Magic sets and other strange ways to implement logic programs (extended abstract)
PODS '86 Proceedings of the fifth ACM SIGACT-SIGMOD symposium on Principles of database systems
Efficiently updating materialized views
SIGMOD '86 Proceedings of the 1986 ACM SIGMOD international conference on Management of data
Deriving production rules for constraint maintenance
Proceedings of the sixteenth international conference on Very large databases
On rules, procedure, caching and views in data base systems
SIGMOD '90 Proceedings of the 1990 ACM SIGMOD international conference on Management of data
Safety and translation of relational calculus
ACM Transactions on Database Systems (TODS)
The temporal logic of reactive and concurrent systems
The temporal logic of reactive and concurrent systems
Real-time integrity constraints
PODS '92 Proceedings of the eleventh ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Query optimization in deductive and relational databases
Query optimization in deductive and relational databases
Maintaining views incrementally
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Temporal logic (vol. 1): mathematical foundations and computational aspects
Temporal logic (vol. 1): mathematical foundations and computational aspects
Efficient checking of temporal integrity constraints using bounded history encoding
ACM Transactions on Database Systems (TODS)
PODS '90 Proceedings of the ninth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Logic and Databases: A Deductive Approach
ACM Computing Surveys (CSUR)
Temporal Triggers in Active Databases
IEEE Transactions on Knowledge and Data Engineering
History-less Checking of Dynamic Integrity Constraints
Proceedings of the Eighth International Conference on Data Engineering
Deriving Integrity Maintaining Triggers from Transition Graphs
Proceedings of the Ninth International Conference on Data Engineering
Implementing Set-Oriented Production Rules as an Extension to Starburst
VLDB '91 Proceedings of the 17th International Conference on Very Large Data Bases
Efficient checking of temporal integrity constraints using bounded history encoding
ACM Transactions on Database Systems (TODS)
SCDBR: An Automated Reasoner for Specifications of Database Updates
Journal of Intelligent Information Systems
Querying ATSQL databases with temporal logic
ACM Transactions on Database Systems (TODS)
A Multiagent Update Process in a Database with Temporal Data Dependencies and Schema Versioning
IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Knowledge and Data Engineering
Expressiveness Issues and Decision Problems for Active Database Event Queries
ICDT '01 Proceedings of the 8th International Conference on Database Theory
Temporal Integrity Constraints with Indeterminacy
VLDB '00 Proceedings of the 26th International Conference on Very Large Data Bases
Real-Time and Active Databases: A Survey
ARTDB '97 Proceedings of the Second International Workshop on Active, Real-Time, and Temporal Database Systems
CL '00 Proceedings of the First International Conference on Computational Logic
The VLDB Journal — The International Journal on Very Large Data Bases
ADBIS'97 Proceedings of the First East-European conference on Advances in Databases and Information systems
Hi-index | 0.00 |
The paper proposes a general architecture for implementing temporal integrity constraints by compiling them into a set of active DBMS rules. The modularity of the design allows easy adaptation to different environments. Both differences in the specification languages and in the target rule systems can be easily accommodated. The advantages of this architecture are demonstrated on a particular temporal constraint compiler. This compiler allows automatic translation of integrity constraints formulated in Past Temporal Logic into rules of an active DBMS (in the current version of the compiler two active DBMS are supported: Starburst and INGRES). During the compilation the set of constraints is checked for the safe evaluation property. The result is a set of SQL statements that includes all the necessary rules needed for enforcing the original constraints. The rules are optimized to reduce the space overhead introduced by the integrity checking mechanism. There is no need for an additional runtime constraint monitor. When the rules are activated, all updates to the database that violate any of the constraints are automatically rejected (i.e., the corresponding transaction is aborted). In addition to straightforward implementation, this approach offers a clean separation of application programs and the integrity checking code.