<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>DL</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>No Cliques Allowed: The Next Step Towards BDD/FC Conjecture (Extended Abstract)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lucas Larroque</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Piotr Ostropolski-Nalewaja</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michaël Thomazo</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Inria, DI ENS, ENS, CNRS, PSL University</institution>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Wroclaw</institution>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>38</volume>
      <fpage>3</fpage>
      <lpage>6</lpage>
      <abstract>
        <p>This paper addresses one of the fundamental open questions in the realm of existential rules: the conjecture on the finite controllability of bounded derivation depth rule sets ( bdd ⇒fc). We take a step toward a positive resolution of this conjecture by demonstrating that universal models generated by bdd rule sets cannot contain arbitrarily large tournaments (arbitrarily directed cliques) without entailing a loop query, ∃ (, ). This simple yet elegant result narrows the space of potential counterexamples to the (bdd ⇒fc) conjecture.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Chase</kwd>
        <kwd>Existential Rules</kwd>
        <kwd>Finite unification sets</kwd>
        <kwd>Bounded Derivation Depth Property</kwd>
        <kwd>Tuple Generating Dependencies</kwd>
        <kwd>TGDs</kwd>
        <kwd>BDD</kwd>
        <kwd>FUS</kwd>
        <kwd>Finite Controllability</kwd>
        <kwd>BDD/FC Conjecture</kwd>
        <kwd>FO-Rewritability</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>ℐ, ℛ |= 
⇐⇒
ℐ |= ℛ.</p>
      <p>
        Given that the chase can produce an infinite structure, the UCQ-rewritability of a rule set ensures
decidable OBQA, as the rewriting can be computed and subsequently used to query the database.
Unsurprisingly, UCQ-rewritability has been the subject of extensive research, leading to the introduction
of numerous subclasses over the past few decades, including: linear theories, which permit at most a
single atom in rule bodies [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]; guarded bdd theories, which generalize linear theories [
        <xref ref-type="bibr" rid="ref14">14, 15</xref>
        ]; sticky
theories, where strong restrictions are imposed on joins [16].
      </p>
      <p>UCQ-rewritability is also studied independently under a number of diferent names — highlighting
the fundamental nature of the property — with notable cases of finite unification sets class ( fus) and
bounded derivation depth property (bdd). The fus class is closely tied to the concept of the backward
chaining procedure, which is essentially a process of “chasing in reverse.” In this approach, to answer
the entailment question, one starts with a query and attempts to derive a substructure of the database
by applying rules in reverse. The bdd class has a much older origin, dating back to the 1980s. It stems
from the classical notion of the boundedness of a Datalog program [17].</p>
      <p>Definition 1. A rule set has bounded derivation depth (bdd) if for every CQ , there is some  ≥ 0 such
that for all instances ℐ, we have ⟨ ℐ, ℛ ⟩ |=  if and only if  is already entailed at step  of the chase from
ℐ and ℛ. We use bdd to denote the class of rule sets with bdd.</p>
      <p>OBQA in the finite Databases, however, are finite structures, and under the understanding that ℐ is
a partial description of the real world, and that ℛ are constraints that should hold on the finite real
world, the classical notion of entailment provided by first-order logic does not correspond to the desired
notion of entailment. Indeed, one should be more interested in knowing whether “q holds in any finite
database that contains ℐ and is a model of ℛ”. This semantics is clearly related with the previous one,
as a consequence of ℐ and ℛ in the unrestricted semantics is also one in the finite one. The converse is
however not true, as the following prototypical example witnesses.</p>
      <p>Example 2. Let us consider ℐ = {E(, )}, and ℛ containing the two rules ∀∀ E(, ) → ∃ E(, )
and ∀∀∀ E(, ) ∧ E(, ) → E(, ). The query ∃ E(, ) is not a consequence of ℐ, ℛ under the
unrestricted semantics, as witnessed by the chase. In any finite model however, there must be a cycle, and
hence a loop because of the transitivity enforced by the second rule.</p>
      <p>Finite Controllability Finite reasoning provides us with a semi-decision procedure for
nonentailment (enumerating finite interpretations, and checking whether there exists one that is not
a model of ), but entailment is not semi-decidable anymore, as a finite universal model may not exist.
An interesting question, already raised by Rosati [18], is, given a rule set ℛ, whether for any database
ℐ and any query  the unrestricted and the finite semantics coincide. If so, the rule set ℛ is said to
be finitely controllable (fc). Note that whenever a rule set is fc, query answering becomes decidable.
Indeed, the classical mathematical tools for semi-deciding first-order entailment are still available, while
non-entailment can be witnessed by finite structures. Rosati showed that inclusion dependencies, a
very restricted form of existential rules, enjoy finite controllability [ 18]. This has been generalized
in two ways, for guarded rules [19], as well as for sticky rules [20]. Note that both classes generalize
inclusion dependencies in various ways, guarded rules enjoying the bounded treewidth property, while
sticky rules enjoy the bounded derivation depth property.</p>
      <p>There is a well-known conjecture by Gogacz and Marcinkowski [21] stating that rule sets with
the bounded derivation depth (bdd) property are finitely controllable ( bdd ⇒fc). Moreover, they
demonstrated that the conjecture holds in a specific restricted setting where bdd rule sets are defined
over a binary signature and have heads containing only a single atom [21]. However, this result applies
to a highly limited case, and little progress has been made towards resolving the conjecture in its general
form. The broader question of whether finite controllability extends to all bdd rule sets remains an
important open problem.</p>
      <p>Contributions Our main contribution is to show that bdd rule sets enjoy certain model-theoretic
property. We write TournamentsE to denote the query: for all integers , there is a set { 1, . . . ,  }
of elements in the given instance such that E(,  ) or E( , ) holds in the instance for all  ̸= , and
write LoopE to denote the query ∃ E(, ). Then, the following is our main result:
Theorem 3. For every bdd rule set ℛ and every instance ℐ:
(ℐ, ℛ) |= LoopE.
(ℐ, ℛ) |= TournamentsE
⇒</p>
      <p>In addition to providing insights into the structural properties of universal models of bdd rule sets,
this result serves as an important step towards proving the (bdd ⇒fc) conjecture. Specifically, it
narrows the space of potential counterexamples to the conjecture by eliminating the most natural ones.
We briefly explain why this is the case. First note that any model that entails TournamentsE and
not LoopE is infinite, as the terms 1, . . . ,  in TournamentsE must be distinct for LoopE not to be
entailed. Thus, TournamentsE does imply LoopE in the finite setting, and any bdd rule set for which
this implication does not hold (in the unrestricted setting) would disprove (bdd ⇒fc).</p>
      <p>Note however that Example 2 does not constitute such a counterexample, as its rule set is simply not
bdd, since the transitivity rule has to be applied at least as many times as the distance between  and 
to entail E(, ), which cannot be bounded independently of the size of the database. Expanding on that
example, one could try to mimic the behavior using bdd rules by replacing the transitivity rule with
∀∀′∀∀′ E(, ′) ∧ E(, ′) → E(, ′), which entails it. With this change, the rule set is finally bdd,
and the chase entails TournamentsE. However, this new rule triggers the entailment of ∃ E(, ) as
soon as ∃∃ E(, ) is entailed, as expected due to Theorem 3.</p>
      <p>While Theorem 3 does not entail the (bdd ⇒fc) conjecture, as a diferent type of counterexample
could in principle exist, we are confident that the insights and carefully curated toolkit developed to
tackle this case represent an important milestone in the efort to settle the ( bdd ⇒fc) conjecture in the
general setting.</p>
      <p>Organization of the proof The proof of Theorem 3 goes in two main steps. First, we introduce a
series of rule set normalizations to constrain universal models of FUS rule sets in a more manageable
structure. While some of these are well-known, the properties we require are tailored to the specific
case at hand and need a separate formal proof. Then, we introduce the crucial notion of valley queries
that are used to define the E predicate, and we show through a nice application of Ramsey theorem that
such queries cannot define arbitrary tournaments.</p>
      <p>An extended version of this work with fully detailed proofs can be found in [22].</p>
      <p>Next steps A natural next step in this line of research is to establish that with UCQ-rewritable rule
sets, one cannot define structures of arbitrarily high chromatic number without entailing the LoopE
query:
Conjecture 4. For every signature S, every UCQ-rewritable rule set ℛ over S, and every instance ℐ, we
have:
ℎ(ℐ, ℛ)|E cannot be colored with a finite number of colors
⇒</p>
      <p>We believe that this conjecture, if proven, would constitute an elegant model-theoretic property of
UCQ-rewritable rule sets and represent a significant step toward proving the ( bdd ⇒fc) conjecture.
Let us elaborate. Similar to the results presented in this paper, if Conjecture 4 holds, it would eliminate
a substantial portion of the potential counterexample space: any structure that cannot be colored with
a finite number of colors cannot be homomorphically embedded into a finite structure that does not
entail LoopE.</p>
      <p>Our hope is that the tools developed throughout this paper will serve as a foundation for the proof
of Conjecture 4. However, we note that such a proof would not be a straightforward extension of the
techniques developed in this paper. The current proof aims at showing existence of four-tournament
witnessed by a single valley query. We know, however, that there exists structures of arbitrarily high
chromatic numbers that do not contain the four-clique:
ℎ(ℐ, ℛ) |= LoopE.</p>
      <p>Theorem 5 (Erdős [23]). There exist graphs with arbitrarily high girth and chromatic number.
Piotr Ostropolski-Nalewaja was supported by grant 2022/45/B/ST6/00457 from the Polish National
Science Centre (NCN).</p>
      <p>Declaration on Generative AI
The author(s) have not employed any Generative AI tools.
[15] C. Civili, R. Rosati, On the first-order rewritability of conjunctive queries over binary guarded
existential rules (extended abstract), 2015.
[16] A. Calì, G. Gottlob, A. Pieris, Advanced processing for ontological queries, Proceedings of the</p>
      <p>VLDB Endowment 3 (2010). doi:10.14778/1920841.1920912.
[17] H. Gaifman, H. Mairson, Y. Sagiv, M. Y. Vardi, Undecidable optimization problems for database
logic programs, J. ACM 40 (1993) 683–713. URL: https://doi.org/10.1145/174130.174142. doi:10.
1145/174130.174142.
[18] R. Rosati, On the finite controllability of conjunctive query answering in databases under
openworld assumption, J. Comput. Syst. Sci. 77 (2011) 572–594. URL: https://doi.org/10.1016/j.jcss.2010.
04.011. doi:10.1016/J.JCSS.2010.04.011.
[19] V. Bárány, G. Gottlob, M. Otto, Querying the guarded fragment, in: 2010 25th Annual IEEE</p>
      <p>Symposium on Logic in Computer Science, 2010, pp. 1–10. doi:10.1109/LICS.2010.26.
[20] T. Gogacz, J. Marcinkowski, Converging to the chase – a tool for finite controllability, Journal of
Computer and System Sciences 83 (2017) 180–206. URL: https://www.sciencedirect.com/science/
article/pii/S0022000016300617. doi:https://doi.org/10.1016/j.jcss.2016.08.001.
[21] T. Gogacz, J. Marcinkowski, On the bdd/fc conjecture, in: Proceedings of the 32nd ACM
SIGMODSIGACT-SIGAI Symposium on Principles of Database Systems, PODS ’13, Association for
Computing Machinery, New York, NY, USA, 2013, p. 127–138. URL: https://doi.org/10.1145/2463664.2463668.
doi:10.1145/2463664.2463668.
[22] L. Larroque, P. Ostropolski-Nalewaja, M. Thomazo, No cliques allowed: The next step towards
bdd/fc conjecture, Proc. ACM Manag. Data 3 (2025). doi:10.1145/3725238.
[23] P. Erdös, Graph theory and probability, Canadian Journal of Mathematics 11 (1959) 34–38.
doi:10.4153/CJM-1959-003-9.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Abiteboul</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hull</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vianu</surname>
          </string-name>
          , Foundations of Databases, Addison-Wesley,
          <year>1995</year>
          . URL: http: //webdam.inria.fr/Alice/.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Salvat</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-L. Mugnier</surname>
          </string-name>
          ,
          <article-title>Sound and complete forward and backward chainings of graph rules</article-title>
          , in: P. W. Eklund, G. Ellis, G. Mann (Eds.),
          <source>Proceedings of the 4th International Conference on Conceptual Structures (ICCS'96)</source>
          , volume
          <volume>1115</volume>
          <source>of LNCS</source>
          , Springer,
          <year>1996</year>
          , pp.
          <fpage>248</fpage>
          -
          <lpage>262</lpage>
          . URL: https: //doi.org/10.1007/3-540-61534-2_
          <fpage>16</fpage>
          . doi:
          <volume>10</volume>
          .1007/3-540-61534-2\_
          <fpage>16</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G.</given-names>
            <surname>Gottlob</surname>
          </string-name>
          , Datalog+/
          <article-title>-: A unified approach to ontologies and integrity constraints</article-title>
          , in: V.
          <string-name>
            <surname>D. Antonellis</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Castano</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Catania</surname>
          </string-name>
          , G. Guerrini (Eds.),
          <source>Proceedings of the 17th Italian Symposium on Advanced Database Systems</source>
          ,
          <source>(SEBD'09)</source>
          , Edizioni Seneca,
          <year>2009</year>
          , pp.
          <fpage>5</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.-F.</given-names>
            <surname>Baget</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Leclère</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-L. Mugnier</surname>
          </string-name>
          , E. Salvat,
          <article-title>On rules with existential variables: Walking the decidability line</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>175</volume>
          (
          <year>2011</year>
          )
          <fpage>1620</fpage>
          -
          <lpage>1654</lpage>
          . URL: https://www.sciencedirect.com/ science/article/pii/S0004370211000397. doi:https://doi.org/10.1016/j.artint.
          <year>2011</year>
          .
          <volume>03</volume>
          . 002.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Maier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Mendelzon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sagiv</surname>
          </string-name>
          ,
          <article-title>Testing implications of data dependencies</article-title>
          ,
          <source>ACM Transactions on Database Systems (TODS) 4</source>
          (
          <year>1979</year>
          ). doi:
          <volume>10</volume>
          .1145/320107.320115.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Deutsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Remmel</surname>
          </string-name>
          , The chase revisited,
          <year>2008</year>
          . doi:
          <volume>10</volume>
          .1145/1376916.1376938.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Fagin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. G.</given-names>
            <surname>Kolaitis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Popa</surname>
          </string-name>
          ,
          <source>Data exchange: Semantics and query answering, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          <volume>2572</volume>
          (
          <year>2003</year>
          ). doi:
          <volume>10</volume>
          .1007/3-540-36285-1_
          <fpage>14</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Krötzsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rudolph</surname>
          </string-name>
          ,
          <article-title>Extending decidable existential rules by joining acyclicity and guardedness</article-title>
          ,
          <year>2011</year>
          . doi:
          <volume>10</volume>
          .5591/978-1-
          <fpage>57735</fpage>
          -516-8/
          <fpage>IJCAI11</fpage>
          -166.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>B.</given-names>
            <surname>Cuenca Grau</surname>
          </string-name>
          , I. Horrocks,
          <string-name>
            <given-names>M.</given-names>
            <surname>Krötzsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kupke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Magka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Motik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Acyclicity notions for existential rules and their application to query answering in ontologies</article-title>
          ,
          <source>Journal of Artificial Intelligence Resesearch (JAIR) 47</source>
          (
          <year>2013</year>
          )
          <fpage>741</fpage>
          -
          <lpage>808</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>L.</given-names>
            <surname>Gerlach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Carral</surname>
          </string-name>
          ,
          <article-title>General acyclicity and cyclicity notions for the disjunctive skolem chase</article-title>
          , in: B.
          <string-name>
            <surname>Williams</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Chen</surname>
          </string-name>
          , J. Neville (Eds.),
          <source>Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence</source>
          ,
          <year>2023</year>
          , USA, AAAI Press,
          <year>2023</year>
          , pp.
          <fpage>6372</fpage>
          -
          <lpage>6379</lpage>
          . URL: https://ojs.aaai.org/index. php/AAAI/article/view/25784. doi:
          <volume>10</volume>
          .1609/aaai.v37i5.
          <fpage>25784</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Carral</surname>
          </string-name>
          , I. Dragoste,
          <string-name>
            <given-names>M.</given-names>
            <surname>Krötzsch</surname>
          </string-name>
          ,
          <article-title>Restricted chase (non)termination for existential rules with disjunctions</article-title>
          , in: C.
          <string-name>
            <surname>Sierra</surname>
          </string-name>
          (Ed.),
          <source>Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI</source>
          <year>2017</year>
          ), Australia, ijcai.org,
          <year>2017</year>
          , pp.
          <fpage>922</fpage>
          -
          <lpage>928</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Calì</surname>
          </string-name>
          , G. Gottlob,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Kifer, Taming the infinite chase: Query answering under expressive relational constraints</article-title>
          ,
          <source>in: Proceedings of the Eleventh International Conference on Principles of Knowledge Representation and Reasoning</source>
          , KR'08, AAAI Press,
          <year>2008</year>
          , p.
          <fpage>70</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Calì</surname>
          </string-name>
          , G. Gottlob,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Kifer, Taming the infinite chase: query answering under expressive relational constraints</article-title>
          ,
          <source>J. Artif. Int. Res</source>
          .
          <volume>48</volume>
          (
          <year>2013</year>
          )
          <fpage>115</fpage>
          -
          <lpage>174</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>P.</given-names>
            <surname>Barceló</surname>
          </string-name>
          , G. Berger,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pieris</surname>
          </string-name>
          ,
          <article-title>First-order rewritability of frontier-guarded ontologymediated queries</article-title>
          ,
          <source>in: Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, IJCAI 2018, July 13-19</source>
          ,
          <year>2018</year>
          , Stockholm, Sweden.,
          <year>2018</year>
          , pp.
          <fpage>1707</fpage>
          -
          <lpage>1713</lpage>
          . URL: https://doi.org/10.24963/ijcai.
          <year>2018</year>
          /236. doi:
          <volume>10</volume>
          .24963/ijcai.
          <year>2018</year>
          /236.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>