A graph theoretic approach to key equivalence

被引:0
|
作者
Camacho, JH [1 ]
Salhi, A [1 ]
Zhang, QF [1 ]
机构
[1] Univ Essex, Colchester CO4 3SQ, Essex, England
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper is concerned with redundancy detection and elimination in databases via the solution of a key equivalence problem. The approach is related to the hardening of soft databases method due to Cohen et al., [4]. Here, the problem is described in graph theoretic terms. An appropriate optimization model is drawn and solved indirectly. This approach is shown to be effective. Computational results on test databases are included.
引用
收藏
页码:524 / 533
页数:10
相关论文
共 50 条
  • [1] GRAPH-THEORETIC EQUIVALENCE FOR INTEGER PROGRAMS
    PICARD, JC
    RATLIFF, HD
    OPERATIONS RESEARCH, 1973, 21 (01) : 261 - 269
  • [2] GRAPH THEORETIC APPROACH TO PSEUDOINVERSES
    POOLE, GD
    TEXAS JOURNAL OF SCIENCE, 1973, 24 (04): : 439 - 444
  • [3] A graph theoretic method for securing key fobs
    Heydari, Farideh
    Ghahremanian, Alireza
    MATHEMATICAL SCIENCES, 2021, 15 (01) : 41 - 46
  • [4] A graph theoretic method for securing key fobs
    Farideh Heydari
    Alireza Ghahremanian
    Mathematical Sciences, 2021, 15 : 41 - 46
  • [5] Graph theoretic method for determining Hurwitz equivalence in the symmetric group
    Ben-Itzhak, T
    Teicher, M
    ISRAEL JOURNAL OF MATHEMATICS, 2003, 135 (1) : 83 - 91
  • [6] Graph theoretic method for determining hurwitz equivalence in the symmetric group
    T. Ben-Itzhak
    M. Teicher
    Israel Journal of Mathematics, 2003, 135 : 83 - 91
  • [7] A Graph Theoretic Approach for Optimizing Key Pre-distribution in Wireless Sensor Networks
    Chan, Aldar C-F.
    2009 7TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS, 2009, : 259 - 266
  • [8] AN AUTOMATA-THEORETIC APPROACH TO BEHAVIORAL EQUIVALENCE
    DEVADAS, S
    KEUTZER, K
    INTEGRATION-THE VLSI JOURNAL, 1991, 12 (02) : 109 - 129
  • [9] A graph theoretic approach to automata minimality
    Restivo, Antonio
    Vaglica, Roberto
    THEORETICAL COMPUTER SCIENCE, 2012, 429 : 282 - 291
  • [10] A graph-theoretic approach to steganography
    Hetzl, S
    Mutzel, P
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 119 - 128