<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Homomorphism Lattice, Unique Characterizations, and Concept Learning</article-title>
      </title-group>
      <abstract>
        <p>Various problems arising in the context of example-driven approaches to query discovery have turned out to be intimately related to basic structural properties of the homomorphism lattice of nite structures, such as density, or the existence of duals. In this keynote, I will review some such connections, and highlight some relevant recent results.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Let us consider the partial order (Str; hom), where Str is the set of all nite
structures over some schema S, and hom denotes the existence of a
homomorphism (that is, A hom B holds if there is a homomorphism from A to B, i.e., a
function from the domain of A to the domain of B that preserves structure). For
the purpose of this exposition, we will assume that S is a xed, nite schema,
consisting of relation symbols and constant symbols. We will write A &lt;hom B if
A hom B and B 6 hom A, and we will say that A and B are homomorphically
equivalent if A hom B and B hom A.</p>
      <p>
        This partial order (Str; hom) turns out to have a rich structure and has been
the subject of extensive study. For a wonderful textbook on this topic (focusing
on the case of directed graphs, where the schema S consists of a single binary
relation and no constant symbols), see [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. We review here a few relevant results.
To start with, we have the following well known fact:
Proposition 1. The partial order (Str; hom) is a lattice in the following sense:
1. For every nite set of structures A, we can construct (in exponential time)
a structure N A, such that, N A hom A for every A 2 A, and such that
for every structure B, if B hom A for every A 2 A then B hom N A.
2. For every nite set of structures A, we can construct (in polynomial time) a
structure L A, such that A hom L A for every A 2 A, and such that, for
every structure B, if A hom B for every A 2 A then L A hom B.
      </p>
      <p>The \meet" operation N A, here is simply the direct product, and the \join"
operation L A, in the case without constant symbols, is simply the disjoint
union (the de nition of L A for structures with constant symbols is a little
? Copyright c 2020 for this paper by its authors. Use permitted under Creative
Commons License Attribution 4.0 International (CC BY 4.0).</p>
      <p>F1 . . .</p>
      <p>Fn
&gt;
A
?
more involved, we omit the details here, cf. [11]). We will refer to this lattice as
the Homomorphism Lattice.</p>
      <p>
        One computational problem in this context that will be relevant below is the
product homomorphism problem : given a nite set of structures A and a structure
B, the task is to decide whether N A hom B (or, equivalently, whether C hom
A for all A 2 A implies C hom B). Since the structure N A itself can be
constructed in singly exponential time, the product homomorphism problem
can be solved in NExpTime. A matching lower bound was established in [
        <xref ref-type="bibr" rid="ref10">14,
10</xref>
        ].
      </p>
      <p>
        Theorem 1 ([
        <xref ref-type="bibr" rid="ref10">14, 10</xref>
        ]). The product homomorphism problem is
NExpTimecomplete (provided that S contains a relation of arity at least 2).
      </p>
      <p>
        One interesting direction in the study of the homomorphism lattice pertains
to density. It is known that the homomorphism lattice is not a dense lattice.
That is, there exist structures B &lt;hom A for which there is no structure C with
B &lt;hom C &lt;hom A. Such pairs (B; A) are also known as gap pairs [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. On the
other hand, there also exist structures A such that for every B &lt;hom A, there is
structure C with B &lt;hom C &lt;hom A (an example of the latter kind, in the case
without constant symbols, and with a binary relation R, is the single-element
structure consisting of the fact R(a; a)). Intuitively, we can therefore say that
parts of the homomorphism lattice are locally dense, whereas other parts are
not. Closely related to this is the concept of a frontier.
      </p>
      <p>De nition 1. A frontier for a structure A is a nite collection of structures F
such that
1. F &lt;hom A for all F 2 F
2. For all structures C, if C &lt;hom A, then C
hom F for some F 2 F .</p>
      <p>In other words, a frontier for A is a nite set of structures that separates
A from those structures that are homomorphically strictly smaller than A, as
depicted in Figure 1.</p>
      <p>As it turns out, there is simple necessary and su cient condition for the
existence of a frontier. To de ne this condition, we must consider the incidence
graph of a structure A, by which we mean the bipartite multi-graph whose
vertices are the elements of the domain of A and the facts of A, and such that
an element and a fact are connected by an edge if the element occurs in the fact.
If an element occurs multiple times in the same fact, each occurrence generates
an edge (hence, this is a multi-graph).</p>
      <p>De nition 2. A structure is acyclic if the incidence graph is acyclic, and a
structure is c-acyclic if every cycle of the incidence graph passes through at least
one element that is named by a constant symbol.</p>
      <p>Note that if the schema S does not contain constant symbols, c-acyclicity is
the same as acyclicity.</p>
      <p>Theorem 2 ([11]). Every c-acyclic structure has a frontier. Moreover, given a
c-acyclic structure, a frontier can be constructed in polynomial time. Conversely,
if a structure A has a frontier, then A is homomorphically equivalent to a
cacyclic structure.</p>
      <p>It also follows from this result that we can test whether a given set of
structures is a frontier. In fact, this problem is NP-complete.</p>
      <p>Theorem 3. The following problem is NP-complete: given a structure A and a
nite set of structures F , is F a frontier for A?
Proof (sketch). For the upper bound, we use the fact that, if A is homorphically
equivalent to a c-acyclic structure A0, then such A0 exists as a substructure of A
(we omit the details, but this follows directly from the fact that c-acyclicity is
preserved under passage from a structure to its core). Therefore, the problem can
be solved in non-deterministic polynomial time as follows: rst we guess a
substructure A0 and we verify that A0 is c-acyclic and homomorphically equivalent to
A. Note that the existence of such A0 is a necessary precondition for B1; : : : ; Bn
to be a frontier of A. Next, we apply Theorem 2 to construct a frontier F 0 for A0
(and hence for A). Finally, we verify that each F 2 F homomorphically maps
to some F 0 2 F 0 and vice versa. It is not hard to see that this non-deterministic
algorithm has an accepting run if and only if F is a frontier for A.</p>
      <p>For the lower bound, we reduce from graph 3-colorability. Let A be the
structure, over a 3-element domain, that consists of the facts R(a; b) for all pairs
a; b with a 6= b. In addition, each of the three elements is named by a constant
symbol. Since A is c-acyclic, by Theorem 2, it has a frontier F . Now, given any
graph G (viewed as a relational structure with binary relation R and without
constant symbols), we have that G is 3-colorable if and only if F is a frontier
for the disjoint union of A with G. To see that this is the case, note that if G is
3-colorable, then the disjoint union of A with G is homomorphically equivalent
to A itself, whereas if G is not 3-colorable, then the disjoint union of A with G
is strictly greater than A in the homomorphism order.
tu</p>
      <p>Another, closely related topic in the study of the homomorphism lattice is
that of dualities. A pair of structures (A; B) are said to be a duality pair if
fC j A 6 hom Cg = fC j C hom Bg. Intuitively, this means that the entire
class of structures can be partitioned into two disjoint sets: those structures into
which A homomorphically maps, and those structures that homomorphically
map into B. More generally a pair of nite sets of structures (A; D) is said to
be a generalized homomorphism duality if fC j A 6 hom C for all A 2 Ag = fC j
C hom B for some B 2 Bg. A famous in nitary example of a homomorphism
duality is the following: a graph G is 2-colorable (equivalently, has a
homomorphism into the 2-element clique) if and only if G does not contain a cycle of
odd length (equivalently, does not not have a homomorphism from a structure
consisting of a cycle of odd length).</p>
      <p>
        As was shown in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], generalized homomorphism dualities and frontiers are
intimately related, and one can be constructed from the other. In particular, a
nite set of structures A is the left-hand side of a generalized homomorphism
duality if and only if (modulo homomorphic equivalence) A consists of c-acyclic
structures [
        <xref ref-type="bibr" rid="ref1 ref6">6, 1</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Example-Driven Query Discovery</title>
      <p>Suppose one wishes to construct a query Q on the basis of a set of data examples.
For the sake of concreteness, assume that the query Q we wish to construct is
a k-ary conjunctive query (k 0) over a schema S. For the purpose of our
complexity analysis, we will treat the schema and the arity as xed. Each given
data example will be a triple (I; a; s), where I is a database instance (over the
schema S), a is a k-tuple of values from the active domain of I, and s 2 f+; g
indicates whether the data example is a positive example or a negative example.
We say that a query Q ts such a data example (I; a; s) if a 2 Q(I) (for the case
where s = +), or a 62 Q(I) (for the case where s = ).</p>
      <p>One natural high-level approach for constructing Q might be as in the
following ow chart:</p>
      <p>Input data
examples E</p>
      <sec id="sec-2-1">
        <title>1. Find a query</title>
        <p>Q that ts E
(if it exists)
no</p>
        <p>Failure
(revisit input
examples)
yes
no</p>
      </sec>
      <sec id="sec-2-2">
        <title>3. Elicit more</title>
        <p>examples until
only one query Q
remains that ts
yes</p>
        <p>Output Q
Output Q</p>
        <p>
          Following this approach, three computational tasks naturally arise. The rst
task is, given an input set of data examples, to decide whether there exists a
tting query, and, if so, produce one. This has also been described a
reverseengineering problem [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]: from observed behavior of the query, we must
reconstruct a query with that behavior. It turns out that, in the case of conjunctive
queries, the existence of a query that ts a given set of data examples, is
computationally equivalent to the product homomorphism problem that we
encountered in the previous section. Indeed (skipping over some minor details related
to safety and active domain semantics), we can view a data example for a
kary query as a structure with k constant symbols, and we can identify a k-ary
conjunctive query itself also with a structure with k constant symbols. By the
Chandra-Merlin theorem [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], then, a query Q ts a positive (negative) example
E precisely if Q hom E (respectively, Q 6 hom E) where both are viewed as
structures.
        </p>
        <p>
          Now, let E be a set of data examples, and let Q be (the canonical query
of) the direct product of all positive examples in E. It is not hard to show
that if there exists any query that ts the data examples, then Q must t the
data examples. Moreover, it already follows from the construction that Q ts
all positive examples in E, and, in order for Q to t the negative examples, it
must be the case that there is no homomorphism from Q to any of the negative
data examples in E. This shows that the existence of a conjunctive query tting
a given set of data examples, reduces to (a conjunction of instances of) the
product homomorphism problem. It is not hard to establish a reduction in the
other direction as well. Moreover, in the case where a tting conjunctive query
exists, the conjunctive query Q constructed above is guaranteed to be a greatest
tting query for the examples, that is, Q0 hom Q holds for all conjunctive
queries Q0 that t the data examples in E. Therefore, in summary, we have:
Theorem 4 ([
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]). The following problem is CoNexpTime-complete: given a
nite set E of data examples, does there exist a conjunctive query that ts E.
Moreover, if a tting conjunctive query exists, then a greatest tting conjunctive
query can be constructed in exponential time (where the exponent corresponds to
the number of positive examples). 1
        </p>
        <p>At this point, assuming that a tting conjunctive query does indeed exists, we
have obtained a candidate query Q, which is in fact a greatest tting conjunctive
query. We then arrive at the next question, which is whether Q is the only query
(up to logical equivalence) that ts E. This second problem turns out, in our
speci c setting, to be NP-complete. Formally, we say that the data examples in
E uniquely characterize Q if Q ts E and, furthermore, every conjunctive query
that ts E is logically equivalent to Q.</p>
        <p>Theorem 5. The following problem is NP-complete: given a collection E of
positive and negative examples, and a greatest tting conjunctive query Q for E,
do the data examples in E uniquely characterize Q?
Proof (sketch). Theorem 5 is proved by showing that the problem is
computationally equivalent to the problem of testing whether a given set of structures is a
frontier. In one direction, we claim that the data examples in E uniquely
characterize Q if and only if the set F = f(N Q) j N is a negative example from Eg
is a frontier for Q. Note that, here, as before, we take the liberty to skip over
minor details by con ating conjunctive queries, data examples, and structures.</p>
        <p>First, suppose that Q is uniquely characterized by E. We must show that
F is a frontier for Q. Clearly, (N Q) hom Q. Furthermore, since Q ts the
negative example N , we have that Q 6 hom N and therefore Q 6 hom (N Q).
Finally, let B &lt;hom Q, and suppose for the sake of a contradiction that B does
not homomorphically map to any structure in F . It follows that B does not
map to any negative example N . Therefore, (the canonical query of) B ts all
examples in E and is not equivalent to Q, a contradiction. Next, suppose that
F is a frontier for Q. We must show that Q is uniquely characterized by E.
Suppose, for the sake of a contradiction, that Q0 ts all examples in E and is
not equivalent to Q. Since Q is a greatest tting query, it must be the case that
Q0 hom Q and Q 6 hom Q0. Therefore, Q hom (N Q) for some negative
example N , and hence Q hom N , a contradiction.</p>
        <p>To prove the NP lower bound, we provide an even simpler reduction in the
opposite direction. Let A be any structure and F a nite set of structures such
that each structure in F is homomorphically below A. Then F is a frontier for
A if and only if A is uniquely characterized by the set E that consists of A itself
as a positive example, and the structures in F as negative examples. tu</p>
        <p>
          At this point, we know whether the examples in E uniquely characterize Q.
If the answer is Yes, then we can safely conclude that Q is the query we were
after. Otherwise, we arrive at the last of our three problems, namely, eliciting
further examples with the aim of identifying our target query with certainty.
1 The result as stated in [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] is for LAV schema mappings. However, the tting problem
for LAV schema mappings is easily seen to be equivalent to the tting problem for
conjunctive queries.
        </p>
        <p>
          Here, we enter into the territory of computational learning theory. Without
going into details, the rst question that arises is whether, by eliciting further
examples, we can even hope to arrive at a situation in which we can identify our
target conjunctive query with certainty. This question is, of course, equivalent
to the question whether the target conjunctive query is uniquely characterizable
by nitely many examples. It turns out that the answer is Yes precisely if the
target query has a nite frontier [11]. By Theorem 2, this holds precisely if the
target query is (homomorphically equivalent to) a c-acyclic conjunctive query. If
the target query is not homomorphically equivalent to a c-acyclic query, then,
no matter how many additional data examples we elicit, we will never arrive at
a situation in which our set of data examples uniquely characterizes the target
query. Remarkably, it turns out that if the target query is c-acyclic, then there
exists an e cient exact learning algorithm (in the formal sense of Angluin's
model of interactive exact learnability [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]), that will identify the target query
after asking polynomially many questions, where each question asks whether
a given data example is positive or negative for the target query. Following
standard terminology from computational learning theory, such questions are
called \membership queries", and the formal statement of the result is as follows:
Theorem 6 ([11]). The class of c-acyclic conjunctive queries is e ciently
exactly learnable with membership queries.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Concluding Remarks</title>
      <p>
        This short paper was written with the aim of highlighting some interesting topics
and their connections to the structure of the homomorphism lattice. It is by no
means a comprehensive survey of work that has been done in this area. In fact,
there is considerable literature on example-driven discovery of database queries,
description logic ontologies, and schema mappings, as discussed in the related
work sections of the papers cited here. See also [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] for a recent survey of di erent
approaches towards learning description logic ontologies.
      </p>
      <p>
        Since we focused on the case of conjunctive queries in this exposition, one
might ask what changes when considering unions of conjunctive queries. As it
turns out, in this context there is a close correspondence between unions of
conjunctive queries and GAV schema mappings. Without going into details, this
is because a GAV schema mapping can be equivalently viewed as a mapping that
assigns to each target relation a union of conjunctive queries over the source
schema. Unique characterizations for GAV schema mappings were extensively
studied in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], and some of the results in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] can be rephrased in terms of unions of
conjunctive queries. In particular, in the same way that unique characterizations
for conjunctive queries correspond to frontiers in the homomorphism lattice, it
follows from results in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] that unique characterizations for unions of conjunctive
queries correspond to generalized homomorphism dualities. Exact learnability
(as well as PAC learnability) for GAV schema mappings was studied in [12, 13],
and again, the results can be rephrased in terms of unions of conjunctive queries.
      </p>
      <p>
        We close by brie y mentioning two other interesting problems with close
connections with the structure of the homomorphism lattice. The rst is
instancelevel query de nability, which refers to de nability of relations inside a given
database instance. More speci cally, the CQ-de nability problem, consists in
deciding, given a database instance I and a relation S over the active domain of
I, whether there is a conjunctive query Q such that Q(I) = S. It turns out that
this problem is again computationally equivalent to the product homomorphism
problem (cf. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]). Finally, let us mention one more de nability problem of sorts,
that arises in the context of ontology-based data access. This is the problem
where we are given a ontology-based query (speci ed with the help of an
ontology, and using certain-answer semantics), and we wish to decide whether it
is equivalent to an ordinary rst-order query (without reference to the
ontology). As it turns out, for common ontology languages such as ALC, this decision
problem reduces to the question whether a given nite set of structures has a
generalized homomorphism duality. See [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] for more details.
11. Balder ten Cate and Victor Dalmau. Conjunctive queries: Unique characterizations
and exact learnability, 2020.
12. Balder ten Cate, V ctor Dalmau, and Phokion G. Kolaitis. Learning schema
mappings. ACM Trans. Database Syst., 38(4):28:1{28:31, 2013.
13. Balder ten Cate, Phokion G. Kolaitis, Kun Qian, and Wang-Chiew Tan. Active
learning of GAV schema mappings. In Jan Van den Bussche and Marcelo Arenas,
editors, Proceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on
Principles of Database Systems, Houston, TX, USA, June 10-15, 2018, pages 355{
368. ACM, 2018.
14. Ross Willard. Testing expressibility is hard. In David Cohen, editor, Principles and
Practice of Constraint Programming - CP 2010 - 16th International Conference,
CP 2010, St. Andrews, Scotland, UK, September 6-10, 2010. Proceedings, volume
6308 of Lecture Notes in Computer Science, pages 9{23. Springer, 2010.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Bogdan</given-names>
            <surname>Alexe</surname>
          </string-name>
          , Balder ten Cate, Phokion G. Kolaitis, and
          <string-name>
            <surname>Wang-Chiew Tan</surname>
          </string-name>
          .
          <article-title>Characterizing schema mappings via data examples</article-title>
          .
          <source>ACM Trans. Database Syst</source>
          .,
          <volume>36</volume>
          (
          <issue>4</issue>
          ):
          <volume>23</volume>
          :1{
          <fpage>23</fpage>
          :
          <fpage>48</fpage>
          ,
          <year>December 2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Dana</given-names>
            <surname>Angluin</surname>
          </string-name>
          .
          <article-title>Queries and concept learning</article-title>
          .
          <source>Mach. Learn.</source>
          ,
          <volume>2</volume>
          (
          <issue>4</issue>
          ):
          <volume>319</volume>
          {
          <fpage>342</fpage>
          ,
          <string-name>
            <surname>April</surname>
          </string-name>
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Pablo</given-names>
            <surname>Barcelo</surname>
          </string-name>
          .
          <article-title>A theoretical view on reverse engineering problems for database query languages</article-title>
          . In Mantas Simkus and Grant E. Weddell, editors,
          <source>Proceedings of the 32nd International Workshop on Description Logics</source>
          , Oslo, Norway, June 18-21,
          <year>2019</year>
          , volume
          <volume>2373</volume>
          <source>of CEUR Workshop Proceedings. CEUR-WS.org</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Meghyn</given-names>
            <surname>Bienvenu</surname>
          </string-name>
          , Balder Ten Cate, Carsten Lutz, and
          <string-name>
            <given-names>Frank</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>Ontologybased data access: A study through disjunctive datalog, csp, and mmsnp</article-title>
          .
          <source>ACM Trans. Database Syst</source>
          .,
          <volume>39</volume>
          (
          <issue>4</issue>
          ),
          <year>December 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Ashok</surname>
            <given-names>K. Chandra</given-names>
          </string-name>
          <string-name>
            <surname>Chandra and Philip M. Merlin</surname>
          </string-name>
          .
          <article-title>Optimal Implementation of Conjunctive Queries in Relational Data Bases</article-title>
          .
          <source>In ACM Symposium on Theory of Computing (STOC)</source>
          , pages
          <fpage>77</fpage>
          {
          <fpage>90</fpage>
          ,
          <year>1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Jan</given-names>
            <surname>Foniok</surname>
          </string-name>
          , Jaroslav Nesetril, and
          <string-name>
            <given-names>Claude</given-names>
            <surname>Tardif</surname>
          </string-name>
          .
          <article-title>Generalised dualities and maximal nite antichains in the homomorphism order of relational structures</article-title>
          .
          <source>Eur. J. Comb.</source>
          ,
          <volume>29</volume>
          (
          <issue>4</issue>
          ):
          <volume>881</volume>
          {
          <fpage>899</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Pavol</given-names>
            <surname>Hell</surname>
          </string-name>
          and
          <string-name>
            <given-names>Jaroslav</given-names>
            <surname>Nesetril</surname>
          </string-name>
          .
          <article-title>Graphs and homomorphisms</article-title>
          , volume
          <volume>28</volume>
          <source>of Oxford lecture series in mathematics and its applications</source>
          . Oxford University Press,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Jaroslav</given-names>
            <surname>Nesetril</surname>
          </string-name>
          and
          <string-name>
            <given-names>Claude</given-names>
            <surname>Tardif</surname>
          </string-name>
          .
          <article-title>Duality theorems for nite structures (characterising gaps and good characterisations)</article-title>
          .
          <source>Journal of Combinatorial Theory</source>
          ,
          <string-name>
            <surname>Series</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <volume>80</volume>
          (
          <issue>1</issue>
          ):
          <volume>80</volume>
          {
          <fpage>97</fpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Ana</given-names>
            <surname>Ozaki</surname>
          </string-name>
          .
          <article-title>Learning description logic ontologies: Five approaches</article-title>
          .
          <source>where do they stand? KI - Kunstliche Intelligenz</source>
          ,
          <volume>04</volume>
          <fpage>2020</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <article-title>Balder ten Cate and V ctor Dalmau</article-title>
          .
          <article-title>The product homomorphism problem and applications</article-title>
          .
          <source>In Marcelo Arenas and Mart</source>
          n Ugarte, editors,
          <source>18th International Conference on Database Theory, ICDT 2015, March 23-27</source>
          ,
          <year>2015</year>
          , Brussels, Belgium, volume
          <volume>31</volume>
          <source>of LIPIcs</source>
          , pages
          <volume>161</volume>
          {
          <fpage>176</fpage>
          .
          <string-name>
            <surname>Schloss</surname>
          </string-name>
          Dagstuhl - Leibniz-Zentrum fur Informatik,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>