Project-Join-Repair: An Approach to Consistent Query Answering Under Functional Dependencies

Size: px
Start display at page:

Download "Project-Join-Repair: An Approach to Consistent Query Answering Under Functional Dependencies"

Transcription

1 Project-Join-Repair: An Approach to Consistent Query Answering Under Functional Dependencies Jef Wijsen Université de Mons-Hainaut, Mons, Belgium, WWW home page: Abstract. Consistent query answering is the term commonly used for the problem of answering queries on databases that violate certain integrity constraints. We address this problem for universal relations that are inconsistent with respect to a set of functional dependencies. In order to obtain more meaningful repairs, we apply a project-join dependency prior to repairing by tuple deletion. A positive result is that the additional project-join can yield tractability of consistent query answering. 1 Motivation In the Internet age, data are ubiquitous and cannot be expected to be globally consistent. The database systems in which such data are stored and queried, should be capable of handling this inconsistency phenomenon. A way to deal with the problem is to rectify the database before proceeding to queries. Since there is usually no single best way to solve an inconsistency, we will generally end up with a set of possible database repairs. Such set of possible databases defines an incomplete database, a concept that has been studied for a long time [1]. When a query is asked on an incomplete database, the certain query answer is defined as the intersection of the answers to the query on every possible database. The motivation for intersecting query answers should be clear: although we do not know which database is the right one, we do know that it will (at least) return this certain answer. If the incomplete database is made up of repairs, the certain answer has also been called the consistent answer. Repairing with respect to functional and key dependencies is commonly done by tuple deletion (inserting new tuples will not take away the inconsistency anyway). In this article, we propose a novel approach, termed project-join-repair, for repairing a universal relation subject to a set of functional dependencies (fd s). We next motivate the approach by three examples. Example 1. The first row in the following relation states that on January 7, twenty units of product P1 have been shipped to customer C1 called A. Jones. The constraints are Cid CName (the same identifier cannot be used for different customers) and, since quantities are daily totals per product and client,

2 2 {Date, Pid, Cid} Qty. The first fd is violated, because C1 appears with two different names. We could repair this relation by deleting either the first or the second tuple. However, it may be more meaningful to assume that names are mistaken, and that A. Johnson should read A. Jones, or vice versa. I Date Pid Qty Cid CName 7 Jan P1 20 C1 A. Jones 8 Feb P2 15 C1 A. Johnson We propose a novel way to make the intended rectification. First, we apply the join dependency [{Date, Pid, Qty, Cid}, {Cid, CName}], that is, we take the join of the projections on {Date, Pid, Qty, Cid} and {Cid, CName}. This join dependency (jd) corresponds to a lossless-join decomposition in third normal form (3NF). The lossless-join property means that applying the jd will not insert new tuples into consistent relations. However, since one fd is violated in our example, the join contains two new tuples (followed by ). π Date,Pid,Qty,Cid (I) Date Pid Qty Cid 7 Jan P1 20 C1 8 Feb P2 15 C1 π Cid,CName (I) Cid C1 C1 CName A. Jones A. Johnson π Date,Pid,Qty,Cid (I) Date Pid Qty Cid CName 7 Jan P1 20 C1 A. Jones π Cid,CName (I) 8 Feb P2 15 C1 A. Johnson 7 Jan P1 20 C1 A. Johnson ( ) 8 Feb P2 15 C1 A. Jones ( ) Next, we take as repairs the maximal (under set inclusion) consistent subsets of the join relation. This gives us the two intended repairs: J 1 Date Pid Qty Cid CName 7 Jan P1 20 C1 A. Jones 8 Feb P2 15 C1 A. Jones J 2 Date Pid Qty Cid CName 8 Feb P2 15 C1 A. Johnson 7 Jan P1 20 C1 A. Johnson Example 2. The following relation I is subject to the functional dependencies Name {Birth, Sex, ZIP} and ZIP City. The latter fd is violated. I Name Birth Sex ZIP City Ed 1962 M 7000 Bergen Again, instead of deleting either tuple, it is reasonable to assume that Mons should be Bergen, or vice versa. 1 We can obtain this effect by first applying the jd [{Name, Birth, Sex, ZIP}, {ZIP, City}] and then repair by tuple deletion. Here are the two repairs that result from this project-join-repair scenario: J 1 Name Birth Sex ZIP City Ed 1962 M 7000 Mons J 2 Name Birth Sex ZIP City An 1964 F 7000 Bergen Ed 1962 M 7000 Bergen 1 Bergen is actually the Dutch name for the city of Mons situated in the French speaking part of Belgium.

3 3 Again, the intended rectifications have been made. Example 3. By varying the jd, we can fine-tune the effect of the repairing work. I Name Birth Sex ZIP City An 1952 F 8000 Namur In the above relation, both An s birth year and ZIP code are inconsistent. If we apply our project-join-repair approach relative to the join dependency [{Name, Birth, Sex, ZIP}, {ZIP, City}], then An s birth year 1964 will remain tied to ZIP code 7000, and 1952 to However, the join dependency [{Name, Birth, Sex}, {Name, ZIP}, {ZIP, City}] allows uncoupling birth years and ZIP codes. In this way, we find, among others, the following repair which combines An s birth date 1964 found in the first tuple with An s ZIP code 8000 found in the second tuple: J Name Birth Sex ZIP City An 1964 F 8000 Namur This way of repairing may be meaningful in a situation where the first row about An comes from a data source that is precise on birth dates, while the second row comes from a data source that is precise on ZIP codes. It is tempting to think that the effect of the project-join-repair approach could also be obtained by repairing the projections, instead of repairing the join relation. However, this is generally not true. The first tuple in the following relation means that An is living in Belgium, earns 10K, and pays 20% taxes. The constraints are Name Country, Name Income, and {Country, Income} Tax. The latter functional dependency expresses that the tax rate depends on the country and the income. The projections corresponding to the join dependency [{Name, Country}, {Name, Income}, {Country, Income, Tax}] are shown. I Name Country Income Tax An Belgium 10K 20% An France 12K 20% π Name,Country (I) Name Country An Belgium An France π Name,Income (I) Name Income An 10K An 12K π Country,Income,Tax (I) Country Income Tax Belgium 10K 20% France 12K 20% Now consider what happens when we repair the three components by tuple deletion. If we retain {Name : An, Country : Belgium} in the first component, and {Name : An, Income : 12K} in the second, then the joined tuple {Name : An, Country : Belgium, Income : 12K} does not match any tuple in the third component. That is, the join of the repaired components can be empty. On the other hand, the project-join-repair approach will first join the three (unrepaired) components, which in this case happens to yield the original relation I. The result of the join will then be repaired by tuple deletion. No repair will be empty.

4 4 The remainder of the article is organized as follows. Section 2 defines the query class of rooted rules. Section 3 defines the problem we are interested in, namely the complexity of consistent query answering under the project-joinrepair approach. Section 4 introduces acyclic sets of fd s and their properties. Section 5 presents the main result of the article, which is the tractability of consistent query answering under the project-join-repair approach in cases of practical interest. Section 6 contains a comparison with related work. 2 Rooted Rules We will assume a single universal relation, which will be subject to decompositions. Definition 1. We assume a set of variables disjoint from a set of constants. A symbol is either a constant or a variable. A relation schema is a sequence A 1, A 2,..., A n of distinct attributes. The definitions to follow are relative to this relation schema. For tuples and relations, we will use both the named and unnamed perspective [2], whichever is most convenient in the technical treatment. Under the unnamed perspective, a tuple is a sequence s 1,..., s n of symbols. If each s i is a constant, then the tuple is called ground. Under the named perspective, this tuple is encoded by the mapping {(A 1, s 1 ),..., (A n, s n )}. A relation is a finite set of tuples. We will require that relations be typed, meaning that the same variable cannot appear in distinct columns. A relation is ground if all its tuples are ground. The construct of conjunctive query, also called rule, is defined as usual [2], with the minor difference that we assume a single relation and hence do not need distinguished relation symbols. We then proceed by defining the subclass of rooted rules. Definition 2. A rule-based conjunctive query (or simply rule) q is an expression of the form h B where the rule body B is a (typed) relation and the rule head h is a tuple such that every variable that occurs in h also occurs in B. The answer to this rule q on a (not necessarily ground) relation I, denoted q(i), is defined by q(i) = {θ(h) θ is a substitution such that θ(b) I}. A rule B, with a head of zero arity, is called Boolean; the answer to such rule is either { } or {}. Free variables are defined as usual. To define the notion of free tuple, we assume that the relation schema under consideration has a unique key K. Then, a tuple in the body of a rule is called free if its key value is composed of constants and free variables only. A quasi-free variable is a variable that occurs only in free tuples. Definition 3. Assume relation schema A 1, A 2,..., A n with a unique key K {A 1,..., A n }. Let q : h B be a rule. A variable is called free if it occurs in h;

5 5 otherwise it is nonfree. A tuple t B is called free if for each A i K, t(a i ) is either a free variable or a constant. A nonfree variable is called quasi-free if it occurs only in free tuples. To gain some intuition, assume schema A 1,..., A n with key K = {A 1,..., A k } (k n). Let s 1,..., s k, s k+1,..., s n be a tuple in the rule body, where underlined symbols correspond to key attributes. Assume that one of s k+1,..., s n is a quasi-free variable, say z. Since quasi-free variables occur only in free tuples, each s 1,..., s k must be a constant or a free variable. If θ is a valuation that maps the rule body into a relation that satisfies the key constraint, then the value θ(z) is fully determined by the value of θ on the free variables. Finally, a rule is rooted if every variable that occurs more than once in it, is free or quasi-free. Definition 4. Assume relation schema A 1, A 2,..., A n with a unique key K {A 1,..., A n }. A rule q : h B is called rooted if every variable that occurs more than once in B, is either free or quasi-free. Two rooted rules relative to the relation schema Name, Birth, Sex, ZIP, City of Example 2 are shown next, in which the underlined positions correspond to the key Name. Since all tuples in the rule bodies are free, all variables can have multiple occurrences. Get names of male persons living in An s city. x n x n, x b, M, x z, x c, An, y b, y s, y z, x c For each male person, get names of same-aged female persons living in the same city. x n, y n x n, x b, M, x z, x c, y n, x b, F, y z, x c If we remove y n from the rule head, then this rule is no longer rooted. Indeed, after removing y n from the rule head, the last tuple is no longer free, hence x b and x c are no longer quasi-free and must not occur more than once. 3 Consistent Query Answering We assume familiarity with the notions of functional dependency (fd) and multivalued dependency (mvd) [3, 2]. Join dependencies and keys are recalled next. Definition 5. Let U = {A 1,..., A n }, the set of attributes. A join dependency (jd) σ is an expression [X 1,..., X m ] where m i=1 X i = U. The result of applying this jd σ on relation I, denoted σ(i), is defined by σ(i) = π X1 (I) π X2 (I)... π Xm (I), where π and are the projection and join operators of the relational algebra. A ground relation I satisfies σ, denoted I = σ, if I = σ(i). If Σ is a set of fd s over U, then a key of Σ is a minimal (under set inclusion) set K U such that Σ = K U.

6 6 The next definition introduces by-now-standard constructs of repair and consistent query answer. The motivation for intersecting query answers has been provided in the first paragraph of this article. Definition 6. Let Σ be a set of fd s and I a ground relation. A repair of I under Σ is a maximal (under set inclusion) relation J I such that J = Σ. The consistent query answer to a rule q on I under Σ, denoted q Σ (I), is defined as follows: q Σ (I) = {q(i) I is a repair of I under Σ}. Given a set Σ of fd s and a rule q, consistent query answering is the complexity of (testing membership of) the set: CQA(Σ, q) = {I I is a ground relation and q Σ (I) = {}}. 2 That is, on input I, decide whether I yields an empty consistent query answer. Note that the constraints and the query are fixed and the complexity is in the size of the input relation, known as data complexity. We now introduce a novel related problem. Let Σ be a set of fd s and σ a jd such that Σ = σ: CQAJD(Σ, σ, q) = {I I is a ground relation and q Σ (σ(i)) = {}}. Intuitively, we first repair by tuple insertion relative to the weaker constraint σ (weaker in the sense that Σ = σ), which yields σ(i). Next, we apply standard consistent query answering relative to Σ using tuple deletion. Clearly, if we choose σ to be the identity jd (that is, σ = [U]), then CQAJD(Σ, σ, q) = CQA(Σ, q). Also, CQAJD(Σ, σ, q) is in NP for any set Σ of fd s and rule q, because the jd σ can be applied in polynomial time and CQA(Σ, q) is in NP for fd s [4]. 4 Acyclic Fd s and Preparatory Jd s The main result of this paper will be the tractability of CQAJD(Σ, σ, q) under certain conditions for Σ and σ. These conditions, which are not too severe and allow many practical cases, are introduced next. First, we define acyclic sets of fd s. The definition is relative to a minimal cover of fd s, which is a reduced representative for a set of fd s. See [2, page 257] or [3, page 390]. Definition 7. The dependency graph of a set Σ of fd s is defined as follows: the vertices are the dependencies of Σ; there is an oriented edge from the vertex X A to the vertex Y B if A Y. We call Σ acyclic if it has a minimal cover whose dependency graph contains no cycle. 2 Note that our definition tests for emptiness of consistent query answers, whereas other authors have used the complement problem which tests for nonemptiness [4].

7 7 For example, the set {AB C, C A} is cyclic. The set {A B, C D, AD B, BC D} has minimal cover {A B, C D} and is acyclic. Theorem 1. Every acyclic set Σ of fd s has a unique minimal cover and a unique key. Next, we define a restriction on jd s. Definition 8. Let Σ be set of fd s and σ a jd, both over the same set U of attributes. We say that σ is repairing-preparing for Σ, denoted Σ σ, if the following two conditions are satisfied: 1. Σ = σ; and 2. for every X Y Σ, either Σ = X U or for every A Y, σ = X A. Because of the first condition, if Σ σ, then for every relation I, I = Σ implies σ(i) = I. That is, applying the jd is the identity on consistent relations. The second condition, which may be less intuitive, ensures that applying the jd will distribute erroneous values over tuples. In Example 1, for example, the join relation satisfies Cid CName: both the 7 Jan and the 8 Feb shipments are joined to both names (A. Jones and A. Johnson). Clearly, Σ σ can be decided using the chase technique [2]. Example 4. Assume {Name, Birth, Sex, ZIP, City} subject to the acyclic set Σ = {Name Birth, Name Sex, Name ZIP, ZIP City}. It can be verified that: Σ [{Name, Birth, Sex, ZIP}, {ZIP, City}] Σ [{Name, Birth, Sex}, {Name, ZIP}, {ZIP, City}] All jd s used in Section 1 are repairing-preparing. Given Σ, a natural question is whether a jd σ that corresponds to a good decomposition in 3NF, will satisfy Σ σ. In response, we note that even for acyclic sets of fd s, the classical 3NF Synthesis algorithm (see Algorithm in [2]) can yield a join dependency that is not repairing-preparing. For example, for Σ = {A C, B D, CD E}, the jd [AB, AC, BD, CDE] corresponds to the decomposition of ABCDE given by this algorithm (decomposition in 3NF with a lossless join and preservation of dependencies). Since it can be verified that Σ = A ABCDE and σ = A C, it follows Σ σ. Finally, we note that the relation does not depend on the representation chosen for Σ: Proposition 1. Let Σ and Σ be sets of fd s, and σ a jd. If Σ and Σ are equivalent and Σ σ, then Σ σ.

8 8 I Name Birth Sex ZIP City An 1952 F 7000 Mons Ed 1970 M 7000 Bergen H Name Birth Sex ZIP City An y F 7000 z Ed 1970 M 7000 z σ(i) Name Birth Sex ZIP City An 1964 F 7000 Bergen An 1952 F 7000 Mons An 1952 F 7000 Bergen Ed 1970 M 7000 Mons Ed 1970 M 7000 Bergen Fig. 1. Computing a relation H that returns consistent answers to rooted rules 5 Tractability of CQAJD for Rooted Rules We show that consistent query answering in the project-join-repair approach is tractable for rooted rules under certain restrictions for Σ and σ (Theorem 2). We then show that there are cases where repairing by mere tuple deletion is intractable, but becomes tractable under project-join-repair. Finally, we show that moving beyond rooted rules leads to intractability. The following lemma states the conditions under which project-join-repair preserves, in every repair, all key values of the original relation. We assume that each fd in a given set Σ of fd s is of the form X A, where A is a single attribute not in X. Lemma 1. Let Σ be an acyclic set of fd s such that no two fd s of Σ have the same right-hand side. Let σ be a jd such that Σ σ. Let K be the unique key of Σ (uniqueness follows from Theorem 1). For every relation I, if J is a repair of σ(i) under Σ, then π K (J) = π K (I) = π K (σ(i)). The following Theorem 2 shows tractability of CQAJD(Σ, σ, q). Moreover, the theorem has a constructive proof, which provides an effective way for computing consistent query answers. Figure 1 shows the construction on a simple example. First, apply the jd σ = [{Name, Birth, Sex, ZIP}, {ZIP, City}], giving σ(i). Next, the relation H contains one tuple for every distinct key value in σ(i) (the key is Name). Variables are used to represent uncertain values. Initially, all variables are distinct. Next, since An and Ed share the same ZIP code, we know that they must live in the same city (because of the constraint ZIP City), hence the double occurrence of z. The construction is in polynomial time in the size of I. The proof of Theorem 2 shows that for every rooted rule q, the ground tuples in q(h) coincide with the consistent answer q Σ (σ(i)). Note incidentally that the rooted rule Get names of male persons living in An s city returns Ed because of the double occurrence of z. Note also that there is no need to materialize the repairs of σ(i) under Σ.

9 9 Theorem 2. Let Σ be an acyclic set of fd s such that no two fd s of Σ have the same right-hand side. Let K be the unique key of Σ. Let σ be a jd such that Σ σ. Then, for every rooted rule q, CQAJD(Σ, σ, q) is in P. In Section 1, we illustrated that the project-join-repair approach can give us more natural repairs in general. The following theorem states a very pleasant result: in addition to naturalness, we may gain tractability. The jd in this theorem corresponds to a standard 3NF decomposition. Theorem 3. Assume relation schema A, B, C, D, E, F. Let Σ = {A D, B E, C F } (the key is ABC) and σ = [ABC, AD, BE, CF ]. Let q : x, y, z, 0, 0, 0, a rooted rule. Then, Σ σ, and CQAJD(Σ, σ, q) is in P, but CQA(Σ, q) is NP-complete. Proof. The P result follows from Theorem 2. NP-hardness of CQA(Σ, q) can be proved by a reduction from 3DM (three-dimensional matching). Moving beyond rooted rules results in intractability. Theorem 4. Assume relation schema A, B, C. Let Σ = {A B, A C} (the key is A) and σ = [AB, AC]. Let q : u, y, 0, w, y, 1, a rule that is not rooted since y appears twice but is neither free nor quasi-free. Then, Σ σ, but CQAJD(Σ, σ, q) is NP-complete. Proof. See Theorem 3.3 in [4]. The relation in that proof satisfies σ. 6 Related Work Main Contribution. We studied the problem of repairing a universal relation relative to a set of fd s. We illustrated by a number of examples that better repairs can be obtained by first applying a jd prior to repairing by tuple deletion. By varying the jd, attributes can be kept together or treated as being independent. As for the complexity, Theorem 3 shows that consistent query answering can be intractable under standard repairing by tuple deletion, but tractable under project-join-repair. This a pleasant result: increased naturalness and decreased complexity go hand in hand. Tractability was proved for the class of rooted rules. We next compare our contribution with existing work. Join Graphs. An elegant approach to compute consistent query answers is query rewriting: a given query is rewritten such that the new query returns the consistent answer on any, possibly inconsistent, database. Obviously, if the rewritten query is wished to be first-order expressible [5, 6], then unless P=NP, this approach is limited to sets Σ of constraints and queries q for which CQA(Σ, q) is in P. Fuxman and Miller [7] give an algorithm for first-order rewriting of a subclass of conjunctive queries under primary key constraints. They define the join graph of a rule as a graph whose vertices are the atoms in the body of the query. There

10 10 is an oriented edge from R(s 1,..., s k, s k+1,..., s n ) to a distinct atom P if some s k+1,..., s n is a nonfree variable that also occurs in P. There is a self-loop on R(s 1,..., s k, s k+1,..., s n ) if some s k+1,..., s n is a nonfree variable that occurs twice in the atom. In this representation, the underlined coordinates constitute the primary key of the relation. Fuxman and Miller [7] give a query rewriting algorithm for queries with acyclic join graphs that contain no repeated relation symbols. Moreover, they require that every join of two atoms involves all key attributes of one of the atoms, a condition that was relaxed later on by Grieco et al. [8]. Our rooted rules are more general insofar as they can have cyclic join graphs and contain repeated relation symbols. Example 5. Consider relation schema Name, Birth, Sex, ZIP, City. The following rooted rule gets, for each male person, the names of same-aged female persons living in the same city. x n, y n x n, x b, M, x z, x c, y n, x b, F, y z, x c The join graph contains a cycle, because x c is nonfree and occurs in two distinct atoms (likewise for x b ). Here is the query obtained by projecting the rule body on the components of the jd [{Name, Birth, Sex, ZIP}, {ZIP, City}]. The relation symbols R 1 and R 2 are used for the first and second component respectively. x n, y n R 1(x n, x b, M, x z ), R 2 (x z, x c ), R 1 (y n, x b, F, y z ), R 2 (y z, x c ) Each relation symbol occurs twice in the rule body, and the join graph contains two cycles, each of which connects atoms with the same relation symbol. The following example shows that rooted rules can yield queries where the join between two atoms does involve only a subset of the key attributes. Example 6. Consider relation schema Name, Country, Income, Tax and Σ with three fd s: Name Country, Name Income, and {Country, Income} Tax. Let σ = [{Name, Country}, {Name, Income}, {Country, Income, Tax}]. It can be verified that Σ σ. The following rooted rule gives the tax rate for each person: Here is the decomposed query: x n, x t R(x n, x c, x i, x t ) x n, x t R 1 (x n, x c ), R 2 (x n, x i ), R 3 (x c, x i, x t ) Note that x c in R 1 (x n, x c ) joins to the first attribute of the composite key in R 3 (x c, x i, x t ). Defining Repairs. Consistent query answering gathered much attention since the seminal article by Arenas et al. [5], where repairs are defined in terms of the sets of inserted and deleted tuples. Note that for fd s, tuple insertions are useless for restoring consistency. Most approaches minimize sets of deleted and/or inserted

11 11 tuples relative to set inclusion. Some authors also consider minimization with respect to cardinality [9, 10]. Recently, there has been a growing interest in repairing by value modification [11 14]. Our project-join-repair approach can have the effect of value modifications, but is different from earlier proposals. Consider again the relation of Example 2. I Name Birth Sex ZIP City Ed 1962 M 7000 Bergen Our update-based repairing proposed in [15, 14] would come up with the four repairs shown next, where is a placeholder for any ZIP code distinct from The project-join-repair approach will never introduce (placeholders for) new constants. However, as illustrated in Example 3, it yields J 1 and J 2 relative to the jd [{Name, Birth, Sex, ZIP}, {ZIP, City}]. In general, it remains a subjective matter as to which repairing strategy yields the most intuitive repairs. However, we may opt for project-join-repair whenever this gives us tractability. J 1 Name Birth Sex ZIP City Ed 1962 M 7000 Mons J 3 Name Birth Sex ZIP City An 1964 F Mons Ed 1962 M 7000 Bergen J 2 Name Birth Sex ZIP City An 1964 F 7000 Bergen Ed 1962 M 7000 Bergen J 4 Name Birth Sex ZIP City Ed 1962 M Bergen Computing Repairs and Consistent Query Answers. Several authors have investigated the use of logic solvers for database repairing [16, 9, 17]. They reduce database repairing and consistent query answering to the computation of models in some logical framework for which resolution methods exist. These articles focus more on expressiveness than on tractability. First-order query rewriting, discussed above, computes consistent query answers in polynomial time data complexity. The constructive proof of Theorem 2, illustrated by Fig. 1, could be termed database rewriting, as the database is modified so as to return consistent answers to any rooted rule in polynomial time. In [18, 19], a practical implementation is presented for consistent query answering relative to denial constraints. References 1. Imielinski, T., Lipski Jr., W.: Incomplete information in relational databases. J. ACM 31(4) (1984) Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley (1995) 3. Ullman, J.D.: Principles of Database and Knowledge-Base Systems, Volume I. Computer Science Press (1988)

12 12 4. Chomicki, J., Marcinkowski, J.: Minimal-change integrity maintenance using tuple deletions. Information and Computation 197(1-2) (2005) Arenas, M., Bertossi, L.E., Chomicki, J.: Consistent query answers in inconsistent databases. In: Proc. 18th ACM Symp. on Principles of Database Systems, ACM Press (1999) Celle, A., Bertossi, L.E.: Querying inconsistent databases: Algorithms and implementation. In: Proc. 1st Int. Conf. on Computational Logic (CL 2000). Volume 1861 of LNAI, Springer (2000) Fuxman, A.D., Miller, R.J.: First-order rewriting for inconsistent databases. In: Proc. 10th Int. Conf. on Database Theory (ICDT 2005). Volume 3363 of LNCS, Springer (2005) Grieco, L., Lembo, D., Rosati, R., Ruzzi, M.: Consistent query answering under key and exclusion dependencies: Algorithms and experiments. In: Proc. 14th ACM Int. Conf. on Information and Knowledge Management (CIKM 05), ACM (2005) Arieli, O., Denecker, M., Nuffelen, B.V., Bruynooghe, M.: Database repair by signed formulae. In: Proc. 3rd Int. Symp. on Foundations of Information and Knowledge Systems (FoIKS 04). Volume 2942 of LNCS, Springer (2004) Lin, J., Mendelzon, A.O.: Merging databases under constraints. Int. J. Cooperative Inf. Syst. 7(1) (1998) Bertossi, L.E., Bravo, L., Franconi, E., Lopatenko, A.: Complexity and approximation of fixing numerical attributes in databases under integrity constraints. In: 10th Int. Symposium Database Programming Languages (DBPL 2005). Volume 3774 of LNCS, Springer (2005) Bohannon, P., Fan, W., Flaster, M., Rastogi, R.: A cost-based model and effective heuristic for repairing constraints by value modification. In: Proc. of the 24th ACM SIGMOD Int. Conf. on Management of Data, ACM Press (2005) Flesca, S., Furfaro, F., Parisi, F.: Consistent query answers on numerical databases under aggregate constraints. In: 10th Int. Symposium Database Programming Languages (DBPL 2005). Volume 3774 of LNCS, Springer (2005) Wijsen, J.: Database repairing using updates. ACM Trans. Database Syst. 30(3) (2005) Wijsen, J.: Condensed representation of database repairs for consistent query answering. In: Proc. 9th Int. Conf. on Database Theory (ICDT 2003). Volume 2572 of LNCS, Springer (2002) Arenas, M., Bertossi, L.E., Chomicki, J.: Answer sets for consistent query answering in inconsistent databases. Theory and Practice of Logic Programming 3(3-4) (2003) Greco, G., Greco, S., Zumpano, E.: A logical framework for querying and repairing inconsistent databases. IEEE Trans. Knowledge and Data Eng. 25(6) (2003) Chomicki, J., Marcinkowski, J., Staworko, S.: Computing consistent query answers using conflict hypergraphs. In: Proc. 13th ACM Int. Conf. on Information and Knowledge Management (CIKM 04), ACM (2004) Chomicki, J., Marcinkowski, J., Staworko, S.: Hippo: A system for computing consistent answers to a class of SQL queries. In: Proc. 9th Int. Conf. on Extending Database Technology (EDBT 2004). Volume 2992 of LNCS, Springer (2004)

Static, Incremental and Parameterized Complexity of Consistent Query Answering in Databases Under Cardinality-Based Semantics

Static, Incremental and Parameterized Complexity of Consistent Query Answering in Databases Under Cardinality-Based Semantics Static, Incremental and Parameterized Complexity of Consistent Query Answering in Databases Under Cardinality-Based Semantics Leopoldo Bertossi Carleton University Ottawa, Canada Based in part on join

More information

Consistent Query Answering: Opportunities and Limitations

Consistent Query Answering: Opportunities and Limitations Consistent Query Answering: Opportunities and Limitations Jan Chomicki Dept. Computer Science and Engineering University at Buffalo, SUNY Buffalo, NY 14260-2000, USA chomicki@buffalo.edu Abstract This

More information

On the Computational Complexity of Minimal-Change Integrity Maintenance in Relational Databases

On the Computational Complexity of Minimal-Change Integrity Maintenance in Relational Databases On the Computational Complexity of Minimal-Change Integrity Maintenance in Relational Databases Jan Chomicki 1 and Jerzy Marcinkowski 2 1 Dept. of Computer Science and Engineering University at Buffalo

More information

Consistent Query Answering

Consistent Query Answering Consistent Query Answering Opportunities and Limitations Jan Chomicki Dept. CSE University at Buffalo State University of New York http://www.cse.buffalo.edu/ chomicki 1 Integrity constraints Integrity

More information

INCONSISTENT DATABASES

INCONSISTENT DATABASES INCONSISTENT DATABASES Leopoldo Bertossi Carleton University, http://www.scs.carleton.ca/ bertossi SYNONYMS None DEFINITION An inconsistent database is a database instance that does not satisfy those integrity

More information

Consistent Query Answering

Consistent Query Answering Consistent Query Answering Sławek Staworko 1 University of Lille INRIA Mostrare Project DEIS 2010 November 9, 2010 1 Some slides are due to [Cho07] Sławek Staworko (Mostrare) CQA DEIS 2010 1 / 33 Overview

More information

On the Hardness of Counting the Solutions of SPARQL Queries

On the Hardness of Counting the Solutions of SPARQL Queries On the Hardness of Counting the Solutions of SPARQL Queries Reinhard Pichler and Sebastian Skritek Vienna University of Technology, Faculty of Informatics {pichler,skritek}@dbai.tuwien.ac.at 1 Introduction

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

arxiv:cs/ v1 [cs.db] 5 Apr 2002

arxiv:cs/ v1 [cs.db] 5 Apr 2002 On the Computational Complexity of Consistent Query Answers arxiv:cs/0204010v1 [cs.db] 5 Apr 2002 1 Introduction Jan Chomicki Jerzy Marcinkowski Dept. CSE Instytut Informatyki University at Buffalo Wroclaw

More information

Preference-Driven Querying of Inconsistent Relational Databases

Preference-Driven Querying of Inconsistent Relational Databases Preference-Driven Querying of Inconsistent Relational Databases Slawomir Staworko 1, Jan Chomicki 1, and Jerzy Marcinkowski 2 1 University at Buffalo, {staworko,chomicki}@cse.buffalo.edu 2 Wroclaw University

More information

Edinburgh Research Explorer

Edinburgh Research Explorer Edinburgh Research Explorer Hippo: A System for Computing Consistent Answers to a Class of SQL Queries Citation for published version: Chomicki, J, Marcinkowski, J & Staworko, S 2004, Hippo: A System for

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Database Consistency: Logic-Based Approaches

Database Consistency: Logic-Based Approaches Database Consistency: Logic-Based Approaches Jan Chomicki 1 Wenfei Fan 2 1 University at Buffalo and Warsaw University 2 University of Edinburgh April 27-28, 2007 Plan of the course 1 Integrity constraints

More information

Core Membership Computation for Succinct Representations of Coalitional Games

Core Membership Computation for Succinct Representations of Coalitional Games Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity

More information

Inconsistency-tolerant logics

Inconsistency-tolerant logics Inconsistency-tolerant logics CS 157 Computational Logic Autumn 2010 Inconsistent logical theories T 1 = { p(a), p(a) } T 2 = { x(p(x) q(x)), p(a), q(a) } Definition: A theory T is inconsistent if T has

More information

Minimal-Change Integrity Maintenance Using Tuple Deletions

Minimal-Change Integrity Maintenance Using Tuple Deletions Minimal-Change Integrity Maintenance Using Tuple Deletions Jan Chomicki University at Buffalo Dept. CSE chomicki@cse.buffalo.edu Jerzy Marcinkowski Wroclaw University Instytut Informatyki jma@ii.uni.wroc.pl

More information

Approximation Algorithms for Computing Certain Answers over Incomplete Databases

Approximation Algorithms for Computing Certain Answers over Incomplete Databases Approximation Algorithms for Computing Certain Answers over Incomplete Databases Sergio Greco, Cristian Molinaro, and Irina Trubitsyna {greco,cmolinaro,trubitsyna}@dimes.unical.it DIMES, Università della

More information

Consistent Query Answering for Atemporal Constraints over Temporal Databases

Consistent Query Answering for Atemporal Constraints over Temporal Databases Consistent Query Answering for Atemporal Constraints over Temporal Databases Jan Chomicki Dept. of Computer Science and Engineering SUNY at Buffalo Buffalo, NY, USA chomicki@buffalo.edu Jef Wijsen Département

More information

Schema Design for Uncertain Databases

Schema Design for Uncertain Databases Schema Design for Uncertain Databases Anish Das Sarma, Jeffrey Ullman, Jennifer Widom {anish,ullman,widom}@cs.stanford.edu Stanford University Abstract. We address schema design in uncertain databases.

More information

Relational Database Design Theory. Introduction to Databases CompSci 316 Fall 2017

Relational Database Design Theory. Introduction to Databases CompSci 316 Fall 2017 Relational Database Design Theory Introduction to Databases CompSci 316 Fall 2017 2 Announcements (Thu. Sep. 14) Homework #1 due next Tuesday (11:59pm) Course project description posted Read it! Mixer

More information

Foundations of Databases

Foundations of Databases Foundations of Databases Free University of Bozen Bolzano, 2004 2005 Thomas Eiter Institut für Informationssysteme Arbeitsbereich Wissensbasierte Systeme (184/3) Technische Universität Wien http://www.kr.tuwien.ac.at/staff/eiter

More information

Uncertain Data Models

Uncertain Data Models Uncertain Data Models Christoph Koch EPFL Dan Olteanu University of Oxford SYNOMYMS data models for incomplete information, probabilistic data models, representation systems DEFINITION An uncertain data

More information

Database Systems. Basics of the Relational Data Model

Database Systems. Basics of the Relational Data Model Database Systems Relational Design Theory Jens Otten University of Oslo Jens Otten (UiO) Database Systems Relational Design Theory INF3100 Spring 18 1 / 30 Basics of the Relational Data Model title year

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

On the Data Complexity of Consistent Query Answering over Graph Databases

On the Data Complexity of Consistent Query Answering over Graph Databases On the Data Complexity of Consistent Query Answering over Graph Databases Pablo Barceló and Gaëlle Fontaine Department of Computer Science University of Chile pbarcelo@dcc.uchile.cl, gaelle@dcc.uchile.cl

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

arxiv: v1 [cs.db] 23 May 2016

arxiv: v1 [cs.db] 23 May 2016 Complexity of Consistent Query Answering in Databases under Cardinality-Based and Incremental Repair Semantics (extended version) arxiv:1605.07159v1 [cs.db] 23 May 2016 Andrei Lopatenko Free University

More information

Relational Databases

Relational Databases Relational Databases Jan Chomicki University at Buffalo Jan Chomicki () Relational databases 1 / 49 Plan of the course 1 Relational databases 2 Relational database design 3 Conceptual database design 4

More information

Managing Inconsistencies in Collaborative Data Management

Managing Inconsistencies in Collaborative Data Management Managing Inconsistencies in Collaborative Data Management Eric Kao Logic Group Computer Science Department Stanford University Talk given at HP Labs on November 9, 2010 Structured Data Public Sources Company

More information

The Inverse of a Schema Mapping

The Inverse of a Schema Mapping The Inverse of a Schema Mapping Jorge Pérez Department of Computer Science, Universidad de Chile Blanco Encalada 2120, Santiago, Chile jperez@dcc.uchile.cl Abstract The inversion of schema mappings has

More information

Consistent Query Answering in Databases

Consistent Query Answering in Databases Consistent Query Answering in Databases Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada. bertossi@scs.carleton.ca 1 Introduction For several reasons databases may become

More information

BCNF. Yufei Tao. Department of Computer Science and Engineering Chinese University of Hong Kong BCNF

BCNF. Yufei Tao. Department of Computer Science and Engineering Chinese University of Hong Kong BCNF Yufei Tao Department of Computer Science and Engineering Chinese University of Hong Kong Recall A primary goal of database design is to decide what tables to create. Usually, there are two principles:

More information

Data integration lecture 3

Data integration lecture 3 PhD course on View-based query processing Data integration lecture 3 Riccardo Rosati Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza {rosati}@dis.uniroma1.it Corso di Dottorato

More information

Homework 6: FDs, NFs and XML (due April 13 th, 2016, 4:00pm, hard-copy in-class please)

Homework 6: FDs, NFs and XML (due April 13 th, 2016, 4:00pm, hard-copy in-class please) Virginia Tech. Computer Science CS 4604 Introduction to DBMS Spring 2016, Prakash Homework 6: FDs, NFs and XML (due April 13 th, 2016, 4:00pm, hard-copy in-class please) Reminders: a. Out of 100 points.

More information

Unifying and extending hybrid tractable classes of CSPs

Unifying and extending hybrid tractable classes of CSPs Journal of Experimental & Theoretical Artificial Intelligence Vol. 00, No. 00, Month-Month 200x, 1 16 Unifying and extending hybrid tractable classes of CSPs Wady Naanaa Faculty of sciences, University

More information

DATABASE THEORY. Lecture 18: Dependencies. TU Dresden, 3rd July Markus Krötzsch Knowledge-Based Systems

DATABASE THEORY. Lecture 18: Dependencies. TU Dresden, 3rd July Markus Krötzsch Knowledge-Based Systems DATABASE THEORY Lecture 18: Dependencies Markus Krötzsch Knowledge-Based Systems TU Dresden, 3rd July 2018 Review: Databases and their schemas Lines: Line Type 85 bus 3 tram F1 ferry...... Stops: SID Stop

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Logical Foundations of Relational Data Exchange

Logical Foundations of Relational Data Exchange Logical Foundations of Relational Data Exchange Pablo Barceló Department of Computer Science, University of Chile pbarcelo@dcc.uchile.cl 1 Introduction Data exchange has been defined as the problem of

More information

Lecture 6a Design Theory and Normalization 2/2

Lecture 6a Design Theory and Normalization 2/2 CompSci 516 Data Intensive Computing Systems Lecture 6a Design Theory and Normalization 2/2 Instructor: Sudeepa Roy 1 HW1 deadline: Announcements Due on 09/21 (Thurs), 11:55 pm, no late days Project proposal

More information

Complexity and approximation of satisfactory partition problems

Complexity and approximation of satisfactory partition problems Complexity and approximation of satisfactory partition problems Cristina Bazgan, Zsolt Tuza, and Daniel Vanderpooten LAMSADE, Université Paris-Dauphine, France {bazgan,vdp}@lamsade.dauphine.fr Computer

More information

The complement of PATH is in NL

The complement of PATH is in NL 340 The complement of PATH is in NL Let c be the number of nodes in graph G that are reachable from s We assume that c is provided as an input to M Given G, s, t, and c the machine M operates as follows:

More information

Uncertainty in Databases. Lecture 2: Essential Database Foundations

Uncertainty in Databases. Lecture 2: Essential Database Foundations Uncertainty in Databases Lecture 2: Essential Database Foundations Table of Contents 1 2 3 4 5 6 Table of Contents Codd s Vision Codd Catches On Top Academic Recognition Selected Publication Venues 1 2

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

On Reconciling Data Exchange, Data Integration, and Peer Data Management

On Reconciling Data Exchange, Data Integration, and Peer Data Management On Reconciling Data Exchange, Data Integration, and Peer Data Management Giuseppe De Giacomo, Domenico Lembo, Maurizio Lenzerini, and Riccardo Rosati Dipartimento di Informatica e Sistemistica Sapienza

More information

Functional Dependencies and Finding a Minimal Cover

Functional Dependencies and Finding a Minimal Cover Functional Dependencies and Finding a Minimal Cover Robert Soulé 1 Normalization An anomaly occurs in a database when you can update, insert, or delete data, and get undesired side-effects. These side

More information

Finding Strongly Connected Components

Finding Strongly Connected Components Yufei Tao ITEE University of Queensland We just can t get enough of the beautiful algorithm of DFS! In this lecture, we will use it to solve a problem finding strongly connected components that seems to

More information

Data Cleaning and Query Answering with Matching Dependencies and Matching Functions

Data Cleaning and Query Answering with Matching Dependencies and Matching Functions Data Cleaning and Query Answering with Matching Dependencies and Matching Functions Leopoldo Bertossi Carleton University Ottawa, Canada bertossi@scs.carleton.ca Solmaz Kolahi University of British Columbia

More information

arxiv:cs/ v1 [cs.ds] 20 Feb 2003

arxiv:cs/ v1 [cs.ds] 20 Feb 2003 The Traveling Salesman Problem for Cubic Graphs David Eppstein School of Information & Computer Science University of California, Irvine Irvine, CA 92697-3425, USA eppstein@ics.uci.edu arxiv:cs/0302030v1

More information

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,

More information

PART 1 GRAPHICAL STRUCTURE

PART 1 GRAPHICAL STRUCTURE PART 1 GRAPHICAL STRUCTURE in this web service in this web service 1 Treewidth and Hypertree Width Georg Gottlob, Gianluigi Greco, Francesco Scarcello This chapter covers methods for identifying islands

More information

EECS-3421a: Test #2 Queries

EECS-3421a: Test #2 Queries 2016 November 9 EECS-3421a: Test #2 w/ answers 1 of 16 EECS-3421a: Test #2 Queries Electrical Engineering & Computer Science Lassonde School of Engineering York University Family Name: Given Name: Student#:

More information

On the Role of Integrity Constraints in Data Integration

On the Role of Integrity Constraints in Data Integration On the Role of Integrity Constraints in Data Integration Andrea Calì, Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza

More information

Relational Database: The Relational Data Model; Operations on Database Relations

Relational Database: The Relational Data Model; Operations on Database Relations Relational Database: The Relational Data Model; Operations on Database Relations Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Overview

More information

Function Symbols in Tuple-Generating Dependencies: Expressive Power and Computability

Function Symbols in Tuple-Generating Dependencies: Expressive Power and Computability Function Symbols in Tuple-Generating Dependencies: Expressive Power and Computability Georg Gottlob 1,2, Reinhard Pichler 1, and Emanuel Sallinger 2 1 TU Wien and 2 University of Oxford Tuple-generating

More information

Binary Decision Diagrams

Binary Decision Diagrams Logic and roof Hilary 2016 James Worrell Binary Decision Diagrams A propositional formula is determined up to logical equivalence by its truth table. If the formula has n variables then its truth table

More information

Incomplete Databases: Missing Records and Missing Values

Incomplete Databases: Missing Records and Missing Values Incomplete Databases: Missing Records and Missing Values Werner Nutt, Simon Razniewski, and Gil Vegliach Free University of Bozen-Bolzano, Dominikanerplatz 3, 39100 Bozen, Italy {nutt, razniewski}@inf.unibz.it,

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

Fundamentals of Database Systems

Fundamentals of Database Systems Fundamentals of Database Systems Assignment: 3 Due Date: 23st August, 2017 Instructions This question paper contains 15 questions in 6 pages. Q1: Consider the following relation and its functional dependencies,

More information

On the Implication Problem for Probabilistic Conditional Independency

On the Implication Problem for Probabilistic Conditional Independency IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL. 30, NO. 6, NOVEMBER 2000 785 On the Implication Problem for Probabilistic Conditional Independency S. K. M. Wong, C.

More information

The Relational Model

The Relational Model The Relational Model David Toman School of Computer Science University of Waterloo Introduction to Databases CS348 David Toman (University of Waterloo) The Relational Model 1 / 28 The Relational Model

More information

Web Science & Technologies University of Koblenz Landau, Germany. Relational Data Model

Web Science & Technologies University of Koblenz Landau, Germany. Relational Data Model Web Science & Technologies University of Koblenz Landau, Germany Relational Data Model Overview Relational data model; Tuples and relations; Schemas and instances; Named vs. unnamed perspective; Relational

More information

Schema Refinement & Normalization Theory 2. Week 15

Schema Refinement & Normalization Theory 2. Week 15 Schema Refinement & Normalization Theory 2 Week 15 1 How do we know R is in BCNF? If R has only two attributes, then it is in BCNF If F only uses attributes in R, then: R is in BCNF if and only if for

More information

Some Hardness Proofs

Some Hardness Proofs Some Hardness Proofs Magnus Lie Hetland January 2011 This is a very brief overview of some well-known hard (NP Hard and NP complete) problems, and the main ideas behind their hardness proofs. The document

More information

Nim-Regularity of Graphs

Nim-Regularity of Graphs Nim-Regularity of Graphs Nathan Reading School of Mathematics, University of Minnesota Minneapolis, MN 55455 reading@math.umn.edu Submitted: November 24, 1998; Accepted: January 22, 1999 Abstract. Ehrenborg

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Databases -Normalization I. (GF Royle, N Spadaccini ) Databases - Normalization I 1 / 24

Databases -Normalization I. (GF Royle, N Spadaccini ) Databases - Normalization I 1 / 24 Databases -Normalization I (GF Royle, N Spadaccini 2006-2010) Databases - Normalization I 1 / 24 This lecture This lecture introduces normal forms, decomposition and normalization. We will explore problems

More information

Temporal Dependencies

Temporal Dependencies Temporal Dependencies Jef Wijsen University of Mons-Hainaut SYNONYMS None DEFINITION Static integrity constraints involve only the current database state. Temporal integrity constraints involve current,

More information

Lecture 1: Conjunctive Queries

Lecture 1: Conjunctive Queries CS 784: Foundations of Data Management Spring 2017 Instructor: Paris Koutris Lecture 1: Conjunctive Queries A database schema R is a set of relations: we will typically use the symbols R, S, T,... to denote

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

Computing Full Disjunctions

Computing Full Disjunctions Computing Full Disjunctions (Extended Abstract) Yaron Kanza School of Computer Science and Engineering The Hebrew University of Jerusalem yarok@cs.huji.ac.il Yehoshua Sagiv School of Computer Science and

More information

XI International PhD Workshop OWD 2009, October Fuzzy Sets as Metasets

XI International PhD Workshop OWD 2009, October Fuzzy Sets as Metasets XI International PhD Workshop OWD 2009, 17 20 October 2009 Fuzzy Sets as Metasets Bartłomiej Starosta, Polsko-Japońska WyŜsza Szkoła Technik Komputerowych (24.01.2008, prof. Witold Kosiński, Polsko-Japońska

More information

Query Evaluation on Probabilistic Databases

Query Evaluation on Probabilistic Databases Query Evaluation on Probabilistic Databases Christopher Ré, Nilesh Dalvi and Dan Suciu University of Washington 1 The Probabilistic Data In this paper we consider the query evaluation problem: how can

More information

arxiv: v1 [math.co] 25 Sep 2015

arxiv: v1 [math.co] 25 Sep 2015 A BASIS FOR SLICING BIRKHOFF POLYTOPES TREVOR GLYNN arxiv:1509.07597v1 [math.co] 25 Sep 2015 Abstract. We present a change of basis that may allow more efficient calculation of the volumes of Birkhoff

More information

Query Evaluation on Probabilistic Databases

Query Evaluation on Probabilistic Databases Query Evaluation on Probabilistic Databases Christopher Ré, Nilesh Dalvi and Dan Suciu University of Washington 1 The Probabilistic Data In this paper we consider the query evaluation problem: how can

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Provable data privacy

Provable data privacy Provable data privacy Kilian Stoffel 1 and Thomas Studer 2 1 Université de Neuchâtel, Pierre-à-Mazel 7, CH-2000 Neuchâtel, Switzerland kilian.stoffel@unine.ch 2 Institut für Informatik und angewandte Mathematik,

More information

Rigidity, connectivity and graph decompositions

Rigidity, connectivity and graph decompositions First Prev Next Last Rigidity, connectivity and graph decompositions Brigitte Servatius Herman Servatius Worcester Polytechnic Institute Page 1 of 100 First Prev Next Last Page 2 of 100 We say that a framework

More information

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,

More information

5. Lecture notes on matroid intersection

5. Lecture notes on matroid intersection Massachusetts Institute of Technology Handout 14 18.433: Combinatorial Optimization April 1st, 2009 Michel X. Goemans 5. Lecture notes on matroid intersection One nice feature about matroids is that a

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Database Constraints and Homomorphism Dualities

Database Constraints and Homomorphism Dualities Database Constraints and Homomorphism Dualities Balder ten Cate 1, Phokion G. Kolaitis 1,2, and Wang-Chiew Tan 2,1 1 University of California Santa Cruz 2 IBM Research-Almaden Abstract. Global-as-view

More information

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter

More information

These notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models.

These notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models. Undirected Graphical Models: Chordal Graphs, Decomposable Graphs, Junction Trees, and Factorizations Peter Bartlett. October 2003. These notes present some properties of chordal graphs, a set of undirected

More information

Lecture 22 Acyclic Joins and Worst Case Join Results Instructor: Sudeepa Roy

Lecture 22 Acyclic Joins and Worst Case Join Results Instructor: Sudeepa Roy CompSci 516 ata Intensive Computing Systems Lecture 22 Acyclic Joins and Worst Case Join Results Instructor: Sudeepa Roy uke CS, Fall 2016 CompSci 516: ata Intensive Computing Systems Announcements Final

More information

Logic Programs for Consistently Querying Data Integration Systems

Logic Programs for Consistently Querying Data Integration Systems Logic Programs for Consistently Querying Data Integration Systems Loreto Bravo Pontificia Universidad Católica de Chile Departamento de Ciencia de Computación Santiago, Chile. lbravo@ing.puc.cl Leopoldo

More information

PCP and Hardness of Approximation

PCP and Hardness of Approximation PCP and Hardness of Approximation January 30, 2009 Our goal herein is to define and prove basic concepts regarding hardness of approximation. We will state but obviously not prove a PCP theorem as a starting

More information

This lecture. Databases -Normalization I. Repeating Data. Redundancy. This lecture introduces normal forms, decomposition and normalization.

This lecture. Databases -Normalization I. Repeating Data. Redundancy. This lecture introduces normal forms, decomposition and normalization. This lecture Databases -Normalization I This lecture introduces normal forms, decomposition and normalization (GF Royle 2006-8, N Spadaccini 2008) Databases - Normalization I 1 / 23 (GF Royle 2006-8, N

More information

Relational Model and Relational Algebra A Short Review Class Notes - CS582-01

Relational Model and Relational Algebra A Short Review Class Notes - CS582-01 Relational Model and Relational Algebra A Short Review Class Notes - CS582-01 Tran Cao Son January 12, 2002 0.1 Basics The following definitions are from the book [1] Relational Model. Relations are tables

More information

Checking Containment of Schema Mappings (Preliminary Report)

Checking Containment of Schema Mappings (Preliminary Report) Checking Containment of Schema Mappings (Preliminary Report) Andrea Calì 3,1 and Riccardo Torlone 2 Oxford-Man Institute of Quantitative Finance, University of Oxford, UK Dip. di Informatica e Automazione,

More information

Reductions and Satisfiability

Reductions and Satisfiability Reductions and Satisfiability 1 Polynomial-Time Reductions reformulating problems reformulating a problem in polynomial time independent set and vertex cover reducing vertex cover to set cover 2 The Satisfiability

More information

Greedy Algorithms 1 {K(S) K(S) C} For large values of d, brute force search is not feasible because there are 2 d {1,..., d}.

Greedy Algorithms 1 {K(S) K(S) C} For large values of d, brute force search is not feasible because there are 2 d {1,..., d}. Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,

More information

Database Management Systems Paper Solution

Database Management Systems Paper Solution Database Management Systems Paper Solution Following questions have been asked in GATE CS exam. 1. Given the relations employee (name, salary, deptno) and department (deptno, deptname, address) Which of

More information

Improved upper and lower bounds on the feedback vertex numbers of grids and butterflies

Improved upper and lower bounds on the feedback vertex numbers of grids and butterflies Improved upper and lower bounds on the feedback vertex numbers of grids and butterflies Florent R. Madelaine and Iain A. Stewart Department of Computer Science, Durham University, Science Labs, South Road,

More information

Connecting face hitting sets in planar graphs

Connecting face hitting sets in planar graphs Connecting face hitting sets in planar graphs Pascal Schweitzer and Patrick Schweitzer Max-Planck-Institute for Computer Science Campus E1 4, D-66123 Saarbrücken, Germany pascal@mpi-inf.mpg.de University

More information

Database Management System Prof. Partha Pratim Das Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Database Management System Prof. Partha Pratim Das Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Database Management System Prof. Partha Pratim Das Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 19 Relational Database Design (Contd.) Welcome to module

More information

Chapter 8: Relational Database Design

Chapter 8: Relational Database Design Chapter 8: Relational Database Design Database System Concepts, 6 th Ed. See www.db-book.com for conditions on re-use Chapter 8: Relational Database Design Features of Good Relational Design Atomic Domains

More information

Computing Query Answers with Consistent Support

Computing Query Answers with Consistent Support Computing Query Answers with Consistent Support Jui-Yi Kao Advised by: Stanford University Michael Genesereth Inconsistency in Databases If the data in a database violates the applicable ICs, we say the

More information

Boolean Representations and Combinatorial Equivalence

Boolean Representations and Combinatorial Equivalence Chapter 2 Boolean Representations and Combinatorial Equivalence This chapter introduces different representations of Boolean functions. It then discusses the applications of these representations for proving

More information

Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints

Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints Leopoldo Bertossi 1,LoretoBravo 1, Enrico Franconi 2, and Andrei Lopatenko 2, 1 Carleton University,

More information

This article was originally published in a journal published by Elsevier, and the attached copy is provided by Elsevier for the author s benefit and for the benefit of the author s institution, for non-commercial

More information