<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Constructive Satisfiability Procedure for ALC (Z) (Preliminary Report)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nadia Labai</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Homola</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Magdalena Ortiz</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Comenius University in Bratislava</institution>
          ,
          <addr-line>Mlynská dolina, 84248 Bratislava</addr-line>
          ,
          <country country="SK">Slovakia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Information Systems, TU Wien</institution>
          ,
          <addr-line>Favoritenstrasse 9-11, A-1040 Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The newly introduced ALCP(D) extends ALC with path constraints over concrete domains D. Previous work showed decidability of the satisfiability problem in ALCP(D) for various concrete domains, including integer domains. However, the proof of this general result did not provide a complexity upper bound on the problem, or an explicit algorithm for model construction, which is necessary for some reasoning tasks such as abduction. In this paper, we initiate an investigation of the complexity of the satisfiability and model construction problems in ALCP(Z), where Z = hZ; =; &lt;i. As a preliminary result towards establishing complexity upper bounds, we present a procedure for deciding satisfiability in a constructive way.</p>
      </abstract>
      <kwd-group>
        <kwd>Description logics</kwd>
        <kwd>concrete domains</kwd>
        <kwd>satisfiability</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Introduction
Reasoning in description logics (DL) with the addition of data from concrete domains
is a highly relevant research problem motivated by the practical need to include data
values and express constraints on top of them in ontologies. Di erent extensions of
DLs with concrete domains were investigated [
        <xref ref-type="bibr" rid="ref11 ref12 ref2 ref7 ref9">2,11,12,9,7</xref>
        ], and based on this research
concrete domains were also incorporated into OWL [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        The language ALCP(D), recently introduced by Carapelle and Turhan [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], takes
further steps in this direction. It extends individuals with multiple registers holding
values from the universe of a domain structure D, and enables the expression of rich
path-constraints that relate, using the relations of D, multiple registers from distinct
individuals connected by a certain path. Carapelle and Turhan [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] provided a general
decidability result for the satisfiability problem which holds for any negation-closed
domain structure satisfying the so-called EHD (existence of a homomorphism is
definable) property. Among such domain structures are, e.g., the natural numbers and
integers augmented with equality, linear, semi-linear, and even lexicographic orders.
However, these results do not establish a complexity upper bound for the problem. As
the proof relies largely on reductions which do not o er an obviously constructive way
to verify satisfiability, it does not give rise to an algorithm for constructing or
enumerating models. However, such algorithms are necessary for certain reasoning tasks such
as query answering [
        <xref ref-type="bibr" rid="ref10 ref13 ref14">14,13,10</xref>
        ] and ABox abduction [
        <xref ref-type="bibr" rid="ref15 ref6 ref8">6,8,15</xref>
        ].
      </p>
      <p>
        In this paper, we take initial steps towards a constructive satisfiability procedure for
ALCP(Z), where Z = hZ; =; &lt;i is the structure induced on the integers by the equality
and linear order relations. Our satisfiability procedure is split into two parts. Firstly,
ALC satisfiability is checked for an abstraction of the TBox and the target concept,
similarly to Carapelle and Turhan [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Our main contribution is in the second step, where
rather than relying on the generic decidability of the existence of a homomorphism
necessary for satisfiability, we construct a representation of the numeric part of the
model in the form of a so-called integer graph. Our results open the door for future
research on reasoning tasks for ALCP(Z) that require model enumeration, as well as
complexity analysis and practicable algorithms.
      </p>
      <p>The paper is structured as follows. After providing necessary background in
Section 2, we introduce integer graphs in Section 3, and discuss their relationship to models
of ALCP(Z) concepts. In Sections 4 and 5 we present procedures for constructing
integer graphs and extracting a satisfying interpretation from them. Finally, in Section 6, we
discuss the results and future research. Due to space limitations, the proofs are sketched
or omitted.
2</p>
      <p>
        Preliminaries for ALC P(Z)
The ALCP(D) description logics were defined by Carapelle and Turhan [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] in
general form. We present definitions specialized to Z = hZ; =; &lt;i. For k 2 Z+, denote
[k] = f1; : : : ; kg. A constraint c(x1; : : : ; xk) of arity k is a Boolean combination of atomic
constraints (xi; x j), where 2 f=; &lt;g and i; j 2 [k]. We write Z j= c(a1; : : : ; ak) if the
constraint is satisfied in Z by the assignment xi 7! ai.
      </p>
      <p>Example 1. Throughout the paper we return to the same examples to demonstrate
concepts and definitions. We underline symbols introduced in the examples to distinguish
them from the rest of the paper.</p>
      <p>Let 1(y; z) := y &lt; z and 2(x; z) := z &lt; x. The constraint 1;2(x; y; z) := 1(y; z) ^
2(x; z) has arity 3, and we have Z j= 1;2(3; 1; 2).</p>
      <p>Let NC, NR, and Reg be countably infinite sets of concept names, role names, and
register names, respectively. A sequence P = r1 rn, where ri 2 NR for i 2 [n], is a
role path of length n. ALCP(Z) concepts C are inductively defined by:</p>
      <p>C; D := A j :C j (C u D) j 9r:C j 9P:c(Si1 x1; : : : ; Sik xk)
where A 2 NC, r 2 NR, P is a role path of length n 0, c is a constraint of arity k,
x1; : : : ; xk 2 Reg, and 0 i1; : : : ; ik n. We call 9P:c(Si1 x1; : : : ; Sik xk) a path constraint.
The symbol S appearing in the path constraint stands for successor, as the term Si x
points to the register variable x of the i-th element on the path P.</p>
      <p>A Z-interpretation I is a tuple ( I; I; ), where I is the domain, I is the
interpretation function, and : I Reg ! Z is the valuation function, assigning an
integer value to each register variable of each element in the domain. The
interpretation function maps each concept name A 2 NC to some AI I and each role
name r 2 NR to a binary relation rI I I. The interpretation function is then
extended to :C; C u D; 9r:C as usual.3 Let P = r1; : : : ; rn be a role path of length n.</p>
    </sec>
    <sec id="sec-2">
      <title>3 Refer, e.g., to the DL Handbook [1].</title>
      <p>Then PI is defined by: PI = f(v0; : : : ; vn) 2 ( I)n+1 j (vi 1; vi) 2 riI for i 2 [n]g, and
(9P:c(Si1 x1; : : : ; Sik xk))I is defined by:
fv 2</p>
      <p>I j 9(v0; : : : ; vn) 2 PI s.t. v0 = v; and Z j= c( (vi1 ; x1); : : : ; (vik ; xk))g</p>
      <p>We explain the interpretation of 9P:c(Si1 x1; : : : ; Sik xk) further. If an element v 2 I
is in (9P:c(Si1 x1; : : : ; Sik xk))I, then there are v1; : : : ; vn 2 I such that there is a path
starting at v which matches the pattern P, that is (v; v1; : : : ; vn) 2 PI, and such that for
the assignment (v ji ; x j) 7! a j, we have Z j= c(a1; : : : ; ak).</p>
      <p>Example 2. Let C := 9rst:</p>
      <p>
        1;2(x; y; z) ^ 3;4(S1 x; S2 x; S3 x) where:
3;4(S1 x; S2 x; S3 x) := 3(S1 x; S2 x) ^ 4(S2 x; S3 x)
3(S1 x; S2 x) := S1 x &lt; S2 x
4(S2 x; S3 x) := S2 x = S3 x
The interpretation of C would contain elements v0 from which a path rst originates,
meaning there are elements vi, i 2 [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] for which (v0; v1) 2 rI, (v1; v2) 2 sI, and (v2; v3) 2
tI and such that 1. the x register of v0 holds a larger value than its z register, which holds
a larger value than its y register, that is (v0; y) &lt; (v0; z) &lt; (v0; x), and 2. the x register
of v1 holds a smaller value than the x register of v2, which is equal to the value in the x
register of v3. In other words, (v1; x) &lt; (v2; x) = (v3; x).
      </p>
      <p>As usual, C t D := :(:C u :D) and 8R:C = :9R::C, &gt; := A t :A are defined as
syntactic sugar. In addition, also define 8P:c(Si1 x1; : : : ; Sik xk) := :9P::c(Si1 x1; : : : ; Sik xk)
and 9P:C := 9r1:9r2: : : : 9rn:C. A General Concept Inclusion (GCI) is an expression
C v D, where C and D are concepts. A TBox is a finite set of GCIs. For a concept C
and TBox T , denote by RegC;T the set of register names appearing in C and T . Models
and satisfiability are also defined as usual: let T be a TBox and let C be a concept.
A Z-interpretation I models T if and only if CI DI for every GCI C v D in T .
We denote I j= T in this case. C is satisfiable w.r.t. T i there is a Z-interpretation I
which models T and CI , ;. We denote I j=T C in this case.</p>
      <p>
        We say I is tree-shaped if I ? is (isomorphic to) a prefix-closed set of strings
over some finite alphabet , and if additionally, for u; v 2 I, we have u ! v if and
ownellyl-kifnvow=n uresuflotrfosromAeLC, 2[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],,wwhhicehreal!so =proSpar2gNaRtersI.toTAheLtCrePe(Zm)o:del property is a
Theorem 1 ([
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]). Let C be a concept and T a TBox in ALCP(Z). C is satisfiable w.r.t.
T i there exists a tree-shaped Z-interpretation I such that I j=T C.
      </p>
      <p>
        Relying further on the treatment in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], we also assume that all concepts are given
in constraint normal form, where negations only appear before concept names, and all
path-constraints are either of the form 9P:c where c is a conjunction of atomic
constraints, or of the form 8P:c where c is a disjunction of atomic constraints.
      </p>
      <p>Fix a concept C and a TBox T in constraint normal form. For an atomic constraint
(Si x; S jy), we call d = maxfi; jg the depth of , and for a constraint c, the depth is the
maximal depth of the atomic constraints in c. Denote by the set of atomic constraints
occurring in C and T . Let B = fB1; : : : ; Bj jg be a set of fresh concept names, called
placeholders, which do not appear in C or T .</p>
      <p>We can now define abstracted concepts and constraint graphs, which allow us
to split the satisfiability check into testing usual ALC-satisfiability of the abstracted
TBox, and verifying the constraints in the appropriate constraint graph can be satisfied.
Definition 2 (Abstracted concepts). Let P = r1 : : : rn and let 1; : : : ; m 2 have
depths d1 : : : dm, respectively. Define d0 = 0 and dm+1 = n. For a conjunction c of
1; : : : ; m, the abstraction of 9P:c(Si1 x1; : : : ; Sik xk) is defined as:
9P1:(B1 u 9P2:(B2 u
9Pm:(Bm u 9Pm+1:&gt;)
))
)):
where 9Pi is short for 9rdi 1+1 : : : 9rdi . If di = di+1 then 9Pi+1 is empty. For a disjunction
c0 of 1; : : : ; m, the abstraction of 8P:c0(Si1 x1; : : : ; Sik xk) is defined as:
8P1:(B1 t 8P2:(B2 t</p>
      <p>8Pm:(Bm t 8Pm+1:?)
Define Ca and Ta to be the ALC concept and TBox, respectively, obtained by replacing
every path constraint with its abstraction.</p>
      <p>Example 3. The abstraction of C is given as follows. We have n = 3, m = 4, d0 = d1 =
d2 = 0, d3 = 2, and d4 = d5 = 3. We have that 9P1, 9P2, and 9P5 are empty, and
9P3 = 9r9s, and 9P4 = 9t. All in all, we have:</p>
      <p>Ca := B1 u B2 u 9r9s:B3 u 9t:B4 u (&gt;)
An ordinary interpretation I that models Ca is shown in Figure 1, where ai is shorthand
for i repetitions of a. Note that elements in the interpretation of a path-constraint are at
the origins of the paths, whereas in the abstraction, the placeholders are satisfied by
elements along the path, with the d-th element satisfying the placeholders for constraints
of depth d.</p>
      <p>a1
B1; B2
r
a2
s
a3
B3
t
a4</p>
      <p>B4</p>
      <p>For a graph G, we denote by V(G) its set of vertices and by E(G) its set of edges.
Definition 3 (Constraint graph). Given an ordinary tree-shaped interpretation I =
( I; I), the constraint graph of I is the edge-labeled graph GI = (G; ) where V(G) =</p>
      <p>I RegC;T , and : E(G) ! fl=; l&lt;g, and E(G) are as follows. For every (u; x); (v; y) 2
V(G) and 2 f=; &lt;g, we have ((v; y); (u; x)) 2 E(G) and ((v; y); (u; x)) = l i 1. u is a
prefix of v, and 2. there exists B j 2 B such that j = (Sjvj jujy; x) or j = (x; Sjvj jujy),
and v 2 B Ij. Let p¯ be a (finite or infinite) path in I. The constraint graph GI;p¯ is given by
the labeled subgraph of GI induced by f(u; x) j u 2 I; u is on the path p¯; x 2 RegC;T g:
&lt;</p>
      <p>
        Example 4. The constraint graph of I from Example 3 is shown in Figure 2.
Theorem 4 ([
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]). C is satisfiable w.r.t. T if and only if there is an ordinary tree-shaped
interpretation I s.t. I j=Ta Ca and s.t. there is a homomorphism from GI to Z.
      </p>
      <p>
        A tableau reasoner may be used to verify that I j=Ta Ca. As I may be infinite,
such a reasoner constructs a finite representation of I in which the infinite parts of
I are represented by paths between blocking and blocked nodes. The infinite version
can be obtained by a construction known as unraveling. For more details, see [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The
following observation will be later essential in our constructions:
Remark 5. W.l.o.g., we may assume that each path between a blocking node and its
respective blocked node is of length n d where d is the maximal depth of a constraint
appearing in T and C. This is because we can add d new concepts A1; : : : ; Ad, plus the
axioms Ai v :A j, for i; j 2 [d], i , j, together with &gt; v A1 t t Ad, and for all r 2 NR
also A1 v 8r:A2, . . . , Ad 1 v 8r:Ad, Ad v 8r:A1, yielding an equisatisfiable TBox.
3 Integer graphs and Embeddings into Z
For the rest of the paper, fix a concept C and a TBox T in ALCP(Z) and let Ca and
Ta be their abstractions. Fix some ordinary tree-shaped model I = ( I; I) such that
I j=Ta Ca, given by a blocked tree satisfying the blocking condition described in
Remark 5, and let GI = (GI; I) be its constraint graph. As mentioned before, deciding
the satisfiability of C w.r.t. T breaks down to finding an ordinary model of the
abstractions Ca and Ta, and verifying that the constraints in its constraint graph are satisfiable.
The latter may be done by finding a homomorphism from GI to Z.
      </p>
      <p>In this section we define integer graphs, which represent such homomorphisms in
a general form. As the extraction of homomorphisms from a general integer graph is
somewhat cumbersome, we also introduce compacted integer graphs which simplify
said extraction.</p>
      <p>Let G be a (possibly infinite) directed graph. Define LPathG : V(G)2 ! Z+ [ f1g
as follows. For u; v 2 V(G), LPathG(u; v) is undefined if v is not reachable from u, is
equal to k if k is the length of the longest path from u to v, and is equal to 1 if for every
k 2 Z+, there is a path of length at least k from u to v. Let be an equivalence relation
on V(G). For v 2 V(G), denote the equivalence class of v in by [v] . The quotient
graph G= is given by V(G= ) = f[v] j v 2 V(G)g, and:</p>
      <p>E(G= ) = f([u] ; [v] ) j (u0; v0) 2 E(G) for some u0 2 [u] ; v0 2 [v] g:
Define I to be the equivalence relation on V(GI) induced by the reflexive symmetric
transitive closure of the edges in E(GI) labeled with l=. Define G&lt; = (V(GI); E&lt;(GI))
I
where E&lt;(GI) = fe 2 E(GI) j I(e) = l&lt;g. For a path p¯ in I, define p¯ and G&lt;p¯ similarly.
Definition 6 (Integer graph). Let be an equivalence relation on V(GI) such that
LPIartehfiHne(sa; b,)a,nd1d,ewnoetesaGy&lt;IH= ibsyaHn Iin.tIefgHerIgirsapahcy.cWliec saanydHif f oisr aevceormypaa;cbte2d Vin(tHegIe)r,
graph ifI, in addition, for everyIa; b 2 V(H ), either a is reachaIble from b or vice versa.
For a path p¯ in I and such that p¯ refinIes , define Hp¯ similarly.</p>
      <p>When H I is an integer graph, we often refer to it as the integer graph of I.</p>
      <p>I
Definition 7 (Vertex contraction). Let G = (V(G); E(G)) and let a; b 2 V(G). The
result of contracting a and b, denoted G=fa;bg, is given by replacing a and b with a
fresh vertex c whose neighborhood is the union of the neighborhoods of a and b. That
is, V(G=fa;bg) = (V(G) n fa; bg) [ fcg and for every a0 2 V(G) n fa; bg, we have (a0; c) 2
E(G=fa;bg) i f(a0; a); (a0; b)g \ E(G) , ; (and similarly for (c; a0)). If G is quotient graph,
the fresh vertex c is the union of the equivalence classes a and b.</p>
      <p>Notice that vertex contractions do not introduce new edges. For a quotient graph G= ,
we have that the equivalence relation refines the equivalence relation obtained after
contracting vertices in G= . Hence, we have that all the integer graphs of a given model
I can be obtained from H I by contracting vertices in H I . Moreover, we have:</p>
      <p>I I
Lemma 8. If H I is an integer graph, I has a compacted integer graph.</p>
      <p>I
Example 5. The equivalence relation I of I from Example 3 only contains the pair
((a3; x); (a4; x)). The integer graph H I is shown in Figure 3(a) with the isolated
ver</p>
      <p>I
tices omitted. A compaction of H I is given by the integer graph induced by the
equiv</p>
      <p>I
alence relation , where: (a3; x) is equivalent to (a4; x), (a1; x) is equivalent to (a2; x),
and (a1; y), (a2; y), (a2; z), (a3; y), (a3; z), (a4; y), (a4; z) are equivalent to each other, and
(a1; z) is only equivalent to itself. Note that I indeed refines , H (shown in
Figure 3(b)) is acyclic, and for any pair of vertices, one is reachable from another. The
vertex [(a1; y)] denotes the equivalence class f(a1; y); (a2; y); (a2; z); (a3; y); (a3; z); (a4; y); (a4; z)g.
f(a1; y)g
f(a1; z)g
f(a1; x)g
[(a1; y)]
f(a1; z)g
f(a2; x)g
f(a3; x); (a4; x)g
f(a1; x); (a2; x)g</p>
      <p>f(a3; x); (a4; x)g
(a) H I</p>
      <p>I</p>
      <p>(b) H</p>
      <p>Note that integer graphs naturally induce a homomorphism (in fact, infinitely many)
from GI to Z, as they are directed acyclic graphs:
Observation 9. Let H be an integer graph. There exists a function num : V(H) ! Z
such that for a; b 2 V(H) where a , b, if b is reachable from a, then num(a) &lt; num(b).</p>
      <p>This allows us to reduce the problem of deciding the existence of a homomorphism
to checking whether there exists an integer graph for I:
Lemma 10. There is a homomorphism from GI to Z i I has an integer graph.</p>
      <p>Combining this with the previous result of Carapelle and Turhan, we have:
Corollary 11. C is satisfiable w.r.t. T if and only if there exists an ordinary model I of
Ca w.r.t. Ta which has an integer graph.</p>
      <p>The next lemma will allow us to break the task of deciding whether I has an integer
graph into simpler steps:
Lemma 12. I has an integer graph if and only if every path in I which starts at the
root has an integer graph.</p>
      <p>Proof (Sketch). One direction is immediate. For the other direction, assume every path
starting at the root in I has an integer graph. We show the claim by induction on the
number T of (blocked or maximal and finite) paths in I. The case where T = 1 is
immediate. Assume the claim holds for T . Let I have T + 1 such paths which all have
integer graphs. Let p¯ be one of these paths, and consider the sub-tree I0 induced by the
T paths in I other than p¯. Then by the induction hypothesis, I0 has an integer graph
HI0I0 . Let Hp¯ p¯ be the integer graph of p¯. Let Ip¯ denote the elements on p¯, and let I0
denote the elements in I0. Then the integer graph H I of I is as follows. H I is given
I I
by taking the disjoint union of Hp¯ p¯ and H 0I0 and contracting (see Definition 7) the</p>
      <p>I
vertices [(u; x)] p¯ and [(u; x)] I0 for every u 2 Ip¯ \ I0 and x 2 RegC;T .</p>
      <p>We have now established that in order to check satisfiability of C w.r.t. T , it is enough
to obtain an ordinary tree-shaped model I for their abstractions and to check that each
path in I starting at the root has an integer graph.
4</p>
      <p>Constructing Integer graphs
In this section, we describe how the existence of an integer graph for a path in I can be
tested. First, observe that for finite paths, this task is simple:
Observation 13. Let p¯ be a finite path in I. It is straightforward to construct its
constraint graph Gp¯ , compute p¯ and then construct the graph Hp¯ p¯ and test it for for being
acyclic, as these are all finite structures. Together with the construction described in the
proof of Lemma 12, we have that we can compute the integer graph (if it exists) of any
finite tree-shaped prefix of I.</p>
      <p>
        We still need conditions for the existence of integer graphs for infinite ultimately
periodic paths which can be verified in finite time.4 Such paths ¯ ( ¯)! require caution,
since it is possible for their prefixes ¯ ( ¯)t have an integer graph for any t 2 Z+ while
they themselves do not. This behavior is demonstrated in the following example:
4 We will sometimes abuse notation and denote an ultimately periodic path by ¯ ( ¯)!, where ¯
and ¯ list the labels appearing in the non-periodic and respectively periodic parts of the path.
Example 6. Let 5 := x = S1 x, 6 := y = S1y, and 7 := z &lt; S1z, and let B5;6;7
be a placeholder for 5 ^ 6 ^ 7. Let B1;2 be a placeholder for 1;2 (see Example 1).
Consider the ultimately periodic path b1b2 : : :, where b1 is labeled with B1;2 and for
i 2, bi is labeled with B5;6;7. Essentially, these constraints fix two integer values,
held in the x and y registers, and with each repetition of B5;6;7, add a fresh integer
value between them. Hence, for any t 2 Z+, b1 : : : bt+1 has an integer graph which is
a simple path of length t + 1, since for any t 2 Z+ there is a choice of two integer
values with enough di erent values between them. See Figure 4 for the integer graph of
b1 : : : b4, with the isolated vertices omitted and where [(b1; x)] = f(bi; x) j i 2 [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]g and
[(b1; y)] = f(bi; y) j i 2 [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]g. However, there is no integer graph for b1b2 : : :, since no
two integer values have infinitely many di erent integers between them.
      </p>
      <p>[(b1; x)] f(b4; z)g f(b3; z)g f(b2; z)g f(b1; z)g [(b1; y)]</p>
      <p>We first need to introduce the notion of integer graph extensions, which can be
roughly seen as the subgraph relation adapted to quotient graphs:
Definition 14 (Integer graph extension). Let H0 and H be integer graphs. We say H0
extends H if for every [v] 2 V(H), 1. there exists [v0] 2 V(H0) such that [v] [v0], and
2. if ([u]; [v]) 2 E(H) for some [u] 2 V(H), then ([u]; [v]) 2 E(H0).</p>
    </sec>
    <sec id="sec-3">
      <title>The next easy lemma follows from the definitions:</title>
      <p>Lemma 15. Let p¯ be a (finite or infinite) path in I and let ¯ be a prefix of p¯. If p¯ has
an integer graph Hp¯ , then ¯ has an integer graph H ¯ and Hp¯ extends H ¯ .</p>
      <p>The behavior in Example 6 we wish to avoid, namely, having the length of the
longest path between two vertices grow in subsequent extensions, can be expressed
using the following:
Definition 16 (Non-disrupting extensions). Let H00, and H0, and H be integer graphs
such that H00 extends H0 and H0 extends H. We say that H00 extends H0 without
disrupting H if for every u; v 2 V(H), LPathH0 (u; v) = LPathH00 (u; v).</p>
      <p>Through these two notions we can characterize the (finite or infinite) paths which
have integer graphs, using conditions which can be verified in finite time. The following
lemma is the most technically involved result of the paper. Recall that n denotes the
maximal depth of constraints appearing in I.</p>
      <p>Lemma 17. Let p¯ = ¯ ( ¯)! be an ultimately periodic path in I, beginning at the root.
Then p¯ has an integer graph if and only if:
(C) ¯ ( ¯)n+1 has an integer graph Hp¯;n+1 which extends Hp¯;n without disrupting Hp¯;1,
where Hp¯;1 and Hp¯;n are the integer graphs of ¯ ( ¯) and ¯ ( ¯)n, respectively.</p>
      <p>The following example shows that the bound in Lemma 17 on the number n + 1 of
repetitions needed is tight:
Example 7. Let 8 := x &lt; y with placeholder B8 and let 9;10 := (x &lt; S3 x) ^ (S3y &lt; y)
with placeholder B9;10. Consider the path u1u2 : : :, where if i = 1 mod 4, ui is labeled
with B8, and otherwise ui is labeled with B8 u B9;10. It is straightforward, albeit tedious,
to verify that the integer graph of u1u2u3u4 is disrupted by its extensions up to i = 16.
Also note that condition (C) may be verified for a path ¯ ( ¯)! in finite time; by
Observation 13, it is straightforward to construct the graphs Hp¯;1, Hp¯;n, Hp¯;n+1 and to verify
they are acyclic. Then it is immediately verifiable that for every u; v 2 V(Hp¯;1), it holds
that LPathHp¯;n (u; v) = LPathHp¯;n+1 (u; v).</p>
      <p>Proof (Sketch). Recall that I, and therefore also p¯, satisfies the blocking condition
described in Remark 5. To reduce notational clutter, in this proof we omit p¯ and denote
by Ht the integer graph of ¯ ( ¯)t where relevant.</p>
      <p>Our blocking condition allows us to define a graph operation which, in a way,
appends some fixed graph induced by the periodic part of p¯ to Ht in order to obtain Ht+1.
This regularity in the structure of the integer graphs of the prefixes of p¯ allows us to
show that if condition (C) holds, then (*) for every t 2 Z+, ¯ ( ¯)t+n has an integer graph
Ht+n which extends Ht+n 1 without disrupting Ht. We can further show that acyclicity
is preserved when taking the limit H1 = limt!1 Ht. Therefore, if H1 is not the integer
graph of p¯, there are u; v 2 V(H1) such that LPathH1 (u; v) = 1. Fix such u and v. Let
t 2 Z+ be the minimal number for which u; v 2 V(Ht). We have that ¯ ( ¯)t is finite,
so Ht is a finite directed acyclic graph, therefore LPathHt (u; v) is also finite. Since by
our assumption, LPathH1 (u; v) = 1, there exists some minimal t0 t + n for which
LPathHt0 (u; v) &gt; LPathHt (u; v). Then we have that Ht0 disrupts Ht. In fact, we have
that Ht0 disrupts Ht00 for every t t00 &lt; t0. In particular, for t00 = t0 n we have that
t t00 &lt; t0, so Ht0 = Ht00+n disrupts Ht00 while extending Ht00+n 1, in contradiction to (*).
We conclude that there are no u; v 2 V(H1) such that LPathH1 (u; v) = 1. Therefore H1
satisfies all conditions of Definition 6, making it the integer graph of p¯.</p>
      <p>For the other direction, assume that p¯ has an integer graph H. First, note that ¯ ( ¯)t
is a prefix of p¯ for every t 0. Therefore, by Lemma 15, for every t 2 Z+, ¯ ( ¯)t has
an integer graph Ht. Furthermore, for every t &lt; t0, we have that Ht0 extends Ht. In
particular, this is true for t = n and t0 = n + 1. Therefore, to satisfy condition (C), it
remains to show that Hn+1 does not disrupt H1 when extending Hn.</p>
      <p>Assume for contradiction that Hn+1 does disrupt H1 when extending Hn. Then,
relying on the fact that the depth of the placeholders in ¯ is limited by the length of ¯, we
can show that there are w; w0 2 V(H1) such that LPathHt (w; w0) &lt; LPathHt+1 (w; w0) for
every t n. Since the length of the longest path between w and w0 grows with each t,
we have that for every k 2 Z+, there exists some tk 2 Z+ such that LPathHtk (w; w0) &gt; k.
Hence, in H, we have that LPathH(w; w0) = 1, in contradiction to our assumption that
H is an integer graph. We conclude that Hn+1 does not disrupt H1 when extending Hn,
and condition (C) holds.</p>
      <p>Putting it Together – the Constructive Procedure
It remains to construct an assignment to the registers. Since a homomorphism can be
easily extracted from a compacted integer graph, we show in this section that such
compactions are e ectively computable. Let P¯ fin be the set of maximal finite paths in
I beginning at the root, and let P¯ prd be the set of infinite ultimately periodic paths in I
beginning at the root. For t 2 Z+, let Ut = fu 2 p¯ j p¯ 2 P¯ fing [ fu 2 ¯ ( ¯)t j ¯ ( ¯)! 2 P¯ prdg.
That is, all elements that appear either on maximal finite paths or by the t-th iteration of
the ultimately periodic paths. Define It be the sub-tree of I induced by the elements in
Ut. Let u1; u2; : : : be a lexicographical ordering of I
RegC;T .</p>
    </sec>
    <sec id="sec-4">
      <title>Algorithm 1 Integer graph compaction</title>
      <p>Input: An integer graph Ht of It for t 2 Z+
Output: A compaction Ht;c of Ht
1: V(Ht;c) = V(Ht)
2: E(Ht;c) = E(Ht)
3: a = [u1]
4: for b; b0 2 V(Ht;c) do
5: if LPathHt;c (a; b) = LPathHt;c (a; b0) 2 Z or LPathHt;c (b; a) = LPathHt;c (b0; a) 2 Z then
6: contract b and b0 in V(Ht;c)
. We refer to the equivalence classes in Ht;c
7: for i = 2; : : : ; jV(Ht)j do
8: if a is not reachable from [ui] in Ht;c nor vice versa then
9: contract a and [ui] in V(Ht;c)
10:
11:
12:
13:
a = [ui]
for b; b0 2 V(Ht) do
if LPathHt;c (a; b) = LPathHt;c (a; b0) 2 Z or LPathHt;c (b; a) = LPathHt;c (b0; a) 2 Z then
contract b and b0 in V(Ht;c)
14: Ht;c = (V(Ht;c); E(Ht;c))
15: return Ht;c
Lemma 18. Let t 2 Z+ and let Ht be the integer graph of It. There is an e ectively
computable compaction Ht;c of Ht.</p>
      <p>Proof (Sketch). We claim that Algorithm 1 outputs a compaction of Ht. Acyclicity is
preserved by operations in Lines 6, 9, and 13. As for the reachability condition, first
note that for every b 2 V (Ht;c), either b is reachable from [u1] or vice versa. Let
b; b0 2 V (Ht;c). Assume for contradiction that b is not reachable from b0 nor vice versa.
Then, either both b; b0 are reachable from [u1], or [u1] is reachable from both. Assume
w.l.o.g. that it is the former. If LPathHt (u1; b) = LPathHt (u1; b0), then b and b0 would
have been contracted during the run of the algorithm. Therefore either LPathHt (u1; b) &lt;
LPathHt (u1; b0) or LPathHt (u1; b) &gt; LPathHt (u1; b0). If LPathHt (u1; b) &lt; LPathHt (u1; b0),
there is some b00 2 V (Ht;c) such that LPathHt (u1; b0) = LPathHt (u1; b00)+LPathHt (b00; b0)
and such that LPathHt (u1; b00) = LPathHt (u1; b). Hence, b and b00 would have been
contracted during the run of the algorithm, producing a path from b to b0, in contradiction
to our assumption. The other case is analogous. Therefore, for every b; b0 2 V(Ht;c),
either b is reachable from b0 or vice versa, making Ht;c a compacted integer graph.
Theorem 19. Let I have an integer graph. There is an e ectively computable valuation
function : I RegC;T ! Z such that ( I; I; ) satisfies C w.r.t. T .
Proof (Sketch). We describe a procedure which, given input (u; x) 2 RegC;T , outputs
an integer value. It first constructs a compacted integer graph using Observation 13 and
Algorithm 1, then assigned it a value based on the length of the longest path between
[(u; x)] and [("; x1)]. For t 2 Z+, denote by Ht the integer graph of It. Let t 2 Z+ be
the minimal t for which [(u; x)] appears in Ht, and denote t0 = t + n + 1. Generate Ht0
using Observation 13 and then generate the compacted Ht0;c using Algorithm 1. Denote
[(u; x)] = b and [("; x1)] = a and return (u; x) = LPathHt0;c (b; a) if LPathHt0;c (b; a) 2
Z+, and (u; x) = LPathHt0;c (a; b) otherwise. Recall that for every b 2 V(Ht;c) we have
that either b is reachable from a or vice versa, therefore is well-defined. Also note that
our blocking condition together with Lemma 17 guarantee that the length of the longest
path between two vertices is final after n iterations, therefore, if [(u; x)] is reachable
(and di erent) from [(v; y)], then (u; x) &gt; (v; y). Now apply Lemma 10.
6</p>
      <p>Conclusion
ALCP(D) is an interesting family of DLs which enable the expression of constraints
over register values of individuals along a specified path, where the values and the
constraints are over a domain structure D. In this work, we have provided a constructive
satisfiability procedure for ALCP(Z) instantiated to the integer domain Z = hZ; =; &lt;i.
The construction is two-fold: in order to construct the Z-model of an ALCP(Z)
concept C w.r.t. a TBox T , first an ordinary ALC-model I is constructed for the abstracted
versions of T and C; and consecutively the so-called integer graph of I, which provides
a general representation of the relationships between the registers, is constructed and
used for assigning the registers with values from Z.</p>
      <p>
        We believe that this result will enable to employ ALCP(Z) in reasoning tasks where
model construction is required, e.g., ABox abduction and query answering. Although
complexity issues were not addressed in this paper, a complexity upper bound can be
obtained by analyzing our procedures. This would already be an improvement, as the
reductions in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] lead to an automata model with a decidable emptiness problem of
non-elementary complexity, [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. However, since such a naïve bound is likely to not be
complete, a natural sequel to this work would be to refine our approach to derive a tight
complexity upper bound for this logic.
      </p>
      <p>Acknowledgments. We thank Mantas Šimkus for comments on early stages of this
work, and we are grateful to the anonymous reviewers for their fruitful comments. This
work was supported by the FWF (project W1255).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F</given-names>
          </string-name>
          . (eds.):
          <article-title>The Description Logic Handbook: Theory, Implementation, and Applications</article-title>
          . Cambridge University Press (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hanschke</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A scheme for integrating concrete domains into concept languages</article-title>
          .
          <source>In: Proceedings of the 12th International Joint Conference on Artificial Intelligence. Sydney, Australia, August 24-30</source>
          ,
          <year>1991</year>
          . pp.
          <fpage>452</fpage>
          -
          <lpage>457</lpage>
          . Morgan Kaufmann (
          <year>1991</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. Bojan´czyk,
          <string-name>
            <given-names>M.</given-names>
            , Torun´czyk, S.:
            <surname>Weak</surname>
          </string-name>
          <string-name>
            <surname>MSO</surname>
          </string-name>
          +
          <article-title>U over infinite trees</article-title>
          .
          <source>In: 29th International Symposium on Theoretical Aspects of Computer Science, STACS</source>
          <year>2012</year>
          ,
          <article-title>February 29th-</article-title>
          <string-name>
            <surname>March</surname>
            <given-names>3rd</given-names>
          </string-name>
          ,
          <year>2012</year>
          , Paris, France. pp.
          <fpage>648</fpage>
          -
          <lpage>660</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Carapelle</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turhan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Description logics reasoning w</article-title>
          .r.t. general
          <article-title>TBoxes is decidable for concrete domains with the EHD-property</article-title>
          .
          <source>In: ECAI 2016 - 22nd European Conference on Artificial Intelligence</source>
          ,
          <volume>29</volume>
          <fpage>August</fpage>
          -2
          <source>September</source>
          <year>2016</year>
          ,
          <article-title>The Hague, The Netherlands</article-title>
          .
          <source>Frontiers in Artificial Intelligence and Applications</source>
          , vol.
          <volume>285</volume>
          , pp.
          <fpage>1440</fpage>
          -
          <lpage>1448</lpage>
          . IOS Press (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Cuenca</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Motik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Parsia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Patel-Schneider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <surname>U.</surname>
          </string-name>
          :
          <article-title>OWL 2: The next step for OWL</article-title>
          .
          <source>J. Web Semant</source>
          .
          <volume>6</volume>
          (
          <issue>4</issue>
          ),
          <fpage>309</fpage>
          -
          <lpage>322</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Elsenbroich</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>A case for abductive reasoning over ontologies</article-title>
          .
          <source>In: Proceedings of the OWLED*06 Workshop on OWL: Experiences and Directions</source>
          , Athens, Georgia, USA, November
          <volume>10</volume>
          -
          <issue>11</issue>
          ,
          <year>2006</year>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Haarslev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Möller</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wessel</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The description logic ALCN H R+ extended with concrete domains: A practically motivated approach</article-title>
          .
          <source>In: Automated Reasoning</source>
          , First International Joint Conference,
          <string-name>
            <surname>IJCAR</surname>
          </string-name>
          <year>2001</year>
          , Siena, Italy, June 18-23,
          <year>2001</year>
          ,
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <year>2083</year>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>44</lpage>
          . Springer (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Halland</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Abox abduction in ALC using a DL tableau</article-title>
          . In: 2012 South African Institute of Computer Scientists and Information Technologists Conference, SAICSIT '12,
          <string-name>
            <surname>Pretoria</surname>
          </string-name>
          , South Africa,
          <source>October 1-3</source>
          ,
          <year>2012</year>
          . pp.
          <fpage>51</fpage>
          -
          <lpage>58</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Ontology reasoning in the SH OQ(D) description logic</article-title>
          .
          <source>In: Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, IJCAI</source>
          <year>2001</year>
          , Seattle, Washington, USA,
          <year>August</year>
          4-
          <issue>10</issue>
          ,
          <year>2001</year>
          . pp.
          <fpage>199</fpage>
          -
          <lpage>204</lpage>
          . Morgan Kaufmann (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Kontchakov</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zakharyaschev</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The combined approach to ontology-based data access</article-title>
          .
          <source>In: IJCAI 2011, Proceedings of the 22nd International Joint Conference on Artificial Intelligence</source>
          , Barcelona, Catalonia, Spain,
          <source>July 16-22</source>
          ,
          <year>2011</year>
          . pp.
          <fpage>2656</fpage>
          -
          <lpage>2661</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>NExpTime-complete description logics with concrete domains</article-title>
          .
          <source>ACM Trans. Comput. Log</source>
          .
          <volume>5</volume>
          (
          <issue>4</issue>
          ),
          <fpage>669</fpage>
          -
          <lpage>705</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , Milicˇic´,
          <string-name>
            <surname>M.:</surname>
          </string-name>
          <article-title>A tableau algorithm for description logics with concrete domains and general TBoxes</article-title>
          .
          <source>J. Autom. Reasoning</source>
          <volume>38</volume>
          (
          <issue>1-3</issue>
          ),
          <fpage>227</fpage>
          -
          <lpage>259</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Conjunctive query answering in the description logic EL using a relational database system</article-title>
          .
          <source>In: IJCAI 2009, Proceedings of the 21st International Joint Conference on Artificial Intelligence</source>
          , Pasadena, California, USA, July
          <volume>11</volume>
          -
          <issue>17</issue>
          ,
          <year>2009</year>
          . pp.
          <fpage>2070</fpage>
          -
          <lpage>2075</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Ortiz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Data complexity of query answering in expressive description logics via tableaux</article-title>
          .
          <source>Journal of Automated Reasoning</source>
          <volume>41</volume>
          (
          <issue>1</issue>
          ),
          <fpage>61</fpage>
          -
          <lpage>98</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Pukancová</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Homola</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Tableau-based ABox abduction for description logics: Preliminary report</article-title>
          .
          <source>In: Proceedings of the 29th International Workshop on Description Logics</source>
          , Cape Town, South Africa,
          <source>April 22-25</source>
          ,
          <year>2016</year>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>