ACM DL

Database Systems (TODS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Database Systems (TODS), Volume 12 Issue 3, Sept. 1987

On first-order-logic databases
Henryk Rybiński
Pages: 325-349
DOI: 10.1145/27629.27630
The use of first-order logic as database logic is shown to be powerful enough for formalizing and implementing not only relational but also hierarchical and network-type databases. It enables one to treat all the types of databases in a uniform...

Extending a database system with procedures
Michael Stonebraker, Jeff Anton, Eric Hanson
Pages: 350-376
DOI: 10.1145/27629.27631
This paper suggests that more powerful database systems (DBMS) can be built by supporting database procedures as full-fledged database objects. In particular, allowing fields of a database to be a collection of queries in the query language of...

Reduced MVDs and minimal covers
Z. Meral Özsoyoğlu, Li-Yan Yuan
Pages: 377-394
DOI: 10.1145/27629.214286
Multivalued dependencies (MVDs) are data dependencies that appear frequently in the “real world” and play an important role in designing relational database schemes. Given a set of MVDs to constrain a database scheme, it is desirable...

Optimal signature extraction and information loss
Christos Faloutsos, Stavros Christodoulakis
Pages: 395-428
DOI: 10.1145/27629.214285
Signature files seem to be a promising access method for text and attributes. According to this method, the documents (or records) are stored sequentially in one file ("text file"), while abstractions of the documents ("signatures") are stored...

Serializability with constraints
Toshihide Ibaraki, Tiko Kameda, Toshimi Minoura
Pages: 429-452
DOI: 10.1145/27629.214284
This paper deals with the serializability theory for single-version and multiversion database systems. We first introduce the concept of disjoint-interval topological sort (DITS, for short) of an arc-labeled...

The overhead of locking (and commit) protocols in distributed databases
Ouri Wolfson
Pages: 453-471
DOI: 10.1145/27629.28053
The main purpose of a locking protocol is to ensure correct interleaving of actions executed by concurrent transactions. The locking protocol consists of a set of rules dictating how accessed entities should be locked and unlocked. As a result...

A cost-benefit decision model: analysis, comparison amd selection of data management
Stanley Y. W. Su, Jozo Dujmovic, D. S. Batory, S. B. Navathe, Richard Elnicki
Pages: 472-520
DOI: 10.1145/27629.33403
This paper describes a general cost-benefit decision model that is applicable to the evaluation, comparison, and selection of alternative products with a multiplicity of features, such as complex computer systems. The application of this model...

Comment on Bancilhon and Spyratos' “Update semantics and relational views”
Arthur M. Keller
Pages: 521-523
DOI: 10.1145/27629.214296