Query evaluation with soft-key constraints

  • Authors:
  • Abhay Jha;Vibhor Rastogi;Dan Suciu

  • Affiliations:
  • CSE, University of Washington, Seattle, WA, USA;CSE, University of Washington, Seattle, WA, USA;CSE, University of Washington, Seattle, WA, USA

  • Venue:
  • Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Key Violations often occur in real-life datasets, especially in those integrated from different sources. Enforcing constraints strictly on these datasets is not feasible. In this paper we formalize the notion of soft-key constraints on probabilistic databases, which allow for violation of key constraint by penalizing every violating world by a quantity proportional to the violation. To represent our probabilistic database with constraints, we define a class of markov networks, where we can do query evaluation in PTIME. We also study the evaluation of conjunctive queries on relations with soft keys and present a dichotomy that separates this set into those in PTIME and the rest which are #P-Hard.