Special Issue: Data Management and Data Mining

• Articles • Previous Articles     Next Articles

A Reasoning Mechanism for DeductiveObject-Oriented Databases

Zhang Chenghong; Hu Yunfa; Shi Baile;   

  1. Department of Computer Science; Fudan University; Shanghai 200433; Department of Management Science; Fudan University;
  • Online:1997-07-10 Published:1997-07-10

Based on the approach implementing a deductive object-oriented database system through the underlying relational database, this paper presents an object reasoning language O-Datalog, which is the extension of Datalog in form and can deal with object-oriented data. For any O-Datalog program, an equivalent Datalog program can be built to help evaluate the original program. This paper focuses on the syntax, semantics and evaluation of O-Datalog

Key words: type checking; context-free language; algorithm;

[1] Barja M L et al. An effective deductive object-oriented database through language integration. In Proc. 20th VLDB, 1994, pp.463-474.

[2] Greco S, Leone N, Rullo P. COMPLEX: An object-oriented logic programming system. IEEE Trans. Knowledge an,d Data Engineering, 1992, 4(4): 344-359.

[3] Ullman J D. Principles of Database and Knowledge-base Systems.Vol II, Rockville, Computer Science Press, 1989. ……….
[1] Yong-Hao Long, Yan-Cheng Chen, Xiang-Ping Chen, Xiao-Hong Shi, and Fan Zhou. Test-Driven Feature Extraction of Web Components [J]. Journal of Computer Science and Technology, 2022, 37(2): 389-404.
[2] Chun-Hui Wang, Zhi Jin, Wei Zhang, Didar Zowghi, Hai-Yan Zhao, Wen-Pin Jiao. Activity Diagram Synthesis Using Labelled Graphs and the Genetic Algorithm [J]. Journal of Computer Science and Technology, 2021, 36(6): 1388-1406.
[3] Einollah Pira. Using Markov Chain Based Estimation of Distribution Algorithm for Model-Based Safety Analysis of Graph Transformation [J]. Journal of Computer Science and Technology, 2021, 36(4): 839-855.
[4] Jun-Shi Chen, Hong An, Wen-Ting Han, Zeng Lin, Xin Liu. Towards Efficient Short-Range Pair Interaction on Sunway Many-Core Architecture [J]. Journal of Computer Science and Technology, 2021, 36(1): 123-139.
[5] Xin Li, Patrick Gardy, Yu-Xin Deng, Hiroyuki Seki. Reachability of Patterned Conditional Pushdown Systems [J]. Journal of Computer Science and Technology, 2020, 35(6): 1295-1311.
[6] Momodou L. Sanyang, Ata Kabán. Large-Scale Estimation of Distribution Algorithms with Adaptive Heavy Tailed Random Projection Ensembles [J]. Journal of Computer Science and Technology, 2019, 34(6): 1241-1257.
[7] Chi Zhang, Jun-Rong Liu, Da-Wu Gu, Wei-Jia Wang, Xiang-Jun Lu, Zheng Guo, Hai-Ning Lu. Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks [J]. Journal of Computer Science and Technology, 2019, 34(5): 1079-1095.
[8] Jie Xiao, Zhan-Hui Shi, Jian-Hui Jiang, Xu-Hua Yang, Yu-Jiao Huang, Hai-Gen Hu. A Locating Method for Reliability-Critical Gates with a Parallel-Structured Genetic Algorithm [J]. Journal of Computer Science and Technology, 2019, 34(5): 1136-1151.
[9] Mansoor Davoodi, Esmaeil Delfaraz, Sajjad Ghobadi, Mahtab Masoori. Algorithms for Handoff Minimization in Wireless Networks [J]. Journal of Computer Science and Technology, 2019, 34(4): 887-900.
[10] Wei-Bei Fan, Jian-Xi Fan, Cheng-Kuan Lin, Yan Wang, Yue-Juan Han, Ru-Chuan Wang. Optimally Embedding 3-Ary n-Cubes into Grids [J]. Journal of Computer Science and Technology, 2019, 34(2): 372-387.
[11] Wen-Guo Liu, Ling-Fang Zeng, Dan Feng, Kenneth B. Kent. ROCO: Using a Solid State Drive Cache to Improve the Performance of a Host-Aware Shingled Magnetic Recording Drive [J]. Journal of Computer Science and Technology, 2019, 34(1): 61-76.
[12] Shuai-Bing Lu, Jie Wu, Huan-Yang Zheng, Zhi-Yi Fang. On Maximum Elastic Scheduling in Cloud-Based Data Center Networks for Virtual Machines with the Hose Model [J]. Journal of Computer Science and Technology, 2019, 34(1): 185-206.
[13] Ying-Lin Zhao, Jian-Lei Yang, Wei-Sheng Zhao, Aida Todri-Sanial, Yuan-Qing Cheng. Power Supply Noise Aware Task Scheduling on Homogeneous 3D MPSoCs Considering the Thermal Constraint [J]. Journal of Computer Science and Technology, 2018, 33(5): 966-983.
[14] Ji-Zhou Luo, Sheng-Fei Shi, Guang Yang, Hong-Zhi Wang, Jian-Zhong Li. O2iJoin: An Efficient Index-Based Algorithm for Overlap Interval Join [J]. Journal of Computer Science and Technology, 2018, 33(5): 1023-1038.
[15] José Alberto Fernández-Zepeda, Daniel Brubeck-Salcedo, Daniel Fajardo-Delgado, Héctor Zatarain-Aceves. A Two-Player Coalition Cooperative Scheme for the Bodyguard Allocation Problem [J]. , 2018, 33(4): 823-837.
Full text



[1] Han Jianchao; Shi Zhongzhi;. Formalizing Default Reasoning[J]. , 1990, 5(4): 374 -378 .
[2] Wang Hui; Liu Dayou; Wang Yafei;. Sequential Back-Propagation[J]. , 1994, 9(3): 252 -260 .
[3] Peng Chenglian;. Combining Gprof and Event-Driven Monitoring for Analyzing Distributed Programs:A Rough View of NCSA Mosaic[J]. , 1996, 11(4): 427 -432 .
[4] Li Minglu; Sun Yongqiang; Sheng Huany;. Nondeterministic Temporal Relations in Multimedia Data[J]. , 1997, 12(3): 244 -251 .
[5] Peter M. Haverty, Zhi-Ping Weng, and Ulla Hansen. Transcriptional Regulatory Networks Activated by PI3K and ERK Transduced Growth Signals in Human Glioblastoma Cells[J]. , 2005, 20(4): 439 -445 .
[6] Xu-Bin Deng, and Yang-Yong Zhu. L-tree Match: A New Data Extraction Model and Algorithm for Huge Text Stream with Noises[J]. , 2005, 20(6): 763 -773 .
[7] Cliff Reader. AVS Intellectual Property Rights (IPR) Policy[J]. , 2006, 21(3): 306 -309 .
[8] Pierre Bourque, Serge Oligny, Alain Abran, and Bertrand Fournier. Developing Project Duration Models in Software Engineering[J]. , 2007, 22(3): 348 -357 .
[9] Hai-Bin Zhang and Zhen-Hua Duan, Senior Member, CCF, IEEE. Symbolic Algorithmic Analysis of Rectangular Hybrid Systems[J]. , 2009, 24(3): 534 -543 .
[10] Fei Wu(吴 飞), Senior Member, CCF, Ya-Hong Han(韩亚洪), and Yue-Ting Zhuang(庄越挺), Member, IEEE. Multiple Hypergraph Clustering ofWeb Images by MiningWord2Image Correlations[J]. , 2010, 25(4): 750 -760 .

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: jcst@ict.ac.cn
  Copyright ©2015 JCST, All Rights Reserved