Readings in Artificial Intelligence and Databases 1989
DOI: 10.1016/b978-0-934613-53-8.50038-8
|View full text |Cite
|
Sign up to set email alerts
|

Access Path Selection in a Relational Database Management System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0

Year Published

2004
2004
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(65 citation statements)
references
References 9 publications
0
65
0
Order By: Relevance
“…Second, note that given two groupings g and g ⊂ g and a tuple stream R satisfying the grouping g, R need not satisfy the grouping g . For example the tuple stream ((1, 2), (2,3), (1,4)) with the schema (a, b) is grouped by {a, b}, but not by {a}. This is different from orderings, where a tuple stream satisfying a ordering o also satisfies all orderings that are a prefix of o.…”
Section: Groupingmentioning
confidence: 99%
See 2 more Smart Citations
“…Second, note that given two groupings g and g ⊂ g and a tuple stream R satisfying the grouping g, R need not satisfy the grouping g . For example the tuple stream ((1, 2), (2,3), (1,4)) with the schema (a, b) is grouped by {a, b}, but not by {a}. This is different from orderings, where a tuple stream satisfying a ordering o also satisfies all orderings that are a prefix of o.…”
Section: Groupingmentioning
confidence: 99%
“…The importance of exploiting available orderings has been recognized in the seminal work of Selinger et al [4]. They presented the concept of interesting orderings and showed how redundant sort operations could be avoided by reusing available orderings, rendering sort-based operators like sort-merge join much more interesting.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, many previous works are focused on algorithms of obtaining an optimal access plan of a complex query. These algorithms are Divided into four different categories: (a) Deterministic Algorithms, Every algorithm in this category creates a solution, systematically, in a deterministic way, either by applying a heuristic search technique [24], (b) Randomized Algorithms, which aim to find the state which solution gives the globally minimum cost. [25] (such as Iterative Improvement Algorithm [27], Simulated Annealing Algorithm (SA) [28], Two-Phase Optimization (2PO) [26], Toured Simulated Annealing [29], and Random Sampling [30]), (c) Genetic Algorithms, which inspire the biological evolution by using a randomized search technique, while looking for good problem solutions [31].…”
Section: The Query Access Plan Problemmentioning
confidence: 99%
“…The members that survive the subsequent selection are considered the "fittest" ones [32], and the next generation relies on them. And the algorithm reaches its end when there is no further improvement and the solution is represented by the fittest member of the last population [24], and (d) Hybrid algorithms, which combine the strategies of pure deterministic and pure randomized algorithms: solutions obtained by deterministic algorithms are used as starting points for randomized algorithms or as initial population members for genetic algorithms [16], [20].…”
Section: The Query Access Plan Problemmentioning
confidence: 99%