Query Optimization in the Presence of Limited Access Patterns

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We consider the problem of query optimization in the presence of limitations on access patterns to the data (i.e., when one must provide values for one of the attributes of a relation in order to obtain tuples). We show that in the presence of limited access patterns we must search a space of annotated query plans, where the annotations describe the inputs that must be given to the plan. We describe a theoretical and experimental analysis of the resulting search space and a novel query optimization algorithm that is designed to perform well under the different conditions that may arise. The algorithm searches the set of annotated query plans, pruning invalid and non-viable plans as early as possible in the search space, and it also uses a best-first search strategy in order to produce a first complete plan early in the search. We describe experiments to illustrate the performance of our algorithm.

Original languageEnglish
Title of host publicationSIGMOD/PODS 1999 - Proceedings of the 1999 ACM SIGMOD International Conference on Management of Data and Symposium on Principles of Database Systems
PublisherAssociation for Computing Machinery
Pages311-322
Number of pages12
ISBN (Electronic)9781581130843
DOIs
Publication statusPublished - 1 Jun 1999
Externally publishedYes
Event1999 ACM SIGMOD International Conference on Management of Data and Symposium on Principles of Database Systems, SIGMOD/PODS 1999 - Philadelphia, United States
Duration: 31 May 19993 Jun 1999

Publication series

NameProceedings of the ACM SIGMOD International Conference on Management of Data
ISSN (Print)0730-8078

Conference

Conference1999 ACM SIGMOD International Conference on Management of Data and Symposium on Principles of Database Systems, SIGMOD/PODS 1999
Country/TerritoryUnited States
CityPhiladelphia
Period31/05/993/06/99

Fingerprint

Dive into the research topics of 'Query Optimization in the Presence of Limited Access Patterns'. Together they form a unique fingerprint.

Cite this