An overview of query optimization in relational systems

S Chaudhuri - Proceedings of the seventeenth ACM SIGACT …, 1998 - dl.acm.org
1. OBJECTIVE Them has been cxtensivc work in query optimization since the enrly '70s. It is
hard to capture the breadth and depth of this large body of work in a short article. Therefore, I …

[BOK][B] Logic Programming and Databases: An Overview

S Ceri, G Gottlob, L Tanca, S Ceri, G Gottlob, L Tanca - 1990 - Springer
This book deals with the integration of logic programming and databases to generate new
types of systems, which extend the frontiers of computer science in an important direction …

[BOK][B] Knowledge graphs

D Fensel, U Simsek, K Angele, E Huaman, E Kärle… - 2020 - Springer
Smart speakers such as Alexa and Google Home introduced Artificial Intelligence (AI) in
millions soon billions of households, making AI an everyday experience. We can now look …

[BOK][B] Foundations of databases

S Abiteboul, R Hull, V Vianu - 1995 - sigmod.org
This database theory book provides a focused presentation of the core material on relational
databases, and presents a number of advanced topics in a unified framework. Some of the …

[PDF][PDF] What you always wanted to know about Datalog(and never dared to ask)

S Ceri, G Gottlob, L Tanca - IEEE transactions on knowledge and data …, 1989 - Citeseer
Datalog is a database query language based on the logic programming paradigm; it has
been designed and intensively studied over the last five years. We present the syntax and …

Probabilistic (logic) programming concepts

L De Raedt, A Kimmig - Machine Learning, 2015 - Springer
A multitude of different probabilistic programming languages exists today, all extending a
traditional programming language with primitives to support modeling of complex, structured …

Semistructured data

P Buneman - Proceedings of the sixteenth ACM SIGACT-SIGMOD …, 1997 - dl.acm.org
In semistructured data, the information that is normally associated with a schema is
contained within the data, which is sometimes called “self-describing”. In some forms of …

Program analysis via graph reachability

T Reps - Information and software technology, 1998 - Elsevier
This paper describes how a number of program-analysis problems can be solved by
transforming them to graph-reachability problems. Some of the program-analysis problems …

[BOK][B] Programming with constraints: an introduction

K Marriott, PJ Stuckey - 1998 - books.google.com
The job of the constraint programmer is to use mathematical constraints to model real world
constraints and objects. In this book, Kim Marriott and Peter Stuckey provide the first …

Privatesql: a differentially private sql query engine

I Kotsogiannis, Y Tao, X He, M Fanaeepour… - Proceedings of the …, 2019 - dl.acm.org
Differential privacy is considered a de facto standard for private data analysis. However, the
definition and much of the supporting literature applies to flat tables. While there exist …