{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T02:42:18Z","timestamp":1648521738760},"reference-count":35,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1998,5,1]],"date-time":"1998-05-01T00:00:00Z","timestamp":893980800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data &amp; Knowledge Engineering"],"published-print":{"date-parts":[[1998,5]]},"DOI":"10.1016\/s0169-023x(97)00028-1","type":"journal-article","created":{"date-parts":[[2003,4,5]],"date-time":"2003-04-05T00:18:15Z","timestamp":1049501895000},"page":"37-70","source":"Crossref","is-referenced-by-count":4,"title":["Updating intensional predicates in deductive databases"],"prefix":"10.1016","volume":"26","author":[{"given":"D.","family":"Laurent","sequence":"first","affiliation":[]},{"given":"V.","family":"Phan Luong","sequence":"additional","affiliation":[]},{"given":"N.","family":"Spyratos","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0169-023X(97)00028-1_BIB1","series-title":"Second International Conference on Data Base Theory","article-title":"Updates, a new frontier","author":"Abiteboul","year":"1988"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB2","series-title":"ACM SIGACT-SIGMOD-SIGART, Symp. on Principles of Database System","article-title":"Transactions and integrity constraints","author":"Abiteboul","year":"1985"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB3","doi-asserted-by":"crossref","DOI":"10.1145\/76359.76363","article-title":"A transaction-based approach to relational database specification","volume":"36","author":"Abiteboul","year":"1989","journal-title":"J. of the ACM"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB4","series-title":"Foundations of deductive databases and logic programming","article-title":"Towards a theory of declarative knowledge","author":"Apt","year":"1988"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB5","series-title":"ACM SIGACT-SIGMOD-SIGART, Symp. on Principles of Database Systems","article-title":"Updating databases in the weak instance model","author":"Atzeni","year":"1989"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB6","series-title":"MFDBS'91 Int. Conf.","article-title":"Solving ambiguities in updating deductive databases","author":"Atzeni","year":"1991"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB7","series-title":"Readings in Database Systems","article-title":"An amateurs introduction to recursive query processing strategies","author":"Bancilhon","year":"1988"},{"issue":"4","key":"10.1016\/S0169-023X(97)00028-1_BIB8","doi-asserted-by":"crossref","DOI":"10.1145\/319628.319634","article-title":"Update semantics of relational views","volume":"6","author":"Bancilhon","year":"1981","journal-title":"ACM Transactions on Database Systems"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB9","article-title":"Bases de donn\u00e9es d\u00e9ductives: N\u00e9gation et logique des d\u00e9fauts","author":"Bidoit","year":"1989"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB10","doi-asserted-by":"crossref","DOI":"10.1016\/0304-3975(51)90003-5","article-title":"Negation in rule-based database languages: A survey","volume":"78","author":"Bidoit","year":"1991","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB11","series-title":"Bases de Donn\u00e9es D\u00e9ductives, Pr\u00e9sentation de Datalog","author":"Bidoit","year":"1992"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB12","doi-asserted-by":"crossref","DOI":"10.1016\/0304-3975(51)90004-7","article-title":"Negation by default and unstratifiable logic programs","volume":"78","author":"Bidoit","year":"1991","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB13","series-title":"ICDT Intl. Conf. on Database Theory","article-title":"Well: An evaluation procedure for all logic programs","author":"Bidoit","year":"1990"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB14","series-title":"EDBT Int. Conf.","article-title":"A uniform approach to constraint satisfaction and constraint specification in deductive databases","author":"Bry","year":"1988"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB15","series-title":"Intl. Symposium on Logic Programming","article-title":"Intensional updates: Abduction via deduction","author":"Bry","year":"1990"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB16","series-title":"Surveys in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-83952-8_1","article-title":"Logic programming and databases","author":"Ceri","year":"1990"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB17","article-title":"Mises \u00e0 Jour dans les bases de connaissances","author":"Cholvy","year":"1989","journal-title":"5e Journ\u00e9es Bases de Donn\u00e9es Avanc\u00e9es"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB18","series-title":"Intl. Symposium on Logic Programming","article-title":"Abduction compared with negation by failure","author":"Eshghi","year":"1989"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB19","series-title":"Proc. of ACM PODS","article-title":"On the semantics of updates in databases","author":"Fagin","year":"1983"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB20","series-title":"Proc. of ACM PODS","article-title":"Knowledgebase transformations","author":"Grahne","year":"1992"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB21","series-title":"LPNMR, Logic Programming and Nonmonotonic Reasoning","article-title":"Update rules in datalog programs","author":"Ferrari Alves","year":"1995"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB22","series-title":"16th Intl. Conf. on Very Large Databases VLDB","article-title":"Database updates through abduction","author":"Kakas","year":"1990"},{"issue":"2","key":"10.1016\/S0169-023X(97)00028-1_BIB23","doi-asserted-by":"crossref","DOI":"10.1109\/69.277774","article-title":"Updating in universal scheme interfaces","volume":"6","author":"Laurent","year":"1994","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB24","series-title":"International workshop on Logic in Databases, LID'96","article-title":"Learning query rules for optimizing databases with update rules","author":"Laurent","year":"1996"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB25","series-title":"IEEE International Conference on Data Engineering","article-title":"Deleted tuples are useful when updating through universal scheme interfaces","author":"Laurent","year":"1992"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB26","series-title":"DOOD Intl. Conf. on Deductive and Object-Oriented Databases","article-title":"Database updating revisited","author":"Laurent","year":"1993"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB27","series-title":"VLDB Int. Conf.","article-title":"Implementing queries and updates on universal scheme interfaces","author":"L\u00e9cluse","year":"1988"},{"issue":"2","key":"10.1016\/S0169-023X(97)00028-1_BIB28","doi-asserted-by":"crossref","DOI":"10.1145\/329.318580","article-title":"On the foundations of universal relation model","volume":"9","author":"Maier","year":"1984","journal-title":"ACM Transactions on Database Systems"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB29","doi-asserted-by":"crossref","DOI":"10.1016\/0004-3702(80)90014-4","article-title":"A logic for default reasoning","volume":"13","author":"Reiter","year":"1980","journal-title":"Artificial Intelligence"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB30","series-title":"EDBT Int. Conf.","article-title":"On formalizing database updates: preliminary report","author":"Reiter","year":"1992"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB31","series-title":"DOOD Intl. Conf. on Deductive and Object-Oriented Databases","article-title":"Updating deductive databases with functional dependencies","author":"Torlone","year":"1991"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB32","volume":"Vol. I","author":"Ullman","year":"1989"},{"issue":"3","key":"10.1016\/S0169-023X(97)00028-1_BIB33","doi-asserted-by":"crossref","DOI":"10.1145\/116825.116838","article-title":"The well-founded semantics for general logic programs","volume":"38","author":"Van Gelder","year":"1991","journal-title":"J. of the ACM"},{"key":"10.1016\/S0169-023X(97)00028-1_BIB34","article-title":"Apprentissage de r\u00e9gles et bases de donn\u00e9es d\u00e9ductives","author":"Vrain","journal-title":"11e Journ\u00e9es Bases de Donn\u00e9es Avanc\u00e9es (BDA)"},{"issue":"2","key":"10.1016\/S0169-023X(97)00028-1_BIB35","doi-asserted-by":"crossref","DOI":"10.1145\/42338.42386","article-title":"A model-based approach to updating databases with incomplete information","volume":"13","author":"Winslett","year":"1988","journal-title":"ACM Transactions on Database Systems"}],"container-title":["Data &amp; Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X97000281?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X97000281?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T01:56:57Z","timestamp":1555984617000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169023X97000281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,5]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1998,5]]}},"alternative-id":["S0169023X97000281"],"URL":"https:\/\/doi.org\/10.1016\/s0169-023x(97)00028-1","relation":{},"ISSN":["0169-023X"],"issn-type":[{"value":"0169-023X","type":"print"}],"subject":[],"published":{"date-parts":[[1998,5]]}}}