2002
DOI: 10.1007/3-540-45758-5_9
|View full text |Cite
|
Sign up to set email alerts
|

Query Rewriting with Symmetric Constraints

Abstract: We address the problem of answering queries using expressive symmetric inter-schema constraints which allow to establish mappings between several heterogeneous information systems. This problem is of high relevance to data integration, as symmetric constraints are essential for dealing with true concept mismatch and are generalizations of the kinds of mappings supported by both local-as-view and global-as-view approaches that were previously studied in the literature. Moreover, the flexibility gained by using … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2004
2004
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 17 publications
0
14
0
Order By: Relevance
“…The problem was generalized in [7] to replace views with schema mapping constraints from the source schema to the target schema, also allowing constraints on the target schema. [22] generalizes the setting even further, allowing schema mappings in both directions, and settling the problem by charting its decidability boundaries and providing tight complexity bounds.…”
Section: Other Considerationsmentioning
confidence: 99%
“…The problem was generalized in [7] to replace views with schema mapping constraints from the source schema to the target schema, also allowing constraints on the target schema. [22] generalizes the setting even further, allowing schema mappings in both directions, and settling the problem by charting its decidability boundaries and providing tight complexity bounds.…”
Section: Other Considerationsmentioning
confidence: 99%
“…The first approach we discuss for assigning semantics to a P2P system, is the FOL approach, followed by [5,13,9]. In this approach, one associates to a P2P system S = (P, M) a single FOL theory, obtained as the union of the various peer theories, plus suitable FOL formulas corresponding to the P2P mapping assertions.…”
Section: Fol Semantics For P2p Systemsmentioning
confidence: 99%
“…-One of the implications of the above observation is that, even if we restrict the general framework in such a way that the various peers are decidable FOL theories (in particular, empty theories), query answering in the whole P2P system is actually undecidable, as illustrated in the next section. This is why, in [9,13], the authors propose syntactic restrictions on the mapping assertions (e.g., acyclicity).…”
Section: Fol Semantics For P2p Systemsmentioning
confidence: 99%
“…Most of the research on query processing under schema mapping in data integration has concentrated on GAV mappings, and on LAV mappings under the label of view-based query processing (see, for instance the survey in [41]). In data integration, GLAV mappings have been specifically considered in [19,38,42], but only for the case of relational databases, and only for query answering and query rewriting. GLAV schema mappings have been mainly investigated in data exchange: in [9,32,33,47] the emphasis is on providing foundations for data exchange systems based on schema mappings, whereas in [11-14, 34-36, 48] the goal is to study operators on schema mappings relevant to model management, notably, composition, merge, and inverse.…”
Section: Introductionmentioning
confidence: 99%