<<

Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning (KR 2020) Main Track

An ExpTime Upper Bound for with Integers ALC

Nadia Labai , Magdalena Ortiz , Mantas Simkusˇ Faculty of Informatics, TU Wien, Austria labai, simkus @dbai.tuwien.ac.at, [email protected] { }

Abstract them has been often singled out as an open challenge with Concrete domains, especially those that allow to compare fea- significant practical implications (Lutz 2002a, 2002b). tures with numeric values, have long been recognized as a To our knowledge, there are two decidability results for very desirable extension of description logics (DLs), and sig- extensions of with non-dense domains based on the ALC nificant efforts have been invested into adding them to usual integer numbers Z. For some domains that support com- DLs while keeping the complexity of reasoning in check. parisons over the integers, decidability can be inferred from For expressive DLs and in the presence of general TBoxes, results on fragments of CTL∗ with constraints (Bozzelli and for standard reasoning tasks like consistency, the most gen- Gascon 2006). More recently, Carapelle and Turhan (2016) eral decidability results are for the so-called ω-admissible do- mains, which are required to be dense. Supporting non-dense proved decidability for concrete domains that have the so- domains for features that range over integers or natural num- called EHD-property (for existence of a homomorphism is bers remained largely open, despite often being singled out as definable), which applies in particular to Z with comparison a highly desirable extension. The decidability of some exten- relations like ‘=’ and ‘<’. However, neither of these works sions of ALC with non-dense domains has been shown, but allow to infer any elementary bounds on the complexity of existing results rely on powerful machinery that does not al- reasoning. The former result applies the theory of well- low to infer any elementary bounds on the complexity of the quasi-orders to some dedicated graphose inequality systems. problem. In this paper, we study an extension of ALC with The latter result reduces the satisfaction of the numeric con- a rich integer domain that allows for comparisons (between straints to satisfiability of a formula in a powerful extension features, and between features and constants coded in unary), of monadic second order logic with a bounding quantifier, and prove that consistency can be solved using automata- theoretic techniques in single exponential time, and thus has which has been proved decidable over trees (Bojanczyk´ and no higher worst-case complexity than standard ALC. Our Torunczyk´ 2012). In both cases, the machinery stems from formalisms stronger than , and yields little insight on upper bounds apply to some extensions of DLs with concrete ALC domains known from the literature, support general TBoxes, what is the additional cost of the concrete domain. and allow for comparing values along paths of ordinary (not In this paper we propose an automata-theoretic algorithm necessarily functional) roles. tightly tailored for the DL P ( ), an extension of ALCF Zc with a domain based on Z that follows the work of 1 Introduction CarapelleALCF and Turhan (2016). Not only do we obtain the first Concrete domains, especially those allowing to compare elementary complexity upper bounds, but in fact we obtain features with numeric values, are a very natural and use- the best results that we could have hoped for: satisfiability ful extension of description logics. Their relevance was is decidable in single exponential time, and thus not harder than for plain . The upper bound also applies to other recognized since the early days of DLs (Baader and Han- ALC schke 1991), and they arise in all kinds of application do- approaches to concrete domains, and it extends to some do- mains. Identifying extensions of DLs that keep the com- mains over the real numbers that include unary predicates plexity of reasoning in check has been an ever present chal- for asserting that some numbers must be integer or natural. lenge for the DL community, and major research efforts have Crucially, our setting accommodates general TBoxes, and been devoted to that goal, see (Lutz 2002b) and its refer- allows to access the concrete domain along arbitrary paths ences. The best-known results so far are for the so-called ω- of ordinary roles, and not only of functional ones. To our admissible domains which, among other requirements, must knowledge, this is the first decidability result with both of be dense. Decidability and tight complexity results have these features, even for ω-admissible domains. been established for several expressive DLs extended with Our upper bound is obtained using automata-theoretic ω-admissible domains based on the real or the rational num- techniques. Concretely, we rely on a suitable notion of the bers. However, non-dense numeric domains with the inte- tree model property, and build a non-deterministic automa- ger or natural numbers are not ω-admissible, and supporting ton on infinite trees that accepts representations of models

614 Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning (KR 2020) Main Track of the input. The key challenge in the presence of TBoxes fulness of allowing referral to the concrete domains also comes from verifying whether an assignment of integer val- along paths of regular roles, but this easily results in unde- ues along infinite paths exists. While an infinite path of ever cidability. For example, such an extension of known increasing or ever decreasing values always exists, unsatis- as ( ) is undecidable for any so-calledALCarithmetic ALCFP D fiability of non-dense domains can arise from requiring an domain (Lutz 2004b). However, c and its analogue over infinite number of integers that are larger than some integer the real numbersD are not arithmetic,Z and the correspond- Rc and smaller than another. However, identifying that a given ing DLs ( c) and ( c) do not seem to input enforces an infinite sequence of integers between two have beenALCFP studiedZ before. ByALCFP encodingR these logics into bounds may require us to identify, for example, if two infi- P ( c) and P ( c), we prove that their satis- nite paths in the model meet at ever increasing distances. It ALCFfiability problemZ isALCF decidableR and obtain upper complexity is far from apparent how to detect this kind of very non-local bounds (which are tight under some restrictions). behavior in standard automata, and we could not identify an Finally, we remark that the extensions of DLs with con- automata-verifiable condition that precisely characterizes it. crete domains that we consider here are closely related to Instead, we use a condition similar to the one proposed for constraint temporal logics. Our logic P ( c) sub- constraint LTL by Demri and D’Souza (2007), which is nec- sumes constraint LTL as defined in (DemriALCF andZ D’Souza essary on all trees, and sufficient on regular ones, and appeal 2007), whose satisfiability problem is PSPACE complete. It to Rabin’s theorem to obtain a sound and complete satisfi- is in turn subsumed by constraint CTL∗, and more specifi- ability test. The full proofs can be found in the extended cally, by a fragment of it called CEF+ in (Bozzelli and Gas- version (Labai, Ortiz, and Simkusˇ 2020). con 2006), which unlike full CTL∗, has a decidable satisfi- ability problem, but for which no tight complexity bounds are known. Although much of the work on concrete do- Related work The first DLs with concrete domains were mains in the last decade has focused on lightweight DLs introduced by Baader and Hanschke (1991), where concrete like DL-Lite (e.g. (Baader, Borgwardt, and Lippmann 2017; values are connected via paths of functional roles, often Poggi et al. 2008; Savkovic and Calvanese 2012; Artale, called feature paths. They showed that pure concept sat- Ryzhikov, and Kontchakov 2012)), some advances in the isfiability is decidable for concrete domains that are ad- area of constraint CTL (Carapelle, Kartzow, and Lohrey missible, that is, satisfiability of conjunctionsD of predicates 2016) have inspired the study of expressive extensions that from is decidable, and its predicates are closed under had long remained an open problem, like the ones consid- negation.D Generalizations of this result and tight complex- ered here (Carapelle and Turhan 2016). ity bounds for specific settings were obtained in the follow- P ing years. For example, concept satisfiability is PSPACE- 2 The ( c) Description Logic complete under certain assumptions (Lutz 2002c). Adding ALCF Z The DL P ( ) was introduced by Carapelle and acyclic TBoxes increases the complexity to NEXPTIME, and Turhan (2016)ALCF for arbitraryD domains . Here we instanti- general TBoxes easily result in undecidability (Lutz 2004b). D ate this DL with the concrete domain c that is defined as Z It remains decidable if the paths to concrete domains are equipped with the standard binary equalityZ and comparison restricted to single functional roles (Haarslev, Moller,¨ and relations ‘=’ and ‘<’, as well as a family of unary relations Wessel 2001). Lutz also studied specific concrete domains, for comparing with an integer constant. for example for temporal reasoning (2004a), and summa- Reg rized key results in a survey paper (2002b). Definition 1 (Syntax of P ( c)). Let be a count- ably infinite set of registersALCF(alsoZ known as concrete fea- Later research relaxed the requirements on the concrete tures). A register term is an expression of the form Skx, domain, and the most general results so far are for exten- where x Reg and k 0 is an integer. An atomic con- sions of ( ) with ω-admissible domains, where con- straint is∈ an expression≥ of the form (i) t = t , (ii) t < t , cept satisfiabilityALC C w.r.t. to general TBoxes remains decidable 0 0 or (iii) t = c, where t, t are register terms, and c .A (Lutz and Milicic 2007). However, this and related results 0 Z (complex) constraint Θ is an expression built from∈ atomic assume two key restrictions that we relax in our work: the constraints using the Boolean connectives , and . The concrete domain is dense, and only functional roles occur in depth of Θ (in symbols, depth(Θ)) is the¬ maximal∧ ∨d such the paths connecting to the concrete domains. Both restric- that some register term Sdx appears in Θ. tions are also present in - , an extension of Q Let N and N be countably infinite sets of concept and with comparison predicatesSHIQ over the rational numbers,SHIQ for C R role names, respectively. We further assume an infinite set which concept satisfiability w.r.t. general TBoxes is EXP- NF NR of functional role names. A role path P is any TIME-complete. The logic we consider is closely related to finite⊆ sequence r r of role names, with n 0. We use - . It includes the fragment of - , 1 n Q Q P to denote the··· length of P , i.e. P = n. Note≥ that the butSHIQ additionally allows us toALCF replace the rational numbersSHIQ by empty| | sequence is also a role path,| which| we denote with . integers or naturals. Our EXPTIME upper bound also applies P ( c) concepts are defined as follows: to the extension of Q- with an int or nat predicate to ALCF Z make only some valuesSHIQ integer or natural, and, under certain C := A C (C C) r.C P. Θ | ¬ | u | ∃ | ∃ J K restrictions, to its extension with arbitrary role paths. where A NC, r NR, P is a role path, and Θ is a con- Concerning the latter extension, already the seminal work straint with∈ depth(Θ)∈ P . We use C D as an abbre- of Baader and Hanschke (1991) points out the potential use- viation of ( C D≤), | and| r.C as ant abbreviation of ¬ ¬ u ¬ ∀

615 Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning (KR 2020) Main Track

r. C. Moreover, we use P. Θ instead of P. Θ . Theorem 3 ((Carapelle and Turhan 2016)). Let ˆ, ˆ be in ¬∃Concepts¬ of the form D = ∀P.JΘK and D = ¬∃P. ΘJ¬ areK negation normal form, where d is the maximal depthC T of an ∃ ∀ called path constraints, and we letJ depthK (D) = P .J K existential path constraint in ˆ or ˆ, and e the number of | | C T A TBox is any finite set of axioms, where each axiom existentially quantified subconcepts in ˆ or ˆ. If ˆ is satis- T C T C has the form C D for some concepts C and D. fiable w.r.t. ˆ, then it has an n-tree model where n = d e. (Plain) v concepts and TBoxes are defined as in T · ALCF P ( ) but do not allow path constraints. ALCF Zc 3 A Tight Upper Bound for Satisfiability We can now define the semantics of the considered DL. In this section we present our main result: an algorithm for Definition 2 (Semantics). An interpretation is a tuple = I deciding P ( c) concept satisfiability w.r.t. to general (∆I , I , β), consisting of a non-empty set ∆I (called do- ALCF Z · TBoxes in single exponential time. The algorithm uses au- main), a register function β : ∆I Reg Z, and a (plain) × → tomata on infinite trees, and reduces the satisfiability test interpretation function I that assigns CI ∆I to every · ⊆ to the emptiness of a suitable automata. But first we bring concept name C NC, rI ∆I ∆I to every role name ∈ ⊆ × P ( c) concepts and TBoxes into a simpler shape that r NR. We further require that (v, v0), (v, v00) rI im- ALCF Z ∈ { } ⊆ facilitates the later developments. plies v0 = v00 for all r NF. Role paths denote tuples of ∈ elements. For a role path r1 rn, we define (r1 rn)I ··· n+1 ··· 3.1 Atomic Normal Form as the set of all tuples (v0, . . . , vn) ∆ such that ∈ Here we go from a concept 0 and TBox 0 in general form (v0, v1) r1I ,..., (vn 1, vn) rnI . C T ∈ − ∈ to equisatisfiable ˆ and ˆ in atomic normal form, where the For an interpretation and a tuple ~v = (v0, . . . , vn) of I C T 1 elements in ∆I , we define the following, where θ =, < path constraint are of length and the register constraints ∈ { } and c Z: are atomic. This conversion relies on the tree model prop- ∈ i j erty of P and on c being negation-closed. That is, • ,~v = θ(S x, S y) iff β(vi, x)θβ(vj, y); ALCF Z I | the negation of an atomic relation can be expressed without • ,~v = Six = c iff β(v , x) = c; I | i negation via other relations; for < and = negation can be • ,~v = Θ1 Θ2 iff ,~v = Θ1 and ,~v = Θ2; removed using only one disjunction, and for = c negation I | ∧ I | I | • ,~v = Θ Θ iff ,~v = Θ or ,~v = Θ ; can be removed using one conjunction with one disjunction I | 1 ∨ 2 I | 1 I | 2 • ,~v = Θ iff ,~v = Θ. and one fresh register name. I | ¬ I 6| Now the function is extended to complex concepts as Definition 4 (Atomic normal form). An P ( c)- I ALCF Z follows: · concept is in atomic normal form (ANF) if for every P. Θ and P. Θ that appears in it, Θ is an atomic constraint∃ J K • ( C)I = ∆I CI and (C D)I = CI DI , ¬ \ u ∩ and ∀P J K 1. A TBox is in ANF if the TBox-concept • ( r.C)I = v (v, v0) rI , v0 CI , and | | ≤ T ∃ { | ∈ ∈ } dC D ( C D) is in ANF. • ( P. Θ )I = u (u,~v) P I and , (u,~v) = Θ . v ∈T ¬ t ∃ { | ∈ I | } J K Lemma 5. Let 0 and 0 be a concept and a TBox in An interpretation is a model of a TBox , if CI DI C T for all C D .I We say that a conceptTC is satisfiable⊆ P ( c). Then 0 and 0 can be transformed in poly- v ∈ T ALCFnomial timeZ into andC inT ANF such that is satisfiable w.r.t. if there is a model of with CI = . C T C T I T 6 ∅ w.r.t. iff 0 is satisfiable w.r.t. 0. Example 1. The TBox with the axiom r. S0x < T C T 1 > v ∃ J S x enforces an infinite chain of objects whose x regis- Proof sketch. We can convert 0 and 0 to negation normal tersK store increasing integer values. This witnesses that form and then remove negationC fromT atomic constraints us- P ( c) does not enjoy the finite model property. ing , , and at most one fresh register name per constraint, ALCF Z ∧ ∨ The next axiom identifies active departments all in linear time. Therefore we assume that 0 and 0 are Example 2. C T whose employees lead projects started in the last two years: negation free. Next, relying on the tree model property, we employs leadsProject S2year > 2018 ActiveDept copy at each node u the registers of its ancestors that may In∃ general, the roles ‘employsJ ’ and ‘leadsProjectK v ’ need not occur in the same constraints as u’s own registers. For this be functional, but this is not a problem in P ( c). we propagate the register values of the ancestors one step at ALCF Z a time with axioms Tree model property The automata-based techniques we 1 k 0 k 1 r. S xi,P = S xi,P− employ in this paper rely on the tree model property of > v ∀ J K P ( c). We recall the definition of tree-shaped mod- We define a TBox prop that contains such an axiom for elsALCF (cf. CarapelleZ and Turhan (2016)). For n 1, let each appropriate roleT name r and (fresh) register names as- ≥ [n] = 1, . . . , n . We say = (∆I , I , β) is an (n-)tree sociated with role paths P and depth k of path constraints { } ? I · interpretation if ∆I = [n] for some n 1, and for every used in 0 and 0. Note that along every path P , the TBox ≥ C T u, v ∆I , we have that (u, v) rI for some r NR iff prop propagates values into copy-registers associated with ∈ ∈ ∈ T v = uγ for some γ [n]. Let γ , . . . , γ [n]. If uγ ∆I , all paths appearing in 0 or 0, not just into the copy- ∈ 1 k ∈ k ∈ C T we call u the parent of uγk, and if v = uγ1 γk ∆I , we registers associated with P . We will later restrict our at- call u the k-th ancestor of v. ··· ∈ tention to the relevant registers depending on context. The The following theorem will allow us to focus on n-trees following claim is proved with a straightforward inductive for our technical developments: construction:

616 Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning (KR 2020) Main Track

Claim 6. Every tree model of 0 w.r.t. 0 prop contains 3.2 Abstractions and Constraint Graphs C T ∪ T a tree model of 0 w.r.t. 0, and every tree model of 0 w.r.t. C T C To check satisfiability of w.r.t. , we follow the approach 0 can be expanded to a tree model of 0 w.r.t. 0 prop. C T T C T ∪ T of (Carapelle and Turhan 2016) and split the task into two checks: a satisfiability check for an abstracted version of For a role path P and an atomic constraint Θ, let , , which is in plain , and an embeddability check loc(Θ,P ) denote the constraint obtained from Θ by replac- TforC so-called constraintALCF graphs. We recall the definitions j 0 0 P j ing each occurrence of S x with S x| |− . In the next of abstracted P ( c) concepts and constraint graphs i i,P ALCF Z step, we create some “test” concept names and axioms that from (Carapelle and Turhan 2016), adapted to our context. will allow to check whether a given constraint is satisfied in Definition 9 (Abstraction). Consider a path constraint E = a certain path in a tree model. For each (sub)constraint Θ r. Θ , where Θ is an atomic constraint. Let B B be a ∃ ∈ and a role path P that appear in 0 or 0, take a fresh con- freshJ conceptK name, which we call the placeholder of Θ. The C T cept name TP,Θ and add to a TBox loc the following axioms abstraction of E is defined as T (recall that 0 and 0 are negation free): C T Ea = r.B ∃ E = r. Θ (A1) TP,Θ TP,Θ TP,Θ if Θ = Θ1 Θ2 The abstraction of a universal path constraint 0 0 ≡ 1 u 2 ∧ is analogous. If r = , then the abstraction is simply∀B.J K (A ) TP,Θ TP,Θ TP,Θ if Θ = Θ1 Θ2 2 ≡ 1 t 1 ∨ The abstractions of concepts and TBoxes given in ANF (A3) TP,Θ  loc(Θ,P ) if Θ is an atomic constraint. are the (plain ) concepts and TBoxes obtained by re- ≡ ∃ J K placing all pathALCF constraints with their abstracted versions. We make two claims about combining prop with loc. The Let a, a be the abstractions of and , respectively. first is that we can continue expanding theT initial treeT model: C T C T Let Reg , be the set of register names used in and . The constraintC T graph of a plain tree-shaped interpretationC T Claim 7. Every tree model of 0 w.r.t. 0 prop can be C T ∪ T indicates how the values of its registers participate in rel- expanded to a tree model of 0 w.r.t. 0 prop loc, and C T ∪ T ∪ T evant relations. (In)equalities between registers are repre- every tree model of 0 w.r.t. 0 prop loc is a tree model C T ∪ T ∪ T sented as graph edges, and (in)equalities with constants are of 0 w.r.t 0 prop. C T ∪ T stored as node labels. a a Definition 10 (Constraint graph). Let a = (∆I , I ) be The above claim follows by induction on Θ. Next, we I · a plain tree-shaped interpretation of a, a. The constraint claim that prop loc indeed relates the satisfaction of path C T T ∪ T graph of a is the directed partially labeled graph a = constraints to membership in the test concepts: I a BGI (V, E, λ) where V = ∆I Reg , , λ : V 2 , and × C T → E = E< E= is such that, for every (v, y), (u, x) V , Claim 8. Let be a tree model of prop loc, and let P be J T ∪ T ∪ ∈ a role path and Θ a constraint appearing in 0 or 0. Then 1. ((v, y), (u, x)) E< if and only if either ∈ 0 it holds that C T • u = v, v BIa and B is a placeholder for S y < S0x, ∈ • u is the parent of v BIa and B is a placeholder for 1. contains a P -path e0, . . . , e P and if e P TP,JΘ, then J | | | | ∈ S1y < S0x, or ∈ the path e0, . . . , e P satisfies Θ in ; | | J • v is the parent of u BIa and B is a placeholder for 2. if contains a P -path e0, . . . , e P that satisfies Θ, then S0y < S1x ∈ J | | . e P TP,JΘ. 2. ((v, y), (u, x)) E= if and only if | | ∈ ∈ 0 • u = v, v BIa and B is a placeholder for S y = 0 ∈ Now we are ready to rewrite 0 and 0 into ANF using the S x, C T a locally available copy-registers and the test concept names; • u is the parent of v BI and B is a placeholder for 1 0 ∈ Given a concept D and a role path P = r1 rn, we write S y = S x, or ··· a P.D as shorthand for r1( r2( ( rn.D) )), and sim- • v is the parent of u BI and B is a placeholder for ∃ ∃ ∃ ··· ∃ ··· 0 1 ∈ ilarly for P.D. Let and ∗ be obtained from 0 and 0, S y = S x. respectively,∀ by replacingC everyT concept P. Θ byC P.TT 0 ∃ ∃ P,Θ In addition, for a placeholder B for S x = c, we have that and every P. Θ by P.T . Our desiredJ normalizationK a ∀ ∀ P,Θ B λ(u, x) if and only if u BI . is equipped withJ K the TBox = ∗ prop loc. ∈ ∈ C T T ∪ T ∪ T When the interpretation is clear from context, we write . Given a tree model of 0 w.r.t. 0, by chaining Claim 6 G C T We say a constraint graph is embeddable into c if and Claim 7, we get a tree model of 0 w.r.t. 0 prop G Z J C T ∪ T ∪ there is an integer assignment κ to the vertices V of such loc, and by applying Claim 8 we get that G T that for every (u, x), (v, y) V , if ((v, y), (u, x)) E< ∈ ∈ then κ(u, w) < κ(v, y) (and similarly for E=), and if ( P. Θ )J = ( P.T )J , ( P. Θ )J = ( P.T )J ∃ ∃ P,Θ ∀ ∀ P,Θ B λ(u, x) is a placeholder for S0x = c, then κ(u, x) = c. J K J K ∈ Hence is also a tree model of w.r.t. . Example 3. The left hand side of Figure 1 shows a con- J C T Given a tree model of w.r.t. , again by applying straint graph for an interpretation where each element sat- J C T 0 0 Claim 8 we get that is also a tree model of 0 w.r.t. 0 isfies . S x < S y , the root and its right child sat- J C T ∪ ∃ 0 1 prop loc (and in particular w.r.t. 0). isfy r. SJ y > S x ,K the root and its left child satisfy T ∪ T T ∃ J K

617 ,⌃ Theorem 2. Let (V, ,I) be finite enriched system of linear The checking part of T consists of the rules that, for each E Psol inequalities in which all constants and coefficients are in inequality in the system,, calculate⌃ the LHS and the RHS Theorem 2. Let (V, ,I) be finite enriched system of linear The checking part of solT consists of the rules that, for each 0, 1,..., inequalitiesa . If (V, in,I which) hasE all a constants solution and over coefficientsN⇤, then are in and compareinequality them. in the system,TheP idea calculate is to compute the LHS the and LHS the RHS (resp. {it also± has a± solution} overE where all finite values are 0, 1,..., a .N If⇤(V, ,I) has a solution over N⇤, then RHS)and of compare the inequalities them. The incrementally, idea is to compute by iterating the LHS through (resp. { ± ± } E 2( + I )+1 bounded by (itV also+ hasI + a solution) (( over+N⇤I where) a) all|E| finite| | values. are the variablesRHS) ofthe and inequalities at each iteration incrementally, storing by the iterating result throughof adding | | | | |E| · |E| | | · 2( + I )+1 bounded by ( V + I + ) (( + I ) a) |E| | | . up allthe the variables variables andconsidered at each iteration so storingfar that the occur result on of theadding LHS Proof sketch. In order to| decide| | | the|E| existence· |E| of| | a· solution up all the variables considered so far that occur on the LHS Proof sketch. In order to decide the existence of a solution (resp. RHS). In orderProceedings to iterate through of the the 17th variables International we need Conference on Principles of Knowledge Representation and Reasoning (KR 2020) over N⇤ to an enriched system of linear inequalities (V, ,I) to define(resp. a RHS). linear In order order to over iterate them. through We the guess variables a linear we need order over N⇤ to an enriched system of linear inequalitiesE (V, ,I) we can construct a set of (ordinary) linear inequality systems E to define a linear order over them. We guess a linear1 order Main Track we can construct a set of (ordinary) linear inequality systems over the constants in Cst using the predicate LEQ1 denoting and check whether at least one of them has a solution over over the constants in Cst using the predicate LEQ denoting and check whether at least one of them has a solution over that a constant is less than or equal to another constant: N⇤. Such a solution is also a solution of (V, ,I). Each one that a constant is less than or equal to another constant: N⇤. Such a solution is also a solutionE of (V, ,I). Each one 1 of these systems is of the form (V, ˆ), whereˆ ˆ isE builtˆ by LEQLEQ(1x,(x, x x)) CstCst(x) of these systems is of the form (V, ), where is built by Definition 12 (Tree representation of constraint graph). Let E [ E E [ E E E 1 1 2 2 11 adding to it eitheraddingy1 to+ it either+yym1 + 0+orymx1 +0 or+x1x+n >+0x,n for> 0, for LEQLEQ(x,( yx,) y) CstCst(x,(x, y y)),,notnot LEQ ((y,y, x x) ) ··· ···  ··· ··· be the constraint graph of some plain interpretation a. each implicationeachy implication+ + yy1 + 0=+ ym x0=+ x+1 +x >+0xn > 0 3 1 1 1 1 ··· m ··· ) 1 )··· n··· Cst3Cst(x, y,(x, z y,), zLEQ), LEQ1(x,(x, y) y,)LEQ, LEQ1((y, z)),,notnotLEQLEQ(1x,(x, z) z) G I in I. Thus, toin solveI. Thus, each to solve one of each these one systems of these systems it is enough it is enough For u ∆I with parent v, define X(u) as the subgraph of to consider the solutions whose finite values are bounded by From the guessed order, we can extract the successor relation ∈ G to consider the solutions whose finite values are bounded by From the guessed order, we can extract1 the successor relation induced by (u, x) x Reg (v, x) x Reg . ˆ ˆ 2( ˆ )+1 stored using the predicate Succ1 as well as the first and the , , ˆ ( V + ˆ) (( 2( ,⌃)ˆ )+1a) |E[E| . The result follows { | ∈ C T } ∪ { | ∈ C T } Theorem 2. Let (V, ,I) be finite enriched system of linear( V + The|) checking|(( |E [ E| part)· ofa|E) [|ETE|[E|·consists. The of result the rules follows that, for eachstored using the predicate Succ as well as the first and the | | |E [ E|from· the|E fact[ E| that· ˆ,⌃=solI . last constant w.r.t. to the order, stored using the predicates For u = ε, define X(u) as the subgraph of induced by Theorem 2. Letinequalities(V, ,I) inbe which finiteE all enriched constants system and coefficients of linear are inThe checking partˆ of |TE|P consists| | of the rules that, for eachlast constant1 w.r.t.1 to the order, stored using the predicates from the factinequality that in= theI . system,sol calculate the LHS and the RHS First1 and Last1 , respectively. Next, we lift the order to G E |E| | |P i (u, x) x Reg . Let Y (u) be the following partially inequalities in which0, 1,..., all constantsa . If (V, and,I) has coefficients a solution are over inN⇤, theninequalityand compareFor in the the given system, them. system The calculate idea, let is the to numberthe compute LHS of constants the and LHS the in (resp. RHSFirststringsand Last over Cst, respectively., i =1,...3l. Next, These we rules lift are the standard order to , ,⌃ S i { | ∈ C T } { ± ± } E For the givenCst be systemd and let, let the the arity number of Var, Iq of, and constantsIm be lv in,le and 0, 1,..., ait also. If Theorem( hasV, a,I solution) 2. hasLet (aV, over solution,IN) be⇤ where finite over enriched all finite⇤, system then values of linear areand compareTheRHS) checking of them. the part inequalities of ThesolT ideaconsists incrementally, is of to the compute rules by that, iterating thefor each LHS through (resp.stringsand over can beCst found, i in,=1 e.g.,,... (Dantsin3l. These et al. 2001). rules Finally,are standard not U-labeled graph: E N S P lv { ± ± } inequalitiesE in which all constants and coefficients2( + I are)+1Cst in be dinequalityandli, let respectively. the in the arity system, Thenof Var calculate,hasIq, at and most theIm LHSd bedifferent andlv, thee and RHSvariables, lv bounded by ( V + I + ) (( + I ) a) |E| | | . the variablesl and at eachS iteration storing the resultl of addingand canevery be string found over in,Cst e.g.,represents (Dantsin a et variable al. 2001). in . Finally, There are not it also has a solution over N⇤ where all finite values are RHS) ofat the most inequalitiesd e different incrementally, inequalitieslv and at by most iteratingd i different through S 0, 1,...,| | |a |. If |E|(V, ·,I)|E|has2( a| solution|+·I )+1 over N⇤, thenli, respectively.andup compare all the Then variables them.has The at considered ideamost isd to computedifferent so far that the variables, occurLHS (resp. on the LHS different ways of ensuringlv that we only consider the actual • The vertices of Y (u) are obtained from X(u) by renaming bounded by ( V + I{ +± ) ±((} + IE ) a) . the variablesle implications. and atS In each view iteration of Theorem storing 2 and underli the the result assumption of addingevery string over Cst represents a variable in . There are Proof sketch.it also hasIn order a solution to decide over N the⇤ where existence|E| all| finite| of a values solutionat are most dRHS)different of the inequalities inequalities incrementally, and at most by iteratingd different through variables. We use the linear order above to define a successor bot top | | | | |E| · |E| | | · 2( + I )+1 (resp. RHS). In order to iterate through the variables we need S (u, x) x and (v, x) x for every x Reg . bounded by ( V + I + ) (( + I ) a) |E| | | . the variablesthat at least and one at each of lv,l iteratione,li storing1, in order the to result determine of adding whether different ways of ensuring that we only consider the actual , over N⇤ to an enriched system of linear inequalities (V, implications.,I)up all the In variables view of Theorem considered 2 and so under far the that assumption occur on the LHSrelation over the variables in the 2lv-ary relation SuccV. C T Proof sketch. In order to decide| | the| existence| |E| · |E| of a| solution| · E upto all define thehas variables a a solution linear considered orderit suffices over so tofar them. consider that occurWe the guess solutionson the a LHS linear whose ordervariables. We use the linear order above to define a successor 7→ 7→ ∈ 2(lv +le+li) Next, we add the facts and rules that define bit-by-bit we canProof construct sketch. a setIn orderof (ordinary) to decide linear the existence inequality of a systems solutionthat(resp. at least RHS). onefiniteS of In valueslv,l ordere,l doi not to1exceed iterate, in order2d through to determine. the The variables maximum whether1 finite we need • The edges of Y (u) are exactly those of X(u) (under the over N⇤ to an enriched system of linear inequalities (V, ,I) (resp.over RHS). the constants In order to in iterateCst using through the the predicate variables weLEQ needdenotingrelationaddition over of the binary variables numbers. in the To2lv this-ary end, relation we useSucc a 6-aryV. and checkover whetherN⇤ to an enriched at least system one of of them linear has inequalities a solution(V, over,Ihas)to define a solutionvalue a linear it obtainable suffices order to by overconsider adding them. up the the variablessolutions We guess in whose the a system linear is order E to define a linear order2( overlv +le them.+li) We guess a linear order ES that a constant is lessd 3(l than+l +l or) equal to another constant: Next,predicate we addAdd, the where facts(x, and y, z, rulesc, r) thatAdd defineif thex result bit-by-bit ofy renaming). we can constructN⇤ a. Such setwe of acan (ordinary)solution construct is a also setlinear of a(ordinary) solution inequality of linear(V, systems inequality,I). Each systems onefinite values do not exceed 2 d v e i . The maximum1 finite1 Figure 1: A constraint graph with registers and for each logical E over theover constantsthus the constants bounded in in byCstCst2 usingusing1 the the. predicate predicateLEQ LEQdenotingdenotingadditionadding of bits binaryx, y, numbers. and z is bit Tor with this2 the end, carry wec. use Asa these 6-ary bot and check whetherof these atand systems least check oneis whether of of the them at form least has(V, one a of solution themˆ), where has aover solutionˆ is built overvalue by obtainable by adding upLEQ the( variablesx, x) Cst in the(x) systemd3l is element (left) and its tree representation (right). The label λ is • We have Uc(x ) if and only if (u, x) is labeled with a that a constantLet l =( islv less+ l thane + l ori). equal To represent to another the constant: value 2 using a rules are standard, we(x, omit y,z, them c, r here.) We also add rules to N⇤. Such a solution is also a solutionE [ E of (V, ,IE). Each onethat a constant3( islv less+1le+li than) or equal2 to another1 constant: predicate Add, where Add if the result of y + +y (V, 0 ,Ix) + +x > 0 d 1 3l top N⇤. Such a solutionadding is to also it either a solution1 ofm or .1ˆ EachE oneˆn ,thus for boundedbinary by 2LEQ encoding(x,LEQ yof). integers,(x, xCst) ( weCstx, would( yx)), not needLEQd (bits,y, x which) emptyaddingsupport for bits all additionx, nodes y, and with andz infiniteis bitnotr values shown.with that2 the do carry the following:c. As these If placeholder for equality with c, and similarly for x . of these systems is··· of the form (EV, ),··· where is built by 1 3l each implication y1 + +ˆym 0=ˆ x1 + + xn > 0 would makeLEQ the translation( x, x ) exponential.Cst(x)d Thus, we encode any of the bits we are adding up is set to , we set both the of these systems is ofadding the form to it either(V, y + ),+ wherey E0 or[ Eisx + built+ byEx > 0, forLet l =(lv + le3 +1li). To represent12 the value1 12 using a 1 rules are standard, we omit them here. We also add rules to ···1 m ) 1 ··· n theCst addressLEQ(x,( y,x, of yz) these), LEQCstd3l((bitsx, y as)),,not aLEQ stringLEQ(y, of(y, z length) x, )not3lLEQover the(x, z) result and the carry to . We are now ready@ to calculate and in I. Thus,each implication to solve eachyE +[ oneE···+ ofy these 0=E systemsx···+ it is+ enoughx >binary0 encoding of1 integers, we would2 need d3l bits,1 which The tree representation Tr( ) of is the tree over Σ adding to it either y1 + +ym 01 or x1 +m +xn >10, for n LEQconstants3(x,( y,x, inz) y,Cst) . To1(Cstx, encode y),(x, the y1()y, values, not z), not ofLEQ the variables,1((y,x, xz)) we supportcompare addition the RHS with and infinite@ the LHS values of the that inequalities. do the following: We only If to considerin···I. the Thus, solutions to solve whose each··· one finite··· of these values) systems are bounded··· it is enough by FromCst the guessedLEQ order, weLEQ can extract theLEQ successor relation ….. G G y + + y 0= x + + x > 0 would make the translationl +3l +1 exponential.1 Thus, we(~x, encode~z,b) any of the0 bits we1 are adding0 up is set1 to , we set both the where Tr( )(u) = Y (u). each implication 1 m 2( 1 ˆ )+1 n 3 use a v 3l -ary1 predicate Val1 , with Val1 if r. (presentS x < the S rulesx for) LHS(S (RHSy = definedS y) analogously)., and the To right child of the ( V + toˆ consider) (( the solutionsˆ ) a whose) finite values. The are result bounded follows by CstFromstored(x, the usingy, guessed z), theLEQ order, predicate( wex, can y)Succ, extractLEQ theas(y, successor well3l z), asnot the relationLEQ first2 and(x, the z) @ G ···  ) |E[E|··· the address of these d bits as a string1 of length 3l over the resultstore and the the intermediate carry to results,. We are we now use a ready(l + l to+3 calculatel + 1)-ary and in I. Thus, to solve| | each|E [ E| oneˆ· of|E these[ E| · systemsˆ 2( itˆ )+1 is enough storedthe using bit encoded the predicate by theSucc stringas~z wellCst as thein first the valueand the of the∃ J ∧ e0K v 1 0 1 ( V + ˆ) =(( I ) a) |E[E| . The result followsconstantslast in Cst constant. To encode w.r.t. the to the values order, of2 stored the variables, using the we predicatesroot additionally satisfies@ r. (S(~y,x~x, <~z,b S) x) (S y < S x) . Rather than considering tree representations where nodes from the| fact| | thatE [ E| · |E [.E| · From thevariable guessed1 encoded order,1 by we~x has can the extract value b. the successor relationcomparepredicate the RHSUptoL and. Intuitively, the LHS the of tuple the inequalities. WeUpto onlyL to consider the solutions whose|E| finiteˆ| | values are bounded by last constant w.r.t.,⌃ to the order, stored using the predicates ∃ 2 ∧ from the fact that = I . use a lv +3Firstl1+1and-aryLast predicate1 , respectively.Val, with ( Next,~x, ~z,b) we liftVal theif orderpresent to if, for the the rules LHS for of LHS inequality (RHS~y, defined theJ~z-th bitanalogously). in the sum of To K |E|ˆ | | The solT guesses the value1 of each variable and checks This constraint graph is embeddable into Z. Consider, are labeled with arbitrary graphs from Σ, it will be conve- ˆ For theˆ given system2( )+1, let the number of constants instoredFirst usingand theLastP predicate, respectively.i Succ Next,3l as we well lift as the2 the order first to and thevariables up until ~x has the value b. We do this until we reach ( V + ) (( For) thea given) |E[ systemE|S ., The let the result number follows of constantsthe in bit encodedstringswhether by over the theCst stringi guess, i~z is=1 a validCst,... solution3inl. the These tovalue the rulessystem. of the are standard The store the intermediate results, we use a (le + lv +3l + 1)-ary | | |E [ E| Cst· |Ebe [d E|and· let the arity of Var, Iq, and Im be l ,l and strings over Cst , i =1,...3l. These rules are standard however,the last variable.an infinite When performing interpretation the addition, atin each which step the leftmost nient to consider trees over a restricted alphabet that contains ˆ d S , vl ,le last constantandguessing can w.r.t. be foundpart to is in,the rather e.g.,2 order, straightforward. (Dantsin stored et usingal. To2001). accommodate the Finally, predicates notpredicate Upto . Intuitively, the tuple (~y,~x, ~z,b) Upto from the fact that Cst= beI . and let the arity of Var Iqlv, and Im be v e andvariable encodedand can be by found~x has in, the e.g., value (Dantsinb. et al. 2001). Finally, not L L li, respectively. Then has at most d ldifferentv variables, 1 1 lv we need to mark the value of the carry bit. For this we2 use the |E|li, respectively.| | Then has at most d different variables, ,⌃ infinite values, inlv addition to constants 0 and 1, we assumebranchif, for the of LHS the of constraint inequality ~y graph, the ~z-th repeats bit in the infinitely. sum of Then we only graphs that have been enriched with either additional or le S li TheFirst TeveryandguessesLast string the over, respectively. valueCst ofrepresents each variable Next, a variable we and lift checks in the. There order are to at most d differentle inequalitiesS and at most d lidifferent solevery string over Cst represents a variable in . There are (le + lv +3l + 1)-ary predicate CarryL, where (~y,~x, ~z,c) For the given systemat most,d letdifferent the number inequalities ofand constants at most d in different P differenta special ways constanti of ensuring. We use that the we relation onlyS considerExtBitSto the store actualvariables up until ~x has the value b. Wex do this untily we reach2 implicit information in a maximal consistent way. whetherstringsdifferent the over guess waysCst is ofa, validi ensuring=1@ solution,... that we3l. to only These the consider system.i rules the Theactual are standardwouldCarry haveL if adding paths up the from bit at the positionto~z theof the variableregister~x of the root implications.implications.S In view In viewof Theorem of Theorem 2 and 2 and under under the the assumption assumption these constants. Further, we write Cst (x1,...,xi) as an Cst be d and let the arity of Var, Iq, and Im be lv,le and guessingvariables. partvariables. is rather We We use use straightforward. the linearthe linear order order above To above to accommodate define to a define successor a successorthe lastand variable. the intermediate When resultperforming obtained the so addition, far results at in each a carry step that at leastthat at one least of onelv,l ofe,llv,li e,li1, in1, order in order to todetermine determine whether whetherand can beabbreviation found in, for e.g.,Cst(x (Dantsin1),...Cst( etxi) al, for. 2001).i 1. Finally, We firstinvolving not any finite number of edges from E<, which would lv relationrelation over over the the variables variables in the in2l thev-ary2l relationv-ary relationSucc V. Succ .we needbit with to mark the value the valuec. This of bit the needs carry to bit. be taken For this into we account use the Definition 13 (Frame). A frame is a graph in Σ such that: li, respectively. Thenhas a solutionhashas a solution at it sufficesmost it sufficesd todifferent consider to consider the variables, the solutions solutions whose whoseinfinite values,guess in additionwhether al to variablev constants has a0 finiteand or1, an we infinite assume value: V 2(l +2(llv++lle)+li) every stringNext, overwe addCst the factsrepresents and rules a that variable define bit-by-bit in . Thereimply arewhen that adding theup integer the bits at values the next assignedposition. to these registers must le S finiteS S values do not exceedd 2vd e i li . The maximum finitea special constantNext, we.add We usethe factsthe relation and rulesExtBit thatto define store bit-by-bit(le + lv +3l + 1)-ary predicate CarryL, where (~y,~x, ~z,c) at most d differentfinite values inequalities do not exceed and2 at most d. Thedifferent maximum finite additionFin(~x of) binaryVar(~x numbers.), not Inf( To~x) thisInf( end,~x) weVar use(~x), anotS 6-aryFin(~x) 3l 2 1. there is an edge between every pair of vertices differentaddition ways of@ of binary ensuring numbers. that wei To only this end, consider we use the a actual 6-aryhaveCarry infinitelyUptoL if adding(~y,~x, ~z, up many0) theIq bit(~y different at), First the position(~x), Cst integer~z(~zof), thenot values variableIq (~y) between~x them. value obtainable by adding up the variables in the systemthese is constants. Further, we write Cst (x1,...,xi) as an L V L1 implications. Invalue view obtainable of Theorem by adding 2 and3(lv +up underle+l thei) variables the assumption in the system is predicateIf a variableAdd, where is assigned(x, y, an z, c,infinite r) value,Add if each thebit result is set of to : 3(l +dl +l ) predicate Add, where (x, y, z,2 c, r) Add if the resultand of the intermediate result obtained so far results in a carry thus boundedd byv2 e i . abbreviationvariables.adding for We bitsCst usex,( yx the,1 and),... linearz Cstis bit( orderxri)with, for above thei carry to1.c define We. As first these a successor@Thus in this case, the graph would3l not be embeddable. 2. there are no strict cycles, i.e. no cycles that include an that at least one of l ,l ,l 12, in order to determine whether3l 2 3l UptoL(~y,~x, ~z,1) Iq(~y), FirstV(~x), First (~z), IqL1(~y) thusv boundede i by . d adding bits Valx,( y~x,, and~z, )z isVar bit(~xr),withInf(~x) the, Cst carry(~z) c. As thesebit with the value c. This bit needs to be taken into account Let l=(lv + le + li). To represent the value d23l usingguess arelation whetherrules over are a variable standard, the variables has we omit a@ finite in them the or here. an2l infinitev We-ary also relation value: add rulesSucc to V. edge from E has a solutionLet it sufficesl =(l + tol consider+ l ). To representthe solutions the value whose32l using a when adding up the bits at the next position.3l < binaryv encoding2(elv +le ofi + integers,l ) we would need d bits, which supportrulesOtherwise, are addition standard, we with guess infinite we its omit valuevalues them bit that by here. do bit. the However,We following: also add we If only rules toAbstractionsUptoL(~y,~x, ~z,0) andIq( constraint~y), FirstV(~x), Cst graphs(~z), allow us to reduce S d i 3l Fin(~xNext,) Var we(~x), addnot Inf the(~x2l facts) Inf( and~x) rulesVar(~x that), not defineFin(~x) bit-by-bit finite values dobinary not exceedwould encoding make2 of the integers, translation. Thewe exponential. would maximum need Thus,d finitebits, weencode which anysupport ofguess the addition thebits first we ared with addingbits infinite and up set is thevalues set rest to tothat, we 0. doThis set the both ensures following: the that If 3l 3l 3. if (x, y) E= then also (y, x) E= 3l addition of binary numbers. To this end, we use a 6-aryUptoL(P~y,(~x, ~z,c)0)satisfiabilityIq(Iq~yL)1,(First~y), notV( to~xFirst), twoCst(~z)( separate~z), not IqL checks:1(~y) value obtainablewould by adding makethe address the up translation of the these variablesd bits exponential. as in a string the system of Thus, length we is3l over encodeIf the a variableresultany iswe ofand assigned have the the enoughbits carry an we to infinite free are. We bits adding arevalue, to accommodate now up each ready is@ set bit to tois calculate addition. set, we to set and: bothALCF the Z ∈ ∈ 3l @ 3l 3l 3l U 3(constantslv +le+li) in Cst. To encode the values of the variables, wepredicatecompareAdd the, RHS where and the(x, LHS y, z, of c, the r) inequalities.3Addl @ if We the only@ result of Carry (~y,~x, ~z,0) Iq(~y), Var(~x), Cst (~z), First (~z) 4. every vertex must have exactly one of the labels in the addressd of these d bits as a string of length 3l over the resultVal and(~x, the~z0, ~z, carry0) toVar(.~x We), Fin are(~x) now, Cst3l ready(~z0), to calculateTheorem andUptoL(~y,L~x, 11~z,1)(CarapelleIq(~y), First andV(~x) Turhan,, First (~z), 2016)IqL1(~y). is satisfiable thus bounded by 2 use a l +3. l +1-ary predicate Val, with (~x, ~z,b) Val if Val(~x, ~z, ) Var (~x)@, Inf(~x), Cst2(~z) constants in Cstv . To encode the values of the variables, weaddingpresent bits thex, rulesy, and for LHSz is (RHS bit2l r definedwith analogously).thel carry c. To As these C 33l 2 compare the@ RHS and the LHS of the inequalities. We only ~ ~ 5. if (x, y) E then x and y have the same label from U, d store the intermediate results,Cst we(~z) use, not a (Firstle +(l~zv0+3) l + 1)-ary w.r.t. UptoifL( and~y,~x, ~z,b only) Upto if thereL(~y, x0, is~z,b a), Succ tree-shaped3l V(x0, ~x), a = a a such = Let l =(lv +usele a+lvthel+3i) bit. Tol encoded+1 represent-ary by predicate the the string valueVal~z , withCst2 (inusing~x, the~z,b value) a Val ofOtherwise, theifrules arepresent we standard, guess the its rules wevalue for omit bit LHS by them (RHSbit. here.However, defined Weweanalogously). also only add rules ToUpto to L(~y,~x, ~z,0) Iq(~y), FirstV(~x), Cst (~z), 2 2l 3l T I | T C ∈ variable encoded by ~x has the value3l 3bl. 2 predicateVal(Upto~x, ~z,L0). Intuitively,Var(~x), Fin the(~x tuple), Cst(~y,(~x,~z)~z,b, not) ValUpto(~x, ~z,L 1) not IqL(~y,~x) and if x and y have the same label from U U

618 ,⌃ Theorem 2. Let (V, ,I) be finite enriched system of linear The checking part of T consists of the rules that, for each E Psol inequalities in which all constants and coefficients are in inequality in the system,, calculate⌃ the LHS and the RHS Theorem 2. Let (V, ,I) be finite enriched system of linear The checking part of solT consists of the rules that, for each 0, 1,..., inequalitiesa . If (V, in,I which) hasE all a constants solution and over coefficientsN⇤, then are in and compareinequality them. in the system,TheP idea calculate is to compute the LHS the and LHS the RHS (resp. {it also± has a± solution} overE where all finite values are 0, 1,..., a .N If⇤(V, ,I) has a solution over N⇤, then RHS)and of compare the inequalities them. The incrementally, idea is to compute by iterating the LHS through (resp. { ± ± } E 2( + I )+1 bounded by (itV also+ hasI + a solution) (( over+N⇤I where) a) all|E| finite| | values. are the variablesRHS) ofthe and inequalities at each iteration incrementally, storing by the iterating result throughof adding | | | | |E| · |E| | | · 2( + I )+1 bounded by ( V + I + ) (( + I ) a) |E| | | . up allthe the variables variables andconsidered at each iteration so storingfar that the occur result on of theadding LHS Proof sketch. In order to| decide| | | the|E| existence· |E| of| | a· solution up all the variables considered so far that occur on the LHS Proof sketch. In order to decide the existence of a solution (resp. RHS). In order to iterate through the variables we need over N⇤ to an enriched system of linear inequalities (V, ,I) to define(resp. a RHS). linear In order order to over iterate them. through We the guess variables a linear we need order over N⇤ to an enriched system of linear inequalitiesE (V, ,I) we can construct a set of (ordinary) linear inequality systems E to define a linear order over them. We guess a linear1 order we can construct a set of (ordinary) linear inequality systems over the constants in Cst using the predicate LEQ1 denoting and check whether at least one of them has a solution over over the constants in Cst using the predicate LEQ denoting and check whether at least one of them has a solution over that a constant is less than or equal to another constant: N⇤. Such a solution is also a solution of (V, ,I). Each one that a constant is less than or equal to another constant: N⇤. Such a solution is also a solutionE of (V, ,I). Each one 1 of these systems is of the form (V, ˆ), whereˆ ˆ isE builtˆ by LEQLEQ(1x,(x, x x)) CstCst(x) of these systems is of the form (V, ), where is built by E [ E E [ E E E 1 1 2 2 11 adding to it eitheraddingy1 to+ it either+yym1 + 0+orymx1 +0 or+x1x+n >+0x,n for> 0, for LEQLEQ(x,( yx,) y) CstCst(x,(x, y y)),,notnot LEQ ((y,y, x x) ) ··· ···  ··· ··· each implicationeachy implication+ + yy1 + 0=+ ym x0=+ x+1 +x >+0xn > 0 3 1 1 1 1 ··· m ··· ) 1 )··· n··· Cst3Cst(x, y,(x, z y,), zLEQ), LEQ1(x,(x, y) y,)LEQ, LEQ1((y, z)),,notnotLEQLEQ(1x,(x, z) z) in I. Thus, toin solveI. Thus, each to solve one of each these one systems of these systems it is enough it is enough to consider the solutions whose finite values are bounded by From the guessed order, we can extract the successor relation to consider the solutions whose finite values are bounded by From the guessed order, we can extract1 the successor relation ˆ ˆ 2( ˆ )+1 stored using the predicate Succ1 as well as the first and the ˆ ( V + ˆ) (( 2( ,⌃)ˆ )+1a) |E[E| . The result follows Theorem 2. Let (V, ,I) be finite enriched system of linear( V + The|) checking|(( |E [ E| part)· ofa|E) [|ETE|[E|·consists. The of result the rules follows that, for eachstored using the predicate Succ as well as the first and the | | |E [ E|from· the|E fact[ E| that· ˆ,⌃=solI . last constant w.r.t. to the order, stored using the predicates Theorem 2. Letinequalities(V, ,I) inbe which finiteE all enriched constants system and coefficients of linear are inThe checking partˆ of |TE|P consists| | of the rules that, for eachlast constant1 w.r.t.1 to the order, stored using the predicates from the factinequality that in= theI . system,sol calculate the LHS and the RHS First1 and Last1 , respectively. Next, we lift the order to E |E| | |P i inequalities in which0, 1,..., all constantsa . If (V, and,I) has coefficients a solution are over inN⇤, theninequalityand compareFor in the the given system, them. system The calculate idea, let is the to numberthe compute LHS of constants the and LHS the in (resp. RHSFirststringsand Last over Cst, respectively., i =1,...3l. Next, These we rules lift are the standard order to ,⌃ S i { ± ± } E For the givenCst be systemd and let, let the the arity number of Var, Iq of, and constantsIm be lv in,le and 0, 1,..., ait also. If Theorem( hasV, a,I solution) 2. hasLet (aV, over solution,IN) be⇤ where finite over enriched all finite⇤, system then values of linear areand compareTheRHS) checking of them. the part inequalities of ThesolT ideaconsists incrementally, is of to the compute rules by that, iterating thefor each LHS through (resp.stringsand over can beCst found, i in,=1 e.g.,,... (Dantsin3l. These et al. 2001). rules Finally,are standard not E N S P lv { ± ± } inequalitiesE in which all constants and coefficients2( + I are)+1Cst in be dinequalityandli, let respectively. the in the arity system, Thenof Var calculate,hasIq, at and most theIm LHSd bedifferent andlv,l thee and RHSvariables, lv bounded by ( V + I + ) (( + I ) a) |E| | | . the variablesl and at eachS iteration storing the resultl of addingand canevery be string found over in,Cst e.g.,represents (Dantsin a et variable al. 2001). in . Finally, There are not it also has a solution over N⇤ where all finite values are RHS) ofat the most inequalitiesd e different incrementally, inequalitieslv and at by most iteratingd i different through S 0, 1,...,| | |a |. If |E|(V, ·,I)|E|has2( a| solution|+·I )+1 over N⇤, thenli, respectively.andup compare all the Then variables them.has The at considered ideamost isd to computedifferent so far that the variables, occurLHS (resp. on the LHS different ways of ensuringlv that we only consider the actual bounded by ( V + I{ +± ) ±((} + IE ) a) . the variablesle implications. and atS In each view iteration of Theorem storing 2 and underli the the result assumption of addingevery string over Cst represents a variable in . There are Proof sketch.it also hasIn order a solution to decide over N the⇤ where existence|E| all| finite| of a values solutionat are most dRHS)different of the inequalities inequalities incrementally, and at most by iteratingd different through variables. We use the linear order above to define a successor | | | | |E| · |E| | | · 2( + I )+1 (resp. RHS). In order to iterate through the variables we need S bounded by ( V + I + ) (( + I ) a) |E| | | . the variablesthat at least and one at each of lv,l iteratione,li storing1, in order the to result determine of adding whether different ways of ensuring that we only consider the actual over N⇤ to an enriched system of linear inequalities (V, implications.,I)up all the In variables view of Theorem considered 2 and so under far the that assumption occur on the LHSrelation over the variables in the 2lv-ary relation SuccV. Proof sketch. In order to decide| | the| existence| |E| · |E| of a| solution| · E upto all define thehas variables a a solution linear considered orderit suffices over so tofar them. consider that occurWe the guess solutionson the a LHS linear whose ordervariables. We use the linear order above to define a successor 2(lv +le+li) Next, we add the facts and rules that define bit-by-bit we canProof construct sketch. a setIn orderof (ordinary) to decide linear the existence inequality of a systems solutionthat(resp. at least RHS). onefiniteS of In valueslv,l ordere,l doi not to1exceed iterate, in order2d through to determine. the The variables maximum whether1 finite we need over N⇤ to an enriched system of linear inequalities (V, ,I) (resp.over RHS). the constants In order to in iterateCst using through the the predicate variables weLEQ needdenotingrelationaddition over of the binary variables numbers. in the To2lv this-ary end, relation we useSucc a 6-aryV. and checkoverProceedings whetherN⇤ to an enriched at of least the system one 17th of International of them linear has inequalities a solution Conference(V, over,Ihas)to on define a Principles solutionvalue a linear itof obtainable suffices Knowledge order to by overconsider adding Representation them. up the the variablessolutions We guess and in whose Reasoning the a system linear is order(KR 2020) E to define a linear order2( overlv +le them.+li) We guess a linear order ES that a constant is lessd 3(l than+l +l or) equal to another constant: Next,predicate we addAdd, the where facts(x, and y, z, rulesc, r) thatAdd defineif the result bit-by-bit of we can constructN⇤ a. Such setwe of acan (ordinary)solution construct is a also setlinear of a(ordinary) solution inequality of linear(V, systems inequality,I). Each systems onefinite values do not exceed 2 d v e i . The maximum1 finite1 E overMain theover constantsthus the Track constants bounded in in byCstCst2 usingusing1 the the. predicate predicateLEQ LEQdenotingdenotingadditionadding of bits binaryx, y, numbers. and z is bit Tor with this2 the end, carry wec. use Asa these 6-ary and check whetherof these atand systems least check oneis whether of of the them at form least has(V, one a of solution themˆ), where has aover solutionˆ is built overvalue by obtainable by adding upLEQ the( variablesx, x) Cst in the(x) systemd3l is that a constantLet l =( islv less+ l thane + l ori). equal To represent to another the constant: value 2 using a rules are standard, we(x, omit y,z, them c, r here.) We also add rules to N⇤. Such a solution is also a solutionE [ E of (V, ,IE). Each onethat a constant3( islv less+1le+li than) or equal2 to another1 constant: predicate Add, where Add if the result of y + +y (V, 0 ,Ix) + +x > 0 d 1 3l N⇤. Such a solutionadding is to also it either a solution1 ofm or .1ˆ EachE oneˆn ,thus for boundedbinary by 2LEQ encoding(x,LEQ yof). integers,(x, xCst) ( weCstx, would( yx)), not needLEQd (bits,y, x which) addingsupport bits additionx, y, and withz infiniteis bit r valueswith that2 the do carry the following:c. As these If of these systems is··· of the form (EV, ),··· where is built by 1 3l each implication y1 + +ˆym 0=ˆ x1 + + xn > 0 would makeLEQ the translation( x, x ) exponential.Cst(x)d Thus, we encode any of the bits we are adding up is set to , we set both the of these systems is ofadding the form to it either(V, y + ),+ wherey E0 or[ Eisx + built+ byEx > 0, forLet l =(lv + le3 +1li). To represent12 the value1 12 using a 1 rules are standard, we omit them here. We also add rules to Definition 17 (Consistent··· frames)1 m. Let) σ11, σ···2 n Σfr. We theCst addressLEQ(x,( y,x, of yz) these), LEQCstd3l((bitsx, y as)),,not aLEQ stringLEQ(y, of(y, z length) x, )not3lLEQover the(x, z) result and the carry to . We are now ready@ to calculate and in I. Thus,each implication to solve eachyE +[ oneE···+ ofy these 0=E systemsx···+ it is∈+ enoughx >binary0 encoding of1 integers, we would2 need d3l bits,1 which adding to it either y1 + +ym 01 or x1 +m +xn >10, for n LEQconstants3(x,( y,x, inz) y,Cst) . To1(Cstx, encode y),(x, the y1()y, values, not z), not ofLEQ the variables,1((y,x, xz)) we supportcompare addition the RHS with and infinite@ the LHS values of the that inequalities. do the following: We only If call the pairto consider(σ1in,···I σ. the2 Thus,) solutionsconsistent to solve whose each··· if one finite the··· of these following values) systems are bounded··· it are is enough equal: by FromCst the guessedLEQ order, weLEQ can extract theLEQ successor relation ….. y + + y 0= x + + x > 0 would make the translationl +3l +1 exponential.1 Thus, we(~x, encode~z,b) any of the bits we are adding up is set to , we set both the each implication 1 m 2( 1botˆ )+1 n 3 use a v 3l -ary1 predicate Val1 , with Val1 if present the rules for LHS (RHS defined analogously). To ( V + toˆ consider) (( the solutionsˆ ) a whose) |E[ finiteE| values. The are result bounded follows by CstFromstored(x, the usingy, guessed z), theLEQ order, predicate( wex, can y)Succ, extractLEQ theas(y, successor well3l z), asnot the relationLEQ first2 and(x, the z) @ the subgraph induced···  by the)Reg , ···vertices of σ1,the and address of these d bits as a string1 of length 3l over the resultstore and the the intermediate carry to results,. We are we now use a ready(le + l tov +3 calculatel + 1)-ary and in I. Thus, to solve| | each|E [ E| oneˆ· of|E these[ E| · systemsˆ 2( itˆ )+1 is enough storedthe using bit encoded the predicate by theSucc stringas~z wellCst as thein first the valueand the of the • ( V + ˆ) =(( I ) aC) T|E[E| . The result followsconstantslast in Cst constant. To encode w.r.t. the to the values order, of2 stored the variables, using the we predicates @ (~y,~x, ~z,b) from the| fact| | thatE [ E| · |E [.E|top· bot From thevariable guessed1 encoded order,1 by we~x has can the extract value b. the successor relationcomparepredicate the RHSUptoL and. Intuitively, the LHS the of tuple the inequalities. WeUpto onlyL to considerthe result the solutions of renaming whose|E| finite eachˆ| | valuesx areto x boundedin the by subgraphlast constant w.r.t.,⌃ to the order, stored using the predicates 2 from the fact that = I . use a lv +3Firstl1+1and-aryLast predicate1 , respectively.Val, with ( Next,~x, ~z,b) we liftVal theif orderpresent to if, for the the rules LHS for of LHS inequality (RHS~y, defined the ~z-th bitanalogously). in the sum of To top |E|ˆ | | The solT guesses the value1 of each variable and checks • ˆ For theˆ given system2( )+1, let the number of constants instoredFirst usingand theLastP predicate, respectively.i Succ Next,3l as we well lift as the2 the order first to and thevariables up until ~x has the value b. We do this until we reach ( V induced+ by) the(( RegFor) the, a given)vertices|E[ systemE|S of., The letσ2 the. result number follows of constantsthe in bit encodedstringswhether by overFigure the theCst stringi guess 2:, i~z is A=1 a constraint validCst,... solution3inl. the These graph tovalue the rulessystem. ofthat the are satisfies standard The store(F the) intermediatebut is not embed-results, we use a (le + lv +3l + 1)-ary | | |E [ E| Cst· |Ebe [d E|and· let the arity ofSVar, Iq, and Im be lv,le and strings over Cst , i =1,...3l. These rules are standard the last variable. When performing the addition, at each step ˆ Cst beCdTand let the arity of Var, Iq, and Im be l ,l andlast constantandguessing can w.r.t. be foundpart to is in,the rather e.g.,2 order, straightforward. (Dantsin stored et usingal. To2001). accommodate the Finally, predicates notpredicate UptoL. Intuitively, the tuple (~y,~x, ~z,b) UptoL from the fact that = I . lv v e variable encodedand can be bydable found~x has in, into the e.g., value (Dantsin. b. et al. 2001). Finally, not li, respectively.T ThenΣ has at most d ldifferentv variables, 1 1 Zlv we need to mark the value of the carry bit. For this we2 use the Not every| treeE|li, respectively.| over| Thenfr correspondshas at most d todifferent a framified variables, con- ,⌃ infinite values, inlv addition to constants 0 and 1, we assume if, for the LHS of inequality ~y, the ~z-th bit in the sum of le S li TheFirst TeveryandguessesLast string the over, respectively. valueCst ofrepresents each variable Next, a variable we and lift checks in the. There order are to at most d differentle inequalitiesS and at most d lidifferent solevery string over Cst represents a variable in . There are (le + lv +3l + 1)-ary predicate CarryL, where (~y,~x, ~z,c) For the given systemat most,d letdifferent the number inequalities ofand constants at most d in different P differenta special ways constanti of ensuring. We use that the we relation onlyS considerExtBitSto the store actualvariables up until ~x has the value b. We do this until we reach2 straint graph, but when all parent-child pairs are consistent,whetherstringsdifferent the over guess waysCst is ofa, validi ensuring=1@ solution,... that we3l. to only These the consider system.i rules the Theactual are standardCarryL if adding up the bit at the position ~z of the variable ~x implications.implications.S In view In viewof Theorem of Theorem 2 and 2 and under under the the assumption assumption these constants. Further, we write Cst (x1,...,xi) as an Cst be d and let the arity of Var, Iq, and Im be lv,le and guessingvariables. partvariables. is rather We We use use straightforward. the linearthe linear order order above To above to accommodate define to a define successor a successorthe lastand variable. the intermediate When resultperforming obtained the so addition, far results at in each a carry step we can referthat toat leastthat the at one framified least of onelv,l ofe,llv,li constrainte,li1, in1, order in ordergraph to todetermine determineT represents: whether whetherand can beabbreviation found in, for e.g.,Cst(x (Dantsin1),...Cst( etxi) al, for. 2001).i 1. Finally, We first not lv relationrelation over over the the variables variables in the in2l thev-ary2l relationv-ary relationSucc V. Succ .we needbit with to mark the value the valuec. This of bit the needs carry to bit. be taken For this into we account use the li, respectively. Thenhas a solutionhashas a solution at it sufficesmost it sufficesd todifferent consider to consider the variables, the solutions solutions whose whoseinfinite values,guess in additionThewhether next al to variablev constants key has lemma a0 finiteand or is1, anthe we infinite assume most value: technicalV result of the paper. 2(l +2(llv++lle)+li) every stringNext, overwe addCst the factsrepresents and rules a that variable define bit-by-bit in . There arewhen adding up the bits at the next position. Definitionle S 18. LetfiniteS S T valuesbe do a not tree exceed overd 2vd Σe fri .l Wei . The call maximumT consistent finitea special constantNext, we.add We usethe factsthe relation and rulesExtBit thatto define store bit-by-bit(le + lv +3l + 1)-ary predicate CarryL, where (~y,~x, ~z,c) at most d differentfinite values inequalities do not exceed and2 at most d. Thedifferent maximum finite additionFin(~x of) binaryVar(~x numbers.), not Inf( To~x) thisInf( end,~x) weVar use(~x), anotS 6-aryFin(~x) 3l 2 different? addition ways of@ of binary ensuring numbers. that wei To only this end, consider we use the a actual 6-aryCarryUptoL if adding(~y,~x, ~z, up0) theIq bit(~y at), First the position(~x), Cst ~z(~zof), thenot variableIq (~y) ~x if the pair (T (vvalue),T obtainable(vh)) byis adding consistent up the variables for every in the systemv these is [n constants.] Further,Lemma we 22. writeLetCst (xfr1,...,xbe a regulari) as an framified constraintL graph. V L1 implications. Invalue view obtainable of Theorem by adding 2 and3(lv +up underle+l thei) variables the assumption in the system is predicateIf a variableAdd, where is assigned(x, y, an z, c,infinite r) value,Add if each thebit result is set of to : 3(l +dl +l ) T ∈ predicate Add, where (x, y, z,G2 c, r) Add if the resultand of the intermediate result obtained so far results in a carry thus boundedd byv2 e i . abbreviationvariables.adding for We bitsCst usex,( yx the,1 and),... linearz Cstis bit( orderxri)with,F for above thei carry to1.c define We. As first these a successor@ 3l thatand at least every oneh of l ,l[n,l]. We1 denote2, in order by to determinethe framified whether3l constraint If fr satisfies ( ), then2 it3l is embeddable.UptoL(~y,~x, ~z,1) Iq(~y), FirstV(~x), First (~z), IqL1(~y) thusv boundede i by . fr d adding bits Valx,( y~x,, and~z, )z isVar bit(~xr),withInf(~x) the, Cst carry(~z) c. As thesebit with the value c. This bit needs to be taken into account ∈ TLet l=(lv + le + li). ToG represent the value d23l usingguessT arelation whetherrules over are a variable standard, theG variables has we omit a@ finite in them the or here. an2l infinitev We-ary also relation value: add rulesSucc to V. has a solutionLet it sufficesl =(lv + tole consider+ li). To representthe solutions the value whose32l using a rules are standard, we omit them here. We also add ruleswhen to adding up the bits at the next position.3l graph with Tr( binaryfr ) =encoding2(Tlv,+ andle of+ integers,l ) say that we wouldT represents need d bits, whichfr . supportOtherwise, addition we with guess infinite its valuevalues bit that by do bit. the However, following: we If only UptoL(~y,~x, ~z,0) Iq(~y), FirstV(~x), Cst (~z), S d i 3l Fin(~xNext,) Var we(~x), addnot Inf the(~x2l facts) Inf( and~x) rulesVar(~x that), not defineFin(~x) bit-by-bit finite values dobinary not exceedGwould encoding make2 of the integers, translation. Thewe exponential. would maximum need Thus,d finitebits, weencode whichG anysupport ofguess the additionProof thebits first we aredsketch. with addingbits infinite and up setLet is thevalues set rest tofr tothat,be we 0. doThisa set regular the both ensures following: the that framified If constraint graph 3l 3l 3l addition of binary numbers. To this end, we use a 6-aryUptoL(~y,~x, ~z,0) Iq(Iq~yL)1,(First~y), notV(~xFirst), Cst(~z)(~z), not IqL1(~y) value obtainableWe usewould the by following adding makethe address the up translation of theterminology these variablesd bits exponential. as in a for string the talking system of Thus, length we is about3l over encodeIf the paths. a variableresultany iswe ofand assigned have the thewhich enoughbits carry an we to infinite isfree are. not We bits adding arevalue, to embeddable. accommodate now up each readyG is@ set bit to tois calculate addition. set, weThe to set and: heart both the of the proof is show- 3l predicate Add, where @(x, y, z, c, r) 3Addl @ if the@ result of 3l 3l 3l the address3(constantslv +le of+li these) in Cstd. Tobits encode as a the string values of lengthof the variables,3l over the we compareresult and the RHSthe carry and the to LHS. We of arethe inequalities. now3l ready toWe calculate only andUptoCarry(~y,L~x,(~y,~z,~x,1)~z,0) Iq(Iq~y()~y,)First, Var(~x()~x,)Cst, First(~z),(First~z), Iq(~z)(~y) Definition 19.2d Let w = γ1γ2 be a finite or infinite word Val(~x,Val~z,(ing~x, ~z)0, ~z, that0)Var( there~xVar),(Inf~x)(, is~xFin),( aCst~x) pair, Cst2(~z()(~z0u,), x), (u, y) andL a finite path from V L1 thus bounded byconstantsuse in a lv +3. Tol +1 encode-ary predicate the valuesVal, ofwith the(~x, variables,~z,b) Val weifaddingpresent bits thex, rulesy, and for LHSz is@ (RHS bit r definedwith analogously).the carry c. To As these Cst ? ··· 33l 2 compare the@ RHS and the2l LHS of thel inequalities. We only ~ ~ over [n] and let u [n] . A path alongd w from (u, x) is astore the intermediate results,Cst we(~z) use, not a (Firstle +(l~zv0+3) l + 1)-ary UptoL(~y,~x, ~z,b) UptoL(~y, x0, ~z,b), Succ3l V(x0, ~x), Let l =(lv +usele a+lvthel+3i) bit. Tol encoded+1 represent-ary by predicate the the string valueVal~z , withCst2 (inusing~x, the~z,b value) a Val ofOtherwise, theifrules arepresent we standard, guess the(u, its rules x wevalue) to for omit( bit LHSu, by them y) (RHSbit.of here.However, a defined certain Weweanalogously). also shapeonly add rules and ToUpto to positiveL(~y,~x, ~z, strict0) Iq length,(~y), FirstV(~x), Cst (~z), 2 2l 3l variable∈ encoded by ~x has the value3l 3bl. 2 predicateVal(Upto~x, ~z,L0). Intuitively,Var(~x), Fin the(~x tuple), Cst(~y,(~x,~z)~z,b, not) ValUpto(~x, ~z,L 1) not IqL(~y,~x) path of the form p = (u, x) (uγ1, xd1) (uγ1γ2, x2)guess the. firststored thebits intermediate and set the results, rest to we 0. useThis a ensures(le +2lv that+3l + 1)-ary 3l binary encodingthe of bit integers, encoded, weby⌃ the would string need~z Cstbits,in the which value of thesupportif, for addition thewhich LHS with of inequality may infinite be~y values, concatenated the ~z-th that bit doin the the sum with following: of itself If indefinitely toIq obtainL1(~y), not First (~z) The solT guesses− the value2 of each− variable and checkswe−· have · · enough free bits to accommodate addition.3l wouldAn make infinite thevariable translation path encodedpP : exponential. byN ~x has∆ the value Thus,Regb. weis aencodeforward pathanyif ofvariablespredicate theVal bits up(the~x, until weUpto~z,1) desired are~xLhas.Var Intuitively, adding the(~x value)f, Finand upb(.~x We) the, isCstb do. set tuple this(~z to), until(not~y,,~x, weVal we~z,b( reach~x, set)~z,0) bothUpto theL whether,⌃ the guess is a valid solution to the system. The 3l 2 3l 3l 3l → × Val(~x, ~ztheif,0, ~z, last for0) variable. theVar LHS( When~x) of, Fininequality performing(~x), Cst the~y(,~z addition,0 the), ~z-th@ at bit each in step the sumCarry of L(~y,~x, ~z,0) Iq(~y), Var(~x), Cst (~z), First (~z) thefor address every ofn theseThedguessingsol,T therebitsguesses partas is a is string anthe rather value edge ofstraightforward. length of from each3 variablepl (overi To) to accommodate the andp( checksi + 1)result. It and the carry to . We are now ready to calculate and NP wevariables need to mark upFirst, until the value~x has we of the theshow valuecarry bit.thatb. We For there dothis this we useis until athe wepair reach(u, x), (u, y) such that constants in Cstwhether.∈ Toinfinite encode the guess values, the is valuesin a addition valid of solution to the constants variables, to0 theand system.1 we, we assume Thecompare the RHS2 andl @ the LHSl of the inequalities. We only ~ ~ is a backward path if for every n , there is an edge from(le + lv +3lCst+ 1)-ary(~z), predicatenot FirstCarry(~z0) , where (~y,~x, ~z,c) UptoL(~y,~x, ~z,b) UptoL(~y, x0, ~z,b), SuccV(x0, ~x), guessinga special part is constant rather straightforward.. We useN the relation To accommodateExtBit to store the last variable.for any Whenm performingN, thereL the is addition, a path at from2 each step(u, x) to (u, y) of strict use a lv +3l +1-ary predicate Val@, with∈(~x, ~z,b) i Val if presentCarry theL if rules adding for up the LHS bit at (RHS the3l position defined~z of the analogously). variable ~x To p(i + 1) to p(ithese). The constants.strict Further, length we writeof aCst finite(x1,...,x pathi) asp anisVal( the~x, ~z,we0) needVar to( mark~x), Fin the(~x value),∈Cst of( the~z), carrynot Val bit.(~x, For~z, this1) we use the not IqL(~y,~x) infinite values, in addition to3l constants 0 and2 1, we assume and the intermediatelength at result least obtainedm which so far results only in a involves carry vertices whose logical the bit encoded by theabbreviation string ~z for CstCst(x1),...in theCst(x valuei), for ofi the1. We firststore the(le intermediate+ lv +3l + 1) results,-ary predicate we useCarry a (lLe,+ wherelv +3(~y,l~x,+~z,c 1))-ary number ofastrict special edges constant in2.p We. For use anthe relation infiniteExtBit path top store, weVal say(~x, ~z,bit1) with theVarelement value(~x),cFin. This(~x has), bitCst needs the3l(~z prefix) to, not be takenValu(, into~x, that~z, account0) is, the path2 only involves ver- variable encoded by ~xguesshas whether the value@ a variableb. has a finite ori an infinite value: predicateCarryUptoL if addingL. Intuitively, up the bit the at the tuple position(~y,~zx,of~z,b the) variableUpto~xL these constants. Further, we write Cst (x1,...,xi) as an when adding up the bits at the next position. that p ,is⌃ strict ifFin it(~x has) Var infinitely(~x), not Inf many(~x) Inf( strict~x) Var edges.(~x), not Fin(~x) and the intermediate result obtained so far resultsu in2 a carry T if, for the LHStices of ininequality the subtree~y, the rooted3~zl -th bit at in. the However, sum of the path may move The sol guessesabbreviation the value for Cst of(x each1),... variableCst(xi), and for i checks1. We first UptoL(~y,~x, ~z,0) Iq(~y), FirstV(~x), Cst (~z), not IqL (~y) P If a variable is assigned an infinite value, each bit is set to variables: bit withup untildown the value~x has andc. the This up value bit this needsb. subtree We to do be this taken arbitrarily. until1 into we account reach We then use framifica- whetherThe the following guessguess is whether a conditionvalid a variable solution on has to aframified finite thesystem. or an infinite constraint The value: graphs@ 3l 3l whenUpto ( adding~y,~x, ~z,1) up theIq( bits~y), First at the(~x) next, First position.(~z), Iq (~y) Val(~x, ~z, ) Var(~x), Inf(~x), Cst (~z) the last variable.L When performingV the addition,L1 atp each step guessingwill be part crucial isFin rather(~x) to decidingVar straightforward.(~x), not embeddability:Inf@(~x ) Inf To(~x accommodate) Var(~x), not Fin(~x) tion to extract from it a3 pathl 0 of a specific shape, which 3l Otherwise, we guess its value bit by bit. However, we onlywe needUptoUpto toL( mark~y,L(~y,x, ~z,x, the0)~z,0) valueIq(~yIq), ofFirst(~y the),VFirst(~x carry), CstV(~x) bit.(,~zCst), For(~z this), not weIq useL1(~y the) infiniteF values,If in a variableaddition is to assigned constants2l an infinite0 and value,1, we each assume bit is set to : first goes down along some w and then goes back up. The ( ) There areguess no the(u, first x)d, (bitsu, andy) set the∆ rest toReg 0. This ensuresin thatfr for 3l , @(le + lv +3l + 1)-aryIq predicate(~y), not FirstCarry(~z)L, where3l (~y,~x, ~z,c) a special constant we. We have useenough the free relation bits to∈ accommodateExtBit× to addition.3l storeC T Gω UptoL(~y,path~x, ~z,p1)0 mayL1 Iq(~y have), First reducedV(~x), First strict(~z), IqL length,1(~y) 2 but we show a lower which we have@ Val that:(~x, ~z, there) existsVar(i~x), anInf( infinite~x), Cst (w~z) [n] Carry, and L if adding up the bit at the position ~z of the variable ~x these constants. Further, we write@ Cst (x ,...,x3l ) as an 3l 3l Val(~x, ~z0, ~z,0) Var(~x), Fin1 (~x), Cst i(~z0), ∈ CarryL(~y,~x,bound~z,0) onIq(~y) the, Var( strict~x), Cst length(~z), First3l of(~z)p0 which is a function of m. Otherwise, we guess its value bit by bit. However, we onlyand theUpto intermediateL(~y,~x, ~z, 0) resultIq( obtained~y), FirstV(~x so), Cst far results(~z), in a carry abbreviation1. an infinite for Cst( forwardx1),...2l Cst path(xif),2from forl i (u,1. xl ) Wealong first w, and ~ ~ guess the first d bits andCst set( the~z), not restFirst to 0.(~z This0) ensures thatbit withUpto theL(~y, value~x, ~z,bNext)c. ThisUpto weL bit(~y, usex needs0, ~z,b regularity), toSucc beV3(lx taken0, ~x to), argue into account that for large enough m, IqL1(~y), not First (~z) guess whetherwe a variable have enough has afree finite bits orto accommodatean infinite3l value: addition. w 2. an infinite backwardVal(~x, ~z,0) pathVar(~x)b, Finfrom(~x), Cst(u,(~z y),)notalongVal(~x, ~z,1) when adding upthe the path bitsnotp at0IqbecomesL the(~y,~x next) position. long enough that it essentially starts re- 3l 3l 3l Fin(~x) Var(~x), not Inf(~x) Inf(~x) Var(~x), 3notl Fin(~x) CarryL(~y,~x, ~z,0) Iq(~y), Var(~x), Cst (~z), First (~z) Val(~x, ~zVal0, (~z,~x,0)~z,1) VarVar(~x(~x),)Fin, Fin((~x~x)),, Cst ((~z~z)0,)not, Val(~x, ~z,0) peating itself, thus allowing3l us to extend it indefinitely (as such that f or b is strict, and such that for every i UptoN, L(~y,~x, ~z,0) Iq (~y), FirstV(~x), Cst (~z), not IqL1(~y) 2l l ∈ ~ ~ If a variable is assigned an infiniteCst value,(~z), not eachFirst bit(~z is0) set to : UptoL(~y,well~x, ~z,b as) theUpto wordL(~y, xw, ~z,bit), runsSuccV long)(x , ~x), to obtain the desired for- there is a strict edge from f(i) to b(i). @ 0 3l 0 3l3l UptoL(~y,~x, ~z,1) Iq(~y), FirstV(~x), First (~z), IqL (~y) Val(~x,Val~z,(~x,) ~z,0)Var(Var~x)(,~xInf), Fin(~x)(,~xCst), Cst (~z(~z)), not Val(~x, ~z,1) ward andnot backwardIqL(~y,~x) paths; f is1 obtained by concatenating Indeed, (F) is a necessary condition for embeddability: @ 3l 3lp b Otherwise, we guessVal(~x, its~z,1) valueVar bit(~x by), Fin bit.(~x) However,, Cst (~z), not weVal only(~x, ~z,0) UptoL(~y,~x, ~z,the0) downwardIq(~y), First portionV(~x), Cst of (~z0)and, is obtained by concatenat- Lemma 20.2l If a constraint graph is embeddable, then it sat- guess the first d bits and set the rest to 0. This ensures that ing the upward portion.3l The strict edges between f and b are F Iq (~y), not First (~z) weisfies have enough the condition free bits to( accommodate). addition. given byL the1 framification. 3l 3l 3l ValProof(~x, ~z0 Sketch., ~z,0) ByVar( contradiction.~x), Fin(~x), Cst The(~z0), existence of such aCarry pair L(~y,~x, ~z,0) Iq(~y), Var(~x), Cst (~z), First (~z)

and paths would2 implyl that thel integers assigned to (u, x) 3.4 A Rabin~ Tree Automaton~ for Embeddability Cst (~z), not First (~z0) UptoL(~y,~x, ~z,b) UptoL(~y, x0, ~z,b), SuccV(x0, ~x), and (u, y) have infinitely many3l different integers between We still face two hurdles: verifying (F), and ensuring that Val(~x, ~z,0) Var(~x), Fin(~x), Cst (~z), not Val(~x, ~z,1) not IqL(~y,~x) them, since a path of strict length k from (u, x) to (u, y) satisfiable w.r.t. have a model with a regular constraint Val(~x, ~z,1) Var(~x), Fin(~x), Cst3l(~z), not Val(~x, ~z,0) C T implies there being a difference of at least k between their graph. We overcome both by using Rabin’s tree automata. assigned values. Recall that the trees are over the alphabet of frames Σfr and are of degree n i.e. their nodes are over [n]?. Unfortunately, it is not sufficient in general. Example 4 (From (Demri and D’Souza 2007)). Figure 2 Definition 23 (Rabin tree automaton). A Rabin tree automa- ton over the alphabet Σ has the form = (Q, q , , Ω) shows an example of a constraint graph; to avoid clutter, we A 0 −→ with a finite state set Q, initial state q0, transition relation omitted the edges augmented in its framification. It satisfies n F Q Σ Q , and Ω = (L1,U1),..., (Lm,Um) is the condition ( ) since there is no path with infinitely many −→⊆ × × { } a collection of “accepting pairs” of state sets Li,Ui Q.A strict edges. It is not embeddable into Z: indeed, for any n, ? ⊆ there is a path with at least n strict edges between x and z. run of on a tree T is a map ρ :[n] Q with ρ(ε) = q0 and (ρA(w),T (w), ρ(w1), . . . , ρ(wn)) → for w [n]?. Nonetheless, the condition will allow us to effectively For a path π in T and a run ρ denote by∈−→In(ρ π) the∈ set of test embeddability, since it is sufficient for regular framified states that appear infinitely often in the restriction| of ρ to π. constraint graphs. A run ρ of is successful if Definition 21. For an n-tree T over Σ, the subtree rooted at A ? ? for all paths π there exists an i [m] with w [n] is the tree T w (v) = T (wv) for all v [n] . ∈ ∈ | ∈ In(ρ π) Li = and In(ρ π) Ui = . We say that an n-tree T over Σ is regular if the set T u | ∩ ∅ | ∩ 6 ∅ u [n]? of subtrees of T is finite. We say that a constraint{ | | A tree T is accepted by the Rabin tree automaton if some run graph∈ is} regular if its tree representation is regular. of in T is successful. A

619 Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning (KR 2020) Main Track

Theorem 24 (Rabin’s Theorem (1972)). Any non-empty Ra- At some point, moves from a node where both (a) and B bin recognizable set of trees contains a regular tree. (b) are true (that is, q0 or q2) to a node where (b) no longer Since condition (F) is necessary and sufficient for the holds, i.e., it guesses that the problematic pair is in that embeddability of regular framified constraint graphs, we get: node u. At this point, it guesses the problematic pair x, y and whether it is the forward path f or the backward path Lemma 25. Let emb be a Rabin tree automaton that ac- A F b which will be strict. This will be stored in the flag f or cepts exactly the consistent trees over Σfr satisfying ( ). b, which once chosen cannot change during the run. There is an embeddable constraint graph iff L( ) = . Aemb 6 ∅ If the guessed pair x, y has a relation (needed for the ≤ F Proof. If there is an embeddable constraint graph , then it strict edge from f(0) to b(0) required by ( )), transi- G (x, y, f, 0) (x,B y, b, 0) has some framification fr (Observation 16), which satisfies tions accordingly to a path state or ; the condition (F) (LemmaG 20). Therefore the tree represen- For every i [n], h f, b , and 0, 1 , denote by (x, y, h, ) ∈ n ∈ { } −(x, ∈ y,{ h, } ) tation of fr is accepted by emb and L( emb) = . For i the -tuple containing for entry G A A 6 ∅ i q − − the other direction, assume L( emb) = . Then by Rabin’s and 1 for every other entry. A 6 ∅ bot bot Theorem, there is a regular tree T L( emb), which sat- – For every i [n] and h f, b , if e<(x , y ) σ ∈ A ∈σ ∈ { } σ ∈ isfies the condition (F). By Lemma 22, we have that the we have q (x, y, h, 0) and q (x, y, h, 0) 0 −→ i 2 −→ i constraint graph represented by T is embeddable. Then attempts to expand f and b by guessing a child v B Therefore it remains to show that the condition (F) is in- and a new pair z, w with a strict edge between z and w. It deed verifiable by a Rabin tree automaton. We do this next. moves to the appropriate path state for the child v, and to q1 for the remaining children. When doing so, is also uses another binary flag to indicate whether just witnessed a Checking consistency of trees In our constructions of au- strict edge relevant to f or b (1), or notB (0). tomata, it is useful to assume that they run on trees over Σfr We describe the transitions for the case where the forward that are consistent (in the sense of Definition 17), rather than path is strict; there are similar transitions for backward complicating the constructions by incorporating the consis- paths. If the guess correctly extends f and b, that is, tency check. Therefore we first describe an automaton ct A e (zbot, wbot) σ and e (ytop, wbot) / σ which accepts exactly the consistent trees, which we later < ∈ < ∈ intersect with the appropriate automata. simply veri- then, for every i [n], Act ∈ fies the conditions of Definition 17 by only having transi- – if the current edge on the forward path is strict, that is, top bot tions between consistent pairs of frames, and making sure e<(x , z ) σ, we have the root vertex is labeled with a frame whose vertex set con- ∈ σ bot (x, y, f, ) (z, w, f, 1)i sists exactly of Reg , . The comparison between subgraphs − −→ C T of pairs of frames requires ct to remember the previous – and if the current edge is not strict, that is, A top bot letter, and therefore its state set is exponential in , . e=(x , z ) σ, then we have ||C T || ∈ σ (x, y, f, ) (z, w, f, 0)i (F) We describe − −→ Verifying with a Rabin tree automaton • U = q (x, y, h, 1) h f, b . an automaton which runs on consistent trees over Σ , and 1 fr Paths{ looping} ∪ { in q are successful,| ∈ { and}} to guarantee that finds a pair ofB registers which violates (F). The desired 1 the guessed path is strict, it must contain infinitely many is the complement of intersected with . emb ct strict edges (marked with flag 1). A We now define and describeB its behavior. WeA let B The number of states of is polynomial in , , and B ||C T || = (Q, q0, , ( ,U)), with: the alphabet is exponential. As mentioned before, the au- B −→ ∅ tomaton is the complement automaton of inter- Q = q , q , q Q Q emb • 0 1 2 p where p is the set of path states sected withA . It has the same alphabet, but it mayB have { } ∪ Act Qp = Reg , Reg , f, b 0, 1 . exponentially many more states (Muller and Schupp 1995). C T × C T × { } × { } Proposition 26. There is a Rabin tree automaton emb that • We describe next. The initial state q0 and the state q2 A F both represent−→ that the problematic pair is (a) in the cur- accepts exactly the consistent trees over Σfr that satisfy ( ), rent subtree, (b) but not in the current node. From either whose number of states is bounded by a single exponential in , and whose Ω has a constant number of pairs. of them, picks one child for which (a) is also true, and ||C T || possibly alsoB (b). In the latter case, it moves to q for that 2 3.5 Deciding Satisfiability child, while the other children go into q1. State q1 means that the problematic pair is not in the subtree, and once The automaton emb provides us an effective way to decide B the embeddabilityA of a constraint graph. With this central in- visits some node in q1, it stays in q1 for all its descendants. e gredient in place, we are ready to put together an algorithm Denote by q the n-tuple containing q2 for entry i and q1 i for checking the satisfiability of w.r.t. . We do so by for every other entry. C T building an automaton , whose language is not empty – For every i [n] and σ Σfr we have AT C ∈ ∈ iff is satisfiable w.r.t. . In a nutshell, we obtain it by in- σ e σ e tersectingC and an automatonT for deciding satisfiability q0 qi and q2 qi emb −→ −→ of the abstractionA to . For the latter, we may rely on σ ALCF – For every σ Σfr, we have q1 (q1, . . . , q1) existing constructions from the literature. ∈ −→

620 Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning (KR 2020) Main Track

Satisfiability of the abstracted part A well Theorem 28. Satisfiability w.r.t. general TBoxes in ALCF known construction of a looping automaton which accepts P ( c) is decidable in EXPTIME. exactly the tree models of an concept w.r.t. a TBox can ALCF Z ALC This bound is tight: satisfiability w.r.t. general TBoxes is be found in (Baader 2009). Note that, for completeness, it EXPTIME-hard already for plain (Schild 1991). is important that it accepts all tree models, as opposed to ALC e.g. accepting some canonical model which may not neces- P 4 Beyond ( c) sarily have an embeddable constraint graph. That construc- ALCF Z tion can be easily adapted to obtain a Rabin tree automaton In this section, we discuss some variants of our construction alcf , which also ensures functionality of the appropriate and how our results extend to other closely related settings. roles.A The automaton runs on trees over the alphabet Aalcf Ξ, which consists of sets of the concept names in , and Undefined register values Classical concrete domains of- a single role name from , . The role name in eachC T letter C T ten allow for the predicate x which is interpreted as the indicates the role with which a logical element is connected register x having undefined↑ value. In order to support this to its parent. The states of are maximal consistent sets Aalcf in our setting, we expand c to c,und by adding a fresh of the subexpressions in , , also known as Hintikka sets. Z Z u C T element to the integers to obtain Z , and adding a The number of states of alcf and the alphabet are exponen- und ∪ { } A unary predicate to the predicates of c. Our approach is tial in , , and its Ω has a constant number of pairs. Z U ||C T || adapted by redefining frames as follows. The set of labels also includes Uund, and the first condition in Definition 13 is

Pairing the alphabet The final automaton , should rephrased to be: AT C accept only representations of models of the abstraction of 1. There is an edge between every pair of vertices which are and whose constraint graph is embeddable. Since one not labeled Uund. checkC T is done by and the other by , we modify Aalcf Aemb Note that due to condition 5, also every pair of vertices la- both automata to use the same alphabet. We let emb0 and A beled Uund is connected (with an equality edge). 0 be the modification of and to trees over Aalcf Aemb Aalcf the product alphabet Σfr Ξ, while ignoring the irrelevant × int nat part of each letter. Clearly, the state sets of emb0 and alcf0 Adding or predicates to dense domains When are not affected and remain exponential in A , , norA are operating over a dense concrete domain such as the ratio- their Ω sets, which still have a constant number||C T of || pairs. nals or the reals, it can be useful to have a predicate which enforces that certain registers hold integer or natural number values, for example, when modeling the number of children Matching the alphabets It is not enough to verify if a tree a person has. We show that such predicates may be added to over Σ Ξ is accepted by 0 , which ignores Ξ, and by fr × Aemb our setting while maintaining our complexity. 0 , which ignores Σfr: such a tree could just pair a model alcf The predicate int(x) is interpreted as u ∆I ofA the abstraction with a totally unrelated constraint graph. { ∈ | β(u, x) Z , and similarly for nat(x). Note that nat(x) We need to verify that the constraint graph matches the inter- int(x) ∈ .}0 S0x , so we limit our treatment to int. ≡ pretation of the abstraction. For this, we take an automaton We describeu ∃ J ≤ how toK add the int predicate to , which Σ Ξ c m that considers both parts of the product alphabet fr is with the reals as the domain, while maintainingR our A ×Ξ c and accepts the trees where the restriction of the input to complexityZ bounds. We need to check whether the subgraph induces the constraint graph corresponding to the restriction induced by the registers satisfying the int predicate is em- Σ of the input to fr. This is done by verifying the conditions beddable, which boils down to making sure there is no pair described in Definition 10 while applying the placeholders of registers with infinitely many int registers between them Ξ bot Σ in the part of the letter to the vertices in the fr part of that must have different values. Therefore we adapt the au- the letter. Such a test can be built into the transition relation, tomaton to look for a pair of registers violating the follow- using a constant number of states. ing updatedB condition: F ( int) There are no (u, x), (u, y) ∆ Reg , in fr for Putting the automata together Finally, we build , ∈ × C T Gω AT C which we have that: there exists an infinite w [n] and as the intersection of emb0 , alcf0 , and m. Each tree it ∈ accepts represents a modelA ofA the abstractionA of w.r.t. 1. an infinite forward path f from (u, x) along w C T whose constraint graph can be embedded into Z, yielding 2. an infinite backward path b from (u, v) along w the desired reduction of satisfiability to automata emptiness. such that f or b is strict and has infinitely many int labels, Proposition 27. There is a Rabin tree automaton , and such that for every i N, there is a strict edge from whose state set is bounded by a single exponential in A, T C f(i) to b(i). ∈ ||C T || and the number of pairs in its Ω is bounded by a polynomial The automaton is adapted so that it guesses whether f or in , , such that L( , ) = iff is satisfiable w.r.t. b is strict and hasB infinitely many int registers, and we add .||C T || AT C 6 ∅ C T to the acceptance condition the requirement that it witnesses Since emptiness of Rabin tree automata is decidable in infinitely many int registers on the path it guessed. In the time polynomial in Q and exponential in the number of pairs proofs we also redefine the notion of strict length of paths, in Ω (Emerson and Jutla 1988), our main result follows. counting only int registers that occur between strict edges.

621 Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning (KR 2020) Main Track

4.1 The Logic ( ) For example, we can translate P1x1,P2x2. < as ALCFP D ∀ P1 0 The DL ( ) was introduced for a general domain P1. P1. S| |x1 = S copy-x1 ALCFP D ¬∃ >t ∃ J K in (Lutz 2001), and a related DL was studied already in P1 0 D P1. S| |x1 S copy-x1 (Baader and Hanschke 1992). While most extensions of DLs u ∀ J ≤ K P2 0  with concrete domains allow only functional roles on the P2. S| |x2 > S copy-x1 u ∀ J K paths participating in the concepts that refer to the concrete We are essentially ensuring, via copy-x1, that the domain, ( c) allows arbitrary roles. It is similar to largest value of x seen with a P path is smaller than ALCFP Z 1 1 our logic, but it can compare values on different paths, while every value of x2 seen with a P2 path. P ( c) can only compare values on the same path. If θ is =, our translation requires exponentially many ALCF Z 6 We briefly recall the definition of ( c), and refer new register names. Given , we can ascertain a de- ALCFP Z to (Lutz 2001) for details. Since the syntax of does gree k of some tree model (ifC anyT model exists). In this ALCFP not allow Boolean combinations of constraints, we enrich model there would be at most P k different values to | 1| c to explicitly include =, , and . This provides a closer consider for the satisfaction of the constraint. Slightly Z 6 ≤ ≥ comparison between the logics, and in the case of P , abusing notation, we express that the x registers at the ALCF 1 it is equivalent to the simpler c considered so far. end of P1 paths contain values from a finite set which Z 1 ( c) is the augmentation of with appears in the fresh register names of the common an- ALCFP Z ALCF cestor, and that this set does not intersect with the set • P x. = c and P x. = c where c Z and P is a sequence ∃ ∀ ∈ of values of the x2 registers at the end of P2 paths: of role names and x a register name, and similarly for = c. 0 0 6 . S x = = S x k The formulas apply the constraint to the x register of the 1 P1 ∃ J 6 · · · 6 | | K P P1 P1 last element on a path. P1. S| |x1 = x1 S| |x1 = x P k u ∀ J ∨ · · · ∨ | 1| K P x ,P x .θ P x ,P x .θ θ , <, = P2 P2 • 1 1 2 2 and 1 1 2 2 where P2. S| |x2 = x1 S| |x2 = x P k ,∃=, >, and each ∀P x is a sequence of role∈ names {≤ fol- u ∀ J ∨ · · · ∨ 6 | 1| K i i This translation allows us to give an upper bound on the lowed6 by≥} a register name. The formulas apply the con- complexity of reasoning w.r.t. general TBoxes in the DL straint to the x register of the last element on a P path 1 1 ( ), which to the best of our knowledge, had and the x register of the last element on a P path, where c 2 2 ALCFPnever beenZ provided before. Our upper bounds also apply both paths start at a common element. if we replace the integers by the real numbers, with or with- We now translate ( ) to P ( ). In most out int and nat predicates in the concrete domain. ALCFP Zc ALCF Zc cases we use additional registers. Theorem 29. Satisfiability w.r.t. general TBoxes in P ( c) is decidable in 2ExpTime, and it is ExpTime- • P x. = c translates to P. S| |x = c and P x. = c ALCFP Z ∃ P ∃ J K ∀ complete if there is a constant bound on the length of any translates to P. S| |x = c . ∀ J K path P1 that contains non-functional roles and occurs in a • For existential concepts P x ,P x .θ, an easy transla- concept of the form P1x1,P2x2.=. ∃ 1 1 2 2 ∀ 6 tion is possible by using two fresh register names copy-g1 and copy-g2, which intuitively store the values at the end 5 Conclusions of P1 and P2. For example, P1x1,P2x2. < translates to We have closed a long-standing open question in the litera- ∃ ture of DLs with concrete domains: reasoning with general 0 P1 C := P1. S copy-x1 = S| |x1 TBoxes in extended with the non-dense domain ∃ ALC Zc J 0 P K is EXPTIME-complete, and hence not harder than in plain P . S copy-x = S| 2|x u ∃ 2 2 2 , even if arbitrary paths of (not necessarily functional) J0 0 K ALC . S copy-x1 < S copy-x2 roles are allowed to refer to the concrete domain. This posi- u ∃ J K tive result extends to other domains that have been advocated The translations for θ , <, =, =, >, are similar. ∈ {≤ 6 ≥} for in the literature, for example, comparisons over the real or rational numbers but with the int and nat predicates. Our • In the cases of P1x1,P2x2.θ, we treat differently the ∀ technique builds on ideas used for constraint LTL in (Demri paths of only functional roles, and the case where arbi- F trary roles may occur. and D’Souza 2007), and our condition ( ) is very similar to the condition used in that paper. Lifting the results from – If all roles occurring in P1 and P2 are functional, then linear structures, as in LTL, to the tree-shaped ones needed an encoding similar to P1x1,P2x2.θ can be used. in is not trivial. It remains an open question whether ∃ ALC For example, P1x1,P2x2.< translates to P1. our technical results can be transferred to fragments of con- ∀ ¬∃ > t P2. C, where C is as above. straint CTL to obtain new complexity bounds. Natural next ¬∃ > t ∗ – If non-functional roles occur in P1 and P2, then we may steps are exploring other DLs, for example P ( ), need to compare numbers on several paths, and we may and considering ABoxes and instance queries.SHIQ Z need more sophisticated tricks. For θ , <, =, = , >, , this is still possible using just a∈ few {≤ registers.6 Acknowledgments ≥} This work was supported by the Austrian Science Fund 1 ALCFP(Zc) supports x ↑, which we can simulate as above. (FWF) projects P30360, P30873, and W1255.

622 Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning (KR 2020) Main Track

References Lutz, C. 2002a. Adding numbers to the SHIQ description logic: First results. In Proc. of KR 2002, 191–202. Artale, A.; Ryzhikov, V.; and Kontchakov, R. 2012. DL-Lite with attributes and datatypes. In Proc. of ECAI 2012, volume Lutz, C. 2002b. Description logics with concrete domains-a 242 of Frontiers in Artificial Intelligence and Applications, survey. In Proc. of Advances in Modal Logic 4, 265–296. 61–66. IOS Press. King’s College Publications. Baader, F., and Hanschke, P. 1991. A scheme for integrating Lutz, C. 2002c. Pspace reasoning with the description logic concrete domains into concept languages. In Proc. of IJCAI ALCF(D). Logic Journal of the IGPL 10(5):535–568. 1991, 452–457. Morgan Kaufmann. Lutz, C. 2004a. Combining interval-based temporal reason- Baader, F., and Hanschke, P. 1992. Extensions of con- ing with general TBoxes. Artif. Intell. 152(2):235–274. cept languages for a mechanical engineering application. In Lutz, C. 2004b. NEXPTIME-complete description log- GWAI, volume 671 of LNCS, 132–143. Springer. ics with concrete domains. ACM Trans. Comput. Logic Baader, F.; Borgwardt, S.; and Lippmann, M. 2017. Query 5(4):669–705. rewriting for DL-Lite with n-ary concrete domains. In Proc. Muller, D. E., and Schupp, P. E. 1995. Simulating alter- of IJCAI 2017, 786–792. ijcai.org. nating tree automata by nondeterministic automata: New re- sults and new proofs of the theorems of Rabin, McNaughton Baader, F. 2009. Description logics. In Reasoning Web. and Safra. Theor. Comput. Sci. 141(1&2):69–107. Semantic Technologies for Information Systems, 5th Inter- national Summer School, volume 5689 of LNCS, 1–39. Poggi, A.; Lembo, D.; Calvanese, D.; De Giacomo, G.; Springer. Lenzerini, M.; and Rosati, R. 2008. Linking data to on- tologies. Journal on Data Semantics 10:133–173. Bojanczyk,´ M., and Torunczyk,´ S. 2012. Weak MSO+U over infinite trees. In Proc. of STACS 2012, volume 14 of Rabin, M. O. 1972. Automata on Infinite Objects and LIPIcs, 648–660. Schloss Dagstuhl - Leibniz-Zentrum fur¨ Church’s Problem. Boston, MA, USA: American Mathe- Informatik. matical Society. Bozzelli, L., and Gascon, R. 2006. Branching-time tem- Savkovic, O., and Calvanese, D. 2012. Introducing poral logic extended with qualitative Presburger constraints. datatypes in DL-Lite. In Proc. of ECAI 2012, volume 242 In Proc. of LPAR 2006, volume 4246 of LNCS, 197–211. of Frontiers in Artificial Intelligence and Applications, 720– Springer. 725. IOS Press. Carapelle, C., and Turhan, A. 2016. Description logics rea- Schild, K. 1991. A correspondence theory for terminologi- soning w.r.t. general TBoxes is decidable for concrete do- cal logics: Preliminary report. In Proc. of IJCAI 1991, 466– mains with the EHD-property. In Proc. of ECAI 2016, vol- 471. Morgan Kaufmann. ume 285 of Frontiers in Artificial Intelligence and Applica- tions, 1440–1448. IOS Press. Carapelle, C.; Kartzow, A.; and Lohrey, M. 2016. Satis- fiability of ECTL* with constraints. J. Comput. Syst. Sci. 82(5):826–855. Demri, S., and D’Souza, D. 2007. An automata-theoretic approach to constraint LTL. Inf. Comput. 205(3):380–415. Diestel, R. 2012. Graph Theory, 4th Edition, volume 173 of Graduate texts in mathematics. Springer. Emerson, E. A., and Jutla, C. S. 1988. The complexity of tree automata and logics of programs (extended abstract). In Proc. of FOCS 1988, 328–337. IEEE Computer Society. Haarslev, V.; Moller,¨ R.; and Wessel, M. 2001. The de- scription logic alcnhr+ extended with concrete domains: A practically motivated approach. In Proc. of IJCAR 2001, volume 2083 of LNCS, 29–44. Springer. Labai, N.; Ortiz, M.; and Simkus,ˇ M. 2020. An ExpTime up- per bound for ALC with integers (extended version). CoRR abs/2006.02078. Lutz, C., and Milicic, M. 2007. A tableau algorithm for de- scription logics with concrete domains and general TBoxes. J. Autom. Reasoning 38(1-3):227–259. Lutz, C. 2001. NEXPTIME-complete description logics with concrete domains. In Proc. of IJCAR 2001, volume 2083 of LNCS, 45–60. Springer.

623