<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>DL-Lite without UNA</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>A. Artale</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>D. Calvanese</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>R. Kontchakov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>M. Zakharyaschev</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>KRDB Research Centre Free University of Bozen-Bolzano I-39100 Bolzano</institution>
          ,
          <addr-line>Italy lastname @inf.unibz.it</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>School of Comp. Science and Inf. Sys. Birkbeck College London WC1E 7HX</institution>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        1 Introduction
Description logics (DLs) have recently been used to provide access to large
amounts of data through a high-level conceptual interface, which is of relevance
to both data integration and ontology-based data access. The fundamental
inference service in this case is answering queries by taking into account the axioms
in the TBox and the data stored in the ABox. The key property for such an
approach to be viable in practice is the e ciency of query evaluation. To address
these needs a series of description logics has been proposed and investigated
in [6{8, 16] (the so-called DL-Lite family) and in [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. The signi cance of the
DL-Lite logics is testi ed by the fact that they form the basis of OWL 2 QL,
one of the three pro les of the web ontology language OWL 2.1 According to the
current version of the o cial W3C pro les document, the purpose of OWL 2 QL
is to be the language of choice for applications that use very large amounts of
data and where query answering is the most important reasoning task.
      </p>
      <p>A very important di erence between description logics and OWL is the status
of the unique name assumption (UNA), which is commonly made in DL but not
adopted in OWL. Instead, the OWL syntax provides explicit means for stating
which object names are supposed to denote the same individual and which of
them should be interpreted di erently (in OWL, these constructs are called
sameAs and differentFrom).</p>
      <p>
        Until recently, it had been assumed that the DL-Lite logics are interpreted
under the UNA. The role of the UNA (for DL-LiteA) is discussed in [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ], where
it is shown that if the UNA is dropped, instance checking becomes
NLogSpacehard for data complexity. The aim of this paper is to investigate in depth the
impact of dropping the UNA on both the combined and data complexity of
reasoning in the DL-Lite family and extensions, classi ed according to the following
features:
(1) the presence or absence of role inclusion assertions;
(2) the form of the allowed concept inclusions, where we consider four classes
core, Krom, Horn, and Bool exhibiting di erent computational properties;
(3) the form of the allowed numeric constraints, ranging from none, to global
functionality constraints only, and to arbitrary number restrictions.
1 http://www.w3.org/TR/owl2-profiles/
      </p>
      <p>In a nutshell, the obtained results can be summarized as follows. Without
any kind of number restrictions, the above logics do not `feel' the UNA. However,
equality between object names increases the data complexity for core and Horn
logics, DL-LitecRore and DL-LitehRorn, from AC0 to LogSpace. (The inequality
constraints do not a ect the complexity.) In the presence of functionality
constraints, dropping the UNA increases the combined complexity of satis ability
for DL-LitecFore and DL-LitekFrom from NLogSpace to P, and the data
complexity of query answering (or instance checking) for DL-LitecFore and DL-LitehForn
from AC0 to P. With arbitrary number restrictions the price is even higher: e.g.,
the data complexity of query answering (or instance checking) for DL-LitecNore
increases from AC0 to coNP if the UNA is not adopted.</p>
      <p>Needless to say that in all these cases we loose the important property of
rst-order rewritability of (positive existential) queries, and so cannot use the
standard database query engines in a straightforward manner. Since the OWL 2
pro les are de ned as syntactic restrictions without changing the basic semantic
assumptions, it was chosen not to include in the OWL 2 QL pro le any construct
that interferes with the UNA and which, in the absence of the UNA, would cause
higher complexity. That is why OWL 2 QL does not include any form of number
restrictions and the sameAs constructor.</p>
      <p>
        As for the matching upper complexity bounds, we show that, without UNA,
the logics of the form DL-Lite(RF) and DL-Lite(RN ) with restricted interaction
between number restrictions and role inclusions (similar to that in DL-LiteA
[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]) behave precisely in the same way as DL-LiteF and DL-LiteN , respectively.
(If this interaction is not restricted then even the logic DL-LitecRo;rFe is
ExpTimehard for combined complexity and P-hard for data complexity [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].)
2
      </p>
      <p>DL-Lite Logics
We begin by de ning the description logic DL-LitebRo;oNl , which can be regarded as
the supremum of the original DL-Lite family [6{8] in the lattice of description
logics. The language of DL-LitebRo;oNl contains object names a0; a1; : : : , concept
names A0; A1; : : : , and role names P0; P1; : : : . Complex roles R and concepts C
are de ned as follows:</p>
      <p>R
B
C
::=
::=
::=</p>
      <p>Pi
?
B
j
j
j</p>
      <p>Pi ;
Ai
:C
j
j</p>
      <p>q R;
C1 u C2;
where q is a positive integer. The concepts of the form B are called basic.</p>
      <p>A DL-LitebRo;oNl TBox, T , is a nite set of concept and role inclusions of
the form C1 v C2 and R1 v R2, respectively. An ABox, A, is a nite set of
assertions of the form Ak(ai); :Ak(ai), Pk(ai; aj ); :Pk(ai; aj ). Taken together,
T and A constitute the DL-LitebRo;oNl knowledge base (KB) K = (T ; A). In the
following, we denote by role(K) the set of role names occurring in T and A, by
role (K) the set fPk; Pk j Pk 2 role(K)g, and by ob(A) the set of object names
in A. For a role R, we set inv(R) = Pk if R = Pk, and inv(R) = Pk if R = Pk .</p>
      <p>As usual, an interpretation, I = ( I ; I ), consists of a domain I 6= ; and
an interpretation function I that assigns to each ai an element aiI 2 I , to Ai a
subset AiI I of the domain, and to each Pi a binary relation PiI I I .
The interpretation of the concept constructs, the concept and role inclusions,
and the ABox assertions is also standard. For example,
( q R)I =
x 2</p>
      <p>I j ]fy 2</p>
      <p>I j (x; y) 2 RI g
q :
A KB K = (T ; A) is satis able if there is an interpretation I satisfying all the
members of T and A, in which case we write I j= K and say that I is a model
of K.</p>
      <p>The unique name assumption (UNA) is the following requirement imposed
on interpretations I: aiI 6= ajI for all i 6= j. As was mentioned in the introduction,
in this paper we do not make this assumption.</p>
      <p>The languages we consider here are obtained by imposing various syntactic
restrictions on DL-LitebRo;oNl . A DL-LitebRo;oNl TBox T is called a Krom TBox if its
concept inclusions are of the form</p>
      <p>B1 v B2;</p>
      <p>B1 v :B2
or
:B1 v B2
(Krom)
(here and below all the Bi and B are basic concepts). T is called a Horn TBox
if its concept inclusions are of the form
l Bk v B
k
(by de nition, the empty conjunction is just &gt;). Finally, T is a core TBox if its
concept inclusions are restricted to</p>
      <p>B1 v B2
or</p>
      <p>B1 v :B2:
As B1 v :B2 is equivalent to B1uB2 v ?, core TBoxes can be regarded as sitting
in the intersection of Krom and Horn TBoxes. The fragments of DL-LitebRo;oNl
with Krom, Horn and core TBoxes are denoted by DL-LitekRr;oNm, DL-LitehRo;rNn
and DL-LitecRo;rNe , respectively.</p>
      <p>For 2 fcore; krom; horn; boolg, we denote by DL-LiteR;F the fragment of
DL-LiteR;N in which, out of all number restrictions q R, we are allowed to
use existential concepts (i.e., 9R ::= 1 R) and only those 2 R that occur in
concept inclusions of the form 2 R v ? (known as global functionality
constraints ). If no number restrictions q R with q 2 are allowed, then we obtain
the fragments denoted by DL-LiteR. And if role inclusions are excluded from the
language then the resulting fragments are denoted by DL-LiteN (with arbitrary
number restrictions), DL-LiteF (with functionality constraints and existential
concepts 9R), and DL-Lite (without number restrictions di erent from 9R).</p>
      <p>
        As shown in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], the logics DL-LitecRo;rFe , DL-LitecRo;rNe and their extensions
turn out to be computationally rather costly, with satis ability being
ExpTimehard for combined complexity and instance checking P-hard or even NP-hard
(Horn)
(core)
for data complexity. On the other hand, for the purpose of conceptual modeling
one may need both concept and role inclusions. A compromise can be found by
arti cially limiting the interplay between role inclusions and number restrictions
in a way similar to the logic DL-LiteA [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>For a TBox T , let vT be the re exive and transitive closure of the relation
(R; R0); (inv(R); inv(R0)) j R v R0 2 T . Say that R0 is a proper sub-role of R
in T if R0 vT R and R0 6vT R.</p>
      <p>Consider now the language DL-Lite(bRooNl ) obtained from DL-LitebRo;oNl by
imposing the following syntactic restriction on its TBoxes T :
(inter) if R has a proper sub-role in T then T contains no negative occurrences 2
of number restrictions q R or q inv(R) with q 2.</p>
      <p>Without spoiling its computational properties, we can allow in this language
positive occurrences of quali ed number restrictions q R:C in TBoxes T provided
that the following condition is satis ed:
(exists) if q R:C occurs in T then T does not contain negative occurrences
of q0 R or q0 inv(R), for q0 2.</p>
      <p>Moreover, we can also allow in DL-Lite(bRooNl ) role disjointness, re exivity,
irre exivity, symmetry and asymmetry constraints. The languages DL-Lite(hRorNn ),
DL-Lite(kRroNm) and DL-Lite(cRorNe ) are de ned as the corresponding fragments of
DL-Lite(bRooNl ) (we only note that a concept C occurring in some q R:C can be
any concept allowed on the right-hand side of concept inclusions in the respective
language or a conjunction thereof).</p>
      <p>We also de ne the languages DL-Lite(RF) as sub-languages of DL-Lite(RN )
in which only number restrictions of the form 9R, 9R:C and functionality
constraints 2 R v ? are allowed|provided, of course, that they satisfy (inter)
and (exists); in particular, 9R:C is not allowed if R is functional.</p>
      <p>Finally, if the UNA is not adopted, it is standard to include in the language
equality and inequality constraints of the form ai aj and ai 6 aj (which are
supposed to belong to the ABox part of a KB) with their obvious semantics.</p>
      <p>We will concentrate on three fundamental reasoning tasks for the logics L of
the resulting family: satis ability, instance checking and query answering. The
KB satis ability problem is to check, given an L-KB K, whether there is a model
of K. The instance checking problem is to decide, given an object name a, an
L-concept C and an L-KB K = (T ; A), whether K j= C(a), that is, aI 2 CI , for
every model I of K. Instance checking and satis ability are (AC0-) reducible to
the complement of each other.</p>
      <p>Finally, we remind the reader that a positive existential query q is any
rstorder formula constructed by means of ^, _ and 9y starting from atoms of the
form A(t) and P (t1; t2), where A is a concept name, P a role name, and t; t1; t2
2 An occurrence of a concept on the right-hand (resp., left-hand) side of a concept
inclusion is called negative if it is in the scope of an odd (resp., even) number of
negations :; otherwise the occurrence is called positive.
Languages</p>
      <p>Combined complexity</p>
      <p>Data complexity
Instance checking</p>
      <p>Query answering</p>
    </sec>
    <sec id="sec-2">
      <title>LogSpace a)</title>
    </sec>
    <sec id="sec-3">
      <title>LogSpace a)</title>
    </sec>
    <sec id="sec-4">
      <title>LogSpace a)</title>
      <p>P
P
[Th.4]
P
[Cor.1]
coNP
[Th.2]
coNP</p>
    </sec>
    <sec id="sec-5">
      <title>LogSpace a)</title>
      <p>[Th.1]</p>
    </sec>
    <sec id="sec-6">
      <title>LogSpace a)</title>
      <p>
        coNP [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]
      </p>
    </sec>
    <sec id="sec-7">
      <title>LogSpace a)</title>
      <p>[Th.5]
coNP</p>
      <p>P
coNP
coNP
coNP
coNP
DL-Lite[cojrRe ]</p>
      <sec id="sec-7-1">
        <title>DL-Lite[krjoRm]</title>
      </sec>
      <sec id="sec-7-2">
        <title>DL-Lite[hojrRn]</title>
      </sec>
      <sec id="sec-7-3">
        <title>DL-Lite[bojoRl ]</title>
        <p>DL-Lite[cForje(=RhFor)n]</p>
      </sec>
      <sec id="sec-7-4">
        <title>DL-Lite[kFrojm(RF)]</title>
      </sec>
      <sec id="sec-7-5">
        <title>DL-Lite[bFoojl(RF)]</title>
        <p>DL-Lite[cNorje=horn</p>
        <p>(RN )]
DL-Lite[kNrojm( R=bNoo)l]</p>
        <p>Satis ability</p>
        <p>
          NLogSpace
NLogSpace [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]
are terms taken from the list of variables y0; y1; : : : and the list of object names
a0; a1; : : : . The free variables of q are called distinguished variables ; we write
q(x1; : : : ; xn) for a query with distinguished variables x1; : : : ; xn. Given a query
q(x) with x = x1; : : : ; xn and an n-tuple a of object names, we write q(a)
for the result of replacing every occurrence of xi in q(x) with the ith member
of a. Queries containing no distinguished variables will be called ground. The
satisfaction relation I j=a q(a) between an interpretation I and a query q under
an assignment a for the variables yi in I is de ned in the usual way (e.g.,
I j=a 9yi ' i I j=b ', for some assignment b in I that may di er from a only
on yi). For a ground query q(a), the relation j=a does not depend on a, and so
we write I j= q(a) instead of I j=a q(a). The answer to such a query is either
`yes' or `no.'
        </p>
        <p>For a KB K = (T ; A), we say that a tuple a of object names from A is
a certain answer to q(x) w.r.t. K and write K j= q(a), if I j= q(a) whenever
I j= K. The query answering problem is to decide, given a tuple a, whether
K j= q(a). Note that instance checking is a special case of query answering.</p>
        <p>The complexity results obtained in this paper for the three reasoning
problems and both combined and data complexity are summarized in Table 1. Some
of them will be proved in the remaining part of the paper.
3</p>
        <p>
          Satis ability: Combined and Data Complexity
As shown in [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], under the UNA, the satis ability problem for combined
complexity is NLogSpace-complete for the logics of the form DL-Lite(cRorNe ) and
DL-Lite(kRroNm), P-complete for DL-Lite(hRorNn ) and NP-complete for DL-Lite(bRooNl ).
For data complexity, satis ability (as well as instance checking) is in AC0 for all
of the above logics and their fragments.
        </p>
        <p>
          Logics of the form DL-LiteR, for 2 fcore; krom; horn; boolg, without
equality constraints do not feel whether the UNA is adopted or not: for combined
complexity, satis ability is NLogSpace-complete for DL-LitecRore and DL-LitekRrom,
P-complete for DL-LitehRorn and NP-complete for DL-LitebRool [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>However, for data complexity, dropping the UNA results in a slightly higher
complexity because of the equality constraints. More precisely, we have:
Theorem 1. Without the UNA and with equality constraints, the satis ability
and instance checking problems for DL-Lite and DL-LiteR, with 2 fcore; krom,
horn; boolg, are LogSpace-complete for data complexity.</p>
        <p>The proof of this theorem is based on the following reduction:
Lemma 1. For every KB K = (T ; A), one can construct in LogSpace in the
size of A a KB K0 = (T ; A0) without equality constraints such that I j= K i
I j= K0, for every interpretation I.</p>
        <p>Proof. Let G = (V; E) be the symmetric graph with</p>
        <p>V = ob(A);</p>
        <p>
          E = (ai; aj ) j ai
aj 2 A or aj
ai 2 A ;
and [ai] the set of all vertices of G that are reachable from ai. De ne A0 by
removing all the equality constraints from A and replacing every ai with aj 2 [ai] with
minimal j. Note that this minimal j can be computed in LogSpace: just
enumerate the object names aj w.r.t. the order of their indices j and check whether the
current aj is reachable from ai in G. It remains to recall that reachability in
undirected graphs is SLogSpace-complete and that SLogSpace = LogSpace [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
        </p>
        <p>In view of the reduction in the proof of Lemma 1 and the fact that AC0 is a
proper subclass of LogSpace, the upper bound in Theorem 1 cannot be lowered
to AC0. However, the AC0 data complexity can be regained if we refrain from
using the equality constraints; see Section 4.</p>
        <p>
          Let us consider now the logics of the form DL-Lite(RN ) and DL-Lite(RF),
together with their fragments.
In this section, we show that the interaction between number restrictions and
the possibility of identifying objects in the ABox results in a higher
complexity. Indeed, it turns out that, for both combined complexity and data
complexity, the satis ability problem for the logics DL-LiteN and DL-Lite(RN ),
2 fcore; krom; horn; boolg, without the UNA is NP-complete. This is quite
di erent from the case when the UNA is adopted, where satis ability is in AC0
for any of the logics DL-Lite(RN ) for data complexity, and is tractable for the
logics DL-Lite(hRorNn ), DL-Lite(kRroNm) and DL-Lite(cRorNe ) under combined
complexity [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
Theorem 2. Without the UNA, satis ability of DL-LitecNore KBs (even
without equality and inequality constraints) is NP-hard for both combined and data
complexity.
        </p>
        <p>
          Proof. The proof is by reduction of the following variant of the 3SAT problem|
called monotone one-in-three 3SAT |which is known to be NP-complete [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]:
given a positive 3CNF formula
n
^
k=1
' =
        </p>
        <p>ak;1 _ ak;2 _ ak;3 ;
where each ak;j is one of the propositional variables a1; : : : ; am, decide whether
there is an assignment for the variables aj such that exactly one variable is
true in each of the clauses in '. To encode this problem in the language of
DL-LitecNore, we need object names aik, for 1 k n, 1 i m, and ck and tk,
for 1 k n, role names S and P , and concept names A1; A2; A3. Let A' be
the ABox containing the following assertions:
and let T be the TBox with the axioms:</p>
        <p>A1 v :A2;</p>
        <p>A2 v :A3;</p>
        <p>A3 v :A1;
2 S v ?;
4 P v ?:
Clearly, (T ; A') is a DL-LitecNore KB and T does not depend on ' (so that
we cover both combined and data complexity). We claim that the answer to the
monotone one-in-three 3SAT problem is positive i (T ; A') is satis able without
the UNA.</p>
        <p>()) Let a be an assignment satisfying the requirements of the problem. Take
some ai0 with a(ai0 ) = t (clearly, such an i0 exists, for otherwise a(') = f) and
construct an interpretation I = ( I ; I ) by taking:
{ I = yk; zk j 1 k n [ xik j a(ai) = f; 1
{ ckI = yk and (tk)I = zk, for 1 k n,</p>
        <p>( k
{ (aik)I = zxki;; iiff aa((aaii)) == ft;; for 1 i m, 1
i
k
m; 1
k</p>
        <p>n ,
n,
{ SI = ((ai1)I ; (ai2)I ); : : : ; ((ain 1)I ; (ain)I ); ((ain)I ; (ai1)I ) j 1
{ P I = (ckI ; (tk)I ) j 1 k n [ (ckI ; (akk;j)I ) j 1 k n; 1
i
j
m ,
3 .</p>
        <p>It is readily checked that I j= (T ; A').</p>
        <p>(() Suppose I j= K. De ne an assignment a by taking a(ai) = t i (ai1)I =
(t1)I . Our aim is to show that a(ak;j) = t for exactly one j 2 f1; 2; 3g, for each k,
1 k n. We have P I (ckI ; (akk;j)I ) for all j = 1; 2; 3. Moreover, (akk;i)I 6= (akk;j)I
for i 6= j. As ckI 2 ( 3 P )I and P I (ckI ; (tk)I ), we then must have (akk;j )I = (tk)I
for some unique j 2 f1; 2; 3g. It follows from functionality of S that, for each
1 k n, we have (a1k;j )I = (t1)I for exactly one j 2 f1; 2; 3g. tu</p>
        <p>The next theorem establishes a matching upper bound:
Theorem 3. Without the UNA, satis ability of DL-LiteN and DL-Lite(RN )
KBs with equality and inequality constraints is NP-complete for both combined
complexity and data complexity and any 2 fcore; krom; horn; bool g.
Proof. The upper bound can proved using the following non-deterministic
algorithm. Given a DL-Lite(bRooNl ) KB K = (T ; A), we
{ guess an equivalence relation over ob(A);
{ select in each equivalence class ai= a representative, say ai, and replace
every occurrence of ai0 2 ai= in A with ai;
{ fail if the equalities and inequalities are violated in the resulting ABox|i.e.,
if it contains ai 6 ai or ai aj , for i 6= j;
{ otherwise, remove the equality and inequality constraints from the ABox
and denote the result by A0;
{ use an NP satis ability checking algorithm for DL-LitebNool to decide whether
the KB K0 = (T ; A0) is consistent under the UNA.</p>
        <p>Clearly, if the algorithm returns `yes,' then I0 j= K0, for some I0 respecting
the UNA, and we can construct a model I of K (not necessarily respecting
the UNA) by extending I0 with the following interpretation of object names:
aI = aiI0 , whenever ai is the representative of a= (I coincides with I0 on all
other symbols). Conversely, if I j= K then we take the equivalence relation
de ned by ai aj i aiI = ajI . Let I0 be constructed from I by removing the
interpretations of all object names that are not representatives of the equivalence
classes for . It follows that I0 respects the UNA and is a model of K0, so the
algorithm returns `yes.'
tu
3.2</p>
        <p>
          DL-Lite(RF): Functionality Constraints
Let us consider now DL-Lite(bRooFl) and its fragments. In the absence of the UNA,
the necessity to identify pairs of objects due to functionality constraints also
causes an increase in complexity. However, this increase is less dramatic as
the procedure of identifying objects is deterministic: without the UNA, the
satis ability problem for the logics of the form DL-LiteF and DL-Lite(RF),
2 fcore; krom; horn; boolg, is P-complete for data complexity (under the UNA,
it is in AC0 [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]). For the combined complexity, satis ability in DL-LiteF and
DL-Lite(RF), 2 fcore; kromg, becomes P-complete rather than
NLogSpacecomplete as it is under the UNA (and remains the same for 2 fhorn; boolg).
        </p>
        <p>The following lemma shows that for all these logics reasoning without the
UNA can be reduced in polynomial time in the size of the ABox to reasoning
under the UNA.
Lemma 2. For every DL-Lite(bRooFl) KB K = (T ; A) with equality and inequality
constraints, one can construct in polynomial time in jAj a DL-Lite(bRooFl) KB
K0 = (T ; A0) such that A0 contains neither equalities nor inequalities, and K is
satis able without the UNA i K0 is satis able under the UNA.</p>
        <p>Proof. In what follows by identifying aj with ak in A we mean replacing each
occurrence of ak in A with aj . We construct A0 by rst identifying aj with ak,
for each aj ak 2 A, and removing the equality from A, and then exhaustively
applying the following procedure to A:
{ if 2 R v ? 2 T , R1 vT R, R2 vT R, and R1(ai; aj ); R2(ai; ak) 2 A, for
distinct aj and ak, then identify aj with ak.</p>
        <p>
          If the resulting ABox contains ai 6 ai, for some ai, then, clearly, K is not
satis able, so we add A(ai) and :A(ai) to the ABox, for some concept name
A. Finally, we remove all inequalities from the ABox and denote the result by
A0. It should be clear that A0 is computed from A in polynomial time and that,
without the UNA, K is satis able i K0 is satis able. So it su ces to show
that K0 is satis able without the UNA i it is satis able under the UNA. The
implication (() is trivial. To prove ()), observe that every model I for K0 not
respecting the UNA can be transformed into a model I of K0 respecting the UNA
by starting from the set of all object names, which are interpreted as distinct
domain elements, and applying the unraveling procedure to cure the defects in
the interpretation (for details see Lemmas 8.4 and 5.14 in [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]).
tu
        </p>
        <p>The reduction above cannot be done better than in P, as shown by the next
theorem.</p>
        <p>Theorem 4. Without the UNA, satis ability of DL-LitecFore KBs (even
without equality and inequality constraints ) is P-hard for both combined and data
complexity.</p>
        <p>Proof. The proof is by reduction of the entailment problem for Horn-CNF, which
is known to be P-complete (see, e.g., [3, Exercise 2.2.4]). Let
n
^
k=1
' =
ak;1 ^ ak;2 ! ak;3
^
p
^ al;0
l=1
be a Horn-CNF formula, where each ak;j and each al;0 is one of the propositional
variables a1; : : : ; am and ak;1, ak;2, ak;3 are all distinct, for each k, 1 k n.
To encode the P-complete problem `' j= ai?' in the language of DL-LitecFore we
need object names aik, for 1 k n, 1 i m, fk and gk, for 1 k n and t
and role names P , Q, S and T . The ABox A contains the following assertions
S(ai1; ai2); : : : ; S(ain 1; ain); S(ain; ai1);
for 1
i
P (akk;1; fk); P (akk;2; gk); Q(gk; akk;3); Q(fk; akk;1);
m;
for 1
T (t; al1;0);
for 1
l
p;
k</p>
        <p>n;
and the TBox T asserts that all of the roles are functional:
2 P v ?;
2 Q v ?;
2 S v ?
and
2 T v ?:
Clearly, K = (T ; A) is a DL-LitecFore KB and T does not depend on '. We claim
that ' j= aj i K0 = (T ; A [ f:T (t; aj1)g) is not satis able without the UNA. It
su ces to prove that ' j= aj i I j= T (t; aj1) in every model I of K.</p>
        <p>()) Let I j= K and suppose ' j= aj . Then we can derive aj from ' using
the following inference rules:
{ ' j= al;0 for each l, 1 l p;
{ if ' j= ak;1 and ' j= ak;2, for some k, 1
k
n, then ' j= ak;3.</p>
        <p>We show the claim by induction on the length of the derivation of aj from '.
The basis of induction is trivial. So assume that aj = ak;3, ' j= ak;1, ' j= ak;2,
for some k, 1 k n, and that I j= T (t; a1k;1) ^ T (t; a1k;2). Since T is functional,
we have (a1k;1)I = (a1k;2)I . Since S is functional, (akk;01)I = (akk0;2)I , for all k0,
1 k0 n, and in particular, for k0 = k. Then, since P is functional, fkI = gkI ,
from which, by functionality of Q, (akk;3)I = (akk;1)I . Finally, since S is functional,
(akk0;3)I = (akk0;1)I , for all k0, 1 k0 n, and in particular, for k0 = 1. Thus,
I j= T (t; aj1).</p>
        <p>(() Suppose that ' 6j= aj . Then there is an assignment a such that a(') = t
and a(aj ) = f. Construct an interpretation I by taking
{</p>
        <p>I =
xik j a(ai) = f; 1
k</p>
        <p>n; 1
(xik; if a(ai) = f;</p>
        <p>for 1
{ (aik)I =</p>
        <p>zk; if a(ai) = t;
{ tI = w, T I = (w; z1) ,
{ SI = ((ai1)I ; (ai2)I ); : : : ; ((ain 1)I ; (ain)I ); ((ain)I ; (ai1)I ) j 1</p>
        <p>(vk; if a(ak;2) = f;
{ fkI = uk
and</p>
        <p>gkI =
{ P I = ((akk;1)I ; fkI ); ((akk;2)I ; gkI ) j 1
{ QI = (gkI ; (akk;3)I ); (fkI ; (akk;1)I ) j 1
uk; if a(ak;2) = t;
k
k</p>
        <p>for 1
n ,
n .</p>
        <p>It is readily checked that I j= K and I 6j= T (t; aj1).
i
k
m [
zk; uk; vk j 1
n and 1
i
k</p>
        <p>k
m,
n,
n [ w ,
i
m ,
tu</p>
        <p>
          The above result strengthens the NLogSpace lower bound for instance
checking in DL-LitecFore given in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
        <p>Corollary 1. Without the UNA, the satis ability problems for DL-LiteF and
DL-Lite(RF) KBs, 2 fcore; krom; horng, with equalities and inequalities are
P-complete for both combined complexity and data complexity.</p>
        <p>Without the UNA, satis ability of DL-LitebFool and DL-Lite(bRooFl) KBs with
equalities and inequalities is NP-complete for combined complexity and
P-complete for data complexity.
Proof. The upper bounds follow from Lemma 2 and the corresponding upper
bounds for the UNA case. The NP lower bound for combined complexity is
obvious and the P lower bounds follow from Theorem 4.
tu
4</p>
        <p>
          Query Answering: Data Complexity
The P and coNP upper bounds for data complexity of query answering in
DL-LitehRo;rFn and DL-LitebRo;oNl without the UNA follow immediately from the
results for Horn-SHIQ [
          <xref ref-type="bibr" rid="ref12 ref9">12, 9</xref>
          ] and SHIQ [
          <xref ref-type="bibr" rid="ref11 ref14 ref15">14, 15, 11</xref>
          ], respectively. We show now
that the maximal DL-Lite logic for which query answering remains in AC0
without the UNA is the logic DL-LitehRorn extended with role constraints as
speci ed in the following theorem:
Theorem 5. Without the UNA, the positive existential query answering
problem for DL-LitehRorn KBs with disjointness, (a)symmetry, (ir )re exivity role
constraints and inequalities (but without equalities ) is in AC0 for data complexity.
It is LogSpace-complete for data complexity and KBs with equality constraints.
Proof. The proof follows the lines of the proof of [2, Theorem 7.1] given for
the UNA case and uses the observation that models without the UNA produce
no more answers than their unravelled counterparts. More precisely, let K0 =
(T 0; A0) be a consistent DL-LitehRorn KB, and q(x) a positive existential query.
Then [2, Lemma 5.17] provides a DL-LitehRorn KB K that has no role constraints
but may still have inequality constraints. The following lemma shows that one
can simply ignore the inequality constraints in K0 and thus reduces the query
answering problem without the UNA to query answering under the UNA:
Lemma 3. For every tuple a of object names in K0, we have K0 j= q(a) (in
models without the UNA) i I j= q(a) for all models I of K respecting the
UNA.
        </p>
        <p>Proof. ()) Suppose that K j</p>
        <p>0 = q(a) and I is a model of K respecting the UNA.</p>
        <p>In view of satis ability of K0, we have I j= K0, and thus I j= q(a).</p>
        <p>(() Take any I0 with I0 j= K0. We construct an interpretation J 0 respecting
the UNA as follows. Let J 0 be the disjoint union of I0 and ob(A). De ne a
function h : J 0 ! I0 by taking h(a) = aI0 , for each a 2 ob(A), and h(w) = w,
for each w 2 I0 , and let
aJ 0 = a; AJ 0 =
u j h(u) 2 AI0</p>
        <p>and P J 0 = (u; v) j (h(x); h(v)) 2 P I0 ;
for all object, concept and role names a, A, P . Clearly, J 0 respects the UNA
and J 0 j= K0. It also follows that h is a homomorphism. By [2, Lemma 5.17],
there is a model I of K with the same domain as J 0 that coincides with J 0 on
all symbols in K0. As I j= q(a), we must then have J 0 j= q(a), and since h is a
homomorphism, I0 j= q(a). Therefore, K0 j= q(a) in models without the UNA,
as required.
tu</p>
        <p>The remaining part of the proof of the theorem is exactly as in [2,
Theorem 7.1], as now we may assume that K is a DL-LitehRorn KB containing neither
inequality nor role constraints.</p>
        <p>tu</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A.</given-names>
            <surname>Artale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kontchakov</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zakharyaschev</surname>
          </string-name>
          .
          <article-title>DL-Lite in the light of rst-order logic</article-title>
          .
          <source>In Proc. of the 22nd Nat. Conf. on Arti cial Intelligence (AAAI</source>
          <year>2007</year>
          ), pages
          <fpage>361</fpage>
          {
          <fpage>366</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>A.</given-names>
            <surname>Artale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kontchakov</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zakharyaschev</surname>
          </string-name>
          .
          <article-title>The DL-Lite family and relations</article-title>
          .
          <source>Technical Report BBKCS-09-03</source>
          , School of Computer Science and Information Systems, Birbeck College, London,
          <year>2009</year>
          . Available at http:// www.dcs.bbk.ac.uk/research/techreps/2009/bbkcs-09-03.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. E. Borger, E. Gradel, and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gurevich</surname>
          </string-name>
          .
          <article-title>The Classical Decision Problem</article-title>
          .
          <source>Perspectives in Mathematical Logic</source>
          . Springer,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lembo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lenzerini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Poggi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>Mastro-i: E cient integration of relational data through DL ontologies</article-title>
          .
          <source>In Proc. of the 2007 Description Logic Workshop (DL</source>
          <year>2007</year>
          ), volume
          <volume>250</volume>
          <source>of CEUR Electronic Workshop Proceedings</source>
          , http://ceur-ws.
          <source>org/</source>
          , pages
          <fpage>227</fpage>
          {
          <fpage>234</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lembo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lenzerini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Poggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ruzzi</surname>
          </string-name>
          .
          <article-title>Data integration through DL-LiteA ontologies</article-title>
          .
          <source>In Revised Selected Papers of the 3rd Int. Workshop on Semantics in Data and Knowledge Bases (SDKB</source>
          <year>2008</year>
          ), volume
          <volume>4925</volume>
          of Lecture Notes in Computer Science, pages
          <volume>26</volume>
          {
          <fpage>47</fpage>
          . Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lembo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lenzerini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>DL-Lite: Tractable description logics for ontologies</article-title>
          .
          <source>In Proc. of the 20th Nat. Conf. on Arti cial Intelligence (AAAI</source>
          <year>2005</year>
          ), pages
          <fpage>602</fpage>
          {
          <fpage>607</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lembo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lenzerini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>Data complexity of query answering in description logics</article-title>
          .
          <source>In Proc. of the 10th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR</source>
          <year>2006</year>
          ), pages
          <fpage>260</fpage>
          {
          <fpage>270</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lembo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lenzerini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>Tractable reasoning and e cient query answering in description logics: The DL-Lite family</article-title>
          .
          <source>J. of Automated Reasoning</source>
          ,
          <volume>39</volume>
          (
          <issue>3</issue>
          ):
          <volume>385</volume>
          {
          <fpage>429</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>T.</given-names>
            <surname>Eiter</surname>
          </string-name>
          , G. Gottlob,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ortiz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Simkus</surname>
          </string-name>
          .
          <article-title>Query answering in the description logic Horn-SHIQ</article-title>
          .
          <source>In Proc. of the 11th Eur. Conference on Logics in Arti cial Intelligence (JELIA</source>
          <year>2008</year>
          ), pages
          <fpage>166</fpage>
          {
          <fpage>179</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>M.</given-names>
            <surname>Garey</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Johnson</surname>
          </string-name>
          . Computers and
          <article-title>Intractability: A Guide to the Theory of NP-Completeness</article-title>
          .
          <string-name>
            <given-names>W. H.</given-names>
            <surname>Freeman</surname>
          </string-name>
          ,
          <year>1979</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>B.</given-names>
            <surname>Glimm</surname>
          </string-name>
          , I. Horrocks,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>U.</given-names>
            <surname>Sattler</surname>
          </string-name>
          .
          <article-title>Conjunctive query answering for the description logic SHIQ</article-title>
          .
          <source>In Proc. of the 20th Int. Joint Conf. on Arti cial Intelligence (IJCAI</source>
          <year>2007</year>
          ), pages
          <fpage>399</fpage>
          {
          <fpage>404</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. U. Hustadt,
          <string-name>
            <given-names>B.</given-names>
            <surname>Motik</surname>
          </string-name>
          , and
          <string-name>
            <given-names>U.</given-names>
            <surname>Sattler</surname>
          </string-name>
          .
          <article-title>Data complexity of reasoning in very expressive description logics</article-title>
          .
          <source>In Proc. of the 19th Int. Joint Conf. on Arti cial Intelligence (IJCAI</source>
          <year>2005</year>
          ), pages
          <fpage>466</fpage>
          {
          <fpage>471</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>R.</given-names>
            <surname>Kontchakov</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zakharyaschev</surname>
          </string-name>
          .
          <article-title>DL-Lite and role inclusions</article-title>
          .
          <source>In Proc. of the 3rd Asian Semantic Web Conf. (ASWC</source>
          <year>2008</year>
          ), volume
          <volume>5367</volume>
          of Lecture Notes in Computer Science, pages
          <volume>16</volume>
          {
          <fpage>30</fpage>
          . Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>M. Ortiz</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Calvanese</surname>
            , and
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Eiter</surname>
          </string-name>
          .
          <article-title>Characterizing data complexity for conjunctive query answering in expressive description logics</article-title>
          .
          <source>In Proc. of the 21st Nat. Conf. on Arti cial Intelligence (AAAI</source>
          <year>2006</year>
          ), pages
          <fpage>275</fpage>
          {
          <fpage>280</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>M. Ortiz</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Calvanese</surname>
            , and
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Eiter</surname>
          </string-name>
          .
          <article-title>Data complexity of query answering in expressive description logics via tableaux</article-title>
          .
          <source>J. of Automated Reasoning</source>
          ,
          <volume>41</volume>
          (
          <issue>1</issue>
          ):
          <volume>61</volume>
          {
          <fpage>98</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>A.</given-names>
            <surname>Poggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lembo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lenzerini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>Linking data to ontologies</article-title>
          .
          <source>J. on Data Semantics</source>
          , X:
          <volume>133</volume>
          {
          <fpage>173</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>O.</given-names>
            <surname>Reingold</surname>
          </string-name>
          .
          <article-title>Undirected connectivity in log-space</article-title>
          .
          <source>J. of the ACM</source>
          ,
          <volume>55</volume>
          (
          <issue>4</issue>
          ),
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>A.</given-names>
            <surname>Schaerf</surname>
          </string-name>
          .
          <article-title>On the complexity of the instance checking problem in concept languages with existential quanti cation</article-title>
          .
          <source>J. of Intelligent Information Systems</source>
          ,
          <volume>2</volume>
          :
          <fpage>265</fpage>
          {
          <fpage>278</fpage>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>