Huge amount of data flows around the Internet every second, but for the data to be
useful at its destination, it must be presented in a way such that the target has little problem interpreting it. Current data exchange technologies may rearrange the
structure of data to suit expectations at the target. However, there may be semantics
behind data (e.g. knowing the title of a book can determine its #pages) that may
be violated after data translation. These semantics are expressed as integrity constraints (IC) in a database. Currently, there is no guarantee that the exchanged data
conforms to the target’s ICs. As a result, existing applications (e.g. user queries)
that assume such semantics will no longer function correctly. Current constraint
repair techniques deal with data after it has been translated; thus take no consideration of the integrity constraints at the source. Moreover, such constraint repair
methods usually involve addition/deletion/modification of data, which may yield
incomplete or false data. We consider the constraints of both source and target
schemas; together with the mapping, we can efficiently detect which constraint is
violated and suggest ways to correct the mappings. / Science, Faculty of / Computer Science, Department of / Graduate
Identifer | oai:union.ndltd.org:UBC/oai:circle.library.ubc.ca:2429/4126 |
Date | 11 1900 |
Creators | Ho, Terence Cheung-Fai |
Publisher | University of British Columbia |
Source Sets | University of British Columbia |
Language | English |
Detected Language | English |
Type | Text, Thesis/Dissertation |
Format | 1428416 bytes, application/pdf |
Rights | Attribution-NonCommercial-NoDerivatives 4.0 International, http://creativecommons.org/licenses/by-nc-nd/4.0/ |
Page generated in 0.0029 seconds