Sie sind auf Seite 1von 3

THE PROFESSION

We Are Sorry
tion, performance, and practical use-
fulness. The paper’s general point is
that the tabular form presented should
be suitable for general data access, but

to Inform You …
I see two problems with this statement:
expressivity and efficiency.
The paper contains no real-world
example to convince us that any model
of practical interest can be cast in it.
Simone Santini, University of California, San Diego
Quite the contrary, at first sight I doubt
that anything complex enough to be of
practical interest can be modeled using
relations. The simplicity of the model

O
nce upon a time there was a
little-known patent clerk in How much damage
Bern who received a disap-
pointing annual performance could be caused by a
review in ’05 (www.norvig. peer reviewer having
com/performance-review.html) ….
a bad day?
E.W. DIJKSTRA
“Goto Statement Considered Harm-
ful.” This paper tries to convince us ful and necessary: its presence might prevents one from, for instance, repre-
that the well-known goto statement cause some inconveniences in debug- senting hierarchies directly and forces
should be eliminated from our pro- ging, but it is a de facto standard and their replacement with complicated
gramming languages or, at least (since we must live with it. It will take more systems of “foreign keys.” In this situ-
I don’t think that it will ever be elimi- than the academic elucubrations of a ation, any realistic model might end up
nated), that programmers should not purist to remove it from our languages. requiring dozens of interconnected
use it. It is not clear what should Publishing this would waste valuable tables—hardly a practical solution
replace it. The paper doesn’t explain to paper: Should it be published, I am as given that, probably, we can represent
us what would be the use of the “if” sure it will go uncited and unnoticed as the same model using two or three
statement without a “goto” to redirect I am confident that, 30 years from now, properly formatted files.
the flow of execution: Should all our the goto will still be alive and well and Even worse, the paper contains no
postconditions consist of a single state- used as widely as it is today. efficiency evaluation: There are no
ment, or should we only use the arith- Confidential comments to the edi- experiments with real or synthetic data
metic “if,” which doesn’t contain the tor: The author should withdraw the to show how the proposed approach
offensive “goto”? paper and submit it someplace where compares with traditional ones on
And how will one deal with the case it will not be peer reviewed. A letter to real-world problems. The main reason
in which, having reached the end of an the editor would be a perfect choice: for using specialized file formats is effi-
alternative, the program needs to con- Nobody will notice it there! ciency: Data can be laid out in such a
tinue the execution somewhere else? way that the common access patterns
The author is a proponent of the so- E.F. CODD are efficient. This paper proposes a
called “structured programming” “A Relational Model of Data for model in which, to extract any signifi-
style, in which, if I get it right, gotos Large Shared Data Banks.” This paper cant answer from any real database,
are replaced by indentation. Structured proposes that all data in a database be the user will end up with the very inef-
programming is a nice academic exer- represented in the form of relations— ficient solution of doing a large number
cise, which works well for small exam- sets of tuples—and that all the opera- of joins. Yet we are given no experi-
ples, but I doubt that any real-world tions relative to data access be made on mental result or indication of how this
program will ever be written in such a this model. Some of the ideas presented solution might scale up.
style. More than 10 years of industrial in the paper are interesting and may be The formalism is needlessly complex
experience with Fortran have proved of some use, but, in general, this very and mathematical, using concepts and
conclusively to everybody concerned preliminary work fails to make a con- notation with which the average data
that, in the real world, the goto is use- vincing point as to their implementa- Continued on page 126

128 Computer Published by the IEEE Computer Society


The Profession
Continued from page 128

bank practitioner is unfamiliar. The might be relevant. The author claims C.A.R. HOARE
paper doesn’t tell us how to translate that “semantic aspects of communica- “An Axiomatic Basis for Computer
its arcane operations into executable tion are irrelevant to the engineering Programming.” I am not sure I under-
block access. problems,” which seems to indicate stand this article. It claims to be about
Adding together the lack of any real- that his theory is suitable mostly for programming, but it doesn’t contain a
world example, performance experi- transmitting gibberish. Alas, people single line of code.
ment, and implementation indication will not pay to have gibberish trans- The paper introduces the idea that
or detail, we are left with an obscure mitted anywhere. certain inference rules can be associ-
exercise using unfamiliar mathematics ated to statements in a program and
and of little or no practical conse- used to show that the program does
quence. It can be safely rejected. “IBM has decided to stay indeed compute what it is supposed to.
out of the electronic I have some reservations that the pro-
A. TURING computing business, gram’s purpose can be defined in the
“On Computable Numbers, with an and this journal should terms the author claims—we all know
Application to the Entscheidungs- probably do the same!” how fuzzily defined the features of real
problem.” This is a bizarre paper. It programs are—but the idea, if suitably
begins by defining a computing device justified, might have some merit.
absolutely unlike anything I have seen, I don’t understand the relevance of However, in its current state, the work
then proceeds to show—I haven’t quite discrete sources: No matter what one is far too preliminary to be considered
followed the needlessly complicated does, in the end, the signal will have to for a journal. It may well be insufficient
formalism—that there are numbers be modulated using good old-fashioned for any kind of publication, so I would
that it can’t compute. As I see it, there vacuum tubes, so the signal on the advise the author to try a workshop at
are two alternatives that apply to any “channel” will always be analogical. which these kinds of preliminary ideas
machine that will ever be built: Either A running example would have will be more likely to find a home.
these numbers are too big to be repre- helped make the presentation clearer Before the author attempts journal
sented in the machine, in which case and less theoretical, but none is pro- publication, he should complete this
the conclusion is obvious, or they are vided. Also, the author presents no work in several respects. The method
not; in that case, a machine that can’t implementation details or experiments assumes that the function of a program
compute them is simply broken! taken from a practical application. can be specified as the final value of cer-
Any tabulating machine worth its Confidential comments to the editor: tain variables. This is an unrealistic
rent can compute all the values in the The only thing absolutely wrong with view for interactive programs: The
range it represents, and any number this paper is that it doesn’t quite “res- author should show how his method
computable by a function—that is, by onate” with what the research com- fits with the industry’s standard way of
applying the four operations a number munity finds exciting. At any point, specifying requirements. He should
of times—can be computed by any there are sexy topics and unsexy ones: also extend the method to be applicable
modern tabulating machine since these these days, television is sexy and color to a standard programming language
machines—unlike the one proposed television is even sexier. Discrete chan- such as COBOL or PL/I and provide
here with its bizarre mechanism—have nels with a finite number of symbols the details of his implementation, pos-
the four operations hardwired. It are good for telegraphy, but telegraphy sibly with a few graphics to show how
seems that the “improvement” pro- is 100 years old, hardly a good the system works in practice.
posed by Turing is not an improvement research topic. Until this is done, I fear the work
over current technology at all, and I The author mentions computing is too tentative and preliminary for
strongly suspect the machine is too machines, such as the recent ENIAC. publication.
simple to be of any use. Well, I guess one could connect such
If the article is accepted, Turing machines, but a recent IBM memo R.L. RIVEST, A. SHAMIR,
should remember that the language of stated that a dozen or so such machines AND L. ADELMAN
this journal is English and change the will be sufficient for all the computing “A Method for Obtaining Digital
title accordingly. that we’ll ever need in the foreseeable Signatures and Public-Key Crypto-
future, so there won’t be a whole lot of systems.” According to the (very short)
C.E. SHANNON connecting going on with only a dozen introduction, this paper purports to
“A Mathematical Theory of Com- ENIACs! present a practical implementation of
munication.” This paper is poorly IBM has decided to stay out of the Diffie and Hellman’s public-key cryp-
motivated and excessively abstract. It electronic computing business, and this tosystem for applications in the elec-
is unclear for what practical problem it journal should probably do the same! tronic mail realm. If this is indeed the

126 Computer
premise, the paper should be rejected mal people or small companies will be established standards, and with a
both for a failure to live up to it and able to afford a VAX each, or the mar- declared application area of dubious
for its irrelevance. ket for electronic mail will remain tiny. feasibility. Not the kind of material our
I doubt that a system such as this one Granted, we are seeing the appearance readers like to see in the journal.
will ever be practical. The paper does of so-called microcomputers, such as Reject.
a poor job of convincing the reader the recently announced Apple II, but … and the rest is history. ■
that practicality is attainable. For one their limitations are so great that nei-
thing, there is the issue of the number ther they nor their descendants will Simone Santini is a project researcher
n used to factor the message. have the power necessary to commu- at the University of California, San
The scheme’s security relies on the nicate through a network. Diego. Contact him at ssantini@sdsc.
factorization of n in prime factors tak- The introduction is only two para- edu.
ing so long as to be impractical. The graphs long, the relevant literature is
authors also stress that the encryption not presented or cited, and there is vir-
algorithm must be fast and—if their tually no comparison with the relevant Editor: Neville Holmes, School of
application, electronic mail, is to make work in the area. In summary, it looks Computing, University of Tasmania;
sense—the algorithm should run on all as if this paper is a mathematical exer- neville.holmes@utas.edu.au.
sorts of machines. Let us be generous cise with little originality (the authors Links to further material are at
and assume that every computer user claim that most of their ideas come www.comp.utas.edu.au/users/
has access to a latest-generation mini- from other papers), too far from prac- nholmes/prfsn.
computer such as the VAX. This 32-bit tical applicability, running against the
machine’s speed considerations limit
the choice of n to n < 232 =
4,294,967,296. Granted, this is a large
number, but by the very results of the THE IEEE’S 1ST ONLINE-ONLY MAGAZINE
paper’s Table 1, it can be factored in a
couple of hours. Scarcely a time margin
that will grant security!
Further, as the authors acknowledge,
a data encryption standard already
exists, supported by both the US
National Bureau of Standards and
IBM, currently the largest computer
manufacturer. It is unlikely that any
method that runs counter to this stan-
dard will be adopted in any significant IEEE Distributed Systems Online brings you
degree. True, the IBM method presents peer-reviewed articles, detailed tutorials, expert-managed topic
the problem of distributing the encryp-
tion key, but their method is a standard areas, and diverse departments covering the latest news and
and we must live with it. Instead of cre- developments in this fast-growing field.
ating nonstandard methods that will
soon be dead for lack of users, the
Log on for free access to such topic areas as
authors should try to extend the stan-
dard and devise ways to distribute the
encryption keys securely. Grid Computing • Middleware Cluster
Finally, there is the question of the
application. Electronic mail on the Computing • Security • Peer-to-Peer and More!
Arpanet is indeed a nice gizmo, but it
To receive monthly updates,email
is unlikely it will ever be diffused out-
side academic circles and public labo- dsonline@computer.org
ratories—environments in which the
need to maintain confidentiality is
scarcely pressing. Laboratories with http://dsonline.computer.org
military contracts will never commu-
nicate through the Arpanet! Either nor-

December 2005 127

Das könnte Ihnen auch gefallen