Affiliation:
1. Clausthal University of Technology, Clausthal-Zellerfeld, Germany
2. Victoria University of Wellington, Wellington, New Zealand
Abstract
We review key constraints in the context of XML as introduced by Buneman et al. We demonstrate that:
(1) one of the proposed inference rules is not sound in general, and
(2) the inference rules are incomplete for XML key implication, even for nonempty sets of simple key paths.
This shows, in contrast to earlier statements, that the axiomatizability of XML keys is still open, and efficient algorithms for deciding their implication still need to be developed. Solutions to these problems have a wide range of applications including consistency validation, XML schema design, data exchange and integration, consistent query answering, XML query optimization and rewriting, and indexing.
In this article, we investigate the axiomatizability and implication problem for XML keys with nonempty sets of simple key paths. In particular, we propose a set of inference rules that is indeed sound and complete for the implication of such XML keys. We demonstrate that this fragment is robust by showing the duality of XML key implication to the reachability problem of fixed nodes in a suitable digraph. This enables us to develop a quadratic-time algorithm for deciding implication, and shows that reasoning about this XML key fragment is practically efficient. Therefore, XML applications can be unlocked effectively since they benefit not only from those XML keys specified explicitly by the data designer but also from those that are specified implicitly.
Publisher
Association for Computing Machinery (ACM)
Reference49 articles.
1. Abiteboul S. Hull R. and Vianu V. 1995. Foundations of Databases. Addison-Wesley. Abiteboul S. Hull R. and Vianu V. 1995. Foundations of Databases. Addison-Wesley.
2. Apparao V. 1998. Document object model (DOM) level 1 specification W3C recommendation. http://www.w3.org/TR/REC-DOM-Level-1/. Apparao V. 1998. Document object model (DOM) level 1 specification W3C recommendation. http://www.w3.org/TR/REC-DOM-Level-1/.
3. A normal form for XML documents
4. An information-theoretic approach to normal forms for relational and XML data
5. Structural properties of XPath fragments
Cited by
57 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Controlling entity integrity with key sets;Journal of Computer and System Sciences;2023-09
2. Uniqueness Constraints for Object Stores;Journal of Data and Information Quality;2023-06-22
3. Entity integrity management under data volume, variety and veracity;Knowledge and Information Systems;2023-01-25
4. Neo4j Keys;Conceptual Modeling;2020
5. Possibilistic keys;Fuzzy Sets and Systems;2019-12