<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Multi-strategy Approach for Detecting and Correcting Conservativity Principle Violations in Ontology Alignments</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Alessandro</forename><surname>Solimando</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">DIBRIS</orgName>
								<orgName type="institution">Università di Genova</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ernesto</forename><surname>Jiménez-Ruiz</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Oxford</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Giovanna</forename><surname>Guerrini</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">DIBRIS</orgName>
								<orgName type="institution">Università di Genova</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Multi-strategy Approach for Detecting and Correcting Conservativity Principle Violations in Ontology Alignments</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">E7A58EA1D4B5A3EF8310CE2B51E34550</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T15:52+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In order to enable interoperability between ontology-based systems, ontology matching techniques have been proposed. However, when the generated mappings suffer from logical flaws, their usefulness may be diminished. In this paper we present a multi-strategy approach to detect and correct violations of the so-called conservativity principle where novel subsumption entailments between named concepts in one of the input ontologies are considered as unwanted. The practical applicability of the proposed approach is experimentally demonstrated on the datasets from the Ontology Alignment Evaluation Initiative (OAEI).</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Ontologies play a key role in the development of the Semantic Web and are being used in many diverse application domains, ranging from biomedicine to energy industry. An application domain can be modeled with different points of view and purposes. This situation usually leads to the development of different ontologies that intuitively overlap, but they use different naming and modeling conventions.</p><p>The problem of (semi-)automatically computing mappings between independently developed ontologies is usually referred to as the ontology matching problem. A number of sophisticated ontology matching systems have been developed in the last years <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b22">23]</ref>. Ontology matching systems, however, rely on lexical and structural heuristics and the integration of the input ontologies and the mappings may lead to many undesired logical consequences. In <ref type="bibr" target="#b11">[12]</ref> three principles were proposed to minimize the number of potentially unintended consequences, namely: (i) consistency principle, the mappings should not lead to unsatisfiable classes in the integrated ontology, (ii) locality principle, the mappings should link entities that have similar neighbourhoods, (iii) conservativity principle, the mappings should not introduce new semantic relationships between concepts from one of the input ontologies.</p><p>The occurrence of these violations is frequent, even in the reference mapping sets of the Ontology Alignment Evaluation Initiative 3 (OAEI). Also manually curated alignments, such as UMLS-Metathesaurus <ref type="bibr" target="#b0">[1]</ref> (UMLS), a comprehensive effort for integrat-ing biomedical knowledge bases, suffer from these violations. Violations of these principles may hinder the usefulness of ontology mappings <ref type="bibr" target="#b24">[25]</ref>. These principles has been actively investigated in the last years (e.g., <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b20">21]</ref>).</p><p>In this paper we combine our previous approach <ref type="bibr" target="#b24">[25]</ref> for detecting and solving conservativity principle violations, based on the assumption of disjointness <ref type="bibr" target="#b21">[22]</ref> and the projection of the input ontologies to Horn propositional logic, with a new one based on Answer Set Programming <ref type="bibr" target="#b23">[24]</ref>, addressing violations between entities already involved in a subsumption relationship. Our evaluation supports the effectiveness of the combined approach in the detection and correction of an extended notion of conservativity violations, without harming efficiency, even on the largest test cases of OAEI.</p><p>The remainder of the paper is organised as follows. Section 2 presents the preliminaries. Section 3 introduces our motivating scenario. Section 4 describes our method. Section 5 presents the conducted evaluation. Section 6 provides a comparison with relevant related work. Finally, Section 7 gives some conclusions and future work lines.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head><p>This section introduces the representation of ontology mappings, the notions of semantic difference and conservativity principle, and the basics on Answer Set Programming.</p><p>Representation of Ontology Mappings. Mappings are 5-tuples of the form id, e 1 , e 2 , n, ρ , with id a unique identifier, e 1 , e 2 entities in the vocabulary or signature of the relevant input ontologies (i.e., e 1 ∈ Sig(O 1 ) and e 2 ∈ Sig(O 2 )), n a confidence measure between 0 and 1, and ρ a relation between e 1 and e 2 , typically subsumption, equivalence, or disjointness. Mappings are usually represented as OWL 2 axioms for reusing the currently available OWL 2 reasoning infrastructure, but alternative formal semantics have been proposed (e.g., <ref type="bibr" target="#b1">[2]</ref>).</p><p>Semantic Consequences of the Integration. The ontology resulting from the integration of two ontologies O 1 and O 2 via a set of mappings M may entail axioms that do not follow from O 1 , O 2 , or M alone. These new semantic consequences can be captured by the notion of deductive difference <ref type="bibr" target="#b14">[15]</ref>. Intuitively, the deductive difference between O and O w.r.t. a signature Σ is the set of entailments constructed over Σ that do not hold in O, but do hold in O . However, no algorithm is available for computing it for DLs more expressive than EL, for which the existence of tractable algorithms is still open <ref type="bibr" target="#b14">[15]</ref> Definition 1 (Approximation of the Deductive Difference). Let A, B be atomic concepts from Σ ∪ { , ⊥}, O and O be two OWL 2 ontologies, with Σ is a signature. We define the approximation of the Σ-deductive difference between O and O (denoted In order to avoid the drawbacks of the deductive difference, in this paper we rely on the approximation given in Definition 1. This approximation only requires comparing the classification hierarchies of O and O provided by an OWL 2 reasoner, and it has successfully been used in the past in the context of ontology integration <ref type="bibr" target="#b10">[11]</ref>.</p><formula xml:id="formula_0">diff ≈ Σ (O, O )</formula><p>Conservativity Principle. The conservativity principle (as formulated in <ref type="bibr" target="#b11">[12]</ref>) states that the integrated ontology</p><formula xml:id="formula_1">O U = O 1 ∪ O 2 ∪ M should not induce any change in the concept hierarchies of the input ontologies. That is, the sets diff ≈ Σ1 (O 1 , O U ) and diff ≈ Σ2 (O 2 , O U ) must be empty for signatures Σ 1 = Sig(O 1 ) and Σ 2 = Sig(O 2 )</formula><p>, respectively. In <ref type="bibr" target="#b24">[25]</ref> we proposed a basic variant of the conservativity principle where O U is required not to introduce new subsumption relationships between concepts from one of the input ontologies, unless they were already involved in a subsumption relationship or they shared a common descendant. In this paper, in addition to these basic violations, we also aim at addressing violations between concepts already involved in a subsumption relationship (i.e., resulting in an equivalence between them), denoted as equivalence conservativity principle violations, or simply equivalence violations. As in <ref type="bibr" target="#b24">[25]</ref>, we assume that the mappings M are coherent w.r. </p><formula xml:id="formula_2">(i) O U |= A ≡ B, (ii) A B ∈ diff ≈ Sig(O) (O, O U ) and/or B A ∈ diff ≈ Sig(O) (O, O U ).</formula><p>As discussed, for basic violations the assumption of disjointness can be applied, that is, if two atomic concepts A, B from one of the input ontologies are not involved in a subsumption relationship nor share a common subconcept (excluding ⊥) they can be considered as disjoint. Hence, the repair of these violations can be reduced to a consistency repair, if the input ontologies are extended with sufficient disjointness axioms. The same does not necessarily hold for equivalence violations, for which a suitable repair algorithm, based on ASP, is introduced (see Section 4.2).</p><p>Answer Set Programming. ASP is a declarative programming language able to express complex search problems up to Σ P 2 complexity class (and its complement Π P 2 <ref type="bibr" target="#b5">[6]</ref>). Each ASP program is a set of rules of the form Head ← Body, where Head can be a disjunction of atoms. More formally, a disjunctive rule has the form a 1 ∨ . . . ∨ a n ← b 1 , . . . , b k , not b k+1 , . . . , not b m . Rules with an empty Body (i.e., k = m = 0) are called facts. ASP rules can also include optimization-oriented constructs for minimizing numeric variables or the cardinality of a predicate. These rules are called soft constraints, in opposition to hard constraints, which are rules with an empty Head. In ASP, solutions are called stable models <ref type="bibr" target="#b5">[6]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Running Example</head><p>In this section, we show an example involving the different kinds of conservativity principle violations arising in the integration of two ontologies modeling knowledge in oil and gas industry <ref type="bibr" target="#b24">[25]</ref>. Table <ref type="table" target="#tab_1">1</ref> shows the relevant fragments of the two ontologies.  Assume that the set of mappings M in Table <ref type="table" target="#tab_2">2</ref>, between O 1 and O 2 , is generated by an off-the-shelf ontology alignment system. As described in Section 2, mappings are represented as 5-tuples; for example the mapping m 2 suggests an equivalence relationship between the entities O 1 :WellBore and O 2 :Borehole, with confidence 0.7.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 1 Algorithm to detect and solve basic violations</head><p>Input: O1, O2: input ontologies; M: (coherent) input mappings; Output: M : output mappings; R ≈ : approximate repair; disj: number of disjointness rules 1:</p><formula xml:id="formula_3">O 1 , O 2 := ModuleExtractor(O1, O2, M) 2: P1, P2 := PropositionalEncoding(O 1 , O 2 ) 3: SI1 := StructuralIndex(O 1 ), SI2 := StructuralIndex(O 2 ) 4: SI U := StructuralIndex(O 1 ∪ O 2 ∪ M) 5: P d 1 , disj1 := DisjointAxiomsExtension(P1, SI1, SI U ) See Algorithm 2 6: P d 2 , disj2 := DisjointAxiomsExtension(P2, SI2, SI U ) 7: M , R ≈ := MappingRepair(P d 1 , P d 2 , M) See Algorithm 2 in [13] 8: return M , R ≈ , disj1 + disj2</formula><p>The integrated ontology O U = O 1 ∪ O 2 ∪ M, however, violates the conservativity principle, according to Definition 2, and introduces unwanted subsumption relationships (see Table <ref type="table" target="#tab_3">3</ref>). Note that the entailments σ 4 and σ 5 are equivalence violations not belonging to the set of basic violations, since O 1 :Company and O 1 :Operator (resp. O 2 :Field operator and O 2 :Company) are involved in a subsumption relationship in O 1 (resp. O 2 ). As already discussed, these entailments cannot be repaired by the approach introduced in <ref type="bibr" target="#b24">[25]</ref>, and in addition they also lead to basic violations (σ 6 and σ 7 ), as shown in Figure <ref type="figure" target="#fig_1">1</ref>. Note that equivalence violations σ 4 , σ 5 can be repaired by the ASPbased approach. As shown in <ref type="bibr" target="#b24">[25]</ref>, any of these conservativity violations may hinder the usefulness of the generated mappings, in a query answering scenario.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Methods</head><p>This section describes the algorithms composing our multi-strategy approach, one addressig basic violations (Section 4.1), the other the equivalence ones (Section 4.2).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Approximate Repair of Basic Conservativity Principle Violations</head><p>We have reduced the problem of detecting and solving basic violations, to a mapping (incoherence) repair problem. Currently, our method uses the indexing and reasoning techniques of LogMap, an ontology matching and mapping repair system <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b12">13]</ref>.</p><p>Algorithm 1 shows the pseudocode of the implemented method. The algorithm accepts as input two OWL 2 ontologies, O 1 and O 2 , and a set of mappings M which are coherent<ref type="foot" target="#foot_1">4</ref> w.r.t. O 1 and O 2 . The problem size is reduced by extracting two localitybased modules <ref type="bibr" target="#b2">[3]</ref> (O 1 and O 2 ) using the entities involved in the mappings M as seed signatures (line 1, Algorithm 1). The output is the number of added disjointness during the process disj, a set of mappings M , and an approximate repair R ≈ s.t. M = M \ R ≈ . The repair R ≈ aims at solving most of the basic violations of M w.r.t. O 1 and O 2 . We next describe the techniques used in each step.</p><p>Propositional Horn Encoding. The modules O 1 and O 2 are encoded as the Horn propositional theories, P 1 and P 2 (line 2 in Algorithm 1). The encoding includes rules of the form A 1 ∧ . . . ∧ A n → B, with A i , B atomic concepts. For example, the concept hierarchy provided by an OWL 2 reasoner (e.g., <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b13">14]</ref>) is encoded as A → B rules, while explicit disjointness axioms between atomic concepts are encoded as A i ∧ A j → false. Note that input mappings M can already be seen as propositional implications.</p><p>Example 1. Consider the ontologies and mappings in Tables <ref type="table" target="#tab_2">1 and 2</ref>. Axiom β 6 is encoded as rule Field operator ∧ Owner → Field owner, while the mapping m 2 is translated into rules O 1 :WellBore → O 2 :Borehole, and O 2 :Borehole → O 1 :WellBore.</p><p>Structural Index. The concept hierarchies provided by an OWL 2 reasoner (excluding ⊥) and the explicit disjointness axioms of the modules O 1 and O 2 are efficiently indexed using an interval labelling schema (line 3 in Algorithm 1). This structural index allows us to answer many entailment queries over the concept hierarchy as an index lookup operation (i.e., without the need of an OWL 2 reasoner).</p><p>Disjointness Axioms Extension. In order to reduce the (basic) conservativity problem to a mapping incoherence repair problem, following the notion of assumption of disjointness, we need to automatically add sufficient disjointness axioms into each module O i . However, additional disjointness axioms δ may lead to unsatisfiable classes in O i ∪ δ.</p><p>Example 2. Consider the axiom β 9 from Table <ref type="table" target="#tab_1">1</ref>. Following the assumption of disjointness a very naïve algorithm would add disjointness axioms between Borehole, Continuant and Occurrent, which would make Borehole unsatisfiable.</p><p>For avoiding an extensive use of a costly OWL 2 reasoner, our method exploits the propositional encoding and structural indexing of the input ontologies. Thus, checking for unsatisfiabilities introduced by candidate disjointness axioms in O i ∪ δ is restricted to the Horn propositional case. We have implemented an algorithm to extend the propositional theories P 1 and P 2 with disjointness rules of the form A ∧ B → ⊥ (see lines 5-6 in Algorithm 1). This algorithm guarantees that, for every propositional variable A in the extended propositional theory P d i (with i ∈ {1, 2}), the theory P d i ∪ {true → A} is satisfiable. Note that this does not necessarily hold when considering the OWL 2 ontology modules, O 1 and O 2 , as discussed above.</p><p>LogMap provides a structural index SI to check if two propositional variables (i.e., ontological classes) are disjoint (areDisj(SI, A, B)), they keep a sub/super-class relationship (inSubSupRel(SI, A, B)), or they share a descendant (shareDesc(SI, A, B)).</p><p>Nonetheless, the massive addition of disjointness rules is, in general, prohibitive for large ontologies <ref type="bibr" target="#b24">[25]</ref>. Our key ingredient to achieve scalability is to focus only on the cases where a basic violation occurs in the integrated ontology</p><formula xml:id="formula_4">O U = O 1 ∪ O 2 ∪ M, w.r.t. one of the ontology modules O i (with i ∈ {1, 2}); i.e.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>, adding a disjointness axiom between each pair of classes</head><formula xml:id="formula_5">A, B ∈ O i s.t. A B ∈ basicViol(O i , O U )</formula><p>, as in Definition 2. Algorithm 2 implements this idea for the Horn propositional case and extensively exploits the structural indexing to identify the basic violations (line 2, Algorithm 2). Note that this algorithm also requires to compute the structural index of the integrated ontology and thus its classification with an OWL 2 reasoner (line 4, Algorithm 1). The classification cost of the integrated ontology is usually much higher than the classification of the input ontologies individually. However, this was not a bottleneck in our experiments (see Section 5).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 2 Disjointness axioms extension</head><p>Input: P: propositional theory; SI: structural index SI U : structural index of the union ontology Output: P d : extended propositional theory;disj: number of disjointness rules 1: disj := 0, P d := P 2: for A → B ∈ BasicConservativityViolations(SI, SI U ) do 3:</p><p>if not (areDisj(SI, A, B)) then 4:</p><formula xml:id="formula_6">P d := P d ∪ {A ∧ B → f alse} 5: SI := updateIndex(SI, A B → ⊥) 6: disj := disj + 1 7:</formula><p>end if 8: end for 9: return P d , disj Mapping Repair. Line 7 of Algorithm 1 uses the mapping (incoherence) repair algorithm presented in <ref type="bibr" target="#b12">[13]</ref>for the extended Horn propositional theories P d 1 and P d 2 , and the input mappings M. The mapping repair process exploits the Dowling-Gallier algorithm for propositional Horn satisfiability <ref type="bibr" target="#b3">[4]</ref> and checks, for every propositional variable A ∈ P d 1 ∪P d 2 , the satisfiability of the propositional theory P A = P d 1 ∪P d 2 ∪M∪{true → A}. Satisfiability of P A is checked in worst-case linear time in the size of P A , and the number of Dowling-Gallier calls is also linear in the number of propositional variables in</p><formula xml:id="formula_7">P d 1 ∪ P d 2 .</formula><p>The algorithm records the conflicting mappings involved in the unsatisfiability, which will be considered for the subsequent repair process. The unsatisfiability will be fixed by removing some of the identified mappings. In case of multiple options, mapping confidence will be used as a differentiating factor. <ref type="foot" target="#foot_2">5</ref>Example 3. Consider the propositional encoding P 1 and P 2 of the axioms of Table <ref type="table" target="#tab_1">1</ref> and the mappings M in Table <ref type="table" target="#tab_2">2</ref>, seen as propositional rules. P d 1 and P d 2 have been created by adding disjointness rules to P 1 and P 2 , according to Algorithm 2. For example, P d 2 includes the rule ψ = O 2 :Well ∧ O 2 :Borehole → f alse. The mapping repair algorithm identifies the propositional theory P d 1 ∪ P d 2 ∪ M ∪ {true → O 1 :ExplorationWellbore} as unsatisfiable. This is due to the combination of the mappings m 3 and m 4 , the propositional projection of axioms β 1 and β 2 , and the rule ψ. The mapping repair algorithm also identifies m 3 and m 4 as the cause of the unsatisfiability, and discards m 3 since its confidence is smaller than that of m 4 (see Table <ref type="table" target="#tab_2">2</ref>). Algorithm 1 gives as output the number of added disjointness rules disj, a set of mappings M , and an (approximate) repair R ≈ such that M = M \ R ≈ . M is coherent w.r.t. P d 1 and P d 2 . Furthermore, the propositional theory P 1 ∪ P 2 ∪ M does not contain any basic violation w.r.t. P 1 and P 2 (according to the propositional case of Definition 2). However, our incomplete encoding cannot guarantee that O 1 ∪ O 2 ∪ M does not contain basic violations w.r.t. O 1 and O 2 . Nonetheless, our evaluation suggests that the number of remaining violations after repair is typically small (see Section 5).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Repair of Equivalence Conservativity Principle Violations</head><p>In this section we describe CycleBreaker algorithm that detects equivalence violations at the taxonomical level, and computes a minimal repair by means of a logic program <ref type="foot" target="#foot_3">6</ref> . ∆ ← ∆ ∪ ASP(S) 6: end for 7: return ∆ Algorithm Description. Algorithm 3 takes as input two ontologies O 1 ,O 2 , and an alignment M between them. The aligned ontology O M is computed (line 1), and createDigraph function (line 2) builds its graph representation, having its named concepts as the set of vertices, and the subsumption axioms between them as (weighted) arcs. Given that the aligned ontology is equivalent, here, to the classification of the input ontologies plus the mappings, only inferred arcs between concepts of the same input ontology may exist. Given that at least one cycle containing all the elements of a strongly connected components (SCC) exists, cycle detection for a graph G can be reduced to computing SCC(G ), the set of its SCCs. Tarjan's algorithm <ref type="bibr" target="#b25">[26]</ref> computes the SCCs of the graph representations of the input ontologies (named local SCCs) and of the aligned one (line 3). Note that not all the cycles leads to an equivalence violation. We therefore distinguish between unsafe and safe cycles as those producing or not a violation. For detecting all the unsafe cycles, it is sufficient to detect the problematic SCCs, identified by the fact that at least one of the two projections on the input ontologies is not a local SCC (line 4). The ASP program of Listing 1.1 then computes a minimal repair for each problematic SCC (line 5). (r0) states that X, Y, Z are always vertices, (r1,r2) define transitive predicate reachesSaf e expressing vertex reachability in the input ontologies (in isolation), (r3,r4) define transitive predicate reaches expressing vertex reachability in the aligned ontology (i.e., considering edges and unremoved mappings only), (r5) generates models, (r6) allows mapping removal only, (r7) computes unsafe cycles in the graph, (r8) is a hard constraint forbidding the existence of unsafe cycles (r9) is a soft constraint that selects one of the valid models having minimal total weight of removed mappings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 3 CycleBreaker Algorithm</head><p>Repair Computation Using ASP. The input facts for the ASP program are the following kinds: (i) predicate vtx(X, O) encodes vertices, where X is a unique vertex id (e.g., vertex label) and O ∈ {1, 2} is the index of the input ontology of the concept, (ii) </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Evaluation</head><p>In order to evaluate the practical feasibility of our approach, we have conducted the evaluation in Algorithm 4 (Roman numbers refer to stored measurements) over the Optique's use case <ref type="bibr" target="#b24">[25]</ref> and the ontologies and reference mapping sets of OAEI 2013. <ref type="foot" target="#foot_4">7</ref>Table <ref type="table" target="#tab_4">4</ref> shows the size of the evaluated ontologies and mappings (I, II and III). For the Conference dataset we have selected only 5 pair of ontologies for which the reference mappings lead to more than five conservativity principle violations. Note that we count equivalence mappings as two subsumption mappings, and hence M represents subsumption mappings. Table <ref type="table" target="#tab_4">4</ref> also shows the conservativity principle violations for the reference mappings (IV, V and VI). For LargeBio and Library the number is expecially large using both the basic variant and the general notion of the conservativity principle. <ref type="foot" target="#foot_5">8</ref> We have run the experiments shown in Table <ref type="table" target="#tab_5">5</ref> on a desktop computer with an AMD Fusion A6-3670K CPU and allocating 12 GB of RAM. The prototype uses Clingo 3.0.5 <ref type="foot" target="#foot_6">9</ref> ASP solver. The obtained results<ref type="foot" target="#foot_7">10</ref> can be summarised as follows: i The number of added disjointness rules disj (VII), as expected, coincides with the number of basic violations, that is computed in a reasonable time also for large testcases (it requires only 80 seconds to compute them in the SNOMED-NCI case). ii The computed repair R SCC (X) is rather aggressive and it can remove from 16% (Anatomy) up to 48% (Optique) of the mappings. However, we follow a better safe than sorry approach, and we prefer to remove as many violations as possible, rather than preserving potentially conflicting mapping sets. iii Global repair time t r (IX) is small and it does not represent a bottleneck in spite of the large number of added disjointness rules and multiple applied techniques. iv The basic violations (XI) are fully removed in the Optique, Anatomy and Library cases, and almost fully removed in the Conference and LargeBio ones. v The number of missed violations is only slightly higher when considering the general notion of the conservativity principle (XII), which suggests that basic variant is suitable in practice. Furthermore, these violations are also almost always removed. vi Restricting to equivalence violations, they are almost completely removed by the combined approach (XIII). In order to evaluate the effectiveness of CycleBreaker, we also measured the number of unsolved equivalence violations after applying this repair algorithm, in isolation, on the input reference alignment. With the exception of SNOMED-NCI (failure rate of 0.9%), the violations are totally repaired.</p><p>The conservativity principle, although indirectly, has been actively studied in the literature. For example, the assumption of disjointness was originally introduced by Schlobach <ref type="bibr" target="#b21">[22]</ref> to enhance the repair of ontologies that were underspecified in terms of disjointness axioms. As in our case, also <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b16">17,</ref><ref type="bibr" target="#b6">7]</ref>, have focused on the addition of a small set of disjointness axioms, for supporting large ontologies. Ontology matching systems have also dealt with the conservativity principle in order to improve the precision (w.r.t. a reference alignment) of the computed mappings. For example, ASMOV <ref type="bibr" target="#b8">[9]</ref>, Lily <ref type="bibr" target="#b27">[28]</ref> and YAM++ <ref type="bibr" target="#b18">[19]</ref> implements different heuristics and patterns to minimise the violations of the conservativity principle. Lily, in particular, supports an incomplete detection of the equivalence violations, but lacks of a repair technique. Our basic method solves conservativity violations by reducing the problem to a consistency principle violation problem. Concretely, we have extended LogMap matcher <ref type="bibr" target="#b9">[10]</ref> but other mapping repair systems could be considered (e.g., Alcomo <ref type="bibr" target="#b15">[16]</ref> or AML <ref type="bibr" target="#b20">[21]</ref>). Note that these systems only focused on the consistency principle.</p><p>The work presented in <ref type="bibr" target="#b7">[8]</ref> follows an opposite approach with respect to ours, and considers conservativity violations as false positives, caused by the potential incompleteness of the input ontologies. Hence, the correction strategy, instead of removing mappings, aims at inserting subsumption axioms to the input ontologies, to enrich their concept hierarchies. Authors in <ref type="bibr" target="#b19">[20]</ref> also suggest that fixing the input ontologies, in a mapping repair process, could be an alternative to mapping removal.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusions and Future Work</head><p>In this paper we have presented a fully-automatic multi-strategy method to detect and correct conservativity principle violations in practice. We have extended the detect and repair algorithm for basic violations <ref type="bibr" target="#b24">[25]</ref> with a repair algorithm based on logic programming, tailored for equivalence violations. The conducted evaluation supports the practical effectivity of our incomplete method. We plan to extend the approach while keeping the current scalability properties. The proposed algorithms follow a "better safe than sorry" approach, suitable for scenarios where the input ontologies are not modifiable (e.g., fully automatic ontology matching systems). Nevertheless we do not discard to explore alternative methods to address the conservativity principle violations. We also plan to involve domain experts in the assessment of the additional disjointness <ref type="bibr" target="#b6">[7]</ref>, and to suggest extensions to the input ontologies <ref type="bibr" target="#b7">[8]</ref> for violations recognised as false positives. We will also evaluate the mappings computed by systems participating at OAEI, and the integration of our techniques into LogMap matcher.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>as the set of axioms of the form A B satisfying: (i) O |= A B, and (ii) O |= A B.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Graph representation of the fragment of the aligned ontology of Tables 1 involved in conservativity violations. Dashed arcs represent inferred axioms, while red arcs are those involved in equivalence violations. Each non-inferred arc is labeled with its confidence value.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Input: 3 :</head><label>3</label><figDesc>Ontology O1, Ontology O2, Alignment M Output: Repair ∆ 1: O M = alignOnto(O1, O2, M) 2: G = createDigraph(O M ) SCCSi = tarjan(G, Oi), globalSCCs = tarjan(G) 4: for S ∈ globalSCCs s.t. ¬ 2 i=1 Π O i (S) ∈ SCCsi do 5:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Listing 1 . 1 .</head><label>11</label><figDesc>ASP program computing a minimal repair for a problematic SCC. r 0 : # domain v t x (X, O ) . # domain v t x (Y, P ) . # domain v t x ( Z , Q ) . r 1 : r e a c h e s S a f e (X, Y) :− e d g e (X, Y, C , 0 ) , O=P , X! =Y . r 2 : r e a c h e s S a f e (X, Z ) :− r e a c h e s S a f e (X, Y) , e d g e (Y, Z , C , 0 ) , O=P , P=Q, X! =Y, Y! =Z , X! =Z . r 3 : r e a c h e s (X, Y) :− e d g e (X, Y, C ,M) , unremoved ( e d g e (X, Y, C ,M) ) , X! =Y . r 4 : r e a c h e s (X, Z ) :− r e a c h e s (X, Y) , e d g e (Y, Z , C ,M) , unremoved ( e d g e (Y, Z , C ,M) ) , X! =Y, Y! =Z , X! =Z . r 5 : unremoved ( e d g e (X, Y, C ,M) ) | removed ( e d g e (X, Y, C ,M) ) :− e d g e (X, Y, C ,M) , X! =Y . r 6 : unremoved ( e d g e (X, Y, C , 0 ) ) :− e d g e (X, Y, C , 0 ) , X! =Y, O=P . r 7 : u n s a f e C y c l e (Y) :− n o t r e a c h e s S a f e (Y, X) , r e a c h e s (Y, X) , r e a c h e s (X, Y) , O=P , X! =Y . r 8 : :− u n s a f e C y c l e (Y ) . r 9 : # m i n i m i z e [ removed ( e d g e (X, Y, C , 1 ) ) = C ] .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Algorithm 4 Example 4 .</head><label>44</label><figDesc>Conducted evaluation over the Optique and OAEI data sets Input: O1, O2: input ontologies M: reference mappings for O1 and O2 1: O U := O1 ∪ O2 ∪ M 2: Store size of Sig(O1) (I), Sig(O2) (II) and M (III) Compute number of conservativity principle violations: 3: basicViol := |basicViol(O1, O U )| + |basicViol(O2, O U )| (IV) basic violations, as in Definition 2 4: diff ≈ := |diff ≈ Sig(O 1 ) (O1, O U )| + |diff ≈ Sig(O 2 ) (O2, O U )| (V) general notion as in Section 2 5: eqViol := |eqViol(O1, O U )| + |eqViol(O2, O U )| (VI) equivalence violations, as in Definition 2 6: Compute a repair R ≈ using Algorithm 1 for O1, O2, M 7: Store number of added disjointness disj (VII), time to compute disjointness rules t d (VIII) 8: Compute a repair R SCC using Algorithm 3 for O1, O2, M \ R ≈ 9: Store size global time to compute the combined mapping repair tr (IX) and size of repair |R SCC | (X) 10: O U := O1 ∪ O2 ∪ M \ R SCC Compute number of remaining conservativity principle violations: 11: basicViol := |basicViol(O1, O U )| + |basicViol(O2, O U )| (XI) basic violations 12: diff ≈ := |diff ≈ Sig(O 1 ) (O1, O U )| + |diff ≈ Sig(O 2 ) (O2, O U )| (XII) general notion 13: eqViol := |eqViol(O1, O U )| + |eqViol(O2, O U )| (XIII) equivalence violations predicate edge(X, Y, C, M ) encodes arcs, where X and Y are vertices, C is an integer encoding for arc weight in [0 . . . 100], M is a boolean flag for mappings. The model (i.e., the computed repair) for the logic program on the following facts, encoding the problematic SCC of Figure 1, is equal to mapping m 7 of Table 2: v t x ( Company1 , 1 ) . v t x ( O p e r a t o r 1 , 1 ) . v t x ( Company2 , 2 ) . v t x ( F i e l d o p e r a t o r 2 , 2 ) . e d g e ( Company1 , Company2 , 9 0 , 1 ) . e d g e ( Company2 , Company1 , 9 0 , 1 ) . e d g e ( Company2 , F i e l d o p e r a t o r 2 , 1 0 0 , 0 ) . e d g e ( F i e l d o p e r a t o r 2 , O p e r a t o r 1 , 7 0 , 1 ) .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>t. O 1 and O 2 (i.e., diff ≈ Σ (O 1 ∪O 2 , O U ) does not contain any axiom A ⊥, for any A ∈ Σ = Sig(O 1 ∪ O 2 )). Conservativity Principle Violations). Let O be one of the input ontologies and Sig(O) be its signature, let O U be the integrated ontology, and let A, B be atomic concepts in Sig(O) ∪ { , ⊥}. We define two sets of violations of O U w.r.t. O: ⊥} s.t. O |= C A, and O |= C B. equivalence violations, denoted eqViol(O, O U ), as the set of A ≡ B axioms satisfying:</figDesc><table><row><cell>Definition 2 (-basic violations, denoted basicViol(O, O U ), as the set of A B axioms satisfying: (i) A B ∈ diff ≈ Sig(O) (O, O U ), (ii) O |= B A, and (iii) there is no C in</cell></row><row><cell>Sig(O) ∪ { ,</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 .</head><label>1</label><figDesc>Fragments of the ontologies used in Optique project<ref type="bibr" target="#b24">[25]</ref>.</figDesc><table><row><cell cols="3">Ontology O1</cell><cell></cell><cell>Ontology O2</cell></row><row><cell cols="2">α1 WellBore</cell><cell cols="2">∃belongsTo.Well</cell><cell>β1 Exploration well</cell><cell>Well</cell></row><row><cell cols="2">α2 WellBore</cell><cell cols="3">∃hasOperator.Operator β2 Explor borehole</cell><cell>Borehole</cell></row><row><cell cols="2">α3 WellBore</cell><cell cols="2">∃locatedIn.Field</cell><cell>β3 Appraisal exp borehole</cell><cell>Explor borehole</cell></row><row><cell cols="3">α4 AppraisalWellBore</cell><cell>WellBore</cell><cell>β4 Appraisal well</cell><cell>Well</cell></row><row><cell cols="3">α5 ExplorationWellBore</cell><cell>WellBore</cell><cell>β5 Field</cell><cell>∃hasFieldOperator.Field operator</cell></row><row><cell cols="2">α6 Operator</cell><cell>Owner</cell><cell></cell><cell>β6 Field operator Owner</cell><cell>Field owner</cell></row><row><cell cols="2">α7 Operator</cell><cell cols="2">Company</cell><cell>β7 Company</cell><cell>Field operator</cell></row><row><cell>α8 Field</cell><cell cols="3">∃hasOperator.Company</cell><cell>β8 Field owner</cell><cell>Owner</cell></row><row><cell>α9 Field</cell><cell cols="3">∃hasOwner.Owner</cell><cell>β9 Borehole</cell><cell>Continuant Occurrent</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2 .</head><label>2</label><figDesc>Ontology mappings for the vocabulary in O1 and O2.</figDesc><table><row><cell></cell><cell></cell><cell>Mappings M</cell><cell></cell></row><row><cell>id</cell><cell>e1</cell><cell>e2</cell><cell>n ρ</cell></row><row><cell cols="2">m1 O1:Well</cell><cell>O2:Well</cell><cell>0.9 ≡</cell></row><row><cell cols="2">m2 O1:WellBore</cell><cell>O2:Borehole</cell><cell>0.7 ≡</cell></row><row><cell cols="3">m3 O1:ExplorationWellBore O2:Exploration well</cell><cell>0.6</cell></row><row><cell cols="3">m4 O1:ExplorationWellBore O2:Explor borehole</cell><cell>0.8 ≡</cell></row><row><cell cols="4">m5 O1:AppraisalWellBore O2:Appraisal exp borehole 0.7 ≡</cell></row><row><cell cols="2">m6 O1:Field</cell><cell>O2:Field</cell><cell>0.9 ≡</cell></row><row><cell cols="2">m7 O1:Operator</cell><cell>O2:Field operator</cell><cell>0.7</cell></row><row><cell cols="2">m8 O1:Company</cell><cell>O2:Company</cell><cell>0.9 ≡</cell></row><row><cell cols="2">m9 O1:hasOperator</cell><cell>O2:hasFieldOperator</cell><cell>0.6 ≡</cell></row><row><cell cols="2">m10 O1:Owner</cell><cell>O2:Owner</cell><cell>0.9 ≡</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 3 .</head><label>3</label><figDesc>Example of conservativity principle violations.</figDesc><table><row><cell cols="2">σ1 O2:Explor borehole</cell><cell></cell><cell>O2:Exploration well</cell><cell></cell><cell>m3, m4</cell><cell>YES</cell><cell>NO</cell></row><row><cell cols="3">σ2 O1:AppraisalWellBore</cell><cell cols="3">O1:ExplorationWellBore β3, m4, m5</cell><cell>YES</cell><cell>NO</cell></row><row><cell cols="2">σ3 O2:Field operator</cell><cell cols="2">O2:Field owner</cell><cell></cell><cell>α6, β6, m7, m10</cell><cell>YES</cell><cell>NO</cell></row><row><cell cols="4">σ4 O1:Company ≡ O1:Operator σ5 O2:Field operator ≡ O2:Company</cell><cell></cell><cell>α7, β7, m7, m8</cell><cell>NO</cell><cell>YES</cell></row><row><cell>σ6 O1:Company</cell><cell cols="3">O1:Owner</cell><cell></cell><cell>σ4, α6</cell><cell>YES</cell><cell>NO</cell></row><row><cell>σ7 O2:Company</cell><cell cols="3">O2:Field owner</cell><cell></cell><cell>σ3, σ5</cell><cell>YES</cell><cell>NO</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.9</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Company1</cell><cell>0.9</cell><cell>Company2 F ield operator2 1</cell></row><row><cell></cell><cell></cell><cell></cell><cell>1</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.7</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Operator1</cell><cell></cell><cell>F ield owner2</cell></row><row><cell></cell><cell></cell><cell></cell><cell>1</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>1</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Owner1</cell><cell></cell><cell>0.9</cell><cell>Owner2</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.9</cell></row></table><note>σ Entailment: follows from: basicViol(O i , O U )?eqViol(O i , O U )?</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 4 .</head><label>4</label><figDesc>Test cases and violations with original reference mappings.</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell>Problem size</cell><cell></cell><cell cols="3">Original Violations</cell></row><row><cell>Dataset</cell><cell>O1 ∼ O2</cell><cell>I</cell><cell>II</cell><cell>III</cell><cell>IV</cell><cell>V</cell><cell>VI</cell></row><row><cell></cell><cell></cell><cell cols="3">|Sig(O1)| |Sig(O2)| |M|</cell><cell>basicViol</cell><cell>diff ≈</cell><cell>eqViol</cell></row><row><cell>Optique</cell><cell>NPD∼BootsOnto</cell><cell>757</cell><cell>40,671</cell><cell>102</cell><cell>214</cell><cell>220</cell><cell>25</cell></row><row><cell></cell><cell>SNOMED∼NCI</cell><cell>51,179</cell><cell>24,040</cell><cell cols="4">36,405 &gt;525,515 &gt;546,181 &gt;6,090</cell></row><row><cell>LargeBio</cell><cell>FMA∼SNOMED</cell><cell>10,181</cell><cell>13,430</cell><cell>17,212</cell><cell>125,232</cell><cell>127,668</cell><cell>1,091</cell></row><row><cell></cell><cell>FMA∼NCI</cell><cell>3,720</cell><cell>6,551</cell><cell>5,821</cell><cell>19,740</cell><cell>19,799</cell><cell>427</cell></row><row><cell>Anatomy</cell><cell>MO∼NCI Anat</cell><cell>2,747</cell><cell>3,306</cell><cell>3,032</cell><cell>1,321</cell><cell>1,335</cell><cell>26</cell></row><row><cell>Library</cell><cell>STW∼TheSoz</cell><cell>6,575</cell><cell>8,376</cell><cell>6,322</cell><cell>42,045</cell><cell>42,872</cell><cell>895</cell></row><row><cell></cell><cell>cmt∼confof</cell><cell>89</cell><cell>75</cell><cell>32</cell><cell>11</cell><cell>11</cell><cell>0</cell></row><row><cell></cell><cell>conference∼edas</cell><cell>124</cell><cell>154</cell><cell>34</cell><cell>8</cell><cell>8</cell><cell>0</cell></row><row><cell>Conference</cell><cell>conference∼iasted</cell><cell>124</cell><cell>182</cell><cell>28</cell><cell>9</cell><cell>9</cell><cell>0</cell></row><row><cell></cell><cell>confof∼ekaw</cell><cell>75</cell><cell>107</cell><cell>40</cell><cell>6</cell><cell>6</cell><cell>1</cell></row><row><cell></cell><cell>edas∼iasted</cell><cell>154</cell><cell>182</cell><cell>38</cell><cell>7</cell><cell>7</cell><cell>0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 5 .</head><label>5</label><figDesc>Results of our method to detect and solve conservativity principle violations.</figDesc><table><row><cell></cell><cell></cell><cell cols="2">Solution size</cell><cell cols="2">Times</cell><cell cols="3">Remaining Violations</cell></row><row><cell>Dataset</cell><cell>O1 ∼ O2</cell><cell>VII</cell><cell>X</cell><cell>VIII</cell><cell>IX</cell><cell>XI</cell><cell>XII</cell><cell>XIII</cell></row><row><cell></cell><cell></cell><cell cols="4">#disj |R SCC | t d (s) tr(s)</cell><cell cols="3">basicViol diff ≈ eqViol</cell></row><row><cell>Optique</cell><cell>NPD∼BootsOnto</cell><cell>214</cell><cell>44</cell><cell cols="2">2.22 1.94</cell><cell>0</cell><cell>0</cell><cell>0</cell></row><row><cell></cell><cell>SNOMED∼NCI</cell><cell>525,515</cell><cell>16,180</cell><cell>80</cell><cell>3,721</cell><cell>&gt;51</cell><cell>&gt;402</cell><cell>&gt;2</cell></row><row><cell>LargeBio</cell><cell>FMA∼SNOMED</cell><cell>125,232</cell><cell>8,369</cell><cell>30</cell><cell>269</cell><cell>0</cell><cell>33</cell><cell>0</cell></row><row><cell></cell><cell>FMA∼NCI</cell><cell>19,740</cell><cell>2,179</cell><cell>36</cell><cell>36</cell><cell>103</cell><cell>104</cell><cell>0</cell></row><row><cell>Anatomy</cell><cell>MO∼NCI Anat</cell><cell>1,321</cell><cell>493</cell><cell cols="2">1.46 1.34</cell><cell>0</cell><cell>2</cell><cell>0</cell></row><row><cell>Library</cell><cell>STW∼TheSoz</cell><cell>42,045</cell><cell>3,068</cell><cell>4.96</cell><cell>44</cell><cell>0</cell><cell>15</cell><cell>0</cell></row><row><cell></cell><cell>cmt∼confof</cell><cell>11</cell><cell>6</cell><cell cols="2">0.04 0.04</cell><cell>0</cell><cell>0</cell><cell>0</cell></row><row><cell></cell><cell>conference∼edas</cell><cell>8</cell><cell>6</cell><cell cols="2">0.07 0.07</cell><cell>0</cell><cell>0</cell><cell>0</cell></row><row><cell>Conference</cell><cell>conference∼iasted</cell><cell>9</cell><cell>3</cell><cell cols="2">0.21 0.14</cell><cell>0</cell><cell>0</cell><cell>0</cell></row><row><cell></cell><cell>confof∼ekaw</cell><cell>6</cell><cell>5</cell><cell cols="2">0.04 0.03</cell><cell>0</cell><cell>0</cell><cell>0</cell></row><row><cell></cell><cell>edas∼iasted</cell><cell>7</cell><cell>4</cell><cell cols="2">0.21 0.16</cell><cell>1</cell><cell>1</cell><cell>0</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">This work was supported by the EU FP7 IP project Optique (no. 318338) and by the Italian PRIN 2010LHT4KM CINA.<ref type="bibr" target="#b2">3</ref> http://oaei.ontologymatching.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_1">Note that M may be the result of a prior mapping (incoherence) repair process.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_2">Note that the locality principle can be used to compute fresh confidence values, if needed<ref type="bibr" target="#b11">[12]</ref>.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_3">Formal definitions and proofs are provided in an accompanying technical report<ref type="bibr" target="#b23">[24]</ref>.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_4">More information can be found in http://oaei.ontologymatching.org/2013/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_5">No OWL 2 reasoner could classify the integrated SNOMED-NCI ontology. The OWL 2 EL reasoner ELK<ref type="bibr" target="#b13">[14]</ref> computed a lower bound on the number of conservativity violations.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="9" xml:id="foot_6">http://potassco.sourceforge.net/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="10" xml:id="foot_7">The computation times of lines 1-3 in Algorithm 1 were negligible with respect to the repair and disjointness addition times (tr and t d ) and thus they were not included in the result tables.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The Unified Medical Language System (UMLS): integrating biomedical terminology</title>
		<author>
			<persName><forename type="first">O</forename><surname>Bodenreider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Nucleic Acids Research</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="page" from="267" to="270" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Distributed Description Logics: Assimilating Information from Peer Sources</title>
		<author>
			<persName><forename type="first">A</forename><surname>Borgida</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Serafini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Data Sem</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="153" to="184" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Modular Reuse of Ontologies: Theory and Practice</title>
		<author>
			<persName><forename type="first">Cuenca</forename><surname>Grau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Horrocks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kazakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Sattler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Artif. Intell. Res</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="page" from="273" to="318" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Linear-Time Algorithms for Testing the Satisfiability of Propositional Horn Formulae</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">F</forename><surname>Dowling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Gallier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Log. Prog</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="267" to="284" />
			<date type="published" when="1984">1984</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Ontology Alignment Evaluation Initiative: Six Years of Experience</title>
		<author>
			<persName><forename type="first">J</forename><surname>Euzenat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Meilicke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Stuckenschmidt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Shvaiko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Trojahn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Data Sem</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="158" to="192" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Answer Set Programming</title>
		<author>
			<persName><forename type="first">W</forename><surname>Faber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Reasoning Web</title>
		<imprint>
			<biblScope unit="page" from="162" to="193" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Advocatus Diaboli -Exploratory Enrichment of Ontologies with Negative Constraints</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ferré</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rudolph</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Int&apos;l Conf. on Knowl. Eng. (EKAW)</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="42" to="56" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A Unified Approach for Aligning Taxonomies and Debugging Taxonomies and their Alignments</title>
		<author>
			<persName><forename type="first">V</forename><surname>Ivanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Lambrix</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Eur. Sem. Web Conf. (ESWC)</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="1" to="15" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Ontology Matching With Semantic Verification</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">R</forename><surname>Jean-Mary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">P</forename><surname>Shironoshita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Kabuka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Web Sem</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="235" to="251" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">LogMap: Logic-based and Scalable Ontology Matching</title>
		<author>
			<persName><forename type="first">E</forename><surname>Jiménez-Ruiz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Cuenca Grau</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Int&apos;l Sem. Web Conf. (ISWC)</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="273" to="288" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Ontology integration using mappings: Towards getting the right logical consequences</title>
		<author>
			<persName><forename type="first">E</forename><surname>Jiménez-Ruiz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Cuenca Grau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Horrocks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Berlanga</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Eur. Sem. Web Conf</title>
				<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Logic-based Assessment of the Compatibility of UMLS Ontology Sources</title>
		<author>
			<persName><forename type="first">E</forename><surname>Jiménez-Ruiz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Cuenca Grau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Horrocks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Berlanga</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Biomed. Semant</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">S2</biblScope>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note>Suppl</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Evaluating Mapping Repair Systems with Large Biomedical Ontologies</title>
		<author>
			<persName><forename type="first">E</forename><surname>Jiménez-Ruiz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Meilicke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Cuenca Grau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Horrocks</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Description Logics</title>
				<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="246" to="257" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Concurrent Classification of EL Ontologies</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Kazakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Krötzsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Simancik</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Int&apos;l Sem. Web Conf. (ISWC)</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="305" to="320" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The Logical Difference Problem for Description Logic Terminologies</title>
		<author>
			<persName><forename type="first">B</forename><surname>Konev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Walther</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Wolter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Int&apos;l Joint Conf. on Automated Reasoning (IJCAR)</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="259" to="274" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Alignments Incoherency in Ontology Matching</title>
		<author>
			<persName><forename type="first">C</forename><surname>Meilicke</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note type="report_type">Ph.D. thesis</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Learning Disjointness for Debugging Mappings between Lightweight Ontologies</title>
		<author>
			<persName><forename type="first">C</forename><surname>Meilicke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Völker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Stuckenschmidt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Int&apos;l Conf. on Knowl. Eng. (EKAW)</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="93" to="108" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Hypertableau Reasoning for Description Logics</title>
		<author>
			<persName><forename type="first">B</forename><surname>Motik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Shearer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Horrocks</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Artif. Intell. Res. (JAIR)</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="165" to="228" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">YAM++ : A Multi-strategy Based Approach for Ontology Matching Task</title>
		<author>
			<persName><forename type="first">D</forename><surname>Ngo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Bellahsene</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Int&apos;l Conf. on Knowl. Eng. (EKAW)</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="421" to="425" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">To repair or not to repair: reconciling correctness and coherence in ontology reference alignments</title>
		<author>
			<persName><forename type="first">C</forename><surname>Pesquita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Faria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Santos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Couto</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Ontology Matching (OM)</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Ontology Alignment Repair Through Modularization and Confidence-based Heuristics</title>
		<author>
			<persName><forename type="first">E</forename><surname>Santos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Faria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Pesquita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Couto</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1307.5322preprint</idno>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Debugging and Semantic Clarification by Pinpointing</title>
		<author>
			<persName><forename type="first">S</forename><surname>Schlobach</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Eur. Sem. Web Conf. (ESWC)</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="226" to="240" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Ontology Matching: State of the Art and Future Challenges</title>
		<author>
			<persName><forename type="first">P</forename><surname>Shvaiko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Euzenat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Knowl. and Data Eng</title>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>TKDE</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">Coping with Conservativity Principle Violations in Ontology Mappings</title>
		<author>
			<persName><forename type="first">A</forename><surname>Solimando</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Guerrini</surname></persName>
		</author>
		<idno>DIBRIS-TR-14-01</idno>
		<ptr target="ftp://ftp.disi.unige.it/person/SolimandoA/cycleMappingDbgExt.pdf" />
		<imprint>
			<date type="published" when="2014-01">Jan 2014</date>
		</imprint>
		<respStmt>
			<orgName>University of Genova</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Tech. Rep.</note>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Detecting and Correcting Conservativity Principle Violations in Ontology-to-Ontology Mappings</title>
		<author>
			<persName><forename type="first">A</forename><surname>Solimando</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Jiménez-Ruiz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Guerrini</surname></persName>
		</author>
		<ptr target="ftp://ftp.disi.unige.it/person/SolimandoA/conservLogMap.pdf" />
	</analytic>
	<monogr>
		<title level="m">Int&apos;l Sem. Web Conf</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Depth-first Search and Linear Graph Algorithms</title>
		<author>
			<persName><forename type="first">R</forename><surname>Tarjan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIAM J. Comp</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="1972">1972</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Learning Disjointness</title>
		<author>
			<persName><forename type="first">J</forename><surname>Völker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Vrandecic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Sure</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hotho</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Eur. Sem. Web Conf. (ESWC)</title>
				<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="175" to="189" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Debugging Ontology Mappings: A Static Approach</title>
		<author>
			<persName><forename type="first">P</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computing and Informatics</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="21" to="36" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
