{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:18:44Z","timestamp":1755926324415,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T00:00:00Z","timestamp":1561420800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010663","name":"European Research Council","doi-asserted-by":"publisher","award":["804302"],"award-info":[{"award-number":["804302"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006245","name":"Ministry of Science and Technology, Israel","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006245","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,25]]},"DOI":"10.1145\/3299869.3300084","type":"proceedings-article","created":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T17:41:43Z","timestamp":1560879703000},"page":"537-554","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Hypothetical Reasoning via Provenance Abstraction"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Deutch","sequence":"first","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Yuval","family":"Moskovitch","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Noam","family":"Rinetzky","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]}],"member":"320","published-online":{"date-parts":[[2019,6,25]]},"reference":[{"unstructured":"Any python tree data. https:\/\/anytree.readthedocs.io\/en\/latest\/.  Any python tree data. https:\/\/anytree.readthedocs.io\/en\/latest\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"Tpc benchmark. http:\/\/www.tpc.org\/tpch\/.  Tpc benchmark. http:\/\/www.tpc.org\/tpch\/.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/2806416.2806429"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.14778\/2095686.2095693"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1989284.1989302"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/2983323.2983825"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/TKDE.2017.2769056"},{"key":"e_1_3_2_1_8_1","volume-title":"Algorithms for Provisioning Queries and Analytics. In (ICDT 2016","volume":"48","author":"Assadi S.","year":"2016","unstructured":"S. Assadi , S. Khanna , Y. Li , and V. Tannen . Algorithms for Provisioning Queries and Analytics. In (ICDT 2016 ), volume 48 , 2016 . S. Assadi, S. Khanna, Y. Li, and V. Tannen. Algorithms for Provisioning Queries and Analytics. In (ICDT 2016), volume 48, 2016."},{"key":"e_1_3_2_1_9_1","volume-title":"VLDB","author":"Balmin A.","year":"2000","unstructured":"A. Balmin , T. Papadimitriou , and Y. Papakonstantinou . Hypothetical queries in an OLAP environment . In VLDB , 2000 . A. Balmin, T. Papadimitriou, and Y. Papakonstantinou. Hypothetical queries in an OLAP environment. In VLDB, 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2396761.2398439"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/s00778-007-0080-z"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2806416.2806426"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/ICDE.2016.7498289"},{"key":"e_1_3_2_1_14_1","volume-title":"Extrapolation methods: theory and practice","author":"Brezinski C.","year":"2013","unstructured":"C. Brezinski and M. R. Zaglia . Extrapolation methods: theory and practice , volume 2 . Elsevier , 2013 . C. Brezinski and M. R. Zaglia. Extrapolation methods: theory and practice, volume 2. Elsevier, 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1412331.1412340"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1376616.1376715"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/3035918.3035926"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/3035918.3035921"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2643135.2643143"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1561\/1900000006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.14778\/2824032.2824039"},{"key":"e_1_3_2_1_22_1","volume-title":"CIDR","author":"Deutch D.","year":"2013","unstructured":"D. Deutch , Z. G. Ives , T. Milo , and V. Tannen . Caravan: Provisioning for what-if analysis . In CIDR , 2013 . D. Deutch, Z. G. Ives, T. Milo, and V. Tannen. Caravan: Provisioning for what-if analysis. In CIDR, 2013."},{"key":"e_1_3_2_1_23_1","volume-title":"ICDT","author":"Deutch D.","year":"2014","unstructured":"D. Deutch , T. Milo , S. Roy , and V. Tannen . Circuits for datalog provenance . In ICDT , 2014 . D. Deutch, T. Milo, S. Roy, and V. Tannen. Circuits for datalog provenance. In ICDT, 2014."},{"key":"e_1_3_2_1_24_1","volume-title":"EDBT","author":"Deutch D.","year":"2018","unstructured":"D. Deutch , Y. Moskovitch , I. Polak , and N. Rinetzky . Towards hypothetical reasoning using distributed provenance . In EDBT , 2018 . D. Deutch, Y. Moskovitch, I. Polak, and N. Rinetzky. Towards hypothetical reasoning using distributed provenance. In EDBT, 2018."},{"issue":"4","key":"e_1_3_2_1_25_1","volume":"24","author":"Deutch D.","year":"2015","unstructured":"D. Deutch , Y. Moskovitch , and V. Tannen . Provenance-based analysis of data-centric processes. VLDB J. , 24 ( 4 ), 2015 . D. Deutch, Y. Moskovitch, and V. Tannen. Provenance-based analysis of data-centric processes. VLDB J., 24(4), 2015.","journal-title":"Provenance-based analysis of data-centric processes. VLDB J."},{"key":"e_1_3_2_1_26_1","volume-title":"Aggregation in probabilistic databases via knowledge compilation. PVLDB, 5(5)","author":"Fink R.","year":"2012","unstructured":"R. Fink , L. Han , and D. Olteanu . Aggregation in probabilistic databases via knowledge compilation. PVLDB, 5(5) , 2012 . R. Fink, L. Han, and D. Olteanu. Aggregation in probabilistic databases via knowledge compilation. PVLDB, 5(5), 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/1376916.1376954"},{"key":"e_1_3_2_1_28_1","volume-title":"Computers and Intractability","author":"Garey M. R.","year":"1990","unstructured":"M. R. Garey and D. S. Johnson . Computers and Intractability ; A Guide to the Theory of NP-Completeness. W. H. Freeman & Co. , New York, NY, USA, 1990 . M. R. Garey and D. S. Johnson. Computers and Intractability; A Guide to the Theory of NP-Completeness. W. H. Freeman & Co., New York, NY, USA, 1990."},{"issue":"2","key":"e_1_3_2_1_29_1","volume":"8","author":"Geerts F.","year":"2010","unstructured":"F. Geerts and A. Poggi . On database query languages for k-relations. J. Applied Logic , 8 ( 2 ), 2010 . F. Geerts and A. Poggi. On database query languages for k-relations. J. Applied Logic, 8(2), 2010.","journal-title":"On database query languages for k-relations. J. Applied Logic"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/232753.232801"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1109\/ICDE.2009.15"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.14778\/1920841.1921003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1007\/978-3-642-41660-6_16"},{"key":"e_1_3_2_1_34_1","volume-title":"Tapp","author":"Glavic B.","year":"2013","unstructured":"B. Glavic , J. Siddique , P. Andritsos , and R. J. Miller . Provenance for data mining . In Tapp , 2013 . B. Glavic, J. Siddique, P. Andritsos, and R. J. Miller. Provenance for data mining. In Tapp, 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/1514894.1514930"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/1265530.1265535"},{"key":"e_1_3_2_1_37_1","volume-title":"CIDR","author":"Ikeda R.","year":"2011","unstructured":"R. Ikeda , H. Park , and J. Widom . Provenance for generalized map and reduce workflows . In CIDR , 2011 . R. Ikeda, H. Park, and J. Widom. Provenance for generalized map and reduce workflows. In CIDR, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.14778\/2850583.2850595"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1007\/978-3-642-40381-1_17"},{"key":"e_1_3_2_1_40_1","volume-title":"9th USENIX Workshop on the Theory and Practice of Provenance, TaPP","author":"Lee S.","year":"2017","unstructured":"S. Lee , X. Niu , B. Lud\"a scher, and B. Glavic . Integrating approximate summarization with provenance capture . In 9th USENIX Workshop on the Theory and Practice of Provenance, TaPP , 2017 . S. Lee, X. Niu, B. Lud\"a scher, and B. Glavic. Integrating approximate summarization with provenance capture. In 9th USENIX Workshop on the Theory and Practice of Provenance, TaPP, 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1016\/0304-3975(93)90224-H"},{"key":"e_1_3_2_1_42_1","volume-title":"Reverse data management. PVLDB, 4(12)","author":"Meliou A.","year":"2011","unstructured":"A. Meliou , W. Gatterbauer , and D. Suciu . Reverse data management. PVLDB, 4(12) , 2011 . A. Meliou, W. Gatterbauer, and D. Suciu. Reverse data management. PVLDB, 4(12), 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1145\/2213836.2213875"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/2274576.2274607"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.14778\/3402755.3402768"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.14778\/1453856.1453943"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1145\/2588555.2588578"},{"key":"e_1_3_2_1_48_1","volume-title":"Probabilistic Databases. Synthesis Lectures on Data Management","author":"Suciu D.","year":"2011","unstructured":"D. Suciu , D. Olteanu , C. R\u00e9 , and C. Koch . Probabilistic Databases. Synthesis Lectures on Data Management . Morgan & Claypool Publishers , 2011 . D. Suciu, D. Olteanu, C. R\u00e9, and C. Koch. Probabilistic Databases. Synthesis Lectures on Data Management. Morgan & Claypool Publishers, 2011."},{"unstructured":"Prov-overview w3c working group note. http:\/\/www.w3.org\/TR\/prov-overview\/ 2013.  Prov-overview w3c working group note. http:\/\/www.w3.org\/TR\/prov-overview\/ 2013.","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","volume-title":"Provenance analysis for missing answers and integrity repairs","author":"Xu J.","year":"2018","unstructured":"J. Xu , W. Zhang , A. Alawini , and V. Tannen . Provenance analysis for missing answers and integrity repairs . IEEE Data Eng. Bull ., 41(1), 2018 . J. Xu, W. Zhang, A. Alawini, and V. Tannen. Provenance analysis for missing answers and integrity repairs. IEEE Data Eng. Bull., 41(1), 2018."}],"event":{"sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"acronym":"SIGMOD\/PODS '19","name":"SIGMOD\/PODS '19: International Conference on Management of Data","location":"Amsterdam Netherlands"},"container-title":["Proceedings of the 2019 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299869.3300084","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3299869.3300084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:16Z","timestamp":1750208536000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299869.3300084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,25]]},"references-count":50,"alternative-id":["10.1145\/3299869.3300084","10.1145\/3299869"],"URL":"https:\/\/doi.org\/10.1145\/3299869.3300084","relation":{},"subject":[],"published":{"date-parts":[[2019,6,25]]},"assertion":[{"value":"2019-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}