔ A : C :: B : D Then, thanks to symmetry, it can be easily seen that A : B :: C : D ⇔ D : B :: C : A should also hold (exchange of the extremes). According to the first two axioms, five other formulations are equivalent to the canonical form A : B :: C : D , B : A :: D : C , D : B :: C : A , C : A :: D : B , D : C :: B : A and B : D :: A : C .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_68"><head></head><label></label><figDesc>⇒). Taking x1 = x ∧ y, x2 = x ∧ z, t1 = z ∧ t and t2 = y ∧ t show directly that there exist factors satisfying Definition 3. (⇐). Let us show that x = (x ∧ y) ∨ (x ∧ z). Since x = x1 ∨ x2 and y = x1 ∨ t2, we have x1 ≤ x and x1 ≤ y. Then x1 ≤ x ∧ y. Similarly, factor x2 satisfies x2 ≤ x ∧ z. Hence, x ≤ (x∧y)∨(x∧z). Besides, x being greater than (x∧y) and (x∧z), (x∧y)∨(x∧z) ≤ x.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_69"><head>Proposition 2</head><label>2</label><figDesc>A 4-tuple (x, y, z, t) in the Boolean lattice (2 Σ , ∪, ∩, ⊆) is in the AP (x : y :: z : t) iff there exists a partition of Σ composed of six subsets (a, b, c, d, e, f ) such that x = a ∪ c ∪ e, y = b ∪ c ∪ e, z = a ∪ d ∪ e and t = b ∪ d ∪ e.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_70"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. An AP (x : y :: z : t) in a Boolean lattice. x = a ∪ c ∪ e, y = b ∪ c ∪ e, z = a ∪ d ∪ e and t = b ∪ d ∪ e.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_71"><head>)</head><label></label><figDesc>Proof. (⇒). Using the derivations of x given in Proposition 1, we have x = x∧(y ∨z) and x = x ∨ (y ∧ z) by distributivity and then y ∧ z ≤ x ≤ y ∨ z. The other inequalities are similarly derived. (⇐). By distributivity, (x ∧ y) ∨ (x ∧ z) = x ∧ (y ∨ z). Moreover, x ∧ (y ∨ z) = x since x ≤ y ∨ z. The other equalities are obtained in the same way.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_72"><head>Definition 5 A</head><label>5</label><figDesc>degenerated analogical proportion (DAP ) is (x : x :: x : x). A simple analogical proportion (SAP ) is (x : y :: x : y) (SAP 1) or (x : x :: y : y) (SAP 2). The next results are all established in a distributive lattice. Proposition 7 (Composition of an AP and a DAP ) The composition of an AP by a DAP is a AP .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_73"><head></head><label></label><figDesc>in a distributive lattice (a : b :: c : x) has solutions, since we can take M = b∨c and m = b ∧ c. Proposition 11 (Unicity of the solution) When there is a solution to equations 4 in a distributive lattice, then it is unique. Consequently, if there exists a solution to the analogical equation (a : b :: c : x), then it is unique. Proof. Supposing the equations have two solutions x1 and x2 leads to a contradiction with the distributivity between a, x1 and x2. Proposition 11 doesn't hold in general lattices: eq. 4 may have several solutions. Proposition 12 Let a, m and M be three elements of a distributive lattice such that m ≤ a ≤ M . If there exists a such that: ( a ∨ a ≥ M ) and ( a ∧ a ≤ m) then x = (M ∧ a) ∨ m = (m ∨ a) ∧ M is the unique solution to equations (4).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_74"><head>2</head><label></label><figDesc>to the relation factor set (in the case, that we consider an object-attribute relation). For example, by using 0.5-approach in Example 1, we get relational factors {Abby, Daphne}, {undergraduate, wants kids, is attractive} , {Ben, Carl}, {undergraduate, wants kids} and {Abby, Daphne}, {undergraduate, wants kids, is attractive} , {Dave}, {wants kids, is attractive} . This factors can be replaced with factor {Abby, Daphne}, {undergraduate, wants kids, is attractive} , {Ben, Carl, Dave}, {wants kids} . Remark 5. Another, simpler approach to multi-relational data factorization is such, that we do factorization of the relation R C1C2 . This is correct because we can imagine the relation between data tables C 1 and C 2 as another data table.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_75"><head></head><label></label><figDesc>t. the similarity operation : c d ⇔ c d = c, and c is subsumed by d. Definition 2. A pattern concept of a pattern structure (G, (D, ), δ) is a pair (A, d) where A ⊆ G and d ∈ D such that A = d and d = A, A is called the concept extent and d is called the concept intent.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_76"><head>Definition 3 .</head><label>3</label><figDesc>Given a concept c, the concept stability Stab(c) is the percent of subsets of the concept extent (denoted Ext(c)), whose description is equal to the concept intent (denoted Int(c)). Stab(c) := |{s ∈ ℘(Ext(c)) | s = Int(c)}| |℘(Ext(c))|</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_77"><head></head><label></label><figDesc>t. Definition 5. (D, ) is a semilattice on sequences S, where D ⊆ ℘(S) such that if d ∈ D contains a sequence s then all subsequences of s should be included into d, ∀s ∈ d, s ≤ s : s / ∈ d, and the similarity operation is the set intersection for two sets of sequences. Given two patterns d 1 , d 2 ∈ D, the set intersection operation ensures that if a sequence s belongs to d 1 d 2 then any subsequence of s belongs to d 1 d 2 and thus d 1 d 2 ∈ D. As the set intersection operation is idempotent, commutative and associative, (D, ) is a valid semilattice.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_78"><head>Definition 6 .</head><label>6</label><figDesc>A projection ψ : D → D is an interior operator, i.e. it is (1) monotone (x y ⇒ ψ(x) ψ(y)), (2) contractive (ψ(x) x) and (3) idempotent (ψ(ψ(x)) = ψ(x)). Under a projection ψ, a pattern structure (G, (D, ), δ) becomes the projected pattern structure ψ((G, (D, ), δ)) = (G, (D ψ , ψ ), ψ • δ), where D ψ = ψ(D) = {d ∈ D | ∃d * ∈ D : ψ(d * ) = d} and ∀x, y ∈ D, x ψ y := ψ(x y).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_79"><head>Proposition 4 .</head><label>4</label><figDesc>Given a pattern structure (G, (D, ), δ), its concept c and a projected pattern structure (G, (D ψ , ψ ), ψ • δ), and the projected concept c, if the concept extents are equal (Ext(c) = Ext(c)) then Stab(c) ≤ Stab(c).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_80"><head>p 2 ; p 2 p 1 ; p 1 p 3 ; p 3 p 1 , p 2 ; ss 2 , ss 3 p 2 , p 3 ; ss 6 p 1 3 p 2 ; p 2 p 1 ; p 1 p 3 ; p 3 p 1 , p 2 ; ss 9 p 2 , p 3 ;</head><label>1331226132133123</label><figDesc>, p 2 , p 3 ; ∅ (∅; * ) (a) MLP projection, l = ss 7 , ss 8 , ss 10 p 1 , p 2 , p 3 ; ∅ (∅; * ) (b) Projection removing '*' hospitals</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_81"><head>Example 1 .</head><label>1</label><figDesc>Examples of idempotent dioids are 1. The Boolean lattice B = {0, 1}, ∨, ∧, 0, 1 2. All fuzzy semirings, e.g. [0, 1], max, min, 0, 1 3. The min-plus algebra R min,+ = R ∪ {∞}, min, +, ∞, 0 4. The max-plus algebra</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_83"><head>Fig. 2 :</head><label>2</label><figDesc>Fig. 2: Matrix A 3 (a), its associated digraph and class diagram (b), its left (c) and right (d) fundamental eigenvectors annotated with their eigennodes to the left and above, respectively; the eigenspace of improper eigenvectors V (A 3 ) in (e), a schematic of the right eigenspace of proper eigenvalue ρ = 2, V 2 (A 3 ) in (f) and the schematics of the whole right eigenspace V(A 3 ) in (g).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_84"><head>+ 8 •</head><label>8</label><figDesc>6}• , and U µ4 (A) = ( Ã3 µ4 ) -as described by the row vectors of Fig. 2.(c)-and the right eigenspaces are</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_85"><head></head><label></label><figDesc>Corresponding author.† Partially supported by the Spanish Science Ministry projects TIN2009-14562-C05 and TIN2012-39353-C04, and by Junta de Andalucía project P09-FQM-5233.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_86"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Discrete signal received</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_88"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Initial image</figDesc><graphic coords="244,249.14,278.63,119.23,134.46" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_89"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Structuring set</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_90"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Greatest solution</figDesc><graphic coords="245,249.14,229.22,119.23,134.46" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_91"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. Original image</figDesc><graphic coords="246,249.14,115.70,119.23,134.46" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_92"><head></head><label></label><figDesc>ELI, classes are inductively defined from a set N C of class names, a set N R of role names, and a set N I of individual names (N C , N R , and N I are finite), using the constructors: , C D, and ∃R.C are classes. Where C and D refer to classes, R refers to a role name or its inverse R − , and in the assertion C(a), a refers to an individual. In this paper, we consider ∃R.C classes with C ∈ N C , i.e, C is an atomic concept in the expression of ∃R.C. The TBox of a EL knowledge base contains a set of class inclusion axioms such as C D. The ABox contains class and role assertions: C(a) and R(a, b). The semantics of ELI is broadly discussed in [2]. The semantics of ELI-classes is defined in terms of an interpretation I = (∆ I , . I ). The domain ∆ I is a non-empty set of individuals and the the interpretation function . I maps each class name A ∈ N C to a subset C I of ∆ I , each role name R ∈ N R to a binary relation R I on ∆ I , and each individual name a ∈ N I to an individual a I ∈ ∆ I . The extension of . I</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_93"><head>3. 1 MotivationExample 1 .</head><label>11</label><figDesc>Consider the following ELI ontology O = T , A : T = {ActorsFromNewYork Actor, FilmProducer Artist, Actor Artist, Artist Person} A = {tomCruise I ∈ ActorsFromNewYork I } In order to compare graphical representations of DL ontologies and their corresponding concept lattices, we represent O and its respective materialization O as graphs as shown below: , dotted edges denote inferred instance and class subsumption relations.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_94"><head></head><label></label><figDesc>Target lattice associated with the ontology in Example 1. (b) Lattice associated with the context in Example 2.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_95"><head>Fig. 1 :</head><label>1</label><figDesc>Fig. 1: tomCruise (tC) and (.) are objects and the rest are attributes.</figDesc><graphic coords="253,354.89,115.70,88.54,126.06" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_96"><head>Fig. 2 :</head><label>2</label><figDesc>Fig. 2: Concept lattice associated with the ontology in Example 1.</figDesc><graphic coords="254,364.56,183.33,66.53,68.03" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_97"><head>Definition 2 (</head><label>2</label><figDesc>Transforming ELI Ontologies into Formal Contexts). We define the transformation of KB = T , A into a formal context (G, M, I) thanks to a transformation function σ as follows: -An axiom C D in T corresponds to an implication in L((G, M, I)), i.e., the set of implications based on (G, M, I): C D −→ C → D ∈ L((G, M, I)). -Concept expressions C (class name), ∃R.C, and ∃R − .C, correspond respectively to attributes C, ∃R.C, and ∃R − .C in M . -An individual a in A corresponds to an object a in G. -When a is an instance of C resp. ∃R.C, ∃R − .C, then (a, C) ∈ I resp. (a, ∃R.C) ∈ I, (a, ∃R − .C) ∈ I. -When a is related to b through R, then (a, ∃R. ) ∈ I and (b, ∃R − . ) ∈ I. Example 2. The translation of the ontology in Example 1 into a formal context K and its background implications L are shown below:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_98"><head>Definition 3 (</head><label>3</label><figDesc>Object and Attribute Terms). Given a formal context K = (G, M, I), an object term (OT) and an attribute term (AT) are defined inductively as:OT = {g} | OT 1 AND OT 2 | OT 1 OR OT 2 , where g ∈ G AT = {m} | AT 1 AND AT 2 | AT 1 OR AT 2 , where m ∈ MThe expression OT 1 AND OT 2 denotes the greatest lower bound (GLB) in the concept lattice B(G, M, I). The expression OT 1 OR OT 2 denotes the least upper bound (LUB) in B(G, M, I). Dually, the expression AT 1 AND AT 2 denotes the GLB in the concept lattice B(G, M, I) (keeping the orientation of B(G, M, I) based on the extents). Finally, the expression AT 1 OR AT 2 denotes the LUB in B(G, M, I).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_99"><head>Example 3 .</head><label>3</label><figDesc>Let us consider querying the concept lattice shown in Figure3.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_100"><head>Fig. 3 :</head><label>3</label><figDesc>Fig. 3: A concept lattice representing artists professions.</figDesc><graphic coords="257,152.50,233.59,310.35,211.30" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_101"><head>Example 4 .</head><label>4</label><figDesc>Let us consider the evaluation of the SPARQL query Q on the ontology O and O of Example 1. Q = select all those who are artists.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_102"><head>1 )</head><label>1</label><figDesc>, and let I be a relation I ⊆ G × M : for g ∈ G, m ∈ M , gIm holds iff the object g has the attribute m. The triple K = (G, M, I) is called a (formal) context. If A ⊆ G, B ⊆ M are arbitrary subsets, then the Galois connection is given by the following derivation operators: A = {m ∈ M | gIm for all g ∈ A}, B = {g ∈ G | gIm for all m ∈ B}. (The pair (A, B), where A ⊆ G, B ⊆ M , A = B, and B = A is called a (formal) concept (of the context K) with extent A and intent B (in this case we have also A = A and B = B).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_103"><head>Fig. 1 . 4 ) 1 .</head><label>141</label><figDesc>Fig. 1. g addition condition</figDesc><graphic coords="263,259.84,115.70,95.67,70.91" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_104"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Prime operator based tricluster structure</figDesc><graphic coords="264,199.82,115.70,215.73,74.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_105"><head>1 .</head><label>1</label><figDesc>Uniform context (∀(g, m, b) P ((g, m, b) ∈ I) = 0.1) 2. Top 250 movies context from www.imdb.com, objects -movie titles, attributes -tags, conditions -genres 3. Random sample of 3000 of the first 100000 triples of the www.bibsonomy.org dataset, objects -users, attributes -tags, conditions -bookmark names Parallel versions of OAC-triclustering algorithms and TriBox have also been implemented via parallelization of their outer loops and the computation time for them has been compared. Coverage and diversity measures were introduced as additional quality measures. Coverage is defined simply as a fraction of the triples of the context (alternatively, objects, attributes or conditions) included</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_106"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Similarity for the noise-tolerance experiments</figDesc><graphic coords="268,195.58,115.70,224.21,144.97" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_107"><head></head><label></label><figDesc>: C5, C2 , C4, C5 , C2 : C2, C1 , C6 : C6, C1 , C3, C6 , C3 : C3, C2 , C7 : C7, C6 , C4, C7 , C4 : C4, C3 , C8 : C8, C1 , C7, C8 , C5, C8 . C9 : C9, C * 5 , C4, C9 , C12 : C12, C * 8 , C11, C12 , C9, C12 , C10 : C10, C * 2 , C3, C10 , C9, C10 , C13 : C13, C * 1 , C * 6 , C13 , C12, C13 , C10, C13 . C11 : C11, C * 6 , C7, C11 , 3 Experimental evaluation The asymptotic worst-case time complexity of Algorithm 1 remains the same as of FCbO (and CbO) algorithm, O(|B(X, Y, I)|•|Y | 2</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_108"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Running time of Algorithm 1 on random data dependent on number of attributes (on the left, introducing a single new object), on fill ratio (percentage of ×s, in the middle, introducing a single new object) and on number of new objects (on the right).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_109"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Running time of Algorithm 1 dependent on number of new (last) objects for mushroom (on the left), anonymous-msweb (in the middle) and T10I4D100K datasets (on the right), solid line-orig. object ordering, dashed line-random object ordering.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_110"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Running time dependent on number of attributes (on the left and right) and on fill ratio (percentage of ×s, in the middle), solid line-Algorithm 2 (left, middle)/merged algorithm (right), dashed line-AddIntent, dotted line-FCbO (left, middle)/Algorithm 1 (right).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_111"><head>Taxonomy</head><label></label><figDesc>Network Data Structure type p PFC is access PFC Type; −− Pointer to a PFC type PFC Type(N O : in positive; N A : in positive) is array(1 .. N O, 1 .. N A) of Boolean; type Type Of AIP is (Collection, IO); type p AIP is access AIP; −− Pointer to an AIP type AIP(AIP Type : Type Of AIP := Collection) is record AIP Identifier : Bounded String; Parent AIP : p AIP; Next Sibling AIP : p AIP; case AIP Type is when Collection =&gt; PFC : p PFC; First Child AIP : p AIP; when IO =&gt; Object Identifier : Bounded String; end case; end record;</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_112"><head>Strategy 1</head><label>1</label><figDesc>moves concept C down to one of its children, C child . The relation I of the formal context should be modified to I * as follows:I * = I ∪ {(g, m) : m ∈ {Intent(C child ) \ Intent(C)}, g ∈ {Extent(C) \ Extent(C child ), gIm}.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_114"><head>Strategy 2</head><label>2</label><figDesc>moves concept C up to one of its parents, C parent . The relation I of the formal context should be modified to I * as follows:I * = I \{(g, m) : m ∈ {Intent(C)\Intent(C parent )}, g ∈ {Extent(C)}, gIm}.Table2shows an example of strategies for removing concept c 4 from the initial lattice given in Fig.1. Here, we have three strategies, two for moving c 4 down and one for moving c 4 up. In strategy 1.1, c 4 = ({F, HD}, {CoWi D}) and c 7 = ({F}, {Ca RAS, CoWi D}). To move concept c 4 down to concept c 7 , the attribute in set {Intent(c 7 ) \ Intent(c 4 )} = {Ca RAS} is added to the object in set {Extent(c 4 )\Extent(c 7 )} = {HD}. Similarly, in strategy 2.1, to move concept c 4 up to concept c 0 with Intent(c 0 ) = ∅, the attribute CoWi D is removed from the objects in set {F, HD}.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_115"><head></head><label></label><figDesc>[F ](Shilov&amp;Garanina) &amp; ¬[T ][T d ][S]Grebenevaor in syntax of a description logic as the following concept term ∀F.(Shilov Garanina)   ¬∀T.∀T d .∀S.Grebeneva.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_116"><head>Proposition 1 .</head><label>1</label><figDesc>Let (∆, Υ ) be a terminological interpretation and P (∆) = (2 ∆ , ∅, ⊆, ∆, ∪, ∩) be the complete lattice of subsets of ∆. Then semantics of ALC positive concept constructs , ⊥, , , ∀, and ∃ enjoys the following properties in P (∆): (1) Υ ( ) = sup P (∆), andΥ (⊥) = inf P (∆); (2) Υ (X Y ) = sup(Υ (X), Υ (Y )), and Υ (X Y ) = inf(Υ (X), Υ (Y )); (3) Υ (∀R. X) = sup{S ∈ P (∆) : ∀s ∈ S∀t ∈ ∆((s, t) ∈ Υ (R) ⇒ t ∈ Υ (X))}, (4) Υ (∃R. X) = sup{S ∈ P (∆) : ∀s ∈ S∃t ∈ ∆((s, t) ∈ Υ (R) &amp; t ∈ Υ (X))}.Conceptual interpretation is a formal context provided by an interpretation function. Definition 1. Conceptual interpretation is a four-tuple (G, M, I, Υ ) where (G, M, I) is a formal context, and an interpretation function Υ = I CS ∪ I RS , where CS and RS are standard concept and role symbols, and (1) I CS : CS → B(G, M, I) maps concept symbols to formal concepts, (2) I RS : RS → 2 (G×G)∪(M ×M ) maps role symbols to binary relations. A formal context (G, M, I) or conceptual interpretation (G, M, I, Υ ) is said to be homogeneous (symmetric) if G = M (and binary relation I is symmetric in addition).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_117"><head>Definition 2 .</head><label>2</label><figDesc>Let (G, M, I, Υ ) be a conceptual interpretation, K be a formal context (G, M, I), and B = (K) be the concept lattice of K. The interpretation function Υ can be extended to all role terms in a terminological interpretation ((G ∪ M ), Υ ) in the standard manner so that Υ (R) is a binary relation on (G ∪ M ) for every role term R. The interpretation function Υ can be extended to all positive ALC concept terms as follows. (1) Υ ( ) = sup B and Υ (⊥) = inf B; (2) Υ (X Y ) = sup(Υ (X), Υ (Y )), and Υ (X Y ) = inf(Υ (X), Υ (Y )); (3) Let Υ (X) = (Ex , In ) ∈ B. Then (a) Υ (∀R. X) = sup K {(Ex, In) ∈ B : ∀o ∈ Ex ∀a ∈ In ∀o ∈ G ∃a ∈ M ((o, o ) ∈ Υ (R) ⇒ o ∈ Ex , (a, a ) ∈ Υ (R), and a ∈ In )}, (b) I(∃R. X) = sup K {(Ex, In) ∈ B : ∀o ∈ Ex ∀a ∈ In ∃o ∈ G ∀a ∈ M ((a, a ) ∈ Υ (R) ⇒ (o, o ) ∈ Υ (R), o ∈ Ex ,and a ∈ In )}. In addition, if K is a symmetric context and Υ (X) = (Ex, In) ∈ B, then Υ (¬X) = (In, Ex).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_118"><head></head><label></label><figDesc>Let K := (G, M, I) be a reduced context where G ∩ M = ∅ and K d = (M, G, I − ) be its dual context. Let also use the following notation for binary relations (on M and/or G): (1) ∅ be the empty binary relation, (2) × be a total binary relation, (3) E be the identity binary relation, (4) E c be the complement for E. We would like to combine the cross-tables of K and the dual context K d into the symmetric one in the following way: G M G ? I M I −1 ? . Let us represent the above cross-table in a shorter way as ? K K d ? and denote the corresponding symmetric context by K • := (G • , M • , I • ). Recall that B(G, M, I) is the concept lattice of the context K, B(G • , M • , I • ) is the concept lattice of the context K • . Let us use the standard notation ' ' for derivatives in the background context K but (for distinction) the notation ' • ' for derivatives in the symmetric one. We are going to fill question quadrants by different combinations of ∅, ×, E and E c . Below we study 9 of these 16 combinations. Case 1. ∅ K K d ∅ . It is the disjoint union of K and K d . The concept lattice B(K • ) = B(K . ∪ K d ) is a horizontal sum [4], i.e. the union of two sublattices B(K) and B(K d ), such that B(K) ∩ B(K d ) = {⊥, }.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_119"><head>Definition 1 .</head><label>1</label><figDesc>A set of implications Γ it is said -minimal or non-redundant if Γ \ {X → Y } is not equivalent to Γ . -minimum if if it is of least cardinality, that is, | Γ |≤| Γ | for all set of implications Γ equivalent to Γ . -optimal if || Γ ||≤|| Γ ||for all set of implications Γ equivalent to Γ , where the size of Γ is defined as|| Γ ||= {X→Y ∈Γ } (| X | + | Y |)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_120"><head>Algorithm 1 :</head><label>1</label><figDesc>Algorithm for computing a Duquenne-Guigues basis input : An LSI Φ output: A Duquenne-Guigues basis T := ∅; foreach B, mg(B) ∈ Φ do foreach A ∈ mg(B) do T := T ∪ {A → B} repeat S := T ; foreach A → B, C → D ∈ T such that A C and B ⊆ C do T := T {C → D}; if B ∪ C = D then T := T ∪ {BC → D} until T = S ; S := ∅; foreach A → B ∈ T do S := S ∪ {A → B A}; return S</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_121"><head>Definition 3 (</head><label>3</label><figDesc>Aggregation rules). Let A, B, C and D be sets of attributes.1. If A ⊆ C then {A → B, C → D} ≡ {A → B, BC → D B}. 2. If A ⊆ C ⊆ A ∪ B then {A → B, C → D} ≡ {A → BD}.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_122"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Performance of algorithms on accidents and connect data sets for various minimum support values (CPU time in seconds are measured).</figDesc><graphic coords="314,177.93,264.99,259.50,148.29" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_123"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Performance of algorithms on kosarak and retail data sets for various minimum support values (CPU time in seconds are measured).</figDesc><graphic coords="315,177.93,264.99,259.50,148.29" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>Figures on used memory (in MegaBytes)</figDesc><table><row><cell>Step</cell><cell cols="2">Parameters min max average</cell></row><row><cell></cell><cell>Nav-Undef</cell><cell>39 453 237</cell></row><row><cell>Step 1</cell><cell cols="2">Nav-noUndef 17 471 205 noNav-Undef 41 969 480</cell></row><row><cell></cell><cell cols="2">noNav-noUndef 24 969 532</cell></row><row><cell></cell><cell>Nav-Undef</cell><cell>44 471 213</cell></row><row><cell>Step 6</cell><cell cols="2">Nav-noUndef 6 403 140 noNav-Undef 33 1846 656</cell></row><row><cell></cell><cell cols="2">noNav-noUndef 33 1147 520</cell></row><row><cell>Table</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>GSHL GSHC+L</figDesc><table><row><cell>Minimum 3</cell><cell>2</cell><cell>6</cell><cell>4</cell><cell>10</cell><cell>2</cell><cell>0</cell><cell>2</cell></row><row><cell cols="4">Average 10.77 3.55 14.32 14.86</cell><cell>29.18</cell><cell>4.64</cell><cell>3.2</cell><cell>7.84</cell></row><row><cell>Maximum 27</cell><cell>9</cell><cell>32</cell><cell>40</cell><cell>68</cell><cell>13</cell><cell>14</cell><cell>24</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2 .</head><label>2</label><figDesc>CRUD matrix for a simplified library system. Reused from previous article[18].</figDesc><table><row><cell></cell><cell cols="3">Employee Reader Task Loan EmployeePosition Book</cell></row><row><cell>Manage readers</cell><cell>crud</cell><cell></cell></row><row><cell>Manage employees</cell><cell>crud</cell><cell>cd</cell></row><row><cell>Manage books</cell><cell></cell><cell></cell><cell>crud</cell></row><row><cell>Add loan</cell><cell></cell><cell>c</cell><cell>r</cell></row><row><cell>Add new task</cell><cell>r</cell><cell>c</cell></row><row><cell>Return loaned book</cell><cell></cell><cell>u</cell><cell>r</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 3 .</head><label>3</label><figDesc>Usage matrix for a simplified library system. Based on Table2.</figDesc><table><row><cell></cell><cell cols="3">Employee Reader Task Loan EmployeePosition Book</cell></row><row><cell>Manage readers</cell><cell>x</cell><cell></cell></row><row><cell>Manage employees</cell><cell>x</cell><cell>x</cell></row><row><cell>Manage books</cell><cell></cell><cell></cell><cell>x</cell></row><row><cell>Add loan</cell><cell></cell><cell>x</cell><cell>x</cell></row><row><cell>Add new task</cell><cell>x</cell><cell>x</cell></row><row><cell>Return loaned book</cell><cell></cell><cell>x</cell><cell>x</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head></head><label></label><figDesc>Average Temperature in their right-hand and the metrics related to Approximate and Purity Dependencies.</figDesc><table><row><cell>Dependency</cell><cell cols="3">#Tuples Percentage Purity</cell></row><row><cell>Month -&gt; Av. Temp</cell><cell>6</cell><cell>75%</cell><cell>12.98</cell></row><row><cell>Month, Year -&gt; Av. Temp</cell><cell>1</cell><cell>12.5%</cell><cell>4.0</cell></row><row><cell>Month, City -&gt; Av. Temp</cell><cell>4</cell><cell>50%</cell><cell>4.0</cell></row><row><cell>Year -&gt; Av. Temp</cell><cell>3</cell><cell>37.5%</cell><cell>8.26</cell></row><row><cell>Year, City -&gt; Av. Temp</cell><cell>0</cell><cell>0%</cell><cell>0.0</cell></row><row><cell>City -&gt; Av. Temp</cell><cell>4</cell><cell>50%</cell><cell>4.0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_7"><head></head><label></label><figDesc>is the direct join of two intervals [ρ 1 , ρ 2 ] and [ρ 1 , ρ 2 ] in AM F (N ) if the intervals are disconnected. The direct join is denoted by [ρ 1 , ρ 2 ] [ρ 1 , ρ 2 ].</figDesc><table><row><cell>Example 2. For N = {1, 2, 3}, we have [{{1}}, {{1, 3}}] ∨ [{{2}}, {{2, 3}}] = [{{1}, {2}}, {{1, 3}, {2, 3}}]. The element {{1}, {2}, {3}} = {{1}} ∨ {{2}, {3}} = {{1}, {3}}∨{{2}} shows that the two intervals on the lefthand side are connected. In the case of [{{1}, {3}}, {{1, 3}}]∨[{{2}, {3}}, {{2, 3}}] = [{{1}, {2}, {3}}, {{1, 3}, {2, 3}}], we see that the underlying intervals are disconnected and [{{1}, {2}, {3}}, {{1, 3}, {2, 3}}] = [{{1}, {3}}, {{1, 3}}] [{{2}, {3}}, {{2, 3}}].</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_9"><head></head><label></label><figDesc>the set of all solutions to the equation in the lattice is closed under ∧ and ∨ and hence equals the full interval [γ, o ρ,γ ]. For general ρ 2 , S γ is the intersection with [ρ 1 , ρ 2 ] which is given by [γ, o ρ,γ ∧ ρ 2 ].</figDesc><table><row><cell>The function o ρ,γ defined for any ρ ≥ γ ∈ AM F (N ) is the top of the interval [γ, o ρ,γ ] = {χ|χ ∧ ρ = γ}. It is given by</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_10"><head></head><label></label><figDesc>Algorithm 1 for the total decomposition of an interval. Examples 3, 4 and 5 illustrate how the algorithm works.</figDesc><table><row><cell>Example 3. Consider the interval [{∅}, {{1, 2}, {3}}]. Since we have {{1, 2} ∩ {3}} = {∅} ≤ {∅} so that C {∅},{{1,2},{3}} = {{{1, 2}}, {{3}}}, and [{∅}, {{1, 2}, {3}}] = [{∅}, {{1, 2}}] [{∅}, {{3}}].</cell></row><row><cell>Example 4. Consider the interval [{{4}}, {{1, 2, 4}, {3, 4}}]. Since we have {{1, 2, 4}∩ {3, 4}} = {{4}} ≤ {{4}} so that C {{4}},{{1,2,4},{3,4}} = {{{1, 2, 4}}, {{3, 4}}}, and</cell></row><row><cell>[{{4}}, {{1, 2, 4}, {3, 4}}] = [{{4}}, {{1, 2, 4}}] [{{4}}, {{3, 4}}].</cell></row><row><cell>Example 5. Consider the interval [{{4}, {6}}, {{1, 2, 4}, {3, 4}, {3, 5, 6}}]. Since we have</cell></row><row><cell>{{1, 2, 4}∩{3, 4}} = {{4}} ≤ {{4}, {6}}, {{1, 2, 4}∩{3, 5, 6}} = {∅} ≤ {{4}, {6}}, {{3, 4} ∩ {3, 5, 6}} = {{3}} ≤ {{4}, {6}}, so that C {{4},{6}},{{1,2,4},{3,4},{3,5,6}} = {{{1, 2, 4}}, {{3, 4}, {3, 5, 6}}}, and [{{4}, {6}}, {{1, 2, 4}, {3, 4}, {3, 5, 6}}] = [{{4}}, {{1, 2, 4}}] [{{4}, {6}}, {{3, 4}, {3, 5, 6}}].</cell></row><row><cell>Algorithm 1 Decompose the interval [ρ 1 , ρ 2 ]</cell></row><row><cell>Require: ρ1 ≤ ρ2 Ensure: Result is a set of intervals, {I1, I2, . . . , I k }, such that [ρ1, ρ2] = i=1...k Ii function decomposeInterval(ρ1, ρ2)</cell></row><row><cell>Compute the set Cρ 1 ,ρ 2 of connected components according to Definition 2.</cell></row><row><cell>return {[ρ1 ∧ γ, γ]|γ ∈ Cρ 1 ,ρ 2 } end function</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_11"><head></head><label></label><figDesc>Algorithm 2 Recursion formula using P-coefficients to compute |AM F (n + 2)| by enumeration of AM F (n)</figDesc><table><row><cell>Require: n ∈ N, n ≥ 0. Ensure: Result is Dedekind Number n + 2, this is the size of the space AM F (n + 2).</cell></row><row><cell>function DedekindNumber(n+2)</cell></row><row><cell>Compute the set R of nonequivalent representatives in AM F (n)</cell></row><row><cell>of equivalence classes under permutation of N .</cell></row><row><cell>Compute the cardinalities of each of the equivalence classes as Count : R− &gt; N. For each ρ ∈ R, compute the size of [∅, ρ] as Size : R− &gt; N. sum ← 0 for ρ0 ∈ AM F (n) do partialSum ← 0 for ρN ∈ R, ρN ≤ ρ0 do partialSum ← partialSum+Count(ρN ) * Size(ρN ) * 2 |C ρ N \ρ 0 ,ρ 0 \ρ N | end for</cell></row><row><cell>sum ← sum + partialSum  *  |[ρ0, {N }]| end for</cell></row><row><cell>return sum.</cell></row><row><cell>end function</cell></row><row><cell>6 Conclusions and Future Research</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_13"><head>Table 1 .</head><label>1</label><figDesc>Sample</figDesc><table /><note>context Fig. 1. Panel 4 from Table</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_15"><head>Table 1 .</head><label>1</label><figDesc></figDesc><table><row><cell>Classical + TreeSet</cell><cell>3.06</cell><cell>11767.52</cell><cell>549.76</cell><cell>|I| = 848 994.00</cell></row><row><cell>Classical + BitSet</cell><cell>0.77</cell><cell>196.58</cell><cell>62.39</cell><cell>9.77</cell></row><row><cell>LOA + TreeSet</cell><cell>0.29</cell><cell>11.26</cell><cell>5.65</cell><cell>1183.75</cell></row><row><cell>LOA + BitSet</cell><cell>0.02</cell><cell>0.15</cell><cell>0.24</cell><cell>1.20</cell></row></table><note>Intent: Attributes, Extent: Observations Immediate successors Immediate predecessors |O| = 848 |O| = 848 |O| = 100 |O| = 3533 |I| = 100 |I| = 3533 |I| = 848</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_16"><head>Table 3 .</head><label>3</label><figDesc>Computation time (in seconds) of the immediate successors of ⊥ and immediate predecessors of .</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_17"><head>Table 1 .</head><label>1</label><figDesc>List of lattice properties</figDesc><table><row><cell></cell><cell>Types of Lattices</cell></row><row><cell>Atomistic</cell><cell>Every join-irreducible element of L is an atom</cell></row><row><cell>Co-atomistic</cell><cell>Every meet-irreducible element is covered by 1L</cell></row><row><cell>Ranked</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_18"><head>Table 3 .</head><label>3</label><figDesc>Some FCA software tools (taken from[18])</figDesc><table><row><cell>Program title</cell><cell>Authors</cell><cell>Web-site</cell></row><row><cell>Concept Explorer</cell><cell>S.A. Yevtushenko [25]</cell><cell>conexp.sourceforge.net</cell></row><row><cell>Galicia</cell><cell>P. Valtchev et al. [23]</cell><cell>www.iro.umontreal.ca/ ~galicia</cell></row><row><cell>ToscanaJ</cell><cell>U. of Queensland, TU Darmstadt [24]</cell><cell>toscanaj.sourceforge.net</cell></row><row><cell>FcaStone</cell><cell>U. Priss et al. [21]</cell><cell>fcastone.sourceforge.net</cell></row><row><cell>Lattice Miner</cell><cell>B. Lahcen et al. [17]</cell><cell>lattice-miner.sourceforge.net</cell></row><row><cell>Conexp-clj</cell><cell>TU-Dresden, D. Brochman</cell><cell>daniel.kxpq.de/math/conexp-clj</cell></row><row><cell>OpenFCA</cell><cell>P. Borza, O. Sabou et al. [8]</cell><cell>code.google.com/p/openfca</cell></row><row><cell>FCART</cell><cell>A. Neznanov and D. Ilvovsky [18]</cell><cell></cell></row><row><cell cols="2">6 Concluding Remarks</cell><cell></cell></row></table><note>CryptoLat is a pedagogical and research oriented software in active development phase, and it is open source and freely available. It is still in alpha testing, and the next milestone of development is to make it cloud based with a web interface.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_20"><head></head><label></label><figDesc>1 , Florence Le Ber 1 , and Marianne Huchard 2</figDesc><table><row><cell>(1) ICube, Université de Strasbourg/ENGEES, CNRS, Strasbourg,</cell></row><row><cell>{xavier.dolques , florence.leber}@engees.unistra.fr</cell></row><row><cell>(2) LIRMM, Université de Montpellier 2 et CNRS</cell></row><row><cell>huchard@lirmm.fr</cell></row></table><note>Abstract. Relational Concept Analysis (RCA) is a useful tool for classication and rule discovery on sets of objects with relations.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_21"><head>Table 1</head><label>1</label><figDesc></figDesc><table /><note>is a Formal Context K Animals = (G Animals , M Animals , I Animals ) which</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_22"><head>Table 1 .</head><label>1</label><figDesc>Formal Context of animals described by their life traits K Animals</figDesc><table><row><cell>size (1-2cm) (att0)</cell><cell>resistance to dessication (att1)</cell><cell>Micro-habi-tat in sand (att2)</cell><cell>reproduc-tion clutches terrestrial (att3)</cell><cell>transversal distribution in lakes (att4)</cell><cell>transversal distribution on banks (att5)</cell></row><row><cell>Anc.</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_24"><head>Table 2 .</head><label>2</label><figDesc>Relation rcontains contains Anc. Ani. Ano. Ant. Aph. Ase. Ath.</figDesc><table><row><cell>Site0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_26"><head>Table 3 .</head><label>3</label><figDesc>Existential Scaling of Formal Context of sites S ∃ (KSites, contains, C Animals ). ca_i is a short expression for ∃ contains(ca_i).</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_27"><head>Table 1 .</head><label>1</label><figDesc>Execution time examples</figDesc><table><row><cell cols="8">No. Ob j No. Att Density Concepts Query Time Ordering Dendritical Total</cell></row><row><cell>1000</cell><cell>36</cell><cell>17</cell><cell>8377</cell><cell>722ms</cell><cell>20ms</cell><cell>49ms</cell><cell>791ms</cell></row><row><cell>1000</cell><cell>49</cell><cell>14</cell><cell>14190</cell><cell>924ms</cell><cell>67ms</cell><cell>101ms</cell><cell>1092ms</cell></row><row><cell>1000</cell><cell>81</cell><cell>11</cell><cell>26065</cell><cell>1853ms</cell><cell>124ms</cell><cell>201ms</cell><cell>2178ms</cell></row></table><note>Algorithms time when density becomes higher and the number of attributes become lower. Those tests shows the increase in execution when attributes and I ⊆ G × M are modied.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_28"><head>‹</head><label></label><figDesc>Supported by the ESF project No. CZ.1.07/2.3.00/20.0059, the project is cofinanced by the European Social Fund and the state budget of the Czech Republic. ‹‹ Supported by Spanish Ministry of Science and FEDER funds through project TIN09-14562-C05-01 and Junta de Andalucía project P09-FQM-5233.</figDesc><table /><note>c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 153-162, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_29"><head></head><label></label><figDesc>an extendable i-morphism then there exists an L-relation A P L XˆY such that hpCq " C ˝A for every C P L Y .2. LetA P L XˆY , the mapping h A : L X Ñ L Y defined by h A pCq " C˝A " C X Ais an extendable i-morphism. 3. Consider two contexts xX, Y, Iy and xF, Y, By. Then, we have IntpX X , Y Y , Iq Ď IntpF X , Y Y , Bq if and only if there exists A P L XˆF such that I " A ˝B, 4. Consider two contexts xX, Y, Iy and xX, F, Ay. Then, we have ExtpX X , Y Y , Iq Ď ExtpX X , F Y , Aq if and only if there exists B P L F ˆY such that I " A ˝B. Theorem 1. The weak L-bonds between K 1 " xX 1 , Y 1 , I 1 y and K 2 " xX 2 , Y 2 , I 2 y are in one-to-one correspondence with extendable</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_30"><head></head><label></label><figDesc>1 , I 1 y and K 2 " xX 2 , Y 2 , I 2 y is an L-relation β P L X1ˆY2 s.t. β is a weak L-bond w.r.t. both xX, Yy and x^, _y.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_32"><head></head><label></label><figDesc>Data schema example from the ICH domainfollows: table R 1 inherits from table R 2 iff R 2 ⊂ R 1 and R 1 .P K = R 2 .P K, i.e.table R 1 contains all the fields in table R 2 and they share the same primary key. Figure 2 illustrates a data schema example S = {Festive Event, Ritual , Agent, Individual Agent, Collective Agent} where arrows represent relation between two tables and a line with a rhombus at the end represents inheritance. Table Ritual can be represented as Ritual(id ritual, name, description, views, place, id agent) where dom(name) = string, Ritual.id ritual is the primary key of table Ritual and Ritual.id agent is a foreign key relating Ritual with Agent. The example also shows that Individual Agent and Collective Agent inherit from table Agent, meaning that all the attributes from table Agent are also present in tables Individual Agent and Collective Agent.</figDesc><table><row><cell>Ritual id_ritual name descrip4on views place id_agent</cell><cell>Agent id_agent rut_number background phone name address email</cell><cell>Fes+ve Event id_fest name descrip4on background views dura4on id_agent</cell></row><row><cell>Individual Agent</cell><cell></cell><cell>Collec+ve Agent</cell></row><row><cell>birthday</cell><cell></cell><cell>establishment</cell></row><row><cell>gender</cell><cell></cell><cell>gender_composi4on</cell></row><row><cell>Fig. 2:</cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_33"><head></head><label></label><figDesc>then we simply do not take into consideration that table nor we create the scaled relation related to:R i .</figDesc><table><row><cell>id</cell><cell>rut number</cell><cell>email</cell><cell>phone</cell><cell>name</cell><cell>address</cell><cell>background</cell><cell>description</cell><cell>views</cell><cell>place</cell><cell>related to:Agent</cell><cell>birthday</cell><cell>gender</cell><cell>establishment</cell><cell>gender composition</cell><cell>duration</cell></row><row><cell>Agent</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table><note>related to:R i ) ∈ IIn the case the table R i pointed to by a foreign key do not exist in S,</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_34"><head>Table 1 :</head><label>1</label><figDesc>Formal context created from the data schema example</figDesc><table><row><cell>4 Second Step of the CKDD process: Formal Concept</cell></row><row><cell>Analysis</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_36"><head>Table 1 :</head><label>1</label><figDesc>C W</figDesc><table><row><cell>athlete</cell><cell>undergraduate</cell><cell>wants kids</cell><cell>is attractive</cell></row><row><cell cols="4">Abby Becky × Claire Daphne × × × × × × × × × ×</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_37"><head>Table 2 :</head><label>2</label><figDesc>C M</figDesc><table><row><cell>athlete</cell><cell>undergraduate</cell><cell>wants kids</cell><cell>is attractive</cell></row><row><cell cols="4">Adam × Ben Carl × × × × × Dave × × ×</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_38"><head>Table 3 :</head><label>3</label><figDesc>R C W C M</figDesc><table><row><cell>athlete</cell><cell>undergraduate</cell><cell>wants kids</cell><cell>is attractive</cell></row><row><cell>Abby</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_39"><head></head><label></label><figDesc>table C W are: Claire, Daphne}, {undergraduate, is attractive} Factors of data table C M are:</figDesc><table><row><cell>-F W 1 = {Abby, Daphne}, {undergraduate, wants kids, is attractive} -F W 2 = {Becky, Daphne}, {athlete, wants kids} -F W 3 = {Abby,</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_40"><head></head><label></label><figDesc>Remark 3. Not all factors from data tables C W or C M must be present in any relational factor. It depends on the used relation. For example in Example 1 in narrow approach, the factors F 2 M , F 3 M , F 4 M are not involved. In this case, we can add these simple factors to the set of relational factors and consider two types of factors. This factors are not pair factors, but classical factors from C W or C M . Of course this depends on a particular application. Remark 4. For one factor F i 1 from the data table C 1 , two factors from the data table C 2 (for example F j1 2 and F j2 2 ) can satisfy the relation. In this case we can add factor F i</figDesc><table><row><cell>1 , F j1 2 &amp;F j2 2 , where F j1 2 &amp;F j2 2 means</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_41"><head>Table 4 :</head><label>4</label><figDesc>C P</figDesc><table><row><cell>European</cell><cell>Asian</cell><cell>American</cell><cell>male</cell><cell>female</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_42"><head>Table 6 :</head><label>6</label><figDesc>C C</figDesc><table><row><cell>vegetable</cell><cell>fruit</cell><cell>fish</cell><cell>sea food</cell><cell>legumes</cell><cell>mutton</cell><cell>lamb</cell><cell>olive</cell><cell>vine</cell><cell>herbs</cell><cell>cheese</cell><cell>mushroom</cell><cell>hot spice</cell><cell>rice</cell><cell>beef</cell><cell>pork</cell><cell>poultry</cell><cell>bamboo shoot</cell><cell>nut</cell><cell>lard</cell><cell>rabbit</cell><cell>venison</cell><cell cols="2">insides corn</cell><cell>pasta/noodle</cell><cell>potato</cell><cell>pastry</cell></row><row><cell>1</cell><cell>2</cell><cell>3</cell><cell>4</cell><cell>5</cell><cell>6</cell><cell>7</cell><cell>8</cell><cell>9</cell><cell>10</cell><cell>11</cell><cell>12</cell><cell>13</cell><cell>14</cell><cell>15</cell><cell>16</cell><cell>17</cell><cell>18</cell><cell>19</cell><cell>20</cell><cell>21</cell><cell>22</cell><cell>23</cell><cell>24</cell><cell>25</cell><cell>26</cell><cell>27</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_43"><head>Table 7 :</head><label>7</label><figDesc>R C P C C</figDesc><table><row><cell>vegetable</cell><cell>fruit</cell><cell>fish</cell><cell>sea food</cell><cell>legumes</cell><cell>mutton</cell><cell>lamb</cell><cell>olive</cell><cell>vine</cell><cell>herbs</cell><cell>cheese</cell><cell>mushroom</cell><cell>hot spice</cell><cell>rice</cell><cell>beef</cell><cell>pork</cell><cell>poultry</cell><cell>bamboo shoot</cell><cell>nut</cell><cell>lard</cell><cell>rabbit</cell><cell>venison</cell><cell cols="2">insides corn</cell><cell>pasta/noodle</cell><cell>potato</cell><cell>pastry</cell></row><row><cell>1</cell><cell>2</cell><cell>3</cell><cell>4</cell><cell>5</cell><cell>6</cell><cell>7</cell><cell>8</cell><cell>9</cell><cell>10</cell><cell>11</cell><cell>12</cell><cell>13</cell><cell>14</cell><cell>15</cell><cell>16</cell><cell>17</cell><cell>18</cell><cell>19</cell><cell>20</cell><cell>21</cell><cell>22</cell><cell>23</cell><cell>24</cell><cell>25</cell><cell>26</cell><cell>27</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_44"><head>Table 7 )</head><label>7</label><figDesc>represents relationship "person likes ingredients" and relation R C R C C (Table8) represents relationship "restaurant cooks national cuisine". In Tables 9, 10, 11, we can see factors of data tables C P , C R and C C , respectively.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_45"><head>Table 8 :</head><label>8</label><figDesc>R C R C C</figDesc><table><row><cell>Greek</cell><cell>Chinese</cell><cell>French</cell><cell>Indian</cell><cell>Czech</cell><cell>Spanish</cell><cell>Mexican</cell><cell>Italian</cell><cell>American</cell><cell>Japanese</cell><cell>German</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_46"><head>Table 9 :</head><label>9</label><figDesc>Factors of data table C P</figDesc><table><row><cell>F i P Extent</cell><cell>Intent</cell></row><row><cell cols="2">F 1 P {Adam, Ben, Dale, Frank} {male} F 2 P {Adam, Emily, Frank} {American} F 3 P {Carol, Emily, Gabby} {female} F 4 P {Ben, Carol} {European} F 5 P {Dale, Gabby} {Asian}</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_47"><head>Table 10 :</head><label>10</label><figDesc>Factors of data table C R</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_48"><head>Table 11 :</head><label>11</label><figDesc>Factors of data table C C</figDesc><table><row><cell>F i C Extent</cell><cell>Intent</cell></row><row><cell cols="2">F 1 C {Chinese, French, Spanish, Mexican, American, German} {1, 3, 15, 16, 17} F 2 C {Greek, Spanish, Italian} {1, 2, 3, 4, 8, 9, 10} F 3 C {French, Czech} {1, 10, 11, 12, 15, 16, 17, 21, 22, 23} F 4 C {Chinese, Indian, Spanish, Mexican, Italian, Japanese} {1, 3, 4, 14} F 5 C {Greek, French, Indian} {1, 3, 4, 6, 7} F 6 C {Chinese} {1, 3, 4, 5, 12, 13, 14, 15, 16, 17, 18, 19, 20, 25} F 7 C {Italian, American} {1, 3, 4, 11, 27} F 8 C {Greek, Czech, Mexican} {1, 2, 5} F 9 C {Indian, Mexican} {1, 2, 3, 4, 13, 14, 17} F 10 C {Czech, Itelian, German} {1, 2, 12} F 11 C {Czech, , American} {1, 15, 16, 17, 26} F 12 C {Greek} {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 19} F 13 C {Greek, French, Spanish, Italian} {1, 3, 4, 9, 10} F 14 C {Chinese, Czech} {1, 5, 12, 15, 16, 17, 20} F 15 C {French, Czech, German} {1, 12, 15, 16, 17, 22} F 16 C {Mexican} {1, 2, 3, 4, 5, 13, 14, 15, 16, 17, 24} F 17 C {Chinese, Itelian} {1, 3, 4, 12, 14, 25}</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_49"><head>Table 1 :</head><label>1</label><figDesc>Toy sequential data on patient medical trajectories. set of hospital names T H = {H 1 , H 2 , H 3 , H 4 , CL, CH, * }, where hospital names are hierarchically organized (by the level of generality), H 1 and H 2 are central hospitals (CH) and H 3 and H 4 are clinics (CL), and * denotes the root of this hierarchy. For the sake of simplicity, we use the operator in order to denote the least common ancestor in T H , i.e. H 1 H 2 = CH. Every hospitalization is described with one hospital name and may contain several procedures. The procedure order in each hospitalization is not important in our case. For example, the first hospitalization [H 2 , {c, d}] for the second patient (p 2 ) was in hospital H 2 and during this hospitalization the patient underwent procedures c and d.</figDesc><table><row><cell cols="2">Patient Trajectory</cell></row><row><cell>p 1 p 2 p 3</cell><cell>[H1, {a}]; [H1, {c, d}]; [H1, {a, b}]; [H1, {d}] [H2, {c, d}]; [H3, {b, d}]; [H3, {a, d}] [H4, {c, d}]; [H4, {b}]; [H4, {a}]; [H4, {a, d}]</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_51"><head></head><label></label><figDesc>Subsequences ss 1 [CH, {c, d}]; [H1, {b}]; [ * , {d}] ss 2 [CH, {c, d}]; [ * , {b}]; [ * , {d}] ss 3 [CH, {}]; [ * , {d}]; [ * , {a}] ss</figDesc><table /><note>4 [ * , {c, d}]; [ * , {b}] ss 5 [ * , {a}] ss 6 [ * , {c, d}]; [CL, {b}]; [CL, {a}] ss 7 [CL, {d}]; [CL, {}] ss 8 [CL, {}]; [CL, {a, d}] ss 9 [CH, {c, d}] ss 10 [CL, {b}]; [CL, {a}] ss 11 [ * , {c, d}]; [ * , {b}] ss 12 [ * , {a}]; [ * , {d}]</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_52"><head>Table 2 :</head><label>2</label><figDesc>Subsequences of patient sequences in Table</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_53"><head></head><label></label><figDesc>is supported by EU FP7 project LiMoSINe (contract 288024). CPM has been partially supported by the Spanish Government-Comisión Interministerial de Ciencia y Tecnología project TEC2011-26807 for this paper.</figDesc><table /><note>c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 211-224, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_54"><head>Table 1 .</head><label>1</label><figDesc>Noised contexts.</figDesc><table><row><cell cols="2">Context # triples Density</cell></row><row><cell>p = 0</cell><cell>3000 0.1111</cell></row><row><cell>p = 0.1</cell><cell>5069.6 0.1873</cell></row><row><cell>p = 0.2</cell><cell>7169.4 0.2645</cell></row><row><cell>p = 0.3</cell><cell>9290.2 0.3440</cell></row><row><cell cols="2">p = 0.4 11412.8 0.4222</cell></row><row><cell cols="2">p = 0.5 13533.4 0.5032</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_55"><head>Table 2 .</head><label>2</label><figDesc>Contexts for the experiments with 5 chosen evaluation measures.</figDesc><table><row><cell cols="2">Context |G| |M | |B| # triples Density Uniform 30 30 30 2660 0.0985</cell></row><row><cell>IMDB 250 795 22</cell><cell>3818 0.00087</cell></row><row><cell>BibSonomy 51 924 2844</cell><cell>3000 0.000022</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_56"><head>Table 3 .</head><label>3</label><figDesc>Results of the experiments on the computation time (t), tricusters count (n), density (ρ), coverage (Cov), and diversity (Div).</figDesc><table><row><cell>Algorithm</cell><cell cols="2">t, ms tpar, ms</cell><cell cols="7">n ρav, % Cov, % Div, % DivG, % DivM , % DivB, %</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="3">Uniform random context</cell><cell></cell><cell></cell></row><row><cell>OAC ( )</cell><cell>407</cell><cell>196</cell><cell>73</cell><cell cols="2">9.88 100.00</cell><cell>0.00</cell><cell>0.00</cell><cell>0.00</cell><cell>0.00</cell></row><row><cell>OAC ( )</cell><cell>312</cell><cell cols="5">877 2659 32.23 100.00 92.51</cell><cell>60.07</cell><cell>59.80</cell><cell>59.45</cell></row><row><cell>SpecTric</cell><cell>277</cell><cell>-</cell><cell>5</cell><cell>8.74</cell><cell cols="5">8.84 100.00 100.00 100.00 100.00</cell></row><row><cell>TriBox</cell><cell>6218</cell><cell cols="5">1722 1011 74.00 96.02 97.42</cell><cell>66.25</cell><cell>79.53</cell><cell>84.80</cell></row><row><cell>Trias</cell><cell>29367</cell><cell cols="5">-38356 100.00 100.00 99.99</cell><cell>99.93</cell><cell>4.07</cell><cell>3.51</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>IMDB</cell><cell></cell><cell></cell><cell></cell></row><row><cell>OAC ( )</cell><cell>2314</cell><cell cols="2">1573 1500</cell><cell cols="3">1.84 100.00 15.65</cell><cell>9.67</cell><cell>0.70</cell><cell>7.87</cell></row><row><cell>OAC ( )</cell><cell>547</cell><cell cols="5">2376 1274 53.85 100.00 96.55</cell><cell>94.56</cell><cell>92.14</cell><cell>28.52</cell></row><row><cell>SpecTric</cell><cell>98799</cell><cell>-</cell><cell cols="7">21 17.07 20.88 100.00 100.00 100.00 100.00</cell></row><row><cell>TriBox</cell><cell cols="6">197136 55079 328 91.65 98.90 98.89</cell><cell>98.46</cell><cell>95.21</cell><cell>30.94</cell></row><row><cell>Trias</cell><cell>102554</cell><cell cols="5">-1956 100.00 100.00 99.89</cell><cell>99.69</cell><cell>52.52</cell><cell>26.18</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">BibSonomy</cell><cell></cell><cell></cell></row><row><cell>OAC ( )</cell><cell>19297</cell><cell cols="2">6803 398</cell><cell cols="3">4.16 100.00 79.59</cell><cell>67.28</cell><cell>42.83</cell><cell>79.54</cell></row><row><cell cols="2">OAC ( ) 13556</cell><cell cols="5">9400 1289 94.66 100.00 99.74</cell><cell>88.58</cell><cell>99.51</cell><cell>99.53</cell></row><row><cell cols="2">SpecTric 5906563</cell><cell>-</cell><cell>2</cell><cell cols="6">50 100.00 100.00 100.00 100.00 100.00</cell></row><row><cell>TriBox</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>&gt; 24 hrs</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Trias</cell><cell>110554</cell><cell cols="5">-1305 100.00 100.00 99.98</cell><cell>91.70</cell><cell>99.78</cell><cell>99.92</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_57"><head></head><label></label><figDesc>1. {The Princess Bride (1987), Pirates of the Caribbean: The Curse of the Black Pearl (2003)}, {Pirate}, {Fantasy, Adventure} 2. {Platoon (1986), Letters from Iwo Jima (2006)}, {Battle}, {Drama, War} 3. {V for Vendetta (2005)}, {Fascist, Terrorist, Government, Secret Police , Fight}, {Action, Sci-Fi, Thriller}SpecTric has displayed rather good computation time only for small contexts.Most of this time is used for the eigenvalue decomposition of Laplacian matrix.Thus we intend to test some alternative linear algebra libraries in the toolbox and compare the results as well. The resulting triclusters can be reasonably interpreted, though their average density is low. Their small number makes this method good for dividing the context into several non-overlapping parts. Also the diversities for SpecTric are always equal to 1 because the method generates partitions of the initial context. High diversity though leads to low coverage.TriBox in this study generates the best triclusters. The only drawback of this method is high computation time, though the use of the parallel version of TriBox can significantly lower it for multi-core processors. Average density of the resulting triclusters is rather high, they have good interpretability. Coverage and diversities are also high in most of the cases. The only exception is set diversity in the situation when some of the sets are small, just as for Trias.Prime OAC-triclustering showed rather good results. It is one of the fastest algorithms (though some additional optimizations specified for unparallel version made parallelization inefficient for small contexts). The number of triclusters is high, but they are easily interpreted. Once again for ρ min = 0 coverage is equal to 1, but remains high for different ρ min . At the same time diversities are also rather high. Examples of the triclusters for the IMDB context are given below: 1. 36%, {The Shawshank Redemption (1994), Cool Hand Luke (1967), American History X (1998), A Clockwork Orange (1971), The Green Mile (1999)}, {Prison, Murder, Friend, Shawshank, Banker}, {Crime, Drama} 2. 56, 67%, {The Godfather: Part II (1974), The Usual Suspects (1995)}, {Cuba, New York, Business, 1920s, 1950s}, {Crime, Drama, Thriller} 3. 60%, {Toy Story (1995), Toy Story 2 (1999)}, {Jealousy, Toy, Spaceman, Little Boy, Fight}, {Fantasy, Comedy, Animation, Family, Adventure}</figDesc><table><row><cell>2. 1.07%, {The Great Escape (1963), Star Wars: Episode VI -Return of the Jedi (1983), Jaws (1975), Batman Begins (2005), Blade Runner (1982), Die Hard</cell></row><row><cell>(1988),. . . , Metropolis (1927), Sin City (2005), Rebecca (1940)}, {Prison, Murder, Cuba, FBI, Serial Killer, Agent, Psychiatrist,. . . , Shower, Alimony,</cell></row><row><cell>Examples of the triclusters for the IMDB context: Phoenix Arizona, Assassin, Widow}, {Drama, Thriller, War}</cell></row><row><cell>1. ρ = 23.08%, {Alien (1979), The Shining (1980), The Thing (1982), The Ex-orcist (1973)}, {Spaceship, Egg, Parasite, Creature, Caretaker, Colorado, Ac-tress, Blood, Helicopter, Scientist, Priest, Washington D.C., Faith}, {Horror} 2. ρ = 2.09%, {The Shawshank Redemption (1994), The Godfather (1972), The Godfather: Part II (1974), . . . , Bonnie and Clyde (1967), Arsenic and Old</cell></row><row><cell>Lace (1944)}, {Prison, Cuba, Business, 1920s, . . . , Texas, Cellar}, {Crime, Thriller }</cell></row><row><cell>Examples of the triclusters for the IMDB context:</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_58"><head>Table 1 .</head><label>1</label><figDesc>Running time (in seconds) of determining the cover relation of concept lattice and numbers of formal concepts for selected datasets.</figDesc><table><row><cell>dataset</cell><cell cols="2">size fill ratio #concepts</cell><cell>orig. object ordering random object ordering Alg. 2 AddInt. FCbO Alg. 2 AddInt. FCbO</cell></row><row><cell cols="2">mushroom anon. web T10I4D100K 100000 × 1000 1.010 % 8124 × 119 19.167 % 32711 × 296 1.019 %</cell><cell cols="2">238710 10.010 129009 2.860 2347376 453.060 342.966 55.523 452.893 343.056 55.490 9.760 0.830 11.025 8.061 0.919 6.540 1.326 2.841 6.521 1.306</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_59"><head>Table 2 .</head><label>2</label><figDesc>Running time (in seconds) of computing all formal concepts or concept lattice when processing input data incrementally and numbers of formal concepts computed in total for selected datasets.see from the comparison with FCbO algorithm, as to the rest expected, that determining the cover relation takes considerably more time than computing just the set of the formal concepts. Also, ordering of objects in the benchmark datasets makes almost no difference in the running times.</figDesc><table><row><cell cols="2">dataset #concepts in total</cell><cell cols="6">orig. object ordering merged alg. AddInt. Alg. 1 merged alg. AddInt. random object ordering Alg. 1</cell></row><row><cell>mushroom</cell><cell>9577435</cell><cell>130.746</cell><cell cols="2">9.760 128.993</cell><cell>284.983</cell><cell cols="2">8.061 284.130</cell></row><row><cell>anon. web</cell><cell>992259</cell><cell>41.386</cell><cell>6.540</cell><cell>41.320</cell><cell>41.342</cell><cell>6.521</cell><cell>41.077</cell></row><row><cell>T10I4D100K</cell><cell>14240918</cell><cell cols="3">2389.180 342.966 2384.160</cell><cell cols="3">2388.793 343.056 2378.703</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_61"><head>1</head><label></label><figDesc>Order Pruned Context objects into layers based on increasing number of attributes; 2 Construct a directed graph with objects identified as vertices and edges that connect vertices to their immediate successors in the layer with the smallest increase in number of attributes; 3 Construct a web site in which each page contains information on a single vertex and has links to the immediate successors; 4 Search Successful := False; Done := False; 5 Select page with the vertex that has no attributes and all objects; 6 while not Done loop 7 User selects pages from the links on the current page; 8 if selected page has only one IO then 9 if IO is User Target then</figDesc><table><row><cell>10</cell><cell>Search Successful := True;</cell></row><row><cell>11</cell><cell>Done := True;</cell></row><row><cell>12</cell><cell>else</cell></row><row><cell>13</cell><cell>Done := True;</cell></row><row><cell>14</cell><cell>end if;</cell></row><row><cell>15</cell><cell>end if;</cell></row><row><cell cols="2">16 end loop;</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_62"><head>Table 1 :</head><label>1</label><figDesc>Basic changes in a lattice.</figDesc><table><row><cell>Strategies</cell><cell cols="3">NOMC NODC NONC</cell></row><row><cell>1.1 Move c4 down to c7</cell><cell>2</cell><cell>2</cell><cell>2</cell></row><row><cell>1.2 Move c4 down to c9</cell><cell>2</cell><cell>2</cell><cell>2</cell></row><row><cell>2.1 Move c4 up to c0</cell><cell>0</cell><cell>3</cell><cell>0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_63"><head>Table 2 :</head><label>2</label><figDesc>Strategies for removing concept c4 associated with the number of modified concepts (NOMC), the number of deleted concepts (NODC) and the number of new concepts (NONC) between the current lattice and the new one.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_64"><head></head><label></label><figDesc>. A c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 299-304, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_65"><head>Table 1 .</head><label>1</label><figDesc>The characteristics of data sets.</figDesc><table><row><cell>Dataset</cell><cell cols="4"># Transactions # Items Density (%) Small/Big</cell></row><row><cell>Accidents</cell><cell>340183</cell><cell>468</cell><cell>33.8</cell><cell>Big</cell></row><row><cell>Car Evaluation</cell><cell>1728</cell><cell>25</cell><cell>28</cell><cell>Small</cell></row><row><cell>Connect</cell><cell>67557</cell><cell>129</cell><cell>43</cell><cell>Big</cell></row><row><cell>Kosarak</cell><cell>990002</cell><cell>41270</cell><cell>8.1</cell><cell>Big</cell></row><row><cell>Mushroom</cell><cell>8124</cell><cell>119</cell><cell>23</cell><cell>Small</cell></row><row><cell>Retail</cell><cell>88162</cell><cell>16469</cell><cell>10.3</cell><cell>Big</cell></row><row><cell>Tic-tac-toe</cell><cell>958</cell><cell>29</cell><cell>34</cell><cell>Small</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_66"><head>Table 2 .</head><label>2</label><figDesc>Performance of algorithms for mining closed frequent itemsets with the minimum support equal to 0 (CPU time in seconds).</figDesc><table><row><cell></cell><cell cols="3">Car Evaluation Mushroom Tic-tac-toe</cell></row><row><cell># Formal concepts</cell><cell>12640</cell><cell>238710</cell><cell>59505</cell></row><row><cell>Afopt</cell><cell>0.13</cell><cell>5.083</cell><cell>1.006</cell></row><row><cell>Apriori</cell><cell>0.04</cell><cell>-</cell><cell>0.25</cell></row><row><cell>Carpenter</cell><cell>0.71</cell><cell>-</cell><cell>1.646</cell></row><row><cell>DCI Closed</cell><cell>0.023</cell><cell>-</cell><cell>0.05</cell></row><row><cell>Eclat</cell><cell>0.02</cell><cell>0.976</cell><cell>0.143</cell></row><row><cell>FCbO</cell><cell>0.02</cell><cell>0.803</cell><cell>0.13</cell></row><row><cell>FPClose</cell><cell>0.056</cell><cell>1.586</cell><cell>0.36</cell></row><row><cell>In-Close2</cell><cell>0.043</cell><cell>2.583</cell><cell>-</cell></row><row><cell>LCM</cell><cell>0.02</cell><cell>1.363</cell><cell>0.086</cell></row><row><cell>Mafia</cell><cell>0.243</cell><cell>39.746</cell><cell>2.64</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">The usual terms in the FCA domain are "objects" and "attributes"; we prefer not using them here because they conict with the vocabulary of class models.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_1">A practical appl. of Relational Concept Analysis to class model factorization</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_2">http://www.objecteering.com/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_3">http://code.google.com/p/erca/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_4">Abdoulkader Osman Guédi et al.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_5">http://www.jetsgo.net/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_6">http://wiki.ow2.org/salome-tmf/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_7">Ants Torim   </note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_8">Galois Sub-Hierarchies Used for Use Case Modeling</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_9">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 33-44, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_10">Jaume Baixeries, Mehdi Kaytoue and Amedeo Napoli</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_11">Computing Similarity Dependencies with Pattern Structures</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_12">Enumerating Pseudo-Intents in a Partial Order</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_13">Alexandre Bazin and Jean-Gabriel Ganascia</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_14">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 57-67, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_15">Patrick De Causmaecker and Stefan De Wannemacker</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_16">Decomposition of Intervals in the Space of Anti-Monotonic Functions</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_17">Here the span of an anti-monotonic function is the set of elements occurring in true sets of the function, i.e. span(α) = X∈α X</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_18">This is a restricted definition of the × operator discussed extensively in[9]. This paper introduces an effective enumeration technique which can be used in to sum over the space AM F (N ).</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_19">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 81-92, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_20">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 93-103, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_21">Any λ-Chu correspondence ϕ can be conveniently denoted by λ, ϕ .</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_22">Ondrej Krídlo and Manuel Ojeda-Aciego</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="114" xml:id="foot_23">Ondrej Krídlo and Manuel Ojeda-Aciego</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_24">Ondrej Krídlo, Patrik Mihalčin, Stanislav Krajči and Lubomír Antoni</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_25">http://engees-fresqueau.unistra.fr/ c paper author(s),</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2013" xml:id="foot_26">. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 129-140, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_27">Xavier Dolques, Florence Le Ber and Marianne Huchard</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_28">AOC-posets: a scalable alternative to Concept Lattices for Rel. Conc. Anal.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_29">rather than a concept lattice built on Ki r in[7].AOC-posets: a scalable alternative to Concept Lattices for Rel. Conc. Anal.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_30">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 141-152, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_31">Computing the Concept Lattice using Dendritical Neural Networks</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_32">David Ernesto Caro-Contreras and Andres Mendez-Vazquez</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_33">Jan Konecny and Manuel Ojeda-Aciego</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_34">http://www.consejodelacultura.cl</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_35">United nations educational, scientific and cultural organization.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_36">http://en.wikipedia.org/wiki/Convention_for_the_Safeguarding_of_ Intangible_Cultural_Heritage c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 163-174, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_37">Renzo Stanley, Hernán Astudillo, Víctor Codocedo and Amedeo Napoli</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_38">A low stability in a singled-object attribute concept may indicate that the table should be split in two or more different tables. We do not address this issue in this work</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_39">Resource Description Framework (RDF) is a standard specification for semantic web and linked data based on triples http://www.w3.org/RDF/.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_40">Resource Description Framework Schema (RDFS) is an extension of RDF which supports classes, properties and more complex definitions.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_41">A Conceptual-KDD approach and its application to cultural heritage</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_42">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 175-186, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_43">When there is no ambiguity, an analogical proportion is also called a proportion.Analogical proportions and the factorization of information in distrib. lattices</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_44">We denote the complement in 2 Σ with an overline Analogical proportions and the factorization of information in distrib. lattices</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_45">Nelly Barbot, Laurent Miclet and Henri Prade</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_46">Analogical proportions and the factorization of information in distrib. lattices</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_47">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 187-198, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_48">Boolean Factor Analysis of Multi-Relational Data</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_49">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 199-210, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_50">On Projections of Sequential Pattern Structures (with an appl. on care traj.)</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_51">In this paper we consider two semilattices, the first one is related to the characters of the alphabet, (E, E ), and the second one is related to pattern structures, (D, ).</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_52">Francisco José Valverde-Albacete and Carmen Peláez-Moreno</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_53">∼ = F(G A ) V (A) = FEV 1, (A) 3 ∼ = O(G A ) .(7)</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_54">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 225-235, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_55">On information retrieval in morphological image and signal processing</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_56">Cristina Alcalde et al.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_57">http://linkeddata.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_58">http://www.w3.org/TR/sparql11-query/ c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 237-248, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_59">http://www.ihtsdo.org/snomed-ct/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_60">http://ncit.nci.nih.gov/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_61">Melisachew Wudage Chekol, Mehwish Alam and Amedeo Napoli</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_62">http://www.w3.org/TR/owl2-primer/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_63">http://www.w3.org/TR/sparql11-query/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_64">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 249-260, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_65">Dmitry V. Gnatyshak, Dmitry I. Ignatov and Sergei O. Kuznetsov</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_66">From Triadic FCA to Triclustering: Exp. Comp. of Some Triclustering Alg.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_67">http://www.alglib.net/ From Triadic FCA to Triclustering: Exp. Comp. of Some Triclustering Alg.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_68">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 261-274, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_69">Jan Outrata   </note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_70">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 275-280, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_71">Appl. User-Guided, Dyn. FCA to Nav. Searches for Earth Sci. Data and Doc.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_72">c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA 2013, pp. 281-286, ISBN 978-2-7466-6566-8, Laboratory L3i, University of La Rochelle, 2013. Copying permitted only for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_73">http://www.ncbi.nlm.nih.gov/pubmed</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_74">http://sourceforge.net/projects/galicia/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_75">But we use Υ instead of '•' for terminological interpretation function for readability.Towards Description Logic on Concept Lattices</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_76">Julia V. Grebeneva, Nikolay V. Shilov and Natalia O. Garanina</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_77">Pablo Cordero, Manuel Enciso, Angel Mora and Manuel Ojeda-Aciego</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_78">Computing Left-Minimal Direct Basis of implications</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_79">http://www.upriss.org.uk/fca/fcaalgorithms.html</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_80">http://fimi.ua.ac.be/experiments/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_81">Comparing Perf. of FCA and Cl. Freq. Itemset Mining Alg. on Real Data</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgments. This research work has been supported by the Spanish Ministry of Education and Science (project TIN2008-06582-C03-01), EU PASCAL2 Network of Excellence, and by the Generalitat de Catalunya (2009-SGR-980 and 2009-SGR-1428) and AGAUR (grant 2010PIV00057).</p><p>Acknowledgement. This work was funded by ANR11_MONU14. We warmly acknowledge Corinne Grac (LHYGES) for advices about the dataset, Clémentine Nebut (LIRMM) for the example and Alain Gutierrez (LIRMM) for the implementation of the AOC-poset algorithm (http://www.lirmm.fr/~gutierre/ gsh/). David Ernesto Caro-Contreras and Andres Mendez-Vazquez Bibliography Acknowledgment We acknowledge support by the Operational Program Education for Competitiveness Project No. CZ.1.07/2.3.00/20.0060 co-financed by the European Social Fund and Czech Ministry of Education.</p><p>Acknowledgements: this research received funding from the Basic Research Program at the National Research University Higher School of Economics (Russia) and from the BioIntelligence project (France).</p><p>Acknowledgements. We would like to thank our colleagues Boris Mirkin, Jonas Poelmans, Leonid Zhukov, Andrey Kramarenko, Svetlana Vasyukova for helpful comments, and Ruslan Magizov (box OAC-triclustering) and Zarina Sekinaeva (SpecTric) for their programming support. This research was carried out in 2013 within a project of the Basic Research Program of the National Research University Higher School of Economics (Moscow) and affiliated Laboratory of Intelligent Systems and Structural Analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Acknowledgements</head><p>The author gratefully acknowledges helpful discussions of this paper's contents with Dr. Mike Folk, Ms. Beth Huffer, Dr. Nancy Hoebelheinrich, and Mr. Gustaf Barkstrom.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgment</head><p>Supported by Grants TIN2011-28084 of the Science and Innovation Ministry of Spain, and No. P09-FQM-5233 of the Junta de Andalucía. Acknowledgements: This work was partially supported by the research grants VEGA 1/0832/12 and the Center of knowledge and information systems in Košice (ITMS 26220220158).</p></div>
			</div>


			<div type="funding">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Partially supported by grant VEGA 1/0832/12 and APVV-0035-10. Partially supported by Spanish Ministry of Science and FEDER funds through project TIN09-14562-C05-01 and Junta de Andalucï¿ 1 2 ï¿ 1 2 a project P09-FQM-5233. This research is supported by Integration Grant Mathematical and methodological aspects of intellectual Information Systems n.15/10 of Siberian Branch, Russian Academy of Science.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>way. This task is achieved through the relation between maximal height and width rectangles, and maximal anti-chains. Then, using a dendritical neural network is possible to identify the maximal anti-chains in the lattice structure by means of maximal height or width rectangles.</p><p>On information retrieval in morphological image and signal processing</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Fuzzy mathematical morphology</head><p>Fuzzy morphological image processing has been developed using L-fuzzy sets A and S (with X = R 2 or X = Z 2 ) as images and structuring elements in <ref type="bibr">[5-9, 16, 17]</ref>. The structuring image S represents the effect that we want to produce over the initial image A.</p><p>Fuzzy morphological dilations δ S : L X → L X and fuzzy morphological erosions ε S : L X → L X are defined using some operators of the fuzzy logic. In the literature (see <ref type="bibr">[6,</ref><ref type="bibr">9,</ref><ref type="bibr">14,</ref><ref type="bibr">17]</ref>) erosion and dilation operators are introduced associated with the residuated pair ( * , I) as follows:</p><p>If S : X → L is an image that we take as structuring element, then we consider the following definitions associated with (L, X, S) Definition 1. <ref type="bibr">[6]</ref> The fuzzy erosion of the image A ∈ L X by the structuring element S is the L-fuzzy set ε S (A) ∈ L X defined as:</p><p>The fuzzy dilation of the image A by the structuring element S is the L-fuzzy set δ S (A) defined as:</p><p>From these definitions arise two mappings which will be called the fuzzy erosion and dilation operators ε S , δ S : L X → L X .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Relationship between both theories</head><p>In <ref type="bibr">[1]</ref> these previous theories were related. For that, first of all, any fuzzy image S ∈ L X was associated with the fuzzy relation R S ∈ L X×X , defined as: R S (x, y) = S(y − x) for all x, y ∈ X. Hence, the fuzzy erosion and dilation of an L-fuzzy subset A of X are written as follows:</p><p>and the following results were proved. Proposition 1. Let (L, X, S) be the triple associated with the structuring element S ∈ L X . Let (L, X, X, R S ) be the L-fuzzy property-oriented context whose incidence relation is the relation R S associated with S. Then the erosion ε S and dilation δ S operators in (L, X, S) are related to the derivation operators (R S ) ∀ and (R S ) ∃ in the L-fuzzy property-oriented context (L, X, X, R S ) by:</p><p>Moreover, even if there already exist substantial work relating DL, semantic web and FCA, there remains a lot of research work to be carried out. Such a research work is concerned with the correspondence between concept lattices from FCA and DL-based class hierarchies, query answering and information retrieval, and scalability as well. In addition, as FCA could benefit from DLbased reasoning capabilities, semantic web and DL-driven applications can take advantage of FCA-based ontology design, data analysis and knowledge discovery capabilities of FCA.</p><p>In the future, we plan to extend and experiment with the proposed approach. We will investigate how well it scales, given the size of ontologies.</p><p>A lattice-free concept lattice update algorithm based on * CbO </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>In applications of Formal Concept Analysis (FCA) <ref type="bibr">[3,</ref><ref type="bibr">16]</ref> the input data are often not fixed during the life of the application and concept lattice is not computed from the data once. The changes of input data result in corresponding changes of concept lattice of the data and to compute the new, changed, concept lattice we would like to compute the changes only and "update" the present lattice instead of recomputing the whole lattice from new, changed, input data.</p><p>The particular change of object-attribute relational data processed in FCA, namely the introduction of new objects (described by particular values of attributes), can be handled by the so-called incremental algorithms for computing concept lattice, Norris's <ref type="bibr">[13]</ref>, Object Intersections <ref type="bibr">[2]</ref> or, more recent, AddIntent <ref type="bibr">[12]</ref>, for instance, or the incremental lattice update algorithms presented in <ref type="bibr">[2]</ref>. The algorithms build/update the lattice incrementally by adding objects of input data, one by one, to present concept lattice computed so far from already processed objects, starting from the first object and empty concept lattice.</p><p>Support by the ESF project No. CZ.1.07/2.3.00/20.0059, the project co-financed by the European Social Fund and the state budget of the Czech Republic, is acknowledged.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 1:</head><p>Procedure UpdateFastGenerate-From( A, B , y, {N y | y ∈ Y }), cf. <ref type="bibr">[14]</ref> // list A, B , e.g., print it on screen or store it    <ref type="figure">Y, I</ref>) is called its generator <ref type="bibr">[4,</ref><ref type="bibr">15]</ref>. In both cases, A ∩ X = A .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A , B by objects</head><p>We use the above presented ideas to modify FCbO algorithm described in <ref type="bibr">[14]</ref> as recursive procedure FastGenerateFrom. The procedure computes and lists the set B(X, Y, I) of all formal concepts of input data X, Y, I . We modify the procedure to compute and list the new and modified formal concepts of X , Y , I only when adding new objects X N described by attributes Y N to X, Y, I . The modified procedure UpdateFastGenerateFrom is depicted in Algorithm 1. The original procedure FastGenerateFrom is thoroughly described in <ref type="bibr">[14]</ref> so we describe only the modifications introduced in Update-FastGenerateFrom.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 2:</head><p>Procedure LatticeFastGenerate-From( A, B , y, {N y | y ∈ Y }), cf. <ref type="bibr">[14]</ref> 1 if B = Y or y &gt; n then   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>An archive containing Earth science data may contain physical objects or numerical data files. Its Inventoried Objects (IO's) do not necessarily contain textual content. Thus, they may not provide keyword phrases chosen from their textual content. This paper's algorithms assume that a disciplinary taxonomist develops an IO classification. To do this, the taxonomist creates vertices in a network. Each nonterminal vertex points to a unique Partitioned Formal Context (PFC). Each terminal vertex points to a unique IO. The Archive Information Packages (AIP's) described in the ISO standard known as the Open Archive Information System (OAIS) Reference Model (RM) <ref type="bibr">[1]</ref> serve as prototypical data structures for the network's vertices. The nonterminal vertices are Archive Information Collections (AIC's). The terminal ones are Archive Information Units (AIU's) that point to IO's. Disciplinary taxonomists create the network as the Archive adds to its collection of IO's. Archive users familiar with that taxonomy can navigate through the network's paths to select a target IO that satisfies their search criteria. Navigation differs from a browsing approach in which a user does not have a specific kind of target IO in mind.</p><p>This taxonomic approach markedly reduces the size of the Formal Contexts a FCA algorithm uses to create Formal Concepts from the PFC's. The computed Formal Concepts guide the user's navigation from AIC to AIC until the user finds an AIU with the target IO. The next section includes brief examples of the kinds of IO's in archives of Earth science data. Then, it describes the way they enter the taxonomic network. Later sections include outlines of data structures for the network vertices and pseudo code for the key algorithms in this approach.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Preliminary Scaling Analysis of Taxonomic Classification</head><p>The number of children and the number of attributes for the PFC of a particular AIP can vary widely across the network. This variability makes it difficult to formulate simple scaling relationships for the work of computing formal concepts from the PFC's. For example, the root PFC in the ERI example has about twenty storm objects. Each storm has three attributes: storm name, date, and centroid location name. Thus, for this PFC, N O = 20 and N A = 60. At the next level, the PFC's have N O = 2 and N A = 2. The children of each PFC have only a coarse geographic bin collection and a flight path collection. At the level below this, the coarse bin PFC's may have twenty to fifty objects. The flight path PFC's have five to twenty objects. Clearly, the partitioning produces much smaller binary matrices than the unpartitioned Formal Context.</p><p>A rough approximation for scaling assumes that the graph reduces to a multiway tree. The number of children for each AIC is M . The number of levels is L. The total number of AIC nodes in the tree, N , is</p><p>If the number of attributes in each PFC is N A = aM , then the size of each PFC is (M, aM ). Both M and a are usually small compared with the dimensions of the Formal Context for the archive's total collection. This approximation suggests that the computational work from the network partitioning can reduce that burden by several orders of magnitude.</p><p>The archive does not have to calculate the Formal Concepts for any of the PFC's when it establishes the network. That calculation can occur when the user's navigational search reaches an AIC. Under this simplifying assumption, a user with a successful navigation search will only select L formal contexts. The archive only needs to calculate Formal Concepts for each of the selected PFC's. User attribute pruning to remove attributes the user regards as irrelevant will further reduce the computational load.</p><p>Disciplinary users familiar with a taxonomy form a much smaller community than the public using commercial search engines. For example, only about 1% to 2% of students entering U.S. colleges want to enter scientific or mathematical curricula. The reduction in computational burden and in user search requests should make the taxonomic partitioning approach computationally acceptable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Disciplinary Specialist Knowledge of a Taxonomy</head><p>A disciplinary specialist, such as a research scientist or resource manager, spends a substantial amount of time learning a discipline's taxonomy for classifying objects. Such a specialist is likely to have a specific target for a search. Thus, such a user seems highly likely to use the discipline's taxonomy classification.</p><p>A biologist who has a new, unidentified plant would usually use a biological taxonomy to see if there were any previously identified specimen's in an archive's collection that matched her new one. Even if the biologist moved rapidly through the upper levels of the collection, she would eventually get to a level where she</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A Collaborative Approach for FCA-Based Knowledge Extraction</head><p>My Thao Tang and Yannick Toussaint</p><p>Loria-Campus Scientifique, BP 239 -54506 Vandoeuvre-les-Nancy Cedex, France {My-Thao.Tang,Yannick.Toussaint}@loria.fr Abstract. In this paper, we propose an approach for an FCA-based knowledge extraction process relying on the collaboration between humans and machines. Evaluation of the results is performed on the lattice by experts through an interactive process where they may specify their wishes for changes using a set of predefined operations. Thus, the system then may suggest several strategies to reach their goal. In such an interactive and iterative process, the system converges towards a knowledge model close to the experts' needs. We illustrate the process on a small preliminary experiment.</p><p>Keywords: Formal Concept Analysis, Knowledge Extraction, Expert Interaction</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Several approaches ([1-4]) showed how powerful is Formal Concept Analysis (FCA) ( <ref type="bibr">[5]</ref>) for knowledge modelling and ontology design, and the lattice is usually considered as the knowledge model. This paper focuses on providing domain experts with capabilities to control and customize the lattice using retroengineering operations. Our approach is motivated by a desire of keeping a trace between text sources and concepts of the resulting ontology. Objects and properties in texts are annotated and used to build the formal context. Annotations and the lattice evolved simultaneously thanks to retro-engineering. In this way, we can keep a trace between the linguistic level and the conceptual level making one two separated processes in literature, namely semantic annotation which identifies concepts from an ontology in texts and ontology building which builds concepts from texts. FCA is a bottom-up process which builds concepts from a set of instances of objects and properties (the formal context). To improve the lattice and to make it closer to expert needs, we want to define an iterative and interactive process where experts are asked, at each loop, to evaluate the "quality" of the concepts. Unfortunately, in Knowledge Engineering, building ontology is not a straightforward process and usually results from trial and error process. There are several reasons for experts to ask for changes in the lattice: (1) there may be noise in resources or in the information extraction processes and thus, some categories, old concepts, deleted concepts, modified concepts and new concepts as follows. Let C be a concept in L * :</p><p>-C is an old concept if there exists a concept with the same Extent(C) and</p><p>Moreover, we identify destructors. A destructor is a concept that a deleted concept will jump to. Thus links to the deleted concepts should be reported to destructors.</p><p>Fig. <ref type="figure">1</ref> shows an example of removing concept c 4 according to the strategy moving it down to concept c 7 . Here, two concepts, c 4 and c 9 , in the initial lattice, are deleted; two concepts, c 2 and c 7 , are modified, adding the object HD to their extent; two new concepts, c 11 and c 12 , are created. In addition, concept c 7 is destructor of the deleted concept c 4 and concept c 12 is destructor of the deleted concept c 9 .</p><p>The algorithm calculating the new lattice is based on the fundamental property of lattices ( <ref type="bibr">[10]</ref>). For any closed set (X, X ) in the lattice:</p><p>Moreover, for any set of f (x) (resp. g({x })), their intersection should be in the lattice.</p><p>The main process of the algorithm is to update the set of intersections of extents. We perform a top-down traversal of the lattice L to identify whether a concept is old, modified or deleted, to create new concepts and to keep the information of destructors.</p><p>Thanks to the categories of concepts, the resulting lattice can be calculated and we can keep a trace from the previous lattice. By this way, we can know the impact of a change on the lattice (lists of modified, deleted and new concepts).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Towards Description Logic on Concept Lattices</head><p>J.V. Grebeneva, N.V. Shilov, and N.O. Garanina A.P. Ershov Institute of Informatics Systems, Lavren'ev av., 6, Novosibirsk 630090, Russia j.grebeneva@gmail.com, shilov@iis.nsk.su, garanina@iis.nsk.su</p><p>Abstract. In this position paper we start with a motivation of our study of modal/description logics with values in concept lattices. Then we give a brief survey of approaches to lattice-valued modal and/or description logics. After that we study some methods of context symmetrization, because the description logic on concept lattices is defined for symmetric co ntexts only. We conclude with a list of problems related to comparison of different lattice-valued modal/description logics, different variants of context symmetrization and resulting description logics, decidability and axiomatization of these logics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Let us start with an example that can explain our interest to study of polymodal and/or description logics with values in concept lattices. For it let us first fix some moment of time and let (1) U RL be the set of all Uniform Resource Locator that are valid (exist) at this moment, (2) Key be the set of all Key-words in any existing language that are conceivable in this time, (3) F , S and T be binary relations on U RL × Key that are implemented in some (non-real we assume) search engines First, Second and Third at the same moment of time that we fixed above. Then let Sh&amp;Ga be the set of all web-sites (their URL's hereinafter) that a search engine First finds by two key-words Shilov and Garanina; In terms of Formal Concept Analysis (FCA) <ref type="bibr">[4]</ref> Sh&amp;Ga = {Shilov, Garanina} in the following formal context F = (U RL, KW, F ). Similarly, let Gr -be the set of all web-sites that Second finds by searching for a single key-word Grebeneva; in FCA terms one can write Gr = {Grebeneva} in the next one formal context S = (U RL, Key, S).</p><p>Assume that we need to know all sites Sh&amp;Ga \ Gr that are found by First by key-words Shilov and Garanina but that (according to Third) does not contain any word that is common for all sites that are found by Second for the key-word Grebeneva. In terms of set theory expanded by FCAderivatives the desired set can be written as U RL Sh&amp;Ga \ U RL Gr , where ' ' Case 2.</p><p>. The concept lattice of this context is isomorphic to the vertical sum <ref type="bibr">[4]</ref> of the concept lattices B(K d ) and B(K) (where the concept lattice B(K d ) is upper than B(K)). Case 3. (∅,×). This case is the same like a previous, but we have to swap components of the vertical sum.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Case 4.</head><p>× K K d × . We have here the direct sum K + K d of contexts K and K d</p><p>[4] and the concept lattice of the sum is isomorphic to the product of the concept lattices  <ref type="figure">(E,×</ref>). This case is similar to the case 8.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>Now we are ready to formulate several topics and problems that we consider natural and important for further research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Computing Left-Minimal Direct Basis of implications</head><p>Pablo Cordero, Manuel Enciso, Angel Mora, and Manuel Ojeda-Aciego University of Málaga, Spain. e-mail: {pcordero,enbciso}@uma.es, {amora,aciego}@ctima.uma.es Abstract. The most popular basis in Formal Concept Analysis is the Duquenne-Guigues basis, which ensure minimality in the number of dependencies and it is built with pseudo-intents, and some method to calculate these basis from an arbitrary set of implications have been introduced. We propose in this paper, an automated method to calculate a left-minimal direct basis from the set of all implications built between a closed set and its corresponding minimal generators. The new basis also has the minimal property demanded in the Duquenne-Guigues basis. It is minimal in the cardinal of the set of implications, and minimal in the size of the left-hand side of the implications.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Formal Concept Analysis <ref type="bibr">[8]</ref> has shown to be a powerful framework to discover knowledge inside date sets. It provides a solid and formal theory which enhances other well known approaches. The main element of FCA community are binary relations between objects and attributes, which are described using matrixes (contexts) and represent the appearance of the attributes in the corresponding objects. One outstanding element in FCA is attribute implication, which is used to specify a constraint in the context. Thus we write an implication between attribute sets X and Y in the form X →Y whenever any object in the context which has all the attributes in X also has all the attributes in Y .</p><p>Attribute implication can be managed syntactically using Armstrong's Axioms <ref type="bibr">[1]</ref>, a sound and complete inference system. This axiomatic system allows us to derive new attribute implications that hold in a given context. This "inference" relation leads to the following problem: How to characterize the minimal set of implications for a given set of implications? Among the different basis notions, the Duquenne-Guigues basis [9] also called stem basis seems has to be cited because of their widely acceptation in the FCA area and because of its minimality notion (w.r.t. the number of implications). Nevertheless, minimality in the number of implications is a criteria that may be enhanced.</p><p>In We let for an extended version of this paper the proof that these equivalences rules are derived rules of equivalences presented in Theorem ??.</p><p>We propose in the Algorithm 2 the use of the two aggregation rules for reducing the number of implications and also the consequent of implications. By the other side, Algorithm 1 return the following Duquenne-Guigues basis {b → adef gh, abcdef gh → kj, d → a} which in a minimal basis, but not a left-minimal one.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>In this paper we present an algorithm which allows the transformation of a set of all closed sets and their corresponding minimal generators into a left-minimal Author Index </p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">rdered direct implicational basis of a finite closure system</title>
		<author>
			<persName><forename type="first">K</forename><surname>Adaricheva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Nation</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Rand</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete Applied Math</title>
		<imprint>
			<biblScope unit="volume">161</biblScope>
			<biblScope unit="page" from="707" to="723" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">The multiple facets of the canonical direct unit implicational basis</title>
		<author>
			<persName><forename type="first">K</forename><surname>Bertet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Monjardet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theoret. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">411</biblScope>
			<biblScope unit="issue">22-24</biblScope>
			<biblScope unit="page" from="2155" to="2166" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Projective lattices</title>
		<author>
			<persName><forename type="first">Ralph</forename><surname>Freese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Nation</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Pacific J. Math</title>
		<imprint>
			<biblScope unit="volume">75</biblScope>
			<biblScope unit="page" from="93" to="106" />
			<date type="published" when="1978">1978</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Cooperative games on antimatroids</title>
		<author>
			<persName><forename type="first">E</forename><surname>Algaba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Bilbao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Van Den</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Brink</surname></persName>
		</author>
		<author>
			<persName><surname>Jiménez-Losada</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete Mathematics</title>
		<imprint>
			<biblScope unit="volume">282</biblScope>
			<biblScope unit="page" from="1" to="15" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Rooted-tree solutions for tree games</title>
		<author>
			<persName><forename type="first">S</forename><surname>Béal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Rémila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ph</forename><surname>Solal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Journal of Operational Research</title>
		<imprint>
			<biblScope unit="volume">203</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="404" to="408" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Axioms for the Shapley value on convex geometries</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Bilbao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Journal of Operational Research</title>
		<imprint>
			<biblScope unit="volume">110</biblScope>
			<biblScope unit="page" from="368" to="376" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">The core of games on convex geometries</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Bilbao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Lebrón</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Jiménez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Journal of Operational Research</title>
		<imprint>
			<biblScope unit="volume">119</biblScope>
			<biblScope unit="page" from="365" to="372" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Monge extensions of cooperation and communication structures</title>
		<author>
			<persName><forename type="first">U</forename><surname>Faigle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Grabisch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Heyne</surname></persName>
		</author>
		<idno type="DOI">.10.1016/j.ejor.2010.01.043</idno>
	</analytic>
	<monogr>
		<title level="j">European Journal of Operational Research</title>
		<imprint>
			<biblScope unit="volume">206</biblScope>
			<biblScope unit="page" from="104" to="110" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The Shapley value for cooperative games under precedence constraints</title>
		<author>
			<persName><forename type="first">U</forename><surname>Faigle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Kern</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. of Game Theory</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="249" to="266" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The core of games on ordered structures and graphs</title>
		<author>
			<persName><forename type="first">M</forename><surname>Grabisch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Operations Research</title>
		<imprint>
			<biblScope unit="volume">204</biblScope>
			<biblScope unit="page" from="33" to="64" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Ensuring the boundedness of the core of games with restricted cooperation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Grabisch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Operations Research</title>
		<imprint>
			<biblScope unit="volume">191</biblScope>
			<biblScope unit="page" from="137" to="154" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">On the restricted cores and the bounded core of games on distributive lattices</title>
		<author>
			<persName><forename type="first">M</forename><surname>Grabisch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Sudhölter</surname></persName>
		</author>
		<idno>2012.67</idno>
		<ptr target="http://ideas.repec.org/s/mse/cesdoc.html" />
		<imprint>
			<date type="published" when="2012">2012</date>
			<pubPlace>Paris</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Centre d&apos;Economie de la Sorbonne</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">The bounded core for games with precedence constraints</title>
		<author>
			<persName><forename type="first">M</forename><surname>Grabisch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Sudhölter</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10479-012-1228-9</idno>
	</analytic>
	<monogr>
		<title level="j">Annals of Operations Research</title>
		<imprint>
			<biblScope unit="volume">201</biblScope>
			<biblScope unit="page" from="251" to="264" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">The restricted core of games on distributive lattices: how to share benefits in a hierarchy</title>
		<author>
			<persName><forename type="first">M</forename><surname>Grabisch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">J</forename><surname>Xie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematical Methods of Operations Research</title>
		<imprint>
			<biblScope unit="volume">73</biblScope>
			<biblScope unit="page" from="189" to="208" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Contextual implications between attributes and some representation properties for finite lattices</title>
		<author>
			<persName><forename type="first">V</forename><surname>Duquenne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Beitrage zur Begriffsanalyse</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Wolf</surname></persName>
		</editor>
		<meeting><address><addrLine>Wissenschaftsverlag, Mannheim</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1987">1987</date>
			<biblScope unit="page" from="213" to="239" />
		</imprint>
	</monogr>
	<note>reprinted in ICFCA&apos;2013</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Latticial structures in Data Analysis</title>
		<author>
			<persName><forename type="first">V</forename><surname>Duquenne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Th. Comp. Sci</title>
		<imprint>
			<biblScope unit="volume">217</biblScope>
			<biblScope unit="page" from="407" to="436" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Familles minimales d&apos;implications informatives résultant d&apos;un tableau de données binaires</title>
		<author>
			<persName><forename type="first">J.-L</forename><surname>Guigues</surname></persName>
		</author>
		<author>
			<persName><forename type="middle">V</forename><surname>Duquenne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathématiques &amp; Sciences Humaines</title>
		<imprint>
			<biblScope unit="volume">95</biblScope>
			<biblScope unit="page" from="5" to="18" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Some Variations on Alan Day&apos;s Algorithm for Calculating Canonical Basis of Implications</title>
		<author>
			<persName><forename type="first">V</forename><surname>Duquenne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CLA&apos;2007</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Diatta</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Ecklund</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Liquière</surname></persName>
		</editor>
		<imprint>
			<biblScope unit="page" from="17" to="25" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Algorithmen zur Formalen Begriffsanalyse</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Beitrage zur Begriffsanalyse</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Wolf</surname></persName>
		</editor>
		<meeting><address><addrLine>Wissenschaftsverlag, Mannheim</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1987">1987</date>
			<biblScope unit="page" from="241" to="255" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">On permutation lattices</title>
		<author>
			<persName><forename type="first">V</forename><surname>Duquenne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cherfouh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Math. Soc. Sci</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page" from="73" to="89" />
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Lattice Drawings and Morphisms, ICFCA</title>
		<author>
			<persName><forename type="first">V</forename><surname>Duquenne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Artificial Intelligence</title>
		<editor>L. Kwuida and B. Sertkaya</editor>
		<imprint>
			<biblScope unit="volume">5986</biblScope>
			<biblScope unit="page" from="88" to="103" />
			<date type="published" when="2010">2010. 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Improving Generalization Level in UML Models Iterative Cross Generalization in Practice</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Hacene</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Roume</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICCS</title>
		<imprint>
			<biblScope unit="page">346360</biblScope>
			<date type="published" when="2004">2004. 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">On automatic class insertion with overloading</title>
		<author>
			<persName><forename type="first">H</forename><surname>Dicky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Dony</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Libourel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">OOPSLA 96</title>
				<imprint>
			<date type="published" when="1996">1996</date>
			<biblScope unit="page">251267</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">Contributions à l&apos;IDM : reconstruction et alignement de modèles de classes</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Falleri</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="volume">2</biblScope>
		</imprint>
		<respStmt>
			<orgName>Université Montpellier</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Ph.D. thesis</note>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">A generic approach for class model normalization</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Falleri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Nebut</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ASE</title>
		<imprint>
			<biblScope unit="page">431434</biblScope>
			<date type="published" when="2008">2008. 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">Formal Concept Analysis: Mathematical Foundation</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer-Verlag</publisher>
			<pubPlace>Berlin</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Building and maintaining analysis-level class hierarchies using Galois lattices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mili</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">OOPSLA 93</title>
				<imprint>
			<date type="published" when="1993">1993</date>
			<biblScope unit="page">394410</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Design of Class Hierarchies Based on Concept (Galois) Lattices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Mineau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Chau</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory And Practice of Object Systems</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Hacene</surname></persName>
		</author>
		<title level="m">Relational concept analysis, application to software re-engineering</title>
				<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
		<respStmt>
			<orgName>Universite du Quebec A Montreal</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Ph.D. thesis</note>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Relational concept analysis: mining concept lattices from multi-relational data</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Hacene</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ann. Math. Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">67</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">81108</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">How relational concept analysis can help to observe the evolution of business class models</title>
		<author>
			<persName><forename type="first">A</forename><surname>Osman Guédi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Miralles</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Amar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Nebut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Libourel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CLA</title>
		<imprint>
			<biblScope unit="page">139150</biblScope>
			<date type="published" when="2012">2012. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<title level="m" type="main">Analyse et restructuration de hiérarchies de classes</title>
		<author>
			<persName><forename type="first">C</forename><surname>Roume</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">2</biblScope>
		</imprint>
		<respStmt>
			<orgName>Université Montpellier</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Ph.D. thesis</note>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Ambler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename></persName>
		</author>
		<title level="m">The Elements of UML 2.0 Style</title>
				<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Performances of Galois Sub-Hierarchy-Building Algorithms</title>
		<author>
			<persName><forename type="first">G</forename><surname>Arévalo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Berry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Perrot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sigayret</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis</title>
				<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">4390</biblScope>
			<biblScope unit="page" from="166" to="180" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><surname>Aun</surname></persName>
		</author>
		<title level="m">Galois sub-hierarchy builder</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Advances in Formal Concept Analysis for Knowledge Discovery in Databases</title>
		<author>
			<persName><forename type="first">P</forename><surname>Becker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hereth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. Workshop FCAKDD of the 15th European Conference on Artificial Intelligence</title>
				<meeting>Workshop FCAKDD of the 15th European Conference on Artificial Intelligence</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="1" to="2" />
		</imprint>
	</monogr>
	<note>ToscanaJ -an Open Source Tool for Qualitative Data Analysis</note>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Hermes: an Efficient Algorithm for Building Galois Sub-hierarchies</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sigayret</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CLA</title>
		<imprint>
			<biblScope unit="volume">2012</biblScope>
			<biblScope unit="page" from="21" to="32" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<title level="m" type="main">Writing Effective Use Cases</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cockburn</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Addison-Wesley</publisher>
			<pubPlace>Boston</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<monogr>
		<title level="m" type="main">Systems Analysis and Design</title>
		<author>
			<persName><forename type="first">A</forename><surname>Dennis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Haley Wixom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Roth</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>Wiley</publisher>
		</imprint>
	</monogr>
	<note>4th ed</note>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Fixing Generalization Defects in UML Use Case Diagrams</title>
		<author>
			<persName><forename type="first">X</forename><surname>Dolques</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Nebut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Reitz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundam. Inform</title>
		<imprint>
			<biblScope unit="volume">115</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="327" to="356" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Formal Concept Analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mathematical Foundations</title>
				<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Building and Maintaining Analysis-Level Class Hierarchies using Galois Lattices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mili</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of OOPSLA</title>
				<meeting>OOPSLA</meeting>
		<imprint>
			<date type="published" when="1993">1993</date>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="394" to="410" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Formal Concept Analysis-Based Class Hierarchy Design in Object-Oriented Software Development</title>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis</title>
				<imprint>
			<date type="published" when="2005">2005. 2005</date>
			<biblScope unit="volume">3626</biblScope>
			<biblScope unit="page" from="304" to="323" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">Formal Concept Analysis Used for Software Analysis and Modelling</title>
		<author>
			<persName><forename type="first">W</forename><surname>Hesse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Tilley</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis</title>
				<imprint>
			<date type="published" when="2005">2005. 2005</date>
			<biblScope unit="volume">3626</biblScope>
			<biblScope unit="page" from="259" to="282" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<monogr>
		<title level="m" type="main">Applying UML and Patterns</title>
		<author>
			<persName><forename type="first">C</forename><surname>Larman</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>Prentice Hall</publisher>
			<pubPlace>Upper Saddle River, NJ</pubPlace>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b45">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Oppel</surname></persName>
		</author>
		<title level="m">Databases Demystified</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>McGraw-Hill</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">M</forename><surname>Raud</surname></persName>
		</author>
		<author>
			<persName><surname>Gsh</surname></persName>
		</author>
		<ptr target="http://staff.ttu.ee/torim/fca.html(15.09" />
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<monogr>
		<title level="m" type="main">The Unified Modelling Language Reference Manual</title>
		<author>
			<persName><forename type="first">J</forename><surname>Rumbaugh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Jacobson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Booch</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Addison Wesley</publisher>
			<pubPlace>Boston</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">A Survey of Formal Concept Analysis Support for Software Engineering Activities</title>
		<author>
			<persName><forename type="first">T</forename><surname>Tilley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Cole</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Becker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Eklund</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis</title>
				<imprint>
			<date type="published" when="2005">2005. 2005</date>
			<biblScope unit="volume">3626</biblScope>
			<biblScope unit="page" from="250" to="271" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<analytic>
		<title level="a" type="main">A Visual Model of the CRUD Matrix</title>
		<author>
			<persName><forename type="first">A</forename><surname>Torim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 21th European-Japanese Conference on Information Modelling and Knowledge Bases</title>
				<editor>
			<persName><forename type="first">Jaak</forename><surname>Henno</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Yasuhi</forename><surname>Kiyoki</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Takehiro</forename><surname>Tokuda</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Naofumi</forename><surname>Yoshida</surname></persName>
		</editor>
		<meeting>the 21th European-Japanese Conference on Information Modelling and Knowledge Bases<address><addrLine>Tallinn</addrLine></address></meeting>
		<imprint>
			<publisher>TTU Press</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="114" to="122" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<monogr>
		<title level="m" type="main">The Visual Display of Quantitative Information</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">R</forename><surname>Tufte</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>Graphics Press</publisher>
			<pubPlace>Cheshire, Connecticut</pubPlace>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b51">
	<analytic>
		<title level="a" type="main">Galicia: an Open Platform for Lattices</title>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Grosser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Roume</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Hacéne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Using Conceptual Structures: Contrib. to the 11th ICCS</title>
				<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="241" to="254" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<analytic>
		<title level="a" type="main">): an approach based on hierarchies of concepts</title>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Ordered Sets</title>
				<imprint>
			<date type="published" when="1982">1982</date>
			<biblScope unit="page" from="445" to="470" />
		</imprint>
	</monogr>
	<note>Restructuring lattice theory</note>
</biblStruct>

<biblStruct xml:id="b53">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<title level="m">Formal Concept Analysis: Foundations and Applications</title>
				<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b54">
	<analytic>
		<title level="a" type="main">Formal Concept Analysis as Mathematical Theory of Concepts and Concept Hierarchies</title>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis</title>
				<imprint>
			<date type="published" when="2005">2005. 2005</date>
			<biblScope unit="volume">3626</biblScope>
			<biblScope unit="page" from="47" to="70" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b55">
	<analytic>
		<title level="a" type="main">System of Data Analysis &quot;Concept Explorer</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Yevtushenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 7th national conference on Artificial Intelligence KII</title>
				<editor>
			<persName><forename type="first">Russian</forename></persName>
		</editor>
		<meeting>the 7th national conference on Artificial Intelligence KII</meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="127" to="134" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b56">
	<analytic>
		<title level="a" type="main">Computing functional dependencies with pattern structures</title>
		<author>
			<persName><forename type="first">J</forename><surname>Baixeries</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kaytoue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<ptr target=".org" />
	</analytic>
	<monogr>
		<title level="m">CLA</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">L</forename><surname>Szathmary</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">U</forename><surname>Priss</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">972</biblScope>
			<biblScope unit="page" from="175" to="186" />
		</imprint>
	</monogr>
	<note type="report_type">CEUR-WS</note>
</biblStruct>

<biblStruct xml:id="b57">
	<analytic>
		<title level="a" type="main">Constraint-generating dependencies</title>
		<author>
			<persName><forename type="first">M</forename><surname>Baudinet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chomicki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Wolper</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Comput. Syst. Sci</title>
		<imprint>
			<biblScope unit="volume">59</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="94" to="115" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b58">
	<analytic>
		<title level="a" type="main">Data tables with similarity relations: Functional dependencies, complete rules and non-redundant bases</title>
		<author>
			<persName><forename type="first">R</forename><surname>Belohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">DASFAA</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">M.-L</forename><surname>Lee</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K.-L</forename><surname>Tan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">V</forename><surname>Wuwongse</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="volume">3882</biblScope>
			<biblScope unit="page" from="644" to="658" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b59">
	<analytic>
		<title level="a" type="main">Data cleaning and query answering with matching dependencies and matching functions</title>
		<author>
			<persName><forename type="first">L</forename><surname>Bertossi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kolahi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">V S</forename><surname>Lakshmanan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 14th International Conference on Database Theory, ICDT &apos;11</title>
				<meeting>the 14th International Conference on Database Theory, ICDT &apos;11<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="268" to="279" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b60">
	<analytic>
		<title level="a" type="main">The lattices of closure systems, closure operators, and implicational systems on a finite set: A survey</title>
		<author>
			<persName><forename type="first">N</forename><surname>Caspard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Monjardet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete Applied Mathematics</title>
		<imprint>
			<biblScope unit="volume">127</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="241" to="269" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b61">
	<analytic>
		<title level="a" type="main">The lattice theory of fonctionnal dependencies and normal decompositions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Day</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Algebra and Computation</title>
		<imprint>
			<biblScope unit="volume">02</biblScope>
			<biblScope unit="issue">04</biblScope>
			<biblScope unit="page" from="409" to="431" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b62">
	<analytic>
		<title level="a" type="main">Normal form relation schemes: A new characterization</title>
		<author>
			<persName><forename type="first">J</forename><surname>Demetrovics</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Hencsey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Libkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">B</forename><surname>Muchnik</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Acta Cybern</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="141" to="153" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b63">
	<analytic>
		<title level="a" type="main">Dynamic constraints for record matching</title>
		<author>
			<persName><forename type="first">W</forename><surname>Fan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Jia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The VLDB Journal</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="495" to="520" />
			<date type="published" when="2011-08">Aug. 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b64">
	<analytic>
		<title level="a" type="main">Pattern structures and their projections</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conceptual Structures: Broadening the Base, Proceedings of the 9th International Conference on Conceptual Structures (ICCS 2001)</title>
				<editor>
			<persName><forename type="first">H</forename><forename type="middle">S</forename><surname>Delugach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="volume">2120</biblScope>
			<biblScope unit="page" from="129" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b65">
	<monogr>
		<title level="m" type="main">Formal Concept Analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b66">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Graetzer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Davey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Freese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Greferath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Jipsen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Priestley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Rose</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Schmidt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Schmidt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Wehrung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<title level="m">General Lattice Theory</title>
				<meeting><address><addrLine>San Francisco, CA</addrLine></address></meeting>
		<imprint>
			<publisher>Freeman</publisher>
			<date type="published" when="1971">1971</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b67">
	<analytic>
		<title level="a" type="main">Tane: An efficient algorithm for discovering functional and approximate dependencies</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Huhtala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kärkkäinen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Porkka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Toivonen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Journal</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="100" to="111" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b68">
	<monogr>
		<title level="m" type="main">Embedding tolerance relations in formal concept analysis: an application in information fusion</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kaytoue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Assaghir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<editor>J. Huang, N. Koudas, G. J. F. Jones, X. Wu, K. Collins-Thompson, and A. An</editor>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>ACM</publisher>
			<biblScope unit="page" from="1689" to="1692" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b69">
	<analytic>
		<title level="a" type="main">An axiomatization of partition entropy</title>
		<author>
			<persName><forename type="first">D</forename><surname>Simovici</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Jaroszewicz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on</title>
		<imprint>
			<biblScope unit="volume">48</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="2138" to="2142" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
	<note>Information Theory</note>
</biblStruct>

<biblStruct xml:id="b70">
	<analytic>
		<title level="a" type="main">Impurity measures in databases</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Simovici</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Cristofor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Cristofor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Acta Inf</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="307" to="324" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b71">
	<analytic>
		<title level="a" type="main">Efficient discovery of similarity constraints for matching dependencies</title>
		<author>
			<persName><forename type="first">S</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data &amp; Knowledge Engineering</title>
		<imprint>
			<biblScope unit="issue">0</biblScope>
			<biblScope unit="page">-</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>in press)</note>
</biblStruct>

<biblStruct xml:id="b72">
	<analytic>
		<title level="a" type="main">Comparable dependencies over heterogeneous data</title>
		<author>
			<persName><forename type="first">S</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Yu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The VLDB Journal</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="253" to="274" />
			<date type="published" when="2013-04">Apr. 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b73">
	<monogr>
		<title level="m" type="main">Raising the Stakes: E-Sports and the Professionalization of Computer Gaming</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">L</forename><surname>Taylor</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>MIT Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b74">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Ullman</surname></persName>
		</author>
		<title level="m">Principles of Database Systems and Knowledge-Based Systems</title>
				<meeting><address><addrLine>Rockville (MD), USA</addrLine></address></meeting>
		<imprint>
			<publisher>Computer Science Press</publisher>
			<date type="published" when="1989">1989</date>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b75">
	<analytic>
		<title level="a" type="main">Comparing performance of algorithms for generating the Duquenne-Guigues basis</title>
		<author>
			<persName><forename type="first">Konstantin</forename><surname>Bazhanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sergei</forename><forename type="middle">A</forename><surname>Obiedkov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CLA</title>
		<imprint>
			<biblScope unit="page" from="43" to="57" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b76">
	<analytic>
		<title level="a" type="main">On the complexity of enumerating pseudo-intents</title>
		<author>
			<persName><forename type="first">Felix</forename><surname>Distel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Barış</forename><surname>Sertkaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete Applied Mathematics</title>
		<imprint>
			<biblScope unit="volume">159</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="450" to="466" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b77">
	<analytic>
		<title level="a" type="main">Famille minimale d&apos;implications informatives résultant d&apos;un tableau de données binaires</title>
		<author>
			<persName><forename type="first">V</forename><surname>Duquenne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-L</forename><surname>Guigues</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathématiques et Sciences Humaines</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">95</biblScope>
			<biblScope unit="page" from="5" to="18" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b78">
	<analytic>
		<title level="a" type="main">Two basic algorithms in concept analysis</title>
		<author>
			<persName><forename type="first">Bernhard</forename><surname>Ganter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8th international conference on Formal Concept Analysis, ICFCA&apos;10</title>
				<meeting>the 8th international conference on Formal Concept Analysis, ICFCA&apos;10<address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="312" to="340" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b79">
	<analytic>
		<title level="a" type="main">On the intractability of computing the Duquenne-Guigues base</title>
		<author>
			<persName><forename type="first">Sergei</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Universal Computer Science</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="927" to="933" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b80">
	<analytic>
		<title level="a" type="main">Comparing performance of algorithms for generating concept lattices</title>
		<author>
			<persName><forename type="first">Sergei</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sergei</forename><surname>Obiedkov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Experimental and Theoretical Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="189" to="216" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b81">
	<analytic>
		<title level="a" type="main">Implications partielles dans un contexte</title>
		<author>
			<persName><forename type="first">Michael</forename><surname>Luxenburger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathématiques et Sciences Humaines</title>
		<imprint>
			<biblScope unit="volume">113</biblScope>
			<biblScope unit="page" from="35" to="55" />
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b82">
	<analytic>
		<title level="a" type="main">Attribute-incremental construction of the canonical implication basis</title>
		<author>
			<persName><forename type="first">S</forename><surname>Obiedkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Duquenne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Mathematics and Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">1-4</biblScope>
			<biblScope unit="page" from="77" to="99" />
			<date type="published" when="2007-04">April 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b83">
	<analytic>
		<title level="a" type="main">On the merge of factor canonical bases</title>
		<author>
			<persName><forename type="first">Petko</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vincent</forename><surname>Duquenne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 6th international conference on Formal concept analysis, ICFCA&apos;08</title>
				<meeting>the 6th international conference on Formal concept analysis, ICFCA&apos;08<address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="182" to="198" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b84">
	<monogr>
		<author>
			<persName><forename type="first">Tamon</forename><surname>Stephen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Timothy</forename><surname>Yusun</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1209.4623</idno>
		<title level="m">Counting inequivalent monotone Boolean functions</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b85">
	<monogr>
		<author>
			<persName><forename type="first">Y</forename><surname>Crama</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">L</forename><surname>Hammer</surname></persName>
		</author>
		<title level="m">Boolean functions: Theory, algorithms, and applications, Encyclopedia of Mathematics and Its Applications</title>
				<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b86">
	<analytic>
		<title level="a" type="main">Entropy, independent sets and antichains: a new approach to Dedekind&apos;s problem</title>
		<author>
			<persName><forename type="first">Jeff</forename><surname>Kahn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proc. Amer. Math. Soc</title>
		<imprint>
			<biblScope unit="volume">130</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="371" to="378" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b87">
	<analytic>
		<title level="a" type="main">A computation of the eighth Dedekind number</title>
		<author>
			<persName><forename type="first">Doug</forename><surname>Wiedemann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Order</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">56</biblScope>
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b88">
	<analytic>
		<title level="a" type="main">The number of monotone boolean functions (Russian)</title>
		<author>
			<persName><forename type="first">Aleksej</forename><surname>Korshunov</surname></persName>
		</author>
		<author>
			<persName><surname>Dmitrievich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Problemy Kibernet</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="5" to="108" />
			<date type="published" when="1981">1981</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b89">
	<analytic>
		<title level="a" type="main">On Dedekind&apos;s problem: the number of isotone Boolean functions</title>
		<author>
			<persName><forename type="first">Daniel</forename><surname>Kleitman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">George</forename><surname>Markowsky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">II, Trans. Amer. Math. Soc</title>
		<imprint>
			<biblScope unit="volume">213</biblScope>
			<biblScope unit="page" from="373" to="390" />
			<date type="published" when="1975">1975</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b90">
	<monogr>
		<title level="m" type="main">The On-Line Encyclopedia of Integer Sequences</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">J A</forename><surname>Sloane</surname></persName>
		</author>
		<ptr target="http://www.research.att.com/njas/sequences/" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b91">
	<analytic>
		<title level="a" type="main">Über Zerlegungen von Zahlen durch ihre größten gemeinsamen Teiler</title>
		<author>
			<persName><forename type="first">Richard</forename><surname>Dedekind</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Gesammelte Werke</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="103" to="148" />
			<date type="published" when="1897">1897</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b92">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">De</forename><surname>Causmaecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>De Wannemacker ; Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Wille</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename></persName>
		</author>
		<idno type="arXiv">arXiv:1103.2877</idno>
		<title level="m">Partitioning in the space of anti-monotonic functions</title>
				<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1996">2011. 1996</date>
		</imprint>
	</monogr>
	<note>Formale Begriffsanalyse: Mathematische Grundlagen</note>
</biblStruct>

<biblStruct xml:id="b93">
	<analytic>
		<title level="a" type="main">Attribute exploration with background implications and exceptions</title>
		<author>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Data Analysis and Information Systems. Statistical and Conceptual approaches. Proc. GfKl&apos;95. Studies in Classification, Data Analysis, and Knowledge Organization 7</title>
				<editor>
			<persName><forename type="first">H</forename><forename type="middle">H</forename><surname>Bock</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Polasek</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1996">1996</date>
			<biblScope unit="page" from="457" to="469" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b94">
	<analytic>
		<title level="a" type="main">Attribute exploration in a fuzzy setting</title>
		<author>
			<persName><forename type="first">C</forename><surname>Glodeanu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Contributions to International Conference on Formal Concept Analysis</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Domenach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Ignatov</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Poelmans</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
		<respStmt>
			<orgName>Katholieke Universiteit Leuven</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b95">
	<monogr>
		<title level="m" type="main">Conceptual Factors and Fuzzy Data</title>
		<author>
			<persName><forename type="first">C</forename><surname>Glodeanu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
		<respStmt>
			<orgName>TU Dresden</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b96">
	<monogr>
		<title level="m" type="main">Towards a theory of contextual topology</title>
		<author>
			<persName><forename type="first">C</forename><surname>Sacarea</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<pubPlace>Aachen</pubPlace>
		</imprint>
		<respStmt>
			<orgName>TH Darmstadt</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b97">
	<analytic>
		<title level="a" type="main">Generalizations of Boolean algebras. an attribute exploration</title>
		<author>
			<persName><forename type="first">L</forename><surname>Kwuida</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Pech</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Reppe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Math. Slovaca</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="145" to="165" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b98">
	<analytic>
		<title level="a" type="main">Attribute exploration of properties of functions on ordered sets</title>
		<author>
			<persName><forename type="first">A</forename><surname>Revenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proc. CLA</title>
		<imprint>
			<biblScope unit="page" from="313" to="324" />
			<date type="published" when="2010">2010. 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b99">
	<analytic>
		<title level="a" type="main">Exploration of nmr data of glasses by means of formal concept analysis</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">G</forename><surname>Bartel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nofz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Chemom. Intell. Lab. Syst</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="53" to="63" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b100">
	<analytic>
		<title level="a" type="main">Acquiring expert knowledge for the design of conceptual information systems</title>
		<author>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">EKAW</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">D</forename><surname>Fensel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Studer</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="volume">1621</biblScope>
			<biblScope unit="page" from="275" to="290" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b101">
	<analytic>
		<title level="a" type="main">Attribute exploration with background knowledge</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">217</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="215" to="233" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b102">
	<monogr>
		<title level="m" type="main">The Metamathematics of Fuzzy Logic</title>
		<author>
			<persName><forename type="first">P</forename><surname>Hájek</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1998">1998</date>
			<publisher>Kluwer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b103">
	<monogr>
		<title level="m" type="main">Fuzzy sets and fuzzy logic -theory and applications</title>
		<author>
			<persName><forename type="first">G</forename><surname>Klir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Yuan</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1995">1995</date>
			<publisher>Prentice Hall P T R</publisher>
			<biblScope unit="page">7458</biblScope>
			<pubPlace>Upper Saddle River, New Jersey</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b104">
	<analytic>
		<title level="a" type="main">Fuzzy concept lattices constrained by hedges</title>
		<author>
			<persName><forename type="first">R</forename><surname>Belohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JACIII</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="536" to="545" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b105">
	<monogr>
		<title level="m" type="main">Formale Begriffsanalyse mit unscharfen Begriffen</title>
		<author>
			<persName><forename type="first">S</forename><surname>Umbreit</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1994">1994</date>
		</imprint>
		<respStmt>
			<orgName>Martin-Luther-Universitaet Halle-Wittenberg</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b106">
	<analytic>
		<title level="a" type="main">Fuentes-Gonzales: The study of L-Fuzzy Concept Lattice</title>
		<author>
			<persName><forename type="first">A</forename><surname>Burusco</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathware and soft computing</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="209" to="218" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b107">
	<monogr>
		<title level="m" type="main">Fuzzy Begriffe</title>
		<author>
			<persName><forename type="first">S</forename><surname>Pollandt</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1997">1997</date>
			<publisher>Springer Verlag</publisher>
			<pubPlace>Berlin Heidelberg New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b108">
	<monogr>
		<title level="m" type="main">Fuzzy Relational Systems: Foundations and Principles</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>Kluwer Academic/Plenum Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b109">
	<analytic>
		<title level="a" type="main">Algorithms for fuzzy concept lattices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Recent Advances in Soft Computing</title>
				<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="200" to="205" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b110">
	<analytic>
		<title level="a" type="main">Attribute implications in a fuzzy setting</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Formal Concept Analysis</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Schmid</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="45" to="60" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b111">
	<analytic>
		<title level="a" type="main">Fuzzy attribute logic: attribute implications, their validity, entailment, and non-redundant basis</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Volume 1 of Fuzzy Logic, Soft Computing &amp; Computational Intelligence</title>
				<editor>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Chen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Ying</surname></persName>
		</editor>
		<imprint>
			<publisher>Tsinghua University Press and Springer</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="622" to="627" />
		</imprint>
	</monogr>
	<note>Eleventh International Fuzzy Systems Association World Congress</note>
</biblStruct>

<biblStruct xml:id="b112">
	<analytic>
		<title level="a" type="main">Lattice theory</title>
		<author>
			<persName><forename type="first">G</forename><surname>Birkhoff</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">American Mathematical Society</title>
		<imprint>
			<date type="published" when="1967">1967</date>
		</imprint>
	</monogr>
	<note>3d edition</note>
</biblStruct>

<biblStruct xml:id="b113">
	<analytic>
		<title level="a" type="main">Calcul pratique du treillis de Galois d&apos;une correspondance</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Bordat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Math. Sci. Hum</title>
		<imprint>
			<biblScope unit="volume">96</biblScope>
			<biblScope unit="page" from="31" to="47" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b114">
	<analytic>
		<title level="a" type="main">Ulysses: A lattice-based multiple interaction strategy retrieval interface</title>
		<author>
			<persName><forename type="first">Claudio</forename><surname>Carpineto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Giovanni</forename><surname>Romano</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Human-Computer Interaction</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">Brad</forename><surname>Blumenthal</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Juri</forename><surname>Gornostaev</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Claus</forename><surname>Unger</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1995">1995</date>
			<biblScope unit="volume">1015</biblScope>
			<biblScope unit="page" from="91" to="104" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b115">
	<analytic>
		<title level="a" type="main">The lattice of closure systems, closure operators and implicational systems on a finite set: a survey</title>
		<author>
			<persName><forename type="first">N</forename><surname>Caspard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Monjardet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete Applied Mathematics</title>
		<imprint>
			<biblScope unit="volume">127</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="241" to="269" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b116">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">Cyb. Bubblegôm Gôm</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2009">2009</date>
			<publisher>Studio Cyborga</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b117">
	<analytic>
		<title level="a" type="main">Generation algorithm of a concept lattice with limited object access</title>
		<author>
			<persName><forename type="first">C</forename><surname>Demko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Bertet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of Concept lattices and Applications (CLA&apos;11)</title>
				<meeting>of Concept lattices and Applications (CLA&apos;11)<address><addrLine>Nancy, France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011-10">October 2011</date>
			<biblScope unit="page" from="113" to="116" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b118">
	<analytic>
		<title level="a" type="main">Two basic algorithms in concept analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Preprint</title>
		<imprint>
			<biblScope unit="volume">831</biblScope>
			<date type="published" when="1984">1984</date>
		</imprint>
		<respStmt>
			<orgName>Technische Hochschule Darmstadt</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b119">
	<monogr>
		<title level="m" type="main">Formal Concept Analysis, Mathematical foundations</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer Verlag</publisher>
			<pubPlace>Berlin</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b120">
	<analytic>
		<title level="a" type="main">Design of a browsing interface for information retrieval</title>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Pichet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Gecsei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIGIR Forum</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="32" to="39" />
			<date type="published" when="1989-05">May 1989</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b121">
	<analytic>
		<title level="a" type="main">Ontologies and spatial relations applied to comic books reading</title>
		<author>
			<persName><forename type="first">Clément</forename><surname>Guérin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">PhD Symposium of Knowledge Engineering and Knowledge Management (EKAW)</title>
				<meeting><address><addrLine>Galway, Ireland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012-10">October 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b122">
	<analytic>
		<title level="a" type="main">An approach to Semantic Content Based Image Retrieval using Logical Concept Analysis. Application to comicbooks</title>
		<author>
			<persName><forename type="first">Clément</forename><surname>Guérin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Karell</forename><surname>Bertet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Arnaud</forename><surname>Revel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Workshop &quot;What can FCA do for Artificial Intelligence?&quot; FCA4AI</title>
				<meeting><address><addrLine>France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012-08">August 2012</date>
			<biblScope unit="page" from="53" to="56" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b123">
	<analytic>
		<title level="a" type="main">Efficient determination of the transitive closure of a directed graph</title>
		<author>
			<persName><forename type="first">I</forename><surname>Munro</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Processing Letter</title>
				<imprint>
			<date type="published" when="1971">1971</date>
			<biblScope unit="page" from="56" to="58" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b124">
	<analytic>
		<title level="a" type="main">Comparing performance of algorithms for generating concept lattices</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Obiedkov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Experimental and Theorical Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2-3</biblScope>
			<biblScope unit="page" from="189" to="216" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b125">
	<analytic>
		<title level="a" type="main">Fast concept analysis</title>
		<author>
			<persName><forename type="first">Christian</forename><surname>Lindig</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Working with Conceptual Structures-Contributions to ICCS</title>
				<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="235" to="248" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b126">
	<analytic>
		<title level="a" type="main">Boolean matrix multiplication and transitive closure</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Fisher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">R</forename><surname>Meyer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">12 th Annual Sympsosium on Switching and Automata Theory</title>
				<imprint>
			<date type="published" when="1971">1971</date>
			<biblScope unit="page" from="129" to="131" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b127">
	<analytic>
		<title level="a" type="main">An algorithm for computing the maximal rectangles in a binary relation</title>
		<author>
			<persName><forename type="first">E</forename><surname>Norris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Revue Roumaine de Mathématiques Pures et Appliquées</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="1978">1978</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b128">
	<analytic>
		<title level="a" type="main">A fast algorithm for building lattices</title>
		<author>
			<persName><forename type="first">L</forename><surname>Nourine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Raynaud</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing Letters</title>
		<imprint>
			<biblScope unit="volume">71</biblScope>
			<biblScope unit="page" from="199" to="204" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b129">
	<analytic>
		<title level="a" type="main">Lattice-based information retrieval</title>
		<author>
			<persName><forename type="first">Uta</forename><surname>Priss</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge Organization</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page" from="132" to="142" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b130">
	<analytic>
		<title level="a" type="main">Robust frame and text extraction from comic books</title>
		<author>
			<persName><forename type="first">Christophe</forename><surname>Rigaud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Norbert</forename><surname>Tsopze</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jean-Christophe</forename><surname>Burie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jean-Marc</forename><surname>Ogier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Graphics Recognition. New Trends and Challenges</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">Young-Bin</forename><surname>Kwon</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Jean-Marc</forename><surname>Ogier</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">7423</biblScope>
			<biblScope unit="page" from="129" to="138" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b131">
	<analytic>
		<title level="a" type="main">Relevance feedback: a power tool for interactive content-based image retrieval</title>
		<author>
			<persName><forename type="first">Yong</forename><surname>Rui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Thomas</forename><forename type="middle">S</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Ortega</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sharad</forename><surname>Mehrotra</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="644" to="655" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
	<note>Circuits and Systems for Video Technology</note>
</biblStruct>

<biblStruct xml:id="b132">
	<monogr>
		<title level="m" type="main">Active learning literature survey</title>
		<author>
			<persName><forename type="first">Burr</forename><surname>Settles</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
		<respStmt>
			<orgName>University of Wisconsin-Madison</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Computer Sciences Technical Report 1648</note>
</biblStruct>

<biblStruct xml:id="b133">
	<analytic>
		<title level="a" type="main">Computing iceberg concept lattices with TITANIC</title>
		<author>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Taouil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Bastide</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pasquier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Lakhal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data and Knowledge Engineering</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="189" to="222" />
			<date type="published" when="2002-08">August 2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b134">
	<analytic>
		<title level="a" type="main">N-trees as nestings: complexity, similarity and consensus</title>
		<author>
			<persName><forename type="first">Iii</forename><surname>Adams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">N</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Classification</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="299" to="317" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b135">
	<analytic>
		<title level="a" type="main">Dependency structures of data base relationships</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">W</forename><surname>Armstrong</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing</title>
		<imprint>
			<biblScope unit="volume">74</biblScope>
			<biblScope unit="page">580583</biblScope>
			<date type="published" when="1974">1974</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b136">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Barbut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Monjardet</surname></persName>
		</author>
		<title level="m">Ordres et classification: Algèbre et combinatoire (tome II</title>
				<meeting><address><addrLine>Paris</addrLine></address></meeting>
		<imprint>
			<publisher>Hachette</publisher>
			<date type="published" when="1970">1970</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b137">
	<analytic>
		<title level="a" type="main">Representing a concept lattice by a graph</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sigayret</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete Applied Mathematics</title>
		<imprint>
			<biblScope unit="volume">144</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="27" to="42" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b138">
	<analytic>
		<title level="a" type="main">A Peep through the Looking Glass: Articulation Points in Lattices</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sigayret</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Domenach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Ignatov</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Poelmans</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">7278</biblScope>
			<biblScope unit="page" from="45" to="60" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b139">
	<analytic>
		<title level="a" type="main">The dependence graph of a lattice</title>
		<author>
			<persName><forename type="first">K</forename><surname>Bertet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CLA</title>
		<editor>Szathmary, L., Priss, U.</editor>
		<imprint>
			<biblScope unit="volume">2012</biblScope>
			<biblScope unit="page" from="223" to="231" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b140">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Birkhoff</surname></persName>
		</author>
		<title level="m">Lattice Theory</title>
				<meeting><address><addrLine>Providence, R.I.</addrLine></address></meeting>
		<imprint>
			<publisher>Amer. Math.Soc</publisher>
			<date type="published" when="1967">1967</date>
		</imprint>
	</monogr>
	<note>Third ed</note>
</biblStruct>

<biblStruct xml:id="b141">
	<analytic>
		<title level="a" type="main">OpenFCA, an open source formal concept analysis toolox</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">V</forename><surname>Borza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sabou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Sacarea</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of IEEE International Conference on Automation Quality and Testing Robotics (AQTR)</title>
				<meeting>of IEEE International Conference on Automation Quality and Testing Robotics (AQTR)</meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b142">
	<analytic>
		<title level="a" type="main">The lattices of Moore families and closure operators on a finite set: a survey</title>
		<author>
			<persName><forename type="first">N</forename><surname>Caspard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Monjardet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Disc. App. Math</title>
		<imprint>
			<biblScope unit="volume">127</biblScope>
			<biblScope unit="page" from="241" to="269" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b143">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><surname>Caspard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Leclerc</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Monjardet</surname></persName>
		</author>
		<title level="m">Finite Ordered Sets: Concepts, Results and Uses</title>
				<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b144">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">A</forename><surname>Davey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Priestley</surname></persName>
		</author>
		<title level="m">Introduction to Lattices and Order</title>
				<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
	<note>2nd ed.</note>
</biblStruct>

<biblStruct xml:id="b145">
	<analytic>
		<title level="a" type="main">Closure systems, Implicational Systems, Overhanging Relations and the case of Hierarchical Classification</title>
		<author>
			<persName><forename type="first">F</forename><surname>Domenach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Leclerc</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Math. Soc. Sci</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="349" to="366" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b146">
	<analytic>
		<title level="a" type="main">Formal Concept Analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Mathematical Foundations</title>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b147">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Grätzer</surname></persName>
		</author>
		<title level="m">General lattice theory</title>
				<imprint>
			<publisher>Academic Press</publisher>
			<date type="published" when="1978">1978</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b148">
	<analytic>
		<title level="a" type="main">Familles minimales d&apos;implications informatives résultant d&apos;un tableau de données binaires</title>
		<author>
			<persName><forename type="first">J.-L</forename><surname>Guigues</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Duquenne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Math. Sci. Hum</title>
		<imprint>
			<biblScope unit="volume">95</biblScope>
			<biblScope unit="page" from="5" to="18" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b149">
	<analytic>
		<title level="a" type="main">The number of Moore families on n=6</title>
		<author>
			<persName><forename type="first">M</forename><surname>Habib</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Nourine</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Disc. Math</title>
		<imprint>
			<biblScope unit="volume">294</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="291" to="296" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b150">
	<analytic>
		<title level="a" type="main">Lattice Miner: A Tool for Concept Lattice Construction and Exploration</title>
		<author>
			<persName><forename type="first">B</forename><surname>Lahcen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Kwuida</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Supplementary Proceeding of International Conference on Formal concept analysis (ICFCA&apos;10)</title>
				<editor>
			<persName><forename type="first">L</forename><surname>Boumedjout</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Kwuida</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Sertkaya</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="59" to="66" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b151">
	<analytic>
		<title level="a" type="main">FCART: A New FCA-based System for Data Analysis and Knowledge Discovery</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Neznanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Ilvovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kusnetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Contributions to the 11th International Conference on Formal Concept Analysis</title>
				<editor>
			<persName><forename type="first">P</forename><surname>Cellier</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Distel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="65" to="78" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b152">
	<analytic>
		<title level="a" type="main">Galois connexions</title>
		<author>
			<persName><forename type="first">O</forename><surname>Öre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Trans. Amer. Math. Soc</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="494" to="513" />
			<date type="published" when="1944">1944</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b153">
	<analytic>
		<title level="a" type="main">Path independence, rationality and social choice</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">R</forename><surname>Plott</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Econometrica</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page">10751091</biblScope>
			<date type="published" when="1973">1973</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b154">
	<analytic>
		<title level="a" type="main">FCA Software Interoperability</title>
		<author>
			<persName><forename type="first">U</forename><surname>Priss</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CLA</title>
		<editor>Belohlavek, R., Kuznetsov, S.O.</editor>
		<imprint>
			<biblScope unit="page">33144</biblScope>
			<date type="published" when="2008">2008. 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b155">
	<monogr>
		<title level="m" type="main">Lattices and Ordered Sets</title>
		<author>
			<persName><forename type="first">S</forename><surname>Roman</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b156">
	<analytic>
		<title level="a" type="main">Galicia: An Open Platform for Lattices</title>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Grosser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Roume</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rouane Hacene</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Using Conceptual Structures: Contributions to the 11th Intl. Conference on Conceptual Structures (ICCS&apos;03)</title>
				<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="241" to="254" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b157">
	<analytic>
		<title level="a" type="main">TOSCANA -a graphical tool for analyzing and exploring data</title>
		<author>
			<persName><forename type="first">F</forename><surname>Vogt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Graph Drawing</title>
				<editor>
			<persName><forename type="first">R</forename><surname>Tamassia</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><forename type="middle">G</forename><surname>Tollis</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="1994">1994</date>
			<biblScope unit="volume">894</biblScope>
			<biblScope unit="page" from="226" to="233" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b158">
	<analytic>
		<title level="a" type="main">System of data analysis &quot;Concept Explorer</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Yevtushenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 7th national conference on Artificial Intelligence KII-2000</title>
				<meeting>the 7th national conference on Artificial Intelligence KII-2000<address><addrLine>Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="127" to="134" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b159">
	<analytic>
		<title level="a" type="main">Formal concept analysis and lattice-valued Chu systems</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">T</forename><surname>Denniston</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Melton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">E</forename><surname>Rodabaugh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">216</biblScope>
			<biblScope unit="page" from="52" to="90" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b160">
	<analytic>
		<title level="a" type="main">A cartesian closed category of approximable concept structures</title>
		<author>
			<persName><forename type="first">P</forename><surname>Hitzler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G.-Q</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">3127</biblScope>
			<biblScope unit="page" from="170" to="185" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b161">
	<analytic>
		<title level="a" type="main">A categorical view at generalized concept lattices</title>
		<author>
			<persName><forename type="first">S</forename><surname>Krajči</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Kybernetika</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="255" to="264" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b162">
	<analytic>
		<title level="a" type="main">The category of L-Chu correspondences and the structure of L-bonds</title>
		<author>
			<persName><forename type="first">O</forename><surname>Krídlo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Krajči</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<biblScope unit="volume">115</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="297" to="325" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b163">
	<analytic>
		<title level="a" type="main">On L-fuzzy Chu correspondences</title>
		<author>
			<persName><forename type="first">O</forename><surname>Krídlo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Intl J of Computer Mathematics</title>
		<imprint>
			<biblScope unit="volume">88</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="1808" to="1818" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b164">
	<analytic>
		<title level="a" type="main">Linking L-Chu Correspondences and Completely Lattice L-ordered Sets</title>
		<author>
			<persName><forename type="first">O</forename><surname>Krídlo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Intl Conf. on Concept Lattices and its Applications (CLA&apos;12)</title>
				<meeting>the Intl Conf. on Concept Lattices and its Applications (CLA&apos;12)</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="233" to="244" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b165">
	<analytic>
		<title level="a" type="main">Morphisms in context</title>
		<author>
			<persName><forename type="first">M</forename><surname>Krötzsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hitzler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G.-Q</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">3596</biblScope>
			<biblScope unit="page" from="223" to="237" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b166">
	<analytic>
		<title level="a" type="main">Chu correspondences</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mori</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Hokkaido Mathematical Journal</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="page" from="147" to="214" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b167">
	<analytic>
		<title level="a" type="main">Lattice-valued topological systems as a framework for lattice-valued formal concept analysis</title>
		<author>
			<persName><forename type="first">S</forename><surname>Solovyov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Mathematics</title>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>To appear</note>
</biblStruct>

<biblStruct xml:id="b168">
	<analytic>
		<title level="a" type="main">Chu spaces, concept lattices, and domains</title>
		<author>
			<persName><forename type="first">G.-Q</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronic Notes in Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">83</biblScope>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b169">
	<analytic>
		<title level="a" type="main">Approximable concepts, Chu spaces, and information systems</title>
		<author>
			<persName><forename type="first">G.-Q</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Shen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory and Applications of Categories</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="80" to="102" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b170">
	<analytic>
		<title level="a" type="main">Relationship between two FCA approaches on heterogeneous formal contexts</title>
		<author>
			<persName><forename type="first">L</forename><surname>Antoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Krajči</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Krídlo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Macek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pisková</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of CLA</title>
				<meeting>CLA</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="93" to="102" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b171">
	<monogr>
		<title level="m" type="main">On heterogeneous formal contexts. Fuzzy Sets and Systems</title>
		<author>
			<persName><forename type="first">L</forename><surname>Antoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Krajči</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Krídlo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Macek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pisková</surname></persName>
		</author>
		<imprint>
			<publisher>Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b172">
	<analytic>
		<title level="a" type="main">Fuzzy concepts and conceptual structures: induced similarities</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of Joint Conference on Information Sciences</title>
				<meeting>Joint Conference on Information Sciences</meeting>
		<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="179" to="182" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b173">
	<analytic>
		<title level="a" type="main">Lattices of fixed points of fuzzy Galois connections</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematical Logic Quartely</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="111" to="116" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b174">
	<analytic>
		<title level="a" type="main">Concept lattices and order in fuzzy logic</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Pure and Applied Logic</title>
		<imprint>
			<biblScope unit="volume">128</biblScope>
			<biblScope unit="issue">1-3</biblScope>
			<biblScope unit="page" from="277" to="298" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b175">
	<analytic>
		<title level="a" type="main">Lattice-type fuzzy order is uniquely given by its 1-cut: proof and consequences</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">143</biblScope>
			<biblScope unit="page" from="447" to="458" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b176">
	<monogr>
		<title level="m" type="main">Formal concept analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer-Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b177">
	<analytic>
		<title level="a" type="main">On the L-fuzzy generalization of Chu correspondences</title>
		<author>
			<persName><forename type="first">O</forename><surname>Krídlo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Mathematics</title>
		<imprint>
			<biblScope unit="volume">88</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="1808" to="1818" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b178">
	<analytic>
		<title level="a" type="main">The category of L-Chu correspondences and the structure of L-bonds</title>
		<author>
			<persName><forename type="first">O</forename><surname>Krídlo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Krajči</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<biblScope unit="volume">115</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="297" to="325" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b179">
	<analytic>
		<title level="a" type="main">Linking L-Chu correspondences and completely lattice L-ordered sets</title>
		<author>
			<persName><forename type="first">O</forename><surname>Krídlo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of CLA</title>
				<meeting>CLA</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="233" to="244" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b180">
	<analytic>
		<title level="a" type="main">Multi-adjoint t-concept lattices</title>
		<author>
			<persName><forename type="first">J</forename><surname>Medina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">180</biblScope>
			<biblScope unit="page" from="712" to="725" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b181">
	<analytic>
		<title level="a" type="main">On multi-adjoint concept lattices based on heterogeneous conjunctors</title>
		<author>
			<persName><forename type="first">J</forename><surname>Medina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">208</biblScope>
			<biblScope unit="page" from="95" to="110" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b182">
	<analytic>
		<title level="a" type="main">Chu Correspondences</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mori</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Hokkaido Matematical Journal</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="page" from="147" to="214" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b183">
	<analytic>
		<title level="a" type="main">Functorial properties of Formal Concept Analysis</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mori</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proc ICCS, Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">4604</biblScope>
			<biblScope unit="page" from="505" to="508" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b184">
	<analytic>
		<title level="a" type="main">Note on generating fuzzy concept lattices via Galois connections</title>
		<author>
			<persName><forename type="first">J</forename><surname>Pócs</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">185</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="128" to="136" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b185">
	<analytic>
		<title level="a" type="main">On possible generalization of fuzzy concept lattices</title>
		<author>
			<persName><forename type="first">J</forename><surname>Pócs</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">210</biblScope>
			<biblScope unit="page" from="89" to="98" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b186">
	<analytic>
		<title level="a" type="main">Relational concept discovery in structured datasets</title>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rouane-Hacène</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Roume</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ann. Math. Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">1-4</biblScope>
			<biblScope unit="page">3976</biblScope>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b187">
	<analytic>
		<title level="a" type="main">Querying relational concept lattices</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Azmeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rouane-Hacène</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CLA&apos;</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page">377392</biblScope>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b188">
	<analytic>
		<title level="a" type="main">Building and Maintaining Analysis-Level Class Hierarchies using Galois Lattices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mili</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">OOPSLA &apos;93</title>
				<imprint>
			<date type="published" when="1993">1993</date>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page">394410</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b189">
	<analytic>
		<title level="a" type="main">Identifying ecological traits: a concrete FCA-based approach</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bertaux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Le Ber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Braud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Trémolières</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICFCA 2009</title>
				<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="volume">5548</biblScope>
			<biblScope unit="page">224236</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b190">
	<analytic>
		<title level="a" type="main">Formal Concept Analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Mathematical Foundations</title>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer-Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b191">
	<analytic>
		<title level="a" type="main">Restructuring variability in software product lines using concept analysis of product congurations</title>
		<author>
			<persName><forename type="first">F</forename><surname>Loesch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Ploedereder</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CSMR</title>
		<imprint>
			<biblScope unit="page">159170</biblScope>
			<date type="published" when="2007">2007. 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b192">
	<analytic>
		<title level="a" type="main">Relational concept analysis: mining concept lattices from multi-relational data</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Hacene</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ann. Math. Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">67</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">81108</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b193">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Grac</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Le Ber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Braud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Trémolières</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bertaux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Herrmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Manné</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lafont</surname></persName>
		</author>
		<title level="m">Programme de recherche-développement Indices rapport scienque nal</title>
				<imprint>
			<publisher>LHYGES LSIIT ONEMA CEMAGREF</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note>Contrat pluriannuel 1463 de l&apos;Agence de l&apos;Eau Rhin-Meuse</note>
</biblStruct>

<biblStruct xml:id="b194">
	<analytic>
		<title level="a" type="main">Hermes: an ecient algorithm for building Galois Sub-hierarchies</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sigayret</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CLA</title>
		<imprint>
			<biblScope unit="page">2132</biblScope>
			<date type="published" when="2012">2012. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b195">
	<analytic>
		<title level="a" type="main">The Lattice of Concept Graphs of a Relationally Scaled Context</title>
		<author>
			<persName><forename type="first">S</forename><surname>Prediger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICCS&apos;99</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page">401414</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b196">
	<analytic>
		<title level="a" type="main">Arbitrary Relations in Formal Concept Analysis and Logical Information Systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ferré</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Ridoux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Sigonneau</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICCS&apos;05</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">3596</biblScope>
			<biblScope unit="page">166180</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b197">
	<analytic>
		<title level="a" type="main">Building Abstractions in Class Models: Formal Concept Analysis in a Model-Driven Approach</title>
		<author>
			<persName><forename type="first">G</forename><surname>Arévalo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Falleri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Nebut</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">MoDELS</title>
				<imprint>
			<date type="published" when="2006">2006. 2006</date>
			<biblScope unit="page">513527</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b198">
	<analytic>
		<title level="a" type="main">Fixing Generalization Defects in UML Use Case Diagrams</title>
		<author>
			<persName><forename type="first">X</forename><surname>Dolques</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Nebut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Reitz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundam. Inform</title>
		<imprint>
			<biblScope unit="volume">115</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">327356</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b199">
	<analytic>
		<title level="a" type="main">Refactorings of Design Defects Using Relational Concept Analysis</title>
		<author>
			<persName><forename type="first">N</forename><surname>Moha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">R</forename><surname>Hacene</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">G</forename><surname>Guéhéneuc</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICFCA</title>
		<imprint>
			<biblScope unit="page">289304</biblScope>
			<date type="published" when="2008">2008. 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b200">
	<analytic>
		<title level="a" type="main">Generation of Operational Transformation Rules from Examples of Model Transformations</title>
		<author>
			<persName><forename type="first">H</forename><surname>Saada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Dolques</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Nebut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Sahraoui</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">MoDELS</title>
				<imprint>
			<date type="published" when="2012">2012. 2012</date>
			<biblScope unit="page">546561</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b201">
	<analytic>
		<title level="a" type="main">Selection of Composable Web Services Driven by User Requirements</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Azmeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Driss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Hamoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Moha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Tibermacine</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICWS</title>
		<imprint>
			<biblScope unit="page">395402</biblScope>
			<date type="published" when="2011">2011. 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b202">
	<analytic>
		<title level="a" type="main">Formal Concept Analysis: A unied framework for building and rening ontologies</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bendaoud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Toussaint</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">EKAW 2008</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">5268</biblScope>
			<biblScope unit="page">156171</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b203">
	<analytic>
		<title level="a" type="main">Supporting Ontology Design through Large-Scale FCA-Based Ontology Restructuring</title>
		<author>
			<persName><forename type="first">M</forename><surname>Rouane-Hacene</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Nkambou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICCS</title>
		<imprint>
			<biblScope unit="page">257269</biblScope>
			<date type="published" when="2011">2011. 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b204">
	<analytic>
		<title level="a" type="main">Mining for Reengineering: an Application to Semantic Wikis using Formal and Relational Concept Analysis</title>
		<author>
			<persName><forename type="first">L</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Toussaint</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Blansché</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ESWC&apos;11</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">6644</biblScope>
			<biblScope unit="page">421435</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b205">
	<analytic>
		<title level="a" type="main">Default Reasoning over Domains and Concept Hierarchies</title>
		<author>
			<persName><forename type="first">P</forename><surname>Hitzler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of KI 2004</title>
				<meeting>of KI 2004</meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">3238</biblScope>
			<biblScope unit="page">351365</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b206">
	<analytic>
		<title level="a" type="main">Induction of Classications from Linguistic Data</title>
		<author>
			<persName><forename type="first">R</forename><surname>Osswald</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Pedersen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of ECAI&apos;02 Workshop</title>
				<meeting>of ECAI&apos;02 Workshop</meeting>
		<imprint>
			<date type="published" when="2002-07">July 2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b207">
	<analytic>
		<title level="a" type="main">A Set-Theoretical Approach for the Induction of Inheritance Hierarchies</title>
		<author>
			<persName><forename type="first">W</forename><surname>Petersen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ENTCS</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<date type="published" when="2001-07">July 2001</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b208">
	<analytic>
		<title level="a" type="main">Galois Lattice as a Framework to specify Algorithms Building Class Hierarchies</title>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Dicky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Leblanc</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theoretical Informatics and Applications</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page">521548</biblScope>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b209">
	<analytic>
		<title level="a" type="main">Extraction of feature models from formal contexts</title>
		<author>
			<persName><forename type="first">U</forename><surname>Ryssel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ploennigs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kabitzsch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SPLC 2011 Workshops</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page">4</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b210">
	<analytic>
		<title level="a" type="main">Induction of decision trees</title>
		<author>
			<persName><forename type="first">J</forename><surname>Quinlan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Machine Learning</title>
				<imprint>
			<date type="published" when="1986">1986</date>
			<biblScope unit="page">81106</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b211">
	<analytic>
		<title level="a" type="main">Rule induction with cn2: Some recent improvements</title>
		<author>
			<persName><forename type="first">P</forename><surname>Clark</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Boswell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">EWSL</title>
		<imprint>
			<biblScope unit="page">151163</biblScope>
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b212">
	<analytic>
		<title level="a" type="main">Propositionalization</title>
		<author>
			<persName><forename type="first">N</forename><surname>Lachiche</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Encyclopedia of Machine Learning</title>
				<editor>
			<persName><forename type="first">C</forename><surname>Sammut</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><forename type="middle">I</forename><surname>Webb</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page">812817</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b213">
	<analytic>
		<title level="a" type="main">Inductive logic programming: Theory and methods</title>
		<author>
			<persName><forename type="first">S</forename><surname>Muggleton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>De Raedt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Journal of Logic Programming</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">20</biblScope>
			<biblScope unit="page">629679</biblScope>
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b214">
	<analytic>
		<title level="a" type="main">Matching species traits to environmental variables: a new three-table ordination method</title>
		<author>
			<persName><forename type="first">S</forename><surname>Doledec</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Chessel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ter Braak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Champely</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Environmental and Ecological Statistics</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page">143166</biblScope>
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b215">
	<analytic>
		<title level="a" type="main">Formal Concept Analysis With Background Knowledge: Attribute Priorities</title>
		<author>
			<persName><forename type="first">R</forename><surname>Belohlavek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Beydoun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews</title>
		<imprint>
			<biblScope unit="volume">5465</biblScope>
			<biblScope unit="page">109117</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b216">
	<analytic>
		<title level="a" type="main">Conceptual knowledge discovery: a human-centered approach</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hereth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Applied Articial Intelligence</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page">281302</biblScope>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b217">
	<analytic>
		<title level="a" type="main">Restructuring Lattice Theory: An Approach Based on Hierarchies of Concepts</title>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICFCA</title>
		<imprint>
			<biblScope unit="page">314339</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b218">
	<analytic>
		<title level="a" type="main">Generating frequent itemsets incrementally: two novel approaches based on Galois lattice theory</title>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Meridji</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Exp. Theor. Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2-3</biblScope>
			<biblScope unit="page">115142</biblScope>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b219">
	<analytic>
		<title level="a" type="main">A Formal Concept Analysis Approach to Discover Association Rules from Data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Maddouri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">R. Belohlavek. V. Snasel CLA</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">1021</biblScope>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b220">
	<analytic>
		<title level="a" type="main">Fast algorithms for mining association rules in large databases</title>
		<author>
			<persName><forename type="first">R</forename><surname>Agrawal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 20th International Conference on Very Large Data Bases</title>
				<meeting>the 20th International Conference on Very Large Data Bases</meeting>
		<imprint>
			<date type="published" when="1994">1994</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">487499</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b221">
	<analytic>
		<title level="a" type="main">Ecient Mining of Association Rules Based on Formal Concept Analysis</title>
		<author>
			<persName><forename type="first">L</forename><surname>Lakhal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">G</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNAI</title>
		<editor>Ganter et al. Springer</editor>
		<imprint>
			<biblScope unit="volume">3626</biblScope>
			<biblScope unit="page">180195</biblScope>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b222">
	<analytic>
		<title level="a" type="main">AddIntent: A New Incremental Algorithm for Constructing Concept Lattices</title>
		<author>
			<persName><forename type="first">D</forename><surname>Merwe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Obiedkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kourie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Concept Lattices</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">P</forename><surname>Eklund</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2961. 2004</date>
			<biblScope unit="page">372385</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b223">
	<analytic>
		<title level="a" type="main">A Bottom-Up Incremental Algorithm of Building Concept Lattice</title>
		<author>
			<persName><forename type="first">L</forename><surname>Lv</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Jia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Software Engineering and Knowledge Engineering: Theory and Practice</title>
				<editor>
			<persName><forename type="first">Y</forename><surname>Wu</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012. 9198</date>
			<biblScope unit="volume">115</biblScope>
		</imprint>
	</monogr>
	<note>Advances in Intelligent and Soft Computing</note>
</biblStruct>

<biblStruct xml:id="b224">
	<analytic>
		<title level="a" type="main">A partition-based approach towards constructing Galois (concept) lattices</title>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Lebrun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete Math</title>
		<imprint>
			<biblScope unit="volume">256</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="801" to="829" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b225">
	<analytic>
		<title level="a" type="main">A Fast Algorithm for Building Lattices</title>
		<author>
			<persName><forename type="first">L</forename><surname>Nourine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Raynaud</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Process. Lett</title>
		<imprint>
			<biblScope unit="volume">71</biblScope>
			<biblScope unit="issue">5-6</biblScope>
			<biblScope unit="page">199204</biblScope>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b226">
	<analytic>
		<title level="a" type="main">A fast incremental algorithm for building lattices</title>
		<author>
			<persName><forename type="first">L</forename><surname>Nourine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Raynaud</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Exp. Theor. Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2-3</biblScope>
			<biblScope unit="page">217227</biblScope>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b227">
	<analytic>
		<title level="a" type="main">A Linear Delay Algorithm for Building Concept Lattices</title>
		<author>
			<persName><forename type="first">M</forename><surname>Farach-Colton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Huang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Combinatorial Pattern Matching</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">P</forename><surname>Ferragina</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Landau</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">5029</biblScope>
			<biblScope unit="page">204216</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b228">
	<analytic>
		<title level="a" type="main">Incremental concept formation algorithms based on Galois (Concept) lattices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Alaoui</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computational Intelligence</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page">246267</biblScope>
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b229">
	<analytic>
		<title level="a" type="main">Two basic algorithms in concept analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8th international conference on Formal Concept Analysis. ICFCA-10</title>
				<meeting>the 8th international conference on Formal Concept Analysis. ICFCA-10<address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page">312340</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b230">
	<analytic>
		<title level="a" type="main">Comparing performance of algorithms for generating concept lattices</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Obiedkov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Experimental and Theoretical Articial Intelligence</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2-3</biblScope>
			<biblScope unit="page">189216</biblScope>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b231">
	<analytic>
		<title level="a" type="main">Computational Intelligence Based on Lattice Theory</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">G</forename><surname>Kaburlasos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">X</forename><surname>Ritter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Studies in Computational Intelligence</title>
		<imprint>
			<biblScope unit="volume">67</biblScope>
			<date type="published" when="2007">2007</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b232">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">A</forename><surname>Davey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A P</forename></persName>
		</author>
		<title level="m">Introduction to lattices and orders</title>
				<imprint>
			<publisher>Press Sindicate H. Cambridge University</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
	<note>2nd edn</note>
</biblStruct>

<biblStruct xml:id="b233">
	<analytic>
		<title level="a" type="main">Neurons, Dendrites, and Pattern Classication</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">X</forename><surname>Ritter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Iancu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Urcid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CIARP</title>
		<imprint>
			<biblScope unit="page">116</biblScope>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b234">
	<analytic>
		<title level="a" type="main">Single Layer Morphological Perceptron Solution to the N-Bit Parity Problem</title>
		<author>
			<persName><forename type="first">G</forename><surname>Urcid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">X</forename><surname>Ritter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Iancu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CIARP</title>
		<imprint>
			<biblScope unit="page">171178</biblScope>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b235">
	<analytic>
		<title level="a" type="main">Learning in Lattice Neural Networks that Employ Dendritic Computing</title>
		<author>
			<persName><forename type="first">G</forename><surname>Ritter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Urcid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computational Intelligence Based on Lattice Theory</title>
		<title level="s">Studies in Computational Intelligence</title>
		<editor>
			<persName><forename type="first">V</forename><surname>Kaburlasos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Ritter</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin / Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">67</biblScope>
			<biblScope unit="page">2544</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b236">
	<analytic>
		<title level="a" type="main">Orthonormal Basis Latice Neural Networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Barmpoutis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">X</forename><surname>Ritter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computational Intelligence Based on LatticeTheory</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Kaburlasos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><forename type="middle">X</forename><surname>Ritter</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg, Germany</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">4356</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b237">
	<analytic>
		<title level="a" type="main">Granular Enhancement of Fuzzy ART-SOM Neural Classiers Based on Lattice Theory</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kaburlasos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computational Intelligence Based on Lattice Theory</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Kaburlasos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Gerhard</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin / Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">67</biblScope>
			<biblScope unit="page">323</biblScope>
		</imprint>
	</monogr>
	<note>Studies in Computational Intelligence</note>
</biblStruct>

<biblStruct xml:id="b238">
	<analytic>
		<title level="a" type="main">An associative memory approach to medical decision support systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Aldape-Perez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Yanez-Marquez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Camacho-Nieto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Arguelles-Cruz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Comput. Methods Prog. Biomed</title>
		<imprint>
			<biblScope unit="volume">106</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">287307</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b239">
	<analytic>
		<title level="a" type="main">A Novel Lattice Associative Memory Based on Dendritic Computing</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">X</forename><surname>Ritter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Chyzhyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Urcid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Grana</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">HAIS</title>
		<imprint>
			<biblScope unit="page">491502</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b240">
	<analytic>
		<title level="a" type="main">Fuzzy lattice neurocomputing (n) models</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">G</forename><surname>Kaburlasos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">V</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Neural Networks</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page">11451170</biblScope>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b241">
	<analytic>
		<title level="a" type="main">A Lattice-Based Approach to Mathematical Morphology for Greyscale and Colour Images</title>
		<author>
			<persName><forename type="first">V</forename><surname>Witte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Schulte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nachtegael</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Malange</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Kerre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computational Intelligence Based on Lattice Theory</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Kaburlasos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Ritter</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin / Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">67</biblScope>
			<biblScope unit="page">129148</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b242">
	<analytic>
		<title level="a" type="main">Robust image retrieval from noisy inputs using lattice associative memories</title>
		<author>
			<persName><forename type="first">G</forename><surname>Urcid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Nieves-Vazquez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">-A</forename><surname>Garcia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Valdiviezo-N</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Image Processing: Algorithms and Systems</title>
				<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b243">
	<analytic>
		<title level="a" type="main">Mathematical morphology operators over concept lattices</title>
		<author>
			<persName><forename type="first">J</forename><surname>Atif</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">I D F H C</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICFCA 2013</title>
				<editor>
			<persName><forename type="first">P</forename><surname>Cellier</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Distel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">7880</biblScope>
			<biblScope unit="page">2843</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b244">
	<analytic>
		<title level="a" type="main">Interval-valued linguistic variables: an application to the L-fuzzy contexts with absent values</title>
		<author>
			<persName><forename type="first">C</forename><surname>Alcalde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Burusco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Fuentes-González</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. General Systems</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="255" to="270" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b245">
	<analytic>
		<title level="a" type="main">The use of linguistic variables and fuzzy propositions in the L-fuzzy concept theory</title>
		<author>
			<persName><forename type="first">C</forename><surname>Alcalde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Burusco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Fuentes-González</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Zubia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Mathematics with Applications</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="3111" to="3122" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b246">
	<monogr>
		<title level="m" type="main">Fuzzy Relational Systems: Foundations and Principles</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>Kluwer Academic Publishers</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b247">
	<analytic>
		<title level="a" type="main">Closure spaces of isotone Galois connections and their morphisms</title>
		<author>
			<persName><forename type="first">R</forename><surname>Belohlavek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Konecny</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Australasian Conference on Artificial Intelligence</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">Dianhui</forename><surname>Wang</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Mark</forename><surname>Reynolds</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">7106</biblScope>
			<biblScope unit="page" from="182" to="191" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b248">
	<analytic>
		<title level="a" type="main">Row and column spaces of matrices over residuated lattices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Belohlavek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Konecny</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundam. Inf</title>
		<imprint>
			<biblScope unit="volume">115</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="279" to="295" />
			<date type="published" when="2012-12">December 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b249">
	<analytic>
		<title level="a" type="main">On generation of one-sided concept lattices from restricted context</title>
		<author>
			<persName><forename type="first">P</forename><surname>Butka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pócsová</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pócs</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 10th Jubilee Intl Symp on Intelligent Systems and Informatics (SISY)</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="111" to="115" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b250">
	<analytic>
		<title level="a" type="main">Formal concept analysis and lattice-valued Chu systems</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">T</forename><surname>Denniston</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Melton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">E</forename><surname>Rodabaugh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">216</biblScope>
			<biblScope unit="page" from="52" to="90" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b251">
	<analytic>
		<title level="a" type="main">Possibility theory and formal concept analysis: Characterizing independent sub-contexts</title>
		<author>
			<persName><forename type="first">D</forename><surname>Dubois</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Prade</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">196</biblScope>
			<biblScope unit="page" from="4" to="16" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b252">
	<analytic>
		<title level="a" type="main">Relational galois connections</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">Sergei</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Stefan</forename><surname>Schmidt</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">4390</biblScope>
			<biblScope unit="page" from="1" to="17" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b253">
	<analytic>
		<title level="a" type="main">What is a concept?</title>
		<author>
			<persName><forename type="first">J</forename><surname>Goguen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">3596</biblScope>
			<biblScope unit="page" from="52" to="77" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b254">
	<monogr>
		<title level="m" type="main">Closure and Interior Structures in Relational Data Analysis and Their Morphisms</title>
		<author>
			<persName><forename type="first">J</forename><surname>Konecny</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
		<respStmt>
			<orgName>UP Olomouc</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD Thesis</note>
</biblStruct>

<biblStruct xml:id="b255">
	<analytic>
		<title level="a" type="main">The category of L-Chu correspondences and the structure of L-bonds</title>
		<author>
			<persName><forename type="first">O</forename><surname>Krídlo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Krajči</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<biblScope unit="volume">115</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="297" to="325" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b256">
	<analytic>
		<title level="a" type="main">Morphisms in context</title>
		<author>
			<persName><forename type="first">M</forename><surname>Krötzsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hitzler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G.-Q</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">3596</biblScope>
			<biblScope unit="page" from="223" to="237" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b257">
	<analytic>
		<title level="a" type="main">Concept lattices of fuzzy contexts: Formal concept analysis vs. rough set theory</title>
		<author>
			<persName><forename type="first">H</forename><surname>Lai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Approx. Reasoning</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="695" to="707" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b258">
	<analytic>
		<title level="a" type="main">Rough concept lattices and domains</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Lei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Luo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Pure and Applied Logic</title>
		<imprint>
			<biblScope unit="volume">159</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="333" to="340" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b259">
	<analytic>
		<title level="a" type="main">Multi-adjoint property-oriented and object-oriented concept lattices</title>
		<author>
			<persName><forename type="first">J</forename><surname>Medina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">190</biblScope>
			<biblScope unit="page" from="95" to="106" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b260">
	<analytic>
		<title level="a" type="main">Multi-adjoint t-concept lattices</title>
		<author>
			<persName><forename type="first">J</forename><surname>Medina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">180</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="712" to="725" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b261">
	<analytic>
		<title level="a" type="main">On multi-adjoint concept lattices based on heterogeneous conjunctors</title>
		<author>
			<persName><forename type="first">J</forename><surname>Medina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">208</biblScope>
			<biblScope unit="page" from="95" to="110" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b262">
	<analytic>
		<title level="a" type="main">Formal concept analysis via multi-adjoint concept lattices</title>
		<author>
			<persName><forename type="first">J</forename><surname>Medina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ruiz-Calviño</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">160</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="130" to="144" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b263">
	<analytic>
		<title level="a" type="main">Lattice-valued topological systems as a framework for lattice-valued formal concept analysis</title>
		<author>
			<persName><forename type="first">S</forename><surname>Solovyov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Mathematics</title>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>To appear</note>
</biblStruct>

<biblStruct xml:id="b264">
	<analytic>
		<title level="a" type="main">Real formal concept analysis based on grey-rough set theory</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge-Based Systems</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="38" to="45" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b265">
	<analytic>
		<title level="a" type="main">Galois connections between categories of L-topological spaces</title>
		<author>
			<persName><forename type="first">D</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">152</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="385" to="394" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b266">
	<analytic>
		<title level="a" type="main">Conceptual knowledge discovery-a human-centered approach</title>
		<author>
			<persName><forename type="first">Joachim</forename><surname>Hereth Correia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gerd</forename><surname>Stumme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rudolf</forename><surname>Wille</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Uta</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="281" to="302" />
			<date type="published" when="2003-03">March 2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b267">
	<monogr>
		<title level="m" type="main">Fundamentals of Database Systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ramez</surname></persName>
		</author>
		<author>
			<persName><surname>Elmasri</surname></persName>
		</author>
		<author>
			<persName><surname>Shankrant B Navathe</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Addison-Wesley Longman Publishing Co., Inc</publisher>
			<pubPlace>Boston, MA, USA</pubPlace>
		</imprint>
	</monogr>
	<note>3rd edition</note>
</biblStruct>

<biblStruct xml:id="b268">
	<monogr>
		<title level="m" type="main">Formal Concept Analysis: Mathematical Foundations</title>
		<author>
			<persName><forename type="first">Bernhard</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rudolf</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999-12">December 1999</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b269">
	<analytic>
		<title level="a" type="main">Formal concept analysis-based class hierarchy design in object-oriented software development</title>
		<author>
			<persName><forename type="first">Robert</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Petko</forename><surname>Valtchev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">3626</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b270">
	<analytic>
		<title level="a" type="main">Relational scaling and databases</title>
		<author>
			<persName><forename type="first">Joachim</forename><surname>Hereth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conceptual Structures: Integration and Interfaces</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">2393</biblScope>
			<biblScope unit="page" from="62" to="76" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b271">
	<analytic>
		<title level="a" type="main">On stability of a formal concept</title>
		<author>
			<persName><forename type="first">Sergei</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Mathematics and Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">1-4</biblScope>
			<biblScope unit="page" from="101" to="115" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b272">
	<analytic>
		<title level="a" type="main">The resource description framework (rdf) and its vocabulary description language rdfs</title>
		<author>
			<persName><forename type="first">Brian</forename><surname>Mcbride</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook on Ontologies, International Handbooks on Information Systems</title>
				<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="51" to="65" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b273">
	<analytic>
		<title level="a" type="main">Efficient implementation of semantic relations in lexical databases</title>
		<author>
			<persName><forename type="first">Uta</forename><surname>Priss</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computational Intelligence</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="79" to="87" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b274">
	<analytic>
		<title level="a" type="main">Establishing connections between formal concept analysis and relational databases</title>
		<author>
			<persName><forename type="first">Uta</forename><surname>Priss</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Common Semantics for Sharing Knowledge: Contributions to ICCS 2005</title>
				<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="132" to="145" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b275">
	<analytic>
		<title level="a" type="main">Towards concise representation for taxonomies of epistemic communities</title>
		<author>
			<persName><forename type="first">Camille</forename><surname>Roth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sergei</forename><surname>Obiedkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Derrick</forename><surname>Kourie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Concept Lattices and Their Applications</title>
				<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b276">
	<analytic>
		<title level="a" type="main">A proposal for combining Formal Concept Analysis and description Logics for mining relational data</title>
		<author>
			<persName><forename type="first">Mohamed</forename><surname>Rouane-Hacene</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marianne</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Amedeo</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Petko</forename><surname>Valtchev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of ICFCA 2007</title>
				<meeting>ICFCA 2007</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b277">
	<analytic>
		<title level="a" type="main">Why can concept lattices support knowledge discovery in databases</title>
		<author>
			<persName><forename type="first">Rudolf</forename><surname>Wille ; Gentner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Holyoak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">J</forename><surname>Kokinov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Analogical Mind: Perspectives from Cognitive Science</title>
				<meeting><address><addrLine>Cambridge</addrLine></address></meeting>
		<imprint>
			<publisher>MIT Press</publisher>
			<date type="published" when="2001">2002. 2001</date>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="81" to="92" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b278">
	<analytic>
		<title level="a" type="main">The Copycat project: A model of mental fluidity and analogy-making</title>
		<author>
			<persName><forename type="first">D</forename><surname>Hofstadter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mitchell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fluid Concepts and Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought</title>
				<imprint>
			<publisher>Basic Books</publisher>
			<date type="published" when="1995">1995</date>
			<biblScope unit="page" from="205" to="267" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b279">
	<analytic>
		<title level="a" type="main">Analogy in problem solving</title>
		<author>
			<persName><forename type="first">E</forename><surname>Melis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Veloso</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Practical Reasoning: Computational and Theoretical Aspects</title>
				<imprint>
			<publisher>Oxford Univ. Press</publisher>
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b280">
	<analytic>
		<title level="a" type="main">The computational modeling of analogy-making</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>French</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Trends in Cognitive Sciences</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="200" to="205" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b281">
	<analytic>
		<title level="a" type="main">Analogy and formal languages</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Lepage</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Elec. Notes Theo. Comp. Sci</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b282">
	<analytic>
		<title level="a" type="main">An analogical learner for morphological analysis</title>
		<author>
			<persName><forename type="first">N</forename><surname>Stroppa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Yvon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. Conf. Comput. Natural Language Learning</title>
				<meeting>Conf. Comput. Natural Language Learning</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="120" to="127" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b283">
	<analytic>
		<title level="a" type="main">Du quatrième de proportion comme principe inductif : une proposition et son application à l&apos;apprentissage de la morphologie</title>
		<author>
			<persName><forename type="first">N</forename><surname>Stroppa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Yvon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Traitement Automatique des Langues</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="1" to="27" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b284">
	<analytic>
		<title level="a" type="main">Analogical dissimilarity: definition, algorithms and two experiments in machine learning</title>
		<author>
			<persName><forename type="first">L</forename><surname>Miclet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bayoudh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Delhay</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JAIR</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="page" from="793" to="824" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b285">
	<analytic>
		<title level="a" type="main">When intelligence is just a matter of copying</title>
		<author>
			<persName><forename type="first">W</forename><surname>Correa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Prade</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Richard</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Eur. Conf. on Artificial Intelligence</title>
				<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="276" to="281" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b286">
	<analytic>
		<title level="a" type="main">Handling Analogical Proportions in Classical Logic and Fuzzy Logics Settings</title>
		<author>
			<persName><forename type="first">L</forename><surname>Miclet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Prade</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 10th Eur. Conf. on Symbolic and Quantitative Approaches to Reasoning with Uncertainty</title>
				<meeting>10th Eur. Conf. on Symbolic and Quantitative Approaches to Reasoning with Uncertainty</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="volume">5590</biblScope>
			<biblScope unit="page" from="638" to="650" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b287">
	<analytic>
		<title level="a" type="main">Homogeneous logical proportions: Their uniqueness and their role in similarity-based prediction</title>
		<author>
			<persName><forename type="first">H</forename><surname>Prade</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Richard</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 13th Int. Conf. on Principles of Knowledge Represent. and Reasoning</title>
				<meeting>13th Int. Conf. on Principles of Knowledge Represent. and Reasoning</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="402" to="412" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b288">
	<monogr>
		<title level="m" type="main">Formal Models of Analogical Proportions</title>
		<author>
			<persName><forename type="first">N</forename><surname>Stroppa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Yvon</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<pubPlace>Paris</pubPlace>
		</imprint>
		<respStmt>
			<orgName>ENST</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical report 2006D008</note>
</biblStruct>

<biblStruct xml:id="b289">
	<monogr>
		<title level="m" type="main">Définitions et caractérisations de modèles à base d&apos;analogies pour l&apos;apprentissage automatique des langues naturelles</title>
		<author>
			<persName><forename type="first">N</forename><surname>Stroppa</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>ENST</publisher>
			<pubPlace>Paris</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b290">
	<monogr>
		<title level="m" type="main">Structures Ordonnées et Algèbres de Boole</title>
		<author>
			<persName><forename type="first">R</forename><surname>Faure</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Heurgon</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1970">1970</date>
			<publisher>Gauthier-Villars</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b291">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Dorolle</surname></persName>
		</author>
		<title level="m">Le Raisonnement par Analogie</title>
				<meeting><address><addrLine>Paris</addrLine></address></meeting>
		<imprint>
			<publisher>PUF</publisher>
			<date type="published" when="1949">1949</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b292">
	<monogr>
		<author>
			<persName><forename type="first">Y</forename><surname>Lepage</surname></persName>
		</author>
		<title level="m">De l&apos;analogie rendant compte de la commutation en linguistique</title>
				<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
		<respStmt>
			<orgName>Université de Grenoble</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Habilitation à diriger les recherches</note>
</biblStruct>

<biblStruct xml:id="b293">
	<monogr>
		<title level="m" type="main">Relation d&apos;analogie et distance sur un alphabet défini par des traits</title>
		<author>
			<persName><forename type="first">L</forename><surname>Miclet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Delhay</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<pubPlace>Rennes</pubPlace>
		</imprint>
		<respStmt>
			<orgName>IRISA</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical report 1632</note>
</biblStruct>

<biblStruct xml:id="b294">
	<analytic>
		<title level="a" type="main">Reasoning with logical proportions</title>
		<author>
			<persName><forename type="first">H</forename><surname>Prade</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Richard</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 12th Int. Conf. on Principles of Knowledge Representation and Reasoning</title>
				<meeting>12th Int. Conf. on Principles of Knowledge Representation and Reasoning</meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="545" to="555" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b295">
	<analytic>
		<title level="a" type="main">Multiple-valued logic interpretations of analogical, reverse analogical, and paralogical proportions</title>
		<author>
			<persName><forename type="first">H</forename><surname>Prade</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Richard</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 40th IEEE Int. Symp. on Multiple-Valued Logic</title>
				<meeting>40th IEEE Int. Symp. on Multiple-Valued Logic</meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="258" to="263" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b296">
	<analytic>
		<title level="a" type="main">Looking for analogical proportions in a formal concept analysis setting</title>
		<author>
			<persName><forename type="first">L</forename><surname>Miclet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Prade</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Guennec</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Int. Conf. on Concept Lattices &amp; App</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="295" to="307" />
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b297">
	<monogr>
		<title level="m" type="main">Latent Variable Models and Factor Analysis</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Bartholomew</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Knott</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<pubPlace>London, Arnold</pubPlace>
		</imprint>
	</monogr>
	<note>2nd Ed</note>
</biblStruct>

<biblStruct xml:id="b298">
	<analytic>
		<title level="a" type="main">Discovery of optimal factors in binary data via a novel method of matrix decomposition</title>
		<author>
			<persName><forename type="first">R</forename><surname>Belohlavek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Comput. Syst. Sci</title>
		<imprint>
			<biblScope unit="volume">76</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="3" to="20" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b299">
	<monogr>
		<title level="m" type="main">Formal Concept Analysis: Mathematical Foundations</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b300">
	<analytic>
		<title level="a" type="main">Tiling databases</title>
		<author>
			<persName><forename type="first">F</forename><surname>Geerts</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Goethals</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Mielikäinen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. Discovery Science</title>
				<meeting>Discovery Science</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="278" to="289" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b301">
	<analytic>
		<title level="a" type="main">Relational concept analysis: mining concept lattices from multi-relational data</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Hacene</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtechev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ann. Math. Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">67</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="81" to="108" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b302">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">H</forename><surname>Harman</surname></persName>
		</author>
		<title level="m">Modern Factor Analysis</title>
				<meeting><address><addrLine>Chicago</addrLine></address></meeting>
		<imprint>
			<publisher>The Univ. Chicago Press</publisher>
			<date type="published" when="1970">1970</date>
		</imprint>
	</monogr>
	<note>2nd Ed</note>
</biblStruct>

<biblStruct xml:id="b303">
	<analytic>
		<title level="a" type="main">A proposal for combining formal concept analysis and description logics for mining relational data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M</forename><surname>Rouane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICFCA</title>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b304">
	<monogr>
		<title level="m" type="main">Boolean Matrix Theory and Applications</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">H</forename><surname>Kim</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1982">1982</date>
			<publisher>Marcel Dekker</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b305">
	<analytic>
		<title level="a" type="main">Relation-prediction in multi-relational domains using matrix-factorization</title>
		<author>
			<persName><forename type="first">C</forename><surname>Lippert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">H</forename><surname>Weber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Tresp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Schubert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H.-P</forename><surname>Kriegel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">NIPS 2008 Workshop on Structured Input -Structured Output</title>
				<imprint>
			<publisher>NIPS</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b306">
	<analytic>
		<title level="a" type="main">Mining top-K patterns from binary datasets in presence of noise</title>
		<author>
			<persName><forename type="first">C</forename><surname>Lucchese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Orlando</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Perego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIAM DM</title>
		<imprint>
			<biblScope unit="page" from="165" to="176" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b307">
	<analytic>
		<title level="a" type="main">On Finding Joint Subspace Boolean Matrix Factorizations</title>
		<author>
			<persName><forename type="first">P</forename><surname>Miettinen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. SIAM International Conference on Data Mining (SDM2012)</title>
				<meeting>SIAM International Conference on Data Mining (SDM2012)</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="954" to="965" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b308">
	<analytic>
		<title level="a" type="main">The discrete basis problem</title>
		<author>
			<persName><forename type="first">P</forename><surname>Miettinen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Mielikäinen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gionis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mannila</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Knowledge and Data Eng</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="1348" to="1362" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b309">
	<analytic>
		<title level="a" type="main">A mathematical analysis of human leukocyte antigen serology</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Nau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Markowsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Woodbury</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">B</forename><surname>Amos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Math Bioscience</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="page" from="243" to="270" />
			<date type="published" when="1978">1978</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b310">
	<analytic>
		<title level="a" type="main">The role mining problem: finding a minimal descriptive set of roles</title>
		<author>
			<persName><forename type="first">J</forename><surname>Vaidya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Atluri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Guo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. SACMAT</title>
				<meeting>SACMAT</meeting>
		<imprint>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="175" to="184" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b311">
	<analytic>
		<title level="a" type="main">Summarizing transactional databases with overlapped hyperrectangles</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Xiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Jin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fuhry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">F</forename><surname>Dragan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data Mining and Knowledge Discovery</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="215" to="251" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b312">
	<analytic>
		<title level="a" type="main">PrefixSpan Mining Sequential Patterns Efficiently by Prefix Projected Pattern Growth</title>
		<author>
			<persName><forename type="first">J</forename><surname>Pei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Han</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Mortazavi-Asl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Pinto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Dayal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Hsu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">17th International Conference on Data Engineering</title>
				<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="215" to="226" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b313">
	<analytic>
		<title level="a" type="main">CloSpan: Mining Closed Sequential Patterns in Large Databases</title>
		<author>
			<persName><forename type="first">X</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Han</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Afshar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of SIAM Int&apos;l Conf. Data Mining (SDM&apos;03)</title>
				<meeting>of SIAM Int&apos;l Conf. Data Mining (SDM&apos;03)</meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="166" to="177" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b314">
	<analytic>
		<title level="a" type="main">Mining conjunctive sequential patterns</title>
		<author>
			<persName><forename type="first">C</forename><surname>Raïssi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Calders</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Poncelet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data Min. Knowl. Discov</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="77" to="93" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b315">
	<analytic>
		<title level="a" type="main">Efficient Mining of Closed Repetitive Gapped Subsequences from a Sequence Database</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ding</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Han</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">C</forename><surname>Khoo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of IEEE 25th International Conference on Data Engineering</title>
				<meeting>of IEEE 25th International Conference on Data Engineering</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2009-03">March 2009</date>
			<biblScope unit="page" from="1024" to="1035" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b316">
	<analytic>
		<title level="a" type="main">Mining multidimensional and multilevel sequential patterns</title>
		<author>
			<persName><forename type="first">M</forename><surname>Plantevit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Laurent</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Laurent</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Teisseire</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">W</forename><surname>Choong</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Knowledge Discovery from Data</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="37" />
			<date type="published" when="2010-01">January 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b317">
	<monogr>
		<title level="m" type="main">Formal Concept Analysis: Mathematical Foundations</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1997">1997</date>
			<publisher>Springer</publisher>
			<pubPlace>Secaucus, NJ, USA</pubPlace>
		</imprint>
	</monogr>
	<note>1st edn</note>
</biblStruct>

<biblStruct xml:id="b318">
	<analytic>
		<title level="a" type="main">Pattern Structures and Their Projections</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conceptual Structures: Broadening the Base SE -10</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Delugach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="volume">2120</biblScope>
			<biblScope unit="page" from="129" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b319">
	<analytic>
		<title level="a" type="main">Summarizing Sequential Data with Closed Partial Orders</title>
		<author>
			<persName><forename type="first">G</forename><surname>Casas-Garriga</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 5th SIAM Int&apos;l Conf. on Data Mining (SDM&apos;05)</title>
				<meeting>of the 5th SIAM Int&apos;l Conf. on Data Mining (SDM&apos;05)</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b320">
	<analytic>
		<title level="a" type="main">The Efficient Computation of Complete and Concise Substring Scales with Suffix Trees</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ferré</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis SE -7</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Schmidt</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">4390</biblScope>
			<biblScope unit="page" from="98" to="113" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b321">
	<analytic>
		<title level="a" type="main">Approaches to the Selection of Relevant Concepts in the Case of Noisy Data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Klimushkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Obiedkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Roth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 8th International Conference on Formal Concept Analysis. ICFCA&apos;10</title>
				<meeting>of the 8th International Conference on Formal Concept Analysis. ICFCA&apos;10</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="255" to="266" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b322">
	<analytic>
		<title level="a" type="main">On stability of a formal concept</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Mathematics and Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">1-4</biblScope>
			<biblScope unit="page" from="101" to="115" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b323">
	<analytic>
		<title level="a" type="main">A framework for mining meaningful usage patterns within a semantically enhanced web portal</title>
		<author>
			<persName><forename type="first">M</forename><surname>Adda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Djeraba</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd C* Conference on Computer Science and Software Engineering. C3S2E &apos;10</title>
				<meeting>the 3rd C* Conference on Computer Science and Software Engineering. C3S2E &apos;10<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="138" to="147" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b324">
	<analytic>
		<title level="a" type="main">Learning of Simple Conceptual Graphs from Positive and Negative Examples</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Principles of Data Mining and Knowledge Discovery SE -47</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Żytkow</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Rauch</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="volume">1704</biblScope>
			<biblScope unit="page" from="384" to="391" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b325">
	<analytic>
		<title level="a" type="main">AddIntent: A new incremental algorithm for constructing concept lattices</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">V D</forename><surname>Merwe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Obiedkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kourie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Concept Lattices</title>
				<editor>
			<persName><forename type="first">G</forename><surname>Goos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Hartmanis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Leeuwen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Eklund</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2961. 2004</date>
			<biblScope unit="page" from="372" to="385" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b326">
	<analytic>
		<title level="a" type="main">On succinct representation of knowledge community taxonomies with formal concept analysis A Formal Concept Analysis Approach in Applied Epistemology</title>
		<author>
			<persName><forename type="first">C</forename><surname>Roth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Obiedkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">G</forename><surname>Kourie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Foundations of Computer Science</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">02</biblScope>
			<biblScope unit="page" from="383" to="404" />
			<date type="published" when="2008-04">April 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b327">
	<analytic>
		<title level="a" type="main">Case mix definition by diagnosis-related groups</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">B</forename><surname>Fetter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Shin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Freeman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">F</forename><surname>Averill</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Thompson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Med Care</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="1" to="53" />
			<date type="published" when="1980-02">February 1980</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b328">
	<analytic>
		<title level="a" type="main">Acute appendicitis as a sign of a colorectal carcinoma</title>
		<author>
			<persName><forename type="first">E</forename><surname>Arnbjörnsson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Surgical Oncology</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="17" to="20" />
			<date type="published" when="1982-05">May 1982</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b329">
	<monogr>
		<title level="m" type="main">Formal Concept Analysis: Mathematical Foundations</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin, Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b330">
	<analytic>
		<title level="a" type="main">Discovery of optimal factors in binary data via a novel method of matrix decomposition</title>
		<author>
			<persName><forename type="first">R</forename><surname>Belohlavek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal Of Computer And System Sciences</title>
		<imprint>
			<biblScope unit="volume">76</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="3" to="20" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b331">
	<analytic>
		<title level="a" type="main">Optimal decompositions of matrices with entries from residuated lattices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Belohlavek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal Of Logic And Computation</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1405" to="1425" />
			<date type="published" when="2012-11">November 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b332">
	<analytic>
		<title level="a" type="main">Spectral lattices of (R max,+ )-formal contexts</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J</forename><surname>Valverde-Albacete</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Pelaez-Moreno</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">4933</biblScope>
			<biblScope unit="page" from="124" to="139" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b333">
	<analytic>
		<title level="a" type="main">L-fuzzy sets</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Goguen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Math. Anal. Appl</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="145" to="174" />
			<date type="published" when="1967">1967</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b334">
	<analytic>
		<title level="a" type="main">Dioids and semirings: links to fuzzy set and other applications</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gondran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Minoux</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets And Systems</title>
		<imprint>
			<biblScope unit="volume">158</biblScope>
			<biblScope unit="page" from="1273" to="1294" />
			<date type="published" when="2007-04">April 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b335">
	<monogr>
		<title level="m" type="main">The spectra of irreducible matrices over completed commutative idempotent semifields</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J</forename><surname>Valverde-Albacete</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Peláez-Moreno</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>In preparation</note>
</biblStruct>

<biblStruct xml:id="b336">
	<analytic>
		<title level="a" type="main">Valeurs propres et vecteurs propres dans les dioïdes et leur interprétation en théorie des graphes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gondran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Minoux</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">EDF, Bulletin de la Direction des Etudes et Recherches, Serie C, Mathématiques Informatique</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="25" to="41" />
			<date type="published" when="1977">1977</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b337">
	<analytic>
		<title level="a" type="main">Extending conceptualisation modes for generalised Formal Concept Analysis</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J</forename><surname>Valverde-Albacete</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Pelaez-Moreno</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">181</biblScope>
			<biblScope unit="page" from="1888" to="1909" />
			<date type="published" when="2011-05">May 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b338">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Davey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Priestley</surname></persName>
		</author>
		<title level="m">Introduction to lattices and order</title>
				<meeting><address><addrLine>Cambridge, UK</addrLine></address></meeting>
		<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
	<note>2nd edn</note>
</biblStruct>

<biblStruct xml:id="b339">
	<analytic>
		<title level="a" type="main">Relations and Graphs</title>
		<author>
			<persName><forename type="first">G</forename><surname>Schmidt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ströhlein</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Discrete Mathematics for Computer Scientists</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b340">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Brualdi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Ryser</surname></persName>
		</author>
		<title level="m">of Encyclopedia of Mathematics and its Applications</title>
				<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="1991">1991</date>
			<biblScope unit="volume">39</biblScope>
		</imprint>
	</monogr>
	<note>Combinatorial Matrix Theory</note>
</biblStruct>

<biblStruct xml:id="b341">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">M</forename><surname>Akian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bapat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gaubert</surname></persName>
		</author>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="25" to="26" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b342">
	<analytic>
		<title level="a" type="main">The eigen-problem in the completely maxalgebra</title>
		<author>
			<persName><forename type="first">M</forename><surname>Jun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Yong</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Sixth International Conference on Parallel and Distributed Computing</title>
				<meeting>the Sixth International Conference on Parallel and Distributed Computing</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b343">
	<analytic>
		<title level="a" type="main">Handbook of Linear Algebra</title>
		<author>
			<persName><forename type="first">L</forename><surname>Hogben</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Discrete Mathematics and Its Applications</title>
				<imprint>
			<publisher>Chapman &amp; Hall/CRC</publisher>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b344">
	<analytic>
		<title level="a" type="main">Fuzzy property-oriented concept lattices in morphological image and signal processing</title>
		<author>
			<persName><forename type="first">C</forename><surname>Alcalde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Burusco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Díaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Fuentes-González</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Medina-Moreno</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">7903</biblScope>
			<biblScope unit="page" from="246" to="253" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b345">
	<analytic>
		<title level="a" type="main">An interpretation of the l-fuzzy concept analysis as a tool for the morphological image and signal processing</title>
		<author>
			<persName><forename type="first">C</forename><surname>Alcalde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Burusco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Fuentes-González</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of CLA 2012</title>
				<meeting>of CLA 2012</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="81" to="92" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b346">
	<analytic>
		<title level="a" type="main">Isotone galois connections and concept lattices with hedges</title>
		<author>
			<persName><forename type="first">E</forename><surname>Bartl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Konecny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">4th International IEEE Conference &quot;Intelligent Systems</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page">28</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b347">
	<analytic>
		<title level="a" type="main">Concept lattices and order in fuzzy logic</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Pure and Applied Logic</title>
		<imprint>
			<biblScope unit="volume">128</biblScope>
			<biblScope unit="page" from="277" to="298" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b348">
	<analytic>
		<title level="a" type="main">Duality vs. adjunction for fuzzy mathematical morphology and general form of fuzzy erosions and dilations</title>
		<author>
			<persName><forename type="first">I</forename><surname>Bloch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">160</biblScope>
			<biblScope unit="issue">0</biblScope>
			<biblScope unit="page" from="1858" to="1867" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b349">
	<monogr>
		<title level="m" type="main">Fuzzy mathematical morphologies: a comparative study</title>
		<author>
			<persName><forename type="first">I</forename><surname>Bloch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Maître</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1994">94D001. 1994</date>
			<pubPlace>Paris</pubPlace>
		</imprint>
	</monogr>
	<note type="report_type">Télécom</note>
</biblStruct>

<biblStruct xml:id="b350">
	<analytic>
		<title level="a" type="main">Inclusion grade and fuzzy implication operators</title>
		<author>
			<persName><forename type="first">P</forename><surname>Burillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Frago</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Fuentes-González</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathware &amp; Soft Computing</title>
		<imprint>
			<biblScope unit="volume">VIII</biblScope>
			<biblScope unit="page" from="31" to="46" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b351">
	<analytic>
		<title level="a" type="main">Inclusion grade and fuzzy implication operators</title>
		<author>
			<persName><forename type="first">P</forename><surname>Burillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Fuentes-González</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Frago</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">114</biblScope>
			<biblScope unit="issue">0</biblScope>
			<biblScope unit="page" from="417" to="429" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b352">
	<analytic>
		<title level="a" type="main">Fuzzy morphology: a logical approach</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">De</forename><surname>Baets</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Uncertainty Analysis, Engineering and Science: Fuzzy Logic, Statistics and neural network Approach</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Ayyub</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Gupta</surname></persName>
		</editor>
		<imprint>
			<publisher>Kluwer Academic Publishers</publisher>
			<date type="published" when="1997">1997</date>
			<biblScope unit="page" from="53" to="67" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b353">
	<analytic>
		<title level="a" type="main">Analytical solution methods for fuzzy relation equations</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">De</forename><surname>Baets</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Handbooks of Fuzzy Sets Series</title>
				<editor>
			<persName><forename type="first">D</forename><surname>Dubois</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Prade</surname></persName>
		</editor>
		<meeting><address><addrLine>Dordrecht</addrLine></address></meeting>
		<imprint>
			<publisher>Kluwer</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="291" to="340" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b354">
	<monogr>
		<title level="m" type="main">Fuzzy Relation Equations and Their Applications to Knowledge Engineering</title>
		<author>
			<persName><forename type="first">A</forename><surname>Di Nola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Sanchez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Pedrycz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sessa</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1989">1989</date>
			<publisher>Kluwer Academic Publishers</publisher>
			<pubPlace>Norwell, MA, USA</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b355">
	<analytic>
		<title level="a" type="main">Solving systems of fuzzy relation equations by fuzzy property-oriented concepts</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Díaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Medina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">222</biblScope>
			<biblScope unit="page" from="405" to="412" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b356">
	<analytic>
		<title level="a" type="main">Non-dual fuzzy connections</title>
		<author>
			<persName><forename type="first">G</forename><surname>Georgescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Popescu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Arch. Math. Log</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="1009" to="1039" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b357">
	<analytic>
		<title level="a" type="main">Fundamenta morphologicae mathematicae</title>
		<author>
			<persName><forename type="first">J</forename><surname>Goutsias</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Heijmans</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">0</biblScope>
			<biblScope unit="page" from="1" to="31" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b358">
	<analytic>
		<title level="a" type="main">Concept lattices of fuzzy contexts: Formal concept analysis vs. rough set theory</title>
		<author>
			<persName><forename type="first">H</forename><surname>Lai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Approximate Reasoning</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="695" to="707" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b359">
	<analytic>
		<title level="a" type="main">Lattice image precessing: A unification of morphological and fuzzy algebric systems</title>
		<author>
			<persName><forename type="first">P</forename><surname>Maragos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Mathematical Imaging and Vision</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">0</biblScope>
			<biblScope unit="page" from="333" to="353" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b360">
	<analytic>
		<title level="a" type="main">S-implications and r-implications on a finite chain</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Monserrat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Torrens</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Kybernetika</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="3" to="20" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b361">
	<monogr>
		<title level="m" type="main">Random Sets and Integral Geometry</title>
		<author>
			<persName><forename type="first">G</forename><surname>Matheron</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1975">1975</date>
			<publisher>Wiley</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b362">
	<analytic>
		<title level="a" type="main">Multi-adjoint property-oriented and object-oriented concept lattices</title>
		<author>
			<persName><forename type="first">J</forename><surname>Medina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">190</biblScope>
			<biblScope unit="page" from="95" to="106" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b363">
	<analytic>
		<title level="a" type="main">System of fuzzy relation equations with inf-→ composition: Complete set of solutions</title>
		<author>
			<persName><forename type="first">I</forename><surname>Perfilieva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Nosková</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">159</biblScope>
			<biblScope unit="issue">17</biblScope>
			<biblScope unit="page" from="2256" to="2271" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b364">
	<analytic>
		<title level="a" type="main">Resolution of composite fuzzy relation equations</title>
		<author>
			<persName><forename type="first">E</forename><surname>Sanchez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information and Control</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="38" to="48" />
			<date type="published" when="1976">1976</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b365">
	<monogr>
		<title level="m" type="main">Image Analysis and Mathematical Morphology</title>
		<author>
			<persName><forename type="first">J</forename><surname>Serra</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1990">1990. 1992</date>
			<publisher>Academic Press</publisher>
			<biblScope unit="volume">II</biblScope>
		</imprint>
	</monogr>
	<note>I (fourth printing. second printing</note>
</biblStruct>

<biblStruct xml:id="b366">
	<monogr>
		<title level="m" type="main">The Description Logic Handbook: Theory, Implementation, and Applications</title>
		<editor>Baader, F., Calvanese, D., McGuinness, D., Nardi, D., Patel-Schneider, P.F.</editor>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Cambridge University Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b367">
	<analytic>
		<title level="a" type="main">Pushing the EL envelope</title>
		<author>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Brandt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lutz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IJCAI</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="364" to="369" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b368">
	<analytic>
		<title level="a" type="main">A finite basis for the set of el-implications holding in a finite model</title>
		<author>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Distel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICFCA</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="46" to="61" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b369">
	<analytic>
		<title level="a" type="main">Exploring finite models in the description logic EL gfp</title>
		<author>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Distel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICFCA</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="146" to="161" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b370">
	<analytic>
		<title level="a" type="main">Completing description logic knowledge bases using formal concept analysis</title>
		<author>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Sertkaya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Sattler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of IJCAI</title>
				<meeting>of IJCAI</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="230" to="235" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b371">
	<monogr>
		<title level="m" type="main">Concept data analysis: Theory and applications</title>
		<author>
			<persName><forename type="first">C</forename><surname>Carpineto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Romano</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Wiley</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b372">
	<analytic>
		<title level="a" type="main">Extracting relevant questions to an RDF dataset using formal concept analysis</title>
		<author>
			<persName><forename type="first">M</forename><surname>D'aquin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Motta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the sixth international conference on Knowledge capture</title>
				<meeting>the sixth international conference on Knowledge capture</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="121" to="128" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b373">
	<analytic>
		<title level="a" type="main">Attribute exploration with background knowledge</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">217</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="215" to="233" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b374">
	<monogr>
		<title level="m" type="main">Formal Concept Analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b375">
	<analytic>
		<title level="a" type="main">Using SPARQL with RDFS and OWL entailment. Reasoning Web</title>
		<author>
			<persName><forename type="first">B</forename><surname>Glimm</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Semantic Technologies for the Web of Data</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="137" to="201" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b376">
	<analytic>
		<title level="a" type="main">RDF semantics</title>
		<author>
			<persName><forename type="first">P</forename><surname>Hayes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">W3C Recommendation</title>
				<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b377">
	<analytic>
		<title level="a" type="main">Formal concept discovery in semantic web data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kirchberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Leonardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">S</forename><surname>Tan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Link</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Ko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">S</forename><surname>Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICFCA</title>
				<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="164" to="179" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b378">
	<analytic>
		<title level="a" type="main">SPARQL query language for RDF</title>
		<author>
			<persName><forename type="first">E</forename><surname>Prud'hommeaux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Seaborne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">W3C Rec</title>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b379">
	<analytic>
		<title level="a" type="main">A survey on how description logic ontologies benefit from FCA</title>
		<author>
			<persName><forename type="first">B</forename><surname>Sertkaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CLA</title>
		<imprint>
			<biblScope unit="volume">672</biblScope>
			<biblScope unit="page" from="2" to="21" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b380">
	<analytic>
		<title level="a" type="main">T := ∅ 2: for all (g, m) : g ∈ G,m ∈ M do 3: P rimesObjAttr[g, m] = (g, m) 4: end for 5: for all (g, b) : g ∈ G,b ∈ B do 6: P rimesObjCond</title>
		<author>
			<persName><forename type="first">Ter</forename><surname>Horst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jäschke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Hotho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Schmitz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Stumme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename></persName>
		</author>
		<idno>= T 16:</idno>
	</analytic>
	<monogr>
		<title level="m">Window, Suspect, Organized Crime , Revenge, Explosion, Assassin, Widow}, {Crime, Drama, Sci-Fi, Fantasy, Thriller</title>
				<meeting><address><addrLine>Y, Z; Rocky; Unforgiven; Sin City; Washington, DC, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="1948">2005. 2004. 1976. 1980. 1999. 1973. 1986. 1989. 1979. 1962. 1998. 1957. 1987. 1994. 1972. 1948. 1992. 2005. 1988. 1999. 2005. 1973. 2006</date>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="907" to="911" />
		</imprint>
	</monogr>
	<note>Proceedings of the Sixth International Conference on Data Mining. ICDM &apos;06</note>
</biblStruct>

<biblStruct xml:id="b381">
	<monogr>
		<title level="m" type="main">Approximate bicluster and tricluster boxes in the analysis of binary data</title>
		<author>
			<persName><forename type="first">B</forename><surname>Mirkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Kramarenko</surname></persName>
		</author>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="248" to="256" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b382">
	<analytic>
		<title level="a" type="main">Boolean tensor factorization</title>
		<author>
			<persName><forename type="first">P</forename><surname>Miettinen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">11th IEEE International Conference on Data Mining</title>
				<editor>
			<persName><forename type="first">D</forename><surname>Cook</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Pei</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Wang</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">O</forename><surname>Zaïane</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><surname>Wu</surname></persName>
		</editor>
		<meeting><address><addrLine>Vancouver, Canada; CPS</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="447" to="456" />
		</imprint>
	</monogr>
	<note>ICDM 2011</note>
</biblStruct>

<biblStruct xml:id="b383">
	<analytic>
		<title level="a" type="main">Optimal factorization of three-way binary data using triadic concepts</title>
		<author>
			<persName><forename type="first">R</forename><surname>Belohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Glodeanu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Order</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="437" to="454" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b384">
	<analytic>
		<title level="a" type="main">Biclustering Meets Triadic Concept Analysis</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kaytoue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Macko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ann. of Math. and Art. Intell</title>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>to appear</note>
</biblStruct>

<biblStruct xml:id="b385">
	<monogr>
		<title level="m" type="main">Formal Concept Analysis: Mathematical Foundations</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer-Verlag New York, Inc</publisher>
			<pubPlace>Secaucus, NJ, USA</pubPlace>
		</imprint>
	</monogr>
	<note>1st edn</note>
</biblStruct>

<biblStruct xml:id="b386">
	<analytic>
		<title level="a" type="main">A triadic approach to formal concept analysis</title>
		<author>
			<persName><forename type="first">F</forename><surname>Lehmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Third International Conference on Conceptual Structures: Applications, Implementation and Theory</title>
				<meeting>the Third International Conference on Conceptual Structures: Applications, Implementation and Theory<address><addrLine>London, UK</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="1995">1995</date>
			<biblScope unit="page" from="32" to="43" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b387">
	<analytic>
		<title level="a" type="main">Gaining insight in social networks with biclustering and triclustering</title>
		<author>
			<persName><forename type="first">D</forename><surname>Gnatyshak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">I</forename><surname>Ignatov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Semenov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Poelmans</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">BIR</title>
		<title level="s">Lecture Notes in Business Information Processing</title>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">128</biblScope>
			<biblScope unit="page" from="162" to="171" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b388">
	<analytic>
		<title level="a" type="main">Musicbox: Personalized music recommendation based on cubic analysis of social tags</title>
		<author>
			<persName><forename type="first">A</forename><surname>Nanopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rafailidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Symeonidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Manolopoulos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Audio, Speech &amp; Language Processing</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="407" to="412" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b389">
	<monogr>
		<title level="m" type="main">From triconcepts to triclusters</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">I</forename><surname>Ignatov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Magizov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">E</forename><surname>Zhukov</surname></persName>
		</author>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="257" to="264" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b390">
	<analytic>
		<title level="a" type="main">Can triconcepts become triclusters?</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">I</forename><surname>Ignatov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Poelmans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">E</forename><surname>Zhukov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of General Systems</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="572" to="593" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b391">
	<analytic>
		<title level="a" type="main">Scalable mining of frequent tri-concepts from folksonomies</title>
		<author>
			<persName><forename type="first">C</forename><surname>Trabelsi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Jelassi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ben Yahia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Knowledge Discovery and Data Mining</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">P</forename><forename type="middle">N</forename><surname>Tan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Chawla</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Ho</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Bailey</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">7302</biblScope>
			<biblScope unit="page" from="231" to="242" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b392">
	<analytic>
		<title level="a" type="main">Closed patterns meet n-ary relations</title>
		<author>
			<persName><forename type="first">L</forename><surname>Cerf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Besson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Robardet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Boulicaut</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Knowl. Discov. Data</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page">36</biblScope>
			<date type="published" when="2009-03">March 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b393">
	<analytic>
		<title level="a" type="main">Concept-based biclustering for internet advertisement</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">I</forename><surname>Ignatov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Poelmans</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICDM Workshops</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="123" to="130" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b394">
	<analytic>
		<title level="a" type="main">Rough Sets, Fuzzy Sets</title>
	</analytic>
	<monogr>
		<title level="m">Data Mining and Granular Computing -13th International Conference</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011. 2011</date>
			<biblScope unit="volume">6743</biblScope>
		</imprint>
	</monogr>
	<note>Proceedings. In: RSFDGrC.</note>
</biblStruct>

<biblStruct xml:id="b395">
	<monogr>
		<title level="m" type="main">UCI Machine Learning Repository</title>
		<author>
			<persName><forename type="first">K</forename><surname>Bache</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lichman</surname></persName>
		</author>
		<ptr target="http://archive.ics.uci.edu/ml" />
		<imprint>
			<date type="published" when="2013">2013</date>
			<pubPlace>Irvine, CA,</pubPlace>
		</imprint>
		<respStmt>
			<orgName>University of California ; School of Information and Computer Sciences</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b396">
	<analytic>
		<title level="a" type="main">Concept data analysis</title>
		<author>
			<persName><forename type="first">C</forename><surname>Carpineto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Romano</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Theory and applications</title>
				<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b397">
	<analytic>
		<title level="a" type="main">Formal concept analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mathematical foundations</title>
				<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b398">
	<analytic>
		<title level="a" type="main">Incremental Concept Formation Algorithms Based on Galois Lattices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Alaoui</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computation Intelligence</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="246" to="267" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b399">
	<analytic>
		<title level="a" type="main">Formal Concept Discovery in Semantic Web Data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kirchberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Leonardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">S</forename><surname>Tan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Link</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>K L Ko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">S</forename><surname>Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. ICFCA 2012</title>
				<meeting>ICFCA 2012</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">7278</biblScope>
			<biblScope unit="page" from="164" to="179" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b400">
	<analytic>
		<title level="a" type="main">Advances in algorithms based on CbO</title>
		<author>
			<persName><forename type="first">P</forename><surname>Krajca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Outrata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. CLA 2010</title>
				<meeting>CLA 2010</meeting>
		<imprint>
			<biblScope unit="page" from="325" to="337" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b401">
	<analytic>
		<title level="a" type="main">Parallel algorithm for computing fixpoints of galois connections</title>
		<author>
			<persName><forename type="first">P</forename><surname>Krajca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Outrata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Mathematics and Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">59</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="257" to="272" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b402">
	<analytic>
		<title level="a" type="main">Interpretation on graphs and complexity characteristics of a search for specific patterns</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Automatic Documentation and Mathematical Linguistics</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="37" to="45" />
			<date type="published" when="1989">1989</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b403">
	<analytic>
		<title level="a" type="main">A fast algorithm for computing all intersections of objects in a finite semi-lattice</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Automatic Documentation and Mathematical Linguistics</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="11" to="21" />
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b404">
	<analytic>
		<title level="a" type="main">Learning of Simple Conceptual Graphs from Positive and Negative Examples</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">PKDD</title>
		<imprint>
			<biblScope unit="page" from="384" to="391" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b405">
	<monogr>
		<title level="m" type="main">Fast concept analysis. Working with Conceptual Structures--Contributions to ICCS</title>
		<author>
			<persName><forename type="first">C</forename><surname>Lindig</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000. 2000</date>
			<biblScope unit="page" from="152" to="161" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b406">
	<analytic>
		<title level="a" type="main">AddIntent: A New Incremental Algorithm for Constructing Concept Lattices</title>
		<author>
			<persName><forename type="first">D</forename><surname>Van Der Merwe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Obiedkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">G</forename><surname>Kourie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. ICFCA 2004</title>
				<meeting>ICFCA 2004</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">2961</biblScope>
			<biblScope unit="page" from="205" to="206" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b407">
	<analytic>
		<title level="a" type="main">An Algorithm for Computing the Maximal Rectangles in a Binary Relation</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">M</forename><surname>Norris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Revue Roumaine de Mathématiques Pures et Appliquées</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="243" to="250" />
			<date type="published" when="1978">1978</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b408">
	<analytic>
		<title level="a" type="main">Fast Algorithm for Computing Fixpoints of Galois Connections Induced by Object-Attribute Relational Data</title>
		<author>
			<persName><forename type="first">J</forename><surname>Outrata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">185</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="114" to="127" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b409">
	<analytic>
		<title level="a" type="main">Building Concept (Galois) Lattices from Parts: Generalizing the Incremental Methods</title>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNAI</title>
		<imprint>
			<biblScope unit="volume">2120</biblScope>
			<biblScope unit="page" from="290" to="303" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b410">
	<analytic>
		<title level="a" type="main">Restructuring lattice theory: an approach based on hierarchies of concepts</title>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<idno>.0-M-2</idno>
	</analytic>
	<monogr>
		<title level="m">System (OAIS): Recommended Practice; CCSDS 650</title>
				<meeting><address><addrLine>Washington</addrLine></address></meeting>
		<imprint>
			<publisher>CCSDS Secretariat</publisher>
			<date type="published" when="1982">1982. 1982. 2012</date>
			<biblScope unit="page" from="445" to="470" />
		</imprint>
	</monogr>
	<note>Ordered Sets</note>
</biblStruct>

<biblStruct xml:id="b411">
	<monogr>
		<ptr target="http://storms.ngs.noaa.gov/eripage/index.html" />
		<title level="m">Emergency Response Imagery</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
		<respStmt>
			<orgName>NOAA</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b412">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><surname>Britton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Brown</surname></persName>
		</author>
		<title level="m">An Illustrated Flora of the Northern United Sates and Canada: in Three Volumes</title>
				<meeting><address><addrLine>Mineola, NY</addrLine></address></meeting>
		<imprint>
			<publisher>Dover Publications</publisher>
			<date type="published" when="1970">1970</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b413">
	<analytic>
		<title level="a" type="main">Content Recommendation on Web Portals</title>
		<author>
			<persName><forename type="first">D</forename><surname>Agarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B-C</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Elango</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ramakrishnan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Comm. ACM</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="92" to="101" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b414">
	<analytic>
		<title level="a" type="main">Formal concept analysis: A unified framework for building and refining ontologies</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bruce</surname></persName>
		</author>
		<author>
			<persName><surname>Barkstrom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bendaoud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Toussaint</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">EKAW</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">A</forename><surname>Gangemi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Euzenat</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">5268</biblScope>
			<biblScope unit="page" from="156" to="171" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b415">
	<analytic>
		<title level="a" type="main">Ontology design with formal concept analysis</title>
		<author>
			<persName><forename type="first">M</forename><surname>Obitko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Snásel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Smid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the CLA 2004 International Workshop on Concept Lattices and their Applications</title>
				<meeting>the CLA 2004 International Workshop on Concept Lattices and their Applications<address><addrLine>Ostrava, Czech Republic</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004">September 23-24, 2004. 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b416">
	<analytic>
		<title level="a" type="main">Text2onto -a framework for ontology learning and datadriven change discovery</title>
		<author>
			<persName><forename type="first">P</forename><surname>Cimiano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Völker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of Natural Language Processing and Information Systems (NLDB 2005)</title>
		<title level="s">Lecture Notes in Computer Science (LNCS</title>
		<meeting>Natural Language Processing and Information Systems (NLDB 2005)</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005-06">June 2005</date>
			<biblScope unit="volume">3513</biblScope>
			<biblScope unit="page" from="227" to="238" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b417">
	<analytic>
		<title level="a" type="main">A proposal for combining formal concept analysis and description logics for mining relational data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Huchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Rouane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">proceeding of the 5th International Conference Formal Concept Analysis (ICFCA&apos;07)</title>
				<meeting>eeding of the 5th International Conference Formal Concept Analysis (ICFCA&apos;07)<address><addrLine>Clermond-Ferrand, France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b418">
	<analytic>
		<title level="a" type="main">Formal Concept Analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mathematical Foundations</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b419">
	<analytic>
		<title level="a" type="main">Incremental concept formation algorithms based on Galois (concept) lattices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Alaoui</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computational Intelligence</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="246" to="267" />
			<date type="published" when="1995-05">May 1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b420">
	<analytic>
		<title level="a" type="main">Building galois (concept) lattices from parts: Generalizing the incremental approach</title>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the ICCS 2001</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Delugach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</editor>
		<meeting>the ICCS 2001</meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="volume">2120</biblScope>
			<biblScope unit="page" from="290" to="303" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b421">
	<analytic>
		<title level="a" type="main">Comparing performance of algorithms for generating concept lattices</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Obiedkov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Exp. Theor. Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2-3</biblScope>
			<biblScope unit="page" from="189" to="216" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b422">
	<analytic>
		<title level="a" type="main">Addintent: A new incremental algorithm for constructing concept lattices</title>
		<author>
			<persName><forename type="first">D</forename><surname>Merwe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Obiedkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kourie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Concept Lattices</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">P</forename><surname>Eklund</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin/Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2961. 2004</date>
			<biblScope unit="page" from="205" to="206" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b423">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Barbut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Monjardet</surname></persName>
		</author>
		<title level="m">Ordre et classification, Algèbre et combinatoire</title>
				<meeting><address><addrLine>Paris</addrLine></address></meeting>
		<imprint>
			<publisher>Hachette</publisher>
			<date type="published" when="1970">1970</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b424">
	<analytic>
		<title level="a" type="main">The interaction of domain knowledge and linguistic structure in natural language processing: Interpreting hypernymic propositions in biomedical text</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">C</forename><surname>Rindflesch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fiszman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Biomedical Informatics</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="462" to="477" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b425">
	<monogr>
		<title level="m">The Description Logic Handbook: Theory,Implementation and Applications</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Nardi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Mcguinness</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Patel-Schneider</surname></persName>
		</editor>
		<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b426">
	<analytic>
		<title level="a" type="main">Many-valued modal logics II</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Fitting</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fund. Inform</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page">5573</biblScope>
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b427">
	<analytic>
		<title level="a" type="main">Many-valued modal logics</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Fitting</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fund. Inform</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page">235254</biblScope>
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b428">
	<analytic>
		<title level="a" type="main">Formal Concept Analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mathematical Foundations</title>
				<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b429">
	<analytic>
		<title level="a" type="main">Algebraic Study of Lattice-Valued Logic and Lattice-Valued Modal Logic</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Maruyama</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICLA&apos;09 Proceedings of the 3rd Indian Conference on Logic and Its Applications</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting><address><addrLine>Berlin; Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="volume">5378</biblScope>
			<biblScope unit="page" from="170" to="184" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b430">
	<analytic>
		<title level="a" type="main">Reasoning about Fuzzy Belief and Common Belief: With Emphasison Incomparable Beliefs</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Maruyama</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 22nd International Joint Conference on Artificial Intelligence. AAAI Press/International Joint Conferences on Artificial Intelligence</title>
				<meeting>the 22nd International Joint Conference on Artificial Intelligence. AAAI Press/International Joint Conferences on Artificial Intelligence<address><addrLine>Menlo Park, California</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="1008" to="1013" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b431">
	<analytic>
		<title level="a" type="main">Combining Two Formalism for Reasoning about Concepts</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">V</forename><surname>Shilov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">O</forename><surname>Garanina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">S</forename><surname>Anureev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2007 International Workshop on Description Logics (DL2007)</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<meeting>the 2007 International Workshop on Description Logics (DL2007)<address><addrLine>Brixen Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">250</biblScope>
			<biblScope unit="page" from="459" to="466" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b432">
	<analytic>
		<title level="a" type="main">A proposal of Description Logic on Concept Lattices</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">V</forename><surname>Shilov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S.-Y</forename><surname>Han</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Fifth International Conference on Concept Lattices and their Applications</title>
				<meeting>the Fifth International Conference on Concept Lattices and their Applications</meeting>
		<imprint>
			<date type="published" when="2007">2007. 2008</date>
			<biblScope unit="volume">331</biblScope>
			<biblScope unit="page" from="165" to="176" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings</note>
</biblStruct>

<biblStruct xml:id="b433">
	<analytic>
		<title level="a" type="main">Lattice-valued modal propositional logic and its completeness</title>
		<author>
			<persName><forename type="first">H.-X</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G.-J</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science China, Information Sciences</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="2230" to="2239" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b434">
	<analytic>
		<title level="a" type="main">Dependency structures of data base relationships</title>
		<author>
			<persName><forename type="first">William</forename><forename type="middle">W</forename><surname>Armstrong</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. IFIP Congress</title>
				<meeting>IFIP Congress<address><addrLine>North Holland, Amsterdam</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1974">1974</date>
			<biblScope unit="page" from="580" to="583" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b435">
	<analytic>
		<title level="a" type="main">Functional Dependencies of Data Tables Over Domains with Similarity Relations</title>
		<author>
			<persName><forename type="first">Radim</forename><surname>Belohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vilém</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 2nd Indian International Conference on Artificial Intelligence</title>
				<meeting>of the 2nd Indian International Conference on Artificial Intelligence</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b436">
	<analytic>
		<title level="a" type="main">Formal Concept Analysis with Constraints by Closure Operators</title>
		<author>
			<persName><forename type="first">Radim</forename><surname>Belohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vilém</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">4068</biblScope>
			<biblScope unit="page" from="131" to="143" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b437">
	<analytic>
		<title level="a" type="main">An Efficient Reasoning Method for Dependencies over Similarity and Ordinal Data</title>
		<author>
			<persName><forename type="first">Radim</forename><surname>Belohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pablo</forename><surname>Cordero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Manuel</forename><surname>Enciso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ángel</forename><surname>Mora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vilém</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">7647</biblScope>
			<biblScope unit="page" from="408" to="419" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b438">
	<analytic>
		<title level="a" type="main">The multiple facets of the canonical direct unit implicational basis</title>
		<author>
			<persName><forename type="first">K</forename><surname>Bertet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Monjardet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theor. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">411</biblScope>
			<biblScope unit="issue">22-24</biblScope>
			<biblScope unit="page" from="2155" to="2166" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b439">
	<analytic>
		<title level="a" type="main">Computing Minimal Generators from Implications: a Logic-guided Approach</title>
		<author>
			<persName><forename type="first">Pablo</forename><surname>Cordero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Manuel</forename><surname>Enciso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ángel</forename><surname>Mora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Manuel</forename><surname>Ojeda-Aciego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CLA</title>
		<imprint>
			<biblScope unit="page" from="187" to="198" />
			<date type="published" when="2012">2012. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b440">
	<analytic>
		<title level="a" type="main">The lattice theory of functional dependencies and normal decompositions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Day</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Algebra and Computation</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="209" to="431" />
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b441">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<title level="m">Two basic algorithms in concept analysis</title>
				<meeting><address><addrLine>Darmstadt</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1984">1984</date>
		</imprint>
		<respStmt>
			<orgName>Technische Hochschule</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b442">
	<analytic>
		<title level="a" type="main">Familles minimales d&apos;implications informatives résultant d&apos;un tableau de données binaires</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Guigues</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Duquenne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Math. Sci. Humaines</title>
		<imprint>
			<biblScope unit="volume">95</biblScope>
			<biblScope unit="page" from="5" to="18" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b443">
	<analytic>
		<title level="a" type="main">ZART: A Multifunctional Itemset Mining Algorithm</title>
		<author>
			<persName><forename type="first">L</forename><surname>Szathmary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 6th Intl. Conf. on Concept Lattices and Their Applications (CLA &apos;08)</title>
				<meeting>of the 6th Intl. Conf. on Concept Lattices and Their Applications (CLA &apos;08)</meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="47" to="58" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b444">
	<analytic>
		<title level="a" type="main">Efficient Vertical Mining of Frequent Closures and Generators</title>
		<author>
			<persName><forename type="first">L</forename><surname>Szathmary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">5772</biblScope>
			<biblScope unit="page" from="393" to="404" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b445">
	<analytic>
		<title level="a" type="main">Merge-based computation of minimal generators</title>
		<author>
			<persName><forename type="first">C</forename><surname>Frambourg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Discrete Mathematics</title>
				<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">3596</biblScope>
			<biblScope unit="page" from="181" to="194" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b446">
	<analytic>
		<title level="a" type="main">On Computing the Minimal Generator Family for Concept Lattices and Icebergs</title>
		<author>
			<persName><forename type="first">K</forename><surname>Nehmé</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Rouane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">3403</biblScope>
			<biblScope unit="page" from="192" to="207" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b447">
	<monogr>
		<title level="m" type="main">Mining association rules between sets of items in large databases</title>
		<author>
			<persName><forename type="first">R</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Imielinski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Swami</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1993">1993</date>
			<publisher>SIGMOD</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b448">
	<analytic>
		<title level="a" type="main">In-Close, a fast algorithm for computing formal concepts</title>
		<author>
			<persName><forename type="first">S</forename><surname>Andrews</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICCS</title>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b449">
	<analytic>
		<title level="a" type="main">In-Close2, a High Performance Formal Concept Miner</title>
		<author>
			<persName><forename type="first">S</forename><surname>Andrews</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICCS</title>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b450">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><surname>Bache</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lichman</surname></persName>
		</author>
		<ptr target="http://archive.ics.uci.edu/ml" />
		<title level="m">UCI Machine Learning Repository</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
		<respStmt>
			<orgName>University of California, Irvine, School of Information and Computer Sciences</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b451">
	<analytic>
		<title level="a" type="main">Efficient Implementations of Apriori and Eclat</title>
		<author>
			<persName><surname>Ch</surname></persName>
		</author>
		<author>
			<persName><surname>Borgelt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE ICDM Workshop on FIMI</title>
				<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b452">
	<analytic>
		<title level="a" type="main">Finding Closed Frequent Item Sets by Intersecting Transactions</title>
		<author>
			<persName><surname>Ch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Borgelt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Nogales-Cadenas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Carmona-Saez</surname></persName>
		</author>
		<author>
			<persName><surname>Pascual-Montano</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">EDBT</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b453">
	<analytic>
		<title level="a" type="main">MAFIA: A Performance Study of Mining Maximal Frequent Itemsets</title>
		<author>
			<persName><forename type="first">D</forename><surname>Burdick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Calimlim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Flannick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Gehrke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Yiu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE ICDM Workshop on FIMI</title>
				<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b454">
	<monogr>
		<title level="m" type="main">Two basic algorithms in concept analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<idno>No. 831</idno>
		<imprint>
			<date type="published" when="1984">1984</date>
		</imprint>
		<respStmt>
			<orgName>TH Darmstadt</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report FB4-Preprint</note>
</biblStruct>

<biblStruct xml:id="b455">
	<monogr>
		<title level="m" type="main">Formal concept analysis: Mathematical foundations</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b456">
	<analytic>
		<title level="a" type="main">Incremental concept formation algorithms based on Galois (concept) lattice</title>
		<author>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Alaoui</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computational Intelligence</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b457">
	<monogr>
		<ptr target="http://fimi.ua.ac.be/data/" />
		<title level="m">FIMI Repository</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b458">
	<analytic>
		<title level="a" type="main">Advances in Frequent Itemset Mining Implementations: Report on FIMI03</title>
		<author>
			<persName><forename type="first">B</forename><surname>Goethals</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Zaki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIGKDD Explorations</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b459">
	<analytic>
		<title level="a" type="main">Efficiently Using Prefix-trees in Mining Frequent Itemsets</title>
		<author>
			<persName><forename type="first">G</forename><surname>Grahne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE ICDM Workshop on FIMI</title>
				<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b460">
	<analytic>
		<title level="a" type="main">Advances in algorithms based on CbO</title>
		<author>
			<persName><forename type="first">P</forename><surname>Krajca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Outrata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CLA</title>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b461">
	<analytic>
		<title level="a" type="main">A Fast Algorithm for Computing All Intersections of Objects in a Finite Semi-lattice</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Automatic Documentation and Mathematical Linguistics</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">5</biblScope>
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b462">
	<analytic>
		<title level="a" type="main">Comparing Performance of Algorithms for Generating Concept Lattices</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Obiedkov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Experimental and Theoretical Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2-3</biblScope>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b463">
	<monogr>
		<title level="m" type="main">Fast Concept Analysis. Working with Conceptual Structures -Contributions to ICCS</title>
		<author>
			<persName><surname>Ch</surname></persName>
		</author>
		<author>
			<persName><surname>Lindig</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000. 2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b464">
	<analytic>
		<title level="a" type="main">AFOPT: An Efficient Implementation of Pattern Growth Approach</title>
		<author>
			<persName><forename type="first">G</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">X</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Wei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xiao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE ICDM Workshop on FIMI</title>
				<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b465">
	<analytic>
		<title level="a" type="main">DCI Closed: A Fast and Memory Efficient Algorithm to Mine Frequent Closed Itemsets</title>
		<author>
			<persName><forename type="first">C</forename><surname>Lucchese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Orlando</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Perego</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE ICDM Workshop on FIMI</title>
				<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b466">
	<monogr>
		<title level="m" type="main">From Concepts to Concept Lattice: A Border Algorithm for Making Covers Explicit</title>
		<author>
			<persName><forename type="first">B</forename><surname>Martin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Euklund</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>ICFCA</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b467">
	<analytic>
		<title level="a" type="main">An Algorithm for Computing the Maximal Rectangles in a Binary Relation</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">M</forename><surname>Norris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Revue Roumaine de Mathématiques Pures et Appliquées</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="1978">1978</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b468">
	<analytic>
		<title level="a" type="main">A fast algorithm for building lattices</title>
		<author>
			<persName><forename type="first">L</forename><surname>Nourine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Raynaud</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing Letters</title>
		<imprint>
			<biblScope unit="volume">71</biblScope>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b469">
	<analytic>
		<title level="a" type="main">Computing Iceberg Concept Lattices with Titanic</title>
		<author>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Taouil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Bastide</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pasquier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal on Knowledge and Data Engineering</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b470">
	<analytic>
		<title level="a" type="main">LCM: An Efficient Algorithm for Enumerating Frequent Closed Item Sets</title>
		<author>
			<persName><forename type="first">T</forename><surname>Uno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Asai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Uchida</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Arimura</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE ICDM Workshop on FIMI</title>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b471">
	<analytic>
		<title level="a" type="main">Restructuring lattice theory: An approach based on hierarchies of concepts</title>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ordered Sets</title>
		<imprint>
			<biblScope unit="volume">83</biblScope>
			<date type="published" when="1982">1982</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b472">
	<analytic>
		<title level="a" type="main">Scalable algorithms for association mining</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Zaki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Knowledge and Data Engeneering</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
