USRE40063E1 - Data processing and method for maintaining cardinality in a relational database - Google Patents
Data processing and method for maintaining cardinality in a relational database Download PDFInfo
- Publication number
- USRE40063E1 USRE40063E1 US11/152,839 US15283905A USRE40063E US RE40063 E1 USRE40063 E1 US RE40063E1 US 15283905 A US15283905 A US 15283905A US RE40063 E USRE40063 E US RE40063E
- Authority
- US
- United States
- Prior art keywords
- relation
- entity
- instance
- data
- tail
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
- G06F16/288—Entity relationship models
-
- C—CHEMISTRY; METALLURGY
- C09—DYES; PAINTS; POLISHES; NATURAL RESINS; ADHESIVES; COMPOSITIONS NOT OTHERWISE PROVIDED FOR; APPLICATIONS OF MATERIALS NOT OTHERWISE PROVIDED FOR
- C09K—MATERIALS FOR MISCELLANEOUS APPLICATIONS, NOT PROVIDED FOR ELSEWHERE
- C09K2323/00—Functional layers of liquid crystal optical display excluding electroactive liquid crystal layer characterised by chemical composition
- C09K2323/02—Alignment layer characterised by chemical composition
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/953—Organization of data
- Y10S707/954—Relational
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99932—Access augmentation or optimizing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
- Y10S707/99934—Query formulation, input preparation, or translation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99951—File or database maintenance
- Y10S707/99952—Coherency, e.g. same view to multiple users
Definitions
- This application includes a plurality of computer program listings (modules) in the form of a Microfiche Appendix which is being filed concurrently herewith as 1162 frames (not counting target and title frames) distributed over 20 sheets of microfiche in accordance with 37 C.F.R. ⁇ 1.96.
- the disclosed computer program listings are incorporated into this specification by reference but it should be noted that the source code and/or the resultant object code of the disclosed program modules are subject to copyright protection.
- the copyright owner has no objection to the facsimile reproduction by anyone of the patent document (or the patent disclosure as it appears in the files or records of the U.S. Patent and Trademark Office) for the sole purpose of studying the disclosure but otherwise reserves all other rights to the disclosed computer program modules including the right to reproduce said computer program modules in machine-executable form.
- the present invention relates generally to computer database management systems and more specifically to apparatus and methods for modifying and searching through large scale databases at high speed.
- Modern computer systems are capable of storing voluminous amounts of information in bulk storage means such as magnetic disk banks.
- the volume of stored information can be many times that of the textual information stored in a conventional encyclopedia or in the telephone directory of a large city.
- modern computer systems can sift through the contents of their bulk storage means at extremely high speed, accessing as many as one million bytes of information or more per second (a byte is a string of eight bits, equivalent to approximately one character of text in layman's terms).
- a byte is a string of eight bits, equivalent to approximately one character of text in layman's terms.
- it may take an undesirably long time (i.e., hours or days) to retrieve desired pieces of information.
- index card catalog found in public libraries.
- Such a card catalog consists of a large number of uniformly dimensioned paper cards which are serially stacked in one or more trays. The cards are physically positioned such that each card is directly adjacent to no more than two others (for each typical examination there is a preceding card, the card under examination and a following card in the stack).
- each index card On the front surface of each index card a librarian enters, in left to right sequence; the last name of an author, the first name of the author, the title of a single book which the author wrote and a shelf number indicating the physical location within the library where the one book may be found.
- Each of these four entries may be referred to as a “column” entry. Sufficient surface area must be available on each card to contain the largest of conceivable entries.
- the index cards are stacked one after the next in alphabetical order, according to the author's last name and then according to the author's first name and then by title.
- the examination position of each card is defined relative to the contents of preceding and following cards in the stack. That is, when cards are examined, each intermediate card is examined immediately after its alphabetically preceding card and immediately before its alphabetically succeeding card.
- the key-sequenced database is easily “updated” by inserting a new card between two previously created cards. Similarly, if a book is removed from the collection, its card is simply pulled from the card stack to reflect the change.
- a library user may quickly search through the alphabetically ordered set of index cards and retrieve the requested information.
- the search and retrieval process can require substantially more time; the worst case scenario being that for each inquiry the librarian has to physically sift through and examine each card in the entire catalog.
- the worst case scenario being that for each inquiry the librarian has to physically sift through and examine each card in the entire catalog.
- an inquiring reader asks for all books in the library where the author's first name is John and the title of the book contains the word “neighbor” or a synonym thereof.
- the time for such a search may be impractically long, and hence, while the information is theoretically available, it is not realistically accessible.
- the size of a library collection tends to grow over time as more and more books are acquired. During the same time, more and more index cards are added to the catalog. The resulting stack of cards, which may be viewed as a kind of “database”, therefore grows both in size and in worth.
- the “worth” of the card-based system may be defined in part as the accumulated cost of all work that is expended in creating each new index card and in inserting the card into an appropriate spot in the stack.
- the library acquires a new microfilm machine which stores copies of a large number of autobiographies.
- the autobiographies discuss the life and literary works of many authors whose books are kept in the library.
- the original, first card catalog system is now required to cross reference each book to the microfilm location (or plural locations) of its author's (or plural authors') autobiographies.
- the card catalog system needs to be modified by adding at least one additional column of information to each index card to indicate the microfilm storage locations of the relevant one or more autobiographies.
- each string of bits is stored within a computerized database system as a large number of relatively short strings of binary bits where each string has finite length.
- the bit strings are distributed spacially within a tangible medium of data storage such as an array of magnetic disks, optical devices or other information representing means capable of providing mass storage.
- Each bit is represented by a magnetic flux reversal, an optical perturbation and/or some other variance in the physical attributes of a data storage medium.
- a transducer or amplifier means converts these variances into signals (e.g., electrical, magnetic, or optical) which can be processed on a digital data processing machine.
- Each string of bits is often uniquely identified by its physical location or by a logical storage address.
- Some bit strings may function as address pointers, rather than as the final pieces of “real” information which a database user wishes to obtain.
- the address pointers are used to create so-called “threaded list” organizations of data wherein logical links between a first informational “object” (first piece of real data) and a second informational “object” (second piece of real data) are established by a chain of direct or indirect address pointers.
- the user-desired objects of real information themselves can be represented by a collection of one or more physically or logically connected strings.
- “tables” of information are created within the mass storage means of the computerized system.
- a horizontal “row” of related objects which is analogous to a single card in a card catalog system, may be defined by placing the corresponding bit strings of the objects in physical or address proximity with each other.
- Logical interconnections may be defined between different rows by using ancillary pointers (which are not considered here as the “real” data sought by a database user).
- a serial sequence of “rows” is then defined by linking one row to another according to a predefined sorting algorithm using threaded list techniques.
- a vast number of different linking “threads” may be defined in this way through a database table having millions or billions of binary information bits. Unlike manual systems, the same collection of rows (which replaces the manual stack of cards) can be simultaneously ordered in many different ways by utilizing a multiplicity of threaded paths so that redundant data storage is not necessary. Searches and updates may be performed by following a prespecified thread from one row to the next until a sought piece of information (or its address) is found within a table.
- a threaded-list type of table can be “updated” in a manner similar to manual card systems by breaking open a logical thread within the list, at a desired point, and inserting a new row (card) or removing an obsolete row at the opened spot.
- Tables are often constructed according to a “key-sequenced” approach.
- One column of a threaded-list table is designated as the sort-key column and the entries in that column are designated as “sort keys”.
- Address pointers are used to link one row of the table to another row according to a predefined sequencing algorithm which orders the entries (sort-keys) of the sort column as desired (i.e., alphabetically, numerically or otherwise).
- a table Once a table is so sorted according to the entries of its sort column, it becomes a simple task to search down the sort column looking for an alphabetically, numerically or otherwise ordered piece of data. Other pieces of data which are located within the row of each sort key can then be examined in the same sequence that each sort key is examined. Any column can serve as the sort column and its entries as the sort keys.
- a table having a large plurality of columns can be sorted according to a large number of sorting algorithms.
- the key-sequencing method gives tremendous flexibility to a computerized database but not without a price.
- Each access to the memory location of a list-threading address pointer or to the memory location of a sort-key or to the memory area of “real” data which is located adjacent to a sort-key takes time.
- real data the response time to an inquiry increases and system performance suffers.
- Each table contains at least two columns. One column serves as the sort column while a second or further columns of the table store either the real data that is being sought or additional sort-key data which will ultimately lead to a sought-after piece of real data.
- the rows of the table are examined in an ordered fashion according to the contents of the sort column.
- Target data is located by first threading down the sort column and thus moving through the chain of rows within a table according to a prespecified sort algorithm until a specific sort-key is found. Then the corresponding row is examined horizontally and the target data (real data, or the next key) is extracted from that row.
- “real” data would be the full-legal names of unique persons such as in the character strings, “Mr. Harry W. Jones”, “Mrs. Barbara R. Smith”, etc.
- the sort-key can be a number which is stored adjacent to the full name and which sequences the names (real data) according to any of a wide variety of ordering patterns including by age, by height, by residential address, alphabetically, etc. Because the real data (e.g., full name of a person) is stored in a separate column, it is independent from the sort key data.
- a large variety of different relations can therefore be established between a first piece of real data (e.g., a first person's name) and a second piece of real data (e.g., a second person's name) simply by changing the sort keys that are stored in the separate sort column (e.g., who is older than whom, who is taller, etc.).
- Plural orderings of the real data can be obtained at one time by providing many columns in one table, by storing alternate keys in the columns and by choosing one or more of these columns as the primary sort key column.
- Relational database systems often include tables that do not store real data in a column adjacent to their sort-key column, but rather store a secondary key number which directs a searcher to a row in another key-sequenced table where a matching key number is held together with either a piece of sought-after real data or yet another forward referencing key number (e.g., an entry which in effect says “find the row which holds key number x of yet another table for further details”).
- a large number of tables can be simultaneously updated by changing one entry in a “base” table.
- Relational database tables are normally organized to create implied set and subset “relations” between their respective items of pre-stored information.
- the elements of the lowest level subsets are stored in base tables and higher level sets are built by defining, in other tables, combinations of keys which point to the base tables.
- the implied relations between elements cannot be discerned by simply inspecting the raw data of each table. Instead, relations are flushed out only with the aid of an access control program which determines in its randomly-distributed object code, which table to examine first and what column to look at before beginning to search down the table's column for a key number and, when that key number is found, what other column to look at for the real data or a next key number.
- Relations between various “entities” of a relational database are implied by the sequence in which the computer accesses them.
- Names-Table which lists the names of a large number of people in telephone directory style. Each name (each separate item of real data) is paired to a unique key number and the rows of this Names-Table are sorted sequentially according to the key number.
- a second relational table may be provided in-the database (Cars-Table) which lists automobile (vehicle) identification numbers (VIN) each paired in its row with a second key number. If the second key number is matched by a corresponding key number in the first table, then a relationship might be implied between the entries of the two separate tables (Names-Table and Cars-Table). The “implied” relationship might be one of an infinite set of possibilities.
- the relationship could be, for example, that the car listed in the second table is “owned” by the person whose name is found next to a matching key in the first table. On the other hand, it might be implied that the matched person in the first table “drives” the car, or “cleans” the car or has some other relation to the car. It is left to the access control program to define what the relationship is between entities in the first table and entities in the second table.
- relational database systems offer users a great deal of flexibility since an infinite number of relations may be defined (implied).
- Economy in maintaining (updating) the database is also provided since a change to a base table propagates through all other tables which reference the base table.
- the access control program of the database system can include information-updating modules which, for example, change the key number in the second table (Cars-Table) whenever ownership of a car changes. If the name of the new owner is already in the first table (Names-Table), it does not have to be typed a second time into a new storage area and thus, extra work and storage redundancy are avoided. The vehicle identification number (VIN) remains unchanged. Minimal work is thus expended on updating the database.
- relational database systems suffer from expandability and restructuring problems similar to those of the above-described manual system.
- the rows within a particular table have to be altered to add additional columns. This is not easily done.
- VIN vehicle identification number
- the entire database may have to be restructured to create extra room in the storage means (i.e. the disk bank) for adding the newly required columns.
- New key numbers will have to be entered into the new columns of each row (e.g., a new “factory of assembly” key number) and sorted in order to comply with the newly mandated regulation.
- New search and inquiry routines will have to be written for handling the newly structured tables.
- an entity definition table (ENT.DEF) is defined within the memory means of a computer system to store the name of an allowed entity type (class) and the name of a single other table (Entity-instances Table or “EiT” for short) where instances of the allowed entity type may be stored.
- a separate relationships definition table (REL.DEF) is defined in the memory means to list in each row of the table: (a) the name of an allowed relations type, (b) the name of a single Relation-instances Table (RiT) where instances of the allowed relationship type may be stored, (c) the name of a primary (head) entity type to which the relation type may apply and (d) the names of one or more secondary (tail) entity types to which the named relationship may apply.
- Each row of the Relation-instances Table (RiT) is provided with at least one primary pointer which points to the storage location of a first instance of the primary entity type and at least one secondary pointer which points to the storage location of a corresponding first instance of the secondary entity type.
- Each row of the Relation-instances Table (RiT) further includes a pointer to a relationship-defining row in the REL.DEF table.
- the pointer can be the name of an applicable relation type as recorded in the REL.DEF table. Relationships between instances of a primary entity and a secondary entity are thus expressly defined by entries in the Relation-instances Table (RiT). Adding new rows to this Relation-instances Table (RiT) allows for the addition of new relations. Adding new rows to the REL.DEF table allows for the creation of new classes (types) of relationships. Since relation-defining tables can be updated using a fixed set of update modules, reprogramming at the source or assembly level is not needed for restructuring the schema of the database.
- FIG. 1A is a block diagram of a conventional database system.
- FIG. 1B is a timing diagram showing the delay between the addressing and the delivery of storage data.
- FIG. 2A is a block diagram of a conventional key-sequenced table organization.
- FIG. 2B is a block diagram of a conventional relative-record table organization.
- FIG. 3 diagrams a multiple table system which is based on a conventional relational database approach and which has key-sequence organized tables.
- FIG. 4A is a conceptual diagram illustrating an entity-relation schema in accordance with the invention.
- FIG. 4B is a further conceptual diagram of an entity-relation schema according to the invention.
- FIG. 5 is a block diagram of an entity definition (ENT.DEF) table in accordance with the invention.
- FIGS. 6A and 6B are block diagrams of a relationship definition (REL.DEF) table in accordance with the invention.
- FIG. 7 is a connection diagram showing how relations may be explicitly defined in a Relation-instances Table (RiT) so that unique relations between instances of a first entity class and instances of a second entity class can be identified.
- Relation-instances Table Relation-instances Table
- FIG. 8 is a block diagram of a database system according to the invention.
- FIG. 9 is a block diagram of a relations processing engine according to the invention.
- FIG. 10 graphs a variety of sample inquiry paths that may be followed by the engine of FIG. 9 .
- the database system 100 comprises a central processing unit (CPU) 110 which is operatively coupled so as to be controlled by an access control program (object code) 120 d stored in a first memory means 120 (i.e., read-only-memory, ROM, or random access memory, RAM).
- the CPU 110 in combination with the first memory means 120 can be viewed as one or more machine means for performing functions specified by the object code 120 d.
- the CPU 110 is further operatively coupled to access the data 130 d of a “bulk storage” second memory means 130 also included in the database system 100 .
- Individual strings of digital information are represented by wiggled lines (e.g., 120 d, 130 d) in FIG.
- the bulk storage means 130 typically takes the form of a large array of magnetic disk drives, tape drives, or other mass storage devices (e.g., arrays of Dynamic Random Access Memory [DRAM] chips).
- the first (control) memory means 120 usually takes the form of high speed RAM and/or ROM.
- the CPU 110 To access a particular string of data 130 d stored within the bulk storage means 130 , the CPU 110 must provide a corresponding address signal 131 s ( FIG. 1B ) in the form of logic highs (H) and lows (L) to the bulk storage means 130 over an address bus 131 .
- the address signal 131 s (usually an electrical signal) comprises a set of logic high and logic low levels (H and L) transmitted in a first time period t 0 ⁇ t 1 . There follows a second time period, t 1 ⁇ t 2 , which is often referred to as an “access delay”, during which addressing circuits attempt to access the addressed memory location.
- data signals 132 s are then transferred over a data bus 132 ( FIG. 1A ) from the addressed location within the bulk storage means 130 to the CPU 110 or vice versa during a following third time period, t 2 ⁇ t 3 .
- the object code 120 d of the access control program determines when and how the CPU 110 will access information 130 d stored in the bulk storage means 130 .
- the CPU 110 issues address signals 121 s (not shown) over an address bus 121 to the first memory means 120 , and in response, the first memory means 120 supplies instruction signals 122 s (not shown) over a data bus 122 to the CPU 110 .
- Information signals 122 s can be exchanged bidirectionally over data bus 122 between the CPU 110 and the first memory means 120 .
- FIG. 1B may represent the timing relation between address signals 121 s and first memory information signals 122 s by replacing reference numerals 131 s and 132 s with 121 s and 122 s, respectively.
- the object code 120 d of the access control program is produced by first generating (e.g., manually writing and encoding) a source code listing 112 whose lines of information 112 d are usually understandable only to a highly trained computer programmer.
- the source code listing 112 which is written in an assembly level or higher level language (e.g., C, COBOL, FORTRAN, PASCAL, etc.) is transformed into machine-readable form, and passed through a first translation machine which may be referred to as a compiler (or assembler) means 114 .
- the compiler means 114 produces the machine-readable object code 120 d according to instructions provided by a machine readable version of the source code listing 112 .
- the object code 120 d is expressed as machine detectable alternations (ones and zeroes) in a physical attribute (e.g., voltage) of the medium which makes up the first memory means 120 .
- the object code 120 d is more readily convertible into data signals 122 s which are understandable to the CPU 110 than into information which is understandable to a lay (non-programmer) person. It is highly improbable that a lay person will ever wish to access or understand or modify the object code 120 d stored within the first memory means 120 .
- the information strings 130 d within the bulk storage means 130 are similarly expressed as alternations in the physical property of the storage medium making up the second memory means 130 .
- Some of the data strings 130 d represent “real” data which a lay-user may wish to access while others of the strings 130 d represent “ancillary” data such as sequencing keys, threading pointers or control codes which a lay-user is not interested in.
- the object code 120 d of the control program defines which is which.
- the combination of the first memory means 120 and the CPU 110 defines a second man-to-machine search-and-translate machine 115 which is used to search through parts of the bulk stored data 130 d, extract relevant pieces of “real” data and convert the extracted data from machine-readable form into human-readable form.
- the human-readable output of the second translation machine 115 may be produced in the form of a query output listing 150 (e.g., on paper or on a video screen) as indicated in FIG. 1 A.
- a lay user (defined here as someone other than a person who is an expert programmer familiar with details of the source listing 112 ) wishes to obtain useful (“real”) information from the bulk storage means 130 , the lay user will normally supply a query input 140 , in a form dictated by a so-called “structured query language” (SQL) to the CPU 110 .
- SQL structured query language
- the combination of the CPU 110 and first memory means 120 (which combination forms the second search-and-translate machine 115 ) process this query input 140 and in response, produces a series of address signals 131 s which are sent to the bulk storage means 130 and processes a series of data retrievals 132 s which eventually lead to the production of a corresponding query output listing 150 .
- the access control program 120 d is charged with the task of enabling various types of queries 140 and making sure that the queries do not violate basic rules of logic.
- the translating machine 115 When the information 130 d within the bulk storage means 130 needs to be updated, by for example adding new books, a similar exchange occurs between the translating machine 115 and a lay user.
- the lay user supplies an update input 160 , again as dictated by a pre-specified structured query language (SQL), and in response, the translating machine 115 rearranges the data 130 d within the bulk storage means 130 to achieve the requested update.
- SQL structured query language
- FIG. 2A schematically illustrates a section 130 a of the bulk storage means 130 according to embodiment 200 wherein some of the stored data strings 130 d are arranged to define a key-sequenced type of table.
- a first record region (Record No.
- a first continuous data string 230 which is subdivided to have a first string portion 231 representing an author's name (illustrated as the contents of a rectangular box), a second string portion 232 contiguous thereto for representing a name threading pointer (illustrated as a second rectangular box coupled to the first rectangular box by an address proximity link P 11 ), a third data string portion 233 representing the book's title (which is linked to the second portion 232 by proximity link P 12 ), a fourth subsection 234 representing a title threading pointer (linked to box 233 by address proximity link P 13 ), a fifth subsection 235 representing the book's location (linked to box 234 by proximity link P 14 ) and a sixth subsection 236 representing a location threading pointer (linked to box 235 by proximity link P 15 ).
- the name threading pointer 232 is located directly adjacent to the author's name subsection 231 within the address space of Record No. 1 , as indicated by address proximity link P 11 and thus, there is an “implied” logical connection between the data contents of boxes 231 and 232 .
- the book's title subsection 233 is located directly adjacent to the same threading pointer 232 as indicated by address proximity link P 12 .
- the combined, proximity linkage, P 11 ⁇ P 12 “implies” a relationship between the contents of boxes 231 and 233 , namely that they apply to various attributes of a common book. This format repeats for data subportions 234 - 236 .
- Only boxes 231 , 233 and 235 contain “real” data which is useful to a lay person.
- the other boxes, 232 , 234 and 236 of Record No. 1 contain “ancillary” data which is useful to the search machine 115 but does not provide the kind of “real” information sought by an inquiring lay person.
- this searching machine 115 / 200 includes means for assigning appropriate “meanings” to each of the data subportions contained in each of subsections 231 - 236 to thereby designate some as containing “real” data and others as containing “ancillary” (e.g., pointer) data.
- the search machine 115 / 200 can scan horizontally across the record, parse the data string 230 into subsections of appropriate size and extract the name of the book's author, the book's title and the location of the book within the library, as desired.
- the searching machine 115 / 200 does not possess information which tells it that box 232 is a threading pointer, box 233 is a title, etc., then all boxes will look alike to the search machine, there will be no “meaning” assigned and the search machine 115 / 200 will not be able to extract a desired piece of data.
- FIG. 2A it is to be understood that there is a cooperative relation between how the object code 120 d of the search machine 115 / 200 causes that search machine to access the parts of bit string 230 via the signal busses, 131 and 132 , how subportions of bit string 230 become designated as “real” or “ancillary” data, and how relations are implied between separate pieces of real data.
- the structure, meanings inter-relations between the parts of bit string 230 are intimately linked to the structuring of the object code 120 d.
- the bulk memory means section 130 a is shown to include additional record areas (Record No. 2 , Record No. 3 , etc.) each having the same data structure (represented respectively as string 240 which comprises data subsections 241 - 246 and string 250 which comprises data subsections 251 - 256 ).
- Record No. 1 is in physical proximity with Record No. 2 , as indicated by physical (or address) proximity link PR 12
- Record No. 2 is in physical proximity with Record No. 3 as indicated by physical proximity link PR 23
- the data items ( 231 - 236 , 241 - 246 , 251 - 256 ) within each record do not need to be examined according to this physical ordering. Instead, the name threading pointer 232 of Record No.
- FIG. 1 can represent the address of any other arbitrary record area within the bulk storage means section 130 a whose author's-name will serially follow the author's-name of box 231 during a search process. This is represented in FIG. 2A by the dashed logical link L 11 which points to some arbitrary record area, Record.Addr. 11 of section 130 a.
- the name threading pointer of the referenced record, Record.Addr. 11 can point to yet another arbitrary record.
- a list which is sorted (alphabetically for example) according to author's last name may be formed even though the records are not physically ordered in any specific sequence.
- the list is referred to as a “key-sequenced” list in cases where, as here, the sequencing key (or sort key) is data stored in the boxes e.g., 231 , 241 , 251 , etc. of a table column.
- the title threading pointers ( 234 , 244 , 254 ) of each record may be used to form a different key-sequenced path in which books are examined according to subject matter or alphabetically according to the book's title or according to some other ordering algorithm.
- the location threading pointers ( 236 , 246 , 256 ) can be similarly used to create a key-sequenced list which will identify what book is physically located next to what other book on the library's shelves.
- each threading pointer i.e., 232
- each real data item i.e. 231
- the author's name 231 may have many threading pointers, one for threading alphabetically according to last name, and others for threading according to additional relations such as geographic location, age, number of published books and so forth. It is up to the computer programmer and the access control program 120 d to assign “meaning” to each box and thus determine whether that box will function as a storage area for real data or for ancillary data such as pointer data.
- the records of FIG. 2A may be visualized as being serially stacked one on the next according to a sequence defined by a preselected one of the threading pointers (e.g. 232 or 234 or 236 ) to thereby create a displayable table which has as entries in the columns of each row, the real data items: author's name 231 , book's title 233 and book's location 235 .
- the ancillary threading pointers 232 , 234 , 236 are hidden from the lay user's view. New rows are added to the table by breaking a logical link (e.g., L 11 ) between a preceding pointer (e.g. 232 ) and a next pointer (e.g.
- the rows can be of variable length since the linking address pointers can point to any arbitrary location in the bulk memory means 130 .
- To get to the N th item of a threaded list one normally sequences from the beginning of the list (table) through all the threading pointers until the N th access is performed, at which point the contents of the addressed record area can then be read. For relatively large tables (e.g. those having thousands of rows), this process of sequencing through all the threading pointers to reach the N th row of a table can take a significant amount of time.
- each data string (e.g., 270 ) can be shrunk to contain only the essential target information, such as in this example, author's name ( 271 ), book's title ( 273 ) and book's location ( 275 ), with one item of real data being physically located adjacent to the next.
- the examination of all record items in this structure 260 may be performed according to the physical location of each record ( 270 ) within the address space of bulk storage area 130 b (the next adjacent string 280 follows first string 270 and so forth).
- the physical proximity links PR 012 , PR 023 , PR 034 , etc., of FIG. 2B do indicate a particular ordering of the stored information.
- the relative-table organization is somewhat similar to the way that index cars are physically ordered in a manual library system according to author's last name, except that the library catalog trays should now be visualized as having sequentially arranged grooves defined on their bottom-inner surfaces.
- Each groove is numbered according to its absolute position and only one card can be slotted into each groove. With this system, each card can be immediately located by its groove number rather than by thumbing through the information of all previous cards. If a groove number is known, substantial time can be saved in locating the corresponding card and obtaining the information written on its face.
- the same relative-table organization can be searched by sequentially thumbing through the trays and examining the cards according to a key-sequenced approach in order to find a desired card even though the cards are stored in grooves.
- the relative-table organizing method is not mutually exclusive of a key-sequenced examination method.
- a relative-table organized system is not as easily updated as is a purely key-sequenced system. In the relative table system, a new card cannot be inserted between two cards which already fill adjacent slots. This inflexibility has led many in the database management field away from the relative-table method and towards purely key-sequenced systems since the latter can accept any number of new cards for insertion between old cards.
- the relative-table structure 130 b of FIG. 2B is neither as flexible nor as easily updated as the key-sequenced organization 130 a of FIG. 2A , the relative-table structure 130 b has one major advantage over the key-sequenced structure 130 a; an N th item in a relative-table list 130 b may be accessed much faster than the N th item of a key-sequenced list 130 a.
- FIG. 3 is a block diagram of a bulk storage area 130 c whose data 130 d is organized according to a known key-sequenced scheme which is often referred to in the industry as a “relational” database.
- a “tables” area 300 contains a plurality of tables 310 , 320 , 330 , 340 and 350 . Each of these tables is defined purely by a threaded-list, key-sequenced structure such as shown in FIG. 2 A. For the sake of illustrative brevity the list threading pointers (i.e., 232 , 234 , 236 ) are not shown. Only the non-threading boxes (i.e., 231 , 233 , 235 ) are shown.
- Each table 310 - 350 is shown to have its respective rows sorted numerically according to “key” numbers that are stored in its leftmost column (referred to here as the “sort column”).
- a first of the key-sequenced tables, 310 (also labeled “Table of Names”), is shown to have two columns.
- One (right side) column 312 holds “real” data representing the names of various persons while a preceeding (left side) column 311 holds unique key-numbers, 1, 2, 3, . . . , N, N+1, N+2, . . . , each associated with a unique name of a person.
- the association of a person's name to a key-number is “implied” by the fact that the key number 1, 2, 3, . . . , N, . . . , is located in the same row of table 310 as is the corresponding “Person's Name”.
- Each key-number of left column 311 is referred to as a “Name Identification Number” (abbreviated here as N-IDN).
- N-IDN Name Identification Number
- Table 310 is shown to have been pre-sorted according to the N-IDN's of column 311 .
- the sorting method is indicated in FIG. 3 by positioning the initials “KSO” over column 311 to tag that column as the Key-Sequenced-Ordering column of table 310 .
- N To find the name of a person within table 310 whose associated identification number is known to be N, one normally starts at row number 1 of the left column 311 , where the N-IDN of the first person's name is stored and threads downwardly (in the y direction) through the threaded-list pointers (not shown) associated with this sort column 311 , testing each corresponding entry of column 311 for a match until the position holding the number N is found. Then one moves horizontally (in the x direction) across that row to the right column 312 to extract the name associated with the N th name identification number (N-IDN).
- an automated search machine 115 When an automated search machine 115 performs this thread and test process, it must retrieve data from the memory area 130 c at least N times before the target data (Person's-Name) is retrieved.
- the time for retrieving the target data is thus at least N times the access delay period (e.g., the t 2 ⁇ t 1 period of FIG. 1B ) of the memory means 130 .
- the access delay period e.g., the t 2 ⁇ t 1 period of FIG. 1B
- the N-IDN field of each row is generally made much shorter in bit length than its associated Person's-Name field.
- the N-IDN can be viewed therefore as an abbreviation of a person's full name.
- the first table 310 can be viewed as a conversion list or look-up table which allows one to easily convert a given abbreviation (N-IDN) into a full name.
- a second, separate, table 320 (also labeled as “Table of Locations”) is shown to contain two similar columns. Right column 322 stores “Home Addresses” in full while left column 321 holds unique, Home-Identification-Numbers (abbreviated H-IDN) which are generally shorter in bit length than the associated “Home-Address” fields.
- H-IDN'S thus can serve as abbreviations for the full address fields.
- Table 320 is ordered numerically according to the H-IDN's as indicated by the legend “KSO” over column 321 . The table 320 can therefore easily serve as part of an H-IDN abbreviation to full address converting means.
- the data organization 300 shown in FIG. 3 includes a third key-sequenced table 330 which is structured for doing just that; linking one persons' name with one home address while using the abbreviated bit strings, N-IDN and H-IDN.
- Third table 330 comprises three vertical columns, 331 , 332 and 333 .
- Left column 331 holds Person Identification Numbers (P-IDN's), 1, 2, 3, . . . , P.
- the rows of third table 330 are sorted using the P-IDN's as the sort key.
- the second column 332 contains a Name-IDN
- the third column 333 contains a Home-IDN.
- Each Name-IDN of third table 330 (for example, at row 4 of table 330 whose column 332 contains the value “N”) should have in the left column 311 of the Names table 310 a matching key number (e.g., the number N which is pointed to by arrow L 41 ).
- an N-IDN stored in the third table 330 can be used to indicate the row within the first table 310 where a person's full name may be found.
- Each Home-IDN of the third table 330 should similarly have a matching key number (e.g., the number 2 which is pointed to by arrow L 43 ) within left column 321 of the second “Locations” table 320 at whose row a corresponding full home address may be found.
- Each row (e.g., row 4 ) within the third table 330 implicitly creates a set of logical links or “relations”, L 41 ⁇ P 42 ⁇ L 43 which join a person's name to a particular home address.
- These links, L 41 , P 42 and L 43 are represented in FIG. 3 by dashed connecting lines which, in combination, join the Person's-Name held in table 310 , row N, to the Home-Address held in table 320 , row 2 .
- the implied linkage, L 41 ⁇ P 42 ⁇ L 43 does not arise from the contents of the first three tables, 310 , 320 and 330 taken alone.
- the key numbers (e.g., N-IDN, H-IDN, P-IDN) that are held within these tables are by themselves a meaningless series of numbers. It is only when randomly distributed modules of object code 120 d* stored within the memory means 120 of this “relational database” system ( 300 ) cooperatively interact with the CPU 110 that the implied relations come into being.
- the object code 120 d* instructs the CPU 110 to select a specific row (i.e., row 4 ) in the third table 330 , to extract the numbers from adjoining columns 332 and 333 of that row (thus implying the proximity link, P 42 ), to select table 310 , to sequence down its KSO column 311 looking for a match to the number from column 332 (thus implying logical link L 41 ), to select table 320 , to sequence down its KSO column 321 looking for a match to the number extracted from column 333 (thus implying logical link L 43 ), and to then extract from each respectively matching row of tables 310 and 320 the corresponding person's full name and full home address.
- a specific row i.e., row 4
- the object code 120 d* instructs the CPU 110 to select a specific row (i.e., row 4 ) in the third table 330 , to extract the numbers from adjoining columns 332 and 333 of that row (thus implying the proximity
- the search-and-translation machine 115 of embodiment 300 is able to link (L 41 ) an otherwise meaningless number (N) held in the third table 330 to a specific row (i.e. the row holding the same number N) positioned in another table ( 310 ) and to link (L 43 ) further numbers (i.e., the number “2” in col. 333 ) of the third table 330 to a specific row (i.e. the row holding the same number 2 ) of yet another table ( 320 ).
- This object-code dictated linkage L 41 ⁇ P 42 ⁇ L 43 then implies a “relation” between the Person's-Name field stored at row N of table 310 and the Home-Address field stored in row 2 of table 320 .
- Arrow L zz denotes that all illustrated linkages (L 41 ⁇ L 48 ) in FIG. 3 spring forth from randomly-distributed object code modules 120 d* of the access control program 120 d.
- the third table 330 assumes by its three column structure a one-to-one cardinality between person-name and home-address. It is assumed that a person can have only one home address.
- table 330 is incapable of handling a situation where a person has, for example, both a summer home-address and a winter home-address. Restructuring of the third table 330 would be called for if it becomes desirable to associate each person's name with more than one home address.
- a number of advantages come from organizing the tables of data storing area 300 separately according to relational database theory. Storage space is conserved in cases where plural entities of a first type (person) are related to a common entity of a second type (home address).
- the same Home-IDN can appear many times down column 333 without consuming large amounts of memory space while the actual full address is stored only once in second table 320 .
- the corresponding Home-IDN in column 333 can be easily altered to point to a new position within the second table 320 which contains the new home address (e.g., H+1) thereby implying the new person-to-address relation. If a person changes their name (i.e., by way of marriage) the home address can remain the same.
- the first three tables, 310 , 320 and 330 are used by a business institution (company) to keep track of the names of their employees and the corresponding home addresses of these employees. Let it be supposed that many employees need to commute to work by a privately-owned car. Some employees drive their own car, some drive a car owned by another employee and some are merely passengers. Let it be further assumed that after tables 310 , 320 , 330 are defined in a mass storage means 130 , the company decides to also keep track of which person drives which car, which person is a passenger in which car and further, who the owner of the car is.
- a fourth table 340 (Table of Drivers) may be constructed as shown in FIG. 3 to have a first key-sequenced column 341 storing plural driver identification numbers (abbreviated here as D-IDN's), 1, 2, 3, . . . , D.
- a second column 342 is provided for holding person identification numbers (P-IDN's) and a third column 343 is provided for holding car identification numbers (C-IDN's).
- a fifth table 350 (Table of Cars) may be similarly constructed as shown with a first KSO column 351 for holding the C-IDN's (1, 2, 3, . . .
- the latter number implies a logical link L 46 to row 2 of table 350 which holds the serial number (SN) of the driven car.
- the fifth table 350 may have to be restructured to add new columns (i.e., 354 , 355 , etc.; not shown) which would allow for the implication of such new relations.
- a newer form of database organization referred to sometimes as the “object oriented” approach, has been proposed to solve some of the problems associated with reorganizing and updating previous database systems.
- object-oriented approach encapsulation bubbles are defined to hide from external view, data which is encapsulated within the bubble.
- Each bubble is referred to as an “object” and the encapsulated information of the object is referred to as the object's “attributes.”
- One bubble may encapsulate a second bubble which in turn encapsulates third, fourth and further bubbles so that a relatively complex data structure may be defined.
- Objects can be assigned to “classes” and by such assignment they can be made to automatically “inherit” the attributes of other objects in the same class, even when the class attributes are changed after creation of the objects.
- the present invention takes an approach which might be considered a partial hybrid of the object-oriented approach and the earlier-described relational database methodology. It provides a database system which is capable of operating at commercially acceptable speeds and which is easily restructured as well as updated. The invention will be explained first conceptually and then by concrete examples.
- a relational graph or “schema” 400 which contains three egg-shaped bubbles labeled respectively as “Customer”, “Address” and “Account”. These bubbles are not intended to represent “objects” from the object-oriented school of thought, but rather “classes” of entities. Each of these bubbles is referred to as an “entity type” or “entity class”.
- entity class generically covers all entities which might fit under the broad descriptor “Customer”, regardless of whether that entity is a natural person, a business corporation, an association or so forth.
- the “Address” entity class covers all entities which fit under the broad descriptor “Address” regardless of whether the subject entity is a residential address, a business address, a post-office mailing address or so forth.
- the “Account” entity class covers all sorts of accounts including savings accounts, checking accounts, trust accounts, etc.
- Each entity bubble may contain one or more “instances” of the entity class (i.e., Customer, Address, Account) which it represents.
- entity class i.e., Customer, Address, Account
- the Customer bubble also labeled as entity class “E- 1 ”
- the address bubble (E- 2 ) can at the same time contain many “addresses”, each corresponding to that Customer-B. If Customer-B is a person, the address instances might be summer-home and winter-home addresses.
- Customer-B is the name of a business having a chain of stores
- the plural addresses in the second bubble (E- 2 ) might be the mailing addresses of those stores.
- the name “Customer-B” is an example of a first instance, I 1/E1 , of the E- 1 entity class and is illustrated conceptually in FIG. 4A as a small sphere I 1/E1 enclosed in the entity class bubble E- 1 .
- Three instances, I 1/E2 , I 2/E2 and I 3/E2 of entity class E- 2 are similarly illustrated as three spheres inside of entity bubble E- 2 .
- the Account bubble (E- 3 ) is restricted by a peculiar rule so that at any one time it may contain only one account number (instance I 1/E3 ) which is somehow associated with Customer-B.
- the present invention treats “relations” as being objects of equal substance to the entities they tie together.
- Relation “classes” and instances of a specified relation class are shown in FIG.
- Each relation bubble R-x (where x is an arbitrary identifier, 1 , 2 , 3 , etc.) is visualized as having a bulb-shaped Head portion, H, an elongated body portion B and an arrow-shaped Tail portion, T.
- a “Head attribute” can be assigned by each relation bubble R-x to the entity bubble (E-h) located at its head end (H).
- a “Tail attribute” can be correspondingly assigned by each relationship bubble R-x to the entity bubble (E-t) located near its tail end (T).
- the combination of the Head-attribute, if any, plus the Tail-attribute, if any, can be used to give the relationship bubble (R-x) a “meaning”. This meaning is generated by associating with the body portion B of each relationship bubble (R-x), a “meaning-string” which preferably, but not necessarily, has a head character-string and a tail character-string.
- the top relation bubble R- 1 is shown to have the meaning string “'s business”.
- the substring, “'s” is a head character-string while the substring “business” is a tail character string.
- the meaning-string ('s business) appears to be nonsensical, but in conjunction with the class names its head and tail entities, E- 1 (“Customer”) and E- 2 (“Address”), this first relations bubble, R- 1 , forms the relational phrase: “The Customer's business Address”.
- Instance I 1/E1 is a specific customer's name (i.e., “Customer-B”) and instances I 1/E2 , I 2/E2 and I 3/E2 are now defined as specific instances of that customer's business addresses (i.e., the addresses of individual stores in a chain of stores owned by Customer-B).
- each entity bubble (E- 1 , E- 2 , E- 3 ) is free of any narrowing attributes or modifiers and instead, represents a relatively broad and generic listing of data items which can come under the heading of either “Customer” or “Address” or “Account”. The advantage of this structure will become apparent shortly.
- the address bubble (E- 2 ) should be restricted to at any one time contain only a single instance (e.g., I 1/E2 ) representing the “Customer's headquarters Address” rather than many instances. Presumably each customer can have only one headquarters address. Thus, the “cardinality” of relations bubble R- 1 must be changed from its earlier one-to-many ⁇ 1:m ⁇ format, as was possible with business addresses, to a one-to-one setting ⁇ 1:1 ⁇ .
- each relation bubble, R-x has a cardinality rule (e.g., ⁇ 1:1 ⁇ or ⁇ 1:m ⁇ ) associated with its body B as well as a meaning- string (e.g., “'s business”).
- a cardinality rule e.g., ⁇ 1:1 ⁇ or ⁇ 1:m ⁇
- a meaning- string e.g., “'s business”.
- each relation bubble (R- 1 ) further incorporates a mandatory-coupling character which can be either “Y” or “N” (representing yes or no). If it is required that at least one instance (I 1/E2 ) of a tail entity class E- 2 should be created whenever an instance (I 1/E1 ) of a head entity class E- 1 is created, then the mandatory-coupling character of relation bubble R- 1 is set to “Y”.
- the second relation bubble, R- 2 is shown to contain in FIG. 4A the meaning string, “'s owning”, the cardinality rule, ⁇ 1:1 ⁇ , and the mandatory-coupling character, “Y” (presumably every account should have an owner).
- the third relation bubble, R- 3 is shown to contain the meaning string, “'s statement mailing”, the cardinality rule, ⁇ 1:1 ⁇ , and the mandatory-coupling character, “N” (presumably an account holder can pick up his/her statement rather than having it mailed). Instances of entity E- 1 which satisfy the relationship created by relation bubble R- 2 are read as “The Account's owning Customer”.
- Inquiry paths can be defined to extend through pluralities of entity and relation bubbles as well as between just two entity bubbles. Still referring to FIG. 4A , suppose that a bank officer finds an important document bearing only an account number on it. The bank officer needs to immediately contact a person who is authorized to manage that account for more details about the document. In such a case, the bank officer would turn to a database processing engine according to the invention (explained later with reference to FIG.
- inquiry paths can include many more bubbles, they can branch out to form a tree rather than being serial and they can produce many pieces of information which are useful for solving a puzzle rather than just one piece of target information.
- Relation bubbles (R-x) do not have to be single tailed.
- FIG. 4B further variations of the concept behind the invention are illustrated.
- a fourth relation bubble, R- 4 is shown to have a plurality of tail ends, T 1 , T 2 and T 3 , so that a single meaning-string (e.g., “'s business”) can simultaneously couple a common Head entity (Customer) to a plurality of Tail entities (e.g., Address, Account and Telephone).
- a relation bubble does not need to span between different entity bubbles.
- FIG. 4B shows another relation bubble, R- 5 , which folds back in a loop so that the Head entity (Customer) is also the Tail entity.
- relation bubble R- 5 contains the meaning string “'s largest”. Given the name of a first customer, this back-looping relation bubble R- 5 allows one to find that customer's largest customer. The loop may be followed around ad infinitum to obtain a long list of largest customers belonging to other largest customers.
- FIG. 5 there is shown a first table 500 which is referred to as an entity definition table or in abbreviated form, ENT.DEF Table 500 .
- This entity definition table 500 is stored within a data strong area 130 -RP of a database engine in accordance with the invention. Data storing area 130 -RP preferably resides within a bulk storage means 130 * such as diagrammed in later-to-be described FIG. 8 .
- the entity definition table 500 of FIG. 3 which relied on a purely key-sequenced organization, the entity definition table 500 of FIG.
- Each row of the ENT.DEF table 500 is of a fixed bit length and has two columns.
- the first (left) columns 500 a stores a two character field (e.g., “CU,” “AD,” “AC” or “SU”) which is an abbreviation of an entity class name.
- the abbreviation “EA” will be used here to mean “the abbreviated form of the entity class name” (Entity-name Abbreviation).
- slot number 1 is shown to contain the two-character abbreviation “CU” (representing the entity name “Customer”) in its left column 500 a.
- a matrix notation is used here to identify the columns of table 500 with letters, a, b, c, . . . , etc. and the rows with a numeral preceeded by a period.
- the symbol 500 a. 1 thus refers to the box in table 500 at column 500 a and row 500 . 1 .
- the abbreviation “AD” is stored in box 500 a 2 to represent the entity name “Address”.
- Box 500 a. 3 holds the abbreviation “AC” for “Account” and box 500 a. 4 stores the abbreviation “SU” for “Supplier”.
- the slot or row numbers, . 1 , . 2 , . 3 and . 4 of table 500 do not occupy storage space within memory means 130 -RP. They merely represent the physical or logical address of their respective rows, 500 . 1 , 500 . 2 , 500 . 3 and 500 . 4 .
- Instances belonging to two different entity classes may be stored in one instances table (EiT) under situations where the data structures of the instances are compatible to the structure of that EiT (e.g., the entity instances table has enough columns of appropriate widths to support the descriptions of each entity instances).
- EiT instances table
- the slot number may function as an “entity type number” (abbreviated here as ETN) for numerically identifying its corresponding entity class.
- ETN entity type number
- an additional “type number” column (not shown) may be added to the ENT.DEF table, 500 , unique type numbers may then be entered into each row of the type number column and these can serve as the ETN's.
- the ETN happens to be the same as the slot number (e.g. slot 500 . 2 ) where the entity name abbreviation (e.g., AD) is stored in the ENT.DEF table together with the name of the corresponding EiT (e.g., T. Addresses).
- the unique ETN's can be assigned arbitrarily such as according to the alphabetic ordering of the EA's in which case the ETN's may be used as sort keys for alphabetically ordering the ENT.DEF table rows according to entity class names (e.g. using threaded-list techniques).
- FIG. 6 there is shown another table 600 which is also stored within the data storage area 130 -RP of an engine according to the invention.
- This table 600 may also have a relative-table organization (RTO) and it is referred to as a relations-definition table, or REL.DEF table 600 for short.
- RTO relative-table organization
- a matrix notation is used here to identify vertical columns of the REL.DEF table as 600 a, 600 b, 600 c, etc.; horizontal rows as 600 . 1 , 600 . 2 , 600 . 3 , etc.; and individual boxes as 600 a. 1 , 600 a. 2 , 600 b. 1 , 600 b. 2 , etc.
- the left-most column 600 a holds a two character abbreviation representing the class name and/or meaning-string of a relation bubble.
- the mnemonic, RA will be used here to designate such a relationship abbreviation.
- box 600 a. 1 holds the abbreviation “-BU-” which represents the meaning-string “'s Business”. (Hyphens embrace the relation abbreviations here to distinguish them from entity abbreviations [EA's].)
- Box number 600 a 2 stores the abbreviation “-OW-” to represent the meaning-string “'s Owning”.
- Box number 600 a. 3 stores the abbreviation “-SM-” to represent the meaning-string “'s Statement Mailing”.
- Box number 600 a. 4 holds the abbreviation “-HQ-” to represent the meaning-string “'s Main Headquarters”.
- Each row of the REL.DEF table 600 may also identified numerically by a “relationship type number” (RTN) which in the illustrated example happens to be the same as the slot number (. 1 , . 2 , . 3 , etc.) where its corresponding two character code (-BU-, -OW-, -SM-, etc.) is stored.
- RTN relationship type number
- a type number column (not shown) may be added to the REL.DEF table 600 and unique RTN's may be assigned according to any desired, unique number generating scheme, such as according the alphabetic ordering of the RA's.
- the RTN's can also function as sort keys for ordering the rows of the REL.DEF table (using threaded list techniques) alphabetically according to relationship class names (RA's).
- RA's relationship class names
- the second column 600 b of the REL.DEF table there is stored, for each slot (. 1 , . 2 , . 3 , etc.), the name of a single table where instances of the named relation class are stored.
- the mnemonic, “RiT” (Relation instances Table), is used here to represent such a table.
- the entries in boxes 600 b. 1 , 600 b. 2 , 600 b. 3 and 600 b. 4 are respectively: “T.Rel- 1 ”, “T-Rel- 2 ”, “T.Rel- 3 ” and “T.Rel- 1 ”.
- the entries of box numbers 600 b. 1 and 600 b. 4 are the same.
- Compatible instances of two different relation classes may be represented by two corresponding rows of data stored in a common relation-instances holding table (RiT).
- the third column 600 c of the REL.DEF table stores the type number (ETN h ) of a head entity (E-h).
- the entity type number (ETN h ) is the same as an ETN assigned to a corresponding row in the ENT.DEF table 500 where the abbreviated class name (EA) of that head entity bubble is stored.
- the fourth column 600 d of the REL.DEF table stores the type number (ETN t1 ) of a corresponding first tail entity (E-t 1 ).
- FIG. 6A the first three rows ( 600 . 1 , 600 . 2 and 600 . 3 ) in FIG. 6A correspond to the relations schema shown in FIG. 4 A.
- row number 600 . 1 is read across using the column sequence: c, a, d, it corresponds to the relationship descriptor phrase “Customers' business Address”.
- Box 600 b. 2 tells us that instances of this relationship are stored in an RiT table called “T.Rel- 1 ”.
- row number 600 . 2 columns c, a, d correspond to the relationship descriptor phrase “Account's owning Customer”. Box 600 b. 2 tells us that instances of this relation are stored in table T.Rel- 2 .
- Row number 600 . 3 likewise corresponds to the relationship describing phrase “Account's statement mailing Address” and tells us that instances of this relation are found in the T.Rel- 3 table.
- the REL.DEF table 600 can be updated indefinitely by adding new rows to its bottom so as to encompass a great number of further relation classes. There is no need to physically order the data describing each of the relational classes and thus descriptions of new classes can be added to the bottom or other empty slots of the REL.DEF table 600 sporadically as the need arises over time. Relation classes which become obsolete can be deleted to leave behind an empty slot. Similarly, there is no need to order the entity classes defined by the ENT.DEF table 500 .
- the ENT.DEF table can be updated by arbitrarily adding new entity class describing rows to its bottom or other empty slots or by deleting obsolete entries as the need arises.
- new relation classes may be defined in combination with new head and tail entity classes.
- the schema of the invention can be continuously restructured as the need arises simply by updating the REL.DEF and ENT.DEF tables, 600 and 500 .
- the fifth columnar region 600 e of FIG. 6A represents a plurality of additional columns within the REL.DEF table 600 .
- the names of multiple tail entities which are activated in addition to or in substitution for the first ETN t of column 600 d may be optionally entered in this region 600 e.
- FIG. 6B an exploded view of this fifth region 600 e is illustrated.
- each relation class R-x can have as many as five tail entities (T 1 , T 2 , T 3 , T 4 , T 5 ).
- the invention is, of course, not limited to five.
- Column 600 d identifies the first tail entity, T 1
- extension columns 602 through 605 in region 600 e identify the optional, other tail entities, T 2 -T 5 .
- Extension region 600 e is shown to include a tail activating column 606 which functions as a mask to activate or deactivate each of the corresponding tail entity columns 600 d, 602 - 605 .
- a dark filled circle means that the corresponding tail entity of that slot (row) is active while an unshaded circle means that the respective tail entity is deactivated.
- the mask column 606 may be dispensed with and the lack of an ETN entry (or a “null” entry) in a box of columns 602 - 605 will be regarded as indicating a deactivated tail while the inclusion of an ETN value will be regarded as indication an active tail.
- the relation bubble takes on a multi-tailed form such as shown in FIG. 4B at R- 4 .
- the same meaning-string is applied to the plural tail entity bubbles of the activated tails.
- Multiple copies of a prespecified row in the REL.DEF table 600 may be added to empty slots within the table 600 in a boiler-plate stamping manner with only the tail activation masks 606 being modified or some ETN entries of columns 602 - 605 nulled from copy to copy in order to generate a wide variety of different relation classes.
- next column 600 f of the REL.DEF table holds a code indicating the cardinality of the corresponding relation bubble (e.g., ⁇ 1:m ⁇ or ⁇ 1:1 ⁇ ).
- the next following column 600 g contains a one character code indicating whether there is mandatory coupling (MC) between an instance of the head entity and an instance (or instances) of the tail entity (or active tail entities).
- FIG. 7 a broader view 700 of a relations-processing storage area 130 -RP in accordance with the invention is now shown.
- Storage means 130 -RP is coupled to a data search-and-retrieval machine 815 by way of address bus 131 and data bus 132 .
- RTO relative-organized
- T.Companies table 710 T.Addresses table 720 . Both of these are Entity-instance Tables (EiT- 1 and EiT- 2 , respectively).
- the T.Companies table 710 has one column 710 a in whose numbered slots ( 710 a. 1 , 710 a. 2 , 710 a.
- the T.Addresses table 720 has one column 720 a in whose slots ( 720 a. 1 , 720 a. 2 , 720 a. 3 , etc.) there are stored data fields representing various street addresses.
- Each piece of “real” data such as the name of a company (e.g., “Allen's Automobiles”) is referred to as an “Entity-instance” or Ei for short.
- the slot number where the Ei is stored defines an “Entity-instance Number” or EiN for short.
- the broader view 700 reveals a third table 730 which is labeled in FIG. 7 as the T.Rel- 1 table and also as RiT 730 .
- Each of the numbered slots, 730 . 1 , 730 . 2 , . . . , 730 . 6 , etc., in this “Relation-instances Table” (RiT) 730 has five columnar entries.
- Columns 730 a and 730 b in combination identify particular instances of a head entity class (Head Ei) while columns 730 d and 730 e in combination identify particular instances of a tail entity class (Tail Ei).
- the logical link from third table (RiT) 730 to table area 500 .a is labeled as L 731 .
- the link from table area 500 . 1 to the first table (EiT- 1 ) 710 is labeled as L 751 .
- box number 710 a. 5 of the first EiT 710 contains the name “Expert Electronics” and this name-string is the entity instance referenced by the “CU. 5 ” entries of boxes 730 a. 2 and 730 b. 2 .
- the link from box 730 b. 2 to box 710 a. 5 is labeled as logical link L 732 .
- a similar linkage is created to the instance of a tail entity class.
- the “AD” entry of box 730 d. 2 points to a second section 500 . 2 of the ENT.DEF table (thereby defining link L 733 ) where a second pointer is found to a second Entity-instances Table (EiT- 2 ) which in this example is the T.Addresses table 720 (thereby defining link L 752 ).
- Box 730 a. 2 holds the slot number (. 4 ) of the indirectly referenced table 720 in which the target data “ 555 Transistor Lane” is stored (thereby defining link L 734 ).
- Relationship-instances Table (RiT) 730 defines a connecting relationship (extending from the arrowhead of L 732 to row 730 . 2 to the arrowhead of L 734 ) which joins the instance “Expert Electronics” of entity class “Customer” (CU) with the instance “ 555 Transistor Lane” of the “Address” (AD) entity class.
- Each row of the RiT 730 is referred to as a “Relation-instance” (abbreviated as Ri) and the slot number of that row defines a corresponding “Relation-instance Number” (RiN).
- this column holds an identifier pointing to a corresponding row in the REL.DEF table 600 where the relationship class of the instant relationship (Ri) is defined.
- the RA of each relation class is shown entered in column 730 c. It is within the contemplation of the invention to alternatively enter the corresponding slot number, RTN, of the REL.DEF table 600 so as to speed the access time of the retrieval machine 815 .
- the entry “-BU-” in box 730 c. 2 indicates that the relationship between the head instance, Customer. 5 , and the tail instance, Address. 4 , is the “'s Business” meaning-string associated with slot 600 . 1 of the REL.DEF table (FIG. 6 ).
- the relation instances table, T.REL- 1 730 may contain many rows, each of which has the identical head entity-instance entries (in col.s 730 a and 730 b), identical tail entity-instance entries (in col.s 730 d and 730 e), but different relationship-defining entries (e.g., -BU-, -HQ-, -OW-, etc.) in column 730 c. Each of these almost identical rows would represent a different Relation-instance (Ri).
- the address instance AD. 4 might be the “Business” address of customer instance CU. 5 as shown in slot 730 . 2 . But it may also be the headquarters address “-HQ-” of that same customer CU. 5 as shown in slot 730 . 6 .
- a relational query which asks the question, “What is the headquarters address of my customer, Expert Electronics?” would be answered by accessing row 730 . 6 of the T.REL- 1 table 730 .
- the slightly different relational query, “What are all the business addresses of my customer, Expert Electronics?” would be answered by accessing all rows in the T.REL- 1 table 730 beginning with the entries, “CU. 5 -BU-”, which in the illustrated case includes rows 730 . 2 and 730 . 5 .
- Relation-instances Table With the illustrated structuring of a Relation-instances Table (RiT 730 ), all sorts of relational inquiries can be answered by starting with a known first instance of a first entity class, irrespective of whether the class is a head entity class or tail entity class, and searching through the RiT 730 to locate all relationship-instances (Ri's) of which that starting instance is a member. Once the matching Ri rows are found within a designated Relation-instances Table (RiT), it becomes a simple matter to scan horizontally across the row from the starting instance through the relation descriptor of column 730 c to find the corresponding, but until now, unknown instances of the opposed tail and head entity classes.
- the uncovered instances can then serve as stepping stones for answering further parts of a compound query.
- a compound query For example the two-level query, “What are all the business addresses of my customer Expert Electronics, and once you know that, what other customers use those addresses as their business addresses?”
- compound queries are answered by defining one or more question lines in an inquiry-definition (INQ.DEF) table 740 .
- Each question line is identified as belonging to either a one level question or to a particular level of a compound question.
- a first column 740 a of the INQ.DEF table is provided for holding the entity type numbers (ETN) of one or more entity classes, regardless of whether they are known at the start of a query.
- a second column 740 b of the INQ.DEF table is provided for holding corresponding instance-identification numbers (EiN), again regardless of whether they are known at the start of a query.
- a third column 740 c is provided for holding one or more relation type numbers (RTN) while a fourth column 740 d is provided for holding corresponding relation-instance numbers (RiN), some of which may be known and others not known at the start of a query.
- RTN relation type numbers
- RVN relation-instance numbers
- Fifth column 740 e defines the level of each question row relative to preceding question rows.
- RTN value which if known, is entered in a box of third column 740 c in order to indicate to the retrieval machine 815 a corresponding row in the REL.DEF table 600 from which the retrieval machine 815 can obtain the name of the single table (RiT-x) where all instances of the named relation type (RTN) reside.
- the identified table, RiT-x can then be searched for one or more Ri rows which hold information relevant to a posed query. When found, the RiN values of those rows are entered into one or more boxes of fourth columns 740 d.
- the specific Ri rows (e.g., row 730 .
- the retrieval machine 815 can then be accessed to direct the retrieval machine 815 to the corresponding head and tail entity instances of interest (e.g., the CU. 5 and AD. 4 ) instances which are related to one another by the -BU-entry of box 730 c. 2 ).
- head and tail entity instances of interest e.g., the CU. 5 and AD. 4
- Ri row or rows of interest can be nonetheless located by partially filling in a row within the INQ.DEF table 740 and then searching the REL.DEF or ENT.DEF tables for additional information.
- Row 740 . 2 of the INQ.DEF table is shown to have the question line, “??.?-HQ-?” which may mean “Please identify the Headquarter addresses of all my customers”. In such a case, all rows of the T.REL- 1 table 730 which have the entry -HQ- in their middle column 730 c would provide the required information.
- Each such -HQ- row of RiT 730 would pair an identified instance of a Customer (head Ei) with an identified instance of a headquarters Address (Tail( 1 ) Ei). It is to be appreciated that for cases of multi-tailed relation classes, the corresponding RiT would have columns for identifying the other tail entity instances (e.g., Tail( 2 ) Ei, Tail( 3 ) Ei, etc., not shown).
- an inquiring user has a specific but fragmentary piece of starting information such as the street address “ 555 Transistor Lane”.
- the inquiring user wishes to find out the names of one or more companies for whom “ 555 Transistor Lane” is a “Business Address”.
- the user identifies the fragmentary information to the data retrieval machine 815 as belonging to the “Address” entity class.
- the machine 815 searches through the ENT.DEF table 500 to locate the entity type number “ETN” of the named class and the Entity-instances Table “EiT” where all instances of this “Address” entity class are stored.
- the illustrated relative-table organization “RTO” of the ENT.DEF table 500 is not mutually exclusive of a key-sequenced organization “KSO”.
- a different table can serve as an abbreviation to full name look-up table for converting between the entity name abbreviation (EA) and the full name or narrative description of the entity class (ECN) if desired or, alternatively, the ENT.DEF table 500 may include one or more additional columns (not shown) for providing this search and conversion function.
- the retrieval machine 815 then obtains from box 500 b. 2 of the ENT.DEF table the name of the corresponding EiT where it is to search for the occurrence of the fragmentary information “ 555 Transistor Lane”.
- the EiT's can be key-sequence organized (KSO) in addition to their RTO structuring to facilitate such searching.
- KSO key-sequence organized
- the corresponding EiT in this case, the T.Addresses table 720
- the row of the fragmentary information is found
- its corresponding EiN in this case . 4
- ESN entity type number
- the starting instance is AD. 4 .
- the relationship type number (RTN) of the relationship under question (-BU-) is entered in box 740 c. 3 . If the RTN value is not known, the REL.DEF table 600 is first searched to generate the appropriate RTN. While not shown, the REL.DEF table or some other table will include a full name or narrative column for converting between a relationship's full name/description and its abbreviated form (RA). Box 740 d. 3 is now the last puzzle piece to be filled in as indicated by a question mark in FIG. 7 .
- the retrieval machine 815 searches through the corresponding RiT (T.REL- 1 table 730 ) to locate all relation-instances (Ri's) which have the corresponding ETN plus Ein in the tail entity instances columns 730 d and 730 e and the corresponding RTN in column 730 c.
- the REL.DEF table 600 identifies the starting entity class of the AD. 4 -BU-? question as being a tail entity. (When there is more than one tail entity, the RiT will have plural columns for identifying first, second, etc.
- the ETN.EiN identifiers of the uncovered Level-1 answer “Expert Electronics” can now serve as stepping stones which fuel a second part of a compound query.
- the full query might have been “Who has business address, 555 Transistor Lane and what bank accounts belong to the entity or entities that satisfy the first part of this question?”
- the first part is defined here as “Level-1” of the question and the second part as “Level-2”.
- Column 740 e of the INQ.DEF table is shown to identify the level number.
- Inquiry box 740 c. 4 is shown already filled with the relationship identifier (-OW-) for locating account owners.
- the answer to inquiry row 740 . 4 may be used to fuel yet a further level (Level-3, not shown) of a compound inquiry and the answer or answers to that inquiry may fuel yet further inquiry rows.
- FIG. 8 a block diagram of a database system 800 in accordance with the invention is shown.
- Bulk storage means 130 * is indicated to include a relation-processing region 130 -RP in accordance with the invention.
- the bulk storage means 130 * may also include previously-utilized relational tables for defining “implied” relationships between entities. Such “implied” relationships are not incompatible with the “explicit” relationships that are defined by the REL.DEF table 600 of the invention.
- the REL.DEF table and ENT.DEF table may be used to define a continuously expandable backbone which supports various relationships (RiT- 1 , RiT- 2 , etc.) between various entity instances (EiT- 1 , EiT- 2 , EiT- 3 , etc.).
- the INQ.DEF table may be visualized as having two legs (dashed vertical lines) which sequentially step from a starting instance table (EiT- 1 ), across a starting table of relationship instances (RiT- 1 ) to an explicitly linked table which holds relationship-opposed instances (EiT- 2 ) of the starting instances.
- the opposing instances (of EiT- 2 ) then become starting instances for a next inquiry step over yet a further set of relationship instances (RiT- 2 ).
- REL.DEF and ENT.DEF tables may be expanded as desired by adding new entries to empty middle or bottom slots found within them, a lay user can create new entities, new relation classes and restructure the schema of explicitly-defined relationships and entities forever without having to reprogram the database system 800 at the source or object code level. Instead, the lay user supplies schema restructuring commands, in an appropriate structured language, as indicated at 870 for restructuring the schema whenever needed.
- the access control program 820 d of the retrieval machine 815 may remain fixed while the entity-to-explicit-relationship schema of region 130 -RP is forever changed. Accordingly, object-code compilation 814 needs to occur only once.
- the source code listing 812 of this access control program needs to be developed and debugged only once. Substantial cost savings are realized, especially as time progresses and new entity-relationship schemes are required.
- the ENT.DEF table and REL.DEF table may be relatively short, having for example less than 1000 rows each (e.g., the ENT.DEF table may have 30 rows or less and the REL.DEF table may have approximately 100 rows or less).
- the ENT.DEF table and REL.DEF table may have approximately 100 rows or less.
- the copied versions of the ENT.DEF and REL.DEF tables can be purely-key-sequenced if an additional “type number” column is added for storing the respective ETN's and RTN's of each row.
- the higher data access speed of the first memory means 120 more than compensates for any speed reduction which might be caused by switching to a purely key-sequenced organization.
- These “mirror” copies of the ENT.DEF and REL.DEF tables are then accessed by the CPU 110 in place of the original ENT.DEF and REL.DEF tables. It is advisable to periodically check the original ENT.DEF and REL.DEF tables for possible revisions, since lay users may update that original tables at any time, and when such revisions are detected, to immediately recopy the ENT.DEF and REL.DEF tables into the first memory means 120 so that the mirror tables faithfully reproduce the contents of the original tables.
- the CPU 110 in combination with the various modules of the object code 820 d can be visualized as one or more machine means for performing data-altering functions as specified by the object code 820 d.
- a Microfiche Appendix is included here listing sample modules written in Tandem COBOL'85TM and TANDEM SCREEN COBOLTM for execution on a Tandem NONSTOPTM computer system running under Tandem NonSTOP SQLTM, TMFTM, PathwayTM, SCOBOLXTM and GuardianTM systems (all available from Tandem Computers of Cupertino, Calif.). It is to be understood that the sample modules disclosed in the Microfiche Appendix are merely exemplary. The invention may be practiced using different computer hardware and/or software.
- the engine 900 comprises an inquiry guide means 910 which is coupled to a relationship defining means 960 , a relationship storage and search means 970 and to an intermediate-answers receiving means 980 .
- the intermediate answers means 980 feeds abbreviated answers back to the inquiry guide means 910 after such answers are produced by the relation storage means 970 .
- Desired ones of all produced results are sent from the inquiry guide means 910 to an abbreviated results gathering means 915 which then expands them into full result details by sending an entity type signal sETN x to an Entity Define means 950 which includes within itself, the earlier described ENT.DEF table 500 .
- the sETN x signal is converted by the entity define means 950 into an entity table selecting signal sEiT which is fed into an entity storage means 920 that includes within itself a plurality of entity-instances tables (EiT- 1 , EiT- 2 , etc.) such as earlier described.
- Results gathering means 915 also feeds an instance row selecting signal, sEiN, to entity storage means 920 . Details from the addressed entity instance row are then transmitted through a details filter 985 and portions of the details which are selected by the filter 985 are then printed on a detailed results display (e.g. a video monitor) 990 .
- Relationship inquiry in general is a two step operation: path selection (to create an Inquiry) and inquiry execution.
- path selection to create an Inquiry
- inquiry execution On a Path Selection screen (not shown) the operator selects starting and optionally ending entity types and supplies detailed description of the path to follow.
- Path Selection screen (not shown) the operator selects starting and optionally ending entity types and supplies detailed description of the path to follow.
- Each path is defined in terms of:
- a single inquiry definition may initiate several parallel paths which extend from a starting entity type to an ending entity type.
- the ending entity type has not been specified in the header of the path-selecting screen then all these parallel paths can end with different entity types.
- an inquiry to show a person's total involvement with all accounts held at a bank could be defined as shown in the following Table I:
- level numbers are used to determine which entity types are intermediate to a path, which entity types terminate a path, and which relationship types commence a new parallel path.
- a line containing a level number which is the same as that of an immediately previous line indicates a parallel path separate from the previous line.
- a level number greater than that on the previous line indicates the entity on the previous line is an intermediate entity (i.e. the path is an association, and will follow several relationship links before terminating the path.)
- Each unique set of inquires is given a unique name, stored as such in the inquiry-definition table (INQ.DEF) and may be recalled for execution repeatedly at any time without need to go through the path selection process again.
- the operator Before executing the predefined inquiry, the operator must select one or more starting entity instances for which the query is to run. Hence for each execution of an inquiry, the operator must choose which occurrence of the Starting Entity Type to use. Using the previous sample inquiry to investigate persons of the names, “John Smith” and “Bill Brown”, the operator would execute the same inquiry once using “John Smith” as the Starting Entity instance and once using “Bill Brown” as the Starting Entity instance.
- the Inquiry is executed by examining each of the defined paths in turn. Starting with the selected entity and following the first relationship, a list of intermediate (or target) entities is assembled. For each of the intermediate entities the next leg of the path is followed through the level 2 relationship etc. until the inquiry operation arrives at the ending entity type at which time the results of the entire path (with all intermediate entities and relationships) may be displayed to the operator.
- the operator may select not only the starting entity occurrence of interest but also the occurrence of an ending entity. In this case the inquiry will return results from only the paths that satisfy this termination condition.
- Reusable inquiry sets would normally only be created by privileged users. However, each inquiry set that is created for subsequent executions may be given its own security settings and attached to its own menu. Hence where sensitive data was involved, normal operators would be given access to only those inquiry sets they specifically need for their day to day business operations.
- the inquiry engine 900 of the invention can operate at high speed because the EiT and RiT structures, while they may be large in size rely on relative tables.
- Relative table structures have always offered high performance for Random memory access (as opposed to key-sequenced access) but presented many complications and difficulties in other areas of use (e.g. updating). Because of this, conventional wisdom has been to use purely Key-Sequenced structures almost exclusively. Key-Sequenced structures pay performance penalties for the use of extra indexing levels.
- Relative structures in this case meant compressing the file (table) to regain unused slots. This process can change the relative addresses from their original values, which can cause corruption of the database. Reorganization is no longer required because Relative structures such as offered in Tandem's NonSTOP SQLTM system allow deleted row slots to be reused immediately. The Tandem system actually ensures that vacated slots are used again and again. Relative tables in NonSTOP SQLTM can be partitioned and re-partitioned without risk of corrupting the database, but table compression is no longer necessary or allowed. Partitioning a table means that the table can be split across a plurality of data storage devices, usually disks, transparent to the object code of the application program running under NonSTOP SQLTM.
- the second problem with Relative structures was implementing meaningful keys that allowed access to the data in a sequence based on indicative data, such as numerical order of account number or alphabetical order of customer name.
- indicative data such as numerical order of account number or alphabetical order of customer name.
- Alternate Key index tables it is possible to provide meaningful sequential access of entities stored within Relative Tables.
- the Relationships Processor or “engine” of the present invention is a “Closed Loop” system in that all explicit schema definitions are stored within the system.
- the finite set of tables and their meanings are also defined within the system. This provides an infrastructure that makes the Table Structures transparent to users and developers. Hence, Relative tables can be used for performance improvements while avoiding any usability penalties that once existed.
- a benchmark was run on a Tandem NonSTOP SQLTM system to test the system's performance capabilities.
- the benchmark was to simulate the normal processing requirements of an extremely large bank's Customer Information System.
- the database used 14 Gigabytes of disk storage space, and was populated with 5 million Customers, 7 million Cards, 9 million Addresses, 10 million Accounts and 67 million relationships.
- the benchmark simulated 1000 simultaneous users (tellers), with each user executing 100 typical on-line transactions.
- the invented system achieved a rate of 64 transactions per second with less than 2.6 second response time for 90% of all transactions which included all screen formatting. This is quite remarkable for a database system of this size and complexity.
- the invented system was also benchmarked for batch processing at rates of hundreds of transactions per second. This shows that the system is able to process inquiries at commercially acceptable rates.
- the data of this starting instances and relationship signal, 902 is stored in an inquiry-defining table 740 provided within the inquiry guide means 910 .
- the relation defining means 960 which includes REL.DEF table 600 , transmits a Relation-instances table selecting signal sRiT 1 to the relationship storage means 970 in order to select one of a plurality of Relation-instances tables, RiT 1 , RiT 2 , RiT 3 , etc. stored within the relation storage means 970 .
- the relation defining means 960 further transmits a head or tail identifying signal, H/T, to the relation storage means 970 to identify a head or tail instance defining column, Ei-h or Ei-t, which should be searched for information matching the ETN 1 and/or EiN 1 information of the starting instance signal, sRi.
- each RiT can have multiple columns specifying a plurality of tail entity instances, i.e., Ei-t 1 , Ei-t 2 , etc. and in such a case, the H/T signal also indicates which one or more tail columns of the target RiT are to be searched for matching information.
- the relationship storage and search means 970 searches through the selected relationship instances table RiT-x to find information matching that of the input signals, sRi, sRiT and H/T.
- Signals 971 representing the opposing entity instances (Ei-o) of each matched row are then transmitted to an intermediate answer gathering means 980 which compiles within its memory area a list of entity instances, Ei-o 1 , Ei-o 2 , Ei-o 3 , etc., which oppose the starting entity instances found in matching rows of the referenced RiT ( 730 ).
- the collected intermediate answers are then fed back along path 981 to the inquiry guide means 910 in order to fill stepping-stone boxes (shown as still open question, ???) in a next level query row (e.g. Lv 1 - 2 ).
- the next query row e.g.
- Lv 1 - 2 now becomes the new starting row and its contained information, Ei-o 2 -RTN 2 -?, is now fed as the new sRi signal to the relation storage means 970 and the relation define means 960 .
- the inquiry loop repeats until an inquiry path terminates on its own or a terminating entity is struck.
- a first Level-2 inquiry may produce intermediate answer, Ei- 2 a. That intermediate answer together with its forward-connecting relation (RTN 2 ) may produce a plurality of intermediate answers at Level-3, namely, Ei- 32 a. 1 , Ei- 32 a. 2 , etc. Each of these Level-3 answers may then result in a larger plurality of Level-4 answers (not shown) and so forth.
- the Level-2 answer Ei- 2 b may produce a plurality of Level-3 answers, Ei- 32 b. 1 , Ei- 32 b. 2 , Ei- 32 b.
- Each of these answers is recorded as a paired set of an entity class number ETN and an entity instance number EiN.
- the abbreviated results are then expanded into user-understandable results by sending an entity type number signal, sETN x to the entity definition means 950 and a corresponding entity instance signal, sEiN to the entity storage means 920 .
- the entity storage means 920 then produces detailed information from the referenced entity instances tables.
- the database user may not wish to see all of the detailed information within a row, but rather wishes to see only prespecified columns of the referenced row and wishes the data to be displayed according to a predetermined display format.
- the details filter 985 filters out information from undesired columns and orders the remaining data according to a predetermined display format selected by the user.
- the desired “real” information then appears in the selected format on display means 990 .
- a database user has a first account number (instance I a/E1 ) from which the user wishes to find all persons, groups or companies which are holders of that account, and once known, all other accounts held by those persons, groups or companies; and further, where a person is a member of a group or a group has many persons as its members or where a company has subsidiary companies, the accounts held by these entities.
- the relationship instance I a/R1 has three tails, T 1 , T 2 and T 3 , only one of which will be active for a given instance of the head entity I a/E1 .
- Tail T 1 points to person instance I b/E2 .
- Tail T 2 points to group instance I b/E3 .
- Tail T 3 points to company instance I b/E4 .
- These instances of person, group and company represent intermediate instances which lead to the desired answer, namely, the accounts held by such persons.
- One person I b/E2 may hold many other accounts as indicated by the multiple instances of the 's Holder relationship instances, I i/R1 , I j/R1 , I k/R1 , etc.
- Each of these relationship instances has a corresponding account instance at its head (H) end. In FIG. 10 , these are I i/E1 , I j/E1 , I k/E1 , etc.
- H head
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A relationships processing computing system provides for the recording and extraction of data objects (entities) and for development data representing a queried relationship between data objects (entities). The set of entities and relationships may be expanded at any time during the life of the system without reprogramming or compiling computer code and without disrupting concurrent use of the system. Complex inquiries, normally requiring multiple nested queries, may be performed without code level programming.
Description
This application is a division of application Ser. No. 08/083,361 08/083,861, filed Jun. 28, 1993, now abandoned U.S. Pat. No. 5,604,899, which issued on Feb. 18, 1997, and which is a continuation of Ser. No. 07/526,424, filed May 21, 1990, now abandoned.
1. Cross Reference to Microfiche Appendix
This application includes a plurality of computer program listings (modules) in the form of a Microfiche Appendix which is being filed concurrently herewith as 1162 frames (not counting target and title frames) distributed over 20 sheets of microfiche in accordance with 37 C.F.R. § 1.96. The disclosed computer program listings are incorporated into this specification by reference but it should be noted that the source code and/or the resultant object code of the disclosed program modules are subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document (or the patent disclosure as it appears in the files or records of the U.S. Patent and Trademark Office) for the sole purpose of studying the disclosure but otherwise reserves all other rights to the disclosed computer program modules including the right to reproduce said computer program modules in machine-executable form.
2. Field of Invention
The present invention relates generally to computer database management systems and more specifically to apparatus and methods for modifying and searching through large scale databases at high speed.
3. Description of Related Art
Modern computer systems are capable of storing voluminous amounts of information in bulk storage means such as magnetic disk banks. The volume of stored information can be many times that of the textual information stored in a conventional encyclopedia or in the telephone directory of a large city. Moreover, modern computer systems can sift through the contents of their bulk storage means at extremely high speed, accessing as many as one million bytes of information or more per second (a byte is a string of eight bits, equivalent to approximately one character of text in layman's terms). Despite this capability, it may take an undesirably long time (i.e., hours or days) to retrieve desired pieces of information. In commercial settings such as financial data storage facilities, there will be literally, billions of pieces of information that could be sifted through before the right one or more pieces of information are found. Thus, even at speeds of one million examinations per second, it can take thousands of seconds (many hours) to retrieve a desired piece of information. Efficient organization of the stored information is needed in order to minimize retrieval time.
The methods by which pieces of information are organized within a computer, searched through or reorganized, often parallel techniques used by older types of manual information processing systems. A well known example of a manual system is the index card catalog found in public libraries. Such a card catalog consists of a large number of uniformly dimensioned paper cards which are serially stacked in one or more trays. The cards are physically positioned such that each card is directly adjacent to no more than two others (for each typical examination there is a preceding card, the card under examination and a following card in the stack). On the front surface of each index card a librarian enters, in left to right sequence; the last name of an author, the first name of the author, the title of a single book which the author wrote and a shelf number indicating the physical location within the library where the one book may be found. Each of these four entries may be referred to as a “column” entry. Sufficient surface area must be available on each card to contain the largest of conceivable entries.
After the entries are made, the index cards are stacked one after the next in alphabetical order, according to the author's last name and then according to the author's first name and then by title. This defines a “key-sequenced” type of database whose primary sort key is the author's name. The examination position of each card is defined relative to the contents of preceding and following cards in the stack. That is, when cards are examined, each intermediate card is examined immediately after its alphabetically preceding card and immediately before its alphabetically succeeding card. When a new book is acquired, the key-sequenced database is easily “updated” by inserting a new card between two previously created cards. Similarly, if a book is removed from the collection, its card is simply pulled from the card stack to reflect the change.
If a library user has an inquiry respecting the location of a particular book or the titles of several books written by a named author, the librarian may quickly search through the alphabetically ordered set of index cards and retrieve the requested information. However, if a library user has an inquiry which is not keyed to an author's name, the search and retrieval process can require substantially more time; the worst case scenario being that for each inquiry the librarian has to physically sift through and examine each card in the entire catalog. As an example of such a scenario, suppose that an inquiring reader asks for all books in the library where the author's first name is John and the title of the book contains the word “neighbor” or a synonym thereof. Although it is conceptually possible to answer this inquiry using the information within the catalog, the time for such a search may be impractically long, and hence, while the information is theoretically available, it is not realistically accessible.
To handle the more common types of inquiries, libraries often keep redundant sets of index cards. One set of cards is sorted according to author names and another set is sorted according to the subject matter of each book. This form of redundant storage is disadvantageous because the size of the card catalog is doubled and hence, the cost of information storage is doubled. Also, because two index cards must be generated for each new book added to the collection the cost of tipdating the catalog is also doubled.
The size of a library collection tends to grow over time as more and more books are acquired. During the same time, more and more index cards are added to the catalog. The resulting stack of cards, which may be viewed as a kind of “database”, therefore grows both in size and in worth. The “worth” of the card-based system may be defined in part as the accumulated cost of all work that is expended in creating each new index card and in inserting the card into an appropriate spot in the stack.
As time goes by, not only does the worth and size of the database grow, but new technologies, new rules, new services, etc., begin to emerge and the information requirements placed on the system change. Some of these changes may call for a radical reorganization of the card catalog system. In such cases, a great deal of work previously expended to create the catalog system may have to be discarded and replaced with new work.
For the sake of example, let it be supposed that the library acquires a new microfilm machine which stores copies of a large number of autobiographies. The autobiographies discuss the life and literary works of many authors whose books are kept in the library. Let it further be supposed that the original, first card catalog system is now required to cross reference each book to the microfilm location (or plural locations) of its author's (or plural authors') autobiographies. In such a case, the card catalog system needs to be modified by adding at least one additional column of information to each index card to indicate the microfilm storage locations of the relevant one or more autobiographies.
We will assume here that there is not enough surface area available on the current index cards for adding the new information. Larger cards are therefore purchased, the information from the old cards is copied to the new cards, and finally, the new microfilm cross referencing information is added to the larger cards. This type of activity will be referred to here as “restructuring” the database.
Now let us suppose, that as more time goes by, an additional but previously unanticipated, cross indexing category is required because of the introduction of a newer technology or a new government regulation. It might be that the just revised and enlarged second card system does not have the capacity to handle the demands of the newer technology or regulation. In such a situation, a third card system has to be constructed from scratch. The value of work put into the creation of the just-revised second system is lost. As more time passes and further changes emerge in technology, regulations, etc., it is possible that more major organizational changes will have to be made to the catalog system. Time after time, a system will be built up only to be later scrapped because it fails to anticipate a new type of information storage and retrieval operation. This is quite wasteful.
Although computerized database systems are in many ways different from manual systems, the computerized information storage and retrieval systems of the prior art are analogous to manual systems in that the computerized databases require similar restructuring every time a new category of information relationships or a new type of inquiry is created.
At a fundamental level, separate pieces of information are stored within a computerized database system as a large number of relatively short strings of binary bits where each string has finite length. The bit strings are distributed spacially within a tangible medium of data storage such as an array of magnetic disks, optical devices or other information representing means capable of providing mass storage. Each bit is represented by a magnetic flux reversal, an optical perturbation and/or some other variance in the physical attributes of a data storage medium. A transducer or amplifier means converts these variances into signals (e.g., electrical, magnetic, or optical) which can be processed on a digital data processing machine. Each string of bits is often uniquely identified by its physical location or by a logical storage address. Some bit strings may function as address pointers, rather than as the final pieces of “real” information which a database user wishes to obtain. The address pointers are used to create so-called “threaded list” organizations of data wherein logical links between a first informational “object” (first piece of real data) and a second informational “object” (second piece of real data) are established by a chain of direct or indirect address pointers. The user-desired objects of real information themselves can be represented by a collection of one or more physically or logically connected strings.
Typically, “tables” of information are created within the mass storage means of the computerized system. A horizontal “row” of related objects, which is analogous to a single card in a card catalog system, may be defined by placing the corresponding bit strings of the objects in physical or address proximity with each other. Logical interconnections may be defined between different rows by using ancillary pointers (which are not considered here as the “real” data sought by a database user). A serial sequence of “rows” (analogous to a stack of cards) is then defined by linking one row to another according to a predefined sorting algorithm using threaded list techniques.
A vast number of different linking “threads” may be defined in this way through a database table having millions or billions of binary information bits. Unlike manual systems, the same collection of rows (which replaces the manual stack of cards) can be simultaneously ordered in many different ways by utilizing a multiplicity of threaded paths so that redundant data storage is not necessary. Searches and updates may be performed by following a prespecified thread from one row to the next until a sought piece of information (or its address) is found within a table. A threaded-list type of table can be “updated” in a manner similar to manual card systems by breaking open a logical thread within the list, at a desired point, and inserting a new row (card) or removing an obsolete row at the opened spot.
Tables are often constructed according to a “key-sequenced” approach. One column of a threaded-list table is designated as the sort-key column and the entries in that column are designated as “sort keys”. Address pointers are used to link one row of the table to another row according to a predefined sequencing algorithm which orders the entries (sort-keys) of the sort column as desired (i.e., alphabetically, numerically or otherwise). Once a table is so sorted according to the entries of its sort column, it becomes a simple task to search down the sort column looking for an alphabetically, numerically or otherwise ordered piece of data. Other pieces of data which are located within the row of each sort key can then be examined in the same sequence that each sort key is examined. Any column can serve as the sort column and its entries as the sort keys. Thus a table having a large plurality of columns can be sorted according to a large number of sorting algorithms.
The key-sequencing method gives tremendous flexibility to a computerized database but not without a price. Each access to the memory location of a list-threading address pointer or to the memory location of a sort-key or to the memory area of “real” data which is located adjacent to a sort-key takes time. As more and more accesses are required to fetch pointers and keys leading to the memory location of a piece of sought-after information (“real data”), the response time to an inquiry increases and system performance suffers.
There is certain class of computerized databases which are referred to as “relational databases”. Such database systems normally use threaded list techniques to define a plurality of key-sequenced “tables”. Each table contains at least two columns. One column serves as the sort column while a second or further columns of the table store either the real data that is being sought or additional sort-key data which will ultimately lead to a sought-after piece of real data. The rows of the table are examined in an ordered fashion according to the contents of the sort column. Target data is located by first threading down the sort column and thus moving through the chain of rows within a table according to a prespecified sort algorithm until a specific sort-key is found. Then the corresponding row is examined horizontally and the target data (real data, or the next key) is extracted from that row.
An example of “real” data would be the full-legal names of unique persons such as in the character strings, “Mr. Harry W. Jones”, “Mrs. Barbara R. Smith”, etc. The sort-key can be a number which is stored adjacent to the full name and which sequences the names (real data) according to any of a wide variety of ordering patterns including by age, by height, by residential address, alphabetically, etc. Because the real data (e.g., full name of a person) is stored in a separate column, it is independent from the sort key data. A large variety of different relations can therefore be established between a first piece of real data (e.g., a first person's name) and a second piece of real data (e.g., a second person's name) simply by changing the sort keys that are stored in the separate sort column (e.g., who is older than whom, who is taller, etc.). Plural orderings of the real data can be obtained at one time by providing many columns in one table, by storing alternate keys in the columns and by choosing one or more of these columns as the primary sort key column.
Relational database systems often include tables that do not store real data in a column adjacent to their sort-key column, but rather store a secondary key number which directs a searcher to a row in another key-sequenced table where a matching key number is held together with either a piece of sought-after real data or yet another forward referencing key number (e.g., an entry which in effect says “find the row which holds key number x of yet another table for further details”). With this indirect key-sequenced approach, a large number of tables can be simultaneously updated by changing one entry in a “base” table.
Relational database tables are normally organized to create implied set and subset “relations” between their respective items of pre-stored information. The elements of the lowest level subsets are stored in base tables and higher level sets are built by defining, in other tables, combinations of keys which point to the base tables. The implied relations between elements cannot be discerned by simply inspecting the raw data of each table. Instead, relations are flushed out only with the aid of an access control program which determines in its randomly-distributed object code, which table to examine first and what column to look at before beginning to search down the table's column for a key number and, when that key number is found, what other column to look at for the real data or a next key number. Relations between various “entities” of a relational database are implied by the sequence in which the computer accesses them.
By way of a concrete example, consider a first relational table (Names-Table) which lists the names of a large number of people in telephone directory style. Each name (each separate item of real data) is paired to a unique key number and the rows of this Names-Table are sorted sequentially according to the key number. A second relational table may be provided in-the database (Cars-Table) which lists automobile (vehicle) identification numbers (VIN) each paired in its row with a second key number. If the second key number is matched by a corresponding key number in the first table, then a relationship might be implied between the entries of the two separate tables (Names-Table and Cars-Table). The “implied” relationship might be one of an infinite set of possibilities. The relationship could be, for example, that the car listed in the second table is “owned” by the person whose name is found next to a matching key in the first table. On the other hand, it might be implied that the matched person in the first table “drives” the car, or “cleans” the car or has some other relation to the car. It is left to the access control program to define what the relationship is between entities in the first table and entities in the second table.
It can be seen that relational database systems offer users a great deal of flexibility since an infinite number of relations may be defined (implied). Economy in maintaining (updating) the database is also provided since a change to a base table propagates through all other tables which reference the base table. The access control program of the database system can include information-updating modules which, for example, change the key number in the second table (Cars-Table) whenever ownership of a car changes. If the name of the new owner is already in the first table (Names-Table), it does not have to be typed a second time into a new storage area and thus, extra work and storage redundancy are avoided. The vehicle identification number (VIN) remains unchanged. Minimal work is thus expended on updating the database.
Despite these advantages, relational database systems suffer from expandability and restructuring problems similar to those of the above-described manual system. Sometimes the rows within a particular table have to be altered to add additional columns. This is not easily done. Suppose for example, that a new government regulation came into being, mandating that vehicles are to always be identified not only by a vehicle identification number (VIN) but also by the name and location of the factory where the vehicle was assembled. If spare columns are not available in the Cars-Table, the entire database may have to be restructured to create extra room in the storage means (i.e. the disk bank) for adding the newly required columns. New key numbers will have to be entered into the new columns of each row (e.g., a new “factory of assembly” key number) and sorted in order to comply with the newly mandated regulation. New search and inquiry routines will have to be written for handling the newly structured tables.
In the past, much of this restructuring work was done by reprogramming the computer at the object code or source code level. This process relied heavily on an expert programming staff. It was time consuming, costly and prone to programming errors. Worst of all, it had to be redone time and again as new informational requirements emerged just after a last restructuring project was completed. There is a need in the industry for a database management system which provides quick responses to inquiries and which can also be continuously updated or restructured without reprogramming at the source or object code level.
It is an objective of the present invention to provide a database system which is capable of storing voluminous amounts of information, sifting through the information at high speed, and is at the same time easily expandable or restructurable to take on new forms of entities and relationships.
In accordance with a first aspect of the invention, an entity definition table (ENT.DEF) is defined within the memory means of a computer system to store the name of an allowed entity type (class) and the name of a single other table (Entity-instances Table or “EiT” for short) where instances of the allowed entity type may be stored. A separate relationships definition table (REL.DEF) is defined in the memory means to list in each row of the table: (a) the name of an allowed relations type, (b) the name of a single Relation-instances Table (RiT) where instances of the allowed relationship type may be stored, (c) the name of a primary (head) entity type to which the relation type may apply and (d) the names of one or more secondary (tail) entity types to which the named relationship may apply. Each row of the Relation-instances Table (RiT) is provided with at least one primary pointer which points to the storage location of a first instance of the primary entity type and at least one secondary pointer which points to the storage location of a corresponding first instance of the secondary entity type. Each row of the Relation-instances Table (RiT) further includes a pointer to a relationship-defining row in the REL.DEF table. The pointer can be the name of an applicable relation type as recorded in the REL.DEF table. Relationships between instances of a primary entity and a secondary entity are thus expressly defined by entries in the Relation-instances Table (RiT). Adding new rows to this Relation-instances Table (RiT) allows for the addition of new relations. Adding new rows to the REL.DEF table allows for the creation of new classes (types) of relationships. Since relation-defining tables can be updated using a fixed set of update modules, reprogramming at the source or assembly level is not needed for restructuring the schema of the database.
The invention will be described with reference to the following figures in which:
The following includes a detailed description of the best mode or modes presently contemplated by the inventor for carrying out the invention. It is to be understood that these modes are merely exemplary of the invention. The detailed description is not intended to be taken in a limiting sense.
Referring to FIG. 1A , the block diagram of a conventional database system 100 is shown. The database system 100 comprises a central processing unit (CPU) 110 which is operatively coupled so as to be controlled by an access control program (object code) 120d stored in a first memory means 120 (i.e., read-only-memory, ROM, or random access memory, RAM). The CPU 110 in combination with the first memory means 120 can be viewed as one or more machine means for performing functions specified by the object code 120d. The CPU 110 is further operatively coupled to access the data 130d of a “bulk storage” second memory means 130 also included in the database system 100. Individual strings of digital information are represented by wiggled lines (e.g., 120d, 130d) in FIG. 1A. The bulk storage means 130 typically takes the form of a large array of magnetic disk drives, tape drives, or other mass storage devices (e.g., arrays of Dynamic Random Access Memory [DRAM] chips). The first (control) memory means 120 usually takes the form of high speed RAM and/or ROM.
To access a particular string of data 130d stored within the bulk storage means 130, the CPU 110 must provide a corresponding address signal 131s (FIG. 1B ) in the form of logic highs (H) and lows (L) to the bulk storage means 130 over an address bus 131. As seen in the time versus logic-level graph of FIG. 1B , the address signal 131s (usually an electrical signal) comprises a set of logic high and logic low levels (H and L) transmitted in a first time period t0−t1. There follows a second time period, t1−t2, which is often referred to as an “access delay”, during which addressing circuits attempt to access the addressed memory location. Depending on whether a memory read or memory write operation is occurring, data signals 132s are then transferred over a data bus 132 (FIG. 1A ) from the addressed location within the bulk storage means 130 to the CPU 110 or vice versa during a following third time period, t2−t3.
Referring still to FIG. 1A , the object code 120d of the access control program determines when and how the CPU 110 will access information 130d stored in the bulk storage means 130. The CPU 110 issues address signals 121s (not shown) over an address bus 121 to the first memory means 120, and in response, the first memory means 120 supplies instruction signals 122s (not shown) over a data bus 122 to the CPU 110. Information signals 122s can be exchanged bidirectionally over data bus 122 between the CPU 110 and the first memory means 120. FIG. 1B may represent the timing relation between address signals 121s and first memory information signals 122s by replacing reference numerals 131s and 132s with 121s and 122s, respectively.
It should be understood that neither the object code 120d of the first memory means 120 nor the data code 130d of the mass storage means 130 is in human-readable form. A translation machine is needed to convert the binary bit strings of either memory means (120 or 130) into a form which might be understandable to an experienced computer programmer or to a lay computer user.
The object code 120d of the access control program is produced by first generating (e.g., manually writing and encoding) a source code listing 112 whose lines of information 112d are usually understandable only to a highly trained computer programmer. The source code listing 112 which is written in an assembly level or higher level language (e.g., C, COBOL, FORTRAN, PASCAL, etc.) is transformed into machine-readable form, and passed through a first translation machine which may be referred to as a compiler (or assembler) means 114. The compiler means 114 produces the machine-readable object code 120d according to instructions provided by a machine readable version of the source code listing 112. After it is stored in the first memory means 120, the object code 120d is expressed as machine detectable alternations (ones and zeroes) in a physical attribute (e.g., voltage) of the medium which makes up the first memory means 120. In this form, the object code 120d is more readily convertible into data signals 122s which are understandable to the CPU 110 than into information which is understandable to a lay (non-programmer) person. It is highly improbable that a lay person will ever wish to access or understand or modify the object code 120d stored within the first memory means 120.
The information strings 130d within the bulk storage means 130 are similarly expressed as alternations in the physical property of the storage medium making up the second memory means 130. Some of the data strings 130d represent “real” data which a lay-user may wish to access while others of the strings 130d represent “ancillary” data such as sequencing keys, threading pointers or control codes which a lay-user is not interested in. The object code 120d of the control program defines which is which.
When “real” data is to be extracted from the data strings 130d within the bulk storage means 130, read and understood by a lay person, a translation process similar to compilation (or more correctly de-compilation) needs to take place. Just like the compiler means 114 functions as a man-to-machine translator, the combination of the first memory means 120 and the CPU 110 defines a second man-to-machine search-and-translate machine 115 which is used to search through parts of the bulk stored data 130d, extract relevant pieces of “real” data and convert the extracted data from machine-readable form into human-readable form. The human-readable output of the second translation machine 115 may be produced in the form of a query output listing 150 (e.g., on paper or on a video screen) as indicated in FIG. 1A.
If a lay user (defined here as someone other than a person who is an expert programmer familiar with details of the source listing 112) wishes to obtain useful (“real”) information from the bulk storage means 130, the lay user will normally supply a query input 140, in a form dictated by a so-called “structured query language” (SQL) to the CPU 110. (In the illustrated example the user inputs the request string “Please find all books having attribute xxx,” where xxx could be the relations “author's last name=Jones”.) The combination of the CPU 110 and first memory means 120 (which combination forms the second search-and-translate machine 115) process this query input 140 and in response, produces a series of address signals 131s which are sent to the bulk storage means 130 and processes a series of data retrievals 132s which eventually lead to the production of a corresponding query output listing 150. (In the example, it would be a listing of all books whose author's name is “Jones”.) The access control program 120d is charged with the task of enabling various types of queries 140 and making sure that the queries do not violate basic rules of logic.
When the information 130d within the bulk storage means 130 needs to be updated, by for example adding new books, a similar exchange occurs between the translating machine 115 and a lay user. The lay user supplies an update input 160, again as dictated by a pre-specified structured query language (SQL), and in response, the translating machine 115 rearranges the data 130d within the bulk storage means 130 to achieve the requested update.
Referring to FIG. 2A , a first embodiment 200 of the data base system 100 will be described in more detail. FIG. 2A schematically illustrates a section 130a of the bulk storage means 130 according to embodiment 200 wherein some of the stored data strings 130d are arranged to define a key-sequenced type of table. In a first record region (Record No. 1) of the table 130a there is provided a first continuous data string 230 which is subdivided to have a first string portion 231 representing an author's name (illustrated as the contents of a rectangular box), a second string portion 232 contiguous thereto for representing a name threading pointer (illustrated as a second rectangular box coupled to the first rectangular box by an address proximity link P11), a third data string portion 233 representing the book's title (which is linked to the second portion 232 by proximity link P12), a fourth subsection 234 representing a title threading pointer (linked to box 233 by address proximity link P13), a fifth subsection 235 representing the book's location (linked to box 234 by proximity link P14) and a sixth subsection 236 representing a location threading pointer (linked to box 235 by proximity link P15).
The name threading pointer 232 is located directly adjacent to the author's name subsection 231 within the address space of Record No. 1, as indicated by address proximity link P11 and thus, there is an “implied” logical connection between the data contents of boxes 231 and 232. The book's title subsection 233 is located directly adjacent to the same threading pointer 232 as indicated by address proximity link P12. The combined, proximity linkage, P11−P12, “implies” a relationship between the contents of boxes 231 and 233, namely that they apply to various attributes of a common book. This format repeats for data subportions 234-236. Only boxes 231, 233 and 235 contain “real” data which is useful to a lay person. The other boxes, 232, 234 and 236 of Record No. 1 contain “ancillary” data which is useful to the search machine 115 but does not provide the kind of “real” information sought by an inquiring lay person.
The implied relations between the “real” data boxes, 231, 233 and 235 of Record No. 1, arise only after “meaning” is assigned to all the boxes 231-236. Such “meaning” comes from the operation of the search-and-translation machine 115 (FIG. 1). To understand this concept, assume that an automated “searching” machine (computer) 115/200 of embodiment 200 is examining the data string 230 held within the single Record No. 1. Assume further that this searching machine 115/200 includes means for assigning appropriate “meanings” to each of the data subportions contained in each of subsections 231-236 to thereby designate some as containing “real” data and others as containing “ancillary” (e.g., pointer) data. In that case the search machine 115/200 can scan horizontally across the record, parse the data string 230 into subsections of appropriate size and extract the name of the book's author, the book's title and the location of the book within the library, as desired. On the other hand, if the searching machine 115/200 does not possess information which tells it that box 232 is a threading pointer, box 233 is a title, etc., then all boxes will look alike to the search machine, there will be no “meaning” assigned and the search machine 115/200 will not be able to extract a desired piece of data. Thus, while not shown in FIG. 2A , it is to be understood that there is a cooperative relation between how the object code 120d of the search machine 115/200 causes that search machine to access the parts of bit string 230 via the signal busses, 131 and 132, how subportions of bit string 230 become designated as “real” or “ancillary” data, and how relations are implied between separate pieces of real data. The structure, meanings inter-relations between the parts of bit string 230 are intimately linked to the structuring of the object code 120d.
In FIG. 2A , the bulk memory means section 130a is shown to include additional record areas (Record No. 2, Record No. 3, etc.) each having the same data structure (represented respectively as string 240 which comprises data subsections 241-246 and string 250 which comprises data subsections 251-256). Although Record No. 1 is in physical proximity with Record No. 2, as indicated by physical (or address) proximity link PR12, and Record No. 2 is in physical proximity with Record No. 3 as indicated by physical proximity link PR23, the data items (231-236, 241-246, 251-256) within each record do not need to be examined according to this physical ordering. Instead, the name threading pointer 232 of Record No. 1 can represent the address of any other arbitrary record area within the bulk storage means section 130a whose author's-name will serially follow the author's-name of box 231 during a search process. This is represented in FIG. 2A by the dashed logical link L11 which points to some arbitrary record area, Record.Addr.11 of section 130a. The name threading pointer of the referenced record, Record.Addr.11, can point to yet another arbitrary record. With this mechanism, a list which is sorted (alphabetically for example) according to author's last name may be formed even though the records are not physically ordered in any specific sequence. The list is referred to as a “key-sequenced” list in cases where, as here, the sequencing key (or sort key) is data stored in the boxes e.g., 231, 241, 251, etc. of a table column.
The title threading pointers (234, 244, 254) of each record may be used to form a different key-sequenced path in which books are examined according to subject matter or alphabetically according to the book's title or according to some other ordering algorithm. The location threading pointers (236, 246, 256) can be similarly used to create a key-sequenced list which will identify what book is physically located next to what other book on the library's shelves.
For the sake of illustrative simplicity, only one threading pointer (i.e., 232) is shown attached to each real data item (i.e. 231) of each record, but it should be apparent that the author's name 231 may have many threading pointers, one for threading alphabetically according to last name, and others for threading according to additional relations such as geographic location, age, number of published books and so forth. It is up to the computer programmer and the access control program 120d to assign “meaning” to each box and thus determine whether that box will function as a storage area for real data or for ancillary data such as pointer data.
The records of FIG. 2A may be visualized as being serially stacked one on the next according to a sequence defined by a preselected one of the threading pointers (e.g. 232 or 234 or 236) to thereby create a displayable table which has as entries in the columns of each row, the real data items: author's name 231, book's title 233 and book's location 235. The ancillary threading pointers 232, 234, 236 are hidden from the lay user's view. New rows are added to the table by breaking a logical link (e.g., L11) between a preceding pointer (e.g. 232) and a next pointer (e.g. 252) to insert a new record in the search path. The rows can be of variable length since the linking address pointers can point to any arbitrary location in the bulk memory means 130. To get to the Nth item of a threaded list, one normally sequences from the beginning of the list (table) through all the threading pointers until the Nth access is performed, at which point the contents of the addressed record area can then be read. For relatively large tables (e.g. those having thousands of rows), this process of sequencing through all the threading pointers to reach the Nth row of a table can take a significant amount of time.
Referring to a second embodiment 260 shown in FIG. 2B , the structure of an older and less sophisticated data organizing system will be described. In a bulk memory section 130b of this older system 260, data is organized according to what is commonly referred to as “relative table” addressing. Threading pointers are not used for logically linking one record (row) to the next. Instead, each data string (e.g., 270) can be shrunk to contain only the essential target information, such as in this example, author's name (271), book's title (273) and book's location (275), with one item of real data being physically located adjacent to the next. The examination of all record items in this structure 260 may be performed according to the physical location of each record (270) within the address space of bulk storage area 130b (the next adjacent string 280 follows first string 270 and so forth). Unlike the purely key-sequenced organization of FIG. 2A , the physical proximity links PR012, PR023, PR034, etc., of FIG. 2B do indicate a particular ordering of the stored information.
The relative-table organization is somewhat similar to the way that index cars are physically ordered in a manual library system according to author's last name, except that the library catalog trays should now be visualized as having sequentially arranged grooves defined on their bottom-inner surfaces. Each groove is numbered according to its absolute position and only one card can be slotted into each groove. With this system, each card can be immediately located by its groove number rather than by thumbing through the information of all previous cards. If a groove number is known, substantial time can be saved in locating the corresponding card and obtaining the information written on its face. If the grove number is not known, the same relative-table organization can be searched by sequentially thumbing through the trays and examining the cards according to a key-sequenced approach in order to find a desired card even though the cards are stored in grooves. The relative-table organizing method is not mutually exclusive of a key-sequenced examination method. There is a difference between a purely key-sequenced table and a relative table, however. A relative-table organized system is not as easily updated as is a purely key-sequenced system. In the relative table system, a new card cannot be inserted between two cards which already fill adjacent slots. This inflexibility has led many in the database management field away from the relative-table method and towards purely key-sequenced systems since the latter can accept any number of new cards for insertion between old cards.
In FIG. 2B , all the record areas are of a fixed and predefined length. The fixed length of each record defines the groove size. To access the Nth item of a “relative-table” type of list 130b, one need only multiply the fixed record length by the value N to directly obtain the physical address (slot) of the desired record. There is no need to sequence through a chain of threading pointers in order to find a desired row once its slot number (groove number) is known. Empty slots 290, such as the slot number 4 shown in FIG. 2B , are preferably scattered throughout the address space of the bulk memory section 130b to allow for occasional insertion of new items.
It should be noted that while the relative table organization 130b of FIG. 2B is neither as flexible nor as easily updated as the key-sequenced organization 130a of FIG. 2A , the relative-table structure 130b has one major advantage over the key-sequenced structure 130a; an Nth item in a relative-table list 130b may be accessed much faster than the Nth item of a key-sequenced list 130a.
Rows are illustrated to extend horizontally (in the “x” direction) in FIG. 3 while table columns are illustrated to extend vertically (in the “y” direction). Each table 310-350 is shown to have its respective rows sorted numerically according to “key” numbers that are stored in its leftmost column (referred to here as the “sort column”).
A first of the key-sequenced tables, 310 (also labeled “Table of Names”), is shown to have two columns. One (right side) column 312 holds “real” data representing the names of various persons while a preceeding (left side) column 311 holds unique key-numbers, 1, 2, 3, . . . , N, N+1, N+2, . . . , each associated with a unique name of a person. The association of a person's name to a key-number is “implied” by the fact that the key number 1, 2, 3, . . . , N, . . . , is located in the same row of table 310 as is the corresponding “Person's Name”. Each key-number of left column 311 is referred to as a “Name Identification Number” (abbreviated here as N-IDN). Table 310 is shown to have been pre-sorted according to the N-IDN's of column 311. The sorting method is indicated in FIG. 3 by positioning the initials “KSO” over column 311 to tag that column as the Key-Sequenced-Ordering column of table 310.
To find the name of a person within table 310 whose associated identification number is known to be N, one normally starts at row number 1 of the left column 311, where the N-IDN of the first person's name is stored and threads downwardly (in the y direction) through the threaded-list pointers (not shown) associated with this sort column 311, testing each corresponding entry of column 311 for a match until the position holding the number N is found. Then one moves horizontally (in the x direction) across that row to the right column 312 to extract the name associated with the Nth name identification number (N-IDN).
When an automated search machine 115 performs this thread and test process, it must retrieve data from the memory area 130c at least N times before the target data (Person's-Name) is retrieved. The time for retrieving the target data is thus at least N times the access delay period (e.g., the t2−t1 period of FIG. 1B ) of the memory means 130. By way of example, if N=1000 and the access time of memory means 130 is 30 milliseconds, then it can take 30 seconds or more just to retrieve one name. If a thousand names are to be randomly retrieved at different times from the range N, N+1, N+2, . . . , N+M (where M would be 1000 or higher), then it can take as much as 30,000 seconds (8.3 hours) or longer just to perform this simple table look-up task.
The N-IDN field of each row is generally made much shorter in bit length than its associated Person's-Name field. The N-IDN can be viewed therefore as an abbreviation of a person's full name. The first table 310 can be viewed as a conversion list or look-up table which allows one to easily convert a given abbreviation (N-IDN) into a full name.
A second, separate, table 320 (also labeled as “Table of Locations”) is shown to contain two similar columns. Right column 322 stores “Home Addresses” in full while left column 321 holds unique, Home-Identification-Numbers (abbreviated H-IDN) which are generally shorter in bit length than the associated “Home-Address” fields. The H-IDN'S thus can serve as abbreviations for the full address fields. Table 320 is ordered numerically according to the H-IDN's as indicated by the legend “KSO” over column 321. The table 320 can therefore easily serve as part of an H-IDN abbreviation to full address converting means.
Since many people often live at a single home address, it is plausible that a single home address will be shared by persons of different names. Relational database theory recognizes this and teaches to separate information (e.g., home address) that might be shared by many entities away from any unique one of those entities (e.g., person's name). Table 310 is accordingly separated from table 320. Concurrently, it should be possible to relate a person's full name to a full home address without having to repeatedly duplicate the full name string or full address string within the bulk storage means 130. The data organization 300 shown in FIG. 3 includes a third key-sequenced table 330 which is structured for doing just that; linking one persons' name with one home address while using the abbreviated bit strings, N-IDN and H-IDN.
Third table 330 comprises three vertical columns, 331, 332 and 333. Left column 331 holds Person Identification Numbers (P-IDN's), 1, 2, 3, . . . , P. The rows of third table 330 are sorted using the P-IDN's as the sort key. For each row of the third table 330, the second column 332 contains a Name-IDN and the third column 333 contains a Home-IDN. Each Name-IDN of third table 330 (for example, at row 4 of table 330 whose column 332 contains the value “N”) should have in the left column 311 of the Names table 310 a matching key number (e.g., the number N which is pointed to by arrow L41). Thus an N-IDN stored in the third table 330 can be used to indicate the row within the first table 310 where a person's full name may be found. Each Home-IDN of the third table 330 should similarly have a matching key number (e.g., the number 2 which is pointed to by arrow L43) within left column 321 of the second “Locations” table 320 at whose row a corresponding full home address may be found.
Each row (e.g., row 4) within the third table 330 implicitly creates a set of logical links or “relations”, L41−P42−L43 which join a person's name to a particular home address. These links, L41, P42 and L43 are represented in FIG. 3 by dashed connecting lines which, in combination, join the Person's-Name held in table 310, row N, to the Home-Address held in table 320, row 2. The implied linkage, L41−P42−L43, does not arise from the contents of the first three tables, 310, 320 and 330 taken alone. The key numbers (e.g., N-IDN, H-IDN, P-IDN) that are held within these tables are by themselves a meaningless series of numbers. It is only when randomly distributed modules of object code 120d* stored within the memory means 120 of this “relational database” system (300) cooperatively interact with the CPU 110 that the implied relations come into being. The object code 120d* instructs the CPU 110 to select a specific row (i.e., row 4) in the third table 330, to extract the numbers from adjoining columns 332 and 333 of that row (thus implying the proximity link, P42), to select table 310, to sequence down its KSO column 311 looking for a match to the number from column 332 (thus implying logical link L41), to select table 320, to sequence down its KSO column 321 looking for a match to the number extracted from column 333 (thus implying logical link L43), and to then extract from each respectively matching row of tables 310 and 320 the corresponding person's full name and full home address. It is only by performing these data processing steps, as directed by the object-code 120d*, that the search-and-translation machine 115 of embodiment 300 is able to link (L41) an otherwise meaningless number (N) held in the third table 330 to a specific row (i.e. the row holding the same number N) positioned in another table (310) and to link (L43) further numbers (i.e., the number “2” in col. 333) of the third table 330 to a specific row (i.e. the row holding the same number 2) of yet another table (320). This object-code dictated linkage L41−P42−L43 then implies a “relation” between the Person's-Name field stored at row N of table 310 and the Home-Address field stored in row 2 of table 320. Arrow Lzz denotes that all illustrated linkages (L41−L48) in FIG. 3 spring forth from randomly-distributed object code modules 120d* of the access control program 120d. Note that the third table 330 assumes by its three column structure a one-to-one cardinality between person-name and home-address. It is assumed that a person can have only one home address. The structure of table 330 is incapable of handling a situation where a person has, for example, both a summer home-address and a winter home-address. Restructuring of the third table 330 would be called for if it becomes desirable to associate each person's name with more than one home address.
A number of advantages come from organizing the tables of data storing area 300 separately according to relational database theory. Storage space is conserved in cases where plural entities of a first type (person) are related to a common entity of a second type (home address). The same Home-IDN can appear many times down column 333 without consuming large amounts of memory space while the actual full address is stored only once in second table 320. When a person moves to a new home address, the corresponding Home-IDN in column 333 can be easily altered to point to a new position within the second table 320 which contains the new home address (e.g., H+1) thereby implying the new person-to-address relation. If a person changes their name (i.e., by way of marriage) the home address can remain the same. Only the first table 310 needs to be modified and updating work is thus minimized. Also, the basic listings “Names” 310 and “Addresses” 320 can be used to imply a wide variety of “relations” other than a relation between a person's name and his/her home address using the same abbreviated set of identification numbers (IDN's).
By way of example, assume that the first three tables, 310, 320 and 330, are used by a business institution (company) to keep track of the names of their employees and the corresponding home addresses of these employees. Let it be supposed that many employees need to commute to work by a privately-owned car. Some employees drive their own car, some drive a car owned by another employee and some are merely passengers. Let it be further assumed that after tables 310, 320, 330 are defined in a mass storage means 130, the company decides to also keep track of which person drives which car, which person is a passenger in which car and further, who the owner of the car is.
A fourth table 340 (Table of Drivers) may be constructed as shown in FIG. 3 to have a first key-sequenced column 341 storing plural driver identification numbers (abbreviated here as D-IDN's), 1, 2, 3, . . . , D. A second column 342 is provided for holding person identification numbers (P-IDN's) and a third column 343 is provided for holding car identification numbers (C-IDN's). A fifth table 350 (Table of Cars) may be similarly constructed as shown with a first KSO column 351 for holding the C-IDN's (1, 2, 3, . . . , C), with a second column 352 for holding owner identification numbers (O-IDN's) which will point to the one person who owns the vehicle and with a third column 353 for holding a vehicle serial number (SN). While not shown, it should be apparent that a sixth table (Table of Passengers) would be constructed with the same organization as that of fourth table 340 to identify passengers and their corresponding car.
Referring to row D of table 340, it can be seen that one implied link L44 identifies driver D as being the person of P-IDN=4 who has the name implied by earlier link L41 and the home address implied by earlier link L43. Proximity link P43 implies that driver D drives the car having C-IDN=2. The latter number implies a logical link L46 to row 2 of table 350 which holds the serial number (SN) of the driven car. By way of another proximity link, P47, in row 2 of the same fifth table 350, a further logical link, L48, indicates that the owner of car C-IDN=2 is the person P-IDN=P of table 320. It was assumed by the structure of table 350 that each car can have only one owner and one serial number.
Consider, however, what happens if a new government regulation comes into being allowing for more than one owner per car or requiring multiple identification numbers for each car. The fifth table 350 may have to be restructured to add new columns (i.e., 354, 355, etc.; not shown) which would allow for the implication of such new relations. This means that the access control modules 120d* which define the “meaning” of each data field (subsection) within table 350 would have to be revised. Referring back to FIG. 1 it can be seen that modification to the control code 120d* will usually occur first in the original source code 112, which is then compiled 114 as indicated in FIG. 1 , debugged to correct programming errors (not shown) and thereafter repeatedly compiled 114 and debugged until all apparent errors are removed. The process of restructuring relations within a relational-type database system (300) therefore tends to be time-consuming, costly, and prone to error.
A newer form of database organization, referred to sometimes as the “object oriented” approach, has been proposed to solve some of the problems associated with reorganizing and updating previous database systems. According to the object-oriented approach, encapsulation bubbles are defined to hide from external view, data which is encapsulated within the bubble. Each bubble is referred to as an “object” and the encapsulated information of the object is referred to as the object's “attributes.” One bubble may encapsulate a second bubble which in turn encapsulates third, fourth and further bubbles so that a relatively complex data structure may be defined. Objects can be assigned to “classes” and by such assignment they can be made to automatically “inherit” the attributes of other objects in the same class, even when the class attributes are changed after creation of the objects.
There is still controversy in the field over what constitutes “object oriented” and how such a concept may be practically applied to database management systems. Experimental versions of object-oriented systems are often too slow in performing update and inquiry servicing to be practical in commercial settings. The present invention takes an approach which might be considered a partial hybrid of the object-oriented approach and the earlier-described relational database methodology. It provides a database system which is capable of operating at commercially acceptable speeds and which is easily restructured as well as updated. The invention will be explained first conceptually and then by concrete examples.
Referring to FIG. 4A , there is shown a relational graph or “schema” 400 which contains three egg-shaped bubbles labeled respectively as “Customer”, “Address” and “Account”. These bubbles are not intended to represent “objects” from the object-oriented school of thought, but rather “classes” of entities. Each of these bubbles is referred to as an “entity type” or “entity class”. The “Customer” entity class generically covers all entities which might fit under the broad descriptor “Customer”, regardless of whether that entity is a natural person, a business corporation, an association or so forth. The “Address” entity class covers all entities which fit under the broad descriptor “Address” regardless of whether the subject entity is a residential address, a business address, a post-office mailing address or so forth. Similarly, the “Account” entity class covers all sorts of accounts including savings accounts, checking accounts, trust accounts, etc.
Each entity bubble may contain one or more “instances” of the entity class (i.e., Customer, Address, Account) which it represents. By way of example, let it be assumed that there are three customers whose names are “Customer-A”, “Customer-B” and “Customer-C”. Let it be further supposed that because of a peculiar rule, the Customer bubble (also labeled as entity class “E-1”) is restricted to contain the name of only one customer at a time, say “Customer-B”, while the address bubble (E-2) can at the same time contain many “addresses”, each corresponding to that Customer-B. If Customer-B is a person, the address instances might be summer-home and winter-home addresses. If Customer-B is the name of a business having a chain of stores, the plural addresses in the second bubble (E-2) might be the mailing addresses of those stores. The name “Customer-B” is an example of a first instance, I1/E1, of the E-1 entity class and is illustrated conceptually in FIG. 4A as a small sphere I1/E1 enclosed in the entity class bubble E-1. Three instances, I1/E2, I2/E2 and I3/E2 of entity class E-2 are similarly illustrated as three spheres inside of entity bubble E-2. It is also assumed here that the Account bubble (E-3) is restricted by a peculiar rule so that at any one time it may contain only one account number (instance I1/E3) which is somehow associated with Customer-B.
Until now we have been visualizing the instances, I1/E1, I1/E2, I2/E2, I3/E2 and I1/E3 of respective entity classes, E-1, E-2 and E-3 as isolated spheres floating separate from one another, without identifying any specific relation between the instances. The present invention treats “relations” as being objects of equal substance to the entities they tie together. There are relation “classes” and instances of a specified relation class. Three arrow-shaped bubbles, R-1, R-2 and R-3, are shown in FIG. 4A to be respectively coupling the Customer entity class (E-1) to the Address entity class (E-2), the Account entity class (E-3) to the Customer entity class (E-1) and the Account entity class (E-3) to the Address entity class (E-2). These linking bubbles (R-1, R-2, R-3) are referred to here as “relationship” types or classes. Each relation bubble R-x (where x is an arbitrary identifier, 1, 2, 3, etc.) is visualized as having a bulb-shaped Head portion, H, an elongated body portion B and an arrow-shaped Tail portion, T. A “Head attribute” can be assigned by each relation bubble R-x to the entity bubble (E-h) located at its head end (H). A “Tail attribute” can be correspondingly assigned by each relationship bubble R-x to the entity bubble (E-t) located near its tail end (T). The combination of the Head-attribute, if any, plus the Tail-attribute, if any, can be used to give the relationship bubble (R-x) a “meaning”. This meaning is generated by associating with the body portion B of each relationship bubble (R-x), a “meaning-string” which preferably, but not necessarily, has a head character-string and a tail character-string. The combination of an “entity-class name” (ECN-h) associated with the head entity type (E-h), the meaning-string (M-s) of the connecting relation type (R-x) and another entity class name (ECN-t) associated with the tail entity type (E-t) are concatenated according to the formula, (ECN-h)+(M-s)+(ECN-t), to expressly define a relational phrase. The expressly defined phrase can be modified by changing any one or all of its three components; (ECN-h), (M-s) and (ECN-t).
In more concrete terms, the top relation bubble R-1 is shown to have the meaning string “'s business”. The substring, “'s” is a head character-string while the substring “business” is a tail character string. By itself, the meaning-string ('s business) appears to be nonsensical, but in conjunction with the class names its head and tail entities, E-1 (“Customer”) and E-2 (“Address”), this first relations bubble, R-1, forms the relational phrase: “The Customer's business Address”. Instance I1/E1 is a specific customer's name (i.e., “Customer-B”) and instances I1/E2, I2/E2 and I3/E2 are now defined as specific instances of that customer's business addresses (i.e., the addresses of individual stores in a chain of stores owned by Customer-B).
Of importance, it is to be noted that the first entity bubble, E-1 (Customer), does not itself encapsulate the attribute of possession as indicated by the apostrophed head character-string “'s”. Instead, that attribute of possession is encapsulated by the first relationship bubble, R-1. Furthermore, the second entity, E-2 (Address), does not encapsulate the modifying attribute “business”. Instead that attribute is also encapsulated by the relation bubble R-1. Thus, each entity bubble (E-1, E-2, E-3) is free of any narrowing attributes or modifiers and instead, represents a relatively broad and generic listing of data items which can come under the heading of either “Customer” or “Address” or “Account”. The advantage of this structure will become apparent shortly.
Consider for a moment what happens if the meaning-string in relation bubble R-1 is changed from “'s business” to “'s headquarters”. Under this circumstance, the rules change. The address bubble (E-2) should be restricted to at any one time contain only a single instance (e.g., I1/E2) representing the “Customer's headquarters Address” rather than many instances. Presumably each customer can have only one headquarters address. Thus, the “cardinality” of relations bubble R-1 must be changed from its earlier one-to-many {1:m} format, as was possible with business addresses, to a one-to-one setting {1:1}. According to the invention, each relation bubble, R-x, has a cardinality rule (e.g., {1:1} or {1:m}) associated with its body B as well as a meaning- string (e.g., “'s business”).
Consider, next what happens in a business database if users are allowed to enter a customer name but leave out the mailing address or telephone number of that customer. Most companies operate under a strict rule which requires its office workers to record at least one forwarding address or telephone number when the name of a new customer is entered. To enforce this requirement, each relation bubble (R-1) further incorporates a mandatory-coupling character which can be either “Y” or “N” (representing yes or no). If it is required that at least one instance (I1/E2) of a tail entity class E-2 should be created whenever an instance (I1/E1) of a head entity class E-1 is created, then the mandatory-coupling character of relation bubble R-1 is set to “Y”. This indicates that instance I1/E1 should not exist without instance I1/E2. The “MC” lightning bolt shown emanating from I1/E1 represents this mandatory coupling of instances. On the other hand, if such coupling is not mandatory, the coupling character is set to “N” and there is no “MC” connection.
As further examples of the concepts behind the invention, the second relation bubble, R-2, is shown to contain in FIG. 4A the meaning string, “'s owning”, the cardinality rule, {1:1}, and the mandatory-coupling character, “Y” (presumably every account should have an owner). The third relation bubble, R-3, is shown to contain the meaning string, “'s statement mailing”, the cardinality rule, {1:1}, and the mandatory-coupling character, “N” (presumably an account holder can pick up his/her statement rather than having it mailed). Instances of entity E-1 which satisfy the relationship created by relation bubble R-2 are read as “The Account's owning Customer”. Instances of entity E-2 which comply with the relationship created by relation bubble R-3 satisfy the descriptive phrase, “Account's statement mailing Address”, or stated otherwise, the address to which account statements are mailed for the particular instance I1/E3 of the Account entity class E-3.
By changing the meaning-string within a relation bubble R-x, it is possible to create new relational phrases although the Head and Tail entity classes remain the same. By changing either or both of the Head and Tail entity classes (E-h or E-t), it is possible to again create new relational phrases although the relation bubble R-x remains unchanged.
Consider what happens for example when the meaning-string of relation bubble R-3 is changed to the phrase: “which is managed at bank branch having”. Then the combination of the class names or meanings associated with entity bubble E-3, relation bubble R-3 and entity bubble E-2 provides for an inquiry path allowing one to find the Account which has a specific bank branch address as its managing branch. Consider what happens if the tail portion T of relation bubble R-3 where moved from E-2 to a new entity bubble (not shown) which is labeled “Managing Officer” rather than “Address”. Then the relational phrase becomes “Account which is managed at bank branch having [this person as its] Managing Officer”. It can be seen that an entirely different inquiry path is formed with each change of a head entity type, tail entity type or relation type.
Inquiry paths can be defined to extend through pluralities of entity and relation bubbles as well as between just two entity bubbles. Still referring to FIG. 4A , suppose that a bank officer finds an important document bearing only an account number on it. The bank officer needs to immediately contact a person who is authorized to manage that account for more details about the document. In such a case, the bank officer would turn to a database processing engine according to the invention (explained later with reference to FIG. 9), start at the known instance of the account number, I1/E3, which is shown contained within the Account bubble (E-3), jump through the relation bubble R-2 ('s owner) to the Customer bubble (E-1) in order to learn who the owning customer is (instance I1/E1) and then with that new information (I1/E1) serving as a stepping stone, jump from the Customer bubble (E-1) through the relation bubble R-1 ('s business) to the Address bubble (E-2) to learn the address at which he may contact the account manager. This is merely an example, inquiry paths can include many more bubbles, they can branch out to form a tree rather than being serial and they can produce many pieces of information which are useful for solving a puzzle rather than just one piece of target information.
Relation bubbles (R-x) do not have to be single tailed. Referring to FIG. 4B , further variations of the concept behind the invention are illustrated. A fourth relation bubble, R-4, is shown to have a plurality of tail ends, T1, T2 and T3, so that a single meaning-string (e.g., “'s business”) can simultaneously couple a common Head entity (Customer) to a plurality of Tail entities (e.g., Address, Account and Telephone). Moreover, a relation bubble does not need to span between different entity bubbles. FIG. 4B shows another relation bubble, R-5, which folds back in a loop so that the Head entity (Customer) is also the Tail entity. In the illustrated example, the relation bubble R-5 contains the meaning string “'s largest”. Given the name of a first customer, this back-looping relation bubble R-5 allows one to find that customer's largest customer. The loop may be followed around ad infinitum to obtain a long list of largest customers belonging to other largest customers.
With the above-mentioned conceptual models in mind, a concrete embodiment of the invention now will be constructed piece by piece. Referring to FIG. 5 , there is shown a first table 500 which is referred to as an entity definition table or in abbreviated form, ENT.DEF Table 500. This entity definition table 500 is stored within a data strong area 130-RP of a database engine in accordance with the invention. Data storing area 130-RP preferably resides within a bulk storage means 130* such as diagrammed in later-to-be described FIG. 8. Unlike the earlier described tables 310-350 of the relational system shown in FIG. 3 , which relied on a purely key-sequenced organization, the entity definition table 500 of FIG. 5 can rely on a relative table organization (abbreviated here as “RTO”) which features faster data access properties and is also adaptable to key-sequenced search algorithms (but not key-sequenced update methods). Each row of the ENT.DEF table 500 is of a fixed bit length and has two columns. The first (left) columns 500a stores a two character field (e.g., “CU,” “AD,” “AC” or “SU”) which is an abbreviation of an entity class name. The abbreviation “EA” will be used here to mean “the abbreviated form of the entity class name” (Entity-name Abbreviation). By way of example, slot number 1 is shown to contain the two-character abbreviation “CU” (representing the entity name “Customer”) in its left column 500a.
For expedience sake, a matrix notation is used here to identify the columns of table 500 with letters, a, b, c, . . . , etc. and the rows with a numeral preceeded by a period. The symbol 500a.1 thus refers to the box in table 500 at column 500a and row 500.1.
As further seen in FIG. 5 , the abbreviation “AD” is stored in box 500a2 to represent the entity name “Address”. Box 500a.3 holds the abbreviation “AC” for “Account” and box 500a.4 stores the abbreviation “SU” for “Supplier”. The slot or row numbers, .1, .2, .3 and .4 of table 500 do not occupy storage space within memory means 130-RP. They merely represent the physical or logical address of their respective rows, 500.1, 500.2, 500.3 and 500.4.
In the corresponding right column 500b of the ENT.DEF table 500 there is stored, for each slot (.1, .2, .3, .4, etc.) the name of a single other table where instances of the named entity class are stored. The abbreviation “EiT” (Entity-instances-Table) will be used here to mean the table where instances of the entity class are stored. Again by way of example, box 500b.1 is shown to reference an EiT called “T.Companies” as the single table where instances of the entity class “Customer” are stored. The entry in box 500b.2 is “T.Addresses” and the entry in box 500b.3 is “T.Accounts”. Note that the entry in box 500b.4 is “T.Companies” just as it is for box 500b.1. Instances belonging to two different entity classes (e.g., “CU” and “SU”) may be stored in one instances table (EiT) under situations where the data structures of the instances are compatible to the structure of that EiT (e.g., the entity instances table has enough columns of appropriate widths to support the descriptions of each entity instances).
Each entity class can be referenced not only by its abbreviated name (e.g., EA=“AD”) but also by the slot number (e.g., slot .2) where it is stored in the entity definition table 500. The slot number may function as an “entity type number” (abbreviated here as ETN) for numerically identifying its corresponding entity class. Alternatively, an additional “type number” column (not shown) may be added to the ENT.DEF table, 500, unique type numbers may then be entered into each row of the type number column and these can serve as the ETN's. Thus, the “Address” entity class may be referenced not only by the abbreviation EA=“AD” but also by an entity type number whose value, ETN=2. For the relative table organization (RTO) shown in FIG. 5 , the ETN happens to be the same as the slot number (e.g. slot 500.2) where the entity name abbreviation (e.g., AD) is stored in the ENT.DEF table together with the name of the corresponding EiT (e.g., T. Addresses). For the case where an additional type number column (not shown) is added, the unique ETN's can be assigned arbitrarily such as according to the alphabetic ordering of the EA's in which case the ETN's may be used as sort keys for alphabetically ordering the ENT.DEF table rows according to entity class names (e.g. using threaded-list techniques).
Referring next to FIG. 6 , there is shown another table 600 which is also stored within the data storage area 130-RP of an engine according to the invention. This table 600 may also have a relative-table organization (RTO) and it is referred to as a relations-definition table, or REL.DEF table 600 for short. As before, a matrix notation is used here to identify vertical columns of the REL.DEF table as 600a, 600b, 600c, etc.; horizontal rows as 600.1, 600.2, 600.3, etc.; and individual boxes as 600a.1, 600a.2, 600b.1, 600b.2, etc.
The left-most column 600a holds a two character abbreviation representing the class name and/or meaning-string of a relation bubble. The mnemonic, RA, will be used here to designate such a relationship abbreviation. By way of example, box 600a.1 holds the abbreviation “-BU-” which represents the meaning-string “'s Business”. (Hyphens embrace the relation abbreviations here to distinguish them from entity abbreviations [EA's].) Box number 600a2 stores the abbreviation “-OW-” to represent the meaning-string “'s Owning”. Box number 600a.3 stores the abbreviation “-SM-” to represent the meaning-string “'s Statement Mailing”. Box number 600a.4 holds the abbreviation “-HQ-” to represent the meaning-string “'s Main Headquarters”.
Each row of the REL.DEF table 600 may also identified numerically by a “relationship type number” (RTN) which in the illustrated example happens to be the same as the slot number (.1, .2, .3, etc.) where its corresponding two character code (-BU-, -OW-, -SM-, etc.) is stored. Alternatively, a type number column (not shown) may be added to the REL.DEF table 600 and unique RTN's may be assigned according to any desired, unique number generating scheme, such as according the alphabetic ordering of the RA's. In the latter case, the RTN's can also function as sort keys for ordering the rows of the REL.DEF table (using threaded list techniques) alphabetically according to relationship class names (RA's). Thus, when given a specific RTN, one can quickly calculate the physical or sequence to the logical address in the REL.DEF table 600 where details about the corresponding relation class are stored so as to quickly retrieve those details.
In the second column 600b of the REL.DEF table, there is stored, for each slot (.1, .2, .3, etc.), the name of a single table where instances of the named relation class are stored. The mnemonic, “RiT” (Relation instances Table), is used here to represent such a table. By way of example, the entries in boxes 600b.1, 600b.2, 600b.3 and 600b.4 are respectively: “T.Rel-1”, “T-Rel-2”, “T.Rel-3” and “T.Rel-1”. Note that the entries of box numbers 600b.1 and 600b.4 are the same. Compatible instances of two different relation classes may be represented by two corresponding rows of data stored in a common relation-instances holding table (RiT).
The third column 600c of the REL.DEF table stores the type number (ETNh) of a head entity (E-h). Here, the entity type number (ETNh) is the same as an ETN assigned to a corresponding row in the ENT.DEF table 500 where the abbreviated class name (EA) of that head entity bubble is stored. Similarly, the fourth column 600d of the REL.DEF table stores the type number (ETNt1) of a corresponding first tail entity (E-t1).
Note that the first three rows (600.1, 600.2 and 600.3) in FIG. 6A correspond to the relations schema shown in FIG. 4A. When row number 600.1 is read across using the column sequence: c, a, d, it corresponds to the relationship descriptor phrase “Customers' business Address”. Box 600b.2 tells us that instances of this relationship are stored in an RiT table called “T.Rel-1”.
Similarly, row number 600.2, columns c, a, d correspond to the relationship descriptor phrase “Account's owning Customer”. Box 600b.2 tells us that instances of this relation are stored in table T.Rel-2. Row number 600.3 likewise corresponds to the relationship describing phrase “Account's statement mailing Address” and tells us that instances of this relation are found in the T.Rel-3 table.
The REL.DEF table 600 can be updated indefinitely by adding new rows to its bottom so as to encompass a great number of further relation classes. There is no need to physically order the data describing each of the relational classes and thus descriptions of new classes can be added to the bottom or other empty slots of the REL.DEF table 600 sporadically as the need arises over time. Relation classes which become obsolete can be deleted to leave behind an empty slot. Similarly, there is no need to order the entity classes defined by the ENT.DEF table 500. The ENT.DEF table can be updated by arbitrarily adding new entity class describing rows to its bottom or other empty slots or by deleting obsolete entries as the need arises. Accordingly, when demands on the database system of the invention change over time, new relation classes may be defined in combination with new head and tail entity classes. The schema of the invention can be continuously restructured as the need arises simply by updating the REL.DEF and ENT.DEF tables, 600 and 500.
The fifth columnar region 600e of FIG. 6A represents a plurality of additional columns within the REL.DEF table 600. The names of multiple tail entities which are activated in addition to or in substitution for the first ETNt of column 600d may be optionally entered in this region 600e. Referring briefly to FIG. 6B , an exploded view of this fifth region 600e is illustrated. In the example, each relation class R-x can have as many as five tail entities (T1, T2, T3, T4, T5). The invention is, of course, not limited to five. Column 600d identifies the first tail entity, T1, while extension columns 602 through 605 in region 600e identify the optional, other tail entities, T2-T5. The opening phrase “Customer's business . . . ” of slot number 600.1 columns, c and a, may apply to the first tail entity T1=“Address” and/or to a second tail entity T2=“Supplier” and/or to a third tail entity T3=“Area”, etc.
Returning to FIG. 6A , the next column 600f of the REL.DEF table holds a code indicating the cardinality of the corresponding relation bubble (e.g., {1:m} or {1:1}). The next following column 600g contains a one character code indicating whether there is mandatory coupling (MC) between an instance of the head entity and an instance (or instances) of the tail entity (or active tail entities).
Referring to FIG. 7 a broader view 700 of a relations-processing storage area 130-RP in accordance with the invention is now shown. Storage means 130-RP is coupled to a data search-and-retrieval machine 815 by way of address bus 131 and data bus 132. Starting at the bottom of FIG. 7 , we see that two relative-organized (RTO) tables are shown: a T.Companies table 710 and T.Addresses table 720. Both of these are Entity-instance Tables (EiT-1 and EiT-2, respectively). The T.Companies table 710 has one column 710a in whose numbered slots (710a.1, 710a.2, 710a.3, etc.) are stored the names of various companies. The T.Addresses table 720 has one column 720a in whose slots (720a.1, 720a.2, 720a.3, etc.) there are stored data fields representing various street addresses. Each piece of “real” data such as the name of a company (e.g., “Allen's Automobiles”) is referred to as an “Entity-instance” or Ei for short. The slot number where the Ei is stored defines an “Entity-instance Number” or EiN for short.
The broader view 700 reveals a third table 730 which is labeled in FIG. 7 as the T.Rel-1 table and also as RiT 730. Each of the numbered slots, 730.1, 730.2, . . . , 730.6, etc., in this “Relation-instances Table” (RiT) 730 has five columnar entries. They are respectively: (a) a head entity-type identifier [ETNh], (b) a head-entity instance identifier [EiNh], (c) a relationship class identifier [RTN], (d) a first tail entity-type identifier [ETNt] and (e) a first tail-entity instance identifier [ETNt]. For the sake of illustrative clarity two-character abbreviation identifiers are shown entered in the vertical columns 730a, 730c and 730d of the T.REL-1 table 730. It is within the contemplation of the invention to alternatively enter the corresponding entity or relation type number (ETN or RTN) for these two-character abbreviations. This allows the retrieval machine 815 to quickly and directly access the corresponding row of the ENT.DEF or REL.DEF table where data of interest is stored using either relative-table or key-sequenced access techniques.
Columns 730a and 730b in combination identify particular instances of a head entity class (Head Ei) while columns 730d and 730e in combination identify particular instances of a tail entity class (Tail Ei). Referring specifically to box number 730a.2 of the T.REL-1 table 730, the “CU” (or alternatively ETNh=.1) entry of this box directs the data retrieval machine 815 of the invention to a first section 500.1 of the ENT.DEF table where there is stored the name of a first table (EiT-1=“T.Companies”) where instances of this named entity class (“CU”) are stored. The logical link from third table (RiT) 730 to table area 500.a is labeled as L731. The link from table area 500.1 to the first table (EiT-1) 710 is labeled as L751.
The second column 730b of the T.REL-1 table holds the slot number or “Entity-instance Number” (EiN=.5 of box 730b.2 for example) of the indirectly referenced Entity-instances table (T.Companies 710) within which a specific instance (Ei=“Expert Electronics”) of the named head entity class (EA=“CU”) is stored. In this example, box number 710a.5 of the first EiT 710 contains the name “Expert Electronics” and this name-string is the entity instance referenced by the “CU.5” entries of boxes 730a.2 and 730b.2. The link from box 730b.2 to box 710a.5 is labeled as logical link L732.
Referring to columns 730d and 730e of slot number 730.2, a similar linkage is created to the instance of a tail entity class. In the illustrated example, the “AD” entry of box 730d.2 points to a second section 500.2 of the ENT.DEF table (thereby defining link L733) where a second pointer is found to a second Entity-instances Table (EiT-2) which in this example is the T.Addresses table 720 (thereby defining link L752). Box 730a.2 holds the slot number (.4) of the indirectly referenced table 720 in which the target data “555 Transistor Lane” is stored (thereby defining link L734). Thus, the illustrated Relationship-instances Table (RiT) 730 defines a connecting relationship (extending from the arrowhead of L732 to row 730.2 to the arrowhead of L734) which joins the instance “Expert Electronics” of entity class “Customer” (CU) with the instance “555 Transistor Lane” of the “Address” (AD) entity class. Each row of the RiT 730 is referred to as a “Relation-instance” (abbreviated as Ri) and the slot number of that row defines a corresponding “Relation-instance Number” (RiN). (while not shown, it is within the contemplation of the invention to add a “instance number” column to any of tables 710, 720 or 730 so as to uniquely identify their rows by arbitrarily assigned instance numbers, EiN or RiN, rather than relying on an RTO slot number, but the RTO slot number approach is believed to result in faster data access.) Columns 730a-730b accordingly define the head portion of a “Relation-instance” (Ri) and columns 730d-730e define a tail portion of the relations-instance (as conceptually shown in FIG. 4A). Column 730c, as will now be seen, defines the body portion of each Relation-instance (Ri).
Referring to the middle column, 730c, of the T.REL-1 table 730, this column holds an identifier pointing to a corresponding row in the REL.DEF table 600 where the relationship class of the instant relationship (Ri) is defined. For the sake of illustrative clarity, the RA of each relation class is shown entered in column 730c. It is within the contemplation of the invention to alternatively enter the corresponding slot number, RTN, of the REL.DEF table 600 so as to speed the access time of the retrieval machine 815. By way of example, the entry “-BU-” in box 730c.2 indicates that the relationship between the head instance, Customer.5, and the tail instance, Address.4, is the “'s Business” meaning-string associated with slot 600.1 of the REL.DEF table (FIG. 6).
The relation instances table, T.REL-1 730, may contain many rows, each of which has the identical head entity-instance entries (in col.s 730a and 730b), identical tail entity-instance entries (in col.s 730d and 730e), but different relationship-defining entries (e.g., -BU-, -HQ-, -OW-, etc.) in column 730c. Each of these almost identical rows would represent a different Relation-instance (Ri). As an example, the address instance AD.4 might be the “Business” address of customer instance CU.5 as shown in slot 730.2. But it may also be the headquarters address “-HQ-” of that same customer CU.5 as shown in slot 730.6. Each of these is considered a different relation instance (Ri). The T.REL-1 table 730 is accordingly shown to include two separate row entries: 730.2=CU.5-BU-AD.4 and 730.6=CU.5-HQ-AD.4. A relational query which asks the question, “What is the headquarters address of my customer, Expert Electronics?” would be answered by accessing row 730.6 of the T.REL-1 table 730. The slightly different relational query, “What are all the business addresses of my customer, Expert Electronics?” would be answered by accessing all rows in the T.REL-1 table 730 beginning with the entries, “CU.5-BU-”, which in the illustrated case includes rows 730.2 and 730.5.
With the illustrated structuring of a Relation-instances Table (RiT 730), all sorts of relational inquiries can be answered by starting with a known first instance of a first entity class, irrespective of whether the class is a head entity class or tail entity class, and searching through the RiT 730 to locate all relationship-instances (Ri's) of which that starting instance is a member. Once the matching Ri rows are found within a designated Relation-instances Table (RiT), it becomes a simple matter to scan horizontally across the row from the starting instance through the relation descriptor of column 730c to find the corresponding, but until now, unknown instances of the opposed tail and head entity classes.
The uncovered instances can then serve as stepping stones for answering further parts of a compound query. Consider for example the two-level query, “What are all the business addresses of my customer Expert Electronics, and once you know that, what other customers use those addresses as their business addresses?” There may be a plurality of business addresses satisfying the first part (Level-1) of the question and each such answer would serve as a new stepping stone leading to the answers which satisfy the second part (Level-2) of the question.
In accordance with the invention compound queries are answered by defining one or more question lines in an inquiry-definition (INQ.DEF) table 740. Each question line is identified as belonging to either a one level question or to a particular level of a compound question. A first column 740a of the INQ.DEF table is provided for holding the entity type numbers (ETN) of one or more entity classes, regardless of whether they are known at the start of a query. A second column 740b of the INQ.DEF table is provided for holding corresponding instance-identification numbers (EiN), again regardless of whether they are known at the start of a query. A third column 740c is provided for holding one or more relation type numbers (RTN) while a fourth column 740d is provided for holding corresponding relation-instance numbers (RiN), some of which may be known and others not known at the start of a query. Fifth column 740e defines the level of each question row relative to preceding question rows.
An RTN value, which if known, is entered in a box of third column 740c in order to indicate to the retrieval machine 815 a corresponding row in the REL.DEF table 600 from which the retrieval machine 815 can obtain the name of the single table (RiT-x) where all instances of the named relation type (RTN) reside. The identified table, RiT-x, can then be searched for one or more Ri rows which hold information relevant to a posed query. When found, the RiN values of those rows are entered into one or more boxes of fourth columns 740d. The specific Ri rows (e.g., row 730.2) which are fully specified by filled in RTN-RiN data pairs of the INQ.DEF table 740 can then be accessed to direct the retrieval machine 815 to the corresponding head and tail entity instances of interest (e.g., the CU.5 and AD.4) instances which are related to one another by the -BU-entry of box 730c.2).
If a specific Ri row is not fully identified at the beginning of a query within a row of the INQ.DEF table 740 by a completed RTN-RiN pair, the Ri row or rows of interest can be nonetheless located by partially filling in a row within the INQ.DEF table 740 and then searching the REL.DEF or ENT.DEF tables for additional information. Row 740.2 of the INQ.DEF table is shown to have the question line, “??.?-HQ-?” which may mean “Please identify the Headquarter addresses of all my customers”. In such a case, all rows of the T.REL-1 table 730 which have the entry -HQ- in their middle column 730c would provide the required information. Each such -HQ- row of RiT 730 would pair an identified instance of a Customer (head Ei) with an identified instance of a headquarters Address (Tail(1) Ei). It is to be appreciated that for cases of multi-tailed relation classes, the corresponding RiT would have columns for identifying the other tail entity instances (e.g., Tail(2) Ei, Tail(3) Ei, etc., not shown).
Sometimes a question is more specific. By way of example, let it be assumed that an inquiring user has a specific but fragmentary piece of starting information such as the street address “555 Transistor Lane”. The inquiring user wishes to find out the names of one or more companies for whom “555 Transistor Lane” is a “Business Address”. The user identifies the fragmentary information to the data retrieval machine 815 as belonging to the “Address” entity class. In response, the machine 815 searches through the ENT.DEF table 500 to locate the entity type number “ETN” of the named class and the Entity-instances Table “EiT” where all instances of this “Address” entity class are stored. It should be recalled that the illustrated relative-table organization “RTO” of the ENT.DEF table 500 is not mutually exclusive of a key-sequenced organization “KSO”. According to the invention, the EA column 500a of the ENT.DEF table is threaded alphabetically so that the row of a desired entity class (e.g., EA=“AD”) can be easily found using known key-sequenced search algorithms. A different table (not shown) can serve as an abbreviation to full name look-up table for converting between the entity name abbreviation (EA) and the full name or narrative description of the entity class (ECN) if desired or, alternatively, the ENT.DEF table 500 may include one or more additional columns (not shown) for providing this search and conversion function.
Once the corresponding type number (ETN) of the entity class is identified, in this case ETN=.2 referencing slot 500.2, the retrieval machine 815 places this first puzzle piece into an appropriate box of the INQ.DEF table. In this example it will be box 740a.3 of INQ.DEF question line 740.3 which is for illustrative purposes filled with the corresponding EA=“AD”.
The retrieval machine 815 then obtains from box 500b.2 of the ENT.DEF table the name of the corresponding EiT where it is to search for the occurrence of the fragmentary information “555 Transistor Lane”. The EiT's can be key-sequence organized (KSO) in addition to their RTO structuring to facilitate such searching. After the corresponding EiT (in this case, the T.Addresses table 720) is searched and the row of the fragmentary information is found, its corresponding EiN, in this case .4, is entered as an entity-instance number (EiN) in box 740b.3 of the INQ.DEF table 740.
The earlier found entity type number (ETN) which corresponds to EA=“AD” now combines with the EiN=.4 of INQ.DEF row 740.3 to define the “starting instance” for resolving question line 740.3. The starting instance is AD.4.
The relationship type number (RTN) of the relationship under question (-BU-) is entered in box 740c.3. If the RTN value is not known, the REL.DEF table 600 is first searched to generate the appropriate RTN. While not shown, the REL.DEF table or some other table will include a full name or narrative column for converting between a relationship's full name/description and its abbreviated form (RA). Box 740d.3 is now the last puzzle piece to be filled in as indicated by a question mark in FIG. 7.
Since the ETN.EiN-RTN- entries of boxes 740a.3, 740b.3 and 740c.3 are now all known, the retrieval machine 815 searches through the corresponding RiT (T.REL-1 table 730) to locate all relation-instances (Ri's) which have the corresponding ETN plus Ein in the tail entity instances columns 730d and 730e and the corresponding RTN in column 730c. The REL.DEF table 600 identifies the starting entity class of the AD.4-BU-? question as being a tail entity. (When there is more than one tail entity, the RiT will have plural columns for identifying first, second, etc. tail instances and the REL.DEF table 600 will specify which of these tail columns is to be searched.) In the illustrated example, row 730.2 of the T.REL-1 table will be found to have matching information. The retrieval machine 815 can now fill the last empty box 740d.3 of the INQ.DEF row 740.3 with the information RiN=.2. Once question row 740.3 is completely filled, the retrieval machine 815 may use the information of this INQ.DEF row 740.3 to retrieve the detailed information about the head entity instance, Ei=“Expert Electronics” from table row 710a.5 of the T.Companies table.
The ETN.EiN identifiers of the uncovered Level-1 answer, “Expert Electronics” can now serve as stepping stones which fuel a second part of a compound query. For example, the full query might have been “Who has business address, 555 Transistor Lane and what bank accounts belong to the entity or entities that satisfy the first part of this question?” The first part is defined here as “Level-1” of the question and the second part as “Level-2”. Column 740e of the INQ.DEF table is shown to identify the level number. Referring to a feedback link L744 shown in FIG. 7 , the Level-1 answer (ECN=“CU” and EiN=.5) can now be fed back as an entry to a subsequent inquiry-defining row 740.4 so that the multi-level inquiry path may continue. Inquiry box 740c.4 is shown already filled with the relationship identifier (-OW-) for locating account owners. The answer to inquiry row 740.4 may be used to fuel yet a further level (Level-3, not shown) of a compound inquiry and the answer or answers to that inquiry may fuel yet further inquiry rows.
Referring to FIG. 8 , a block diagram of a database system 800 in accordance with the invention is shown. Bulk storage means 130* is indicated to include a relation-processing region 130-RP in accordance with the invention. The bulk storage means 130* may also include previously-utilized relational tables for defining “implied” relationships between entities. Such “implied” relationships are not incompatible with the “explicit” relationships that are defined by the REL.DEF table 600 of the invention. As shown in region 130-RP of FIG. 8 , the REL.DEF table and ENT.DEF table may be used to define a continuously expandable backbone which supports various relationships (RiT-1, RiT-2, etc.) between various entity instances (EiT-1, EiT-2, EiT-3, etc.). The INQ.DEF table may be visualized as having two legs (dashed vertical lines) which sequentially step from a starting instance table (EiT-1), across a starting table of relationship instances (RiT-1) to an explicitly linked table which holds relationship-opposed instances (EiT-2) of the starting instances. The opposing instances (of EiT-2) then become starting instances for a next inquiry step over yet a further set of relationship instances (RiT-2).
Since the REL.DEF and ENT.DEF tables may be expanded as desired by adding new entries to empty middle or bottom slots found within them, a lay user can create new entities, new relation classes and restructure the schema of explicitly-defined relationships and entities forever without having to reprogram the database system 800 at the source or object code level. Instead, the lay user supplies schema restructuring commands, in an appropriate structured language, as indicated at 870 for restructuring the schema whenever needed. The access control program 820d of the retrieval machine 815 may remain fixed while the entity-to-explicit-relationship schema of region 130-RP is forever changed. Accordingly, object-code compilation 814 needs to occur only once. The source code listing 812 of this access control program needs to be developed and debugged only once. Substantial cost savings are realized, especially as time progresses and new entity-relationship schemes are required.
In some commercial applications, the ENT.DEF table and REL.DEF table may be relatively short, having for example less than 1000 rows each (e.g., the ENT.DEF table may have 30 rows or less and the REL.DEF table may have approximately 100 rows or less). For such cases it has been found advantageous to “copy” the ENT.DEF and REL.DEF tables from the bulk storage means 130* to a higher speed memory area within first memory means 120 in order to shorten processing time. The copied versions of the ENT.DEF and REL.DEF tables can be purely-key-sequenced if an additional “type number” column is added for storing the respective ETN's and RTN's of each row. The higher data access speed of the first memory means 120 more than compensates for any speed reduction which might be caused by switching to a purely key-sequenced organization. These “mirror” copies of the ENT.DEF and REL.DEF tables are then accessed by the CPU 110 in place of the original ENT.DEF and REL.DEF tables. It is advisable to periodically check the original ENT.DEF and REL.DEF tables for possible revisions, since lay users may update that original tables at any time, and when such revisions are detected, to immediately recopy the ENT.DEF and REL.DEF tables into the first memory means 120 so that the mirror tables faithfully reproduce the contents of the original tables.
The CPU 110 in combination with the various modules of the object code 820d can be visualized as one or more machine means for performing data-altering functions as specified by the object code 820d. A Microfiche Appendix is included here listing sample modules written in Tandem COBOL'85™ and TANDEM SCREEN COBOL™ for execution on a Tandem NONSTOP™ computer system running under Tandem NonSTOP SQL™, TMF™, Pathway™, SCOBOLX™ and Guardian™ systems (all available from Tandem Computers of Cupertino, Calif.). It is to be understood that the sample modules disclosed in the Microfiche Appendix are merely exemplary. The invention may be practiced using different computer hardware and/or software.
Referring to FIG. 9 , a schematic diagram of an inquiry processing engine 900 in accordance with the invention is shown. The engine 900 comprises an inquiry guide means 910 which is coupled to a relationship defining means 960, a relationship storage and search means 970 and to an intermediate-answers receiving means 980. The intermediate answers means 980 feeds abbreviated answers back to the inquiry guide means 910 after such answers are produced by the relation storage means 970. Desired ones of all produced results are sent from the inquiry guide means 910 to an abbreviated results gathering means 915 which then expands them into full result details by sending an entity type signal sETNx to an Entity Define means 950 which includes within itself, the earlier described ENT.DEF table 500. The sETNx signal is converted by the entity define means 950 into an entity table selecting signal sEiT which is fed into an entity storage means 920 that includes within itself a plurality of entity-instances tables (EiT-1, EiT-2, etc.) such as earlier described. Results gathering means 915 also feeds an instance row selecting signal, sEiN, to entity storage means 920. Details from the addressed entity instance row are then transmitted through a details filter 985 and portions of the details which are selected by the filter 985 are then printed on a detailed results display (e.g. a video monitor) 990.
Relationship inquiry in general is a two step operation: path selection (to create an Inquiry) and inquiry execution. On a Path Selection screen (not shown) the operator selects starting and optionally ending entity types and supplies detailed description of the path to follow. Each path is defined in terms of:
-
- a starting entity type to initiate the query path,
- a connecting relationship type which will lead to an intermediate entity type and then to another connecting relationship type and another intermediate entity type, and so forth until
- a last connecting relationship type leads to a terminating entity type
Taking out all but the key words from the above, we get the form structure:
<starting entity type> | ||
<connecting relationship type> <intermediate |
entity type> |
<connecting relationship type> <intermediate |
entity type> |
. . . |
<connecting relationship type> <terminating entity |
type> | ||
A single inquiry definition may initiate several parallel paths which extend from a starting entity type to an ending entity type. When the ending entity type has not been specified in the header of the path-selecting screen then all these parallel paths can end with different entity types. For example, an inquiry to show a person's total involvement with all accounts held at a bank could be defined as shown in the following Table I:
TABLE I | ||||
Level-1 | Connected | Level-2 | Connected | |
Entity | Relationship | Entity | Relationship | Entity |
Person | ---> | Account | ---> | Account | ||||
Holder | ||||||||
Person | ---> | Loan | ---> | Account | ||||
Guarantor | ||||||||
Person | ---> | Signatory | ---> | Account | ||||
Person | ---> | Card Holder | ---> | Account | ||||
Person | ---> | Group Member | --> | Joint | ---> | Account | ---> | Account |
Party | Holder | |||||||
Person | ---> | Group Member | --> | Joint | ---> | Card Holder | --> | Account |
Party | ||||||||
Each of the above lines is a separate path generated by one inquiry form. The results of the inquiry would show all Accounts a Person had influence over, either directly or as a member of a partnership.
For simplicity the above inquiry is shown on the screen as in the following Table II:
TABLE II | |||
| Relationship | Entity | |
1 | | Account | |
1 | | Account | |
1 | | Account | |
1 | | Card | |
1 | Group | Joint Party | |
2 | | Account | |
2 | Card Holder | Card | |
Note that level numbers are used to determine which entity types are intermediate to a path, which entity types terminate a path, and which relationship types commence a new parallel path. A line containing a level number which is the same as that of an immediately previous line indicates a parallel path separate from the previous line. A level number greater than that on the previous line indicates the entity on the previous line is an intermediate entity (i.e. the path is an association, and will follow several relationship links before terminating the path.)
Once a set of paths have been stored as an inquiry and recorded in the system it may be executed. Each unique set of inquires is given a unique name, stored as such in the inquiry-definition table (INQ.DEF) and may be recalled for execution repeatedly at any time without need to go through the path selection process again. Before executing the predefined inquiry, the operator must select one or more starting entity instances for which the query is to run. Hence for each execution of an inquiry, the operator must choose which occurrence of the Starting Entity Type to use. Using the previous sample inquiry to investigate persons of the names, “John Smith” and “Bill Brown”, the operator would execute the same inquiry once using “John Smith” as the Starting Entity instance and once using “Bill Brown” as the Starting Entity instance.
The Inquiry is executed by examining each of the defined paths in turn. Starting with the selected entity and following the first relationship, a list of intermediate (or target) entities is assembled. For each of the intermediate entities the next leg of the path is followed through the level 2 relationship etc. until the inquiry operation arrives at the ending entity type at which time the results of the entire path (with all intermediate entities and relationships) may be displayed to the operator.
If the ending entity type has been specified during inquiry definition, then at execution time the operator may select not only the starting entity occurrence of interest but also the occurrence of an ending entity. In this case the inquiry will return results from only the paths that satisfy this termination condition.
Reusable inquiry sets would normally only be created by privileged users. However, each inquiry set that is created for subsequent executions may be given its own security settings and attached to its own menu. Hence where sensitive data was involved, normal operators would be given access to only those inquiry sets they specifically need for their day to day business operations.
Despite its complexity, the inquiry engine 900 of the invention can operate at high speed because the EiT and RiT structures, while they may be large in size rely on relative tables. Relative table structures have always offered high performance for Random memory access (as opposed to key-sequenced access) but presented many complications and difficulties in other areas of use (e.g. updating). Because of this, conventional wisdom has been to use purely Key-Sequenced structures almost exclusively. Key-Sequenced structures pay performance penalties for the use of extra indexing levels.
The first problem with Relative structures was that with some early versions, deleted row locations (or slots) could not be re-used without file (table) reorganization. Reorganization of Relative structures in this case meant compressing the file (table) to regain unused slots. This process can change the relative addresses from their original values, which can cause corruption of the database. Reorganization is no longer required because Relative structures such as offered in Tandem's NonSTOP SQL™ system allow deleted row slots to be reused immediately. The Tandem system actually ensures that vacated slots are used again and again. Relative tables in NonSTOP SQL™ can be partitioned and re-partitioned without risk of corrupting the database, but table compression is no longer necessary or allowed. Partitioning a table means that the table can be split across a plurality of data storage devices, usually disks, transparent to the object code of the application program running under NonSTOP SQL™.
The second problem with Relative structures was implementing meaningful keys that allowed access to the data in a sequence based on indicative data, such as numerical order of account number or alphabetical order of customer name. However, by using Alternate Key index tables it is possible to provide meaningful sequential access of entities stored within Relative Tables.
The Relationships Processor or “engine” of the present invention is a “Closed Loop” system in that all explicit schema definitions are stored within the system. The finite set of tables and their meanings are also defined within the system. This provides an infrastructure that makes the Table Structures transparent to users and developers. Hence, Relative tables can be used for performance improvements while avoiding any usability penalties that once existed.
Hence this invention has gone against conventional attitudes because of new data processing techniques used by the invention.
The above advances in Relative structure techniques, coupled with the closed loop nature of the Relationships Processor has allowed Relative tables to be used in a controlled and meaningful way, destroying the premise that Key-Sequenced structures are the best way to store relationships.
A benchmark was run on a Tandem NonSTOP SQL™ system to test the system's performance capabilities. The benchmark was to simulate the normal processing requirements of an extremely large bank's Customer Information System.
The database used 14 Gigabytes of disk storage space, and was populated with 5 million Customers, 7 million Cards, 9 million Addresses, 10 million Accounts and 67 million relationships.
The benchmark simulated 1000 simultaneous users (tellers), with each user executing 100 typical on-line transactions.
The invented system achieved a rate of 64 transactions per second with less than 2.6 second response time for 90% of all transactions which included all screen formatting. This is quite remarkable for a database system of this size and complexity.
The invented system was also benchmarked for batch processing at rates of hundreds of transactions per second. This shows that the system is able to process inquiries at commercially acceptable rates.
Referring to FIG. 9 , an inquiry begins by transmitting a signal representing the starting entity instance and relation information (e.g., “Level-1=ETN1-EiN1-RTN1-?”) from an input form means 901 to the inquiry guide means 910. The data of this starting instances and relationship signal, 902, is stored in an inquiry-defining table 740 provided within the inquiry guide means 910. The inquiry guide means 910 transmits a starting relationship type signal sRTN1 to the relation defining means 960 and a relationship instance defining signal sRi=ETN1 and/or EiN1 and/or RTN1 to the relationship storage and search means 970. The relation defining means 960, which includes REL.DEF table 600, transmits a Relation-instances table selecting signal sRiT1 to the relationship storage means 970 in order to select one of a plurality of Relation-instances tables, RiT1, RiT2, RiT3, etc. stored within the relation storage means 970. The relation defining means 960 further transmits a head or tail identifying signal, H/T, to the relation storage means 970 to identify a head or tail instance defining column, Ei-h or Ei-t, which should be searched for information matching the ETN1 and/or EiN1 information of the starting instance signal, sRi. (While not shown, each RiT can have multiple columns specifying a plurality of tail entity instances, i.e., Ei-t1, Ei-t2, etc. and in such a case, the H/T signal also indicates which one or more tail columns of the target RiT are to be searched for matching information.) In response, the relationship storage and search means 970 searches through the selected relationship instances table RiT-x to find information matching that of the input signals, sRi, sRiT and H/T. Signals 971 representing the opposing entity instances (Ei-o) of each matched row are then transmitted to an intermediate answer gathering means 980 which compiles within its memory area a list of entity instances, Ei-o1, Ei-o2, Ei-o3, etc., which oppose the starting entity instances found in matching rows of the referenced RiT (730). The collected intermediate answers are then fed back along path 981 to the inquiry guide means 910 in order to fill stepping-stone boxes (shown as still open question, ???) in a next level query row (e.g. Lv1-2). The next query row (e.g. Lv1-2) now becomes the new starting row and its contained information, Ei-o2-RTN2-?, is now fed as the new sRi signal to the relation storage means 970 and the relation define means 960. The inquiry loop repeats until an inquiry path terminates on its own or a terminating entity is struck.
After termination, the results of the inquiry loop are fed through signal bus 911 to an abbreviated results compiling means 915 which orders the results according to their level number and interrelation. By way of example, a first Level-2 inquiry may produce intermediate answer, Ei-2a. That intermediate answer together with its forward-connecting relation (RTN2) may produce a plurality of intermediate answers at Level-3, namely, Ei-32a.1, Ei-32a.2, etc. Each of these Level-3 answers may then result in a larger plurality of Level-4 answers (not shown) and so forth. Likewise the Level-2 answer Ei-2b may produce a plurality of Level-3 answers, Ei-32b.1, Ei-32b.2, Ei-32b.3, etc. Each of these answers is recorded as a paired set of an entity class number ETN and an entity instance number EiN. The abbreviated results are then expanded into user-understandable results by sending an entity type number signal, sETNx to the entity definition means 950 and a corresponding entity instance signal, sEiN to the entity storage means 920. In response the entity storage means 920 then produces detailed information from the referenced entity instances tables. Often, the database user may not wish to see all of the detailed information within a row, but rather wishes to see only prespecified columns of the referenced row and wishes the data to be displayed according to a predetermined display format. The details filter 985 filters out information from undesired columns and orders the remaining data according to a predetermined display format selected by the user. The desired “real” information then appears in the selected format on display means 990.
Referring to FIG. 10 , it will now be explained how a single starting instance can lead to the production of a large plurality of answers. A database user has a first account number (instance Ia/E1) from which the user wishes to find all persons, groups or companies which are holders of that account, and once known, all other accounts held by those persons, groups or companies; and further, where a person is a member of a group or a group has many persons as its members or where a company has subsidiary companies, the accounts held by these entities. As shown in FIG. 10 , the relationship instance Ia/R1, has three tails, T1, T2 and T3, only one of which will be active for a given instance of the head entity Ia/E1. Tail T1 points to person instance Ib/E2. Tail T2 points to group instance Ib/E3. Tail T3 points to company instance Ib/E4. These instances of person, group and company represent intermediate instances which lead to the desired answer, namely, the accounts held by such persons. One person Ib/E2, may hold many other accounts as indicated by the multiple instances of the 's Holder relationship instances, Ii/R1, Ij/R1, Ik/R1, etc. Each of these relationship instances has a corresponding account instance at its head (H) end. In FIG. 10 , these are Ii/E1, Ij/E1, Ik/E1, etc. The rest of FIG. 10 is self-explanatory. A person can belong to several groups and each of those groups may hold several accounts. A group may have many members and each of those members may have several accounts. A company may be a subsidiary of many other companies and each of those companies can hold several accounts. Thus, the list of ending instances shown in FIG. 10 , Ii,j,k/E1-Ix,y,z/E1, can be quite long compared to the starting instance Ia/E1 which started the inquiry.
A variety of modifications will become apparent to those skilled in the art in light of the above description. The scope of the claimed invention is accordingly, defined, not by any specific embodiment described herein, but rather by the following claims.
Claims (6)
1. In a computer system, a data processing system for maintaining cardinality in a relational database, said data processing system comprising:
memory means containing (i) relation definition table means comprised of at least one relation type record wherein each relation type record defines a relation type and includes cardinality data defining cardinality of said relation type and (ii) relation instance table means comprised of at least one relation instance record, wherein said relation definition table means and said relation instance table means are a part of said relational database;
means, operatively coupled to said relation definition table means and said relation instance table means, for storing a plurality of relation instance records in said relation instance table means, wherein each relation instance record defines a relation of one of said relation types and further wherein said relation is between two entities; and
means, operatively coupled to said relation instance record storing means, for detecting a cardinality violation for a first relation type, said means for detecting comprising
means for determining whether said relation instance table means contains a first relation instance record, that defines a first relation of said first relation type between a first entity and a second entity; and
means for determining whether said relation instance table means contains a second relation instance record that defines a second relation of said first relation type between said first entity and a third entity.
2. The data processing system of claim 1 wherein each relation instance record defines a relation between a head entity and a tail entity; and
further wherein said first entity is a head entity and said second and third entities are tail entities.
3. The data processing system of claim 1 wherein each relation instance record defines a relation between a head entity and a tail entity; and
further wherein said first entity is a tail entity and said second and third entities are head entities.
4. A computer method for maintaining cardinality in a relational database, said method comprising:
storing in relation definition table means of said relational database a plurality of relation type records wherein each said relation type record defines a relation type and includes cardinality data defining cardinality of said relation type;
storing in relation instance table means of said relational database a plurality of relation instance records wherein each said relation instance record defines a relation of a relation type defined by one of said relation type records and further wherein said relation is between two entities; and
detecting a cardinality violation for a first relation type wherein said step of detecting comprises
determining whether said relation instance table means contains a first relation instance record defining a first relation of a first relation type between a first entity and a second entity; and
determining whether said relation instance table means contains a second relation instance record that defines a second relation of said first relation type between said first entity and a third entity.
5. The method of claim 4 wherein each relation instance record defines a relation between a head entity and a tail entity; and
further wherein said first entity is a head entity and said second and third entities are tail entities.
6. The method of claim 4 wherein each relation instance record defines a relation between a head entity and a tail entity; and
further wherein said first entity is a tail entity and said second and third entities are head entities.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/152,839 USRE40063E1 (en) | 1990-05-21 | 2005-06-14 | Data processing and method for maintaining cardinality in a relational database |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US52642490A | 1990-05-21 | 1990-05-21 | |
US08/083,861 US5604899A (en) | 1990-05-21 | 1993-06-28 | Data relationships processor with unlimited expansion capability |
US08/439,207 US5675779A (en) | 1990-05-21 | 1995-05-11 | Data processing system and method for maintaining cardinality in a relational database |
US11/152,839 USRE40063E1 (en) | 1990-05-21 | 2005-06-14 | Data processing and method for maintaining cardinality in a relational database |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/439,207 Reissue US5675779A (en) | 1990-05-21 | 1995-05-11 | Data processing system and method for maintaining cardinality in a relational database |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE40063E1 true USRE40063E1 (en) | 2008-02-12 |
Family
ID=24097281
Family Applications (9)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/083,861 Expired - Lifetime US5604899A (en) | 1990-05-21 | 1993-06-28 | Data relationships processor with unlimited expansion capability |
US08/439,076 Expired - Lifetime US5652882A (en) | 1990-05-21 | 1995-05-11 | Data processing system and method for detecting mandatory relations violation in a relational database |
US08/439,013 Expired - Lifetime US5617567A (en) | 1990-05-21 | 1995-05-11 | Data processing system and method for retrieving and entity specified in a search path record from a relational database |
US08/439,207 Expired - Lifetime US5675779A (en) | 1990-05-21 | 1995-05-11 | Data processing system and method for maintaining cardinality in a relational database |
US08/862,176 Ceased US5826259A (en) | 1990-05-21 | 1997-05-22 | Easily expandable data processing system and method |
US11/152,833 Expired - Lifetime USRE40526E1 (en) | 1990-05-21 | 2005-06-14 | Data processing system and method for retrieving and entity specified in a search path record from a relational database |
US11/152,839 Expired - Lifetime USRE40063E1 (en) | 1990-05-21 | 2005-06-14 | Data processing and method for maintaining cardinality in a relational database |
US11/152,838 Expired - Lifetime USRE40235E1 (en) | 1990-05-21 | 2005-06-14 | Data processing system and method for detecting mandatory relations violation in a relational database |
US11/152,835 Expired - Fee Related USRE40520E1 (en) | 1990-05-21 | 2005-06-14 | Easily expandable data processing system and method |
Family Applications Before (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/083,861 Expired - Lifetime US5604899A (en) | 1990-05-21 | 1993-06-28 | Data relationships processor with unlimited expansion capability |
US08/439,076 Expired - Lifetime US5652882A (en) | 1990-05-21 | 1995-05-11 | Data processing system and method for detecting mandatory relations violation in a relational database |
US08/439,013 Expired - Lifetime US5617567A (en) | 1990-05-21 | 1995-05-11 | Data processing system and method for retrieving and entity specified in a search path record from a relational database |
US08/439,207 Expired - Lifetime US5675779A (en) | 1990-05-21 | 1995-05-11 | Data processing system and method for maintaining cardinality in a relational database |
US08/862,176 Ceased US5826259A (en) | 1990-05-21 | 1997-05-22 | Easily expandable data processing system and method |
US11/152,833 Expired - Lifetime USRE40526E1 (en) | 1990-05-21 | 2005-06-14 | Data processing system and method for retrieving and entity specified in a search path record from a relational database |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/152,838 Expired - Lifetime USRE40235E1 (en) | 1990-05-21 | 2005-06-14 | Data processing system and method for detecting mandatory relations violation in a relational database |
US11/152,835 Expired - Fee Related USRE40520E1 (en) | 1990-05-21 | 2005-06-14 | Easily expandable data processing system and method |
Country Status (1)
Country | Link |
---|---|
US (9) | US5604899A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070185851A1 (en) * | 2006-01-27 | 2007-08-09 | Microsoft Corporation | Generating Queries Using Cardinality Constraints |
US11303545B2 (en) | 2019-09-06 | 2022-04-12 | Ebay Inc. | Rate-limiting based on cardinality computation |
US11989627B1 (en) * | 2020-06-29 | 2024-05-21 | Amazon Technologies, Inc. | Automated machine learning pipeline generation |
Families Citing this family (143)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5604899A (en) | 1990-05-21 | 1997-02-18 | Financial Systems Technology Pty. Ltd. | Data relationships processor with unlimited expansion capability |
FR2724471B1 (en) * | 1994-09-13 | 1996-10-25 | Bull Sa | DEVICE FOR GENERATION OF OBJECT-ORIENTED INTERFACES FOR RELATIONAL DATABASES AND METHOD IMPLEMENTED BY SUCH DEVICE |
JPH08235033A (en) * | 1995-02-24 | 1996-09-13 | Nec Corp | Joint arithmetic system for object-oriented data base management system |
US6078925A (en) * | 1995-05-01 | 2000-06-20 | International Business Machines Corporation | Computer program product for database relational extenders |
US5701471A (en) * | 1995-07-05 | 1997-12-23 | Sun Microsystems, Inc. | System and method for testing multiple database management systems |
US5918224A (en) * | 1995-07-26 | 1999-06-29 | Borland International, Inc. | Client/server database system with methods for providing clients with server-based bi-directional scrolling at the server |
JP2988394B2 (en) * | 1995-10-19 | 1999-12-13 | 日本電気株式会社 | Device and method for processing data base for variable length object and storage medium for storing data base processing program |
US5875334A (en) * | 1995-10-27 | 1999-02-23 | International Business Machines Corporation | System, method, and program for extending a SQL compiler for handling control statements packaged with SQL query statements |
US5974455A (en) * | 1995-12-13 | 1999-10-26 | Digital Equipment Corporation | System for adding new entry to web page table upon receiving web page including link to another web page not having corresponding entry in web page table |
US5860011A (en) * | 1996-02-29 | 1999-01-12 | Parasoft Corporation | Method and system for automatically checking computer source code quality based on rules |
US5802512A (en) * | 1996-03-12 | 1998-09-01 | Oracle Corporation | Storage, replay and error detection of user-defined queries |
US5899997A (en) * | 1996-04-03 | 1999-05-04 | Transparency Systems, Inc. | Object-oriented query mechanism |
US5752028A (en) * | 1996-04-03 | 1998-05-12 | Ellacott; Bruce Arthur | Object-oriented query mechanism |
US5826268A (en) * | 1996-04-12 | 1998-10-20 | Ontos, Inc. | Secure multilevel object oriented database management system |
US5870747A (en) * | 1996-07-09 | 1999-02-09 | Informix Software, Inc. | Generalized key indexes |
US6745194B2 (en) | 2000-08-07 | 2004-06-01 | Alta Vista Company | Technique for deleting duplicate records referenced in an index of a database |
US5864863A (en) * | 1996-08-09 | 1999-01-26 | Digital Equipment Corporation | Method for parsing, indexing and searching world-wide-web pages |
US5809502A (en) * | 1996-08-09 | 1998-09-15 | Digital Equipment Corporation | Object-oriented interface for an index |
US5745890A (en) * | 1996-08-09 | 1998-04-28 | Digital Equipment Corporation | Sequential searching of a database index using constraints on word-location pairs |
US5832500A (en) * | 1996-08-09 | 1998-11-03 | Digital Equipment Corporation | Method for searching an index |
US5745889A (en) * | 1996-08-09 | 1998-04-28 | Digital Equipment Corporation | Method for parsing information of databases records using word-location pairs and metaword-location pairs |
US6167393A (en) * | 1996-09-20 | 2000-12-26 | Novell, Inc. | Heterogeneous record search apparatus and method |
US6185559B1 (en) | 1997-05-09 | 2001-02-06 | Hitachi America, Ltd. | Method and apparatus for dynamically counting large itemsets |
JP3779431B2 (en) * | 1997-06-13 | 2006-05-31 | 富士通株式会社 | Relational database management device, intermediate link table automatic creation processing method, and program storage medium |
US7127420B1 (en) * | 1997-08-01 | 2006-10-24 | Financial Systems Technology (Intellectual Property) Pty. Ltd. | Data processing system for complex pricing and transactional analysis |
US6052672A (en) * | 1997-08-01 | 2000-04-18 | Financial Systems Technology Pty Ltd. | Data processing system for complex pricing and transactional analysis |
US6163781A (en) * | 1997-09-11 | 2000-12-19 | Physician Weblink Technology Services, Inc. | Object-to-relational data converter mapping attributes to object instance into relational tables |
US6185560B1 (en) | 1998-04-15 | 2001-02-06 | Sungard Eprocess Intelligance Inc. | System for automatically organizing data in accordance with pattern hierarchies therein |
US6026382A (en) * | 1997-10-08 | 2000-02-15 | Ncr Corporation | Computer-implemented system for relationship management for financial institutions |
US6243703B1 (en) * | 1997-10-14 | 2001-06-05 | International Business Machines Corporation | Method of accessing and displaying subsystem parameters including graphical plan table data |
US6061690A (en) * | 1997-10-31 | 2000-05-09 | Oracle Corporation | Apparatus and method for storage of object collections in a database system |
US6035306A (en) * | 1997-11-24 | 2000-03-07 | Terascape Software Inc. | Method for improving performance of large databases |
US6141434A (en) * | 1998-02-06 | 2000-10-31 | Christian; Andrew Dean | Technique for processing images |
US6240197B1 (en) | 1998-02-06 | 2001-05-29 | Compaq Computer Corporation | Technique for disambiguating proximate objects within an image |
US6184858B1 (en) | 1998-02-06 | 2001-02-06 | Compaq Computer Corporation | Technique for updating a background image |
US6400830B1 (en) | 1998-02-06 | 2002-06-04 | Compaq Computer Corporation | Technique for tracking objects through a series of images |
US6043827A (en) * | 1998-02-06 | 2000-03-28 | Digital Equipment Corporation | Technique for acknowledging multiple objects using a computer generated face |
US6434271B1 (en) | 1998-02-06 | 2002-08-13 | Compaq Computer Corporation | Technique for locating objects within an image |
US6556708B1 (en) | 1998-02-06 | 2003-04-29 | Compaq Computer Corporation | Technique for classifying objects within an image |
US6052132A (en) * | 1998-02-06 | 2000-04-18 | Digital Equipment Corporation | Technique for providing a computer generated face having coordinated eye and head movement |
US6421462B1 (en) | 1998-02-06 | 2002-07-16 | Compaq Computer Corporation | Technique for differencing an image |
US6105035A (en) * | 1998-02-17 | 2000-08-15 | Lucent Technologies, Inc. | Method by which notions and constructs of an object oriented programming language can be implemented using a structured query language (SQL) |
GB2334601B (en) * | 1998-02-20 | 2002-12-11 | Ibm | Database data model extension |
US6138100A (en) * | 1998-04-14 | 2000-10-24 | At&T Corp. | Interface for a voice-activated connection system |
US6163822A (en) * | 1998-05-04 | 2000-12-19 | Compaq Computer Corporation | Technique for controlling and processing a section of an interactive presentation simultaneously with detecting stimulus event in manner that overrides process |
US6249292B1 (en) | 1998-05-04 | 2001-06-19 | Compaq Computer Corporation | Technique for controlling a presentation of a computer generated object having a plurality of movable components |
US6014614A (en) * | 1998-05-29 | 2000-01-11 | Oracle Corporation | Method and mechanism for performing spatial joins |
US6304876B1 (en) | 1998-06-05 | 2001-10-16 | Computer Associates Think, Inc. | Method for enforcing integrity constraints in a database table using an index |
US6112209A (en) | 1998-06-17 | 2000-08-29 | Gusack; Mark David | Associative database model for electronic-based informational assemblies |
US6327606B1 (en) * | 1998-06-24 | 2001-12-04 | Oracle Corp. | Memory management of complex objects returned from procedure calls |
US7076507B1 (en) | 1998-07-08 | 2006-07-11 | Required Technologies, Inc. | Value-instance-connectivity computer-implemented database |
US6513041B2 (en) * | 1998-07-08 | 2003-01-28 | Required Technologies, Inc. | Value-instance-connectivity computer-implemented database |
US6009432A (en) | 1998-07-08 | 1999-12-28 | Required Technologies, Inc. | Value-instance-connectivity computer-implemented database |
GB2341250A (en) * | 1998-09-04 | 2000-03-08 | Balaena Limited | Database structure avoids duplication of stored data |
GB2343763B (en) * | 1998-09-04 | 2003-05-21 | Shell Services Internat Ltd | Data processing system |
US6487551B2 (en) | 1998-09-24 | 2002-11-26 | International Business Machines Corporation | Externalizing very large objects in a relational database client/server environment |
US6473896B1 (en) * | 1998-10-13 | 2002-10-29 | Parasoft, Corp. | Method and system for graphically generating user-defined rules for checking language quality |
US6735593B1 (en) | 1998-11-12 | 2004-05-11 | Simon Guy Williams | Systems and methods for storing data |
US6339766B1 (en) * | 1998-12-02 | 2002-01-15 | Transactionsecure | Electronic payment system employing limited-use account number |
US6438549B1 (en) * | 1998-12-03 | 2002-08-20 | International Business Machines Corporation | Method for storing sparse hierarchical data in a relational database |
US6735591B2 (en) * | 1999-01-26 | 2004-05-11 | Joseph M. Khan | Universal information warehouse system and method |
US7389305B1 (en) * | 1999-06-01 | 2008-06-17 | Fair Isaac Corporation | System and method for managing a database |
US7389351B2 (en) * | 2001-03-15 | 2008-06-17 | Microsoft Corporation | System and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts |
US7103806B1 (en) * | 1999-06-04 | 2006-09-05 | Microsoft Corporation | System for performing context-sensitive decisions about ideal communication modalities considering information about channel reliability |
US6421663B1 (en) | 1999-06-14 | 2002-07-16 | International Business Machines Corporation | Optimization of joined table expressions by extended access path selection |
US6502088B1 (en) | 1999-07-08 | 2002-12-31 | International Business Machines Corporation | Method and system for improved access to non-relational databases |
US6542904B2 (en) * | 1999-07-30 | 2003-04-01 | International Business Machines Corporation | Method and system for efficiently providing maintenance activity on a relational database that is utilized within a processing system |
AU6310400A (en) * | 1999-08-20 | 2001-03-19 | Bismin Trust, The | Data processing system |
US7725307B2 (en) | 1999-11-12 | 2010-05-25 | Phoenix Solutions, Inc. | Query engine for processing voice based queries including semantic decoding |
US9076448B2 (en) * | 1999-11-12 | 2015-07-07 | Nuance Communications, Inc. | Distributed real time speech recognition system |
US7392185B2 (en) | 1999-11-12 | 2008-06-24 | Phoenix Solutions, Inc. | Speech based learning/training system using semantic decoding |
US7050977B1 (en) | 1999-11-12 | 2006-05-23 | Phoenix Solutions, Inc. | Speech-enabled server for internet website and method |
US6633879B1 (en) * | 2000-01-04 | 2003-10-14 | International Business Machines Corporation | Method and system for optimizing direct tables and trees |
US6636858B1 (en) * | 2000-02-03 | 2003-10-21 | Michael T. Coffey | Method for formatting, associating organizing, and retrieving data of and from a database stored in a computer system |
US6915298B1 (en) * | 2000-02-09 | 2005-07-05 | International Business Machines Corporation | User-defined relationships for diagramming user-defined database relations |
US7162713B2 (en) * | 2000-03-14 | 2007-01-09 | Arc International | Difference engine method and apparatus |
US7484088B2 (en) | 2000-03-17 | 2009-01-27 | United States Postal Service | Methods and systems for proofing identities using a certificate authority |
US6622144B1 (en) | 2000-08-28 | 2003-09-16 | Ncr Corporation | Methods and database for extending columns in a record |
US20020065815A1 (en) * | 2000-10-04 | 2002-05-30 | Xcelerix, Inc. | Systems and methods for searching a database |
GB2368929B (en) * | 2000-10-06 | 2004-12-01 | Andrew Mather | An improved system for storing and retrieving data |
US7440906B1 (en) * | 2001-09-04 | 2008-10-21 | Accenture Global Services Gmbh | Identification, categorization, and integration of unplanned maintenance, repair and overhaul work on mechanical equipment |
KR100413967B1 (en) * | 2000-12-30 | 2004-01-07 | 한국전자통신연구원 | Method of interpretation and transformation of nested dataset on navigation-based data model |
US6915303B2 (en) | 2001-01-26 | 2005-07-05 | International Business Machines Corporation | Code generator system for digital libraries |
WO2002063502A1 (en) * | 2001-02-07 | 2002-08-15 | Marcelinus Wilhelmus De Regt | Organic dictionary method for storage and unlocking data |
US7606744B1 (en) | 2001-02-16 | 2009-10-20 | Financial Systems Technology (Intellectual Property) Pty. Ltd. | System and method for real-time pricing with volume discounting |
US7330895B1 (en) * | 2001-03-15 | 2008-02-12 | Microsoft Corporation | Representation, decision models, and user interface for encoding managing preferences, and performing automated decision making about the timing and modalities of interpersonal communications |
GB2379289B (en) * | 2001-06-04 | 2005-01-12 | Gordon Ross | An interactive multi-dimensional visual user interface |
CA2353026A1 (en) * | 2001-07-13 | 2003-01-13 | Sygenics Inc. | Adaptive data architecture |
US7693845B2 (en) | 2001-08-29 | 2010-04-06 | NetTraffic, Inc. | Database systems, methods and computer program products using type based selective foreign key association to represent multiple but exclusive relationships in relational databases |
US20030220879A1 (en) * | 2001-11-21 | 2003-11-27 | Gaughan Breen P. | System and method for electronic document processing |
US7644144B1 (en) | 2001-12-21 | 2010-01-05 | Microsoft Corporation | Methods, tools, and interfaces for the dynamic assignment of people to groups to enable enhanced communication and collaboration |
US7730063B2 (en) * | 2002-12-10 | 2010-06-01 | Asset Trust, Inc. | Personalized medicine service |
US20030196574A1 (en) * | 2002-04-23 | 2003-10-23 | Keter Plastic Ltd | Collapsible table formed of injection-molded half sections |
US7870240B1 (en) | 2002-06-28 | 2011-01-11 | Microsoft Corporation | Metadata schema for interpersonal communications management systems |
US7627585B2 (en) * | 2002-12-02 | 2009-12-01 | Sap Ag | Data structure mapping and packaging |
AU2003229699A1 (en) * | 2003-03-06 | 2004-09-28 | Sap Aktiengesellschaft | A method and a computer system for data assignment |
EP1622042A4 (en) * | 2003-04-25 | 2007-09-26 | Hewlett Packard Development Co | Database device, database search device, and method thereof |
US20060179067A1 (en) * | 2005-02-04 | 2006-08-10 | Bechtel Michael E | Knowledge discovery tool navigation |
US7945559B2 (en) * | 2006-03-22 | 2011-05-17 | Microsoft Corporation | Completion of partially specified paths |
WO2008041242A2 (en) * | 2006-10-05 | 2008-04-10 | Brainwave Applications Limited | A novel database |
CN101236549B (en) * | 2007-01-30 | 2012-03-07 | 阿里巴巴集团控股有限公司 | Method and system for obtaining attribute information content |
US20080222080A1 (en) * | 2007-03-06 | 2008-09-11 | Nitrosecurity, Inc. | Inferred index of circular tables in a database |
US7711716B2 (en) * | 2007-03-06 | 2010-05-04 | Microsoft Corporation | Optimizations for a background database consistency check |
US7814084B2 (en) * | 2007-03-21 | 2010-10-12 | Schmap Inc. | Contact information capture and link redirection |
US9501474B2 (en) * | 2008-07-16 | 2016-11-22 | Oracle International Corporation | Enhanced use of tags when storing relationship information of enterprise objects |
US8219581B2 (en) * | 2009-05-13 | 2012-07-10 | Teradata Us, Inc. | Method and system for analyzing ordered data using pattern matching in a relational database |
KR20110003947A (en) * | 2009-07-07 | 2011-01-13 | 삼성전자주식회사 | Data processing apparatus and method |
CN102063434B (en) * | 2009-11-18 | 2013-03-27 | 财团法人资讯工业策进会 | Candidate key capture device and candidate key capture method |
US8793288B2 (en) * | 2009-12-16 | 2014-07-29 | Sap Ag | Online access to database snapshots |
US20110153603A1 (en) * | 2009-12-17 | 2011-06-23 | Yahoo! Inc. | Time series storage for large-scale monitoring system |
CN102117293B (en) * | 2009-12-30 | 2014-03-19 | 中国银联股份有限公司 | Dynamic file positioning and query method |
EP2519897B1 (en) * | 2009-12-30 | 2014-03-26 | Telecom Italia S.p.A. | Method and system for carrying out searches in a database |
JP5398007B2 (en) * | 2010-02-26 | 2014-01-29 | 独立行政法人情報通信研究機構 | Relationship information expansion device, relationship information expansion method, and program |
TWI474197B (en) * | 2010-03-09 | 2015-02-21 | Alibaba Group Holding Ltd | Information retrieval methods and systems |
CN104040541B (en) | 2011-12-08 | 2018-04-10 | 甲骨文国际公司 | For more efficiently using memory to the technology of CPU bandwidth |
US9697174B2 (en) | 2011-12-08 | 2017-07-04 | Oracle International Corporation | Efficient hardware instructions for processing bit vectors for single instruction multiple data processors |
US9342314B2 (en) | 2011-12-08 | 2016-05-17 | Oracle International Corporation | Efficient hardware instructions for single instruction multiple data processors |
US10534606B2 (en) | 2011-12-08 | 2020-01-14 | Oracle International Corporation | Run-length encoding decompression |
US9792117B2 (en) | 2011-12-08 | 2017-10-17 | Oracle International Corporation | Loading values from a value vector into subregisters of a single instruction multiple data register |
US20130332450A1 (en) * | 2012-06-11 | 2013-12-12 | International Business Machines Corporation | System and Method for Automatically Detecting and Interactively Displaying Information About Entities, Activities, and Events from Multiple-Modality Natural Language Sources |
US9292569B2 (en) | 2012-10-02 | 2016-03-22 | Oracle International Corporation | Semi-join acceleration |
KR102074026B1 (en) | 2012-10-22 | 2020-02-05 | 아브 이니티오 테크놀로지 엘엘시 | Profiling data with location information |
EP3182304A1 (en) * | 2013-03-29 | 2017-06-21 | Pilab S.A. | Computer-implemented method for storing unlimited amount of data as a mind map in relational database systems |
EP2819030A1 (en) | 2013-06-30 | 2014-12-31 | Pilab S.A. | Database hierarchy-independent data drilling |
PL2843567T3 (en) | 2013-08-30 | 2017-10-31 | Pilab S A | Computer-implemented method for improving query execution in relational databases normalized at level 4 and above |
EP2843568A1 (en) | 2013-08-30 | 2015-03-04 | Pilab S.A. | Computer implemented method for creating database structures without knowledge on functioning of relational database system |
US9606921B2 (en) | 2013-09-21 | 2017-03-28 | Oracle International Corporation | Granular creation and refresh of columnar data |
WO2015134193A1 (en) * | 2014-03-07 | 2015-09-11 | Ab Initio Technology Llc | Managing data profiling operations related to data type |
US9773040B2 (en) | 2015-05-04 | 2017-09-26 | Alan Weisman | Search token mnemonic replacement |
US10073885B2 (en) | 2015-05-29 | 2018-09-11 | Oracle International Corporation | Optimizer statistics and cost model for in-memory tables |
US9990308B2 (en) | 2015-08-31 | 2018-06-05 | Oracle International Corporation | Selective data compression for in-memory databases |
US10061832B2 (en) | 2016-11-28 | 2018-08-28 | Oracle International Corporation | Database tuple-encoding-aware data partitioning in a direct memory access engine |
US10061714B2 (en) | 2016-03-18 | 2018-08-28 | Oracle International Corporation | Tuple encoding aware direct memory access engine for scratchpad enabled multicore processors |
US10055358B2 (en) | 2016-03-18 | 2018-08-21 | Oracle International Corporation | Run length encoding aware direct memory access filtering engine for scratchpad enabled multicore processors |
WO2017186774A1 (en) | 2016-04-26 | 2017-11-02 | Pilab S.A. | Systems and methods for querying databases |
US10599488B2 (en) | 2016-06-29 | 2020-03-24 | Oracle International Corporation | Multi-purpose events for notification and sequence control in multi-core processor systems |
US10380058B2 (en) | 2016-09-06 | 2019-08-13 | Oracle International Corporation | Processor core to coprocessor interface with FIFO semantics |
US10783102B2 (en) | 2016-10-11 | 2020-09-22 | Oracle International Corporation | Dynamically configurable high performance database-aware hash engine |
US10176114B2 (en) | 2016-11-28 | 2019-01-08 | Oracle International Corporation | Row identification number generation in database direct memory access engine |
US10459859B2 (en) | 2016-11-28 | 2019-10-29 | Oracle International Corporation | Multicast copy ring for database direct memory access filtering engine |
US10725947B2 (en) | 2016-11-29 | 2020-07-28 | Oracle International Corporation | Bit vector gather row count calculation and handling in direct memory access engine |
US11068540B2 (en) | 2018-01-25 | 2021-07-20 | Ab Initio Technology Llc | Techniques for integrating validation results in data profiling and related systems and methods |
CN109101528A (en) * | 2018-06-21 | 2018-12-28 | 深圳市买买提信息科技有限公司 | Data processing method, data processing equipment and electronic equipment |
Citations (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3618027A (en) | 1970-03-27 | 1971-11-02 | Research Corp | Associative memory system with reduced redundancy of stored information |
US3670310A (en) | 1970-09-16 | 1972-06-13 | Infodata Systems Inc | Method for information storage and retrieval |
US4068300A (en) | 1973-12-13 | 1978-01-10 | Honeywell Information Systems, Inc. | Data processing system utilizing data field descriptors for processing data files |
US4128891A (en) | 1976-12-30 | 1978-12-05 | International Business Machines Corporation | Magnetic bubble domain relational data base system |
US4497039A (en) | 1981-06-30 | 1985-01-29 | Fujitsu Limited | Join operation processing system in relational model |
US4498145A (en) | 1982-06-30 | 1985-02-05 | International Business Machines Corporation | Method for assuring atomicity of multi-row update operations in a database system |
US4575798A (en) | 1983-06-03 | 1986-03-11 | International Business Machines Corporation | External sorting using key value distribution and range formation |
US4631664A (en) | 1983-07-19 | 1986-12-23 | Bachman Information Systems, Inc. | Partnership data base management system and method |
US4670848A (en) | 1985-04-10 | 1987-06-02 | Standard Systems Corporation | Artificial intelligence system |
US4791561A (en) | 1987-04-17 | 1988-12-13 | Wang Laboratories, Inc. | Interactive construction of means for database maintenance |
US4807122A (en) | 1985-04-23 | 1989-02-21 | Mitsubishi Denki Kabushiki Kaisha | Information storage system |
US4829427A (en) | 1984-05-25 | 1989-05-09 | Data General Corporation | Database query code generation and optimization based on the cost of alternate access methods |
US4855908A (en) | 1984-12-27 | 1989-08-08 | Fujitsu Limited | POS system |
US4893232A (en) | 1985-11-30 | 1990-01-09 | Kabushiki Kaisha Toshiba | Data management system for efficiently searching data elements and having a flexible registration order of data elements |
US4901229A (en) | 1985-01-21 | 1990-02-13 | Tsutomu Tashiro | Parallelized rules processing system using associative memory for pipelined execution of plural join operations and concurrent condition comparing |
US4918593A (en) | 1987-01-08 | 1990-04-17 | Wang Laboratories, Inc. | Relational database system |
US4930072A (en) | 1987-08-31 | 1990-05-29 | At&T Bell Laboratories | Method for computing transitive closure |
US4930071A (en) | 1987-06-19 | 1990-05-29 | Intellicorp, Inc. | Method for integrating a knowledge-based system with an arbitrary database system |
US4933848A (en) * | 1988-07-15 | 1990-06-12 | International Business Machines Corporation | Method for enforcing referential constraints in a database management system |
US4947320A (en) * | 1988-07-15 | 1990-08-07 | International Business Machines Corporation | Method for referential constraint enforcement in a database management system |
US4967341A (en) | 1986-02-14 | 1990-10-30 | Hitachi, Ltd. | Method and apparatus for processing data base |
US5133068A (en) | 1988-09-23 | 1992-07-21 | International Business Machines Corporation | Complied objective referential constraints in a relational database having dual chain relationship descriptors linked in data record tables |
US5168565A (en) | 1988-01-20 | 1992-12-01 | Ricoh Company, Ltd. | Document retrieval system |
US5193183A (en) | 1990-04-27 | 1993-03-09 | Bachman Information Systems, Inc. | System for accessing design data of modeler subsystems by reference to partnership set and for dynamically correlating design data of modeler subsystems |
US5197005A (en) | 1989-05-01 | 1993-03-23 | Intelligent Business Systems | Database retrieval system having a natural language interface |
US5226158A (en) * | 1989-05-24 | 1993-07-06 | International Business Machines Corporation | Method and apparatus for maintaining referential integrity within a relational database |
US5239663A (en) | 1987-06-15 | 1993-08-24 | Centre National De La Recherche Scientifique | Self-adapting and multifunctional process and structure for the automated evaluation of logical or arithmetic expressions, particularly for extended database consultation |
US5247575A (en) | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
US5262942A (en) | 1990-06-05 | 1993-11-16 | Bankers Trust Company | Financial transaction network |
US5297279A (en) | 1990-05-30 | 1994-03-22 | Texas Instruments Incorporated | System and method for database management supporting object-oriented programming |
US5369761A (en) | 1990-03-30 | 1994-11-29 | Conley; John D. | Automatic and transparent denormalization support, wherein denormalization is achieved through appending of fields to base relations of a normalized database |
US5379419A (en) | 1990-12-07 | 1995-01-03 | Digital Equipment Corporation | Methods and apparatus for accesssing non-relational data files using relational queries |
US5386559A (en) * | 1992-07-16 | 1995-01-31 | International Business Machines Corporation | Variant domains and variant maps in a versioned database management system |
US5386557A (en) * | 1989-10-13 | 1995-01-31 | International Business Machines Corporation | Enforcement of referential constraints in a database system |
US5408657A (en) * | 1991-08-07 | 1995-04-18 | Unisys Corporation | Method of imposing multi-object constraints on data files in a data processing system |
US5459860A (en) | 1992-10-05 | 1995-10-17 | International Business Machines Corporation | Computerized system and process for managing a distributed database system |
US5488722A (en) * | 1993-05-28 | 1996-01-30 | International Business Machines Corporation | System and method for automating implementation and execution of constraint most likely to be violated in a database |
US5504885A (en) | 1993-06-29 | 1996-04-02 | Texas Instruments Incorporated | O-R gateway: a system for connecting object-oriented application programs and relational databases |
US5539870A (en) | 1992-10-05 | 1996-07-23 | International Business Machines Corporation | Computerized system and process for interactively managing a distributed database system |
US5542073A (en) | 1993-01-07 | 1996-07-30 | International Business Machines Corporation | Computer program product for choosing largest selectivities among eligible predicates of join equivalence classes for query optimization |
US5548749A (en) | 1993-10-29 | 1996-08-20 | Wall Data Incorporated | Semantic orbject modeling system for creating relational database schemas |
US5581785A (en) | 1993-07-27 | 1996-12-03 | Fuji Electric Co., Ltd. | Starting system of disk storage device and data reading/writing system of the same |
US5664177A (en) | 1988-04-13 | 1997-09-02 | Digital Equipment Corporation | Data processing system having a data structure with a single, simple primitive |
US5893108A (en) | 1994-12-29 | 1999-04-06 | International Business Machines Corporation | System, method, and computer program product for efficiently translating relational tuples to object-oriented objects |
WO2000007354A1 (en) | 1998-07-29 | 2000-02-10 | American Management Systems, Incorporated | Decision network based event pricing system in a component based, object oriented convergent customer care and billing system |
US6105035A (en) | 1998-02-17 | 2000-08-15 | Lucent Technologies, Inc. | Method by which notions and constructs of an object oriented programming language can be implemented using a structured query language (SQL) |
WO2001015811A1 (en) | 1999-08-30 | 2001-03-08 | Toshiba Carrier Corporation | Air cleaner |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4506326A (en) | 1983-02-28 | 1985-03-19 | International Business Machines Corporation | Apparatus and method for synthesizing a query for accessing a relational data base |
US4774661A (en) | 1985-11-19 | 1988-09-27 | American Telephone And Telegraph Company, At&T Information Systems | Database management system with active data dictionary |
US4918583A (en) * | 1988-04-25 | 1990-04-17 | Nikon Corporation | Illuminating optical device |
US5604899A (en) | 1990-05-21 | 1997-02-18 | Financial Systems Technology Pty. Ltd. | Data relationships processor with unlimited expansion capability |
-
1993
- 1993-06-28 US US08/083,861 patent/US5604899A/en not_active Expired - Lifetime
-
1995
- 1995-05-11 US US08/439,076 patent/US5652882A/en not_active Expired - Lifetime
- 1995-05-11 US US08/439,013 patent/US5617567A/en not_active Expired - Lifetime
- 1995-05-11 US US08/439,207 patent/US5675779A/en not_active Expired - Lifetime
-
1997
- 1997-05-22 US US08/862,176 patent/US5826259A/en not_active Ceased
-
2005
- 2005-06-14 US US11/152,833 patent/USRE40526E1/en not_active Expired - Lifetime
- 2005-06-14 US US11/152,839 patent/USRE40063E1/en not_active Expired - Lifetime
- 2005-06-14 US US11/152,838 patent/USRE40235E1/en not_active Expired - Lifetime
- 2005-06-14 US US11/152,835 patent/USRE40520E1/en not_active Expired - Fee Related
Patent Citations (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3618027A (en) | 1970-03-27 | 1971-11-02 | Research Corp | Associative memory system with reduced redundancy of stored information |
US3670310A (en) | 1970-09-16 | 1972-06-13 | Infodata Systems Inc | Method for information storage and retrieval |
US4068300A (en) | 1973-12-13 | 1978-01-10 | Honeywell Information Systems, Inc. | Data processing system utilizing data field descriptors for processing data files |
US4128891A (en) | 1976-12-30 | 1978-12-05 | International Business Machines Corporation | Magnetic bubble domain relational data base system |
US4497039A (en) | 1981-06-30 | 1985-01-29 | Fujitsu Limited | Join operation processing system in relational model |
US4498145A (en) | 1982-06-30 | 1985-02-05 | International Business Machines Corporation | Method for assuring atomicity of multi-row update operations in a database system |
US4575798A (en) | 1983-06-03 | 1986-03-11 | International Business Machines Corporation | External sorting using key value distribution and range formation |
US4631664A (en) | 1983-07-19 | 1986-12-23 | Bachman Information Systems, Inc. | Partnership data base management system and method |
US4829427A (en) | 1984-05-25 | 1989-05-09 | Data General Corporation | Database query code generation and optimization based on the cost of alternate access methods |
US4855908A (en) | 1984-12-27 | 1989-08-08 | Fujitsu Limited | POS system |
US4901229A (en) | 1985-01-21 | 1990-02-13 | Tsutomu Tashiro | Parallelized rules processing system using associative memory for pipelined execution of plural join operations and concurrent condition comparing |
US4670848A (en) | 1985-04-10 | 1987-06-02 | Standard Systems Corporation | Artificial intelligence system |
US4807122A (en) | 1985-04-23 | 1989-02-21 | Mitsubishi Denki Kabushiki Kaisha | Information storage system |
US4893232A (en) | 1985-11-30 | 1990-01-09 | Kabushiki Kaisha Toshiba | Data management system for efficiently searching data elements and having a flexible registration order of data elements |
US4967341A (en) | 1986-02-14 | 1990-10-30 | Hitachi, Ltd. | Method and apparatus for processing data base |
US4918593A (en) | 1987-01-08 | 1990-04-17 | Wang Laboratories, Inc. | Relational database system |
US4791561A (en) | 1987-04-17 | 1988-12-13 | Wang Laboratories, Inc. | Interactive construction of means for database maintenance |
US5239663A (en) | 1987-06-15 | 1993-08-24 | Centre National De La Recherche Scientifique | Self-adapting and multifunctional process and structure for the automated evaluation of logical or arithmetic expressions, particularly for extended database consultation |
US4930071A (en) | 1987-06-19 | 1990-05-29 | Intellicorp, Inc. | Method for integrating a knowledge-based system with an arbitrary database system |
US4930072A (en) | 1987-08-31 | 1990-05-29 | At&T Bell Laboratories | Method for computing transitive closure |
US5168565A (en) | 1988-01-20 | 1992-12-01 | Ricoh Company, Ltd. | Document retrieval system |
US5664177A (en) | 1988-04-13 | 1997-09-02 | Digital Equipment Corporation | Data processing system having a data structure with a single, simple primitive |
US4947320A (en) * | 1988-07-15 | 1990-08-07 | International Business Machines Corporation | Method for referential constraint enforcement in a database management system |
US4933848A (en) * | 1988-07-15 | 1990-06-12 | International Business Machines Corporation | Method for enforcing referential constraints in a database management system |
US5247575A (en) | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
US5133068A (en) | 1988-09-23 | 1992-07-21 | International Business Machines Corporation | Complied objective referential constraints in a relational database having dual chain relationship descriptors linked in data record tables |
US5197005A (en) | 1989-05-01 | 1993-03-23 | Intelligent Business Systems | Database retrieval system having a natural language interface |
US5226158A (en) * | 1989-05-24 | 1993-07-06 | International Business Machines Corporation | Method and apparatus for maintaining referential integrity within a relational database |
US5386557A (en) * | 1989-10-13 | 1995-01-31 | International Business Machines Corporation | Enforcement of referential constraints in a database system |
US5369761A (en) | 1990-03-30 | 1994-11-29 | Conley; John D. | Automatic and transparent denormalization support, wherein denormalization is achieved through appending of fields to base relations of a normalized database |
US5193183A (en) | 1990-04-27 | 1993-03-09 | Bachman Information Systems, Inc. | System for accessing design data of modeler subsystems by reference to partnership set and for dynamically correlating design data of modeler subsystems |
US5297279A (en) | 1990-05-30 | 1994-03-22 | Texas Instruments Incorporated | System and method for database management supporting object-oriented programming |
US5262942A (en) | 1990-06-05 | 1993-11-16 | Bankers Trust Company | Financial transaction network |
US5379419A (en) | 1990-12-07 | 1995-01-03 | Digital Equipment Corporation | Methods and apparatus for accesssing non-relational data files using relational queries |
US5408657A (en) * | 1991-08-07 | 1995-04-18 | Unisys Corporation | Method of imposing multi-object constraints on data files in a data processing system |
US5386559A (en) * | 1992-07-16 | 1995-01-31 | International Business Machines Corporation | Variant domains and variant maps in a versioned database management system |
US5459860A (en) | 1992-10-05 | 1995-10-17 | International Business Machines Corporation | Computerized system and process for managing a distributed database system |
US5539870A (en) | 1992-10-05 | 1996-07-23 | International Business Machines Corporation | Computerized system and process for interactively managing a distributed database system |
US5542073A (en) | 1993-01-07 | 1996-07-30 | International Business Machines Corporation | Computer program product for choosing largest selectivities among eligible predicates of join equivalence classes for query optimization |
US5488722A (en) * | 1993-05-28 | 1996-01-30 | International Business Machines Corporation | System and method for automating implementation and execution of constraint most likely to be violated in a database |
US5504885A (en) | 1993-06-29 | 1996-04-02 | Texas Instruments Incorporated | O-R gateway: a system for connecting object-oriented application programs and relational databases |
US5581785A (en) | 1993-07-27 | 1996-12-03 | Fuji Electric Co., Ltd. | Starting system of disk storage device and data reading/writing system of the same |
US5548749A (en) | 1993-10-29 | 1996-08-20 | Wall Data Incorporated | Semantic orbject modeling system for creating relational database schemas |
US5893108A (en) | 1994-12-29 | 1999-04-06 | International Business Machines Corporation | System, method, and computer program product for efficiently translating relational tuples to object-oriented objects |
US6105035A (en) | 1998-02-17 | 2000-08-15 | Lucent Technologies, Inc. | Method by which notions and constructs of an object oriented programming language can be implemented using a structured query language (SQL) |
WO2000007354A1 (en) | 1998-07-29 | 2000-02-10 | American Management Systems, Incorporated | Decision network based event pricing system in a component based, object oriented convergent customer care and billing system |
WO2001015811A1 (en) | 1999-08-30 | 2001-03-08 | Toshiba Carrier Corporation | Air cleaner |
Non-Patent Citations (61)
Title |
---|
"Extended Disjunctive Normal Form for Efficient Processing of Recursive Logic Queries", IBM Technical Disclosure Bulletin, vol. 30, No. 1, Jun. 1987 pp. 360-366. |
"The Smart Card's Chief Advocate", Credit Card Management, vol. 10, No. 1, p. 26+, ISBN: 0896-9329, 1992. |
Annevelink et al., "Object SQL-A Language for the Design and Implementation of Object Databases", Jan. 3, 1994, pp. 1-21. |
Anon., "Future of European Payment Systems? Integrating the Card, ATM's and Eurocheque," (Abstract only), World of Banking, vol. 9, No. 2, p. 19, Mach/Apr. 1990. |
Banerjee et al., "Data Model Issues for Object-Oriented Applications", ACM Transactions on Office Information Systems, vol. 5, No. 1, Jan. 1987, pp. 3-26. |
Bharadwaj et al., Determinants of success in service industries: a PIMS-based empirical investigation, Journal of Service Marketing, v7n4, pp. 19-40, 1993, 23 pages from Dialog file 15, acc. # 00813287. |
Blaha et al., "Relational Database Design using an Object-Oriented Methodology", Communications of the ACM, Apr. 1988, vol. 31, No. 4, pp. 414-427. |
Blakeley et al., "Experiences Building the Open OODB Query Optimizer", 1993, pp. 287-296. |
Blakely et al., "Experiences Building the Open OODB Query Optimizer", 1993, pp. 287-296. |
Cattell, R. and Rogers, T., "Combining Object-Oriented and Relational Models of Data", 1986 International Workshop on Sep. 26, 1986, pp. 212-213. |
Chen, P., "Entity-Relationship Approach to Information Modeling and Analysis", International Conference in Washington, D.C., Oct. 12-14, 1981, pp. 49-72. |
Chen, Peter, "Entity-Relationship Approach to Systems Analysis and Design", Proceedings of the International Conference in Los Angeles, Dec. 10-12, 1979, pp. 237-257. |
Codd, E., "Extending the Database Relational Model to Capture More Meaning", ACM Transactions on Database Systems, vol. 4, No. 4, Dec. 1979, pp. 397-434. |
Dewan et al. "Engineering the Object-Relation Database Model in O-Raid", Lecture Notes in Computer Science, 3<SUP>rd </SUP>International Conference-Paris, Jun. 21-23, 1989, pp. 389-403. |
El-Sharkawi et al, "The Architecture and Implementation of Enli: An Example-Based Natural Language Assisted Interface", Parbase 90 Intl. Conf. on Databases, Parallel Architectures & Their Applications, Mar. 7-9, 1990. |
El-Sharkawi et al., "The Architecture and Implementation of ENLI: An Example-Based Natural Language-Assisted Interface", PARABASE-90 International Conference on Databases, Parallel Architectures and Their Applications, Mar. 7-9, 1990, pp. 430-342. * |
Finkelstein et al., "Physical Database Design for Relational Databases", ACM Transactions on Database Systems, vol. 13, No. 1, Mar. 1988, pp. 91-128. |
Fishman et al., "Overview of the Iris DBMS", Association for Computing Machinery, Inc., pp. 219-250. |
Gamache et al., "Addressing Techniques Used in Database Object managers O<SUB>2 </SUB>and ORION", SIGMOD Record, vol. 24, No. 3, Sep. 1995, pp. 50-55. |
Halper et al., "An OODB "Part" Relationship Model", 10 pages. |
Hanks, D.R., "The Payoff of Modest Price Adjustments," (Abstract only), Bank Marketing, vol. 12, No. 9, p. 13,, Sep. 1980. |
Hendler, James A. Expert Systems: The User Interface. Albex Publishing Corporation. Norwood, NJ, 1988, pp. 31, 46-47, 109-110, 113 and 132-134. |
Howcroft, "Contemporary issues in UK bank delivery systems", Inter. Jour. of Service Industry Management, vol. 3, No. 1, pp. 39-56, ISBN 096-4223, 1992. |
Hudson et al., "Cactis: A Self-Adaptive Concurrent Implementation of an Object-Oriented Database Management System", ACM Transactions on Database Systems, vol. 14, No. 3, Sep. 1989, pp. 291-321. |
Hull et al., "Semantic Database Modeling: Survey, Applications, and Research Issues", ACM Computing Surveys, vol. 19, No. 3, Sep. 1987, pp. 201-260. |
Khoshaflan, S. and Copeland, G., "Object Identity", Microelectronics and Computer Technology Corporation, pp. 37-46. |
Kifer et al, "Sygraf: Implementing Logic Programs in a Database Style" IEEE Transactions on Software Engnrn. v: 14, N7, Jul. 1988 pp. 92-935. |
Kim et al., "Architecture of the ORION Next-Generation Database System", IEEE, 1990, pp. 109-124. |
Kim et al., "Composite Object Support in an Object-Oriented Database System", OOPSLA '87 Proceedings, Oct. 4-8, 1987, pp. 118-125. |
Kim et al., "Evaluation of the Object-relational DBMS Postgres .I. Administrative Data", Computing Science, Oct. 1994, pp. 1-52. |
Kim et al., "Feature of the ORION Object-Oriented Database System", pp. 251-282. |
Kim et al., "Semantics and Implementation of Schema Evolution in Object-Oriented Databases", 1987, pp. 311-322. |
Klimble et al., "Data Base Management", North-Holland Publishing Company, 1974, pp. 1-59. |
Korth and Silberschatz, Database System Concepts, McGraw-Hill Book Company (New York, 1986), pp. 45-105; pp. 301-323. |
Mark et al., "Metadata Management", Computer Database Architecture, Dec. 1986, pp. 26-36. |
Markowitz et al., "Representing Extended Entity-Relationship Structures in Relational Databases: A Modular Approach", ACM Transactions on Office Information Systems, vol. 17, No. 3, Sep. 1992, pp. 423-464. |
Nadler, P.S. "Comment: Pitfalls of Relationship Banking," (Abstract only) American Banker, p. 4, Feb. 3, 1992. |
Nixon et al., "Implementation of a Compiler for a Semantic Data Model: Experiences with Taxis", 1987, pp. 118-131. |
Nixon et al., "Implementation of a Compiler for a Semantic Data Model: Experiences with Taxis", ACM 1989, pp. 118-131. |
Osborn et al., "The Design of a relational Database System with Abstract Data Types for Domains", ACM Transactions on Database Systems, vol. 11, No. 3, Sep. 1986, pp. 357-373. |
Packham et al., "Semantic Data Models", Acm Computing Surveys, vol. 20, No. 3, Sep. 1988, pp. 153-189. |
Parsaye, Kamran & Chignell, Mark. Expert Systems For Experts. John Wiley & Sons. 1988. pp. 35-60, 177-178, 191-210 and 295-309. |
Rose, Peter S., et al. Financial Institution, Understanding and Managing Financial Services, 4th Edition, Richard D. Irwin, Inc., 1993. |
Rowe, L. and Stonebraker, M., "The POSTGRES Data Model", Computer Science Division, EECS Department, University of California, pp. 1-21. |
Rudolf Munz, "Design of The Well System", 1980, Noth-Holland Publishing Company, pp. 505-522. * |
Rudolf Munz, "The Well System: A Multi-User Database System Based On Binary Relationships and Graph-Pattern-Matching", 1978, Pergamon Press Ltd., pp. 99-114. * |
Rumbaugh, J., "Relations as Semantic Constructs in an Object-Oriented Language", OOPSLA '87 Proceedings, Oct. 4-8, 1987, pp. 466-481. |
Stonebraker, M. and Moore, D., "Object-Relational DBMSs The Next Great Wave", Morgan Kaufman Publishers, Inc., 1996, pp. 56-61. |
Straube et al., "Queries and Query Processing in Object-Oriented Database Systems", ACM Transactions on Information Systems, vol. 8, No. 4, Oct. 1990, pp. 387-430. |
Stuchfield, N., et al., "Modeling of Profitability of Customer Relationships: Development and Impact of Barclays de Zoete Wedd's BEATRICE," Journal of Management Information Systems, vol. 9, No. 2, p. 53, Fall 1992. |
Takahashi, J., "Hybrid Relations for Database Schema Evolution", IEEE, 1990, pp. 465-470. |
Teorey et al., "A Logical Design Methodology for Relational Databases Using the Extended Entity-Relationship Model", Computing Surveys, vol. 18, No. 2, Jun. 1986, pp. 197-222. |
Tsurt et al., "An Implementation of GEM-supporting a semantic data model on a relational back-end." 1984, pp. 286-295. |
Whang et al., "Query Optimization in a Memory-Resident Domain Relational Calculus Database System", ACM Transactions on Database Systems, vol. 15, No. 1, Mar. 1990, pp. 67-95. |
Wiederhold, G., "Database Design Appendix B", McGraw-Hill, 2001, pp. 689-698. |
Wiederhold, G., "Database Design Second Edition", McGraw-Hill, 1988. (Book). |
Wiederhold, G., "Views, Objects, and Databases" Computer Database Architecture, Dec. 1986, pp. 37-44. |
Wilkinson et al., "The Iris Architecture and Implementation", IEEE Transactions on Knowledge and Data Engineering, vol. 2, No. 1, Mar. 1990, 27 pages. |
Wilschut et al, "Pipelining in Query Execution" Parbase-90 Intl. Conf. on Databases, Parallel Architectures and Their Applications, Mar. 7-9, 1990 p. 562. |
Yu et al, "Automatic Knowledge Acquisition and Maintenance For Semantic Query Optimization", IEEE Transactions on Knowledge and Data Engrn, V: 1, No. 3 Sep. 1989, pp. 362-375. |
Zand et al., "A Survey of Current Object-Oriented Databases", Data Base Advances, Feb. 1995, vol. 26, No. 1, pp. 14-29. |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070185851A1 (en) * | 2006-01-27 | 2007-08-09 | Microsoft Corporation | Generating Queries Using Cardinality Constraints |
US7882121B2 (en) * | 2006-01-27 | 2011-02-01 | Microsoft Corporation | Generating queries using cardinality constraints |
US11303545B2 (en) | 2019-09-06 | 2022-04-12 | Ebay Inc. | Rate-limiting based on cardinality computation |
US11989627B1 (en) * | 2020-06-29 | 2024-05-21 | Amazon Technologies, Inc. | Automated machine learning pipeline generation |
Also Published As
Publication number | Publication date |
---|---|
US5652882A (en) | 1997-07-29 |
US5826259A (en) | 1998-10-20 |
US5617567A (en) | 1997-04-01 |
USRE40520E1 (en) | 2008-09-23 |
USRE40235E1 (en) | 2008-04-08 |
US5604899A (en) | 1997-02-18 |
US5675779A (en) | 1997-10-07 |
USRE40526E1 (en) | 2008-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE40063E1 (en) | Data processing and method for maintaining cardinality in a relational database | |
US5303367A (en) | Computer driven systems and methods for managing data which use two generic data elements and a single ordered file | |
US7529726B2 (en) | XML sub-document versioning method in XML databases using record storages | |
US8386435B2 (en) | Searchable archive | |
US5555409A (en) | Data management systems and methods including creation of composite views of data | |
US5717924A (en) | Method and apparatus for modifying existing relational database schemas to reflect changes made in a corresponding object model | |
US5347653A (en) | System for reconstructing prior versions of indexes using records indicating changes between successive versions of the indexes | |
EP0375307B1 (en) | Structure for and method of arranging recursively derived data in a database | |
US5857182A (en) | Database management system, method and program for supporting the mutation of a composite object without read/write and write/write conflicts | |
JP5833406B2 (en) | Data management architecture related to generic data items using references | |
US5295261A (en) | Hybrid database structure linking navigational fields having a hierarchial database structure to informational fields having a relational database structure | |
Turner et al. | A DBMS for large statistical databases | |
US8886617B2 (en) | Query-based searching using a virtual table | |
EP0650131A1 (en) | Computer method and storage structure for storing and accessing multidimensional data | |
KR20010083096A (en) | Value-instance-connectivity computer-implemented database | |
US20050010606A1 (en) | Data organization for database optimization | |
US7136861B1 (en) | Method and system for multiple function database indexing | |
AU664763B2 (en) | Entity-relation database | |
EP1116137B1 (en) | Database, and methods of data storage and retrieval | |
US7433882B2 (en) | Data management system and computer program | |
KR0155308B1 (en) | Dynamic information index device & method | |
US8250108B1 (en) | Method for transferring data into database systems | |
CA2202217A1 (en) | Method and apparatus for classifying raw data entries according to data patterns | |
JPS6347826A (en) | Managing method for data base | |
Indexes | Indexing for Performance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FPAY | Fee payment |
Year of fee payment: 12 |