Database integrity has two complementary components: validity, which guarantees that all false information is excluded from the database, and completeness, which guarantees that all true infor-mation is included in the database. This article describes a uniform model of integrity for relational databases, that considers both validity and completeness. To a large degree, this model subsumes the prevailing model of integrity (i.e., integrity constraints). One of the features of the new model is the determination of the integrity of answers issued by the database system in response to user queries. To users, answers that are accompanied with such detailed certifications of their integrity are more meaningful. First, the model is defined and di...
A Database Management System (DBMS) provides two guarantees of protection against misuse: integrity ...
We define sustained models and show that they coincide with partial stable models. On the basis of s...
Abstract. A hitherto unquestioned assumption made by all methods for integrity checking has been tha...
[EN] We argue that several kinds of desirable semantic properties of data provided by information sy...
In this paper we consider the problem of the logical characterization of the notion of consistent an...
Abstract. Integrity constraints are a means to model the quality of databases. Measures that size th...
This paper is an expanded version of [D7] and a companion paper of [D8]. We first skim some of the b...
Abstract. Inconsistency in large database systems is commonplace and therefore must be controlled in...
The word “pragmatic ” in the title alludes to the philosophical tradition of pragmatism, which is ...
This paper gives an overview of research regarding integrity control or integrity constraint handlin...
This paper discusses data integrity and how it assists in making information systems reliable system...
Traditional methods for integrity checking in relational or deductive databases heavily rely on the ...
In this paper we consider the problem of the logical char-acterization of the notion of consistent a...
In this paper, we propose a new approach to the validation of formal specifications of integrity con...
In this paper, we propose a new approach to the validation of formal specifications of integrity con...
A Database Management System (DBMS) provides two guarantees of protection against misuse: integrity ...
We define sustained models and show that they coincide with partial stable models. On the basis of s...
Abstract. A hitherto unquestioned assumption made by all methods for integrity checking has been tha...
[EN] We argue that several kinds of desirable semantic properties of data provided by information sy...
In this paper we consider the problem of the logical characterization of the notion of consistent an...
Abstract. Integrity constraints are a means to model the quality of databases. Measures that size th...
This paper is an expanded version of [D7] and a companion paper of [D8]. We first skim some of the b...
Abstract. Inconsistency in large database systems is commonplace and therefore must be controlled in...
The word “pragmatic ” in the title alludes to the philosophical tradition of pragmatism, which is ...
This paper gives an overview of research regarding integrity control or integrity constraint handlin...
This paper discusses data integrity and how it assists in making information systems reliable system...
Traditional methods for integrity checking in relational or deductive databases heavily rely on the ...
In this paper we consider the problem of the logical char-acterization of the notion of consistent a...
In this paper, we propose a new approach to the validation of formal specifications of integrity con...
In this paper, we propose a new approach to the validation of formal specifications of integrity con...
A Database Management System (DBMS) provides two guarantees of protection against misuse: integrity ...
We define sustained models and show that they coincide with partial stable models. On the basis of s...
Abstract. A hitherto unquestioned assumption made by all methods for integrity checking has been tha...