Generating Plans from Proofs

ACM Trans. Database Syst., Volume 40, Issue 4, 2016.

Cited by: 13|Bibtex|Views11|Links
EI
Keywords:
TheoryLanguagesAccess methodsoptimizationhidden web

Abstract:

We present algorithms for answering queries making use of information about source integrity constraints, access restrictions, and access costs. Our method can exploit the integrity constraints to find plans even when there is no direct access to relations appearing in the query. We look at different kinds of plans, depending on the kind ...More

Code:

Data:

Your rating :
0

 

Tags
Comments