[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1514894acmotherconferencesBook PagePublication PagesedbtConference Proceedingsconference-collections
ICDT '09: Proceedings of the 12th International Conference on Database Theory
ACM2009 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
EDBT/ICDT '09: EDBT/ICDT '09 joint conference St. Petersburg Russia March 23 - 25, 2009
ISBN:
978-1-60558-423-2
Published:
23 March 2009

Reflects downloads up to 12 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

The papers here were presented at the 12th International Conference on Database Theory (ICDT '09), held in St. Petersburg, Russia, March 23--25, 2009. Until this year, ICDT was held every two years, with the preceding ICDT being held in 2007. From now on, ICDT will be held annually. Beginning this year, ICDT is being held jointly with EDBT ("Extending Database Technology"). EDBT is being held on March 24--26, 2009.

In response to a Call for Papers, 77 submissions were received by the submission deadline of August 14, 2008. All were submitted electronically through EasyChair. EasyChair was also used for the Program Committee deliberations, which were held completely electronically. The Program Committee selected 25 papers for presentation. The paper "Repair Checking in Inconsistent Databases: Algorithms and Complexity" by Foto Afrati and Phokion Kolaitis, was selected for the ICDT Best Paper Award. The paper "Containment of Conjunctive Queries on Annotated Relations", by Todd J. Green, was selected for the ICDT Best Student Paper Award. In addition, there are two Keynote Speakers: Georg Gottlob and Victor Vianu. Furthermore, Umesh Dayal is a Keynote Speaker for EDBT.

The submissions were not formally refereed and many of these papers represent reports of continuing research. It is expected that most of them will appear in a more polished and complete form in scientific journals.

Skip Table Of Content Section
SESSION: Invited papers
research-article
Free
Automatic verification of database-driven systems: a new frontier

We describe a novel approach to verification of software systems centered around an underlying database. Instead of applying general-purpose techniques with only partial guarantees of success, it identifies restricted but reasonably expressive classes ...

research-article
Free
Datalog±: a unified approach to ontologies and integrity constraints

We report on a recently introduced family of expressive extensions of Datalog, called Datalog±, which is a new framework for representing ontological axioms in form of integrity constraints, and for query answering under such constraints. Datalog± is ...

SESSION: Inconsistency and repairs
research-article
Free
Repair checking in inconsistent databases: algorithms and complexity

Managing inconsistency in databases has long been recognized as an important problem. One of the most promising approaches to coping with inconsistency in databases is the framework of database repairs, which has been the topic of an extensive ...

research-article
Free
Consistent query answering under primary keys: a characterization of tractable queries

This article deals with consistent query answering to conjunctive queries under primary key constraints. The repairs of an inconsistent database db are obtained by selecting a maximum number of tuples from db without ever selecting two tuples that agree ...

research-article
Free
On approximating optimum repairs for functional dependency violations

We study the problem of repairing an inconsistent database that violates a set of functional dependencies by making the smallest possible value modifications. For an inconsistent database, we define an optimum repair as a database that satisfies the ...

SESSION: Data exchange
research-article
Free
Structural characterizations of schema-mapping languages

Schema mappings are declarative specifications that describe the relationship between two database schemas. In recent years, there has been an extensive study of schema mappings and of their applications to several different data inter-operability tasks,...

research-article
Free
Query languages for data exchange: beyond unions of conjunctive queries

The class of unions of conjunctive queries (UCQ) has been shown to be particularly well-behaved for data exchange; its certain answers can be computed in polynomial time (in terms of data complexity). However, this is not the only class with this ...

research-article
Free
Querying data sources that export infinite sets of views

We study the problem of querying data sources that accept only a limited set of queries, such as sources accessible by Web services which can implement very large (potentially infinite) families of queries. We revisit a classical setting in which the ...

SESSION: Data structures and algorithms
research-article
Free
Optimal splitters for database partitioning with size bounds

Partitioning is an important step in several database algorithms, including sorting, aggregation, and joins. Partitioning is also fundamental for dividing work into equal-sized (or balanced) parallel subtasks. In this paper, we aim to find, materialize ...

research-article
Free
Efficient data structures for range-aggregate queries on trees

Graph-theoretic aggregation problems have been considered both in OLAP (grid graph) and XML (tree). This paper gives new results for MIN aggregation in a tree, where we want the MIN in a query subtree consisting of the nodes reachable from a node u ...

research-article
Free
Faster join-projects and sparse matrix multiplications

Computing an equi-join followed by a duplicate eliminating projection is conventionally done by performing the two operations in serial. If some join attribute is projected away the intermediate result may be much larger than both the input and the ...

SESSION: Uncertain databases
research-article
Free
A compositional query algebra for second-order logic and uncertain databases

World-set algebra is a variable-free query language for uncertain databases. It constitutes the core of the query language implemented in MayBMS, an uncertain database system. This paper shows that world-set algebra captures exactly second-order logic ...

research-article
Free
A logical account of uncertain databases based on linear logic

A formal semantics of uncertain databases typically takes an algebraic approach by mapping an uncertain database to a set of relational databases, or possible worlds. We present a new semantics for uncertain databases which takes a logical approach by ...

research-article
Free
A compositional framework for complex queries over uncertain data

The ability to flexibly compose confidence computation with the operations of relational algebra is an important feature of probabilistic database query languages. Computing confidences is computationally hard, however, and has to be approximated in ...

SESSION: XML
research-article
Free
Incremental XPath evaluation

We study the problem of incrementally maintaining an XPath query on an XML database under updates. The updates we consider are node insertion, node deletion, and node relabeling. Our main results are that downward XPath queries can be incrementally ...

research-article
Free
Efficient asymmetric inclusion between regular expression types

The inclusion of Regular Expressions (REs) is the kernel of any subtype checking algorithm for XML schema languages. XML applications would benefit from the extension of REs with interleaving and counting, but this is not feasible in general, since ...

research-article
Free
How big must complete XML query languages be?

Marx and de Rijke have shown that the navigational core of the w3c XML query language XPath is not first-order complete -- that is it cannot express every query definable in firstorder logic over the navigational predicates. How can one extend XPath to ...

SESSION: Querying
research-article
Free
Towards a theory of search queries

The need to manage diverse information sources has triggered the rise of very loosely structured data models, known as "dataspace models." Such information management systems must allow querying in simple ways, mostly by a form of searching. Motivated ...

research-article
Free
Reconcilable differences

Exact query reformulation using views in positive relational languages is well understood, and has a variety of applications in query optimization and data sharing. Generalizations to larger fragments of the relational algebra (RA) --- specifically, ...

SESSION: Business processes
research-article
Free
Automatic construction of simple artifact-based business processes

Almost all medium- and large-scale businesses rely on electronic workflow systems to manage their business processes. A key challenge is to enable the easy re-use and modification of these workflow schemas and their piece-parts, so that they can be ...

research-article
Free
TOP-K projection queries for probabilistic business processes

A Business Process (BP) consists of some business activities undertaken by one or more organizations in pursuit of some business goal. Tools for querying and analyzing BP specifications are extremely valuable for companies. In particular, given a BP ...

research-article
Free
Automatic verification of data-centric business processes

We formalize and study business process systems that are centered around "business artifacts", or simply "artifacts". Artifacts are used to represent (real or conceptual) key business entities, including both their data schema and lifecycles. The ...

SESSION: Streams, data mining, complexity
research-article
Free
Tight results for clustering and summarizing data streams

In this paper we investigate algorithms and lower bounds for summarization problems over a single pass data stream. In particular we focus on histogram construction and K-center clustering. We provide a simple framework that improves upon all previous ...

research-article
Free
Analysis of sampling techniques for association rule mining

In this paper, we present a comprehensive theoretical analysis of the sampling technique for the association rule mining problem. Most of the previous works have concentrated only on the empirical evaluation of the effectiveness of sampling for the step ...

research-article
Free
The average-case complexity of counting distinct elements

We continue the study of approximating the number of distinct elements in a data stream of length n to within a (1 ± ε) factor. It is known that if the stream may consist of arbitrary data arriving in an arbitrary order, then any 1-pass algorithm ...

SESSION: Provenance
research-article
Free
Containment of conjunctive queries on annotated relations

We study containment and equivalence of (unions of) conjunctive queries on relations annotated with elements of a commutative semiring. Such relations and the semantics of positive relational queries on them were introduced in a recent paper as a ...

research-article
Free
Optimizing user views for workflows

A technique called user views has recently been proposed to focus user attention on relevant information in response to provenance queries over workflow executions [1, 2]: Given user input on what modules in the workflow specification are relevant to ...

Contributors
  • IBM Research
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations