Determining Relevance of Accesses at Runtime (Extended Version)

Consider the situation where a query is to be answered using Web sources that restrict the accesses that can be made on backend relational data by requiring some attributes to be given as input of the service. The accesses provide lookups on the collection of attributes values that match the binding. They can differ in whether or not they require arguments to be generated from prior accesses. Prior work has focused on the question of whether a query can be answered using a set of data sources, and in developing static access plans (e.g., Datalog programs) that implement query answering. We are interested in dynamic aspects of the query answering problem: given partial information about the data, which accesses could provide relevant data for answering a given query? We consider immediate and long-term notions of "relevant accesses", and ascertain the complexity of query relevance, for both conjunctive queries and arbitrary positive queries. In the process, we relate dynamic relevance of an access to query containment under access limitations and characterize the complexity of this problem; we produce several complexity results about containment that are of interest by themselves.

[1]  Alin Deutsch,et al.  Rewriting queries using views with access patterns under integrity constraints , 2005, Theor. Comput. Sci..

[2]  Edward Y. Chang,et al.  On Answering Queries in the Presence of Limited Access Patterns , 2001, ICDT.

[3]  Jeffrey D. Ullman,et al.  Principles of Database and Knowledge-Base Systems, Volume II , 1988, Principles of computer science series.

[4]  Serge Abiteboul,et al.  Satisfiability and relevance for queries over active documents , 2009, PODS.

[5]  Mihalis Yannakakis,et al.  Equivalences Among Relational Expressions with the Union and Difference Operators , 1980, J. ACM.

[6]  Ashok K. Chandra,et al.  Optimal implementation of conjunctive queries in relational data bases , 1977, STOC '77.

[7]  Diego Calvanese,et al.  Containment of Conjunctive Regular Path Queries with Inverse , 2000, KR.

[8]  Edward Y. Chang,et al.  Answering queries with useful bindings , 2001, TODS.

[9]  Dan Suciu,et al.  Query containment for conjunctive queries with regular expressions , 1998, PODS.

[10]  Surajit Chaudhuri,et al.  On the equivalence of recursive and nonrecursive datalog programs , 1992, J. Comput. Syst. Sci..

[11]  Andrea Calì,et al.  Conjunctive Query Containment under Access Limitations , 2008, ER.

[12]  Bertram Ludäscher,et al.  Processing first-order queries under limited access patterns , 2004, PODS '04.

[13]  Andrea Calì,et al.  Dynamic Query Optimization under Access Limitations and Dependencies , 2009, J. Univers. Comput. Sci..

[14]  Bertram Ludäscher,et al.  Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns , 2004, EDBT.

[15]  Chen Li,et al.  Computing complete answers to queries in the presence of limited access patterns , 2003, The VLDB Journal.

[16]  Anand Rajaraman,et al.  Answering queries using templates with binding patterns (extended abstract) , 1995, PODS.

[17]  Georg Gottlob,et al.  Determining relevance of accesses at runtime , 2011, PODS.

[18]  David S. Johnson,et al.  A Catalog of Complexity Classes , 1991, Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity.

[19]  Jeffrey D. Uuman Principles of database and knowledge- base systems , 1989 .

[20]  Alon Y. Halevy,et al.  Recursive Plans for Information Gathering , 1997, IJCAI.

[21]  Alon Y. Halevy,et al.  Answering queries using views: A survey , 2001, The VLDB Journal.

[22]  Haim Gaifman,et al.  Decidable optimization problems for database logic programs , 1988, STOC '88.

[23]  Serge Abiteboul,et al.  Foundations of Databases , 1994 .

[24]  J. Van Leeuwen,et al.  Handbook of theoretical computer science - Part A: Algorithms and complexity; Part B: Formal models and semantics , 1990 .

[25]  Surajit Chaudhuri,et al.  On the complexity of equivalence between recursive and nonrecursive Datalog programs , 1994, PODS '94.

[26]  Andrea Calì,et al.  Querying Data under Access Limitations , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[27]  K. Chang,et al.  Accessing the Deep Web : A Survey , 2005 .

[28]  Gerhard Weikum,et al.  Active knowledge: dynamically enriching RDF knowledge bases by web services , 2010, SIGMOD Conference.

[29]  Dan Suciu,et al.  A formal analysis of information disclosure in data exchange , 2004, SIGMOD '04.