<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Incremental Materialization Update via Abstraction Re nement</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Markus Brenner</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Birte Glimm</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Ulm</institution>
          ,
          <addr-line>Germany, &lt; rst name&gt;.&lt;last</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>ions instead of operating on a large ABox. We also show that the obtained procedure is sound and complete for Horn ALCHI ontologies.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Most ontology reasoners support the task of materialization (i.e., they compute
and explicitly store all entailed atomic concept and role assertions for the
individuals in the ontology), which allows for the evaluation of conjunctive instance
queries directly over the stored facts. Computing the materialisation is
computationally expensive and approaches such as summarization [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], ABox
modularization [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], or abstraction re nement [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] attempt to \compress" the size of the
dataset over which the materialization is computed, thereby enabling processing
of large ABoxes and reducing the number of recurring reasoning steps. Even
using e cient materialization techniques, recomputing all consequences
whenever input data changes can cause a signi cant delay before user queries can
be answered again, which might be prohibitive for some application scenarios.
Incremental maintenance algorithms originating from the database and Datalog
communities (see, e.g., [
        <xref ref-type="bibr" rid="ref10 ref14">14, 10</xref>
        ]) have been applied to description logics and the
semantic web for incremental classi cation [
        <xref ref-type="bibr" rid="ref13 ref6">6, 13</xref>
        ], incremental materialization
via Datalog [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and RDF stream reasoning [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. While the basic idea of
incremental maintenance algorithms is generally applicable, the presented algorithms
so far focus on and are optimized for ontologies that can be expressed in the form
of (Datalog) rules, i.e., proper existentials are not supported. Furthermore, how
incremental maintenance algorithms can be combined with data compression
techniques is an open problem, only addressed in a sketchy way by Steigmiller
et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] in the form of a representative cache maintaining individuals in an
incremental fashion.
      </p>
      <p>In this paper we address this problem by combining the abstraction re
nement technique for materialization of Horn ALCHI ontologies with the
wellknown Delete/Rederive (DRed) algorithm for materialization management.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>
        The syntax of ALCHI is de ned using a vocabulary consisting of countably
in nite disjoint sets NC of atomic concepts, NR of atomic roles, and NI of
individuals. A role is either an atomic role or an inverse role r with r 2 NR.
We de ne R := r if R = r and R := r if R = r . For general semantics
and complex concepts and axioms, we conform to the standard de nitions and
refer the reader to e.g. Baader et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. An ontology O is a nite set of
axioms, written as O = A [ T , where A is an ABox consisting of the concept
and role assertions in O and T a TBox consisting of the concept and role
inclusion axioms in O. We also refer to concept and role assertions simply as
assertions. To simplify the presentation, we do not distinguish between axioms
R(a; b), R v S and, respectively, R (b; a), R v S . We use con(O), rol(O), and
ind(O) for the sets of atomic concepts, atomic roles, and individuals occurring
in O, respectively. Given an ontology O = A [ T , an ABox justi cation w.r.t.
T for an axiom with O j= is any set J A s.t. J [ T j= . An ABox
justi cation J is minimal, if 8J 0 J : J 0 [ T 6j= . An ALCHI ontology O is
Horn [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and in normalized form if, for every C(a) 2 O, C is an atomic
concept and every concept inclusion C v D 2 O, is in one of the following forms
&gt; v A; A v B; A v 9R:B; A v ?; A u B v C; A v 8R:B where A; B, and C
are atomic concepts and R is a role. W.l.o.g., we assume in the remainder every
ontology as normalized by applying a structural transformation; see e.g. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        For an ontology O = A [ T , we say that A is concept-materialized w.r.t.
T , if O j= A(a) implies A(a) 2 A for each A 2 con(O) and a 2 ind(O); A
is role-materialized w.r.t. T if O j= r(a; b) implies r(a; b) 2 A for each r 2
rol(O) and a; b 2 ind(O); A is (fully) materialized w.r.t. T if it is concept-, and
role-materialized. Given an ontology O = A [ T , the concept-, role-, and/or
(full) materialization of A w.r.t. T of is the smallest super-set of A that is
concept-, role-, and/or fully materialized w.r.t. T , respectively. Note that the
full materialization of A w.r.t. T is always nite since the sets con(O), rol(O)
and ind(O) are nite. Since the role materialization of an ALCHI ontology can
be determined quickly using a precomputed role hierarchy, we focus on concept
materialization in the remainder.
2.1
The main idea of the abstraction re nement method [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ] is to materialize an
ontology O = A [ T with a potentially large ABox A by constructing a smaller
ABox B such that the materialization of B [ T can be computed by a
generalpurpose reasoner, and transferring the new entailments back to O. The ABox B
is usually called the abstraction of the original ABox A. For transferring back
entailments, we use homomorphisms:
De nition 1. Let A and B be ABoxes. A mapping h : ind(B) ! ind(A) is called
a homomorphism (from B to A) if, for every assertion 2 B, we have h( ) 2 A,
where h(C(a)) := C(h(a)) and h(R(a; b)) := R(h(a); h(b)). We say an individual
b 2 ind(B) is a representative of an individual a 2 ind(A) if there exists a
homomorphism h : ind(B) ! ind(A) such that h(b) = a. We further extend h to
ABoxes as h(B) = [ 2Bh( ).
      </p>
      <p>Entailments can be transferred due to the following property.</p>
      <p>Lemma 1. Let h : ind(B) ! ind(A) be a homomorphism between the ABoxes
B and A. Then, for every TBox T and every axiom , B [ T j= implies
A [ T j= h( ).</p>
      <p>Suitable abstractions for ALCHI can be constructed by considering asserted
roles and concepts for single individuals using types:
De nition 2 (Type). Let A be an ABox and a an individual. The concept
type of a w.r.t. A is a set of concepts C (a) = fC j C(a) 2 Ag. The role type of
a w.r.t. A is a set of roles R(a) = fR j 9b : R(a; b) 2 Ag. The (combined) type
of a w.r.t. A is a pair ( C ; R), where C (a) and R(a) are the concept and role
type of a w.r.t. A, respectively.</p>
      <p>Example 1. Let A = fA(a); A(b); R(a; b)g. Then C (a) = C (b) = fAg, R(a) =
fRg, R(b) = fR g, (a) = 1 = hfAg; fRgi, and (b) = 2 = hfAg; fR gi.</p>
      <p>The abstract ABox is then constructed by introducing one representative for
each type with the respective assertions.</p>
      <p>De nition 3 (Abstraction). Let A be an ABox and = h C ; Ri a type. The
abstraction for is an ABox B = fC(v ) j C 2 C g [ fR(v ; wR) j R 2 Rg,
where v and wR are distinguished abstract individuals for the type . The
abstraction of A is B = Sa2ind(A) B (a), where (a) is the type for a w.r.t. A.
Example 2. The abstraction for A in Example 1 is B = B (a) [ B (b), where
B (a) = B 1 = fA(v 1 ); R(v 1 ; wR1 )g, B (b) = B 2 = fA(v 2 ); R (v 2 ; wR2 )g.
Intuitively, the abstraction is a disjoint union of ABoxes simulating combined
types. Note that each mapping h : ind(B) ! ind(A) such that:
h(v ) 2 fa 2 ind(A) j (a) = g;
h(wR) 2 fb 2 ind(A) j R(h(v ); b) 2 Ag;
is a homomorphism from B to A, which allows us to transfer entailments from the
abstraction back to the original ABox (Lemma 1). We formalize these transferred
entailments using De nition 4.</p>
      <p>De nition 4. Let B be the abstraction of an ABox A (according to De
nition 3), B1 be the (concept-)materialization of B [ T , and B = B1 n B. The
update of A using B is the smallest set of assertions A such that:</p>
      <p>C(v (a)) 2
R(a; b) 2 A; C(wR(a)) 2</p>
      <p>B
B;</p>
      <p>C(a) 2
C(b) 2</p>
      <p>A;
A:
(1)
(2)
(3)
(4)</p>
      <p>A1(a)</p>
      <p>An(a) R(a; b)
B(b)</p>
      <p>: T j= A0 u : : : u An v 8S:B and T j= R v S</p>
      <p>Using the de nitions above, the Abstraction Re nement method for reasoning
over a Horn ALCHI ontology O = A [ T can be summarized as follows:
AR1 Build the abstraction B of A using De nition 3
AR2 Determine the update A of A according to De nition 4, using a reasoner
on B [ T and extend A with A.</p>
      <p>AR3 Repeat from Step AR1 until no new entailments can be added to A.</p>
      <p>
        Steps AR1 and AR2 are repeated until the procedure reaches a x-point.
The method is sound, complete, and terminating for Horn ALCHI and, with
some extensions, even for Horn SHOIF [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Combining Abstraction Re nement with DRed</title>
      <p>
        For computing the materialization of a Horn ALCHI ontology O = A [ T , we
compute the closure of the ABox assertions using a slightly modi ed version of
the materialization rules given by Glimm et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] for Horn SHOIF restricted
to Horn ALCHI as shown in Figure 1. Premises are given above the horizontal
line and the conclusions below. Side conditions are given after the colon and
restrict the expressions to which the rules are applicable. For example, rule Rv
produces one inference for each individual a and concepts A1; : : : ; An; B such
that T j= A0 u : : : u An v B with the premise fA1(a); : : : ; An(a)g and the
conclusion B(a). Note that the axioms in the TBox T are only used in side
conditions and never as premises of the rules, which allows us to focus on ABox
reasoning and to leave TBox reasoning to a suitable reasoner. Lemma 2 can be
shown very similarly (although in a much simpler way) to the proof used by
Glimm et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>Lemma 2. The rules in Figure 1 are sound and complete for the
conceptmaterialization of a normalized Horn ALCHI ontology.
3.1</p>
      <p>
        The Delete/Rederive Algorithm
While one can examine a variety of di erent knowledge base changes in the DL
setting, we choose to adapt the database-based view, in which only known ABox
facts can be added or deleted. This view already provides enough expressivity
for a variety of use cases, e.g. stream reasoning [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Additionally, as additions
of ABox facts can be handled by simply 'continuing' materialization using the
new facts due to the monotonicity of DL reasoning, we also focus on deletions in
the remainder. More precisely, we assume the following setting and notation in
the remainder of the paper: Given a normalized ALCHI ontology O = A [ T ,
the materialization A1 of A w.r.t. T , and a set of assertions A A to be
deleted, we want to determine the materialization of A n A w.r.t. T using A1.
Doing so requires the identi cation and removal of assertions in A1 no longer
derivable from A n A , which is a rather di cult task. The Delete/Rederive
(DRed) algorithm [
        <xref ref-type="bibr" rid="ref11 ref7">7, 11</xref>
        ] therefore initially overestimates the necessary deletions
and then determines facts still derivable from A n A . This overestimation is
obtained by continuously overdeleting facts, which could be derived from already
overdeleted facts. We formalize this behavior by de ning a form of restricted rule
applications.
      </p>
      <p>De nition 5 (Restricted Derivations). Given an ontology O = A [ T and
an ABox A0, an axiom directly follows from A [ T under restriction A0, if
either 2 A0 or if a rule from Figure 1 can be applied to A w.r.t T to derive
and at least one of the premises is in A \ A0. If directly follows from A [ T
under restriction A0, we write A [ T `A0 .</p>
      <p>
        For the presentation of the DRed algorithm, we follow the presentation style
of Motik et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], but we adapt it to a consequence-based calculus. This avoids
complications with ensuring termination of a Datalog program in the presence
of function symbols, which are required to translate existential quanti ers. The
algorithm further uses several auxiliary sets: the set Dall accumulates facts that
might need to be removed from A1 due to the removal of A , the set Dnew
gathers facts derived in the current iteration of rule application, and the set
Dprev contains facts derived in the previous iteration of rule application. The
DRed algorithm determines An1ew as the (concept-)materialization of (A n A )
w.r.t. T as follows:
DR1 Set A = A n A , set Dnew = A , and set Dall = ;.
      </p>
      <p>DR2 Set Dprev = Dnew n Dall. If Dprev = ;, then go to step DR4;
DR3 Set Dall = Dall [ Dprev, set Dnew to the set of all assertions with
A1 `Dprev . Repeat step DR2.</p>
      <p>After this step, Dall contains all facts that might need to be deleted, so steps
DR2{DR3 are called overdeletion.</p>
      <p>DR4 Set An1ew = A1 n Dall, and set Dnew = Dall \ A.</p>
      <p>DR5 Evaluate an extension of the rules in Figure 1 over An1ew w.r.t. T such that
each premise additionally contains its conclusion, but restricted to match
assertions in Dall and such that the conclusion is added to Dnew.
This rederivation step adds to Dnew facts with an alternate derivation in the
updated An1ew. The additional premise restricted to matches in Dall restricts
rederivation only to facts from steps DR2{DR3.</p>
      <p>DR6 Set Dprev = Dnew n An1ew. If Dprev = ;, then terminate;
DR7 Set An1ew = An1ew [ Dprev, set Dnew to the set of all assertions with
. Repeat step DR6. Steps DR6{DR7 are called (re)insertion.</p>
      <p>An1ew `Dprev
3.2</p>
      <p>Incremental Materialization via Abstraction Re nement
We adopt DRed in the general abstraction re nement way: We construct, for
each of the di erent phases, suitable abstractions of the ABox, on which we
perform the overdeletion, rederivation and the reinsertion phase. Interleaved
renement steps (in case of overdeletion and reinsertion repeatedly, until a xpoint
is reached) transfer results back to the original ABox and yield an adapted
abstraction.</p>
      <p>While reasoning using standard abstraction re nement requires only
knowledge about asserted concepts and roles, overdeleting and rederiving on
abstractions additionally requires knowledge about the set of assertions that are to be
deleted. To keep track of such assertions, we extend the de nitions of types and
abstractions to bi-types ans bi-abstractions.</p>
      <p>De nition 6 (Bi-Type). Given ABoxes A1; A2, the bi-type of an individual
a 2 ind(A1 [ A2) w.r.t. (A1; A2) is a quadruple ( C1 (a); R1 (a); C2 (a); R2 (a)),
where ( C1 (a); R1 (a)) is the combined type of a w.r.t. A1 and ( C2 (a); R2 (a)) is
the combined type of a w.r.t. A2.</p>
      <p>De nition 7 (Bi-Abstraction). Given two ABoxes A1, A2 and a bi-type =
(whC1e;reR1B1 = fC(v ) j C 2 C1 g [ fR(v ; wR) j R 2 R1 g, B2 = fC(v ) j C 2 C2 g [
; C2 ; R2 ) w.r.t. (A1; A2), the bi-abstraction for is an ABox B1 [ B2,
fR(v ; wR) j R 2 R2 g, and v and wR are distinguished abstract individuals for
the bi-type . The bi-abstraction of (A1; A2) is
B = B1 [ B2; B1 = Sa2ind(A) B1(a); B2 = Sa2ind(A) B2(a);
where (a) is the bi-type for a w.r.t. (A1; A2) and B1(a) [ B2(a) is the
biabstraction for (a).</p>
      <p>The following example highlights, how bi-abstractions also di erentiate types
based on their (over-)deleted assertions, while still aggregating `similar' cases.
Example 3. For A = fA(a1); R(a1; b); A(a2); R(a2; b); A(a3); R(a3; b)g and A =
fA(a1); A(a3)g, the combined type of a1, a2, and a3 w.r.t. A is (fAg; fRg). To
distinguish a1 and a3 from a2, we consider the bi-types w.r.t. (A n A ; A ) and
obtain (a1) = (a3) = 1 = (;; fRg; fAg; ;) and (a2) = 2 = (fAg; fRg; ;; ;);
furthermore, (b) = 3 = (;; fR g; ;; ;).</p>
      <p>In our procedure, we use (similar to the DRed algorithm), auxiliary sets
Dall, Eall, Dnew, Enew, and Eprev, where Eall, Enew and Eprev represent sets used
within abstractions. The Abstraction Re nement Delete and Rederive algorithm
(ARDred) determines An1ew as the (concept-)materialization of A n A w.r.t. T
as follows:
ARD1 Set Dnew = A and set Dall = ;.</p>
      <p>ARD2 If Dnew n Dall = ;, then go to step ARD4.</p>
      <p>ARD3 Set Dall = Dall[Dnew, set Dnew = ;. Build the bi-abstraction B = B1[B2
w.r.t. (A1 n Dall; Dall).</p>
      <p>OD1 Set Enew = B2 and set Eall = ;.
OD2 Set Eprev = Enew n Eall. If Eprev = ;, go to step OD4.</p>
      <p>OD3 Set Eall = Eall [ Eprev, set Enew to the set of all assertions with</p>
      <p>B1 [ B2 [ T `Eprev . Go to step OD2.</p>
      <p>OD4 Determine Dnew as the update of Dall according to De nition 4, using
Eall as B and the role assertions of A1 in line 4 of the de nition.</p>
      <p>Continue with step ARD2.</p>
      <p>This concludes the overdeletion phase of the algorithm.</p>
      <p>ARD4 Set An1ew = A1 n Dall, set Dnew = Dall \ (A n A ).</p>
      <p>ARD5 Let B = B1 [ B2 be the bi-abstraction w.r.t. (An1ew; Dall). Set Enew = ;
and evaluate the rules in Figure 1 w.r.t. T over B1, s.t. conclusions are added
to Enew and Rv additionally contains its conclusion as a premise restricted
to match assertions in B2. Extend the assertions present in Dnew with the
update to Dnew w.r.t. De nition 4, using Enew as B and the role assertions
of A n A in line 4 of the De nition. Set Dnew = Dnew \ Dall.</p>
      <p>This step is also referred to as the rederivation phase.</p>
      <p>ARD6 Set Dprev = Dnew n An1ew. If Dprev = ; terminate.</p>
      <p>ARD7 Set An1ew = An1ew [ Dnew. Construct the bi-abstraction B = B1 [ B2
w.r.t. (An1ew; Dall).</p>
      <p>RD1 Set Enew = B1 \ B2, Eall = ;.</p>
      <p>RD2 Set Eprev = Enew n Eall. If Eprev = ;, go to step RD4.</p>
      <p>RD3 Set Eall = Eall [ Enew, set Enew to the set of all assertions with</p>
      <p>B1 [ Eall [ T `Eprev . Continue with step RD2.</p>
      <p>RD4 Determine Dnew as the update of An1ew according to De nition 4, using
Eall as B and the role assertions of An1ew in line 4 of the De nition.</p>
      <p>Continue with step ARD6.</p>
      <p>Steps ARD6{RD4 form the (re-)insertion phase of the algorithm. Steps
RD1{RD3 form the inner (re-)insertion phase.</p>
      <p>Similar to DRed, we have an overdeletion (steps ARD1{OD4), a
rederivation (steps ARD4{ARD5) and a reinsertion phase (steps ARD6{RD4).
Similar to abstraction re nement, instead of determining the overdeleted,
rederived and reinserted assertions on the original ABox, we determine assertions
on suitable bi-abstractions and transfer the obtained results back, in case of
overdeletion and reinsertion repeatedly, until a xpoint is reached.</p>
      <p>The use of bi-types and bi-abstractions allows us to transfer the deletion
set into B as B2. In the overdeletion phase, we (indirectly) extend B2 to
ultimately extend the overdeletion Dall and construct the bi-abstraction over (A1 n
Dall; Dall), such that B is still the abstraction of the complete materialization (as
otherwise, not all assertions could be derived). The rederivation phase uses B2
to restrict possible derivations of rule Rv. Finally, the reinsertion phases
determines rederived assertions using the `overlap' between B1 (created from An1ew)
and B2, which allows us to reduce the number of possible derivations.</p>
      <p>Note that there is a slight conceptual di erence in the overdeletion part
of DRed (which always operates on a complete (concept-)materialization of an
ABox) and the inner overdeletion (steps OD1{OD4), as the latter operates on
B and not the (concept-)materialization of B. Thus, the inner overdeletion of
ARDred also extends Eall with derivable assertions not in B.</p>
      <p>Sound- and completeness of the algorithm strongly depends on the
overdeletion phase (steps ARD1{OD4) for soundness (i.e. removing all axioms, which
are no longer derivable) and the reinsertion phase (steps ARD6{RD4) for
completeness (i.e. rederiving all axioms that are still derivable).</p>
      <p>First, we want to x the notion of overdeletion for the following discussions.
De nition 8 (Overdeletion). Let O = A [ T be an ontology, A A a set
of assertions to be deleted and A1 the (concept-)materialization of A w.r.t. T .
A set Dall A1 is an overdeletion of A1 w.r.t. A , if, for all 2 Dall, there
is a minimal ABox justi cation J A for w.r.t. T , s.t. J \ A 6= ;.</p>
      <p>As soundness of the algorithm is related to completeness of the overdeletion
phase of the algorithm, we can in the following focus on two completeness proofs.
To do so, we rst consider some properties of the restricted derivation relation of
De nition 5. We can then show that determining a complete closure for restricted
derivations in an abstraction re nement way ensures a similar closure over the
original ABoxes. Finally, we use the obtained results to show completeness w.r.t.
the base task, which is, respectively, overdeletion and rederivation.
Lemma 3 (Properties of Direct Restricted Derivations). Let O = A [ T
be an ontology and A1; A2 ABoxes with A1 A2, ind(A1) ind(A2) ind(A)
and B an ABox, s.t. there is a homomorphism h : ind(A) ! ind(B) from A to
B. Then the following properties hold for any assertion :</p>
      <p>A [ T `A1
A [ T `A1
implies A [ T `A2</p>
      <p>:
implies B [ T `h(A1\A) h( ):
(Monotonicity)
(5)
(6)
Proof (Sketch). Both properties can easily be veri ed using the assumptions,
De nitions 1 and 5 and the rules in Figure 1. tu</p>
      <p>Using De nition 5, we can describe the xpoint constructed by the
overdeletion and reinsertion phases as follows: For B the bi-abstraction w.r.t. (A1 n
Dall; Dall) (Step ARD3), the inner overdeletion phase extends B2 with assertions
to determine a closure over B1 [ B2 [ T `B2 . Similarly, in the inner
reinsertBio1nispehxatseen, dfoedr Bwi=thBa1s[seBrt2iotnhse bit-oabcsotnrastcrtuiocnt wa.crl.ot.su(rAen1oewve;rDBal1l)[(STte`pBA1\RB2D7.),</p>
      <p>
        In both cases, the results of constructing the closure are transferred back to
the original ABoxes using homomorphisms and updates. We proceed to show
(roughly similar to the completeness proof of the original abstraction re nement
approach [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]), that if no new assertions are transferred back to the original
ABoxes, a corresponding xpoint on those original ABoxes (Dall in case of the
overdeletion phase, An1ew in case of the reinsertion phase) has been reached.
Theorem 1 (Overdeletion Fixpoint Theorem). Let O = A [ T be a
normalized Horn ALCHI ontology, A1 the (concept-)materialization of A w.r.t. T
and A A a set of axioms to be deleted. Let further Dall be an ABox with
A Dall A1 and let B = B1[B2 be the bi-abstraction w.r.t. (A1nDall; Dall).
Then it holds for all with A1 [ T `Dall , that 2 Dall, if for every
bitype = ( C1 ; R1 ; C2 ; R2 ) of an individual a 2 ind(A), every atomic concept
A 2 con(O) and every role R 2 rol(O), we have
1. B1 [ B2 [ T `B2 A(v ) implies A(a) 2 Dall.
2. B1 [ B2 [ T `B2 A(wR) and R(a; b) 2 A implies A(b) 2 Dall.
Proof (Sketch). Extend B = B1 [ B2 with new role assertions to B0 = B10 [ B20
as follows: If R(a; b) 2 A1 n Dall, extend B1 with R(v (a); v (b)). If R(a; b) 2
A , extend B2 with R(v (a); v (b)). Note that there is a homomorphism from
A1 to B0 and thus, according to Property 6 of Lemma 3, B0 [ T `h(Dall) , if
A [ T `Dall . We then show that h(Dall) B20 and, therefore, B0 [ T `B20 .
Thus, we are left to show, that the new role assertions provide no new derivations,
as then the assumed properties assure the desired xpoint.
tu
      </p>
      <p>We brie y sketch the idea behind the proof, that B0 has the same atomic
concept assertions as direct derivations under restriction B20 as B under restriction
B2. It su ces to consider four individuals v1; v2; w1; w2 of the bi-abstraction, s.t.
v1 = v (a); w1 = wR(a); v2 = v (b); w2 = wR(b) and R(a; b) 2 A1. By considering
the construction of B0 and B and the rules in Figure 1 together with the
conditions of restricted derivations, we can easily show that introducing the new role
assertion R(v1; v2) does not result in new restricted entailments.</p>
      <p>We can argue similar to the above, that An1ew is determined as the
closure w.r.t. An1ew [ T `An1ew\Dall by the reinsertion phase, which concludes the
completeness proofs of the overdeletion and rederivation phases w.r.t. restricted
derivations. It is left to show, that rst of all, the results above are related to the
task at hand (removing all axioms no longer entailed by AnA and rederiving all
axioms still entailed by A n A ) and second, that the full algorithm is complete
and sound w.r.t. the base task, which is, incrementally determining the changed
materialization. We proceed to rst examine the overdeletion phase based on
the previous results and extend this examination into the soundness proof for
ARDred. We then examine the reinsertion phase and its preceding operations to
ultimately deliver the completeness proof for ARDred.</p>
      <p>For the overdeletion phase, we use the bi-abstraction w.r.t. (A1 n Dall; Dall)
and construct Dall, such that A1 [ T `Dall implies 2 Dall. In particular,
initially Dall = A . Consider the following Lemma.</p>
      <p>Lemma 4. Given an ontology O = A [ T , the (concept-)materialization A1
of A w.r.t. T and a set of axioms to be deleted A A. Let Dall be a set s.t.
A Dall and, if, for any concept or role assertion , A1 [ T `Dall , then
2 Dall. Then Dall is an overdeletion of A1 w.r.t. A according to De nition 8.</p>
      <p>, s.t. A1 [ T `Dall
Proof (Sketch). Assuming the contrary (i.e. 2= Dall), we argue by sound- and
completeness of the rules in Figure 1, that can be derived via a number of rule
applications from a minimal ABox justi cation J (as in Def. 8) and thus there is
a number of premises, of which at least one also has a minimal ABox justi cation
J 0 J with J 0 \ A 6= ;. By doing so repeatedly, we ultimately determine some
assertion holds, which is a contradiction.
tu</p>
      <p>Thus, the overdeletion phase of the ARDred algorithm in steps ARD1{OD4
produces a correct overdeletion Dall of A1 w.r.t. A . Additionally, we remove
this overdeletion from the materialization in step ARD4. Thus, it remains to
be shown that no unsound assertions are reinserted afterwards.</p>
      <p>Lemma 5. Given an ontology O = A [ T , a set of assertions to be deleted
A A and the set An1ew of the ARDred algorithm after step ARD4. If,
during the execution of the ARDred algorithm, an axiom is added to An1ew after
step ARD4, then (A n A ) [ T j= .</p>
      <p>Proof (Sketch). We argue that all newly added assertions are derived using sound
rules on sound abstractions, but with additional restrictions. As the restrictions
only remove derivations, all added assertions are sound.
tu
tu</p>
      <p>Soundness follows from the previous considerations concerning overdeletion.
Corollary 1 (Soundness of ARDred). Given an ontology O = A [ T , the
(concept-)materialization A1 of A w.r.t. T and a set of axioms to be deleted
A A. Let An1ew be the materialization obtained by executing the ARDred
algorithm for O, A1 and A . Then 2 An1ew implies (A n A ) [ T j= .</p>
      <p>For the completeness of the reinsertion part of the algorithm, we need to
additionally consider the initial contents of the sets An1ew and Dall, as they are
used in the closure construction. As shown before, Dall contains the overdeletion
of A1 w.r.t. A . For An1ew, from step ARD4 and step ARD7, we see that
A n A An1ew. Further, we show, that step ARD5 extends An1ew with at least
all assertions, which can be directly rederived from A1 n Dall.</p>
      <p>Lemma 6. Given an ontology O = A [ T , the (concept-)materialization A1 of
A w.r.t. T and a set of axioms to be deleted A A. Let further Dall be the
overdeletion of A1 w.r.t. A and An1ew = A1 n Dall. Then Dnew is extended
by step ARD5 with all axioms 2= An1ew obtained by applying one rule from
Figure 1 to A1 n An1ew.</p>
      <p>Proof (Sketch). We obtain the desired result by examining all ways, in which
a rule from Figure 1 can derive an assertion in one step and use the necessary
preconditions to determine which assertions must be part of B1 and B2 as
constructed by the algorithm in step ARD5. We then use this examination to show
that all necessary assertions will also be derived on the abstraction (and be part
of the generated update).</p>
      <p>Using these preconditions together with the established closure properties of
the reinsertion phase of the algorithm, we can now formulate the following
theorem, which rather directly entails the completeness of the ARDred algorithm.
Theorem 2. Given an ontology O = A [ T , the (concept-)materialization A1
of A w.r.t. T , a set of axioms to be deleted A A and the overdeletion Dall
of A1 w.r.t. A . Let further An1ew be the smallest set, s.t. A1 n Dall An1ew,
2 An1ew.</p>
      <p>A n A An1ew and, if any concept assertion can be derived from A1 n Dall by
directly applying one of the rules from Figure 1 w.r.t. T , then 2 An1ew. Further
extend An1ew to the smallest set, s.t. if An1ew [ T `An1ew\Dall for any concept
assertion , then 2 An1ew. Then, for any concept assertion , (AnA )[T j=
implies
Proof. As 2= An1ew and due to the initial construction of An1ew, there must be
some , s.t. is, so to speak, the initial culprit, i.e. 2= An1ew and can be
derived directly from An1ew using a rule from Figure 1. We show that if there is
any such , then the conditions of the construction of An1ew are violated.
Corollary 2 (Completeness of ARDred). Given an ontology O = A [ T ,
the (concept-)materialization A1 of A w.r.t. T and a set of axioms to be deleted
A A. Let An1ew be the materialization obtained by executing the ARDred
algorithm for O, A1 and A . Then (A n A ) [ T j= implies 2 An1ew.</p>
      <p>As both the overdeletion and reinsertion loop of the algorithm terminate
after no new assertions could be determined in the previous iteration, we obtain
the termination of the algorithm as a direct consequence of the sound- and
completeness results. In particular, we terminate in the worst case, when Dall =
A1 (overdeletion) and An1ew = A1 (reinsertion).
4</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion and Future Work</title>
      <p>We have introduced a way to incrementally maintain the
(concept-)materialization of an ALCHI ontology by combining DRed and abstraction re nement
and using a consequence-based reasoning procedure. We have further shown that
the presented procedure is sound and complete. Bene ts of this approach lie in
the summarization of similar deletion and reasoning tasks, paving the road for
e cient maintenance of materializations of large ABoxes.</p>
      <p>
        While the choosen presentation is appropriate for theoretical examinations,
we will in the future focus on optimizations needed for a practical implementation
and evaluation of the approach, to verify its practicality. For example, retaining
results from previously materialized abstractions can reduce reasoning e orts,
as results for unchanged types can be reused. Other optimizations will focus on
better handling role deletions to avoid the currently large amount of
unnecessary overdeletions (this can be done by either extending abstractions with a new
role successor for deleted roles or by reducing role deletion to concept deletions
using knowledge about propagated concepts) and on general ways to reduce the
number of generated types while retaining sound- and completeness (one could,
for example, only use the deletions of the previous abstraction-re nement round
to generate bi-abstractions in the overdeletion phase), as a reduction in the
number of types automatically entails a reduction in the overall computations.
Finally, we want to incorporate approaches which tackle the general de ciencies
of DRed, such as the Backward/Forward algorithm [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], which avoids
unnecessary overdeletions by considering knowledge still asserted in A n A .
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>The description logic handbook: Theory, implementation and applications</article-title>
          . Cambridge university press (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Barbieri</surname>
            ,
            <given-names>D.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Braga</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ceri</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Della Valle</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grossniklaus</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Incremental reasoning on streams and rich background knowledge</article-title>
          .
          <source>In: Extended Semantic Web Conference</source>
          . pp.
          <volume>1</volume>
          {
          <fpage>15</fpage>
          . Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Dolby</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fokoue</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalyanpur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schonberg</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srinivas</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Scalable Highly Expressive Reasoner (SHER)</article-title>
          .
          <source>J. of Web Semantics</source>
          <volume>7</volume>
          (
          <issue>4</issue>
          ),
          <volume>357</volume>
          {
          <fpage>361</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Glimm</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kazakov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liebig</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tran</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vialard</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Abstraction re nement for ontology materialization</article-title>
          .
          <source>In: Proc. of the 13th Int. Semantic Web Conference</source>
          ,
          <string-name>
            <surname>ISWC</surname>
          </string-name>
          <year>2014</year>
          . pp.
          <volume>180</volume>
          {
          <issue>195</issue>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Glimm</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kazakov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tran</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Ontology materialization by abstraction re nement in horn SHOIF</article-title>
          .
          <source>In: Proceedings of the 31st AAAI Conference on Arti cial Intelligence</source>
          . pp.
          <volume>1114</volume>
          {
          <fpage>1120</fpage>
          . AAAI Press (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Grau</surname>
            ,
            <given-names>B.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Halaschek-Wiener</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kazakov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Suntisrivaraporn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Incremental classi cation of description logics ontologies</article-title>
          .
          <source>Journal of Automated Reasoning</source>
          <volume>44</volume>
          (
          <issue>4</issue>
          ),
          <volume>337</volume>
          {
          <fpage>369</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mumick</surname>
            ,
            <given-names>I.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subrahmanian</surname>
            ,
            <given-names>V.S.:</given-names>
          </string-name>
          <article-title>Maintaining views incrementally</article-title>
          .
          <source>In: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data</source>
          . pp.
          <volume>157</volume>
          {
          <fpage>166</fpage>
          . SIGMOD '93,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Kazakov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Consequence-Driven Reasoning for Horn SHIQ Ontologies</article-title>
          .
          <source>In: Proc. of the 21st Int. Joint Conf. on Arti cial Intelligence</source>
          ,
          <string-name>
            <surname>IJCAI</surname>
          </string-name>
          <year>2009</year>
          . pp.
          <year>2040</year>
          {
          <year>2045</year>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. Krotzsch,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Rudolph</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Hitzler</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          :
          <article-title>Complexities of Horn Description Logics</article-title>
          .
          <source>ACM Trans. Comput. Log</source>
          .
          <volume>14</volume>
          (
          <issue>1</issue>
          ) (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nenov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piro</surname>
            ,
            <given-names>R.E.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Incremental update of datalog materialisation: the backward/forward algorithm</article-title>
          .
          <source>In: Proceedings of the 29th AAAI Conference on Arti cial Intelligence</source>
          . pp.
          <volume>1560</volume>
          {
          <fpage>1568</fpage>
          . AAAI Press (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Staudt</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jarke</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Incremental maintenance of externally materialized views</article-title>
          .
          <source>In: Proceedings of the 22th International Conference on Very Large Data Bases</source>
          . pp.
          <volume>75</volume>
          {
          <fpage>86</fpage>
          . VLDB '
          <volume>96</volume>
          , Morgan Kaufmann Publishers Inc. (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Steigmiller</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glimm</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liebig</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Completion graph caching for expressive description logics</article-title>
          .
          <source>In: Proceedings of the 28th International Workshop on Description Logics. CEUR Workshop Proceedings</source>
          , vol.
          <volume>1350</volume>
          .
          <string-name>
            <surname>CEUR-WS.org</surname>
          </string-name>
          (
          <year>2015</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>1350</volume>
          /paper-35.pdf
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Suntisrivaraporn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Module extraction and incremental classi cation: A pragmatic approach for el+ el^+ ontologies</article-title>
          .
          <source>The Semantic Web: Research</source>
          and Applications pp.
          <volume>230</volume>
          {
          <issue>244</issue>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Volz</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staab</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Incremental maintenance of materialized ontologies</article-title>
          .
          <source>In: On The Move to Meaningful Internet Systems</source>
          <year>2003</year>
          :
          <article-title>CoopIS, DOA, and</article-title>
          <string-name>
            <surname>ODBASE - OTM Confederated International</surname>
            <given-names>Conferences</given-names>
          </string-name>
          , CoopIS, DOA,
          <source>and ODBASE. Lecture Notes in Computer Science</source>
          , vol.
          <volume>2888</volume>
          , pp.
          <volume>707</volume>
          {
          <fpage>724</fpage>
          . Springer (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Volz</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staab</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Incrementally maintaining materializations of ontologies stored in logic databases</article-title>
          .
          <source>Journal on Data Semantics</source>
          II pp.
          <volume>1</volume>
          {
          <issue>34</issue>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Wandelt</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Moller, R.:
          <article-title>Towards ABox Modularization of Semi-Expressive Description Logics</article-title>
          .
          <source>J. of Applied Ontology</source>
          <volume>7</volume>
          (
          <issue>2</issue>
          ),
          <volume>133</volume>
          {
          <fpage>167</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>