<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Expressive Identi cation Constraints to Capture Functional Dependencies in Description Logics?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Diego Calvanese</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wolfgang Fischl</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Reinhard Pichler</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Emanuel Sallinger</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mantas Simkus</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Information Systems, Vienna University of Technology</institution>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>KRDB Research Centre, Free University of Bozen-Bolzano</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Motivation and Main Results. Over the past years, we have been witnessing an enormous growth of the Semantic Web through initiatives like Open Linked Data [5] and Open Government Data [14, 25]. As was noted by He et al. [13] and Madhavan et al. [17], to a large extent, the data accessible on the web still originates from relational databases. The design of these databases often follows speci c principles, called normal forms, developed in the beginnings of relational database research, see, e.g., [11, 12]. The goal of this work is to transfer these principles, in particular the BoyceCodd Normal Form (BCNF), to RDF graphs enhanced with RDFS statements. To establish and justify this normal form for RDF graphs, we need the following: (1) A mapping of relational databases to RDF graphs and (2) identi cation constraints that capture functional dependencies (FDs) over RDF graphs. For (1), W3C has recognized the importance of a standardized mapping of relational data to the Semantic Web data format RDF. To this end, the so-called direct mapping has been released as a W3C Recommendation [2]. Note that the direct mapping to RDF does not transfer the semantic information that may be present in the relational schema, e.g. functional or inclusion dependencies. We are going to study an enrichment of the direct mapping by transferring also important semantic information from relational to RDF data. Initial work on this includes the recent proposal to extend the direct mapping by the use of RDFS and OWL 2 vocabularies [21], achieving the transfer of primary and foreign keys. The mapping in [21] enjoys several important properties such as query-preservation. However, if the RDF graph resulting from such a mapping is later changed (through update, delete, or insert operations), then the correspondence between the relational and the RDF data may get lost. We therefore propose a further extension of the direct mapping that uses DL-LiteRDFS [3] | extended with disjointness | as basis. DL-LiteRDFS is a variant of DL-LiteA [7] and captures the Description Logic (DL) fragment of RDFS [6]. While this DL is simple and allows for e cient reasoning, it naturally captures conceptual modeling constructs, and hence can express dependencies over RDF graphs. We introduce a mapping d2r that produces from a database instance an RDF graph together with a mapping ? This is an extended abstract of [10]. The rst author has been partially supported by the Wolfgang Pauli Institute Vienna, and by the EU IP project Optique(grant agreement n. FP7-318338). The remaining authors have been partially supported by the Austrian Science Fund (FWF) project P25207-N23 and P25518-N23, and by the Vienna Science and Technology Fund (WWTF) project ICT12-15.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>sm that outputs from a relational schema a DL TBox constraining RDF graphs.
For this we use the well-known rei cation technique. We keep good properties
of the mapping proposed in [21] { such as query preservation. In addition, we
also introduce a mapping r2d that produces from an RDF graph (conforming
to a DL TBox generated by sm) a database. This allows us to prove a desired
one-to-one correspondence between relational databases and legal RDF graphs
(i.e., RDF graphs satisfying the constraints of the TBox).</p>
      <p>
        For (2), since functional dependencies (FDs) are a crucial building block in
database design [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and form the basis of BCNF, the focus of our work is on
FDs. Intuitively, for a relation R, an FD fA1; : : : ; Ang !R A0 expresses that
if two tuples of R agree on the values of all attributes A1; : : : ; An, they also
have to agree on the value of attribute A0. We will see how this notion can
be extended to the DL and RDF setting through the use of paths. Sequeda,
Arenas, and Miranker [21] have extended the direct mapping by constraints such
as primary and foreign keys, while FDs have not been in the scope of their work.
Several works consider DLs extended with FDs. Calvanese, De Giacomo, and
Lenzerini [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] enrich DLs with a generalization of DL functionality assertions,
called identi cation constraints (ids). The latter are extended by Calvanese et
al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] to path-based ids (pids). Lutz, et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] introduce key assertions as a
possibility to use paths for identifying concepts. A di erent approach was taken
by Khizder, Toman and Weddell [
        <xref ref-type="bibr" rid="ref15">15, 22</xref>
        ]. They have established a DL, called CF D,
which captures usual relational schema declarations. This DL includes uniqueness
constructs, which capture FDs. Furthermore, they have extended uniqueness
constructs to path-functional dependencies (PFDs) and have investigated their
properties in more expressive DLs, such as ALCN [23]. In their most recent work
[24] they have established PTime reasoning for the DL CF D extended with PFDs
and disjointness constraints. However, altough the results of Toman and Wedell
are a viable approach to reason about relational schemas, we are interested in
capturing relational schemas and FDs in RDFS and OWL, thus following more
closely the W3C standards. As DL-Lite is the logical underpinning of OWL 2 QL
[20], we will focus on extensions for modelling FDs in DL-Lite , which is given
by the earlier mentioned pids. We investigate their expressivness and show, that
they fail to capture FDs for the direct mapping of relational data to RDF. We
therefore introduce an extension of such ids, which we call tree-based ids (tids).
With this new class of ids, we shall restore the desired one-to-one relationship
between legal databases (i.e., satisfying a given set of FDs) and legal RDF graphs.
      </p>
      <p>As mentioned above, our goal is to nd BCNF-like conditions for RDF graphs.
In relational schemas the purpose of using BCNF is to avoid update anomalies.
A relational schema is in BCNF if the following holds: whenever a set of given
FDs implies an FD from a subset S of the attributes to some attribute A 2= S, we
have that S is a super-key, i.e., also implies an FD from S to every attribute
of this schema. Our goal is to transfer the favorable properties of BCNF to the
RDF world. To this end, we rst analyze how update anomalies can arise in
the presence of tids. We identify several paths (stemming from the same tid)
identifying the same object as a crucial source of redundancy and hence of update
Entrance Hall
room</p>
      <p>is in
1600 PA Av
address
loc at</p>
      <p>Oval Office
room
loc at
Oval Office
room
is in</p>
      <p>White House is in
building</p>
      <p>
        Entrance Hall
room
anomalies. This observation inspires the de nition of an RDF Normal Form
(RNF). Returning to the direct mapping, we prove that a relational schema is
in BCNF if and only if the corresponding TBox with its constraints guarantees
RNF. As a kind of surprise, it turns out that | for relational schemas in BCNF
| the additional expressive power of tree-based ids is not needed to capture FDs.
Indeed, under the restriction to BCNF, the original form of ids introduced by
Calvanese, De Giacomo, and Lenzerini [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] is expressive enough to transfer FDs
from the relational schema to the DL TBox. Finally, we propose an algorithm,
which decides in polynomial time whether a given set tids is in RNF. We will
now give a short example, that illustrates of tids and RNF.
      </p>
      <p>
        Example 1. Consider the two RDF graphs in Figure 1. Both RDF graphs store
data about buildings. Each building has several rooms with an address. Clearly,
all rooms in the same building have the same address. Such a restriction can be
expressed using a tid. In the left RDF graph of Figure 1, the information that the
"White House" is located in "16000 PA Av" is stored redundantly, due to the
design, where rooms in a building have addresses rather than the building has the
address itself. We can avoid such a redundancy by storing the address connected
directly to the building concept, as it is in the right RDF graph of Figure 1. Our
de nition of RNF detects such problems in the design of DL TBoxes with tids.
Future Work On top of our agenda for future research is the extension of our
work on RNF. So far, we have concentrated on preserving BCNF of a relational
schema under the direct mapping of relational data to RDF. However, normal
forms for eliminating redundancies in the data would be an interesting topic for
the design of TBoxes in general. We thus see three main directions to continue our
work. First, we would like to extend the de nition of our RNF to other, maybe
more expressive, DLs than DL-LiteRDFS;tid , e.g. also to the DL CF D introduced
by Toman and Wedell. Note that this raises highly non-trivial questions concerning
the recognizability of the normal form, since our PTIME-membership result for
this task crucially depends on the language restrictions of DL-LiteRDFS;tid .
Second, we also want to investigate relaxations of our de nition of RNF. In our
current de nition, we request that a set of tids must be equivalent to a set of
fully local ids. This allows us to capture BCNF in DL-LiteRDFS;tid . However, for
the de nition of a normal form of more expressive DLs, the equivalence of tids
to a richer class of ids { such as local pids considered by Calvanese et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] may
be more appropriate. And at last, we would like to investigate the relationship of
RNF to other normal forms of non-relational data sources, e.g. XML [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], nested
relations [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] or object-oriented data models, like F-Logic [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
20. Motik, B., Grau, B.C., Horrocks, I., Wu, Z., Fokoue, A., Lutz, C.: OWL 2 web
ontology language: Pro les. http://www.w3.org/TR/owl2-profiles/ (2012)
21. Sequeda, J., Arenas, M., Miranker, D.P.: On directly mapping relational databases
to RDF and OWL. In: Proc. of the 21st Int. World Wide Web Conf. (WWW 2012).
pp. 649{658. ACM (2012)
22. Toman, D., Weddell, G.E.: On the interaction between inverse features and
pathfunctional dependencies in description logics. pp. 603{608 (2005)
23. Toman, D., Weddell, G.E.: On keys and functional dependencies as rst-class
citizens in description logics. J. of Automated Reasoning 40(2{3), 117{132 (2008)
24. Toman, D., Weddell, G.E.: CFDnc: A PTIME description logic with functional
constraints and disjointness. In: DL-13. pp. 451{463 (2013)
25. US Government: data.gov. http://www.data.gov (2014)
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Arenas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Libkin</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>A normal form for XML documents</article-title>
          .
          <source>ACM Trans. on Database Systems</source>
          <volume>29</volume>
          (
          <issue>1</issue>
          ),
          <volume>195</volume>
          {
          <fpage>232</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Arenas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bertails</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prud0hommeaux</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sequeda</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>A direct mapping of relational data to RDF. W3C Recommendation, W3C</article-title>
          (Sep
          <year>2012</year>
          ), available at http://www.w3.org/TR/rdb-direct-mapping/
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Arenas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Botoeva</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryzhikov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sherkhonov</surname>
          </string-name>
          , E.:
          <article-title>Exchanging description logic knowledge bases</article-title>
          .
          <source>In: Proc. of the 13th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR</source>
          <year>2012</year>
          ). pp.
          <volume>308</volume>
          {
          <fpage>318</fpage>
          . AAAI Press (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Biskup</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Menzel</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polle</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sagiv</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Decomposition of relationships through pivoting</article-title>
          .
          <source>In: Conceptual Modeling ER'96</source>
          , pp.
          <volume>28</volume>
          {
          <fpage>41</fpage>
          . Springer (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bizer</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heath</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berners-Lee</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Linked data - the story so far</article-title>
          .
          <source>Int. J. on Semantic Web Information Systems</source>
          <volume>5</volume>
          (
          <issue>3</issue>
          ),
          <volume>1</volume>
          {
          <fpage>22</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Brickley</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guha</surname>
            ,
            <given-names>R.V.</given-names>
          </string-name>
          :
          <source>RDF vocabulary description language 1</source>
          .0:
          <string-name>
            <given-names>RDF</given-names>
            <surname>Schema. W3C Recommendation</surname>
          </string-name>
          ,
          <source>World Wide Web Consortium (Feb</source>
          <year>2004</year>
          ), available at http://www.w3.org/TR/rdf-schema/
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Giacomo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poggi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
          </string-name>
          , R.:
          <article-title>Linking data to ontologies: The description logic DL-LiteA</article-title>
          .
          <source>In: Proc. of the 2nd Int. Workshop on OWL: Experiences and Directions (OWLED</source>
          <year>2006</year>
          ).
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>216</volume>
          .
          <string-name>
            <surname>CEUR-WS.org</surname>
          </string-name>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Giacomo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
          </string-name>
          , R.:
          <article-title>Path-based identi cation constraints in description logics</article-title>
          .
          <source>In: Proc. of the 11th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR</source>
          <year>2008</year>
          ). pp.
          <volume>231</volume>
          {
          <fpage>241</fpage>
          . AAAI Press (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Giacomo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Identi cation constraints and functional dependencies in description logics</article-title>
          .
          <source>In: Proc. of the 17th Int. Joint Conf. on Arti cial Intelligence (IJCAI</source>
          <year>2001</year>
          ). pp.
          <volume>155</volume>
          {
          <fpage>160</fpage>
          . Morgan Kaufmann (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fischl</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pichler</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sallinger</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simkus</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Capturing relational schemas and functional dependencies in RDFS</article-title>
          .
          <source>In: Proc. of the 28th AAAI Conf. on Arti cial Intelligence (AAAI</source>
          <year>2014</year>
          ). AAAI Press (
          <year>2014</year>
          ), to appear
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Codd</surname>
            ,
            <given-names>E.F.</given-names>
          </string-name>
          :
          <article-title>Further normalization of the data base relational model</article-title>
          .
          <source>IBM Research Report RJ909</source>
          , IBM, San Jose, California (
          <year>1971</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Codd</surname>
            ,
            <given-names>E.F.</given-names>
          </string-name>
          :
          <article-title>Normalized data structure: A brief tutorial</article-title>
          .
          <source>In: Proc. of the SIGFIDET Workshop</source>
          . pp.
          <volume>1</volume>
          {
          <fpage>17</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>1971</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>He</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>K.C.C.</given-names>
          </string-name>
          :
          <article-title>Accessing the deep web</article-title>
          .
          <source>Communications of the ACM</source>
          <volume>50</volume>
          (
          <issue>5</issue>
          ),
          <volume>94</volume>
          {
          <fpage>101</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>HM</surname>
          </string-name>
          <article-title>Government: data</article-title>
          .gov.uk. http://data.gov.uk (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Khizder</surname>
            ,
            <given-names>V.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weddell</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Reasoning about duplicate elimination with description logic</article-title>
          .
          <source>In: Computational LogicCL</source>
          <year>2000</year>
          , pp.
          <volume>1017</volume>
          {
          <fpage>1032</fpage>
          . Springer (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Areces</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          , et al.:
          <article-title>Keys, nominals, and concrete domains</article-title>
          .
          <source>J. Artif. Intell. Res.(JAIR) 23</source>
          ,
          <fpage>667</fpage>
          {
          <fpage>726</fpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Madhavan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Afanasiev</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antova</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Halevy</surname>
            ,
            <given-names>A.Y.</given-names>
          </string-name>
          :
          <article-title>Harnessing the deep web: Present and future</article-title>
          .
          <source>In: Proc. of the 4th Biennial Conf. on Innovative Data Systems Research (CIDR</source>
          <year>2009</year>
          )
          <article-title>(</article-title>
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Mannila</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Raiha, K.J.:
          <source>The Design of Relational Databases. Addison Wesley Publ. Co</source>
          . (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Mok</surname>
          </string-name>
          , W.Y.,
          <string-name>
            <surname>Ng</surname>
            ,
            <given-names>Y.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Embley</surname>
            ,
            <given-names>D.W.:</given-names>
          </string-name>
          <article-title>A normal form for precisely characterizing redundancy in nested relations</article-title>
          .
          <source>ACM Trans. Database Syst</source>
          .
          <volume>21</volume>
          (
          <issue>1</issue>
          ),
          <volume>77</volume>
          {106 (Mar
          <year>1996</year>
          ), http://doi.acm.
          <source>org/10</source>
          .1145/227604.227612
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>