2004
DOI: 10.1007/978-3-540-30570-5_24
|View full text |Cite
|
Sign up to set email alerts
|

Rewriting Queries Using Views with Access Patterns Under Integrity Constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
66
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(66 citation statements)
references
References 20 publications
0
66
0
Order By: Relevance
“…In [2], a run-time optimization technique, that exploits the information about database dependencies that hold on the sources, is presented; [5] uses the structure of the query to minimize the accesses needed to retrieve all obtainable answers to a query. [9] solves the (quite general) problem of query answering using views [13] under integrity constraints and under access limitations by reducing it to the same problem under integrity constraints only; various extensions to the query languages are provided. In [20], the authors analyze the complexity of determining the feasibility of a query, i.e., determining whether there exists an equivalent query that is executable as is, while respecting the access limitations.…”
Section: Related Workmentioning
confidence: 99%
“…In [2], a run-time optimization technique, that exploits the information about database dependencies that hold on the sources, is presented; [5] uses the structure of the query to minimize the accesses needed to retrieve all obtainable answers to a query. [9] solves the (quite general) problem of query answering using views [13] under integrity constraints and under access limitations by reducing it to the same problem under integrity constraints only; various extensions to the query languages are provided. In [20], the authors analyze the complexity of determining the feasibility of a query, i.e., determining whether there exists an equivalent query that is executable as is, while respecting the access limitations.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper we focus on those problem settings where one is to find a rewriting of a given CQAC query in terms of given CQAC views, but an equivalent UCQAC rewriting does not exist, and thus the algorithm of [9] returns no answer. Further, Deutsch, Ludaescher, and Nash [16] provided approaches for solving the problem of rewriting queries using views with limited access patterns under integrity constraints, focusing on queries, views, and constraints over unions of conjunctive queries with negation. We comment on the contributions of [16] w.r.t.…”
Section: Let Q() :-P(a B) a ≤ B; V () :-P(x Y ) P(y X); And R() mentioning
confidence: 99%
“…Further, Deutsch, Ludaescher, and Nash [16] provided approaches for solving the problem of rewriting queries using views with limited access patterns under integrity constraints, focusing on queries, views, and constraints over unions of conjunctive queries with negation. We comment on the contributions of [16] w.r.t. the algorithms that we propose in this paper when discussing our specific contributions.…”
Section: Let Q() :-P(a B) a ≤ B; V () :-P(x Y ) P(y X); And R() mentioning
confidence: 99%
See 2 more Smart Citations