Αρχεία και Βάσεις Δεδομένων

Σχετικά έγγραφα
Transaction Management

Physical DB Design. B-Trees Index files can become quite large for large main files Indices on index files are possible.

Μηχανική Μάθηση Hypothesis Testing

ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ. Ψηφιακή Οικονομία. Διάλεξη 7η: Consumer Behavior Mαρίνα Μπιτσάκη Τμήμα Επιστήμης Υπολογιστών

ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ. Ψηφιακή Οικονομία. Διάλεξη 10η: Basics of Game Theory part 2 Mαρίνα Μπιτσάκη Τμήμα Επιστήμης Υπολογιστών

Ψηφιακή Οικονομία. Διάλεξη 11η: Markets and Strategic Interaction in Networks Mαρίνα Μπιτσάκη Τμήμα Επιστήμης Υπολογιστών

Συστήματα Διαχείρισης Βάσεων Δεδομένων

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 6/5/2006

EE512: Error Control Coding

Πανεπιστήμιο Κρήτης, Τμήμα Επιστήμης Υπολογιστών. Δημήτρης Πλεξουσάκης. Physical DB Design

Αρχεία και Βάσεις Δεδομένων

ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ. Ψηφιακή Οικονομία. Διάλεξη 8η: Producer Behavior Mαρίνα Μπιτσάκη Τμήμα Επιστήμης Υπολογιστών

Locking to ensure serializability

ΕΠΙΧΕΙΡΗΣΙΑΚΗ ΑΛΛΗΛΟΓΡΑΦΙΑ ΚΑΙ ΕΠΙΚΟΙΝΩΝΙΑ ΣΤΗΝ ΑΓΓΛΙΚΗ ΓΛΩΣΣΑ

Homework 3 Solutions

Block Ciphers Modes. Ramki Thurimella

ΕΠΙΧΕΙΡΗΣΙΑΚΗ ΑΛΛΗΛΟΓΡΑΦΙΑ ΚΑΙ ΕΠΙΚΟΙΝΩΝΙΑ ΣΤΗΝ ΑΓΓΛΙΚΗ ΓΛΩΣΣΑ

ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ

ΕΠΙΧΕΙΡΗΣΙΑΚΗ ΑΛΛΗΛΟΓΡΑΦΙΑ ΚΑΙ ΕΠΙΚΟΙΝΩΝΙΑ ΣΤΗΝ ΑΓΓΛΙΚΗ ΓΛΩΣΣΑ

2 Composition. Invertible Mappings

Instruction Execution Times

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 19/5/2007

Phys460.nb Solution for the t-dependent Schrodinger s equation How did we find the solution? (not required)

HOMEWORK 4 = G. In order to plot the stress versus the stretch we define a normalized stretch:

ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ. Ψηφιακή Οικονομία. Διάλεξη 13η: Multi-Object Auctions Mαρίνα Μπιτσάκη Τμήμα Επιστήμης Υπολογιστών

Αρχεία και Βάσεις Δεδομένων

CHAPTER 25 SOLVING EQUATIONS BY ITERATIVE METHODS

ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ. Ψηφιακή Οικονομία. Διάλεξη 9η: Basics of Game Theory Mαρίνα Μπιτσάκη Τμήμα Επιστήμης Υπολογιστών

Ιστορία νεότερων Μαθηματικών

Finite Field Problems: Solutions

Ordinal Arithmetic: Addition, Multiplication, Exponentiation and Limit

Morphologie. Beispiel 1: Inuit Grammar. Dr. Chris0na Alexandris Na0onale Universität Athen Deutsche Sprache und Literatur

Concrete Mathematics Exercises from 30 September 2016

The challenges of non-stable predicates

ΟΡΟΛΟΓΙΑ -ΞΕΝΗ ΓΛΩΣΣΑ

Αλγόριθμοι και πολυπλοκότητα NP-Completeness (2)

C.S. 430 Assignment 6, Sample Solutions

Other Test Constructions: Likelihood Ratio & Bayes Tests

Matrices and Determinants

derivation of the Laplacian from rectangular to spherical coordinates

Démographie spatiale/spatial Demography

Section 8.3 Trigonometric Equations

ω ω ω ω ω ω+2 ω ω+2 + ω ω ω ω+2 + ω ω+1 ω ω+2 2 ω ω ω ω ω ω ω ω+1 ω ω2 ω ω2 + ω ω ω2 + ω ω ω ω2 + ω ω+1 ω ω2 + ω ω+1 + ω ω ω ω2 + ω

Assalamu `alaikum wr. wb.

The Simply Typed Lambda Calculus

Συστήματα Διαχείρισης Βάσεων Δεδομένων

Example Sheet 3 Solutions

Διοικητική Λογιστική

ΕΠΙΧΕΙΡΗΣΙΑΚΗ ΑΛΛΗΛΟΓΡΑΦΙΑ ΚΑΙ ΕΠΙΚΟΙΝΩΝΙΑ ΣΤΗΝ ΑΓΓΛΙΚΗ ΓΛΩΣΣΑ

Main source: "Discrete-time systems and computer control" by Α. ΣΚΟΔΡΑΣ ΨΗΦΙΑΚΟΣ ΕΛΕΓΧΟΣ ΔΙΑΛΕΞΗ 4 ΔΙΑΦΑΝΕΙΑ 1

Every set of first-order formulas is equivalent to an independent set

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 11/3/2006

1 η Διάλεξη. Ενδεικτικές λύσεις ασκήσεων

ΚΥΠΡΙΑΚΟΣ ΣΥΝΔΕΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY 21 ος ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ Δεύτερος Γύρος - 30 Μαρτίου 2011

ST5224: Advanced Statistical Theory II

Θερμοδυναμική. Ανοικτά Ακαδημαϊκά Μαθήματα. Πίνακες Νερού σε κατάσταση Κορεσμού. Γεώργιος Κ. Χατζηκωνσταντής Επίκουρος Καθηγητής

European Human Rights Law

Ευρετήρια. Βάσεις Δεδομένων. Διδάσκων: Μαρία Χαλκίδη

EPL 603 TOPICS IN SOFTWARE ENGINEERING. Lab 5: Component Adaptation Environment (COPE)

Econ 2110: Fall 2008 Suggested Solutions to Problem Set 8 questions or comments to Dan Fetter 1

department listing department name αχχουντσ ϕανε βαλικτ δδσϕηασδδη σδηφγ ασκϕηλκ τεχηνιχαλ αλαν ϕουν διξ τεχηνιχαλ ϕοην µαριανι

(C) 2010 Pearson Education, Inc. All rights reserved.

Ενδεικτικές λύσεις ασκήσεων διαχείρισης έργου υπό συνθήκες αβεβαιότητας

Modbus basic setup notes for IO-Link AL1xxx Master Block

Ενότητα. Εισαγωγή στις βάσεις δεδομένων

3.4 SUM AND DIFFERENCE FORMULAS. NOTE: cos(α+β) cos α + cos β cos(α-β) cos α -cos β

Approximation of distance between locations on earth given by latitude and longitude

Πρόβλημα 1: Αναζήτηση Ελάχιστης/Μέγιστης Τιμής

6.1. Dirac Equation. Hamiltonian. Dirac Eq.

Lecture 2. Soundness and completeness of propositional logic

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 24/3/2007

Εισαγωγή στους Αλγορίθμους

PARTIAL NOTES for 6.1 Trigonometric Identities

Capacitors - Capacitance, Charge and Potential Difference

Δομές Δεδομένων Ενότητα 3

Λογιστική Κόστους Ενότητα 12: Λογισμός Κόστους (2)

Μαθηματικά Διοικητικών & Οικονομικών Επιστημών

Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων. Εξάμηνο 7 ο

ΟΡΟΛΟΓΙΑ -ΞΕΝΗ ΓΛΩΣΣΑ

Math 6 SL Probability Distributions Practice Test Mark Scheme

Αρχιτεκτονική Υπολογιστών

Inverse trigonometric functions & General Solution of Trigonometric Equations

Statistical Inference I Locally most powerful tests

5.4 The Poisson Distribution.

Ανοικτά Ακαδημαϊκά Μαθήματα στο ΤΕΙ Αθήνας. Βιοστατιστική (Ε) Ενότητα 3: Έλεγχοι στατιστικών υποθέσεων

Ανοικτά Ακαδημαϊκά Μαθήματα στο ΤΕΙ Αθήνας. Βιοστατιστική (Ε) Ενότητα 1: Καταχώρηση δεδομένων

the total number of electrons passing through the lamp.

Συντακτικές λειτουργίες

Εισαγωγή στους Αλγορίθμους

Ανάκτηση Πληροφορίας

ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ. Δομές Δεδομένων. Ιωάννης Γ. Τόλλης Τμήμα Επιστήμης Υπολογιστών Πανεπιστήμιο Κρήτης

Ανοικτά Ακαδημαϊκά Μαθήματα στο ΤΕΙ Αθήνας. Βιοστατιστική (Ε) Ενότητα 2: Περιγραφική στατιστική

Υλοποίηση Δικτυακών Υποδομών και Υπηρεσιών: OSPF Cost

Business English. Ενότητα # 9: Financial Planning. Ευαγγελία Κουτσογιάννη Τμήμα Διοίκησης Επιχειρήσεων

Αλγόριθμοι και πολυπλοκότητα Bucket-Sort και Radix-Sort

ANSWERSHEET (TOPIC = DIFFERENTIAL CALCULUS) COLLECTION #2. h 0 h h 0 h h 0 ( ) g k = g 0 + g 1 + g g 2009 =?

Τίτλος Μαθήματος: Μαθηματική Ανάλυση Ενότητα Γ. Ολοκληρωτικός Λογισμός

Tridiagonal matrices. Gérard MEURANT. October, 2008

Bounding Nonsplitting Enumeration Degrees

9.09. # 1. Area inside the oval limaçon r = cos θ. To graph, start with θ = 0 so r = 6. Compute dr

Transcript:

ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ Αρχεία και Βάσεις Δεδομένων Διάλεξη 17η: Διαχείριση Δοσοληψιών Μέρος 3ο - Φυσική Οργάνωση Δεδομένων Τμήμα Επιστήμης Υπολογιστών

Transaction Management Tree Protocols In many instances, the set of items accessed by a transaction can be viewed naturally as a tree or forest E.g., items are nodes in a B-tree; items have different granularities (relations, tuples, attributes). Two different policies may be followed: 1. each node in the tree is locked independently of its descendants 2. a lock on an item implies a lock on all of its descendants The latter policy saves time by avoiding locking many items separately E.g., when the content of an entire relation needs to be read, the relation can be locked in one step instead of locking each tuple individually 2

Transaction Management Tree Protocol #1 (TP1) Definition: A transaction obeys the TP1 policy if: except for the first item locked, no item can be locked unless the transaction holds a lock on the item s parent no item is ever locked twice by a transaction A schedule obeys the TP1 policy if every transaction in the schedule obeys it. Example: Consider the following hierarchy of items A B C D E F G 3

Transaction Management The following schedule obeys TP1 T 1 L 1 (A) L 1 (B) L 1 (D) U 1 (B) L 1 (C) U 1 (D) T 2 L 2 (B) T 3 L 3 (E) L 3 (F) T 1 U 1 (A) U 1 (C) T 2 L 2 (E) U 2 (B) U 2 (E) T 3 L 3 (G) U 3 (E) U 3 (F) U 3 (G) Does it obey 2PL? 4

Transaction Management Note: A transaction that obeys TP1 need not necessarily obey 2PL. Theorem: Every legal schedule that obeys the protocol TP1 is serializable Example: The schedule of the previous example is serializable. its precedence graph is acyclic T1 T2 T3 5

Transaction Management Tree Protocol #2 (TP2) Definition: A transaction obeys the TP2 policy if whenever an item is locked, all its descendants are locked Indiscriminate locking under TP2 may result in schedules where two transactions hold a lock on the same item at the same time. Example: in the hierarchy A B C D E transaction T 1 locks E (therefore F,G). Then T 2 locks B, therefore acquires conflicting locks on E,F,G. F G 6

Transaction Management To avoid conflicts of this sort, the warning protocol may be followed: a transaction cannot place a lock on an item unless it first places a warning on all its ancestors a warning on an item X prevents any other transaction from locking X, but does not prevent them from also placing a warning on X, or from locking some descendant of X that does not have a warning Definition: A transaction obeys the warning protocol if: 1. It begins by placing a lock or warning at the root 2. It does not place a lock or warning on an item unless it holds a warning on its parent. 3. It does not remove a lock or warning unless it holds no lock or warnings on its children 7

Transaction Management 4. It obeys 2PL in the sense that all unlock operations follow all warnings or lock operations This protocol acts in conjunction with the assumption that a lock can be placed on an item only if no other transaction has a lock or warning on the same item. Furthermore, a warning can be placed on an item as long as not other transaction has a lock on the item. Theorem: Legal schedules obeying the warning protocol are serializable. 8

Physical Data Organization Databases may be too large to fit in main memory The efficiency of operations on databases residing in secondary storage relies heavily on the availability of good storage organization techniques Performance measures include the time required to perform database operations such as selections or joins E.g., selections should take time proportional to the number of tuples retrieved rather than the size of the relation Storage organization techniques include: Heaps Hashing Indexed sequential access methods B-trees, B + -trees 9

Records, Fields and Files At the conceptual or logical level, a database is a collection of entities and relationships, or a collection of tables representing entities and relationships. At the physical level, a database is a stored collection of records, each consisting of one or more fields. Fields contain values of elementary data types (e.g., integer, real) A record is used to physically store each of the basic objects at the conceptual level E.g., a tuple of a relation can be stored as a record with each component of the tuple stored in one field. Records can be viewed as instances of a record scheme. 10

A database contains collections of records with the same number of fields, with corresponding fields having the same name and data type. The list of field names and their corresponding data types is called the format of the record. A file is a collection of records with the same format. For instance, a file physically represents a relation. Two-level storage The physical store where records and files reside can be thought of as an array of bytes numbered sequentially. Files normally reside in secondary storage. In order to perform operations on data found in file records, records must be moved from secondary storage to main memory. Once they are moved operations can be performed very fast compared to the speed of data transfer between main and secondary storage. 11

Blocks Secondary storage is partitioned in segments (blocks) of a substantial number of bytes (2 9-2 12 ) with several records in a block Transfer of data occurs in units of a block. The cost of database operations depends on the number of blocks moved between main memory and secondary storage. The efficiency of operations improves when records of a file lie within the same block or a relatively small number of blocks. Cost of DB Access The unit cost of db operations is the block access, i.e., the time required for reading from or writing to a single block. This cost of performing main memory operations is negligible compared to the cost of block transfer. 12

With the buffering of blocks in main memory we can avoid having to transfer a block from secondary storage to main memory. The time to access a block in secondary storage depends on the location where the last block access took place. Simplifying assumptions: There is a fixed probability that a block will need to be transferred. The cost of a block access does not depend on what accesses were made previously. Each block access costs the same. 13

Pointers A pointer to a record r is data sufficient to locate r efficiently. A pointer can be of different types such as, e.g., the absolute address of the beginning of record r. Absolute addresses are often undesirable: we might permit records to move around within a block or group of blocks. If absolute addresses are used as pointers and record r is moved, all pointers to r must be updated. A pair (b,k) can be used as a pointer, where b is the block in which r resides and k is the value of the key for r. 14

Pointers To locate a record r given a pair (b,k) it is sufficient to know that: All records in block b have the same format as r; therefore none can agree with r in its key fields. The beginnings of all the records in block b can be found. Each record in block b can be decoded into its field values given the beginning of the record. Pinned Records When records may have pointers to them from unknown locations, we say that the records are pinned. If records are unpinned, they can be moved around within a block or from block to block. 15

Pinned Records When records are pinned, they cannot be moved if the pointers to them are absolute addresses. They can only be moved within the same block if a pair (b,k) is used as a pointer. Records cannot be deleted if they are pinned: if there exists a pointer p to a record r and r is deleted, then if at some later point in time a record r is put in the same place as r, pointer p will point to r. Pointer p is called a dangling pointer. Even in the case where block-key pairs are used, the problem cannot be avoided: if r has the same key as r, we would still have an unintended reference to a record. To avoid this problem, each record includes a bit (called deleted bit) which is set to 1 if the record is deleted. If we reach the record by following a pointer, we will know if it is deleted or not. 16

Record Organization The fields in a record must be arranged in such a way that their values can be accessed. If all fields have fixed length, then only an order must be chosen: each field starts at a fixed number of bytes (offset) from the beginning of the record. Once a record is located, the field can be found by moving forward a number of bytes equal to the offset for that field Additional bytes may be required for each record: Some bytes denote the format of the record. For instance if the record belongs to more than one relation, we may wish to store a code indicating the relation of each record. Alternatively, we can store only one type of records in any block and let the block indicate the type of its records. 17

Additional bytes may be required for each record: One or more bytes may denote the length of the record. If the record involves only fixed-length fields, then the length is implicitly derived. A byte including a deleted bit and a used/unused bit: the latter is needed when blocks are divided in areas, each of which holds a record. This bit indicates if there actually exists a record or if it is empty space. Waste space: useless bytes may be added so that the bytes where the records begin have convenient addresses. 18

Example: record type: NUMBER Fields: info Number: integer (key field) always holds a positive integer Name: a single byte indicating the first letter of the English name for the number Square: integer holds the square of the number If an integer takes 4 bytes, a total of 9 bytes is required for the record. In addition, a deleted bit and a used/unused bit is needed. Waste space is needed if integers are required to be stored in records whose beginning address is a multiple of 4. waste 0 1 2 3 4 7 8 11 name number square 19

Variable-length records Record formatting problems occur when fields are allowed to vary in length: fields do not begin at the same offset for every record of a particular format Record formatting strategies: Attach a count at the beginning of each field. Its value is the number of bytes the field occupies. Although redundant, the total length of the entire record is also stored in the beginning of the record. Place, in the beginning of each record, pointers to the beginning of each variable length field and a pointer to the end of the last field. All fixed-length fields precede all variable-length fields. 20

Comparison: The former strategy uses less space but is less efficient in locating fields: to locate a variable-length field beyond the first, we must examine all previous variable-length fields. With the latter, fields can be located faster but pointers have to be stored with the record. Example: assume the square of a number is represented as a character string instead of an integer (variable-length field). A count for the length of this field and the total length of the record must be used according to the first strategy. 21

waste 0 1 2 3 4 7 8 11 12 t 13 3 169 Record for number 13 info name waste 0 1 2 3 4 7 8 9 10 t 2 1 4 info name Record for number 2 The value of byte 0 is always 9 more than the value of byte 8. Hence, either one can be dispensed with (but not both). If there were additional fields following the square of the number, then byte 8 would have to be read before that field could be found. 22

Block formats Records within blocks need to be located efficiently as well. Just as records require additional space for formatting information, so do blocks of records. E.g., blocks often have pointers in fixed positions to link blocks in lists of blocks. The formatting of blocks must take into account the alignment requirements of record fields. E.g., if integers within the records are required to start at an address divisible by 4, then we require that the offsets of integers within the records be divisible by 4 and that records begin at some offset that is also divisible by 4. Normally blocks begin at an address that is a multiple of a power of 2. 23

If a block contains fixed-length records, then the block has to be partitioned in as many areas, each holding one record, as will fit in a block. Space must be reserved for special fields in a known place in each block. Example: Assume blocks of length 64. We wish to store records of fixed length representing numbers. info waste 0 1 2 3 4 7 8 11 number square name 24

Moreover, blocks must have a pointer of 4 bytes to be used as a link to another block. 0 11 12 23 24 35 36 47 48 59 60 64 Rec 1 Rec 2 Rec 3 Rec 4 Rec 5 link Every record contains a used/unused bit. To find an empty area in which to insert a record, we must visit each record area in turn. Alternatively, all used/unused bits can be grouped in one or more bytes at the beginning of the block. For the block shown above, only byte 0 is needed for storing the used/unused bits. Then the block can only contain 4 records because of the alignment requirements. (record length cannot be reduced below 12. Records stored in positions, 4-15,16-27,28-39,40-51. Bytes 60-63 for link. Bytes 52-59 are waste space.) 25

Blocks with variable length records Locating variable-length records: Assume that the first record starts at byte 0. The length of the record is found there. The beginning of the second record is at the next multiple of 4 (after the number indicating the length of the first record). The third record is found at the next multiple of 4 following the second record, etc. Alternatively, a directory can be placed at the beginning of the block, consisting of an array of pointers to the records in the block. These pointers are actually offsets from the beginning of the block to the location where the particular record begins. 26

Directory Representation 1. Precede the directory by a byte denoting the number of pointers in the directory 2. Use a fixed number of fields at the beginning of the block for pointers to records. If there are fewer records in the block than fields for pointers, these fields will contain 0. 3. Use a variable number of fields for pointers to records, with the last such field containing 0. Example: Suppose we want to store variable-length records of the following format: 27

waste 0 1 2 3 4 7 8 11 12 t 13 3 169 waste 0 1 2 3 4 7 8 9 10 t 2 1 4 info name info name Block format: waste 0 4 8 12 16 28 40 60 16 28 40 0 Record 2 Record 13 Record 100 Link 28

Τέλος Ενότητας

Χρηματοδότηση Το παρόν εκπαιδευτικό υλικό έχει αναπτυχθεί στα πλαίσια του εκπαιδευτικού έργου του διδάσκοντα. Το έργο «Ανοικτά Ακαδημαϊκά Μαθήματα στο Πανεπιστήμιο Κρήτης» έχει χρηματοδοτήσει μόνο τη αναδιαμόρφωση του εκπαιδευτικού υλικού. Το έργο υλοποιείται στο πλαίσιο του Επιχειρησιακού Προγράμματος «Εκπαίδευση και Δια Βίου Μάθηση» και συγχρηματοδοτείται από την Ευρωπαϊκή Ένωση (Ευρωπαϊκό Κοινωνικό Ταμείο) και από εθνικούς πόρους.

Σημειώματα

Σημείωμα αδειοδότησης Το παρόν υλικό διατίθεται με τους όρους της άδειας χρήσης Creative Commons Αναφορά Δημιουργού - Μη Εμπορική Χρήση - Παρόμοια Διανομή 4.0 Διεθνές [1] ή μεταγενέστερη, Διεθνής Έκδοση. Εξαιρούνται τα αυτοτελή έργα τρίτων π.χ. φωτογραφίες, διαγράμματα κ.λ.π., τα οποία εμπεριέχονται σε αυτό και τα οποία αναφέρονται μαζί με τους όρους χρήσης τους στο «Σημείωμα Χρήσης Έργων Τρίτων». [1] http://creativecommons.org/licenses/by-nc-sa/4.0/ Ως Μη Εμπορική ορίζεται η χρήση: που δεν περιλαμβάνει άμεσο ή έμμεσο οικονομικό όφελος από την χρήση του έργου, για το διανομέα του έργου και αδειοδόχο που δεν περιλαμβάνει οικονομική συναλλαγή ως προϋπόθεση για τη χρήση ή πρόσβαση στο έργο που δεν προσπορίζει στο διανομέα του έργου και αδειοδόχο έμμεσο οικονομικό όφελος (π.χ. διαφημίσεις) από την προβολή του έργου σε διαδικτυακό τόπο Ο δικαιούχος μπορεί να παρέχει στον αδειοδόχο ξεχωριστή άδεια να χρησιμοποιεί το έργο για εμπορική χρήση, εφόσον αυτό του ζητηθεί..

Σημείωμα Αναφοράς Copyright Πανεπιστήμιο Κρήτης,. «Αρχεία και Βάσεις Δεδομένων. Διάλεξη 2η: Μοντέλο Οντοτήτων-Συσχετίσεων». Έκδοση: 1.0. Ηράκλειο/Ρέθυμνο 2014. Διαθέσιμο από τη δικτυακή διεύθυνση: http://www.csd.uoc.gr/~hy360/