=Paper= {{Paper |id=Vol-2037/paper31 |storemode=property |title=Querying Finite or Arbitrary Models? No matter! Existential Rules May Rely on Both Once Again (Discussion Paper) |pdfUrl=https://ceur-ws.org/Vol-2037/paper_31.pdf |volume=Vol-2037 |authors=Giovanni Amendola,Nicola Leone,Marco Manna |dblpUrl=https://dblp.org/rec/conf/sebd/AmendolaLM17 }} ==Querying Finite or Arbitrary Models? No matter! Existential Rules May Rely on Both Once Again (Discussion Paper)== https://ceur-ws.org/Vol-2037/paper_31.pdf
        Querying finite or arbitrary models? No matter!
         Existential rules may rely on both once again?
                                       (discussion paper)

                  Giovanni Amendola1 , Nicola Leone2 , and Marco Manna2
                        1 School of Informatics, University of Edinburgh, UK

                                    gamendol@exseed.ed.ac.uk
                               2 DeMaCS, University of Calabria, Italy

                                  {leone,manna}@mat.unical.it



         Abstract. Ontology-based query answering asks whether a Boolean query is
         satisfied by all models of a logical theory consisting of an extensional database
         paired with an ontology. The introduction of existential rules (i.e., Datalog rules
         extended with existential quantifiers in rule-heads) as a means to specify the on-
         tology gave birth to Datalog+/-, a framework that has received increasing atten-
         tion in the last decade, with focus also on decidability and finite controllability
         to support effective reasoning. Five basic decidable fragments have been singled
         out: linear, weakly-acyclic, guarded, sticky, and shy. For all these fragments, ex-
         cept shy, the important property of finite controllability has been proved, ensuring
         that a query is satisfied by all models of the theory iff it is satisfied by all its finite
         models. In this paper we complete the picture by showing that finite controlla-
         bility holds also for shy ontologies. The demonstration is based on a number of
         technical tools which could be used for similar purposes and are valuable per se.


1     Introduction
The problem of answering a Boolean query q against a logical theory consisting of
an extensional database D paired with an ontology Σ is attracting the increasing at-
tention of scientists in various fields of Computer Science, ranging from Artificial In-
telligence [12, 17] to Database Theory [19, 5] and Logic [4, 20]. This problem, called
ontology-based query answering (OBQA) [8], is usually stated as D ∪ Σ |= q, and it is
equivalent to checking whether q is satisfied by all models of D ∪ Σ according to the
standard approach of first-order logics, yielding an open world semantics.
     Description Logics [2] and Datalog± [7] have been recognized as the two main
families of formal knowledge representation languages to specify Σ , while union of
(Boolean) conjunctive queries, U(B)CQs for short, is the most common and studied
formalism to express q. For both these families, OBQA is generally undecidable (see,
[22] and [6], respectively). Hence, a number of syntactic decidable fragments of the
above ontological languages have been singled out. However, decidability alone is not
? The paper has been partially supported by the MISE under project “PIUCultura – Paradigmi

    Innovativi per l’Utilizzo della Cultura” (n. F/020016/01-02/X27), and under project “Smarter
    Solutions in the Big Data World (S2BDW)”.
                   guarded    shy         weakly-acyclic         sticky


                             linear          datalog             joinless


                                      inclusion-dependencies

                      Fig. 1. Taxonomy of the basic Datalog± classes.

the only desideratum. For example, a good balance between computational complexity
and expressive power is, without any doubt, of high importance too. But there is another
property that is turning out to be as interesting as challenging to prove: it goes under
the name of finite controllability [23]. An ontological fragment F is said to be finitely
controllable if, for each triple hD, Σ , qi with Σ ∈ F, it holds that D ∪ Σ 6|= q implies
that there exists a finite model M of D ∪ Σ such that M 6|= q. This is usually stated as
D ∪ Σ |= q if, and only if, D ∪ Σ |=fin q (where |=fin stands for entailment under finite
models), as the “only if” direction is always trivially true. And there are contexts, like
in databases [23, 4], in which reasoning with respect to finite models is preferred.
     In this paper we focus on the Datalog± family, which has been introduced with the
aim of “closing the gap between the Semantic Web and databases” [9] to provide the
Web of Data with scalable formalisms that can benefit from existing database technolo-
gies. In fact, Datalog± generalizes two well-known subfamilies of Description Log-
ics called EL and DL-Lite, which collect the basic tractable languages for OBQA in
the context of the Semantic Web and databases. In particular, we consider ontologies
where Σ is a set of existential rules, each of which is a first-order formula ρ of the form
∀X∀Y(φ (X, Y) → ∃Zp(X, Z)), where the body φ (X, Y) of ρ is a conjunction of atoms,
and the head p(X, Z) of ρ is a single atom.
     The main decidable Datalog± fragments rely on the following five syntactic prop-
erties: weak-acyclicity [15], guardedness [6], linearity [9], stickiness [10], and shy-
ness [21]. And these properties underlie the basic classes of existential rules called
weakly-acyclic, guarded, linear, sticky, and shy, respectively. Several variants and com-
binations of these classes have been defined and studied too [11, 13, 18], as well as
semantic properties subsuming the syntactic ones [3, 21].
     The five basic classes above are pairwise uncomparable, except for linear which is
strictly contained in both guarded and shy, as depicted in Figure 1. Interestingly, both
weakly-acyclic and shy strictly contain datalog —the well-known class collecting sets
of rules of the form ∀X∀Y(φ (X, Y) → p(X)), where existential quantification has been
dropped. Moreover, sticky strictly contains joinless —the class collecting sets of rules
where each body contains no repeated variable. The latter, introduced by Gogacz and
Marcinkowski [16] to prove that sticky is finitely controllable, plays a central role also
in this paper. Finally, both linear and joinless strictly contain inclusion-dependencies —
the well-known class of relational database dependencies collecting sets of rules with
one single body atom and no repeated variable.
     Under arbitrary models, OBQA can be reduced to the problem of answering q over
a universal (or canonical) model U that can be homomorphically embedded into every
other model (both finite and infinite) of D ∪ Σ . Therefore, D ∪ Σ |= q if, and only if,
U |= q. A way to compute a universal model is to employ the so called chase procedure.
Starting from D, the chase “repairs” violations of rules by repeatedly adding new atoms
—introducing fresh values, called nulls, whenever required by an existential variable—
until a fixed-point satisfying all rules is reached. In the classical setting, the chase is
therefore sound and complete. But when finite model reasoning ( |=fin ) is required, then
the chase is generally uncomplete, unless ontologies are finitely controllable. Hence,
proving this property is of utmost importance, especially in contexts where finite model
reasoning is relevant, like for databases [23, 4].
    Finite controllability of weakly-acyclic comes for free since every ontology here
admits a finite universal model, computed by a variant of the chase procedure which
goes under the name of restricted chase [15]. Conversely, the proof of this property for
the subsequent three classes has been a very different matter. Complex, yet intriguing,
constructions have been devised for linear [23, 4], guarded [4], and more recently for
sticky [16]. To complete the picture, we have addressed the same problem for shy and
get the following positive result, which is the main contribution of the paper.

Theorem 1. Under shy ontologies, D ∪ Σ |= q if, and only if, D ∪ Σ |=fin q.

    For the proof, we design (in Section 3) and exploit (in Section 4) three key technical
tools that we consider rather general and that we believe can be useful in the future for
similar, or even more general, purposes. In particular, the first (canonical rewriting) and
the third one (well-supported finite models) are applicable to every set of existential
rules, besides shy ontologies. Finally, we exploit the fact that joinless sets of existential
rules are finitely controllable [16]. (Full constructions and proofs are reported in [1].)


2    Ontology-Based Query Answering

Basics. Let C, N and V denote pairwise disjoint discrete sets of constants, nulls and
variables, respectively. An element t of T = C ∪ N ∪ V is called term. An atom is a
labeled tuple p(t1 , . . . ,tm ), where p is a predicate symbol, m is the arity, and t1 , . . . ,tm are
terms. An atom is simple if it contains no repeated term. We also consider propositional
atoms, which are simple atoms of arity 0 written without brackets. Given two sets A
and B of atoms, a homomorphism from A to B is a mapping h : T → T such that c ∈ C
implies h(c) = c, and also p(t1 , . . . ,tm ) ∈ A implies p(h(t1 ), . . . , h(tm )) ∈ B. As usual,
h(A) = {p(h(t1 ), . . . , h(tm )) : p(t1 , . . . ,tm ) ∈ A} ⊆ B. An instance I is a discrete set of
atoms where each term is either a constant or a null.
    Syntax. A database D is a finite null-free instance. An (existential) rule ρ is a first-
order formula ∀X∀Y(φ (X, Y) → ∃Zp(X, Z)), where body(ρ) = φ (X, Y) is a conjunc-
tion of atoms, and head(ρ) = p(X, Z) is an atom. Constants may occur in ρ. If Z = 0,                 /
then ρ is datalog rule. An ontology Σ is a set of rules. A union of Boolean conjunctive
query (UBCQ) q is a first-order expression of the form ∃Y1 ψ1 (Y1 ) ∨ . . . ∨ ∃Yk ψk (Yk ),
where each ψ j (Y j ) is a conjunction of atoms. Constants may occur also in q. In case
k = 1, then q is called Boolean conjunctive query, or BCQ for short.
    Semantics. Consider a triple hD, Σ , qi as above. An instance I satisfies a rule ρ ∈ Σ ,
denoted by I |= ρ, if whenever there is a homomorphism h from body(ρ) to I, then there
is a homomorphism h0 ⊇ h|X from {head(ρ)} to I. Moreover, I satisfies Σ , denoted by
I |= Σ , if I satisfies each rule of Σ . The models of D ∪Σ , denoted by mods(D, Σ ), consist
of the set {I : I ⊇ D and I |= Σ }. An instance I satisfies q, written I |= q, if there is a
homomorphism from some ψ j (Y j ) to I. Also, q is true over D ∪ Σ , written D ∪ Σ |= q,
if each model of D ∪ Σ satisfies q.
     The chase. We recall the notion of chase [14]. Consider a logical theory hD, Σ i
as above. A rule ρ ∈ Σ is applicable to an instance I if there is a homomorphism h
from body(ρ) to I. Let I 0 = I ∪ h0 (head(ρ)), where h0 ⊇ h|X is a homomorphism from
head(ρ) to I 0 such that, for each Z ∈ Z, h0 (Z) is a different fresh null not occurring
in I. We will write hρ, hi(I) = I 0 . Indeed, it defines a single chase step. The chase
procedure of D ∪ Σ is a sequence I0 = D ⊂ I1 ⊂ I2 ⊂ . . . ⊂ Im ⊂ . . . of instances obtained
by applying exhaustively the rules of Σ in a fair fashion such that, for each i > 0,
Ii = hρ, hi(Ii−1 ), for some rule ρ and homomorphism h from body(ρ) to Ii−1 . We define
chase(D, Σ ) = ∪i≥0 Ii . It is well-known that chase(D, Σ ) is a universal model of D ∪ Σ .
In fact, for each M ∈ mods(D, Σ ), there is a homomorphism from chase(D, Σ ) to M.
Hence, given a UBCQ q, it holds that chase(D, Σ ) |= q if and only if D ∪ Σ |= q [15].
     Shy ontologies. Consider a chase step hρ, hi(I) = I 0 employed in the construction
of chase(D, Σ ). If Σ is shy, then its underlying properties [21] guarantee that: (1) if X
occurs in two different atoms of body(ρ), then h(X) ∈ C; and (2) if X and Y occur both
in head(ρ) and in two different atoms of body(ρ), then h(X) = h(Y ) implies h(X) ∈ C.
     Finite controllability. The finite models of a theory D ∪ Σ , denoted by fmods(D, Σ ),
are defined as the set of instances {I ∈ mods(D, Σ ) : |I| ∈ N}, each of finite size. An
ontological fragment F is said to be finitely controllable if, for each database D, for
each ontology Σ of F, and for each UBCQ q, it holds that D ∪ Σ 6|= q implies that there
exists a finite model M of D ∪ Σ such that M 6|= q. This is formally stated as D ∪ Σ |= q
if and only if D ∪ Σ |=fin q, or equivalently chase(D, Σ ) |= q if and only if D ∪ Σ |=fin q.

3     Technical Tools
3.1   Canonical Rewriting
From a triple hD, Σ , qi we build the triple hDc , Σ c , qc i enjoying the following properties:
(1) Dc is propositional database; (2) Σ c are constant-free rules containing only simple
atoms; (3) qc is a constant-free UBCQ containing only simple atoms; (4) chase(Dc , Σ c )
is a constant-free instance containing only simple atoms; (5) there is a “semantic” bi-
jection between chase(D, Σ ) and chase(Dc , Σ c ). By exploiting the above five properties
we are able to state the following result.
Theorem 2. D ∪ Σ |= q if, and only if, Dc ∪ Σ c |= qc .
     Let us now shed some light on our construction. To this aim, consider the ontology
Σ = {person(X) → ∃Y fatherOf (Y, X); fatherOf (X,Y ) → person(X)}, and the database
D = {person(tim), person(john), fatherOf (tim, john)}. Let p, f , c1 and c2 be shorthands
of person, fatherOf , tim and john, respectively. Hence, chase(D, Σ ) is D ∪ {p(ni )}i>0 ∪
{ f (n1 , c1 ), f (n2 , c2 )} ∪ { f (ni+2 , ni ), f (ni+3 , ni+1 )}i>0 . From D we construct the propo-
sitional database Dc = {p[c1 ] , p[c2 ] , f[c1 ,c2 ] } obtained by encoding in the predicates the
tuples of D. Then, from Σ we construct Σ c collecting the following rules:
   p[c1 ] → ∃Y f[1,c1 ] (Y )      f[c1 ,c1 ] → p[c1 ]   f[c1 ,1] (Y ) → p[c1 ]          f[1,1] (X) → p[1] (X)
   p[c2 ] → ∃Y f[1,c2 ] (Y )      f[c1 ,c2 ] → p[c1 ]   f[c2 ,1] (Y ) → p[c2 ]      f[1,2] (X,Y ) → p[1] (X)
p[1] (X) → ∃Y f[1,2] (Y, X)       f[c2 ,c1 ] → p[c2 ]   f[1,c1 ] (X) → p[1] (X)
                                  f[c2 ,c2 ] → p[c2 ]   f[1,c2 ] (X) → p[1] (X)

The predicates here encode tuples of terms consisting of database constants (c1 and c2 )
and placeholders of nulls (1 and 2). Consider the first rule ρ : p(X) → ∃Y f (Y, X) applied
by the chase over D ∪ Σ , and h = {X 7→ c1 ,Y 7→ n1 } be its associated homomorphism.
Hence, h(body(ρ)) = p(c1 ) and h(head(ρ)) = f (n1 , c1 ). Such an application is mimed
by the sister rule ρ c : p[c1 ] → ∃Y f[1,c1 ] (Y ). By exploiting the same homomorphism we
obtain h(body(ρ c )) = p[c1 ] and h(head(ρ c )) = f[1,c1 ] (n1 ). Actually, the encoded tuple
[c1 ] in p[c1 ] says that the original twin atom p(c1 ) is unary and its unique term is exactly
c1 . Moreover, the encoded tuple [1, c1 ] in f[1,c1 ] (n1 ) says that the original twin atom
 f (n1 , c1 ) is binary, that its first term is a null, and that its second term is exactly the
constant c1 . Since from predicate f[1,c1 ] we only know that the first term is a null, it
must be unary to keep the specific null value.
     In the above construction, red rules are those applied by the chase on Dc ∪ Σ c .
For example, rule f[1,c1 ] (X) → p[1] (X) mimics f (X,Y ) → p(X) when X is mapped
to a null and Y to c1 ; and rule f[1,2] (X,Y ) → p[1] (X) mimics f (X,Y ) → p(X) when
X and Y are mapped to different nulls. Hence, chase(Dc , Σ c ) = Dc ∪ {p[1] (ni )}i>0 ∪
{ f[1,c1 ] (n1 ), f[1,c2 ] (n2 )} ∪ { f[1,2] (ni+2 , ni ), f[1,2] (ni+3 , ni+1 )}i>0 . As a result, the rewrit-
ing separates the interaction between the database constants propagated body-to-head
via universal variables and the nulls introduced to satisfy existential variables. Also,
since the predicates encode the “shapes” of the twin atoms —namely f[1,2] (X,Y ) means
different nulls while f[1,1] (X) the same null— repeated variables are encoded too.
     By following the same approach, we can rewrite also the query. Consider the BCQ
q = ∃X∃Y r(X,Y ) ∧ s(Y, c1 ). Assume D contains only the                                                     c
                                                                                constant c1 . Therefore, q
is the UBCQ r[c1 ,c1 ] ∧ s[c1 ,c1 ] ∨ ∃Y r[c1 ,1] (Y ) ∧ s[1,c1 ] (Y ) ∨ ∃Xr[1,c1 ] (X) ∧ s[c1 ,c1 ] ∨
                                                                            
  ∃Y r[1,1] (Y ) ∧ s[1,c1 ] (Y ) ∨ ∃X∃Y r[1,2] (X,Y ) ∧ s[1,c1 ] (Y ) .


3.2    Active and Harmless Rules in Shy

Consider a pair hD, Σ i and the associated pair hDc , Σ c i in canonical form. The final
goal of this section is to syntactically identify (and discard) rules of Σ c that are never
applied by the chase. But to be effective here, we need to exploit the key properties
of Σ . So, in the rest of this section, let us assume that Σ ∈ shy. First, we observe that
the canonical rewriting of a shy ontology is indeed shy. Second, we partition Σ c in two
sets, denoted by Σac and Σhc , collecting active and harmless rules, respectively, enjoying
the following properties: (1) Σhc are the rules of Σ c with at least a variable occurring in
more than one body atom; (2) Σac = Σ c \ Σhc is a joinless (and still shy) ontology; and (3)
chase(Dc , Σ c ) = chase(Dc , Σac ). By exploiting the above three properties we are able to
state the following result.

Theorem 3. For each Σ ∈ shy, it holds that Dc ∪ Σ c |= qc if, and only if, Dc ∪ Σac |= qc .
    Also in this case, instead of proving formally the above theorem, we provide some
insights regarding the way how we partition Σ c . From the database D = {p(c)} and
the shy ontology Σ = {p(X) → ∃Y f (Y, X); f (X,Y ), p(X) → p(Y )} we first construct
Dc = {p[c] } and Σ c collecting the following rules
                               p[c] → ∃Y f[1,c] (Y )     f[1,c] (X), p[1] (X) → p[c]
                         p[1] (X) → ∃Y f[1,2] (Y, X)     f[1,1] (X), p[1] (X) → p[1] (X)
                      f[c,c] , p[c] → p[c]           f[1,2] (X,Y ), p[1] (X) → p[1] (Y )
                 f[c,1] (Y ), p[c] → p[1] (Y )
Again, red rules are those applied by the chase on Dc ∪ Σ c . Now we observe that there
is no way to trigger the rules in the second column: although the chase does produce an
atom f (t, ni ) for some term t and null ni , it never produces any atom p(ni ). This fact is
detected by the syntactic conditions underlying shy, which actually consider variable X
as “protected” in f (X,Y ), p(X) → p(Y ). Hence, Σac contains only the joinless rules in
the first column, while Σhc contains the remaining “join-rules” in the second column.


3.3   Well-Supported Finite Models

Inspired by the notion of well-supported interpretations introduced in the context of
general logic programming, we define the notion of well-supported finite models of a
pair hD, Σ i, denoted by wsfmods(D, Σ ), which enjoy the following properties: (1) for
each M ∈ fmods(D, Σ ), there exists a well-supported finite model M 0 ⊆ M; (2) each
minimal finite model of D ∪ Σ is a well-supported finite model. Assuming that the sym-
bol |=wsf refers to the satisfiability of the query under the well-supported finite models
only, by exploiting the above two properties we are able to state the following result.

Theorem 4. D ∪ Σ |=fin q, if and only, if D ∪ Σ |=wsf q.

     Unfortunately, in this case, we cannot avoid defining formally this notion. A finite
instance I is called well-supported w.r.t. D∪Σ if there exists an ordering (α1 , . . . , αm ) of
its atoms such that, for each j ∈ {1, . . . , m}, at least one of the following two conditions
is satisfied: (i) α j is a database atom of D; or (ii) there exist a rule ρ of Σ and a
homomorphism h from the atoms of ρ to {α1 , . . . , α j } such that h(head(ρ)) = {α j }
and h(body(ρ)) ⊆ {α1 , . . . , α j−1 }.
     Interestingly, although each finite model of an ontological theory contains a well-
supported finite model of the theory, the reverse inclusion does not hold, as shown in
the following example. Consider the father-person ontology Σ given in Section 3.1.
M = D ∪ { f (c1 , c1 ), f (c2 , c1 )} is a well-supported finite model of D ∪ Σ . Indeed, for
instance, (p(c1 ), p(c2 ), f (c1 , c2 ), f (c1 , c1 ), f (c2 , c1 )) is a well-supported ordering of M.
However, M \ { f (c2 , c1 )} is a model of D ∪ Σ . Therefore, M is not a minimal model.


4     Finite Controllability of Shy Ontologies

With our technical tools in place, we are now able to prove our main technical result.

Theorem 5. For each Σ ∈ shy, it holds that D∪Σ |=fin q if, and only if, Dc ∪Σac |=wsf qc .
                                                 Th. 1
                  D ∪ Σ |= q                                            D ∪ Σ |=fin q
                  Th. 2                                                         Th. 5

                Dc ∪ Σ c |= qc                                        Dc ∪ Σac |=wsf qc
                  Th. 3                                                         Th. 4
                                     Gogacz and Marcinkowski [16]
                Dc ∪ Σac |= qc                                        Dc ∪ Σac |=fin qc

                      Fig. 2. Chain of implications for the proof of Theorem 1.

     For our purposes, the “only if” direction is the most important one. Consider an ar-
bitrary model M c ∈ wsfmods(Dc , Σac ). Let decode(M c ) be the instance obtained from M c
by decoding its atoms. For example, if p[1,c,1] (ni ) ∈ M c , then p(ni , c, ni ) ∈ decode(M c ).
It suffices to prove that there exist M ∈ fmods(D, Σ ) and a homomorphism h0 s.t. h0 (M) ⊆
decode(M c ). Indeed, by hypothesis, there exists a homomorphism h s.t. h(q) ⊆ M, and
so (h0 ◦ h)(q) ⊆ decode(M c ). Then, the result follows by the fact that (h0 ◦ h)(qc ) ⊆ M c .
     The difficulty here is that decode(M c ) could not be a model of D ∪ Σ . Consider
the database D = {s(c)} and the shy ontology Σ = {s(X) → ∃Y p(Y ); s(X) → ∃Y r(Y );
p(X), r(X) → g(X)}. The canonical rewriting is Dc = {s[c] } and Σ c as follows:

            s[c] → ∃Y p[1] (Y )           s[c] → ∃Y r[1] (Y )                p[c] , r[c] → g[c]
      s[1] (X) → ∃Y p[1] (Y )       s[1] (X) → ∃Y r[1] (Y )         p[1] (X), r[1] (X) → g[1] (X)

One can verify that M c = {s[c] , p[1] (n1 ), r[1] (n1 )} is a (minimal) well-supported finite
model of Dc ∪ Σac since Σac is obtained from Σ c by discarding the last harmless rule.
However, decode(M c ) = {s(c), p(n1 ), r(n1 )} is not a model of D ∪ Σ because the third
rule is not satisfied. The idea now is to show how to construct from decode(M c ) a model
M ∈ fmods(D, Σ ) that can be homomorphically mapped to decode(M c ). Intuitively, we
identify the starting points in which existentially quantified variables of Σac have been
satisfied and rename the introduced terms using the so-called propagation ordering. In
the example above, consider the ordering (s(c), p(n1 ), r(n1 )) of decode(M c ), replace n1
in p(n1 ) by hn1 , 2, 2i (null n1 introduced in the second atom in the second position),
and replace n1 in r(n1 ) by hn1 , 3, 2i (null n1 introduced in the third atom in the second
position). Then, since M c is well-supported, we propagate (if needed) these new terms
according the supporting ordering. In our case, M = {s(c), p(hn1 , 2, 2i), r(hn1 , 3, 2i)} is
now a finite model of D ∪ Σ that can be mapped to decode(M c ).
    Finally, to prove Theorem 1, we can now combine the trivial “only if” implication
with the dashed chain of intermediate results given in Figure 2.


5    Conclusion
At this point, also thanks to the results shown in this paper, we know that every basic
decidable Datalog± class is finitely controllable. However, the problem remains open
for extensions and combinations of these classes [11, 13, 18]. For example, it is open
whether finite controllability holds for the following classes: (i) sticky-join, general-
izing sticky and linear; (ii) tame, generalizing sticky and guarded; and (iii) weakly-
sticky-join, generalizing sticky-join, weakly-acyclic and shy. We believe that the tech-
niques developed in this paper can be exploited to give an answer to these questions.

References
 1. Amendola, G., Leone, N., Manna, M.: Finite model reasoning over existential rules. Fourth-
    coming (2017)
 2. Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.): The
    Description Logic Handbook: Theory, Implementation, and Applications. CUP (2003)
 3. Baget, J., Leclère, M., Mugnier, M., Salvat, E.: Extending decidable cases for rules with
    existential variables. In: In Proc. of IJCAI’09. pp. 677–682 (2009)
 4. Bárány, V., Gottlob, G., Otto, M.: Querying the guarded fragment. Logical Methods in Com-
    puter Science 10(2) (2014)
 5. Bourhis, P., Manna, M., Morak, M., Pieris, A.: Guarded-based disjunctive tuple-generating
    dependencies. ACM TODS 41(4), 27:1–27:45 (2016)
 6. Calı̀, A., Gottlob, G., Kifer, M.: Taming the infinite chase: Query answering under expressive
    relational constraints. J. Artif. Intell. Res. (JAIR) 48, 115–174 (2013)
 7. Calı̀, A., Gottlob, G., Lukasiewicz, T.: Datalog± : a unified approach to ontologies and in-
    tegrity constraints. In: In Proc. of ICDT’09. pp. 14–30 (2009)
 8. Calı̀, A., Gottlob, G., Lukasiewicz, T.: Tractable query answering over ontologies with
    datalog+/-. In: In Proc. of DL’09 (2009)
 9. Calı̀, A., Gottlob, G., Lukasiewicz, T.: A general datalog-based framework for tractable query
    answering over ontologies. J. Web Sem. 14, 57–83 (2012)
10. Calı̀, A., Gottlob, G., Pieris, A.: Advanced processing for ontological queries. PVLDB 3(1),
    554–565 (2010)
11. Calı̀, A., Gottlob, G., Pieris, A.: Towards more expressive ontology languages: The query
    answering problem. AIJ 193, 87–128 (2012)
12. Calvanese, D., De Giacomo, G., Lembo, D., Lenzerini, M., Rosati, R.: Data complexity of
    query answering in description logics. AIJ 195, 335–360 (2013)
13. Civili, C., Rosati, R.: A broad class of first-order rewritable tuple-generating dependencies.
    In: In Proc. of Datalog 2.0. pp. 68–80 (2012)
14. Deutsch, A., Nash, A., Remmel, J.B.: The chase revisited. In: In Proc. of PODS’08. pp.
    149–158 (2008)
15. Fagin, R., Kolaitis, P.G., Miller, R.J., Popa, L.: Data exchange: semantics and query answer-
    ing. TCS 336(1), 89–124 (2005)
16. Gogacz, T., Marcinkowski, J.: Converging to the chase - A tool for finite controllability. In:
    In Proc. of LICS’13. pp. 540–549 (2013)
17. Gottlob, G., Kikot, S., Kontchakov, R., Podolskii, V.V., Schwentick, T., Zakharyaschev, M.:
    The price of query rewriting in ontology-based data access. AIJ 213, 42–59 (2014)
18. Gottlob, G., Manna, M., Pieris, A.: Combining decidability paradigms for existential rules.
    TPLP 13(4-5), 877–892 (2013)
19. Gottlob, G., Orsi, G., Pieris, A.: Query rewriting and optimization for ontological databases.
    ACM TODS 39(3), 25:1–25:46 (2014)
20. Gottlob, G., Pieris, A., Tendera, L.: Querying the guarded fragment with transitivity. In: In
    Proc. of ICALP’13. pp. 287–298 (2013)
21. Leone, N., Manna, M., Terracina, G., Veltri, P.: Efficiently computable Datalog∃ programs.
    In: In Proc. of KR’12 (2012)
22. Rosati, R.: The limits of querying ontologies. In: In Proc. of ICDT’07. pp. 164–178 (2007)
23. Rosati, R.: On the finite controllability of conjunctive query answering in databases under
    open-world assumption. JCSS 77(3), 572–594 (2011)