<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Equality-Friendly Well-Founded Semantics and Applications to Description Logics</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Georg Gottlob</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>André Hernich</string-name>
          <email>hernich@informatik.hu-berlin.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Clemens Kupke</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Thomas Lukasiewicz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, University of Oxford</institution>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institut für Informatik, Humboldt-Universität zu Berlin</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Oxford-Man Institute of Quantitative Finance, University of Oxford</institution>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We tackle the problem of defining a well-founded semantics (WFS) for Datalog rules with existentially quantified variables in their heads and negations in their bodies. In particular, we provide a WFS for the recent Datalog family of ontology languages, which covers several important description logics (DLs). To do so, we generalize Datalog by non-stratified nonmonotonic negation in rule bodies, and we define a WFS for this generalization via guarded fixed point logic. We refer to this approach as equality-friendly WFS, since it has the advantage that it does not make the unique name assumption (UNA); this brings it close to OWL and its profiles as well as typical DLs, which also do not make the UNA. We prove that for guarded Datalog with negation under the equalityfriendly WFS, conjunctive query answering is decidable, and we provide precise complexity results for this problem. From these results, we obtain precise definitions of the standard WFS extensions of E L and of members of the DL-Lite family, as well as corresponding complexity results for query answering.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The recent Datalog family of ontology languages [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] extends plain Datalog by the
possibility of existential quantification in rule heads and other features, and
simultaneously restricts the rule syntax to achieve tractability. The following example illustrates
how description logic (DL) knowledge bases are expressed in Datalog .
Example 1 (Literature) The knowledge that every conference paper is an article and
that every scientist is the author of at least one paper can be expressed in DL by
the TBox axioms ConferencePaper v Article and Scientist v 9isAuthorOf, respectively,
while the knowledge that John is a scientist can be expressed by the ABox axiom
Scientist(john). In Datalog , the former are encoded as the rule ConferencePaper(X ) !
Article(X ) and the rule Scientist(X ) ! 9Y isAuthorOf(X ;Y ), respectively, and the latter
is encoded by an identical fact in the database. Furthermore, the TBox axiom that
encodes that conference papers are not journal papers, can be expressed in Datalog by
the negative constraint ConferencePaper ^ JournalPaper ! ?. A simple Boolean
conjunctive query (BCQ) asking whether John authors a paper is 9X isAuthorOf(john; X ).
      </p>
      <p>
        The Datalog languages bridge an apparent gap in expressive power between
database query languages and DLs as ontology languages, extending the well-known
Datalog language in order to embed DLs. They also allow for transferring important
concepts and proof techniques from database theory to DLs. For example, it was so far
not clear how to enrich tractable DLs by the feature of nonmonotonic negation. By the
results of [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], DLs can be enriched by stratified negation via mappings from DLs to
Datalog with stratified negation, which is defined and studied in that paper. Given that
stratified negation is quite limited, we wondered whether the richer and more
expressive well-founded negation could be defined for Datalog . The well-founded
semantics (WFS) for normal (logic) programs [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] is one of the most widely used semantics
for nonmonotonic normal programs, it is the standard semantics for such programs for
database applications, and it is thus especially under a data-oriented perspective of great
importance for the Web. Having many nice features, the WFS is defined for all normal
programs (i.e., logic programs with the possibility of negation in rule bodies), has a
polynomial data tractability, approximates the answer set semantics, and coincides with
the canonical model in case of stratified normal programs.
      </p>
      <p>In this paper, we concentrate on the important problem of defining a WFS for
(unrestricted) normal Datalog , i.e., Datalog with existentially quantified variables in rule
heads and negations in rule bodies. This new semantics is called the equality-friendly
WFS (EFWFS), since it has the crucial advantage that it does not make the unique name
assumption (UNA); this brings it close to OWL and its profiles as well as typical DLs,
which also do not make the UNA.</p>
      <p>Since (unrestricted) normal Datalog generalizes positive Datalog , consistency
checking and query answering in it is in general undecidable. However, it turns out
that the guarded fragment of normal Datalog can be translated to guarded fixed point
logic, which is a well-studied decidable formalism. Through this translation, we thus
obtain the decidability of consistency checking and query answering in guarded normal
Datalog . Furthermore, we obtain upper complexity bounds, which are then also shown
to be tight. Guarded Datalog covers in particular the DLs E L and DL-LiteR (which
is underlying the OWL 2 QL profile). Therefore, our decidability results and upper
complexity bounds carry over to these DLs. The following example illustrates how the
WFS can be extended to such DLs.</p>
      <p>Example 2 (Holidays) Consider an ABox containing the three holiday destinations
Dest(d1), Dest(d2), and Dest(d3). Suppose that any destination that offers the
opportunity to swim needs either direct access to the beach (Beach(x)) or a bus connection
to some beach (BeachBus(x; y)). That is, at destinations where swimming is possible,
we want to make sure that never both not Beach and not 9BeachBus hold. This can be
achieved by the following two rules:</p>
    </sec>
    <sec id="sec-2">
      <title>Dest u Swimming u not Beach v 9BeachBus;</title>
    </sec>
    <sec id="sec-3">
      <title>Dest u Swimming u not 9BeachBus v Beach:</title>
      <p>(1)
(2)
Observe also that not Swimming(d) would immediately imply the facts not Beach(d)
and not 9BeachBus(d), since it would make it impossible that either of the two axioms
could be applied to derive new facts about d.</p>
      <p>The following example shows a case where not making the UNA is more
appropriate than making it under the WFS.</p>
      <p>Example 3 (Company) Suppose we are given certain facts about employees and their
employers. The following two concept membership axioms state that John and Sam are
employees: Employee(John), Employee(Sam). To these axioms, we add a concept
inclusion axiom that maintains that every employee must have an employer: Employee v
9:hasEmployer. Finally, we would like to test whether or not John and Sam work
in the same company, which is expressed by the query 9x(hasEmployer(John; x) u
not hasEmployer(Sam; x)). Then, under the UNA, equality between all individuals
(including new ones) is minimized, and we evaluate the query to true, which is not the case
without UNA, where different Skolem terms may be interpreted by the same object.
2</p>
      <sec id="sec-3-1">
        <title>Preliminaries</title>
        <sec id="sec-3-1-1">
          <title>In this section, we briefly recall some basics on Datalog [7].</title>
          <p>Databases and Queries. We assume (i) an infinite universe of (data) constants D (which
constitute the “normal” domain of a database), and (ii) an infinite set of variables V
(used in queries and constraints). We denote by X sequences of variables X1; : : : ; Xk
with k &gt; 0. We assume a relational schema R, which is a finite set of relation names (or
predicate symbols, or simply predicates). A term t is a constant or variable. An atomic
formula (or atom) a has the form P(t1; :::; tn), where P is an n-ary predicate, and t1; :::; tn
are terms. A conjunction of atoms is often identified with the set of all its atoms.</p>
          <p>A database (instance) D for a relational schema R is a (possibly infinite) set of
atoms with predicates from R and arguments from D . A conjunctive query (CQ) over R
has the form Q(X) = 9Y F (X; Y), where F (X; Y) is a conjunction of atoms with the
variables X and Y, and eventually constants. Note that F (X; Y) may also contain
equalities but no inequalities. A Boolean CQ (BCQ) over R is a CQ of the form Q(). We often
write a BCQ as the set of all its atoms, having constants and variables as arguments, and
omitting the quantifiers. Answers to CQs and BCQs are defined via homomorphisms,
which are mappings m : D [ V ! D [ V such that (i) c 2 D implies m (c) = c, and
(ii) m is naturally extended to atoms, sets of atoms, and conjunctions of atoms. The set
of all answers to a CQ Q(X) = 9Y F (X; Y) over a database D, denoted Q(D), is the
set of all tuples t over D for which there exists a homomorphism m : X [ Y ! D such
that m (F (X; Y)) D and m (X) = t. The answer to a BCQ Q() over a database D is Yes,
denoted D j= Q, iff Q(D) 6= 0/ .</p>
          <p>Tuple-Generating Dependencies (TGDs). Tuple-generating dependencies (TGDs)
describe constraints on databases in the form of generalized Datalog rules with
existentially quantified conjunctions of atoms in rule heads; their syntax and semantics are as
follows. Given a relational schema R, a tuple-generating dependency (TGD) s is a
firstorder formula of the form 8X8Y F (X; Y) ! 9ZY (X; Z), where F (X; Y) and Y (X; Z)
are conjunctions of atoms over R, called the body and the head of s , respectively.
Such s is satisfied in a database D for R iff, whenever there is a homomorphism h that
maps the atoms of F (X; Y) to atoms of D, there is an extension h0 of h that maps the
atoms of Y (X; Z) to atoms of D. Since TGDs can be reduced to TGDs with only single
atoms in their heads, in the sequel, every TGD has w.l.o.g. a single atom in its head.
A TGD s is guarded iff it contains an atom in its body that contains all universally
quantified variables of s . The leftmost such atom is the guard of s .</p>
          <p>
            Query answering under TGDs, i.e., the evaluation of CQs and BCQs on databases
under a set of TGDs is defined as follows. For a database D for R, and a set of TGDs
S on R, the set of models of D and S , denoted mods(D; S ), is the set of all (possibly
infinite) databases B such that (i) D B and (ii) every s 2 S is satisfied in B. The set
of answers for a CQ Q to D and S , denoted ans(Q; D; S ), is the set of all tuples a
such that a 2 Q(B) for all B 2 mods(D; S ). The answer for a BCQ Q to D and S is
Yes, denoted D [ S j= Q, iff ans(Q; D; S ) 6= 0/ . Note that query answering under general
TGDs is undecidable [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ], even with fixed schema and TGDs [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ].
          </p>
          <p>Negative Constraints. Another crucial ingredient of Datalog for ontological modeling
are negative constraints (or simply constraints), which are first-order formulas of the
form 8XF (X) ! ?, where F (X) is a conjunction of atoms (not necessarily guarded),
called its body. We usually omit the universal quantifiers, and we implicitly assume that
all sets of constraints are finite here.</p>
          <p>Normal TGDs and BCQs. Normal TGDs are TGDs that may also contain (default-)
negated atoms in their bodies: Given a relational schema R, a normal TGD (NTGD) s
has the form 8X8Y F (X; Y) ! 9ZY (X; Z), where F (X; Y) is a conjunction of atoms
and negated atoms over R, and Y (X; Z) is a conjunction of atoms over R. We usually
omit the universal quantifiers. As for standard TGDs, w.l.o.g., Y (X; Z) is a singleton
atom. We say s is satisfied in a database D for R iff, whenever there is a
homomorphism h for all the variables and constants in the body of s that maps (i) positive literals
of F (X; Y) to atoms of D and (ii) no negated atom of F (X; Y) to an atom of D, then
there is an extension h0 of h that maps the head atom to an atom of D. We call s guarded
iff it contains a positive body atom that contains all universally quantified variables of s .
W.l.o.g., constants in the body of guarded s occur only in guards.</p>
          <p>We next add negation to BCQs. A normal Boolean conjunctive query (NBCQ) Q
is an existentially closed conjunction of atoms and negated atoms 9X p1(X) ^ ^
pm(X) ^ :pm+1(X) ^ ^ :pm+n(X); where m &gt; 1, n &gt; 0, and the variables of the pi’s
are among X. Q is covered if for every negative atom a in Q there is a positive atom in Q
containing every argument in a. In the sequel, w.l.o.g., NBCQs contain no constants.
3</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Equality-Friendly WFS for Datalog</title>
        <p>In this section, we first recall the well-founded semantics (WFS) of normal programs.
As a central new contribution, we then introduce a WFS of normal Datalog programs
without the UNA.</p>
        <p>
          WFS of Normal Programs. The WFS [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] is the most widely used semantics for
nonmonotonic programs, it is the standard semantics for such programs for database
applications, and it is thus especially under a data-oriented perspective of great importance
for the Web. For our purposes, it is enough to recall the WFS of function-free ground
normal programs, and we refer to [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] for the general case.
        </p>
        <p>We first give some preliminary definitions. A function-free normal program is a
finite set of rules r of the form b1; : : : ; bn; :bn+1; : : : ; :bn+m ! a , where a; b1; : : : ; bn+m
are atoms and m; n &gt; 0. We call a the head of r, denoted H(r), while the
conjunction b1; : : : ; bn; :bn+1; : : : ; :bn+m constitutes its body. Let B(r) = B+(r) [ B (r), where
B+(r) = fb1; : : : ; bng, and B (r) = fbn+1; : : : ; bn+mg. The program is ground if it
contains no variables. Let P be a function-free ground normal program. The Herbrand base
of P, denoted HBP, is the set of all atoms that can be constructed from the predicate
symbols and the constants appearing in P. For all S HBP, we let ::S = f::a j a 2 Sg.
We denote by LitP = HBP [ ::HBP the set of all literals with predicate symbols and
constants from P. A (three-valued) interpretation relative to P is any set I LitP that is
consistent (i.e., there is no atom a 2 HBP with fa; :ag I).</p>
        <p>
          The WFS has many different equivalent definitions (see also [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]). We here recall
the one based on unfounded sets, via the operators UP, TP, and WP. A set U HBP is
an unfounded set of P relative to I LitP iff for every a 2U and every rule r 2 P with
H(r) = a, either (i) :b 2 I [ ::U for some atom b 2 B+(r), or (ii) b 2 I for some atom
b 2 B (r). There exists the greatest unfounded set of P relative to I, denoted UP(I).
Intuitively, it collects all those atoms that cannot become true when extending I with
further information. We are now ready to define the two operators TP and WP on
interpretations I LitP relative to P by:
        </p>
        <p>TP(I) = fH(r) j r 2 P; B+(r)[::B (r) Ig;
WP(I) = TP(I) [ ::UP(I):
Since WP is monotonic, it has a least fixed point, denoted lfp(WP), which is the
wellfounded semantics (WFS) of P, denoted WFS(P). Intuitively, starting with I = 0/ , rules
are applied to obtain new positive and negated facts (via TP(I) resp. ::UP(I)). This is
repeated until no longer possible.</p>
        <p>EFWFS of Normal Datalog Programs. We relate normal Datalog programs to
sets of function-free ground normal programs, and define their equality-friendly WFS
(EFWFS) as the set of well-founded models of the associated normal programs.</p>
        <p>The basic idea is as follows. If we do not make the UNA, different constants in a
normal Datalog program P may represent the same value. Thus, P may turn out to be
any of the programs P0 obtained from P by identifying constants. Furthermore, in every
such program P0, existential quantifiers may introduce one or more value, which, since
we do not make the UNA, does not have to be “fresh”, but can be any constant. Hence,
without the UNA, the meaning of P may be captured by the set of all normal programs
P00 obtained from P by identifying values, and replacing TGDs in P by arbitrary
instances, at least one for each possible variable assignment for its body. It is then natural
to consider the well-founded models of all those programs P00 as the semantics of P.</p>
        <p>More precisely, an instance of a normal TGD F (X; Y) ! 9ZY (X; Z) is a rule of
the form F (a; b) ! Y (a; c); where a; b; c are tuples of constants. Let P = D [ S be
a normal Datalog program, where D is a database and S a set of normal TGDs. An
instance I of P is a normal program consisting of all facts in D, and instances of
TGDs in S such that for all TGDs F (X; Y) ! 9ZY (X; Z) in S , and all
interpretations a; b for X; Y, there is at least one c such that F (a; b) ! Y (a; c) is in I . Let
I (P) be the set of all instances of P, and dom(P) the set of all constants in P. For
any m : dom(P) ! D , let Pm be the program obtained from P by replacing all
constants c with m(c). Then, the equality-friendly well-founded semantics of P, denoted
EFWFS(P), is the set fWFS(P00) j m : dom(P) ! D ; P00 2 I (Pm )g. Query-answering
for an NBCQ Q is now defined by saying that Q evaluates to Yes in EFWFS(P) iff Q
evaluates to Yes in all elements of EFWFS(P). Here, an NBCQ Q evaluates to Yes in a
three-valued interpretation I iff there is a homomorphism that maps all elements of Q+
into atoms in I and all elements of Q into negated atoms in I.</p>
        <sec id="sec-3-2-1">
          <title>Example 4 Consider the following program P:</title>
          <p>Obviously, A(0) is in the EFWFS of P. Furthermore, because of the second rule, every
possible well-founded model of P contains R(0; c1; c2). But we cannot assume c2 6= 0. If
c2 = 0, all possible applications of the third rule are blocked, and thus :S(0) would be
derived (the last rule may then still add another atom R(d1; d2; 0), but this does not affect
the overall result). Otherwise, in case c2 6= 0, the third rule would yield S(0), because
clearly we have :A(c2). Therefore, neither S(0) nor its negation is in EFWFS(P) and
the only atoms that are always in EFWFS(P) are A(0) and R(0; c1; c2) for some
constants c1 and c2 (so, the query 9X1; X2 (R(0; X1; X2)) would evaluate to true). The picture
changes, if we add the constraint R(X1; X2; X3); R(X3; X2; X1) !?. Then, c2 generated
by the second rule must be different from 0, and so we always obtain S(0), and we get
:R(d1; d2; 0), for all d1; d2, by the last rule.
4</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>Translation into Guarded Fixed Point Logic</title>
        <p>The EFWFS can be characterized in terms of guarded fixed point logic. This
characterization turns out to be more convenient for reasoning about the EFWFS of guarded
normal Datalog programs.</p>
        <p>
          Guarded fixed point logic (GFP), introduced by Grädel and Walukiewicz [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ],
simultaneously restricts and extends first-order logic by enforcing a certain quantification
pattern, and allowing for inductively defining relations, while having a satisfiability
problem of moderate complexity.
        </p>
        <p>Let R be a relational schema. The set of formulas of GFP over R is built from
atomic formulas over R (including equality atoms) using Boolean combinations, and
the following two additional formula formation rules:</p>
        <p>I. If a is an atomic formula over R containing the variables in X, and y is a GFP
formula over R whose free variables occur in a, then 9X (a ^ y) and 8X (a ! y)
are GFP formulas over R. The formula a is called guard.</p>
        <p>
          II. Let R be a k-ary predicate, X a k-tuple of variables, and y(R; X) a GFP formula
over R [ fRg whose free variables occur in X, and where R appears only positively
(in the scope of an even number of negation symbols) and not in guards. Then,
[lfpR;X y](X) and [gfpR;X y](X) are GFP formulas over R with free variables X.
As for the semantics of the formulas in II, given a database D for R, y defines an
operator F : P(dom(D)k) ! P(dom(D)k) with F(S) := fa j D j= y(S; a)g. This operator
is monotone and thus has a least fixed point lfp(F) and a greatest fixed point gfp(F).
Then, D j= [lfpR;X y](a) iff a 2 lfp(F), and D j= [gfpR;X y](a) iff a 2 gfp(F).
Example 5 ([
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]) The following GFP sentence says that the binary relation E is
wellfounded (i.e., no element is the endpoint of an infinite E-path): 8x; y (E(x; y) ! [lfpW;x
8y(E(y; x) ! W (y))](x)):
        </p>
        <p>We are now ready to describe the translation of guarded normal Datalog into GFP.
Let P = D [ S be a fixed guarded normal Datalog program, where D is a database, and
S is a set of guarded NTGDs. Without loss of generality, we assume that P contains only
a single predicate R;4 let k be its arity. We construct a GFP sentence efwfs(P) whose
models closely correspond to the databases in EFWFS(P). The key is to “existentially
quantify” all the instances of NTGDs that we use to compute the WFS, and to mimic
the fixed-point definition of the WFS using those instances.</p>
        <p>Technically, we represent instances of an NTGD s 2 S using a 2k-ary predicate
Ss . If R(U) is the guard of s , and R(V) is its head, then a tuple (a; b) in Ss
encodes the instance of s obtained by substituting a and b for U and V, respectively.
For example, if s is the NTGD R(X ;Y; 0); :R(X ; 1; 1) ! 9Z R(Z; X ; 2), then the atom
Ss ((a; b; 0); (c; a; 2)) represents the instance R(a; b; 0); :R(a; 1; 1) ! R(c; a; 2) of s .</p>
        <p>We also use k-ary predicates T , C, T , F, and R, where T is intended to encode a
superset of all true atoms; C holds all permutations of tuples in T ; T and F respectively
hold the set of all true atoms and the set of all false atoms (the latter relativized to C);
and R corresponds to the predicate R of the initial database D. It is not hard to construct
GFP sentences that enforce the desired interpretation of the predicates Ss , T , C, and
R. Based on those GFP sentences, it is then possible to construct GFP sentences yT
and yF that enforce the desired interpretations of T and F. The sentence yT basically
does nothing else than defining the (set of all positive literals of the) least fixed point of
WP0 , where P0 consists of all instances of NTGDs in S represented by the tuples in the
predicates Ss , while yF defines the greatest fixed point of a certain operator, yielding
the greatest unfounded set UP0 (T ) (relativized to C).</p>
        <p>For an NBCQ Q over fRg, let Q be the BCQ obtained by replacing every positive
literal R(X) in Q with T (X), and every negative literal :R(X) in Q with F(X).
Lemma 6 For all covered NBCQs Q over the schema of P, we have EFWFS(P) j= Q
iff efwfs(P) j= Q .
5</p>
      </sec>
      <sec id="sec-3-4">
        <title>Complexity</title>
        <p>We now take a look at the complexity of answering covered NBCQs over guarded
normal Datalog programs P = D [ S . More precisely, we consider the combined
complexity, measured in terms of the overall input, including P and the query.</p>
        <p>
          In Section 4, we characterized the EFWFS of guarded normal Datalog programs
via a translation into guarded fixed point logic GFP. From the fact that satisfiability for
GFP sentences is in 2-EXPTIME (and in EXPTIME in case of bounded arities) [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ],
we obtain the following:
Theorem 7 Deciding EFWFS(P) j= Q, where P = D[S is a guarded normal Datalog
program and Q a covered NBCQ, is 2-EXPTIME-complete in the general case, and
EXPTIME-complete in the case of bounded arities and acyclic Q. Hardness holds even
with respect to atomic queries.
4 It is an easy task to transform a guarded normal Datalog program into this form, since
multiple predicates can be simulated by constants and a single predicate. For example, A(x; y) ^ B(x)
may be replaced by R(a; x; y) ^ R(b; x; x), where a and b are extra constant symbols.
        </p>
        <p>We remark that Theorem 7 carries over to unions of covered NBCQs, that is, queries
Q of the form Win=1 Qi, where each Qi is a covered NBCQ.
6</p>
        <p>
          WFS for OWL 2 QL
All the DLs of the DL-Lite family in [
          <xref ref-type="bibr" rid="ref22 ref8">8,22</xref>
          ] and the DL E L [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] can be embedded into
Datalog [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. In particular, this holds for DL-LiteR , which forms the theoretical basis of
the QL profile of the Web ontology language OWL 2. Both our equality-friendly WFS
(EFWFS) for normal Datalog and the OWL 2 QL profile do not make the UNA. Our
work in this paper thus paves the way for an extension of OWL 2 QL with nonmonotonic
negation under the EFWFS.
        </p>
        <p>
          The following definition extends DL-LiteR 5 (underlying the OWL 2 QL profile) and
DL-LiteR;u [
          <xref ref-type="bibr" rid="ref22 ref8">8,22</xref>
          ], and E L [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] with nonmonotonic negation under the EFWFS.
Definition 8 Recall that a DL-LiteR;u knowledge base consists of a pair (T ; A ), where
the TBox T is a finite set of concept and role inclusion axioms U1 u u Un v V , and
the ABox A is a finite set of concept and role membership axioms C(a) and R(a; b),
respectively. A DL-LiteR;u;not knowledge base (T ; A ) consists of a finite set of inclusion
axioms T and a finite set of membership axioms A , where:
– Any DL-LiteR;u inclusion axiom is a DL-LiteR;u;not inclusion axiom.
– If U1 u u Un v V and U10 u u U m0 v V with n; m &gt; 0 are both either concept
or role inclusion axioms in DL-LiteR;u, and V is positive (i.e., not of the form V =
:V 0), then U1 u u Un u notU10 u u notU m0 v V is a DL-LiteR;u;not concept or
role inclusion axiom, respectively. Here, the Ui’s and Ui0’s contain no conjunction,
and notUi0 is the negation as failure (as opposed to the classical “:” in DL-Lite).
– For any concept A, any role R, and any individuals a; b, the expressions A(a) and
        </p>
        <p>R(a; b) are concept and role membership axioms, respectively.</p>
        <p>A DL-LiteR;u;not knowledge base (T ; A ) is a DL-LiteR;not knowledge base iff all
inclusion axioms in T contain precisely one positive atom on the left-hand side.</p>
        <p>Finally, we define E L not as the extension of E L that allows formulas of the form
notC for atomic concepts C = A and for concepts C = 9R:B to occur in top-level
conjunctions on the left-hand side of TBox-axioms.</p>
        <p>
          The semantics of DL-LiteR;not (resp., DL-LiteR;u;not) is defined by translating a given
DL-LiteR;not (resp., DL-LiteR;u;not) knowledge base KB into a normal Datalog
program PKB and by computing the well-founded semantics of PKB. The details of the
translation of DL-LiteR;not (resp., DL-LiteR;u;not) into Datalog are an extension of
the translation of DL-LiteR (resp., DL-LiteR;u) given in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Similarly, it is possible to
translate E L not into our formalism. Note that the sameAs(a; b) and differentFrom(a; b)
constraints (specifying that the two individuals a and b are the same and different,
respectively) that may be contained in a given knowledge base (over an ontology
language without UNA) can be easily enforced by adding appropriate equalities a = b and
inequalities :(a = b) to the guarded fixed point sentence efwfs(PKB).
5 Note that although DL-LiteR adopts the UNA, it actually does not require it, since making this
assumption would have no impact on the semantic consequences of a DL-LiteR ontology.
Example 9 (Holidays (cont’d)) Consider again Example 2. The two axioms (1) and
(2) are translated into the following normal Datalog rules:
pDest(X ); pSwimming(X ); :pBeach(X ) ! 9Y:pBB(X ;Y );
pDest(X ); pSwimming(X ); :p9BB(X ) ! pBeach(X );
pBB(X ;Y ) ! p9BB(X );
where p9BB(X ) is a new predicate for 9BeachBus.
        </p>
        <p>Suppose next that we are additionally given a database with holiday destinations
Dest(d1), Dest(d2), and Dest(d3), which we want to be different, i.e., we assume that
differentFrom(d1; d2), differentFrom(d2; d3), and differentFrom(d1; d3). We want to
formalize the idea that any destination where one can swim should have a beach or a bus
to a location with a beach — otherwise one has to take delight in walking. This can be
achieved by considering the rules (1) and (2) along with the additional rule</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Dest u not Beach u not 9BeachBus v WalkingOnly:</title>
      <p>Furthermore, we may assume that at any place where one is not confined to only
walking, one can also swim:</p>
    </sec>
    <sec id="sec-5">
      <title>Dest u not WalkingOnly v Swimming:</title>
      <p>Consider the following further facts: WalkingOnly(d1) and BeachBus(d2; d3). Clearly,
WalkingOnly(d1) implies that Swimming(d1) cannot be derived — because rule (4),
the only rule that can derive Swimming(d1), requires the negation of WalkingOnly(d1)
to be true. Thus, the WFS of the knowledge base includes not Swimming(d1). This is
in contrast to what would happen if we interpreted not as “classical” negation: in the
latter case, we could not derive anything from WalkingOnly(d1), as axiom (4) would
trivially be satisfied for d1. Other facts that are derived for d1 are not Beach(d1) and
not 9BeachBus(d1) (= not R(x; y) for any y), because the fact not Swimming(d1)
implies that rules (1) and (2) cannot be used to derive Beach(d1) or 9BeachBus(d1) (note
that we use the fact that d1 has to be different from d2 and d3, because of our ABox
assumptions). Concerning the destination d2, the WFS contains the following atoms:
not Beach(d2), not WalkingOnly(d2), and Swimming(d2).</p>
      <p>The complexity of answering covered NBCQs for any of our DL-Litenot logics and
for E L not can now be determined using Theorem 7. Note that Theorem 10 also yields
immediate bounds for the complexity of standard DL problems such as instance and
satisfiability checking.</p>
      <p>Theorem 10 Let L be any of DL-LiteR;u;not, DL-LiteR;not or E L not. Then, given a
knowledge base KB = (T ; A ) and an acyclic (resp., general) covered NBCQ Q,
deciding whether Q is true under the EFWFS of KB is in EXPTIME (resp., 2-EXPTIME) for
combined complexity.
(3)
(4)</p>
      <sec id="sec-5-1">
        <title>Related Work</title>
        <p>
          There is already a substantial amount of work on combining rules and ontologies. The
main direction of research so far has been to combine rules and ontologies into
dlprograms consisting of a knowledge base together with a set of rules. This combination
can be carried out in a loose or tight fashion. Representatives of the former are in
particular the dl-programs in [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. The hybrid MKNF knowledge bases in [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] are also close
in spirit. Some representatives of tight integrations of rules and ontologies include the
works by Rosati [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] and Lukasiewicz [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. SWRL [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] and WRL [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] also belong to
this category. For several of the above combinations of rules and ontologies, a
wellfounded semantics has been defined: [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], and [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] define a well-founded
semantics for the loosely integrated dl-programs in [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], for the tightly integrated
dlprograms in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], for the hybrid MKNF knowledge bases in [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], and for an integration
of rules and ontologies that is close in spirit to Rosati’s approach [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ], respectively.
        </p>
        <p>
          We achieve the combination of rules and ontologies by a reduction from
description logics to logic programming formalisms. Obviously our work is based on the earlier
work on Datalog . Based on the same idea of translating ontologies into logic
programming rules and hence closely related to our work are [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], and [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. Probably
the closest relationship to our work has the paper on FDNC-rules by [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] where the
stable semantics is used in order to obtain a rule-based formalism with negation-as-failure
that allows for the formulation of ontological knowledge.
8
        </p>
      </sec>
      <sec id="sec-5-2">
        <title>Summary and Outlook</title>
        <p>We have defined the equality-friendly WFS for Datalog with existentially quantified
variables in rule heads and negations in rule bodies. Via a translation of its guarded
fragment to guarded fixed point logic, we have then proved the decidability in the guarded
case, and obtained complexity results for this case. These are important contributions in
their own right. In addition, since the approach does not make the UNA, it can be
readily used to extend DLs by nonmonotonic negation under the WFS, as illustrated along
several DLs, including DL-LiteR , underlying the important OWL 2 QL profile.</p>
        <p>Interesting topics for future research include to investigate the data complexity of
guarded normal Datalog and to explore how the approach can be extended by keys
and to other ontology languages, including OWL 2 EL and OWL 2 RL.
Acknowledgments. This work was supported by the EPSRC grant EP/H051511/1
“ExODA: Integrating Description Logics and Database Technologies for Expressive
Ontology-Based Data Access”, by the European Research Council under the EU’s 7th
Framework Programme (FP7/2007-2013)/ERC grant 246858 (DIADEM), by the European
Commission under the EU’s FP7 grant 238975 (SEALS), and by a Yahoo! Research
Fellowship. Georg Gottlob is a James Martin Senior Fellow, and also gratefully
acknowledges a Royal Society Wolfson Research Merit Award. The work was carried out
in the context of the James Martin Institute for the Future of Computing.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Alsaç</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baral</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Reasoning in description logics using declarative logic programming</article-title>
          .
          <source>Technical report</source>
          , Dep. of Computer Science and Engineering, Arizona State Univ. (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Angele</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boley</surname>
          </string-name>
          , H., de Bruijn, J.,
          <string-name>
            <surname>Fensel</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hitzler</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kifer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krummenacher</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lausen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polleres</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Studer</surname>
          </string-name>
          , R.:
          <article-title>Web Rule Language (WRL) (Sep 2005), W3C Member Submission</article-title>
          . Available at http://www.w3.org/Submission/WRL/.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brandt</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Pushing the E L envelope</article-title>
          .
          <source>In: Proc. IJCAI-2005.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Baral</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subrahmanian</surname>
            ,
            <given-names>V.S.:</given-names>
          </string-name>
          <article-title>Dualities between alternative semantics for logic programming and nonmonotonic reasoning</article-title>
          .
          <source>J. Autom. Reasoning</source>
          <volume>10</volume>
          (
          <issue>3</issue>
          ),
          <fpage>399</fpage>
          -
          <lpage>420</lpage>
          (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Beeri</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vardi</surname>
          </string-name>
          , M.Y.:
          <article-title>The implication problem for data dependencies</article-title>
          .
          <source>In: Proc. ICALP1981</source>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Calì</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gottlob</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kifer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Taming the infinite chase: Query answering under expressive relational constraints</article-title>
          .
          <source>In: Proc. KR-2008</source>
          . Revised version: http://www.dbai. tuwien.ac.at/staff/gottlob/CGK.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Calì</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gottlob</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukasiewicz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>A general Datalog-based framework for tractable query answering over ontologies</article-title>
          .
          <source>In: J. Web Sem</source>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Giacomo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Tractable reasoning and efficient query answering in description logics: The DL-Lite family</article-title>
          .
          <source>J. Autom. Reasoning</source>
          <volume>39</volume>
          (
          <issue>3</issue>
          ),
          <fpage>385</fpage>
          -
          <lpage>429</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Drabent</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , Małuszyn´ski, J.:
          <article-title>Well-founded semantics for hybrid rules</article-title>
          .
          <source>In: Proc. RR-2007.</source>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ianni</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukasiewicz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schindlauer</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tompits</surname>
          </string-name>
          , H.:
          <article-title>Combining answer set programming with description logics for the Semantic Web</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>172</volume>
          (
          <issue>12</issue>
          /13),
          <fpage>1495</fpage>
          -
          <lpage>1539</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukasiewicz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schindlauer</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tompits</surname>
          </string-name>
          , H.:
          <article-title>Well-founded semantics for description logic programs in the Semantic Web</article-title>
          .
          <source>In: Proc. RuleML-2004.</source>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simkus</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>FDNC: Decidable nonmonotonic disjunctive logic programs with function symbols</article-title>
          .
          <source>ACM Trans. Comput. Log</source>
          .
          <volume>11</volume>
          (
          <issue>2</issue>
          ) (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Grädel</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walukiewicz</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Guarded fixed point logic</article-title>
          .
          <source>In: Proc. LICS-1999.</source>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Heymans</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vermeir</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Integrating Semantic Web reasoning and answer set programming</article-title>
          .
          <source>In: Proc. ASP-2003.</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boley</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tabet</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grosof</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dean</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>SWRL: A Semantic Web rule language combining OWL and RuleML</article-title>
          (May
          <year>2004</year>
          ),
          <article-title>W3C Member Submission</article-title>
          . Available at http://www.w3.org/Submission/SWRL/.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Hustadt</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Reducing SHIQ-description logic to disjunctive Datalog programs</article-title>
          .
          <source>In: Proc. KR-2004.</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Knorr</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alferes</surname>
            ,
            <given-names>J.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hitzler</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Local closed world reasoning with description logics under the well-founded semantics</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>175</volume>
          (
          <issue>9</issue>
          /10),
          <fpage>1528</fpage>
          -
          <lpage>1554</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Lukasiewicz</surname>
          </string-name>
          , T.:
          <article-title>A novel combination of answer set programming with description logics for the Semantic Web</article-title>
          .
          <source>In: Proc. ESWC-2007.</source>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Lukasiewicz</surname>
          </string-name>
          , T.:
          <article-title>A novel combination of answer set programming with description logics for the Semantic Web</article-title>
          .
          <source>IEEE Trans. Knowl. Data Eng</source>
          .
          <volume>22</volume>
          (
          <issue>11</issue>
          ),
          <fpage>1577</fpage>
          -
          <lpage>1592</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Can OWL and logic programming live together happily ever after?</article-title>
          <source>In: Proc. ISWC-2006.</source>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A faithful integration of description logics with logic programming</article-title>
          .
          <source>In: Proc. IJCAI-2007.</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Poggi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Giacomo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
          </string-name>
          , R.:
          <article-title>Linking data to ontologies</article-title>
          .
          <source>J. Data Semantics</source>
          <volume>10</volume>
          ,
          <fpage>133</fpage>
          -
          <lpage>173</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Rosati</surname>
          </string-name>
          , R.: D L +
          <article-title>log: Tight integration of description logics and disjunctive Datalog</article-title>
          .
          <source>In: Proc. KR-2006.</source>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Swift</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Deduction in ontologies via ASP</article-title>
          .
          <source>In: Proc. LPNMR-2004.</source>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>van Gelder</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ross</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schlipf</surname>
            ,
            <given-names>J.S.:</given-names>
          </string-name>
          <article-title>The well-founded semantics for general logic programs</article-title>
          .
          <source>J. ACM</source>
          <volume>38</volume>
          (
          <issue>3</issue>
          ),
          <fpage>620</fpage>
          -
          <lpage>650</lpage>
          (
          <year>1991</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>