No abstract available.
New data models and languages—the challenge
New data models and languages have been the focus of attention in database research in the last decade. The object-oriented paradigm is a convenient vehicle for describing this research, its accomplishments, and for considering which directions are now ...
Tie-breaking semantics and structural totality
We address the question of when the structure of a Datalog program with negation guarantees the existence of a fixpoint. We propose a semantics of Datalog programs with negation, which we call the tie–breaking semantics. The tie–breaking semantics can ...
Queries are easier than you thought (probably)
The optimization of a large class of queries is explored, using a powerful normal form recently proven. The queries include the fixpoint and while queries, and an extension of while with arithmetic. The optimization method is evaluated using a ...
Learning efficient query processing strategies
A query processor QP uses the rules in a rule base to reduce a given query to a series of attempted retrievals from a database of facts. The Qp's expected cost is the average time it requires to find an answer, averaged over its anticipated set of ...
Analysis of disk arm movement for large sequential reads
The common model for analyzing seek distances on a magnetic disk uses a continuous approximation in which the range of motion of the disk arm is the interval [0,1]. In this model, both the current location of the disk arm and the location of the next ...
On the equivalence of recursive and nonrecursive datalog programs
We study the problem of determining whether a given recursive Datalog program is equivalent to a given nonrecursive Datalog program. We prove triply exponential upper and lower time bounds.
Constraints and redundancy in datalog
Two types of redundancies in datalog program are considered. Redundancy based on reachability eliminates rules and predicates that do not participate in any derivation tree of a fact for the query predicate. Redundancy based on irrelevance is similar, ...
Datalog expressiveness of chain queries: grammar tools and characterizations
A chain query seeks, for each input database (viewed as directed graph), all pairs of start and end nodes of paths whose labels spell words in an associated (possibly non context-free) language over some binary predicates. We study the expressive power ...
The valid model semantics for logic programs
We present the valid model semantics, a new approach to providing semantics for logic programs with negation, set-terms and grouping. The valid model semantics is a three-valued semantics, and is defined in terms of a ‘normal form’ computation. The ...
Greedy by choice
The greedy paradigm of algorithm design is a well known tool used for efficiently solving many classical computational problems within the framework of procedural languages. However, it is very difficult to express these algorithms within the ...
Monotonic aggregation in deductive databases
We propose a semantics for aggregates in deductive databases based on a notion of minimality. Unlike some previous approaches, we form a minimal model of a program component including aggregate operators, rather than insisting that the aggregate apply ...
The well-founded semantics of aggregation
Common aggregation predicates have natural definitions in logic, either as first order sentences (min, max, etc.), or with elementary induction over a data structure that represents the relation (sum, count, etc.). The well-founded semantics for logic ...
A fault-tolerant commit protocol for replicated databases
When failures occur during the execution of distributed commit protocols, the protocols may block in some partitions to avoid inconsistent termination of the transaction, thus making data items in these partitions unavailable for accesses. We present a ...
Distributed algorithms for dynamic replication of data
We present two distributed algorithms for dynamic replication of a data-item in communication networks. The algorithms are adaptive in the sense that they change the replication scheme of the item (i.e. the set of processors at which the data-item is ...
Semi-determinism (extended abstract)
We investigate under which conditions a non-deterministic query is semi-deterministic, meaning that two different results of the query to a database are isomorphic. We also consider uniform semi-determinism, meaning that all intermediate results of the ...
Containment and minimization of positive conjunctive queries in OODB's
With the availability of high-level declarative query languages in an object-oriented database system (OODB), the burden of choosing an efficient execution plan for a query is transferred from the user to the database system. A natural first step is to ...
Locking without blocking: making lock based concurrent data structure algorithms nonblocking
Nonblocking algorithms for concurrent data structures guarantee that a data structure is always accessible. This is in contrast to blocking algorithms in which a slow or halted process can render part or all of the data structure inaccessible to other ...
Tolerating bounded inconsistency for increasing concurrency in database systems
Recently, the scope of databases has been extended to many non-standard applications, and serializability is found to be too restrictive for such applications. In general, two approaches are adopted to address this problem. The first approach considers ...
Knowledgebase transformations
We propose a language that expresses uniformly queries and updates on knowledgebases consisting of finite sets of relational structures. The language contains an operator that “inserts” arbitrary first-order sentences into knowledgebase. The semantics ...
On the complexity of propositional knowledge base revision, updates, and counterfactuals
We study the complexity of several recently proposed methods for updating or revising propositional knowledge bases. In particular, we derive complexity results for the following problem: given a knowledge base T, an update p, and a formula q, decide ...
Real-time integrity constraints
We propose that Past Metric Temporal Logic (Temporal Logic with real-time operators referring to the past) be used as a language for specifying real-time integrity constraints. Building on our earlier work, we develop efficient, history-less methods of ...
Pattern matching by Rs-operations: towards a unified approach to querying sequenced data
A family of sequence operations (rs-operations), based on pattern matching and including most of the “natural” operations on sequences, is introduced. In order to apply rs-operations to calculus-like query languages, a logic about sequences (SL) is ...
The complexity of reusing and modifying rulebases
This paper develops a method for reusing and modifying deductive databases. Such methods are needed when new rulebased applications differ only slightly from existing ones or when an application is to be incrementally updated. In order to facilitate ...
Relations with relation names as arguments: algebra and calculus
We consider a version of the relational model in which relation names may appear as arguments of other relations. Allowing relation names as arguments provides enhanced modelling capabilities, allowing some object-oriented features to be expressed ...
Index Terms
Proceedings of the eleventh ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Recommendations
Acceptance Rates
| Year | Submitted | Accepted | Rate |
|---|---|---|---|
| PODS '19 | 87 | 29 | 33% |
| PODS '18 | 83 | 29 | 35% |
| PODS '17 | 101 | 29 | 29% |
| PODS '16 | 94 | 31 | 33% |
| PODS '15 | 80 | 25 | 31% |
| PODS '14 | 67 | 22 | 33% |
| PODS '13 | 97 | 24 | 25% |
| PODS '03 | 136 | 27 | 20% |
| PODS '02 | 109 | 24 | 22% |
| PODS '01 | 99 | 26 | 26% |
| PODS '00 | 119 | 26 | 22% |
| PODS '99 | 116 | 32 | 28% |
| PODS '98 | 119 | 28 | 24% |
| PODS '97 | 118 | 23 | 19% |
| PODS '96 | 84 | 22 | 26% |
| PODS '95 | 94 | 25 | 27% |
| PODS '94 | 117 | 28 | 24% |
| PODS '93 | 115 | 26 | 23% |
| Overall | 1,835 | 476 | 26% |




