Generating Plans from Proofs
ACM Trans. Database Syst., Volume 40, Issue 4, 2016.
TheoryLanguagesAccess methodsoptimizationhidden web
We present algorithms for answering queries making use of information about source integrity constraints, access restrictions, and access costs. Our method can exploit the integrity constraints to find plans even when there is no direct access to relations appearing in the query. We look at different kinds of plans, depending on the kind ...More
Full Text (Upload PDF)
PPT (Upload PPT)