期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Improved Integrity Constraints Checking in Distributed Databases by Exploiting Local Checking 被引量:2
1
作者 Ali A.Alwan Hamidah Ibrahim Nur Izura Udzir 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第4期665-674,共10页
Most of the previous studies concerning checking the integrity constraints in distributed database derive simplified forms of the initial integrity constraints with the sufficiency property, since the sufficient test ... Most of the previous studies concerning checking the integrity constraints in distributed database derive simplified forms of the initial integrity constraints with the sufficiency property, since the sufficient test is known to be cheaper than the complete test and its initial integrity constraint as it involves less data to be transferred across the network and can always be evaluated at the target site (single site). Their studies are limited as they depend strictly on the assumption that an update operation will be executed at a site where the relation specified in the update operation is located, which is not always true. Hence, the sufficient test, which is proven to be local test by previous study, is no longer appropriate. This paper proposes an approach to checking integrity constraints in a distributed database by utilizing as much as possible the local information stored at the target site. The proposed approach derives support tests as an alternative to the existing complete and sufficient tests proposed by previous researchers with the intention to increase the number of local checking regardless the location of the submitted update operation. Several analyses have been performed to evaluate the proposed approach, and the results show that support tests can benefit the distributed database, where local constraint checking can be achieved. 展开更多
关键词 distributed database integrity constraint checking integrity constraint integrity test
原文传递
Constraint-Preserving Architecture Transformations: A Graph Rewriting Approach
2
作者 袁春 陈意云 《Journal of Computer Science & Technology》 SCIE EI CSCD 2001年第6期590-594,共5页
Architecture transformations are frequently performed during software design and maiatenance. However this activity is not well supported at a sufficiently abstract level. In this paper, the authors characterize archi... Architecture transformations are frequently performed during software design and maiatenance. However this activity is not well supported at a sufficiently abstract level. In this paper, the authors characterize architecture transformations using graph rewriting rules, where architectures are represented in graph notations. Architectures are usually required to satisfy certain constraints during evolution. Therefore a way is presented to construct the suffi- cient and necessary condition for a transformation to preserve a constraint. The condition can be verified before the application of the transformation. Validated transformations are guaranteed not to violate corresponding constraints whenever applied. 展开更多
关键词 architecture transformation graph rewriting weakest precondition constraint checking
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部