{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T03:43:26Z","timestamp":1708573406838},"reference-count":28,"publisher":"Elsevier BV","issue":"12","license":[{"start":{"date-parts":[[1994,12,1]],"date-time":"1994-12-01T00:00:00Z","timestamp":786240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[1994,12]]},"DOI":"10.1016\/0950-5849(94)90044-2","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T21:31:39Z","timestamp":1060291899000},"page":"725-732","source":"Crossref","is-referenced-by-count":3,"title":["Genetic algorithms for optimal logical database design"],"prefix":"10.1016","volume":"36","author":[{"given":"P","family":"van Bommel","sequence":"first","affiliation":[]},{"given":"ThP","family":"van der Weide","sequence":"additional","affiliation":[]},{"given":"Cb","family":"Lucasius","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0950-5849(94)90044-2_BIB1","series-title":"Proc. 4th Int. Conf. on Genetic Algorithms","first-page":"400","article-title":"A genetic algorithm for database query optimization","author":"Bennett","year":"1991"},{"key":"10.1016\/0950-5849(94)90044-2_BIB2","series-title":"Proc. 1990 ACM SIGMOD Conf. on the Management of Data","first-page":"312","article-title":"Randomized algorithms for optimizing large join queries","author":"Ioannidis","year":"1990"},{"key":"10.1016\/0950-5849(94)90044-2_BIB3","series-title":"Proc. 1987 ACM SIGMOD Conf. on the Management of Data","first-page":"9","article-title":"Query optimization by simulated annealing","author":"Ioannidis","year":"1987"},{"issue":"No 2","key":"10.1016\/0950-5849(94)90044-2_BIB4","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/0306-4379(90)90037-P","article-title":"The use of simulated annealing for clustering data in databases","volume":"Vol 15","author":"McErlean","year":"1990","journal-title":"Information Systems"},{"key":"10.1016\/0950-5849(94)90044-2_BIB5","series-title":"Proc. 1991 ACM SIGIR","first-page":"230","article-title":"On the allocation of documents in multiprocessor information retrieval systems","author":"Frieder","year":"1991"},{"key":"10.1016\/0950-5849(94)90044-2_BIB6","series-title":"1991 IEEE Int. Computer Conf. on Systems, Man and Cybernetics","article-title":"The allocation of documents in multiprocessor information retrieval: an application of genetic algorithms","author":"Siegelmann","year":"1991"},{"key":"10.1016\/0950-5849(94)90044-2_BIB7","series-title":"Concepts and terminology for the conceptual schema and the information base","year":"1982"},{"issue":"No 2","key":"10.1016\/0950-5849(94)90044-2_BIB8","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/0306-4379(88)90018-X","article-title":"Relational database design using the NIAM conceptual schema","volume":"Vol 13","author":"Leung","year":"1988","journal-title":"Information Systems"},{"key":"10.1016\/0950-5849(94)90044-2_BIB9","series-title":"Conceptual schema and relational database design: a fact oriented approach","author":"Nijssen","year":"1989"},{"key":"10.1016\/0950-5849(94)90044-2_BIB10","series-title":"Proc. 4th Australian Conf. on Information Systems","first-page":"381","article-title":"Mapping integrity constraints to a relational schema","author":"Ritson","year":"1993"},{"key":"10.1016\/0950-5849(94)90044-2_BIB11","volume":"Vol 1","author":"Ullman","year":"1989"},{"key":"10.1016\/0950-5849(94)90044-2_BIB12","series-title":"Foundations of genetic algorithms","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/B978-0-08-050684-5.50014-8","article-title":"A hierarchical approach to learning the boolean multiplexer function","author":"Koza","year":"1991"},{"key":"10.1016\/0950-5849(94)90044-2_BIB13","series-title":"Geneticalgorithms + datastructures = evolutionprograms","author":"Michalewicz","year":"1992"},{"key":"10.1016\/0950-5849(94)90044-2_BIB14","series-title":"Proc. Int. Conf. on Information Systems and Management of Data (CISMOD 92)","first-page":"273","article-title":"Towards database optimization by evolution","author":"van Bommel","year":"1992"},{"issue":"No 5","key":"10.1016\/0950-5849(94)90044-2_BIB15","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/0306-4379(91)90037-A","article-title":"Semantics and verification of object-role models","volume":"Vol 16","author":"van Bommel","year":"1991","journal-title":"Information Systems"},{"issue":"No 2","key":"10.1016\/0950-5849(94)90044-2_BIB16","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/0306-4379(94)90009-4","article-title":"Transformation of database populations and operations from the conceptual to the internal level","volume":"Vol 19","author":"van Bommel","year":"1994","journal-title":"Information Systems"},{"key":"10.1016\/0950-5849(94)90044-2_BIB17","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/0169-023X(92)90042-A","article-title":"Reducing the search space for conceptual schema transformation","volume":"Vol 8","author":"van Bommel","year":"1992","journal-title":"Data & Knowledge Engineering"},{"issue":"No 1","key":"10.1016\/0950-5849(94)90044-2_BIB18","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/320434.320440","article-title":"The entity-relationship model: toward a unified view of data","volume":"Vol 1","author":"Chen","year":"1976","journal-title":"ACM Transactions on Database Systems"},{"issue":"No 2","key":"10.1016\/0950-5849(94)90044-2_BIB19","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1093\/comjnl\/35.2.148","article-title":"Uniquest: determining the semantics of complex uniqueness constraints","volume":"Vol 35","author":"van der Weide","year":"1992","journal-title":"The Computer J."},{"issue":"No 1","key":"10.1016\/0950-5849(94)90044-2_BIB20","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/0169-023X(93)90020-P","article-title":"Expressiveness in conceptual data modelling","volume":"Vol 10","author":"ter Hofstede","year":"1993","journal-title":"Data & Knowledge Engineering"},{"issue":"No 7","key":"10.1016\/0950-5849(94)90044-2_BIB21","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/0306-4379(93)90004-K","article-title":"Formal definition of a conceptual language for the description and manipulation of information models","volume":"Vol 18","author":"ter Hofstede","year":"1993","journal-title":"Information Systems"},{"issue":"No 2","key":"10.1016\/0950-5849(94)90044-2_BIB22","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/0306-4379(86)90003-7","article-title":"The relational model with relation-valued attributes","volume":"Vol 11","author":"Schek","year":"1986","journal-title":"Information Systems"},{"key":"10.1016\/0950-5849(94)90044-2_BIB23","series-title":"Optimality in parametric systems","author":"Vincent","year":"1981"},{"key":"10.1016\/0950-5849(94)90044-2_BIB24","series-title":"Genetic algorithms in search, optimization, and machine learning","author":"Goldberg","year":"1989"},{"key":"10.1016\/0950-5849(94)90044-2_BIB25","series-title":"Foundations of genetic algorithms","year":"1991"},{"key":"10.1016\/0950-5849(94)90044-2_BIB26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0169-7439(93)80079-W","article-title":"Understanding and using genetic algorithms, Part 1. Concepts, properties and context","volume":"Vol 19","author":"Lucasius","year":"1993","journal-title":"Chemometrics and Intelligent Laboratory Systems"},{"key":"10.1016\/0950-5849(94)90044-2_BIB27","series-title":"International Conference on Object-role Modelling (ORM-1)","article-title":"Implementation selection for object-role models","author":"van Bommel","year":"1994"},{"issue":"No 2","key":"10.1016\/0950-5849(94)90044-2_BIB28","first-page":"61","article-title":"A randomised schema mutator for evolutionary database optimization","volume":"Vol 25","author":"van Bommel","year":"1993","journal-title":"The Australian Computer J."}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0950584994900442?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0950584994900442?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:28:29Z","timestamp":1552609709000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0950584994900442"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,12]]},"references-count":28,"journal-issue":{"issue":"12","published-print":{"date-parts":[[1994,12]]}},"alternative-id":["0950584994900442"],"URL":"https:\/\/doi.org\/10.1016\/0950-5849(94)90044-2","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[1994,12]]}}}