Polynomial Tests of Normal Forms and Some Related Results

来源 :Journal of Computer Science and Technology | 被引量 : 0次 | 上传用户:anlyok
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The following problem is called the everywhere-cover problem:“Given a set of dependencies over adatabase scheme,is the set of dependencies explicitly given for each relation scheme equivalent to thedependencies implied for that relation scheme?”It is shown that when the everywhere-cover problem hasa ‘yes’ answer,examining only the dependencies explicitly given will suffice to test 3NF,BCNF and4NF of a database scheme.But this does not hold for 2NF.Consequently,in such cases,tests ofBCNF and 4NF all take polynomial time.Then a proof is given that test of 3NF of a database schemeis Co-NP-complete,and from this result it is shown that everywhere-cover is also Co-NP-complete whenonly functional dependencies are allowed.These results lead to doubt the truth of the well believed conjec-ture that no polynomial time algorithm for designing a Iossless BCNF database scheme is likely to exist. The following problem is called the everywhere-cover problem: “Given a set of dependencies over adatabase scheme, is the set of dependencies explicitly given for each relation scheme equivalent to the dedendencies implied for that relation scheme?” It is shown that when the everywhere- cover problem hasa ’yes’ answer, examining only the dependencies who given given suffix to test 3NF, BCNF and4NF of a database scheme.But this does not hold for 2NF.Consequently, in such cases, tests ofBCNF and 4NF all take polynomial time. Then a proof is given that test of 3NF of a database schemeis Co-NP-complete, and from this result it is shown that everywhere-cover is also Co-NP-complete whenonly functional dependencies are allowed .sese results lead to doubt the truth of the well believed conjec-ture that no polynomial time algorithm for designing a Iossless BCNF database scheme is likely to exist.
其他文献
《西游记》中的观音挺有意思:要从西天如来那儿拿几本经书,造福大唐子民。这本是小事一件,列个清单派孙悟空去办不就结了。可偏不这样做,又是成立专门机构,又是定岗定编的,还派个嘛
PC-1500内存的机器码调出和音响功能的利用,可通过 PEEK 指令和机器语言程序实现。现介绍如下。a.音响功能的机器语言程序 PC-1500 memory machine code recall and the us
与宠物有关的误报始终是经销商们遇到的一大难题。只要有一次误报不但浪费了时间和精力,而且还会失去信任、搞坏关系、甚至丢掉客户——总之是没了利润。在当今竞争激烈的市
This paper discusses the portability of SAC-2/ALDES and reviews some applications in polynomialalgebra.Furthermore,we indicate that the concept of the safety v
一、临床资料1.1995年以来共有 45例 (6 9只眼 ) ,其中男性 16例 ,女性 2 9例。年龄 37~ 46岁 ,均为原发性青光眼、反复发作、药物不能良好地控制 ,房角粘连 1/ 2。且术前术后
近几年来,我们的干部人事制度改革稳步发展,优秀年轻干部选拔培养工作取得了很大成效,干部队伍的整体素质有了明显提高。但是,按照建立社会主义市场经济体制的目标和党的政治路线
引子:年青人精力旺盛,爱争强好胜,遇事总要摆出点名堂来。一个搞建筑设计的,一个干消防管理的,曾共同策划给教授搞过一次不大不小的“政变”。这不,事情又来了。 Primer: yo
按照国务院批准的《国家经贸委管理的国家局机构改革和国家经贸委内设机构调整方案》的 要求,国家经贸委管理的 9个国家工业局于 2月 19日正式撤销。 9个委管国家工业局是:国家
目的探讨玻璃体手术在治疗眼后部异物中的作用。方法采用Stoze玻璃体切割机对12例外伤所致眼后部异物进行扁平部玻璃体切割术,根据病情加以巩膜环扎、气-液交换及C3F8注入。结果异物摘除率
本文介绍了防止微机控制系统失控的各种方法,较详细地讨论了各种方法在Z80微机系统、8031单片机系统、8098单片机系统中的应用,并分析了在应用某些方法时要注意的问题。 Thi