{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:11:29Z","timestamp":1742944289576,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387355443"},{"type":"electronic","value":"9780387399409"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-0-387-39940-9_1255","type":"book-chapter","created":{"date-parts":[[2009,9,16]],"date-time":"2009-09-16T08:05:42Z","timestamp":1253088342000},"page":"2463-2466","source":"Crossref","is-referenced-by-count":1,"title":["Safety and Domain Independence"],"prefix":"10.1007","author":[{"given":"Rodney","family":"Topor","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1255_CR1_1255","first-page":"70","volume-title":"Foundations of Databases","author":"R. Abiteboul","year":"1995","unstructured":"Abiteboul R., Hull R., and Vianu V. 1995, Foundations of Databases, Chapter 5. Addison-Wesley, Reading, MA, pp. 70\u2013104."},{"key":"1255_CR2_1255","doi-asserted-by":"crossref","first-page":"1652","DOI":"10.1137\/S0097539798342484","volume":"29","author":"M. Benedikt","year":"2000","unstructured":"Benedikt M. and Libkin L. Safe constraint queries, SIAM J. Comput., 29:1652\u20131682, 2000.","journal-title":"SIAM J. Comput."},{"issue":"2","key":"1255_CR3_1255","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1145\/321510.321524","volume":"16","author":"R.A. DiPaola","year":"1969","unstructured":"DiPaola R.A. The recursive unsolvability of the decision problem for the class of definite formulas. J. ACM, 16(2):324\u2013327, 1969.","journal-title":"J. ACM"},{"key":"1255_CR4_1255","doi-asserted-by":"crossref","unstructured":"Escobar-Molano M., Hull., and Jacobs D. Safety and translation of calculus queries with scalar functions. In Proc. 12th ACM SIGACT-SIGMOD-SIGART Symp. on Principles of Database Systems, 1993, pp. 253\u2013264.","DOI":"10.1145\/153850.153909"},{"key":"1255_CR5_1255","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BF01213204","volume":"31","author":"R. Hull","year":"1994","unstructured":"Hull R. and Su J. Domain independence and the relational calculus. Acta Inform., 31:513\u2013524, 1994.","journal-title":"Acta Inform."},{"key":"1255_CR6_1255","doi-asserted-by":"crossref","unstructured":"Kifer M. On Safety, Domain Independence, and Capturability of Database Queries (Preliminary Report). In Proc. 3rd Int. Conf. on Data and Knowledge Bases, 1988, pp. 405\u2013415.","DOI":"10.1016\/B978-1-4832-1313-2.50037-8"},{"issue":"1","key":"1255_CR7_1255","first-page":"99","volume":"153","author":"A.P. Stolboushkin","year":"1996","unstructured":"Stolboushkin A.P. and Taitslin M.A. Finite queries do not have effective syntax, Inform. Comput., 153(1):99\u2013116, 1996.","journal-title":"Comput."},{"issue":"2","key":"1255_CR8_1255","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/S0304-3975(97)00093-5","volume":"190","author":"D. Suciu","year":"1998","unstructured":"Suciu D. Domain-independent queries on databases with external functions. Theor. Comput. Sci., 190(2):279\u2013315, 1998.","journal-title":"Theor. Comput. Sci."},{"issue":"3","key":"1255_CR9_1255","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/0304-3975(87)90113-7","volume":"52","author":"R.W. Topor","year":"1987","unstructured":"Topor R.W. Domain independent formulas and databases. Theor. Comput. Sci., 52(3):281\u2013306, 1987.","journal-title":"Theor. Comput. Sci."},{"key":"1255_CR10_1255","unstructured":"Ullman J.D. Principles of Database and Knowledge-Base Systems, Volume I, Sections 3.2 and 3.8. Computer Science Press, 1988, pp. 100\u2013106 and 145\u2013156."},{"issue":"5","key":"1255_CR11_1255","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/0020-0190(81)90025-9","volume":"13","author":"M.Y. Vardi","year":"1981","unstructured":"Vardi M.Y. The decision problem for database dependencies. Inform. Process. Lett., 13(5):251\u2013254, 1981.","journal-title":"Inform. Process. Lett."},{"issue":"2","key":"1255_CR12_1255","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1145\/114325.103712","volume":"16","author":"A. Van Gelder","year":"1981","unstructured":"Van Gelder A. and Topor R.W. Safety and translation of relational calculus aueries. ACM Trans. Database Syst., 16(2):235\u2013278, 1981.","journal-title":"ACM Trans. Database Syst."}],"container-title":["Encyclopedia of Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-39940-9_1255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T04:23:08Z","timestamp":1590985388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-39940-9_1255"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9780387355443","9780387399409"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-39940-9_1255","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}