<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Rule-based query answering method for a knowledge base of economic crimes</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Jaroslaw Bak Institute of Control and Information Engineering, Poznan University of Technology</institution>
          ,
          <addr-line>M. Sklodowskiej-Curie Sqr. 5, 60-965 Poznan</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <fpage>25</fpage>
      <lpage>32</lpage>
      <abstract>
        <p>level. We present two methods. The first one uses hybrid reasoning and the second one exploits only forward chaining. These two methods are demonstrated by the prototypical implementation of the system coupled with the Jess engine. Tests are performed on the knowledge base of the selected economic crimes: fraudulent disbursement and money laundering.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Rule-based query answering</kwd>
        <kwd>relational database access</kwd>
        <kwd>Jess engine</kwd>
        <kwd>economic crimes</kwd>
        <kwd>SDL library</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Data stored in relational databases are described only by their schema (syntactic
structure of data). Therefore, it is often difficult to pose a query at a higher level of
abstraction than in a language of database relations and attributes. There is also a
mismatching problem with table and column names without strictly defined
semantics. A lack of a conceptual knowledge can be overcome by introducing
ontologies which for evaluation purposes can be transformed into a set of rules. This
kind of additional rule-based knowledge allows reasoning and query answering at an
appropriate abstract level and relieves a user of using structural constructions from
SQL. This kind of query evaluation is called a rule-based query answering method.</p>
      <p>
        In our rule-based system we apply rules that are Horn clauses [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. If there is
conjunction of several predicates in the head, the rule can be easily transformed into
Horn clauses with the Lloyd-Topor transformation [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        We assume that only unary or binary predicates exist in our system, according to
the terms that appear in OWL language [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] (since we decided to use this standard as a
way to express conceptual knowledge).
      </p>
      <p>Every rule consists of two parts: the left-hand-side, which is called the body, and
the right-hand-side, which is called the head. Generally both parts are the sets of
atoms that are interpreted conjunctively. In the body of the rule we use premises
(patterns, conditions), which have to be satisfied by the appropriate atoms (facts) to
allow the rule to be fired and produce conclusions from the rule’s head. Next section
describes the problem statement of the proposed PhD thesis. Section 3 presents
current knowledge of the problem domain and existing solutions. Section 4 contains
results achieved so far, the current state of the work and author’s contributions. In
Section 5 the concluding remarks are given.</p>
      <p>2</p>
    </sec>
    <sec id="sec-2">
      <title>Problem statement</title>
      <p>The presented PhD thesis is trying to cope with the following research question:</p>
      <p>How to efficiently query a relational database
at the conceptual level defined in a rule-based system?
This question is strongly connected with the following three main problems:
i. Rule-based query answering,
ii. The combination of a rule-based system and a relational database,
iii. The construction of the knowledge base (i.e. knowledge of economic crimes).</p>
      <p>In a rule-based query answering method we assume that there exists a knowledge
base which contains two parts: intensional and extensional. The intensional
knowledge is represented as a set of rules and describes the source data at a
conceptual (ontological) level. The extensional knowledge consists of facts that are
stored in the relational database as well as facts that were derived in the reasoning
process. Queries can be posed in the terms of the conceptual level. Thus, one gets an
easier way to create a query than using structural constructions from SQL (Structured
Query Language). The rule-based query answering method uses the reasoning process
to obtain an answer for a given query. During this process facts from database are
gathered and used to derive new facts according to a given set of rules. Next, the
answer is constructed and presented.</p>
      <p>In the first two problems (i, ii), we need to deal with the following questions:
1.
2.
3.
4.
5.
6.
7.
8.</p>
      <p>What kind of rule-based system do we want to use?
How to express and represent the conceptual knowledge in the form of rules?
What is the language of the queries that can be evaluated by the system?
What kind of reasoning is involved in the rule-based query answering?
How to ensure the decidability of the query answering method?
How to combine a relational database with a rule-based system?
Which reasoning engine should be used for the prototypical implementation?
What are other potential applications of the proposed method and system?
We also assume that the rule-based query answering method will be used with
the knowledge base of the selected economic crimes: fraudulent disbursement and
money laundering. Particularly, we assume our system to be aimed at determining
legal sanctions for crime perpetrators and to discover crime activities and roles (of
particular types of owners, managers, directors and chairmen) using concepts,
appropriate relations and rules.</p>
      <p>The answers to the majority of the given questions and current achievements are
presented in Section 4.</p>
    </sec>
    <sec id="sec-3">
      <title>Overview of existing solutions</title>
      <p>
        The presented problem, the rule-based query answering task [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], has many times
been subject to research. Generally, there are two kinds of reasoning method applied
in the rule-based query answering task. The first one is a backward chaining method,
where reasoning is goal-driven. In this case our goal is the query posed to the system.
This scheme of reasoning is implemented, for instance, in Prolog engine, and takes
the form of the Selective Linear Definite clause resolution (SLD). In the backward
reasoning technique facts are obtained only when they are needed in derivations.
      </p>
      <p>On the contrary a forward chaining approach, which is data-driven, needs
reasoning about all facts. In the working memory some of the inferred facts are
useless and many rules are fired unnecessarily. It has a negative impact on the
efficiency of the answering process. Moreover, because all facts should exist in the
working memory, the scalability of reasoning task is poor due to the limited RAM
memory. This drawback occurs also in the backward chaining.</p>
      <p>
        The rule-based query answering task in rule-based systems, which exploits
forward chaining is generally an inefficient method. The results of the
OpenRuleBench initiative [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] show that efficiency of tabling Prolog and deductive
database technologies surpasses the ones obtained from the corresponding pure
rulebased forward chaining engines.
      </p>
      <p>
        The most comprehensive approaches concerning optimizations of bottom-up
query evaluation (in forward chaining) were given in [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ]. The general method
relies on the transformation of a program P (set of rules) and a query Q into a new
program, magic(P ∪ Q), as shown in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. This magic transformation modifies each
original rule by additional predicates to ensure that the rule will fire only when the
values for these predicates are available. There were also other improvements and
modifications of magic approach [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. According to the work presented in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] we
also believe that the bottom-up approach has still room for improvements in order to
increase the performance of the rule-based query answering task.
      </p>
      <p>
        There exist also some works about the combination of rules (or logic
programming) with relational databases. Notable are approaches presented in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ],
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] where ontology-based data access is performed with Prolog rules or
Disjunctive Datalog.
      </p>
      <p>
        The problem of applying rules in economic crimes is quite new. Most of the
research work in the legal area relies on using ontologies in the field of information
management and exchange [
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ], not reasoning [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Other solutions, developed
for instance in FFPoirot project [
        <xref ref-type="bibr" rid="ref25 ref26">25, 26</xref>
        ], concern descriptions of financial frauds,
mainly the Nigerian letter fraud and fraudulent Internet investment pages. The
ontologies developed in this project are not publicly available.
      </p>
      <p>
        In our approach rules and queries are used to reflect data concerning documents
and their attributes, formal hierarchy in a company, parameters of transactions,
engaged people actions and their legal qualifications. To the best of our knowledge it
is the first such approach in the field of economic crimes, besides the work presented
in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], which concerns cybercrimes.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Achievements and the current work</title>
      <sec id="sec-4-1">
        <title>4.1 General assumptions</title>
        <p>As mentioned in Section 2, the first two tasks include eight questions. For most of
them, in the current state of our work, the answers are already known:
1.
2.
3.
4.
5.
6.
7.
8.</p>
        <p>We wanted to use a production rule system because we need to apply our
solutions in the real world applications.</p>
        <p>
          We decided to express the conceptual knowledge with the Horn-SHIQ ontology
combined with SWRL (Horn-like) [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] rules. We are aware of the restrictions that
Horn-SHIQ imposes on ontology creation [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], but this fragment of OWL is
sufficient for our needs.
        </p>
        <p>Currently we assume conjunctive queries only, which are built of the terms from
ontology (concepts and relations).</p>
        <p>
          We developed two ways of applying reasoning process in the rule-based query
answering task. In the first one [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] hybrid reasoning (forward and backward
chaining) is used and in the second one only forward chaining and extended
rules are executed. The second approach is still in progress.
        </p>
        <p>
          We use the Datalog Safety [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] restriction in the rule-based query answering and
DL-safe rules in ontology creation [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ].
        </p>
        <p>
          We developed the special mapping method which is presented later in this
section and also in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          We decided to use the Jess (Java Expert System Shell) engine [
          <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
          ], since it is
one of the fastest commercial engines (with the free academic use) and it can be
easily integrated with the Java language (which is the implementation language
of our tool). The Jess engine also supports both forward and backward chaining.
We are convinced that our knowledge base of economic crimes [
          <xref ref-type="bibr" rid="ref27 ref30">27, 30</xref>
          ] would
not be the only application of the defined system. Our methods are general and
can be used in every application, which requires additional knowledge for query
evaluation or need to offer an easier way of query creation than with the
traditional SQL.
        </p>
        <p>
          Our current results were presented in Polish and English papers [
          <xref ref-type="bibr" rid="ref27 ref28 ref29 ref30 ref6">6, 27, 28, 29, 30</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2 Query answering with the hybrid reasoning</title>
        <p>
          The approach described in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] concerns the hybrid reasoning in the rule-based query
answering task. In this work we described also the method of mapping between an
ontology and a relational database. We presented our prototypical implementation of
a library tool, the Semantic Data Library (SDL), which integrates the Jess engine,
rules and ontology to effectively query a relational database.
        </p>
        <p>In our hybrid reasoning process the backward chaining engine is responsible only
for gathering data from a relational database. Data is added (asserted in Jess
terminology) as triples into the working memory. The forward chaining engine can
answer a query with all constraints put on variables in a given query (=, !=, &lt;, &gt; etc.).</p>
        <p>The queries are constructed in Jess language in terms of ontology concepts. The
mapping between the ontology classes and properties and the relational database
schema is defined to fit syntactic structures and to preserve the semantics of the data.</p>
        <p>
          Extensional data itself is stored in a relational database. The ontology and the
mapping rules transformed into Jess language format provide the additional semantic
layer to the relational database. Such an approach allows for answering queries to a
relational database with a reasoning process performed in the Jess system over rules
and ontology. The hybrid reasoning and query execution is supported by the SDL
library. More details are given in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3 Mapping between ontology terms and relational database</title>
        <p>
          A mapping between ontology terms and relational data [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] is defined as a set of rules
where each rule is of the following form:
        </p>
        <p>SQL query =&gt; essential predicate 
where “essential” means that the instance of the term cannot be derived from the
rules. We assume that every “essential” ontology term has its appropriate SQL query
and can be obtained only in a direct way, as a result of the SQL query. For example,
in the following OWL hierarchy of classes Mother is-a Woman is-a Person, where the
class Mother is a subclass of the class Woman etc., every instance of the class Mother
is an “essential” term.</p>
        <p>We assume that every SQL query has the following form:</p>
        <p>SELECT [R] FROM [T] &lt;WHERE&gt; &lt;C, AND, OR&gt;  
where:
• R denotes the result attributes (columns) – one or two according to the unary or
binary terms (OWL Class, OWL DataProperty or OWL ObjectProperty),
• T stands for the tables, which are queried,
• WHERE is an optional clause to specify the constraints,
• C abbreviates the constraints in the following form: &lt;attribute, comparator,
value&gt;, for example: Age &gt; 21,
• AND, OR are the optional SQL commands.</p>
        <p>As an example, let us assume that we have a table Person with the following
attributes: Id, Name, Age and Gender. To obtain all adult men, we would define the
following SQL query: SELECT Id FROM Person WHERE Age&gt;21 AND
Gender=’Male’.</p>
        <p>The mapping process requires defining SQL queries for all “essential” classes
and properties. Other terms can be mapped too, but this is not necessary, since
instances of them can be derived in the reasoning process.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4 Knowledge base of economic crimes</title>
        <p>
          The approaches presented in [
          <xref ref-type="bibr" rid="ref27 ref28 ref29">27, 28, 29</xref>
          ] concern construction of the knowledge base
of the selected economic crimes: fraudulent disbursement and money laundering. We
analysed current related works and proposed the formal model of these economic
crimes. We developed the ontology, which is the result of an analysis of about 10
crime cases. This means that the ontology is crafted to a task rather than attempting to
describe the whole conceivable space of concepts and relations (top ontologies). The
intensional part of the knowledge base contains also SWRL rules, which are very
important when we want to determine legal sanctions for crime perpetrators and to
discover crime activities and roles (not only to describe a crime scheme).
        </p>
        <p>The methodology consists of several steps:
1. Design  of  a  hierarchical  data  representation  with  ‘minimal’  ontology, 
which  is  used  to  uncover  a  crime  scheme.  This  means  using  only
necessary concepts that follow in the logical order of uncovering a crime. In 
the first stage goods/services transfer data is analyzed with relation to 3 
basic  flows:  money,  invoices,  and  documents  (i.e.,  confirming  that  the 
service  or  goods  have  been  delivered).  In  addition,  responsible  or 
relevant  people  within  companies  are  associated  with  particular  illegal 
activities. 
2. Provision  of  a  framework  in  which  the  graph  building  process  and 
queries are executed. 
3. Relating answers to queries with crime qualifications. </p>
        <p>
          This approach is limited, but provides an essential model for evidence-building of
a very important class of financial crimes: among them acting to do damage to a
company and money laundering. Both crimes occurred in the example Hydra Case
which was tested with the hybrid approach and artificially generated data. The work
and results are presented in [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ].
        </p>
        <p>O ntology‐bas ed </p>
        <p>knowledge 
trans formed into rules
R ule‐bas ed 
knowledge
R elational </p>
        <p>Database
J es s  engine(s )</p>
        <p>Mapping rules
Query</p>
        <p>A ns wer</p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5 Current work</title>
        <p>In the current state of our work we are focused on the new rule-based query
answering method which uses extended rules. Extended means that these rules are
generated automatically from the basic ones for the evaluation purposes, and the
modification is strongly connected with the magic transformation method. The
extended rules are generated in the goal- and dependency-directed transformation. In
this method we are interested in dependencies between variables appearing in
predicates inside each rule.</p>
        <p>The rule-based query answering method in this approach needs the different
assumptions from the hybrid one because we use only one Jess engine to obtain
relational data and answer a query. Obviously, we have to modify our query
answering algorithm prepared for the hybrid system. This work is still in progress and
results will be presented as soon as possible.</p>
        <p>Figure 1 presents the architecture of our system which covers both solutions
(hybrid reasoning and reasoning with extended rules).</p>
        <p>5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>In this paper we have outlined the content of the PhD thesis titled Rule-based query
answering method for a knowledge base of economic crimes. Up to date we have
obtained some achievements in the research, particularly related to the special
crimeoriented ontological knowledge, its representation in rules of the Jess system, the
connection with extensional data in a database and query answering by reasoning over
the different data representations. We continue our research aiming to elaborate a new
method of rules transformation, which will allow for more efficient application of
rules in query answering task. We have to manage with problems presented in Section
2 and to provide a precise, clear and formal description of our solutions. We have
already obtained positive results of tests performed on the prototype system but we
also plan to execute queries prepared by the OpenRuleBench initiative. The
comparison of our results and those obtained in a pure Jess system seems to be an
adequate and objective assessment of usefulness of our work.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Liang</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fodor</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wan</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kifer</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>OpenRuleBench:</surname>
          </string-name>
          <article-title>An Analysis of the Performance of Rule Engines</article-title>
          ,
          <source>Proceedings of the 18th international conference on World wide web, ACM</source>
          ,
          <year>2009</year>
          , o.
          <fpage>601</fpage>
          -
          <lpage>610</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>McGuinness D.</surname>
          </string-name>
          , van
          <string-name>
            <surname>Harmelen</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Owl web ontology language overview</article-title>
          .
          <source>W3C Recommendation, 10 February</source>
          <year>2004</year>
          , http://www.w3.org/TR/owl-features/
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Horrocks</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boley</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tabet</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grosof</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dean</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Swrl: A semantic web rule language combining owl and ruleml</article-title>
          .
          <source>W3C Member Submission (May 21</source>
          <year>2004</year>
          ), http://www.w3.org/Submission/SWRL/
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Jess (Java Expert System Shell</surname>
          </string-name>
          ), http://jessrules.com/
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Friedman-Hill</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          : Jess in Action, Manning Publications Co.
          <article-title>(</article-title>
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bak</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jedrzejek</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Falkowski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Usage of the Jess engine, rules and ontology to query a relational database</article-title>
          . In: Governatori,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Hall</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Paschke</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>RuleML 2009</article-title>
          . LNCS, vol.
          <volume>5858</volume>
          , pp.
          <fpage>216</fpage>
          -
          <lpage>230</lpage>
          . Springer, Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Forgy</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rete</surname>
          </string-name>
          :
          <article-title>A Fast Algorithm for the Many Pattern/Many Object Pattern Match Problem</article-title>
          ,
          <source>Artificial Intelligence</source>
          ,
          <volume>19</volume>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>37</lpage>
          ,
          <year>1982</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Lloyd</surname>
            <given-names>J.W.</given-names>
          </string-name>
          ,
          <article-title>Foundations of logic programming (second, extended edition</article-title>
          ). Springer series in symbolic computation. Springer-Verlag, New York,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Horridge</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bechhofer</surname>
            <given-names>S.</given-names>
          </string-name>
          <article-title>The OWL API: A Java API for Working with OWL 2 Ontologies</article-title>
          .
          <source>OWLED</source>
          <year>2009</year>
          ,
          <article-title>6th OWL Experienced</article-title>
          and Directions Workshop, Chantilly, Virginia,
          <year>October 2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Poggi</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lembo</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            <given-names>D.</given-names>
          </string-name>
          , De Giacomo G.,
          <string-name>
            <surname>Lenzerini</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <source>Linking</source>
          Data to Ontologies,
          <source>Journal on Data Semantics</source>
          , Volume
          <volume>10</volume>
          ,
          <year>2008</year>
          , p.
          <fpage>133</fpage>
          -
          <lpage>173</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Gallaire</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Minker</surname>
            <given-names>J</given-names>
          </string-name>
          . (Eds.):
          <source>Logic and Data Bases, Symposium on Logic and Data Bases</source>
          , Centre d'études et de recherches de Toulouse,
          <year>1977</year>
          .
          <article-title>Advances in Data Base Theory</article-title>
          , Plenum Press, New York,
          <year>1978</year>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Brass</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <source>Implementation Alternatives for Bottom-Up Evaluation, 26th International Conference on Logic Programming</source>
          ,
          <source>ICLP (Technical Communications)</source>
          ,
          <source>Edinburgh</source>
          <year>2010</year>
          ,
          <fpage>44</fpage>
          -
          <lpage>54</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Liang</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fodor</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wan</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kifer</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <source>OpenRuleBench: Detailed Report, May</source>
          <volume>29</volume>
          ,
          <year>2009</year>
          , http://projects.semwebcentral.org/docman/view.php/158/69/report.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>F.</given-names>
            <surname>Bry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Eisinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Eiter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Furche</surname>
          </string-name>
          , G. Gottlob,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Linse</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Pichler</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wei</surname>
          </string-name>
          .
          <article-title>Foundations of Rule-Based Query Answering</article-title>
          .
          <source>In Proceedings of Summer School Reasoning Web</source>
          <year>2007</year>
          , Dresden,
          <source>Germany (3rd-7th September</source>
          <year>2007</year>
          ), volume
          <volume>4634</volume>
          <source>of LNCS</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>153</lpage>
          . REWERSE,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Beeri</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramakrishnan</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <source>On the power of magic, Journal of Logic Programming</source>
          , v.
          <volume>10</volume>
          n.
          <issue>3-4</issue>
          , p.
          <fpage>255</fpage>
          -
          <lpage>299</lpage>
          , April/May
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Breuker</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>Dreams, awakenings and paradoxes of ontologies, invited talk presentation</article-title>
          ,
          <source>3rd Workshop on Legal Ontologies and Artificial Intelligence Techniques</source>
          , http://ontobra.comp.ime.eb.br/apresentacoes/keynoteontobra-2009.ppt.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Bezzazi</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>Building an ontology that helps identify articles that apply to a cybercrime case</article-title>
          ,
          <source>Proceedings of the Second International Conference on Software and Data Technologies, ICSOFT</source>
          <year>2007</year>
          , Barcelona, Spain, pp.
          <fpage>179</fpage>
          -
          <lpage>185</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Lukácsy</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szeredi</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <article-title>Scalable Web Reasoning Using Logic Programming Techniques</article-title>
          . In A. Polleres and T. Swift, editors,
          <source>Proceedings of the Third International Conference on Web Reasoning and Rule Systems</source>
          , RR 2009,
          <article-title>Chantilly</article-title>
          ,
          <string-name>
            <surname>VA</surname>
          </string-name>
          , USA, October
          <volume>25</volume>
          -
          <issue>26</issue>
          ,
          <year>2009</year>
          , volume
          <volume>5837</volume>
          of Lecture Notes in Computer Science, pages
          <volume>102</volume>
          {
          <fpage>117</fpage>
          . Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. U. Hustadt,
          <string-name>
            <given-names>B.</given-names>
            <surname>Motik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Sattler</surname>
          </string-name>
          .
          <article-title>Reducing SHIQ-Description Logic to Disjunctive Datalog Programs</article-title>
          .
          <source>Proc. of the 9th International Conference on Knowledge Representation and Reasoning (KR2004)</source>
          ,
          <year>June 2004</year>
          , Whistler, Canada, pp.
          <fpage>152</fpage>
          -
          <lpage>162</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Hustand</surname>
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Motik</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            <given-names>U.</given-names>
          </string-name>
          ,
          <article-title>Data Complexity in Very Expressive Description Logics</article-title>
          ,
          <source>In Proc. of the 19th Joint Int. Conf. on Artificial Intelligence (IJCAI</source>
          <year>2005</year>
          ),
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21. Horn-SHIQ restrictions: http://www.w3.org/2007/OWL/wiki/Tractable_Fragments#
          <fpage>5</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Motik</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            <given-names>U.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Studer</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <article-title>Query answering for owl-dl with rules</article-title>
          .
          <source>Journal of Web Semantics: Science, Services and Agents on the World Wide Web</source>
          ,
          <volume>3</volume>
          (
          <issue>1</issue>
          ):
          <fpage>41</fpage>
          -
          <lpage>60</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Biasiotti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Francesconi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Palmirani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sartor</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Vitali</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Legal Informatics and Management of Legislative Documents. Global Centre for ICT in Parliament</article-title>
          , Working Paper No.
          <volume>2</volume>
          ,
          <string-name>
            <surname>United</surname>
            <given-names>Nations</given-names>
          </string-name>
          , Department of Economics and Social Affairs.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Casellas</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Modelling Legal Knowledge through Ontologies. OPJK: the Ontology of Professional Judicial Knowledge</article-title>
          ,
          <source>PhD thesis</source>
          , Universitat Autónoma de Barcelona, Barcelona.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Kerremans</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2005</year>
          ).
          <article-title>Topical ontology of VAT</article-title>
          ,
          <source>Technical Report of the FFPOIROT IP project (IST-2001- 38248)</source>
          .
          <source>Deliverable D2</source>
          .
          <article-title>3 (WP 2), STARLab VUB</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Leary</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2005</year>
          ).
          <article-title>AKEM: an ontology engineering methodology in FFPoirot</article-title>
          ,
          <source>Technical Report of the FFPOIROT IP project (IST-2001-38248)</source>
          .
          <source>Deliverable D6</source>
          .
          <article-title>8 (WP 6), STARLab VUB</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Bak</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jedrzejek</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Falkowski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Application of an Ontology-Based and Rule-Based Model to Selected Economic Crimes: Fraudulent Disbursement</article-title>
          and
          <source>Money Laundering, Lecture Notes in Computer Science</source>
          ,
          <year>2010</year>
          , Volume
          <volume>6403</volume>
          /
          <year>2010</year>
          ,
          <fpage>210</fpage>
          -
          <lpage>224</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Bak</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jedrzejek</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <article-title>Application of an Ontology-based Model to a Selected Fraudulent Disbursement Economic Crime</article-title>
          . In P. Casanovas, U. Pagallo, G. Ajani, and G. Sartor, editors,
          <article-title>AI approaches to the complexity of legal systems</article-title>
          ,
          <source>LNAI</source>
          , Vol
          <volume>6237</volume>
          ,
          <year>2010</year>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Jedrzejek</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cybulka</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bak</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <source>Towards Ontology of Fraudulent Disbursement, Agent and MultiAgent Systems: Technology and Applications, Proceedings of 5th International Conference, LNCS</source>
          <year>2011</year>
          , to be published.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Bak</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jedrzejek</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Falkowski</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <article-title>Application of the SDL Library to Reveal Legal Sanctions for Crime Perpetrators in Selected Economic Crimes: Fraudulent Disbursement and Money Laundering</article-title>
          ,
          <source>In Proceedings of the 4th International RuleML-2010 Challenge</source>
          , Washington, DC, USA, October,
          <fpage>21</fpage>
          -
          <lpage>23</lpage>
          ,
          <year>2010</year>
          . Edited by:
          <string-name>
            <surname>Palmirani</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Omair Shafiq</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Francesconi</surname>
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vitali</surname>
            <given-names>F.</given-names>
          </string-name>
          , Volume
          <volume>649</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>