2011
DOI: 10.2200/s00363ed1v01y201105dtm018
|View full text |Cite
|
Sign up to set email alerts
|

Fundamentals of Physical Design and Query Compilation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(41 citation statements)
references
References 33 publications
0
41
0
Order By: Relevance
“…To identify such cases, Buil-Aranda et al introduce a notion of strong boundedness of variables in graph patterns and use it to show a notion of safeness for the evaluation of patterns like P S within larger graph patterns. The idea behind the notion of strongly bound variables has already been used in earlier work (e.g., "certain variables" [34], "output variables" [37]), and it is tempting to adopt it for our problem. To this end, we first define the notion of strongly bound variables for our PP-based graph patterns: Definition 24.…”
Section: Web-safeness Of Context-based Semanticsmentioning
confidence: 99%
“…To identify such cases, Buil-Aranda et al introduce a notion of strong boundedness of variables in graph patterns and use it to show a notion of safeness for the evaluation of patterns like P S within larger graph patterns. The idea behind the notion of strongly bound variables has already been used in earlier work (e.g., "certain variables" [34], "output variables" [37]), and it is tempting to adopt it for our problem. To this end, we first define the notion of strongly bound variables for our PP-based graph patterns: Definition 24.…”
Section: Web-safeness Of Context-based Semanticsmentioning
confidence: 99%
“…The book of Toman and Weddell [18] overviews a broad approach to reformulation that maintains the logical/physical schema restriction, but adds access restrictions to the mix. A reformulation process that works for general first-order constraints is outlined, which produces a query over the physical schema, but one that may not abide by access restrictions.…”
Section: Introductionmentioning
confidence: 99%
“…The Byte-code compiler converts range-restricted first order formulae (both schema constraints and user queries) and generates the appropriate byte-code used by the Split Tableau VM. The Code generator converts query plans (still expressed as annotated first-order formulae) to actual imperative code, e.g., in C or LLVM (see, e.g., code fragments in [11]). The following sections now describe each of the modules.…”
Section: System Architecture and Componentsmentioning
confidence: 99%
“…The code for the plan is then a C get-first/get-next iterator representing a nested loops join applied on S and a simple complement of G, as outlined in [11].…”
Section: Query Planning and Optimizationmentioning
confidence: 99%
See 1 more Smart Citation