{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T22:24:21Z","timestamp":1748298261538},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540212003"},{"type":"electronic","value":"9783540247418"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24741-8_25","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T10:56:54Z","timestamp":1280746614000},"page":"422-440","source":"Crossref","is-referenced-by-count":21,"title":["Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns"],"prefix":"10.1007","author":[{"given":"Alan","family":"Nash","sequence":"first","affiliation":[]},{"given":"Bertram","family":"Lud\u00e4scher","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"Biomedical Informatics Research Network Coordinating Center (BIRNCC), University of California, San Diego (2003), \n                    \n                      http:\/\/nbirn.net\/"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Chandra, A.K., Merlin, P.M.: Optimal Implementation of Conjunctive Queries in Relational Data Bases. In: ACM Symposium on Theory of Computing (STOC), pp. 77\u201390 (1977)","DOI":"10.1145\/800105.803397"},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Database Theory - ICDT \u201997","author":"C. Chekuri","year":"1996","unstructured":"Chekuri, C., Rajaraman, A.: Conjunctive query containment revisited. In: Afrati, F.N., Kolaitis, P.G. (eds.) ICDT 1997. LNCS, vol.\u00a01186, Springer, Heidelberg (1996)"},{"key":"25_CR4","unstructured":"Duschka, O.M., Levy, A.Y.: Recursive plans for information gathering. In: Proc. IJCAI, Nagoya, Japan (1997)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Florescu, D., Levy, A.Y., Manolescu, I., Suciu, D.: Query Optimization in the Presence of Limited Access Patterns. In: SIGMOD, pp. 311\u2013322 (1999)","DOI":"10.1145\/304181.304210"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Gupta, A., Lud\u00e4scher, B., Martone, M.: BIRN-M: A Semantic Mediator for Solving Real-World Neuroscience Problems. In: ACM Intl. Conference on Management of Data (SIGMOD) (2003) (system demonstration)","DOI":"10.1145\/872757.872869"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-44503-X_15","volume-title":"Database Theory - ICDT 2001","author":"C. Li","year":"2000","unstructured":"Li, C., Chang, E.Y.: On Answering Queries in the Presence of Limited Access Patterns. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol.\u00a01973, p. 219. Springer, Heidelberg (2000)"},{"key":"25_CR8","volume-title":"A Model-Based Mediator System for Scientific Data Management","author":"B. Lud\u00e4scher","year":"2003","unstructured":"Lud\u00e4scher, B., Gupta, A., Martone, M.E.: Bioinformatics: Managing Scientific Data. In: Critchlow, T., Lacroix, Z. (eds.) A Model-Based Mediator System for Scientific Data Management, Morgan Kaufmann, San Francisco (2003)"},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s00778-002-0085-6","volume":"12","author":"C. Li","year":"2003","unstructured":"Li, C.: Computing Complete Answers to Queries in the Presence of Limited Access Patterns. Journal of VLDB\u00a012, 211\u2013227 (2003)","journal-title":"Journal of VLDB"},{"key":"25_CR10","unstructured":"Levy, A.Y., Sagiv, Y.: Queries Independent of Updates. In: Proc. VLDB, pp. 171\u2013181 (1993)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Nash, A., Lud\u00e4scher, B.: Processing First-Order Queries under Limited Access Patterns (2004) (submitted for publication)","DOI":"10.1145\/1055558.1055601"},{"issue":"1","key":"25_CR12","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1023\/A:1008646830769","volume":"6","author":"Y. Papakonstantinou","year":"1998","unstructured":"Papakonstantinou, Y., Gupta, A., Haas, L.M.: Capabilities-Based Query Rewriting in Mediator Systems. Distributed and Parallel Databases\u00a06(1), 73\u2013110 (1998)","journal-title":"Distributed and Parallel Databases"},{"key":"25_CR13","unstructured":"Saraiya, Y.: Subtree elimination algorithms in deductive databases. PhD thesis, Computer Science Dept., Stanford University (1991)"},{"key":"25_CR14","unstructured":"Scientific Data Management Center (SDM) (2003), \n                    \n                      http:\/\/sdm.lbl.gov\/sdmcenter\/\n                    \n                    \n                   and \n                    \n                      http:\/\/www.er.doe.gov\/scidac\/"},{"key":"25_CR15","unstructured":"Science Environment for Ecological Knowledge (SEEK) (2003), \n                    \n                      http:\/\/seek.ecoinformatics.org\/"},{"issue":"4","key":"25_CR16","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1145\/322217.322221","volume":"27","author":"Y. Sagiv","year":"1980","unstructured":"Sagiv, Y., Yannakakis, M.: Equivalences Among Relational Expressions with the Union and Difference Operators. Journal of the ACM\u00a027(4), 633\u2013655 (1980)","journal-title":"Journal of the ACM"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Ullman, J.: The Complexity of Ordering Subgoals. In: ACM Symposium on Principles of Database Systems (PODS) (1988)","DOI":"10.1145\/308386.308417"},{"key":"25_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/3-540-36285-1_23","volume-title":"Database Theory - ICDT 2003","author":"F. Wei","year":"2002","unstructured":"Wei, F., Lausen, G.: Containment of Conjunctive Queries with Safe Negation. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol.\u00a02572, pp. 343\u2013357. Springer, Heidelberg (2002)"},{"key":"25_CR19","unstructured":"Web Services Description Language (WSDL) Version 1.2 (June 2003), \n                    \n                      http:\/\/www.w3.org\/TR\/wsdl12"}],"container-title":["Lecture Notes in Computer Science","Advances in Database Technology - EDBT 2004"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24741-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T16:55:47Z","timestamp":1558284947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24741-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540212003","9783540247418"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24741-8_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}