2008 IEEE 24th International Conference on Data Engineering 2008
DOI: 10.1109/icde.2008.4497413
|View full text |Cite
|
Sign up to set email alerts
|

Querying Data under Access Limitations

Abstract: Abstract-Data sources on the web are often accessible through web interfaces that present them as relational tables, but require certain attributes to be mandatorily selected, e.g., via a web form. In a scenario where we integrate a set of such sources, and we pose queries over them, the values needed to access a source may have to be retrieved from other sources that are possibly not even mentioned in the query: answering queries at best can then be done only with a potentially recursive query plan that gets … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0
1

Year Published

2008
2008
2020
2020

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 61 publications
(42 citation statements)
references
References 16 publications
0
41
0
1
Order By: Relevance
“…We represent Deep Web sources as relational tables; the necessity of filling in the aforementioned form with values forces one to access the relations with suitable selections; these restrictions are referred to as access limitations. It is well known that answering relational queries under access limitations requires the execution of a recursive query plan [5,4]. This is also true in our setting, where a recursive extraction of tuples (or facts) is performed, according to the access limitations, so as to search for the keywords in the data.…”
Section: Introductionmentioning
confidence: 94%
See 2 more Smart Citations
“…We represent Deep Web sources as relational tables; the necessity of filling in the aforementioned form with values forces one to access the relations with suitable selections; these restrictions are referred to as access limitations. It is well known that answering relational queries under access limitations requires the execution of a recursive query plan [5,4]. This is also true in our setting, where a recursive extraction of tuples (or facts) is performed, according to the access limitations, so as to search for the keywords in the data.…”
Section: Introductionmentioning
confidence: 94%
“…Therefore, query answering requires in general two main steps, described in Algorithm 1: (i) extract the reachable portion s of r; (ii) if possible, remove tuples from s so that the obtained set satisfies the conditions of Definition 1, while minimizing its size. A simple way of extracting the reachable portion, inspired by the procedure described in [4], is shown in Algorithm 2. This algorithm may be allowed to terminate early if the answer is not required to be optimal (flag ω set to f alse), and thus can stop as soon as the reachable portion contains all the keywords in the query.…”
Section: Keyword-based Answering In the Deep Webmentioning
confidence: 99%
See 1 more Smart Citation
“…Processing distributed queries under protection requirements has been studied in [9,12,14]. In these works, each relation/view is constrained by an access pattern, and their goals are to identify the classes of queries that a given set of access patterns can support.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, some optimizations to be made during query plan generation to minimize the accesses to data sources are discussed in [11] for a subset of conjunctive queries, named connection queries; more expressive classes of queries, including conjunctive queries, are covered in [5]. Optimizing query plans.…”
Section: Related Workmentioning
confidence: 99%