<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Integrating Ontology Debugging and Matching into the eXtreme Design Methodology</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Zlatan Dragisic</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Patrick Lambrix</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eva Blomqvist</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>(1) Department of Computer and Information Science, (2) Swedish e-Science Research Centre Linkoping University</institution>
          ,
          <addr-line>581 83 Linkoping</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Ontology design patterns (ODPs) and related ontology development methodologies were designed as ways of sharing and reusing best practices in ontology engineering. However, while the use of these reduces the number of issues in the resulting ontologies defects can still be introduced into the ontology due to improper use or misinterpretation of the patterns. Thus, the quality of the developed ontologies is still a major concern. In this paper we address this issue by describing how ontology debugging and matching can be integrated in a state-of-the-art ontology development methodology based on ontology design patterns - the eXtreme Design methodology, and show the advantages in a case study based on a real world ontology.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Ontology engineering deals with the ontology development process, the ontology
life cycle, and the methodologies, tools and languages for building ontologies.
While most of the ontology engineering methodologies de ne a step that concerns
quality assurance of the developed ontologies, the description of how to do this
is usually in the form of high-level tasks that need to be executed, or checklists
that have to be manually ticked o . The tasks usually lack speci c details on
how to execute them, and require considerable user intervention, i.e., there is
usually only limited tools support.</p>
      <p>
        Ontology Design Patterns (ODPs) have emerged as a way to share and reuse
best practices in ontology engineering, hence, ODPs could be viewed as one way
of reducing quality issues in ontologies already at the design stage. However,
previous studies, e.g. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], have shown that although the use of ODPs (and related
methodologies, such as eXtreme Design(XD)) signi cantly reduces the number
of issues in the resulting ontologies, alone they cannot solve all the problems.
ODPs can be misinterpreted, applied in an inappropriate way, or integrated into
the overall ontology in an inappropriate manner, or the ontology engineer may
simply make mistakes in modelling the parts not covered by an ODP.
      </p>
      <p>During the recent years the detection and repair of defects in ontologies has
been an active research area and a number of methods and tools were developed
for dealing with di erent types of defects. We argue that these methods and
tools should be a part of ontology engineering methodologies, thus aiding the
ontology quality assurance process, which in turn may result in major e ciency
and e ectiveness gains. Therefore the aim of this paper is to show how such
methods can improve upon the results of a pattern-based methodology, such as
XD, although the results are also transferable to other methodologies.</p>
      <p>The paper is organized as follows: Section 2 gives an overview of
state-of-theart in ontology engineering and ontology debugging and matching. In Section 3
we describe the XD methodology while Section 4 discusses how ontology
debugging and matching can be integrated into the methodology. In Section 5 we show
the advantages of this approach in a case study based on a real world example.
Finally, Section 6 gives concluding remarks and some ideas for future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related work</title>
      <p>
        Ontology engineering methodologies have been developed based on experiences
in di erent areas, and adopt di erent strategies for addressing the ontology
engineering process [
        <xref ref-type="bibr" rid="ref29 ref3">3, 29</xref>
        ]. Some of the more recent methodologies have focused
particularly on iterative and collaborative development, e.g., DILIGENT [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], or
unifying several di erent potential development strategies, such as the NeOn
ontology engineering framework [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. There are also methodologies that speci cally
target modular ontology development (e.g. [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], and XD [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]).
      </p>
      <p>
        Semantically-enabled applications need high quality ontologies and one of the
basic requirements for high quality is the lack of defects. During the recent years,
in the ontology debugging and matching areas, the detection and repairing of
defects has received a lot of attention. Systems and approaches such as the ones
in [
        <xref ref-type="bibr" rid="ref14 ref24 ref4">4, 14, 24</xref>
        ] allow for detecting defects using di erent kinds of patterns. Defects
in ontologies can be divided into syntactic, semantic and modeling defects [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
Syntactic defects represent syntactic errors such as incorrect format or missing
tags, semantic defects represent problems withing the logic in the ontology while
modelling defects are defects which are a result of modelling erros, such as wrong
and missing relations. There is a lot of work on resolving semantic defects, where
the focus has been on coherence and consistency of ontologies (e.g., [13, 26{
28]) and ontology networks (e.g., [
        <xref ref-type="bibr" rid="ref10 ref12 ref21 ref31 ref8">8, 10, 12, 21, 31</xref>
        ]). Recent work on repairing
modelling defects has addressed the completion of the is-a structure of [15{17,
32] and the mappings between ontologies (e.g. overviews in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]).
      </p>
      <p>
        However, the areas mentioned above, i.e., ontology engineering methodologies
and ontology debugging and matching, have so far not been very well integrated,
although debugging could be viewed as an obvious activity in more or less any of
the above mentioned methodologies. For instance, the study in [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] found that
almost all the larger projects used a methodology, but that there was a lack of
tools support for many of the steps in the methodologies. Further, despite the
fact that quality of the developed ontologies is a major concern, most projects
only did minor testing, and tools for aiding in the ontology quality assurance
were commonly lacking. Most of the earlier ontology engineering methodologies
only describe quality assurance and evaluation of the resulting ontology as an
important aspect, without going into details on how this should be done. When
testing and quality assurance is mentioned it is often restricted to formal
consistency and coherence checking, using a reasoner, or manually going through
checklists for di erent aspects of the ontologies. In more recent methodologies,
such as XD [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], testing and debugging is discussed in more detail, however, still
only a few guidelines have been given [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], with basic tool support, and the repair
process is left completely up to the ontology engineer.
      </p>
      <p>In summary, the main novelty and contribution of this paper compared to
related work is to showcase the integration of the ontology engineering and the
ontology debugging and matching elds by integrating debugging and matching
into a modern agile ontology engineering methodology. Although these may have
been implicitly used in many ontology engineering projects, to the best of our
knowledge this is the rst attempt to explicitly specify how to perform
ontology debugging and matching as an integrated part of an ontology engineering
methodology.
3</p>
      <p>The XD</p>
    </sec>
    <sec id="sec-3">
      <title>Methodology</title>
      <p>
        In order to speci cally support the use of ODPs in ontology engineering,
patternbased methodologies have emerged. One such methodology is eXtreme Design
(XD) [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. XD builds on the idea that ODPs, and in particular so-called
Content ODPs, represent generalised use cases, which can be matched against the
concrete use cases that represent the requirements of the ontology to be built.
Content ODPs (CPs) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] focus on concrete modelling issues and can be
represented as small ontologies to be reused by importing them in the ontology under
development. Once matching CPs have been found, they can be specialised and
tailored for the speci c case at hand. This CP specialisation process (including
also potential composition of several CPs, and extensions) results in a small part
of the ontology, i.e., what we here call an ontology module. A typical case of CP
specialisation would start by creating a new (empty) ontology, representing the
module to be built, import the reusable OWL building block that represents the
CP to be reused, then add subclasses and subproperties of the imported classes
and properties, which represent the speci c pattern realisation for this
particular use case. The module may also include additional classes, properties and
other axioms, i.e. extensions that go beyond the CP, since CP coverage is not
complete for all domains, but rather CPs only focus on the di cult modelling
issues. The result is a module, i.e., a small ontology, with a locally de ned part
and one or more imported CPs. Such modules are then integrated to form the
overall ontology, hence, XD inherently produces modular ontologies.
      </p>
      <p>
        The ontology engineering process suggested by the XD methodology as well
as the extensions proposed in this paper are depicted in Figure 1. The original
process consists of a project initiation phase, whereafter the ontology is built
incrementally, by adding one module at a time, each solving a small set of the
overall requirements. Veri cation and validation of the requirements through testing
is an important activity [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], but despite the fact that XD stresses testing and
evaluation as a core activity, this part of the methodology has not received much
attention previously. In [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] some support for formalising requirements into unit
tests, i.e., SPARQL queries, was discussed. Although such testing is important,
it only determines that it is actually possible to write a query corresponding to
the requirements, i.e., it does not, for instance, test whether this requires
extensive knowledge of the implicit assumptions behind the model, or if all relations
and axioms related to the requirements are actually made explicit in the model.
In this paper the focus is on precisely these aspects, i.e. to further debug the
ontology module, and the overall ontology, to nd missing elements, elements
that are not made explicit in the model, and also further support for analysing
the axiomatic structure of the ontology.
      </p>
      <p>The motivation behind focusing on the XD methodology for our study
reported in this paper is that it has an obvious point of integration, since it already
clearly speci es testing and evaluation activities.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Integrating Ontology Debugging and Matching into XD</title>
      <p>
        Ontology debugging and matching techniques can be used to facilitate the
process of constructing and integrating modules using the XD methodology. We
integrate the debugging process in the \Test and revise" and the \Evaluate and
revise" steps and the matching process in the \Integrate" step (Figure 1).
Modifying the \Test and revise" activity. The rst step after developing
a module and applying any unit tests, i.e., SPARQL queries over example data
(c.f. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]), is to deal with syntactic defects. These are the simplest type of
defects and are easy to detect and resolve. They can usually be avoided by using
ontology modelling tools. However, manual interventions can introduce syntactic
errors into the modules. Repairing can be done using validators or spell checkers.
      </p>
      <p>
        As identi ed in [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] the next step is to consider semantic defects. In this
case, the aim is to acquire a consistent and a coherent module. These kinds of
defects can be detected using reasoners. One possible reason for inconsistency
is the instantiation of an unsatis able class. In the case of incoherence, we need
to deal with unsatis able classes which requires removal or rede ning of some
of the axioms in the module. There exist a number of tools for dealing with
semantic defects, such as RaDON [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], Swoop [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and MUPSter [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ].
      </p>
      <p>
        The third phase deals with modelling defects. These kinds of defects
require domain knowledge to detect and resolve. Two examples of modelling
defects are wrong and missing relations. Wrong relations are relations which are
not correct according to the domain. One way of detecting these relations is by
detecting semantic defects. Other ways include using external knowledge sources
or through manual inspection. In order to deal with wrong relations, we need
to remove parts of the justi cations of the relation so that it is no longer
possible to derive the relation. Missing relations represent knowledge that is correct
according to the domain but is not derivable in the module. Repairing missing
relations requires adding or modifying axioms so that the detected relation
becomes derivable in the module. The simplest approach is just to add the detected
relation to the module, however, in [15{17, 32] it was shown that the repairing
process for completing ontologies can add new knowledge which was not detected
before. One of the tools for dealing with modelling defects is RepOSE (e.g. [
        <xref ref-type="bibr" rid="ref15 ref19 ref8">8,
15, 19</xref>
        ]).
      </p>
      <p>
        Another tool for detecting semantic and modelling defects is OOPS! [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]
which contains a catalogue of patterns which correspond to common pitfalls in
ontology development. The tool is semi-automatic and for each detected pitfall
the tool gives an explanation and a suggestion how to resolve it.
      </p>
      <p>After dealing with modelling defects it is necessary to run the unit tests once
more, and then check again for syntactic, semantic and modelling defects. This
iterative approach is necessary as relations added in the repairing process could
have introduced new defects. Therefore, the debugging process in \Test and
revise" is iterative and should be repeated until no new defects are identi ed.
Modifying the \Integrate" activity. After developing and releasing modules,
the next step in XD is to integrate the newly developed partial solution into the
overall ontology. This step can be supported by ontology matching techniques
(debugging through completing). Since the overall ontology is inherently
modular, we should consider which modules to actually integrate, in order to achieve
an appropriate level of coupling. Hence, we run ontology matching systems on
pairs of modules. This can either be done on all or on selected pairs, depending
on the desired coupling. After collecting the result from the ontology matching
system(s), the suggestions need to be validated to see if they are correct
according to the domain and if they match the intended semantics of the integrated
ontology. After validating the output from the ontology matching process the
ontology integration team should consider which of these potential integration
points to include in the integrated ontology. There is a trade-o between keeping
a loose coupling of modules, but still supporting the requirements of the overall
ontology, e.g., reasoning requirements, and supporting certain queries. Hence,
not all of the found mappings, although found to be correct, may be chosen for
inclusion in the overall integrated ontology. The integration team can also extend
the set with additional relations which were identi ed by other means. The next
step in the integration process is to create an integrated ontology containing all
the modules, as well as the set of validated integrating relations.
Modifying the \Evaluate and revise" activity. The debugging process
that follows integration is very similar to the one for individual modules. First,
the integrated ontology needs to be tested for syntactic defects which in this
phase can be a result of the ontology matching process. Then, the integrated
ontology needs to be tested for consistency and coherence, given that some new
semantic defects could have been introduced by integrating di erent modules.
If inconsistencies are detected we either need to deal with unsatis able classes
or class/property instantiations. In the case of unsatis able classes, axioms in
certain modules should be modi ed or removed.</p>
      <p>Finally, we need to deal with modelling defects as the integrated ontology
might pinpoint some additional modelling defects, e.g. missing relations which
could not be detected when considering modules on their own. We note that
by repairing modelling defects only in the integrated ontology it could happen
that defects are left in individual modules, which limits their re-usability. For
example, let us consider Case 1 in Figure 2(a). In this case, we have two modules,
O1 and O2, containing concepts A1, B1 and A2, B2, respectively. The integration
of these modules is done through relations B2 v B1 and A1 v A2. The module
O1 lacks the missing relation A1 v B1. Now, if we were to repair the integrated
ontology rst, the missing is-a relation could be made derivable if we add relation
A2 v B2. However, this would also mean that the missing is-a relation is not
made derivable in the O1 module and therefore is still missing in the module
itself. If we repair the module rst, then relation A2 v B2 could be identi ed in
the integration phase as another way of deriving A1 v B1.</p>
      <p>In addition, repairing defects in individual modules can also contribute to
the integration process, hence, the two activities (i.e., \integrate" and \evaluate
and revise") are inherently coupled and may be run partly in parallel. For
example, let us consider Case 2 in Figure 2(b). In this case A1 v B1 is present in
module O1 but is wrong according to the domain and should be removed. This
knowledge could be used in the integration phase which in this case means that
B2 v B1 and A1 v A2 should not both be added in the module integration, or
this could also imply that A2 v B2 is wrong. This is especially valuable in cases
where the module development and the module integration are done by di erent
teams. By documenting these kinds of cases, the module developers would help
the integration team and lower the necessity for their involvement in the
integration. Moreover, debugging individual modules might lower the e ort needed
for debugging the integrated ontology as the modules are smaller and therefore
defects related to the modules are easier to detect and resolve.</p>
      <p>As in the module development phase, the debugging process should be rerun
iteratively, as some of the repairs might have introduced new defects.</p>
      <p>B2
A2</p>
      <p>B1
w</p>
      <p>A1
(a) Case 1.</p>
      <p>(b) Case 2.</p>
      <p>B2
A2
The XD methodology has been used in several real-world ontology engineering
e orts, as well as research projects. For experimenting with our proposed
approach we reused a set of ontology modules and their integration, which were
produced by applying the XD methodology in a previous research project.</p>
      <p>
        The ontologies were created in the context of the IKS project1, for supporting
one of the project use cases, which was a showcase of an intelligent bathroom
environment [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The ontologies were intended to support seamless information
integration and access to diverse information sources, for providing the bathroom
environment with personalised and contextualised information served to the end
user through various devices, such as screens integrated in mirrors and shower
walls, audio interfaces etc. The speci c showcase scenario involved a person
entering the bathroom in the morning, receiving site-speci c weather information,
and event suggestions based on his calendar and personal preferences. The use
case contains 51 modules as well as the resulting integrated ontology.2
Debugging individual modules. In the rst phase of the debugging process
we consider individual modules. The rst step in debugging individual modules
is to consider syntactic defects. We have identi ed in total 4 such defects in
3 modules (DeviceContentCapabilities, mpeg7, and SPDO). The detection was
done by loading the ontologies using OWL API. If the API failed to load an
ontology, defects were returned in the exception description. In our case, these
defects were incorrect datatype de nitions, i.e. the de ned datatypes were not a
part of OWL 2 built-in datatypes nor were they custom de ned. The next step in
the debugging process is to deal with semantic defects in modules. To identify
such defects, we used the Hermit reasoner3 to detect incoherent and
inconsistent modules. In the use case, 9 modules where incoherent, while one module
was inconsistent. Four out of 9 incoherent module classes contained the same
1 EU FP-7 integrating project, targeting the integration of semantic technologies into
content management systems. http://www.iks-project.eu/
2 The original modules developed within the project use case are available from
the following repository: http://www.ontologydesignpatterns.org/iks/ami/2011/02/
while the debugged modules and integrated ontology can be found at
http://www.ida.liu.se/ zladr41/AMI.zip.
3 http://hermit-reasoner.com/
error, corresponding to the following case: A 8r:B, A v C, Domain r is C,
B u C v ?. From the rst three axioms, it follows that C is equivalent to the top
class. Given this and the fourth axiom, B is unsatis able. These four situations
were repaired by replacing the corresponding equivalence axioms with
subsumption axioms. Repairing the unsatis able classes in these 4 modules also repaired
additional 2 modules which imported the incoherent modules. Finally, the
remaining 3 incoherent modules were repaired by removing a single subsumption
in one of the modules. The inconsistent module (Users) was caused by three
data property assertions, which speci ed literals with a datatype outside of the
range of the data property. This was repaired by specifying a correct datatype.
Further, we used OOPS! on the modules. The tool did not detect any pitfalls
which could lead to inconsistencies.
      </p>
      <p>
        The next step is to consider modelling defects. In this study, we only
considered one type of modelling defects, i.e., missing is-a relations between named
classes. In [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] it was shown that RepOSE can be used both for the detection
and repairing of missing is-a structure. RepOSE accepts as input a set of existing
or missing is-a relations and suggests (new) ways of deriving these is-a relations
and thus possible new knowledge to add to an ontology. A domain expert needs
to validate the suggestions. In this study, we have run RepOSE on every
individual module where all is-a relations between named classes in a module were
used as an input set. This identi ed additional ways of deriving existing is-a
relations in 5 modules. In total, 8 new is-a relations were added. For example,
in the mpeg7 module, we have added 3 new relations. Adding TemporalLocator
v Locator and RegionLocator v Locator would make it possible to derive
existing is-a relations TemporalLocator v Resource and RegionLocator v Resource,
respectively, given that the module already contains the is-a relation Locator v
Resource. These relations were not derivable and represent new knowledge.
Further, OOPS! detected issues related to missing annotations, missing domain and
range for properties as well as recursive de nitions. Missing domain and range
issues were related to properties in design patterns and therefore were not added
to avoid overcommitment. Further inspection of recursive de nitions has shown
that these de nitions are necessary. For example, property overlappingTopic is
recursive as concept Topic is both domain and range. However, this is correct
according to the domain. Another iteration of the debugging process did not
detect additional defects.
      </p>
      <p>In summary, our added debugging steps were able to detect and in some cases
suggest repair actions for several defects in investigated modules. This shows
two important things; (i) since ontologies, and even small ontology modules,
are complex artefacts they usually contain defects, even if they were carefully
designed by expert ontology engineers, and using ODPs, hence, performing this
kind of debugging is essential for producing high-quality ontologies, and (ii) the
suggested debugging methods are able to detect a wide variety of defects, ranging
from incorrect datatypes to missing is-a relations, hence, by using the spectrum
of existing methods we most likely cover a large part of the potential defect
types.</p>
      <p>
        Integration. After debugging all modules we proceeded to integrate the
modules. The integration is done by running ontology matching on each pair of
modules. The mappings from each of the ontology pairs are then collected and
presented to the user for validation. In our experiment we have used 3 di erent
ontology matching systems, i.e., AML [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], LogMap [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and SAMBO [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>For evaluating the detection of mappings, we used the actual integrated
ontology from the project to compare against. Out of the validated relations, 12 of
them (7 equivalence and 5 is-a relations) were already present in the integrated
ontology, while 14 (6 equivalence and 8 is-a relations) represent new knowledge
not present in the integrated ontology we compared against. This does not
necessarily mean that all 14 should be included, some may have been intentionally
left out, however, at least it shows that this approach has the potential of
pointing the user towards additional options that should be considered, in order not
to overlook important mappings.</p>
      <p>Debugging the integrated ontology. We proceeded with debugging
syntactic and semantic defects in the integrated ontology. One additional semantic
defect was detected concerning MusicCollection in the MusicCollection
module. This defect corresponded to the described case of unsatis able classes when
debugging individual modules, and was repaired by replacing the equivalence
axiom with a subsumption axiom. Further, OOPS! did not detect any additional
pitfalls which could lead to an inconsistent ontology.</p>
      <p>Next, we proceeded with modelling defects. The detected integrating
relations were used as input to the process of completing the is-a structure with
RepOSE. In addition, the input also included other is-a relations between named
classes from the integrated ontology. In the general case where the ontology
debugging is integrated into the development process it may not be necessary to
consider all is-a relations but only the relations which were identi ed by
ontology matching systems and by the ontology developers in the integration step.
The input to RepOSE consisted of the integrated ontology and a set of 214 is-a
relations (194 from the ontology and 20 acquired from ontology matching). In
the completion process, we identi ed additional ways of deriving is-a relations
in 8 modules. In total 10 new is-a relations were added. For example, using
RepOSE we identi ed another way of deriving Movie v ContentItem where classes
Movie and ContentItem are from the EntertainmentContent and Content
modules respectively. In this case adding Movie v MultimediaContent where
MultimediaContent is in the mpeg7 module would provide another way of deriving the
relation. This is possible due to the fact that MultimediaContent v ContentItem
exists in the mpeg7 module. By adding Movie v MultimediaContent we have
also integrated the mpeg7 and EntertainmentContent modules which were not
related before. OOPS! did not detect any new issues. Another iteration of the
debugging process did not detect additional defects.</p>
      <p>In summary, this shows that testing and evaluating only the individual
modules of a modular ontology is not enough, hence, we need to additionally
implement a similar debugging step before the release of the integrated ontology.
However, it should also be noted that some defects detected after integration,
may actually depend on modelling choices made already in the module
development, hence, iteratively revising the modules is inevitable.</p>
      <p>Impact of debugging We have evaluated the impact of our changes on three
levels: class level, instance level and query level.</p>
      <p>On the class level, we identi ed concepts which were a ected by the changes
in the ontology. We looked at named classes whose subclasses or superclasses
changed. For each is-a relation A v B that was added or removed during
debugging, the subclasses of A and the superclasses of B are a ected. For equivalence
relations added during the debugging process, the super- and subclasses of both
A and B are a ected. In our case, due to addition of is-a relations, out of 197
named concepts in the integrated ontology 56 got new subclasses and/or new
superclasses. Further, we have removed in total 3 is-a relations which account to
additional 16 a ected classes. We note that for the impact we have only
considered the is-a hierarchy. Therefore, the impact of our repairs can be even greater
given that we deal with expressive ontologies. For example, adding a
subsumption or equivalence axiom might change the range/domain of some property.</p>
      <p>On the instance level, we were interested in identifying the a ected instances,
i.e., those instances that obtained new or changed class memberships. We checked
the instances of subclasses of each named class involved in the is-a or equivalence
relation added or removed during the debugging process. In our case study, the
integrated ontology contains 88 instances. Out of these 88, 57 instances were
a ected by our changes. Out of the 57 a ected instances, 29 are a ected by
removing relations when dealing with semantic defects.</p>
      <p>Finally, on the query level, we have used logs from the system developed
during the project, which used these ontologies. The log les contain SPARQL
queries that were used by the system to extract instances from the ontology
during the test runs of the system in the bathroom environment. In order to
evaluate the impact of our changes to the integrated ontology, we consider the
number of a ected queries, i.e., those queries which query for instances of a ected
classes. These a ected queries might produce di erent results4 if run over the new
version of the integrated ontology, i.e., the version produced after our debugging
was applied. In 1200 log les there were in total 10724 requests for data access
to the integrated ontology. Out of these, 5402 are a ected by our changes, i.e.
they query for instances of a ected classes.
6</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion and Future work</title>
      <p>In this paper we have discussed how existing approaches for debugging and
matching ontologies can be used to improve the results of a pattern-based
methodology. The proposed approach, speci cally for integrating debugging into the XD
ontology development methodology was tested in a use case study with a real
world ontology. The case study has shown the usefulness of our approach, and
4 Unfortunately, as the project ended a few years ago, we were not able to evaluate
the correctness of these di erences with respect to the actual results provided to the
users of the system, since neither the system nor the test users are available.
pointed out a number of important bene ts of performing debugging.
Additionally, we have seen that there can be quite a number of defects still remaining in
ontologies, even after applying both ODPs and a proper methodology when
creating them, performing appropriate unit tests, such as testing SPARQL queries,
and even after using the ontologies in test runs of the system itself.</p>
      <p>There are a number of directions for future work. Rather than having to use
stand-alone tools as was done in our case study, one future direction would be
the integration of those tools into ontology development environments (e.g. as
plug-ins). In our use case analysis we only considered relations between concepts.
In the future, we will consider other existing approaches for ontology debugging
and how these can be integrated into the methodology, e.g. for debugging other
properties. It is also important to perform an evaluation of the added value of
the changes in terms of added value for users, such as the additional retrieved
(correct and relevant) data in response to a query.</p>
      <p>Acknowledgements. We thank the Swedish e-Science Research Centre (SeRC), the
Swedish National Graduate School in Computer Science (CUGS) and the EU FP7
project VALCRI (FP7-IP-608142) for nancial support.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>E</given-names>
            <surname>Blomqvist</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V</given-names>
            <surname>Presutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E</given-names>
            <surname>Daga</surname>
          </string-name>
          , and
          <string-name>
            <given-names>A</given-names>
            <surname>Gangemi</surname>
          </string-name>
          .
          <article-title>Experimenting with eXtreme Design</article-title>
          .
          <source>In Proc. of the 17th EKAW</source>
          , pages
          <volume>120</volume>
          {
          <fpage>134</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>E</given-names>
            <surname>Blomqvist</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Seil</given-names>
            <surname>Sepour</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V</given-names>
            <surname>Presutti</surname>
          </string-name>
          .
          <article-title>Ontology testing - methodology and tool</article-title>
          .
          <source>In Proc. of the 18th EKAW</source>
          , pages
          <volume>216</volume>
          {
          <fpage>226</fpage>
          .
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>O</given-names>
            <surname>Corcho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M</given-names>
            <surname>Fernandez-Lopez</surname>
          </string-name>
          ,
          <article-title>and A Gomez-Perez. Methodologies, tools and languages for building ontologies</article-title>
          .
          <source>Where is their meeting point? Data &amp; Knowledge Engineering</source>
          ,
          <volume>46</volume>
          :
          <fpage>41</fpage>
          {
          <fpage>64</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>O</given-names>
            <surname>Corcho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C</given-names>
            <surname>Roussey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L M</given-names>
            <surname>Vilches</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and I</given-names>
            <surname>Perez</surname>
          </string-name>
          .
          <article-title>Pattern-based OWL ontology debugging guidelines</article-title>
          .
          <source>In Proc. of the 1st WOP</source>
          , pages
          <volume>68</volume>
          {
          <fpage>82</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>J</given-names>
            <surname>Euzenat</surname>
          </string-name>
          and
          <string-name>
            <given-names>P</given-names>
            <surname>Shvaiko</surname>
          </string-name>
          .
          <source>Ontology Matching</source>
          . Springer,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>D</given-names>
            <surname>Faria</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C</given-names>
            <surname>Pesquita</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E</given-names>
            <surname>Santos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M</given-names>
            <surname>Palmonari</surname>
          </string-name>
          ,
          <string-name>
            <surname>I F Cruz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F M</given-names>
            <surname>Couto.</surname>
          </string-name>
          <article-title>The AgreementMakerLight ontology matching system</article-title>
          .
          <source>In On the Move to Meaningful Internet Systems: OTM 2013 Confs</source>
          , pages
          <volume>527</volume>
          {
          <fpage>541</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>A</given-names>
            <surname>Gangemi</surname>
          </string-name>
          and
          <string-name>
            <given-names>V</given-names>
            <surname>Presutti</surname>
          </string-name>
          .
          <article-title>Ontology Design Patterns</article-title>
          .
          <source>In Handbook on Ontologies</source>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>V</given-names>
            <surname>Ivanova</surname>
          </string-name>
          and
          <string-name>
            <given-names>P</given-names>
            <surname>Lambrix</surname>
          </string-name>
          .
          <article-title>A uni ed approach for aligning taxonomies and debugging taxonomies and their alignments</article-title>
          .
          <source>In Proc. of the 10th ESWC</source>
          , pages
          <volume>1</volume>
          {
          <fpage>15</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>S</given-names>
            <surname>Janzen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E</given-names>
            <surname>Blomqvist</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A</given-names>
            <surname>Filler</surname>
          </string-name>
          , S Gonul,
          <string-name>
            <given-names>T</given-names>
            <surname>Kowatsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A</given-names>
            <surname>Adamou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S</given-names>
            <surname>Germesin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M</given-names>
            <surname>Romanelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V</given-names>
            <surname>Presutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C</given-names>
            <surname>Cimen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W</given-names>
            <surname>Maass</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S</given-names>
            <surname>Postaci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E</given-names>
            <surname>Alpay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T</given-names>
            <surname>Namli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G B L</given-names>
            <surname>Erturkmen</surname>
          </string-name>
          .
          <source>IKS deliverable - d4.1 report: Ami case - design and implementation (public)</source>
          .
          <source>Technical report</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>Q</given-names>
            <surname>Ji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P</given-names>
            <surname>Haase</surname>
          </string-name>
          , G Qi,
          <string-name>
            <given-names>P</given-names>
            <surname>Hitzler</surname>
          </string-name>
          , and
          <string-name>
            <surname>S Stadtmuller.</surname>
          </string-name>
          <article-title>RaDON - repair and diagnosis in ontology networks</article-title>
          .
          <source>In Proc. of the 6th ESWC</source>
          , pages
          <volume>863</volume>
          {
          <fpage>867</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>E</given-names>
            <surname>Jimenez-Ruiz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B Cuenca</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and I</given-names>
            <surname>Horrocks</surname>
          </string-name>
          .
          <article-title>Large-scale interactive ontology matching: Algorithms and implementation</article-title>
          .
          <source>In Proc. of the 20th ECAI</source>
          , pages
          <volume>444</volume>
          {
          <fpage>449</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>E</given-names>
            <surname>Jimenez-Ruiz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B Cuenca</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <string-name>
            <surname>I Horrocks,</surname>
          </string-name>
          and
          <string-name>
            <given-names>R</given-names>
            <surname>Berlanga</surname>
          </string-name>
          .
          <article-title>Ontology integration using mappings: Towards getting the right logical consequences</article-title>
          .
          <source>In Proc. of the 6th ESWC</source>
          , pages
          <volume>173</volume>
          {
          <fpage>187</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>A</given-names>
            <surname>Kalyanpur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B</given-names>
            <surname>Parsia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E</given-names>
            <surname>Sirin</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J</given-names>
            <surname>Hendler</surname>
          </string-name>
          .
          <article-title>Debugging unsatis able classes in OWL ontologies</article-title>
          .
          <source>Journal of Web Semantics</source>
          ,
          <volume>3</volume>
          (
          <issue>4</issue>
          ):
          <volume>268</volume>
          {
          <fpage>293</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>M</given-names>
            <surname>Keet</surname>
          </string-name>
          .
          <article-title>Detecting and revising aws in OWL object property expressions</article-title>
          .
          <source>In Proc. of the 18th EKAW</source>
          , pages
          <volume>252</volume>
          {
          <fpage>266</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>P</given-names>
            <surname>Lambrix</surname>
          </string-name>
          and
          <string-name>
            <given-names>V</given-names>
            <surname>Ivanova</surname>
          </string-name>
          .
          <article-title>A uni ed approach for debugging is-a structure and mappings in networked taxonomies</article-title>
          .
          <source>Journal of Biomedical Semantics</source>
          ,
          <volume>4</volume>
          :
          <fpage>10</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>P</given-names>
            <surname>Lambrix</surname>
          </string-name>
          and
          <string-name>
            <given-names>Q</given-names>
            <surname>Liu</surname>
          </string-name>
          .
          <article-title>Debugging the missing is-a structure within taxonomies networked by partial reference alignments</article-title>
          .
          <source>Data &amp; Knowledge Engineering</source>
          ,
          <volume>86</volume>
          :
          <fpage>179</fpage>
          {
          <fpage>205</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>P</given-names>
            <surname>Lambrix</surname>
          </string-name>
          , Q Liu, and
          <string-name>
            <given-names>H</given-names>
            <surname>Tan</surname>
          </string-name>
          .
          <article-title>Repairing the Missing is-a Structure of Ontologies</article-title>
          .
          <source>In Proc. of the 4th ASWC</source>
          , pages
          <volume>76</volume>
          {
          <fpage>90</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>P</given-names>
            <surname>Lambrix and H Tan</surname>
          </string-name>
          .
          <article-title>SAMBO - a system for aligning and merging biomedical ontologies</article-title>
          .
          <source>Journal of Web Semantics</source>
          ,
          <volume>4</volume>
          (
          <issue>3</issue>
          ):
          <volume>196</volume>
          {
          <fpage>206</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>P</given-names>
            <surname>Lambrix</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F</given-names>
            <surname>Wei-Kleiner</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z</given-names>
            <surname>Dragisic</surname>
          </string-name>
          .
          <article-title>Completing the is-a structure in lightweight ontologies</article-title>
          .
          <source>Journal of biomedical semantics</source>
          ,
          <volume>6</volume>
          (
          <issue>1</issue>
          ):
          <fpage>12</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>P</given-names>
            <surname>Lambrix</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F</given-names>
            <surname>Wei-Kleiner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z</given-names>
            <surname>Dragisic</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V</given-names>
            <surname>Ivanova</surname>
          </string-name>
          .
          <article-title>Repairing missing is-a structure in ontologies is an abductive reasoning problem</article-title>
          .
          <source>In Proc. of the 2nd WoDOOM</source>
          , pages
          <volume>33</volume>
          {
          <fpage>44</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>C</given-names>
            <surname>Meilicke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H</given-names>
            <surname>Stuckenschmidt</surname>
          </string-name>
          , and
          <string-name>
            <given-names>A</given-names>
            <surname>Tamilin</surname>
          </string-name>
          .
          <article-title>Repairing ontology mappings</article-title>
          .
          <source>In Proc. of the 20th AAAI</source>
          , pages
          <volume>1408</volume>
          {
          <fpage>1413</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. T O
          <article-title>zacar, O Ozturk, and MO Unalir</article-title>
          . ANEMONE:
          <article-title>An environment for modular ontology development</article-title>
          .
          <source>Data &amp; Knowledge Engineering</source>
          ,
          <volume>70</volume>
          :
          <fpage>504</fpage>
          {
          <fpage>526</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23. H
          <string-name>
            <given-names>S</given-names>
            <surname>Pinto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C</given-names>
            <surname>Tempich</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S</given-names>
            <surname>Staab</surname>
          </string-name>
          .
          <article-title>Ontology engineering and evolution in a distributed world using diligent</article-title>
          .
          <source>In Handbook on Ontologies</source>
          , pages
          <volume>153</volume>
          {
          <fpage>176</fpage>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>M</given-names>
            <surname>Poveda-Villalon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A</given-names>
            <surname>Gomez-Perez</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M C</given-names>
            <surname>Suarez-Figueroa</surname>
          </string-name>
          .
          <article-title>Oops! (ontology pitfall scanner!): An on-line tool for ontology evaluation</article-title>
          .
          <source>International Journal on Semantic Web &amp; Information Systems</source>
          ,
          <volume>10</volume>
          (
          <issue>2</issue>
          ):7{
          <fpage>34</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>V</given-names>
            <surname>Presutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E</given-names>
            <surname>Bomqvist</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E</given-names>
            <surname>Daga</surname>
          </string-name>
          , and
          <string-name>
            <given-names>A</given-names>
            <surname>Gangemi</surname>
          </string-name>
          .
          <article-title>Pattern-based ontology design</article-title>
          .
          <source>In Ontology Engineering in a Networked World</source>
          , pages
          <volume>35</volume>
          {
          <fpage>64</fpage>
          .
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>G</given-names>
            <surname>Qi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q</given-names>
            <surname>Ji</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P</given-names>
            <surname>Haase</surname>
          </string-name>
          .
          <article-title>A Con ict-Based Operator for Mapping Revision</article-title>
          .
          <source>In Proc. of the 8th ISWC</source>
          , pages
          <volume>521</volume>
          {
          <fpage>536</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>S</given-names>
            <surname>Schlobach</surname>
          </string-name>
          and
          <string-name>
            <given-names>C</given-names>
            <surname>Ronald</surname>
          </string-name>
          .
          <article-title>Non-standard reasoning services for the debugging of description logic terminologies</article-title>
          .
          <source>In Proc. of the 18th IJCAI</source>
          , pages
          <volume>355</volume>
          {
          <fpage>360</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>K</given-names>
            <surname>Shchekotykhin</surname>
          </string-name>
          ,
          <string-name>
            <surname>G Friedrich</surname>
          </string-name>
          ,
          <article-title>Ph Fleiss</article-title>
          , and
          <string-name>
            <given-names>P</given-names>
            <surname>Rodler</surname>
          </string-name>
          .
          <article-title>Interactive ontology debugging: Two query strategies for e cient fault localization</article-title>
          .
          <source>Journal of Web Semantics</source>
          ,
          <fpage>12</fpage>
          -
          <lpage>13</lpage>
          :
          <fpage>88</fpage>
          {
          <fpage>103</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>E</given-names>
            <surname>Simperl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M</given-names>
            <surname>Mochol</surname>
          </string-name>
          , and T Bu
          <article-title>rger. Achieving maturity: the state of practice in ontology engineering in 2009</article-title>
          .
          <source>Int Journal of Computer Science and Applications</source>
          ,
          <volume>7</volume>
          :
          <fpage>45</fpage>
          {
          <fpage>65</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>M C Suarez-Figueroa</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          <string-name>
            <surname>Gomez-Perez</surname>
            ,
            <given-names>E</given-names>
          </string-name>
          <string-name>
            <surname>Motta</surname>
          </string-name>
          , and A Gangemi, editors.
          <source>Ontology Engineering in a Networked World</source>
          . Springer,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <given-names>P</given-names>
            <surname>Wang</surname>
          </string-name>
          and
          <string-name>
            <given-names>B</given-names>
            <surname>Xu</surname>
          </string-name>
          .
          <article-title>Debugging ontology mappings: a static approach</article-title>
          .
          <source>Computing and Informatics</source>
          ,
          <volume>27</volume>
          :
          <fpage>21</fpage>
          {
          <fpage>36</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <given-names>F</given-names>
            <surname>Wei-Kleiner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z</given-names>
            <surname>Dragisic</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P</given-names>
            <surname>Lambrix</surname>
          </string-name>
          .
          <article-title>Abduction framework for repairing incomplete EL ontologies: Complexity results and algorithms</article-title>
          .
          <source>In Proc. of the 28th AAAI</source>
          , pages
          <volume>1120</volume>
          {
          <fpage>1127</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>