메뉴 건너뛰기




Volumn , Issue , 2011, Pages 211-222

Determining relevance of accesses at runtime

Author keywords

Access patterns; Binding patterns; Deep web; Relevance

Indexed keywords

ACCESS PATTERNS; ACCESS PLANS; BINDING PATTERN; COMPLEXITY RESULTS; CONJUNCTIVE QUERIES; DATA SOURCE; DATALOG PROGRAMS; DEEP WEB; DYNAMIC ASPECTS; LOOKUPS; PARTIAL INFORMATION; QUERY ANSWERING; QUERY CONTAINMENT; RELATIONAL DATA; RELEVANCE; RUNTIMES; WEB SOURCES;

EID: 79960198059     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1989284.1989309     Document Type: Conference Paper
Times cited : (17)

References (27)
  • 1
    • 71049152488 scopus 로고    scopus 로고
    • Satisfiability and relevance for queries over active documents
    • S. Abiteboul, P. Bourhis, and B. Marinoiu. Satisfiability and relevance for queries over active documents. In PODS, 2009.
    • (2009) PODS
    • Abiteboul, S.1    Bourhis, P.2    Marinoiu, B.3
  • 3
    • 79960154397 scopus 로고    scopus 로고
    • Determining relevance of accesses at runtime (extended version)
    • M. Benedikt, G. Gottlob, and P. Senellart. Determining relevance of accesses at runtime (extended version). CoRR, 2011.
    • (2011) CoRR
    • Benedikt, M.1    Gottlob, G.2    Senellart, P.3
  • 4
    • 65349107649 scopus 로고    scopus 로고
    • Dynamic query optimization under access limitations and dependencies
    • A. Calí, D. Calvanese, and D. Martinenghi. Dynamic query optimization under access limitations and dependencies. J. UCS, 15(1):33-62, 2009.
    • (2009) J. UCS , vol.15 , Issue.1 , pp. 33-62
    • Calí, A.1    Calvanese, D.2    Martinenghi, D.3
  • 5
    • 57049154628 scopus 로고    scopus 로고
    • Conjunctive query containment under access limitations
    • A. Calí and D. Martinenghi. Conjunctive query containment under access limitations. In ER, 2008.
    • (2008) ER
    • Calí, A.1    Martinenghi, D.2
  • 6
    • 52649085759 scopus 로고    scopus 로고
    • Querying data under access limitations
    • A. Calí and D. Martinenghi. Querying data under access limitations. In ICDE, 2008.
    • (2008) ICDE
    • Calí, A.1    Martinenghi, D.2
  • 7
    • 77954710259 scopus 로고    scopus 로고
    • Containment of conjunctive regular path queries with inverse
    • D. Calvanese, G. D. Giacomo, M. Lenzerini, and M. Y. Vardi. Containment of conjunctive regular path queries with inverse. In KR, 2000.
    • (2000) KR
    • Calvanese, D.1    Giacomo, G.D.2    Lenzerini, M.3    Vardi, M.Y.4
  • 8
    • 84958776545 scopus 로고
    • Optimal implementation of conjunctive queries in relational data bases
    • Boulder, USA
    • A. K. Chandra and P. M. Merlin. Optimal implementation of conjunctive queries in relational data bases. In STOC, Boulder, USA, 1977.
    • (1977) STOC
    • Chandra, A.K.1    Merlin, P.M.2
  • 9
    • 0027963989 scopus 로고
    • On the complexity of equivalence between recursive and nonrecursive Datalog programs
    • S. Chaudhuri and M. Y. Vardi. On the complexity of equivalence between recursive and nonrecursive Datalog programs. In PODS, 1994.
    • (1994) PODS
    • Chaudhuri, S.1    Vardi, M.Y.2
  • 10
    • 0031075172 scopus 로고    scopus 로고
    • On the Equivalence of Recursive and Nonrecursive Datalog Programs
    • S. Chaudhuri and M. Y. Vardi. On the equivalence of recursive and nonrecursive Datalog programs. JCSS, 54(1):61-78, 1997. (Pubitemid 127437197)
    • (1997) Journal of Computer and System Sciences , vol.54 , Issue.1 , pp. 61-78
    • Chaudhuri, S.1    Vardi, M.Y.2
  • 12
    • 33846828477 scopus 로고    scopus 로고
    • Rewriting queries using views with access patterns under integrity constraints
    • DOI 10.1016/j.tcs.2006.11.008, PII S0304397506008656
    • A. Deutsch, B. Ludäscher, and A. Nash. Rewriting queries using views with access patterns under integrity constraints. Theor. Comput. Sci., 371(3):200-226, 2007. (Pubitemid 46215858)
    • (2007) Theoretical Computer Science , vol.371 , Issue.3 , pp. 200-226
    • Deutsch, A.1    Ludascher, B.2    Nash, A.3
  • 13
    • 0000716692 scopus 로고    scopus 로고
    • Recursive plans for information gathering
    • O. M. Duschka and A. Y. Levy. Recursive plans for information gathering. In IJCAI, 1997.
    • (1997) IJCAI
    • Duschka, O.M.1    Levy, A.Y.2
  • 14
    • 0031623844 scopus 로고    scopus 로고
    • Query containment for conjunctive queries with regular expressions
    • D. Florescu, A. Levy, and D. Suciu. Query containment for conjunctive queries with regular expressions. In PODS, 1998.
    • (1998) PODS
    • Florescu, D.1    Levy, A.2    Suciu, D.3
  • 15
    • 0035658039 scopus 로고    scopus 로고
    • Answering queries using views: A survey
    • DOI 10.1007/s007780100054
    • A. Y. Halevy. Answering queries using views: A survey. VLDB Journal, 10:270-294, 2001. (Pubitemid 33570969)
    • (2001) VLDB Journal , vol.10 , Issue.4 , pp. 270-294
    • Halevy, A.Y.1
  • 18
    • 0142231580 scopus 로고    scopus 로고
    • Computing complete answers to queries in the presence of limited access patterns
    • DOI 10.1007/s00778-002-0085-6
    • C. Li. Computing complete answers to queries in the presence of limited access patterns. VLDB J., 12(3):211-227, 2003. (Pubitemid 37326596)
    • (2003) VLDB Journal , vol.12 , Issue.3 , pp. 211-227
    • Li, C.1
  • 19
    • 0142228522 scopus 로고    scopus 로고
    • Answering Queries with Useful Bindings
    • DOI 10.1145/502030.502032
    • C. Li and E. Y. Chang. Answering queries with useful bindings. ACM Trans. Database Syst., 26(3):313-343, 2001. (Pubitemid 33676537)
    • (2001) ACM Transactions on Database Systems , vol.26 , Issue.3 , pp. 313-343
    • Li, C.1    Chang, E.2
  • 20
    • 0001555264 scopus 로고    scopus 로고
    • On answering queries in the presence of limited access patterns
    • C. Li and E. Y. Chang. On answering queries in the presence of limited access patterns. In ICDT, 2001.
    • (2001) ICDT
    • Li, C.1    Chang, E.Y.2
  • 21
    • 33845891886 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • DOI 10.1016/j.jcss.2006.10.004, PII S0022000006001127, Database Theory 2004
    • G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. JCSS, 73(3):507-534, 2007. (Pubitemid 46027076)
    • (2007) Journal of Computer and System Sciences , vol.73 , Issue.3 , pp. 507-534
    • Miklau, G.1    Suciu, D.2
  • 22
    • 3142702779 scopus 로고    scopus 로고
    • Processing First-order queries under limited access patterns
    • A. Nash and B. Ludäscher. Processing First-order queries under limited access patterns. In PODS, 2004.
    • (2004) PODS
    • Nash, A.1    Ludäscher, B.2
  • 23
    • 34250685209 scopus 로고    scopus 로고
    • Processing union of conjunctive queries with negation under limited access patterns
    • A. Nash and B. Ludäscher. Processing union of conjunctive queries with negation under limited access patterns. In EDBT, 2004.
    • (2004) EDBT
    • Nash, A.1    Ludäscher, B.2
  • 25
    • 0029193408 scopus 로고
    • Answering queries using templates with binding patterns
    • A. Rajaraman, Y. Sagiv, and J. D. Ullman. Answering queries using templates with binding patterns. In PODS, 1995.
    • (1995) PODS
    • Rajaraman, A.1    Sagiv, Y.2    Ullman, J.D.3
  • 26
    • 84976685263 scopus 로고
    • Equivalences among relational expressions with the union and difference operators
    • Y. Sagiv and M. Yannakakis. Equivalences among relational expressions with the union and difference operators. J. ACM, 27(4):633-655, 1980.
    • (1980) J. ACM , vol.27 , Issue.4 , pp. 633-655
    • Sagiv, Y.1    Yannakakis, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.