Applications of Heraclitus in Telecommunications Information Processing

نویسندگان

  • Marcia Derr
  • Jacques Durand
  • Michael Doherty
  • Richard Hull
  • Mohammed Rupawalla
چکیده

In many telecommunications information processing applications it is useful, and often necessary, to create and access multiple hypothetical states. These might correspond to future states re ecting pending updates, or hypothetical alternative states that arise in the exploration of possible solutions. This paper shows how the Heraclitus family of database programming languages can be applied to satisfy such requirements. In the Heraclitus paradigm, database updates are captured as deltas, which are syntactic objects that can be e ciently manipulated. Deltas can be used to represent pending or hypothetical updates. We also consider the issue of incorporating Heraclitus functionalities into legacy telecommunication database systems. This research was supported in part by NSF grant IRI-931832; ARPA grants BAA-92-1092 and 33825-RT-AAS; and a sponsored research agreement from U S WEST Advanced Technologies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scenario Day 0 Day 10 Day

There are many applications which arise in telecommunications information processing in which it is useful, and often necessary, to create and access multiple hypothetical states. These might correspond to future states reeecting pending updates (such as customer service orders), or hypothetical alternative states that would arise in the exploration of diierent solutions to a given problem. In ...

متن کامل

Service Quality Management Modeling, Controlling and Upgrading as well as Communications and Information Technology Enhancement through Conducting a Case Study in the Parent Telecommunications Network of Iran

This paper reviews the service quality management control and upgrade as well as the communications and information technology enhancement. The purpose of this research is the control and improvement of the service quality management as well as the enhancement of the parent telecommunications network of I.R.Iran that finally, taking the specific conditions into consideration, the quality manage...

متن کامل

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996