Conjunctive Query Containment under Access Limitations
暂无分享,去创建一个
[1] Edward Y. Chang,et al. Query planning with limited source capabilities , 2000, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073).
[2] Ronald Fagin,et al. Data exchange: semantics and query answering , 2003, Theor. Comput. Sci..
[3] David S. Johnson,et al. Testing containment of conjunctive queries under functional and inclusion dependencies , 1982, J. Comput. Syst. Sci..
[4] Andrea Calì,et al. Optimization of Query Plans in the presence of Access Limitations , 2007, EROW.
[5] Ioana Manolescu,et al. Query optimization in the presence of limited access patterns , 1999, SIGMOD '99.
[6] Alon Y. Halevy,et al. Answering queries using views: A survey , 2001, The VLDB Journal.
[7] Serge Abiteboul,et al. Foundations of Databases , 1994 .
[8] Ashok K. Chandra,et al. Optimal implementation of conjunctive queries in relational data bases , 1977, STOC '77.
[9] Jeffrey D. Ullman,et al. Information integration using logical views , 1997, Theor. Comput. Sci..
[10] Alin Deutsch,et al. Rewriting queries using views with access patterns under integrity constraints , 2005, Theor. Comput. Sci..
[11] Richard Hull,et al. Managing semantic heterogeneity in databases: a theoretical prospective , 1997, PODS.
[12] Edward Y. Chang,et al. On Answering Queries in the Presence of Limited Access Patterns , 2001, ICDT.
[13] Edward Y. Chang,et al. Answering queries with useful bindings , 2001, TODS.
[14] Wolfgang Lindner,et al. Current Trends in Database Technology - EDBT 2004 Workshops, EDBT 2004 Workshops PhD, DataX, PIM, P2P&DB, and ClustWeb, Heraklion, Crete, Greece, March 14-18, 2004, Revised Selected Papers , 2004, EDBT Workshops.
[15] Alon Y. Halevy,et al. Recursive Plans for Information Gathering , 1997, IJCAI.
[16] Andrea Calì,et al. Optimising Query Answering in the Presence of Access Limitations (Position Paper) , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).
[17] Jeffrey D. Ullman,et al. Answering queries using templates with binding patterns (extended abstract) , 1995, PODS '95.
[18] Diego Calvanese,et al. Containment of Conjunctive Queries under Access Limitations ( extended abstract ) , 2006 .
[19] Todd D. Millstein,et al. Query containment for data integration systems , 2003, J. Comput. Syst. Sci..
[20] Sanjeev Khanna,et al. Why and Where: A Characterization of Data Provenance , 2001, ICDT.
[21] Andrea Calì,et al. Containment of Conjunctive Queries under Access Limitations , 2006, SEBD.
[22] Dan Suciu,et al. Adding Structure to Unstructured Data , 1997, ICDT.
[23] Michael Kifer,et al. Efficiently ordering subgoals with access constraints , 2006, PODS '06.
[24] Haim Gaifman,et al. Decidable optimization problems for database logic programs , 1988, STOC '88.
[25] Andrea Calì,et al. Optimized Querying of Integrated Data over the Web , 2002, Engineering Information Systems in the Internet Context.
[26] Bertram Ludäscher,et al. Processing first-order queries under limited access patterns , 2004, PODS '04.
[27] Bertram Ludäscher,et al. Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns , 2004, EDBT.
[28] Chen Li,et al. Computing complete answers to queries in the presence of limited access patterns , 2003, The VLDB Journal.
[29] Anand Rajaraman,et al. Answering queries using templates with binding patterns (extended abstract) , 1995, PODS.
[30] Surajit Chaudhuri,et al. On the Equivalence of Recursive and Nonrecursive Datalog Programs , 1997, J. Comput. Syst. Sci..