{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:35:22Z","timestamp":1725672922638},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642290374"},{"type":"electronic","value":"9783642290381"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29038-1_22","type":"book-chapter","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T07:57:38Z","timestamp":1333612658000},"page":"288-302","source":"Crossref","is-referenced-by-count":2,"title":["On the Decidability and Complexity of Identity Knowledge Representation"],"prefix":"10.1007","author":[{"given":"Klaus-Dieter","family":"Schewe","sequence":"first","affiliation":[]},{"given":"Qing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Credit where credit is due. Nature\u00a0462(7275), 825 (2009)","DOI":"10.1038\/462825a"},{"key":"22_CR2","unstructured":"Fischer Identity as a Service. Architecture Overview for Client Organizations. White paper, Fischer International Identity (2009)"},{"key":"22_CR3","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley (1995)"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1137\/0208017","volume":"8","author":"A. Aho","year":"1979","unstructured":"Aho, A., Sagiv, Y., Ullman, J.: Equivalences among relational expressions. SIAM Journal on Computing\u00a08, 218 (1979)","journal-title":"SIAM Journal on Computing"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Aho, A.V., Ullman, J.D.: Universality of data retrieval languages. In: Proceedings of Principles of Programming Languages, pp. 110\u2013119. ACM (1979)","DOI":"10.1145\/567752.567763"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Arasu, A., Chaudhuri, S., Kaushik, R.: Transformation-based framework for record matching. In: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, pp. 40\u201349. IEEE Computer Society (2008)","DOI":"10.1109\/ICDE.2008.4497412"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Arasu, A., Kaushik, R.: A grammar-based entity representation framework for data cleaning. In: Proceedings of the 35th SIGMOD International Conference on Management of Data, SIGMOD 2009, pp. 233\u2013244. ACM (2009)","DOI":"10.1145\/1559845.1559871"},{"key":"22_CR8","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-48317-9_2","volume-title":"Artificial Intelligence Today","author":"F. Baader","year":"1999","unstructured":"Baader, F.: Logic-Based Knowledge Representation. In: Veloso, M.M., Wooldridge, M.J. (eds.) Artificial Intelligence Today. LNCS (LNAI), vol.\u00a01600, pp. 13\u201341. Springer, Heidelberg (1999)"},{"key":"22_CR9","unstructured":"Bhattacharya, I., Getoor, L.: Deduplication and group detection using links. In: Proceedings of the 2004 ACM SIGKDD Workshop on Link Analysis and Group Detection (2004)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Bhattacharya, I., Getoor, L.: Iterative record linkage for cleaning and integration. In: Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, DMKD 2004, pp. 11\u201318. ACM (2004)","DOI":"10.1145\/1008694.1008697"},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.tcs.2004.10.031","volume":"336","author":"D. Calvanese","year":"2005","unstructured":"Calvanese, D., De Giacomo, G., Vardi, M.Y.: Decidable containment of recursive queries. Theor. Comput. Sci.\u00a0336, 33\u201356 (2005)","journal-title":"Theor. Comput. Sci."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Chandra, A.K., Merlin, P.M.: Optimal implementation of conjunctive queries in relational data bases. In: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, STOC 1977, pp. 77\u201390. ACM (1977)","DOI":"10.1145\/800105.803397"},{"key":"22_CR13","unstructured":"Donini, F., Lenzerini, M., Nardi, D., Schaerf, A.: Reasoning in description logics. Principles of Knowledge Representation, 191\u2013236 (1996)"},{"issue":"328","key":"22_CR14","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.2307\/2286061","volume":"64","author":"I. Fellegi","year":"1969","unstructured":"Fellegi, I., Sunter, A.: A theory for record linkage. Journal of the American Statistical Association\u00a064(328), 1183\u20131210 (1969)","journal-title":"Journal of the American Statistical Association"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1145\/42267.42273","volume":"35","author":"A. Klug","year":"1988","unstructured":"Klug, A.: On conjunctive queries containing inequalities. J. ACM\u00a035, 146\u2013160 (1988)","journal-title":"J. ACM"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11965893_28","volume-title":"Database Theory \u2013 ICDT 2007","author":"M. Lecl\u00e8re","year":"2006","unstructured":"Lecl\u00e8re, M., Mugnier, M.-L.: Some Algorithmic Improvements for the Containment Problem of Conjunctive Queries with Negation. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, vol.\u00a04353, pp. 404\u2013418. Springer, Heidelberg (2006)"},{"key":"22_CR17","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/S0004-3702(98)00021-6","volume":"101","author":"A.Y. Levy","year":"1998","unstructured":"Levy, A.Y., Rousset, M.-C.: Verification of knowledge bases based on containment checking. Artif. Intell.\u00a0101, 227\u2013250 (1998)","journal-title":"Artif. Intell."},{"key":"22_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-540-24741-8_25","volume-title":"Advances in Database Technology - EDBT 2004","author":"A. Nash","year":"2004","unstructured":"Nash, A., Lud\u00e4scher, B.: Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K. (eds.) EDBT 2004. LNCS, vol.\u00a02992, pp. 422\u2013440. Springer, Heidelberg (2004)"},{"issue":"3381","key":"22_CR19","doi-asserted-by":"publisher","first-page":"954","DOI":"10.1126\/science.130.3381.954","volume":"130","author":"H. Newcombe","year":"1959","unstructured":"Newcombe, H., Kennedy, J., Axford, S., James, A.: Automatic linkage of vital records. Science\u00a0130(3381), 954\u2013959 (1959)","journal-title":"Science"},{"key":"22_CR20","unstructured":"Pasula, H., Marthi, B., Milch, B., Russell, S., Shpitser, I.: Identity uncertainty and citation matching. In: NIPS. MIT Press (2003)"},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1145\/322217.322221","volume":"27","author":"Y. Sagiv","year":"1980","unstructured":"Sagiv, Y., Yannakakis, M.: Equivalences among relational expressions with the union and difference operators. Journal of the ACM\u00a027, 633\u2013655 (1980)","journal-title":"Journal of the ACM"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Sarawagi, S., Bhamidipaty, A.: Interactive deduplication using active learning. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2002, pp. 269\u2013278. ACM (2002)","DOI":"10.1145\/775085.775087"},{"key":"22_CR23","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/0743-1066(93)90040-N","volume":"15","author":"O. Shmueli","year":"1993","unstructured":"Shmueli, O.: Equivalence of datalog queries is undecidable. J. Log. Program.\u00a015, 231\u2013241 (1993)","journal-title":"J. Log. Program."},{"key":"22_CR24","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/11564126_31","volume-title":"Knowledge Discovery in Databases: PKDD 2005","author":"P. Singla","year":"2005","unstructured":"Singla, P., Domingos, P.: Object Identification with Attribute-Mediated Dependences. In: Jorge, A.M., Torgo, L., Brazdil, P.B., Camacho, R., Gama, J. (eds.) PKDD 2005. LNCS (LNAI), vol.\u00a03721, pp. 297\u2013308. Springer, Heidelberg (2005)"},{"key":"22_CR25","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1016\/S0306-4379(01)00042-4","volume":"26","author":"S. Tejada","year":"2001","unstructured":"Tejada, S., Knoblock, C.A., Minton, S.: Learning object identification rules for information integration. Information Systems\u00a026 (2001)","journal-title":"Information Systems"},{"key":"22_CR26","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/S0304-3975(99)00219-4","volume":"239","author":"J.D. Ullman","year":"2000","unstructured":"Ullman, J.D.: Information integration using logical views. Theor. Comput. Sci.\u00a0239, 189\u2013210 (2000)","journal-title":"Theor. Comput. Sci."},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Vardi, M.: The complexity of relational query languages. In: Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, pp. 137\u2013146. ACM (1982)","DOI":"10.1145\/800070.802186"},{"key":"22_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/3-540-36285-1_23","volume-title":"Database Theory - ICDT 2003","author":"F. Wei","year":"2002","unstructured":"Wei, F., Lausen, G.: Containment of Conjunctive Queries with Safe Negation. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol.\u00a02572, pp. 346\u2013360. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29038-1_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:19:46Z","timestamp":1620127186000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29038-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642290374","9783642290381"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29038-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}