-
1
-
-
0003928313
-
-
Addison Wesley Publ. Co., Reading, Massachussetts
-
Abiteboul, S., Hull, R., and Vianu, V. (1995). Foundations of Databases. Addison Wesley Publ. Co., Reading, Massachussetts.
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
2
-
-
0001454571
-
Dependency structures of data base relationships
-
Armstrong, W. W. (1974). Dependency structures of data base relationships. In IFIP Congress, pages 580-583.
-
(1974)
IFIP Congress
, pp. 580-583
-
-
Armstrong, W.W.1
-
3
-
-
0018442877
-
Computational problems related to the design of normal form relational schemas
-
Beeri, C. and Bernstein, P. A. (1979). Computational problems related to the design of normal form relational schemas. ACM Trans. on Database Systems, 4(1):30-59.
-
(1979)
ACM Trans. on Database Systems
, vol.4
, Issue.1
, pp. 30-59
-
-
Beeri, C.1
Bernstein, P.A.2
-
4
-
-
0021508773
-
A proof procedure for data dependencies
-
Beeri, C. and Vardi, M. Y. (1984). A proof procedure for data dependencies. J. of the ACM, 31(4):718-741.
-
(1984)
J. of the ACM
, vol.31
, Issue.4
, pp. 718-741
-
-
Beeri, C.1
Vardi, M.Y.2
-
5
-
-
35248834947
-
Optimized querying of integrated data over the Web
-
In Proc. of the IFIP WG8.1 Working Conference on Engineering Information Systems in the Internet Context (EISIC 2002), Kluwer Academic Publishers
-
Calì, A. and Calvanese, D. (2002). Optimized querying of integrated data over the Web. In Proc. of the IFIP WG8.1 Working Conference on Engineering Information Systems in the Internet Context (EISIC 2002), pages 285-301. Kluwer Academic Publishers.
-
(2002)
, pp. 285-301
-
-
Calì, A.1
Calvanese, D.2
-
6
-
-
57049154628
-
Conjunctive query containment under access limitations
-
page to appear
-
Calì, A. and Martinenghi, D. (2008a). Conjunctive query containment under access limitations. In Proc. of ER 2008, page to appear.
-
(2008)
Proc. of ER 2008
-
-
Calì, A.1
Martinenghi, D.2
-
7
-
-
52649085759
-
Querying data under access limitations
-
IEEE Computer Society
-
Calì, A. and Martinenghi, D. (2008b). Querying data under access limitations. In Proc. of ICDE 2008, pages 50-59. IEEE Computer Society.
-
(2008)
Proc. of ICDE 2008
, pp. 50-59
-
-
Calì, A.1
Martinenghi, D.2
-
8
-
-
0021375959
-
Inclusion dependencies and their interaction with functional dependencies
-
Casanova, M. A., Fagin, R., and Papadimitriou, C. H. (1984). Inclusion dependencies and their interaction with functional dependencies. J. of Computer and System Sciences, 28(1):29-59.
-
(1984)
J. of Computer and System Sciences
, vol.28
, Issue.1
, pp. 29-59
-
-
Casanova, M.A.1
Fagin, R.2
Papadimitriou, C.H.3
-
9
-
-
0022106416
-
The implication problem for functional and inclusion dependencies is undecidable
-
Chandra, A. K. and Vardi, M. Y. (1985). The implication problem for functional and inclusion dependencies is undecidable. SIAM J. on Computing, 14(3):671-677.
-
(1985)
SIAM J. on Computing
, vol.14
, Issue.3
, pp. 671-677
-
-
Chandra, A.K.1
Vardi, M.Y.2
-
10
-
-
0001377462
-
Functional and inclusion dependencies - A graph theoretical approach
-
In Kanellakis, P. C. and Preparata, F. P., editors, JAI Press
-
Cosmadakis, S. S. and Kanellakis, P. C. (1986). Functional and inclusion dependencies - A graph theoretical approach. In Kanellakis, P. C. and Preparata, F. P., editors, Advances in Computing Research, Vol. 3, pages 163-184. JAI Press.
-
(1986)
Advances in Computing Research
, vol.3
, pp. 163-184
-
-
Cosmadakis, S.S.1
Kanellakis, P.C.2
-
11
-
-
0025230046
-
Polynomial-time implication problems for unary inclusion dependencies
-
Cosmadakis, S. S., Kanellakis, P. C., and Vardi, M. (1990). Polynomial-time implication problems for unary inclusion dependencies. J. of the ACM, 37(1):15-46.
-
(1990)
J. of the ACM
, vol.37
, Issue.1
, pp. 15-46
-
-
Cosmadakis, S.S.1
Kanellakis, P.C.2
Vardi, M.3
-
12
-
-
0022186245
-
AND-parallelism with intelligent backtracking for annotated logic programs
-
Dembinski, P. and Maluszynski, J. (1985). AND-parallelism with intelligent backtracking for annotated logic programs. In Proc. of SLP 1985, pages 29-38.
-
(1985)
Proc. of SLP 1985
, pp. 29-38
-
-
Dembinski, P.1
Maluszynski, J.2
-
13
-
-
77049127560
-
Rewriting queries using views with access patterns under integrity constraints
-
In Proc. of the 10th Int. Conf. on Database Theory (ICDT 2005)
-
Deutsch, A., Ludäscher, B., and Nash, A. (2005). Rewriting queries using views with access patterns under integrity constraints. In Proc. of the 10th Int. Conf. on Database Theory (ICDT 2005), pages 352-367.
-
(2005)
, pp. 352-367
-
-
Deutsch, A.1
Ludäscher, B.2
Nash, A.3
-
14
-
-
0000716692
-
Recursive plans for information gathering
-
In Proc. of the 15th Int. Joint Conf. on Artificial Intelligence (IJCAI'97)
-
Duschka, O. M. and Levy, A. Y. (1997). Recursive plans for information gathering. In Proc. of the 15th Int. Joint Conf. on Artificial Intelligence (IJCAI'97), pages 778-784.
-
(1997)
, pp. 778-784
-
-
Duschka, O.M.1
Levy, A.Y.2
-
15
-
-
0345870313
-
Query optimization in the presence of limited access patterns
-
In Proc. of the ACM SIGMOD Int. Conf. on Management of Data
-
Florescu, D., Levy, A. Y., Manolescu, I., and Suciu, D. (1999). Query optimization in the presence of limited access patterns. In Proc. of the ACM SIGMOD Int. Conf. on Management of Data, pages 311-322.
-
(1999)
, pp. 311-322
-
-
Florescu, D.1
Levy, A.Y.2
Manolescu, I.3
Suciu, D.4
-
16
-
-
84945709831
-
Algorithm 97: Shortest path
-
Floyd, R. W. (1962). Algorithm 97: Shortest path. Communications of the ACM, 5(6):345.
-
(1962)
Communications of the ACM
, vol.5
, Issue.6
, pp. 345
-
-
Floyd, R.W.1
-
17
-
-
0035658039
-
Answering queries using views: A survey
-
Halevy, A. Y. (2001). Answering queries using views: A survey. Very Large Database J., 10(4):270-294.
-
(2001)
Very Large Database J.
, vol.10
, Issue.4
, pp. 270-294
-
-
Halevy, A.Y.1
-
18
-
-
0007188701
-
New problems complete for nondeterministic log space
-
Jones, N., Lien, Y., and Lasser, W. (1976). New problems complete for nondeterministic log space. Math. Systems Theory, 10:1-17.
-
(1976)
Math. Systems Theory
, vol.10
, pp. 1-17
-
-
Jones, N.1
Lien, Y.2
Lasser, W.3
-
19
-
-
0034899690
-
Guaranteeing no interaction between functional dependencies and tree-like inclusion dependencies
-
Levene, M. and Loizou, G. (2001). Guaranteeing no interaction between functional dependencies and tree-like inclusion dependencies. Theor. Comput. Sci., 254(1-2):683-690.
-
(2001)
Theor. Comput. Sci.
, vol.254
, Issue.1-2
, pp. 683-690
-
-
Levene, M.1
Loizou, G.2
-
20
-
-
0142231580
-
Computing complete answers to queries in the presence of limited access patterns
-
Li, C. (2003). Computing complete answers to queries in the presence of limited access patterns. Very Large Database J., 12(3):211-227.
-
(2003)
Very Large Database J.
, vol.12
, Issue.3
, pp. 211-227
-
-
Li, C.1
-
21
-
-
0033877856
-
Query planning with limited source capabilities
-
In Proc. of the 16th IEEE Int. Conf. on Data Engineering (ICDE 2000)
-
Li, C. and Chang, E. (2000). Query planning with limited source capabilities. In Proc. of the 16th IEEE Int. Conf. on Data Engineering (ICDE 2000), pages 401-412.
-
(2000)
, pp. 401-412
-
-
Li, C.1
Chang, E.2
-
22
-
-
0142228522
-
Answering queries with useful bindings
-
Li, C. and Chang, E. (2001a). Answering queries with useful bindings. ACM Trans. on Database Systems, 26(3):313-343.
-
(2001)
ACM Trans. on Database Systems
, vol.26
, Issue.3
, pp. 313-343
-
-
Li, C.1
Chang, E.2
-
23
-
-
70449484108
-
On answering queries in the presence of limited access patterns
-
In Proc. of the 8th Int. Conf. on Database Theory (ICDT 2001)
-
Li, C. and Chang, E. (2001b). On answering queries in the presence of limited access patterns. In Proc. of the 8th Int. Conf. on Database Theory (ICDT 2001), pages 219-233.
-
(2001)
, pp. 219-233
-
-
Li, C.1
Chang, E.2
-
24
-
-
21144448174
-
Processing union of conjunctive queries with negation under limited access patterns
-
In Proc. of the 9th Int. Conf. on Extending Database Technology (EDBT 2004)
-
Ludäscher, B. and Nash, A. (2004). Processing union of conjunctive queries with negation under limited access patterns. In Proc. of the 9th Int. Conf. on Extending Database Technology (EDBT 2004), pages 422-440.
-
(2004)
, pp. 422-440
-
-
Ludäscher, B.1
Nash, A.2
-
25
-
-
84976687908
-
Minimum covers in the relational database model
-
Maier, D. (1980). Minimum covers in the relational database model. J. of the ACM, 27(4):664-674.
-
(1980)
J. of the ACM
, vol.27
, Issue.4
, pp. 664-674
-
-
Maier, D.1
-
26
-
-
0038266970
-
Query containment for data integration systems
-
Millstein, T. D., Halevy, A. Y., and Friedman, M. (2003). Query containment for data integration systems. J. of Computer and System Sciences, 66(1):20-39.
-
(2003)
J. of Computer and System Sciences
, vol.66
, Issue.1
, pp. 20-39
-
-
Millstein, T.D.1
Halevy, A.Y.2
Friedman, M.3
-
27
-
-
0033717854
-
Query containment for data integration systems
-
In Proc. of the 19th ACM SIGACT SIGMOD SIGART Symp. on Principles of Database Systems (PODS 2000)
-
Millstein, T. D., Levy, A. Y., and Friedman, M. (2000). Query containment for data integration systems. In Proc. of the 19th ACM SIGACT SIGMOD SIGART Symp. on Principles of Database Systems (PODS 2000), pages 67-75.
-
(2000)
, pp. 67-75
-
-
Millstein, T.D.1
Levy, A.Y.2
Friedman, M.3
-
28
-
-
0020716825
-
The implication problem for functional and inclusion dependencies
-
Mitchell, J. C. (1983). The implication problem for functional and inclusion dependencies. Information and Control, 56:154-173.
-
(1983)
Information and Control
, vol.56
, pp. 154-173
-
-
Mitchell, J.C.1
-
29
-
-
3142702779
-
Processing first-order queries under limited access patterns
-
In Proc. of the 23rd ACM SIGACT SIGMOD SIGART Symp. on Principles of Database Systems (PODS 2004)
-
Nash, A. and Ludäscher, B. (2004). Processing first-order queries under limited access patterns. In Proc. of the 23rd ACM SIGACT SIGMOD SIGART Symp. on Principles of Database Systems (PODS 2004), pages 307-318.
-
(2004)
, pp. 307-318
-
-
Nash, A.1
Ludäscher, B.2
-
30
-
-
0029193408
-
Answering queries using templates with binding patterns
-
In Proc. of the 14th ACM SIGACT SIGMOD SIGART Symp. on Principles of Database Systems (PODS'95)
-
Rajaraman, A., Sagiv, Y., and Ullman, J. D. (1995). Answering queries using templates with binding patterns. In Proc. of the 14th ACM SIGACT SIGMOD SIGART Symp. on Principles of Database Systems (PODS'95).
-
(1995)
-
-
Rajaraman, A.1
Sagiv, Y.2
Ullman, J.D.3
-
31
-
-
34250656228
-
Efficiently ordering subgoals with access constraints
-
In Proc. of the 25th ACM SIGACT SIGMOD SIGART Symp. on Principles of Database Systems (PODS 2006)
-
Yang, G., Kifer, M., and Chaudhri, V. K. (2006). Efficiently ordering subgoals with access constraints. In Proc. of the 25th ACM SIGACT SIGMOD SIGART Symp. on Principles of Database Systems (PODS 2006), pages 22-22.
-
(2006)
, pp. 22-22
-
-
Yang, G.1
Kifer, M.2
Chaudhri, V.K.3
-
32
-
-
0141652204
-
Computing capabilities of mediators
-
In Proc. of the ACM SIGMOD Int. Conf. on Management of Data
-
Yerneni, R., Li, C., Garcia-Molina, H., and Ullman, J. D. (1999). Computing capabilities of mediators. In Proc. of the ACM SIGMOD Int. Conf. on Management of Data, pages 443-454.
-
(1999)
, pp. 443-454
-
-
Yerneni, R.1
Li, C.2
Garcia-Molina, H.3
Ullman, J.D.4
|