Rules provide an expressive means for implementing database behavior: They cope with changes and their ramications. Rules are commonly used for integrity enforcement, i.e., for repairing database actions in a way that integrity constraints are kept. Yet, Rule Triggering Systems fall short in enforcing eect preservation, i.e., guaranteeing that repairing events do not undo each other, and in particular, do not undo the original triggering event. A method for enforcement of eect preservation on updates in general rule triggering systems is suggested. The method derives transactions from rules, and then splits the work between compile time and run time. At compile time, a data structure is constructed, that analyzes the execution sequences of ...
Existing database systems employ an eager transaction process-ing scheme—that is, upon receiving a t...
In this paper, we present a unified formalism, based on Past Temporal Logic, for specifying conditio...
Deleting a record from a database table without modifying other records or tables can easily lead to...
: We study the problem of efficiently evaluating transactions that automatically invoke the executio...
AbstractDynamic database behaviour can be specified by dynamic integrity constraints, which determin...
International audienceEvent-condition-action (ECA) rules equip a database with information about pre...
Integrity control is generally considered an important topic in the field of database system researc...
In a traditional database system, the transaction management protocols and mechanisms are constraine...
A transaction is a collection of operations that performs a single logical function in a database ap...
A bitemporal deductive database is a deductive database that supports valid and transaction time. A ...
We propose a new method for generating transaction specifications for (view-)updates in relational d...
A transaction is a collection of operations that performs a single logical function in a database ap...
The aim of this paper is to obtain advantages for integrity constraint checking in bitemporal deduct...
We propose a new method for generating consistency-preserving transaction programs for (view) updat...
We describe a model and notation for specifying and enforcing aspects of integrity policies, particu...
Existing database systems employ an eager transaction process-ing scheme—that is, upon receiving a t...
In this paper, we present a unified formalism, based on Past Temporal Logic, for specifying conditio...
Deleting a record from a database table without modifying other records or tables can easily lead to...
: We study the problem of efficiently evaluating transactions that automatically invoke the executio...
AbstractDynamic database behaviour can be specified by dynamic integrity constraints, which determin...
International audienceEvent-condition-action (ECA) rules equip a database with information about pre...
Integrity control is generally considered an important topic in the field of database system researc...
In a traditional database system, the transaction management protocols and mechanisms are constraine...
A transaction is a collection of operations that performs a single logical function in a database ap...
A bitemporal deductive database is a deductive database that supports valid and transaction time. A ...
We propose a new method for generating transaction specifications for (view-)updates in relational d...
A transaction is a collection of operations that performs a single logical function in a database ap...
The aim of this paper is to obtain advantages for integrity constraint checking in bitemporal deduct...
We propose a new method for generating consistency-preserving transaction programs for (view) updat...
We describe a model and notation for specifying and enforcing aspects of integrity policies, particu...
Existing database systems employ an eager transaction process-ing scheme—that is, upon receiving a t...
In this paper, we present a unified formalism, based on Past Temporal Logic, for specifying conditio...
Deleting a record from a database table without modifying other records or tables can easily lead to...