1991
DOI: 10.1145/115302.115298
|View full text |Cite
|
Sign up to set email alerts
|

Reactive consistency control in deductive databases

Abstract: Classical treatment of consistency violations is to back out a database operation or transaction.In applications with large numbers of fairly complex consistency constraints this clearly is an unsatisfactory solution. Instead, if a violation is detected the user should be given a diagnosis of the constraints that failed, a line of reasoning on the cause that could have led to the violation, and suggestions for a repair. The problem is particularly complicated in a deductive database system where failures may b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

1997
1997
2003
2003

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(16 citation statements)
references
References 26 publications
0
16
0
Order By: Relevance
“…In [14], a system is described that generates actions from closed, range-restricted first order logic formulae. The repair algorithm can automatically find repairs for violated existential formulae without user intervention.…”
Section: Figure 11 Repair Manager Toolmentioning
confidence: 99%
“…In [14], a system is described that generates actions from closed, range-restricted first order logic formulae. The repair algorithm can automatically find repairs for violated existential formulae without user intervention.…”
Section: Figure 11 Repair Manager Toolmentioning
confidence: 99%
“…The methods developed by Decker (1986), Kowalski et al (1987), Lloyd et al (1987), Moerkotte and Lockemann (1991), Wuthrich (1993), Pastor and Olive (1994), Asirelli et al (1996), Lee and Ling (1996) deal with deductive databases. In the area of object-oriented databases we can refer the works of Jeusfeld and Jarke (1991), Palopoli and Torlone (1992), Siebes and Van der Voort (1992), Karadimce and Urban (1993).…”
Section: Static Integrity Constraint Enforcementmentioning
confidence: 99%
“…Some integrity checking methods are described by Hsu and Imielinski (1985), Kowalski et al (1987), Lloyd et al (1987), Bry et al (1988), Urban and Delcambre (1990), Bertino et al (1997). The works presented by Ceri and Widom (1990), Moerkotte and Lockemann (1991), Palopoli and Torlone (1992), Karadimce and Urban (1993), Wuthrich (1993), Ceri et al (1994b) are integrity maintenance methods.…”
Section: Static Integrity Constraint Enforcementmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of them [KM90,Wüt93,TO95,Dec97] consider view updating and integrity constraint maintenance without imposing significant restrictions on the integrity constraints they can handle. Other methods either impose significant restrictions on the constraints they can deal with, like [CHM95,CST95,LT97]; consider an integrity constraint checking approach [GL90] or do not tackle the view updating problem at all [ML91,CFPT94,Ger94,Maa98,Sch98]. However, most of these methods present important limitations regarding correctness and completeness.…”
Section: Introductionmentioning
confidence: 99%