<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Beyond Skolem Chase: A Study of Finite Chase under Standard Chase Variant</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Arash</forename><surname>Karimi</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Computing Science</orgName>
								<orgName type="institution">University of Alberta</orgName>
								<address>
									<postCode>T6G 2E8</postCode>
									<settlement>Edmonton</settlement>
									<region>AB</region>
									<country key="CA">Canada</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Heng</forename><surname>Zhang</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Huazhong University of Science and Technology</orgName>
								<address>
									<postCode>430074</postCode>
									<settlement>Wuhan</settlement>
									<region>Hubei</region>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jia-Huai</forename><surname>You</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Computing Science</orgName>
								<orgName type="institution">University of Alberta</orgName>
								<address>
									<postCode>T6G 2E8</postCode>
									<settlement>Edmonton</settlement>
									<region>AB</region>
									<country key="CA">Canada</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Beyond Skolem Chase: A Study of Finite Chase under Standard Chase Variant</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">0C5E792EB2E8B0B6DD2200B6B1415F6A</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T22:12+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The chase procedure is an indispensable tool for several database applications, where its termination guarantees decidability of these tasks. Most previous studies have focused on the skolem chase variant and its termination. It is known that the standard chase variant is more powerful in termination analysis provided a database is given. But all-instance termination analysis presents a challenge, since the critical database and similar techniques do not work. The interest of this paper is on the following question: How to devise a framework in which various known decidable classes of finite skolem chase can all be properly extended by the technique of standard chase? To address this question, we develop a novel technique to characterize the activeness of all possible cycles of a certain length in the standard chase procedure, which leads to the formulation of a parameterized class called k-SAFE(cycle), which guarantees all-instance, allpath termination, where the parameter takes a cycle function by which a concrete class of finite standard chase is instantiated. The approach applies to any class of finite skolem chase that is identified with a condition of acyclicity. More generally, we show how to extend the hierarchy of bounded rule sets under skolem chase without increasing the complexity of data and combined reasoning tasks.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Introduction</head><p>The advent of emerging applications of knowledge representation and ontological reasoning have been the motivation of recent studies on existential rule languages, known as tuple-generating dependencies (TGDs <ref type="bibr" target="#b0">[1]</ref>, also called rules) or Datalog ± <ref type="bibr" target="#b1">[2]</ref>, which have been considered a powerful modeling language for applications in data exchange, data integration, ontological querying, and so on. A major advantage of this approach is that the formal semantics based on first-order logic facilitates reasoning in an application, where answering conjunctive queries over a database extended with a set of existential rules is a primary task, but unfortunately an undecidable one in general <ref type="bibr" target="#b2">[3]</ref>. Chase procedure is a bottom-up algorithm that extends a given database by applying specified rules. If such a procedure terminates, given an input database D, a finite rule set Σ and a conjunctive query, we can answer the query against Σ and D by deciding whether the result of chase based on Σ and D entails the query.</p><p>Four variants of chase procedure have been considered in the literature, which are called oblivious, semi-oblivious (skolem), standard (aka restricted) and core chase. With oblivious chase being a weaker version of skolem chase and core chase as a parallel, wrapping procedure of standard chase (which indeed captures all universal models), the main interests have been on skolem <ref type="bibr" target="#b3">[4]</ref> and standard chase <ref type="bibr" target="#b4">[5]</ref>. In particular, given a rule set and a database, we know that whenever skolem chase terminates so does the standard chase, but the reverse does not hold in general. Thus, standard chase is more powerful in termination analysis.</p><p>In spite of existence of many notions of acyclicity in the literature, (cf. <ref type="bibr" target="#b5">[6]</ref> for a comprehensive survey), there are natural examples from the real world ontologies that do not belong to any known class, but with terminating standard chase. However, finding any characterization to assure standard chase termination is a very challenging task, and in the last decade, to the best of our knowledge only one condition has been found <ref type="bibr" target="#b6">[7]</ref>, originally in the context of description logics. As shown in <ref type="bibr" target="#b7">[8]</ref>, the problem of checking all-instance termination of standard chase is not a recursively enumerable problem (i.e. in general, the set of all-instance terminating standard chase TGDs is not enumerable). The tools developed in this paper are the first of its kind to provide an effective enumeration algorithm to characterize all-instance terminating standard chase TGDs.</p><p>In this work, we provide a highly general theoretical framework to identify strict superclasses of all existing classes of finite chase that we are aware of.</p><p>The main contributions of this paper are as follows:</p><p>1. We introduce a novel characterization of derivations under standard chase. We show that, although there is no unique database for termination analysis under standard chase, there exist a collection of "critical databases" by which the non-termination behavior of a derivation sequence can be captured. This is shown in Theorem 1. 2. We define a hierarchy of decidable classes of finite standard chase, called k-SAFE(cycle), which, when given a definition of cycle, is instantiated to a concrete class of finite chase. This is achieved by our Theorem 3 based on which various acyclicity conditions under skolem chase can be generalized to introduce classes of finite chase beyond finite skolem chase. 3. We show that the entire hierarchy of δ-bounded rule sets under skolem chase <ref type="bibr" target="#b8">[9]</ref> can be generalized by introducing δ-bounded sets under standard chase, and as shown in Theorem 8, this extension does not increase the reasoning complexity under skolem chase.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Preliminaries</head><p>We assume the following pairwise disjoint sets of symbols: Const a countably infinite set of constants, N a countably infinite set of (labeled) nulls, and V a countably infinite set of variables. A schema is a finite set R of relation (or predicate) symbols, where each R ∈ R is assigned a positive integer as its arity which is denoted by arity(R). Let Dom = Const ∪ N. Terms are symbols in Dom ∪ V. Ground terms are terms involving no variables. An atom is an expression of the form R(t), where t ∈ (Const ∪ V) arity(R) and R is a predicate symbol from R. A general instance (or simply an instance) I is a set of atoms over the relational schema R; term(I) denotes the set of terms occurring in I. A database is a finite instance I where terms are constants from Const. Given two instances I and J over the same schema, a homomorphism h : I → J is a mapping on terms which is identity on constants and for every atom R(t) of I we have that R(h(t)) (which we may write alternatively by h(R(t))) is an atom of J such that h(I) ⊆ J.</p><p>A tuple-generating dependency (also called a rule) is a first-order sentence σ of the form: φ(x, y) → ∃zψ(x, z), where x and y are sets of universally quantified variables (with the quantifier omitted) and φ and ψ are conjunctions of atoms constructed from relation symbols from R, constants from Const, and variables from x ∪ y and x ∪ z respectively. The formula φ (resp. ψ) is called the body of σ, denoted body(σ) (resp. the head of σ, denoted head(σ)).</p><p>Given a rule σ, a skolem function f σ z is introduced for each variable z ∈ z where arity(f σ z ) = |x|. Terms constructed from skolem functions and constants are called skolem terms. In this paper, we will regard skolem terms as a special class of nulls. Ground terms in this context are constants from N or skolem terms. The functional transformation of σ, denoted sk(σ), is the formula obtained from σ by replacing each occurrence of z i ∈ z with f σ zi (x). The skolemized version of a rule set Σ is the union of sk(σ) for all rules σ ∈ Σ and is denoted sk(Σ).</p><p>We use var u (σ) and var ex (σ) to refer to the sets of universal and existential variables appearing in σ, and var(σ) refers to the set of all variables appearing in σ. We further define: a path (based on Σ) is a nonempty (finite or infinite) sequence of rules from Σ; a cycle C = (σ 1 , ..., σ n ) (n ≥ 1) is a finite path whose first and last elements coincide (i.e., σ 1 = σ n ); a k-cycle (k &gt; 0) is a cycle in which at least one rule has k + 1 occurrences and all other rules have k + 1 or less occurrences. Given a path P , with Rules(P ), we denote the set of distinct rules used in P .</p><p>We assume all rules are standardized apart so that no variable is shared by more than one rule; given an instance I, term(I) denotes the set of all terms occurring in I; and for a set or a sequence Q, the cardinality |Q| is defined as usual.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Skolem and Standard Chase Variants</head><p>Chase is a fixpoint construction that accepts as input a database D and a finite set Σ of rules and adds atoms to D.</p><p>This paper is concerned with the skolem and standard chase variants. Below, let D be a database and Σ a rule set over the same schema.</p><p>We define skolem chase based on a breadth-first fixpoint construction as follows: we let chase 0 sk (D, Σ) = D and, for all i &gt; 0, let chase i sk (D, Σ) be the union of chase i−1 sk (D, Σ) and h(head(sk(σ)) for all rules σ ∈ Σ and all homomorphisms h such that h(body(σ)) ⊆ chase i−1 sk (D, Σ). Then, we let chase sk (D, Σ) be the union of chase i sk (D, Σ) for all i ≥ 0. Due to order sensitive derivations, standard chase is defined over paths. In this paper, when we define a homomorphism h : I → J, if I and J are clear from the context, we may define such a homomorphism as a mapping from variables to terms. Definition 1. Let P = (σ 1 , σ 2 , ...) be a path, where σ i ∈ Σ for all i ≥ 1, and H = (h 1 , h 2 , ...) homomorphisms such that |P | = |H|. A standard chase path based on Σ, denoted chase p std (D, P, H), expresses a sequence of chase steps that satisfy the following conditions: for all i ≥ 1,</p><formula xml:id="formula_0">(i) h i (body(σ i )) ⊆ D i−1 , with h i : var u (σ i ) → term(D i−1 ) (ii) h + i (head(σ i )) ⊆ D i−1 for all extensions h + i of h i , 1 such that h + i : var(σ i ) → term(D i−1 )</formula><p>where</p><formula xml:id="formula_1">D 0 = D and D i = D i−1 ∪ h i (head(sk(σ i ))</formula><p>). We also use chase p std (D, P, H) to denote the union of D i , ∀i ≥ 0.</p><p>By abuse of notation, we may say "chase p std (D, P, H) is a standard chase path" to mean that the sequence of chase steps on the path P using H, for the given database D, constitutes a standard chase path.</p><p>We say that a rule set Σ has finite standard chase, or is terminating under standard chase, if there are only finite standard chase paths based on Σ, for all databases.</p><p>The classes of rule sets whose chase terminates on all paths (all possible derivation sequences of chase steps) independent of given databases (thus all instances) is denoted by CT ∀∀ , where ∈ {sk, std} (sk for skolem chase and std for standard chase).</p><p>In skolem chase, the applied rule σ and the related homomorphism h form a trigger (σ, h), w.r.t. the conclusion set generated so far. If such a skolem chase step is also a standard chase step, (σ, h) is called an active trigger <ref type="bibr" target="#b9">[10]</ref>.</p><p>A conjunctive query (CQ) Q is a formula of the form Q(x) := ∃yΦ(x, y), where x and y are tuples of variables; Φ(x, y) is a conjunction of atoms with variables in x ∪ y. A boolean conjunctive query (BCQ) is a CQ of the form Q().</p><p>It is well-known that, for all boolean conjunctive queries (BCQs) q, D ∪ Σ |= q (under the semantics of first-order logic) if and only if chase sk (D, Σ) |= q and if and only if ∀P,H chase p std (D, P, H) |= q <ref type="bibr" target="#b10">[11]</ref>.</p><p>To illustrate the practical relevance of the standard chase, let us consider modeling a secure communication protocol where two different signal types can be transmitted: type A (or inter-zone) and type B (intra-zone). Let us consider a scenario where a transmitter from one zone requests to establish a secure communication with a receiver from another zone in this network. There are an unknown number of trusted servers. Before a successful communication between two users can occur, following a handshake protocol, the transmitter must send a type A signal to a trusted server in the same zone and receive an acknowledgment back. Then, that trusted server sends a type B signal to a trusted server in the receiver zone.</p><p>Below, we use existential rules to model the described communication (the modeling here does not include the actual process of transmitting signals).</p><p>Example 1. Consider the rule set Σ 1 below, where S(x, y) denotes a request to send a type A signal from x to y and D(x, y) q request to send a type B signal from x to y. Note that u and v are trusted servers in the zone where x and y are located, respectively.</p><formula xml:id="formula_2">D(x, y) → ∃u S(x, u), S(u, x) D(x, y), S(x, z), S(z, x) → ∃v D(z, v) Let sk(Σ 1 ) be σ 1 : D(x, y) → S(x, s 1 (x)), S(s 1 (x), x) σ 2 : D(x, y), S(x, z), S(z, x) → D(z, s 2 (z))</formula><p>where s 1 and s 2 are function symbols. With the database D 0 = {D(t, r)}, after applying σ 1 and σ 2 , we have:</p><formula xml:id="formula_3">D 0 ∪ {S(t, s 1 (t)), S(s 1 (t), t), D(s 1 (t), s 2 (s 1 (t)))}.</formula><p>Clearly, the path (σ 1 , σ 2 ) leads to a standard chase path, but (σ 1 , σ 2 , σ 1 ) does not, since the trigger for applying the last rule in the path is not active -the head can be satisfied by already derived atoms S(s 1 (t), t) and S(t, s 1 (t)). Now let us consider another rule set Σ 2 = {r 1 , r 2 }, where,</p><formula xml:id="formula_4">r 1 : D(x, y) → ∃uB(u), S(x, u), S(u, x) r 2 : D(x, y), S(x, z), S(z, x), B(z) → ∃v B(v), D(z, v)</formula><p>With the same input database D 0 , we can find out that any non-empty prefix of P = (r 1 , r 2 , r 1 , r 2 , r 1 ) leads to a standard chase path except P itself. Note that P is a 2-cycle.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Finite Standard Chase by Activeness</head><p>Since skolem chase is based on triggers and standard chase applies active triggers, standard chase provides a more powerful tool for termination analysis for a given database. However, this does not extend to the case of all-instance termination, as the critical database technique <ref type="bibr" target="#b11">[12]</ref> for skolem chase does not apply to standard chase. Recall that a critical database is one that contains a ground atom for each relation symbol filled with exactly one fresh constant. The above example is not at all a surprise, as the complexity of membership checking in the class of rule sets that have finite standard chase, CT std ∀∀ , is coRE-complete <ref type="bibr" target="#b7">[8]</ref>, which implies that in general, there exists no effectively computable (finite) set of databases which can simulate termination w.r.t. all input databases<ref type="foot" target="#foot_1">2</ref> . What we can do is to identify an RE subset of CT std ∀∀ , whose size can grow asymptotically and, at the same time, whose finite subsets can be checked for standard chase termination.</p><p>One natural consideration draws attention to the notion of cycles since, firstly, cycles are recursively enumerable with increasing lengths, and secondly, it is these cycles that may cause non-termination. Thus, checking cycles for safety yields an RE set, which can be extended by checking more nested cycles. However, a challenging question is which databases to be checked against. In the following, we tackle this question.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Capturing Activeness by Witness Databases</head><p>Given a path, our goal is to simulate derivations under standard chase with an arbitrary database, by derivations with a collection of databases. If this simulation captures all derivations in the path with any database, by running this simulation we can determine whether the given rule set is terminating for some finite set of pre-specified paths, for all databases.</p><p>We only need to consider the type of paths that potentially lead to cyclic applications of chase in the sense that the last rule of the path depends on the first, possibly through some intermediate ones in between. Note that σ in Example 3 depends on itself based on the classic notion of unification. So, with the aim of ruling out similar examples, we need to consider a dependency notion under which the cycle P = (σ, σ) in the above example is not identified as a dangerous cycle. For this purpose, we consider the notion of rule dependencies as introduced in <ref type="bibr" target="#b12">[13]</ref>, which is based on piece unification <ref type="bibr" target="#b13">[14]</ref>. Condition (a) gives a sufficient condition for rule dependency, but it may be an overestimate, which is constrained by condition (b). It can be easily observed that in Example 3, condition (a) holds (for B = {T (x, y)} and H = {T (y, z)} where θ = {x/y, y/z}) but condition (b) does not (since var ex (H) = {z} and z is unified with y which occurs in B and body(σ) \ B = {P (x, y)}). Therefore, based on Def. 2, no piece unifier of body(σ) and head(σ) exists. Definition 3. Given two rules σ 1 and σ 2 , we say that σ 2 depends on σ 1 , if there is a piece unifier of body(σ 2 ) with head(σ 1 ), and we say that σ 2 depends on σ 1 w.r.t. θ, if θ is such a piece unifier. Terminology: Given a vector V = (v 1 , ..., v n ) where n ≥ 2, a projection of V preserving end points, denoted V = (v 1 , ..., v m ), is a projection of V (as defined in usual way), with the additional requirement that the end points are preserved, i.e., v 1 = v 1 and v m = v n . By abuse of terminology, V above will simply be called a projection of V . Definition 4. Let Σ be a rule set, D a database, and P a path (σ 1 , ..., σ n ) with n ≥ 2. A vector of homomorphisms H = (h 1 , ..., h n ) is called chained for P if there is a projection H = (h 1 , ..., h m ) of H and the corresponding path projection P = (σ 1 , ..., σ m ) of P such that for all 1 ≤ i &lt; m, σ i+1 depends on σ i w.r.t. h i .</p><p>With the aim of capturing condition (ii) of Def. 1 based on the notions that we introduced, in what follows, we define the notion of activeness. Definition 5. (Activeness) Let Σ be a rule set and D a database. A path P = (σ 1 , ..., σ n ) is said to be active w.r.t. D, if there exists a chained vector of homomorphisms H = (h 1 , ..., h n ) for P such that chase p std (D, P, H) is a standard chase path for D, P, H based on Σ. In this case, H = (h 1 , ..., h n ) is called a witness of the activeness of P w.r.t. D.</p><p>Intuitively, the definition says that a path P is active w.r.t. a database D if there is an active trigger for each rule application in the path, hence it is a standard chase path, and the last rule application depends on some earlier ones and eventually on the first on the path. In other words, if P is not active w.r.t. D we then know that P is either "terminating" w.r.t. D, or for each vector of homomorphisms H = (h 1 , ..., h n ) such that chase p std (D, P, H) is a standard chase path, H is not chained for P ; thus it does not pose as a "dangerous cycle" even in the case σ 1 = σ n .</p><p>Let H = (h 1 , ..., h n ) be a vector of homomorphisms such that chase p std (D, P, H) is a standard chase path. To determine if H is chained for P , O(n 2 ) checks are needed, <ref type="foot" target="#foot_2">3</ref>where each h i (body(σ i )) is checked against every h j (head(σ j )), for all j &lt; i, to determine if σ i depends on σ j w.r.t. h i ∪ h j .</p><p>We are now ready to address the issue of which databases to be checked against for termination analysis. First, let us define a mapping e i : V ∪ Const → V, i ∪ Const, for each i ∈ N, where constants in Const are mapped to themselves and each variable v ∈ V is mapped to v, i . Definition 6. Given a path P = (σ 1 , σ 2 , ...), we define</p><formula xml:id="formula_5">D P = {e i (body(σ i )) : 1 ≤ i &lt; |P | + 1}.<label>(1)</label></formula><p>A pair x, i in D P is intended to name a fresh constant, based on the derivation step in P in which the variable x occurs. In this way, all these fresh constants are distinct. Note that D P is a set of atoms over these new constants (and the constants already appearing in rules) and is independent of any input database. Let us call these pairs indexed constants and use short hand v i for v, i .</p><p>Intuitively, atoms in D P are intended to simulate those in a derivation sequence where body atoms in an applied rule are satisfied by atoms from a given database. Since in general we don't know which body atoms are satisfied by a given database in each step of a derivation sequence, we need to test activeness using each subset of D P . This process is finite whenever P is.</p><p>Note that due to the structure of D P , application of each rule to D P may lead to a new trigger and therefore, without the notion of chained property, every path can be trivially active.</p><p>Example 4. Consider the rule set Σ of Example 3 and a path P = (σ, σ). We have: D P = {T (x 1 , y 1 ), P (x 1 , y 1 ), T (x 2 , y 2 ), P (x 2 , y 2 )}. We see that P is not active w.r.t. D P , as there does not exist any chained vector of homomorphisms H = (h 1 , h 2 ) for P .</p><p>Theorem 1. Let Σ be a rule set, and P = (σ 1 , ..., σ n ) a path. P is active w.r.t. some database if and only if P is active w.r.t. some database D * ⊆ D P . Definition 7. A k-cycle P = (σ 1 , ..., σ n ) is safe if for all databases D, P is not active w.r.t. D. A rule set Σ is said to be k-safe if all k-cycles of Σ are safe.</p><p>It then follows from Theorem 1, we have Corollary 2. Let Σ be a rule set. For any k-cycle P = (σ 1 , ..., σ n ), if for all subsets D * of D P , P is not active w.r.t. D * , then P is safe. E.g., it can be verified that the rule set Σ 1 in Example 1 is k-safe for any k ≥ 1. We now introduce a hierarchy of classes of finite standard chase based on the notion of k-safety. The idea is to introduce a parameter of cycle function to generalize various notions of acyclicity in the literature. Definition 8. Let Σ be a rule set and C the set of all finite cycles based on Σ. A cycle function is a mapping cycle Σ : C → {T, F }.</p><p>Let cycle be a binary function from rule sets and cycles of which cycle Σ is the projection function on its first parameter, i.e. cycle(Σ, C) = cycle Σ (C). By abuse of terminology, the function cycle, which in addition takes a rule set as a parameter, is also called a cycle function.</p><formula xml:id="formula_6">Definition 9. (k-SAFE(cycle) rule sets) A rule set Σ is said to be k-SAFE(cycle), or belong to k-SAFE(cycle) (under cycle function cycle), if for every k-cycle C which is mapped to T under cycle Σ , C is safe.</formula><p>In the following, we show how to define a cycle function from any arbitrary acyclicity condition of finite skolem chase such as weak acyclicity (WA) <ref type="bibr" target="#b10">[11]</ref>, super-weak acyclicity (SWA) <ref type="bibr" target="#b11">[12]</ref>, etc. Definition 10. Let Π be an arbitrary condition of acyclicity of finite skolem chase. A cycle function Φ Π is defined as follows: For each rule set Σ and each cycle C based on Σ if the condition for checking whether Π holds for rules in Rules(C) <ref type="foot" target="#foot_3">4</ref> , then Φ Π maps (Σ, C) to F ; otherwise Φ Π maps (Σ, C) to T .</p><p>Example 5. Considering the rule set Σ 1 from Example 1, and assuming Π = WA in Def. 10, Φ Π maps all cycles C such that Rules(C) ∩ {σ 1 , σ 2 } = {σ 1 , σ 2 } to F and the rest of the cycles to T .</p><p>The following theorem is easy to show. Theorem 3. Let Π be a class of finite skolem chase that is defined by a condition of acyclicity and Φ Π be the corresponding cycle function as defined above. Then, for all</p><formula xml:id="formula_7">k ≥ 1, (i) k-SAFE(Φ Π ) ⊃ Π, and (ii) k-SAFE(Φ Π ) ⊆ CT std ∀∀ . Example 6. It is not difficult to check that the rule set Σ 1 in Example 1 is 2-SAFE(Φ WA ),</formula><p>where Φ WA is the corresponding cycle function based on the condition of acyclicity for WA. Note that Φ WA maps 1-cycles of the form (σ i , σ i ), where i = 1, 2, to F and all other 1-cycles to T<ref type="foot" target="#foot_4">5</ref> . Similarly, the rule set Σ 2 in the same example is 2-SAFE(Φ WA ).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Extension of Bounded Rule Sets</head><p>In <ref type="bibr" target="#b8">[9]</ref>, a family of existential rule languages with finite (skolem) chase based on the notion of δ-boundedness has been introduced and the data and combined complexities of reasoning with those languages for specific bound functions (k-exponentially bounded functions). Our aim in this section is to provide an effective method to extend bounded languages to introduce all-instance terminating standard chase classes. Before we state our results, let us introduce some notions.</p><p>A bound function is a function from positive integers to positive integers. A rule set Σ is called δ-bounded under skolem chase for some bound function δ, if for all databases D, ht(chase sk (D, Σ)) ≤ δ(||Σ||), where ||Σ|| is the number of symbols occurring in Σ, and ht(A) is the maximum height (maximum nesting depth) of skolem terms that have at least one occurrence in A, and ∞ otherwise. Let us denote by δ-B sk the class of δ-bounded rule sets under skolem chase. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Membership Complexity</head><p>We consider the membership problem in δ-B std languages: given a rule set Σ and a bound function δ, whether Σ is δ-bounded under the standard chase variant. Proposition 6. Let δ be a bound function computable in DTIME(T (n)) <ref type="foot" target="#foot_5">6</ref> for some function T (n). Then, it is in</p><formula xml:id="formula_8">DTIME(C δ + ||Σ|| ||Σ|| O(δ(||Σ||)) × |P(D c )| × C c × Π P 2 7 )</formula><p>to check if a rule set Σ is δ-bounded under the standard chase variant, where</p><formula xml:id="formula_9">C δ = T (log||Σ||) O(1) , |P(D c )| = 2 b(Σ)×||Σ|| O(δ(||Σ||)) in which b(Σ)</formula><p>is the maximum number of body atoms for rules in Σ, and</p><formula xml:id="formula_10">C c = ||Σ|| 2O(δ(||Σ||)) × 2 ||Σ|| O(δ(||Σ||)) .</formula><p>Now consider what we call exponential tower functions:</p><formula xml:id="formula_11">exp κ (n) = n κ = 0 2 exp κ−1 (n) κ &gt; 0</formula><p>Then, we have the following corollary from Prop. 6: Corollary 7. Checking if a rule ontology is exp κ -bounded under standard chase variant is in (κ + 2)-EXPTIME.</p><p>The corollary implies that, for any exponential tower function δ, the extra computation for checking δ-boundedness under standard chase stays within the same complexity upper bound for δ-boundedness under skolem chase, as reported in <ref type="bibr" target="#b8">[9]</ref>.</p><p>Remark 1. For membership checking, switching from skolem to standard chase variant does not increase the complexity for exp κ -bounded rule sets. However, it should be clear that for some syntactic classes of finite skolem chase which are known to belong to exp 0 -bounded rule sets (e.g. WA, JA, SWA, etc.), the penalty for going beyond finite skolem chase is the higher cost of membership checking.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Data and Combined Complexity:</head><p>Since the size of the tree generated by standard chase has the same upper bound as that generated by skolem chase, it is not difficult to show that the complexity upper bound for checking Σ ∪ D q for exp κ -bounded rule sets is the same for the standard and skolem chase variants. It then follows from <ref type="bibr" target="#b8">[9]</ref> that we have Theorem 8. The problem of Boolean conjunctive answering for exp κ -bounded rule ontologies under standard chase variant is (κ + 2)-EXPTIME-complete for combined complexity and PTIME-complete for data complexity. Remark 2. Based on Theorem 8, it can be observed that the entire hierarchy of δbounded rule sets under skolem chase introduced in [9] can be extended with no increase in combined and data complexity of reasoning. This holds even for individual syntactic classes of finite skolem chase (such as WA, JA, SWA, etc.).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Related Work and Discussion</head><p>Many sufficient conditions have been discovered for termination of skolem and oblivious chase based on different notions of acyclicity based on graphs derived from the given rule set. Typically, such a graph is constructed based on some notion of dependencies in the rule set, e.g., position dependencies and rule dependencies. These classes include WA (weak acyclicity) <ref type="bibr" target="#b10">[11]</ref>, STR (stratification) <ref type="bibr" target="#b14">[15]</ref>, safety <ref type="bibr" target="#b15">[16]</ref>, SWA (superweak acyclicity) <ref type="bibr" target="#b3">[4]</ref>, aGRD (acyclicity of graph of rule dependencies) <ref type="bibr" target="#b16">[17]</ref>, and JA (joint acyclicity) <ref type="bibr" target="#b17">[18]</ref>.</p><p>To the best of our knowledge, <ref type="bibr" target="#b6">[7]</ref> is the only work that have studied termination of the standard chase towards positive results. Their results are only in the context of Horn-SRIQ description logics and not applicable to existential rules. In <ref type="bibr" target="#b18">[19]</ref> a notion called well of positivity has been devised which is an extension of the critical instance technique and has been applied in undecidability results. For their purpose, they only need one extra constant in addition to the well of positivity to show undecidability of the standard chase for all instances on all paths. However, in general, there is no bound for the number of constants needed to witness non-termination of the standard chase.</p><p>Under reasonable assumptions, one can find syntactic conditions that guarantee termination of the standard chase for all instances and all paths. As an example, consider the following rule Σ = {σ}, where:</p><p>σ : E(x, y) → ∃u 1 . . . u k E(y, u 1 ), E(u 1 , u 2 ), . . . , E(u k , y) for some k ≥ 1. It can be observed that starting from any database D, chase std (D, Σ) terminates in maximum |I E |+1 steps, where I E is the database D restricted to the tuple over predicate E. Intuitively, the reason that Σ ∈ CT std ∀∀ is the observation that predicate E (for which E[i], for some i, is the placeholder of (potentially) infinite terms), when seen as a graph in which it is interpreted as the edge relation, forms a cycle in head(σ), where σ belongs to the following cycle C = (σ, σ) that is mapped to T under any condition of (skolem) acyclicity.</p><p>In <ref type="bibr" target="#b19">[20]</ref> it is shown that for (weakly-)guarded and (simple-)linear TGDs, the problem of deciding (non-)termination of oblivious/skolem chase is decidable. This characterization leads to finding upper bounds for the length of cycles that should be considered in order to decide (non-)termination w.r.t. the skolem chase. Theorem 1 provides tools to extend their results to all-instance, all-path standard chase variant. Note that they only consider single-head TGDs<ref type="foot" target="#foot_7">8</ref> . So, their results cannot be trivially extended to the standard variant of chase for (arbitrary) multi-head TGDs. Further results in this direction are outside of the focus of this paper and is the subject of the future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusions</head><p>In this work we introduced a technique to characterize finite standard chase, which can be applied to extend any class of finite skolem chase identified by a condition of acyclicity. Then, we showed how to apply our techniques to extend δ-bounded rule sets. Our complexity analyses showed that this extension does not increase the complexities of membership checking, nor the complexity of combined and data reasoning tasks for δ-bounded rule sets under standard chase compared to skolem chase. However, comparing with some subclasses of the exp 0 -bounded language, membership checking for finite standard chase incurs higher cost.</p><p>We will next investigate conditions for subclasses with a reduction of cost for membership testing. One idea is to find syntactic conditions under which triggers to a rule are necessarily active, and the other is on symmetric conditions under which triggers of certain kind cannot be active. We anticipate that position graphs could be useful in these analyses.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Example 2 .</head><label>2</label><figDesc>With Σ = {E(x 1 , x 2 ) → ∃zE(x 2 , z)} and the critical database D c = {E( * , * )}, where * is a fresh constant, the skolem chase does not terminate w.r.t. D c , which is a faithful simulation of the termination behavior of Σ under skolem chase. But the standard chase of Σ and D c terminates in zero step, as no active triggers exist. However, the standard chase of Σ and database {E(a, b)} does not terminate.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Example 3 .</head><label>3</label><figDesc>Consider the rule set Σ = {σ} where σ : T (x, y), P (x, y) → ∃zT (y, z)With D 0 = {T (a, b), P (a, b)}, we have: chase ∆ (D 0 , Σ) = D 0 ∪{T (b, f (b))},where f is a skolem function and ∆ = {std, sk}. It can be seen that after the first application of σ, there does not exist any more trigger and the skolem chase of Σ and D 0 terminates.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Definition 2 .</head><label>2</label><figDesc>(Piece unifier) Given a pair of rules (σ 1 , σ 2 ), a piece unifier of body(σ 2 ) and head(σ 1 ) is a unifying substitution θ of var(B) ∪ var(H) where B ⊆ body(σ 2 ) and H ⊆ head(σ 1 ) which satisfies the following conditions: (a) θ(B) = θ(H), and (b) variables in var ex (H) are not unified with variables that occur in both B and body(σ 2 ) \ B.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Lemma 4 .</head><label>4</label><figDesc>For any given rule set Σ and bound function δ, there exists a cycle function F δ,Σ : C → {T, F }, where C is set of all finite cycles from Σ with the following property: F δ,Σ maps cycles C from Σ of length greater than ||Σ|| O(δ(||Σ||)) to F and the rest of cycles from Σ to T . Note that this property provides a legitimate cycle function based on Def. 8.We call the cycle function F δ,Σ constructed in the above lemma, δ-cycle function w.r.t. Σ. We are ready to define the standard chase counterpart of δ-bounded rule sets. Definition 11. Given a bound function δ, a rule set Σ is called δ-bounded under the standard chase variant if, for all databases D, Σ is in k-SAFE(cycle), where k = ||Σ|| O(δ(||Σ||)) and cycle is a δ-cycle function w.r.t. Σ. Denote the set of all δ-bounded rule sets under the standard chase variant by δ-B std . The next result states the relationship between δ-B std and δ-B sk . Theorem 5. For any bound function δ, δ-B std ⊃ δ-B sk .</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">An extension h + i of hi, denoted h + i ⊇ hi, assigns in addition to mapping hi ground terms to existential variables.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">Even if there exists such finite databases, there is no computable bound on their size.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">Note that the problem of piece unifiability is known to be NP-complete.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">Recall that Rules(C) is the set of distinct rules in C.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_4">Note that e.g, for 1-cycles of the form (σ2, σ2) or (σ2, σ1, σ1, σ2), there is no vector of homomorphisms satisfying the chained property.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_5">The set of all decision problems solvable in T (n) using a deterministic Turing machine.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_6">The class of problems solvable in coNP using an NP oracle.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_7">The standard transformation of multi-head TGDs to single-head TGDs preserves oblivious/skolem chase termination, but does not preserve standard chase termination.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A proof procedure for data dependencies</title>
		<author>
			<persName><forename type="first">C</forename><surname>Beeri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">Y</forename><surname>Vardi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the ACM (JACM)</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="718" to="741" />
			<date type="published" when="1984">1984</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Datalog+/-: A family of logical knowledge representation and query languages for new applications</title>
		<author>
			<persName><forename type="first">A</forename><surname>Calì</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Gottlob</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Lukasiewicz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Marnette</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pieris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. LICS-2010</title>
				<meeting>LICS-2010</meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="228" to="242" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The implication problem for data dependencies</title>
		<author>
			<persName><forename type="first">C</forename><surname>Beeri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">Y</forename><surname>Vardi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. ICALP-1981</title>
				<meeting>ICALP-1981</meeting>
		<imprint>
			<date type="published" when="1981">1981</date>
			<biblScope unit="page" from="73" to="85" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Generalized schema-mappings: from termination to tractability</title>
		<author>
			<persName><forename type="first">B</forename><surname>Marnette</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. PODS-2009</title>
				<meeting>PODS-2009</meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="13" to="22" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Data exchange: Semantics and query answering</title>
		<author>
			<persName><forename type="first">R</forename><surname>Fagin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">G</forename><surname>Kolaitis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Popa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Database TheoryICDT 2003</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="207" to="224" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Acyclicity notions for existential rules and their application to query answering in ontologies</title>
		<author>
			<persName><forename type="first">Cuenca</forename><surname>Grau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Horrocks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Krötzsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kupke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Magka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Motik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Artificial Intelligence Research</title>
		<imprint>
			<biblScope unit="page" from="741" to="808" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A practical acyclicity notion for query answering over horn-SRIQ ontologies</title>
		<author>
			<persName><forename type="first">D</forename><surname>Carral</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Feier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hitzler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Semantic Web Conference</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="70" to="85" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">The data-exchange chase under the microscope</title>
		<author>
			<persName><forename type="first">G</forename><surname>Grahne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Onet</surname></persName>
		</author>
		<idno>CoRR abs/1407.2279</idno>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Existential rule languages with finite chase: complexity and expressiveness</title>
		<author>
			<persName><forename type="first">H</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>You</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence</title>
				<meeting>the Twenty-Ninth AAAI Conference on Artificial Intelligence</meeting>
		<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="1678" to="1684" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The chase procedure and its applications in data exchange</title>
		<author>
			<persName><forename type="first">A</forename><surname>Onet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Dagstuhl Follow-Ups</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Data exchange: semantics and query answering</title>
		<author>
			<persName><forename type="first">R</forename><surname>Fagin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">G</forename><surname>Kolaitis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Popa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">336</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="89" to="124" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Generalized schema-mappings: from termination to tractability</title>
		<author>
			<persName><forename type="first">B</forename><surname>Marnette</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems</title>
				<meeting>the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="13" to="22" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Improving the forward chaining algorithm for conceptual graphs rules</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Baget</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">KR</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="407" to="414" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Extending decidable cases for rules with existential variables</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Baget</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Leclère</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Mugnier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ê</forename><surname>Salvat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IJCAI. Volume</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="677" to="682" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The chase revisited</title>
		<author>
			<persName><forename type="first">A</forename><surname>Deutsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Remmel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the twentyseventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems</title>
				<meeting>the twentyseventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="149" to="158" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">On chase termination beyond stratification</title>
		<author>
			<persName><forename type="first">M</forename><surname>Meier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Schmidt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lausen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the VLDB Endowment</title>
				<meeting>the VLDB Endowment</meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="970" to="981" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Towards farsighted dependencies for existential rules</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Baget</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Mugnier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Thomazo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Web Reasoning and Rule Systems</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="30" to="45" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Extending decidable existential rules by joining acyclicity and guardedness</title>
		<author>
			<persName><forename type="first">M</forename><surname>Krötzsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rudolph</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Twenty-Second International Joint Conference on Artificial Intelligence</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">All-instances termination of chase is undecidable</title>
		<author>
			<persName><forename type="first">T</forename><surname>Gogacz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Marcinkowski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Automata, Languages, and Programming</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="293" to="304" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Chase termination for guarded existential rules</title>
		<author>
			<persName><forename type="first">M</forename><surname>Calautti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Gottlob</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pieris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 34th ACM Symposium on Principles of Database Systems</title>
				<meeting>the 34th ACM Symposium on Principles of Database Systems</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="91" to="103" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
