<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>NextClosures with Constraints</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Theoretical Computer Science Technische Universität Dresden</institution>
          ,
          <addr-line>Dresden</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In a former paper, the algorithm NextClosures for computing the set of all formal concepts as well as the canonical base for a given formal context has been introduced. Here, this algorithm shall be generalized to a setting where the data-set is described by means of a closure operator in a complete lattice, and furthermore it shall be extended with the possibility to handle constraints that are given in form of a second closure operator. As a special case, constraints may be predefined as implicational background knowledge. Additionally, we show how the algorithm can be modified in order to do parallel Attribute Exploration for unconstrained closure operators, as well as give a reason for the impossibility of (parallel) Attribute Exploration for constrained closure operators if the constraint is not compatible with the data-set.</p>
      </abstract>
      <kwd-group>
        <kwd>Formal Concept Analysis</kwd>
        <kwd>Implication</kwd>
        <kwd>Canonical Base</kwd>
        <kwd>Constraint</kwd>
        <kwd>Closure Operator</kwd>
        <kwd>Parallel Computation</kwd>
        <kwd>Parallel Exploration</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Recently, in [18, 20] a parallel algorithm for the computation of canonical bases (and
the set of formal concepts as a byproduct) for formal contexts has been introduced.
Furthermore, in [18, 19] some extensions have been provided that allow for the parallel
exploration of canonical bases by means of experts. However, not all data-sets occurring
in practical applications can efficiently be described as a formal context. Henceforth,
it can be useful to describe a generalization of the NextClosures algorithm which allows
to compute canonical bases for implications valid in a closure operator in a complete
lattice. Of course, powersets are always complete lattices, and the composition of the
two derivation operators of a formal context is a closure operator in the powerset lattice
– hence this is indeed a generalization. Since the algorithm proceeds in a level-wise order
that is compatible with the set-theoretic subset ordering, the generalization presupposes
a strict order-homomorphism of the underlying lattice into the ordered set (N; ) of the
natural numbers with their usual ordering (called a quasi-rank function). Furthermore,
this paper presents some possible applications, e.g., in Formal Concept Analysis [
        <xref ref-type="bibr" rid="ref3">13</xref>
        ],
for interpretations in Description Logics [2], and for Pattern Structures [12].
      </p>
      <p>First, the notion of a closure operator in a complete lattice is defined, and it is
proven that the set of all closure operators in a fixed complete lattice forms a complete
lattice itself. Consequently, it is possible to construct infima and suprema of sets of
closure operators. As applications, we discuss what it means for implications to be
valid in infima and suprema, and furthermore generalize the notion of C-implications
(constrained implications, where C is a closure operator) in [4] from the special case
of Formal Concept Analysis to the more general case of closure operators.</p>
      <p>In [24], Stumme introduced an extension of Ganter’s Attribute Exploration [10, 11]
that can handle background knowledge in form of an implication set. A further
generalization [9] allows for arbitrary propositional background knowledge. The input data
is given as a formal context K = (G; M; I) as well as an implication set L Imp(M)
that is valid in K. Then by generalizing the notions of pseudo-intents and canonical
bases, it is possible to compute a minimal extension of L which is sound and complete
for K. This minimal extension is called canonical base of K relative to L. However, it
has not been addressed what can be done in the case where L is not valid in K. There
are at least two possibilities to handle such cases. One may either compute a base for
the implications that are valid in K as well as are entailed by L, or one can compute
a base for the constrained implications of (K; L). We will discuss some details here,
and provide solutions by utilizing infima and suprema of closure operators in lattices.</p>
      <p>
        Higuchi has shown in [
        <xref ref-type="bibr" rid="ref1">16</xref>
        ] that the set of all closure operators on a set constitutes
a complete lattice. More generally, this is also true for the set of all closure operators
in a complete lattice. The order of closure operators is defined as follows: A closure
operator is smaller than another closure operator if each closure of is also a
closure of , i.e., if is more fine-grained than which means that each closure of
can be expressed as an infimum of closures of . Furthermore, it is easy to verify
that implications are valid in an infimum of two closure operators if, and only if, they
are valid in each of the closure operators. The dual case considers implications valid
in suprema, which are exactly those implications valid for all models that are closures
of all involved closure operators. In general, one may think of infima describing unions
of data-sets, and suprema as describing intersections (or mergings) of data-sets.
      </p>
      <p>The last case investigated in this document considers the constrained implications.
As input two closure operators are necessary, one describing the data-set and the other
one describing the constraints to be met. Then a base for all those implications may be
computed, for which both premise and conclusion is a closure of the constraining closure
operator, and all common closures of both closure operators are models. In particular,
we will show an application where we have some implications which have been proven
to be correct, and a possibly faulty data-set. As a result, we may construct implications
that are compatible with the background knowledge, and furthermore are valid w.r.t. all
closures of the data-set which are also models of the background implications.</p>
      <p>This document is structured as follows. In Section 2, the notion of a closure operator
in a complete lattice is defined, and it is shown that the set of all closure operators
constitute a complete lattice itself, i.e., we present an order on closure operators as
well as give the equations for the corresponding infimum and supremum operations.
Then in Section 3, we consider implications in a complete lattice and define the notion
of validity w.r.t. closure operators, as well as entailment for implication sets. Next,
Section 4 generalizes the parallel NextClosures algorithm from [20] to the case of closure
operators (with constraints) in complete lattices. Proofs are ommited, as on the one
hand they have already been given in [18], and on the other hand could be generalized
from those given in [19, 20] without too much effort. Before finishing this document with
some conclusions in Section 6, several possible applications are described, in particular,
in Formal Concept Analysis, in Description Logics, and for Pattern Structures.</p>
    </sec>
    <sec id="sec-2">
      <title>The Complete Lattice of Closure Operators in a</title>
    </sec>
    <sec id="sec-3">
      <title>Complete Lattice</title>
      <p>
        Throughout the whole section, we assume that M = (M; ; V; W; &gt;; ?) is a complete
lattice, i.e., M is a set; is an order relation on M, i.e., it is reflexive, antisymmetric,
and transitive; for each subset X M, V X is the infimum of X, i.e., V X x for all
x 2 X, and y x for all x 2 X implies y V X; dually, W X is the supremum of X;
&gt; is the greatest element and ? is the smallest element, i.e., ? x &gt; for all x 2 M.
We set x ^ y := Vfx; yg as well as x _ y := Wfx; yg. For x 2 M, its (prime) ideal is
# x := f y 2 M j y x g, and its (prime) filter is " x := f y 2 M j x y g. For further
information on (complete) lattices, the interested reader is referred to [
        <xref ref-type="bibr" rid="ref3">5, 7, 13, 14</xref>
        ].
      </p>
      <p>
        A closure operator in M is a mapping : M ! M that is extensive, monotone,
and idempotent, cf. [
        <xref ref-type="bibr" rid="ref1">6, 7, 16</xref>
        ]. ClOp(M) denotes the set of all closure operators in M.
An element x 2 M is a closure of if x = x , and we shall denote the set of all
closures of by Clo( ). Furthermore, it is well-known that the following statements
are equivalent characterizations of a closure operator :
1. x x , x y ) x y , and x
2. x y , x y for all x; y 2 M.
3. x _ y (x _ y) for all x; y 2 M.
4. x x , and (x _ y) = (x _ y ) , for all x; y 2 M.
      </p>
      <p>= x , for all x; y 2 M.</p>
      <p>It is easy to verify that the following statements hold for a closure operator :
1. (x ^ y) x ^ y for all x; y 2 M.
2. (x ^ y ) = x ^ y for all x; y 2 M.</p>
      <p>A closure system in M is a V-closed subset of M. A subset P M is a closure
system in M if, and only if, f p 2 P j x p g = " x \ P has a smallest element for all
x 2 M. Then there is a one-to-one correspondence between closure operators and closure
systems as follows. For each closure operator in M, the set of its closures is a closure
system in M. Vice versa, if P is a closure system in M, then P : x !7 V(" x \ P )
is a closure operator in M. The operations are mutually inverse.</p>
      <p>
        It turns out that the set of all closure operators in a complete lattice constitutes
a complete lattice itself, see also [
        <xref ref-type="bibr" rid="ref1">16, 23</xref>
        ]. Indeed, closure operators can be ordered by
, where if Clo( ) Clo( ). This condition is equivalent to both =
and (w.r.t. pointwise order, i.e., x x for all x 2 M). Obviously, the smallest
closure operator is given by the identity mapping ? : x !7 x, and the greatest closure
operator is given by the constant mapping &gt; : x !7 &gt;. If is a set of closure operators
in M, then its infimum c and supremum b are given by the following equations:
and
k : x !7 ^
      </p>
      <p>
        f x j
j : x !7 ^f y j x
2 g;
y and y = y for all
2 g:
Of course, all complete lattices are (isomorphic to) a formal concept lattice, cf. [
        <xref ref-type="bibr" rid="ref3">13</xref>
        ].
In particular, the lattice of closure operators is isomorphic to the concept lattice of
(ClOp(M); ClOp(M); ), but also to the concept lattice of the smaller formal context
(ClOp(M); M; C) where C x if x is a closure of . The corresponding isomorphisms are
!7 (# ; Clo( )) and ( ; X) !7 j : x !7
^(" x \ X):
      </p>
    </sec>
    <sec id="sec-4">
      <title>Implications in Closure Operators</title>
      <p>An implication in M is an expression of the form p ! c with premise p 2 M and
conclusion c 2 M. An element m 2 M is a model of p ! c if p m implies c m.
It is valid in if all closures of are models of p ! c, and we shall denote this by
j= p ! c. Furthermore, it can easily be shown that j= p ! c is equivalent to
c p . We shall denote the set of all implications in M by Imp(M). For an implication
set L [ fp ! cg Imp(M), we say that L entails p ! c, symbolized as L j= p ! c,
if each model of L, i.e., each model of all implications in L, is a model of p ! c. For
each element x 2 M, there is a smallest element xL above x that is a model of L, and
the corresponding closure operator satisfies xL = Wf xL;n j n 1 g where
xL;1 := x _ _f c j 9p : p ! c 2 L and p
x g;
and</p>
      <p>xL;n+1 := (xL;1)L;n for each n 2 N:
Then, L entails p ! c if, and only if, c pL. Additionally, we define a similar closure
operator L where p x is replaced with p x in the definition of xL;1. For an
implication set L, we symbolize by L k the subset consisting of all implications from
L the premises of which have a quasi-rank not exceeding k.</p>
      <p>A pseudo-closure of is an element p 2 M which is not a closure of , but contains
the closure of each strictly smaller pseudo-closure. PsClo( ) denotes the set of all
pseudoclosures of , and then Bcan( ) := f p ! p j p 2 PsClo( ) g constitutes an implicational
base for , i.e., for all implications p ! c 2 Imp(M), j= p ! c if, and only if, Bcan( ) j=
p ! c. We call Bcan( ) the canonical base of , and furthermore it can be shown that it
is a minimal implicational base, i.e., there is no base of smaller cardinality. Algorithm 1
can be utilized to compute the canonical base of , for which the constraining closure
operator must be set to the identity mapping ? that imposes no constraints at all.
3.1</p>
      <sec id="sec-4-1">
        <title>Implications in Infima</title>
        <p>As we have seen in Section 2, the infimum of two closure operators and in a
complete lattice M is given as f : x !7 x ^ x . The corresponding closure system
is the smallest that contains all closures of as well as all closures of . Consequently,
an implication is valid in the infimum if, and only if, it is valid in both closure operators.
For formal contexts K1 and K2, the infimum of their intent closure operators can be
obtained as the intent closure operator of the subposition KK12 . In general, the infimum
somehow corresponds to the union of two data-sets.</p>
        <p>Using the infimum operation it is furthermore possible to construct implicational
bases from streams. Suppose that ( n)n2N is a sequence of closure operators in M
such that n is only available at time point n, i.e., we do not have access to the whole
sequence at once, but only to the most recent closure operator. However, for each time
point n 2 N, it is desired to have a base for the implications that are valid in all closure
operators ` with ` n. This can easily be achieved as follows:
1. Set B0 := Bcan( 0).
2. Set Bn+1 := Bcan(Bn f n+1) for each n 2 N.</p>
        <p>By construction, then each Bn is an implicational base for cn
`=0 `, i.e., for the
implications which are valid in 0; : : : ; n.
3.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Implications in Suprema</title>
        <p>Consider two closure operators and in a complete lattice M. Then, their supremum
g maps each element x 2 M to the smallest element of M that is greater than x,
and both a closure of and . The corresponding closure system is the smallest that
contains the intersection Clo( ) \ Clo( ). Hence, the supremum corresponds to the
intersection (or merging) of data-sets. An implication is valid in g if, and only if,
it has all common closures of and as models. Note that there may be implications
valid in g which are neither valid in , nor valid in .
3.3</p>
      </sec>
      <sec id="sec-4-3">
        <title>Constrained Implications</title>
        <p>As a special case of implications being valid in a supremum, we consider so-called
constrained implications. This notion has first been defined by Belohlávek and Vychodil
in [4] for formal contexts. Consider a formal context K = (G; M; I) and a closure
operator C on M, then a C-implication over M is an implication the premise as well
as the conclusion of which are closures of C. Furthermore, a C-implication is valid in
K if it has as models all intents of K that are closures of C. We can generalize this
to the case of closure operators in complete lattices as follows.</p>
        <p>Again, suppose that and are closure operators in a complete lattice M. We then
call the pair ( ; ) a closure operator with constraint where is the constrained, and
is the constraining closure operator. An implication p ! c is constrained by if both
its premise p and conclusion c are closures of . Furthermore, p ! c is valid in ( ; )
if it has all closures of the supremum g as models, i.e., if g j= p ! c. In order
to construct bases for constrained implications in a closure operator with constraint,
we shall adapt the notions of pseudo-closures and the canonical base accordingly. An
element p 2 M is a pseudo-closure of ( ; ) if p is not a closure of , but a closure
of , and furthermore q g p for all pseudo-closures q p of ( ; ). Then, the set
Bcan ( ; ) := f p ! p g j p 2 PsClo( ; ) g is a minimal implicational base of ( ; )
where PsClo ( ; ) denotes the set of all pseudo-closures of ( ; ).</p>
        <p>Comparing the two approaches for computing implications in a supremum, the first
one in Section 3.2 only restricts the possible models, in particular, only closures of
are considered that are also closures of . The second approach in Section 3.3 also
imposes constraints on the implications, i.e., only implications are considered where
both premise and conclusion are closures of .
4</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>A Generalized NextClosures Algorithm</title>
      <p>Let M be a complete lattice. Throughout the whole section, we assume that there is a
strict order-preserving function j j : (M; ) ! (N; ), i.e., x y implies jxj jyj for all
x; y 2 M. W.l.o.g. j?j = 0. (If j?j = n for n &gt; 0, then jj jj : x !7 jxj n is also a strict
order-homomorphism, and jj?jj = 0.) Then j j is a quasi-rank function on (M; ), and
we say that an element x 2 M has quasi-rank jxj. In particular, for all graded complete
lattices, the corresponding rank function j j is a quasi-rank function such that furthermore
jxj+1 = jyj if x is a lower neighbor of y. For our purposes, we do not need the additional
property that the ranks of neighboring elements only differ by an amount of 1.</p>
      <p>Consider two closure operators and in M. Then the set containing all closures of
g and all pseudo-closures of ( ; ) is a closure system in M, and the corresponding
closure operator is ( ; ) := Bcan ( ; ) . Our aim is to find an automatic method for
constructing all closures of ( ; ) . The following Algorithm 1 has been introduced in [18],
and the special case of being the intent closure operator induced by a formal context,
and the constraining closure operator being the identity ? (i.e., no constraints are
given), has been handled in [20]. The proof is left out here, as it can be found in [18], or can
be generalized from the proof in [20]. We will describe Algorithm 1 in the following text.</p>
      <p>According to the definition of a pseudo-closure, for all elements p 2 M, it suffices to
know all strictly smaller pseudo-closures q p in order to correctly determine whether p
is pseudo-closed. Hence, we may compute them in a level-wise approach w.r.t. increasing
quasi-rank, since if we have computed all pseudo-closures q where jqj jpj, then
we can find those pseudo-closures with q p among them. In particular, if L is a
set of -implications that contains exactly all implications p ! p g where p is a
( ; )-pseudo-closure with quasi-rank not exceeding k, and some arbitrary implications
with premise quasi-rank k + 1, then the closure operators ( ; ) and L coincide on
all elements with a quasi-rank of at most k + 1, i.e., jxj k + 1 implies x( ; ) = xL .
Furthermore, it can be proven that the following statements are satisfied:
1. If p 2 M is a ( ; )-pseudo-closure, then there is neither a g -closure nor a
( ; )-pseudo-closure strictly between p and p g .
2. If m 2 M is a g -closure, then the next g -closures or ( ; )-pseudo-closures
are of the form n( ; ) for upper neighbors n m.
3. If x; y 2 M with x y are neighboring ( ; ) -closures, then y = z( ; ) for all
upper neighbors z x with z y.</p>
      <sec id="sec-5-1">
        <title>Algorithm 1. NextClosures</title>
        <p>Algorithm 1 manages a set C of candidates, an implication set L, and a set I of closures.
Initially, ? is the only candidate in C. Algorithm 1 is in state k if it has processed all
candidates with a quasi-rank k, but none of quasi-rank &gt; k. In state k, Ck denotes the
set of candidates, Lk denotes the implication set, and Ik denotes the set of closures. It
can be shown that the following invariants are always satisfied during Algorithm 1’s run:
1. Ck contains all pseudo-closures of ( ; ) with quasi-rank k + 1, and all closures
of g with quasi-rank k + 1 that are not already contained in Ik.
2. Ik contains exactly all closures of g with a quasi-rank not exceeding k.
3. Lk contains exactly all implications p ! p g for which the premise p is a
pseudo-closure of ( ; ) with a quasi-rank of at most k.
4. Between the states k and k + 1, the closure operators ( ; ) and L coincide on
all elements with quasi-rank k + 1, i.e., an element with quasi-rank k + 1 is either
a closure of g or a pseudo-closure of ( ; ) if, and only if, it is a closure of L .</p>
        <p>As a consequence, we obtain that in the final state j&gt;j, Algorithm 1 outputs the
set of all closures of g as well as the canonical base of ( ; ).
4.1</p>
        <sec id="sec-5-1-1">
          <title>A Generalized Parallel Attribute Exploration</title>
          <p>As an extension, we suppose that the given closure operator only describes a part of
the data-set, and furthermore there is an expert available (very much in the same
way as for Attribute Exploration [10, 11] in the case of Formal Concept Analysis). The
exploration of a closure operator in a lattice is explained in full detail in [18], and the
special case of exploring a formal context is considered in [19] (including extensive
proofs). However, we will give a short summary here.</p>
          <p>An expert in a lattice M is a partial mapping : Imp(M) !p M such that the
following conditions hold:
1. If (p ! c) is defined, then the value is a counterexample against p ! c, i.e.,
(p ! c) = m implies p m and c 6 m.
2. If (p ! c) is undefined, then all counterexamples of are models of p ! c, i.e.,
whenever (q ! d) = m, then p m implies c m.</p>
          <p>We say that accepts p ! c if it does not provide a counterexample against p ! c,
i.e., (p ! c) is undefined, and that refutes p ! c otherwise. Furthermore, is
induced by a closure operator if for all implications p ! c, (p ! c) is undefined
if, and only if, p ! c is valid in . The expert is optimal if it accepts p ! c ^ x
whenever it refutes p ! c with counterexample x. For an arbitrary expert , it is
always possible to construct an optimal expert b that accepts the same implications
as follows: Let p ! c be an implication. Then b accepts p ! c if accepts p ! c.
Otherwise, let c0 := c and n := 0. While rejects cn with counterexample xn, set
cn+1 := cn ^ xn, and increase n. Eventually, define b(p ! c) := Vkn=0 xk.</p>
          <p>As input the generalized Parallel Attribute Exploration requires a closure operator
, an expert , as well as an implication set L in M, such that there is an inaccessible
closure operator describing the domain of interest where is induced by , ,
i.e., Clo( ) Clo( ), and L is valid in . W.l.o.g. we may assume that is optimal.
The goal is to compute an implicational base for the domain closure operator by
utilizing the background knowledge L, and querying the expert .</p>
          <p>In order to insert new closures into the closure operator , we define an operation
# : ClOp(M) M ! ClOp(M) by # x := f x where x(m) := x if m x, and
x(m) := &gt; otherwise. It is readily verified that # x is the greatest closure operator
below that has x as a closure. Then x j= y ! y implies y # x = y . Furthermore, if
x is a model of all implications p ! p where p is a pseudo-closure of ( ; L) with jpj k,
then the pseudo-closures of ( ; L) and ( # x; L) with a quasi-rank of at most k are the
same. As a corollary, we get that then also the canonical bases of ( ; L) and ( # x; L)
coincide for the implications the premises of which have a quasi-rank not exceeding k. By an
inductive application, it follows that Bcan( ; L) k = Bcan(( # x1; : : : ; xn); L) k if each xi
is a model of Bcan( ; L) k. This fact enables us to execute a parallel attribute exploration.</p>
        </sec>
      </sec>
      <sec id="sec-5-2">
        <title>Algorithm 2. ParallelAttributeExploration</title>
        <p>Input: a complete lattice M = (M; ; V; W; &gt;; ?)
Input: a quasi-rank function j j: (M; ) ! (N; )
Input: a closure operator in M
Input: an expert in M
Input: a set L of background implications that are valid in
Initialize: an implication set B := ;
Initialize: a candidate set C := f?g
1 for k = 0; : : : ; j&gt;j 1 do
2 for all c 2 C with jcj = k do in parallel
3 if c = cB and c = cL then
4 while c =6 c and (c ! c ) = x do
5 := # x
6 if c =6 c then
7 B := B [ fc ! c g
8 C := C [ f d j d c g
9 else
10 C := C [ fcB gLg
11 Wait for termination of all parallel processes.</p>
        <p>Output: the refined closure operator
Output: the canonical base B of relative to L</p>
        <p>Algorithm 2 is in state k if it has processed all candidates of a quasi-rank not exceeding
k, but none of a greater quasi-rank. Let Ck denote the set of candidates in state k, and let
Bk denote the implication set in state k. Furthermore, x1k; : : : ; xknk denote all
counterexamples provided by the expert between states k and k+1, and k is the closure operator in
state k, i.e., k # x1k; : : : ; xknk = k+1. Then the following statements are always satisfied.
1. Ck contains all pseudo-closures of ( k+1; L) with quasi-rank k + 1.
2. Bk consists of all implications p ! p g where p is a pseudo-closure of ( k; L)
with a quasi-rank of at most k, i.e., Bcan( k; L) k = Bk.
3. Between the states k and k + 1, every element with quasi-rank k + 1 is a closure of</p>
        <p>B if, and only if, it is either a closure of k+1 g L or a pseudo-closure of ( k+1; L).
As a corollary, we infer that in the final state j&gt;j, Algorithm 2 returns a refinement of
that has the same closures as , and a minimal implicational base of relative to L,
i.e., a minimal superset of L that constitutes an implicational base of . Additionally,
there is no algorithm that computes a minimal relative implicational base of , but
poses less questions to than Algorithm 2.</p>
        <sec id="sec-5-2-1">
          <title>A Problem for the Exploration of Constrained Implicational Bases</title>
          <p>A further generalization of Algorithm 2 to arbitrary closure operators instead of
implication sets L valid in is not easily possible. We may only replace L by a closure
operator such that , otherwise when receiving counterexamples from the expert,
they may not be inserted into the closure operator , but must be inserted into the
supremum g , since we cannot ensure that y( # x)g = y g if x is a -model of
the -implication y ! y g . This is due to the fact that the lattice of closure operators
is not distributive, and this fact can be proven by means of [22, Lemmata 1 and 2].
5</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Applications</title>
      <p>In this section, we will present some applications of the generalized NextClosures
algorithm. It is trivial that there is an application for Formal Concept Analysis, since
the powerset of the attribute set constitutes a complete lattice, and the composition
of the derivation operators is a closure operator. Further applications can be found
for interpretations in Description Logics, and for Pattern Structures. We will shortly
describe each of the cases in the following subsections.
5.1</p>
      <sec id="sec-6-1">
        <title>Application: Formal Concept Analysis</title>
        <p>For each formal context K = (G; M; I), the mapping II : X !7 XII is a closure
operator in the powerset }(M). The closure system induced by II is the set of all
intents of K, and thus it is easy to verify that an implication is valid in K if, and only if,
it is valid in II. Hence, Algorithm 1 can be utilized to compute both the set of intents
of K and the canonical base of K. If furthermore a constraining closure operator C
in }(M) is given, cf. [4] as well as Section 3.3, then Algorithm 1 is also applicable,
and computes all C-intents as well as a base of the C-implications.</p>
        <p>As a special case, we may consider the case where the constraining closure operator
C is given by means of an implication set L Imp(M), i.e., C : X !7 XL assigns
to each attribute set X M the smallest superset that is a model of L. Then there
are two cases to consider: either K j= L, or K j6= L.</p>
        <p>First, assume that L is valid in K. Then each intent of K is a model of L, i.e.,
L II, and thus II f L = L as well as II g L = II. Consequently, it is uninteresting
to consider the infimum or supremum. Furthermore, it can be shown that the canonical
base of K with constraint L from Section 3.3 coincides with the canonical base of
K relative to L from [9, 24], i.e., is a minimal extension of L which constitutes an
implicational base for K. However, both documents [9, 24] have not addressed the
remaining case where L is not valid in K.</p>
        <p>Second, let K j6= L. Then, an implication is valid in the infimum II f L if, and
only if, it is valid in K as well as is entailed by L. This is useful for the case where
a sequence (Kn)n2N of formal contexts is observed, and for each time point n, a base
for the subposition of K0; : : : ; Kn shall be constructed. Note that this has already
been discussed in Section 3.1 for the general case.</p>
        <p>For the supremum, an implication is valid if, and only if, it has as models all intents of
K that are also models of L. Consider the case where K contains faulty objects, e.g., due
to wrong observations inserted to K, and where the implication set L has been manually
created or verified to ensure that all its implications are valid in the domain of interest.
Then, constructing implications that are valid in II g L is a suitable method, since
only those intents of K are allowed as models that are already models of L, i.e., satisfy
the existing implicational knowledge. A further restriction is imposed by also requiring
the premises and conclusions to be models of L, i.e., only considering implications that
are L-constrained. For both cases, Algorithm 1 can be used to compute a canonical
base in parallel. However, it remains to investigate whether the implications valid in
II g L, or the L-constrained implications of K, are more useful in practise.
5.2</p>
      </sec>
      <sec id="sec-6-2">
        <title>Application: Pattern Structures</title>
        <p>A pattern structure, as introduced by Ganter and Kuznetsov in [12], is a triple
(G; (M; u); ) consisting of a set G of objects, a semi-lattice (M; u) of patterns, and a
description function : G ! M , such that the set f (g)jg 2 G g induces a complete
subsemi-lattice (M ; u) of (M; u). Furthermore, then a galois connection between the
powerset }(G) and the pattern lattice (M; v) (where x v y iff x u y = x) is given as follows:
A
:= lf (g) j g 2 A g
for all A</p>
        <p>G;
d := f g 2 G j (g) v d g for all d 2 M:
A pattern implication is a term x ! y where x; y 2 M , and is valid in (G; (M; u); )
if x y . Since ( ; ) is a galois connection, it follows that the composition
is a closure operator in the lattice of all descriptions. Hence, it is possible to apply the
generalized NextClosures algorithm for the case of pattern structures, too, provided
that there is a quasi-rank function j j : (M; v) ! (N; ).
5.3</p>
      </sec>
      <sec id="sec-6-3">
        <title>Application: Description Logics</title>
        <p>As a special case of pattern structures, we consider interpretations in Description
Logics [2] as input data-sets. First, fix a finite signature (NC ; NR), i.e., NC is a set of
concept names, and NR is a set of role names. An interpretation is a pair I = ( I; I)
consisting of a non-empty set I, called domain, and an extension function I such that
AI I for all concept names A 2 NC , and rI I I for all role names r 2 NR.
An EL?-concept description may be built according to the following inductive rule:</p>
        <p>C ::= ? j &gt; j A j C u C j 9 r: C:
Then, the extension function I is extended to all EL?-concept descriptions by means
of the following definitions:
?I := ;;
&gt;I :=</p>
        <p>
          I;
(C u D)I := CI \ DI;
and
(9 r: C)I := f d 2
Please note that an implication between concept descriptions is rather called a
general concept inclusion. An implicational base for the closure operator II, where the
first I is the extension mapping, and the second I is the model-based most-specific
concept description mapping, is a base of GCIs for I, as it has been investigated
by Baader and Distel in [
          <xref ref-type="bibr" rid="ref16">1, 8</xref>
          ].
        </p>
        <p>The set of all EL?-concept descriptions constitutes a bounded lattice. First we define
a quasi-order v, the subsumption order, by C v D if CI DI for all interpretations
I. The corresponding equivalence relation is denoted as . For simplicity, we do not
distinguish between equivalence classes and their representatives. The set of all
equivalence classes is a bounded lattice with the smallest element ?, the greatest element &gt;,
and where the conjunction u is the infimum operation, and the least common subsumer
mapping t is the supremum operation. It is easy to verify that both u and t are
compatible with , hence they are well-defined for the equivalence classes.</p>
        <p>If we do not restrict the role-depth, and use descriptive semantics (as defined above)
instead of greatest-fixpoint semantics, then however the lattice of concept descriptions
is not complete, as there are infinitely many mutually distinct EL?-concept descriptions,
e.g., the concept descriptions (9 r:)nA for n 2 N, and conjunction is only allowed for
a finite number of concept descriptions. It turns out, that this is no restriction for the
application of Algorithm 1, since for finite interpretations (i.e., with a finite domain),
the canonical base is finite, and hence for the computation of closures w.r.t. the current
implication set in Algorithm 1 only finitary suprema are necessary.</p>
        <p>For defining a quasi-rank function, we may first observe that the dual lattice of
EL?-concept descriptions is well-founded, i.e., there are no infinite strictly ascending
chains C0 pv C1 pv C2 pv : : :, cf. Baader and Morawska in [3, Proposition 3.5]. Hence,
a quasi-rank function could be defined by jCj := n where n is the maximal length of
a chain starting at C and ending at &gt;. Since each concept description has only finitely
many subsumers (for a finite signature), there are only finitely many mutually distinct
chains in the interval [C; &gt;], and thus j j as above is well-defined. For the same reason,
the set of upper neighbors of an arbitrary concept description is computable.
6</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>In this document, the NextClosures algorithm has been generalized to arbitrary closure
operators in complete lattices, and has been extended to handle constraints that are
given in form of another closure operator. Furthermore, some exemplary applications
have been presented, e.g., in the field of Formal Concept Analysis, Description Logics,
and for Pattern Structures. While some experiments of an implementation specialized
to formal contexts as input structures have shown that there is an almost inverse
linear correlation between the computation time and the number of available processor
cores, experiments for other types of input structures are outstanding. A complexity
analysis taking into account the complexities of the lattice operations as well as of
the closure operator could be interesting.</p>
      <p>Acknowledgements The author gratefully thanks the anonymous reviewers for their
constructive hints and helpful remarks.
[14]
[15]</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Franz</given-names>
            <surname>Baader</surname>
          </string-name>
          and
          <string-name>
            <given-names>Felix</given-names>
            <surname>Distel</surname>
          </string-name>
          .
          <article-title>“A Finite Basis for the Set of EL-Implications Holding in a Finite Model”</article-title>
          .
          <source>In: Formal Concept Analysis, 6th International Conference, ICFCA 2008</source>
          , Montreal, Canada,
          <source>February 25-28</source>
          ,
          <year>2008</year>
          , Proceedings.
          <year>2008</year>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          Ed. by Patrick Blackburn, Johan van Benthem, and
          <string-name>
            <given-names>Frank</given-names>
            <surname>Wolter</surname>
          </string-name>
          . Elsevier,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          Chap.
          <volume>13</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Franz</given-names>
            <surname>Baader</surname>
          </string-name>
          and
          <string-name>
            <given-names>Barbara</given-names>
            <surname>Morawska</surname>
          </string-name>
          . “
          <article-title>Unification in the Description Logic EL”</article-title>
          .
          <source>In: Logical Methods in Computer Science 6.3</source>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>Radim</given-names>
            <surname>Belohlávek</surname>
          </string-name>
          and
          <string-name>
            <given-names>Vilém</given-names>
            <surname>Vychodil</surname>
          </string-name>
          . “
          <article-title>Formal Concept Analysis with Constraints by Closure Operators”</article-title>
          .
          <source>In: Conceptual Structures: Inspiration and Application, 14th International Conference on Conceptual Structures, ICCS</source>
          <year>2006</year>
          , Aalborg, Denmark,
          <source>July 16-21</source>
          ,
          <year>2006</year>
          , Proceedings.
          <year>2006</year>
          , pp.
          <fpage>131</fpage>
          -
          <lpage>143</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>Garrett</given-names>
            <surname>Birkhoff</surname>
          </string-name>
          . “
          <article-title>Lattice theory”</article-title>
          .
          <source>In: Colloquium Publications. 3rd ed</source>
          . Vol.
          <volume>25</volume>
          .
          <string-name>
            <surname>Amer</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>Math. Soc.</source>
          ,
          <year>1967</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>Nathalie</given-names>
            <surname>Caspard</surname>
          </string-name>
          and
          <string-name>
            <given-names>Bernard</given-names>
            <surname>Monjardet</surname>
          </string-name>
          . “
          <article-title>The Lattices of Closure Systems, Closure Operators, and Implicational Systems on a Finite Set: A Survey”</article-title>
          .
          <source>In: Discrete Applied Mathematics 127.2</source>
          (
          <issue>2003</issue>
          ), pp.
          <fpage>241</fpage>
          -
          <lpage>269</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>Brian A.</given-names>
            <surname>Davey</surname>
          </string-name>
          and Hilary Ann Priestley.
          <article-title>Lattices and Order</article-title>
          . 2nd ed. Cambridge University Press, Apr.
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>Felix</given-names>
            <surname>Distel</surname>
          </string-name>
          . “
          <article-title>Learning description logic knowledge bases from data using methods from formal concept analysis”</article-title>
          .
          <source>PhD thesis</source>
          . Dresden University of Technology,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>Comput. Sci. 217</source>
          .2 (
          <issue>1999</issue>
          ), pp.
          <fpage>215</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>Bernhard</given-names>
            <surname>Ganter</surname>
          </string-name>
          .
          <article-title>Two Basic Algorithms in Concept Analysis</article-title>
          .
          <source>FB4-Preprint</source>
          <volume>831</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Darmstadt</surname>
          </string-name>
          , Germany: Technische Hochschule Darmstadt,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>Bernhard</given-names>
            <surname>Ganter</surname>
          </string-name>
          . “
          <article-title>Two Basic Algorithms in Concept Analysis”</article-title>
          .
          <source>In: Formal Concept Analysis, 8th International Conference, ICFCA</source>
          <year>2010</year>
          , Agadir, Morocco, March
          <volume>15</volume>
          -18,
          <year>2010</year>
          . Proceedings.
          <year>2010</year>
          , pp.
          <fpage>312</fpage>
          -
          <lpage>340</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>Bernhard</given-names>
            <surname>Ganter</surname>
          </string-name>
          and
          <string-name>
            <given-names>Sergei O.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          . “
          <article-title>Pattern Structures and Their Projections”</article-title>
          .
          <source>In: Conceptual Structures: Broadening the Base, 9th International Conference on Conceptual Structures, ICCS</source>
          <year>2001</year>
          , Stanford, CA, USA,
          <source>July 30-August 3</source>
          ,
          <year>2001</year>
          , Proceedings.
          <year>2001</year>
          , pp.
          <fpage>129</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          1st ed. Springer, Dec.
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>George</given-names>
            <surname>Grätzer</surname>
          </string-name>
          .
          <article-title>General Lattice Theory</article-title>
          . 2nd ed. Birkhäuser Verlag,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Jean-Luc Guigues</surname>
            and
            <given-names>Vincent</given-names>
          </string-name>
          <string-name>
            <surname>Duquenne</surname>
          </string-name>
          . “
          <article-title>Famille minimale d'implications informatives résultant d'un tableau de données binaires”</article-title>
          .
          <source>In: Mathématiques et Sciences Humaines</source>
          <volume>95</volume>
          (
          <year>1986</year>
          ), pp.
          <fpage>5</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>Akira</given-names>
            <surname>Higuchi</surname>
          </string-name>
          . “
          <article-title>Lattices of closure operators”</article-title>
          .
          <source>In: Discrete Mathematics 179</source>
          .
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          (
          <year>1998</year>
          ), pp.
          <fpage>267</fpage>
          -
          <lpage>272</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Kriegel</surname>
          </string-name>
          .
          <article-title>Concept Explorer FX</article-title>
          .
          <article-title>Software for Formal Concept Analysis</article-title>
          , available at https://github.com/francesco-kriegel/conexp-fx.
          <year>2010</year>
          -
          <fpage>2016</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <source>LTCS-Report 15-01</source>
          . Dresden, Germany: Chair of Automata Theory, Institute of Theoretical Computer Science, Technische Universität Dresden,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Kriegel</surname>
          </string-name>
          .
          <article-title>“Parallel Attribute Exploration”</article-title>
          .
          <source>In: Graph-based Modeling of Conceptual Structures - 22nd International Conference on Conceptual Structures, ICCS</source>
          <year>2016</year>
          , Annecy, France,
          <source>July 5-7</source>
          ,
          <year>2016</year>
          , Proceedings.
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Kriegel</surname>
          </string-name>
          and
          <string-name>
            <given-names>Daniel</given-names>
            <surname>Borchmann</surname>
          </string-name>
          . “
          <article-title>NextClosures: Parallel Computation of the Canonical Base”</article-title>
          .
          <source>In: Proceedings of the 12th International Conference on Concept Lattices and Their Applications (CLA</source>
          <year>2015</year>
          ), Clermont-Ferrand, France,
          <source>October 13-16</source>
          ,
          <year>2015</year>
          .
          <year>2015</year>
          , pp.
          <fpage>181</fpage>
          -
          <lpage>192</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>David</given-names>
            <surname>Maier</surname>
          </string-name>
          .
          <source>The Theory of Relational</source>
          Databases. Computer Science Press,
          <year>1983</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <given-names>José</given-names>
            <surname>Morgado</surname>
          </string-name>
          . “
          <article-title>Note on the distributive closure operators of a complete lattice”</article-title>
          .
          <source>In: Portugaliae Mathematica</source>
          <volume>23</volume>
          (
          <year>1964</year>
          ), pp.
          <fpage>11</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>Sebastian</given-names>
            <surname>Rudolph</surname>
          </string-name>
          . “
          <article-title>On the Succinctness of Closure Operator Representations”</article-title>
          .
          <source>In: Formal Concept Analysis - 12th International Conference, ICFCA</source>
          <year>2014</year>
          ,
          <article-title>Cluj-</article-title>
          <string-name>
            <surname>Napoca</surname>
          </string-name>
          , Romania, June 10-13,
          <year>2014</year>
          . Proceedings.
          <year>2014</year>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <source>In: Data Analysis and Information Systems</source>
          . Ed. by
          <string-name>
            <surname>Hans-Hermann Bock</surname>
            and
            <given-names>Wolfgang</given-names>
          </string-name>
          <string-name>
            <surname>Polasek</surname>
          </string-name>
          .
          <article-title>Studies in Classification, Data Analysis, and</article-title>
          <string-name>
            <given-names>Knowledge</given-names>
            <surname>Organization</surname>
          </string-name>
          . Springer,
          <year>1996</year>
          , pp.
          <fpage>457</fpage>
          -
          <lpage>469</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <given-names>Marcel</given-names>
            <surname>Wild</surname>
          </string-name>
          .
          <article-title>“A Theory of Finite Closure Spaces Based on Implications”</article-title>
          .
          <source>In: Advances in Mathematics 108.1</source>
          (
          <issue>1994</issue>
          ), pp.
          <fpage>118</fpage>
          -
          <lpage>139</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>