2005lav-ii1 Local as View: Some refinements  IM: Filtering irrelevant sources  Views with restricted access patterns  A summary of IM.

Slides:



Advertisements
Similar presentations
Schema Matching and Query Rewriting in Ontology-based Data Integration Zdeňka Linková ICS AS CR Advisor: Július Štuller.
Advertisements

Ontologies and Databases Ian Horrocks Information Systems Group Oxford University Computing Laboratory.
CS848: Topics in Databases: Foundations of Query Optimization Topics covered  Introduction to description logic: Single column QL  The ALC family of.
2005conjunctive-ii1 Query languages II: equivalence & containment (Motivation: rewriting queries using views)  conjunctive queries – CQ’s  Extensions.
Information Integration Using Logical Views Jeffrey D. Ullman.
CPSC 504: Data Management Discussion on Chandra&Merlin 1977 Laks V.S. Lakshmanan Dept. of CS UBC.
CS4432: Database Systems II
Inference and Reasoning. Basic Idea Given a set of statements, does a new statement logically follow from this. For example If an animal has wings and.
1 Global-as-View and Local-as-View for Information Integration CS652 Spring 2004 Presenter: Yihong Ding.
Copyright © Cengage Learning. All rights reserved.
Of 27 lecture 7: owl - introduction. of 27 ece 627, winter ‘132 OWL a glimpse OWL – Web Ontology Language describes classes, properties and relations.
CS 355 – Programming Languages
Catriel Beeri Pls/Winter 2004/5 last 55 Two comments on let polymorphism I. What is the (time, space) complexity of type reconstruction? In practice –
Analyzing Minerva1 AUTORI: Antonello Ercoli Alessandro Pezzullo CORSO: Seminari di Ingegneria del SW DOCENTE: Prof. Giuseppe De Giacomo.
CPSC 411, Fall 2008: Set 12 1 CPSC 411 Design and Analysis of Algorithms Set 12: Undecidability Prof. Jennifer Welch Fall 2008.
Lecture 9 Recursive and r.e. language classes
Fuzzy Description Logics
2005certain1 Views as Incomplete Databases – Certain & Possible Answers  Views – an incomplete representation  Certain and possible answers  Complexity.
2005Integration-intro1 Data Integration Systems overview The architecture of a data integration system:  Components and their interaction  Tasks  Concepts.
2005lav-iii1 The Infomaster system & the inverse rules algorithm  The InfoMaster system  The inverse rules algorithm  A side trip – equivalence & containment.
From SHIQ and RDF to OWL: The Making of a Web Ontology Language
1 Relational Algebra and Calculus Yanlei Diao UMass Amherst Feb 1, 2007 Slides Courtesy of R. Ramakrishnan and J. Gehrke.
THE MODEL OF ASIS FOR PROCESS CONTROL APPLICATIONS P.Andreeva, T.Atanasova, J.Zaprianov Institute of Control and System Researches Topic Area: 12. Intelligent.
Integrating DLs with Logic Programming Boris Motik, University of Manchester Joint work with Riccardo Rosati, University of Rome.
Ontology Alignment/Matching Prafulla Palwe. Agenda ► Introduction  Being serious about the semantic web  Living with heterogeneity  Heterogeneity problem.
Search Engines and Information Retrieval Chapter 1.
1 Relational Algebra and Calculus Chapter 4. 2 Relational Query Languages  Query languages: Allow manipulation and retrieval of data from a database.
Optimizing Queries Using Materialized Views Qiang Wang CS848.
A Z Approach in Validating ORA-SS Data Models Scott Uk-Jin Lee Jing Sun Gillian Dobbie Yuan Fang Li.
DECIDABILITY OF PRESBURGER ARITHMETIC USING FINITE AUTOMATA Presented by : Shubha Jain Reference : Paper by Alexandre Boudet and Hubert Comon.
1 Inference Rules and Proofs (Z); Program Specification and Verification Inference Rules and Proofs (Z); Program Specification and Verification.
Declarative vs Procedural Programming  Procedural programming requires that – the programmer tell the computer what to do. That is, how to get the output.
Learning Automata and Grammars Peter Černo.  The problem of learning or inferring automata and grammars has been studied for decades and has connections.
LDK R Logics for Data and Knowledge Representation ClassL (part 3): Reasoning with an ABox 1.
ISBN Chapter 3 Describing Semantics -Attribute Grammars -Dynamic Semantics.
CS 363 Comparative Programming Languages Semantics.
Answering Queries Using Views LMSS’95 Laks V.S. Lakshmanan Dept. of Comp. Science UBC.
Advanced topics in software engineering (Semantic web)
Relational Algebra.
More on Description Logic(s) Frederick Maier. Note Added 10/27/03 So, there are a few errors that will be obvious to some: So, there are a few errors.
1 Artificial Intelligence Applications Institute Centre for Intelligent Systems and their Applications Stuart Aitken Artificial Intelligence Applications.
3.2 Semantics. 2 Semantics Attribute Grammars The Meanings of Programs: Semantics Sebesta Chapter 3.
ISBN Chapter 3 Describing Semantics.
Chapter 3 Part II Describing Syntax and Semantics.
Copyright © Cengage Learning. All rights reserved.
Ch. 13 Ch. 131 jcmt CSE 3302 Programming Languages CSE3302 Programming Languages (notes?) Dr. Carter Tiernan.
Big-O. Algorithm Analysis Exact analysis: produce a function f(n) measuring how many basic steps are needed for a given inputs n On any input of size.
Lecture 7: Foundations of Query Languages Tuesday, January 23, 2001.
1 First order theories (Chapter 1, Sections 1.4 – 1.5) From the slides for the book “Decision procedures” by D.Kroening and O.Strichman.
Description Logics Dr. Alexandra I. Cristea. Description Logics Description Logics allow formal concept definitions that can be reasoned about to be expressed.
272: Software Engineering Fall 2012 Instructor: Tevfik Bultan Lecture 9: Test Generation from Models.
1 Reasoning with Infinite stable models Piero A. Bonatti presented by Axel Polleres (IJCAI 2001,
ece 627 intelligent web: ontology and beyond
Static Techniques for V&V. Hierarchy of V&V techniques Static Analysis V&V Dynamic Techniques Model Checking Simulation Symbolic Execution Testing Informal.
Of 35 lecture 17: semantic web rules. of 35 ece 627, winter ‘132 logic importance - high-level language for expressing knowledge - high expressive power.
Young CS 331 D&A of Algo. NP-Completeness1 NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and.
Presented by Kyumars Sheykh Esmaili Description Logics for Data Bases (DLHB,Chapter 16) Semantic Web Seminar.
Of 29 lecture 15: description logic - introduction.
Author: Akiyoshi Matonoy, Toshiyuki Amagasay, Masatoshi Yoshikawaz, Shunsuke Uemuray.
LDK R Logics for Data and Knowledge Representation Description Logics: family of languages.
Ontology Technology applied to Catalogues Paul Kopp.
Ccs.  Ontologies are used to capture knowledge about some domain of interest. ◦ An ontology describes the concepts in the domain and also the relationships.
1 Representing and Reasoning on XML Documents: A Description Logic Approach D. Calvanese, G. D. Giacomo, M. Lenzerini Presented by Daisy Yutao Guo University.
OWL (Ontology Web Language and Applications) Maw-Sheng Horng Department of Mathematics and Information Education National Taipei University of Education.
From Classical Proof Theory to P vs. NP
Relational Database Design by Dr. S. Sridhar, Ph. D
Ontologies and Databases
Instructor: Aaron Roth
Instructor: Aaron Roth
Relational Calculus Chapter 4, Part B
Presentation transcript:

2005lav-ii1 Local as View: Some refinements  IM: Filtering irrelevant sources  Views with restricted access patterns  A summary of IM

2005lav-ii2  IM: Filtering irrelevant sources When there are many sources, it is important to weed out those that are irrelevant to a query Comparison constraints can help (e.g., qu >= w98) What more can be done? The IM system suggests to introduce classes with a class hierarchy into source descriptions

2005lav-ii3 Example : -- disjoint classes Additionally, the global schema contains a relation details(car, year, mileage, price, sellerContact) [ c, y, mi, p, s ] (we will also abbreviate class names) car carForSale usedCar newCar GermanCar AmericanCarEurpoeanCar JapaneseCar ItalianCarFrenchCar

2005lav-ii4 The views: v1(c, y, mi, p, s) :- details(c,y,mi,p,s), cFSale(c), uCar(c),,y >= 1990 v2(c, y, p, s) :- details(c,y,mi,p,s), cFSale(c), EurCar(c) v3(c, y, p, s) :- details(c,y,mi,p,s), cFSale(c), uCar(c), p>= $25000 // luxury cars v4(c, y, p):- details(c,y,mi,p,s), cFSale(c), uCar(c), y<= 1980 //vintage cars v5(c, y, p, s) :- details(c, mc, y, p, s), cFSale(c), nCar(c), c=Toyota Assume a query: Q: q(c, mc, y, p, s) :- details(c, y, mi, p, s), cFSale(c), Jcar(c), y>= 1992, p<= $12000 Some candidate rewritings will be rejected, since they are inconsistent with Q

2005lav-ii5 When a view is considered for consistency with Q, v4 will be discarded – y =1992 is inconsistent v3 will be discarded – p>=$25000, p<=$12000 is inconsistent v2 will be discarded – EurCar(c), JCar(c) is inconsistent v5 – depends on what is known about the relationship between Toyota and the various car classes Reasoning about disjoint-ness of classes (given a hierarchy as above) is easy and efficient

2005lav-ii6 The true story (a side trip): IM uses a (PTIME) Description Logic for source description A DL is a formalism that describes classes & binary relationships intentionally. For example, a class can be given by a name (e.g. JCar) or by an expression that describes its properties: cheapJCar :- uCar and JCar and price < $9000 A DL also contains containment and disjoint-ness axioms for class expressions (containment is called subsumption in DL jargon) To be useful, a DL needs to support containment and disjoint- ness queries on classes and membership queries on individuals – this is an inference problem

2005lav-ii7 Many DL’s are known Complexity (for subsumption) ranges from polynomial (rare), to NP-complete, to exptime-complete, to undecidable Recent interest focuses on using DL’s for the Semantic Web The W3C OWL standard is essentially a DL (this use is essentially the same as in IM) That is it on DL’s

2005lav-ii8  Views with restricted access patterns Many sources do not support full SQL: They are legacy systems, e.g. –finger on UNIX accepts , returns other attributes –A bibliography source requires author, or title, or but does not accept a year as input They do not want to disclose all their data, e.g., –a carSale source will not present all the cars it has for sale –An airline requires from and destination as input for flight info The questions: How do we describe such sources? What are good rewritings and do we find them?

2005lav-ii9 Restricted sources can be described by binding patterns Two equivalent styles : (there are more sophisticated schemes) Example: assume global relations (F, L, E), office(F, L, O), phone(O, P) (F-first, L-last, E- , O-office, P-phone) The views are finger, userId, described as follows: Adding $ to attributes that can be given as input finger(F, L, $E, O, P) :- (F, L, E), office(F, L, O), phone(O, P) userId($O, E) :- office(F, L, O), (F, L, E) Using b, f strings on predicates, where b means bound (i.e., in) finger ffbff (F, L, E, O, P) :- (F, L, E), office(F, L, O), phone(O, P) userId bf (O, E) :- office(F, L, O), (F, L, E)

2005lav-ii10 Example, cont’d : Q: q bf (O, F) :- office(F, L, O) (or q($O, F) :- office(F, L, O) ) Cannot be answered by using finger – it requires E as input Cannot be answered by using userId – it does not return F The following is a good rewriting: q’(O, F):- userId(O, E), finger(F, L, E, O, P) jumpjump For two reasons: It is executable with respect to the sources: executing the body left-to-right respects the access restrictions O for userId –from the query, E for finger – from userId Its expansion is contained in the query (check!)

2005lav-ii11 These two reasons are a characterization of a good rewriting: It is executable with respect to the sources: executing the body left-to-right respects the access restrictions Its expansion is contained in the query (check!) Indeed If it is not a contained rewriting, then being executable is no good Being contained but not executable is also no good

2005lav-ii12 The IM approach: After a rewriting is found to be consistent and contained, it is checked for being executable – can the sub-goals in the body be ordered so that the input required for each is supplied from the query or the sub-goals to its left

2005lav-ii13  A summary of IM Introduced (with other concurrent systems) the notion of LAV and query rewriting using views Also, detailed source descriptions using DL’s An efficient algorithm for finding contained and executable rewritings Worked well, for about 100 sources

2005lav-ii14 Here is a graph from the paper

2005lav-ii15 But : The fact that a contained rewriting needs a number of views at most the number of atoms in the query has been proved only for CQ’s, without comparisons, access restrictions constraints on the global db Does it hold for these cases? (see example in p. 10)p. 10 For access restricted sources, it has been proved that for equivalent rewritings one needs at most n+m views, where n is the number of atoms in the query, m is the number of different variables in it The proof does not hold for contained rewritings

2005lav-ii16 Even for “pure” CQ’s, is the bucket algorithm guaranteed to find all rewritings? The answers to all these questions are negative! The bucket algorithm does not find all rewritings For the more general cases, longer rewritings are needed; actually, there may be an infinite number of them, with no bound on length There is a need for another approach