Semantic Analysis of R2RML Mappings for Ontology-Based Data Access

Cristina Civili, Jose Mora, Riccardo Rosati, Marco Ruzzi, Valerio Santarelli

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Ontology-based data access (OBDA) deals with the problem of accessing autonomous data sources through a shared, virtual ontology, and declarative mappings connecting the data sources to the ontology. The W3C standard R2RML allows for mapping relational data sources to RDFS/OWL ontologies. In this paper, we present algorithms for the semantic analysis of R2RML mappings in the OBDA setting, when the ontology is expressed in OWL 2 QL. The focus of such algorithms is to identify the main semantical anomalies (inconsistency and redundancy) of a mapping specification with respect to the ontology and/or the data sources. Such algorithms have been implemented in the mapping analysis tool developed within the Optique European project. We also report on the experiments conducted within the Optique project use cases.
Original languageEnglish
Title of host publicationWeb Reasoning and Rule Systems
Subtitle of host publication10th International Conference, RR 2016, Aberdeen, UK, September 9-11, 2016, Proceedings
EditorsMagdalena Ortiz, Stefan Schlobach
PublisherSpringer
Pages25-38
Number of pages14
ISBN (Electronic)978-3-319-45276-0
ISBN (Print)978-3-319-45275-3
DOIs
Publication statusPublished - 9 Sept 2016
EventWeb Reasoning and Rule Systems - 10th International Conference - Aberdeen, United Kingdom
Duration: 9 Sept 201611 Sept 2016
http://www.rr-conference.org/

Publication series

NameLecture Notes in Computer Science
PublisherSpringer International Publishing
Volume9898
ISSN (Print)0302-9743

Conference

ConferenceWeb Reasoning and Rule Systems - 10th International Conference
Abbreviated titleRR 2016
Country/TerritoryUnited Kingdom
CityAberdeen
Period9/09/1611/09/16
Internet address

Fingerprint

Dive into the research topics of 'Semantic Analysis of R2RML Mappings for Ontology-Based Data Access'. Together they form a unique fingerprint.

Cite this