http://git-wip-us.apache.org/repos/asf/asterixdb/blob/d76a0c0f/asterixdb/asterix-app/src/test/resources/runtimets/results/fuzzyjoin/dblp-csx-3_5.3.1/dblp-csx-3_5.3.1.1.adm
----------------------------------------------------------------------
diff --git 
a/asterixdb/asterix-app/src/test/resources/runtimets/results/fuzzyjoin/dblp-csx-3_5.3.1/dblp-csx-3_5.3.1.1.adm
 
b/asterixdb/asterix-app/src/test/resources/runtimets/results/fuzzyjoin/dblp-csx-3_5.3.1/dblp-csx-3_5.3.1.1.adm
index 256ab3a..a0502f8 100644
--- 
a/asterixdb/asterix-app/src/test/resources/runtimets/results/fuzzyjoin/dblp-csx-3_5.3.1/dblp-csx-3_5.3.1.1.adm
+++ 
b/asterixdb/asterix-app/src/test/resources/runtimets/results/fuzzyjoin/dblp-csx-3_5.3.1/dblp-csx-3_5.3.1.1.adm
@@ -1,7 +1,7 @@
-{ "dblp": { "id": 1, "dblpid": "books/acm/kim95/AnnevelinkACFHK95", "title": 
"Object SQL - A Language for the Design and Implementation of Object 
Databases.", "authors": "Jurgen Annevelink Rafiul Ahad Amelia Carlson Daniel H. 
Fishman Michael L. Heytens William Kent", "misc": "2002-01-03 42-68 1995 Modern 
Database Systems db/books/collections/kim95.html#AnnevelinkACFHK95" }, "csx": { 
"id": 1, "csxid": "oai CiteSeerXPSU 10.1.1.39.1830", "title": "Object SQL - A 
Language for the Design and Implementation of Object Databases", "authors": 
"Jurgen Annevelink Rafiul Ahad Amelia Carlson Dan Fishman Mike Heytens William 
Kent", "misc": "2009-04-13 ly, a function application expression consists of 
two expressions  a function reference (labelled func_ref in Figure 3 line 2), 
and an argument (labelled arg). The func_ref expression evaluates to a (generic 
or specific) function identifier, which may be the same as the function that 
the expression is a part of, thus allowing recursive function invo
 cations. The expression labelled arg evaluates to an arbitrary object or 
aggregate object. The semantics of evaluating function applications was 
discussed in detail in section 2. For example, to set the name of a person, we 
evaluate the following expression   FunAssign(function name.person) (p1,'John') 
 In this example, the first expression is itself a function call, applying the 
function FunAssign to the function name.person (an example of a specific 
function reference). This returns the oid of the function that sets a person's 
name, which is subsequently applied to a tuple of two elements, the oid of the 
person and the new name (a string o... CiteSeerX ACM Press 2009-04-13 
2007-11-22 1994 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.1830 http 
//www.tu-chemnitz.de/~igrdb/docs/OpenODB/osql.ps.gz en 10.1.1.31.2534 
10.1.1.28.4658 10.1.1.44.5947 10.1.1.39.199 Metadata may be used without 
restrictions as long as the oai identifier remains attach
 ed to it." }, "sim": 1.0f }
-{ "dblp": { "id": 5, "dblpid": "books/acm/kim95/DayalHW95", "title": "Active 
Database Systems.", "authors": "Umeshwar Dayal Eric N. Hanson Jennifer Widom", 
"misc": "2002-01-03 434-456 1995 Modern Database Systems 
db/books/collections/kim95.html#DayalHW95" }, "csx": { "id": 98, "csxid": "oai 
CiteSeerXPSU 10.1.1.49.2910", "title": "Active Database Systems", "authors": 
"Umeshwar Dayal Eric N. Hanson Jennifer Widom", "misc": "2009-04-12 In Won Kim 
editor Modern Database Systems The Object Model Integrating a production rules 
facility into a database system provides a uniform mechanism for a number of 
advanced database features including integrity constraint enforcement, derived 
data maintenance, triggers, alerters, protection, version control, and others. 
In addition, a database system with rule processing capabilities provides a 
useful platform for large and efficient knowledge-base and expert systems. 
Database systems with production rules are referred to as active database 
systems, a
 nd the field of active database systems has indeed been active. This chapter 
summarizes current work in active database systems  topics covered include 
active database rule models and languages, rule execution semantics, and 
implementation issues.  1 Introduction  Conventional database systems are 
passive  they only execute queries or transactions explicitly submitted by a 
user or an application program. For many applications, however, it is important 
to monitor situations of interest, and to ... CiteSeerX ACM Press 2009-04-12 
2007-11-22 1994 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.2910 http 
//www-db.stanford.edu/pub/papers/book-chapter.ps en 10.1.1.17.1323 
10.1.1.143.7196 10.1.1.50.3821 10.1.1.51.9946 10.1.1.41.2030 10.1.1.46.2504 
10.1.1.52.4421 10.1.1.38.2083 10.1.1.34.661 10.1.1.103.7630 10.1.1.100.9015 
10.1.1.97.1699 10.1.1.107.4220 10.1.1.47.9217 10.1.1.133.7157 10.1.1.101.5051 
10.1.1.30.9989 10.1.1.53.6941 10.1.1.50.8529 10.1.1.13
 3.4287 10.1.1.50.7278 10.1.1.10.1688 10.1.1.19.8669 10.1.1.44.7600 
10.1.1.144.376 10.1.1.44.1348 10.1.1.47.9998 10.1.1.90.4428 10.1.1.108.344 
10.1.1.48.9470 10.1.1.53.5472 10.1.1.52.4872 10.1.1.144.4965 10.1.1.31.7578 
10.1.1.32.6426 10.1.1.58.6335 10.1.1.85.8052 10.1.1.93.1931 10.1.1.55.4610 
10.1.1.21.3821 10.1.1.26.9208 10.1.1.31.4869 10.1.1.48.1833 10.1.1.83.8628 
10.1.1.87.9318 10.1.1.90.2195 10.1.1.36.5184 10.1.1.21.1704 10.1.1.53.1733 
10.1.1.90.3181 10.1.1.53.6783 10.1.1.52.6151 10.1.1.104.6911 10.1.1.105.1691 
10.1.1.21.1984 10.1.1.23.2775 10.1.1.62.5556 10.1.1.68.9063 10.1.1.74.4746 
10.1.1.78.5097 10.1.1.84.743 10.1.1.84.904 10.1.1.87.6019 10.1.1.88.3907 
10.1.1.89.9631 10.1.1.90.4147 10.1.1.92.365 10.1.1.100.2747 10.1.1.98.5083 
10.1.1.98.6663 10.1.1.99.1894 10.1.1.99.8174 10.1.1.133.8073 10.1.1.52.7823 
10.1.1.39.5341 10.1.1.35.3458 10.1.1.26.4620 10.1.1.18.8936 10.1.1.19.3694 
10.1.1.12.631 10.1.1.48.6394 Metadata may be used without restrictions as long 
as the oai identifier re
 mains attached to it." }, "sim": 1.0f }
-{ "dblp": { "id": 21, "dblpid": "books/acm/kim95/MengY95", "title": "Query 
Processing in Multidatabase Systems.", "authors": "Weiyi Meng Clement T. Yu", 
"misc": "2002-01-03 551-572 1995 Modern Database Systems 
db/books/collections/kim95.html#MengY95" }, "csx": { "id": 89, "csxid": "oai 
CiteSeerXPSU 10.1.1.33.8596", "title": "Dynamic Query Optimization and Query 
Processing in Multidatabase Systems 1.", "authors": "Henryk Josinski", "misc": 
"2009-04-15 Introduction  The multidatabase system (MDBS) approach, as a 
solution for integrated access to information distributed among diverse data 
sources, has gained a lot of attention in recent years. The multidatabase 
system is a database system which integrates pre--existing databases allowing 
the users to access simultaneously database systems (DBMSs) formulating a 
global query based on a global schema.  The component DBMSs are assumed to be 
heterogeneous and autonomous. Heterogeneity refers to different user 
interfaces, data models, query 
 languages, and query optimization strategies [5]. Local autonomy means that 
each DBMS retains complete control over local data and processing. As result of 
this, its cost model may not be available to the global query optimizer.  When 
a global query is submitted, it is decomposed into two types of queries [1]   
-- subqueries, operating on sharable data items from local databases,  -- 
assembling queries, consisting of, CiteSeerX  2009-04-15 2007-11-22 2000 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.8596 http 
//www.edbt2000.uni-konstanz.de/phd-workshop/papers/Josinski.pdf en 
10.1.1.27.4704 10.1.1.51.8352 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 0.5f }
-{ "dblp": { "id": 25, "dblpid": "books/acm/kim95/RusinkiewiczS95", "title": 
"Specification and Execution of Transactional Workflows.", "authors": "Marek 
Rusinkiewicz Amit P. Sheth", "misc": "2004-03-08 592-620 Modern Database 
Systems books/acm/Kim95 db/books/collections/kim95.html#RusinkiewiczS95 1995" 
}, "csx": { "id": 88, "csxid": "oai CiteSeerXPSU 10.1.1.43.3839", "title": 
"Specification and Execution of Transactional Workflows", "authors": "Marek 
Rusinkiewicz Amit Sheth", "misc": "2009-04-13 The basic transaction model has 
evolved over time to incorporate more complex transaction structures  and to 
selectively modify the atomicity and isolation properties. In this chapter we 
discuss the application  of transaction concepts to activities that involve 
coordinated execution of multiple tasks (possibly of  different types) over 
different processing entities. Such applications are referred to as 
transactional  workflows. In this chapter we discuss the specification of such 
workflows 
 and the issues involved in their  execution.  1 What is a Workflow?  Workflows 
are activities involving the coordinated execution of multiple tasks performed 
by different processing entities. A task defines some work to be done and can 
be specified in a number of ways, including a textual description in a file or 
an email, a form, a message, or a computer program. A processing entity that 
performs the tasks may be a person or a software system (e.g., a mailer, an 
application program, a database mana... CiteSeerX ACM Press 2009-04-13 
2007-11-22 1995 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.3839 http 
//lsdis.cs.uga.edu/lib/././download/RS93.ps en 10.1.1.17.1323 10.1.1.59.5051 
10.1.1.38.6210 10.1.1.68.7445 10.1.1.109.5175 10.1.1.17.7962 10.1.1.44.7778 
10.1.1.112.244 10.1.1.13.7602 10.1.1.102.7874 10.1.1.41.4043 10.1.1.49.5143 
10.1.1.41.7252 10.1.1.17.3225 10.1.1.54.7761 10.1.1.55.5255 10.1.1.108.958 
10.1.1.35.7733 10.1.1.52.3682 10.1.1.36.1
 618 10.1.1.45.6317 10.1.1.43.3180 10.1.1.35.8718 10.1.1.44.6365 10.1.1.51.2883 
10.1.1.50.9206 10.1.1.6.9085 10.1.1.30.1707 10.1.1.80.6634 10.1.1.49.355 
10.1.1.127.3550 10.1.1.35.3562 10.1.1.137.8832 10.1.1.49.4085 10.1.1.41.5506 
10.1.1.40.4657 10.1.1.43.2369 10.1.1.40.832 10.1.1.74.5411 10.1.1.90.4428 
10.1.1.110.6967 10.1.1.27.2122 10.1.1.15.5605 10.1.1.54.727 10.1.1.49.7512 
10.1.1.45.8796 10.1.1.50.5984 10.1.1.53.137 10.1.1.30.3262 10.1.1.28.1680 
10.1.1.21.7110 10.1.1.29.3148 10.1.1.57.687 10.1.1.59.5924 10.1.1.46.2812 
10.1.1.51.5552 10.1.1.17.7375 10.1.1.40.1598 10.1.1.52.9787 10.1.1.1.3496 
10.1.1.50.6791 10.1.1.55.3358 10.1.1.137.7582 10.1.1.118.4127 10.1.1.49.3580 
10.1.1.35.5825 10.1.1.46.9382 10.1.1.31.7411 10.1.1.48.5504 10.1.1.55.5163 
10.1.1.18.1603 10.1.1.52.8129 10.1.1.1.9723 10.1.1.21.9113 10.1.1.49.7644 
10.1.1.52.6646 10.1.1.75.3106 10.1.1.80.2072 10.1.1.55.8770 10.1.1.54.8188 
10.1.1.101.7919 10.1.1.104.8176 10.1.1.24.5741 10.1.1.29.4667 10.1.1.4.1055 
10.1.1.48.9175 10.1.
 1.56.792 10.1.1.65.3172 10.1.1.66.5947 10.1.1.73.8532 10.1.1.83.8299 
10.1.1.86.8521 10.1.1.87.2402 10.1.1.87.4648 10.1.1.90.5638 10.1.1.91.1709 
10.1.1.94.4248 10.1.1.114.511 10.1.1.119.5037 10.1.1.124.7957 10.1.1.49.215 
10.1.1.53.7777 10.1.1.53.9711 10.1.1.45.9409 10.1.1.40.8789 10.1.1.43.4845 
10.1.1.34.8273 10.1.1.35.4783 10.1.1.28.3176 10.1.1.16.8151 10.1.1.8.9117 
10.1.1.58.3449 10.1.1.142.7041 Metadata may be used without restrictions as 
long as the oai identifier remains attached to it." }, "sim": 1.0f }
-{ "dblp": { "id": 51, "dblpid": "books/aw/kimL89/NierstraszT89", "title": 
"Integrated Office Systems.", "authors": "Oscar Nierstrasz Dennis Tsichritzis", 
"misc": "2002-01-03 199-215 1989 Object-Oriented Concepts, Databases, and 
Applications db/books/collections/kim89.html#NierstraszT89" }, "csx": { "id": 
92, "csxid": "oai CiteSeerXPSU 10.1.1.13.2374", "title": "Integrated Office 
Systems", "authors": "O. M. Nierstrasz D. C. Tsichritzis", "misc": "2009-04-17 
Introduction  New techniques are sorely needed to aid in the development and 
maintenance of large application systems. The problem with traditional 
approaches to software engineering is well in evidence in the field of o#ce 
information systems  it is costly and di#cult to extend existing applications, 
and to get unrelated applications to \"talk\" to each other. The objectoriented 
approach is already being tentatively applied in the modeling of \"o#ce 
objects\" and in the presentation of these entities to users as such in 
\"desktop
 \" interfaces to o#ce software. In order to fully exploit the approach to 
achieve integrated o#ce systems, we need to use object-oriented programming 
languages, object-oriented run-time support, and object-oriented software 
engineering environments.  We can view the fundamental idea behind the 
object-oriented approach as that of encapsulation  object-oriented languages 
and systems exploit encapsulation in various ways in an attempt to enhance 
productivity through, f CiteSeerX  2009-04-17 2007-11-21 1988 application/pdf 
text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.2374 http 
//www.iam.unibe.ch/~scg/Archive/OSG/Nier89bIntegOfficeSystems.pdf en 
10.1.1.26.9545 10.1.1.65.5865 10.1.1.34.624 10.1.1.12.8544 10.1.1.144.6983 
10.1.1.26.6746 10.1.1.49.3064 10.1.1.30.4607 10.1.1.38.4894 10.1.1.20.8197 
10.1.1.26.4381 10.1.1.29.1890 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 1.0f }
-{ "dblp": { "id": 51, "dblpid": "books/aw/kimL89/NierstraszT89", "title": 
"Integrated Office Systems.", "authors": "Oscar Nierstrasz Dennis Tsichritzis", 
"misc": "2002-01-03 199-215 1989 Object-Oriented Concepts, Databases, and 
Applications db/books/collections/kim89.html#NierstraszT89" }, "csx": { "id": 
93, "csxid": "oai CiteSeerXPSU 10.1.1.42.9253", "title": "Integrated Office 
Systems", "authors": "O. M. Nierstrasz D. C. Tsichritzis", "misc": "2009-04-11 
Introduction  New techniques are sorely needed to aid in the development and 
maintenance of large application systems. The problem with traditional 
approaches to software engineering is well in evidence in the field of office 
information systems  it is costly and difficult to extend existing 
applications, and to get unrelated applications to \"talk\" to each other. The 
objectoriented approach is already being tentatively applied in the modeling of 
\"office objects\" and in the presentation of these entities to users as such 
in \"d
 esktop\" interfaces to office software. In order to fully exploit the approach 
to achieve integrated office systems, we need to use object-oriented 
programming languages, object-oriented run-time support, and object-oriented 
software engineering environments. We can view the fundamental idea behind the 
object-oriented approach as that of encapsulation  object-oriented languages 
and systems exploit encapsulation in various ways in an attempt t CiteSeerX ACM 
Press and Addison-Wesley 2009-04-11 2007-11-22 1988 application/postscript text 
http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.9253 ftp 
//ftp.iam.unibe.ch/pub/scg/Papers/integratedOfficeSystems.ps.gz en 
10.1.1.26.9545 10.1.1.65.5865 10.1.1.34.624 10.1.1.12.8544 10.1.1.144.6983 
10.1.1.26.6746 10.1.1.49.3064 10.1.1.30.4607 10.1.1.38.4894 10.1.1.20.8197 
10.1.1.26.4381 10.1.1.29.1890 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 1.0f }
-{ "dblp": { "id": 54, "dblpid": "books/aw/kimL89/SteinLU89", "title": "A 
Shared View of Sharing  The Treaty of Orlando.", "authors": "Lynn Andrea Stein 
Henry Lieberman David Ungar", "misc": "2002-01-03 31-48 1989 Object-Oriented 
Concepts, Databases, and Applications 
db/books/collections/kim89.html#SteinLU89" }, "csx": { "id": 91, "csxid": "oai 
CiteSeerXPSU 10.1.1.55.482", "title": "A Shared View of Sharing  The Treaty of 
Orlando", "authors": "Lynn Andrea Stein Henry Lieberman David Ungar", "misc": 
"2009-04-12 Introduction For the past few years, researchers have been debating 
the relative merits of object-oriented languages with classes and inheritance 
as opposed to those with prototypes and delegation. It has become clear that 
the object-oriented programming language design space is not a dichotomy. 
Instead, we have identified two fundamental mechanisms---templates and  
empathy---and several different independent degrees of freedom for each. 
Templates create new objects in their ow
 n image, providing guarantees about the similarity of group members. Empathy 
allows an object to act as if it were some other object, thus providing sharing 
of state and behavior. The Smalltalk-80  TM  language,  1  Actors, Lieberman's 
Delegation  system, Self, and Hybrid each take differing stands on the forms of 
templates  1  Smalltalk-80  TM  is a trademark of Par CiteSeerX ACM Press 
2009-04-12 2007-11-22 1989 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.55.482 http 
//lcs.www.media.mit.edu/people/lieber/Lieberary/OOP/Treaty/Treaty.ps en 
10.1.1.26.9545 10.1.1.118.6579 10.1.1.48.69 10.1.1.57.5195 10.1.1.9.570 
10.1.1.47.511 10.1.1.127.5320 10.1.1.100.4334 10.1.1.5.3348 10.1.1.39.3374 
10.1.1.56.4713 10.1.1.61.2065 10.1.1.27.3015 10.1.1.1.5960 10.1.1.67.5433 
10.1.1.31.8109 10.1.1.68.4062 10.1.1.49.3986 10.1.1.122.9331 10.1.1.46.8283 
10.1.1.54.5230 10.1.1.16.2055 10.1.1.137.5180 10.1.1.43.5722 10.1.1.68.2105 
10.1.1.35.1247 10.1.1.30.1415 10.1.1.7.
 5014 10.1.1.102.3946 10.1.1.105.6469 10.1.1.26.223 10.1.1.26.8645 
10.1.1.35.4104 10.1.1.39.6986 10.1.1.41.7822 10.1.1.42.9056 10.1.1.53.9325 
10.1.1.71.1802 10.1.1.76.6993 10.1.1.89.9613 10.1.1.121.5599 10.1.1.122.3737 
10.1.1.127.1894 10.1.1.55.5674 10.1.1.37.8260 10.1.1.2.2077 10.1.1.24.5782 
10.1.1.19.780 10.1.1.2.4148 10.1.1.2.4173 10.1.1.131.902 10.1.1.30.2927 
Metadata may be used without restrictions as long as the oai identifier remains 
attached to it." }, "sim": 1.0f }
+{ "dblp": { "id": 1, "dblpid": "books/acm/kim95/AnnevelinkACFHK95", "title": 
"Object SQL - A Language for the Design and Implementation of Object 
Databases.", "authors": "Jurgen Annevelink Rafiul Ahad Amelia Carlson Daniel H. 
Fishman Michael L. Heytens William Kent", "misc": "2002-01-03 42-68 1995 Modern 
Database Systems db/books/collections/kim95.html#AnnevelinkACFHK95" }, "csx": { 
"id": 1, "csxid": "oai CiteSeerXPSU 10.1.1.39.1830", "title": "Object SQL - A 
Language for the Design and Implementation of Object Databases", "authors": 
"Jurgen Annevelink Rafiul Ahad Amelia Carlson Dan Fishman Mike Heytens William 
Kent", "misc": "2009-04-13 ly, a function application expression consists of 
two expressions  a function reference (labelled func_ref in Figure 3 line 2), 
and an argument (labelled arg). The func_ref expression evaluates to a (generic 
or specific) function identifier, which may be the same as the function that 
the expression is a part of, thus allowing recursive function invo
 cations. The expression labelled arg evaluates to an arbitrary object or 
aggregate object. The semantics of evaluating function applications was 
discussed in detail in section 2. For example, to set the name of a person, we 
evaluate the following expression   FunAssign(function name.person) (p1,'John') 
 In this example, the first expression is itself a function call, applying the 
function FunAssign to the function name.person (an example of a specific 
function reference). This returns the oid of the function that sets a person's 
name, which is subsequently applied to a tuple of two elements, the oid of the 
person and the new name (a string o... CiteSeerX ACM Press 2009-04-13 
2007-11-22 1994 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.1830 http 
//www.tu-chemnitz.de/~igrdb/docs/OpenODB/osql.ps.gz en 10.1.1.31.2534 
10.1.1.28.4658 10.1.1.44.5947 10.1.1.39.199 Metadata may be used without 
restrictions as long as the oai identifier remains attach
 ed to it." }, "sim": 1.0 }
+{ "dblp": { "id": 5, "dblpid": "books/acm/kim95/DayalHW95", "title": "Active 
Database Systems.", "authors": "Umeshwar Dayal Eric N. Hanson Jennifer Widom", 
"misc": "2002-01-03 434-456 1995 Modern Database Systems 
db/books/collections/kim95.html#DayalHW95" }, "csx": { "id": 98, "csxid": "oai 
CiteSeerXPSU 10.1.1.49.2910", "title": "Active Database Systems", "authors": 
"Umeshwar Dayal Eric N. Hanson Jennifer Widom", "misc": "2009-04-12 In Won Kim 
editor Modern Database Systems The Object Model Integrating a production rules 
facility into a database system provides a uniform mechanism for a number of 
advanced database features including integrity constraint enforcement, derived 
data maintenance, triggers, alerters, protection, version control, and others. 
In addition, a database system with rule processing capabilities provides a 
useful platform for large and efficient knowledge-base and expert systems. 
Database systems with production rules are referred to as active database 
systems, a
 nd the field of active database systems has indeed been active. This chapter 
summarizes current work in active database systems  topics covered include 
active database rule models and languages, rule execution semantics, and 
implementation issues.  1 Introduction  Conventional database systems are 
passive  they only execute queries or transactions explicitly submitted by a 
user or an application program. For many applications, however, it is important 
to monitor situations of interest, and to ... CiteSeerX ACM Press 2009-04-12 
2007-11-22 1994 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.2910 http 
//www-db.stanford.edu/pub/papers/book-chapter.ps en 10.1.1.17.1323 
10.1.1.143.7196 10.1.1.50.3821 10.1.1.51.9946 10.1.1.41.2030 10.1.1.46.2504 
10.1.1.52.4421 10.1.1.38.2083 10.1.1.34.661 10.1.1.103.7630 10.1.1.100.9015 
10.1.1.97.1699 10.1.1.107.4220 10.1.1.47.9217 10.1.1.133.7157 10.1.1.101.5051 
10.1.1.30.9989 10.1.1.53.6941 10.1.1.50.8529 10.1.1.13
 3.4287 10.1.1.50.7278 10.1.1.10.1688 10.1.1.19.8669 10.1.1.44.7600 
10.1.1.144.376 10.1.1.44.1348 10.1.1.47.9998 10.1.1.90.4428 10.1.1.108.344 
10.1.1.48.9470 10.1.1.53.5472 10.1.1.52.4872 10.1.1.144.4965 10.1.1.31.7578 
10.1.1.32.6426 10.1.1.58.6335 10.1.1.85.8052 10.1.1.93.1931 10.1.1.55.4610 
10.1.1.21.3821 10.1.1.26.9208 10.1.1.31.4869 10.1.1.48.1833 10.1.1.83.8628 
10.1.1.87.9318 10.1.1.90.2195 10.1.1.36.5184 10.1.1.21.1704 10.1.1.53.1733 
10.1.1.90.3181 10.1.1.53.6783 10.1.1.52.6151 10.1.1.104.6911 10.1.1.105.1691 
10.1.1.21.1984 10.1.1.23.2775 10.1.1.62.5556 10.1.1.68.9063 10.1.1.74.4746 
10.1.1.78.5097 10.1.1.84.743 10.1.1.84.904 10.1.1.87.6019 10.1.1.88.3907 
10.1.1.89.9631 10.1.1.90.4147 10.1.1.92.365 10.1.1.100.2747 10.1.1.98.5083 
10.1.1.98.6663 10.1.1.99.1894 10.1.1.99.8174 10.1.1.133.8073 10.1.1.52.7823 
10.1.1.39.5341 10.1.1.35.3458 10.1.1.26.4620 10.1.1.18.8936 10.1.1.19.3694 
10.1.1.12.631 10.1.1.48.6394 Metadata may be used without restrictions as long 
as the oai identifier re
 mains attached to it." }, "sim": 1.0 }
+{ "dblp": { "id": 21, "dblpid": "books/acm/kim95/MengY95", "title": "Query 
Processing in Multidatabase Systems.", "authors": "Weiyi Meng Clement T. Yu", 
"misc": "2002-01-03 551-572 1995 Modern Database Systems 
db/books/collections/kim95.html#MengY95" }, "csx": { "id": 89, "csxid": "oai 
CiteSeerXPSU 10.1.1.33.8596", "title": "Dynamic Query Optimization and Query 
Processing in Multidatabase Systems 1.", "authors": "Henryk Josinski", "misc": 
"2009-04-15 Introduction  The multidatabase system (MDBS) approach, as a 
solution for integrated access to information distributed among diverse data 
sources, has gained a lot of attention in recent years. The multidatabase 
system is a database system which integrates pre--existing databases allowing 
the users to access simultaneously database systems (DBMSs) formulating a 
global query based on a global schema.  The component DBMSs are assumed to be 
heterogeneous and autonomous. Heterogeneity refers to different user 
interfaces, data models, query 
 languages, and query optimization strategies [5]. Local autonomy means that 
each DBMS retains complete control over local data and processing. As result of 
this, its cost model may not be available to the global query optimizer.  When 
a global query is submitted, it is decomposed into two types of queries [1]   
-- subqueries, operating on sharable data items from local databases,  -- 
assembling queries, consisting of, CiteSeerX  2009-04-15 2007-11-22 2000 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.8596 http 
//www.edbt2000.uni-konstanz.de/phd-workshop/papers/Josinski.pdf en 
10.1.1.27.4704 10.1.1.51.8352 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 0.5 }
+{ "dblp": { "id": 25, "dblpid": "books/acm/kim95/RusinkiewiczS95", "title": 
"Specification and Execution of Transactional Workflows.", "authors": "Marek 
Rusinkiewicz Amit P. Sheth", "misc": "2004-03-08 592-620 Modern Database 
Systems books/acm/Kim95 db/books/collections/kim95.html#RusinkiewiczS95 1995" 
}, "csx": { "id": 88, "csxid": "oai CiteSeerXPSU 10.1.1.43.3839", "title": 
"Specification and Execution of Transactional Workflows", "authors": "Marek 
Rusinkiewicz Amit Sheth", "misc": "2009-04-13 The basic transaction model has 
evolved over time to incorporate more complex transaction structures  and to 
selectively modify the atomicity and isolation properties. In this chapter we 
discuss the application  of transaction concepts to activities that involve 
coordinated execution of multiple tasks (possibly of  different types) over 
different processing entities. Such applications are referred to as 
transactional  workflows. In this chapter we discuss the specification of such 
workflows 
 and the issues involved in their  execution.  1 What is a Workflow?  Workflows 
are activities involving the coordinated execution of multiple tasks performed 
by different processing entities. A task defines some work to be done and can 
be specified in a number of ways, including a textual description in a file or 
an email, a form, a message, or a computer program. A processing entity that 
performs the tasks may be a person or a software system (e.g., a mailer, an 
application program, a database mana... CiteSeerX ACM Press 2009-04-13 
2007-11-22 1995 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.3839 http 
//lsdis.cs.uga.edu/lib/././download/RS93.ps en 10.1.1.17.1323 10.1.1.59.5051 
10.1.1.38.6210 10.1.1.68.7445 10.1.1.109.5175 10.1.1.17.7962 10.1.1.44.7778 
10.1.1.112.244 10.1.1.13.7602 10.1.1.102.7874 10.1.1.41.4043 10.1.1.49.5143 
10.1.1.41.7252 10.1.1.17.3225 10.1.1.54.7761 10.1.1.55.5255 10.1.1.108.958 
10.1.1.35.7733 10.1.1.52.3682 10.1.1.36.1
 618 10.1.1.45.6317 10.1.1.43.3180 10.1.1.35.8718 10.1.1.44.6365 10.1.1.51.2883 
10.1.1.50.9206 10.1.1.6.9085 10.1.1.30.1707 10.1.1.80.6634 10.1.1.49.355 
10.1.1.127.3550 10.1.1.35.3562 10.1.1.137.8832 10.1.1.49.4085 10.1.1.41.5506 
10.1.1.40.4657 10.1.1.43.2369 10.1.1.40.832 10.1.1.74.5411 10.1.1.90.4428 
10.1.1.110.6967 10.1.1.27.2122 10.1.1.15.5605 10.1.1.54.727 10.1.1.49.7512 
10.1.1.45.8796 10.1.1.50.5984 10.1.1.53.137 10.1.1.30.3262 10.1.1.28.1680 
10.1.1.21.7110 10.1.1.29.3148 10.1.1.57.687 10.1.1.59.5924 10.1.1.46.2812 
10.1.1.51.5552 10.1.1.17.7375 10.1.1.40.1598 10.1.1.52.9787 10.1.1.1.3496 
10.1.1.50.6791 10.1.1.55.3358 10.1.1.137.7582 10.1.1.118.4127 10.1.1.49.3580 
10.1.1.35.5825 10.1.1.46.9382 10.1.1.31.7411 10.1.1.48.5504 10.1.1.55.5163 
10.1.1.18.1603 10.1.1.52.8129 10.1.1.1.9723 10.1.1.21.9113 10.1.1.49.7644 
10.1.1.52.6646 10.1.1.75.3106 10.1.1.80.2072 10.1.1.55.8770 10.1.1.54.8188 
10.1.1.101.7919 10.1.1.104.8176 10.1.1.24.5741 10.1.1.29.4667 10.1.1.4.1055 
10.1.1.48.9175 10.1.
 1.56.792 10.1.1.65.3172 10.1.1.66.5947 10.1.1.73.8532 10.1.1.83.8299 
10.1.1.86.8521 10.1.1.87.2402 10.1.1.87.4648 10.1.1.90.5638 10.1.1.91.1709 
10.1.1.94.4248 10.1.1.114.511 10.1.1.119.5037 10.1.1.124.7957 10.1.1.49.215 
10.1.1.53.7777 10.1.1.53.9711 10.1.1.45.9409 10.1.1.40.8789 10.1.1.43.4845 
10.1.1.34.8273 10.1.1.35.4783 10.1.1.28.3176 10.1.1.16.8151 10.1.1.8.9117 
10.1.1.58.3449 10.1.1.142.7041 Metadata may be used without restrictions as 
long as the oai identifier remains attached to it." }, "sim": 1.0 }
+{ "dblp": { "id": 51, "dblpid": "books/aw/kimL89/NierstraszT89", "title": 
"Integrated Office Systems.", "authors": "Oscar Nierstrasz Dennis Tsichritzis", 
"misc": "2002-01-03 199-215 1989 Object-Oriented Concepts, Databases, and 
Applications db/books/collections/kim89.html#NierstraszT89" }, "csx": { "id": 
92, "csxid": "oai CiteSeerXPSU 10.1.1.13.2374", "title": "Integrated Office 
Systems", "authors": "O. M. Nierstrasz D. C. Tsichritzis", "misc": "2009-04-17 
Introduction  New techniques are sorely needed to aid in the development and 
maintenance of large application systems. The problem with traditional 
approaches to software engineering is well in evidence in the field of o#ce 
information systems  it is costly and di#cult to extend existing applications, 
and to get unrelated applications to \"talk\" to each other. The objectoriented 
approach is already being tentatively applied in the modeling of \"o#ce 
objects\" and in the presentation of these entities to users as such in 
\"desktop
 \" interfaces to o#ce software. In order to fully exploit the approach to 
achieve integrated o#ce systems, we need to use object-oriented programming 
languages, object-oriented run-time support, and object-oriented software 
engineering environments.  We can view the fundamental idea behind the 
object-oriented approach as that of encapsulation  object-oriented languages 
and systems exploit encapsulation in various ways in an attempt to enhance 
productivity through, f CiteSeerX  2009-04-17 2007-11-21 1988 application/pdf 
text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.2374 http 
//www.iam.unibe.ch/~scg/Archive/OSG/Nier89bIntegOfficeSystems.pdf en 
10.1.1.26.9545 10.1.1.65.5865 10.1.1.34.624 10.1.1.12.8544 10.1.1.144.6983 
10.1.1.26.6746 10.1.1.49.3064 10.1.1.30.4607 10.1.1.38.4894 10.1.1.20.8197 
10.1.1.26.4381 10.1.1.29.1890 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 1.0 }
+{ "dblp": { "id": 51, "dblpid": "books/aw/kimL89/NierstraszT89", "title": 
"Integrated Office Systems.", "authors": "Oscar Nierstrasz Dennis Tsichritzis", 
"misc": "2002-01-03 199-215 1989 Object-Oriented Concepts, Databases, and 
Applications db/books/collections/kim89.html#NierstraszT89" }, "csx": { "id": 
93, "csxid": "oai CiteSeerXPSU 10.1.1.42.9253", "title": "Integrated Office 
Systems", "authors": "O. M. Nierstrasz D. C. Tsichritzis", "misc": "2009-04-11 
Introduction  New techniques are sorely needed to aid in the development and 
maintenance of large application systems. The problem with traditional 
approaches to software engineering is well in evidence in the field of office 
information systems  it is costly and difficult to extend existing 
applications, and to get unrelated applications to \"talk\" to each other. The 
objectoriented approach is already being tentatively applied in the modeling of 
\"office objects\" and in the presentation of these entities to users as such 
in \"d
 esktop\" interfaces to office software. In order to fully exploit the approach 
to achieve integrated office systems, we need to use object-oriented 
programming languages, object-oriented run-time support, and object-oriented 
software engineering environments. We can view the fundamental idea behind the 
object-oriented approach as that of encapsulation  object-oriented languages 
and systems exploit encapsulation in various ways in an attempt t CiteSeerX ACM 
Press and Addison-Wesley 2009-04-11 2007-11-22 1988 application/postscript text 
http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.9253 ftp 
//ftp.iam.unibe.ch/pub/scg/Papers/integratedOfficeSystems.ps.gz en 
10.1.1.26.9545 10.1.1.65.5865 10.1.1.34.624 10.1.1.12.8544 10.1.1.144.6983 
10.1.1.26.6746 10.1.1.49.3064 10.1.1.30.4607 10.1.1.38.4894 10.1.1.20.8197 
10.1.1.26.4381 10.1.1.29.1890 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 1.0 }
+{ "dblp": { "id": 54, "dblpid": "books/aw/kimL89/SteinLU89", "title": "A 
Shared View of Sharing  The Treaty of Orlando.", "authors": "Lynn Andrea Stein 
Henry Lieberman David Ungar", "misc": "2002-01-03 31-48 1989 Object-Oriented 
Concepts, Databases, and Applications 
db/books/collections/kim89.html#SteinLU89" }, "csx": { "id": 91, "csxid": "oai 
CiteSeerXPSU 10.1.1.55.482", "title": "A Shared View of Sharing  The Treaty of 
Orlando", "authors": "Lynn Andrea Stein Henry Lieberman David Ungar", "misc": 
"2009-04-12 Introduction For the past few years, researchers have been debating 
the relative merits of object-oriented languages with classes and inheritance 
as opposed to those with prototypes and delegation. It has become clear that 
the object-oriented programming language design space is not a dichotomy. 
Instead, we have identified two fundamental mechanisms---templates and  
empathy---and several different independent degrees of freedom for each. 
Templates create new objects in their ow
 n image, providing guarantees about the similarity of group members. Empathy 
allows an object to act as if it were some other object, thus providing sharing 
of state and behavior. The Smalltalk-80  TM  language,  1  Actors, Lieberman's 
Delegation  system, Self, and Hybrid each take differing stands on the forms of 
templates  1  Smalltalk-80  TM  is a trademark of Par CiteSeerX ACM Press 
2009-04-12 2007-11-22 1989 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.55.482 http 
//lcs.www.media.mit.edu/people/lieber/Lieberary/OOP/Treaty/Treaty.ps en 
10.1.1.26.9545 10.1.1.118.6579 10.1.1.48.69 10.1.1.57.5195 10.1.1.9.570 
10.1.1.47.511 10.1.1.127.5320 10.1.1.100.4334 10.1.1.5.3348 10.1.1.39.3374 
10.1.1.56.4713 10.1.1.61.2065 10.1.1.27.3015 10.1.1.1.5960 10.1.1.67.5433 
10.1.1.31.8109 10.1.1.68.4062 10.1.1.49.3986 10.1.1.122.9331 10.1.1.46.8283 
10.1.1.54.5230 10.1.1.16.2055 10.1.1.137.5180 10.1.1.43.5722 10.1.1.68.2105 
10.1.1.35.1247 10.1.1.30.1415 10.1.1.7.
 5014 10.1.1.102.3946 10.1.1.105.6469 10.1.1.26.223 10.1.1.26.8645 
10.1.1.35.4104 10.1.1.39.6986 10.1.1.41.7822 10.1.1.42.9056 10.1.1.53.9325 
10.1.1.71.1802 10.1.1.76.6993 10.1.1.89.9613 10.1.1.121.5599 10.1.1.122.3737 
10.1.1.127.1894 10.1.1.55.5674 10.1.1.37.8260 10.1.1.2.2077 10.1.1.24.5782 
10.1.1.19.780 10.1.1.2.4148 10.1.1.2.4173 10.1.1.131.902 10.1.1.30.2927 
Metadata may be used without restrictions as long as the oai identifier remains 
attached to it." }, "sim": 1.0 }

http://git-wip-us.apache.org/repos/asf/asterixdb/blob/d76a0c0f/asterixdb/asterix-app/src/test/resources/runtimets/results/fuzzyjoin/dblp-csx-3_5.3/dblp-csx-3_5.3.1.adm
----------------------------------------------------------------------
diff --git 
a/asterixdb/asterix-app/src/test/resources/runtimets/results/fuzzyjoin/dblp-csx-3_5.3/dblp-csx-3_5.3.1.adm
 
b/asterixdb/asterix-app/src/test/resources/runtimets/results/fuzzyjoin/dblp-csx-3_5.3/dblp-csx-3_5.3.1.adm
index 256ab3a..a0502f8 100644
--- 
a/asterixdb/asterix-app/src/test/resources/runtimets/results/fuzzyjoin/dblp-csx-3_5.3/dblp-csx-3_5.3.1.adm
+++ 
b/asterixdb/asterix-app/src/test/resources/runtimets/results/fuzzyjoin/dblp-csx-3_5.3/dblp-csx-3_5.3.1.adm
@@ -1,7 +1,7 @@
-{ "dblp": { "id": 1, "dblpid": "books/acm/kim95/AnnevelinkACFHK95", "title": 
"Object SQL - A Language for the Design and Implementation of Object 
Databases.", "authors": "Jurgen Annevelink Rafiul Ahad Amelia Carlson Daniel H. 
Fishman Michael L. Heytens William Kent", "misc": "2002-01-03 42-68 1995 Modern 
Database Systems db/books/collections/kim95.html#AnnevelinkACFHK95" }, "csx": { 
"id": 1, "csxid": "oai CiteSeerXPSU 10.1.1.39.1830", "title": "Object SQL - A 
Language for the Design and Implementation of Object Databases", "authors": 
"Jurgen Annevelink Rafiul Ahad Amelia Carlson Dan Fishman Mike Heytens William 
Kent", "misc": "2009-04-13 ly, a function application expression consists of 
two expressions  a function reference (labelled func_ref in Figure 3 line 2), 
and an argument (labelled arg). The func_ref expression evaluates to a (generic 
or specific) function identifier, which may be the same as the function that 
the expression is a part of, thus allowing recursive function invo
 cations. The expression labelled arg evaluates to an arbitrary object or 
aggregate object. The semantics of evaluating function applications was 
discussed in detail in section 2. For example, to set the name of a person, we 
evaluate the following expression   FunAssign(function name.person) (p1,'John') 
 In this example, the first expression is itself a function call, applying the 
function FunAssign to the function name.person (an example of a specific 
function reference). This returns the oid of the function that sets a person's 
name, which is subsequently applied to a tuple of two elements, the oid of the 
person and the new name (a string o... CiteSeerX ACM Press 2009-04-13 
2007-11-22 1994 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.1830 http 
//www.tu-chemnitz.de/~igrdb/docs/OpenODB/osql.ps.gz en 10.1.1.31.2534 
10.1.1.28.4658 10.1.1.44.5947 10.1.1.39.199 Metadata may be used without 
restrictions as long as the oai identifier remains attach
 ed to it." }, "sim": 1.0f }
-{ "dblp": { "id": 5, "dblpid": "books/acm/kim95/DayalHW95", "title": "Active 
Database Systems.", "authors": "Umeshwar Dayal Eric N. Hanson Jennifer Widom", 
"misc": "2002-01-03 434-456 1995 Modern Database Systems 
db/books/collections/kim95.html#DayalHW95" }, "csx": { "id": 98, "csxid": "oai 
CiteSeerXPSU 10.1.1.49.2910", "title": "Active Database Systems", "authors": 
"Umeshwar Dayal Eric N. Hanson Jennifer Widom", "misc": "2009-04-12 In Won Kim 
editor Modern Database Systems The Object Model Integrating a production rules 
facility into a database system provides a uniform mechanism for a number of 
advanced database features including integrity constraint enforcement, derived 
data maintenance, triggers, alerters, protection, version control, and others. 
In addition, a database system with rule processing capabilities provides a 
useful platform for large and efficient knowledge-base and expert systems. 
Database systems with production rules are referred to as active database 
systems, a
 nd the field of active database systems has indeed been active. This chapter 
summarizes current work in active database systems  topics covered include 
active database rule models and languages, rule execution semantics, and 
implementation issues.  1 Introduction  Conventional database systems are 
passive  they only execute queries or transactions explicitly submitted by a 
user or an application program. For many applications, however, it is important 
to monitor situations of interest, and to ... CiteSeerX ACM Press 2009-04-12 
2007-11-22 1994 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.2910 http 
//www-db.stanford.edu/pub/papers/book-chapter.ps en 10.1.1.17.1323 
10.1.1.143.7196 10.1.1.50.3821 10.1.1.51.9946 10.1.1.41.2030 10.1.1.46.2504 
10.1.1.52.4421 10.1.1.38.2083 10.1.1.34.661 10.1.1.103.7630 10.1.1.100.9015 
10.1.1.97.1699 10.1.1.107.4220 10.1.1.47.9217 10.1.1.133.7157 10.1.1.101.5051 
10.1.1.30.9989 10.1.1.53.6941 10.1.1.50.8529 10.1.1.13
 3.4287 10.1.1.50.7278 10.1.1.10.1688 10.1.1.19.8669 10.1.1.44.7600 
10.1.1.144.376 10.1.1.44.1348 10.1.1.47.9998 10.1.1.90.4428 10.1.1.108.344 
10.1.1.48.9470 10.1.1.53.5472 10.1.1.52.4872 10.1.1.144.4965 10.1.1.31.7578 
10.1.1.32.6426 10.1.1.58.6335 10.1.1.85.8052 10.1.1.93.1931 10.1.1.55.4610 
10.1.1.21.3821 10.1.1.26.9208 10.1.1.31.4869 10.1.1.48.1833 10.1.1.83.8628 
10.1.1.87.9318 10.1.1.90.2195 10.1.1.36.5184 10.1.1.21.1704 10.1.1.53.1733 
10.1.1.90.3181 10.1.1.53.6783 10.1.1.52.6151 10.1.1.104.6911 10.1.1.105.1691 
10.1.1.21.1984 10.1.1.23.2775 10.1.1.62.5556 10.1.1.68.9063 10.1.1.74.4746 
10.1.1.78.5097 10.1.1.84.743 10.1.1.84.904 10.1.1.87.6019 10.1.1.88.3907 
10.1.1.89.9631 10.1.1.90.4147 10.1.1.92.365 10.1.1.100.2747 10.1.1.98.5083 
10.1.1.98.6663 10.1.1.99.1894 10.1.1.99.8174 10.1.1.133.8073 10.1.1.52.7823 
10.1.1.39.5341 10.1.1.35.3458 10.1.1.26.4620 10.1.1.18.8936 10.1.1.19.3694 
10.1.1.12.631 10.1.1.48.6394 Metadata may be used without restrictions as long 
as the oai identifier re
 mains attached to it." }, "sim": 1.0f }
-{ "dblp": { "id": 21, "dblpid": "books/acm/kim95/MengY95", "title": "Query 
Processing in Multidatabase Systems.", "authors": "Weiyi Meng Clement T. Yu", 
"misc": "2002-01-03 551-572 1995 Modern Database Systems 
db/books/collections/kim95.html#MengY95" }, "csx": { "id": 89, "csxid": "oai 
CiteSeerXPSU 10.1.1.33.8596", "title": "Dynamic Query Optimization and Query 
Processing in Multidatabase Systems 1.", "authors": "Henryk Josinski", "misc": 
"2009-04-15 Introduction  The multidatabase system (MDBS) approach, as a 
solution for integrated access to information distributed among diverse data 
sources, has gained a lot of attention in recent years. The multidatabase 
system is a database system which integrates pre--existing databases allowing 
the users to access simultaneously database systems (DBMSs) formulating a 
global query based on a global schema.  The component DBMSs are assumed to be 
heterogeneous and autonomous. Heterogeneity refers to different user 
interfaces, data models, query 
 languages, and query optimization strategies [5]. Local autonomy means that 
each DBMS retains complete control over local data and processing. As result of 
this, its cost model may not be available to the global query optimizer.  When 
a global query is submitted, it is decomposed into two types of queries [1]   
-- subqueries, operating on sharable data items from local databases,  -- 
assembling queries, consisting of, CiteSeerX  2009-04-15 2007-11-22 2000 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.8596 http 
//www.edbt2000.uni-konstanz.de/phd-workshop/papers/Josinski.pdf en 
10.1.1.27.4704 10.1.1.51.8352 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 0.5f }
-{ "dblp": { "id": 25, "dblpid": "books/acm/kim95/RusinkiewiczS95", "title": 
"Specification and Execution of Transactional Workflows.", "authors": "Marek 
Rusinkiewicz Amit P. Sheth", "misc": "2004-03-08 592-620 Modern Database 
Systems books/acm/Kim95 db/books/collections/kim95.html#RusinkiewiczS95 1995" 
}, "csx": { "id": 88, "csxid": "oai CiteSeerXPSU 10.1.1.43.3839", "title": 
"Specification and Execution of Transactional Workflows", "authors": "Marek 
Rusinkiewicz Amit Sheth", "misc": "2009-04-13 The basic transaction model has 
evolved over time to incorporate more complex transaction structures  and to 
selectively modify the atomicity and isolation properties. In this chapter we 
discuss the application  of transaction concepts to activities that involve 
coordinated execution of multiple tasks (possibly of  different types) over 
different processing entities. Such applications are referred to as 
transactional  workflows. In this chapter we discuss the specification of such 
workflows 
 and the issues involved in their  execution.  1 What is a Workflow?  Workflows 
are activities involving the coordinated execution of multiple tasks performed 
by different processing entities. A task defines some work to be done and can 
be specified in a number of ways, including a textual description in a file or 
an email, a form, a message, or a computer program. A processing entity that 
performs the tasks may be a person or a software system (e.g., a mailer, an 
application program, a database mana... CiteSeerX ACM Press 2009-04-13 
2007-11-22 1995 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.3839 http 
//lsdis.cs.uga.edu/lib/././download/RS93.ps en 10.1.1.17.1323 10.1.1.59.5051 
10.1.1.38.6210 10.1.1.68.7445 10.1.1.109.5175 10.1.1.17.7962 10.1.1.44.7778 
10.1.1.112.244 10.1.1.13.7602 10.1.1.102.7874 10.1.1.41.4043 10.1.1.49.5143 
10.1.1.41.7252 10.1.1.17.3225 10.1.1.54.7761 10.1.1.55.5255 10.1.1.108.958 
10.1.1.35.7733 10.1.1.52.3682 10.1.1.36.1
 618 10.1.1.45.6317 10.1.1.43.3180 10.1.1.35.8718 10.1.1.44.6365 10.1.1.51.2883 
10.1.1.50.9206 10.1.1.6.9085 10.1.1.30.1707 10.1.1.80.6634 10.1.1.49.355 
10.1.1.127.3550 10.1.1.35.3562 10.1.1.137.8832 10.1.1.49.4085 10.1.1.41.5506 
10.1.1.40.4657 10.1.1.43.2369 10.1.1.40.832 10.1.1.74.5411 10.1.1.90.4428 
10.1.1.110.6967 10.1.1.27.2122 10.1.1.15.5605 10.1.1.54.727 10.1.1.49.7512 
10.1.1.45.8796 10.1.1.50.5984 10.1.1.53.137 10.1.1.30.3262 10.1.1.28.1680 
10.1.1.21.7110 10.1.1.29.3148 10.1.1.57.687 10.1.1.59.5924 10.1.1.46.2812 
10.1.1.51.5552 10.1.1.17.7375 10.1.1.40.1598 10.1.1.52.9787 10.1.1.1.3496 
10.1.1.50.6791 10.1.1.55.3358 10.1.1.137.7582 10.1.1.118.4127 10.1.1.49.3580 
10.1.1.35.5825 10.1.1.46.9382 10.1.1.31.7411 10.1.1.48.5504 10.1.1.55.5163 
10.1.1.18.1603 10.1.1.52.8129 10.1.1.1.9723 10.1.1.21.9113 10.1.1.49.7644 
10.1.1.52.6646 10.1.1.75.3106 10.1.1.80.2072 10.1.1.55.8770 10.1.1.54.8188 
10.1.1.101.7919 10.1.1.104.8176 10.1.1.24.5741 10.1.1.29.4667 10.1.1.4.1055 
10.1.1.48.9175 10.1.
 1.56.792 10.1.1.65.3172 10.1.1.66.5947 10.1.1.73.8532 10.1.1.83.8299 
10.1.1.86.8521 10.1.1.87.2402 10.1.1.87.4648 10.1.1.90.5638 10.1.1.91.1709 
10.1.1.94.4248 10.1.1.114.511 10.1.1.119.5037 10.1.1.124.7957 10.1.1.49.215 
10.1.1.53.7777 10.1.1.53.9711 10.1.1.45.9409 10.1.1.40.8789 10.1.1.43.4845 
10.1.1.34.8273 10.1.1.35.4783 10.1.1.28.3176 10.1.1.16.8151 10.1.1.8.9117 
10.1.1.58.3449 10.1.1.142.7041 Metadata may be used without restrictions as 
long as the oai identifier remains attached to it." }, "sim": 1.0f }
-{ "dblp": { "id": 51, "dblpid": "books/aw/kimL89/NierstraszT89", "title": 
"Integrated Office Systems.", "authors": "Oscar Nierstrasz Dennis Tsichritzis", 
"misc": "2002-01-03 199-215 1989 Object-Oriented Concepts, Databases, and 
Applications db/books/collections/kim89.html#NierstraszT89" }, "csx": { "id": 
92, "csxid": "oai CiteSeerXPSU 10.1.1.13.2374", "title": "Integrated Office 
Systems", "authors": "O. M. Nierstrasz D. C. Tsichritzis", "misc": "2009-04-17 
Introduction  New techniques are sorely needed to aid in the development and 
maintenance of large application systems. The problem with traditional 
approaches to software engineering is well in evidence in the field of o#ce 
information systems  it is costly and di#cult to extend existing applications, 
and to get unrelated applications to \"talk\" to each other. The objectoriented 
approach is already being tentatively applied in the modeling of \"o#ce 
objects\" and in the presentation of these entities to users as such in 
\"desktop
 \" interfaces to o#ce software. In order to fully exploit the approach to 
achieve integrated o#ce systems, we need to use object-oriented programming 
languages, object-oriented run-time support, and object-oriented software 
engineering environments.  We can view the fundamental idea behind the 
object-oriented approach as that of encapsulation  object-oriented languages 
and systems exploit encapsulation in various ways in an attempt to enhance 
productivity through, f CiteSeerX  2009-04-17 2007-11-21 1988 application/pdf 
text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.2374 http 
//www.iam.unibe.ch/~scg/Archive/OSG/Nier89bIntegOfficeSystems.pdf en 
10.1.1.26.9545 10.1.1.65.5865 10.1.1.34.624 10.1.1.12.8544 10.1.1.144.6983 
10.1.1.26.6746 10.1.1.49.3064 10.1.1.30.4607 10.1.1.38.4894 10.1.1.20.8197 
10.1.1.26.4381 10.1.1.29.1890 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 1.0f }
-{ "dblp": { "id": 51, "dblpid": "books/aw/kimL89/NierstraszT89", "title": 
"Integrated Office Systems.", "authors": "Oscar Nierstrasz Dennis Tsichritzis", 
"misc": "2002-01-03 199-215 1989 Object-Oriented Concepts, Databases, and 
Applications db/books/collections/kim89.html#NierstraszT89" }, "csx": { "id": 
93, "csxid": "oai CiteSeerXPSU 10.1.1.42.9253", "title": "Integrated Office 
Systems", "authors": "O. M. Nierstrasz D. C. Tsichritzis", "misc": "2009-04-11 
Introduction  New techniques are sorely needed to aid in the development and 
maintenance of large application systems. The problem with traditional 
approaches to software engineering is well in evidence in the field of office 
information systems  it is costly and difficult to extend existing 
applications, and to get unrelated applications to \"talk\" to each other. The 
objectoriented approach is already being tentatively applied in the modeling of 
\"office objects\" and in the presentation of these entities to users as such 
in \"d
 esktop\" interfaces to office software. In order to fully exploit the approach 
to achieve integrated office systems, we need to use object-oriented 
programming languages, object-oriented run-time support, and object-oriented 
software engineering environments. We can view the fundamental idea behind the 
object-oriented approach as that of encapsulation  object-oriented languages 
and systems exploit encapsulation in various ways in an attempt t CiteSeerX ACM 
Press and Addison-Wesley 2009-04-11 2007-11-22 1988 application/postscript text 
http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.9253 ftp 
//ftp.iam.unibe.ch/pub/scg/Papers/integratedOfficeSystems.ps.gz en 
10.1.1.26.9545 10.1.1.65.5865 10.1.1.34.624 10.1.1.12.8544 10.1.1.144.6983 
10.1.1.26.6746 10.1.1.49.3064 10.1.1.30.4607 10.1.1.38.4894 10.1.1.20.8197 
10.1.1.26.4381 10.1.1.29.1890 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 1.0f }
-{ "dblp": { "id": 54, "dblpid": "books/aw/kimL89/SteinLU89", "title": "A 
Shared View of Sharing  The Treaty of Orlando.", "authors": "Lynn Andrea Stein 
Henry Lieberman David Ungar", "misc": "2002-01-03 31-48 1989 Object-Oriented 
Concepts, Databases, and Applications 
db/books/collections/kim89.html#SteinLU89" }, "csx": { "id": 91, "csxid": "oai 
CiteSeerXPSU 10.1.1.55.482", "title": "A Shared View of Sharing  The Treaty of 
Orlando", "authors": "Lynn Andrea Stein Henry Lieberman David Ungar", "misc": 
"2009-04-12 Introduction For the past few years, researchers have been debating 
the relative merits of object-oriented languages with classes and inheritance 
as opposed to those with prototypes and delegation. It has become clear that 
the object-oriented programming language design space is not a dichotomy. 
Instead, we have identified two fundamental mechanisms---templates and  
empathy---and several different independent degrees of freedom for each. 
Templates create new objects in their ow
 n image, providing guarantees about the similarity of group members. Empathy 
allows an object to act as if it were some other object, thus providing sharing 
of state and behavior. The Smalltalk-80  TM  language,  1  Actors, Lieberman's 
Delegation  system, Self, and Hybrid each take differing stands on the forms of 
templates  1  Smalltalk-80  TM  is a trademark of Par CiteSeerX ACM Press 
2009-04-12 2007-11-22 1989 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.55.482 http 
//lcs.www.media.mit.edu/people/lieber/Lieberary/OOP/Treaty/Treaty.ps en 
10.1.1.26.9545 10.1.1.118.6579 10.1.1.48.69 10.1.1.57.5195 10.1.1.9.570 
10.1.1.47.511 10.1.1.127.5320 10.1.1.100.4334 10.1.1.5.3348 10.1.1.39.3374 
10.1.1.56.4713 10.1.1.61.2065 10.1.1.27.3015 10.1.1.1.5960 10.1.1.67.5433 
10.1.1.31.8109 10.1.1.68.4062 10.1.1.49.3986 10.1.1.122.9331 10.1.1.46.8283 
10.1.1.54.5230 10.1.1.16.2055 10.1.1.137.5180 10.1.1.43.5722 10.1.1.68.2105 
10.1.1.35.1247 10.1.1.30.1415 10.1.1.7.
 5014 10.1.1.102.3946 10.1.1.105.6469 10.1.1.26.223 10.1.1.26.8645 
10.1.1.35.4104 10.1.1.39.6986 10.1.1.41.7822 10.1.1.42.9056 10.1.1.53.9325 
10.1.1.71.1802 10.1.1.76.6993 10.1.1.89.9613 10.1.1.121.5599 10.1.1.122.3737 
10.1.1.127.1894 10.1.1.55.5674 10.1.1.37.8260 10.1.1.2.2077 10.1.1.24.5782 
10.1.1.19.780 10.1.1.2.4148 10.1.1.2.4173 10.1.1.131.902 10.1.1.30.2927 
Metadata may be used without restrictions as long as the oai identifier remains 
attached to it." }, "sim": 1.0f }
+{ "dblp": { "id": 1, "dblpid": "books/acm/kim95/AnnevelinkACFHK95", "title": 
"Object SQL - A Language for the Design and Implementation of Object 
Databases.", "authors": "Jurgen Annevelink Rafiul Ahad Amelia Carlson Daniel H. 
Fishman Michael L. Heytens William Kent", "misc": "2002-01-03 42-68 1995 Modern 
Database Systems db/books/collections/kim95.html#AnnevelinkACFHK95" }, "csx": { 
"id": 1, "csxid": "oai CiteSeerXPSU 10.1.1.39.1830", "title": "Object SQL - A 
Language for the Design and Implementation of Object Databases", "authors": 
"Jurgen Annevelink Rafiul Ahad Amelia Carlson Dan Fishman Mike Heytens William 
Kent", "misc": "2009-04-13 ly, a function application expression consists of 
two expressions  a function reference (labelled func_ref in Figure 3 line 2), 
and an argument (labelled arg). The func_ref expression evaluates to a (generic 
or specific) function identifier, which may be the same as the function that 
the expression is a part of, thus allowing recursive function invo
 cations. The expression labelled arg evaluates to an arbitrary object or 
aggregate object. The semantics of evaluating function applications was 
discussed in detail in section 2. For example, to set the name of a person, we 
evaluate the following expression   FunAssign(function name.person) (p1,'John') 
 In this example, the first expression is itself a function call, applying the 
function FunAssign to the function name.person (an example of a specific 
function reference). This returns the oid of the function that sets a person's 
name, which is subsequently applied to a tuple of two elements, the oid of the 
person and the new name (a string o... CiteSeerX ACM Press 2009-04-13 
2007-11-22 1994 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.1830 http 
//www.tu-chemnitz.de/~igrdb/docs/OpenODB/osql.ps.gz en 10.1.1.31.2534 
10.1.1.28.4658 10.1.1.44.5947 10.1.1.39.199 Metadata may be used without 
restrictions as long as the oai identifier remains attach
 ed to it." }, "sim": 1.0 }
+{ "dblp": { "id": 5, "dblpid": "books/acm/kim95/DayalHW95", "title": "Active 
Database Systems.", "authors": "Umeshwar Dayal Eric N. Hanson Jennifer Widom", 
"misc": "2002-01-03 434-456 1995 Modern Database Systems 
db/books/collections/kim95.html#DayalHW95" }, "csx": { "id": 98, "csxid": "oai 
CiteSeerXPSU 10.1.1.49.2910", "title": "Active Database Systems", "authors": 
"Umeshwar Dayal Eric N. Hanson Jennifer Widom", "misc": "2009-04-12 In Won Kim 
editor Modern Database Systems The Object Model Integrating a production rules 
facility into a database system provides a uniform mechanism for a number of 
advanced database features including integrity constraint enforcement, derived 
data maintenance, triggers, alerters, protection, version control, and others. 
In addition, a database system with rule processing capabilities provides a 
useful platform for large and efficient knowledge-base and expert systems. 
Database systems with production rules are referred to as active database 
systems, a
 nd the field of active database systems has indeed been active. This chapter 
summarizes current work in active database systems  topics covered include 
active database rule models and languages, rule execution semantics, and 
implementation issues.  1 Introduction  Conventional database systems are 
passive  they only execute queries or transactions explicitly submitted by a 
user or an application program. For many applications, however, it is important 
to monitor situations of interest, and to ... CiteSeerX ACM Press 2009-04-12 
2007-11-22 1994 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.2910 http 
//www-db.stanford.edu/pub/papers/book-chapter.ps en 10.1.1.17.1323 
10.1.1.143.7196 10.1.1.50.3821 10.1.1.51.9946 10.1.1.41.2030 10.1.1.46.2504 
10.1.1.52.4421 10.1.1.38.2083 10.1.1.34.661 10.1.1.103.7630 10.1.1.100.9015 
10.1.1.97.1699 10.1.1.107.4220 10.1.1.47.9217 10.1.1.133.7157 10.1.1.101.5051 
10.1.1.30.9989 10.1.1.53.6941 10.1.1.50.8529 10.1.1.13
 3.4287 10.1.1.50.7278 10.1.1.10.1688 10.1.1.19.8669 10.1.1.44.7600 
10.1.1.144.376 10.1.1.44.1348 10.1.1.47.9998 10.1.1.90.4428 10.1.1.108.344 
10.1.1.48.9470 10.1.1.53.5472 10.1.1.52.4872 10.1.1.144.4965 10.1.1.31.7578 
10.1.1.32.6426 10.1.1.58.6335 10.1.1.85.8052 10.1.1.93.1931 10.1.1.55.4610 
10.1.1.21.3821 10.1.1.26.9208 10.1.1.31.4869 10.1.1.48.1833 10.1.1.83.8628 
10.1.1.87.9318 10.1.1.90.2195 10.1.1.36.5184 10.1.1.21.1704 10.1.1.53.1733 
10.1.1.90.3181 10.1.1.53.6783 10.1.1.52.6151 10.1.1.104.6911 10.1.1.105.1691 
10.1.1.21.1984 10.1.1.23.2775 10.1.1.62.5556 10.1.1.68.9063 10.1.1.74.4746 
10.1.1.78.5097 10.1.1.84.743 10.1.1.84.904 10.1.1.87.6019 10.1.1.88.3907 
10.1.1.89.9631 10.1.1.90.4147 10.1.1.92.365 10.1.1.100.2747 10.1.1.98.5083 
10.1.1.98.6663 10.1.1.99.1894 10.1.1.99.8174 10.1.1.133.8073 10.1.1.52.7823 
10.1.1.39.5341 10.1.1.35.3458 10.1.1.26.4620 10.1.1.18.8936 10.1.1.19.3694 
10.1.1.12.631 10.1.1.48.6394 Metadata may be used without restrictions as long 
as the oai identifier re
 mains attached to it." }, "sim": 1.0 }
+{ "dblp": { "id": 21, "dblpid": "books/acm/kim95/MengY95", "title": "Query 
Processing in Multidatabase Systems.", "authors": "Weiyi Meng Clement T. Yu", 
"misc": "2002-01-03 551-572 1995 Modern Database Systems 
db/books/collections/kim95.html#MengY95" }, "csx": { "id": 89, "csxid": "oai 
CiteSeerXPSU 10.1.1.33.8596", "title": "Dynamic Query Optimization and Query 
Processing in Multidatabase Systems 1.", "authors": "Henryk Josinski", "misc": 
"2009-04-15 Introduction  The multidatabase system (MDBS) approach, as a 
solution for integrated access to information distributed among diverse data 
sources, has gained a lot of attention in recent years. The multidatabase 
system is a database system which integrates pre--existing databases allowing 
the users to access simultaneously database systems (DBMSs) formulating a 
global query based on a global schema.  The component DBMSs are assumed to be 
heterogeneous and autonomous. Heterogeneity refers to different user 
interfaces, data models, query 
 languages, and query optimization strategies [5]. Local autonomy means that 
each DBMS retains complete control over local data and processing. As result of 
this, its cost model may not be available to the global query optimizer.  When 
a global query is submitted, it is decomposed into two types of queries [1]   
-- subqueries, operating on sharable data items from local databases,  -- 
assembling queries, consisting of, CiteSeerX  2009-04-15 2007-11-22 2000 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.8596 http 
//www.edbt2000.uni-konstanz.de/phd-workshop/papers/Josinski.pdf en 
10.1.1.27.4704 10.1.1.51.8352 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 0.5 }
+{ "dblp": { "id": 25, "dblpid": "books/acm/kim95/RusinkiewiczS95", "title": 
"Specification and Execution of Transactional Workflows.", "authors": "Marek 
Rusinkiewicz Amit P. Sheth", "misc": "2004-03-08 592-620 Modern Database 
Systems books/acm/Kim95 db/books/collections/kim95.html#RusinkiewiczS95 1995" 
}, "csx": { "id": 88, "csxid": "oai CiteSeerXPSU 10.1.1.43.3839", "title": 
"Specification and Execution of Transactional Workflows", "authors": "Marek 
Rusinkiewicz Amit Sheth", "misc": "2009-04-13 The basic transaction model has 
evolved over time to incorporate more complex transaction structures  and to 
selectively modify the atomicity and isolation properties. In this chapter we 
discuss the application  of transaction concepts to activities that involve 
coordinated execution of multiple tasks (possibly of  different types) over 
different processing entities. Such applications are referred to as 
transactional  workflows. In this chapter we discuss the specification of such 
workflows 
 and the issues involved in their  execution.  1 What is a Workflow?  Workflows 
are activities involving the coordinated execution of multiple tasks performed 
by different processing entities. A task defines some work to be done and can 
be specified in a number of ways, including a textual description in a file or 
an email, a form, a message, or a computer program. A processing entity that 
performs the tasks may be a person or a software system (e.g., a mailer, an 
application program, a database mana... CiteSeerX ACM Press 2009-04-13 
2007-11-22 1995 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.3839 http 
//lsdis.cs.uga.edu/lib/././download/RS93.ps en 10.1.1.17.1323 10.1.1.59.5051 
10.1.1.38.6210 10.1.1.68.7445 10.1.1.109.5175 10.1.1.17.7962 10.1.1.44.7778 
10.1.1.112.244 10.1.1.13.7602 10.1.1.102.7874 10.1.1.41.4043 10.1.1.49.5143 
10.1.1.41.7252 10.1.1.17.3225 10.1.1.54.7761 10.1.1.55.5255 10.1.1.108.958 
10.1.1.35.7733 10.1.1.52.3682 10.1.1.36.1
 618 10.1.1.45.6317 10.1.1.43.3180 10.1.1.35.8718 10.1.1.44.6365 10.1.1.51.2883 
10.1.1.50.9206 10.1.1.6.9085 10.1.1.30.1707 10.1.1.80.6634 10.1.1.49.355 
10.1.1.127.3550 10.1.1.35.3562 10.1.1.137.8832 10.1.1.49.4085 10.1.1.41.5506 
10.1.1.40.4657 10.1.1.43.2369 10.1.1.40.832 10.1.1.74.5411 10.1.1.90.4428 
10.1.1.110.6967 10.1.1.27.2122 10.1.1.15.5605 10.1.1.54.727 10.1.1.49.7512 
10.1.1.45.8796 10.1.1.50.5984 10.1.1.53.137 10.1.1.30.3262 10.1.1.28.1680 
10.1.1.21.7110 10.1.1.29.3148 10.1.1.57.687 10.1.1.59.5924 10.1.1.46.2812 
10.1.1.51.5552 10.1.1.17.7375 10.1.1.40.1598 10.1.1.52.9787 10.1.1.1.3496 
10.1.1.50.6791 10.1.1.55.3358 10.1.1.137.7582 10.1.1.118.4127 10.1.1.49.3580 
10.1.1.35.5825 10.1.1.46.9382 10.1.1.31.7411 10.1.1.48.5504 10.1.1.55.5163 
10.1.1.18.1603 10.1.1.52.8129 10.1.1.1.9723 10.1.1.21.9113 10.1.1.49.7644 
10.1.1.52.6646 10.1.1.75.3106 10.1.1.80.2072 10.1.1.55.8770 10.1.1.54.8188 
10.1.1.101.7919 10.1.1.104.8176 10.1.1.24.5741 10.1.1.29.4667 10.1.1.4.1055 
10.1.1.48.9175 10.1.
 1.56.792 10.1.1.65.3172 10.1.1.66.5947 10.1.1.73.8532 10.1.1.83.8299 
10.1.1.86.8521 10.1.1.87.2402 10.1.1.87.4648 10.1.1.90.5638 10.1.1.91.1709 
10.1.1.94.4248 10.1.1.114.511 10.1.1.119.5037 10.1.1.124.7957 10.1.1.49.215 
10.1.1.53.7777 10.1.1.53.9711 10.1.1.45.9409 10.1.1.40.8789 10.1.1.43.4845 
10.1.1.34.8273 10.1.1.35.4783 10.1.1.28.3176 10.1.1.16.8151 10.1.1.8.9117 
10.1.1.58.3449 10.1.1.142.7041 Metadata may be used without restrictions as 
long as the oai identifier remains attached to it." }, "sim": 1.0 }
+{ "dblp": { "id": 51, "dblpid": "books/aw/kimL89/NierstraszT89", "title": 
"Integrated Office Systems.", "authors": "Oscar Nierstrasz Dennis Tsichritzis", 
"misc": "2002-01-03 199-215 1989 Object-Oriented Concepts, Databases, and 
Applications db/books/collections/kim89.html#NierstraszT89" }, "csx": { "id": 
92, "csxid": "oai CiteSeerXPSU 10.1.1.13.2374", "title": "Integrated Office 
Systems", "authors": "O. M. Nierstrasz D. C. Tsichritzis", "misc": "2009-04-17 
Introduction  New techniques are sorely needed to aid in the development and 
maintenance of large application systems. The problem with traditional 
approaches to software engineering is well in evidence in the field of o#ce 
information systems  it is costly and di#cult to extend existing applications, 
and to get unrelated applications to \"talk\" to each other. The objectoriented 
approach is already being tentatively applied in the modeling of \"o#ce 
objects\" and in the presentation of these entities to users as such in 
\"desktop
 \" interfaces to o#ce software. In order to fully exploit the approach to 
achieve integrated o#ce systems, we need to use object-oriented programming 
languages, object-oriented run-time support, and object-oriented software 
engineering environments.  We can view the fundamental idea behind the 
object-oriented approach as that of encapsulation  object-oriented languages 
and systems exploit encapsulation in various ways in an attempt to enhance 
productivity through, f CiteSeerX  2009-04-17 2007-11-21 1988 application/pdf 
text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.2374 http 
//www.iam.unibe.ch/~scg/Archive/OSG/Nier89bIntegOfficeSystems.pdf en 
10.1.1.26.9545 10.1.1.65.5865 10.1.1.34.624 10.1.1.12.8544 10.1.1.144.6983 
10.1.1.26.6746 10.1.1.49.3064 10.1.1.30.4607 10.1.1.38.4894 10.1.1.20.8197 
10.1.1.26.4381 10.1.1.29.1890 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 1.0 }
+{ "dblp": { "id": 51, "dblpid": "books/aw/kimL89/NierstraszT89", "title": 
"Integrated Office Systems.", "authors": "Oscar Nierstrasz Dennis Tsichritzis", 
"misc": "2002-01-03 199-215 1989 Object-Oriented Concepts, Databases, and 
Applications db/books/collections/kim89.html#NierstraszT89" }, "csx": { "id": 
93, "csxid": "oai CiteSeerXPSU 10.1.1.42.9253", "title": "Integrated Office 
Systems", "authors": "O. M. Nierstrasz D. C. Tsichritzis", "misc": "2009-04-11 
Introduction  New techniques are sorely needed to aid in the development and 
maintenance of large application systems. The problem with traditional 
approaches to software engineering is well in evidence in the field of office 
information systems  it is costly and difficult to extend existing 
applications, and to get unrelated applications to \"talk\" to each other. The 
objectoriented approach is already being tentatively applied in the modeling of 
\"office objects\" and in the presentation of these entities to users as such 
in \"d
 esktop\" interfaces to office software. In order to fully exploit the approach 
to achieve integrated office systems, we need to use object-oriented 
programming languages, object-oriented run-time support, and object-oriented 
software engineering environments. We can view the fundamental idea behind the 
object-oriented approach as that of encapsulation  object-oriented languages 
and systems exploit encapsulation in various ways in an attempt t CiteSeerX ACM 
Press and Addison-Wesley 2009-04-11 2007-11-22 1988 application/postscript text 
http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.9253 ftp 
//ftp.iam.unibe.ch/pub/scg/Papers/integratedOfficeSystems.ps.gz en 
10.1.1.26.9545 10.1.1.65.5865 10.1.1.34.624 10.1.1.12.8544 10.1.1.144.6983 
10.1.1.26.6746 10.1.1.49.3064 10.1.1.30.4607 10.1.1.38.4894 10.1.1.20.8197 
10.1.1.26.4381 10.1.1.29.1890 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it." }, "sim": 1.0 }
+{ "dblp": { "id": 54, "dblpid": "books/aw/kimL89/SteinLU89", "title": "A 
Shared View of Sharing  The Treaty of Orlando.", "authors": "Lynn Andrea Stein 
Henry Lieberman David Ungar", "misc": "2002-01-03 31-48 1989 Object-Oriented 
Concepts, Databases, and Applications 
db/books/collections/kim89.html#SteinLU89" }, "csx": { "id": 91, "csxid": "oai 
CiteSeerXPSU 10.1.1.55.482", "title": "A Shared View of Sharing  The Treaty of 
Orlando", "authors": "Lynn Andrea Stein Henry Lieberman David Ungar", "misc": 
"2009-04-12 Introduction For the past few years, researchers have been debating 
the relative merits of object-oriented languages with classes and inheritance 
as opposed to those with prototypes and delegation. It has become clear that 
the object-oriented programming language design space is not a dichotomy. 
Instead, we have identified two fundamental mechanisms---templates and  
empathy---and several different independent degrees of freedom for each. 
Templates create new objects in their ow
 n image, providing guarantees about the similarity of group members. Empathy 
allows an object to act as if it were some other object, thus providing sharing 
of state and behavior. The Smalltalk-80  TM  language,  1  Actors, Lieberman's 
Delegation  system, Self, and Hybrid each take differing stands on the forms of 
templates  1  Smalltalk-80  TM  is a trademark of Par CiteSeerX ACM Press 
2009-04-12 2007-11-22 1989 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.55.482 http 
//lcs.www.media.mit.edu/people/lieber/Lieberary/OOP/Treaty/Treaty.ps en 
10.1.1.26.9545 10.1.1.118.6579 10.1.1.48.69 10.1.1.57.5195 10.1.1.9.570 
10.1.1.47.511 10.1.1.127.5320 10.1.1.100.4334 10.1.1.5.3348 10.1.1.39.3374 
10.1.1.56.4713 10.1.1.61.2065 10.1.1.27.3015 10.1.1.1.5960 10.1.1.67.5433 
10.1.1.31.8109 10.1.1.68.4062 10.1.1.49.3986 10.1.1.122.9331 10.1.1.46.8283 
10.1.1.54.5230 10.1.1.16.2055 10.1.1.137.5180 10.1.1.43.5722 10.1.1.68.2105 
10.1.1.35.1247 10.1.1.30.1415 10.1.1.7.
 5014 10.1.1.102.3946 10.1.1.105.6469 10.1.1.26.223 10.1.1.26.8645 
10.1.1.35.4104 10.1.1.39.6986 10.1.1.41.7822 10.1.1.42.9056 10.1.1.53.9325 
10.1.1.71.1802 10.1.1.76.6993 10.1.1.89.9613 10.1.1.121.5599 10.1.1.122.3737 
10.1.1.127.1894 10.1.1.55.5674 10.1.1.37.8260 10.1.1.2.2077 10.1.1.24.5782 
10.1.1.19.780 10.1.1.2.4148 10.1.1.2.4173 10.1.1.131.902 10.1.1.30.2927 
Metadata may be used without restrictions as long as the oai identifier remains 
attached to it." }, "sim": 1.0 }

Reply via email to