{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:23:04Z","timestamp":1760707384746,"version":"3.32.0"},"reference-count":38,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":6452,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Am. Soc. Inf. Sci."],"published-print":{"date-parts":[[1998]]},"DOI":"10.1002\/(sici)1097-4571(19980415)49:5<455::aid-asi7>3.0.co;2-m","type":"journal-article","created":{"date-parts":[[2004,10,26]],"date-time":"2004-10-26T19:22:36Z","timestamp":1098818556000},"page":"455-470","source":"Crossref","is-referenced-by-count":6,"title":["Automated database schema design using mined data dependencies"],"prefix":"10.1002","volume":"49","author":[{"given":"S. K. M.","family":"Wong","sequence":"first","affiliation":[]},{"given":"C. J.","family":"Butz","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"311","reference":[{"year":"1977","author":"Beeri","key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB1.1","unstructured":", & (1977). A complete axiomatization for functional and multivalued dependencies in database relations. Proceedings of the ACM SIGMOD Conference (pp. 47\u201361)."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB1.2","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1145\/2402.322389","volume":"30","author":"Beeri","year":"1983","journal-title":"Association for Computing Machinery"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-93437-7_28","volume-title":"The alarm monitoring system: A case study with two probabilistic inference techniques for belief networks","author":"Beinlich","year":"1989","unstructured":", , & (1989). The alarm monitoring system: A case study with two probabilistic inference techniques for belief networks (Tech. Rep. KSL-88\u201384). Stanford, CA: Knowledge Systems Lab, Medical Computer Science, Stanford University."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB3","first-page":"102","volume-title":"Proceedings of the Tenth Conference on Uncertainty in Artificial Intelligence","author":"Bouckaert","year":"1994","unstructured":"(1994). Properties of Bayesian belief network learning algorithms. In de Mantaras & (Eds.), Proceedings of the Tenth Conference on Uncertainty in Artificial Intelligence (pp. 102\u2013109). San Francisco, CA: Morgan Kaufmann."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB4.1","first-page":"309","volume":"9","author":"Cooper","year":"1992","journal-title":"Machine Learning"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB4.2","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1016\/0022-0000(90)90031-F","volume":"41","author":"Dechter","year":"1990","journal-title":"Computer and System Sciences"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB4.3","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/320263.320271","volume":"3","author":"Delobel","year":"1978","journal-title":"ACM Transactions on Database Systems"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB4.4","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1145\/320557.320571","volume":"2","author":"Fagin","year":"1977","journal-title":"ACM Transactions on Database Systems"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB4.5","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1145\/319732.319735","volume":"7","author":"Fagin","year":"1982","journal-title":"ACM Transactions on Database Systems"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB5","first-page":"371","volume-title":"Methodologies for intelligent systems","author":"Flach","year":"1990","unstructured":"(1990). Inductive characterization of database relations. In , (Eds.), Methodologies for intelligent systems 5 (pp. 371\u2013378). Amsterdam: North-Holland."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB6","volume-title":"Algorithmic graph theory and perfect graphs","author":"Golumbic","year":"1980","unstructured":"(1980). Algorithmic graph theory and perfect graphs. London: Academic Press."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB7","volume-title":"Uncertain information processing in expert systems","author":"Hajek","year":"1992","unstructured":", & (1992). Uncertain information processing in expert systems. Boca Raton, FL: CRC Press."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB8","first-page":"197","volume":"20","author":"Heckerman","year":"1995","journal-title":"Machine Learning"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB9","first-page":"54","volume-title":"Proceedings of the Sixth Conference on Uncertainty in Artificial Intelligence","author":"Herskovits","year":"1990","unstructured":"& (1990). Kutato: An entropy-driven system for construction of probabilistic expert systems from database. Proceedings of the Sixth Conference on Uncertainty in Artificial Intelligence (pp. 54\u201362). Amsterdam: North Holland Publishers."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB10","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1214\/ss\/1177010891","volume":"8","author":"Hill","year":"1993","journal-title":"Statistical Science"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB11","volume-title":"Junction tree and decomposable hypergraphs","author":"Jensen","year":"1988","unstructured":"(1988). Junction tree and decomposable hypergraphs (Tech. Rep.). Aalborg, Denmark: JUDEX."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB12","volume-title":"An introduction to Bayesian networks","author":"Jensen","year":"1996","unstructured":"(1996). An introduction to Bayesian networks. London: UCL Press."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB13.1","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"Kullback","year":"1951","journal-title":"Annals of Mathematical Statistics"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB13.2","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1111\/j.1467-8640.1994.tb00166.x","volume":"10","author":"Lam","year":"1994","journal-title":"Computational Intelligence"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB13.3","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1111\/j.2517-6161.1988.tb01721.x","volume":"50","author":"Lauritzen","year":"1988","journal-title":"Royal Statistical Society, B"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB13.4","doi-asserted-by":"crossref","first-page":"3159","DOI":"10.1002\/j.1538-7305.1983.tb03470.x","volume":"62","author":"Lee","year":"1983","journal-title":"The Bell System Technical Journal"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB14","volume-title":"The theory of relational databases","author":"Maier","year":"1983","unstructured":"(1983). The theory of relational databases. Rockville, MD: Computer Science Press."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB15","volume-title":"Introduction to algorithms: A creative approach","author":"Manber","year":"1989","unstructured":"(1989). Introduction to algorithms: A creative approach. Reading, MA: Addison-Wesley."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB16.1","volume-title":"Probabilistic reasoning in expert systems","author":"Neapolitan","year":"1990","unstructured":"(1990). Probabilistic reasoning in expert systems. New York: Wiley."},{"year":"1988","author":"Poole","key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB16.2","unstructured":"& (1988). Sound probabilistic inference in Prolog: An executable specification of influence diagrams. Proceedings of the I Simposium Internacional De Inteligencia Artificial, pp. 37\u201354."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB16.3","volume-title":"Probabilistic Reasoning in Intelligent Systems","author":"Pearl","year":"1988","unstructured":"(1988). Probabilistic Reasoning in Intelligent Systems. San Francisco, CA: Morgan Kaufmann."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB17","first-page":"374","volume-title":"Proceedings of the AAAI87 Sixth National Conference on Artificial Intelligence","volume":"1","author":"Pearl","year":"1987","unstructured":"& (1987). The logic of representing dependencies by directed graphs. Proceedings of the AAAI87 Sixth National Conference on Artificial Intelligence, 1, 374\u2013379. San Francisco, CA: Morgan Kaufmann."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB18","first-page":"222","volume-title":"Proceedings of Workshop on Uncertainty in Artificial Intelligence","author":"Rebane","year":"1987","unstructured":"(1987). The recovery of causal play-trees from statistical data. Proceedings of Workshop on Uncertainty in Artificial Intelligence (pp. 222\u2013228). Amsterdam: North Holland."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB19","first-page":"174","volume-title":"Proceedings of the AAAI-93 Workshop: Knowledge Discovery in Databases","author":"Savnik","year":"1993","unstructured":"& (1993). Bottom-up induction of functional dependencies from relations. Proceedings of the AAAI-93 Workshop: Knowledge Discovery in Databases, (pp. 174\u2013185). Menlo Park, CA: AAAI Press."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB20","series-title":"School of Bus","first-page":"232","volume-title":"An axiomatic study of computation in hypertrees","author":"Shafer","year":"1991","unstructured":"(1991). An axiomatic study of computation in hypertrees. School of Business working paper series, 232, University of Kansas, Lawrence."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB21.1","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1177\/089443939100900106","volume":"9","author":"Spirtes","year":"1991","journal-title":"Social Science Computer Review"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB21.2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1023\/A:1007324100110","volume":"26","author":"Xiang","year":"1997","journal-title":"Machine Learning"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB22","first-page":"564","volume-title":"Proceedings of the Twelfth Conference on Uncertainty in Artificial Intelligence","author":"Xiang","year":"1996","unstructured":", & (1996). Critical remarks on single link search in learning belief networks. In & (Eds.), Proceedings of the Twelfth Conference on Uncertainty in Artificial Intelligence (pp. 564\u2013571). San Francisco, CA: Morgan Kaufmann."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB23","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1023\/A:1008603515938","volume":"9","author":"Wong","year":"1997","journal-title":"Journal of Intelligent Information Systems"},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB24","first-page":"545","volume-title":"Proceedings of the Twelfth Conference on Uncertainty in Artificial Intelligence","author":"Wong","year":"1996","unstructured":"(1996). Testing implication of probabilistic dependencies. In & (Eds.), Proceedings of the Twelfth Conference on Uncertainty in Artificial Intelligence (pp. 545\u2013563). San Francisco, CA: Morgan Kaufmann."},{"key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB25.1","first-page":"556","volume-title":"Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence","author":"Wong","year":"1995","unstructured":", & (1995). A method for implementing a probabilistic model as a relational database. In & (Eds.), Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence (pp. 556\u2013564). San Francisco, CA: Morgan Kaufmann."},{"year":"1994","author":"Wong","key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB25.2","unstructured":"& (1994). Construction of a markov network from data for probabilistic inference. Proceedings of the 3rd International Workshop on Rough Sets and Soft Computing (pp. 562\u2013569)."},{"year":"1994","author":"Wong","key":"10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M-BIB25.3","unstructured":", & (1994). Representation of Bayesian networks as relational databases. Proceedings of the Fifth International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (pp. 159\u2013165)."}],"container-title":["Journal of the American Society for Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F(SICI)1097-4571(19980415)49:5%3C455::AID-ASI7%3E3.0.CO;2-M","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/(SICI)1097-4571(19980415)49:5%3C455::AID-ASI7%3E3.0.CO;2-M","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T05:04:43Z","timestamp":1734584683000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/(SICI)1097-4571(19980415)49:5<455::AID-ASI7>3.0.CO;2-M"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1998]]}},"URL":"https:\/\/doi.org\/10.1002\/(sici)1097-4571(19980415)49:5<455::aid-asi7>3.0.co;2-m","relation":{},"ISSN":["0002-8231","1097-4571"],"issn-type":[{"type":"print","value":"0002-8231"},{"type":"electronic","value":"1097-4571"}],"subject":[],"published":{"date-parts":[[1998]]}}}