This paper investigates the data exchange problem among distributed independent sources. It is based on previous works in [9,10] in which a (declarative) semantics for P2P systems. In this semantics only facts not making the local databases inconsistent are imported Weak Models, and the Preferred Weak Models are those in which peers import maximal sets of facts not violating integrity constraints. The framework proposed in [9,10] does not provide any mechanism to set priorities among mapping rules. Anyhow, while collecting data it is quite natural for a source peer to associate different degrees of reliability to the portion of data provided by its neighbor peers. Starting from this observation, this paper enhances previous semantics by using priority levels among mapping rules in order to select the weak models containing a maximum number of mapping atoms according to their importance. We will call these weak models, Trusted Weak Models and we will show they can be computed as stable models of a logic program with weak constraints. © 2008 Springer-Verlag Berlin Heidelberg.

Modeling cooperation in P2P data management systems

Caroprese L.;
2008-01-01

Abstract

This paper investigates the data exchange problem among distributed independent sources. It is based on previous works in [9,10] in which a (declarative) semantics for P2P systems. In this semantics only facts not making the local databases inconsistent are imported Weak Models, and the Preferred Weak Models are those in which peers import maximal sets of facts not violating integrity constraints. The framework proposed in [9,10] does not provide any mechanism to set priorities among mapping rules. Anyhow, while collecting data it is quite natural for a source peer to associate different degrees of reliability to the portion of data provided by its neighbor peers. Starting from this observation, this paper enhances previous semantics by using priority levels among mapping rules in order to select the weak models containing a maximum number of mapping atoms according to their importance. We will call these weak models, Trusted Weak Models and we will show they can be computed as stable models of a logic program with weak constraints. © 2008 Springer-Verlag Berlin Heidelberg.
2008
978-3-540-68122-9
978-3-540-68123-6
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11564/794920
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 18
  • ???jsp.display-item.citation.isi??? 10
social impact