Abstract
We confront the promises of active database systems with the result of their use by application developers. The main problems encountered are the limitations of existing trigger languages, insufficient methodological support in analysis and design, missing development and administration tools for triggers, and weak performance. After analyzing each of these problems, we concentrate on performance because we discovered it is one of the main reasons that users are reluctant to use active rules in the development of large applications. We show, using simple concrete examples, that optimizing large applications is rendered difficult by the separation of transactions and triggers and the misunderstanding of their subtle interactions. We argue that tools, which provide assistance to both programmers and database designers to optimize their applications and master their evolution, are strongly needed. Finally, we outline several perspectives for the improvement of active database systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
E. Baralis, S. Ceri, G. Monteleone, and S. Paraboschi. An Intelligent Database System Application: the Design of EMS. In T. Risch and W. Litwin, editors, Applications of Databases. LNCS, Springer-Verlag, 1994.
M. Bouzeghoub, F. Fabret, F. Llirbat, M. Matulovic, and E. Simon. ACTIVE-DESIGN: A Generic Toolbox for Deriving Specific Rule Execution Models. In Proc. of the 3rd Intl. Workshop on Rules in Database Systems, Skovde, Sweden, June 1997. Springer Verlag.
P. Bernstein and E. Newcomer. Principles of Transaction Processing. Morgan Kaufmann, 1997.
L. Bruechert, J. Zimmermann, and A. Buchmann. Possibilities for Using Trigger Mechanisms and Their Performance in a Security Archiving System. In Proc. of BTW’97, Ulm, Germany, March 1997.
S. Ceri and P. Fraternali. The IDEA Methodology. Addison-Wesley Publisher Ltd., 1997.
R. Cochrane, H. Pirahesh, and N. Mattos. Integrating Triggers and Declarative Constraints in SQL. In Proc. of the 22nd Intl. Conference on Very Large Databases, September, 1996.
R. Chandra and A. Segev. Active Databases for Financial Applications. In J. Widom and S. Charavarthy, editors, Proc. 4th Intl. Workshop on Research In Data Engineering (RIDE-ADS), pages 46–52. IEEE, 1994.
R.O. Duda. SYNTEL: Using a Functional Language for Financial Risk Assessment. IEEE Expert, 2(3):18–31, 1987.
K.P. Eswaran. Specifications, Implementations and Interactions of a Trigger Subsystem in an Integrated Database System. IBM Research Report RJ 1820, IBM San Jose Research Laboratory, San Jose, California, August 1976.
G. Knolmayer, H. Herbst, and M. Schlesinger. Enforcing Business Rules by the Application of Trigger Concepts. In Proc. of the Priority Programme Informatics Research, Information Conference. Swiss National Science Foundation, November 1994.
H. Herbst, G. Knolmayer, T. Myrach, and M. Schlesinger. The Specification of Business Rules: A Comparison of Selected Methodologies. In A. Verrijn Stuart and T. Olle, editors, Methods and Associated Tools for the Information System Life Cycle. Elsevier, Amsterdam, 1994.
B. Horowitz. Intermediate States as a Source of Non-Deterministic Behavior in Triggers. In J. Widom and S. Charavarthy, editors, Proc. 4th Int. Workshop on Research In Data Engineering (RIDE-ADS). IEEE, 1994.
ISO-ANSI working draft: Database Language SQL3, 1994. X3H2/94/080; SOU/003.
K. Smith, L. Seligman, D. Mattox, and A. Rosenthal. Distributed Situation Monitoring, Issues and Architecture. In I. Mumick and A. Gupta, editors, Proc. of the Intl. Workshop on Materialized Views: Techniques and Applications, Montreal, June 1996.
F. Llirbat, F. Fabret, and E. Simon. Eliminating Costly Redundant Computations from SQL Trigger Executions. In Proc. of the ACM SIGMOD Intl. Conference on Management of Data, Tucson, Arizona, May 1997.
F. Llirbat, E. Simon, and D. Tombroff. Using Versions in Update Transactions: Application to Integrity Checking. In Proc. of the 23rd Intl. Conference on Very Large Databases, Athens, Greece, august 1997.
P. Maliens. The Approach for Business Rule Automation. Usoft approach, USoft, http://www.usoft.com/products, 1997.
N. Roussopoulos, N. Economou, and A. Stamenas. ADMS: A Testbed for Incremental Access Methods. IEEE Transactions on Knowledge and Data Engineering, 5(5):762–774, 1993.
T. Risch. Monitoring Database Objects. In Proc. of the 15th Intl. Conference on Very Large Databases, Amsterdam, The Netherlands, August 1989.
D. Shasha. Database Tuning: A Principled Approach. Prentice-Hall, 1992.
D. Shasha, F. Llirbat, E. Simon, and P. Valduriez. Transaction Chopping: Algorithms and Performance Studies. ACM Transactions on Database Systems, 20(3), September, 1995.
K. Smith. Autonomy and Confidentiality: Secure Federated Data Management. In Proc. of NGITS, 1995.
A. Tsalgatidou, V. Karakostas, and P. Loucopoulos. Rule-Based Requirements Specification and Validation. In Proc. of the 2nd Nordic Conf. on Advanced Information Systems Engineering, Springer-Verlag, LNCS N. 436, May, 1990.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media New York
About this chapter
Cite this chapter
Kotz-Dittrich, A., Simon, E. (1999). Active Database Systems: Expectations, Commercial Experience, and Beyond. In: Paton, N.W. (eds) Active Rules in Database Systems. Monographs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-8656-6_20
Download citation
DOI: https://doi.org/10.1007/978-1-4419-8656-6_20
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4612-6448-4
Online ISBN: 978-1-4419-8656-6
eBook Packages: Springer Book Archive