skip to main content
article
Free Access

Efficient checking of temporal integrity constraints using bounded history encoding

Authors Info & Claims
Published:01 June 1995Publication History
Skip Abstract Section

Abstract

We present an efficient implementation method for temporal integrity constraints formulated in Past Temporal Logic. Although the constraints can refer to past states of the database, their checking does not require that the entire database history be stored. Instead, every database state is extended with auxiliary relations that contain the historical information necessary for checking constraints. Auxiliary relations can be implemented as materialized relational views.

References

  1. ABITEBOUL, S., HULL, R., AND VIANU, V. 1995. Foundations of Databases. Addison-Wesley, Reading, Mass. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. AKIN, I. ANn SNODC~RASS, R. 1988. Partitioned storage for temporal databases. Inf. Syst 13, 4, 369-391. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ALLEN, J. 1983. Maintaining knowledge about temporal intervals. Commun. ACM 26, 11 (November), 832-843. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ALUR, R. AND HENZINGER, T. 1998. Real-time logics: Complexity and expressiveness. Inf. Comput. 104, 35 77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. ALUR, R. AND HE~ZlNGER, T. 1992. Logics and models of real-t~me: A survey, In Real-Tzme Theory in Practice. LNCS 600, Springer-Verlag, New York, 74-106 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. APT, K., BLAIR, H., AND WALKER, A. 1988. Towards a theory of declarative knowledge. In Foundattons of Deductive Databases and Logic Programmtng, J. Minker, Ed, Morgan Kaufmann, San Mateo, Calif., 89-148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. BAUDINET, M., CHOMICKI, O., AND WOLPER, F. 1992. Temporal deductive databases. In Temporal Databases: Theory. Design, and Implementation, Tansel et al., Eds. Benjamin-Cummings, Redwood City, Calif., 294-320.Google ScholarGoogle Scholar
  8. BERNSTEIN, P., BLAUSTEIN, B., AND CLARKE, E. 1980. Fast maintenance of semantic integrity assertions using redundant aggregate data. In International Conference on Very Large Data Bases. (Montreal), VLDB Endowment, 126-136.Google ScholarGoogle Scholar
  9. CERI, S. AND WIDOM, J. 1991. Deriving production rules for incremental view maintenance. In International Conference on Very Large Data Bases. (Barcelona), VLDB Endowment, 577-589. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. CHOMICKI, J. 1994a. Temporal integrity constraints in relational databases. IEEE Data Eng. Bull. 17, 2 (June), 33-37.Google ScholarGoogle Scholar
  11. CHOMICKI, J, 1994b. Temporal query languages: A survey. In Temporal Logw, First International Con/krence, D. Gabbay and H. Ohlbach, Eds., LNAI 827, Springer-Verlag, New York, 506-534. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. CHOMICKi, J. 1992a. History-less checking of dynamic integrity constraints. In IEEE Internetlonal Conference on Data Engineering (Phoenix, Ariz., Feb.), 557-564. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. CHOMICK~, J. 1992b. Real-time integrity constraints. In ACM Symposium on Princtples of Database Systems (San Diego, Calif., June). ACM, New York, 274-282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. CHOMICKL J. AND IMIELIi~SKI, T. 1988. Temporal deductive databases and lnfimte objects. In ACM Symposium on Principles of Database Systems (Austin, Tex., March}. ACM, New York, 61-73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C~omcKL J. AND N~WI~SKI, D. 1993. On the feasibility of checking temporal integrity constraints. In ACM Symposium on Principles of Database Systems (Washington, D.C., May) ACM, New York. To appear in J. Comput, SYst. Sct. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. CMOMICKI, J. AND TOMAN, D. 1994/1995. Implementing temporal integrity constraints using an active DBMS IEEE Trans Knowl. Data Eng. (August 1995). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. CLIFFORD, J., CROKER, A., AND TUZHILIN, A. 1994. On completeness of historical relational query languages. ACM Trans. Database Syst. 19, i (March), 64-116. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. CLIFFORD, J., CRO~R, A., AND TUZHmIN, A. 1993. On the completeness of query languages for grouped and ungrouped historical data models. In Temporal Databases: Theory, Design, and ImplementatLon, Tansel et al, Eds Benjamin Cummings, Redwood City, Calif., 496 533.Google ScholarGoogle Scholar
  19. DAYAL, U., BLAUSTEIN, B., BUCHMANN, A., CHAKRAVARTHY, U., Hsu, M, LEDIN, R., MCCARTHY, A., ROSENTHAL, A. SARIN, S. CAGEY, M. J., LIVid', M., AND JAUHARI, R. 1988. The HiPAC project: Combining active databases and timing constraints SIGMOD Rec. 17, 1 (March), 51-70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. DE CASTILHO, J., CASANOVA, M., AND FURTADO, A 1982 A temporal framework for database specifications. In International Conference on Very Large Data Bases (Mexico City), VLDB Endowment, 280-291. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. DEMOLOMBE, R. 1992. Syntactical characterization of a subset of domain independent formulas J. ACM 39, 1 (Jan.), 71-94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. DI PAOLA, R. 1969 The recursive unsolvability of the decision problem for the class of defimte formulas. J. ACM 16, 2, 324-327. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. DUBOIS, E., HAGELSTEIN, J., AND RIFAUT, A. 1988. Formal reqmrements engineering with ERAE. Philips J Res. 43, 393 414.Google ScholarGoogle Scholar
  24. EMERSON, E. 1990. Temporal and modal logic. In Handbook of Theoretical Computer Science, J. van Leeuwen, Ed., vol. B. Elsevmr/MIT Press. 995-1072. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. GASBA~, D., HODKINSON, I., AND RE~OLDS, M. 1994. Temporal Logtc: Mathematical Foundations and Computational Aspects. Oxford University Press, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. GABBAY, D AND MCBRmN, P 1991 Temporal logic and historical databases. In Internatmnal Conference on Very Large Data Bases (Barcelona), VLDB Endowment, 423-430 Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. GABBAY, D., PNUELI, A., SHELAH, S., AND STAVI, S. 1980. On the temporal analysis of fairness. In ACM Symposmm on Principles of Programming Languages. ACM, New York, 163-173. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. GALLAmE, H., M~NY, ER, J., AND NICOLAS, J. 1984. Logic and databases: A deductive approach. ACM Comput. Surv. 16, 2 (June), 153-185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. GARSON, J. 1984. Quantification in modal logic. In Handbook of Phtlosophical Logic, D. Gabbay and F. Guenthner, Eds D. Reldel, NorweI1, Mass 249-307Google ScholarGoogle Scholar
  30. GEHANI, iN., JAGADISH, H., AND SHMUELI, O. 1992a. Composite event specification in active databases. Model & implementation. In }r~tcrr~atior~al Conferer~ce of Very Large Data Bases (Vancouver, B.C.), VLDB Endowment, 327-338. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. GEHANI, N., JAGADISH, H., AND SHMUELI, O. 1992b. Event specification in an active objectorientation database. In ACM SIGMOD Internatmnal Conference on Management of Data (San Diego, Calif.), ACM, New York. 81-90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. GERTZ, M. AND LIPECK, U. 1993. Deriwng integrity maintaining triggers from transition graphs. In IEEE Jnternattonal Conference on Data Engineering (Vienna), 22-29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. HAREL, D. 1985 Recurring dominoes: Making the highly undecidable highly understandable. Ann. D~screte Math. 24, 51-71.Google ScholarGoogle Scholar
  34. HAREL, E., L~CHTENSTEIN, O., AND PNUEH, A. 1990. Explicit clock temporal logic. In IEEE Sympos~ura on Logtc m Computer Science (Philadelphia, Pa)., IEEE Computer Society, Los Alam~tos, Calif., 402-443.Google ScholarGoogle Scholar
  35. Hsu, A. AND IMmLIS~S~d, T. 1985. Integrity checking for multiple updates. In ACM SIGMOD International Conference on Management of Data (Austin, Tex ), ACM, New York, 152-168. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. HOLSMANN, K. AND SAAKE, G. 1991. Theoretical foundations of handling large substitution sets m temporal integrity monitoring. Acta Inf. 28, 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. INTFmNATIONAL ORGANIZATION FOR STANDARmZAT~ON. 1992. Database Language SQL. ISO/IEC 9075:1992Google ScholarGoogle Scholar
  38. KAMP, J. 1968. Tense logic and the theory of linear order. Ph.D. dissertation, University of California, Los Angeles.Google ScholarGoogle Scholar
  39. KANELLAKIS, P., KUPER, G., AND REVESZ, P. 1990. Constraint query languages. In ACM Symposium on Principles of Database Systems (Nashville, Tenn., April), ACM, New York, 299-313. To appear in J. Comput. Syst. Sci. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. KOYMANS, R. 1990. Specifying real-time properties with metric temporal logic. Real-Time Syst. 2, 4, 255-299. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. KOYMANS, R. 1989. Specifying message passing and time-critical systems with temporal logic. Ph.D. dissertation, Technische Universiteit Eindhoven.Google ScholarGoogle Scholar
  42. KUNG, C. 1985. On verification of database temporal constraints. In ACM SIGMOD International Conference on Management of Data (Austin, Tex.). ACM, New York, 169-179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. LIPECK, U., GERTZ, M., AND SAAKE, G. 1994. Transitional monitoring of dynamic integrity constraints. IEEE Data Eng. Bull. (June), 38-42.Google ScholarGoogle Scholar
  44. LIPECK, U. AND SAAKE, G. 1987. Monitoring dynamic integrity constraints based on temporal logic. Inf. Syst. 12, 3,255-269. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. LOHMAN, G., LINDSAY, B., PIRAHESH, H., AND SCHIEFER, K. 1991. Extensions to starburst: Objects, types, functions and rules. Commun. ACM 34, 10 (Oct.), 94-109. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. MANNA, Z. AND PNUELI, A. 1992. The Temporal Logic of Reactive and Concurrent Systems. Springer-Verlag, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. MANNA, Z. AND PNUELI, A. 1989. The anchored version of the temporal framework. In Linear Time, Branching Time and Parttal Order in Logics and Models for Concurrency, J. de Bakker, W.-P. de Roever, and G. Rozenberg, Eds., LNCS 354, Springer-Verlag, New York, 201-284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. MORZENTI, A., MANDRIOLI, D., AND GHEZZI, G. 1992. A model parametric real-time logic. ACM Trans. Program. Lang. Syst. 14, 4 (Oct.), 521-574. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. NASSOR, E. AND VIDAL-NAQUET, G. 1992. Suitability of the propositional temporal logic to express properties of real-time systems. In Symposium on Theoretical Aspects of Computer Science. Springer-Verlag, New York, 59 70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. NICOLAS, J.-M. 1982. Logic for improving integrity checking in relational databases. Acta Inf. 18, 3, 227-253.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. PNUELI, A. 1986. Applications of temporal logic to the specification and verification of reactive systems: A survey of current trends. In Current Trends ~n Concurrency. LNCS 224, Springer- Verlag, New York, 510 584. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. QIAN, X. 1988. An effective method for integrity constraint reformulation. In IEEE International Conference on Data Engineering (Los Angeles, Calif.), IEEE Computer Science Press, Washington, D.C., 338-345. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. QIAN, X. AND SMITH, D. 1987. Integrity constraint reformulation for efficient validation. In International Conference on Very Large Data Bases (Brighton, England), VLDB Endowment, 417-425. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. QIAN, X. AND WALDINGER, R. 1988. A transaction logic for database specification. In ACM SIGMOD International Conference on Management of Data. ACM, New York, 243-250. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. RAMAMRITHAM, K. 1993. Real-time databases. In Distributed and Parallel Databases 1. 199-226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. SCHWIDERSKI, S., HARTMANN, T., AND SAAKE, G. 1994. Monitoring temporal preconditions in a behaviour oriented object model. Data Knou, l. Eng. 14, 143-186. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. SISTLA, h. AND WOLFSON, O. 1995. Temporal triggers in active databases. IEEE Trans. Knowl. Data Eng. To appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. SNODGRASS, R. 1987. The temporal query language TQuel. ACM Trans. Database Syst. 12, 2 (June), 247-298. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. SNODGRASS, R. AND AHN, I. 1986. Temporal databases. Computer 19, 9, 35-42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. TANSEL, A., CLIFFORD, J., GADIA, S., JAJODIA, S., SEGEV, A., AND SNODGRASS, R., EDS. 1993. Temporal Databases: Theory, Design, and Implementation. Benjamin-Cummings, Redwood City, Calif. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. TOPOR, R. 1987. Domain-independent formulas and databases. Theor. Comput Sct. 52, 281-306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. TUZHILIN, A. 1993. Applications of temporal databases to knowledge-based simulations. In Temporal Databases: Theory, Design and Implementation, Tansel et el., Eds. Benjamin-Cum mings, Redwood City, Cahf, 580-593Google ScholarGoogle Scholar
  63. TUZHmIN, A 1991. Temporal logic as a simulation language. In International Conference on Artificial Intelltgence and Simulatzon.Google ScholarGoogle Scholar
  64. TUZHILIN, A. AND CLIFFORD, J. 1990. A temporal relational algebra as a bas~s for temporal relational completeness. In International Conference on Very Large Data Bases. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. VAN GELDER, A. AND TOPOR, R. 1991. Safety and translation of relational calculus queries. ACM Trans. Database Syst. 16, 2 (June), 235 278. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. VARDI, M. AND WOLPER, P 1986. An automata-theoretic approach to automatic program verification. In IEEE Symposium on Logic in Computer Science, IEEE Computer Science Press.Google ScholarGoogle Scholar
  67. V^RDI, M.Y. 1992. Personal communication.Google ScholarGoogle Scholar
  68. VARDI, M.Y. 1988. A temporal fixpoint calculus In ACM Symposium on Principles of Programmmg Languages (San Diego, Calif.), ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. WIDOM, J., COCHRANE, R., AND LINDSA~, B. 1991 hnplementing set-oriented production rules as an extension to Starburst. In International Conference on Very Large Data Bases (Barcelona), VLDB Endowment, 275-285. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. WOLPER, P 1983. Temporallogic can be more expressive Inf Control 56, 72-99.Google ScholarGoogle Scholar

Index Terms

  1. Efficient checking of temporal integrity constraints using bounded history encoding

              Recommendations

              Reviews

              Jaroslav Pokorny

              Temporal integrity constraints are examined in this paper. They are specified declaratively in a restricted version of first-order temporal logic (FOTL). Temporal constraints require checking not only the current database state but, generally, the entire database history. To overcome this infeasibility, the author proposes a method that automatically derives the historical information that has to be kept in a database state for the purpose of checking temporal constraints. As a first step to attacking the problem, the restriction of FOTL, called Past FOTL, is introduced (Section 2). The semantics of this language is associated with finite-time temporal databases. In Section 3, the above-mentioned method for temporal constraint evaluation is described. Database states are augmented with new auxiliary relations to form extended states. This encoding of the database history under the given set of constraints is not lossless. This approach does not allow one to deal with general temporal queries here, but the encoding proposed is usually more space-efficient than storing the entire history. Unfortunately, any lossless encoding of the history requires arbitrarily more space. Section 3 explains both how to construct auxiliary relations and how to implement them as materialized views in a conventional RDBMS. Some correctness issues are also discussed here. The author also shows how to deal with temporal triggers in this approach. Section 4 extends FOTL to Past Metric FOTL, a language that is appropriate to the formulation of real-time constraints. Finally, in Section 5, a most general framework is developed. Arbitrary FOTL formulas referring to both past and future are allowed in this framework. Section 6 comprehensively compares all associated approaches. In Section 7, the author draws conclusions and sketches another possible development of his work. The paper is highly readable. All theoretical constructs are completed by highlighting notes and real examples. More complicated issues are presented clearly and in detail. The benefit of the paper is both theoretical and practical. The results may also be interesting for everybody who is implementing a temporal database.

              Access critical reviews of Computing literature here

              Become a reviewer for Computing Reviews.

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader