{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T12:07:23Z","timestamp":1747397243316},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540878766"},{"type":"electronic","value":"9783540878773"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-87877-3_24","type":"book-chapter","created":{"date-parts":[[2008,10,11]],"date-time":"2008-10-11T11:30:56Z","timestamp":1223724656000},"page":"326-340","source":"Crossref","is-referenced-by-count":16,"title":["Conjunctive Query Containment under Access Limitations"],"prefix":"10.1007","author":[{"given":"Andrea","family":"Cal\u00ec","sequence":"first","affiliation":[]},{"given":"Davide","family":"Martinenghi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","volume-title":"Foundations of Databases","author":"S. Abiteboul","year":"1995","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison Wesley Publ. Co., Reading (1995)"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-0-387-35614-3_17","volume-title":"Proc. of the IFIP WG8.1 Working Conference on Engineering Information Systems in the Internet Context (EISIC 2002)","author":"A. Cal\u00ec","year":"2002","unstructured":"Cal\u00ec, A., Calvanese, D.: Optimized querying of integrated data over the Web. In: Proc. of the IFIP WG8.1 Working Conference on Engineering Information Systems in the Internet Context (EISIC 2002), pp. 285\u2013301. Kluwer Academic Publisher, Dordrecht (2002)"},{"unstructured":"Cal\u00ec, A., Calvanese, D.: Containment of conjunctive queries under access limitations (extended abstract). In: Proc. of SEBD\u00a02006, pp. 131\u2013138 (2006)","key":"24_CR3"},{"key":"24_CR4","volume-title":"Proc. of the 2nd Workshop on Logical Aspects and Applications of Integrity Constraints (LAAIC 2006)","author":"A. Cal\u00ec","year":"2006","unstructured":"Cal\u00ec, A., Calvanese, D.: Optimising query answering in the presence of access limitations (position paper). In: Proc. of the 2nd Workshop on Logical Aspects and Applications of Integrity Constraints (LAAIC 2006). IEEE Computer Society, Los Alamitos (2006)"},{"unstructured":"Cal\u00ec, A., Calvanese, D., Martinenghi, D.: Optimization of query plans in the presence of access limitations. In: Arenas, M., Hidders, J. (eds.) EROW 2007 (ICDT workshop), Informal proceedings, pp. 33\u201347 (2007)","key":"24_CR5"},{"doi-asserted-by":"crossref","unstructured":"Chandra, A.K., Merlin, P.M.: Optimal implementation of conjunctive queries in relational data bases. In: Proc. of STOC 1977, pp. 77\u201390 (1977)","key":"24_CR6","DOI":"10.1145\/800105.803397"},{"issue":"1","key":"24_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1006\/jcss.1997.1452","volume":"54","author":"S. Chaudhuri","year":"1997","unstructured":"Chaudhuri, S., Vardi, M.Y.: On the equivalence of recursive and nonrecursive datalog programs. J. of Computer and System Sciences\u00a054(1), 61\u201378 (1997)","journal-title":"J. of Computer and System Sciences"},{"doi-asserted-by":"crossref","unstructured":"Cosmadakis, S.S., Gaifman, H., Kanellakis, P.C., Vardi, M.Y.: Decidable optimization problems for database logic programs. In: Proc. of STOC 1988, pp. 477\u2013490 (1988)","key":"24_CR8","DOI":"10.1145\/62212.62259"},{"doi-asserted-by":"crossref","unstructured":"Deutsch, A., Lud\u00e4scher, B., Nash, A.: Rewriting queries using views with access patterns under integrity constraints. In: Proc. of ICDT\u00a02005, pp. 352\u2013367 (2005)","key":"24_CR9","DOI":"10.1007\/978-3-540-30570-5_24"},{"unstructured":"Duschka, O.M., Levy, A.Y.: Recursive plans for information gathering. In: Proc. of IJCAI 1997, pp. 778\u2013784 (1997)","key":"24_CR10"},{"issue":"1","key":"24_CR11","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.tcs.2004.10.033","volume":"336","author":"R. Fagin","year":"2005","unstructured":"Fagin, R., Kolaitis, P.G., Miller, R.J., Popa, L.: Data exchange: Semantics and query answering. Theor. Comp. Sci.\u00a0336(1), 89\u2013124 (2005)","journal-title":"Theor. Comp. Sci."},{"doi-asserted-by":"crossref","unstructured":"Florescu, D., Levy, A.Y., Manolescu, I., Suciu, D.: Query optimization in the presence of limited access patterns. In: Proc. of ACM SIGMOD, pp. 311\u2013322 (1999)","key":"24_CR12","DOI":"10.1145\/304182.304210"},{"issue":"4","key":"24_CR13","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/s007780100054","volume":"10","author":"A.Y. Halevy","year":"2001","unstructured":"Halevy, A.Y.: Answering queries using views: A survey. VLDB Journal\u00a010(4), 270\u2013294 (2001)","journal-title":"VLDB Journal"},{"doi-asserted-by":"crossref","unstructured":"Hull, R.: Managing semantic heterogeneity in databases: A theoretical perspective. In: Proc. of PODS 1997, pp. 51\u201361 (1997)","key":"24_CR14","DOI":"10.1145\/263661.263668"},{"issue":"1","key":"24_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/0022-0000(84)90081-3","volume":"28","author":"D.S. Johnson","year":"1984","unstructured":"Johnson, D.S., Klug, A.C.: Testing containment of conjunctive queries under functional and inclusion dependencies. J. of Computer and System Sciences\u00a028(1), 167\u2013189 (1984)","journal-title":"J. of Computer and System Sciences"},{"issue":"3","key":"24_CR16","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s00778-002-0085-6","volume":"12","author":"C. Li","year":"2003","unstructured":"Li, C.: Computing complete answers to queries in the presence of limited access patterns. VLDB Journal\u00a012(3), 211\u2013227 (2003)","journal-title":"VLDB Journal"},{"doi-asserted-by":"crossref","unstructured":"Li, C., Chang, E.: Query planning with limited source capabilities. In: Proc. of ICDE\u00a02000, pp. 401\u2013412 (2000)","key":"24_CR17","DOI":"10.1109\/ICDE.2000.839440"},{"issue":"3","key":"24_CR18","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1145\/502030.502032","volume":"26","author":"C. Li","year":"2001","unstructured":"Li, C., Chang, E.: Answering queries with useful bindings. ACM Trans. on Database Systems\u00a026(3), 313\u2013343 (2001)","journal-title":"ACM Trans. on Database Systems"},{"key":"24_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-44503-X_15","volume-title":"Database Theory - ICDT 2001","author":"C. Li","year":"2000","unstructured":"Li, C., Chang, E.: On answering queries in the presence of limited access patterns. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol.\u00a01973, pp. 219\u2013233. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Lud\u00e4scher, B., Nash, A.: Processing first-order queries under limited access patterns. In: Proc. of PODS\u00a02004, pp. 307\u2013318 (2004)","key":"24_CR20","DOI":"10.1145\/1055558.1055601"},{"key":"24_CR21","series-title":"Lecture Notes in Computer Science","first-page":"422","volume-title":"Current Trends in Database Technology - EDBT 2004 Workshops","author":"B. Lud\u00e4scher","year":"2004","unstructured":"Lud\u00e4scher, B., Nash, A.: Processing union of conjunctive queries with negation under limited access patterns. In: Lindner, W., Mesiti, M., T\u00fcrker, C., Tzitzikas, Y., Vakali, A.I. (eds.) EDBT 2004. LNCS, vol.\u00a03268, pp. 422\u2013440. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Millstein, T.D., Levy, A.Y., Friedman, M.: Query containment for data integration systems. In: Proc. of PODS\u00a02000, pp. 67\u201375 (2000)","key":"24_CR22","DOI":"10.1145\/335168.335208"},{"doi-asserted-by":"crossref","unstructured":"Rajaraman, A., Sagiv, Y., Ullman, J.D.: Answering queries using templates with binding patterns. In: Proc. of PODS 1995 (1995)","key":"24_CR23","DOI":"10.1145\/212433.220199"},{"key":"24_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-62222-5_34","volume-title":"Database Theory - ICDT \u201997","author":"J.D. Ullman","year":"1996","unstructured":"Ullman, J.D.: Information integration using logical views. In: Afrati, F.N., Kolaitis, P.G. (eds.) ICDT 1997. LNCS, vol.\u00a01186, pp. 19\u201340. Springer, Heidelberg (1996)"},{"unstructured":"Yang, G., Kifer, M., Chaudhri, V.K.: Efficiently ordering subgoals with access constraints","key":"24_CR25"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling - ER 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87877-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T15:22:41Z","timestamp":1557847361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87877-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540878766","9783540878773"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87877-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}