|
The Worlds of Database Systems |
|
|
1 | (22) |
|
The Evolution of Database Systems |
|
|
2 | (7) |
|
Early Database Management Systems |
|
|
2 | (2) |
|
Relational Database Systems |
|
|
4 | (1) |
|
Smaller and Smaller Systems |
|
|
5 | (1) |
|
Bigger and Bigger Systems |
|
|
6 | (1) |
|
Client-Server and Multi-Tier Architectures |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
Overview of a Database Management System |
|
|
9 | (6) |
|
Data-Definition Language Commands |
|
|
10 | (1) |
|
Overview of Query Processing |
|
|
10 | (2) |
|
Storage and Buffer Management |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Outline of Database-System Studies |
|
|
15 | (4) |
|
|
16 | (1) |
|
|
17 | (1) |
|
Database System Implementation |
|
|
17 | (2) |
|
Information Integration Overview |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (3) |
|
The Entity-Relationship Data Model |
|
|
23 | (38) |
|
Elements of the E/R Model |
|
|
24 | (15) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
Entity-Relationship Diagrams |
|
|
25 | (2) |
|
Instances of an E/R Diagram |
|
|
27 | (1) |
|
Multiplicity of Binary E/R Relationships |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (2) |
|
Attributes on Relationships |
|
|
31 | (1) |
|
Converting Multiway Relationships to Binary |
|
|
32 | (1) |
|
Subclasses in the E/R Model |
|
|
33 | (3) |
|
Exercises for Section 2.1 |
|
|
36 | (3) |
|
|
39 | (8) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
Choosing the Right Relationships |
|
|
40 | (2) |
|
Picking the Right Kind of Element |
|
|
42 | (2) |
|
Exercises for Section 2.2 |
|
|
44 | (3) |
|
The Modeling of Constraints |
|
|
47 | (7) |
|
Classification of Constraints |
|
|
47 | (1) |
|
|
48 | (2) |
|
Representing Keys in the E/R Model |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
Referential Integrity in E/R Diagrams |
|
|
52 | (1) |
|
Other Kinds of Constraints |
|
|
53 | (1) |
|
Exercises for Section 2.3 |
|
|
53 | (1) |
|
|
54 | (5) |
|
Causes of Weak Entity Sets |
|
|
54 | (2) |
|
Requirements for Weak Entity Sets |
|
|
56 | (1) |
|
|
57 | (1) |
|
Exercises for Section 2.4 |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
The Relational Data Model |
|
|
61 | (70) |
|
Basics of the Relational Model |
|
|
61 | (4) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
Equivalent Representations of a Relation |
|
|
63 | (1) |
|
|
64 | (1) |
|
Exercises for Section 3.1 |
|
|
64 | (1) |
|
From E/R Diagrams to Relational Designs |
|
|
65 | (11) |
|
From Entity Sets to Relations |
|
|
66 | (1) |
|
From E/R Relationships to Relations |
|
|
67 | (3) |
|
|
70 | (1) |
|
Handling Weak Entity Sets |
|
|
71 | (4) |
|
Exercises for Section 3.2 |
|
|
75 | (1) |
|
Converting Subclass Structures to Relations |
|
|
76 | (6) |
|
|
77 | (1) |
|
An Object-Oriented Approach |
|
|
78 | (1) |
|
Using Null Values to Combine Relations |
|
|
79 | (1) |
|
|
79 | (1) |
|
Exercises for Section 3.3 |
|
|
80 | (2) |
|
|
82 | (8) |
|
Definition of Functional Dependency |
|
|
83 | (1) |
|
|
84 | (2) |
|
|
86 | (1) |
|
Discovering Keys for Relations |
|
|
87 | (1) |
|
Exercises for Section 3.4 |
|
|
88 | (2) |
|
Rules About Functional Dependencies |
|
|
90 | (12) |
|
The Splitting/Combining Rule |
|
|
90 | (2) |
|
Trivial Functional Dependencies |
|
|
92 | (1) |
|
Computing the Closure of Attributes |
|
|
92 | (3) |
|
Why the Closure Algorithm Works |
|
|
95 | (1) |
|
|
96 | (2) |
|
Closing Sets of Functional Dependencies |
|
|
98 | (1) |
|
Projecting Functional Dependencies |
|
|
98 | (2) |
|
Exercises for Section 3.5 |
|
|
100 | (2) |
|
Design of Relational Database Schemas |
|
|
102 | (16) |
|
|
103 | (1) |
|
|
103 | (2) |
|
|
105 | (2) |
|
|
107 | (5) |
|
Recovering Information from a Decomposition |
|
|
112 | (2) |
|
|
114 | (3) |
|
Exercises for Section 3.6 |
|
|
117 | (1) |
|
|
118 | (9) |
|
Attribute Independence and Its Consequent Redundancy |
|
|
118 | (1) |
|
Definition of Multivalued Dependencies |
|
|
119 | (1) |
|
Reasoning About Multivalued Dependencies |
|
|
120 | (2) |
|
|
122 | (1) |
|
Decomposition into Fourth Normal Form |
|
|
123 | (1) |
|
Relationships Among Normal Forms |
|
|
124 | (2) |
|
Exercises for Section 3.7 |
|
|
126 | (1) |
|
|
127 | (2) |
|
|
129 | (2) |
|
|
131 | (58) |
|
Review of Object-Oriented Concepts |
|
|
132 | (3) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (12) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (2) |
|
|
138 | (1) |
|
|
139 | (1) |
|
Multiplicity of Relationships |
|
|
140 | (1) |
|
|
141 | (3) |
|
|
144 | (2) |
|
Exercises for Section 4.2 |
|
|
146 | (1) |
|
|
147 | (8) |
|
Multiway Relationships in ODL |
|
|
148 | (1) |
|
|
149 | (1) |
|
Multiple Inheritance in ODL |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (3) |
|
Exercises for Section 4.3 |
|
|
155 | (1) |
|
From ODL Designs to Relational Designs |
|
|
155 | (11) |
|
From ODL Attributes to Relational Attributes |
|
|
156 | (1) |
|
Nonatomic Attributes in Classes |
|
|
157 | (1) |
|
Representing Set-Valued Attributes |
|
|
158 | (2) |
|
Representing Other Type Constructors |
|
|
160 | (2) |
|
Representing ODL Relationships |
|
|
162 | (2) |
|
|
164 | (1) |
|
Exercises for Section 4.4 |
|
|
164 | (2) |
|
The Object-Relational Model |
|
|
166 | (7) |
|
From Relations to Object-Relations |
|
|
166 | (1) |
|
|
167 | (2) |
|
|
169 | (1) |
|
Object-Oriented Versus Object-Relational |
|
|
170 | (2) |
|
From ODL Designs to Object-Relational Designs |
|
|
172 | (1) |
|
Exercises for Section 4.5 |
|
|
172 | (1) |
|
|
173 | (5) |
|
Motivation for the Semistructured-Data Model |
|
|
173 | (1) |
|
Semistructured Data Representation |
|
|
174 | (1) |
|
Information Integration Via Semistructured Data |
|
|
175 | (2) |
|
Exercises for Section 4.6 |
|
|
177 | (1) |
|
|
178 | (8) |
|
|
178 | (1) |
|
|
179 | (1) |
|
Document Type Definitions |
|
|
180 | (2) |
|
|
182 | (1) |
|
|
183 | (2) |
|
Exercises for Section 4.7 |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (2) |
|
|
189 | (50) |
|
An Example Database Schema |
|
|
190 | (1) |
|
An Algebra of Relational Operations |
|
|
191 | (23) |
|
Basics of Relational Algebra |
|
|
192 | (1) |
|
Set Operations on Relations |
|
|
193 | (2) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (2) |
|
Combining Operations to Form Queries |
|
|
201 | (2) |
|
|
203 | (2) |
|
Dependent and Independent Operations |
|
|
205 | (1) |
|
A Linear Notation for Algebraic Expressions |
|
|
206 | (1) |
|
Exercises for Section 5.2 |
|
|
207 | (7) |
|
Relational Operations on Bags |
|
|
214 | (7) |
|
|
214 | (1) |
|
Union, Intersection, and Difference of Bags |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
219 | (1) |
|
Exercises for Section 5.3 |
|
|
220 | (1) |
|
Extended Operators of Relational Algebra |
|
|
221 | (10) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (2) |
|
Extending the Projection Operator |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (2) |
|
Exercises for Section 5.4 |
|
|
230 | (1) |
|
|
231 | (5) |
|
Relational Algebra as a Constraint Language |
|
|
231 | (1) |
|
Referential Integrity Constraints |
|
|
232 | (1) |
|
Additional Constraint Examples |
|
|
233 | (2) |
|
Exercises for Section 5.5 |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
237 | (2) |
|
The Database Language SQL |
|
|
239 | (76) |
|
|
240 | (14) |
|
|
242 | (1) |
|
|
243 | (2) |
|
|
245 | (2) |
|
|
247 | (1) |
|
Null Values and Comparisons Involving NULL |
|
|
248 | (1) |
|
|
249 | (2) |
|
|
251 | (1) |
|
Exercises for Section 6.1 |
|
|
252 | (2) |
|
Queries Involving More Than One Relation |
|
|
254 | (10) |
|
Products and Joins in SQL |
|
|
254 | (1) |
|
Disambiguating Attributes |
|
|
255 | (1) |
|
|
256 | (2) |
|
Interpreting Multirelation Queries |
|
|
258 | (2) |
|
Union, Intersection, and Difference of Queries |
|
|
260 | (2) |
|
Exercises for Section 6.2 |
|
|
262 | (2) |
|
|
264 | (13) |
|
Subqueries that Produce Scalar Values |
|
|
264 | (2) |
|
Conditions Involving Relations |
|
|
266 | (1) |
|
Conditions Involving Tuples |
|
|
266 | (2) |
|
|
268 | (2) |
|
Subqueries in From Clauses |
|
|
270 | (1) |
|
|
270 | (2) |
|
|
272 | (1) |
|
|
272 | (2) |
|
Exercises for Section 6.3 |
|
|
274 | (3) |
|
|
277 | (9) |
|
|
277 | (1) |
|
Duplicates in Unions, Intersections, and Differences |
|
|
278 | (1) |
|
Grouping and Aggregation in SQL |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
280 | (2) |
|
|
282 | (2) |
|
Exercises for Section 6.4 |
|
|
284 | (2) |
|
|
286 | (6) |
|
|
286 | (2) |
|
|
288 | (1) |
|
|
289 | (1) |
|
Exercises for Section 6.5 |
|
|
290 | (2) |
|
Defining a Relation Schema in SQL |
|
|
292 | (9) |
|
|
292 | (1) |
|
Simple Table Declarations |
|
|
293 | (1) |
|
Modifying Relation Schemas |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
295 | (2) |
|
Introduction to Selection of Indexes |
|
|
297 | (3) |
|
Exercises for Section 6.6 |
|
|
300 | (1) |
|
|
301 | (11) |
|
|
302 | (1) |
|
|
302 | (2) |
|
|
304 | (1) |
|
|
305 | (3) |
|
Interpreting Queries Involving Views |
|
|
308 | (2) |
|
Exercises for Section 6.7 |
|
|
310 | (2) |
|
|
312 | (1) |
|
|
313 | (2) |
|
|
315 | (34) |
|
|
316 | (11) |
|
|
316 | (1) |
|
Keys Declared With Unique |
|
|
317 | (1) |
|
Enforcing Key Constraints |
|
|
318 | (1) |
|
Declaring Foreign-Key Constraints |
|
|
319 | (2) |
|
Maintaining Referential Integrity |
|
|
321 | (2) |
|
Deferring the Checking of Constraints |
|
|
323 | (3) |
|
Exercises for Section 7.1 |
|
|
326 | (1) |
|
Constraints on Attributes and Tuples |
|
|
327 | (6) |
|
|
328 | (1) |
|
Attribute-Based Check Constraints |
|
|
328 | (2) |
|
Tuple-Based Check Constraints |
|
|
330 | (1) |
|
Exercises for Section 7.2 |
|
|
331 | (2) |
|
Modification of Constraints |
|
|
333 | (3) |
|
Giving Names to Constraints |
|
|
334 | (1) |
|
Altering Constraints on Tables |
|
|
334 | (1) |
|
Exercises for Section 7.3 |
|
|
335 | (1) |
|
Schema-Level Constraints and Triggers |
|
|
336 | (11) |
|
|
337 | (3) |
|
Event-Condition-Action Rules |
|
|
340 | (1) |
|
|
340 | (4) |
|
|
344 | (1) |
|
Exercises for Section 7.4 |
|
|
345 | (2) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (76) |
|
SQL in a Programming Environment |
|
|
349 | (16) |
|
The Impedance Mismatch Problem |
|
|
350 | (2) |
|
The SQL/Host Language Interface |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
Single-Row Select Statements |
|
|
354 | (1) |
|
|
355 | (3) |
|
|
358 | (2) |
|
Protecting Against Concurrent Updates |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
361 | (2) |
|
Exercises for Section 8.1 |
|
|
363 | (2) |
|
Procedures Stored in the Schema |
|
|
365 | (14) |
|
Creating PSM Functions and Procedures |
|
|
365 | (1) |
|
Some Simple Statement Forms in PSM |
|
|
366 | (2) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (2) |
|
|
372 | (2) |
|
|
374 | (2) |
|
Using PSM Functions and Procedures |
|
|
376 | (1) |
|
Exercises for Section 8.2 |
|
|
377 | (2) |
|
|
379 | (6) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
Clients and Servers in the SQL Environment |
|
|
382 | (1) |
|
|
382 | (2) |
|
|
384 | (1) |
|
|
384 | (1) |
|
Using a Call-Level Interface |
|
|
385 | (8) |
|
|
385 | (3) |
|
|
388 | (1) |
|
Fetching Data From a Query Result |
|
|
389 | (3) |
|
Passing Parameters to Queries |
|
|
392 | (1) |
|
Exercises for Section 8.4 |
|
|
393 | (1) |
|
Java Database Connectivity |
|
|
393 | (4) |
|
|
393 | (1) |
|
Creating Statements in JDBC |
|
|
394 | (2) |
|
Cursor Operations in JDBC |
|
|
396 | (1) |
|
|
396 | (1) |
|
Exercises for Section 8.5 |
|
|
397 | (1) |
|
|
397 | (13) |
|
|
397 | (2) |
|
|
399 | (2) |
|
|
401 | (2) |
|
|
403 | (2) |
|
|
405 | (2) |
|
|
407 | (2) |
|
Exercises for Section 8.6 |
|
|
409 | (1) |
|
Security and User Authorization in SQL |
|
|
410 | (12) |
|
|
410 | (2) |
|
|
412 | (1) |
|
The Privilege-Checking Process |
|
|
413 | (1) |
|
|
414 | (2) |
|
|
416 | (1) |
|
|
417 | (4) |
|
Exercises for Section 8.7 |
|
|
421 | (1) |
|
|
422 | (2) |
|
|
424 | (1) |
|
Object-Orientation in Query Languages |
|
|
425 | (38) |
|
|
425 | (11) |
|
An Object-Oriented Movie Example |
|
|
426 | (1) |
|
|
426 | (2) |
|
Select-From-Where Expressions in OQL |
|
|
428 | (1) |
|
Modifying the Type of the Result |
|
|
429 | (2) |
|
|
431 | (1) |
|
|
431 | (2) |
|
Exercises for Section 9.1 |
|
|
433 | (3) |
|
Additional Forms of OQL Expressions |
|
|
436 | (7) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
438 | (3) |
|
|
441 | (1) |
|
Union, Intersection, and Difference |
|
|
442 | (1) |
|
Exercises for Section 9.2 |
|
|
442 | (1) |
|
Object Assignment and Creation in OQL |
|
|
443 | (6) |
|
Assigning Values to Host-Language Variables |
|
|
444 | (1) |
|
Extracting Elements of Collections |
|
|
444 | (1) |
|
Obtaining Each Member of a Collection |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
447 | (1) |
|
Exercises for Section 9.3 |
|
|
448 | (1) |
|
User-Defined Types in SQL |
|
|
449 | (6) |
|
|
449 | (2) |
|
Methods in User-Defined Types |
|
|
451 | (1) |
|
Declaring Relations with a UDT |
|
|
452 | (1) |
|
|
452 | (2) |
|
Exercises for Section 9.4 |
|
|
454 | (1) |
|
Operations on Object-Relational Data |
|
|
455 | (6) |
|
|
455 | (1) |
|
Accessing Attributes of Tuples with a UDT |
|
|
456 | (1) |
|
Generator and Mutator Functions |
|
|
457 | (1) |
|
Ordering Relationships on UDT's |
|
|
458 | (2) |
|
Exercises for Section 9.5 |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
463 | (40) |
|
|
463 | (8) |
|
|
463 | (1) |
|
|
464 | (1) |
|
Datalog Rules and Queries |
|
|
465 | (1) |
|
|
466 | (3) |
|
Extensional and Intensional Predicates |
|
|
469 | (1) |
|
Datalog Rules Applied to Hags |
|
|
469 | (2) |
|
Exercises for Section 10.1 |
|
|
471 | (1) |
|
From Relational Algebra to Datalog |
|
|
471 | (9) |
|
|
471 | (1) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
473 | (3) |
|
|
476 | (1) |
|
|
476 | (1) |
|
Simulating Multiple Operations with Datalog |
|
|
477 | (2) |
|
Exercises for Section 10.2 |
|
|
479 | (1) |
|
Recursive Programming in Datalog |
|
|
480 | (12) |
|
|
481 | (1) |
|
Evaluating Recursive Datalog Rules |
|
|
481 | (5) |
|
Negation in Recursive Rules |
|
|
486 | (4) |
|
Exercises for Section 10.3 |
|
|
490 | (2) |
|
|
492 | (8) |
|
Defining IDB Relations in SQL |
|
|
492 | (2) |
|
|
494 | (2) |
|
Problematic Expressions in Recursive SQL |
|
|
496 | (3) |
|
Exercises for Section 10.4 |
|
|
499 | (1) |
|
|
500 | (1) |
|
References for Chapter 10 |
|
|
501 | (2) |
|
|
503 | (64) |
|
The ``Megatron 2002'' Database System |
|
|
503 | (4) |
|
Megatron 2002 Implementation Details |
|
|
504 | (1) |
|
How Megatron 2002 Executes Queries |
|
|
505 | (1) |
|
What's Wrong With Megatron 2002? |
|
|
506 | (1) |
|
|
507 | (8) |
|
|
507 | (1) |
|
|
508 | (1) |
|
|
509 | (1) |
|
|
510 | (2) |
|
|
512 | (1) |
|
Volatile and Nonvolatile Storage |
|
|
513 | (1) |
|
Exercises for Section 11.2 |
|
|
514 | (1) |
|
|
515 | (10) |
|
|
515 | (1) |
|
|
516 | (1) |
|
Disk Storage Characteristics |
|
|
517 | (2) |
|
Disk Access Characteristics |
|
|
519 | (4) |
|
|
523 | (1) |
|
|
523 | (1) |
|
Exercises for Section 11.3 |
|
|
524 | (1) |
|
Using Secondary Storage Effectively |
|
|
525 | (8) |
|
The I/O Model of Computation |
|
|
525 | (1) |
|
Sorting Data in Secondary Storage |
|
|
526 | (1) |
|
|
527 | (1) |
|
Two-Phase, Multiway Merge-Sort |
|
|
528 | (4) |
|
Multiway Merging of Larger Relations |
|
|
532 | (1) |
|
Exercises for Section 11.4 |
|
|
532 | (1) |
|
Accelerating Access to Secondary Storage |
|
|
533 | (13) |
|
Organizing Data by Cylinders |
|
|
534 | (2) |
|
|
536 | (1) |
|
|
537 | (1) |
|
Disk Scheduling and the Elevator Algorithm |
|
|
538 | (3) |
|
Prefetching and Large-Scale Buffering |
|
|
541 | (2) |
|
Summary of Strategies and Tradeoffs |
|
|
543 | (1) |
|
Exercises for Section 11.5 |
|
|
544 | (2) |
|
|
546 | (4) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
548 | (1) |
|
Error-Handling Capabilities of Stable Storage |
|
|
549 | (1) |
|
Exercises for Section 11.6 |
|
|
550 | (1) |
|
Recovery from Disk Crashes |
|
|
550 | (13) |
|
The Failure Model for Disks |
|
|
551 | (1) |
|
Mirroring as a Redundancy Technique |
|
|
552 | (1) |
|
|
552 | (4) |
|
|
556 | (1) |
|
Coping With Multiple Disk Crashes |
|
|
557 | (4) |
|
Exercises for Section 11.7 |
|
|
561 | (2) |
|
|
563 | (2) |
|
References for Chapter 11 |
|
|
565 | (2) |
|
Representing Data Elements |
|
|
567 | (38) |
|
|
567 | (5) |
|
Representing Relational Database Elements |
|
|
568 | (1) |
|
|
569 | (1) |
|
Representing Data Elements |
|
|
569 | (3) |
|
|
572 | (6) |
|
Building Fixed-Length Records |
|
|
573 | (2) |
|
|
575 | (1) |
|
Packing Fixed-Length Records into Blocks |
|
|
576 | (1) |
|
Exercises for Section 12.2 |
|
|
577 | (1) |
|
Representing Block and Record Addresses |
|
|
578 | (11) |
|
|
579 | (1) |
|
Logical and Structured Addresses |
|
|
580 | (1) |
|
|
581 | (5) |
|
|
586 | (1) |
|
Pinned Records and Blocks |
|
|
586 | (1) |
|
Exercises for Section 12.3 |
|
|
587 | (2) |
|
Variable-Length Data and Records |
|
|
589 | (9) |
|
Records With Variable-Length Fields |
|
|
590 | (1) |
|
Records With Repeating Fields |
|
|
591 | (2) |
|
|
593 | (1) |
|
Records That Do Not Fit in a Block |
|
|
594 | (1) |
|
|
595 | (1) |
|
Exercises for Section 12.4 |
|
|
596 | (2) |
|
|
598 | (4) |
|
|
598 | (1) |
|
|
599 | (2) |
|
|
601 | (1) |
|
Exercises for Section 12.5 |
|
|
601 | (1) |
|
|
602 | (1) |
|
References for Chapter 12 |
|
|
603 | (2) |
|
|
605 | (60) |
|
Indexes on Sequential Files |
|
|
606 | (16) |
|
|
606 | (1) |
|
|
607 | (2) |
|
|
609 | (1) |
|
|
610 | (2) |
|
Indexes With Duplicate Search Keys |
|
|
612 | (3) |
|
Managing Indexes During Data Modifications |
|
|
615 | (5) |
|
Exercises for Section 13.1 |
|
|
620 | (2) |
|
|
622 | (10) |
|
Design of Secondary Indexes |
|
|
623 | (1) |
|
Applications of Secondary Indexes |
|
|
624 | (1) |
|
Indirection in Secondary Indexes |
|
|
625 | (1) |
|
Document Retrieval and Inverted Indexes |
|
|
626 | (4) |
|
Exercises for Section 13.2 |
|
|
630 | (2) |
|
|
632 | (17) |
|
|
633 | (3) |
|
|
636 | (2) |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
639 | (3) |
|
|
642 | (3) |
|
|
645 | (1) |
|
Exercises for Section 13.3 |
|
|
646 | (3) |
|
|
649 | (13) |
|
Secondary-Storage Hash Tables |
|
|
649 | (1) |
|
Insertion Into a Hash Table |
|
|
650 | (1) |
|
|
651 | (1) |
|
Efficiency of Hash Table Indexes |
|
|
652 | (1) |
|
|
652 | (1) |
|
Insertion Into Extensible Hash Tables |
|
|
653 | (3) |
|
|
656 | (1) |
|
Insertion Into Linear Hash Tables |
|
|
657 | (3) |
|
Exercises for Section 13.4 |
|
|
660 | (2) |
|
|
662 | (1) |
|
References for Chapter 13 |
|
|
663 | (2) |
|
Multidimensional and Bitmap Indexes |
|
|
665 | (48) |
|
Applications Needing Multiple Dimensions |
|
|
666 | (9) |
|
Geographic Information Systems |
|
|
666 | (2) |
|
|
668 | (1) |
|
Multidimensional Queries in SQL |
|
|
668 | (2) |
|
Executing Range Queries Using Conventional Indexes |
|
|
670 | (1) |
|
Executing Nearest-Neighbor Queries Using Conventional Indexes |
|
|
671 | (2) |
|
Other Limitations of Conventional Indexes |
|
|
673 | (1) |
|
Overview of Multidimensional Index Structures |
|
|
673 | (1) |
|
Exercises for Section 14.1 |
|
|
674 | (1) |
|
Hash-Like Structures for Multidimensional Data |
|
|
675 | (12) |
|
|
676 | (1) |
|
|
676 | (1) |
|
Insertion Into Grid Files |
|
|
677 | (2) |
|
Performance of Grid Files |
|
|
679 | (3) |
|
Partitioned Hash Functions |
|
|
682 | (1) |
|
Comparison of Grid Files and Partitioned Hashing |
|
|
683 | (1) |
|
Exercises for Section 14.2 |
|
|
684 | (3) |
|
Tree-Like Structures for Multidimensional Data |
|
|
687 | (15) |
|
|
687 | (1) |
|
Performance of Multiple-Key Indexes |
|
|
688 | (2) |
|
|
690 | (1) |
|
|
691 | (2) |
|
Adapting kd-Trees to Secondary Storage |
|
|
693 | (2) |
|
|
695 | (1) |
|
|
696 | (1) |
|
|
697 | (2) |
|
Exercises for Section 14.3 |
|
|
699 | (3) |
|
|
702 | (8) |
|
Motivation for Bitmap Indexes |
|
|
702 | (2) |
|
|
704 | (2) |
|
Operating on Run-Length-Encoded Bit-Vectors |
|
|
706 | (1) |
|
|
707 | (2) |
|
Exercises for Section 14.4 |
|
|
709 | (1) |
|
|
710 | (1) |
|
References for Chapter 14 |
|
|
711 | (2) |
|
|
713 | (74) |
|
Introduction to Physical-Query-Plan Operators |
|
|
715 | (7) |
|
|
716 | (1) |
|
Sorting While Scanning Tables |
|
|
716 | (1) |
|
The Model of Computation for Physical Operators |
|
|
717 | (1) |
|
Parameters for Measuring Costs |
|
|
717 | (2) |
|
I/O Cost for Scan Operators |
|
|
719 | (1) |
|
Iterators for Implementation of Physical Operators |
|
|
720 | (2) |
|
One-Pass Algorithms for Database Operations |
|
|
722 | (11) |
|
One-Pass Algorithms for Tuple-at-a-Time Operations |
|
|
724 | (1) |
|
One-Pass Algorithms for Unary, Full-Relation Operations |
|
|
725 | (3) |
|
One-Pass Algorithms for Binary Operations |
|
|
728 | (4) |
|
Exercises for Section 15.2 |
|
|
732 | (1) |
|
|
733 | (4) |
|
Tuple-Based Nested-Loop Join |
|
|
733 | (1) |
|
An Iterator for Tuple-Based Nested-Loop Join |
|
|
733 | (1) |
|
A Block-Based Nested-Loop Join Algorithm |
|
|
734 | (2) |
|
Analysis of Nested-Loop Join |
|
|
736 | (1) |
|
Summary of Algorithms so Far |
|
|
736 | (1) |
|
Exercises for Section 15.3 |
|
|
736 | (1) |
|
Two-Pass Algorithms Based on Sorting |
|
|
737 | (12) |
|
Duplicate Elimination Using Sorting |
|
|
738 | (2) |
|
Grouping and Aggregation Using Sorting |
|
|
740 | (1) |
|
A Sort-Based Union Algorithm |
|
|
741 | (1) |
|
Sort-Based Intersection and Difference |
|
|
742 | (1) |
|
A Simple Sort-Based Join Algorithm |
|
|
743 | (2) |
|
Analysis of Simple Sort-Join |
|
|
745 | (1) |
|
A More Efficient Sort-Based Join |
|
|
746 | (1) |
|
Summary of Sort-Based Algorithms |
|
|
747 | (1) |
|
Exercises for Section 15.4 |
|
|
748 | (1) |
|
Two-Pass Algorithms Based on Hashing |
|
|
749 | (8) |
|
Partitioning Relations by Hashing |
|
|
750 | (1) |
|
A Hash-Based Algorithm for Duplicate Elimination |
|
|
750 | (1) |
|
Hash-Based Grouping and Aggregation |
|
|
751 | (1) |
|
Hash-Based Union, Intersection, and Difference |
|
|
751 | (1) |
|
|
752 | (1) |
|
|
753 | (2) |
|
Summary of Hash-Based Algorithms |
|
|
755 | (1) |
|
Exercises for Section 15.5 |
|
|
756 | (1) |
|
|
757 | (8) |
|
Clustering and Nonclustering Indexes |
|
|
757 | (1) |
|
|
758 | (2) |
|
Joining by Using an Index |
|
|
760 | (1) |
|
Joins Using a Sorted Index |
|
|
761 | (2) |
|
Exercises for Section 15.6 |
|
|
763 | (2) |
|
|
765 | (6) |
|
Buffer Management Architecture |
|
|
765 | (1) |
|
Buffer Management Strategies |
|
|
766 | (2) |
|
The Relationship Between Physical Operator Selection and Buffer Management |
|
|
768 | (2) |
|
Exercises for Section 15.7 |
|
|
770 | (1) |
|
Algorithms Using More Than Two Passes |
|
|
771 | (4) |
|
Multipass Sort-Based Algorithms |
|
|
771 | (1) |
|
Performance of Multipass, Sort-Based Algorithms |
|
|
772 | (1) |
|
Multipass Hash-Based Algorithms |
|
|
773 | (1) |
|
Performance of Multipass Hash-Based Algorithms |
|
|
773 | (1) |
|
Exercises for Section 15.8 |
|
|
774 | (1) |
|
Parallel Algorithms for Relational Operations |
|
|
775 | (8) |
|
|
775 | (2) |
|
Tuple-at-a-Time Operations in Parallel |
|
|
777 | (2) |
|
Parallel Algorithms for Full-Relation Operations |
|
|
779 | (1) |
|
Performance of Parallel Algorithms |
|
|
780 | (2) |
|
Exercises for Section 15.9 |
|
|
782 | (1) |
|
|
783 | (1) |
|
References for Chapter 15 |
|
|
784 | (3) |
|
|
787 | (88) |
|
|
788 | (7) |
|
Syntax Analysis and Parse Trees |
|
|
788 | (1) |
|
A Grammar for a Simple Subset of SQL |
|
|
789 | (4) |
|
|
793 | (1) |
|
Exercises for Section 16.1 |
|
|
794 | (1) |
|
Algebraic Laws for Improving Query Plans |
|
|
795 | (15) |
|
Commutative and Associative Laws |
|
|
795 | (2) |
|
|
797 | (3) |
|
|
800 | (2) |
|
Laws Involving Projection |
|
|
802 | (3) |
|
Laws About Joins and Products |
|
|
805 | (1) |
|
Laws Involving Duplicate Elimination |
|
|
805 | (1) |
|
Laws Involving Grouping and Aggregation |
|
|
806 | (3) |
|
Exercises for Section 16.2 |
|
|
809 | (1) |
|
From Parse Trees to Logical Query Plans |
|
|
810 | (11) |
|
Conversion to Relational Algebra |
|
|
811 | (1) |
|
Removing Subqueries From Conditions |
|
|
812 | (5) |
|
Improving the Logical Query Plan |
|
|
817 | (2) |
|
Grouping Associative/Commutative Operators |
|
|
819 | (1) |
|
Exercises for Section 16.3 |
|
|
820 | (1) |
|
Estimating the Cost of Operations |
|
|
821 | (14) |
|
Estimating Sizes of Intermediate Relations |
|
|
822 | (1) |
|
Estimating the Size of a Projection |
|
|
823 | (1) |
|
Estimating the Size of a Selection |
|
|
823 | (3) |
|
Estimating the Size of a Join |
|
|
826 | (3) |
|
Natural Joins With Multiple Join Attributes |
|
|
829 | (1) |
|
|
830 | (2) |
|
Estimating Sizes for Other Operations |
|
|
832 | (2) |
|
Exercises for Section 16.4 |
|
|
834 | (1) |
|
Introduction to Cost-Based Plan Selection |
|
|
835 | (12) |
|
Obtaining Estimates for Size Parameters |
|
|
836 | (3) |
|
Computation of Statistics |
|
|
839 | (1) |
|
Heuristics for Reducing the Cost of Logical Query Plans |
|
|
840 | (2) |
|
Approaches to Enumerating Physical Plans |
|
|
842 | (3) |
|
Exercises for Section 16.5 |
|
|
845 | (2) |
|
Choosing an Order for Joins |
|
|
847 | (12) |
|
Significance of Left and Right Join Arguments |
|
|
847 | (1) |
|
|
848 | (1) |
|
|
848 | (4) |
|
Dynamic Programming to Select a Join Order and Grouping |
|
|
852 | (4) |
|
Dynamic Programming With More Detailed Cost Functions |
|
|
856 | (1) |
|
A Greedy Algorithm for Selecting a Join Order |
|
|
857 | (1) |
|
Exercises for Section 16.6 |
|
|
858 | (1) |
|
Completing the Physical-Query-Plan |
|
|
859 | (13) |
|
Choosing a Selection Method |
|
|
860 | (2) |
|
|
862 | (1) |
|
Pipelining Versus Materialization |
|
|
863 | (1) |
|
Pipelining Unary Operations |
|
|
864 | (1) |
|
Pipelining Binary Operations |
|
|
864 | (3) |
|
Notation for Physical Query Plans |
|
|
867 | (3) |
|
Ordering of Physical Operations |
|
|
870 | (1) |
|
Exercises for Section 16.7 |
|
|
871 | (1) |
|
|
872 | (2) |
|
References for Chapter 16 |
|
|
874 | (1) |
|
Coping With System Failures |
|
|
875 | (42) |
|
Issues and Models for Resilient Operation |
|
|
875 | (9) |
|
|
876 | (1) |
|
|
877 | (2) |
|
Correct Execution of Transactions |
|
|
879 | (1) |
|
The Primitive Operations of Transactions |
|
|
880 | (3) |
|
Exercises for Section 17.1 |
|
|
883 | (1) |
|
|
884 | (13) |
|
|
884 | (1) |
|
|
885 | (4) |
|
Recovery Using Undo Logging |
|
|
889 | (1) |
|
|
890 | (2) |
|
Nonquiescent Checkpointing |
|
|
892 | (3) |
|
Exercises for Section 17.2 |
|
|
895 | (2) |
|
|
897 | (6) |
|
|
897 | (1) |
|
Recovery With Redo Logging |
|
|
898 | (2) |
|
|
900 | (1) |
|
Recovery With a Checkpointed Redo Log |
|
|
901 | (1) |
|
Exercises for Section 17.3 |
|
|
902 | (1) |
|
|
903 | (6) |
|
|
903 | (1) |
|
Recovery With Undo/Redo Logging |
|
|
904 | (1) |
|
Checkpointing an Undo/Redo Log |
|
|
905 | (3) |
|
Exercises for Section 17.4 |
|
|
908 | (1) |
|
Protecting Against Media Failures |
|
|
909 | (5) |
|
|
909 | (1) |
|
|
910 | (3) |
|
Recovery Using an Archive and Log |
|
|
913 | (1) |
|
Exercises for Section 17.5 |
|
|
914 | (1) |
|
|
914 | (1) |
|
References for Chapter 17 |
|
|
915 | (2) |
|
|
917 | (72) |
|
Serial and Serializable Schedules |
|
|
918 | (7) |
|
|
918 | (1) |
|
|
919 | (1) |
|
|
920 | (1) |
|
The Effect of Transaction Semantics |
|
|
921 | (2) |
|
A Notation for Transactions and Schedules |
|
|
923 | (1) |
|
Exercises for Section 18.1 |
|
|
924 | (1) |
|
|
925 | (7) |
|
|
925 | (1) |
|
Precedence Graphs and a Test for Conflict-Serializability |
|
|
926 | (3) |
|
Why the Precedence-Graph Test Works |
|
|
929 | (1) |
|
Exercises for Section 18.2 |
|
|
930 | (2) |
|
Enforcing Serializability by Locks |
|
|
932 | (8) |
|
|
933 | (1) |
|
|
934 | (2) |
|
|
936 | (1) |
|
Why Two-Phase Locking Works |
|
|
937 | (1) |
|
Exercises for Section 18.3 |
|
|
938 | (2) |
|
Locking Systems With Several Lock Modes |
|
|
940 | (11) |
|
Shared and Exclusive Locks |
|
|
941 | (2) |
|
|
943 | (1) |
|
|
943 | (2) |
|
|
945 | (1) |
|
|
946 | (3) |
|
Exercises for Section 18.4 |
|
|
949 | (2) |
|
An Architecture for a Locking Scheduler |
|
|
951 | (6) |
|
A Scheduler That Inserts Lock Actions |
|
|
951 | (3) |
|
|
954 | (3) |
|
Exercises for Section 18.5 |
|
|
957 | (1) |
|
Managing Hierarchies of Database Elements |
|
|
957 | (6) |
|
Locks With Multiple Granularity |
|
|
957 | (1) |
|
|
958 | (3) |
|
Phantoms and Handling Insertions Correctly |
|
|
961 | (2) |
|
Exercises for Section 18.6 |
|
|
963 | (1) |
|
|
963 | (6) |
|
Motivation for Tree-Based Locking |
|
|
963 | (1) |
|
Rules for Access to Tree-Structured Data |
|
|
964 | (1) |
|
Why the Tree Protocol Works |
|
|
965 | (3) |
|
Exercises for Section 18.7 |
|
|
968 | (1) |
|
Concurrency Control by Timestamps |
|
|
969 | (10) |
|
|
970 | (1) |
|
Physically Unrealizable Behaviors |
|
|
971 | (1) |
|
|
972 | (1) |
|
The Rules for Timestamp-Based Scheduling |
|
|
973 | (2) |
|
|
975 | (3) |
|
|
978 | (1) |
|
Exercises for Section 18.8 |
|
|
978 | (1) |
|
Concurrency Control by Validation |
|
|
979 | (6) |
|
Architecture of a Validation-Based Scheduler |
|
|
979 | (1) |
|
|
980 | (3) |
|
Comparison of Three Concurrency-Control Mechanisms |
|
|
983 | (1) |
|
Exercises for Section 18.9 |
|
|
984 | (1) |
|
|
985 | (2) |
|
References for Chapter 18 |
|
|
987 | (2) |
|
More About Transaction Management |
|
|
989 | (58) |
|
Serializability and Recoverability |
|
|
989 | (14) |
|
|
990 | (2) |
|
|
992 | (1) |
|
|
992 | (1) |
|
Schedules That Avoid Cascading Rollback |
|
|
993 | (1) |
|
Managing Rollbacks Using Locking |
|
|
994 | (2) |
|
|
996 | (1) |
|
|
997 | (3) |
|
Recovery From Logical Logs |
|
|
1000 | (1) |
|
Exercises for Section 19.1 |
|
|
1001 | (2) |
|
|
1003 | (6) |
|
|
1003 | (1) |
|
Polygraphs and the Test for View-Serializability |
|
|
1004 | (3) |
|
Testing for View-Serializability |
|
|
1007 | (1) |
|
Exercises for Section 19.2 |
|
|
1008 | (1) |
|
|
1009 | (9) |
|
Deadlock Detection by Timeout |
|
|
1009 | (1) |
|
|
1010 | (2) |
|
Deadlock Prevention by Ordering Elements |
|
|
1012 | (2) |
|
Detecting Deadlocks by Timestamps |
|
|
1014 | (2) |
|
Comparison of Deadlock-Management Methods |
|
|
1016 | (1) |
|
Exercises for Section 19.3 |
|
|
1017 | (1) |
|
|
1018 | (5) |
|
|
1019 | (1) |
|
|
1020 | (1) |
|
|
1021 | (1) |
|
Distributed Query Optimization |
|
|
1022 | (1) |
|
Exercises for Section 19.4 |
|
|
1022 | (1) |
|
|
1023 | (6) |
|
Supporting Distributed Atomicity |
|
|
1023 | (1) |
|
|
1024 | (2) |
|
Recovery of Distributed Transactions |
|
|
1026 | (2) |
|
Exercises for Section 19.5 |
|
|
1028 | (1) |
|
|
1029 | (6) |
|
|
1030 | (1) |
|
A Cost Model for Distributed Locking Algorithms |
|
|
1030 | (1) |
|
Locking Replicated Elements |
|
|
1031 | (1) |
|
|
1032 | (1) |
|
Global Locks From Local Locks |
|
|
1033 | (1) |
|
Exercises for Section 19.6 |
|
|
1034 | (1) |
|
Long-Duration Transactions |
|
|
1035 | (6) |
|
Problems of Long Transactions |
|
|
1035 | (2) |
|
|
1037 | (1) |
|
Compensating Transactions |
|
|
1038 | (2) |
|
Why Compensating Transactions Work |
|
|
1040 | (1) |
|
Exercises for Section 19.7 |
|
|
1041 | (1) |
|
|
1041 | (3) |
|
References for Chapter 19 |
|
|
1044 | (3) |
|
|
1047 | (54) |
|
Modes of Information Integration |
|
|
1047 | (10) |
|
Problems of Information Integration |
|
|
1048 | (1) |
|
Federated Database Systems |
|
|
1049 | (2) |
|
|
1051 | (2) |
|
|
1053 | (3) |
|
Exercises for Section 20.1 |
|
|
1056 | (1) |
|
Wrappers in Mediator-Based Systems |
|
|
1057 | (7) |
|
Templates for Query Patterns |
|
|
1058 | (1) |
|
|
1059 | (1) |
|
|
1060 | (2) |
|
Other Operations at the Wrapper |
|
|
1062 | (1) |
|
Exercises for Section 20.2 |
|
|
1063 | (1) |
|
Capability-Based Optimization in Mediators |
|
|
1064 | (6) |
|
The Problem of Limited Source Capabilities |
|
|
1065 | (1) |
|
A Notation for Describing Source Capabilities |
|
|
1066 | (1) |
|
Capability-Based Query-Plan Selection |
|
|
1067 | (2) |
|
Adding Cost-Based Optimization |
|
|
1069 | (1) |
|
Exercises for Section 20.3 |
|
|
1069 | (1) |
|
On-Line Analytic Processing |
|
|
1070 | (9) |
|
|
1071 | (1) |
|
A Multidimensional View of OLAP Data |
|
|
1072 | (1) |
|
|
1073 | (3) |
|
|
1076 | (2) |
|
Exercises for Section 20.4 |
|
|
1078 | (1) |
|
|
1079 | (10) |
|
|
1079 | (3) |
|
Cube Implementation by Materialized Views |
|
|
1082 | (3) |
|
|
1085 | (2) |
|
Exercises for Section 20.5 |
|
|
1087 | (2) |
|
|
1089 | (8) |
|
|
1089 | (3) |
|
Finding Frequent Sets of Items |
|
|
1092 | (1) |
|
|
1093 | (3) |
|
Exercises for Section 20.6 |
|
|
1096 | (1) |
|
|
1097 | (1) |
|
References for Chapter 20 |
|
|
1098 | (3) |
Index |
|
1101 | |