128,333 Hits in 5.0 sec

Integrating Database and Programming Language Constraints [chapter]

Oded Shmueli, Mukund Raghavachari, Vivek Sarkar, Rajesh Bordawekar, Michael G. Burke
2004 Lecture Notes in Computer Science  
This explicit handcoding of integrity constraint checks is error-prone and results in less maintainable code when the integrity constraints on the application or the database change.  ...  We focus on EJB-database interactions as a concrete context for our work, but our results are applicable to other programming language-database interactions.  ...  The blurring of the boundary between databases and applications necessitates the development of new programming language abstractions for managing data access in an integrated application-database context  ... 
doi:10.1007/978-3-540-24607-7_7 fatcat:s7w6l7gmlrelrd62cztyecdz3u

Page 163 of Journal of Research and Practice in Information Technology Vol. 17, Issue 4 [page]

1985 Journal of Research and Practice in Information Technology  
Keywords and Phrases: Database management, deductive database, query language, integrity constraint, logic programming, Prolog.  ...  Such a language has a well-understood theory and provides a uniform notation for data, queries, integrity constraints, views and programs, We present algorithms for implementing domains, for using atoms  ... 

An Experimental CLP Platform for Integrity Constraints and Abduction [chapter]

Slim Abdennadher, Henning Christiansen
2001 Flexible Query Answering Systems  
Integrity constraint and abduction are important in query-answering systems for enhanced query processing and for expressing knowledge in databases.  ...  Explicit guards are omitted and no negation has been included in the language as it can be simulated by means of abduction and integrity constraints.  ...  Acknowledgment: The second author's participation in this research is supported in part by the DART project funded by the Danish Research Councils, by the Danish Natural-Science Research Council, and the  ... 
doi:10.1007/978-3-7908-1834-5_13 dblp:conf/fqas/AbdennadherC00 fatcat:odzjf3puhnc4dig42cgz5qnvya

Mechanisms for controlling evolution in persistent object systems

R Morrison, RCH Connor, QI Cutts, GNC Kirby, D Stemple
1993 Microprocessors and microsystems  
Persistent programming is concerned with the creation and manipulation of data with arbitrary lifetimes.  ...  The areas discussed are: the use of type systems, the use of reflection and a new style of programming, only available in persistent object systems, called hyperprogramming.  ...  Data protection is provided by integrity constraints in databases, type checking in programming languages and dynamic constraints such as capabilities in operating systems.  ... 
doi:10.1016/0141-9331(93)90047-b fatcat:utjsb2qpszc3novr7y3ymtup6q

Maintaining Global Integrity in Federated Relational Databases Using Interactive Component Systems [chapter]

Christopher Popfinger, Stefan Conrad
2005 Lecture Notes in Computer Science  
The maintenance of global integrity constraints in database federations is still a challenge since traditional integrity constraint management techniques cannot be applied to such a distributed management  ...  Since partial constraint checks are entirely implemented on a participating ACDBS using EPCs to access remote data, we decompose Key G into a set of partial integrity constraints Key projA and Key projB  ...  Subsequent developments integrated special purpose programming languages (e.g.  ... 
doi:10.1007/11575771_34 fatcat:jegdh24rfjdkpcpk7dwt7tegaa

The Constraint Operator of MedLan: its efficient implementation and use [chapter]

Patrizia Asirelli, Chiara Renso, Franco Turini
1998 Integrity and Internal Control in Information Systems  
The use of the constraint operator for security within a mediator architecture for database integration is suggested and presented by means of a simple example.  ...  A declarative mediator language, based upon operations among logic theories is introduced. In particular we concentrate on the constraint operator.  ...  CONCLUSIONS Our research on deductive database systems and, in particular, on the problem of integrating different databases led us to the design of a language that supports the notion of mediation via  ... 
doi:10.1007/978-0-387-35396-8_3 fatcat:5jae7tjj4jda7f2kpfyz546hc4

Data Integration and Answer Set Programming [chapter]

Thomas Eiter
2005 Lecture Notes in Computer Science  
We discuss why data integration can be an interesting model application of Answer Set programming, reviewing valuable features of non-monotonic logic programs in this respect, and emphasizing the role  ...  The rapid expansion of the Internet and World Wide Web led to growing interest in data and information integration, which should be capable to deal with inconsistent and incomplete data.  ...  I would like to thank all the many colleagues with whom I had the pleasure to discuss about and work on issues on data integration using non-monotonic logic programming, and here in particular the INFOMIX  ... 
doi:10.1007/11546207_2 fatcat:aqoiuvrci5bnlcszod2cr2mhta

A Deductive Database with Datalog and SQL Query Languages [chapter]

Fernando Sáenz-Pérez, Rafael Caballero, Yolanda García-Ruiz
2011 Lecture Notes in Computer Science  
Integrity Constraints   Integrity constraints (IC): Integrity constraints (IC):   Strong constraints as known in databases Strong constraints as known in databases   Do not mix up with  ...  Integrity Constraints 3.  ... 
doi:10.1007/978-3-642-25318-8_8 fatcat:6lulawr5fvef5jbkgrapeg3yoa

Integrity constraints in logic databases

Patrizia Asirelli, Michelle De Santis, Maurizio Martelli
1985 The Journal of Logic Programming  
We consider logic databases as logic programs and suggest how to deal with the problem of integrity constraint checking. Two methods for integrity constraint handling are presented.  ...  The second method is based on a transformation of the logic program which represents the database into a logic program which satisfies the given integrity constraints.  ...  We are grateful to lack Minker for useful comments and advice on a first draft. We also thank U. Montanari and J. A. Robinson for reading the paper and advising us. Our thanks go also to G. Levi, R.  ... 
doi:10.1016/0743-1066(85)90020-2 fatcat:jtss7pdkiretrinw6js2obfw6q

Extension of the relational database semantic processing model

T. Hirao
1990 IBM Systems Journal  
We have to create the interface routine for coordinating a conventional programming language and a logic programming language.  ...  Constraint defines the referential integrity and the relation integrity.  ... 
doi:10.1147/sj.294.0539 fatcat:cnj5elhlufbhfmjr2xq7oya734

Issues in the design of object-oriented database programming languages

Toby Bloom, Stanley B. Zdonik
1987 Conference proceedings on Object-oriented programming systems, languages and applications - OOPSLA '87  
Conclusions This paper describes some of the cultural assumptions that stand in the way of a seamless integration of databases and programming languages.  ...  Triggers and constraints are important tools in database design. They ensure that the many applications running on the database cannot violate the integrity of the data.  ... 
doi:10.1145/38765.38848 dblp:conf/oopsla/BloomZ87 fatcat:l6o422cdhjachg2krtvonsfx2i

Issues in the design of object-oriented database programming languages

Toby Bloom, Stanley B. Zdonik
1987 SIGPLAN notices  
Conclusions This paper describes some of the cultural assumptions that stand in the way of a seamless integration of databases and programming languages.  ...  Triggers and constraints are important tools in database design. They ensure that the many applications running on the database cannot violate the integrity of the data.  ... 
doi:10.1145/38807.38848 fatcat:hpm42phw7jdbveul2fhrqrlcga

Semantic integrity for persistent objects

PJ Barclay, JB Kennedy
1992 Information and Software Technology  
is based on an event-driven architecture. persistent programming, conceptual modelling, semantic integrity, active object-oriented databases, code generation  ...  An implementation of this model in a persistent programming language is described, allowing exible automated dynamic integrity management for applications updating a persistent store this implementation  ...  Summary Constructs for specifying semantic integrity in database schemata have been reviewed, and the realisation of these constructs in the modelling language NOODL described.  ... 
doi:10.1016/0950-5849(92)90147-h fatcat:qobomj64gndpjis4qo4p7avofe

Semantic Constructs for a Persistent Programming Language [chapter]

Shane B. Sparg, Sonia Berman
1993 Persistent Object Systems  
As a result programs are more difficult to write and the integrity of the data is compromised.  ...  This paper presents a persistent programming language which includes a constraint definition and checking system.  ...  Their role in certifying the papers and their contribution to enhancing the quality of papers is sincerely appreciated.  ... 
doi:10.1007/978-1-4471-3209-7_18 fatcat:zvsdwybdbrednovq5ponerf5hu

An ID-Logic Formalization of the Composition of Autonomous Databases [chapter]

Bert Van Nuffelen, Ofer Arieli, Alvaro Cortés-Calabuig, Maurice Bruynooghe
2005 Lecture Notes in Computer Science  
) and amalgamating the distributed and possibly contradictory data to one consistent database (data integration).  ...  We consider ID-logic theories that express, at the same time, the two basic challenges in database composition problems: relating different schemas of the local databases to one global schema (schema integration  ...  integrity constraints, 2. identify inconsistencies (i.e., violations of integrity constraints) and resolve them by making some (minimal amount of) changes in the unified database, 3 . search for solutions  ... 
doi:10.1007/11546207_11 fatcat:hixad6yey5h65hb6w7duh7svuy
« Previous Showing results 1 — 15 out of 128,333 results