80 results on '"Query containment"'
Search Results
2. Checking Pattern Query Containment Under Shape Expression
- Author
-
Fujimoto, Haruna, Suzuki, Nobutaka, and Kwon, Yeondae
- Published
- 2023
- Full Text
- View/download PDF
3. BagQuery Containment and Information Theory.
- Author
-
KHAMIS, MAHMOUD ABO, KOLAITIS, PHOKION G., HUNG Q. NGO, and SUCIU, DAN
- Subjects
- *
SEMANTICS , *DATA management , *ALGORITHMS , *OPEN-ended questions , *MATHEMATICS - Abstract
The query containment problem is a fundamental algorithmic problem in data management. While this problem is well understood under set semantics, it is by far less understood under bag semantics. In particular, it is a long-standing open question whether or not the conjunctive query containment problem under bag semantics is decidable. We unveil tight connections between information theory and the conjunctive query containment under bag semantics. These connections are established using information inequalities, which are considered to be the laws of information theory. Our first main result asserts that deciding the validity of a generalization of information inequalities is many-one equivalent to the restricted case of conjunctive query containment in which the containing query is acyclic; thus, either both these problems are decidable or both are undecidable. Our second main result identifies a new decidable case of the conjunctive query containment problem under bag semantics. Specifically, we give an exponential-time algorithm for conjunctive query containment under bag semantics, provided the containing query is chordal and admits a simple junction tree. CCS Concepts: * Mathematics of computing → Information theory; Combinatoric problems; * Theory of computation → Logic and databases; [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
4. Finding and sharing GIS methods based on the questions they answer
- Author
-
S. Scheider, A. Ballatore, and R. Lemmens
- Subjects
question answering ,gis methods ,sparql ,semantic workflows ,query containment ,Mathematical geography. Cartography ,GA1-1776 - Abstract
Geographic information has become central for data scientists of many disciplines to put their analyzes into a spatio-temporal perspective. However, just as the volume and variety of data sources on the Web grow, it becomes increasingly harder for analysts to be familiar with all the available geospatial tools, including toolboxes in Geographic Information Systems (GIS), R packages, and Python modules. Even though the semantics of the questions answered by these tools can be broadly shared, tools and data sources are still divided by syntax and platform-specific technicalities. It would, therefore, be hugely beneficial for information science if analysts could simply ask questions in generic and familiar terms to obtain the tools and data necessary to answer them. In this article, we systematically investigate the analytic questions that lie behind a range of common GIS tools, and we propose a semantic framework to match analytic questions and tools that are capable of answering them. To support the matching process, we define a tractable subset of SPARQL, the query language of the Semantic Web, and we propose and test an algorithm for computing query containment. We illustrate the identification of tools to answer user questions on a set of common user requests.
- Published
- 2019
- Full Text
- View/download PDF
5. Query Containment
- Author
-
Chirkova, Rada, Liu, Ling, editor, and Özsu, M. Tamer, editor
- Published
- 2018
- Full Text
- View/download PDF
6. Efficiently Pinpointing SPARQL Query Containments
- Author
-
Stadler, Claus, Saleem, Muhammad, Ngomo, Axel-Cyrille Ngonga, Lehmann, Jens, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Mikkonen, Tommi, editor, Klamma, Ralf, editor, and Hernández, Juan, editor
- Published
- 2018
- Full Text
- View/download PDF
7. Containment and Equivalence for a Fragment of XPath.
- Author
-
Miklau, Gerome and Suciu, Dau
- Subjects
XPATH (Computer program language) ,XML (Extensible Markup Language) ,QUERY languages (Computer science) ,ALGORITHMS ,PROGRAMMING languages - Abstract
XPath is a language for navigating an XML document and selecting a set of element nodes. XPath expressions are used to query XML data, describe key constraints, express transformations, and reference elements in remote documents. This article studies the containment and equivalence problems for a fragment of the XPath query language, with applications in all these contexts. In particular, we study, a class of XPath queries that contain branching, label wildcards and can express descendant relationships between nodes. Prior work has shown that languages that combine any two of these tree features have efficient containment algorithms. However, we show that for the combination of features, containment is coNP-complete. We provide a sound and complete algorithm for containment that runs in exponential time, and study parameterized PTIME special cases. While we identify one parameterized class of queries for which containment can be decided efficiently, we also show that even with some bounded parameters, containment remains coNP-complete. In response to these negative results, we describe a sound algorithm that is efficient for all queries, but may return false negatives in some cases. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
8. Containment of Expressive SPARQL Navigational Queries
- Author
-
Chekol, Melisachew Wudage, Pirrò, Giuseppe, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Groth, Paul, editor, Simperl, Elena, editor, Gray, Alasdair, editor, Sabou, Marta, editor, Krötzsch, Markus, editor, Lecue, Freddy, editor, Flöck, Fabian, editor, and Gil, Yolanda, editor
- Published
- 2016
- Full Text
- View/download PDF
9. On Query Containment Problem for Conjunctive Queries Under Bag-Set Semantics
- Author
-
Felea, Victor, Felea, Violeta, Goebel, Randy, Series editor, Tanaka, Yuzuru, Series editor, Wahlster, Wolfgang, Series editor, Nguyen, Ngoc Thanh, editor, Trawiński, Bogdan, editor, and Kosala, Raymond, editor
- Published
- 2015
- Full Text
- View/download PDF
10. Finding and sharing GIS methods based on the questions they answer.
- Author
-
Scheider, S., Ballatore, A., and Lemmens, R.
- Subjects
GEOGRAPHIC information systems ,QUESTION answering systems ,SPARQL (Computer program language) ,SEMANTIC Web ,INFORMATION science - Abstract
Geographic information has become central for data scientists of many disciplines to put their analyzes into a spatio-temporal perspective. However, just as the volume and variety of data sources on the Web grow, it becomes increasingly harder for analysts to be familiar with all the available geospatial tools, including toolboxes in Geographic Information Systems (GIS), R packages, and Python modules. Even though the semantics of the questions answered by these tools can be broadly shared, tools and data sources are still divided by syntax and platform-specific technicalities. It would, therefore, be hugely beneficial for information science if analysts could simply ask questions in generic and familiar terms to obtain the tools and data necessary to answer them. In this article, we systematically investigate the analytic questions that lie behind a range of common GIS tools, and we propose a semantic framework to match analytic questions and tools that are capable of answering them. To support the matching process, we define a tractable subset of SPARQL, the query language of the Semantic Web, and we propose and test an algorithm for computing query containment. We illustrate the identification of tools to answer user questions on a set of common user requests. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
11. On the Containment Problem for Queries in Conjunctive Form with Negation
- Author
-
Felea, Victor, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Pnueli, Amir, editor, Virbitskaite, Irina, editor, and Voronkov, Andrei, editor
- Published
- 2010
- Full Text
- View/download PDF
12. Containment of queries for graphs with data.
- Author
-
Kostylev, Egor V., Reutter, Juan L., and Vrgoč, Domagoj
- Subjects
- *
GRAPH theory , *TOPOLOGY , *SEARCH algorithms , *DATA analysis , *DATABASES - Abstract
We consider the containment problem for regular queries with memory and regular queries with data tests: two recently proposed query languages for graph databases that, in addition to allowing the user to ask topological queries, also track how the data changes along paths connecting various points in the database. Our results show that the problem is undecidable in general. However, by allowing only positive data comparisons we find natural fragments with better static analysis properties: the containment problem is PSpace -complete in the case of regular queries with data tests and ExpSpace -complete in the case of regular queries with memory. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
13. Query Containment
- Author
-
Chirkova, Rada, LIU, LING, editor, and ÖZSU, M. TAMER, editor
- Published
- 2009
- Full Text
- View/download PDF
14. On Containment of Conjunctive Queries with Negation
- Author
-
Felea, Victor, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Grundspenkis, Janis, editor, Morzy, Tadeusz, editor, and Vossen, Gottfried, editor
- Published
- 2009
- Full Text
- View/download PDF
15. QReduction: Synopsizing XPath Query Set Efficiently under Resource Constraint
- Author
-
Gao, Jun, Ma, Xiuli, Yang, Dongqing, Wang, Tengjiao, Tang, Shiwei, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Li, Qing, editor, Wang, Guoren, editor, and Feng, Ling, editor
- Published
- 2004
- Full Text
- View/download PDF
16. Capabilities-Based Query Rewriting in Mediator Systems
- Author
-
Papakonstantinou, Yannis, Gupta, Ashish, Haas, Laura, Naughton, Jeffrey F., editor, and Weikum, Gerhard, editor
- Published
- 1998
- Full Text
- View/download PDF
17. Solving the SPARQL query containment problem with SpeCS.
- Author
-
Spasić, Mirko and Vujošević Janičić, Milena
- Abstract
The query containment problem is a fundamental computer science problem which was originally defined for relational queries. With the growing popularity of the sparql query language, it became relevant and important in this new context: reliable and efficient sparql query containment solvers may have various applications within static analysis of queries, especially in the area of query optimizations and refactoring. In this paper, we present a new approach for solving the query containment problem in sparql. The approach is based on reducing the query containment problem to the satisfiability problem in first order logic. It covers a wide range of the sparql language constructs, including union of conjunctive queries, blank nodes, projections, subqueries, clauses from, filter, optional, graph, etc. It also covers containment under rdf schema entailment regime, and it can deal with the subsumption relation. We describe an implementation of the approach, an open source solver SpeCS and its thorough experimental evaluation on two relevant benchmarks, Query Containment Benchmark and SQCFramework. As a side result, SpeCS identified incorrect test cases within both benchmarks, which were manually checked, confirmed and fixed, resulting in better and more reliable benchmarks. The evaluation also shows that SpeCS is highly efficient and that compared to the state-of-the-art solvers, it gives more precise results in a shorter amount of time. In addition, SpeCS has the highest coverage of the supported language constructs. • Implementation and evaluation of open source sparql query containment solver SpeCS • A reduction of the query containment problem to satisfiability in first-order logic • SpeCS is more efficient and more accurate compared to other state-of-the-art solvers • A number of incorrect test cases in relevant benchmarks were identified and fixed [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
18. A view-based monitoring for usage control in web services.
- Author
-
Meziane, Hassina, Benbernou, Salima, Hacid, Mohand-Said, Malik, Zaki, and Papazoglou, Mike
- Subjects
WEB services ,QUALITY of service ,PERSONALLY identifiable information ,SERVICE level agreements ,QUERYING (Computer science) ,INTERNET service providers - Abstract
Quality of service (QoS) can be a critical element for achieving the business goals of a service provider, and accepting a service by the customer. The criticality is more pronounced when the service provider handles the non-functional QoS attribute of privacy, i.e., privacy related to the customer's personal data. In this regard, the customer needs some guarantee(s) from the service provider about confidentiality management, leading to overall quality characterization of the provided service. A service level agreement (SLA) is primarily intended to specify (in terms of clauses) the level of such non-functional QoS delivered to the customer. The aim is to provide customers with tools that show the fulfillment of QoS guarantees, through SLA monitoring process. In this paper, we address the problem of usage control of private data in service based applications ensuring end-to-end QoS capabilities. We propose a query containment based approach to support the monitoring of privacy-aware SLA compliance, that spells out a customer's privacy rights, and shows how the customer's private information must be handled by a Web service provider. We introduce the private data usage flow model upon which the monitoring is performed to observe the data usage flow, and capture the privacy vulnerabilities that may lead to non-compliance. The model is built on top of (i) properties and time-related privacy requirements to be monitored, and (ii) a set of identified privacy violations. As proof of concept, a privacy aware SLA monitoring system, which is an easy-to-use, and efficient tool for observing the dynamic private data usage flow is developed. Experiment results indicate the relevance and applicability of the proposed approach. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
19. Combined-semantics equivalence of conjunctive queries: Decidability and tractability results.
- Author
-
Chirkova, Rada
- Subjects
- *
SEARCH algorithms , *MATHEMATICAL equivalence , *MATHEMATICAL optimization , *SQL , *SEMANTIC Web - Abstract
Query containment and equivalence are fundamental problems in the context of query processing and optimization. In this paper, we consider combined-semantics equivalence of conjunctive (CQ) queries. The combined-semantics formalism [10,11] generalizes the well-known and practically useful notions of set, bag, and bag-set semantics for CQ queries. It also provides tools for studying practical SQL queries, specifically important types of queries arising in on-line analytical processing. In our study, we introduce a containment-based algorithm for deciding combined-semantics equivalence for pairs of CQ queries that belong to a large well-behaved class of “explicit-wave” queries. Our algorithm, as well as our general sufficient condition for containment of combined-semantics CQ queries, generalizes in a uniform way the tests reported in [3,6,11] . Moreover, we single out a subclass of explicit-wave CQ queries for which it is tractable to determine combined-semantics equivalence. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
20. Monadic Datalog, Tree Validity, and Limited Access Containment
- Author
-
Georg Gottlob, Pierre Senellart, Michael Benedikt, Pierre Bourhis, Computing Science Laboratory - Oxford University, University of Oxford, Self-adaptation for distributed services and large software systems (SPIRALS), Inria Lille - Nord Europe, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 (CRIStAL), Centrale Lille-Université de Lille-Centre National de la Recherche Scientifique (CNRS)-Centrale Lille-Université de Lille-Centre National de la Recherche Scientifique (CNRS), Value from Data (VALDA ), Département d'informatique - ENS Paris (DI-ENS), École normale supérieure - Paris (ENS-PSL), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS-PSL), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria), Data, Intelligence and Graphs (DIG), Laboratoire Traitement et Communication de l'Information (LTCI), Institut Mines-Télécom [Paris] (IMT)-Télécom Paris-Institut Mines-Télécom [Paris] (IMT)-Télécom Paris, University of Oxford [Oxford], Département d'informatique de l'École normale supérieure (DI-ENS), École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS Paris), Université de Lille-Centrale Lille-Centre National de la Recherche Scientifique (CNRS)-Université de Lille-Centrale Lille-Centre National de la Recherche Scientifique (CNRS), Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Paris (ENS Paris), and Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Inria de Paris
- Subjects
Theoretical computer science ,Deep Web ,General Computer Science ,Logic ,Computer science ,Open problem ,EXPTIME ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Upper and lower bounds ,Theoretical Computer Science ,Datalog ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Special case ,computer.programming_language ,Containment (computer programming) ,[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB] ,Query containment ,Binding patterns ,Access patterns ,Computational Mathematics ,Tree (data structure) ,010201 computation theory & mathematics ,Monadic datalog ,Conjunctive query ,computer - Abstract
International audience; We reconsider the problem of containment of monadic datalog (MDL) queries in unions of conjunctive queries (UCQs). Prior work has dealt with special cases of the problem, but has left the precise complexity characterization open. In addition, the complexity of one important special case, that of containment under access patterns, was not known before. We start by revisiting the connection between MDL/UCQ containment and containment problems involving regular tree languages. We then present a general approach for getting tighter bounds on the complexity of query containment, based on analysis of the number of mappings of queries into tree-like instances. We give two applications of the machinery. We first give an important special case of the MDL/UCQ containment problem that is in EXPTIME, and use this bound to show an EXPTIME bound on containment under access patterns. Secondly we show that the same technique can be used to get a new tight upper bound for containment of tree automata in UCQs. We finally show that the new MDL/UCQ upper bounds are tight. We establish a 2EXPTIME lower bound on the MDL/UCQ containment problem, resolving an open problem from the early 1990s. This bound holds for the MDL/CQ containment problem as well. We also show that changes to the conditions given in our special cases can not be eliminated, and that in particular slight variations of the problem of containment under access patterns become 2EXPTIME-complete.
- Published
- 2019
- Full Text
- View/download PDF
21. Evaluating an automata approach to query containment
- Author
-
Minock, Michael and Minock, Michael
- Abstract
Given two queries Qsuper and Qsub, query containment is the problem of determining if Qsub(D) ⊆ Qsuper(D) for all databases D. This problem has long been explored, but to our knowledge no one has empirically evaluated a straightforward application of finite state automata to the problem. We do so here, covering the case of conjunctive queries with limited set conditions. We evaluate an implementation of our approach against straightforward implementations of both the canonical database and theorem proving approaches. Our implementation outperforms theorem proving on a natural language interface corpus over a photo/video domain. It also outperforms the canonical database implementation on single relation queries with large set conditions., QC 20220602
- Published
- 2021
- Full Text
- View/download PDF
22. SPARQL Query Containment Under Schema
- Author
-
Chekol, Melisachew Wudage, Euzenat, Jérôme, Genevès, Pierre, and Layaïda, Nabil
- Published
- 2018
- Full Text
- View/download PDF
23. A theoretical framework for knowledge-based entity resolution.
- Author
-
Schewe, Klaus-Dieter and Wang, Qing
- Subjects
- *
THEORY of knowledge , *DISJUNCTION (Logic) , *NEGATION (Logic) , *MATHEMATICAL optimization , *STATISTICAL matching , *COMPUTER science - Abstract
Entity resolution is the process of determining whether a collection of entity representations refer to the same entity in the real world. In this paper we introduce a theoretical framework that supports knowledge-based entity resolution. From a logical point of view, the expressive power of the framework is equivalent to a decidable fragment of first-order logic including conjunction, disjunction and a certain form of negation. Although the framework is expressive for representing knowledge about entity resolution in a collective way, the questions that arise are: (1) how efficiently can knowledge patterns be processed; (2) how effectively can redundancy among knowledge patterns be eliminated. In answering these questions, we first study the evaluation problem for knowledge patterns. Our results show that this problem is NP-complete w.r.t. combined complexity but in ptime w.r.t. data complexity. This nice property leads us to investigate the containment problem for knowledge patterns, which turns out to be NP-complete. We further develop a notion of optimality for knowledge patterns and a mechanism of optimizing a knowledge model (i.e. a finite set of knowledge patterns). We prove that the optimality decision problem for knowledge patterns is still NP-complete. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
24. Static Analysis and Optimization of Semantic Web Queries.
- Author
-
LETELIER, ANDRÉS, PÉREZ, JORGE, PICHLER, REINHARD, and SKRITEK, SEBASTIAN
- Subjects
- *
MATHEMATICAL optimization , *SEMANTIC Web , *QUERY languages (Computer science) , *INFORMATION resources management , *GRAPH theory , *FEATURE extraction - Abstract
Static analysis is a fundamental task in query optimization. In this article we study static analysis and optimization techniques for SPARQL, which is the standard language for querying Semantic Web data. Of particular interest for us is the optionality feature in SPARQL. It is crucial in Semantic Web data management, where data sources are inherently incomplete and the user is usually interested in partial answers to queries. This feature is one of themost complicated constructors in SPARQL and also the one that makes this language depart from classical query languages such as relational conjunctive queries. We focus on the class of well-designed SPARQL queries, which has been proposed in the literature as a fragment of the language with good properties regarding query evaluation. We first propose a tree representation for SPARQL queries, called pattern trees, which captures the class of well-designed SPARQL graph patterns. Among other results, we propose several rules that can be used to transform pattern trees into a simple normal form, and study equivalence and containment. We also study the evaluation and enumeration problems for this class of queries. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
25. Expressiveness and static analysis of extended conjunctive regular path queries.
- Author
-
Freydenberger, Dominik D. and Schweikardt, Nicole
- Subjects
- *
PATHS & cycles in graph theory , *QUERY (Information retrieval system) , *COMPUTATIONAL complexity , *PROGRAMMING languages , *GRAPH theory , *DATABASES - Abstract
We study the expressiveness and the complexity of static analysis of extended conjunctive regular path queries (ECRPQs), introduced by Barceló et al. (2010) [3]. ECRPQs are an extension of conjunctive regular path queries (CRPQs), a well-studied language for querying graph structured databases. Our first main result shows that query containment and equivalence of a CRPQ in an ECRPQ are undecidable. This settles one of the main open problems posed by Barceló et al. As a second main result, we prove a non-recursive succinctness gap between CRPQs and the CRPQ-expressible fragment of ECRPQs. Apart from this, we develop a tool for proving inexpressibility results for CRPQs and ECRPQs. In particular, this enables us to show that there exist queries definable by regular expressions with backreferencing, but not expressible by ECRPQs. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
26. On the complexity of entailment in existential conjunctive first-order logic with atomic negation
- Author
-
Mugnier, Marie-Laure, Simonet, Geneviève, and Thomazo, Michaël
- Subjects
- *
NEGATION (Logic) , *FIRST-order logic , *ENTAILMENT (Logic) , *ARTIFICIAL intelligence , *DATABASES , *HOMOMORPHISMS , *GRAPH theory - Abstract
Abstract: We consider the entailment problem in the fragment of first-order logic (FOL) composed of existentially closed conjunctions of literals (without functions), denoted by . This problem can be recast as several fundamental problems in artificial intelligence and databases, namely query containment for conjunctive queries with negation, clause entailment for clauses without functions and query answering with incomplete information for Boolean conjunctive queries with negation over a fact base. Entailment in is -complete, whereas it is only NP-complete when the formulas contain no negation. We investigate the role of specific literals in this complexity increase. These literals have the property of being “exchangeable”, with this notion taking the structure of the formulas into account. To focus on the structure of formulas, we shall see them as labeled graphs. Graph homomorphism, which provides a sound and complete proof procedure for positive formulas, is at the core of this study. Let Entailment k be the following family of problems: given two formulas g and h in , such that g has at most k pairs of exchangeable literals, is g entailed by h? The main results are that Entailment k is NP-complete if k is less or equal to 1, and -complete for any value of k greater or equal to 3. As a corollary of our proofs, we are able to classify exactly Entailment k for any value of when g is decomposable into a tree. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
27. Location-dependent spatial query containment
- Author
-
Lee, Ken C.K., Unger, Brandon, Zheng, Baihua, and Lee, Wang-Chien
- Subjects
- *
QUERYING (Computer science) , *INFORMATION technology , *MOBILE communication systems , *WIRELESS communications , *BANDWIDTHS , *CLIENT/SERVER computing , *SIMULATION methods & models - Abstract
Abstract: Nowadays, location-related information is highly accessible to mobile users via issuing Location-Dependent Spatial Queries (LDSQs) with respect to their locations wirelessly to Location-Based Service (LBS) servers. Due to the limited mobile device battery energy, scarce wireless bandwidth, and heavy LBS server workload, the number of LDSQs submitted over wireless channels to LBS servers for evaluation should be minimized as appropriate. In this paper, we exploit query containment techniques for LDSQs (called LDSQ containment) to enable mobile clients to determine whether the result of a new LDSQ Q′ is completely covered by that of another LDSQ Q previously answered by a server (denoted by Q′ ⊆ Q) and to answer Q′ locally if Q′ ⊆ Q. Thus, many LDSQs can be reduced from server evaluation. To support LDSQ containment, we propose a notion of containment scope, which represents a spatial area corresponding to an LDSQ result wherein all semantically matched LDSQs are answerable with the result. Through a comprehensive simulation, our proposed approach significantly outperforms existing techniques. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
28. Conjunctive Query Containment and Answering Under Description Logic Constraints.
- Author
-
CALVANESE, DIEGO, DE GIACOMO, GIUSEPPE, and LENZERINI, MAURIZIO
- Subjects
QUERY (Information retrieval system) ,QUERY languages (Computer science) ,PROGRAMMING languages ,COMPUTATIONAL complexity ,DATABASES ,ELECTRONIC data processing - Abstract
Query containment and query answering are two important computational tasks in databases. While query answering amounts to computing the result of a query over a database, query containment is the problem of checking whether, for every database, the result of one query is a subset of the result of another query. In this article, we deal with unions of conjunctive queries, and we address query containment and query answering under description logic constraints. Every such constraint is essentially an inclusion dependency between concepts and relations, and their expressive power is due to the possibility of using complex expressions in the specification of the dependencies, for example, intersection and difference of relations, special forms of quantification, regular expressions over binary relations. These types of constraints capture a great variety of data models, including the relational, the entity-relationship, and the object-oriented model, all extended with various forms of constraints. They also capture the basic features of the ontology languages used in the context of the Semantic Web. We present the following results on both query containment and query answering. We provide a method for query containment under description logic constraints, thus showing that the problem is decidable, and analyze its computational complexity. We prove that query containment is undecidable in the case where we allow inequalities in the right-hand-side query, even for very simple constraints and queries. We show that query answering under description logic constraints can be reduced to query containment, and illustrate how such a reduction provides upper-bound results with respect to both combined and data complexity. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
29. View-based query processing: On the relationship between rewriting, answering and losslessness
- Author
-
Calvanese, Diego, De Giacomo, Giuseppe, Lenzerini, Maurizio, and Vardi, Moshe Y.
- Subjects
- *
QUERY languages (Computer science) , *DATABASES , *MACHINE theory , *COMPUTER science , *PROGRAMMING languages , *ELECTRONIC information resources , *ROBOTS - Abstract
Abstract: As a result of the extensive research in view-based query processing, three notions have been identified as fundamental, namely rewriting, answering, and losslessness. Answering amounts to computing the tuples satisfying the query in all databases consistent with the views. Rewriting consists in first reformulating the query in terms of the views and then evaluating the rewriting over the view extensions. Losslessness holds if we can answer the query by solely relying on the content of the views. While the mutual relationship between these three notions is easy to identify in the case of conjunctive queries, the terrain of notions gets considerably more complicated going beyond such a query class. In this paper, we revisit the notions of answering, rewriting, and losslessness and clarify their relationship in the setting of semistructured databases, and in particular for the basic query class in this setting, i.e., two-way regular path queries. Our first result is a clean explanation of the relationship between answering and rewriting, in which we characterize rewriting as a “linear approximation” of query answering. We show that applying this linear approximation to the constraint-satisfaction framework yields an elegant automata-theoretic approach to query rewriting. As for losslessness, we show that there are indeed two distinct interpretations for this notion, namely with respect to answering, and with respect to rewriting. We also show that the constraint-theoretic approach and the automata-theoretic approach can be combined to give algorithmic characterization of the various facets of losslessness. Finally, we deal with the problem of coping with loss, by considering mechanisms aimed at explaining lossiness to the user. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
30. Decidable containment of recursive queries
- Author
-
Calvanese, Diego, De Giacomo, Giuseppe, and Vardi, Moshe Y.
- Subjects
- *
INFORMATION storage & retrieval systems , *MACHINE theory , *ALGORITHMS , *ROBOTS - Abstract
Abstract: One of the most important reasoning tasks on queries is checking containment, i.e., verifying whether one query yields necessarily a subset of the result of another one. Query containment is crucial in several contexts, such as query optimization, query reformulation, knowledge-base verification, information integration, integrity checking, and cooperative answering. Containment is undecidable in general for Datalog, the fundamental language for expressing recursive queries. On the other hand, it is known that containment between monadic Datalog queries and between Datalog queries and unions of conjunctive queries are decidable. It is also known that containment between unions of conjunctive two-way regular path queries, which are queries used in the context of semistructured data models containing a limited form of recursion in the form of transitive closure, is decidable. In this paper, we combine the automata-theoretic techniques at the base of these two decidability results to show that containment of Datalog in union of conjunctive two-way regular path queries is decidable in 2EXPTIME. By sharpening a known lower bound result for containment of Datalog in union of conjunctive queries we show also a matching lower bound. [Copyright &y& Elsevier]
- Published
- 2005
- Full Text
- View/download PDF
31. Checking query containment with the CQC method
- Author
-
Farré, Carles, Teniente, Ernest, and Urpí, Toni
- Subjects
- *
INFORMATION storage & retrieval systems , *QUERYING (Computer science) , *DATABASES , *COMPUTER files - Abstract
Abstract: We present the Constructive Query Containment (CQC) method to check query containment and query containment under constraints for queries over databases with safe negation in both IDB and EDB subgoals and with or without built-in predicates. The aim of the CQC method is to construct a counterexample that proves that the query containment relationship being checked does not hold. The method uses different Variable Instantiation Patterns (VIPs) to generate only relevant counterexamples according to the syntactic properties of the queries and the databases considered in each test. The main contribution of the CQC method is threefold: it handles broader cases of queries and database schemas than most previous methods, it checks “true” containment instead of uniform containment (which is a sufficient but not necessary condition for containment) and it is not less efficient than other methods for the cases that they handle. Moreover, we prove also soundness and completeness of our method both for success and for failure. [Copyright &y& Elsevier]
- Published
- 2005
- Full Text
- View/download PDF
32. Replacement strategies for XQuery caching systems
- Author
-
Chen, Li, Wang, Song, and Rundensteiner, Elke A.
- Abstract
To improve the query performance over XML documents in a distributed environment, we develop a semantic caching system named ACE-XQ for XQuery queries. ACE-XQ applies innovative query containment and rewriting techniques to answer user queries using cached queries. We also design a fine-grained replacement strategy which records user access statistics at a finer granularity than the complete XML query regions. As a result, less frequently used XML view fragments are replaced to maintain a better utilization of the cache space. Extensive experimental results illustrate the performance improvement achieved by this strategy over the traditional one for a variety of situations. [Copyright &y& Elsevier]
- Published
- 2004
- Full Text
- View/download PDF
33. Query containment for data integration systems
- Author
-
Millstein, Todd, Halevy, Alon, and Friedman, Marc
- Subjects
- *
QUERY (Information retrieval system) , *DATABASES - Abstract
The problem of query containment is fundamental to many aspects of database systems, including query optimization, determining independence of queries from updates, and rewriting queries using views. In the data-integration framework, however, the standard notion of query containment does not suffice. We define relative containment, which formalizes the notion of query containment relative to the sources available to the data-integration system. First, we provide optimal bounds for relative containment for several important classes of datalog queries, including the common case of conjunctive queries. Next, we provide bounds for the case when sources enforce access restrictions in the form of binding pattern constraints. Surprisingly, we show that relative containment for conjunctive queries is still decidable in this case, even though it is known that finding all answers to such queries may require a recursive datalog program over the sources. Finally, we provide tight bounds for variants of relative containment when the queries and source descriptions may contain comparison predicates. [Copyright &y& Elsevier]
- Published
- 2003
- Full Text
- View/download PDF
34. Answering Queries with Useful Bindings.
- Author
-
Chen Li and Chang, Edward
- Subjects
- *
INFORMATION storage & retrieval systems , *MATHEMATICAL optimization , *PROBLEM solving , *INFORMATION science , *DATABASES - Abstract
In information-integration systems, sources may have diverse and limited query capabilities. To obtain maximum information from these restrictive sources to answer a query, one can access sources that are not specified in the query (i.e., off-query sources). In this article, we propose a query-planning framework to answer queries in the presence of limited access patterns. In the framework, a query and source descriptions are translated to a recursive datalog program. We then solve optimization problems in this framework, including how to decide whether accessing off-query sources is necessary, how to choose useful sources for a query, and how to test query containment. We develop algorithms to solve these problems, and thus construct an efficient program to answer a query. [ABSTRACT FROM AUTHOR]
- Published
- 2001
- Full Text
- View/download PDF
35. Representing and Reasoning on Conceptual Queries Over Image Databases.
- Author
-
Hacid, Mohand-Saïd
- Abstract
The problem of content management of multimedia data types (e.g., image, video, graphics) is becoming increasingly important with the development of advanced multimedia applications. Traditional database management systems are inadequate for the handling of such data types. They require new techniques for query formulation, retrieval, evaluation, and navigation. In this paper we develop a knowledge-based framework for modeling and retrieving image data by content. To represent the various aspects of an image object's characteristics, we propose a model which consists of three layers: (1) Feature & Content Layer, intended to contain image visual features such as contours, shapes, etc.; (2) Object Layer, which provides the (conceptual) content dimension of images; and (3) Schema Layer, which contains the structured abstractions of images, i.e., a general schema about the classes of objects represented in the object layer. We propose two abstract languages on the basis of description logics: one for describing knowledge of the object and schema layers, and the other, more expressive, for making queries. Queries can refer to the form dimension (i.e., information of the Feature & Content Layer) or to the content dimension (i.e., information of the Object Layer). These languages employ a variable free notation. As the amount of information contained in the previous layers may be huge and operations performed at the Feature & Content Layer are time-consuming, resorting to the use of materialized views to process and optimize queries may be extremely useful. For that, we propose a formal framework for testing containment of a query in a view expressed in our query language. [ABSTRACT FROM AUTHOR]
- Published
- 2000
- Full Text
- View/download PDF
36. Evaluation of Query Transformations without Data
- Author
-
David, Jérôme, Euzenat, Jérôme, Genevès, Pierre, Layaïda, Nabil, Evolution de la connaissance (MOEX ), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire d'Informatique de Grenoble (LIG ), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019])-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019]), Types and Reasoning for the Web (TYREX), and ANR-16-CE25-0010,CLEAR,Compilation de langages intermédiaires en exécutables efficaces pour le big data(2016)
- Subjects
Transformation evaluation ,Query containment ,[INFO.INFO-WB]Computer Science [cs]/Web ,Query transformation ,SPARQL - Abstract
International audience; Query transformations are ubiquitous in semantic web query processing. For any situation in which transformations are not proved correct by construction, the quality of these transformations has to be evaluated. Usual evaluation measures are either overly syntactic and not very informative —the result being: correct or incorrect— or dependent from the evaluation sources. Moreover, both approaches do not necessarily yield the same result. We suggest that grounding the evaluation on query containment allows for a data-independent evaluation that is more informative than the usual syntactic evaluation. In addition, such evaluation modalities may take into account ontologies, alignments or different query languages as soon as they are relevant to query evaluation.
- Published
- 2018
- Full Text
- View/download PDF
37. The Window Validity Problem in Rule-Based Stream Reasoning
- Author
-
Ronca, Alessandro, Mark, Kaminski, Bernardo Cuenca Grau, and Ian, Horrocks
- Subjects
Datalog ,stream reasoning ,temporal reasoning ,window ,rule-based ,query answering ,query containment ,stream processing - Published
- 2018
38. Static Analysis of Semantic Web Queries with ShEx Schema Constraints
- Author
-
Abbas, Abdullah, Types and Reasoning for the Web (TYREX), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire d'Informatique de Grenoble (LIG ), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019])-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019]), Université Grenoble - Alpes, Nabil Layaida (Directeur de thèse), Pierre Genevès (Co-Directeur de thèse), and Cécile Roisin (Co-Directeur de thèse)
- Subjects
static analysis ,Query containment ,shex ,[INFO.INFO-WB]Computer Science [cs]/Web ,sparql ,rdf - Abstract
Data structured in the Resource Description Framework (RDF) are increasingly available in large volumes. This leads to a major need and research interest in novel methods for query analysis and compilation for making the most of RDF data extraction. SPARQL is the widely used and well supported standard query language for RDF data. In parallel to query language evolutions, schema languages for expressing constraints on RDF datasets also evolve. Shape Expressions (ShEx) are increasingly used to validate RDF data, and to communicate expected graph patterns. Schemas in general are important for static analysis tasks such as query optimisation and containment. Our purpose is to investigate the means and methodologies for SPARQL query static analysis and optimisation in the presence of ShEx schema constraints.Our contribution is mainly divided into two parts. In the first part we consider the problem of SPARQL query containment in the presence of ShEx constraints. We propose a sound and complete procedure for the problem of containment with ShEx, considering several SPARQL fragments. Particularly our procedure considers OPTIONAL query patterns, that turns out to be an important feature to be studied with schemas. We provide complexity bounds for the containment problem with respect to the language fragments considered. We also propose alternative method for SPARQL query containment with ShEx by reduction into First Order Logic satisfiability, which allows for considering SPARQL fragment extension in comparison to the first method. This is the first work addressing SPARQL query containment in the presence of ShEx constraints.In the second part of our contribution we propose an analysis method to optimise the evaluation of conjunctive SPARQL queries, on RDF graphs, by taking advantage of ShEx constraints. The optimisation is based on computing and assigning ranks to query triple patterns, dictating their order of execution. The presence of intermediate joins between the query triple patterns is the reason why ordering is important in increasing efficiency. We define a set of well-formed ShEx schemas, that possess interesting characteristics for SPARQL query optimisation. We then develop our optimisation method by exploiting information extracted from a ShEx schema. We finally report on evaluation results performed showing the advantages of applying our optimisation on the top of an existing state-of-the-art query evaluation system.; La disponibilité de gros volumes de données structurées selon le modèle Resource Description Framework (RDF) est en constante augmentation. Cette situation implique un intérêt scientifique et un besoin important de rechercher de nouvelles méthodes d’analyse et de compilation de requêtes pour tirer le meilleur parti de l’extraction de données RDF. SPARQL est le plus utilisé et le mieux supporté des langages de requêtes sur des données RDF. En parallèle des langages de requêtes, les langages de définition de schéma d’expression de contraintes sur des jeux de données RDF ont également évolués. Les Shape Expressions (ShEx) sont de plus en plus utilisées pour valider des données RDF et pour indiquer les motifs de graphes attendus. Les schémas sont importants pour les tâches d’analyse statique telles que l’optimisation ou l’injection de requêtes. Notre intention est d’examiner les moyens et méthodologies d’analyse statique et d’optimisation de requêtes associés à des contraintes de schéma.Notre contribution se divise en deux grandes parties. Dans la première, nous considérons le problème de l’injection de requêtes SPARQL en présence de contraintes ShEx. Nous proposons une procédure rigoureuse et complète pour le problème de l’injection de requêtes avec ShEx, en prenant en charge plusieurs fragments de SPARQL. Plus particulièrement, notre procédure gère les patterns de requêtes OPTIONAL, qui s’avèrent former un important fonctionnalité à étudier avec les schémas. Nous fournissons ensuite les limites de complexité de notre problème en considération des fragments gérés. Nous proposons également une méthode alternative pour l’injection de requêtes SPARQL avec ShEx. Celle-ci réduit le problème à une satisfiabilité de Logique de Premier Ordre, qui permet de considérer une extension du fragment SPARQL traité par la première méthode. Il s’agit de la première étude traitant l’injection de requêtes SPARQL en présence de contraintes ShEx.Dans la seconde partie de nos contributions, nous proposons une méthode d’analyse pour optimiser l’évaluation de requêtes SPARQL groupées, sur des graphes RDF, en tirant avantage des contraintes ShEx. Notre optimisation s’appuie sur le calcul et l’assignation de rangs aux triple patterns d’une requête, permettant de déterminer leur ordre d’exécution. La présence de jointures intermédiaires entre ces patterns est la raison pour laquelle l’ordonnancement est important pour gagner en efficicacité. Nous définissons un ensemble de schémas ShEx bien- formulés, qui possède d’intéressantes caractéristiques pour l’optimisation de requêtes SPARQL. Nous développons ensuite notre méthode d’optimisation par l’exploitation d’informations extraites d’un schéma ShEx. Enfin, nous rendons compte des résultats des évaluations effectuées, montrant les avantages de l’application de notre optimisation face à l’état de l’art des systèmes d’évaluation de requêtes.
- Published
- 2017
39. Analyse statique de requêtes au web sémantique avec des contraintes de schéma ShEx
- Author
-
Abdullah Abbas, Types and Reasoning for the Web (TYREX), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire d'Informatique de Grenoble (LIG ), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019])-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019]), Université Grenoble - Alpes, Nabil Layaida (Directeur de thèse), Pierre Genevès (Co-Directeur de thèse), Cécile Roisin (Co-Directeur de thèse), Laboratoire d'Informatique de Grenoble (LIG ), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019]), Université Grenoble Alpes, Nabil Layaida, Cécile Roisin, and Pierre Genevès
- Subjects
static analysis ,Web Sémantique ,Analyse statique ,Query containment ,shex ,[INFO.INFO-WB]Computer Science [cs]/Web ,Schemas ,sparql ,rdf ,Semantic Web - Abstract
Data structured in the Resource Description Framework (RDF) are increasingly available in large volumes. This leads to a major need and research interest in novel methods for query analysis and compilation for making the most of RDF data extraction. SPARQL is the widely used and well supported standard query language for RDF data. In parallel to query language evolutions, schema languages for expressing constraints on RDF datasets also evolve. Shape Expressions (ShEx) are increasingly used to validate RDF data, and to communicate expected graph patterns. Schemas in general are important for static analysis tasks such as query optimisation and containment. Our purpose is to investigate the means and methodologies for SPARQL query static analysis and optimisation in the presence of ShEx schema constraints.Our contribution is mainly divided into two parts. In the first part we consider the problem of SPARQL query containment in the presence of ShEx constraints. We propose a sound and complete procedure for the problem of containment with ShEx, considering several SPARQL fragments. Particularly our procedure considers OPTIONAL query patterns, that turns out to be an important feature to be studied with schemas. We provide complexity bounds for the containment problem with respect to the language fragments considered. We also propose alternative method for SPARQL query containment with ShEx by reduction into First Order Logic satisfiability, which allows for considering SPARQL fragment extension in comparison to the first method. This is the first work addressing SPARQL query containment in the presence of ShEx constraints.In the second part of our contribution we propose an analysis method to optimise the evaluation of conjunctive SPARQL queries, on RDF graphs, by taking advantage of ShEx constraints. The optimisation is based on computing and assigning ranks to query triple patterns, dictating their order of execution. The presence of intermediate joins between the query triple patterns is the reason why ordering is important in increasing efficiency. We define a set of well-formed ShEx schemas, that possess interesting characteristics for SPARQL query optimisation. We then develop our optimisation method by exploiting information extracted from a ShEx schema. We finally report on evaluation results performed showing the advantages of applying our optimisation on the top of an existing state-of-the-art query evaluation system.; La disponibilité de gros volumes de données structurées selon le modèle Resource Description Framework (RDF) est en constante augmentation. Cette situation implique un intérêt scientifique et un besoin important de rechercher de nouvelles méthodes d’analyse et de compilation de requêtes pour tirer le meilleur parti de l’extraction de données RDF. SPARQL est le plus utilisé et le mieux supporté des langages de requêtes sur des données RDF. En parallèle des langages de requêtes, les langages de définition de schéma d’expression de contraintes sur des jeux de données RDF ont également évolués. Les Shape Expressions (ShEx) sont de plus en plus utilisées pour valider des données RDF et pour indiquer les motifs de graphes attendus. Les schémas sont importants pour les tâches d’analyse statique telles que l’optimisation ou l’injection de requêtes. Notre intention est d’examiner les moyens et méthodologies d’analyse statique et d’optimisation de requêtes associés à des contraintes de schéma.Notre contribution se divise en deux grandes parties. Dans la première, nous considérons le problème de l’injection de requêtes SPARQL en présence de contraintes ShEx. Nous proposons une procédure rigoureuse et complète pour le problème de l’injection de requêtes avec ShEx, en prenant en charge plusieurs fragments de SPARQL. Plus particulièrement, notre procédure gère les patterns de requêtes OPTIONAL, qui s’avèrent former un important fonctionnalité à étudier avec les schémas. Nous fournissons ensuite les limites de complexité de notre problème en considération des fragments gérés. Nous proposons également une méthode alternative pour l’injection de requêtes SPARQL avec ShEx. Celle-ci réduit le problème à une satisfiabilité de Logique de Premier Ordre, qui permet de considérer une extension du fragment SPARQL traité par la première méthode. Il s’agit de la première étude traitant l’injection de requêtes SPARQL en présence de contraintes ShEx.Dans la seconde partie de nos contributions, nous proposons une méthode d’analyse pour optimiser l’évaluation de requêtes SPARQL groupées, sur des graphes RDF, en tirant avantage des contraintes ShEx. Notre optimisation s’appuie sur le calcul et l’assignation de rangs aux triple patterns d’une requête, permettant de déterminer leur ordre d’exécution. La présence de jointures intermédiaires entre ces patterns est la raison pour laquelle l’ordonnancement est important pour gagner en efficicacité. Nous définissons un ensemble de schémas ShEx bien- formulés, qui possède d’intéressantes caractéristiques pour l’optimisation de requêtes SPARQL. Nous développons ensuite notre méthode d’optimisation par l’exploitation d’informations extraites d’un schéma ShEx. Enfin, nous rendons compte des résultats des évaluations effectuées, montrant les avantages de l’application de notre optimisation face à l’état de l’art des systèmes d’évaluation de requêtes.
- Published
- 2017
40. A view-based monitoring for usage control in web services
- Author
-
Mohand-Said Hacid, Hassina Meziane, Mike P. Papazoglou, Salima Benbernou, Zaki Malik, Département d'Informatique [Oran], Université des sciences et de la Technologie d'Oran Mohamed Boudiaf [Oran] (USTO MB), Laboratoire d'Informatique Paris Descartes (LIPADE - EA 2517), Université Paris Descartes - Paris 5 (UPD5), Base de Données (BD), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA), European Research Institute in Service Science (ERISS), Tilburg University [Netherlands], Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), Hacid, Mohand-Said, Department of Management, and Research Group: Information & Supply Chain Management
- Subjects
Information Systems and Management ,Privacy by Design ,Monitoring ,Computer science ,Service delivery framework ,Service level requirement ,02 engineering and technology ,[INFO] Computer Science [cs] ,Usage control ,Computer security ,computer.software_genre ,Service-level agreement ,CHECKING ,Customer Service Assurance ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,Usage flow view ,ComputingMilieux_MISCELLANEOUS ,Service (business) ,Service level objective ,Privacy aware SLA ,Service provider ,Hardware and Architecture ,QUERY CONTAINMENT ,020201 artificial intelligence & image processing ,computer ,Software ,Information Systems ,Compliance - Abstract
Quality of service (QoS) can be a critical element for achieving the business goals of a service provider, and accepting a service by the customer. The criticality is more pronounced when the service provider handles the non-functional QoS attribute of privacy, i.e., privacy related to the customer's personal data. In this regard, the customer needs some guarantee(s) from the service provider about confidentiality management, leading to overall quality characterization of the provided service. A service level agreement (SLA) is primarily intended to specify (in terms of clauses) the level of such non-functional QoS delivered to the customer. The aim is to provide customers with tools that show the fulfillment of QoS guarantees, through SLA monitoring process. In this paper, we address the problem of usage control of private data in service based applications ensuring end-to-end QoS capabilities. We propose a query containment based approach to support the monitoring of privacy-aware SLA compliance, that spells out a customer's privacy rights, and shows how the customer's private information must be handled by a Web service provider. We introduce the private data usage flow model upon which the monitoring is performed to observe the data usage flow, and capture the privacy vulnerabilities that may lead to non-compliance. The model is built on top of (i) properties and time-related privacy requirements to be monitored, and (ii) a set of identified privacy violations. As proof of concept, a privacy aware SLA monitoring system, which is an easy-to-use, and efficient tool for observing the dynamic private data usage flow is developed. Experiment results indicate the relevance and applicability of the proposed approach.
- Published
- 2016
41. Comparison and Implementation of Query Containment Algorithms for XPath
- Author
-
Wåreus, Linus and Wällstedt, Max
- Subjects
Datavetenskap (datalogi) ,Computer Sciences ,Implementation ,The Canonical Model ,InformationSystems_DATABASEMANAGEMENT ,XPath ,Query Containment ,The Homomorphism Technique - Abstract
This thesis investigates the practical aspects of implementing Query Containment algorithms for the query language XPath. Query Containment is the problem to decide if the results of one query are a subset of the results of another query for any database. Query Containment algorithms can be used for the purpose of optimising the querying process in database systems. Two algorithms have been implemented and compared, The Canonical Model and The Homomorphism Technique. The algorithms have been compared with respect to speed, ease of implementation, accuracy and usability in database systems. Benchmark tests were developed to measure the execution times of the algorithms on a specific set of queries. A simple database system was developed to investigate the performance gain of using the algorithms. It was concluded that The Homomorphism Technique outperforms The Canonical Model in every test case with respect to speed. The Canonical Model is however more accurate than The Homomorphism Technique. Both algorithms were easy to implement, but The Homomorphism Technique was easier. In the database system, there was performance to be gained by using Query Containment algorithms for a certain type of queries, but in most cases there was a performance loss. A database system that utilises Query Containment algorithms for optimisation would for every issued query have to evaluate if such an algorithm should be used. Denna rapport undersöker de praktiska aspekterna av att implementera Query Containment-algoritmer för queryspråket XPath. Query Containment är problemet att avgöra om resultaten av en query är en delmängd av resultaten av en annan query, oavsett databas. Query Containment-algoritmer kan användas för ändamålet att optimera queryingprocessen i databassystem. Två algoritmer har implementerats och jämförts, The Canonical Model och The Homomorphism Technique. Algoritmerna har jämförts med avseende på hastighet, lätthet att implementera, exakthet och användbarhet i riktiga databassystem. Prestandatester utvecklades för att mäta exekveringstider för algoritmerna på specifikt framtagna queries. Ett enkelt databassystem utvecklades för att undersöka prestandavinsten av att använda algoritmerna. Slutsatsen att The Homomorphism Technique presterar bättre än The Canonical Model i samtliga testfall med avseende på hastighet drogs. The Canonical Model är dock mer exakt än The Homomorphism Technique. Båda algoritmerna var lätta att implementera, men The Homomorphism Technique var lättare. I databassystemet fanns det en prestandavinst i att använda Query Containment-algoritmer för en viss typ av queries, men i de flesta fall var det en prestandaförlust. Ett databassystem som använder Query Containment-algoritmer för optimering bör för varje query avgöra om en sådan algoritm ska användas.
- Published
- 2016
42. On the Static Analysis for SPARQL Queries using Modal Logic
- Author
-
Guido, Nicola, Laboratoire d'Informatique de Grenoble (LIG), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF), Types and Reasoning for the Web (TYREX), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire d'Informatique de Grenoble (LIG), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF), Université Grenoble Alpes, Cécile Roisin, and Pierre Genevès
- Subjects
[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB] ,Sparql ,Analyse statique ,Web Sémantique ,Query containment ,Independence entre les mises a jour et le requetes ,[INFO.INFO-WB]Computer Science [cs]/Web ,Query update independence ,Static analysis ,Inclusion des requetes ,Semantic Web ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] - Abstract
Static analysis is a core task in query optimization and knowledge base verification. We study static analysis techniques for SPARQL, the standard language for querying Semantic Web data. Specifically, we investigate the query containment problem and the query-update independence analysis. We are interested in developing techniques through reductions to the validity problem in logic.We address SPARQL query containment with optional matching. We focus on the class of well-designed SPARQL queries, proposed in the literature as a fragment of the language with good properties regarding query evaluation. SPARQL is interpreted over graphs, hence we encode it in a graph logic, specifically the modal logic K interpreted over label transition systems. We show that this logic is powerful enough to deal with query containment for the well-designed fragment of SPARQL. We show how to translate RDF graphs into transition systems and SPARQL queries into K-formulae. Therefore, query containment in SPARQL can be reduced to unsatisfiability in K.We also report on a preliminary overview of the SPARQL query-update problem. A query is independent of an update when the execution of the update does not affect the result of the query. Determining independence is especially useful in the contest of huge RDF repositories, where it permits to avoid expensive yet useless re-evaluation of queries. While this problem has been intensively studied for fragments of relational calculus, no works exist for the standard query language for the semantic web. We report on our investigations on how a notion of independence can be defined in the SPARQL context; L’analyse statique est une tâche essentielle dans l’optimisation des requêtes et la vérification de la base de graphes RDF. Nous étudions des techniques d’analyse statique pour SPARQL, le langage standard pour l’interrogation des données du Web sémantique. Plus précisément, nous étudions le problème d’inclusion des requêtes et de l’analyse de l’indépendance entre les requêtes et la mise à jour de la base de graphes RDF.Nous sommes intéressés par le développement de techniques grâce à des réductions au problème de la satisfaisabilité de la logique.Nous nous traitons le problème d’inclusion des requêtes SPARQL en présence de l’opérateur OPTIONAL. L’optionalité est l’un des constructeurs les plus compliqués dans SPARQL et aussi celui qui rend ce langage plus expressif que les langages de requêtes classiques, comme SQL.Nous nous concentrons sur la classe de requêtes appelée "well-designed SPARQL", proposées dans la littérature comme un fragment du langage avec de bonnes propriétés en matière d’évaluation des requêtes incluent l’opération OPTIONAL. À ce jour, l’inclusion de requête a été testée à l’aide de différentes techniques: homomorphisme de graphes, bases de données canoniques, techniques de la théorie des automates et réduction au problème de la validité d’une logique. Dans cette thèse, nous utilisons la dernière technique pour tester l’inclusion des requêtes SPARQL avec OPTIONAL utilisant une logique expressive appelée «logique K». En utilisant cette technique, il est possible de régler le problème d’inclusion des requêtes pour plusieurs fragment de SPARQL, même en présence de schémas. Cette extensibilité n’est pas garantie par les autres méthodes.Nous montrons comment traduire a graphe RDF en un système de transitions, ainsi que une requête SPARQL en une formula K. Avec ces traductions, l’inclusion des requêtes dans SPARQL peut être réduite au test de la validité d’une formule logique. Un avantage de cette approche est d’ouvrir la voie pour des implémentations utilisant solveurs de satisfiabilité pour K.Nous présentons un banc d’essais de tests d’inclusion pour les requêtes SPARQL avec OPTIONAL. Nous avons effectué des expériences pour tester et comparer des solveurs d’inclusion de l’état de l’art.Nous présentons également un aperçu préliminaire du problème d’indépendance entre requête et mise à jour. Une requête est indépendante de la mise à jour lorsque l’exécution de la mise à jour ne modifie pas le résultat de la requête. Bien que ce problème ait été intensivement étudié pour des fragments de calcul relationnel, il n’existe pas de travaux pour le langage de requêtes standard pour le web sémantique. Nous proposons une définition de la notion de l’indépendance dans le contexte de SPARQL et nous établissons des premières pistes de analyse statique dans certains situations d’inclusion entre une requête et une mise à jour.
- Published
- 2015
43. Containment of partially specified tree-pattern queries in the presence of dimension graphs
- Author
-
Theodoratos, Dimitri, Placek, Pawel, Dalamagas, Theodore, Souldatos, Stefanos, and Sellis, Timos
- Published
- 2009
- Full Text
- View/download PDF
44. HCH for Checking Containment of XPath Fragment
- Author
-
Feng, Jian-Hua, Liao, Yu-Guo, and Zhang, Yong
- Published
- 2007
- Full Text
- View/download PDF
45. Query containment for data integration systems
- Author
-
Marc Friedman, Todd Millstein, and Alon Y. Levy
- Subjects
Query rewriting ,Datalog ,Theoretical computer science ,Computer Networks and Communications ,0102 computer and information sciences ,02 engineering and technology ,computer.software_genre ,Query optimization ,Query language ,01 natural sciences ,Theoretical Computer Science ,Web query classification ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics ,computer.programming_language ,Containment (computer programming) ,Query containment ,Applied Mathematics ,InformationSystems_DATABASEMANAGEMENT ,Binding patterns ,Spatial query ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Data integration ,020201 artificial intelligence & image processing ,Conjunctive query ,computer ,Views ,Boolean conjunctive query - Abstract
The problem of query containment is fundamental to many aspects of database systems, including query optimization, determining independence of queries from updates, and rewriting queries using views. In the data-integration framework, however, the standard notion of query containment does not suffice. We define relative containment, which formalizes the notion of query containment relative to the sources available to the data-integration system. First, we provide optimal bounds for relative containment for several important classes of datalog queries, including the common case of conjunctive queries. Next, we provide bounds for the case when sources enforce access restrictions in the form of binding pattern constraints. Surprisingly, we show that relative containment for conjunctive queries is still decidable in this case, even though it is known that finding all answers to such queries may require a recursive datalog program over the sources. Finally, we provide tight bounds for variants of relative containment when the queries and source descriptions may contain comparison predicates.
- Published
- 2003
- Full Text
- View/download PDF
46. A Knowledge-Based Approach to Visual Information
- Author
-
Bertino, Elisa, Elmagarmid, Ahmed K., and Hacid, Mohand-Saïd
- Published
- 2002
- Full Text
- View/download PDF
47. Combining Horn rules and description logics in CARIN
- Author
-
Marie-Christine Rousset and Alon Y. Levy
- Subjects
Linguistics and Language ,Theoretical computer science ,Knowledge representation and reasoning ,Description logics ,Rule Interchange Format ,Inference ,computer.software_genre ,Logical consequence ,Language and Linguistics ,Hybrid languages ,Description logic ,Artificial Intelligence ,Horn rules ,Representation (mathematics) ,Mathematics ,business.industry ,Query containment ,Undecidable problem ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Knowledge representation ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Core (graph theory) ,Artificial intelligence ,business ,computer ,Natural language processing - Abstract
We describe carin , a novel family of representation languages, that combine the expressive power of Horn rules and of description logics. We address the issue of providing sound and complete inference procedures for such languages. We identify existential entailment as a core problem in reasoning in carin , and describe an existential entailment algorithm for the ALCNR description logic. As a result, we obtain a sound and complete algorithm for reasoning in non-recursive carin ALCNR knowledge bases, and an algorithm for rule subsumption over ALCNR . We show that in general, the reasoning problem for recursive carin - ALCNR knowledge bases is undecidable, and identify the constructors of ALCNR causing the undecidability. We show two ways in which carin - ALCNR knowledge bases can be restricted while obtaining sound and complete reasoning.
- Published
- 1998
- Full Text
- View/download PDF
48. Verification of knowledge bases based on containment checking
- Author
-
Alon Y. Levy and Marie-Christine Rousset
- Subjects
Linguistics and Language ,Theoretical computer science ,business.industry ,Computer science ,Description logics ,Query containment ,Database theory ,Knowledge base verification ,Language and Linguistics ,Decidability ,Undecidable problem ,Knowledge-based systems ,Hybrid languages ,Knowledge extraction ,Knowledge base ,Description logic ,Artificial Intelligence ,Horn rules ,Domain knowledge ,business - Abstract
Building complex knowledge based applications requires encoding large amounts of domain knowledge. After acquiring knowledge from domain experts, much of the effort in building a knowledge base goes into verifying that the knowledge is encoded correctly. A knowledge base is verified if it can be shown that certain constraints always hold between the inputs and the outputs. We consider the knowledge base verification problem for Horn rule knowledge bases and for three kinds of constraints: I/O consistency constraints, I/O dependency constraints, and input completeness constraints. For the first two cases, we establish tight complexity results on the problem, and show in what cases it is decidable. In the third case, we show that the problem is, in general, undecidable, and we identify two decidable cases. In our analysis we show how the properties of the problem vary depending on the presence of recursion in the Horn rules, the presence of the interpreted predicates =, ⩽, < and ≠ and the presence of negation in the antecedents of the rules. Our approach to the verification problem is based on showing a close relationship to the problem of query containment, studied in the database literature. This connection also provides novel algorithms for the knowledge base verification problem. Finally, we provide the first algorithm for verifying hybrid knowledge bases that combine the expressive power of Horn rules and the description logicALCNR.
- Published
- 1998
- Full Text
- View/download PDF
49. Schema Query Containment
- Author
-
Chekol, Melisachew Wudagae, Knowledge representation, reasonning (ORPAILLEUR), INRIA Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS), and Inria Nancy - Grand Est (Villers-lès-Nancy, France)
- Subjects
schema ,entailment regime ,Query containment ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,OWL-ALCH ,InformationSystems_DATABASEMANAGEMENT ,SPARQL ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] - Abstract
SPARQL is a schema query language allowing access to the TBox part of a knowledge base. Moreover its entailment regimes enable to take into account knowledge inferred from persistently stored knowledge bases in the query answering process. Thus, the emergence of SPARQL entailment regimes provide a new perspective for the containment problem. As one has to deal with axiomatic triples, datatype reasoning, and blank nodes that result in infinite answers. Of particular interest for us is the union of conjunctive queries that are a core fragment of SPARQL. In this paper, we study the containment of such queries based on the OWL-ALCH Direct and RDF-Based Semantics entailment regimes.
- Published
- 2014
50. On the Complexity of Entailment in Existential Conjunctive First Order Logic with Atomic Negation
- Author
-
Michaël Thomazo, Marie-Laure Mugnier, Geneviève Simonet, Graphs for Inferences on Knowledge (GRAPHIK), Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier (LIRMM), Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Algorithmes, Graphes et Combinatoire (ALGCO), Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM), Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Inria Sophia Antipolis - Méditerranée (CRISAM), and Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Graph Homomorphism ,Entailment ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Graph ,Theoretical Computer Science ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] ,Fragment (logic) ,Negation ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Preferential entailment ,Graph homomorphism ,Textual entailment ,Mathematics ,Discrete mathematics ,Query containment ,Clause implication ,Complexity ,16. Peace & justice ,First-order logic ,Computer Science Applications ,Conceptual graph ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Homomorphism ,Conjunctive query ,Information Systems - Abstract
International audience; We consider the entailment problem in the fragment of first-order logic (FOL) composed of existentially closed conjunctions of literals (without functions), denoted FOL(exists, et, not_a). This problem can be recast as several fundamental problems in artificial intelligence and databases, namely query containment for conjunctive queries with negation, clause entailment for clauses without functions and query answering with incomplete information for Boolean conjunctive queries with negation over a fact base. Entailment in FOL(exists, et, not_a) is Pi2P-complete, whereas it is only NP-complete when the formulas contain no negation. We investigate the role of specific literals in this complexity increase. These literals have the property of being "exchangeable", with this notion taking the structure of the formulas into account. To focus on the structure of formulas, we shall see them as labeled graphs. Graph homomorphism, which provides a sound and complete proof procedure for positive formulas, is at the core of this study. Let ENTAILMENT_k be the following family of problems: given two formulas g and h in FOL(exists, et, not_a), such that g has at most k pairs of exchangeable literals, is g entailed by h? The main results are that ENTAILMENT_k is NP-complete if k is less or equal to 1, and P^NP-II-complete for any value of k greater or equal to 3. As a corollary of our proofs, we are able to classify exactly ENTAILMENTk for any value of k different from 2 when g is decomposable into a tree.
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.