Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Reasoning about naming systems
Bowman M., Debray S., Peterson L. ACM Transactions on Programming Languages and Systems15 (5):795-825,1993.Type:Article
Date Reviewed: Sep 1 1994

Naming systems are specialized databases designed for identifying persons and organizations, locating equipment, and similar tasks. In a perfect world, the user would compose a request using the known attributes, and the system would respond with all matching objects. In practice, however, the request items may be partially wrong or outdated, some may be more important than others, or the system database may be incomplete and partially wrong or outdated. If no perfectly matching item exists, the naming system has to apply increasingly more lax strategies until a suitable item is found. This paper is on a theory of applicable matching strategies.

Several strategies pertaining to the client’s (user’s) present needs exist. For example, the client may prescribe that the naming system use all mandatory attributes (attributes guaranteed to be registered); this strategy is called closed. If no objects are returned, the naming system shall then use the non-mandatory attributes; this strategy is called open. Similarly, the user may order the system to prefer static attributes (which never change their value) over dynamic attributes (where either the database or the user may have outdated information). Technically, a client approximation function is a function from a set of attributes to a subset, such as the set of mandatory attributes.

Correspondingly, several strategies reflect the status of the database. Possible returns all objects that do not conflict with the query. Partial returns all objects that in addition have at least one matching attribute. Exact requires that all attributes in the query match. Unique asks for the single object matching all attributes and returns nothing if more than one such object exists. These four strategies form a preference hierarchy. Technically, a database approximation function is a function from a set of attributes and a set of objects into a set of objects.

Several sets of ordered approximation functions can be combined using a priority between these sets. For example, if (open, closed) gets priority over (possible, partial, exact), then the composition {closed, exact} has the highest priority, followed by {closed, partial} and so on down to {open, possible}. Within a composition, the naming system starts by using only the first component. If this yields too many objects, the set is reduced by the second component; composition essentially yields the intersection.

This systematic approach allows the authors to compare the strategies used in different existing naming systems, to devise new ones, and to reason about their properties. The theory has been used to find inconsistencies in existing naming systems and to design a modified system without these inconsistencies. The authors present several approximation functions at appropriate length. The overall procedure gets somewhat lost in the details.

Reviewer:  F. Gebhardt Review #: CR117860
Bookmark and Share
 
Question-Answering (Fact Retrieval) Systems (H.3.4 ... )
 
 
Query Languages (H.2.3 ... )
 
 
Query Processing (H.2.4 ... )
 
 
Selection Process (H.3.3 ... )
 
 
Information Search And Retrieval (H.3.3 )
 
 
Languages (H.2.3 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Question-Answering (Fact Retrieval) Systems": Date
A natural language information retrieval system with extentions towards fuzzy reasoning
Bolc L. (ed), Kowalski A., Kozlowska M., Strzalkowski T. International Journal of Man-Machine Studies 23(4): 335-367, 1985. Type: Article
Jun 1 1986
Answering regular path queries in expressive description logics via alternating tree-automata
Calvanese D., Eiter T., Ortiz M. Information and Computation 23712-55, 2014. Type: Article
Feb 2 2015
Data-driven answer selection in community QA systems
Nie L., Wei X., Zhang D., Wang X., Gao Z., Yang Y. IEEE Transactions on Knowledge and Data Engineering 29(6): 1186-1198, 2017. Type: Article
Oct 24 2017

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy