callback( { "result":{ "query":":facetid:toc:\"db/conf/icdt/icdt97.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"208.51" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"33", "@dc":"33", "@oc":"33", "@id":"43297203", "text":":facetid:toc:db/conf/icdt/icdt97.bht" } }, "hits":{ "@total":"33", "@computed":"33", "@sent":"33", "@first":"0", "hit":[{ "@score":"1", "@id":"6635566", "info":{"authors":{"author":[{"@pid":"21/3655","text":"Khaled A. S. Abdel-Ghaffar"},{"@pid":"a/AmrElAbbadi","text":"Amr El Abbadi"}]},"title":"Optimal Allocation of Two-Dimensional Data.","venue":"ICDT","pages":"409-418","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/Abdel-GhaffarA97","doi":"10.1007/3-540-62222-5_60","ee":"https://doi.org/10.1007/3-540-62222-5_60","url":"https://dblp.org/rec/conf/icdt/Abdel-GhaffarA97"}, "url":"URL#6635566" }, { "@score":"1", "@id":"6635567", "info":{"authors":{"author":{"@pid":"a/SergeAbiteboul","text":"Serge Abiteboul"}},"title":"Querying Semi-Structured Data.","venue":"ICDT","pages":"1-18","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/Abiteboul97","doi":"10.1007/3-540-62222-5_33","ee":"https://doi.org/10.1007/3-540-62222-5_33","url":"https://dblp.org/rec/conf/icdt/Abiteboul97"}, "url":"URL#6635567" }, { "@score":"1", "@id":"6635568", "info":{"authors":{"author":[{"@pid":"a/SergeAbiteboul","text":"Serge Abiteboul"},{"@pid":"c/SophieCluet","text":"Sophie Cluet"},{"@pid":"m/TovaMilo","text":"Tova Milo"}]},"title":"Correspondence and Translation for Heterogeneous Data.","venue":"ICDT","pages":"351-363","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/AbiteboulCM97","doi":"10.1007/3-540-62222-5_56","ee":"https://doi.org/10.1007/3-540-62222-5_56","url":"https://dblp.org/rec/conf/icdt/AbiteboulCM97"}, "url":"URL#6635568" }, { "@score":"1", "@id":"6635569", "info":{"authors":{"author":[{"@pid":"a/SergeAbiteboul","text":"Serge Abiteboul"},{"@pid":"v/VictorVianu","text":"Victor Vianu"}]},"title":"Queries and Computation on the Web.","venue":"ICDT","pages":"262-275","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/AbiteboulV97","doi":"10.1007/3-540-62222-5_50","ee":"https://doi.org/10.1007/3-540-62222-5_50","url":"https://dblp.org/rec/conf/icdt/AbiteboulV97"}, "url":"URL#6635569" }, { "@score":"1", "@id":"6635570", "info":{"authors":{"author":[{"@pid":"b/JamesBailey","text":"James Bailey 0001"},{"@pid":"04/1790","text":"Lobel Crnogorac"},{"@pid":"r/KRamamohanarao","text":"Kotagiri Ramamohanarao"},{"@pid":"s/HaraldSondergaard","text":"Harald Søndergaard"}]},"title":"Abstract Interpretation of Active Rules and its Use in Termination Analysis.","venue":"ICDT","pages":"188-202","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/BaileyCRS97","doi":"10.1007/3-540-62222-5_45","ee":"https://doi.org/10.1007/3-540-62222-5_45","url":"https://dblp.org/rec/conf/icdt/BaileyCRS97"}, "url":"URL#6635570" }, { "@score":"1", "@id":"6635571", "info":{"authors":{"author":[{"@pid":"b/JamesBailey","text":"James Bailey 0001"},{"@pid":"d/GuozhuDong","text":"Guozhu Dong"},{"@pid":"r/KRamamohanarao","text":"Kotagiri Ramamohanarao"}]},"title":"Structural Issues in Active Rule Systems.","venue":"ICDT","pages":"203-214","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/BaileyDR97","doi":"10.1007/3-540-62222-5_46","ee":"https://doi.org/10.1007/3-540-62222-5_46","url":"https://dblp.org/rec/conf/icdt/BaileyDR97"}, "url":"URL#6635571" }, { "@score":"1", "@id":"6635572", "info":{"authors":{"author":[{"@pid":"b/MichaelBenedikt","text":"Michael Benedikt"},{"@pid":"36/5048","text":"H. Jerome Keisler"}]},"title":"Expressive Power of Unary Counters.","venue":"ICDT","pages":"291-305","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/BenediktK97","doi":"10.1007/3-540-62222-5_52","ee":"https://doi.org/10.1007/3-540-62222-5_52","url":"https://dblp.org/rec/conf/icdt/BenediktK97"}, "url":"URL#6635572" }, { "@score":"1", "@id":"6635573", "info":{"authors":{"author":[{"@pid":"b/NicoleBidoit","text":"Nicole Bidoit"},{"@pid":"34/1515","text":"Sofian Maabout"}]},"title":"A Model Theoretic Approach to Update Rule Programs.","venue":"ICDT","pages":"173-187","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/BidoitM97","doi":"10.1007/3-540-62222-5_44","ee":"https://doi.org/10.1007/3-540-62222-5_44","url":"https://dblp.org/rec/conf/icdt/BidoitM97"}, "url":"URL#6635573" }, { "@score":"1", "@id":"6635574", "info":{"authors":{"author":[{"@pid":"b/PeterBuneman","text":"Peter Buneman"},{"@pid":"d/SBDavidson","text":"Susan B. Davidson"},{"@pid":"f/MaryFFernandez","text":"Mary F. Fernandez"},{"@pid":"s/DanSuciu","text":"Dan Suciu"}]},"title":"Adding Structure to Unstructured Data.","venue":"ICDT","pages":"336-350","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/BunemanDFS97","doi":"10.1007/3-540-62222-5_55","ee":"https://doi.org/10.1007/3-540-62222-5_55","url":"https://dblp.org/rec/conf/icdt/BunemanDFS97"}, "url":"URL#6635574" }, { "@score":"1", "@id":"6635575", "info":{"authors":{"author":[{"@pid":"82/3212","text":"Chandra Chekuri"},{"@pid":"r/ARajaraman","text":"Anand Rajaraman"}]},"title":"Conjunctive Query Containment Revisited.","venue":"ICDT","pages":"56-70","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/ChekuriR97","doi":"10.1007/3-540-62222-5_36","ee":"https://doi.org/10.1007/3-540-62222-5_36","url":"https://dblp.org/rec/conf/icdt/ChekuriR97"}, "url":"URL#6635575" }, { "@score":"1", "@id":"6635576", "info":{"authors":{"author":[{"@pid":"83/5689","text":"Latha S. Colby"},{"@pid":"l/LeonidLibkin","text":"Leonid Libkin"}]},"title":"Tractable Iteration Mechanisms for Bag Languages.","venue":"ICDT","pages":"461-475","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/ColbyL97","doi":"10.1007/3-540-62222-5_64","ee":"https://doi.org/10.1007/3-540-62222-5_64","url":"https://dblp.org/rec/conf/icdt/ColbyL97"}, "url":"URL#6635576" }, { "@score":"1", "@id":"6635577", "info":{"authors":{"author":[{"@pid":"d/GuozhuDong","text":"Guozhu Dong"},{"@pid":"l/LeonidLibkin","text":"Leonid Libkin"},{"@pid":"w/LimsoonWong","text":"Limsoon Wong"}]},"title":"Local Properties of Query Languages.","venue":"ICDT","pages":"140-154","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/DongLW97","doi":"10.1007/3-540-62222-5_42","ee":"https://doi.org/10.1007/3-540-62222-5_42","url":"https://dblp.org/rec/conf/icdt/DongLW97"}, "url":"URL#6635577" }, { "@score":"1", "@id":"6635578", "info":{"authors":{"author":[{"@pid":"f/RonaldFagin","text":"Ronald Fagin"},{"@pid":"68/2431","text":"Edward L. Wimmers"}]},"title":"Incorporating User Preferences in Multimedia Queries.","venue":"ICDT","pages":"247-261","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/FaginW97","doi":"10.1007/3-540-62222-5_49","ee":"https://doi.org/10.1007/3-540-62222-5_49","url":"https://dblp.org/rec/conf/icdt/FaginW97"}, "url":"URL#6635578" }, { "@score":"1", "@id":"6635579", "info":{"authors":{"author":[{"@pid":"55/2850","text":"Jörg Flum"},{"@pid":"48/4253","text":"Max Kubierschky"},{"@pid":"l/BertramLudascher","text":"Bertram Ludäscher"}]},"title":"Total and Partial Well-Founded Datalog Coincide.","venue":"ICDT","pages":"113-124","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/FlumKL97","doi":"10.1007/3-540-62222-5_40","ee":"https://doi.org/10.1007/3-540-62222-5_40","url":"https://dblp.org/rec/conf/icdt/FlumKL97"}, "url":"URL#6635579" }, { "@score":"1", "@id":"6635580", "info":{"authors":{"author":[{"@pid":"g/GostaGrahne","text":"Gösta Grahne"},{"@pid":"s/NicolasSpyratos","text":"Nicolas Spyratos"},{"@pid":"49/3534","text":"Daniel Stamate"}]},"title":"Semantics and Containment with Internal and External Conjunctions.","venue":"ICDT","pages":"71-82","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/GrahneSS97","doi":"10.1007/3-540-62222-5_37","ee":"https://doi.org/10.1007/3-540-62222-5_37","url":"https://dblp.org/rec/conf/icdt/GrahneSS97"}, "url":"URL#6635580" }, { "@score":"1", "@id":"6635581", "info":{"authors":{"author":[{"@pid":"g/DimitriosGunopulos","text":"Dimitrios Gunopulos"},{"@pid":"m/HMannila","text":"Heikki Mannila"},{"@pid":"74/4799","text":"Sanjeev Saluja"}]},"title":"Discovering All Most Specific Sentences by Randomized Algorithms.","venue":"ICDT","pages":"215-229","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/GunopoulosMS97","doi":"10.1007/3-540-62222-5_47","ee":"https://doi.org/10.1007/3-540-62222-5_47","url":"https://dblp.org/rec/conf/icdt/GunopoulosMS97"}, "url":"URL#6635581" }, { "@score":"1", "@id":"6635582", "info":{"authors":{"author":{"@pid":"g/HimanshuGupta","text":"Himanshu Gupta 0001"}},"title":"Selection of Views to Materialize in a Data Warehouse.","venue":"ICDT","pages":"98-112","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/Gupta97","doi":"10.1007/3-540-62222-5_39","ee":"https://doi.org/10.1007/3-540-62222-5_39","url":"https://dblp.org/rec/conf/icdt/Gupta97"}, "url":"URL#6635582" }, { "@score":"1", "@id":"6635583", "info":{"authors":{"author":[{"@pid":"h/UgurHalici","text":"Ugur Halici"},{"@pid":"b/IBudakArpinar","text":"Ismailcem Budak Arpinar"},{"@pid":"d/ADogac","text":"Asuman Dogac"}]},"title":"Serializability of Nested Transactions in Multidatabases.","venue":"ICDT","pages":"321-335","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/HaliciAD97","doi":"10.1007/3-540-62222-5_54","ee":"https://doi.org/10.1007/3-540-62222-5_54","url":"https://dblp.org/rec/conf/icdt/HaliciAD97"}, "url":"URL#6635583" }, { "@score":"1", "@id":"6635584", "info":{"authors":{"author":{"@pid":"h/NamHuyn","text":"Nam Huyn"}},"title":"Efficient Complete Local Tests for Conjunctive Query Constraints with Negation.","venue":"ICDT","pages":"82-97","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/Huyn97","doi":"10.1007/3-540-62222-5_38","ee":"https://doi.org/10.1007/3-540-62222-5_38","url":"https://dblp.org/rec/conf/icdt/Huyn97"}, "url":"URL#6635584" }, { "@score":"1", "@id":"6635585", "info":{"authors":{"author":[{"@pid":"28/2411","text":"Yasunori Ishihara"},{"@pid":"09/4711","text":"Hiroyuki Seki"},{"@pid":"71/1470","text":"Minoru Ito"}]},"title":"Type-Consistency Problems for Queries in Object-Oriented Databases.","venue":"ICDT","pages":"364-378","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/IshiharaSI97","doi":"10.1007/3-540-62222-5_57","ee":"https://doi.org/10.1007/3-540-62222-5_57","url":"https://dblp.org/rec/conf/icdt/IshiharaSI97"}, "url":"URL#6635585" }, { "@score":"1", "@id":"6635586", "info":{"authors":{"author":[{"@pid":"92/5851","text":"Akira Kawaguchi"},{"@pid":"l/DFLieuwen","text":"Daniel F. Lieuwen"},{"@pid":"m/ISMumick","text":"Inderpal Singh Mumick"},{"@pid":"q/DQuass","text":"Dallan Quass"},{"@pid":"r/KARoss","text":"Kenneth A. Ross"}]},"title":"Concurrency Control Theory for Deferred Materialized Views.","venue":"ICDT","pages":"306-320","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/KawaguchiLMQR97","doi":"10.1007/3-540-62222-5_53","ee":"https://doi.org/10.1007/3-540-62222-5_53","url":"https://dblp.org/rec/conf/icdt/KawaguchiLMQR97"}, "url":"URL#6635586" }, { "@score":"1", "@id":"6635587", "info":{"authors":{"author":[{"@pid":"k/BartKuijpers","text":"Bart Kuijpers"},{"@pid":"p/JParedaens","text":"Jan Paredaens"},{"@pid":"b/JVdBussche","text":"Jan Van den Bussche"}]},"title":"On Topological Elementary Equivalence of Spatial Databases.","venue":"ICDT","pages":"432-446","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/KuijpersPB97","doi":"10.1007/3-540-62222-5_62","ee":"https://doi.org/10.1007/3-540-62222-5_62","url":"https://dblp.org/rec/conf/icdt/KuijpersPB97"}, "url":"URL#6635587" }, { "@score":"1", "@id":"6635588", "info":{"authors":{"author":[{"@pid":"23/6894","text":"Jean-Bernard Lagorce"},{"@pid":"15/1147","text":"Arunas Stockus"},{"@pid":"w/EmmanuelWaller","text":"Emmanuel Waller"}]},"title":"Object-Oriented Database Evolution.","venue":"ICDT","pages":"379-393","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/LagorceSW97","doi":"10.1007/3-540-62222-5_58","ee":"https://doi.org/10.1007/3-540-62222-5_58","url":"https://dblp.org/rec/conf/icdt/LagorceSW97"}, "url":"URL#6635588" }, { "@score":"1", "@id":"6635589", "info":{"authors":{"author":{"@pid":"l/PLiberatore","text":"Paolo Liberatore"}},"title":"The Complexity of Iterated Belief Revision.","venue":"ICDT","pages":"276-290","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/Liberatore97","doi":"10.1007/3-540-62222-5_51","ee":"https://doi.org/10.1007/3-540-62222-5_51","url":"https://dblp.org/rec/conf/icdt/Liberatore97"}, "url":"URL#6635589" }, { "@score":"1", "@id":"6635590", "info":{"authors":{"author":{"@pid":"m/HMannila","text":"Heikki Mannila"}},"title":"Methods and Problems in Data Mining.","venue":"ICDT","pages":"41-55","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/Mannila97","doi":"10.1007/3-540-62222-5_35","ee":"https://doi.org/10.1007/3-540-62222-5_35","url":"https://dblp.org/rec/conf/icdt/Mannila97"}, "url":"URL#6635590" }, { "@score":"1", "@id":"6635591", "info":{"authors":{"author":[{"@pid":"p/ANPapadopoulos","text":"Apostolos Papadopoulos"},{"@pid":"m/YManolopoulos","text":"Yannis Manolopoulos"}]},"title":"Performance of Nearest Neighbor Queries in R-Trees.","venue":"ICDT","pages":"394-408","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/PapadopoulosM97","doi":"10.1007/3-540-62222-5_59","ee":"https://doi.org/10.1007/3-540-62222-5_59","url":"https://dblp.org/rec/conf/icdt/PapadopoulosM97"}, "url":"URL#6635591" }, { "@score":"1", "@id":"6635592", "info":{"authors":{"author":[{"@pid":"p/PPicouet","text":"Philippe Picouet"},{"@pid":"v/VictorVianu","text":"Victor Vianu"}]},"title":"Expressiveness and Complexity of Active Databases.","venue":"ICDT","pages":"155-172","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/PicouetV97","doi":"10.1007/3-540-62222-5_43","ee":"https://doi.org/10.1007/3-540-62222-5_43","url":"https://dblp.org/rec/conf/icdt/PicouetV97"}, "url":"URL#6635592" }, { "@score":"1", "@id":"6635593", "info":{"authors":{"author":{"@pid":"85/6371","text":"Sridhar Ramaswamy"}},"title":"Efficient Indexing for Constraint and Temporal Databases.","venue":"ICDT","pages":"419-431","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/Ramaswamy97","doi":"10.1007/3-540-62222-5_61","ee":"https://doi.org/10.1007/3-540-62222-5_61","url":"https://dblp.org/rec/conf/icdt/Ramaswamy97"}, "url":"URL#6635593" }, { "@score":"1", "@id":"6635594", "info":{"authors":{"author":{"@pid":"r/PZRevesz","text":"Peter Z. Revesz"}},"title":"Model-Theoretic Minimal Chenge Operators for Constraint Databases.","venue":"ICDT","pages":"447-460","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/Revesz97","doi":"10.1007/3-540-62222-5_63","ee":"https://doi.org/10.1007/3-540-62222-5_63","url":"https://dblp.org/rec/conf/icdt/Revesz97"}, "url":"URL#6635594" }, { "@score":"1", "@id":"6635595", "info":{"authors":{"author":{"@pid":"68/5160","text":"Jerzy Tyszkiewicz"}},"title":"Fine Hierarchies of Generic Computation.","venue":"ICDT","pages":"125-139","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/Tyszkiewicz97","doi":"10.1007/3-540-62222-5_41","ee":"https://doi.org/10.1007/3-540-62222-5_41","url":"https://dblp.org/rec/conf/icdt/Tyszkiewicz97"}, "url":"URL#6635595" }, { "@score":"1", "@id":"6635596", "info":{"authors":{"author":{"@pid":"u/JeffreyDUllman","text":"Jeffrey D. Ullman"}},"title":"Information Integration Using Logical Views.","venue":"ICDT","pages":"19-40","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/Ullman97","doi":"10.1007/3-540-62222-5_34","ee":"https://doi.org/10.1007/3-540-62222-5_34","url":"https://dblp.org/rec/conf/icdt/Ullman97"}, "url":"URL#6635596" }, { "@score":"1", "@id":"6635597", "info":{"authors":{"author":[{"@pid":"06/2204","text":"Dirk Wodtke"},{"@pid":"w/GerhardWeikum","text":"Gerhard Weikum"}]},"title":"A Formal Foundation for Distributed Workflow Execution Based on State Charts.","venue":"ICDT","pages":"230-246","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdt/WodtkeW97","doi":"10.1007/3-540-62222-5_48","ee":"https://doi.org/10.1007/3-540-62222-5_48","url":"https://dblp.org/rec/conf/icdt/WodtkeW97"}, "url":"URL#6635597" }, { "@score":"1", "@id":"6651813", "info":{"authors":{"author":[{"@pid":"a/FotoNAfrati","text":"Foto N. Afrati"},{"@pid":"k/PGKolaitis","text":"Phokion G. Kolaitis"}]},"title":"Database Theory - ICDT '97, 6th International Conference, Delphi, Greece, January 8-10, 1997, Proceedings","venue":["ICDT","Lecture Notes in Computer Science"],"volume":"1186","publisher":"Springer","year":"1997","type":"Editorship","key":"conf/icdt/97","doi":"10.1007/3-540-62222-5","ee":"https://doi.org/10.1007/3-540-62222-5","url":"https://dblp.org/rec/conf/icdt/97"}, "url":"URL#6651813" } ] } } } )