skip to main content
research-article

Convergence of datalog over (Pre-) Semirings

Published:10 April 2024Publication History
Skip Abstract Section

Abstract

Recursive queries have been traditionally studied in the framework of datalog, a language that restricts recursion to monotone queries over sets, which is guaranteed to converge in polynomial time in the size of the input. But modern big data systems require recursive computations beyond the Boolean space. In this article, we study the convergence of datalog when it is interpreted over an arbitrary semiring. We consider an ordered semiring, define the semantics of a datalog program as a least fixpoint in this semiring, and study the number of steps required to reach that fixpoint, if ever. We identify algebraic properties of the semiring that correspond to certain convergence properties of datalog programs. Finally, we describe a class of ordered semirings on which one can use the semi-naïve evaluation algorithm on any datalog program.

REFERENCES

  1. [1] Abadi Martín, Barham Paul, Chen Jianmin, Chen Zhifeng, Davis Andy, Dean Jeffrey, Devin Matthieu, Ghemawat Sanjay, Irving Geoffrey, Isard Michael, Kudlur Manjunath, Levenberg Josh, Monga Rajat, Moore Sherry, Murray Derek Gordon, Steiner Benoit, Tucker Paul A., Vasudevan Vijay, Warden Pete, Wicke Martin, Yu Yuan, and Zheng Xiaoqiang. 2016. TensorFlow: A system for large-scale machine learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI’16), Keeton Kimberly and Roscoe Timothy (Eds.). USENIX Association, 265283. Retrieved from: https://www.usenix.org/conference/osdi16/technical-sessions/presentation/abadiGoogle ScholarGoogle Scholar
  2. [2] Abiteboul Serge, Hull Richard, and Vianu Victor. 1995. Foundations of Databases. Addison-Wesley. Retrieved from: http://webdam.inria.fr/Alice/Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Khamis Mahmoud Abo, Ngo Hung Q., Pichler Reinhard, Suciu Dan, and Wang Yisu Remy. 2022. Convergence of Datalog over (pre-) semirings. In International Conference on Management of Data (PODS’22), Libkin Leonid and Barceló Pablo (Eds.). ACM, 105117. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Khamis Mahmoud Abo, Ngo Hung Q., and Rudra Atri. 2016. FAQ: Questions asked frequently. In 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, Milo Tova and Tan Wang-Chiew (Eds.). ACM, 1328. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Aji Srinivas M. and McEliece Robert J.. 2000. The generalized distributive law. IEEE Trans. Inf. Theor 46, 2 (2000), 325343. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Arntzenius Michael and Krishnaswami Neel. 2020. Seminaïve evaluation for a higher-order functional language. Proc. ACM Program. Lang. 4, POPL (2020), 22:1–22:28. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Backhouse R. C. and Carré B. A.. 1975. Regular algebra applied to path-finding problems. J. Inst. Math. Appl. 15 (1975), 161186.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Brinke Sophie, Grädel Erich, and Mrkonjic Lovro. 2023. Ehrenfeucht-Fraïssé games in semiring semantics. CoRR abs/2308.04910 (2023).Google ScholarGoogle Scholar
  9. [9] Carré Bernard. 1979. Graphs and Networks. The Clarendon Press, Oxford University Press, New York. xvi+277 pages.Google ScholarGoogle Scholar
  10. [10] Codd E. F.. 1970. A relational model of data for large shared data banks. Commun. ACM 13, 6 (1970), 377387. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Condie Tyson, Das Ariyam, Interlandi Matteo, Shkapsky Alexander, Yang Mohan, and Zaniolo Carlo. 2018. Scaling-up reasoning and advanced analytics on BigData. Theor. Pract. Log. Program. 18, 5–6 (2018), 806845. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Cousot Patrick and Cousot Radhia. 1977. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In 4th ACM Symposium on Principles of Programming Languages, Graham Robert M., Harrison Michael A., and Sethi Ravi (Eds.). ACM, 238252. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Cousot Patrick and Cousot Radhia. 1992. Comparing the Galois connection and widening/narrowing approaches to abstract interpretation. In Programming Language Implementation and Logic Programming (Leuven, 1992) (Lecture Notes in Computer Science, Vol. 631). Springer, Berlin, 269295. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Creignou Nadia, Kolaitis Phokion G., and Vollmer Heribert (Eds.). 2008. Complexity of Constraints—An Overview of Current Research Themes. (Lecture Notes in Computer Science, Vol. 5250). Springer. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Dannert Katrin M., Grädel Erich, Naaf Matthias, and Tannen Val. 2021. Semiring provenance for fixed-point logic. In 29th EACSL Annual Conference on Computer Science Logic (CSL’21) (LIPIcs, Vol. 183), Baier Christel and Goubault-Larrecq Jean (Eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 17:1–17:22. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Das Ariyam, Li Youfu, Wang Jin, Li Mingda, and Zaniolo Carlo. 2019. BigData applications from graph analytics to machine learning by aggregates in recursion. In 35th International Conference on Logic Programming (Technical Communications) (ICLP’19)(EPTCS, Vol. 306), Bogaerts Bart, Erdem Esra, Fodor Paul, Formisano Andrea, Ianni Giovambattista, Inclezan Daniela, Vidal Germán, Villanueva Alicia, Vos Marina De, and Yang Fangkai (Eds.). 273279. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Davey Brian A. and Priestley Hilary A.. 1990. Introduction to Lattices and Order. Cambridge University Press, Cambridge. Retrieved from: http://www.worldcat.org/search?qt=worldcat_org_all&q=0521367662Google ScholarGoogle Scholar
  18. [18] Dechter Rina. 1997. Bucket elimination: A unifying framework for processing hard and soft constraints. Constraints Int. J. 2, 1 (1997), 5155. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Esparza Javier, Kiefer Stefan, and Luttenberger Michael. 2010. Newtonian program analysis. J. ACM 57, 6 (2010), 33:1–33:47. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Fitting Melvin. 1985. A Kripke-Kleene semantics for logic programs. J. Log. Program. 2, 4 (1985), 295312. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Fitting Melvin. 1991. Bilattices and the semantics of logic programming. J. Log. Program. 11, 1&2 (1991), 91116. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Fitting Melvin. 1991. Kleene’s logic, generalized. J. Log. Comput. 1, 6 (1991), 797810. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Fitting Melvin. 1993. The family of stable models. J. Log. Program. 17, 2/3&4 (1993), 197225. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Fitting Melvin. 2002. Fixpoint semantics for logic programming a survey. Theor. Comput. Sci. 278, 1–2 (2002), 2551. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Floyd Robert W.. 1962. Algorithm 97: Shortest path. Commun. ACM 5, 6 (1962), 345. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Ganguly Sumit, Greco Sergio, and Zaniolo Carlo. 1991. Minimum and maximum predicates in logic programming. In 10th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Rosenkrantz Daniel J. (Ed.). ACM Press, 154163. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Ganguly Sumit, Greco Sergio, and Zaniolo Carlo. 1995. Extrema predicates in deductive databases. J. Comput. Syst. Sci. 51, 2 (1995), 244259. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Gelder Allen Van. 1989. The alternating fixpoint of logic programs with negation. In 8th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Silberschatz Avi (Ed.). ACM Press, 110. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Gelder Allen Van, Ross Kenneth A., and Schlipf John S.. 1991. The well-founded semantics for general logic programs. J. ACM 38, 3 (1991), 620650. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Gelfond Michael and Lifschitz Vladimir. 1988. The stable model semantics for logic programming. In 5th International Conference and Symposium on Logic Programming, Kowalski Robert A. and Bowen Kenneth A. (Eds.). MIT Press, 10701080.Google ScholarGoogle Scholar
  31. [31] Gondran M.. 1975. Algèbre linéaire et cheminement dans un graphe. Rev. Française Automat. Informat. Recherche Opérationnelle Sér. Verte 9, V-1 (1975), 7799.Google ScholarGoogle Scholar
  32. [32] Gondran Michel. 1979. Les elements p-reguliers dans les dioïdes. Discret. Math. 25, 1 (1979), 3339. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Gondran Michel and Minoux Michel. 2008. Graphs, Dioids and Semirings(Operations Research/Computer Science Interfaces Series, Vol. 41). Springer, New York, xx+383 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Greco Sergio, Saccà Domenico, and Zaniolo Carlo. 1995. DATALOG queries with stratified negation and choice: From P to D\({}^{\mbox{P}}\). In 5th International Conference on Database Theory (ICDT’95) (Lecture Notes in Computer Science, Vol. 893), Gottlob Georg and Vardi Moshe Y. (Eds.). Springer, 8296. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Greco Sergio and Zaniolo Carlo. 2001. Greedy algorithms in Datalog. Theory Pract. Log. Program. 1, 4 (2001), 381407. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Greco Sergio, Zaniolo Carlo, and Ganguly Sumit. 1992. Greedy by choice. In 11th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Vardi Moshe Y. and Kanellakis Paris C. (Eds.). ACM Press, 105113. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Green Todd J., Huang Shan Shan, Loo Boon Thau, and Zhou Wenchao. 2013. Datalog and recursive query processing. Found. Trends Datab. 5, 2 (2013), 105195. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Green Todd J., Karvounarakis Gregory, and Tannen Val. 2007. Provenance semirings. In 26th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Libkin Leonid (Ed.). ACM, 3140. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Gu Jiaqi, Watanabe Yugo H., Mazza William A., Shkapsky Alexander, Yang Mohan, Ding Ling, and Zaniolo Carlo. 2019. RaSQL: Greater power and performance for big data analytics with recursive-aggregate-SQL on Spark. In International Conference on Management of Data, Boncz Peter A., Manegold Stefan, Ailamaki Anastasia, Deshpande Amol, and Kraska Tim (Eds.). ACM, 467484. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Gunawardena Jeremy. 1998. An introduction to idempotency. In Idempotency. Publications of the Newton Institute, Vol. 11. Cambridge University Press, Cambridge, 149. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Hopkins Mark W. and Kozen Dexter. 1999. Parikh’s theorem in commutative Kleene algebra. In 14th Annual IEEE Symposium on Logic in Computer Science. IEEE Computer Society, 394401. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Jordan Herbert, Scholz Bernhard, and Subotic Pavle. 2016. Soufflé: On synthesis of program analyzers. In 28th International Conference on Computer Aided Verification (CAV’16) (Lecture Notes in Computer Science, Vol. 9780), Chaudhuri Swarat and Farzan Azadeh (Eds.). Springer, 422430. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Kam John B. and Ullman Jeffrey D.. 1976. Global data flow analysis and iterative algorithms. J. ACM 23, 1 (1976), 158171. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Kleene S. C.. 1956. Representation of events in nerve nets and finite automata. In Automata Studies. Princeton University Press, Princeton, NJ, 341.Google ScholarGoogle Scholar
  45. [45] Koch Christoph, Ahmad Yanif, Kennedy Oliver, Nikolic Milos, Nötzli Andres, Lupei Daniel, and Shaikhha Amir. 2014. DBToaster: Higher-order delta processing for dynamic, frequently fresh views. VLDB J. 23, 2 (2014), 253278. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Kohlas Jürg. 2003. Information Algebras—Generic Structures for Inference. Springer.Google ScholarGoogle Scholar
  47. [47] Kohlas Jürg and Wilson Nic. 2008. Semiring induced valuation algebras: Exact and approximate local computation algorithms. Artif. Intell. 172, 11 (2008), 13601399. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Kolaitis Phokion G.. 1991. The expressive power of stratified programs. Inf. Comput. 90, 1 (1991), 5066. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. [49] Kolaitis Phokion G. and Papadimitriou Christos H.. 1991. Why not negation by fixpoint? J. Comput. Syst. Sci. 43, 1 (1991), 125144. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] Kuich Werner. 1987. The Kleene and the Parikh theorem in complete semirings. In Automata, Languages and Programming. (Lecture Notes in Computer Science, Vol. 267). Springer, Berlin, 212225. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Kuich Werner. 1997. Semirings and formal power series: their relevance to formal languages and automata. In Handbook of Formal Languages, Vol. 1. Springer, Berlin, 609677.Google ScholarGoogle Scholar
  52. [52] Lehmann Daniel J.. 1977. Algebraic structures for transitive closure. Theor. Comput. Sci. 4, 1 (1977), 5976. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  53. [53] Leone Nicola, Pfeifer Gerald, Faber Wolfgang, Eiter Thomas, Gottlob Georg, Perri Simona, and Scarcello Francesco. 2006. The DLV system for knowledge representation and reasoning. ACM Trans. Comput. Log. 7, 3 (2006), 499562. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Libkin Leonid. 2004. Elements of Finite Model Theory. Springer. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  55. [55] Lipton Richard J., Rose Donald J., and Tarjan Robert Endre. 1979. Generalized nested dissection. SIAM J. Numer. Anal. 16, 2 (1979), 346358. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Lipton Richard J. and Tarjan Robert Endre. 1980. Applications of a planar separator theorem. SIAM J. Comput. 9, 3 (1980), 615627. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. [57] Liu Yanhong A. and Stoller Scott D.. 2020. Founded semantics and constraint semantics of logic rules. J. Log. Comput. 30, 8 (2020), 16091668. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  58. [58] Liu Yanhong A. and Stoller Scott D.. 2022. Recursive rules with aggregation: A simple unified semantics. J. Log. Comput. 32, 8 (2022), 16591693. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  59. [59] Luttenberger Michael and Schlund Maximilian. 2016. Convergence of Newton’s method over commutative semirings. Inf. Comput. 246 (2016), 4361. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. [60] Maier David, Tekle K. Tuncay, Kifer Michael, and Warren David Scott. 2018. Datalog: Concepts, History, and Outlook. In Declarative Logic Programming: Theory, Systems, and Applications, Kifer Michael and Liu Yanhong Annie (Eds.). ACM / Morgan & Claypool, 3100. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. [61] Mazuran Mirjana, Serra Edoardo, and Zaniolo Carlo. 2013. Extending the power of datalog recursion. VLDB J. 22, 4 (2013), 471493. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. [62] McSherry Frank. 2022. Recursion in Materialize. Retrieved from DOI: https://github.com/frankmcsherry/blog/blob/master/posts/2022-12-25.mdGoogle ScholarGoogle Scholar
  63. [63] Nielson Flemming, Nielson Hanne Riis, and Hankin Chris. 1999. Principles of Program Analysis. Springer-Verlag, Berlin. xxii+450 pages. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  64. [64] Nocedal Jorge and Wright Stephen J.. 1999. Numerical Optimization. Springer. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  65. [65] Parikh Rohit J.. 1966. On context-free languages. J. Assoc. Comput. Mach. 13 (1966), 570581. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. [66] Pilling D. L.. 1973. Commutative regular equations and Parikh’s theorem. J. London Math. Soc. (2) 6 (1973), 663666. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  67. [67] Przymusinski Teodor C.. 1989. Every logic program has a natural stratification and an iterated least fixed point model. In 8th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Silberschatz Avi (Ed.). ACM Press, 1121. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. [68] Przymusinski Teodor C.. 1990. The well-founded semantics coincides with the three-valued stable semantics. Fundam. Inform. 13, 4 (1990), 445463.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. [69] Reps Thomas W., Turetsky Emma, and Prabhu Prathmesh. 2016. Newtonian program analysis via tensor product. In 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL’16), Bodík Rastislav and Majumdar Rupak (Eds.). ACM, 663677. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. [70] Rocktäschel Tim. 2018. Einsum is all you need—Einstein summation in deep learning. Retrieved from DOI: https://rockt.github.io/2018/04/30/einsumGoogle ScholarGoogle Scholar
  71. [71] Ross Kenneth A. and Sagiv Yehoshua. 1992. Monotonic aggregation in deductive databases. In 11th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Vardi Moshe Y. and Kanellakis Paris C. (Eds.). ACM Press, 114126. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. [72] Rote Günter. 1990. Path problems in graphs. In Computational Graph Theory(Comput. Suppl., Vol. 7). Springer, Vienna, 155189. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  73. [73] Shenoy Prakash P. and Shafer Glenn. 1988. Axioms for probability and belief-function proagation. In 4th Annual Conference on Uncertainty in Artificial Intelligence (UAI’88), Shachter Ross D., Levitt Tod S., Kanal Laveen N., and Lemmer John F. (Eds.). North-Holland, 169198.Google ScholarGoogle Scholar
  74. [74] Shkapsky Alexander, Yang Mohan, Interlandi Matteo, Chiu Hsuan, Condie Tyson, and Zaniolo Carlo. 2016. Big data analytics with Datalog queries on Spark. In International SIGMOD Conference on Management of Data. 11351149. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. [75] Shkapsky Alexander, Yang Mohan, and Zaniolo Carlo. 2015. Optimizing recursive queries with monotonic aggregates in DeALS. In 31st IEEE International Conference on Data Engineering (ICDE’15), Gehrke Johannes, Lehner Wolfgang, Shim Kyuseok, Cha Sang Kyun, and Lohman Guy M. (Eds.). IEEE Computer Society, 867878. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  76. [76] Stanley Richard P.. 1999. Enumerative Combinatorics. Vol. 2 (Cambridge Studies in Advanced Mathematics, Vol. 62). Cambridge University Press, Cambridge. xii+581 pages. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  77. [77] Tarjan Robert E.. 1976. Graph theory and Gaussian elimination. J. R. Bunch and D. J. Rose (Eds.). 322.Google ScholarGoogle Scholar
  78. [78] Tarjan Robert Endre. 1981. A unified approach to path problems. J. ACM 28, 3 (1981), 577593. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. [79] Vardi Moshe Y.. 1982. The complexity of relational query languages (extended abstract). In 14th Annual ACM Symposium on Theory of Computing, Lewis Harry R., Simons Barbara B., Burkhard Walter A., and Landweber Lawrence H. (Eds.). ACM, 137146. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. [80] Vianu Victor. 2021. Datalog unchained. In 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS’21), Libkin Leonid, Pichler Reinhard, and Guagliardo Paolo (Eds.). ACM, 5769. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. [81] Wang Yisu Remy, Khamis Mahmoud Abo, Ngo Hung Q., Pichler Reinhard, and Suciu Dan. 2022. Optimizing recursive queries with progam synthesis. In International SIGMOD Conference on Management of Data, Ives Zachary, Bonifati Angela, and Abbadi Amr El (Eds.). ACM, 7993. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. [82] Warshall Stephen. 1962. A theorem on Boolean matrices. J. ACM 9, 1 (1962), 1112. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. [83] Zaniolo Carlo, Das Ariyam, Gu Jiaqi, Li Youfu, Li Mingda, and Wang Jin. 2019. Monotonic properties of completed aggregates in recursive queries. CoRR abs/1910.08888 (2019).Google ScholarGoogle Scholar
  84. [84] Zaniolo Carlo, Das Ariyam, Gu Jiaqi, Li Youfu, Li Mingda, and Wang Jin. 2021. Developing big-data Application as queries: An aggregate-based approach. IEEE Data Eng. Bull. 44, 2 (2021), 313. Retrieved from: http://sites.computer.org/debull/A21june/p3.pdfGoogle ScholarGoogle Scholar
  85. [85] Zaniolo Carlo, Yang Mohan, Das Ariyam, and Interlandi Matteo. 2016. The magic of pushing extrema into recursion: Simple, powerful Datalog programs. In 10th Alberto Mendelzon International Workshop on Foundations of Data Management (CEUR Workshop Proceedings, Vol. 1644), Pichler Reinhard and Silva Altigran Soares da (Eds.). CEUR-WS.org. Retrieved from: http://ceur-ws.org/Vol-1644/paper16.pdfGoogle ScholarGoogle Scholar
  86. [86] Zaniolo Carlo, Yang Mohan, Das Ariyam, Shkapsky Alexander, Condie Tyson, and Interlandi Matteo. 2017. Fixpoint semantics and optimization of recursive Datalog programs with aggregates. Theory Pract. Log. Program. 17, 5–6 (2017), 10481065. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  87. [87] Zaniolo Carlo, Yang Mohan, Interlandi Matteo, Das Ariyam, Shkapsky Alexander, and Condie Tyson. 2018. Declarative BigData algorithms via aggregates and relational database dependencies. In 12th Alberto Mendelzon International Workshop on Foundations of Data Management(CEUR Workshop Proceedings, Vol. 2100), Olteanu Dan and Poblete Barbara (Eds.). CEUR-WS.org. Retrieved from: http://ceur-ws.org/Vol-2100/paper2.pdfGoogle ScholarGoogle Scholar
  88. [88] Zimmermann U.. 1981. Linear and combinatorial optimization in ordered algebraic structures. Ann. Discrete Math. 10 (1981), viii+380.Google ScholarGoogle Scholar

Index Terms

  1. Convergence of datalog over (Pre-) Semirings

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Journal of the ACM
      Journal of the ACM  Volume 71, Issue 2
      April 2024
      627 pages
      ISSN:0004-5411
      EISSN:1557-735X
      DOI:10.1145/3613546
      • Editor:
      • Venkatesan Guruswami
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 April 2024
      • Online AM: 30 January 2024
      • Accepted: 9 January 2024
      • Revised: 22 December 2023
      • Received: 1 February 2023
      Published in jacm Volume 71, Issue 2

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)112
      • Downloads (Last 6 weeks)62

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text