Developing a Meta Data Integration Architecture

Total Page:16

File Type:pdf, Size:1020Kb

Developing a Meta Data Integration Architecture 70859_Poole_CH06I 10/29/2001 2:24 PM Page 169 CHAPTER 6 Developing Meta Data Solutions Using CWM The preceding chapters have described CWM in considerable detail. In partic- ular, we have seen that CWM is a standard specification for defining data warehousing and business analysis meta data in terms of descriptive models. These models are independent of any particular technology and live outside of the various software products that use them as the basis for integration. We also have seen how one goes about constructing CWM models to represent common problems in data warehousing and business analysis. This chapter provides a much broader description of how CWM relates to the overall problem of building a comprehensive meta data integration solu- tion. In particular, this chapter describes the implications that CWM has for both meta data management strategies and meta data integration architec- tures. We also describe the necessary architectural components required to deploy CWM integration solutions in the data warehousing and business analysis environments. 169 70859_Poole_CH06I 10/29/2001 2:24 PM Page 170 170 Common Warehouse Metamodel The Need for a Meta Data Management Strategy In Chapter 2, “The Value Proposition for CWM,” we learned that two of the major components necessary for a successful, model-based meta data integra- tion solution, which were not specifically defined by CWM, are the following: II A meta data management strategy II A corresponding meta data integration architecture In fact, both are required for any successful meta data integration effort, not just the model-based approach taken by CWM. However, the use of CWM for a model-based, meta data integration solution has certain implications for both strategy and architecture (perhaps more so for the architecture than the strategy, which is more high-level). A meta data management strategy is the overall definition of what is to be accomplished by any meta data integration effort and the management poli- cies, requirements, and constraints necessary to ensure the successful integra- tion of the environment at the meta data level. Meta data integration architecture is the technical, system architecture that largely realizes, or imple- ments, the meta data management strategy. This subsection discusses meta data management strategies in general, and the following subsections address their architectural realizations and the implications of using CWM as the basis for such architectures. Note that this chapter does not define, nor recommend, any particular strategy or architecture, but rather highlights the salient fea- tures and describes the CWM touch points that are relevant to these features. For a more thorough treatment of meta data management and meta data inte- gration architectural techniques, see David Marco’s Building and Managing the Meta Data Repository (Marco, 2000). The Importance of a Meta Data Management Strategy For any meta data integration effort to be successful, it must be grounded in a coherent and sound management strategy. This management strategy defines the objectives and requirements for meta data integration, sharing, and reuse in the target environment. Any given meta data management strategy is specifically tailored toward a particular data warehousing or business analy- sis or ISC deployment. However, any such meta data management strategy must adhere to general principles to be successful. Often, the need for a meta data management strategy either goes unac- knowledged or is naively assumed to be a problem largely addressed by soft- 70859_Poole_CH06I 10/29/2001 2:24 PM Page 171 Developing Meta Data Solutions Using CWM 171 ware tools or technology standards. The need for sound meta data manage- ment, however, is not solved by technological capabilities. Meta data integra- tion tools and enabled software products, no matter how powerful or robust, are no substitute for a sound and coherent meta data management strategy. In fact, strategy must precede the definition of meta data integration architecture and tool selection if the overall integration effort is to be successful. Regard- less of how meta data management is ultimately carried out in the target envi- ronment (whether meta data is managed by a centralized repository or a distributed or federated network), some central, global policy must define the overall requirements and behaviors for meta data management. The industry experts have been very clear on this matter for quite some time. For example, consider several reports on this issue by Gartner Group. In Meta Data Management Alternatives for DWs and Data Marts (Gartner, 1999), it is acknowledged that tool capabilities alone are no panacea for meta data man- agement problems and that any decisions on tool selection should be based on an overall meta data management plan and architecture. The report, Data Warehousing Business Meta Data Management Issues (Gartner, 2000a), elaborates further, concluding that a sound meta data management strategy will maxi- mize meta data reuse and enhance ROI, in part by helping to overcome the cultural and political issues impeding meta data integration. The companion report, Data Warehousing Technical Meta Data Management Issues (Gartner, 2000b), states that technology alone cannot solve the meta data integration problem if an organization is unable to secure agreement on fundamental meta data management issues. Another recent Gartner report on CWM, OMG’s Common Warehouse Meta- model Specification (Gartner, July 2000), acknowledges CWM as being a posi- tive step toward ensuring meta data integration and reuse but also recognizes that CWM by itself will not be effective when an organization has no agreed- upon meta data management policy. Where such a policy does exist, however, the report states that CWM will indeed allow for a much greater semantic understanding between CWM-enabled technologies. The report goes on to state the importance of encouraging vendors to adhere to the CWM and XMI standards to maximize meta data reuse. Finally, David Marco, in Building and Managing the Meta Data Repository, clearly delineates the need of ownership of meta data (the concept of data stew- ardship, pp. 61—62). He discusses prerequisites to the success of any meta data repository or integration effort as including clear management direction, backing, and policy (see p. 185 and pp. 115—121). Also provided throughout the book are numerous recommendations and checklists for verifying the effi- cacy of any meta data integration or repository effort. Issues of organizational culture, politics, and budget rarely have technolog- ical solutions. Neither does the overall absence of a meta data management strategy. However, when a clear, well-understood, and widely agreed-upon 70859_Poole_CH06I 10/29/2001 2:24 PM Page 172 172 Common Warehouse Metamodel management policy is in place, organizations can significantly benefit from the use of a model-based, meta data integration standard like CWM. The use of CWM will greatly enhance meta data integration, sharing, and reuse, and the presence of a sound and coherent meta data management strategy ensures that nontechnical issues (political, cultural, lack of ownership, agreements on meaning and semantics, and so on) will not subvert a meta data integration solution. Elements of a Meta Data Management Strategy What defines an effective meta data management strategy? The authors of this book do not attempt to define a meta data management strategy, because any particular strategy must be specific to a particular meta data integration prob- lem or environment. However, we will attempt to delineate some of the essen- tial elements of an effective meta data management strategy in the following list. This list could be used as the basis for evaluating any proposed meta data management strategy. Also, wherever CWM supports the realization of these policy elements is noted in the descriptions. (Recall that any meta data inte- gration architecture is an implementation of some meta data management strategy and that CWM is a key component of any model-based meta data integration architecture.) Any sound, coherent meta data management strategy will generally incor- porate most of the following essential characteristics: II An overall security policy for meta data II Identification of all meta data sources and targets II Identification of all meta data elements II Agreement on the semantics of each meta data element II Ownership of each meta data element II Rules for sharing and modifying meta data elements II Rules for republishing meta data elements II Versioning of meta data elements II Reuse targets for meta data elements II Elimination of manual processes II Elimination of meta data redundancy These essential characteristics are further elaborated on in the subsequent subsections. 70859_Poole_CH06I 10/29/2001 2:24 PM Page 173 Developing Meta Data Solutions Using CWM 173 An Overall Security Policy for Meta Data Security is a vitally important (and oft neglected) aspect of meta data manage- ment (Marco, 2000, pp. 62—63 and 196). Meta data is a highly sensitive and strategically valuable information asset because it describes almost all aspects of an information system or computing environment. Meta data is strategi- cally valuable because it inherently contains a wealth of information regard- ing the characteristics of business data and forms the basis for strategic, business knowledge. Meta data cannot be comprised. A sound meta data management strategy must include a
Recommended publications
  • Sysml Distilled: a Brief Guide to the Systems Modeling Language
    ptg11539604 Praise for SysML Distilled “In keeping with the outstanding tradition of Addison-Wesley’s techni- cal publications, Lenny Delligatti’s SysML Distilled does not disappoint. Lenny has done a masterful job of capturing the spirit of OMG SysML as a practical, standards-based modeling language to help systems engi- neers address growing system complexity. This book is loaded with matter-of-fact insights, starting with basic MBSE concepts to distin- guishing the subtle differences between use cases and scenarios to illu- mination on namespaces and SysML packages, and even speaks to some of the more esoteric SysML semantics such as token flows.” — Jeff Estefan, Principal Engineer, NASA’s Jet Propulsion Laboratory “The power of a modeling language, such as SysML, is that it facilitates communication not only within systems engineering but across disci- plines and across the development life cycle. Many languages have the ptg11539604 potential to increase communication, but without an effective guide, they can fall short of that objective. In SysML Distilled, Lenny Delligatti combines just the right amount of technology with a common-sense approach to utilizing SysML toward achieving that communication. Having worked in systems and software engineering across many do- mains for the last 30 years, and having taught computer languages, UML, and SysML to many organizations and within the college setting, I find Lenny’s book an invaluable resource. He presents the concepts clearly and provides useful and pragmatic examples to get you off the ground quickly and enables you to be an effective modeler.” — Thomas W. Fargnoli, Lead Member of the Engineering Staff, Lockheed Martin “This book provides an excellent introduction to SysML.
    [Show full text]
  • Applications of Reinforcement Learning to Routing and Virtualization in Computer Networks
    Applications of Reinforcement Learning to Routing and Virtualization in Computer Networks by Soroush Haeri B. Eng., Multimedia University, Malaysia, 2010 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the School of Engineering Science Faculty of Applied Science © Soroush Haeri 2016 SIMON FRASER UNIVERSITY Spring 2016 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced without authorization under the conditions for “Fair Dealing.” Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. Abstract Computer networks and reinforcement learning algorithms have substantially advanced over the past decade. The Internet is a complex collection of inter-connected networks with a numerous of inter-operable technologies and protocols. Current trend to decouple the network intelligence from the network devices enabled by Software-Defined Networking (SDN) provides a centralized implementation of network intelligence. This offers great computational power and memory to network logic processing units where the network intelligence is implemented. Hence, reinforcement learning algorithms viable options for addressing a variety of computer networking challenges. In this dissertation, we propose two applications of reinforcement learning algorithms in computer networks. We first investigate the applications of reinforcement learning for deflection routing in buffer- less networks. Deflection routing is employed to ameliorate packet loss caused by contention in buffer-less architectures such as optical burst-switched (OBS) networks. We present a framework that introduces intelligence to deflection routing (iDef).
    [Show full text]
  • Collaboration Analytics Need More Comprehensive Models and Methods. an Opinion Paper Areum Han1, Florian Krieger2, Samuel Greiff3
    Volume 8(1), 13–29. http://doi.org/10.18608/jla.2021.7288 Collaboration Analytics Need More Comprehensive Models and Methods. An Opinion Paper Areum Han1, Florian Krieger2, Samuel Greiff3 Abstract As technology advances, learning analytics is expanding to include students’ collaboration settings. Despite their increasing application in practice, some types of analytics might not fully capture the comprehensive educational contexts in which students’ collaboration takes place (e.g., when data is collected and processed without predefined models, which forces users to make conclusions without sufficient contextual information). Furthermore, existing definitions and perspectives on collaboration analytics are incongruent. In light of these circumstances, this opinion paper takes a collaborative classroom setting as context and explores relevant comprehensive models for collaboration analytics. Specifically, this paper is based on Pei-Ling Tan and Koh’s ecological lens (2017, Situating learning analytics pedagogically: Towards an ecological lens. Learning: Research and Practice, 3(1), 1–11. https://doi.org/10.1080/23735082.2017.1305661), which illustrates the co-emergence of three interactions among students, teachers, and content interwoven with time. Moreover, this paper suggests several factors to consider in each interaction when executing collaboration analytics. Agendas and recommendations for future research are also presented. Notes for Practice • Studies of educational contexts using collaboration analytics are being implemented, but some analytics practices may unintentionally fail to fully capture the comprehensive context (e.g., when users without sufficient contextual information must make final decisions based on data collected without predefined learning models). Furthermore, definitions and perspectives on collaboration analytics vary across disciplines and underlying perspectives on collaboration.
    [Show full text]
  • A Feature-Based Survey of Model View Approaches Hugo Bruneliere, Erik Burger, Jordi Cabot, Manuel Wimmer
    A Feature-based Survey of Model View Approaches Hugo Bruneliere, Erik Burger, Jordi Cabot, Manuel Wimmer To cite this version: Hugo Bruneliere, Erik Burger, Jordi Cabot, Manuel Wimmer. A Feature-based Survey of Model View Approaches. Software and Systems Modeling, Springer Verlag, 2019, 18 (3), pp.1931-1952. 10.1007/s10270-017-0622-9. hal-01590674 HAL Id: hal-01590674 https://hal.inria.fr/hal-01590674 Submitted on 19 Sep 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Software and Systems Modeling (SoSyM) manuscript No. (will be inserted by the editor) A Feature-based Survey of Model View Approaches Hugo Bruneliere · Erik Burger · Jordi Cabot · Manuel Wimmer Received: date / Accepted: date Abstract When dealing with complex systems, information is very often frag- mented across many different models expressed within a variety of (modeling) languages. To provide the relevant information in an appropriate way to dif- ferent kinds of stakeholders, (parts of) such models have to be combined and potentially revamped by focusing on concerns of particular interest for them. This work has been partially funded by the MoNoGe national collaborative project (French FUI #15), the Electronic Component Systems for European Leadership (ECSEL) Joint Un- dertaking & the European Union’s Horizon 2020 research/innovation program under grant agreement No.
    [Show full text]
  • Software Development Methods and Usability : a Systematic Literature Review
    Linköping University | IDA 30 hp/Master Thesis |Computer Science Autumn term 2017 | LIU-IDA/LITH-EX-A—17/055--SE Software Development Methods and Usability : A Systematic Literature Review Prabhu Raj Prem Kumar Tutor, Johan Åberg, Linköpings universitet Examiner, Kristian Sandahl, Linköpings universitet 2 Final Thesis Software Development Methods and Usability: A Systematic Literature Review by Prabhu Raj Prem Kumar [email protected] Supervisor: Johan Åberg, Linköpings universitet Examiner: Kristian Sandahl, Linköpings universitet Linköping, 4th December, 2017 3 Upphovsrätt Detta dokument hålls tillgängligt på Internet – eller dess framtida ersättare – under en längre tid från publiceringsdatum under förutsättning att inga extra-ordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säkerheten och tillgängligheten finns det lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/ Copyright The publishers will keep this document online on the Internet - or its possible replacement - for a considerable time from the date of publication barring exceptional circumstances.
    [Show full text]
  • Adopting Agile Project Management Methods in Software Projects Involving Outsourcing
    Adopting Agile Project Management Methods in Software Projects Involving Outsourcing By Nivarthana Warnakulasooriya A thesis submitted to the Victoria University of Wellington In partial fulfilment of the requirements for the degree of Master of Commerce Victoria University of Wellington 2016 Abstract With the evolvement of how software was built, how quickly the initial requirements change, how fast new technologies were appearing in tech world and evolving innovation needs of dynamic businesses, the software industry was feeling the need for a better way of managing projects. In 2002 a group of well-known software professionals got together to develop a set of industry guidelines now known as ‘The Agile Manifesto’ to help standardize this new way of managing projects which helped lay foundations to now widely used ‘The Agile Project Management methodology’. While Agile was gaining momentum, the software development world saw the rise of another way of developing software which is known as outsourcing. Outsourcing in commonly referred form involves two or more geographically dispersed teams collaborating to develop the same software. However the fusion of agile methodology with outsourcing opens up new challenges which includes cultural, geographical and time barriers. This study tries to understand how well agile works with outsourced projects using a quantitative approach. The study will also look at how factors physical distance, time and culture impact success of agile in outsourced projects using a quantitative approach. Identifying factor/factors which has the biggest impact on success of agile in outsourced project will also help identify and prioritize which principles and practices need to be fixed first.
    [Show full text]
  • A Feature-Based Survey of Model View Approaches Hugo Bruneliere, Erik Burger, Jordi Cabot, Manuel Wimmer
    A Feature-based Survey of Model View Approaches Hugo Bruneliere, Erik Burger, Jordi Cabot, Manuel Wimmer To cite this version: Hugo Bruneliere, Erik Burger, Jordi Cabot, Manuel Wimmer. A Feature-based Survey of Model View Approaches. Software and Systems Modeling, Springer Verlag, 2019, 18 (3), pp.1931-1952. 10.1007/s10270-017-0622-9. hal-01590674 HAL Id: hal-01590674 https://hal.inria.fr/hal-01590674 Submitted on 19 Sep 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Software and Systems Modeling (SoSyM) manuscript No. (will be inserted by the editor) A Feature-based Survey of Model View Approaches Hugo Bruneliere · Erik Burger · Jordi Cabot · Manuel Wimmer Received: date / Accepted: date Abstract When dealing with complex systems, information is very often frag- mented across many different models expressed within a variety of (modeling) languages. To provide the relevant information in an appropriate way to dif- ferent kinds of stakeholders, (parts of) such models have to be combined and potentially revamped by focusing on concerns of particular interest for them. This work has been partially funded by the MoNoGe national collaborative project (French FUI #15), the Electronic Component Systems for European Leadership (ECSEL) Joint Un- dertaking & the European Union’s Horizon 2020 research/innovation program under grant agreement No.
    [Show full text]
  • IDEF5 Method Report
    Information Integration for Concurrent Engineering (IICE) IDEF5 Method Report Prepared for: Armstrong Laboratory AL/HRGA Wright-Patterson Air Force Base, Ohio 45433 Prepared by: Knowledge Based Systems, Inc. 1408 University Drive East College Station, Texas 77840 (409) 260-5274 Revision Date: September 21, 1994 Contract Number: F33615-C-90-0012 Information Integration for Concurrent Engineering (IICE) IDEF5 Method Report This document was prepared by the IDEF5 Method Development Team for the IICE Methods Engineering Thrust. Contributors: Perakath C. Benjamin, Ph.D. Christopher P. Menzel, Ph.D. Richard J. Mayer, Ph.D. Florence Fillion Michael T. Futrell Paula S. deWitte, Ph.D. Madhavi Lingineni Date: September 21, 1994 i Preface This document provides a comprehensive description of the IDEF5 Ontology Description Capture Method. The IDEF5 method was developed under the Information Integration for Concurrent Engineering (IICE) project, F33615-90-C-0012, funded by Armstrong Laboratory, Logistics Research Division, Wright-Patterson Air Force Base, Ohio 45433, under the technical direction of Captain JoAnn Sartor and Mr. James McManus. The prime contractor for IICE is Knowledge Based Systems, Inc. (KBSI), College Station, Texas. The authors wish to acknowledge and extend special thanks to the following people who helped compose this document: Julie Holden James MacDougall Richard McGuire ii Table of Contents Preface ............................................................................................................................................ii
    [Show full text]
  • Educational Specifications 2650 Capacity
    Prince George’s County Public Schools Northern Adelphi Area High School with Northern Career and Technical Education (CTE) Hub Educational Specifications 2650 Capacity March 2021 Draft v3 pg. 1 PGCPS Table of Contents General Planning Considerations………………………………………………………………………….. 3 Environmental Performance Requirements…………………………………………………………. 14 Capacity Calculation…………………………………………………………………………………………….. 19 Space Requirements Tables…………………………………………………………………………………. 20 Academic Core Space…………………………………………………………………………………………….. 29 Administration Space Requirements………………………………………………………………………… 52 Health Suite Space Requirements………………………………………………………………………… 74 Maintenance & Custodial Space Requirements……………………………………………………… 80 Performing Arts Space Requirements……………………………………………………………………. 94 Physical Education Space Requirements………………………………………………………………. 110 Student Dining & Food Service Space Requirements……………………………………………. 121 Visual Arts Space Specifications……………………………………………………………………………. 128 Athletic Fields Space Specifications……………………………………………………………………… 133 Career and Technology Hub ………………………… ……………………………………………… 138 Construction and Development Transportation Technologies Barbering and Cosmetology Business Early Childhood Education/Teacher Academy Culinary Arts Health and Biosciences Information Technology Interactive, Media and Communication Manufacturing, Engineering and Technology APPENDIX A (Special Education)…………………...……………………..………………………. 202 APPENDIX B (Health Clinic)…………………………………………………………………………… 209 Northern Adelphi Area High School Educational
    [Show full text]
  • Ontology-Based Modelling of Architectural Styles
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Limerick Institutional Repository Ontology-based Modelling of Architectural Styles Claus Pahla, Simon Gieseckeb, Wilhelm Hasselbringc aDublin City University, School of Computing, Dublin 9, Ireland bBTC Business Technology Consulting AG, Kurf¨ustendamm 33, D-10719 Berlin, Germany cUniversity of Kiel, Software Engineering Group, D-24118 Kiel, Germany Abstract The conceptual modelling of software architectures is of central importance for the quality of a software system. A rich modelling language is required to integrate the different aspects of architecture modelling, such as architectural styles, structural and behavioural modelling, into a coherent framework. Ar- chitectural styles are often neglected in software architectures. We propose an ontological approach for architectural style modelling based on descrip- tion logic as an abstract, meta-level modelling instrument. We introduce a framework for style definition and style combination. The application of the ontological framework in the form of an integration into existing architectural description notations is illustrated. Key words: Software architecture modelling; architecture ontology; architectural style; description logics. 1. Introduction Architecture descriptions are used as conceptual models in the software development process, capturing central structural and behavioural properties of a system at design stage [8]. The architecture of a software system is a crucial factor for the quality of a system implementation. The architecture influences a broad variety of properties such as the maintainability, depend- ability or the performance of a system [11]. While architecture description Email addresses: [email protected] (Claus Pahl), [email protected] (Simon Giesecke), [email protected] (Wilhelm Hasselbring) languages (ADLs) exist [23], these are not always suitable to support rich conceptual modelling of architectures [13].
    [Show full text]
  • Business Process Modeling As a Method of Requirements Engineering
    We analyze and visualize your business processes www.ibissoft.se Tutorial on: Business Process Modeling as a Method of Requirements Engineering Prepared for Instructor: Ilia Bider (Director R&D) IbisSoft AB Email: [email protected] IbisSoft AB Box 19567 Fax: 08-15 10 50 Fabriksgatan 10 104 32 Stockholm 412 50 Göteborg Tel: 08-15 10 10 www.ibissoft.se Tel: 031-711 74 80 We analyze and visualize your processes www.ibissoft.se Extended abstract Today, at least half of the industrial software – Reaching an agreement in business development is connected to business application negotiations. development. During the past ten years, – Discharging a patient from the hospital in a requirements on functionality of business (relatively) healthy state. applications have been slowly changing. This shift – Closing a sale. consists of moving from the command-based applications to the applications of workflow and Each process engages a number of participants that groupware type. In other words, the shift can be can be roughly divided into two categories: passive described as moving from the traditional, “human- participants, and active participants. Passive assisting” systems, to a new generation of “human- participants are the participants that are consumed, assisted” systems. produced or changed during the execution of activities, for example, a document being written, a A human-assisting system helps a human being car being assembled, a patient being treated in the only to perform certain activities, e.g. to write a hospital, an organization being reorganized. Active letter, to print an invoice, to complete a transaction, participants, or agents, are those participants that etc.
    [Show full text]
  • Download(8MB)
    378.147:004(043.3) І І І ІІ І І І 13.00.04 – , . – 2016 2 І ……………………………………………………….…...4 …………………………………………………………………………...………5 І 1. І І І І ІІ І І І 1.1. ……………………………….…….…12 1.2. …..……….………………………………………………………………..…27 1.3. ……….…………..…………39 1…………………………………………………………………55 І 2. ІІ І І І ІІ І І І 2.1. …………………………………………………………………………………..….…58 2.2. , , …….…………………………………..……...……...74 2.3. - ……………………………………………………………………………93 2……………………………………………………………..…125 3 І 3. Ь І І І І І ІІ І І І 3.1. …....128 3.2. ………………….………….135 3.3. ……………..……………………………………………………………………...…170 3……….……………………………………………..…….......183 ЬІ ……………………………………………………………186 ………………………………..……......190 …………………………………………………………………….………227 4 І Ь Є є - - - - 5 ьь . , , . « » , , є . є - . , : (. . [216], . [168], . [270], . є [239] .); - (. [41], . [118], . [157], . [183], . [234], . [237] .); - (. [136], . [73], . [227], . [260] .); (. [107], . [46], . [52], . [64], . [109], . [155], . [198], . [293] .); (. , . , . [217], . [182] .); (. [120], . [122], . [221], . [248], . [264]); (. [203], . [284] .). , , : . [31], . [253], . [275] . 6 : є - , є ; - ; - .
    [Show full text]