Information Systems
Subproblem finder and instance checker, two cooperating modules for theorem provers
Journal of the ACM (JACM)
Information Processing Letters
Automated reasoning (2nd ed.): introduction and applications
Automated reasoning (2nd ed.): introduction and applications
Equality and Domain Closure in First-Order Databases
Journal of the ACM (JACM)
Implementation of integrity constraints and views by query modification
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
Symbolic Logic and Mechanical Theorem Proving
Symbolic Logic and Mechanical Theorem Proving
Quantifying the benefits of semantics
CSC '92 Proceedings of the 1992 ACM annual conference on Communications
Formal aspects of concurrency control in long-duration transaction systems using the NT/PV model
ACM Transactions on Database Systems (TODS)
Verifiable properties of database transactions
PODS '96 Proceedings of the fifteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
ICIS '97 Proceedings of the eighteenth international conference on Information systems
Database audit and control strategies
Information Technology and Management
Differential Relational Calculus for Integrity Maintenance
IEEE Transactions on Knowledge and Data Engineering
Transaction Repair for Integrity Enforcement
IEEE Transactions on Knowledge and Data Engineering
Integrity Constraints Checking In Deductive Databases
VLDB '91 Proceedings of the 17th International Conference on Very Large Data Bases
An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas
ADBIS '01 Proceedings of the 5th East European Conference on Advances in Databases and Information Systems
A Flexible Cost Model for Abstract Object-Oriented Database Schemas
ER '02 Proceedings of the 21st International Conference on Conceptual Modeling
Maintenance of implication integrity constraints under updates to constraints
The VLDB Journal — The International Journal on Very Large Data Bases
Alchemy: transmuting base alloy specifications into implementations
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering
Data caching strategies for checking integrity constraints of mobile database
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Certifying data quality conformance
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies
Optimising abstract object-oriented database schemas
ER'06 Proceedings of the 25th international conference on Conceptual Modeling
Hi-index | 0.01 |
If a relational database is required to satisfy a set of integrity constraints, then when the database is updated, one must ensure that it continues to satisfy the constraints. It is desirable not to have to evaluate each constraint after each update. A method is described that takes a constraint C and a class of updates, and either proves that an update in the class cannot violate C, or produces a formula C' (a complete test) that is satisfied before the update if and only if C would continue to be satisfied were the update to occur. C' is frequently much easier to evaluate than C. In addition, a formula D (a sufficient test) is sometimes produced such that if D is satisfied before the update, then C would continue to be satisfied were the update to occur. The method is proved correct. The method is substantially more general than other reported techniques for this problem. The method has been implemented, and a number of experiments with the implementation are presented.