Skip to main navigation Skip to search Skip to main content

Grounded Fixpoints and Active Integrity Constraints

Research output: Journal Article or Conference Article in JournalConference articleResearchpeer-review

Abstract

The formalism of active integrity constraints was introduced as a way to specify particular classes of integrity constraints over relational databases together with preferences on how to repair existing inconsistencies. The rule-based syntax of such integrity constraints also provides algorithms for finding such repairs that achieve the best asymptotic complexity. However, the different semantics that have been proposed for these integrity constraints all exhibit some counter-intuitive examples. In this work, we look at active integrity constraints using ideas from algebraic fixpoint theory. We show how database repairs can be modeled as fixpoints of particular operators on databases, and study how the notion of grounded fixpoint induces a corresponding notion of grounded database repair that captures several natural intuitions, and in particular avoids the problems of previous alternative semantics. In order to study grounded repairs in their full generality, we need to generalize the notion of grounded fixpoint to non-deterministic operators. We propose such a definition and illustrate its plausibility in the database context.
Original languageEnglish
JournalLeibniz International Proceedings in Informatics
Volume52
Pages (from-to)11:1-11:14
DOIs
Publication statusPublished - 2016
Externally publishedYes
EventInternational Conference on Logic Programming - New York City, United States
Duration: 16 Oct 201621 Oct 2016
Conference number: 32
https://software.imdea.org/Conferences/ICLP2016/

Conference

ConferenceInternational Conference on Logic Programming
Number32
Country/TerritoryUnited States
CityNew York City
Period16/10/201621/10/2016
Internet address

Keywords

  • Active integrity constraints
  • Grounded fixpoints

Fingerprint

Dive into the research topics of 'Grounded Fixpoints and Active Integrity Constraints'. Together they form a unique fingerprint.

Cite this