Skip to main content

Active Database Systems: Expectations, Commercial Experience, and Beyond

  • Chapter
Active Rules in Database Systems

Part of the book series: Monographs in Computer Science ((MCS))

Abstract

We confront the promises of active database systems with the result of their use by application developers. The main problems encountered are the limitations of existing trigger languages, insufficient methodological support in analysis and design, missing development and administration tools for triggers, and weak performance. After analyzing each of these problems, we concentrate on performance because we discovered it is one of the main reasons that users are reluctant to use active rules in the development of large applications. We show, using simple concrete examples, that optimizing large applications is rendered difficult by the separation of transactions and triggers and the misunderstanding of their subtle interactions. We argue that tools, which provide assistance to both programmers and database designers to optimize their applications and master their evolution, are strongly needed. Finally, we outline several perspectives for the improvement of active database systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E. Baralis, S. Ceri, G. Monteleone, and S. Paraboschi. An Intelligent Database System Application: the Design of EMS. In T. Risch and W. Litwin, editors, Applications of Databases. LNCS, Springer-Verlag, 1994.

    Google Scholar 

  2. M. Bouzeghoub, F. Fabret, F. Llirbat, M. Matulovic, and E. Simon. ACTIVE-DESIGN: A Generic Toolbox for Deriving Specific Rule Execution Models. In Proc. of the 3rd Intl. Workshop on Rules in Database Systems, Skovde, Sweden, June 1997. Springer Verlag.

    Google Scholar 

  3. P. Bernstein and E. Newcomer. Principles of Transaction Processing. Morgan Kaufmann, 1997.

    Google Scholar 

  4. L. Bruechert, J. Zimmermann, and A. Buchmann. Possibilities for Using Trigger Mechanisms and Their Performance in a Security Archiving System. In Proc. of BTW’97, Ulm, Germany, March 1997.

    Google Scholar 

  5. S. Ceri and P. Fraternali. The IDEA Methodology. Addison-Wesley Publisher Ltd., 1997.

    Google Scholar 

  6. R. Cochrane, H. Pirahesh, and N. Mattos. Integrating Triggers and Declarative Constraints in SQL. In Proc. of the 22nd Intl. Conference on Very Large Databases, September, 1996.

    Google Scholar 

  7. R. Chandra and A. Segev. Active Databases for Financial Applications. In J. Widom and S. Charavarthy, editors, Proc. 4th Intl. Workshop on Research In Data Engineering (RIDE-ADS), pages 46–52. IEEE, 1994.

    Google Scholar 

  8. R.O. Duda. SYNTEL: Using a Functional Language for Financial Risk Assessment. IEEE Expert, 2(3):18–31, 1987.

    Article  MathSciNet  Google Scholar 

  9. K.P. Eswaran. Specifications, Implementations and Interactions of a Trigger Subsystem in an Integrated Database System. IBM Research Report RJ 1820, IBM San Jose Research Laboratory, San Jose, California, August 1976.

    Google Scholar 

  10. G. Knolmayer, H. Herbst, and M. Schlesinger. Enforcing Business Rules by the Application of Trigger Concepts. In Proc. of the Priority Programme Informatics Research, Information Conference. Swiss National Science Foundation, November 1994.

    Google Scholar 

  11. H. Herbst, G. Knolmayer, T. Myrach, and M. Schlesinger. The Specification of Business Rules: A Comparison of Selected Methodologies. In A. Verrijn Stuart and T. Olle, editors, Methods and Associated Tools for the Information System Life Cycle. Elsevier, Amsterdam, 1994.

    Google Scholar 

  12. B. Horowitz. Intermediate States as a Source of Non-Deterministic Behavior in Triggers. In J. Widom and S. Charavarthy, editors, Proc. 4th Int. Workshop on Research In Data Engineering (RIDE-ADS). IEEE, 1994.

    Google Scholar 

  13. ISO-ANSI working draft: Database Language SQL3, 1994. X3H2/94/080; SOU/003.

    Google Scholar 

  14. K. Smith, L. Seligman, D. Mattox, and A. Rosenthal. Distributed Situation Monitoring, Issues and Architecture. In I. Mumick and A. Gupta, editors, Proc. of the Intl. Workshop on Materialized Views: Techniques and Applications, Montreal, June 1996.

    Google Scholar 

  15. F. Llirbat, F. Fabret, and E. Simon. Eliminating Costly Redundant Computations from SQL Trigger Executions. In Proc. of the ACM SIGMOD Intl. Conference on Management of Data, Tucson, Arizona, May 1997.

    Google Scholar 

  16. F. Llirbat, E. Simon, and D. Tombroff. Using Versions in Update Transactions: Application to Integrity Checking. In Proc. of the 23rd Intl. Conference on Very Large Databases, Athens, Greece, august 1997.

    Google Scholar 

  17. P. Maliens. The Approach for Business Rule Automation. Usoft approach, USoft, http://www.usoft.com/products, 1997.

  18. N. Roussopoulos, N. Economou, and A. Stamenas. ADMS: A Testbed for Incremental Access Methods. IEEE Transactions on Knowledge and Data Engineering, 5(5):762–774, 1993.

    Article  Google Scholar 

  19. T. Risch. Monitoring Database Objects. In Proc. of the 15th Intl. Conference on Very Large Databases, Amsterdam, The Netherlands, August 1989.

    Google Scholar 

  20. D. Shasha. Database Tuning: A Principled Approach. Prentice-Hall, 1992.

    Google Scholar 

  21. D. Shasha, F. Llirbat, E. Simon, and P. Valduriez. Transaction Chopping: Algorithms and Performance Studies. ACM Transactions on Database Systems, 20(3), September, 1995.

    Google Scholar 

  22. K. Smith. Autonomy and Confidentiality: Secure Federated Data Management. In Proc. of NGITS, 1995.

    Google Scholar 

  23. A. Tsalgatidou, V. Karakostas, and P. Loucopoulos. Rule-Based Requirements Specification and Validation. In Proc. of the 2nd Nordic Conf. on Advanced Information Systems Engineering, Springer-Verlag, LNCS N. 436, May, 1990.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer Science+Business Media New York

About this chapter

Cite this chapter

Kotz-Dittrich, A., Simon, E. (1999). Active Database Systems: Expectations, Commercial Experience, and Beyond. In: Paton, N.W. (eds) Active Rules in Database Systems. Monographs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-8656-6_20

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-8656-6_20

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4612-6448-4

  • Online ISBN: 978-1-4419-8656-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics