A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A uniform approach to constraint satisfaction and constraint satisfiability in deductive databases
[chapter]
1988
Lecture Notes in Computer Science
Integrity maintenance methods have been definedfor preventing Updates from violating integrity constraints. ...
Depending on the update, the füll check for constraint satisfaction is reduced to checking certain instances ofsome relevant constraints only. ...
A Uniform Approach to Constraint Satisfaction and Constraint Satisfiability in Deductive Databases
Introduction Integrity maintenance methods are intended to guarantee that all integrity constraints ...
doi:10.1007/3-540-19074-0_69
fatcat:djmt3gkyvzbgjo3i3k2zony2ci
Selection & Maintenance of Materialized View and It's Application for Fast Query Processing: A Survey
2010
International Journal of Computer Science & Engineering Survey
The materialization of all views is not possible because of the space constraint and maintenance cost constraint. ...
A data warehouse uses multiple materialized views to efficiently process a given set of queries. ...
Therfore the node selection, materialized view selection and maintenance of materialized views in distributed environment and its implication for fast query processing and query optimization comes in the ...
doi:10.5121/ijcses.2010.1202
fatcat:4cb2kuhl2nhxzddyc7p2hm2k3m
Page 7275 of Mathematical Reviews Vol. , Issue 98K
[page]
1998
Mathematical Reviews
Summary: “Given some integrity constraints over a distributed database, we consider the problem of incrementally checking global consistency in response to updates made to the base re- lations but without ...
When the constraint is known to be satis- fied prior to the update, the state of the relations that are available (aka local) can in principle be used to infer something about the relations that are not ...
On Guard: Producing Run-Time Checks from Integrity Constraints
[chapter]
2004
Lecture Notes in Computer Science
An integrity guard is code executed before a data update is performed. The guard returns "true" just if the update will preserve data integrity. ...
We seek a solution that can be applied in general programming contexts, and that leads to efficient integrity guards. ...
Lucent engineers Julie Gibson and James Stuhlmacher contributed to the design of the constraint language and the DIL language. ...
doi:10.1007/978-3-540-27815-3_7
fatcat:uc2lupevjfayvfipb77btwnfqi
A Fast Method for Ensuring the Consistency of Integrity Constraints
[chapter]
1999
Lecture Notes in Computer Science
In this paper we examine the problem of constraint maintenance and propose a fast method for validating additional and modified constraints. ...
are made to the constraint base itself. ...
Maintenance is particularly complex where conditional constraints are involved, ie. those specifying implication, since these may imply further constraints which are not explicitly defined in the constraint ...
doi:10.1007/3-540-48309-8_38
fatcat:2rx6ezjeindqdkbdcseiy5k53u
Declarative Semantics of Production Rules for Integrity Maintenance
[chapter]
2006
Lecture Notes in Computer Science
a disjunction of update atoms, i.e. actions to be performed if the corresponding constraints are not satisfied (i.e. are true). ...
The paper presents a declarative semantics for the maintenance of integrity constraints expressed by means of production rules. ...
Under such a semantics every database with integrity constraints admits repairs and consistent answers. ...
doi:10.1007/11799573_5
fatcat:ih7kyx6wobduphus4uxwwiw5qa
Handling Integrity in a KBMS Architecture for Workstation/Server Environments
[chapter]
1991
Datenbanksysteme in Büro, Technik und Wissenschaft
We discuss the integration of integrity maintenance into the global architecture of the system which is based on a workstation/server environment. ...
This paper presents the concepts and mechanisms for maintaining semantic integrity of complex applications, which are provided by the knowledge base management system KRISYS. ...
of integrity maintenance in an unacceptable way. ...
doi:10.1007/978-3-642-76530-8_5
dblp:conf/btw/Dessloch91
fatcat:zgkrzjazjnegxiug2frwimwihy
Deriving optimized integrity monitoring triggers from dynamic integrity constraints
1996
Data & Knowledge Engineering
Modern approaches to integrity monitoring in active databases suggest to generate triggers from constraints as part of database design and to utilize constraint simplification techniques for trigger optimization ...
In this paper we want to study dynamic integrity constraints, i.e. constraints on state sequences instead of single states as in the static case. ...
., maintenance of minimal necessary historical information and control of allowed transitions become intrinsic tasks of monitoring such dynamic integrity constraints. ...
doi:10.1016/s0169-023x(96)00010-9
fatcat:26lx7usxcrfphehih4ofzv3eqq
Integrating Logic Programming and Production Systems in Abductive Logic Programming Agents
[chapter]
2009
Lecture Notes in Computer Science
The semantics and proof procedures are based on abductive logic programming, in which logic programs are integrated with integrity constraints that behave like production rules. ...
In this paper we argue the case for integrating the distinctive functionalities of logic programs and production systems within an abductive logic programming agent framework. ...
We have advocated an approach that combines the two kinds of rules in an observation-thought-decision-action cycle, along the lines of ALP agents, and sketched an approach that combines a declarative, ...
doi:10.1007/978-3-642-05082-4_1
fatcat:btdhdr5b5rg5favxoixqz2e534
AEC Collaborative Information Systems: From Requirements to Architecture
[chapter]
1994
Automation and Robotics in Construction Xi
and the ability to operate under partial knowledge. ...
This paper briefly presents the philosophy behind and the basis for a conceptual design of a human-computer architecture to facilitate design, management and coordination in AEC projects. ...
Preliminary tests have served to build and refine the architecture. The tests were further convincing of the power of this approach in design, management and coordination tasks. ...
doi:10.1016/b978-0-444-82044-0.50072-2
fatcat:uha3ar7xh5ehlkyigrsjbdgcra
Active Integrity Constraints and Revision Programming
[article]
2010
arXiv
pre-print
We study active integrity constraints and revision programming, two formalisms designed to describe integrity constraints on databases and to specify policies on preferred ways to enforce them. ...
Our main goal is to establish a comprehensive framework of semantics for active integrity constraints, to find a parallel framework for revision programs, and to relate the two. ...
Acknowledgments The authors thank anonymous reviewers for many insightful comments that resulted in substantial improvements to the original manuscript. ...
arXiv:1009.2270v1
fatcat:mqjqgzdorjdpjm44ode2v2lpam
Active integrity constraints and revision programming
2010
Theory and Practice of Logic Programming
AbstractWe studyactive integrity constraintsandrevision programming, two formalisms designed to describe integrity constraints on databases and to specify policies onpreferredways to enforce them. ...
That lends support to the adequacy of the semantics we develop for each of the formalisms as the foundation for a declarative approach to the problem of database update and repair. ...
Acknowledgments The authors thank anonymous reviewers for many insightful comments that resulted in substantial improvements to the original manuscript. ...
doi:10.1017/s1471068410000475
fatcat:udfrs4k5knh7dbnuntfacekicq
Managing RBAC states with transitive relations
2007
Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07
Thirdly, in the presence of conflict constraints, we explain how conflicts can be expressed, checked and evaluated under the existence of TC relations, in addition to the removal of conflicts redundancy ...
We show that the use of transitive closure relations as the auxiliary relations for the maintenance of a RBAC state alleviates the process of query evaluation, removing redundancy and the description of ...
OPERATIONS Paper [17] has proposed first-order maintenance algorithms on the reachability of roles (i.e., TC G R ) under various update operations. ...
doi:10.1145/1229285.1229306
dblp:conf/ccs/PangHM07
fatcat:jw2pivdjqbfydf4aqaiowtbnuq
Update rewriting and integrity constraint maintenance in a schema evolution support system
2010
Proceedings of the VLDB Endowment
that enable the rewriting of updates, and (iv) develop a unified approach for query and update rewriting under constraints. ...
Recent work has produced algorithms and systems that automate the process of data migration and query adaptation; however, the problems of evolving integrity constraints and supporting legacy updates under ...
None of the above addresses updates under schema and integrity constraints evolution. ...
doi:10.14778/1921071.1921078
fatcat:hzbitzrp7zcezdt42izapwwf7m
Coordination of Midterm Outage Scheduling With Short-Term Security-Constrained Unit Commitment
2009
IEEE Transactions on Power Systems
The decomposition and cooperation strategy is applied to the first two subproblems for the scheduling of generation and transmission maintenance. ...
The proposed model solves the coordinated generation and transmission maintenance scheduling with security-constrained unit commitment (SCUC) over the scheduling horizon of weeks to months. ...
No maintenance cost is considered under market environment.
A. ...
doi:10.1109/tpwrs.2009.2030289
fatcat:vs5ljkmdf5ab7csqyf2kjfsifq
« Previous
Showing results 1 — 15 out of 57,908 results