This action might not be possible to undo. Are you sure you want to continue?

Welcome to Scribd! Start your free trial and access books, documents and more.Find out more

**Modular Reuse of Ontologies: Theory and Practice
**

Bernardo Cuenca Grau berg@comlab.ox.ac.uk

Ian Horrocks ian.horrocks@comlab.ox.ac.uk

Yevgeny Kazakov yevgeny.kazakov@comlab.ox.ac.uk

Oxford University Computing Laboratory

Oxford, OX1 3QD, UK

Ulrike Sattler sattler@cs.man.ac.uk

School of Computer Science

The University of Manchester

Manchester, M13 9PL, UK

Abstract

In this paper, we propose a set of tasks that are relevant for the modular reuse of on-

tologies. In order to formalize these tasks as reasoning problems, we introduce the notions

of conservative extension, safety and module for a very general class of logic-based ontology

languages. We investigate the general properties of and relationships between these notions

and study the relationships between the relevant reasoning problems we have previously

identiﬁed. To study the computability of these problems, we consider, in particular, De-

scription Logics (DLs), which provide the formal underpinning of the W3C Web Ontology

Language (OWL), and show that all the problems we consider are undecidable or algo-

rithmically unsolvable for the description logic underlying OWL DL. In order to achieve a

practical solution, we identify conditions suﬃcient for an ontology to reuse a set of sym-

bols “safely”—that is, without changing their meaning. We provide the notion of a safety

class, which characterizes any suﬃcient condition for safety, and identify a family of safety

classes–called locality—which enjoys a collection of desirable properties. We use the notion

of a safety class to extract modules from ontologies, and we provide various modulariza-

tion algorithms that are appropriate to the properties of the particular safety class in use.

Finally, we show practical beneﬁts of our safety checking and module extraction algorithms.

1. Motivation

Ontologies—conceptualizations of a domain shared by a community of users—play a ma-

jor role in the Semantic Web, and are increasingly being used in knowledge management

systems, e-Science, bio-informatics, and Grid applications (Staab & Studer, 2004).

The design, maintenance, reuse, and integration of ontologies are complex tasks. Like

software engineers, ontology engineers need to be supported by tools and methodologies

that help them to minimize the introduction of errors, i.e., to ensure that ontologies are

consistent and do not have unexpected consequences. In order to develop this support, im-

portant notions from software engineering, such as module, black-box behavior, and controlled

interaction, need to be adapted.

Recently, there has been growing interest in the topic of modularity in ontology engi-

neering (Seidenberg & Rector, 2006; Noy, 2004a; Lutz, Walther, & Wolter, 2007; Cuenca

Grau, Parsia, Sirin, & Kalyanpur, 2006b; Cuenca Grau, Horrocks, Kazakov, & Sattler,

c (2008 AI Access Foundation. All rights reserved.

Cuenca Grau, Horrocks, Kazakov, & Sattler

2007), which has been motivated by the above-mentioned application needs. In this paper,

we focus on the use of modularity to support the partial reuse of ontologies. In particular,

we consider the scenario in which we are developing an ontology { and want to reuse a set

S of symbols from a “foreign” ontology O without changing their meaning.

For example, suppose that an ontology engineer is building an ontology about research

projects, which speciﬁes diﬀerent types of projects according to the research topic they

focus on. The ontology engineer in charge of the projects ontology { may use terms such

as Cystic Fibrosis and Genetic Disorder in his descriptions of medical research projects. The

ontology engineer is an expert on research projects; he may be unfamiliar, however, with

most of the topics the projects cover and, in particular, with the terms Cystic Fibrosis and

Genetic Disorder. In order to complete the projects ontology with suitable deﬁnitions for

these medical terms, he decides to reuse the knowledge about these subjects from a well-

established medical ontology O.

The most straightforward way to reuse these concepts is to construct the logical union

{ ∪ O of the axioms in { and O. It is reasonable to assume that the additional knowledge

about the medical terms used in both { and O will have implications on the meaning of the

projects deﬁned in {; indeed, the additional knowledge about the reused terms provides new

information about medical research projects which are deﬁned using these medical terms.

Less intuitive is the fact that importing O may also result in new entailments concerning

the reused symbols, namely Cystic Fibrosis and Genetic Disorder. Since the ontology engineer

of the projects ontology is not an expert in medicine and relies on the designers of O, it is

to be expected that the meaning of the reused symbols is completely speciﬁed in O; that

is, the fact that these symbols are used in the projects ontology { should not imply that

their original “meaning” in O changes. If { does not change the meaning of these symbols

in O, we say that { ∪ O is a conservative extension of O

In realistic application scenarios, it is often unreasonable to assume the foreign ontology

O to be ﬁxed; that is, O may evolve beyond the control of the modelers of {. The ontology

engineers in charge of { may not be authorized to access all the information in O or,

most importantly, they may decide at a later time to reuse the symbols Cystic Fibrosis and

Genetic Disorder from a medical ontology other than O. For application scenarios in which

the external ontology O may change, it is reasonable to “abstract” from the particular O

under consideration. In particular, given a set S of “external symbols”, the fact that the

axioms in { do not change the meaning of any symbol in S should be independent of the

particular meaning ascribed to these symbols by O. In that case, we will say that { is safe

for S.

Moreover, even if { “safely” reuses a set of symbols from an ontology O, it may still

be the case that O is a large ontology. In particular, in our example, the foreign medical

ontology may be huge, and importing the whole ontology would make the consequences

of the additional information costly to compute and diﬃcult for our ontology engineers in

charge of the projects ontology (who are not medical experts) to understand. In practice,

therefore, one may need to extract a module O

1

of O that includes only the relevant infor-

mation. Ideally, this module should be as small as possible while still guarantee to capture

the meaning of the terms used; that is, when answering queries against the research projects

ontology, importing the module O

1

would give exactly the same answers as if the whole

medical ontology O had been imported. In this case, importing the module will have the

274

Modular Reuse of Ontologies: Theory and Practice

same observable eﬀect on the projects ontology as importing the entire ontology. Further-

more, the fact that O

1

is a module in O should be independent of the particular { under

consideration.

The contributions of this paper are as follows:

1. We propose a set of tasks that are relevant to ontology reuse and formalize them as

reasoning problems. To this end, we introduce the notions of conservative extension,

safety and module for a very general class of logic-based ontology languages.

2. We investigate the general properties of and relationships between the notions of

conservative extension, safety, and module and use these properties to study the re-

lationships between the relevant reasoning problems we have previously identiﬁed.

3. We consider Description Logics (DLs), which provide the formal underpinning of the

W3C Web Ontology Language (OWL), and study the computability of our tasks. We

show that all the tasks we consider are undecidable or algorithmically unsolvable for

the description logic underlying OWL DL—the most expressive dialect of OWL that

has a direct correspondence to description logics.

4. We consider the problem of deciding safety of an ontology for a signature. Given that

this problem is undecidable for OWL DL, we identify suﬃcient conditions for safety,

which are decidable for OWL DL—that is, if an ontology satisﬁes our conditions

then it is safe; the converse, however, does not necessarily hold. We propose the

notion of a safety class, which characterizes any suﬃciency condition for safety, and

identify a family of safety classes–called locality—which enjoys a collection of desirable

properties.

5. We next apply the notion of a safety class to the task of extracting modules from

ontologies; we provide various modularization algorithms that are appropriate to the

properties of the particular safety class in use.

6. We present empirical evidence of the practical beneﬁts of our techniques for safety

checking and module extraction.

This paper extends the results in our previous work (Cuenca Grau, Horrocks, Kutz, &

Sattler, 2006; Cuenca Grau et al., 2007; Cuenca Grau, Horrocks, Kazakov, & Sattler, 2007).

2. Preliminaries

In this section we introduce description logics (DLs) (Baader, Calvanese, McGuinness,

Nardi, & Patel-Schneider, 2003), a family of knowledge representation formalisms which

underlie modern ontology languages, such as OWL DL (Patel-Schneider, Hayes, & Hor-

rocks, 2004). A hierarchy of commonly-used description logics is summarized in Table 1.

The syntax of a description logic L is given by a signature and a set of constructors. A

signature (or vocabulary) Sg of a DL is the (disjoint) union of countably inﬁnite sets AC

of atomic concepts (A, B, . . . ) representing sets of elements, AR of atomic roles (r, s, . . . )

representing binary relations between elements, and Ind of individuals (a, b, c, . . . ) repre-

senting constants. We assume the signature to be ﬁxed for every DL.

275

Cuenca Grau, Horrocks, Kazakov, & Sattler

DLs

Constructors Axioms [ Ax ]

Rol Con RBox TBox ABox

cL r ·, A, C

1

¯ C

2

, ∃R.C A ≡ C, C

1

_ C

2

a : C, r(a, b)

/L( –– ––, C –– ––

o –– –– Trans(r) –– ––

+ 1 r

−

+ H R

1

_ R

2

+ T Funct(R)

+ ^ (nS)

+ O (nS.C)

+ O ¦i¦

Here r ∈ AR, A ∈ AC, a, b ∈ Ind, R

(i)

∈ Rol, C

(i)

∈ Con, n ≥ 1 and S ∈ Rol is a simple

role (see (Horrocks & Sattler, 2005)).

Table 1: The hierarchy of standard description logics

Every DL provides constructors for deﬁning the set Rol of (general) roles (R, S, . . . ),

the set Con of (general) concepts (C, D, . . . ), and the set Ax of axioms (α, β, . . . ) which is

a union of role axioms (RBox), terminological axioms (TBox) and assertions (ABox).

cL (Baader, Brandt, & Lutz, 2005) is a simple description logic which allows one to

construct complex concepts using conjunction C

1

¯ C

2

and existential restriction ∃R.C

starting from atomic concepts A, roles R and the top concept ·. cL provides no role

constructors and no role axioms; thus, every role R in cL is atomic. The TBox axioms of

cL can be either concept deﬁnitions A ≡ C or general concept inclusion axioms (GCIs)

C

1

_ C

2

. cL assertions are either concept assertions a : C or role assertions r(a, b). In this

paper we assume the concept deﬁnition A ≡ C is an abbreviation for two GCIs A _ C and

C _ A.

The basic description logic /L( (Schmidt-Schauß & Smolka, 1991) is obtained from cL

by adding the concept negation constructor C. We introduce some additional constructors

as abbreviations: the bottom concept ⊥ is a shortcut for ·, the concept disjunction C

1

. C

2

stands for (C

1

¯ C

2

), and the value restriction ∀R.C stands for (∃R.C). In contrast

to cL, /L( can express contradiction axioms like · _ ⊥. The logic o is an extension of

/L( where, additionally, some atomic roles can be declared to be transitive using a role

axiom Trans(r).

Further extensions of description logics add features such as inverse roles r

−

(indicated

by appending a letter 1 to the name of the logic), role inclusion axioms (RIs) R

1

_ R

2

(+H),

functional roles Funct(R) (+T), number restrictions (nS), with n ≥ 1, (+^), qualiﬁed

number restrictions (nS.C), with n ≥ 1, (+O)

1

, and nominals ¦a¦ (+O). Nominals make

it possible to construct a concept representing a singleton set ¦a¦ (a nominal concept) from

an individual a. These extensions can be used in diﬀerent combinations; for example /L(O

is an extension of /L( with nominals; oH1O is an extension of o with role hierarchies,

1. the dual constructors (nS) and (nS.C) are abbreviations for ¬(n + 1 S) and ¬(n + 1 S.¬C),

respectively

276

Modular Reuse of Ontologies: Theory and Practice

inverse roles and qualiﬁed number restrictions; and oHO1O is the DL that uses all the

constructors and axiom types we have presented.

Modern ontology languages, such as OWL, are based on description logics and, to a cer-

tain extent, are syntactic variants thereof. In particular, OWL DL corresponds to oHO1^

(Horrocks, Patel-Schneider, & van Harmelen, 2003). In this paper, we assume an ontology

O based on a description logic L to be a ﬁnite set of axioms in L. The signature of an

ontology O (of an axiom α) is the set Sig(O) (Sig(α)) of atomic concepts, atomic roles and

individuals that occur in O (respectively in α).

The main reasoning task for ontologies is entailment: given an ontology O and an axiom

α, check if O implies α. The logical entailment [= is deﬁned using the usual Tarski-style

set-theoretic semantics for description logics as follows. An interpretation 1 is a pair 1 =

(∆

7

,

7

), where ∆

7

is a non-empty set, called the domain of the interpretation, and

7

is the

interpretation function that assigns: to every A ∈ AC a subset A

7

⊆ ∆

7

, to every r ∈ AR

a binary relation r

7

⊆ ∆

7

∆

7

, and to every a ∈ Ind an element a

7

∈ ∆

7

. Note that the

sets AC, AR and Ind are not deﬁned by the interpretation 1 but assumed to be ﬁxed for

the ontology language (DL).

The interpretation function

7

is extended to complex roles and concepts via DL-

constructors as follows:

(·)

7

= ∆

(C ¯ D)

7

= C

7

∩ D

7

(∃R.C)

7

= ¦x ∈ ∆

7

[ ∃y.'x, y` ∈ R

7

∧ y ∈ C

7

¦

(C)

7

= ∆

7

` C

7

(r

−

)

7

= ¦'x, y` [ 'y, x` ∈ r

7

¦

(nR)

7

= ¦ x ∈ ∆

7

[ ¦y ∈ ∆

7

[ 'x, y` ∈ R

7

¦ ≥ n¦

(nR.C)

7

= ¦ x ∈ ∆

7

[ ¦y ∈ ∆

7

[ 'x, y` ∈ R

7

∧ y ∈ C

7

¦ ≥ n¦

¦a¦

7

= ¦a

7

¦

The satisfaction relation 1 [= α between an interpretation 1 and a DL axiom α (read as 1

satisﬁes α, or 1 is a model of α) is deﬁned as follows:

1 [= C

1

_ C

2

iﬀ C

7

1

⊆ C

7

2

; 1 [= a : C iﬀ a

7

∈ C

7

;

1 [= R

1

_ R

2

iﬀ R

7

1

⊆ R

7

2

; 1 [= r(a, b) iﬀ 'a

7

, b

7

` ∈ r

7

;

1 [= Trans(r) iﬀ ∀x, y, z ∈ ∆

7

[ 'x, y` ∈ r

7

∧ 'y, z` ∈ r

7

⇒ 'x, z` ∈ r

7

];

1 [= Funct(R) iﬀ ∀x, y, z ∈ ∆

7

[ 'x, y` ∈ R

7

∧ 'x, z` ∈ R

7

⇒ y = z ];

An interpretation 1 is a model of an ontology O if 1 satisﬁes all axioms in O. An

ontology O implies an axiom α (written O [= α) if 1 [= α for every model 1 of O. Given

a set I of interpretations, we say that an axiom α (an ontology O) is valid in I if every

interpretation 1 ∈ I is a model of α (respectively O). An axiom α is a tautology if it is valid

in the set of all interpretations (or, equivalently, is implied by the empty ontology).

We say that two interpretations 1 = (∆

7

,

7

) and . = (∆

.

,

.

) coincide on the subset

S of the signature (notation: 1[

S

= .[

S

) if ∆

7

= ∆

.

and X

7

= X

.

for every X ∈ S. We

say that two sets of interpretations I and J are equal modulo S (notation: I[

S

= J[

S

) if for

every 1 ∈ I there exits . ∈ J such that .[

S

= 1[

S

and for every . ∈ J there exists 1 ∈ I

such that 1[

S

= .[

S

.

277

Cuenca Grau, Horrocks, Kazakov, & Sattler

Ontology of medical research projects P:

P1 Genetic Disorder Project ≡ Project ¯ ∃has Focus.Genetic Disorder

P2 Cystic Fibrosis EUProject ≡ EUProject ¯ ∃has Focus.Cystic Fibrosis

P3 EUProject _ Project

P4 ∃has Focus.· _ Project

E1 Project ¯ (Genetic Disorder

::

Cystic Fibrosis) _ ⊥

E2 ∀

::

has Focus.Cystic Fibrosis _ ∃has Focus.Genetic Disorder

Ontology of medical terms Q:

M1 Cystic Fibrosis ≡ Fibrosis ¯ ∃located In.Pancreas ¯ ∃has Origin.Genetic Origin

M2 Genetic Fibrosis ≡ Fibrosis ¯ ∃has Origin.Genetic Origin

M3 Fibrosis ¯ ∃located In.Pancreas _ Genetic Fibrosis

M4 Genetic Fibrosis _ Genetic Disorder

M5 DEFBI Gene _ Immuno Protein Gene ¯ ∃associated With.Cystic Fibrosis

Figure 1: Reusing medical terminology in an ontology on research projects

3. Ontology Integration and Knowledge Reuse

In this section, we elaborate on the ontology reuse scenario sketched in Section 1. Based on

this application scenario, we motivate and deﬁne the reasoning tasks to be investigated in

the remainder of the paper. In particular, our tasks are based on the notions of a conservative

extension (Section 3.2), safety (Sections 3.2 and 3.3) and module (Section 3.4). These notions

are deﬁned relative to a language L. Within this section, we assume that L is an ontology

language based on a description logic; in Section 3.6, we will deﬁne formally the class of

ontology languages for which the given deﬁnitions of conservative extensions, safety and

modules apply. For the convenience of the reader, all the tasks we consider in this paper

are summarized in Table 2.

3.1 A Motivating Example

Suppose that an ontology engineer is in charge of a oHO1O ontology on research projects,

which speciﬁes diﬀerent types of projects according to the research topic they are concerned

with. Assume that the ontology engineer deﬁnes two concepts—Genetic Disorder Project and

Cystic Fibrosis EUProject—in his ontology {. The ﬁrst one describes projects about genetic

disorders; the second one describes European projects about cystic ﬁbrosis, as given by the

axioms P1 and P2 in Figure 1. The ontology engineer is an expert on research projects: he

knows, for example, that every instance of EUProject must be an instance of Project (the

concept-inclusion axiom P3) and that the role has Focus can be applied only to instances

of Project (the domain axiom P4). He may be unfamiliar, however, with most of the topics

the projects cover and, in particular, with the terms Cystic Fibrosis and Genetic Disorder

mentioned in P1 and P2. In order to complete the projects ontology with suitable deﬁnitions

278

Modular Reuse of Ontologies: Theory and Practice

for these medical terms, he decides to reuse the knowledge about these subjects from a well-

established and widely-used medical ontology.

Suppose that Cystic Fibrosis and Genetic Disorder are described in an ontology O contai-

ning the axioms M1-M5 in Figure 1. The most straightforward way to reuse these concepts

is to import in { the ontology O—that is, to add the axioms from O to the axioms in {

and work with the extended ontology { ∪O. Importing additional axioms into an ontology

may result in new logical consequences. For example, it is easy to see that axioms M1–M4

in O imply that every instance of Cystic Fibrosis is an instance of Genetic Disorder:

O [= α := (Cystic Fibrosis _ Genetic Disorder) (1)

Indeed, the concept inclusion α

1

:= (Cystic Fibrosis _ Genetic Fibrosis) follows from axioms

M1 and M2 as well as from axioms M1 and M3; α follows from axioms α

1

and M4.

Using inclusion α from (1) and axioms P1–P3 from ontology { we can now prove that

every instance of Cystic Fibrosis EUProject is also an instance of Genetic Disorder Project:

{ ∪ O [= β := (Cystic Fibrosis EUProject _ Genetic Disorder Project) (2)

This inclusion β, however, does not follow from { alone—that is, { [= β. The ontology

engineer might be not aware of Entailment (2), even though it concerns the terms of primary

scope in his projects ontology {.

It is natural to expect that entailments like α in (1) from an imported ontology O result

in new logical consequences, like β, in (2), over the terms deﬁned in the main ontology {.

One would not expect, however, that the meaning of the terms deﬁned in O changes as a

consequence of the import since these terms are supposed to be completely speciﬁed within

O. Such a side eﬀect would be highly undesirable for the modeling of ontology { since the

ontology engineer of { might not be an expert on the subject of O and is not supposed to

alter the meaning of the terms deﬁned in O not even implicitly.

The meaning of the reused terms, however, might change during the import, perhaps due

to modeling errors. In order to illustrate such a situation, suppose that the ontology engineer

has learned about the concepts Genetic Disorder and Cystic Fibrosis from the ontology O

(including the inclusion (1)) and has decided to introduce additional axioms formalizing

the following statements:

“Every instance of Project is diﬀerent from every instance of Genetic Disorder

:::

and every instance of Cystic Fibrosis.”

(3)

“

::::::

Every

::::::::

project that has Focus on Cystic Fibrosis, also has Focus on Genetic Disorder” (4)

Note that the statements (3) and (4) can be thought of as adding new information about

projects and, intuitively, they should not change or constrain the meaning of the medical

terms.

Suppose the ontology engineer has formalized the statements (3) and (4) in ontology

{ using axioms E1 and E2 respectively. At this point, the ontology engineer has intro-

duced modeling errors and, as a consequence, axioms E1 and E2 do not correspond to (3)

and (4): E1 actually formalizes the following statement: “Every instance of Project is diﬀe-

rent from every common instance of Genetic Disorder and Cystic Fibrosis”, and E2 expresses

279

Cuenca Grau, Horrocks, Kazakov, & Sattler

that “Every object that either has Focus on nothing, or has Focus only on Cystic Fibrosis,

also has Focus on Genetic Disorder”. These kinds of modeling errors are diﬃcult to detect,

especially when they do not cause inconsistencies in the ontology.

Note that, although axiom E1 does not correspond to fact (3), it is still a consequence

of (3) which means that it should not constrain the meaning of the medical terms. On the

other hand, E2 is not a consequence of (4) and, in fact, it constrains the meaning of medical

terms. Indeed, the axioms E1 and E2 together with axioms P1-P4 from { imply new axioms

about the concepts Cystic Fibrosis and Genetic Disorder, namely their disjointness:

{ [= γ := (Genetic Disorder ¯ Cystic Fibrosis _ ⊥) (5)

The entailment (5) can be proved using axiom E2 which is equivalent to:

· _ ∃has Focus.(Genetic Disorder . Cystic Fibrosis) (6)

The inclusion (6) and P4 imply that every element in the domain must be a project—that

is, { [= (· _ Project). Now, together with axiom E1, this implies (5).

The axioms E1 and E2 not only imply new statements about the medical terms, but also

cause inconsistencies when used together with the imported axioms from O. Indeed, from

(1) and (5) we obtain { ∪O [= δ := (Cystic Fibrosis _ ⊥), which expresses the inconsistency

of the concept Cystic Fibrosis.

To summarize, we have seen that importing an external ontology can lead to undesirable

side eﬀects in our knowledge reuse scenario, like the entailment of new axioms or even incon-

sistencies involving the reused vocabulary. In the next section we discuss how to formalize

the eﬀects we consider undesirable.

3.2 Conservative Extensions and Safety for an Ontology

As argued in the previous section, an important requirement for the reuse of an ontology O

within an ontology { should be that { ∪O produces exactly the same logical consequences

over the vocabulary of O as O alone does. This requirement can be naturally formulated

using the well-known notion of a conservative extension, which has recently been investi-

gated in the context of ontologies (Ghilardi, Lutz, & Wolter, 2006; Lutz et al., 2007).

Deﬁnition 1 (Deductive Conservative Extension). Let O and O

1

⊆ O be two L-

ontologies, and S a signature over L. We say that O is a deductive S-conservative extension

of O

1

w.r.t. L, if for every axiom α over L with Sig(α) ⊆ S, we have O [= α iﬀ O

1

[= α.

We say that O is a deductive conservative extension of O

1

w.r.t. L if O is a deductive

S-conservative extension of O

1

w.r.t. L for S = Sig(O

1

). ♦

In other words, an ontology O is a deductive S-conservative extension of O

1

for a

signature S and language L if and only if every logical consequence α of O constructed

using the language L and symbols only from S, is already a logical consequence of O

1

; that

is, the additional axioms in O ` O

1

do not result into new logical consequences over the

vocabulary S. Note that if O is a deductive S-conservative extension of O

1

w.r.t. L, then

O is a deductive S

1

-conservative extension of O

1

w.r.t. L for every S

1

⊆ S.

The notion of a deductive conservative extension can be directly applied to our ontology

reuse scenario.

280

Modular Reuse of Ontologies: Theory and Practice

Deﬁnition 2 (Safety for an Ontology). Given L-ontologies O and O

t

, we say that O

is safe for O

t

(or O imports O

t

in a safe way) w.r.t. L if O∪O

t

is a deductive conservative

extension of O

t

w.r.t. L. ♦

Hence, the ﬁrst reasoning task relevant for our ontology reuse scenario can be formulated

as follows:

T1. given L-ontologies O and O

t

, determine if O is safe for O

t

w.r.t. L.

We have shown in Section 3.1 that, given { consisting of axioms P1–P4, E1, E2, and O

consisting of axioms M1–M5 from Figure 1, there exists an axiom δ = (Cystic Fibrosis _ ⊥)

that uses only symbols in Sig(O) such that O [= δ but {∪O [= δ. According to Deﬁnition 1,

this means that { ∪ O is not a deductive conservative extension of O w.r.t. any language

L in which δ can be expressed (e.g. L = /L(). It is possible, however, to show that if the

axiom E2 is removed from { then for the resulting ontology {

1

= { ` ¦E2¦, {

1

∪ O is a

deductive conservative extension of O. The following notion is useful for proving deductive

conservative extensions:

Deﬁnition 3 (Model Conservative Extension, Lutz et al., 2007).

Let O and O

1

⊆ O be two L-ontologies and S a signature over L. We say that O is a model

S-conservative extension of O

1

, if for every model 1 of O

1

, there exists a model . of O

such that 1[

S

= .[

S

. We say that O is a model conservative extension of O

1

if O is a model

S-conservative extension of O

1

for S = Sig(O

1

). ♦

The notion of model conservative extension in Deﬁnition 3 can be seen as a semantic

counterpart for the notion of deductive conservative extension in Deﬁnition 1: the latter is

deﬁned in terms of logical entailment, whereas the former is deﬁned in terms of models.

Intuitively, an ontology O is a model S-conservative extension of O

1

if for every model of

O

1

one can ﬁnd a model of O over the same domain which interprets the symbols from S

in the same way. The notion of model conservative extension, however, does not provide

a complete characterization of deductive conservative extensions, as given in Deﬁnition 1;

that is, this notion can be used for proving that an ontology is a deductive conservative

extension of another, but not vice versa:

Proposition 4 (Model vs. Deductive Conservative Extensions, Lutz et al., 2007)

1. For every two L-ontologies O, O

1

⊆ O, and a signature S over L, if O is a model

S-conservative extension of O

1

then O is a deductive S-conservative extension of O

1

w.r.t. L;

2. There exist two /L( ontologies O and O

1

⊆ O such that O is a deductive conservative

extension of O

1

w.r.t. /L(, but O is not a model conservative extension of O

1

.

Example 5 Consider an ontology {

1

consisting of axioms P1–P4, and E1 and an ontology

O consisting of axioms M1–M5 from Figure 1. We demonstrate that {

1

∪ O is a deductive

conservative extension of O. According to proposition 4, it is suﬃcient to show that {

1

∪O

is a model conservative extension of O; that is, for every model 1 of O there exists a model

. of {

1

∪ O such that 1[

S

= .[

S

for S = Sig(O).

281

Cuenca Grau, Horrocks, Kazakov, & Sattler

The required model . can be constructed from 1 as follows: take . to be identi-

cal to 1 except for the interpretations of the atomic concepts Genetic Disorder Project,

Cystic Fibrosis EUProject, Project, EUProject and the atomic role has Focus, all of which

we interpret in . as the empty set. It is easy to check that all the axioms P1–P4, E1 are

satisﬁed in .and hence . [= {

1

. Moreover, since the interpretation of the symbols in O

remains unchanged, we have 1[

Sig(O)

= .[

Sig(O)

and . [= O. Hence, {

1

∪ O is a model

conservative extension of O.

For an example of Statement 2 of the Proposition, we refer the interested reader to the

literature (Lutz et al., 2007, p. 455). ♦

3.3 Safety of an Ontology for a Signature

So far, in our ontology reuse scenario we have assumed that the reused ontology O is ﬁxed

and the axioms of O are just copied into { during the import. In practice, however, it

is often convenient to keep O separate from { and make its axioms available on demand

via a reference. This makes it possible to continue developing { and O independently. For

example, the ontology engineers of the project ontology { may not be willing to depend

on a particular version of O, or may even decide at a later time to reuse the medical terms

(Cystic Fibrosis and Genetic Disorder) from another medical ontology instead. Therefore, for

many application scenarios it is important to develop a stronger safety condition for {

which depends as little as possible on the particular ontology O to be reused. In order to

formulate such condition, we abstract from the particular ontology O to be imported and

focus instead on the symbols from O that are to be reused:

Deﬁnition 6 (Safety for a Signature). Let O be a L-ontology and S a signature over L.

We say that O is safe for S w.r.t. L, if for every L-ontology O

t

with Sig(O) ∩ Sig(O

t

) ⊆ S,

we have that O is safe for O

t

w.r.t. L; that is, O∪O

t

is a deductive conservative extension

of O

t

w.r.t. L. ♦

Intuitively, in our knowledge reuse scenario, an ontology O is safe for a signature S w.r.t.

a language L if and only if it imports in a safe way any ontology O

t

written in L that shares

only symbols from S with O. The associated reasoning problem is then formulated in the

following way:

T2. given an L-ontology O and a signature S over L,

determine if O is safe for S w.r.t. L.

As seen in Section 3.2, the ontology { consisting of axioms P1–P4, E1, E2 from Figure 1,

does not import O consisting of axioms M1–M5 from Figure 1 in a safe way for L = /L(.

According to Deﬁnition 6, since Sig({) ∩ Sig(O) ⊆ S = ¦Cystic Fibrosis, Genetic Disorder¦,

the ontology { is not safe for S w.r.t. L.

In fact, it is possible to show a stronger result, namely, that any ontology O containing

axiom E2 is not safe for S = ¦Cystic Fibrosis, Genetic Disorder¦ w.r.t. L = /L(. Consider an

ontology O

t

= ¦β

1

, β

2

¦, where β

1

= (· _ Cystic Fibrosis) and β

2

= (Genetic Disorder _ ⊥).

Since E2 is equivalent to axiom (6), it is easy to see that O∪O

t

is inconsistent. Indeed E2,

β

1

and β

2

imply the contradiction α = (· _ ⊥), which is not entailed by O

t

. Hence, O∪O

t

is not a deductive conservative extension of O

t

. By Deﬁnition 6, since Sig(O) ∩Sig(O

t

) ⊆ S,

this means that O is not safe for S.

282

Modular Reuse of Ontologies: Theory and Practice

It is clear how one could prove that an ontology O is not safe for a signature S: simply ﬁnd

an ontology O

t

with Sig(O) ∩Sig(O

t

) ⊆ S, such that O∪O

t

is not a deductive conservative

extension of O

t

. It is not so clear, however, how one could prove that O is safe for S. It

turns out that the notion of model conservative extensions can also be used for this purpose.

The following lemma introduces a property which relates the notion of model conservative

extension with the notion of safety for a signature. Intuitively, it says that the notion of

model conservative extension is stable under expansion with new axioms provided they

share only symbols from S with the original ontologies.

Lemma 7 Let O, O

1

⊆ O, and O

t

be L-ontologies and S a signature over L such that

O is a model S-conservative extension of O

1

and Sig(O) ∩ Sig(O

t

) ⊆ S. Then O ∪ O

t

is a

model S

t

-conservative extension of O

1

∪ O

t

for S

t

= S ∪ Sig(O

t

).

Proof. In order to show that O∪O

t

is a model S

t

-conservative extension of O

1

∪O

t

according

to Deﬁnition 3, let 1 be a model of O

1

∪ O

t

. We just construct a model . of O ∪ O

t

such

that 1[

S

= .[

S

. ()

Since O is a model S-conservative extension of O

1

, and 1 is a model of O

1

, by Deﬁnition 3

there exists a model .

1

of O such that 1[

S

= .

1

[

S

. Let . be an interpretation such

that .[

Sig(C)

= .

1

[

Sig(C)

and .[

S

= 1[

S

. Since Sig(O) ∩ S

t

= Sig(O) ∩ (S ∪ Sig(O

t

)) ⊆

S ∪ (Sig(O) ∩ Sig(O

t

)) ⊆ S and 1[

S

= .

1

[

S

, such interpretation . always exists. Since

.[

Sig(C)

= .

1

[

Sig(C)

and .

1

[= O, we have . [= O; since .[

S

= 1[

S

, Sig(O

t

) ⊆ S

t

, and

1 [= O

t

, we have . [= O

t

. Hence . [= O ∪ O

t

and 1[

S

= .[

S

, which proves ().

Lemma 7 allows us to identify a condition suﬃcient to ensure the safety of an ontology

for a signature:

Proposition 8 (Safety for a Signature vs. Model Conservative Extensions)

Let O be an L-ontology and S a signature over L such that O is a model S-conservative

extension of the empty ontology O

1

= ∅; that is, for every interpretation 1 there exists a

model . of O such that .[

S

= 1[

S

. Then O is safe for S w.r.t. L.

Proof. In order to prove that O is safe for S w.r.t. L according to Deﬁnition 6, take any

oHO1O ontology O

t

such that Sig(O) ∩Sig(O

t

) ⊆ S. We need to demonstrate that O∪O

t

is a deductive conservative extension of O

t

w.r.t. L. ()

Indeed, by Lemma 7, since O is a model S-conservative extension of O

1

= ∅, and

Sig(O)∩Sig(O

t

) ⊆ S, we have that O∪O

t

is a model S

t

-conservative extension of O

1

∪O

t

= O

t

for S

t

= S ∪ Sig(O

t

). In particular, since Sig(O

t

) ⊆ S

t

, we have that O ∪ O

t

is a deductive

conservative extension of O

t

, as was required to prove ().

Example 9 Let {

1

be the ontology consisting of axioms P1–P4, and E1 from Figure 1.

We show that {

1

is safe for S = ¦Cystic Fibrosis, Genetic Disorder¦ w.r.t. L = oHO1O. By

Proposition 8, in order to prove safety for {

1

it is suﬃcient to demonstrate that {

1

is a

model S-conservative extension of the empty ontology, that is, for every S-interpretation 1

there exists a model . of {

1

such that 1[

S

= .[

S

.

Consider the model . obtained from 1 as in Example 5. As shown in Example 5, . is

a model of {

1

and 1[

Sig(O)

= .[

Sig(O)

where O consists of axioms M1–M5 from Figure 1.

In particular, since S ⊆ Sig(O), we have 1[

S

= .[

S

. ♦

283

Cuenca Grau, Horrocks, Kazakov, & Sattler

3.4 Extraction of Modules from Ontologies

In our example from Figure 1 the medical ontology O is very small. Well established medical

ontologies, however, can be very large and may describe subject matters in which the de-

signer of { is not interested. For example, the medical ontology O could contain information

about genes, anatomy, surgical techniques, etc.

Even if { imports O without changing the meaning of the reused symbols, processing—

that is, browsing, reasoning over, etc—the resulting ontology { ∪ O may be considerably

harder than processing { alone. Ideally, one would like to extract a (hopefully small) frag-

ment O

1

of the external medical ontology—a module—that describes just the concepts that

are reused in {.

Intuitively, when answering an arbitrary query over the signature of {, importing the

module O

1

should give exactly the same answers as if the whole ontology O had been

imported.

Deﬁnition 10 (Module for an Ontology). Let O, O

t

and O

t

1

⊆ O

t

be L-ontologies.

We say that O

t

1

is a module for O in O

t

w.r.t. L, if O ∪ O

t

is a deductive S-conservative

extension of O ∪ O

t

1

for S = Sig(O) w.r.t. L. ♦

The task of extracting modules from imported ontologies in our ontology reuse scenario

can be thus formulated as follows:

T3. given L-ontologies O, O

t

,

compute a module O

t

1

for O in O

t

w.r.t. L.

Example 11 Consider the ontology {

1

consisting of axioms P1–P4, E1 and the ontology O

consisting of axioms M1–M5 from Figure 1. Recall that the axiom α from (1) is a conse-

quence of axioms M1, M2 and M4 as well as of axioms M1, M3 and M4 from ontology O.

In fact, these sets of axioms are actually minimal subsets of O that imply α. In particular,

for the subset O

0

of O consisting of axioms M2, M3, M4 and M5, we have O

0

[= α. It can

be demonstrated that {

1

∪ O

0

is a deductive conservative extension of O

0

. In particular

{

1

∪ O

0

[= α. But then, according to Deﬁnition 10, O

0

is not a module for {

1

in O w.r.t.

L = /L( or its extensions, since {

1

∪ O is not an deductive S-conservative extension of

{

1

∪O

0

w.r.t. L = /L( for S = Sig({

1

). Indeed, {

1

∪O [= α, Sig(α) ⊆ S but {

1

∪O

0

[= α.

Similarly, one can show that any subset of O that does not imply α is not a module in O

w.r.t. {

1

.

On the other hand, it is possible to show that both subsets O

1

= ¦M1, M2, M4¦ and

O

2

= ¦M1, M3, M4¦ of O are modules for {

1

in O w.r.t. L = oHO1O. To do so, Deﬁ-

nition 10, we need to demonstrate that {

1

∪ O is a deductive S-conservative extension of

both {

1

∪ O

1

and {

1

∪ O

2

for S = Sig({

1

) w.r.t. L. As usual, we demonstrate a stronger

fact, that {

1

∪O is a model S-conservative extension of {

1

∪O

1

and of {

1

∪O

2

for S which

is suﬃcient by Claim 1 of Proposition 4.

In order to show that {

1

∪ O is a model S-conservative extension of {

1

∪ O

1

for S =

Sig({

1

), consider any model 1 of {

1

∪ O

1

. We need to construct a model . of {

1

∪ O

such that 1[

S

= .[

S

. Let . be deﬁned exactly as 1 except that the interpretations of the

atomic concepts Fibrosis, Pancreas, Genetic Fibrosis, and Genetic Origin are deﬁned as the

interpretation of Cystic Fibrosis in 1, and the interpretations of atomic roles located In and

284

Modular Reuse of Ontologies: Theory and Practice

has Origin are deﬁned as the identity relation. It is easy to see that axioms M1–M3 and M5

are satisﬁed in .. Since we do not modify the interpretation of the symbols in {

1

, . also

satisﬁes all axioms from {

1

. Moreover, . is a model of M4, because Genetic Fibrosis and

Genetic Disorder are interpreted in . like Cystic Fibrosis and Genetic Disorder in 1, and 1 is

a model of O

1

, which implies the concept inclusion α = (Cystic Fibrosis _ Genetic Disorder).

Hence we have constructed a model . of {

1

∪ O such that 1[

S

= .[

S

, thus {

1

∪ O is a

model S-conservative extension of {

1

∪ O

1

.

In fact, the construction above works if we replace O

1

with any subset of O that implies

α. In particular, {

1

∪O is also a model S-conservative extension of {

1

∪O

2

. In this way, we

have demonstrated that the modules for { in O are exactly those subsets of O that imply

α. ♦

An algorithm implementing the task T3 can be used for extracting a module from an

ontology O imported into { prior to performing reasoning over the terms in {. However,

when the ontology { is modiﬁed, the module has to be extracted again since a module O

1

for { in O might not necessarily be a module for the modiﬁed ontology. Since the extraction

of modules is potentially an expensive operation, it would be more convenient to extract a

module only once and reuse it for any version of the ontology { that reuses the speciﬁed

symbols from O. This idea motivates the following deﬁnition:

Deﬁnition 12 (Module for a Signature). Let O

t

and O

t

1

⊆ O

t

be L-ontologies and S

a signature over L. We say that O

t

1

is a module for S in O

t

(or an S-module in O

t

) w.r.t.

L, if for every L-ontology O with Sig(O) ∩Sig(O

t

) ⊆ S, we have that O

t

1

is a module for O

in O

t

w.r.t. L. ♦

Intuitively, the notion of a module for a signature is a uniform analog of the notion of a

module for an ontology, in a similar way as the notion of safety for a signature is a uniform

analog of safety for an ontology. The reasoning task corresponding to Deﬁnition 12 can be

formulated as follows:

T4. given a L-ontology O

t

and a signature S over L,

compute a module O

t

1

for S in O

t

.

Continuing Example 11, it is possible to demonstrate that any subset of O that implies

axiom α, is in fact a module for S = ¦Cystic Fibrosis, Genetic Disorder¦ in O, that is, it can

be imported instead of O into every ontology O that shares with O only symbols from S. In

order to prove this, we use the following suﬃcient condition based on the notion of model

conservative extension:

Proposition 13 (Modules for a Signature vs. Model Conservative Extensions)

Let O

t

and O

t

1

⊆ O

t

be L-ontologies and S a signature over L such that O

t

is a model

S-conservative extension of O

t

1

. Then O

t

1

is a module for S in O

t

w.r.t. L.

Proof. In order to prove that O

t

1

is a module for S in O

t

w.r.t. L according to Deﬁnition 12,

take any oHO1O ontology O such that Sig(O) ∩ Sig(O

t

) ⊆ S. We need to demonstrate

that O

t

1

is a module for O in O

t

w.r.t. L, that is, according to Deﬁnition 10, O ∪ O

t

is a

deductive S

t

-conservative extension of O ∪ O

t

1

w.r.t. L for S

t

= Sig(O). ()

285

Cuenca Grau, Horrocks, Kazakov, & Sattler

Indeed, by Lemma 7, since O

t

is a model S-conservative extension of O

t

1

, and Sig(O

t

) ∩

Sig(O) ⊆ S, we have that O

t

∪ O is a model S

tt

-conservative extension of O

t

1

∪ O for

S

tt

= S ∪ Sig(O). In particular, since S

t

= Sig(O) ⊆ S

tt

, we have that O

t

∪ O is a deductive

S

t

-conservative extension of O

t

1

∪ O w.r.t. L, as was required to prove ().

Example 14 Let O and α be as in Example 11. We demonstrate that any subset O

1

of O

which implies α is a module for S = ¦Cystic Fibrosis, Genetic Disorder¦ in O. According to

Proposition 13, it is suﬃcient to demonstrate that O is a model S-conservative extension of

O

1

, that is, for every model 1 of O

1

there exists a model . of O such that 1[

S

= .[

S

. It is

easy to see that if the model . is constructed from 1 as in Example 11, then the required

property holds. ♦

Note that a module for a signature S in Odoes not necessarily contain all the axioms that

contain symbols from S. For example, the module O

1

consisting of the axiom M1, M2 and

M4 from O does not contain axiom M5 which mentions the atomic concept Cystic Fibrosis

from S. Also note that even in a minimal module like O

1

there might still be some axioms

like M2 that do not mention symbols from S at all.

3.5 Minimal Modules and Essential Axioms

One is usually not interested in extracting arbitrary modules from a reused ontology, but

in extracting modules that are easy to process afterwards. Ideally, the extracted modules

should be as small as possible. Hence it is reasonable to consider the problem of extracting

minimal modules; that is, modules that contain no other module as a subset.

Examples 11 and 14 demonstrate that a minimal module for an ontology or a signature

is not necessarily unique: the ontology O consisting of axioms M1–M5 has two minimal mo-

dules O

1

= ¦M1, M2, M4¦, and O

2

= ¦M1, M3, M4¦, for the ontology {

1

= ¦P1, P2, P3, E1¦

as well as for the signature S = ¦Cystic Fibrosis, Genetic Disorder¦, since these are the min-

imal sets of axioms that imply axiom α = (Cystic Fibrosis _ Genetic Disorder). Depending

on the application scenario, one can consider several variations of tasks T3 and T4 for com-

puting minimal modules. In some applications it might be necessary to extract all minimal

modules, whereas in others any minimal module suﬃces.

Axioms that do not occur in a minimal module in O are not essential for { because

they can always be removed from every module of O, thus they never need not be imported

into {. This is not true for the axioms that occur in minimal modules of O. It might be

necessary to import such axioms into { in order not to lose essential information from O.

These arguments motivate the following notion:

Deﬁnition 15 (Essential Axiom). Let O and O

t

be L-ontologies, S a signature and α

an axiom over L. We say that α is essential for O in O

t

w.r.t. L if α is contained in any

minimal module in O

t

for O w.r.t. L. We say that α is an essential axiom for S in O

t

w.r.t.

L (or S-essential in O

t

) if α is contained in some minimal module for S in O

t

w.r.t. L. ♦

In our example above the axioms M1–M4 from O are essential for the ontology {

1

and

for the signature S = ¦Cystic Fibrosis, Genetic Disorder¦, but the axiom M5 is not essential.

In certain situations one might be interested in computing the set of essential axioms of

an ontology, which can be done by computing the union of all minimal modules. Note that

286

Modular Reuse of Ontologies: Theory and Practice

Notation Input Task

Checking Safety:

T1 O, O

t

, L Check if O is safe for O

t

w.r.t. L

T2 O, S, L Check if O is safe for S w.r.t. L

Extracting of [all / some / union of] [minimal] module(s):

T3[a,s,u][m] O, O

t

, L Extract modules in O

t

w.r.t. O and L

T4[a,s,u][m] O

t

, S, L Extract modules for S in O

t

w.r.t. L

where O, O

t

are ontologies and S a signature over L

Table 2: Summary of reasoning tasks relevant for ontology integration and reuse

computing the union of minimal modules might be easier than computing all the minimal

modules since one does not need to identify which axiom belongs to which minimal module.

In Table 2 we have summarized the reasoning tasks we found to be potentially relevant

for ontology reuse scenarios and have included the variants T3am, T3sm, and T3um of the

task T3 and T4am, T4sm, and T4um of the task T4 for computation of minimal modules

discussed in this section.

Further variants of the tasks T3 and T4 could be considered relevant to ontology reuse.

For example, instead of computing minimal modules, one might be interested in computing

modules with the smallest number of axioms, or modules of the smallest size measured in

the number of symbols, or in any other complexity measure of the ontology. The theoretical

results that we will present in this paper can easily be extended to many such reasoning

tasks.

3.6 Safety and Modules for General Ontology Languages

All the notions introduced in Section 3 are deﬁned with respect to an “ontology language”.

So far, however, we have implicitly assumed that the ontology languages are the description

logics deﬁned in Section 2—that is, the fragments of the DL oHO1O. The notions consid-

ered in Section 3 can be applied, however, to a much broader class of ontology languages.

Our deﬁnitions apply to any ontology language with a notion of entailment of axioms from

ontologies, and a mechanism for identifying their signatures.

Deﬁnition 16. An ontology language is a tuple L = (Sg, Ax, Sig, [=), where Sg is a set

of signature elements (or vocabulary) of L, Ax is a set of axioms in L, Sig is a function

that assigns to every axiom α ∈ Ax a ﬁnite set Sig(α) ⊆ Sg called the signature of α, and

[= is the entailment relation between sets of axioms O ⊆ Ax and axioms α ∈ Ax, written

O [= α. An ontology over L is a ﬁnite set of axioms O ⊆ Ax. We extend the function Sig

to ontologies O as follows: Sig(O) :=

α∈C

Sig(α). ♦

Deﬁnition 16 provides a very general notion of an ontology language. A language L is

given by a set of symbols (a signature), a set of formulae (axioms) that can be constructed

over those symbols, a function that assigns to each formula its signature, and an entailment

relation between sets of axioms. The ontology language OWL DL as well as all description

287

Cuenca Grau, Horrocks, Kazakov, & Sattler

logics deﬁned in Section 2 are examples of ontology languages in accordance to Deﬁnition 16.

Other examples of ontology languages are First Order Logic, Second Order Logic, and Logic

Programs.

It is easy to see that the notions of deductive conservative extension (Deﬁnition 1), safety

(Deﬁnitions 2 and 6) and modules (Deﬁnitions 10 and 12), as well as all the reasoning tasks

from Table 2, are well-deﬁned for every ontology language L given by Deﬁnition 16. The

deﬁnition of model conservative extension (Deﬁnition 3) and the propositions involving

model conservative extensions (Propositions 4, 8, and 13) can be also extended to other

languages with a standard Tarski model-theoretic semantics, such as Higher Order Logic.

To simplify the presentation, however, we will not formulate general requirements on the

semantics of ontology languages, and assume that we deal with sublanguages of oHO1O

whenever semantics is taken into account.

In the remainder of this section, we establish the relationships between the diﬀerent

notions of safety and modules for arbitrary ontology languages.

Proposition 17 (Safety vs. Modules for an Ontology) Let L be an ontology language,

and let O, O

t

, and O

t

1

⊆ O

t

be ontologies over L. Then:

1. O

t

is safe for O w.r.t. L iﬀ the empty ontology is a module for O in O

t

w.r.t. L.

2. If O

t

` O

t

1

is safe for O ∪ O

t

1

then O

t

1

is a module for O in O

t

w.r.t. L.

Proof. 1. By Deﬁnition 2, O

t

is safe for O w.r.t. L iﬀ (a) O∪O

t

is a deductive conservative

extension of O w.r.t. L. By Deﬁnition 10, the empty ontology O

t

0

= ∅ is a module for O in

O

t

w.r.t. L iﬀ (b) O ∪ O

t

is a deductive S-conservative extension of O ∪ O

t

0

= O w.r.t. L

for S = Sig(O). It is easy to see that (a) is the same as (b).

2. By Deﬁnition 2, O

t

` O

t

1

is safe for O∪O

t

1

w.r.t. L iﬀ (c) O∪O

t

1

∪(O

t

` O

t

1

) = O∪O

t

is a deductive conservative extension of O∪O

t

1

w.r.t. L. In particular, O∪O

t

is a deductive

S-conservative extension of O∪O

t

1

w.r.t. L for S = Sig(O), which implies, by Deﬁnition 10,

that O

t

1

is a module for O in O

t

w.r.t. L.

We also provide the analog of Proposition 17 for the notions of safety and modules for

a signature:

Proposition 18 (Safety vs. Modules for a Signature) Let L be an ontology language,

O

t

and O

t

1

⊆ O

t

, ontologies over L, and S a subset of the signature of L. Then:

1. O

t

is safe for S w.r.t. L iﬀ the empty ontology O

t

0

= ∅ is an S-module in O

t

w.r.t. L.

2. If O

t

` O

t

1

is safe for S ∪ Sig(O

t

1

) w.r.t. L, then O

t

1

is an S-module in O

t

w.r.t. L.

Proof. 1. By Deﬁnition 6, O

t

is safe for S w.r.t. L iﬀ (a) for every O with Sig(O

t

)∩Sig(O) ⊆

S, it is the case that O

t

is safe for O w.r.t. L. By Deﬁnition 12, O

t

0

= ∅ is an S-module

in O

t

w.r.t. L iﬀ (b) for every O with Sig(O

t

) ∩ Sig(O) ⊆ S, it is the case that O

t

0

= ∅ is

a module for O in O

t

w.r.t. L. By Claim 1 of Proposition 17, it is easy to see that (a) is

equivalent to (b).

2. By Deﬁnition 6, O

t

` O

t

1

is safe for S ∪ Sig(O

t

1

) w.r.t. L iﬀ (c) for every O, with

Sig(O

t

` O

t

1

) ∩ Sig(O) ⊆ S ∪ Sig(O

t

1

), we have that O

t

` O

t

1

is safe for O w.r.t. L. By

288

Modular Reuse of Ontologies: Theory and Practice

Deﬁnition 12, O

t

1

is an S-module in O

t

w.r.t. L iﬀ (d) for every O with Sig(O

t

)∩Sig(O) ⊆ S,

we have that O

t

1

is a module for O in O

t

w.r.t. L.

In order to prove that (c) implies (d), let O be such that Sig(O

t

) ∩Sig(O) ⊆ S. We need

to demonstrate that O

t

1

is a module for O in O

t

w.r.t. L. ()

Let

˜

O := O∪O

t

1

. Note that Sig(O

t

` O

t

1

) ∩Sig(

˜

O) = Sig(O

t

` O

t

1

) ∩(Sig(O) ∪Sig(O

t

1

)) ⊆

(Sig(O

t

` O

t

1

) ∩Sig(O)) ∪Sig(O

t

1

) ⊆ S∪Sig(O

t

1

). Hence, by (c) we have that O

t

` O

t

1

is safe

for

˜

O = O ∪ O

t

1

w.r.t. L which implies by Claim 2 of Proposition 17 that O

t

1

is a module

for O in O

t

w.r.t. L ().

4. Undecidability and Complexity Results

In this section we study the computational properties of the tasks in Table 2 for ontology

languages that correspond to fragments of the description logic oHO1O. We demonstrate

that most of these reasoning tasks are algorithmically unsolvable even for relatively inex-

pressive DLs, and are computationally hard for simple DLs.

Since the notions of modules and safety are deﬁned in Section 3 using the notion of

deductive conservative extension, it is reasonable to identify which (un)decidability and

complexity results for conservative extensions are applicable to the reasoning tasks in Ta-

ble 2. The computational properties of conservative extensions have recently been studied

in the context of description logics. Given O

1

⊆ O over a language L, the problem of

deciding whether O is a deductive conservative extension of O

1

w.r.t. L is 2-EXPTIME-

complete for L = /L( (Ghilardi et al., 2006). This result was extended by Lutz et al.

(2007), who showed that the problem is 2-EXPTIME-complete for L = /L(1O and unde-

cidable for L = /L(1OO. Recently, the problem has also been studied for simple DLs; it

has been shown that deciding deductive conservative extensions is EXPTIME-complete for

L = cL(Lutz & Wolter, 2007). These results can be immediately applied to the notions of

safety and modules for an ontology:

Proposition 19 Given ontologies O and O

t

over L, the problem of determining whether

O is safe for O

t

w.r.t. L is EXPTIME-complete for L = cL, 2-EXPTIME-complete for

L = /L( and L = /L(1O, and undecidable for L = /L(1OO. Given ontologies O, O

t

,

and O

t

1

⊆ O

t

over L, the problem of determining whether O

t

1

is a module for O in O

t

is

EXPTIME-complete for L = cL, 2-EXPTIME complete for L = /L( and L = /L(1O,

and undecidable for L = /L(1OO.

Proof. By Deﬁnition 2, an ontology O is safe for O

t

w.r.t. L iﬀ O ∪ O

t

is a deductive

conservative extension of O

t

w.r.t. L. By Deﬁnition 2, an ontology O

t

1

is a module for O in

O

t

w.r.t. L if O∪O

t

is a deductive S-conservative extension of O∪O

t

1

for S = Sig(O) w.r.t.

L. Hence, any algorithm for checking deductive conservative extensions can be reused for

checking safety and modules.

Conversely, we demonstrate that any algorithm for checking safety or modules can be

used for checking deductive conservative extensions. Indeed, O is a deductive conservative

extension of O

1

⊆ O w.r.t. L iﬀ O`O

1

is safe for O

1

w.r.t. L iﬀ, by Claim 1 of Proposition 17,

O

0

= ∅ is a module for O

1

in O ` O

1

w.r.t. L .

289

Cuenca Grau, Horrocks, Kazakov, & Sattler

Corollary 20 There exist algorithms performing tasks T1, and T3[a,s,u]m from Table 2

for L = cL and L = /L(1O that run in EXPTIME and 2-EXPTIME respectively. There

is no algorithm performing tasks T1, or T3[a,s,u]m from Table 2 for L = /L(1OO.

Proof. The task T1 corresponds directly to the problem of checking the safety of an ontology,

as given in Deﬁnition 2.

Suppose that we have a 2-EXPTIME algorithm that, given ontologies O, O

t

and O

t

1

⊆

O

t

, determines whether O

t

1

is a module for O in O

t

w.r.t. L = /L(1O. We demonstrate

that this algorithm can be used to solve the reasoning tasks T3am, T3sm and T3um for

L = /L(1O in 2-EXPTIME. Indeed, given ontologies O and O

t

, one can enumerate all

subsets of O

t

and check in 2-EXPTIME which of these subsets are modules for O in O

t

w.r.t. L. Then we can determine which of these modules are minimal and return all of them,

one of them, or the union of them depending on the reasoning task.

Finally, we prove that solving any of the reasoning tasks T3am, T3sm and T3um is not

easier than checking the safety of an ontology. Indeed, by Claim 1 of Proposition 17, an

ontology O is safe for O

t

w.r.t. L iﬀ O

0

= ∅ is a module for O

t

in O w.r.t. L. Note that

the empty ontology O

0

= ∅ is a module for O

t

in O w.r.t. L iﬀ O

0

= ∅ is the only minimal

module for O

t

in O w.r.t. L.

We have demonstrated that the reasoning tasks T1 and T3[a,s,u]m are computationally

unsolvable for DLs that are as expressive as /L(O1O, and are 2-EXPTIME-hard for /L(.

In the remainder of this section, we focus on the computational properties of the reasoning

tasks T2 and T4[a,s,u]m related to the notions of safety and modules for a signature. We

demonstrate that all of these reasoning tasks are undecidable for DLs that are as expressive

as /L(O.

Theorem 21 (Undecidability of Safety for a Signature) The problem of checking

whether an ontology O consisting of a single /L(-axiom is safe for a signature S is unde-

cidable w.r.t. L = /L(O.

Proof. The proof is a variation of the construction for undecidability of deductive conser-

vative extensions in /L(O1O (Lutz et al., 2007), based on a reduction to a domino tiling

problem.

A domino system is a triple D = (T, H, V ) where T = ¦1, . . . , k¦ is a ﬁnite set of tiles

and H, V ⊆ T T are horizontal and vertical matching relations. A solution for a domino

system D is a mapping t

i,j

that assigns to every pair of integers i, j ≥ 1 an element of T,

such that 't

i,j

, t

i,j+1

` ∈ H and 't

i,j

, t

i+1,j

` ∈ V . A periodic solution for a domino system

D is a solution t

i,j

for which there exist integers m ≥ 1 , n ≥ 1 called periods such that

t

i+m,j

= t

i,j

and t

i,j+n

= t

i,j

for every i, j ≥ 1.

Let T be the set of all domino systems, T

s

be the subset of T that admit a solution and

T

ps

be the subset of T

s

that admit a periodic solution. It is well-known (B¨orger, Gr¨adel,

& Gurevich, 1997, Theorem 3.1.7) that the sets T` T

s

and T

ps

are recursively inseparable,

that is, there is no recursive (i.e. decidable) subset T

t

⊆ T of domino systems such that

T

ps

⊆ T

t

⊆ T

s

.

We use this property in our reduction. For each domino system D, we construct a

signature S = S(D), and an ontology O = O(D) which consists of a single /L(-axiom such

that:

290

Modular Reuse of Ontologies: Theory and Practice

(q

1

) · _ A

1

. . A

k

where T = ¦1, . . . , k¦

(q

2

) A

t

¯ A

t

_ ⊥ 1 ≤ t < t

t

≤ k

(q

3

) A

t

_ ∃r

H

.(

/t,t

)∈H

A

t

) 1 ≤ t ≤ k

(q

4

) A

t

_ ∃r

V

.(

/t,t

)∈V

A

t

) 1 ≤ t ≤ k

Figure 2: An ontology O

tile

= O

tile

(D) expressing tiling conditions for a domino system D

(a) if D does not have a solution then O = O(D) is safe for S = S(D) w.r.t. L = /L(O,

and

(b) if D has a periodic solution then O = O(D) is not safe for S = S(D) w.r.t. L = /L(O.

In other words, for the set T

t

consisting of the domino systems D such that O = O(D)

is not safe for S = S(D) w.r.t. L = /L(O, we have T

ps

⊆ T

t

⊆ T

s

. Since T ` T

s

and T

ps

are recursively inseparable, this implies undecidability for T

t

and hence for the problem of

checking if O is S-safe w.r.t. L = /L(O, because otherwise one can use this problem for

deciding membership in T

t

.

The signature S = S(D), and the ontology O = O(D) are constructed as follows. Given

a domino system D = (T, H, V ), let S consist of fresh atomic concepts A

t

for every t ∈ T and

two atomic roles r

H

and r

V

. Consider an ontology O

tile

in Figure 2 constructed for D. Note

that Sig(O

tile

) = S. The axioms of O

tile

express the tiling conditions for a domino system

D, namely (q

1

) and (q

2

) express that every domain element is assigned with a unique tile

t ∈ T; (q

3

) and (q

4

) express that every domain element has horizontal and vertical matching

successors.

Now let s be an atomic role and B an atomic concept such that s, B / ∈ S. Let O := ¦β¦

where:

β := · _ ∃s.

(C

i

¦D

i

)∈C

tile

(C

i

¯ D

i

) . (∃r

H

.∃r

V

.B ¯ ∃r

V

.∃r

H

.B)

**We say that r
**

H

and r

V

commute in an interpretation 1 = (∆

7

,

7

) if for all domain

elements a, b, c, d

1

and d

2

from ∆

7

such that 'a, b` ∈ r

H

7

, 'b, d

1

` ∈ r

V

7

, 'a, c` ∈ r

V

7

, and

'c, d

2

` ∈ r

H

7

, we have d

1

= d

2

. The following claims can be easily proved:

Claim 1. If O

tile

(D) has a model 1 in which r

H

and r

V

commute, then D has a solution.

Indeed a model 1 = (∆,

7

) of O

tile

(D) can be used to guide the construction of a solution

t

i,j

for D as follows. For every i, j ≥ 1, we construct t

i,j

inductively together with elements

a

i,j

∈ ∆

7

such that 'a

i,j

, a

i,j+1

` ∈ r

V

7

and 'a

i,j

, a

i+1,j

` ∈ r

H

7

. We set a

1,1

to any element

from ∆

7

.

Now suppose a

i,j

with i, j ≥ 1 is constructed. Since 1 is a model of axioms (q

1

) and

(q

2

) from Figure 2, we have a unique A

t

with 1 ≤ t ≤ k such that a

i,j

∈ A

t

7

. Then we set

t

i,j

:= t. Since 1 is a model of axioms (q

3

) and (q

4

) and a

i,j

∈ A

t

7

there exist b, c ∈ ∆

7

and t

t

, t

tt

∈ T such that 'a

i,j

, b` ∈ r

H

7

, 'a

i,j

, c` ∈ r

V

7

, 't, t

t

` ∈ H, 't, t

tt

` ∈ V , b ∈ A

t

7

,

and c ∈ A

t

7

. In this case we assign a

i,j+1

:= b, a

i+1,j

:= c, t

i,j+1

:= t

t

, and t

i+1,j

:= t

tt

.

Note that some values of a

i,j

and t

i,j

can be assigned two times: a

i+1,j+1

and t

i+1,j+1

are

constructed for a

i,j+1

and a

i,j+1

. However, since r

V

and r

H

commute in 1, the value for

291

Cuenca Grau, Horrocks, Kazakov, & Sattler

a

i+1,j+1

is unique, and because of (q

2

), the value for t

i+1,j+1

is unique. It is easy to see that

t

i,j

is a solution for D.

Claim 2. If 1 is a model of O

tile

∪ O, then r

H

and r

V

do not commute in 1.

Indeed, it is easy to see that O

tile

∪ O [= (· _ ∃s.[∃r

H

.∃r

V

.B ¯ ∃r

V

.∃r

H

.B]). Hence, if

1 = (∆

7

,

7

) is a model of O

tile

∪O, then there exist a, b, c, d

1

and d

2

such that 'x, a` ∈ s

7

for every x ∈ ∆

7

, 'a, b` ∈ r

H

7

, 'b, d

1

` ∈ r

V

7

, d

1

∈ B

7

, 'a, c` ∈ r

V

7

, 'c, d

2

` ∈ r

H

7

, and

d

2

∈ (B)

7

. This implies that d

1

= d

2

, and so, r

h

and r

V

do not commute in 1.

Finally, we demonstrate that O = O(D) satisﬁes properties (a) and (b).

In order to prove property (a) we use the suﬃcient condition for safety given in Propo-

sition 8 and demonstrate that if D has no solution then for every interpretation 1 there

exists a model . of O such that .[

S

= 1[

S

. By Proposition 8, this will imply that O is safe

for S w.r.t. L.

Let 1 be an arbitrary interpretation. Since D has no solution, then by the contra-positive

of Claim 1 either (1) 1 is not a model of O

tile

, or (2) r

H

and r

V

do not commute in 1. We

demonstrate for both of these cases how to construct the required model . of O such that

.[

S

= 1[

S

.

Case (1). If 1 = (∆

7

,

7

) is not a model of O

tile

then there exists an axiom (C

i

_ D

i

) ∈

O

tile

such that 1 [= (C

i

_ D

i

). That is, there exists a domain element a ∈ ∆

7

such that

a ∈ C

7

i

but a ∈ D

7

i

. Let us deﬁne . to be identical to 1 except for the interpretation of the

atomic role s which we deﬁne in . as s

.

= ¦'x, a` [ x ∈ ∆¦. Since the interpretations of

the symbols in S have remained unchanged, we have a ∈ C

.

i

, a ∈ D

.

i

, and so . [= (· _

∃s.[C

i

¯D

j

]). This implies that . [= β, and so, we have constructed a model . of O such

that .[

S

= 1[

S

.

Case (2). Suppose that r

H

and r

V

do not commute in 1 = (∆

7

,

7

). This means that

there exist domain elements a, b, c, d

1

and d

2

from ∆

7

with 'a, b` ∈ r

H

7

, 'b, d

1

` ∈ r

V

7

,

'a, c` ∈ r

V

7

, and 'c, d

2

` ∈ r

H

7

, such that d

1

= d

2

. Let us deﬁne . to be identical to 1 except

for the interpretation of the atomic role s and the atomic concept B. We interpret s in . as

s

.

= ¦'x, a` [ x ∈ ∆¦. We interpret B in . as B

.

= ¦d

1

¦. Note that a ∈ (∃r

H

.∃r

V

.B)

.

and

a ∈ (∃r

V

.∃r

H

.B)

.

since d

1

= d

2

. So, we have . [= (· _ ∃s.[∃r

H

.∃r

V

.B ¯ ∃r

V

.∃r

H

.B])

which implies that . [= β, and thus, we have constructed a model . of O such that

.[

S

= 1[

S

.

In order to prove property (b), assume that D has a periodic solution t

i,j

with the

periods m, n ≥ 1. We demonstrate that O is not S-safe w.r.t. L. For this purpose we

construct an /L(O-ontology O

t

with Sig(O) ∩ Sig(O

t

) ⊆ S such that O ∪ O

t

[= (· _ ⊥),

but O

t

[= (· _ ⊥). This will imply that O is not safe for O

t

w.r.t. L = /L(O, and, hence,

is not safe for S w.r.t. L = /L(O.

We deﬁne O

t

such that every model of O

t

is a ﬁnite encoding of the periodic solution t

i,j

with the periods m and n. For every pair (i, j) with 1 ≤ i ≤ m and 1 ≤ j ≤ n we introduce

a fresh individual a

i,j

and deﬁne O

t

to be an extension of O

tile

with the following axioms:

(p

1

) ¦a

i

1

,j

¦ _ ∃r

V

.¦a

i

2

,j

¦ (p

2

) ¦a

i

1

,j

¦ _ ∀r

V

.¦a

i

2

,j

¦, i

2

= i

1

+ 1 mod m

(p

3

) ¦a

i,j

1

¦ _ ∃r

H

.¦a

i,j

2

¦ (p

4

) ¦a

i,j

1

¦ _ ∀r

H

.¦a

i,j

2

¦, j

2

= j

1

+ 1 mod n

(p

5

) · _

1≤i≤m, 1≤j≤n

¦a

i,j

¦

292

Modular Reuse of Ontologies: Theory and Practice

The purpose of axioms (p

1

)–(p

5

) is to ensure that r

H

and r

V

commute in every model of

O

t

. It is easy to see that O

t

has a model corresponding to every periodic solution for D with

periods m and n. Hence O

t

[= (· _ ⊥). On the other hand, by Claim 2, since O

t

contains

O

tile

, then in every model of O

t

∪ O, r

H

and r

V

do not commute. This is only possible if

O

t

∪ O have no models, so O

t

∪ O [= (· _ ⊥).

A direct consequence of Theorem 21 and Proposition 18 is the undecidability of the

problem of checking whether a subset of an ontology is a module for a signature:

Corollary 22 Given a signature S and /L(-ontologies O

t

and O

t

1

⊆ O

t

, the problem of

determining whether O

t

1

is an S-module in O

t

w.r.t. L = /L(O is undecidable.

Proof. By Claim 1 of Proposition 18, O is S-safe w.r.t. L if O

0

= ∅ is an S-module in O

w.r.t. L. Hence any algorithm for recognizing modules for a signature in L can be used for

checking if an ontology is safe for a signature in L.

Corollary 23 There is no algorithm that can perform tasks T2, or T4[a,s,u]m for L =

/L(O.

Proof. Theorem 21 directly implies that there is no algorithm for task T2, since this task

corresponds to the problem of checking safety for a signature.

Solving any of the reasoning tasks T4am, T4sm, or T4um for L is at least as hard as

checking the safety of an ontology, since, by Claim 1 of Proposition 18, an ontology O is

S-safe w.r.t. L iﬀ O

0

= ∅ is (the only minimal) S-module in O w.r.t. L.

5. Suﬃcient Conditions for Safety

Theorem 21 establishes the undecidability of checking whether an ontology expressed in

OWL DL is safe w.r.t. a signature. This undecidability result is discouraging and leaves

us with two alternatives: First, we could focus on simple DLs for which this problem is

decidable. Alternatively, we could look for suﬃcient conditions for the notion of safety—

that is, if an ontology satisﬁes our conditions, then we can guarantee that it is safe; the

converse, however, does not necessarily hold.

The remainder of this paper focuses on the latter approach. Before we go any further,

however, it is worth noting that Theorem 21 still leaves room for investigating the former

approach. Indeed, safety may still be decidable for weaker description logics, such as cL,

or even for very expressive logics such as oH1O. In the case of oH1O, however, existing

results (Lutz et al., 2007) strongly indicate that checking safety is likely to be exponentially

harder than reasoning and practical algorithms may be hard to design. This said, in what

follows we will focus on deﬁning suﬃcient conditions for safety that we can use in practice

and restrict ourselves to OWL DL—that is, oHO1O—ontologies.

5.1 Safety Classes

In general, any suﬃcient condition for safety can be deﬁned by giving, for each signature

S, the set of ontologies over a language that satisfy the condition for that signature. These

ontologies are then guaranteed to be safe for the signature under consideration. These

intuitions lead to the notion of a safety class.

293

Cuenca Grau, Horrocks, Kazakov, & Sattler

Deﬁnition 24 (Class of Ontologies, Safety Class). A class of ontologies for a language

L is a function O() that assigns to every subset S of the signature of L, a subset O(S)

of ontologies in L. A class O() is anti-monotonic if S

1

⊆ S

2

implies O(S

2

) ⊆ O(S

1

); it is

compact when O ∈ O(S ∩ Sig(O)) for each O ∈ O(S); and it is subset-closed if O

1

⊆ O

2

and O

2

∈ O(S) implies O

1

∈ O(S); it is union-closed if O

1

∈ O(S) and O

2

∈ O(S) implies

(O

1

∪ O

2

) ∈ O(S).

A safety class (also called a suﬃcient condition to safety) for an ontology language L

is a class of ontologies O() for L such that for each S it is the case that (i) ∅ ∈ O(S), and

(ii) each ontology O ∈ O(S) is S-safe for L. ♦

Intuitively, a class of ontologies is a collection of sets of ontologies parameterized by a

signature. A safety class represents a suﬃcient condition for safety: each ontology in O(S)

should be safe for S. Also, w.l.o.g., we assume that the the empty ontology ∅ belongs to

every safety class for every signature. In what follows, whenever an ontology O belongs to

a safety class for a given signature and the safety class is clear from the context, we will

sometimes say that O passes the safety test for S.

Safety classes may admit many natural properties, as given in Deﬁnition 24. Anti-

monotonicity intuitively means that if an ontology O can be proved to be safe w.r.t. S

using the suﬃcient condition, then O can be proved to be safe w.r.t. every subset of S.

Compactness means that it is suﬃcient to consider only common elements of Sig(O) and S

for checking safety. Subset-closure (union closure) means that if O (O

1

and O

2

) satisfy the

suﬃcient condition for safety, then every subset of O (the union of O

1

and O

2

) also satisﬁes

this condition.

5.2 Locality

In this section we introduce a family of safety classes for L = oHO1O that is based on the

semantic properties underlying the notion of model conservative extensions. In Section 3,

we have seen that, according to Proposition 8, one way to prove that O is S-safe is to show

that O is a model S-conservative extension of the empty ontology.

The following deﬁnition formalizes the classes of ontologies, called local ontologies, for

which safety can be proved using Proposition 8.

Deﬁnition 25 (Class of Interpretations, Locality). Given a oHO1O signature S,

we say that a set of interpretations I is local w.r.t. S if for every oHO1O-interpretation 1

there exists an interpretation . ∈ I such that 1[

S

= .[

S

.

A class of interpretations is a function I() that given a oHO1Osignature S returns a set

of interpretations I(S); it is local if I(S) is local w.r.t. S for every S; it is monotonic if S

1

⊆ S

2

implies I(S

1

) ⊆ I(S

2

); it is compact if for every S

1

, S

2

and S such that (S

1

S

2

) ∩ S = ∅

we have that I(S

1

)[

S

= I(S

2

)[

S

, where S

1

S

2

is the symmetric diﬀerence of sets S

1

and

S

2

deﬁned by S

1

S

2

:= S

1

` S

2

∪ S

2

` S

1

.

Given a class of interpretations I(), we say that O() is the class of ontologies O() based

on I() if for every S, O(S) is the set of ontologies that are valid in I(S); if I() is local then

we say that O() is a class of local ontologies, and for every S and O ∈ O(S) and every

α ∈ O, we say that O and α are local (based on I()). ♦

294

Modular Reuse of Ontologies: Theory and Practice

Example 26 Let I

r←∅

A←∅

() be a class of oHO1O interpretations deﬁned as follows. Given a

signature S, the set I

r←∅

A←∅

(S) consists of interpretations . such that r

.

= ∅ for every atomic

role r / ∈ S and A

.

= ∅ for every atomic concept A / ∈ S. It is easy to show that I

r←∅

A←∅

(S)

is local for every S, since for every interpretation 1 = (∆

7

,

7

) and the interpretation

. = (∆

.

,

.

) deﬁned by ∆

.

:= ∆

7

, r

.

= ∅ for r / ∈ S, A

.

= ∅ for A / ∈ S, and X

.

:= X

7

for the remaining symbols X, then . ∈ I

r←∅

A←∅

(S) and 1[

S

= .[

S

. Since I

r←∅

A←∅

(S

1

) ⊆ I

r←∅

A←∅

(S

2

)

for every S

1

⊆ S

2

, it is the case that I

r←∅

A←∅

() is monotonic; I

r←∅

A←∅

() is also compact, since for

every S

1

and S

2

the sets of interpretations I

r←∅

A←∅

(S

1

) and I

r←∅

A←∅

(S

2

) are deﬁned diﬀerently

only for elements in S

1

S

2

.

Given a signature S, the set Ax

r←∅

A←∅

(S) of axioms that are local w.r.t. S based on I

r←∅

A←∅

(S)

consists of all axioms α such for every . ∈ I

r←∅

A←∅

(S), it is the case that . [= α. Then the

class of local ontologies based on I

r←∅

A←∅

() is deﬁned by O ∈ O

r←∅

A←∅

(S) iﬀ O ⊆ Ax

r←∅

A←∅

(S).

♦

Proposition 27 (Locality Implies Safety) Let O() be a class of ontologies for oHO1O

based on a local class of interpretations I(). Then O() is a subset-closed and union-closed

safety class for L = oHO1O. Additionally, if I() is monotonic, then O() is anti-monotonic,

and if I() is compact then O() is also compact.

Proof. Assume that O() is a class of ontologies based on I(). Then by Deﬁnition 25 for

every oHO1O signature S, we have O ∈ O(S) iﬀ O is valid in I(S) iﬀ . [= O for every

interpretation . ∈ I(S). Since I() is a local class of interpretations, we have that for

every oHO1O-interpretation 1 there exists . ∈ I(S) such that .[

S

= 1[

S

. Hence for

every O ∈ I(S) and every oHO1O interpretation 1 there is a model . ∈ I(S) such that

.[

S

= 1[

S

, which implies by Proposition 8 that O is safe for S w.r.t. L = oHO1O. Thus

O() is a safety class.

The fact that O() is subset-closed and union-closed follows directly from Deﬁnition 25

since (O

1

∪ O

2

) ∈ O(S) iﬀ (O

1

∪ O

2

) is valid in I(S) iﬀ O

1

and O

2

are valid in I(S) iﬀ

O

1

∈ O(S) and O

2

∈ O(S). If I() is monotonic then I(S

1

) ⊆ I(S

2

) for every S

1

⊆ S

2

, and

so O ∈ O(S

2

) implies that O is valid in I(S

2

) which implies that O is valid in I(S

1

) which

implies that O ∈ O(S

1

). Hence O() is anti-monotonic.

If I() is compact then for every S

1

, S

2

and S such that (S

1

S

2

) ∩ S = ∅ we have

that I(S

1

)[

S

= I(S

2

)[

S

, hence for every O with Sig(O) ⊆ S we have that O is valid in

I(S

1

) iﬀ O is valid in I(S

2

), and so, O ∈ O(S

1

) iﬀ O ∈ O(S

2

). In particular, O ∈ O(S) iﬀ

O ∈ O(S ∩ Sig(O)) since (S (S ∩ Sig(O))) ∩ Sig(O) = (S ` Sig(O)) ∩ Sig(O) = ∅. Hence,

O() is compact.

Corollary 28 The class of ontologies O

r←∅

A←∅

(S) deﬁned in Example 26 is an anti-monotonic

compact subset-closed and union-closed safety class.

Example 29 Recall that in Example 5 from Section 3, we demonstrated that the ontology

{

1

∪ O given in Figure 1 with {

1

= ¦P1, . . . , P4, E1¦ is a deductive conservative extension

of O for S = ¦Cystic Fibrosis, Genetic Disorder¦. This has been done by showing that every

S-interpretation 1 can be expanded to a model . of axioms P1–P4, E1 by interpreting

the symbols in Sig({

1

) ` S as the empty set. In terms of Example 26 this means that

295

Cuenca Grau, Horrocks, Kazakov, & Sattler

{

1

∈ O

r←∅

A←∅

(S). Since O

r←∅

A←∅

() is a class of local ontologies, by Proposition 27, the ontology

{

1

is safe for S w.r.t. L = oHO1O. ♦

Proposition 27 and Example 29 suggest a particular way of proving the safety of on-

tologies. Given a oHO1O ontology O and a signature S it is suﬃcient to check whether

O ∈ O

r←∅

A←∅

(S); that is, whether every axiom α in O is satisﬁed by every interpretation from

I

r←∅

A←∅

(S). If this property holds, then O must be safe for S according to Proposition 27.

It turns out that this notion provides a powerful suﬃciency test for safety which works

surprisingly well for many real-world ontologies, as will be shown in Section 8. In the next

section we discuss how to perform this test in practice.

5.3 Testing Locality

In this section, we focus in more detail on the safety class O

r←∅

A←∅

(), introduced in Exam-

ple 26. When ambiguity does not arise, we refer to this safety class simply as locality.

2

From the deﬁnition of Ax

r←∅

A←∅

(S) given in Example 26 it is easy to see that an axiom α is

local w.r.t. S (based on I

r←∅

A←∅

(S)) if α is satisﬁed in every interpretation that ﬁxes the inter-

pretation of all atomic roles and concepts outside S to the empty set. Note that for deﬁning

locality we do not ﬁx the interpretation of the individuals outside S, but in principle, this

could be done. The reason is that there is no elegant way to describe such interpretations.

Namely, every individual needs to be interpreted as an element of the domain, and there is

no “canonical” element of every domain to choose.

In order to test the locality of α w.r.t. S, it is suﬃcient to interpret every atomic concept

and atomic role not in S as the empty set and then check if α is satisﬁed in all interpretations

of the remaining symbols. This observation suggests the following test for locality:

Proposition 30 (Testing Locality) Given a oHO1O signature S, concept C, axiom α

and ontology O let τ(C, S), τ(α, S) and τ(O, S) be deﬁned recursively as follows:

τ(C, S) ::= τ(·, S) = ·; (a)

[ τ(A, S) = ⊥ if A / ∈ S and otherwise = A; (b)

[ τ(¦a¦, S) = ¦a¦; (c)

[ τ(C

1

¯ C

2

, S) = τ(C

1

, S) ¯ τ(C

2

, S); (d)

[ τ(C

1

, S) = τ(C

1

, S); (e)

[ τ(∃R.C

1

, S) = ⊥ if Sig(R) S and otherwise = ∃R.τ(C

1

, S); (f)

[ τ(nR.C

1

, S) = ⊥ if Sig(R) S and otherwise = (nR.τ(C

1

, S)). (g)

τ(α, S) ::= τ(C

1

_ C

2

, S) = (τ(C

1

, S) _ τ(C

2

, S)); (h)

[ τ(R

1

_ R

2

, S) = (⊥ _ ⊥) if Sig(R

1

) S, otherwise

= ∃R

1

.· _ ⊥ if Sig(R

2

) S, otherwise = (R

1

_ R

2

); (i)

[ τ(a : C, S) = a : τ(C, S); (j)

[ τ(r(a, b), S) = · _ ⊥ if r / ∈ S and otherwise = r(a, b); (k)

[ τ(Trans(r), S) = ⊥ _ ⊥ if r / ∈ S and otherwise = Trans(r); (l)

[ τ(Funct(R), S) = ⊥ _ ⊥ if Sig(R) S and otherwise = Funct(R). (m)

τ(O, S) ::=

α∈C

τ(α, S) (n)

2. This notion of locality is exactly the one we used in our previous work (Cuenca Grau et al., 2007).

296

Modular Reuse of Ontologies: Theory and Practice

Then, O ∈ O

r←∅

A←∅

(S) iﬀ every axiom in τ(O, S) is a tautology.

Proof. It is easy to check that for every atomic concept A and atomic role r from τ(C, S),

we have A ∈ S and r ∈ S, in other words, all atomic concepts and roles that are not in S

are eliminated by the transformation.

3

It is also easy to show by induction that for every

interpretation 1 ∈ I

r←∅

A←∅

(S), we have C

7

= (τ(C, S))

7

and that 1 [= α iﬀ 1 [= τ(α, S). Hence

an axiom α is local w.r.t. S iﬀ 1 [= α for every interpretation 1 ∈ I

r←∅

A←∅

(S) iﬀ 1 [= τ(α, S)

for every Sig(α)-interpretation 1 ∈ I

r←∅

A←∅

(S) iﬀ τ(α, S) is a tautology.

Example 31 Let O = ¦α¦ be the ontology consisting of axiom α = M2 from Figure 1. We

demonstrate using Proposition 30 that O is local w.r.t. S

1

= ¦Fibrosis, Genetic Origin¦, but

not local w.r.t. S

2

= ¦Genetic Fibrosis, has Origin¦.

Indeed, according to Proposition 30, in order to check whether O is local w.r.t. S

1

it is

suﬃcient to perform the following replacements in α (the symbols from S

1

are underlined):

M2

⊥ [by (b)]

Genetic Fibrosis ≡ Fibrosis ¯

⊥ [by (f)]

∃has Origin.Genetic Origin (7)

Similarly, in order to check whether O is local w.r.t. S

2

, it is suﬃcient to perform the

following replacements in α (the symbols from S

2

are underlined):

M2 Genetic Fibrosis ≡

⊥ [by (b)]

Fibrosis ¯ ∃has Origin.

⊥ [by (b)]

Genetic Origin (8)

In the ﬁrst case we obtain τ(M2, S

1

) = (⊥ ≡ Fibrosis ¯ ⊥) which is a oHO1O-tautology.

Hence O is local w.r.t. S

1

and hence by Proposition 8 is S

1

-safe w.r.t. oHO1O. In the

second case τ(M2, S

2

) = (Genetic Fibrosis ≡ ⊥ ¯ ∃has Origin.⊥) which is not a oHO1O

tautology, hence O is not local w.r.t. S

2

. ♦

5.4 A Tractable Approximation to Locality

One of the important conclusions of Proposition 30 is that one can use the standard ca-

pabilities of available DL-reasoners such as FaCT++ (Tsarkov & Horrocks, 2006), RACER

(M¨oller & Haarslev, 2003), Pellet (Sirin & Parsia, 2004) or KAON2 (Motik, 2006) for testing

locality since these reasoners, among other things, allow testing for DL-tautologies. Che-

cking for tautologies in description logics is, theoretically, a diﬃcult problem (e.g. for the

DL oHO1O it is known to be NEXPTIME-complete, Tobies, 2000). There are, however,

several reasons to believe that the locality test would perform well in practice. The primary

reason is that the sizes of the axioms which need to be tested for tautologies are usually

relatively small compared to the sizes of ontologies. Secondly, modern DL reasoners are

highly optimized for standard reasoning tasks and behave well for most realistic ontologies.

In case reasoning is too costly, it is possible to formulate a tractable approximation to the

locality conditions for oHO1O:

3. Recall that the constructors ⊥, C1 C2, ∀R.C, and (nR.C) are assumed to be expressed using ,

C1 C2, ∃R.C and (nR.C), hence, in particular, every role R

∅

with Sig(R

∅

) S occurs in O as either

∃R

∅

.C, (nR

∅

.C), R

∅

R, R R

∅

, Trans(R

∅

), or Funct(R

∅

), and hence will be eliminated. All atomic

concepts A

∅

/ ∈ S will be eliminated likewise. Note that it is not necessarily the case that Sig(τ(α, S)) ⊆ S,

since τ(α, S) may still contain individuals that do not occur in S.

297

Cuenca Grau, Horrocks, Kazakov, & Sattler

Deﬁnition 32 (Syntactic Locality for oHO1O). Let S be a signature. The following

grammar recursively deﬁnes two sets of concepts Con

∅

(S) and Con

∆

(S) for a signature S:

Con

∅

(S) ::= A

∅

[ C

∆

[ C ¯ C

∅

[ C

∅

¯ C [ ∃R

∅

.C [ ∃R.C

∅

[ (nR

∅

.C) [ (nR.C

∅

) .

Con

∆

(S) ::= · [ C

∅

[ C

∆

1

¯ C

∆

2

.

where A

∅

/ ∈ S is an atomic concept, R

∅

(possibly the inverse of) an atomic role r

∅

/ ∈ S, C

any concept, R any role, C

∅

∈ Con

∅

(S), C

∆

(i)

∈ Con

∆

(S), and i ∈ ¦1, 2¦.

An axiom α is syntactically local w.r.t. S if it is of one of the following forms: (1) R

∅

_ R,

or (2) Trans(r

∅

), or (3) Funct(R

∅

), or (4) C

∅

_ C, or (5) C _ C

∆

, or (6) a : C

∆

. We denote

by A

˜

x

r←∅

A←∅

(S) the set of all oHO1O-axioms that are syntactically local w.r.t. S.

A oHO1O-ontology O is syntactically local w.r.t. S if O ⊆ A

˜

x

r←∅

A←∅

(S). We denote by

˜

O

r←∅

A←∅

(S) the set of all oHO1O ontologies that are syntactically local w.r.t. S. ♦

Intuitively, syntactic locality provides a simple syntactic test to ensure that an axiom is

satisﬁed in every interpretation from I

r←∅

A←∅

(S). It is easy to see from the inductive deﬁnitions

of Con

∅

(S) and Con

∆

(S) in Deﬁnition 32 that for every interpretation 1 = (∆

7

,

7

) from

I

r←∅

A←∅

(S) it is the case that (C

∅

)

7

= ∅ and (C

∆

)

7

= ∆

7

for every C

∅

∈ Con

∅

(S) and

C

∆

∈ Con

∆

(S). Hence, every syntactically local axiom is satisﬁed in every interpretation

1 from I

r←∅

A←∅

(S), and so we obtain the following conclusion:

Proposition 33 A

˜

x

r←∅

A←∅

(S) ⊆ Ax

r←∅

A←∅

(S).

Further, it can be shown that the safety class for oHO1O based on syntactic locality

enjoys all of the properties from Deﬁnition 24:

Proposition 34 The class of syntactically local ontologies

˜

O

r←∅

A←∅

() given in Deﬁnition 32

is an anti-monotonic, compact, subset-closed, and union-closed safety class.

Proof.

˜

O

r←∅

A←∅

() is a safety class by Proposition 33. Anti-monotonicity for

˜

O

r←∅

A←∅

() can

be shown by induction, by proving that Con

∅

(S

2

) ⊆ Con

∅

(S

1

), Con

∆

(S

2

) ⊆ Con

∆

(S

1

)

and A

˜

x

r←∅

A←∅

(S

2

) ⊆ A

˜

x

r←∅

A←∅

(S

1

) when S

1

⊆ S

2

. Also one can show by induction that

α ∈ A

˜

x

r←∅

A←∅

(S) iﬀ α ∈ A

˜

x

r←∅

A←∅

(S ∩ Sig(α)), so

˜

O

r←∅

A←∅

() is compact. Since O ∈

˜

O

r←∅

A←∅

(S)

iﬀ O ⊆ A

˜

x

r←∅

A←∅

(S), we have that

˜

O

r←∅

A←∅

() is subset-closed and union-closed.

Example 35 (Example 31 continued) It is easy to see that axiom M2 from Figure 1 is

syntactically local w.r.t. S

1

= ¦Fibrosis, Genetic Origin¦. Below we indicate sub-concepts in

α from Con

∅

(S

1

):

M2

∈ Con

∅

(S

1

) [matches A

∅

]

Genetic Fibrosis ≡ Fibrosis ¯

∈ Con

∅

(S

1

) [matches ∃R

∅

.C]

∃has Origin.Genetic Origin

∈ Con

∅

(S

1

) [matches C ¯ C

∅

]

(9)

It is easy to show in a similar way that axioms P

1

—P4, and E1 from Figure 1 are syn-

tactically local w.r.t. S = ¦Cystic Fibrosis, Genetic Disorder¦. Hence the ontology {

1

=

¦P1, . . . , P4, E1¦ considered in Example 29 is syntactically local w.r.t. S. ♦

298

Modular Reuse of Ontologies: Theory and Practice

I

r←∗

A←∗

(S) r, A ∈ S : r

.

A

.

I

r←∅

A←∅

(S) ∅ ∅

I

r←∆∆

A←∅

(S) ∆

.

∆

.

∅

I

r←id

A←∅

(S) ¦'x, x` [ x ∈ ∆

.

¦ ∅

I

r←∗

A←∗

(S) r, A ∈ S : r

.

A

.

I

r←∅

A←∆

(S) ∅ ∆

.

I

r←∆∆

A←∆

(S) ∆

.

∆

.

∆

.

I

r←id

A←∆

(S) ¦'x, x` [ x ∈ ∆

.

¦ ∆

.

Table 3: Examples for Diﬀerent Local Classes of Interpretations

The converse of Proposition 33 does not hold in general since there are semantically

local axioms that are not syntactically local. For example, the axiom α = (A _ A . B) is

local w.r.t. every S since it is a tautology (and hence true in every interpretation). On the

other hand, it is easy to see that α is not syntactically local w.r.t. S = ¦A, B¦ according to

Deﬁnition 32 since it involves symbols in S only. Another example, which is not a tautology,

is a GCI α = (∃r.A _ ∃r.B). The axiom α is semantically local w.r.t. S = ¦r¦, since

τ(α, S) = (∃r.⊥ _ ∃r.⊥) is a tautology, but not syntactically local. These examples show

that the limitation of our syntactic notion of locality is its inability to “compare” diﬀerent

occurrences of concepts from the given signature S. As a result, syntactic locality does not

detect all tautological axioms. It is reasonable to assume, however, that tautological axioms

do not occur often in realistic ontologies. Furthermore, syntactic locality checking can be

performed in polynomial time by matching an axiom according to Deﬁnition 32.

Proposition 36 There exists an algorithm that given a oHO1O ontology O and a sig-

nature S, determines whether O ∈

˜

O

r←∅

A←∅

(S), and whose running time is polynomial in

[O[ +[S[, where [O[ and [S[ are the number of symbols occurring in O and S respectively.

4

5.5 Other Locality Classes

The locality condition given in Example 26 based on a class of local interpretations I

r←∅

A←∅

()

is just a particular example of locality which can be used for testing safety. Other classes

of local interpretations can be constructed in a similar way by ﬁxing the interpretations

of elements outside S to diﬀerent values. In Table 3 we have listed several such classes of

local interpretations where we ﬁx the interpretation of atomic roles outside S to be either

the empty set ∅, the universal relation ∆∆, or the identity relation id on ∆, and the

interpretation of atomic concepts outside S to either the empty set ∅ or the set ∆ of all

elements.

Each local class of interpretations in Table 3 deﬁnes a corresponding class of local

ontologies analogously to Example 26. In Table 4 we have listed all of these classes together

with examples of typical types of axioms used in ontologies. These axioms are assumed

to be an extension of our project ontology from Figure 1. We indicate which axioms are

local w.r.t. S for which locality conditions assuming, as usual, that the symbols from S are

underlined.

It can be seen from Table 4 that diﬀerent types of locality conditions are appropriate

for diﬀerent types of axioms. The locality condition based on I

r←∅

A←∅

(S) captures the domain

axiom P4, deﬁnition P5, the disjointness axiom P6, and the functionality axiom P7 but

4. We assume that the numbers in number restrictions are written down using binary coding.

299

Cuenca Grau, Horrocks, Kazakov, & Sattler

α Axiom ? α ∈ Ax

r←∅

A←∅

r←∆∆

A←∅

r←id

A←∅

r←∅

A←∆

r←∆∆

A←∆

r←id

A←∆

P4 ∃has Focus.· _ Project

P5

BioMedical Project ≡ Project ¯

¯ ∃has Focus.Bio Medicine

P6 Project ¯ Bio Medicine _ ⊥

P7 Funct(has Focus)

P8 Human Genome : Project

P9 has Focus(Human Genome, Gene)

E2

∀has Focus.Cystic Fibrosis _

_ ∃has Focus.Cystic Fibrosis

Table 4: A Comparison between Diﬀerent Types of Locality Conditions

neither of the assertions P8 or P9, since the individuals Human Genome and Gene prevent

us from interpreting the atomic role has Focus and atomic concept Project with the empty

set. The locality condition based on I

r←∆∆

A←∆

(S), where the atomic roles and concepts outside

S are interpreted as the largest possible sets, can capture such assertions but are generally

poor for other types of axioms. For example, the functionality axiom P7 is not captured

by this locality condition since the atomic role has Focus is interpreted as the universal

relation ∆∆, which is not necessarily functional. In order to capture such functionality

axioms, one can use locality based on I

r←id

A←∅

(S) or I

r←id

A←∆

(S), where every atomic role outside

S is interpreted with the identity relation id on the interpretation domain. Note that the

modeling error E2 is not local for any of the given locality conditions. Note also that it is

not possible to come up with a locality condition that captures all the axioms P4–P9, since

in P6 and P8 together imply axiom β = (¦Human Genome¦ ¯ Bio Medicine _ ⊥) which

uses the symbols from S only. Hence, every subset of { containing P6 and P8 is not safe

w.r.t. S, and so cannot be local w.r.t. S.

It might be possible to come up with algorithms for testing locality conditions for the

classes of interpretation in Table 3 similar to the ones presented in Proposition 30. For

example, locality based on the class I

r←∅

A←∆

(S) can be tested as in Proposition 30, where the

case (a) of the deﬁnition for τ(C, S) is replaced with the following:

τ(A, S) = · if A / ∈ S and otherwise = A (a

t

)

For the remaining classes of interpretations, that is for I

r←∆∆

A←∗

(S) and I

r←id

A←∗

(S), checking

locality, however, is not that straightforward, since it is not clear how to eliminate the

universal roles and identity roles from the axioms and preserve validity in the respective

classes of interpretations.

Still, it is easy to come up with tractable syntactic approximations for all the locality

conditions considered in this section in a similar manner to what has been done in Sec-

tion 5.4. The idea is the same as that used in Deﬁnition 32, namely to deﬁne two sets

Con

∅

(S) and Con

∆

(S) of concepts for a signature S which are interpreted as the empty

300

Modular Reuse of Ontologies: Theory and Practice

Con

∅

(S) ::= C

∆

[ C ¯ C

∅

[ C

∅

¯ C

[ ∃R.C

∅

[ nR.C

∅

for I

r←∗

A←∅

(): [ A

∅

for I

r←∅

A←∗

(): [ ∃R

∅

.C [ nR

∅

.C

for I

r←id

A←∗

(): [ (mR

id

.C), m ≥ 2 .

Con

∆

(S) ::= · [ C

∅

[ C

∆

1

¯ C

∆

2

for I

r←∗

A←∆

(): [ A

∆

for I

r←∆∆

A←∗

(): [ ∃R

∆∆

.C

∆

[ (nR

∆∆

.C

∆

)

for I

r←id

A←∗

(): [ ∃R

id

.C

∆

[ (1 R

id

.C

∆

) .

A

˜

x

r←∗

A←∗

(S) ::= C

∅

_ C [ C _ C

∆

[ a : C

∆

for I

r←∅

A←∗

(): [ R

∅

_ R [ Trans(r

∅

) [ Funct(R

∅

)

for I

r←∆∆

A←∗

(): [ R _ R

∆∆

[ Trans(r

∆∆

) [ r

∆∆

(a, b)

for I

r←id

A←∗

(): [ Trans(r

id

) [ Funct(R

id

)

Where:

A

∅

, A

∆

, r

∅

, r

∆∆

, r

id

∈ S;

Sig(R

∅

), Sig(R

∆∆

), Sig(R

id

) S;

C

∅

∈ Con

∅

(S), C

∆

(i)

∈ Con

∆

(S);

C is any concept, R is any role

Figure 3: Syntactic Locality Conditions for the Classes of Interpretations in Table 3

set and, respectively, as ∆

7

in every interpretation 1 from the class and see in which situa-

tions DL-constructors produce the elements from these sets. In Figure 3 we gave recursive

deﬁnitions for syntactically local axioms A

˜

x

r←∗

A←∗

(S) that correspond to classes I

r←∗

A←∗

(S) of

interpretations from Table 3, where some cases in the recursive deﬁnitions are present only

for the indicated classes of interpretations.

5.6 Combining and Extending Safety Classes

In the previous section we gave examples of several safety classes based on diﬀerent local

classes of interpretations and demonstrated that diﬀerent classes are suitable for diﬀerent

types of axioms. In order to check safety of ontologies in practice, one may try to apply

diﬀerent suﬃcient tests and check if any of them succeeds. Obviously, this gives a more

powerful suﬃcient condition for safety, which can be seen as the union of the safety classes

used in the tests.

Formally, given two classes of ontologies O

1

() and O

2

(), their union (O

1

∪ O

2

)() is a

class of ontologies deﬁned by (O

1

∪O

2

)(S) = O

1

(S)∪O

2

(S). It is easy to see by Deﬁnition 24

that if both O

1

() and O

2

() are safety classes then their union (O

1

∪ O

2

)() is a safety

class. Moreover, if each of the safety classes is also anti-monotonic or subset-closed, then

the union is anti-monotonic, or respectively, subset-closed as well. Unfortunately the union-

closure property for safety classes is not preserved under unions, as demonstrated in the

following example:

Example 37 Consider the union (O

r←∅

A←∅

∪ O

r←∆∆

A←∆

)() of two classes of local ontologies

O

r←∅

A←∅

() and O

r←∆∆

A←∆

() deﬁned in Section 5.5. This safety class is not union-closed since,

for example, the ontology O

1

consisting of axioms P4–P7 from Table 4 satisﬁes the ﬁrst

locality condition, the ontology O

2

consisting of axioms P8–P9 satisﬁes the second locality

condition, but their union O

1

∪O

2

satisﬁes neither the ﬁrst nor the second locality condition

and, in fact, is not even safe for S as we have shown in Section 5.5. ♦

As shown in Proposition 33, every locality condition gives a union-closed safety class;

however, as seen in Example 37, the union of such safety classes might be no longer union-

closed. One may wonder if locality classes already provide the most powerful suﬃcient

301

Cuenca Grau, Horrocks, Kazakov, & Sattler

conditions for safety that satisfy all the desirable properties from Deﬁnition 24. Surprisingly

this is the case to a certain extent for some locality classes considered in Section 5.5.

Deﬁnition 38 (Maximal Union-Closed Safety Class). A safety class O

2

() extends

a safety class O

1

() if O

1

(S) ⊆ O

2

(S) for every S. A safety class O

1

() is maximal union-

closed for a language L if O

1

() is union-closed and for every union-closed safety class O

2

()

that extends O

1

() and every O over L we have that O ∈ O

2

(S) implies O ∈ O

1

(S). ♦

Proposition 39 The classes of local ontologies O

r←∅

A←∅

() and O

r←∅

A←∆

() deﬁned in Section 5.5

are maximal union-closed safety classes for L = oH1O.

Proof. According to Deﬁnition 38, if a safety class O() is not maximal union-closed for a

language L, then there exists a signature S and an ontology O over L, such that (i) O / ∈

O(S), (ii) O is safe w.r.t. S in L, and (iii) for every { ∈ O(S), it is the case that O∪ { is

safe w.r.t. S in L; that is, for every ontology O over L with Sig(O) ∩ Sig(O ∪ {) ⊆ S it is

the case that O ∪ { ∪ O is a deductive conservative extension of O. We demonstrate that

this is not possible for O() = O

r←∅

A←∅

() or O() = O

r←∅

A←∆

()

We ﬁrst consider the case O() = O

r←∅

A←∅

() and then show how to modify the proof for

the case O() = O

r←∅

A←∆

().

Let O be an ontology over L that satisﬁes conditions (i)–(iii) above. We deﬁne ontologies

{ and O as follows. Take { to consist of the axioms A _ ⊥ and ∃r.· _ ⊥ for every atomic

concept A and atomic role r from Sig(O) ` S. It is easy to see that { ∈ O

r←∅

A←∅

(S). Take O

to consist of all tautologies of form ⊥ _ A and ⊥ _ ∃r.· for every A, r ∈ S. Note that

Sig(O ∪ {) ∩ Sig(O) ⊆ S. We claim that O ∪ { ∪ O is not a deductive Sig(O)-conservative

extension of O. ()

Intuitively, the ontology { is chosen in such a way that { ∈ O

r←∅

A←∅

(S) and O ∪ { ∪ O

has only models from I

r←∅

A←∅

(S). O is an ontology which implies nothing but tautologies and

uses all the atomic concepts and roles from S.

Since O / ∈ O

r←∅

A←∅

(S), there exists an axiom α ∈ O such that α / ∈ Ax

r←∅

A←∅

(S). Let

β := τ(α, S) where τ(, ) is deﬁned as in Proposition 30. As has been shown in the proof of

this proposition, 1 [= α iﬀ 1 [= β for every 1 ∈ I

r←∅

A←∅

(S). Now, since O [= α and O ∪ { ∪ O

has only models from I

r←∅

A←∅

(S), it is the case that O∪{∪O [= β. By Proposition 30, since β

does not contain individuals, we have that Sig(β) ⊆ S = Sig(O) and, since α / ∈ Ax

r←∅

A←∅

(S),

β is not a tautology, thus O [= β. Hence, by Deﬁnition 1, O ∪ { ∪ O is not a deductive

Sig(O)-conservative extension of O ().

For O() = O

r←∅

A←∆

() the proof can be repeated by taking { to consist of axioms · _ A

and ∃r.· _ ⊥ for all A, r ∈ Sig(O) ` S, and modifying τ(, ) as has been discussed in

Section 5.5.

There are some diﬃculties in extending the proof of Proposition 39 to other locality

classes considered in Section 5.5. First, it is not clear how to force interpretations of roles

to be the universal or identity relation using oHO1O axioms. Second, it is not clear how

to deﬁne the function τ(, ) in these cases (see a related discussion in Section 5.5). Note

also that the proof of Proposition 39 does not work in the presence of nominals, since

this will not guarantee that β = τ(α, S) contains symbols from S only (see Footnote 3 on

p. 297). Hence there is probably room to extend the locality classes O

r←∅

A←∅

() and O

r←∅

A←∆

()

for L = oHO1O while preserving union-closure.

302

Modular Reuse of Ontologies: Theory and Practice

6. Extracting Modules Using Safety Classes

In this section we revisit the problem of extracting modules from ontologies. As shown in

Corollary 23 in Section 4, there exists no general procedure that can recognize or extract

all the (minimal) modules for a signature in an ontology in ﬁnite time.

The techniques described in Section 5, however, can be reused for extracting particular

families of modules that satisfy certain suﬃcient conditions. Proposition 18 establishes the

relationship between the notions of safety and module; more precisely, a subset O

1

of O is

an S-module in O provided that O ` O

1

is safe for S ∪ Sig(O

1

). Therefore, any safety class

O() can provide a suﬃcient condition for testing modules—that is, in order to prove that

O

1

is a S-module in O, it is suﬃcient to show that O ` O

1

∈ O(S ∪ Sig(O

1

)). A notion of

modules based on this property can be deﬁned as follows.

Deﬁnition 40 (Modules Based on Safety Class).

Let L be an ontology language and O() be a safety class for L. Given an ontology O and

a signature S over L, we say that O

m

⊆ O is an O()-based S-module in O if O ` O

m

∈

O(S ∪ Sig(O

m

)). ♦

Remark 41 Note that for every safety class O(), ontology O and signature S, there exists

at least one O()-based S-module in O, namely O itself; indeed, by Deﬁnition 24, the empty

ontology ∅ = O ` O also belongs to O(S) for every O() and S.

Note also that it follows from Deﬁnition 40 that O

m

is an O()-based S-module in O iﬀ

O

m

is an O()-based S

t

-module in O for every S

t

with S ⊆ S

t

⊆ (S ∪ Sig(O

m

)). ♦

It is clear that, according to Deﬁnition 40, any procedure for checking membership of a

safety class O() can be used directly for checking whether O

m

is a module based on O().

In order to extract an O()-module, it is suﬃcient to enumerate all possible subsets of the

ontology and check if any of these subsets is a module based on O().

In practice, however, it is possible to avoid checking all the possible subsets of the

input ontology. Figure 4 presents an optimized version of the module-extraction algorithm.

The procedure manipulates conﬁgurations of the form O

m

[ O

u

[ O

s

, which represent a

partitioning of the ontology O into three disjoint subsets O

m

, O

u

and O

s

. The set O

m

accumulates the axioms of the extracted module; the set O

s

is intended to be safe w.r.t.

S∪Sig(O

m

). The set O

u

, which is initialized to O, contains the unprocessed axioms. These

axioms are distributed among O

m

and O

s

according to rules R1 and R2. Given an axiom α

from O

u

, rule R1 moves α into O

s

provided O

s

remains safe w.r.t. S ∪ Sig(O

m

) according

to the safety class O(). Otherwise, rule R2 moves α into O

m

and moves all axioms from

O

s

back into O

u

, since Sig(O

m

) might expand and axioms from O

s

might become no longer

safe w.r.t. S ∪ Sig(O

m

). At the end of this process, when no axioms are left in in O

u

, the

set O

m

is an O()-based module in O.

The rewrite rules R1 and R2 preserve invariants I1–I3 given in Figure 4. Invariant I1

states that the three sets O

m

, O

u

and O

s

form a partitioning of O; I2 states that the set O

s

satisﬁes the safety test for S ∪ Sig(O

m

) w.r.t. O(); ﬁnally, I3 establishes that the rewrite

rules either add elements to O

m

, or they add elements to O

s

without changing O

m

; in other

words, the pair ([O

m

[, [O

s

[) consisting of the sizes for these sets increases in lexicographical

order.

303

Cuenca Grau, Horrocks, Kazakov, & Sattler

Input: an ontology O, a signature S, a safety class O()

Output: a module O

m

in O based on O()

Conﬁguration: O

m

↑

module

[

unprocessed

↓

O

u

[ O

s

↑

safe

;

Initial Conﬁguration = ∅ [ O [ ∅

Termination Condition: O

u

= ∅

Rewrite rules:

R1. O

m

[ O

u

∪ ¦α¦ [ O

s

=⇒ O

m

[ O

u

[ O

s

∪ ¦α¦ if (O

s

∪ ¦α¦) ∈ O(S ∪ Sig(O

m

))

R2. O

m

[ O

u

∪ ¦α¦ [ O

s

=⇒ O

m

∪ ¦α¦ [ O

u

∪ O

s

[ ∅ if (O

s

∪ ¦α¦) ∈ O(S ∪ Sig(O

m

))

Invariants for O

m

[ O

u

[ O

s

:

I1. O = O

m

¬ O

u

¬ O

s

I2. O

s

∈ O(S ∪ Sig(O

m

))

Invariant for O

m

[ O

u

[ O

s

=⇒ O

t

m

[ O

t

u

[ O

t

s

:

I3. ([O

m

[, [O

s

[) <

lex

([O

t

m

[, [O

t

s

[)

Figure 4: A Procedure for Computing Modules Based on a Safety Class O()

Proposition 42 (Correctness of the Procedure from Figure 4) Let O() be a safety

class for an ontology language L, O an ontology over L, and S a signature over L. Then:

(1) The procedure in Figure 4 with input O, S, O() terminates and returns an O()-

based S-module O

m

in O; and

(2) If, additionally, O() is anti-monotonic, subset-closed and union-closed, then there

is a unique minimal O()-based S-module in O, and the procedure returns precisely this

minimal module.

Proof. (1) The procedure based on the rewrite rules from Figure 4 always terminates for

the following reasons: (i) for every conﬁguration derived by the rewrite rules, the sets O

m

,

O

u

and O

s

form a partitioning of O (see invariant I1 in Figure 4), and therefore the size

of every set is bounded; (ii) at each rewrite step, ([O

m

[, [O

s

[) increases in lexicographical

order (see invariant I3 in Figure 4). Additionally, if O

u

= ∅ then it is always possible to

apply one of the rewrite rules R1 or R2, and hence the procedure always terminates with

O

u

= ∅. Upon termination, by invariant I1 from Figure 4, O is partitioned into O

m

and O

s

and by invariant I2, O

s

∈ O(S ∪ Sig(O

m

)), which implies, by Deﬁnition 40, that O

m

is an

O()-based S-module in O.

(2) Now, suppose that, in addition, O() is an anti-monotonic, subset-closed, and union-

closed safety class, and suppose that O

t

m

is an O()-based S-module in O. We demonstrate

by induction that for every conﬁguration O

m

[ O

u

[ O

s

derivable from ∅ [ O [ ∅ by rewrite

rules R1 and R2, it is the case that O

m

⊆ O

t

m

. This will prove that the module computed

by the procedure is a subset of every O()-based S-module in O, and hence, is the smallest

O()-based S-module in O.

Indeed, for the base case we have O

m

= ∅ ⊆ O

t

m

. The rewrite rule R1 does not change

the set O

m

. For the rewrite rule R2 we have: O

m

[ O

u

∪¦α¦ [ O

s

=⇒ O

m

∪¦α¦ [ O

u

∪O

s

[ ∅

if (O

s

∪ ¦α¦) ∈ O(S ∪ Sig(O

m

)). ()

304

Modular Reuse of Ontologies: Theory and Practice

Input: an ontology O, a signature S, a safety class O()

Output: a module O

m

in O based on O()

Initial Conﬁguration = ∅ [ O [ ∅ Termination Condition: O

u

= ∅

Rewrite rules:

R1. O

m

[ O

u

∪ ¦α¦ [ O

s

=⇒ O

m

[ O

u

[ O

s

∪ ¦α¦ if ¦α¦ ∈ O(S ∪ Sig(O

m

))

R2. O

m

[ O

u

∪ ¦α¦ [ O

α

s

∪ O

s

=⇒ O

m

∪ ¦α¦ [ O

u

∪ O

α

s

[ O

s

if ¦α¦ ∈ O(S ∪ Sig(O

m

)), and

Sig(O

s

) ∩ Sig(α) ⊆ Sig(O

m

)

Figure 5: An Optimized Procedure for Computing Modules Based on a Compact Subset-

Closed Union-Closed Safety Class O()

Suppose, to the contrary, that O

m

⊆ O

t

m

but O

m

∪¦α¦ O

t

m

. Then α ∈ O

t

s

:= O`O

t

m

.

Since O

t

m

is an O()-based S-module in O, we have that O

t

s

∈ O(S ∪ Sig(O

t

m

)). Since O()

is subset-closed, ¦α¦ ∈ O(S ∪ Sig(O

t

m

)). Since O

m

⊆ O

t

m

and O() is anti-monotonic, we

have ¦α¦ ∈ O(S∪Sig(O

m

)). Since by invariant I2 from Figure 4, O

s

∈ O(S∪Sig(O

m

)) and

O() is union-closed, O

s

∪¦α¦ ∈ O(S∪Sig(O

m

)), which contradicts (). This contradiction

implies that the rule R2 also preserves property O

m

⊆ O

t

m

.

Claim (1) of Proposition 42 establishes that the procedure from Figure 4 terminates for

every input and produces a module based on a given safety class. Moreover, it is possible

to show that this procedure runs in polynomial time assuming that the safety test can be

also performed in polynomial time.

If the safety class O() satisﬁes additional desirable properties, like those based on classes

of local interpretations described in Section 5.2, the procedure, in fact, produces the smallest

possible module based on the safety class, as stated in claim (2) of Proposition 42. In this

case, it is possible to optimize the procedure shown in Figure 4. If O() is union closed,

then, instead of checking whether (O

s

∪ ¦α¦) ∈ O(S ∪ Sig(O

m

)) in the conditions of rules

R1 and R2, it is suﬃcient to check if ¦α¦ ∈ O(S ∪ Sig(O

m

)) since it is already known that

O

s

∈ O(S ∪ Sig(O

m

)). If O() is compact and subset closed, then instead of moving all the

axioms in O

s

to O

u

in rule R2, it is suﬃcient to move only those axioms O

α

s

that contain

at least one symbol from α which did not occur in O

m

before, since the set of remaining

axioms will stay in O(S ∪ Sig(O

m

)). In Figure 5 we present an optimized version of the

algorithm from Figure 4 for such locality classes.

Example 43 In Table 5 we present a trace of the algorithm from Figure 5 for the ontology O

consisting of axioms M1–M5 from Figure 1, signature S = ¦Cystic Fibrosis, Genetic Disorder¦

and safety class O() = O

r←∅

A←∅

() deﬁned in Example 26. The ﬁrst column of the table lists

the conﬁgurations obtained from the initial conﬁguration ∅ [ O [ ∅ by applying the rewrite

rules R1 and R2 from Figure 5; in each row, the underlined axiom α is the one that is being

tested for safety. The second column of the table shows the elements of S ∪ Sig(O

m

) that

have appeared for the current conﬁguration but have not been present for the preceding

conﬁgurations. In the last column we indicate whether the ﬁrst conditions of the rules R1

and R2 are fulﬁlled for the selected axiom α from O

u

—that is, whether α is local for I

r←∅

A←∅

().

The rewrite rule corresponding to the result of this test is applied to the conﬁguration.

305

Cuenca Grau, Horrocks, Kazakov, & Sattler

O

m

[ O

u

, α [ O

s

New elements in S ∪ Sig(O

m

) ¦α¦ ∈ O(S ∪ Sig(O

m

))?

1 − [ M1, M2, M3, M4, M5 [ − Cystic Fibrosis, Genetic Disorder Yes ⇒ R1

2 − [ M1, M3, M4, M5 [ M2 − Yes ⇒ R1

3 − [ M1, M4, M5 [ M2, M3 − No ⇒ R2

4 M1 [ M2, M3, M4, M5 [ − Fibrosis, located In, Pancreas,

has Origin, Genetic Origin No ⇒ R2

5 M1, M3 [ M2, M4, M5 [ − Genetic Fibrosis No ⇒ R2

6 M1, M3, M4 [ M2, M5 [ − − Yes ⇒ R1

7 M1, M3, M4 [ M2 [ M5 − No ⇒ R2

8 M1, M2, M3, M4 [ − [ M5 −

Table 5: A trace of the Procedure in Figure 5 for the input O = ¦M1, . . . , M5¦ from Figure 1

and S = ¦Cystic Fibrosis, Genetic Disorder¦

Note that some axioms α are tested for safety several times for diﬀerent conﬁgurations,

because the set O

u

may increase after applications of rule R2; for example, the axiom

α = M2 is tested for safety in both conﬁgurations 1 and 7, and α = M3 in conﬁgurations

2 and 4. Note also that diﬀerent results for the locality tests are obtained in these cases:

both M2 and M3 were local w.r.t. S ∪ Sig(O

m

) when O

m

= ∅, but became non-local when

new axioms were added to O

m

. It is also easy to see that, in our case, syntactic locality

produces the same results for the tests.

In our example, the rewrite procedure produces a module O

m

consisting of axioms M1–

M4. Note that it is possible to apply the rewrite rules for diﬀerent choices of the axiom

α in O

u

, which results in a diﬀerent computation. In other words, the procedure from

Figure 5 has implicit non-determinism. According to Claim (2) of Proposition 42 all such

computations should produce the same module O

m

, which is the smallest O

r←∅

A←∅

()-based

S-module in O; that is, the implicit non-determinism in the procedure from Figure 5 does

not have any impact on the result of the procedure. However, alternative choices for α

may result in shorter computations: in our example we could have selected axiom M1 in

the ﬁrst conﬁguration instead of M2 which would have led to a shorter trace consisting of

conﬁgurations 1, and 4–8 only. ♦

It is worth examining the connection between the S-modules in an ontology O based on

a particular safety class O() and the actual minimal S-modules in O. It turns out that any

O()-based module O

m

is guaranteed to cover the set of minimal modules, provided that

O() is anti-monotonic and subset-closed. In other words, given O and S, O

m

contains all

the S-essential axioms in O. The following Lemma provides the main technical argument

underlying this result.

Lemma 44 Let O() be an anti-monotonic subset-closed safety class for an ontology lan-

guage L, O an ontology, and S a signature over L. Let O

1

be an S-module in O w.r.t. L

and O

m

an O()-based S-module in O. Then O

2

:= O

1

∩O

m

is an S-module in O w.r.t. L.

306

Modular Reuse of Ontologies: Theory and Practice

Proof. By Deﬁnition 40, since O

m

is an O()-based S-module in O, we have that O` O

m

∈

O(S ∪ Sig(O

m

)). Since O

1

`O

2

= O

1

`O

m

⊆ O`O

m

and O() is subset-closed, it is the case

that O

1

` O

2

∈ O(S ∪ Sig(O

m

)). Since O() is anti-monotonic, and O

2

⊆ O

m

, we have that

O

1

` O

2

∈ O(S ∪ Sig(O

2

)), hence, O

2

is an O()-based S-module in O

1

. In particular O

2

is

an S-module in O

1

w.r.t. L. Since O

1

is an S-module in O w.r.t. L, O

2

is an S-module in

O w.r.t. L.

Corollary 45 Let O() be an anti-monotonic, subset-closed safety class for L and O

m

be

an O()-based S-module in O. Then O

m

contains all S-essential axioms in O w.r.t. L.

Proof. Let O

1

be a minimal S-module in O w.r.t. L. We demonstrate that O

1

⊆ O

m

. Indeed,

otherwise, by Lemma 44, O

1

∩O

m

is an S-module in O w.r.t. L which is strictly contained

in O

1

. Hence O

m

is a superset of every minimal S-module in O and hence, contains all

S-essential axioms in O w.r.t. L.

As shown in Section 3.4, all the axioms M1–M4 are essential for the ontology O and

signature S considered in Example 43. We have seen in this example that the locality-based

S-module extracted from O contains all of these axioms, in accordance to Corollary 45. In

our case, the extracted module contains only essential axioms; in general, however, locality-

based modules might contain non-essential axioms.

An interesting application of modules is the pruning of irrelevant axioms when checking

if an axiom α is implied by an ontology O. Indeed, in order to check whether O [= α

it suﬃces to retrieve the module for Sig(α) and verify if the implication holds w.r.t. this

module. In some cases, it is suﬃcient to extract a module for a subset of the signature of

α which, in general, leads to smaller modules. In particular, in order to test subsumption

between a pair of atomic concepts, if the safety class being used enjoys some nice properties

then it suﬃces to extract a module for one of them, as given by the following proposition:

Proposition 46 Let O() be a compact union-closed safety class for an ontology language

L, O an ontology and A, B atomic concepts. Let O

A

be an O()-based module in O for

S = ¦A¦ in O. Then:

1 If O [= α := (A _ B) and ¦B _ ⊥¦ ∈ O(∅) then O

A

[= α;

2 If O [= α := (B _ A) and ¦· _ B¦ ∈ O(∅) then O

A

[= α;

Proof. 1. Consider two cases: (a) B ∈ Sig(O

A

) and (b) B / ∈ Sig(O

A

).

(a) By Remark 41 it is the case that O

A

is an O()-based module in O for S = ¦A, B¦.

Since Sig(α) ⊆ S, by Deﬁnition 12 and Deﬁnition 1, it is the case that O [= α implies

O

A

[= α.

(b) Consider O

t

= O∪¦B _ ⊥¦. Since Sig(B _ ⊥) = ¦B¦ and B / ∈ Sig(O

A

), ¦B _ ⊥¦ ∈

O(∅) and O() is compact, by Deﬁnition 24 it is the case that ¦B _ ⊥¦ ∈ O(S ∪ Sig(O

A

)).

Since O

A

is an O()-based S-module in O, by Deﬁnition 40, then O`O

A

∈ O(S∪Sig(O

A

)).

Since O() is union-closed, it is the case that (O ` O

A

) ∪ ¦B _ ⊥¦ ∈ O(S ∪ Sig(O

A

)). Note

that B _ ⊥ ∈ O

A

, since B ∈ Sig(O

A

), hence (O ` O

A

) ∪ ¦B _ ⊥¦ = O

t

` O

A

, and, by

Deﬁnition 40, we have that O

A

is an O()-based S-module in O

t

. Now, since O [= (A _ B),

it is the case that O

t

[= (A _ ⊥), and hence, since O

A

is a module in O

t

for S = ¦A¦, we

have that O

A

[= (A _ ⊥) which implies O

A

[= (A _ B).

307

Cuenca Grau, Horrocks, Kazakov, & Sattler

2. The proof of this case is analogous to that for Case 1: Case (a) is applicable without

changes; in Case (b) we show that O

A

is an O()-based module for S = ¦A¦ in O

t

=

O ∪ ¦· _ B¦, and, hence, since O

t

[= (· _ A), it is the case that O

B

[= (· _ A), which

implies O

t

[= (B _ A).

Corollary 47 Let O be a oHO1O ontology and A, B atomic concepts. Let O

r←∗

A←∅

() and

O

r←∗

A←∆

() be locality classes based on local classes of interpretations of form I

r←∗

A←∅

() and

I

r←∗

A←∆

(), respectively, from Table 3. Let O

A

be a module for S = ¦A¦ based on O

r←∗

A←∅

() and

O

B

be a module for S = ¦B¦ based on O

r←∗

A←∆

(). Then O [= (A _ B) iﬀ O

A

[= (A _ B) iﬀ

O

B

[= (A _ B).

Proof. It is easy to see that ¦B _ ⊥¦ ∈ O

r←∗

A←∅

(∅) and ¦· _ A¦ ∈ O

r←∗

A←∆

(∆).

Proposition 46 implies that a module based on a safety class for a single atomic concept

A can be used for capturing either the super-concepts (Case 1), or the sub-concepts (Case

2) B of A, provided that the safety class captures, when applied to the empty signature,

axioms of the form B _ ⊥ (Case 1) or (· _ B) (Case 2). That is, B is a super-concept or

a sub-concept of A in the ontology if and only if it is such in the module. This property

can be used, for example, to optimize the classiﬁcation of ontologies. In order to check if

the subsumption A _ B holds in an ontology O, it is suﬃcient to extract a module in

O for S = ¦A¦ using a modularization algorithm based on a safety class in which the

ontology ¦B _ ⊥¦ is local w.r.t. the empty signature, and check whether this subsumption

holds w.r.t. the module. For this purpose, it is convenient to use a syntactically tractable

approximation of the safety class in use; for example, one could use the syntactic locality

conditions given in Figure 3 instead of their semantic counterparts.

It is possible to combine modularization procedures to obtain modules that are smaller

than the ones obtained using these procedures individually. For example, in order to check

the subsumption O [= (A _ B) one could ﬁrst extract a O

r←∗

A←∅

()-based module ´

1

for

S = ¦A¦ in O; by Corollary 47 this module is complete for all the super-concepts of A in

O, including B—that is, if an atomic concept is a super-concept of A in O, then it is also a

super-concept of A in ´

1

. One could extract a O

r←∗

A←∆

()-based module ´

2

for S = ¦B¦ in

´

1

which, by Corollary 47, is complete for all the sub-concepts of B in ´

1

, including A.

Indeed, ´

2

is an S-module in ´

1

for S = ¦A, B¦ and ´

1

is an S-module in the original

ontology O. By Proposition 46, therefore, it is the case that ´

2

is also an S-module in O.

7. Related Work

We have seen in Section 3 that the notion of conservative extension is valuable in the forma-

lization of ontology reuse tasks. The problem of deciding conservative extensions has been

recently investigated in the context of ontologies (Ghilardi et al., 2006; Lutz et al., 2007;

Lutz & Wolter, 2007). The problem of deciding whether {∪O is a deductive S-conservative

extension of O is EXPTIME-complete for cL (Lutz & Wolter, 2007), 2-EXPTIME-complete

w.r.t. /L(1O (Lutz et al., 2007) (roughly OWL-Lite), and undecidable w.r.t. /L(1OO

(roughly OWL DL). Furthermore, checking model conservative extensions is already un-

decidable for cL (Lutz & Wolter, 2007), and for /L( it is even not semi-decidable (Lutz

et al., 2007).

308

Modular Reuse of Ontologies: Theory and Practice

In the last few years, a rapidly growing body of work has been developed under the

headings of Ontology Mapping and Alignment, Ontology Merging, Ontology Integration,

and Ontology Segmentation (Kalfoglou & Schorlemmer, 2003; Noy, 2004a, 2004b). This ﬁeld

is rather diverse and has roots in several communities.

In particular, numerous techniques for extracting fragments of ontologies for the pur-

poses of knowledge reuse have been proposed. Most of these techniques rely on syntactically

traversing the axioms in the ontology and employing various heuristics to determine which

axioms are relevant and which are not.

An example of such a procedure is the algorithm implemented in the Prompt-Factor

tool (Noy & Musen, 2003). Given a signature S and an ontology O, the algorithm re-

trieves a fragment O

1

⊆ O as follows: ﬁrst, the axioms in O that mention any of the

symbols in S are added to O

1

; second, S is expanded with the symbols in Sig(O

1

). These

steps are repeated until a ﬁxpoint is reached. For our example in Section 3, when S =

¦Cystic Fibrosis, Genetic Disorder¦, and O consists of axioms M1–M5 from Figure 1, the al-

gorithm ﬁrst retrieves axioms M1, M4, and M5 containing these terms, then expands S with

the symbols mentioned in these axioms, such that S contains all the symbols of O. After

this step, all the remaining axioms of O are retrieved. Hence, the fragment extracted by

the Prompt-Factor algorithm consists of all the axioms M1-M5. In this case, the Prompt-

Factor algorithm extracts a module (though not a minimal one). In general, however, the

extracted fragment is not guaranteed to be a module. For example, consider an ontology

O = ¦A ≡ A, B _ C¦ and α = (C _ B). The ontology O is inconsistent due to the

axiom A ≡ A: any axiom (and α in particular) is thus a logical consequence of O. Given

S = ¦B, C¦, the Prompt-Factor algorithm extracts O

2

= ¦B _ C¦; however, O

2

[= α, and

so O

2

is not a module in O. In general, the Prompt-Factor algorithm may fail even if O is

consistent. For example, consider an ontology O = ¦· _ ¦a¦, A _ B¦, α = (A _ ∀r.A),

and S = ¦A¦. It is easy to see that O is consistent, admits only single element models,

and α is satisﬁed in every such a model; that is, O [= α. In this case, the Prompt-Factor

algorithm extracts O

1

= ¦A _ B¦, which does not imply α.

Another example is Seidenberg’s segmentation algorithm (Seidenberg & Rector, 2006),

which was used for segmentation of the medical ontology GALEN (Rector & Rogers, 1999).

Currently, the full version of GALEN cannot be processed by reasoners, so the authors

investigate the possibility of splitting GALEN into small “segments” which can be processed

by reasoners separately. The authors describe a segmentation procedure which, given a set

of atomic concepts S, computes a “segment” for S in the ontology. The description of

the procedure is very high-level. The authors discuss which concepts and roles should be

included in the segment and which should not. In particular, the segment should contain

all “super-” and “sub-” concepts of the input concepts, concepts that are “linked” from the

input concepts (via existential restrictions) and their “super-concepts”, but not their “sub-

concepts”; for the included concepts, also “their restrictions”, “intersection”, “union”, and

“equivalent concepts” should be considered by including the roles and concepts they contain,

together with their “super-concepts” and “super-roles” but not their “sub-concepts” and

“sub-roles”. From the description of the procedure it is not entirely clear whether it works

with a classiﬁed ontology (which is unlikely in the case of GALEN since the full version of

GALEN has not been classiﬁed by any existing reasoner), or, otherwise, how the “super-”

and “sub-” concepts are computed. It is also not clear which axioms should be included in

309

Cuenca Grau, Horrocks, Kazakov, & Sattler

the segment in the end, since the procedure talks only about the inclusion of concepts and

roles.

A diﬀerent approach to module extraction proposed in the literature (Stuckenschmidt

& Klein, 2004) consists of partitioning the concepts in an ontology to facilitate visualization

of and navigation through an ontology. The algorithm uses a set of heuristics for measuring

the degree of dependency between the concepts in the ontology and outputs a graphical

representation of these dependencies. The algorithm is intended as a visualization technique,

and does not establish a correspondence between the nodes of the graph and sets of axioms

in the ontology.

What is common between the modularization procedures we have mentioned is the lack

of a formal treatment for the notion of module. The papers describing these modularization

procedures do not attempt to formally specify the intended outputs of the procedures, but

rather argue what should be in the modules and what not based on intuitive notions. In

particular, they do not take the semantics of the ontology languages into account. It might

be possible to formalize these algorithms and identify ontologies for which the “intuition-

based” modularization procedures work correctly. Such studies are beyond the scope of this

paper.

Module extraction in ontologies has also been investigated from a formal point of view

(Cuenca Grau et al., 2006b). Cuenca Grau et al. (2006) deﬁne a notion of a module O

A

in an

ontology Ofor an atomic concept A. One of the requirements for the module is that Oshould

be a conservative extension of O

A

(in the paper O

A

is called a logical module in O). The

paper imposes an additional requirement on modules, namely that the module O

A

should

entail all the subsumptions in the original ontology between atomic concepts involving A and

other atomic concepts in O

A

. The authors present an algorithm for partitioning an ontology

into disjoint modules and proved that the algorithm is correct provided that certain safety

requirements for the input ontology hold: the ontology should be consistent, should not

contain unsatisﬁable atomic concepts, and should have only “safe” axioms (which in our

terms means that they are local for the empty signature). In contrast, the algorithm we

present here works for any ontology, including those containing “non-safe” axioms.

The growing interest in the notion of “modularity” in ontologies has been recently

reﬂected in a workshop on modular ontologies

5

held in conjunction with the International

Semantic Web Conference (ISWC-2006). Concerning the problem of ontology reuse, there

have been various proposals for “safely” combining modules; most of these proposals, such

as c-connections (Cuenca Grau, Parsia, & Sirin, 2006a), Distributed Description Logics

(Borgida & Seraﬁni, 2003) and Package-based Description Logics (Bao, Caragea, & Honavar,

2006) propose a specialized semantics for controlling the interaction between the importing

and the imported modules to avoid side-eﬀects. In contrast to these works, we assume here

that reuse is performed by simply building the logical union of the axioms in the modules

under the standard semantics, and we establish a collection of reasoning services, such as

safety testing, to check for side-eﬀects. The interested reader can ﬁnd in the literature a

detailed comparison between the diﬀerent approaches for combining ontologies (Cuenca

Grau & Kutz, 2007).

5. for information see the homepage of the workshop http://www.cild.iastate.edu/events/womo.html

310

Modular Reuse of Ontologies: Theory and Practice

8. Implementation and Proof of Concept

In this section, we provide empirical evidence of the appropriateness of locality for safety

testing and module extraction. For this purpose, we have implemented a syntactic loca-

lity checker for the locality classes

˜

O

r←∅

A←∅

() and

˜

O

r←∆∆

A←∆

() as well as the algorithm for

extracting modules given in Figure 5 from Section 6.

First, we show that the locality class

˜

O

r←∅

A←∅

() provides a powerful suﬃciency test for

safety which works for many real-world ontologies. Second, we show that

˜

O

r←∅

A←∅

()-based

modules are typically very small compared to both the size of the ontology and the modules

extracted using other techniques. Third, we report on our implementation in the ontology

editor Swoop (Kalyanpur, Parsia, Sirin, Cuenca Grau, & Hendler, 2006) and illustrate the

combination of the modularization procedures based on the classes

˜

O

r←∅

A←∅

() and

˜

O

r←∆∆

A←∆

().

8.1 Locality for Testing Safety

We have run our syntactic locality checker for the class

˜

O

r←∅

A←∅

() over the ontologies from a

library of 300 ontologies of various sizes and complexity some of which import each other

(Gardiner, Tsarkov, & Horrocks, 2006).

6

For all ontologies { that import an ontology O,

we check if { belongs to the locality class for S = Sig({) ∩ Sig(O).

It turned out that from the 96 ontologies in the library that import other ontologies, all

but 11 were syntactically local for S (and hence also semantically local for S). From the 11

non-local ontologies, 7 are written in the OWL-Full species of OWL (Patel-Schneider et al.,

2004) to which our framework does not yet apply. The remaining 4 non-localities are due

to the presence of so-called mapping axioms of the form A ≡ B

t

, where A / ∈ S and B

t

∈ S.

Note that these axioms simply indicate that the atomic concepts A, B

t

in the two ontologies

under consideration are synonyms. Indeed, we were able to easily repair these non-localities

as follows: we replace every occurrence of A in { with B

t

and then remove this axiom from

the ontology. After this transformation, all 4 non-local ontologies turned out to be local.

8.2 Extraction of Modules

In this section, we compare three modularization

7

algorithms that we have implemented

using Manchester’s OWL API:

8

A1: The Prompt-Factor algorithm (Noy & Musen, 2003);

A2: The segmentation algorithm proposed by Cuenca Grau et al. (2006);

A3: Our modularisation algorithm (Algorithm 5), based on the locality class

˜

O

r←∅

A←∅

().

The aim of the experiments described in this section is not to provide a throughout com-

parison of the quality of existing modularization algorithms since each algorithm extracts

“modules” according to its own requirements, but rather to give an idea of the typical size

of the modules extracted from real ontologies by each of the algorithms.

6. The library is available at http://www.cs.man.ac.uk/

~

horrocks/testing/

7. In this section by “module” we understand the result of the considered modularization procedures which

may not necessarily be a module according to Deﬁnition 10 or 12

8. http://sourceforge.net/projects/owlapi

311

Cuenca Grau, Horrocks, Kazakov, & Sattler

(a) Modularization of NCI (a) Modularization of NCI (b) Modularization of GALEN-Small (b) Modularization of GALEN-Small

(c) Modularization of SNOMED (c) Modularization of SNOMED (d) Modularization of GALEN-Full (d) Modularization of GALEN-Full

(e) Small modules of GALEN-Full (e) Small modules of GALEN-Full (f) Large modules of GALEN-Full (f) Large modules of GALEN-Full

Figure 6: Distribution for the sizes of syntactic locality-based modules: the X-Axis gives the

number of concepts in the modules and the Y-Axis the number of modules extracted for

each size range.

312

Modular Reuse of Ontologies: Theory and Practice

Ontology Atomic A1: Prompt-Factor A2: Segmentation A3: Loc.-based mod.

Concepts Max.(%) Avg.(%) Max.(%) Avg.(%) Max.(%) Avg.(%)

NCI 27772 87.6 75.84 55 30.8 0.8 0.08

SNOMED 255318 100 100 100 100 0.5 0.05

GO 22357 1 0.1 1 0.1 0.4 0.05

SUMO 869 100 100 100 100 2 0.09

GALEN-Small 2749 100 100 100 100 10 1.7

GALEN-Full 24089 100 100 100 100 29.8 3.5

SWEET 1816 96.4 88.7 83.3 51.5 1.9 0.1

DOLCE-Lite 499 100 100 100 100 37.3 24.6

Table 6: Comparison of Diﬀerent Modularization Algorithms

As a test suite, we have collected a set of well-known ontologies available on the Web,

which we divided into two groups:

Simple. In this group, we have included the National Cancer Institute (NCI) Ontology,

9

the SUMO Upper Ontology,

10

the Gene Ontology (GO),

11

and the SNOMED Ontology

12

.

These ontologies are expressed in a simple ontology language and are of a simple structure;

in particular, they do not contain GCIs, but only deﬁnitions.

Complex. This group contains the well-known GALEN ontology (GALEN-Full),

13

the

DOLCE upper ontology (DOLCE-Lite),

14

and NASA’s Semantic Web for Earth and En-

vironmental Terminology (SWEET)

15

. These ontologies are complex since they use many

constructors from OWL DL and/or include a signiﬁcant number of GCIs. In the case of

GALEN, we have also considered a version GALEN-Small that has commonly been used as

a benchmark for OWL reasoners. This ontology is almost 10 times smaller than the original

GALEN-Full ontology, yet similar in structure.

Since there is no benchmark for ontology modularization and only a few use cases are

available, there is no systematic way of evaluating modularization procedures. Therefore

we have designed a simple experiment setup which, even if it may not necessarily reﬂect

an actual ontology reuse scenario, it should give an idea of typical module sizes. For each

ontology, we took the set of its atomic concepts and extracted modules for every atomic

concept. We compare the maximal and average sizes of the extracted modules.

It is worth emphasizing here that our algorithm A3 does not just extract a module for

the input atomic concept: the extracted fragment is also a module for its whole signature,

which typically includes a fair amount of other concepts and roles.

9. http://www.mindswap.org/2003/CancerOntology/nciOncology.owl

10. http://ontology.teknowledge.com/

11. http://www.geneontology.org

12. http://www.snomed.org

13. http://www.openclinical.org/prj_galen.html

14. http://www.loa-cnr.it/DOLCE.html

15. http://sweet.jpl.nasa.gov/ontology/

313

Cuenca Grau, Horrocks, Kazakov, & Sattler

(a) Concepts DNA Sequence and

Microanatomy in NCI

(b)

˜

O

r←∅

A←∅

(S)-based module for

DNA Sequence in NCI

(c)

˜

O

r←∆×∆

A←∆

(S)-based module for

Micro Anatomy in the fragment 7b

Figure 7: The Module Extraction Functionality in Swoop

The results we have obtained are summarized in Table 6. The table provides the size

of the largest module and the average size of the modules obtained using each of these

algorithms. In the table, we can clearly see that locality-based modules are signiﬁcantly

smaller than the ones obtained using the other methods; in particular, in the case of SUMO,

DOLCE, GALEN and SNOMED, the algorithms A1 and A2 retrieve the whole ontology as

the module for each input signature. In contrast, the modules we obtain using our algorithm

are signiﬁcantly smaller than the size of the input ontology.

For NCI, SNOMED, GO and SUMO, we have obtained very small locality-based mo-

dules. This can be explained by the fact that these ontologies, even if large, are simple

in structure and logical expressivity. For example, in SNOMED, the largest locality-based

module obtained is approximately 0.5% of the size of the ontology, and the average size of

the modules is 1/10 of the size of the largest module. In fact, most of the modules we have

obtained for these ontologies contain less than 40 atomic concepts.

For GALEN, SWEET and DOLCE, the locality-based modules are larger. Indeed, the

largest module in GALEN-Small is 1/10 of the size of the ontology, as opposed to 1/200

in the case of SNOMED. For DOLCE, the modules are even bigger—1/3 of the size of

the ontology—which indicates that the dependencies between the diﬀerent concepts in the

ontology are very strong and complicated. The SWEET ontology is an exception: even

though the ontology uses most of the constructors available in OWL, the ontology is heavily

underspeciﬁed, which yields small modules.

In Figure 6, we have a more detailed analysis of the modules for NCI, SNOMED,

GALEN-Small and GALEN-Full. Here, the X-axis represents the size ranges of the ob-

314

Modular Reuse of Ontologies: Theory and Practice

tained modules and the Y-axis the number of modules whose size is within the given range.

The plots thus give an idea of the distribution for the sizes of the diﬀerent modules.

For SNOMED, NCI and GALEN-Small, we can observe that the size of the modules

follows a smooth distribution. In contrast, for GALEN-Full, we have obtained a large number

of small modules and a signiﬁcant number of very big ones, but no medium-sized modules

in-between. This abrupt distribution indicates the presence of a big cycle of dependencies in

the ontology. The presence of this cycle can be spotted more clearly in Figure 6(f); the ﬁgure

shows that there is a large number of modules of size in between 6515 and 6535 concepts.

This cycle does not occur in the simpliﬁed version of GALEN and thus we obtain a smooth

distribution for that case. In contrast, in Figure 6(e) we can see that the distribution for

the “small” modules in GALEN-Full is smooth and much more similar to the one for the

simpliﬁed version of GALEN.

The considerable diﬀerences in the size of the modules extracted by algorithms A1 –

A3 are due to the fact that these algorithms extract modules according to diﬀerent require-

ments. Algorithm A1 produces a fragment of the ontology that contains the input atomic

concept and is syntactically separated from the rest of the axioms—that is, the fragment

and the rest of the ontology have disjoint signatures. Algorithm A2 extracts a fragment of

the ontology that is a module for the input atomic concept and is additionally semantically

separated from the rest of the ontology: no entailment between an atomic concept in the

module and an atomic concept not in the module should hold in the original ontology. Since

our algorithm is based on weaker requirements, it is to be expected that it extracts smaller

modules. What is surprising is that the diﬀerence in the size of modules is so signiﬁcant.

In order to explore the use of our results for ontology design and analysis, we have

integrated our algorithm for extracting modules in the ontology editor Swoop (Kalyanpur

et al., 2006). The user interface of Swoop allows for the selection of an input signature and

the retrieval of the corresponding module.

16

Figure 7a shows the classiﬁcation of the concepts DNA Sequence and Microanatomy in

the NCI ontology. Figure 7b shows the minimal

˜

O

r←∅

A←∅

()-based module for DNA Sequence,

as obtained in Swoop. Recall that, according to Corollary 47, a

˜

O

r←∅

A←∅

()-based module for an

atomic concept contains all necessary axioms for, at least, all its (entailed) super-concepts

in O. Thus this module can be seen as the “upper ontology” for A in O. In fact, Figure 7

shows that this module contains only the concepts in the “path” from DNA Sequence to

the top level concept Anatomy Kind. This suggests that the knowledge in NCI about the

particular concept DNA Sequence is very shallow in the sense that NCI only “knows” that a

DNA Sequence is a macromolecular structure, which, in the end, is an anatomy kind. If one

wants to reﬁne the module by only including the information in the ontology necessary to

entail the “path” from DNA Sequence to Micro Anatomy, one could extract the

˜

O

r←∆∆

A←∆

()-

based module for Micro Anatomy in the fragment 7b. By Corollary 47, this module contains

all the sub-concepts of Micro Anatomy in the previously extracted module. The resulting

module is shown in Figure 7b.

16. The tool can be downloaded at http://code.google.com/p/swoop/

315

Cuenca Grau, Horrocks, Kazakov, & Sattler

9. Conclusion

In this paper, we have proposed a set of reasoning problems that are relevant for ontology

reuse. We have established the relationships between these problems and studied their com-

putability. Using existing results (Lutz et al., 2007) and the results obtained in Section 4, we

have shown that these problems are undecidable or algorithmically unsolvable for the logic

underlying OWL DL. We have dealt with these problems by deﬁning suﬃcient conditions

for a solution to exist, which can be computed in practice. We have introduced and studied

the notion of a safety class, which characterizes any suﬃciency condition for safety of an

ontology w.r.t. a signature. In addition, we have used safety classes to extract modules from

ontologies.

For future work, we would like to study other approximations which can produce small

modules in complex ontologies like GALEN, and exploit modules to optimize ontology

reasoning.

References

Baader, F., Brandt, S., & Lutz, C. (2005). Pushing the cL envelope. In IJCAI-05, Pro-

ceedings of the Nineteenth International Joint Conference on Artiﬁcial Intelligence,

Edinburgh, Scotland, UK, July 30-August 5, 2005, pp. 364–370. Professional Book

Center.

Baader, F., Calvanese, D., McGuinness, D. L., Nardi, D., & Patel-Schneider, P. F. (Eds.).

(2003). The Description Logic Handbook: Theory, Implementation, and Applications.

Cambridge University Press.

Bao, J., Caragea, D., & Honavar, V. (2006). On the semantics of linking and importing in

modular ontologies. In Proceedings of the 5th International Semantic Web Conference

(ISWC-2006), Athens, GA, USA, November 5-9, 2006, Vol. 4273 of Lecture Notes in

Computer Science, pp. 72–86.

B¨orger, E., Gr¨adel, E., & Gurevich, Y. (1997). The Classical Decision Problem. Perspectives

of Mathematical Logic. Springer-Verlag. Second printing (Universitext) 2001.

Borgida, A., & Seraﬁni, L. (2003). Distributed description logics: Assimilating information

from peer sources. J. Data Semantics, 1, 153–184.

Cuenca Grau, B., Horrocks, I., Kazakov, Y., & Sattler, U. (2007). A logical framework

for modularity of ontologies. In IJCAI-07, Proceedings of the Twentieth International

Joint Conference on Artiﬁcial Intelligence, Hyderabad, India, January 2007, pp. 298–

304. AAAI.

Cuenca Grau, B., & Kutz, O. (2007). Modular ontology languages revisited. In Proceedings

of the Workshop on Semantic Web for Collaborative Knowledge Acquisition, Hyder-

abad, India, January 5, 2007.

Cuenca Grau, B., Parsia, B., & Sirin, E. (2006a). Combining OWL ontologies using c-

connections. J. Web Sem., 4(1), 40–59.

Cuenca Grau, B., Parsia, B., Sirin, E., & Kalyanpur, A. (2006b). Modularity and web ontolo-

gies. In Proceedings of the Tenth International Conference on Principles of Knowledge

316

Modular Reuse of Ontologies: Theory and Practice

Representation and Reasoning (KR-2006), Lake District of the United Kingdom, June

2-5, 2006, pp. 198–209. AAAI Press.

Cuenca Grau, B., Horrocks, I., Kazakov, Y., & Sattler, U. (2007). Just the right amount:

extracting modules from ontologies. In Proceedings of the 16th International Confe-

rence on World Wide Web (WWW-2007), Banﬀ, Alberta, Canada, May 8-12, 2007,

pp. 717–726. ACM.

Cuenca Grau, B., Horrocks, I., Kutz, O., & Sattler, U. (2006). Will my ontologies ﬁt

together?. In Proceedings of the 2006 International Workshop on Description Logics

(DL-2006), Windermere, Lake District, UK, May 30 - June 1, 2006, Vol. 189 of CEUR

Workshop Proceedings. CEUR-WS.org.

Gardiner, T., Tsarkov, D., & Horrocks, I. (2006). Framework for an automated compari-

son of description logic reasoners. In Proceedings of the 5th International Semantic

Web Conference (ISWC-2006), Athens, GA, USA, November 5-9, 2006, Vol. 4273 of

Lecture Notes in Computer Science, pp. 654–667. Springer.

Ghilardi, S., Lutz, C., & Wolter, F. (2006). Did I damage my ontology? a case for con-

servative extensions in description logics. In Proceedings of the Tenth International

Conference on Principles of Knowledge Representation and Reasoning (KR-2006),

Lake District of the United Kingdom, June 2-5, 2006, pp. 187–197. AAAI Press.

Horrocks, I., Patel-Schneider, P. F., & van Harmelen, F. (2003). From SHIQ and RDF to

OWL: the making of a web ontology language. J. Web Sem., 1(1), 7–26.

Horrocks, I., & Sattler, U. (2005). A tableaux decision procedure for oHO1O. In Proceedings

of the Nineteenth International Joint Conference on Artiﬁcial Intelligence (IJCAI-05),

Edinburgh, Scotland, UK, July 30-August 5, 2005, pp. 448–453. Professional Book

Center.

Kalfoglou, Y., & Schorlemmer, M. (2003). Ontology mapping: The state of the art. The

Knowledge Engineering Review, 18, 1–31.

Kalyanpur, A., Parsia, B., Sirin, E., Cuenca Grau, B., & Hendler, J. A. (2006). Swoop: A

web ontology editing browser. J. Web Sem., 4(2), 144–153.

Lutz, C., Walther, D., & Wolter, F. (2007). Conservative extensions in expressive description

logics. In Proceedings of the Twentieth International Joint Conference on Artiﬁcial

Intelligence (IJCAI-07), Hyderabad, India, January 2007, pp. 453–459. AAAI.

Lutz, C., & Wolter, F. (2007). Conservative extensions in the lightweight description logic

cL. In Proceedings of the 21st International Conference on Automated Deduction

(CADE-21), Bremen, Germany, July 17-20, 2007, Vol. 4603 of Lecture Notes in Com-

puter Science, pp. 84–99. Springer.

M¨oller, R., & Haarslev, V. (2003). Description logic systems. In The Description Logic

Handbook, chap. 8, pp. 282–305. Cambridge University Press.

Motik, B. (2006). Reasoning in Description Logics using Resolution and Deductive

Databases. Ph.D. thesis, Univesit¨at Karlsruhe (TH), Karlsruhe, Germany.

Noy, N. F. (2004a). Semantic integration: A survey of ontology-based approaches. SIGMOD

Record, 33(4), 65–70.

317

Cuenca Grau, Horrocks, Kazakov, & Sattler

Noy, N. F. (2004b). Tools for mapping and merging ontologies. In Staab, & Studer (Staab

& Studer, 2004), pp. 365–384.

Noy, N., & Musen, M. (2003). The PROMPT suite: Interactive tools for ontology mapping

and merging. Int. Journal of Human-Computer Studies, Elsevier, 6(59).

Patel-Schneider, P., Hayes, P., & Horrocks, I. (2004). Web ontology language OWL Abstract

Syntax and Semantics. W3C Recommendation.

Rector, A., & Rogers, J. (1999). Ontological issues in using a description logic to represent

medical concepts: Experience from GALEN. In IMIA WG6 Workshop, Proceedings.

Schmidt-Schauß, M., & Smolka, G. (1991). Attributive concept descriptions with comple-

ments. Artiﬁcial Intelligence, Elsevier, 48(1), 1–26.

Seidenberg, J., & Rector, A. L. (2006). Web ontology segmentation: analysis, classiﬁcation

and use. In Proceedings of the 15th international conference on World Wide Web

(WWW-2006), Edinburgh, Scotland, UK, May 23-26, 2006, pp. 13–22. ACM.

Sirin, E., & Parsia, B. (2004). Pellet system description. In Proceedings of the 2004 In-

ternational Workshop on Description Logics (DL2004), Whistler, British Columbia,

Canada, June 6-8, 2004, Vol. 104 of CEUR Workshop Proceedings. CEUR-WS.org.

Staab, S., & Studer, R. (Eds.). (2004). Handbook on Ontologies. International Handbooks

on Information Systems. Springer.

Stuckenschmidt, H., & Klein, M. (2004). Structure-based partitioning of large class hier-

archies. In Proceedings of the Third International Semantic Web Conference (ISWC-

2004), Hiroshima, Japan, November 7-11, 2004, Vol. 3298 of Lecture Notes in Com-

puter Science, pp. 289–303. Springer.

Tobies, S. (2000). The complexity of reasoning with cardinality restrictions and nominals

in expressive description logics. J. Artif. Intell. Res. (JAIR), 12, 199–217.

Tsarkov, D., & Horrocks, I. (2006). FaCT++ description logic reasoner: System description.

In Proceedings of the Third International Joint Conference on Automated Reasoning

(IJCAR 2006), Seattle, WA, USA, August 17-20, 2006, Vol. 4130 of Lecture Notes in

Computer Science, pp. 292–297. Springer.

318

Cuenca Grau, Horrocks, Kazakov, & Sattler

2007), which has been motivated by the above-mentioned application needs. In this paper, we focus on the use of modularity to support the partial reuse of ontologies. In particular, we consider the scenario in which we are developing an ontology P and want to reuse a set S of symbols from a “foreign” ontology Q without changing their meaning. For example, suppose that an ontology engineer is building an ontology about research projects, which speciﬁes diﬀerent types of projects according to the research topic they focus on. The ontology engineer in charge of the projects ontology P may use terms such as Cystic Fibrosis and Genetic Disorder in his descriptions of medical research projects. The ontology engineer is an expert on research projects; he may be unfamiliar, however, with most of the topics the projects cover and, in particular, with the terms Cystic Fibrosis and Genetic Disorder. In order to complete the projects ontology with suitable deﬁnitions for these medical terms, he decides to reuse the knowledge about these subjects from a wellestablished medical ontology Q. The most straightforward way to reuse these concepts is to construct the logical union P ∪ Q of the axioms in P and Q. It is reasonable to assume that the additional knowledge about the medical terms used in both P and Q will have implications on the meaning of the projects deﬁned in P; indeed, the additional knowledge about the reused terms provides new information about medical research projects which are deﬁned using these medical terms. Less intuitive is the fact that importing Q may also result in new entailments concerning the reused symbols, namely Cystic Fibrosis and Genetic Disorder. Since the ontology engineer of the projects ontology is not an expert in medicine and relies on the designers of Q, it is to be expected that the meaning of the reused symbols is completely speciﬁed in Q; that is, the fact that these symbols are used in the projects ontology P should not imply that their original “meaning” in Q changes. If P does not change the meaning of these symbols in Q, we say that P ∪ Q is a conservative extension of Q In realistic application scenarios, it is often unreasonable to assume the foreign ontology Q to be ﬁxed; that is, Q may evolve beyond the control of the modelers of P. The ontology engineers in charge of P may not be authorized to access all the information in Q or, most importantly, they may decide at a later time to reuse the symbols Cystic Fibrosis and Genetic Disorder from a medical ontology other than Q. For application scenarios in which the external ontology Q may change, it is reasonable to “abstract” from the particular Q under consideration. In particular, given a set S of “external symbols”, the fact that the axioms in P do not change the meaning of any symbol in S should be independent of the particular meaning ascribed to these symbols by Q. In that case, we will say that P is safe for S. Moreover, even if P “safely” reuses a set of symbols from an ontology Q, it may still be the case that Q is a large ontology. In particular, in our example, the foreign medical ontology may be huge, and importing the whole ontology would make the consequences of the additional information costly to compute and diﬃcult for our ontology engineers in charge of the projects ontology (who are not medical experts) to understand. In practice, therefore, one may need to extract a module Q1 of Q that includes only the relevant information. Ideally, this module should be as small as possible while still guarantee to capture the meaning of the terms used; that is, when answering queries against the research projects ontology, importing the module Q1 would give exactly the same answers as if the whole medical ontology Q had been imported. In this case, importing the module will have the

274

Modular Reuse of Ontologies: Theory and Practice

same observable eﬀect on the projects ontology as importing the entire ontology. Furthermore, the fact that Q1 is a module in Q should be independent of the particular P under consideration. The contributions of this paper are as follows: 1. We propose a set of tasks that are relevant to ontology reuse and formalize them as reasoning problems. To this end, we introduce the notions of conservative extension, safety and module for a very general class of logic-based ontology languages. 2. We investigate the general properties of and relationships between the notions of conservative extension, safety, and module and use these properties to study the relationships between the relevant reasoning problems we have previously identiﬁed. 3. We consider Description Logics (DLs), which provide the formal underpinning of the W3C Web Ontology Language (OWL), and study the computability of our tasks. We show that all the tasks we consider are undecidable or algorithmically unsolvable for the description logic underlying OWL DL—the most expressive dialect of OWL that has a direct correspondence to description logics. 4. We consider the problem of deciding safety of an ontology for a signature. Given that this problem is undecidable for OWL DL, we identify suﬃcient conditions for safety, which are decidable for OWL DL—that is, if an ontology satisﬁes our conditions then it is safe; the converse, however, does not necessarily hold. We propose the notion of a safety class, which characterizes any suﬃciency condition for safety, and identify a family of safety classes–called locality—which enjoys a collection of desirable properties. 5. We next apply the notion of a safety class to the task of extracting modules from ontologies; we provide various modularization algorithms that are appropriate to the properties of the particular safety class in use. 6. We present empirical evidence of the practical beneﬁts of our techniques for safety checking and module extraction. This paper extends the results in our previous work (Cuenca Grau, Horrocks, Kutz, & Sattler, 2006; Cuenca Grau et al., 2007; Cuenca Grau, Horrocks, Kazakov, & Sattler, 2007).

2. Preliminaries

In this section we introduce description logics (DLs) (Baader, Calvanese, McGuinness, Nardi, & Patel-Schneider, 2003), a family of knowledge representation formalisms which underlie modern ontology languages, such as OWL DL (Patel-Schneider, Hayes, & Horrocks, 2004). A hierarchy of commonly-used description logics is summarized in Table 1. The syntax of a description logic L is given by a signature and a set of constructors. A signature (or vocabulary) Sg of a DL is the (disjoint) union of countably inﬁnite sets AC of atomic concepts (A, B, . . . ) representing sets of elements, AR of atomic roles (r, s, . . . ) representing binary relations between elements, and Ind of individuals (a, b, c, . . . ) representing constants. We assume the signature to be ﬁxed for every DL.

275

Cuenca Grau, Horrocks, Kazakov, & Sattler

Rol RBox EL r ALC – – S – – Trans(r) + I r− + H R 1 R2 + F Funct(R) + N ( n S) + Q ( n S.C) + O {i} Here r ∈ AR, A ∈ AC, a, b ∈ Ind, R(i) ∈ Rol, C(i) ∈ Con, n ≥ 1 and S ∈ Rol is a simple role (see (Horrocks & Sattler, 2005)). Table 1: The hierarchy of standard description logics

DLs

Constructors Con , A, C1 C2 , ∃R.C – –, ¬C – –

Axioms [ Ax ] TBox ABox A ≡ C, C1 C2 a : C, r(a, b) – – – – – – – –

Every DL provides constructors for deﬁning the set Rol of (general) roles (R, S, . . . ), the set Con of (general) concepts (C, D, . . . ), and the set Ax of axioms (α, β, . . . ) which is a union of role axioms (RBox), terminological axioms (TBox) and assertions (ABox). EL (Baader, Brandt, & Lutz, 2005) is a simple description logic which allows one to construct complex concepts using conjunction C1 C2 and existential restriction ∃R.C starting from atomic concepts A, roles R and the top concept . EL provides no role constructors and no role axioms; thus, every role R in EL is atomic. The TBox axioms of EL can be either concept deﬁnitions A ≡ C or general concept inclusion axioms (GCIs) C1 C2 . EL assertions are either concept assertions a : C or role assertions r(a, b). In this paper we assume the concept deﬁnition A ≡ C is an abbreviation for two GCIs A C and C A. The basic description logic ALC (Schmidt-Schauß & Smolka, 1991) is obtained from EL by adding the concept negation constructor ¬C. We introduce some additional constructors as abbreviations: the bottom concept ⊥ is a shortcut for ¬ , the concept disjunction C1 C2 stands for ¬(¬C1 ¬C2 ), and the value restriction ∀R.C stands for ¬(∃R.¬C). In contrast to EL, ALC can express contradiction axioms like ⊥. The logic S is an extension of ALC where, additionally, some atomic roles can be declared to be transitive using a role axiom Trans(r). Further extensions of description logics add features such as inverse roles r− (indicated by appending a letter I to the name of the logic), role inclusion axioms (RIs) R1 R2 (+H), functional roles Funct(R) (+F), number restrictions ( n S), with n ≥ 1, (+N ), qualiﬁed number restrictions ( n S.C), with n ≥ 1, (+Q)1 , and nominals {a} (+O). Nominals make it possible to construct a concept representing a singleton set {a} (a nominal concept) from an individual a. These extensions can be used in diﬀerent combinations; for example ALCO is an extension of ALC with nominals; SHIQ is an extension of S with role hierarchies,

1. the dual constructors ( n S) and ( n S.C) are abbreviations for ¬( n + 1 S) and ¬( n + 1 S.¬C), respectively

276

are based on description logics and. Note that the sets AC.C)I = { x ∈ ∆I | {y ∈ ∆I | x.C)I (¬C)I (r− )I = = = = = ∆ C I ∩ DI {x ∈ ∆I | ∃y. & van Harmelen. ·I ). The interpretation function ·I is extended to complex roles and concepts via DLconstructors as follows: ( )I (C D)I (∃R. An axiom α is a tautology if it is valid in the set of all interpretations (or. y. to a certain extent. The signature of an ontology O (of an axiom α) is the set Sig(O) (Sig(α)) of atomic concepts. y | y. b) iﬀ aI . I |= r(a. Modern ontology languages. We say that two sets of interpretations I and J are equal modulo S (notation: I|S = J|S ) if for every I ∈ I there exits J ∈ J such that J |S = I|S and for every J ∈ J there exists I ∈ I such that I|S = J |S . bI ∈ rI . y ∈ RI ∧ x. y ∈ RI ∧ y ∈ C I } ≥ n } {a}I = {aI } The satisfaction relation I |= α between an interpretation I and a DL axiom α (read as I satisﬁes α. such as OWL. z ∈ rI ⇒ x. we assume an ontology O based on a description logic L to be a ﬁnite set of axioms in L. The main reasoning task for ontologies is entailment: given an ontology O and an axiom α. The logical entailment |= is deﬁned using the usual Tarski-style set-theoretic semantics for description logics as follows. y ∈ RI ∧ y ∈ C I } ∆I \ C I { x.Modular Reuse of Ontologies: Theory and Practice inverse roles and qualiﬁed number restrictions. to every r ∈ AR a binary relation rI ⊆ ∆I × ∆I . equivalently. called the domain of the interpretation. x. check if O implies α. and SHOIQ is the DL that uses all the constructors and axiom types we have presented. atomic roles and individuals that occur in O (respectively in α). are syntactic variants thereof. Patel-Schneider. We say that two interpretations I = (∆I . In this paper. z ∈ ∆I [ x. and to every a ∈ Ind an element aI ∈ ∆I . or I is a model of α) is deﬁned as follows: I |= C1 I |= R1 I I C2 iﬀ C1 ⊆ C2 . y ∈ rI ∧ y. y. In particular. x ∈ rI } ( n R)I = { x ∈ ∆I | {y ∈ ∆I | x. y ∈ RI } ≥ n } ( n R. ·I ) and J = (∆J . z ∈ ∆I [ x. z ∈ RI ⇒ y = z ]. I |= Trans(r) iﬀ ∀x. ·J ) coincide on the subset S of the signature (notation: I|S = J |S ) if ∆I = ∆J and X I = X J for every X ∈ S. is implied by the empty ontology). where ∆I is a non-empty set. An ontology O implies an axiom α (written O |= α) if I |= α for every model I of O. 277 . Given a set I of interpretations. z ∈ rI ]. OWL DL corresponds to SHOIN (Horrocks. we say that an axiom α (an ontology O) is valid in I if every interpretation I ∈ I is a model of α (respectively O). An interpretation I is a pair I = (∆I . I |= a : C iﬀ aI ∈ C I . AR and Ind are not deﬁned by the interpretation I but assumed to be ﬁxed for the ontology language (DL). and ·I is the interpretation function that assigns: to every A ∈ AC a subset AI ⊆ ∆I . I |= Funct(R) iﬀ ∀x. An interpretation I is a model of an ontology O if I satisﬁes all axioms in O. 2003). I I R2 iﬀ R1 ⊆ R2 .

we will deﬁne formally the class of ontology languages for which the given deﬁnitions of conservative extensions.Pancreas Genetic Fibrosis ∃associated With.Cuenca Grau. we elaborate on the ontology reuse scenario sketched in Section 1. in particular. The ontology engineer is an expert on research projects: he knows. as given by the axioms P1 and P2 in Figure 1. He may be unfamiliar. we motivate and deﬁne the reasoning tasks to be investigated in the remainder of the paper.Genetic Disorder ∃has Focus.Genetic Origin ∃has Origin. In order to complete the projects ontology with suitable deﬁnitions 278 . In particular.Genetic Disorder Ontology of medical terms Q: M1 Cystic Fibrosis ≡ Fibrosis M2 Genetic Fibrosis ≡ Fibrosis M3 Fibrosis M4 Genetic Fibrosis M5 DEFBI Gene ∃located In. Assume that the ontology engineer deﬁnes two concepts—Genetic Disorder Project and Cystic Fibrosis EUProject—in his ontology P. 3.2). Kazakov.3) and module (Section 3. Horrocks.Cystic Fibrosis Cystic Fibrosis EUProject ≡ EUProject Project Project (Genetic Disorder :: Cystic Fibrosis) ⊥ ∀ has Focus.4). however. our tasks are based on the notions of a conservative extension (Section 3.2 and 3. Project :: ∃has Focus.6. with most of the topics the projects cover and.Genetic Origin ∃located In. The ﬁrst one describes projects about genetic disorders. we assume that L is an ontology language based on a description logic. for example. Based on this application scenario.Pancreas Genetic Disorder Immuno Protein Gene Figure 1: Reusing medical terminology in an ontology on research projects 3. in Section 3. which speciﬁes diﬀerent types of projects according to the research topic they are concerned with.1 A Motivating Example Suppose that an ontology engineer is in charge of a SHOIQ ontology on research projects. These notions are deﬁned relative to a language L. the second one describes European projects about cystic ﬁbrosis. safety and modules apply.Cystic Fibrosis ∃has Focus. Within this section. & Sattler Ontology of medical research projects P: P1 P2 P3 P4 E1 E2 Genetic Disorder Project ≡ Project EUProject ∃has Focus.Cystic Fibrosis ∃has Origin. For the convenience of the reader. that every instance of EUProject must be an instance of Project (the concept-inclusion axiom P3) and that the role has Focus can be applied only to instances of Project (the domain axiom P4). all the tasks we consider in this paper are summarized in Table 2. safety (Sections 3. Ontology Integration and Knowledge Reuse In this section. with the terms Cystic Fibrosis and Genetic Disorder mentioned in P1 and P2.

Importing additional axioms into an ontology may result in new logical consequences. P |= β. The ontology engineer might be not aware of Entailment (2). over the terms deﬁned in the main ontology P. It is natural to expect that entailments like α in (1) from an imported ontology Q result in new logical consequences. that the meaning of the terms deﬁned in Q changes as a consequence of the import since these terms are supposed to be completely speciﬁed within Q. For example.Modular Reuse of Ontologies: Theory and Practice for these medical terms. however. α follows from axioms α1 and M4.” ::: “:::::::::::::: that has Focus on Cystic Fibrosis. Suppose the ontology engineer has formalized the statements (3) and (4) in ontology P using axioms E1 and E2 respectively. In order to illustrate such a situation. Such a side eﬀect would be highly undesirable for the modeling of ontology P since the ontology engineer of P might not be an expert on the subject of Q and is not supposed to alter the meaning of the terms deﬁned in Q not even implicitly. the ontology engineer has introduced modeling errors and. as a consequence. At this point. Using inclusion α from (1) and axioms P1–P3 from ontology P we can now prove that every instance of Cystic Fibrosis EUProject is also an instance of Genetic Disorder Project: P ∪ Q |= β := (Cystic Fibrosis EUProject Genetic Disorder Project) (2) This inclusion β. intuitively. the concept inclusion α1 := (Cystic Fibrosis Genetic Fibrosis) follows from axioms M1 and M2 as well as from axioms M1 and M3. it is easy to see that axioms M1–M4 in Q imply that every instance of Cystic Fibrosis is an instance of Genetic Disorder: Q |= α := (Cystic Fibrosis Genetic Disorder) (1) Indeed. One would not expect. he decides to reuse the knowledge about these subjects from a wellestablished and widely-used medical ontology. does not follow from P alone—that is. might change during the import. also has Focus on Genetic Disorder” Every project (3) (4) Note that the statements (3) and (4) can be thought of as adding new information about projects and. in (2). even though it concerns the terms of primary scope in his projects ontology P. like β. suppose that the ontology engineer has learned about the concepts Genetic Disorder and Cystic Fibrosis from the ontology Q (including the inclusion (1)) and has decided to introduce additional axioms formalizing the following statements: “Every instance of Project is diﬀerent from every instance of Genetic Disorder and every instance of Cystic Fibrosis. The meaning of the reused terms. however. Suppose that Cystic Fibrosis and Genetic Disorder are described in an ontology Q containing the axioms M1-M5 in Figure 1. axioms E1 and E2 do not correspond to (3) and (4): E1 actually formalizes the following statement: “Every instance of Project is diﬀerent from every common instance of Genetic Disorder and Cystic Fibrosis”. and E2 expresses 279 . they should not change or constrain the meaning of the medical terms. to add the axioms from Q to the axioms in P and work with the extended ontology P ∪ Q. The most straightforward way to reuse these concepts is to import in P the ontology Q—that is. perhaps due to modeling errors. however.

Let O and O1 ⊆ O be two Lontologies. or has Focus only on Cystic Fibrosis. like the entailment of new axioms or even inconsistencies involving the reused vocabulary.r.r.t. We say that O is a deductive S-conservative extension of O1 w. Horrocks. L for every S1 ⊆ S. which expresses the inconsistency of the concept Cystic Fibrosis.. the axioms E1 and E2 together with axioms P1-P4 from P imply new axioms about the concepts Cystic Fibrosis and Genetic Disorder. The axioms E1 and E2 not only imply new statements about the medical terms. In the next section we discuss how to formalize the eﬀects we consider undesirable. it is still a consequence of (3) which means that it should not constrain the meaning of the medical terms. although axiom E1 does not correspond to fact (3). These kinds of modeling errors are diﬃcult to detect. but also cause inconsistencies when used together with the imported axioms from Q. we have O |= α iﬀ O1 |= α.Cuenca Grau. To summarize. E2 is not a consequence of (4) and. We say that O is a deductive conservative extension of O1 w.r. L for S = Sig(O1 ). that is. from (1) and (5) we obtain P ∪ Q |= δ := (Cystic Fibrosis ⊥).r. which has recently been investigated in the context of ontologies (Ghilardi. Now. namely their disjointness: P |= γ := (Genetic Disorder Cystic Fibrosis ⊥) (5) The entailment (5) can be proved using axiom E2 which is equivalent to: ∃has Focus.t. & Wolter.t. L if O is a deductive S-conservative extension of O1 w.(Genetic Disorder ¬Cystic Fibrosis) (6) The inclusion (6) and P4 imply that every element in the domain must be a project—that is. 2007). especially when they do not cause inconsistencies in the ontology. the additional axioms in O \ O1 do not result into new logical consequences over the vocabulary S. The notion of a deductive conservative extension can be directly applied to our ontology reuse scenario. This requirement can be naturally formulated using the well-known notion of a conservative extension.t. L. Indeed. Indeed.r. in fact. 3. 280 . Kazakov. if for every axiom α over L with Sig(α) ⊆ S. together with axiom E1. 2006. this implies (5). then O is a deductive S1 -conservative extension of O1 w.2 Conservative Extensions and Safety for an Ontology As argued in the previous section. Note that. P |= ( Project). it constrains the meaning of medical terms. ♦ In other words. Lutz. On the other hand. we have seen that importing an external ontology can lead to undesirable side eﬀects in our knowledge reuse scenario. L. and S a signature over L. Note that if O is a deductive S-conservative extension of O1 w. an important requirement for the reuse of an ontology Q within an ontology P should be that P ∪ Q produces exactly the same logical consequences over the vocabulary of Q as Q alone does.t. also has Focus on Genetic Disorder”. an ontology O is a deductive S-conservative extension of O1 for a signature S and language L if and only if every logical consequence α of O constructed using the language L and symbols only from S. Deﬁnition 1 (Deductive Conservative Extension). & Sattler that “Every object that either has Focus on nothing. is already a logical consequence of O1 . Lutz et al.

The notion of model conservative extension.r.r. that is. For every two L-ontologies O. for every model I of Q there exists a model J of P1 ∪ Q such that I|S = J |S for S = Sig(Q). we say that O is safe for O (or O imports O in a safe way) w. We have shown in Section 3.r. this notion can be used for proving that an ontology is a deductive conservative extension of another. ALC.r.t.Modular Reuse of Ontologies: Theory and Practice Deﬁnition 2 (Safety for an Ontology).. if for every model I of O1 . it is suﬃcient to show that P1 ∪ Q is a model conservative extension of Q. L. L. however.r.r. and E1 and an ontology Q consisting of axioms M1–M5 from Figure 1. L if O ∪ O is a deductive conservative extension of O w. E1. Let O and O1 ⊆ O be two L-ontologies and S a signature over L.1 that.t.t. According to Deﬁnition 1. and Q consisting of axioms M1–M5 from Figure 1. We say that O is a model conservative extension of O1 if O is a model S-conservative extension of O1 for S = Sig(O1 ). We say that O is a model S-conservative extension of O1 . We demonstrate that P1 ∪ Q is a deductive conservative extension of Q. P1 ∪ Q is a deductive conservative extension of Q.. given P consisting of axioms P1–P4. given L-ontologies O and O . 2007) 1. to show that if the axiom E2 is removed from P then for the resulting ontology P1 = P \ {E2}. any language L in which δ can be expressed (e. determine if O is safe for O w.t. Lutz et al. E2. but not vice versa: Proposition 4 (Model vs. Deductive Conservative Extensions. It is possible. there exists a model J of O such that I|S = J |S . and a signature S over L. There exist two ALC ontologies O and O1 ⊆ O such that O is a deductive conservative extension of O1 w. the ﬁrst reasoning task relevant for our ontology reuse scenario can be formulated as follows: T1. ♦ The notion of model conservative extension in Deﬁnition 3 can be seen as a semantic counterpart for the notion of deductive conservative extension in Deﬁnition 1: the latter is deﬁned in terms of logical entailment. whereas the former is deﬁned in terms of models. 2. L = ALC). if O is a model S-conservative extension of O1 then O is a deductive S-conservative extension of O1 w. that is. but O is not a model conservative extension of O1 . Example 5 Consider an ontology P1 consisting of axioms P1–P4. there exists an axiom δ = (Cystic Fibrosis ⊥) that uses only symbols in Sig(Q) such that Q |= δ but P ∪ Q |= δ. L. Intuitively. Given L-ontologies O and O . 2007). According to proposition 4.t. however. an ontology O is a model S-conservative extension of O1 if for every model of O1 one can ﬁnd a model of O over the same domain which interprets the symbols from S in the same way.g. Lutz et al. does not provide a complete characterization of deductive conservative extensions. 281 .t. as given in Deﬁnition 1. The following notion is useful for proving deductive conservative extensions: Deﬁnition 3 (Model Conservative Extension. this means that P ∪ Q is not a deductive conservative extension of Q w. O1 ⊆ O. ♦ Hence.

in our knowledge reuse scenario.r. where β1 = ( Cystic Fibrosis) and β2 = (Genetic Disorder ⊥).r. a language L if and only if it imports in a safe way any ontology O written in L that shares only symbols from S with O.Cuenca Grau. E1 are satisﬁed in J and hence J |= P1 . This makes it possible to continue developing P and Q independently. namely. determine if O is safe for S w. for many application scenarios it is important to develop a stronger safety condition for P which depends as little as possible on the particular ontology Q to be reused.t. By Deﬁnition 6. P1 ∪ Q is a model conservative extension of Q.t.t. Let O be a L-ontology and S a signature over L. it is often convenient to keep Q separate from P and make its axioms available on demand via a reference. L. if for every L-ontology O with Sig(O) ∩ Sig(O ) ⊆ S. 282 . given an L-ontology O and a signature S over L.2. Genetic Disorder}. β2 }. Moreover. Consider an ontology O = {β1 .r. ♦ Intuitively. It is easy to check that all the axioms P1–P4. Genetic Disorder} w. Kazakov. EUProject and the atomic role has Focus. Since E2 is equivalent to axiom (6). or may even decide at a later time to reuse the medical terms (Cystic Fibrosis and Genetic Disorder) from another medical ontology instead. E2 from Figure 1. O ∪ O is not a deductive conservative extension of O . it is possible to show a stronger result. In order to formulate such condition. In practice. Therefore.r. we abstract from the particular ontology Q to be imported and focus instead on the symbols from Q that are to be reused: Deﬁnition 6 (Safety for a Signature). however. since the interpretation of the symbols in Q remains unchanged. the ontology P consisting of axioms P1–P4. & Sattler The required model J can be constructed from I as follows: take J to be identical to I except for the interpretations of the atomic concepts Genetic Disorder Project. 2007. The associated reasoning problem is then formulated in the following way: T2.t. all of which we interpret in J as the empty set. As seen in Section 3. L = ALC. L. In fact. it is easy to see that O ∪ O is inconsistent.r. For an example of Statement 2 of the Proposition.3 Safety of an Ontology for a Signature So far.. 455). that is.r. that any ontology O containing axiom E2 is not safe for S = {Cystic Fibrosis. L. We say that O is safe for S w. which is not entailed by O . β1 and β2 imply the contradiction α = ( ⊥). Hence. in our ontology reuse scenario we have assumed that the reused ontology Q is ﬁxed and the axioms of Q are just copied into P during the import. O ∪ O is a deductive conservative extension of O w.t. L.t. the ontology engineers of the project ontology P may not be willing to depend on a particular version of Q. we have I|Sig(Q) = J |Sig(Q) and J |= Q. we have that O is safe for O w. Hence.r. p. the ontology P is not safe for S w. does not import Q consisting of axioms M1–M5 from Figure 1 in a safe way for L = ALC. this means that O is not safe for S. an ontology O is safe for a signature S w. we refer the interested reader to the literature (Lutz et al. Cystic Fibrosis EUProject. Horrocks. Project. L. since Sig(O) ∩ Sig(O ) ⊆ S.t. According to Deﬁnition 6. For example. since Sig(P) ∩ Sig(Q) ⊆ S = {Cystic Fibrosis. E1. ♦ 3. Indeed E2.

Then O is safe for S w. Model Conservative Extensions) Let O be an L-ontology and S a signature over L such that O is a model S-conservative extension of the empty ontology O1 = ∅. however. It is not so clear. for every interpretation I there exists a model J of O such that J |S = I|S . Lemma 7 allows us to identify a condition suﬃcient to ensure the safety of an ontology for a signature: Proposition 8 (Safety for a Signature vs. () Since O is a model S-conservative extension of O1 . L according to Deﬁnition 6.t. since Sig(O ) ⊆ S . O1 ⊆ O. for every S-interpretation I there exists a model J of P1 such that I|S = J |S . such that O ∪ O is not a deductive conservative extension of O . L = SHOIQ. since O is a model S-conservative extension of O1 = ∅. we have J |= O. In particular. Hence J |= O ∪ O and I|S = J |S . The following lemma introduces a property which relates the notion of model conservative extension with the notion of safety for a signature. J is a model of P1 and I|Sig(Q) = J |Sig(Q) where Q consists of axioms M1–M5 from Figure 1. We show that P1 is safe for S = {Cystic Fibrosis. L. It turns out that the notion of model conservative extensions can also be used for this purpose. Since J |Sig(O) = J1 |Sig(O) and J1 |= O.Modular Reuse of Ontologies: Theory and Practice It is clear how one could prove that an ontology O is not safe for a signature S: simply ﬁnd an ontology O with Sig(O) ∩ Sig(O ) ⊆ S.r. Genetic Disorder} w. Proof. As shown in Example 5. () Indeed. we have I|S = J |S .r. and E1 from Figure 1.r. Intuitively. it says that the notion of model conservative extension is stable under expansion with new axioms provided they share only symbols from S with the original ontologies. We just construct a model J of O ∪ O such that I|S = J |S . and I |= O . and Sig(O)∩Sig(O ) ⊆ S.t. we have J |= O . by Lemma 7. how one could prove that O is safe for S. In order to prove that O is safe for S w. Since Sig(O) ∩ S = Sig(O) ∩ (S ∪ Sig(O )) ⊆ S ∪ (Sig(O) ∩ Sig(O )) ⊆ S and I|S = J1 |S . by Deﬁnition 3 there exists a model J1 of O such that I|S = J1 |S . let I be a model of O1 ∪ O . Proof. Example 9 Let P1 be the ontology consisting of axioms P1–P4. and O be L-ontologies and S a signature over L such that O is a model S-conservative extension of O1 and Sig(O) ∩ Sig(O ) ⊆ S. take any SHOIQ ontology O such that Sig(O) ∩ Sig(O ) ⊆ S. Sig(O ) ⊆ S . that is. that is. since S ⊆ Sig(Q). as was required to prove ( ). ♦ 283 . L.t. such interpretation J always exists.t.r. In order to show that O∪O is a model S -conservative extension of O1 ∪O according to Deﬁnition 3. we have that O ∪ O is a deductive conservative extension of O . which proves ( ). in order to prove safety for P1 it is suﬃcient to demonstrate that P1 is a model S-conservative extension of the empty ontology. Consider the model J obtained from I as in Example 5. Let J be an interpretation such that J |Sig(O) = J1 |Sig(O) and J |S = I|S . Then O ∪ O is a model S -conservative extension of O1 ∪ O for S = S ∪ Sig(O ). Lemma 7 Let O. We need to demonstrate that O ∪ O is a deductive conservative extension of O w. we have that O∪O is a model S -conservative extension of O1 ∪O = O for S = S ∪ Sig(O ). since J |S = I|S . In particular. By Proposition 8. and I is a model of O1 .

Deﬁnition 10 (Module for an Ontology). Indeed. and the interpretations of atomic roles located In and 284 .r. M4 and M5. Let J be deﬁned exactly as I except that the interpretations of the atomic concepts Fibrosis. Similarly. can be very large and may describe subject matters in which the designer of P is not interested. P1 ∪ Q |= α. M2. Q0 is not a module for P1 in Q w. We need to construct a model J of P1 ∪ Q such that I|S = J |S . L = ALC for S = Sig(P1 ). processing— that is. etc. In particular P1 ∪ Q0 |= α.t. & Sattler 3. L.t. however.r. Horrocks. Pancreas. In particular. ♦ The task of extracting modules from imported ontologies in our ontology reuse scenario can be thus formulated as follows: T3. As usual.r. O and O1 ⊆ O be L-ontologies.t.r. For example. On the other hand. when answering an arbitrary query over the signature of P. Genetic Fibrosis. consider any model I of P1 ∪ Q1 . surgical techniques. one would like to extract a (hopefully small) fragment Q1 of the external medical ontology—a module—that describes just the concepts that are reused in P. etc—the resulting ontology P ∪ Q may be considerably harder than processing P alone. Ideally. To do so. M4} and Q2 = {M1. for the subset Q0 of Q consisting of axioms M2. we need to demonstrate that P1 ∪ Q is a deductive S-conservative extension of both P1 ∪ Q1 and P1 ∪ Q2 for S = Sig(P1 ) w. Deﬁnition 10. L. Even if P imports Q without changing the meaning of the reused symbols. Sig(α) ⊆ S but P1 ∪ Q0 |= α.t. M3. P1 . M3 and M4 from ontology Q. that P1 ∪ Q is a model S-conservative extension of P1 ∪ Q1 and of P1 ∪ Q2 for S which is suﬃcient by Claim 1 of Proposition 4. since P1 ∪ Q is not an deductive S-conservative extension of P1 ∪ Q0 w.t. Example 11 Consider the ontology P1 consisting of axioms P1–P4. O .r.t. we demonstrate a stronger fact. browsing. Intuitively. it is possible to show that both subsets Q1 = {M1. compute a module O1 for O in O w. Let O. M2 and M4 as well as of axioms M1. We say that O1 is a module for O in O w. In order to show that P1 ∪ Q is a model S-conservative extension of P1 ∪ Q1 for S = Sig(P1 ). Recall that the axiom α from (1) is a consequence of axioms M1. M3. the medical ontology Q could contain information about genes. these sets of axioms are actually minimal subsets of Q that imply α. L = ALC or its extensions. L. we have Q0 |= α.r. given L-ontologies O. according to Deﬁnition 10. M4} of Q are modules for P1 in Q w.r. L = SHOIQ. one can show that any subset of Q that does not imply α is not a module in Q w.t. Kazakov.t. In fact.Cuenca Grau. importing the module Q1 should give exactly the same answers as if the whole ontology Q had been imported. E1 and the ontology Q consisting of axioms M1–M5 from Figure 1. It can be demonstrated that P1 ∪ Q0 is a deductive conservative extension of Q0 . L. anatomy. and Genetic Origin are deﬁned as the interpretation of Cystic Fibrosis in I.4 Extraction of Modules from Ontologies In our example from Figure 1 the medical ontology Q is very small. But then. reasoning over.r. if O ∪ O is a deductive S-conservative extension of O ∪ O1 for S = Sig(O) w. Well established medical ontologies.

In this way. we have demonstrated that the modules for P in Q are exactly those subsets of Q that imply α.r. In order to prove that O1 is a module for S in O w. () 285 . L for S = Sig(O).r. Then O1 is a module for S in O w. compute a module O1 for S in O . O ∪ O is a deductive S -conservative extension of O ∪ O1 w. because Genetic Fibrosis and Genetic Disorder are interpreted in J like Cystic Fibrosis and Genetic Disorder in I. L. it is possible to demonstrate that any subset of Q that implies axiom α. P1 ∪ Q is also a model S-conservative extension of P1 ∪ Q2 .Modular Reuse of Ontologies: Theory and Practice has Origin are deﬁned as the identity relation.t. we have that O1 is a module for O in O w. the construction above works if we replace Q1 with any subset of Q that implies α. Since the extraction of modules is potentially an expensive operation. Genetic Disorder} in Q. it can be imported instead of Q into every ontology O that shares with Q only symbols from S. and I is a model of Q1 . given a L-ontology O and a signature S over L.r. thus P1 ∪ Q is a model S-conservative extension of P1 ∪ Q1 . which implies the concept inclusion α = (Cystic Fibrosis Genetic Disorder). take any SHOIQ ontology O such that Sig(O) ∩ Sig(O ) ⊆ S. that is.t.t. ♦ Intuitively.t. However. Model Conservative Extensions) Let O and O1 ⊆ O be L-ontologies and S a signature over L such that O is a model S-conservative extension of O1 . This idea motivates the following deﬁnition: Deﬁnition 12 (Module for a Signature). the module has to be extracted again since a module Q1 for P in Q might not necessarily be a module for the modiﬁed ontology. J also satisﬁes all axioms from P1 .r. J is a model of M4. it would be more convenient to extract a module only once and reuse it for any version of the ontology P that reuses the speciﬁed symbols from Q. Continuing Example 11. is in fact a module for S = {Cystic Fibrosis. L. Proof. in a similar way as the notion of safety for a signature is a uniform analog of safety for an ontology. L.r. We need to demonstrate that O1 is a module for O in O w. In particular. the notion of a module for a signature is a uniform analog of the notion of a module for an ontology. Since we do not modify the interpretation of the symbols in P1 . when the ontology P is modiﬁed. L according to Deﬁnition 12. We say that O1 is a module for S in O (or an S-module in O ) w.t.t. Hence we have constructed a model J of P1 ∪ Q such that I|S = J |S . Let O and O1 ⊆ O be L-ontologies and S a signature over L. according to Deﬁnition 10. ♦ An algorithm implementing the task T3 can be used for extracting a module from an ontology Q imported into P prior to performing reasoning over the terms in P. L. Moreover. In order to prove this. The reasoning task corresponding to Deﬁnition 12 can be formulated as follows: T4. we use the following suﬃcient condition based on the notion of model conservative extension: Proposition 13 (Modules for a Signature vs. if for every L-ontology O with Sig(O) ∩ Sig(O ) ⊆ S. It is easy to see that axioms M1–M3 and M5 are satisﬁed in J . that is.r. In fact.

Hence it is reasonable to consider the problem of extracting minimal modules. Horrocks. but the axiom M5 is not essential. as was required to prove ( ). It might be necessary to import such axioms into P in order not to lose essential information from Q. We demonstrate that any subset Q1 of Q which implies α is a module for S = {Cystic Fibrosis. and Q2 = {M1.Cuenca Grau. ♦ In our example above the axioms M1–M4 from Q are essential for the ontology P1 and for the signature S = {Cystic Fibrosis. the extracted modules should be as small as possible.r. 3. E1} as well as for the signature S = {Cystic Fibrosis. L (or S-essential in O ) if α is contained in some minimal module for S in O w. Let O and O be L-ontologies. Ideally. Genetic Disorder} in Q. thus they never need not be imported into P. Examples 11 and 14 demonstrate that a minimal module for an ontology or a signature is not necessarily unique: the ontology Q consisting of axioms M1–M5 has two minimal modules Q1 = {M1. P3. for every model I of Q1 there exists a model J of Q such that I|S = J |S . Note that 286 . for the ontology P1 = {P1. It is easy to see that if the model J is constructed from I as in Example 11.t. Axioms that do not occur in a minimal module in Q are not essential for P because they can always be removed from every module of Q. M4}. but in extracting modules that are easy to process afterwards. the module Q1 consisting of the axiom M1. L. For example. Also note that even in a minimal module like Q1 there might still be some axioms like M2 that do not mention symbols from S at all. since O is a model S-conservative extension of O1 . M2. whereas in others any minimal module suﬃces. since S = Sig(O) ⊆ S .r. L. M2 and M4 from Q does not contain axiom M5 which mentions the atomic concept Cystic Fibrosis from S. that is. L if α is contained in any minimal module in O for O w.r. We say that α is essential for O in O w. since these are the minimal sets of axioms that imply axiom α = (Cystic Fibrosis Genetic Disorder). it is suﬃcient to demonstrate that Q is a model S-conservative extension of Q1 . M3. Genetic Disorder}. Example 14 Let Q and α be as in Example 11. that is. According to Proposition 13.t. ♦ Note that a module for a signature S in Q does not necessarily contain all the axioms that contain symbols from S. which can be done by computing the union of all minimal modules. In particular. P2. M4}.t. one can consider several variations of tasks T3 and T4 for computing minimal modules. In certain situations one might be interested in computing the set of essential axioms of an ontology. L. we have that O ∪ O is a model S -conservative extension of O1 ∪ O for S = S ∪ Sig(O). These arguments motivate the following notion: Deﬁnition 15 (Essential Axiom). we have that O ∪ O is a deductive S -conservative extension of O1 ∪ O w. by Lemma 7.t. & Sattler Indeed. We say that α is an essential axiom for S in O w.r.5 Minimal Modules and Essential Axioms One is usually not interested in extracting arbitrary modules from a reused ontology. S a signature and α an axiom over L. Kazakov.r. modules that contain no other module as a subset. then the required property holds. Genetic Disorder}. Depending on the application scenario. This is not true for the axioms that occur in minimal modules of Q.t. and Sig(O ) ∩ Sig(O) ⊆ S. In some applications it might be necessary to extract all minimal modules.

The ontology language OWL DL as well as all description 287 . S. L Extract modules in O w. Further variants of the tasks T3 and T4 could be considered relevant to ontology reuse. however. a function that assigns to each formula its signature. and an entailment relation between sets of axioms. For example. and |= is the entailment relation between sets of axioms O ⊆ Ax and axioms α ∈ Ax. The theoretical results that we will present in this paper can easily be extended to many such reasoning tasks. Our deﬁnitions apply to any ontology language with a notion of entailment of axioms from ontologies. The notions considered in Section 3 can be applied. or in any other complexity measure of the ontology. So far. we have implicitly assumed that the ontology languages are the description logics deﬁned in Section 2—that is.r. Ax is a set of axioms in L. In Table 2 we have summarized the reasoning tasks we found to be potentially relevant for ontology reuse scenarios and have included the variants T3am. S.6 Safety and Modules for General Ontology Languages All the notions introduced in Section 3 are deﬁned with respect to an “ontology language”. written O |= α. and a mechanism for identifying their signatures. Sig.s. however. O .r. L Task Check if O is safe for O w. the fragments of the DL SHOIQ.t. L Check if O is safe for S w. O and L Extract modules for S in O w.u][m] Input O. We extend the function Sig to ontologies O as follows: Sig(O) := α∈O Sig(α). O are ontologies and S a signature over L Table 2: Summary of reasoning tasks relevant for ontology integration and reuse computing the union of minimal modules might be easier than computing all the minimal modules since one does not need to identify which axiom belongs to which minimal module. An ontology language is a tuple L = (Sg.r. and T4um of the task T4 for computation of minimal modules discussed in this section. to a much broader class of ontology languages. L Checking Safety: Extracting of [all / some / union of] [minimal] module(s): where O. |=). L O. Deﬁnition 16.Modular Reuse of Ontologies: Theory and Practice Notation T1 T2 T3[a.t. A language L is given by a set of symbols (a signature). T3sm.s. where Sg is a set of signature elements (or vocabulary) of L. instead of computing minimal modules. and T3um of the task T3 and T4am. L O. Ax. L O .u][m] T4[a.r. ♦ Deﬁnition 16 provides a very general notion of an ontology language. a set of formulae (axioms) that can be constructed over those symbols. T4sm. 3.t. An ontology over L is a ﬁnite set of axioms O ⊆ Ax. Sig is a function that assigns to every axiom α ∈ Ax a ﬁnite set Sig(α) ⊆ Sg called the signature of α. or modules of the smallest size measured in the number of symbols. one might be interested in computing modules with the smallest number of axioms. O .t.

as well as all the reasoning tasks from Table 2. 2.r. L for S = Sig(O).t.r. By Deﬁnition 12.r. L iﬀ (a) for every O with Sig(O ) ∩ Sig(O) ⊆ S. Modules for an Ontology) Let L be an ontology language. To simplify the presentation. safety (Deﬁnitions 2 and 6) and modules (Deﬁnitions 10 and 12). L iﬀ (b) for every O with Sig(O ) ∩ Sig(O) ⊆ S. it is the case that O0 = ∅ is a module for O in O w. and Logic Programs. By Deﬁnition 10. it is the case that O is safe for O w. 2.r.t.t.t.t.r.Cuenca Grau. such as Higher Order Logic. O \ O1 is safe for S ∪ Sig(O1 ) w. 8. By Claim 1 of Proposition 17. 2. and O1 ⊆ O be ontologies over L. Horrocks. Second Order Logic. L for S = Sig(O).t.t.t. Proof.t. By 288 . O is safe for O w.t. we will not formulate general requirements on the semantics of ontology languages.r. L. In the remainder of this section. The deﬁnition of model conservative extension (Deﬁnition 3) and the propositions involving model conservative extensions (Propositions 4. It is easy to see that the notions of deductive conservative extension (Deﬁnition 1). By Deﬁnition 6. Modules for a Signature) Let L be an ontology language. It is easy to see that (a) is the same as (b). then O1 is an S-module in O w. L. by Deﬁnition 10.r. with Sig(O \ O1 ) ∩ Sig(O) ⊆ S ∪ Sig(O1 ). ontologies over L. 1. Other examples of ontology languages are First Order Logic.r.r.t. 1. L iﬀ (a) O ∪ O is a deductive conservative extension of O w. L.r. however.t. By Deﬁnition 2. By Deﬁnition 6. O \ O1 is safe for O ∪ O1 w. L. L iﬀ (b) O ∪ O is a deductive S-conservative extension of O ∪ O0 = O w.r.r. which implies. Kazakov. and assume that we deal with sublanguages of SHOIQ whenever semantics is taken into account.r. we have that O \ O1 is safe for O w.t.t. and 13) can be also extended to other languages with a standard Tarski model-theoretic semantics. L. O is safe for S w. 2. L iﬀ the empty ontology is a module for O in O w. L. By Deﬁnition 2.r. Proposition 17 (Safety vs. it is easy to see that (a) is equivalent to (b). L.t.r.r. Proof.r. the empty ontology O0 = ∅ is a module for O in O w. We also provide the analog of Proposition 17 for the notions of safety and modules for a signature: Proposition 18 (Safety vs. If O \ O1 is safe for S ∪ Sig(O1 ) w.r. O is safe for S w. L iﬀ (c) O ∪ O1 ∪ (O \ O1 ) = O ∪ O is a deductive conservative extension of O ∪ O1 w.t.t.t. L. L. In particular. L. O0 = ∅ is an S-module in O w.r. If O \ O1 is safe for O ∪ O1 then O1 is a module for O in O w. and let O. are well-deﬁned for every ontology language L given by Deﬁnition 16.t. L. O and O1 ⊆ O . O . L iﬀ (c) for every O. we establish the relationships between the diﬀerent notions of safety and modules for arbitrary ontology languages.t. & Sattler logics deﬁned in Section 2 are examples of ontology languages in accordance to Deﬁnition 16. Then: 1. O is safe for O w. O ∪ O is a deductive S-conservative extension of O ∪ O1 w.r. and S a subset of the signature of L. that O1 is a module for O in O w.t.r. Then: 1. L iﬀ the empty ontology O0 = ∅ is an S-module in O w.

L iﬀ. by (c) we have that O \ O1 is safe ˜ for O = O ∪ O1 w. L.r.t.t. Hence. Given ontologies O.r. Conversely. L is 2-EXPTIMEcomplete for L = ALC (Ghilardi et al. Recently. Given O1 ⊆ O over a language L. O ..t. L which implies by Claim 2 of Proposition 17 that O1 is a module for O in O w. L is EXPTIME-complete for L = EL. Hence. Indeed. We demonstrate that most of these reasoning tasks are algorithmically unsolvable even for relatively inexpressive DLs. These results can be immediately applied to the notions of safety and modules for an ontology: Proposition 19 Given ontologies O and O over L.r. L if O ∪ O is a deductive S-conservative extension of O ∪ O1 for S = Sig(O) w.r. 2006). 2-EXPTIME complete for L = ALC and L = ALCIQ.r. who showed that the problem is 2-EXPTIME-complete for L = ALCIQ and undecidable for L = ALCIQO. the problem of determining whether O is safe for O w.t. the problem of deciding whether O is a deductive conservative extension of O1 w. Undecidability and Complexity Results In this section we study the computational properties of the tasks in Table 2 for ontology languages that correspond to fragments of the description logic SHOIQ. L.t. by Claim 1 of Proposition 17.r.t. Note that Sig(O \ O ) ∩ Sig(O) = Sig(O \ O ) ∩ (Sig(O) ∪ Sig(O )) ⊆ ˜ Let O 1 1 1 1 (Sig(O \ O1 ) ∩ Sig(O)) ∪ Sig(O1 ) ⊆ S ∪ Sig(O1 ). 2007).r.r. 2-EXPTIME-complete for L = ALC and L = ALCIQ. O0 = ∅ is a module for O1 in O \ O1 w. This result was extended by Lutz et al. and are computationally hard for simple DLs. the problem of determining whether O1 is a module for O in O is EXPTIME-complete for L = EL. an ontology O1 is a module for O in O w. L iﬀ O\O1 is safe for O1 w. O is a deductive conservative extension of O1 ⊆ O w. it has been shown that deciding deductive conservative extensions is EXPTIME-complete for L = EL(Lutz & Wolter.t. (2007).r.t.t.r. Since the notions of modules and safety are deﬁned in Section 3 using the notion of deductive conservative extension. O1 is an S-module in O w. Proof. The computational properties of conservative extensions have recently been studied in the context of description logics. By Deﬁnition 2.r. By Deﬁnition 2. the problem has also been studied for simple DLs. and O1 ⊆ O over L. L. L iﬀ O ∪ O is a deductive conservative extension of O w. let O be such that Sig(O ) ∩ Sig(O) ⊆ S. it is reasonable to identify which (un)decidability and complexity results for conservative extensions are applicable to the reasoning tasks in Table 2. any algorithm for checking deductive conservative extensions can be reused for checking safety and modules.t.Modular Reuse of Ontologies: Theory and Practice Deﬁnition 12. and undecidable for L = ALCIQO. 289 .t. L iﬀ (d) for every O with Sig(O )∩Sig(O) ⊆ S.r. L.r. we demonstrate that any algorithm for checking safety or modules can be used for checking deductive conservative extensions.r. an ontology O is safe for O w.t. L . L ( ). and undecidable for L = ALCIQO. We need to demonstrate that O1 is a module for O in O w. In order to prove that (c) implies (d). 4.t.t. we have that O1 is a module for O in O w. ( ) ˜ := O ∪ O .

u]m related to the notions of safety and modules for a signature. Proof.t. one of them. Kazakov.u]m from Table 2 for L = ALCIQO. we prove that solving any of the reasoning tasks T3am.j+n = ti. and an ontology O = O(D) which consists of a single ALC-axiom such that: 290 . we construct a signature S = S(D).j . determines whether O1 is a module for O in O w. A domino system is a triple D = (T. n ≥ 1 called periods such that ti+m. Proof.s. .j and ti. Theorem 21 (Undecidability of Safety for a Signature) The problem of checking whether an ontology O consisting of a single ALC-axiom is safe for a signature S is undecidable w.s. L iﬀ O0 = ∅ is the only minimal module for O in O w. L. Finally.t. one can enumerate all subsets of O and check in 2-EXPTIME which of these subsets are modules for O in O w. j ≥ 1 an element of T . There is no algorithm performing tasks T1.r. Theorem 3.j for which there exist integers m ≥ 1 . Indeed. . by Claim 1 of Proposition 17. L iﬀ O0 = ∅ is a module for O in O w. L. ti. A solution for a domino system D is a mapping ti. such that ti.j .r. based on a reduction to a domino tiling problem.e.t. an ontology O is safe for O w.j that assigns to every pair of integers i.j ∈ V .1. 2007). and are 2-EXPTIME-hard for ALC. L = ALCIQ.t. It is well-known (B¨rger.t. T3sm and T3um is not easier than checking the safety of an ontology. ti+1.j for every i. . given ontologies O and O . The task T1 corresponds directly to the problem of checking the safety of an ontology. k} is a ﬁnite set of tiles and H.r. For each domino system D. o a & Gurevich.t.r. j ≥ 1. H. & Sattler Corollary 20 There exist algorithms performing tasks T1. there is no recursive (i. We demonstrate that all of these reasoning tasks are undecidable for DLs that are as expressive as ALCO. as given in Deﬁnition 2.r. In the remainder of this section.j = ti. given ontologies O. decidable) subset D ⊆ D of domino systems such that Dps ⊆ D ⊆ Ds . O and O1 ⊆ O . We demonstrate that this algorithm can be used to solve the reasoning tasks T3am. or the union of them depending on the reasoning task. We have demonstrated that the reasoning tasks T1 and T3[a. V ) where T = {1. Horrocks.r. 1997. A periodic solution for a domino system D is a solution ti. L.j+1 ∈ H and ti. V ⊆ T × T are horizontal and vertical matching relations. . Then we can determine which of these modules are minimal and return all of them. that is.s.7) that the sets D \ Ds and Dps are recursively inseparable. Suppose that we have a 2-EXPTIME algorithm that.r. Note that the empty ontology O0 = ∅ is a module for O in O w.Cuenca Grau.u]m are computationally unsolvable for DLs that are as expressive as ALCQIO. Indeed. The proof is a variation of the construction for undecidability of deductive conservative extensions in ALCQIO (Lutz et al. and T3[a. We use this property in our reduction. we focus on the computational properties of the reasoning tasks T2 and T4[a. Gr¨del.u]m from Table 2 for L = EL and L = ALCIQ that run in EXPTIME and 2-EXPTIME respectively. L = ALCO.t.s. T3sm and T3um for L = ALCIQ in 2-EXPTIME. or T3[a. Let D be the set of all domino systems. Ds be the subset of D that admit a solution and Dps be the subset of Ds that admit a periodic solution..

In this case we assign ai.j ∈ At I there exist b.1 to any element from ∆I . ai+1. t. L = ALCO. B ∈ S. then D has a solution. ai. (q3 ) and (q4 ) express that every domain element has horizontal and vertical matching successors.B ∃rV . H. a.∃rV .Modular Reuse of Ontologies: Theory and Practice (q1 ) (q2 ) (q3 ) (q4 ) At At At A1 At ··· ⊥ Ak t.j ∈ ∆I such that ai. since rV and rH commute in I. and ti+1.j+1 are constructed for ai. because otherwise one can use this problem for deciding membership in D . Since I is a model of axioms (q3 ) and (q4 ) and ai. and c ∈ At I . namely (q1 ) and (q2 ) express that every domain element is assigned with a unique tile t ∈ T . V ).j ∈ rH I .j for D as follows. Now suppose ai.t.j+1 := t . j ≥ 1 is constructed.( ∃rV . ai. ·I ) if for all domain elements a. b ∈ rH I .j and ti. b. j ≥ 1.j+1 := b. We set a1.t ∈V where T = {1.( Figure 2: An ontology Otile = Otile (D) expressing tiling conditions for a domino system D (a) if D does not have a solution then O = O(D) is safe for S = S(D) w.t. k} 1≤t<t ≤k At ) At ) 1≤t≤k 1≤t≤k ∃rH . Let O := {β} / where: β := ∃s.j . In other words. c ∈ rV I .j . d2 ∈ rH I . The axioms of Otile express the tiling conditions for a domino system D. .j can be assigned two times: ai+1. L = ALCO. t. and c.t ∈H t. we construct ti. t ∈ T such that ai.¬B) We say that rH and rV commute in an interpretation I = (∆I . Note that Sig(Otile ) = S. Note that some values of ai. ·I ) of Otile (D) can be used to guide the construction of a solution ti. we have d1 = d2 .j+1 and ai. Given a domino system D = (T.∃rH . ti. Consider an ontology Otile in Figure 2 constructed for D. b ∈ At I . L = ALCO. Indeed a model I = (∆. this implies undecidability for D and hence for the problem of checking if O is S-safe w. L = ALCO. If Otile (D) has a model I in which rH and rV commute.r. Since I is a model of axioms (q1 ) and (q2 ) from Figure 2.j inductively together with elements ai. we have Dps ⊆ D ⊆ Ds . the value for 291 . t ∈ V .j . c ∈ ∆I and t . . The following claims can be easily proved: Claim 1.t. Now let s be an atomic role and B an atomic concept such that s. t ∈ H.j ∈ At I .r.j with i. The signature S = S(D).j . and the ontology O = O(D) are constructed as follows.j+1 and ti+1. d1 ∈ rV I .r. b.j := c. For every i.j := t. . we have a unique At with 1 ≤ t ≤ k such that ai. b ∈ rH I .t.r.j := t . Then we set ti. let S consist of fresh atomic concepts At for every t ∈ T and two atomic roles rH and rV . d1 and d2 from ∆I such that a. c.j+1 ∈ rV I and ai. (Ci Di )∈Otile (Ci ¬Di ) (∃rH . Since D \ Ds and Dps are recursively inseparable.j+1 . However. . c ∈ rV I . for the set D consisting of the domino systems D such that O = O(D) is not safe for S = S(D) w. ai+1. and (b) if D has a periodic solution then O = O(D) is not safe for S = S(D) w.

then by the contra-positive of Claim 1 either (1) I is not a model of Otile . d2 ∈ rH I .j+1 is unique. we have constructed a model J of O such that J |S = I|S . rh and rV do not commute in I. By Proposition 8. the value for ti+1. L = ALCO. That is. We interpret B in J as B J = {d1 }.∃rH . Indeed.j+1 is unique.r. It is easy to see that ti.¬B]) which implies that J |= β. ·I ) is a model of O I I = (∆ tile ∪ O.j is a solution for D.{ai2 . Since D has no solution.j2 } (p2 ) {ai1 .j2 }. c ∈ rV I . c. and so.r.j } (p3 ) {ai.j }.{ai. but O |= ( ⊥). Case (2). assume that D has a periodic solution ti. and so. c. c. d1 and d2 such that x. b. d1 ∈ rV I . In order to prove property (b). This implies that d1 = d2 . a. Suppose that rH and rV do not commute in I = (∆I . Note that a ∈ (∃rH . L. b. Kazakov.r. This implies that J |= β. b ∈ r I . b ∈ rH I .¬B]).j1 } ∃rV . a | x ∈ ∆}. & Sattler ai+1. hence. If I = (∆I . we demonstrate that O = O(D) satisﬁes properties (a) and (b).j with the periods m.t. a ∈ ¬Di .∃rV . Case (1). and because of (q2 ). j) with 1 ≤ i ≤ m and 1 ≤ j ≤ n we introduce a fresh individual ai. such that d1 = d2 . Finally. then there exist a. Let I be an arbitrary interpretation. ∀rH . Since the interpretations of J the symbols in S have remained unchanged. then rH and rV do not commute in I.t.B ∃rV . this will imply that O is safe for S w.j } (p4 ) {ai. d1 and d2 from ∆I with a. For this purpose we construct an ALCO-ontology O with Sig(O) ∩ Sig(O ) ⊆ S such that O ∪ O |= ( ⊥). a.[Ci ¬Dj ]).j and deﬁne O to be an extension of Otile with the following axioms: (p1 ) {ai1 . we have a ∈ CiJ . ·I ). 1≤j≤n {ai.B)J and a ∈ (∃rV . 1≤i≤m.∃rH .{ai. c ∈ r I . and c.{ai2 . If I is a model of Otile ∪ O.∃rV . is not safe for S w. or (2) rH and rV do not commute in I. there exists a domain element a ∈ ∆I such that I but a ∈ D I . We deﬁne O such that every model of O is a ﬁnite encoding of the periodic solution ti. b. d I . d for every x ∈ ∆ 2 ∈ rH 1 1 ∈ rV V H d2 ∈ (¬B)I . we have constructed a model J of O such that J |S = I|S . if I .∃rH .j } i2 = i1 + 1 mod m j2 = j1 + 1 mod n 292 .t. n ≥ 1. a.t. it is easy to see that Otile ∪ O |= ( ∃s.j1 } (p5 ) ∀rV .Cuenca Grau. a | x ∈ ∆}. a ∈ s I . and thus. Claim 2. we have J |= ( ∃s.B ∃rV . and I .r. We demonstrate for both of these cases how to construct the required model J of O such that J |S = I|S . For every pair (i. We interpret s in J as sJ = { x. ·I ) is not a model of Otile then there exists an axiom (Ci Di ) ∈ Otile such that I |= (Ci Di ). We demonstrate that O is not S-safe w. Horrocks. Let us deﬁne J to be identical to I except for the interpretation of the a ∈ Ci i atomic role s which we deﬁne in J as sJ = { x. L. Let us deﬁne J to be identical to I except for the interpretation of the atomic role s and the atomic concept B.[∃rH . L = ALCO.∃rV . In order to prove property (a) we use the suﬃcient condition for safety given in Proposition 8 and demonstrate that if D has no solution then for every interpretation I there exists a model J of O such that J |S = I|S . So.j } ∃rH . and. This means that there exist domain elements a. This will imply that O is not safe for O w. Hence.¬B)J since d1 = d2 . and so J |= ( ∃s.[∃rH . d ∈ B I . b.j with the periods m and n.

L iﬀ O0 = ∅ is (the only minimal) S-module in O w. This said.r. it is worth noting that Theorem 21 still leaves room for investigating the former approach. Theorem 21 directly implies that there is no algorithm for task T2. 293 . the set of ontologies over a language that satisfy the condition for that signature.t. however. the converse. By Claim 1 of Proposition 18. These intuitions lead to the notion of a safety class. These ontologies are then guaranteed to be safe for the signature under consideration.. in what follows we will focus on deﬁning suﬃcient conditions for safety that we can use in practice and restrict ourselves to OWL DL—that is. 5. for each signature S. by Claim 1 of Proposition 18. A direct consequence of Theorem 21 and Proposition 18 is the undecidability of the problem of checking whether a subset of an ontology is a module for a signature: Corollary 22 Given a signature S and ALC-ontologies O and O1 ⊆ O . we could look for suﬃcient conditions for the notion of safety— that is. The remainder of this paper focuses on the latter approach. T4sm. a signature. since. or even for very expressive logics such as SHIQ. In the case of SHIQ. Alternatively.r. L = ALCO is undecidable. if an ontology satisﬁes our conditions. any suﬃcient condition for safety can be deﬁned by giving. an ontology O is S-safe w. This is only possible if O ∪ O have no models. L.s. It is easy to see that O has a model corresponding to every periodic solution for D with periods m and n. however. Hence any algorithm for recognizing modules for a signature in L can be used for checking if an ontology is safe for a signature in L.t.1 Safety Classes In general.Modular Reuse of Ontologies: Theory and Practice The purpose of axioms (p1 )–(p5 ) is to ensure that rH and rV commute in every model of O . On the other hand. so O ∪ O |= ( ⊥). Solving any of the reasoning tasks T4am. however. Suﬃcient Conditions for Safety Theorem 21 establishes the undecidability of checking whether an ontology expressed in OWL DL is safe w. since O contains Otile . Before we go any further. SHOIQ—ontologies.r. 2007) strongly indicate that checking safety is likely to be exponentially harder than reasoning and practical algorithms may be hard to design. O is S-safe w. by Claim 2.t.r. the problem of determining whether O1 is an S-module in O w. This undecidability result is discouraging and leaves us with two alternatives: First. then we can guarantee that it is safe. then in every model of O ∪ O. 5. existing results (Lutz et al. rH and rV do not commute. such as EL. L. safety may still be decidable for weaker description logics. does not necessarily hold.t. or T4[a. L if O0 = ∅ is an S-module in O w. Hence O |= ( ⊥).u]m for L = ALCO. or T4um for L is at least as hard as checking the safety of an ontology. Indeed. Proof. Corollary 23 There is no algorithm that can perform tasks T2.r. we could focus on simple DLs for which this problem is decidable.r.t. Proof.t. since this task corresponds to the problem of checking safety for a signature.

Locality). for which safety can be proved using Proposition 8.2 Locality In this section we introduce a family of safety classes for L = SHOIQ that is based on the semantic properties underlying the notion of model conservative extensions. In what follows.Cuenca Grau. In Section 3. it is union-closed if O1 ∈ O(S) and O2 ∈ O(S) implies (O1 ∪ O2 ) ∈ O(S). we have seen that. it is compact if for every S1 . and for every S and O ∈ O(S) and every α ∈ O. A class of ontologies for a language L is a function O(·) that assigns to every subset S of the signature of L. A class of interpretations is a function I(·) that given a SHOIQ signature S returns a set of interpretations I(S). Safety Class). it is local if I(S) is local w. S using the suﬃcient condition. and (ii) each ontology O ∈ O(S) is S-safe for L. & Sattler Deﬁnition 24 (Class of Ontologies. O(S) is the set of ontologies that are valid in I(S). Subset-closure (union closure) means that if O (O1 and O2 ) satisfy the suﬃcient condition for safety. Also. ♦ Intuitively. Safety classes may admit many natural properties. it is compact when O ∈ O(S ∩ Sig(O)) for each O ∈ O(S). it is monotonic if S1 ⊆ S2 implies I(S1 ) ⊆ I(S2 ).t. called local ontologies. Given a SHOIQ signature S. if I(·) is local then we say that O(·) is a class of local ontologies.o. a class of ontologies is a collection of sets of ontologies parameterized by a signature. one way to prove that O is S-safe is to show that O is a model S-conservative extension of the empty ontology. Kazakov. and it is subset-closed if O1 ⊆ O2 and O2 ∈ O(S) implies O1 ∈ O(S)..g.r. where S1 S2 is the symmetric diﬀerence of sets S1 and S2 deﬁned by S1 S2 := S1 \ S2 ∪ S2 \ S1 . Given a class of interpretations I(·). a subset O(S) of ontologies in L. Deﬁnition 25 (Class of Interpretations. The following deﬁnition formalizes the classes of ontologies. Antimonotonicity intuitively means that if an ontology O can be proved to be safe w. Compactness means that it is suﬃcient to consider only common elements of Sig(O) and S for checking safety. we will sometimes say that O passes the safety test for S. w. every subset of S.r.l. Horrocks. S if for every SHOIQ-interpretation I there exists an interpretation J ∈ I such that I|S = J |S . A class O(·) is anti-monotonic if S1 ⊆ S2 implies O(S2 ) ⊆ O(S1 ). according to Proposition 8.t. A safety class (also called a suﬃcient condition to safety) for an ontology language L is a class of ontologies O(·) for L such that for each S it is the case that (i) ∅ ∈ O(S). as given in Deﬁnition 24.r. whenever an ontology O belongs to a safety class for a given signature and the safety class is clear from the context.r. S for every S. A safety class represents a suﬃcient condition for safety: each ontology in O(S) should be safe for S. we say that a set of interpretations I is local w. 5. we say that O(·) is the class of ontologies O(·) based on I(·) if for every S.t.t. ♦ 294 . S2 and S such that (S1 S2 ) ∩ S = ∅ we have that I(S1 )|S = I(S2 )|S . then O can be proved to be safe w. we assume that the the empty ontology ∅ belongs to every safety class for every signature. then every subset of O (the union of O1 and O2 ) also satisﬁes this condition. we say that O and α are local (based on I(·)).

we demonstrated that the ontology P1 ∪ Q given in Figure 1 with P1 = {P1. since for every interpretation I = (∆ J = (∆J . the set IA←∅ (S) consists of interpretations J such that rJ = ∅ for every atomic r←∅ role r ∈ S and AJ = ∅ for every atomic concept A ∈ S. P4. . ·I ) and the interpretation is local for every S. O ∈ O(S) iﬀ O ∈ O(S ∩ Sig(O)) since (S (S ∩ Sig(O))) ∩ Sig(O) = (S \ Sig(O)) ∩ Sig(O) = ∅. Proof. The fact that O(·) is subset-closed and union-closed follows directly from Deﬁnition 25 since (O1 ∪ O2 ) ∈ O(S) iﬀ (O1 ∪ O2 ) is valid in I(S) iﬀ O1 and O2 are valid in I(S) iﬀ O1 ∈ O(S) and O2 ∈ O(S). This has been done by showing that every S-interpretation I can be expanded to a model J of axioms P1–P4. Assume that O(·) is a class of ontologies based on I(·). it is the case that J |= α. it is the case that IA←∅ (·) is monotonic. Since IA←∅ (S1 ) ⊆ IA←∅ (S2 ) r←∅ r←∅ for every S1 ⊆ S2 . E1} is a deductive conservative extension of Q for S = {Cystic Fibrosis. and so. Then O(·) is a subset-closed and union-closed safety class for L = SHOIQ.Modular Reuse of Ontologies: Theory and Practice r←∅ Example 26 Let IA←∅ (·) be a class of SHOIQ interpretations deﬁned as follows. we have O ∈ O(S) iﬀ O is valid in I(S) iﬀ J |= O for every interpretation J ∈ I(S). ·J ) deﬁned by ∆J := ∆I . Given a r←∅ signature S. In terms of Example 26 this means that 295 . S based on IA←∅ (S) r←∅ consists of all axioms α such for every J ∈ IA←∅ (S). . E1 by interpreting the symbols in Sig(P1 ) \ S as the empty set. Then by Deﬁnition 25 for every SHOIQ signature S. . and so O ∈ O(S2 ) implies that O is valid in I(S2 ) which implies that O is valid in I(S1 ) which implies that O ∈ O(S1 ). S2 and S such that (S1 S2 ) ∩ S = ∅ we have that I(S1 )|S = I(S2 )|S . Hence. Thus O(·) is a safety class. then J ∈ IA←∅ (S) and I|S = J |S . the set AxA←∅ (S) of axioms that are local w. hence for every O with Sig(O) ⊆ S we have that O is valid in I(S1 ) iﬀ O is valid in I(S2 ). In particular. O(·) is compact. If I(·) is monotonic then I(S1 ) ⊆ I(S2 ) for every S1 ⊆ S2 . . Since I(·) is a local class of interpretations. Hence O(·) is anti-monotonic. and X J := X I / / r←∅ r←∅ r←∅ for the remaining symbols X. then O(·) is anti-monotonic. Example 29 Recall that in Example 5 from Section 3. since for r←∅ r←∅ every S1 and S2 the sets of interpretations IA←∅ (S1 ) and IA←∅ (S2 ) are deﬁned diﬀerently only for elements in S1 S2 .t. L = SHOIQ. Genetic Disorder}. Hence for every O ∈ I(S) and every SHOIQ interpretation I there is a model J ∈ I(S) such that J |S = I|S .t. rJ = ∅ for r ∈ S. O ∈ O(S1 ) iﬀ O ∈ O(S2 ). r←∅ r←∅ Given a signature S. ♦ Proposition 27 (Locality Implies Safety) Let O(·) be a class of ontologies for SHOIQ based on a local class of interpretations I(·). if I(·) is monotonic. Additionally. AJ = ∅ for A ∈ S. which implies by Proposition 8 that O is safe for S w. If I(·) is compact then for every S1 . we have that for every SHOIQ-interpretation I there exists J ∈ I(S) such that J |S = I|S . r←∅ Corollary 28 The class of ontologies OA←∅ (S) deﬁned in Example 26 is an anti-monotonic compact subset-closed and union-closed safety class.r. Then the r←∅ r←∅ r←∅ class of local ontologies based on IA←∅ (·) is deﬁned by O ∈ OA←∅ (S) iﬀ O ⊆ AxA←∅ (S). and if I(·) is compact then O(·) is also compact.r. It is easy to show that IA←∅ (S) / / I . IA←∅ (·) is also compact.

introduced in Example 26..r. every individual needs to be interpreted as an element of the domain.t.r.C1 .Cuenca Grau. = ⊥ if Sig(R) S and otherwise = ( n R. it is suﬃcient to interpret every atomic concept and atomic role not in S as the empty set and then check if α is satisﬁed in all interpretations of the remaining symbols.3 Testing Locality r←∅ In this section. by Proposition 27. S) = ⊥ ⊥ if Sig(R) S and otherwise = Funct(R). S). S) 2. / | τ (Funct(R). 2007). otherwise = ∃R1 . S (based on IA←∅ (S)) if α is satisﬁed in every interpretation that ﬁxes the interpretation of all atomic roles and concepts outside S to the empty set. α∈O τ (O. S) = ⊥ ⊥ if r ∈ S and otherwise = Trans(r). τ (α. = τ (C1 . S) ::= τ (α. the ontology P1 is safe for S w. / = {a}. S) τ (C2 . / | τ (Trans(r). that is. S. Note that for deﬁning locality we do not ﬁx the interpretation of the individuals outside S. but in principle. (a) (b) (c) (d) (e) (f ) (g) (h) (i) (j) (k) (l) (m) (n) τ (α. axiom α and ontology O let τ (C. S)). Namely. 5. In order to test the locality of α w. S) | τ (A.C 1 . | τ (a : C. b). | τ (r(a. as will be shown in Section 8. S) τ (C2 . concept C. and there is no “canonical” element of every domain to choose. The reason is that there is no elegant way to describe such interpretations. ⊥ if Sig(R2 ) S. Since OA←∅ (·) is a class of local ontologies. L = SHOIQ. S).t. S) ::= C2 . In the next section we discuss how to perform this test in practice. It turns out that this notion provides a powerful suﬃciency test for safety which works surprisingly well for many real-world ontologies.τ (C1 . S) | τ ({a}. this could be done. S) = ⊥ if r ∈ S and otherwise = r(a. S). then O must be safe for S according to Proposition 27. S) | τ (C1 C2 . = ⊥ if Sig(R) S and otherwise = ∃R. Given a SHOIQ ontology O and a signature S it is suﬃcient to check whether r←∅ O ∈ OA←∅ (S). whether every axiom α in O is satisﬁed by every interpretation from r←∅ IA←∅ (S). S) | τ ( n R. S) τ (C1 | τ (R1 = . b). S) | τ (¬C1 . S) ::= τ ( . S) be deﬁned recursively as follows: τ (C. If this property holds. S) = (τ (C1 . Kazakov. S). we focus in more detail on the safety class OA←∅ (·). This notion of locality is exactly the one we used in our previous work (Cuenca Grau et al.2 r←∅ From the deﬁnition of AxA←∅ (S) given in Example 26 it is easy to see that an axiom α is r←∅ local w. & Sattler r←∅ r←∅ P1 ∈ OA←∅ (S). 296 . R2 . S). Horrocks.r. otherwise = (R1 R2 ). ♦ Proposition 27 and Example 29 suggest a particular way of proving the safety of ontologies.t. = ⊥ if A ∈ S and otherwise = A. S) and τ (O. S)). This observation suggests the following test for locality: Proposition 30 (Testing Locality) Given a SHOIQ signature S. S) | τ (∃R. S) = a : τ (C.τ (C1 . S) = (⊥ ⊥) if Sig(R1 ) S. we refer to this safety class simply as locality. When ambiguity does not arise. = ¬τ (C1 .

a diﬃcult problem (e. theoretically. S)) ⊆ S. we have A ∈ S and r ∈ S. Genetic Origin}. Secondly.t.C and ( n R. but not local w. The primary reason is that the sizes of the axioms which need to be tested for tautologies are usually relatively small compared to the sizes of ontologies. it is possible to formulate a tractable approximation to the locality conditions for SHOIQ: 3. 2004) or KAON2 (Motik. In case reasoning is too costly. allow testing for DL-tautologies. 2003).r. S). ∀R. There are.r.C. all atomic concepts and roles that are not in S are eliminated by the transformation.t.t.t. S2 .t. S2 .t. All atomic concepts A∅ ∈ S will be eliminated likewise. Indeed.⊥) which is not a SHOIQ tautology. Trans(R∅ ).r. S iﬀ I |= α for every interpretation I ∈ IA←∅ (S) iﬀ I |= τ (α. S))I and that I |= α iﬀ I |= τ (α. S1 = {Fibrosis. R R∅ .C) are assumed to be expressed using . It is easy to check that for every atomic concept A and atomic role r from τ (C. In the second case τ (M2. it is suﬃcient to perform the following replacements in α (the symbols from S2 are underlined): ⊥ [by (b)] M2 Genetic Fibrosis ≡ Fibrosis ⊥ [by (b)] (8) ∃has Origin.C). O ∈ OA←∅ (S) iﬀ every axiom in τ (O. S1 and hence by Proposition 8 is S1 -safe w. ( n R∅ . S).g.r. R∅ R. Checking for tautologies in description logics is.t. We demonstrate using Proposition 30 that O is local w. S) is a tautology. hence. S2 ) = (Genetic Fibrosis ≡ ⊥ ∃has Origin.Modular Reuse of Ontologies: Theory and Practice r←∅ Then.Genetic Origin (7) Similarly. Pellet (Sirin & Parsia. and hence will be eliminated. however. S) r←∅ for every Sig(α)-interpretation I ∈ IA←∅ (S) iﬀ τ (α. hence O is not local w. C1 C2 . has Origin}. S) is a tautology. among other things. in other words. in particular. Hence O is local w. 2006) for testing o locality since these reasoners. RACER (M¨ller & Haarslev.Genetic Origin In the ﬁrst case we obtain τ (M2. S) may still contain individuals that do not occur in S. SHOIQ. S2 = {Genetic Fibrosis. according to Proposition 30. Tobies. and ( n R. C1 C2 . 2000).r. Recall that the constructors ⊥. several reasons to believe that the locality test would perform well in practice.3 It is also easy to show by induction that for every r←∅ interpretation I ∈ IA←∅ (S).C). Proof. or Funct(R∅ ). for the DL SHOIQ it is known to be NEXPTIME-complete. every role R∅ with Sig(R∅ ) S occurs in O as either ∃R∅ . 297 . S1 it is suﬃcient to perform the following replacements in α (the symbols from S1 are underlined): ⊥ [by (b)] M2 Genetic Fibrosis ≡ Fibrosis ⊥ [by (f)] ∃has Origin. 2006). Hence r←∅ an axiom α is local w.t. Example 31 Let O = {α} be the ontology consisting of axiom α = M2 from Figure 1. modern DL reasoners are highly optimized for standard reasoning tasks and behave well for most realistic ontologies. S1 ) = (⊥ ≡ Fibrosis ⊥) which is a SHOIQ-tautology. we have C I = (τ (C.r.r. ♦ 5. Note that it is not necessarily the case that Sig(τ (α. in order to check whether O is local w. / since τ (α.r. in order to check whether O is local w.4 A Tractable Approximation to Locality One of the important conclusions of Proposition 30 is that one can use the standard capabilities of available DL-reasoners such as FaCT++ (Tsarkov & Horrocks.C. ∃R.

it can be shown that the safety class for SHOIQ based on syntactic locality enjoys all of the properties from Deﬁnition 24: ˜ r←∅ Proposition 34 The class of syntactically local ontologies OA←∅ (·) given in Deﬁnition 32 is an anti-monotonic. ♦ Intuitively. 2}. or (5) C C ∆ . and i ∈ {1. C / / ∆ any concept.t.C | ∃R. every syntactically local axiom is satisﬁed in every interpretation r←∅ I from IA←∅ (S). ·I ) from of Con r←∅ IA←∅ (S) it is the case that (C ∅ )I = ∅ and (C ∆ )I = ∆I for every C ∅ ∈ Con∅(S) and C ∆ ∈ Con∆(S). or (3) Funct(R∅ ).t. Let S be a signature. P4.r. Con∆(S ) ⊆ Con∆(S ) be shown by induction.C] ∃has Origin. Hence. compact. E1} considered in Example 29 is syntactically local w. Also one can show by induction that ˜ r←∅ ˜ r←∅ ˜ r←∅ ˜ r←∅ α ∈ AxA←∅ (S) iﬀ α ∈ AxA←∅ (S ∩ Sig(α)). ˜ r←∅ ˜ r←∅ Proof. Hence the ontology P1 = {P1. and E1 from Figure 1 are syntactically local w.t. S1 = {Fibrosis.t. Example 35 (Example 31 continued) It is easy to see that axiom M2 from Figure 1 is syntactically local w. . S. subset-closed. . OA←∅ (·) is a safety class by Proposition 33. Genetic Disorder}. R∅ (possibly the inverse of) an atomic role r∅ ∈ S. Horrocks. The following grammar recursively deﬁnes two sets of concepts Con∅(S) and Con∆(S) for a signature S: Con∅(S) ::= A∅ | ¬C ∆ | C Con∆(S) ::= ∆ | ¬C ∅ | C1 C∅ | C∅ ∆ C2 .Cuenca Grau. S if O ⊆ AxA←∅ (S). Genetic Origin}. It is easy to see from the inductive deﬁnitions ∅(S) and Con∆(S) in Deﬁnition 32 that for every interpretation I = (∆I .t. and so we obtain the following conclusion: r←∅ ˜ r←∅ Proposition 33 AxA←∅ (S) ⊆ AxA←∅ (S). Kazakov.r. where A∅ ∈ S is an atomic concept. or (6) a : C ∆ . Since O ∈ OA←∅ (S) ˜ r←∅ ˜ r←∅ iﬀ O ⊆ AxA←∅ (S).t. or (4) C ∅ C. Further. by proving that Con 2 1 2 1 ˜ r←∅ ˜ r←∅ and AxA←∅ (S2 ) ⊆ AxA←∅ (S1 ) when S1 ⊆ S2 . We denote ˜ r←∅ by AxA←∅ (S) the set of all SHOIQ-axioms that are syntactically local w.r. ♦ 298 . C(i) ∈ Con∆(S). . or (2) Trans(r∅ ). syntactic locality provides a simple syntactic test to ensure that an axiom is r←∅ satisﬁed in every interpretation from IA←∅ (S).C ∅ | ( n R∅ .C) | ( n R. We denote by ˜ r←∅ OA←∅ (S) the set of all SHOIQ ontologies that are syntactically local w. S. S.t.r.Genetic Origin ∈ Con∅(S1 ) [matches C C ∅] (9) It is easy to show in a similar way that axioms P1 —P4.r. . Below we indicate sub-concepts in α from Con∅(S1 ): ∈ Con∅(S1 ) [matches A∅ ] M2 Genetic Fibrosis ≡ Fibrosis ∈ Con∅(S1 ) [matches ∃R∅ .C ∅ ) . R any role.r. we have that OA←∅ (·) is subset-closed and union-closed. S if it is of one of the following forms: (1) R∅ R. C | ∃R∅ . and union-closed safety class. An axiom α is syntactically local w. Anti-monotonicity for OA←∅ (·) can ∅(S ) ⊆ Con∅(S ). so OA←∅ (·) is compact. & Sattler Deﬁnition 32 (Syntactic Locality for SHOIQ). S = {Cystic Fibrosis. C ∅ ∈ Con∅(S).r. ˜ r←∅ A SHOIQ-ontology O is syntactically local w.

as usual. Another example.r. but not syntactically local. and whose running time is polynomial in |O| + |S|. On the other hand. deﬁnition P5.¬⊥ ∃r. Proposition 36 There exists an algorithm that given a SHOIQ ontology O and a sig˜ r←∅ nature S.t. that tautological axioms do not occur often in realistic ontologies. syntactic locality does not detect all tautological axioms.t. It can be seen from Table 4 that diﬀerent types of locality conditions are appropriate r←∅ for diﬀerent types of axioms. every S since it is a tautology (and hence true in every interpretation).Modular Reuse of Ontologies: Theory and Practice r←∗ IA←∗ (S) r←∅ IA←∅ (S) r←∆×∆ IA←∅ (S) r←id IA←∅ (S) r.r.t. or the identity relation id on ∆. it is easy to see that α is not syntactically local w. S) = (∃r. and the functionality axiom P7 but 4. Other classes of local interpretations can be constructed in a similar way by ﬁxing the interpretations of elements outside S to diﬀerent values. S for which locality conditions assuming. We indicate which axioms are local w.¬B). the axiom α = (A A B) is local w. As a result. syntactic locality checking can be performed in polynomial time by matching an axiom according to Deﬁnition 32. determines whether O ∈ OA←∅ (S).r. Furthermore.¬A ∃r. that the symbols from S are underlined. It is reasonable to assume. B} according to Deﬁnition 32 since it involves symbols in S only. In Table 4 we have listed all of these classes together with examples of typical types of axioms used in ontologies. and the interpretation of atomic concepts outside S to either the empty set ∅ or the set ∆ of all elements. Each local class of interpretations in Table 3 deﬁnes a corresponding class of local ontologies analogously to Example 26. x | x ∈ ∆J } ∆J × ∆J { x.¬⊥) is a tautology. For example. We assume that the numbers in number restrictions are written down using binary coding. S = {A. the disjointness axiom P6. In Table 3 we have listed several such classes of local interpretations where we ﬁx the interpretation of atomic roles outside S to be either the empty set ∅. since τ (α. A ∈ S : rJ ∅ AJ ∆J ∆J ∆J ∆J × ∆J { x. S = {r}.4 5.5 Other Locality Classes r←∅ The locality condition given in Example 26 based on a class of local interpretations IA←∅ (·) is just a particular example of locality which can be used for testing safety. the universal relation ∆ × ∆. x | x ∈ ∆J } Table 3: Examples for Diﬀerent Local Classes of Interpretations The converse of Proposition 33 does not hold in general since there are semantically local axioms that are not syntactically local. which is not a tautology.t.r. A ∈ S : rJ ∅ AJ ∅ ∅ ∅ r←∗ IA←∗ (S) r←∅ IA←∆ (S) r←∆×∆ IA←∆ (S) r←id IA←∆ (S) r. where |O| and |S| are the number of symbols occurring in O and S respectively. These examples show that the limitation of our syntactic notion of locality is its inability to “compare” diﬀerent occurrences of concepts from the given signature S. These axioms are assumed to be an extension of our project ontology from Figure 1. The axiom α is semantically local w. is a GCI α = (∃r. 299 . The locality condition based on IA←∅ (S) captures the domain axiom P4. however.

The locality condition based on IA←∆ (S). checking locality. Still. P5 BioMedical Project ≡ Project ∃has Focus. namely to deﬁne two sets Con∅(S) and Con∆(S) of concepts for a signature S which are interpreted as the empty 300 . Kazakov. every subset of P containing P6 and P8 is not safe w.r.r. where the atomic roles and concepts outside S are interpreted as the largest possible sets.Bio Medicine Bio Medicine ⊥ P6 Project P7 Funct(has Focus) P8 Human Genome : Project P9 has Focus(Human Genome.Cuenca Grau.Cystic Fibrosis Table 4: A Comparison between Diﬀerent Types of Locality Conditions neither of the assertions P8 or P9. where the case (a) of the deﬁnition for τ (C. however. that is for IA←∗ (S) and IA←∗ (S). since in P6 and P8 together imply axiom β = ({Human Genome} Bio Medicine ⊥) which uses the symbols from S only. For example. and so cannot be local w. Note that the modeling error E2 is not local for any of the given locality conditions. since it is not clear how to eliminate the universal roles and identity roles from the axioms and preserve validity in the respective classes of interpretations.t. The idea is the same as that used in Deﬁnition 32. the functionality axiom P7 is not captured by this locality condition since the atomic role has Focus is interpreted as the universal relation ∆×∆. Horrocks. which is not necessarily functional. Hence. In order to capture such functionality r←id r←id axioms. since the individuals Human Genome and Gene prevent us from interpreting the atomic role has Focus and atomic concept Project with the empty r←∆×∆ set. S. & Sattler α Axiom Project ? α ∈ Ax r←∅ A←∅ r←∆×∆ A←∅ r←id A←∅ r←∅ A←∆ r←∆×∆ A←∆ r←id A←∆ P4 ∃has Focus. It might be possible to come up with algorithms for testing locality conditions for the classes of interpretation in Table 3 similar to the ones presented in Proposition 30. locality based on the class IA←∆ (S) can be tested as in Proposition 30. S) = if A ∈ S and otherwise = A / (a ) r←∆×∆ r←id For the remaining classes of interpretations. S) is replaced with the following: τ (A. can capture such assertions but are generally poor for other types of axioms.Cystic Fibrosis ∃has Focus. S. Note also that it is not possible to come up with a locality condition that captures all the axioms P4–P9. where every atomic role outside S is interpreted with the identity relation id on the interpretation domain. one can use locality based on IA←∅ (S) or IA←∆ (S). For r←∅ example. is not that straightforward.t. it is easy to come up with tractable syntactic approximations for all the locality conditions considered in this section in a similar manner to what has been done in Section 5.4. Gene) E2 ∀has Focus.

In Figure 3 we gave recursive r←∗ ˜ r←∗ deﬁnitions for syntactically local axioms AxA←∗ (S) that correspond to classes IA←∗ (S) of interpretations from Table 3. their union (O1 ∪ O2 )(·) is a class of ontologies deﬁned by (O1 ∪O2 )(S) = O1 (S)∪O2 (S). which can be seen as the union of the safety classes used in the tests. where some cases in the recursive deﬁnitions are present only for the indicated classes of interpretations. One may wonder if locality classes already provide the most powerful suﬃcient 301 . however. R is any role | A∅ | ∃R∅ . It is easy to see by Deﬁnition 24 that if both O1 (·) and O2 (·) are safety classes then their union (O1 ∪ O2 )(·) is a safety class.C ∆ ) . ∆ C ∅ ∈ Con∅(S). r∆×∆ .C). r∅ . then the union is anti-monotonic.5.C ∆ | ( n R∆×∆ . as demonstrated in the following example: r←∆×∆ r←∅ Example 37 Consider the union (OA←∅ ∪ OA←∆ )(·) of two classes of local ontologies r←∆×∆ r←∅ OA←∅ (·) and OA←∆ (·) deﬁned in Section 5.C ∅ | r←∗ for IA←∅ (·): r←∅ for IA←∗ (·): r←id for IA←∗ (·): C∅ | C∅ n R.C | | ( m Rid . rid ∈ S. the ontology O2 consisting of axioms P8–P9 satisﬁes the second locality condition. A∆ . Obviously.C ∆ ) | ∃Rid . C(i) ∈ Con∆(S). in fact. Formally. Where: A∅ .C ∅ n R∅ . given two classes of ontologies O1 (·) and O2 (·). In order to check safety of ontologies in practice. the ontology O1 consisting of axioms P4–P7 from Table 4 satisﬁes the ﬁrst locality condition. this gives a more powerful suﬃcient condition for safety. Moreover. as seen in Example 37. subset-closed as well. ♦ As shown in Proposition 33. C is any concept. for example. b) | Trans(rid ) | Funct(Rid ) Figure 3: Syntactic Locality Conditions for the Classes of Interpretations in Table 3 set and. Sig(Rid ) S. C|C C∆ | a : C∆ ˜ r←∗ AxA←∗ (S) ::= C ∅ r←∅ for IA←∗ (·): r←∆×∆ for IA←∗ (·): r←id for IA←∗ (·): | R∅ |R R | Trans(r∅ ) | Funct(R∅ ) R∆×∆ | Trans(r∆×∆ ) | r∆×∆ (a. if each of the safety classes is also anti-monotonic or subset-closed. m ≥ 2 . Sig(R∆×∆ ).C ∆ | ( 1 Rid . as ∆I in every interpretation I from the class and see in which situations DL-constructors produce the elements from these sets. or respectively. Sig(R∅ ). is not even safe for S as we have shown in Section 5.C C Con∆(S) ::= r←∗ for IA←∆ (·): r←∆×∆ for IA←∗ (·): r←id for IA←∗ (·): ∆ | ¬C ∅ | C1 ∆ C2 | A∆ | ∃R∆×∆ . every locality condition gives a union-closed safety class. respectively.6 Combining and Extending Safety Classes In the previous section we gave examples of several safety classes based on diﬀerent local classes of interpretations and demonstrated that diﬀerent classes are suitable for diﬀerent types of axioms. one may try to apply diﬀerent suﬃcient tests and check if any of them succeeds. the union of such safety classes might be no longer unionclosed. Unfortunately the unionclosure property for safety classes is not preserved under unions. 5. but their union O1 ∪O2 satisﬁes neither the ﬁrst nor the second locality condition and. This safety class is not union-closed since.5.Modular Reuse of Ontologies: Theory and Practice Con∅(S) ::= ¬C ∆ | C | ∃R.

⊥ for all A. r←∅ For O(·) = OA←∆ (·) the proof can be repeated by taking P to consist of axioms A and ∃r. r←∅ r←∅ Since O ∈ OA←∅ (S). it is the case that O ∪ P is safe w. thus Q |= β.t. By Proposition 30. As has been shown in the proof of r←∅ this proposition. by Deﬁnition 1. if a safety class O(·) is not maximal union-closed for a language L. O ∪ P ∪ Q is not a deductive Sig(Q)-conservative extension of Q ( ). A safety class O2 (·) extends a safety class O1 (·) if O1 (S) ⊆ O2 (S) for every S. There are some diﬃculties in extending the proof of Proposition 39 to other locality classes considered in Section 5. S) where τ (·.5. since O |= α and O ∪ P ∪ Q r←∅ has only models from IA←∅ (S). such that (i) O ∈ / O(S). Kazakov. since this will not guarantee that β = τ (α. Hence there is probably room to extend the locality classes OA←∅ (·) and OA←∆ (·) for L = SHOIQ while preserving union-closure. S) contains symbols from S only (see Footnote 3 on r←∅ r←∅ p. According to Deﬁnition 38. I |= α iﬀ I |= β for every I ∈ IA←∅ (S). It is easy to see that P ∈ OA←∅ (S).Cuenca Grau. (ii) O is safe w. 297). ·) in these cases (see a related discussion in Section 5.r.t. Proof.5). () r←∅ Intuitively. the ontology P is chosen in such a way that P ∈ OA←∅ (S) and O ∪ P ∪ Q r←∅ has only models from IA←∅ (S). Let / / β := τ (α. Take P to consist of the axioms A ⊥ and ∃r.5. S in L. ·) as has been discussed in Section 5.r. Hence. it is not clear how to force interpretations of roles to be the universal or identity relation using SHOIQ axioms. / β is not a tautology. Now. 302 . there exists an axiom α ∈ O such that α ∈ AxA←∅ (S). We claim that O ∪ P ∪ Q is not a deductive Sig(Q)-conservative extension of Q. it is the case that O ∪ P ∪ Q |= β. We deﬁne ontologies P and Q as follows.5. Deﬁnition 38 (Maximal Union-Closed Safety Class). Second. First. that is. Q is an ontology which implies nothing but tautologies and uses all the atomic concepts and roles from S. and modifying τ (·. ⊥ for every atomic r←∅ concept A and atomic role r from Sig(O) \ S. and (iii) for every P ∈ O(S). Take Q to consist of all tautologies of form ⊥ A and ⊥ ∃r. r ∈ S. since α ∈ AxA←∅ (S). we have that Sig(β) ⊆ S = Sig(Q) and. for every ontology Q over L with Sig(Q) ∩ Sig(O ∪ P) ⊆ S it is the case that O ∪ P ∪ Q is a deductive conservative extension of Q. Note also that the proof of Proposition 39 does not work in the presence of nominals.5 are maximal union-closed safety classes for L = SHIQ. it is not clear how to deﬁne the function τ (·. then there exists a signature S and an ontology O over L. since β r←∅ does not contain individuals. ♦ r←∅ r←∅ Proposition 39 The classes of local ontologies OA←∅ (·) and OA←∆ (·) deﬁned in Section 5. for every A. We demonstrate that r←∅ r←∅ this is not possible for O(·) = OA←∅ (·) or O(·) = OA←∆ (·) r←∅ We ﬁrst consider the case O(·) = OA←∅ (·) and then show how to modify the proof for r←∅ the case O(·) = OA←∆ (·). r ∈ Sig(O) \ S. & Sattler conditions for safety that satisfy all the desirable properties from Deﬁnition 24. Horrocks. A safety class O1 (·) is maximal unionclosed for a language L if O1 (·) is union-closed and for every union-closed safety class O2 (·) that extends O1 (·) and every O over L we have that O ∈ O2 (S) implies O ∈ O1 (S). Surprisingly this is the case to a certain extent for some locality classes considered in Section 5. Let O be an ontology over L that satisﬁes conditions (i)–(iii) above. Note that Sig(O ∪ P) ∩ Sig(Q) ⊆ S. S in L. ·) is deﬁned as in Proposition 30.

namely O itself. the set Os is intended to be safe w.r. there exists no general procedure that can recognize or extract all the (minimal) modules for a signature in an ontology in ﬁnite time. or they add elements to Os without changing Om . Proposition 18 establishes the relationship between the notions of safety and module. according to Deﬁnition 40. Figure 4 presents an optimized version of the module-extraction algorithm. contains the unprocessed axioms. As shown in Corollary 23 in Section 4. it is suﬃcient to show that O \ O1 ∈ O(S ∪ Sig(O1 )). These axioms are distributed among Om and Os according to rules R1 and R2. it is suﬃcient to enumerate all possible subsets of the ontology and check if any of these subsets is a module based on O(·). the empty ontology ∅ = O \ O also belongs to O(S) for every O(·) and S. in other words.t. more precisely. ontology O and signature S. The set Om accumulates the axioms of the extracted module. In practice. in order to prove that O1 is a S-module in O. Let L be an ontology language and O(·) be a safety class for L.r.t.t. S ∪ Sig(Om ) according to the safety class O(·). Therefore. however. when no axioms are left in in Ou . Invariant I1 states that the three sets Om . the set Om is an O(·)-based module in O. I2 states that the set Os satisﬁes the safety test for S ∪ Sig(Om ) w. ♦ Remark 41 Note that for every safety class O(·). ♦ It is clear that. by Deﬁnition 24. In order to extract an O(·)-module.r. Ou and Os form a partitioning of O. rule R2 moves α into Om and moves all axioms from Os back into Ou . The rewrite rules R1 and R2 preserve invariants I1–I3 given in Figure 4. we say that Om ⊆ O is an O(·)-based S-module in O if O \ Om ∈ O(S ∪ Sig(Om )). ﬁnally. a subset O1 of O is an S-module in O provided that O \ O1 is safe for S ∪ Sig(O1 ). The set Ou .Modular Reuse of Ontologies: Theory and Practice 6. any safety class O(·) can provide a suﬃcient condition for testing modules—that is. S ∪ Sig(Om ). Otherwise. I3 establishes that the rewrite rules either add elements to Om . Given an ontology O and a signature S over L. Extracting Modules Using Safety Classes In this section we revisit the problem of extracting modules from ontologies. which represent a partitioning of the ontology O into three disjoint subsets Om . 303 . since Sig(Om ) might expand and axioms from Os might become no longer safe w.r. Given an axiom α from Ou . A notion of modules based on this property can be deﬁned as follows. any procedure for checking membership of a safety class O(·) can be used directly for checking whether Om is a module based on O(·). O(·). there exists at least one O(·)-based S-module in O. Ou and Os . S ∪ Sig(Om ). it is possible to avoid checking all the possible subsets of the input ontology. however. The procedure manipulates conﬁgurations of the form Om | Ou | Os . The techniques described in Section 5. the pair (|Om |. can be reused for extracting particular families of modules that satisfy certain suﬃcient conditions. Deﬁnition 40 (Modules Based on Safety Class). which is initialized to O. rule R1 moves α into Os provided Os remains safe w. indeed. Note also that it follows from Deﬁnition 40 that Om is an O(·)-based S-module in O iﬀ Om is an O(·)-based S -module in O for every S with S ⊆ S ⊆ (S ∪ Sig(Om )).t. |Os |) consisting of the sizes for these sets increases in lexicographical order. At the end of this process.

that Om is an O(·)-based S-module in O. ↑ ↑ Initial Conﬁguration = ∅|O|∅ Termination Condition: Ou = ∅ module safe Rewrite rules: R1. suppose that. Proof. the sets Om . and hence. subset-closed. O(·) terminates and returns an O(·)based S-module Om in O. subset-closed and union-closed. (1) The procedure based on the rewrite rules from Figure 4 always terminates for the following reasons: (i) for every conﬁguration derived by the rewrite rules. For the rewrite rule R2 we have: Om | Ou ∪ {α} | Os =⇒ Om ∪ {α} | Ou ∪ Os | ∅ if (Os ∪ {α}) ∈ O(S ∪ Sig(Om )). is the smallest O(·)-based S-module in O. and S a signature over L. and suppose that Om is an O(·)-based S-module in O. Additionally. additionally. & Sattler Input: Output: an ontology O. Horrocks. Om | Ou ∪ {α} | Os =⇒ Om | Ou | Os ∪ {α} R2. Indeed. |Os |) I2. Os ∈ O(S ∪ Sig(Om )). S. a safety class O(·) a module Om in O based on O(·) unprocessed ↓ Conﬁguration: Om | Ou | Os . Ou and Os form a partitioning of O (see invariant I1 in Figure 4). Upon termination. it is the case that Om ⊆ Om . O(·) is anti-monotonic. and therefore the size of every set is bounded. and the procedure returns precisely this minimal module. and (2) If. if Ou = ∅ then it is always possible to apply one of the rewrite rules R1 or R2. by Deﬁnition 40. which implies. O = Om Ou Os if (Os ∪ {α}) ∈ O(S ∪ Sig(Om )) if (Os ∪ {α}) ∈ O(S ∪ Sig(Om )) Invariant for Om | Ou | Os =⇒ Om | Ou | Os : I3. a signature S. (ii) at each rewrite step. () 304 . (|Om |. |Os |) increases in lexicographical order (see invariant I3 in Figure 4). in addition. then there is a unique minimal O(·)-based S-module in O. Kazakov. O(·) is an anti-monotonic.Cuenca Grau. O an ontology over L. and hence the procedure always terminates with Ou = ∅. (|Om |. The rewrite rule R1 does not change the set Om . |Os |) <lex (|Om |. and unionclosed safety class. We demonstrate by induction that for every conﬁguration Om | Ou | Os derivable from ∅ | O | ∅ by rewrite rules R1 and R2. by invariant I1 from Figure 4. Then: (1) The procedure in Figure 4 with input O. Os ∈ O(S ∪ Sig(Om )) Figure 4: A Procedure for Computing Modules Based on a Safety Class O(·) Proposition 42 (Correctness of the Procedure from Figure 4) Let O(·) be a safety class for an ontology language L. (2) Now. Om | Ou ∪ {α} | Os =⇒ Om ∪ {α} | Ou ∪ Os | ∅ Invariants for Om | Ou | Os : I1. O is partitioned into Om and Os and by invariant I2. for the base case we have Om = ∅ ⊆ Om . This will prove that the module computed by the procedure is a subset of every O(·)-based S-module in O.

like those based on classes of local interpretations described in Section 5.Modular Reuse of Ontologies: Theory and Practice Input: an ontology O. The rewrite rule corresponding to the result of this test is applied to the conﬁguration. a signature S. produces the smallest possible module based on the safety class. In this case. Os ∈ O(S ∪ Sig(Om )) and O(·) is union-closed. Om | Ou ∪ {α} | Os ∪ Os =⇒ Om ∪ {α} | Ou ∪ Os | Os if {α} ∈ O(S ∪ Sig(Om )). whether α is local for IA←∅ (·). This contradiction implies that the rule R2 also preserves property Om ⊆ Om . instead of checking whether (Os ∪ {α}) ∈ O(S ∪ Sig(Om )) in the conditions of rules R1 and R2. Om | Ou ∪ {α} | Os =⇒ Om | Ou | Os ∪ {α} if {α} ∈ O(S ∪ Sig(Om )) α α R2. Since Om is an O(·)-based S-module in O. then. In the last column we indicate whether the ﬁrst conditions of the rules R1 r←∅ and R2 are fulﬁlled for the selected axiom α from Ou —that is. {α} ∈ O(S ∪ Sig(Om )). in each row. Os ∪ {α} ∈ O(S ∪ Sig(Om )). In Figure 5 we present an optimized version of the algorithm from Figure 4 for such locality classes. and Sig(Os ) ∩ Sig(α) ⊆ Sig(Om ) ∅|O|∅ Termination Condition: Ou = ∅ Figure 5: An Optimized Procedure for Computing Modules Based on a Compact SubsetClosed Union-Closed Safety Class O(·) Suppose. Since Om ⊆ Om and O(·) is anti-monotonic. it is possible to optimize the procedure shown in Figure 4. we have that Os ∈ O(S ∪ Sig(Om )). it is suﬃcient to check if {α} ∈ O(S ∪ Sig(Om )) since it is already known that Os ∈ O(S ∪ Sig(Om )). If O(·) is compact and subset closed. in fact. we have {α} ∈ O(S ∪ Sig(Om )). signature S = {Cystic Fibrosis. it is possible to show that this procedure runs in polynomial time assuming that the safety test can be also performed in polynomial time. If O(·) is union closed. as stated in claim (2) of Proposition 42. since the set of remaining axioms will stay in O(S ∪ Sig(Om )). If the safety class O(·) satisﬁes additional desirable properties. then instead of moving all the α axioms in Os to Ou in rule R2. that Om ⊆ Om but Om ∪ {α} Om . Since O(·) is subset-closed. a safety class O(·) Output: a module Om in O based on O(·) Initial Conﬁguration = Rewrite rules: R1. to the contrary. 305 . it is suﬃcient to move only those axioms Os that contain at least one symbol from α which did not occur in Om before. Genetic Disorder} r←∅ and safety class O(·) = OA←∅ (·) deﬁned in Example 26. Moreover. Example 43 In Table 5 we present a trace of the algorithm from Figure 5 for the ontology O consisting of axioms M1–M5 from Figure 1. the underlined axiom α is the one that is being tested for safety. The second column of the table shows the elements of S ∪ Sig(Om ) that have appeared for the current conﬁguration but have not been present for the preceding conﬁgurations. Since by invariant I2 from Figure 4. The ﬁrst column of the table lists the conﬁgurations obtained from the initial conﬁguration ∅ | O | ∅ by applying the rewrite rules R1 and R2 from Figure 5. Then α ∈ Os := O \ Om . the procedure.2. which contradicts ( ). Claim (1) of Proposition 42 establishes that the procedure from Figure 4 terminates for every input and produces a module based on a given safety class.

According to Claim (2) of Proposition 42 all such r←∅ computations should produce the same module Om . M5} from Figure 1 and S = {Cystic Fibrosis. has Origin. M5 | − Cystic Fibrosis. 306 . . but became non-local when new axioms were added to Om . for example. O an ontology. M4. M5 | M2 − | M1. However. M4. in our case. M4. which results in a diﬀerent computation. located In. Pancreas. Then O2 := O1 ∩ Om is an S-module in O w. M3. M4. the implicit non-determinism in the procedure from Figure 5 does not have any impact on the result of the procedure. because the set Ou may increase after applications of rule R2. and α = M3 in conﬁgurations 2 and 4. M4 | M2. M3. Horrocks. Genetic Disorder} Note that some axioms α are tested for safety several times for diﬀerent conﬁgurations.r.Cuenca Grau. ♦ It is worth examining the connection between the S-modules in an ontology O based on a particular safety class O(·) and the actual minimal S-modules in O. In our example. Kazakov.t. M3 | M2. M3. Om contains all the S-essential axioms in O. Lemma 44 Let O(·) be an anti-monotonic subset-closed safety class for an ontology language L. . that is. M4. M4 | − | M5 New elements in S ∪ Sig(Om ) − − Fibrosis. & Sattler Om | Ou .r. provided that O(·) is anti-monotonic and subset-closed. which is the smallest OA←∅ (·)-based S-module in O. Note also that diﬀerent results for the locality tests are obtained in these cases: both M2 and M3 were local w. M3 M1 | M2. the axiom α = M2 is tested for safety in both conﬁgurations 1 and 7. In other words. alternative choices for α may result in shorter computations: in our example we could have selected axiom M1 in the ﬁrst conﬁguration instead of M2 which would have led to a shorter trace consisting of conﬁgurations 1. Genetic Origin Genetic Fibrosis − − − {α} ∈ O(S ∪ Sig(Om ))? Yes Yes No No No Yes No ⇒ ⇒ ⇒ ⇒ ⇒ ⇒ ⇒ R1 R1 R2 R2 R2 R1 R2 1 − | M1. and 4–8 only. the procedure from Figure 5 has implicit non-determinism. the rewrite procedure produces a module Om consisting of axioms M1– M4. . It turns out that any O(·)-based module Om is guaranteed to cover the set of minimal modules. syntactic locality produces the same results for the tests. M2. M3. The following Lemma provides the main technical argument underlying this result. Note that it is possible to apply the rewrite rules for diﬀerent choices of the axiom α in Ou . and S a signature over L. M5 | − M1. S ∪ Sig(Om ) when Om = ∅. . M3. M5 | − M1.r. M5 | M2.t. M4 | M2 | M5 M1. In other words.t. Genetic Disorder Table 5: A trace of the Procedure in Figure 5 for the input Q = {M1. M3. M2. M5 | − M1. L and Om an O(·)-based S-module in O. α | Os 2 3 4 5 6 7 8 − | M1. given O and S. L. It is also easy to see that. Let O1 be an S-module in O w.

Now. the extracted module contains only essential axioms. In particular O2 is an S-module in O1 w. and hence. Since O1 \ O2 = O1 \ Om ⊆ O \ Om and O(·) is subset-closed.t. this module. contains all S-essential axioms in O w. We demonstrate that O1 ⊆ Om . it is the case that O |= α implies OA |= α. Indeed. we have that O1 \ O2 ∈ O(S ∪ Sig(O2 )). In particular. Then Om contains all S-essential axioms in O w. (b) Consider O = O ∪{B ⊥}. {B ⊥} ∈ / O(∅) and O(·) is compact. and O2 ⊆ Om .r. B}.r.t. by Lemma 44. since Om is an O(·)-based S-module in O. we have that OA is an O(·)-based S-module in O .t.t. then O \ OA ∈ O(S ∪ Sig(OA )). Then: 1 If O |= α := (A 2 If O |= α := (B B) and {B A) and { ⊥} ∈ O(∅) then OA |= α.r. in order to test subsumption between a pair of atomic concepts. we have that O \ Om ∈ O(S ∪ Sig(Om )). since B ∈ Sig(OA ). We have seen in this example that the locality-based S-module extracted from O contains all of these axioms. Since O(·) is union-closed. hence (O \ OA ) ∪ {B ⊥} = O \ OA . Proof.t. In our case. however.r. As shown in Section 3. L. otherwise. B} ∈ O(∅) then OA |= α.r. by Deﬁnition 12 and Deﬁnition 1.r. we have that OA |= (A ⊥) which implies OA |= (A B). Corollary 45 Let O(·) be an anti-monotonic. localitybased modules might contain non-essential axioms. Since Sig(α) ⊆ S. B atomic concepts. and.4. it is suﬃcient to extract a module for a subset of the signature of α which. Consider two cases: (a) B ∈ Sig(OA ) and (b) B ∈ Sig(OA ). by Deﬁnition 40. in order to check whether O |= α it suﬃces to retrieve the module for Sig(α) and verify if the implication holds w. Let O1 be a minimal S-module in O w. hence. In some cases. in accordance to Corollary 45. 1. L. An interesting application of modules is the pruning of irrelevant axioms when checking if an axiom α is implied by an ontology O. it is the case that O1 \ O2 ∈ O(S ∪ Sig(Om )). Since O1 is an S-module in O w. by Deﬁnition 40. Since OA is an O(·)-based S-module in O. O2 is an O(·)-based S-module in O1 . Let OA be an O(·)-based module in O for S = {A} in O. leads to smaller modules. since OA is a module in O for S = {A}. by Deﬁnition 24 it is the case that {B ⊥} ∈ O(S ∪ Sig(OA )).Modular Reuse of Ontologies: Theory and Practice Proof. L which is strictly contained in O1 . subset-closed safety class for L and Om be an O(·)-based S-module in O. Indeed. since O |= (A B).t. all the axioms M1–M4 are essential for the ontology O and signature S considered in Example 43. Note that B ⊥ ∈ OA . O an ontology and A.t.r. as given by the following proposition: Proposition 46 Let O(·) be a compact union-closed safety class for an ontology language L. L. if the safety class being used enjoys some nice properties then it suﬃces to extract a module for one of them. / (a) By Remark 41 it is the case that OA is an O(·)-based module in O for S = {A. Since Sig(B ⊥) = {B} and B ∈ Sig(OA ). L. L. in general. Proof. it is the case that (O \ OA ) ∪ {B ⊥} ∈ O(S ∪ Sig(OA )). O2 is an S-module in O w. Hence Om is a superset of every minimal S-module in O and hence. it is the case that O |= (A ⊥). L. in general. 307 .t. O1 ∩ Om is an S-module in O w. By Deﬁnition 40. Since O(·) is anti-monotonic.r.

2007). the empty signature. is complete for all the sub-concepts of B in M1 . it is the case that OB |= ( A). in Case (b) we show that OA is an O(·)-based module for S = {A} in O = O∪{ B}. For example. for example. One could extract a OA←∆ (·)-based module M2 for S = {B} in M1 which. Indeed.Cuenca Grau. which implies O |= (B A). Lutz et al. respectively.. including B—that is. axioms of the form B ⊥ (Case 1) or ( B) (Case 2). ALCIQO (roughly OWL DL). Then O |= (A B) iﬀ OA |= (A B) iﬀ OB |= (A B). it is suﬃcient to extract a module in O for S = {A} using a modularization algorithm based on a safety class in which the ontology {B ⊥} is local w. 308 . Kazakov. This property can be used. Proof. In order to check if the subsumption A B holds in an ontology O. then it is also a r←∗ super-concept of A in M1 . 2007). & Sattler 2.r. 7. 2007) (roughly OWL-Lite). By Proposition 46. hence. when applied to the empty signature. It is easy to see that {B r←∗ ⊥} ∈ OA←∅ (∅) and { r←∗ A} ∈ OA←∆ (∆). including A. one could use the syntactic locality conditions given in Figure 3 instead of their semantic counterparts. and undecidable w. 2006. by Corollary 47 this module is complete for all the super-concepts of A in O.t. Lutz & Wolter. Related Work We have seen in Section 3 that the notion of conservative extension is valuable in the formalization of ontology reuse tasks. The proof of this case is analogous to that for Case 1: Case (a) is applicable without changes. B atomic concepts. it is convenient to use a syntactically tractable approximation of the safety class in use.r.. B is a super-concept or a sub-concept of A in the ontology if and only if it is such in the module. the module. and for ALC it is even not semi-decidable (Lutz et al. 2007). That is. Let OA←∅ (·) and r←∗ r←∗ OA←∆ (·) be locality classes based on local classes of interpretations of form IA←∅ (·) and r←∗ (·). provided that the safety class captures. checking model conservative extensions is already undecidable for EL (Lutz & Wolter.. for example. and check whether this subsumption holds w. r←∗ Corollary 47 Let O be a SHOIQ ontology and A. if an atomic concept is a super-concept of A in O. It is possible to combine modularization procedures to obtain modules that are smaller than the ones obtained using these procedures individually. Proposition 46 implies that a module based on a safety class for a single atomic concept A can be used for capturing either the super-concepts (Case 1). 2007). and. since O |= ( A). B} and M1 is an S-module in the original ontology O.r. it is the case that M2 is also an S-module in O. For this purpose.r. 2007. by Corollary 47. to optimize the classiﬁcation of ontologies. The problem of deciding conservative extensions has been recently investigated in the context of ontologies (Ghilardi et al. in order to check r←∗ the subsumption O |= (A B) one could ﬁrst extract a OA←∅ (·)-based module M1 for S = {A} in O. therefore. The problem of deciding whether P ∪ Q is a deductive S-conservative extension of Q is EXPTIME-complete for EL (Lutz & Wolter.. Furthermore. from Table 3. 2-EXPTIME-complete w.t. ALCIQ (Lutz et al. M2 is an S-module in M1 for S = {A. Let O be a module for S = {A} based on O r←∗ (·) and IA←∆ A A←∅ r←∗ OB be a module for S = {B} based on OA←∆ (·). or the sub-concepts (Case 2) B of A.t. Horrocks.t.

and α is satisﬁed in every such a model. for the included concepts. all the remaining axioms of Q are retrieved. and Ontology Segmentation (Kalfoglou & Schorlemmer. numerous techniques for extracting fragments of ontologies for the purposes of knowledge reuse have been proposed. It is easy to see that Q is consistent. In general. 2004b). Hence. S is expanded with the symbols in Sig(Q1 ). In particular. “intersection”. Given S = {B. 1999). and so Q2 is not a module in Q. Another example is Seidenberg’s segmentation algorithm (Seidenberg & Rector. Currently. given a set of atomic concepts S. Ontology Merging. but not their “subconcepts”. so the authors investigate the possibility of splitting GALEN into small “segments” which can be processed by reasoners separately. which does not imply α. An example of such a procedure is the algorithm implemented in the Prompt-Factor tool (Noy & Musen. admits only single element models. Most of these techniques rely on syntactically traversing the axioms in the ontology and employing various heuristics to determine which axioms are relevant and which are not. M4. The authors describe a segmentation procedure which. Ontology Integration. the segment should contain all “super-” and “sub-” concepts of the input concepts. or. consider an ontology Q = { {a}. otherwise. α = (A ∀r. 2003. and S = {A}. In this case. Given a signature S and an ontology Q. Genetic Disorder}. which was used for segmentation of the medical ontology GALEN (Rector & Rogers. B C} and α = (C B). It is also not clear which axioms should be included in 309 . the axioms in Q that mention any of the symbols in S are added to Q1 . This ﬁeld is rather diverse and has roots in several communities.Modular Reuse of Ontologies: Theory and Practice In the last few years. 2004a. computes a “segment” for S in the ontology. and M5 containing these terms. For example. After this step. “union”. Noy. The ontology Q is inconsistent due to the axiom A ≡ ¬A: any axiom (and α in particular) is thus a logical consequence of Q. Q2 |= α. a rapidly growing body of work has been developed under the headings of Ontology Mapping and Alignment. For example. that is. Q |= α. the Prompt-Factor algorithm may fail even if Q is consistent. the full version of GALEN cannot be processed by reasoners. 2006). concepts that are “linked” from the input concepts (via existential restrictions) and their “super-concepts”. the PromptFactor algorithm extracts a module (though not a minimal one). For our example in Section 3. however. such that S contains all the symbols of Q. and “equivalent concepts” should be considered by including the roles and concepts they contain. the extracted fragment is not guaranteed to be a module. when S = {Cystic Fibrosis. In this case. A B}. the algorithm ﬁrst retrieves axioms M1. From the description of the procedure it is not entirely clear whether it works with a classiﬁed ontology (which is unlikely in the case of GALEN since the full version of GALEN has not been classiﬁed by any existing reasoner). second. The description of the procedure is very high-level. consider an ontology Q = {A ≡ ¬A. the algorithm retrieves a fragment Q1 ⊆ Q as follows: ﬁrst. how the “super-” and “sub-” concepts are computed. In general. the Prompt-Factor algorithm extracts Q2 = {B C}. however. 2003). the fragment extracted by the Prompt-Factor algorithm consists of all the axioms M1-M5. C}. also “their restrictions”. then expands S with the symbols mentioned in these axioms. and Q consists of axioms M1–M5 from Figure 1. These steps are repeated until a ﬁxpoint is reached. In particular.A). the Prompt-Factor algorithm extracts Q1 = {A B}. The authors discuss which concepts and roles should be included in the segment and which should not. together with their “super-concepts” and “super-roles” but not their “sub-concepts” and “sub-roles”.

Cuenca Grau. In particular. Distributed Description Logics (Borgida & Seraﬁni. Such studies are beyond the scope of this paper. Kazakov. Caragea. namely that the module QA should entail all the subsumptions in the original ontology between atomic concepts involving A and other atomic concepts in QA . 2006b).iastate. The algorithm is intended as a visualization technique. & Sattler the segment in the end. What is common between the modularization procedures we have mentioned is the lack of a formal treatment for the notion of module. Cuenca Grau et al. A diﬀerent approach to module extraction proposed in the literature (Stuckenschmidt & Klein. The authors present an algorithm for partitioning an ontology into disjoint modules and proved that the algorithm is correct provided that certain safety requirements for the input ontology hold: the ontology should be consistent. The algorithm uses a set of heuristics for measuring the degree of dependency between the concepts in the ontology and outputs a graphical representation of these dependencies. The paper imposes an additional requirement on modules. and does not establish a correspondence between the nodes of the graph and sets of axioms in the ontology. One of the requirements for the module is that Q should be a conservative extension of QA (in the paper QA is called a logical module in Q). since the procedure talks only about the inclusion of concepts and roles. for information see the homepage of the workshop http://www.. It might be possible to formalize these algorithms and identify ontologies for which the “intuitionbased” modularization procedures work correctly. and we establish a collection of reasoning services. such as E-connections (Cuenca Grau. The interested reader can ﬁnd in the literature a detailed comparison between the diﬀerent approaches for combining ontologies (Cuenca Grau & Kutz. there have been various proposals for “safely” combining modules. we assume here that reuse is performed by simply building the logical union of the axioms in the modules under the standard semantics. most of these proposals. 2004) consists of partitioning the concepts in an ontology to facilitate visualization of and navigation through an ontology. Concerning the problem of ontology reuse. In contrast. should not contain unsatisﬁable atomic concepts. The growing interest in the notion of “modularity” in ontologies has been recently reﬂected in a workshop on modular ontologies5 held in conjunction with the International Semantic Web Conference (ISWC-2006). but rather argue what should be in the modules and what not based on intuitive notions. Horrocks. they do not take the semantics of the ontology languages into account. In contrast to these works.cild. Parsia. & Sirin.edu/events/womo. the algorithm we present here works for any ontology. and should have only “safe” axioms (which in our terms means that they are local for the empty signature). 5. Module extraction in ontologies has also been investigated from a formal point of view (Cuenca Grau et al. including those containing “non-safe” axioms. & Honavar. The papers describing these modularization procedures do not attempt to formally specify the intended outputs of the procedures. (2006) deﬁne a notion of a module QA in an ontology Q for an atomic concept A. 2003) and Package-based Description Logics (Bao. to check for side-eﬀects.html 310 . 2006) propose a specialized semantics for controlling the interaction between the importing and the imported modules to avoid side-eﬀects. such as safety testing. 2006a). 2007).

Implementation and Proof of Concept In this section. Second. 2006) and illustrate the ˜ r←∅ ˜ r←∆×∆ combination of the modularization procedures based on the classes OA←∅ (·) and OA←∆ (·). & Hendler.1 Locality for Testing Safety ˜ r←∅ We have run our syntactic locality checker for the class OA←∅ (·) over the ontologies from a library of 300 ontologies of various sizes and complexity some of which import each other (Gardiner. we show that the locality class OA←∅ (·) provides a powerful suﬃciency test for ˜ r←∅ safety which works for many real-world ontologies. For this purpose. ˜ r←∅ A3: Our modularisation algorithm (Algorithm 5)..Modular Reuse of Ontologies: Theory and Practice 8. based on the locality class OA←∅ (·). & Horrocks. Parsia. 8. 2004) to which our framework does not yet apply. 6. we were able to easily repair these non-localities as follows: we replace every occurrence of A in P with B and then remove this axiom from the ontology. In this section by “module” we understand the result of the considered modularization procedures which may not necessarily be a module according to Deﬁnition 10 or 12 8. 2006). we compare three modularization7 algorithms that we have implemented using Manchester’s OWL API:8 A1: The Prompt-Factor algorithm (Noy & Musen. The aim of the experiments described in this section is not to provide a throughout comparison of the quality of existing modularization algorithms since each algorithm extracts “modules” according to its own requirements. all but 11 were syntactically local for S (and hence also semantically local for S). 7 are written in the OWL-Full species of OWL (Patel-Schneider et al. A2: The segmentation algorithm proposed by Cuenca Grau et al. Third. The library is available at http://www. Indeed. we provide empirical evidence of the appropriateness of locality for safety testing and module extraction.6 For all ontologies P that import an ontology Q.cs. Sirin. After this transformation. ˜ r←∅ First. It turned out that from the 96 ontologies in the library that import other ontologies. we check if P belongs to the locality class for S = Sig(P) ∩ Sig(Q).2 Extraction of Modules In this section. The remaining 4 non-localities are due to the presence of so-called mapping axioms of the form A ≡ B . From the 11 non-local ontologies. we report on our implementation in the ontology editor Swoop (Kalyanpur. Tsarkov. B in the two ontologies under consideration are synonyms. we show that OA←∅ (·)-based modules are typically very small compared to both the size of the ontology and the modules extracted using other techniques. (2006).ac. but rather to give an idea of the typical size of the modules extracted from real ontologies by each of the algorithms. Cuenca Grau. we have implemented a syntactic loca˜ r←∅ ˜ r←∆×∆ lity checker for the locality classes OA←∅ (·) and OA←∆ (·) as well as the algorithm for extracting modules given in Figure 5 from Section 6. http://sourceforge. where A ∈ S and B ∈ S.uk/~horrocks/testing/ 7. all 4 non-local ontologies turned out to be local.man. 2003). / Note that these axioms simply indicate that the atomic concepts A.net/projects/owlapi 311 . 8.

Horrocks. & Sattler (a) Modularization of (a) Modularization of NCINCI (b) Modularization of GALEN-Small (b) Modularization of GALEN-Small (c) Modularization of of SNOMED (c) Modularization SNOMED (d) Modularization of of GALEN-Full (d) Modularization GALEN-Full (e) Small modules GALEN-Full (e) Smallmodules of of GALEN-Full (f) Large modules GALEN-Full (f) Largemodules of of GALEN-Full Figure 6: Distribution for the sizes of syntactic locality-based modules: the X-Axis gives the number of concepts in the modules and the Y-Axis the number of modules extracted for each size range.Cuenca Grau. Kazakov. 312 .

15. This group contains the well-known GALEN ontology (GALEN-Full).13 the DOLCE upper ontology (DOLCE-Lite).9 37.org/prj_galen.org/2003/CancerOntology/nciOncology.jpl.(%) 75. Since there is no benchmark for ontology modularization and only a few use cases are available.snomed.Modular Reuse of Ontologies: Theory and Practice Ontology Atomic Concepts A1: Prompt-Factor Max.3 Avg. we have also considered a version GALEN-Small that has commonly been used as a benchmark for OWL reasoners. but only deﬁnitions. 13.9 the SUMO Upper Ontology.6 NCI SNOMED GO SUMO GALEN-Small GALEN-Full SWEET DOLCE-Lite 27772 255318 22357 869 2749 24089 1816 499 Table 6: Comparison of Diﬀerent Modularization Algorithms As a test suite.(%) 30. we took the set of its atomic concepts and extracted modules for every atomic concept.05 0.10 the Gene Ontology (GO).1 24.org http://www.1 100 100 100 88. Therefore we have designed a simple experiment setup which.teknowledge.5 100 A3: Loc. 10.4 2 10 29. it should give an idea of typical module sizes.geneontology. yet similar in structure. 11. Complex.8 1. We compare the maximal and average sizes of the extracted modules.com/ http://www. which we divided into two groups: Simple.5 0. we have included the National Cancer Institute (NCI) Ontology.7 3.3 100 Avg. which typically includes a fair amount of other concepts and roles.08 0.(%) 87. http://www. For each ontology.14 and NASA’s Semantic Web for Earth and Environmental Terminology (SWEET)15 . It is worth emphasizing here that our algorithm A3 does not just extract a module for the input atomic concept: the extracted fragment is also a module for its whole signature. In the case of GALEN. These ontologies are complex since they use many constructors from OWL DL and/or include a signiﬁcant number of GCIs.8 0. These ontologies are expressed in a simple ontology language and are of a simple structure.84 100 0.html http://sweet.5 0.4 100 Avg. they do not contain GCIs.openclinical.(%) 55 100 1 100 100 100 83.nasa.(%) 0.-based mod.6 100 1 100 100 100 96.05 0. In this group.html http://www. Max. 9.(%) 0. This ontology is almost 10 times smaller than the original GALEN-Full ontology. we have collected a set of well-known ontologies available on the Web. there is no systematic way of evaluating modularization procedures.7 100 A2: Segmentation Max.mindswap.11 and the SNOMED Ontology12 . 12. 14.1 100 100 100 51.gov/ontology/ 313 .loa-cnr.it/DOLCE. even if it may not necessarily reﬂect an actual ontology reuse scenario. in particular.8 100 0.owl http://ontology.org http://www.09 1.

as opposed to 1/200 in the case of SNOMED. GO and SUMO. in particular. In the table. For DOLCE. For GALEN. in SNOMED.5% of the size of the ontology. the modules we obtain using our algorithm are signiﬁcantly smaller than the size of the input ontology. In fact. SNOMED. the ontology is heavily underspeciﬁed. In contrast. SWEET and DOLCE. most of the modules we have obtained for these ontologies contain less than 40 atomic concepts. In Figure 6. the algorithms A1 and A2 retrieve the whole ontology as the module for each input signature. GALEN and SNOMED. and the average size of the modules is 1/10 of the size of the largest module. & Sattler ˜ r←∅ ˜ r←∆×∆ (a) Concepts DNA Sequence and (b) OA←∅ (S)-based module for (c) OA←∆ (S)-based module for Microanatomy in NCI DNA Sequence in NCI Micro Anatomy in the fragment 7b Figure 7: The Module Extraction Functionality in Swoop The results we have obtained are summarized in Table 6. This can be explained by the fact that these ontologies. the largest module in GALEN-Small is 1/10 of the size of the ontology. even if large. are simple in structure and logical expressivity. The SWEET ontology is an exception: even though the ontology uses most of the constructors available in OWL. Horrocks. which yields small modules. DOLCE. the X-axis represents the size ranges of the ob314 . For NCI. Kazakov.Cuenca Grau. the locality-based modules are larger. Here. we have obtained very small locality-based modules. GALEN-Small and GALEN-Full. in the case of SUMO. For example. The table provides the size of the largest module and the average size of the modules obtained using each of these algorithms. Indeed. SNOMED. the largest locality-based module obtained is approximately 0. we can clearly see that locality-based modules are signiﬁcantly smaller than the ones obtained using the other methods. the modules are even bigger—1/3 of the size of the ontology—which indicates that the dependencies between the diﬀerent concepts in the ontology are very strong and complicated. we have a more detailed analysis of the modules for NCI.

By Corollary 47. This abrupt distribution indicates the presence of a big cycle of dependencies in the ontology. 16. The plots thus give an idea of the distribution for the sizes of the diﬀerent modules. In order to explore the use of our results for ontology design and analysis. Since our algorithm is based on weaker requirements. What is surprising is that the diﬀerence in the size of modules is so signiﬁcant.google. For SNOMED. ˜ r←∅ as obtained in Swoop. This suggests that the knowledge in NCI about the particular concept DNA Sequence is very shallow in the sense that NCI only “knows” that a DNA Sequence is a macromolecular structure. we have integrated our algorithm for extracting modules in the ontology editor Swoop (Kalyanpur et al. This cycle does not occur in the simpliﬁed version of GALEN and thus we obtain a smooth distribution for that case. this module contains all the sub-concepts of Micro Anatomy in the previously extracted module. In contrast. the ﬁgure shows that there is a large number of modules of size in between 6515 and 6535 concepts. The considerable diﬀerences in the size of the modules extracted by algorithms A1 – A3 are due to the fact that these algorithms extract modules according to diﬀerent requirements. Figure 7b shows the minimal OA←∅ (·)-based module for DNA Sequence. The presence of this cycle can be spotted more clearly in Figure 6(f). for GALEN-Full. The tool can be downloaded at http://code. it is to be expected that it extracts smaller modules. the fragment and the rest of the ontology have disjoint signatures. according to Corollary 47. In contrast. The resulting module is shown in Figure 7b. NCI and GALEN-Small. Thus this module can be seen as the “upper ontology” for A in O.com/p/swoop/ 315 . in Figure 6(e) we can see that the distribution for the “small” modules in GALEN-Full is smooth and much more similar to the one for the simpliﬁed version of GALEN.. The user interface of Swoop allows for the selection of an input signature and the retrieval of the corresponding module. we can observe that the size of the modules follows a smooth distribution. in the end.Modular Reuse of Ontologies: Theory and Practice tained modules and the Y-axis the number of modules whose size is within the given range. which. Algorithm A1 produces a fragment of the ontology that contains the input atomic concept and is syntactically separated from the rest of the axioms—that is. all its (entailed) super-concepts in O.16 Figure 7a shows the classiﬁcation of the concepts DNA Sequence and Microanatomy in ˜ r←∅ the NCI ontology. a OA←∅ (·)-based module for an atomic concept contains all necessary axioms for. one could extract the OA←∆ (·)based module for Micro Anatomy in the fragment 7b. If one wants to reﬁne the module by only including the information in the ontology necessary to ˜ r←∆×∆ entail the “path” from DNA Sequence to Micro Anatomy. Recall that. 2006). we have obtained a large number of small modules and a signiﬁcant number of very big ones. but no medium-sized modules in-between. is an anatomy kind. at least. Figure 7 shows that this module contains only the concepts in the “path” from DNA Sequence to the top level concept Anatomy Kind. Algorithm A2 extracts a fragment of the ontology that is a module for the input atomic concept and is additionally semantically separated from the rest of the ontology: no entailment between an atomic concept in the module and an atomic concept not in the module should hold in the original ontology. In fact.

. Professional Book Center. 2007) and the results obtained in Section 4. 298– 304. 72–86. Springer-Verlag.t. Web Sem. 2005. E. Modular ontology languages revisited.). B. In IJCAI-05.. B. Kazakov. (1997). & Patel-Schneider. McGuinness. P. U. 2007. We have dealt with these problems by deﬁning suﬃcient conditions for a solution to exist. Implementation. Y. (2003). B¨rger.. 4273 of Lecture Notes in Computer Science. D.. E. References Baader. Baader. UK. Horrocks. USA. & Lutz... 2006. In IJCAI-07. we have used safety classes to extract modules from ontologies. India. GA. E. & Kutz. J. D. Parsia. We have established the relationships between these problems and studied their computability. 153–184.. In Proceedings of the Tenth International Conference on Principles of Knowledge 316 .. F. A. a signature. F. which can be computed in practice. Horrocks. Distributed description logics: Assimilating information from peer sources. F. D.. Proceedings of the Twentieth International Joint Conference on Artiﬁcial Intelligence. Cuenca Grau. O. Brandt.. we have shown that these problems are undecidable or algorithmically unsolvable for the logic underlying OWL DL.r. E. (2006). & Kalyanpur. (2007). Kazakov.. (2005). In Proceedings of the Workshop on Semantic Web for Collaborative Knowledge Acquisition. and exploit modules to optimize ontology reasoning. Sirin. Borgida. Modularity and web ontologies. Gr¨del. Nardi. (2003). Proceedings of the Nineteenth International Joint Conference on Artiﬁcial Intelligence. B. January 5. J. For future work.. Calvanese. & Sattler. V. In addition. Using existing results (Lutz et al. Conclusion In this paper. Cuenca Grau.. which characterizes any suﬃciency condition for safety of an ontology w. India. Data Semantics. & Seraﬁni. Hyderabad. (2007). D.. Hyderabad. B. C. Cambridge University Press. Parsia. A logical framework for modularity of ontologies. Vol. B. L. & Gurevich. pp. Y. we have proposed a set of reasoning problems that are relevant for ontology reuse. 40–59.. pp. January 2007. 1.. 364–370. L. Bao. Combining OWL ontologies using Econnections. pp. Caragea. & Honavar. July 30-August 5. (Eds. Second printing (Universitext) 2001.Cuenca Grau. I. The Classical Decision Problem. November 5-9. & Sirin. The Description Logic Handbook: Theory. we would like to study other approximations which can produce small modules in complex ontologies like GALEN. J. Edinburgh. On the semantics of linking and importing in modular ontologies. AAAI. S... & Sattler 9. (2006a). Athens.. Cuenca Grau. Perspectives o a of Mathematical Logic. We have introduced and studied the notion of a safety class. In Proceedings of the 5th International Semantic Web Conference (ISWC-2006). Scotland. and Applications. (2006b). Pushing the EL envelope... A. 4 (1). Cuenca Grau. B..

2006. O. J. R. A. Tsarkov. Reasoning in Description Logics using Resolution and Deductive Databases. I. Ghilardi. F. I.. Will my ontologies ﬁt together?. Germany. Bremen. S. Framework for an automated comparison of description logic reasoners. Professional Book Center. & Wolter. (2006). 4273 of Lecture Notes in Computer Science. Parsia. AAAI Press. C. Windermere. chap.. 4603 of Lecture Notes in Computer Science.D. Vol. 187–197.. June 2-5. In Proceedings of the Tenth International Conference on Principles of Knowledge Representation and Reasoning (KR-2006). pp. 4 (2). USA. UK.. Ontology mapping: The state of the art. pp. Horrocks. 1–31. 2006. 717–726. Kalyanpur. A tableaux decision procedure for SHOIQ.. 18. In Proceedings of the 2006 International Workshop on Description Logics (DL-2006). Kazakov. pp.. Springer. In Proceedings of the 21st International Conference on Automated Deduction (CADE-21). 2007. C. I. A. Kutz. July 30-August 5.June 1. F. 2006. & Sattler. B.. Canada.. 1 (1). & van Harmelen. Cambridge University Press. May 8-12. Scotland. Karlsruhe.. Web Sem. Alberta. The Knowledge Engineering Review.. Horrocks. 2007.. (2006). Lutz. AAAI Press. I. November 5-9. F. Cuenca Grau. thesis. B. Patel-Schneider. June 2-5. Edinburgh.. 8. Y... (2005). J. 84–99. & Horrocks. Y. & Sattler. U. From SHIQ and RDF to OWL: the making of a web ontology language. 317 . Semantic integration: A survey of ontology-based approaches. pp. Walther. Just the right amount: extracting modules from ontologies. Kalfoglou. SIGMOD Record. Germany. Lutz. (2006). Web Sem.org. 2006. In The Description Logic o Handbook. 7–26. 198–209. India. pp. N. I. pp. & Sattler. In Proceedings of the Twentieth International Joint Conference on Artiﬁcial Intelligence (IJCAI-07). Did I damage my ontology? a case for conservative extensions in description logics.. (2006). Springer. 189 of CEUR Workshop Proceedings. 33 (4). Horrocks. & Hendler. D. & Haarslev. 453–459. Vol. Athens.. U. & Wolter. J. Conservative extensions in the lightweight description logic EL. pp. V. B. In Proceedings of the 5th International Semantic Web Conference (ISWC-2006).. C. 282–305.Modular Reuse of Ontologies: Theory and Practice Representation and Reasoning (KR-2006). E. (2006). (2004a). Lutz. Motik. Swoop: A web ontology editing browser. P. (2003). (2007). Cuenca Grau. Conservative extensions in expressive description logics. B. & Schorlemmer.. CEUR-WS. May 30 . a Noy. Gardiner. D. (2003). M. 448–453. GA. ACM. F. UK. Horrocks. Lake District of the United Kingdom. Hyderabad. (2007). Vol. Sirin. January 2007. In Proceedings of the 16th International Conference on World Wide Web (WWW-2007). M¨ller. Ph. In Proceedings of the Nineteenth International Joint Conference on Artiﬁcial Intelligence (IJCAI-05)... (2007). Lake District. AAAI. Lake District of the United Kingdom. (2003). U. Cuenca Grau. Univesit¨t Karlsruhe (TH). pp. 654–667. Banﬀ. F... 65–70. B. 144–153. & Wolter. 2005. July 17-20. Description logic systems. F. T...

In Staab. (Eds. P. S. A. (2004). Seidenberg. In Proceedings of the Third International Joint Conference on Automated Reasoning (IJCAR 2006). Pellet system description. Elsevier. (JAIR). Schmidt-Schauß. Int. pp. 365–384. & Parsia. E.. & Horrocks. Stuckenschmidt. N. B. WA. Sirin.. & Rector. Noy. Scotland. 1–26. & Sattler Noy. Web ontology segmentation: analysis. & Rogers. Res. 6 (59). (2004b). Elsevier. Tsarkov. Tobies. & Studer.org. & Smolka. Vol. 289–303. British Columbia. S. & Studer (Staab & Studer. & Klein. R. pp. UK. 2006. Horrocks. classiﬁcation and use. In Proceedings of the 2004 International Workshop on Description Logics (DL2004). (2006). FaCT++ description logic reasoner: System description. Hiroshima. International Handbooks on Information Systems. Proceedings. 48 (1). I. Attributive concept descriptions with complements. USA. (2004). In Proceedings of the 15th international conference on World Wide Web (WWW-2006). P. & Horrocks. Rector. J. (2003). J. 2006. 13–22.. Vol. Springer. (2000). Patel-Schneider. Staab.. (1999).. M. A. June 6-8. W3C Recommendation. 12.. L. 318 . D. Artif. Handbook on Ontologies. Tools for mapping and merging ontologies. (2006). August 17-20. ACM. May 23-26. Intell. Vol. (2004). H. pp. I. & Musen. 104 of CEUR Workshop Proceedings.. M. Springer. (2004). Structure-based partitioning of large class hierarchies. Kazakov. pp. Springer. 2004... (1991). Japan. CEUR-WS. The complexity of reasoning with cardinality restrictions and nominals in expressive description logics. M. 292–297. Seattle.). Hayes. Ontological issues in using a description logic to represent medical concepts: Experience from GALEN. 4130 of Lecture Notes in Computer Science.. Web ontology language OWL Abstract Syntax and Semantics. G. J. November 7-11. 2004). Edinburgh. Journal of Human-Computer Studies. 199–217. The PROMPT suite: Interactive tools for ontology mapping and merging. Artiﬁcial Intelligence.Cuenca Grau. Whistler. N. 3298 of Lecture Notes in Computer Science. Canada. F. In Proceedings of the Third International Semantic Web Conference (ISWC2004). In IMIA WG6 Workshop. 2004.

- Fanuc Lr Mate 200ic
- 17441476-John-Barrow-Chaos-in-Number-Land.pdf
- 17441476-John-Barrow-Chaos-in-Number-Land.pdf
- eula.rtf
- SanDisk_SecureAccess_QSG.pdf
- 6821.full.pdf
- 17441476-John-Barrow-Chaos-in-Number-Land.pdf
- barrow_autobio2_nov07.pdf
- 6821.full.pdf
- 126882283-Mechanical-Engineering-dictionary.pdf
- barrow_autobio2_nov07.pdf
- barrow_autobio2_nov07.pdf
- Barrow Autobio2 Nov07
- GeometrySuccessin20MinutesaDay3rdEdition
- Trigonometry Success in 20 Minutes a Day
- CalculusSuccessin20MinutesaDay2ndEdition
- CalculusSuccessin20MinutesaDay2ndEdition
- Colloquium Brief Cyber Infrastructure Protection 2011-12-19 SSI Article
- Five Hundred and Seven Mechanical Moveme
- Definitions of Racism
- Evolution
- Archimedes_5

- A Logical Proof of the Free Will Theorem - Reznikoff 2010
- Two Defenses of Common-Sense Ontology
- Quine
- Assignment SWI
- affordance gibson5.pdf
- On t Ologists
- Putnam%2C Hilary - Ethics Without Ontology-1
- Application of Smarandache Geometric, Neutrosophic and Quantized Methods In Physics, Astrophysics and Science of Conservation of Energy by Fu Yuhua
- 115-302-2-PB
- OAEI-JODS
- Truth Definitions, Skolem Functions and Axiomatic Set Theory - Hintikka - 1998.pdf
- Turnbull, Neil - The Ontological Consequences of Copernicus Global Being in the Planetary World (2006)
- Gillies D -Philosophy of Science in the Twentieth Century. an Introduction(1993)(224)
- TS1
- Special Issue of the Journal of Web Semantics
- Multiplication
- Inference Rules
- S UPPORTING LANGUAGE LEARNERS WITH THE MEANINGS OF CLOSED CLASS ITEMS
- 20130125-Totten Format U
- Summary eBook En
- First Order Logic
- mmf91j
- AN_CLP.pdf
- IDL_SPEC
- Four DimensionalismandPuzzles
- 45964590 an Introduction to Multi Agent Systems
- Free Encyclopedia of Mathematics-Vol 1
- Herong Book Unicode
- Policy based awareness management
- Logical Reasoning

Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

We've moved you to where you read on your other device.

Get the full title to continue

Get the full title to continue reading from where you left off, or restart the preview.

scribd