<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Combining DL-Lite with Spatial Calculi for Feasible Geo-thematic Query Answering</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Özgür</forename><forename type="middle">Lütfü</forename><surname>Özçep</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Institute for Software Systems (STS</orgName>
								<orgName type="institution">Hamburg University of Technology Hamburg</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author role="corresp">
							<persName><forename type="first">Ralf</forename><surname>Möller</surname></persName>
							<email>moeller@tu-harburg.de</email>
							<affiliation key="aff0">
								<orgName type="department">Institute for Software Systems (STS</orgName>
								<orgName type="institution">Hamburg University of Technology Hamburg</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Combining DL-Lite with Spatial Calculi for Feasible Geo-thematic Query Answering</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">C193694AA62D4E0F6B32A2207518AC02</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T23:08+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>FOL rewritability</term>
					<term>region connection calculus</term>
					<term>qualitative spatial reasoning</term>
					<term>GIS</term>
					<term>combinations</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>First order logic (FOL) rewritability is a desirable feature for query answering over geo-thematic ontologies because in most geoprocessing scenarios one has to cope with large data volume. Hence, there is a need for combined geo-thematic logics that provide a sufficiently expressive query language allowing for FOL rewritability. The DL-Lite family of description logics is tailored towards FOL rewritability of query answering for unions of conjunctive queries, hence it is a suitable candidate for the thematic component of a combined geo-thematic logic. We show that a weak coupling of DL-Lite with the expressive region connection calculus RCC8 allows for FOL rewritability under a spatial completeness condition for the ABox. Stronger couplings allowing for FOL rewritability are possible only for spatial calculi as weak as the low-resolution calculus RCC2. Already a strong combination of DL-Lite with the low-resolution calculus RCC3 does not allow for FOL rewritability.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Query answering over a database becomes far more difficult if the extensional knowledge in the database is extended by constraints in an ontology. The reason is that a database plus an ontology may have many different models, hence ontology based query answering has to compute the answers w.r.t. to all models and build their intersection (certain answer semantics). But in some cases-when using a lightweight logic like DL-Lite for the representation of the ontology and a restricted query language like unions of conjunctive queries-query answering w.r.t. an ontology can be reduced to model checking. This is formalized by the notion of FOL (first order logic) rewritability: a given query can be rewritten into a FOL query in which the intensional knowledge of the ontology is captured. Though the rewritten queries may become exponentially bigger than the original queries, there exist optimizations <ref type="bibr" target="#b12">[13]</ref>. So, FOL rewritability means a benefit. DL-Lite per se <ref type="bibr" target="#b1">[2]</ref> is not sufficient for use in scenarios of geographic information processing, as these demand among others the representation and deduction over spatial concepts. Though there exists related work combining spatial and thematic reasoning <ref type="bibr" target="#b3">[4]</ref>, <ref type="bibr" target="#b14">[15]</ref>, <ref type="bibr" target="#b5">[6]</ref>, it is not aimed at FOL rewritability. Hence, there is still a need for investigating combinations of logics that, on the one hand, are sufficiently expressive to fit the representation's needs in geographical information processing and that, on the other hand, allow for computationally feasible (in particular FOL rewritable) satisfiability checking and query answering.</p><p>Continuing previous work <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>, we investigate combinations of logics in the DL-Lite family with different members of the region connection calculus (RCC) family <ref type="bibr" target="#b8">[9]</ref>, a well-known family of calculi for qualitative spatial reasoning. The DL-Lite logic we are using as thematic part differs from the known members of the DL-Lite family as it also allows for concept conjunctions on the lefthand side of general inclusion axioms. In previous work <ref type="bibr" target="#b7">[8]</ref>, we focussed on the FOL rewritability aspects for weak combinations of DL-Lite with RCC8; these combinations are weak in so far as they do not allow for the construction of arbitrary RCC8 constraint networks in the intensional part (TBox) of the ontology. In this paper we focus on strong combinations of DL-Lite with the weaker fragments RCC3 and RCC2, and prove that DL-Lite F ,R (RCC3) does not allow for FOL rewritability of satisfiability checking while the weaker DL-Lite F ,R (RCC2) does.</p><p>The paper is structured as follows. Section 2 collects technical details on the region connection calculus and the DL-Lite family of description logics. Weak combinations of DL-Lite with the region connection calculus are described in Sect. 3. In Sect. 4, the last section before the conclusion, we consider strong combinations of DL-Lite with weaker fragments of the region connection calculus.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Logical Preliminaries</head><p>We recapitulate the main logical notation and concepts used in this paper; the region connection calculus and DL-Lite.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">The Region Connection Calculus</head><p>We will consider different fragments of the region connection calculus <ref type="bibr" target="#b8">[9]</ref> as potential candidates for the spatial logic to be combined with DL-Lite. Randell and colleagues' axiom system <ref type="bibr" target="#b8">[9]</ref> is based on a primitive binary relation C intended to denote a connectedness relation which is specified to be reflexive and symmetric. On the basis of C other binary relations between regions which are called base relations are explained. One set of base relations is the set B RCC8 , which is the main component of the most expressive region connection calculus RCC8. The base relations of B RCC8 and their intended meanings are given as follows: B RCC8 = {DC (disconnected), EC (externally connected), EQ (equal), PO (partially overlapping), NTPP (non-tangential proper part), TPP (tangential proper part), NTPPi (inverse of NTPP), TPPi (inverse of TPP)}. We skip the concrete definitions of the base relations by the connectedness relation C (see, e.g., <ref type="bibr">[11, p. 45]</ref>), as we-in contrast to the axiom system of Randell and colleagues-consider the following axiom system schema Ax RCCi , which directly specifies the properties of the base relations in B RCCi .</p><p>Definition 1 (Axiom system schema Ax RCCi ). For all i ∈ {2, 3, 5, 8} the axiom set Ax RCCi contains the following axioms:</p><formula xml:id="formula_0">{∀x, y. r∈B RCCi r(x, y)} ∪ (joint exhaustivity) {∀x, y. r1,r2∈B RCCi ,r1 =r2 r 1 (x, y) → ¬r 2 (x, y)} ∪ (pairwise disjointness) {∀x, y, z.r 1 (x, y) ∧ r 2 (y, z) → r 1 3 (x, z) ∨ • • • ∨ r k 3 (x, z) | r 1 ; r 2 = {r 1 3 , . . . , r k 3 }} (weak composition axioms)</formula><p>For i ∈ {3, 5, 8} additionally the axiom ∀xEQ(x, x) (reflexivity of EQ) is contained. For i = 2 one has instead the axiom ∀xO(x, x) (reflexivity of O).</p><p>In particular, the axioms state the JEPD-property of the base relations (each pair of regions x, y is related over exactly one base relation) and describe the (weak) composition of two base relations (denoted by ;) according to the composition table for RCCi. With the composition of two base relations, in most cases, only indefinite knowledge of spatial configurations follows. The spatial configuration r 1 (x, z) ∨ • • • ∨ r n (x, z) for base relations r j in B RCCi is also written as {r 1 , . . . , r n }(x, z), and the set {r 1 , . . . , r n } is called a general RCCi relation. Let Rel RCCi be the set of all 2 i general RCCi relations. An RCCi (constraint) network consists of assertions of the form {r 1 , . . . , r n }(x, y).</p><p>We mention here the composition table for the low resolution logics RCC2 and RCC3. Their base relations are given by the sets B RCC3 = {DR, EQ, ONE} and B RCC2 = {DR, O}, and their weak compositions are defined as shown in Fig. <ref type="figure">1</ref> Note that in the definitions of the base relations (of RCC3 and RCC2) we followed the author of <ref type="bibr" target="#b13">[14]</ref>. The base relations of the low resolution calculus of <ref type="bibr" target="#b2">[3]</ref> are different from those of RCC2; the authors of <ref type="bibr" target="#b2">[3]</ref> consider the two base relations DC and {EC, O}. But as we do not deal with the exact definitions of the base relations referring to the connectedness relation C but with the axiom systems referring to the composition table this difference has no effect-the low resolution calculus of <ref type="bibr" target="#b2">[3]</ref> has the same trivial composition table as RCC2. For the composition tables of RCC5 and RCC8 have a look at <ref type="bibr">[12, p. 45</ref>].</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">DL-Lite</head><p>The family of DL-Lite description logics <ref type="bibr" target="#b1">[2]</ref> is an appropriate candidate for the thematic component of the envisioned geo-thematic logic as it offers computationally feasible satisfiability checking and query answering over ontologies and data stored in a relational database. More concretely, satisfiability checking and query answering (for unions of conjunctive queries) are first order logic (FOL) rewritable. In this paper, we will mainly deal with a member of the extended DL-Lite family which we termed DL-Lite F ,R , and which allows functional roles, role hierarchies and role inverses as well as the conjunction of basic concepts on the left-hand side of GCIs (general concept inclusions). The syntax is given in Def. 2. The semantics of this logic is defined in the usual way-but imposing the unique name assumption (UNA).</p><p>Definition 2 (DL-Lite F ,R ). Let RN be the set of role symbols and P ∈ RN , CN be a set of concept symbols and A ∈ CN , Const be a set of individual constants and a, b</p><formula xml:id="formula_1">∈ Const. R −→ P | P − B −→ A | ∃R C l −→ B | C l B C r −→ B | ¬B TBox * ) : C l C r , (funct R), R 1 R 2 ABox: A(a), R(a, b) *) Restriction: If R</formula><p>occurs in a functionality axiom, then R and its inverse do not occur on the right-hand side of a role inclusion axiom R 1 R 2 .</p><p>FOL rewritability also holds for the logic DL-Lite F ,R which follows from the corresponding FOL rewritability results for the Datalog extension Datalog ± <ref type="bibr" target="#b0">[1]</ref>. We assume that the reader is familiar with the notion of FOL queries, conjunctive queries (CQ) and unions of conjunctive queries (UCQ), their semantics and the notion of certain answers cert(Q, A ∪ T ) of a query w.r.t. to the union of a TBox and an ABox T ∪ A <ref type="bibr" target="#b1">[2]</ref>. Let DB(A) be the minimal Herbrand model of A. Checking the satisfiability of ontologies is FOL rewritable iff for all TBoxes T there is a boolean FOL query Q T s.t. for all ABoxes A: the ontology T ∪ A is satisfiable iff DB(A) |= Q T . Answering queries from a subclass C of FOL queries w.r.t. to ontologies is FOL rewritable iff for all TBoxes T and queries</p><formula xml:id="formula_2">Q = ψ(x) in C there is a FOL query Q T such that for all ABoxes A it is the case that cert(Q, T ∪ A) = Q DB(A) T</formula><p>. For DL-Lite, FOL-rewritability can be proved w.r.t. to satisfiability as well as w.r.t. answering UCQs [2, Thm 4.14, Thm 5.15]. A crucial part of the proof for FOL rewritability w.r.t. query answering is the perfect rewriting algorithm [2, Fig. <ref type="figure" target="#fig_0">2</ref>]. This algorithm works by using positive inclusion axioms of the form A 1 A 2 as rewriting rules from right to left so that for example an atom A 2 (x) occurring in a CQ would produce a new CQ containing A 1 (x) instead of A 2 (x).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Weak Combinations of DL-Lite with RCC</head><p>In this section, we recapitulate the results concerning a weak coupling of DL-Lite with the most expressive region connection calculus fragment RCC8, which we introduced in [7, 8], and provide an example for its use(fulness). This will give us the opportunity to introduce further concepts that are necessary to understand the following discussions on stronger couplings of DL-Lite with the weaker region connection calculi RCC2 and RCC3.</p><p>The combination paradigm follows that of Lutz and Miličič <ref type="bibr" target="#b5">[6]</ref> who combine ALC with the RCC8 and, more generally, with ω-admissible concrete domains <ref type="bibr" target="#b5">[6,</ref><ref type="bibr">Def. 5,</ref><ref type="bibr">p. 7]</ref>. The combined logic ALC(RCC8) of <ref type="bibr" target="#b5">[6]</ref> is well behaved in so far as testing concept subsumption is decidable. As we aim at FOL rewritability we have to be even more careful in choosing the right combination method.</p><p>We use an axiom set T ω with corresponding properties of an ω-admissible domain for coupling with DL-Lite because axioms are more appropriate for rewriting investigations. The axiom sets Ax RCCi will instantiate T ω .</p><p>We recapitulate the syntax and the semantics of the constructors of <ref type="bibr" target="#b5">[6]</ref> that are used for the coupling of the thematic and the spatial domain. A path U (of length at most 2) is defined as l for a fixed attribute l ("has location") or as R • l, the composition of the role symbol R with l. We abbreviate R • l with R in this paper. The usual notion of an interpretation I in our combined logic is slightly modified by using two separate domains ∆ I and (∆ * ) I . All symbols of the theory T ω are interpreted relative to (∆ * ) I . Let r be an RCC-relation of some RCC-fragment. That is, let be given a set of base relations B RCCi and r = {r 1 , . . .</p><formula xml:id="formula_3">r n } ≡ r 1 ∨• • •∨r n for r i ∈ B RCCi . Then l I ⊆ ∆ I ×(∆ * ) I ; r I = r I 1 ∪• • •∪r I n ; (R•l) I ={(d, e * ) ∈ ∆ I ×(∆ * ) I | there is an e s.t. (d, e) ∈ R I and (e, e * ) ∈ l I }; (∃U 1 , U 2 .r) I ={d ∈ ∆ I | there exist e * 1 , e * 2 s.t. (d, e * 1 ) ∈ U I 1 , (d, e * 2 ) ∈ U I 2 and (e * 1 , e * 2 ) ∈ r I }; (∀U 1 , U 2 .r) I ={d ∈ ∆ I | for all e * 1 , e * 2 s.t. (d, e * 1 ) ∈ U I 1 , (d, e * 2 ) ∈ U I</formula><p>2 it holds that (e * 1 , e * 2 ) ∈ r I }. Now we can define the following combined geo-thematic logic (where a * , b * stand for constants intended to be interpreted by regions):</p><formula xml:id="formula_4">Definition 3 (DL-Lite F ,R (RCC8)). Let r ∈ Rel RCC8 and T ω = Ax RCC8 . R −→ P | P − U −→ R | R B −→ A | ∃R | ∃l C l −→ B | C l B C r −→ B | ¬B | ∃U 1 , U 2 .r TBox * ) : C l C r , (funct l), (funct R), R 1 R 2 ABox:</formula><p>A(a), R(a, b), l(a, a * ), r(a * , b * ) *) Restriction: If (funct R) ∈ T , then R and R − do not occur on the righthand side of a role inclusion axiom or in a concept of the form ∃U 1 , U 2 .r.</p><p>As satisfiability checking of RCC8 constraint networks is NP-complete, there is only a chance to reach FOL rewritability if we assume within the ABox a constraint network which is consistent and complete, i.e., only base relations are allowed as labels; in this case the ABox is called spatially complete. It seems to us that for cadastral maps or maps containing areas of administration one can assume pretty safely (almost) spatial completeness. The coupling with RCC8 is so weak that FOL rewritability of satisfiability follows.</p><p>Proposition 1. Checking the satisfiability of DL − Lite F ,R (RCC8) ontologies that have a spatially complete ABox is FOL rewritable.</p><p>The FOL rewritability holds also for query rewriting w.r.t. to a restricted class of treelike queries (termed GCQ + ). The result is achieved by an adapted perfect rewriting algorithm PerfectRef [2, Fig. <ref type="figure" target="#fig_1">13]</ref>.</p><p>Theorem 1. Answering GCQ + -queries w.r.t. DL − Lite F ,R (RCC8) ontologies that have a spatially complete ABox is FOL rewritable. DL-Lite F ,R (RCC8) as well as the logics introduced below are suited for use in scenarios such as that of an engineering bureau planning additional parks in a city <ref type="bibr" target="#b6">[7]</ref>. Assume, the bureau has stored geographical data in some database and declares relevant concepts in the TBox: Park+Lake Park; Park4Playing Park; Park+Lake ∃hasLake•l, l.TPP; Park4Playing ∃hasPlAr•l, l.TPP. The ABox A is derived virtually by mappings from geographical data in a database. In particular, assume that {Park+Lake(a), Park4Playing(a)} ⊆ A. According to A, the object a is a park with a lake and a park with a playing area but its spatial extension is not known. Now, the engineering bureau asks for all parks with lakes and playing areas such that the playing area is not contained as island in the lake. This can be formalized by the GCQ + query: Q =Park(x)∧∃hasLake• l, hasPlAr • l.(B RCC8 \ {NTPP})(x). Using the composition entry TPP; TPPi = {DC, EC, PO, TPP, TPPi, EQ} ⊆ B RCC8 \ {NTPP}, the reformulation algorithm produces a UCQ that contains the following CQ: Q = (∃hasLake • l, l.TPP)(x) ∧ (∃l, hasPlAr • l.TPPi)(x). Rewriting ∃l, hasPlAr • l.TPPi to ∃hasPlAr • l, l.TPP in combination with the rewriting rule for A 1 A 2 we get another CQ Q = Park+Lake(x) ∧ Park4Playing(x). Now, Q captures (as desired) the object a.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Strong Combinations of DL-Lite with RCC</head><p>Another way of reaching FOL rewritability for combinations of DL-Lite with RCC is weakening the expressivity of the spatial component. Hence, one may ask whether a combination with the calculus RCC3 or RCC2 <ref type="bibr" target="#b14">[15]</ref>, both fragments with weak expressibility, allows for weak FOL rewritability w.r.t. satisfiability checks (and query answering). Their potential use as logics for approximating <ref type="bibr" target="#b4">[5]</ref> ontologies in more expressible combined logics like ALC(RCC8) makes the investigation valuable. The logics DL-Lite ,+ F ,R (RCC2) and DL-Lite ,+ F ,R (RCC3) are defined as follows ('+' indicates the strong combination):</p><formula xml:id="formula_5">Definition 4 (DL-Lite ,+ F ,R (RCC2) and DL-Lite ,+ F ,R (RCC3)). Let T ω = Ax RCC2 resp. T ω = Ax RCC3 and r ∈ B RCC2 resp. r ∈ B RCC3 R −→ P | P − U −→ l | R B −→ A | ∃R C l −→ B | C l B C r −→ B | ¬B | ∃U 1 , U 2 .r TBox * ) : C l C r , (funct l, R), R 1 R 2 ABox: A(a), R(a, b), l(a, a * ), r(a * , b * ) *) Restriction: If (funct R) ∈ T ,</formula><p>then R and R − do not occur on the righthand side of a role inclusion axiom.</p><p>For RCC3 the strong combination with DL-Lite F ,R leads to non-FOL rewritability. The reason lies in the fact that testing the satisfiability of RCC3 is not in the complexity class AC 0 as shown by the following lemma.</p><p>Lemma 1. Checking satisfiability of RCC3 networks is Logspace hard.</p><p>Proof. As is known, the reachability problem in symmetric (undirected) graphs is logspace complete <ref type="bibr" target="#b9">[10]</ref>-where graph reachability asks whether for nodes s, t in G there is a path between s and t. By reducing this problem to the satisfiability test for RCC3 networks we will have shown that the latter problem is Logspace hard itself. So let be given a (symmetric) graph G = (V, E) and nodes s, t ∈ V . We define the network N in the following way (see Figure <ref type="figure" target="#fig_0">2</ref>): Let V = {v 1 , . . . , v n } be an enumeration of the nodes of G; w.l.o.g. let s = v 1 and t = v n and let B = B RCC3 . Nodes of N are given by V ∪ {a} where a / ∈ V . Labelled edges of N are given by: s{DR}a; t{ONE}a; v i {B}a for all i = 1, n; v i {EQ}v j if E(v i , v j ); v i {B}v j if ¬E(v i , v j ). Now we show that the network N is satisfiable iff s and t are connected in G. Assume that s and t are connected; then there is an EQ-path in N between them, hence s{EQ}t follows. But this contradicts s{DR}a and t{ONE}a. Now assume that s and t are not connected; then there is no path consisting only of EQ-labels between s and t. The graph G consists of at least 2 components, and s, t are in different components. We define a consistent configuration as follows: For all nodes v, v in the component in which s is contained, let v{DR}a and v{EQ}v . For all nodes v, v in the component of t let v{ONE}a and v{EQ}v . For all nodes v, v in the other components let v{DR}a and v{EQ}v . For all nodes v, v which have not a label yet, let v{DR}v . (Two remarks : 1) EQ-edges for edges E(v i , v j ) in G with j &gt; i + 1 are not shown in Fig. <ref type="figure" target="#fig_0">2</ref>. 2) We inserted edges labelled B for better illustrations. But these are not needed.)</p><p>This lemma immediately entails the fact that satisfiability checking for ontologies over the logic DL-Lite ,+ F ,R (RCC3) is not FOL rewritable. This problem does not vanish if we presuppose that the ABox A is spatially complete-as shown by the following proposition.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proposition 2. Satisfiability checking of ontologies in DL-Lite ,+</head><p>F ,R (RCC3) with spatially complete ABoxes is not FOL rewritable.</p><p>Proof. We construct a generic TBox T g that allows one to encode any RCC3 constraint network so that checking the consistency of RCC3 constraint networks is reducible to a satisfiability check of this TBox and a spatially complete ABox. Let for every r ∈ Rel RCC3 be given role symbols R 1 r , R 2 r . The generic TBox T g has for every r ∈ Rel RCC3 a concept symbol A r and a corresponding axiom with the content that all instances of A r have paths over the abstract features R 1 resp. R 2 to regions that are r-related.</p><formula xml:id="formula_6">T g = {A r ∃ R1 r , R2 r .r, (funct l, R 1 r , R 2 r ) | r ∈ Rel RCC3 }<label>(1)</label></formula><p>Now, let N be an arbitrary RCC3 constraint network which has to be tested for relational consistency. Let A N be an ABox such that for every r(a, b) in N three new constants are introduced: x ab , x a , x b .</p><formula xml:id="formula_7">A N = {A r (x ab ), R 1 r (x ab , x a ), R 2 r (x ab , x b ) | r(a, b) ∈ N }<label>(2)</label></formula><p>The construction entails:</p><formula xml:id="formula_8">T g ∪ A N ∪ Ax RCC3 is satisfiable iff N ∪ Ax RCC3 is sat- isfiable.</formula><p>If the data complexity of the satisfiability check for DL-Lite ,+ F ,R (RCC3)ontologies were in AC 0 , then the consistency of constraint networks could be tested in AC 0 , too. (Note that T g is a fixed TBox.) But checking the consistency of RCC3 constraint networks is Logspace-hard and AC 0 Logspace.</p><p>As a corollary to this proposition we get the assertion that strong combinations of RCC5 and RCC8 into DL-Lite ,+ F ,R (RCC5) and DL-Lite ,+ F ,R (RCC8), respectively-which are defined in the same manner as in Definition 4-do not allow for FOL rewritability of satisfiability checking.</p><p>The low resolution calculus RCC2 is quite more inexpressive than RCC3 due to the fact that the composition table does not allow for the propagation But in combination with functionality axioms of the TBox one could have the problem that the ABox may lead to identifications of regions. The identified regions are not allowed to have edges labelled O, DR resp. to the same region. Though this can be tested, the problem arises when a chain of regions is identified by the TBox and the ABox, because we do not know the length of the chain in advance. More formally: In addition to RCC2 constraint-network assertions we allow identity assertions v = w for regions v, w. As we can assume that all nodes in a RCC2 network are connected by an edge labelled O, DR or B RCC2 we use a more intuitive formalism where, for every assertion v = w, the label of the edge between v and w is marked with an =; e.g., an edge between v, w with label DR = stands for DR(v, w) ∧ v = w. We call such a network an =-marked RCC2 network (a RCC = 2 network for short). Let B = B RCC2 in the following. Proposition 4. An RCC = 2 constraint network N is unsatisfiable iff 1. N contains DR(v, v) or DR = (v, v) for some node v; or 2. N contains DR = (v, w); or 3. N contains a cycle in which there is DR(v, w) and in which there is a path from v to w such that every label on the path is B = or O = ; or 4. N contains a cycle in which there is DR(v, w) and in which there is a path from v to w s.t. every label on the path is B = or O = except one which is O.</p><p>Proof. Sufficiency of the condition for unsatisfiability is clear. The proof for necessity is done by induction on the number of =-marked labels. So let be given a RCC = network N . We may assume, that the network has for every pair of nodes exactly one labelled edge between; we assume the edges to be undirected as all relations are symmetric.</p><p>Base case: Assume that none of the four conditions hold. As there are no marked labels, then N unsatisfiability can occur only, if N contains DR(v, v) for some node v (first condition) or DR(v, w) and O(v, w) (fourth condition). But these cases are excluded by assumption.</p><p>Induction step: Let N contain n marked labelled edges and assume that for all networks N with n−1 marked labelled edges unsatisfiability of N implies one of the conditions. Now, assume that for N no one of the four conditions holds. We have to show that N is satisfiable. Take an arbitrary =-marked labelled edge between nodes v, w. The label λ of this edge is either O = or B = . We define a new network N which results as a contraction from N by identifying v and w to the node z. For N we may assume again that it contains for every pair of nodes exactly one labelled edge: If in N we have r 1 (v, k) and r 2 (w, k), then the edge between z and k in N results as r 1 ∩ r 2 and is =-marked iff r 1 or r 2 is marked. Clearly r 1 ∩ r 2 is not empty, as otherwise we would have a contradiction to the fact that N does not fulfill conditions 3 and 4. Clearly N is satisfiable iff N is satisfiable. Assume to the contrary that N is unsatisfiable. Hence, one of the four conditions holds for N : 1) Assume N contains DR(v , v ) or DR = (v , v ) for some node v . If v is not z, then also DR(v , v ) ∈ N resp. DR = (v , v ) ∈ Ncontradicting the fact that N does not fulfill condition 1. Otherwise v = z, but this cannot be the case either, as there are no self-loops DR(v, v), DR = (v, v), DR(w, w), DR = (w, w) in N nor DR(v, w) or DR(v, w). 2) Assume N contains DR = (v , w ). If neither v nor w is z, this contradicts the fact that N does not fulfill the 2. condition. Otherwise v = w = z, leading to a contradiction with the fact that N does not fulfill condition 1. 3) Assume N contains a cycle in which there is DR(v , w ) and there is a path from v to w such that every label on the path is B = or O = . The case that the path does not contain z immediately leads to a contradiction. Otherwise, the path extends to a path in N fulfilling the 3. condition-contradiction. Similarly, if N fulfills condition 4, the verifying path can be extended to a path in N fulfilling condition 4-contradiction.</p><p>Proposition 4 shows that adding identity assertions to an RCC2 network may require checking the existence of identity chains of arbitrary length. Hence, in principle it is possible that the functional roles used in DL-Lite ,+ F ,R (RCC2) may lead to identity chains. But as we want to show in the following proposition, this cannot be the case: The identity paths induced by functionalities in DL-Lite ,+ F ,R (RCC2) can have only a maximal length of one.</p><p>Proposition 5. Satisfiability checking of ontologies in DL-Lite ,+ F ,R (RCC2) is FOL rewritable.</p><p>We give a proof sketch. The idea is to find concepts that are unsatisfiable according to the TBox (this amounts to constructing the negative closure as in the proofs for pure DL-Lite [2, Def. 4.7, p. 292]); these are formulated as boolean queries, and the (finite) disjunctions of these queries is answered over the ABox; e.g., if A 1 ¬A 2 is in the TBox, then the query would contain ∃x(A 1 (x)∧A 2 (x)) as disjunct. The introduction of concepts of the form ∃U 1 , U 2 .r enlarges the potential conflicts of a TBox T with an ABox A. So in addition to the FOL queries that result from the negative closure of the TBox, we have to find queries for the potential conflicts in the four conditions of Proposition 4. The resulting conjunctive queries have further to be fed into a perfect rewriting algorithm like PerfectRef for pure DL-Lite <ref type="bibr" target="#b1">[2]</ref> in order to capture the implications of the TBox.</p><p>Concerning the first two conditions we have to deal with axioms of the form B ∃l, l.DR. If this axiom occurs in the TBox T , then one has to produce the CQ ∃x.B(x). Similarly, if {B ∃ R, R.DR, (funct R)} ⊆ T , then the CQ ∃x.B(x) has to be added. Also if {B ∃ R1 , R2 .DR, (funct R 1 , funct R 2 )} ⊆ T , then we may get a conflict of the first kind and hence we have to add a CQ ∃x, y[B(x) ∧ R 1 (x, y) ∧ R 2 (x, y)]. Concerning the third and fourth condition we note that this can be only the case if the =-marked paths have maximal length one. Otherwise we already have a contradiction of the ABox with the functionality assertions in the TBox. Hence, one considers only the case of pairs of TBox axioms of the general form A ∃ R1 , R2 .DR and B ∃ R3 , R4 .O with (funct R 1 , R 2 , R 3 , R 4 ). In this case we feed also into the PerfectRef algorithm the CQ ∃x, y, z, w[A(x) ∧ B(y) ∧ R 1 (x, z) ∧ R 3 (y, z) ∧ R 2 (x, w) ∧ R 4 (y, w)].</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>As recapitulated in this paper, combining DL-Lite with expressive fragments of the region calculus like RCC8 into logics that preserve the property of FOL rewritability is possible if the coupling is weak: Constraints of the RCC8 network contained in the ABox are not transported over to the implicitly constructed constraint network resulting from the constructors of the form ∃U 1 , U 2 .r. In this paper we mainly dealt with strong combinations for weaker calculi like RCC2 or RCC3. As we have shown by a reduction proof, a strong combination with RCC3 destroys the FOL rewritability of satisfiability checking. The reason is that checking the satisfiability of RCC3 networks needs to test for reachability along EQ paths, which can be reproduced by the TBox. For the low resolution calculus RCC2, FOL rewritability of satisfiability checking is provable-though checking the satisfiability of RCC2 networks with additional identity assertions is at least as hard as checking RCC3 networks. We plan to investigate whether DL-Lite ,+ F ,R (RCC2) and DL-Lite F ,R (RCC8) can be used for approximationfollowing the complete but not necessarily correct approximation method of <ref type="bibr" target="#b4">[5]</ref>. Moreover we want to check whether DL-Lite ,+ F ,R (RCC2) allows for FOL rewritability of query answering w.r.t. unions of conjunctive queries.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Network N used in proof of Lemma 1</figDesc><graphic coords="7,224.69,281.70,135.20,80.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Proposition 3 .</head><label>3</label><figDesc>of information: All compositions of DR, O result in the maximally unspecified relation {DR, O}. Hence, FOL rewritability of satisfiability testing follows easily considering the query Q = ∃x, y[O(x, y) ∧ DR(x, y)] ∨ ∃x[DR(x, x)]. Testing the satisfiability of RCC2 networks is FOL rewritable.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>. The discreteness relation DR is the same as {DC, EC}, the overlappingbut-not-equal relation ONE is equal to {PO, NTPP, TPP, NTPPi, TPPi} and the overlapping relation O is given by {ONE, EQ}.</figDesc><table><row><cell>; DR BRCC2 BRCC2 DR O O BRCC2 BRCC2</cell><cell>; DR ONE {DR, ONE} BRCC3 ONE DR ONE EQ BRCC3 {DR, ONE} DR EQ DR ONE EQ</cell></row><row><cell cols="2">Fig. 1. Composition tables for RCC2 and RCC3</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">A general datalog-based framework for tractable query answering over ontologies</title>
		<author>
			<persName><forename type="first">A</forename><surname>Calì</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Gottlob</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Lukasiewicz</surname></persName>
		</author>
		<idno>CL-RR-10-21</idno>
		<imprint>
			<date type="published" when="2010-11">November 2010</date>
		</imprint>
		<respStmt>
			<orgName>Oxford University Computing Laboratory</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Ontologies and databases: The DL-Lite approach</title>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>De Giacomo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lembo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lenzerini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Poggi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rodríguez-Muro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Rosati</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Semantic Technologies for Informations Systems -5th Int. Reasoning Web Summer School (RW-2009)</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Tessaris</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Franconi</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="volume">5689</biblScope>
			<biblScope unit="page" from="255" to="356" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Topological inference</title>
		<author>
			<persName><forename type="first">M</forename><surname>Grigni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Papadias</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Papadimitriou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IJCAI (1)</title>
				<imprint>
			<date type="published" when="1995">1995</date>
			<biblScope unit="page" from="901" to="907" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A description logic with concrete domains and a role-forming predicate operator</title>
		<author>
			<persName><forename type="first">V</forename><surname>Haarslev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lutz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Möller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Log. Comput</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="351" to="384" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Towards scalable instance retrieval over ontologies</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kaplunova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Moeller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wandelt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wessel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Knowledge Science, Engineering and Management, Fourth International Conference, KSEM 2010</title>
		<title level="s">Proceedings. Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">B</forename><surname>Yaxin</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Mary-Anne</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">6291</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A tableau algorithm for description logics with concrete domains and general TBoxes</title>
		<author>
			<persName><forename type="first">C</forename><surname>Lutz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Miličić</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Autom. Reasoning</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="issue">1-3</biblScope>
			<biblScope unit="page" from="227" to="259" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Computationally feasible query answering over spatiothematic ontologies</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">L</forename><surname>Özçep</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Möller</surname></persName>
		</author>
		<ptr target="http://www.thinkmind.org/index.php?view=article&amp;articleid=geoprocessing_2012_7_10_30059" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of GEOProcessing 2012, The Fourth International Conference on Advanced Geographic Information Systems, Applications, and Services</title>
				<meeting>GEOProcessing 2012, The Fourth International Conference on Advanced Geographic Information Systems, Applications, and Services</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Scalable geo-thematic query answering</title>
		<author>
			<persName><forename type="first">Ö</forename><forename type="middle">L</forename><surname>Özçep</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Möller</surname></persName>
		</author>
		<ptr target="http://www.sts.tu-harburg.de/tech-reports/papers.html" />
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
		<respStmt>
			<orgName>Institute for Softwaresystems (STS), Hamburg University of Technology</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical report</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A spatial logic based on regions and connection</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Randell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Cui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Cohn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd International Conferecence on Knowledge Representation and Reasoning</title>
				<meeting>the 3rd International Conferecence on Knowledge Representation and Reasoning</meeting>
		<imprint>
			<date type="published" when="1992">1992</date>
			<biblScope unit="page" from="165" to="176" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Undirected connectivity in log-space</title>
		<author>
			<persName><forename type="first">O</forename><surname>Reingold</surname></persName>
		</author>
		<idno type="DOI">10.1145/1391289.1391291</idno>
		<ptr target="http://doi.acm.org/10.1145/1391289.1391291" />
	</analytic>
	<monogr>
		<title level="j">J. ACM</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">24</biblScope>
			<date type="published" when="2008-09">Sep 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Qualitative Spatial Reasoning with Topological Information</title>
		<author>
			<persName><forename type="first">J</forename><surname>Renz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">2293</biblScope>
			<date type="published" when="2002">2002</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Qualitative spatial reasoning using constraint calculi</title>
		<author>
			<persName><forename type="first">J</forename><surname>Renz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Nebel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Spatial Logics</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Aiello</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>Pratt-Hartmann</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Benthem</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer Netherlands</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="161" to="215" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Semantic index: Scalable query answering without forward chaining or exponential rewritings</title>
		<author>
			<persName><forename type="first">M</forename><surname>Rodriguez-Muro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Posters of the 10th Int. Semantic Web Conf</title>
				<meeting><address><addrLine>ISWC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011. 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">On spatial reasoning with description logics -position paper</title>
		<author>
			<persName><forename type="first">M</forename><surname>Wessel</surname></persName>
		</author>
		<ptr target="http://CEUR-WS.org/Vol-53/" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Workshop on Description Logics (DL-2002</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">Ian</forename><surname>Horrocks</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><forename type="middle">T</forename></persName>
		</editor>
		<meeting>the International Workshop on Description Logics (DL-2002</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">53</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Qualitative spatial reasoning with the ALCIRCC -family -first results and unanswered questions</title>
		<author>
			<persName><forename type="first">M</forename><surname>Wessel</surname></persName>
		</author>
		<idno>FBI-HH-M-324/03</idno>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
		<respStmt>
			<orgName>University of Hamburg, Department for Informatics</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
