[PDF][PDF] A Translation Algorithm for Effective RDB-to-XML Schema Conversion Considering Referential Integrity Information.
J Kim, D Jeong, DK Baik - Journal of Information Science & Engineering, 2009 - Citeseer
In this paper, we propose a new relational schema (R-schema) to XML Schema translation
algorithm that analyzes the cardinality between data values and patterns of user queries to …
algorithm that analyzes the cardinality between data values and patterns of user queries to …
Integrity checking and maintenance with active rules in XML databases
H Christiansen, M Rekouts - 24th British National Conference …, 2007 - ieeexplore.ieee.org
While specification languages for integrity constraints for XML data have been considered in
the literature, actual technologies and methodologies for checking and maintaining integrity …
the literature, actual technologies and methodologies for checking and maintaining integrity …
Automated insertion of exception handling for key and referential constraints
K Liu, HBK Tan - 2012 19th Asia-Pacific Software Engineering …, 2012 - ieeexplore.ieee.org
Key and referential constraints are the two main integrity constraints in database
applications. These constraints can be enforced by the Database Management System …
applications. These constraints can be enforced by the Database Management System …
VQT: value cardinality and query pattern based R-schema to XML schema translation with implicit referential integrity
J Kim, D Jeong, DK Baik - Journal of Zhejiang University-SCIENCE A, 2008 - Springer
In this paper, we propose a new relational schema (R-schema) to XML schema translation
algorithm, VQT, which analyzes the value cardinality and user query patterns and extracts …
algorithm, VQT, which analyzes the value cardinality and user query patterns and extracts …
Simplified approach for generating integrity tests in distributed database systems
F Hanandeh, EE Abdallah… - … of innovation and …, 2013 - inderscienceonline.com
Distributed database systems (DDBS) usually contain massive collections of data that
rapidly evolve over time. It is extremely time consuming to make a perfect checking at each …
rapidly evolve over time. It is extremely time consuming to make a perfect checking at each …
Constraint optimization for a system of relational databases
S Burugu, P Madiraju, H Ibrahim - 2008 8th IEEE International …, 2008 - ieeexplore.ieee.org
Constraint optimization in distributed databases is an important issue as it can reduce the
amount of time needed to check for the violation of global constraints when updates are …
amount of time needed to check for the violation of global constraints when updates are …
[图书][B] Global semantic integrity constraint checking for a system of databases
P Madiraju - 2005 - search.proquest.com
In today's emerging information systems, it is natural to have data distributed across multiple
sites. We define a System of Databases (SyDb) as a collection of autonomous and …
sites. We define a System of Databases (SyDb) as a collection of autonomous and …
[PDF][PDF] The Process of Mapping XML Data to Relational Databases from MIS Perspective
M Alsaigh - Citeseer
XML became the standard for exchanging information over the web, and massive data is
used, modified, transferred and stored continuously using XML files. On the other hand …
used, modified, transferred and stored continuously using XML files. On the other hand …
Detection of faults in database applications using static program analysis and data mining
K Liu - 2016 - dr.ntu.edu.sg
This thesis presents approaches for detecting faults such as violations of constraints in
databases and anomaly in the usage of database attributes of database applications. It also …
databases and anomaly in the usage of database attributes of database applications. It also …
Mining key and referential constraints enforcement patterns
Key and referential constraints play an important role in enforcing data integrity in database
applications. Our study of database applications reveals that there are common patterns of …
applications. Our study of database applications reveals that there are common patterns of …