• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Incremental maintenance of recursive views using relational calculus/sql. (2000)

by G Dong, J Su
Venue:SIGMOD Record,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 19
Next 10 →

A vision for management of complex models

by Philip A. Bernstein, Alon Y. Levy, Rachel A. Pottinger - SIGMOD Record , 2000
"... Many problems encountered when building applications of database systems involve the manipulation of models. By “model, ” we mean a complex structure that represents a design artifact, such as a relational schema, object-oriented interface, UML model, XML DTD, web-site schema, semantic network, comp ..."
Abstract - Cited by 172 (23 self) - Add to MetaCart
Many problems encountered when building applications of database systems involve the manipulation of models. By “model, ” we mean a complex structure that represents a design artifact, such as a relational schema, object-oriented interface, UML model, XML DTD, web-site schema, semantic network, complex document, or software configuration. Many uses of models involve managing changes in models and transformations of data from one model into another. These uses require an explicit representation of “mappings ” between models. We propose to make database systems easier to use for these applications by making “model ” and “model mapping ” first-class objects with special operations that simplify their use. We call this capability model management. In addition to making the case for model management, our main contribution is a sketch of a proposed data model. The data model consists of formal, object-oriented structures for representing models and model mappings, and of high-level algebraic operations on those structures, such as matching, differencing, merging, function application, selection, inversion and instantiation. We focus on structure and semantics, not implementation. 1
(Show Context)

Citation Context

...nition of containment correspond to the intuitive notion of set containment. It simplifies the maintenance of a materialized closure, which enables the content of a model to be identified efficiently =-=[DS00]. We expec-=-t it also simplifies algorithms for propagating delete, copy and other operations on models (cf. Section 5.1). Model schemas: We can "pull up" the definition of model to the schema level. A ...

Efficient Incremental Validation of XML Documents

by Denilson Barbosa, Alberto O. Mendelzon, Leonid Libkin, Laurent Mignet, Marcelo Arenas - In ICDE , 2004
"... We discuss incremental validation of XML documents with respect to DTDs and XML Schema definitions. We consider insertions and deletions of subtrees, as opposed to leaf nodes only, and we also consider the validation of ID and IDREF attributes. For arbitrary schemas, we give a worstcase time an ..."
Abstract - Cited by 39 (2 self) - Add to MetaCart
We discuss incremental validation of XML documents with respect to DTDs and XML Schema definitions. We consider insertions and deletions of subtrees, as opposed to leaf nodes only, and we also consider the validation of ID and IDREF attributes. For arbitrary schemas, we give a worstcase time and linear space algorithm, and show that it often is far superior to revalidation from scratch. We present two classes of schemas, which capture most reallife DTDs, and show that they admit a logarithmic time incremental validation algorithm that, in many cases, requires only constant auxiliary space. We then discuss an implementation of these algorithms that is independent of, and can be customized for different storage mechanisms for XML. Finally, we present extensive experimental results showing that our approach is highly efficient and scalable.
(Show Context)

Citation Context

...d with respect to their specifications, and that they remain valid after updates. Both integrity checking and incremental integrity checking are classical topics in the relational setting (see, e.g., =-=[6, 5]-=- and references therein). In the XML context, researchers are just beginning to look at update languages [17], validation [14], and incremental validation of specifications [11, 16]. In this paper, we...

Finite differencing of logical formulas for static analysis

by Thomas Reps , Mooly Sagiv, Alexey Loginov - IN PROC. 12TH ESOP , 2003
"... This paper concerns mechanisms for maintaining the value of an instrumentationpredicate (a.k.a. derived predicate or view), defined via a logical formula over core predicates, in response to changes in the values of the core predicates. It presents an algorithm fortransforming the instrumentation p ..."
Abstract - Cited by 37 (17 self) - Add to MetaCart
This paper concerns mechanisms for maintaining the value of an instrumentationpredicate (a.k.a. derived predicate or view), defined via a logical formula over core predicates, in response to changes in the values of the core predicates. It presents an algorithm fortransforming the instrumentation predicate's defining formula into a predicate-maintenance formula that captures what the instrumentation predicate's new value should be.This technique applies to program-analysis problems in which the semantics of statements is expressed using logical formulas that describe changes to core-predicate values,and provides a way to reflect those changes in the values of the instrumentation predicates.

Incremental XPath Evaluation

by Henrik Björklund, Wouter Gelade, Wim Martens
"... We study the problem of incrementally maintaining the result of an XPath query on an XML database under updates. In its most general form, this problem asks to maintain a materialized XPath view over an XML database. It assumes an underlying XML database D and a query Q. One is given a sequence of u ..."
Abstract - Cited by 15 (4 self) - Add to MetaCart
We study the problem of incrementally maintaining the result of an XPath query on an XML database under updates. In its most general form, this problem asks to maintain a materialized XPath view over an XML database. It assumes an underlying XML database D and a query Q. One is given a sequence of updates U to D and the problem is to compute the result of Q(U(D)), i.e., the result of evaluating query Q on the database D after having applied the updates U. In order to quickly answer this question, we are allowed to maintain an auxiliary data structure, and the complexity of the maintenance algorithms is measured in (i) the size of the auxiliary data structure, (ii) the worst-case time per update needed to compute Q(U(D)) and (iii) the worst-case time per update needed to bring the auxiliary data structure up to date. We allow three kinds of updates: node insertion, node deletion, and node relabeling. Our main results are that downward XPath queries can be incrementally maintained in time O(depth(D) · poly(|Q|)) per update and conjunctive forward XPath queries in time O(depth(D)·log(width(D))·poly(|Q|)) per update, where |Q | is the size of the query, and depth(D) and width(D) are the nesting depth and maximum number of siblings in the database D, respectively. The auxiliary data structures for maintenance are linear in |D | and polynomial in |Q | in all these cases.
(Show Context)

Citation Context

...ting a view in sub-linear time, this research has mostly investigated questions such as is it possible to maintain views expressed in language L1 by an algorithm expressible as a query in language L2 =-=[13]-=-. The goal is of course to obtain a language L2 which can be evaluated very quickly and which is well supported by the database system. In this sense, Dong and Topor investigate incremental evaluation...

Effectively-Propositional Reasoning about Reachability in Linked Data Structures ⋆

by Shachar Itzhaky, Anindya Banerjee, Neil Immerman, Ar Nanevski, Mooly Sagiv
"... Abstract. This paper proposes a novel method of harnessing existing SAT solvers to verify reachability properties of programs that manipulate linked-list data structures. Such properties are essential for proving program termination, correctness of data structure invariants, and other safety propert ..."
Abstract - Cited by 9 (2 self) - Add to MetaCart
Abstract. This paper proposes a novel method of harnessing existing SAT solvers to verify reachability properties of programs that manipulate linked-list data structures. Such properties are essential for proving program termination, correctness of data structure invariants, and other safety properties. Our solution is complete, i.e., a SAT solver produces a counterexample whenever a program does not satisfy its specification. This result is surprising since even first-order theorem provers usually cannot deal with reachability in a complete way, because doing so requires reasoning about transitive closure. Our result is based on the following ideas: (1) Programmers must write assertions in a restricted logic without quantifier alternation or function symbols. (2) The correctness of many programs can be expressed in such restricted logics, although we explain the tradeoffs. (3) Recent results in descriptive complexity can be utilized to show that every program that manipulates potentially cyclic, singly- and doubly-linked lists and that is annotated with assertions written in this restricted logic, can be verified with a SAT solver. We implemented a tool atop Z3 and used it to show the correctness of several linked list programs. 1
(Show Context)

Citation Context

...ect on reachability can be also done for cyclic data structures with a single pointer field. However, for programs with reachability over more than one field in general DAGs, quantifiers are required =-=[6]-=-. 2.4 Decidability of AE R Reachability constraints written as α〈next ∗ 〉β are not directly expressible in FOL. However, AE R formulas can be reduced to first-order ∀ ∗ ∃ ∗ formulas without function s...

Optimizing recursive queries in SQL

by Carlos Ordonez - In SIGMOD Conference , 2005
"... Recursion represents an important addition to the SQL lan-guage. This work focuses on the optimization of linear re-cursive queries in SQL. To provide an abstract framework for discussion, we focus on computing the transitive closure of a graph. Three optimizations are studied: (1) Early eval-uation ..."
Abstract - Cited by 8 (2 self) - Add to MetaCart
Recursion represents an important addition to the SQL lan-guage. This work focuses on the optimization of linear re-cursive queries in SQL. To provide an abstract framework for discussion, we focus on computing the transitive closure of a graph. Three optimizations are studied: (1) Early eval-uation of row selection conditions. (2) Eliminating duplicate rows in intermediate tables. (3) Dening an enhanced index to accelerate join computation. Optimizations are evaluated on two types of graphs: binary trees and sparse graphs. Bi-nary trees represent an ideal graph with no cycles and a linear number of edges. Sparse graphs represent an aver-age case with some cycles and a linear number of edges. In general, the proposed optimizations produce a signicant reduction in the evaluation time of recursive queries. 1.
(Show Context)

Citation Context

...a practical assumption (e.g. a geographical database); we have shown our optimization strategies also work on graphs with cycles. Important challenges exhibited by recursive queries are summarized in =-=[2, 3, 4, 11]-=-. Optimization by reducing redundant intermediate results is studied in [6]; our optimization on duplicate deletion is similar. Maintenance of recursive views through incremental insertions or deletio...

Information preservation in XML-to-relational mappings

by Denilson Barbosa, Juliana Freire, Alberto O. Mendelzon - Proc. of the Second International XML Database Symposium, XSym 2004 , 2004
"... We study the problem of storing XML documents using relational mappings. We propose a formalization of classes of mapping schemes based on the languages used for defining functions that assign relational databases to XML documents and vice-versa. We also discuss notions of information preservation f ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
We study the problem of storing XML documents using relational mappings. We propose a formalization of classes of mapping schemes based on the languages used for defining functions that assign relational databases to XML documents and vice-versa. We also discuss notions of information preservation for mapping schemes; we define lossless mapping schemes as those that preserve the structure and content of the documents, and validating mapping schemes as those in which valid documents can be mapped into legal databases, and all legal databases are (equivalent to) mappings of valid documents. We define one natural class of mapping schemes that captures all mappings in the literature, and show negative results for testing whether such mappings are lossless or validating. Finally, we propose a lossless and validating mapping scheme, and show that it performs well in the presence of updates. 1 1
(Show Context)

Citation Context

...17]; our notion of lossless mapping schemes is inspired by that of lossless decompositions of relations. The incremental checking of relational view/integrity constraints has also been widely studied =-=[15,12]-=-. Some of the view maintenance techniques have been extended to semi-structured models that were precursors of XML [23]. Another related problem, the incremental validation of XML documents w.r.t. XML...

Incremental maintenance of shortest distance and transitive closure in first-order logic and sql

by Chaoyi Pang, Guozhu Dong - ACM Trans. Database Syst
"... Given a database, the view maintenance problem is concerned with the efficient computation of the new contents of a given view when updates to the database happen. We consider the view maintenance problem for the situation when the database contains a (weighted) graph and the view is either the tran ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
Given a database, the view maintenance problem is concerned with the efficient computation of the new contents of a given view when updates to the database happen. We consider the view maintenance problem for the situation when the database contains a (weighted) graph and the view is either the transitive closure or the answer to the all-pairs shortest-distance problem (APSD). We give incremental algorithms for (APSD), which support both edge insertions and deletions. For transitive closure, the algorithm is applicable to a more general class of graphs than those previously explored. Our algorithms use first-order queries, along with addition (+) and less-than (<) operations (F O(+, <)); they store O(n 2) number of tuples, where n is the number of vertices, and have AC 0 data complexity for integer weights. Since F O(+, <) is a sublanguage of SQL and is supported by almost all current database systems, our maintenance algorithms are more appropriate for database applications than non-database query type of maintenance algorithms.
(Show Context)

Citation Context

...hey correct the wrong deletions by doing the relational natural join of the result of the first step with the modified graph several times. This generalizes the technique used in [Dong and Pang 1997; =-=Dong and Su 2000-=-] for the maintenance of the transitive closure of acyclic digraphs and undirected graphs. Organisation: We define necessary notations in Section 2. Section 3 gives our incremental algorithm for the d...

A Relaxed Approach to Integrity and Inconsistency in Databases

by Hendrik Decker, Davide Martinenghi
"... Abstract. We demonstrate that many, though not all integrity checking methods are able to tolerate inconsistency, without having been aware of it. We show that it is possible to use them to beneficial effect and without further ado, not only for preserving integrity in consistent databases, but also ..."
Abstract - Cited by 5 (5 self) - Add to MetaCart
Abstract. We demonstrate that many, though not all integrity checking methods are able to tolerate inconsistency, without having been aware of it. We show that it is possible to use them to beneficial effect and without further ado, not only for preserving integrity in consistent databases, but also in databases that violate their constraints. This apparently relaxed attitude toward integrity and inconsistency stands in contrast to approaches that are much more cautious wrt the prevention, identification, removal, repair and tolerance of inconsistent data that violate integrity. We assess several well-known methods in terms of inconsistency tolerance and give examples and counter-examples thereof. 1
(Show Context)

Citation Context

...l(3, 6), l(5, 10)} and U is the insertion of l(4, 8); then one concludes that D U (W ) = sat, since r(Z) ∧ 4 ≤ Z ≤ 8 ⊆ (r(Z) ∧ 3 ≤ Z ≤ 6) ∪ (r(Z) ∧ 5 ≤ Z ≤ 10), which holds basically because [4, 8] ⊆ =-=[3, 10]-=-. 1 We omit other restrictions, not relevant for the present discussion, included in [14] for technical reasons. (8)sTo show that here we do not have inconsistency tolerance, consider a case W ′ =← l(...

Refinement-Based Verification for Possibly-Cyclic Lists

by Alexey Loginov, Thomas Reps, Mooly Sagiv
"... In earlier work, we presented an abstraction-refinement mechanism that was successful in verifying automatically the partial correctness of in-situ list reversal when applied to an acyclic linked list [10]. This paper reports on the automatic verification of the total correctness (partial correctne ..."
Abstract - Cited by 4 (2 self) - Add to MetaCart
In earlier work, we presented an abstraction-refinement mechanism that was successful in verifying automatically the partial correctness of in-situ list reversal when applied to an acyclic linked list [10]. This paper reports on the automatic verification of the total correctness (partial correctness and termination) of the same list-reversal algorithm, when applied to a possibly-cyclic linked list. A key contribution that made this result possible is an extension of the finite-differencing technique [14] to enable the maintenance of reachability information for a restricted class of possibly-cyclic data structures, which includes possiblycyclic linked lists.
(Show Context)

Citation Context

...f the finite-differencing technique is its handling of reachability instrumentation relations, i.e., relations defined via the transitive-closure operator. In [14], we adapted a result by Dong and Su =-=[2]-=- to enable the maintenance of reachability information for acyclic data structures purely in first-order logic, i.e., without the recomputation of transitive closure, which generally results in a loss...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University