Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 26 Nov 2024Bibliometrics
editorial
Free
PACMMOD Volume 2 Issue 2: Editorial
Article No.: 73, Pages 1–4https://doi.org/10.1145/3651136

We are excited to announce the first issue dedicated to the PODS research track of the Proceedings of the ACM on Management of Data, or PACMMOD, journal. In its current form, this new journal hosts a SIGMOD and a PODS research track. The PODS research ...

research-article
Open Access
A Dichotomy in the Complexity of Consistent Query Answering for Two Atom Queries With Self-Join
Article No.: 74, Pages 1–15https://doi.org/10.1145/3651137

We consider the dichotomy conjecture for consistent query answering under primary key constraints. It states that, for every fixed Boolean conjunctive query q, testing whether q is certain (i.e. whether it evaluates to true over all repairs of a given ...

research-article
Open Access
Conjunctive Queries with Negation and Aggregation: A Linear Time Characterization
Article No.: 75, Pages 1–19https://doi.org/10.1145/3651138

In this paper, we study the complexity of evaluating Conjunctive Queries with negation (\cqneg). First, we present an algorithm with linear preprocessing time and constant delay enumeration for a class of CQs with negation called free-connex signed-...

research-article
Open Access
Consistent Query Answering for Primary Keys on Rooted Tree Queries
Article No.: 76, Pages 1–26https://doi.org/10.1145/3651139

We study the data complexity of consistent query answering (CQA) on databases that may violate the primary key constraints. A repair is a maximal subset of the database satisfying the primary key constraints. For a Boolean query q, the problem fCERTAINTY(...

research-article
Open Access
Containment of Graph Queries Modulo Schema
Article No.: 77, Pages 1–26https://doi.org/10.1145/3651140

With multiple graph database systems on the market and a new Graph Query Language standard on the horizon, it is time to revisit some classic static analysis problems. Query containment, arguably the workhorse of static analysis, has already received a ...

research-article
Enumeration for MSO-Queries on Compressed Trees
Article No.: 78, Pages 1–17https://doi.org/10.1145/3651141

We present a linear preprocessing and output-linear delay enumeration algorithm for MSO-queries over trees that are compressed in the well-established grammar-based framework. Time bounds are measured with respect to the size of the compressed ...

research-article
Open Access
From Shapley Value to Model Counting and Back
Article No.: 79, Pages 1–23https://doi.org/10.1145/3651142

In this paper we investigate the problem of quantifying the contribution of each variable to the satisfying assignments of a Boolean function based on the Shapley value. Our main result is a polynomial-time equivalence between computing Shapley values ...

research-article
Open Access
Generalized Core Spanner Inexpressibility via Ehrenfeucht-Fraïssé Games for FC
Article No.: 80, Pages 1–18https://doi.org/10.1145/3651143

Despite considerable research on document spanners, little is known about the expressive power of generalized core spanners. In this paper, we use Ehrenfeucht-Fraïssé games to obtain general inexpressibility lemmas for the logic FC (a finite model ...

research-article
On Reporting Durable Patterns in Temporal Proximity Graphs
Article No.: 81, Pages 1–26https://doi.org/10.1145/3651144

Finding patterns in graphs is a fundamental problem in databases and data mining. In many applications, graphs are temporal and evolve over time, so we are interested in finding durable patterns, such as triangles and paths, which persist over a long ...

research-article
Open Access
Streaming Algorithms with Few State Changes
Article No.: 82, Pages 1–28https://doi.org/10.1145/3651145

In this paper, we study streaming algorithms that minimize the number of changes made to their internal state (i.e., memory contents). While the design of streaming algorithms typically focuses on minimizing space and update time, these metrics fail to ...

research-article
The Complexity of Why-Provenance for Datalog Queries
Article No.: 83, Pages 1–16https://doi.org/10.1145/3651146

Datalog is a powerful rule-based language that allows us to express complex recursive queries and has found numerous applications over the years. Explaining why a result to a Datalog query is obtained is an essential task towards explainable and ...

research-article
The Moments Method for Approximate Data Cube Queries
Article No.: 84, Pages 1–23https://doi.org/10.1145/3651147

We investigate an approximation algorithm for various aggregate queries on partially materialized data cubes. Data cubes are interpreted as probability distributions, and cuboids from a partial materialization populate the terms of a series expansion of ...

research-article
Open Access
Tight Lower Bounds for Directed Cut Sparsification and Distributed Min-Cut
Article No.: 85, Pages 1–18https://doi.org/10.1145/3651148

In this paper, we consider two fundamental cut approximation problems on large graphs. We prove new lower bounds for both problems that are optimal up to logarithmic factors.

The first problem is approximating cuts in balanced directed graphs. In this ...

research-article
The Weisfeiler-Leman Dimension of Conjunctive Queries
Article No.: 86, Pages 1–17https://doi.org/10.1145/3651587

A graph parameter is a function f on graphs with the property that, for any pair of isomorphic graphs G1 and G2, f(G1)=f(G2). The Weisfeiler--Leman (WL) dimension of f is the minimum k such that, if G1 and G2 are indistinguishable by the k-dimensional WL-...

research-article
Open Access
Tight Bounds of Circuits for Sum-Product Queries
Article No.: 87, Pages 1–20https://doi.org/10.1145/3651588

In this paper, we ask the following question: given a Boolean Conjunctive Query (CQ), what is the smallest circuit that computes the provenance polynomial of the query over a given semiring? We answer this question by giving upper and lower bounds. ...

research-article
On Density-based Local Community Search
Article No.: 88, Pages 1–25https://doi.org/10.1145/3651589

Local community search (LCS) finds a community in a given graph G local to a set R of seed nodes by optimizing an objective function. The objective function f(S) for an induced subgraph S encodes the set inclusion criteria of R to a classic community ...

research-article
Open Access
Verification of Unary Communicating Datalog Programs
Article No.: 89, Pages 1–26https://doi.org/10.1145/3651590

We study verification of reachability properties over Communicating Datalog Programs (CDPs), which are networks of relational nodes connected through unordered channels and running Datalog-like computations. Each node manipulates a local state database (...

research-article
Open Access
Evaluating Datalog over Semirings: A Grounding-based Approach
Article No.: 90, Pages 1–26https://doi.org/10.1145/3651591

Datalog is a powerful yet elegant language that allows expressing recursive computation. Although Datalog evaluation has been extensively studied in the literature, so far, only loose upper bounds are known on how fast a Datalog program can be evaluated. ...

research-article
When View- and Conflict-Robustness Coincide for Multiversion Concurrency Control
Article No.: 91, Pages 1–16https://doi.org/10.1145/3651592

A DBMS allows trading consistency for efficiency through the allocation of isolation levels that are strictly weaker than serializability. The robustness problem asks whether, for a given set of transactions and a given allocation of isolation levels, ...

research-article
Expected Shapley-Like Scores of Boolean functions: Complexity and Applications to Probabilistic Databases
Article No.: 92, Pages 1–26https://doi.org/10.1145/3651593

Shapley values, originating in game theory and increasingly prominent in explainable AI, have been proposed to assess the contribution of facts in query answering over databases, along with other similar power indices such as Banzhaf values. In this work ...

research-article
Open Access
Chase Termination Beyond Polynomial Time
Article No.: 93, Pages 1–17https://doi.org/10.1145/3651594

The chase is a widely implemented approach to reason with tuple-generating dependencies (tgds), used in data exchange, data integration, and ontology-based query answering. However, it is merely a semi-decision procedure, which may fail to terminate. ...

research-article
Continual Release of Differentially Private Synthetic Data from Longitudinal Data Collections
Article No.: 94, Pages 1–26https://doi.org/10.1145/3651595

Motivated by privacy concerns in long-term longitudinal studies in medical and social science research, we study the problem of continually releasing differentially private synthetic data from longitudinal data collections. We introduce a model where, in ...

research-article
Postulates for Provenance: Instance-based provenance for first-order logic
Article No.: 95, Pages 1–16https://doi.org/10.1145/3651596

Instance-based provenance is an explanation for a query result in the form of a subinstance of the database. We investigate different desiderata one may want to impose on these subinstances. Concretely we consider seven basic postulates for provenance. ...

research-article
Open Access
Join Size Bounds using lp-Norms on Degree Sequences
Article No.: 96, Pages 1–24https://doi.org/10.1145/3651597

Estimating the output size of a query is a fundamental yet longstanding problem in database query processing. Traditional cardinality estimators used by database systems can routinely underestimate the true output size by orders of magnitude, which leads ...

research-article
Topology-aware Parallel Joins
Article No.: 97, Pages 1–25https://doi.org/10.1145/3651598

We study the design and analysis of parallel join algorithms in a topology-aware computational model. In this model, the network is modeled as a directed graph, where each edge is associated with a cost function that depends on the data transferred ...

research-article
Fast Matrix Multiplication for Query Processing
Article No.: 98, Pages 1–25https://doi.org/10.1145/3651599

This paper studies how to use fast matrix multiplication to speed up query processing. As observed, computing a two-table join and then projecting away the join attribute is essentially the Boolean matrix multiplication problem, which can be ...

research-article
Combined Approximations for Uniform Operational Consistent Query Answering
Article No.: 99, Pages 1–16https://doi.org/10.1145/3651600

Operational consistent query answering (CQA) is a recent framework for CQA based on revised definitions of repairs, which are built by applying a sequence of operations (e.g., fact deletions) starting from an inconsistent database until we reach a ...

research-article
Distinct Shortest Walk Enumeration for RPQs
Article No.: 100, Pages 1–22https://doi.org/10.1145/3651601

We consider the Distinct Shortest Walks problem. Given two vertices s and t of a graph database D and a regular path query, we want to enumerate all walks of minimal length from s to t that carry a label that conforms to the query. Usual theoretical ...

research-article
Layered List Labeling
Article No.: 101, Pages 1–19https://doi.org/10.1145/3651602

The list-labeling problem is one of the most basic and well-studied algorithmic primitives in data structures, with an extensive literature spanning upper bounds, lower bounds, and data management applications. The classical algorithm for this problem, ...

research-article
Open Access
On the Feasibility of Forgetting in Data Streams
Article No.: 102, Pages 1–17https://doi.org/10.1145/3651603

In today's digital age, it is becoming increasingly prevalent to retain digital footprints in the cloud indefinitely. Nonetheless, there is a valid argument that entities should have the authority to decide whether their personal data remains within a ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.