{"id":"https://openalex.org/W2087495484","doi":"https://doi.org/10.1145/2554850.2554919","title":"Mining key and referential constraints enforcement patterns","display_name":"Mining key and referential constraints enforcement patterns","publication_year":2014,"publication_date":"2014-03-24","ids":{"openalex":"https://openalex.org/W2087495484","doi":"https://doi.org/10.1145/2554850.2554919","mag":"2087495484"},"language":"en","primary_location":{"id":"doi:10.1145/2554850.2554919","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2554850.2554919","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110162175","display_name":"Kaiping Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Kaiping Liu","raw_affiliation_strings":["Nanyang Technological University"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110248023","display_name":"Hee Beng Kuan Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hee Beng Kuan Tan","raw_affiliation_strings":["Nanyang Technological University"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100412598","display_name":"Hongyu Zhang","orcid":"https://orcid.org/0000-0002-3063-9425"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyu Zhang","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110162175"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18810823,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"850","last_page":"854"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7905949354171753},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7648200988769531},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.6270325779914856},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.47323593497276306},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4667762815952301},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12004104256629944}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7905949354171753},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7648200988769531},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.6270325779914856},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.47323593497276306},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4667762815952301},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12004104256629944},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2554850.2554919","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2554850.2554919","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1506285740","https://openalex.org/W1657461476","https://openalex.org/W1972933296","https://openalex.org/W1976534969","https://openalex.org/W2024336513","https://openalex.org/W2064671315","https://openalex.org/W2083062572","https://openalex.org/W2089237370","https://openalex.org/W2110762258","https://openalex.org/W2121818394","https://openalex.org/W2123859812","https://openalex.org/W2153964911","https://openalex.org/W2156841542","https://openalex.org/W2158454296","https://openalex.org/W6604482746"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Key":[0],"and":[1,32,43,85,117,144],"referential":[2,33,118,145],"constraints":[3,34,146],"play":[4],"an":[5,70],"important":[6],"role":[7],"in":[8,12,56,112,138],"enforcing":[9],"data":[10],"integrity":[11],"database":[13,18,27,57,83],"applications.":[14],"Our":[15,120],"study":[16],"of":[17,26,48,115,122,142],"applications":[19,58],"reveals":[20],"that":[21,53,63,132],"there":[22],"are":[23,39,45,94,136],"common":[24,107],"patterns":[25,38,55,75,93,108,135],"operations":[28,84],"when":[29],"implementing":[30],"key":[31,116,143],"enforcement.":[35,147],"However,":[36],"these":[37,74,106],"not":[40],"well":[41],"documented":[42],"usually":[44],"hidden":[46],"knowledge":[47],"developers.":[49],"With":[50],"the":[51,54,98,113,124,133,140],"hypothesis":[52],"embody":[59],"latent":[60],"programming":[61],"rules":[62],"developers":[64],"commonly":[65],"use,":[66],"this":[67],"paper":[68],"presents":[69],"approach":[71,125],"to":[72],"mine":[73],"by":[76],"extracting":[77],"from":[78,97,105],"source":[79],"code":[80],"frequently":[81],"appearing":[82],"program":[86],"constructs":[87],"as":[88],"partial":[89,100],"order":[90,101],"sets.":[91,102],"Frequent":[92],"then":[95],"mined":[96],"extracted":[99,134],"Any":[103],"deviation":[104],"signals":[109],"potential":[110],"faults":[111],"enforcement":[114],"constraints.":[119],"experience":[121],"applying":[123],"on":[126],"three":[127],"industrial":[128],"systems":[129],"has":[130],"shown":[131],"useful":[137],"assisting":[139],"verification":[141]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
