recursive query
Recently Published Documents


TOTAL DOCUMENTS

38
(FIVE YEARS 0)

H-INDEX

8
(FIVE YEARS 0)

2019 ◽  
Vol 5 (2 (101)) ◽  
pp. 6-17
Author(s):  
Nguyen Tran Quoc Vinh ◽  
Dang Thanh Hao ◽  
Pham Duong Thu Hang ◽  
Abeer Alsadoon ◽  
PW Chandana Prasad ◽  
...  

2019 ◽  
Vol 19 (5-6) ◽  
pp. 1056-1072 ◽  
Author(s):  
ARIYAM DAS ◽  
CARLO ZANIOLO

AbstractA large class of traditional graph and data mining algorithms can be concisely expressed in Datalog, and other Logic-based languages, once aggregates are allowed in recursion. In fact, for most BigData algorithms, the difficult semantic issues raised by the use of non-monotonic aggregates in recursion are solved byPre-Mappability(${\cal P}$reM), a property that assures that for a program with aggregates in recursion there is an equivalent aggregate-stratified program. In this paper we show that, by bringing together the formal abstract semantics of stratified programs with the efficient operational one of unstratified programs,$\[{\cal P}\]$reMcan also facilitate and improve their parallel execution. We prove that$\[{\cal P}\]$reM-optimized lock-free and decomposable parallel semi-naive evaluations produce the same results as the single executor programs. Therefore,$\[{\cal P}\]$reMcan be assimilated into the data-parallel computation plans of different distributed systems, irrespective of whether these follow bulk synchronous parallel (BSP) or asynchronous computing models. In addition, we show that non-linear recursive queries can be evaluated using a hybrid stale synchronous parallel (SSP) model on distributed environments. After providing a formal correctness proof for the recursive query evaluation with$\[{\cal P}\]$reMunder this relaxed synchronization model, we present experimental evidence of its benefits.


10.29007/npd4 ◽  
2018 ◽  
Author(s):  
Gopalakrishnan Krishnasamy Sivaprakasam ◽  
Adrienne Raglin ◽  
Douglas Summers-Stay ◽  
Giora Slutzki

In this paper we study Secrecy-Preserving Query Answering problem underthe OpenWorld Assumption (OWA) for Prob-EL>0;=1 Knowledge Bases(KBs). We have designed a tableau procedure to compute a semi model Mover the given KB which eventually is equivalent to a probabilistic modelto KB. Given a secrecy set S, which is a finite set of assertions, wecompute a function E, called an envelope of S, which assigns a set E() ofassertions to each world in the semi modal M. E provides logical protection to the secrecy set S against the reasoning of a querying agent. Once the semi model M and an envelope E are computed, we define the secrecy-preserving semi model ME.Based on the information available in ME, assertional queries with probabilisticoperators can be answered eciently while preserving secrecy. Tothe best of our knowledge, this work is first one studying secrecy-preservingreasoning in description logic augmented with probabilistic operators. Whenthe querying agent asks a query q, the reasoner answers “Yes” if informationabout q is available in ME; otherwise, the reasoner answers “Unknown”. Beingable to answer “Unknown” plays a key role in protecting secrecy underOWA. Since we are not computing all the consequences of the knowledgebase, answers to the queries based on just secrecy-preserving semi modelME could be erroneous. To fix this problem, we further augment our algorithmsby providing recursive query decomposition algorithm to make thequery answering procedure foolproof.1


10.29007/f89j ◽  
2018 ◽  
Author(s):  
Vivek Nigam ◽  
Limin Jia ◽  
Anduo Wang ◽  
Boon Thau Loo ◽  
Andre Scedrov

Network Datalog (<i>NDlog</i>) is a recursive query language that extends Datalog by allowing programs to be distributed in a network. In our initial efforts to formally specify <i>NDlog</i>'s operational semantics, we have found several problems with the current evaluation algorithm being used, including unsound results, unintended multiple derivations of the same table entry, and divergence. In this paper, we make a first step towards correcting these problems by formally specifying a new operational semantics for <i>NDlog</i> and proving its correctness for the fragment of non-recursive programs. We also argue that if termination is guaranteed, then the results also extend to recursive programs. Finally, we identify a number of potential implementation improvements to <i>NDlog</i>.


2012 ◽  
Vol 5 (2) ◽  
pp. 105-195 ◽  
Author(s):  
Todd J. Green

Sign in / Sign up

Export Citation Format

Share Document