Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1353343.1353403acmotherconferencesArticle/Chapter ViewAbstractPublication PagesedbtConference Proceedingsconference-collections
research-article
Free access

Data exchange in the presence of arithmetic comparisons

Published: 25 March 2008 Publication History

Abstract

Data exchange is the problem of transforming data structured under a schema (called source) into data structured under a different schema (called target). The emphasis of data exchange is to materialize a target instance (called solution) that satisfies the relationship between the schemas. Universal solutions were shown to be the most suitable solutions, mainly because they can be used to answer conjunctive queries posed over the target schema. Trying to extend this result to more expressive query languages fails, even if we only add inequalities (≠) to conjunctive queries.
In this work we study data exchange in the presence of general arithmetic comparisons (<, ≤, >, ≥, =, ≠): (a) We consider queries posed over the target schema that belong to the class of unions of conjunctive queries with arithmetic comparisons (in short CQACs). (b) We exploit arithmetic comparisons to define more expressive data exchange settings, called DEAC settings. In particular, DEAC settings consist of constraints that involve arithmetic comparisons. For that, two new classes of dependencies (tgd-ACs and acgds) are introduced, to capture the need of arithmetic comparisons in source-to-target and target constraints.
We show that in DEAC settings the existence of solution problem is in NP. We define a novel chase procedure called AC-chase which is a tree and we prove that it produces a universal solution (appropriately defined to deal with arithmetic comparisons). We show that the new concept of universal solution is the right tool for query answering in the case of unions of CQACs. The complexity of computing certain answers for unions of CQACs is shown to be coNP-complete. Moreover, we identify polynomial cases for a) computing a universal solution and b) computing certain answers. For that, we introduce the succinct AC-chase which is a sequence instead of a tree, but its result is not necessarily a solution. We identify cases where succinct AC-chase returns indeed a universal solution and we investigate the syntactic conditions of the query under which query answering takes polynomial time. We show that the latter is feasible even in cases where the result of chase is not a universal solution.

References

[1]
S. Abiteboul and O. M. Duschka. Complexity of answering queries using materialized views. In PODS, 1998.
[2]
F. Afrati, C. Li, and P. Mitra. On containment of conjunctive queries with arithmetic comparisons. In EDBT, 2004.
[3]
F. Afrati, C. Li, and P. Mitra. Rewriting queries using views in the presence of arithmetic comparisons. TCS, 368(1--2):88--123, 2006.
[4]
M. Arenas, P. Barcel, R. Fagin, and L. Libkin. Locally consistent transformations and query answering in data exchange. In PODS, 2004.
[5]
M. Arenas and L. Libkin. XML data exchange: Consistency and query answering. In PODS, 2005.
[6]
M. Baudinet, J. Chomicki, and P. Wolper. Constraint-generating dependencies. J. Comput. Syst. Sci., 59(1):94--115, 1999.
[7]
C. Beeri and M. Y. Vardi. Formal systems for tuple and equality generating dependencies. SIAM J. on Computing, 13(1):76--98, 1984.
[8]
C. Beeri and M. Y. Vardi. A proof procedure for data dependencies. J. ACM, 31(4):718--741, 1984.
[9]
P. A. Bernstein. Generic model management: A database infrastructure for schema manipulation. In IDM 2003 Workshop, 2003.
[10]
P. Bohannon, W. Fan, F. Geerts, X. Jia, and A. Kementsietsidis. Conditional functional dependencies for data cleaning. In ICDE, 2007.
[11]
A. K. Chandra and P. M. Merlin. Optimal implementation of conjunctive queries in relational databases. In STOC, 1977.
[12]
A. Deutsch and V. Tannen. Reformulation of XML queries and constraints. In ICDT, 2003.
[13]
R. Fagin. Horn clauses and database dependencies. J. ACM, 29(4):952--985, 1982.
[14]
R. Fagin, P. G. Kolaitis, R. J. Miller, and L. Popa. Data exchange: Semantics and query answering. In ICDT, 2003. Full version: TCS 336(1): 89--124, 2005.
[15]
R. Fagin, P. G. Kolaitis, and L. Popa. Data exchange: Getting to the core. In PODS, 2003. Full version: ACM TODS 30(1): 174--210, 2005.
[16]
G. Gottlob. Computing cores for data exchange: New algorithms and practical solutions. In PODS, 2005.
[17]
G. Gottlob and A. Nash. Data exchange: Computing cores in polynomial time. In PODS, 2006.
[18]
G. Grahne. The problem of incomplete information in relational databases, volume 554. Spring-Verlag, Berlin, Lecture Notes in Computer Science, 1991.
[19]
A. Gupta. Partial Information Based Integrity Constraint Checking. PhD thesis, Stanford, 1994.
[20]
T. Imielinski and W. Lipski. Incomplete information in relational databases. J. ACM, 31(4):761--791, 1984.
[21]
N. Ishakbeyoglu and Z. M. Ozsoyoglu. On the maintenance of implication integrity constraints. In DEXA, 1993.
[22]
A. Klug. On conjunctive queries containing inequalities. J. ACM, 35(1):146--160, 1988.
[23]
P. G. Kolaitis. Schema Mappings, Data Exchange, and Metadata Management. In PODS, 2005.
[24]
P. G. Kolaitis, J. Panttaja, and W.-C. Tan. The complexity of data exchange. In PODS, 2006.
[25]
M. Lenzerini. Data integration: A theoretical perspective. In PODS, 2002.
[26]
A. Levy, A. Rajaraman, and J. Ullman. Answering queries using limited external query processors. In PODS, 1996.
[27]
L. Libkin. Data exchange and incomplete information. In PODS, 2006.
[28]
A. Madry. Data exchange: on complexity of answering queries with inequalities. Information Processing Letters, 94(6):253--257, 2005.
[29]
M. J. Maher. Constrained dependencies. Theoretical Computer Science, 173(1):113--149, 1997.
[30]
M. J. Maher and D. Srivastava. Chasing constrained tuple-generating dependencies. In PODS, 1996.
[31]
D. Maier, A. O. Mendelzon, and Y. Sagiv. Testing implications of data dependencies. ACM TODS, 4(4):455--469, 1979.
[32]
R. v. d. Meyden. The complexity of querying indefinite data about linearly ordered domains. In PODS, 1992.
[33]
R. v. d. Meyden. Logical approaches to incomplete information: A survey. In Logics for Databases and Information Systems, pages 307--356, 1998.
[34]
R. J. Miller, L. M. Haas, and M. Hernández. Schema mapping as query discovery. In VLDB, 2000.
[35]
L. Popa, Y. Velegrakis, R. J. Miller, M. A. Hernández, and R. Fagin. Translating web data. In VLDB, 2002.
[36]
N. C. Shu, B. C. Housel, R. W. Taylor, S. P. Ghosh, and V. Y. Lum. Express: A data EXtraction, processing, amd REStructuring System. ACM TODS, 2(2):134--174, 1977.
[37]
A. Vieilleribiere and M. D. Rougemont. Approximate data exchange. In ICDT, 2007.
[38]
J. Wang, R. W. Topor, and M. J. Maher. Reasoning with disjunctive constrained tuple-generating dependencies. In DEXA, 2001.

Cited By

View all
  • (2024)Early detection of temporal constraint violationsInformation and Computation10.1016/j.ic.2023.105114296(105114)Online publication date: Jan-2024
  • (2022)Termination and Confluence of an Extended CHASE AlgorithmNew Trends in Database and Information Systems10.1007/978-3-031-15743-1_58(631-638)Online publication date: 29-Aug-2022
  • (2021)Towards Knowledge Exchange: State-of-the-Art and Open ProblemsSOFSEM 2021: Theory and Practice of Computer Science10.1007/978-3-030-67731-2_2(13-27)Online publication date: 11-Jan-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
EDBT '08: Proceedings of the 11th international conference on Extending database technology: Advances in database technology
March 2008
762 pages
ISBN:9781595939265
DOI:10.1145/1353343
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 March 2008

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

EDBT '08

Acceptance Rates

Overall Acceptance Rate 7 of 10 submissions, 70%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)22
  • Downloads (Last 6 weeks)4
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Early detection of temporal constraint violationsInformation and Computation10.1016/j.ic.2023.105114296(105114)Online publication date: Jan-2024
  • (2022)Termination and Confluence of an Extended CHASE AlgorithmNew Trends in Database and Information Systems10.1007/978-3-031-15743-1_58(631-638)Online publication date: 29-Aug-2022
  • (2021)Towards Knowledge Exchange: State-of-the-Art and Open ProblemsSOFSEM 2021: Theory and Practice of Computer Science10.1007/978-3-030-67731-2_2(13-27)Online publication date: 11-Jan-2021
  • (2020)Catching Numeric Inconsistencies in GraphsACM Transactions on Database Systems10.1145/338503145:2(1-47)Online publication date: 27-Jun-2020
  • (2019)Answering Queries Using Views, Second EditionSynthesis Lectures on Data Management10.2200/S00884ED2V01Y201811DTM05414:3(1-275)Online publication date: 15-Apr-2019
  • (2019)The homomorphism property in query containment and data integrationProceedings of the 23rd International Database Applications & Engineering Symposium10.1145/3331076.3331127(1-12)Online publication date: 10-Jun-2019
  • (2018)Query answering with transitive and linear-ordered dataJournal of Artificial Intelligence Research10.1613/jair.1.1124063:1(191-264)Online publication date: 1-Sep-2018
  • (2018)Cleaning Data with Constraints and ExpertsProceedings of the 21st International Workshop on the Web and Databases10.1145/3201463.3201464(1-6)Online publication date: 10-Jun-2018
  • (2018)Reflections on Schema Mappings, Data Exchange, and Metadata ManagementProceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems10.1145/3196959.3196991(107-109)Online publication date: 27-May-2018
  • (2018)Catching Numeric Inconsistencies in GraphsProceedings of the 2018 International Conference on Management of Data10.1145/3183713.3183753(381-393)Online publication date: 27-May-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media