Conjunctive Query Containment under Access Limitations
نویسندگان
چکیده
Access limitations may occur when querying data sources over the web or heterogeneous data sources presented as relational tables: this happens, for instance, in Data Exchange and Integration, Data Warehousing, and Web Information Systems. Access limitations force certain attributes to be selected in order to access the tables. It is known that evaluating a conjunctive query under such access restrictions amounts to evaluating a possibly recursive Datalog program. We address the problem of checking containment of conjunctive queries under access limitations, which is highly relevant in query optimization. Checking containment in such a setting would amount to checking containment of recursive Datalog programs of a certain class, while, for general Datalog programs, this problem is undecidable. We propose a decision procedure for query containment based on the novel notion of crayfish-chase, showing that containment can be decided in co-nexptime, which improves upon the known bound of 2exptime. Moreover, by means of a direct proof, our technique provides a new insight into the structure of the problem.
منابع مشابه
Containment of Conjunctive Queries under Access Limitations ( extended abstract )
Relational data may have access limitations, i.e., relations may require certain attributes to be selected when they are accessed; this happens, for instance, while querying web data sources (wrapped in relational form) or legacy databases. It is known that the evaluation of a conjunctive query under access limitations requires a recursive algorithm that is encoded into a Datalog program. In th...
متن کاملQuery Containment in the Presence of Limited Access Patterns
In information-integration systems, sources may have access pattern limitations, i.e., they require values for certain attributes to return tuples. In this paper we study the following problem: given views with access pattern limitations, how to test whether the maximal answer to a conjunctive query (CQ) is contained in that to another CQ? Since a datalog program is necessary to compute the max...
متن کاملDetermining Relevance of Accesses at Runtime (Extended Version)
Consider the situation where a query is to be answered using Web sources that restrict the accesses that can be made on backend relational data by requiring some attributes to be given as input of the service. The accesses provide lookups on the collection of attributes values that match the binding. They can differ in whether or not they require arguments to be generated from prior accesses. P...
متن کاملOn the finite controllability of conjunctive query answering in databases under open-world assumption
In this paper we study queries over relational databases with integrity constraints (ICs). The main problem we analyze is OWA query answering, i.e., query answering over a database with ICs under open-world assumption. The kinds of ICs that we consider are inclusion dependencies and functional dependencies, in particular key dependencies; the query languages we consider are conjunctive queries ...
متن کاملA pr 2 01 1 Determining Relevance of Accesses at Runtime ( Extended
Consider the situation where a query is to be answered using Web sources that restrict the accesses that can be made on backend relational data by requiring some attributes to be given as input of the service. The accesses provide lookups on the collection of attributes values that match the binding. They can differ in whether or not they require arguments to be generated from prior accesses. P...
متن کامل