<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards Approximative Most Specific Concepts by Completion for EL with Subjective Probabilities</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rafael Pen˜ aloza</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anni-Yasmin Turhan</string-name>
        </contrib>
      </contrib-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Introduction
In Description Logics the inference most specific concept (msc) constructs a concept
description that generalizes an individual into a concept description. For the Description
Logic EL the msc needs not exist [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], if computed with respect to general EL-TBoxes.
However, it is still possible to find a concept description that is the msc up to a fixed
role-depth. In this paper we present a practical approach for computing the role-depth
bounded msc, based on the polynomial-time completion algorithm for EL. We extend
this method to a simple probabilistic variant of EL that can express subjective
probabilities and that was recently introduced in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The probabilistic DL that we use, called
Prob-E Lc01, allows only a fairly limited use of uncertainty. More precisely, it is only
possible to express that a concept may hold (P&gt;0C), or that it holds almost surely (P=1C).
Despite its limited expressivity, this logic is interesting due to its nice algorithmic
properties; as shown in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], subsumption can be decided in polynomial time and instance
checking can be performed in polynomial time as well.
      </p>
      <p>
        Many practical applications that need to represent probabilistic information, such as
medical applications or context-aware applications, need to characterize that
observations only hold with certain probability. Furthermore, these applications face the
problem that information from different sources does not coincide or that different diagnoses
yield differing results. These applications need to “integrate” differing observations for
the same state of affairs. A way to determine what the different information sources
agree upon is to represent this information as ABox individuals and to find a common
generalization of these individuals. A description of such a generalization of a group
of ABox individuals can be obtained by applying the so-called bottom-up approach for
constructing knowledge bases [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In this approach a set of individuals is generalized
into a single concept description by first generating the msc of each concept and then
apply the least common subsumer (lcs) to the set of obtained concept descriptions to
extract their commonalities.
      </p>
      <p>
        The second step, i.e., a computation procedure for the approximative lcs has been
investigated for EL and Prob-E Lc01 in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In this paper we present a similar procedure
for the msc. We devise a practical algorithm for computing the msc up to a certain
role-depth for EL and Prob-E L01
      </p>
      <p>
        c . The so-called k-msc obtained by the algorithm is
still a generalization of the input, but not necessarily the least one – in this sense it
is only an approximation of the msc. Moreover, our algorithms are based upon the
completion algorithms for EL and Prob-E Lc01 and thus can be easily implemented on
top of reasoners of these DLs. Due to space limitations the proofs can be found in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>EL and Prob-E L</title>
      <p>We introduce the DL EL and its probabilistic variant Prob-E Lc01. Let NI , NC and NR be
disjoint sets of individual-, concept- and role names, respectively. Prob-E Lc01-concept
descriptions are built using the syntax rule</p>
      <p>C ::= ⊤ | A | C ⊓ D | ∃r.C | P&gt;0C | P=1C,
where A ∈ NC , and r ∈ NR. EL-concept descriptions are Prob-E Lc01-concept
description that do not contain the constructors P&gt;0 or P=1.</p>
      <p>A knowledge base K = (T , A) consists of a TBox T and an ABox A. An EL-
(ProbE Lc01-)TBox is a finite set of concept inclusions (CIs) of the form C ⊑ D, where C, D
are EL- (Prob-E L01</p>
      <p>c -)concept descriptions. An EL-ABox is a set of assertions of the
form C(a), r(a, b), where C is an EL-concept description, r ∈ NR, and a, b ∈ NI . A
Prob-E Lc01-ABox is a set of assertions of the form C(a), r(a, b), P&gt;0r(a, b), P=1r(a, b),
where C is a Prob-E L01</p>
      <p>c -concept description, r ∈ NR, and a, b ∈ NI .</p>
      <p>
        The semantics of EL is defined by means of interpretations I = (ΔI , ·I ) consisting
of a non-empty domain ΔI and an interpretation function ·I that assigns binary
relations on ΔI to role names, subsets of ΔI to concepts and elements of ΔI to individual
names. For a more detailed description of this semantics, see [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>An interpretation I satisfies a concept inclusion C ⊑ D, denoted as I |= C ⊑ D if
CI ⊆ DI ; it satisfies an assertion C(a) (r(a, b)), denoted as I |= C(a) (I |= r(a, b))
if aI ∈ CI ((aI , bI ) ∈ rI ). It is a model of a knowledge base K = (T , A) if it satisfies
all CIs in T and all assertions in A.</p>
      <p>The semantics of Prob-E Lc01 generalizes the semantics of EL. A probabilistic
interpretation is of the form</p>
      <p>I = (ΔI , W, (Iw)w∈W , μ),
where ΔI is the (non-empty) domain, W is a set of worlds, μ is a discrete probability
distribution on W , and for each world w ∈ W , Iw is a classical EL interpretation with
domain ΔI , where aIw = aIw′ for all a ∈ NI , w, w′ ∈ W . The probability that a given
element of the domain d ∈ ΔI belongs to the interpretation of a concept name A is
pdI (A) := μ({w ∈ W | d ∈ AIw }).</p>
      <p>The functions Iw and pdI are extended to complex concepts in the usual way for the
classical EL constructors, where the extension to the new constructors P∗ is defined as
(P&gt;0C)Iw := {d ∈ ΔI | pdI (C) &gt; 0},
(P=1C)Iw := {d ∈ ΔI | pdI (C) = 1}.</p>
      <p>A probabilistic interpretation I satisfies a concept inclusion C ⊑ D, denoted as I |=
C ⊑ D if for every w ∈ W it holds that CIw ⊆ DIw . It is a model of a TBox T if
it satisfies all concept inclusions in T . Let C, D be two Prob-E Lc01 concepts and T a
TBox. We say that C is subsumed by D w.r.t. T (C ⊑T D) if for every model I of
T it holds that I |= C ⊑ D. The probabilistic interpretation I satisfies the assertion
P&gt;0r(a, b) if μ({w ∈ W | Iw |= r(a, b)}) &gt; 0, and analogously for P=1r(a, b). I
satisfies the ABox A if there is a w ∈ W such that Iw |= A.</p>
      <p>Finally, an individual a ∈ NI is an instance of a concept description C w.r.t. K
(K |= C(a)) if I |= C(a) for all models I of K. The ABox realization problem is to
compute for each individual a in A the set of named concepts from K that have a as an
instance and that are least (w.r.t. ⊑). In this paper we are interested in computing most
specific concepts.</p>
      <p>Definition 1 (most specific concept). Let L be a DL, K = (T , A) be a L-KB. The most
specific concept (msc) of an individual a from A is the L-concept description C s. t.
1. K |= C(a), and
2. for each L-concept description D holds: K |= D(a) implies C ⊑T D.
The msc depends on the DL in use. For the DLs with conjunction as concept constructor
the msc is, if it exists, unique up to equivalence. Thus it is justified to speak of the msc.
3</p>
      <p>
        Completion-based Instance Checking Algorithms
Now we briefly sketch the completion algorithms for instance checking in EL [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and
Prob-E Lc01 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
3.1
      </p>
      <sec id="sec-2-1">
        <title>Completion Algorithms for EL</title>
        <p>Assume we want to test for an EL-KB K = (T , A) whether K |= D(a) holds. The
completion algorithm first augments the knowledge base by introducing a concept name
for the complex concept description D from the instance check, i.e., it sets K = (T ∪
{Aq ≡ D}, A), where Aq is a new concept name not appearing in K. The instance
checking algorithm for EL works on normalized knowledge bases. The normalization
is done in two steps: first the ABox is transformed into a simple ABox. An ABox is a
simple ABox, if it only contains concept names in concept assertions. An EL-ABox A
can be transformed into a simple ABox by first replacing each complex assertion C(A)
in A by A(a) with a fresh name A and, second, introduce A ≡ C in the TBox.</p>
        <p>After this step the TBox is normalized. For a concept description C let CN(C)
denote the set of all concept names and RN(C) denote the set of all role names that
appear in C. The signature of a concept description C (denoted sig(C)) is CN(C) ∪
RN(C). Similarly, the set of concept (role) names that appear in a TBox are denoted
by CN(T ) (RN(T )). The signature of a TBox T (denoted sig(T )) is CN(T ) ∪ RN(T ).
The signature of an ABox A (denoted sig(A)) is the set of concept (role / individual)
names CN(A) (RN(A)/IN(A) resp.) that appear in A. The signature of a KB K = (T ,
A) (denoted sig(K)) is sig(T ) ∪ sig(A).</p>
        <p>Now, an EL-TBox T is in normal form if all concept axioms have one of the
following forms, where C1, C2 ∈ sig(T ) and D ∈ sig(T ) ∪ {⊥}:</p>
        <p>C1 ⊑ D,</p>
        <p>Any EL-TBox can be transformed into normal form by introducing new concept names
and by applying the normalization rules displayed in Figure 1 exhaustively. These rules
replace the GCI on the left-hand side of the rules with the set of GCIs on the right-hand
NF1 C ⊓ Dˆ ⊑ E −→ { Dˆ ⊑ A, C ⊓ A ⊑ E }
NF2 ∃r.Cˆ ⊑ D −→ { Cˆ ⊑ A, ∃r.A ⊑ D }
NF3 Cˆ ⊑ Dˆ −→ { Cˆ ⊑ A, A ⊑ Dˆ }
NF4 B ⊑ ∃r.Cˆ −→ { B ⊑ ∃r.A, A ⊑ Cˆ }
NF5 B ⊑ C ⊓ D −→ { B ⊑ C, B ⊑ D }
where Cˆ, Dˆ 6∈ BCT and A is a new concept name.
side. Clearly, for a KB K = (T , A) the signature of A may be changed only during the
first of the two normalization steps and the signature of T may be extended during both
of them. The normalization of the KB can be done in linear time.</p>
        <p>
          The completion algorithm for instance checking is based on the one for classifying
EL-TBoxes introduced in [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. The completion algorithm constructs a representation of
the minimal model of K. Let K =(T , A) be a normalized EL-KB, i.e., with a simple
ABox A and a TBox T in normal form. The completion algorithm works on four kinds
of completion sets: S(a), S(a, r), S(C) and S(C, r) for each a ∈ IN(A), C ∈ CN(K)
and r ∈ RN(K). The completion sets contain concept names from CN(K). Intuitively,
the completion rules make implicit subsumption and instance relationships explicit in
the following sense:
– D ∈ S(C) implies that C ⊑T D,
– D ∈ S(C, r) implies that C ⊑T ∃r.D.
– D ∈ S(a) implies that a is an instance of D w.r.t. K,
– D ∈ S(a, r) implies that a is an instance of ∃r.D w.r.t. K.
        </p>
        <p>
          SK denotes the set of all completion sets of a normalized K. The completion sets are
initialized for each a ∈ IN(A) and each C ∈ CN(K) as follows:
– S(C) := {C, ⊤} for each C ∈ CN(K),
– S(C, r) := ∅ for each r ∈ RN(K),
– S(a) := {C ∈ CN(A) | C(a) appears in A} ∪ {⊤}, and
– S(a, r) := {b ∈ IN(A) | r(a, b) appears in A} for each r ∈ RN(K).
Then these sets are extended by applying the completion rules shown in Figure 2 until
no more rule applies. In these rules X and Y can refer to concept or individual names,
while C, C1, C2 and D are concept names and r is a role name. After the completion
has terminated, the following relations hold between an individual a, a role r and named
concepts A and B:
– subsumption relation between A and B from K holds iff B ∈ S(A)
– instance relation between a and B from K holds iff B ∈ S(a),
which has been shown in [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. To decide the initial query: K |= D(a), one has to test
now, whether Aq appears in S(a). In fact, instance queries for all individuals and all
named concepts from the KB can be answered now; the completion algorithm does
not only perform one instance check, but complete ABox realization. The completion
algorithm runs in polynomial time in size of the knowledge base.
        </p>
        <p>CR1 If C ∈ S(X), C ⊑ D ∈ T , and D 6∈ S(X)</p>
        <p>then S(X) := S(X) ∪ {D}
CR2 If C1, C2 ∈ S(X), C1 ⊓ C2 ⊑ D ∈ T , and D 6∈ S(X)</p>
        <p>then S(X) := S(X) ∪ {D}
CR3 If C ∈ S(X), C ⊑ ∃r.D ∈ T , and D 6∈ S(X, r)</p>
        <p>then S(X, r) := S(X, r) ∪ {D}
CR4 If Y ∈ S(X, r), C ∈ S(Y ), ∃r.C ⊑ D ∈ T , and</p>
        <p>D 6∈ S(X) then S(X) := S(X) ∪ {D}</p>
      </sec>
      <sec id="sec-2-2">
        <title>Completion Algorithms for Prob-EL</title>
        <p>To describe the completion algorithm for Prob-E L, we need the notion of basic
concepts. The set BCT of Prob-E Lc01 basic concepts for a KB K is the smallest set that
contains (1) ⊤, (2) all concept names used in K, and (3) all concepts of the form P∗A,
where A is a concept name in K. A Prob-E Lc01-TBox T is in normal form if all its
axioms are of one of the following forms</p>
        <p>C ⊑ D,
where C, C1, C2, D ∈ BCT and A is a concept name. The normalization rules in
Figure 1 can also be used to transform a Prob-E L01
c -TBox into this extended notion of
normal form. We further assume that for all assertions C(a) in the ABox A, C is a concept
name. We denote as P0T , P1T and R0T the set of all concepts of the form P&gt;0A, P=1A,
and P&gt;0r(a, b) respectively, occurring in a normalized knowledge base K.</p>
        <p>The completion algorithm for Prob-E Lc01 follows the same idea as the algorithm
for EL, but uses several completion sets to deal with the information of what needs
to be satisfied in the different worlds of a model. We define the set of worlds V :=
{0, ε, 1} ∪ P0T ∪ R0T , where the probability distribution μ assigns a probability of 0
to the world 0, and the uniform probability 1/(|V | − 1) to all other worlds. For each
individual name a, concept name A, role name r and world v, we store the completion
sets S0(A, v), Sε(A, v), S0(A, r, v), Sε(A, r, v), S(a, v), and S(a, r, v).</p>
        <p>The algorithm initializes the sets as follows for every A ∈ BCT , r ∈ RN(K), and
a ∈ IN(A):
– S0(A, 0) = {⊤, A} and S0(A, v) = {⊤} for all v ∈ V \ {0},
– Sε(A, ε) = {⊤, A} and Sε(A, v) = {⊤} for all v ∈ V \ {ε},
– S(a, 0) = {⊤} ∪ {A | A(a) ∈ A}, S(a, v) = {⊤} for all v 6= 0,
– S0(A, r, v) = Sε(A, r, v) = ∅ for all v ∈ V , S(a, r, v) = ∅ for v 6= 0,
– S(a, r, 0) = {b ∈ IN(A) | r(a, b) ∈ A}.</p>
        <p>These sets are then extended by exhaustively applying the rules shown in Figure 3,
where X ranges over BCT ∪ IN(A), S∗(X, v) stands for S(X, v) if X is an individual
and for S0(X, v), Sε(X, v) if X ∈ BCT , and γ : V → {0, ε} is defined by γ(0) = 0,
and γ(v) = ε for all v ∈ V \ {0}.</p>
        <p>PR1 If C′ ∈ S∗(X, v), C′ ⊑ D ∈ T , and D 6∈ S∗(X, v)</p>
        <p>then S∗(X, v) := S∗(X, v) ∪ {D}
PR2 If C1, C2 ∈ S∗(X, v), C1 ⊓ C2 ⊑ D ∈ T , and D 6∈ S∗(X, v)</p>
        <p>then S∗(X, v) := S∗(X, v) ∪ {D}
PR3 If C′ ∈ S∗(X, v), C′ ⊑ ∃r.D ∈ T , and D ∈/ S∗(X, r, v)</p>
        <p>then S∗(X, r, v) := S∗(X, r, v) ∪ {D}
PR4 If D ∈ S∗(X, r, v), D′ ∈ Sγ(v)(D, γ(v)), ∃r.D′ ⊑ E ∈ T ,</p>
        <p>and E ∈/ S∗(X, v) then S∗(X, v) := S∗(X, v) ∪ {E}
PR5 If P&gt;0A ∈ S∗(X, v), and A ∈/ S∗(X, P&gt;0A)</p>
        <p>then S∗(X, P&gt;0A) := S∗(X, P&gt;0A) ∪ {A}
PR6 If P=1A ∈ S∗(X, v), v 6= 0, and A ∈/ S∗(X, v)</p>
        <p>then S∗(X, v) := S∗(X, v) ∪ {A}
PR7 If A ∈ S∗(X, v), v 6= 0, P&gt;0A ∈ P0T , and P&gt;0A ∈/ S∗(X, v′)</p>
        <p>then S∗(X, v′) := S∗(X, v′) ∪ {P&gt;0A}
PR8 If A ∈ S∗(X, 1), P=1A ∈ P1T , and P=1A ∈/ S∗(X, v)</p>
        <p>then S∗(X, v) := S∗(X, v) ∪ {P=1A}
PR9 If r(a, b) ∈ A, C ∈ S(b, 0), ∃r.C ⊑ D ∈ T ,</p>
        <p>and D 6∈ S(a, 0) then S(a, 0) := S(a, 0) ∪ {D}
PR10 If P&gt;0r(a, b) ∈ A, C ∈ S(b, P&gt;0r(a, b)), ∃r.C ⊑ D ∈ T ,
and D 6∈ S(a, P&gt;0r(a, b))
then S(a, P&gt;0r(a, b)) := S(a, P&gt;0r(a, b)) ∪ {D}
PR11 If P=1r(a, b) ∈ A, C ∈ S(b, v) with v 6= 0, ∃r.C ⊑ D ∈ T
and D 6∈ S(a, v) then S(a, v) := S(a, v) ∪ {D}</p>
        <p>
          This algorithm terminates in polynomial time. After termination, the completion
sets store all the information necessary to decide subsumption of concept names, as
well as checking whether an individual is an instance of a given concept name [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. For
the former decision, it holds that for every pair A, B of concept names: B ∈ S0(A, 0)
iff A ⊑K B. In the case of instance checking, we have that K |= A(a) iff A ∈ S(a, 0).
4
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Computing the k-MSC using Completion</title>
      <p>
        The msc was first investigated for EL-concept descriptions and w.r.t. unfoldable TBoxes
and possibly cyclic ABoxes in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. It was shown that the msc does not need to exists for
cyclic ABoxes. Consider the ABox A = {r(a, a), C(a)}. The msc of a is then
      </p>
      <p>
        C ⊓ ∃r.(C ⊓ ∃r.(C ⊓ ∃r.(C ⊓ · · ·
and cannot be expressed by a finite concept description. For cyclic TBoxes it has been
shown in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] that the msc does not need to exists even if the ABox is acyclic.
      </p>
      <p>
        To avoid infinite nestings in presence of cyclic ABoxes it was proposed in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] to
limit the role-depth of the concept description to be computed. This limitation yields an
approximation of the msc, which is still a concept description with the input individual
as an instance, but it does not need to be the least one (w.r.t. ⊑) with this property. We
follow this idea to compute approximative msc also in presence of general TBoxes.
      </p>
      <p>The role-depth of a concept description C (denoted rd(C)) is the maximal number
of nested quantifiers of C. Now we can define the msc with limited role-depth for EL.
Definition 2 (role-depth bounded EL-msc). Let K =(T , A) be an EL-KB and a an
individual in A and k ∈ IN. Then the EL-concept description C is the role-depth bounded
EL-most specific concept of a w.r.t. K and role-depth k (written k-mscK(a)) iff
1. rd(C) ≤ k,
2. K |= C(a), and
3. for all EL-concept descriptions E with rd(E) ≤ k holds: K |= E(a) implies</p>
      <p>C ⊑T E.</p>
      <p>Please note that in case the exact msc has a role-depth less than k the role-depth bounded
msc is the exact msc.
4.1</p>
      <sec id="sec-3-1">
        <title>Computing the k-msc in EL by completion</title>
        <p>
          The computation of the msc relies on a characterization of the instance relation. While
in earlier works this was given by homomorphism [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] or simulations [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] between graph
representations of the knowledge base and the concept in question, we use the
completion algorithm as such a characterization. Furthermore, we construct the msc by
traversing the completion sets to “collect” the msc. More precisely, the set of completion sets
encodes a graph structure, where the sets S(X ) are the nodes and the sets S(X, r)
encode the edges. Traversing this graph structure, one can construct an EL-concept. To
obtain a finite concept in the presence of cyclic ABoxes or TBoxes one has to limit the
role-depth of the concept to be obtained.
        </p>
        <p>Definition 3 (traversal concept). Let K be an EL-KB, K′′ be its normalized form, SK
the completion set obtained from K and k ∈ IN. Then the traversal concept of a named
concept A (denoted k-CSK (A)) with sig(A) ⊆ sig(K′′) is the concept obtained from
executing the procedure call traversal-concept-c(A, SK, k) shown in Algorithm 1.</p>
        <p>The traversal concept of an individual a (denoted k-CSK (a)) with a ⊆ sig(K) is the
concept description obtained from executing the procedure call traversal-concept-i(a,
SK, k) shown in Algorithm 1.</p>
        <p>The idea is that the traversal concept of an individual yields its msc. However, the
traversal concept contains names from sig(K′′) \ sig(K), i.e., concept names that were
introduced during normalization – we call this kind of concept names normalization
names in the following. The returned msc should be formulated w.r.t. the signature of
the original KB, thus the normalization names need to be removed or replaced.
Algorithm 1 Computation of a role-depth bounded EL-msc.</p>
        <p>Procedure k-msc (a, K, k)
Input: a: individual from K; K =(T , A) an EL-KB; k ∈ IN
Output: role-depth bounded EL-msc of a w.r.t. K and k.
1: (T ′, A′) := simplify-ABox(T , A)
2: K′′ := (normalize(T ′), A )</p>
        <p>′
3: SK := apply-completion-rules(K)
4: return Remove-normalization-names ( traversal-concept-i(a, SK, k))</p>
        <sec id="sec-3-1-1">
          <title>Procedure traversal-concept-i (a, S, k)</title>
          <p>Input: a: individual name from K; S: set of completion sets; k ∈ IN
Output: role-depth traversal concept (w.r.t. K) and k.
1: if k = 0 then return dA ∈ S(a) A
2: else return dA ∈ S(a) A ⊓</p>
          <p>d d
r∈RN(K′′) A ∈ CN(K′′)∩S(a,r)</p>
          <p>d d ∃r. traversal-concept-i (b, S, k − 1)
r∈RN(K′′) b ∈ IN(K′′)∩S(a,r)
∃r. traversal-concept-c (A, S, k − 1) ⊓
3: end if</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>Procedure traversal-concept-c (A, S, k)</title>
          <p>Input: A: concept name from K′′; S: set of completion sets; k ∈ IN
Output: role-depth bounded traversal concept.
1: if k = 0 then return dB∈S(A) B
2: else return d B ⊓ d d</p>
          <p>B∈S(A) r∈RN(K′′) B∈S(A,r)
3: end if
∃r.traversal-concept-c (B, S, k − 1)
Lemma 1. Let K be an EL-KB, K′′ its normalized version, SK be the set of completion
sets obtained for K, k ∈ IN a natural number and a ∈ IN(K). Furthermore let C =
kCSK (a) and Cb be obtained from C by removing the normalization names. Then</p>
          <p>K′′ |= C(a) iff K |= Cb(a).</p>
          <p>
            This lemma guarantees that removing the normalization names from the traversal
concept preserves the instance relationships. Intuitively, this lemma holds since the
construction of the traversal concept conjoins exhaustively all named subsumers and all
subsuming existential restrictions to a normalization name up to the role-depth bound.
Thus removing the normalization name does not change the extension of the
conjunction. The proof can be found in [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ]. We are now ready to devise a computation algorithm
for the role-depth bounded msc: procedure k-msc as displayed in Algorithm 1.
          </p>
          <p>The procedure k-msc has an individual a from a knowledge base K, the knowledge
base K itself and number k for the role depth-bound as parameter. It first performs the
two normalization steps on K, then applies the completion rules from Figure 2 to the
normalized KB K′′ and stores the set of completion sets in SK. Afterwards it computes
the traversal-concept of a from SK w.r.t. role-depth bound k. In a post-processing step
it applies Remove-normalization-names to the traversal concept.</p>
          <p>Obviously, the concept description returned from the procedure k-msc has a
roledepth less or equal to k. Thus the first condition of Definition 2 is fulfilled. We prove
next that the concept description obtained from k-msc fulfills the second condition from
Definition 2.</p>
          <p>Lemma 2. Let K = (T , A) be an EL-KB and a an individual in A and k ∈ IN. If
C = k-msc(a, K, k), then K |= C(a).</p>
          <p>
            The claim can be shown by induction on k. Each name in C is from a completion set of
(1) an individual or (2) a concept, which is connected via existential restrictions to an
individual. The full proof can be found in [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ].
          </p>
          <p>Lemma 3. Let K = (T , A) be an EL-KB and a an individual in A and k ∈ IN. If
C = k-msc(a, K, k), then for all EL-concept descriptions E with rd(E) ≤ k holds:
K |= E(a) implies C ⊑T E.</p>
          <p>
            Again, the full proof can be found in [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ]. The two lemmas yield the correctness of the
overall procedure.
          </p>
          <p>Theorem 1. Let K = (T , A) be an EL-KB and a an individual in A and k ∈ IN.
Then k-msc(a, K, k) ≡ k-mscK(a).</p>
          <p>The k-msc can grow exponential in the size of the knowledge base.
4.2</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Most specific concept in Prob-EL01</title>
      <p>c
In order to compute the msc, we simply accumulate all concepts to which the individual
a belongs, given the information in the completion sets. This process needs to be done
recursively in order to account for both, the successors of a explicitly encoded in the
ABox, and the nesting of existential restrictions masked by normalization names. In the
following we use the abbreviation S&gt;0(a, r) := Sv∈V \{0} S(a, r, v). We then define
traversal-concept-i(a, S, k) as</p>
      <p>l
B∈S(a,0)</p>
      <p>B ⊓</p>
      <p>l ` l
r∈RN(K′′) r(a,b)∈K′′
l
l
l
B∈CN(K′′)∩S(a,r,0)
B∈CN(K′′)∩S(a,r,1)
B∈CN(K′′)∩S&gt;0(a,r)</p>
      <p>∃r.traversal-concept-i(b, S, k − 1) ⊓
∃r.traversal-concept-c(B, S, k − 1) ⊓
P=1(∃r.traversal-concept-c(B, S, k − 1)) ⊓</p>
      <p>P&gt;0(∃r.traversal-concept-c(B, S, k − 1))´,
where traversal-concept-c(B, S, k + 1) is</p>
      <p>l
C∈S0(B,0)</p>
      <p>B ⊓ l ` l
r∈RN C∈S0(B,r,0)</p>
      <p>∃r.traversal-concept-c(C, S, k) ⊓
C∈S0(B,r,1)
l
l
C∈S0&gt;0(B,r)</p>
      <p>P=1(∃r.traversal-concept-c(C, S, k)) ⊓</p>
      <p>
        P&gt;0(∃r.traversal-concept-c(C, S, k))´
and traversal-concept-c(B, S, 0) = dC∈S0(B,0) B. Once the traversal concept has been
computed, it is possible to remove all normalization names preserving the instance
relation, which gives us the msc in the original signature of K. The proof can be found
in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>Theorem 2. Let K a Prob-E Lc01-knowledge base, a ∈ IN(A), and k ∈ IN; then
Remove-normalization-names(traversal-concept-i(a, S, k)) ≡ k-mscK(a).
5
In this paper we have presented a practical method for computing the role-depth bounded
msc of EL concepts w.r.t. a general TBox. Our approach is based on the completion sets
that are computed during realization of a KB. Thus, any of the available
implementations of the EL completion algorithm can be easily extended to an implementation of
the (approximative) msc computation algorithm. We also showed that the same idea can
be adapted for the computation of the msc in the probabilistic DL Prob-E L01
c .</p>
      <p>
        Together with the completion-based computation of role-depth limited (least)
common subsumers given in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] these results complete the bottom-up approach for general
EL- and Prob-E L01
      </p>
      <p>c -KBs. This approach yields a practical method to compute
commonalities for differing observations regarding individuals. To the best of our knowledge this
has not been investigated for DLs that can express uncertainty.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          .
          <article-title>Least common subsumers and most specific concepts in a description logic with existential restrictions and terminological cycles</article-title>
          . In G. Gottlob and T. Walsh, editors,
          <source>Proc. of IJCAI'03</source>
          , pages
          <fpage>325</fpage>
          -
          <lpage>330</lpage>
          . Morgan Kaufmann,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Brandt</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          .
          <article-title>Pushing the E L envelope</article-title>
          .
          <source>In Proc. of IJCAI'05</source>
          ,
          <string-name>
            <surname>Edinburgh</surname>
          </string-name>
          , UK,
          <year>2005</year>
          . Morgan-Kaufmann Publishers.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>McGuinness</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Nardi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.F.</given-names>
            <surname>Patel-</surname>
          </string-name>
          Schneider, editors.
          <source>The Description Logic Handbook: Theory</source>
          , Implementation, and
          <string-name>
            <surname>Applications</surname>
          </string-name>
          . CUP.,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ku</surname>
          </string-name>
          <article-title>¨sters, and</article-title>
          <string-name>
            <given-names>R.</given-names>
            <surname>Molitor</surname>
          </string-name>
          .
          <article-title>Computing least common subsumer in description logics with existential restrictions</article-title>
          . In T. Dean, editor,
          <source>Proc. of IJCAI'99</source>
          , pages
          <fpage>96</fpage>
          -
          <lpage>101</lpage>
          , Stockholm, Sweden,
          <year>1999</year>
          . Morgan Kaufmann.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>R.</given-names>
            <surname>Ku</surname>
          </string-name>
          <article-title>¨sters and</article-title>
          <string-name>
            <given-names>R.</given-names>
            <surname>Molitor</surname>
          </string-name>
          .
          <article-title>Approximating most specific concepts in description logics with existential restrictions</article-title>
          .
          <source>AI Communications</source>
          ,
          <volume>15</volume>
          (
          <issue>1</issue>
          ):
          <fpage>47</fpage>
          -
          <lpage>59</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Schro</surname>
          </string-name>
          <article-title>¨der. Probabilistic description logics for subjective probabilities</article-title>
          . In F. Lin and
          <string-name>
            <surname>U</surname>
          </string-name>
          . Sattler, editors,
          <source>Proc. of KR'10</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>R.</given-names>
            <surname>Pen</surname>
          </string-name>
          <article-title>˜aloza and</article-title>
          <string-name>
            <given-names>A.-Y.</given-names>
            <surname>Turhan</surname>
          </string-name>
          .
          <article-title>Completion-based computation of most specific concepts with limited role-depth for EL and prob-E L01</article-title>
          .
          <string-name>
            <surname>LTCS-Report</surname>
            <given-names>LTCS</given-names>
          </string-name>
          -
          <volume>10</volume>
          -03, Chair f.
          <source>Autom. Theory, Inst</source>
          . f. Theor. C. S. TU Dresden, Germany,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>R.</given-names>
            <surname>Pen</surname>
          </string-name>
          <article-title>˜aloza and</article-title>
          <string-name>
            <given-names>A.-Y.</given-names>
            <surname>Turhan</surname>
          </string-name>
          .
          <article-title>Role-depth bounded least common subsumers by completion for E L-</article-title>
          and
          <string-name>
            <surname>Prob-E L-TBoxes.</surname>
            In V. Haarslev,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Toman</surname>
          </string-name>
          , and G. Weddell, editors,
          <source>Proc. of the 2010 Description Logic Workshop (DL'10)</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>