Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Reverse data exchange: Coping with nulls

Published: 02 June 2011 Publication History

Abstract

An inverse of a schema mapping M is intended to undo what M does, thus providing a way to perform reverse data exchange. In recent years, three different formalizations of this concept have been introduced and studied, namely the notions of an inverse of a schema mapping, a quasi-inverse of a schema mapping, and a maximum recovery of a schema mapping. The study of these notions has been carried out in the context in which source instances are restricted to consist entirely of constants, while target instances may contain both constants and labeled nulls. This restriction on source instances is crucial for obtaining some of the main technical results about these three notions, but, at the same time, limits their usefulness, since reverse data exchange naturally leads to source instances that may contain both constants and labeled nulls.
We develop a new framework for reverse data exchange that supports source instances that may contain nulls, and we thereby overcome the semantic mismatch between source and target instances of the previous formalizations. The development of this new framework requires a careful reformulation of all the important notions, including the notions of the identity schema mapping, inverse, and maximum recovery. To this effect, we introduce the notions of extended identity schema mapping, extended inverse, and maximum extended recovery, by making systematic use of the homomorphism relation on instances. We give results concerning the existence of extended inverses and of maximum extended recoveries, and results concerning their applications to reverse data exchange and query answering. Moreover, we show that maximum extended recoveries can be used to capture in a quantitative way, the amount of information loss embodied in a schema mapping specified by source-to-target tuple-generating dependencies.

References

[1]
Abiteboul, S., Hull, R., and Vianu, V. 1995. Foundations of Databases. Addison-Wesley.
[2]
Afrati, F., Li, C., and Pavlaki, V. 2008. Data exchange: Query answering on incomplete data sources. In Proceedings of the International ICST Conference on Scalable Information Systems (InfoScale).
[3]
Arenas, M., Pérez, J., Reutter, J. L., and Riveros, C. 2009a. Composition and inversion of schema mappings. SIGMOD Record 38, 3, 17--28.
[4]
Arenas, M., Pérez, J., Reutter, J. L., and Riveros, C. 2009b. Inverting schema mappings: Bridging the gap between theory and practice. In Proceedings of the International Conference on Very Large Data Bases (VLDB). 1018--1029.
[5]
Arenas, M., Pérez, J., Reutter, J. L., and Riveros, C. 2010. Foundations of schema mapping management. In Proceedings of ACM Symposium on Principles of Database Systems (PODS). 227--238.
[6]
Arenas, M., Pérez, J., and Riveros, C. 2009. The recovery of a schema mapping: Bringing exchanged data back. ACM Trans. Data. Syst. 34, 4.
[7]
Beeri, C. and Vardi, M. Y. 1984. A proof procedure for data dependencies. J. ACM 31, 4, 718--741.
[8]
Bernstein, P. A. 2003. Applying model management to classical meta-data problems. In Proceedings of the Conference on Innovative Data Systems Research (CIDR). 209--220.
[9]
Bernstein, P. A., Green, T. J., Melnik, S., and Nash, A. 2008. Implementing mapping composition. VLDB J. 17, 2, 333--353.
[10]
Deutsch, A. and Tannen, V. 2001. Optimization properties for classes of conjunctive regular path queries. In Proceedings of the International Workshop on Database Programming Languages (DBPL). 21--39.
[11]
Fagin, R. 2007. Inverting schema mappings. ACM Trans. Data. Syst. 32, 4.
[12]
Fagin, R., Kolaitis, P. G., Miller, R. J., and Popa, L. 2005a. Data exchange: Semantics and query answering. Theor. Comput. Sci. 336, 1, 89--124.
[13]
Fagin, R., Kolaitis, P. G., Popa, L., and Tan, W.-C. 2005b. Composing schema mappings: Second-order dependencies to the rescue. ACM Trans. Data. Syst. 30, 4, 994--1055.
[14]
Fagin, R., Kolaitis, P. G., Popa, L., and Tan, W. C. 2008. Quasi-inverses of schema mappings. ACM Trans. Data. Syst. 33, 2.
[15]
Fagin, R., Kolaitis, P. G., Popa, L., and Tan, W.-C. 2009. Reverse data exchange: Coping with nulls. In Proceedings of the ACM Symposium on Principles of Database Systems (PODS). 23--32.
[16]
Fagin, R., Kolaitis, P. G., Popa, L., and Tan, W.-C. 2011. Schema mapping evolution through composition and inversion. In Schema Matching and Mapping, Z. Bellahsene and A. Bonifati and E. Rahm, Ed. Springer, 191--222.
[17]
Fagin, R. and Nash, A. 2010. The structure of inverses in schema mappings. J. ACM 57, 6.
[18]
Fuxman, A., Hernández, M. A., Ho, C. T. H., Miller, R. J., Papotti, P., and Popa, L. 2006. Nested mappings: Schema mapping reloaded. In Proceedings of the International Conference on Very Large Data Bases (VLDB). 67--78.
[19]
Imieliński, T. and Lipski, Jr., W. 1983. Incomplete information and dependencies in relational databases. In Proceedings of the ACM Symposium on Management of Data (SIGMOD). 178--184.
[20]
Imieliński, T. and Lipski, Jr., W. 1984. Incomplete information in relational databases. J. ACM 31, 4, 761--791.
[21]
Lenzerini, M. 2002. Data integration: A theoretical perspective. In Proceedings of the ACM Symposium on Principles of Database Systems (PODS). 233--246.
[22]
Madhavan, J. and Halevy, A. Y. 2003. Composing mappings among data sources. In Proceedings of the International Conference on Very Large Data Bases (VLDB). 572--583.
[23]
Melnik, S. 2004. Generic Model Management: Concepts and Algorithms. Lecture Notes in Computer Science, vol. 2967, Springer.
[24]
Nash, A., Bernstein, P. A., and Melnik, S. 2005. Composition of mappings given by embedded dependencies. In Proceedings of the ACM Symposium on Principles of Database Systems (PODS). 172--183.
[25]
Popa, L., Velegrakis, Y., Miller, R. J., Hernández, M. A., and Fagin, R. 2002. Translating Web data. In Proceedings of the International Conference on Very Large Data Bases (VLDB). 598--609.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Database Systems
ACM Transactions on Database Systems  Volume 36, Issue 2
May 2011
257 pages
ISSN:0362-5915
EISSN:1557-4644
DOI:10.1145/1966385
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 June 2011
Accepted: 01 February 2011
Revised: 01 January 2010
Received: 01 October 2009
Published in TODS Volume 36, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Schema mapping
  2. chase
  3. data exchange
  4. data integration
  5. inverse
  6. maximum recovery
  7. model management
  8. quasi-inverse

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)ProSA Pipeline: Provenance Conquers the ChaseNew Trends in Database and Information Systems10.1007/978-3-031-15743-1_9(89-98)Online publication date: 29-Aug-2022
  • (2021)Schema mapping coverageAnnals of Mathematics and Artificial Intelligence10.1007/s10472-020-09720-489:5-6(511-549)Online publication date: 1-Jun-2021
  • (2019)Answering Queries Using Views, Second EditionSynthesis Lectures on Data Management10.2200/S00884ED2V01Y201811DTM05414:3(1-275)Online publication date: 15-Apr-2019
  • (2019)Approximation algorithms for querying incomplete databasesInformation Systems10.1016/j.is.2019.03.010Online publication date: Apr-2019
  • (2018)Reflections on Schema Mappings, Data Exchange, and Metadata ManagementProceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems10.1145/3196959.3196991(107-109)Online publication date: 27-May-2018
  • (2017)Answering Queries Using ViewsSynthesis Lectures on Data Management10.2200/S00805ED1V01Y201709DTM0469:2(1-235)Online publication date: Dec-2017
  • (2016)SEDEX: Scalable Entity Preserving Data ExchangeIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2016.253535128:7(1878-1890)Online publication date: 1-Jul-2016
  • (2015)Recovering Exchanged DataProceedings of the 34th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems10.1145/2745754.2745770(105-116)Online publication date: 20-May-2015
  • (2015)On the undecidability of the equivalence of second-order tuple generating dependenciesInformation Systems10.1016/j.is.2014.09.00348:C(113-129)Online publication date: 1-Mar-2015
  • (2015)Proceedings of the 34th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database SystemsundefinedOnline publication date: 20-May-2015
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media