Proceedings of IEEE 9th International Conference on Data Engineering
DOI: 10.1109/icde.1993.344019
|View full text |Cite
|
Sign up to set email alerts
|

On updates and inconsistency repairing in knowledge bases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0
1

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 20 publications
0
10
0
1
Order By: Relevance
“…We analyze first three methods [Wüt93,CST95,LT97] that follow a similar approach based on an unfolding process. These methods distinguish two steps to obtain the solutions.…”
Section: Methods That Deal With View Updating and Integrity Constrainmentioning
confidence: 99%
See 1 more Smart Citation
“…We analyze first three methods [Wüt93,CST95,LT97] that follow a similar approach based on an unfolding process. These methods distinguish two steps to obtain the solutions.…”
Section: Methods That Deal With View Updating and Integrity Constrainmentioning
confidence: 99%
“…Some of them [KM90,Wüt93,TO95,Dec97] consider view updating and integrity constraint maintenance without imposing significant restrictions on the integrity constraints they can handle. Other methods either impose significant restrictions on the constraints they can deal with, like [CHM95,CST95,LT97]; consider an integrity constraint checking approach [GL90] or do not tackle the view updating problem at all [ML91,CFPT94,Ger94,Maa98,Sch98].…”
Section: Introductionmentioning
confidence: 99%
“…Some integrity checking methods are described by Hsu and Imielinski (1985), Kowalski et al (1987), Lloyd et al (1987), Bry et al (1988), Urban and Delcambre (1990), Bertino et al (1997). The works presented by Ceri and Widom (1990), Moerkotte and Lockemann (1991), Palopoli and Torlone (1992), Karadimce and Urban (1993), Wuthrich (1993), Ceri et al (1994b) are integrity maintenance methods.…”
Section: Static Integrity Constraint Enforcementmentioning
confidence: 99%
“…Some methods with run-time approach are Kowalski et al (1987), Moerkotte and Lockemann (1991), Palopoli and Torlone (1992), Wuthrich (1993), Teniente and Olive (1995). Examples of compile-time methods are Ceri and Widom (1990), Wallace (1991), Ceri et al (1994b), Pastor and Olive (1994), Widom et al (1994).…”
Section: Static Integrity Constraint Enforcementmentioning
confidence: 99%
See 1 more Smart Citation