Monadic Datalog, Tree Validity, and Limited Access Containment

被引:2
|
作者
Benedikt, Michael [1 ]
Bourhis, Pierre [2 ,3 ]
Gottlob, Georg [1 ]
Senellart, Pierre [3 ,4 ,5 ,6 ]
机构
[1] Univ Oxford, Parks Rd, Oxford OX1 3QD, England
[2] Univ Lille, CRIStAL, CNRS, Parc Sci Haute Borne 40,Ave Halley Bat B,Pk Plaza, F-59650 Villeneuve Dascq, France
[3] INRIA, Parc Sci Haute Borne 40,Ave Halley Bat B,Pk Plaza, F-59650 Villeneuve Dascq, France
[4] PSL Univ, CNRS, DI ENS, ENS, Paris, France
[5] IP Paris, Telecom Paris, LTCI, Palaiseau, France
[6] Ecole Normale Super, Dept Informat, B14,Rataud Wing,Ground Floor,45 Rue Ulm, F-75230 Paris 05, France
基金
英国工程与自然科学研究理事会;
关键词
Access patterns; binding patterns; deep Web; monadic datalog; query containment; EQUIVALENCE; QUERIES;
D O I
10.1145/3344514
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We reconsider the problem of containment of monadic datalog (MDL) queries in unions of conjunctive queries (UCQs). Prior work has dealt with special cases of the problem but has left the precise complexity characterization open. In addition, the complexity of one important special case, that of containment under access patterns, was not known before. We start by revisiting the connection between MDL/UCQ containment and containment problems involving regular tree languages. We then present a general approach for getting tighter bounds on the complexity of query containment, based on analysis of the number of mappings of queries into tree-like instances. We give two applications of the machinery. We first give an important special case of the MDL/UCQ containment problem that is in EXPTIME, and we use this bound to show an EXPTIME bound on containment under access patterns. Second, we show that the same technique can be used to get a new tight upper bound for containment of tree automata in UCQs. We finally show that the new MDL/UCQ upper bounds are tight. We establish a 2EXPTIME lower bound on the MDL/UCQ containment problem, resolving an open problem from the early 1990s. This bound holds for the MDL/CQ containment problem as well. We also show that changes to the conditions given in our special cases can not be eliminated, and that in particular slight variations of the problem of containment under access patterns become 2EXPTIME-complete.
引用
下载
收藏
页数:45
相关论文
共 50 条
  • [21] Monadic queries over tree-structured data
    Gottlob, G
    Koch, C
    17TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2002, : 189 - 202
  • [23] Tree containment with soft polytomies
    Bentert M.
    Weller M.
    Journal of Graph Algorithms and Applications, 2021, 25 (01) : 417 - 436
  • [24] CONTAINMENT FOR CONDITIONAL TREE PATTERNS
    Facchini, Alessandro
    Hirai, Yoichi
    Marx, Maarten
    Sherkhonov, Evgeny
    LOGICAL METHODS IN COMPUTER SCIENCE, 2015, 11 (02)
  • [25] On k-tree Containment Graphs of Paths in a Tree
    Liliana Alcón
    Noemí Gudiño
    Marisa Gutierrez
    Order, 2021, 38 : 229 - 244
  • [26] Onk-tree Containment Graphs of Paths in a Tree
    Alcon, Liliana
    Gudino, Noemi
    Gutierrez, Marisa
    ORDER-A JOURNAL ON THE THEORY OF ORDERED SETS AND ITS APPLICATIONS, 2021, 38 (02): : 229 - 244
  • [27] Linearity and nondeletion on monadic context-free tree grammars
    Fujiyoshi, A
    INFORMATION PROCESSING LETTERS, 2005, 93 (03) : 103 - 107
  • [28] The Equivalence of Tree Adjoining Grammars and Monadic Linear Context-free Tree Grammars
    Kepser S.
    Rogers J.
    Journal of Logic, Language and Information, 2011, 20 (3) : 361 - 384
  • [29] Commentary "Validity limited"
    Frohner, Michael
    AKTUELLE UROLOGIE, 2008, 39 (02) : 98 - 99
  • [30] 'LIMITED ACCESS'
    SANFORD, A
    OHIO REVIEW, 1987, (38): : 83 - 89