LogicBlox academic collaborators Tom Schrijvers, Dario Campagna, and Beata Sarna-Starosta discuss a new technique of exploiting Datalog with aggregates to improve the performance of programs with arithmetic (in)equalities. This approach employs a source-to-source program transformation which approximates the propagation technique from Constraint Programming. The experimental evaluation of the approach shows good run time speed-ups on a range of non-recursive as well as recursive programs. Furthermore, this technique improves upon the previously reported in the literature constraint magic set transformation approach.
Approximating Constraint Propagation in Datalog
-
Automated Test Input Generation for Software That Consumes ORM Models
Shan Shan Huang, , Publications, 0
Abstract Software tools that analyze and generate code from ORM conceptual schemas are highly susceptible to feature interaction bugs....
-
ERBlox: Combining Matching Dependencies with Machine Learning for Entity Resolution
Shan Shan Huang, , Publications, 0
Entity resolution — determining multiple distinct pieces of data as identifiers for the same real-world object — is a...
-
Rewriting Guarded Negation Queries
Shan Shan Huang, , Publications, 0
Query optimizations are notoriously difficult for queries involving negation. Together with academic collaborator Professor Michael Benedikt of University of...
-
Semiring-Annotated Data: Queries and Provenance
Shan Shan Huang, , Publications, 0
The provenance of data — how, through which relations and operations a piece of data arrived in a query’s...
-
Morphing: Structurally Shaping a Class by Reflecting on Others
Shan Shan Huang, , Publications, 0
The ability to write reusable code is important for all programming languages. LogicBlox is keen to support research in...
-
Querying Data Provenance
Shan Shan Huang, , Publications, 0
Data provenance has important applications in databases, from optimization, to verifying trustworthiness of answers, to helping programmers with debugging....
-
Win-move is Coordination Free… Sometimes
Shan Shan Huang, , Publications, 0
Coordination barriers are a major source of inefficiency in distributed query evaluation. Identifying queries that can be evaluated in...
-
SecureBlox: Customizable Secure Distributed Data Processing
Shan Shan Huang, , Publications, 0
The application of Datalog to the area of security, both in analysis and in the specification of rules, has...