<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>From Horn-S RI Q to Datalog: A Data-Independent Transformation that Preserves Assertion Entailment?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>David Carral</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Larry Gonzalez</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Patrick Koopmann</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Theoretical Computer Science TU Dresden</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Knowledge-Based Systems Group, TU Dresden</institution>
          ,
          <addr-line>Dresden</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Assertion retrieval (AR)|i.e., the task of inferring all implicit assertions from a Description Logics (DL) knowledge base (KB)|is an important reasoning task with many applications in knowledge representation and data management. To access data e ciently, one approach is to rewrite the ontology into Datalog, and then use powerful Datalog engines to compute implicit entailments. Existing rewriting techniques support DL languages from E LH to Horn-SHIQ [3]. We present the rst such transformation for Horn-SRIQu, an expressive DL that allows for the use of the role chain constructor. Furthermore, we show that the resulting method for assertion retrieval is worst-case optimal for E LH, Horn-SHIQ, and Horn-SRIQu. We empirically show that the use of Datalog rewritings can outperform state-of-the-art reasoners and that we can construct rewritings of moderate sizes for many real-world ontologies. To give a formal intuition about our approach, our method computes an AR-rewriting in the following sense. De nition 1. Let O = hT ; Ai be a Horn-SRIQu KB. A Datalog rule set RT is an AR-rewriting for T i , for every ABox A and assertion de ned over the signature of T , hT ; Ai and hRT ; Ai are equi-satis able and hT ; Ai j= i KO = hRT ; Ai j= .</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>David Carral, Larry Gonzalez, and Patrick Koopmann
103 Reactome
102
101
103
102
101</p>
      <p>Uniprot
105
103
101
1002.8M 5.1M 6.7M 8.1M</p>
      <p>100 9M 17.8M 26.2M 33.9M
axioms relevant to our Datalog program. Since this calculus was originally
designed for Horn-SHIQ, we rst need to extend our input TBox T to a TBox T+
in which the behaviour of complex role inclusion axioms is su ciently simulated.</p>
      <p>
        To show practical feasibility of our approach, we implemented a prototype
and performed two di erent experiments. We rst compared the performance
of solving AR using our Datalog rewritings versus using the DL reasoner
Konclude [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. We considered two real-world, data-intensive ontologies from the
biological domain, Reactome and Uniprot [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] which we normalised and enriched
with 3 and 5 complex role inclusion axioms, respectively. The resulting TBoxes
contain 485 and 304 axioms. The rewritten Datalog programs contain 539 and
367 rules, and were computed in 221 and 182 seconds. For each ontology, we
considered ABoxes of various sizes, generated by sampling the real-world ABoxes
using the method by Zhou et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. We use RDFox [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] as Datalog engine for
computing the chase of our rewritings, and compare its performance with that
of Konclude. Figure 1 shows the wall-clock times measured in this experiment,
ignoring the time used for parsing and loading, in logarithmic scale.
      </p>
      <p>
        In our second experiment, we computed rewritings for 121 selected TBoxes
from MOWLCorp [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Figure 1 shows the number of axioms of the input
ontologies (blue bars) and the number of rules of the Datalog rewritings (red bars).
For some ontologies, the rewritings got substantially larger. This was expected,
and in theory unavoidable, due to the double exponential time complexity of
assertion entailment in Horn-SRIQu: for Datalog, this complexity is only
polynomial (since predicate arity is bounded), which is why our rewritings are in
the worst case double exponential in the size of the input. Our evaluation
conrms that these blow-ups are not only of theoretical nature, but may actually
happen for some real-world ontologies. However, in most cases, the size of the
computed Datalog rule sets was still of comparable dimensions: in 59% of cases,
the increase was at most by 100%, and in 74% of cases, it was at most by 200%.
Acknolwedgements. The rst two authors are funded by Deutsche
Forschungsgemeinschaft in project number 389792660 (TRR 248, Center for Perspicuous
Systems) and Emmy Noether grant KR 4381/1-1 (DIAMOND). The third
author is funded by DFG in the CRC 912 (HAEC).
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Carral</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gonzalez</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koopmann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>From Horn-SRIQ to datalog: A dataindependent transformation that preserves assertion entailment</article-title>
          .
          <source>In: Proceedings of the 33rd Conference on Arti cial Intelligence (AAAI</source>
          <year>2019</year>
          ) (
          <year>January 2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Deutsch</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nash</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Remmel</surname>
            ,
            <given-names>J.B.</given-names>
          </string-name>
          :
          <article-title>The chase revisited</article-title>
          .
          <source>In: Proc. PODS' 08</source>
          .
          <string-name>
            <surname>ACM SIGMOD-SIGACT-SIGART. ACM</surname>
          </string-name>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ortiz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simkus</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tran</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xiao</surname>
          </string-name>
          , G.:
          <article-title>Query rewriting for HornSHIQ plus rules</article-title>
          .
          <source>In: Proc. AAAI'12</source>
          . AAAI Press (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>The irresistible SRIQ</article-title>
          .
          <source>In: Proc. OWLED'05. CEUR Workshop Proceedings</source>
          , vol.
          <volume>188</volume>
          .
          <string-name>
            <surname>CEUR-WS.org</surname>
          </string-name>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Kazakov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>An extension of complex role inclusion axioms in the description logic SROIQ</article-title>
          .
          <source>In: Proc. IJCAR'10. Lecture Notes in Computer Science</source>
          , vol.
          <volume>6173</volume>
          , pp.
          <volume>472</volume>
          {
          <fpage>486</fpage>
          . Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nenov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piro</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olteanu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Parallel materialisation of Datalog programs in centralised, main-memory RDF systems</article-title>
          .
          <source>In: Proc. AAAI'14</source>
          . pp.
          <volume>129</volume>
          {
          <fpage>137</fpage>
          . AAAI Press (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matentzoglu</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goncalves</surname>
            ,
            <given-names>R.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glimm</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Steigmiller</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>The OWL reasoner evaluation (ORE) 2015 competition report</article-title>
          .
          <source>J. of Autom. Reasoning</source>
          <volume>59</volume>
          (
          <issue>4</issue>
          ),
          <volume>455</volume>
          {
          <fpage>482</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Steigmiller</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liebig</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glimm</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Konclude: System description</article-title>
          .
          <source>J. of Web Semantics</source>
          <volume>27</volume>
          ,
          <issue>78</issue>
          {
          <fpage>85</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cuenca Grau</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nenov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaminski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
          </string-name>
          , I.:
          <article-title>PAGOdA: Payas-you-go ontology query answering using a Datalog reasoner</article-title>
          .
          <source>J. of Artif. Intell. Res</source>
          .
          <volume>54</volume>
          ,
          <issue>309</issue>
          {
          <fpage>367</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>