On XML integrity constraints in the presence of DTDs

From MaRDI portal
Publication:3455535

DOI10.1145/567112.567117zbMath1326.68120OpenAlexW1988662949WikidataQ57495611 ScholiaQ57495611MaRDI QIDQ3455535

Wenfei Fan, Leonid O. Libkin

Publication date: 7 December 2015

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: https://www.pure.ed.ac.uk/ws/files/19849496/Fan_Libkin_2002_On_XML_Integrity_Constraints_in_the_Presence_of_DTDs.pdf




Related Items (28)

Optimal probabilistic generation of XML documentsOn the finite and general implication problems of independence atoms and keysAxiomatisations of functional dependencies in the presence of records, lists, sets and multisetsOn the equivalence between FDs in XML and FDs in relationsXML Schema MappingsDeciding implication for functional dependencies in complex-value databasesPropagating XML constraints to relationsDependency-preserving normalization of relational and XML dataSemantic query optimization in the presence of typesIntegrity constraints for XMLControlling entity integrity with key setsRepairing XML functional dependency violationsThe implication problem for `closest node' functional dependencies in complete XML documentsReasoning about XML update constraintsXML normalization based on entity segmentsClosure via functional dependence simplificationExtending two-variable logic on data trees with order on data values and its automataNon-deterministic ideal operators: an adequate tool for formalization in data basesOn the finite controllability of conjunctive query answering in databases under open-world assumptionNumerical constraints on XML dataOn reasoning about structural equality in XML: a description logic approachComplexity of Data Tree Patterns over XML DocumentsFunctional and multivalued dependencies in nested databases generated by record and list constructorConstraints in RDFPreserving key in XML data transformationOn the Notion of an XML KeyAccess-Condition-Table-Driven Access Control for XML DatabasesXML Access Control with Policy Matching Tree




This page was built for publication: On XML integrity constraints in the presence of DTDs