{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:01:01Z","timestamp":1725663661160},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540512516"},{"type":"electronic","value":"9783540461821"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1989]]},"DOI":"10.1007\/3-540-51251-9_1","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T15:49:09Z","timestamp":1330184949000},"page":"1-11","source":"Crossref","is-referenced-by-count":1,"title":["Selective refutation of integrity constraints in deductive databases"],"prefix":"10.1007","author":[{"given":"P.","family":"Asirelli","sequence":"first","affiliation":[]},{"given":"C.","family":"Billi","sequence":"additional","affiliation":[]},{"given":"P.","family":"Inverardi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,1]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Asirelli, P., De Santis, M., Martelli, M., Integrity Constraints in Logic Data Bases, Journal of Logic Programming, Vol. 2, n. 3, Oct. 1985.","DOI":"10.1016\/0743-1066(85)90020-2"},{"key":"1_CR2","unstructured":"P. Asirelli, P. Inverardi, A. Mustaro \u201cImproving Integrity constraint Checking in Deductive Databases\u201d, International Conference on Database Theory, 29 Agoust, 2 September 1988, Bruges, Belgium, LNCS 326."},{"key":"1_CR3","unstructured":"Decker, H., Integrity Enforcement on Deductive Databases, 1st International Conference on Expert Database Systems, Charleston, S.C., 1986, pp. 271\u2013285."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Lloyd, J. W., Foundations of logic programming, Symbolic Computation Series, Springer, 1987, Second Edition.","DOI":"10.1007\/978-3-642-83189-8"},{"issue":"4","key":"1_CR5","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/0743-1066(87)90009-4","volume":"4","author":"J. W. Lloyd","year":"1987","unstructured":"Lloyd, J. W., Sonenberg, E.,A., Topor, R. W., Integrity Constraint Checking in Stratified Databases, J. Logic Programming 4(4): 331\u2013343, 1987.","journal-title":"J. Logic Programming"},{"key":"1_CR6","volume-title":"Foundations of Deductive Databases and Logic Programming","author":"F. Sadri","year":"1987","unstructured":"Sadri, F., Kowalsky, R. A., A Theorem-Proving Approach to Database Integrity, in: J. Minker (ed.), Foundations of Deductive Databases and Logic Programming, Morgan Kaufman, Los Altos, 1987."}],"container-title":["Lecture Notes in Computer Science","MFDBS 89"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-51251-9_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:02:18Z","timestamp":1619557338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-51251-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989]]},"ISBN":["9783540512516","9783540461821"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-51251-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1989]]}}}