Local Veri cation of Global Integrity Constraints in

نویسندگان

  • Ashish Gupta
  • Jennifer Widom
چکیده

We present an optimization for integrity constraint veriication in distributed databases. The optimization allows a global constraint, i.e. a constraint spanning multiple databases, to be veriied by accessing data at a single database, eliminating the cost of accessing remote data. The optimization is based on an algorithm that takes as input a global constraint and data to be inserted into a local database. The algorithm produces a local condition such that if the local data satisses this condition then, based on the previous satisfaction of the global constraint, the global constraint is still satissed. If the local data does not satisfy the condition, then a conventional global veriication procedure is required.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity

A multidatabase poses the following four, often contradictory, requirements. First, local databases require both design autonomy to accommodate the diverse legacy nature of the local databases, and execution autonomy to ensure that local transactions are not unduly blocked by global transactions. Second, management of global transactions must be distributed to avoid bottlenecks and to tolerate ...

متن کامل

Describing Integrity Constraints in Advanced Database Systems

In advanced database applications, specifying integrity constraints in a declarative way allows to maintain the database consistency so that the database satis es the integrity constraints. By associating each data with its status, in this paper, we show the consistency information of advanced database applications can be expressed declaratively by a set of clauses, which are classi ed into fou...

متن کامل

O!-line arabic signature recognition and veri"cation

O!-line signature recognition and veri"cation is an important part of many business processes. It can be used in many applications such as cheques, certi"cates, contracts and historical documents. In this paper, a system of two separate phases for signature recognition and veri"cation is developed. A recognition technique is developed based on a multistage classi"er and a combination of global ...

متن کامل

Towards a Verification Technique for Large Synchronous Circuits

We present a symbolic simulation based veri cation approach which can be applied to large synchronous circuits A new technique to encode the state and input constraints as parametric Boolean expressions over the state and input variables is used to make our symbolic simulation based veri cation approach e cient The constraints which are encoded through parametric Boolean expressions can involve...

متن کامل

Forgery Detection by Local Correspondence Forgery Detection by Local Correspondence Forgery Detection by Local Correspondence

Signatures may be stylish or unconventional and have many personal characteristics that are challenging to reproduce by anyone other then the original author For this reason signatures are used and accepted as proof of authorship or consent on personal checks credit purchases and legal documents Currently signatures are veri ed only informally in many environments but the rapid development of c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993