Generating plans from proofs

We present algorithms for answering queries making use of information about source integrity constraints, access restrictions, and access costs. Our method can exploit the integrity constraints to find plans even when there is no direct access to relations appearing in the query. We look at differen...

Full description

Bibliographic Details
Main Authors: Benedikt, M, Tsamoura, E, Cate, B
Format: Journal article
Published: Association for Computing Machinery 2016