Abstract
Koenig and Paige have presented a view maintenance strategy based on finite differencing for explicitly storing the values of database views, and updating these values whenever parameters on which they depend are modified. Examples were given that illustrated how this view maintenance strategy could be used to monitor integrity constraints. In this paper, we extend that idea to demonstrate how a DBMS can automatically define its own views that will be maintained efficiently by differencing. Based on this approach, we define a new class of deferred integrity constraints that can be monitored efficiently. In particular we show that the computational cost of each block of constraint monitoring code introduced within the original unmonitored code is bounded by a constant. It is also shown how this approach provides a simple and unified solution to the problem of integrity control and query/ transaction optimization.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Allen, F. E. [1969] “Program Optimization”, Annual Review of Automatic Programming Vol. 5 ,(1969) 239–307.
Bernstein, P. A., Blaustein, B. T., and Clarke, E. M. [1980] “Fast Maintenance of Semantic Integrity Assertions using Redundant Aggregate Data,” Proceedings 6th International Conference on VLDB ,Montreal, Canada, October 1980, 126–136.
Blaustein, B. T. [1981] “Enforcing Database Assertions: Techniques and Applications,” Tech. Report TR-21-81, Center for Research in Computing Technology, Harvard University.
Chen, P.P.S. [1976] “The Entity -Relationship Model: Toward a Unified View of Data,” ACM TODS, 1 ,1 (Mar. 1976) 9–36.
Cocke, J. and Kennedy, K. [1977] “An Algorithm for Reduction of Operator Strength”, CACM 20 ,11 (Nov. 1977) 850–856.
Cocke, J. and Schwartz, J. T. [1969] Programming Languages and Their Compilers ,CIMS, New York University, 1969, Lecture Notes.
Codd, E. F. [1970] “A Relational Model of Data for Large Shared Data Banks,” CACM 13 ,6 (June 1970) 377–387.
Date, C. J. [1982] Introduction to Database Systems, II ,Addison-Wesley.
Downey, P., Sethi, R., and Tarjan, R. [1980] “Variations on the Common Subexpression Problem,” JACM 27 ,4 (Oct. 1980) 758–771.
Earley, J. [1976] “High Level Iterators and a Method for Automatically Designing Data Structure Representation,” Journal of Computer Languages 1 ,4 (1976) 321–342.
Fagin, R., Nievergelt, J., Pippenger, N. and Strong, J. [1979] “Extendible Hashing -A Fast Access Method for Dynamic Files,” ACM TODS 4 ,3 (Sept. 1979), 315–344.
Finkelstein, S. [1982] “Common Expression Analysis in Database Applications,” Proceedings ACM International Symposium on Management of Data ,235–245.
Fong, A. C. [1977] “Elimination of Common Subexpressions in Very High Level Languages,” Proceedings 4th ACM Symposium on Principles of Programming Languages ,48–57.
Fong, A. C. [1979] “Inductively Computable Constructs in Very High Level Languages,” Proceedings 6th ACM Symposium on Principles of Programming Languages ,21–28.
Fong, A. C. and Ullman, J. D. [1976] “Induction Variables in Very High Level Languages,” Proceedings Third ACM Symposium on Principles of Programming Languages ,104–112.
Grant, J. and Minker, J. [1982] “Numerical Dependencies,” Proceedings Workshop on the Logical Bases of Databases ,ONERA-CERT, Toulouse, France.
Halmos, P. R. [1960] Naive Set Theory, Van Nostrand.
Hammer, M., and Sarin, S. [1978] “Efficient Monitoring of Database Assertions,” Proceedings ACM International Symposium on Management of Data-Extension ,159–168.
Hecht, M. [1977] Flow Analysis of Computer Programs ,North-Holland.
Hoffmann, C. M., and O’Donnell, J. O. [1982] “Pattern Matching in Trees,” JACM 29, 1, (Jan. 1982), 68–95.
Kennedy, K. [1981] “A Survey of Compiler Optimization Techniques,” In: Program Flow Analysis (Muchnick, S. and Jones, N., Eds.), Prentice-Hall, 5–54.
Koenig, S. and Paige, R. [1981] “A Transformational Framework for the Automatic Control of Derived Data,” Proceedings 7th International Conference on VLDB ,306–318.
Nicolas, J. M. [1982] “Logic for Improving Integrity Checking in Relational Data Bases,” Acta Informatica 18 ,(1982), 227–253.
Paige, R. [1981] Formal Differentiation ,UMI Research Press, Ann Arbor, Mich., Rev. of Ph.D. thesis, NYU, June 1979.
Paige, R. [1983] “Transformational Programming -Applications to Algorithms and Systems,” Proceedings Tenth ACM Symposium on Principles of Programming Languages ,73–87.
Paige, R., and Koenig, S., [1982] “Finite Differencing of Computable Expressions,” ACM TOPLAS 4 ,3, (July 1982) 402–454.
Sarin, S. K. [1978] “Automatic Synthesis of Efficient Procedures for Database Semantic Integrity Checking,” Master’s thesis, M.I.T., Dept. of Computer Science.
Schonberg, E., Schwartz, J. T., and Sharir, M. [1981] “An Automatic Technique for Selection of Data Representations in SETL Programs,” ACM TOPLAS 3 ,2, (April 1981) 126–143.
Schwartz, J. T. [1974] On Programming: An Interim Report on the SETL Project, Installments I and II ,CIMS, New York Univ., New York.
Shipman, D. W. [1981] “The Functional Data Model and the Data Language DAPLEX,” ACM TODS 6 ,1, (March 1981) 140–173.
Sintzoff, M. [1972] “Calculating Properties of Programs by Valuations on Specific Models,” ACM SIGPLAN Notices, 7 ,1 (1972), 203–207.
Stonebraker, M. [1975] “Implementation of Integrity Constraints and Views by Query Modification,” Proceedings ACM International Symposium on Management of Data ,65–78.
Ullman, J. D. [1980] Principles of Database Systems ,Computer Science Press.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1984 Plenum Press, New York
About this chapter
Cite this chapter
Paige, R. (1984). Applications of Finite Differencing to Database Integrity Control and Query/Transaction Optimization. In: Gallaire, H., Minker, J., Nicolas, J.M. (eds) Advances in Data Base Theory. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-9385-0_7
Download citation
DOI: https://doi.org/10.1007/978-1-4615-9385-0_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4615-9387-4
Online ISBN: 978-1-4615-9385-0
eBook Packages: Springer Book Archive