57,908 Hits in 4.2 sec

A uniform approach to constraint satisfaction and constraint satisfiability in deductive databases [chapter]

François Bry, Hendrik Decker, Rainer Manthey
1988 Lecture Notes in Computer Science  
Integrity maintenance methods have been definedfor preventing Updates from violating integrity constraints.  ...  Depending on the update, the füll check for constraint satisfaction is reduced to checking certain instances ofsome relevant constraints only.  ...  A Uniform Approach to Constraint Satisfaction and Constraint Satisfiability in Deductive Databases Introduction Integrity maintenance methods are intended to guarantee that all integrity constraints  ... 
doi:10.1007/3-540-19074-0_69 fatcat:djmt3gkyvzbgjo3i3k2zony2ci

Selection & Maintenance of Materialized View and It's Application for Fast Query Processing: A Survey

P.P Karde, V.M Thakare
2010 International Journal of Computer Science & Engineering Survey  
The materialization of all views is not possible because of the space constraint and maintenance cost constraint.  ...  A data warehouse uses multiple materialized views to efficiently process a given set of queries.  ...  Therfore the node selection, materialized view selection and maintenance of materialized views in distributed environment and its implication for fast query processing and query optimization comes in the  ... 
doi:10.5121/ijcses.2010.1202 fatcat:4cb2kuhl2nhxzddyc7p2hm2k3m

Page 7275 of Mathematical Reviews Vol. , Issue 98K [page]

1998 Mathematical Reviews  
Summary: “Given some integrity constraints over a distributed database, we consider the problem of incrementally checking global consistency in response to updates made to the base re- lations but without  ...  When the constraint is known to be satis- fied prior to the update, the state of the relations that are available (aka local) can in principle be used to infer something about the relations that are not  ... 

On Guard: Producing Run-Time Checks from Integrity Constraints [chapter]

Michael Benedikt, Glenn Bruns
2004 Lecture Notes in Computer Science  
An integrity guard is code executed before a data update is performed. The guard returns "true" just if the update will preserve data integrity.  ...  We seek a solution that can be applied in general programming contexts, and that leads to efficient integrity guards.  ...  Lucent engineers Julie Gibson and James Stuhlmacher contributed to the design of the constraint language and the DIL language.  ... 
doi:10.1007/978-3-540-27815-3_7 fatcat:uc2lupevjfayvfipb77btwnfqi

A Fast Method for Ensuring the Consistency of Integrity Constraints [chapter]

Barry G. T. Lowden, Jerome Robinson
1999 Lecture Notes in Computer Science  
In this paper we examine the problem of constraint maintenance and propose a fast method for validating additional and modified constraints.  ...  are made to the constraint base itself.  ...  Maintenance is particularly complex where conditional constraints are involved, ie. those specifying implication, since these may imply further constraints which are not explicitly defined in the constraint  ... 
doi:10.1007/3-540-48309-8_38 fatcat:2rx6ezjeindqdkbdcseiy5k53u

Declarative Semantics of Production Rules for Integrity Maintenance [chapter]

Luciano Caroprese, Sergio Greco, Cristina Sirangelo, Ester Zumpano
2006 Lecture Notes in Computer Science  
a disjunction of update atoms, i.e. actions to be performed if the corresponding constraints are not satisfied (i.e. are true).  ...  The paper presents a declarative semantics for the maintenance of integrity constraints expressed by means of production rules.  ...  Under such a semantics every database with integrity constraints admits repairs and consistent answers.  ... 
doi:10.1007/11799573_5 fatcat:ih7kyx6wobduphus4uxwwiw5qa

Handling Integrity in a KBMS Architecture for Workstation/Server Environments [chapter]

Stefan Deßloch
1991 Datenbanksysteme in Büro, Technik und Wissenschaft  
We discuss the integration of integrity maintenance into the global architecture of the system which is based on a workstation/server environment.  ...  This paper presents the concepts and mechanisms for maintaining semantic integrity of complex applications, which are provided by the knowledge base management system KRISYS.  ...  of integrity maintenance in an unacceptable way.  ... 
doi:10.1007/978-3-642-76530-8_5 dblp:conf/btw/Dessloch91 fatcat:zgkrzjazjnegxiug2frwimwihy

Deriving optimized integrity monitoring triggers from dynamic integrity constraints

M. Gertz, U.W. Lipeck
1996 Data & Knowledge Engineering  
Modern approaches to integrity monitoring in active databases suggest to generate triggers from constraints as part of database design and to utilize constraint simplification techniques for trigger optimization  ...  In this paper we want to study dynamic integrity constraints, i.e. constraints on state sequences instead of single states as in the static case.  ...  ., maintenance of minimal necessary historical information and control of allowed transitions become intrinsic tasks of monitoring such dynamic integrity constraints.  ... 
doi:10.1016/s0169-023x(96)00010-9 fatcat:26lx7usxcrfphehih4ofzv3eqq

Integrating Logic Programming and Production Systems in Abductive Logic Programming Agents [chapter]

Robert Kowalski, Fariba Sadri
2009 Lecture Notes in Computer Science  
The semantics and proof procedures are based on abductive logic programming, in which logic programs are integrated with integrity constraints that behave like production rules.  ...  In this paper we argue the case for integrating the distinctive functionalities of logic programs and production systems within an abductive logic programming agent framework.  ...  We have advocated an approach that combines the two kinds of rules in an observation-thought-decision-action cycle, along the lines of ALP agents, and sketched an approach that combines a declarative,  ... 
doi:10.1007/978-3-642-05082-4_1 fatcat:btdhdr5b5rg5favxoixqz2e534

AEC Collaborative Information Systems: From Requirements to Architecture [chapter]

Hossam El-Bibany
1994 Automation and Robotics in Construction Xi  
and the ability to operate under partial knowledge.  ...  This paper briefly presents the philosophy behind and the basis for a conceptual design of a human-computer architecture to facilitate design, management and coordination in AEC projects.  ...  Preliminary tests have served to build and refine the architecture. The tests were further convincing of the power of this approach in design, management and coordination tasks.  ... 
doi:10.1016/b978-0-444-82044-0.50072-2 fatcat:uha3ar7xh5ehlkyigrsjbdgcra

Active Integrity Constraints and Revision Programming [article]

L. Caroprese, M. Truszczynski
2010 arXiv   pre-print
We study active integrity constraints and revision programming, two formalisms designed to describe integrity constraints on databases and to specify policies on preferred ways to enforce them.  ...  Our main goal is to establish a comprehensive framework of semantics for active integrity constraints, to find a parallel framework for revision programs, and to relate the two.  ...  Acknowledgments The authors thank anonymous reviewers for many insightful comments that resulted in substantial improvements to the original manuscript.  ... 
arXiv:1009.2270v1 fatcat:mqjqgzdorjdpjm44ode2v2lpam

Active integrity constraints and revision programming

2010 Theory and Practice of Logic Programming  
AbstractWe studyactive integrity constraintsandrevision programming, two formalisms designed to describe integrity constraints on databases and to specify policies onpreferredways to enforce them.  ...  That lends support to the adequacy of the semantics we develop for each of the formalisms as the foundation for a declarative approach to the problem of database update and repair.  ...  Acknowledgments The authors thank anonymous reviewers for many insightful comments that resulted in substantial improvements to the original manuscript.  ... 
doi:10.1017/s1471068410000475 fatcat:udfrs4k5knh7dbnuntfacekicq

Managing RBAC states with transitive relations

Chaoyi Pang, David Hansen, Anthony Maeder
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
Thirdly, in the presence of conflict constraints, we explain how conflicts can be expressed, checked and evaluated under the existence of TC relations, in addition to the removal of conflicts redundancy  ...  We show that the use of transitive closure relations as the auxiliary relations for the maintenance of a RBAC state alleviates the process of query evaluation, removing redundancy and the description of  ...  OPERATIONS Paper [17] has proposed first-order maintenance algorithms on the reachability of roles (i.e., TC G R ) under various update operations.  ... 
doi:10.1145/1229285.1229306 dblp:conf/ccs/PangHM07 fatcat:jw2pivdjqbfydf4aqaiowtbnuq

Update rewriting and integrity constraint maintenance in a schema evolution support system

Carlo A. Curino, Hyun Jin Moon, Alin Deutsch, Carlo Zaniolo
2010 Proceedings of the VLDB Endowment  
that enable the rewriting of updates, and (iv) develop a unified approach for query and update rewriting under constraints.  ...  Recent work has produced algorithms and systems that automate the process of data migration and query adaptation; however, the problems of evolving integrity constraints and supporting legacy updates under  ...  None of the above addresses updates under schema and integrity constraints evolution.  ... 
doi:10.14778/1921071.1921078 fatcat:hzbitzrp7zcezdt42izapwwf7m

Coordination of Midterm Outage Scheduling With Short-Term Security-Constrained Unit Commitment

Yong Fu, Zuyi Li, M. Shahidehpour, Tongxin Zheng, E. Litvinov
2009 IEEE Transactions on Power Systems  
The decomposition and cooperation strategy is applied to the first two subproblems for the scheduling of generation and transmission maintenance.  ...  The proposed model solves the coordinated generation and transmission maintenance scheduling with security-constrained unit commitment (SCUC) over the scheduling horizon of weeks to months.  ...  No maintenance cost is considered under market environment. A.  ... 
doi:10.1109/tpwrs.2009.2030289 fatcat:vs5ljkmdf5ab7csqyf2kjfsifq
« Previous Showing results 1 — 15 out of 57,908 results