Magic Sets and their Application to Data Integration

Size: px
Start display at page:

Download "Magic Sets and their Application to Data Integration"

Transcription

1 Magic Sets and their Application to Data Integration Wolfgang Faber, Gianluigi Greco, Nicola Leone Department of Mathematics University of Calabria, Italy

2 Roadmap Motivation: Data Integration Datalog Modularity Results Magic Sets Some Experiments Conclusions

3 Research Context EU-funded project: INFOMIX Data Integration Advanced System Dealing with Incomplete and Inconsistent Information Builds on Datalog system DLV Univ. Calabria (Leone, Faber et al.), Univ. Rome (Lenzerini, Rosati et al.), TU Vienna (Eiter, Gottlob et al.), Rodan (Staniszkis et al.)

4 Context: Data Integration Data integration system I = G, S, M : G = Ψ, Σ global (relational) scheme Ψ relation schemes, Σ integrity constraints, S Ψ, (relational) schema of the sources, M mapping between G and S.

5 Context: Data Integration Users issue queries on the global schema, and the system automatically retrieves data from the sources. But: Data stored in sources may violate global constraints Retrieved data might be inconsistent. Techniques for database repairing are needed. In many settings: co-np

6 Datalog for Repairing Data Idea: Given a data integration system I, construct a Datalog program Π(I) whose stable models are in one-to-one correspondence with repairs of I. The Cautious Consequences of Π(I) Coincide with the Consistent Query Answers

7 Datalog : Current Situation Competitive Systems: Bottom-Up Focus on Models, not Query-Answering Query Optimization Methods?

8 Datalog Syntax Rules: a :- b 1,..., b k, not b k+1,..., not b m. where a, b 1,..., b m are atoms and not denotes default negation. Intuitive reading: If b 1..., b k are true, and b k+1,..., b m are not true, then a is true.

9 Datalog Syntax Program P: finite set of safe rules. Base B P : set of all ground atoms constructible from constants and predicates in P. Ground Program Ground(P): set of rules obtained by applying all possible substitutions (from variables in P to constants in P) to P.

10 Stable Model Semantics An interpretation I B P is a model of a program P if it satisfies all rules in Ground(P). The reduct P I of a ground program P (wrt I) is obtained by 1. deleting all rules with false negative body 2. deleting the negative body of the other rules. the positive ground program. An interpretation I is a stable model of P iff it is the least model of Ground(P) I.

11 Example The program P 1 p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). has exactly two stable models: S 1 = {p(1), e(1)} and S 2 = {q(1), e(1)} Ground(P 1 ) S 1 = p(1) :- e(1). Ground(P 1 ) S 2 = q(1) :- e(1). e(1). e(1).

12 Example The program P 2 z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). has exactly one stable model: S 1 = {p(1), e(1)}

13 Example The program P 2 z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). has exactly one stable model: S 1 = {p(1), e(1)} S 2 = {z, q(1), t(1), e(1)} is not a stable model, as P S 2 2 does not contain a rule with z in the head. Note: z :- t(1), not z. acts like an integrity constraint t(1), inhibiting any stable model containing t(1).

14 Brave/Cautious Consequences A ground atom a is a brave consequence for P (P = b a) if a is true in some stable model of P. cautious consequence for P (P = c a) if a is true in all stable models. Note: If no stable model exists, all atoms in B P are cautious consequences, and no atom is a brave consequence.

15 Example p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). Stable Models: {p(1), e(1)} and {q(1), e(1)} Brave consequences: p(1), q(1), e(1), cautious consequences: e(1).

16 Example p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). Stable Models: {p(1), e(1)} and {q(1), e(1)} Brave consequences: p(1), q(1), e(1), cautious consequences: e(1). z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). Stable Model: {p(1), e(1)} Brave and cautious consequences: {p(1), e(1)}.

17 Queries Syntax: Query q: c? c: atom (with variables) Brave answers: Substitutions θ s.t. P = b qθ Cautious answers: Substitutions θ s.t. P = c qθ

18 Query Evaluation Desideratum: Evaluate only a subprogram relevant to the query Implicit in top-down methods. Problem: Not straightforward for query answering using stable models. Generating subprograms along head body is not sufficient.

19 Example z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). Generating a subprogram for evaluation of query p(x)?, moving only along head to body, we would produce P : p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1).

20 Example z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). Generating a subprogram for evaluation of query p(x)?, moving only along head to body, we would produce P : p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). But then 1 is not a cautious answer for P, while it is for the original program.

21 Example z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1).

22 Example z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). z :- t(1), not z. is a rule which should not be dropped

23 Example z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). e(1). z :- t(1), not z. is a rule which should not be dropped t(1) should be treated like being reached from the query, hence both rules t(x) :- q(x). and z :- t(1), not z. should be included in the relevant subprogram.

24 Dangerous Predicates and Rules A predicate d is dangerous if d occurs in a cycle with an odd number of negations, or d occurs in the body of a rule with a dangerous head predicate. A rule r is dangerous, if its head is dangerous.

25 Independent Sets An independent set for a ground program is a set S B P such that for each a S: if a is the head of rule r then all atoms of r are in S, and if a appears in the body of a dangerous rule r then all atoms of r are in S. A subprogram T of a program P is a module if T consists of exactly the rules with head atoms from S for an independent set S.

26 Theorems Let T be a module of P, and q occur in T. SM(P)/ T SM(T). (T = c q) (P = c q), and (T = b q) (P = b q)

27 Theorems Let T be a module of P, and q occur in T. SM(P)/ T SM(T). (T = c q) (P = c q), and (T = b q) (P = b q) Moreover, if P is consistent, then SM(T) = SM(P)/ T. (T = c q) (P = c q), and (T = b q) (P = b q).

28 Evaluation Optimal: For a query c? use the smallest module containing c. infeasible use an approximating technique Adaptation of Magic Sets

29 Magic-Set Method Given a query q, and a program P Focuses on the subset of P which is relevant for q Pushes-down the query constants, to eliminate rule-instances which cannot contribute to the derivation of q Simulates the top-down evaluation of q

30 Magic-Set Method Rewrite P in a query-equivalent program P 1. Adorn P (simulate the binding passing) 2. Generate Magic (magic rules identify the relevant atoms). 3. Modify P (limit P to the Magic Set)

31 Modification for Datalog Rule-by-rule processing Process also dangerous rules... but only for generating magic rules... by swapping head and body, and applying standard magic generation

32 Enhanced Magic-Set Algorithm Input: Output: var A Datalog program P, and a query Q = g(t). The optimized program MS (Q, P). S: stack of adorned predicates; modifiedrules,magicrules: set of rules; modifiedrules:= ; magicrules:=buildqueryseeds(q, S); while S do p α := S.pop(); for each rule r P with H(r) = p(t p ) do r a := Adorn(r,p α,s); magicrules := magicrules Generate(r a ); modifiedrules := modifiedrules {Modify(r a )}; for each dangerous rule d P where h(t h ) : q 1 (t 1 ),..., q m (t m ) and q i = p do let d s be the rule q i (t i ) : h(t h ), q 1 (t 1 ),..., q i 1 (t 1 ), q i+1 (t 1 ),..., q m (t m ); let d a :=Adorn(d s,p α,s); magicrules := magicrules Generate(d a ); MS (Q, P):=magicRules modifiedrules; return MS (Q, P);

33 Magic Sets: Example e(1). z :- t(1), not z. t(x) :- q(x). p(x) :- e(x), not q(x). q(x) :- e(x), not p(x). a(x) : not b(x). b(x) : not a(x). with query p(1)? yields the following e(1). z :- t(1), not z. t(x) :- magic_t b (X), q(x). p(x) :- magic_p b (X), e(x), not q(x). q(x) :- magic_q b (X), e(x), not p(x). magic_p b (1). magic_t b (X) :- magic_q b (X). magic_q b (X) :- e(x), magic_p b (X). magic_p b (X) :- e(x), magic_q b (X).

34 Theorem Let P be a Datalog program, let Q be a query. Then, it holds that MS ( Q, P ) c QP and MS ( Q, P ) b QP, and if SM(P), MS ( Q, P ) b QP and MS ( Q, P ) c QP.

35 Theorem Let P be a Datalog program, let Q be a query. Then, it holds that MS ( Q, P ) c QP and MS ( Q, P ) b QP, and if SM(P), MS ( Q, P ) b QP and MS ( Q, P ) c QP. Remark: Data Integration Programs Π(I) always have stable models, so we obtain query equivalence for these!

36 Demo Scenario EU Project INFOMIX (IST ) Information system of University La Sapienza in Rome. 14 global relations, 29 integrity constraints, 29 relations (in 3 legacy databases) and 12 web wrappers, More than 24MB of data regarding students, professors and exams of the University.

37 Experiments Relative Gain

38 Conclusion Optimization for Datalog with stable models Important for Data Integration Modularity results for Datalog Magic Sets for Datalog Positive impact on Data Integration Application

Computational Methods for Database Repair by Signed Formulae

Computational Methods for Database Repair by Signed Formulae Computational Methods for Database Repair by Signed Formulae Ofer Arieli (oarieli@mta.ac.il) Department of Computer Science, The Academic College of Tel-Aviv, 4 Antokolski street, Tel-Aviv 61161, Israel.

More information

Logic Programs for Consistently Querying Data Integration Systems

Logic Programs for Consistently Querying Data Integration Systems IJCAI 03 1 Acapulco, August 2003 Logic Programs for Consistently Querying Data Integration Systems Loreto Bravo Computer Science Department Pontificia Universidad Católica de Chile lbravo@ing.puc.cl Joint

More information

Consistent Answers from Integrated Data Sources

Consistent Answers from Integrated Data Sources Consistent Answers from Integrated Data Sources Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada bertossi@scs.carleton.ca www.scs.carleton.ca/ bertossi Queen s University,

More information

Repair Localization for Query Answering from Inconsistent Databases

Repair Localization for Query Answering from Inconsistent Databases Repair Localization for Query Answering from Inconsistent Databases THOMAS EITER and MICHAEL FINK Technische Universität Wien GIANLUIGI GRECO Università della Calabria and DOMENICO LEMBO SAPIENZA Università

More information

Virtual Data Integration

Virtual Data Integration Virtual Data Integration Helena Galhardas Paulo Carreira DEI IST (based on the slides of the course: CIS 550 Database & Information Systems, Univ. Pennsylvania, Zachary Ives) Agenda Terminology Conjunctive

More information

Consistent Answers from Integrated Data Sources

Consistent Answers from Integrated Data Sources Consistent Answers from Integrated Data Sources Leopoldo Bertossi 1, Jan Chomicki 2 Alvaro Cortés 3, and Claudio Gutiérrez 4 1 Carleton University, School of Computer Science, Ottawa, Canada. bertossi@scs.carleton.ca

More information

Data Integration: A Theoretical Perspective

Data Integration: A Theoretical Perspective Data Integration: A Theoretical Perspective Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 113, I 00198 Roma, Italy lenzerini@dis.uniroma1.it ABSTRACT

More information

Query Answering in Peer-to-Peer Data Exchange Systems

Query Answering in Peer-to-Peer Data Exchange Systems Query Answering in Peer-to-Peer Data Exchange Systems Leopoldo Bertossi and Loreto Bravo Carleton University, School of Computer Science, Ottawa, Canada {bertossi,lbravo}@scs.carleton.ca Abstract. The

More information

An Heuristics for Load Balancing and Granularity Control in the Parallel Instantiation of Disjunctive Logic Programs

An Heuristics for Load Balancing and Granularity Control in the Parallel Instantiation of Disjunctive Logic Programs An Heuristics for Load Balancing and Granularity Control in the Parallel Instantiation of Disjunctive Logic Programs Simona Perri, Francesco Ricca, and Marco Sirianni Dipartimento di Matematica, Università

More information

Repair Checking in Inconsistent Databases: Algorithms and Complexity

Repair Checking in Inconsistent Databases: Algorithms and Complexity Repair Checking in Inconsistent Databases: Algorithms and Complexity Foto Afrati 1 Phokion G. Kolaitis 2 1 National Technical University of Athens 2 UC Santa Cruz and IBM Almaden Research Center Oxford,

More information

Logical Foundations of Relational Data Exchange

Logical Foundations of Relational Data Exchange Logical Foundations of Relational Data Exchange Pablo Barceló Department of Computer Science, University of Chile pbarcelo@dcc.uchile.cl 1 Introduction Data exchange has been defined as the problem of

More information

Data Management in Peer-to-Peer Data Integration Systems

Data Management in Peer-to-Peer Data Integration Systems Book Title Book Editors IOS Press, 2003 1 Data Management in Peer-to-Peer Data Integration Systems Diego Calvanese a, Giuseppe De Giacomo b, Domenico Lembo b,1, Maurizio Lenzerini b, and Riccardo Rosati

More information

Bounded Treewidth in Knowledge Representation and Reasoning 1

Bounded Treewidth in Knowledge Representation and Reasoning 1 Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.

More information

JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson

JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson JUST THE MATHS UNIT NUMBER 1.8 ALGEBRA 8 (Polynomials) by A.J.Hobson 1.8.1 The factor theorem 1.8.2 Application to quadratic and cubic expressions 1.8.3 Cubic equations 1.8.4 Long division of polynomials

More information

UPDATES OF LOGIC PROGRAMS

UPDATES OF LOGIC PROGRAMS Computing and Informatics, Vol. 20, 2001,????, V 2006-Nov-6 UPDATES OF LOGIC PROGRAMS Ján Šefránek Department of Applied Informatics, Faculty of Mathematics, Physics and Informatics, Comenius University,

More information

A Tutorial on Data Integration

A Tutorial on Data Integration A Tutorial on Data Integration Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Antonio Ruberti, Sapienza Università di Roma DEIS 10 - Data Exchange, Integration, and Streaming November 7-12,

More information

One More Decidable Class of Finitely Ground Programs

One More Decidable Class of Finitely Ground Programs One More Decidable Class of Finitely Ground Programs Yuliya Lierler and Vladimir Lifschitz Department of Computer Sciences, University of Texas at Austin {yuliya,vl}@cs.utexas.edu Abstract. When a logic

More information

Data Integration and Answer Set Programming

Data Integration and Answer Set Programming Data Integration and Answer Set Programming Thomas Eiter Knowledge Based Systems Group, Institute of Information Systems, Vienna University of Technology, A-1040 Vienna, Austria eiter@kr.tuwien.ac.at Abstract.

More information

Data Integration. Maurizio Lenzerini. Universitá di Roma La Sapienza

Data Integration. Maurizio Lenzerini. Universitá di Roma La Sapienza Data Integration Maurizio Lenzerini Universitá di Roma La Sapienza DASI 06: Phd School on Data and Service Integration Bertinoro, December 11 15, 2006 M. Lenzerini Data Integration DASI 06 1 / 213 Structure

More information

Equivalence in Answer Set Programming

Equivalence in Answer Set Programming Equivalence in Answer Set Programming Mauricio Osorio, Juan Antonio Navarro, José Arrazola Universidad de las Américas, CENTIA Sta. Catarina Mártir, Cholula, Puebla 72820 México {josorio, ma108907, arrazola}@mail.udlap.mx

More information

α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =

More information

OntoPIM: How to Rely on a Personal Ontology for Personal Information Management

OntoPIM: How to Rely on a Personal Ontology for Personal Information Management OntoPIM: How to Rely on a Personal Ontology for Personal Information Management Vivi Katifori 2, Antonella Poggi 1, Monica Scannapieco 1, Tiziana Catarci 1, and Yannis Ioannidis 2 1 Dipartimento di Informatica

More information

The Recovery of a Schema Mapping: Bringing Exchanged Data Back

The Recovery of a Schema Mapping: Bringing Exchanged Data Back The Recovery of a Schema Mapping: Bringing Exchanged Data Back MARCELO ARENAS and JORGE PÉREZ Pontificia Universidad Católica de Chile and CRISTIAN RIVEROS R&M Tech Ingeniería y Servicios Limitada A schema

More information

Cooperating Answer Set Programming

Cooperating Answer Set Programming Cooperating Answer Set Programming Davy Van Nieuwenborgh 1,, Stijn Heymans 2, and Dirk Vermeir 1 1 Dept. of Computer Science Vrije Universiteit Brussel, VUB Pleinlaan 2, B1050 Brussels, Belgium {dvnieuwe,

More information

CHAPTER 7 GENERAL PROOF SYSTEMS

CHAPTER 7 GENERAL PROOF SYSTEMS CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes

More information

Modelling and Implementing a Knowledge Base for Checking Medical Invoices with DLV

Modelling and Implementing a Knowledge Base for Checking Medical Invoices with DLV Modelling and Implementing a Knowledge Base for Checking Medical Invoices with DLV Christoph Beierle 1, Oliver Dusso 1, Gabriele Kern-Isberner 2 1 Dept. of Computer Science, FernUniversität in Hagen, 58084

More information

Deterministic Finite Automata

Deterministic Finite Automata 1 Deterministic Finite Automata Definition: A deterministic finite automaton (DFA) consists of 1. a finite set of states (often denoted Q) 2. a finite set Σ of symbols (alphabet) 3. a transition function

More information

Data Quality in Ontology-Based Data Access: The Case of Consistency

Data Quality in Ontology-Based Data Access: The Case of Consistency Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Data Quality in Ontology-Based Data Access: The Case of Consistency Marco Console, Maurizio Lenzerini Dipartimento di Ingegneria

More information

Propagating Functional Dependencies with Conditions

Propagating Functional Dependencies with Conditions Propagating Functional Dependencies with Conditions Wenfei Fan 1,2,3 Shuai Ma 1 Yanli Hu 1,5 Jie Liu 4 Yinghui Wu 1 1 University of Edinburgh 2 Bell Laboratories 3 Harbin Institute of Technologies 4 Chinese

More information

Data Quality in Information Integration and Business Intelligence

Data Quality in Information Integration and Business Intelligence Data Quality in Information Integration and Business Intelligence Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada : Faculty Fellow of the IBM Center for Advanced Studies

More information

From Causes for Database Queries to Repairs and Model-Based Diagnosis and Back

From Causes for Database Queries to Repairs and Model-Based Diagnosis and Back From Causes for Database Queries to Repairs and Model-Based Diagnosis and Back Babak Salimi 1 and Leopoldo Bertossi 2 1 Carleton University, School of Computer Science, Ottawa, Canada bsalimi@scs.carleton.ca

More information

Cassandra. References:

Cassandra. References: Cassandra References: Becker, Moritz; Sewell, Peter. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 2004. Li, Ninghui; Mitchell, John. Datalog with Constraints: A Foundation

More information

PROGRAMMAZIONE LOGICA IN DATALOG: UN LUNGO PERCORSO DALLA TEORIA ALLA PRATICA LOGIC PROGRAMMING IN DATALOG: A LONG TOUR FROM THEORY TO PRACTICE

PROGRAMMAZIONE LOGICA IN DATALOG: UN LUNGO PERCORSO DALLA TEORIA ALLA PRATICA LOGIC PROGRAMMING IN DATALOG: A LONG TOUR FROM THEORY TO PRACTICE PROGRAMMAZIONE LOGICA IN DATALOG: UN LUNGO PERCORSO DALLA TEORIA ALLA PRATICA LOGIC PROGRAMMING IN DATALOG: A LONG TOUR FROM THEORY TO PRACTICE Sergio Greco, Luigi Palopoli, Nicola Leone, Pasquale Rullo,

More information

Two approaches to the integration of heterogeneous data warehouses

Two approaches to the integration of heterogeneous data warehouses Distrib Parallel Databases (2008) 23: 69 97 DOI 10.1007/s10619-007-7022-z Two approaches to the integration of heterogeneous data warehouses Riccardo Torlone Published online: 23 December 2007 Springer

More information

Model Based Testing for Security Checking. Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007

Model Based Testing for Security Checking. Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007 Model Based Testing for Security Checking Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007 Outline Introduction Active/Passive Testing Active Testing

More information

Roots of Polynomials

Roots of Polynomials Roots of Polynomials (Com S 477/577 Notes) Yan-Bin Jia Sep 24, 2015 A direct corollary of the fundamental theorem of algebra is that p(x) can be factorized over the complex domain into a product a n (x

More information

2. The Language of First-order Logic

2. The Language of First-order Logic 2. The Language of First-order Logic KR & R Brachman & Levesque 2005 17 Declarative language Before building system before there can be learning, reasoning, planning, explanation... need to be able to

More information

5.3 Improper Integrals Involving Rational and Exponential Functions

5.3 Improper Integrals Involving Rational and Exponential Functions Section 5.3 Improper Integrals Involving Rational and Exponential Functions 99.. 3. 4. dθ +a cos θ =, < a

More information

The Heat Equation. Lectures INF2320 p. 1/88

The Heat Equation. Lectures INF2320 p. 1/88 The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)

More information

ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS

ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Mathematical Sciences 2012 1 p. 43 48 ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS I nf or m at i cs L. A. HAYKAZYAN * Chair of Programming and Information

More information

Rules, RIF and RuleML

Rules, RIF and RuleML Rules, RIF and RuleML Rule Knowledge l Rules generalize facts by making them conditional on other facts (often via chaining through further rules) l Rules generalize taxonomies via multiple premises, n-ary

More information

On the Decidability and Complexity of Query Answering over Inconsistent and Incomplete Databases

On the Decidability and Complexity of Query Answering over Inconsistent and Incomplete Databases On the Decidability and Complexity of Query Answering over Inconsistent and Incomplete Databases Andrea Calì Domenico Lembo Riccardo Rosati Dipartimento di Informatica e Sistemistica Università di Roma

More information

Data exchange. L. Libkin 1 Data Integration and Exchange

Data exchange. L. Libkin 1 Data Integration and Exchange Data exchange Source schema, target schema; need to transfer data between them. A typical scenario: Two organizations have their legacy databases, schemas cannot be changed. Data from one organization

More information

How To Plan With Action Costs In Mindful Programming

How To Plan With Action Costs In Mindful Programming Journal of Artificial Intelligence Research 19 (2003) 25-71 Submitted 10/02; published 08/03 Answer Set Planning Under Action Costs Thomas Eiter Wolfgang Faber Institut für Informationssysteme, TU Wien

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

Schooling, Political Participation, and the Economy. (Online Supplementary Appendix: Not for Publication)

Schooling, Political Participation, and the Economy. (Online Supplementary Appendix: Not for Publication) Schooling, Political Participation, and the Economy Online Supplementary Appendix: Not for Publication) Filipe R. Campante Davin Chor July 200 Abstract In this online appendix, we present the proofs for

More information

XML Data Integration

XML Data Integration XML Data Integration Lucja Kot Cornell University 11 November 2010 Lucja Kot (Cornell University) XML Data Integration 11 November 2010 1 / 42 Introduction Data Integration and Query Answering A data integration

More information

Lecture 8. Confidence intervals and the central limit theorem

Lecture 8. Confidence intervals and the central limit theorem Lecture 8. Confidence intervals and the central limit theorem Mathematical Statistics and Discrete Mathematics November 25th, 2015 1 / 15 Central limit theorem Let X 1, X 2,... X n be a random sample of

More information

6.2 Permutations continued

6.2 Permutations continued 6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Problem Set 9 s 1. A monopoly insurance company provides accident insurance to two types of customers: low risk customers, for whom the probability of an accident is 0.25, and high risk customers, for

More information

Updating Action Domain Descriptions

Updating Action Domain Descriptions Updating Action Domain Descriptions Thomas Eiter, Esra Erdem, Michael Fink, and Ján Senko Institute of Information Systems, Vienna University of Technology, Vienna, Austria Email: (eiter esra michael jan)@kr.tuwien.ac.at

More information

Robust Module-based Data Management

Robust Module-based Data Management IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. V, NO. N, MONTH YEAR 1 Robust Module-based Data Management François Goasdoué, LRI, Univ. Paris-Sud, and Marie-Christine Rousset, LIG, Univ. Grenoble

More information

Relations: their uses in programming and computational specifications

Relations: their uses in programming and computational specifications PEPS Relations, 15 December 2008 1/27 Relations: their uses in programming and computational specifications Dale Miller INRIA - Saclay & LIX, Ecole Polytechnique 1. Logic and computation Outline 2. Comparing

More information

Offshore Holdings Analytics Using Datalog + RuleML Rules

Offshore Holdings Analytics Using Datalog + RuleML Rules Offshore Holdings Analytics Using Datalog + RuleML Rules Mohammad Sadnan Al Manir and Christopher J.O. Baker Department of Computer Science and Applied Statistics University of New Brunswick, Saint John,

More information

6 EXTENDING ALGEBRA. 6.0 Introduction. 6.1 The cubic equation. Objectives

6 EXTENDING ALGEBRA. 6.0 Introduction. 6.1 The cubic equation. Objectives 6 EXTENDING ALGEBRA Chapter 6 Extending Algebra Objectives After studying this chapter you should understand techniques whereby equations of cubic degree and higher can be solved; be able to factorise

More information

ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS

ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS DANIEL RABAYEV AND JACK SONN Abstract. Let f(x) be a monic polynomial in Z[x] with no rational roots but with roots in Q p for

More information

Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics

Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada Joint work with: Andrei Lopatenko (Google,

More information

Data Integration and Exchange. L. Libkin 1 Data Integration and Exchange

Data Integration and Exchange. L. Libkin 1 Data Integration and Exchange Data Integration and Exchange L. Libkin 1 Data Integration and Exchange Traditional approach to databases A single large repository of data. Database administrator in charge of access to data. Users interact

More information

The Role of Dispute Settlement Procedures in International Trade Agreements: Online Appendix

The Role of Dispute Settlement Procedures in International Trade Agreements: Online Appendix The Role of Dispute Settlement Procedures in International Trade Agreements: Online Appendix Giovanni Maggi Yale University, NBER and CEPR Robert W. Staiger Stanford University and NBER November 2010 1.

More information

A Logic-Based Approach to Cloud Computing

A Logic-Based Approach to Cloud Computing A Logic-Based Approach to Cloud Computing Jan Van den Bussche (Hasselt University, Belgium) joint work with Tom Ameloot and Frank Neven 1 Origins of Cloud Computing Large websites (Amazon, Google, Facebook)

More information

Improving Data Quality: Consistency and Accuracy

Improving Data Quality: Consistency and Accuracy Improving Data Quality: Consistency and Accuracy Gao Cong 1 Wenfei Fan 2,3 Floris Geerts 2,4,5 Xibei Jia 2 Shuai Ma 2 1 Microsoft Research Asia 2 University of Edinburgh 4 Hasselt University 3 Bell Laboratories

More information

Relational model. Relational model - practice. Relational Database Definitions 9/27/11. Relational model. Relational Database: Terminology

Relational model. Relational model - practice. Relational Database Definitions 9/27/11. Relational model. Relational Database: Terminology COS 597A: Principles of Database and Information Systems elational model elational model A formal (mathematical) model to represent objects (data/information), relationships between objects Constraints

More information

How To Understand The Theory Of Computer Science

How To Understand The Theory Of Computer Science Theory of Computation Lecture Notes Abhijat Vichare August 2005 Contents 1 Introduction 2 What is Computation? 3 The λ Calculus 3.1 Conversions: 3.2 The calculus in use 3.3 Few Important Theorems 3.4 Worked

More information

µz An Efficient Engine for Fixed points with Constraints

µz An Efficient Engine for Fixed points with Constraints µz An Efficient Engine for Fixed points with Constraints Kryštof Hoder, Nikolaj Bjørner, and Leonardo de Moura Manchester University and Microsoft Research Abstract. The µz tool is a scalable, efficient

More information

Using the ac Method to Factor

Using the ac Method to Factor 4.6 Using the ac Method to Factor 4.6 OBJECTIVES 1. Use the ac test to determine factorability 2. Use the results of the ac test 3. Completely factor a trinomial In Sections 4.2 and 4.3 we used the trial-and-error

More information

Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic.

Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Martina Fedel joint work with K.Keimel,F.Montagna,W.Roth Martina Fedel (UNISI) 1 / 32 Goal The goal of this talk is to

More information

Completing Description Logic Knowledge Bases using Formal Concept Analysis

Completing Description Logic Knowledge Bases using Formal Concept Analysis Completing Description Logic Knowledge Bases using Formal Concept Analysis Franz Baader, 1 Bernhard Ganter, 1 Barış Sertkaya, 1 and Ulrike Sattler 2 1 TU Dresden, Germany and 2 The University of Manchester,

More information

The Elective Part of the NSS ICT Curriculum D. Software Development

The Elective Part of the NSS ICT Curriculum D. Software Development of the NSS ICT Curriculum D. Software Development Mr. CHEUNG Wah-sang / Mr. WONG Wing-hong, Robert Member of CDC HKEAA Committee on ICT (Senior Secondary) 1 D. Software Development The concepts / skills

More information

Fabio Patrizi DIS Sapienza - University of Rome

Fabio Patrizi DIS Sapienza - University of Rome Fabio Patrizi DIS Sapienza - University of Rome Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research

More information

Constraint-based Query Distribution Framework for an Integrated Global Schema

Constraint-based Query Distribution Framework for an Integrated Global Schema Constraint-based Query Distribution Framework for an Integrated Global Schema Ahmad Kamran Malik 1, Muhammad Abdul Qadir 1, Nadeem Iftikhar 2, and Muhammad Usman 3 1 Muhammad Ali Jinnah University, Islamabad,

More information

Data integration general setting

Data integration general setting Data integration general setting A source schema S: relational schema XML Schema (DTD), etc. A global schema G: could be of many different types too A mapping M between S and G: many ways to specify it,

More information

A Modular Representation of a Business Process Planner

A Modular Representation of a Business Process Planner A Modular Representation of a Business Process Planner Shahab Tasharrofi and Evgenia Ternovska School of Computing Science Simon Fraser University Canada 1st International Workshop on Knowledge-intensive

More information

Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification

Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 5 Outline More Complex SQL Retrieval Queries

More information

Understanding Basic Calculus

Understanding Basic Calculus Understanding Basic Calculus S.K. Chung Dedicated to all the people who have helped me in my life. i Preface This book is a revised and expanded version of the lecture notes for Basic Calculus and other

More information

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.

More information

Security in Outsourcing of Association Rule Mining

Security in Outsourcing of Association Rule Mining Security in Outsourcing of Association Rule Mining Wai Kit Wong, David Cheung, Ben Kao and Nikos Mamoulis, The University of Hong Kong Edward Hung, The Hong Kong Polytechnic University VLDB 2007, Vienna,

More information

Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2)

Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2) Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2) Kevin Broughan University of Waikato, Hamilton, New Zealand May 13, 2010 Remainder and Factor Theorem 15 Definition of factor If f (x)

More information

Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison

Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison Tomi Janhunen 1, Ilkka Niemelä 1, Johannes Oetsch 2, Jörg Pührer 2, and Hans Tompits 2 1 Aalto University, Department

More information

1 VECTOR SPACES AND SUBSPACES

1 VECTOR SPACES AND SUBSPACES 1 VECTOR SPACES AND SUBSPACES What is a vector? Many are familiar with the concept of a vector as: Something which has magnitude and direction. an ordered pair or triple. a description for quantities such

More information

Remarks on Non-Fregean Logic

Remarks on Non-Fregean Logic STUDIES IN LOGIC, GRAMMAR AND RHETORIC 10 (23) 2007 Remarks on Non-Fregean Logic Mieczys law Omy la Institute of Philosophy University of Warsaw Poland m.omyla@uw.edu.pl 1 Introduction In 1966 famous Polish

More information

Integrating Data from Possibly Inconsistent Databases

Integrating Data from Possibly Inconsistent Databases Integrating Data from Possibly Inconsistent Databases Phan Minh Dung Department of Computer Science Asian Institute of Technology PO Box 2754, Bangkok 10501, Thailand dung@cs.ait.ac.th Abstract We address

More information

Question Answering and the Nature of Intercomplete Databases

Question Answering and the Nature of Intercomplete Databases Certain Answers as Objects and Knowledge Leonid Libkin School of Informatics, University of Edinburgh Abstract The standard way of answering queries over incomplete databases is to compute certain answers,

More information

Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.

Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. We begin by defining the ring of polynomials with coefficients in a ring R. After some preliminary results, we specialize

More information

On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

On the Modeling and Verification of Security-Aware and Process-Aware Information Systems On the Modeling and Verification of Security-Aware and Process-Aware Information Systems 29 August 2011 What are workflows to us? Plans or schedules that map users or resources to tasks Such mappings may

More information

Query Reformulation over Ontology-based Peers (Extended Abstract)

Query Reformulation over Ontology-based Peers (Extended Abstract) Query Reformulation over Ontology-based Peers (Extended Abstract) Diego Calvanese 1, Giuseppe De Giacomo 2, Domenico Lembo 2, Maurizio Lenzerini 2, and Riccardo Rosati 2 1 Faculty of Computer Science,

More information

Probability Generating Functions

Probability Generating Functions page 39 Chapter 3 Probability Generating Functions 3 Preamble: Generating Functions Generating functions are widely used in mathematics, and play an important role in probability theory Consider a sequence

More information

Principle of Data Reduction

Principle of Data Reduction Chapter 6 Principle of Data Reduction 6.1 Introduction An experimenter uses the information in a sample X 1,..., X n to make inferences about an unknown parameter θ. If the sample size n is large, then

More information

Enforcing Security Policies. Rahul Gera

Enforcing Security Policies. Rahul Gera Enforcing Security Policies Rahul Gera Brief overview Security policies and Execution Monitoring. Policies that can be enforced using EM. An automata based formalism for specifying those security policies.

More information

Chapter 17 Using OWL in Data Integration

Chapter 17 Using OWL in Data Integration Chapter 17 Using OWL in Data Integration Diego Calvanese, Giuseppe De Giacomo, Domenico Lembo, Maurizio Lenzerini, Riccardo Rosati, and Marco Ruzzi Abstract One of the outcomes of the research work carried

More information

Modeling, Computers, and Error Analysis Mathematical Modeling and Engineering Problem-Solving

Modeling, Computers, and Error Analysis Mathematical Modeling and Engineering Problem-Solving Next: Roots of Equations Up: Numerical Analysis for Chemical Previous: Contents Subsections Mathematical Modeling and Engineering Problem-Solving A Simple Mathematical Model Computers and Software The

More information

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov

More information

Neighborhood Data and Database Security

Neighborhood Data and Database Security Neighborhood Data and Database Security Kioumars Yazdanian, FrkdCric Cuppens e-mail: yaz@ tls-cs.cert.fr - cuppens@ tls-cs.cert.fr CERT / ONERA, Dept. of Computer Science 2 avenue E. Belin, B.P. 4025,31055

More information

KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS

KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS ABSTRACT KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS In many real applications, RDF (Resource Description Framework) has been widely used as a W3C standard to describe data in the Semantic Web. In practice,

More information

Semantics and Verification of Software

Semantics and Verification of Software Semantics and Verification of Software Lecture 21: Nondeterminism and Parallelism IV (Equivalence of CCS Processes & Wrap-Up) Thomas Noll Lehrstuhl für Informatik 2 (Software Modeling and Verification)

More information

Inner Product Spaces

Inner Product Spaces Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and

More information

Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques

Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques Sean Thorpe 1, Indrajit Ray 2, and Tyrone Grandison 3 1 Faculty of Engineering and Computing,

More information

History of SQL. Relational Database Languages. Tuple relational calculus ALPHA (Codd, 1970s) QUEL (based on ALPHA) Datalog (rule-based, like PROLOG)

History of SQL. Relational Database Languages. Tuple relational calculus ALPHA (Codd, 1970s) QUEL (based on ALPHA) Datalog (rule-based, like PROLOG) Relational Database Languages Tuple relational calculus ALPHA (Codd, 1970s) QUEL (based on ALPHA) Datalog (rule-based, like PROLOG) Domain relational calculus QBE (used in Access) History of SQL Standards:

More information

SOLVING POLYNOMIAL EQUATIONS

SOLVING POLYNOMIAL EQUATIONS C SOLVING POLYNOMIAL EQUATIONS We will assume in this appendix that you know how to divide polynomials using long division and synthetic division. If you need to review those techniques, refer to an algebra

More information

A Constraint Programming Application for Rotating Workforce Scheduling

A Constraint Programming Application for Rotating Workforce Scheduling A Constraint Programming Application for Rotating Workforce Scheduling Markus Triska and Nysret Musliu Database and Artificial Intelligence Group Vienna University of Technology {triska,musliu}@dbai.tuwien.ac.at

More information

Relational Database Design

Relational Database Design Relational Database Design To generate a set of relation schemas that allows - to store information without unnecessary redundancy - to retrieve desired information easily Approach - design schema in appropriate

More information