{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T17:00:18Z","timestamp":1759683618913,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T00:00:00Z","timestamp":1563840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/I028099\/1"],"award-info":[{"award-number":["EP\/I028099\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,23]]},"DOI":"10.1145\/3335783.3335785","type":"proceedings-article","created":{"date-parts":[[2019,8,2]],"date-time":"2019-08-02T12:17:07Z","timestamp":1564748227000},"page":"37-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Dynamap"],"prefix":"10.1145","author":[{"given":"Lacramioara","family":"Mazilu","sequence":"first","affiliation":[{"name":"University of Manchester"}]},{"given":"Norman W.","family":"Paton","sequence":"additional","affiliation":[{"name":"University of Manchester"}]},{"given":"Alvaro A.A.","family":"Fernandes","sequence":"additional","affiliation":[{"name":"University of Manchester"}]},{"given":"Martin","family":"Koehler","sequence":"additional","affiliation":[{"name":"University of Manchester"}]}],"member":"320","published-online":{"date-parts":[[2019,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0389-y"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.11.019"},{"key":"e_1_3_2_1_3_1","unstructured":"A. V. Aho and J. E. Hopcroft. 1974. The Design and Analysis of Computer Algorithms (1st ed.). Addison-Wesley Longman Publishing Co. Inc. Boston MA USA.   A. V. Aho and J. E. Hopcroft. 1974. The Design and Analysis of Computer Algorithms (1st ed.). Addison-Wesley Longman Publishing Co. Inc. Boston MA USA."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043652.2043656"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-012-0264-z"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"M. Arenas P. Barcel\u00f3 L. Libkin and F. Murlak. 2014. Foundations of Data Exchange. Cambridge University Press.   M. Arenas P. Barcel\u00f3 L. Libkin and F. Murlak. 2014. Foundations of Data Exchange. Cambridge University Press.","DOI":"10.1017\/CBO9781139060158"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/2850583.2850586"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2013.01.006"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14778\/3213880.3213888"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378727.1378745"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064028"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353358"},{"key":"e_1_3_2_1_13_1","unstructured":"L. Chiticariu and W. C. Tan. 2006. Debugging Schema Mappings with Routes. In VLDB. 79--90.   L. Chiticariu and W. C. Tan. 2006. Debugging Schema Mappings with Routes. In VLDB. 79--90."},{"key":"e_1_3_2_1_14_1","unstructured":"F. Coelho. 2013. Datafiller 2.0.0 - data generation tool. {Last accessed: 2018-07-16} Available: https:\/\/www.cri.ensmp.fr\/people\/coelho\/datafiller.html. (2013).  F. Coelho. 2013. Datafiller 2.0.0 - data generation tool. {Last accessed: 2018-07-16} Available: https:\/\/www.cri.ensmp.fr\/people\/coelho\/datafiller.html. (2013)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02463-4_12"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1085304.1085309"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1061318.1061323"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"W. Fan and F. Geerts. 2012. Foundations of Data Quality Management. Morgan & Claypool.   W. Fan and F. Geerts. 2012. Foundations of Data Quality Management. Morgan & Claypool.","DOI":"10.1007\/978-3-031-01892-3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3058740"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11687238_9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-012-0286-6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"F. Geerts G. Mecca P. Papotti and D. Santoro. 2014. Mapping and cleaning. In IEEEICDE. 232--243.  F. Geerts G. Mecca P. Papotti and D. Santoro. 2014. Mapping and cleaning. In IEEEICDE. 232--243.","DOI":"10.1109\/ICDE.2014.6816654"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346330.1346334"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3058730"},{"key":"e_1_3_2_1_25_1","unstructured":"S. Kruse T. Papenbrock and F. Naumann. 2015. Scaling Out the Discovery of Inclusion Dependencies. In Datenbanksysteme f\u00fcr Business Technologie und Web (BTW). 445--454.  S. Kruse T. Papenbrock and F. Naumann. 2015. Scaling Out the Discovery of Inclusion Dependencies. In Datenbanksysteme f\u00fcr Business Technologie und Web (BTW). 445--454."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807213"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/3402755.3402790"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.03.004"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396872"},{"key":"e_1_3_2_1_30_1","unstructured":"R. J. Miller L. M. Haas and M. A. Hern\u00e1ndez. 2000. Schema Mapping As Query Discovery. In VLDB. 77--88.   R. J. Miller L. M. Haas and M. A. Hern\u00e1ndez. 2000. Schema Mapping As Query Discovery. In VLDB. 77--88."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14778\/3192965.3192973"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824086"},{"key":"e_1_3_2_1_33_1","unstructured":"T. Papenbrock and F. Naumann. 2017. A Hybrid Approach for Efficient Unique Column Combination Discovery. In Database Systems for Business Technology and Web (BTW). 195--204.  T. Papenbrock and F. Naumann. 2017. A Hybrid Approach for Efficient Unique Column Combination Discovery. In Database Systems for Business Technology and Web (BTW). 195--204."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2749452"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376702"},{"key":"e_1_3_2_1_36_1","volume-title":"Scale: The Data Tamer System. In CIDR.","author":"Stonebraker M.","year":"2013","unstructured":"M. Stonebraker , D. Bruckner , I. Ilyas , G. Beskales , M. Cherniack , S. Zdonik , A. Pagan , and S. Xu . 2013 . Data Curation at Scale: The Data Tamer System. In CIDR. M. Stonebraker, D. Bruckner, I. Ilyas, G. Beskales, M. Cherniack, S. Zdonik, A. Pagan, and S. Xu. 2013. Data Curation at Scale: The Data Tamer System. In CIDR."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453941"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687741"}],"event":{"name":"SSDBM '19: 31st International Conference on Scientific and Statistical Database Management","acronym":"SSDBM '19","location":"Santa Cruz CA USA"},"container-title":["Proceedings of the 31st International Conference on Scientific and Statistical Database Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3335783.3335785","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3335783.3335785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:09Z","timestamp":1750206369000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3335783.3335785"}},"subtitle":["Schema Mapping Generation in the Wild"],"short-title":[],"issued":{"date-parts":[[2019,7,23]]},"references-count":38,"alternative-id":["10.1145\/3335783.3335785","10.1145\/3335783"],"URL":"https:\/\/doi.org\/10.1145\/3335783.3335785","relation":{},"subject":[],"published":{"date-parts":[[2019,7,23]]},"assertion":[{"value":"2019-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}