Relational Peer Data Sharing Settings and Consistent Query Answers
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 9
Abstract
In this paper, we study the problem of consistent query answering in peer data sharing systems. In a peer data sharing system, databases in peers are designed and administered autonomously and acquaintances between peers are stablished thorough data sharing constraints. Since data are managed in peer databases autonomously, peers' data may be inconsistent with respect to the data sharing constraints. Inconsistencies of data may also result due to the change of constraints (e.g. adding, modifying, and deleting constraints between peers). In order to solve inconsistencies between peers, one possible solution could be modify data physically in inconsistent peers by propagating updates. However, it is not always feasible to change data physically in peers since peers are autonomous and a peer may not have permission to modify other peers' data. Considering the possible inconsistent situations, this paper presents a semantics of obtaining onsistent answers in a peer data sharing system such that the answers are consistent wrt to data sharing constraints. Consistent answers are obtained at query time by avoiding the inconsistent data. The paper also shows a method to achieve consistent answers of a query.
Authors and Affiliations
Mehedi Masud , Sultan Aljahdali
Implementation Of ROCK Clustering Algorithm For The Optimization Of Query Searching Time
Clustering is a data mining technique of grouping similar type of data or queries together which helps in identifying similar subject areas. The major problem is to identify heterogeneous subject areas where frequent que...
High Performance VLSI Design Using Body Biasing in Domino Logic Circuits
Dynamic domino logic circuits are widely used in modern digital VLSI circuits. These dynamic circuits are often favoured in high performance designs because of the speed advantage offered over static CMOS logic circuits....
Fuzzy K-mean Clustering Via Random Forest For Intrusiion Detection System
Due to continuous growth of the internet technology, there is need to establish security mechanism. So for achieving this objective various NIDS has been propsed. Datamining is one of the most effective techniques used f...
Handwritten Tamil Character Recognition and Conversion using Neural Network
Hand written Tamil Character recognition refers to the process of conversion of handwritten Tamil character into Unicode Tamil character. The scanned image is segmented into paragraphs using spatial space detection techn...
Encryption using XOR based Extended Key for Information Security – A Novel Approach
The explosive growth of information, places a high demand for Information Security. Information Security deals with securing the information from unauthorized access or misuse of information either intentionally or accid...