View Disassembly

  • Parke Godfrey
  • Jarek Gryz
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1540)

Abstract

We explore a new form of view rewrite called view disassembly. The objective is to rewrite views in order to “remove” certain sub-views (or unfoldings) of the view. This becomes pertinent for complex views which may defined over other views and which may involve union. Such complex views arise necessarily in environments as data warehousing and mediation over heterogeneous databases. View disassembly can be used for view and query optimization, preserving data security, making use of cached queries and materialized views, and view maintenance.

We provide computational complexity results of view disassembly. We show that the optimal rewrites for disassembled views is at least NP - hard. However, we provide good news too. We provide an approximation algorithm that has much better run-time behavior. We show a pertinent class of unfoldings for which their removal always results in a simpler disassembled view than the view itself. We also show the complexity to determine when a collection of unfoldings cover the view definition.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    U. Chakravarthy, J. Grant, and J. Minker. Logic-based approach to semantic query optimization. ACM Transactions on Database Systems, 15(2):162–207, June 1990.CrossRefGoogle Scholar
  2. [2]
    S. Dar, M. Franklin, B. Jónsson, D. Srivastava, and M. Tan. Semantic data caching and replacement. In Proceedings of the 22nd International Conference on Very Large Data Bases (VLDB), Bombay, India, Sept. 1996.Google Scholar
  3. [3]
    T. Feder and R. Motwani. Clique partitions, graph compressions and speeding-up algorithms. In Proceedings of the ACM Sumposium on Theory of Computing, pages 123–133, 1991.Google Scholar
  4. [4]
    M. R. Garey and D. S. Johnson. Computers and Intractability: a Guide to the Theory of NP-Completeness. A Series of Books in the Mathematical Sciences. W. H. Freeman and Company, New York, 1979.Google Scholar
  5. [5]
    P. Godfrey. An Architecture and Implementation for a Cooperative Database System. PhD thesis, University of Maryland at College Park, College Park, Maryland 20742, 1998.Google Scholar
  6. [6]
    P. Godfrey and J. Gryz. Intensional query optimization. Technical Report CS-TR-3702, UMIACS-TR-96-72, Dept. of Computer Science, University of Maryland, College Park, MD 20742, Oct. 1996.Google Scholar
  7. [7]
    P. Godfrey and J. Gryz. Overview of dynamic query evaluation in intensional query optimization. In Proceedings of Fifth DOOD, pages 425–426, Montreux, Switzerland, Dec. 1997. Longer version appears as [6].Google Scholar
  8. [8]
    P. Godfrey, J. Gryz, and J. Minker. Semantic query optimization for bottom-up evaluation. In Z. W. Raś and M. Michalewicz, editors, Foundations of Intelligent Systems: Proceedings of the 9th International Symposium on Methodologies for Intelligent Systems, Lecture Notes in Artificial Intelligence 1079, pages 561–571, Berlin, June 1996. Springer.Google Scholar
  9. [9]
    L. V. S. Lakshmanan and H. Hernandez. Structural query optimization: A uniform framework for semantic query optimization in deductive databases. In Proceedings of the ACM Symposium on the Principles of Database Systems, pages 102–114, Denver, Colorado, May 1991.Google Scholar
  10. [10]
    L. V. S. Lakshmanan and R. Missaoui. Pushing constraints inside recursion: A general framework for semantic optimization of recursive queries. In Proceedings of the International Conference on Data Engineering, Taipei, Taiwan, Feb. 1995.Google Scholar
  11. [11]
    S. Lee, L. J. Henschen, and G. Z. Qadah. Semantic query reformulation in deductive databases. In Proceedings of the IEEE International Conference on Data Engineering, pages 232–239. IEEE Computer Society Press, 1991.Google Scholar
  12. [12]
    A. Y. Levy, A. O. Mendelzon, Y. Sagiv, and D. Srivastava. Answering queries using views. In Proc. PODS, pages 95–104, 1995.Google Scholar
  13. [13]
    T. Sellis and S. Ghosh. On the multiple-query optimization problem. TKDE, 2(2):262–266, June 1990.Google Scholar
  14. [14]
    B. Thuraisingham and W. Ford. Security constraint processing in a multilevel secure distributed database management system. IEEE Transactions on Knowledge and Data Engineering, 7(2):274–293, Apr. 1995.CrossRefGoogle Scholar
  15. [15]
    J. D. Ullman. Principles of Database and Knowledge-Base Systems, Volumes I & II. Principles of Computer Science Series. Computer Science Press, Incorporated, Rockville, Maryland, 1988/1989.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Parke Godfrey
    • 1
    • 2
  • Jarek Gryz
    • 3
  1. 1.University of MarylandCollege ParkUSA
  2. 2.U.S. Army Research LaboratoryAdelphiUSA
  3. 3.York UniversityTorontoCanada

Personalised recommendations