{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T04:31:11Z","timestamp":1723264271223},"reference-count":89,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2017,5,11]],"date-time":"2017-05-11T00:00:00Z","timestamp":1494460800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMOD Rec."],"published-print":{"date-parts":[[2017,5,11]]},"DOI":"10.1145\/3092931.3092933","type":"journal-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T12:16:12Z","timestamp":1494591372000},"page":"5-17","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Research Directions for Principles of Data Management (Abridged)"],"prefix":"10.1145","volume":"45","author":[{"given":"Serge","family":"Abiteboul","sequence":"first","affiliation":[]},{"given":"Marcelo","family":"Arenas","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"Barcel\u00f3","sequence":"additional","affiliation":[]},{"given":"Meghyn","family":"Bienvenu","sequence":"additional","affiliation":[]},{"given":"Diego","family":"Calvanese","sequence":"additional","affiliation":[]},{"given":"Claire","family":"David","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Hull","sequence":"additional","affiliation":[]},{"given":"Eyke","family":"H\u00fcllermeier","sequence":"additional","affiliation":[]},{"given":"Benny","family":"Kimelfeld","sequence":"additional","affiliation":[]},{"given":"Leonid","family":"Libkin","sequence":"additional","affiliation":[]},{"given":"Wim","family":"Martens","sequence":"additional","affiliation":[]},{"given":"Tova","family":"Milo","sequence":"additional","affiliation":[]},{"given":"Filip","family":"Murlak","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Neven","sequence":"additional","affiliation":[]},{"given":"Magdalena","family":"Ortiz","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Schwentick","sequence":"additional","affiliation":[]},{"given":"Julia","family":"Stoyanovich","sequence":"additional","affiliation":[]},{"given":"Jianwen","family":"Su","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Suciu","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Vianu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Yi","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2017,5,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2845915"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670528"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2188349.2188352"},{"key":"e_1_2_1_4_1","unstructured":"S. Abiteboul etal Research directions for Principles of Data Management (Dagstuhl perspectives workshop 16151). https:\/\/arxiv.org\/abs\/1701.09007. S. Abiteboul et al. Research directions for Principles of Data Management (Dagstuhl perspectives workshop 16151). https:\/\/arxiv.org\/abs\/1701.09007."},{"key":"e_1_2_1_5_1","series-title":"Dagstuhl Seminar Proceedings","volume-title":"editor","author":"Abiteboul S.","year":"2016","unstructured":"S. Abiteboul , editor . Data, Responsibly , volume 16291 of Dagstuhl Seminar Proceedings . Schloss Dagstuhl -- LZI , 2016 , forthcoming. S. Abiteboul et al., editor. Data, Responsibly, volume 16291 of Dagstuhl Seminar Proceedings. Schloss Dagstuhl -- LZI, 2016, forthcoming."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.47"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2638571"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1498759.1498766"},{"key":"e_1_2_1_9_1","first-page":"167","volume-title":"Conference on Innovative Data Systems Research (CIDR)","author":"Akdere M.","year":"2011","unstructured":"M. Akdere The case for predictive database systems: Opportunities and challenges . In Conference on Innovative Data Systems Research (CIDR) , pages 167 -- 174 . www.cidrdb.org, 2011 . M. Akdere et al. The case for predictive database systems: Opportunities and challenges. In Conference on Innovative Data Systems Research (CIDR), pages 167--174. www.cidrdb.org, 2011."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47666-6_5"},{"key":"e_1_2_1_11_1","volume-title":"ProPublica","author":"Angwin J.","year":"2016","unstructured":"J. Angwin Machine bias . ProPublica , May 2016 . J. Angwin et al. Machine bias. ProPublica, May 2016."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742796"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594538.2594555"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139060158","volume-title":"Foundations of Data Exchange","author":"Arenas M.","year":"2014","unstructured":"M. Arenas Foundations of Data Exchange . Cambridge University Press , 2014 . M. Arenas et al. Foundations of Data Exchange. Cambridge University Press, 2014."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2015.12.002"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2629565"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/110859440"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2011.03.002"},{"key":"e_1_2_1_19_1","first-page":"104","article-title":"Big data's disparate impact","author":"Barocas S.","year":"2016","unstructured":"S. Barocas and A. D. Selbst . Big data's disparate impact . California Law Review , 104 , 2016 . S. Barocas and A. D. Selbst. Big data's disparate impact. California Law Review, 104, 2016.","journal-title":"California Law Review"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463664.2465224"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346330.1346333"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2371212"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735886.1735890"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1793114.1793141"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661643"},{"key":"e_1_2_1_26_1","volume-title":"WebDB","author":"Cafarella M. J.","year":"2007","unstructured":"M. J. Cafarella , D. Suciu , and O. Etzioni . Navigating extracted data with schema discovery . In WebDB , 2007 . M. J. Cafarella, D. Suciu, and O. Etzioni. Navigating extracted data with schema discovery. In WebDB, 2007."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352582.1352590"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463664.2467796"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-007-9078-x"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824124"},{"key":"e_1_2_1_31_1","volume-title":"NIPS","author":"Ciss\u00e9 M.","year":"2013","unstructured":"M. Ciss\u00e9 , N. Usunier , T. Artieres , and P. Gallinari . Robust Bloom filters for large multilabel classification tasks . In NIPS , 2013 . M. Ciss\u00e9, N. Usunier, T. Artieres, and P. Gallinari. Robust Bloom filters for large multilabel classification tasks. In NIPS, 2013."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/983076.983079"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2745754.2745766"},{"key":"e_1_2_1_34_1","volume-title":"Database in Depth -- Relational Theory for Practitioners. O'Reilly","author":"Date C. J.","year":"2005","unstructured":"C. J. Date . Database in Depth -- Relational Theory for Practitioners. O'Reilly , 2005 . C. J. Date. Database in Depth -- Relational Theory for Practitioners. O'Reilly, 2005."},{"issue":"1","key":"e_1_2_1_35_1","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1515\/popets-2015-0007","article-title":"Automated experiments on ad privacy settings","volume":"2015","author":"Datta A.","year":"2015","unstructured":"A. Datta , M. C. Tschantz , and A. Datta . Automated experiments on ad privacy settings . PoPETs , 2015 ( 1 ): 92 -- 112 , 2015 . A. Datta, M. C. Tschantz, and A. Datta. Automated experiments on ad privacy settings. PoPETs, 2015(1):92--112, 2015.","journal-title":"PoPETs"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376772"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516362"},{"key":"e_1_2_1_38_1","first-page":"279","volume-title":"ICML","author":"Dembczynski K.","year":"2010","unstructured":"K. Dembczynski , W. Cheng , and E. H\u00fcllermeier . Bayes optimal multilabel classification via probabilistic classifier chains . In ICML , pages 279 -- 286 . Omnipress , 2010 . K. Dembczynski, W. Cheng, and E. H\u00fcllermeier. Bayes optimal multilabel classification via probabilistic classifier chains. In ICML, pages 279--286. Omnipress, 2010."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989286"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694428.2694430"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514894.1514924"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14778\/2428536.2428538"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090255"},{"key":"e_1_2_1_44_1","first-page":"359","volume-title":"KR","author":"Eiter T.","year":"2016","unstructured":"T. Eiter , T. Lukasiewicz , and L. Predoiu . Generalized consistent query answering under existential rules . In KR , pages 359 -- 368 . AAAI Press , 2016 . T. Eiter, T. Lukasiewicz, and L. Predoiu. Generalized consistent query answering under existential rules. In KR, pages 359--368. AAAI Press, 2016."},{"key":"e_1_2_1_45_1","first-page":"710","volume-title":"SODA","author":"Feldman J.","year":"2008","unstructured":"J. Feldman On distributing symmetric streaming computations . In SODA , pages 710 -- 719 . SIAM , 2008 . J. Feldman et al. On distributing symmetric streaming computations. In SODA, pages 710--719. SIAM, 2008."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071610.1071614"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1667053.1667055"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/304182.304208"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253291"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19890-3_66"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2902251.2902292"},{"key":"e_1_2_1_52_1","volume-title":"NSF Workshop on Data-Centric Workflows","author":"Hull R.","year":"2009","unstructured":"R. Hull and J. Su . NSF Workshop on Data-Centric Workflows , May , 2009 . http:\/\/dcw2009.cs.ucsb.edu\/report.pdf R. Hull and J. Su. NSF Workshop on Data-Centric Workflows, May, 2009. http:\/\/dcw2009.cs.ucsb.edu\/report.pdf"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1634.1886"},{"key":"e_1_2_1_54_1","volume-title":"ICML. JMLR.org","author":"Jasinska K.","year":"2016","unstructured":"K. Jasinska Extreme F-measure maximization using sparse probability estimates . In ICML. JMLR.org , 2016 . K. Jasinska et al. Extreme F-measure maximization using sparse probability estimates. In ICML. JMLR.org, 2016."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350236"},{"key":"e_1_2_1_56_1","first-page":"1","volume-title":"ICDT","author":"Kaminski M.","year":"2016","unstructured":"M. Kaminski and E. V. Kostylev . Beyond well-designed SPARQL . In ICDT , pages 5: 1 -- 5 :18. Schloss Dagstuhl -- LZI , 2016 . M. Kaminski and E. V. Kostylev. Beyond well-designed SPARQL. In ICDT, pages 5:1--5:18. Schloss Dagstuhl -- LZI, 2016."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.219"},{"key":"e_1_2_1_58_1","first-page":"1","volume-title":"ICDT","author":"Koutris P.","year":"2016","unstructured":"P. Koutris , P. Beame , and D. Suciu . Worst-case optimal algorithms for parallel query processing . In ICDT , pages 8: 1 -- 8 :18. Schloss Dagstuhl -- LZI , 2016 . P. Koutris, P. Beame, and D. Suciu. Worst-case optimal algorithms for parallel query processing. In ICDT, pages 8:1--8:18. Schloss Dagstuhl -- LZI, 2016."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/543613.543644"},{"key":"e_1_2_1_60_1","first-page":"66","article-title":"Big data and its exclusions","author":"Lerman J.","year":"2013","unstructured":"J. Lerman . Big data and its exclusions . Stanford Law Review Online , 66 , 2013 . J. Lerman. Big data and its exclusions. Stanford Law Review Online, 66, 2013.","journal-title":"Stanford Law Review Online"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915235"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594538.2594561"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2877206"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/2040283.2040307"},{"key":"e_1_2_1_65_1","first-page":"24","volume-title":"BPM Workshops","author":"Marin M.","year":"2012","unstructured":"M. Marin , R. Hull , and R. Vacul\u00edn . Data-centric BPM and the emerging Case Management standard: A short survey . In BPM Workshops , pages 24 -- 30 , 2012 . M. Marin, R. Hull, and R. Vacul\u00edn. Data-centric BPM and the emerging Case Management standard: A short survey. In BPM Workshops, pages 24--30, 2012."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2749433"},{"key":"e_1_2_1_67_1","first-page":"149","article-title":"SAMOA: Scalable advanced massive online analysis","volume":"16","author":"Morales G. D. F.","year":"2015","unstructured":"G. D. F. Morales and A. Bifet . SAMOA: Scalable advanced massive online analysis . Journal of Machine Learning Research , 16 : 149 -- 153 , 2015 . G. D. F. Morales and A. Bifet. SAMOA: Scalable advanced massive online analysis. Journal of Machine Learning Research, 16:149--153, 2015.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_1_68_1","volume-title":"Big data: A report on algorithmic systems, opportunity, and civil rights. Executive Office of the President","author":"Mu\u00f1oz C.","year":"2016","unstructured":"C. Mu\u00f1oz , M. Smith , and D. Patil . Big data: A report on algorithmic systems, opportunity, and civil rights. Executive Office of the President , The White House , May 2016 . C. Mu\u00f1oz, M. Smith, and D. Patil. Big data: A report on algorithmic systems, opportunity, and civil rights. Executive Office of the President, The White House, May 2016."},{"key":"e_1_2_1_69_1","first-page":"237","volume-title":"KR","author":"Ngo N.","year":"2016","unstructured":"N. Ngo , M. Ortiz , and M. Simkus . Closed predicates in description logics: Results on combined complexity . In KR , pages 237 -- 246 . AAAI Press , 2016 . N. Ngo, M. Ortiz, and M. Simkus. Closed predicates in description logics: Results on combined complexity. In KR, pages 237--246. AAAI Press, 2016."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213556.2213565"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.423.0428"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623651"},{"key":"e_1_2_1_73_1","first-page":"661","volume-title":"ECML\/PKDD","author":"Riondato M.","year":"2011","unstructured":"M. Riondato The vc-dimension of SQL queries and selectivity estimation through sampling . In ECML\/PKDD , pages 661 -- 676 . Springer , 2011 . M. Riondato et al. The vc-dimension of SQL queries and selectivity estimation through sampling. In ECML\/PKDD, pages 661--676. Springer, 2011."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2008.11.006"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882939"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/582095.582099"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.14778\/2809974.2809991"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10472-012-9288-8"},{"key":"e_1_2_1_79_1","first-page":"718","volume-title":"EDBT","author":"Stoyanovich J.","year":"2016","unstructured":"J. Stoyanovich , S. Abiteboul , and G. Miklau . Data responsibly: Fairness, neutrality and transparency in data analysis . In EDBT , pages 718 -- 719 . OpenProceedings.org , 2016 . J. Stoyanovich, S. Abiteboul, and G. Miklau. Data responsibly: Fairness, neutrality and transparency in data analysis. In EDBT, pages 718--719. OpenProceedings.org, 2016."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/182591.182610"},{"key":"e_1_2_1_81_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01879-4","volume-title":"Probabilistic Databases. Morgan&Claypool Publishers","author":"Suciu D.","year":"2011","unstructured":"D. Suciu Probabilistic Databases. Morgan&Claypool Publishers , 2011 . D. Suciu et al. Probabilistic Databases. Morgan&Claypool Publishers, 2011."},{"key":"e_1_2_1_82_1","volume-title":"Probabilistic Databases. Synthesis Lectures on Data Management","author":"Suciu D.","year":"2011","unstructured":"D. Suciu Probabilistic Databases. Synthesis Lectures on Data Management . Morgan & Claypool Publishers , 2011 . D. Suciu et al. Probabilistic Databases. Synthesis Lectures on Data Management. Morgan & Claypool Publishers, 2011."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2886104"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2447976.2447990"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2539032.2539035"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1968.1972"},{"key":"e_1_2_1_87_1","first-page":"96","volume-title":"ICDT","author":"Veldhuizen T. L.","year":"2014","unstructured":"T. L. Veldhuizen . Triejoin : A simple, worst-case optimal join algorithm . In ICDT , pages 96 -- 106 . OpenProceedings.org , 2014 . T. L. Veldhuizen. Triejoin: A simple, worst-case optimal join algorithm. In ICDT, pages 96--106. OpenProceedings.org, 2014."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553516"},{"key":"e_1_2_1_89_1","first-page":"82","volume-title":"VLDB","author":"Yannakakis M.","year":"1981","unstructured":"M. Yannakakis . Algorithms for acyclic database schemes . In VLDB , pages 82 -- 94 . IEEE, 1981 . M. Yannakakis. Algorithms for acyclic database schemes. In VLDB, pages 82--94. IEEE, 1981."}],"container-title":["ACM SIGMOD Record"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3092931.3092933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T07:26:59Z","timestamp":1672471619000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092931.3092933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,11]]},"references-count":89,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,5,11]]}},"alternative-id":["10.1145\/3092931.3092933"],"URL":"http:\/\/dx.doi.org\/10.1145\/3092931.3092933","relation":{},"ISSN":["0163-5808"],"issn-type":[{"value":"0163-5808","type":"print"}],"subject":[],"published":{"date-parts":[[2017,5,11]]},"assertion":[{"value":"2017-05-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}