Prof. Dr. Helmut Schauer, Prof. Dr. Beat Schmid,

更新时间:2023-04-05 16:57:01 阅读量: 实用文档 文档下载

说明:文章内容仅供预览,部分内容可能不全。下载后的文档,内容与下面显示的完全一致。下载之前请确认下面内容是否您想要的,是否完整无缺。

INFORMATIK ? INFORMATIQUE 5/1998 1 Impressum Herausgeber ? Editeur

SVI/FSI Schweizerischer Verband der Informatik-organisationen / Fédération suisse des organisations d’informatique

Postfach 71, 8037 Zürich

vertreten durch ? représenté par

Prof. Dr. Helmut Schauer, Prof. Dr. Beat Schmid,Prof. Dr. Carl August Zehnder

Redaktion ? Rédaction

Fran?ois Louis Nicolet

Schwandenholzstr. 286, 8046 Zürich

T elefon 01 371 73 42, T elefax 01 371 23 00E-Mail

Beirat ? Comité consultatif

Prof Dr. Boi Faltings (EPFL Lausanne), Prof. Dr. Ste-fan Klein (Universit?t Münster), Dr. Ernst Lebsanft (Synlogic AG, Binningen), Prof. Dr. Rudolf Marty (IFA Informatik, Zürich), Prof. Dr. Moira C. Norrie (ETH Zürich), Prof. Dr. Hans-J?rg Schek (ETH Zürich), Dr.Hans Stienen (Synscape, Binningen), Helmut Thoma (ITpro AG Basel), Dr. Reinhold Thurner (Herrliberg),Rudolf Weber (Mummert+Partner AG Zürich) English proof-reading:

Michael Hird, Alasdair MacLeod

Druck, Versand ? Impression, expédition Stulz AG, 8942 Oberrieden

Inseratenverwaltung ? Régie des annonces Jean Frey Fachmedien, Postf., 8021 Zürich T elefon 01 448 86 34, T elefax 01 448 89 38E-Mail

Jahrgang ? Année de parution

5. Jahr ? 5ème année

Erscheinungsweise ? Parution

J?hrlich 6 mal ? 6 fois par an

Au?age ? Tirage: 4’500 Exempl.

Die Zeitschrift sowie alle in ihr enthaltenen Beitr?ge und Abbildun-gen sind urheberrechtlich geschützt.

La revue ainsi que toutes les contributions et ?gures qu’elle con-tient sont protégées par la loi sur les droits d’auteur. Bezugsm?glichkeiten, Abonnements Possibilités d’obtention, abonnements

Die Zeitschrift I NFORMAT I K/I NFORMATIQUE ist of?zielles Organ der folgenden I nformatikorganisationen ? La revue INFORMATIK/INFORMATIQUE est l’organe of?ciel des organi-sations d’informatique suivantes

SI Schweizer Informatiker Gesellschaft

Société Suisse des Informaticiens

Schwandenholzstr. 286, 8046 Zürich Tel. 01 371 73 42, Fax 01 371 23 00

E-mail WIF Wirtschaftsinformatik-Fachverband

Hans Huber-Str. 4, Postfach, 8027 Zürich Tel. 01 283 45 30, Fax 01 283 45 50

E-Mail

INFORMATIK/INFORMATIQUE kann von den Mitgliedern fol-gender I nformatikverb?nde über ihren Verband bezogen wer-den ? Les membres des associations suivantes peuvent obtenir la revue INFORMATIK/INFORMATIQUE auprès de leur asso-ciation

GRI Groupement Romand pour l’Informatique

Case postale 90, 1000 Lausanne 21

GST Gesellschaft zur F?rderung der Software-Tech-

nologie, Fritz K?ser-Str. 10, 4562 Biberist SIK Schweizer Informatik-Konferenz

Postfach 645, 4003 Basel

SVD Schweiz. Vereinigung für Datenverarbeitung

Postfach 373, 8037 Zürich.

INFORMATIK/INFORMATIQUE kann nur über die Mitgliedor-ganisationen des SVI/FSI bezogen werden (Ausnahme: ?ffentli-che Bibliotheken über SV I /FS I ). INFORMATIK/INFORMA-TIQUE ne peut être obtenue que par les organisations af?liées àla SVI/FSI (exception: les bibliothèques publiques auprès de la SVI/FSI).

ISSN 1420-6579 Fr. 15.– 2Editorial – Moira Norrie, Guest Editor 3Approaches to Accessing Databases through Web Browsers – Antonia Erni and Moira Norrie 8Integrating Globally Distributed Heterogeneous Information Sources – Michael Rys 14Collecting and Querying Medical Information on the Internet – Epaminondas Kapetanios, Moira C. Norrie, Julian Schilling 18CEPIS Position Statement regarding Electronic Commerce 19Business Round Table on Global Communications 20Theorie der Turing-Maschinen – Buchbesprechung von Thomas Bühlmann 21Einladung zur Konferenz Electronic Commerce und zur Gereralversammlung der SI 21Invitation à la conférence Electronic Commerce et à l’Assemblée générale de la SI 22Wahlen / Elections 23Statuten?nderung 23Amendement aux Statuts 23Beschlussprotokoll der Generalversammlung der Schweizer Informatiker Gesellschaft vom 24. September 199724Procès-verbal de l’Assemblée générale de la Société Suisse des Informaticiens du 24 septembre 199724Ada in Switzerland 25CHOOSE 26Security 26SGAICO 27SIPAR 27Software Ergonomics 28Bericht von der 43. Generalversammlung – Roland Wettstein 29Planungssitzung 1998 – Ugo Merkli und Dieter Spahni 30Informationsobjekte - alles Design? Informatiker und Gestalter im Dialog – Ugo Merkli 31Ein Vorstandsmitglied stellt sich vor – Dieter Spahni 32Der WIF gratuliert …Gobal Information Systems Mosaic Mitteilungen der Schweizer Informatiker Gesellschaft (SI)Communications de la Société Suisse des Informaticiens (SI)Mitteilungen des Wirtschaftsinformatik-Fachverbands (WIF)

Visit the INFORMATIK/INFORMATIQUE Web site: http://www.access.ch/sinfo/

Global Information Systems

2INFORMATIK ? INFORMATIQUE 5/1998Editorial

Four years ago, a lecture course entitled “Global Information Systems” was offered for the ?rst time by the Institute of Infor-mation Systems at ETH Zurich. At that time, everyone was talking about the World-Wide Web, but people were only beginning to explore this global information space and business sites were few and far between. Questions were raised about the likely impact of this new technology on society and whether there could ever be any real commercial bene?ts.

As database researchers, we had always considered ourselves at the centre of the information management business. Sudden-ly, it seemed that our world of structure and organisation had been overtaken by a world of chaos. What was emerging was a global network of information producers and consumers in which anyone was free to publish whatever information they chose in a completely unstructured format. How should we react? One possibility was to bury our heads in the sand and hope that it would go away. The other was to jump on the band-wagon and try to be part of this brave new world. We chose the latter approach. In whatever direction this new community would go, it was clear that there would be problems of manag-ing information on the global scale – and there we could con-tribute.

That ?rst course offering for “Global Information Systems”was very much like the Web itself in terms of its exploratory nature. The Web was evolving so quickly that within the time span of the course there were many new and exciting develop-ments. So what was the content of that course? The emphasis was on the need to adapt and integrate existing information technologies to deal with a dynamic and open world. Concepts from information retrieval, knowledge representation and data-base systems could be used to tackle the problems of ?nding, accessing and processing information represented as HTML documents.

Over the past four years, the course content, like the Web, has changed greatly. No longer do we question the commercial potential of the Web and each year new technologies are intro-duced. Nowadays, any serious Web developer has to know about everything from Internet programming in its various guises to database and agent technologies. Web development tools are one of the largest growth sectors of the software mar-ket. However, the underlying message of our course remains the same – the development of an effective information system requires a careful selection and integration of appropriate tech-nologies. It is important to understand not only the available technologies, but also the characteristics of the application and its clients to guarantee a system that will meet its requirements in terms of functionality, presentation and performance.

For this special issue, we have selected three papers that illustrate the variety of technical, architectural and application issues involved in developing global information systems. The link between information systems and the Internet arises out of both the desire to allow users to access databases over the Internet and the need to use database technologies to manage information published on the Web. We start by examining the different approaches used to provide access to database sys-tems via standard Web browsers. It is important to appreciate the relative advantages and disadvantages in selecting the best database Web technologies for an application system or under-standing where the performance problems arise.

Next, we look at how a “database view” of the Web can be realised. Database people are used to locating and processing information by means of querying and a number of research projects are investigating how the concept of querying can be brought to the Web. Representative of this work is the TSIMMIS project at the University of Stanford and a member of this project group, Michael Rys, kindly agreed to write an overview of this project.

To conclude, we present an Internet information system developed as a part of a collaborative project between the Insti-tute of Information Systems at ETH Zurich and the Institute of Social and Preventive Medicine at the University of Zurich. This serves to show some of the architectural issues involved in developing a particular Internet service and how “thinking gen-erally” can result in, not only more ?exible and powerful sys-tems, but also the ability to reuse systems when similar services are required in further projects.

Moira Norrie, Guest Editor

Global Information Systems

INFORMATIK ? INFORMATIQUE 5/1998 3

Approaches to Accessing Databases through Web Browsers

Antonia Erni and Moira Norrie

Access to databases through Web browsers is now commonplace with some form of Web server being provided by all major vendors of database software. In this paper, we review the various approaches and architectures for Web access to databases discussing their relative advantages and disadvantages. In particular, we compare an approach based on CGI programming with one based on special Web DBMS components implemented in Java.

Introduction

All major vendors of database management systems (DBMS) now provide some means of accessing a database sys-tem through standard Web browsers such as Netscape Commu-nicator and Internet Explorer. The demand for such access arises not only from the desire to provide simple, universal interfaces to shared information services, but also from the problems of managing complex Web sites. Increasingly, data-base systems are being used to manage information published on the Web and Web documents are being generated dynami-cally.

Here, we review the various approaches and architectures currently used for providing Web access to databases. Speci?-cally, we compare in detail an approach based on Web access to remote database servers via standard Web protocols and CGI programs, with that of implementing an Internet-based client-server DBMS in which components of the system are imple-mented in Java and execute on the client side. While both ap-proaches are general and not dependent on the nature of the un-derlying D BMS, the systems we describe are both object-oriented database systems (OODBMS) with general graphical object browsers, thereby enabling a more direct form of com-parison between the approaches.

We begin in section 2, we describe the main approaches to accessing database systems via the Web and discuss their rela-

tive advantages and disadvantages. In section 3, we describe the commercial system O2 Web which is an example of a sys-tem that provides Web access via CGI programs. Section 4presents Internet OMS developed at ETH Zurich as an example of an OODBMS with a client-server architecture for the Web.Concluding remarks are given in section 5.

Approaches

In the main, there are three different technologies that can be distinguished for providing Web access to databases. To date, the most widely used is that of access via Common Gate-way Interface (CGI) programs [Gundavaram 96] which is the standard means of providing Web access to application servic-es. Two other approaches based on Java are becoming increas-ingly popular. The ?rst relies on the ability to access database systems from Java programs using standardized Java DataBase Connectivity (JD BC) interfaces. The second is to actually develop Web components of the DBMS which can be down-loaded as Java applets and execute on the client machine. We review each of these approaches in turn.

Currently, most database vendors provide CGI-based Inter-net access to databases. This includes the major relational ven-dors such as Oracle [Oracle 96] and OODBMS vendors such as O2 [O2]. One of the main goals of such interfaces is to support publication of information on the Web by means of dynamical-ly built HTML pages.

As stated previously, the main feature of CGI program access is that it uses the standard HTTP and HTML protocols for all communication between the client and the server. Users supply query parameters by means of HTML forms and these param-eters are then sent using the HTTP protocol’s GET or POST methods to the server which calls a CGI program to interpret the request and establish a connection to the requested database (possibly indirectly through a special DBMS Web Server). The query results produced by the database are encoded in HTML documents and returned to the client. There are also available general Web intermediary database servers which use special HTML extensions to encode SQL statements in HTML docu-ments and can connect to any D BMS supporting a standard SQL-based interface such as ODBC.

1

2

Global Information Systems

4 INFORMATIK ? INFORMATIQUE 5/1998

The major advantage of such a technology is that no special requirements are placed on the client side. There is no need to install special software on the client side, nor are there any requirements that the client Browser must support special plug-ins, Java or Java Script. Further, since all communication uses standard HTTP protocol, any system allowing general Web ac-cess can access the database and there are no special problems of security restrictions especially in the case of networks con-trolled by ?rewalls. Due to these advantages, we also provide such an interface as part of the OMS database development suite [Norrie 93, Wuergler 95, Leidi et al. 98] to facilitate uni-versal Web access to OMS databases.

The disadvantage of this approach is that the entire process-ing of requests is on the server side. This includes the processes of handling HTTP requests, constructing queries to be executed and communicating with the DBMS server and generating the presentation of results in terms of HTML documents. If a serv-er has many clients, this can result in severe problems of server overload and slow access. Additionally, since no processing is performed on the client side, there is no validation of form input data before the request is sent to the server. System per-formance is further restricted by the fact that access is often “stateless” meaning that there is no record of access sequences and user browsing may result in the same queries being issued and executed repeatedly without exploitation of any local or remote caching.

An example of a system using this approach is O2 Web based on the commercial OODBMS O2 and we describe the opera-tion of this system in detail in section 3.

The use of Java and JavaScript enables code to be download-ed and executed on the client machine, thereby making it pos-sible to move some of the database system functionality to the client. JDBC is a standard for database connectivity proposed by Sun that allows Java applications or applets to access data-bases [Reese 97]. Web access to one or more databases can therefore be provided by means of a Java applet provided that each DBMS provides a JDBC driver implementing the appro-priate libraries. One of the main aims of this approach is to make applications independent of speci?c D BMSs in that access through a standard interface allows different DBMSs to be accessed in the same manner and a DBMS to be changed without effecting the application. At present, most JDBCs pro-vide an SQL-level application programming interface. Efforts are underway to de?ne similar JDBC interfaces speci?cally for OODBMS. In the context of OMS, we have also developed a JDBC driver which may either work through SQL or through the OMS query language AQL [Füst?s 95].

While JDBC provides general Web client program access to remote databases, there is no database functionality as such in these Web clients - unless the application programmer codes it.Another approach is to implement general DBMS components in Java and execute these components on the client side. Typi-cally, the DBMS component executing on the client side will be concerned with data input and result presentation. This is a similar distribution of functionality to that found in typical client-server DBMS architectures. Thus, one can consider that rather than simply providing access to a database via the Web,

an Internet-based client-server architecture is developed with functionality such as database browsing being provided through a Web browser.

D eveloping such a Web-based client-server architecture yields performance gains in that validation of data input and processing of results can be done on the client side, thereby re-ducing server load. Further, it is possible to have better control of caching on both the client and server sides. There is a trend nowadays in this direction and we use our system, Internet OMS [Erni et al. 98, Erni/Norrie 97], to explain the approach and its bene?ts in section 4.

O2 Web

In this section, we describe the architecture and operation of system O2 Web [O2]. The system uses CGI programs to pro-vide Web access to the OODBMS O2 and we show the general O2 Web architecture in ?gure l.

At the bottom of ?gure 1, we have the O2 System waiting for requests to the database. The OODBMS O2 has been specially designed to store and manage large amounts of complex and multimedia data. The O2webserver

on top of it accepts requests of clients accessing the information via the Web. For each re-quest, the O2webserver invokes the speci?ed query and gener-ates HTML pages with the results encoded. The information stored in the HTML pages is default view of the objects in the database. This is the generic mode of O2 Web which allows cli-ents to browse through hypermedia information stored in O2databases without having to implement any special kind of Web interface.

In ?gure 2, we show the default presentation of a person ob-ject of a contacts database containing information about people and organisations. The generic mode presents only the at-tributes of objects to the user and not the methods associated with the object. This restricts the forms of database information that are visible and severely reduces the browsing functionality.For application programmers interested in a speci?c presen-tation of data, O2 Web allows total control of HTML document generation for objects of each class. Information about how to present an object of a class can be stored as a class method in

3

Global Information Systems

INFORMATIK ? INFORMATIQUE 5/1998 5

the database itself. In this way, the generic presentation meth-ods of the O2webserver are overridden and the objects are no longer presented in the generic mode. Storing object presenta-tions in the database classes allows application programmers to build their own speci?c Web applications. However, by closely coupling objects and presentations, they allow for only one style of presentation and this limits data reusability.

In the middle of ?gure 1, the main components for establish-ing the connection between clients requesting data over the Web and the O2 database are shown. The HTTP Server accepts requests arriving as a URL cgi-bin request with encoded query parameters. The O2webgateway is a CGI script responsible for connecting to the requested database system and passing to it the constructed query expressed in the O2 query language OQL. To ?gure out to which of the O2 databases the query should be forwarded, the O2webgateway connects to an O2webdispatcher running on the local area network. The O2webdispatcher tells the O2webgateway which O2webserver to connect to. The query is then sent to the O2webserver which executes it and returns the results as HTML pages to the O2webgateway. The HTML pages are then returned to the cli-ent via the HTTP server.

As the client user continues to navigate through the HTML pages by clicking on links, further queries are sent to the data-base. What happens when the same query is requested twice by the same client? In sending a URL containing a call to a CGI script, the Web browser does not recognize that the result will

be the same as that already stored in its cache. The browser therefore retrieves again the same data over the Internet. In not having a cache on the server side, the O2webserver re-executes the query and rebuilds the HTML page containing the query result. The positive aspect of this technology is the fact that the resulting HTML pages always contain the newest data from the database. Such a technology is of interest for databases often changing data and for clients always interested in the newest and updated information. However, the effect is that the system is unnecessarily slow in cases where the data is relatively stable and the user merely browsing as occurs in many applications.There exist other Internet database systems using CGI scripts, but caching the result HTML pages on the server side for faster access to the desired data. Such systems are for exam-ple Oracle Web [Oracle 96] or OMS Web [Leidi et al. 98]. Internet OMS

The Internet OMS [Erni et al. 98, Erni/Norrie 97] system is an example of an alternative approach based on the idea of extending the DBMS with Web components that execute on the client machine and are accessed through a general Web brows-er. The system was built to investigate means of providing fast and effective Web access to databases and is based on our own OODBMS called OMS [Norrie 93, Wuergler 95]. The architec-ture of Internet OMS is shown in ?gure 3.

The architecture can be viewed in terms of its server and cli-ent sides with the browser part considered as the user’s entry point to the Internet database. On the server side there is the OMS System with the OMS Server on top, waiting for requests to the OMS system. The OMS server forwards the requests to the OMS system and stores the results in a format specially de-?ned for Internet OMS, containing query result data together with metadata information.

For each OMS database, a Database Agent

is installed on the server side as shown in ?gure 3. This agent is a Java-Stand-alone program and is responsible for sending the client re-

4

Figure 2:

Generic presentation of an O2 Object

Global Information Systems

6 INFORMATIK ? INFORMATIQUE 5/1998

quests, if necessary, onto the OMS server and storing the query results in a Global Cache . Queries already requested by other clients are retrieved directly from the global cache. It is impor-tant to realize that, in typical browsing modes, there are a lim-ited number of entry points and so queries at the top-levels are often already evaluated and in the cache and therefore there are signi?cant bene?ts in terms of access times.

A client requesting OMS data over the Internet ?rst requests an HTML page from the HTTP Server shown in the middle of ?gure 3. This HTML page contains a Java applet, the Front Agent , which is transferred to the client machine and which is responsible for the presentation of the OMS query results. The front agent is effectively a component of the DBMS, running on the client machine. The connection between the front agent and the database agent is established using raw sockets rather than HTTP protocol which also leads to performance improve-ments.

The front agent initially opens an OMS Client window which enables the user to start browsing the database by either dou-ble-clicking on entries of the list of available object collections or by directly entering OMS queries. Such an OMS client win-dow is shown top left in ?gure 4.

Before sending a query to the OMS database, the front agent checks if the query result is already stored in its own local cache Memory , see ?gure 3. If the result is already there, the front agent interprets the query result, dynamically generates the appropriate presentation format of the OMS Query Result object, see ?gure 3, and presents it to the user. Figure 4 shows two examples of query objects. On the bottom left there is a collection object containing all persons stored in the database.On the right side, a person object itself is presented. Internet OMS query results contain not only attributes of objects, but also methods.

The presentation of database objects in the multi-windows format, shown in ?gure 4, imitates the object browsing style of

object-oriented databases making it very convenient for users to work with object-oriented database systems, such as OMS,via the Web.

If the query requested by the Web client is not in the memory of the front agent, that means the query was not yet requested,it is sent over to the database agent for further processing. If the query has been previously requested by another client, the re-sult is stored in the global cache and can be retrieved directly from there. Otherwise, the result is sent over to the OMS data-base server. Thus, we have a two-level caching scheme.

To ensure that query results in the cache are up to date, the database agent is responsible for reacting to changes in the database. If such changes occur, the agent reruns the queries related to the data changed and replaces the query results of the global cache with the newest versions. Since clients also store query results in their own local cache, communication between front agents and the database agent is necessary. The database agent keeps track of all clients accessing the database and uses this information to notify clients of relevant changes to the database and send updated versions of data to the clients con-cerned.

Advantages of such a Web component architecture as shown on the Internet OMS example, are gains in performance and reusability. The generation of query results in a special format containing both data and metadata enables presentation to be dealt with on the client side and further enables many different presentations according to user and application preferences.Having a front agent applet running on the client side, a local application controlled memory cache can be utilized, rather than relying solely on general caches of the browser. Further,validation of user inputs -including constraint checks and also query syntax checking can be performed on the client side.In using raw sockets for Internet connection, instead of the ‘stop and go’ HTTP protocol another gain in performance is achieved. Unfortunately, not all network systems allow such direct socket connections to other machines. For example, net-works using a ?rewall-technology to connect to the outside world do not accept such connections, and therefore do not allow Internet OMS applications to run within their network.For these cases, we offer the CGI means of accessing OMS da-tabases [Leidi et al. 98]. Further the storage of query result of all clients in the global cache, again enables performance gains such that clients can pro?t of query already requested by other clients.

For further improvements of performance, Internet OMS was extended to support users regularly accessing the database.These users may obtain access to additional services by regis-tering with the database agent and installing a personal assist-ant locally. The personal assistant has a user pro?le which it uses to pre-fetch data into the local cache based on predicted user information requests. We refer to this as active caching

since it means that data may be cached, not only as the result of a user-initiated data transfer, but also at the initiation of either a personal assistant or a database agent. Detailed information about this Internet OMS extension can be found in [Erni et al.98].

Figure 4: Generic presentation of an Internet OMS Object

Global Information Systems

INFORMATIK ? INFORMATIQUE 5/1998 7

Conclusion

We have described in some detail two basic approaches to providing Web access to databases. The ?rst approach of using CGI programs has the general advantage of being universal in that it requires no special Browser versions or installations on the client machine and has no problems operating over restrict-ed networks.

The second approach of moving some of the database func-tionality to the client machine enables a client-server architec-ture to be achieved over the Web with the additional advantages of improved knowledge and control of operation, thereby facil-itating cooperative client-server caching schemes. The penalty is a certain loss of universality due to user, network and brows-er restrictions on Java applets that sometimes prevent the oper-ation of this form of Web interface. The current solution is to provide both forms of interface and allowing application devel-opers and/or users to select the most appropriate.

References

[Erni/Norrie 97] A. Erni and M. C. Norrie. Agent Based Internet

Database Services. In 4th Doctoral Consortium CAiSE’97, Bar-celona, Spain, June 1997.

[Erni et al. 98] A. Erni, M. C. Norrie, and A. Kobler. Generic Agent

Framework for Internet Information Systems. In Proc. IFIP WG 8.1 Conference 98, Beijing, China, 1998.

[Füst?s 95] T. Z. Füst?s. OMS Internet Integration using Standard

Interfaces. Master’s thesis, Institute for Information Systems,ETH Zurich, 1995.

[Gundavaram 96] S. Gundavaram. CGI Programming on the World-Wide Web. O’Reilly & Associates, 1996.

[Leidi et al. 98] T. Leidi, A. Erni, and M. C. Norrie. OMS Web. Tech-nical report, Swiss Federal Institute of Technology (ETH), 1998.[Norrie 93] M. C. Norrie. An Extended Entity-Relationship Approach

to Data Management in Object Oriented Systems. In 12th Intl.Conf. on Entity Relationship Approach, pages 390–401, Dallas,Texas, December 1993. Springer-Verlag, LNCS 823.[O2] O2 Technology Inc., Versailles, France. O2Web.

[Oracle 96] Oracle Corporation, California 94065. U.S.A.Oracle

WebServer 2.0, 1996.

[Reese 97] G. Reese. Database Programming with JDBC and Java.

O’Reilly & Associates, 1997.

[Wuergler 95] A. Wuergler. Object Model System: An Object Data-base Management System for the OM Data Model. Master’s the-sis, Institute for Information Systems, ETH, 1995.

5

Global Information Systems

8 INFORMATIK ? INFORMATIQUE 5/1998

Integrating Globally Distributed Heterogeneous Information

Sources

Michael Rys

In an age of globalisation of business and information, the integration of heterogeneous, globally dispersed information sources is a crucial part of successful information management. Stanford University’s T SIMMIS prototype system provides the ?exibility, scalability, and abstraction mechanisms required by this integration process. This article gives an overview of how T SIMMIS is able to integrate distributed, heterogeneous information sources using a mediation approach. It describes the component-based architecture and how T SIMMIS supports the (semi)automatic generation of the components, and illustrates the different aspects with examples.

Introduction

The improvements in databases, Web-access, world-wide connectivity, and ubiquitous computation have made our world rich with resources which contain potentially useful informa-tion. However identifying, extracting and combining useful information becomes a dif?cult task, as the information sources become more complex in scope, more widely dispersed, and more perse and heterogeneous due to their autonomous development.

Applications that want to access these information sources are confronted with a wide variety of different communication protocols, data models and source capabilities. The integration of these sources into a single information system is a highly complex task. Providing access requires a persity of knowl-edge about the location and status of the sources, their contents,semantics, access protocols, and formats. Reusing the access component of such an integrated application in other applica-tions is dif?cult.

As these information systems grow and evolve, their mainte-nance cost increase. The list of required functions and their information resources grows as applications expand. Complex systems are hard to scale, even when based on a client-server architecture, due to their n:m interactions between clients and servers. Guaranteeing the availability of, and adding function-ality to, information sources for all existing clients increases maintenance cost considerably.

Furthermore, the availability of data from many, heterogene-ous, and possibly relevant sources overwhelms decision-mak-ers and their applications, resulting in what is called informa-tion overload . It turns almost impossible to deal correctly with all the many crucial details needed to integrate, explore and utilize the information sources. There often is an impedance mismatch between the clients’ needs and the services made available by the information sources.

By introducing a mediation middleware layer, we are able to provide scalability, maintainability, and value added services that are closer to the customer needs [Wiederhold 92]. A medi-ator is a software module that exploits encoded knowledge about selected sets or subsets of data to create information for a higher layer of application. It should be kept small and sim-ple, so that it can be maintained by one expert, or at most, a small and coherent group of experts. Mediators provide inter-mediary services, linking data resources and application pro-grams. Their function is to provide integrated information without the need to integrate the data resources.

To solve the problem of accessing and integrating many het-erogeneous and distributed information sources, the mediation approach incorporates the concepts used by previous approach-es, such as multi-database systems, federated databases, wrap-pers of non-database sources, and knobots. It provides addi-tional value-added services, such as active integration of data and further processing, and abstraction of the data to increase the information content.

The integrated sources do generally not use the same data model or schema or speak the same query language. To avoid confusion of babylonian proportion, the data models, schemas and query languages must be translated into a lingua franca used throughout the mediation level and provided to the client applications as the data model, the schema and the query lan-guage of the mediated information system.

We present T SIMMIS [T SIMMIS

, Garcia-Molina et al. 97], an information integration prototype system based on the media-tion architecture that integrates distributed heterogeneous

1

Global Information Systems

INFORMATIK ? INFORMATIQUE 5/1998 9

information sources containing semistructured data (e.g. sourc-es on the World-Wide Web or ?les) and structured data (e.g.relational databases).

For more detailed general discussions of T SIMMIS and related work see [Garcia-Molina et al. 97] and [Chawathe et al. 94]. The Object-Exchange Model O EM

To support the integration effort successfully, the com-mon data model must be more ?exible than the models com-monly used for database management systems. In particular, it has to support a rich collection of structures including nesting,it must be able to handle missing or widely differently struc-tured data (so-called semistructured data ), and it must convey the information about the structures themselves and about the meaning of the terms used in the data.

T SIMMIS uses the “lightweight” object model O EM (Object-Exchange Model) as the common data model [Papakonstanti-nou et al. 95a]. O EM is a simple self-describing (i.e., schema-less ) object model which allows nesting of objects in an object graph structure similar to X ML [X ML ]. It is “lightweight” be-cause it requires no strong typing of the objects, and therefore is ?exible enough to express missing or differently structured data in an elegant way. These features simplify the data and information transfer among the mediation components.

O EM ’s fundamental concept is an object consisting of the four components:

? object ID . It may be constructed by the mediators to describe the origin of the object, such as a pointer to the original object in the information source. It may also be a pointer to an object in the workspace used to answer the query. Unlike object ID s in object-oriented database systems, O EM oids may be local to a query and need not be persistent.

? Label

tells what the object represents. Since there is no explicitly given schema, the label takes the role of conveying all the information about the object which otherwise is done by a schema. However, objects with a given label are not required to conform to a particular set of subobjects.

?Type of the object’s value, either set, or an atomic type like string or integer .

?Value of the object, either an atomic value or a set of objects.Figure 1 shows an example of a collection of O EM objects (without their object ID ). The topmost object is labelled library and is of type set (indicated by the curly brackets).The set contains a single publication object of type set . Its set consists of six author subobjects of type set and the four string typed objects title , location , page , and year . Each of the author objects contains a singleton set with a name object of type string .

The Query Language MSL

Using a common query language allows the seamless integration of new mediators and sources in an existing media-tion system. This greatly facilitates the modular construction and extension of integrated information sources.

T SIMMIS provides an object-oriented, logical query language called M SL (Mediator Speci?cation Language) to query the O EM data model. Its main contribution in comparison to related languages, such as D ATALOG or O QL , is that it allows to query both unstructured and structured data. A complete speci?cation of M SL can be found in [Papakonstantinou et al. 96a]. In a nut-shell, an M SL query consists of rules composed of a head and a body, separated by the implication sign :-. The head describes the answer objects, and the body describes the conditions that the queried objects must satisfy. In general, head and body are based on patterns of the form . The object ID ?eld is optional in a body pattern when its existence at the source is irrelevant; when missing in a head pattern, it means that a unique id has to be generated for the answer object.

The following is an example query over the object structure presented in Figure 1:

:- }> }>@DBLP

The angular brackets associate labels with their values, while curly brackets group members of a set which would be the val-ue of some object of type set . The query retrieves all publica-

2

3

Global Information Systems

10INFORMATIK ? INFORMATIQUE 5/1998

tion titles of the year 1997 from a source called DBLP which can be either a mediator or wrapper. It is applied against the root object library and matches the pattern in the body of the query against the object structure of the source by looking for paths in the object structure (such as library.publication.title ) that agree with the nested structure of the query. In our example, there is exactly one path which has the correct path and satis?es the condition on the year subob-ject. X denotes the variable to which each value of title will be bound if the year is 1997. The result of the query is a set containing for each binding of X exactly one subobject with the label pubtitle and the value bound to X .

The M SL rule is actually a query. However the same rule could also specify a wrapper or trivial mediator: one that ex-ports 1997 publications from the DBLP source. We will discuss this in more detail in Section 4.2.

In addition to M SL , T SIMMIS offers an O QL -based query lan-guage for the O EM model called L OREL which serves as an alternative end-user language for T SIMMIS . L OREL is also the query language of L ORE (Lightweight Object REpository), a D BMS for semistructured data using the O EM data model [L ORE ].

The Mediation Architecture

The various mediation services within the mediation middleware layer are modular components which can interact with each other using the common data model and query lan-guage. Figure 2 depicts the T SIMMIS mediation architecture consisting of wrappers that provide the mapping between the source models and the mediation model, and the mediators that perform the integration. In the current prototype implementa-tion of T SIMMIS , each component is implemented as a C ORBA object that use O EM as data model and supports M SL as the que-ry language.

One main aspect of a mediation system is that its mediation components provide domain-speci?c functionality. This requires that the components have to be built by human experts and cannot – in the general case – be created automatically.However, many tasks of wrappers and mediators, such as com-munication, post-processing and query planning and execution,are common to all wrappers and mediators. Thus, one of the main goals of T SIMMIS is to provide toolkits and libraries that help to automate the generation of such generic parts in order to facilitate the manual generation of the mediation compo-nents, so that the component builder can concentrate on the do-main speci?c issues.

4.1 Wrappers

In T SIMMIS , wrappers provide access to the integrated infor-mation sources. A wrapper converts the underlying data objects of a source to O EM and transforms the (implicitly or explicitly given) schema of the source into the view it provides to the mediators. It also translates the M SL queries it receives from the mediators into queries understood by the sources query processing facility.

The goal is to provide access to information sources of vastly different nature, such as simple text ?les, world wide web sources, and relational databases. This means that the wrapper may translate the M SL query to SQL, but it can also mean that the M SL query is translated into the input of a CGI script in order to query a Web-based source.

Unlike standard database system interfaces, where all queries over the database schema and content can be executed,wrapped information sources normally only allow a limited set of queries. For example, a bibliographic search engine may respond to queries asking for the title written by a certain author, or the publication dates of these titles, yet be unable or unwilling to respond to a query asking for all titles published in a given year.

A T SIMMIS wrapper therefore ?rst decides whether its under-lying source can answer the query, i.e., whether the query is directly supported . If so, it transforms the query into a source query. The wrapper then transforms the answer into the appro-priate O EM objects and returns the result. If the query is not directly supported, the wrapper determines if the query can be answered by applying some built-in local ?ltering to the result of a directly supported query. For example, the source might not support selections over a speci?c attribute but can provide the full data. The wrapper can then perform the selection itself if the selection is built-in.

In many cases, the wrapper needs to extract data from unstructured or weakly structured sources such as Web pages,text documents or simulation reports. This extraction process is often achieved by a wrapper subcomponent called extractor . Its purpose is to extract the required data and to transform it into the required data model. T SIMMIS provides such an extractor that extracts and transforms data from Web pages using a tem-plate that speci?es the extraction and transformation process using simple pattern matching rules of the following kind:

4

Global Information Systems

INFORMATIK ? INFORMATIQUE 5/199811

[source object, pattern 1, object 1, pattern 2,

object 2, … ],

[object 1, pattern 11, object 11, … ], …

The ?rst of the above rules applies the pattern 1 to the text represented by the source object, and stores part of the data in the target object 1 as speci?ed by the pattern. If this pattern does not match, the next patterns are applied until one or none of the pattern matches (in the last case the source object becomes empty). The second rule applies the pattern 11 to the object 1 and extracts data to object 11. Unless otherwise speci?ed, the target objects become subobjects of the rule’s source objects in the resulting O EM object graph. For more information on the extractor and its capabilities see [Hammer et al. 97a, Hammer et al. 97b].

In order to simplify the construction of wrappers, T SIMMIS provides a template-based tool for generating wrappers [Papa-konstantinou et al. 95b, Hammer et al. 97c]. It takes a speci?-cation of the O EM objects provided by the wrapper, the map-ping of the provided views to the source actions, and three user-written functions that are needed to connect to the source and execute queries, and combines them with the standard compo-nents used to perform the communication, ?ltering etc. (Figure 3).

For example, the O EM “schema” of a bibliographic source might look like

pub_schema 1 publication 2 author

3 url dblp_url

3 name author_name 2 title title

2 location location 2 page pageno 2 year year *

where the ?rst line gives the name of the O EM “schema” and the following lines give the structure and the mapping from the source data to the output objects. The ?rst column indicates the nesting level of the objects, the second column indicates the label of the object from the source and the optional third indi-cates the label as exported from the wrapper.

This “schema” de?nition is then used in the wrapper tem-plate to specify the views over the source and their mappings to the source. For example the wrapper speci?cation

pub_schema:

X :- X: <&O publication {}> AND title_contains(O,$S)

// $$ = "getpublication -contains " ^ $S //.

provides the view of all publications where the title contains a speci?c substring. The M SL rule gives the view de?nition, and the part between the // indicates the source query (in this case it is a P ERL program which executes the web extractor with a source speci?c extraction template). Since the source objects may not provide all the subobjects, the M SL rule only uses the labels required to de?ne the view. Note that T SIMMIS wrappers allow the use of additional built-in predicates such as compari-son operations by a query to a wrapper. These predicates per-form further ?ltering of the result and don’t have to be speci?ed in the view de?nition, nor do they have to be mapped to the sources.

There is the opportunity to answer certain queries that match no pattern by deducing a logically equivalent combination of several queries. For more information about extending the wrapper rules to handle such queries and for an example see [Garcia-Molina et al. 97].

4.2 Mediators

Mediators , the main components of the middle layer of a mediated architecture, integrate multiple heterogeneous infor-mation sources. They provide signi?cant added functionality over the wrapped source capabilities and transform the data provided by one or several (wrapped) sources to information needed by an application. Such transformations require knowl-edge of where the data are, speci?cations about the data repre-sentations, as well as an understanding about the level of detail versus the users’ expectations [Wiederhold 92]. While wrap-pers convert the source data models into the mediation data model, mediators perform the schema or general domain model conversions as required by the integration.

The T SIMMIS project focuses on mediators that provide inte-grated O EM views over underlying data sources, and on how to generate the generic parts automatically.

In order to generate a mediator, a M SL speci?cation is given to the Mediation Speci?cation Interpreter (MSI) [Papakonstan-tinou et al. 96a] to de?ne the view provided by the mediator and the rules on how to execute the view over the integrated sourc-es, which are either wrappers or some other mediators. The body of the M SL rules describe the objects which must be present at the source(s) in order for the de?ned object to appear in the view, and the conditions these objects must satisfy (see Section 3). The MSI is thus provided by T SIMMIS as a general query execution engine specialised to the mediation domain through the views speci?ed by the mediator builder using the M SL rules.

Queries to the mediator are then speci?ed over the exported views. At runtime, the mediator collects and integrates the nec-

Global Information Systems

12INFORMATIK ? INFORMATIQUE 5/1998

essary data from the sources, based on the received query and the view’s speci?cation. This process is analogous to expand-ing a query against a conventional relational database view.Thus, these mediators perform dynamic integration, in contrast to the data warehousing approach, where these views are pre-materialized [W HIPS ].

The mediators in the current T SIMMIS implementation pro-vide the following functionality:

?routing: The mediator offers a view which abstracts from the actual source location and passes the query and answer between the client and the source.

?source abstraction: The mediator provides further ?ltering and restructuring of a single source. While this functionality is best moved as closely to the source as possible (i.e., incor-porated into the wrapper), there are cases when a wrapper cannot be altered and a new application needs to abstract the source further.

?source integration: The mediator provides the functionality to combine and integrate the data from different b9b62c3a376baf1ffc4fad78mon ways to integrate source data include union over sets of source data, join between them, and fusion of the inpidual source objects into integrated objects.

The following M SL rule is an example for a join between two bibliography sources.

<&f1(I,D) pub { <year Y>}>:- <&I inspecentry {<publication T>}>@INSPEC</p><p>AND <&D library {<publication { <title T> <year Y>}>}>@DBLP.</p><p>The mediation view is providing pub objects containing the title, abstract and the year. It is implemented as a join over the title variable T between the two sources INSPEC and DBLP . The INSPEC wrapper allows to query for the abstract of a given pub-lication (identi?ed by its title), whereas the familiar DBLP wrap-per allows to query for publications by year or title.</p><p>When executing a query over this view, the mediator has the choice of executing the join by ?rst executing one or the other source query and then performing a bind-join (binding the join attribute in the second source), or by performing the join local-ly after retrieving both source data. The actual execution strat-egy is decided at runtime, based on the bindings provided by the query and the involved cost. The chosen execution strategy is also in?uenced by the query capability of the sources. In the above example, the INSPEC source query requires a binding for T . If the query to the mediator does not provide this binding, the mediator ?rst executes the source query to DBLP which pro-vides the binding before executing the INSPEC source query.The current implementation of mediators in T SIMMIS is sen-sitive to the query processing capabilities of the sources. These capabilities are expressed in a declarative form using the tem-plates de?ned by the source wrappers. When processing a user query, the mediators read the relevant wrapper templates and generate plans for the user query that respect the capability lim-itations of the sources [Vassalos/Papakonstantinou 97, Li et al.98].</p><p>In the above example, f1(I,D) indicates the generation of the object ID of the resulting object based on the object IDs I and D returned from the sources. In general, these object ID functions could cleanup some of the semantic heterogeneity between the different source objects. In T SIMMIS however,these functions generate object IDs as logical terms, by a par-ticular use of Skolem functions as F-logic [Kifer/Lausen 89].The following two M SL rules specify a union:</p><p><&ins(X) union_entry V> :- <&X inspecentry V>@INSPEC.</p><p><&dblp(X) union_entry V> :- <&X library V>@DBLP.</p><p>When a query is executed against this union view, each entry is retrieved from the two sources and given a unique object ID.Thus, even semantically equivalent objects from the two sourc-es will appear twice in the view with different object IDs.If the view is to combine semantically equivalent objects from the sources, the objects must be “fused” [Papakonstanti-nou et al. 96b]. For example, the following rules</p><p><&f2(P,N) fusion_entry {<publication P></p><p><ins_details { }>}> :-<&X inspecentry {<publication P> }>@INSPEC <&f2(P,N) fusion_entry {<publication P></p><p><dbpl_details { <year Y> <title T>}>}> :-<&X library {<publication P { <year Y> <title T>}>}>@DBLP AND author(X, N)@DBLP.</p><p>fuse bibliographical entries. Entries retrieved from both sourc-es that have the same title and author will receive the same object ID through the skolemization with {/tt f2}.Conclusion</p><p>The main innovations and contributions of T SIMMIS to the integration of heterogeneous information sources are the use of an object-oriented data model in the form of O EM (which is similar to the now emerging data model standard for web based information sources), which is ?exible enough to describe objects of varying structure; the support for generating wrappers and mediators and the way to describe them using a powerful, yet simple speci?cation language; the idea of query “normalization”, which increases the expressive power of a component by discovering additional views that are implied by the logical speci?cation; and capability-based rewriting.</p><p>There are many interesting issues which still need to be addressed. In the following, we would like to mention two of these challenges we encountered while working with T SIMMIS .As already mentioned, T SIMMIS is intended to reduce the work for building wrappers and mediators. We made consider-able progress in the automatic generation of the standard wrap-per and mediation tasks, but there is still a lot of work involved in extracting and transforming data from unstructured or semi-</p><p>5</p><p>Global Information Systems</p><p>INFORMATIK ? INFORMATIQUE 5/199813</p><p>structured sources into the O EM data model. Extensive work in the area of semiautomatic extraction has been done, so far mainly focusing on extraction based on information about the structure (i.e., the HTML tags) of the source (see [Crespo et al.]). We plan to look into using ontologies that describe the source and application domain to improve on the semiautomat-ic generation of extraction grammars or templates.</p><p>The current T SIMMIS prototype implements mediators that are, as already mentioned, sensitive to the query processing capabilities of the sources they integrate.</p><p>In order for the T SIMMIS mediators to generate capability sensitive plans for user queries they need to explore a large space of possibilities stemming from the different orders in which the sources are accessed by way of bind joins [Li et al.98]. When large numbers of sources participate in integrated views provided by a mediator, the task of ?nding ef?cient fea-sible plans for user queries on the integrated views becomes very challenging. We are currently exploring novel techniques to enable T SIMMIS mediators in providing capability sensitive query processing over large sets of data sources.</p><p>Acknowledgements</p><p>I would like to thank Ramana Yerneni for providing me with the paragraph on the scalability of capability-based mediation.My thanks go also to all members of the Stanford database group, especially the current and former participants in the T SIMMIS project for their contributions to the project and to Vasilis Vassalos for helpful comments on an earlier draft.</p><p>References</p><p>[Chawathe et al. 94] S. Chawathe, H. Garcia-Molina, J. Hammer, K.</p><p>Ireland, Y . Papakonstantinou, J. Ullman, and J. Widom. The TSIMMIS Project: Integration of Heterogeneous Information Sources. In Proc. IPSJ Conference , Tokyo, 1994.</p><p>[Crespo et al.] A. Crespo, E. Neuhold, M. Rys, and R. Studer. Semiau-tomatic Generation of Extraction Rules. b9b62c3a376baf1ffc4fad78/~rys/tsimmis/extract/.</p><p>[Garcia-Molina et al. 97] H. Garcia-Molina, Y . Papakonstantinou, D.</p><p>Quass, A. Rajaraman, Y . Sagiv, J. Ullman, V . Vassalos, and J.Widom. The TSIMMIS Approach to Mediation: Data Models and Languages. Journal of Intelligent Information Systems , 1997.[Hammer et al. 97b] J. Hammer, H. Garcia-Molina, Y . Cho, R. Aranha,</p><p>and A. Crespo. Extracting Semistructured Information from the</p><p>Web. In Workshop on Management of Semistructured Data , Tus-con, AZ, May 1997.</p><p>[Hammer et al. 97c] J. Hammer, H. Garcia-Molina, S. Nestorov, R.</p><p>Yerneni, M. Breunig, and V . Vassalos. Template-Based Wrappers in the TSIMMIS System. In Proc. SIGMOD Conference , pages 532–535, 1997.</p><p>[Hammer et al. 97c] J. Hammer, J. McHugh, and H. Garcia-Molina.</p><p>Semistructured D ata: The TSIMMIS Experience. In Proc.ADBIS '97, St. Petersburg, Russia, Sept. 1997.</p><p>[Kifer/Lausen 89] M. Kifer and G. Lausen. F-Logic: A Higher-order</p><p>Logic for Reasoning about Objects, Inheritance, and Schemes. In Proc. SIGMOD Conference , pages 143–146, 1989.</p><p>[Li et al. 98] C. Li, R. Yerneni, V . Vassalos, H. Garcia-Molina, Y .</p><p>Papakonstantinou, J. Ullman, and M. Valiveti. Capability Based Mediation in TSIMMIS. In Proc. SIGMOD Conference, pages 564–566, 1998.</p><p>[L ORE ] LORE: A Lightweight Object Repository for Semistructured</p><p>Data. b9b62c3a376baf1ffc4fad78/lore .</p><p>[Papakonstantinou et al. 96b] Y . Papakonstantinou, S. Abiteboul, and</p><p>H. Garcia-Molina. Object fusion in mediator systems. In Proc.VLDB Conference , 1996.</p><p>[Papakonstantinou et al. 96 a] Y . Papakonstantinou, H. Garcia-Molina,</p><p>and J. Ullman. MedMaker: A Mediation System Based on Declarative Speci?cations. In Proc. 12th ICDE , pages 132–141,New Orleans, Louisiana, Feb. 1996.</p><p>[Papakonstantinou et al. 95a] Y . Papakonstantinou, H. Garcia-Molina,</p><p>and J. Widom. Object Exchange across Heterogeneous Informa-tion Sources. In Proc. 11th ICDE , pages 251–260, Taipei, Tai-wan, Mar. 1995.</p><p>[Papakonstantinou et al. 95b] Y . Papakonstantinou, A. Gupta, H.</p><p>Garcia-Molina, and J. Ullman. A Query Translation Scheme for Rapid Implementation of Wrappers. In Proc. DOOD Conference ,1995.</p><p>[T SIMMIS ] TSIMMIS: The Stanford-IBM Manager of Multiple Infor-mation Sources. b9b62c3a376baf1ffc4fad78/tsimmis .</p><p>[Vassalos/Papakonstantinou 97] V . Vassalos and Y . Papakonstantinou.</p><p>D escribing and Using Query Capabilities of Heterogeneous Sources. In Proc. VLDB Conference , pages 256–266, 1997.</p><p>[W HIPS ] Whips: Data Warehousing at Stanford University. b9b62c3a376baf1ffc4fad78/warehousing .</p><p>[Wiederhold 92a] G. Wiederhold. Mediation in the architecture of fu-ture information systems. IEEE Computer, Mar. 1992. pp.38-49.[Wiederhold 92b] G. Wiederhold. The roles of arti?cial intelligence in</p><p>information systems. Journal of Intelligent Information Systems ,pages 35–56, 1992. V ol.1 No.1.</p><p>[X ML ] W3 Consortium. Extensible Markup Language XML. http://</p><p>b9b62c3a376baf1ffc4fad78/XML .</p><p>Global Information Systems</p><p>14INFORMATIK ? INFORMATIQUE 5/1998</p><p>Collecting and Querying Medical Information on the Internet</p><p>Epaminondas Kapetanios, Moira C. Norrie, Julian Schilling</p><p>We present the design and implementation issues for a scienti?c information system for collecting and analysing data as related to medical applications concerning decision support. The system relies on the requirements of ad-hoc querying over the Internet of information patterns to be consulted in support of a decision making process. These patterns may be propositional rules arising from practical experience or generated from data analysis. On the other hand, the Internet is being used as an entry point for collecting historical data with an operational database from various sites. It will provide the veri?cation platform for information patterns.</p><p>Introduction</p><p>Collecting and analysing data has been one of the major issues for ensuring quality and providing predictions in various application domains. Patterns of information , in terms of pro-positional rules, as well as patterns of data , in terms of summa-rised description of data (sub)sets [Johnson/Bhattacharyya 96],provide a more general knowledge which refers to data collec-tions standing for empirical data or observations.</p><p>A major problem to overcome when developing such a sys-tem is the simplicity of gathering data and posing ad-hoc que-ries addressing patterns of information over the Internet [Han et al. 96]. The usage of an Internet browser simpli?es the sys-tem access and makes results of data analysis widely available.These particular requirements had to be met within a scienti?c information system for quality management in medicine, called the Second Opinion System – SOS [Kapetanios et al. 97]. The system is being developed in collaboration with the Institute for</p><p>Social and Preventive Medicine at the University of Zurich. As a ?rst stage, the representation issues and an intuitive querying interface for empirical rules or guidelines referring to three main medical classes of consultancy have been addressed:a) Coronary Angiography: Cases where a decision must be made for a patient to undergo a medical examination for car-diology matters,</p><p>b) Revascularisation: Cases where a decision must be made for a patient to undergo surgical intervention,</p><p>c) Hysterectomy: Cases where a decision must be made for a female patient to undergo surgical intervention.</p><p>In all of these cases, a set of properties and their correspond-ing qualitative or categorical values are involved, the combina-tion of which result in various patterns of information. These patterns may be empirical rules or guidelines due to the case under consideration. An example of an information pattern for the cases of coronary angiography is:</p><p>?X.Clinical case = “atypical angina” AND X.Stress test = “positive” AND X.Sex = “male” AND X.Age ≥ 75</p><p>? X.Appropriateness = 6.0</p><p>The terms of the pattern are basically < property, value >pairs, the combination of which result in a particular pattern.This can be characterised as a propositional rule by classifying some terms as head and others as body . An intuitive Internet based querying interface has been designed and implemented with the purpose of guiding users in their querying of informa-tion patterns based on the current context as determined by pre-vious inputs. A generic model for the representation of context-based patterns of information underlies the implementation. It facilitates the maintenance of a number of information patterns within various contexts.</p><p>A further requirement arises from the fact that these informa-tion patterns have to be veri?ed against collections of data gath-ered from various clinical stations and hospitals. Since the same set of parameters and values is concerned, data collection also takes place on the Internet with a slightly modi?ed user interface. Therefore, in a second stage, the system is being</p><p>1</p><p>Global Information Systems</p><p>INFORMATIK ? INFORMATIQUE 5/199815</p><p>expanded by adding an operational database, which gathers</p><p>data referring to inpidual patients and medical cases at irreg-ular intervals.</p><p>Architectural considerations</p><p>D esign and implementation of scienti?c and statistical information systems require a multi-layered system architec-ture which enables the interaction with data and knowledge at two different levels [Shoshani 93, Kapetanios 96, Shoshani 97].We mainly distinguish between operational databases – to be found in the back-end layer of ?gure 1 – where data are collect-ed on a regular or irregular basis and knowledge bases where patterns of information are expressed and queried in terms of generalised or propositional rules – to be found in the middle layer of ?gure 1. For the Second Opinion System, patterns of information are speci?ed by suggestions from panels of experts and should be veri?ed against collections of empirical data.A further classi?cation of such systems relies on the nature of data, which can be mainly characterised as qualitative/categor-ical data or numerical data [Johnson/Bhattacharyya 96]. Qualita-tive or categorical data refer to properties or characteristics un-der investigation which are not numerically measured or their values are described by value ranges, e.g. gender with values male , female , height with values small , medium , large , respec-tively. On the other hand, numerical or measurement data refer to properties which are measured on a numerical scale. In this case, discrete or continuous variables refer to a data set accord-ing to the underlying measurement scale. In our case, most properties are characterised as qualitative or categorical .</p><p>In order to enable collection and analysis of data through the Internet, the middle layer has been enhanced by an Internet Database access Server , which enables the construction of database interactive web pages by abstracting away from CGI based programming issues. The Internet Database Server inter-prets extended HTML documents for the interaction with the knowledge base for querying facilities and the operational database for data entries. In the front-end layer, clients, on which Internet browsers are running, interact with both knowl-edge and data holding components.</p><p>In the following section, the representational issues for infor-mation patterns within a knowledge based component is described.</p><p>The knowledge based component</p><p>As stated above, the knowledge base is mainly concerned with structural and behavioural issues of patterns of informa-tion such that propositional and generalised rules can be ex-pressed dynamically. Furthermore, a context based, user guid-ing querying interface is implemented which relies upon the represented knowledge in terms of context forming informa-tion spaces. The major structural elements of the knowledge base are properties and descriptive values which are represented as objects being members of collections . Consider, for exam-ple, the following propositional rules:</p><p>?X.Clinical case = “atypical angina” AND X.Stress test = “positive” AND X.Sex = “male” AND X.Age ≥ 75</p><p>? X.Appropriateness = 6.0</p><p>?X.Clinical case = “atypical angina” AND X.Stress test = “positive” AND X.Sex = “male” AND X.Age < 75 AND</p><p>X.Risk factor = “one or more”</p><p>? X.Appropriateness = 9.0 AND X.Necessity = 8.0?X.Clinical case = “chronic stable angina” AND X.Angina = “mild exertion” AND X.Medical therapy = “optimal” AND X.Stress test = “positive” AND X.Age < 75</p><p>? X.Appropriateness = 9.0 AND X.Necessity = 9.0</p><p>Various combinations between properties and descriptive values are considered in order to address a particular pattern of information due to a given context as determined by the medi-cal case under consideration. A schematic presentation of con-texts as formed by those combinations can be viewed in ?gure 2. Incorporating new and adjusted information patterns become a matter of manipulating data instances and their associations rather than changing a rule base or database schema. For exam-ple, the associations between properties and set of qualitative or categorical values , as depicted in ?gure 2, determine the subcontexts of atypical angina and chronic stable angina ,which, in turn, determine the context coronary angiography . If represented as a collection of rules such as a production rule system for expert systems, it is rather tedious to maintain rules due to dynamic changes of their speci?cation. The head and the</p><p>2</p><p>3</p><p>Global Information Systems</p><p>16INFORMATIK ? INFORMATIQUE 5/1998</p><p>of generalised rules.On the other hand, choosing a database schema [Chaudhuri/Dayal 97] in order to represent dynamically changing patterns of information, where properties are explicitly represented as</p><p>attributes, requires modi?cation of the database schema itself,in order to cope with dynamic issues. Moreover, viewing de-scriptive values as objects enables the explicit representation of summarisation and description issues of the overall pattern of collections of empirical data (sub)sets as stored within the operational database in the back-end layer, e.g. frequencies of occurrence within a particular sample as formed by space-time boundaries.</p><p>The generic character of the proposed model for the organi-sational structures of information patterns enables the expres-sion and accommodation of context speci?c information pat-terns without changes of particular structural properties encoded within types. Based on this model, we started repre-senting all possible combinations between properties and descriptive values in terms of associations holding within the context of coronary angiography . Moving to another context, e.g.revascularisation , all that was required is to specify new associ-ations and add new properties or descriptive values as objects according to the new context.</p><p>Based on this model, querying information patterns over the Internet is enabled by navigation of context-speci?c paths to be followed. Each time a query has to be further speci?ed and ex-tended, the appropriate associations holding between the cur-rent properties and descriptive values as well as associations to related properties – speci?cation of neighbourhoods – are que-ried in order to proceed further. In other words, the dynamic as-pects of dealing with such information patterns is basically</p><p>covered by the manipulation of associations rather than struc-tural types.</p><p>A navigation example through contexts in order The historical data component</p><p>Since information patterns must be veri?ed Does it hold that These queries are formed with the help of</p><p>In other words, we would like to verify the fol-?X.Clinical case = “atypical angina” AND X.Stress test = “positive” AND X.Sex = “male” AND X.Age ≥ 75 ? X.Appropriateness = 6.0 [unispital , 1998, 70]with the component for historical data. It is stored in a com-mercial relational D BMS, since the emphasis is put on per-formance and not on the complexity and expressiveness of the data model. This results in the query, as stated below,4</p><p>Figure 3: Querying information patterns through context speci?c selections</p><p>Global Information Systems</p><p>INFORMATIK ? INFORMATIQUE 5/199817</p><p>SELECT * FROM unispital.patients partition (year1998)WHERE Clinical case = “atypical angina” AND Stress test = “positive” AND</p><p>Sex = “male” AND Age ≥ 75 AND Appropriateness = 6</p><p>Note that space-time related partitioning of data collections has been taken into consideration in order to increase the over-all performance of the system, in conjunction with suitable physical parameters in order to tune the operational database towards insert operations and not update ones. Performance is a crucial issue for historical data holding components, since range queries are expected for data analysis purposes which address big amounts of data.</p><p>Conclusion</p><p>We presented an Internet based scienti?c information system for collecting and statistically analysing data sets coming from various hospitals and clinical stations. The purpose is to statis-tically verify empirical or generalised rules as guidelines for decision support within the area of medical diagnostics or sug-gestions. Initially, we covered diagnostics and suggestions made for coronary angiography, and revascularisation, in the ?eld of cardiology, and for hysterectomy in the ?eld of gynae-cology.</p><p>The system relies upon a three-layered architecture where knowledge referring to and describing the underlying observa-tional data is provided at the middle layer which has been im-plemented on Windows-NT platforms. Additionally, an Inter-net D atabase access Server enables the construction and interpretation of database interactive Web pages which are used in order to collect data and query the knowledge available by using Internet browsers at the client sites – front layer [Kap-etanios et al. 98]. At the back-end layer, which is currently un-der development, collections of data are stored in an operation-al database providing historical data as a veri?cation platform for propositional or generalised rules.</p><p>Acknowledgements: Many thanks go to Robert Ritler who helped us in realising a ?rst prototype of the system as a student of the department of computer science, ETH Zurich.</p><p>References</p><p>[Chaudhuri/Dayal 97] S. Chaudhuri and U. Dayal. An Overview of</p><p>D ata Warehousing and OLAP Technology. SIGMOD Record ,26(1):65–74, March 1997.</p><p>[Huang et al. 96] J. Han, Y . Huang, N. Cercone, and Y . Fu. Intelligent</p><p>Query Answering by Knowledge D iscovery Techniques. IEEE Transactions on Knowledge and Data Engineering , 8(3):373–390, June 1996.</p><p>[Johnson/Bhattacharyya 96] R. A. Johnson and G. K. Bhattacharyya.</p><p>Statistics: Principles and Methods. John Wiley and Sons, Inc., 3rd edition, 1996.</p><p>[Kapetanios 96] E. Kapetanios. Extracting and Providing Knowledge</p><p>in an Object-Oriented Scienti?c Information System for Atmos-pheric Research. In Proc. 8th Inter. Conf. on Scienti?c and Statis-tical Databases , Stockholm, Sweden, June 1996. IEEE Computer Society Press.</p><p>[Kapetanios et al. 98] E. Kapetanios, M.C. Norrie, R. Ritler, K. Faisst,</p><p>and J. Schilling. Querying Knowledge Objects for Qualitative Reasoning in Medicine through an Intelligent Querying User In-terface. Arti?cial Intelligence in Medicine , 1998. draft paper.[Kapetanios et al. 97] E. Kapetanios, R. Ritler, and J. Schilling. http:/</p><p>/macdonald.inf.ethz.ch:12, 1997. Prototype implementation of the knowledge based context speci?c querying of empirical rules.[Shoshani 93] Arie Shoshani. A Layered Approach to Scienti?c Data</p><p>Management at Lawrence Berkeley Laboratory. Bulletin of the Technical Committee on Data Engineering , 16(1):4–8, 1993.[Shoshani 97] Arie Shoshani. OLAP and Statistical Databases: Simi-larities and Differences. ACM TODS , 1997.</p><p>Mosaic</p><p>18INFORMATIK ? INFORMATIQUE 5/1998</p><p>CEPIS Position Statement regarding</p><p>Electronic Commerce</p><p>Introduction</p><p>Electronic Commerce (“e-com-merce”) currently attracts a lot of attention. There is a European In-itiative, COM(97)1571, press arti-cles appear almost daily and sci-enti?c journals regularly discuss selected topics in the area 2. It cov-ers a wide variety of commerce-related activities, which have in common that some form of elec-tronic communication is involved,using a private or a public net-work. Today’s value of e-com-merce transactions is already large and is bound to increase considerably over the next few years.</p><p>Any value in any domain is based on mutual trust . E-com-merce is no exception. Trust may be relative: limited trust (implying the acceptance of a certain degree of risk) does not mean rejection,but the greater the trust, the higher will be the associated values.Hence, e-commerce may be ex-pected to thrive especially if the set-up of both the supporting sys-tems and the procedures for their use can be truly trusted. Thus mechanisms should be available to demonstrate correct function-ing of the underlying technology,</p><p>but this is not enough. Whilst the state of the art offers reasonably dependable and ef?cient (al-though never fully secure) servic-es, personal discipline , organisa-tional arrangements and legal regulations are often insuf?cient and sometimes simply counter-productive.</p><p>CEPIS’ position regarding these three problem aspects and their potential cures (discipline :education, arrangements : codes of good practice, regulations : ap-propriate international agree-ments) is summarised in the fol-lowing sections. In some respects,there is cause for concern.</p><p>De?nitions</p><p>There is no generally accepted de?nition of “e-commerce”. As viewed by CEPIS, e-commerce comprises all marketing and sales of free provision of goods and services of which some part is ar-ranged via a private or a public electronic network. Typical exam-ples are the use of chipcards for payments or for the storage and transmission of medical data, ad-vertising and selling tangible or intangible goods and services via the Internet, placing banking and stock exchange orders via special-ised nets, and connection to sun-dry information services on public cable nets.</p><p>A distinction should be made between:Report</p><p>1. http://www.ispo.cec.be/Ecommerce</p><p>2. See e.g. feature issue of INFOR-MATIK/INFORMATIQUE,</p><p>D ecember 1996, feature issue of</p><p>ecision Support Systems,November 1997, and Comm ACM, March 1998.</p><p>ways free of charge, in addi-tion to the network connection</p><p>costs),</p><p>(b)information with the intent of selling goods or services (i.e.marketing ),</p><p>(3)transactions via a network (placing orders, order accept-ance, invoicing, etc.).</p><p>The ?rst category gradually tends to overtake other forms of public information (parliamentary records, promulgation of legal texts, telephone directories, public transport time tables, of?cial noti-?cation via the press and other tra-ditionally paper based communi-cations).</p><p>The second category is not lim-ited to the Internet. It is a common feature of special networks (such as restricted banking services)and, strictly speaking, TV com-mercials are a manifestation of it,too. These forms of electronic communication based marketing may be compared to enclosing un-solicited, that is enclosed regular-ly contracted or occasionally ac-quired services (newspapers bought in a kiosk, journals one has subscribed to, bank statements,municipal services statements,etc.).</p><p>The third category is more com-plex, in that several steps are mostly needed before a translation may be deemed completed. It is this category that is normally as-sociated with “e-commerce”, as such. Electronic marketing (CE-PIS’ second category), i general,is tacitly assumed constituting a subset of it. However, there are good reasons for separate treat-ment.</p><p>Trust In the case of electronic trans-actions the well-known qualities</p><p>tegrity), authenticity and non-re-pudiability are desirable. Unfortu-nately, credit card companies,banks and mail order houses often accept insecure orders just to win customers: the weaker party in the market may have to forgo some of the desired qualities. Conversely,fraudulent use may result when an electronic invoice might be repu-diated, not to mention abuse of other persons’ credit.</p><p>However, the same require-ments are also indirectly essential for the ?rst two categories. CEPIS views with concern a number of current developments. Firstly, the common lack of public under-standing makes it dif?cult to dis-tinguish hype and truly worth-while opportunities. Secondly, the widespread lack of discipline (both with providers and recipi-ents of services) may lead to fail-ures that ultimately harm potential customer acceptance. Lastly, the debate over security and “legal ac-cess” may obscure the economic issues, as well as the freedom of expression and privacy aspects.Current situation</p><p>Currently, a variety of arrange-ments exist. Concern has been ex-pressed regarding transactions in which unscrambled credit or bank card data is transmitted over pub-lic networks. However, in the physical counterpart of these (say handing a credit card to a waiter, a bank card to a sales person), abuse would also be possible, but does not seem to be high on anyone’s agenda 3. Even more debatable are</p><p>3. PIN procedures are beginning to</p><p>come under increased scrutiny;also it is in the interest of credit card companies to cut down on fraud.</p><p>Mosaic</p><p>INFORMATIK ? INFORMATIQUE 5/199819</p><p>attempts – national security and/or crime prevention inspired – at legislation and regulation – and even prohibition – of the use of “encryption”.</p><p>Earlier, CEPIS has expressed the view that there should be no obstacle to the availability of strong encryption and that access to encryption keys (via so-called “trusted third parties”, involving what is known as “key escrow”),should be avoided or, if deemed necessary, possible only under the strictest legal protection. Abuse of legal (but often in fact illegal) ac-cess, e.g. via wire tapping, is a characteristic not only of police states. It should not be extended to electronic communication [CE-PIS position: http://wi.leidenun iv.nl/~verrynst/cepislsi].Additionally, most effort is aimed at providing security for or-ganisations. No technology has been developed as yet to enable private users, sa users of e-com-merce services, to produce docu-ments in a safe way, themselves.Especially current solutions for digital signatures tend to ignore the fact that there are many possi-bilities to make users sign docu-ments that are completely differ-ent from what is shown on their screens. This is mainly caused by insecure operating systems and by the lack of secure displays, e.g. on current chipcard or signature equipment. Yet, even if these weaknesses are overcome, there remains the problem that “securi-ty between boxes” should be de-monstrably supplemented by safe procedures around them.</p><p>There are not many guarantees regarding the quality of what is circulated via networks, the more so when it extends across national borders. Nationally, advertising codes of conduct may be applied,but strict enforcement is notori-ously dif?cult. In fact, CEPIS fa-vours self-constraint, but “com-plaints boards” may ultimately be accepted, both nationally and in-ternationally.</p><p>There is de?nite cause for con-cern about the newly emerging regulations for copyright of elec-tronically circulated material. If such publications can be and are</p><p>unreasonably pirated, strong regu-lations make sense, provided these are workable. In particular,they should not prevent well es-tablished access to public infor-mation or practically pre-empt economically attractive electronic distribution of interesting materi-al.</p><p>Finally, there is a lack of aware-ness of the potential of e-com-merce. Since increased freedom and scope of commercial inter-change must be considered glo-bally bene?cial, there is a world-wide task of promoting “e-com-merce literacy”.</p><p>Recommendations</p><p>On the basis of the above, CE-PIS recommends the following:(1)E-commerce considered bene?cial</p><p>Electronic Commerce should be considered bene?cial and deserv-ing global protection and encour-agement (legal and technical),such that it will enjoy a high level of general trust.</p><p>(2)E-commerce related reg-ulation to be instituted wisely ? Some public regulation is needed to avoid the strongest parties dic-tating the rules. Users and cus-tomers need enhanced protection,e.g. when they would be forced to use unilaterally secure communi-cation that only protects their counterparts.</p><p>? In the full range of e-commerce-related activities, a variety of legal and other kinds of regulation are needed: public information should be subject to quality guar-antees, marketing information should be truthful and unsolicited,commercial transactions should be secure and capable of legal enforcement.</p><p>? Since the strictest forms of regu-lation may lead to self-defeating arrangements, one often has to settle for lesser security – howev-er, all parties (including non-experts) should b made aware of the bene?ts and risks involved,and how to view a balance of these.</p><p>(3)E-commerce messages to be ensured con?dentiality</p><p>Messaging related to e-commerce should be ensured con?dentiality,</p><p>i.e. be accessible only to the par-ties involved in the commercial transaction intended or conclud-ed.</p><p>(4)E-commerce challenges to governments</p><p>Governments should be encour-aged to pass suitable legislation (guaranteeing freedom of expres-sion, promoting quality control,ensuring legally binding arrange-ments, including signature rules),and mutually harmonising their legislation such that internation-ally trusted arrangements result (providing equitable consistent taxation and effective internation-al law enforcement).</p><p>(5)E-commerce challenges to professional organisations</p><p>Professional organisations and other international institutions,such as chambers of commerce,organisations of notaries and computer societies, should pro-mote good practice through in-formative and educational pro-grammes; these should take cognisance of and add to interna-tional recommendations, such that an effective basis for develop-ment and acceptance of e-com-merce will ensue.</p><p>In summary, CEPIS considers e-commerce a desirable develop-ment, given appropriate govern-mental and societal regulation and discipline. Speci?cally, the devel-opment of appropriate standards and generally accepted codes of good practice and codes of con-duct are recommended. Associat-ed with these should be the insti-tution of competent complaint boards and other forms of assist-ance.</p><p>For further information, please contact CEPIS:</p><p>–CEPIS Network Legal & Se-curity Issues [lsichair@b9b62c3a376baf1ffc4fad78 and URL above]</p><p>–CEPIS Secretariat [secre-tary@b9b62c3a376baf1ffc4fad78 and b9b62c3a376baf1ffc4fad78]</p><p>Business Round Table on Global Communications</p><p>On 29 June 1998, Mr. Bange-mann, Member of the European Commission, invited business leaders from around the world to participate in a round table discus-sion on global communications is-sues. The objective of the meeting was to explore the need for strengthened international coordi-nation.</p><p>Among the main questions ad-dressed were: “What are the most urgent obstacles and what are the most effective means to remove them?”, and “What method of coordination is best suited to respond rapidly and effectively to new challenges?”</p><p>The emerging on-line economy presents new challenges to both private and public sectors. The most urgent issues identi?ed by business; Taxation, Tariffs, IPRs,Encryption, Authentication, Data Protection and Liability were dis-cussed.</p><p>We agreed that there is a need for improved cooperation be-tween business and governments on critical issues for the global on-line economy. This cooperation would provide substantial bene?ts to businesses and consumers around the globe. Consumer inter-ests should therefore be taken into consideration. Con?icting poli-cies, rules and regional patch-work-regulations are obstacles to our business. Therefore, strength-ened coordination between indus-try, governments and international organisations is required.</p><p>In view of the global character of the on-line economy, regulation must be kept to a minimum, be in-ternationally consistent and trans-parent. It should be proportionate to clearly de?ned objectives. The global and perse nature of the on-line economy makes it impos-sible for any single government or body to regulate. As a conse-quence, industry self-regulation is the preferred approach. Various international and bilateral busi-ness dialogues have already iden-ti?ed priorities for action to deal with regulatory obstacles: How-ever, business coordination must be improved on a global level.</p><p>Mosaic</p><p>20INFORMATIK ? INFORMATIQUE 5/1998</p><p>At today’s meeting, industry papers were submitted as a basis for discussion. It has been agreed to further elaborate on them: Ad-ditional contributions made by the round table participants and by other businesses shall be included.Therefore, it has been proposed to set up a Business Steering Com-mittee, representing businesses form all regions of the world, to ensure that this initiative remains business-led and global.</p><p>With a view to establishing closer cooperation at a global lev-el, the industry leaders present in the meeting announced that they have taken the initiative to set in motion a new Global Business D ialogue, to which governments and international reorganisations will be invited. The task of the Steering Committee will be to make proposals on the process of further cooperation in a Global Business D ialogue. Such a proc-ess could build on the successful experiences of existing models of bilateral industry cooperation.A global business dialogue should focus on clearly identify-ing solutions, and providing input on regulation or business self-reg-ulatory codes of conduct in con-sultation with governments and international organisations. The business leaders envision as a pos-sible part of this process, a series of business-led and organised meetings, working groups, and conferences. The purpose is to de-velop and present a global busi-ness consensus to governments and international organisations for further actions and co-operation.The Business Steering Committee will announce this September the date, place and proposed agenda of the ?rst conference of the Glo-bal Business Dialogue, to occur in the ?rst half of 1999.</p><p>Theorie der Turing-Maschinen</p><p>Oswald Wiener, Manuel Bonik, Robert H?dicke:</p><p>Eine elementare Einführung in die Theorie der Turing- Maschinen</p><p>Springer-Wien, NewYork, 1998, 283 Seiten, 78 Abbildungen, Diskette mit Turing-Maschinen-Simulator. ISBN 3-211-82769-2Auch wenn dieses Buch nur “eine elementare Einführung in die Theorie der Turing Maschi-nen” vermittelt, handelt es sich nicht um einfache Lektüre. D ie Autoren verstehen es, den Leser langsam aber sehr zielstrebig auf einige der fundamentalen Er-kenntnisse der theoretischen In-formatik hinzuführen. Dabei emp-?ehlt es sich sehr, die zahlreichen übungen mitzumachen und mit-tels der beigefügten Software aus-zutesten. Nur so k?nnen auch die schwereren Kapitel gegen Ende des Lehrbuches wirklich verstan-den werden.</p><p>Besonders positiv aufgefallen ist der Versuch, den Leser sehr genau in die Theorie der Turing-Maschinen einzuführen. D as gilt sowohl für die Beispiele als auch für die übungsl?sungen. Zudem kann man in dem Buch einige sch?ne Beweise ?nden, die sonst in der Art nicht in Lehrbüchern gegeben werden. Da dabei auf die sonst üblichen Formalismen weit-gehend verzichtet wurde, erf?hrt der Leser zwingend einen algo-rithmischen Zugang zur theoreti-schen Informatik. D ass auch in diesem Buch der direkte Zusam-menhang zu Software, Algorith-men und Rechenarchitekturen nur wenig herausgearbeitet wird, ist schade. D ennoch emp?ehlt sich die Lektüre für alle Informatiker,die (erneuten) Zugang zu einem wichtigen Themenbereich der In-formatik ?nden wollen.</p><p>Dr. Thomas Bühlmann</p><p>Buchbesprechungen ? Notes de lecture</p><p>Book Reviews</p><p>Noch mehr speichern auf noch weniger Platz</p><p>nfp . Zürcher Physiker sind dar-an, im Rahmen des Nationalen Forschungsprogramms “Nano-wissenschaften” (NFP 36) des Schweizerischen Nationalfonds eine Technologie zu entwickeln,dank der bei der Miniaturisierung von Speicherplatz ein Quanten-sprung gelingen k?nnte. Die heu-tigen Halbleiterspeicher speichern auf einem Quadratmillimeter 10’000 Bits. Speicher der neuen Generation k?nnten auf derselben Fl?che 10’000 mal mehr, d.h. 100Millionen Bits aufnehmen. D ie Forscher am Institut für Quanten-elektronik der ETH Zürich haben es fertig gebracht, dank einer neu-en Technik Information im Kleinstmassstab festzuhalten. Als Schreib??che verwenden sie fer-roelektrische Materialien. An de-ren Ober??che treten als einzelne Bildpunkte winzig kleine elektri-sche Felder auf, die sich durch Anlegen eines ?usseren elektri-schen Feldes in die Gegenrich-tung umklappen lassen. Als Schreibwerkzeug dient ein Ra-sterkraftmikroskop, mit dem Bild-punkte gezielt in die eine oder an-dere Richtung gedreht werden k?nnen. Das Resultat erscheint als Hell-D unkel-Bild am Computer-bildschirm: beispielsweise Schriftzeichen, deren Striche in Wirklichkeit 0.5 tausendstel Mil-limeter schmal sind.</p><p>Auskünfte: Dr. Lukas Eng, In-stitut für Quantenelektronik,ETHZ, 8092 Zürich.</p><p>News</p><p>Schweizer Informatiker Gesellschaft ? Société Suisse des Informaticiens</p><p>INFORMATIK ? INFORMATIQUE 5/199821</p><p>Einladung zur Konferenz Electronic Commerce</p><p>und zur Gereralversammlung der SI</p><p>Freitag, 23. Oktober, Eintritt frei</p><p>IBM Bildung und Beratung, Auditorium, Hohlstr. 600, Zürich</p><p>Invitation à la conférence Electronic Commerce et</p><p>à l’Assemblée générale de la SI</p><p>Vendredi 23 octobre Entrée libre</p><p>IBM Bildung und Beratung, Auditorium, Hohlstr. 600, Zürich Programm / Programme</p><p>13:30–13:45Einführung / Introduction Dr. Isabelle Petoud & Peter</p><p>Mettler IBM</p><p>13:45–14:15Leveraging Web Business with electronic competencies:</p><p>practical cases Dr. Dieter Wenger</p><p>14:15–14:45Distributed Networking in Support of Electronic Com-merce Dr. Stiller</p><p>Herausforderungen und Erfahrungen bei der Realisierung eines E-Commerce Projektes durch Migros und IBM:</p><p>14:45–15:00Kurze Einführung in das Projekt Heinz Rüst</p><p>15:00–15:20Demonstration des Migros Online Shops Heinz Rüst und</p><p>Alexander Dal Farra</p><p>15:20–15:50Ist der Markt bereit Nahrungsmittel über das Internet</p><p>einzukaufen? Alexander Dal Farra</p><p>15:50–16:20Wo liegen die Herausforderungen zur Realisierung eines</p><p>e-commerce Projektes Heinz Rüst</p><p>16:20Generalversammlung / Assemblée générale 17:15 Apéro</p><p>Leveraging Web Business with electronic competencies: practical cases</p><p>We promote the idea of the Competent Electronic Salesman supporting E-Commerce. This we call Freetext, Competence-Assist-ed E-Commerce. Systems based on this approach enable customers to a competence-assisted self-service. The traditional E-Com-merce suffers under a severe lack of competence! As a consequence the client’s way to the appropriate product or service is painful with respect of time and effort. Under the competent, electronic assist-ance by the supplier the custom-er’s needs are promptly and indi-vidually satis?ed. The supplier’s time and money is saved by the self-service of the customers, the customer’s by a competent and in-pidual assistance. This kind of system understands Freetext and offers proactively products and</p><p>other services due to its incorpo-rated electronic competence (E-Competence). Such systems dis-tributed to the various business units of a company can be com-bined to build a competent elec-tronic market place.</p><p>Distributed Networking in Support of Electronic Com-merce</p><p>Electronic Commerce requires a networking infrastructure capa-ble of supporting a variety of serv-ices. Depending on these service’s characteristics, different layers of communication middleware are responsible for their provision.This talk sketches proposed frameworks for Electronic Com-merce, identi?es important com-munication and services support areas, and outlines important re-maining research questions.Herausforderungen und Erfah-rungen bei der Realisierung eines E-Commerce-Projektes durch Migros und IBM</p><p>Jede Unternehmung, die ein E-Commerce-Projekt realisieren will, muss sich bewusst sein, dass nebst vielen erwarteten Heraus-forderungen v?llig unerwartete auf sie zukommen werden, mit denen sie sich noch nie oder schon sehr lange nicht mehr befasst hat.D iejenigen der IT sind ja noch vorhersehbar – auch wenn nie-mand ernsthaft voraussagen kann,welche Standards sich im Internet wirklich durchsetzen werden. Die unerwarteten liegen vor allem in den betriebswirtschaftlichen Aspekten aber auch darin, wie die Menschen – K?ufer und Anbieter – mit dem neuen Medium umge-</p><p>hen. Je schneller sich eine Unter-nehmung mit all diesen Aspekten befasst, um so besser wird sie für die zukünftige Bew?ltigung ihres Gesch?ftes gerüstet sein.Kann E-Commerce den</p><p>t?glichen Lebensmitteleinkauf ersetzen?</p><p>E-Commerce wird heute vor allem im NonFood-Sektor einge-setzt. D er Verkauf von Soft- und Hardware, CD s, Büchern und Elektroapparaten ist bereits eta-bliert. Doch wie steht es mit dem traditionellen Einkauf von Frisch-produkten? Kann E-Commerce den Gang in den Supermarkt ersetzen? Sind die Konsumenten heute bereits soweit, dass sie Fleisch, Früchte und Milchpro-dukte via Mausklick ordern? Die Migros hat im letzten Jahr in Zusammenarbeit mit der IBM ein E-Commerce-Produkt entwickelt,das seit dem 12. Mai 1998 für die ?ffentlichkeit in den Regionen Bern und Zürich zug?nglich ist.Seit kurzem kann auch in den Regionen Solothurn und Aargau virtuell eingekauft werden; die gesamtschweizerische Verbrei-tung ist in Planung. Alexander Dal Farra ist seit Beginn des Projektes mit dabei und kennt die Klippen von Grunde auf, die es bei der Realisierung dieses Pionierpro-jektes zu umfahren galt.</p> <p>本文来源:<a href="https://www.bwwdw.com/article/72dl.html">https://www.bwwdw.com/article/72dl.html</a></p><span class="doc-download-e"></span> </div> <script type="text/javascript">s("download_bottom");</script> <div class="related_article"> <div class="related_top"><code>相关文章:</code></div> <ul><li><a href="https://www.bwwdw.com/article/72dl.html" target="_blank" title="Prof. Dr. Helmut Schauer, Prof. Dr. Beat Schmid,">Prof. Dr. Helmut Schauer, Prof. Dr. Beat Schmid,</a></li><li><a href="https://www.bwwdw.com/article/etbf.html" target="_blank" title="Dr. Seuss 苏斯博士名人名言">Dr. Seuss 苏斯博士名人名言</a></li><li><a href="https://www.bwwdw.com/article/vlwt.html" target="_blank" title="国产DR分析">国产DR分析</a></li><li><a href="https://www.bwwdw.com/article/7jmj.html" target="_blank" title="DR操作流程">DR操作流程</a></li><li><a href="https://www.bwwdw.com/article/gqvw.html" target="_blank" title="中国平板dr行业调研报告">中国平板dr行业调研报告</a></li><li><a href="https://www.bwwdw.com/article/h7pf.html" target="_blank" title="模联乌克兰危机dr范例">模联乌克兰危机dr范例</a></li><li><a href="https://www.bwwdw.com/article/c2ba.html" target="_blank" title="普通拍片机升级平板DR方案">普通拍片机升级平板DR方案</a></li><li><a href="https://www.bwwdw.com/article/xexd.html" target="_blank" title="DR求婚钻戒,该选哪一款?">DR求婚钻戒,该选哪一款?</a></li><li><a href="https://www.bwwdw.com/article/smap.html" target="_blank" title="SX3255DR384型自卸汽车">SX3255DR384型自卸汽车</a></li><li><a href="https://www.bwwdw.com/article/ve0r.html" target="_blank" title="第十章 CR和DR成像理论">第十章 CR和DR成像理论</a></li></ul> </div> <div class="in_reading"><p class="rel_art_line">正在阅读:</p><p><a target="_blank" href="https://www.bwwdw.com/article/72dl.html" title="Prof. Dr. Helmut Schauer, Prof. Dr. Beat Schmid,">Prof. Dr. Helmut Schauer, Prof. Dr. Beat Schmid,</a><span>04-05</span></p><p><a target="_blank" href="https://www.bwwdw.com/article/vs7x.html" title="会走路的树教案设计">会走路的树教案设计</a><span>01-06</span></p><p><a target="_blank" href="https://www.bwwdw.com/article/icz7.html" title="世界各国政体 - 图文">世界各国政体 - 图文</a><span>05-14</span></p><p><a target="_blank" href="https://www.bwwdw.com/article/weuf.html" title="信号与系统试题库">信号与系统试题库</a><span>10-23</span></p><p><a target="_blank" href="https://www.bwwdw.com/article/0wzb.html" title="2017年1月民主生活会自我剖析材料">2017年1月民主生活会自我剖析材料</a><span>02-08</span></p><p><a target="_blank" href="https://www.bwwdw.com/article/4uj7.html" title="贵州重点项目-纳雍PVC装修材料生产项目可行性研究报告">贵州重点项目-纳雍PVC装修材料生产项目可行性研究报告</a><span>05-19</span></p><p><a target="_blank" href="https://www.bwwdw.com/article/6gn1.html" title="2013年5月黄冈中学二模理科数学试卷及答案解析">2013年5月黄冈中学二模理科数学试卷及答案解析</a><span>03-20</span></p><p><a target="_blank" href="https://www.bwwdw.com/article/qvp4.html" title="软件工程导论试题集46172(1)">软件工程导论试题集46172(1)</a><span>05-29</span></p><p><a target="_blank" href="https://www.bwwdw.com/article/iz2t.html" title="《金融理论与实务》课后试题及答案">《金融理论与实务》课后试题及答案</a><span>12-01</span></p><p><a target="_blank" href="https://www.bwwdw.com/article/f1oj.html" title="案例-员工无故离职造成损失当赔">案例-员工无故离职造成损失当赔</a><span>08-15</span></p></div> <div class="previous"> <span class="pre">上一篇:<a title="学生双语报2022年七下综合复习版答案参考" href="https://www.bwwdw.com/article/62dl.html">学生双语报2022年七下综合复习版答案参考</a></span> <span class="next">下一篇:<a title="工业控制系统安全指南Guide+to+Industrial+Contrl+Systems+(ICS)" href="https://www.bwwdw.com/article/g2dl.html">工业控制系统安全指南Guide+to+Industrial+Contrl+Systems+(ICS)</a></span> </div> </div> </div> <div class="right-side"> <div class="right_fix"> <script type="text/javascript">s("right_top");</script> <div class="hotSearch"><div class="hotSearch_tl"><span></span>相关文章</div><ul><li><span>1</span><a href="https://www.bwwdw.com/article/tg5m.html" title="Photoshop磨皮插件DR3使用方法详解教程" target="_blank">Photoshop磨皮插件DR3使用方法详解教程</a></li><li><span>2</span><a href="https://www.bwwdw.com/article/x8d3.html" title="美式发音教程--THE SOUND AND STYLE OF AMERICAN ENGLISH(Dr.Dav" target="_blank">美式发音教程--THE SOUND AND STYLE OF AMERICAN ENGLISH(Dr.Dav</a></li><li><span>3</span><a href="https://www.bwwdw.com/article/ckcm.html" title="简介:X线机.CR.DR.CT的原理" target="_blank">简介:X线机.CR.DR.CT的原理</a></li><li><span>4</span><a href="https://www.bwwdw.com/article/ulbq.html" title="回放利器TASCAM线性录音笔DR100mkII" target="_blank">回放利器TASCAM线性录音笔DR100mkII</a></li><li><span>5</span><a href="https://www.bwwdw.com/article/qghr.html" title="平板DR探测器结构及其成像原理(天地智慧) - 图文" target="_blank">平板DR探测器结构及其成像原理(天地智慧) - 图文</a></li><li><span>6</span><a href="https://www.bwwdw.com/article/bhfo.html" title="平板DR探测器结构及其成像原理(天地智慧) - 图文" target="_blank">平板DR探测器结构及其成像原理(天地智慧) - 图文</a></li><li><span>7</span><a href="https://www.bwwdw.com/article/j7cq.html" title="安全与业务连续性:IBM DR灾难备份方案建议书" target="_blank">安全与业务连续性:IBM DR灾难备份方案建议书</a></li><li><span>8</span><a href="https://www.bwwdw.com/article/9qfh.html" title="力士乐变量泵a10vso18dr-31r-vpa12n00 - 图文" target="_blank">力士乐变量泵a10vso18dr-31r-vpa12n00 - 图文</a></li><li><span>9</span><a href="https://www.bwwdw.com/article/bide.html" title="DR87穿越涂层型超声波测厚仪SW7U型超声波测厚仪" target="_blank">DR87穿越涂层型超声波测厚仪SW7U型超声波测厚仪</a></li></ul></div> <script type="text/javascript">s("right_mid");</script> <div class="right_list"><div class="right_list_t"><i></i><span>最新文章</span></div><ul><li><a href="https://www.bwwdw.com/article/dozi.html" target="_blank" title="教学能力大赛决赛获奖-教学实施报告-(完整图文版)">教学能力大赛决赛获奖-教学实施报告-(完整图文版)</a></li><li><a href="https://www.bwwdw.com/article/nksj.html" target="_blank" title="互联网+数据中心行业分析报告">互联网+数据中心行业分析报告</a></li><li><a href="https://www.bwwdw.com/article/lksj.html" target="_blank" title="2017上海杨浦区高三一模数学试题及答案">2017上海杨浦区高三一模数学试题及答案</a></li><li><a href="https://www.bwwdw.com/article/sksj.html" target="_blank" title="招商部差旅接待管理制度(4-25)">招商部差旅接待管理制度(4-25)</a></li><li><a href="https://www.bwwdw.com/article/kksj.html" target="_blank" title="学生游玩安全注意事项">学生游玩安全注意事项</a></li><li><a href="https://www.bwwdw.com/article/zksj.html" target="_blank" title="学生信息管理系统(文档模板供参考)">学生信息管理系统(文档模板供参考)</a></li><li><a href="https://www.bwwdw.com/article/0ksj.html" target="_blank" title="叉车门架有限元分析及系统设计">叉车门架有限元分析及系统设计</a></li><li><a href="https://www.bwwdw.com/article/cksj.html" target="_blank" title="2014帮助残疾人志愿者服务情况记录">2014帮助残疾人志愿者服务情况记录</a></li><li><a href="https://www.bwwdw.com/article/9ksj.html" target="_blank" title="叶绿体中色素的提取和分离实验">叶绿体中色素的提取和分离实验</a></li><li><a href="https://www.bwwdw.com/article/ussj.html" target="_blank" title="中国食物成分表2020年最新权威完整改进版">中国食物成分表2020年最新权威完整改进版</a></li><li><a href="https://www.bwwdw.com/article/yksj.html" target="_blank" title="推动国土资源领域生态文明建设">推动国土资源领域生态文明建设</a></li><li><a href="https://www.bwwdw.com/article/6ssj.html" target="_blank" title="给水管道冲洗和消毒记录">给水管道冲洗和消毒记录</a></li><li><a href="https://www.bwwdw.com/article/3ssj.html" target="_blank" title="计算机软件专业自我评价">计算机软件专业自我评价</a></li><li><a href="https://www.bwwdw.com/article/gssj.html" target="_blank" title="高中数学必修1-5知识点归纳">高中数学必修1-5知识点归纳</a></li><li><a href="https://www.bwwdw.com/article/7ssj.html" target="_blank" title="2018-2022年中国第五代移动通信技术(5G)产业深度分析及发展前景研究报告发展趋势(目录)">2018-2022年中国第五代移动通信技术(5G)产业深度分析及发展前景研究报告发展趋势(目录)</a></li><li><a href="https://www.bwwdw.com/article/rssj.html" target="_blank" title="生产车间巡查制度">生产车间巡查制度</a></li><li><a href="https://www.bwwdw.com/article/pssj.html" target="_blank" title="2018版中国光热发电行业深度研究报告目录">2018版中国光热发电行业深度研究报告目录</a></li><li><a href="https://www.bwwdw.com/article/assj.html" target="_blank" title="(通用)2019年中考数学总复习 第一章 第四节 数的开方与二次根式课件">(通用)2019年中考数学总复习 第一章 第四节 数的开方与二次根式课件</a></li><li><a href="https://www.bwwdw.com/article/8ssj.html" target="_blank" title="2017_2018学年高中语文第二单元第4课说数课件粤教版">2017_2018学年高中语文第二单元第4课说数课件粤教版</a></li><li><a href="https://www.bwwdw.com/article/wssj.html" target="_blank" title="上市新药Lumateperone(卢美哌隆)合成检索总结报告">上市新药Lumateperone(卢美哌隆)合成检索总结报告</a></li><li><a href="https://www.bwwdw.com/Prof/" target="_blank" title="Prof">Prof</a></li><li><a href="https://www.bwwdw.com/Schauer/" target="_blank" title="Schauer">Schauer</a></li><li><a href="https://www.bwwdw.com/Helmut/" target="_blank" title="Helmut">Helmut</a></li><li><a href="https://www.bwwdw.com/Schmid/" target="_blank" title="Schmid">Schmid</a></li><li><a href="https://www.bwwdw.com/Dr/" target="_blank" title="Dr">Dr</a></li><li><a href="https://www.bwwdw.com/Beat/" target="_blank" title="Beat">Beat</a></li></ul></div> <script type="text/javascript">s("right_bottom");</script> <div class="right_list"><div class="right_list_t"><i></i><span>推荐文章</span></div><ul><li><a href="https://www.bwwdw.com/article/p2dl.html" target="_blank" title="新闻记者培训练习题-第六章答案">新闻记者培训练习题-第六章答案</a></li><li><a href="https://www.bwwdw.com/article/r2dl.html" target="_blank" title="浙江省杭州富阳区各类学校在校学生数量具体情况3年数据分析报告2">浙江省杭州富阳区各类学校在校学生数量具体情况3年数据分析报告2</a></li><li><a href="https://www.bwwdw.com/article/82dl.html" target="_blank" title="川大《经济学原理(1)2048》15春在线作业1_答案">川大《经济学原理(1)2048》15春在线作业1_答案</a></li><li><a href="https://www.bwwdw.com/article/a2dl.html" target="_blank" title="煤矿安全生产管理人员考试题库">煤矿安全生产管理人员考试题库</a></li><li><a href="https://www.bwwdw.com/article/b2dl.html" target="_blank" title="(完整版)3.专升本考试-《旅游学概论》各章节问题及重难点">(完整版)3.专升本考试-《旅游学概论》各章节问题及重难点</a></li><li><a href="https://www.bwwdw.com/article/w2dl.html" target="_blank" title="节能产品政府采购清单(第十期)">节能产品政府采购清单(第十期)</a></li><li><a href="https://www.bwwdw.com/article/o2dl.html" target="_blank" title="幼儿园后勤年度工作总结范文三篇">幼儿园后勤年度工作总结范文三篇</a></li><li><a href="https://www.bwwdw.com/article/x2dl.html" target="_blank" title="工程创优结构长城杯总结">工程创优结构长城杯总结</a></li><li><a href="https://www.bwwdw.com/article/52dl.html" target="_blank" title="2016年全国科普日网络微信知识竞赛试题284(附答案)">2016年全国科普日网络微信知识竞赛试题284(附答案)</a></li><li><a href="https://www.bwwdw.com/article/t2dl.html" target="_blank" title="工程材料与机械制造基础答案">工程材料与机械制造基础答案</a></li><li><a href="https://www.bwwdw.com/article/32dl.html" target="_blank" title="高三理综5月质检试题">高三理综5月质检试题</a></li><li><a href="https://www.bwwdw.com/article/u2dl.html" target="_blank" title="江苏连云港市中考英语试卷和答案">江苏连云港市中考英语试卷和答案</a></li><li><a href="https://www.bwwdw.com/article/yvdl.html" target="_blank" title="中学生作文:总有一种颜色属于我作文800字">中学生作文:总有一种颜色属于我作文800字</a></li><li><a href="https://www.bwwdw.com/article/cvdl.html" target="_blank" title="世界名著人物素材导读">世界名著人物素材导读</a></li><li><a href="https://www.bwwdw.com/article/9vdl.html" target="_blank" title="改性蒙脱石作为抗生素对断奶仔猪肠道菌群的影响">改性蒙脱石作为抗生素对断奶仔猪肠道菌群的影响</a></li><li><a href="https://www.bwwdw.com/article/zvdl.html" target="_blank" title="2022版高考化学一轮复习第11章有机化学基础鸭第36讲生命中的基础">2022版高考化学一轮复习第11章有机化学基础鸭第36讲生命中的基础</a></li><li><a href="https://www.bwwdw.com/article/0vdl.html" target="_blank" title="水果超市合作协议标准范本">水果超市合作协议标准范本</a></li><li><a href="https://www.bwwdw.com/article/svdl.html" target="_blank" title="灭火和应急疏散预案制度示范文本">灭火和应急疏散预案制度示范文本</a></li><li><a href="https://www.bwwdw.com/article/kvdl.html" target="_blank" title="TR200表面粗糙度仪使用说明书">TR200表面粗糙度仪使用说明书</a></li><li><a href="https://www.bwwdw.com/article/nvdl.html" target="_blank" title="小学英语6年级毕业试题和答案">小学英语6年级毕业试题和答案</a></li></ul></div> </div> </div> </div> <div class="footer"> <p>Copyright©<script>timestamp2date(1);</script><a href="https://www.bwwdw.com/" target="_blank" title="博文网">博文网</a>bwwdw.com 版权所有</p> <p class="gray"><a href="https://www.bwwdw.com/article/" target="_blank">最新更新</a> | <a href="https://www.bwwdw.com/hot/" target="_blank">热点专题</a> | <a href="https://www.bwwdw.com/sitemap.html" target="_blank">网站地图</a> | <a href="https://www.bwwdw.com/tag/" target="_blank">TAG专题</a> | <a href="https://www.bwwdw.com/sitemap.xml" target="_blank">XML地图</a> | <a href="https://so.bwwdw.com" target="_blank">范文搜索</a><script type="text/javascript">tj();</script></p> </div> <a href="#0" class="cd-top">Top</a> <script src="/static/fanwen/js/jquery-1.9.1.min.js"></script> <script type="text/javascript"> document.write('<script type="text/javascript" src="/static/fanwen/js/pubuliu.js?'+RAND_STR+'"><\/script>'); document.write('<script type="text/javascript" src="/static/fanwen/js/lazyimg.js?'+RAND_STR+'"><\/script>'); document.write('<script type="text/javascript" src="/static/fanwen/js/gotop.js?'+RAND_STR+'"><\/script>'); </script> <script type="text/javascript"> $.ajax({ "url":"https://www.bwwdw.com/open/doc/readViews.json?id=72dl", "type":"get", "data":"", "dataType":"json", "success":function(res){ $("#read_views").html(res.data); } }); </script> <script type="text/javascript">bottomAction();</script> </body> </html>