Composition of mappings given by embedded dependencies

被引:17
|
作者
Nash, Alan
Bernstein, Philip A.
Melnik, Sergey
机构
[1] Univ Calif San Diego, Dept Math, La Jolla, CA 92093 USA
[2] Univ Calif San Diego, Dept Comp Sci, La Jolla, CA 92093 USA
[3] Microsoft Res, Redmond, WA 98052 USA
来源
ACM TRANSACTIONS ON DATABASE SYSTEMS | 2007年 / 32卷 / 01期
关键词
algorithms; management; theory; metadata management; database theory;
D O I
10.1145/1206049.1206053
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Composition of mappings between schemas is essential to support schema evolution, data exchange, data integration, and other data management tasks. In many applications, mappings are given by embedded dependencies. In this article, we study the issues involved in composing such mappings. Our algorithms and results extend those of Fagin et al. [2004], who studied the composition of mappings given by several kinds of constraints. In particular, they proved that full source-to-target tuple-generating dependencies (tgds) are closed under composition, but embedded source-to-target tgds are not. They introduced a class of second-order constraints, SO tgds, that is closed under composition and has desirable properties for data exchange. We study constraints that need not be source-to-target and we concentrate on obtaining (first-order) embedded dependencies. As part of this study, we also consider full dependencies and second-order constraints that arise from Skolemizing embedded dependencies. For each of the three classes of mappings that we study, we provide: (a) an algorithm that attempts to compute the composition; and (b) sufficient conditions on the input mappings which guarantee that the algorithm will succeed. In addition, we give several negative results. In particular, we show that full and second-order dependencies that are not limited to be source-to-target are not closed under composition (for the latter, under the additional restriction that no new function symbols are introduced). Furthermore, we show that, determining whether the composition can be given by these kinds of dependencies is undecidable.
引用
收藏
页数:51
相关论文
共 50 条
  • [11] Discovery Algorithms for Embedded Functional Dependencies
    Wei, Ziheng
    Hartmann, Sven
    Link, Sebastian
    SIGMOD'20: PROCEEDINGS OF THE 2020 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2020, : 833 - 843
  • [12] Dependencies among attributes given by fuzzy confirmation measures
    Kupka, Jiri
    Tomanova, Iva
    EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (09) : 7591 - 7599
  • [13] ON QUASICONFORMAL MAPPINGS WITH GIVEN BOUNDARY-VALUES
    JENKINS, JA
    INDIANA UNIVERSITY MATHEMATICS JOURNAL, 1988, 37 (04) : 929 - 934
  • [14] INFINITE GROUPS OF MAPPINGS GIVEN BY DIFFERENTIAL EQUATIONS
    OVSIANNIKOV, LV
    DOKLADY AKADEMII NAUK SSSR, 1963, 148 (01): : 36 - &
  • [15] EXISTENCE OF QUASICONFORMAL MAPPINGS IN A GIVEN HARDY SPACE
    Bouchala, Ondrej
    Koskela, Pekka
    PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY, 2024, 152 (01) : 177 - 191
  • [16] EXTREMAL QUASICONFORMAL MAPPINGS WITH GIVEN BOUNDARY CORRESPONDENCE
    SHERETOV, BG
    SIBERIAN MATHEMATICAL JOURNAL, 1978, 19 (04) : 671 - 678
  • [17] EXTREMAL QUASICONFORMAL MAPPINGS WITH A GIVEN BOUNDARY CORRESPONDENCE
    KRUSHKAL, SL
    DOKLADY AKADEMII NAUK SSSR, 1967, 175 (03): : 525 - &
  • [18] Random mappings with a given number of cyclical points
    Hansen, Jennie C.
    Jaworski, Jerzy
    ARS COMBINATORIA, 2010, 94 : 341 - 359
  • [19] Localized attacks on spatially embedded networks with dependencies
    Yehiel Berezin
    Amir Bashan
    Michael M. Danziger
    Daqing Li
    Shlomo Havlin
    Scientific Reports, 5
  • [20] Localized attacks on spatially embedded networks with dependencies
    Berezin, Yehiel
    Bashan, Amir
    Danziger, Michael M.
    Li, Daqing
    Havlin, Shlomo
    SCIENTIFIC REPORTS, 2015, 5