1: \begin{thebibliography}{}
2:
3: \bibitem[\protect\citeauthoryear{Abiteboul and Duschka}{Abiteboul and
4: Duschka}{1998}]{AbDu98}
5: {\sc Abiteboul, S.} {\sc and} {\sc Duschka, O.} 1998.
6: \newblock Complexity of answering queries using materialized views.
7: \newblock In {\em Proc.\ of the 17th ACM SIGACT SIGMOD SIGART Symp.\ on
8: Principles of Database Systems (PODS'98)}. 254--265.
9:
10: \bibitem[\protect\citeauthoryear{Abiteboul, Hull, and Vianu}{Abiteboul
11: et~al\mbox{.}}{1995}]{AbHV95}
12: {\sc Abiteboul, S.}, {\sc Hull, R.}, {\sc and} {\sc Vianu, V.} 1995.
13: \newblock {\em Foundations of Databases}.
14: \newblock Addison Wesley Publ.\ Co., Reading, Massachussetts.
15:
16: \bibitem[\protect\citeauthoryear{Aho, Sagiv, and Ullman}{Aho
17: et~al\mbox{.}}{1979a}]{AhSU79}
18: {\sc Aho, A.~V.}, {\sc Sagiv, Y.}, {\sc and} {\sc Ullman, J.~D.} 1979a.
19: \newblock Efficient optimization of a class of relational expressions.
20: \newblock {\em {ACM} Trans.\ on Database Systems\/}~{\em 4}, 297--314.
21:
22: \bibitem[\protect\citeauthoryear{Aho, Sagiv, and Ullman}{Aho
23: et~al\mbox{.}}{1979b}]{AhSU79b}
24: {\sc Aho, A.~V.}, {\sc Sagiv, Y.}, {\sc and} {\sc Ullman, J.~D.} 1979b.
25: \newblock Equivalence among relational expressions.
26: \newblock {\em {SIAM} J.\ on Computing\/}~{\em 8}, 218--246.
27:
28: \bibitem[\protect\citeauthoryear{Amir, Park, Tewari, and Padmanabhan}{Amir
29: et~al\mbox{.}}{2003}]{APTP03}
30: {\sc Amir, K.}, {\sc Park, S.}, {\sc Tewari, R.}, {\sc and} {\sc Padmanabhan,
31: S.} 2003.
32: \newblock Scalable template-based query containment checking for web semantic
33: caches.
34: \newblock In {\em Proc.\ of the 19th IEEE Int.\ Conf.\ on Data Engineering
35: (ICDE~2003)}. 493--504.
36:
37: \bibitem[\protect\citeauthoryear{Baader, Calvanese, McGuinness, Nardi, and
38: Patel-Schneider}{Baader et~al\mbox{.}}{2003}]{BCMNP03}
39: {\sc Baader, F.}, {\sc Calvanese, D.}, {\sc McGuinness, D.}, {\sc Nardi, D.},
40: {\sc and} {\sc Patel-Schneider, P.~F.}, Eds. 2003.
41: \newblock {\em The Description Logic Handbook: {T}heory, Implementation and
42: Applications}.
43: \newblock Cambridge University Press.
44:
45: \bibitem[\protect\citeauthoryear{Bonatti}{Bonatti}{2004}]{Bona04}
46: {\sc Bonatti, P.~A.} 2004.
47: \newblock On the decidability of containment of recursive datalog queries -
48: preliminary report.
49: \newblock In {\em Proc.\ of the 23rd ACM SIGACT SIGMOD SIGART Symp.\ on
50: Principles of Database Systems (PODS~2004)}. 297--306.
51:
52: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, and
53: Lenzerini}{Calvanese et~al\mbox{.}}{1995}]{CaDL95}
54: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc and} {\sc Lenzerini, M.} 1995.
55: \newblock Structured objects: {M}odeling and reasoning.
56: \newblock In {\em Proc.\ of the 4th Int.\ Conf.\ on Deductive and
57: Object-Oriented Databases (DOOD'95)}. Lecture Notes in Computer Science, vol.
58: 1013. Springer, 229--246.
59:
60: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, and
61: Lenzerini}{Calvanese et~al\mbox{.}}{1998}]{CaDL98}
62: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc and} {\sc Lenzerini, M.} 1998.
63: \newblock On the decidability of query containment under constraints.
64: \newblock In {\em Proc.\ of the 17th ACM SIGACT SIGMOD SIGART Symp.\ on
65: Principles of Database Systems (PODS'98)}. 149--158.
66:
67: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, and
68: Lenzerini}{Calvanese et~al\mbox{.}}{2001}]{CaDL01}
69: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc and} {\sc Lenzerini, M.} 2001.
70: \newblock Identification constraints and functional dependencies in description
71: logics.
72: \newblock In {\em Proc.\ of the 17th Int.\ Joint Conf.\ on Artificial
73: Intelligence (IJCAI~2001)}. 155--160.
74:
75: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, Lenzerini, and
76: Nardi}{Calvanese et~al\mbox{.}}{2001}]{CDLN01}
77: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc Lenzerini, M.}, {\sc and} {\sc
78: Nardi, D.} 2001.
79: \newblock Reasoning in expressive description logics.
80: \newblock In {\em Handbook of Automated Reasoning}, {A.~Robinson} {and}
81: {A.~Voronkov}, Eds. Vol.~II. Elsevier Science Publishers (North-Holland),
82: Amsterdam, Chapter~23, 1581--1634.
83:
84: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, Lenzerini, Nardi, and
85: Rosati}{Calvanese et~al\mbox{.}}{1998}]{CDLNR98}
86: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc Lenzerini, M.}, {\sc Nardi,
87: D.}, {\sc and} {\sc Rosati, R.} 1998.
88: \newblock Description logic framework for information integration.
89: \newblock In {\em Proc.\ of the 6th Int.\ Conf.\ on Principles of Knowledge
90: Representation and Reasoning (KR'98)}. 2--13.
91:
92: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, Lenzerini, and
93: Vardi}{Calvanese et~al\mbox{.}}{2000}]{CDLV00b}
94: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc Lenzerini, M.}, {\sc and} {\sc
95: Vardi, M.~Y.} 2000.
96: \newblock Containment of conjunctive regular path queries with inverse.
97: \newblock In {\em Proc.\ of the 7th Int.\ Conf.\ on Principles of Knowledge
98: Representation and Reasoning (KR~2000)}. 176--185.
99:
100: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, Lenzerini, and
101: Vardi}{Calvanese et~al\mbox{.}}{2002}]{CDLV02b}
102: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc Lenzerini, M.}, {\sc and} {\sc
103: Vardi, M.~Y.} 2002.
104: \newblock View-based query answering and query containment over semistructured
105: data.
106: \newblock In {\em Revised Papers of the 8th International Workshop on Database
107: Programming Languages (DBPL~2001)}, {G.~Ghelli} {and} {G.~Grahne}, Eds.
108: Lecture Notes in Computer Science, vol. 2397. Springer, 40--61.
109:
110: \bibitem[\protect\citeauthoryear{Calvanese, De~Giacomo, and Vardi}{Calvanese
111: et~al\mbox{.}}{2003}]{CaDV03}
112: {\sc Calvanese, D.}, {\sc De~Giacomo, G.}, {\sc and} {\sc Vardi, M.~Y.} 2003.
113: \newblock Decidable containment of recursive queries.
114: \newblock In {\em Proc.\ of the 9th Int.\ Conf.\ on Database Theory
115: (ICDT~2003)}. Lecture Notes in Computer Science, vol. 2572. Springer,
116: 330--345.
117:
118: \bibitem[\protect\citeauthoryear{Calvanese and Rosati}{Calvanese and
119: Rosati}{2003}]{CaRo03}
120: {\sc Calvanese, D.} {\sc and} {\sc Rosati, R.} 2003.
121: \newblock Answering recursive queries under keys and foreign keys is
122: undecidable.
123: \newblock In {\em Proc.\ of the 10th Int.\ Workshop on Knowledge Representation
124: meets Databases (KRDB~2003)}. CEUR Electronic Workshop Proceedings,
125: \url{http://ceur-ws.org/Vol-79/}.
126:
127: \bibitem[\protect\citeauthoryear{Catarci and Lenzerini}{Catarci and
128: Lenzerini}{1993}]{CaLe93}
129: {\sc Catarci, T.} {\sc and} {\sc Lenzerini, M.} 1993.
130: \newblock Representing and using interschema knowledge in cooperative
131: information systems.
132: \newblock {\em J.\ of Intelligent and Cooperative Information Systems\/}~{\em
133: 2,\/}~4, 375--398.
134:
135: \bibitem[\protect\citeauthoryear{Chan}{Chan}{1992}]{Chan92}
136: {\sc Chan, E. P.~F.} 1992.
137: \newblock Containment and minimization of positive conjunctive queries in
138: {OODB's}.
139: \newblock In {\em Proc.\ of the 11th ACM SIGACT SIGMOD SIGART Symp.\ on
140: Principles of Database Systems (PODS'92)}. 202--211.
141:
142: \bibitem[\protect\citeauthoryear{Chandra and Merlin}{Chandra and
143: Merlin}{1977}]{ChMe77}
144: {\sc Chandra, A.~K.} {\sc and} {\sc Merlin, P.~M.} 1977.
145: \newblock Optimal implementation of conjunctive queries in relational data
146: bases.
147: \newblock In {\em Proc.\ of the 9th ACM Symp.\ on Theory of Computing
148: (STOC'77)}. 77--90.
149:
150: \bibitem[\protect\citeauthoryear{Chandra and Vardi}{Chandra and
151: Vardi}{1985}]{ChVa85}
152: {\sc Chandra, A.~K.} {\sc and} {\sc Vardi, M.~Y.} 1985.
153: \newblock The implication problem for functional and inclusion dependencies is
154: undecidable.
155: \newblock {\em {SIAM} J.\ on Computing\/}~{\em 14,\/}~3, 671--677.
156:
157: \bibitem[\protect\citeauthoryear{Chaudhuri and Vardi}{Chaudhuri and
158: Vardi}{1992}]{ChVa92}
159: {\sc Chaudhuri, S.} {\sc and} {\sc Vardi, M.~Y.} 1992.
160: \newblock On the equivalence of recursive and nonrecursive {D}atalog programs.
161: \newblock In {\em Proc.\ of the 11th ACM SIGACT SIGMOD SIGART Symp.\ on
162: Principles of Database Systems (PODS'92)}. 55--66.
163:
164: \bibitem[\protect\citeauthoryear{Chekuri and Rajaraman}{Chekuri and
165: Rajaraman}{1997}]{ChRa97}
166: {\sc Chekuri, C.} {\sc and} {\sc Rajaraman, A.} 1997.
167: \newblock Conjunctive query containment revisited.
168: \newblock In {\em Proc.\ of the 6th Int.\ Conf.\ on Database Theory (ICDT'97)}.
169: 56--70.
170:
171: \bibitem[\protect\citeauthoryear{De~Giacomo and Lenzerini}{De~Giacomo and
172: Lenzerini}{1996}]{DeLe96}
173: {\sc De~Giacomo, G.} {\sc and} {\sc Lenzerini, M.} 1996.
174: \newblock {TBox} and {ABox} reasoning in expressive description logics.
175: \newblock In {\em Proc.\ of the 5th Int.\ Conf.\ on the Principles of Knowledge
176: Representation and Reasoning (KR'96)}. 316--327.
177:
178: \bibitem[\protect\citeauthoryear{Dong and Su}{Dong and Su}{1996}]{DoSu96}
179: {\sc Dong, G.} {\sc and} {\sc Su, J.} 1996.
180: \newblock Conjunctive query containment with respect to views and constraints.
181: \newblock {\em Information Processing Lett.\/}~{\em 57,\/}~2, 95--102.
182:
183: \bibitem[\protect\citeauthoryear{Donini, Lenzerini, Nardi, and Schaerf}{Donini
184: et~al\mbox{.}}{1998}]{DLNS98}
185: {\sc Donini, F.~M.}, {\sc Lenzerini, M.}, {\sc Nardi, D.}, {\sc and} {\sc
186: Schaerf, A.} 1998.
187: \newblock {${\cal AL}$-log}: Integrating {D}atalog and description logics.
188: \newblock {\em J.\ of Intelligent Information Systems\/}~{\em 10,\/}~3,
189: 227--252.
190:
191: \bibitem[\protect\citeauthoryear{Fattorosi-Barnaba and
192: De~Caro}{Fattorosi-Barnaba and De~Caro}{1985}]{FaDe85}
193: {\sc Fattorosi-Barnaba, M.} {\sc and} {\sc De~Caro, F.} 1985.
194: \newblock Graded modalities {I}.
195: \newblock {\em Studia Logica\/}~{\em 44}, 197--221.
196:
197: \bibitem[\protect\citeauthoryear{Fischer and Ladner}{Fischer and
198: Ladner}{1979}]{FiLa79}
199: {\sc Fischer, M.~J.} {\sc and} {\sc Ladner, R.~E.} 1979.
200: \newblock Propositional dynamic logic of regular programs.
201: \newblock {\em J.\ of Computer and System Sciences\/}~{\em 18}, 194--211.
202:
203: \bibitem[\protect\citeauthoryear{Gruber}{Gruber}{1993}]{Grub93}
204: {\sc Gruber, T.~R.} 1993.
205: \newblock Towards principles for the design of ontologies used for knowledge
206: sharing.
207: \newblock In {\em Formal Ontology in Conceptual Analysis and Knowledge
208: Representation}, {N.~Guarino} {and} {R.~Poli}, Eds. Kluwer Academic
209: Publisher.
210:
211: \bibitem[\protect\citeauthoryear{Gupta and Mumick}{Gupta and
212: Mumick}{1995}]{GuMu95}
213: {\sc Gupta, A.} {\sc and} {\sc Mumick, I.~S.} 1995.
214: \newblock Maintenance of materialized views: {P}roblems, techniques, and
215: applications.
216: \newblock {\em Bull.\ of the IEEE Computer Society Technical Committee on Data
217: Engineering\/}~{\em 18,\/}~2, 3--18.
218:
219: \bibitem[\protect\citeauthoryear{Gupta, Sagiv, Ullman, and Widom}{Gupta
220: et~al\mbox{.}}{1994}]{GSUW94}
221: {\sc Gupta, A.}, {\sc Sagiv, Y.}, {\sc Ullman, J.~D.}, {\sc and} {\sc Widom,
222: J.} 1994.
223: \newblock Constraint checking with partial information.
224: \newblock In {\em Proc.\ of the 13th ACM SIGACT SIGMOD SIGART Symp.\ on
225: Principles of Database Systems (PODS'94)}.
226:
227: \bibitem[\protect\citeauthoryear{Halevy}{Halevy}{2001}]{Hale01}
228: {\sc Halevy, A.~Y.} 2001.
229: \newblock Answering queries using views: {A} survey.
230: \newblock {\em Very Large Database J.\/}~{\em 10,\/}~4, 270--294.
231:
232: \bibitem[\protect\citeauthoryear{Harel}{Harel}{1985}]{Hare85}
233: {\sc Harel, D.} 1985.
234: \newblock Recurring dominoes: Making the highly undecidable highly
235: understandable.
236: \newblock {\em Ann.\ of Discrete Mathematics\/}~{\em 24}, 51--72.
237:
238: \bibitem[\protect\citeauthoryear{Hull}{Hull}{1997}]{Hull97}
239: {\sc Hull, R.} 1997.
240: \newblock Managing semantic heterogeneity in databases: {A} theoretical
241: perspective.
242: \newblock In {\em Proc.\ of the 16th ACM SIGACT SIGMOD SIGART Symp.\ on
243: Principles of Database Systems (PODS'97)}. 51--61.
244:
245: \bibitem[\protect\citeauthoryear{Ioannidis and Ramakrishnan}{Ioannidis and
246: Ramakrishnan}{1995}]{IoRa95}
247: {\sc Ioannidis, Y.~E.} {\sc and} {\sc Ramakrishnan, R.} 1995.
248: \newblock Containment of conjunctive queries: {B}eyond relations as sets.
249: \newblock {\em {ACM} Trans.\ on Database Systems\/}~{\em 20,\/}~3, 288--324.
250:
251: \bibitem[\protect\citeauthoryear{Johnson and Klug}{Johnson and
252: Klug}{1984}]{JoKl84}
253: {\sc Johnson, D.~S.} {\sc and} {\sc Klug, A.~C.} 1984.
254: \newblock Testing containment of conjunctive queries under functional and
255: inclusion dependencies.
256: \newblock {\em J.\ of Computer and System Sciences\/}~{\em 28,\/}~1, 167--189.
257:
258: \bibitem[\protect\citeauthoryear{Klug}{Klug}{1988}]{Klug88}
259: {\sc Klug, A.~C.} 1988.
260: \newblock On conjunctive queries containing inequalities.
261: \newblock {\em J.\ of the {ACM}\/}~{\em 35,\/}~1, 146--160.
262:
263: \bibitem[\protect\citeauthoryear{Kozen and Tiuryn}{Kozen and
264: Tiuryn}{1990}]{KoTi90}
265: {\sc Kozen, D.} {\sc and} {\sc Tiuryn, J.} 1990.
266: \newblock Logics of programs.
267: \newblock In {\em Handbook of Theoretical {C}omputer {S}cience --- Formal
268: Models and Semantics}, {J.~van Leeuwen}, Ed. Elsevier Science Publishers
269: (North-Holland), Amsterdam, 789--840.
270:
271: \bibitem[\protect\citeauthoryear{Lenzerini}{Lenzerini}{2002}]{Lenz02}
272: {\sc Lenzerini, M.} 2002.
273: \newblock Data integration: {A} theoretical perspective.
274: \newblock In {\em Proc.\ of the 21st ACM SIGACT SIGMOD SIGART Symp.\ on
275: Principles of Database Systems (PODS~2002)}. 233--246.
276:
277: \bibitem[\protect\citeauthoryear{Levy and Rousset}{Levy and
278: Rousset}{1996}]{LeRo96d}
279: {\sc Levy, A.~Y.} {\sc and} {\sc Rousset, M.-C.} 1996.
280: \newblock {CARIN}: {A} representation language combining {H}orn rules and
281: description logics.
282: \newblock In {\em Proc.\ of the 12th Eur.\ Conf.\ on Artificial Intelligence
283: (ECAI'96)}. 323--327.
284:
285: \bibitem[\protect\citeauthoryear{Levy, Srivastava, and Kirk}{Levy
286: et~al\mbox{.}}{1995}]{LeSK95}
287: {\sc Levy, A.~Y.}, {\sc Srivastava, D.}, {\sc and} {\sc Kirk, T.} 1995.
288: \newblock Data model and query evaluation in global information systems.
289: \newblock {\em J.\ of Intelligent Information Systems\/}~{\em 5}, 121--143.
290:
291: \bibitem[\protect\citeauthoryear{Levy and Suciu}{Levy and Suciu}{1997}]{LeSu97}
292: {\sc Levy, A.~Y.} {\sc and} {\sc Suciu, D.} 1997.
293: \newblock Deciding containment for queries with complex objects.
294: \newblock In {\em Proc.\ of the 16th ACM SIGACT SIGMOD SIGART Symp.\ on
295: Principles of Database Systems (PODS'97)}. 20--31.
296:
297: \bibitem[\protect\citeauthoryear{Mitchell}{Mitchell}{1983}]{Mitc83}
298: {\sc Mitchell, J.~C.} 1983.
299: \newblock The implication problem for functional and inclusion dependencies.
300: \newblock {\em Information and Control\/}~{\em 56}, 154--173.
301:
302: \bibitem[\protect\citeauthoryear{Neven and Schwentick}{Neven and
303: Schwentick}{2003}]{NeSc03}
304: {\sc Neven, F.} {\sc and} {\sc Schwentick, T.} 2003.
305: \newblock {XPath} containment in the presence of disjunction, {DTDs}, and
306: variables.
307: \newblock In {\em Proc.\ of the 9th Int.\ Conf.\ on Database Theory
308: (ICDT~2003)}. 315--329.
309:
310: \bibitem[\protect\citeauthoryear{Patel-Schneider, Hayes, and
311: Horrocks}{Patel-Schneider et~al\mbox{.}}{2004}]{PaHH04}
312: {\sc Patel-Schneider, P.}, {\sc Hayes, P.}, {\sc and} {\sc Horrocks, J.} 2004.
313: \newblock {OWL} web ontology language: Semantics and abstract syntax -- {W3C}
314: recommendation.
315: \newblock Tech. rep., World Wide Web Consortium. Feb.
316:
317: \bibitem[\protect\citeauthoryear{Sagiv and Yannakakis}{Sagiv and
318: Yannakakis}{1980}]{SaYa80}
319: {\sc Sagiv, Y.} {\sc and} {\sc Yannakakis, M.} 1980.
320: \newblock Equivalences among relational expressions with the union and
321: difference operators.
322: \newblock {\em J.\ of the {ACM}\/}~{\em 27,\/}~4, 633--655.
323:
324: \bibitem[\protect\citeauthoryear{Ullman}{Ullman}{1997}]{Ullm97}
325: {\sc Ullman, J.~D.} 1997.
326: \newblock Information integration using logical views.
327: \newblock In {\em Proc.\ of the 6th Int.\ Conf.\ on Database Theory (ICDT'97)}.
328: Lecture Notes in Computer Science, vol. 1186. Springer, 19--40.
329:
330: \bibitem[\protect\citeauthoryear{van~der Meyden}{van~der Meyden}{1998}]{Meyd98}
331: {\sc van~der Meyden, R.} 1998.
332: \newblock Logical approaches to incomplete information.
333: \newblock In {\em Logics for Databases and Information Systems}, {J.~Chomicki}
334: {and} {G.~Saake}, Eds. Kluwer Academic Publisher, 307--356.
335:
336: \bibitem[\protect\citeauthoryear{van Emde~Boas}{van Emde~Boas}{1997}]{Emde97}
337: {\sc van Emde~Boas, P.} 1997.
338: \newblock The convenience of tilings.
339: \newblock In {\em Complexity, Logic, and Recursion Theory}, {A.~Sorbi}, Ed.
340: Lecture Notes in Pure and Applied Mathematics, vol. 187. Marcel Dekker Inc.,
341: 331--363.
342:
343: \bibitem[\protect\citeauthoryear{{Widom (ed.)}}{{Widom (ed.)}}{1995}]{Wido95b}
344: {\sc {Widom (ed.)}, J.} 1995.
345: \newblock Special issue on materialized views and data warehousing.
346: \newblock {\em Bull.\ of the IEEE Computer Society Technical Committee on Data
347: Engineering\/}~{\em 18,\/}~2.
348:
349: \bibitem[\protect\citeauthoryear{Wood}{Wood}{2003}]{Wood03}
350: {\sc Wood, P.~T.} 2003.
351: \newblock Containment for {XPath} fragments under {DTD} constraints.
352: \newblock In {\em Proc.\ of the 9th Int.\ Conf.\ on Database Theory
353: (ICDT~2003)}. 300--314.
354:
355: \end{thebibliography}
356: