摘要:
A method, apparatus, and article of manufacture for computer-implemented exploitation of database indexes. A statement is executed in a database stored on a data storage device connected to a computer. The database contains data. A model based on pattern matching for a user-defined predicate and selection of an index exploitation rule based on a matched user-defined predicate is provided to be used for exploiting an index to retrieve data from the database.
摘要:
The system, method, and program of this invention avoids potential write/write conflicts and read/write conflicts when a subcomponent of a composite object (e.g., an ADT) is mutated. The embodiments of this invention define a copy semantic for the mutation function. In one embodiment, a copy function is inserted prior to any mutation function. In a another embodiment, a global compile-time analysis is performed to determine if a write/write or read/write conflict exists; and to eliminate redundant copy constructors if a conflict does exist. In a preferred embodiment, only a local analysis is performed during the parsing phase, thereby avoiding a global compile-time analysis. A mutation safe flag is associated with each parse tree node. A read target leaf parse tree node is set to false while non-leaf parse tree nodes (functions) derive their value from an incoming node, except that constructors and copy constructor functions are always true. Whether or not a copy is made of the composite object (i.e., whether or not a copy constructor is inserted) prior to a mutation is determined according to the setting of the mutation safe flags and according to the following. If a mutation safe flag for a mutation function is false, a copy constructor is inserted for the mutated composite object and the mutation safe flag is set to true. In addition, for update and trigger statements, the mutation safe flag for a mutated target is defaulted to true. Furthermore, related update entries are grouped together and a copy is generated for the common target. The generated copy is used as the common target for all of the mutations caused by the update entries grouped together in order to accumulate all of the desired mutations in a same copy of the composite object.
摘要:
A method, apparatus, and article of manufacture for run-time support for user-defined index ranges and index filters. A statement is executed in a database stored on a data storage device, which is connected to a computer. The database contains data. A search range is generated based on a user-defined range function associated with a user-defined index.
摘要:
A method, apparatus, and article of manufacture for a computer-implemented multiple-stage evaluation of a user-defined predicate. A statement is executed in a database stored on a data storage device connected to a computer. The statement is received containing a user-defined predicate with a user-defined function. Then, multiple-stage evaluation of the user-defined predicate is performed.
摘要:
A new approach to indexing semi-structured, non-traditional data uses an external search engine accessible to a database engine through a standardized interface. An external index managed by an external search engine maps object identifiers associated with the non-traditional data to row identifiers for a table stored in the relational database. In response to a query, one or more of the object identifiers are retrieved from the external index by the external search engine. The object identifiers returned by the external search engine are then used by the database engine to retrieve one or more row identifiers from an index in the relational database. The row identifiers are then used to retrieve one or more rows from the table in the relational database.