database (DB) theory borrows heavily from the field of LP. Logic programs try to find a single answer to a query and permit function symbols as arguments of.
The term “Semantics” is one of the overloaded in computer science and used ...
term “semantics ” has led to very different goals, methods, and applications. Se-.
Dec 8, 2000 - 7.1 Revision Programs and Dynamic Logic Programming . ... Logic programming has been conceived as a computational logic ...... IOS Press, 2000. .... [49] P. Rao, K.F. Sagonas, T. Swift, D.S. Warren, D.S., and J. Freire.
as an Assistant Professor until forever is most assuredly incorrect (others have ... contradicting the intuition that the \from" should always be before the \to" time.
where Ossi+1 = hfBindingj j hBindingj Uji 2 Set(T DBi)g EDBi+1 C ommiti,. EDBi+1 is (EDBi U). ..... Manual, 1981. 25] R. Fagin ... 30] H. Gaifman and E. Shapiro. .... icates using test and assignments which attempt to determine the values of the.
ECL has been used by KKR90] for the development of an extended relational ...... tutorial presented at the 12th ACM SIGACT-SIGMOD-SIGART. Symposium on ...
to define an image semantcs that can satisfy the user of a database. Images are designed to ... Amarnath Gupta is with the San Diego Supercomputer Center, [email protected]. 1 .... We call this concept emergent se- mantics. This concept has ...
of rules), and [4] define the semantics of Update Answer Sets for sequences of Extended. Logic Programs. In [4] ..... tions allows for the use of available answer-set software (e.g. SMODELS [14] and DLV .... Applications. IOS Press, 2003. 9.
Sep 30, 2011 - Figure 3: Overview of the 144 tables which have more than 10 million rows of one analyzed SAP Business Suite customer system. The.
are unsound for âtransformâ queries that perform embedded updates. In this pa- per, we ...... for managing safe concurrent access to XML databases. As stated in ...
got married before Christmas, but not John got married two weeks before ...... of Texas, Austin (reproduced by Indiana University Linguistics Club, 1978). KAMP ...
Feb 25, 2004 - If such a period is not specified, a period of now to forever is used, .... interpretation of such a period is non-time-varying: it is always [5,15).
of the theory that needs to be modi ed to achieve the required change to the minimal model structure. In section 4 we treat the class of range restricted DDDBs: a ...
tors which are mostly located on highways (e.g. toll booths) and intersections of major streets. This kind of information can be used to detect an oc- curence of ...
be the World Wide Web or a subset of it. ... depicting happinessâ or âan ironic text. .... Two examples of real-world multimedia objects are shown in Fig. 1. On the ...
Starting from Wittgenstein's considerations, Saul. Kripke (1982), Crispin Wright (1980, 2001) and other commentators have substantiated perplexities that lead ...
test the adequacy of semantics of logic program updates in some ... for updates based on the stable model semantics â as it ...... IOS Press, December 2003.
good individuals and useful citizens in a fast changing and globalised world. It ... Values, the 3 Big Ideas and the Exp
work with colleagues across the NHS, Welsh Government, and the UK to ensure as seamless a ..... to be a very interactive
continuous improvement in Faculty Team structures, functions, and support partnership ... HEIW will be working in shadow
The usage of accurate time to schedule updates in software defined networks was ... to occur, with clock-based near-simultaneous scheduling offering an ...
sufficient to trigger malignant transformation in the intestinal ... Munich, Freising 85354, Germany, E-mail: [email protected] ...... Targeted email marketing.
tent of the database, the so-called updale operation, is fun- plicit information. First we consider the problem of damental to all database management systems.
Eroc. Second ACM SIGACT-SIGMOD Symp. on P r i n c i p l e s of Database Systems, Atlanta, 1983, p p . 352-365
ON THE SEMANTICS OF UPDATES IN DATABASES Preliminary Report
Ronald Fagin IBM Research Laboratory San Jose, California 95193
t
Jeffrey D. Ullman Moshe Y. Vardi $:
Department of Computer Science Stanford University Stanford, California 94305
Abstract
1. Introduction
We suggest here a methodology for updating databases with integrity constrain& and rules for deriving inex-
The ability of the database user lo modify the content of the database, the so-called updale operation, is fun-
plicit information. First we consider the problem of updating arbitrary theories by inserting inu, them or deleting from them crbitrary sentences. The solution involves two key ideas: when replacing an old theory by a new one we wish lo niuiiniize the change in the theory,, and when there are several theories that involve minimal changes, we look for a new theory that reflects that ambiguity. The methodology is also adapted to updating databases. where
damental to all database management systems. Since many users do not deal with the entire conceptual database but only with a view of it, the problem of view updating, i.e., translating updates on a user view into updates of the actual database, is of paramount importance, and has been addressed by several works, e.g.. [BS, CA. C1, Da. DB1. DB2, FS, J a 2 . KD. Ke, KI, Os]. An assumption h a t underlies all of these works is that only the view update
different facts can carry different priorities, and lb updating user views.
issue is problematic (because of the ambiguity in translating view updates into database updates), and that the issue of updating the database directly is quite clear.
. I .
;F
Research partially supported by AFOSR grant 800212. Research supported.by a Weizmann Ptkt-doctoral Fellowship*F"lbright Award* and NSF Dcs81-12907.
Permission to copy without lee all or part of the mattnal i s graniicd provided that the copies arc not made or distributed for d i m t commercial advmnlmge, the ACM copyright notice and tk title of the publlutron and its date appur. and notice i s given that copying i s by prmiuion of the Assocution for Computing Machincry. To copg ocberwle. or to republish. rcquim a fee and/or specific permision. @
Some works ([NY.Sc, To]) have realized that there are difficulties in updating the database when it has to inieg"iy constraints. Collsider for example a database of propositional facts with the integrity constraint
A&B 3 C . If the database is initially { A 1 and we asked to insert B, then we have a problem because the shte { A , R ) is illegal. This seems to be easy to fix, because we can insert C auromntically and gct the legal state ( A . B , C ) . But what if we are now asked to dclete C? I i is not clear at all what is the operation to be taken.