Advertisement

Intentions of Operations – Characterization and Preservation

  • Mira Balaban
  • Steffen Jurk
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2784)

Abstract

Frequent changes of software requirements imply changes of the underlying database, like database schema, integrity constraints, as well as database transactions and programs. Tools like ERWin, DBMain and Silverrun help developers in applying these changes. Yet, the automatic derivation might pose a problem: Since the developer is not aware of the details of the derivation applications, the resulting programs might include contradictory actions. That is, intentions of programs might be reversed by the automatic derivation, resulting a different behavior than expected by the developer.

In this paper, a compile-time algorithm that achieves preservation of intentions is suggested. The algorithm revises a composite program into a program without contradictory actions. It is based on a fine analysis of effects, that is sensitive to computation paths. The output program is expressive and efficient since it interleaves run-time sensitive analysis of already reduced effects within the input program. The compile-time reduction of effects accounts for the efficiency; the run-time sensitivity of effects accounts for the expressiveness. The novelty of the proposed approach is in combining static and dynamic analysis in a way that run-time overhead is minimized without sacrificing the expressivity of the resulting program.

Keywords

Integrity Constraint Computation Tree Database Schema Computation Path Deductive Database 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dijkstra, E.W., Scholten, C.S.: Predicate calculus and program semantics. In: Texts and Monographs in Computer Science, Springer, Heidelberg (1989)Google Scholar
  2. 2.
    Schewe, K.D., Thalheim, B.: Limitations of Rule Triggering Systems for Integrity Maintenance in the context of Transition Specifications. Acta Cybernetica (1998)Google Scholar
  3. 3.
    Balaban, M., Jurk, S.: Improving Integrity Constraint Enforcement by Extended Rules and Dependency Graphs. In: Proc. 22th Conf. on DEXA (2001)Google Scholar
  4. 4.
    Balaban, M., Jurk, S.: Intention of Updates - Characterization and Preservation. Technical report, Ben-Gurion University, Israel and BTU Cottbus, Germany (2002)Google Scholar
  5. 5.
    Bry, F.: Intensional updates: Abduction via deduction. In: Proc. 7th Conf. on Logi Programming (1990)Google Scholar
  6. 6.
    Nelson, G.: A generalization of dijkstras calculus. ACM Transactions on Programming Languages and Systems 11, 517–561 (1989)CrossRefGoogle Scholar
  7. 7.
    Fraternali, P., Paraboschi, S., Tanca, L.: Automatic Rule Generation for Constraints Enforcement in Active Databases. WICS. Springer, Heidelberg (1993)Google Scholar
  8. 8.
    Pastor, J.A.: Extending the synthesis of update transaction programs to handle existential rules in deductive databases. In: Deductive Approach to Information Systems and Databases, pp. 189–218 (1994)Google Scholar
  9. 9.
    Pastor-Collado, J.A., Olive, A.: Supporting transaction design in conceptual modelling of information systems. In: Conference on Advanced Information Systems Engineering, pp. 40–53 (1995)Google Scholar
  10. 10.
    Plexousakis, D., Mylopoulos, J.: Accommodating integrity constraints during database design. LNCS, vol. 1057. springer, Hedielberg (1996)Google Scholar
  11. 11.
    Schewe, K.D., Thalheim, B.: Towards a theory of consistency enforcement. Acta Informatics 36, 97–141 (1999)zbMATHCrossRefMathSciNetGoogle Scholar
  12. 12.
    Lee, S.Y., Ling, T.W.: Further Improvement on Integrity Constraint Checking for Stratisfiable Deductive Databases. In: Proc. 22th Conf. on VLDB (1996)Google Scholar
  13. 13.
    Widom, J., Ceri, S.: Deriving production rules for constraint maintenance. In: Proc. 16th Conf. on VLDB, pp. 566–577 (1990)Google Scholar
  14. 14.
    Widom, J., Ceri, S.: Active Database Systems. Morgan Kaufmann, San Francisco (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Mira Balaban
    • 1
  • Steffen Jurk
    • 2
  1. 1.Ben-Gurion UniversityBeer-ShevaIsrael
  2. 2.Brandenburg Technical UniversityCottbusGermany

Personalised recommendations