• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • 1
  • Tagged with
  • 3
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Program Transformation for Proving Database Transaction Safety

Lawley, Michael John, n/a January 2000 (has links)
In this thesis we propose the use of Dijkstra's concept of a predicate transformer [Dij75] for the determination of database transaction safety [SS89] and the generation of simple conditions to check that a transaction will not violate the integrity constraints in the case that it is not safe. The generation of this simple condition is something that can be done statically, thus providing a mechanism for generating safe transactions. Our approach treats a database as state, a database transaction as a program, and the database's integrity constraints as a postcondition in order to use a predicate transformer [Dij75] to generate a weakest precondition. We begin by introducing a set-oriented update language for relational databases for which a predicate transformer is then defined. Subsequently, we introduce a more powerful update language for deductive databases and define a new predicate transformer to deal with this language and the more powerful integrity constraints that can be expressed using recursive rules. Next we introduce a data model with object-oriented features including methods, inheritance and dynamic overriding. We then extend the predicate transformer to handle these new features. For each of the predicate transformers, we prove that they do indeed generate a weakest precondition for a transaction and the database integrity constraints. However, the weakest precondition generated by a predicate transformer still involves much redundant checking. For several general classes of integrity constraint, including referential integrity and functional dependencies, we prove that the weakest precondition can be substantially further simplified to avoid checking things we already know to be true under the assumption that the database currently satisfies its integrity con-straints. In addition, we propose the use of the predicate transformer in combination with meta-rules that capture the exact incremental change to the database of a particular transaction. This provides a more general approach to generating simple checks for enforcing transaction safety. We show that this approach is superior to known existing previous approaches to the problem of efficient integrity constraint checking and transaction safety for relational, deductive, and deductive object-oriented databases. Finally we demonstrate several further applications of the predicate transformer to the problems of schema constraints, dynamic integrity constraints, and determining the correctness of methods for view updates. We also show how to support transactions embedded in procedural languages such as C.
2

IS XML srautų formavimas panaudojant komunikacines kilpas / Information system XML stream formatting using communication loops

Kanaitis, Ričardas 29 May 2005 (has links)
In changing world of computerized information systems modeling of business transactions plays an important role. Business transaction can be defined as extended communicative action loop. Using such approach, business processes and new functional requirements may be represented as choreographed sets of extended communicative action loops with established pragmatic and semantic dependencies. In general case, a computerized information system may be of hybrid nature, that is, it may consist of different versions and types of databases. XML streams’ formatting in hybrid information system is discussed in this paper.
3

Temporální rozšíření pro PostgreSQL / A Temporal Extension for PostgreSQL

Jelínek, Radek January 2015 (has links)
This thesis is focused on PostgreSQL database system. You can find here introducing to temporal databases, database system PostgreSQL, proposal of temporal extension for PostgreSQL and implementation chapter with examples of using this extension. In this thesis is also using temporal database systems and use temporal databases in practise.

Page generated in 0.1092 seconds