Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics
|
|
|
- Terence Cooper
- 10 years ago
- Views:
Transcription
1 Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada Joint work with: Andrei Lopatenko (Google, Zurich)
2 2 Introduction For several reasons databases may become inconsistent wrt a given set of integrity constraints (ICs) DBMS has no mechanism to maintain the ICs Data of different sources are integrated Even when the independent data sources are (locally) consistent, integrated data may be inconsistent (wrt global ICs) New constraints are imposed on pre-existing, legacy data Soft, user, or informational constraints, to be considered at query answering, but without being enforced Most likely most of the data in the DB is still consistent
3 3 Which is the data that is still consistent in the DB? Which are the semantically correct answer to queries posed to the inconsistent database? How can we obtain them? Considerable amount of research on consistent query answering (CQA) has been carried out for the last seven years In [Arenas, Bertossi, Chomicki. PODS 99]: Characterization of consistent answers to queries as the answers that are invariant under minimal repairs of the original database That is, true in all minimally repaired versions of the DB Mechanism based on FO query rewriting for computing them (for certain classes of queries and ICs)
4 Repairs of databases are consistent instances that minimize under set inclusion the set of insertions/deletions of whole database tuples 4 An instance D, seen as a set of ground atoms, maybe inconsistent wrt IC : A repair D of D is an instance that satisfies IC and makes (D, D ) minimal under set inclusion D = IC Q( t) : D = Q( t) for every D of D
5 5 Example 1: Inconsistent DB instance D wrt FD: Name Salary Employee Name Salary Page 5000 Page 8000 Smith 3000 Stowe 7000 Repairs D 1, resp. D 2 Employee Name Salary Page 5000 Smith 3000 Stowe 7000 Employee Name Salary Page 8000 Smith 3000 Stowe 7000 Consistent answers to the queries: Employee(x,y)?: (Smith, 3000), (Stowe, 7000) yemployee(x, y)?: Page, Smith, Stowe
6 Repairs are used as an auxiliary concept Try to compute consistent answers avoiding repair computation as much as possible First algorithm for CQA was based on FO query rewriting 6 Example 2: (continued) FD: xyz ( Employee(x, y) Employee(x, z) y = z) Query: Employee(x, y)? Consistent answers can be obtained by means of the transformed query T (Employee(x, y)) := Employee(x, y) z ( Employee(x, z) y = z)... those tuples (x, y) in the relation for which x does not have and associated z different from y... Pose the rewritten query to the original, inconsistent database
7 7 FO query rewriting works for limited classes of queries and ICs A more general mechanism is based on specifying database repairs using disjunctive logic programs with stable model semantics It is a general methodology, that can be applied to any FO query (and beyond) CQA using these programs gets an upper bound on data complexity of Π P 2 Today we have quite a clear picture of tractable/intractable cases for CQA [Bertossi. Sigmod Record, June 2006]
8 Complete analysis of complexity of CQA for scalar aggregate queries under FDs Most cases are NP-complete [Arenas, Bertossi, Chomicki. ICDT 01] 8 Complexity results for conjunctive queries under denial ICs and referential ICs Π P 2 -complete cases identified (and below) Even undecidability (cyclic referential ICs) [Chomicki, Marcinkowski. I&C 05], [Cali, Lembo, Rosati. PODS 2003] Conjunctive queries, FDs, and KDs: Broad and tight tractable classes identified [Chomicki, Marcinkowski. I&C 05], [Fuxman, Miller. ICDT 2005]
9 9 Other Repair Semantics Except for a few exceptions, most of the research has concentrated on this repair semantics for relational databases Repairs minimize under set inclusion the set of insertions or deletions of whole database tuples In different forms, and exploiting different aspects, two alternative repair semantics have been considered in the literature
10 10 Cardinality-based Repair Semantics: A repair D minimizes the cardinality of the set of whole tuples by which it differs from the original DB D (D, D ) is minimized [Arenas, Bertossi, Chomicki. 2003] Example 3: DB schema P (X, Y, Z), FD : X Y D = {P (a, b, c),p(a, c, d),p(a, c, e)} D has two repairs wrt set inclusion They have a set-minimal difference with D D 1 = {P (a, b, c)}: (D, D 1 )={P (a, c, d),p(a, c, e)} D 2 = {P (a, c, d),p(a, c, e)}: (D, D 2 )={P (a, b, c)} Only D 2 is a cardinality-based repair: (D, D 2 ) is minimum
11 11 Attribute-based repair semantics: Repairs are obtained by fixing attribute values [Wijsen; 2003] Most commonly repairs minimize a numerical aggregation function over differences between attribute values in the original tuples and their repaired versions Usually the number of changes is minimized The distance function may be more general
12 12 [Bertossi, Bravo, Franconi, Lopatenko. DBPL 05]: Schemas with key constraints that are always satisfied Some attributes may take erroneous numerical values ICs are expressed by denial constraints that prohibit certain combinations of data values Changes of values in fixable numerical attributes are allowed to restore consistency Quadratic distance is kept to a minimum
13 13 Example 4: Denial constraints IC 1 : ID,P,A,M (Buy(ID,I,P), Client(ID,A,M),A<18,P >25) IC 2 : ID,A,M (Client(ID,A,M),A<18,M >50) D: Client ID A M Buy ID I P 1 CD 27 1 DVD 26 3 DVD 40
14 A (minimal) repair D with cost = =10 14 Client ID A M Buy ID I P 1 CD DVD DVD 40 A repair D with cost = =10 Client ID A M Buy ID I P 1 CD 27 1 DVD 26 3 DVD 40
15 The complexity of deciding the existence of a repair close enough to the original instance is NP-complete 15 CQA for ground atomic queries is P NP -hard (P NP aka P 2 ) co-np complete Polynomial Hierarchy conp P 2 NEXPTIME co-np EXPTIME PSPACE... second level of the P II 2 polynomial hierarchy P 2 P NP NP complete NP
16 16 Terminology: (repair semantics) S-repairs: Repairs based on minimal set difference C-repairs: Repairs based on minimum cardinality set difference A-repairs: Repairs based on minimization of aggregation over attribute changes
17 17 The repair semantics of choice may depend on: The application domain and databases at hand For example, the C-repair semantics may be better when a few tuples are in conflict with many others Properties of the semantics For example, C-repairs are a subset of S-repairs, so more consistent answers can be obtained Complexity issues...
18 Rep(D, IC, S): The repairs of a database instance D wrt integrity constraints IC, and a repair semantics S 18 CQA(Q, IC, S) :={ (D, t) D = Q( t) for all D Rep(D, IC, S) } (the decision problem of CQA) We are interested in data complexity
19 19 Motivation for this Research Provide a better understanding of complexity of CQA under the C-repair semantics Interesting per se, but also on the way: Formulation in graph-theoretic terms allows us to find interesting relationships for this semantics between: CQA (a certain semantics), and The possible semantics (an answer is consistently true when true in some repair)
20 Provide the first steps towards a study of CQA in a dynamic setting, when the DB undergoes some updates 20 Dynamic aspects of CQA have been largely ignored More research on incremental properties of- and algorithms for CQA is necessary to make ideas and techniques applicable The complexity analysis considers all the three (families of) semantics above Assumption: DB is consistent wrt the given ICs before the updates What is the complexity of CQA from the instance U (D) obtained by applying a finite sequence U of update operations to the consistent instance D?
21 We started this research motivated by the analysis of incremental complexity 21 C-repairs seemed to have better properties from this point of view (see later...) Then we decided to investigate also the static complexity of CQA under C-repairs Which had not been investigated before... We concentrate mostly on denial ICs
22 22 Example 5: DB schema P (X, Y, Z), FD : X Y Instance D 1 = {P (a, c, d),p(a, c, e)} is consistent For the update operation U : insert(p (a, f, d)), U(D 1 ) becomes inconsistent The only C-repair of U(D 1 ) is D 1 itself Thus, CQA from U(D 1 ) amounts to classic query answering from D 1 If we start from the consistent instance D 2 = {P (a, c, d)}, the same update action leads to two C-repairs: D 2, but also {P (a, f, d)} Now CQA from U(D 2 ) is different from classic query answering from D 2 (two repairs to consider)
23 23 Conflict Graphs for C-Repairs Given a set of denial constraints IC and a DB instance D: Conflict hypergraph: Vertices are the DB tuples Hyperedges are formed by DB tuples that simultaneously violate the same ground instance of one of the ICs [Arenas, Bertossi, Chomicki. ICDT 2001], [Chomicki, Marcinkowski. I&C 2005] Repairs are obtained by tuple deletions only
24 24 xyz (R(x, y) R(x, z) y z) R(a,e) R(c,b) R(a,b) R(a,c) T(c,e) R(a,b) S(b,c) xyzw (R(x, y) S(y, z) T (z, w))
25 There is a one-to-one correspondence between C-repairs of D wrt IC and the maximum independent sets, i.e. independent sets of maximum cardinality (MIS) 25 An independent set in a hypergraph is a set of vertices that does not contain any hyperedge A ground atomic query is consistently true if it is a vertex in every MIS Every tuple in D belongs to an S-repair, but not necessarily to a C-repair So, testing membership of vertices to some (or all) MIS becomes relevant
26 Useful polynomial time self-reducibility properties for MIS: 26 v some MIS of G v all MIS of G MIS(G), MIS(G ) differ by one v v v G G v v G v all MIS of G v some MIS of G We formulate the results in terms of (conflict) graphs, but they carry over to (conflict) hypergraphs G
27 27 As a consequence: The problems of CQA under the certain and possible C-repair semantics are polynomially reducible to each other (which is not true for the S-repair semantics) Proposition: The problems of deciding for a vertex in a graph if it belongs to some MIS and if it belongs to all MISs are both in P NP(log(n)) Obtained using as a subroutine an algorithm for computing the size of a maximum clique in a graph, which belongs to FP NP(log(n)) [Krentel. 1988] Thus: For denial constraints and ground atomic queries, CQA under C-repair semantics belongs to P NP(log(n)) What about hardness?
28 28 Before that, a useful representation theorem: Lemma: There is a fixed database schema D and a denial constraint, such that for every graph G, there is an instance D over D, whose C-repairs are in oneto-one correspondence with the MISs of G D can be built in polynomial time in the size of G Introduce a relation for vertices and a relation for labelled edges Padding the edges relation with many copies of the labels makes certain potential repairs too costly
29 29 For hardness, we establish first an auxiliary poly-time graph construction: the block B k (G, t) G 1 I k t G 1,G 2 are copies of a given graph G k a natural number t is a distinguished vertex G 2 I k+1 Two internally disconnected subgraphs I k,i k+1, with k and k +1nodes, resp. b Every vertex in G 1 (G 2 ) connected to every vertex in I k (I k+1 ) It holds: The cardinality of a MIS of G is equal to k iff t belongs to all MISs of B k (G, t)
30 30 Theorem: Deciding if a vertex belongs to all MISs of a graph is P NP(log(n)) -hard Can be proved by reduction from the following P NP(log(n)) -complete [Krentel. Op. cit.]: Given a graph G and an integer k, is the size of a maximum clique in G equivalent to 0 mod k? The complement graph of G is reduced to a graph G that is built by combining a number of versions of the block construction, so that counting sizes of maximum independent sets can be represented By the representation lemma, the graph in the theorem above can be represented as (reduced to) a database consistency problem
31 Corollary: For denial constraints, CQA for ground atomic queries under the C-repair semantics is P NP(log(n)) -complete 31 However: For the S-repair semantics: [Chomicki, Marcinkowski. 2005] This problem can be solved in polynomial time For conjunctive boolean queries and denial ICs, CQA is conp -complete
32 Incremental CQA and Parameterized Complexity 32 Given: D, IC, with D = IC U : U 1,...,U m, with m<c D Each U i an insertion, deletion or change of attribute value What about incremental CQA, i.e. CQA from U(D) wrt IC? The problem has several dimensions: The repair semantics The kind of ICs The kind of update actions in U
33 33 We have results for several combinations of these dimensions In contrast to what we had for the static case: Proposition: For the C-repair semantics, first-order boolean queries, and denial constraints: Incremental CQA is in PTIME in the size of D How does the algorithm do in terms of m, the size of the update sequence?
34 A naive algorithm in the proof provides an upper bound of O(n n m ), which is exponential in m 34 Can we do better? SayintimeO(f(m) n c )? A question about fixed parameter tractability: CQA p (Q, IC, S) :={(D, U, t) U is an update sequence, and Q( t) is consistently true in U(D) under repair semantics S} The parameter is the update sequence U (or its size m)
35 Proposition: Incremental CQA for ground atomic queries and functional dependencies under the C-repair semantics is in FPT, actually in time O(log(m) (1,2852 m + m n)) 35 Algorithm calls a subroutine for Vertex Cover Vertex Cover belongs to FPT
36 36 Again conflict graph G (totally disconnected by consistency) Update: m tuples are inserted, conflict graph G VC (G,k) decides if there is a vertex cover of size not bigger than k (FPT) Usebinarysearchstartingfromm with VC (G, _) to determine the size of a minimum vertex cover This is the minimum number of tuples that have to be removed to restore consistency A ground atomic query (a vertex v of G ) is consistently true if it does not belong to any minimum vertex cover Answer is yes iff the sizes of minimum vertex covers for G and G {v} are the same
37 37 For FDs we have conflict graphs: two database atoms per IC For denial ICs we have hypergraphs... The FPT of incremental CQA still holds for denial ICs: Since they are fixed, the maximum number d of atoms in them is fixed This bounds the size of hyperedges We can use the FPT of the d-hitting Set: Finding the size of a minimum hitting set for a hypergraph with hyperedges bounded in size by d
38 38 Incremental CQA: S-Repair Semantics Under the C-repair semantics: (see above) For conjunctive boolean queries and denial ICs, static CQA is P NP(log(n)) -complete For conjunctive queries and denial ICs, incremental CQA is in PTIME However, under the S-repair semantics: For boolean conjunctive queries and denial ICs, incremental CQA is conp -complete This can be obtained by reduction from the static case for the S-semantics
39 39 Why the difference? The cost of a C-repair cannot exceed the size of an update, whereas the cost of an S-repair may be unbounded wrt the size of an update Example 6: Schema R( ),S( ); denial x y (R(x) S(y)) Consistent D = {R(1),...,R(n)} (empty table for S) After U = insert(s(0)), the database becomes inconsistent, and the S-repairs are {R(1),...,R(n)} and {S(0)} Only the former is a C-repair, at a distance 1 from D The second S-repair is at a distance n
40 40 Incremental CQA: A-Semantics For comparison with the static case, we consider first a quite general, weighted version of the A-repair semantics Numerical weight function w on tuples of the form (R( t),a,newvalue) R( t) D A is an attribute of R, and newvalue is a new value for A in R( t) The wa-repairs are consistent instances that minimize an aggregate function g on the values w(r( t),a,newvalue) Typically: w(r( t),a,newvalue) =δ(r( t).a, newvalue) and g := sum, i.e. only number of changes is counted Or, as in the example with numerical attributes: w((r( t),a,newvalue) :=(R( t).a newvalue) 2 g = sum
41 Proposition: Static CQA for ground atomic queries and denial constraints under the wa-repair semantics is P NP -hard 41 Obtained by reduction from the P NP -complete problem: [Krentel. Op.cit.] Given a propositional formula ψ(x 1,,X n ) in 3CNF: Is the last variable X n satisfying assignment? equal to 1 in the lexicographically maximum (answer is No if ψ is not satisfiable)
42 42 For the incremental part: For denial constraints, deletions as update actions are trivial; they do not introduce any violations Theorem: Incremental CQA wrt denial constraints and atomic queries under the wa-repair semantics is P NP -hard By reduction from static CQA for A-repairs as in [Bertossi, Bravo, Franconi, Lopatenko. DBPL 2005] Here one tuple insertion is good enough for the update part Attribute values changes are used to restore consistency
43 43 Ongoing and Future Work Analyze the complexity of CQA from the point of view of Dynamic complexity [Immerman; 1999], [Weber, Schwentick; 2005] Incremental complexity [Miltersen, Subramanian, Vitter, Tamassia; 1994] Here the DB is not necessarily consistent before the update Auxiliary data structures can be used for incremental computation
44 44 Parameterized complexity In many forms in CQA, both static and incremental Several parameters naturally offer themselves: number of inconsistencies in the database degree of inconsistency, i.e. the maximum number of violations per database tuple complexity of inconsistency, i.e. the length of the longest path in the conflict graph or hypergraph... These parameters are practically relevant in many applications, where inconsistencies are local [Bertossi, Bravo, Franconi, Lopatenko. 2005]
Repair Checking in Inconsistent Databases: Algorithms and Complexity
Repair Checking in Inconsistent Databases: Algorithms and Complexity Foto Afrati 1 Phokion G. Kolaitis 2 1 National Technical University of Athens 2 UC Santa Cruz and IBM Almaden Research Center Oxford,
Data Quality in Information Integration and Business Intelligence
Data Quality in Information Integration and Business Intelligence Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada : Faculty Fellow of the IBM Center for Advanced Studies
Query Answering in Peer-to-Peer Data Exchange Systems
Query Answering in Peer-to-Peer Data Exchange Systems Leopoldo Bertossi and Loreto Bravo Carleton University, School of Computer Science, Ottawa, Canada {bertossi,lbravo}@scs.carleton.ca Abstract. The
Logic Programs for Consistently Querying Data Integration Systems
IJCAI 03 1 Acapulco, August 2003 Logic Programs for Consistently Querying Data Integration Systems Loreto Bravo Computer Science Department Pontificia Universidad Católica de Chile [email protected] Joint
Introduction to Logic in Computer Science: Autumn 2006
Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding
XML Data Integration
XML Data Integration Lucja Kot Cornell University 11 November 2010 Lucja Kot (Cornell University) XML Data Integration 11 November 2010 1 / 42 Introduction Data Integration and Query Answering A data integration
On the Decidability and Complexity of Query Answering over Inconsistent and Incomplete Databases
On the Decidability and Complexity of Query Answering over Inconsistent and Incomplete Databases Andrea Calì Domenico Lembo Riccardo Rosati Dipartimento di Informatica e Sistemistica Università di Roma
HANDLING INCONSISTENCY IN DATABASES AND DATA INTEGRATION SYSTEMS
HANDLING INCONSISTENCY IN DATABASES AND DATA INTEGRATION SYSTEMS by Loreto Bravo A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
Lecture 7: NP-Complete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
On Scale Independence for Querying Big Data
On Scale Independence for Querying Big Data Wenfei Fan University of Edinburgh & Beihang University [email protected] Floris Geerts University of Antwerp [email protected] Leonid Libkin University
Fixed-Point Logics and Computation
1 Fixed-Point Logics and Computation Symposium on the Unusual Effectiveness of Logic in Computer Science University of Cambridge 2 Mathematical Logic Mathematical logic seeks to formalise the process of
CSC 373: Algorithm Design and Analysis Lecture 16
CSC 373: Algorithm Design and Analysis Lecture 16 Allan Borodin February 25, 2013 Some materials are from Stephen Cook s IIT talk and Keven Wayne s slides. 1 / 17 Announcements and Outline Announcements
Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
Computational Methods for Database Repair by Signed Formulae
Computational Methods for Database Repair by Signed Formulae Ofer Arieli ([email protected]) Department of Computer Science, The Academic College of Tel-Aviv, 4 Antokolski street, Tel-Aviv 61161, Israel.
Peer Data Exchange. ACM Transactions on Database Systems, Vol. V, No. N, Month 20YY, Pages 1 0??.
Peer Data Exchange Ariel Fuxman 1 University of Toronto Phokion G. Kolaitis 2 IBM Almaden Research Center Renée J. Miller 1 University of Toronto and Wang-Chiew Tan 3 University of California, Santa Cruz
Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li
Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order
CoNP and Function Problems
CoNP and Function Problems conp By definition, conp is the class of problems whose complement is in NP. NP is the class of problems that have succinct certificates. conp is therefore the class of problems
Data exchange. L. Libkin 1 Data Integration and Exchange
Data exchange Source schema, target schema; need to transfer data between them. A typical scenario: Two organizations have their legacy databases, schemas cannot be changed. Data from one organization
Data Integration: A Theoretical Perspective
Data Integration: A Theoretical Perspective Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 113, I 00198 Roma, Italy [email protected] ABSTRACT
Determination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
Scheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University
NP-Completeness CptS 223 Advanced Data Structures Larry Holder School of Electrical Engineering and Computer Science Washington State University 1 Hard Graph Problems Hard means no known solutions with
Small Maximal Independent Sets and Faster Exact Graph Coloring
Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected
Why? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
Updating Action Domain Descriptions
Updating Action Domain Descriptions Thomas Eiter, Esra Erdem, Michael Fink, and Ján Senko Institute of Information Systems, Vienna University of Technology, Vienna, Austria Email: (eiter esra michael jan)@kr.tuwien.ac.at
NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics
NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer
1 Definitions. Supplementary Material for: Digraphs. Concept graphs
Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.
A first step towards modeling semistructured data in hybrid multimodal logic
A first step towards modeling semistructured data in hybrid multimodal logic Nicole Bidoit * Serenella Cerrito ** Virginie Thion * * LRI UMR CNRS 8623, Université Paris 11, Centre d Orsay. ** LaMI UMR
Path Querying on Graph Databases
Path Querying on Graph Databases Jelle Hellings Hasselt University and transnational University of Limburg 1/38 Overview Graph Databases Motivation Walk Logic Relations with FO and MSO Relations with CTL
On the Relationship between Classes P and NP
Journal of Computer Science 8 (7): 1036-1040, 2012 ISSN 1549-3636 2012 Science Publications On the Relationship between Classes P and NP Anatoly D. Plotnikov Department of Computer Systems and Networks,
Generating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
Big Data Cleaning. Nan Tang. Qatar Computing Research Institute, Doha, Qatar [email protected]
Big Data Cleaning Nan Tang Qatar Computing Research Institute, Doha, Qatar [email protected] Abstract. Data cleaning is, in fact, a lively subject that has played an important part in the history of data
Algorithm Design and Analysis
Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;
OHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012
276 The P vs. NP problem is a major unsolved problem in computer science It is one of the seven Millennium Prize Problems selected by the Clay Mathematics Institute to carry a $ 1,000,000 prize for the
SIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 [email protected] 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
Bounded Treewidth in Knowledge Representation and Reasoning 1
Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
Tree-representation of set families and applications to combinatorial decompositions
Tree-representation of set families and applications to combinatorial decompositions Binh-Minh Bui-Xuan a, Michel Habib b Michaël Rao c a Department of Informatics, University of Bergen, Norway. [email protected]
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
Cycle transversals in bounded degree graphs
Electronic Notes in Discrete Mathematics 35 (2009) 189 195 www.elsevier.com/locate/endm Cycle transversals in bounded degree graphs M. Groshaus a,2,3 P. Hell b,3 S. Klein c,1,3 L. T. Nogueira d,1,3 F.
Policy Analysis for Administrative Role Based Access Control
Policy Analysis for Administrative Role Based Access Control Amit Sasturkar Ping Yang Scott D. Stoller C.R. Ramakrishnan Department of Computer Science, Stony Brook University, Stony Brook, NY, 11794,
Monitoring Metric First-order Temporal Properties
Monitoring Metric First-order Temporal Properties DAVID BASIN, FELIX KLAEDTKE, SAMUEL MÜLLER, and EUGEN ZĂLINESCU, ETH Zurich Runtime monitoring is a general approach to verifying system properties at
MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis
LOGIC AND COMPUTER SCIENCE Phokion G. Kolaitis Computer Science Department, University of California, Santa Cruz, CA 95064, USA Keywords: algorithm, Armstrong s axioms, complete problem, complexity class,
One last point: we started off this book by introducing another famously hard search problem:
S. Dasgupta, C.H. Papadimitriou, and U.V. Vazirani 261 Factoring One last point: we started off this book by introducing another famously hard search problem: FACTORING, the task of finding all prime factors
Discuss the size of the instance for the minimum spanning tree problem.
3.1 Algorithm complexity The algorithms A, B are given. The former has complexity O(n 2 ), the latter O(2 n ), where n is the size of the instance. Let n A 0 be the size of the largest instance that can
Degree Hypergroupoids Associated with Hypergraphs
Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated
CS510 Software Engineering
CS510 Software Engineering Propositional Logic Asst. Prof. Mathias Payer Department of Computer Science Purdue University TA: Scott A. Carr Slides inspired by Xiangyu Zhang http://nebelwelt.net/teaching/15-cs510-se
Cycles and clique-minors in expanders
Cycles and clique-minors in expanders Benny Sudakov UCLA and Princeton University Expanders Definition: The vertex boundary of a subset X of a graph G: X = { all vertices in G\X with at least one neighbor
A logical approach to dynamic role-based access control
A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
The Classes P and NP
The Classes P and NP We now shift gears slightly and restrict our attention to the examination of two families of problems which are very important to computer scientists. These families constitute the
Class One: Degree Sequences
Class One: Degree Sequences For our purposes a graph is a just a bunch of points, called vertices, together with lines or curves, called edges, joining certain pairs of vertices. Three small examples of
GRAPH THEORY LECTURE 4: TREES
GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection
Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms
CSCE 310J Data Structures & Algorithms P, NP, and NP-Complete Dr. Steve Goddard [email protected] CSCE 310J Data Structures & Algorithms Giving credit where credit is due:» Most of the lecture notes
Fabio Patrizi DIS Sapienza - University of Rome
Fabio Patrizi DIS Sapienza - University of Rome Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research
Relational Database Design
Relational Database Design To generate a set of relation schemas that allows - to store information without unnecessary redundancy - to retrieve desired information easily Approach - design schema in appropriate
A Turán Type Problem Concerning the Powers of the Degrees of a Graph
A Turán Type Problem Concerning the Powers of the Degrees of a Graph Yair Caro and Raphael Yuster Department of Mathematics University of Haifa-ORANIM, Tivon 36006, Israel. AMS Subject Classification:
Problem Set 7 Solutions
8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in
Guessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
Single machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
Reducing Clocks in Timed Automata while Preserving Bisimulation
Reducing Clocks in Timed Automata while Preserving Bisimulation Shibashis Guha Chinmay Narayan S. Arun-Kumar Indian Institute of Technology Delhi {shibashis, chinmay, sak}@cse.iitd.ac.in arxiv:1404.6613v2
The Complexity of Resilience and Responsibility for Self-Join-Free Conjunctive Queries
The Complexity of Resilience and Responsibility for Self-Join-Free Conjunctive Queries Cibele Freire Wolfgang Gatterbauer Neil Immerman Alexandra Meliou University of Massachusetts Carnegie Mellon University
THE PROBLEM WORMS (1) WORMS (2) THE PROBLEM OF WORM PROPAGATION/PREVENTION THE MINIMUM VERTEX COVER PROBLEM
1 THE PROBLEM OF WORM PROPAGATION/PREVENTION I.E. THE MINIMUM VERTEX COVER PROBLEM Prof. Tiziana Calamoneri Network Algorithms A.y. 2014/15 2 THE PROBLEM WORMS (1)! A computer worm is a standalone malware
Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course
Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course Alex Angelopoulos, NTUA January 22, 2015 Outline Alex Angelopoulos (NTUA) FoCS: Reductions & NP-completeness-
Bounded-width QBF is PSPACE-complete
Bounded-width QBF is PSPACE-complete Albert Atserias 1 and Sergi Oliva 2 1 Universitat Politècnica de Catalunya Barcelona, Spain [email protected] 2 Universitat Politècnica de Catalunya Barcelona, Spain
Lecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
CS2Bh: Current Technologies. Introduction to XML and Relational Databases. The Relational Model. The relational model
CS2Bh: Current Technologies Introduction to XML and Relational Databases Spring 2005 The Relational Model CS2 Spring 2005 (LN6) 1 The relational model Proposed by Codd in 1970. It is the dominant data
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
Exponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].
Factoring & Primality
Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount
1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)
Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:
Secure Cooperative Data Access in Multi-Cloud Environment
Mason Archival Repository Service http://mars.gmu.edu etd @ Mason (Electronic Theses and Dissertations) The Volgenau School of Engineering 2013 Secure Cooperative Data Access in Multi-Cloud Environment
Even Faster Algorithm for Set Splitting!
Even Faster Algorithm for Set Splitting! Daniel Lokshtanov Saket Saurabh Abstract In the p-set Splitting problem we are given a universe U, a family F of subsets of U and a positive integer k and the objective
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
