<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Exploiting Semantic Treewidth for Graph Queries Evaluation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Cristina Feier</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tomasz Gogacz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Filip Murlak</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Warsaw</institution>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Conjunctive two-way regular path queries (C2RPQs) are a common abstraction of the core of query languages for graph databases, much like conjunctive queries (CQs) in the relational case. As in the case of CQs, their evaluation is NP-complete. Also, similarly to the CQ case, existing work on eficient evaluation showed that bounded semantic treewidth (TW) is a suficient condition for fixed-parameter tractable (fpt) evaluation. This has been achieved by providing witnesses for bounded semantic TW, i.e., equivalent queries of bounded syntactic TW. In subsequent steps, a witness of TW up to twice the semantic TW of the query has been constructed, followed more recently by a witness of TW equal to the semantic TW of the query. Both witnesses can be exploited to obtain fpt evaluation algorithms, the latter giving better data complexity due to the optimal treewidth. However, while the size of the suboptimal-TW witness is exponential in the size of the query, the size of the optimal-TW witness is doubly exponential, which leads to an evaluation algorithm doubly exponential in the size of the query. We show that the additional blow-up in combined complexity can be avoided by exploiting the connection between the two witnesses. We devise an evaluation algorithm that fully exploits the equivalent witness of minimal TW without actually computing it, and runs in time singly exponential in the size of the query.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;conjunctive two-way regular path queries</kwd>
        <kwd>fixed-parameter tractable evaluation</kwd>
        <kwd>semantic treewidth</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Graph databases are nowadays mainstream [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] in a wide range of application domains, including
social networks, fraud detection, biological networks, bioinformatics, cheminformatics, medical
data, and knowledge management [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. While for relational databases conjunctive queries (CQs)
are a prèmiere abstract query language, graph databases are typically queried using conjunctive
(two-way) regular path queries (C2RPQs) which generalize conjunctive queries by replacing
atoms with (two-way) regular path queries (2RPQs) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The complexity of evaluating C2RPQs is
the same as for CQs: NP-complete.
      </p>
      <p>
        In the case of CQs, there is a long line of research concerning eficient evaluation. This spans
from the well-known polynomial time Yannakakis’ algorithm for evaluating acyclic CQs [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] to
tractability results for queries of bounded treewidth [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], bounded (fractional) hypertreewidth
[
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ], and complete characterizations of fixed-paramater tractability in the bounded [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and
unbounded arity setting [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ]. It turns out that for such characterizations, semantic measures
play an important role: these are structural measures, like treewidth (TW) or submodular width,
modulo query equivalence.
      </p>
      <p>
        In the context of the semantic TW of C2RPQs, Romero, Barcelo, and Vardi introduced two
notions of equivalence of C2RPQs [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]: one based on homomorphisms, and another based on
logical equivalence. For the homomorphism-based notion, C2RPQs of bounded semantic TW
are tractable, but the techniques used to show tractability in this case, based on existential
pebble games [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], are no longer applicable in the logical equivalence setting [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. However,
in the latter setting, it is shown that C2RPQs of bounded semantic TW are fixed parameter
tractable (fpt) by computing an actual witness, i.e. an equivalent query of bounded TW. The size
of this query is exponential in the size of the original query Φ , however its TW is not optimal: it
can be up to 2 + 1, when the semantic TW of Φ is . This leads to an algorithm for evaluating
C2RPQs of semantic TW  which runs in time ( (|Φ |)||2+2), with  being an exponential
function.
      </p>
      <p>It remained open how to decide semantic TW of C2RPQs under the logical equivalence
notion, and, in particular, how to construct a witness of optimal TW. This has been settled
recently by Figueira and Morvan [13], by constructing a witness for semantic TW of size doubly
exponential in the size of the original query. This leads to an algorithm for evaluating C2RPQs of
semantic TW  which runs in time ( (Φ) ||+1), with  being a doubly exponential function.
While this is a significant improvement in data complexity compared to existing algorithms,
the algorithm is impractical due to its high combined complexity.</p>
      <p>Here we describe a more eficient algorithm for evaluating C2RPQs of semantic treewidth
 which runs in time ((|Φ |)||+1), where  is an exponential function. We observe that
the TW- witness query from [13] can be seen as a specialization of the TW-(2 + 1) query
from [14]. This enables us to encode the evaluation of the TW- witness query into a Datalog
program of width  + 1 without explicitly constructing the query. As the size of the Datalog
program is exponential in the size of the original query, we obtain the desired result.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Preliminaries</title>
      <p>
        We assume familiarity with CQs, databases, treewidth, pathwidth, Datalog, and non-deterministic
ifnite automata (NFA). We note that every CQ  of TW  can be evaluated over database  in
time ((||)||+1), where  is a polynomial [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Also, the width of a Datalog program Π is
the maximum number of variables occurring in a rule in Π . Every such program Π of width 
can be evaluated in time ((|Π |)||+1), where  is some polynomial.
      </p>
      <p>Let us fix a countable alphabet Σ . A graph database  over Σ is a finite directed graph
with edges labeled with symbols from Σ . A path  in a graph database is a sequence (1 →−1
2 . . .  →− +1). The label of  as above, denoted  (), is the word 1 . . .  from Σ * .</p>
      <p>A regular path query (RPQ) is a query of the form (, ) where  is a regular language over
Σ , expressed as an NFA. Assuming  and ′ are states of the NFA , [, ′] is the NFA obtained
from  by having  as initial state and ′ as a unique final state. For a graph database  and
nodes ,  in ,  |= (, ) if there exists a path  in  from  to  such that  () ∈ . When
 is over the extended alphabet Σ ± = Σ ∪ {− |  ∈ Σ }, we say that (, ) is a two-way RPQ
(2RPQ); it is evaluated over the completion ± of  with edges of the form →− − − , whenever
→−   ∈ .</p>
      <p>A Boolean conjunctive (two-way) regular path query, abbreviated as C(2)RPQ, is a query of
the form  = ∃z ⋀︀1≤ ≤  (, ) where each (, ) is a (2)RPQ and z is the set of variables
occurring in the query. We write  |=  if there is a mapping ℎ : z → dom() such that
 |= (ℎ(), ℎ()), for every 1 ≤  ≤ . Unions of C(2)RPQs, abbreviated as UC(2)RPQs, as
well as satisfaction of UC(2)RPQs and containment (⊆ ) of (U)C(2)RPQs are defined as expected.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Witnesses for Bounded Semantic Treewidth</title>
      <p>
        In this section, we provide an overview of the witness queries from [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and the ones from [13].
We begin with a definition.
      </p>
      <p>Definition 1. A UC2RPQ Φ ′ is a TW- approximation of a C2RPQ Φ if: (i) Φ ′ has TW ,
(ii) Φ ′ ⊆ Φ , and (iii) there is no UC2RPQ Φ ′′ of TW  such that Φ ′ ⊂ Φ ′′ ⊆ Φ .</p>
      <p>In the limit case, when Φ has semantic TW , a TW- approximation is equivalent to Φ and
thus a witness for semantic TW. The following lemma describes a suficient condition for a
TW- query to be an approximation.</p>
      <p>Lemma 1. Let Φ be a C2RPQ and Φ ′ be a TW- UC2RPQ s.t. Φ ′ ⊆ Φ and Φ ′ is equivalent to Φ
on TW- databases. Then Φ ′ is a TW- approximation of Φ .</p>
      <p>
        In the spirit of Lemma 1, the approach from [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] constructs a witness Φ  for bounded
semantic TW of Φ , by considering all C2RPQs induced by mappings of Φ into TW- databases
. For every such mapping, a set of relevant bags in  (up to 2|Φ |) is identified, and one
considers all intersection points of images of atoms in Φ with nodes from these bags. Recall that
the image of an atom is a path in : such images of atoms are marked with green and blue in
Figure 1). These intersection points induce splittings of atoms (, ) in Φ into sequences of
atoms of the form [0, 1](0, 1), . . . , [− 1, +1](− 1, ), where 0 = ,  = , and
0 and  are the initial state and some final state of , respectively. In a subsequent step, all
variables of the new and old atoms which map to the same database element are identified. Φ 
is defined as the union of all C2RPQs obtained by the above procedure; see Figure 1 (left).
      </p>
      <p>As explained in the introduction, Φ  has TW up to 2 + 1: this is due to the fact that each
of its C2RPQs has as the underlying graph a pseudo-tree decomposition of width , i.e. a tree
decomposition from which some non-branching nodes are removed and the remaining nodes
are re-connected via new atoms. We will refer to such a sub-query induced by two bags in a
tree decomposition and some interconnecting atoms as a segment.</p>
      <p>The UC2RPQ Φ  constructed in [13] as a witness of semantic TW can be seen as a
specialization of the query Φ  in the sense that atoms connecting endpoints of segments in C2RPQs in
Φ  are replaced by actual queries of pathwidth  (see Figure 1, middle), thus recovering TW  of
the witness query. This is achieved by first considering the infinitary UC2RPQ which contains
all C2RPQs induced by mappings of Φ into a TW- database (this time, all elements of  are
considered relevant and induce splittings and variable identifications in Φ ). Clearly, this query
is a specialization of Φ  in the sense described above. Then, in a second step, using a pumping
argument, it can be shown that it is enough to consider C2RPQs with segment realizations up
to a certain size (exponential in Φ ).</p>
      <p>As the size of Φ  is exponential in |Φ | and the size of Φ  is doubly exponential in |Φ |, and
each C2RPQ can be evaluated by first materializing (in polynomial time) each 2RPQ in the
database and then simply regarding the query as a CQ over the materialized database, one
obtains the fpt algorithms with the complexities mentioned in the introduction.</p>
    </sec>
    <sec id="sec-4">
      <title>4. The algorithm</title>
      <p>Our algorithm for eficient evaluation of C2RPQs of semantic TW  is based on evaluating Φ 
without actually computing it. This is possible due to the fact that for queries of semantic TW ,
Φ  ≡ Φ  and each segment query from Φ  is equivalent to the union of all of its realizations
in some C2RPQ in Φ . Under this assumption, we can actually evaluate Φ  instead of Φ . As
explained in Section 3, the realization of a segment from Φ  in Φ  is a query of pathwidth .
Each bag from such a path query can be seen as having a certain type induced by atoms which
cross it, i.e. atoms for which at least one of the arguments belongs to the bag. The important
thing is that for each atom (, ) in the original query Φ , there is at most one atom of the form
[1, 2](′, ′) that crosses such a bag (derived from a splitting of the original atom). Thus, we
can type each bag based on the signature of such atoms. There is an exponential number of
types and a natural notion of bags/type compatibility: Figure 1 (right) depicts how two bags
with compatible types are matched in a segment. In this view, each segment query from Φ 
can be seen as a reachability query between two ( + 1)-types and thus can be encoded using
Datalog rules with at most  + 1 variables.</p>
      <p>
        For joining the segments in a C2RPQ of Φ , the algorithm performs bottom-up evaluation.
On an abstract level, it can be seen as a Yannakakis-style procedure [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], in which we have
oracles to compute the upper end of a segment given its lower end. Again, this is easy to capture
using ( + 1)-Datalog rules. We obtain a Datalog program Π of exponential size (exponential
number of rules) and of width  + 1 which is equivalent to Φ . This proves our main result.
Theorem 1. Every C2RPQ Φ of semantic TW  can be evaluated in time ( (|Φ |)||+1), where
 is a singly exponential function.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Outlook</title>
      <p>There are several open questions regarding eficient evaluation of C2RPQs. The first one
concerns the precise complexity of deciding semantic treewidth: for now it is known that it is
ExpSpace-hard and in 2ExpSpace. Another major step would be achieving a full characterisation
of fixed parameter tractability of UC2RPQs, in particular establishing lower bounds.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>Supported by Poland’s NCN grant 2018/30/E/ST6/00042.
[13] D. Figueira, R. Morvan, Approximation and semantic tree-width of conjunctive regular
path queries, in: ICDT, volume 255 of LIPIcs, Schloss Dagstuhl - Leibniz-Zentrum für
Informatik, 2023, pp. 15:1–15:19.
[14] P. Barceló, M. Romero, M. Y. Vardi, Semantic acyclicity on graph databases, SIAM Journal
on Computing 45 (2016) 1339–1376.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sakr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bonifati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Voigt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Iosup</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Ammar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Angles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Aref</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Arenas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Besta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Boncz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Daudjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. D.</given-names>
            <surname>Valle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dumbrava</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Hartig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Haslhofer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hegeman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hidders</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Hose</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Iamnitchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kalavri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kapp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Martens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Özsu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Peukert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Plantikow</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Ripeanu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Salihoglu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Schulz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Selmer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. F.</given-names>
            <surname>Sequeda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Shinavier</surname>
          </string-name>
          , G. Szárnyas,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tommasini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tumeo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Uta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Varbanescu</surname>
          </string-name>
          , H.
          <string-name>
            <surname>-Y. Wu</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Yakovets</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Yan</surname>
            ,
            <given-names>E. Yoneki,</given-names>
          </string-name>
          <article-title>The future is big graphs: A community view on graph processing systems</article-title>
          ,
          <source>Commun. ACM</source>
          <volume>64</volume>
          (
          <year>2021</year>
          )
          <fpage>62</fpage>
          -
          <lpage>71</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Angles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gutierrez</surname>
          </string-name>
          ,
          <article-title>Survey of graph database models</article-title>
          ,
          <source>ACM Comput. Surv</source>
          .
          <volume>40</volume>
          (
          <year>2008</year>
          ) 1:
          <fpage>1</fpage>
          -
          <lpage>1</lpage>
          :
          <fpage>39</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Mendelzon</surname>
          </string-name>
          , P. T. Wood,
          <article-title>Finding regular simple paths in graph databases</article-title>
          ,
          <source>SIAM Journal on Computing</source>
          <volume>24</volume>
          (
          <year>1995</year>
          )
          <fpage>1235</fpage>
          -
          <lpage>1258</lpage>
          . doi:
          <volume>10</volume>
          .1137/S009753979122370X.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Yannakakis</surname>
          </string-name>
          ,
          <article-title>Algorithms for acyclic database schemes</article-title>
          ,
          <source>in: VLDB</source>
          ,
          <year>1981</year>
          , pp.
          <fpage>82</fpage>
          -
          <lpage>94</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Chekuri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rajaraman</surname>
          </string-name>
          ,
          <article-title>Conjunctive query containment revisited</article-title>
          ,
          <source>Theor. Comput. Sci</source>
          .
          <volume>239</volume>
          (
          <year>2000</year>
          )
          <fpage>211</fpage>
          -
          <lpage>229</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Gottlob</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Leone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Scarcello</surname>
          </string-name>
          ,
          <article-title>Hypertree decompositions and tractable queries</article-title>
          ,
          <source>Journal of Computer and System Sciences</source>
          <volume>64</volume>
          (
          <year>2002</year>
          )
          <fpage>579</fpage>
          -
          <lpage>627</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Grohe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Marx</surname>
          </string-name>
          ,
          <article-title>Constraint solving via fractional edge covers</article-title>
          ,
          <source>ACM Trans. Algorithms</source>
          <volume>11</volume>
          (
          <year>2014</year>
          ) 4:
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          :
          <fpage>20</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Grohe</surname>
          </string-name>
          ,
          <article-title>The complexity of homomorphism and constraint satisfaction problems seen from the other side</article-title>
          ,
          <source>J. ACM</source>
          <volume>54</volume>
          (
          <year>2007</year>
          ) 1:
          <fpage>1</fpage>
          -
          <lpage>1</lpage>
          :
          <fpage>24</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.</given-names>
            <surname>Marx</surname>
          </string-name>
          ,
          <article-title>Tractable hypergraph properties for constraint satisfaction and conjunctive queries</article-title>
          ,
          <source>in: STOC</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>735</fpage>
          -
          <lpage>744</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>H.</given-names>
            <surname>Chen</surname>
          </string-name>
          , G. Gottlob,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lanzinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Pichler</surname>
          </string-name>
          ,
          <article-title>Semantic width and the fixed-parameter tractability of constraint satisfaction problems</article-title>
          , in: C.
          <string-name>
            <surname>Bessiere</surname>
          </string-name>
          (Ed.), IJCAI,
          <year>2020</year>
          , pp.
          <fpage>1726</fpage>
          -
          <lpage>1733</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Romero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Barceló</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Y.</given-names>
            <surname>Vardi</surname>
          </string-name>
          ,
          <article-title>The homomorphism problem for regular graph patterns</article-title>
          ,
          <source>in: 2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kolaitis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vardi</surname>
          </string-name>
          ,
          <article-title>On the expressive power of datalog: Tools and a case study</article-title>
          ,
          <source>Journal of Computer and System Sciences</source>
          <volume>51</volume>
          (
          <year>1995</year>
          )
          <fpage>110</fpage>
          -
          <lpage>134</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>