{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:26:34Z","timestamp":1730316394801,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":126,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,22]]},"DOI":"10.1145\/2463664.2467796","type":"proceedings-article","created":{"date-parts":[[2013,6,25]],"date-time":"2013-06-25T19:13:21Z","timestamp":1372187601000},"page":"1-12","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":82,"title":["Foundations of data-aware process analysis"],"prefix":"10.1145","author":[{"given":"Diego","family":"Calvanese","sequence":"first","affiliation":[{"name":"Free University of Bozen-Bolzano, Bolzano, Italy"}]},{"given":"Giuseppe","family":"De Giacomo","sequence":"additional","affiliation":[{"name":"Sapienza Universit\u00e0 di Roma, Rome, Italy"}]},{"given":"Marco","family":"Montali","sequence":"additional","affiliation":[{"name":"Free University of Bozen-Bolzano, Bolzano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2013,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(89)80070-7"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055564"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIME.2009.9"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1938551.1938564"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2188349.2188352"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/237661.237674"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/32204.32205"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/551350"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376916.1376948"},{"issue":"3","key":"e_1_3_2_1_10_1","first-page":"10","article-title":"Modeling and verifying Active XML artifacts","volume":"32","author":"Abiteboul S.","year":"2009","unstructured":"S. Abiteboul , L. Segoufin , and V. Vianu . Modeling and verifying Active XML artifacts . Bull. of the IEEE Computer Society Technical Committee on Data Engineering , 32 ( 3 ): 10 -- 15 , 2009 . S. Abiteboul, L. Segoufin, and V. Vianu. Modeling and verifying Active XML artifacts. Bull. of the IEEE Computer Society Technical Committee on Data Engineering, 32(3):10--15, 2009.","journal-title":"Bull. of the IEEE Computer Society Technical Committee on Data Engineering"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620585.1620590"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188011"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/645912.671288"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/325405.325439"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/6012.15417"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/28659.28688"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/42267.42271"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/308386.308448"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275507"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2000.1708"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/130283.130296"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/182.358434"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85758-7_24"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2040283.2040314"},{"key":"e_1_3_2_1_25_1","first-page":"46","article-title":"Description logic Knowledge and Action Bases","author":"Hariri B. Bagheri","year":"2013","unstructured":"B. Bagheri Hariri , D. Calvanese , M. Montali , G. De Giacomo , R. De Masellis , and P. Felli . Description logic Knowledge and Action Bases . J. of Artificial Intelligence Research , 46 , 2013 . B. Bagheri Hariri, D. Calvanese, M. Montali, G. De Giacomo, R. De Masellis, and P. Felli. Description logic Knowledge and Action Bases. J. of Artificial Intelligence Research, 46, 2013.","journal-title":"J. of Artificial Intelligence Research"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463664.2465221"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1373322"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/645502.756486"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/645502.656241"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275517"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350240"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/75277.75301"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1995.1036"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/113413.113439"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1182635.1164158"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2008.02.005"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25535-9_10"},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. of the 13th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR 2012)","author":"Belardinelli F.","year":"2012","unstructured":"F. Belardinelli , A. Lomuscio , and F. Patrizi . An abstraction technique for the verification of artifact-centric systems . In Proc. of the 13th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR 2012) , 2012 . F. Belardinelli, A. Lomuscio, and F. Patrizi. An abstraction technique for the verification of artifact-centric systems. In Proc. of the 13th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR 2012), 2012."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/237661.237692"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1083592.1083664"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.464.0703"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1793114.1793141"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.441.0145"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1970398.1970403"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31585-5_14"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/303976.304005"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74240-1_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(02)00397-3"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/163090.163095"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044482830-9\/50027-8"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17358-5_22"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(80)90032-X"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/320434.320440"},{"issue":"2","key":"e_1_3_2_1_54_1","first-page":"33","article-title":"Temporal inegrity constraints in relational databases","volume":"17","author":"Chomicki J.","year":"1994","unstructured":"J. Chomicki . Temporal inegrity constraints in relational databases . Bull. of the IEEE Computer Society Technical Committee on Data Engineering , 17 ( 2 ): 33 -- 37 , 1994 . J. Chomicki. Temporal inegrity constraints in relational databases. Bull. of the IEEE Computer Society Technical Committee on Data Engineering, 17(2):33--37, 1994.","journal-title":"Bull. of the IEEE Computer Society Technical Committee on Data Engineering"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/645548.659015"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/210197.210200"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/308386.308416"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/153850.153876"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1995.1088"},{"issue":"3","key":"e_1_3_2_1_60_1","first-page":"3","article-title":"Business artifacts: A data-centric approach to modeling business operations and processes","volume":"32","author":"Cohn D.","year":"2009","unstructured":"D. Cohn and R. Hull . Business artifacts: A data-centric approach to modeling business operations and processes . Bull. of the IEEE Computer Society Technical Committee on Data Engineering , 32 ( 3 ): 3 -- 9 , 2009 . D. Cohn and R. Hull. Business artifacts: A data-centric approach to modeling business operations and processes. Bull. of the IEEE Computer Society Technical Committee on Data Engineering, 32(3):3--9, 2009.","journal-title":"Bull. of the IEEE Computer Society Technical Committee on Data Engineering"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/2040283.2040287"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1938551.1938563"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338626.2338628"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2448496.2448517"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275491"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843012500025"},{"key":"e_1_3_2_1_67_1","first-page":"467","volume-title":"Proc. of the 13th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR 2012","author":"Giacomo G. De","year":"2012","unstructured":"G. De Giacomo , Y. Lesperance , and F. Patrizi . Bounded situation calculus action theories and decidable verification . In Proc. of the 13th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR 2012 ), pages 467 -- 477 , 2012 . G. De Giacomo, Y. Lesperance, and F. Patrizi. Bounded situation calculus action theories and decidable verification. In Proc. of the 13th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR 2012), pages 467--477, 2012."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2006.31"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989286"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514894.1514924"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066219"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055571"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2006.10.006"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142584"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142351.1142364"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/s002360050074"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.5555\/647444.727062"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.5555\/646485.694476"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.5555\/186908"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/6012.15406"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74974-5_15"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/588011.588055"},{"key":"e_1_3_2_1_83_1","first-page":"51","article-title":"Making the highly undecidable highly understandable","volume":"24","author":"Harel D.","year":"1985","unstructured":"D. Harel . Recurring dominoes : Making the highly undecidable highly understandable . Ann. of Discrete Mathematics , 24 : 51 -- 72 , 1985 . D. Harel. Recurring dominoes: Making the highly undecidable highly understandable. Ann. of Discrete Mathematics, 24:51--72, 1985.","journal-title":"Ann. of Discrete Mathematics"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1860702.1860704"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88873-4_17"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773154"},{"key":"e_1_3_2_1_87_1","volume-title":"Proc. of the Workshop on Cross-Organisational Workflow Management and Co-ordination","volume":"17","author":"Hull R.","year":"1999","unstructured":"R. Hull and J. Su . The Vortex approach to integration and coordination of workflows . In Proc. of the Workshop on Cross-Organisational Workflow Management and Co-ordination , volume 17 of CEUR Electronic Workshop Proceedings, http:\/\/ceur-ws.org\/ , 1999 . R. Hull and J. Su. The Vortex approach to integration and coordination of workflows. In Proc. of the Workshop on Cross-Organisational Workflow Management and Co-ordination, volume 17 of CEUR Electronic Workshop Proceedings, http:\/\/ceur-ws.org\/, 1999."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.755613"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/298514.298590"},{"key":"e_1_3_2_1_90_1","volume-title":"Report","author":"Karel R.","year":"2009","unstructured":"R. Karel , C. Richardson , and C. Moore . Warning: Don't assume your business processes use master data -- Synchronize your business process and master data strategies . Report , Forrester , Sept. 2009 . R. Karel, C. Richardson, and C. Moore. Warning: Don't assume your business processes use master data -- Synchronize your business process and master data strategies. Report, Forrester, Sept. 2009."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/73721.73754"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065176"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/588111.588158"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69534-9_3"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.5555\/1497079.1497082"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.5555\/55527.55548"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.5555\/1768029.1768061"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/588058.588080"},{"key":"e_1_3_2_1_99_1","first-page":"463","article-title":"Some philosophical problems from the standpoint of aritificial intelligence","volume":"4","author":"McCarthy J.","year":"1969","unstructured":"J. McCarthy and P. J. Hayes . Some philosophical problems from the standpoint of aritificial intelligence . Machine Intelligence , 4 : 463 -- 502 , 1969 . J. McCarthy and P. J. Hayes. Some philosophical problems from the standpoint of aritificial intelligence. Machine Intelligence, 4:463--502, 1969.","journal-title":"Machine Intelligence"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.423.0428"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2006.67"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/212433.220203"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.5555\/645502.656091"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33606-5_2"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.5555\/501599"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.5555\/645921.673318"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.5555\/1882061.1882065"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754589.1754619"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765871.1765917"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/588011.588041"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/588111.588130"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/335168.335212"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(02)00029-6"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.473.0415"},{"issue":"3","key":"e_1_3_2_1_116_1","first-page":"2","article-title":"Letter from the editor of the special issue on management of data-centric business work\u00efnCows","volume":"32","author":"Su J.","year":"2009","unstructured":"J. Su . Letter from the editor of the special issue on management of data-centric business work\u00efnCows . Bull. of the IEEE Computer Society Technical Committee on Data Engineering , 32 ( 3 ): 2 , Sept. 2009 . J. Su. Letter from the editor of the special issue on management of data-centric business work\u00efnCows. Bull. of the IEEE Computer Society Technical Committee on Data Engineering, 32(3):2, Sept. 2009.","journal-title":"Bull. of the IEEE Computer Society Technical Committee on Data Engineering"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.5555\/216136.216141"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32885-5_1"},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.5555\/2000715"},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.07.003"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/73560.73582"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_1"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/588058.588105"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.5555\/910810"},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/588011.588042"},{"key":"e_1_3_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514894.1514896"},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.5555\/647762.735516"}],"event":{"name":"SIGMOD\/PODS'13: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"New York New York USA","acronym":"SIGMOD\/PODS'13"},"container-title":["Proceedings of the 32nd ACM SIGMOD-SIGACT-SIGAI symposium on Principles of database systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2463664.2467796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T19:05:10Z","timestamp":1703185510000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2463664.2467796"}},"subtitle":["a database theory perspective"],"short-title":[],"issued":{"date-parts":[[2013,6,22]]},"references-count":126,"alternative-id":["10.1145\/2463664.2467796","10.1145\/2463664"],"URL":"https:\/\/doi.org\/10.1145\/2463664.2467796","relation":{},"subject":[],"published":{"date-parts":[[2013,6,22]]},"assertion":[{"value":"2013-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}