throbber
IPR2016-01869 Ex. 1015
`Broadsign International, LLC Petitioner
` 1
`
`

`
`(_Z_cJ_}:_vy_1_'i_gl1_t_©.J.9.92 .by Macmillan Publishing Company
`A Divisioifof Macmillan, Inc."
`
`All rights reserved. No part of this book may be reproduced or
`transmitted in any form or by any means, electronic or mechanical,
`including photocopying, recording, or by any information storage and
`retrieval system, without permission in writing from the Publisher.
`
`Macmillan Publishing Company
`A Division of Macmillan, Inc.
`866 Third Avenue, New York, NY 10022
`
`Maxwell Macmillan Canada, Inc.
`1200 Eglinton Avenue East, Suite 200, Don Mills, Ontario M3C 3N1
`
`Macmillan, Inc., is part of the Maxwell Communication Group of
`Companies.
`
`Library of Congress Catalog Card Number: 91-45339
`
`Printed in the United States of America
`
`Printingnurnber
`3 4 5 6 '7 8 9 10
`
`Library of Congress Cataloging-in-Publication Data
`
`Macmillan encyclopedia of computers / Gary G. Bitter, editor in chief.
`p.
`cm.
`‘
`ISBN 0-02-897045-4 (set). — ISBN 0-02-897046-2 (vol. 1). — ISBN
`0-02-897047-0 (vol. 2)
`1. Computers—Encyclopedias.
`QA76.15.M33
`1992
`0D4’.03—dc20
`
`I. Bitter, Gary G.
`
`91-45339
`CIP
`
`The paper used in this publication meets the minimum requirements of
`American National Standard for Information Sciences—Permanence of
`Paper for Printed Library Materials. ANSI Z39.48—1984.
`
`4; 231995
`
`
` 2
`
`

`
`230
`
`DATABASE DESIGN, AUTOMATED
`
`input? What happens if a lightning bolt
`strikes a thermocouple? Will it destroy the
`data acquisition hardware? Will it also de-
`stroy the computer? Both can happen.
`The remote instrument approach is the
`best way to allow for
`the kind of high
`reliability just discussed, as the data acquisi-
`tion hardware is physically and electrically
`separated from the computer. The board
`approach is the most risky, but may be
`entirely acceptable if the installer is careful
`and knowledgeable.
`
`Pfioe
`
`Little needs to be said about price, except
`that each application has its price con-
`straints, and each different hardware ap-
`proach has a di.fferent price. Price must be
`weighed along with all the other factors to
`arrive at the best balance. In general, the
`boards are the least expensive, the remote
`instruments are the most expensive, and the
`proprietary board/remote instrument com-
`binations are intermediate. This is because a
`remote instrument must contain its own
`
`power supply and also a communication
`subsystem to talk to the computer.
`
`Software
`
`Software is an important part of the total
`picture, as none of these hardware devices
`can be used without it. Many of the afore-
`mentioned characteristics, such as speed,
`throughput, channel type capability, chan-
`nel number capacity, and (especially) ease of
`use, depend on the software as well as the
`hardware. This article is mainly about hard-
`ware, however.
`
`customer Support
`It is likely that sometime in the life use of any
`data acquisition equipment, the manufactur-
`er will have to be called for service or sup-
`port. This important factor should not be
`overlooked. One good way to evaluate com-
`panies in this regard is to pose some good
`hard application questions to them before
`buying. Another method is to ask for and
`follow up on references.
`
`SELECTING A DATA ACQUISITION BOARD
`
`To match application requirements to data
`acquisition boards, first collect the literature
`on likely candidates. Then consider each of
`the aforementioned factors in the order of '
`their importance to the application at hand,
`discarding candidates that do not meet the
`requirements. The list of candidates will nar-
`row to two or three by the time this process is
`finished. If this is the case, consult a col-
`league if possible on the relative merits of the
`remaining candidates. Review the list one
`more time, rating each candidate on each
`factor with a score pf 1 to 10, and then total
`the scores. The highest final score wins!
`
`Frederick A. Putnam
`
`DATABASE DESIGN, AUTOMATED
`
`A database system is a collection of related
`records stored in a manner that makes the
`storage and retrieval of the data very effi-«-
`cient. The four well-known data models for
`
`databases are the hierarchical, network, rela-
`tional, and object—oriented models.
`The oldest of .these models, the hierar-
`chical model, was established out of necessi-
`ty in the early 1960s without any prior
`formal study or definitions. Theoretically,
`the _many-to-many relationship type be-
`tween records (as when a strident takes many
`courses and a course has many students) is
`not permitted in the hierarchical model. The
`IMS Data Base Management System (DBMS)
`package is the oldest and most dominant
`hierarchical DBMS package.
`The network model is the product_of
`the’ Database Task .Group Com.mit_tee_,
`(CODASYL 1975). Its first version appeared -
`in 1961. This model permits all different
`-v
`types of connectivity: one—to-one, one—to-
`many,
`and many-to-many relationships
`(through the composition of two one—to-
`many relationships). Some network database
`packages are IDMS and IDMS/'R of Cullinet
`Software,
`IDS of Honeywell, DMS II of
`Unisys, DBMS 10 and 11 of Digital Equip-
`ment, and Image of Hewlett-Packard.
`
`
` 3
`
`

`
`DATABASE DESIGN, AUTOMATED
`
`231
`
`The theoretical foundation for the rela-
`
`tional database model was established by E.
`F. Codd in 1970 (Codd 1970). In this model,
`information is stored in a two-dimensional
`
`table called a relation. Each column repre-
`sents a field of the record and is called an
`
`attribute. Each row of the table represents a
`data record of the file and is called a tuple.
`All the elements of the table must be simple.
`In other words, no element of the table can
`be a table on its own. The reservoir from
`which the values of an attribute are drawn is
`
`called the domain of that attribute. A process
`called normalization is used for grouping
`information in these tables so that duplicate
`values of attributes are eliminated. These
`tables are constructed in such a manner that
`
`1. All the requirements of the client for
`whom the system is designed are satisfied.
`
`2. The relationship between attributes
`within a table or between attributes of differ-
`ent tables or between tables themselves en-
`ables the user to add new data to the data-
`bases or to delete data from the databases or
`
`to update data without causing any anomaly
`(inconsistency) within“ a database.
`
`Some well-known relational database
`
`packages are DB2 of IBM; Ingres of Rela-
`tional Technology; Oracle of Oracle, Inc.;
`Unify of Unify, Inc.; dBASE of Ashton-Tate;
`Rdbase 5000 of Microrim; Informix of In-
`formix Software, Inc.; and Paradox of Borland,
`Inc.
`
`The object-oriented data model uses the
`concepts of entities and objects. An object is
`a representation of an entity in the database
`system environment. An entity has an infi-
`nite number of properties, but an object will
`take only a finite subset of these properties to
`represent the entity in the system. An object
`encapsulates both the data and the opera-
`tions that can be performed on them. The
`operations are known as methods. Some
`examples of object-oriented database pack-
`ages are Vbase Integrated Object Oriented
`System of Ontologic,
`Inc.; GEMSTONE/
`OPAL of Serviologic; and ORION of Micro-
`Electronic and Computer Technology Corpo-
`ration.
`'
`
`In database terminology a record type
`
`means a file. In relational databases, record
`types are called relations, and fields are
`known as attributes. The record types in
`object-oriented databases are called objects,
`and the fields are called properties. In gener-
`al, a file has one or more candidate keys.
`Each candidate key is‘ a field or a group of
`fields that identifies a unique record within
`the file. Any of the candidate keys can be
`chosen as the primary key of the file; thus the
`primary key of a file identifies a unique
`record of the file. A foreign key is a field or a
`group of fields within a file that
`is the
`primary key of another file. The primary key
`is used to access a specific record from a file,
`and the foreign keys establish the links be-
`tween different files.
`
`system
`A database management
`(DBMS) is a software package. Its main func-
`tions are (1) to provide the facility to set up
`the database, (2) to retrieve and store source
`data (actual data in the database),
`(3)
`to
`retrieve and store the data about the struc-
`
`ture of the database (data dictionary), (4) to
`provide the facilities to enforce security
`rules, (5) to back up the database, and (6) to
`control the concurrent transactions so that
`
`one user's environment is protected from
`others.
`
`DATABASE DESIGN
`
`Before discussing automated database de-
`sign, it is essential to understand the mean-
`inglof database design and the processes
`involved. Basically, database design means
`identifying all the needed files, the fields of
`their records, and all candidate and foreign
`keys. Databases, like any "other software sys-
`tem, have their own software design life
`cycle. The process involved in the design of
`database systems are:
`=
`-'
`1. Analysis of the required informa—
`tion. In this phase, like any other software
`system, a precise definition of the problem at
`hand is established from interviews and ex- '
`
`amination of the organizational documents.
`Also in this phase, the description of the
`system constraints, requirements, queries,
`transactions, and needed reports are ex-
`pressed in short, concise sentences, usually
`
`I l I
`
`
` 4
`
`

`
`240
`
`DATABASE MANAGEMENT
`
`Teorey, J. T. 1990. Database modeling and
`desz'gn—The
`entity-relationship
`approach.
`San Mateo, Calif: Morgan Kaufmann.
`Welzer, T., I. Rozman, and]. Gyorkos. 1989.
`Automated normalization tool. Micropro-
`cessing and Microprogramming 25(1):375—
`80.
`
`Asad Khailany
`
`independence. That is, changes in the orga-
`nization of physical data and/or storage de-
`vice parameters are absorbed by the DBMS
`and, therefore, do not affect the user of the r
`database. If data were stored in a conven-
`
`tional file, changes in the record length, for
`example, would affect the program that ma-
`nipulates (or uses) those data.
`
`DATABASE MANAGEMENT
`
`As mass -storage prices fall and computers are
`used extensively throughout-businesses and
`other organizations, vast amounts of-*__valu-
`able information are piling up in electronic
`repositories. Finding ways to organize this
`information and to allow convenient access
`
`to it is steadily becoming more important.
`The emergence of advanced concepts based
`on artificial intelligence will make the stor~
`age and management of such vast amounts
`of infonnation even more critical.
`
`Software developers have come up with
`a variety of database management systems,
`which accept, organize, store, and retrieve
`information quickly and efficiently. A data-
`base is a collection of related data that con-
`
`tains information about an enterprise such as
`a university or an airline. Data include facts
`and figures that can be represented as num-
`bers, text strings, images, or voices stored in
`files on disk or other media. A database
`
`management system (DBMS) is a set of pro-
`grams (a software. package)
`that allows
`accessing and/or modification of the data-
`base. A major goal of the DBMS is to allow
`the user to deal with the data in abstract
`
`terms, rather than as the computer stores the
`data.
`
`Before databases were introduced, jisers
`had to write programs to manipulate data
`stored i.n files (conventional file systems en-
`vironment). Database management systems
`differ from the conventional file systems as
`follows.
`
`Data dependence. File systems exhibit data
`dependence, whereas a DBMS exhibits data
`
`In file systems, data may
`Data redundancy.
`. be duplicated. For example, the address of a
`customer may appear in a file representing
`the data for orders received and in a file
`
`representing orders shipped. An objective of
`a DBMS is to avoid this type of redundancy
`by placing common information in a single
`file and then, as users request the informa-
`tion, applying a certain set of operations on
`stored data to obtain the necessary informa-
`tion.
`
`there is no
`In file systems,
`Inconsistency.
`technique for checking whether various cop-
`ies of data are consistent. For example, if the
`' customer address changes,
`then the user
`might change that address in the order-
`received file and not in the order-shipped
`file; the customer. address therefore becomes
`inconsistent. It is the responsibility of the
`programmer tomanipulate the data so that
`they are consistent; if he or she. fails to do so,
`the program may produce incorrect results.
`In DBMSs, the database is always in a consis-
`tent state because changes to one piece of
`data are automatically absorbed throughout
`the entire system. Note that in databases, for
`efficiency purposes, the data might be dupli-
`cated; however,
`this redundancy is con-
`trolled.
`
`Lack of data integrity. Constraints may be
`imposed on certain data. For example, a
`customer can charge a sum greater than her
`or his allowed credit limit. In file systems, it is
`the responsibility of the user to determine if
`information entered violates the specific con-
`straints imposed, in this case, a credit limit.
`In DBMSS, however, constraints can be han-
`dled automatically. If the data entered into
`the system violate the constraints, the system
`rejects the data and/or warns the user about
`them.
`
`
` 5
`
`

`
`244
`
`DATABASE PROGRAMMING
`
`_[See also Data; Database Design, Auto-
`mated.]
`
`For Further Reading
`Date, C. J. 1990. An introduction to database
`systems, 5th ed., vol.
`I. Reading, Mass.:
`Addison-Wesley.
`Elmasri, R., and S. Navathe. 1989. Fundamen-
`tals of database systems. Redwood City,
`Calif: Benjamin Cummings.
`Korth, H., and A. Silberchatz. 1986. Database
`system concepts. New York: McGraw-Hill.
`Ozkarhan, E. 1990. Database management,
`concepts, design and practice. Englewood
`Cliffs, N.].: Prentice-Hall.
`Ullman, J. D. 1989. Principles of databases and
`knowIedge—base systems, vol.
`I. Rocltville,
`Md.: Computer Science Press.
`'
`
`Farshad Fotouhi
`
`DATABASE PROGRAMMING
`
`the years, programming languages
`Over
`have increasingly isolated the user from the
`inner workings of the computer and its oper-
`ating system; database programming partial-
`ly isolates the programmer from the details
`of data management by applying appropri-
`ate rules to the data handling, thus partially
`automating that part of the programming
`task.
`
`Databases are large, usually complex
`lists of facts and information; they usually
`contain regular arrangements of text and
`numbers, but modern databases, especially
`on personal computers, can contain video
`images (still or moving), sounds, large bodies
`of text, or combinations of all these elements.
`Many types of data fit best into-data-
`bases; today, most telephone directories, li-
`brary card catalogs, airline flight guides, and
`bibliographic references are kept in database
`forms, as are conventional databases con-
`taining accounting information, mailing lists,
`and the like.
`
`Although. you can still get many refer-
`
`ence works in paper, or "hard copy,” locat-
`ing the data m a large volume requires
`elaborate indices, which are both tedious
`and expensive to prepare and keep up—to-
`date. A database on a computer, on the other
`hand, can easily be re—indexed whenever the
`underlying data are changed; in fact,
`this
`tedious and complex task is automatically
`handled by the database management sys-
`tem whenever the data in the database are
`
`changed.
`The craft of data management dates
`back to Aristotle, the Greek philosopher, and
`the scheme of interlocking knowledge classi-
`fications he expounded in his Pbysica. Auto-
`mated data storage and retrieval first ap-
`peared in the 18805 when the Iacquard loom
`was developed; the loom could weave intri-
`cate patterns under the control of programs
`recorded on punched cards. The use of
`punched cards as a general-purpose data
`storage medium was further developed by
`Herman Hollerith. His card-sorting device, a
`precursor to the modem report generator,
`was used in the 1890 census.
`
`Over the years, data storage has come a
`long way, from the Hollerith cards to mag-
`netic tape (with the data usually still
`in
`Hollerith’s format) to massive modern data-
`bases stored on_ disk. Many modern data-
`bases are huge and complex, but the data
`input and inquiry programs make it relative-
`ly simple to use the data in them without a
`great deal of computer knowledge. When
`you call
`‘an airline's reservations agent, a
`special
`type of report generator tells the
`agent what seats are available on what flights
`and at what prices (see also AIRLINE RESERVA-
`non SYSTEMS).
`In discussing database programming, it
`can be helpful to distinguish between the
`database management system (DBMS) and
`the database programming language (DBPL).
`The DBMS" performs the task of manipulat-
`ing the data under the control of the DBPL.
`In many cases, however, the DBMS and the
`DBPL are integrated, and presented to the
`user or programmer as a command line or
`prompt at which one can type various com-
`mands to manipulate the chosen data.
`The permissable commands
`include
`both ad hoc commands,
`like LIST ALL
`
`
` 6
`
`

`
`712
`
`NETWORKS, LOCAL AREA
`
`tex service is an enhanced electronic mail
`
`service and is likely to become quite popular.
`The videotex service allows a person sitting
`at a terminal to interact with a remote data-
`
`base. Once the videotex system is in place, it
`would be possible to perform many common
`transactions, such as banking and reserva-
`tions, from a remote terminal.
`
`For Further Reading
`Bertsekas, D., and R. Gallager. 1987» Data
`networks. Englewood Cliffs, N.].: Prentice-
`Hall.
`
`Comer, D. 1988. lnternetworking with TCP/IP:
`Principles, protocols, and architecture. Engle—
`wood Cliffs, N.].: Prentice-Hall.
`_
`Davidson, I. 1988. An introduction to TCB/IP.
`New York: Springer-Verlag.
`Doll, D. R. 1980. Data communications: Facili-
`ties, networks, and system design. New York:
`Wiley.
`-
`Guruge, A. 1987. SNA: Theory and practice.
`Elmsford, N.Y.: Pergamon Press.
`I-Ialsall, F. 1988. Data communications, com-
`puter networks and OSI, 2nd ed. Reading,
`Mass.: Addison-Wesley.
`Henshall, 1., and S. Shaw. 1988. OSI ex-
`plained: End—to-end computer communication
`standards. New York: Wiley.
`Land, J. 1987. The integrated services digital
`network (ISBN). Manchester, Eng; The Na-
`tional Computing Centre.
`Martin, ]., and K. Chapman. 1987. SNA:
`IBM's
`networking
`solution. Englewood
`Cliffs, N.].: Prentice—Hall.
`Scientific American, Sept. 1991 (special issue:
`Communications, Computers and Net-
`works).
`_
`.
`Stallings, W. 1990a. Handbook of computer-
`communications standards, Vol. 1: The open
`systems interconnection (08!) model ‘and OSI—
`retated standards, 2nd ed. Carmel,
`Ind.:
`Howard W. Sams.
`.r
`
`. 1990b. Handbook of computer—com-
`munications standards, Vol. 2: Local area net-
`work standards, 2nd ed. Carmel, Ind.: How-
`ard W. Sams.
`
`. 1990c. Handbook of computer-com-
`munications standards. Vol. 3: The TCP/IP
`protocol suite, 2nd ed. Camel, Ind.: How-
`ard W. Sams.
`
`Tanenbaurn, A. 1988. Computer networks, 2nd
`ed. Englewood Cliffs, N.].: Prentice-Hall.
`
`S. P. Rana
`
`NETWORKS, LOCAL AREA
`
`See Local Area Networks;
`Networks, Computer
`
`NETWORKS, WIDE AREA
`
`See Networks, Computer;
`Wide Area Networks
`
`NONSTANDARD DATABASE SYSTEMS
`
`Database technology and the three common
`data models (i.e., hierarchical, network, and
`relational) were developed in response to the
`requirements of commercial data processing,
`which may be characterized by large vol-
`umes of homogeneous, record-oriented data.
`These models, however, are less effective
`when data objects vary in size and do not
`conform to any rigid structure. In addition,
`database languages based on these models
`have a limited expressive power and,
`in
`general, are not responsive to the complex
`requirements of sophisticated users. Recent-
`ly, a number of systems that extend the
`capabilities of ordinary databases have been
`developed. These systems can be identified
`as expert databases, temporal databases, spa-
`tial databases, deductive databases, object-
`oriented databases, and office in.forrnation
`systems (OISs). A short description of each
`system follows.
`
`‘
`
`EXPERT DATABASE SYSTEMS
`
`Conventional database systems are mainly
`concerned with efficient storage and retrieval
`of data. Generally, all data must be explicitly
`
`
` 7
`
`

`
`
`
`NONSTANDARD DATABASE SYSTEMS
`
`713
`
`stored, and thereis no mechanism for deriv-
`ing new facts from the existing information.
`In expert systems, which are often idealized
`as systems that can imitate the expertise of a
`human being, the emphasis is largely on
`deduction of new facts, and they are not
`confined to the stored data. Expert database
`systems attempt to integrate the capabil-
`ities of expert systems and database systems
`into one coherent’ system. These systems pro-
`vide, on -the one hand, constructs for the re-
`presentation of knowledge in the form of
`rules or frames along with capabilities for
`search and inferencing, and on the other
`hand, the ability to efficiently and reliably
`store, retrieve, and update large volumes
`of data.
`
`The integration of databases and expert
`systems may be achieved in several ways.
`
`0 A database system may be enhanced to
`include rules and inferencing power. This
`technique is suitable for a‘ large database
`that has been in operation for a long time.
`The knowledge base and the accompany-
`ing inference engine are similar to other
`application programs that
`receive data
`from the database. In certain types of ex-
`pert databases, called active databases, the
`system has triggers (or rules that when
`executed invoke a transition) and transi-
`tion constraints. Some ‘rules are tied to
`constraints; and once a constraint is violat-
`ed, a rule or a collection of rules is execut-
`ed. Some of these rules may be used for
`user notification, in which case they are
`called alerters.
`'
`'
`
`- Alternatively, an expert system may be
`extended with database capabilities and
`transparent access to data. In contrast to
`the previous method, the underlying data-
`base system in this metl1od has no autono-
`my because it is generally used in conjunc-
`tion with the expert system.
`- A third method requires interface of an
`expert system and a database system. In
`this cooperative mode, the expert system,
`which knows the structure and the schema
`of the database, formulates its queries ac-
`cording to the modus operandi of the
`database. In return, the database system
`presents its answers in a format readily
`
`usable by the expert system. This scheme is
`advantageous because the two systems
`exist and operate independently of each
`other.
`
`0 A fourth method requires development of
`expert database systems in an integrated
`framework that allows both database capa-
`bilities and inferencing power. In this ap-
`proach, one unified system executes both
`functions. (See the section on deductive
`databases below.)
`
`IBM's STARBURST project extends Struc-
`tured Query Language (SQL) and aims to
`support the increasing demands of a variety
`of applications including expert
`systems
`(Haas et al. 1988). KEEConnection, on the
`other hand, is an example of efforts to extend
`expert systems with database capabilities. It
`enhances the expert system KEE with data-
`base functions (KEE 1988).
`
`TEMPORAL DATABASE MANAGEMENT
`SYSTEMS
`
`Current database systems do not maintain a
`history of attribute values. In effect, each
`update destroys the old fact. In certain appli-
`cations, keeping track of all previous infor-
`mation is important (e.g., maintaining histo-
`ries of previous illnesses and medications in
`a hospital's patient database). To meet this
`need,
`temporal databases were designed
`with the aims of incorporating time in data-
`base systems and allowing multiple versions
`of data items to be stored in and retrieved
`from the database. Generally, temporal data-
`bases separate time-dependent data from
`time-independent data and provide some
`sort of time-keeping scheme for their.man-
`agement. Attribute time stamping is a simple
`method for managing temporal data. Each
`new attribute value is augmented with a
`timestamp that records the time of the up-
`date and thus distinguishes the current value
`of an attribute from its previous versions. By
`assigning a timestamp to each value, the
`database system can process queries that
`involve temporal relationships, such as ”be-
`fore," "after,” and ”dur.ir1g” (see Clifford
`and Tansel 1985 for more details).
`
`
` 8
`
`

`
`714
`
`NONSTANDARD DATABASE SYSTEMS
`
`SPATIAL DATABASES
`
`F _ _ _ _ - — _ _ "-1
`
`As temporal databases incorporate time into
`the system, spatial databases extend the ordi-
`nary database systems by modeling the space
`dimension. The word space is used loosely to
`capture such entities as lines, drawings, and
`graphs and such spatial relationships as
`proximity and boundary. There are many
`applications for spatial databases, including
`computer-aided design and manufacturing,
`geographic information systems, and geo-
`metric modeling and design.
`Spatial databases must store both spatial
`and nonspatial information. The former is
`the representation of drawings, regions, and
`lines, whereas the latter consists of alphanu-
`meric values as in conventional systems.
`Specific operations in a spatial database de-
`pend on the type of information it contains.
`For example, in a geographic database sys-
`tem in which maps consisting of several
`regions are stored, the following operations
`(among many others) are essential: union,
`projection, fusion, selection, and superposi-
`tion. Figures 1 through 5 illustrate these
`operations.
`For further reading, see Buchmann et al.
`(1989) and Kastuti et al. (1989).
`
`DEDUCTIVE DATABASES
`
`The emergence of PROLOG in the mid-
`1970s generated interest in investigating a
`more active role for logic in the design of
`database query languages and database
`processing. Deductive databases are the con-
`fluence of ideas from logic programming and
`relational databases. Thus, as in PROLOG,
`data and knowledge are represented as I-Iorn
`clauses (or rules) of the form
`
`A:-B1&B2&...8:-B11,
`
`. and B1: are predicates.
`.
`where A, B1, B2, .
`A is called the head of the clause, and B1 6:
`B2 8:...& Br:
`is called the body or the
`condition of the clause. The condition part of
`a clause may be empty, in which case we call
`it a fact. A database is essentially a collection
`of Horn clauses of the above form. In deduc-
`
`tive databases, however, most of the Horn
`clauses have no conditions (i.e., they contain
`mainly facts.) Queries to the database are
`formulated as they are in PROLOG.
`
`I:
`
`c
`
`FIGURE 1. Union of two maps: (a) map m1. (b) map
`m2, (c) the union of m1 and m2.
`
`region 3
`
`region 4
`
`region 1
`
`'
`
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I _ _ _ _ _ # _ _ _ _ J
`I‘ " ‘ - - ‘ - _ " ‘ _ l
`I
`I
`I
`I
`I
`I
`
`
`
`:
`
`region2
`
`II
`
`region 3
`
`I
`I
`I
`I
`I
`I
`I
`I
`I ________ _ _ .1
`
`
` 9

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket