Return to search

On detecting and repairing inconsistent schema mappings

Huge amount of data flows around the Internet every second, but for the data to be
useful at its destination, it must be presented in a way such that the target has little problem interpreting it. Current data exchange technologies may rearrange the
structure of data to suit expectations at the target. However, there may be semantics
behind data (e.g. knowing the title of a book can determine its #pages) that may
be violated after data translation. These semantics are expressed as integrity constraints (IC) in a database. Currently, there is no guarantee that the exchanged data
conforms to the target’s ICs. As a result, existing applications (e.g. user queries)
that assume such semantics will no longer function correctly. Current constraint
repair techniques deal with data after it has been translated; thus take no consideration of the integrity constraints at the source. Moreover, such constraint repair
methods usually involve addition/deletion/modification of data, which may yield
incomplete or false data. We consider the constraints of both source and target
schemas; together with the mapping, we can efficiently detect which constraint is
violated and suggest ways to correct the mappings. / Science, Faculty of / Computer Science, Department of / Graduate

Identiferoai:union.ndltd.org:UBC/oai:circle.library.ubc.ca:2429/4126
Date11 1900
CreatorsHo, Terence Cheung-Fai
PublisherUniversity of British Columbia
Source SetsUniversity of British Columbia
LanguageEnglish
Detected LanguageEnglish
TypeText, Thesis/Dissertation
Format1428416 bytes, application/pdf
RightsAttribution-NonCommercial-NoDerivatives 4.0 International, http://creativecommons.org/licenses/by-nc-nd/4.0/

Page generated in 0.0029 seconds