Sumário Itens Encontrados: 737Part 1 Background 1Chapter 1 Introduction to Databases 31.1 Introduction 41.2 Traditional File-Based Systems 71.2.1 File-Based Approach 71.2.2 Limitations of the File-Based Approach 121.3 Database Approach 141.3.1 The Database 151.3.2 The Database Management System (DBMS) 161.3.3 (Database) Application Programs 171.3.4 Components of the DBMS Environment 181.3.5 Database Design: The Paradigm Shift 211.4 Roles in the Database Environment 211.4.1 Data and Database Administrators 221.4.2 Database Designers 221.4.3 Application Developers 231.4.4 End-Users 231.5 History of Database Management Systems 241.6 Advantages and Disadvantages of DBMSs 26Chapter 2 Database Environment 332.1 The Three-Level ANSI-SPARC Architecture 342.1.1 External Level 352.1.2 Conceptual Level 362.1.3 Internal Level 362.1.4 Schemas,Mappings,and Instances 372.1.5 Data Independence 382.2 Database Languages 392.2.1 The Data Definition Language (DDL) 402.2.2 The Data Manipulation Language (DML) 402.2.3 Fourth-Generation Languages (4GLs) 422.3 Data Models and Conceptual Modeling 432.3.1 Object-Based Data Models 442.3.2 Record-Based Data Models 452.3.3 Physical Data Models 472.3.4 Conceptual Modeling 472.4 Functions of a DBMS 482.5 Components of a DBMS 532.6 Multi-User DBMS Architectures 562.6.1Teleprocessing 562.6.2 File-Server Architectures 562.6.3 Traditional Two-Tier ClientâServer Architecture 572.6.4 Three-Tier ClientâServer Architecture 602.6.5 Transaction Processing Monitors 62Part 2 The Relational Model and Languages 67Chapter 3 The Relational Model 693.1 Brief History of the Relational Model 703.2 Terminology 713.2.1 Relational Data Structure 723.2.2 Mathematical Relations 753.2.3 Database Relations 763.2.4 Properties of Relations 773.2.5 Relational Keys 783.2.6 Representing Relational Database Schemas 793.3 Integrity Constraints 813.3.1 Nulls 813.3.2 Entity Integrity 823.3.3 Referential Integrity 833.3.4 General Constraints 833.4 Views 833.4.1 Terminology 843.4.2 Purpose of Views 843.4.3 Updating Views 85Chapter 4 Relational Algebra and Relational Calculus 884.1 The Relational Algebra 894.1.1 Unary Operations 894.1.2 Set Operations 924.1.3 Join Operations 954.1.4 Division Operation 994.1.5 Aggregation and Grouping Operations 1004.2 The Relational Calculus 1034.2.1 Tuple Relational Calculus 1034.2.2 Domain Relational Calculus 1074.3 Other Languages 109Chapter 5 SQL: Data Manipulation 1125.1 Introduction to SQL 1135.1.1 Objectives of SQL 1135.1.2 History of SQL 1145.1.3 Importance of SQL 1165.1.4Terminology 1165.2 Writing SQL Commands 1165.3 Data Manipulation 1175.3.1 Simple Queries 1185.3.2 Sorting Results (ORDER BY Clause) 1275.3.3 Using the SQL Aggregate Functions 1295.3.4 Grouping Results (GROUP BY Clause) 1315.3.5Subqueries 1345.3.6 ANY and ALL 1385.3.7 Multi-Table Queries 1395.3.8 EXISTS and NOT EXISTS 1465.3.9 Combining Result Tables (UNION,INTERSECT,EXCEPT) 1475.3.10 Database Updates 149Chapter 6 SQL: Data Definition 1576.1 The ISO SQL Data Types 1586.1.1 SQL Identifiers 1586.1.2 SQL Scalar Data Types 1596.1.3 Exact Numeric Data 1606.2 Integrity Enhancement Feature 1646.2.1 Required Data 1646.2.2 Domain Constraints 1646.2.3 Entity Integrity 1666.2.4 Referential Integrity 1666.2.5 General Constraints 1676.3 Data Definition 1686.3.1 Creating a Database 1686.3.2 Creating a Table (CREATE TABLE) 1696.3.3 Changing a Table Definition (ALTER TABLE) 1736.3.4 Removing a Table (DROP TABLE) 1746.3.5 Creating an Index (CREATE INDEX) 1756.3.6 Removing an Index (DROP INDEX) 1766.4 Views 1766.4.1 Creating a View (CREATE VIEW) 1776.4.2 Removing a View (DROP VIEW) 1796.4.3 View Resolution 1806.4.4 Restrictions on Views 1816.4.5 View Updatability 1816.4.6 WITH CHECK OPTION 1836.4.7 Advantages and Disadvantages of Views 1846.4.8 View Materialization 1866.5 Transactions 1876.5.1 Immediate and Deferred Integrity Constraints 1896.6 Discretionary Access Control 1896.6.1 Granting Privileges to Other Users (GRANT) 1916.6.2 Revoking Privileges from Users (REVOKE) 192Chapter 7 Query-By-Example 1987.1 Introduction to Microsoft Office Access Queries 1997.2 Building Select Queries Using QBE 2017.2.1 Specifying Criteria 2027.2.2 Creating Multi-Table Queries 2047.2.3 Calculating Totals 2077.3 Using Advanced Queries 2087.3.1 Parameter Query 2087.3.2 Crosstab Query 2097.3.3 Find Duplicates Query 2127.3.4 Find Unmatched Query 2147.3.5 Autolookup Query 2157.4 Changing the Content of Tables Using Action Queries 2157.4.1 Make-Table Action Query 2157.4.2 Delete Action Query 2177.4.3 Update Action Query 2177.4.4 Append Action Query 221Chapter 8 Commercial RDBMSs: Office Access and Oracle 2258.1 Microsoft Office Access 2003 2268.1.1Objects 2268.1.2 Microsoft Office Access Architecture 2278.1.3 Table Definition 2288.1.4 Relationships and Referential Integrity Definition 2338.1.5 General Constraint Definition 2348.1.6Forms 2368.1.7Reports 2388.1.8Macros 2398.1.9 Object Dependencies 2428.2 Oracle9i 2428.2.1 Objects 2448.2.2 Oracle Architecture 2458.2.3 Table Definition 2528.2.4 General Constraint Definition 2558.2.5 PL/SQL 2558.2.6 Subprograms,Stored Procedures,Functions,and Packages 2618.2.7 Triggers 2638.2.8 Oracle Internet Developer Suite 2678.2.9 Other Oracle Functionality 2718.2.10 Oracle10g 271Part 3 Database Analysis and Design Techniques 279Chapter 9 Database Planning,Design,and Administration 2819.1 The Information Systems Lifecycle 2829.2 The Database System Development Lifecycle 2839.3 Database Planning 2859.4 System Definition 2869.4.1 User Views 2879.5 Requirements Collection and Analysis 2889.5.1 Centralized Approach 2899.5.2 View Integration Approach 2899.6 Database Design 2919.6.1 Approaches to Database Design 2919.6.2 Data Modeling 2929.6.3 Phases of Database Design 2939.7 DBMS Selection 2959.7.1 Selecting the DBMS 2969.8 Application Design 2999.8.1 Transaction Design 3009.8.2 User Interface Design Guidelines 3019.9 Prototyping 3039.10 Implementation 3049.11 Data Conversion and Loading 3059.12 Testing 3059.13 Operational Maintenance 3069.14 CASE Tools 3079.15 Data Administration and Database Administration 3099.15.1 Data Administration 3099.15.2 Database Administration 3099.15.3 Comparison of Data and Database Administration 311Chapter 10 Fact-Finding Techniques 31410.1 When Are Fact-Finding Techniques Used? 31510.2 What Facts Are Collected? 31610.3 Fact-Finding Techniques 31710.3.1 Examining Documentation 31710.3.2Interviewing 31710.3.3 Observing the Enterprise in Operation 31910.3.4Research 31910.3.5Questionnaires 32010.4 Using Fact-Finding Techniques â A Worked Example 32110.4.1 The DreamHome Case Study â An Overview 32110.4.2 The DreamHome Case Study â Database Planning 32610.4.3 The DreamHome Case Study â System Definition 33110.4.4 The DreamHome Case Study â Requirements Collection and Analysis 33210.4.5 The DreamHome Case Study â Database Design 340Chapter 11 EntityâRelationship Modeling 34211.1 Entity Types 34311.2 Relationship Types 34611.2.1 Degree of Relationship Type 34711.2.2 Recursive Relationship 34911.3 Attributes 35011.3.1 Simple and Composite Attributes 35111.3.2 Single-Valued and Multi-Valued Attributes 35111.3.3 Derived Attributes 35211.3.4Keys 35211.4 Strong and Weak Entity Types 35411.5 Attributes on Relationships 35511.6 Structural Constraints 35611.6.1 One-to-One (1:1) Relationships 35711.6.2 One-to-Many (1:*) Relationships 35811.6.3 Many-to-Many (*:*) Relationships 35911.6.4 Multiplicity for Complex Relationships 36111.6.5 Cardinality and Participation Constraints 36211.7 Problems with ER Models 36411.7.1 Fan Traps 36411.7.2 Chasm Traps 365Chapter 12 Enhanced EntityâRelationship Modeling 37112.1 Specialization/Generalization 37212.1.1 Superclasses and Subclasses 37212.1.2 Superclass/Subclass Relationships 37312.1.3 Attribute Inheritance 37412.1.4 Specialization Process 37412.1.5 Generalization Process 37512.1.6 Constraints on Specialization/Generalization 37812.1.7 Worked Example of using Specialization/Generalization to Model the Branch View of DreamHome Case Study 37912.2 Aggregation 38312.3 Composition 384Chapter 13 Normalization 38713.1 The Purpose of Normalization 38813.2 How Normalization Supports Database Design 38913.3 Data Redundancy and Update Anomalies 39013.3.1 Insertion Anomalies 39113.3.2 Deletion Anomalies 39213.3.3 Modification Anomalies 39213.4 Functional Dependencies 39213.4.1 Characteristics of Functional Dependencies 39313.4.2 Identifying Functional Dependencies 39713.4.3 Identifying the Primary Key for a Relation using Functional Dependencies 39913.5 The Process of Normalization 40113.6 First Normal Form (1NF) 40313.7 Second Normal Form (2NF) 40713.8 Third Normal Form (3NF) 40813.9 General Definitions of 2NF and 3NF 411Chapter 14 Advanced Normalization 41514.1 More on Functional Dependencies 41614.1.1 Inference Rules for Functional Dependencies 41614.1.2 Minimal Sets of Functional Dependencies 41814.2 BoyceâCodd Normal Form (BCNF) 41914.2.1 Definition of BoyceâCodd Normal Form 41914.3 Review of Normalization up to BCNF 42214.4 Fourth Normal Form (4NF) 42814.4.1 Multi-Valued Dependency 42814.4.2 Definition of Fourth Normal Form 43014.5 Fifth Normal Form (5NF) 43014.5.1 Lossless-Join Dependency 43014.5.2 Definition of Fifth Normal Form 431Part 4 Methodology 435Chapter 15 Methodology â Conceptual Database Design 43715.1 Introduction to the Database Design Methodology 43815.1.1 What is a Design Methodology? 43815.1.2 Conceptual,Logical,and Physical Database Design 43915.1.3 Critical Success Factors in Database Design 44015.2 Overview of the Database Design Methodology 44015.3 Conceptual Database Design Methodology 442Step 1 Build Conceptual Data Model 442Chapter 16 Methodology â Logical Database Design for the Relational Model 46116.1 Logical Database Design Methodology for the Relational Model 462Step 2 Build and Validate Logical Data Model 462Chapter 17 Methodology â Physical Database Design for Relational Databases 49417.1 Comparison of Logical and Physical Database Design 49517.2 Overview of Physical Database Design Methodology 49617.3 The Physical Database Design Methodology for Relational Databases 497Step 3 Translate Logical Data Model for Target DBMS 497Step 4 Design File Organizations and Indexes 501Step 5 Design User Views 515Step 6 Design Security Mechanisms 516Chapter 18 Methodology â Monitoring and Tuning the Operational System 51918.1 Denormalizing and Introducing Controlled Redundancy 519Step 7 Consider the Introduction of Controlled Redundancy 51918.2 Monitoring the System to Improve Performance 532Step 8 Monitor and Tune the Operational System 532Part 5 Selected Database Issues 539Chapter 19 Security 54119.1 Database Security 54219.1.1Threats 54319.2 Countermeasures â Computer-Based Controls 54519.2.1 Authorization 54619.2.2 Access Controls 54719.2.3 Views 55019.2.4 Backup and Recovery 55019.2.5 Integrity 55119.2.6 Encryption 55119.2.7 RAID (Redundant Array of Independent Disks) 55219.3 Security in Microsoft Office Access DBMS 55519.4 Security in Oracle DBMS 55819.5 DBMSs and Web Security 56219.5.1 Proxy Servers 56319.5.2 Firewalls 56319.5.3 Message Digest Algorithms and Digital Signatures 56419.5.4 Digital Certificates 56419.5.5 Kerberos 56519.5.6 Secure Sockets Layer and Secure HTTP 56519.5.7 Secure Electronic Transactions and Secure Transaction Technology 56619.5.8 Java Security 56619.5.9 ActiveX Security 569Chapter 20 Transaction Management 57220.1 Transaction Support 57320.1.1 Properties of Transactions 57520.1.2 Database Architecture 57620.2 Concurrency Control 57720.2.1 The Need for Concurrency Control 57720.2.2 Serializability and Recoverability 58020.2.3 Locking Methods 58720.2.4 Deadlock 59420.2.5 Timestamping Methods 59720.2.6 Multiversion Timestamp Ordering 60020.2.7 Optimistic Techniques 60120.2.8 Granularity of Data Items 60220.3 Database Recovery 60520.3.1 The Need for Recovery 60620.3.2 Transactions and Recovery 60720.3.3 Recovery Facilities 60920.3.4 Recovery Techniques 61220.3.5 Recovery in a Distributed DBMS 61520.4 Advanced Transaction Models 61520.4.1 Nested Transaction Model 61620.4.2 Sagas 61820.4.3 Multilevel Transaction Model 61920.4.4 Dynamic Restructuring 62020.4.5 Workflow Models 62120.5 Concurrency Control and Recovery in Oracle 62220.5.1 Oracleâs Isolation Levels 62320.5.2 Multiversion Read Consistency 62320.5.3 Deadlock Detection 62520.5.4 Backup and Recovery 625Chapter 21 Query Processing 63021.1 Overview of Query Processing 63121.2 Query Decomposition 63521.3 Heuristical Approach to Query Optimization 63921.3.1 Transformation Rules for the Relational Algebra Operations 64021.3.2 Heuristical Processing Strategies 64521.4 Cost Estimation for the Relational Algebra Operations 64621.4.1 Database Statistics 64621.4.2 Selection Operation 64721.4.3 Join Operation 65421.4.4 Projection Operation 66221.4.5 The Relational Algebra Set Operations 66421.5 Enumeration of Alternative Execution Strategies 66521.5.1 Pipelining 66521.5.2 Linear Trees 66621.5.3 Physical Operators and Execution Strategies 66721.5.4 Reducing the Search Space 66821.5.5 Enumerating Left-Deep Trees 66921.5.6 Semantic Query Optimization 67121.5.7 Alternative Approaches to Query Optimization 67221.5.8 Distributed Query Optimization 67221.6 Query Optimization in Oracle 67321.6.1 Rule-Based and Cost-Based Optimization 67321.6.2 Histograms 67721.6.3 Viewing the Execution Plan 678Part 6 Distributed DBMSs and Replication 685Chapter 22 Distributed DBMSs â Concepts and Design 68722.1 Introduction 68822.1.1 Concepts 68922.1.2 Advantages and Disadvantages of DDBMSs 69322.1.3 Homogeneous and Heterogeneous DDBMSs 69722.2 Overview of Networking 69922.3 Functions and Architectures of a DDBMS 70322.3.1 Functions of a DDBMS 70322.3.2 Reference Architecture for a DDBMS 70422.3.3 Reference Architecture for a Federated MDBS 70522.3.4 Component Architecture for a DDBMS 70622.4 Distributed Relational Database Design 70822.4.1 Data Allocation 70922.4.2 Fragmentation 71022.5 Transparencies in a DDBMS 71922.5.1 Distribution Transparency 71922.5.2 Transaction Transparency 72222.5.3 Performance Transparency 72522.5.4 DBMS Transparency 72822.6 Dateâs Twelve Rules for a DDBMS 729Chapter 23 Distributed DBMSs â Advanced Concepts 73423.1 Distributed Transaction Management 73523.2 Distributed Concurrency Control 73623.2.1 Objectives 73623.2.2 Distributed Serializability 73723.2.3 Locking Protocols 73823.2.4 Timestamp Protocols 74023.3 Distributed Deadlock Management 74123.4 Distributed Database Recovery 74423.4.1 Failures in a Distributed Environment 74423.4.2 How Failures Affect Recovery 74523.4.3 Two-Phase Commit (2PC) 74623.4.4 Three-Phase Commit (3PC) 75223.4.5 Network Partitioning 75623.5 The X/Open Distributed Transaction Processing Model 75823.6 Distributed Query Optimization 76123.6.1 Data Localization 76223.6.2 Distributed Joins 76623.6.3 Global Optimization 76723.7 Distribution in Oracle 77223.7.1 Oracleâs DDBMS Functionality 772Chapter 24 Replication and Mobile Databases 78024.1 Introduction to Database Replication 78124.2 Benefits of Database Replication 78124.3 Applications of Replication 78324.4 Basic Components of Database Replication 78324.5 Database Replication Environments 78424.5.1 Synchronous Versus Asynchronous Replication 78424.5.2 Data Ownership 78424.6 Replication Servers 78824.6.1 Replication Server Functionality 78824.6.2 Implementation Issues 78924.7 Introduction to Mobile Databases 79224.7.1 Mobile DBMSs 79424.8 Oracle Replication 79424.8.1 Oracleâs Replication Functionality 794Part 7 Object DBMSs 801Chapter 25 Introduction to Object DBMSs 80325.1 Advanced Database Applications 80425.2 Weaknesses of RDBMSs 80925.3 Object-Oriented Concepts 81425.3.1 Abstraction,Encapsulation,and Information Hiding 81425.3.2 Objects and Attributes 81525.3.3 Object Identity 81625.3.4 Methods and Messages 81825.3.5 Classes 81925.3.6 Subclasses,Superclasses,and Inheritance 82025.3.7 Overriding and Overloading 82225.3.8 Polymorphism and Dynamic Binding 82325.3.9 Complex Objects 82425.4 Storing Objects in a Relational Database 82525.4.1 Mapping Classes to Relations 82625.4.2 Accessing Objects in the Relational Database 82725.5 Next-Generation Database Systems 82825.6 Object-Oriented Database Design 83025.6.1 Comparison of Object-Oriented Data Modeling and Conceptual Data Modeling 83025.6.2 Relationships and Referential Integrity 83125.6.3 Behavioral Design 83425.7 Object-Oriented Analysis and Design with UML 83625.7.1 UML Diagrams 83725.7.2 Usage of UML in the Methodology for Database Design 842Chapter 26 Object-Oriented DBMSs â Concepts 84726.1 Introduction to Object-Oriented Data Models and OODBMSs 84926.1.1 Definition of Object-Oriented DBMSs 84926.1.2 Functional Data Models 85026.1.3 Persistent Programming Languages 85426.1.4 The Object-Oriented Database System Manifesto 85726.1.5 Alternative Strategies for Developing an OODBMS 85926.2 OODBMS Perspectives 86026.2.1 Pointer Swizzling Techniques 86226.2.2 Accessing an Object 86526.3 Persistence 86726.3.1 Persistence Schemes 86826.3.2 Orthogonal Persistence 86926.4 Issues in OODBMSs 87126.4.1 Transactions 87126.4.2 Versions 87226.4.3 Schema Evolution 87326.4.4 Architecture 87626.4.5 Benchmarking 87826.5 Advantages and Disadvantages of OODBMSs 88126.5.1 Advantages 88126.5.2 Disadvantages 883Chapter 27 Object-Oriented DBMSs â Standards and Systems 88827.1 Object Management Group 88927.1.1 Background 88927.1.2 The Common Object Request Broker Architecture 89127.1.3 Other OMG Specifications 89427.1.4 Model-Driven Architecture 89727.2 Object Data Standard ODMG 3.0,1999 89727.2.1 Object Data Management Group 89727.2.2 The Object Model 90027.2.3 The Object Definition Language 90827.2.4 The Object Query Language 91127.2.5 Other Parts of the ODMG Standard 91727.2.6 Mapping the Conceptual Design to a Logical (Object-Oriented) Design 92027.3 ObjectStore 92127.3.1 Architecture 92127.3.2 Building an ObjectStore Application 92427.3.3 Data Definition in ObjectStore 92627.3.4 Data Manipulation in ObjectStore 929Chapter 28 Object-Relational DBMSs 93528.1 Introduction to Object-Relational Database Systems 93628.2 The Third-Generation Database Manifestos 93928.2.1 The Third-Generation Database System Manifesto 94028.2.2 The Third Manifesto 94028.3 Postgres â An Early ORDBMS 94328.3.1 Objectives of Postgres 94328.3.2 Abstract Data Types 94328.3.3 Relations and Inheritance 94428.3.4 Object Identity 94628.4 SQL:1999 and SQL:2003 94628.4.1 Row Types 94728.4.2 User-Defined Types 94828.4.3 Subtypes and Supertypes 95128.4.4 User-Defined Routines 95328.4.5 Polymorphism 95528.4.6 Reference Types and Object Identity 95628.4.7 Creating Tables 95728.4.8 Querying Data 96028.4.9 Collection Types 96128.4.10 Typed Views 96528.4.11 Persistent Stored Modules 96628.4.12 Triggers 96728.4.13 Large Objects 97128.4.14 Recursion 97228.5 Query Processing and Optimization 97428.5.1 New Index Types 97728.6 Object-Oriented Extensions in Oracle 97828.6.1 User-Defined Data Types 97828.6.2 Manipulating Object Tables 98428.6.3 Object Views 98528.6.4 Privileges 98628.7 Comparison of ORDBMS and OODBMS 986Part 8 Web and DBMSs 991Chapter 29 Web Technology and DBMSs 99329.1 Introduction to the Internet and Web 99429.1.1 Intranets and Extranets 99629.1.2 e-Commerce and e-Business 99729.2 The Web 99829.2.1 HyperText Transfer Protocol 99929.2.2 HyperText Markup Language 100129.2.3 Uniform Resource Locators 100229.2.4 Static and Dynamic Web Pages 100429.2.5 Web Services 100429.2.6 Requirements for WebâDBMS Integration 100529.2.7 Advantages and Disadvantages of the WebâDBMS Approach 100629.2.8 Approaches to Integrating the Web and DBMSs 101129.3 Scripting Languages 101129.3.1 JavaScript and JScript 101229.3.2 VBScript 101229.3.3 Perl and PHP 101329.4 Common Gateway Interface 101429.4.1 Passing Information to a CGI Script 101629.4.2 Advantages and Disadvantages of CGI 101829.5 HTTP Cookies 101929.6 Extending the Web Server 102029.6.1 Comparison of CGI and API 102129.7 Java 102129.7.1 JDBC 102529.7.2 SQLJ 103029.7.3 Comparison of JDBC and SQLJ 103029.7.4 Container-Managed Persistence (CMP) 103129.7.5 Java Data Objects (JDO) 103529.7.6 Java Servlets 104029.7.7 JavaServer Pages 104129.7.8 Java Web Services 104229.8 Microsoftâs Web Platform 104329.8.1 Universal Data Access 104529.8.2 Active Server Pages and ActiveX Data Objects 104629.8.3 Remote Data Services 104929.8.4 Comparison of ASP and JSP 104929.8.5 Microsoft .NET 105029.8.6 Microsoft Web Services 105429.8.7 Microsoft Office Access and Web Page Generation 105429.9 Oracle Internet Platform 105529.9.1 Oracle Application Server (OracleAS) 1056Chapter 30 Semistructured Data and XML 106530.1 Semistructured Data 106630.1.1 Object Exchange Model (OEM) 106830.1.2 Lore and Lorel 106930.2 Introduction to XML 107330.2.1 Overview of XML 107630.2.2 Document Type Definitions (DTDs) 107830.3 XML-Related Technologies 108230.3.1 DOM and SAX Interfaces 108230.3.2 Namespaces 108330.3.3 XSL and XSLT 108430.3.4 XPath (XML Path Language) 108530.3.5 XPointer (XML Pointer Language) 108530.3.6 XLink (XML Linking Language) 108630.3.7 XHTML 108730.3.8 Simple Object Access Protocol (SOAP) 108730.3.9 Web Services Description Language (WSDL) 108830.3.10 Universal Discovery,Description and Integration (UDDI) 108830.4 XML Schema 109130.4.1 Resource Description Framework (RDF) 109830.5 XML Query Languages 110030.5.1 Extending Lore and Lorel to Handle XML 110030.5.2 XML Query Working Group 110130.5.3 XQuery â A Query Language for XML 110330.5.4 XML Information Set 111430.5.5 XQuery 1.0 and XPath 2.0 Data Model 111530.5.6 Formal Semantics 112130.6 XML and Databases 112830.6.1 Storing XML in Databases 112930.6.2 XML and SQL 113230.6.3 Native XML Databases 113730.7 XML in Oracle 1139Part 9 Business Intelligence 1147Chapter 31 Data Warehousing Concepts 114931.1 Introduction to Data Warehousing 115031.1.1 The Evolution of Data Warehousing 115031.1.2 Data Warehousing Concepts 115131.1.3 Benefits of Data Warehousing 115231.1.4 Comparison of OLTP Systems and Data Warehousing 115331.1.5 Problems of Data Warehousing 115431.2 Data Warehouse Architecture 115631.2.1 Operational Data 115631.2.2 Operational Data Store 115731.2.3 Load Manager 115831.2.4 Warehouse Manager 115831.2.5 Query Manager 115831.2.6 Detailed Data 115931.2.7 Lightly and Highly Summarized Data 115931.2.8 Archive/Backup Data 115931.2.9 Metadata 115931.2.10 End-User Access Tools 116031.3 Data Warehouse Data Flows 116131.3.1 Inflow 116231.3.2 Upflow 116331.3.3 Downflow 116431.3.4 Outflow 116431.3.5 Metaflow 116531.4 Data Warehousing Tools and Technologies 116531.4.1 Extraction,Cleansing,and Transformation Tools 116531.4.2 Data Warehouse DBMS 116631.4.3 Data Warehouse Metadata 116931.4.4 Administration and Management Tools 117131.5 Data Marts 117131.5.1 Reasons for Creating a Data Mart 117331.5.2 Data Marts Issues 117331.6 Data Warehousing Using Oracle 117531.6.1 Oracle9i 1175Chapter 32 Data Warehousing Design 118132.1 Designing a Data Warehouse Database 118232.2 Dimensionality Modeling 118332.2.1 Comparison of DM and ER models 118632.3 Database Design Methodology for Data Warehouses 118732.4 Criteria for Assessing the Dimensionality of a Data Warehouse 119532.5 Data Warehousing Design Using Oracle 119632.5.1 Oracle Warehouse Builder Components 119732.5.2 Using Oracle Warehouse Builder 1198Review Questions 1203Exercises 1203Chapter 33 OLAP 120433.1 Online Analytical Processing 120533.1.1 OLAP Benchmarks 120633.2 OLAP Applications 120633.2.1 OLAP Benefits 120833.3 Representation of Multi-Dimensional Data 120933.4 OLAP Tools 121133.4.1 Coddâs Rules for OLAP Tools 121133.4.2 Categories of OLAP Tools 121433.5 OLAP Extensions to the SQL Standard 121733.5.1 Extended Grouping Capabilities 121833.5.2 Elememtary OLAP Operators 122233.6 Oracle OLAP 122433.6.1 Oracle OLAP Environment 122533.6.2 Platform for Business Intelligence Applications 122533.6.3 Oracle9i Database 122633.6.4 Oracle OLAP 122833.6.5 Performance 122933.6.6 System Management 122933.6.7 System Requirements 1230Chapter 34 Data Mining 123234.1 Data Mining 123334.2 Data Mining Techniques 123334.2.1 Predictive Modeling 123534.2.2 Database Segmentation 123634.2.3 Link Analysis 123734.2.4 Deviation Detection 123834.3 The Data Mining Process 123934.3.1 The CRISP-DM Model 123934.4 Data Mining Tools 124134.5 Data Mining and Data Warehousing 124234.6 Oracle Data Mining (ODM) 124234.6.1 Data Mining Capabilities 124234.6.2 Enabling Data Mining Applications 124334.6.3 Predictions and Insights 124334.6.4 Oracle Data Mining Environment 1243A Usersâ Requirements Specification for DreamHome Case Study 1249A.1 Branch User Views of DreamHome 1249A.1.1 Data Requirements 1249A.1.2 Transaction Requirements (Sample) 1251A.2 Staff User Views of DreamHome 1252A.2.1 Data Requirements 1252A.2.2 Transaction Requirements (Sample) 1253B Other Case Studies 1255B.1 The University Accommodation Office Case Study 1255B.1.1 Data Requirements 1255B.1.2 Query Transactions (Sample) 1257B.2 The EasyDrive School of Motoring Case Study 1258B.2.1 Data Requirements 1258B.2.2 Query Transactions (Sample) 1259B.3 The Wellmeadows Hospital Case Study 1260B.3.1 Data Requirements 1260B.3.2 Transaction Requirements (Sample) 1266C File Organizations and Indexes (extended version on the Web site) 1268C.1 Basic Concepts 1269C.2 Unordered Files 1270C.3 Ordered Files 1271C.4 Hash Files 1272C.4.1 Dynamic Hashing 1275C.4.2 Limitations of Hashing 1276C.5 Indexes 1277C.5.1 Types of Index 1277C.5.2 Indexed Sequential Files 1278C.5.3 Secondary Indexes 1279C.5.4 Multilevel Indexes 1280C.5.5 B+-trees 1280C.5.6 Bitmap Indexes 1283C.5.7 Join Indexes 1284C.6 Clustered and Non-Clustered Tables 1286C.6.1 Indexed Clusters 1286C.6.2 Hash Clusters 1287C.7 Guidelines for Selecting File Organizations 1288D When is a DBMS Relational? 1293E Programmatic SQL (extended version on the Web site) 1298E.1 Embedded SQL 1299E.1.1 Simple Embedded SQL Statements 1299E.1.2 SQL Communications Area 1301E.1.3 Host Language Variables 1303E.1.4 Retrieving Data Using Embedded SQL and Cursors 1304E.1.5 Using Cursors to Modify Data 1310E.1.6 ISO Standard for Embedded SQL 1311E.2 Dynamic SQL 1312E.3 The Open Database Connectivity (ODBC) Standard 1313E.3.1 The ODBC Architecture 1314E.3.2 ODBC Conformance Levels 1315F Alternative ER Modeling Notations 1320F.1 ER Modeling Using the Chen Notation 1320F.2 ER Modeling Using the Crowâs Feet Notation 1320H Estimating Disk space Requirements On Web siteI Sample Web Scripts On Web site