<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>First Order Rewritability for Ontology Mediated Querying in Horn-DLF D</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>David Toman</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Grant Weddell</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cheriton School of CS, University of Waterloo</institution>
          ,
          <country country="CA">Canada</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We study rst order (FO) rewritability for query answering in the setting of ontology mediated queries (OMQ) in which ontologies are formulated in the Horn fragments of the feature description logic DLF D. In general, OMQ approaches for logics such as DLF D rely on non-FO completion of the data (ABoxes) that can commonly be expressed as Datalog programs. In this paper, we study the problem of the existence of FO rewritings for a given Horn-DLF D theory (TBox) in terms of Beth de nability, and show how Craig interpolation can then be used to e ectively construct the rewritings (when they exist) from the Clark's completion of Datalog programs for computing ABox completions. In addition, since data that populates OMQ is commonly residing in relational database systems, we show how constraints enforced by such systems can be used to expand the scope of rewritable queries.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        In earlier work [
        <xref ref-type="bibr" rid="ref25 ref27">25,27</xref>
        ], we presented a combined-combined approach to ontology
mediated querying (OMQ) of backend relational data sources when ontologies
are formulated as TBoxes in the Horn fragments of the description logic (DL)
DLF D and where ABoxes are induced by data residing in the data sources. The
logic DLF D is the most expressive member of the FunDL family of feature-based
DLs [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], which are particularly well suited for capturing relational schemata by
virtue of being feature-based and also by virtue of including the path functional
dependency (PFD) concept constructor. PFDs makes it possible to capture a
variety of equality generating dependencies commonly occurring in relational
schemata, such as primary keys, uniqueness constraints and functional
dependencies. To illustrate, we show in the next section how the relational schema in
Figure 1 can be captured as a Horn-DLF D TBox, the FunDL dialect that will
be the focus of the remainder of this paper. This example also serves to illustrate
how the parts of a TBox that re ect a relational schema could in principle be
automatically generated, and thereby make it unnecessary to author so-called
mapping rules in ontology based data access (OBDA) (again see [
        <xref ref-type="bibr" rid="ref25 ref27">25,27</xref>
        ]).
      </p>
      <p>
        The combined-combined approach is so named because any of the Horn
fragments of DLF D in the FunDL family will require using ontological knowledge,
a Horn-DLF D TBox in our case, for two steps in OMQ. The rst step, as with
the combined approach to OMQ [
        <xref ref-type="bibr" rid="ref19 ref20 ref22 ref23">19,20,22,23</xref>
        ], is to complete the ABox via a
Datalog program that adds tuples to tables in the backend relational database.
Note that this rst step depends only on the TBox. The second step, as with
the perfect rewriting approach to OMQ and OBDA [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], is to rewrite a query to
account for such artifacts as inheritance and attribute typing in the TBox.
      </p>
      <p>In this paper, we show how Beth de nability can be used to resolve the
problem of recognizing when a rst order (FO) rewriting of the Datalog program
needed in the rst step exists, and then how Craig interpolation can be used to
e ectively construct such a rewriting. A key insight is to employ the Clark's
completion of the Datalog program in both the diagnosis and synthesis of FO
expressibility of ABox completion.</p>
      <p>The existence of such a rewriting enables an OMQ frontend to a relational
data source to operate entirely by a more re ned query reformulation that, for
a given user query, ultimately yields an SQL query over the data source, that
is, with no requirement to update tables in the data source beforehand. An
additional advantage of our approach is that it also becomes straightforward to
incorporate the bene ts of integrity constraints such as foreign key constraints
that are enforced by a relational database management system to simplify query
reformulation. Indeed, such integrity constraints can enable FO rewriting of data
completion that would otherwise not be possible.</p>
      <p>In summary, our contributions are as follows.
1. We show how to decide FO rewritability of OMQ in Horn-DLF D via Clark's
completion of Datalog programs and Beth de nability;
2. We show how an equivalent non-recursive Datalog program can be derived
via Craig's theorem and interpolation in cases where ABox completion for a
given TBox is indeed FO expressible;
3. We illustrate how integrity constraints in backend relational schema can
enable FO rewritability of OMQ that would otherwise not be possible; and
4. We show how our framework extends to query speci c OMQ in a
straightforward manner.</p>
      <p>The remainder of the paper is organized as follows. Section 2 immediately
following provides the necessary background and de nitions. Here, we review
HornDLF D and the combined combined approach to OMQ. Our main results follow
in Section 3 in which we show how the above-mentioned artifacts, Clark's
completion of Datalog programs for example, can be employed to both decide FO
rewritability and to synthesize FO rewritings of ABox completion in the
combined combined approach to OMQ. In Section 4 shows how a Datalog program
computing an ABox completion can usefully incorporate database constraints
enforced by backend relational database systems. Section 5 then considers query
speci c OMQ, that is, when the combination of a Datalog ABox completion
procedure and a speci c query are FO expressible. Summary comments and our
conclusions are in Section 6.</p>
      <p>
        create table EMP ( name STRING not null,
dept STRING, man STRING,
primary key ( name ),
constraint deptRef foreign key ( dept ) references DEPT,
constraint manRef foreign key( man ) references EMP );
create table DEPT ( name STRING not null,
head STRING,
primary key ( name ),
candidate key ( head ),
constraint headRef foreign key( head ) references EMP );
All member dialects of the FunDL family of DLs [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] are fragments of FOL
with underlying signatures based on disjoint sets of unary predicate symbols
PC, called primitive concepts, constant symbols IN, called individuals, and unary
function symbols F, called features. The latter replace roles in other DLs and
are interpreted as either total functions or partial functions, depending on the
particular FunDL dialect.
      </p>
      <p>The most expressive member of the FunDL family is the dialect DLF D.
In this paper, we consider Horn-DLF D, the most expressive Horn fragment
of DLF D, assuming in particular that an ontology is given as a Horn-DLF D
TBox.1 To simplify our presentation, we also assume features are interpreted as
total functions.</p>
      <sec id="sec-1-1">
        <title>De nition 1 (Horn-DLF D) A path function Pf is a word in F , with the</title>
        <p>empty word denoted by id , and concatenation by \:". Concept descriptions of
two kinds, C and D, are de ned by the grammar rules on the left-hand-side
of Figure 2, where A 2 PC, f 2 F and Pf (possibly subscripted) refers to a
path function. An instance of the nal production is called a path functional
dependency (PFD).</p>
        <sec id="sec-1-1-1">
          <title>Semantics is de ned in the standard way with respect to an interpretation</title>
          <p>I = (4; ( )I ) that xes the meaning of symbols in PC, IN and F. Here, features
are interpreted as total functions. We also assume the unique name assumption
(UNA) whereby, for any distinct individuals a and b, aI 6= bI .</p>
        </sec>
      </sec>
      <sec id="sec-1-2">
        <title>The interpretation function I is extended to path expressions by interpreting</title>
        <p>id (the empty word) as the identity function x:x, concatenation as function
composition, and to complex concept descriptions C or D as given on the
righthand-side of Figure 2. An interpretation I satis es a subsumption C v D if
1 Here, we do not consider the problem of recognizing when TBoxes in very expressive
DLs have unique minimal models.
C ::= A
D ::= C
j 8 Pf :C
j C1 u C2</p>
        <p>CI DI , a concept assertion A(a) if aI 2 AI , and a feature assertion f (a) = b
if f I (aI ) = bI , where a; b 2 IN.</p>
        <p>A knowledge base (KB) K = (T ; A) consists of a TBox T of subsumptions,
and an ABox A of assertions. I satis es K if it satis es each subsumption and
assertion in K.</p>
        <p>Although incorporating features deviates from the normal practice of using
binary predicate symbols called roles, features make it easier to incorporate
concept constructors suited to the capture of relational data sources that include
various dependencies by a straightforward rei cation of n-ary predicates. Thus,
e.g., a role R can be rei ed as a primitive concept RC and two features domR
and ranR in Horn-DLF D, and a subsumption A v 8R:B can then be captured
as a subsumption 8domR:A v 8ranR:B.</p>
        <p>
          As usual, to ensure decidability in the presence of ABoxes [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] and reasonable
computational properties of the logic, one looks for additional restrictions on the
PFD concept constructors. One restriction, which has been investigated (e.g.,
[
          <xref ref-type="bibr" rid="ref17 ref27">17,27</xref>
          ]), is to limit the PFD constructor to one of the following two forms:
1: C : Pf1; : : : ; Pf : Pfi; : : : ; Pfk ! Pf or
2: C : f1; : : : ; fk ! g
We can allow a more complex variant of (2) if the ABox completion
admits/requires creating additional constant symbols; for details|beyond the scope of this
paper|see [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]. Also, in this paper we will not explore the parameter tractable
fragments of Horn-DLF D nor the issues connected with interpreting features
as partial functions. Both these issues were studied in [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] which shows, among
other things, how partiality can be easily simulated in Horn-DLF D.
Example 2 Figure 3 lists the subsumptions for a Horn-DLF D TBox that
provides an ontological view of the relational schema illustrated in Figure 1. Part (a)
are subsumptions that capture column de nitions and data dependencies
manifest in the schema itself. This part of an ontology can be automatically generated
(disjoint classes) EMP u DEPT v ?
        </p>
        <p>EMP u STRING v ?</p>
        <p>DEPT u STRING v ?
(attribute typing) EMP v 8name:STRING</p>
        <p>EMP v 8deptRef:DEPT
EMP v 8manRef:EMP
DEPT v 8headRef:MAN
DEPT v 8name:STRING</p>
        <p>DEPT v DEPT : name ! id
(primary keys) EMP v EMP : name ! id
(candidate keys) DEPT v DEPT : head ! name
(a) derived from the relational schema
(disjoint columns) EMP v DEPT : name ! id
(b) additional data dependencies
(inheritance) MAN v EMP
(local typing) EMP v 8manRef:MAN</p>
        <p>
          DEPT v 8headRef:EMP
(inverses) MAN v 9headRef 1
(c) ontology enhancement
(for an outline of a procedure to do this, see [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]). Observe in particular how
the name attached to a foreign key constraint, such as headRef, is mapped to
a feature with the same name. Part (b) illustrates how additional data
dependencies not expressible without appeal to general assertions in SQL can also be
captured in Horn-DLF D. Here, the (presumed) fact that name values of
employees are disjoint from name values of departments is captured by appeal to
an asymmetric use of PFDs. Finally, Part (c) illustrates how an ontology can
be enhanced by adding further subsumptions, in this case relating to the virtual
concept of a manager.
        </p>
        <p>Conjunctive queries are, as usual, formed from atomic queries (or atoms) of
the form \A(x)" and \x:f = y", where x and y are variables, using
conjunction and existential quanti cation. To simplify notation, we con ate conjunctive
queries with the set of its constituent atoms and a set of answer variables:
De nition 3 (Conjunctive Queries and Certain Answers) Let A(xi) and
xi1 :fi = xi2 be ( rst-order) atoms, where A is a primitive concept , fi is a feature,
and x and y tuples of variables. A conjunctive query (CQ) ' is an expression of
the form 9y: V with free variables x, that is constructed from the above atoms
using conjunctions and existential quanti cation.</p>
      </sec>
      <sec id="sec-1-3">
        <title>Let K be a Horn-DLF D knowledge base and ' a CQ. A certain answer to ' over K is a substitution of constant symbols a, [x 7! a], such that K j= '[x 7! a].</title>
        <p>As usual, UCQ stands for a union of CQs. To study the rst-order rewritability
of conjunctive queries over Horn-DLF D TBoxes, we use the following version of
the combined combined approach to OMQ in our setting.</p>
        <p>
          Proposition 4 (Combined Combined Approach to OMQ [
          <xref ref-type="bibr" rid="ref25 ref27 ref30">25,27,30</xref>
          ])
Let K = (T ; A) be a Horn-DLF D knowledge base and ' a conjunctive query.
        </p>
      </sec>
      <sec id="sec-1-4">
        <title>Then there is a UCQ query 'T and a Datalog program</title>
        <p>be e ectively constructed from T , such that</p>
      </sec>
      <sec id="sec-1-5">
        <title>T , both of which can</title>
        <p>K j= '[x 7! a] ()
T (A) j= 'T [x 7! a]
for a tuple of constant symbols a and where
when evaluated over A.</p>
      </sec>
      <sec id="sec-1-6">
        <title>T (A) is the minimal model of</title>
        <p>T
The proposition uses a Datalog program T to de ne an ABox completion over
which the query 'T , the rewriting of the original user query, is evaluated to
compute the certain answers. The Proposition also shows that the data complexity
of OMQ in Horn-DLF D is complete for PTIME.
3</p>
        <p>Classi cation of Horn-DLF D TBoxes
To simplify the presentation, we assume that Horn-DLF D TBoxes are in a
normal form given as follows:
De nition 5 (Normal Form of Horn-DLF D TBoxes)
Let T be a Horn-DLF D TBox. We say that T is in normal form if all
subsumptions adhere to one of the following six forms:
1. A v ?,
2. A1 u A2 v B,
3. A v 8f:B,
4. 8f:A v B,
5. A v 9f 1, and
6. A v B : Pf1; : : : ; Pfk ! Pf.</p>
        <p>It is an easy exercise to convert an arbitrary Horn-DLF D TBox to its
conservative extension in this normal form by introducing additional primitive concepts.</p>
      </sec>
      <sec id="sec-1-7">
        <title>De nition 6 (Datalog Program T ) The Datalog program T used in Pro</title>
        <p>position 4 consists of completion rules obtained by translating subsumptions that
are logical consequences of T . The form of these subsumptions and their
translation are given as follows:
(consequences of T )
(completion rule in</p>
        <p>T )
A v ?
A1 u A2 v B
A v 8f:B
8f:A v B</p>
        <p>C?(x)
CB(x)
CB(x)
CB(x)</p>
        <p>CA(x)
CA1 (x); CA2 (x)
CA(y); Rf (y; x)
CA(y); Rf (x; y)</p>
        <sec id="sec-1-7-1">
          <title>For every primitive concept B, we introduce an unary EDB predicate PB(x)</title>
          <p>
            together with an additional clause CB(x) PB(x) that captures explicit data
in an ABox of the form A(a), and an IDB predicate CB(x) corresponding to the
completion of the ABox w.r.t. T . For features, we use Rf (x; y) as a synonym
for ABox assertion f (x) = y to conform with standard Datalog syntax. We also
de ne an auxiliary symbol C?(x) that will be used to test for ABox consistency.
Note that the subsumptions for unquali ed inverse features (5) and PFDs (6) do
not contribute to the de nition of an ABox completion since they do not generate
additional ABox assertions for primitive concepts. Also note that, unlike in the
classical combined approach [
            <xref ref-type="bibr" rid="ref19 ref23">19,23</xref>
            ], our combined combined approach does not
introduce any new constants in the ABox [
            <xref ref-type="bibr" rid="ref27">27</xref>
            ].
          </p>
          <p>To test for rst-order de nability of the completion (i.e., all predicates that
stand for the completed ABox instance), we use the following construction:
De nition 7 (Clark's Completion</p>
        </sec>
      </sec>
      <sec id="sec-1-8">
        <title>T is given by a set of formulas</title>
        <p>CB(x) $ PB(x) _ (9y: 1) _ : : : _ (9y: n)
corresponding to all clauses CB(x)</p>
        <p>Note that Clark's result works in the much more general setting of logic
programs with function symbols and possibly in nite resolution proofs and under
the Negation As Failure semantics. Since Clark's completion makes all IDB
predicates closed, we can now use standard tools for testing for explicit de nability.
Note that had we used T instead, none of the de nability results could possibly
hold. Note that in absence of role/feature subsumptions (such as role hierarchies)
we do not need to apply the completion to the Rf atoms.</p>
        <p>
          Proposition 9 (Projective Beth De nability [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]) Let be an FO theory
over symbols in L and L0 L. Then the following are equivalent:
1. For M1 and M2 models of such that M1jL0 = M2jL0 , it holds that M1 j=
'[a] i M2 j= '[a] for all M1, M2, and a tuples of constants, and
        </p>
        <sec id="sec-1-8-1">
          <title>2. ' is equivalent under to a formula in L0.</title>
          <p>This gives us a complete characterization of rst-order rewritability of the ABox
closure of individual primitive concepts with respect to Horn-DLF D TBoxes as
follows:
fPA1 ; : : : ; PAk ; Rf1 ; : : : ; Rfn g.</p>
        </sec>
      </sec>
      <sec id="sec-1-9">
        <title>Theorem 10 Let T be a Horn-DLF D TBox over the primitive concepts and</title>
        <p>features fA1; : : : ; Ak; f1; : : : ; fng, and let T 0 be a conservative extension of T
in normal form. Then the completion of the primitive concept A w.r.t. T is
rst-order de nable if and only if CAi (x) is Beth de nable over T 0 and L0 =
Proof. Follows immediately from the properties of Beth de nability
(Proposition 9) and the de nition and properties of the Clark's completion
(Proposition 8).</p>
        <p>Observe that one can restrict the alphabet of the ABox (L0) to target only
ABoxes over restricted signature(s).</p>
        <p>Given T , one can now reformulate (1) in Proposition 9 as a logical
implication problem by making a copy of all formulas of T in which all non-logical
symbols not in fPA1 ; : : : ; PAk ; Rf1 ; : : : ; Rfn g are starred. Hence, the de nability
question for CA(x) can be expressed as a logical implication question of the form:
T [</p>
        <p>T j= 8x:CA(x) ! CA(x)
(1)
Note that, on closer inspection, all formulas in
subsumptions.2 Hence:
T can be written as ALCI</p>
      </sec>
      <sec id="sec-1-10">
        <title>Theorem 11 Let T be a Horn-DLF D TBox. Then the existence of</title>
      </sec>
      <sec id="sec-1-11">
        <title>1. the rst order rewritability of the A completion with respect to T ,</title>
      </sec>
      <sec id="sec-1-12">
        <title>2. the consistency of T , and</title>
      </sec>
      <sec id="sec-1-13">
        <title>3. the uniform query rewritability over T</title>
        <p>are all decidable and in EXPTIME.</p>
        <p>
          Proof. The rst claims follow immediately from Theorem 10 applied to all atoms
of the form CB and the decidability and complexity of reasoning in ALCI. The
second claim relies on de nability of C?(x) and, in the presence of key PFDs of
the form A v B : Pf1; : : : ; Pfk ! Pf, on the de nability of CA(x) and CB(x)
since the remaining consistency check for PFD satisfaction can then be expressed
as a rst-order query with respect to these explicit de nitions. The last claim
follows by observing that (i) de nability of atomic queries implies de nability
of arbitrary (U)CQs using the combined-combined approach [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ], and that (ii)
non-de nability of a single atomic query exhibits the need for a non rst-order
ABox completion for queries containing/consisting of this atom.
Note that in the third case one can restrict the de nability conditions to atoms
that can appear in the query 'T . A matching lower bound can be obtained
for expressive fragments of Horn-DLF D (for which the reasoning complexity is
EXPTIME-complete). However, the exact complexity is open for PTIME
fragments, such as CF Dnc and CF DI8kc . Note, however, that since the size (and the
construction) of rewritings will dominate this cost (even for the simplest ontology
languages [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]), exact complexity bounds are mostly of academic interest.
Example 12 Returning to our introductory example, we nd out that neither
CEMP(x) nor CDEPT(x) nor the TBox-derived CMAN(x) atom are rst-order de nable.
We con rmed this using a tableau-based depth-limited interpolant generator
[
          <xref ref-type="bibr" rid="ref16 ref31">16,31</xref>
          ]. One of the reasons is that an ABox can contain a chain of alternating
deptRef/empRef features without having the objects along this chain alternately
belonging to the EMP and DEPT concepts, save the individual at the beginning of
this chain. The Datalog completion rules are needed to propagate these concept
assertions along such a chain.
2 Disregarding functionality of the original features does not matter at this juncture.
To obtain an algorithm that constructs rewritings from our characterization of
FO rewritability, we utilize Craig Interpolation:
Proposition 13 (Craig Interpolation [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]) Let ' and be rst order
formulas such that j= ' ! . Then there is a rst order formula , called Craig
interpolant, containing only symbols common to ' and such that j= ' !
and j= ! .
        </p>
        <p>Moreover, the interpolant can be extracted, typically in linear time, from a proof
of j= ' ! , as long as a reasonably structural proof system, such as resolution,
(cut-free) sequent calculus, and/or analytic tableau is used.</p>
        <p>
          The formulation (1), after a minor manipulation of the formulas, can thus
be used to construct a Craig interpolant for CA(x) from a (analytic) tableau
proof of the above logical implication statement (if one exists): one can
construct, with the help of blocking [
          <xref ref-type="bibr" rid="ref1 ref13">1,13</xref>
          ], a nite analytic tableau for (1). The
size of the rewriting, however, will depend crucially on the proof system used
and on the presentation of the rewriting. However, by using an optimal tableau
for ALC [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] (modi ed for ALCI), one can construct an exponential
representation of the rewriting by sharing common subexpressions in the same way the
tableau algorithm caches already unsatis able sets. However, plain rst-order
representation of the formula will su er from additional exponential blowup, as
one would expect.
        </p>
        <p>
          Combining the above construction with the already existing rewriting 'T
from [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] we get:
Theorem 14 Let K = (T ; A) be a Horn-DLF D knowledge base. Then the data
complexity of conjunctive query answering is in AC0 whenever the A completion
with respect to T is rst-order de nable with respect to T .
        </p>
        <p>Proof. Let A(x) be a rst order de nition of CA w.r.t. T . Then K j= '(a) i
A j= 'T [ A[y=x]=A(y) j A 2 PC](a). The claim follows since 'T [ A[y=x]=A(y) j
A 2 PC] is a rst order formula, in particular a UCQ in the case of Horn-DLF D.
4</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Integration of Database Constraints</title>
      <p>For ABoxes constructed from relational instances (see the discussion in our
Introduction and Background Sections), relational systems commonly enforce
integrity constraints such as primary and foreign keys. The e ect of these database
constraints is that parts of the corresponding ABox are not only consistent with
such constraints but are a model. This observation is in particular helpful in
the case of foreign keys since they stipulate that parts of the ABox completion
are no longer necessary: for a foreign key to hold in an instance of a relational
database, either its target exists in the appropriate table or the source is NULL,
which can then be interpreted as value unknown and is taken care of by query
rewriting 'T .</p>
      <p>De nition 15 (Adding Foreign Keys) Let A v B and A v 8f:B be
subsumptions corresponding to foreign keys that capture ISA and attribute
typing, respectively. For each such constraint, add PB(x) CA(x) and PB(x)</p>
      <sec id="sec-2-1">
        <title>CA(y); Rf (x; y), respectively, to A.</title>
        <p>This de nition allows us to sidestep parts of the ABox completion that are
mandated by the database constraints and thus already exist in the original
instance of the ABox. As a consequence, we have the following extension of
Theorem 14:
Theorem 16 Let K = (T ; A) be a Horn-DLF D knowledge base. Then the data
complexity of conjunctive query answering is in AC0 whenever the A completion
with respect to T is rst-order de nable with respect to the theory T [ A.
Example 17 Continuing with our example, adding the constraints
PEMP(x)
PEMP(x)
PDEPT(x)</p>
        <p>CEMP(y); RmanRef(x; y)
CDEPT(y); RdeptRef(x; y)</p>
        <p>
          CEMP(y); RheadRef(x; y)
to A, both CEMP(x) and CDEPT(x) become de nable with the expected
interpolants CEMP(x) and CDEPT(x) found by the above-mentioned interpolant
generator [
          <xref ref-type="bibr" rid="ref16 ref31">16,31</xref>
          ]. Moreover, CMAN(x) also becomes de nable by 9y:PEMP(x)^RmanRef(y; x)
(again, using the interpolant found by the interpolant generator).
5
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Query-speci c Rewritability</title>
      <p>Our approach also provides decidability for the non-uniform (query-speci c)
problems:</p>
      <sec id="sec-3-1">
        <title>Theorem 18 Let T be a Horn-DLF D TBox and ' a (U)QC. Then the follow</title>
        <p>ing are equivalent:
1. T [ T j= 8x:'T ! 'T (x), and</p>
      </sec>
      <sec id="sec-3-2">
        <title>2. ' is rst-order rewritable with respect to T .</title>
        <p>
          The exact complexity again depends on the complexity of (1) above. In the
general case, an EXPTIME bound follows from [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], but again, a more re ned
analysis is in order for fragments of Horn-DLF D.
6
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Summary and Conclusions</title>
      <p>
        We have shown how the combined combined approach to OMQ can be used
to determine when query answering mediated by a Horn-DLF D TBox can be
reduced to a rst order query over a plain ABox (or, in turn, over the underlying
data source), and when a non- rst order (Datalog-based) completion of the data
is needed. Interestingly enough, and unlike other approaches that aim on
determining rst-order rewritability, our approach links the problem to well studied
issues of explicit de nability [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], interpolation [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], and to Clark's completion of
logic programs [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In addition, our approach naturally and seamlessly
incorporates database constraints that hold in the data source to improve our chances
of nding a rst order rewriting.
      </p>
      <p>
        Further extensions of this work along the following lines is needed:
{ Performing a ne-grained analysis of computational complexity for tractable
members of Horn-DLF D, such as CF Dnc. (We conjecture that the
rewritability problem will remain intractable.)
{ Determining if a dichotomy holds, in particular, if non-rewritability implies
NL hardness of OMQ in data complexity. (We conjecture that this is the
case since blocked branches of a tableau proof signal non-rewritability and
can be used to simulate, e.g., s-t connectivity similarly to the approach in
[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].)
{ Extensions to situations in which ABox closure requires a nite number
of additional auxiliary constants. (The approach itself can immediately use
Skolem functions to deal with such constants while retaining completeness.
However, decidability and complexity issues stemming from the use of Skolem
functions remain to be determined.)
{ Extensions to DLs outside of the FunDL family, such as the various members
of the E L family and to more expressive logics such as Horn-SHIQ.
{ And integration with an interpolation-based relational query optimizer [
        <xref ref-type="bibr" rid="ref16 ref31">16,31</xref>
        ]
via depth-limited tableau construction, which, for a su ciently large depth,
leads to completeness as in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        An additional issue arises from the assumption of UNA. Indeed, this assumption
is implicit in [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], where explicit equality among constant symbols is simply not
considered, and also in most of the other approaches to OMQ via query rewriting,
including the original approach introduced in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In the case of Horn-DLF D,
UNA is needed explicitly to accommodate keys and PFDs. We conjecture that
some form of UNA is necessary, but whether restricted variants could su ce is
unknown.
6.1
      </p>
      <p>
        Related Work
First order rewritability for Horn logics in the ALC=SHIQ family has been
studied by others, e.g., see [
        <xref ref-type="bibr" rid="ref4 ref6">4,6</xref>
        ]. This earlier work has also developed algorithms
for generating such rewritings e ciently for logics in the E L family [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Our
approach seems to provide an alternative path to detecting rewritability and to
generating rewritings. A feature of our approach is its link to interpolation-based
query optimization [
        <xref ref-type="bibr" rid="ref16 ref29">16,29</xref>
        ]. The link to query optimization reveals that minimal
sized rewritings are often not optimal for query execution. However, establishing
limits on the size of rewriting [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] does provide a guide to what rewritings are
reasonable to consider during query optimization.
      </p>
      <p>
        The use of database constraints, or constraints implied by data mapping
rules and database constraints, has been explored in several systems that
implement variants of perfect rewriting [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], such as Ontop and MASTRO [
        <xref ref-type="bibr" rid="ref2 ref8">2,8</xref>
        ] and
others. Our approach, however, seamlessly accommodates such constraints into
the rewriting via interpolation and, again, could serve as an unifying approach
between perfect rewriting-based approaches and the combined approach, even
for DL-Lite based approaches to OMQ/OBDA.
      </p>
      <p>
        Our approach cannot deal with rewritings to Datalog/and or Linear Datalog
and with dichotomies on the NL-PTIME [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] and PTIME-coNP boundaries
[
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]: extensions of de nability/interpolation beyond rst order theories do not
seem to exist at present and it is unclear whether similar approaches can be
developed due to the close ties between interpolation and compactness of rst
order theories.
      </p>
      <sec id="sec-4-1">
        <title>Finally, note that Beth de nability and Craig Interpolation have been used</title>
        <p>
          for other purposes, such as query reformulation under rst-order constraints
[
          <xref ref-type="bibr" rid="ref16 ref29 ref31 ref7">7,16,29,31</xref>
          ]. That use, however, is orthogonal to the topic of this paper.
        </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Franz</given-names>
            <surname>Baader</surname>
          </string-name>
          , Diego Calvanese, Deborah L.
          <string-name>
            <surname>McGuinness</surname>
          </string-name>
          ,
          <string-name>
            <surname>Daniele Nardi</surname>
          </string-name>
          , and
          <string-name>
            <surname>Peter F. Patel-Schneider</surname>
          </string-name>
          .
          <article-title>The Description Logic Handbook: Theory, Implementation, and Applications</article-title>
          . Cambridge University Press,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Timea</given-names>
            <surname>Bagosi</surname>
          </string-name>
          , Diego Calvanese, Josef Hardi, Sarah Komla-Ebri, Davide Lanti, Martin Rezk, Mariano Rodriguez-Muro,
          <string-name>
            <given-names>Mindaugas</given-names>
            <surname>Slusnys</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Guohui</given-names>
            <surname>Xiao</surname>
          </string-name>
          .
          <article-title>The ontop framework for ontology based data access</article-title>
          .
          <source>In The Semantic Web and Web Science - 8th Chinese Conference, CSWS 2014, Revised Selected Papers</source>
          , pages
          <volume>67</volume>
          {
          <fpage>77</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Evert</given-names>
            <surname>Willem Beth</surname>
          </string-name>
          .
          <article-title>On Padoa's method in the theory of de nition</article-title>
          .
          <source>Indagationes Mathematicae</source>
          ,
          <volume>15</volume>
          :
          <fpage>330</fpage>
          {
          <fpage>339</fpage>
          ,
          <year>1953</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Meghyn</given-names>
            <surname>Bienvenu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Peter</given-names>
            <surname>Hansen</surname>
          </string-name>
          , Carsten Lutz, and
          <string-name>
            <given-names>Frank</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>First orderrewritability and containment of conjunctive queries in horn description logics</article-title>
          .
          <source>In Proceedings of the 29th International Workshop on Description Logics</source>
          , Cape Town, South Africa,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Meghyn</given-names>
            <surname>Bienvenu</surname>
          </string-name>
          , Stanislav Kikot, Roman Kontchakov,
          <string-name>
            <surname>Vladimir</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Podolskii</surname>
            , Vladislav Ryzhikov, and
            <given-names>Michael</given-names>
          </string-name>
          <string-name>
            <surname>Zakharyaschev</surname>
          </string-name>
          .
          <article-title>The complexity of ontologybased data access with OWL 2 QL and bounded treewidth queries</article-title>
          .
          <source>In Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, PODS 2017</source>
          , pages
          <fpage>201</fpage>
          {
          <fpage>216</fpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Meghyn</given-names>
            <surname>Bienvenu</surname>
          </string-name>
          , Balder ten Cate, Carsten Lutz, and
          <string-name>
            <given-names>Frank</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>Ontologybased data access: A study through disjunctive datalog, csp, and MMSNP</article-title>
          .
          <source>ACM Trans. Database Syst</source>
          .,
          <volume>39</volume>
          (
          <issue>4</issue>
          ):
          <volume>33</volume>
          :1{
          <fpage>33</fpage>
          :
          <fpage>44</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Alexander</given-names>
            <surname>Borgida</surname>
          </string-name>
          , Jos de Bruijn, Enrico Franconi, Inanc Seylan, Umberto Straccia, David Toman, and
          <string-name>
            <given-names>Grant E.</given-names>
            <surname>Weddell</surname>
          </string-name>
          .
          <article-title>On nding query rewritings under expressive constraints</article-title>
          .
          <source>In SEBD</source>
          , pages
          <volume>426</volume>
          {
          <fpage>437</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. Diego Calvanese, Giuseppe De Giacomo, Domenico Lembo, Maurizio Lenzerini, Antonella Poggi, Mariano Rodriguez-Muro,
          <article-title>Riccardo Rosati, Marco Ruzzi, and Domenico Fabio Savo. The MASTRO system for ontology-based data access</article-title>
          .
          <source>Semantic Web</source>
          ,
          <volume>2</volume>
          (
          <issue>1</issue>
          ):
          <volume>43</volume>
          {
          <fpage>53</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. Diego Calvanese, Giuseppe de Giacomo, Domenico Lembo, Maurizio Lenzerini, and
          <string-name>
            <given-names>Riccardo</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>Tractable Reasoning and E cient Query Answering in Description Logics: The DL-Lite Family</article-title>
          .
          <source>J. of Automated Reasoning</source>
          ,
          <volume>39</volume>
          (
          <issue>3</issue>
          ):
          <volume>385</volume>
          {
          <fpage>429</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>Jan</given-names>
            <surname>Chomicki</surname>
          </string-name>
          .
          <article-title>Depth-bounded bottom-up evaluation of logic program</article-title>
          .
          <source>J. Log. Program.</source>
          ,
          <volume>25</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>31</fpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Keith</surname>
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Clark</surname>
          </string-name>
          .
          <article-title>Negation as failure</article-title>
          .
          <source>In Logic and Data Bases, Symposium on Logic and Data Bases</source>
          , Centre d'etudes et de recherches de Toulouse, France,
          <year>1977</year>
          , pages
          <fpage>293</fpage>
          {
          <fpage>322</fpage>
          ,
          <year>1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>William</given-names>
            <surname>Craig</surname>
          </string-name>
          .
          <article-title>Three uses of the Herbrand-Genzen theorem in relating model theory and proof theory</article-title>
          .
          <source>Journal of Symbolic Logic</source>
          ,
          <volume>22</volume>
          :
          <fpage>269</fpage>
          {
          <fpage>285</fpage>
          ,
          <year>1957</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Francesco</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Donini</surname>
            and
            <given-names>Fabio</given-names>
          </string-name>
          <string-name>
            <surname>Massacci</surname>
          </string-name>
          .
          <article-title>EXPTIME tableaux for ALC</article-title>
          . Artif. Intell.,
          <volume>124</volume>
          (
          <issue>1</issue>
          ):
          <volume>87</volume>
          {
          <fpage>138</fpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Peter</surname>
            <given-names>Hansen</given-names>
          </string-name>
          , Carsten Lutz, Inanc Seylan, and
          <string-name>
            <given-names>Frank</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>E cient query rewriting in the description logic EL and beyond</article-title>
          .
          <source>In Proceedings of the TwentyFourth International Joint Conference on Arti cial Intelligence</source>
          ,
          <source>IJCAI</source>
          <year>2015</year>
          , pages
          <fpage>3034</fpage>
          {
          <fpage>3040</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Ian</surname>
            <given-names>Horrocks</given-names>
          </string-name>
          , Ulrike Sattler, Sergio Tessaris, and
          <string-name>
            <given-names>Stephan</given-names>
            <surname>Tobies</surname>
          </string-name>
          .
          <article-title>How to decide query containment under constraints using a description logic</article-title>
          .
          <source>In Logic for Programming and Automated Reasoning</source>
          , 7th International Conference, LPAR 2000,
          <string-name>
            <surname>Reunion</surname>
            <given-names>Island</given-names>
          </string-name>
          , France,
          <source>November 11-12</source>
          ,
          <year>2000</year>
          , Proceedings, pages
          <volume>326</volume>
          {
          <fpage>343</fpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Alexander</surname>
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Hudek</surname>
            , David Toman, and
            <given-names>Grant E.</given-names>
          </string-name>
          <string-name>
            <surname>Weddell</surname>
          </string-name>
          .
          <article-title>On enumerating query plans using analytic tableau</article-title>
          .
          <source>In Automated Reasoning with Analytic Tableaux and Related Methods - 24th International Conference, TABLEAUX</source>
          <year>2015</year>
          , Wroclaw, Poland,
          <source>September 21-24</source>
          ,
          <year>2015</year>
          . Proceedings, pages
          <volume>339</volume>
          {
          <fpage>354</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Vitaliy L. Khizder</surname>
            , David Toman,
            <given-names>and Grant</given-names>
          </string-name>
          <string-name>
            <surname>Weddell</surname>
          </string-name>
          .
          <article-title>Reasoning about Duplicate Elimination with Description Logic</article-title>
          .
          <source>In DOOD</source>
          , pages
          <volume>1017</volume>
          {
          <fpage>1032</fpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Stanislav</surname>
            <given-names>Kikot</given-names>
          </string-name>
          , Roman Kontchakov, Vladimir V.
          <article-title>Podolskii, and Michael Zakharyaschev. Long rewritings, short rewritings</article-title>
          .
          <source>In Proceedings of the 2012 International Workshop on Description Logics, DL-2012</source>
          , Rome, Italy, June 7-10,
          <year>2012</year>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Roman</surname>
            <given-names>Kontchakov</given-names>
          </string-name>
          , Carsten Lutz, David Toman,
          <string-name>
            <given-names>Frank</given-names>
            <surname>Wolter</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Michael</given-names>
            <surname>Zakharyaschev</surname>
          </string-name>
          .
          <article-title>The combined approach to query answering in DL-Lite</article-title>
          .
          <source>In Proc. KR</source>
          , pages
          <volume>247</volume>
          {
          <fpage>257</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Roman</surname>
            <given-names>Kontchakov</given-names>
          </string-name>
          , Carsten Lutz, David Toman,
          <string-name>
            <given-names>Frank</given-names>
            <surname>Wolter</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Michael</given-names>
            <surname>Zakharyaschev</surname>
          </string-name>
          .
          <article-title>The combined approach to ontology-based data access</article-title>
          .
          <source>In Proc. Int. Joint Conf. on Arti cial Intelligence (IJCAI)</source>
          , pages
          <fpage>2656</fpage>
          {
          <fpage>2661</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>Carsten</given-names>
            <surname>Lutz</surname>
          </string-name>
          and
          <string-name>
            <given-names>Leif</given-names>
            <surname>Sabellek</surname>
          </string-name>
          .
          <article-title>Ontology-mediated querying with the description logic EL: trichotomy and linear datalog rewritability</article-title>
          .
          <source>In Proceedings of the TwentySixth International Joint Conference on Arti cial Intelligence</source>
          ,
          <source>IJCAI</source>
          <year>2017</year>
          , pages
          <fpage>1181</fpage>
          {
          <fpage>1187</fpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Carsten</surname>
            <given-names>Lutz</given-names>
          </string-name>
          , Inanc Seylan, David Toman,
          <string-name>
            <given-names>and Frank</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>The combined approach to OBDA: Taming role hierarchies using lters</article-title>
          .
          <source>In ISWC (1)</source>
          , pages
          <fpage>314</fpage>
          {
          <fpage>330</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Carsten</surname>
            <given-names>Lutz</given-names>
          </string-name>
          , David Toman,
          <string-name>
            <given-names>and Frank</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>Conjunctive query answering in the description logic EL using a relational database system</article-title>
          .
          <source>In Proc. Int. Joint Conf. on Arti cial Intelligence (IJCAI)</source>
          , pages
          <year>2070</year>
          {
          <year>2075</year>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>Carsten</given-names>
            <surname>Lutz</surname>
          </string-name>
          and
          <string-name>
            <given-names>Frank</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>Non-uniform data complexity of query answering in description logics</article-title>
          .
          <source>In Principles of Knowledge Representation and Reasoning: Proceedings of the Thirteenth International Conference, KR</source>
          <year>2012</year>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Stephanie</surname>
            <given-names>McIntyre</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Alexander</given-names>
            <surname>Borgida</surname>
          </string-name>
          , David Toman, and
          <string-name>
            <given-names>Grant E.</given-names>
            <surname>Weddell</surname>
          </string-name>
          .
          <article-title>On limited conjunctions and partial features in parameter-tractable feature logics</article-title>
          .
          <source>In The Thirty-Third AAAI Conference on Arti cial Intelligence</source>
          ,
          <source>AAAI</source>
          <year>2019</year>
          , pages
          <fpage>2995</fpage>
          {
          <fpage>3002</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Stephanie</surname>
            <given-names>McIntyre</given-names>
          </string-name>
          ,
          <string-name>
            <surname>David Toman</surname>
            , and
            <given-names>Grant E. Weddell.</given-names>
          </string-name>
          <article-title>FunDL - A family of feature-based description logics, with applications in querying structured data sources</article-title>
          . In Description Logic,
          <string-name>
            <given-names>Theory</given-names>
            <surname>Combination</surname>
          </string-name>
          , and
          <string-name>
            <surname>All</surname>
          </string-name>
          That - Essays Dedicated to Franz
          <source>Baader on the Occasion of His 60th Birthday</source>
          , pages
          <volume>404</volume>
          {
          <fpage>430</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>Jason</given-names>
            <surname>St. Jacques</surname>
          </string-name>
          , David Toman, and
          <string-name>
            <given-names>Grant E.</given-names>
            <surname>Weddell</surname>
          </string-name>
          .
          <article-title>Object-relational queries over CF DInc knowledge bases: OBDA for the SQL-Literate</article-title>
          .
          <source>In Proc. IJCAI</source>
          , pages
          <volume>1258</volume>
          {
          <fpage>1264</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28. David Toman and
          <string-name>
            <given-names>Grant E.</given-names>
            <surname>Weddell</surname>
          </string-name>
          .
          <article-title>On keys and functional dependencies as rst-class citizens in description logics</article-title>
          .
          <source>J. Aut. Reasoning</source>
          ,
          <volume>40</volume>
          (
          <issue>2-3</issue>
          ):
          <volume>117</volume>
          {
          <fpage>132</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29. David Toman and
          <string-name>
            <surname>Grant E. Weddell.</surname>
          </string-name>
          <article-title>Fundamentals of Physical Design and Query Compilation</article-title>
          .
          <source>Synthesis Lectures on Data Management</source>
          . Morgan &amp; Claypool Publishers,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30. David Toman and
          <string-name>
            <given-names>Grant E.</given-names>
            <surname>Weddell</surname>
          </string-name>
          .
          <article-title>Conjunctive Query Answering in CF Dnc: A PTIME Description Logic with Functional Constraints and Disjointness</article-title>
          .
          <source>In Australasian Conference on Arti cial Intelligence</source>
          , pages
          <fpage>350</fpage>
          {
          <fpage>361</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31. David Toman and
          <string-name>
            <surname>Grant E. Weddell.</surname>
          </string-name>
          <article-title>An interpolation-based compiler and optimizer for relational queries (system design report)</article-title>
          .
          <source>In IWIL@LPAR 2017 Workshop and LPAR-21 Short Presentations</source>
          , Maun, Botswana, May 7-
          <issue>12</issue>
          ,
          <year>2017</year>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>