Principles of database and knowledge-base systems, Vol. I
Principles of database and knowledge-base systems, Vol. I
Readings in uncertain reasoning
Readings in uncertain reasoning
Reliability of Answers to Queries in Relational Databases
IEEE Transactions on Knowledge and Data Engineering
Information Source Tracking Method: Efficiency Issues
IEEE Transactions on Knowledge and Data Engineering
Modeling Uncertainty in Databases
Proceedings of the Seventh International Conference on Data Engineering
Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project (The Addison-Wesley series in artificial intelligence)
Theory of Relational Databases
Theory of Relational Databases
Semantics of extended relational model for managing uncertain information
CIKM '95 Proceedings of the fourth international conference on Information and knowledge management
Information Source Tracking Method: Efficiency Issues
IEEE Transactions on Knowledge and Data Engineering
Efficient query evaluation on probabilistic databases
The VLDB Journal — The International Journal on Very Large Data Bases
Query evaluation with soft-key constraints
Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Generating efficient safe query plans for probabilistic databases
Data & Knowledge Engineering
Information integration with uncertainty
IDEAS '09 Proceedings of the 2009 International Database Engineering & Applications Symposium
Hi-index | 0.00 |
In this paper we study the issue of integrity constraints in the Information Source Tracking (IST) method. The IST method is an approach to the management of uncertain data in database systems. The main idea behind IST is that database information is supplied, or confirmed, by information sources. The accuracy of data is modeled by the reliability of the contributing information sources.In practice, information sources that are generally quite reliable may supply conflicting data at times. A database system based on IST must accept such data, and be capable of functioning correctly despite the inconsistency. We concentrate on cases where conflicting data is in violation of 驴key constraints, a special form of functional dependencies resulting from the imposition of a key for each relation in the database. We present an approach, based on the adjustment of conflicting information source reliabilities, to handle data in violation of key constraints.