Search Through Systematic Set Enumeration

Total Page:16

File Type:pdf, Size:1020Kb

Search Through Systematic Set Enumeration View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by ScholarlyCommons@Penn University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science August 1992 Search Through Systematic Set Enumeration Ron Rymon University of Pennsylvania Follow this and additional works at: https://repository.upenn.edu/cis_reports Recommended Citation Ron Rymon, " Search Through Systematic Set Enumeration", . August 1992. University of Pennsylvania Department of Computer and Information Science Technical Report No. MS-CIS-92-66. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/cis_reports/297 For more information, please contact [email protected]. Search Through Systematic Set Enumeration Abstract In many problem domains, solutions take the form of unordered sets. We present the Set-Enumerations (SE)-tree - a vehicle for representing sets and/or enumerating them in a best-first fashion. eW demonstrate its usefulness as the basis for a unifying search-based framework for domains where minimal (maximal) elements of a power set are targeted, where minimal (maximal) partial instantiations of a set of variables are sought, or where a composite decision is not dependent on the order in which its primitive component-decisions are taken. Particular instantiations of SE-tree-based algorithms for some AI problem domains are used to demonstrate the general features of the approach. These algorithms are compared theoretically and empirically with current algorithms. Comments University of Pennsylvania Department of Computer and Information Science Technical Report No. MS- CIS-92-66. This technical report is available at ScholarlyCommons: https://repository.upenn.edu/cis_reports/297 Search Through Systematic Set Enumeration MS-CIS-92-66 LINC LAB 234 Ron Rymon University of Pennsylvania School of Engineering and Applied Science Computer and Information Science Department Philadelphia, PA 19104-6389 August 1992 Search through Systematic Set Enumeration Ron Rymon* Department of Computer and Information Science University of Pennsylvania Philadelphia, PA 19104 In Proceedings KR-92, Cambridge HA, October 1992 Abstract More generally, variables can be instantiated from an arbitrary domain. In many problem domains, solutions take the Researchers in Artificial Intelligence (AI) have also form of unordered sets. We present the Set- made use of such abstract problems in their models. Enumeration (SE)-tree - a vehicle for repre- The HS problem, for example, was used by [Reiter 871 senting sets and/or enumerating them in a in his formalization of diagnosis. In a newer character- best-first fashion. We demonstrate its use- ization, diagnoses are viewed as partial assignments of fulness as the basis for a unifying search- state to components [de Kleer et al. 901. Many other based framework for domains where minimal A1 problems are, or could be, formulated so as to ad- (maximal) elements of a power set are tar- mit sets as solutions. geted, where minimal (maximal) partial in- stantiations of a set of variables are sought, Our goal in introducing the Set-Enumeration (SE)-tree or where a composite decision is not de- is to provide a unified search-based framework for solv- pendent on the order in which its primitive ing such problems, albeit their problem-independent component-decisions are taken. Particular solution criteria. SE-tree-based algorithms for differ- instantiations of SE-tree-based algorithms for ent problems will share their skeletal structure, but some A1 problem domains are used to demon- will each use additional domain-specific tactics. Fur- strate the general features of the approach. thermore, at a certain level of abstraction, even those These algorithms are compared theoretically tactics are general and can be shared across domains. and empirically with current algoritlims. General tactics identified here include pruning rules which exploit the SE-tree structure, exploration poli- cies, and problem decomposition methods. Incremen- 1 INTRODUCTION tal versions of SE-tree-based algorithms can be con- structed for some problem domains. In what follows, Many computer science problems admit solutions we use particular instantiations of SE-tree-based al- which are elements of a given power-set. Typically, gorithms to demonstrate the general features of the such sets are required to satisfy some problem-specific approach. criterion which designates them as solutions. In Consistency-based formulations of diagnosis will serve many cases, such criteria either include, or are aug- as a working example for most of this paper. Section 2 mented with, some minimality/maximality require- begins with a formal description of the basic SE-tree. ment. Consider, for example, the Hitting-Set (HS) Section 3 presents an SE-tree-based hitting-sets alge problem [Karp 721. Given a collection of sets, solu- rithm (SE-HS) for Reiter's original formulation. Being tions are required to have a non-empty intersection best-first, it can use any of a number of exploration with each member of the collection. In applications policies. This algorithm is first contrasted, as is, with of the HS problem, solutions are typically interesting the original algorithm. The SE-tree structure is then minimal with respect to set inclusion. In a more gen- used to improve SEHS by pruning away unpromis- eral class of ~roblems.solutions are ~artialinstantia- ing parts of the search space. We conclude with an tions of a sed of variables. A hitting-set, for example, empirical comparison of the two algorithms. can also be described as a membership-based mapping from the underlying set of primitive elements to {O,l). In Section 4, we extend the SE-tree to fit the more gen- eral class of problems, where solutions take the form 'Address for correspondence: Ron Rymon, Computer of partially instantiated sets of variables. Section 5 and Information Science, Room 423C, 3401 Walnut Street, a Philadelphia PA 19104, e-mail: [email protected]. presents an extended version of SE-HS for newer characterization of diagnoses [de Kleer et al. 901. Al- though derived from a very general search framework, this algorithm corresponds to a prime implicate gen- eration algorithm proposed by [Slagle et al. 701, and is empirically shown to perform quite well compared to a recent algorithm [Ngair 921. Unlike Slagle et al.'s algorithm, the extended SE-HS can work under diag- nostic theories with multiple fault modes, can use a variety of exploration policies for focusing purposes, and has an incremental version. Furthermore, we sub- sequently augment it with a problem decomposition tactic, thereby obtaining an improved version of Slagle et a1.k algorithm. Finally, we briefly review potential use of the SE-tree in abductive diagnostic frameworks. Figure 1: SE-tree for P({l,2,3,4)) In Section 6, we contrast features of the SE-tree with decision trees in the context of learning classification rules from examples. For lack of space, the scope of Notice also that the SE-tree can be used as a data this study is very limited and the reader is referred to structure for caching unordered sets, and as an ef- [Rymon 92b] for a more detailed analysis and empiri- fective means of checking whether a new set is sub- cal evaluation. sumed by any of those already cached. [de Kleer 921 has made such use of an SE-tree and reports significant 2 THE BASIC SE-TREE improvements in run-time. As a caching device, the SEtree is a special case of Knuth's trie data structure [Knuth 731, originally offered for ordered sets. While The Set-Enumeration (SE)-tree is a vehicle for repre- we too use the SE-tree for caching solutions and for senting and/or enumerating sets in a best-first fash- subsumption checking, our main objective in this pa- ion. The complete SEtree systematically enumerates per is its use in a search framework. elements of a power-set using a pre-imposed order on the underlying set of elements. In problems where the search space is a subset of that power-set that is (or 3 AN SE-TREE-BASED can be) closed under set-inclusion, the SE-tree induces a complete irredundant search technique. Let E be the HITTING-SET ALGORITHM underlying set of elements. We first index E's elements using a one-bone function ind : E + W. Then, given In this section, we demonstrate the use of the ba- any subset SGE, we define its SE-tree view: sic SE-tree structure for a hitting-set algorithm in the context of Reiter's theory of diagnosis. We open Definition 2.1 A Node's View with a brief introduction of Reiter's theory, to the point in which a hitting-set problem is formulated. An SE-tree-based algorithm (SE-HS) is then con- trasted with the dag-based algorithm proposed by Definition 2.2 A Basic Set Enumeration Tree [Reiter 87, Greiner et al. 891 to show that a large num- ber of calls to a subsumption checking procedure can Let F be a collection of sets that is closed under C be saved. Then, the SE-tree systematicity allows im- (i.e. for every SEF, if S'CS then S'EF). T is a Set proving SE-HS via a domain-specific pruning rule. Enumeration tree for F i$: Empirical comparison of the improved SE-HS with the dag-based implementation of [Greiner et al. 891 sup- 1. The mot of T is labeled by the empty set; ports our claims. 2. The children of a node labeled S in T are { S U{e} E F I eE View(ind,S) ). 3.1 REITER'S THEORY OF DIAGNOSIS Figure 1 illustrates an SE-tree for the complete power- Reiter's theory of diagnosis [Reiter 871 is among the set of {1,2,3,4). Note that restricting a node's ex- the most widely referenced logic-based approaches to pansion to its View, ensures that every set is uniquely model-based diagnosis.
Recommended publications
  • Calibrating Determinacy Strength in Levels of the Borel Hierarchy
    CALIBRATING DETERMINACY STRENGTH IN LEVELS OF THE BOREL HIERARCHY SHERWOOD J. HACHTMAN Abstract. We analyze the set-theoretic strength of determinacy for levels of the Borel 0 hierarchy of the form Σ1+α+3, for α < !1. Well-known results of H. Friedman and D.A. Martin have shown this determinacy to require α+1 iterations of the Power Set Axiom, but we ask what additional ambient set theory is strictly necessary. To this end, we isolate a family of Π1-reflection principles, Π1-RAPα, whose consistency strength corresponds 0 CK exactly to that of Σ1+α+3-Determinacy, for α < !1 . This yields a characterization of the levels of L by or at which winning strategies in these games must be constructed. When α = 0, we have the following concise result: the least θ so that all winning strategies 0 in Σ4 games belong to Lθ+1 is the least so that Lθ j= \P(!) exists + all wellfounded trees are ranked". x1. Introduction. Given a set A ⊆ !! of sequences of natural numbers, consider a game, G(A), where two players, I and II, take turns picking elements of a sequence hx0; x1; x2;::: i of naturals. Player I wins the game if the sequence obtained belongs to A; otherwise, II wins. For a collection Γ of subsets of !!, Γ determinacy, which we abbreviate Γ-DET, is the statement that for every A 2 Γ, one of the players has a winning strategy in G(A). It is a much-studied phenomenon that Γ -DET has mathematical strength: the bigger the pointclass Γ, the stronger the theory required to prove Γ -DET.
    [Show full text]
  • A Proof of Cantor's Theorem
    Cantor’s Theorem Joe Roussos 1 Preliminary ideas Two sets have the same number of elements (are equinumerous, or have the same cardinality) iff there is a bijection between the two sets. Mappings: A mapping, or function, is a rule that associates elements of one set with elements of another set. We write this f : X ! Y , f is called the function/mapping, the set X is called the domain, and Y is called the codomain. We specify what the rule is by writing f(x) = y or f : x 7! y. e.g. X = f1; 2; 3g;Y = f2; 4; 6g, the map f(x) = 2x associates each element x 2 X with the element in Y that is double it. A bijection is a mapping that is injective and surjective.1 • Injective (one-to-one): A function is injective if it takes each element of the do- main onto at most one element of the codomain. It never maps more than one element in the domain onto the same element in the codomain. Formally, if f is a function between set X and set Y , then f is injective iff 8a; b 2 X; f(a) = f(b) ! a = b • Surjective (onto): A function is surjective if it maps something onto every element of the codomain. It can map more than one thing onto the same element in the codomain, but it needs to hit everything in the codomain. Formally, if f is a function between set X and set Y , then f is surjective iff 8y 2 Y; 9x 2 X; f(x) = y Figure 1: Injective map.
    [Show full text]
  • 1 Elementary Set Theory
    1 Elementary Set Theory Notation: fg enclose a set. f1; 2; 3g = f3; 2; 2; 1; 3g because a set is not defined by order or multiplicity. f0; 2; 4;:::g = fxjx is an even natural numberg because two ways of writing a set are equivalent. ; is the empty set. x 2 A denotes x is an element of A. N = f0; 1; 2;:::g are the natural numbers. Z = f:::; −2; −1; 0; 1; 2;:::g are the integers. m Q = f n jm; n 2 Z and n 6= 0g are the rational numbers. R are the real numbers. Axiom 1.1. Axiom of Extensionality Let A; B be sets. If (8x)x 2 A iff x 2 B then A = B. Definition 1.1 (Subset). Let A; B be sets. Then A is a subset of B, written A ⊆ B iff (8x) if x 2 A then x 2 B. Theorem 1.1. If A ⊆ B and B ⊆ A then A = B. Proof. Let x be arbitrary. Because A ⊆ B if x 2 A then x 2 B Because B ⊆ A if x 2 B then x 2 A Hence, x 2 A iff x 2 B, thus A = B. Definition 1.2 (Union). Let A; B be sets. The Union A [ B of A and B is defined by x 2 A [ B if x 2 A or x 2 B. Theorem 1.2. A [ (B [ C) = (A [ B) [ C Proof. Let x be arbitrary. x 2 A [ (B [ C) iff x 2 A or x 2 B [ C iff x 2 A or (x 2 B or x 2 C) iff x 2 A or x 2 B or x 2 C iff (x 2 A or x 2 B) or x 2 C iff x 2 A [ B or x 2 C iff x 2 (A [ B) [ C Definition 1.3 (Intersection).
    [Show full text]
  • The Matroid Theorem We First Review Our Definitions: a Subset System Is A
    CMPSCI611: The Matroid Theorem Lecture 5 We first review our definitions: A subset system is a set E together with a set of subsets of E, called I, such that I is closed under inclusion. This means that if X ⊆ Y and Y ∈ I, then X ∈ I. The optimization problem for a subset system (E, I) has as input a positive weight for each element of E. Its output is a set X ∈ I such that X has at least as much total weight as any other set in I. A subset system is a matroid if it satisfies the exchange property: If i and i0 are sets in I and i has fewer elements than i0, then there exists an element e ∈ i0 \ i such that i ∪ {e} ∈ I. 1 The Generic Greedy Algorithm Given any finite subset system (E, I), we find a set in I as follows: • Set X to ∅. • Sort the elements of E by weight, heaviest first. • For each element of E in this order, add it to X iff the result is in I. • Return X. Today we prove: Theorem: For any subset system (E, I), the greedy al- gorithm solves the optimization problem for (E, I) if and only if (E, I) is a matroid. 2 Theorem: For any subset system (E, I), the greedy al- gorithm solves the optimization problem for (E, I) if and only if (E, I) is a matroid. Proof: We will show first that if (E, I) is a matroid, then the greedy algorithm is correct. Assume that (E, I) satisfies the exchange property.
    [Show full text]
  • Primitive Recursive Functions Are Recursively Enumerable
    AN ENUMERATION OF THE PRIMITIVE RECURSIVE FUNCTIONS WITHOUT REPETITION SHIH-CHAO LIU (Received April 15,1900) In a theorem and its corollary [1] Friedberg gave an enumeration of all the recursively enumerable sets without repetition and an enumeration of all the partial recursive functions without repetition. This note is to prove a similar theorem for the primitive recursive functions. The proof is only a classical one. We shall show that the theorem is intuitionistically unprovable in the sense of Kleene [2]. For similar reason the theorem by Friedberg is also intuitionistical- ly unprovable, which is not stated in his paper. THEOREM. There is a general recursive function ψ(n, a) such that the sequence ψ(0, a), ψ(l, α), is an enumeration of all the primitive recursive functions of one variable without repetition. PROOF. Let φ(n9 a) be an enumerating function of all the primitive recursive functions of one variable, (See [3].) We define a general recursive function v(a) as follows. v(0) = 0, v(n + 1) = μy, where μy is the least y such that for each j < n + 1, φ(y, a) =[= φ(v(j), a) for some a < n + 1. It is noted that the value v(n + 1) can be found by a constructive method, for obviously there exists some number y such that the primitive recursive function <p(y> a) takes a value greater than all the numbers φ(v(0), 0), φ(y(Ϋ), 0), , φ(v(n\ 0) f or a = 0 Put ψ(n, a) = φ{v{n), a).
    [Show full text]
  • Power Sets Math 12, Veritas Prep
    Power Sets Math 12, Veritas Prep. The power set P (X) of a set X is the set of all subsets of X. Defined formally, P (X) = fK j K ⊆ Xg (i.e., the set of all K such that K is a subset of X). Let me give an example. Suppose it's Thursday night, and I want to go to a movie. And suppose that I know that each of the upper-campus Latin teachers|Sullivan, Joyner, and Pagani|are free that night. So I consider asking one of them if they want to join me. Conceivably, then: • I could go to the movie by myself (i.e., I could bring along none of the Latin faculty) • I could go to the movie with Sullivan • I could go to the movie with Joyner • I could go to the movie with Pagani • I could go to the movie with Sullivan and Joyner • I could go to the movie with Sullivan and Pagani • I could go to the movie with Pagani and Joyner • or I could go to the movie with all three of them Put differently, my choices for whom to go to the movie with make up the following set: fg; fSullivang; fJoynerg; fPaganig; fSullivan, Joynerg; fSullivan, Paganig; fPagani, Joynerg; fSullivan, Joyner, Paganig Or if I use my notation for the empty set: ;; fSullivang; fJoynerg; fPaganig; fSullivan, Joynerg; fSullivan, Paganig; fPagani, Joynerg; fSullivan, Joyner, Paganig This set|the set of whom I might bring to the movie|is the power set of the set of Latin faculty. It is the set of all the possible subsets of the set of Latin faculty.
    [Show full text]
  • Polya Enumeration Theorem
    Polya Enumeration Theorem Sasha Patotski Cornell University [email protected] December 11, 2015 Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 1 / 10 Cosets A left coset of H in G is gH where g 2 G (H is on the right). A right coset of H in G is Hg where g 2 G (H is on the left). Theorem If two left cosets of H in G intersect, then they coincide, and similarly for right cosets. Thus, G is a disjoint union of left cosets of H and also a disjoint union of right cosets of H. Corollary(Lagrange's theorem) If G is a finite group and H is a subgroup of G, then the order of H divides the order of G. In particular, the order of every element of G divides the order of G. Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 2 / 10 Applications of Lagrange's Theorem Theorem n! For any integers n ≥ 0 and 0 ≤ m ≤ n, the number m!(n−m)! is an integer. Theorem (ab)! (ab)! For any positive integers a; b the ratios (a!)b and (a!)bb! are integers. Theorem For an integer m > 1 let '(m) be the number of invertible numbers modulo m. For m ≥ 3 the number '(m) is even. Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 3 / 10 Polya's Enumeration Theorem Theorem Suppose that a finite group G acts on a finite set X . Then the number of colorings of X in n colors inequivalent under the action of G is 1 X N(n) = nc(g) jGj g2G where c(g) is the number of cycles of g as a permutation of X .
    [Show full text]
  • Enumeration of Finite Automata 1 Z(A) = 1
    INFOI~MATION AND CONTROL 10, 499-508 (1967) Enumeration of Finite Automata 1 FRANK HARARY AND ED PALMER Department of Mathematics, University of Michigan, Ann Arbor, Michigan Harary ( 1960, 1964), in a survey of 27 unsolved problems in graphical enumeration, asked for the number of different finite automata. Re- cently, Harrison (1965) solved this problem, but without considering automata with initial and final states. With the aid of the Power Group Enumeration Theorem (Harary and Palmer, 1965, 1966) the entire problem can be handled routinely. The method involves a confrontation of several different operations on permutation groups. To set the stage, we enumerate ordered pairs of functions with respect to the product of two power groups. Finite automata are then concisely defined as certain ordered pah's of functions. We review the enumeration of automata in the natural setting of the power group, and then extend this result to enumerate automata with initial and terminal states. I. ENUMERATION THEOREM For completeness we require a number of definitions, which are now given. Let A be a permutation group of order m = ]A I and degree d acting on the set X = Ix1, x~, -.. , xa}. The cycle index of A, denoted Z(A), is defined as follows. Let jk(a) be the number of cycles of length k in the disjoint cycle decomposition of any permutation a in A. Let al, a2, ... , aa be variables. Then the cycle index, which is a poly- nomial in the variables a~, is given by d Z(A) = 1_ ~ H ~,~(°~ . (1) ~$ a EA k=l We sometimes write Z(A; al, as, ..
    [Show full text]
  • The Axiom of Choice and Its Implications
    THE AXIOM OF CHOICE AND ITS IMPLICATIONS KEVIN BARNUM Abstract. In this paper we will look at the Axiom of Choice and some of the various implications it has. These implications include a number of equivalent statements, and also some less accepted ideas. The proofs discussed will give us an idea of why the Axiom of Choice is so powerful, but also so controversial. Contents 1. Introduction 1 2. The Axiom of Choice and Its Equivalents 1 2.1. The Axiom of Choice and its Well-known Equivalents 1 2.2. Some Other Less Well-known Equivalents of the Axiom of Choice 3 3. Applications of the Axiom of Choice 5 3.1. Equivalence Between The Axiom of Choice and the Claim that Every Vector Space has a Basis 5 3.2. Some More Applications of the Axiom of Choice 6 4. Controversial Results 10 Acknowledgments 11 References 11 1. Introduction The Axiom of Choice states that for any family of nonempty disjoint sets, there exists a set that consists of exactly one element from each element of the family. It seems strange at first that such an innocuous sounding idea can be so powerful and controversial, but it certainly is both. To understand why, we will start by looking at some statements that are equivalent to the axiom of choice. Many of these equivalences are very useful, and we devote much time to one, namely, that every vector space has a basis. We go on from there to see a few more applications of the Axiom of Choice and its equivalents, and finish by looking at some of the reasons why the Axiom of Choice is so controversial.
    [Show full text]
  • 17 Axiom of Choice
    Math 361 Axiom of Choice 17 Axiom of Choice De¯nition 17.1. Let be a nonempty set of nonempty sets. Then a choice function for is a function f sucFh that f(S) S for all S . F 2 2 F Example 17.2. Let = (N)r . Then we can de¯ne a choice function f by F P f;g f(S) = the least element of S: Example 17.3. Let = (Z)r . Then we can de¯ne a choice function f by F P f;g f(S) = ²n where n = min z z S and, if n = 0, ² = min z= z z = n; z S . fj j j 2 g 6 f j j j j j 2 g Example 17.4. Let = (Q)r . Then we can de¯ne a choice function f as follows. F P f;g Let g : Q N be an injection. Then ! f(S) = q where g(q) = min g(r) r S . f j 2 g Example 17.5. Let = (R)r . Then it is impossible to explicitly de¯ne a choice function for . F P f;g F Axiom 17.6 (Axiom of Choice (AC)). For every set of nonempty sets, there exists a function f such that f(S) S for all S . F 2 2 F We say that f is a choice function for . F Theorem 17.7 (AC). If A; B are non-empty sets, then the following are equivalent: (a) A B ¹ (b) There exists a surjection g : B A. ! Proof. (a) (b) Suppose that A B.
    [Show full text]
  • Formal Construction of a Set Theory in Coq
    Saarland University Faculty of Natural Sciences and Technology I Department of Computer Science Masters Thesis Formal Construction of a Set Theory in Coq submitted by Jonas Kaiser on November 23, 2012 Supervisor Prof. Dr. Gert Smolka Advisor Dr. Chad E. Brown Reviewers Prof. Dr. Gert Smolka Dr. Chad E. Brown Eidesstattliche Erklarung¨ Ich erklare¨ hiermit an Eides Statt, dass ich die vorliegende Arbeit selbststandig¨ verfasst und keine anderen als die angegebenen Quellen und Hilfsmittel verwendet habe. Statement in Lieu of an Oath I hereby confirm that I have written this thesis on my own and that I have not used any other media or materials than the ones referred to in this thesis. Einverstandniserkl¨ arung¨ Ich bin damit einverstanden, dass meine (bestandene) Arbeit in beiden Versionen in die Bibliothek der Informatik aufgenommen und damit vero¨ffentlicht wird. Declaration of Consent I agree to make both versions of my thesis (with a passing grade) accessible to the public by having them added to the library of the Computer Science Department. Saarbrucken,¨ (Datum/Date) (Unterschrift/Signature) iii Acknowledgements First of all I would like to express my sincerest gratitude towards my advisor, Chad Brown, who supported me throughout this work. His extensive knowledge and insights opened my eyes to the beauty of axiomatic set theory and foundational mathematics. We spent many hours discussing the minute details of the various constructions and he taught me the importance of mathematical rigour. Equally important was the support of my supervisor, Prof. Smolka, who first introduced me to the topic and was there whenever a question arose.
    [Show full text]
  • Composite Subset Measures
    Composite Subset Measures Lei Chen1, Raghu Ramakrishnan1,2, Paul Barford1, Bee-Chung Chen1, Vinod Yegneswaran1 1 Computer Sciences Department, University of Wisconsin, Madison, WI, USA 2 Yahoo! Research, Santa Clara, CA, USA {chenl, pb, beechung, vinod}@cs.wisc.edu [email protected] ABSTRACT into a hierarchy, leading to a very natural notion of multidimen- Measures are numeric summaries of a collection of data records sional regions. Each region represents a data subset. Summarizing produced by applying aggregation functions. Summarizing a col- the records that belong to a region by applying an aggregate opera- lection of subsets of a large dataset, by computing a measure for tor, such as SUM, to a measure attribute (thereby computing a new each subset in the (typically, user-specified) collection is a funda- measure that is associated with the entire region) is a fundamental mental problem. The multidimensional data model, which treats operation in OLAP. records as points in a space defined by dimension attributes, offers Often, however, more sophisticated analysis can be carried out a natural space of data subsets to be considered as summarization based on the computed measures, e.g., identifying regions with candidates, and traditional SQL and OLAP constructs, such as abnormally high measures. For such analyses, it is necessary to GROUP BY and CUBE, allow us to compute measures for subsets compute the measure for a region by also considering other re- drawn from this space. However, GROUP BY only allows us to gions (which are, intuitively, “related” to the given region) and summarize a limited collection of subsets, and CUBE summarizes their measures.
    [Show full text]