Querying Visible and Invisible Information

We provide a wide-ranging study of the scenario where a subset of the relations in the schema are visible — that is, their complete contents are known — while the remaining relations are invisible. We also have integrity constraints (invariants given by logical sentences) which may relate the visible relations to the invisible ones. We want to determine which information about a query (a positive existential sentence) can be inferred from the visible instance and the constraints. We consider both positive and negative query information, that is, whether the query or its negation holds. We consider the instance-level version of the problem, where both the query and the visible instance are given, as well as the schema-level version, where we want to know whether truth or falsity of the query can be inferred in some instance of the schema.

[1]  Serge Abiteboul,et al.  Complexity of answering queries using materialized views , 1998, PODS.

[2]  Balder ten Cate,et al.  Guarded Negation , 2011, Advances in Modal Logic.

[3]  Balder ten Cate,et al.  Queries with Guarded Negation , 2012, Proc. VLDB Endow..

[4]  Wenfei Fan,et al.  Relative information completeness , 2009, PODS.

[5]  Jerzy Marcinkowski,et al.  All-Instances Termination of Chase is Undecidable , 2014, ICALP.

[6]  Carsten Lutz,et al.  Conservative Extensions in the Lightweight Description Logic EL , 2007, CADE.

[7]  Carsten Lutz,et al.  Ontology-Mediated Queries with Closed Predicates , 2015, IJCAI.

[8]  Thomas Colcombet,et al.  The Complexity of Boundedness for Guarded Logics , 2015, 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science.

[9]  Alberto O. Mendelzon,et al.  Authorization Views and Conditional Query Containment , 2005, ICDT.

[10]  Alin Deutsch,et al.  The chase revisited , 2008, PODS.

[11]  David S. Johnson,et al.  Testing containment of conjunctive queries under functional and inclusion dependencies , 1982, J. Comput. Syst. Sci..

[12]  Carsten Lutz,et al.  Ontology-Based Data Access with Closed Predicates is Inherently Intractable(Sometimes) , 2013, IJCAI.

[13]  Dan Suciu,et al.  A formal analysis of information disclosure in data exchange , 2004, SIGMOD '04.

[14]  Michael Benedikt,et al.  Querying Visible and Invisible Tables in the Presence of Integrity Constraints , 2015, ArXiv.

[15]  Georg Gottlob,et al.  On the Complexity of Single-Rule Datalog Queries , 1999, LPAR.

[16]  Enrico Franconi,et al.  Query Answering with DBoxes is Hard , 2011, M4M/LAMAS.

[17]  Georg Gottlob,et al.  Querying the Guarded Fragment , 2010, 2010 25th Annual IEEE Symposium on Logic in Computer Science.

[18]  Dan Suciu,et al.  Query-Based Data Pricing , 2015, J. ACM.

[19]  Sebastian Rudolph,et al.  Walking the Complexity Lines for Generalized Guarded Existential Rules , 2011, IJCAI.

[20]  Serge Abiteboul,et al.  Foundations of Databases , 1994 .

[21]  Andrea Calì,et al.  Taming the Infinite Chase: Query Answering under Expressive Relational Constraints , 2008, Description Logics.

[22]  Ronald Fagin,et al.  Inclusion dependencies and their interaction with functional dependencies , 1982, PODS.

[23]  Chen C. Chang,et al.  Model Theory: Third Edition (Dover Books On Mathematics) By C.C. Chang;H. Jerome Keisler;Mathematics , 1966 .