Controlling entity integrity with key sets

IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE
Miika Hannula , Xinyi Li , Sebastian Link
{"title":"Controlling entity integrity with key sets","authors":"Miika Hannula ,&nbsp;Xinyi Li ,&nbsp;Sebastian Link","doi":"10.1016/j.jcss.2023.04.004","DOIUrl":null,"url":null,"abstract":"<div><p><span>Codd's rule of entity integrity stipulates that every table has a primary key. Key sets can control entity integrity when primary keys do not exist. While key set validation is quadratic, update maintenance for unary key sets is efficient when incomplete values only occur in few key columns. We establish a binary axiomatization for the implication problem, and prove its </span><span>coNP</span><span><span>-completeness. However, the implication of unary by arbitrary key sets has better properties. The fragment enjoys a unary axiomatization and is decidable in quadratic time. Hence, we can minimize overheads before validating key sets. While Armstrong relations do not always exist, we show how to compute them for any instance of our fragment. Similarly, we show how unary keys sets can be mined from relations using hypergraph transversals. Finally, we establish an axiomatization and </span>computational complexity for the implication problem of key sets combined with </span><span>NOT NULL</span> constraints.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 195-219"},"PeriodicalIF":1.1000,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer and System Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0022000023000454","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"BUSINESS, FINANCE","Score":null,"Total":0}
引用次数: 0

Abstract

Codd's rule of entity integrity stipulates that every table has a primary key. Key sets can control entity integrity when primary keys do not exist. While key set validation is quadratic, update maintenance for unary key sets is efficient when incomplete values only occur in few key columns. We establish a binary axiomatization for the implication problem, and prove its coNP-completeness. However, the implication of unary by arbitrary key sets has better properties. The fragment enjoys a unary axiomatization and is decidable in quadratic time. Hence, we can minimize overheads before validating key sets. While Armstrong relations do not always exist, we show how to compute them for any instance of our fragment. Similarly, we show how unary keys sets can be mined from relations using hypergraph transversals. Finally, we establish an axiomatization and computational complexity for the implication problem of key sets combined with NOT NULL constraints.

用键集控制实体完整性
Codd的实体完整性规则规定每个表都有一个主键。当主键不存在时,密钥集可以控制实体的完整性。虽然密钥集验证是二次的,但当不完全值只出现在少数密钥列中时,一元密钥集的更新维护是有效的。我们为蕴涵问题建立了一个二元公理化,并证明了它的coNP完备性。然而,任意键集的一元蕴涵具有更好的性质。片段享有一元公理化,并且在二次时间内是可判定的。因此,在验证密钥集之前,我们可以最大限度地减少开销。虽然阿姆斯特朗关系并不总是存在,但我们展示了如何为我们的碎片的任何实例计算它们。类似地,我们展示了如何使用超图横截从关系中挖掘一元密钥集。最后,我们建立了与NOT NULL约束相结合的密钥集蕴涵问题的公理化和计算复杂性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Computer and System Sciences
Journal of Computer and System Sciences 工程技术-计算机:理论方法
CiteScore
3.70
自引率
0.00%
发文量
58
审稿时长
68 days
期刊介绍: The Journal of Computer and System Sciences publishes original research papers in computer science and related subjects in system science, with attention to the relevant mathematical theory. Applications-oriented papers may also be accepted and they are expected to contain deep analytic evaluation of the proposed solutions. Research areas include traditional subjects such as: • Theory of algorithms and computability • Formal languages • Automata theory Contemporary subjects such as: • Complexity theory • Algorithmic Complexity • Parallel & distributed computing • Computer networks • Neural networks • Computational learning theory • Database theory & practice • Computer modeling of complex systems • Security and Privacy.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信