Tracing the lineage of view data in a warehousing environment
ACM Transactions on Database Systems (TODS)
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Lineage Tracing for General Data Warehouse Transformations
Proceedings of the 27th International Conference on Very Large Data Bases
Chimera: AVirtual Data System for Representing, Querying, and Automating Data Derivation
SSDBM '02 Proceedings of the 14th International Conference on Scientific and Statistical Database Management
Practical Lineage Tracing in Data Warehouses
ICDE '00 Proceedings of the 16th International Conference on Data Engineering
Designing the whyline: a debugging interface for asking questions about program behavior
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Verifying completeness of relational query results in data publishing
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Answering why and why not questions in user interfaces
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
VisTrails: visualization meets data management
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Taverna: lessons in creating a workflow environment for the life sciences: Research Articles
Concurrency and Computation: Practice & Experience - Workflow in Grid Systems
ULDBs: databases with uncertainty and lineage
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Provenance-based validation of e-science experiments
Web Semantics: Science, Services and Agents on the World Wide Web
An annotation management system for relational databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Recording and using provenance in a protein compressibility experiment
HPDC '05 Proceedings of the High Performance Distributed Computing, 2005. HPDC-14. Proceedings. 14th IEEE International Symposium
Tracing lineage beyond relational operators
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Special Issue: The First Provenance Challenge
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
On the provenance of non-answers to queries over extracted data
Proceedings of the VLDB Endowment
Project histories: managing data provenance across collection-oriented scientific workflow runs
DILS'07 Proceedings of the 4th international conference on Data integration in the life sciences
Proceedings of the 13th International Conference on Extending Database Technology
How to ConQueR why-not questions
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
The complexity of causality and responsibility for query answers and non-answers
Proceedings of the VLDB Endowment
Explaining missing answers to SPJUA queries
Proceedings of the VLDB Endowment
Automatic rule refinement for information extraction
Proceedings of the VLDB Endowment
TRAMP: understanding the behavior of schema mappings through provenance
Proceedings of the VLDB Endowment
Tracing data errors with view-conditioned causality
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Explaining accesses to electronic health records
Proceedings of the 2011 workshop on Data mining for medicine and healthcare
Proceedings of the VLDB Endowment
Query language constructs for provenance
Proceedings of the 15th Symposium on International Database Engineering & Applications
Diagnosing faults in embedded queries in database applications
Proceedings of the 2012 Joint EDBT/ICDT Workshops
DataPlay: interactive tweaking and example-driven correction of graphical database queries
Proceedings of the 25th annual ACM symposium on User interface software and technology
The nautilus analyzer: understanding and debugging data transformations
Proceedings of the 21st ACM international conference on Information and knowledge management
User feedback based query refinement by exploiting skyline operator
ER'12 Proceedings of the 31st international conference on Conceptual Modeling
Observing SQL queries in their natural habitat
ACM Transactions on Database Systems (TODS)
Certain and possible XPath answers
Proceedings of the 16th International Conference on Database Theory
A framework for query refinement with user feedback
Journal of Systems and Software
On modeling query refinement by capturing user intent through feedback
ADC '12 Proceedings of the Twenty-Third Australasian Database Conference - Volume 124
Compact explanation of data fusion decisions
Proceedings of the 22nd international conference on World Wide Web
Why not, WINE?: towards answering why-not questions in social image search
Proceedings of the 21st ACM international conference on Multimedia
Wondering why data are missing from query results?: ask conseil why-not
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Answering why-not queries in software-defined networks with negative provenance
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks
Efficient recovery of missing events
Proceedings of the VLDB Endowment
A probabilistic optimization framework for the empty-answer problem
Proceedings of the VLDB Endowment
Reasoning about explanations for negative query answers in DL-lite
Journal of Artificial Intelligence Research
Hi-index | 0.00 |
As humans, we have expectations for the results of any action, e.g. we expect at least one student to be returned when we query a university database for student records. When these expectations are not met, traditional database users often explore datasets via a series of slightly altered SQL queries. Yet most database access is via limited interfaces that deprive end users of the ability to alter their query in any way to garner better understanding of the dataset and result set. Users are unable to question why a particular data item is Not in the result set of a given query. In this work, we develop a model for answers to WHY NOT? queries. We show through a user study the usefulness of our answers, and describe two algorithms for finding the manipulation that discarded the data item of interest. Moreover, we work through two different methods for tracing the discarded data item that can be used with either algorithm. Using our algorithms, it is feasible for users to find the manipulation that excluded the data item of interest, and can eliminate the need for exhausting debugging.