cs0507067/main.bbl
1: \begin{thebibliography}{}
2: 
3: \bibitem[\protect\citeauthoryear{Abiteboul and Duschka}{Abiteboul and
4:   Duschka}{1998}]{AbDu98}
5: {\sc Abiteboul, S.} {\sc and} {\sc Duschka, O.} 1998.
6: \newblock Complexity of answering queries using materialized views.
7: \newblock In {\em Proc.\ of the 17th ACM SIGACT SIGMOD SIGART Symp.\ on
8:   Principles of Database Systems (PODS'98)}. 254--265.
9: 
10: \bibitem[\protect\citeauthoryear{Abiteboul, Hull, and Vianu}{Abiteboul
11:   et~al\mbox{.}}{1995}]{AbHV95}
12: {\sc Abiteboul, S.}, {\sc Hull, R.}, {\sc and} {\sc Vianu, V.} 1995.
13: \newblock {\em Foundations of Databases}.
14: \newblock Addison Wesley Publ.\ Co., Reading, Massachussetts.
15: 
16: \bibitem[\protect\citeauthoryear{Aho, Sagiv, and Ullman}{Aho
17:   et~al\mbox{.}}{1979a}]{AhSU79}
18: {\sc Aho, A.~V.}, {\sc Sagiv, Y.}, {\sc and} {\sc Ullman, J.~D.} 1979a.
19: \newblock Efficient optimization of a class of relational expressions.
20: \newblock {\em {ACM} Trans.\ on Database Systems\/}~{\em 4}, 297--314.
21: 
22: \bibitem[\protect\citeauthoryear{Aho, Sagiv, and Ullman}{Aho
23:   et~al\mbox{.}}{1979b}]{AhSU79b}
24: {\sc Aho, A.~V.}, {\sc Sagiv, Y.}, {\sc and} {\sc Ullman, J.~D.} 1979b.
25: \newblock Equivalence among relational expressions.
26: \newblock {\em {SIAM} J.\ on Computing\/}~{\em 8}, 218--246.
27: 
28: \bibitem[\protect\citeauthoryear{Amir, Park, Tewari, and Padmanabhan}{Amir
29:   et~al\mbox{.}}{2003}]{APTP03}
30: {\sc Amir, K.}, {\sc Park, S.}, {\sc Tewari, R.}, {\sc and} {\sc Padmanabhan,
31:   S.} 2003.
32: \newblock Scalable template-based query containment checking for web semantic
33:   caches.
34: \newblock In {\em Proc.\ of the 19th IEEE Int.\ Conf.\ on Data Engineering
35:   (ICDE~2003)}. 493--504.
36: 
37: \bibitem[\protect\citeauthoryear{Baader, Calvanese, McGuinness, Nardi, and
38:   Patel-Schneider}{Baader et~al\mbox{.}}{2003}]{BCMNP03}
39: {\sc Baader, F.}, {\sc Calvanese, D.}, {\sc McGuinness, D.}, {\sc Nardi, D.},
40:   {\sc and} {\sc Patel-Schneider, P.~F.}, Eds. 2003.
41: \newblock {\em The Description Logic Handbook: {T}heory, Implementation and
42:   Applications}.
43: \newblock Cambridge University Press.
44: 
45: \bibitem[\protect\citeauthoryear{Bonatti}{Bonatti}{2004}]{Bona04}
46: {\sc Bonatti, P.~A.} 2004.
47: \newblock On the decidability of containment of recursive datalog queries -
48:   preliminary report.
49: \newblock In {\em Proc.\ of the 23rd ACM SIGACT SIGMOD SIGART Symp.\ on
50:   Principles of Database Systems (PODS~2004)}. 297--306.
51: 
52: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, and
53:   Lenzerini}{Calvanese et~al\mbox{.}}{1995}]{CaDL95}
54: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc and} {\sc Lenzerini, M.} 1995.
55: \newblock Structured objects: {M}odeling and reasoning.
56: \newblock In {\em Proc.\ of the 4th Int.\ Conf.\ on Deductive and
57:   Object-Oriented Databases (DOOD'95)}. Lecture Notes in Computer Science, vol.
58:   1013. Springer, 229--246.
59: 
60: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, and
61:   Lenzerini}{Calvanese et~al\mbox{.}}{1998}]{CaDL98}
62: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc and} {\sc Lenzerini, M.} 1998.
63: \newblock On the decidability of query containment under constraints.
64: \newblock In {\em Proc.\ of the 17th ACM SIGACT SIGMOD SIGART Symp.\ on
65:   Principles of Database Systems (PODS'98)}. 149--158.
66: 
67: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, and
68:   Lenzerini}{Calvanese et~al\mbox{.}}{2001}]{CaDL01}
69: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc and} {\sc Lenzerini, M.} 2001.
70: \newblock Identification constraints and functional dependencies in description
71:   logics.
72: \newblock In {\em Proc.\ of the 17th Int.\ Joint Conf.\ on Artificial
73:   Intelligence (IJCAI~2001)}. 155--160.
74: 
75: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, Lenzerini, and
76:   Nardi}{Calvanese et~al\mbox{.}}{2001}]{CDLN01}
77: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc Lenzerini, M.}, {\sc and} {\sc
78:   Nardi, D.} 2001.
79: \newblock Reasoning in expressive description logics.
80: \newblock In {\em Handbook of Automated Reasoning}, {A.~Robinson} {and}
81:   {A.~Voronkov}, Eds. Vol.~II. Elsevier Science Publishers (North-Holland),
82:   Amsterdam, Chapter~23, 1581--1634.
83: 
84: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, Lenzerini, Nardi, and
85:   Rosati}{Calvanese et~al\mbox{.}}{1998}]{CDLNR98}
86: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc Lenzerini, M.}, {\sc Nardi,
87:   D.}, {\sc and} {\sc Rosati, R.} 1998.
88: \newblock Description logic framework for information integration.
89: \newblock In {\em Proc.\ of the 6th Int.\ Conf.\ on Principles of Knowledge
90:   Representation and Reasoning (KR'98)}. 2--13.
91: 
92: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, Lenzerini, and
93:   Vardi}{Calvanese et~al\mbox{.}}{2000}]{CDLV00b}
94: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc Lenzerini, M.}, {\sc and} {\sc
95:   Vardi, M.~Y.} 2000.
96: \newblock Containment of conjunctive regular path queries with inverse.
97: \newblock In {\em Proc.\ of the 7th Int.\ Conf.\ on Principles of Knowledge
98:   Representation and Reasoning (KR~2000)}. 176--185.
99: 
100: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, Lenzerini, and
101:   Vardi}{Calvanese et~al\mbox{.}}{2002}]{CDLV02b}
102: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc Lenzerini, M.}, {\sc and} {\sc
103:   Vardi, M.~Y.} 2002.
104: \newblock View-based query answering and query containment over semistructured
105:   data.
106: \newblock In {\em Revised Papers of the 8th International Workshop on Database
107:   Programming Languages (DBPL~2001)}, {G.~Ghelli} {and} {G.~Grahne}, Eds.
108:   Lecture Notes in Computer Science, vol. 2397. Springer, 40--61.
109: 
110: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, and Vardi}{Calvanese
111:   et~al\mbox{.}}{2003}]{CaDV03}
112: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc and} {\sc Vardi, M.~Y.} 2003.
113: \newblock Decidable containment of recursive queries.
114: \newblock In {\em Proc.\ of the 9th Int.\ Conf.\ on Database Theory
115:   (ICDT~2003)}. Lecture Notes in Computer Science, vol. 2572. Springer,
116:   330--345.
117: 
118: \bibitem[\protect\citeauthoryear{Calvanese and Rosati}{Calvanese and
119:   Rosati}{2003}]{CaRo03}
120: {\sc Calvanese, D.} {\sc and} {\sc Rosati, R.} 2003.
121: \newblock Answering recursive queries under keys and foreign keys is
122:   undecidable.
123: \newblock In {\em Proc.\ of the 10th Int.\ Workshop on Knowledge Representation
124:   meets Databases (KRDB~2003)}. CEUR Electronic Workshop Proceedings,
125:   \url{http://ceur-ws.org/Vol-79/}.
126: 
127: \bibitem[\protect\citeauthoryear{Catarci and Lenzerini}{Catarci and
128:   Lenzerini}{1993}]{CaLe93}
129: {\sc Catarci, T.} {\sc and} {\sc Lenzerini, M.} 1993.
130: \newblock Representing and using interschema knowledge in cooperative
131:   information systems.
132: \newblock {\em J.\ of Intelligent and Cooperative Information Systems\/}~{\em
133:   2,\/}~4, 375--398.
134: 
135: \bibitem[\protect\citeauthoryear{Chan}{Chan}{1992}]{Chan92}
136: {\sc Chan, E. P.~F.} 1992.
137: \newblock Containment and minimization of positive conjunctive queries in
138:   {OODB's}.
139: \newblock In {\em Proc.\ of the 11th ACM SIGACT SIGMOD SIGART Symp.\ on
140:   Principles of Database Systems (PODS'92)}. 202--211.
141: 
142: \bibitem[\protect\citeauthoryear{Chandra and Merlin}{Chandra and
143:   Merlin}{1977}]{ChMe77}
144: {\sc Chandra, A.~K.} {\sc and} {\sc Merlin, P.~M.} 1977.
145: \newblock Optimal implementation of conjunctive queries in relational data
146:   bases.
147: \newblock In {\em Proc.\ of the 9th ACM Symp.\ on Theory of Computing
148:   (STOC'77)}. 77--90.
149: 
150: \bibitem[\protect\citeauthoryear{Chandra and Vardi}{Chandra and
151:   Vardi}{1985}]{ChVa85}
152: {\sc Chandra, A.~K.} {\sc and} {\sc Vardi, M.~Y.} 1985.
153: \newblock The implication problem for functional and inclusion dependencies is
154:   undecidable.
155: \newblock {\em {SIAM} J.\ on Computing\/}~{\em 14,\/}~3, 671--677.
156: 
157: \bibitem[\protect\citeauthoryear{Chaudhuri and Vardi}{Chaudhuri and
158:   Vardi}{1992}]{ChVa92}
159: {\sc Chaudhuri, S.} {\sc and} {\sc Vardi, M.~Y.} 1992.
160: \newblock On the equivalence of recursive and nonrecursive {D}atalog programs.
161: \newblock In {\em Proc.\ of the 11th ACM SIGACT SIGMOD SIGART Symp.\ on
162:   Principles of Database Systems (PODS'92)}. 55--66.
163: 
164: \bibitem[\protect\citeauthoryear{Chekuri and Rajaraman}{Chekuri and
165:   Rajaraman}{1997}]{ChRa97}
166: {\sc Chekuri, C.} {\sc and} {\sc Rajaraman, A.} 1997.
167: \newblock Conjunctive query containment revisited.
168: \newblock In {\em Proc.\ of the 6th Int.\ Conf.\ on Database Theory (ICDT'97)}.
169:   56--70.
170: 
171: \bibitem[\protect\citeauthoryear{De~Giacomo and Lenzerini}{De~Giacomo and
172:   Lenzerini}{1996}]{DeLe96}
173: {\sc De~Giacomo, G.} {\sc and} {\sc Lenzerini, M.} 1996.
174: \newblock {TBox} and {ABox} reasoning in expressive description logics.
175: \newblock In {\em Proc.\ of the 5th Int.\ Conf.\ on the Principles of Knowledge
176:   Representation and Reasoning (KR'96)}. 316--327.
177: 
178: \bibitem[\protect\citeauthoryear{Dong and Su}{Dong and Su}{1996}]{DoSu96}
179: {\sc Dong, G.} {\sc and} {\sc Su, J.} 1996.
180: \newblock Conjunctive query containment with respect to views and constraints.
181: \newblock {\em Information Processing Lett.\/}~{\em 57,\/}~2, 95--102.
182: 
183: \bibitem[\protect\citeauthoryear{Donini, Lenzerini, Nardi, and Schaerf}{Donini
184:   et~al\mbox{.}}{1998}]{DLNS98}
185: {\sc Donini, F.~M.}, {\sc Lenzerini, M.}, {\sc Nardi, D.}, {\sc and} {\sc
186:   Schaerf, A.} 1998.
187: \newblock {${\cal AL}$-log}: Integrating {D}atalog and description logics.
188: \newblock {\em J.\ of Intelligent Information Systems\/}~{\em 10,\/}~3,
189:   227--252.
190: 
191: \bibitem[\protect\citeauthoryear{Fattorosi-Barnaba and
192:   De~Caro}{Fattorosi-Barnaba and De~Caro}{1985}]{FaDe85}
193: {\sc Fattorosi-Barnaba, M.} {\sc and} {\sc De~Caro, F.} 1985.
194: \newblock Graded modalities {I}.
195: \newblock {\em Studia Logica\/}~{\em 44}, 197--221.
196: 
197: \bibitem[\protect\citeauthoryear{Fischer and Ladner}{Fischer and
198:   Ladner}{1979}]{FiLa79}
199: {\sc Fischer, M.~J.} {\sc and} {\sc Ladner, R.~E.} 1979.
200: \newblock Propositional dynamic logic of regular programs.
201: \newblock {\em J.\ of Computer and System Sciences\/}~{\em 18}, 194--211.
202: 
203: \bibitem[\protect\citeauthoryear{Gruber}{Gruber}{1993}]{Grub93}
204: {\sc Gruber, T.~R.} 1993.
205: \newblock Towards principles for the design of ontologies used for knowledge
206:   sharing.
207: \newblock In {\em Formal Ontology in Conceptual Analysis and Knowledge
208:   Representation}, {N.~Guarino} {and} {R.~Poli}, Eds. Kluwer Academic
209:   Publisher.
210: 
211: \bibitem[\protect\citeauthoryear{Gupta and Mumick}{Gupta and
212:   Mumick}{1995}]{GuMu95}
213: {\sc Gupta, A.} {\sc and} {\sc Mumick, I.~S.} 1995.
214: \newblock Maintenance of materialized views: {P}roblems, techniques, and
215:   applications.
216: \newblock {\em Bull.\ of the IEEE Computer Society Technical Committee on Data
217:   Engineering\/}~{\em 18,\/}~2, 3--18.
218: 
219: \bibitem[\protect\citeauthoryear{Gupta, Sagiv, Ullman, and Widom}{Gupta
220:   et~al\mbox{.}}{1994}]{GSUW94}
221: {\sc Gupta, A.}, {\sc Sagiv, Y.}, {\sc Ullman, J.~D.}, {\sc and} {\sc Widom,
222:   J.} 1994.
223: \newblock Constraint checking with partial information.
224: \newblock In {\em Proc.\ of the 13th ACM SIGACT SIGMOD SIGART Symp.\ on
225:   Principles of Database Systems (PODS'94)}.
226: 
227: \bibitem[\protect\citeauthoryear{Halevy}{Halevy}{2001}]{Hale01}
228: {\sc Halevy, A.~Y.} 2001.
229: \newblock Answering queries using views: {A} survey.
230: \newblock {\em Very Large Database J.\/}~{\em 10,\/}~4, 270--294.
231: 
232: \bibitem[\protect\citeauthoryear{Harel}{Harel}{1985}]{Hare85}
233: {\sc Harel, D.} 1985.
234: \newblock Recurring dominoes: Making the highly undecidable highly
235:   understandable.
236: \newblock {\em Ann.\ of Discrete Mathematics\/}~{\em 24}, 51--72.
237: 
238: \bibitem[\protect\citeauthoryear{Hull}{Hull}{1997}]{Hull97}
239: {\sc Hull, R.} 1997.
240: \newblock Managing semantic heterogeneity in databases: {A} theoretical
241:   perspective.
242: \newblock In {\em Proc.\ of the 16th ACM SIGACT SIGMOD SIGART Symp.\ on
243:   Principles of Database Systems (PODS'97)}. 51--61.
244: 
245: \bibitem[\protect\citeauthoryear{Ioannidis and Ramakrishnan}{Ioannidis and
246:   Ramakrishnan}{1995}]{IoRa95}
247: {\sc Ioannidis, Y.~E.} {\sc and} {\sc Ramakrishnan, R.} 1995.
248: \newblock Containment of conjunctive queries: {B}eyond relations as sets.
249: \newblock {\em {ACM} Trans.\ on Database Systems\/}~{\em 20,\/}~3, 288--324.
250: 
251: \bibitem[\protect\citeauthoryear{Johnson and Klug}{Johnson and
252:   Klug}{1984}]{JoKl84}
253: {\sc Johnson, D.~S.} {\sc and} {\sc Klug, A.~C.} 1984.
254: \newblock Testing containment of conjunctive queries under functional and
255:   inclusion dependencies.
256: \newblock {\em J.\ of Computer and System Sciences\/}~{\em 28,\/}~1, 167--189.
257: 
258: \bibitem[\protect\citeauthoryear{Klug}{Klug}{1988}]{Klug88}
259: {\sc Klug, A.~C.} 1988.
260: \newblock On conjunctive queries containing inequalities.
261: \newblock {\em J.\ of the {ACM}\/}~{\em 35,\/}~1, 146--160.
262: 
263: \bibitem[\protect\citeauthoryear{Kozen and Tiuryn}{Kozen and
264:   Tiuryn}{1990}]{KoTi90}
265: {\sc Kozen, D.} {\sc and} {\sc Tiuryn, J.} 1990.
266: \newblock Logics of programs.
267: \newblock In {\em Handbook of Theoretical {C}omputer {S}cience --- Formal
268:   Models and Semantics}, {J.~van Leeuwen}, Ed. Elsevier Science Publishers
269:   (North-Holland), Amsterdam, 789--840.
270: 
271: \bibitem[\protect\citeauthoryear{Lenzerini}{Lenzerini}{2002}]{Lenz02}
272: {\sc Lenzerini, M.} 2002.
273: \newblock Data integration: {A} theoretical perspective.
274: \newblock In {\em Proc.\ of the 21st ACM SIGACT SIGMOD SIGART Symp.\ on
275:   Principles of Database Systems (PODS~2002)}. 233--246.
276: 
277: \bibitem[\protect\citeauthoryear{Levy and Rousset}{Levy and
278:   Rousset}{1996}]{LeRo96d}
279: {\sc Levy, A.~Y.} {\sc and} {\sc Rousset, M.-C.} 1996.
280: \newblock {CARIN}: {A} representation language combining {H}orn rules and
281:   description logics.
282: \newblock In {\em Proc.\ of the 12th Eur.\ Conf.\ on Artificial Intelligence
283:   (ECAI'96)}. 323--327.
284: 
285: \bibitem[\protect\citeauthoryear{Levy, Srivastava, and Kirk}{Levy
286:   et~al\mbox{.}}{1995}]{LeSK95}
287: {\sc Levy, A.~Y.}, {\sc Srivastava, D.}, {\sc and} {\sc Kirk, T.} 1995.
288: \newblock Data model and query evaluation in global information systems.
289: \newblock {\em J.\ of Intelligent Information Systems\/}~{\em 5}, 121--143.
290: 
291: \bibitem[\protect\citeauthoryear{Levy and Suciu}{Levy and Suciu}{1997}]{LeSu97}
292: {\sc Levy, A.~Y.} {\sc and} {\sc Suciu, D.} 1997.
293: \newblock Deciding containment for queries with complex objects.
294: \newblock In {\em Proc.\ of the 16th ACM SIGACT SIGMOD SIGART Symp.\ on
295:   Principles of Database Systems (PODS'97)}. 20--31.
296: 
297: \bibitem[\protect\citeauthoryear{Mitchell}{Mitchell}{1983}]{Mitc83}
298: {\sc Mitchell, J.~C.} 1983.
299: \newblock The implication problem for functional and inclusion dependencies.
300: \newblock {\em Information and Control\/}~{\em 56}, 154--173.
301: 
302: \bibitem[\protect\citeauthoryear{Neven and Schwentick}{Neven and
303:   Schwentick}{2003}]{NeSc03}
304: {\sc Neven, F.} {\sc and} {\sc Schwentick, T.} 2003.
305: \newblock {XPath} containment in the presence of disjunction, {DTDs}, and
306:   variables.
307: \newblock In {\em Proc.\ of the 9th Int.\ Conf.\ on Database Theory
308:   (ICDT~2003)}. 315--329.
309: 
310: \bibitem[\protect\citeauthoryear{Patel-Schneider, Hayes, and
311:   Horrocks}{Patel-Schneider et~al\mbox{.}}{2004}]{PaHH04}
312: {\sc Patel-Schneider, P.}, {\sc Hayes, P.}, {\sc and} {\sc Horrocks, J.} 2004.
313: \newblock {OWL} web ontology language: Semantics and abstract syntax -- {W3C}
314:   recommendation.
315: \newblock Tech. rep., World Wide Web Consortium. Feb.
316: 
317: \bibitem[\protect\citeauthoryear{Sagiv and Yannakakis}{Sagiv and
318:   Yannakakis}{1980}]{SaYa80}
319: {\sc Sagiv, Y.} {\sc and} {\sc Yannakakis, M.} 1980.
320: \newblock Equivalences among relational expressions with the union and
321:   difference operators.
322: \newblock {\em J.\ of the {ACM}\/}~{\em 27,\/}~4, 633--655.
323: 
324: \bibitem[\protect\citeauthoryear{Ullman}{Ullman}{1997}]{Ullm97}
325: {\sc Ullman, J.~D.} 1997.
326: \newblock Information integration using logical views.
327: \newblock In {\em Proc.\ of the 6th Int.\ Conf.\ on Database Theory (ICDT'97)}.
328:   Lecture Notes in Computer Science, vol. 1186. Springer, 19--40.
329: 
330: \bibitem[\protect\citeauthoryear{van~der Meyden}{van~der Meyden}{1998}]{Meyd98}
331: {\sc van~der Meyden, R.} 1998.
332: \newblock Logical approaches to incomplete information.
333: \newblock In {\em Logics for Databases and Information Systems}, {J.~Chomicki}
334:   {and} {G.~Saake}, Eds. Kluwer Academic Publisher, 307--356.
335: 
336: \bibitem[\protect\citeauthoryear{van Emde~Boas}{van Emde~Boas}{1997}]{Emde97}
337: {\sc van Emde~Boas, P.} 1997.
338: \newblock The convenience of tilings.
339: \newblock In {\em Complexity, Logic, and Recursion Theory}, {A.~Sorbi}, Ed.
340:   Lecture Notes in Pure and Applied Mathematics, vol. 187. Marcel Dekker Inc.,
341:   331--363.
342: 
343: \bibitem[\protect\citeauthoryear{{Widom (ed.)}}{{Widom (ed.)}}{1995}]{Wido95b}
344: {\sc {Widom (ed.)}, J.} 1995.
345: \newblock Special issue on materialized views and data warehousing.
346: \newblock {\em Bull.\ of the IEEE Computer Society Technical Committee on Data
347:   Engineering\/}~{\em 18,\/}~2.
348: 
349: \bibitem[\protect\citeauthoryear{Wood}{Wood}{2003}]{Wood03}
350: {\sc Wood, P.~T.} 2003.
351: \newblock Containment for {XPath} fragments under {DTD} constraints.
352: \newblock In {\em Proc.\ of the 9th Int.\ Conf.\ on Database Theory
353:   (ICDT~2003)}. 300--314.
354: 
355: \end{thebibliography}
356: