<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Navigating the EL Subsumption Hierarchy ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Theoretical Computer Science</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Technische Universität Dresden</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dresden</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Germany francesco.kriegel@tu-dresden.de</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>The EL subsumption hierarchy consists of all EL concept descriptions and is partially ordered by subsumption. In order to navigate within this hierarchy, one can go up to subsumers and down to subsumees. We analyze how smallest steps can be made. Specifically, we show how all upper neighbors as well as all lower neighbors of a given EL concept description can be eficiently computed, where two concepts are neighbors if one subsumes the other and there is no third concept in between. We further show that the hierarchy contains very long chains: there is a sequence of concepts Cn with size linear in n such that each chain of neighbors from ⊤ to Cn has at least n-fold exponential length. As applications, we provide a template for determining upper complexity bounds for deciding whether a concept is maximally general or maximally specific w.r.t. a property, we construct a metric on the set of all EL concept descriptions, we introduce a similarity measure that fulfills the triangle inequality, and we conclude that an uninformed search for a target concept by subsequently computing neighbors or, equivalently, along an ideal refinement operator is not feasible in practical applications.</p>
      </abstract>
      <kwd-group>
        <kwd>Description logic</kwd>
        <kwd>Subsumption</kwd>
        <kwd>Upper neighbor</kwd>
        <kwd>Lower neighbor</kwd>
        <kwd>Distance measure</kwd>
        <kwd>Metric</kwd>
        <kwd>Refinement operator</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The EL subsumption hierarchy consists of all EL concept descriptions and is
partially ordered by subsumption. In order to navigate within this hierarchy,
one can go up to subsumers and down to subsumees. We analyze how smallest
steps can be made. Specifically, we show how all upper neighbors as well as all
lower neighbors of a given EL concept description can be eficiently computed,
where two concepts are neighbors if one subsumes the other and there is no third
concept in between. The complexity for both computation tasks is determined:
while all upper neighbors can be computed in polynomial time, computation of
all lower neighbors needs exponential time.</p>
      <p>
        Secondly, we employ a standard construction from Lattice Theory [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] for
constructing a distance measure (metric) on the set of all EL concept
descriptions. Specifically, the distance between two concepts C and D coincides with the
⋆ Francesco Kriegel is funded by DFG in project number 430150274.
length of a shortest path in the undirected graph the vertex set of which consists
of all EL concept descriptions and in which neighboring concept descriptions are
connected by an edge. An asymptotic analysis reveals that the distance between
⊤ and ∃ r1. · · · ∃ rn. (A1 ⊓ · · · ⊓ Ak) where k ≥ 3 is asymptotically bounded from
below by the n-fold iterated exponential
It follows that the subsumption hierarchy contains very long chains: each chain
of neighbors from ⊤ to ∃ r1. · · · ∃ rn. (A1 ⊓ · · · ⊓ Ak) has n-fold exponential length.
      </p>
      <p>
        Thirdly, we devise some consequences and applications. We provide a
template for determining upper complexity bounds for deciding whether a concept
description is maximally specific or maximally general w.r.t. a given property.
We construct a similarity measure on EL concept descriptions that fulfills the
triangle inequality. We conclude that an uninformed search for a target concept
by subsequently computing neighbors or, equivalently, along an ideal refinement
operator is not feasible in practical applications. The latter applies, in particular,
to an approach that tries to learn a target concept [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] as well as to the
problem of computing a maximally strong weakening w.r.t. ≻ sub (but only for this
particular weakening relation!) in the context of computing a gentle repair [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        In addition to citing and rephrasing existing results on the enumeration of
upper neighbors as well as a construction of the distance measure, this article
provides as new contributions an eficient approach to computing lower neighbors
and an asymptotic analysis of the distance measure. Specifically, a contained
result is a previously unpublished, new contribution if and only it is followed
only by a reference to [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Proofs can be found in the mentioned references.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>The EL Subsumption Hierarchy. We assume basic knowledge of the
description logic EL. For a signature Σ := Σ C ∪ Σ R consisting of concept names and role
names, EL concept descriptions are built from Σ by means of the constructors
⊤, ⊓, and ∃, and the set of all concept descriptions is denoted as EL(Σ ). We
treat (nested) conjunctions like sets, i.e., nestings, order, and repetitions are not
relevant. Concept names and existential restrictions are also called atoms. Each
concept C is a conjunction of atoms, the top-level conjuncts of C, and we denote
the set of all these atoms as Conj(C). ⊤ is the empty conjunction. The role depth
of a concept is the maximal number of nestings of existential restrictions.</p>
      <p>
        Given two concept descriptions C and D, we say that C is subsumed by D,
written C ⊑∅ D, if CI ⊆ DI for each interpretation I. We use the subscript ∅ to
indicate that we consider subsumption w.r.t. the empty TBox. It is well-known
that the subsumption relation ⊑∅ is a partial order — a reflexive, transitive binary
relation — on the set EL(Σ ). Consequently, the quotient of EL(Σ ) w.r.t. the
induced equivalence relation ≡ ∅ is a partially ordered set. In what follows, we
will not distinguish between the equivalence classes and their representatives,
with the consequence that ⊑∅ becomes a partial order — a reflexive, transitive,
antisymmetric binary relation. As representatives we usually take the reduced
concepts, where a concept is reduced if none of its conjunctions contains atoms
that are comparable w.r.t. ⊑∅. According to [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], each concept has a unique
reduced form to which it is equivalent. The EL subsumption hierarchy is the
partially ordered set (poset) (EL(Σ ), ⊑∅).
      </p>
      <p>Upper and Lower Neighbors. For a partially ordered set (P, ≤ ), its
neighborhood relation1 consists of all pairs (p, q) where p &lt; q and there exists no x such
that p &lt; x &lt; q. Usually, if p ≺ q, then one calls p a lower neighbor of q and, vice
versa, q is called an upper neighbor of p.2 We say that ≤ is neighborhood
generated if the transitive closure ≺ + equals the irreflexive part &lt;. Obviously, this is
the case if and only if, for each pair p ≤ q, there is a finite chain of neighbors from
p to q, i.e., there are elements x0, . . . , xn such that p = x0 ≺ x1 ≺ · · · ≺ xn = q.</p>
      <p>Clearly, if the underlying set P is finite, then each partial order on P is
neighborhood generated. However, there are infinite posets where this does not
hold true; even worse, there are cases where ≺ and thus also ≺ + are both empty.
For instance, consider the set R of real numbers with their usual ordering ≤ .
It is well known that R is dense in itself, i.e., for each pair x &lt; y, there is
another real number z in between, i.e., such that x &lt; z &lt; y — thus, there are
no neighboring real numbers. Another example of a partially ordered set that is
not neighborhood generated is the set N of all natural numbers augmented with
a greatest element ∞, which then does not have any neighbors.</p>
      <p>As an alternative formulation, a partial order ≤ is not neighborhood
generated if and only if there exists a pair p &lt; q such that every finite chain 3
p = x0 &lt; x1 &lt; · · · &lt; xn = q can be refined, i.e., there is some index i and an
element y such that xi &lt; y &lt; xi+1. It follows that ≤ is neighborhood generated if
≤ is bounded, i.e., for each element p, there is a finite upper bound on the lengths
of chains starting with p. Although boundedness is suficient for
neighborhoodgeneratedness, it is not necessary: the following result immediately implies that
each unbounded poset can be order-embedded4 into a neighborhood generated
poset, which must be unbounded as well.</p>
      <p>
        Proposition 1. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], [16, Page 114]. Each poset can be order-embedded into
some neighborhood generated poset.
      </p>
      <p>
        Proof sketch. Let (P, ≤ ) be a poset. Firstly, we define the poset (Q, ⊑) by adding
a fresh element between each two ≤ -comparable elements of P . It is easy to see
that (Q, ⊑) must be neighborhood generated. Secondly, we can map each element
of P to itself in Q in order to obtain an order-embedding.
⊔⊓
1 While in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] the name “neighborhood relation” is used, it is called “covers relation” in
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and “one-step relation” in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. A further alternative name is “transitive reduction.”
2 Alternative denotations are “lower cover” and “upper cover.”
3 Formally, a chain in a poset (P, ≤ ) is a subset C ⊆ P such that p ≤ q or q ≤ p for
each two elements p, q ∈ C. It starts with p if p ≤ q for each q ∈ C.
4 An order-embedding h from (P, ≤ ) into (Q, ⊑) is an injective mapping h : P → Q
such that p ≤ q if and only if h(p) ⊑ h(q) for all p, q ∈ P .
      </p>
      <sec id="sec-2-1">
        <title>Neighbors of EL Concept Descriptions</title>
        <p>
          This section is concerned with the questions whether the subsumption relation is
neighborhood generated and how upper and lower neighbors can be enumerated.
Definition 2. Let C and D be concept descriptions. We call C a lower neighbor
of D and D an upper neighbor5 of C, written C ≺ ∅ D and D ≻ ∅ C, respectively,
if6 C ⊏∅ D and there does not exist a concept E such that C ⊏∅ E ⊏∅ D.
Here, we only consider the empty TBox — other types of TBoxes
(cyclerestricted, acyclic, general) as well as two extensions of EL (with ⊥, with greatest
ifxed-points) are considered in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] but left out here due to a lack of space. As
short summary, the subsumption relation is neighborhood generated if the TBox
is cycle-restricted or acylic, but not neighborhood generated for general TBoxes
or if ⊥ or greatest fixed-points are added.
        </p>
        <p>
          In the proof of Proposition 3.5 in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] it was shown that the subsumption
relation ⊑∅ is bounded and so we can immediately draw the following conclusion.
Proposition 3. [15, Proposition 2], [16, Proposition 5.1.2]. The subsumption
relation ⊑∅ on EL(Σ ) is neighborhood generated.
        </p>
        <p>
          Next, we show how all upper and all lower neighbors of a given EL concept
description C can be computed. Recall that there is the following recursive
characterization of the subsumption relation [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]: C ⊑∅ D if and only if A ∈ Conj(D)
implies A ∈ Conj(C) for each concept name A, and for each existential restriction
∃ r. F ∈ Conj(D), there is ∃ r. E ∈ Conj(C) such that E ⊑∅ F . It follows that,
given a concept description C, we obtain an upper neighbor of C by removing
one concept name from Conj(C) and, vice versa, we get a lower neighbor of C
by adding a concept name to Conj(C) that is not already there.
        </p>
        <p>Dealing with the existential restrictions is more involved. To construct an
upper neighbor, we cannot simply remove an existential restriction ∃ r. D from
Conj(C), since the resulting concept might be too general — according to the
above characterization of ⊑∅ it holds true that ∃ r. D ⊏∅ d{ ∃ r. E | D ≺ ∅ E }
and so we infer that7 the concept (C \ ∃ r. D) ⊓ d{ ∃ r. E | D ≺ ∅ E } is between
C and C \ ∃ r. D. In fact, we can prove that the concept in the middle is always
an upper neighbor of C and further that each upper neighbor is either of this
form or of the form C \ A for some concept name A ∈ Conj(C).</p>
        <p>Definition 4. For each reduced EL concept description C, we recursively define
the set Upper(C) := { C↑G | G ∈ Conj(C) } where C↑A := C \ A and C↑∃r.D :=
(C \ ∃ r. D) ⊓ d{ ∃ r. E | E ∈ Upper(D) }.</p>
        <p>Proposition 5. [15, Proposition 4], [3, Lemma 22], [16, Proposition 5.1.5]. For
each reduced EL concept description C, the set Upper(C) consists of all upper
neighbors of C (modulo equivalence), i.e., a concept description D is an upper
neighbor of C if and only if there is some D′ ∈ Upper(C) such that D ≡ ∅ D′.
5 Alternative denotations could be “direct subsumee” and “direct subsumer.”
6 We write C ⊏∅ D to indicate that C ⊑∅ D and D ̸⊑∅ C.
7 For D ∈ Conj(C), we abbreviate by C \ D the concept description d(Conj(C) \ {D}).</p>
        <p>
          The mapping G 7→ C↑G is a bijection from Conj(C) to Upper(C), cf.
Proposition 5.1.6 in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. Thus, each top-level conjunct of C induces a unique upper
neighbor of C.
        </p>
        <p>Proposition 6. [16, Proposition 5.1.16]. Upper(C) can be computed in quadratic
time (w.r.t. C), each neighbor in Upper(C) has quadratic size (w.r.t. C),
Upper(C) consists of linearly many neighbors (w.r.t. C), and each two diferent
neighbors in Upper(C) are not equivalent.</p>
        <p>An immediate consequence of Proposition 6 is the following result.
Proposition 7. [16, Theorem 5.1.17].
decided in polynomial time.</p>
        <p>The neighborhood relation ≺ ∅ can be
Example 8. Consider the concept C := A⊓∃ r. (B1⊓B2⊓B3). The upper neighbor
induced by the first top-level conjunct A is ∃ r. (B1⊓B2⊓B3). In order to compute
the upper neighbor induced by the second top-level conjunct ∃ r. (B1 ⊓ B2 ⊓ B3),
we remove that atom and in its stead add the existential restrictions ∃ r. D where
D ranges over all upper neighbors of B1 ⊓B2 ⊓B3 — we obtain A⊓∃ r. (B1 ⊓B2)⊓
∃ r. (B1 ⊓ B3) ⊓ ∃ r. (B2 ⊓ B3) as the second upper neighbor of C.</p>
        <p>It remains to investigate how lower neighbors can be obtained by adding an
existential restriction. The above characterization of upper neighbors provides
a first hint: a lower neighbor of a concept C can be obtained by adding an
existential restriction ∃ r. D for which all ∃ r. E for all upper neighbors E of
D are already present in C (in a certain sense). More specifically, we observe
that C ⊓ ∃ r. D is a lower neighbor of C if and only if (L1) C ̸⊑∅ ∃ r. D and
(L2) C ⊑∅ ∃ r. E for each upper neighbor E of D, since the concept C ⊓ ∃ r. D is
a lower neighbor of C ⊓ d{ ∃ r. E | E ∈ Upper(D) }, cf. Proposition 5.</p>
        <p>According to the recursive characterization of ⊑∅ and using the notation
Succ(C, r) := { F | ∃ r. F ∈ Conj(C) }, the above Condition (L2) is satisfied if
and only if there is a function ψ : Upper(D) → Succ(C, r) such that ψ (E) ⊑∅ E
for each upper neighbor E of D. This function ψ is injective. (Assume there
would be two diferent upper neighbors U and V of D such that ψ (U ) = ψ (V ).
We would obtain ψ (U ) ⊑∅ U ⊓ V . Since U ⊓ V is equivalent to D, we would
obtain a contradiction to the above condition (L1).)</p>
        <p>
          By means of the above bijection between Conj(D) and Upper(D) we can
transform ψ to an injective function ϕ : Conj(D) → Succ(C, r) where ϕ (G) ⊑∅
D↑G for each G ∈ Conj(D). Since ϕ is injective, we can invert it and so obtain
a surjective partial mapping8 χ : Succ(C, r) →7 Conj(D) such that F ⊑∅ D↑χ (F )
for each F ∈ Dom(χ ). Since χ is surjective, we conclude that D must be the
conjunction of all atoms in Ran(χ ). Furthermore, it is not hard to prove that
F ⊓ χ (F ) is a lower neighbor of F 9 for each F ∈ Dom(χ ) and further that
F ′ ⊑∅ χ (F ) for each two diferent F, F ′ ∈ Dom(χ ). We call χ a lowering function
8 For each partial function f : A →7 B, its domain is Dom(f ) := { a | f (a) is defined }
and its range is Ran(f ) := { f (a) | a ∈ Dom(f ) }.
9 That’s why χ (F ) could be called a lowering atom of F as in [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
and, to sum up, we have seen that there exists such a lowering function χ if
C ⊓ ∃ r. D is a lower neighbor of C. Actually, the converse direction holds true
as well and we obtain the following formal characterization.
        </p>
        <p>Definition 9. Let C be a reduced EL concept description. We define the
following by mutual recursion on the role depth of C. Firstly, define the set
Lower(C) := { C ⊓ A | A ∈ Σ C and A ̸∈ Conj(C) }</p>
        <p>
          ∪ { C ⊓ ∃ r. d Ran(χ ) | r ∈ Σ R and χ is a lowering function for r } .
Secondly, a lowering function for a role name r is a partial mapping
χ : Succ(C, r) →7 EL(Σ ) such that (1) F ⊓χ (F ) ∈ Lower(F ) for each F ∈ Dom(χ ),
(2) F ′ ⊑∅ χ (F ) for each two diferent F, F ′ ∈ Dom(χ ), and (3) C ̸⊑∅ ∃ r. d Ran(χ ).
Proposition 10. [16, Corollary 5.1.13]. For each reduced EL concept C, the set
Lower(C) consists of all lower neighbors of C (modulo equivalence), i.e., a
concept D is a lower neighbor of C if and only if D ≡ ∅ D′ for some D′ ∈ Lower(C).
Note that in [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] an eficient non-deterministic algorithm is described that
produces all lower neighbors on its successful computation paths.
        </p>
        <p>Proposition 11. [16, Propositions 5.1.19 and 5.1.21]. Lower(C) can
be computed in exponential time (w.r.t. C and Σ ), each neighbor in Lower(C)
has quadratic size (w.r.t. C), Lower(C) consists of at most exponentially many
neighbors (w.r.t. C and Σ ), and each two diferent neighbors in Lower(C) are
not equivalent.</p>
        <p>The following example shows that the exponential blow-up cannot be avoided.
Example 12. Fix the signature Σ consisting only of two role names r and s.
Define the concept Cn := d{ ∃ r. Dni | i ∈ {1, . . . , n} } for each n ≥ 2 where Dni :=
d{ Ej , Fj | j ∈ {1, . . . , n} \ {i} } ⊓ ∃ rn. ⊤ ⊓ ∃ sn. ⊤, and Ej := ∃ rj . ∃ s. ⊤, and
Fj := ∃ sj . ∃ r. ⊤. There are exponentially many lowering functions for r, namely
the partial functions χ : Succ(Cn, r) →7 EL(Σ ) where Dom(χ ) := Succ(Cn, r)
and χ (Dni) ∈ {Ei, Fi} for each index i ∈ {1, . . . , n}, and these induce the lower
neighbors Cn ⊓ ∃ r. (G1 ⊓ · · · ⊓ Gn) where each Gi is either Ei or Fi.
4</p>
      </sec>
      <sec id="sec-2-2">
        <title>Distances between EL Concept Descriptions</title>
        <p>Using the results from the previous section on neighbors of EL concept
descriptions, we are now able to introduce a natural distance measure (metric) on the
set EL(Σ ), namely where the distance between two EL concepts C and D is the
length of a shortest path between C and D in the undirected graph with vertex
set EL(Σ ) and in which two concepts are connected by an edge if they are
neighbors of each other.10 This distance measure fulfills all conditions of a metric, i.e.,
the distance between two concepts is never negative, two concepts have distance
0 if and only if they are equivalent, the distance from C to D equals the distance
from D to C, and the distance between two concepts never exceeds the sum of
the distances with a third concept in the middle (triangle inequality ).</p>
        <p>
          In what follows, we will first explore some lattice-theoretic properties of the
partially ordered set (EL(Σ ), ⊑∅) and then utilize a well-known construction
from Lattice Theory [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] to formally introduce the above mentioned metric. At
the end of this section, an asymptotic analysis of this metric reveals that it can
reach huge values, i.e., computing it is highly infeasible.
        </p>
        <p>
          First of all, the binary conjunction ⊓ is the infimum operation in the poset
(EL(Σ ), ⊑∅), i.e., for each two concepts C and D, it holds true that C ⊓ D ⊑∅ C
and C ⊓ D ⊑∅ D, and further E ⊑∅ C and E ⊑∅ D implies E ⊑∅ C ⊓ D for each
concept E. The dual notion is the supremum operation; for each two concepts C
and D, the supremum (or least common subsumer ) C ∨ D satisfies C ⊑∅ C ∨ D
as well as D ⊑∅ C ∨ D, and further C ⊑∅ E and D ⊑∅ E implies C ∨ D ⊑∅ E
for each concept E. According to [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], least common subsumers can be computed
by means of products of graphs/trees, yielding the following recursive formula:
C ∨ D ≡ ∅ d{ A | A ∈ Conj(C) and A ∈ Conj(D) }
        </p>
        <p>⊓ d{ ∃ r. (E ∨ F ) | ∃ r. E ∈ Conj(C) and ∃ r. F ∈ Conj(D) }.</p>
        <p>The existence of the infimum and the supremum operation turns the poset
(EL(Σ ), ⊑∅) into a lattice. In [16, Proposition 5.2.1] it is shown that this lattice
is distributive, i.e., the equivalences C ⊓ (D ∨ E) ≡ ∅ (C ⊓ D) ∨ (C ⊓ E) and
C ∨ (D ⊓ E) ≡ ∅ (C ∨ D) ⊓ (C ∨ E) hold true for each three concepts C, D, E.</p>
        <p>
          Recall that, for each concept C, there is a finite upper bound on the lengths
of chains starting with C [5, proof of Proposition 3.5]. We conclude that, for each
two concepts C and D, every chain from C to D has finite length. According
to [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], it follows that the lattice (EL(Σ ), ⊑∅) satisfies the Jordan-Dedekind chain
condition, i.e., for each two concepts C and D with C ⊑∅ D, all maximal chains11
from C to D have the same length. It is now straightforward to define the distance
between two concepts C and D with C ⊑∅ D as the length of some maximal
chain from C to D. If the condition C ⊑∅ D is not satisfied, we instead employ the
length of some maximal chain from the infimum C ⊓ D to the supremum C ∨ D.
Proposition 13. [15, Proposition 16], [16, Proposition 5.4.3]. Consider the
mapping d : EL(Σ ) × EL (Σ ) → N where d(C, D) := n if there exist concepts
E0, . . . , En such that C ⊓ D = E0 ≺ ∅ E1 ≺ ∅ · · · ≺ ∅ En = C ∨ D. It is
welldefined and it is a metric, i.e., the following properties are fulfilled for all
concepts C, D, E: (1) d(C, D) = 0 if and only if C ≡ ∅ D, (2) d(C, D) = d(D, C),
and (3) d(C, E) ≤ d(C, D) + d(D, E) ( triangle inequality).
10 Note that, in graph theory, it is well-known that the shortest path distance yields a
metric on each undirected graph.
11 A maximal chain is one that cannot be refined, i.e., which is not a strict subset of
another chain.
        </p>
        <p>As shown in [16, Proposition 5.4.4], the distance d(C, D) coincides with the
length of a shortest path from C to D in the undirected graph (V, E) with vertex
set V := EL(Σ ) and with edge set E := { {C, D} | C ≺ ∅ D }. Specifically, it
follows that the distance d(C, D) equals the sum of the lengths of a chain of
neighbors from C to C ⊓ D and of another from D to C ⊓ D.</p>
        <p>We close this section with an asymptotic analysis. As a simple example,
consider the concept description ∃ r. (A1 ⊓ · · · ⊓ Ak). Let X1, . . . , Xℓ be an
enumerak
tion of the exponentially many subsets of {A1, . . . , Ak} with ⌊ 2 ⌋ elements, and
further let Dm := d{ ∃ r. d Xi | i ∈ {m, . . . , ℓ} } for each index m ∈ {1, . . . , ℓ}.
It follows that ∃ r. (A1 ⊓ · · · ⊓ Ak) ⊏∅ D1 ⊏∅ D2 ⊏∅ · · · ⊏∅ Dℓ ⊏∅ ⊤ is an
exponentially long chain of strict subsumptions, which implies that the distance from
∃ r. (A1 ⊓ · · · ⊓ Ak) to ⊤ must be at least exponential. Even worse, the following
proposition shows that there exists a sequence of concept descriptions Cn such
that Cn has role depth n (and size linear in n) and the distance from Cn to ⊤
is n-fold exponential.</p>
        <p>Proposition 14. [16, Corollary 5.6.9]. Fix a natural number k ≥ 3 and let
A1, . . . , Ak be diferent concept names from Σ . Further let ri be a role name
in Σ for each natural number i. The distance from ∃ r1. · · · ∃ rn. (A1 ⊓ · · · ⊓ Ak)
to ⊤, where n ranges over the natural numbers, is asymptotically bounded from
below by12 the iterated exponential
12 A function f : N → R is asymptotically bounded from below by a function g : N → R
if there is a constant c ∈ R+ and a number n0 ∈ N such that c · g(n) ≤ f (n) for each
n ≥ n0.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Applications and Consequences</title>
      <p>Deciding Minimality and Maximality for a Property. [2, Section 5], [16,
Section 5.1.2]. Let P ⊆ EL (Σ ) be a decision problem that is closed under
subsumees, i.e., C ∈ P and C ⊒∅ D implies D ∈ P. Further consider the problem
Max(P) that consists of all maximally general concepts in P, i.e., C ∈ Max(P)
if and only if C ∈ P and there is no D such that C ⊏∅ D and D ∈ P.</p>
      <p>A deterministic, polynomial time procedure that decides Max(P) is as
follows: (1) On input C, check whether C ∈ P. If not, then reject C. (2)
Compute the set Upper(C) from Proposition 5. (3) If there exists an upper neighbor
D ∈ Upper(C) such that D ∈ P, then reject C; otherwise accept C.</p>
      <p>
        We conclude that P ∈ C implies Max(P) ∈ PC for each complexity class C,
which specifically yields that P ∈ P implies Max(P) ∈ P and that P ∈ Σ nP
implies Max(P) ∈ ∆ nP+1 for each number n ∈ N. Furthermore, P ∈ P Space
implies Max(P) ∈ P Space, since PP Space ⊆ P Space [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. More generally, P ∈ C
implies Max(P) ∈ C for each complexity class C where P Space ⊆ C.
      </p>
      <p>Dually, let P ⊆ EL (Σ ) be a decision problem that is closed under subsumers,
i.e., C ∈ P and C ⊑∅ D implies D ∈ P, and consider the problem Min(P) that
consists of all maximally specific concepts in P, i.e., C ∈ Min(P) if and only if
C ∈ P and there is no D such that C ⊐∅ D and D ∈ P.</p>
      <p>A non-deterministic, polynomial time procedure that decides the complement
of Min(P) is the following: (1) On input C, check if C ∈ P. If not, then accept C.
(2) Guess a concept D the size of which is quadratic in C. (3) Check if C is an
upper neighbor of D. If not, then accept C. (4) Check if D ∈ P. If yes, then
accept C; otherwise reject C.</p>
      <p>
        It follows that P ∈ C implies Min(P) ∈ co (NPC) for each complexity class C.
In particular, we infer that P ∈ P implies Min(P) ∈ co NP, and that P ∈ Σ nP
implies Min(P) ∈ Π nP+1 for each n ∈ N. As co (NPP Space) ⊆ P Space [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], we
further conclude that P ∈ P Space implies Min(P) ∈ P Space and, more generally,
that P ∈ C implies Min(P) ∈ co C for each complexity class C with P Space ⊆ C.
A Similarity Measure that Fulfills the Triangle Inequality. [16,
Section 5.5]. Similarity measures quantify the similarity of two objects. In the
context of DLs, usually either concepts or individuals are compared. In an early
article on similarity measures on DL concepts [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], three approaches to defining
such measures are proposed: based on features, based on semantic networks,
and based on information content. However, no concrete measure is devised.
Later, [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] compares existing (concrete) DL similarity measures, divides them into
extensional-based and intentional-based ones, and proposes a new such measure.
A framework for constructing similarity measures between concepts in the mild
extension of EL with simple role inclusions r ⊑ s is developed in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
Additionally, an overview on other existing similarity measures and their properties is
provided. Notably, none satisfies the triangle inequality. In [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] a general
framework for constructing similarity measures based on concept relaxation operators
(which are similar to upward refinement operators) is introduced. Each such
similarity measure satisfies the triangle inequality.
      </p>
      <p>
        Diferent kinds of similarity measures have also been employed in the
development of novel DLs. For instance, [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] extends an expressive DL by means
to specify degrees of similarity between individuals, but that logic turns out
to be undecidable. So-called threshold DLs are investigated in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], where
(values of) graded membership functions replace the Boolean membership values 0
and 1. Decidability and computational complexity is determined and it is further
explained how a graded membership function can be obtained from a concept
similarity measure.
      </p>
      <p>
        In the following, we explain how the distance measure d in Proposition 13
can be transformed into a similarity measure. Firstly, we convert d into a metric
with range [0, 1) and, secondly, we twist the range (i.e., value x becomes 1 − x).
Formally, if f : [0, ∞) → [0, 1) is an order-preserving, sub-additive function, then
the mapping s defined by s(C, D) := 1 − f (d(C, D)) is a similarity measure. For
instance, suitable functions are f (x) := ( 1+xx )y for each y &gt; 0 and f (x) := 1 − yx
for each y ∈ (0, 1). Such a similarity measure s fulfills all properties listed in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]
including the triangle inequality, but not the property of structural dependence.
Potential Uselessness of Ideal Downward Refinement Operators. [16,
Section 5.1.9]. A downward refinement operator takes an object as input and
returns a set of objects that are more specific w.r.t. a given partial order. Such
operators have been employed in inductive logic programming in order to learn
theories from facts [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. The analysis in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] reveals that refinement operators
with certain desirable properties cannot exist. In the context of DLs, such an
operator usually maps a concept C to a set of concepts subsumed by C. In [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ],
an ideal downward refinement operator in a slight extension of EL is introduced
and, in [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], it is proposed to use this operator to learn EL concepts. A similar
downward refinement operator is described in [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], where it further serves as a
means to defining a similarity measure (by counting refinement steps).
Expanding on the latter results, a downward refinement operator on conjunctive queries
(with a fixed set of answer variables) is introduced in [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], which allows for the
definition of a similarity measure in a similar manner.
      </p>
      <p>
        In [20, Section 2.2] it is stated that “refinement operators are used to structure
a search process for concepts”. While this argument holds true in theory, we
show in the following that utilizing the ideal downward refinement operator, as
introduced in [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], for learning a target concept is not feasible in applications.
      </p>
      <p>Given a TBox T , a downward refinement operator is a function ρ that maps
each concept description to a set of concept descriptions such that D ∈ ρ (C)
implies D ⊑T C.13 Furthermore, ρ is ideal if it additionally fulfills the following
conditions: (1) ρ is finite , i.e., ρ (C) is finite for each C, (2) ρ is proper, i.e.,
D ∈ ρ (C) implies D ̸≡ T C, and (3) ρ is complete, i.e., D ⊏T C implies the
existence of concept descriptions E1, . . . , En such that E1 ∈ ρ (C), E2 ∈ ρ (E1),
. . . , En ∈ ρ (En− 1), and En ≡ T D.</p>
      <p>
        There is a connection between the notion of neighbors of concept
descrip13 By C ⊑T D we indicate that CI ⊆ DI for each model I of T .
tions and ideal downward refinement operators. In what follows, we consider
the particular downward refinement operator ρ ∗ in [21, Theorem 1]. Firstly, ρ ∗
is defined with respect to TBoxes that may only contain axioms of the
following forms: concept inclusions A ⊑ B, concept disjointness axioms A ⊓ B ≡ ⊥ ,
role inclusions r ⊑ s, domain restrictions Dom(r) ⊑ A, and range restrictions
Ran(r) ⊑ A, where A and B are concept names and where r and s are role
names. Secondly, ρ ∗ is defined by means of another refinement operator ρ , which
constructs refinements by applying one of four operations to the syntax tree of
the concept description to be refined: (1) add a concept name as label to some
node, (2) refine a concept name that labels a node (i.e., if A ⊑ B is in T , then
a label B can be replaced by A), (3) refine a role name that labels an edge,
and (4) attach a new subtree to some node (see [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] for the concrete definition).
ρ is only weakly complete, i.e., the above condition for completeness is only
guaranteed for C = ⊤. The refinements of some concept description C w.r.t. ρ ∗ are
then defined as the w.r.t. T maximally general concept descriptions D satisfying
the following conditions: (1) there is a sequence of ρ -refinements starting with ⊤
and ending with D, (2) D ⊏T C, and (3) the role depth of D exceeds the role
depth of C by at most 1. Note that, since ρ is weakly complete, the first
condition is redundant. It immediately follows from the required maximal generality
and from Condition (2) that D must be a lower neighbor of C w.r.t. T .14
Furthermore, since ρ ∗ is complete, each set ρ ∗ (C) must contain all lower neighbors
of C w.r.t. T modulo equivalence. We conclude that ρ ∗ is the set of all lower
neighbors of C w.r.t. T modulo equivalence.
      </p>
      <p>For the case where the TBox T is empty, it follows from Proposition 14 that
the search for a particular EL concept description may need a non-elementary
number of consecutive refinement steps with ρ ∗ . More specifically, constructing
the target concept ∃ r1. · · · ∃ rn. (A1 ⊓ · · · ⊓ Ak) starting from ⊤ by means of ρ ∗
needs a number of steps that is asymptotically bounded from below by</p>
      <p>
        Computing Maximally Strong Weakenings for Gentle Repairs. In order
to resolve inconsistency or to remove an unwanted consequence, the classical
approach to repairing an ontology is deleting enough axioms from it. More
finegrained repairs can be obtained by weakening axioms instead of removing them
completely [
        <xref ref-type="bibr" rid="ref11 ref14 ref19 ref28 ref3 ref8">3, 8, 11, 14, 19, 28</xref>
        ].
      </p>
      <p>
        A general framework for computing gentle repairs by axiom weakening is
developed in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], where conditions on the weakening relations are formulated that
guarantee termination. Furthermore, an instantiation of the framework for EL is
provided specifically for the case of repairing TBoxes. One proposed weakening
14 C is a lower neighbor of D if C ⊏T D and there is no E such that C ⊏T E ⊏T D.
relation, namely ≻ sub, takes a concept inclusion C ⊑ D and weakens it to a
concept inclusion C ⊑ E where D ⊏∅ E and such that C ⊑ E does not entail
C ⊑ D. A so-called maximally strong weakening is, put simply, a weakening that
loses a minimal amount of information, see Definition 17 in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] for details.
      </p>
      <p>
        According to Proposition 18 in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], maximally strong weakenings of a
concept inclusion C ⊑ D w.r.t. ≻ sub can be efectively computed by a breadth-first
search, namely by traversing the EL subsumption hierarchy above D (all
subsumers of D) by means of the neighborhood relation ≺ ∅. As already pointed out
after Corollary 25 in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], the search tree has (n + 1)-fold exponential size where n
is the role depth of D. Now Proposition 14 yields that this search tree can have
n-fold exponential depth — more specifically, if C ⊑ ⊤ is the maximally strong
weakening of C ⊑ ∃ r1. · · · ∃ rn. (A1 ⊓· · ·⊓ Ak), then computing it by means of the
procedure in Proposition 18 in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] needs n-fold exponential time. Thus, in order
to utilize the weakening relation ≻ sub in implementations, more sophisticated
methods for computing the maximally strong weakenings must be developed.
6
      </p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>We have analyzed the EL subsumption hierarchy and, in particular, we have
showed how smallest steps can be made when navigating within this hierarchy.
Such a smallest step is either going up to an upper neighbor or going down
to a lower neighbor. We have explained how all neighbors of a given concept
can be computed and we have determined the computational complexity: all
upper neighbors can be obtained in polynomial time, while enumerating all lower
neighbors needs exponential time. By employing a standard construction from
Lattice Theory, we have devised a distance measure (metric) on the set of all EL
concepts. We have further seen that the EL subsumption hierarchy contains very
long chains, since the distance between supposedly simple concepts can easily be
multi-exponential — specifically, the distance between ⊤ and ∃ r1. · · · ∃ rn. (A1 ⊓
· · · ⊓ Ak) is n-fold exponential if k ≥ 3 — which directly prohibits its practical
usage. Additionally, we have given some applications and consequences of the
aforementioned results.</p>
      <p>
        In this article, we have looked at subsumption w.r.t. the empty TBox only.
Other types of TBoxes (cycle-restricted, acyclic, general) as well as two
extensions of EL (with ⊥, with greatest fixed-points) are considered in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Future
research could investigate more expressive DLs. First investigations show that
similar characterizations of upper and lower neighbors can be developed for FLE.
Since within FLE each EL concept has only EL concepts as subsumers, we
immediately obtain that also the FLE subsumption hierarchy must contain chains
of multi-exponential length.
      </p>
      <p>Acknowledgements. The author gratefully thanks both Franz Baader and
Bernhard Ganter for helpful discussions. The author further greatly appreciates
Franz Baader’s valuable comments that helped to improve this article. Also, the
author thanks the anonymous reviewers for their comments and questions.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gil</surname>
            ,
            <given-names>O.F.</given-names>
          </string-name>
          :
          <article-title>Decidability and Complexity of Threshold Description Logics induced by Concept Similarity Measures</article-title>
          . In: Seafh,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Penzenstadler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Alves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Peng</surname>
          </string-name>
          ,
          <string-name>
            <surname>X</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the Symposium on Applied Computing, SAC</source>
          <year>2017</year>
          , Marrakech, Morocco, April 3-
          <issue>7</issue>
          ,
          <year>2017</year>
          . pp.
          <fpage>983</fpage>
          -
          <lpage>988</lpage>
          . ACM (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kriegel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nuradiansyah</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Privacy-Preserving Ontology Publishing for EL Instance Stores</article-title>
          . In: Calimeri,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Leone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Manna</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <source>(eds.) 16th European Conference on Logics in Artificial Intelligence, JELIA</source>
          <year>2019</year>
          , Rende, Italy, May 7-
          <issue>11</issue>
          ,
          <year>2019</year>
          ,
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>11468</volume>
          , pp.
          <fpage>323</fpage>
          -
          <lpage>338</lpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kriegel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nuradiansyah</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peñaloza</surname>
          </string-name>
          , R.:
          <article-title>Making Repairs in Description Logics More Gentle</article-title>
          . In: Thielscher,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Toni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Wolter</surname>
          </string-name>
          ,
          <string-name>
            <surname>F</surname>
          </string-name>
          . (eds.)
          <source>Principles of Knowledge Representation and Reasoning: Proceedings of the Sixteenth International Conference, KR</source>
          <year>2018</year>
          , Tempe, Arizona,
          <volume>30</volume>
          <fpage>October</fpage>
          - 2
          <source>November</source>
          <year>2018</year>
          . pp.
          <fpage>319</fpage>
          -
          <lpage>328</lpage>
          . AAAI Press (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Küsters</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Molitor</surname>
          </string-name>
          , R.:
          <article-title>Computing Least Common Subsumers in Description Logics with Existential Restrictions</article-title>
          . In: Dean,
          <string-name>
            <surname>T</surname>
          </string-name>
          . (ed.)
          <source>Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, IJCAI 99</source>
          , Stockholm, Sweden,
          <source>July 31 - August 6</source>
          ,
          <year>1999</year>
          . 2 Volumes, 1450 pages. pp.
          <fpage>96</fpage>
          -
          <lpage>103</lpage>
          . Morgan Kaufmann (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morawska</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Unification in the Description Logic EL</article-title>
          .
          <source>Log. Methods Comput. Sci. 6</source>
          (
          <issue>3</issue>
          ) (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Birkhof</surname>
          </string-name>
          , G.:
          <article-title>Lattice Theory, Colloquium Publications</article-title>
          , vol.
          <volume>25</volume>
          . American Mathematical Society, Providence, RI, USA (
          <year>1940</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Borgida</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walsh</surname>
            ,
            <given-names>T.J.</given-names>
          </string-name>
          , Hirsh, H.:
          <article-title>Towards Measuring Similarity in Description Logics</article-title>
          . In: Horrocks,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            ,
            <surname>Wolter</surname>
          </string-name>
          ,
          <string-name>
            <surname>F</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 2005 International Workshop on Description Logics (DL2005)</source>
          , Edinburgh, Scotland,
          <string-name>
            <surname>UK</surname>
          </string-name>
          ,
          <source>July 26-28</source>
          ,
          <year>2005</year>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>147</volume>
          .
          <string-name>
            <surname>CEUR-WS.org</surname>
          </string-name>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Confalonieri</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galliani</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Porello</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Righetti</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Troquard</surname>
          </string-name>
          , N.:
          <article-title>Towards Even More Irresistible Axiom Weakening</article-title>
          . In: Borgwardt, S., Meyer, T. (eds.)
          <source>Proceedings of the 33rd International Workshop on Description Logics (DL</source>
          <year>2020</year>
          )
          <article-title>co-located with the 17th International Conference on Principles of Knowledge Representation and Reasoning (KR</article-title>
          <year>2020</year>
          ), Online Event [Rhodes, Greece],
          <source>September 12th to 14th</source>
          ,
          <year>2020</year>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>2663</volume>
          . CEURWS.org (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staab</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fanizzi</surname>
          </string-name>
          , N.:
          <article-title>On the Influence of Description Logics Ontologies on Conceptual Similarity</article-title>
          . In: Gangemi,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Euzenat</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <article-title>Knowledge Engineering: Practice and Patterns</article-title>
          , 16th International Conference, EKAW 2008, Acitrezza, Italy,
          <source>September 29 - October 2</source>
          ,
          <year>2008</year>
          .
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>5268</volume>
          , pp.
          <fpage>48</fpage>
          -
          <lpage>63</lpage>
          . Springer (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Distel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Atif</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bloch</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Concept Dissimilarity with Triangle Inequality</article-title>
          . In: Baral,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Giacomo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.D.</given-names>
            ,
            <surname>Eiter</surname>
          </string-name>
          , T. (eds.)
          <source>Principles of Knowledge Representation and Reasoning: Proceedings of the Fourteenth International Conference, KR 2014</source>
          , Vienna, Austria,
          <source>July 20-24</source>
          ,
          <year>2014</year>
          . AAAI Press (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Du</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>A Practical Fine-grained Approach to Resolving Incoherent OWL 2 DL Terminologies</article-title>
          . In: Li,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.S.</given-names>
            ,
            <surname>Garofalakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.N.</given-names>
            ,
            <surname>Soborof</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Suel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Wang</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management</source>
          ,
          <string-name>
            <surname>CIKM</surname>
          </string-name>
          <year>2014</year>
          , Shanghai, China, November 3-
          <issue>7</issue>
          ,
          <year>2014</year>
          . pp.
          <fpage>919</fpage>
          -
          <lpage>928</lpage>
          . ACM (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Ganter</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Personal communication (</article-title>
          <year>April 2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Ganter</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wille</surname>
          </string-name>
          , R.:
          <source>Formal Concept Analysis - Mathematical Foundations</source>
          . Springer (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Horridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Laconic and precise justifications in OWL</article-title>
          . In: Sheth,
          <string-name>
            <given-names>A.P.</given-names>
            ,
            <surname>Staab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Dean</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Paolucci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Maynard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Finin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.W.</given-names>
            ,
            <surname>Thirunarayan</surname>
          </string-name>
          ,
          <string-name>
            <surname>K</surname>
          </string-name>
          . (eds.)
          <source>The Semantic Web - ISWC</source>
          <year>2008</year>
          , 7th International Semantic Web Conference,
          <string-name>
            <surname>ISWC</surname>
          </string-name>
          <year>2008</year>
          , Karlsruhe, Germany,
          <source>October 26-30</source>
          ,
          <year>2008</year>
          .
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>5318</volume>
          , pp.
          <fpage>323</fpage>
          -
          <lpage>338</lpage>
          . Springer (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kriegel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>The Distributive, Graded Lattice of EL Concept Descriptions and its Neighborhood Relation</article-title>
          . In: Ignatov,
          <string-name>
            <given-names>D.I.</given-names>
            ,
            <surname>Nourine</surname>
          </string-name>
          ,
          <string-name>
            <surname>L</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the Fourteenth International Conference on Concept Lattices and Their Applications</source>
          ,
          <source>CLA</source>
          <year>2018</year>
          , Olomouc, Czech Republic, June 12-14,
          <year>2018</year>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>2123</volume>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>278</lpage>
          . CEUR-WS.org (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Kriegel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Constructing and Extending Description Logic Ontologies using Methods of Formal Concept Analysis</article-title>
          .
          <source>Doctoral thesis</source>
          , Technische Universität Dresden, Dresden, Germany (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Küsters</surname>
          </string-name>
          , R.:
          <source>Non-Standard Inferences in Description Logics, Lecture Notes in Computer Science</source>
          , vol.
          <volume>2100</volume>
          . Springer (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>van der Laag</surname>
            ,
            <given-names>P.R.J.</given-names>
          </string-name>
          , Nienhuys-Cheng, S.:
          <article-title>Existence and Nonexistence of Complete Refinement Operators</article-title>
          . In: Bergadano,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Raedt</surname>
          </string-name>
          , L.D. (eds.)
          <source>Machine Learning: ECML-94, European Conference on Machine Learning, Catania, Italy, April 6- 8</source>
          ,
          <year>1994</year>
          ,
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>784</volume>
          , pp.
          <fpage>307</fpage>
          -
          <lpage>322</lpage>
          . Springer (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Lam</surname>
            ,
            <given-names>J.S.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sleeman</surname>
            ,
            <given-names>D.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasconcelos</surname>
            ,
            <given-names>W.W.:</given-names>
          </string-name>
          <article-title>A fine-grained approach to resolving unsatisfiable ontologies</article-title>
          .
          <source>J. Data Semant</source>
          .
          <volume>10</volume>
          ,
          <fpage>62</fpage>
          -
          <lpage>95</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Lehmann</surname>
          </string-name>
          , J.:
          <source>Learning OWL Class Expressions, Studies on the Semantic Web</source>
          , vol.
          <volume>6</volume>
          . IOS Press (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haase</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Ideal Downward Refinement in the EL Description Logic</article-title>
          . In: Raedt, L.D. (ed.)
          <source>Inductive Logic Programming</source>
          , 19th International Conference, ILP 2009, Leuven, Belgium,
          <source>July 02-04</source>
          ,
          <year>2009</year>
          .
          <source>Revised Papers. Lecture Notes in Computer Science</source>
          , vol.
          <volume>5989</volume>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>87</lpage>
          . Springer (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turhan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A Framework for Semantic-Based Similarity Measures for ELH-Concepts</article-title>
          .
          <source>In: del Cerro</source>
          ,
          <string-name>
            <given-names>L.F.</given-names>
            ,
            <surname>Herzig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Mengin</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>Logics in Artificial Intelligence - 13th European Conference, JELIA 2012</source>
          , Toulouse, France,
          <source>September 26-28</source>
          ,
          <year>2012</year>
          .
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>7519</volume>
          , pp.
          <fpage>307</fpage>
          -
          <lpage>319</lpage>
          . Springer (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zakharyaschev</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Reasoning about Concepts and Similarity</article-title>
          . In: Calvanese,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Giacomo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.D.</given-names>
            ,
            <surname>Franconi</surname>
          </string-name>
          , E. (eds.)
          <source>Proceedings of the 2003 International Workshop on Description Logics (DL2003)</source>
          , Rome,
          <source>Italy September 5-7</source>
          ,
          <year>2003</year>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>81</volume>
          .
          <string-name>
            <surname>CEUR-WS.org</surname>
          </string-name>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Papadimitriou</surname>
            ,
            <given-names>C.H.: Computational</given-names>
          </string-name>
          <string-name>
            <surname>Complexity. Addison-Wesley</surname>
          </string-name>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Sánchez-Ruiz-Granados</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ontañón</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>González-Calero</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plaza</surname>
          </string-name>
          , E.:
          <article-title>Measuring Similarity in Description Logics Using Refinement Operators</article-title>
          . In: Ram,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Wiratunga</surname>
          </string-name>
          , N. (eds.)
          <source>Case-Based Reasoning Research and Development - 19th International Conference on Case-Based Reasoning, ICCBR</source>
          <year>2011</year>
          , London, UK,
          <source>September 12-15</source>
          ,
          <year>2011</year>
          .
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>6880</volume>
          , pp.
          <fpage>289</fpage>
          -
          <lpage>303</lpage>
          . Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Sánchez-Ruiz-Granados</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ontañón</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>González-Calero</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plaza</surname>
          </string-name>
          , E.:
          <article-title>Refinement-Based Similarity Measure over DL Conjunctive Queries</article-title>
          . In: Delany,
          <string-name>
            <given-names>S.J.</given-names>
            ,
            <surname>Ontañón</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          <source>(eds.) Case-Based Reasoning Research and Development - 21st International Conference, ICCBR</source>
          <year>2013</year>
          ,
          <string-name>
            <surname>Saratoga</surname>
            <given-names>Springs</given-names>
          </string-name>
          ,
          <string-name>
            <surname>NY</surname>
          </string-name>
          , USA, July
          <volume>8</volume>
          -
          <issue>11</issue>
          ,
          <year>2013</year>
          .
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>7969</volume>
          , pp.
          <fpage>270</fpage>
          -
          <lpage>284</lpage>
          . Springer (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Shapiro</surname>
            ,
            <given-names>E.Y.</given-names>
          </string-name>
          :
          <article-title>An Algorithm that Infers Theories from Facts</article-title>
          . In: Hayes, P.J. (ed.)
          <source>Proceedings of the 7th International Joint Conference on Artificial Intelligence, IJCAI '81</source>
          , Vancouver, BC, Canada,
          <source>August 24-28</source>
          ,
          <year>1981</year>
          . pp.
          <fpage>446</fpage>
          -
          <lpage>451</lpage>
          . William Kaufmann (
          <year>1981</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Troquard</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Confalonieri</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galliani</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peñaloza</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Porello</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Repairing Ontologies via Axiom Weakening</article-title>
          . In: McIlraith,
          <string-name>
            <given-names>S.A.</given-names>
            ,
            <surname>Weinberger</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.Q</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence</source>
          ,
          <source>(AAAI-18)</source>
          ,
          <source>the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18)</source>
          , New Orleans, Louisiana, USA, February 2-
          <issue>7</issue>
          ,
          <year>2018</year>
          . pp.
          <fpage>1981</fpage>
          -
          <lpage>1988</lpage>
          . AAAI Press (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>