{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:32:00Z","timestamp":1725867120765},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319463964"},{"type":"electronic","value":"9783319463971"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46397-1_33","type":"book-chapter","created":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T14:42:36Z","timestamp":1475764956000},"page":"430-444","source":"Crossref","is-referenced-by-count":44,"title":["UMLtoGraphDB: Mapping Conceptual Schemas to Graph Databases"],"prefix":"10.1007","author":[{"given":"Gwendal","family":"Daniel","sequence":"first","affiliation":[]},{"given":"Gerson","family":"Suny\u00e9","sequence":"additional","affiliation":[]},{"given":"Jordi","family":"Cabot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,7]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Anand, M.K., Bowers, S., Lud\u00e4scher, B.: Techniques for efficiently querying scientific workflow provenance graphs. In: EDBT, vol. 10, pp. 287\u2013298 (2010)","key":"33_CR1","DOI":"10.1145\/1739041.1739078"},{"key":"33_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-319-09195-2_15","volume-title":"Modelling Foundations and Applications","author":"A Benelallam","year":"2014","unstructured":"Benelallam, A., G\u00f3mez, A., Suny\u00e9, G., Tisi, M., Launay, D.: Neo4EMF, a scalable persistence layer for EMF models. In: Cabot, J., Rubin, J. (eds.) ECMFA 2014. LNCS, vol. 8569, pp. 230\u2013241. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-09195-2_15"},{"key":"33_CR3","volume-title":"Implementing Domain-Specific Languages with Xtext and Xtend","author":"L Bettini","year":"2013","unstructured":"Bettini, L.: Implementing Domain-Specific Languages with Xtext and Xtend. Packt Publishing Ltd., Birmingham (2013)"},{"doi-asserted-by":"crossref","unstructured":"Brambilla, M., Cabot, J.: Constraint tuning and management for web applications. In: Proceedings of the 6th ICWE Conference, pp. 345\u2013352. ACM (2006)","key":"33_CR4","DOI":"10.1145\/1145581.1145648"},{"key":"33_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-319-12206-9_18","volume-title":"Conceptual Modeling","author":"F Bugiotti","year":"2014","unstructured":"Bugiotti, F., Cabibbo, L., Atzeni, P., Torlone, R.: Database design for NoSQL systems. In: Yu, E., Dobbie, G., Jarke, M., Purao, S. (eds.) ER 2014. LNCS, vol. 8824, pp. 223\u2013231. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-12206-9_18"},{"issue":"9","key":"33_CR6","first-page":"1459","volume":"82","author":"J Cabot","year":"2009","unstructured":"Cabot, J., Teniente, E.: Incremental integrity checking of UML\/OCL conceptual schemas. JSS 82(9), 1459\u20131478 (2009)","journal-title":"JSS"},{"issue":"2","key":"33_CR7","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/0169-023X(94)90011-6","volume":"12","author":"RHL Chiang","year":"1994","unstructured":"Chiang, R.H.L., Barron, T.M., Storey, V.C.: Reverse engineering of relational databases: extraction of an EER model from a relational database. Data Knowl. Eng. 12(2), 107\u2013142 (1994)","journal-title":"Data Knowl. Eng."},{"doi-asserted-by":"crossref","unstructured":"Daniel, G., Suny\u00e9, G., Cabot, J.: Mogwa\u00ef: a framework to handle complex queries on large models. In: Proceedings of the 10th RCIS Conference. IEEE (2016, to appear). http:\/\/tinyurl.com\/zx6cfam","key":"33_CR8","DOI":"10.1109\/RCIS.2016.7549343"},{"key":"33_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1007\/3-540-46852-8_42","volume-title":"\u00abUML\u00bb\u201999 \u2014 The Unified Modeling Language","author":"B Demuth","year":"1999","unstructured":"Demuth, B., Hussmann, H.: Using UML\/OCL constraints for relational database design. In: France, R., Rumpe, B. (eds.) UML 1999. LNCS, vol. 1723, pp. 598\u2013613. Springer, Heidelberg (1999). doi: 10.1007\/3-540-46852-8_42"},{"key":"33_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-45441-1_9","volume-title":"\u00abUML\u00bb 2001 \u2014 The Unified Modeling Language. Modeling Languages, Concepts, and Tools","author":"B Demuth","year":"2001","unstructured":"Demuth, B., Hussmann, H., Loecher, S.: OCL as a specification language for business rules in database applications. In: Gogolla, M., Kobryn, C. (eds.) UML 2001. LNCS, vol. 2185, pp. 104\u2013117. Springer, Heidelberg (2001). doi: 10.1007\/3-540-45441-1_9"},{"doi-asserted-by":"crossref","unstructured":"Fan, W.: Graph pattern matching revised for social network analysis. In: Proceedings of the 15th ICDT, pp. 8\u201321. ACM (2012)","key":"33_CR11","DOI":"10.1145\/2274576.2274578"},{"issue":"2","key":"33_CR12","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1089\/big.2013.0011","volume":"1","author":"M Hausenblas","year":"2013","unstructured":"Hausenblas, M., Nadeau, J.: Apache drill: interactive ad-hoc analysis at scale. Big Data 1(2), 100\u2013104 (2013)","journal-title":"Big Data"},{"key":"33_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-39200-9_8","volume-title":"Web Engineering","author":"JL C\u00e1novas Izquierdo","year":"2013","unstructured":"C\u00e1novas Izquierdo, J.L., Cabot, J.: Discovering implicit schemas in JSON Data. In: Daniel, F., Dolog, P., Li, Q. (eds.) ICWE 2013. LNCS, vol. 7977, pp. 68\u201383. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-39200-9_8"},{"issue":"1\u20132","key":"33_CR14","first-page":"31","volume":"72","author":"F Jouault","year":"2008","unstructured":"Jouault, F., Allilaire, F., B\u00e9zivin, J., Kurtev, I.: ATL: a model transformation tool. SCP 72(1\u20132), 31\u201339 (2008)","journal-title":"SCP"},{"doi-asserted-by":"crossref","unstructured":"Jouault, F., Kurtev, I.: On the architectural alignment of ATL and QVT. In: Proceedings of the 21st SAC Conference, pp. 1188\u20131195. ACM (2006)","key":"33_CR15","DOI":"10.1145\/1141277.1141561"},{"key":"33_CR16","volume-title":"Neo4j Graph Data Modeling","author":"M Lal","year":"2015","unstructured":"Lal, M.: Neo4j Graph Data Modeling. Packt Publishing Ltd., Birmingham (2015)"},{"key":"33_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4302-5795-0","volume-title":"Pro Hibernate and MongoDB","author":"A Leonard","year":"2013","unstructured":"Leonard, A.: Pro Hibernate and MongoDB. Apress, Berkeley (2013)"},{"doi-asserted-by":"crossref","unstructured":"Li, Y., Gu, P., Zhang, C.: Transforming UML class diagrams into HBase based on meta-model. In: Proceedings of the 4th ISEEE Conference, vol. 2, pp. 720\u2013724. IEEE (2014)","key":"33_CR18","DOI":"10.1109\/InfoSEEE.2014.6947760"},{"issue":"1","key":"33_CR19","first-page":"59","volume":"2","author":"E Marcos","year":"2003","unstructured":"Marcos, E., Vela, B., Cavero, J.M.: A methodological approach for object-relational database design using UML. SoSyM 2(1), 59\u201372 (2003)","journal-title":"SoSyM"},{"doi-asserted-by":"crossref","unstructured":"Mior, M.J., Salem, K., Aboulnaga, A., Liu, R., NoSE: schema design for NoSQL applications. In: 32nd ICDE Conference. IEEE (2016, accepted). http:\/\/tinyurl.com\/hqoxddx","key":"33_CR20","DOI":"10.1109\/ICDE.2016.7498239"},{"doi-asserted-by":"crossref","unstructured":"Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., Abramov, J.: Security issues in NoSQL databases. In: Proceedings of the 10th TrustCom Conference, pp. 541\u2013547. IEEE (2011)","key":"33_CR21","DOI":"10.1109\/TrustCom.2011.70"},{"unstructured":"OMG: MDA Specifications (2016). http:\/\/www.omg.org\/mda\/specs.htm","key":"33_CR22"},{"unstructured":"OMG: OCL Specification (2016). www.omg.org\/spec\/OCL","key":"33_CR23"},{"unstructured":"OMG: UML Specification (2016). www.omg.org\/spec\/UML","key":"33_CR24"},{"key":"33_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-319-25264-3_35","volume-title":"Conceptual Modeling","author":"D Sevilla Ruiz","year":"2015","unstructured":"Sevilla Ruiz, D., Morales, S.F., Garc\u00eda Molina, J.: Inferring versioned schemas from NoSQL databases and its applications. In: Johannesson, P., Lee, M.L., Liddle, S.W., Opdahl, A.L., L\u00f3pez, \u00d3.P. (eds.) ER 2015. LNCS, vol. 9381, pp. 467\u2013480. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25264-3_35"},{"unstructured":"TinkerPop: Blueprints API (2016). blueprints.tinkerpop.com","key":"33_CR26"},{"unstructured":"TinkerPop: The Gremlin Language (2016). gremlin.tinkerpop.com","key":"33_CR27"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46397-1_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T09:40:44Z","timestamp":1568454044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46397-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319463964","9783319463971"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46397-1_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}