Faceoff: Surrogates vs Natural keys

ResearchSpace/Manakin Repository

Show simple item record

dc.contributor.author Aleksic, S en
dc.contributor.author Celikovic, M en
dc.contributor.author Link, Sebastian en
dc.contributor.author Lukovic, I en
dc.contributor.author Mogin, P en
dc.contributor.editor Catania, B en
dc.contributor.editor Ivanovic, M en
dc.contributor.editor Thalheim, B en
dc.coverage.spatial Novi Sad, Serbia en
dc.date.accessioned 2012-12-06T00:55:34Z en
dc.date.issued 2011 en
dc.identifier.citation Lecture Notes in Computer Science. 6295: 543-546. 2011 en
dc.identifier.isbn 978-3-642-15576-5 en
dc.identifier.issn 0302-9743 en
dc.identifier.uri http://hdl.handle.net/2292/19722 en
dc.description.abstract The natural and surrogate key architectures are two competing approaches to specifying keys in relational databases. We analyze the performance of these approaches with respect to the update complexity and the query data and expression complexity. Our results provide new insights into the advantages and disadvantages of both approaches. en
dc.publisher Springer Berlin Heidelberg en
dc.relation.ispartof Advances in Databases and Information Systems en
dc.relation.ispartofseries 14th East European Conference on Advances in Databases and Information Systems (AdBIS) en
dc.rights Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. Details obtained from http://www.sherpa.ac.uk/romeo/issn/0302-9743/ en
dc.rights.uri https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm en
dc.title Faceoff: Surrogates vs Natural keys en
dc.type Conference Item en
dc.identifier.doi 10.1007/978-3-642-15576-5_41 en
pubs.begin-page 543 en
pubs.volume 6295 en
dc.rights.holder Copyright: Springer-Verlag Berlin Heidelberg en
pubs.end-page 546 en
pubs.finish-date 2010-09-24 en
pubs.place-of-publication Lecture Notes in Computer Science en
pubs.start-date 2010-09-20 en
dc.rights.accessrights http://purl.org/eprint/accessRights/RestrictedAccess en
pubs.subtype Conference Paper en
pubs.elements-id 366083 en
pubs.org-id Science en
pubs.org-id School of Computer Science en
pubs.record-created-at-source-date 2012-11-30 en

Full text options

Full text for this item is not available in ResearchSpace.

Find Full text

This item appears in the following Collection(s)

Show simple item record


Search ResearchSpace

Advanced Search