{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:55:00Z","timestamp":1742979300581,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387355443"},{"type":"electronic","value":"9780387399409"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-0-387-39940-9_400","type":"book-chapter","created":{"date-parts":[[2009,9,16]],"date-time":"2009-09-16T09:07:40Z","timestamp":1253092060000},"page":"2976-2982","source":"Crossref","is-referenced-by-count":0,"title":["Temporal Integrity Constraints"],"prefix":"10.1007","author":[{"given":"Jef","family":"Wijsen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"400_CR1_400","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/S0304-3975(97)00088-1","volume":"190","author":"N. Bidoit","year":"1998","unstructured":"Bidoit N. and de Amo S. A first step towards implementing dynamic algebraic dependences. Theor. Comput. Sci., 190(2):115\u2013149, 1998.","journal-title":"Theor. Comput. Sci."},{"key":"400_CR2_400","unstructured":"de Castilho J.M.V., Casanova M.A., and Furtado A.L. A temporal framework for database specifications. In Proc. 8th Int. Conf. on Very Data Bases, 280\u2013291.1982,"},{"issue":"2","key":"400_CR3_400","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/210197.210200","volume":"20","author":"J. Chomicki","year":"1995","unstructured":"Chomicki J. Efficient checking of temporal integrity constraints using bounded history encoding. ACM Trans. Database Syst., 20(2):149\u2013186, 1995.","journal-title":"ACM Trans. Database Syst."},{"issue":"3","key":"400_CR4_400","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1006\/jcss.1995.1088","volume":"51","author":"J. Chomicki","year":"1995","unstructured":"Chomicki J. and Niwinski D. On the feasibility of checking temporal integrity constraints. J. Comput. Syst. Sci., 51(3):523\u2013535, 1995.","journal-title":"J. Comput. Syst. Sci."},{"issue":"4","key":"400_CR5_400","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/69.404030","volume":"7","author":"J. Chomicki","year":"1995","unstructured":"Chomicki J. and Toman D. Implementing temporal integrity constraints using an active DBMS. IEEE Trans. Knowl. Data Eng., 7(4):566\u2013582, 1995.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"400_CR6_400","doi-asserted-by":"crossref","unstructured":"Chomicki J. and Toman D. Temporal logic in information systems. In Logics for Databases and Information Systems. J. Chomicki and G. Saake (eds.). Kluwer, Dordecht, 1998, pp. 31\u201370.","DOI":"10.1007\/978-1-4615-5643-5_3"},{"key":"400_CR7_400","doi-asserted-by":"crossref","unstructured":"Chomicki J. and Toman D. Temporal databases. In M. Fisher, D.M. Gabbay, and L. Vila (eds.). Handbook of Temporal Reasoning in Artificial Intelligence. Elsevier Science, 2005.","DOI":"10.1016\/S1574-6526(05)80016-1"},{"key":"400_CR8_400","unstructured":"Li W., Snodgrass R.T., Deng S., Gattu V.K., and Kasthurirangan A. Efficient sequenced integrity constraint checking. In Proc. 17th Int. Conf. on Data Engineering, 2001, pp. 131\u2013140."},{"issue":"3","key":"400_CR9_400","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/0306-4379(87)90004-4","volume":"12","author":"U.W. Lipeck","year":"1987","unstructured":"Lipeck U.W. and Saake G. Monitoring dynamic integrity constraints based on temporal logic. Inf. Syst., 12(3):255\u2013269, 1987.","journal-title":"Inf. Syst."},{"key":"400_CR10_400","unstructured":"Plexousakis D. Integrity constraint and rule maintenance in temporal deductive knowledge bases. In Proc. 19th Int. Conf. on Very Large Data Bases, 1993, pp. 146\u2013157."},{"key":"400_CR11_400","doi-asserted-by":"crossref","unstructured":"Sistla A.P. and Wolfson O. Temporal conditions and integrity constraints in active database systems. In Proc. ACM SIGMOD Int. Conf. on Management of Data, 1995, pp. 269\u2013280.","DOI":"10.1145\/568271.223844"},{"issue":"3","key":"400_CR12_400","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/69.390251","volume":"7","author":"A.P. Sistla","year":"1995","unstructured":"Sistla A.P. and Wolfson O. Temporal triggers in active databases. IEEE Trans. Knowl. Data Eng., 7(3):471\u2013486, 1995.","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Encyclopedia of Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-39940-9_400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T04:40:23Z","timestamp":1590986423000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-39940-9_400"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9780387355443","9780387399409"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-39940-9_400","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}