Enforcement of integrity constraints by means of minimal sufficient changes

被引:0
|
作者
Dekhtyar, MI
Dikovsky, AY
Spyratos, N
机构
[1] Tver State Univ, Dept Comp Sci, Tver 170013, Russia
[2] MV Keldysh Appl Math Inst, Moscow 125047, Russia
[3] Univ Paris 11, LRI, CNRS, URA 410, F-91405 Orsay, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Enforced Update Problem we investigate in this paper is as follows: given a theory T that formalizes integrity constraints and an external update Delta that specifies the data to be added and the data to be deleted, one should introduce minimal changes in the given initial database state I sufficient to accomplish Delta and to restore T if the constraints were violated. We give an axiomatic description of solutions of this problem and describe a resolving algorithm.
引用
收藏
页码:63 / 70
页数:8
相关论文
共 50 条
  • [1] Distributed enforcement of integrity constraints
    Dahav, B
    Etzion, O
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2003, 13 (03) : 227 - 249
  • [2] Distributed Enforcement of Integrity Constraints
    Boris Dahav
    Opher Etzion
    [J]. Distributed and Parallel Databases, 2003, 13 : 227 - 249
  • [3] An overview of integrity constraints enforcement for a distributed database
    Ibrahim, H
    [J]. PDPTA'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, 2001, : 822 - 828
  • [4] ENFORCEMENT OF INTEGRITY CONSTRAINTS IN A SEMANTIC DATA MODEL
    SUDKAMP, N
    KANDZIA, P
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1989, 385 : 313 - 328
  • [5] Integrity constraint enforcement by means of trigger templates
    Domínguez, E
    Lloret, J
    Zapata, MA
    [J]. ADVANCES IN INFORMATION SYSTEMS, 2002, 2457 : 54 - 64
  • [6] Sufficient Conditions of Minimal Perturbation Constraints Efficient Solution
    Zhou Xuanwei
    Yu Lanmei
    [J]. 2010 CMSA OVERALL UNITED PLANNING SYMPOSIUM (OUPS 2010), 2010, : 92 - 95
  • [7] Geometric Derivations Of Minimal Sets Of Sufficient Multiview Constraints
    Thomas, Orrin H.
    Oshel, Edward R.
    [J]. PHOTOGRAMMETRIC RECORD, 2012, 26 (137): : 74 - 93
  • [8] Checking enforcement of integrity constraints in database applications based on code patterns
    Zhang, Hongyu
    Tan, Hee Beng Kuan
    Zhang, Lu
    Lin, Xi
    Wang, Xiaoyin
    Zhang, Chun
    Mei, Hong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2253 - 2264
  • [9] Trading integrity for availability by means of explicit runtime constraints
    Froihofer, Lorenz
    Osrael, Johannes
    Goeschka, Karl M.
    [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 14 - +
  • [10] Enforcement of Minimal Size and Area Constraints before and while Mining Patterns in Fuzzy Tensors
    Cerf, Loic
    [J]. 38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 369 - 376