Generating plans from proofs
We present algorithms for answering queries making use of information about source integrity constraints, access restrictions, and access costs. Our method can exploit the integrity constraints to find plans even when there is no direct access to relations appearing in the query. We look at differen...
Main Authors: | , , |
---|---|
Format: | Journal article |
Published: |
Association for Computing Machinery
2016
|