1,913 Hits in 2.4 sec

A Deductive Database with Datalog and SQL Query Languages [chapter]

Fernando Sáenz-Pérez, Rafael Caballero, Yolanda García-Ruiz
2011 Lecture Notes in Computer Science  
Info: No integrity constraints. 12/5/2011 25 APLAS 2011 User User - -defined Integrity Constraints defined Integrity Constraints  SQL: SQL:   CHECK constraints (not supported by DES  ...  Integrity Constraints   Integrity constraints (IC): Integrity constraints (IC):   Strong constraints as known in databases Strong constraints as known in databases   Do not mix up with  ...  Error in relation  ... 
doi:10.1007/978-3-642-25318-8_8 fatcat:6lulawr5fvef5jbkgrapeg3yoa

Efficient Integrity Checking over XML Documents [chapter]

Daniele Braga, Alessandro Campi, Davide Martinenghi
2006 Lecture Notes in Computer Science  
This automatic process guarantees an efficient integrity checking that combines the advantages of declarativity with incrementality and early detection of inconsistencies.  ...  Such optimized constraints are automatically translated into equivalent XQuery expressions in order to avoid illegal updates.  ...  Efficient Integrity Checking over XML Documents  ... 
doi:10.1007/11896548_19 fatcat:s7zgcr7yrfd7lirxib24fhgzm4


William R. Marczak, Shan Shan Huang, Martin Bravenboer, Micah Sherr, Boon Thau Loo, Molham Aref
2010 Proceedings of the 2010 international conference on Management of data - SIGMOD '10  
SecureBlox enhances LogicBlox to enable distribution and static meta-programmability, and makes novel use of existing LogicBlox features such as integrity constraints.  ...  Our implementation of Se-cureBlox is a series of extensions to LogicBlox, an emerging commercial Datalog-based platform for enterprise software systems.  ...  This work was supported in part by Air Force Office of Scientific Research Grant No. FA95500810352, as well as NSF Grant Nos. IIS-0812270, CNS-0831376, and CAREER CNS-0845552.  ... 
doi:10.1145/1807167.1807246 dblp:conf/sigmod/MarczakHBSLA10 fatcat:f6jy4fn4onayxmznp5mib44hnu

A relational database integrity framework for access control policies

Romuald Thion, Stéphane Coulondre
2010 Journal of Intelligent Information Systems  
This framework is closely tied to relational database integrity models. We then show how to use well-founded procedures in order to enforce and check constraints.  ...  It denes the set of basic facts used in the decision process. Policies must satisfy a set of constraints dened in the model, which reect some high level organization requirements.  ...  SR(S, R) ⇒ ∃U SU (S, U ) SU (S, U ) ∧ SU (S, U ) ⇒ U = U SU (S, U ) ∧ SR(S, R) ⇒ U RA(U, R) Integrity constraints on ac states We dene a category of constraints ensuring that relations are well-founded  ... 
doi:10.1007/s10844-010-0146-z fatcat:fzzeqq4ucbdxdivakygewvn47a

A Datalog Semantics for Paralocks [chapter]

Bart van Delft, Niklas Broberg, David Sands
2013 Lecture Notes in Computer Science  
In this paper we provide a new semantics for Paralocks policies based on Datalog.  ...  Furthermore we show that by having a Datalog-inspired semantics, we can borrow language extensions and algorithms from Datalog for the benefit of Paralocks.  ...  Thanks to the ProSec group at Chalmers, in particular to Wolfgang Ahrendt and Pablo Buiras for discussions and feedback.  ... 
doi:10.1007/978-3-642-38004-4_20 fatcat:7rvvy5jvc5g47cbifr7xckkx6e

Programmable view update strategies on relations

Van-Dang Tran, Hiroyuki Kato, Zhenjiang Hu
2020 Proceedings of the VLDB Endowment  
Specifically, we introduce a novel approach to use Datalog to describe these update strategies. We propose a validation algorithm to check the well-behavedness of the written Datalog programs.  ...  The experimental results show that our framework is feasible and efficient in practice.  ...  This work is partially supported by the Japan Society for the Promotion of Science (JSPS) Grant-in-Aid for Scientific Research (S) No. 17H06099.  ... 
doi:10.14778/3377369.3377380 fatcat:grtocxxxhvdahhe4dnqurlhigu

Magic Sets and their application to data integration

Wolfgang Faber, Gianluigi Greco, Nicola Leone
2007 Journal of computer and system sciences (Print)  
Recently, effective methods model query-answering in data integration systems and inconsistent databases in terms of cautious reasoning over Datalog ¬ programs under the stable model semantics.  ...  Our Magic Sets optimization constitutes an effective method for enhancing the performance of data integration systems in which query-answering is carried out by means of cautious reasoning over Datalog  ...  An extension of the Magic Set technique for positive Datalog programs with integrity constraints has been presented in [48] . The proposed method is shown to be brave complete and cautious sound.  ... 
doi:10.1016/j.jcss.2006.10.012 fatcat:euekrhyltfedbo2bg5khlllbuy

Combining Safe Rules and Ontologies by Interfacing of Reasoners [chapter]

Uwe Aßmann, Jakob Henriksson, Jan Małuszyński
2006 Lecture Notes in Computer Science  
To reason in the integrated language, we aim at re-using and interfacing existing reasoners for the component languages.  ...  The paper presents a scheme for hybrid integration of rules languages with constraints languages including but not restricted to Description Logic-based ontologies.  ...  to Boris Motik, Michael Wessel and Birte Glimm for their helpful comments on the state of query languages of existing DL reasoners and to Wlodek Drabent and Artur Wilk for stimulating discussions on integration  ... 
doi:10.1007/11853107_3 fatcat:lthxvetqdjes7gz5j3wemhy2zy

Datalog with integer periodicity constraints

David Toman, Jan Chomicki
1998 The Journal of Logic Programming  
In this paper we introduce a generalization of Datalog that operates on periodicity constraints over integers. We develop a closed-form bottom-up evaluation procedure for this class of constraints.  ...  We extend this approach to combinations of classes of constraints over disjoint domains in the framework of Datalog. 0 1998 Elsevier Science Inc. All rights reserved.  ...  Rogers in the early stages of this research and the discussions with Peter Revesz are gratefully acknowledged. The authors would also  ... 
doi:10.1016/s0743-1066(97)10008-5 fatcat:trtzt7cef5c4nozjxpb25tpafi

Automatic generation of simplified weakest preconditions for integrity constraint verification [article]

A. Ai T -Bouziad
2006 arXiv   pre-print
Given a constraint c assumed to hold on a database B and an update u to be performed on B, we address the following question: will c still hold after u is performed?  ...  wp(c,u), then the updated database u(B) will satisfy c, and moreover wp(c,u) is simplified in the sense that its computation depends only upon the instances of c that may be modified by the update.  ...  the integrity constraints.  ... 
arXiv:cs/0603053v1 fatcat:bapejh7vvvfxtdio2y5eiiusli

Declarative Reconfigurable Trust Management [article]

William Marczak , Wenchao Zhou, Boon Thau Loo
2009 arXiv   pre-print
The LogicBlox language enhances Datalog in a variety of ways, including constraints and meta-programming, as well as support for programmer defined constraints which on the meta-model itself ?  ...  meta-constraints ? which act to restrict the set of allowable programs. LBTrust utilizes LogicBlox?  ...  While meta-constraints are usefully generally for imposing integrity constraints similar to those in databases, they are particularly useful in the context of LBTrust for expressing security restrictions  ... 
arXiv:0909.1759v1 fatcat:npikup43vbd37mx3fywupotmie

Intuitionistic Interpretation of Deductive Databases with Incomplete Information [chapter]

Fangqing Dong, Laks V. S. Lakshmanan
1993 Formal Methods in Databases and Software Engineering  
, instead of in the form of integrity constraints.  ...  It is not hard to see that these constraints on nulls can be represented in the form of integrity constraints.  ... 
doi:10.1007/978-1-4471-3213-4_11 fatcat:zrleuoerozdy5dsiadtieo2ycq

Approximating Constraint Propagation in Datalog [article]

Dario Campagna, Beata Sarna-Starosta, Tom Schrijvers
2011 arXiv   pre-print
We present a technique exploiting Datalog with aggregates to improve the performance of programs with arithmetic (in)equalities.  ...  Furthermore, our technique improves upon the previously reported in the literature constraint magic set transformation approach.  ...  Datalog LB extends Datalog with the notion of an integrity constraint of the form: Lhs -> Rhs.  ... 
arXiv:1112.3787v1 fatcat:gesnfzqtandgbpdag2iisr7foy

Intuitionistic interpretation of deductive databases with incomplete information

Fangqing Dong, Laks V.S. Lakshmanan
1994 Theoretical Computer Science  
, instead of in the form of integrity constraints.  ...  It is not hard to see that these constraints on nulls can be represented in the form of integrity constraints.  ... 
doi:10.1016/0304-3975(94)90191-0 fatcat:tjqjie43djftbc5floiq7qacyu

Declarative Semantics of Production Rules for Integrity Maintenance [chapter]

Luciano Caroprese, Sergio Greco, Cristina Sirangelo, Ester Zumpano
2006 Lecture Notes in Computer Science  
A production rule is a special form of active rule, called active integrity constraint, whose body contains an integrity constraint (conjunction of literals which must be false) and whose head contains  ...  The paper presents a declarative semantics for the maintenance of integrity constraints expressed by means of production rules.  ...  The computation of founded repairs can be done by checking whether for each repair all its update atoms are founded or by rewriting the constraints into a Datalog program and then computing its stable  ... 
doi:10.1007/11799573_5 fatcat:ih7kyx6wobduphus4uxwwiw5qa
« Previous Showing results 1 — 15 out of 1,913 results