{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:24:58Z","timestamp":1725733498595},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642396427"},{"type":"electronic","value":"9783642396434"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39643-4_39","type":"book-chapter","created":{"date-parts":[[2013,6,21]],"date-time":"2013-06-21T04:58:56Z","timestamp":1371790736000},"page":"543-558","source":"Crossref","is-referenced-by-count":3,"title":["Answers That Have Quality"],"prefix":"10.1007","author":[{"given":"Hendrik","family":"Decker","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley (1995)","key":"39_CR1"},{"issue":"3,4","key":"39_CR2","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/BF03037168","volume":"9","author":"K. Apt","year":"1991","unstructured":"Apt, K., Bezem, M.: Acyclic programs. New Generation Computing\u00a09(3,4), 335\u2013364 (1991)","journal-title":"New Generation Computing"},{"doi-asserted-by":"crossref","unstructured":"Arenas, M., Bertossi, L.E., Chomicki, J.: Consistent query answers in inconsistent databases. In: Proceedings of PODS, pp. 68\u201379. ACM Press (1999)","key":"39_CR3","DOI":"10.1145\/303976.303983"},{"issue":"3","key":"39_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541883","volume":"41","author":"C. Batini","year":"2009","unstructured":"Batini, C., Cappiello, C., Francalanci, C., Maurino, A.: Methodologies for Data Quality Assessment and Improvement. Comput. Surveys 41(3),16:1\u201316:52 (2009)","journal-title":"Comput. Surveys"},{"key":"39_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/11780991_2","volume-title":"Next Generation Information Technologies and Systems","author":"J. Berlin","year":"2006","unstructured":"Berlin, J., Motro, A.: Tuplerank: Ranking discovered content in virtual databases. In: Etzion, O., Kuflik, T., Motro, A. (eds.) NGITS 2006. LNCS, vol.\u00a04032, pp. 13\u201325. Springer, Heidelberg (2006)"},{"unstructured":"Borek, A., Woodall, P., Oberhofer, M., Parlikad, A.K.: A Classification of Data Quality Asessment Methods. In: Proc. 16th ICIQ, pp. 189\u2013203","key":"39_CR6"},{"unstructured":"Campbell, R., Zhang, L., Francis, L., Palenik, R., Popelyukhin, A., Scruton, G., Prevosto, V.: Survey of Data Management and Data Quality Texts. In: Proc. CAS Winter Forum, pp. 273\u2013306. Casualty Actuarial Society (2007)","key":"39_CR7"},{"issue":"3","key":"39_CR8","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/0743-1066(89)90020-4","volume":"7","author":"L. Cavedon","year":"1989","unstructured":"Cavedon, L., Lloyd, J.: A completeness theorem for SLDNF resolution. J. Log. Prog.\u00a07(3), 177\u2013191 (1989)","journal-title":"J. Log. Prog."},{"key":"39_CR9","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1613\/jair.1391","volume":"22","author":"H. Chockler","year":"2004","unstructured":"Chockler, H., Halpern, J.: Responsibility and blame: a structural-model approach. J. Artif. Intell. Res.\u00a022, 93\u2013115 (2004)","journal-title":"J. Artif. Intell. Res."},{"doi-asserted-by":"crossref","unstructured":"Clark, K.: Negation as failure. In: Gallaire, H., Minker, J. (eds.) Logic and Data Bases, pp. 293\u2013322. Plenum Press (1978)","key":"39_CR10","DOI":"10.1007\/978-1-4684-3384-5_11"},{"unstructured":"Cong, G., Fan, W., Geerts, F., Jia, X., Ma, S.: Improving Data Quality: Consistency and Accuracy. In: Proc. 33rd VLDB, pp. 315\u2013326. ACM (2007)","key":"39_CR11"},{"unstructured":"Date, C.: The Relational Database Dictionary, Extended edn. Springer (2008)","key":"39_CR12"},{"unstructured":"Date, C.: View Updating and Relational Theory. O\u2019Reilly (2012)","key":"39_CR13"},{"doi-asserted-by":"crossref","unstructured":"Decker, H.: The range form of databases and queries or: How to avoid floundering. In: Proc. 5th \u00d6GAI. Informatik-Fachberichte, vol.\u00a0208, pp. 114\u2013123. Springer (1989)","key":"39_CR14","DOI":"10.1007\/978-3-642-74688-8_13"},{"unstructured":"Decker, H.: On explanations in deductive databases. In: Proc. 3rd Workshop on Foundations of Models and Languages for Data and Objects, Informatik-Bericht 91\/3, pp. 173\u2013185. Inst. f. Informatik, Tech. Univ. Clausthal (1991)","key":"39_CR15"},{"doi-asserted-by":"crossref","unstructured":"Decker, H.: Basic causes for the inconsistency tolerance of query answering and integrity checking. In: Proc. 21st DEXA Workshops, pp. 318\u2013322. IEEE CSP (2010)","key":"39_CR16","DOI":"10.1109\/DEXA.2010.69"},{"key":"39_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1007\/978-3-642-16949-6_23","volume-title":"On the Move to Meaningful Internet Systems, OTM 2010","author":"H. Decker","year":"2010","unstructured":"Decker, H.: Toward a uniform cause-based approach to inconsistency-tolerant database semantics. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2010, Part II. LNCS, vol.\u00a06427, pp. 983\u2013998. Springer, Heidelberg (2010)"},{"key":"39_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/978-3-642-23441-5_4","volume-title":"SDKB 2010","author":"H. Decker","year":"2011","unstructured":"Decker, H.: Answers that have integrity. In: Schewe, K.-D., Thalheim, B. (eds.) SDKB 2010. LNCS, vol.\u00a06834, pp. 54\u201372. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Decker, H.: Causes for inconsistency-tolerant schema update management. In: Proc. 27th ICDE Workshops, pp. 157\u2013161. IEEE CSP (2011)","key":"39_CR19","DOI":"10.1109\/ICDEW.2011.5767628"},{"key":"39_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-21934-4_24","volume-title":"Computational Science and Its Applications - ICCSA 2011","author":"H. Decker","year":"2011","unstructured":"Decker, H.: Causes of the violation of integrity constraints for supporting the quality of databases. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2011, Part V. LNCS, vol.\u00a06786, pp. 283\u2013292. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Decker, H.: Data quality maintenance by integrity-preserving repairs that tolerate inconsistency. In: Proc. 11th QSIC, pp. 192\u2013197. IEEE CSP (2011)","key":"39_CR21","DOI":"10.1109\/QSIC.2011.34"},{"unstructured":"Decker, H.: Axiomatizing inconsistency metrics for integrity maintenance. In: Proc. 16th KES, pp. 1243\u20131252. IOS Press (2012)","key":"39_CR22"},{"key":"39_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-642-31128-4_13","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2012","author":"H. Decker","year":"2012","unstructured":"Decker, H.: New measures for maintaining the quality of databases. In: Murgante, B., Gervasi, O., Misra, S., Nedjah, N., Rocha, A.M.A.C., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2012, Part IV. LNCS, vol.\u00a07336, pp. 170\u2013185. Springer, Heidelberg (2012)"},{"key":"39_CR24","series-title":"LNBIP","first-page":"13","volume-title":"UNISCON 2012","author":"H. Decker","year":"2013","unstructured":"Decker, H.: Maintaining desirable properties of information by inconsistency-tolerant integrity management. In: Mayr, H.C., Kop, C., Liddle, S., Ginige, A. (eds.) UNISON 2012. LNBIP, vol.\u00a0137, pp. 13\u201324. Springer, Heidelberg (2013)"},{"key":"39_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-36008-4_7","volume-title":"Semantics in Data and Knowledge Bases","author":"H. Decker","year":"2013","unstructured":"Decker, H.: Measure-based inconsistency-tolerant maintenance of database integrity. In: Schewe, K.-D., Thalheim, B. (eds.) SDKB 2013. LNCS, vol.\u00a07693, pp. 149\u2013173. Springer, Heidelberg (2013)"},{"unstructured":"Decker, H.: Modeling, measuring and maintaining the quality of databases (to appear, 2013)","key":"39_CR26"},{"key":"39_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-642-04947-7_26","volume-title":"Advances in Conceptual Modeling - Challenging Perspectives","author":"H. Decker","year":"2009","unstructured":"Decker, H., Martinenghi, D.: Modeling, measuring and monitoring the quality of information. In: Heuser, C.A., Pernul, G. (eds.) ER 2009. LNCS, vol.\u00a05833, pp. 212\u2013221. Springer, Heidelberg (2009)"},{"unstructured":"Ehling, M., K\u00f6rner, T.: Handbook on Data Quality Assessment Methods and Tools. European Commission, Eurostat (2007)","key":"39_CR28"},{"doi-asserted-by":"crossref","unstructured":"Fan, W.: Dependencies revisited for improving data quality. In: Proc. 27th PODS, pp. 159\u2013170. ACM (2008)","key":"39_CR29","DOI":"10.1145\/1376916.1376940"},{"doi-asserted-by":"crossref","unstructured":"Gertz, M.: Managing Data Quality and Integrity in Federated Databases. In: Integrity and Internal Control in Information Systems. IFIP Conference Proceedings, vol.\u00a0136, pp. 211\u2013230. Kluwer (1998)","key":"39_CR30","DOI":"10.1007\/978-0-387-35396-8_11"},{"doi-asserted-by":"crossref","unstructured":"Godfrey, P., Grant, J., Gryz, J., Minker, J.: Integrity Constraints: Semantics and Applications. In: Logics for Databases and Information Systems. Engineering and Computer Science, vol.\u00a0436, pp. 265\u2013306. Springer (1998)","key":"39_CR31","DOI":"10.1007\/978-1-4615-5643-5_9"},{"unstructured":"Halpern, J.: Causality, responsibility, and blame: A structural-model approach. In: Proc. 3rd QEST, pp. 3\u20138. IEEE CSP (2006)","key":"39_CR32"},{"key":"39_CR33","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1093\/bjps\/axi147","volume":"56","author":"J. Halpern","year":"2005","unstructured":"Halpern, J., Pearl, J.: Causes and explanations: a structural-model approach, part i: Causes. Brit. J. Phil. Sci.\u00a056, 843\u2013887 (2005)","journal-title":"Brit. J. Phil. Sci."},{"unstructured":"Hinrichs, T., Kao, J., Genesereth, M.: Inconsistency-tolerant reasoning with classical logic and large databases. In: Proc. 8th SARA, pp. 105\u2013112. AAAI Publications (2009)","key":"39_CR34"},{"issue":"3\/4","key":"39_CR35","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1023\/A:1008923120973","volume":"7","author":"Typology of Database Quality Factors","year":"1998","unstructured":"Typology of Database Quality Factors. Software Quality Journal 7(3\/4), 179\u2013193 (1998)","journal-title":"Software Quality Journal"},{"issue":"3-4","key":"39_CR36","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/0004-3702(71)90012-9","volume":"2","author":"R. Kowalski","year":"1971","unstructured":"Kowalski, R., Kuehner, D.: Linear Resolution with Selection Function. Artificial Intelligence\u00a02(3-4), 227\u2013260 (1971)","journal-title":"Artificial Intelligence"},{"key":"39_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-642-29414-3_3","volume-title":"Logic Programs, Norms and Action","author":"R.A. Kowalski","year":"2012","unstructured":"Kowalski, R.A., Sadri, F.: Teleo-Reactive Abductive Logic Programs. In: Artikis, A., Craven, R., Kesim \u00c7i\u00e7ekli, N., Sadighi, B., Stathis, K. (eds.) Sergot Festschrift 2012. LNCS, vol.\u00a07360, pp. 12\u201332. Springer, Heidelberg (2012)"},{"unstructured":"Lifschitz, V.: What is answer set computing? In: Proc. 23rd AAAI, pp. 1594\u20131597 (2008)","key":"39_CR38"},{"doi-asserted-by":"crossref","unstructured":"LLoyd, J.: Foundations of Logic Programming, 2nd edn. Springer (1987)","key":"39_CR39","DOI":"10.1007\/978-3-642-83189-8"},{"doi-asserted-by":"crossref","unstructured":"Meliou, A., Gatterbauer, W., Moore, K., Suciu, D.: The complexity of causality and responsibility for query answers and non-answers. In: Proc. 37th VLDB, pp. 34\u201345 (2011)","key":"39_CR40","DOI":"10.14778\/1880172.1880176"},{"issue":"4","key":"39_CR41","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/505248.506010","volume":"45","author":"L. Pipino","year":"2002","unstructured":"Pipino, L., Lee, Y., Wang, R.: Data quality assessment. CACM\u00a045(4), 211\u2013218 (2002)","journal-title":"CACM"},{"doi-asserted-by":"crossref","unstructured":"Sidi, F., Panah, P., Affendey, L., Jabar, M., Ibrahim, H., Mustapha, A.: Data quality: A survey of data quality dimensions. In: Proc. CAMP 2012, pp. 300\u2013304. IEEE CSP (2012)","key":"39_CR42","DOI":"10.1109\/InfRKM.2012.6204995"},{"key":"39_CR43","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/0-387-31167-X_2","volume-title":"Security Management, Integrity, and Internal Control in Information Systems","author":"G. Tejay","year":"2006","unstructured":"Tejay, G., Dhillon, G., Chin, A.G.: Data Quality Dimensions for Information Systems Security: A Theoretical Exposition. In: Dowland, P., Furnell, S., Thuraisingham, B., Sean Wang, X. (eds.) Security Management, Integrity, and Internal Control in Information Systems. IFIP, vol.\u00a0193, pp. 21\u201339. Springer, Boston (2006)"},{"unstructured":"Wang, R., Kon, H., Madnick, S.: Data quality requirements analysis and modeling. In: Proc. 9th ICDE, pp. 670\u2013677. IEEE CSP (1993)","key":"39_CR44"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39643-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T13:06:22Z","timestamp":1557839182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39643-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642396427","9783642396434"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39643-4_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}