{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:46Z","timestamp":1750307326385,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,13]],"date-time":"2011-06-13T00:00:00Z","timestamp":1307923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,13]]},"DOI":"10.1145\/1989284.1989286","type":"proceedings-article","created":{"date-parts":[[2011,6,14]],"date-time":"2011-06-14T14:45:32Z","timestamp":1308062732000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["A quest for beauty and wealth (or, business processes for database researchers)"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Deutch","sequence":"first","affiliation":[{"name":"Ben Gurion University, Beer Sheva, Israel"}]},{"given":"Tova","family":"Milo","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]}],"member":"320","published-online":{"date-parts":[[2011,6,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIME.2009.9"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1938551.1938564"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/551350"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620585.1620590"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275507"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855795.1855803"},{"key":"e_1_3_2_2_7_1","unstructured":"Active XML. http:\/\/activexml.net\/.  Active XML. http:\/\/activexml.net\/."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1075382.1075387"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807244"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1325851.1325921"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/646254.684264"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920939"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/291167"},{"key":"e_1_3_2_2_14_1","unstructured":"Business Process Execution Language for Web Services. http:\/\/www.ibm.com\/developerworks\/library\/ws-bpel\/.  Business Process Execution Language for Web Services. http:\/\/www.ibm.com\/developerworks\/library\/ws-bpel\/."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/322374.322380"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.1"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1412331.1412340"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11965893_15"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/645504.656274"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(92)90017-A"},{"key":"e_1_3_2_2_21_1","volume-title":"Model checking for context-free processes","author":"Burkart O.","year":"1992","unstructured":"O. Burkart and B. Steffen . Model checking for context-free processes , 1992 . O. Burkart and B. Steffen. Model checking for context-free processes, 1992."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/599829"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639950.1640064"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89652-4_63"},{"issue":"3","key":"e_1_3_2_2_25_1","first-page":"3","article-title":"A data-centric approach to modeling business operations and processes","volume":"32","author":"Cohn David","year":"2009","unstructured":"David Cohn and Richard Hull . Business artifacts : A data-centric approach to modeling business operations and processes . IEEE Data Eng. Bull. , 32 ( 3 ): 3 -- 9 , 2009 . David Cohn and Richard Hull. Business artifacts: A data-centric approach to modeling business operations and processes. IEEE Data Eng. Bull., 32(3):3--9, 2009.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30550-7_1"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1833398.1833401"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453898"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.199"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514894.1514923"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920960"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066219"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066219"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142351.1142364"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055571"},{"key":"e_1_3_2_2_36_1","volume-title":"Embedded Systems Programming","author":"Douglass Bruce Powel","year":"1999","unstructured":"Bruce Powel Douglass . Uml statecharts . Embedded Systems Programming , 1999 . Bruce Powel Douglass. Uml statecharts. Embedded Systems Programming, 1999."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/114891.114907"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_17"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1462153.1462154"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376916.1376954"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376916.1376954"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514894.1514922"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/11538394_12"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1325851.1325929"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265535"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2003.10.007"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90035-9"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/574901"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453936"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083784.1083807"},{"key":"e_1_3_2_2_51_1","volume-title":"CIDR","author":"Ikeda Robert","year":"2011","unstructured":"Robert Ikeda , Hyunjung Park , and Jennifer Widom . Provenance for generalized map and reduce workflows . In CIDR , 2011 . Robert Ikeda, Hyunjung Park, and Jennifer Widom. Provenance for generalized map and reduce workflows. In CIDR, 2011."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/647559.730195"},{"key":"e_1_3_2_2_53_1","volume-title":"Model checking probabilistic pushdown automata. Logical Methods in Computer Science, 2(1)","author":"Kucera Anton\u0131n","year":"2006","unstructured":"Anton\u0131n Kucera , Javier Esparza , and Richard Mayr . Model checking probabilistic pushdown automata. Logical Methods in Computer Science, 2(1) , 2006 . Anton\u0131n Kucera, Javier Esparza, and Richard Mayr. Model checking probabilistic pushdown automata. Logical Methods in Computer Science, 2(1), 2006."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/0885-2308(90)90022-X"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/128869"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2007.10.013"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3267-7"},{"key":"e_1_3_2_2_58_1","volume-title":"Proceedings of the IEEE, 77(4)","author":"Murata T.","year":"1989","unstructured":"T. Murata . Petri nets : Properties, analysis and applications . Proceedings of the IEEE, 77(4) , 1989 . T. Murata. Petri nets: Properties, analysis and applications. Proceedings of the IEEE, 77(4), 1989."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/552315.791136"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/321679.321682"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287445"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081903"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.169"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(02)00029-6"},{"key":"e_1_3_2_2_65_1","volume-title":"Temporal databases: theory, design, and implementation","author":"Tansel Abdullah Uz","year":"1993","unstructured":"Abdullah Uz Tansel , James Clifford , Shashi Gadia , Sushil Jajodia , Arie Segev , and Richard Snodgrass , editors. Temporal databases: theory, design, and implementation . Benjamin-Cummings Publishing Co., Inc. , 1993 . Abdullah Uz Tansel, James Clifford, Shashi Gadia, Sushil Jajodia, Arie Segev, and Richard Snodgrass, editors. Temporal databases: theory, design, and implementation. Benjamin-Cummings Publishing Co., Inc., 1993."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(03)00066-1"},{"issue":"4","key":"e_1_3_2_2_67_1","first-page":"29","article-title":"Recording provenance for sql queries and updates","volume":"30","author":"Vansummeren Stijn","year":"2007","unstructured":"Stijn Vansummeren and James Cheney . Recording provenance for sql queries and updates . IEEE Data Eng. Bull. , 30 ( 4 ): 29 -- 37 , 2007 . Stijn Vansummeren and James Cheney. Recording provenance for sql queries and updates. IEEE Data Eng. Bull., 30(4):29--37, 2007.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514894.1514896"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/1325851.1325922"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242619"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807234"}],"event":{"name":"SIGMOD\/PODS '11: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Athens Greece","acronym":"SIGMOD\/PODS '11"},"container-title":["Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1989284.1989286","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1989284.1989286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:01Z","timestamp":1750244761000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1989284.1989286"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,13]]},"references-count":71,"alternative-id":["10.1145\/1989284.1989286","10.1145\/1989284"],"URL":"https:\/\/doi.org\/10.1145\/1989284.1989286","relation":{},"subject":[],"published":{"date-parts":[[2011,6,13]]},"assertion":[{"value":"2011-06-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}