{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:41:31Z","timestamp":1725864091233},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319452753"},{"type":"electronic","value":"9783319452760"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45276-0_8","type":"book-chapter","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T04:18:04Z","timestamp":1472098684000},"page":"94-110","source":"Crossref","is-referenced-by-count":0,"title":["The Impact of Active Domain Predicates on Guarded Existential Rules"],"prefix":"10.1007","author":[{"given":"Georg","family":"Gottlob","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Pieris","sequence":"additional","affiliation":[]},{"given":"Mantas","family":"\u0160imkus","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,26]]},"reference":[{"key":"8_CR1","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Boston (1995)"},{"issue":"9\u201310","key":"8_CR2","doi-asserted-by":"crossref","first-page":"1620","DOI":"10.1016\/j.artint.2011.03.002","volume":"175","author":"JF Baget","year":"2011","unstructured":"Baget, J.F., Lecl\u00e8re, M., Mugnier, M.L., Salvat, E.: On rules with existential variables: walking the decidability line. Artif. Intell. 175(9\u201310), 1620\u20131654 (2011)","journal-title":"Artif. Intell."},{"key":"8_CR3","unstructured":"Baget, J.F., Mugnier, M.L., Rudolph, S., Thomazo, M.: Walking the complexity lines for generalized guarded existential rules. In: IJCAI, pp. 712\u2013717 (2011)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/978-3-642-40313-2_11","volume-title":"Mathematical Foundations of Computer Science 2013","author":"V B\u00e1r\u00e1ny","year":"2013","unstructured":"B\u00e1r\u00e1ny, V., Benedikt, M., ten Cate, B.: Rewriting guarded negation queries. In: Chatterjee, K., Sgall, J. (eds.) MFCS 2013. LNCS, vol. 8087, pp. 98\u2013110. Springer, Heidelberg (2013)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/3-540-10843-2_7","volume-title":"Automata, Languages and Programming","author":"C Beeri","year":"1981","unstructured":"Beeri, C., Vardi, M.Y.: The implication problem for data dependencies. In: Even, S., Kariv, O. (eds.) ICALP 1981. LNCS, vol. 115, pp. 73\u201385. Springer, Heidelberg (1981)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Bienvenu, M., ten Cate, B., Lutz, C., Wolter, F.: Ontology-based data access: a study through disjunctive datalog, csp, and MMSNP. ACM Trans. Database Syst. 39(4), 33:1\u201333:44 (2014)","DOI":"10.1145\/2661643"},{"key":"8_CR7","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1613\/jair.3873","volume":"48","author":"A Cal\u00ec","year":"2013","unstructured":"Cal\u00ec, A., Gottlob, G., Kifer, M.: Taming the infinite chase: query answering under expressive relational constraints. J. Artif. Intell. Res. 48, 115\u2013174 (2013)","journal-title":"J. Artif. Intell. Res."},{"issue":"1","key":"8_CR8","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.tcs.2004.10.033","volume":"336","author":"R Fagin","year":"2005","unstructured":"Fagin, R., Kolaitis, P.G., Miller, R.J., Popa, L.: Data exchange: semantics and query answering. Theor. Comput. Sci. 336(1), 89\u2013124 (2005)","journal-title":"Theor. Comput. Sci."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Gottlob, G., Rudolph, S., Simkus, M.: Expressiveness of guarded existential rule languages. In: PODS, pp. 27\u201338 (2014)","DOI":"10.1145\/2594538.2594556"},{"issue":"1","key":"8_CR10","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/0022-0000(84)90081-3","volume":"28","author":"DS Johnson","year":"1984","unstructured":"Johnson, D.S., Klug, A.C.: Testing containment of conjunctive queries under functional and inclusion dependencies. J. Comput. Syst. Sci. 28(1), 167\u2013189 (1984)","journal-title":"J. Comput. Syst. Sci."},{"issue":"4","key":"8_CR11","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1145\/320107.320115","volume":"4","author":"D Maier","year":"1979","unstructured":"Maier, D., Mendelzon, A.O., Sagiv, Y.: Testing implications of data dependencies. ACM Trans. Database Syst. 4(4), 455\u2013469 (1979)","journal-title":"ACM Trans. Database Syst."}],"container-title":["Lecture Notes in Computer Science","Web Reasoning and Rule Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45276-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T19:14:59Z","timestamp":1568315699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45276-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319452753","9783319452760"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45276-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}