dc.contributor.author |
Aleksic, S |
en |
dc.contributor.author |
Celikovic, M |
en |
dc.contributor.author |
Link, Sebastian |
en |
dc.contributor.author |
Lukovic, I |
en |
dc.contributor.author |
Mogin, P |
en |
dc.contributor.editor |
Catania, B |
en |
dc.contributor.editor |
Ivanovic, M |
en |
dc.contributor.editor |
Thalheim, B |
en |
dc.coverage.spatial |
Novi Sad, Serbia |
en |
dc.date.accessioned |
2012-12-06T00:55:34Z |
en |
dc.date.issued |
2011 |
en |
dc.identifier.citation |
Lecture Notes in Computer Science. 6295: 543-546. 2011 |
en |
dc.identifier.isbn |
978-3-642-15576-5 |
en |
dc.identifier.issn |
0302-9743 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/19722 |
en |
dc.description.abstract |
The natural and surrogate key architectures are two competing approaches to specifying keys in relational databases. We analyze the performance of these approaches with respect to the update complexity and the query data and expression complexity. Our results provide new insights into the advantages and disadvantages of both approaches. |
en |
dc.publisher |
Springer Berlin Heidelberg |
en |
dc.relation.ispartof |
Advances in Databases and Information Systems |
en |
dc.relation.ispartofseries |
14th East European Conference on Advances in Databases and Information Systems (AdBIS) |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. Details obtained from http://www.sherpa.ac.uk/romeo/issn/0302-9743/ |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.title |
Faceoff: Surrogates vs Natural keys |
en |
dc.type |
Conference Item |
en |
dc.identifier.doi |
10.1007/978-3-642-15576-5_41 |
en |
pubs.begin-page |
543 |
en |
pubs.volume |
6295 |
en |
dc.rights.holder |
Copyright: Springer-Verlag Berlin Heidelberg |
en |
pubs.end-page |
546 |
en |
pubs.finish-date |
2010-09-24 |
en |
pubs.place-of-publication |
Lecture Notes in Computer Science |
en |
pubs.start-date |
2010-09-20 |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/RestrictedAccess |
en |
pubs.subtype |
Conference Paper |
en |
pubs.elements-id |
366083 |
en |
pubs.org-id |
Science |
en |
pubs.org-id |
School of Computer Science |
en |
pubs.record-created-at-source-date |
2012-11-30 |
en |