<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Combining DL-Lite with Spatial Calculi for Feasible Geo-thematic Query Answering</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>O zgur Lutfu O zcep</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ralf Moller</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Software Systems (STS) Hamburg University of Technology Hamburg</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>First order logic (FOL) rewritability is a desirable feature for query answering over geo-thematic ontologies because in most geoprocessing scenarios one has to cope with large data volume. Hence, there is a need for combined geo-thematic logics that provide a sufciently expressive query language allowing for FOL rewritability. The DL-Lite family of description logics is tailored towards FOL rewritability of query answering for unions of conjunctive queries, hence it is a suitable candidate for the thematic component of a combined geo-thematic logic. We show that a weak coupling of DL-Lite with the expressive region connection calculus RCC8 allows for FOL rewritability under a spatial completeness condition for the ABox. Stronger couplings allowing for FOL rewritability are possible only for spatial calculi as weak as the low-resolution calculus RCC2. Already a strong combination of DL-Lite with the low-resolution calculus RCC3 does not allow for FOL rewritability.</p>
      </abstract>
      <kwd-group>
        <kwd>FOL rewritability</kwd>
        <kwd>region connection calculus</kwd>
        <kwd>qualitative spatial reasoning</kwd>
        <kwd>GIS</kwd>
        <kwd>combinations</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Query answering over a database becomes far more di cult if the extensional
knowledge in the database is extended by constraints in an ontology. The reason
is that a database plus an ontology may have many di erent models, hence
ontology based query answering has to compute the answers w.r.t. to all models
and build their intersection (certain answer semantics). But in some cases|when
using a lightweight logic like DL-Lite for the representation of the ontology and
a restricted query language like unions of conjunctive queries|query answering
w.r.t. an ontology can be reduced to model checking. This is formalized by the
notion of FOL ( rst order logic) rewritability : a given query can be rewritten
into a FOL query in which the intensional knowledge of the ontology is captured.
Though the rewritten queries may become exponentially bigger than the original
queries, there exist optimizations [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. So, FOL rewritability means a bene t.
      </p>
      <p>
        DL-Lite per se [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] is not su cient for use in scenarios of geographic
information processing, as these demand among others the representation and deduction
over spatial concepts. Though there exists related work combining spatial and
thematic reasoning [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], it is not aimed at FOL rewritability. Hence, there
is still a need for investigating combinations of logics that, on the one hand, are
su ciently expressive to t the representation's needs in geographical
information processing and that, on the other hand, allow for computationally feasible
(in particular FOL rewritable) satis ability checking and query answering.
      </p>
      <p>
        Continuing previous work [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ], we investigate combinations of logics in the
DL-Lite family with di erent members of the region connection calculus (RCC)
family [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], a well-known family of calculi for qualitative spatial reasoning. The
DL-Lite logic we are using as thematic part di ers from the known members
of the DL-Lite family as it also allows for concept conjunctions on the
lefthand side of general inclusion axioms. In previous work [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], we focussed on
the FOL rewritability aspects for weak combinations of DL-Lite with RCC8;
these combinations are weak in so far as they do not allow for the construction
of arbitrary RCC8 constraint networks in the intensional part (TBox) of the
ontology. In this paper we focus on strong combinations of DL-Lite with the
weaker fragments RCC3 and RCC2, and prove that DL-LiteuF;R(RCC3) does
not allow for FOL rewritability of satis ability checking while the weaker
DLLiteuF;R(RCC2) does.
      </p>
      <p>The paper is structured as follows. Section 2 collects technical details on the
region connection calculus and the DL-Lite family of description logics. Weak
combinations of DL-Lite with the region connection calculus are described in
Sect. 3. In Sect. 4, the last section before the conclusion, we consider strong
combinations of DL-Lite with weaker fragments of the region connection calculus.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Logical Preliminaries</title>
      <p>We recapitulate the main logical notation and concepts used in this paper; the
region connection calculus and DL-Lite.
2.1</p>
      <p>
        The Region Connection Calculus
We will consider di erent fragments of the region connection calculus [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] as
potential candidates for the spatial logic to be combined with DL-Lite. Randell
and colleagues' axiom system [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] is based on a primitive binary relation C
intended to denote a connectedness relation which is speci ed to be re exive and
symmetric. On the basis of C other binary relations between regions which are
called base relations are explained. One set of base relations is the set BRCC8,
which is the main component of the most expressive region connection calculus
RCC8. The base relations of BRCC8 and their intended meanings are given as
follows: BRCC8 = fDC (disconnected), EC (externally connected), EQ (equal),
PO (partially overlapping), NTPP (non-tangential proper part), TPP
(tangential proper part), NTPPi (inverse of NTPP), TPPi (inverse of TPP)g. We skip
the concrete de nitions of the base relations by the connectedness relation C
(see, e.g., [11, p. 45]), as we|in contrast to the axiom system of Randell and
colleagues|consider the following axiom system schema AxRCCi, which directly
speci es the properties of the base relations in BRCCi.
      </p>
      <p>De nition 1 (Axiom system schema AxRCCi). For all i 2 f2; 3; 5; 8g the
axiom set AxRCCi contains the following axioms:
ff88xx;; yy:: VWrr12;Br2R2CBCRiCrC(ix;r;1y6=)rg2[r1(x; y) ! :r2(x; y)g [ (pai(rjwoiinset edxishjaouinsttinveistys))
f8x; y; z:r1(x; y) ^ r2(y; z) ! r31(x; z) _ _ r3k(x; z) j r1; r2 = fr31; : : : ; r3kgg
(weak composition axioms)
For i 2 f3; 5; 8g additionally the axiom 8xEQ(x; x) (re exivity of EQ) is
contained. For i = 2 one has instead the axiom 8xO(x; x) (re exivity of O).
In particular, the axioms state the JEPD-property of the base relations (each
pair of regions x; y is related over exactly one base relation) and describe the
(weak) composition of two base relations (denoted by ;) according to the
composition table for RCCi. With the composition of two base relations, in most cases,
only inde nite knowledge of spatial con gurations follows. The spatial con
guration r1(x; z) _ _ rn(x; z) for base relations rj in BRCCi is also written
as fr1; : : : ; rng(x; z), and the set fr1; : : : ; rng is called a general RCCi relation.
Let Rel RCCi be the set of all 2i general RCCi relations. An RCCi (constraint)
network consists of assertions of the form fr1; : : : ; rng(x; y).</p>
      <p>We mention here the composition table for the low resolution logics RCC2
and RCC3. Their base relations are given by the sets BRCC3 = fDR; EQ; ONEg
and BRCC2 = fDR; Og, and their weak compositions are de ned as shown in
Fig. 1. The discreteness relation DR is the same as fDC; ECg, the
overlappingbut-not-equal relation ONE is equal to fPO; NTPP; TPP; NTPPi; TPPig and the
overlapping relation O is given by fONE; EQg.</p>
      <p>; DR O
DR BRCC2 BRCC2
O BRCC2 BRCC2</p>
      <p>; DR
DR BRCC3
ONE fDR; ONEg
EQ DR</p>
      <p>
        Note that in the de nitions of the base relations (of RCC3 and RCC2) we
followed the author of [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The base relations of the low resolution calculus of
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] are di erent from those of RCC2; the authors of [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] consider the two base
relations DC and fEC; Og. But as we do not deal with the exact de nitions of
the base relations referring to the connectedness relation C but with the axiom
systems referring to the composition table this di erence has no e ect|the low
resolution calculus of [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] has the same trivial composition table as RCC2. For
the composition tables of RCC5 and RCC8 have a look at [12, p. 45].
The family of DL-Lite description logics [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] is an appropriate candidate for the
thematic component of the envisioned geo-thematic logic as it o ers
computationally feasible satis ability checking and query answering over ontologies and
data stored in a relational database. More concretely, satis ability checking and
query answering (for unions of conjunctive queries) are rst order logic (FOL)
rewritable. In this paper, we will mainly deal with a member of the extended
DL-Lite family which we termed DL-LiteuF;R, and which allows functional roles,
role hierarchies and role inverses as well as the conjunction of basic concepts on
the left-hand side of GCIs (general concept inclusions). The syntax is given in
Def. 2. The semantics of this logic is de ned in the usual way|but imposing the
unique name assumption (UNA).
      </p>
      <p>De nition 2 (DL-LiteuF;R). Let RN be the set of role symbols and P 2 RN ,
CN be a set of concept symbols and A 2 CN , Const be a set of individual
constants and a; b 2 Const .</p>
      <p>R ! P j P B ! A j 9R Cl ! B j Cl u B Cr ! B j :B
TBox ): Cl v Cr; (funct R); R1 v R2</p>
      <p>ABox: A(a); R(a; b)
*) Restriction: If R occurs in a functionality axiom, then R and its inverse
do not occur on the right-hand side of a role inclusion axiom R1 v R2.</p>
      <p>
        FOL rewritability also holds for the logic DL-LiteuF;R which follows from the
corresponding FOL rewritability results for the Datalog extension Datalog [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
We assume that the reader is familiar with the notion of FOL queries, conjunctive
queries (CQ) and unions of conjunctive queries (UCQ), their semantics and the
notion of certain answers cert(Q; A [ T ) of a query w.r.t. to the union of a
TBox and an ABox T [ A [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Let DB(A) be the minimal Herbrand model of
A. Checking the satis ability of ontologies is FOL rewritable i for all TBoxes
T there is a boolean FOL query QT s.t. for all ABoxes A: the ontology T [ A
is satis able i DB(A) 6j= QT . Answering queries from a subclass C of FOL
queries w.r.t. to ontologies is FOL rewritable i for all TBoxes T and queries
Q = (x) in C there is a FOL query QT such that for all ABoxes A it is the case
that cert(Q; T [ A) = QTDB(A). For DL-Lite, FOL-rewritability can be proved
w.r.t. to satis ability as well as w.r.t. answering UCQs [2, Thm 4.14, Thm 5.15].
A crucial part of the proof for FOL rewritability w.r.t. query answering is the
perfect rewriting algorithm [2, Fig. 2]. This algorithm works by using positive
inclusion axioms of the form A1 v A2 as rewriting rules from right to left so
that for example an atom A2(x) occurring in a CQ would produce a new CQ
containing A1(x) instead of A2(x).
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Weak Combinations of DL-Lite with RCC</title>
      <p>
        In this section, we recapitulate the results concerning a weak coupling of DL-Lite
with the most expressive region connection calculus fragment RCC8, which we
introduced in [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ], and provide an example for its use(fulness). This will give us
the opportunity to introduce further concepts that are necessary to understand
the following discussions on stronger couplings of DL-Lite with the weaker region
connection calculi RCC2 and RCC3.
      </p>
      <p>
        The combination paradigm follows that of Lutz and Milicic [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] who combine
ALC with the RCC8 and, more generally, with !-admissible concrete domains
[6, Def. 5, p. 7]. The combined logic ALC(RCC8) of [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] is well behaved in so far
as testing concept subsumption is decidable. As we aim at FOL rewritability we
have to be even more careful in choosing the right combination method.
      </p>
      <p>We use an axiom set T! with corresponding properties of an !-admissible
domain for coupling with DL-Lite because axioms are more appropriate for
rewriting investigations. The axiom sets AxRCCi will instantiate T!.</p>
      <p>
        We recapitulate the syntax and the semantics of the constructors of [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] that
are used for the coupling of the thematic and the spatial domain. A path U (of
length at most 2) is de ned as l for a xed attribute l (\has location") or as
R l, the composition of the role symbol R with l. We abbreviate R l with
R~ in this paper. The usual notion of an interpretation I in our combined logic
is slightly modi ed by using two separate domains I and ( )I . All symbols
of the theory T! are interpreted relative to ( )I . Let r be an RCC-relation of
some RCC-fragment. That is, let be given a set of base relations BRCCi and r =
fr1; : : : rng r1_ _rn for ri 2 BRCCi. Then lI I ( )I ; rI = r1I [ [rnI ;
(R l)I =f(d; e ) 2 I ( )I j there is an e s.t. (d; e) 2 RI and (e; e ) 2 lI g;
(9U1; U2:r)I =fd 2 I j there exist e1, e2 s.t. (d; e1) 2 U1I ; (d; e2) 2 U2I and
(e1; e2) 2 rI g; (8U1; U2:r)I =fd 2 I j for all e1, e2 s.t. (d; e1) 2 U1I ; (d; e2) 2
U2I it holds that (e1; e2) 2 rI g.
      </p>
      <p>Now we can de ne the following combined geo-thematic logic (where a ; b
stand for constants intended to be interpreted by regions):
De nition 3 (DL-LiteuF;R(RCC8)). Let r 2 Rel RCC8 and T! = AxRCC8.</p>
      <p>R ! P j P U ! R j R~ B ! A j 9R j 9l
Cl ! B j Cl u B Cr ! B j :B j 9U1; U2:r
TBox ): Cl v Cr; (funct l); (funct R); R1 v R2</p>
      <p>ABox: A(a); R(a; b); l(a; a ); r(a ; b )
*) Restriction: If (funct R) 2 T , then R and R do not occur on the
righthand side of a role inclusion axiom or in a concept of the form 9U1; U2:r.</p>
      <p>As satis ability checking of RCC8 constraint networks is NP-complete, there
is only a chance to reach FOL rewritability if we assume within the ABox a
constraint network which is consistent and complete, i.e., only base relations are
allowed as labels; in this case the ABox is called spatially complete. It seems to
us that for cadastral maps or maps containing areas of administration one can
assume pretty safely (almost) spatial completeness. The coupling with RCC8 is
so weak that FOL rewritability of satis ability follows.</p>
      <p>Proposition 1. Checking the satis ability of DL LiteuF;R(RCC8) ontologies
that have a spatially complete ABox is FOL rewritable.</p>
      <p>The FOL rewritability holds also for query rewriting w.r.t. to a restricted
class of treelike queries (termed GCQ+). The result is achieved by an adapted
perfect rewriting algorithm PerfectRef [2, Fig. 13].</p>
      <p>Theorem 1. Answering GCQ +-queries w.r.t. DL LiteuF;R(RCC8) ontologies
that have a spatially complete ABox is FOL rewritable.</p>
      <p>
        DL-LiteuF;R(RCC8) as well as the logics introduced below are suited for use in
scenarios such as that of an engineering bureau planning additional parks in
a city [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Assume, the bureau has stored geographical data in some database
and declares relevant concepts in the TBox: Park+Lake v Park; Park4Playing v
Park; Park+Lake v 9hasLake l; l:TPP; Park4Playing v 9hasPlAr l; l:TPP. The
ABox A is derived virtually by mappings from geographical data in a database.
In particular, assume that fPark+Lake(a); Park4Playing(a)g A. According to
A, the object a is a park with a lake and a park with a playing area but its
spatial extension is not known. Now, the engineering bureau asks for all parks
with lakes and playing areas such that the playing area is not contained as island
in the lake. This can be formalized by the GCQ+ query: Q =Park(x)^9hasLake
l; hasPlAr l:(BRCC8 n fNTPPg)(x). Using the composition entry TPP; TPPi =
fDC; EC; PO; TPP; TPPi; EQg BRCC8 n fNTPPg, the reformulation algorithm
produces a UCQ that contains the following CQ: Q0 = (9hasLake l; l:TPP)(x) ^
(9l; hasPlAr l:TPPi)(x). Rewriting 9l; hasPlAr l:TPPi to 9hasPlAr l; l:TPP
in combination with the rewriting rule for A1 v A2 we get another CQ Q00 =
Park+Lake(x) ^ Park4Playing(x). Now, Q00 captures (as desired) the object a.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Strong Combinations of DL-Lite with RCC</title>
      <p>
        Another way of reaching FOL rewritability for combinations of DL-Lite with
RCC is weakening the expressivity of the spatial component. Hence, one may
ask whether a combination with the calculus RCC3 or RCC2 [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], both fragments
with weak expressibility, allows for weak FOL rewritability w.r.t. satis ability
checks (and query answering). Their potential use as logics for approximating
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] ontologies in more expressible combined logics like ALC(RCC8) makes the
investigation valuable. The logics DL-LiteuF;;+R(RCC2) and DL-LiteuF;;+R(RCC3)
are de ned as follows ('+' indicates the strong combination):
De nition 4 (DL-LiteuF;;+R(RCC2) and DL-LiteuF;;+R(RCC3)). Let T! =
AxRCC2 resp. T! = AxRCC3 and r 2 BRCC2 resp. r 2 BRCC3
      </p>
      <p>R ! P j P U ! l j R~ B ! A j 9R
Cl ! B j Cl u B Cr ! B j :B j 9U1; U2:r
TBox ): Cl v Cr; (funct l; R); R1 v R2</p>
      <p>ABox: A(a); R(a; b); l(a; a ); r(a ; b )
*) Restriction: If (funct R) 2 T , then R and R do not occur on the
righthand side of a role inclusion axiom.</p>
      <p>For RCC3 the strong combination with DL-LiteuF;R leads to non-FOL
rewritability. The reason lies in the fact that testing the satis ability of RCC3 is not in
the complexity class AC0 as shown by the following lemma.</p>
      <p>
        Lemma 1. Checking satis ability of RCC3 networks is Logspace hard.
Proof. As is known, the reachability problem in symmetric (undirected) graphs is
logspace complete [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]|where graph reachability asks whether for nodes s; t in G
there is a path between s and t. By reducing this problem to the satis ability test
for RCC3 networks we will have shown that the latter problem is Logspace hard
itself. So let be given a (symmetric) graph G = (V; E) and nodes s; t 2 V . We
de ne the network N in the following way (see Figure 2): Let V = fv1; : : : ; vng
be an enumeration of the nodes of G; w.l.o.g. let s = v1 and t = vn and let
B = BRCC3. Nodes of N are given by V [ fag where a 2= V . Labelled edges of
N are given by: sfDRga; tfONEga; vifBga for all i 6= 1; n; vifEQgvj if E(vi; vj );
vifBgvj if :E(vi; vj ). Now we show that the network N is satis able i s and t are
!"
)*"
      </p>
      <p>B</p>
      <p>B
-4"56"B
#"$"%&amp;"</p>
      <p>-4"56"B
%."
%0"</p>
      <p>B
/"/"/"
+,-"</p>
      <p>-4"56"B
%1(2&amp;3"
'"$"%("
connected in G. Assume that s and t are connected; then there is an EQ-path in N
between them, hence sfEQgt follows. But this contradicts sfDRga and tfONEga.
Now assume that s and t are not connected; then there is no path consisting only
of EQ-labels between s and t. The graph G consists of at least 2 components, and
s; t are in di erent components. We de ne a consistent con guration as follows:
For all nodes v; v0 in the component in which s is contained, let vfDRga and
vfEQgv0. For all nodes v; v0 in the component of t let vfONEga and vfEQgv0.
For all nodes v; v0 in the other components let vfDRga and vfEQgv0. For all
nodes v; v0 which have not a label yet, let vfDRgv0. (Two remarks : 1) EQ-edges
for edges E(vi; vj ) in G with j &gt; i + 1 are not shown in Fig. 2. 2) We inserted
edges labelled B for better illustrations. But these are not needed.)</p>
      <p>This lemma immediately entails the fact that satis ability checking for
ontologies over the logic DL-LiteuF;;+R(RCC3) is not FOL rewritable. This problem
does not vanish if we presuppose that the ABox A is spatially complete|as
shown by the following proposition.</p>
      <p>Proposition 2. Satis ability checking of ontologies in DL-LiteuF;;+R(RCC3) with
spatially complete ABoxes is not FOL rewritable.</p>
      <p>Proof. We construct a generic TBox Tg that allows one to encode any RCC3
constraint network so that checking the consistency of RCC3 constraint networks
is reducible to a satis ability check of this TBox and a spatially complete ABox.
Let for every r 2 Rel RCC3 be given role symbols Rr1; Rr2. The generic TBox Tg
has for every r 2 Rel RCC3 a concept symbol Ar and a corresponding axiom with
the content that all instances of Ar have paths over the abstract features R1
resp. R2 to regions that are r-related.</p>
      <p>Tg = fAr v 9R~r1; R~r2:r; (funct l; Rr1; Rr2) j r 2 RelRCC3g
(1)
Now, let N be an arbitrary RCC3 constraint network which has to be tested for
relational consistency. Let AN be an ABox such that for every r(a; b) in N three
new constants are introduced: xab; xa; xb.</p>
      <p>AN = fAr(xab); Rr1(xab; xa); Rr2(xab; xb) j r(a; b) 2 N g
(2)
The construction entails: Tg [ AN [ AxRCC3 is satis able i N [ AxRCC3 is
satis able. If the data complexity of the satis ability check for DL-Liteu;+
(RCC3)F;R
ontologies were in AC0, then the consistency of constraint networks could be
tested in AC0, too. (Note that Tg is a xed TBox.) But checking the consistency
of RCC3 constraint networks is Logspace-hard and AC0 ( Logspace.</p>
      <p>As a corollary to this proposition we get the assertion that strong
combinations of RCC5 and RCC8 into DL-LiteuF;;+R(RCC5) and DL-LiteuF;;+R(RCC8),
respectively|which are de ned in the same manner as in De nition 4|do not
allow for FOL rewritability of satis ability checking.</p>
      <p>The low resolution calculus RCC2 is quite more inexpressive than RCC3
due to the fact that the composition table does not allow for the propagation
of information: All compositions of DR; O result in the maximally unspeci ed
relation fDR; Og. Hence, FOL rewritability of satis ability testing follows easily
considering the query Q = 9x; y[O(x; y) ^ DR(x; y)] _ 9x[DR(x; x)].
Proposition 3. Testing the satis ability of RCC2 networks is FOL rewritable.
But in combination with functionality axioms of the TBox one could have the
problem that the ABox may lead to identi cations of regions. The identi ed
regions are not allowed to have edges labelled O, DR resp. to the same region.
Though this can be tested, the problem arises when a chain of regions is identi ed
by the TBox and the ABox, because we do not know the length of the chain
in advance. More formally: In addition to RCC2 constraint-network assertions
we allow identity assertions v = w for regions v; w. As we can assume that all
nodes in a RCC2 network are connected by an edge labelled O, DR or BRCC2
we use a more intuitive formalism where, for every assertion v = w, the label of
the edge between v and w is marked with an =; e.g., an edge between v; w with
label DR= stands for DR(v; w) ^ v = w. We call such a network an =-marked
RCC2 network (a RCC=2 network for short). Let B = BRCC2 in the following.
Proposition 4. An RCC=2 constraint network N is unsatis able i
1. N contains DR(v; v) or DR=(v; v) for some node v; or
2. N contains DR=(v; w); or
3. N contains a cycle in which there is DR(v; w) and in which there is a path
from v to w such that every label on the path is B= or O=; or
4. N contains a cycle in which there is DR(v; w) and in which there is a path
from v to w s.t. every label on the path is B= or O= except one which is O.
Proof. Su ciency of the condition for unsatis ability is clear. The proof for
necessity is done by induction on the number of =-marked labels. So let be
given a RCC= network N . We may assume, that the network has for every pair
of nodes exactly one labelled edge between; we assume the edges to be undirected
as all relations are symmetric.</p>
      <p>Base case: Assume that none of the four conditions hold. As there are no
marked labels, then N unsatis ability can occur only, if N contains DR(v; v) for
some node v ( rst condition) or DR(v; w) and O(v; w) (fourth condition). But
these cases are excluded by assumption.</p>
      <p>Induction step: Let N contain n marked labelled edges and assume that for
all networks N 0 with n 1 marked labelled edges unsatis ability of N 0 implies one
of the conditions. Now, assume that for N no one of the four conditions holds.
We have to show that N is satis able. Take an arbitrary =-marked labelled edge
between nodes v; w. The label of this edge is either O= or B=. We de ne a
new network N 0 which results as a contraction from N by identifying v and w to
the node z. For N 0 we may assume again that it contains for every pair of nodes
exactly one labelled edge: If in N we have r1(v; k) and r2(w; k), then the edge
between z and k in N 0 results as r1 \ r2 and is =-marked i r1 or r2 is marked.
Clearly r1 \ r2 is not empty, as otherwise we would have a contradiction to the
fact that N does not ful ll conditions 3 and 4. Clearly N is satis able i N 0 is
satis able. Assume to the contrary that N 0 is unsatis able. Hence, one of the
four conditions holds for N 0: 1) Assume N 0 contains DR(v0; v0) or DR=(v0; v0) for
some node v0. If v0 is not z, then also DR(v0; v0) 2 N resp. DR=(v0; v0) 2 N |
contradicting the fact that N does not ful ll condition 1. Otherwise v0 = z, but
this cannot be the case either, as there are no self-loops DR(v; v), DR=(v; v),
DR(w; w), DR=(w; w) in N nor DR(v; w) or DR(v; w). 2) Assume N 0 contains
DR=(v0; w0). If neither v0 nor w0 is z, this contradicts the fact that N does not
ful ll the 2. condition. Otherwise v0 = w0 = z, leading to a contradiction with
the fact that N does not ful ll condition 1. 3) Assume N 0 contains a cycle in
which there is DR(v0; w0) and there is a path from v0 to w0 such that every label
on the path is B= or O=. The case that the path does not contain z immediately
leads to a contradiction. Otherwise, the path extends to a path in N ful lling
the 3. condition|contradiction. Similarly, if N 0 ful lls condition 4, the verifying
path can be extended to a path in N ful lling condition 4|contradiction.</p>
      <p>Proposition 4 shows that adding identity assertions to an RCC2 network may
require checking the existence of identity chains of arbitrary length. Hence, in
principle it is possible that the functional roles used in DL-LiteuF;;+R(RCC2) may
lead to identity chains. But as we want to show in the following proposition,
this cannot be the case: The identity paths induced by functionalities in
DLLiteuF;;+R(RCC2) can have only a maximal length of one.</p>
      <p>Proposition 5. Satis ability checking of ontologies in DL-LiteuF;;+R(RCC2) is
FOL rewritable.</p>
      <p>
        We give a proof sketch. The idea is to nd concepts that are unsatis able
according to the TBox (this amounts to constructing the negative closure as in the
proofs for pure DL-Lite [2, Def. 4.7, p. 292]); these are formulated as boolean
queries, and the ( nite) disjunctions of these queries is answered over the ABox;
e.g., if A1 v :A2 is in the TBox, then the query would contain 9x(A1(x)^A2(x))
as disjunct. The introduction of concepts of the form 9U1; U2:r enlarges the
potential con icts of a TBox T with an ABox A. So in addition to the FOL queries
that result from the negative closure of the TBox, we have to nd queries for
the potential con icts in the four conditions of Proposition 4. The resulting
conjunctive queries have further to be fed into a perfect rewriting algorithm like
PerfectRef for pure DL-Lite [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] in order to capture the implications of the TBox.
      </p>
      <p>Concerning the rst two conditions we have to deal with axioms of the form
B v 9l; l:DR. If this axiom occurs in the TBox T , then one has to produce
the CQ 9x:B(x). Similarly, if fB v 9R~; R~:DR; (funct R)g T , then the CQ
9x:B(x) has to be added. Also if fB v 9R~1; R~2:DR; (funct R1; funct R2)g
T , then we may get a con ict of the rst kind and hence we have to add a
CQ 9x; y[B(x) ^ R1(x; y) ^ R2(x; y)]. Concerning the third and fourth condition
we note that this can be only the case if the =-marked paths have maximal
length one. Otherwise we already have a contradiction of the ABox with the
functionality assertions in the TBox. Hence, one considers only the case of pairs
of TBox axioms of the general form A v 9R~1; R~2:DR and B v 9R~3; R~4:O with
(funct R1; R2; R3; R4). In this case we feed also into the PerfectRef algorithm the
CQ 9x; y; z; w[A(x) ^ B(y) ^ R1(x; z) ^ R3(y; z) ^ R2(x; w) ^ R4(y; w)].
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>
        As recapitulated in this paper, combining DL-Lite with expressive fragments
of the region calculus like RCC8 into logics that preserve the property of FOL
rewritability is possible if the coupling is weak: Constraints of the RCC8 network
contained in the ABox are not transported over to the implicitly constructed
constraint network resulting from the constructors of the form 9U1; U2:r. In this
paper we mainly dealt with strong combinations for weaker calculi like RCC2
or RCC3. As we have shown by a reduction proof, a strong combination with
RCC3 destroys the FOL rewritability of satis ability checking. The reason is
that checking the satis ability of RCC3 networks needs to test for reachability
along EQ paths, which can be reproduced by the TBox. For the low resolution
calculus RCC2, FOL rewritability of satis ability checking is provable|though
checking the satis ability of RCC2 networks with additional identity assertions
is at least as hard as checking RCC3 networks. We plan to investigate whether
DL-LiteuF;;+R(RCC2) and DL-LiteuF;R(RCC8) can be used for approximation|
following the complete but not necessarily correct approximation method of
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Moreover we want to check whether DL-LiteuF;;+R(RCC2) allows for FOL
rewritability of query answering w.r.t. unions of conjunctive queries.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Cal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gottlob</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukasiewicz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>A general datalog-based framework for tractable query answering over ontologies</article-title>
          .
          <source>Technical Report CL-RR-10-21</source>
          , Oxford University Computing Laboratory (
          <year>November 2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Giacomo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poggi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodr</surname>
            <given-names>guezMuro</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Rosati</surname>
          </string-name>
          , R.:
          <article-title>Ontologies and databases: The DL-Lite approach</article-title>
          . In: Tessaris,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Franconi</surname>
          </string-name>
          , E. (eds.)
          <source>Semantic Technologies for Informations Systems { 5th Int. Reasoning Web Summer School</source>
          (RW-
          <year>2009</year>
          ), LNCS, vol.
          <volume>5689</volume>
          , pp.
          <volume>255</volume>
          {
          <fpage>356</fpage>
          . Springer (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Grigni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Papadias</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Papadimitriou</surname>
            ,
            <given-names>C.H.</given-names>
          </string-name>
          :
          <article-title>Topological inference</article-title>
          .
          <source>In: IJCAI (1)</source>
          . pp.
          <volume>901</volume>
          {
          <issue>907</issue>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Haarslev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , Moller, R.:
          <article-title>A description logic with concrete domains and a role-forming predicate operator</article-title>
          .
          <source>J. Log. Comput</source>
          .
          <volume>9</volume>
          (
          <issue>3</issue>
          ),
          <volume>351</volume>
          {
          <fpage>384</fpage>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Kaplunova</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moeller</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wandelt</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wessel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Towards scalable instance retrieval over ontologies</article-title>
          . In: Yaxin,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Mary-Anne</surname>
          </string-name>
          , W. (eds.) Knowledge Science, Engineering and Management, Fourth International Conference,
          <source>KSEM 2010, Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>6291</volume>
          . Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milicic</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A tableau algorithm for description logics with concrete domains and general TBoxes</article-title>
          .
          <source>J. Autom. Reasoning</source>
          <volume>38</volume>
          (
          <issue>1-3</issue>
          ),
          <volume>227</volume>
          {
          <fpage>259</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>O</given-names>
            <surname>zcep</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.L.,</surname>
          </string-name>
          <article-title>Moller</article-title>
          , R.:
          <article-title>Computationally feasible query answering over spatiothematic ontologies</article-title>
          .
          <source>In: Proceedings of GEOProcessing</source>
          <year>2012</year>
          ,
          <source>The Fourth International Conference on Advanced Geographic Information Systems</source>
          , Applications, and
          <string-name>
            <surname>Services</surname>
          </string-name>
          (
          <year>2012</year>
          ), available online at http://www.thinkmind.org/index.php? view=article&amp;articleid=geoprocessing_
          <year>2012</year>
          _
          <volume>7</volume>
          _
          <fpage>10</fpage>
          _
          <fpage>30059</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>O</given-names>
            <surname>zcep</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.L.</surname>
          </string-name>
          , Moller, R.:
          <article-title>Scalable geo-thematic query answering</article-title>
          .
          <source>Technical report</source>
          , Institute for Softwaresystems (STS), Hamburg University of Technology (
          <year>2012</year>
          ), available online at http://www.sts.tu-harburg.de/tech-reports/papers.html
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Randell</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cui</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cohn</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          :
          <article-title>A spatial logic based on regions and connection</article-title>
          .
          <source>In: Proceedings of the 3rd International Conferecence on Knowledge Representation and Reasoning</source>
          . pp.
          <volume>165</volume>
          {
          <issue>176</issue>
          (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Reingold</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Undirected connectivity in log-space</article-title>
          .
          <source>J. ACM</source>
          <volume>55</volume>
          (
          <issue>4</issue>
          ),
          <volume>17</volume>
          :1{
          <fpage>17</fpage>
          :24 (Sep
          <year>2008</year>
          ), http://doi.acm.
          <source>org/10</source>
          .1145/1391289.1391291
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Renz</surname>
          </string-name>
          , J.:
          <source>Qualitative Spatial Reasoning with Topological Information, Lecture Notes in Computer Science</source>
          , vol.
          <volume>2293</volume>
          . Springer (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Renz</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , Nebel, B.:
          <article-title>Qualitative spatial reasoning using constraint calculi</article-title>
          . In: Aiello,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Pratt-Hartmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Benthem</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.) Handbook of Spatial Logics, pp.
          <volume>161</volume>
          {
          <fpage>215</fpage>
          . Springer Netherlands (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Rodriguez-Muro</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Semantic index: Scalable query answering without forward chaining or exponential rewritings</article-title>
          .
          <source>In: Posters of the 10th Int. Semantic Web Conf. (ISWC</source>
          <year>2011</year>
          )
          <article-title>(</article-title>
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Wessel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>On spatial reasoning with description logics - position paper</article-title>
          . In: Ian Horrocks, S.T. (ed.)
          <source>Proceedings of the International Workshop on Description Logics (DL-2002). CEUR Workshop Proceedings</source>
          , vol.
          <volume>53</volume>
          (
          <year>2002</year>
          ), http://CEURWS.org/Vol-
          <volume>53</volume>
          /
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Wessel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Qualitative spatial reasoning with the ALCIRCC - family | rst results and unanswered questions</article-title>
          .
          <source>Technical Report FBI{HH{M{324/03</source>
          , University of Hamburg, Department for Informatics (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>