<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Extending Attribute Exploration by Means of Boolean Derivatives</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">José</forename><forename type="middle">Antonio</forename><surname>Alonso-Jiménez</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Departamento de Ciencias de la Computación e Inteligencia Artificial</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Gonzalo</forename><forename type="middle">A</forename><surname>Aranda-Corral</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Departamento de Ciencias de la Computación e Inteligencia Artificial</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Joaquín</forename><surname>Borrego-Díaz</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Departamento de Ciencias de la Computación e Inteligencia Artificial</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">M</forename><surname>Magdalena Fernández-Lebrón</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Departamento de Matemática Aplicada I E.T.S. Ingeniería Informática</orgName>
								<orgName type="institution">Universidad de Sevilla</orgName>
								<address>
									<addrLine>Avda. Reina Mercedes s.n</addrLine>
									<postCode>41012</postCode>
									<settlement>Sevilla</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">M</forename><surname>José Hidalgo-Doblado</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Joaquín</forename><surname>Borrego- Díaz</surname></persName>
						</author>
						<author>
							<persName><forename type="first">M</forename><forename type="middle">José</forename><surname>Hidalgo-Doblado</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Departamento de Ciencias de la Computación e Inteligencia Artificial</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Extending Attribute Exploration by Means of Boolean Derivatives</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">915C70BEFC788B7F0EAAA352BEA80E8F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T10:37+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We present a translation of problems of Formal Context Analysis into ideals problems in F2[x] through the Boolean derivatives. The Boolean derivatives are introduced as a kind of operators on propositional formulas which provide a complete calculus. They are useful to refine stem basis as well as for extending attribute exploration.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Attribute exploration (cf. <ref type="bibr" target="#b2">[3]</ref>) is a family of interactive procedures for Knowledge Acquisition (KA) in Formal Concept Analysis (FCA), whose goal is to build a knowledge base of the attributes we are working with. The procedures used in FCA have nice computer implementations, existing even generalizations for the management of the background information. Sometimes attribute exploration is hard or tedious to apply. Thus, it may advisable to use automated tools. Many Computer Algebra Systems (CAS) provide tools for working with discrete data, for example, Gröbner basis. Since it is possible to translate entailment problems into ideal problems in finite fields, Gröbner basis is a powerful tool for reasoning in propositional logic <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>Our aim is to extend the framework of attribute exploration through the introduction of Boolean derivatives and the assistance of a CAS. The CAS that we will use CoCoA (http://cocoa.dima.unige.it/), very well suited for our pourposes because of its easy management of Gröbner basis and related tools. The paper is organized as follows. The next section reviews the relationship between propositional logic and the ring F 2 [x], as well as the basics of FCA. In the third section the Boolean derivatives are introduced, as well as a complete polynomial calculus based on them. An algebraic characterization of sensitivity for implications in FCA is given in forth section. In fifth and sixth sections new versions of attribute exploration are introduced, and in section 7 an application to graph theory is given. We conclude with some remarks about future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Background</head><p>We assume that the reader is familiar with propositional logic and polynomial algebra on positive characteristics. We setup a propositional language P V = {p 1 , . . . , p n }, P F orm will denote the set of propositional formulas, and var(F ) denotes the set of variables of the propositional formula F .</p><p>The ring in which we are working is F 2 [x] (where x = x 1 , . . . , x n ). A key ideal is I 2 := (x 1 + x 2 1 , . . . , x n + x 2 n ). To clarify our proposition, let fix an identification p i → x i (or p → x p ) between PV and the set of indeterminates.</p><p>Given α = (α 1 , . . . α n ) ∈ N n , let us define |α| := max{α 1 , . . . , α n }, and sg(α) := (δ 1 , . . . , δ n ), where δ i is 0 if α i = 0 and 1 otherwise. The degree of a(x) ∈</p><formula xml:id="formula_0">F 2 [x], is deg ∞ (a(x)) :=max{|α| : x α is a monomial of a}, and deg i (a(x)) is the degree w.r.t. x i . If deg ∞ (a(x)) ≤ 1, a(x) is called a polynomial formula.</formula><p>Three maps represent the relationship between propositional logic and F 2 [x]:</p><formula xml:id="formula_1">-Φ : F 2 [x] → F 2 [x] is defined by Φ( α∈I x α ) := α∈I x sg(α) .</formula><p>-The map P : P F orm → F 2 [x] is defined by the following equations</p><formula xml:id="formula_2">• P (⊥) = 0, P (p i ) = x i , P (¬F ) = 1 + P (F ) • P (F 1 ∧F 2 ) = P (F 1 )•P (F 2 ) and P (F 1 ∨F 2 ) = P (F 1 )+P (F 2 )+P (F 1 )P (F 2 ) • P (F 1 → F 2 ) = 1 + P (F 1 ) + P (F 1 )P (F 2 )</formula><p>, and</p><formula xml:id="formula_3">• P (F 1 ↔ F 2 ) = 1 + P (F 1 ) + P (F 2 ) -Θ : F 2 [x] → P F orm is defined by • Θ(0) = ⊥, Θ(1) = , Θ(x i ) = p i , • Θ(a • b) = Θ(a) ∧ Θ(b), and Θ(a + b) = ¬(Θ(a) ↔ Θ(b)).</formula><p>We have that Θ(P (F )) ≡ F and P (Θ(a)) = a. Since we shall frequently be applying Φ • P , we define the polynomial projection as π := Φ • P . Regarding valuations and polynomials, the key fact is that, if v : P V → {0, 1} is a valutation with v(p i ) = δ i , then for every</p><formula xml:id="formula_4">F ∈ P F orm, v(F ) = P (F )(δ 1 , . . . δ n )</formula><p>The behaviour of the ideals of F 2 [x] is well known: If A ⊆ (F 2 ) n , then V (I(A)) = A, and for every I ∈ Ideals(F 2 [x]), I(V (I)) = I + I 2 . Therefore F ≡ F if and only if P (F ) = P (F ) (mod I 2 ) which is also equivalent to Φ • P (F ) = Φ • P (F ). The following theorem states the main relationship between propositional logic and F 2 [x]: Theorem 1. The following conditions are equivalent:</p><formula xml:id="formula_5">(1) {F 1 , . . . , F m } |= G. (2) 1 + P (G) ∈ (1 + P (F 1 ), . . . , 1 + P (F n )) + I 2 . (3) NF(1 + P (G), GB [(1 + P (F 1 ), . . . , 1 + P (F m )) + I 2 ]) = 0.</formula><p>(where GB denotes Gröbner basis) and NF denotes normal form.</p><p>In the rest of this section we succintly present some elements of FCA we use, although we assume that the reader knows the basic principles of this theory (the fundamental reference is <ref type="bibr" target="#b2">[3]</ref>). We represent a formal context as M = (O, A, I), which consists of two sets, O (the objects) and A (the attributes) and a relation I ⊆ O × A. Finite contexts can be represented by a 1-0-table (representing I as a Boolean function on O × A). The main goal in FCA is the computation of the concept lattice associated to the context. Basic logical expressions in FCA are implication between attributes, that is, pair of sets of attributes written as Y 1 → Y 2 . Truth with respect to M = (O, A, I) is defined as follows. A subset</p><formula xml:id="formula_6">T ⊆ A respects Y 1 → Y 2 if Y 1 ⊆ T or Y 2 ⊆ T . We say that Y 1 → Y 2 holds in M (M |= Y 1 → Y 2 ) if for all o ∈ O, the set {o} respects Y 1 → Y 2 . In that case we say that Y 1 → Y 2 is an implication of M .</formula><p>From a propositional logic viewpoint, Y 1 → Y 2 is the formula Y 1 → Y 2 , so it is equivalent to a set of Horn clauses (implications with a singleton as right-hand side). On the other hand, the definition of truth can be extended: Given Y ⊆ A, define ¬Y := Y → ⊥, and it holds in the context if for all o ∈ O, Y ⊆ {o} . Given a formula written with {→, ⊥}, M |= F can be defined in the natural way. Since this set of connectives is functionally complete, truth definition can be extended to P F orm. Definition 1. Let L be a set of implications and L an implication of M .</p><formula xml:id="formula_7">• L follows from L (L |= L) if each subset of A respecting L also respects L. • L is closed if every implication following from L is already in L. • L is complete if every implication of the context follows from L. • L is non-redundant if for each L ∈ L, L \ {L} |= L.</formula><p>• L is a stem basis for M if it is complete and non-redundant.</p><p>For every context we can obtain a stem basis from the pseudo-intents:</p><formula xml:id="formula_8">Theorem 2. [7] The set L = {Y → Y : Y is a pseudointent} is a stem basis.</formula><p>Actually one can choose Y → Y \ Y instead of Y → Y , so we will assume, by default, that for every implication Y 1 → Y 2 belonging to a stem basis Y 1 and Y 2 are disjoint. Such a basis for the example of figure <ref type="figure">5</ref> </p><formula xml:id="formula_9">(left) is L = {∅ → N, {N, A} → {M o}, {N, Le} → {M o}}.</formula><p>The called Amstrong rules facilitates implicational reasoning: </p><formula xml:id="formula_10">R1 : X → X R2 : X → Y X ∪ Z → Y R3 : X → Y, Y ∪ Z → W X ∪ Z → W It has that A</formula><formula xml:id="formula_11">:= (H, A, I ∩ (H × A))</formula><p>One expects that a stem basis associated to M H is also a stem basis for the complete context. To guarantee it, we proceed as follows. Assume that L =</p><p>1. Compute pseudo-intent: Find X a pseudo-intent for M H . 2. Soundness of the new implication: Ask to the user X ? → X (the operators are w.r.t. the subcontext). The user must react:</p><p>-Confirming the suggested implication (adding it to L), or giving o (a counterexample) such that {o} does not respect the implication. This is added to H, and the implication is discarded.</p><formula xml:id="formula_12">Fig. 1. Attribute exploration {L 1 , . . . , L k } is a partial set of implications accepted as true, built from pseudo- intents of M H 1 .</formula><p>Attribute exploration consists in a loop of the two steps shown in fig. <ref type="figure" target="#fig_4">1</ref>, and it stops when no new pseudointent is found (see <ref type="bibr" target="#b3">[4]</ref> for variants).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Boolean derivatives and non-clausal theorem proving</head><p>We introduce an operator on propositional formulas as a translation of the usual derivation on F 2 [x]. In this section we review its basic properties (from <ref type="bibr" target="#b1">[2]</ref>).</p><p>Recall that a derivation on a ring R is a map</p><formula xml:id="formula_13">d : R → R verifying that d(a + b) = d(a) + d(b) and d(a • b) = d(a) • b + a • d(b) Definition 2. A map ∂ : P F orm → P F orm is a Boolean derivation if there exists a derivation d on the ring F 2 [x] such that ∂ = Θ • d • π If the derivation on F 2 [x] is d = ∂ ∂xp , we denote ∂ as ∂ ∂p .</formula><p>It has that:</p><formula xml:id="formula_14">∂ ∂p F ≡ ¬(F {p/¬p} ↔ F )</formula><p>Thus, the value of ∂ ∂p F with respect to a valuation does not depend on p. Therefore, we can apply valuations on P V \ {p} to this formula. Definition 3. The independence rule (or ∂-rule) on polynomial formulas is</p><formula xml:id="formula_15">∂ x (a 1 , a 2 ) : a 1 , a 2 1 + Φ (1 + a 1 • a 2 )(1 + a 1 • ∂ ∂x a 2 + a 2 • ∂ ∂x a 1 + ∂ ∂x a 1 • ∂ ∂x a 2 ) In order to simplify the notation, if a i = b i + x p • c i , with deg xp (b i ) = deg xp (c i ) = 0 (i = 1, 2),.</formula><p>Then we can rewrite the values as:</p><formula xml:id="formula_16">∂ xp (a 1 , a 2 ) : b 1 + x p • c 1 , b 2 + x p • c 2 Φ [1 + (1 + b 1 • b 2 )[1 + (b 1 + c 1 )(b 2 + c 2 )]]</formula><p>The rule is symmetric and generalizes resolution of non-tautological polynomial clauses (see lemma 1). For formulas the rule is translated as</p><formula xml:id="formula_17">∂ p (F 1 , F 2 ) := Θ(∂ xp (π(F 1 ), π(F 2 ))).</formula><p>It naturally induces a concept of proof, ∂ . A ∂ -refutation is a proof of ⊥. In <ref type="bibr" target="#b1">[2]</ref> the soundness and the refutational completeness of partial has been proved Theorem 4. <ref type="bibr" target="#b1">[2]</ref> Let v : P V \ {p} → {0, 1}. The following conditions are equivalent:</p><formula xml:id="formula_18">1. v |= ∂ p (F 1 , F 2 ). 2. There exists an extension of v to P V is a model of {F 1 , F 2 }. For example, ∂ x1 (x 1 (1 + x 2 ), x 1 (1 + x 2 )) = 1 + x 2 . So the valuation v s.t. v(¬p 2 ) = 1 is the only one that we can extend to a model of p 1 ∧ ¬p 2 . When ∂ p (π(F 1 ), π(F 2 )) = 1, every partial valuation is extendable to a model of {F 1 , F 2 }. Theorem 5. [2] If Γ is inconsistent then Γ ∂ ⊥. Let be ∂ p [Γ ] defined as ∂ p [Γ ] := {∂ p (F, G) : F, G ∈ Γ }. Given Q = {q 1 , . . . , q k } ⊆ P V the operator ∂ Q := ∂ q1 •• • ••∂ q k is</formula><p>well defined modulo logical equivalence (by corollary 4, for every p, q ∈ P V ,</p><formula xml:id="formula_19">∂ p • ∂ q [Γ ] ≡ ∂ q • ∂ p [Γ ]</formula><p>). A consequence of corollary 4 and theorem 5 is that entailment can be located on variables of the goal;</p><formula xml:id="formula_20">Corollary 1. Γ |= F ⇐⇒ ∂ P V \var(F ) [Γ ] |= F</formula><p>We can define an explicit equivalent expression for ∂ p when it is applied to implications. To simplify, suppose that the right-side of implications is a singleton.</p><formula xml:id="formula_21">Lemma 1. Let C i ≡ Y i 1 → Y i 2 be a implications (i = 1, 2, Y i 1 ∩ Y j 2 = ∅), and Γ be a set of implications. Let ∂ c p (C 1 , C 2 ) be the symmetric operator ∂ c p (C 1 , C 2 ) :=            {C 1 , C 2 } p / ∈ var(C 1 ) ∪ var(C 2 ) {C 2 } p ∈ Y 1 1 , p / ∈ var(C 2 ) { Y 1 1 → (Y 1 2 \ {p}), C 2 } p ∈ Y 1 2 , p / ∈ var(C 2 ) { } p ∈ (Y 1 1 ∩ Y 2 1 ) ∪ (Y 1 2 ∩ Y 2 2 ) {Resolvent p (C 1 , C 2 )} p ∈ Y 1 1 ∩ Y 2 2 If ∂ c p [Γ ] := {∂ c p (C 1 , C 2 ) : C 1 , C 2 ∈ Γ }, then ∂ c Q [Γ ] ≡ ∂ Q [Γ ] (Q ⊆ P V ).</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Algebraic characterization of sensitive implications</head><p>We shall provide an algebraic treatment for implications on a fixed M = (O, A, I).</p><p>It is well know that every set X ⊆ (F 2 ) n is an algebraic set; that is, there exists</p><formula xml:id="formula_22">a X ∈ F 2 [x] such that V (a X ) = X. If |A| = n, M is identified with a sub- set X(M ) of (F 2 ) n (each object identified with the 1-0 expresion of its intent). Let a M ∈ F 2 [x] denote a polynomial formula such that V (a M ) = X(M ). Since IV (a M ) = (a M ) + I 2 , the coordinate ring of M is F 2 [x]/ I(X(M )) ∼ = (F 2 [x]/ (a M ) )/ I2</formula><p>One might also use an ideal J X such that V (J X ) = X, if it is better to work with them (for example using CoCoA's command IdealsofPoints). Thus we can assume that I 2 ⊆ J M . We choose a M only to simplify the proofs. Also, each o ∈ O defines a valuation v o defined by: v o (p i ) = 1 iff oIp i .</p><p>Proposition 1. Let F ∈ P F orm and let L be a stem basis. The following conditions are equivalent:</p><p>(1) M |= F.</p><p>(</p><formula xml:id="formula_23">) 1 + π(F ) ∈ (a M ) + I 2 .<label>2</label></formula><p>Moreover, if F is an implication, they are also equivalent to (3) {P (L) :</p><formula xml:id="formula_24">L ∈ L} ∪ {1 + π(F )} ∂ 0. (4) ∂ c P V \var(F ) [L] |= F Proof (1) ⇐⇒ (2): If M |= F , then V (a M ) ⊆ V (1 + π(F )). Thus, IV (1 + π(F )) ⊆ IV (a M ) hence 1 + π(F ) ∈ (a M ) + I 2 .</formula><p>The converse is similar. If F is an implication and M |= F , then L |= F . Therefore L ∪ {¬F } is inconsistent so by completeness, L ∪ {¬F } ∂ ⊥ hence we have <ref type="bibr" target="#b2">(3)</ref>. The converse is true by soundness. ( <ref type="formula">4</ref>) is equivalent to L |= F by lemma 1.</p><p>We now deal with the problem of redundant arguments in implications. In the worst case, the recognizing of redundancy requires a complete exploration of intents. An argument is redundant if it is not sensitive:</p><formula xml:id="formula_25">Definition 4. A formula F is sensitive in p w.r.t. a formal context M if M |= F {p/¬p} ↔ F . We say that F is sensitive w.r.t. M (or simply sensitive, if M is fixed) if F is sensitive in all its variables. Thus, F is not sensitive in p iff M |= ¬ ∂ ∂p F . In this case, there exists G with var(G) =var(F ) \ {p} such that M |= F ↔ G (e.g. F {p/⊥}).</formula><p>Sensitive implications (also called proper implications) have several advantages over implications obtained from pseudo-intents (see <ref type="bibr" target="#b9">[10]</ref>). In attribute exploration, sensitivity analysis is justified: it is possible that implications are based on a nonrepresentative set of examples, and thus they can be refined, basically giving witnesses of the role of the arguments in the implication, or making them more precise, removing redundant arguments:</p><formula xml:id="formula_26">Lemma 2. Let L = Y 1 → Y 2 be an implication. If M |= L and L is not sensitive in p ∈ Y 1 , then M |= Y 1 \ {p} → Y 2 . If p ∈ Y 2 , then M |= ¬Y 1 .</formula><p>By default, sensitivity analysis for implications will be always restricted to attributes in the left-hand side. </p><formula xml:id="formula_27">v o |= ∂ ∂p F , so V (a M ) ⊆ V (π( ∂ ∂p F )) = V ( ∂ ∂xp π(F )), hence ∂ ∂xp π(F ) / ∈ (a M ) + I 2 .</formula><p>(2) =⇒ (1):</p><formula xml:id="formula_28">If ∂ ∂xp π(F ) / ∈ (a M ) + I 2 , then O = V (a M ) ⊆ V (π( ∂ ∂p F )). Therefore there exists o ∈ O such that v o |= ∂ ∂p F . Thus F is sensitive in p.</formula><p>(3) Sensitivity test: If the implication has not been discarded, test whether the implication is sensitive in all its arguments w. r. t. the actual set H (using lemma 2 if necessary). If it is not sensitive in some of them, the user must to react: -Adding a new example o to H, witness of the sensitivity (that is, he/she thinks that it is sensitive), or eliminating the attribute of the implication (it accepts it is not sensitive), changing the accepted implication by the refined one.</p><p>Fig. <ref type="figure" target="#fig_0">2</ref>. Sensitivity test to add to algorithm of fig. <ref type="figure" target="#fig_4">1</ref> One can recursively apply the above criteria (w.r.t. an order on P V ) to obtain sensitive implications. If L is a stem basis and L is the refinement obtained, since Amstrong's rule R2 states</p><formula xml:id="formula_29">Y 1 \ {Y } → Y 2 |= Y 1 → Y 2 , one has that L |= L.</formula><p>Thus L is also a complete set of implications. The set L has an advantage over other sets of proper implications (e.g. <ref type="bibr" target="#b9">[10]</ref>) that it directly works on Duquenne-Guigues basis so it does not need an specific algorithm to build it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Variants of attribute exploration</head><p>We shall propose new steps for attribute exploration. All of them are investigated with the translation into polynomials in mind. Although in the exposition we do not explicitely use polynomials -the results and their proofs are more readable in logical form-in practice they will be useful.</p><p>The attribute exploration can be extended by adding a sensitivity test w.r.t H (shown in fig. <ref type="figure" target="#fig_0">2</ref>). Note that addition of a new object follows the formula a H∪{(δ1,...,δn)} = Φ(a H • (1 + Π n i=1 (x i + δ i + 1)))</p><p>For the running example, the implication N ∧ A → M o is obtained and considered as sound. In this case,</p><formula xml:id="formula_30">a M = x 1 x 2 x 4 + x 1 x 2 + x 1 x 3 + x 1 x 4 + x 1 + 1. A Gröbner basis for a M + I 2 is {x 2 4 + x 4 , x 2 3 + x 3 , x 4 2 + x 2 , x 3 x 4 + x 3 , x 2 x 4 + x 2 + x 3 + x 4 , x 2 x 3 + x 2 , x 1 + 1} It verifies (with CoCoA) that ∂ ∂x1 π(N ∧ A → M o) = x 2 (1 + x 3 ) ∈ (a M ) + I 2</formula><p>We think that is not really sensitive in N (every live being needs water), so we accept A → M o, which is now sensitive. Reasoning similarly with the other one, it obtains {N, A → M o, L → M o}, a stem basis of sensitive implications.</p><p>Sensitivity test can be also added when background knowledge exists. In this case, we deal with hard problems as consistency checking or entailment. It starts with H and a background knowledge Γ for M H , that is, M H |= Γ . Or, in algebraic terms, V (a H ) ⊆ V ({1 + π(F ) : F ∈ Γ }). The step to add is in given figure <ref type="figure">3</ref>. Condition ( * ) means</p><formula xml:id="formula_31">1 + ∂ ∂x p π(L) / ∈ ({1 + π(F ) : F ∈ Γ }) + I 2</formula><p>(3) Sensitivity test: Test whether the implication is sensitive in all its arguments with the actual set H and the background knowledge Γ , that is, whether for each attribute p in the antecedent of L Γ |= L ↔ L{p/¬p} ( * ) If it is not sensitive in some of them, the user must to react:</p><p>-Giving o ∈ O, a witness of the sensitivity (which is added to H), that is</p><formula xml:id="formula_32">vo |= { ∂ ∂p L} ∪ Γ ( * * )</formula><p>-or else removing the attribute of the implication (he/she accepts it is not sensitive).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 3. Sensitivity test with background knowledge</head><p>Regarding to the existence of an object for ( * * ), if the user does not know one, but believes that it really exists, a model search program may be used to give an anonymous object. Test ( * * ) can be fairly translated into algebraic terms.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Attribute exploration with new attributes</head><p>Now we propose how to extend the context by adding new attributes. Formally, one starts with M 0 , a subcontext with partial set of attributes,</p><formula xml:id="formula_33">M 0 = (H, A 0 , I ∩ (H × A 0 )), with A 0 A</formula><p>Assume that, at some stage, full extents for a set H of objects are introduced, with the aim of expanding the new attributes to initial objects of M 0 (see fig. <ref type="figure">5</ref>). The user only knows -about the new attributes-a background knowledge Γ , relating old and new attributes. Since it seems not advisable to add many arguments at once (to facilitate the answers of tests), Γ will be relatively small. It is important to observe that ∆ = L ∪ Γ , where L is the partial set of implications, may be inconsistent with ontological commitments implicitely or unconsciously accepted for the old attributes; that is, it may be false for M 0 , whenever the extents of H were expanded to the full attribute set. Thus one needs an expandability test for objects of H (to simplify assume that the new attributes are {p k+1 , . . . , p n }):</p><formula xml:id="formula_34">For each o ≡ (δ 1 , . . . , δ k ) of H, is there (δ k+1 , . . . δ n ) ∈ {0, 1} n−k such that {p j : δ j = 1 ∧ j ∈ {1, . . . , n}} respects ∆?</formula><p>Theorem 6. Let M be an expansion of M 0 to the complete attribute set, with the same set of objects. If Γ is a stem basis (respectively a background knowledge) for M , then ∂ c {p k+1 ,...,pn} [Γ ] is a complete set of implications (respectively ∂ {p k+1 ,...,pn} [Γ ] is a background knowledge) for M 0 .</p><p>Proof. Assume that Γ is a stem basis. Let L be an implication in the language A \ {p k+1 , . . . , p n }.</p><formula xml:id="formula_35">If M |= L, then Γ |= L. By corollary 1, ∂ p [Γ ] |= L so by lemma 1, ∂ c p [Γ ] |= L holds.</formula><p>If Γ is a background knowledge, the result is a straightforward consequence of corollary 1.</p><p>(3) Expansion test: If implication has not been discarded, test whether the set of implications plus background knowledge is extendable to H.</p><p>-If it is extendable, the user shall proceed:</p><p>• Confirming the suggested implication, or • giving o ∈ O such that {o} does not respect the implication. This is added to H , and the implication is discarded. -Else, it must revise the background knowledge, or to discard the implication Leech</p><formula xml:id="formula_36">1 1 1 0 Frog 1 1 1 1 Maize 1 0 0 0 Fish 1 1 1 0</formula><p>Need water Aquatic Mobility Legs Land Cat</p><formula xml:id="formula_37">1 0 1 1 ? Leech 1 1 1 0 ? Frog 1 1 1 1 ?</formula><p>Maize</p><formula xml:id="formula_38">1 0 0 0 ? Fish 1 1 1 0 0 Dog 1 0 1 1 1</formula><p>Bean</p><formula xml:id="formula_39">1 0 0 0 1</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 5. Extension of the context on live beings with new attributes</head><p>Corollary 2. Let ∆ ⊆ P F orm. The following conditions are equivalent:</p><p>(1) Every extension of objects of H can be expanded to the full attribute set, consistently with ∆.</p><p>(</p><formula xml:id="formula_40">) {1 + π(F ) : F ∈ ∂ {p k+1 ,...,pn} [∆]} ⊆ (a H ) + I 2<label>2</label></formula><p>Assume now that it has previously certified that ∆ is expandable to objects of H, and let L be a new implication. If ∆ ∪ {L} can be consistently extended to H, but the user thinks that it is not true, in a first stage the user is required to give a counterexample for L by completing the extention of some object of H (in this way it bounds the set of new examples), or, if he/she does not know which, a new example. Summarizing, the new step is shown in figure <ref type="figure" target="#fig_1">4</ref>.</p><p>For example, suppose that we decide to add a new attribute, to live in land (La). Some complete extensions are given (figure <ref type="figure">5</ref>). We only know as background knowledge that aquatic live beings do not live in land, and we consider the implication every live being with legs and mobility lives in land, that is</p><formula xml:id="formula_41">∆ = {A → ¬La, Le ∧ M o → La} In this case, π[∆] = {1 + x A x La , 1 + x Le x M o + x Le x M o x La }.</formula><p>The set H can not be consistently expanded to a model of ∆, because</p><formula xml:id="formula_42">∂ {x La } [π[∆]] = {1 + x A + x A x Le x M , 1} and x A + x A x Le x M / ∈ (a H ) + I 2 .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.1">A final remark: defining the new attributes</head><p>We now see how to extend the above procedure for learning the new attribute. We suppose we have a stem basis consistent with old information; and, in a second stage, we wish to find a definition of the new attribute w.r.t the old ones (if the user thinks it is possible). The next theorem states a solution, which is an adaptation of predicate completion procedure (sect. 6.2 in <ref type="bibr" target="#b4">[5]</ref>). That is, we are considering the stem basis is a complete knowledge base for the attribute. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">An application: discovering tree notion in graph theory</head><p>We shall investigate the relationship among several properties on graphs (with three or more nodes), comparing stem basis produced by classical attribute exploration with the result of the new methods. The properties are: acyclic, connected, 2-connected (if one edge of the graph is removed, the induced subgraph is connected), geodetic (for every two nodes there exists only one shortest path), bipartite (it can be partionated the set of nodes in two sets such that every edge joins a node of each set), nonseparable (connected and, if one removes a node, the resulting graph remains connected), and planar.</p><p>We begun (classical) attribute exploration with the two first objects of figure 6 (left). For this we used ConExp, and the result is the formal context of fig. <ref type="figure" target="#fig_3">6</ref> (left. K 5 is the complete graph with five nodes, and K 33 is the complete bipartite graph with two sets of tree nodes each one as partition). The stem basis is:</p><formula xml:id="formula_43">L 1 : t → a, b, c, g, p L 2 : n → c, d L 3 : g → c L 4 : d → c L 5 : b, c, g, p → a, t L 6 : b, c, d, g → n L 7 : a → b, p L 8 : a, c, b, p → g, t</formula><p>One might apply completion procedure on tree, obtaining a (messy) definition,</p><formula xml:id="formula_44">(Bipartite ∧ Connected ∧ Geodetic ∧ Planar) ∨ (Acyclic ∧ Connected ∧ Bipar- tite ∧ Planar)</formula><p>Even it is not evident that the first conjuction defines a tree; it is necessary to know the fact that every geodetic and bipartite graph is acyclic. For this context, the ideal generated is</p><formula xml:id="formula_45">J M = (g + b + t + 1, c + d + t, a + d + 1, t 2 + t, pt + t, nt, bt + t, dt, p 2 + p, np + n + p + 1, dp + d + p + 1, n 2 + n, dn + n, b 2 + b, db + d + b + 1, d 2 + d).</formula><p>The first interesting sensitivity analysis is on L 5 (π(L 5 ) = 1 + bcgp(1 + at)): T ree ↔ (Bipartite ∧ Geodetic) ∨ (Acyclic ∧ Connected) It easy to see that the first conjunction is equivalent to the second one, the original definition of tree.</p><p>Our next aim is to expand our set of attributes with a new one, radiusminimal (denoted as variable by r). The distance of two nodes of a graph is the length of a shortest path between them. The eccentricity of a node v is the distance to a node farthest from v. The radius of a graph G, r(G), is the minimum eccentricity of the nodes. Finally, a graph is called radius-minimal if r(G − e) &gt; r(G) for every edge in G. We used the method shown in section 6; the objects of fig. <ref type="figure" target="#fig_3">6</ref> suffices for it.</p><p>The exploration starts with the first two objects of figure <ref type="figure" target="#fig_3">6</ref>, knowing that the first one is radius-minimal and the second one is not. Also we have the background knowledge {¬c → ¬r}. The procedure gives the basis  The last two conjunctions are equivalent to Tree, so we conclude that Radiusminimal and Tree are equivalent. Actually, this result is proved in <ref type="bibr" target="#b5">[6]</ref>. Thus we take v o (r) := t to extend the attribute r for objects.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8">Conclusions and Future work</head><p>We present a framework for solving problems of FCA with the assistance of a CAS. We are confident that the tools described here may be useful to facilitate knowledge processing. As mentioned in previous sections, the complexity of some subproblems involved in the improvements of attribute exploration may restrict the method to projects of modest size, if a CAS as CoCoA is not used.</p><p>Throughout the paper we remarked some works related with the tools used here. The future work is the extension to many-valued logics and their applications <ref type="bibr" target="#b8">[9]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Proposition 2 .</head><label>2</label><figDesc>Let p ∈var(F ). The following conditions are equivalent: (1) F is sensitive in p w.r.t. M . (2) ∂ ∂xp π(F ) = 0 in the coordinate ring of M . Proof. (1) =⇒ (2): Assume v o |= F ↔ F {p/¬p} for some o ∈ O. Then</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Aditional step for exploration with new attributes</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Theorem 7 .</head><label>7</label><figDesc>Let M 0 as in section 6 with A 0 = A \ {p}. Assume that L is a stem basis, built by attribute exploration with expansion test. LetΩ = {Y 1 ⊆ A 0 : there exists Y ⊆ A 0 s.t. Y 1 → Y ∪ {p} ∈ L} If M c is the expansion of M 0 to A by defining the intent w.r.t. {p} by p ∈ {o} ⇐⇒ v o ( Y ∈Ω Y ) = 1then L is a stem basis for M c .Since M c |= p ↔ Y ∈Ω Y , M c ismodel of completion formula for p. Thus, the intent of each object o is expanded to p n by the polynomial v o (p n ) := π( Y ∈Ω Y )(v o (p 1 ), . . . , v o (p n−1 ))</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>130Fig. 6 .</head><label>6</label><figDesc>Fig.6. Formal context on graphs, and the extension obtained for radius-minimal</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>L 1 :</head><label>1</label><figDesc>r → a, c, g, b, p, t L 2 : t → a, c, g, b, p, r L 3 : n → c, d L 4 : g → c L 5 : d → c L 6 : c, g, b → a, p, t, r L 7 : a → b, pL 8 : a, c, b, p → g, t, r L 9 : a, c, d, g, b, p, t, r → n After testing sensitivity, three implications are refined, producing:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>L 6 :</head><label>6</label><figDesc>g, b → a, p, t, r L 8 : a, c → g, t, r L 9 : d, r → n and the rest remains. Thus completion for r is Radius-minimal ↔ Tree ∨ (Geodetic ∧ Bipartite) ∨ (Acyclic ∧ Connected)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>set of implications L is closed if and only if the set is closed by Amstrong rules<ref type="bibr" target="#b0">[1]</ref>. A consequence of Amstrong result is that, if A denotes the proof notion associated to Amstrong rules, stem basis are A -complete, that is: Theorem 3. Let L be a stem basis for M , and L an implication. Then M |= L if and only if L A LThe computing of stem basis may be expensive if the set of objects is large. Even it is possible we do not have the complete context M , or it has a potentially infinite set of objects. Attribute exploration is an interactive procedure designed to obtain a stem basis starting with a set H of good examples generating the subcontext M H</figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">José Antonio Alonso-Jiménez, Gonzalo A. Aranda-Corral, Joaquín Borrego-Díaz, M. Magdalena Fernández-Lebrón, M. José Hidalgo-Doblado</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_1">Pseudointents are generated in lexicographic order. This way previously computed pseudointents are preserved by augmentations of H. See th.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="27" xml:id="foot_2">in<ref type="bibr" target="#b2">[3]</ref>.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_3">José Antonio Alonso-Jiménez, Gonzalo A. Aranda-Corral, Joaquín Borrego-Díaz, Magdalena Fernández-Lebrón, M. José Hidalgo-Doblado</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Dependency structures of data base relationships</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">W</forename><surname>Amstrong</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of IFIP Congress</title>
				<meeting>of IFIP Congress<address><addrLine>Geneva</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1974">1974</date>
			<biblScope unit="page" from="580" to="583" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Theoretical foundations of a specialised polynomial-based calculus for computing conservative retractions in propositional logic</title>
		<author>
			<persName><forename type="first">J</forename><surname>Borrego-Díaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fernández-Lebrón</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>to appear</note>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Formal Concepts Analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Mathematical Foundations Springer</publisher>
			<pubPlace>Berlin</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Attribute exploration with background knowledge</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">217</biblScope>
			<biblScope unit="page" from="215" to="233" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Logical Foundations of Artificial Intelligence</title>
		<author>
			<persName><forename type="first">M</forename><surname>Genesereth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Nilsson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1987">1987</date>
			<publisher>Morgan Kaufmann</publisher>
			<pubPlace>Los Altos</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">On radially critical graphs in Recents Advances in Graph Theory</title>
		<author>
			<persName><forename type="first">F</forename><surname>Gliviak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. Sympos. Academia Praha</title>
				<meeting>Sympos. Academia Praha</meeting>
		<imprint>
			<date type="published" when="1975">1975</date>
			<biblScope unit="page" from="207" to="221" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Familles minimales d&apos; implications informatives resultant d&apos;un tableau de donnees binaires</title>
		<author>
			<persName><forename type="first">J.-L</forename><surname>Guigues</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Duquenne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Math. Sci. Humaines</title>
		<imprint>
			<biblScope unit="volume">95</biblScope>
			<biblScope unit="page" from="5" to="18" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">An equational approach to theorem proving in first-order predicate calculus</title>
		<author>
			<persName><forename type="first">D</forename><surname>Kapur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Narendran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 9 Int. Joint Conf. on Artificial Intelligence (IJCAI&apos;85)</title>
				<meeting>9 Int. Joint Conf. on Artificial Intelligence (IJCAI&apos;85)</meeting>
		<imprint>
			<biblScope unit="page" from="1146" to="1153" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A computer algebra approach to verification and deduction in many-valued knowledge systems</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">M</forename><surname>Laita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Roanes-Lozano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>De Ledesma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Alonso-Jiménez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Soft Computing</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="7" to="19" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Computing Proper Implications</title>
		<author>
			<persName><forename type="first">R</forename><surname>Taouil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Bastide</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of Workshop on Concept Lattices-based Theory, Methods and Tools for Knowledge Discovery in Databases</title>
				<editor>
			<persName><forename type="first">E</forename><surname>Mephu</surname></persName>
		</editor>
		<meeting>of Workshop on Concept Lattices-based Theory, Methods and Tools for Knowledge Discovery in Databases</meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="49" to="61" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
