{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T09:19:17Z","timestamp":1773825557047,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["IIS #1956123 and OAC #1640864"],"award-info":[{"award-number":["IIS #1956123 and OAC #1640864"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2075 - 390740016"],"award-info":[{"award-number":["EXC 2075 - 390740016"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3448016.3457249","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T17:22:39Z","timestamp":1624036959000},"page":"405-417","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["To Not Miss the Forest for the Trees - A Holistic Approach for Explaining Missing Answers over Nested Data"],"prefix":"10.1145","author":[{"given":"Ralf","family":"Diestelk\u00e4mper","sequence":"first","affiliation":[{"name":"Universit\u00e4t Stuttgart - IPVS, Stuttgart, Germany"}]},{"given":"Seokki","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Cincinnati, Cincinnati, OH, USA"}]},{"given":"Melanie","family":"Herschel","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Stuttgart - IPVS, Stuttgart, Germany"}]},{"given":"Boris","family":"Glavic","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.14778\/2095686.2095693"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066283"},{"key":"e_1_3_2_2_3_1","volume-title":"International Workshop on Description Logics, Mantas Simkus and Grant E. Weddell (Eds.)","volume":"2373","author":"Barcel\u00f3 Pablo","year":"2019","unstructured":"Pablo Barcel\u00f3 . 2019 . A Theoretical View on Reverse Engineering Problems for Database Query Languages . In International Workshop on Description Logics, Mantas Simkus and Grant E. Weddell (Eds.) , Vol. 2373 . Pablo Barcel\u00f3. 2019. A Theoretical View on Reverse Engineering Problems for Database Query Languages. In International Workshop on Description Logics, Mantas Simkus and Grant E. Weddell (Eds.), Vol. 2373."},{"key":"e_1_3_2_2_4_1","volume-title":"On Answering Why-Not Queries Against Scientific Workflow Provenance. In Conference on Extending Database Technology (EDBT). 465-- 468","author":"Belhajjame K.","year":"2018","unstructured":"K. Belhajjame . 2018 . On Answering Why-Not Queries Against Scientific Workflow Provenance. In Conference on Extending Database Technology (EDBT). 465-- 468 . K. Belhajjame. 2018. On Answering Why-Not Queries Against Scientific Workflow Provenance. In Conference on Extending Database Technology (EDBT). 465-- 468."},{"key":"e_1_3_2_2_5_1","volume-title":"Efficient Computation of Polynomial Explanations of Why-Not Questions. In Conference on Information and Knowledge Management (CIKM). 713--722","author":"Bidoit N.","unstructured":"N. Bidoit , M. Herschel , and A. Tzompanaki . 2015 . Efficient Computation of Polynomial Explanations of Why-Not Questions. In Conference on Information and Knowledge Management (CIKM). 713--722 . N. Bidoit, M. Herschel, and A. Tzompanaki. 2015. Efficient Computation of Polynomial Explanations of Why-Not Questions. In Conference on Information and Knowledge Management (CIKM). 713--722."},{"key":"e_1_3_2_2_6_1","volume-title":"Query-Based Why-Not Provenance with NedExplain. In Conference on Extending Database Technology (EDBT). 145--156","author":"Bidoit N.","unstructured":"N. Bidoit , M. Herschel , and K. Tzompanaki . 2014 . Query-Based Why-Not Provenance with NedExplain. In Conference on Extending Database Technology (EDBT). 145--156 . N. Bidoit, M. Herschel, and K. Tzompanaki. 2014. Query-Based Why-Not Provenance with NedExplain. In Conference on Extending Database Technology (EDBT). 145--156."},{"key":"e_1_3_2_2_7_1","volume-title":"A survey on tree edit distance and related problems. Theoretical computer science 337, 1--3","author":"Bille Philip","year":"2005","unstructured":"Philip Bille . 2005. A survey on tree edit distance and related problems. Theoretical computer science 337, 1--3 ( 2005 ), 217--239. Philip Bille. 2005. A survey on tree edit distance and related problems. Theoretical computer science 337, 1--3 (2005), 217--239."},{"key":"e_1_3_2_2_8_1","volume-title":"Reuse-based Optimization for Pig Latin. In Conference on Information and Knowledge Management (CIKM).","author":"Camacho-Rodr\u00edguez Jes\u00fas","year":"2016","unstructured":"Jes\u00fas Camacho-Rodr\u00edguez , Dario Colazzo , Melanie Herschel , Ioana Manolescu , and Soudip Roy Chowdhury . 2016 . Reuse-based Optimization for Pig Latin. In Conference on Information and Knowledge Management (CIKM). Jes\u00fas Camacho-Rodr\u00edguez, Dario Colazzo, Melanie Herschel, Ioana Manolescu, and Soudip Roy Chowdhury. 2016. Reuse-based Optimization for Pig Latin. In Conference on Information and Knowledge Management (CIKM)."},{"key":"e_1_3_2_2_9_1","volume-title":"ACM Conference on the Management of Data (SIGMOD). 523--534","author":"Chapman A.","unstructured":"A. Chapman and H. V. Jagadish . 2009. Why not? . In ACM Conference on the Management of Data (SIGMOD). 523--534 . A. Chapman and H. V. Jagadish. 2009. Why not?. In ACM Conference on the Management of Data (SIGMOD). 523--534."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/3229863.3236241"},{"key":"e_1_3_2_2_11_1","volume-title":"Explaining Missing Query Results in Natural Language. In Conference on Extending Database Technology (EDBT). OpenProceedings.org, 427--430","author":"Deutch Daniel","year":"2020","unstructured":"Daniel Deutch , Nave Frost , Amir Gilad , and Tomer Haimovich . 2020 . Explaining Missing Query Results in Natural Language. In Conference on Extending Database Technology (EDBT). OpenProceedings.org, 427--430 . Daniel Deutch, Nave Frost, Amir Gilad, and Tomer Haimovich. 2020. Explaining Missing Query Results in Natural Language. In Conference on Extending Database Technology (EDBT). OpenProceedings.org, 427--430."},{"key":"e_1_3_2_2_12_1","volume-title":"Conference on Extending Database Technology (EDBT). 277--288","author":"Deutch Daniel","year":"2019","unstructured":"Daniel Deutch and Amir Gilad . 2019 . Reverse-Engineering Conjunctive Queries from Provenance Examples . In Conference on Extending Database Technology (EDBT). 277--288 . Daniel Deutch and Amir Gilad. 2019. Reverse-Engineering Conjunctive Queries from Provenance Examples. In Conference on Extending Database Technology (EDBT). 277--288."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/3007263.3007302"},{"key":"e_1_3_2_2_14_1","volume-title":"Querybased Why-not Explanations for Nested Data. In International Workshop on Theory and Practice of Provenance (TaPP).","author":"Diestelk\u00e4mper Ralf","year":"2019","unstructured":"Ralf Diestelk\u00e4mper , Boris Glavic , Melanie Herschel , and Seokki Lee . 2019 . Querybased Why-not Explanations for Nested Data. In International Workshop on Theory and Practice of Provenance (TaPP). Ralf Diestelk\u00e4mper, Boris Glavic, Melanie Herschel, and Seokki Lee. 2019. Querybased Why-not Explanations for Nested Data. In International Workshop on Theory and Practice of Provenance (TaPP)."},{"key":"e_1_3_2_2_15_1","volume-title":"Conference on Extending Database Technology (EDBT). 253--264","author":"Diestelk\u00e4mper Ralf","year":"2020","unstructured":"Ralf Diestelk\u00e4mper and Melanie Herschel . 2020 . Tracing nested data with structural provenance for big data analytics . In Conference on Extending Database Technology (EDBT). 253--264 . Ralf Diestelk\u00e4mper and Melanie Herschel. 2020. Tracing nested data with structural provenance for big data analytics. In Conference on Extending Database Technology (EDBT). 253--264."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Ralf Diestelk\u00e4mper Seokki Lee Melanie Herschel and Boris Glavic. 2021. To not miss the forest for the trees - A holistic approach for explaining missing answer over nested data (supplementary material). (2021). arXiv:2103.07561 [cs.DB]  Ralf Diestelk\u00e4mper Seokki Lee Melanie Herschel and Boris Glavic. 2021. To not miss the forest for the trees - A holistic approach for explaining missing answer over nested data (supplementary material). (2021). arXiv:2103.07561 [cs.DB]","DOI":"10.1145\/3448016.3457249"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50060-3"},{"key":"e_1_3_2_2_18_1","volume-title":"Symposium on Principles of Database Systems (PODS). 271--280","author":"Foster J. Nathan","unstructured":"J. Nathan Foster , TJ. Green , and V. Tannen . 2008. Annotated XML: queries and provenance . In Symposium on Principles of Database Systems (PODS). 271--280 . J. Nathan Foster, TJ. Green, and V. Tannen. 2008. Annotated XML: queries and provenance. In Symposium on Principles of Database Systems (PODS). 271--280."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1996.0042"},{"key":"e_1_3_2_2_20_1","first-page":"10","article-title":"A Hybrid Approach to Answering Why-Not Questions on Relational Query Results","volume":"5","author":"Herschel M.","year":"2015","unstructured":"M. Herschel . 2015 . A Hybrid Approach to Answering Why-Not Questions on Relational Query Results . ACM Journal on Data and Information Quality (JDIQ) 5 , 3 (2015), 10 . M. Herschel. 2015. A Hybrid Approach to Answering Why-Not Questions on Relational Query Results. ACM Journal on Data and Information Quality (JDIQ) 5, 3 (2015), 10.","journal-title":"ACM Journal on Data and Information Quality (JDIQ)"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-017-0486-1"},{"key":"e_1_3_2_2_22_1","volume-title":"Provenance for Generalized Map and Reduce Workflows. In Conference on Innovative Data Systems Research (CIDR). 273--283","author":"Ikeda R.","unstructured":"R. Ikeda , H. Park , and J. Widom . 2011 . Provenance for Generalized Map and Reduce Workflows. In Conference on Innovative Data Systems Research (CIDR). 273--283 . R. Ikeda, H. Park, and J. Widom. 2011. Provenance for Generalized Map and Reduce Workflows. In Conference on Innovative Data Systems Research (CIDR). 273--283."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-017-0474-5"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183727"},{"key":"e_1_3_2_2_25_1","volume-title":"Schema-Free XQuery. In Conference on Very Large Data Bases (VLDB). 72--83","author":"Li Yunyao","unstructured":"Yunyao Li , Cong Yu , and H. V. Jagadish . 2004 . Schema-Free XQuery. In Conference on Very Large Data Bases (VLDB). 72--83 . Yunyao Li, Cong Yu, and H. V. Jagadish. 2004. Schema-Free XQuery. In Conference on Very Large Data Bases (VLDB). 72--83."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0003-4"},{"key":"e_1_3_2_2_27_1","first-page":"2","article-title":"Query Languages for Bags andAggregate Functions","volume":"55","author":"Libkin Leonid","year":"1997","unstructured":"Leonid Libkin and LimsoonWong. 1997 . Query Languages for Bags andAggregate Functions . Journal of Computer and System Sciences (JCSS) 55 , 2 (Oct. 1997), 241--272. Leonid Libkin and LimsoonWong. 1997. Query Languages for Bags andAggregate Functions. Journal of Computer and System Sciences (JCSS) 55, 2 (Oct. 1997), 241--272.","journal-title":"Journal of Computer and System Sciences (JCSS)"},{"key":"e_1_3_2_2_28_1","volume-title":"Symposium on Cloud Computing (SOCC). 17","author":"Logothetis D.","unstructured":"D. Logothetis , S. De , and K. Yocum . 2013. Scalable lineage capture for debugging DISC analytics . In Symposium on Cloud Computing (SOCC). 17 . D. Logothetis, S. De, and K. Yocum. 2013. Scalable lineage capture for debugging DISC analytics. In Symposium on Cloud Computing (SOCC). 17."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.126"},{"key":"e_1_3_2_2_30_1","volume-title":"Interactive Query Refinement. In Conference on Extending Database Technology (EDBT). 862--873","author":"Mishra Chaitanya","year":"2009","unstructured":"Chaitanya Mishra and Nick Koudas . 2009 . Interactive Query Refinement. In Conference on Extending Database Technology (EDBT). 862--873 . Chaitanya Mishra and Nick Koudas. 2009. Interactive Query Refinement. In Conference on Extending Database Technology (EDBT). 862--873."},{"key":"e_1_3_2_2_31_1","volume-title":"Generating Targeted Queries for Database Testing. In ACM Conference on the Management of Data (SIGMOD)","author":"Mishra Chaitanya","year":"2008","unstructured":"Chaitanya Mishra , Nick Koudas , and Calisto Zuzarte . 2008 . Generating Targeted Queries for Database Testing. In ACM Conference on the Management of Data (SIGMOD) . New York, NY, USA, 499--510. Chaitanya Mishra, Nick Koudas, and Calisto Zuzarte. 2008. Generating Targeted Queries for Database Testing. In ACM Conference on the Management of Data (SIGMOD). New York, NY, USA, 499--510."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-016-0431-8"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236204"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.14778\/2095686.2095692"},{"key":"e_1_3_2_2_35_1","volume-title":"Conference on Big Data. 2911--2920","author":"Pirzadeh P.","unstructured":"P. Pirzadeh , M. Carey , and T. Westmann . 2017. A performance study of big data analytics platforms . In Conference on Big Data. 2911--2920 . P. Pirzadeh, M. Carey, and T. Westmann. 2017. A performance study of big data analytics platforms. In Conference on Big Data. 2911--2920."},{"key":"e_1_3_2_2_36_1","volume-title":"Adaptive Schema Databases. In Conference on Innovative Data Systems Research (CIDR).","author":"Spoth William","year":"2017","unstructured":"William Spoth , Bahareh Sadat Arab , Eric S. Chan , Dieter Gawlick , Adel Ghoneimy , Boris Glavic , Beda Christoph Hammerschmidt , Oliver Kennedy , Seokki Lee , Zhen Hua Liu , Xing Niu , and Ying Yang . 2017 . Adaptive Schema Databases. In Conference on Innovative Data Systems Research (CIDR). William Spoth, Bahareh Sadat Arab, Eric S. Chan, Dieter Gawlick, Adel Ghoneimy, Boris Glavic, Beda Christoph Hammerschmidt, Oliver Kennedy, Seokki Lee, Zhen Hua Liu, Xing Niu, and Ying Yang. 2017. Adaptive Schema Databases. In Conference on Innovative Data Systems Research (CIDR)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137648"},{"key":"e_1_3_2_2_38_1","volume-title":"ACM Conference on the Management of Data (SIGMOD). 15--26","author":"Tran QT.","unstructured":"QT. Tran and CY. Chan . 2010. How to ConQueR why-not questions . In ACM Conference on the Management of Data (SIGMOD). 15--26 . QT. Tran and CY. Chan. 2010. How to ConQueR why-not questions. In ACM Conference on the Management of Data (SIGMOD). 15--26."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0349-3"},{"key":"e_1_3_2_2_40_1","volume-title":"Exploiting Common Patterns for Tree- Structured Data. In ACM Conference on the Management of Data (SIGMOD), Semih Salihoglu, Wenchao Zhou, Rada Chirkova, Jun Yang, and Dan Suciu (Eds.). ACM, 883--896","author":"Wang Zhiyi","year":"2017","unstructured":"Zhiyi Wang and Shimin Chen . 2017 . Exploiting Common Patterns for Tree- Structured Data. In ACM Conference on the Management of Data (SIGMOD), Semih Salihoglu, Wenchao Zhou, Rada Chirkova, Jun Yang, and Dan Suciu (Eds.). ACM, 883--896 . Zhiyi Wang and Shimin Chen. 2017. Exploiting Common Patterns for Tree- Structured Data. In ACM Conference on the Management of Data (SIGMOD), Semih Salihoglu, Wenchao Zhou, Rada Chirkova, Jun Yang, and Dan Suciu (Eds.). ACM, 883--896."},{"key":"e_1_3_2_2_41_1","volume-title":"On the editing distance between unordered labeled trees. Information processing letters 42, 3","author":"Zhang Kaizhong","year":"1992","unstructured":"Kaizhong Zhang , Rick Statman , and Dennis Shasha . 1992. On the editing distance between unordered labeled trees. Information processing letters 42, 3 ( 1992 ), 133--139. Kaizhong Zhang, Rick Statman, and Dennis Shasha. 1992. On the editing distance between unordered labeled trees. Information processing letters 42, 3 (1992), 133--139."},{"key":"e_1_3_2_2_42_1","volume-title":"Fine-Grained Provenance for Matching ETL. In IEEE International Conference on Data Engineering (ICDE). 184--195","author":"Zheng N.","year":"1977","unstructured":"N. Zheng , A. Alawini , and Z. G. Ives . 2019 . Fine-Grained Provenance for Matching ETL. In IEEE International Conference on Data Engineering (ICDE). 184--195 . [43] M.M. Zloof. 1977 . Query-by-Example: A Data Base Language. IBM Systems Journal 16, 4 (1977), 324--343. N. Zheng, A. Alawini, and Z. G. Ives. 2019. Fine-Grained Provenance for Matching ETL. In IEEE International Conference on Data Engineering (ICDE). 184--195. [43] M.M. Zloof. 1977. Query-by-Example: A Data Base Language. IBM Systems Journal 16, 4 (1977), 324--343."}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","location":"Virtual Event China","acronym":"SIGMOD\/PODS '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2021 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457249","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3457249","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3457249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:06Z","timestamp":1750195686000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457249"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":42,"alternative-id":["10.1145\/3448016.3457249","10.1145\/3448016"],"URL":"https:\/\/doi.org\/10.1145\/3448016.3457249","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}