default search action
Essays Dedicated Peter Buneman 2013
- Val Tannen, Limsoon Wong, Leonid Libkin, Wenfei Fan, Wang-Chiew Tan, Michael P. Fourman:
In Search of Elegance in the Theory and Practice of Computation - Essays Dedicated to Peter Buneman. Lecture Notes in Computer Science 8000, Springer 2013, ISBN 978-3-642-41659-0 - Serge Abiteboul, Victor Vianu:
Models for Data-Centric Workflows. 1-12 - Samson Abramsky:
Relational Databases and Bell's Theorem. 13-35 - Bogdan Alexe, Douglas Burdick, Mauricio A. Hernández, Georgia Koutrika, Rajasekar Krishnamurthy, Lucian Popa, Ioana Stanoi, Ryan Wisnesky:
High-Level Rules for Integration and Analysis of Data: New Challenges. 36-55 - Bogdan Alexe, Wang-Chiew Tan:
A New Framework for Designing Schema Mappings. 56-88 - David W. Archer, Lois M. L. Delcambre, David Maier:
User Trust and Judgments in a Curated Database with Explicit Provenance. 89-111 - Hassan Aït-Kaci:
An Abstract, Reusable, and Extensible Programming Language Design Architecture. 112-166 - Magdalena Balazinska, Bill Howe, Paraschos Koutris, Dan Suciu, Prasang Upadhyaya:
A Discussion on Pricing Relational Data. 167-173 - Andrea Calì, Georg Gottlob, Andreas Pieris:
Tractable Reasoning in Description Logics with Functionality Constraints. 174-192 - James Cheney, Umut A. Acar, Roly Perera:
Toward a Theory of Self-explaining Computation. 193-216 - Susan B. Davidson, Sanjeev Khanna, Tova Milo:
To Show or Not to Show in Workflow Provenance. 217-226 - Alin Deutsch, Richard Hull:
Provenance-Directed Chase&Backchase. 227-236 - Wenfei Fan, Floris Geerts, Shuai Ma, Nan Tang, Wenyuan Yu:
Data Quality Problems beyond Consistency and Deduplication. 237-249 - Michael P. Fourman:
Hitting Buneman Circles. 250-258 - Floris Geerts, Anastasios Kementsietsidis, Heiko Müller:
Looking at the World Thru Colored Glasses. 259-272 - Amélie Gheerbrant, Leonid Libkin, Juan L. Reutter:
Static Analysis and Query Answering for Incomplete Data Trees with Constraints. 273-290 - Boris Glavic, Renée J. Miller, Gustavo Alonso:
Using SQL for Efficient Generation and Querying of Provenance Information. 291-320 - Martin Grohe:
Bounds and Algorithms for Joins via Fractional Edge Covers. 321-338 - Carmem Satie Hara, Cristina Dutra de Aguiar Ciferri, Ricardo Rodrigues Ciferri:
Incremental Data Fusion Based on Provenance Information. 339-365 - Grigoris Karvounarakis, Irini Fundulaki, Vassilis Christophides:
Provenance for Linked Data. 366-381 - Sven Köhler, Bertram Ludäscher, Daniel Zinn:
First-Order Provenance Games. 382-399 - Natalia Kwasnikowska, Jan Van den Bussche:
Querying an Integrated Complex-Object Dataflow Database. 400-417 - Rishiyur S. Nikhil:
Types, Functional Programming and Atomic Transactions in Hardware Design. 418-431 - Atsushi Ohori:
Record Polymorphism: Its Development and Applications. 432-444 - Gordon D. Plotkin:
A Calculus of Chemical Systems. 445-465 - Keishi Tajima:
Schemaless Semistructured Data Revisited - - Reinventing Peter Buneman's Deterministic Semistructured Data Model -. 466-482 - Val Tannen:
Provenance Propagation in Complex Queries. 483-493 - Jan Van den Bussche, Stijn Vansummeren:
Well-Defined NRC Queries Can Be Typed - (Extended Abstract). 494-506 - Stratis Viglas:
Nine Years with Peter Buneman. 507-515 - Daniel N. Osherson, Scott Weinstein:
Modal Logic for Preference Based on Reasons. 516-541 - Limsoon Wong:
The Dichotomous Intensional Expressive Power of the Nested Relational Calculus with Powerset. 542-556 - Jing Zhang, H. V. Jagadish:
Provenance in a Modifiable Data Set. 557-567
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.