{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:45:10Z","timestamp":1725536710866},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642037290"},{"type":"electronic","value":"9783642037306"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03730-6_27","type":"book-chapter","created":{"date-parts":[[2009,8,27]],"date-time":"2009-08-27T02:41:58Z","timestamp":1251340918000},"page":"339-353","source":"Crossref","is-referenced-by-count":1,"title":["Mining Violations to Relax Relational Database Constraints"],"prefix":"10.1007","author":[{"given":"Mirjana","family":"Mazuran","sequence":"first","affiliation":[]},{"given":"Elisa","family":"Quintarelli","sequence":"additional","affiliation":[]},{"given":"Rosalba","family":"Rossato","sequence":"additional","affiliation":[]},{"given":"Letizia","family":"Tanca","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Abe, N., Zadrozny, B., Langford, J.: Outlier detection by active learning. In: Proceedings of Int. Conf. on Knowledge Discovery and Data Mining (KDD 2006), pp. 504\u2013509 (2006)","DOI":"10.1145\/1150402.1150459"},{"key":"27_CR2","first-page":"487","volume-title":"Proceedings of the 20th Int. Conf. on Very Large Data Bases (VLDB 1994)","author":"R. Agrawal","year":"1994","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: Proceedings of the 20th Int. Conf. on Very Large Data Bases (VLDB 1994), pp. 487\u2013499. Morgan Kaufmann Publishers Inc, San Francisco (1994)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Angiulli, F., Greco, G., Palopoli, L.: Outlier detection by logic programming. ACM Transaction on Computational Logic (to appear)(2006)","DOI":"10.1145\/1297658.1297665"},{"issue":"2","key":"27_CR4","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TKDE.2005.31","volume":"17","author":"F. Angiulli","year":"2005","unstructured":"Angiulli, F., Pizzuti, C.: Outlier mining in large high dimensional datasets. IEEE Transactions on Knowledge and Data Engineering\u00a017(2), 203\u2013215 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Apiletti, D., Bruno, G., Ficarra, E., Baralis, E.: Data Cleaning and Semantic Improvement in Biological Databases. Journal of Integrative Bioinformatics, 3(2) (2006)","DOI":"10.1515\/jib-2006-40"},{"key":"27_CR6","first-page":"43","volume-title":"Logics for Emerging Applications of Databases","author":"L.E. Bertossi","year":"2003","unstructured":"Bertossi, L.E., Chomicki, J.: Query answering in inconsistent databases. In: Chomicki, J., van der Meyden, R., Saake, G. (eds.) Logics for Emerging Applications of Databases, pp. 43\u201383. Springer, Heidelberg (2003)"},{"issue":"4","key":"27_CR7","first-page":"191","volume":"5","author":"G. Bruno","year":"2007","unstructured":"Bruno, G., Garza, P., Quintarelli, E., Rossato, R.: Anomaly detection through quasi-functional dependency analysis. Special Issue of Journal of Digital Information Management Advances in Querying Non-Conventional Data Sources\u00a05(4), 191\u2013200 (2007)","journal-title":"Special Issue of Journal of Digital Information Management Advances in Querying Non-Conventional Data Sources"},{"issue":"1","key":"27_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1206049.1206055","volume":"32","author":"S. Ceri","year":"2007","unstructured":"Ceri, S., Giunta, F.D., Lanzi, P.: Mining Constraint Violations. ACM Transactions on Database Systems\u00a032(1), 1\u201332 (2007)","journal-title":"ACM Transactions on Database Systems"},{"key":"27_CR9","first-page":"566","volume-title":"Proceedings of the 16th Int. Conf. on Very Large Data Bases","author":"S. Ceri","year":"1990","unstructured":"Ceri, S., Widom, J.: Deriving production rules for constraint maintainance. In: Proceedings of the 16th Int. Conf. on Very Large Data Bases, pp. 566\u2013577. Morgan Kaufmann, San Francisco (1990)"},{"key":"27_CR10","series-title":"Lecture Notes in Computer Science","first-page":"527","volume-title":"Database and Expert Systems Applications","author":"J. Chomicki","year":"2006","unstructured":"Chomicki, J.: Consistent query answering: Opportunities and limitations. In: Bressan, S., K\u00fcng, J., Wagner, R. (eds.) DEXA 2006. LNCS, vol.\u00a04080, pp. 527\u2013531. Springer, Heidelberg (2006)"},{"key":"27_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11965893_1","volume-title":"Database Theory \u2013 ICDT 2007","author":"J. Chomicki","year":"2006","unstructured":"Chomicki, J.: Consistent query answering: Five easy pieces. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, vol.\u00a04353, pp. 1\u201317. Springer, Heidelberg (2006)"},{"issue":"1-2","key":"27_CR12","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.ic.2004.04.007","volume":"197","author":"J. Chomicki","year":"2005","unstructured":"Chomicki, J., Marcinkowski, J.: Minimal-change integrity maintenance using tuple deletions. Information and Computation\u00a0197(1-2), 90\u2013121 (2005)","journal-title":"Information and Computation"},{"issue":"3","key":"27_CR13","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/234426.234427","volume":"5","author":"G. Cugola","year":"1996","unstructured":"Cugola, G., Nitto, E.D., Fuggetta, A., Ghezzi, C.: A framework for formalizing inconsistencies and deviations in human-centered systems. ACM Trans. Softw. Eng. Methodol.\u00a05(3), 191\u2013230 (1996)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"27_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/11581062_14","volume-title":"Web Information Systems Engineering \u2013 WISE 2005","author":"S. Flesca","year":"2005","unstructured":"Flesca, S., Furfaro, F., Greco, S., Zumpano, E.: Querying and repairing inconsistent xml data. In: Ngu, A.H.H., Kitsuregawa, M., Neuhold, E.J., Chung, J.-Y., Sheng, Q.Z. (eds.) WISE 2005. LNCS, vol.\u00a03806, pp. 175\u2013188. Springer, Heidelberg (2005)"},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/11601524_18","volume-title":"Database Programming Languages","author":"S. Flesca","year":"2005","unstructured":"Flesca, S., Furfaro, F., Parisi, F.: Consistent query answers on numerical databases under aggregate constraints. In: Bierman, G., Koch, C. (eds.) DBPL 2005. LNCS, vol.\u00a03774, pp. 279\u2013294. Springer, Heidelberg (2005)"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Greco, S., Sirangelo, C., Trubitsyna, I., Zumpano, E.: Preferred repairs for inconsistent databases. In: Proceedings of Int. Conf. on Database and Expert System Application, pp. 44\u201355 (2004)","DOI":"10.1007\/978-3-540-30075-5_5"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Kanellakis, P.C.: Elements of relational database theory. In: Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B), pp. 1073\u20131156. Brown University (1990)","DOI":"10.1016\/B978-0-444-88074-1.50022-6"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Mazuran, M., Quintarelli, E., Rossato, R., Tanca, L.: Mining violations to relax relational database constraints. Technical report, Politecnico di Milano (2009), http:\/\/home.dei.polimi.it\/quintare\/Papers\/MQT09Constraint-RR.pdf","DOI":"10.1007\/978-3-642-03730-6_27"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Murata, T., Borgida, A.: Handling of irregularities in human centered systems: A unified framework for data and processes. IEEE Transaction on Software Engineering\u00a026(10) (2000)","DOI":"10.1109\/32.879819"},{"key":"27_CR20","volume-title":"EDBT Workshops (IIDB)","author":"S. Staworko","year":"2006","unstructured":"Staworko, S., Chomicki, J., Marcinkowski, J.: Priority-based conflict resolution in inconsistent relational databases. In: EDBT Workshops (IIDB). Springer, Heidelberg (2006)"},{"key":"27_CR21","unstructured":"TPC-H. The TPC benchmark H. Transaction Processing Performance Council (2005), http:\/\/www.tpc.org\/tpch\/default.asp"}],"container-title":["Lecture Notes in Computer Science","Data Warehousing and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03730-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T02:13:33Z","timestamp":1558491213000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03730-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642037290","9783642037306"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03730-6_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}