[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Open access

Reasoning about naming systems

Published: 01 November 1993 Publication History
First page of PDF

References

[1]
BETZ, D. M 1989. Xscheme: An Object-Oriented Scheme. Peterborough, N.H.]]
[2]
BORNING, A., DUISBERG, R, AND FREEMAN~BENSON, B. 1987. Constraint hierarchies. In Proceedmgs of OOPSLA '87 (Oct). ACM, New York, 48-60.]]
[3]
BOWMAN, M. 1990. Univers: The construction of an internet-wide descriptive nammg system. Ph.D thesis, Dept. of Computer Science, Univ. of Arizona, Tucson, Aug.]]
[4]
BOWMAN, M., PETERSON, L., AND YEATTS, A. 1990. Univers' An attribute-based name server. Softw. Prac. Exper. 20, 4 (Apr.), 403 424.]]
[5]
BUDD, T. 1986. Bib--A program for formatting blbliographies. In Umx User's SupplementarT Documents. 4.3 Berkeley Software Distribution Apr.]]
[6]
COMER, D. E., AND PETERSON, L. L. 1989. Understanding naming in distributed systems. Dtstrib. Comput. 3, 2 (May), 51-60.]]
[7]
FABR~, R.S. 1974. Capability-based addressing. Commun. ACM 17, 7 (July), 403-411.]]
[8]
FOWLER, R.J. 1985. Decentralized object finding using forwarding addresses. Ph.D. thesis, Dept. of Computer Science. Univ. of Washington, Seattle, Dec.]]
[9]
GALLAIRE, H., MINKER, J., AND NICOLAS, J. 1984. Logic and databases: A deductive approach. ACM Comput. Surv. 16, 2 (June), 153-186.]]
[10]
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION. 1988. Information processing systems: Open systems in{erconnectmn--The directory--Overview of concepts, models, and service. Draft International Standard ISO 9594-1:1988(E), International Organization of Standardization, New York.]]
[11]
LAMPSON, B. 1986 Designing a global name servme, in Proceedings of5th Syrnposzura on the Principles ofDistrtbuted Computing (Aug.). ACM, New York, 1-10.]]
[12]
LmsK1, W., JR. 1981. On databases with incomplete information. J. ACM 28, 1, 41-70.]]
[13]
LIPSKI, W., JR. 1979 On semantic issues connected with incomplete information databases. ACM Trans. Database Syst. 4, 3 (Sept.), 262-296.]]
[14]
M~N, T. 1987. Decentralized naming in distributed computer system. Ph.D. thesis, Stanford Univ., Palo Alto. Calif, May.]]
[15]
~MOCKAPETRIS, P. 1987. Domain names--Implementation and specification. Request For Comments 1035, USC Information Sciences Institute, Marina del Ray, Calif., Nov.]]
[16]
OPPEN, D., AND DALAL, Y. 1981. The clearinghouse: A decentralized agent for locating named objects in a distributed environment. Tech. Rep. OPD-T8103, Xerox Office Products Division, Palo Alto, Calif., Oct.]]
[17]
PETERSON, L.L. 1988. The Profile naming service. ACM Trans. Comput. Syst. 6, 4 (Nov.), 341-364.]]
[18]
PETERSON, L.L. 1987. A ye}low-pages service for a local-area network. In Proceedings of the SIGCOMM '87 Workshop: Frontiers ~n Computer Communicatzons Technology (Stowe, Vt., Aug.). ACM, New York, 235-242.]]
[19]
PICKENS, J., FEINLER, E., AND MATHIS, J. 1979. The NIC name server--a datagram based information utility. In Proceedings of the 4th Berkeley Workshop on Distributed Data Management and Computer Networks (Aug.).]]
[20]
PincE, C. 1971. Table lookup techniques. ACM Comput. Surv. 3, 2, 49-65.]]
[21]
REITER, R. 1980. On closed world databases. In Logic and Databases, H. Gallaire and J. Minker, Eds. Plenum Press, New York, 55-76.]]
[22]
RITCHm, D. M., AND THOMPSON, K. 1974. The Unix time-sharing system. Commun. ACM 17, 7 (July), 365 375.]]
[23]
SOLOMON, M., LANDWEBER, L., AND NEUHENGEN, n. 1982. The CSNET naine server. Comput. Networks 6, 161 172.]]
[24]
SUN MICROSYSTEMS INC. 1986. Yellow Poges Protocol Spec~ficat~on. Sun Microsystems Inc., Mountain View, Calif., Feb.]]
[25]
TERRY, D. 1987. Caching hints in distributed systems. IEEE Trans. Softw. Eng. SE-13, 1 (Jan.), 48 54.]]
[26]
ULLMAN, J.D. 1988. Principles of Database and Knowledge-Base Systems. Vol. 1. Computer Science Press, Rockville, Md.]]
[27]
WATSON, R. 1981. Identifiers (naming) in distributed systems. In Distributed Systems-- Architecture and Implenlentatlon, B. Lampson, M. Paul, and H. Siegert, Eds. Lecture Notes in Computer Science. Springer-Verlag, New York, 191 210.]]
[28]
WoN&, E. 1982. A statistical approach to incomplete information in database systems. ACM Trans. Database Syst. 7, 3 (Sept.), 470-488.]]

Cited By

View all
  • (2024)Atlas: Automating Cross-Language Fuzzing on Android Closed-Source LibrariesProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3652133(350-362)Online publication date: 11-Sep-2024
  • (2024)Computational Thinking for Self-Regulated LearningProceedings of the 2024 on Innovation and Technology in Computer Science Education V. 110.1145/3649217.3653565(640-645)Online publication date: 3-Jul-2024
  • (2024)Internet Identifiers: A Survey of History, Challenges, and Future PerspectivesIEEE Access10.1109/ACCESS.2024.338211512(51919-51941)Online publication date: 2024
  • Show More Cited By

Recommendations

Reviews

Friedrich Gebhardt

Naming systems are specialized databases designed for identifying persons and organizations, locating equipment, and similar tasks. In a perfect world, the user would compose a request using the known attributes, and the system would respond with all matching objects. In practice, however, the request items may be partially wrong or outdated, some may be more important than others, or the system database may be incomplete and partially wrong or outdated. If no perfectly matching item exists, the naming system has to apply increasingly more lax strategies until a suitable item is found. This paper is on a theory of applicable matching strategies. Several strategies pertaining to the client's (user's) present needs exist. For example, the client may prescribe that the naming system use all mandatory attributes (attributes guaranteed to be registered); this strategy is called closed. If no objects are returned, the naming system shall then use the non-mandatory attributes; this strategy is called open. Similarly, the user may order the system to prefer static attributes (which never change their value) over dynamic attributes (where either the database or the user may have outdated information). Technically, a client approximation function is a function from a set of attributes to a subset, such as the set of mandatory attributes. Correspondingly, several strategies reflect the status of the database. Possible returns all objects that do not conflict with the query. Partial returns all objects that in addition have at least one matching attribute. Exact requires that all attributes in the query match. Unique asks for the single object matching all attributes and returns nothing if more than one such object exists. These four strategies form a preference hierarchy. Technically, a database approximation function is a function from a set of attributes and a set of objects into a set of objects. Several sets of ordered approximation functions can be combined using a priority between these sets. For example, if ( open, closed) gets priority over ( possible, partial, exact) , then the composition {closed, exact} has the highest priority, followed by {closed, partial} and so on down to {open, possible} . Within a composition, the naming system starts by using only the first component. If this yields too many objects, the set is reduced by the second component; composition essentially yields the intersection. This systematic approach allows the authors to compare the strategies used in different existing naming systems, to devise new ones, and to reason about their properties. The theory has been used to find inconsistencies in existing naming systems and to design a modified system without these inconsistencies. The authors present several approximation functions at appropriate length. The overall procedure gets somewhat lost in the details.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Programming Languages and Systems
ACM Transactions on Programming Languages and Systems  Volume 15, Issue 5
Nov. 1993
151 pages
ISSN:0164-0925
EISSN:1558-4593
DOI:10.1145/161468
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 1993
Published in TOPLAS Volume 15, Issue 5

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. descriptive naming systems
  2. inference mechanisms

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)150
  • Downloads (Last 6 weeks)24
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Atlas: Automating Cross-Language Fuzzing on Android Closed-Source LibrariesProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3652133(350-362)Online publication date: 11-Sep-2024
  • (2024)Computational Thinking for Self-Regulated LearningProceedings of the 2024 on Innovation and Technology in Computer Science Education V. 110.1145/3649217.3653565(640-645)Online publication date: 3-Jul-2024
  • (2024)Internet Identifiers: A Survey of History, Challenges, and Future PerspectivesIEEE Access10.1109/ACCESS.2024.338211512(51919-51941)Online publication date: 2024
  • (2023)ОСОБЕННОСТИ ИНФОРМАЦИОННО-АНАЛИТИЧЕСКОЙ РАБОТЫ В ВЫЯВЛЕНИИ, ПРЕДУПРЕЖДЕНИИ И ПРЕСЕЧЕНИИ ПРЕСТУПЛЕНИЙ В СФЕРЕ ИНФОРМАЦИОННЫХ ТЕХНОЛОГИЙBULLETIN OF THE ACADEMY OF LAW ENFORCEMENT AGENCIES10.52425/25187252_2023_29_9329:3Online publication date: 23-Oct-2023
  • (2023)Fashion-GPT: Integrating LLMs with Fashion Retrieval SystemProceedings of the 1st Workshop on Large Generative Models Meet Multimodal Applications10.1145/3607827.3616844(69-78)Online publication date: 2-Nov-2023
  • (2021)MATYAG: A Tracking System to Prevent Potential Cases of Human TraffickingProceedings of the 3rd International Conference on Advanced Information Science and System10.1145/3503047.3503049(1-5)Online publication date: 26-Nov-2021
  • (2021)End-to-End Lane Detection: a Key Point ApproachProceedings of the 2021 4th International Conference on Robot Systems and Applications10.1145/3467691.3467696(7-11)Online publication date: 9-Apr-2021
  • (2021)The CoCe Design SpaceProceedings of the 2021 ACM Designing Interactive Systems Conference10.1145/3461778.3462023(718-733)Online publication date: 28-Jun-2021
  • (2021)LPF: A Language-Prior Feedback Objective Function for De-biased Visual Question AnsweringProceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3404835.3462981(1955-1959)Online publication date: 11-Jul-2021
  • (2021)Birds of a Feather Flock Together: A Study of Status Homophily in HRISocial Robotics10.1007/978-3-030-90525-5_24(281-291)Online publication date: 10-Nov-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media