Results 1 - 10
of
15,500
ON INTEGRITY CONSTRAINTS
"... We address the concept of a static integrity constraint as it arises in databases and Artificial Intelligence knowledge representation languages. Such constraints are meant to characterize the acceptable states of a knowledge base, and are used to enforce these legal states. We adopt the perspective ..."
Abstract
- Add to MetaCart
We address the concept of a static integrity constraint as it arises in databases and Artificial Intelligence knowledge representation languages. Such constraints are meant to characterize the acceptable states of a knowledge base, and are used to enforce these legal states. We adopt
Integrity Constraints for XML
, 1999
"... this paper, we extend XML DTDs with several classes of integrity constraints and investigate the complexity of reasoning about these constraints. The constraints range over keys, foreign keys, inverse constraints as well as ID constraints for capturing the semantics of object identities. They imp ..."
Abstract
-
Cited by 97 (11 self)
- Add to MetaCart
this paper, we extend XML DTDs with several classes of integrity constraints and investigate the complexity of reasoning about these constraints. The constraints range over keys, foreign keys, inverse constraints as well as ID constraints for capturing the semantics of object identities
Integrity Constraints
"... enforce valid attribute values from domain sets domain set may exclude null values ..."
Abstract
- Add to MetaCart
enforce valid attribute values from domain sets domain set may exclude null values
Merging with Integrity Constraints
, 1999
"... We consider, in this paper, the problem of knowledge base merging with integrity constraints. We propose a logical characterization of those operators and give a representation theorem in terms of preorders on interpretations. We show the close connection between belief revision and merging oper ..."
Abstract
-
Cited by 53 (11 self)
- Add to MetaCart
We consider, in this paper, the problem of knowledge base merging with integrity constraints. We propose a logical characterization of those operators and give a representation theorem in terms of preorders on interpretations. We show the close connection between belief revision and merging
Integrating Constraints and Metric Learning in Semi-Supervised Clustering
- In ICML
, 2004
"... Semi-supervised clustering employs a small amount of labeled data to aid unsupervised learning. Previous work in the area has utilized supervised data in one of two approaches: 1) constraint-based methods that guide the clustering algorithm towards a better grouping of the data, and 2) distanc ..."
Abstract
-
Cited by 248 (7 self)
- Add to MetaCart
Semi-supervised clustering employs a small amount of labeled data to aid unsupervised learning. Previous work in the area has utilized supervised data in one of two approaches: 1) constraint-based methods that guide the clustering algorithm towards a better grouping of the data, and 2
Valid Time Integrity Constraints
- Univ of Arizona, Dept of Computer Science, TR
, 1994
"... This paper investigates temporal integrity constraints in valid time databases, i.e. databases that capture the time-varying nature of the part of reality being modeled. We first provide a taxonomy of integrity constraints in (temporal) databases in order to establish a common terminology. The ta ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
This paper investigates temporal integrity constraints in valid time databases, i.e. databases that capture the time-varying nature of the part of reality being modeled. We first provide a taxonomy of integrity constraints in (temporal) databases in order to establish a common terminology
Schema Integration with Integrity Constraints
- Advances in Databases, 15th British National Conf. on Databases, BNCOD 15
, 1997
"... . In this paper we discuss the use and treatment of integrity constraints in the federated database design process. We consider different situations occurring frequently in the schema transformation and schema integration process. Based on that, general rules are given which describe the correct ..."
Abstract
-
Cited by 9 (3 self)
- Add to MetaCart
. In this paper we discuss the use and treatment of integrity constraints in the federated database design process. We consider different situations occurring frequently in the schema transformation and schema integration process. Based on that, general rules are given which describe
Towards Transformation of Integrity Constraints and
"... Abstract — This paper discusses integrity constraint evolution, from two perspectives: From the perspective of changing the constraint, and from the perspective of consequently changing an existing database state. The paper concentrates on structural models provided by UML class diagrams and OCL inv ..."
Abstract
- Add to MetaCart
Abstract — This paper discusses integrity constraint evolution, from two perspectives: From the perspective of changing the constraint, and from the perspective of consequently changing an existing database state. The paper concentrates on structural models provided by UML class diagrams and OCL
Integrating Constraints and Direct Manipulation
- In Proceedings of the 1992 Symposium on Interactive 3D Graphics
, 1992
"... In this paper, we present techniques for integrating constraint and direct manipulation approaches to geometric modeling. Direct manipulation positioning techniques are augmented to provide the option of making the relationships they establish persistent. Differential constraint techniques are used ..."
Abstract
-
Cited by 31 (2 self)
- Add to MetaCart
In this paper, we present techniques for integrating constraint and direct manipulation approaches to geometric modeling. Direct manipulation positioning techniques are augmented to provide the option of making the relationships they establish persistent. Differential constraint techniques are used
Integrity Constraints in Trust Management
, 2005
"... We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust man ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust
Results 1 - 10
of
15,500