skip to main content
10.1145/73721.73736acmconferencesArticle/Chapter ViewAbstractPublication PagespodsConference Proceedingsconference-collections
Article
Free Access

Bottom-up beats top-down for datalog

Published:29 March 1989Publication History

ABSTRACT

We show that for any safe datalog program P1 and any query Q (predicate of P1 with some bound arguments), there is another safe datalog program P2 that produces the answer to Q and takes no more time when evaluated by semi-naive evaluation than when P1 is evaluated topdown.

References

  1. Beeri, C. and R. Ramakrishnan {1987}. "On the power of magic," Proc. Sixth A CM Symposium on Principles of Database Systems, pp. 269-283. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Dietrich, S. W. {1987}. "Extension tables: memo relations in logic programming," Proc. IEEE Syrup. on Logic Programming, pp. 264-272.Google ScholarGoogle Scholar
  3. Lozinskii, E. L. {1985}. "Evaluating queries in a deductive database by generating," Proc. Ninth ICJAI, pp. 173-177.Google ScholarGoogle Scholar
  4. McKay, D. and S. Shapiro {1981}. "Using active connection graphs to reason with recursive rules," Proc. Seventh IJCAI, pp. 368-374.Google ScholarGoogle Scholar
  5. Neiman, V. S. {1986}. "Deduction search with single consideration of subgoals," Dokl. Akad. Nauk SSSR, pp. 251-254.Google ScholarGoogle Scholar
  6. Pereira, F. C. N. and D. H. D. Warren {1983}. "Parsing as deduction," Proc. Twenty-first Annl. Meeting of the Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Assn. for Computational Linguistics, pp. 137-144. Porter, H. H. Ill {1986}. "Earley deduction," TR CS/E- 86-002, Oregon Grad. Center, Beaverton, OR.Google ScholarGoogle Scholar
  8. Ramakrishnan, R. {1988}. "Magic templates: a spellbinding approach to logic programs," Proc. Fifth Intl. Syrup. on Logic Programming, pp. 140-159.Google ScholarGoogle Scholar
  9. Seki, H. {1988}. "On the power of continuation passing, Part I" an analysis of recursive query processing methods," unpublished manuscript, ICOT, Tokyo.Google ScholarGoogle Scholar
  10. Tamaki H. and T. Sato {1086}. "OLD resolution with tabulation," Proc. Third Intl. Conf. on Logic Programming, pp. 84-98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ullman, 3. D. {1985}. "Implementation of logical query languages for databases," A CM Trans. on Database Systems 10:3, pp. 289-321. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ullman, }. D. {1088}. Principles of Database and Knowledge-Base Systems, Volume I, Gomputer Science Press, Rockville, Md. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ullman, 3. D. {1980}. Principles of Database and Knowledge-Base Systems, Volume Ii, Computer Science Press, Rockville, Md. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Van Gelder, A. {1086}. "A message-passing framework for logical query evaluation," ACM SIGMOD International Conf. on Management of Data, pp. 155-165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Vielle, L. {1087}. "Recursive axioms in deductive databases: the query/subquery approach," in Kerschberg, L. (ed.) Expert Database Systems, Benjamin- Cummings, Menlo Park, CA, pp. 253-268.Google ScholarGoogle Scholar
  16. Vielle, L. {1988}. "From QSQ towards QoSaQ: global optimization of recursive queries," Proc. Second Intl. Con~ on Expert Database Systems.Google ScholarGoogle Scholar

Index Terms

  1. Bottom-up beats top-down for datalog

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                PODS '89: Proceedings of the eighth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
                March 1989
                401 pages
                ISBN:0897913086
                DOI:10.1145/73721

                Copyright © 1989 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 29 March 1989

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                Overall Acceptance Rate642of2,707submissions,24%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader