<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Proceedings of the Twelfth International Conference on Concept Lattices and Their Applications</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>CLA Conference Series</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Palacký University</institution>
          ,
          <addr-line>Olomouc</addr-line>
          ,
          <country country="CZ">Czech Republic</country>
          <institution>Faculté des Sciences de Tunis, Tunisia Université de la Réunion, France IT University of Copenhagen, Denmark State University HSE</institution>
          ,
          <addr-line>Moscow, Russia LIMOS</addr-line>
          ,
          <institution>University Blaise Pascal, Clermont-Ferrand, France LORIA, Nancy, France Universidad de Málaga, Spain Palacký University</institution>
          ,
          <addr-line>Olomouc</addr-line>
          ,
          <country country="CZ">Czech Republic</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <fpage>241</fpage>
      <lpage>252</lpage>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Blaise Pascal University, LIMOS laboratory, Clermont-Ferrand, France
ISBN 978–2–9544948–0–7</p>
      <p>Blaise Pascal University, LIMOS laboratory, Clermont-Ferrand, France
The Twelfth International Conference on
Concept Lattices and Their Applications</p>
      <p>C L A 2015
Clermont-Ferrand, France</p>
      <p>October 13–16, 2015</p>
    </sec>
    <sec id="sec-2">
      <title>Edited by</title>
      <p>CLA 2015
c paper author(s), 2015, for the included papers
c Sadok Ben Yahia, Jan Konecny, Editors, for the volume
Copying permitted only for private and academic purposes.</p>
      <p>This work is subject to copyright. All rights reserved. Reproduction or
publication of this material, even partial, is allowed only with the editors’ permission.
Cover photo from blognature.fr</p>
    </sec>
    <sec id="sec-3">
      <title>Page count:</title>
      <p>Impression:
Edition:
First published: 2015
xiii+254
50
1st</p>
    </sec>
    <sec id="sec-4">
      <title>Published and printed by: Blaise Pascal University, LIMOS laboratory, Clermont-Ferrand, France</title>
      <sec id="sec-4-1">
        <title>Organization</title>
        <p>CLA 2015 was organized by the Blaise Pascal University, LIMOS laboratory,
Clermont-Ferrand.</p>
        <sec id="sec-4-1-1">
          <title>Steering Committee</title>
          <p>Radim Belohlavek
Sadok Ben Yahia
Jean Diatta
Peter Eklund
Sergei O. Kuznetsov
Engelbert Mephu Nguifo
Amedeo Napoli
Manuel Ojeda-Aciego
Jan Outrata</p>
        </sec>
        <sec id="sec-4-1-2">
          <title>Program Chairs</title>
          <p>Sadok Ben Yahia
Jan Konecny</p>
        </sec>
        <sec id="sec-4-1-3">
          <title>Program Committee</title>
          <p>Simon Andrews
Jaume Baixeries</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Faculté des Sciences de Tunis, Tunis, Tunisia Palacký University, Olomouc, Czech Republic Sheffield Hallam University, Sheffield, United Kingdom</title>
      <p>Cynthia Vera Glodeanu
Alain Gély
Tarek Hamrouni
Marianne Huchard
Dmitry Ignatov
Mehdi Kaytoue
Stanislav Krajči
Francesco Kriegel
Michal Krupka
Marzena Kryszkiewicz
Sergei O. Kuznetsov
Léonard Kwuida
Jesús Medina
Engelbert Mephu Nguifo
Rokia Missaoui
Amedeo Napoli
Lhouari Nourine
Sergei Obiedkov
Manuel Ojeda-Aciego
Petr Osička
Jan Outrata
Uta Priss
Francois Rioult
Sebastian Rudolph
Christian Sacarea
Barış Sertkaya
László Szathmáry
Petko Valtchev
Francisco Valverde
Technische Universität Dresden, Dresden, Germany
Université de Lorraine, Metz, France
ISAMM, Manouba University, Tunisia
LIRMM – Université Montpellier 2, Montpellier,
France
State University HSE, Moscow, Russia
Liris – Insa, Lyon, France
Univerzita Pavla Jozefa Šafárika v Košiciach, Košice,
Slovakia
Technische Universität Dresden, Dresden, Germany
Palacký University, Olomouc, Czech Republic
Warsaw University of Technology, Warsaw, Poland
State University HSE, Moscow, Russia
Bern University of Applied Sciences, Bern,
Switzerland
Universidad de Cádiz, Cádiz, Spain
LIMOS, Clermont-Ferrand, France
LARIM – Université du Québec en Outaouais,
Gatineau, Canada
LORIA, Nancy, France
LIMOS, Clermont-Ferrand, France
State University HSE, Moscow, Russia
Universidad de Málaga, Málaga, Spain
Palacký University, Olomouc, Czech Republic
Palacký University, Olomouc, Czech Republic
Ostfalia University of Applied Sciences,
Wolfenbüttel, Germany
GREYC – Université de Caen Basse-Normandie,
Caen, France
Technische Universität Dresden, Dresden, Germany
Babes,-Bolyai University, Cluj-Napoca, Romania
SAP Research Center, Dresden, Germany
University of Debrecen, Debrecen, Hungary
Université du Québec, Montréal, Canada
Universidad Carlos III, Madrid, Spain</p>
      <sec id="sec-5-1">
        <title>Additional Reviewers</title>
      </sec>
      <sec id="sec-5-2">
        <title>Organization Committee</title>
        <p>Olivier Raynaud (chair)</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>LIMOS, Clermont-Ferrand, France Violaine Antoine Anne Berry Diyé Dia</title>
    </sec>
    <sec id="sec-7">
      <title>LIMOS, Clermont-Ferrand, France</title>
      <p>LIMOS, Clermont-Ferrand, France
LIMOS, Clermont-Ferrand, France
LIMOS, Clermont-Ferrand, France
INRA Theix, Clermont-Ferrand, France
LIMOS, Clermont-Ferrand, France
LIMOS, Clermont-Ferrand, France
LIMOS, Clermont-Ferrand, France</p>
      <p>LIMOS, Clermont-Ferrand, France
An Aho-Corasick Based Assessment of Algorithms Generating Failure
Deterministic Finite Automata : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : :
Madoda Nxumalo, Derrick G. Kourie, Loek Cleophas and Bruce W.
Watson
Probabilistic Implicational Bases in FCA and Probabilistic Bases of
GCIs in EL? : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 193</p>
      <p>Francesco Kriegel
Category of isotone bonds between L-fuzzy contexts over different
structures of truth degrees : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 205</p>
      <p>Jan Konecny, Ondrej Krídlo
From an implicational system to its corresponding D-basis : : : : : : : : : : : : : 217
Estrella Rodríguez-Lorenzo, Kira Adaricheva, Pablo Cordero,</p>
      <p>Manuel Enciso, Angel Mora
Using Linguistic Hedges in L-rough Concept Analysis : : : : : : : : : : : : : : : : : : 229</p>
      <p>Eduard Bartl, Jan Konecny
Revisiting Pattern Structures for Structured Attribute Sets : : : : : : : : : : : : : 241
Mehwish Alam, Aleksey Buzmakov, Amedeo Napoli, Alibek</p>
      <p>Sailanbayev
Author Index : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 253
Formal Concept Analysis is a method of analysis of logical data based on
formalization of conceptual knowledge by means of lattice theory. It has proved
to be of interest to various applied fields such as data visualization, knowledge
discovery and data mining, database theory, and many others.</p>
      <p>The International Conference “Concept Lattices and Their Applications (CLA)”
is being organized since 2002 and its aim is to bring together researchers from
various backgrounds to present and discuss their research related to FCA.
The Twelfth edition of CLA was held in Clermont-Ferrand, France from October
13 to 16, 2015. The event was jointly organized by the LIMOS laboratory, CNRS,
and Blaise Pascal university, France.</p>
      <p>This volume includes the selected papers and the abstracts of 5 invited talks.
We would like to express our warmest thanks to the keynote speakers.
This year, there were initially 39 submissions, from which the Program
Committee selected 20 papers which represents an acceptance rate of 51.2%.
The program of the conference consisted of five keynote talks given by the
following distinguished researchers: Didier Dubois, Lhouari Nourine, Gabriella Pasi,
Jan Ramon, and Takeaki Uno, together with twenty communications authored
by researchers from 11 countries, namely: Austria, Czech republic, France,
Germany, Kazakhstan, Republic of South Africa, Russia, Slovakia, Spain, Sweden,
and Ukraine.</p>
      <p>Each paper was reviewed by 3–4 members of the Program Committee and/or
additional reviewers. We thank them all for their valuable assistance. It is planned
that extended versions of the best papers will be published in a well-established
journal, after another reviewing process.</p>
      <p>The success of such event is mainly due the hard work and dedication of many
people and a collaboration of several institutions. We thank the contributing
authors, who submitted high quality works, we thank to the CLA Steering
Committee, who gave us the opportunity of chairing this edition, and we thank the
Program Committee, the additional reviewers, and the local Organization
Committee. We are also thankful to the following institutions, which have helped
the organization of the twelfth edition of CLA: Coffreo, IPLeanware, Axège, and
Oorace.</p>
      <p>We also thank the Easychair conference system as it made easier most of our
administration tasks related to paper submission, selection, and reviewing. Last
but not least we thank Jan Outrata, who offered his files for preparing the
proceedings.</p>
    </sec>
    <sec id="sec-8">
      <title>October 2015</title>
    </sec>
    <sec id="sec-9">
      <title>Sadok Ben Yahia Jan Konecny Program Chairs of CLA 2015</title>
      <p>User Models as Personal Ontologies</p>
    </sec>
    <sec id="sec-10">
      <title>Gabriella Pasi</title>
      <p>Laboratorio di Information Retrieval – Università degli Studi di Milano Bicocca,</p>
      <p>Milano, Italia
Abstract. The problem of defining user profiles has been a research issue since a long
time; user profiles are employed in a variety of applications, including Information
Filtering and Information Retrieval. In particular, considering the Information Retrieval
task, user profiles are functional to the definition of approaches to Personalized search,
which is aimed at tailoring the search outcome to users. In this context the quality of
a user profile is clearly related to the effectiveness of the proposed personalized search
solutions. A user profile represents the user interests and preferences; these can be
captured either explicitly or implicitly. User profiles may be formally represented as
bags of words, as vectors of words or concepts, or still as conceptual taxonomies. More
recent approaches are aimed at formally representing user profiles as ontologies, thus
allowing a richer, more structured and more expressive representation of the knowledge
about the user.</p>
      <p>This talk will address the issue of the automatic definition of personal ontologies, i.e.
user-related ontologies. In particular, a method that applies a knowledge extraction
process from the general purpose ontology YAGO will be described. Such a process is
activated by a set of texts (or just a set of words) representatives of the user interests,
and it is aimed to define a structured and semantically coherent representation of the
user topical preferences. The issue of the evaluation of the generated representation
will be discussed too.</p>
      <p>Formal Concept Analysis from the Standpoint of
Possibility Theory</p>
    </sec>
    <sec id="sec-11">
      <title>Didier Dubois</title>
      <p>IRIT – Université Paul Sabatier, Toulouse, France
Abstract. Formal concept analysis (FCA) and possibility theory (PoTh) are two
theoretical frameworks that are addressing different concerns in the processing of
information. Namely FCA builds concepts from a relation linking objects to the properties
they satisfy, which has applications in data mining, clustering and related fields, while
PoTh deals with the modeling of (graded) epistemic uncertainty. This difference of
focus explains why the two settings have been developed completely independently for
a very long time. However, it is possible to build a formal analogy between FCA and
PoTh. Both theories heavily rely on the comparison of sets, in terms of containment
or overlap. The four set-functions at work in PoTh actually determine all possible
relative positions of two sets. Then the FCA operator defining the set of objects sharing
a set of properties, which is at the basis of the definition of formal concepts, appears
to be the counterpart of the set function expressing strong (or guaranteed) possibility
in PoTh. Then, it suggests that the three other set functions existing in PoTh should
also make sense in FCA, which leads to consider their FCA counterparts and new fixed
point equations in terms of the new operators. One of these pairs of equations,
paralleling the one defining formal concepts, define independent sub-contexts of objects and
properties that have nothing in common.</p>
      <p>The parallel of FCA with PoTh can still be made more striking using a cube of
opposition (a device extending the traditional square of opposition existing in logic, and
exhibiting a structure at work in many theories aiming at representing some aspects
of the handling of information). The parallel of FCA with PoTh extends to conceptual
pattern structures, where objects, may, e.g., be described by possibilistic knowledge
bases.</p>
      <p>In the talk we shall indicate various issues pertaining to FCA that could be worth
studying in the future. For instance, the object-property links in formal contexts of
FCA may be a matter of degree. These degrees may refer to very different notions,
such as the degree of satisfaction of a gradual property, the degree of certainty that an
object has, or not, a property, or still the typicality of an object with respect to a set of
properties. These different intended semantics call for distinct manners of handling the
degrees, as advocated in the presentation. Lastly, applications of FCA to the mining of
association rules, to the fusion of conflicting pieces of information issued from multiple
sources, to clustering of sets of objects on the basis of approximate concepts, or to the
building of conceptual analogical proportions, will be discussed as other examples of
lines of interest for further research.</p>
      <p>Clarifying Lattice Structure by Data Polishing</p>
    </sec>
    <sec id="sec-12">
      <title>Takeaki Uno</title>
      <p>Institute of Informatics (NII) of Japan, Tokyo, Japan
Abstract. Concept lattice is made from many kinds of data. We want to use large
scale data for the construction to capture wide and deep meanings but the result of the
construction usually yields a quite huge lattice that is impossible to handle. Several
techniques have been proposed to cope with this problem, but to best of our knowledge
no algorithm attains good granularity, coverage, size distribution, and independence of
concepts at the same time. We consider this difficulty comes from that the concepts
are not clear in the data, so a good approach is to clarify the concepts in the data by
some operations. In this direction, we propose “data polishing” that modify the data
according to feasible hypothesis so that the concepts becomes clear.</p>
      <p>Tractable Interesting Pattern Mining in Large
Networks</p>
    </sec>
    <sec id="sec-13">
      <title>Jan Ramon</title>
      <p>University of Leuven – INRIA, Leuven, Belgium
Abstract. Pattern mining is an important data mining task. While the simplest
setting, itemset mining, has been thoroughly studied real-world data is getting
increasingly complex and network structured, e.g. in the context of social networks, economic
networks, traffic networks, administrative networks, chemical interaction networks and
biological regulatory networks.</p>
      <p>
        This presentation will first provide an overview of graph pattern mining work, and will
then discuss two important questions. First, what is an interesting concept, and can
we obtain suitable mathematical properties to order concepts in some way, obtaining
a lattice or other exploitable structure?
Second, how can we extract collections of interesting patterns from network-structured
data in a computationally tractable way? In the case of graphs, having a lattice on
the class of patterns turns out to be insufficient for computational tractability. We
will discuss difficulties related to pattern matching and related to enumeration, and
additional difficulties arising when considering condensed pattern mining variants.
for each a, b P L. A truth-depressing hedge is a (truth function of) logical
connective ‘slightly true’, see [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>On every complete residuated lattice L, there are two important
truthdepressing hedges:
(i) identity, i.e. a “ a pa P Lq;
(ii) antiglobalization, i.e.</p>
      <p>a “
" 0, if a “ 0,</p>
      <p>1, otherwise .
˚G
˚1
˚2
˚3
˚4
˚5
˚6
G
1
2
3
4
5
6
id
id
1
Fig. 1. Truth-stressing hedges (top) and truth-depressing hedges (bottom) on 5-element
chain with Łukasiewicz operations L “ xt0, 0.25, 0.5, 0.75, 1u, min, max, b, Ñ, 0, 1y. The
leftmost truth-stressing hedge ˚G is the globalization, leftmost truth-depressing hedge
G is the antiglobalization. The rightmost hedges denoted by id are the identities.</p>
      <p>For truth-stressing/truth-depressing hedge ˚ we denote by fixp˚q set of its
idempotent elements in L; i.e. fixp˚q “ ta P L | a˚ “ au.</p>
      <p>Let ˚1, ˚2 be truth-stressing hedges on L such that fixp˚1q Ď fixp˚2q; then
for each a P A, a˚1˚2 “ a˚1 holds. The same holds true for ˚1, ˚2 being
truthdepressing hedges.</p>
      <p>We naturally extend application of truth-stressing/truth-depressing hedges
to L-sets: A˚pxq “ Apxq˚ for all x P U.
3</p>
      <p>Results
The L-rough concept-forming operator M gives for each L-set of objects two
L-sets of attributes. The first one represents a necessity of having the attributes
and second one a possibility of having the attributes. We add linguistic hedges
to the concept-forming operators to control shape of the two L-sets.</p>
      <p>
        Since the L-rough concept-forming operators are defined viaxÒ, Óy and xX, Yy,
we first recall the parametrization of these operators as described in [
        <xref ref-type="bibr" rid="ref15 ref25 ref8">8, 15</xref>
        ].
3.1 Linguistic Hedges in Formal Fuzzy Concept Analysis
Let xX, Y, Iy be an L-context and let r, q be truth-stressing hedges on L. The
antitone concept-forming operators parametrized by r and q induced by I are
defined as
for all A P LX, B P LY.
      </p>
      <p>Let r and ♠ be truth-stressing hedge and truth-depressing hedge on L,
respectively. The isotone concept-forming operators parametrized by r and ♠
induced by I are defined as</p>
      <p>AÒr pyq “
BÓq pxq “
ľ Apxqr Ñ Ipx, yq,
xPX
ľ Bpyqq Ñ Ipx, yq
yPY
AXr pyq “
BY♠ pxq “
ł Apxqr b Ipx, yq,
xPX
ľ Ipx, yq Ñ Bpyq♠
yPY
for all A P LX, B P LY.</p>
      <p>
        Properties of the hedges in the setting of multi-adjoint concept lattices with
heterogeneous conjunctors were studied in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
3.2 L-rough Concept-Forming Operators with Linguistic Hedges
Let r, q be truth-stressing hedges on L and let ♠ be a truth-depressing hedge on
L. We parametrize the L-rough concept-forming operators as
      </p>
      <p>AN “ xAÒr , AXr y and xB, ByH “ BÓq X BY♠
(3)
for A P LX, B, B P LY.</p>
      <p>Remark 1. When the all three hedges are identities the pair xN, Hy is equivalent
to xM, Oy; so it is an pL, L ˆ L´1q-Galois connection. For arbitrary hedges this
does not hold.</p>
      <p>The following theorem describes properties of xN, Hy.</p>
      <p>Theorem 1. The pair xN, Hy of L-rough concept-forming operators parametrized by
hedges has the following properties.
(a) AN “ ArM “ ArN and xB, ByH “ xBq, B♠yO “ xBq, B♠yH
(b) AM Ď AN and xB, ByO Ď xB, ByH
(c) SpA1r, A2rq ď SpA2N, A1Nq and SpxB1, B1y, xB2, B2yq ď SpxB2, B2yH, xB1, B1yHq
(d) Ar Ď ANH and xBq, B♠y Ď xB, ByHN;
(e) A1 Ď A2 implies AN</p>
      <p>2 Ď A1N and xB1, B1y Ď xB2, B2y implies xB2, B2yH Ď xB1, B1yH
(f) SpAr, xB, ByHq “ SpxBq, B♠y, ANq
(g) pŤiPI AirqN “ ŞiPI AiN and pxŤiPI Biq, ŞiPI Bi♠yqH “ ŞiPIxBi, BiyH
(h) ANH “ ANHNH and xB, ByHN “ xB, ByHNHN.</p>
      <p>Proof. (a) Follows immediately from definition of N and H and idempotency of
hedges.</p>
      <p>(b) From (2) we have Ar Ď A; by properties of Galois connections the
inclusion implies AM Ď ArM, which is by (a) equivalent to AM Ď AN. Proof of the
second statement in (b) is similar.</p>
      <p>(c) Follows from (a) and properties of Galois connections.</p>
      <p>(d) By [2, Corollary 1(a)] we have Ar Ď ArMO. Using (a) we get Ar Ď ANO and
from (b) we have ANO Ď ANH, so Ar Ď ANH. Similarly for the second claim.</p>
      <p>(e) Follows directly from [2, Corollary 1(c)] and properties of Galois
connections.</p>
      <p>(f) Since xM, Oy forms pL, L ˆ L´1q-Galois connection and using (a) we have
SpAr, xB, ByHq “ SpAr, xBq, B♠yOq “ SpxBq, B♠y, ArMq “ SpxBq, B♠y, ANq.</p>
      <p>(g) We can easily get
and
pď AirqN “ xpď AirqÒr , pď AirqXr y “ xč AiÒr , ď AiXr y
iPI iPI iPI iPI iPI
“ čxAiÒr , AiXr y “ č AiN,
iPI
pxď Biq, č Bi♠yqH “ pď BiqqÓq X pč Bi♠qY♠ “
iPI iPI iPI iPI
č BiÓq X
iPI
č BiY♠
(h) Using (a), (d) and (e) twice, we have ANH Ď ANHNH. Using (d) for xB, By “
AN we have ANr Ď ANrHN “ ANHN. Then applying (e) we get ANHNH Ď ANH
proving the first claim. The second claim can be proved analogically.</p>
      <p>The set of fixed points of xN, Hy endowed with partial order ď given by
xA1, B1, B1y ď xA2, B2, B2y iff A1 Ď A2
iff xB1, B1y Ď xB2, B2y
is denoted by BrNH,q,♠pX, Y, I, Iq.</p>
      <p>Remark 2. Note that from (4) it is clear that if a concept has non-natural L-rough
intent then all its subconcepts have non-natural intent. If such concepts are
not desired, one can simply ignore them and work with the iceberg lattice of
concepts with natural L-rough intents.</p>
      <p>The next theorem shows a crisp representation of BrNH,q,♠pX, Y, I, Iq.</p>
      <p>NH
Theorem 2. Br,q,♠pX, Y, I, Iq is isomorphic to ordinary concept lattice BÒÓpXˆfixprq, Yˆ
fixpqq ˆ fixp♠q, Iˆq where</p>
      <p>xxx, ay, xy, b, byy P Iˆ iff a b b ď Ipx, yq and a Ñ b ě Ipx, yq.</p>
      <p>
        Proof. This proof can be done by following the same steps as in [
        <xref ref-type="bibr" rid="ref15 ref25 ref8">8, 15</xref>
        ].
      </p>
      <p>The following theorem explains the structure of BrNH,q,♠pX, Y, I, Iq.</p>
      <p>NH
Theorem 3. Br,q,♠pX, Y, I, Iq is a complete lattice with suprema and infima defined as
(4)
\[
\[
(5)
(6)
ľxAi, xBi, Biyy “ xpč AiqNH, xď Biq, č Bi♠yHNy,</p>
      <p>i i
i
łxAi, xBi, Biyy “ xpď AirqNH, xč Bi, ď BiyHNy</p>
      <p>i i i i
for all Ai P LX, Bi P LY, Bi P LY.</p>
      <p>Proof. Follows from Theorem 2.</p>
      <p>Remark 3. Note that if we alternatively define (3) as
or
or
or</p>
      <p>AN “ xpAÒr qq, pAXr q♠y and xB, ByH “ pBÓq X BY♠ qr</p>
      <p>AN “ xpAÒqq, pAXq♠y and xB, ByH “ pBÓ X BYqr
AN “ xpAÒr qq, pAXr q♠y and xB, ByH “ xB, ByO</p>
      <p>
        AN “ AM and xB, ByH “ pBÓq X BY♠ qr
we obtain an isomorphic concept lattice. In addition (5) and (6) produce the
same concept lattice.
3.3 Size Reduction of Fuzzy Rough Concept Lattices
This part provides analogous results on reduction with truth-stressing and
truthdepressing hedges as [
        <xref ref-type="bibr" rid="ref10 ref27">10</xref>
        ] for antitone fuzzy concept-forming operators and [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]
for isotone fuzzy concept-forming operators.
      </p>
      <p>For the next theorem we need the following lemma.</p>
      <p>Lemma 1. Let r, ♥, q, ♦ be truth-stressing hedges on L such that fixprq Ď fixp♥q, fixpqq
Ď fixp♦q; let ♠, s be truth-depressing hedges on L such that and fixp♠q Ď fixpsq. We
have</p>
      <p>AN♥ Ď ANr and xB, ByH♦,s Ď xB, ByHq,♠ .</p>
      <p>Proof. We have Ar♥ Ď A♥ from (2). From the assumption fixprq Ď fixp♥q we get
Ar♥ “ Ar; whence we have Ar Ď A♥. Theorem 1(e) implies A♥N Ď ArN which is
by the claim (a) of this theorem equivalent to AN♥ Ď ANr . The second claim can
be proved similarly.
\[
Theorem 4. Let r, ♥, q, ♦ be truth-stressing hedges on L such that fixprq Ď fixp♥q,
fixpqq Ď fixp♦q; let ♠, s be truth-depressing hedges on L s.t. and fixp♠q Ď fixpsq,</p>
      <p>NH NH
|Br,q,♠pX, Y, I, Iq| ď |B♥,♦,spX, Y, I, Iq|
for all L-rough contexts xX, Y, I, Iy.</p>
      <p>In addition, if r “ ♥ “ id, we have
Similarly, if q “ ♦ “ ♠ “ s “ id, we have</p>
      <p>ExtrNH,q,♠pX, Y, I, Iq Ď Ext♥NH,♦,spX, Y, I, Iq.</p>
      <p>IntrNH,q,♠pX, Y, I, Iq Ď Int♥NH,♦,spX, Y, I, Iq.</p>
      <p>
        Proof. (4) follows directly from Theorem 2 and results on subcontexts in [
        <xref ref-type="bibr" rid="ref11 ref28">11</xref>
        ].
      </p>
      <p>Now, we show (4). Note that each A P ExtrNH,q,♠pX, Y, I, Iq we have</p>
      <p>A “ ANrHq,♠ “ AN♥Hq,♠ Ě AN♥H♦,s Ě A.</p>
      <p>Thus we have A P Ext♥NH,♦,spX, Y, I, Iq. The inclusion (4) can be proved similarly.
\[
Example 1. Consider the truth-stressing hedges ˚G, ˚1, ˚2, id and truth-depressing
hedges G, 1, 2, id from Figure 1. One can easily observe that
fixp˚Gq Ď fixp˚1q Ď fixp˚2q Ď fixpidq
fixp Gq Ď fixp 1q Ď fixp 2q Ď fixpidq.</p>
      <p>Consider the L-context of books and their graded properties in Fig. 2 with L
being 5-element Łukasiewicz chain. Using various combinations of the hedges
we obtain a smooth transition in size of the associated fuzzy rough concept
lattice going from 10 concepts up to 498 (see Tab. 1). When the 5-element G o¨del
chain is used instead, we again get a transition going from 10 concepts up to
298 (see Tab. 2).
1
2
3
4
5
6</p>
      <p>Conclusion and further research
We have shown that the L-rough concept-forming operators can be
parameterized by truth-stressing and truth-depressing hedges similarly as the antitone
and isotone fuzzy concept-forming operators.</p>
      <p>
        Our future research includes a study of attribute implications using whose
semantics is related to the present setting. That will combine results on fuzzy
attribute implications [
        <xref ref-type="bibr" rid="ref24 ref7">7</xref>
        ] and attribute containment formulas [
        <xref ref-type="bibr" rid="ref23 ref6">6</xref>
        ].
Acknowledgment
Supported by grant No. 15-17899S, “Decompositions of Matrices with Boolean
and Ordinal Data: Theory and Algorithms”, of the Czech Science Foundation.
      </p>
      <p>Revisiting Pattern Structures for Structured</p>
      <p>Attribute Sets
Mehwish Alam1, Aleksey Buzmakov1, Amedeo Napoli1, and</p>
      <p>Alibek Sailanbayev2?
1LORIA (CNRS – Inria NGE – U. de Lorraine), Vandoeuvre-l`es-Nancy, France
2Nazarbayev University, Astana, Kazakhstan
{ mehwish.alam, aleksey.buzmakov, amedeo.napoli, } @loria.fr,</p>
      <p>alibek.sailanbayev@nu.edu.kz
Abstract. In this paper, we revisit an original proposition on pattern
structures for structured sets of attributes. There are several reasons for
carrying out this kind of research work. The original proposition does
not give many details on the whole framework, and especially on the
possible ways of implementing the similarity operation. There exists an
alternative definition without any reference to pattern structures, and
we would like to make a parallel between two points of view. Moreover
we discuss an efficient implementation of the intersection operation in
the corresponding pattern structure. Finally, we discovered that pattern
structures for structured attribute sets are very well adapted to the
classification and the analysis of RDF data. We terminate the paper by an
experimental section where it is shown that the provided implementation
of pattern structures for structured attribute sets is quite efficient.</p>
      <p>Keywords: Formal Concept Analysis, Pattern Structures, Structured Attribute
Sets, Least Common Ancestor, Range Minimum Query.
1</p>
      <p>
        Introduction
In this paper, we want to make precise and develop a section of [
        <xref ref-type="bibr" rid="ref1 ref18">1</xref>
        ] related to
pattern structures and structured sets of attributes. There are several reasons
for carrying out this kind of research work. Firstly, the the pattern structures,
the similarity operator u and the associated subsumption operator v for
structured sets of attributes are based on antichains and rather briefly sketched in
the original paper. Secondly, there is an alternative and a more “qualitative”
point of view on the same subject in [
        <xref ref-type="bibr" rid="ref19 ref2 ref20 ref3">2, 3</xref>
        ] without any reference to pattern
structures, and we would like to make a parallel between these two points of
view. Finally, for classifying RDF triples in the analysis of the content of Linked
Open Data (LOD), we discovered that actually pattern structures for structured
sets of attributes are very well adapted to solve this problem [
        <xref ref-type="bibr" rid="ref21 ref4">4</xref>
        ]. Moreover, the
? This work was done during the stay of Alibek Sailanbayev at LORIA, France.
classification of RDF triples provides a very good and practical example for
illustrating the use of such a pattern structure and helps to reconcile the two above
points of view.
      </p>
      <p>
        Accordingly, in this paper, we will go back to the two original definitions and
show how they are related. For completing the history, it is worth mentioning
that antichains, whose intersection is the basis of the similarity operation in
the pattern structure for structured attribute sets, our paper, are studied in the
book [
        <xref ref-type="bibr" rid="ref22 ref5">5</xref>
        ]. Moreover, this book cites as an application of antichain intersection an
older paper from 1994 [
        <xref ref-type="bibr" rid="ref23 ref6">6</xref>
        ], written in French, about the decomposition of total
orderings and its application to knowledge discovery.
      </p>
      <p>Then, we proceed to present a way of efficiently working with antichains and
intersection of antichains, which can be very useful, especially in case of large sets
of data. The last section details a series of experiments where it is shown that
pattern structures can be implemented with an efficient intersection operation
and that they have a generally better behavior than scaled contexts.
2</p>
      <p>
        Pattern Structures for Structured Attributes
Formal Concept Analysis [
        <xref ref-type="bibr" rid="ref24 ref7">7</xref>
        ] can process only binary contexts. Pattern structures
are an extension of FCA which allow a direct processing of such kind of data.
The formalism of pattern structures was introduced in [
        <xref ref-type="bibr" rid="ref1 ref18">1</xref>
        ].
      </p>
      <p>A pattern structure is a triple (G, (D, u), δ), where G is the set of objects,
(D, u) is a meet-semilattice of descriptions, and δ : G → D maps an object to
its description. In other words, a pattern structure composed of a set of objects,
a set of descriptions equipped with a similarity operation denoted by u. This
similarity operation is idempotent, commutative and associative. If (G, (D, u), δ)
is a pattern structures then the derivation operators (Galois connection) are
defined as:</p>
      <p>A :=
l δ(g)
g∈A
d := {g ∈ G|d v δ(g)}
for A ⊆ G
for d ∈ D
Each element in D is referred to as a pattern. The natural order on (D, u), given
by c v d ⇔ c u d = c is called the subsumption order. Now a pattern concept
can be defined as follows:
Definition 1 (Pattern Concept). A pattern concept of a pattern structure
(G, (D, u), δ) is a pair (A, d) where A ⊆ G and d ∈ D such that A = d and
A = d , where A is called the concept extent and d is called the concept intent.</p>
      <p>A pattern extent corresponds to the maximal set of objects A whose
descriptions subsume the description d, where d is the maximal common description
for objects in A. The set of all pattern concepts is partially ordered w.r.t.
inclusion on extents, i.e., (A1, d1) ≤ (A2, d2) iff A1 ⊆ A2 (or, equivalently, d2 v d1),
making a lattice, called pattern lattice.
2.2</p>
      <p>
        Two original propositions on structured attribute sets
We briefly recall two original propositions supporting the present study. The first
work is firstly published by Carpineto &amp; Romano in [
        <xref ref-type="bibr" rid="ref19 ref2">2</xref>
        ] and then developed in
[
        <xref ref-type="bibr" rid="ref20 ref3">3</xref>
        ]. The second work is related to the definition of pattern structures by Ganter
&amp; Kuznetsov in [
        <xref ref-type="bibr" rid="ref1 ref18">1</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref19 ref2 ref20 ref3">2, 3</xref>
        ], the authors consider a formal context (G, M, I) and an extended set
of attributes M ∗ ⊃ M where attributes are organized within a subsumption
hierarchy according to a partial ordering denoted by ≤M∗ . The following condition
should be satisfied:
∀g ∈ G, m1 ∈ M, m2 ∈ M ∗ : [(g, m1) ∈ I, m1 ≤M∗ m2] =⇒ (g, m2) ∈ I
The subsumption hierarchy can be either a tree or an acyclic graph with a
unique maximal element, as this is the case of attributes lying in a thesaurus for
example. Then the building of a concept lattice from such a context can be done
in two main ways. A first is to use a scaling and to complete the description of
an object with all attributes implied by the original attributes. We discuss this
scaling operation in detail later. The problem would be the space necessary to
store the scaled context, especially in case of big data. A second way is to use
an “extended intersection operation” between sets of attributes which is defined
as follows. The intersection of two sets of attributes Y1 and Y2 is obtained by
finding for each pair (m1, m2), m1 ∈ Y1, m2 ∈ Y2, the most specific attributes in
M ∗ that are more general than m1 and m2, and then retaining only the most
specific elements of the set of attributes generated in this way. Then if (X1, Y1)
and (X2, Y2) are two concepts, we have:
(X1, Y1) ≤ (X2, Y2) ⇐⇒ ∀m2 ∈ Y2, ∃m1 ∈ Y1, m1 ≤M∗ m2
      </p>
      <p>
        In other words, this intersection operation corresponds to the intersection of
two antichains as this is explained in [
        <xref ref-type="bibr" rid="ref1 ref18">1</xref>
        ], where the authors define the formalism
of pattern structures and take as an instantiation structured attribute sets. More
formally, it is assumed that the attribute set (M, ≤M ) is finite and partially
ordered, and that all attribute combinations that can occur must be order ideals
(downsets) of this order. Then, any order ideal O can be described by the set
of its maximal elements; O = {x|∃y ∈ M, x ≤ y}. It should be noticed that the
order considered on the attribute sets in [
        <xref ref-type="bibr" rid="ref1 ref18">1</xref>
        ] is reversed with respect to the order
considered in [
        <xref ref-type="bibr" rid="ref19 ref2 ref20 ref3">2, 3</xref>
        ]. However, we keep the original definitions used in [
        <xref ref-type="bibr" rid="ref1 ref18">1</xref>
        ] in the
present paragraph. These maximal elements form an antichain, and conversely,
each antichain is the set of maximal elements of some order ideal. Thus, the
semilattice (D, u) of patterns in the pattern structure consists of all antichains
of the ordered attribute set. In addition, it is isomorphic to the lattice of all
order ideals of the ordered set, and thus isomorphic to the concept lattice of the
context (P, P, 6≥). For two antichains AC1 and AC2, the infimum AC1 u AC2
consists of all maximal elements of the order ideal:
      </p>
      <p>{m ∈ P | ∃ac1 ∈ AC1, ∃ac2 ∈ AC2, m ≤ ac1 and m ≤ ac2}.</p>
      <p>There is a “canonical representation context” (or an associated scaling
operator) for the pattern structure (G, (D, u), δ) related to structured attribute sets,
which is defined by the set of “principal ideals ↓ p” as follows: (G, P, I) with
(g, p) ∈ I ⇐⇒ p ≤ δ(g).</p>
      <p>
        In the next section, we make precise and discuss the pattern structure for
structured attribute sets by taking the point of view of filters and not of ideals
in agreement with the order from [
        <xref ref-type="bibr" rid="ref19 ref2 ref20 ref3">2, 3</xref>
        ], with the most general attributes above.
2.3
      </p>
      <p>From Structured Attributes to Tree-shaped Attributes
An important case of structured attributes is “tree-shaped attributes”, i.e., when
the attributes are organized within a partial order corresponding to a rooted tree.
If it is the case, then the root of the tree, denoted by &gt;, can be matched against
the description of any object, while the leaves of this tree are the most detailed
descriptions. For example, the root can correspond to the attribute ‘Animal’ and
a leaf can correspond to the attribute ‘Cat’; somewhere in between there could
be attribute ‘Mammal’.</p>
      <p>An example of such kind of data naturally appears in the domain of semantic
web data. For example, Figure 1 gives a small part of ACCS1. This attribute tree
will be used as a running example and should be read as follows. If an object
belongs to class C1 (and probably to some other classes), then it necessarily
belongs to classes C10, C12, and &gt;, e.g., if an object is a cat, then it is a mammal
and an animal. Accordingly, the description of an object can include several
classes, e.g., classes C1, C5 and C8. Thus, some of the tree-shaped attributes can
be omitted from the description of an object. However, they should be always
taken into account when computing the intersection between descriptions. Thus,
in order to avoid redundancy in the descriptions, we can allow only antichains of
the tree as possible elements in the set D of descriptions, and then, accordingly
compute the intersection of antichains.</p>
      <p>An efficient way of computing intersection of antichains is explained in the
next section. Here it is important to notice that although it is a hard task to
efficiently compute intersection of antichains in an arbitrary partial order of
attributes, the intersection of antichains in a tree can help in computing this
more general intersection. Indeed, in a partial order of attributes, we can add an
artificial attribute &gt; that can be matched against any description. Then, instead
of considering an intersection of antichains in an arbitrary poset we can take a
spanning tree of it with &gt; taken as the root. Although we have lost some relations
between attributes, and, thus, the size of the antichains is probably larger, we
can apply the efficient intersection of antichains of tree discussed below.</p>
      <p>On Computing Intersection of Antichains in a Tree
In this subsection we show how to efficiently solve the problem of intersection
of antichains in a tree. The problem is formalized as follows. A partial order is
1 https://www.acm.org/about/class/2012</p>
      <p>C12
C10</p>
      <p>C11
&gt;</p>
      <p>C6
C13</p>
      <p>C8
C1</p>
      <p>C2</p>
      <p>C4</p>
      <p>C5</p>
      <p>C7</p>
      <p>C9</p>
      <p>Fig. 1: A small part from ACM Computing Classification System (ACCS).
described by the Hasse diagram corresponding to the tree. The root is denoted
by &gt; and it is larger w.r.t. the partial order than any other element in the tree.
Given a rooted tree T and two antichains X and Y , we should find an antichain
Z such that (1) for all x ∈ X ∪ Y there is z ∈ Z such that x ≤ z and (2) no
z ∈ Z can be removed or changed to z˜ &lt; z without violating requirement (1).</p>
      <p>
        If the cardinality of antichains X and Y is 1 then this task is reduced to
the well-known problem of a Least Common Ancestor (LCA). In 1984 it was
already shown that the LCA problem can be reduced to Range Minimum Query
(RMQ) problem [
        <xref ref-type="bibr" rid="ref25 ref8">8</xref>
        ]. Later several simpler approaches were introduced for solving
the LCA problem. Here we briefly introduce the reduction of LCA to RMQ in
accordance with [
        <xref ref-type="bibr" rid="ref26 ref9">9</xref>
        ].
      </p>
      <p>Reduction of LCA to RMQ. Given an array of numbers, the RMQ problem
consists in efficient answering queries on the position of the minimal value in a
given range (interval) of positions for this array. For example, given an array</p>
      <p>Array [ 2 1 0 3 2 ]</p>
      <p>
        Positions 1 2 3 4 5
where the first value is in position 1 and the last value is in position 5, the answer
to the query on the position of the minimal number in the range 2–4, i.e., the
corresponding part of array is [1;0;3], is 3 (the value of the 3rd element in the
array is 0 and it is the minimal value in this range). Accordingly, the position
of the minimal number in the range 1–2 (the part of the array is [2;1]) is 2. The
good point about this problem is that it can be solved in O(n) preprocessing
computational time and in O(1) computational time per one query [
        <xref ref-type="bibr" rid="ref26 ref9">9</xref>
        ], where n
is the number of elements in the array.
      </p>
      <p>In order to introduce the reduction of LCA to RMQ we need to know what is
the depth of a tree vertex. The depth of a vertex in a rooted tree is the number
of edges in the shortest path from that vertex to the root of the tree.</p>
      <p>We create the array of depths of the vertices in the tree that is used as an
input array for RMQ. We build this array in the following way. We traverse the
tree in depth first order (see Figure 2). Every time the algorithm considers a
4
Depth array D [ 0 1 2 1 2 3 2 3 2 1 0 1 2 1 0 ]
Corresponding vertex v0 v1 v2 v1 v3 v4 v3 v5 v3 v1 v0 v6 v7 v6 v0
Positions 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Fig. 2: Reducing RMQ task to LCA. Arrows show the depth first order traversal.
The depth array D is accompanied by the corresponding vertices and positions.
vertex, i.e., the first visit or a return to the vertex, we should put the depth
of that vertex at the end of the depth array D. We also keep track of a vertex
corresponding to each depth in D. The depth array D has 2|T | − 1 values, where
|T | is the number of vertices in the tree.</p>
      <p>
        Now for any value in D we know the corresponding vertex of the tree and
any vertex of the tree is associated with several positions in D. For example, in
Figure 2 the value in the first position of D, i.e., D[
        <xref ref-type="bibr" rid="ref1 ref18">1</xref>
        ], is 0, corresponding to
the root of the tree. If we take vertex 3, then the associated values of D are on
positions 5, 7, and 9.
      </p>
      <p>Given two vertices A, B ∈ T , let a be one of the positions in D corresponding
to vertex A, let b be one of the positions in D corresponding to B. Then it
can be shown that the vertex corresponding to the minimal value in D in the
range a–b is the least common ancestor of A and B. For example, to find LCA
between vertices 3 and 6 in Figure 2, one should first take two positions in D
corresponding to vertices 3 and 6. Positions 5,7, and 9 in array D correspond to
vertex 3, positions 12 and 14 correspond to vertex 6. Thus, we can query RMQ
for ranges 5–14, 7–14, 7–12, etc. The minimal value in D for all these ranges is 0
located at position 11 in D, i.e., RMQ(5, 14) = 11. Thus, the vertex corresponding
to position 11, i.e., vertex 0, is the least common ancestor for vertices 3 and 6.</p>
      <p>Let us notice that if A ∈ T is an ancestor of B ∈ T and a and b are two
positions corresponding to the vertices A and B, then the position RMQ(a, b) in
D always corresponds to the vertex A, in most of the cases RMQ(a, b) = a. Thus
we are also able to check if a vertex of T is an ancestor of another vertex of T .</p>
      <p>Now we know how to solve the LCA problem in O(|T |) preprocessing
computational time and O(1) computational time per query. Let us return to the
problem of intersecting antichains of a tree.</p>
      <p>Antichain intersection problem. Let us first discuss the naive approach
to this problem. Given two antichains A, B ⊂ T , one can compute the set
D [ 0 1 2 3 2 3 2 1 2 3 2 3 2 1 0 1 2 3 2 3 2 3 2 1 0 ]
&gt; C12 C10 C1 C10 C2 C10 C12 C11 C4 C11 C5 C11 C12 &gt; C6 C13 C7 C13 C8 C13 C9 C13 C6 &gt;
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Fig. 3: Depth array, the corresponding vertices, and indices for the tree in
Figure 1.
{LCA(a, b) | ∀a ∈ A and ∀b ∈ B}. Then this set should be filtered for
removing the comparable elements in order to get an antichain. It is easy to see that
the result is the intersection of A and B but it requires at least |A|·|B| operations.</p>
      <p>Let us reformulate this naive approach in terms of RMQ. Given a depth array
D and two sets of indices A, B ⊆ N|D| forming an antichain, we should compute
the set Z = {RMQ(a, b) | ∀a ∈ A and ∀b ∈ B} and then remove all elements
z ∈ Z such that there is x ∈ Z \ {z} with the position RMQ(z, x) corresponding
to the same vertex as z, i.e., elements z corresponding to an ancestor of another
element from Z.</p>
      <p>Let us consider for example the tree T given in Figure 1. Figure 3 shows the
depth array, the corresponding vertices, and indices of this array. Let us show
how to compute the intersection of A = {C1, C5, C8} and B = {C1, C7, C9}. The
expected result is {C1, C13}. First we translate the sets A and B to the indices
in array D for RMQ, i.e., A = {4, 12, 20} and B = {4, 18, 22}. Then we compute
RMQ for all pairs from A and B:</p>
      <p>{RMQ(4, 4) = 4, RMQ(4, 18) = 15, RMQ(4, 22) = 15, · · · , RMQ(20, 18) = 19, · · · }.
Now we should remove positions corresponding to ancestors in the tree, e.g.,
RMQ(4, 15) = 15 and, hence, 15 should be removed. The result is {4, 13}
representing exactly {C1, C13}.</p>
      <p>
        Let us discuss two points that help us to reduce the complexity of the naive
approach. Consider the positions i ≤ l ≤ m ≤ j and k = RMQ(i, j), n = RMQ(l, m).
Then the depth in the position k is not larger than the depth in the position
n, D[k] ≤ D[n]. Hence the position RMQ(k, n) corresponds to the same vertex as
position k. For example, in Figure 3 RMQ(4, 6) = 5 and RMQ(2, 7) = 2. The value
in position 5 in the array D is D[
        <xref ref-type="bibr" rid="ref22 ref5">5</xref>
        ] = 2. It is larger than the value in position 2,
D[
        <xref ref-type="bibr" rid="ref19 ref2">2</xref>
        ] = 1. Thus, the value in position returned by RMQ for the larger range is
smaller than the value in position returned by RMQ for the smaller range.
      </p>
      <p>Thus, given two sets of indices A, B ⊆ N|D| corresponding to antichains, we
can modify the naive algorithm by ordering the set A ∪ B and computing RMQ
only for consecutive elements from different sets, rather then for all pairs from
different sets. For example, for intersecting A = {4, 12, 20} and B = {4, 18, 22},
we join them to the set Z = {4A, 4B, 12A, 18B, 20A, 22B}. Then, we compute
RMQ only for consecutive elements from different sets, i.e., RMQ(4, 4) = 4,
RMQ(4, 12) = 8, RMQ(12, 18) = 15, RMQ(18, 20) = 19, and RMQ(20, 22) = 21. The
cardinality of A ∪ B is less then |A| + |B|, hence, the number of the consecutive
elements is O(|A| + |B|), and, thus, the number of RMQs of consecutive elements
is O(|A| + |B|).</p>
      <p>However, the set Z of RMQs of consecutive elements does not not necessarily
correspond to an antichain in T . Thus we should filter this set, in order to remove
all ancestors of another elements form Z. Accordingly, it is clear that to filter
the set Z it is enough to check only consecutive elements of Z. For example,
the intersection of A = {4, 12, 20} and B = {4, 18, 22} gives us the following
set Z = {4, 8, 15, 19, 21}. Let us now check the RMQs of consecutive elements.
RMQ(4, 8) = 8, thus, 8 is an ancestor of 4 and 8 can be removed. Since 8 is
removed, we compare RMQ(4, 15) = 15, thus, 15 should be also removed. Then we
compute RMQ(4, 19) = 15, i.e., the indices 4 and 19 are not ancestors and both
are kept. Now we compute RMQ(19, 21) = 19 and, thus, 19 should be removed
(actually positions 19 and 21 correspond to the same vertex C13 and one of
them should be removed). Thus, the result of intersecting A and B is {4, 21}
corresponding to the antichain {C1, C13}.</p>
      <p>Since the number of elements in the set Z is O(|A| + |B|), then overall
complexity of computing intersection for two antichains A, B ⊂ T of a tree T is
O(|A| + |B|) or, taking into account that the cardinality of an antichain in a tree
is less then the number of leaves (vertices having no descendants) in this tree,
the complexity of computing intersection of two antichains is O(|Leaves(T )|).
Antichain intersection by scaling. An equivalent approach for computing
intersection of antichains is to scale the antichains to the corresponding filters.
A filter corresponding to an antichain in a poset is the set of all elements of
the poset that are larger then at least one element from the antichain. For
example, let us consider a tree-shaped poset in Figure 1. A filter corresponding
to the antichain {C1, C5, C8} is the set of all ancestors of all elements from the
antichain, i.e., it is equal to {C1, C10, C12, &gt;, C5, C11, C8, C13, C6}.</p>
      <p>The set-intersection of filters corresponding to the given antichains is a filter
corresponding to the antichain resulting from intersection of the antichains.
However this approach has a higher complexity. Indeed, the size of a filter is O(|T |)
and, thus, the computational complexity of intersecting two antichains by means
of a scaling is O(|T |) which is harder then O(|Leaves(T )|) for intersecting
antichains directly. Indeed, the number of leaves in a tree can be dramatically
smaller than the number of vertices in this tree. For example, the number of
vertices in Figure 1 is 13, while the number of leaves is only 7. Thus, the direct
intersection of antichains is more efficient than the intersection by means of a
scaling procedure.</p>
      <p>Relation to intersection of antichains in partially ordered sets of
attributes. As it was mentioned in the previous section, the intersection of
antichains in arbitrary posets can be reduced to the intersection of antichains in a
tree. However, the size of the antichain representing a description of an object
can increase. Indeed, since we have reduced a poset to a tree, some relations
have been lost, and thus the attributes that are subsumed in the poset for a
given antichain A are no more subsumed in the tree for A, and hence should be
added to A. However, the reduction is still more computationally efficient than</p>
      <p>(a) Real data experiments.
(b) Numerical data experiments.</p>
      <p>Dataset</p>
      <p>
        BK
LO
NT
PO
PT
PW
PY
QU
TZ
VY
computing the intersection of antichains in a poset by means of a scaling as it
is discussed in the previous paragraph. However, for the reduction it could be
interesting to find the spanning tree with the minimal number of leaves.
Unfortunately, this is an NP-complete task and it thus cannot be applied for increasing
the computational efficiency [
        <xref ref-type="bibr" rid="ref10 ref27">10</xref>
        ]. We should notice here that there is some work
that solves the LCA problem for more general cases, e.g., lattices [
        <xref ref-type="bibr" rid="ref11 ref28">11</xref>
        ] or partially
ordered sets [
        <xref ref-type="bibr" rid="ref26 ref9">9</xref>
        ]. However, it is an open question whether these works can help to
efficiently compute intersection of antichains in the corresponding structures.
      </p>
      <p>Experiments and Discussion
Several experiments are conducted using publicly available data on a MacBook
with a 1.3GHz Intel Core i5, 4GB of RAM running OS X Yosemite 10.3. We
have used FCAPS2 software developed in C++ for dealing with different kinds of
pattern structures. It can build a concept lattice starting from a standard formal
context or from object descriptions given as antichains of a given tree. The last
one is based on the similarity operation that is discussed above.</p>
      <p>We performed our experiments on two datasets from different domains namely
DBLP and biomedical data. In these datasets, object descriptions are given as
subsets of attributes. A taxonomy of the attributes is already known based on
domain knowledge. We compute a concept lattice in two different ways. In the
first one, we directly compute the concept lattice from the antichains in a
taxonomy. In the second one we scale every description to the corresponding filter of
the taxonomy. After this we do not rely on the taxonomy and process the scaled
context with standard FCA.</p>
      <p>The first data set is DBLP, from which we extracted a subset of papers with
their keywords published in conferences in Machine Learning domain. The
taxonomy used for classifying such kind of triples is ACM Computing Classification
System (ACCS)3.</p>
      <p>The second data set belongs to the domain of life sciences. It contains
information about drugs, their side effects (SIDER4), and their categories
(DrugBank5). The taxonomies related to this dataset are MedDRA 6 for side effects
and MeSH7 for drug categories.</p>
      <p>The parameters of the datasets and the computational results are shown in
Table 1a. It can be noticed that for DBLP the context consists of 5293 objects
and 33207 attributes, in the taxonomy of the attributes we have 33198 leaves
meaning that most of attributes are mutually incomparable. It took 45 seconds
to produce a lattice having 10134 concepts directly from the descriptions given
by antichains of the taxonomy. To produce the same lattice starting from a
scaled context the program only takes 21 seconds. However, if we consider the
biomedical data, the approach based on antichains is better. Indeed, it takes
145 seconds, while the computation starting from the scaled contexts takes 162
seconds. In this case, the dataset contains 1490 attributes with 933 leaves. Thus,
the direct approach works faster if the number of leaves is significantly smaller
than the number of vertices. It is worth noticing that the size of antichains is
significantly smaller than the size of the filters, and thus our approach is more
efficient. However, when the number of leaves is comparable to the number of
vertices, our approach is slower. Although in this case our approach has the same
2 https://github.com/AlekseyBuzmakov/FCAPS
3 https://www.acm.org/about/class/2012
4 http://sideeffects.embl.de/
5 http://www.drugbank.ca/
6 http://meddra.org/
7 http://www.ncbi.nlm.nih.gov/mesh/
computational complexity as the scaling approach, the antichain intersection
problem requires more efforts than the set intersection.</p>
      <p>Since the efficiency of the antichain approach is high for the trees with a
low number of leaves, we can use this method to increase efficiency of standard
FCA for special kind of contexts. In a context (G, M, I) an attribute m1 can be
considered as an ancestor of another attribute m2 if any object containing the
attribute m2 also contains the attribute m1. Accordingly we can construct an
attribute tree T and rely on it for computing intersection operation. In this case
the set of attributes M and the set of vertices of T are the same and |M | = |T |.
The second part of the experiment was based on this observation.</p>
      <p>
        We used numerical data from Bilkent University in the second part of the
experiments8. It was converted to formal contexts by the standard interodinal
scaling. The scaled attributes are closely connected, i.e., there are a lot of pairs
of attributes (m1, m2) such that the set of objects described by m1 is a subset
of objects described by m2, i.e., (m1)0 ⊆ (m2)0. Thus, we can say that m1 ≤ m2.
Using this property we built attribute trees from the scaled contexts. These
trees have many more vertices than leaves, thus, the approach introduced in this
paper should be efficient. We compare our approach with the scaling approach.
Moreover, recently, it was shown that interval pattern structures (IPS) can be
efficiently used to process such kind of data [
        <xref ref-type="bibr" rid="ref12 ref29">12</xref>
        ]. Accordingly we also compared
our approach with IPS.
      </p>
      <p>The results are shown in Table 1b. Compared to Table 1a it has several
additional columns. First of all, since for numerical data we typically got large
lattices, in most of the cases we considered only part of the objects. The actual
number of used objects is given in the column |G|, while the total size of the
dataset is given in the column ‘#objects’, e.g., BK dataset contained 96 objects,
while we have used only 35. In addition for every dataset we also provide the
number of the numerical attributes, e.g., BK has 5 numerical attributes. We
should notice that when we built the lattice from some datasets by standard
FCA, the lattice was so large that the memory was swapping and we stopped
the computation. It was not the case for our approach since antichains requires
less memory to store than the corresponding filters. The fact of swapping is
shown by ‘*’ next to computational time in column tK. In addition we also show
the time for IPS to process the same dataset. For example, the processing of BK
dataset took 37 seconds by our approach, took more than 42 seconds by standard
FCA and memory had started swapping, and took 19 seconds by IPS.</p>
      <p>This experiment shows that our approach takes not only less time to
compute concept lattice, but also requires less memory, since there is no memory
swapping. We can also see that the computation time for IPS is smaller than
for our approach. However, IPS is only applicable for numerical data, while our
approach can be applied for all cases when attributes of a context are structured.
For example, we can deal with graph data scaled to the set of frequent subgraphs
where many such attributes are subgraphs of other attributes.
8 http://funapp.cs.bilkent.edu.tr/DataSets/</p>
      <p>Conclusion
In this paper we recalled two approaches for dealing with structured attributes
and explained how we can compute intersection of antichains in tree-shaped
posets of attributes, an essential operation for working with structured attributes.
Our experiments showed the computational efficiency of the proposed approach.
Accordingly, we are interested in applying our approach to other kinds of data
such as graph data. Moreover, the generalization of our approach to other kinds
of posets is also of high interest.</p>
      <p>References
Adaricheva, Kira, 217
Akhmatnurov, Marat, 99
Alam, Mehwish, 23, 241
Albano, Alexandre, 73
Antoni, Ľubomír, 147
Bartl, Eduard, 229
Borchmann, Daniel, 181
Buzmakov, Aleksey, 241
Cabrera, Inmaculada P., 147
Chornomaz, Bogdan, 73
Cleophas, Loek, 87
Cordero, Pablo, 217
Derras, Mustapha, 111
Deruelle, Laurent, 111
Dubois, Didier, 3
Enciso, Manuel, 217
Gnatyshak, Dmitry V., 47
Huchard, Marianne, 111
Ignatov, Dmitry I., 47, 99</p>
      <sec id="sec-13-1">
        <title>Author Index</title>
        <p>Lumpe, Lars, 171
Makhalova, Tatyana P., 59
Miclet, Laurent, 159
Miralles, André, 111
Molla, Guilhem, 111
Mora, Angel, 217
Napoli, Amedeo, 23, 241
Nebut, Clémentine, 111
Nicolas, Jacques, 159
Nourine, Lhouari, 9, 123
Nxumalo, Madoda, 87
Ojeda-Aciego, Manuel, 147
Osmuk, Matthieu, 23
Pasi, Gabriella, 1
Priss, Uta, 135
Quilliot, Alain, 123
Ramon, Jan, 7
Revenko, Artem, 35
Rodríguez-Lorenzo, Estrella, 217
Sailanbayev, Alibek, 241
Schmidt, Stefan E., 171
Toussaint, Hélène, 123
Uno, Takeaki, 5
Watson, Bruce W., 87
Zudin, Sergey, 47
CLA 2015, Proceedings of the Twelfth International
Conference on Concept Lattices and Their Applications</p>
      </sec>
    </sec>
    <sec id="sec-14">
      <title>UBP, Limos, Campus Universitaire des Cézeaux, 63178 AUBIERE CEDEX – FRANCE</title>
    </sec>
    <sec id="sec-15">
      <title>Place, year, edition:</title>
      <p>50</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Eduard</given-names>
            <surname>Bartl</surname>
          </string-name>
          , Radim Belohlavek, Jan Konecny, and
          <string-name>
            <given-names>Vilem</given-names>
            <surname>Vychodil</surname>
          </string-name>
          .
          <article-title>Isotone Galois connections and concept lattices with hedges</article-title>
          .
          <source>In IEEE IS</source>
          <year>2008</year>
          ,
          <article-title>Int</article-title>
          .
          <source>IEEE Conference on Intelligent Systems</source>
          , pages
          <fpage>15</fpage>
          -
          <lpage>24</lpage>
          -15-28, Varna, Bulgaria,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Eduard</given-names>
            <surname>Bartl</surname>
          </string-name>
          and
          <string-name>
            <given-names>Jan</given-names>
            <surname>Konecny</surname>
          </string-name>
          .
          <article-title>Formal L-concepts with Rough Intents</article-title>
          .
          <source>In CLA 2014: Proceedings of the 11th International Conference on Concept Lattices and Their Applications</source>
          , pages
          <fpage>207</fpage>
          -
          <lpage>218</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Radim</given-names>
            <surname>Belohlavek</surname>
          </string-name>
          .
          <article-title>Reduction and simple proof of characterization of fuzzy concept lattices</article-title>
          .
          <source>Fundamenta Informaticae</source>
          ,
          <volume>46</volume>
          (
          <issue>4</issue>
          ):
          <fpage>277</fpage>
          -
          <lpage>285</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Radim</given-names>
            <surname>Belohlavek</surname>
          </string-name>
          .
          <source>Fuzzy Relational Systems: Foundations and Principles</source>
          . Kluwer Academic Publishers, Norwell, USA,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Radim</given-names>
            <surname>Belohlavek</surname>
          </string-name>
          , Tatana Funiokova´, and
          <string-name>
            <given-names>Vilem</given-names>
            <surname>Vychodil</surname>
          </string-name>
          .
          <article-title>Fuzzy closure operators with truth stressers</article-title>
          .
          <source>Logic Journal of the IGPL</source>
          ,
          <volume>13</volume>
          (
          <issue>5</issue>
          ):
          <fpage>503</fpage>
          -
          <lpage>513</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Radim</given-names>
            <surname>Belohlavek</surname>
          </string-name>
          and
          <string-name>
            <given-names>Jan</given-names>
            <surname>Konecny</surname>
          </string-name>
          .
          <article-title>A logic of attribute containment</article-title>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Radim</given-names>
            <surname>Belohlavek</surname>
          </string-name>
          and
          <string-name>
            <given-names>Vilem</given-names>
            <surname>Vychodil</surname>
          </string-name>
          .
          <article-title>A logic of graded attributes</article-title>
          . submitted to Artificial Intelligence .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Radim</given-names>
            <surname>Belohlavek</surname>
          </string-name>
          and
          <string-name>
            <given-names>Vilem</given-names>
            <surname>Vychodil</surname>
          </string-name>
          .
          <article-title>Reducing the size of fuzzy concept lattices by hedges</article-title>
          .
          <source>In FUZZ-IEEE</source>
          <year>2005</year>
          ,
          <source>The IEEE International Conference on Fuzzy Systems</source>
          , pages
          <fpage>663</fpage>
          -
          <lpage>668</lpage>
          ,
          <string-name>
            <surname>Reno</surname>
          </string-name>
          (Nevada, USA),
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Radim</given-names>
            <surname>Belohlavek</surname>
          </string-name>
          and
          <string-name>
            <given-names>Vilem</given-names>
            <surname>Vychodil</surname>
          </string-name>
          .
          <article-title>Fuzzy concept lattices constrained by hedges</article-title>
          .
          <source>JACIII</source>
          ,
          <volume>11</volume>
          (
          <issue>6</issue>
          ):
          <fpage>536</fpage>
          -
          <lpage>545</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>Radim</given-names>
            <surname>Belohlavek</surname>
          </string-name>
          and
          <string-name>
            <given-names>Vilem</given-names>
            <surname>Vychodil</surname>
          </string-name>
          .
          <article-title>Formal concept analysis and linguistic hedges</article-title>
          .
          <source>Int. J. General Systems</source>
          ,
          <volume>41</volume>
          (
          <issue>5</issue>
          ):
          <fpage>503</fpage>
          -
          <lpage>532</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>Bernard</given-names>
            <surname>Ganter</surname>
          </string-name>
          and
          <string-name>
            <given-names>Rudolf</given-names>
            <surname>Wille</surname>
          </string-name>
          .
          <source>Formal Concept Analysis - Mathematical Foundations</source>
          . Springer,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Petr</surname>
          </string-name>
          <article-title>Ha´jek. Metamathematics of Fuzzy Logic (Trends in Logic)</article-title>
          . Springer, November
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Petr</surname>
          </string-name>
          <article-title>Ha´jek. On very true</article-title>
          .
          <source>Fuzzy Sets and Systems</source>
          ,
          <volume>124</volume>
          (
          <issue>3</issue>
          ):
          <fpage>329</fpage>
          -
          <lpage>333</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Jan</surname>
            <given-names>Konecny</given-names>
          </string-name>
          ,
          <article-title>Jes u´s Medina and Manuel Ojeda-Aciego Multi-adjoint concept lattices with heterogeneous conjunctors and hedges</article-title>
          .
          <source>Annals of Mathematics and Artificial Intelligence</source>
          ,
          <volume>72</volume>
          (
          <issue>1</issue>
          ):
          <fpage>73</fpage>
          -
          <lpage>89</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>Jan</given-names>
            <surname>Konecny</surname>
          </string-name>
          .
          <article-title>Isotone fuzzy Galois connections with hedges</article-title>
          .
          <source>Information Sciences</source>
          ,
          <volume>181</volume>
          (
          <issue>10</issue>
          ):
          <fpage>1804</fpage>
          -
          <lpage>1817</lpage>
          ,
          <year>2011</year>
          . Special Issue on Information Engineering Applications Based on Lattices.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>Vilem</given-names>
            <surname>Vychodil</surname>
          </string-name>
          .
          <article-title>Truth-depressing hedges and BL-logic</article-title>
          .
          <source>Fuzzy Sets and Systems</source>
          ,
          <volume>157</volume>
          (
          <issue>15</issue>
          ):
          <fpage>2074</fpage>
          -
          <lpage>2090</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. Morgan Ward and
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Dilworth</surname>
          </string-name>
          .
          <article-title>Residuated lattices</article-title>
          .
          <source>Transactions of the American Mathematical Society</source>
          ,
          <volume>45</volume>
          :
          <fpage>335</fpage>
          -
          <lpage>354</lpage>
          ,
          <year>1939</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          1.
          <string-name>
            <surname>Ganter</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          :
          <article-title>Pattern structures and their projections</article-title>
          .
          <source>In: ICCS. LNCS 2120</source>
          , Springer (
          <year>2001</year>
          )
          <fpage>129</fpage>
          -
          <lpage>142</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          2.
          <string-name>
            <surname>Carpineto</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romano</surname>
          </string-name>
          , G.:
          <article-title>A lattice conceptual clustering system and its application to browsing retrieval</article-title>
          .
          <source>Machine Learning 24(2)</source>
          (
          <year>1996</year>
          )
          <fpage>95</fpage>
          -
          <lpage>122</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          3.
          <string-name>
            <surname>Carpineto</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romano</surname>
          </string-name>
          , G.:
          <article-title>Concept Data Analysis: Theory and Applications</article-title>
          . John Wiley &amp; Sons, Chichester, UK (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          4.
          <string-name>
            <surname>Alam</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Napoli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Interactive exploration over RDF data using Formal Concept Analysis</article-title>
          .
          <source>In: International Conference on Data Science and Advanced Analytics</source>
          ,
          <string-name>
            <surname>DSAA</surname>
          </string-name>
          <year>2015</year>
          , Paris, France, October 19 - October 21,
          <year>2015</year>
          , IEEE (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          5.
          <string-name>
            <surname>Caspard</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leclerc</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monjardet</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Finite Ordered Sets</article-title>
          . Cambridge University Press, Cambridge, UK (
          <year>2012</year>
          )
          <article-title>First published in French as “Ensembles ordonn´es finis : concepts</article-title>
          ,
          <source>r´esultats et usages”</source>
          ,
          <year>Springer 2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          6.
          <string-name>
            <surname>Pichon</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenca</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guillet</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>J.W.</given-names>
          </string-name>
          :
          <article-title>Un algorithme de partition d'un produit direct d'ordres totaux en un nombre fini de chaˆınes</article-title>
          . Math´ematiques,
          <source>Informatique et Sciences Humaines</source>
          <volume>125</volume>
          (
          <year>1994</year>
          )
          <fpage>5</fpage>
          -
          <lpage>15</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          7.
          <string-name>
            <surname>Ganter</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wille</surname>
          </string-name>
          , R.:
          <source>Formal Concept Analysis: Mathematical Foundations</source>
          . Springer, Berlin/Heidelberg (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          8.
          <string-name>
            <surname>Gabow</surname>
            ,
            <given-names>H.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bentley</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tarjan</surname>
            ,
            <given-names>R.E.</given-names>
          </string-name>
          :
          <article-title>Scaling and Related Techniques for Geometry Problems</article-title>
          .
          <source>In: Proc. Sixt. Annu. ACM Symp. Theory Comput. STOC '84</source>
          , New York, NY, USA, ACM (
          <year>1984</year>
          )
          <fpage>135</fpage>
          -
          <lpage>143</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          9.
          <string-name>
            <surname>Bender</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Farach-Colton</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pemmasani</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Skiena</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sumazin</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Lowest common ancestors in trees and DAGs</article-title>
          .
          <source>J. Algorithms</source>
          <volume>57</volume>
          (
          <issue>2</issue>
          ) (
          <year>2005</year>
          )
          <fpage>75</fpage>
          -
          <lpage>94</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          10.
          <string-name>
            <surname>Salamon</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wiener</surname>
          </string-name>
          , G.:
          <article-title>On finding spanning trees with few leaves</article-title>
          .
          <source>Inf. Process. Lett</source>
          .
          <volume>105</volume>
          (
          <issue>5</issue>
          ) (
          <year>2008</year>
          )
          <fpage>164</fpage>
          -
          <lpage>169</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          11. A¨
          <string-name>
            <surname>ıt-Kaci</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boyer</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lincoln</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nasr</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Efficient Implementation of Lattice Operations</article-title>
          .
          <source>ACM Trans. Program. Lang. Syst</source>
          .
          <volume>11</volume>
          (
          <issue>1</issue>
          ) (
          <year>January 1989</year>
          )
          <fpage>115</fpage>
          -
          <lpage>146</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          12.
          <string-name>
            <surname>Kaytoue</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Napoli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Duplessis</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Mining gene expression data with pattern structures in formal concept analysis</article-title>
          .
          <source>Inf. Sci. (Ny)</source>
          .
          <volume>181</volume>
          (
          <issue>10</issue>
          ) (
          <year>2011</year>
          )
          <fpage>1989</fpage>
          -
          <lpage>2001</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <surname>Clermont-Ferrand</surname>
          </string-name>
          , France,
          <year>2015</year>
          , 1st
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>