393,440 Hits in 2.6 sec

Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins [chapter]

Davide Martinenghi
2004 Lecture Notes in Computer Science  
These features are also of interest in the context of database integrity constraints: correct and efficient integrity checking is crucial, as, without any guarantee of data consistency, the answers to  ...  In this paper we propose a method of practical relevance that can be used to derive, at database design time, simplified versions of such integrity constraints that can be tested before the execution of  ...  The problem of the simplification of integrity constraints containing aggregates seems, with few rare exceptions, to have been largely ignored.  ... 
doi:10.1007/978-3-540-25957-2_28 fatcat:lkckv3n3frfi7bu5kja2pfacwq

Distributed strategy-updating rules for aggregative games of multi-integrator systems with coupled constraints [article]

Xin Cai, Feng Xiao, Bo Wei
2021 arXiv   pre-print
In this paper, we explore aggregative games over networks of multi-integrator agents with coupled constraints.  ...  We first consider networks of double-integrator agents and then focus on multi-integrator agents.  ...  This paper is to investigate aggregative games of networks of multi-integrator agents with both coupled and local constraints.  ... 
arXiv:2106.10697v1 fatcat:5fcqosm54nejnlursdtu2rry54

Continuous-time integral dynamics for a class of aggregative games with coupling constraints

Claudio De Persis, Sergio Grammatico
2019 IEEE Transactions on Automatic Control  
We consider continuous-time equilibrium seeking in a class of aggregative games with strongly convex cost functions and affine coupling constraints.  ...  We propose simple, semi-decentralized integral dynamics and prove their global asymptotic convergence to a variational generalized aggregative or Nash equilibrium.  ...  CONCLUSION In aggregative games with affine coupling constraints, continuous-time integral dynamics with semi-decentralized computation and information exchange can ensure asymptotic convergence to a generalized  ... 
doi:10.1109/tac.2019.2939639 fatcat:vyoyf4s24zeyrlsellflo7dcku

Integration of Distribution Grid Constraints in an Event-Driven Control Strategy for Plug-in Electric Vehicles in a Multi-Aggregator Setting [chapter]

Klaas De Craemer, Stijn Vandael, Bert Claessens, Geert Deconinck
2014 Plug In Electric Vehicles in Smart Grids  
Moreover, the presence of multiple aggregators in the same distribution grid further complicates the problem.  ...  However, it is unclear how such technical mechanisms influence the market level control strategies of a PEV aggregator.  ...  of Distribution Grid ConstraintsIntegration of Distribution Grid ConstraintsIntegration of Distribution Grid ConstraintsIntegration of Distribution Grid ConstraintsIntegration  ... 
doi:10.1007/978-981-287-302-6_6 fatcat:mcvkj4fafjdufcnjsljhncg3fm

Spatial data integrity constraints in object oriented geographic data modeling

Karla A. V. Borges, Alberto H. F. Laender, Clodoveu A. Davis
1999 Proceedings of the seventh ACM international symposium on Advances in geographic information systems - GIS '99  
OMT model for geographic applications, at an early stage in the specification of integrity constraints in spatial databases.  ...  This paper discusses the relationship that exists between the nature of spatial information, spatial relationships, and spatial integrity constraints, and proposes the use of OMT-G, an extension of the  ...  The usage of this kind of aggregation imposes spatial integrity constraints as to the existence of the aggregated object and the corresponding sub-objects.  ... 
doi:10.1145/320134.320136 dblp:conf/gis/BorgesLD99 fatcat:onyfcs4wz5fsdh3ynbbztzt3ce

Lifting integrity constraints in binary aggregation

Umberto Grandi, Ulle Endriss
2013 Artificial Intelligence  
We describe rationality assumptions as integrity constraints using a simple propositional language and we explore the question of whether or not a given aggregation procedure will lift a given integrity  ...  We consider problems in which several individuals each need to make a yes/no choice regarding a number of issues and these choices then need to be aggregated into a collective choice.  ...  Acknowledgments We wish to thank Daniele Porello and the whole COMSOC group at the University of Amsterdam for fruitful and enthusiastic discussions.  ... 
doi:10.1016/j.artint.2013.05.001 fatcat:ltwkblshozhataezasely5byfi

The Common Structure of Paradoxes in Aggregation Theory [article]

Umberto Grandi
2014 arXiv   pre-print
a general framework for the study of aggregation problems called binary aggregation with integrity constraints.  ...  We generalise this observation by providing a full characterisation of the set of rationality assumptions on which the majority rule does not generate a paradox.  ...  Binary Aggregation with Integrity Constraints In this section we provide the basic definitions of the framework of binary aggregation with integrity constraints which we developed in previous work based  ... 
arXiv:1406.2855v1 fatcat:ivdr3lkhi5bingmlvbmxcv2eyi

Users Integrity Constraints in SOLAP Systems. Application in Agroforestry

Abdallah Bensalloua Charef, Hamdadou Djamila
2018 International Journal of Interactive Multimedia and Artificial Intelligence  
In this paper, we propose a system for the implementation of user integrity constraints in SOLAP namely "UIC-SOLAP".  ...  We integrate users Integrity Constraints (IC) by specifying visualization ICs according to their preferences and we define inter-facts ICs in this case.  ...  Acknowledgment A part of this study was carried out in collaboration with experts from the Forestry Administration of Mostaganem (Algeria).  ... 
doi:10.9781/ijimai.2018.01.003 fatcat:ket7ie3csna7fkwvtip445rrfi

Resolving constraint conflicts

Trent Jaeger, Reiner Sailer, Xiaolan Zhang
2004 Proceedings of the ninth ACM symposium on Access control models and technologies - SACMAT '04  
For example, a policy that permits a high integrity subject to access low integrity data is in conflict with a Biba integrity constraint.  ...  We use the SELinux example policy for Linux 2.4.19 as the source of our constraint conflicts and resolution examples.  ...  Those of the low integrity subject types are aggregated into an untrusted subject type.  ... 
doi:10.1145/990036.990053 dblp:conf/sacmat/JaegerSZ04 fatcat:gtdvlokusvafvkkyh5r7ip4one

Maintaining Global Integrity in Federated Relational Databases Using Interactive Component Systems [chapter]

Christopher Popfinger, Stefan Conrad
2005 Lecture Notes in Computer Science  
Global integrity constraints are decomposed into sets of partial integrity constraints, which are enforced directly by the affected Active Component Systems without the need of a global component.  ...  The maintenance of global integrity constraints in database federations is still a challenge since traditional integrity constraint management techniques cannot be applied to such a distributed management  ...  on the global schema: attribute constraints, key constraints, referential integrity constraints, and aggregate constraints.  ... 
doi:10.1007/11575771_34 fatcat:jegdh24rfjdkpcpk7dwt7tegaa

Database Aggregation [article]

Francesco Belardinelli, Umberto Grandi
2018 arXiv   pre-print
In the presence of an integrity constraint, we identify classes of aggregators that respect it in the aggregated database, provided all individual databases satisfy it.  ...  We also characterise languages for first-order queries on which the answer to queries on the aggregated database coincides with the aggregation of the answers to the query obtained on each individual database  ...  When integrity constraints are present, we study how to guarantee that a given aggregators "lifts" the integrity constraint from the individual to the collective level, i.e., the aggregated databases satisfies  ... 
arXiv:1802.08586v1 fatcat:k5fp4hgtsvccphueekkbib7kty

Algorithmically Efficient Syntactic Characterization of Possibility Domains

Josep Díaz, Lefteris Kirousis, Sofia Kokonezi, John Livieratos, Michael Wagner
2019 International Colloquium on Automata, Languages and Programming  
We call possibility integrity constraints the formulas of the specific syntactic type we define.  ...  We also show how to distinguish formulas that are possibility integrity constraints in linear time in the size of the input formula.  ...  This can prove valuable for applications in the field of judgment aggregation, where relations are frequently encountered in compact form, as the sets of models of integrity constraints.  ... 
doi:10.4230/lipics.icalp.2019.50 dblp:conf/icalp/DiazKKL19 fatcat:6kre6nqmajaybiju66soksjwbu

Service Constraint Guarantees

Aspen Olmsted, RoxAnn Stalvey
2014 International Journal of Intelligent Computing Research  
We study hierarchical constraints that offer an opportunity for optimization because of an expensive aggregation calculation required in the enforcement of the constraint.  ...  We consider enforcement of integrity constraints in a way that increases the availability while guaranteeing the correctness specified in the constraint.  ...  Our example with the sequence number is an example of a maximum aggregate association constraint. Normally the count has a value of one when enforcing referential integrity.  ... 
doi:10.20533/ijicr.2042.4655.2014.0055 fatcat:327gkfdcsrbcjitjqzjzyvbdkq

Transformation and Aggregation of Web Service Security Requirements

Robert Warschofsky, Michael Menzel, Christoph Meinel
2010 2010 Eighth IEEE European Conference on Web Services  
depends on the aggregated requirements of the orchestrated services.  ...  Based on this model, we introduce an algorithm that performs the aggregation of security requirements stated by the orchestrated services and mappings to transform WS-SecurityPolicy instances and the security  ...  Figure 11 . 11 Creation of the binding depending on the properties of the Binding-Confidentiality Constraint and the Binding-Integrity Constraint.  ... 
doi:10.1109/ecows.2010.13 dblp:conf/ecows/WarschofskyMM10 fatcat:nueqcs6qznddlcde7urocgmddm

Reconciling Schema Matching Networks Through Crowdsourcing

Nguyen Quoc Viet Hung, Nguyen Thanh Tam, Zoltán Miklós, Karl Aberer
2014 EAI Endorsed Transactions on Collaborative Computing  
As we will demonstrate the use of network-level integrity constraints can help both with quality improvements and also with cost reduction: these constraints can on the one hand help to reduce the number  ...  of necessary questions we need to ask, this it can reduce the overall cost of work, and at the same time, integrity constraints can largely contribute to detect quality problems with use input.  ...  This research has received funding from the NisB project -European Union's Seventh Framework Programme (grant agreement number 256955) and the PlanetData project -Network of Excellence (grant agreement  ... 
doi:10.4108/cc.1.2.e2 fatcat:3krlumybybffpmsgjvhz35epk4
« Previous Showing results 1 — 15 out of 393,440 results