Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

IEEE Transactions on Knowledge and Data Engineering

Issue 2 • Apr 1995

 This issue contains several parts.Go to:  Part  

Filter Results

Displaying Results 1 - 12 of 12
  • A theory of translation from relational queries to hierarchical queries

    Publication Year: 1995, Page(s):228 - 245
    Cited by:  Papers (4)  |  Patents (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1680 KB)

    In a heterogeneous database system, a query for one type of database system (i.e., a source query) may have to be translated to an equivalent query (or queries) for execution in a different type of database system (i.e., a target query). Usually, for a given source query, there is more than one possible target query translation. Some of them can be executed more efficiently than others by the rece... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query optimization and execution plan generation in object-oriented data management systems

    Publication Year: 1995, Page(s):210 - 227
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1520 KB)

    The generation of execution plans for object-oriented database queries is a new and challenging area of study. Unlike relational algebra, a common set of object algebra operators has not been defined. Similarly, a standardized object manager interface analogous to the storage manager interface of relational subsystems does not exist. We define the interface to an object manager whose operations ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security constraint processing in a multilevel secure distributed database management system

    Publication Year: 1995, Page(s):274 - 293
    Cited by:  Papers (26)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1848 KB)

    In a multilevel secure distributed database management system, users cleared at different security levels access and share a distributed database consisting of data at different sensitivity levels. An approach to assigning sensitivity levels, also called security levels, to data is one which utilizes constraints or classification rules. Security constraints provide an effective classification poli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of efficient algorithms for two-dimensional pattern matching

    Publication Year: 1995, Page(s):318 - 327
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    The two-dimensional pattern matching problem finds the occurrences of a given two-dimensional pattern array in a two-dimensional text array. The paper presents two efficient algorithms, which combine Fan-Su (1993) and Aho-Corasick (1979) string search algorithms, to solve this problem. The proposed algorithms need not inspect each character of the text array during the pattern matching in most cas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index organizations for object-oriented database systems

    Publication Year: 1995, Page(s):193 - 209
    Cited by:  Papers (21)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1304 KB)

    We present an indexing technique providing support for queries involving complex, nested objects and inheritance hierarchies. This technique is compared with two techniques obtained from more traditional organizations. The three techniques are evaluated using an analytical cost model. The discussion is cast in the framework of object-oriented databases. However, results are applicable to data mana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chain-split evaluation in deductive databases

    Publication Year: 1995, Page(s):261 - 273
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1184 KB)

    Many popularly studied recursions in deductive databases can be compiled into one or a set of highly regular chain generating paths, each of which consists of one or a set of connected predicates. Previous studies on chain-based query evaluation in deductive databases take a chain generating path as an inseparable unit in the evaluation. However, some recursions, especially many functional recursi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Allocating data and operations to nodes in distributed database design

    Publication Year: 1995, Page(s):305 - 317
    Cited by:  Papers (35)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1152 KB)

    The allocation of data and operations to nodes in a computer communications network is a critical issue in distributed database design. An efficient distributed database design must trade off performance and cost among retrieval and update activities at the various nodes. It must consider the concurrency control mechanism used as well as capacity constraints at nodes and on links in the network. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing sort order query execution in balanced and nested grid files

    Publication Year: 1995, Page(s):246 - 260
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1316 KB)

    Disk input/output (I/O) efficient query execution is an important topic with respect to DBMS performance. In this context, we elaborate on the construction of disk access plans for sort order queries in balanced and nested grid files. The key idea is to use the order information contained in the directory of the multiattribute search structure. The presented algorithms are shown to yield a signifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing quantitative models using monotone relationships

    Publication Year: 1995, Page(s):294 - 304
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    Constructing quantitative models typically requires characterizing a system in terms of algebraic relationships and then using these relationships to compute quantitative values from numerical data. For real-life systems, such as computer operating systems, an algebraic characterization is often difficult, if not intractable. The paper proposes a statistical approach to constructing quantitative m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of recursive queries with extended rules in deductive databases

    Publication Year: 1995, Page(s):328 - 331
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    In order to extend the expressive power of deductive databases, a formula that can have existential quantifiers in prenex normal form in a restricted way is defined as an extended rule. With the extended rule, we can easily define a virtual view that requires a division operation of relational algebra to evaluate. The paper addresses a recursive query evaluation where at least one formula in a rec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Checkpointing for optimistic concurrency control methods

    Publication Year: 1995, Page(s):332 - 339
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    Restart-oriented concurrency control (CC) methods, such as optimistic CC, outperform blocking-oriented methods, such as standard two-phase locking in a high data contention environment, but this is at the cost of wasted processing due to restarts. Volatile savepoints are considered in this study as a method to reduce this wasted processing and to improve response time. There is the usual tradeoff ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unified integration of explicit knowledge and learning by example in recurrent networks

    Publication Year: 1995, Page(s):340 - 346
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    Proposes a novel unified approach for integrating explicit knowledge and learning by example in recurrent networks. The explicit knowledge is represented by automaton rules, which are directly injected into the connections of a network. This can be accomplished by using a technique based on linear programming, instead of learning from random initial weights. Learning is conceived as a refinement p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Knowledge and Data Engineering (TKDE) informs researchers, developers, managers, strategic planners, users, and others interested in state-of-the-art and state-of-the-practice activities in the knowledge and data engineering area.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Jian Pei
Simon Fraser University

Associate Editor-in-Chief
Xuemin Lin
University of New South Wales

Associate Editor-in-Chief
Lei Chen
Hong Kong University of Science and Technology