{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:12:59Z","timestamp":1750824779988,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319671796"},{"type":"electronic","value":"9783319671802"}],"license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-67180-2_27","type":"book-chapter","created":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T04:06:53Z","timestamp":1503374813000},"page":"276-285","source":"Crossref","is-referenced-by-count":0,"title":["Inception and Specification of What-If Scenarios Using OLAP Usage Preferences"],"prefix":"10.1007","author":[{"given":"Mariana","family":"Carvalho","sequence":"first","affiliation":[]},{"given":"Orlando","family":"Belo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"27_CR1","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proceedings 20th International Conference Very Large Data Bases, VLDB, vol. 1215, pp. 487\u2013499 (1994)"},{"key":"27_CR2","unstructured":"Alloy (2016). http:\/\/alloy.mit.edu\/alloy\/ . Accessed 13 June 2016"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Bleikertz, S., Vogel, C., Gro\u00df, T., M\u00f6dersheim, S.: Proactive security analysis of changes in virtualized infrastructures. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 51\u201360. ACM (2015)","DOI":"10.1145\/2818000.2818034"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Golfarelli, M., Rizzi, S., Proli, A.: Designing What-If analysis: towards a methodology. In: DOLAP 2006, Arlington, Virginia, USA, pp. 51\u201358 (2006)","DOI":"10.1145\/1183512.1183523"},{"issue":"2","key":"27_CR5","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1145\/235968.233333","volume":"25","author":"V Harinarayan","year":"1996","unstructured":"Harinarayan, V., Rajaraman, A., Ullman, J.: Implementing data cubes efficiently. ACM SIGMOD Record 25(2), 205\u2013216 (1996)","journal-title":"ACM SIGMOD Record"},{"key":"27_CR6","volume-title":"Software Abstractions: Logic, Language, and Analysis","author":"D Jackson","year":"2012","unstructured":"Jackson, D.: Software Abstractions: Logic, Language, and Analysis. MIT press, Cambridge (2012)"},{"issue":"2","key":"27_CR7","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/S0164-1212(99)00003-5","volume":"46","author":"MI Kellner","year":"1999","unstructured":"Kellner, M.I., Madachy, R., Raffo, D.: Software process simulation modeling: why? what? how? J. Syst. Softw. 46(2), 91\u2013105 (1999)","journal-title":"J. Syst. Softw."},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Marcozzi, M., Vanhoof, W., Hainaut, J.L.: Test input generation for database programs using relational constraints. In: Proceedings of the Fifth International Workshop on Testing Database Systems, p. 6. ACM (2012)","DOI":"10.1145\/2304510.2304518"},{"key":"27_CR9","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.scico.2015.03.005","volume":"105","author":"M Marcozzi","year":"2015","unstructured":"Marcozzi, M., Vanhoof, W., Hainaut, J.L.: Relational symbolic execution of SQL code for unit testing of data-base programs. Sci. Comput. Program. 105, 44\u201372 (2015)","journal-title":"Sci. Comput. Program."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Moskewicz, M.W., Madigan, C.F., Zhao, Y., Zhang, L., Malik, S.: Engineering an efficient SAT solver. In: Proceedings of the 38th annual Design Automation Conference, pp. 530\u2013535. ACM (2001)","DOI":"10.1145\/378239.379017"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Rungta, N., Brat, G., Clancey, W.J., Linde, C., Raimondi, F., Seah, C., Shafto, M.: Aviation safety: modeling and analyzing complex interactions between humans and automated systems. In: Proceedings of the 3rd International Conference on Application and Theory of Automation in Command and Control Systems, pp. 27\u201337. ACM (2013)","DOI":"10.1145\/2494493.2494498"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Salem, A., Triki, S., Ben-Abdallah, H., Harbi, N., Boussaid, O.: Verification of security coherence in data warehouse designs. In: International Conference on Trust, Privacy and Security in Digital Business, pp. 207\u2013213. Springer, Heidelberg (2012)","DOI":"10.1007\/978-3-642-32287-7_18"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Sen, S., Chaki, N., Cortesi, A.: Optimal space and time complexity analysis on the lattice of cuboids using galois connections for data warehousing. In: Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp. 1271\u20131275. IEEE (2009)","DOI":"10.1109\/ICCIT.2009.185"},{"issue":"2","key":"27_CR14","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10732-014-9258-x","volume":"21","author":"A Testa","year":"2015","unstructured":"Testa, A., Cinque, M., Coronato, A., De Pietro, G., Augusto, J.C.: Heuristic strategies for assessing wireless sensor network resiliency: an event-based formal approach. J. Heuristics 21(2), 145\u2013175 (2015)","journal-title":"J. Heuristics"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Wu, M.C., Buchmann, A.P.: Research issues in data warehousing. In: Datenbanksysteme in B\u00fcro, Technik und Wissenschaft, pp. 61\u201382. Springer, Heidelberg (1997)","DOI":"10.1007\/978-3-642-60730-1_5"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Zhao, J., Ma, H.: Quality-assured design of on-line analytical processing systems using abstract state machines. In: Ehrich, H.-D., Schewe, K.-D. (eds.) Proceedings of the Fourth International Conference on Quality Software (QSIC 2004), Braunschweig, Germany, pp. 224\u2013231. IEEE Computer Society Press (2004)","DOI":"10.1109\/QSIC.2004.1357964"},{"key":"27_CR17","unstructured":"Zhao, J., Schewe, K.-D.: Using abstract state machines for distributed data warehouse design. In: Proceedings of the First Asian-Pacific conference on Conceptual Modelling-Volume 31, pp. 49\u201358. Australian Computer Society, Inc. (2004)"},{"key":"27_CR18","unstructured":"Zhao, J.Q.: Formal design of data warehouse and OLAP systems: a dissertation presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Systems at Massey University, Palmerston North, New Zealand (2007)"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201917-CISIS\u201917-ICEUTE\u201917 Le\u00f3n, Spain, September 6\u20138, 2017, Proceeding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67180-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:22:53Z","timestamp":1750810973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67180-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"ISBN":["9783319671796","9783319671802"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67180-2_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,8,23]]}}}