WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 || 3 |

«Abstract. Evolution of Knowledge Bases (KBs) expressed in Description Logics (DLs) proved its importance. Recent studies of the topic mostly focussed ...»

-- [ Page 2 ] --

Capturing Global Semantics. ΠG (φ) checks whether φ of N T -contradicts A: ΠG (φ) is true iff ¬φ ∈ fclT (A) \ AlignAlg((T, A), N ). Intuitively, SymAlg for global semantics works as follows: having contradiction between N and A on φ = B(c), the change of B’s interpretation is inevitable. Since the semantics traces changes on symbols only, and B is already changed, one can drop from A all the assertions of the form B(d).

Clearly, SymAlg(K, N, ΠG ) can be computed in time polynomial in |K ∪ N |. The following theorem shows correctness of this algorithm.

–  –  –

5 La Evolution of DL-LiteR KBs ⊆ In the previous section we showed that atom-based MBAs behave well for DL-Litepr R evolution settings, while symbol-based ones do not. This suggests to investigate atombased MBAs for the entire DL-LiteR. Moreover, one of the atom-based semantics La which is essentially the same as a so-called Winslett’s semantics [15] (WS) was ⊆ widely studied in the literature [6,8]. Liu, Lutz, Milicic, and Wolter studied WS for expressive DLs [6], and KBs with empty TBoxes. Most of the DLs they considered are not closed under WS. Poggi, Lembo, De Giacomo, Lenzerini, and Rosati applied WS to the same setting as we have in this work: to what they called instance level (ABox) update for DL-Lite [8]. They proposed an algorithm to compute the result of updates, which has technical issues, i.e., it is neither sound, nor complete [10]. They further use this algorithm to compute approximations of ABox updates in sublogics of DL-Lite, which inherits these technical issues. Actually, ABox update algorithm cannot exist since Calvanese, Kharlamov, Nutt, and Zheleznyakov showed that DL-Lite is not closed under La [11]. We now investigate La evolution for DL-LiteR and firstly explain why ⊆ ⊆ DL-LiteR is not closed under La.⊆ 10 Evgeny Kharlamov and Dmitriy Zheleznyakov

5.1 Understanding Inexpressibility of Evolution in DL-LiteR

–  –  –

We now give an intuition why in K N under La canonical models may be missing.

Observe that in Example 10, the role R is affected by the old TBox T1 as follows:

(i) T1 places (i.e., enforces the existence of) R-atoms in the evolution result, and on one of coordinates of these R-atoms, there are constants from specific sets, e.g., A ∃R of T1 enforces R-atoms with constants from A on the first coordinate, and (ii) T1 forbids R-atoms in K1 N1 with specific constants on the other coordinate, e.g., ∃R− ¬C forbids R-atoms with C-constants on the second coordinate.

Due to this dual-affection (both positive and negative) of the role R in T1, we were able to provide ABoxes A1 and N1, which together triggered the case analyses of modifications on the model I, that is, A1 and N1 were triggers for R. Existence of such an affected R and triggers A1 and N1 made K1 N1 inexpressible in DL-LiteR. Therefore, we now formally define and then learn how to detect dually-affected roles in TBoxes T and how to understand whether these roles are triggered by A and N.

Capturing Instance Level Ontology Evolution for DL-Lite 11

–  –  –

Definition 11. Let T be a DL-LiteR TBox. Then a role R is dually-affected in T if for some concepts A and B it holds that T |= A ∃R and T |= ∃R− ¬B. A duallyaffected role R is triggered by N if there is a concept C such that T |= ∃R− ¬C and N |=T C(b) for some constant b.

As we saw in Example 10, even one dually-affected role in a TBox can cause inexpressibility of evolution. Moreover, if there is a dually affected role, we can always find A and N to trigger it.

We generalize this observation as follows:

–  –  –

5.2 Prototypes

Closer look at the sets of models K N for DL-LiteR KBs K gives a surprising result:

Theorem 13. The set of models K N under La can be divided (but in general not partitioned) into worst-case exponentially many in |K∪N | subsets S0,..., Sn, where each Si has a canonical model Ji, which is a minimal element in K N wrt homomorphisms.

We call these Ji s prototypes. Thus, capturing K N in some logics boils down to (i) capturing each Si with some theory KSi and (ii) taking the disjunction across all KSi. This will give the desired theory K = KS1 ∨ · · · ∨ KSn that captures K N.

As we will see some of KSi s are not DL-Lite theories (while they are SHOIQ theories, see Section 5.4 for details). We construct each KSi in two steps. First, we construct a DL-LiteR KB K(Ji ) which is a sound approximations of Si, i.e., Si ⊆ Mod(K(Ji )).

Second, based on K and N, we construct a SHOIQ formula Ψ, which cancels out all the models in Mod(K(Ji )) \ Si, i.e., KSi = Ψ ∧ K(Ji ). Finally, KS0 ∨ · · · ∨ KSn = (Ψ ∧ K(J0 )) ∨ · · · ∨ (Ψ ∧ K(Jn )) = Ψ ∧ (K(J0 ) ∨ · · · ∨ K(Jn )).

To get a better intuition on our approach consider Figure 3, where the result of evolution K N is depicted as the figure with solid-line borders (each point within the figure is a model of K N ). For the sake of example, let K N under La can be divided ⊆ in four subsets S0,..., S3. To emphasize this fact, K N looks similar to a hand with four fingers, where each finger represents an Si. Consider the left part of Figure 3, where the canonical Ji model of each Si is depicted as a star. Using DL-LiteR, we can provide KBs K(Ji )s that are sound approximation of corresponding Si s. We depict the models 12 Evgeny Kharlamov and Dmitriy Zheleznyakov Mod(K(Ji )) as ovals with dashed-line boarders. In the right part of Figure 3 we depict in grey the models Mod(K(Ji )) \ Si that are cut off by Ψ.





We now define prototypes formally and proceed to procedures discussed above.

Definition 14. Let K and N be an evolution setting. A prototypal set for K N under La ⊆

is a minimal subset J = {J0,..., Jn } of K N satisfying the following property:

for every J ∈ K N there exists Ji ∈ J homomorphically embeddable in J.

We call every Ji ∈ J a prototype for K N. Note that prototypes generalize canonical models in the sense that every set of models with a canonical one, say Mod(K) for a DL-LiteR KB K, has a prototype, which is exactly this canonical model.

Computing La Evolution for DL-LiteR 5.3 ⊆ For the ease of exhibition of our procedure that computes evolution K N under La ⊆ semantics we restrict DL-LiteR by assuming that TBoxes T should satisfy: for any two roles R and R, T |= ∃R ∃R and T |= ∃R ¬∃R. That is, we forbid direct interaction (subsumption and disjoint) between role projections and call such T as without direct role interactions. Some interaction between R and R is still possible, e.g., role projections may contain the same concept. This restriction allows us to analyze evolution that affects roles independently for every role. We will further comment on how the following techniques can be extended to the case when roles interact in an arbitrary way.

Components for Computation. We now introduce several notions and notations that we further use in the description of our procedure. The notion of alignment was introduced in Section 4.1. An auxiliary set of atoms AA (Auxiliary Atoms) that, due to evolution, should be deleted from the original KB and have some extra condition on the first

coordinate is:

∃R, A |=T A(a), N |=T ¬∃R− (b)}.

AA(T, A, N ) = {R(a, b) ∈ fclT (A) | T |= A If Ri is a dually-affected role of T triggered by A and N, then the set of forbidden

atoms (of the original ABox) FA[T, A, N ](Ri ) for Ri is:

− {D(c) ∈ fclT (A) | ∃Ri (c) ∧ D(c) |=T ⊥ and N |=T D(c), and N |=T ¬D(c)}.

Consequently, the set of forbidden atoms for the entire KB (T, A) and N is FA(T, A, N ) = FA(T, A, N )(Ri ), Ri ∈TR

–  –  –

Constructing Zero-Prototype. The procedure BZP (K, N ) (Build Zero Prototype) in Figure 4 constructs the main prototype J0 for K and N, which we call zero-prototype.

Based on J0 we will construct all the other prototypes. To build J0 one should align the canonical model I can of K with N, and then delete from the resulting set of atoms all the auxiliary atoms R(a, b) of AA(K, N ). If I can contains no atoms R(a, β) ∈ AA(K, N ) for some β, then we further delete atoms rootat (∃R(a)) from J0, otherwise would we T get a contradiction with the TBox. Note that J0 can be infinite.

Constructing Other Prototypes. The procedure BP (K, N, J0 ) (Build Prototypes) of constructing J takes J0 and, based on it, builds the other prototypes by (i) dropping FA-atoms from J0 and then (ii) adding atoms necessary to obtain a model of K N.

This procedure can be found in Figure 5.

We conclude the discussion on the procedures with a theorem:

–  –  –

Continuing with Example 10, one can check that the prototypal set for K1 and N1 is {J0, J1, J2, J3 }, where J0, J1, and J2 are as in the example and AJ3 = {x, y}, C J3 = {b}, and RJ3 = {(x, d), (y, e)}.

We proceed to correctness of BP in capturing evolution in DL-LiteR, where we use the following set FC[T, A, N ](Ri ) = {c | D(c) ∈ FA[T, A, N ](Ri )}, that collects all the constants that participate in the forbidden atoms.

Theorem 16. Let K = (T, A), N be an evolution setting, T without direct role interactions, and BP (K, N, BZP (K, N )) = {J0,..., Jn } a prototypal set for K N. Then K N under La is expressible in SHOIQ and moreover ⊆

–  –  –

What is missing in the theorem above is how to compute the ABoxes Ai s. One can do it using a similar procedure to the one of constructing Ji s, with the difference that one has to take the original ABox A instead of I can as the input. Note that A may include negative atoms, like ¬B(c), which should be treated in the same way as positive ones.

Continuing with Example 10, the ABoxes A0 and A1 are as follows:

A0 = {C(d), C(e), C(b)}; A1 = {A(x), C(e), C(b), R(x, d)}.

A2 and A3 can be built in the similar way. Note that only A0 is in DL-LiteR, while writing A1,..., A3 requires variables in ABoxes. Variables, also known as soft constants, are not allowed in DL-LiteR ABoxes, while present in DL-LiteRS ABoxes. Soft constants x are constants not constrained by the Unique Name Assumption: it is not necessary that xI = x. Since DL-LiteRS is tractable and first-order rewritable [12], expressing A1 in DL-LiteRS instead of DL-LiteR does not affect tractability.

Note that the number of prototypes is exponential in the number of constants, and therefore the size of the SHOIQ theory described in Theorem 16 is also exponential in the number of constants.

Capturing La Semantics for DL-LiteR KBs with Direct Role Interactions. In this general ⊆ case the BP procedure does return prototypes but not all of them. To capture the La ⊆ for such KBs one should iterate BP over (already constructed) prototypes until no new prototypes can be constructed. Intuitively the reason is that BP deletes forbidden atoms (atoms of FA) and add new atoms of the form R(a, b) for some triggered dually-affected role R which may in turn trigger another dually-affected role, say P, and such triggering may require further modifications, already for P. This further modification require a new run of BP. For example, if we have ∃R− ¬∃P − in the TBox and we set R(a, b) in a prototype, say Jk, this modification triggers role P and we should run BP recursively with the prototype Jk as if it was the zero prototype. We shall not discuss the general procedures in more details due to space limit.

–  –  –

Proof. Clearly all ABox assertions of Ac are over concepts, roles, and constants of K, thus, there are at most a quadratic many (in |K ∪ N |) of them, and we can simply test whether F ∈ Ac for each such assertion F. Since K N is representable in SHOIQ, this test can be reduced to the subsumption problem for SHOIQ (checking whether K |= C(a) is equivalent to checking whether K |= {a} C). Subsumption for SHOIQ is NExpTime-complete and can be tested using the algorithms of [16].

The proposition above gives the upper bound for Kc computations. We do not know the lower bound, but conjecture it to be in polynomial time. Note that NExpTime lower bound for SHOIQ subsumption checking holds for arbitrary SHOIQ concepts, while Theorem 16 gives us K with concepts of a specific kind. Moreover, the authors of [16] argue that despite the high complexity of subsumption checking their algorithms should behave well in many typically encountered cases. Note also that for DL-Litepr KBs R certain approximations in fact capture the evolution result, that is Mod(Kc ) = K N.

6 Conclusion

We studied model-based approaches to ABox evolution (update and revision) over DL-LiteR and its fragment DL-Litepr, which both extend (first-order fragment of) RDFS.

R DL-Litepr is closed under most of the MBAs, while DL-LiteR is not closed under any of R them. We showed that if the TBox of K entails a pair of assertions of the form A ∃R and ∃R− ¬C, then an interplay of N and A may lead to inexpressibility of K N. For DL-Litepr we provided algorithms how to compute evolution results for six model-based R 16 Evgeny Kharlamov and Dmitriy Zheleznyakov approaches and approximate for the remaining two. For DL-LiteR we capture evolution of KBs under a local model-based approach with SHOIQ using novel techniques based on what we called prototypes. We believe that prototypes are important since they can be used to study evolution for ontology languages other than DL-LiteR. Finally, we showed how to approximate evolution when it is not expressible in DL-LiteR using what we called certain approximations.

It is the first attempt to provide an understanding of inexpressibility of MBAs for DL-Lite evolution. Without this understanding it is unclear how to proceed with the study of evolution in more expressive DLs and what to expect from MBAs in such logics. We also believe that our techniques of capturing semantics based on prototypes give a better understanding of how MBAs behave.



Pages:     | 1 || 3 |


Similar works:

«Sermon #3152 Metropolitan Tabernacle Pulpit 1 THE LOWER COURTS NO. 3152 A SERMON PUBLISHED ON THURSDAY, JULY 8, 1909. DELIVERED BY C. H. SPURGEON, AT THE METROPOLITAN TABERNACLE, NEWINGTON, ON LORD’S-DAY EVENING, MARCH 23, 1873. “For if our heart condemns, God is greater than our heart, and knows all things. Beloved, if our heart does not condemn us, then have we confidence toward God.” 1 John 3:20, 21. [Another Sermon by Mr. Spurgeon, on verse 21, is #1855, Volume 31—WHAT IS THE...»

«ANÁLISIS Y CONCLUSIONES DEL PLAN INTEGRAL DE LA CREACIÓN Y DEL AUTOR PONENCIA MARCO PARA EL SEGUNDO ENCUENTRO DE CREADORES (Sevilla 10,11 y 12 de Noviembre) Coordinada y editada por David de Ugarte Director del Plan Integral de la Creación Índice Sección 1 : Presentación Introducción   Los creadores en el centro de los procesos culturales   Metodología   Sección 2: Elementos para un diagnóstico global del Sector Autoral (Selección de Contribuciones de Expertos) El mercado de la...»

«Faculdade de Ciências da Universidade de Lisboa Departamento de Geologia (Paleo)ecology of coccolithophores in the submarine canyons of the central Portuguese continental margin: environmental, sedimentary and oceanographic implications Catarina Alexandra Vicente Guerreiro Doutoramento em Geologia Especialidade em Paleontologia e Estratigrafia Faculdade de Ciências da Universidade de Lisboa Departamento de Geologia (Paleo)ecology of coccolithophores in the submarine canyons of the central...»

«INTERVIEW WITH DWIGHT WATSON (Close Personal Friend of Bob Goss, Texas Ranger) ©2006, Robert Nieman PROJECT: BOB GOSS & THE TEXAS RANGERS INTERVIEW CONDUCTED AT THE HOME OF DWIGHT WATSON KILGORE, TEXAS TUESDAY APRIL 16, 1996 INTERVIEWED BY: ROBERT NIEMAN LONGVIEW, TEXAS E-Book Project Staff: Robert Nieman, Volunteer; Byron A. Johnson, Christina Stopka & Judy Shofner, Texas Ranger Hall of Fame and Museum staff. Present At Interview: Dwight Watson, Thelma Watson, & Robert Nieman Dwight Watson...»

«Guidance on risk assessment and conceptual design of tertiary containment systems for bulk storage of petroleum, petroleum products, or other fuels GUIDANCE ON RISK ASSESSMENT AND CONCEPTUAL DESIGN OF TERTIARY CONTAINMENT SYSTEMS FOR BULK STORAGE OF PETROLEUM, PETROLEUM PRODUCTS, OR OTHER FUELS 1st edition July 2013 Published by ENERGY INSTITUTE, LONDON The Energy Institute is a professional membership body incorporated by Royal Charter 2003 Registered charity number 1097899 The Energy...»

«OFFICE OF WORKERS' COMPENSATION PROGRAMS Office of Inspector General—Office of Audit OWCP NEEDS TO IMPROVE ITS MONITORING AND MANAGING OF DEFENSE BASE ACT CLAIMS Date Issued: March 23, 2011 02-A12-345-67-890 Report Number: 03-11-001-04-430 U.S. Department of Labor March 2011 Office of Inspector General Office of Audit OWCP NEEDS TO IMPROVE ITS MONITORING AND MANAGING OF DEFENSE BASE ACT CLAIMS BRIEFLY. Highlights of Report Number 03-11-001-04-430, to the Acting Director of the Office of...»

«How Bad Is Homosexual Practice According to Scripture and Does Scripture’s Indictment Apply to Committed Homosexual Unions? by Robert A. J. Gagnon, Ph.D. Associate Professor of New Testament, Pittsburgh Theological Seminary www.robgagnon.net, gagnon@pts.edu January 2007 (slightly modified December 2007) This brief essay explores two of the most common questions asked about the Bible’s view of homosexual practice. First, how bad is homosexual practice according to Scripture? Second, does...»

«SPAN 2001 Spanish Language and Literature Fordham University, Summer 2015 Tuesday/ Wednesday/ Thursday Modern Languages & Literatures Session II (June 30th – August 4th) Professor: Office: Email: Office hours: Course Description: This advanced Spanish course aims to develop students’ abilities in reading, writing, speaking and oral comprehension. The goals of the course are for students to understand and communicate in standard Spanish in everyday contexts; to comprehend a variety of...»

«Otto Group Chair of Strategic Management Institute of Corporate Development (ICD) Discussion Paper Series Governance of Professional Service Firms: A Configurational Approach Dirk Harlacher, Markus Reihlen Discussion Paper # 11 Reference address: Otto Group Chair of Strategic Management Leuphana University of Lüneburg Scharnhorststr. 1 D-21335 Lüneburg Fon +49 (0)4131 677-2354 E-Mail: regina.mueller@uni.leuphana.de http://www.leuphana.de/professuren/strategisches-management.html Authors: Dr....»

«Task based model for r´cit generation from sensor data: e an early experiment Bel´n A. Baez Miranda, Sybille Caffiau, Catherine Garbay, Fran¸ois Portet e c To cite this version: Bel´n A. Baez Miranda, Sybille Caffiau, Catherine Garbay, Fran¸ois Portet. Task based model e c for r´cit generation from sensor data: an early experiment. 5th International Workshop on e Computational Models of Narrative, Jul 2014, France. pp.1–10, 2014. hal-00998684 HAL Id: hal-00998684...»

«Ciudadanía y Derechos Humanos Sociales Editores: Manuel Alberto Alonso y Jorge Giraldo Ramírez Primera edición: Febrero del 2001 © Escuela Nacional Sindical, 2001 Apartado Aéreo 12175 Medellín Editores: Manuel Alberto Alonso y Jorge Giraldo Ramírez ISBN: 958964662-X Prohibida la reproducción total o parcial por cualquier medio sin permiso de los editores Diseño e impresión: Pregón Ltda. Este libro se publica con el apoyo del Instituto Sindical de Cooperación al Desarrollo—ISCOD y...»

«Text Classification using String Kernels HUlna Lodhi John Shawe-Taylor N ello Cristianini Chris Watkins Department of Computer Science Royal Holloway, University of London Egham, Surrey TW20 OEX, UK {huma, john, nello, chrisw}Cdcs.rhbnc.ac.uk Abstract We introduce a novel kernel for comparing two text documents. The kernel is an inner product in the feature space consisting of all subsequences of length k. A subsequence is any ordered sequence of k characters occurring in the text though not...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.