Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Constraints and Databases

Constraints and Databases

Ramakrishnan, Raghu, Stuckey, Peter (Eds.)

Reprinted from CONSTRAINTS, 2:3-4

1998, 192 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$159.00

(net) price for USA

ISBN 978-1-4615-5515-5

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Hardcover
Information

Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$202.00

(net) price for USA

ISBN 978-0-7923-8045-0

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$202.00

(net) price for USA

ISBN 978-1-4613-7520-3

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

  • About this book

Constraints and Databases contains seven contributions on the rapidly evolving research area of constraints and databases. This collection of original research articles has been compiled as a tribute to Paris C. Kanellakis, one of the pioneers in the field.
Constraints have long been used for maintaining the integrity of databases. More recently, constraint databases have emerged where databases store and manipulate data in the form of constraints. The generality of constraint databases makes them highly attractive for many applications. Constraints provide a uniform mechanism for describing heterogenous data, and advanced constraint solving methods can be used for efficient manipulation of constraint data.
The articles included in this book cover the range of topics involving constraints and databases; join algorithms, evaluation methods, applications (e.g. data mining) and implementations of constraint databases, as well as more traditional topics such as integrity constraint maintenance.
Constraints and Databases is an edited volume of original research comprising invited contributions by leading researchers.

Content Level » Research

Keywords » Extension - algorithms - data mining - database - decision tree - genome - object-oriented database

Related subjects » Artificial Intelligence - Operations Research & Decision Theory - Security and Cryptology

Table of contents 

Introduction; R. Ramakrishnan, P.J. Stuckey. The CAND3 Constraint Object-Oriented Database System; A. Brodsky, et al. Towards Practical Constraint Databases; A. Brodsky, et al. A Decompositional Approach for Computing Least Fixed-Points of Datalog Programs with Z-Counters; L. Fribourg, H. Olsén. Memoing Evaluation for Constraint Extensions of Datalog; D. Toman. Refining Restriction Enzyme Genome Maps; P. Revesz. Maintaining Global Integrity Constraints in Distributed Databases; Nam Huyn. Implementation and Evaluation of Decision Trees with Range and Region Splitting; Y. Morimoto, et al.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Structures, Cryptology and Information Theory.