


default search action
Essays Dedicated Peter Buneman 2013
- Val Tannen, Limsoon Wong, Leonid Libkin, Wenfei Fan

, Wang-Chiew Tan, Michael P. Fourman:
In Search of Elegance in the Theory and Practice of Computation - Essays Dedicated to Peter Buneman. Lecture Notes in Computer Science 8000, Springer 2013, ISBN 978-3-642-41659-0 - Serge Abiteboul, Victor Vianu:

Models for Data-Centric Workflows. 1-12 - Samson Abramsky

:
Relational Databases and Bell's Theorem. 13-35 - Bogdan Alexe, Douglas Burdick, Mauricio A. Hernández, Georgia Koutrika, Rajasekar Krishnamurthy, Lucian Popa, Ioana Stanoi, Ryan Wisnesky:

High-Level Rules for Integration and Analysis of Data: New Challenges. 36-55 - Bogdan Alexe, Wang-Chiew Tan:

A New Framework for Designing Schema Mappings. 56-88 - David W. Archer, Lois M. L. Delcambre, David Maier:

User Trust and Judgments in a Curated Database with Explicit Provenance. 89-111 - Hassan Aït-Kaci:

An Abstract, Reusable, and Extensible Programming Language Design Architecture. 112-166 - Magdalena Balazinska, Bill Howe, Paraschos Koutris, Dan Suciu

, Prasang Upadhyaya:
A Discussion on Pricing Relational Data. 167-173 - Andrea Calì, Georg Gottlob, Andreas Pieris:

Tractable Reasoning in Description Logics with Functionality Constraints. 174-192 - James Cheney

, Umut A. Acar, Roly Perera
:
Toward a Theory of Self-explaining Computation. 193-216 - Susan B. Davidson, Sanjeev Khanna, Tova Milo:

To Show or Not to Show in Workflow Provenance. 217-226 - Alin Deutsch, Richard Hull:

Provenance-Directed Chase&Backchase. 227-236 - Wenfei Fan

, Floris Geerts
, Shuai Ma, Nan Tang, Wenyuan Yu:
Data Quality Problems beyond Consistency and Deduplication. 237-249 - Michael P. Fourman:

Hitting Buneman Circles. 250-258 - Floris Geerts

, Anastasios Kementsietsidis, Heiko Müller:
Looking at the World Thru Colored Glasses. 259-272 - Amélie Gheerbrant, Leonid Libkin

, Juan L. Reutter:
Static Analysis and Query Answering for Incomplete Data Trees with Constraints. 273-290 - Boris Glavic, Renée J. Miller, Gustavo Alonso:

Using SQL for Efficient Generation and Querying of Provenance Information. 291-320 - Martin Grohe:

Bounds and Algorithms for Joins via Fractional Edge Covers. 321-338 - Carmem Satie Hara

, Cristina Dutra de Aguiar Ciferri, Ricardo Rodrigues Ciferri:
Incremental Data Fusion Based on Provenance Information. 339-365 - Grigoris Karvounarakis, Irini Fundulaki, Vassilis Christophides:

Provenance for Linked Data. 366-381 - Sven Köhler, Bertram Ludäscher, Daniel Zinn:

First-Order Provenance Games. 382-399 - Natalia Kwasnikowska, Jan Van den Bussche

:
Querying an Integrated Complex-Object Dataflow Database. 400-417 - Rishiyur S. Nikhil:

Types, Functional Programming and Atomic Transactions in Hardware Design. 418-431 - Atsushi Ohori:

Record Polymorphism: Its Development and Applications. 432-444 - Gordon D. Plotkin:

A Calculus of Chemical Systems. 445-465 - Keishi Tajima:

Schemaless Semistructured Data Revisited - - Reinventing Peter Buneman's Deterministic Semistructured Data Model -. 466-482 - Val Tannen:

Provenance Propagation in Complex Queries. 483-493 - Jan Van den Bussche

, Stijn Vansummeren:
Well-Defined NRC Queries Can Be Typed - (Extended Abstract). 494-506 - Stratis Viglas:

Nine Years with Peter Buneman. 507-515 - Daniel N. Osherson, Scott Weinstein:

Modal Logic for Preference Based on Reasons. 516-541 - Limsoon Wong:

The Dichotomous Intensional Expressive Power of the Nested Relational Calculus with Powerset. 542-556 - Jing Zhang, H. V. Jagadish:

Provenance in a Modifiable Data Set. 557-567

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














