[1]
M. Badawy and K. Richta, “Deriving Triggers from Integrity Constraint Specifications in the Database Management Systems”,
Acta Polytech
, vol. 41, no. 6, Jan. 2001, doi:
10.14311/286
.