Semiring Provenance for First-Order Model Checking
نویسندگان
چکیده
Given a first-order sentence, a model-checking computation tests whether the sentence holds true in a given finite structure. Data provenance extracts from this computation an abstraction of the manner in which its result depends on the data items that describe the model. Previous work on provenance was, to a large extent, restricted to the negation-free fragment of first-order logic and showed how provenance abstractions can be usefully described as elements of commutative semirings— most generally as multivariate polynomials with positive integer coefficients. In this paper we introduce a novel approach to dealing with negation and a corresponding commutative semiring of polynomials with dual indeterminates. These polynomials are used to perform reverse provenance analysis, i.e., finding models that satisfy various properties under given provenance tracking assumptions.
منابع مشابه
First-Order Provenance Games
We propose a new model of provenance, based on a game-theoretic approach to query evaluation. First, we study gamesG in their own right, and ask how to explain that a position x in G is won, lost, or drawn. The resulting notion of game provenance is closely related to winning strategies, and excludes from provenance all “bad moves”, i.e., those which unnecessarily allow the opponent to improve ...
متن کاملTowards Constraint Provenance Games
Provenance for positive queries is well understood and elegantly handled by provenance semirings [GKT07], which subsume many earlier approaches. However, the semiring approach does not extend easily to why-not provenance or, more generally, first-order queries with negation. An alternative approach is to view query evaluation as a game between two players who argue whether, for given database I...
متن کاملSemiring-based Specification Approaches for Quantitative Security
Our goal is to provide different semiring-based formal tools for the specification of security requirements: we quantitatively enhance the open-system approach, according to which a system is partially specified. Therefore, we suppose the existence of an unknown and possibly malicious agent that interacts in parallel with the system. Two specification frameworks are designed along two different...
متن کاملProvenance Analysis for Missing Answers and Integrity Repairs
Data provenance approaches track how the answer to a database query derive from input items; however, prior approaches used “positive” provenance and were not directly usable for explaining “expected” but missing answers. A similar problem arises with the failure of integrity constraints. Our perspective is to offer explanations via possible (minimal) repairs using provenance. This is useful fo...
متن کاملProvenance for Nondeterministic Order-Aware Queries
Data transformations that involve (partial) ordering, and consolidate data in presence of uncertainty, are common in the context of various applications. The complexity of such transformations, in addition to the possible presence of meta-data, call for provenance support. We introduce, for the first time, a framework that accounts for the conjunction of these needs. To this end, we enrich the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1712.01980 شماره
صفحات -
تاریخ انتشار 2017