{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:49Z","timestamp":1750306489627,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":9,"publisher":"ACM Press","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1145\/2817460.2817464","type":"proceedings-article","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T16:48:13Z","timestamp":1440607693000},"page":"11-14","source":"Crossref","is-referenced-by-count":0,"title":["Filtering SQL via the principles of pandemonium"],"prefix":"10.1145","author":[{"given":"John","family":"Lusth","sequence":"first","affiliation":[]},{"given":"Nenad","family":"Jukic","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"unstructured":"Selfridge, O., \"Pandemonium: A paradigm for learning\",Mechanisation of Thought Processes: I, pp. 511--526, 1959.","key":"key-10.1145\/2817460.2817464-1"},{"doi-asserted-by":"crossref","unstructured":"Smieja, F., \"The Pandemonium System of Reflective Agents\",IEEE Transactions on Neural Networks,7 (1), January 1996.","key":"key-10.1145\/2817460.2817464-2","DOI":"10.1109\/72.478395"},{"unstructured":"daemon, which is defined by Webster's as a \"tutelary deity or spirit\" does not have the evil connotation of demon and is used to denote an autonomous agent in the UNIX operating system. We find it an appropriate replacement.","key":"key-10.1145\/2817460.2817464-3"},{"unstructured":"Herein, we will use the termPandemoniumfor brevity instead of the more accurate, but awkward, phrasePandemonium-influenced.","key":"key-10.1145\/2817460.2817464-4"},{"doi-asserted-by":"crossref","unstructured":"Codd, E., \"A Relational Model for Large Shared Data Banks\",Communications of the ACM,13 (6), June 1970.","key":"key-10.1145\/2817460.2817464-5","DOI":"10.1145\/362384.362685"},{"unstructured":"Elmashri R. and B. S. Navathe,Fundamentals Of Database Systems, The Benjamin\/Cummings Publishing Company, Inc., 1994.","key":"key-10.1145\/2817460.2817464-6"},{"unstructured":"ANSI (1986), American National Standards Institute: The Database Language SQL,Document ANSI X3.133, 1986.","key":"key-10.1145\/2817460.2817464-7"},{"unstructured":"Hwang, K.,Advanced Computer Architecture, published by McGraw-Hill, pp. 265--321, 1993.","key":"key-10.1145\/2817460.2817464-8"},{"unstructured":"Johnson, S., \"Yet another compiler-compiler\",Bell Labs Technical ReportTM-75-1273-6, July 1975.","key":"key-10.1145\/2817460.2817464-9"}],"event":{"number":"35","acronym":"ACM-SE 35","name":"the 35th Annual Southeast Regional Conference","start":{"date-parts":[[1997,4,2]]},"location":"Murfreesboro, Tennessee","end":{"date-parts":[[1997,4,4]]}},"container-title":["Proceedings of the 35th Annual Southeast Regional Conference on - ACM-SE 35"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2817460.2817464","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2817464&amp;ftid=1616135&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:33Z","timestamp":1750225713000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2817460.2817464"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1145\/2817460.2817464","relation":{},"subject":[],"published":{"date-parts":[[1997]]}}}