<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Deciding the logical di erence problem for E L with role inclusions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Daniel Pokrywczynski</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dirk Walther</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Liverpool</institution>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We consider the logical di erence problem for terminologies that are formulated in the lightweight description logic EL with role inclusions for role hierarchies, transitivity, and right-identity. The main result is that deciding whether two terminologies are logically di erent wrt. a signature can be done in ExpTime, thus it is more di cult than the subsumption problem for this logic but not more di cult than deciding logical di erence without role inclusions. This paper extends the result for EL by Lutz and Wolter [11].</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The second ontology T 0 contains the axioms:</p>
      <sec id="sec-1-1">
        <title>ToeNail v 9isPartOf.Toe Toe v 9isPartOf.Foot</title>
      </sec>
      <sec id="sec-1-2">
        <title>9isPartOf.Foot v 9isPartOf.Leg</title>
        <p>then the shared signature would additionally include the symbol Leg. In this
case, T does not -entail T 0 anymore.</p>
        <p>
          Logical di erence is a variation of the notion of (deductive) conservative
extensions [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. More precisely, for two ontologies T T 0 and a signature ,
we have that T -entails T 0 if, and only if, T 0 is a conservative extension of
T wrt. . Conservative extensions are an important notion in ontology design
and integration. In particular, conservative extensions can be used to formalize
independent modules inside an ontology [
          <xref ref-type="bibr" rid="ref10 ref6">6, 10</xref>
          ].
        </p>
        <p>
          There are several important life science ontologies formulated in lightweight
description logics such as E L or mild extension thereof, e.g., E L with role
inclusion axioms. In particular, role inclusion axioms expressing role hierarchies,
transitive roles, and right-identity are of practical importance, e.g. in medical
terminologies [
          <xref ref-type="bibr" rid="ref16 ref8">8, 16</xref>
          ]. For instance, right-identity axioms have been proven useful
for expressing \propagation" of one property along another one. An example of a
large ontology deploying role inclusion axioms is the Systematized Nomenclature
of Medicine, Clinical Terms (Snomed ct), which contains 0.4 million axioms
and underlies the systematized medical terminology used in health systems of
the US, the UK, and other countries [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. This ontology consists of an acyclic
E L-terminology with role hierarchy, right-identity but no transitive roles. Other
ontologies which have large parts formulated in E L with role inclusions are the
National Cancer Institute (NCI) Ontology [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], the Gene Ontology (GO) [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ],
which uses a single transitive role `part of', and the Galen Common Reference
Model [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], which can be expressed in an extension of E L with functional and
inverse roles [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. One of the reasons why E L and its extensions are quite appealing
as ontology languages is that reasoning is tractable [
          <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
          ].
        </p>
        <p>The following example illustrates how propagation can be expressed using
role inclusions. Take T 00 to be the extension of the ontology T above with the
two role inclusion axioms expressing right-identity of the role hasLocation wrt.
the role isPartOf and transitivity of isPartOf:
hasLocation isPartOf v hasLocation</p>
        <p>isPartOf isPartOf v isPartOf
The fact that a toe is injured can be expressed as Injury u 9hasLocation.Toe. In
a medical context, it might be desirable to propagate a property such as being
located at a toe along partonomic properties of the toe. For instance, being
located at the toe also means being located at the leg. In the presence of T 00,
we can derive that a toe is a part of a leg using the transitivity of isPartOf:
Toe v 9isPartOf.Leg. Using the role inclusion axiom for right-identity, we can
then derive from a toe injury that also the leg is injured: Injuryu9hasLocation.Leg.</p>
        <p>
          In this paper, we consider ontologies formulated as general TBoxes in the
description logic E L allowing for additional role inclusion axioms of the form
r v s (role hierarchy ), r r v r (transitivity ) and s r v s (right-identity ).
The main result states that the logical di erence problem for such ontologies
can be decided in ExpTime. Thus, this problem is no more complex than for
plain E L, for which it was shown to be ExpTime-complete [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. For comparison,
the computational complexity of -entailment is 2ExpTime-complete for more
expressive description logics such as ALC, ALCQ, and ALCQI [
          <xref ref-type="bibr" rid="ref10 ref5">5, 10</xref>
          ], but even
in such simple formalisms as acyclic propositional Horn Logic deciding logical
di erence is co-NP-complete [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. In contrast, the satis ability problem for E L
with the role inclusions mentioned above was shown to be decidable in
polynomial time [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], and ALCQI satis ability relative to TBoxes is decidable in
ExpTime [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Thus, for these logics, deciding logical di erence is by at least
one exponential harder than satis ability.
        </p>
        <p>
          The presented decision procedure decides non- -entailment by searching for
the existence of a concept inclusion witnessing the logical di erence between the
input ontologies. We show that it is su cient to only search for a succinct
representation of a concept that occurs at the left-hand side of such concept inclusions.
Then, the ontologies are logically di erent if, and only if, such a representation
of a concept was found. Computing a list of logical di erences between
ontologies, however, is a harder problem. As it was observed in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], concept inclusions
witnessing logical di erences can be of at least doubly exponential size even for
E L ontologies without role inclusion axioms. When placing some restrictions on
the considered E L ontologies, the computational complexity of computing logical
di erences can be reduced to tractable as it is shown in [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>The paper is organized as follows. We start with de ning E L with role
inclusions in the next section. In Section 3, we state the de nitions for the notions of
logical di erence and -entailment and present some illustrating examples. In
Section 4, we describe canonical models for E L with role inclusions and
simulation relations between them. Then these notions will be used to give a
characterization of -entailment for constraint boxes in Section 5. The algorithm deciding
non- -entailment in exponential time is presented in Section 6 together with an
example. The nal section concludes this paper.</p>
        <p>
          The algorithm described in this paper is based on and described along the
lines of the algorithm deciding conservative extensions in E L [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. Due to space
restrictions most proofs are omitted; full proofs can be found in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
2
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>We begin with introducing the description logic E L. Let NC and NR be two
countably in nite and disjoint sets of concept names and role names, respectively.
E L-concepts are build according to this syntax rule:</p>
      <p>C ::= &gt; j A j C u D j 9r:C;
where A ranges over the concept names in NC, r over role names in NR, and C; D
over E L-concepts. The semantics of E L is de ned by means of interpretations
I = ( I ; I ), where the interpretation domain I is a non-empty set, and I
is a function mapping each concept name A to a subset AI of I , and each
role name rI to a binary relation rI I I . The function I is inductively
extended to arbitrary concepts by setting &gt;I := I , (C u D)I := CI \ DI , and
(9r:C)I := fd 2 I j there is an e 2 I such that (d; e) 2 rI and e 2 CI g.</p>
      <p>A terminology (TBox) is a nite set of concept inclusions (CIs) C v D,
where C and D are concepts. An interpretation I satis es a CI C v D, written
I j= C v D, if, and only if, CI DI . I is a model of a TBox T if, and only if,
it satis es all CIs in T . We write T j= C v D if, and only if, every model of T
satis es C v D.</p>
      <p>In this paper, we consider an extension of E L with role inclusions (RIs) of the
form r v s, r r v r or r s v r, where r; s are roles. A role box (RBox) is a nite
set of RIs. An interpretation I satis es an RI r v s (r r v r, r s v r), written
I j= r v s (I j= r r v r, I j= r s v r), if, and only if, rI sI (rI rI rI ,
rI sI rI ). We interpret the role operator ` ' as the composition of binary
relations, i.e., R S = f(d; d00) j there exists a d0 such that dRd0 and d0Sd00g, for
binary relations R and S. I is a model of an RBox R if, and only if, it satis es
all RIs in R. We write R j= r v s (R j= C v D) if, and only if, every model of
R satis es the RI r v s (the CI C v D). A constraint box (CBox) C = (T ; R)
consists of a TBox T and an RBox R. An interpretation I is a model of a CBox
C = (T ; R) if, and only if, I is a model of both T and R. We write C j= C v D
if, and only if, every model of C satis es C v D.</p>
      <p>A signature is a nite subset of NC [ NR. The signature sig(X) is the set
of concept and role names which occur in X, where X ranges over concepts C,
CIs C v D, RIs r v s, TBoxes T , RBoxes R, and CBoxes C. If sig(C) , we
also call C a -concept.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Logical di erence</title>
      <p>We de ne the notion of -entailment in terms of logical di erence wrt. a
signature for CBoxes.</p>
      <p>De nition 1 ( -di erence, -entailment). The
C0 is de ned as
-di erence between C and
Di
(C; C0) = fC v D j C 6j= C v D, C0 j= C v D, and sig(C v D)
[ Di (R; R0):
g
C
-entails C0, in short C v</p>
      <p>C0, if, and only if, Di
(C; C0) = ;.</p>
      <p>The following two examples illustrate these notions and their relation to each
other.</p>
      <p>Example 1. Let = fA; r; sg be a signature, C = (T ; R) and C0 = (T 0; R0) be
two CBoxes, where T = f&gt; v 9r:Ag, R = ;, T 0 = f&gt; v 9r:B; 9s:B v Ag, and
R0 = fr v sg. It can easily be seen that T -entails T 0 and R does not -entail
R0. But, when combining the TBoxes with the RBoxes, this yields that C does
not -entail C0. The concept inclusion &gt; v A 2 Di (C; C0) witnesses the logical
di erence between C and C0 wrt. . a
Example 2. Let = fs; s0g be a signature, and C = (T ; R) and C0 = (T 0; R0) be
two CBoxes, where T = ;, R = fs v s0g, T 0 = f&gt; v 9r:&gt;g, and R0 = fr v sg.
Then we have that T -entails T 0, and R -entails R0. However, observe that C
does not -entail C0. The logical di erence wrt. between C and C0 is witnessed
by the concept inclusion &gt; v 9s:&gt; 2 Di (C; C0). a</p>
      <p>
        As already mentioned in the introduction, the CIs witnessing the logical
di erence between CBoxes even without role inclusion axioms can be very large.
More precisely, Di (C; C0), where the RBoxes in C; C0 are empty, can contain
CIs of at least doubly exponential size; see [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] for an example.
      </p>
      <p>In the remainder of this paper, we investigate the complexity of deciding the
problem: Given two CBoxes C, C0 and a signature , does C -entail C0? We
restrict ourselves to sig(C0).
4</p>
    </sec>
    <sec id="sec-4">
      <title>Canonical models and simulation relations</title>
      <p>In this section, we construct canonical models for E L with role inclusions and
describe relations between canonical models using a simulation relation.
De nition 2 ( -Simulation). Let I1 and I2 be interpretations and a
signature. A relation S I1 I2 is a -simulation from I1 to I2 if the following
holds:
{ for all concept names A 2 and all (d1; d2) 2 S with d1 2 AI1 , d2 2 AI2 ;
{ for all role names r 2 , all (d1; d2) 2 S, and all e1 2 I1 with (d1; e1) 2
rI1 , there exists e2 2 I2 such that (d2; e2) 2 rI2 and (e1; e2) 2 S.
If d1 2 I1 ; d2 2 I2 , and there is an -simulation S from I1 to I2 with
(d1; d2) 2 S, then (I2; d2) -simulates (I1; d1), written (I1; d1) (I2; d2). If
= NC [ NR, we write ` ' instead of ` '.</p>
      <p>Let I be an interpretation, a signature, and d 2 I . We de ne the
abbreviation d ;I := fC j d 2 CI and sig(C) g. The outdegree of an interpretation
I is the the maximum number of role successors at any point in its domain and
for any role in NR. Formally, the outdegree of I is maxfjfd0 2 I j (d; d0) 2
rI gj : d 2 I ; r 2 NRg.</p>
      <p>
        The following characterization of -simulation establishes a connection
between -simulation and -concepts. The proof is standard; see, e.g., [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
Theorem 1 (Characterization of -simulation). If (I1; d1) (I2; d2),
then d1 ;I1 d2 ;I2 . Conversely, if I1; I2 have nite out-degree, and d1 ;I1
d2 ;I2 , then (I1; d1) (I2; d2).
      </p>
      <p>We use sub(C) and sub(T ) to denote the set of subconcepts of a concept C
and the set of subconcepts occurring in the TBox T , respectively.
De nition 3 (Canonical model). Let C = (T ; R) be a CBox, and D a
concept. The canonical model ID;C = ( ID;C ; ID;C ) is de ned as follows:
{</p>
      <p>ID;C = fDg [ fC j 9r:C 2 sub(D) [ sub(T )g;
{ C 2 AID;C i C j= C v A; for all A 2 NC;
{ (C; C0) 2 rID;C i one of the following holds:
(a) C j= C v 9r:C0 and C0 2 sub(T ),
(b) R j= C v 9r:C0 and C0 2 sub(C).</p>
      <p>
        The model ID;C can be constructed in polynomial time in the size of C and D
as subsumption wrt. CBoxes in EL can be decided in polynomial time [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
Example 3. For an illustration of canonical models, recall the TBox T = fToe v
9isPartOf.Foot, Foot v 9isPartOf:Legg from the introduction together with the
RBox R = fhasLocation isPartOf v hasLocationg. Figure 1 shows the canonical
model ID;C, where D = 9hasLocation:Toe and C = (T ; R). a
Toe
Leg
isPartOf
hasLocation
      </p>
      <p>Foot
hasLocation</p>
      <p>isPartOf
hasLocation</p>
      <p>Fig. 1. The canonical model ID;C.</p>
      <p>
        The following lemma summarizes the relevant properties of canonical models.
It extends similar lemmas for EL in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and it can be proven analogously. To
account for the additional role inclusions, we deploy the following notion of a
closure.
      </p>
      <p>The closure cl(C; D) of a CBox C = (T ; R) and a concept D is the smallest
set such that:
{ sub(T ) cl(C; D);
{ sub(D) cl(C; D);
{ if 9r:C 2 cl(C; D) and r v s 2 R, then 9s:C 2 cl(C; D);
{ if 9r:C 2 cl(C; D), 9s:C0 2 cl(C; C), and r s v t 2 R, then 9t:C0 2 cl(C; D).
We use cl(C) to denote the closure that satis es the rst and the last conditions.
Lemma 1 (Properties of canonical models). Let C = (T ; R) be a CBox
and C a concept. Then the following holds:
1. IC;C is a model of C.
2. For all D 2 IC;C and all E 2 cl(C; C), we have D 2 EIC;C i C j= D v E.
3. For all models I of C and all d 2 I , the following conditions are equivalent:
(a) d 2 CI ;
(b) (IC;C; C) (I; d).
4. The following conditions are equivalent:
(a) C j= C v D;
(b) C 2 DIC;C ;
(c) (ID;C; D) (IC;C; C).
5. If 9r:D 2 cl(C; Ci) for all i 2 f1; 2g, then (IC1;C; D) (IC2;C; D).</p>
    </sec>
    <sec id="sec-5">
      <title>Characterization of -entailment</title>
      <p>
        In this section, we provide a characterization of -entailment wrt. CBoxes in
terms of canonical models. The lemmas are extensions of their E L-counterparts
in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. They account for the additional role inclusion axioms, but they can be
proven in a similar way.
      </p>
      <p>We rst consider an auxiliary lemma, which we need for proving Lemma 4
below.</p>
      <p>Lemma 2. Let C = (T ; R) be a CBox. Suppose C j= C v 9r:D. Then one of
the following holds:
(a) there exists a C0 2 sub(T ) such that C j= C v 9r:C0 and C j= C0 v D;
(b) there exists a C0 2 sub(C) such that R j= C v 9r:C0 and C j= C0 v D.
Example 4. We illustrate the cases in Lemma 2. Intuitively, the distinction is
between two cases of how a concept in the context of a CBox can enforce a role
successor: (i) using TBox axioms; or (ii) without the TBox. For the former case,
let C = (T ; R) be a CBox with T = fA v 9s:B; B v B0g and R = fr s v rg.
Suppose C j= 9r:A v 9r:B0. For this entailment, only Case (a) applies: we have
that C j= 9r:A v 9r:B, C j= B v B0, and B 2 sub(T ). In other words, the
concept 9r:A triggers the TBox axiom A v 9s:B which implies 9r:9s:B. Using
the right-identity rule in R, we get 9r:B. Then, from the CI B v B0, it follows
that 9r:B0.</p>
      <p>Consider (ii). Let C = (T ; R) with T = fA v B0g and R = fr s v rg.
Suppose C j= C v 9r:B0, where C = 9r:9s:(A u B). Here, Case (b) applies:
it holds that R j= C v 9r:(A u B), C j= A u B v B0, and A u B 2 sub(C).
Intuitively, C itself enforces a role path of length two without utilizing CIs from
T . The path is then abbreviated by R. Finally, the TBox axiom together with
9r:(A u B) implies 9r:B0. a</p>
      <p>The following lemma is essential for characterizing -entailment. Intuitively,
it states that, given an arbitrary large concept C, we can always nd a
possibly shorter concept with bounded outdegree that expresses the same \relevant"
information. What information is considered relevant, is made precise by a set
of consequences KC(D) of a concept D in the presence of a CBox C. We are
interested in those consequences that are concepts of the closure cl(C; D).</p>
      <p>The set KC(D) is given as:</p>
      <p>KC(D) = fE 2 cl(C; E) j C j= D v Eg:
Lemma 3 (Bounded outdegree). For all CBoxes C = (T ; R) and concepts
C, there is a concept D such that the following conditions are satis ed:
1. ; j= C v D;
2. KC(C) = KC(D);
3. jDj jCj;
4. the outdegree of D is bounded by jCj.</p>
      <p>For the following characterization of -entailment, we use a relation `)1'
on concepts. Let C1; C2 be CBoxes, C a -concept, and D a sig(C2)-concept.
We write C )1 D if, and only if, for all -concepts E, C2 j= D v E implies
C1 j= C v E.</p>
      <p>Lemma 4 (Characterization of non- -entailment). Let C1 = (T1; R1) and
C2 = (T2; R2) be two CBoxes, and sig(C2) a signature. Then Di (C1; C2) 6=
; if, and only if, there is a -concept C and a sig(C2)-concept D 2 cl(C2) such
that:
(a) C2 j= C v D;
(b) C 6)1 D;
(c) the outdegree of C is bounded by jC2j.</p>
      <p>The next lemma characterizes the relation `)1' semantically in terms of
simulation between canonical models. Moreover, it states that membership in
`)1' can be decided in polynomial time.</p>
      <p>Lemma 5 (Semantic characterization). Let C1; C2 be CBoxes and C; D
concepts. Then we have C )1 D if, and only if, (ID;C2 ; D) (IC;C1 ; C). Hence,
the problem C )1 D is decidable in polynomial time in the size of C; D, and C2.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Algorithm</title>
      <p>We present an algorithm for deciding -entailment for EL with role inclusions.
To check whether C1 v C2, the algorithm searches for a -concept C such
that for some D 2 sub(T2), the Points (a){(c) of Lemma 4 are satis ed. The
algorithm proceeds in rounds. In the rst round, Points (a) and (b) are checked
for all conjunctions C of concept names from and all D 2 sub(T2). Each check
can be done in polynomial time by Lemma 5. In case, no suitable C is found in
round one, the algorithm proceeds to the second round in which concepts C of
role depth one are considered. Here C is a conjunction of concept names from
and concepts of the form 9r:E, where r is a role from and E is a candidate
for C from the previous round, i.e., E is a conjunction of concept names. By
Point (c) of Lemma 4, we only have to consider those Cs with no more than jT2j
many conjuncts of the form 9r:E. For checking Points (a) and (b), we make use
of the information we have gained about the Es in the previous round. If still
no suitable C is found, the algorithm starts round three that checks concepts
C of role depth two in which we reuse the Cs from the second round as role
successors. If again no suitable concept C was found, the algorithm proceeds to
the next round, etc.</p>
      <p>To avoid constructing doubly exponentially large concepts C, the algorithm
uses a succinct data structure that represents the relevant information about C.
Which information about C is relevant can be read of the characterization of
-entailment in Lemma 4: For every C, take the quintuple</p>
      <p>C] = (Q0; Q1; Q2; Q3; Q4);
where the set Q0 contains all concept names occurring in the top-level
conjunction of C,</p>
      <p>Q1 = KC1 (C);
Q2 = KC2 (C);
Q3 = f(r; D0) 2 ( \ NR) sub(T2) j C0 )1 D0 and</p>
      <p>C1 j= C v 9r:C0g; and</p>
      <p>Q4 = fD 2 sub(T2) j C )1 Dg:
The quintuple C] is said to be determined by C. Intuitively, the components
Q1 and Q2 contain concepts that are implied by C in the context of C1 and C2,
respectively, and Q4 contains concepts which, while being in the context of C2,
can be -simulated by C in the context of C1.</p>
      <p>According to Lemma 4, the quintuple C] determined by a concept C contains
su cient information to decide whether C is the left-hand side of a CI witnessing
the logical di erence between two CBoxes. Moreover, the information in C]
enables the recursive search described above and to formulate a termination
condition for the algorithm to run in exponential time.</p>
      <p>Figure 2 presents the algorithm for deciding -entailment for EL with role
inclusions. Observe that the termination condition Q2 n Q4 6= ; corresponds
to satisfaction of Points (a) and (b) in Lemma 4. Note that Point (a) in the
de nition of the set F3 uses canonical models, which are constructed on demand
in polynomial time.</p>
      <p>Notice that, in Figure 2, we use a binary auxiliary relation vrRh on roles for an
RBox R such that r vrRh s if, and only if, r v s 2 R. Let vR
rh be the re exive,
rh.
transitive closure of vR
Example 5. We illustrates the algorithm in Figure 2 by computing an answer
to the question `Does C1 = fT ; ;g -entail C2 = fT ; Rg?', where T and R are
as in Example 3 in Section 4. In Step 1, the algorithm computes the quintuples
in the set N0. For instance, the quintuple qToe 2 N0 determined by the concept
name Toe. We have qToe = (Q0; Q1; Q2; Q3; Q4), where</p>
      <p>Q4 = Q2:
Q0 = fToeg;
Q1 = fToe; 9isPartOf:Footg;
Q2 = Q1;</p>
      <p>Q3 = f(isPartOf; Foot); (isPartOf; 9isPartOf:Leg)g;
In Step 2, the algorithm checks whether Q2 n Q4 6= ;. As this is not the case,
it proceeds with Step 3 by computing the set N00 of quintuples, each from a set
F0 of concept names from and a set Q of pairs of a -role and a quintuple
from N0. Let F0 = ; and Q = f(hasLocation; qToe)g. The algorithm computes
the quintuple qD determined by the concept D:</p>
      <p>D =
l A u
l</p>
      <p>9r:( l D) :
Input: CBoxes C1 = (T1; R1) and C2 = (T2; R2) and signature
sig(C2).
(i) D 2 Q4 and s vrRh1 r; or
(ii) (t; D) 2 Q3, s vrRh1 r1, t vrRh1 r2, and r1 r2 v r 2 R1 ;
{ F4 =</p>
      <p>D 2 cl(C2) j
(a) for all A 2
(b) for all r 2
, A 2 KC2 (D) implies A 2 F1; and
, (D; D0) 2 rID;C2 implies (r; D0) 2 F3 .</p>
      <p>This is done until Ni contains a quintuple (Q0; Q1; Q2; Q3; Q4) such that Q2 nQ4 6= ;,
or Ni+1 = Ni. Output `C1 6v C2' if the rst condition applies; otherwise, output
`C1 v C2'.
That is, D = D1 u D2, where D1 = 9hasLocation:Toe and D2 = 9hasLocation:
9isPartOf:Foot. Then qD = (F0; F1; F2; F3; F4) is computed from F0 and Q,
where:</p>
      <p>F1 = fD; D1; D2g;
F2 = F1 [ f9hasLocation:Foot; 9hasLocation:Legg;
F3 = f(hasLocation; Toe); (hasLocation; 9isPartOf:Footg;</p>
      <p>F4 = ;:
The algorithm terminates and outputs `C1 6v
C2' since F2 n F4 6= ;.</p>
      <p>a</p>
      <p>
        Before we continue to show correctness of the algorithm, we explicitly state
the concepts that determine the quintuples constructed in Step 3 of Figure 2.
Lemma 6. Let (F0; F1; F2; F3; F4) be the quintuple computed from F0 and Q in
Figure 2. For each (r; q) 2 Q, let Cr;q be the concept which determines the
quintuple q. Then C = dA2F0 A u d(r;q)2Q 9r:Cr;q determines (F0; F1; F2; F3; F4).
This lemma extends a similar lemma in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] for E L. Notice that the presence of
role inclusions is accounted for by extending the representation of concepts by
one additional tuple component. This additional component { the fourth
component of a quintuple { is a set containing pairs of the form (r; D0). Intuitively,
(r; D0) means that the concept represented by the quintuple together with the
CBox C1 enforce a role path, which can be abbreviated to r by the RBox, leading
to point satisfying a concept, say, C0 such that C0 )1 D0.
      </p>
      <p>
        Finally, we show correctness and complexity of the algorithm in Figure 2.
The proof is similar to the one for the corresponding theorem in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
Theorem 2 (Correctness and Complexity). The algorithm for deciding
entailment for E L with role inclusions is sound, complete, and runs in
exponential time.
      </p>
      <p>Proof. Soundness follows from Lemmas 4 and 6. For completeness, assume C v
D 2 Di (C1; C2). By Lemma 4, C is of outdegree bounded by jC2j and D 2
sub(T2) such that C2 j= C v D and C 6)1 D. If C is a conjunction of concept
names, then the algorithm outputs `C1 6v C2' in Step 2. Suppose C has role
depth n 1. One can show by induction on i using Lemma 6 that, for all i 0,
the set Ni contains all quintuples determined by subconcepts C0 of C of role
depth smaller than i. Hence, after computing the set Ni for some i n, the
algorithm outputs `C1 6v C2'.</p>
      <p>For termination and time complexity consider the following. To see that
Steps 1 and 2 of the algorithm run in polynomial time notice that, by Lemma 5,
the algorithm can compute any quintuple determined by a conjunction of
concept names from in polynomial time. Consider Step 3. For each quintuple
(Q0; Q1; Q2; Q3; Q4), we have Q0 and Qi cl(C2), for 1 i 4. That is,
the total number of possible quintuples is bounded by 25jC2j. Consequently, the
algorithm terminates since Nj = Nj+1, for some j 25jC2j. For showing that the
algorithm runs in exponential time, we now show that Ni+1 can be computed
from Ni in exponential time. The number of pairs (F0; Q) in Figure 2, where
F0 \ NC and Q ( \ NR) Ni with jQj jC2j, is exponential in jC2j.
Moreover, given a pair (F0; Q), computing the quintuple (F0; F1; F2; F3; F4) in
Figure 2 only takes polynomial time in jC2j. tu
7</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>
        We have shown that deciding -entailment in E L with role inclusions for role
hierarchy (r v s), transitivity (r r v r), and right-identity (s r v s) is
ExpTime-complete. These forms of role inclusion axioms have been argued to
be of practical importance, e.g., in medical terminologies [
        <xref ref-type="bibr" rid="ref16 ref8">8, 16</xref>
        ]. The decision
procedure is an extension of the algorithm deciding conservative extensions in
E L [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Thus adding such role inclusion axioms does not increase the complexity
of the logical di erence problem for E L.
      </p>
      <p>For future work, it is interesting to extend the presented algorithmic
framework to capture more expressivity by, e.g., allowing for more role inclusions,
inverse roles, universal roles, nominals, etc.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Brandt</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          .
          <article-title>Pushing the EL envelope</article-title>
          .
          <source>In Proceedings of IJCAI'05</source>
          , pages
          <fpage>364</fpage>
          {
          <fpage>369</fpage>
          . Professional Book Center,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Brandt</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          .
          <article-title>Pushing the EL envelope further</article-title>
          .
          <source>In Proceedings of OWLED'08: Workshop on OWL { Experiences and Directions</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>E.</given-names>
            <surname>Clarke</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Schlinglo</surname>
          </string-name>
          .
          <article-title>Model checking</article-title>
          .
          <source>In Handbook of Automated Reasoning</source>
          , volume II, chapter
          <volume>24</volume>
          , pages
          <fpage>1635</fpage>
          {
          <fpage>1790</fpage>
          .
          <string-name>
            <surname>Elsevier</surname>
            <given-names>Science</given-names>
          </string-name>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. A. Flogel, H. K. Buning, and
          <string-name>
            <given-names>T.</given-names>
            <surname>Lettmann</surname>
          </string-name>
          .
          <article-title>On the restricted equivalence of subclasses of propositional logic</article-title>
          .
          <source>ITA</source>
          ,
          <volume>27</volume>
          (
          <issue>4</issue>
          ):
          <volume>327</volume>
          {
          <fpage>340</fpage>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>S.</given-names>
            <surname>Ghilardi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>Did I damage my ontology? a case for conservative extensions in description logics</article-title>
          .
          <source>In Proceedings of KR'06</source>
          , pages
          <fpage>187</fpage>
          {
          <fpage>197</fpage>
          . AAAI Press,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>B. C.</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Parsia</surname>
          </string-name>
          , E. Sirin,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Kalyanpur</surname>
          </string-name>
          .
          <article-title>Modularity and web ontologies</article-title>
          .
          <source>In Proceedings of KR'06</source>
          , pages
          <fpage>198</fpage>
          {
          <fpage>209</fpage>
          . AAAI Press,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>I.</given-names>
            <surname>Horrocks</surname>
          </string-name>
          .
          <article-title>Optimising Tableaux Decision Procedures for Description Logics</article-title>
          .
          <source>PhD thesis</source>
          , University of Manchester,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>I.</given-names>
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. F.</given-names>
            <surname>Patel-Schneider</surname>
          </string-name>
          , and
          <string-name>
            <surname>F. van Harmelen. From SHIQ</surname>
          </string-name>
          and
          <article-title>RDF to OWL: The Making of a Web Ontology Language</article-title>
          .
          <source>Journal of Web Semantics</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ):7{
          <fpage>26</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>B.</given-names>
            <surname>Konev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Walther</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>The logical di erence problem for description logic terminologies</article-title>
          .
          <source>In Proceedings of IJCAR'08</source>
          . Springer-Verlag,
          <year>2008</year>
          . To appear.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>C. Lutz</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Walther</surname>
            , and
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>Conservative extensions in expressive description logics</article-title>
          .
          <source>In Proceedings of IJCAI'07</source>
          , pages
          <fpage>453</fpage>
          {
          <fpage>458</fpage>
          . AAAI Press,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>Conservative extensions in the lightweight description logic EL</article-title>
          .
          <source>In Proceedings of CADE'07</source>
          . Springer,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>N. F.</given-names>
            <surname>Noy</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Musen</surname>
          </string-name>
          .
          <article-title>Promptdi : A xed-point algorithm for comparing ontology versions</article-title>
          .
          <source>In Proceedings of AAAI</source>
          , pages
          <volume>744</volume>
          {
          <fpage>750</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>D.</given-names>
            <surname>Pokrywczynski</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Walther</surname>
          </string-name>
          .
          <article-title>Deciding the logical di erence problem for EL with role inclusions</article-title>
          . manuscript, http://www.csc.liv.ac.uk/~dirk/.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Rector</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Horrocks.</surname>
          </string-name>
          <article-title>Experience building a large, re-usable medical ontology using a description logic with transitivity and concept inclusions</article-title>
          .
          <source>In Proceedings of the Workshop on Ontological Engineering</source>
          , AAAI Spring Symposium, pages
          <volume>100</volume>
          {
          <fpage>107</fpage>
          . Hanley and Belfus,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>N.</given-names>
            <surname>Sioutos</surname>
          </string-name>
          , S. de Coronado,
          <string-name>
            <given-names>M. W.</given-names>
            <surname>Haber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. W.</given-names>
            <surname>Hartel</surname>
          </string-name>
          , W.-L. Shaiu, and
          <string-name>
            <given-names>L. W.</given-names>
            <surname>Wright</surname>
          </string-name>
          . NCI Thesaurus:
          <article-title>A semantic model integrating cancer-related clinical and molecular information</article-title>
          .
          <source>Journal of Biomedical Informatics</source>
          ,
          <volume>40</volume>
          (
          <issue>1</issue>
          ):
          <volume>30</volume>
          {
          <fpage>43</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Spackman</surname>
          </string-name>
          .
          <article-title>Managing clinical terminology hierarchies using algorithmic calculation of subsumption: Experience with SNOMED-RT</article-title>
          .
          <article-title>Journal of the American Medical Informatics Association</article-title>
          , Fall Symposium Special Issue,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <article-title>The Gene Ontology Consortium</article-title>
          .
          <article-title>Gene ontology: tool for the uni cation of biology</article-title>
          .
          <source>In Nature Genetics</source>
          , volume
          <volume>25</volume>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>S.</given-names>
            <surname>Tobies</surname>
          </string-name>
          .
          <article-title>Complexity Results and Practical Algorithms for Logics in Knowledge Representation</article-title>
          .
          <source>PhD thesis</source>
          , RWTH Aachen,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>