Chain-split evaluation in deductive databases

A chain-split evaluation technique for the efficient evaluation of recursions in deductive databases is described. Three chain-split evaluation techniques: magic sets, buffered evaluation, and partial evaluation, are developed. The first one is applicable to the evaluation of function-free recursions. The latter two are applicable to both function-free and functional recursions. Partial evaluation is a further refinement of the buffered evaluation by evaluating the buffered functional predicates as much as possible to reduce the cost of maintaining the sequences of buffered values and facilitates termination judgment and constraint pushing. Chain-split evaluation is an important recursive query processing technique which can be implemented efficiently in deductive databases by extension to the available recursive query evaluation techniques.<<ETX>>

[1]  Carlo Zaniolo,et al.  Optimization in a Logic Based Language for Knowledge and Data Intensive Applications , 1988, EDBT.

[2]  Jeffrey F. Naughton,et al.  One-sided recursions , 1987, J. Comput. Syst. Sci..

[3]  Peter J. Stuckey,et al.  An Introduction to Aditi Deductive Database System , 1991, Aust. Comput. J..

[4]  Jeffrey D. Ullman,et al.  Principles Of Database And Knowledge-Base Systems , 1979 .

[5]  Jiawei Han,et al.  Automatic generation of compiled forms for linear recursions , 1992, Inf. Syst..

[6]  Leon Sterling,et al.  The Art of Prolog , 1987, IEEE Expert.

[7]  H. V. Jagadish,et al.  A study of transitive closure as a recursion mechanism , 1987, SIGMOD '87.

[8]  Jeffrey F. Naughton,et al.  A Counting Algorithm for a Cyclic Binary Query , 1991, J. Comput. Syst. Sci..

[9]  Raghu Ramakrishnan,et al.  Efficient Transitive Closure Algorithms , 1988, VLDB.

[10]  R. Ramakrishnan,et al.  A framework for testing safety and effective computability of extended datalog , 1988, SIGMOD '88.

[11]  Catriel Beeri,et al.  Bounds on the propagation of selection into logic programs , 1987, J. Comput. Syst. Sci..

[12]  Jiawei Han,et al.  Constraint-based reasoning in deductive databases , 1991, [1991] Proceedings. Seventh International Conference on Data Engineering.

[13]  Lawrence J. Henschen,et al.  The Level-Cycle Merging Method , 1989, DOOD.

[14]  Jiawei Han,et al.  Asynchronous Chain Recursions , 1989, IEEE Trans. Knowl. Data Eng..

[15]  Divesh Srivastava,et al.  Pushing Constraint Selections , 1993, J. Log. Program..

[16]  Patricia G. Selinger,et al.  Access path selection in a relational database management system , 1979, SIGMOD '79.

[17]  Qiang Wang,et al.  Evaluation of functional linear recursions: a compilation approach , 1991, Inf. Syst..

[18]  Abraham Silberschatz,et al.  Safety of recursive Horn clauses with infinite relations , 1987, PODS '87.

[19]  Yehoshua Sagiv,et al.  On Testing Effective Computability of Magic Programs , 1991, DOOD.

[20]  JIAWEI HAN,et al.  Compiling general linear recursions by variable connection graph analysis , 1989, Comput. Intell..

[21]  David Maier,et al.  Magic sets and other strange ways to implement logic programs (extended abstract) , 1985, PODS '86.