Magic Sets and their Application to Data Integration
|
|
- Earl Park
- 8 years ago
- Views:
Transcription
1 Magic Sets and their Application to Data Integration Wolfgang Faber, Gianluigi Greco, Nicola Leone Department of Mathematics University of Calabria, Italy
2 Roadmap Motivation: Data Integration Datalog Modularity Results Magic Sets Some Experiments Conclusions
3 Research Context EU-funded project: INFOMIX Data Integration Advanced System Dealing with Incomplete and Inconsistent Information Builds on Datalog system DLV Univ. Calabria (Leone, Faber et al.), Univ. Rome (Lenzerini, Rosati et al.), TU Vienna (Eiter, Gottlob et al.), Rodan (Staniszkis et al.)
4 Context: Data Integration Data integration system I = G, S, M : G = Ψ, Σ global (relational) scheme Ψ relation schemes, Σ integrity constraints, S Ψ, (relational) schema of the sources, M mapping between G and S.
5 Context: Data Integration Users issue queries on the global schema, and the system automatically retrieves data from the sources. But: Data stored in sources may violate global constraints Retrieved data might be inconsistent. Techniques for database repairing are needed. In many settings: co-np
6 Datalog for Repairing Data Idea: Given a data integration system I, construct a Datalog program Π(I) whose stable models are in one-to-one correspondence with repairs of I. The Cautious Consequences of Π(I) Coincide with the Consistent Query Answers
7 Datalog : Current Situation Competitive Systems: Bottom-Up Focus on Models, not Query-Answering Query Optimization Methods?
8 Datalog Syntax Rules: a :- b 1,..., b k, not b k+1,..., not b m. where a, b 1,..., b m are atoms and not denotes default negation. Intuitive reading: If b 1..., b k are true, and b k+1,..., b m are not true, then a is true.
9 Datalog Syntax Program P: finite set of safe rules. Base B P : set of all ground atoms constructible from constants and predicates in P. Ground Program Ground(P): set of rules obtained by applying all possible substitutions (from variables in P to constants in P) to P.
10 Stable Model Semantics An interpretation I B P is a model of a program P if it satisfies all rules in Ground(P). The reduct P I of a ground program P (wrt I) is obtained by 1. deleting all rules with false negative body 2. deleting the negative body of the other rules. the positive ground program. An interpretation I is a stable model of P iff it is the least model of Ground(P) I.
11 Example The program P 1 p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). has exactly two stable models: S 1 = {p(1), e(1)} and S 2 = {q(1), e(1)} Ground(P 1 ) S 1 = p(1) :- e(1). Ground(P 1 ) S 2 = q(1) :- e(1). e(1). e(1).
12 Example The program P 2 z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). has exactly one stable model: S 1 = {p(1), e(1)}
13 Example The program P 2 z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). has exactly one stable model: S 1 = {p(1), e(1)} S 2 = {z, q(1), t(1), e(1)} is not a stable model, as P S 2 2 does not contain a rule with z in the head. Note: z :- t(1), not z. acts like an integrity constraint t(1), inhibiting any stable model containing t(1).
14 Brave/Cautious Consequences A ground atom a is a brave consequence for P (P = b a) if a is true in some stable model of P. cautious consequence for P (P = c a) if a is true in all stable models. Note: If no stable model exists, all atoms in B P are cautious consequences, and no atom is a brave consequence.
15 Example p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). Stable Models: {p(1), e(1)} and {q(1), e(1)} Brave consequences: p(1), q(1), e(1), cautious consequences: e(1).
16 Example p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). Stable Models: {p(1), e(1)} and {q(1), e(1)} Brave consequences: p(1), q(1), e(1), cautious consequences: e(1). z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). Stable Model: {p(1), e(1)} Brave and cautious consequences: {p(1), e(1)}.
17 Queries Syntax: Query q: c? c: atom (with variables) Brave answers: Substitutions θ s.t. P = b qθ Cautious answers: Substitutions θ s.t. P = c qθ
18 Query Evaluation Desideratum: Evaluate only a subprogram relevant to the query Implicit in top-down methods. Problem: Not straightforward for query answering using stable models. Generating subprograms along head body is not sufficient.
19 Example z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). Generating a subprogram for evaluation of query p(x)?, moving only along head to body, we would produce P : p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1).
20 Example z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). Generating a subprogram for evaluation of query p(x)?, moving only along head to body, we would produce P : p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). But then 1 is not a cautious answer for P, while it is for the original program.
21 Example z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1).
22 Example z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). z :- t(1), not z. is a rule which should not be dropped
23 Example z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). z :- t(1), not z. is a rule which should not be dropped t(1) should be treated like being reached from the query, hence both rules t(x) :- q(x). and z :- t(1), not z. should be included in the relevant subprogram.
24 Dangerous Predicates and Rules A predicate d is dangerous if d occurs in a cycle with an odd number of negations, or d occurs in the body of a rule with a dangerous head predicate. A rule r is dangerous, if its head is dangerous.
25 Independent Sets An independent set for a ground program is a set S B P such that for each a S: if a is the head of rule r then all atoms of r are in S, and if a appears in the body of a dangerous rule r then all atoms of r are in S. A subprogram T of a program P is a module if T consists of exactly the rules with head atoms from S for an independent set S.
26 Theorems Let T be a module of P, and q occur in T. SM(P)/ T SM(T). (T = c q) (P = c q), and (T = b q) (P = b q)
27 Theorems Let T be a module of P, and q occur in T. SM(P)/ T SM(T). (T = c q) (P = c q), and (T = b q) (P = b q) Moreover, if P is consistent, then SM(T) = SM(P)/ T. (T = c q) (P = c q), and (T = b q) (P = b q).
28 Evaluation Optimal: For a query c? use the smallest module containing c. infeasible use an approximating technique Adaptation of Magic Sets
29 Magic-Set Method Given a query q, and a program P Focuses on the subset of P which is relevant for q Pushes-down the query constants, to eliminate rule-instances which cannot contribute to the derivation of q Simulates the top-down evaluation of q
30 Magic-Set Method Rewrite P in a query-equivalent program P 1. Adorn P (simulate the binding passing) 2. Generate Magic (magic rules identify the relevant atoms). 3. Modify P (limit P to the Magic Set)
31 Modification for Datalog Rule-by-rule processing Process also dangerous rules... but only for generating magic rules... by swapping head and body, and applying standard magic generation
32 Enhanced Magic-Set Algorithm Input: Output: var A Datalog program P, and a query Q = g(t). The optimized program MS (Q, P). S: stack of adorned predicates; modifiedrules,magicrules: set of rules; modifiedrules:= ; magicrules:=buildqueryseeds(q, S); while S do p α := S.pop(); for each rule r P with H(r) = p(t p ) do r a := Adorn(r,p α,s); magicrules := magicrules Generate(r a ); modifiedrules := modifiedrules {Modify(r a )}; for each dangerous rule d P where h(t h ) : q 1 (t 1 ),..., q m (t m ) and q i = p do let d s be the rule q i (t i ) : h(t h ), q 1 (t 1 ),..., q i 1 (t 1 ), q i+1 (t 1 ),..., q m (t m ); let d a :=Adorn(d s,p α,s); magicrules := magicrules Generate(d a ); MS (Q, P):=magicRules modifiedrules; return MS (Q, P);
33 Magic Sets: Example e(1). z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). a(x) : not b(x). b(x) : not a(x). with query p(1)? yields the following e(1). z :- t(1), not z. t(x) :- magic_t b (X), q(x). p(x) :- magic_p b (X), e(x), not q(x). q(x) :- magic_q b (X), e(x), not p(x). magic_p b (1). magic_t b (X) :- magic_q b (X). magic_q b (X) :- e(x), magic_p b (X). magic_p b (X) :- e(x), magic_q b (X).
34 Theorem Let P be a Datalog program, let Q be a query. Then, it holds that MS ( Q, P ) c QP and MS ( Q, P ) b QP, and if SM(P), MS ( Q, P ) b QP and MS ( Q, P ) c QP.
35 Theorem Let P be a Datalog program, let Q be a query. Then, it holds that MS ( Q, P ) c QP and MS ( Q, P ) b QP, and if SM(P), MS ( Q, P ) b QP and MS ( Q, P ) c QP. Remark: Data Integration Programs Π(I) always have stable models, so we obtain query equivalence for these!
36 Demo Scenario EU Project INFOMIX (IST ) Information system of University La Sapienza in Rome. 14 global relations, 29 integrity constraints, 29 relations (in 3 legacy databases) and 12 web wrappers, More than 24MB of data regarding students, professors and exams of the University.
37 Experiments Relative Gain
38 Conclusion Optimization for Datalog with stable models Important for Data Integration Modularity results for Datalog Magic Sets for Datalog Positive impact on Data Integration Application
Computational Methods for Database Repair by Signed Formulae
Computational Methods for Database Repair by Signed Formulae Ofer Arieli (oarieli@mta.ac.il) Department of Computer Science, The Academic College of Tel-Aviv, 4 Antokolski street, Tel-Aviv 61161, Israel.
More informationLogic Programs for Consistently Querying Data Integration Systems
IJCAI 03 1 Acapulco, August 2003 Logic Programs for Consistently Querying Data Integration Systems Loreto Bravo Computer Science Department Pontificia Universidad Católica de Chile lbravo@ing.puc.cl Joint
More informationConsistent Answers from Integrated Data Sources
Consistent Answers from Integrated Data Sources Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada bertossi@scs.carleton.ca www.scs.carleton.ca/ bertossi Queen s University,
More informationRepair Localization for Query Answering from Inconsistent Databases
Repair Localization for Query Answering from Inconsistent Databases THOMAS EITER and MICHAEL FINK Technische Universität Wien GIANLUIGI GRECO Università della Calabria and DOMENICO LEMBO SAPIENZA Università
More informationVirtual Data Integration
Virtual Data Integration Helena Galhardas Paulo Carreira DEI IST (based on the slides of the course: CIS 550 Database & Information Systems, Univ. Pennsylvania, Zachary Ives) Agenda Terminology Conjunctive
More informationConsistent Answers from Integrated Data Sources
Consistent Answers from Integrated Data Sources Leopoldo Bertossi 1, Jan Chomicki 2 Alvaro Cortés 3, and Claudio Gutiérrez 4 1 Carleton University, School of Computer Science, Ottawa, Canada. bertossi@scs.carleton.ca
More informationData Integration: A Theoretical Perspective
Data Integration: A Theoretical Perspective Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 113, I 00198 Roma, Italy lenzerini@dis.uniroma1.it ABSTRACT
More informationQuery Answering in Peer-to-Peer Data Exchange Systems
Query Answering in Peer-to-Peer Data Exchange Systems Leopoldo Bertossi and Loreto Bravo Carleton University, School of Computer Science, Ottawa, Canada {bertossi,lbravo}@scs.carleton.ca Abstract. The
More informationAn Heuristics for Load Balancing and Granularity Control in the Parallel Instantiation of Disjunctive Logic Programs
An Heuristics for Load Balancing and Granularity Control in the Parallel Instantiation of Disjunctive Logic Programs Simona Perri, Francesco Ricca, and Marco Sirianni Dipartimento di Matematica, Università
More informationRepair Checking in Inconsistent Databases: Algorithms and Complexity
Repair Checking in Inconsistent Databases: Algorithms and Complexity Foto Afrati 1 Phokion G. Kolaitis 2 1 National Technical University of Athens 2 UC Santa Cruz and IBM Almaden Research Center Oxford,
More informationLogical Foundations of Relational Data Exchange
Logical Foundations of Relational Data Exchange Pablo Barceló Department of Computer Science, University of Chile pbarcelo@dcc.uchile.cl 1 Introduction Data exchange has been defined as the problem of
More informationData Management in Peer-to-Peer Data Integration Systems
Book Title Book Editors IOS Press, 2003 1 Data Management in Peer-to-Peer Data Integration Systems Diego Calvanese a, Giuseppe De Giacomo b, Domenico Lembo b,1, Maurizio Lenzerini b, and Riccardo Rosati
More informationBounded Treewidth in Knowledge Representation and Reasoning 1
Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.
More informationJUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson
JUST THE MATHS UNIT NUMBER 1.8 ALGEBRA 8 (Polynomials) by A.J.Hobson 1.8.1 The factor theorem 1.8.2 Application to quadratic and cubic expressions 1.8.3 Cubic equations 1.8.4 Long division of polynomials
More informationUPDATES OF LOGIC PROGRAMS
Computing and Informatics, Vol. 20, 2001,????, V 2006-Nov-6 UPDATES OF LOGIC PROGRAMS Ján Šefránek Department of Applied Informatics, Faculty of Mathematics, Physics and Informatics, Comenius University,
More informationA Tutorial on Data Integration
A Tutorial on Data Integration Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Antonio Ruberti, Sapienza Università di Roma DEIS 10 - Data Exchange, Integration, and Streaming November 7-12,
More informationOne More Decidable Class of Finitely Ground Programs
One More Decidable Class of Finitely Ground Programs Yuliya Lierler and Vladimir Lifschitz Department of Computer Sciences, University of Texas at Austin {yuliya,vl}@cs.utexas.edu Abstract. When a logic
More informationData Integration and Answer Set Programming
Data Integration and Answer Set Programming Thomas Eiter Knowledge Based Systems Group, Institute of Information Systems, Vienna University of Technology, A-1040 Vienna, Austria eiter@kr.tuwien.ac.at Abstract.
More informationData Integration. Maurizio Lenzerini. Universitá di Roma La Sapienza
Data Integration Maurizio Lenzerini Universitá di Roma La Sapienza DASI 06: Phd School on Data and Service Integration Bertinoro, December 11 15, 2006 M. Lenzerini Data Integration DASI 06 1 / 213 Structure
More informationEquivalence in Answer Set Programming
Equivalence in Answer Set Programming Mauricio Osorio, Juan Antonio Navarro, José Arrazola Universidad de las Américas, CENTIA Sta. Catarina Mártir, Cholula, Puebla 72820 México {josorio, ma108907, arrazola}@mail.udlap.mx
More informationα α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =
More informationOntoPIM: How to Rely on a Personal Ontology for Personal Information Management
OntoPIM: How to Rely on a Personal Ontology for Personal Information Management Vivi Katifori 2, Antonella Poggi 1, Monica Scannapieco 1, Tiziana Catarci 1, and Yannis Ioannidis 2 1 Dipartimento di Informatica
More informationThe Recovery of a Schema Mapping: Bringing Exchanged Data Back
The Recovery of a Schema Mapping: Bringing Exchanged Data Back MARCELO ARENAS and JORGE PÉREZ Pontificia Universidad Católica de Chile and CRISTIAN RIVEROS R&M Tech Ingeniería y Servicios Limitada A schema
More informationCooperating Answer Set Programming
Cooperating Answer Set Programming Davy Van Nieuwenborgh 1,, Stijn Heymans 2, and Dirk Vermeir 1 1 Dept. of Computer Science Vrije Universiteit Brussel, VUB Pleinlaan 2, B1050 Brussels, Belgium {dvnieuwe,
More informationCHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
More informationModelling and Implementing a Knowledge Base for Checking Medical Invoices with DLV
Modelling and Implementing a Knowledge Base for Checking Medical Invoices with DLV Christoph Beierle 1, Oliver Dusso 1, Gabriele Kern-Isberner 2 1 Dept. of Computer Science, FernUniversität in Hagen, 58084
More informationDeterministic Finite Automata
1 Deterministic Finite Automata Definition: A deterministic finite automaton (DFA) consists of 1. a finite set of states (often denoted Q) 2. a finite set Σ of symbols (alphabet) 3. a transition function
More informationData Quality in Ontology-Based Data Access: The Case of Consistency
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Data Quality in Ontology-Based Data Access: The Case of Consistency Marco Console, Maurizio Lenzerini Dipartimento di Ingegneria
More informationPropagating Functional Dependencies with Conditions
Propagating Functional Dependencies with Conditions Wenfei Fan 1,2,3 Shuai Ma 1 Yanli Hu 1,5 Jie Liu 4 Yinghui Wu 1 1 University of Edinburgh 2 Bell Laboratories 3 Harbin Institute of Technologies 4 Chinese
More informationData Quality in Information Integration and Business Intelligence
Data Quality in Information Integration and Business Intelligence Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada : Faculty Fellow of the IBM Center for Advanced Studies
More informationFrom Causes for Database Queries to Repairs and Model-Based Diagnosis and Back
From Causes for Database Queries to Repairs and Model-Based Diagnosis and Back Babak Salimi 1 and Leopoldo Bertossi 2 1 Carleton University, School of Computer Science, Ottawa, Canada bsalimi@scs.carleton.ca
More informationCassandra. References:
Cassandra References: Becker, Moritz; Sewell, Peter. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 2004. Li, Ninghui; Mitchell, John. Datalog with Constraints: A Foundation
More informationPROGRAMMAZIONE LOGICA IN DATALOG: UN LUNGO PERCORSO DALLA TEORIA ALLA PRATICA LOGIC PROGRAMMING IN DATALOG: A LONG TOUR FROM THEORY TO PRACTICE
PROGRAMMAZIONE LOGICA IN DATALOG: UN LUNGO PERCORSO DALLA TEORIA ALLA PRATICA LOGIC PROGRAMMING IN DATALOG: A LONG TOUR FROM THEORY TO PRACTICE Sergio Greco, Luigi Palopoli, Nicola Leone, Pasquale Rullo,
More informationTwo approaches to the integration of heterogeneous data warehouses
Distrib Parallel Databases (2008) 23: 69 97 DOI 10.1007/s10619-007-7022-z Two approaches to the integration of heterogeneous data warehouses Riccardo Torlone Published online: 23 December 2007 Springer
More informationModel Based Testing for Security Checking. Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007
Model Based Testing for Security Checking Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007 Outline Introduction Active/Passive Testing Active Testing
More informationRoots of Polynomials
Roots of Polynomials (Com S 477/577 Notes) Yan-Bin Jia Sep 24, 2015 A direct corollary of the fundamental theorem of algebra is that p(x) can be factorized over the complex domain into a product a n (x
More information2. The Language of First-order Logic
2. The Language of First-order Logic KR & R Brachman & Levesque 2005 17 Declarative language Before building system before there can be learning, reasoning, planning, explanation... need to be able to
More information5.3 Improper Integrals Involving Rational and Exponential Functions
Section 5.3 Improper Integrals Involving Rational and Exponential Functions 99.. 3. 4. dθ +a cos θ =, < a
More informationThe Heat Equation. Lectures INF2320 p. 1/88
The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)
More informationON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Mathematical Sciences 2012 1 p. 43 48 ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS I nf or m at i cs L. A. HAYKAZYAN * Chair of Programming and Information
More informationRules, RIF and RuleML
Rules, RIF and RuleML Rule Knowledge l Rules generalize facts by making them conditional on other facts (often via chaining through further rules) l Rules generalize taxonomies via multiple premises, n-ary
More informationOn the Decidability and Complexity of Query Answering over Inconsistent and Incomplete Databases
On the Decidability and Complexity of Query Answering over Inconsistent and Incomplete Databases Andrea Calì Domenico Lembo Riccardo Rosati Dipartimento di Informatica e Sistemistica Università di Roma
More informationData exchange. L. Libkin 1 Data Integration and Exchange
Data exchange Source schema, target schema; need to transfer data between them. A typical scenario: Two organizations have their legacy databases, schemas cannot be changed. Data from one organization
More informationHow To Plan With Action Costs In Mindful Programming
Journal of Artificial Intelligence Research 19 (2003) 25-71 Submitted 10/02; published 08/03 Answer Set Planning Under Action Costs Thomas Eiter Wolfgang Faber Institut für Informationssysteme, TU Wien
More informationOffline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com
More informationSchooling, Political Participation, and the Economy. (Online Supplementary Appendix: Not for Publication)
Schooling, Political Participation, and the Economy Online Supplementary Appendix: Not for Publication) Filipe R. Campante Davin Chor July 200 Abstract In this online appendix, we present the proofs for
More informationXML Data Integration
XML Data Integration Lucja Kot Cornell University 11 November 2010 Lucja Kot (Cornell University) XML Data Integration 11 November 2010 1 / 42 Introduction Data Integration and Query Answering A data integration
More informationLecture 8. Confidence intervals and the central limit theorem
Lecture 8. Confidence intervals and the central limit theorem Mathematical Statistics and Discrete Mathematics November 25th, 2015 1 / 15 Central limit theorem Let X 1, X 2,... X n be a random sample of
More information6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
More informationProblem Set 9 Solutions
Problem Set 9 s 1. A monopoly insurance company provides accident insurance to two types of customers: low risk customers, for whom the probability of an accident is 0.25, and high risk customers, for
More informationUpdating Action Domain Descriptions
Updating Action Domain Descriptions Thomas Eiter, Esra Erdem, Michael Fink, and Ján Senko Institute of Information Systems, Vienna University of Technology, Vienna, Austria Email: (eiter esra michael jan)@kr.tuwien.ac.at
More informationRobust Module-based Data Management
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. V, NO. N, MONTH YEAR 1 Robust Module-based Data Management François Goasdoué, LRI, Univ. Paris-Sud, and Marie-Christine Rousset, LIG, Univ. Grenoble
More informationRelations: their uses in programming and computational specifications
PEPS Relations, 15 December 2008 1/27 Relations: their uses in programming and computational specifications Dale Miller INRIA - Saclay & LIX, Ecole Polytechnique 1. Logic and computation Outline 2. Comparing
More informationOffshore Holdings Analytics Using Datalog + RuleML Rules
Offshore Holdings Analytics Using Datalog + RuleML Rules Mohammad Sadnan Al Manir and Christopher J.O. Baker Department of Computer Science and Applied Statistics University of New Brunswick, Saint John,
More information6 EXTENDING ALGEBRA. 6.0 Introduction. 6.1 The cubic equation. Objectives
6 EXTENDING ALGEBRA Chapter 6 Extending Algebra Objectives After studying this chapter you should understand techniques whereby equations of cubic degree and higher can be solved; be able to factorise
More informationON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS DANIEL RABAYEV AND JACK SONN Abstract. Let f(x) be a monic polynomial in Z[x] with no rational roots but with roots in Q p for
More informationConsistent Query Answering in Databases Under Cardinality-Based Repair Semantics
Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada Joint work with: Andrei Lopatenko (Google,
More informationData Integration and Exchange. L. Libkin 1 Data Integration and Exchange
Data Integration and Exchange L. Libkin 1 Data Integration and Exchange Traditional approach to databases A single large repository of data. Database administrator in charge of access to data. Users interact
More informationThe Role of Dispute Settlement Procedures in International Trade Agreements: Online Appendix
The Role of Dispute Settlement Procedures in International Trade Agreements: Online Appendix Giovanni Maggi Yale University, NBER and CEPR Robert W. Staiger Stanford University and NBER November 2010 1.
More informationA Logic-Based Approach to Cloud Computing
A Logic-Based Approach to Cloud Computing Jan Van den Bussche (Hasselt University, Belgium) joint work with Tom Ameloot and Frank Neven 1 Origins of Cloud Computing Large websites (Amazon, Google, Facebook)
More informationImproving Data Quality: Consistency and Accuracy
Improving Data Quality: Consistency and Accuracy Gao Cong 1 Wenfei Fan 2,3 Floris Geerts 2,4,5 Xibei Jia 2 Shuai Ma 2 1 Microsoft Research Asia 2 University of Edinburgh 4 Hasselt University 3 Bell Laboratories
More informationRelational model. Relational model - practice. Relational Database Definitions 9/27/11. Relational model. Relational Database: Terminology
COS 597A: Principles of Database and Information Systems elational model elational model A formal (mathematical) model to represent objects (data/information), relationships between objects Constraints
More informationHow To Understand The Theory Of Computer Science
Theory of Computation Lecture Notes Abhijat Vichare August 2005 Contents 1 Introduction 2 What is Computation? 3 The λ Calculus 3.1 Conversions: 3.2 The calculus in use 3.3 Few Important Theorems 3.4 Worked
More informationµz An Efficient Engine for Fixed points with Constraints
µz An Efficient Engine for Fixed points with Constraints Kryštof Hoder, Nikolaj Bjørner, and Leonardo de Moura Manchester University and Microsoft Research Abstract. The µz tool is a scalable, efficient
More informationUsing the ac Method to Factor
4.6 Using the ac Method to Factor 4.6 OBJECTIVES 1. Use the ac test to determine factorability 2. Use the results of the ac test 3. Completely factor a trinomial In Sections 4.2 and 4.3 we used the trial-and-error
More informationImprecise probabilities, bets and functional analytic methods in Łukasiewicz logic.
Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Martina Fedel joint work with K.Keimel,F.Montagna,W.Roth Martina Fedel (UNISI) 1 / 32 Goal The goal of this talk is to
More informationCompleting Description Logic Knowledge Bases using Formal Concept Analysis
Completing Description Logic Knowledge Bases using Formal Concept Analysis Franz Baader, 1 Bernhard Ganter, 1 Barış Sertkaya, 1 and Ulrike Sattler 2 1 TU Dresden, Germany and 2 The University of Manchester,
More informationThe Elective Part of the NSS ICT Curriculum D. Software Development
of the NSS ICT Curriculum D. Software Development Mr. CHEUNG Wah-sang / Mr. WONG Wing-hong, Robert Member of CDC HKEAA Committee on ICT (Senior Secondary) 1 D. Software Development The concepts / skills
More informationFabio Patrizi DIS Sapienza - University of Rome
Fabio Patrizi DIS Sapienza - University of Rome Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research
More informationConstraint-based Query Distribution Framework for an Integrated Global Schema
Constraint-based Query Distribution Framework for an Integrated Global Schema Ahmad Kamran Malik 1, Muhammad Abdul Qadir 1, Nadeem Iftikhar 2, and Muhammad Usman 3 1 Muhammad Ali Jinnah University, Islamabad,
More informationData integration general setting
Data integration general setting A source schema S: relational schema XML Schema (DTD), etc. A global schema G: could be of many different types too A mapping M between S and G: many ways to specify it,
More informationA Modular Representation of a Business Process Planner
A Modular Representation of a Business Process Planner Shahab Tasharrofi and Evgenia Ternovska School of Computing Science Simon Fraser University Canada 1st International Workshop on Knowledge-intensive
More informationChapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification
Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 5 Outline More Complex SQL Retrieval Queries
More informationUnderstanding Basic Calculus
Understanding Basic Calculus S.K. Chung Dedicated to all the people who have helped me in my life. i Preface This book is a revised and expanded version of the lecture notes for Basic Calculus and other
More informationCHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY
January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.
More informationSecurity in Outsourcing of Association Rule Mining
Security in Outsourcing of Association Rule Mining Wai Kit Wong, David Cheung, Ben Kao and Nikos Mamoulis, The University of Hong Kong Edward Hung, The Hong Kong Polytechnic University VLDB 2007, Vienna,
More informationModern Algebra Lecture Notes: Rings and fields set 4 (Revision 2)
Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2) Kevin Broughan University of Waikato, Hamilton, New Zealand May 13, 2010 Remainder and Factor Theorem 15 Definition of factor If f (x)
More informationRandom vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison
Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison Tomi Janhunen 1, Ilkka Niemelä 1, Johannes Oetsch 2, Jörg Pührer 2, and Hans Tompits 2 1 Aalto University, Department
More information1 VECTOR SPACES AND SUBSPACES
1 VECTOR SPACES AND SUBSPACES What is a vector? Many are familiar with the concept of a vector as: Something which has magnitude and direction. an ordered pair or triple. a description for quantities such
More informationRemarks on Non-Fregean Logic
STUDIES IN LOGIC, GRAMMAR AND RHETORIC 10 (23) 2007 Remarks on Non-Fregean Logic Mieczys law Omy la Institute of Philosophy University of Warsaw Poland m.omyla@uw.edu.pl 1 Introduction In 1966 famous Polish
More informationIntegrating Data from Possibly Inconsistent Databases
Integrating Data from Possibly Inconsistent Databases Phan Minh Dung Department of Computer Science Asian Institute of Technology PO Box 2754, Bangkok 10501, Thailand dung@cs.ait.ac.th Abstract We address
More informationQuestion Answering and the Nature of Intercomplete Databases
Certain Answers as Objects and Knowledge Leonid Libkin School of Informatics, University of Edinburgh Abstract The standard way of answering queries over incomplete databases is to compute certain answers,
More informationChapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.
Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. We begin by defining the ring of polynomials with coefficients in a ring R. After some preliminary results, we specialize
More informationOn the Modeling and Verification of Security-Aware and Process-Aware Information Systems
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems 29 August 2011 What are workflows to us? Plans or schedules that map users or resources to tasks Such mappings may
More informationQuery Reformulation over Ontology-based Peers (Extended Abstract)
Query Reformulation over Ontology-based Peers (Extended Abstract) Diego Calvanese 1, Giuseppe De Giacomo 2, Domenico Lembo 2, Maurizio Lenzerini 2, and Riccardo Rosati 2 1 Faculty of Computer Science,
More informationProbability Generating Functions
page 39 Chapter 3 Probability Generating Functions 3 Preamble: Generating Functions Generating functions are widely used in mathematics, and play an important role in probability theory Consider a sequence
More informationPrinciple of Data Reduction
Chapter 6 Principle of Data Reduction 6.1 Introduction An experimenter uses the information in a sample X 1,..., X n to make inferences about an unknown parameter θ. If the sample size n is large, then
More informationEnforcing Security Policies. Rahul Gera
Enforcing Security Policies Rahul Gera Brief overview Security policies and Execution Monitoring. Policies that can be enforced using EM. An automata based formalism for specifying those security policies.
More informationChapter 17 Using OWL in Data Integration
Chapter 17 Using OWL in Data Integration Diego Calvanese, Giuseppe De Giacomo, Domenico Lembo, Maurizio Lenzerini, Riccardo Rosati, and Marco Ruzzi Abstract One of the outcomes of the research work carried
More informationModeling, Computers, and Error Analysis Mathematical Modeling and Engineering Problem-Solving
Next: Roots of Equations Up: Numerical Analysis for Chemical Previous: Contents Subsections Mathematical Modeling and Engineering Problem-Solving A Simple Mathematical Model Computers and Software The
More informationFirewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov
More informationNeighborhood Data and Database Security
Neighborhood Data and Database Security Kioumars Yazdanian, FrkdCric Cuppens e-mail: yaz@ tls-cs.cert.fr - cuppens@ tls-cs.cert.fr CERT / ONERA, Dept. of Computer Science 2 avenue E. Belin, B.P. 4025,31055
More informationKEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS
ABSTRACT KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS In many real applications, RDF (Resource Description Framework) has been widely used as a W3C standard to describe data in the Semantic Web. In practice,
More informationSemantics and Verification of Software
Semantics and Verification of Software Lecture 21: Nondeterminism and Parallelism IV (Equivalence of CCS Processes & Wrap-Up) Thomas Noll Lehrstuhl für Informatik 2 (Software Modeling and Verification)
More informationInner Product Spaces
Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and
More informationEnforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques Sean Thorpe 1, Indrajit Ray 2, and Tyrone Grandison 3 1 Faculty of Engineering and Computing,
More informationHistory of SQL. Relational Database Languages. Tuple relational calculus ALPHA (Codd, 1970s) QUEL (based on ALPHA) Datalog (rule-based, like PROLOG)
Relational Database Languages Tuple relational calculus ALPHA (Codd, 1970s) QUEL (based on ALPHA) Datalog (rule-based, like PROLOG) Domain relational calculus QBE (used in Access) History of SQL Standards:
More informationSOLVING POLYNOMIAL EQUATIONS
C SOLVING POLYNOMIAL EQUATIONS We will assume in this appendix that you know how to divide polynomials using long division and synthetic division. If you need to review those techniques, refer to an algebra
More informationA Constraint Programming Application for Rotating Workforce Scheduling
A Constraint Programming Application for Rotating Workforce Scheduling Markus Triska and Nysret Musliu Database and Artificial Intelligence Group Vienna University of Technology {triska,musliu}@dbai.tuwien.ac.at
More informationRelational Database Design
Relational Database Design To generate a set of relation schemas that allows - to store information without unnecessary redundancy - to retrieve desired information easily Approach - design schema in appropriate
More information