2013
DOI: 10.14778/2536258.2536262
|View full text |Cite
|
Sign up to set email alerts
|

Discovering denial constraints

Abstract: Integrity constraints (ICs) provide a valuable tool for enforcing correct application semantics. However, designing ICs requires experts and time. Proposals for automatic discovery have been made for some formalisms, such as functional dependencies and their extension conditional functional dependencies. Unfortunately, these dependencies cannot express many common business rules. For example, an American citizen cannot have lower salary and higher tax rate than another citizen in the same state. In this paper,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
118
0
3

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 187 publications
(123 citation statements)
references
References 14 publications
(46 reference statements)
2
118
0
3
Order By: Relevance
“…For instance, it is not uncommon to find thousands of functional dependencies in a given dataset. To handle this and focus users on the most important, interesting, or surprising ones, ranking profiling results can help, as Chu et al [29] show for denial constraints. They suggest two functions, namely succinctness and coverage, to assess their interestingness.…”
Section: Summary and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, it is not uncommon to find thousands of functional dependencies in a given dataset. To handle this and focus users on the most important, interesting, or surprising ones, ranking profiling results can help, as Chu et al [29] show for denial constraints. They suggest two functions, namely succinctness and coverage, to assess their interestingness.…”
Section: Summary and Discussionmentioning
confidence: 99%
“…If the distinct value sets of columns A and B are not available, we can estimate the Jaccard similarity using their MinHash signatures [38]. Conditional functional dependencies [24], [59], CTANE [47], CFUN [42], FACD [91], FastCFD [47] Inclusion dependencies [101], [87], SPIDER [14], ZigZag [102] Conditional inclusion dependencies [61], CINDERELLA [13], PLI [13] Foreign keys [123], [143] Denial constraints FastDC [29] Differential dependencies [128] Sequential dependencies [57] 5 Dependency detection…”
Section: Summaries and Sketchesmentioning
confidence: 99%
See 1 more Smart Citation
“…Discovery algorithms have been well studied for relational dependencies, e.g., FDs [27,41], CFDs [9,17] and denial constraints [10]. As remarked earlier, GFD discovery is much harder.…”
Section: Introductionmentioning
confidence: 99%
“…Despite their relevance for normalization of relations, Fd constraints gained importance for data quality and data cleaning applications. In particular, they can resemble integrity constraints [5] or denial constraints [4], which can be used to detect and repair data violations.…”
Section: Introductionmentioning
confidence: 99%