=Paper= {{Paper |id=Vol-1350/paper-23 |storemode=property |title=The Complexity of Temporal Description Logics with Rigid Roles and Restricted TBoxes: In Quest of Saving a Troublesome Marriage |pdfUrl=https://ceur-ws.org/Vol-1350/paper-23.pdf |volume=Vol-1350 |dblpUrl=https://dblp.org/rec/conf/dlog/Gutierrez-Basulto15 }} ==The Complexity of Temporal Description Logics with Rigid Roles and Restricted TBoxes: In Quest of Saving a Troublesome Marriage== https://ceur-ws.org/Vol-1350/paper-23.pdf
      The Complexity of Temporal Description Logics
         with Rigid Roles and Restricted TBoxes:
       In Quest of Saving a Troublesome Marriage

        Vı́ctor Gutiérrez-Basulto, Jean Christoph Jung, and Thomas Schneider

                   Department of Computer Science, Universität Bremen
                  {victor,jeanjung,ts}@cs.uni-bremen.de



1   Introduction
Temporal description logics (TDLs) extend classical DLs, providing built-in means to
represent and reason about temporal aspects of knowledge. The importance of TDLs
stems from the need of relevant applications to capture temporal and dynamic aspects
of knowledge, e.g., in medical and life science ontologies, which are very large but
still demand efficient reasoning, such as S NOMED CT and FMA [9], and the gene
ontology (GO) [20]. A natural task is to model dynamic knowledge about patient
histories against static medical knowledge (e.g., about diseases): e.g., the temporal
concept C := E3∃ requiresTransfusion.> describes a patient who may need a blood
transfusion in the future, and the axiom Anemic v C says that this applies to anemic
people. In contrast, Anemia v Disorder represents static knowledge.
     A notable approach to designing TDLs is to combine DLs with temporal logics
commonly used in software/hardware verification such as LTL, CTL(∗) , and to provide a
two-dimensional product-like semantics [19, 11, 17]. The combination allows various
design choices, e.g., we can restrict the scope of temporal operators to certain types
of entities (such as concepts, roles, axioms), or declare some DL concepts or roles as
rigid, meaning that their interpretation will not change over time. The need for rigid
roles in TDL applications, e.g., in biomedical ontologies to accurately capture life-time
relations, has been identified [7]. For example, the role hasBloodType should be rigid
since a human’s blood type does not change during their lifetime.
     Alas, TDLs based on the Boolean-complete DL ALC with rigid roles cannot be
effectively used since they become undecidable when temporal operators are applied to
concepts and a general TBox is allowed [11, 15]. This is the case even if we severely
restrict the temporal operators available and use the sub-Boolean DL EL, whose standard
reasoning problems are tractable, instead of ALC [1, 15]. In the light of these results,
several efforts have been devoted to design decidable TDLs with rigid roles [3, 2]; e.g.,
decidability can be recovered by using a lightweight DL component based on DL-Lite.
Both the EL and DL-Lite families underlie prominent profiles of the OWL standard.
     Interestingly, no research has been yet devoted to TDLs based on EL in the presence
of restricted TBoxes, such as classical TBoxes, which consist solely of definitions of the
form A ≡ C with A atomic and unique, or acyclic TBoxes, which additionally forbid
syntactic cycles in definitions. This is surprising since in the presence of general TBoxes
TDLs based on EL tend to be as complex as the ALC variant [3, 13, 15].
2

     These considerations lead us to investigating TDLs with rigid roles based on EL
and the (branching-time) CTL allowing for temporal concepts and acyclic TBoxes. We
are convinced that TDLs designed in this way are suitable for temporal extensions of
biomedical ontologies: large parts of S NOMED CT and GO are acyclic EL-TBoxes.
     Our main contributions are algorithms for standard reasoning problems and (mostly
tight) complexity bounds. We begin by showing that the combination of CTL and ALC
with empty and acyclic TBoxes is decidable. Our nonelementary upper bound is optimal
even when the set of temporal operators is restricted to E3 (“possibly eventually”) or
E (“possibly next”). We then replace ALC with EL and maintain the restriction to
E3, E and empty TBoxes. We particularly show that the resulting TDLs are decidable
in PT IME with one of the two operators, and CO NP-complete with both. To this aim, we
employ canonical models, together with expansion vectors [16] in the case with both
E3, E . Next, we lift the PT IME upper bound to the case of acyclic TBoxes, employing
a completion algorithm in the style of those for EL and extensions, [5]. Finally, we show
that the combination of E3 with A2 (“always globally”) and acyclic TBoxes leads to
a PS PACE-complete TDL, again employing a completion algorithm. An overview of
existing and new results is given in Table 1, where CTLYX denotes the combination of
the DL X with the fragment of CTL restricted to the temporal operators Y . In particular,
all the new results hold even if rigid concepts are also included.

    Rigid roles? no                  yes                 yes                yes
    TBoxes       general             general             acyclic            empty
    CTLALC       =E XP T IME [13]    undecidable [15]   nonelementary,      nonelem.,
                                                        decidable (1)       decidable (1)
    CTLE3
       EL        ≤PT IME [13]        nonelementary [15] ≤PT IME (6)         ≤PT IME (6)
    CTLE
       EL
         ◦       ≤PT IME [13]        undecidable [15]    ≤PT IME (6)        ≤PT IME (6)
    CTLE ◦,E3
                 =E XP T IME [13, 15] undecidable [15]   ≥CO NP, (2)         =CO NP (2)
       EL
                                                         ≤CO NE XP T IME (5)
    CTLE3,A2
       EL    =PS PACE [13]           nonelementary [15] =PS PACE (9)        ≤PS PACE (9)
Table 1. Previous and new complexity results. ≥ hardness, ≤ membership, = completeness.
(n) refers to our Theorem or Corollary n.

    The relatively low complexity that we obtain for EL-based TDLs over restricted
TBoxes are in sharp contrast with the undecidability and nonelementary lower bounds
known for the same logics over general TBoxes [15]. With the restriction to acyclic
TBoxes, we will thus identify the first computationally well-behaved TDLs with rigid
roles based on EL and classical temporal logics.
Additional technical notions and proofs are in a report: http://tinyurl.com/ijcai15tdl


2      Preliminaries
We introduce CTLALC , a TDL based on the classical DL ALC. Let NC and NR be
countably infinite sets of concept names and role names, respectively. We assume that
NC and NR are partitioned into two countably infinite sets: Nrig    loc
                                                             C and NC of rigid concept
                                                                                          3

names and local concept names, respectively; and, Nrig      loc
                                                   R and NR of rigid role names and
local role names, respectively. CTLALC -concepts C are defined by the grammar
             C := > | A | ¬C | C u D | ∃r.C | E C | E2C | E(CUD)
where A ranges over NC , r over NR . We use standard DL abbreviations [6] and temporal
abbreviations E3C, A2C, A3C and A(C U D) [10].
    The semantics of classical DLs, such as ALC, is given in terms of interpretations
of the form I = (∆, ·I ), where ∆ is a non-empty set called the domain and ·I is an
interpretation function that maps each A ∈ NC to a subset AI ⊆ ∆ and each r ∈ NR to
a binary relation rI ⊆ ∆ × ∆. The semantics of CTLALC is given in terms of temporal
interpretations based on infinite trees [15]: A temporal interpretation based on an infinite
tree T = (W, E) is a structure I = (T, (Iw )w∈W ) such that, for each w ∈ W , Iw is a
DL interpretation with domain ∆; and, rIw = rIw0 and AIw = AIw0 for all r ∈ Nrig         R ,
A ∈ Nrig
       C  and  w, w 0
                      ∈ W  . We  usually  write A I,w
                                                      instead of A Iw
                                                                      . The stipulation that
all worlds share the same domain is called the constant domain assumption (CDA). For
Boolean-complete TDLs, CDA is the most general: increasing, decreasing and varying
domains can all be reduced to it [11, Prop. 3.32]. For the sub-Boolean logics studied
here, CDA is not w.l.o.g. Indeed, we identify a logic in which reasoning with increasing
domains cannot be reduced to the constant domain case.
    We now define the semantics of CTLALC -concepts. A path in T = (W, E) starting
at a node w is an infinite sequence π = w0 w1 w2 · · · with w0 = w and (wi , wi+1 ) ∈ E.
We write π[i] for wi , and use Paths(w) to denote the set of all paths starting at the node
w. The mapping ·I,w is extended from concept names to CTLALC -concepts as follows.
                  >I,w = ∆ (C u D)I,w = C I,w ∩ DI,w
            I,w
    (∃r.C)  = {d ∈ ∆ | ∃e . (d, e) ∈ rI,w ∧ e ∈ C I,w }
   (E C)I,w = {d | ∃π ∈ Paths(w) . d ∈ C I,π[1] }
   (E2C)I,w = {d | ∃π ∈ Paths(w) . ∀j ≥ 0 . d ∈ C I,π[j] }
(E(CUD))I,w = {d | ∃π ∈ Paths(w) . ∃j ≥ 0 . (d ∈ DI,π[j] ∧ (∀k < j . d ∈ C I,π[k] ))}
An acyclic CTLALC -TBox T is a finite set of concept definitions (CDs) A ≡ D with
A ∈ NC and D a CTLALC concept, such that (1) no two CDs have the same left-hand
side, and (2) there are no CDs A1 ≡ C1 , . . . , Ak ≡ Ck in T such that Ai+1 occurs in
Ci for 1 ≤ i ≤ k, where Ak+1 = A1 .
    A temporal interpretation I is a model of a concept C if C I,ε 6= ∅; it is a model of an
acyclic TBox T , written I |= T , if AI,w = C I,w for all A ≡ C ∈ T and w ∈ W ; it is a
model of a concept inclusion C v D, written I |= C v D, if C I,w ⊆ DI,w for all w ∈ W .
    The two main reasoning tasks we consider are concept satisfiability and subsumption.
A concept C is satisfiable relative to an acyclic TBox T if there is a common model of
C and T . A concept D subsumes a concept C relative to an acyclic TBox T , written
T |= C v D, if I |= C v D for all models I of T . If T is empty, we write |= C v D.

3   First Observations
We start by observing that the combination of CTL and ALC with rigid roles relative to
empty and acyclic TBoxes is decidable and inherently nonelementary. In a nutshell, we
4

show the upper bounds using a variant of the quasimodel technique [11, Thm. 13.6]; the
lower bound follows from the fact that satisfiability for the product modal logics S4×K
and K×K is inherently nonelementary [12]. Indeed, the fragment of CTLALC allowing
E3 (E ) as the only temporal operator is a notational variant of S4×K (K×K) [15].

Theorem 1. Concept satisfiability relative to acyclic and empty TBoxes for CTLALC
with rigid roles is decidable and inherently nonelementary.

With Theorem 1 and the third column of Table 1 in mind, we particularly set as our
goal the identification of elementary (ideally tractable) TDLs. To this aim, we study
combinations of (fragments of) CTL with the lightweight DL EL. CTLEL is the fragment
of CTLALC that disallows the constructor ¬ (and thus the abbreviations C t D, ∀r.C,
A2, . . . ). The standard reasoning problem for CTLEL , as for EL, is concept subsumption
since each concept and TBox are trivially satisfiable. In what follows we consider various
fragments of CTLEL obtained by restricting the available temporal operators. We denote
the fragments by putting the allowed operators as a superscript. In this context, we view
each of the operators E3, A2 as primitive instead of as an abbreviation.
    In order to keep the presentation of our main results accessible, in Sections 5-6, we
concentrate on the case where only rigid role names and local concept names are present.
Later on, in Section 7, we explain how to deal with the general case.


4   CTLE◦,E3 relative to the Empty TBox
       EL

We begin by investigating the complexity of subsumption relative to the empty TBox for
a TDL whose subsumption relative to general TBoxes is undecidable: CTLE     ◦,E3 .
                                                                           EL

Theorem 2. Concept subsumption relative to the empty TBox is CO NP-complete for
CTLE ◦,E3 with rigid roles and in PT IME for CTLE◦ and CTLE3 with rigid roles.
   EL                                           EL        EL

CO NP-hardness is obtained by embedding EL plus transitive closure into CTLEL
                                                                                   ◦
                                                                                  E ,E3
                                                                                     ;
the jump in complexity comes from the ability to express disjunctions, e.g., |= E3C v
C t E E3C. We next explain CO NP-membership; the PT IME results are a byproduct
and improved later.
We proceed in two steps: first we provide a characterization of |= C v D where C is an
       ◦                        E◦,E3
CTLE EL -concept and D an CTLEL        -concept. Next we generalize this characterization
        E◦,E3
to CTLEL      -concepts C.
    Given a CTLE   ◦
                  EL -concept C, the description tree tC = (VC , LC , EC ) for C is a
labeled graph corresponding to C’s syntax tree; we denote its root by xC . For example,
if C = E (∃r.A u ∃s.B), then tC is given in Figure 1, left.
    For plain EL, we have |= C v D if and only if there is a homomorphism from tD
to tC , which can be tested in polynomial time [8]. This criterion cannot directly be
transferred to CTLE  ◦
                   EL because tC does not explicitly represent all pairs of worlds and
domain elements whose existence is implied by tC , e.g., for |= E ∃r.A v ∃r.E A
with r rigid, there is no homomorphism from tD to tC . We overcome this problem
by transforming tC into a canonical model IC of C, i.e., (1) its distinguished root is
an instance of C and (2) IC homomorphically embeds into every model of C. The
                                                                                                 5



                 ◦
                                            r        A                      r       A
            r        s                      s        B                      s       B

        A                B

                                       ..
                tC                      .       IC                           Ipre
                                                                              C
Fig. 1. Description tree tC , canonical model IC , finite representation Ipre
                                                                          C for C = E (∃r.A u ∃s.B)



construction of IC from tC is straightforward: for every node with an incoming -edge
(r-edge, r being a role) create a fresh world (domain element); for the root xC create
both a world and domain element. The temporal relation and the interpretation of r and
concept names is read off EC and LC . To transform (W, R) into an infinite tree, we add
an infinite path of fresh worlds to every world without R-successor. The canonical model
for the above concept C is shown in Fig. 1, center; the infinite path of worlds is dashed.
    From (1), (2), and the preservation properties of homomorphisms, we obtain:

                         ◦                        E◦,E3
Lemma 3. For all CTLE   EL -concepts C and all CTLEL    -concepts D, we have |=
                            IC ,xC
C v D if and only if xC ∈ D        .

Now xC ∈ DIC ,xC can be verified by model-checking D in world xC and element xC
of Ipre
    C , which is the polynomial-sized modification of I where the lastly added infinite
path of worlds is replaced by a single loop, see Fig. 1, right. Since IC is the unraveling
of Ipre                                        pre
    C into the temporal dimension, IC and IC satisfy the same concepts in their roots.
                    E◦
Theorem 2 for CTLEL thus follows. The CTLE3     EL part can be obtained by representing
every E3 in C by a -edge in tC and adapting the notion of a homomorphism.
For CTLE   ◦,E3 , we use expansion vectors introduced in [16], applied to the temporal
         EL
dimension. Let C be a CTLE         ◦,E3 -concept with n occurrences of E3. An expansion
                                 EL
vector for C is an n-tuple U = (u1 , . . . , un ) of integers ui > 0. Intuitively, U fixes
a specific number of temporal steps taken for each E3 in C when constructing tC
and IC . More precisely, we denote with C[U ] the CTLE         ◦
                                                             EL -concept obtained from C
                                                        ui
by replacing the i-th occurrence of E3 with (E ) , i.e., i times E . For example, if
C = E3∃r.E3(A u E B) and U = (2, 0), then C[U ] = E E ∃r.(A u E B).
    Let UmC = {(u1 , . . . , un ) | ui 6 m for all i}. We denote with tdepth(D) the nesting
depth of temporal operators in D. We use expansion vectors with entries bounded by
tdepth(D) to reduce 6|= C v D for CTLE        ◦,E3 to the case where C is from CTLE◦ .
                                             EL                                      EL


Lemma 4. For all CTLE    ◦,E3 -concepts C, D, we have |= C v D if and only if
                        EL
                           tdepth(D)+1
|= C[U ] v D for all U ∈ UC            .

Together with Lemma 3, this yields the desired polynomial-time guess-and-check proce-
dure for deciding |= C v D.
6

5   CTLE◦        E3
       EL and CTLEL relative to Acyclic TBoxes

The results of Theorem 2 transfer to acyclic TBoxes with an exponential blowup due to
unfolding [18], that is:
Corollary 5. Concept subsumption relative to acyclic CTLE ◦,E3 -TBoxes with rigid
                                                        EL
roles is in CO NE XP T IME.
For the subfragments CTLE ◦       E3
                        EL and CTLEL , we can even show polynomial complexity:

Theorem 6. Concept subsumption relative to acyclic CTLE ◦         E3
                                                      EL - and CTLEL -TBoxes with
rigid roles is in PT IME.
We first concentrate on the E3 case and explain below how to deal with the E one. We
focus w.l.o.g. on subsumption between concept names and assume that the input TBox
is in normal form (NF), i.e., each axiom is of the shape A ≡ A1 u A2 , A ≡ E3A1 , or
A ≡ ∃r.A1 , where Ai ∈ NC ∪ {>} and r ∈ NR . As usual, a subsumption-equivalent
TBox in NF can be computed in polynomial time [4]. We use CN and ROL to denote the
sets of concept names and roles occurring in T .
     To prove a PT IME upper bound, we devise a completion algorithm in the style
of those known for EL and (two-dimensional) extensions, cf. [5, 14], which build an
abstract representation of the ‘minimal’ model of the input TBox T (in the sense of
Horn logic). The main difficulty is that different occurrences of the same concept name
in the TBox cannot all be treated uniformly (as it is the case for, say, EL), due to the
two-dimensional semantics. Instead, we have to carefully choose witnesses for E3A and
∃r.A, respectively. Our algorithm constructs a graph G = (W, E, Q, R) based on a set
W , a binary relation E, a mapping Q that associates with each A ∈ CN and each w ∈ W
a subset Q(A, w) ⊆ CN, and a mapping R that associates with each rigid role r ∈ ROL
                                                                          r
a relation R(r) ⊆ CN × W × CN × W . For brevity, we write (A, w) → (B, w0 ) instead
of (A, w, B, w0 ) ∈ R(r) and denote with E ∗ the reflexive, transitive closure of E.
     The algorithm for deciding subsumption initializes G as follows. For all r ∈ ROL, set
R(r) = ∅. Set W = CN×CN∪{E3A | A ∈ CN}. Set E = {(E3A, AA), (AB, A>) |
A, B ∈ CN}. For all A ∈ CN, set Q(A, w) = {>, B} if w = AB and Q(A, w) = {>}
otherwise.
     Intuitively, the unraveling of (W, E) is the temporal tree underlying the minimal
model and the mappings Q and R contain condensed information on how to interpret
concepts and roles, respectively. More specifically, the data stored in Q(A, ·) describes
the temporal evolution of an instance of A. For example, Q(A, AA) collects all concept
names B such that T |= A v B; likewise, Q(A, E3A) captures everything that follows
from E3A. Finally, Q(A, AB) contains concept names that are implied by B given that
B appears in the temporal evolution of an instance of A, i.e., B 0 ∈ Q(A, AB) implies
T |= A u E3B v E3(B u B 0 ).
     After initialization, the algorithm extends G by applying the completion rules de-
picted in Figure 2 in three phases. In the first phase – also called F ORWARD-phase, since
definitions A ≡ C ∈ T are read as A v C – rules F1-F3 are exhaustively applied in
order to generate a fusion-like representation by adding witness-worlds and witness-
existentials as demanded. Most notably, rule F2 introduces a pointer to the structure
representing the temporal evolution of an instance of B 0 .
                                                                                         7


F1 If B ∈ Q(A, AA0 ) & B ≡ E3B 0 ∈ T , then add (AA0, AB 0 ) to E
                                                              r
F2 If B ∈ Q(A, w) and B ≡ ∃r.B 0 ∈ T , then set (A, w) → (B 0 , B 0 B 0 )
F3 If B ∈ Q(A, w) & B ≡ A1 uA2 ∈ T , then add A1 ,A2 to Q(A, w)
                                   r
C1 If (BB, w) ∈ E and (A, w0 ) → (B, BB), then add (w0, w) to E
               r
C2 If (A, w) → (B, BB), then
               r
   a) (A, w0 ) → (B, E3B) for all w0 6= w with (w0, w) ∈ E ∗
               r
   b) (A, w0 ) → (B, w0 ) for all w0 with (w0 , w) ∈
                                                   / E∗
B1 If B ∈ Q(A, w), (w0 , w) ∈ E ∗ , and A0 ≡ E3B ∈ T , then add A0 to Q(A, w0 )
                               r
B2 If A ∈ Q(B, w), (A0 , w0 ) → (B, w), and A00 ≡ ∃r.A ∈ T then add A00 to Q(A0 , w0 )
B3 If A1 , A2 ∈ Q(B, w) & A ≡ A1 u A2 ∈ T then add A to Q(B, w)

                                   Fig. 2. Completion rules

    Subsequently, G is extended to conform with the constant domain assumption and
reflect rigidity of roles by exhaustively applying rules C1, C2. Here read C2 as ‘if two
points are connected via r in some world, then they should be connected in all worlds.’
Note that Q(B, E3B) is used as a representative for the entire “past” of B in part a).
    In the final phase, BACKWARD-completion rules B1-B3 are exhaustively applied in
order to respect the ‘backwards’-direction of definitions, i.e., definitions A ≡ C ∈ T are
read as A w C. This separation into a F ORWARD and BACKWARD phase is sanctioned
by acyclicity of the TBox. In fact, one run through each phase is enough; note that no
new tuples are added to E or R in the BACKWARD-phase.
    The following lemma shows correctness of our algorithm.
Lemma 7. Let T be an acyclic CTLE3 EL -TBox in normal form. Then for all A, B ∈ CN,
we have T |= A v B iff, after exhaustive rule application, B ∈ Q(A, AA).
To prove “⇐”, we show that (a certain unraveling of) G “embeds” into every model of
A and T . For this purpose, we need to adapt the notion of a homomorphism to temporal
interpretations and rigid roles. For “⇒”, we construct from G a model I of T with
d ∈ AI,w \ B I,w for some d, w. The algorithm runs in polynomial time: the size of the
data structures W , E, and R is clearly polynomial and the mapping Q(·, ·) is extended
in every rule application, so the algorithm stops after polynomially many steps.
    Finally, we sketch two modifications of the algorithm such that it works for E
instead of E3. First, we have to use a non-transitive version of B1. Second, and a bit
more subtly, we have to replace E3A ∈ W with E k A, 1 ≤ k ≤ |T | to capture what
is implied by E k A; more precisely, B 0 ∈ Q(A, E k A) implies T |= E k A v B 0 ,
where E k denotes E · · · E k times.
    We next show that there is a jump in the complexity if increasing domains are
considered instead of constant ones. Intuitively, this can be explained by the fact that
increasing domains allow rigid roles to mimic the behaviour of the A2-operator. In the
next section, we show that adding A2 to {E3} indeed leads to PS PACE-hardness.

Theorem 8. Concept subsumption relative to acyclic CTLE ◦         E3
                                                      EL - and CTLEL -TBoxes with
rigid roles and increasing domains is PS PACE-hard.
8


6   CTLE3,A2
       EL    relative to Acyclic TBoxes
We now add A2 and observe an increase in complexity over acyclic TBoxes.

Theorem 9. Concept subsumption relative to acyclic CTLE3,A2
                                                      EL    -TBoxes with rigid
roles is PS PACE-complete.

The lower bound is obtained via a reduction from QBF validity. For the upper bound,
we again consider w.l.o.g. subsumption between concept names and assume that the
acyclic TBox is in normal form, i.e., axioms are of the shape A ≡ A1 u A2 , A ≡ E3A1 ,
A ≡ A2A1 , or A ≡ ∃r.A1 , where Ai ∈ NC ∪ {>} and r ∈ NR . We also restrict
ourselves again to only rigid roles. CN and ROL are used as before.
    In contrast to the previous section, we cannot maintain the entire minimal model in
memory since the added operator A2 can be used to enforce models of exponential size.
Instead, we will compute all concepts implied by the input concept A (the left-hand side
of the subsumption to be checked) by iteratively visiting relevant parts of the minimal
model. Our main tool for doing so are traces.

Definition 10. A trace is a tuple (σ, E, R) where σ is a sequence (d0 , w0 ) · · · (dn , wn )
such that for all 0 ≤ i < n one of the following is true. (1) di = di+1 and (wi , wi+1 ) ∈
E. (2) wi = wi+1 and (di , di+1 ) ∈ R(r) for some r ∈ ROL.

Intuitively, traces represent paths
                                      Algorithm 1: Subsumption in CTLE3,A2  EL
through temporal interpretations,
which in each step follow either          Input: Acyclic TBox T , concept names A, B
                                          Output: true if T |= A v B, false otherwise
the temporal relation (Def. 10, 1)
or a DL relation r (2); so, in a pair   1 σ := (d0 , w0 ); Q(d0 , w0 ) := {A, >};

(d, w), d can be thought of as a        2 E := ∅; R(r) := ∅ for all r ∈ ROL;
                                        3 expand(σ, E, R);
domain element and w as a world.
                                        4 return true if B ∈Q(d0 ,w0 ), false otherwise;
    Our algorithm, whose basic
structure is given by Alg. 1, enu-      5 procedure expand (σ, E, R) :

merates on input T, A, B, in a sys-     6     complete (σ, E, R, Q);
tematic tableau-like way, all traces    7     if (σ, Q) is periodic at (i, j) then
that must appear in every model         8          add (wj−1 , wi ) to E;
of A and T . Note that in the con-      9          truncate;
text of Algorithm 1 a trace is used 10             complete (σ, E, R, Q);
                                       11          return;
as the basis for inducing a richer
                                       12     (d, w) := last element of σ;
structure that conforms with the
constant domain assumption and 13             foreach A ∈ Q(d, w) with A ≡ ∃r.B ∈ T do
                                       14          Q(d0 , w) = {B, >} for a fresh d0 ;
captures rigidity; see Example 11
                                       15          add (d, d0 ) to R(r);
below. The algorithm also main-
                                       16          expand (σ · (d0 , w), E, R);
tains an additional mapping Q that
                                       17     foreach A ∈ Q(d, w) with A ≡ E3B ∈ T do
labels each point (d, w) of the
                                       18          Q(d, w0 ) = {B, >} for a fresh w0 ;
trace (and all the induced points) 19              add (w, w0 ) to E;
with a set Q(d, w) ⊆ CN. The 20                    expand (σ · (d, w0 ), E, R);
set Q(d, w) captures all concept
names that are satisfied in the minimal model at points represented by (d, w).
                                                                                                    9


 R1 If A ≡ A1 u A2 ∈ T and A ∈ Q∗ (·), then add A1 , A2 to Q∗ (·)
 R2 If A ≡ A1 u A2 ∈ T and A1 , A2 ∈ Q∗ (·), then add A to Q∗ (·)
 R3 If (d, d0 ) ∈ R(r), B ∈ Q(d0 , w), A ≡ ∃r.B ∈ T , then add A to Q(d, w)
 R4 If B ∈ Q(d, w), (w0 , w) ∈ E ∗ , A ≡ E3B ∈ T , then add A to Q(d, w0 )
 R5 If B ∈ Q(d, w), (w, w0 ) ∈ E ∗ , B ≡ A2A ∈ T , then add B, A to Q(d, w0 )
 R6 If (d, d0 ) ∈ R(r), B ∈ Qcert (d0 ), A ≡ ∃r.B ∈ T , then add A to Qcert (d)
 R7 If B ∈ Qcert (d), A ≡ A2B ∈ T , then add A to Qcert (d)
 R8 If B ∈ Qcert (d), then add B to Q(d, w) for all w
 R9 If B ∈ QA2 (d, w), A ≡ A2B ∈ T , add A to Q(d, w)
 R10 If A ∈ Q(d, w), A ≡ A2B ∈ T , add A, B to QA2 (d, w)
 R11 If (d, d0 ) ∈ R(r), B ∈ QA2 (d0 , w), A ≡ ∃r.B ∈ T , then add A to QA2 (d, w)
 R12 If A ∈ QA2 (d, w), A ≡ E3B ∈ T , w0 added due to
     A ∈ Q(d, w) in Line 18, B 0 ∈ Q(d, w0 ), A0 ≡ E3B 0 ∈ T , then add A0 to QA2 (d, w)

Fig. 3. Saturation rules. In R1, R2 the set Q∗ (·) ranges over all Q(d, w), Qcert (d), and QA2 (d, w).

    The basics of Algorithm 1 are the following. In Lines 1 and 2, it creates a trace
consisting of a single point representing A and initializes the necessary data structures.
In Line 3, the systematic expansion is set off. When that is finished, the algorithm just
returns whether or not B (the right-hand of the subsumption) has been added during the
expansion. As for the expand procedure:

  – in Line 6 and 10, the algorithm updates the mapping Q;
  – Line 7 contains some termination condition; and finally,
  – the loops in Lines 13 & 17 enumerate all ∃r.B and E3B that appear in the set
    Q(d, w) of the last trace element and expand the trace to witness these concepts.

This basic description of the algorithm leaves open several points: (i) the precise behavior
of the subroutine complete, (ii) when a trace is periodic, and (iii) what happens
inside the truncate command in Line 9. Let us start with describing the subroutine
complete. It uses additional mappings Qcert (d) ⊆ CN and QA2 (d, w) ⊆ CN, which
intuitively contain all the concept names that d satisfies certainly, i.e., in all worlds, and
starting from world w, respectively. It proceeds in two steps. (1) Initialize undefined
Q(d, w) and Qcert (d) with {>}, and undefined QA2 (d, w) with Qcert (d). (2) Apply
rules R1-R12 in Figure 3 to Q(·), Qcert (·) and QA2 (·).
    The number of rules is indeed scarily high; however, they can be divided into four
digestible groups: R1 and R2 are used to ensure that all sets Q∗ are closed under
conjunction; R3-R5 are used to complete Q(·). Note that R1-R4 are already known
from the algorithm of the previous section. Furthermore, R6-R8 are used to deal with
Qcert (·); and R9-R12 to update QA2 (·). As an example of the interplay between the
different mappings take R9: If B is certain for d starting in world w and A ≡ A2B,
then we also know that d satisfies A in w; and R11 for the interplay between temporal
operators and rigid roles: indeed, for r rigid, |= ∃r.A2B v A2∃r.B.
10

Example 11. Let T = {A ≡ E3A1 , A1 ≡ ∃r.B, B ≡ E3A1 } be the input TBox; and
T |= A v A1 is to be checked. Figure 4 (left) shows the trace initiated at (d0 , w0 )
with Q(d0 , w0 ) = {>, A}, and further expanded in Lines 13 and 17. The trace, as
mentioned above, induces a richer structure, reflecting rigid roles and the constant
domain assumption; see Fig. 4 (center). This richer structure is then completed to
properly enrich the types Q(d, w) of each element. In particular, during completion,
further concept names are added to the corresponding types (Fig. 4, right). One can now
easily see that T |= A v A1 indeed holds. Furthermore, note that T 6|= A v A1 , if r
is local or increasing domains are assumed. This is the case since, in both cases, the
r-connection is not necessarily present in the ‘root world’.
For the termination condition in Line 7, we take the following definition of periodicity.
Definition 12. A trace (σ, E, R) together with a mapping Q is called periodic at (i, j)
if σ = (d0 , w0 ) · · · (dn , wn ), i < j, di = dj = dn , and Q(di , wi ) = Q(dj , wj ).
This means that during the evolution of element d = di = dj , we find two different
worlds wi , wj such that d has the same type in wi and wj . We can stop expanding
worlds appearing after wj since their behavior is already captured by the successors
of wi . If a trace periodic at (i, j) is found, we add an edge (wj−1 , wi ) to E reflect-
ing the periodic behavior, see Line 8. Then, in truncate, the trace is shortened to
(d0 , w0 ) · · · (dj−1 , wj−1 ) and the relations E and R(r), r ∈ ROL, and the mappings
Q, Qcert , QA2 are restricted to those d and w that appear in the shortened trace.
Lemma 13. On every input T, A, B, Alg. 1 terminates and returns true iff T |= AvB.
For termination, consider a trace with suffix (d, w1 ) · · · (d, wn ) and let A1 , . . . , An be
the concept names such that E3Ai lead to wi , see Line 17 of Alg. 1. It is not difficult
to show that if Ai = Aj for i < j, then Q(d, wi ) ⊆ Q(d, wj ) after application of
complete. Since Q(d, w) ⊆ CN, there are no infinite (strictly) increasing sequences.
Hence, the expansion in Lines 17ff. will not indefinitely be applied. Also, the expansion
in Lines 13ff. stops due to acyclicity of the TBox. Together, this guarantees termination.
    Correctness is shown similar to Lemma 7. For “⇒”, we show that every trace together
with the labeling so far computed in Q can be embedded into every model of A and T .
For “⇐”, we present a model of T witnessing T 6|= A v B.
    We finish the proof of Theorem 9 by noting that the termination argument indeed
yields a polynomial bound on the length of the traces encountered by Alg. 1.

                       (d0 ,w0 )                    A                   B        A,A1
                                                r                            r
                       E
       (d1 ,w1 )       (d0 ,w1 )          B         A1                  B        A1
                   r                            r                            r
              E
       (d1 ,w2 )                         B1                         B1 ,B        A1
                                                r                            r

                       Fig. 4. An example trace and the induced structure
                                                                                           11

7   Local Roles and Rigid Concepts
One can easily extend the above algorithms so as to deal with local roles. In fact, e.g.,
in Section 5 only B4 below needs to be added to the BACKWARD-rules in Figure 3.
Note that F2 is only applied to rigid roles and C2 is therefore not applied to local ones.
Clearly, the algorithm in Section 6 can be extended with a similar rule.
 B4 If A ∈ Q(B, w), A ≡ ∃r.A0 , B 0 ∈ Q(A0 , A0 A0 ), B 00 ≡ ∃r.B 0 ∈ T , add B 00 to Q(B, w)
 RC If B ∈ Q(A, w), B ∈ CNrig , then add B to Q(A, w0 ), ∀w0 ∈ W
 R13 If B ∈ Q(d, w) or B ∈ QA2 (d, w) & B ∈ CNrig , then add B to Qcert (d)

A rigid concept has a constant interpretation over time. In the first example of Section
1, the concept Disorder should be rigid because we regard medical knowledge as static.
PatientWithDisorder should be local because a disease history has begin and end.
     In the presence of general TBoxes, rigid concepts can be simulated by rigid roles:
replace each rigid concept name A with ∃rA .>, where rA is a fresh rigid role. Alas, this
simulation does not work in the context of acyclic TBoxes: the result of replacing A with
∃rA .> in a CD A ≡ D is no longer a CD. Still, our algorithms can be extended, without
increasing the complexity, to consider rigid concepts: e.g., the algorithm in Section 5
can be extended by adding RC above to the F ORWARD and BACKWARD rules – CNrig
denotes the set of rigid concepts occurring in the input TBox. Note that the intermediate
phase remains the same, i.e., rules C1 and C2 are neither extended nor modified.
     Rigid concepts can analogously be included in Section 6 by adding a new rule R13
above (recall: intuitively, Qcert (d) contains the concepts that hold for d in any world).
     In the empty TBox case rigid roles can again simulate rigid concepts as above.

8   Conclusions and Future Work
We have initiated the investigation of TDLs based on EL allowing for rigid roles and
restricted TBoxes. We indeed achieved our main goal: we identified fragments of the
combination of CTL and EL that have elementary, some even polynomial, complexity.
    One important conclusion is that the use of acyclic TBoxes, instead of general
ones, allows to design TDLs based on EL with dramatically better complexity than
the ALC variant; e.g., for the fragment allowing only E the complexity drops from
nonelementary to PT IME. As an important byproduct, the studied fragments of CTLEL
can be seen as positive fragments of product modal logics with elementary complexity,
e.g., implication for the positive fragment of K×K is in PT IME.
    Next, we plan to look at more expressive fragments of CTLEL or at classical (cyclic)
TBoxes, e.g., consider non-convex fragments, such as CTLE      ◦,E3 , with (a)cyclic TBoxes.
                                                             EL
We plan to incorporate temporal roles, too. It is also worth exploring how restricting
TBoxes can help tame other TDLs with bad computational behavior over general TBoxes,
such as TDLs based on LTL or the µ-calculus. We believe that the LTL case is technically
easier than ours since it does not have the extra ‘ 12 -dimension’ introduced by branching.
Acknowledgements The first author was supported by the M8 PostDoc Initiative project
TS-OBDA and the second one by the DFG project LU1417/1-1. We thank the anonymous
reviewers for their detailed and constructive suggestions.
12

References
 1. Artale, A., Kontchakov, R., Lutz, C., Wolter, F., Zakharyaschev, M.: Temporalising tractable
    description logics. In: Proc. TIME (2007)
 2. Artale, A., Kontchakov, R., Ryzhikov, V., Zakharyaschev, M.: A cookbook for temporal
    conceptual data modelling with description logics. ACM Trans. Comput. Log. 15(3), 25
    (2014)
 3. Artale, A., Lutz, C., Toman, D.: A description logic of change. In: Proc. IJCAI (2007)
 4. Baader, F.: Terminological cycles in a description logic with existential restrictions. In: Proc.
    IJCAI (2003)
 5. Baader, F., Brandt, S., Lutz, C.: Pushing the EL envelope. In: Proc. IJCAI (2005)
 6. Baader, F., Calvanese, D., McGuinness, D., Nardi, D., Patel-Schneider, P.F. (eds.): The De-
    scription Logic Handbook: Theory, Implementation, and Applications. Cambridge University
    Press (2003)
 7. Baader, F., Ghilardi, S., Lutz, C.: LTL over description logic axioms. In: Proc. KR (2008)
 8. Baader, F., Küsters, R., Molitor, R.: Computing least common subsumers in description logics
    with existential restrictions. In: Proc. IJCAI (1999)
 9. Bodenreider, O., Zhang, S.: Comparing the representation of anatomy in the FMA and
    S NOMED CT. In: Proc. AMIA (2006)
10. Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press (1999)
11. Gabbay, D., Kurucz, A., Wolter, F., Zakharyaschev, M.: Many-dimensional modal logics:
    theory and applications, Studies in Logic, vol. 148. Elsevier (2003)
12. Göller, S., Jung, J.C., Lohrey, M.: The complexity of decomposing modal and first-order
    theories. ACM Trans. Comput. Log. 16(1), 9:1–9:43 (2015)
13. Gutiérrez-Basulto, V., Jung, J.C., Lutz, C.: Complexity of branching temporal description
    logics. In: Proc. ECAI (2012)
14. Gutiérrez-Basulto, V., Jung, J.C., Lutz, C., Schröder, L.: A closer look at the probabilistic
    description logic Prob-EL. In: Proc. AAAI (2011)
15. Gutiérrez-Basulto, V., Jung, J.C., Schneider, T.: Lightweight description logics and branching
    time: a troublesome marriage. In: Proc. KR (2014)
16. Haase, C., Lutz, C.: Complexity of subsumption in the EL family of description logics:
    Acyclic and cyclic TBoxes. In: Proc. ECAI (2008)
17. Lutz, C., Wolter, F., Zakharyaschev, M.: Temporal description logics: A survey. In: Proc.
    TIME (2008)
18. Nebel, B.: Terminological reasoning is inherently intractable. Artif. Intell. 43(2), 235–249
    (1990)
19. Schild, K.: Combining terminological logics with tense logic. In: Proc. EPIA (1993)
20. The Gene Ontology Consortium: Gene ontology: Tool for the unification of biology. Nature
    Genetics 25, 25–29 (2000)