Access Restriction

Author Gertz, M. ♦ Lipeck, U.W.
Source IEEE Xplore Digital Library
Content type Text
Publisher Institute of Electrical and Electronics Engineers, Inc. (IEEE)
File Format PDF
Copyright Year ©1993
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Monitoring ♦ Relational databases ♦ Transaction databases ♦ Constraint optimization ♦ Logic ♦ Design optimization ♦ Prototypes ♦ Erbium ♦ Runtime ♦ Database systems
Abstract Methods for deriving constraint maintaining triggers from dynamic integrity constraints represented by transition graphs are presented. The methods reduce integrity monitoring to checking changing static conditions according to life cycle situations. Thus, triggers have to be generated from these graphs, which depend not only on the operations that have occurred in a transaction, but also on the situations that have been reached by the objects mentioned in the constraints. The techniques presented work for dynamic constraints and their corresponding transition graphs as well as for simple static constraints. Only passive reactions (rollbacks) to constraint violations are provided by the trigger patterns, but the systematic generation of such patterns should help the database designer in identifying possible active reactions for repairing constraint violations.<<ETX>>
Description Author affiliation: Inst. fur Inf., Hannover Univ., Germany (Gertz, M.; Lipeck, U.W.)
ISBN 0818635703
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research ♦ Reading
Education Level UG and PG
Learning Resource Type Article
Publisher Date 1993-04-19
Rights Holder Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Size (in Bytes) 793.04 kB
Page Count 8
Starting Page 22
Ending Page 29

Source: IEEE Xplore Digital Library