<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Probabilistic Ontological Data Exchange with Bayesian Networks</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, Otto-von-Guericke Universita ̈t Magdeburg</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science, University of Oxford</institution>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Dept. of Comp. Sci. and Eng.</institution>
          ,
          <addr-line>Univ. Nacional del Sur and CONICET</addr-line>
          ,
          <country country="AR">Argentina</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We study the problem of exchanging probabilistic data between ontology-based probabilistic databases. The probabilities of the probabilistic source databases are compactly encoded via Boolean formulas with the variables adhering to the dependencies imposed by a Bayesian network, which are closely related to the management of provenance. For the ontologies and the ontology mappings, we consider different kinds of existential rules from the Datalog+/family. We provide a complete picture of the computational complexity of the problem of deciding whether there exists a probabilistic (universal) solution for a given probabilistic source database relative to a (probabilistic) ontological data exchange problem. We also analyze the complexity of answering UCQs (unions of conjunctive queries) in this framework.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Large volumes of uncertain data are best modeled, stored, and processed in
probabilistic databases [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Enriching databases with terminological knowledge encoded in
ontologies has recently gained increasing importance in the form of ontology-based data
access (OBDA) [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. A crucial problem in OBDA is to integrate and exchange
knowledge. Not only in the context of OBDA, but also in the area of the Semantic Web, there
are distributed ontologies that we may have to map and integrate to enable query
answering over them. Here, apart from the uncertainty attached to source databases, there
may also be uncertainty regarding the ontology mappings establishing the proper
correspondence between items in the source ontology and items in the target ontology. This
especially happens when the mappings are created automatically.
      </p>
      <p>
        Data exchange [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] is an important theoretical framework used for studying
datainteroperability tasks that require data to be transferred from existing databases to a
target database that comes with its own (independently created) schema and schema
constraints. The expressivity of the data exchange framework goes beyond the
classical data integration framework [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. For the translation, schema mappings are used,
which are declarative specifications that describe the relationship between two database
schemas. In classical data exchange, we have a source database, a target database, a
deterministic mapping, and deterministic target dependencies. Recently, a framework for
probabilistic data exchange [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] has been proposed where the classical data exchange
framework based on weakly acyclic existential rules has been extended to consider a
probabilistic source database and a probabilistic source-to-target mapping.
      </p>
      <p>
        In this paper, we study an expressive extension of the probabilistic data exchange
framework in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], where the source and the target are ontological knowledge bases,
each consisting of a probabilistic database and a deterministic ontology describing
terminological knowledge about the data stored in the database. The two ontologies
and the mapping between them are expressed via existential rules. Our extension of
the data exchange framework is strongly related to exchanging data between
incomplete databases, as proposed in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], which considers an incomplete deterministic source
database in the data exchange problem. However, in that work, the databases are
deterministic, and the mappings and the target database constraints are full existential rules
only. In our complexity analysis in this paper, we consider a host of different classes
of existential rules, including some subclasses of full existential rules. In addition, our
source is a probabilistic database relative to an underlying ontology.
      </p>
      <p>
        Our work in this paper is also related to the recently proposed knowledge base
exchange framework [
        <xref ref-type="bibr" rid="ref1 ref2">2, 1</xref>
        ], which allows knowledge to be exchanged between
deterministic DL-LiteRDF S and DL-LiteR ontologies. In this paper, besides considering
probabilistic source databases, we are also using more expressive ontology languages, since
already linear existential rules from the Datalog+/– family are strictly more expressive
than the description logics (DLs) DL-LiteX of the DL-Lite family [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] as well as their
extensions with n-ary relations DLR-LiteX . Guarded existential rules are sufficiently
expressive to model the tractable DL E L [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ] (and E LIf [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]). Note that existential rules
are also known as tuple-generating dependencies (TGDs) and Datalog+/– rules [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
The main contributions of this paper are summarized as follows.
      </p>
      <p>We introduce deterministic and probabilistic ontological data exchange problems,
where probabilistic knowledge is exchanged between two Bayesian network-based
probabilistic databases relative to their underlying deterministic ontologies, and the
deterministic and probabilistic mapping between the two ontologies is defined via
deterministic and probabilistic existential mapping rules, respectively.</p>
      <p>We provide an in-depth analysis of the data and combined complexity of deciding the
existence of probabilistic (universal) solutions and obtain a (fairly) complete picture of
the data complexity, general combined complexity, bounded-arity (ba) combined, and
fixed-program combined (fp) complexity for the main sublanguages of the Datalog+/–
family. We also delineate some tractable special cases, and provide complexity results
for exact UCQ (union of conjunctive queries) answering.</p>
      <p>
        For the complexity analysis, we consider a compact encoding of probabilistic source
databases and mappings, which is used in the area of both incomplete and probabilistic
databases, and also known as data provenance or data lineage [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref22">14, 12, 13, 22</xref>
        ]. Here,
we consider data provenance for probabilistic data that is structured according to an
underlying Bayesian network.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>We assume infinite sets of constants C, (labeled) nulls N, and regular variables V.
A term t is a constant, null, or variable. An atom has the form p(t1; : : : ; tn), where p is
an n-ary predicate, and t1; : : : ; tn are terms. Conjunctions of atoms are often identified
with the sets of their atoms. An instance I is a (possibly infinite) set of atoms p(t),
where t is a tuple of constants and nulls. A database D is a finite instance that contains
only constants. A homomorphism is a substitution h : C [ N [ V ! C [ N [ V that is
the identity on C. We assume familiarity with conjunctive queries (CQs). The answer
to a CQ q over an instance I is denoted q(I). A Boolean CQ (BCQ) q evaluates to true
over I, denoted I j= q, if q(I) 6= ?.</p>
      <p>A tuple-generating dependency (TGD) is a first-order formula 8X '(X) !
9Y p(X; Y), where X [ Y V, '(X) is a conjunction of atoms, and p(X; Y) is
an atom. We call '(X) the body of , denoted body ( ), and p(X; Y) the head of ,
denoted head ( ). We consider only TGDs with a single atom in the head, but our results
can be extended to TGDs with a conjunction of atoms in the head. An instance I
satisfies , written I j= , if the following holds: whenever there exists a homomorphism h
such that h('(X)) I, then there exists h0 hjX, where hjX is the restriction of h
to X, such that h0(p(X; Y)) 2 I. A negative constraint (NC) is a first-order formula
8X '(X) ! ?, where X V, '(X) is a conjunction of atoms, called the body of ,
denoted body ( ), and ? denotes the truth constant false. An instance I satisfies ,
denoted I j= , if there is no homomorphism h such that h('(X)) I. Given a set of
TGDs and NCs, I satisfies , denoted I j= , if I satisfies each TGD and NC of .
For brevity, we omit the universal quantifiers in front of TGDs and NCs.</p>
      <p>
        Given a database D and a set of TGDs and NCs, the answers that we consider are
those that are true in all models of D and . Formally, the models of D and , denoted
mods(D; ), is the set of instances fI j I D and I j= g. The answer to a CQ q
relative to D and is defined as the set of tuples ans(q; D; ) = TI2mods(D; )ft j t 2
q(I)g. The answer to a BCQ q is true, denoted D [ j= q, if ans(q; D; ) 6= ?.
The problem of CQ answering is defined as follows: given a database D, a set of
TGDs and NCs, a CQ q, and a tuple of constants t, decide whether t 2 ans(q; D; ).
Following Vardi’s taxonomy [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], the combined complexity of BCQ answering is
calculated by considering all the components, i.e., the database, the set of dependencies,
and the query, as part of the input. The bounded-arity combined complexity (or
simply ba-combined complexity) is calculated by assuming that the arity of the underlying
schema is bounded by an integer constant. Notice that in the context of description
logics (DLs), whenever we refer to the combined complexity in fact we refer to the
ba-combined complexity since, by definition, the arity of the underlying schema is at
most two. The fixed-program combined complexity (or simply fp-combined complexity)
is calculated by considering the set of TGDs and NCs as fixed.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Ontological Data Exchange</title>
      <p>In this section, we define the notions of deterministic and probabilistic ontological data
exchange. The source (resp., target) of the deterministic/probabilistic ontological data
exchange problems that we consider in this paper is a probabilistic database (resp.,
probabilistic instance), each relative to a deterministic ontology. Here, a probabilistic
database (resp., probabilistic instance) over a schema S is a probability space P r =
(I; ) such that I is the set of all (possibly infinitely many) databases (resp., instances)
over S, and : I ! [0; 1] is a function that satisfies PI2I (I) = 1.
3.1
Ontological data exchange formalizes data exchange from a probabilistic database
relative to a source ontology s (consisting of TGDs and NCs) over a schema S to a
probabilistic target instance Prt relative to a target ontology t (consisting of a set of
TGDs and NCs) over a schema T via a (source-to-target) mapping (also consisting of a
set of TGDs and NCs). More specifically, an ontological data exchange (ODE) problem
M= (S, T, s, t, st) consists of (i) a source schema S, (ii) a target schema T disjoint
from S, (iii) a finite set s of TGDs and NCs over S (called source ontology), (iv) a
finite set t of TGDs and NCs over T (called target ontology), and (v) a finite set st of
TGDs and NCs over S [ T (called (source-to-target) mapping) such that body( ) and
head( ) are defined over S [ T and T, respectively.</p>
      <p>Ontological data exchange with deterministic databases is based on defining a
target instance J over T as being a solution for a deterministic source database I over S
relative to an ODE problem M = (S; T; s; t; st), if (I [ J ) j= s [ t [ st. We
denote by SolM the set of all such pairs (I; J ). Among the possible deterministic
solutions J to a deterministic source database I relative to M in SolM, we prefer universal
solutions, which are the most general ones carrying only the necessary information for
data exchange, i.e., those that transfer only the source database along with the relevant
implicit derivations via s to the target ontology. A universal solution can be
homomorphically mapped to all other solutions leaving the constants unchanged. Hence, a
deterministic target instance J over S is a universal solution for a deterministic source
database I over T relative to a schema mapping M, if (i) J is a solution, and (ii) for
each solution J 0 for I relative to M, there is a homomorphism h : J ! J 0. We denote
by USol M ( SolM) the set of all pairs (I; J ) of deterministic source databases I and
target instances J such that J is a universal solution for I relative to M.</p>
      <p>When considering probabilistic databases and instances, a joint probability space Pr
over the solution relation SolM and the universal solution relation USolM must exist.
More specifically, a probabilistic target instance Prt = (J ; t) is a probabilistic solution
(resp., probabilistic universal solution) for a probabilistic source database Prs = (I; s)
relative to an ODE problem M = (S; T; s; t; st), if there exists a probability space
Pr = (I J ; ) such that (i) the left and right marginals of Pr are Prs and Prt,
respectively, i.e., (i.a) s(I) = PJ2J (I; J ) for all I 2 I, (i.b) t(J ) = PI2I (I; J ) for
all J 2 J ; and (ii) (I; J ) = 0 for all (I; J ) 62 SolM (resp., (I; J ) 62 USolM). Note that
this intuitively says that all non-solutions (I; J ) have probability zero and the existence
of a solution does not exclude that some source databases with probability zero have no
corresponding target instance.</p>
      <p>Example 1. An ontological data exchange (ODE) problem M = (S; T; s; t; st)
is given by the source schema S = fResearcher=2; ResearchArea=2; Publication=3g
(the number after each predicate denotes its arity), the target schema T =
fUResearchArea=3; Lecturer=2g, the source ontology s = f s; sg, the target ontology t =
f t, tg, and the mapping st = f st; mg, where:
s : Publication(X; Y; Z) ! ResearchArea(X; Y);
s : Researcher(X; Y) ^ ResearchArea(X; Y) ! ?;
t : UResearchArea(U; D; T) ! 9Z Lecturer(T; Z);
t : Lecturer(X; Y) ^ Lecturer(Y; X) ! ?;</p>
      <p>Possible source database facts
ra Researcher(Alice, UnivOx)
rp Researcher(Paul, UnivOx)
paml Publication(Alice, ML, JMLR)
padb Publication(Alice, DB, TODS)
ppdb Publication(Paul, DB, TODS)
ppai Publication(Paul, AI, AIJ)
Probabilistic source database Prs = (I; s)
I1 = fra,rp,paml,ppdb,aaml,apdbg 0.5
I2 = fra,rp,paml,ppai,aaml,apaig 0.2
I3 = fra,rp,padb,ppai,aadb,apaig 0.15
I4 = fra,rp,padb,ppdb,aadb,apdbg 0.075
I5 = fra,padb,aadbg 0.075
Probabilistic target instance Prt1 = (J1; t1 )
J1 = fuml,udb,lml,ldbg 0.5
J2 = fuml,uai,lml,laig 0.2
J3 = fuai,udb,lai,ldbg 0.15
J4 = fudb,ldbg 0.15</p>
      <p>Derived source database facts
aaml ResearchArea(Alice, ML)
aadb ResearchArea(Alice, DB)
apdb ResearchArea(Paul, DB)
apai ResearchArea(Paul, AI)</p>
      <p>Possible target instance facts
uml UResearchArea(UnivOx, N1, ML)
uai UResearchArea(UnivOx, N2, AI)
udb UResearchArea(UnivOx, N3, DB)
lml Lecturer(ML, N4)
lai Lecturer(AI, N5)
ldb Lecturer(DB, N6)
J5 = fuml,udb,lml,ldbg 0.55
J6 = fuml,uai,lml,laig 0.1
J7 = fuml,uai,udb,lml,lai,ldbg 0.35
Probabilistic target instance Prt2 = (J2; t2 )
(N1; : : : ; N6 are nulls); both are probabilistic solutions, but only Prt1 is universal.
Given the probabilistic source database in Table 1, two probabilistic instances Prt1 =
(J1; t1 ) and Prt2 = (J2; t2 ) that are probabilistic solutions are shown in Table 1.
Note that only Prt1 is also a probabilistic universal solution. Note also that Figures 1
and 2 show the probability spaces over Prt1 and Prt2 , respectively.</p>
      <p>Query answering in ontological data exchange is performed over the target ontology
and is generalized from deterministic data exchange. A union of conjunctive queries (or
UCQ) has the form q(X) = Wk
i=1 9Yi</p>
      <p>i(X; Yi; Ci), where each 9Yi i(X; Yi; Ci)
with i 2 f1; : : : ; kg is a CQ with exactly the variables X and Yi, and the constants
Ci. Given an ODE problem M = (S, T, s; t; st), probabilistic source database
Prs = (I; s), UCQ q(X) = Wik=1 9Yi i(X; Yi; Ci), and tuple t (a ground instance
of X in q) over C, the confidence of t relative to q, denoted conf q(t), in Prs relative to
M is the infimum of Prt(q(t)) subject to all probabilistic solutions Prt for Prs relative
to M. Here, Prt(q(t)) for Prt = (J ; t) is the sum of all t(J ) such that q(t) evaluates
to true in the instance J 2 J (i.e., some BCQ 9Yi i(t; Yi; Ci) with i 2 f1; : : : ; kg
evaluates to true in J ).</p>
      <p>Example 2. Consider again the setting of Example 1, and let q be a UCQ of a
student who wants to know whether she can study either machine learning or artificial
intelligence at the University of Oxford: q() = 9X; Z(Lecturer(AI; X) ^
UResearchArea(UnivOx; Z; AI)) _ 9X; Z(Lecturer(ML; X) ^ UResearchArea(UnivOx; Z; ML)).
Then, q yields the probabilities 0:85 and 1 on Prt1 and Prt2 , respectively.
3.2</p>
      <sec id="sec-3-1">
        <title>Probabilistic Ontological Data Exchange</title>
        <p>Probabilistic ontological data exchange extends deterministic ontological data exchange
by turning the deterministic source-to-target mapping into a probabilistic
source-totarget mapping, i.e., we have a probability distribution over the set of all subsets of st.
More specifically, a probabilistic ontological data exchange (PODE) problem M =
(S; T; s; t; st; st) consists of (i) a source schema S, (ii) a target schema T
disjoint from S, (iii) a finite set s of TGDs and NCs over S (called source ontology),
(iv) a finite set t of TGDs and NCs over T (called target ontology), (v) a finite set
st of TGDs and NCs over S [ T, and (vi) a function st : 2 st ! [0; 1] such that
P 0 st st( 0) = 1 (called probabilistic (source-to-target) mapping).</p>
        <p>A probabilistic target instance Prt = (J ; t) is a probabilistic solution (resp.,
probabilistic universal solution) for a probabilistic source database Prs = (I; s) relative to
a PODE problem M = (S; T; s; t; st; st), if there exists a probability space Pr =
= (I J 2 st ; ) such that: (i) the three marginals of are s, t, and st, such that:
(i.a) s(I) = PJ2J ; 0 st (I; J; 0) for all I 2 I, (i.b) t(J ) = PI2I; 0 st (I;
J; 0) for all J 2 J , and (i.c) st( 0) = PI2I; J2J (I; J; 0) for all 0 st; and
(ii) (I; J; 0) = 0 for all (I; J ) 62 Sol (S;T; 0) (resp., (I; J ) 62 USol (S;T; 0)).</p>
        <p>Using probabilistic (universal) solutions for probabilistic source databases relative
to PODE problems, the semantics of UCQs is lifted to PODE problems as follows.
Given a PODE problem M = (S, T, s; t; st; st), a probabilistic source database
Prs = (I; s), a UCQ q(X) = Wik=1 9Yi i(X; Yi; Ci), and a tuple t (a ground
instance of X in q) over C, the confidence of t relative to q, denoted conf q(t), in Prs
relative to M is the infimum of Prt(q(t)) subject to all probabilistic solutions Prt for Prs
relative to M. Here, Prt(q(t)) for Prt = (J ; t) is the sum of all t(J ) such that q(t)
evaluates to true in the instance J 2 J .
3.3</p>
      </sec>
      <sec id="sec-3-2">
        <title>Compact Encoding</title>
        <p>We use a compact encoding of both probabilistic databases and probabilistic
mappings, which is based on annotating facts, TGDs, and NCs by probabilistic events in
a Bayesian network, rather than explicitly specifying the whole probability space.</p>
        <p>We first define annotations and annotated atoms. Let e1; : : : ; en be n 1
elementary events. A world w is a conjunction `1 ^ ^`n, where each `i, i 2 f1; : : : ; ng, is
either the elementary event ei or its negation :ei. An annotation is any Boolean
combination of elementary events (i.e., all elementary events are annotations, and if 1 and 2</p>
        <p>Possible source database facts Annotation
ra Researcher(Alice, UnivOx) true
rp Researcher(Paul, UnivOx) e1_ e2_ e3_ e4
paml Publication(Alice, ML, JMLR) e1_ e2
padb Publication(Alice, DB, TODS) : e1 ^ : e2
ppdb Publication(Paul, DB, TODS) e1_ (: e2 ^ : e3^ e4)
ppai Publication(Paul, AI, AIJ) (: e1^ e2) _ (: e1^ e3)
are annotations, then also : 1 and 1 ^ 2). An annotated atom has the form a : ,
where a is an atom, and is an annotation.</p>
        <p>The compact encoding of probabilistic databases can then be defined as follows.
Note that this encoding is also underlying our complexity analysis in Section 4. A set A
of annotated atoms along with a probability (w) 2 [0; 1] for every world w compactly
encodes a probabilistic database P r = (I; ) whenever: (i) the probability of
every annotation is the sum of the probabilities of all worlds in which is true, and
(ii) the probability of every subset-maximal database fa1; : : : ; amg 2 I 4 such that
fa1 : 1; : : : ; am : mg A for some annotations 1; : : : ; m is the probability of
1 ^ ^ m (and the probability of every other database in I is 0).</p>
        <p>We assume that the probability distributions for the underlying events are given by
a Bayesian network, which is usually used for compactly specifying a joint probability
space, encoding also a certain causal structure between the variables. The following
example in Tables 2 and 3 illustrates the compact encoding of probabilistic source
databases via Boolean annotations relative to an underlying Bayesian network.</p>
        <p>If the mapping is probabilistic as well, then we use two disjoint sets of elementary
events, one for encoding the probabilistic source database and the other one for the
mapping. In this way, the probabilistic source database is independent from the
probabilistic mapping. We now define the compact encoding of probabilistic mappings. An
annotated TGD (resp., NC) has the form : , where is a TGD (resp., NC), and
is an annotation. A set of annotated TGDs and NCs : with 2 st along with
a probability (w) 2 [0; 1] for every world w compactly encodes a probabilistic
mappings st : 2 st ! [0; 1] whenever (i) the probability of every annotation is the sum
of the probabilities of all worlds in which is true, and (ii) the probability st of every</p>
        <sec id="sec-3-2-1">
          <title>4 That is, we do not consider subsets of the databases here.</title>
          <p>subset-maximal f 1; : : : ; kg st such that f 1 : 1; : : : ; k : kg for some
annotations 1; : : : ; k is the probability of 1 ^ ^ k (and the probability st of
every other subset of st is 0).
3.4</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>Computational Problems</title>
        <sec id="sec-3-3-1">
          <title>We consider the following computational problems:</title>
          <p>Existence of a solution (resp., universal solution): Given an ODE or a PODE
problem M and a probabilistic source database Prs, decide whether there exists a
probabilistic (resp., probabilistic universal) solution for Prs relative to M.
Answering UCQs: Given an ODE or a PODE problem M, a probabilistic source
database Prs, a UCQ q(X), and a tuple t over C, compute conf Q(t) in Prs w.r.t. M.
4</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Computational Complexity</title>
      <p>We now analyze the computational complexity of deciding the existence of a
(universal) probabilistic solution for deterministic and probabilistic ontological data exchange
problems. We also delineate some tractable special cases, and we provide some
complexity results for exact UCQ answering for ODE and PODE problems.</p>
      <p>
        We assume some elementary background in complexity theory [
        <xref ref-type="bibr" rid="ref15 ref20">15, 20</xref>
        ]. We now
briefly recall the complexity classes that we encounter in our complexity results. The
complexity classes PSPACE (resp., P, EXP, 2EXP) contain all decision problems that
can be solved in polynomial space (resp., polynomial, exponential, double exponential
time) on a deterministic Turing machine, while the complexity classes NP and NEXP
contain all decision problems that can be solved in polynomial and exponential time
on a nondeterministic Turing machine, respectively; coNP and coNEXP are their
complementary classes, where “Yes” and “No” instances are interchanged. The complexity
class AC0 is the class of all languages that are decidable by uniform families of Boolean
circuits of polynomial size and constant depth. The inclusion relationships among the
above (decision) complexity classes (all currently believed to be strict) are as follows:
AC0
      </p>
      <p>P</p>
      <sec id="sec-4-1">
        <title>NP; coNP</title>
        <p>PSPACE
EXP</p>
      </sec>
      <sec id="sec-4-2">
        <title>NEXP; coNEXP 2EXP</title>
        <p>The (function) complexity class #P is the set of all functions that are computable
by a polynomial-time nondeterministic Turing machine whose output for a given input
string I is the number of accepting computations for I.
4.1</p>
        <sec id="sec-4-2-1">
          <title>Decidability Paradigms</title>
          <p>
            The main (syntactic) conditions on TGDs that guarantee the decidability of CQ
answering are guardedness [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ], stickiness [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ], and acyclicity. Each one of these conditions has
its “weak” counterpart: weak guardedness [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ], weak stickiness [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ], and weak
acyclicity [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ], respectively.
          </p>
          <p>A TGD is guarded if there exists an atom in its body that contains (or “guards”)
all the body variables of . The class of guarded TGDs, denoted G, is defined as the
Data Comb. ba-comb. fp-comb.</p>
          <p>Data Comb. ba-comb. fp-comb.</p>
          <p>L, LF, AF in AC0 PSPACE</p>
          <p>G P 2EXP
WG EXP 2EXP
S, SF in AC0 EXP
F, GF P EXP</p>
          <p>A in AC0 NEXP
WS, WA P 2EXP</p>
          <p>NP
EXP
EXP
NP
NP
NEXP
2EXP</p>
          <p>NP
NP
EXP
NP
NP
NP
NP</p>
          <p>L, LF, AF coNP PSPACE coNP</p>
          <p>G coNP 2EXP EXP
WG EXP 2EXP EXP
S, SF coNP EXP coNP
F, GF coNP EXP coNP</p>
          <p>A coNP coNEXP coNEXP
WS, WA coNP 2EXP 2EXP
coNP
coNP
EXP
coNP
coNP
coNP
coNP
family of all possible sets of guarded TGDs. A key subclass of guarded TGDs are the
so-called linear TGDs with just one body atom (which is automatically a guard), and
the corresponding class is denoted L. Weakly guarded TGDs extend guarded TGDs by
requiring only “harmful” body variables to appear in the guard, and the associated class
is denoted WG. It is easy to verify that L G WG.</p>
          <p>Stickiness is inherently different from guardedness, and its central property can be
described as follows: variables that appear more than once in a body (i.e., join variables)
are always propagated (or “stick”) to the inferred atoms. A set of TGDs that enjoys the
above property is called sticky, and the corresponding class is denoted S. Weak
stickiness is a relaxation of stickiness where only “harmful” variables are taken into account.
A set of TGDs which enjoys weak stickiness is weakly sticky, and the associated class
is denoted WS. Observe that S WS.</p>
          <p>A set of TGDs is acyclic if its predicate graph is acyclic, and the underlying class
is denoted A. In fact, an acyclic set of TGDs can be seen as a nonrecursive set of TGDs.
We say is weakly acyclic if its dependency graph enjoys a certain acyclicity condition,
which actually guarantees the existence of a finite canonical model; the associated class
is denoted WA. Clearly, A WA.</p>
          <p>Another key fragment of TGDs, which deserves our attention, are the so-called
full TGDs, i.e., TGDs without existentially quantified variables, and the corresponding
class is denoted F. If we further assume that full TGDs enjoy linearity, guardedness,
stickiness, or acyclicity, then we obtain the classes LF, GF, SF, and AF, respectively.
4.2</p>
        </sec>
        <sec id="sec-4-2-2">
          <title>Overview of Complexity Results</title>
          <p>
            Our complexity results for deciding the existence of a probabilistic (universal) solution
for both ODE and PODE problems with annotations over events relative to an
underlying Bayesian network are summarized in Fig. 4 for all classes of existential rules
discussed above in the data, combined, ba -combined, and fp-combined complexity (all
entries are completeness results). For L, LF, AF, S, SF, and A in the data complexity,
we obtain tractability when the underlying Bayesian network is a polytree. For all other
cases, hardness holds even when the underlying Bayesian network is a polytree. Finally,
for all classes of existential rules discussed above except for WG, answering UCQs for
both ODE and PODE problems is in #P in the data complexity.
The first result shows that deciding whether there exists a probabilistic (or probabilistic
universal) solution for a probabilistic source database relative to an ODE problem is
complete for C (resp., coC), if BCQ answering for the involved sets of TGDs and NCs
is complete for a deterministic (resp., nondeterministic) complexity class C PSPACE
(resp., C NP), and hardness holds even for ground atomic BCQs. As a corollary, by
the complexity of BCQ answering with TGDs and NCs in Figure 3 [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ], we
immediately obtain the complexity results shown in Figure 4 for deciding the existence of
a probabilistic (universal) solution (in deterministic ontological data exchange) in the
combined, ba-combined, and fp-combined complexity, and for the class WG of TGDs
and NCs in the data complexity. The hardness results hold even when the underlying
Bayesian network is a polytree.
          </p>
          <p>Theorem 1. Given a probabilistic source database P rs relative to a source ontology
s and an ODE problem M = (S; T; s; t; st) such that s [ t [ st belongs to
a class of TGDs and NCs for which BCQ answering is complete for a deterministic
(resp., nondeterministic) complexity class C PSPACE (resp., C NP), and hardness
holds even for ground atomic BCQs, deciding the existence of a probabilistic (universal)
solution for P rs relative to s and M is complete for C (resp., coC). Hardness holds
even when the underlying Bayesian network is a polytree.</p>
          <p>The following result shows that deciding whether there exists a probabilistic
(universal) solution for a probabilistic source database relative to an ODE problem is
complete for coNP in the data complexity, for all classes of sets of TGDs and NCs considered
in this paper, except for WG. Hardness for coNP for the classes G, F, GF, WS, and WA
holds even when the underlying Bayesian network is a polytree.</p>
          <p>Theorem 2. Given a probabilistic source database P rs relative to a source ontology
s and an ODE problem M = (S; T; s; t; st) such that s [ t [ st belongs to
a class among L, LF, AF, G, S, SF, F, GF, A, WS, and WA, deciding whether there
exists a probabilistic (or probabilistic universal) solution for P rs relative to s and
M is coNP-complete in the data complexity. Hardness for coNP for the classes G, F,
GF, WS, and WA holds even when the underlying Bayesian network is a polytree.</p>
          <p>The following result shows that deciding whether there exists a probabilistic (or
probabilistic universal) solution for a probabilistic source database relative to an ODE
problem is in P in the data complexity, if BCQ answering for the involved sets of TGDs
and NCs is first-order rewritable as a Boolean UCQ, and the underlying Bayesian
network is a polytree. As a corollary, by the complexity of BCQ answering with TGDs and
NCs, deciding the existence of a solution is in P for the classes L, LF, AF, S, SF, and A
in the data complexity, if the underlying Bayesian network is a polytree.
Theorem 3. Given a probabilistic source database P rs relative to a source ontology
s, with a polytree as Bayesian network, and an ODE problem M = (S; T; s; t; st)
such that s [ t [ st belongs to a class of TGDs and NCs for which BCQ answering
is first-order rewritable as a Boolean UCQ, deciding whether there exists a
probabilistic (universal) solution for P rs relative to s and M is in P in the data complexity.</p>
          <p>Finally, the following theorem shows that answering UCQs for probabilistic source
databases relative to an ODE problem is complete for #P in the data complexity for all
above classes of existential rules except for WG.</p>
          <p>Theorem 4. Given (i) an ODE problem M = (S; T; t; s; st) such that s [ st [
t belongs to a class among L, LF, AF, G, S, SF, F, GF, A, WS, and WA, and (ii) a
probabilistic source database P rs relative to s such that there exists a solution for P rs
relative to M, (iii) a UCQ Q = q(X) over T, and (iv) a tuple a, computing confQ(a) is
#P-complete in the data complexity.
All the results of Section 4.3 in Theorems 1 and 4 carry over to the case of
probabilistic ontological data exchange. Clearly, the hardness results carry over immediately,
since deterministic ontological data exchange is a special case of probabilistic
ontological data exchange. As for the membership results, we additionally consider the worlds
for the probabilistic mapping, which are iterated through in the data complexity and
guessed in the combined, the ba-combined, and the fp-combined complexity.
5</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Summary and Outlook</title>
      <p>We have defined deterministic and probabilistic ontological data exchange problems,
where probabilistic knowledge is exchanged between two ontologies. The two
ontologies and the mapping between them are defined via existential rules, where the rules for
the mapping are deterministic and probabilistic, respectively. We have given a precise
analysis of the computational complexity of deciding the existence of a probabilistic
(universal) solution for different classes of existential rules in both deterministic and
probabilistic ontological data exchange. We also have delineated some tractable special
cases, and we have provided some complexity results for exact UCQ answering.</p>
      <p>An interesting topic for future research is to further explore the tractable cases of
probabilistic solution existence and whether they can be extended, e.g., by slightly
generalizing the type of the mapping rules. Another issue for future work is to further
analyze the complexity of answering UCQs for different classes of existential rules in
deterministic and probabilistic ontological data exchange.</p>
      <p>
        Acknowledgments. This work was supported by an EU (FP7/2007-2013) Marie-Curie
Intra-European Fellowship (“PRODIMA”), the UK EPSRC grant EP/J008346/1
(“PrOQAW”), the ERC grant 246858 (“DIADEM”), a Yahoo! Research Fellowship, and
funds from Universidad Nacional del Sur and CONICET, Argentina. This paper is a
short version of a paper that appeared in Proc. RuleML 2015 [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Arenas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Botoeva</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryzhikov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Exchanging OWL2 QL knowledge bases</article-title>
          .
          <source>In: Proc. IJCAI</source>
          . pp.
          <fpage>703</fpage>
          -
          <lpage>710</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Arenas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Botoeva</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryzhikov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sherkhonov</surname>
          </string-name>
          , E.:
          <article-title>Exchanging description logic knowledge bases</article-title>
          .
          <source>In: Proc. KR</source>
          . pp.
          <fpage>563</fpage>
          -
          <lpage>567</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Arenas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , Pe´rez, J.,
          <string-name>
            <surname>Reutter</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          :
          <article-title>Data exchange beyond complete data</article-title>
          .
          <source>J. ACM</source>
          <volume>60</volume>
          (
          <issue>4</issue>
          ),
          <volume>28</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>28</lpage>
          :
          <fpage>59</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Least common subsumers and most specific concepts in a description logic with existential restrictions and terminological cycles</article-title>
          .
          <source>In: Proc. IJCAI</source>
          . pp.
          <fpage>364</fpage>
          -
          <lpage>369</lpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brandt</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Pushing the E L envelope</article-title>
          .
          <source>In: Proc. IJCAI</source>
          . pp.
          <fpage>364</fpage>
          -
          <lpage>369</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. Cal`ı,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Gottlob</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Kifer</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Taming the infinite chase: Query answering under expressive relational constraints</article-title>
          .
          <source>J. Artif. Intell. Res</source>
          .
          <volume>48</volume>
          ,
          <fpage>115</fpage>
          -
          <lpage>174</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Cali</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gottlob</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukasiewicz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marnette</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pieris</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          : Datalog+/
          <article-title>-: A family of logical knowledge representation and query languages for new applications</article-title>
          .
          <source>In: Proc. LICS</source>
          . pp.
          <fpage>228</fpage>
          -
          <lpage>242</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. Cal`ı,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Gottlob</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Pieris</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>Towards more expressive ontology languages: The query answering problem</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>193</volume>
          ,
          <fpage>87</fpage>
          -
          <lpage>128</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Giacomo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Tractable reasoning and efficient query answering in description logics: The DL-Lite family</article-title>
          .
          <source>J. Autom. Reasoning</source>
          <volume>39</volume>
          (
          <issue>3</issue>
          ),
          <fpage>385</fpage>
          -
          <lpage>429</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Fagin</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kimelfeld</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolaitis</surname>
            ,
            <given-names>P.G.</given-names>
          </string-name>
          :
          <article-title>Probabilistic data exchange</article-title>
          .
          <source>J. ACM</source>
          <volume>58</volume>
          (
          <issue>4</issue>
          ),
          <volume>15</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          :
          <fpage>55</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Fagin</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolaitis</surname>
            ,
            <given-names>P.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>R.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Popa</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Data exchange: Semantics and query answering</article-title>
          .
          <source>Theor. Comput. Sci</source>
          .
          <volume>336</volume>
          (
          <issue>1</issue>
          ),
          <fpage>89</fpage>
          -
          <lpage>124</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Fuhr</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , Ro¨ lleke, T.:
          <article-title>A probabilistic relational algebra for the integration of information retrieval and database systems</article-title>
          .
          <source>ACM Trans. Inf. Sys</source>
          .
          <volume>15</volume>
          (
          <issue>1</issue>
          ),
          <fpage>32</fpage>
          -
          <lpage>66</lpage>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Green</surname>
            ,
            <given-names>T.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karvounarakis</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tannen</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Provenance semirings</article-title>
          .
          <source>In: Proc. PODS</source>
          . pp.
          <fpage>31</fpage>
          -
          <lpage>40</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Imielinski</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Witold</surname>
            <given-names>Lipski</given-names>
          </string-name>
          , J.:
          <article-title>Incomplete information in relational databases</article-title>
          .
          <source>J. ACM</source>
          <volume>31</volume>
          (
          <issue>4</issue>
          ),
          <fpage>761</fpage>
          -
          <lpage>791</lpage>
          (
          <year>1984</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Johnson</surname>
            ,
            <given-names>D.S.:</given-names>
          </string-name>
          <article-title>A catalog of complexity classes</article-title>
          . In: van Leeuwen,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (ed.)
          <source>Handbook of Theoretical Computer Science</source>
          , vol.
          <source>A, chap. 2</source>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>161</lpage>
          . MIT Press (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Krisnadhi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Data complexity in the E L family of description logics</article-title>
          .
          <source>In: Proc. LPAR</source>
          , LNCS, vol.
          <volume>4790</volume>
          , pp.
          <fpage>333</fpage>
          -
          <lpage>347</lpage>
          . Springer (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Data integration: A theoretical perspective</article-title>
          .
          <source>In: Proc. PODS</source>
          . pp.
          <fpage>233</fpage>
          -
          <lpage>246</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Lukasiewicz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martinez</surname>
            ,
            <given-names>M.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pieris</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simari</surname>
            ,
            <given-names>G.I.</given-names>
          </string-name>
          :
          <article-title>From classical to consistent query answering under existential rules</article-title>
          .
          <source>In: Proc. AAAI</source>
          . pp.
          <fpage>1546</fpage>
          -
          <lpage>1552</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Lukasiewicz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martinez</surname>
            ,
            <given-names>M.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Predoiu</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simari</surname>
            ,
            <given-names>G.I.</given-names>
          </string-name>
          :
          <article-title>Existential rules and Bayesian networks for probabilistic ontological data exchange</article-title>
          .
          <source>In: Proc. RuleML. LNCS</source>
          , vol.
          <volume>9202</volume>
          , pp.
          <fpage>294</fpage>
          -
          <lpage>310</lpage>
          . Springer (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Papadimitriou</surname>
            ,
            <given-names>C.H.: Computational</given-names>
          </string-name>
          <string-name>
            <surname>Complexity. Addison-Wesley</surname>
          </string-name>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Poggi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Giacomo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
          </string-name>
          , R.:
          <article-title>Linking data to ontologies</article-title>
          .
          <source>J. Data Sem</source>
          .
          <volume>10</volume>
          ,
          <fpage>133</fpage>
          -
          <lpage>173</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Suciu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olteanu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , Re´,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Koch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.: Probabilistic</given-names>
            <surname>Databases. M &amp;</surname>
          </string-name>
          <article-title>C (</article-title>
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Vardi</surname>
          </string-name>
          , M.Y.:
          <article-title>The complexity of relational query languages (extended abstract)</article-title>
          .
          <source>In: Proc. STOC</source>
          . pp.
          <fpage>137</fpage>
          -
          <lpage>146</lpage>
          (
          <year>1982</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>