Conjunctive Query Containment under Access Limitations

Access limitations may occur when querying data sources over the web or heterogeneous data sources presented as relational tables: this happens, for instance, in Data Exchange and Integration, Data Warehousing, and Web Information Systems. Access limitations force certain attributes to be selected in order to access the tables. It is known that evaluating a conjunctive query under such access restrictions amounts to evaluating a possibly recursive Datalog program. We address the problem of checking containment of conjunctive queries under access limitations, which is highly relevant in query optimization. Checking containment in such a setting would amount to checking containment of recursive Datalog programs of a certain class, while, for general Datalog programs, this problem is undecidable. We propose a decision procedure for query containment based on the novel notion of crayfish-chase, showing that containment can be decided in co- nexptime , which improves upon the known bound of 2exptime . Moreover, by means of a direct proof, our technique provides a new insight into the structure of the problem.

[1]  Edward Y. Chang,et al.  Query planning with limited source capabilities , 2000, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073).

[2]  Ronald Fagin,et al.  Data exchange: semantics and query answering , 2003, Theor. Comput. Sci..

[3]  David S. Johnson,et al.  Testing containment of conjunctive queries under functional and inclusion dependencies , 1982, J. Comput. Syst. Sci..

[4]  Andrea Calì,et al.  Optimization of Query Plans in the presence of Access Limitations , 2007, EROW.

[5]  Ioana Manolescu,et al.  Query optimization in the presence of limited access patterns , 1999, SIGMOD '99.

[6]  Alon Y. Halevy,et al.  Answering queries using views: A survey , 2001, The VLDB Journal.

[7]  Serge Abiteboul,et al.  Foundations of Databases , 1994 .

[8]  Ashok K. Chandra,et al.  Optimal implementation of conjunctive queries in relational data bases , 1977, STOC '77.

[9]  Jeffrey D. Ullman,et al.  Information integration using logical views , 1997, Theor. Comput. Sci..

[10]  Alin Deutsch,et al.  Rewriting queries using views with access patterns under integrity constraints , 2005, Theor. Comput. Sci..

[11]  Richard Hull,et al.  Managing semantic heterogeneity in databases: a theoretical prospective , 1997, PODS.

[12]  Edward Y. Chang,et al.  On Answering Queries in the Presence of Limited Access Patterns , 2001, ICDT.

[13]  Edward Y. Chang,et al.  Answering queries with useful bindings , 2001, TODS.

[14]  Wolfgang Lindner,et al.  Current Trends in Database Technology - EDBT 2004 Workshops, EDBT 2004 Workshops PhD, DataX, PIM, P2P&DB, and ClustWeb, Heraklion, Crete, Greece, March 14-18, 2004, Revised Selected Papers , 2004, EDBT Workshops.

[15]  Alon Y. Halevy,et al.  Recursive Plans for Information Gathering , 1997, IJCAI.

[16]  Andrea Calì,et al.  Optimising Query Answering in the Presence of Access Limitations (Position Paper) , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).

[17]  Jeffrey D. Ullman,et al.  Answering queries using templates with binding patterns (extended abstract) , 1995, PODS '95.

[18]  Diego Calvanese,et al.  Containment of Conjunctive Queries under Access Limitations ( extended abstract ) , 2006 .

[19]  Todd D. Millstein,et al.  Query containment for data integration systems , 2003, J. Comput. Syst. Sci..

[20]  Sanjeev Khanna,et al.  Why and Where: A Characterization of Data Provenance , 2001, ICDT.

[21]  Andrea Calì,et al.  Containment of Conjunctive Queries under Access Limitations , 2006, SEBD.

[22]  Dan Suciu,et al.  Adding Structure to Unstructured Data , 1997, ICDT.

[23]  Michael Kifer,et al.  Efficiently ordering subgoals with access constraints , 2006, PODS '06.

[24]  Haim Gaifman,et al.  Decidable optimization problems for database logic programs , 1988, STOC '88.

[25]  Andrea Calì,et al.  Optimized Querying of Integrated Data over the Web , 2002, Engineering Information Systems in the Internet Context.

[26]  Bertram Ludäscher,et al.  Processing first-order queries under limited access patterns , 2004, PODS '04.

[27]  Bertram Ludäscher,et al.  Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns , 2004, EDBT.

[28]  Chen Li,et al.  Computing complete answers to queries in the presence of limited access patterns , 2003, The VLDB Journal.

[29]  Anand Rajaraman,et al.  Answering queries using templates with binding patterns (extended abstract) , 1995, PODS.

[30]  Surajit Chaudhuri,et al.  On the Equivalence of Recursive and Nonrecursive Datalog Programs , 1997, J. Comput. Syst. Sci..