Fig. 3From: A study on machine learning techniques for the schema matching network problemOne-to-one constraint violationBack to article page