Filters








34,994 Hits in 5.2 sec

Deriving optimized integrity monitoring triggers from dynamic integrity constraints

M. Gertz, U.W. Lipeck
1996 Data & Knowledge Engineering  
If object situations are stored, integrity monitoring triggers can be generated from transition graphs for all situations and all critical database operations.  ...  In this paper, we show how to derive triggers from dynamic integrity constraints which describe properties of state sequences and which can be specified by formulas in temporal logic.  ...  Conclusions In this paper we have presented general rules how to derive integrity monitoring triggers from dynamic integrity constraints represented by transition graphs and also how to refine rules according  ... 
doi:10.1016/s0169-023x(96)00010-9 fatcat:26lx7usxcrfphehih4ofzv3eqq

Deriving Production Rules for Constraint Maintainance

Stefano Ceri, Jennifer Widom
1990 Very Large Data Bases Conference  
We describe an SQL-based language for defining integrity constraints and a framewcrk for translating these constraints into constraint-maintaining production rules.  ...  Traditionally, integrity constraints in database systems are maintained either by rolling back any transaction that produces an inconsistent state or by disallowing or modifying operations that may produce  ...  final" draft, to Alex Aiken, for assistance in proving Theorem 7.4, to She1 Finkelstein, for pointing out the correct interpretation of logical table T, and to Raymond Lorie, for suggesting the idea of constraints-to-rules  ... 
dblp:conf/vldb/CeriW90 fatcat:325uaef6iff4pf63cyvgu4ibre

Dynamic integrity constraints definition and enforcement in databases: a classification framework [chapter]

M. A. Pacheco Silva
1997 Integrity and Internal Control in Information Systems  
Since the database is expected to satisfy such conditions, a fundamental issue about integrity constraints is their enforcement. Many methods have been developed in this respect.  ...  A dynamic constraint expresses conditions that involve facts of two or more states of the database.  ...  The author is supported by a scholarship from CAPES (MEClBrazil).  ... 
doi:10.1007/978-0-387-35317-3_4 fatcat:gyyz3ehp2bfghfmlodgdf6eebq

Letter from the Editor-in-Chief

David B. Lomet
1994 IEEE Data Engineering Bulletin  
Transition Graphs The essential means of monitoring dynamic integrity constraints on state transitions are transition graphs.  ...  In addition to the construction of transition graphs from temporal formulae, transformations of these graphs into transactions and triggers are the main lines of the project.  ...  Constraint catalogs are maintained as database tables and can be queried using SQL.  ... 
dblp:journals/debu/Lomet94a fatcat:x5xcvkfmc5b2ppj4mvc45dpuqi

On Business Process Model Transformations [chapter]

Wasim Sadiq, Maria E. Orlowska
2000 Lecture Notes in Computer Science  
A simple algebraic notation for representing process graphs is also presented that can be used to reason about transformation operations.  ...  Applying pre-defined transformation operations can ensure that the modified process conforms to a given class of constraints specified in the original model.  ...  Given a process graph, we can represent it through a set of simple triggering constraints of the form: Simple triggering constraints: Triggering Constraint: Node → Term | Term → Node Term: Node | ( Node  ... 
doi:10.1007/3-540-45393-8_20 fatcat:jo5srdyfwrh5hb2jdeauu6bjnm

From the Behavior Model of an Animated Visual Language to its Editing Environment Based on Graph Transformation

Torsten Strobl, Mark Minas, Andreas Pleuss, Arnd Vitzthum
2010 Electronic Communications of the EASST  
Thereby, a graph can also represent dynamic aspects of a model, like animations, and graph transformations are triggered over time to control the behavior, like starting, modifying, and stopping animations  ...  A flexible approach for specifying model states and behavior is to use graphs and graph transformations.  ...  It has been used here to systematically derive DiaMeta specifications to generate interactive editors for animated VLs.  ... 
doi:10.14279/tuj.eceasst.32.515 dblp:journals/eceasst/StroblMPV10 fatcat:sgah4xi5ozgyxiatxa75gb7oai

A Rule-Based Approach to Analyzing Database Schema Objects with Datalog [article]

Christiane Engels, Andreas Behrend, Stefan Brass
2017 arXiv   pre-print
Database schema elements such as tables, views, triggers and functions are typically defined with many interrelationships.  ...  The expressiveness of the proposed analysis is exemplarily shown with the problem of computing induced functional dependencies for derived relations.  ...  Introduction The analysis of database schema elements such as tables, views, triggers, userdefined functions and constraints provides valuable information for database users for understanding, maintaining  ... 
arXiv:1709.05376v1 fatcat:lwskejown5eh3et4yeqx2hzlby

A graph model for software evolution

Luqi
1990 IEEE Transactions on Software Engineering  
We seek to formalize the objects and activities involved in software evolution in sufficient detail to enable automatic assistance for maintaining the consistency and integrity of an evolving software  ...  LUQI Absfrucf-This paper presents a graph model of software evolution.  ...  Constraints on State Transitions Evolution steps have a tree structure described by the "part-of" relation.  ... 
doi:10.1109/32.57627 fatcat:tfbcpskp3fgd5ivzujbj554rhi

Live programming in the LogicBlox system

Todd J. Green, Dan Olteanu, Geoffrey Washburn
2015 Proceedings of the VLDB Endowment  
The emerging category of self-service enterprise applications motivates support for "live programming" in the database, where the user's iterative data exploration triggers changes to installed application  ...  The workhorse architectural component is a "meta-engine" that incrementally maintains metadata representing application code, guides its compilation into an internal representation in the database kernel  ...  Whereas derivation rules define views, integrity constraints specify the set of legal database states.  ... 
doi:10.14778/2824032.2824075 fatcat:rjz4nqaymbg57bgiwn76bqa4pu

An Approach For Transforming of Relational Databases to OWL Ontology

Mona Dadjoo, Esmaeil Kheirkhah
2015 International journal of Web & Semantic Technology  
Metadata in relational databases can be used to extract ontology from database in a special domain.  ...  Mining and obtaining further components from relational database leads to obtain knowledge with high semantic power and more expressiveness.  ...  Approaches based on logical model derive their power from database creation language.  ... 
doi:10.5121/ijwest.2015.6102 fatcat:mbxj4z4npbdzfbx3527iotgo3e

Deciding Separation Logic Formulae by SAT and Incremental Negative Cycle Elimination [chapter]

Chao Wang, Franjo Ivančić, Malay Ganai, Aarti Gupta
2005 Lecture Notes in Computer Science  
Transitivity constraints over predicates are detected from the constraint graph and added on a need-to basis. Our solver handles Boolean and theory conflicts uniformly at the Boolean level.  ...  The graph based algorithm supports not only incremental theory propagation, but also constant time theory backtracking without using a cumbersome history stack.  ...  Such a graph implicitly encodes all the possible transitivity constraints.  ... 
doi:10.1007/11591191_23 fatcat:dr66vdug3vhjlh2wvpmvbxc5pa

Time-Dependent Simple Temporal Networks [chapter]

Cédric Pralet, Gérard Verfaillie
2012 Lecture Notes in Computer Science  
Such constraints are useful to model problems in which the transition time required between two activities may depend on the time at which the transition is triggered.  ...  The contributions are applied to the management of temporal constraints for so-called "agile" satellites.  ...  from x is triggered at time a. ldep ct (b) gives the latest triggering time of the transition in x for an arrival in b without delay.  ... 
doi:10.1007/978-3-642-33558-7_44 fatcat:qlgadvcejzdgldhgfng4ldpywe

A particle swarm optimization approach using adaptive entropy-based fitness quantification of expert knowledge for high-level, real-time cognitive robotic control

Deon de Jager, Yahya Zweiri, Dimitrios Makris
2019 SN Applied Sciences  
Control models, learnt from a knowledgebase, quickly become obsolete when the environment or the knowledgebase changes.  ...  The results show that the AE-SPSO/AEFQ approach successfully finds the optimal state-transition for each mission task and that autonomous flight control is successfully achieved.  ...  Benchmark mission 2: results The graph in Fig. 14 shows the dynamic velocity control, derived from the state-transition fitness.  ... 
doi:10.1007/s42452-019-1697-4 fatcat:yokharxvrjdvfcepcv635z5oom

Multi-Modal Motion Planning Using Composite Pose Graph Optimization [article]

L. Lao Beyer, N. Balabanska, E. Tal, S. Karaman
2021 arXiv   pre-print
constraints -- constitute a composite pose graph.  ...  Our proposed algorithm employs transcription of the optimization objective function, vehicle dynamics, and state and control constraints into sparse factor graphs, which -- combined with mode transition  ...  As may contain integrator states, the state constraint ∈ X and control input constraint ∈ U can technically apply to and and their derivatives up to ( −1) and ( −1) .  ... 
arXiv:2107.02384v1 fatcat:ci3byfy74naxflzzhv2qikhqn4

OCL2Trigger: Deriving active mechanisms for relational databases using Model-Driven Architecture

Harith T. Al-Jumaily, Dolores Cuadra, Paloma Martínez
2008 Journal of Systems and Software  
Our main contribution to this work is to provide a complete approach for deriving the active mechanisms for Relational Databases from the specification of the integrity constraints by using OCL.  ...  Transforming integrity constraints into active rules or triggers for verifying database consistency pro duces a serious and complex problem related to real time behaviour that must be considered for any  ...  Most relational database systems support procedural mechanisms (such as pro cedures and triggers) to maintain the integrity constraints of the database.  ... 
doi:10.1016/j.jss.2008.04.027 fatcat:2ivgve2lubd6pdyo4efbdaxezq
« Previous Showing results 1 — 15 out of 34,994 results