Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,654,085 papers from all fields of science
Search
Sign In
Create Free Account
Candidate key
Known as:
Candidate key (Template)
, Non-prime attribute
, Prime attribute
In the relational model of databases, a candidate key of a relation is a minimal superkey for that relation; that is, a set of attributes such that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Boyce–Codd normal form
Compound key
Database
Database normalization
Expand
Broader (1)
Data modeling
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Mining Tasks from the Web Anchor Text Graph: MSR Notebook Paper for the TREC 2015 Tasks Track
Paul N. Bennett
,
Ryen W. White
Text Retrieval Conference
2015
Corpus ID: 16625342
Abstract : Users may have a variety of tasks that give rise to issuing a particular query. The goal of the Tasks Track at…
Expand
2013
2013
Privacy and trust in cloud database using threshold-based secret sharing
R. Dutta
,
B. Annappa
International Conference on Advances in Computing…
2013
Corpus ID: 15717883
In today's cloud computing scenario, privacy of data and trust on the service provider have become a major issue and concern…
Expand
2009
2009
Determining All Candidate Keys Based on Karnaugh Map
Yi-Shun Zhang
International Conference on Information…
2009
Corpus ID: 26956691
Determining all candidate keys is important step in designing relational database. Familiar algorithms are generally time…
Expand
2008
2008
Keys and Armstrong Databases in Trees with Restructuring
A. Sali
,
K. Schewe
Acta Cybernetica
2008
Corpus ID: 35033287
The definition of keys, antikeys, Armstrong-instances are extended to complex values in the presence of several constructors…
Expand
2008
2008
Query-Based Visualization of Iso-Surfaces for Tetrahedral Meshes
Mohammed Zahid Abbas
,
P. Prasad
2008
Corpus ID: 60175674
This is an application of information visualization in object relational database. This will present query based visualization of…
Expand
2007
2007
Why IV Setup for Stream Ciphers is Difficult
E. Zenner
Symmetric Cryptography
2007
Corpus ID: 16491129
In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point when designing secure stream…
Expand
2004
2004
An efficient algorithm for 3NF determination
P. Worland
Information Sciences
2004
Corpus ID: 30271422
Highly Cited
2000
Highly Cited
2000
Foundation for Future Database Systems: The Third Manifesto
C. J. Date
,
Hugh Darwen
2000
Corpus ID: 61700949
From the Publisher: A detailed study of the impact of objects and type theory on the relational model of data, including a…
Expand
1999
1999
Describing Candidate Keys by Hypergraphs
J. Demetrovics
,
Vu Duc Thi
Computers and artificial intelligence
1999
Corpus ID: 26641374
In the paper algorithms are given that find a minimal transversal and all minimal transversals, respectively, of a hypergraph…
Expand
1975
1975
Finding candidate keys for relational data bases
Raymond Fadous
,
J. Forsyth
ACM SIGMOD Conference
1975
Corpus ID: 7008561
The candidate keys, as defined by E. F. Codd [4], are important in the process of reducing a normalized relation into second and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE