Super-Key Classes for Updating. Materialized Derived Classes in Object Bases

Size: px
Start display at page:

Download "Super-Key Classes for Updating. Materialized Derived Classes in Object Bases"

Transcription

1 Super-Key Classes for Updating Materialized Derived Classes in Object Bases Shin'ichi KONOMI 1, Tetsuya FURUKAWA 1 and Yahiko KAMBAYASHI 2 1 Comper Center, Kyushu University, Higashi, Fukuoka 812, Japan fkonomi,furukawag@cc.kyushu-u.ac.jp 2 Integrated Media Environment Experimental Laboratory, Kyoto University, Sakyo, Kyoto 606, Japan yahiko@kuis.kyoto-u.ac.jp Abstract. We describe data structures that allow ecient updates of materialized classes derived from relationship of classes in object bases. Materialization of derived classes reduces costs of retrievals and increases costs of updates. Costs of updates increase remarkably when several paths of objects derive the same object. If object bases satisfy the superkey condition proposed in this paper, consistencies of object bases are maintained by local navigations and the remarkable increase of the costs is avoided. Any object base can be transformed to satisfy the superkey condition by adding extra classes and their objects. In this manner, increasing redundancies allows ecient updates. 1 Introduction In databases, redundant data structures introduced to reduce costs of retrievals often increase costs of updates. Database management systems should allow ecient retrievals with minimal increase of update costs. Views in databases are proposed to provide exibility witho aecting underlying data. Views in object bases are also proposed introducing imaginary objects, virtual classes and virtual class hierarchies [1]. Costs of retrievals that are required to produce views depend on access paths of underlying data and complexity of view denitions. Materialization of views allows fast retrievals of views regardless of access paths of underlying data and complexity of view denitions. However, when updates occur in object bases, extra costs are required to keep materialized views consistent. Compared with replicated data in distribed databases, materialized views cause more expensive update overheads since they may require recompation of views. The following example shows characteristics of updating materialized views. Example 1. Let us consider a video database. The whole sequences of frames (images) are partitioned into scenes. In Fig.1(a), Mick and Paul appear at Airport in Scene1, Mick, Paul, and a dog at Airport in Scene2, and Mick and John at Hotel in Scene3. Figure 1 (b) shows objects and their connections in the video database.

2 Presence1 and Presence2 are derived objects where Presence1 is Mick's presence at Airport and Presence2 is Mick's presence at Hotel. Airport Airport Hotel Mick Mick Mick Paul Paul dog John Scene 1 Scene 2 Scene 3 (a) Fig. 1. Video database Paul Mick John Scene1 Airport Scene2 Hotel Scene3 Presence1 Presence2 (b) Suppose the derived objects are materialized and Scene2 is deleted in editing the video. Since Mick is at Airport in Scene2, Mick may lose his presence at Airport. However, after retrieving connections of objects, we nd that he is still at Airport in Scene1. Thus, Presence1 is not deleted. There are three dierent approaches for ecient maintenance of materialized views: Optimal Refresh Frequency of Materialized Views: Analytical modeling and optimal refresh policies of materialized view maintenance are presented in [12]. Screening of Updates of Materialized Views: Blakeley et al.[2] present conditions for detecting when an update of a base relation cannot aect a derived relation and for detecting when a derived relation can be updated using only the data of the derived relation itself and the given update operation. Incremental Updates of Materialized Views: The algorithm presented in [9] derives the minimal incremental relational expressions that need recompation. Roussopoulos[10] discusses incremental updates of a stored collection of pointers pointing to records of underlying relations needed to materialize a view. Here we focus on the third approach and discuss ecient methods of incremental updates of materialized classes derived from relational expressions including projections. In this paper, data structures that permit ecient incremental updates of materialized derived classes are described. When classes are derived from a path of classes in a class schema, the key of the path is dened to be ilized for updates. Class schemas satisfy the super-key condition presented in this paper if derived classes and the keys of the paths from which the classes are derived are contained in the same subgraphs of class schemas. If class schemas satisfy

3 the super-key condition, incremental updates are performed eciently by detecting multiple paths of underlying objects ilizing objects of classes in keys. A procedure to transform class schemas so that they satisfy the super-key condition is presented. Though the procedure add extra classes and introduce more redundancies into object bases, it allows ecient deletions of objects. Section 2 gives the denition of our model of object bases. Section 3 introduces materialized derived classes in object bases. Section 4 gives a procedure to maintain consistencies of materialized derived classes. Section 5 discusses data structures that allow ecient update propagations introducing the super-key condition and super-key classes. Section 6 describes design of object bases for ecient update propagations. Section 7 gives our conclusion. 2 A Model of Object Bases The model described here focuses on connections of objects and relationships of classes from which classes are derived. Objects are values associated with their identiers. Values of objects are assumed to be classied as follows: basic values: The special symbol nil or values from domain D, the union of all the domains in a database. set-values: A set fid 1 ; id 2 ; : : : ; id n g is a set-value where id i (1 i n) is an object identier (OID). tuple-values: Let id i (1 i m) be an OID and a i (1 i m) be an attribe. < a 1 : id 1, a 2 : id 2, : : :, a m : id m > is a tuple-value. Objects belong to classes and classes are structured in class hierarchies with ISA relationships, denoted by -. Classes are dened when object bases are designed. One of the above types of values is assumed to be specied in each class. If tuple-values are specied in a class, attribes are also specied in the class. Relationships of classes and connections of objects are classied as follows: Set relationships and set connections A set relationship from a class C to a class C 0 is denoted by C! C 0. Objects in class C are set-value objects o = (id; fid 1 ; id 2 ; : : : ; id n g) and all the objects identied by id 1 ; id 2 ; : : : ; id n are in class C 0. A set connection is a set of m links from object o to an object identied by id i (1 i m). Reference relationships and reference connections A reference relationship from a class C to a class C 0 on attribe a i is denoted by C ; ai C 0. C;C 0 is used instead of C ; ai C 0 if the attribe is trivial. The set of all the attribe of class C is denoted by Att(C). Objects in class C are tuple-value objects o = (id; < a 1 : id 1 ; a 2 : id 2 ; : : : ; a m : id m >) and object o 0 identied by one of id i (1 i m) is in class C 0. A reference connection is a link from o to o 0. ISA relationships ISA relationship from a class C to a class C 0 is denoted by C - C 0.

4 A class schema is a labeled directed graph S(V; E) where set of vertices V represents the set of all the classes in the schema and set of edges E represents the set of all the relationships of classes in the schema. Example 2. Figure 2 shows a part of the class schema for the video database in Fig.1. Each vertex in the gure represents a class. ISA relationships in the gure show that classes and Animal are subclasses of class Creature. Arrows with attribe names represent reference relationships. Objects in class Scene references objects in class Location as values of attribe Place, objects in class Animal or s as values of attribe Appearance. Arrows with doubled arrowheads represent set relationships. Objects in class s references objects in class as sets. s Scene Appearance Place Appearance Creature Animal Fig. 2. Class schema for video database Location att :Class :ISA relationship :Reference relationship :Set relationship An object graph is a labeled directed graph O(v; e) where v is a set of vertices and e is a set of edges. Each vertex of v corresponds to one of a basic-value, a set-value or a tuple-value object. Each edge of e corresponds to a link in reference connections or in set connections. Example 3. Figure 3 shows an object graph corresponding to the class schema in Fig.2. Objects in each class are encircled under the name of the class. Denition 1. Let S 0 (V 0 ; E 0 ) be a connected subgraph of class schema S(V; E) and O(v; e) and O 0 (v 0 ; e 0 ) be object graphs of S(V; E) and S 0 (V 0 ; E 0 ), respectively. S 0 (V 0 ; E 0 ) and O 0 (v 0 ; e 0 ) are an class subschema of S(V; E) and an object subgraph of O(v; e), respectively. Note that O 0 is a subgraph of object graph O if O 0 is an object subgraph of O. Objects in object graph O(v; e) and classes in class schema S(V; E) are related by function inst. inst(c) represents all the object in class C. Paths of classes P S = (C 1 ; C 2 ; : : : ; C n ) is a path in the undirected graph that corresponds to class schema S. P is used instead of P S if S is trivial. inst(p S ) is a set of paths p = (o 1 ; o 2 ; : : : ; o n ) where o i 2 inst(c i ) (1 i n). Paths can be represented with lists of vertices assuming that only one edge exists between two adjacent objects.

5 Paul John Mick o1 o2 o3 s o4 o 5 Scene o 6 o7 o 8 Location o 9 o 10 Airport Hotel Fig. 3. Object graph Denition 2. Let S be a class schema and P S = (C 1 ; C 2 ; : : : ; C s ) be a path of classes. A relation of P S, denoted by R(P S ), is relation R(C 1 ; C 2 ; : : : ; C s ). Instances of R(P S ) is a set of tuples (o 1 ; o 2 ; : : : ; o s ) where p = (o 1 ; o 2 ; : : : ; o s ) and p 2 inst(p S ). R(C 1 ; C 2 ; : : : ; C s ) is a relation in the relational model whose attribes and tuples correspond classes and set of objects. Functional dependencies in relation R(P ) are functional dependencies in relation R(C 1 ; C 2 ; : : : ; C s ) in the relational model. R(P)[C i = o] and R(P )[ C k1 ; C k2 ; : : : ; C kt ] denote selection and projection as in the relation model. Let P 0 be a subgraph of P and fc k1 ; C k2 ; : : : ; C kt g be the set of all the classes in P 0. R(P)[P 0 ] denotes projection R(P )[ C k1 ; C k2 ; : : : ; C kt ]. Note that R[P][P 0 ] = R[P 0 ]. Example 4. Let P = (; s; Scene; Location) be a path of classes and functional dependencies Scene! s and Scene! Location be asserted. Table 1 shows an instance of relational schema R(P ). Since functional dependencies Scene! s and Scene! Location hold in R(P ), a key of R(P ) is fscene, g. Table 1. Relation of path (, s, Scene, Location) s Scene Location o 1 o 4 o 6 o 9 o 1 o 4 o 7 o 9 o 2 o 5 o 8 o 10 o 3 o 4 o 6 o 9 o 3 o 4 o 7 o 9 o 3 o 5 o 8 o 10

6 Functional dependencies in R(P ) depend on relationships in class schemas. There is no functional dependency except for the trivial ones in R(C 1 ; C 2 ) where C 1 and C 2 are classes such that C 1! C 2 in class schema S(V; E). Functional dependency C 1!C 2 holds in R(C 1 ; C 2 ) where C 1 and C 2 are classes such that C 1 ;C 2 in class schema S(V; E). Denition 3. Let P be a path of classes and C be a set of all the classes in P. A key of path P, denoted by key(p ), is a minimal subset C 0 of C such that C 0!C holds in R(P ). 3 Materialized Derived Classes in Object Bases When derived classes are materialized to allow fast retrievals, redundancies increase in object bases and costs of updates increase. Example 5. In the class schema of Fig.4, class Presence is added to the class schema in Fig.2. Correspondences of locations and persons are easily retrieved from objects in class Presence. Suppose object o 7 of Scene is deleted. Since navigations from o 7 gives o 4, o 1 (Paul), and o 9 (Airport), the connection between o 1 (Paul) and o 9 (Airport) may be lost after the deletion of o 7. If no connection between o 1 (Paul) and o 9 (Airport) exists, object o 12 of class Presence should be deleted to keep the class schema consistent. However, after navigating from all the objects in class Scene, i.e., o 6, o 7, and o 8, to class and to class Location we nd o 1 (Paul) and o 9 (Airport) is still connected through o 6 after the deletion of o 7. In this case, object o 12 is not deleted. An object derived from an object graph O is assumed to have tuple value < a 1 : id 1, a 2 : id 2, : : :, a s : id m > where id i (1 i m) identies an object in O. A class derived from a class schema S is a class of objects derived from an object graph of S. Denition 4. Let o be an object, C be the class of o, P be a path of classes, and p 2 inst(p ). If every OID that appears as a value of object o is in p, o is an object derived from p, denoted by o < p. If, for every object o that belongs to C, there exists p 2 inst(p ) such that o < p, C is a class derived from P, denoted by C < P. Derived class C can be materialized in the following manner for quick retrievals of objects in C. Given class schema S, path of classes P S and class C + < P S, C + can be added to S by merging S(V; E) and class schema S + (V + ; E + ) that is constructed as follows: (1) Let C + be the class of tuple-value objects o = (id; < a 1 : id 1 ; a 2 : id 2 ; : : : ; a n : id m >). Add C + to V +.

7 s Scene Appearance Place Location Location Presence (a) class schema Paul John Mick o 1 o2 o 3 s o4 o 5 Scene o 6 o7 o 8 Location o 9 o 10 Airport Hotel Presence o o o o (b) object graph Fig. 4. Introduction of materialized derived class and objects (2) Let C i be such a class in S that includes the object identied by id i for every object o in C +. Add an edge C + ;C i to E + for each C i. S 3 (V 3 ; E 3 ) denotes an class schema obtained by merging S(V; E) and S + (V + ; E + ), i.e., V 3 = V [ V + and E 3 = E [ E +. Object graphs corresponding to S + (V + ; E + ) and S 3 (V 3 ; E 3 ) are denoted by O + (v + ; e + ) and O 3 (v 3 ; e 3 ), respectively. Class C + is called a materialized derived class. Let P S be a path of classes, C + < P S be a materialized derived class, S 3 (V 3 ; E 3 ) be a class schema obtained by adding C + to S where S 3 (V 3 ; E 3 ) = S(V; E) [ S + (V + ; E + ). A + = V \ V + is the set of all the classes that belong to both S and S +. Let fp 1 ; P 2 ; : : : ; P n g be the set of all the paths in S +. R(S + ) = R(P 1 ) 1 R(P 2 ) P(P n ). R(S + )[A + ] is a relation on attribes A + which is obtained from class schema S +. R(P S )[A + ] is a relation on attribes A + which is obtained from class schema S. Denition 5. S 3 (V 3 ; E 3 ) is consistent i R(S + )[A + ] = R(P S )[A + ]. Example 6. In Fig.4(a), Presence is a materialized class derived from path (; s; Scene; Location), denoted by Presence < (; s; Scene; Location).

8 Objects in Presence are derived from paths in the undirected graph that corresponds to the object graph in Fig.4(b) as follows: o 11 <(o 3 ; o 4 ; o 6 ; o 9 ) o 11 <(o 3 ; o 4 ; o 7 ; o 9 ) o 12 <(o 1 ; o 4 ; o 6 ; o 9 ) o 12 <(o 1 ; o 4 ; o 7 ; o 9 ) o 13 <(o 3 ; o 5 ; o 8 ; o 10 ) o 14 <(o 2 ; o 5 ; o 8 ; o 10 ) Let S 3 (V 3 ; E 3 ) denote the class schema. S 3 (V 3 ; E 3 ) = S(V; E)[S + (V + ; E + ) where V = f ; s; Scene; Location g, E = f s! ; Scene ; s; Scene ; Locationg, V + = f; Presence; Locationg, and E + = f Presence ; ; Presence ; Locationg. 4 Maintaining Consistencies after Updates When an object is inserted, deleted or modied in class schema S 3 containing materialized derived classes, propagation of updates may occur to keep S 3 consistent after the insertion, deletion or modication of objects. Let C + be a materialized derived class derived from a path of classes P. C + is updated based on preceding updates of P. Processes required to update C + can be performed in three steps, i.e., candidate retrieval, derivation test, and update. Path p inserted into inst(p ) requires derivation of object o < p (candidate retrieval). Also, if o is not in inst(c + ) previously (derivation test), o must be inserted into inst(c + ) (update). To check if o is in inst(c + ), traversal of entire inst(c + ) may be required. Path p deleted from inst(p ) requires derivation of object o < p (candidate retrieval). Also, if p is the only path such that o < p in inst(p ) (derivation test), o must be deleted from inst(c + ) (update). Finding such a path except for p that o < p normally requires much cost since entire inst(p ) are retrieved and object o < p are derived for every path p 2 inst(p ) in the worst cases. In the following part of the paper, we reduce the costs of processes required to maintain consistencies after a deletion of an object. Suppose C + < P is updated. Followings are candidate retrieval and derivation test that are represented as relational expressions. Let object o of class C u in P be inserted, deleted or modied. Candidate retrieval: Obtain R c = 0 R(P )[C u = o] 1 R(S + ) 1 [C + ]. Derivation test: Obtain R c 0 0 R(P )[C u 6= o] 1 R(S + ) 1 [C + ] Following part of this section gives a procedure that is sucient to keep S 3 consistent after a deletion of an object in P. First, P 0 is dened to trim P for C +. Denition 6. Let C + < P be a materialized derived class. If P 0 is the minimal subgraph of P such that satises C + < P 0, P 0 is a corresponding path of C +, denoted by P 0 C +.

9 Only the updates of subgraph P 0 of P aect objects in C +. Lemma 7. Let P 0 C + be a subgraph of P. R(S + )[A + ] = R(P )[A + ] i R(S + )[A + ] = R(P 0 )[A + ]. Proof. Since P 0 is a subgraph of P, R(P 0 ) = R(P )[P 0 ]. Thus, R(P 0 )[A + ] = R(P )[P 0 ][A + ] = R(P)[A + ]. If R(S + )[A + ] = R(P 0 )[A + ], R(S + )[A + ] = R(P )[A + ]. Also, if R(S + )[A + ] = R(P )[A + ], R(S + )[A + ] = R(P 0 )[A + ]. The following procedure updates materialized derived class C + after a deletion of an object in P 0 such that P 0 C +. If V + contains more than one materialized derived classes, apply the procedure to each of the materialized derived class. After applying the procedure, S 3 is consistent. Procedure 8. Let C + < P be a materialized derived class and P 0 C + be a subgraph of P. Given class schema S 3 and deleted object o of class C u in P 0. (1) Candidate Retrieval: Navigate in P 0 to nd a path p 2 inst(p 0 ) that contains o and then navigate from p to obtain a set of objects in C + that are connected to p. The obtained objects are the candidate objects, denoted by o c. (2) Derivation Test: For each o c 2 o c, navigate in P 0 to nd all the paths in inst(p 0 ) that do not contain o and o c < p. (3) Deletion: If no path is found for o c 2 o c in the preceding derivation test, o and o c are deleted. Otherwise, o is deleted. Since navigations in Step 1 is performed with only the paths in inst(p 0 ) that contains o, there is no need to traverse entire inst(p 0 ). However, Step 2 may require to traverse entire inst(p 0 ) in the worst cases. Lemma 9. Let S 3 (V 3 ; E 3 ) be a consistent class schema, C and C + be classes in S +, and P and P 0 be paths of classes where C + < P and P 0 C +. Suppose o 2 inst(c) is to be deleted. S 3 is consistent if Procedure 8 is applied to S 3. Proof. Let R 1 (X) and R 2 (X) be relational schemas and Y be a subset of attribes X. Since R 1 [Y ] (R 1 0 R 2 )[Y ] (R 1 [Y ] 0 R 2 [Y ]), (R 1 0 R 2 )[Y ] = R 1 [Y ] 0 R 2 [Y ] + (R 1 0 R 2 )[Y ]. Let 1R(P 0 ) = R(P 0 )[C = o] be tuples to be deleted in R(P 0 ). After deleting o in R(P 0 ), R(P 0 ) becomes R(P 0 ) 0 1R(P 0 ): Since (R 1 0 R 2 )[Y ] = R 1 [Y ] 0 R 2 [Y ] + (R 1 0 R 2 )[Y ], 0 R(P 0 ) 0 1R(P 0 ) 1 [A + ] = R(P 0 )[A + ] 0 1R(P 0 )[A + ] + (R(P 0 ) 0 1R(P 0 ))[A + ]. In Procedure 8, followings are performed: (1) 1R(P 0 )[A + ] is obtained in Step 1 of Procedure 8. (2) 0 R(P 0 ) 0 1R(P 0 ) 1 [A + ] is obtained in Step 2 of Procedure 8. (3) R(S + )[A + ] is changed to R new (S + )[A + ] where R new (S + )[A + ] = R(S + )[A + ] 0 0 1R(P 0 )[A + ] 0 0 R(P 0 ) 0 1R(P 0 ) 1 [A + ] 1

10 Since S 3 is consistent before the 0 deletion, R(S + 0 )[A + ] = R(P 0 )[A + 1 ]: Then, R new (S + )[A + ] = R(S + )[A + ] 0 1R(P 0 )[A + ] 0 R(P 0 ) 0 1R(P 0 ) [A ] = R(P 0 ) 0 1R(P 0 ) [A + ]. Let R(P 0 )01R(P 0 ) be R new (P 0 ) and R(P )01R(P ) be R new (P ). The above equation is equivalent to R new (S + )[A + ] = R new (P 0 )[A + ]. R new (S + )[A + ] = R new (P )[A + ] follows from Lemma 7. Thus, S 3 is consistent after the deletion if Procedure 8 is applied to S 3. 5 Ecient Deletions of Objects In some cases, derivation test can be omitted in Procedure 8. This section includes a condition satised by class schemas which allow to omit derivation test or to perform derivation test with only navigations on a single relationship. First, an example of a class schema which does not require derivation test is shown. Example 7. Materialized derived objects are deleted when the objects they point to are deleted. Suppose object o 9 is deleted in Fig.4. Objects o 11 and o 12 which point to o 9 are deleted witho derivation test. In the class schema presented in Fig.5, derivation test for derived class 'sscene can be always omitted in applying Procedure 8. Suppose object o 5 is deleted. Navigations from o 5 gives (o 2 ; o 5 ; o 8 ) and (o 3 ; o 5 ; o 8 ) and candidate objects o 17 and o 20 are obtained. Since paths in the instances of path (; s; Scene) and objects in class 'sscene have one-to-one relationship, there is no such a path p in the instances of path (; s; Scene) such that o 17 < p or o 20 < p if o 5 is deleted. Therefore, derivation test is not required to know o 17 and o 20 must be deleted. The following procedure is the same as Procedure 8 except that it does not include derivation test. Procedure 10. (1) Step 1 of Procedure 8 (2) o and every object o c 2 o c obtained in the candidate retrieval are deleted. The next two lemmas show the condition of class schemas for always omitting derivation test. Lemma 11. Let S 3 (V 3 ; E 3 ) = S(V; E) [ S + (V + ; E + ) be a consistent class schema, P and its subgraph P 0 be such paths of classes that C + < P and P 0 C +, and C be a class in P 0. Suppose object o 2 inst(c) is deleted and Procedure 10 is applied to S 3. If functional dependency A +! C holds, S 3 is consistent.

11 s Scene Location Appearance Place Scene 'sscene (a) class schema Paul John Mick o 1 o2 o3 s o 4 o 5 o15 Scene o 6 o 7 o 8 Location o 9 o 10 Airport Hotel o16 o17 o18 o o 'sscene (b) object graph Fig. 5. Class schema containing super-key class Proof. If there exists such a pair (o 1 ; o 2 ) of objects in inst(c) that satises R(P 0 )[C = o 1 ][A + ] = R(P 0 )[C = o 2 ][A + ], A +! C does not hold. Thus, if A +! C, no path is found in derivation test of Procedure 8. Since Procedure 10 is the same as Procedure 8 except that it does not contain a step corresponding to Step 2 of Procedure 8, applying Procedure 10 is identical to applying Procedure 8. From Lemma 9, it follows that S 3 is consistent. Lemma 12. Let S 3 (V 3 ; E 3 ) = S(V; E) [ S + (V + ; E + ) be a consistent class schema, and P and P 0 be such paths of classes that C + < P and P 0 C +. Suppose object o in P 0 is deleted and Procedure 10 is applied to S 3. If A + key(p 0 ), S 3 is consistent. Proof. Let P 0 be (C 1 ; C 2 ; : : : ; C n ). From the denition of key(p 0 ), key(p 0 )! fc 1 ; C 2 ; : : : ; C n g. Since fc 1 ; C 2 ; : : : ; C n g fc i g (1 i n), fc 1 ; C 2 ; : : : ; C n g! C i. Thus, A +!C i (1 i n). From Lemma 11, it follows that as for a deletion of o 2 inst(c i ) (1 i n), S 3 is consistent if we apply Procedure 10 to S 3. In Fig.5, A + = fscene; g and key(p 0 ) = fscene; g. From Lemma

12 12, it follows that the class schema in Fig.5 is consistent if we apply Procedure 10 to the class schema. Let S 3 = S + S + be a class schema, C + i (1 i n) be a class in S +, S 3 i = S + S + i be the class schema obtained by adding C + i to S. We denote by A + i the set of all the classes in both class subschemas S and S + i of S 3 i. Denition 13. Let P 0 C + i (1 i n) be a path of classes in S 3. S 3 (V 3 ; E 3 ) satises the super-key condition i n[ i=1 A + i key(p 0 ) for every P 0 in S 3. If there exists a class C + i such that Att(C + i ) key(p 0 ), C + i is called a super-key class. From Lemma 12, it follows that if S 3 = S [ S + satises the super-key condition and S + contains only a super-key class except for the classes contained in S, S 3 is kept consistent by applying Procedure 10. If S + contains more than one classes that are not contained in S, performing Procedure 10 for classes in S + is not sucient to keep S 3 consistent. Even in this case, Procedure 8 is not required when S + is properly designed. Example 8. In Fig.6, 0 sscene < (; s; Scene; Location) and Presence < (; s; Scene; Location). Since Presence and 'sscene are derived from the same path of classes, an object of Presence can be updated according to objects of 'sscene by navigating on the reference relationship between them. Note that the class schema contains super-key class 'sscene and satises the super-key condition. s Scene Location Appearance Place Scene 'sscene Presence Presence Fig. 6. Class schema allowing ecient deletions Location Let fc + 1 ; C+ 2 ; : : : ; C n + g be a set of classes in S+ (V + ; E + ), and C + 1 be a superkey class. If there exist reference relationships C + 1 ;C + i (2 i n), they can be ilized in candidate retrievals and derivation test. Reference connections of reference relationships C + 1 ;C i + must be double-linked and satisfy relational expression 0 R(P ) 1 R(S + ) 1 [C + 1 ; C+ i ] = R(C+ 1 ; C+ i ).

13 Procedure 14. Let fc + 1 ; C+ 2 ; : : : ; C+ n g be a set of classes in S + (V + ; E + ), C + 1 be a super-key class in fc + 1 ; C+ 2 ; : : : ; C n + g, and C+ 1 ;C i + (1 i n) be reference relationships in S +. (1) Candidate Retrieval: Apply the Step 1 of Procedure 8 to C + 1, and let oc 1 be the set of candidate objects of C + 1. Navigate the links of C+ 1 ;C i + (2 i n) to nd objects linked to an object in o c 1 and let the resulting objects be oc i (2 i n). (2) Derivation Test: Navigate the links of C + 1 ;C + i (2 i n) from oc i (2 i n). Note that the connections of C + 1 ;C i + must be double-linked and 0 R(P ) 1 R(S + ) 1 [C + 1 ; C+ i ] = R(C+ 1 ; C + i ). satisfy (3) Deletion: Delete o c 2 o c i if only one object of C+ 1 is connected to oc. Delete all the object in o c 1 from C+ 1. Delete o from C u. Lemma 15. Let S 3 (V 3 ; E 3 ) = S(V; E) [ S + (V + ; E + ) be a consistent class schema where V + = fc + 1 ; C+ 2 ; : : : ; C+ n g, C V + be a super-key class, C + 1 ;C + i (2 i n) be reference relationships, 0and reference connections of C + 1 ;C i + (2 i n) be double-linked and satisfy R(PS ) 1 1 R(S + ) [C + 1 ; C+ i ] = R(C + 1 ; C+ i ). If object o is deleted in S3 and Procedure 14 is applied to S 3, S 3 is consistent. Proof. Let Si 3 = S [ S i + (1 i n) be the class schema obtained by adding class C i + to S. We prove that every Si 3 (1 i n) is consistent. S 3 is consistent since applying Procedure 14 to 1 C+ i is equivalent to applying Procedure 10 to C +. Applying Step 3 in Procedure 14 to 1 S3 i (2 i n) is the same as applying Step 3 in Procedure 8 to Si 3 (2 i n). In Step 1 of Procedure 14, o c 1 corresponds to tuples obtained by evaluat- 0 ing R c 1 = R(P 0 )[C = 0 o] 1 1 R(S + ) [C + ]. To obtain 1 oc i (2 i n) that corresponds to R c i = R(P 0 )[C = o] 1 1 R(S + ) [C + i ], navigations on C+ 1 ;C + i (2 0 i n) from o c 1 is performed producing pairs of objects corresponding to R c 1 )1 0 R(C + 1 ; C+ i [C i + ]. Since R(C+ 1 ; C+ i ) = R(P 0 ) 1 1 R(S + ) [C + 1 ; C+ i 0 ], R c 1 1 )1 0 R(C + 1 ; C+ i [C + i ] = R c R(P 0 ) 1 ]1 0 R(S + ))[C + 1 ; C+ i [C + i ] = R c 1 1 R(P 0 ) R(S + ) [C + 1 ; C+ i ] [C i + ] = R(P 0 )[C = o] 1 1 R(S+ ) [C + 1 ; C i + ] 0 = R(P 0 )[C = o] 1 1 R(S + ) [C i + ] = 0 Rc i. In Step 2 of Procedure 14, R c i = R(P 0 )[C 6= o] 1 1 R(S + ) [C + i [C + i ] ] (2 i n) need to be obtained. R c 1 = R(P 0 )[C 6= o] 1 R(S 0 + )[C + ] = 1 R(C+ ) 0 1 Rc 1. In this step, processes corresponding to evaluating R c 1 ] are per- 1 )1 R(C + 1 ; C+ i [C i + formed. Since (R(P) 1 0 R(S + ))[C + 1 ; C+ i ] = R(C+ ; C+ i ), R c 1 1 )1 R(C + 1 ; C i + [C i + ] = 0 R c 1 1 (R(P 0 ) 1 ]1 R(S + ))[C + 1 ; C+ i [C i + ] =0 R c 1 1 R(P 0 ) 1 R(S + ))[C + 1 ; C+ i ][C+ i ] = R(P 0 )[C 6= o] R(S + ) [C + 1 ; C+ i ][C i + ] = R(P 0 )[C 6= o] 1 1 R(S + ) [C i + ] = Rc i. Thus, applying Procedure 14 to S 3 is equivalent to applying Procedure 10 to C + and Procedure 1 to each of 1 C+ i (2 i n). In Procedure 8, Steps 1 and 2 require navigations on entire P 0. However in Procedure 14, Steps 1 and 2 require navigations on only a subgraph of P 0. Navigations on class schemas can be classied as follows:

14 (1) Single-step navigation A navigation on a single relationship. (2) Multi-step navigation A navigation on multiple relationships. Theorem 16. Let S 3 (V 3 ; E 3 ) be a consistent class schema where S 3 = S [ S +, fc + 1 ; C+ 2 ; : : : ; C+ n g be the set of all the classes in S +, C + 1 be a super-key class in S +, C + 1 ;C i + (2 i n) be reference relationships and reference connections of C + 1 ;C + i (2 i n) be double-linked and satisfy 0 R(P ) 1 R(S + ) 1 [C + 1 ; C+ i ] = R(C + 1 ; C+ i ). Suppose object o is deleted in S 3. No multi-step navigation is required in the derivation test to keep S 3 consistent. Proof. From Lemma 15, it follows that S 3 is consistent if Procedure 14 is applied to S 3. Clearly, Procedure 14 requires no multi-step navigation in the derivation test. Although candidate retrieval requires multi-step navigations, only objects connected to o need to be retrieved. Since the class schema in Fig.6 contains a super-key class 'sscene and Presence is referenced by class 'sscene, no multi-step navigation is required to keep the class schema consistent if the reference connections between 'sscene and Presence are double-linked. 6 Design of Object Bases Allowing Ecient Updates This section gives a procedure to design object bases that allow ecient retrievals and updates. Generally, objects in object bases are retrieved quickly by introducing redundancies into object bases. On the other hand, to reduce overheads to update redundant objects, redundancies should be reduced. We introduce more redundancies into object bases to reduce overheads to update redundant objects. Let S 3 = S [ S + be a class schema that contains materialized derived classes. When S 3 does not satisfy the super-key condition, multi-step navigations are required for each materialized derived class in S +. The next procedure transforms class schemas to satisfy the super-key condition and thus allow single-step navigations in keeping S 3 consistent after a deletion of an object. Procedure 17. Given a class schema S 3 (V 3 ; E 3 ), (1) Let C + 1 ; C+ 2 ; : : : ; C+ n be classes in S+ that have tuple-values and Si 3 be a object schema obtained by adding C i + to S. Obtain path Pi 0 C i + for 1 i n. Let the set of all path Pi 0 be fp k 0 1 ; Pk 0 2 ; : : : ; Pk 0 m g. (2) Let Ck K 1 ; Ck K 2 ; : : : ; Ck K m be super-key classes of Pk 0 1 ; Pk 0 2 ; : : : ; Pk 0 m, i.e., Att(Ck K i ) key(pk 0 i ). Construct an class schema from S 3 and Ck K 1 ; Ck K 2 ; : : : ; Ck K m. (3) Add reference relationship Ck K i ;C + k if j Pk 0 i C + k. Note that reference con- j nection of C K k i ;C + k j must be double-linked and satisfy C + i ] = R(C+ 1 ; C+ i ). 0 R(P) 1 R(S + ) 1 [C + 1 ;

15 (4) Let the resulting class schema be S 0 (V 0 ; E 0 ). Theorem 18. Let S 0 be a consistent class schema transformed by Procedure 17. No multi-step navigation is required to keep S 0 consistent after a deletion of object o in P 0 i. Proof. Let Sk 3 i = S [ S + k i (1 i m), fc + 1 ; C+ 2 ; : : : ; C s + g be the set of all the classes in S + k i where C + j < Pk 0 i for (1 j s), and Ck K i be super-key class in S + k i. Procedure 17 add Ck K i if it does not exist in fc + 1 ; C+ 2 ; : : : ; C+ s g and adds reference relationships Ck K i ;C j (1 j s, C j 6= Ck K i ), whose connection are double-linked. From Theorem 16, it follows that Sk 3 i (1 i m) is consistent after the deletion if Procedure 17 is applied to S 3. Procedure 17 may increase the costs in keeping S 3 consistent after an insertion of an object. However, in general, the increase of the costs of an insertion can be ignored compared to the decrease of the costs of a deletion. Costs of retrievals in S 3 is not increased by Procedure 17. Theorem 19. Let S 0 be a class schema transformed by Procedure 17, O 3 (v 3 ; e 3 ) and O 0 (v 0 ; e 0 ) be object graphs of class schema S 3 (V 3 ; E 3 ) and S 0 (V 0 ; E 0 ), respectively. If O(v; e) is an object subgraph of O 3 that is accessed to perform retrieval query Q in S 3, O(v; e) is also an object subgraph of O 0 (v 0 ; e 0 ). Proof. Since Procedure 17 either adds classes or reference relationships to S 3 to obtain S 0, S 0 subsumes S 3. Thus, an object subgraph of S 3 is also an object subgraph of S 0. Theorem 19 implies that retrieval query Q can be performed in the same object subgraph of both S 3 and S 0. Example 9. The class schema in Fig.6 is transformed from the class schema in Fig.4 by Procedure 17. Connection of objects between classes 'sscene and Presence is shown in Fig.7. 'sscene is a super-key class of the class schema in Fig.6. 'sscene o 15 o 16 o 17 o 18 o 19 o 20 o o o o Presence Fig. 7. Reference connection for ecient candidate retrieval and derivation test

16 Suppose object o 7 is deleted. Navigations from o 7 gives fo 7 ; o 4 ; o 3 g and fo 7 ; o 4 ; o 1 g. o 16 and o 19 are candidate objects in 'sscene since they refer fo 7 ; o 1 g and fo 7 ; o 3 g, respectively. Also, o 12 and o 11 are candidate objects in Presence since they refer o 16 and o 19, candidate objects in the super-key class 'sscene. o 16 and o 19 is deleted witho derivation test. o 12 and o 11 are not deleted from Presence since navigations from o 12 and o 11 in Presence give o 15 and o 18, respectively. Suppose object o 21 referencing o 4 and o 9 is inserted in class Scene. Navigations from o 21 gives fo 21 ; o 4 ; o 3 ; o 9 g and fo 21 ; o 4 ; o 1 ; o 9 g. First, o 22 referencing o 21 and o 3 and o 23 referencing o 21 and o 1 are inserted in class 'sscene. Since there exist object o 11 referencing o 3 and o 9 and object o 12 referencing o 1 and o 9, no object is inserted in class Presence. Retrievals of corresponding persons and locations in Fig.6 is performed in the same manner as in Fig.4 using class Presence. 7 Conclusion If objects derived from several paths of objects are materialized in object bases, elimination of duplicates is required in performing incremental updates of materialized derived classes as is required in incremental updates of materialized views produced by relational expressions that include projections. The elimination of duplicates complicates incremental updates. Roussopoulos[10] decided not to discuss projections in incremental maintenance of ViewCache. Also, Qian and Wiederhold[9] pointed o the diculty of the project operators for incremental recompation of views. In this paper, we have described the super-key condition that allows ecient maintenance of materialized derived classes. Duplicates can be eciently eliminated in performing incremental updates if object bases satisfy the super-key condition. We began by dening our model of object bases introducing class schemas, object graphs and functional dependencies de- ned on relations of connected objects. Class schemas always keep the condition of consistencies if we perform Procedure 8 that incrementally updates materialized derived classes after every update. Derivation test in Procedure 8, which requires to obtain inst(p 0 ) for every candidate object in some cases, is omitted or performed as single-step retrievals if class schemas satisfy the super-key condition and contain super-key classes. Finally, we presented a procedure that transforms class schemas to satisfy the super-key condition. Although it might be possible to dene derived set-value objects and derived basic-value objects, only tuple-value objects are dened as materialized derived objects to simplify our discussion. The idea of the paper can be applied to derived set-value and derived basic-value objects with small modications. It calls for further discussion of ISA relationships. Implementations of ISA relationships may aect eciencies of updates of materialized derived classes in object bases. For example, objects of superclasses may have to be retrieved from their subclasses in candidate retrieval and derivation test. Implementation related issues include directions of reference relationships, available access paths, e.g., pointers,

17 indices, and hashings. Object migrations in ISA hierarchies inuence consistencies of object bases. Object migrations can be treated as insertions and deletions of objects if we leave the problem of object identiers. References 1. S. Abiteboul and A. Bonner, Objects and Views, Proc. ACM SIGMOD Int. Conf. Management of Data, pp.238{247, J. A. Blakeley, N. Coburn and P. Larson, Updating Derived Relations: Detecting Irrelevant and Aonomously Compable Updates, ACM Trans. Database Syst., Vol.14, No.3, pp.369{400, F. Bancilhon and N. Spyratos, Update Semantics of Relational Views, ACM Trans. Database Syst., Vol.6, No.4, pp.557{575, Dec T. Barsalou and N. Siambela, Updating Relational Databases through Object-Based Views, Proc. ACM SIGMOD Int. Conf. Management of Data, pp.248{257, A. Kemper, C. Kilger and G. Moerkotte, Function Materialization in Object Bases, Proc. ACM SIGMOD Int. Conf. Management of Data, pp.258{267, S. Konomi and T. Furukawa, Updating Duplicate Values in Distribed Multidatabase Systems, Proc. IEEE 1st Int. Workshop on Interoperability in Multidatabase Syst., pp.243{246, Apr R. Langerak, View Updates in Relational Databases with an Independent Scheme, ACM Trans. Database Syst., Vol.15, No.1, pp.40{66, Mar C. Lecluse, P. Richard and F. Velez, O 2, an Object-Oriented Data Model, Proc. ACM SIGMOD Int. Conf. Management of Data, pp.424{433, X. Qian and G. Wiederhold, Incremental Recompation of Active Relational Expressions, IEEE Trans. Knowledge and Data Eng., Vol.3, No.3, pp.337{341, N. Roussopoulos, An Incremental Access Method for ViewCache: Concept, Algorithms and Cost Analysis, ACM Trans. Database Syst., Vol.16, No.3, pp.535{563, P. Shoval, One-to-One Dependencies in Database Design, IEEE Trans. Knowledge and Data Eng., Vol.3, No.3, pp.371{379, J. Srivastava and D. Rotem, Analytical Modeling of Materialized View Maintenance, Proc. ACM Symp. on Principles of Database Syst., pp. 126{134, G. E. Weddell, Reasoning abo Functional Dependencies Generalized for Semantic Data Models, ACM Trans. Database Syst., Vol.17, No.1, pp.32{64, Mar This article was processed using the LaT E X macro package with LLNCS style

. The problem: ynamic ata Warehouse esign Ws are dynamic entities that evolve continuously over time. As time passes, new queries need to be answered

. The problem: ynamic ata Warehouse esign Ws are dynamic entities that evolve continuously over time. As time passes, new queries need to be answered ynamic ata Warehouse esign? imitri Theodoratos Timos Sellis epartment of Electrical and Computer Engineering Computer Science ivision National Technical University of Athens Zographou 57 73, Athens, Greece

More information

8ns. 8ns. 16ns. 10ns COUT S3 COUT S3 A3 B3 A2 B2 A1 B1 B0 2 B0 CIN CIN COUT S3 A3 B3 A2 B2 A1 B1 A0 B0 CIN S0 S1 S2 S3 COUT CIN 2 A0 B0 A2 _ A1 B1

8ns. 8ns. 16ns. 10ns COUT S3 COUT S3 A3 B3 A2 B2 A1 B1 B0 2 B0 CIN CIN COUT S3 A3 B3 A2 B2 A1 B1 A0 B0 CIN S0 S1 S2 S3 COUT CIN 2 A0 B0 A2 _ A1 B1 Delay Abstraction in Combinational Logic Circuits Noriya Kobayashi Sharad Malik C&C Research Laboratories Department of Electrical Engineering NEC Corp. Princeton University Miyamae-ku, Kawasaki Japan

More information

Heap-on-Top Priority Queues. March Abstract. We introduce the heap-on-top (hot) priority queue data structure that combines the

Heap-on-Top Priority Queues. March Abstract. We introduce the heap-on-top (hot) priority queue data structure that combines the Heap-on-Top Priority Queues Boris V. Cherkassky Central Economics and Mathematics Institute Krasikova St. 32 117418, Moscow, Russia cher@cemi.msk.su Andrew V. Goldberg NEC Research Institute 4 Independence

More information

Index Generation and Advanced Search Functions for. Muitimedia Presentation Material. Yahiko Kambayashi 3 Kaoru Katayama 3 Yasuhiro Kamiya 3

Index Generation and Advanced Search Functions for. Muitimedia Presentation Material. Yahiko Kambayashi 3 Kaoru Katayama 3 Yasuhiro Kamiya 3 Index Generation and Advanced Search Functions for Muitimedia Presentation Material Yahiko Kambayashi 3 Kaoru Katayama 3 Yasuhiro Kamiya 3 Osami Kagawa 33 3 Department of Information Science, Kyoto University

More information

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD CAR-TR-728 CS-TR-3326 UMIACS-TR-94-92 Samir Khuller Department of Computer Science Institute for Advanced Computer Studies University of Maryland College Park, MD 20742-3255 Localization in Graphs Azriel

More information

Server DBMS M Server DBMS 2. Application Program. Electric Gene Dictionary Sequence. Interface Process. Local DBMS N. Application Program

Server DBMS M Server DBMS 2. Application Program. Electric Gene Dictionary Sequence. Interface Process. Local DBMS N. Application Program 100 Proc. of FGCS '94, ICOT, Tokyo, December 1994 Parallel Database Management System: Kappa Moto KAWAMURA, and Toru KAWAMURA Institute for New Generation Computer Technology (ICOT) 21F. Mita-Kokusai Bldg.,

More information

A New Theory of Deadlock-Free Adaptive Multicast Routing in. Wormhole Networks. J. Duato. Facultad de Informatica. Universidad Politecnica de Valencia

A New Theory of Deadlock-Free Adaptive Multicast Routing in. Wormhole Networks. J. Duato. Facultad de Informatica. Universidad Politecnica de Valencia A New Theory of Deadlock-Free Adaptive Multicast Routing in Wormhole Networks J. Duato Facultad de Informatica Universidad Politecnica de Valencia P.O.B. 22012, 46071 - Valencia, SPAIN E-mail: jduato@aii.upv.es

More information

Select (SumSal > Budget) Join (DName) E4: Aggregate (SUM Salary by DName) Emp. Select (SumSal > Budget) Aggregate (SUM Salary by DName, Budget)

Select (SumSal > Budget) Join (DName) E4: Aggregate (SUM Salary by DName) Emp. Select (SumSal > Budget) Aggregate (SUM Salary by DName, Budget) ACM SIGMOD Conference, June 1996, pp.447{458 Materialized View Maintenance and Integrity Constraint Checking: Trading Space for Time Kenneth A. Ross Columbia University kar@cs.columbia.edu Divesh Srivastava

More information

This is the Pre-Published Version

This is the Pre-Published Version This is the Pre-Published Version Path Dictionary: A New Approach to Query Processing in Object-Oriented Databases Wang-chien Lee Dept of Computer and Information Science The Ohio State University Columbus,

More information

X(1) X. X(k) DFF PI1 FF PI2 PI3 PI1 FF PI2 PI3

X(1) X. X(k) DFF PI1 FF PI2 PI3 PI1 FF PI2 PI3 Partial Scan Design Methods Based on Internally Balanced Structure Tomoya TAKASAKI Tomoo INOUE Hideo FUJIWARA Graduate School of Information Science, Nara Institute of Science and Technology 8916-5 Takayama-cho,

More information

Role Modelling: the ASSO Perspective

Role Modelling: the ASSO Perspective Role Modelling: the ASSO Perspective Donatella Castelli, Elvira Locuratolo Istituto di Elaborazione dell'informazione Consiglio Nazionale delle Ricerche Via S. Maria, 46 Pisa, Italy e-mail: castelli@iei.pi.cnr.it,

More information

A Nim game played on graphs II

A Nim game played on graphs II Theoretical Computer Science 304 (2003) 401 419 www.elsevier.com/locate/tcs A Nim game played on graphs II Masahiko Fukuyama Graduate School of Mathematical Sciences, University of Tokyo, 3-8-1 Komaba,

More information

Graph Definitions. In a directed graph the edges have directions (ordered pairs). A weighted graph includes a weight function.

Graph Definitions. In a directed graph the edges have directions (ordered pairs). A weighted graph includes a weight function. Graph Definitions Definition 1. (V,E) where An undirected graph G is a pair V is the set of vertices, E V 2 is the set of edges (unordered pairs) E = {(u, v) u, v V }. In a directed graph the edges have

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

Ecient Implementation of Sorting Algorithms on Asynchronous Distributed-Memory Machines

Ecient Implementation of Sorting Algorithms on Asynchronous Distributed-Memory Machines Ecient Implementation of Sorting Algorithms on Asynchronous Distributed-Memory Machines Zhou B. B., Brent R. P. and Tridgell A. y Computer Sciences Laboratory The Australian National University Canberra,

More information

(a) (b) Figure 1: Bipartite digraph (a) and solution to its edge-connectivity incrementation problem (b). A directed line represents an edge that has

(a) (b) Figure 1: Bipartite digraph (a) and solution to its edge-connectivity incrementation problem (b). A directed line represents an edge that has Incrementing Bipartite Digraph Edge-connectivity Harold N. Gabow Tibor Jordan y Abstract This paper solves the problem of increasing the edge-connectivity of a bipartite digraph by adding the smallest

More information

Checking: Trading Space for Time. Divesh Srivastava. AT&T Research. 10]). Given a materialized view dened using database

Checking: Trading Space for Time. Divesh Srivastava. AT&T Research. 10]). Given a materialized view dened using database Materialized View Maintenance and Integrity Constraint Checking: Trading Space for Time Kenneth A. Ross Columbia University kar@cs.columbia.edu Divesh Srivastava AT&T Research divesh@research.att.com S.

More information

Updates through Views

Updates through Views 1 of 6 15 giu 2010 00:16 Encyclopedia of Database Systems Springer Science+Business Media, LLC 2009 10.1007/978-0-387-39940-9_847 LING LIU and M. TAMER ÖZSU Updates through Views Yannis Velegrakis 1 (1)

More information

Y. Han* B. Narahari** H-A. Choi** University of Kentucky. The George Washington University

Y. Han* B. Narahari** H-A. Choi** University of Kentucky. The George Washington University Mapping a Chain Task to Chained Processors Y. Han* B. Narahari** H-A. Choi** *Department of Computer Science University of Kentucky Lexington, KY 40506 **Department of Electrical Engineering and Computer

More information

An Optimal Locking Scheme in Object-Oriented Database Systems

An Optimal Locking Scheme in Object-Oriented Database Systems An Optimal Locking Scheme in Object-Oriented Database Systems Woochun Jun Le Gruenwald Dept. of Computer Education School of Computer Science Seoul National Univ. of Education Univ. of Oklahoma Seoul,

More information

N. Hitschfeld. Blanco Encalada 2120, Santiago, CHILE.

N. Hitschfeld. Blanco Encalada 2120, Santiago, CHILE. Generalization of modied octrees for geometric modeling N. Hitschfeld Dpto. Ciencias de la Computacion, Univ. de Chile Blanco Encalada 2120, Santiago, CHILE E-mail: nancy@dcc.uchile.cl Abstract. This paper

More information

Constraint Objects. Abstract. We describe the Constraint Object Data Model (CODM),

Constraint Objects. Abstract. We describe the Constraint Object Data Model (CODM), Constraint Objects Divesh Srivastava 1, Raghu Ramakrishnan 2, Peter Z. Revesz 3 1 AT&T Bell Laboratories, Murray Hill, NJ 07974, USA 2 University of Wisconsin, Madison, WI 53706, USA 3 University of Nebraska,

More information

Handling Multiple Instances of Symbols in. Pictorial Queries by Image Similarity

Handling Multiple Instances of Symbols in. Pictorial Queries by Image Similarity Handling Multiple Instances of Symbols in Pictorial Queries by Image Similarity Aya Soer 1 and Hanan Samet 1 CESDIS, Goddard Space Flight Center and Center for Automation Research, University of Maryland

More information

Wrapper 2 Wrapper 3. Information Source 2

Wrapper 2 Wrapper 3. Information Source 2 Integration of Semistructured Data Using Outer Joins Koichi Munakata Industrial Electronics & Systems Laboratory Mitsubishi Electric Corporation 8-1-1, Tsukaguchi Hon-machi, Amagasaki, Hyogo, 661, Japan

More information

Notes. These slides are based on slide sets provided by M. T. Öszu and by R. Ramakrishnan and J. Gehrke. CS 640 Views Winter / 15.

Notes. These slides are based on slide sets provided by M. T. Öszu and by R. Ramakrishnan and J. Gehrke. CS 640 Views Winter / 15. Views and View Management Olaf Hartig David R. Cheriton School of Computer Science University of Waterloo CS 640 Principles of Database Management and Use Winter 2013 These slides are based on slide sets

More information

Statement-Level Communication-Free. Partitioning Techniques for. National Central University. Chung-Li 32054, Taiwan

Statement-Level Communication-Free. Partitioning Techniques for. National Central University. Chung-Li 32054, Taiwan Appeared in the Ninth Worshop on Languages and Compilers for Parallel Comping, San Jose, CA, Aug. 8-0, 996. Statement-Level Communication-Free Partitioning Techniques for Parallelizing Compilers Kuei-Ping

More information

to link primary and multiple secondary sources. from other wrappers and mediators with its common several problems in these systems:

to link primary and multiple secondary sources. from other wrappers and mediators with its common several problems in these systems: 1 PAPER Special Issue for Advanced Database Specic Features of the QUIK Mediator System Bojiang LIU y, Member, Kazumasa YOKOTA yy, and Nobutaka OGATA yy, Nonmembers SUMMARY For advanced data-oriented applications

More information

A Mixed Fragmentation Methodology For. Initial Distributed Database Design. Shamkant B. Navathe. Georgia Institute of Technology.

A Mixed Fragmentation Methodology For. Initial Distributed Database Design. Shamkant B. Navathe. Georgia Institute of Technology. A Mixed Fragmentation Methodology For Initial Distributed Database Design Shamkant B. Navathe Georgia Institute of Technology Kamalakar Karlapalem Hong Kong University of Science and Technology Minyoung

More information

Distributed Recovery with K-Optimistic Logging. Yi-Min Wang Om P. Damani Vijay K. Garg

Distributed Recovery with K-Optimistic Logging. Yi-Min Wang Om P. Damani Vijay K. Garg Distributed Recovery with K-Optimistic Logging Yi-Min Wang Om P. Damani Vijay K. Garg Abstract Fault-tolerance techniques based on checkpointing and message logging have been increasingly used in real-world

More information

of m clauses, each containing the disjunction of boolean variables from a nite set V = fv 1 ; : : : ; vng of size n [8]. Each variable occurrence with

of m clauses, each containing the disjunction of boolean variables from a nite set V = fv 1 ; : : : ; vng of size n [8]. Each variable occurrence with A Hybridised 3-SAT Algorithm Andrew Slater Automated Reasoning Project, Computer Sciences Laboratory, RSISE, Australian National University, 0200, Canberra Andrew.Slater@anu.edu.au April 9, 1999 1 Introduction

More information

Proc. of the 1st Int. Wkshp on Image Databases and Multi Media Search, pp. 51{58, Handling Multiple Instances of Symbols in

Proc. of the 1st Int. Wkshp on Image Databases and Multi Media Search, pp. 51{58, Handling Multiple Instances of Symbols in Proc. of the 1st Int. Wkshp on Image Databases and Multi Media Search, pp. 1{8, Amsterdam, Aug. 1996. Handling Multiple Instances of Symbols in Pictorial Queries by Image Similarity Aya Soer 1 and Hanan

More information

SAMOS: an Active Object{Oriented Database System. Stella Gatziu, Klaus R. Dittrich. Database Technology Research Group

SAMOS: an Active Object{Oriented Database System. Stella Gatziu, Klaus R. Dittrich. Database Technology Research Group SAMOS: an Active Object{Oriented Database System Stella Gatziu, Klaus R. Dittrich Database Technology Research Group Institut fur Informatik, Universitat Zurich fgatziu, dittrichg@ifi.unizh.ch to appear

More information

Two Problems - Two Solutions: One System - ECLiPSe. Mark Wallace and Andre Veron. April 1993

Two Problems - Two Solutions: One System - ECLiPSe. Mark Wallace and Andre Veron. April 1993 Two Problems - Two Solutions: One System - ECLiPSe Mark Wallace and Andre Veron April 1993 1 Introduction The constraint logic programming system ECL i PS e [4] is the successor to the CHIP system [1].

More information

detected inference channel is eliminated by redesigning the database schema [Lunt, 1989] or upgrading the paths that lead to the inference [Stickel, 1

detected inference channel is eliminated by redesigning the database schema [Lunt, 1989] or upgrading the paths that lead to the inference [Stickel, 1 THE DESIGN AND IMPLEMENTATION OF A DATA LEVEL DATABASE INFERENCE DETECTION SYSTEM Raymond W. Yip and Karl N. Levitt Abstract: Inference is a way tosubvert access control mechanisms of database systems.

More information

Introduction to Relational Databases. Introduction to Relational Databases cont: Introduction to Relational Databases cont: Relational Data structure

Introduction to Relational Databases. Introduction to Relational Databases cont: Introduction to Relational Databases cont: Relational Data structure Databases databases Terminology of relational model Properties of database relations. Relational Keys. Meaning of entity integrity and referential integrity. Purpose and advantages of views. The relational

More information

Chapter 4. The Relational Model

Chapter 4. The Relational Model Chapter 4 The Relational Model Chapter 4 - Objectives Terminology of relational model. How tables are used to represent data. Connection between mathematical relations and relations in the relational model.

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

A fully dynamic algorithm for modular decomposition and recognition of cographs

A fully dynamic algorithm for modular decomposition and recognition of cographs Discrete Applied Mathematics 136 (2004) 329 340 www.elsevier.com/locate/dam A fully dynamic algorithm for modular decomposition and recognition of cographs Ron Shamir a, Roded Sharan b; a School of Computer

More information

source3 Backbone s1 s2 R2 R3

source3 Backbone s1 s2 R2 R3 Fast and Optimal Multicast-Server Selection Based on Receivers' Preference Akihito Hiromori 1, Hirozumi Yamaguchi 1,Keiichi Yasumoto 2, Teruo Higashino 1, and Kenichi Taniguchi 1 1 Graduate School of Engineering

More information

Ecient Implementation of Sorting Algorithms on Asynchronous Distributed-Memory Machines

Ecient Implementation of Sorting Algorithms on Asynchronous Distributed-Memory Machines Ecient Implementation of Sorting Algorithms on Asynchronous Distributed-Memory Machines B. B. Zhou, R. P. Brent and A. Tridgell Computer Sciences Laboratory The Australian National University Canberra,

More information

Department DeptId : N Dname : S Proj. Vehicle VId : N Manufacturer Color : S Model : S

Department DeptId : N Dname : S Proj. Vehicle VId : N Manufacturer Color : S Model : S Horizontal Class Partitioning in Object-Oriented Databases? Ladjel Bellatreche 1 and Kamalakar Karlapalem 1 and Ana Simonet 2 1 University of Science and Technology Department of Computer Science Clear

More information

A New Theory of Deadlock-Free Adaptive. Routing in Wormhole Networks. Jose Duato. Abstract

A New Theory of Deadlock-Free Adaptive. Routing in Wormhole Networks. Jose Duato. Abstract A New Theory of Deadlock-Free Adaptive Routing in Wormhole Networks Jose Duato Abstract Second generation multicomputers use wormhole routing, allowing a very low channel set-up time and drastically reducing

More information

Dominating Sets in Planar Graphs 1

Dominating Sets in Planar Graphs 1 Dominating Sets in Planar Graphs 1 Lesley R. Matheson 2 Robert E. Tarjan 2; May, 1994 Abstract Motivated by an application to unstructured multigrid calculations, we consider the problem of asymptotically

More information

Department of Computer Science. a vertex can communicate with a particular neighbor. succeeds if it shares no edge with other calls during

Department of Computer Science. a vertex can communicate with a particular neighbor. succeeds if it shares no edge with other calls during Sparse Hypercube A Minimal k-line Broadcast Graph Satoshi Fujita Department of Electrical Engineering Hiroshima University Email: fujita@se.hiroshima-u.ac.jp Arthur M. Farley Department of Computer Science

More information

would be included in is small: to be exact. Thus with probability1, the same partition n+1 n+1 would be produced regardless of whether p is in the inp

would be included in is small: to be exact. Thus with probability1, the same partition n+1 n+1 would be produced regardless of whether p is in the inp 1 Introduction 1.1 Parallel Randomized Algorihtms Using Sampling A fundamental strategy used in designing ecient algorithms is divide-and-conquer, where that input data is partitioned into several subproblems

More information

THE FREUDENTHAL-HOPF THEOREM

THE FREUDENTHAL-HOPF THEOREM THE FREUDENTHAL-HOPF THEOREM SOFI GJING JOVANOVSKA Abstract. In this paper, we will examine a geometric property of groups: the number of ends of a group. Intuitively, the number of ends of a group is

More information

Relational Model and Relational Algebra. Rose-Hulman Institute of Technology Curt Clifton

Relational Model and Relational Algebra. Rose-Hulman Institute of Technology Curt Clifton Relational Model and Relational Algebra Rose-Hulman Institute of Technology Curt Clifton Administrative Notes Grading Weights Schedule Updated Review ER Design Techniques Avoid redundancy and don t duplicate

More information

(a) (b) (c) Phase1. Phase2. Assignm ent offfs to scan-paths. Phase3. Determination of. connection-order offfs. Phase4. Im provem entby exchanging FFs

(a) (b) (c) Phase1. Phase2. Assignm ent offfs to scan-paths. Phase3. Determination of. connection-order offfs. Phase4. Im provem entby exchanging FFs Scan-chain Optimization lgorithms for Multiple Scan-paths Susumu Kobayashi Masato Edahiro Mikio Kubo C&C Media Research Laboratories NEC Corporation Kawasaki, Japan Logistics and Information Engineering

More information

to automatically generate parallel code for many applications that periodically update shared data structures using commuting operations and/or manipu

to automatically generate parallel code for many applications that periodically update shared data structures using commuting operations and/or manipu Semantic Foundations of Commutativity Analysis Martin C. Rinard y and Pedro C. Diniz z Department of Computer Science University of California, Santa Barbara Santa Barbara, CA 93106 fmartin,pedrog@cs.ucsb.edu

More information

Mining N-most Interesting Itemsets. Ada Wai-chee Fu Renfrew Wang-wai Kwong Jian Tang. fadafu,

Mining N-most Interesting Itemsets. Ada Wai-chee Fu Renfrew Wang-wai Kwong Jian Tang. fadafu, Mining N-most Interesting Itemsets Ada Wai-chee Fu Renfrew Wang-wai Kwong Jian Tang Department of Computer Science and Engineering The Chinese University of Hong Kong, Hong Kong fadafu, wwkwongg@cse.cuhk.edu.hk

More information

Trees with many leaves

Trees with many leaves Trees with many leaves N. V. Gravin Abstract In this note we consider the problem of nding a spanning tree with large number of leaves. We overview some known facts about this question. In details We consider

More information

Image-Based Memory of Environment. homing uses a similar idea that the agent memorizes. [Hong 91]. However, the agent nds diculties in arranging its

Image-Based Memory of Environment. homing uses a similar idea that the agent memorizes. [Hong 91]. However, the agent nds diculties in arranging its Image-Based Memory of Environment Hiroshi ISHIGURO Department of Information Science Kyoto University Kyoto 606-01, Japan E-mail: ishiguro@kuis.kyoto-u.ac.jp Saburo TSUJI Faculty of Systems Engineering

More information

2 Data Reduction Techniques The granularity of reducible information is one of the main criteria for classifying the reduction techniques. While the t

2 Data Reduction Techniques The granularity of reducible information is one of the main criteria for classifying the reduction techniques. While the t Data Reduction - an Adaptation Technique for Mobile Environments A. Heuer, A. Lubinski Computer Science Dept., University of Rostock, Germany Keywords. Reduction. Mobile Database Systems, Data Abstract.

More information

where is a constant, 0 < <. In other words, the ratio between the shortest and longest paths from a node to a leaf is at least. An BB-tree allows ecie

where is a constant, 0 < <. In other words, the ratio between the shortest and longest paths from a node to a leaf is at least. An BB-tree allows ecie Maintaining -balanced Trees by Partial Rebuilding Arne Andersson Department of Computer Science Lund University Box 8 S-22 00 Lund Sweden Abstract The balance criterion dening the class of -balanced trees

More information

Optimum Alphabetic Binary Trees T. C. Hu and J. D. Morgenthaler Department of Computer Science and Engineering, School of Engineering, University of C

Optimum Alphabetic Binary Trees T. C. Hu and J. D. Morgenthaler Department of Computer Science and Engineering, School of Engineering, University of C Optimum Alphabetic Binary Trees T. C. Hu and J. D. Morgenthaler Department of Computer Science and Engineering, School of Engineering, University of California, San Diego CA 92093{0114, USA Abstract. We

More information

A Combined BIT and TIMESTAMP Algorithm for. the List Update Problem. Susanne Albers, Bernhard von Stengel, Ralph Werchner

A Combined BIT and TIMESTAMP Algorithm for. the List Update Problem. Susanne Albers, Bernhard von Stengel, Ralph Werchner A Combined BIT and TIMESTAMP Algorithm for the List Update Problem Susanne Albers, Bernhard von Stengel, Ralph Werchner International Computer Science Institute, 1947 Center Street, Berkeley, CA 94704,

More information

The Complexity of Approximating PSPACE-Complete Problems. Madhav V. Marathe Harry B. Hunt III S.S. Ravi

The Complexity of Approximating PSPACE-Complete Problems. Madhav V. Marathe Harry B. Hunt III S.S. Ravi The Complexity of Approximating PSPACE-Complete Problems for Hierarchical Specications ;2;3 Madhav V. Marathe Harry B. Hunt III S.S. Ravi Department of Computer Science University at Albany - State University

More information

1 Introduction The concept of graph spanners has been studied in several recent papers in the context of communication networks, distributed computing

1 Introduction The concept of graph spanners has been studied in several recent papers in the context of communication networks, distributed computing On the Hardness of Approximating Spanners Guy Kortsarz June 1, 1999 Abstract A k spanner of a connected graph G = (V; E) is a subgraph G 0 consisting of all the vertices of V and a subset of the edges,

More information

Company. Auto Company. Truck. Company

Company. Auto Company. Truck. Company Pergamon Information Systems Vol. 22, No. 4, pp. 199{221, 1997 Copyright c 1997 Elsevier Science Ltd Printed in Great Britain. All rights reserved 0306-4379/97 $15.00 + 0.00 A UNIFORM INDEXING SCHEME FOR

More information

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES S. SRINIVAS KUMAR *, R.BASAVARAJU ** * PG Scholar, Electronics and Communication Engineering, CRIT

More information

USE OF DATA REPRESENTATION MAPPING IN AUTOMATIC GENERATION OF DATA BASE ACCESS PROCEDURES

USE OF DATA REPRESENTATION MAPPING IN AUTOMATIC GENERATION OF DATA BASE ACCESS PROCEDURES USE OF DATA REPRESENTATION MAPPING IN AUTOMATIC GENERATION OF DATA BASE ACCESS PROCEDURES Koichi Furukawa Information Systems Section Computer Science Division Electrotechnical Laboratory Ibaraki, Japan

More information

A Class Hierarchy Concurrency Control Technique in Object-Oriented Database Systems

A Class Hierarchy Concurrency Control Technique in Object-Oriented Database Systems A Class Hierarchy Concurrency Control Technique in Object-Oriented Database Systems Woochun Jun and Le Gruenwald Dept. of Computer Science Univ. of Oklahoma Norman, OK 73072 gruenwal@cs.ou.edu Abstract

More information

Copyright (C) 1997, 1998 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for

Copyright (C) 1997, 1998 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for Copyright (C) 1997, 1998 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided

More information

has phone Phone Person Person degree Degree isa isa has addr has addr has phone has phone major Degree Phone Schema S1 Phone Schema S2

has phone Phone Person Person degree Degree isa isa has addr has addr has phone has phone major Degree Phone Schema S1 Phone Schema S2 Schema Equivalence in Heterogeneous Systems: Bridging Theory and Practice R. J. Miller y Y. E. Ioannidis z R. Ramakrishnan x Department of Computer Sciences University of Wisconsin-Madison frmiller, yannis,

More information

To appear in: IEEE Transactions on Knowledge and Data Engineering. The Starburst Active Database Rule System. Jennifer Widom. Stanford University

To appear in: IEEE Transactions on Knowledge and Data Engineering. The Starburst Active Database Rule System. Jennifer Widom. Stanford University To appear in: IEEE Transactions on Knowledge and Data Engineering The Starburst Active Database Rule System Jennifer Widom Department of Computer Science Stanford University Stanford, CA 94305-2140 widom@cs.stanford.edu

More information

THE IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM SUPPORTING THE PARALLEL WORLD MODEL. Jun Sun, Yasushi Shinjo and Kozo Itano

THE IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM SUPPORTING THE PARALLEL WORLD MODEL. Jun Sun, Yasushi Shinjo and Kozo Itano THE IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM SUPPORTING THE PARALLEL WORLD MODEL Jun Sun, Yasushi Shinjo and Kozo Itano Institute of Information Sciences and Electronics University of Tsukuba Tsukuba,

More information

Transport protocols are of practical. login, le transfer, and remote procedure. calls. will operate on and therefore are generally

Transport protocols are of practical. login, le transfer, and remote procedure. calls. will operate on and therefore are generally Hazard-Free Connection Release Jennifer E. Walter Department of Computer Science Texas A&M University College Station, TX 77843-3112, U.S.A. Jennifer L. Welch Department of Computer Science Texas A&M University

More information

Availability of Coding Based Replication Schemes. Gagan Agrawal. University of Maryland. College Park, MD 20742

Availability of Coding Based Replication Schemes. Gagan Agrawal. University of Maryland. College Park, MD 20742 Availability of Coding Based Replication Schemes Gagan Agrawal Department of Computer Science University of Maryland College Park, MD 20742 Abstract Data is often replicated in distributed systems to improve

More information

contribution of this paper is to demonstrate that rule orderings can also improve eciency by reducing the number of rule applications. In eect, since

contribution of this paper is to demonstrate that rule orderings can also improve eciency by reducing the number of rule applications. In eect, since Rule Ordering in Bottom-Up Fixpoint Evaluation of Logic Programs Raghu Ramakrishnan Divesh Srivastava S. Sudarshan y Computer Sciences Department, University of Wisconsin-Madison, WI 53706, U.S.A. Abstract

More information

Assign auniquecodeto each state to produce a. Given jsj states, needed at least dlog jsje state bits. (minimum width encoding), at most jsj state bits

Assign auniquecodeto each state to produce a. Given jsj states, needed at least dlog jsje state bits. (minimum width encoding), at most jsj state bits State Assignment The problem: Assign auniquecodeto each state to produce a logic level description. Given jsj states, needed at least dlog jsje state bits (minimum width encoding), at most jsj state bits

More information

Restricted Delivery Problems on a Network. December 17, Abstract

Restricted Delivery Problems on a Network. December 17, Abstract Restricted Delivery Problems on a Network Esther M. Arkin y, Refael Hassin z and Limor Klein x December 17, 1996 Abstract We consider a delivery problem on a network one is given a network in which nodes

More information

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems On Object Orientation as a Paradigm for General Purpose Distributed Operating Systems Vinny Cahill, Sean Baker, Brendan Tangney, Chris Horn and Neville Harris Distributed Systems Group, Dept. of Computer

More information

Real-Time Scalability of Nested Spin Locks. Hiroaki Takada and Ken Sakamura. Faculty of Science, University of Tokyo

Real-Time Scalability of Nested Spin Locks. Hiroaki Takada and Ken Sakamura. Faculty of Science, University of Tokyo Real-Time Scalability of Nested Spin Locks Hiroaki Takada and Ken Sakamura Department of Information Science, Faculty of Science, University of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo 113, Japan Abstract

More information

reasonable to store in a software implementation, it is likely to be a signicant burden in a low-cost hardware implementation. We describe in this pap

reasonable to store in a software implementation, it is likely to be a signicant burden in a low-cost hardware implementation. We describe in this pap Storage-Ecient Finite Field Basis Conversion Burton S. Kaliski Jr. 1 and Yiqun Lisa Yin 2 RSA Laboratories 1 20 Crosby Drive, Bedford, MA 01730. burt@rsa.com 2 2955 Campus Drive, San Mateo, CA 94402. yiqun@rsa.com

More information

Computer Graphics Forum (special issue on Eurographics 92), II(3), pp , Sept

Computer Graphics Forum (special issue on Eurographics 92), II(3), pp , Sept Computer Graphics Forum (special issue on Eurographics 9), II(), pp. 79-88, Sept. 99. Accurate Image Generation and Interactive Image Editing with the A-buer Wing Hung Lau and Neil Wiseman Computer Laboratory,

More information

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department CS473-Algorithms I Lecture 3-A Graphs Graphs A directed graph (or digraph) G is a pair (V, E), where V is a finite set, and E is a binary relation on V The set V: Vertex set of G The set E: Edge set of

More information

Optimistic Message Logging for Independent Checkpointing. in Message-Passing Systems. Yi-Min Wang and W. Kent Fuchs. Coordinated Science Laboratory

Optimistic Message Logging for Independent Checkpointing. in Message-Passing Systems. Yi-Min Wang and W. Kent Fuchs. Coordinated Science Laboratory Optimistic Message Logging for Independent Checkpointing in Message-Passing Systems Yi-Min Wang and W. Kent Fuchs Coordinated Science Laboratory University of Illinois at Urbana-Champaign Abstract Message-passing

More information

Novel low-overhead roll-forward recovery scheme for distributed systems

Novel low-overhead roll-forward recovery scheme for distributed systems Novel low-overhead roll-forward recovery scheme for distributed systems B. Gupta, S. Rahimi and Z. Liu Abstract: An efficient roll-forward checkpointing/recovery scheme for distributed systems has been

More information

Abstract. Programs written in languages of the Oberon family usually. contain runtime tests on the dynamic type of variables.

Abstract. Programs written in languages of the Oberon family usually. contain runtime tests on the dynamic type of variables. Type Test Elimination using Typeow Analysis Diane Corney and John Gough Queensland University of Technology, Brisbane, Australia Abstract. Programs written in languages of the Oberon family usually contain

More information

A Linear Time Algorithm for the Minimum Spanning Tree Problem. on a Planar Graph. Tomomi MATSUI. (January 1994 )

A Linear Time Algorithm for the Minimum Spanning Tree Problem. on a Planar Graph. Tomomi MATSUI. (January 1994 ) A Linear Time Algorithm for the Minimum Spanning Tree Problem on a Planar Graph Tomomi MATSUI (January 994 ) Department of Mathematical Engineering and Information Physics Faculty of Engineering, University

More information

Formalization of OODB Models. Gottfried Vossen. Institut fur Wirtschaftsinformatik, Universitat Munster. Grevenerstrae 91, Munster. dom.

Formalization of OODB Models. Gottfried Vossen. Institut fur Wirtschaftsinformatik, Universitat Munster. Grevenerstrae 91, Munster. dom. Formalization of OODB Models Gottfried Vossen Institut fur Wirtschaftsinformatik, Universitat Munster Grevenerstrae 91, 48159 Munster 1 Introduction Object-oriented data models represent a current endpoint

More information

DSC: Scheduling Parallel Tasks on an Unbounded Number of. Processors 3. Tao Yang and Apostolos Gerasoulis. Department of Computer Science

DSC: Scheduling Parallel Tasks on an Unbounded Number of. Processors 3. Tao Yang and Apostolos Gerasoulis. Department of Computer Science DSC: Scheduling Parallel Tasks on an Unbounded Number of Processors 3 Tao Yang and Apostolos Gerasoulis Department of Computer Science Rutgers University New Brunswick, NJ 08903 Email: ftyang, gerasoulisg@cs.rutgers.edu

More information

A Note on Alternating Cycles in Edge-coloured. Graphs. Anders Yeo. Department of Mathematics and Computer Science. Odense University, Denmark

A Note on Alternating Cycles in Edge-coloured. Graphs. Anders Yeo. Department of Mathematics and Computer Science. Odense University, Denmark A Note on Alternating Cycles in Edge-coloured Graphs Anders Yeo Department of Mathematics and Computer Science Odense University, Denmark March 19, 1996 Abstract Grossman and Haggkvist gave a characterisation

More information

Optimization of Queries in Distributed Database Management System

Optimization of Queries in Distributed Database Management System Optimization of Queries in Distributed Database Management System Bhagvant Institute of Technology, Muzaffarnagar Abstract The query optimizer is widely considered to be the most important component of

More information

Chapter 2: Entity-Relationship Model

Chapter 2: Entity-Relationship Model Chapter 2: Entity-Relationship Model! Entity Sets! Relationship Sets! Design Issues! Mapping Constraints! Keys! E-R Diagram! Extended E-R Features! Design of an E-R Database Schema! Reduction of an E-R

More information

Assignment 4. Overview. Prof. Stewart Weiss. CSci 335 Software Design and Analysis III Assignment 4

Assignment 4. Overview. Prof. Stewart Weiss. CSci 335 Software Design and Analysis III Assignment 4 Overview This assignment combines several dierent data abstractions and algorithms that we have covered in class, including priority queues, on-line disjoint set operations, hashing, and sorting. The project

More information

VERY large scale integration (VLSI) design for power

VERY large scale integration (VLSI) design for power IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 7, NO. 1, MARCH 1999 25 Short Papers Segmented Bus Design for Low-Power Systems J. Y. Chen, W. B. Jone, Member, IEEE, J. S. Wang,

More information

Henning Koch. Dept. of Computer Science. University of Darmstadt. Alexanderstr. 10. D Darmstadt. Germany. Keywords:

Henning Koch. Dept. of Computer Science. University of Darmstadt. Alexanderstr. 10. D Darmstadt. Germany. Keywords: Embedding Protocols for Scalable Replication Management 1 Henning Koch Dept. of Computer Science University of Darmstadt Alexanderstr. 10 D-64283 Darmstadt Germany koch@isa.informatik.th-darmstadt.de Keywords:

More information

In this paper we consider probabilistic algorithms for that task. Each processor is equipped with a perfect source of randomness, and the processor's

In this paper we consider probabilistic algorithms for that task. Each processor is equipped with a perfect source of randomness, and the processor's A lower bound on probabilistic algorithms for distributive ring coloring Moni Naor IBM Research Division Almaden Research Center San Jose, CA 9510 Abstract Suppose that n processors are arranged in a ring

More information

Query Optimization in Distributed Databases. Dilşat ABDULLAH

Query Optimization in Distributed Databases. Dilşat ABDULLAH Query Optimization in Distributed Databases Dilşat ABDULLAH 1302108 Department of Computer Engineering Middle East Technical University December 2003 ABSTRACT Query optimization refers to the process of

More information

On-Line Software Version Change Using State. Transfer Between Processes. Deepak Gupta. Pankaj Jalote. Department of Computer Science and Engineering

On-Line Software Version Change Using State. Transfer Between Processes. Deepak Gupta. Pankaj Jalote. Department of Computer Science and Engineering On-Line Software Version Change Using State Transfer Between Processes Deepak Gupta Pankaj Jalote Department of Computer Science and Engineering Indian Institute of Technology Kanpur - 208016 ; India Abstract

More information

Schemas for Integration and Translation of. Structured and Semi-Structured Data?

Schemas for Integration and Translation of. Structured and Semi-Structured Data? Schemas for Integration and Translation of Structured and Semi-Structured Data? Catriel Beeri 1 and Tova Milo 2 1 Hebrew University beeri@cs.huji.ac.il 2 Tel Aviv University milo@math.tau.ac.il 1 Introduction

More information

Databases -Normalization I. (GF Royle, N Spadaccini ) Databases - Normalization I 1 / 24

Databases -Normalization I. (GF Royle, N Spadaccini ) Databases - Normalization I 1 / 24 Databases -Normalization I (GF Royle, N Spadaccini 2006-2010) Databases - Normalization I 1 / 24 This lecture This lecture introduces normal forms, decomposition and normalization. We will explore problems

More information

Clock General Timed Automaton (Clock GTA) model. The Clock GTA. is based on the General Timed Automaton (GTA) of Lynch and Vaandrager.

Clock General Timed Automaton (Clock GTA) model. The Clock GTA. is based on the General Timed Automaton (GTA) of Lynch and Vaandrager. Revisiting the Paxos algorithm Roberto De Prisco?, Butler Lampson, Nancy Lynch MIT Laboratory for Computer Science 545 Technology Square NE43, Cambridge, MA 02139, USA. Abstract. This paper develops a

More information

Advanced Database Systems

Advanced Database Systems Lecture IV Query Processing Kyumars Sheykh Esmaili Basic Steps in Query Processing 2 Query Optimization Many equivalent execution plans Choosing the best one Based on Heuristics, Cost Will be discussed

More information

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 2.114

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 2.114 [Saranya, 4(3): March, 2015] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A SURVEY ON KEYWORD QUERY ROUTING IN DATABASES N.Saranya*, R.Rajeshkumar, S.Saranya

More information

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract An Ecient Approximation Algorithm for the File Redistribution Scheduling Problem in Fully Connected Networks Ravi Varadarajan Pedro I. Rivera-Vega y Abstract We consider the problem of transferring a set

More information

A.java class A f void f() f... g g - Java - - class file Compiler > B.class network class file A.class Java Virtual Machine Loa

A.java class A f void f() f... g g - Java - - class file Compiler > B.class network class file A.class Java Virtual Machine Loa A Type System for Object Initialization In the Java TM Bytecode Language Stephen N. Freund John C. Mitchell Department of Computer Science Stanford University Stanford, CA 94305-9045 ffreunds, mitchellg@cs.stanford.edu

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

This lecture. Databases -Normalization I. Repeating Data. Redundancy. This lecture introduces normal forms, decomposition and normalization.

This lecture. Databases -Normalization I. Repeating Data. Redundancy. This lecture introduces normal forms, decomposition and normalization. This lecture Databases -Normalization I This lecture introduces normal forms, decomposition and normalization (GF Royle 2006-8, N Spadaccini 2008) Databases - Normalization I 1 / 23 (GF Royle 2006-8, N

More information