Dynamic query model and method

ABSTRACT

A method for generating database queries includes storing a predefined query model for querying a database. An accessible portion of the predefined query model is displayed to a user upon request. User edits to the accessible portion of the predefined query model are received and used to generate a user-adapted query model. A query is then initiated based on the user-adapted query model.

RELATED APPLICATIONS

This application is related to copending U.S. application Ser. No.09/364,124, rejected Jun. 18, 2001 entitled, “MULTIDIMENSIONAL STORAGEMODEL AND METHOD”, U.S. application Ser. No. 09/364,808, rejected May 7,2001 entitled, “MODULAR METHOD AND SYSTEM FOR PERFORMING DATABASEQUERIES” and U.S. application Ser. No. 09/364,595, entitled, “METHOD ANDSYSTEM FOR DISPLAYING A PLURALITY OF DISCRETE FILES IN A COMPOUND FILE”.

TECHNICAL FIELD OF THE INVENTION

This invention relates generally to the field of analytical dataprocessing, and more particularly to a dynamic query model and methodfor performing customized database queries.

BACKGROUND OF THE INVENTION

Business intelligence systems began largely as decision support systems(DSS) and executive information systems (EIS). Decision support systems(DSS) and executive information systems (EIS) were value added systemsthat provided additional information from existing on-line transactionalprocessing (OLTP) systems.

As business intelligence systems developed, they integrated decisionsupport system (DSS) functionality with executive information system(EIS) functionality, and added on-line analytical processing (OLAP)tools and management reporting tools. These hybrid business intelligencesystems were gradually moved from a main-frame environment to adistributed server/desktop environment to allow greater user access.

More recently, the advent of centralized data warehouses and datamartshave created a dramatic increase in available data waiting to beanalyzed, exploited and distributed within an organization. Such datawarehouses and datamarts, however, were typically optimized forinformation delivery rather than transactional processing. As a result,data warehouses and datamarts offered only limited solutions for turningstored data into useful and strategic tactical information. During thissame time, business intelligence systems gained prominence by offeringsophisticated analysis tools for analyzing large amounts of storedinformation to support effective planning and decision-making within anorganization.

Business intelligence systems and other analytical tools typicallyprovide predefined query models to assist novice users and otherinformation consumers in obtaining information from a database. Aproblem with such predefined query models, however, is they are genericand do not suit specific user needs. To obtain specifically relevantinformation, a user must himself or herself write a custom query, whichusually requires advanced database knowledge. As a result, although allusers are able to obtain some information using predefined query models,most users are not able to obtain information that is specificallyrelevant to them.

SUMMARY OF THE INVENTION

The present invention provides a dynamic query model and method thatsubstantially eliminates or reduces disadvantages and problemsassociated with previous systems and methods. In particular, predefinedquery models are provided to users for customization. This allows usersto quickly and easily adapt predefined queries to their particularneeds.

In accordance with one embodiment of the present invention, a method forgenerating database queries includes storing a predefined query modelfor querying a database. An accessible portion of the predefined querymodel is displayed to a user upon request. User edits to the accessibleportion of the predefined query model are received and used to generatea user-adapted query model. A query is then initiated based on theuser-adapted query model.

More specifically, in accordance with a particular embodiment of thepresent invention, the display is a graphical view of accessible dataelements defining the predefined query model. A graphical view ofaccessible data elements includes accessible tables, columns and tables,and joins between tables. In this and other embodiments, a user-adaptedquery model may include database tables, database columns, and tablejoints absent or modified from the predefined query model.

Technical advantages of the present invention include providing animproved business intelligence portal that allows query models to bemore intelligently generated and used within an organization. Inparticular, the business intelligence portal allows default query modelsto be constructed and altered using a graphical view of data elements.To the extent possible, specified data within a query model isautomatically linked. As a result, queries can be easily defined andlater altered by users without specialized database knowledge.

Another technical advantage of the present invention includes providinga query model and method that allows users to easily obtain and analyzemeaningful information. In particular, the predefined query models areprovided to users for adaptation and customization. As a result, noviceusers and other information consumers can alter queries to suit theirparticular needs. This facilitates robust data analysis by all users andallows novice users to effectively use available information to improveoperations within their organization.

Other technical advantages of the present invention will be readilyapparent to one skilled in the art from the following figures,description, and claims.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention and itsadvantages, reference is now made to the following description taken inconjunction with the accompanying drawings, wherein like referencenumerals represent like parts, in which:

FIG. 1 is a block diagram illustrating a business intelligence portal inaccordance with one embodiment of the present invention;

FIG. 2 is a flow diagram illustrating a method for initializing thebusiness intelligence portal of FIG. 1 in accordance with one embodimentof the present invention;

FIG. 3 is a flow diagram illustrating a method for generating predefinedquery models in the business intelligence portal of FIG. 1 in accordancewith one embodiment of the present invention;

FIG. 4 is a flow diagram illustrating a method for deploying andmaintaining client applications in the business intelligence portal ofFIG. 1 in accordance with one embodiment of the present invention;

FIG. 5 is a flow diagram illustrating a method for generating andexecuting a query model based on a predefined query model in accordancewith one embodiment of the present invention;

FIG. 6 is a block diagram illustrating operation of the modular queryengine of FIG. 1 in accordance with one embodiment of the presentinvention;

FIG. 7 is a flow diagram illustrating operation of the modular queryengine of FIG. 6 in accordance with one embodiment of the presentinvention;

FIG. 8 is a block diagram illustrating a multidimensional storage modelin accordance with one embodiment of the present invention;

FIG. 9 is a block diagram illustrating exemplary data for themultidimensional storage model of FIG. 8;

FIG. 10 is a flow diagram illustrating a method for generating themultidimensional storage model of FIG. 8 in accordance with oneembodiment of the present invention;

FIG. 11 is a screen diagram illustrating a display of related views inthe portfolio of FIG. 1 in accordance with one embodiment of the presentinvention; and

FIG. 12 is a screen diagram illustrating window tabs for navigatingbetween related views in accordance with one embodiment of the presentinvention.

DETAILED DESCRIPTION OF THE INVENTION

FIG. 1 illustrates a business intelligence portal 10 in accordance withone embodiment of the present invention. Generally described, thebusiness intelligence portal 10 provides integrated data access andinformation sharing across an enterprise, as well as sophisticatedmultidimensional analysis tools. The analysis tools are highly automatedand intuitive to allow a wide range of users to utilize storedinformation in making strategic decisions. In this way, the businessintelligence portal 10 maximizes decision support benefits users receivefrom their data, while minimizing the cost of implementing andadministrating the system.

In the embodiment illustrated by FIG. 1, the business intelligenceportal 10 implements a three-tier distributed architecture comprising adatabase tier 12, a server tier 14, and a client tier 16 connected byone or more networks 18. The server and client tiers 14 and 16 areJava-based to support the Internet communication protocol (TCP/IP),multiple client and server platforms, pooled connections to a widevariety of data sources, and complete scalability of the portal 10across an enterprise. In addition, the Java-based server and clienttiers 14 and 16 provide an open API architecture that is highlyadaptable and functional for processing structured data in databases aswell as unstructured data. The client/server network 18 comprises acompany Intranet while the server/database network 18 includes portionsof public and private networks. It will be understood that the businessintelligence portal 10 may be implemented using other suitablearchitectures, programming languages, and links.

Referring to FIG. 1, the database tier 12 includes one or more databases20. As described in more detail below, the databases 20 are each exposedas an alias that contains all the information necessary to connect tothe database 20, including the database login. The use of databasealiases prevents direct user access to the native database in order tomaintain the integrity in the database 20. For the illustrativeembodiment, the databases 20 may each be any Java database connection(JDBC) or object database connection (ODBC) compliant database, as wellas a suitable data warehouse or datamart.

The server tier 14 includes one or more servers 30. The servers 30 eachcomprise a set of Java-based applications that can operate on differentplatforms. As described in more detail below, the servers 30 providehierarchical security, centralized administration, fast multithreadedpooled data access, and multidimensional data analysis for the businessintelligence portal 10.

The server 30 includes a catalog 32, a catalog manager 34, a securitymanager 36, a query generator 38, a database access system 40, a cachemanager 42, a multidimensional model manager 44, and a clientadministrator 46. The catalog 32 stores all configurations, documents,and work products created by administrators and users of the businessintelligence portal 10. This centralizes management of documents,eliminates redundant and outdated copies residing on client systems,allows documents to be shared across an enterprise, and providescontinual security for the documents. The catalog manager 34 manages allshared information within the server 30. It will be understood that suchconfigurations, documents, and work products may be otherwise suitablystored and managed within the business intelligence portal 10.

The catalog 32 includes one or more database aliases 50, user profiles52, security groups 54, and predefined query models 56 configured by asystem administrator. The catalog 32 also includes one or moreportfolios 58 that store related views 60 created by a system user. Aspreviously described, the database aliases 50 contain all informationnecessary to connect to the databases 20. The use of the databasealiases 50 prevents direct user database access to maintain dataintegrity in the native databases 20 and makes it possible fornon-technical users to safely access corporate data without fear ofcorruption. In addition, the database aliases 50 also serve to poolconnections to the physical databases 20 and thereby reduce the numberof database connections required to support a large number of clients.

The user profiles 52 each define a specific range of privileges for auser and one or more security groups 54 to which a user has access. Theuser profiles 52 are generated and maintained by a system administrator.The security groups 54 implement a hierarchical security model withsecurity rights and privileges assigned to each group 54 by a systemadministrator. An administrator security group is provided to allowadministrators full access to the system, including permissions to add,modify, and delete security groups 54 and user profiles 52 in thesystem. The final security rights and privileges that a user inheritsare the union of his or her individual rights as defined in the userprofiles 52 and the rights of each security group 54 to which he or shebelongs. In this way, exposure of system features to users is controlledthrough the extensive use of permissions, or privileges, which areassigned or withheld from security groups 54 or individual user profiles52. Thus, while administrators may have the ability to connect todatabases 20 and add or delete users, power users might not have thispermission. Instead, power users may have access to a full range of dataanalysis and collaboration features, while information consumers mayonly be able to run and adapt reports or charts that were previouslydefined by an administrator or power user.

The predefined query models 56 are self-contained logical models ofparticular databases that are established to make query creation by lesstechnical users easily and intuitive. The predefined query models 56further abstract data from a database 20, exposing only those portionsof the database 20 that is relevant to the group or groups of users whowill use the particular query model 56. The predefined query models 56include relevant tables from a database, fields within the databasetables, and links between the database tables that together define aquery. The predefined query models 56 form the basis for all queriescreated by users. In this way, the predefined query model 56 controlsthe elements in any database 20 to which any particular set of userswill have access. In addition, the predefined query models 56 establish.mechanisms that may restrict the type of queries that can be made by anygroup of users. In particular, the mechanisms define the maximumcomputer resources, or governors, that can be used to execute thequeries, and allowable joins between tables to prevent run-away ormalicious queries that could impact the integrity of the businessintelligence portal 10.

The portfolios 58 provide a file system for storing user created orobtained views 60. In addition, to internally generate views 60, theportfolios 58 may include, for example, views 60 of word processingdocuments, spread sheet documents, and web pages. The portfolios 58 areeach a compound file capable of restoring a collection of views 60 orother related sets of data. The views 60 may be stored directly withinthe portfolio 58 or linked to each other in the portfolio 58.

Access to the portfolios 58 is determined by established securityparameters for users and additionally by the creators of the views 60 inthe portfolio 58. In one embodiment, users never see portfolios 58 towhich they do not have access privileges. In addition, the portfolios 58may be customized to provide automatic notification to associated userswhen views 60 within the portfolio 58 have been updated or otherwisemodified. In this way, security is made integral to the operation of thesystem which facilitates collaboration and information sharing within anenterprise.

The views 60 provide data for displaying a wide variety of formats, suchas, for example, tables, graphs, reports, pivots, and web pages. Theviews 60 may be either live views representing current data or snapshotviews of data at a particular point in time. In addition, as describedin more detail below, live views 60 may be scheduled to be updatedautomatically at regular intervals, updated when first opened, and thelike. Snapshot views 60 may be set to overwrite prior snapshots or tocreate a sequence of snapshot or rollover views 60 for historicalanalysis. The views 60 and portfolios 58 can be saved privately by auser or may be distributed or shared among one or more security groups54 to facilitate collaboration and decision making.

The security manager 36 manages security in the business intelligenceportal 10. In particular, the security manager 36 includes predefinedsecurity tasks for generating and maintaining user profiles 52 andsecurity groups 54. The security manager 36 also provides a securityhierarchy that allows user profiles 62 and security groups 54 to inheritprivileges from parent classes. In this way, a system administrator caneasily establish and maintain security for the business intelligenceportal 10.

The query generator 38 provides graphical views of database elements toassist system administrators and power users in defining the querymodels 56. The predefined query models 56 each define the databaseconnection, the family of tables and columns exposed from the database,the allowable join types and combinations, metadata, executiongovernors, and aliases for the query. The predefined query models 56 canbe later adapted and used by a large range of users to perform safe,secure queries.

The database access system 40 includes functionality and software foraccessing and querying the databases 20 and for returning query resultsto the server 30 for manipulation, analysis, and reporting by users. Forthe illustrated embodiment, the database access system 40 includes aquery scheduler 72, an SQL generator 74, a connection manager 76, and aJava database connection(JDBC) 78.

The query scheduler 72 initiates scheduled queries. As previouslydiscussed, any view 60, including the data and calculations contained inthe view 60, can be set to refresh from the database 20 according toseveral options, including specific time schedules. This allows views 60to be easily refreshed to reflect the current state of the data andusers to always work with the most up-to-date information. In addition,snapshot views 60 can be automatically scheduled to create an historicalrepository of snapshot views 60 based on the same query. Thus, forexample, a view 60 may be scheduled for updates at 10:00 p.m. everyMonday, Wednesday, and Friday and automatically distributed to a groupof users via a shared portfolio 58.

The SQL generator 74 receives user-adapted or unadapted query modelsfrom a user and generates a textual SQL query for execution by theconnection manager 76. In this way, query models which are graphicallydisplayed and edited by users are automatically converted to executabledatabase instructions and thereafter executed. This allows novice usersand other information consumers with little or no programming knowledgeto fully use and benefit from the business intelligence portal 10.

In one embodiment, the SQL generator 74 includes dialog specificgenerators and an SQL parse tree to generate the textual SQL. The dialogspecific generators correspond to the different types of databases 20accessed by or used in connection with the business intelligence portal10. The dialog-specific generators may include, for example, Oracle,Sybase, DB2, and MS SQL generators.

The connection manager 76 receives textual SQL query requests from theSQL generator 74 and communicates with the databases 20 to perform therequested queries through the Java database connection (JDBC) 78. In theillustrated embodiment, the connection manager includes a modular queryengine 80 including an intelligent dataset 82 and a library of datadrivers 84. As described in more detail below, the data drivers 84 eachexecute a predefined database operation. The intelligent dataset 82selects and orders data drivers 84 from the library as necessary toperform a query request. As a result, database access methods arestandardized and the dataset need not be customized for eachapplication.

The cache manager 42 includes a cache 90 having a plurality of pages 92and a process thread 94. The cache manager 42 receives data extractedfrom the databases 20 in response to query requests and feeds them intothe pages 92. The cache manager 42 runs asynchronously with the processthread 94 driving the cache 90 to feed data into the pages 92. It willbe understood that data may be otherwise suitably received, stored, andinitially processed by the server 30.

The multidimensional model manager 44 generates and manipulatesmultidimensional storage models 100. As described in more detail below,the multidimensional storage model 100 utilizes a non-sparsearchitecture to minimize the size of the model 100. The reduced size ofthe model 100 improves processing times and allows efficient pivot anddrill operations during data analysis. In addition, the model 100 usesan open architecture to allow calculations to be dynamically performedafter the model has been constructed. As a result, users can create newcalculations to analyze data intersections that were not anticipatedduring the original definition of the models 100. This reduces time andresources needed to support pivot and drill operations.

The client administrator 46 provides a central point from which theportal 10 manages client administration. The client administrator 46provides a zero-administration architecture that automatically managesdeployment of client applications to maximize user performance andminimize network traffic, while assuring the latest applications arealways used by the clients.

The client tier 16 includes a plurality of clients 110. The clients 110may be local to or remote from each other and the server 30. In oneembodiment, the clients 110 provide all access, including systemadministration, to the server 30. As previously described, all client110 functions are controlled by a robust set of permissions stored onthe server 30. Permissions are granted to both individual users andsecurity groups of users. In this way, the robust functionality of thebusiness intelligence portal 10 is appropriately controlled and meteredout to all users across the enterprise without seeming overcomplex toless technical users.

The client 110 includes a client API 112 and a graphical user interface(GUI) 114. In the illustrated embodiment, the client 110 is designedwith all components being Java pieces, or Java beans. In thisembodiment, as described in more detail below, the client 110 identifiesits components when establishing a connection with the server 30. Thisallows efficient administration of the client 110 and integration ofadditional functionality into the client 110.

The client API 112 comprises a set of Java classes that define how theclient 110 communicates with the server 30. Because the client API 112allows any Java program to communicate with the server 30, an enterprisemay efficiently add additional, custom capabilities for its clients 110.

The graphical user interface 114 includes a set of administration panels116, a set of user panels 118, a set of wizards 120, a query composer122, a set of viewers 124, and a property inspector 126. Theadministrative and user panels 116 and 118 provide graphical displaysfor guiding administrators and users through their respectiveoperations.

The wizards 120 divide creation processes into one or more logical stepsand guide administrations and users through the creation process. Thisassists novice users and other information consumers without detailedprogramming knowledge in performing queries and analyzing results. Inthis way, all users within an enterprise are able to efficiently use thebusiness intelligence portal 10 to extract meaningful data and therebyimprove their area of operation within an enterprise.

The query composer 122 specifies where data comes from, what substantivedata to display, and how it is to be stored. The query composer 122provides a graphical view of predefined query models 56 to allow usersto intuitively understand and alter the models 56 to suit theirparticular needs. In one embodiment, the query composer 122 allows usersto only see those data elements in a model 56 to which they haveprivileges. The query composer 122 saves user edits of a predefinedquery model 56 as a user-adapted query model 128 that can be uploaded toand executed by the server 30.

The viewer 124 creates a combination of data views for tables, graphs,reports, pivots, web pages, and the like. The viewer 124 allows users toeasily switch from any view 60 of data to any other and to sort andfilter data. The views 60 can also be exported to HTML for publicationon a web server or for sharing in the catalog 32. As previouslydescribed, data views 60 may be live or snapshots. Views 60 orportfolios 58 of views 60 can be saved privately within an individualuser's own catalog area or may be distributed and shared among one ormore security groups 54 to facilitate collaboration and decision making.

Within the viewer 124, a table viewer 130 displays information as aseries of columns and rows. A table view typically serves as a startingpoint for developing ideas because it provides an overall idea of howinformation is organized. In the table view, users can add filters, addcalculated fields, and add summary and subtotal information. Columns canbe rearranged, hidden, and otherwise modified. Content can be sorted andviewed at different levels.

A report viewer 132 displays data in a report format. A report viewprovides a robust, banded report format and facilitates automatic reportgeneration and distribution. Users can freely arrange fields and columnsin an interactive graphical design view of a report while addingcalculations, subtotals, groupings, headers, footers, titles, andgraphics.

A graph viewer 134 displays graph views of data in a wide variety of 2-Dand 3-D formats. These formats may include, for example, bar, pie, line,scatter, and radar graphs. While working with a graph, users can changethe graph type or contents by filtering data, using a subset of theoriginal data, and draw multidimensional data. The graph view can alsobe changed on the fly, by sorting the records in a different order, aswell as changing the graph properties.

A pivot viewer 136 provides pivot views displaying multidimensional, orcubed, data along multiple dimensions. This allows users to slice anddice information along disparate dimensions to gain differentperspectives on the activities and performance of an enterprise. Thepivot view supports hierarchies in the multiple dimensions which allowsusers to perform drill-down, drill-up and drill-through analysis. Asdescribed in more detail below, the multidimensional views are generatedfrom the multidimensional storage model 100.

A browser viewer 138 provides a built-in, cross-platform web browser.This allows users to access work products and web-based Internet orIntranet environments. Reports or objects created in other views can beexported to HTML for posting to websites or display through the browserinterface.

The property inspector 126 allows users to change display properties ofa particular view. In one embodiment, the property inspector 126 ismodeless. In this embodiment, the property inspector 126 applies thechanges while on the screen to allow users to experiment with differentconfigurations and attributes before closing the property inspector 122.

Together, the client 110 and server 30 of the business intelligenceportal 10 add a strategic layer to an enterprise information structureand provides a single point of entry for integrated query, reporting,and analysis which are inherently extensible for a wide range of users.Because the business intelligence portal 10 may be fully integratedacross an enterprise, the portal 10 facilitates routine enterprise-wideanalysis delivery and sharing of information. As a result, far morepeople within an enterprise will be able to make regular and productiveuse of data that already exists for the enterprise.

FIG. 2 is a flow diagram illustrating a method for initializing thebusiness intelligence portal 10 in accordance with one embodiment of thepresent invention. Referring to FIG. 2, the method begins at step 200 inwhich a system administrator defines the user profiles 52. As previouslydescribed, the user profiles 52 provide permissions for users to utilizefeatures within the system. Next, at step 202, the system administratordefines security groups 54. As previously described, final securityrights and privileges that a user inherits are the union of his or herindividual rights as defined in the user profiles 52 and the rights ofeach security group 54 to which he or she belongs.

Proceeding to step 204, the system administrator generates a databasealias 50 for each of the databases 20. The database aliases 50 preventdirect user access to the databases in order to maintain data integrityand to make it possible for non-technical users to safely accesscorporate data without fear of corruption. The database aliases alsoserve to pool connections to the physical databases 20 and therebyreduce the number of database connections required to support a largenumber of clients 110.

Next, at step 206, the system administrator generates the predefinedquery models 56 using the query generator 38. The predefined querymodels 56 control the elements in a database 20 to which any particularset of users will have access. In addition, the predefined query models56 restrict the types of queries that can be executed and define themaximum computer resources that can be used to execute the queries andthe allowable joins between tables to prevent run-away or maliciousqueries.

Step 206 leads to the end of the process by which the systemadministrator sets up the business intelligence portal 10 for use withinan enterprise. As part of the setup process, permissions and queries forusers have been defined in order to control access and distribution ofdata within the system.

FIG. 3 is a flow diagram illustrating a method for generating thepredefined query models 56 in accordance with one embodiment of thepresent invention. In this embodiment, specified data within the modelis automatically linked to the extent possible. In addition, databaseelements are graphically displayed to the system administrator tofacilitate generation of the query model 56.

Referring to FIG. 3, the method begins at step 220 in which the querygenerator 38 automatically identifies and displays to a systemadministrator the tables and columns of a database 20 for which a queryis to be generated. Next, at step 222, the system administrator selectsa subset of the tables and columns for a predefined query model 56.

Proceeding to decisional step 224, the query generator 38 determineswhether the database 20 has full foreign key (FK)/primary key (PK)information. Full foreign key/primary key information allows data indisparate tables to be automatically linked. Accordingly, if thedatabase 20 includes full foreign key/primary key information, the Yesbranch of decisional step 224 leads to step 226 in which child tablesare automatically linked to parent tables in the predefined query model56 using the foreign key/primary key information. Step 226 leads to theend of the process. At this point, the predefined query model 56 can besaved or further edits can be made by the system administrator.

Returning to decisional step 224, if full foreign key/primary keyinformation is not available, the No branch of decisional step 224 leadsto decisional step 228. At decisional step 228, the query generator 38determines whether full primary key information is available from thedatabase 20. Provision of full primary key information allows parent andchild tables to be determined by a database table search. Accordingly,if full primary key information is available, the Yes branch ofdecisional step 228 leads to step 226 where the database table search isperformed to determine parent and child tables. After the parent andchild tables are determined, they are automatically linked to generatethe predefined query model 56. The predefined query model may then besaved or further edited by the system administrator.

Returning to decisional step 228, if full primary key information is notavailable, the No branch of decisional step 228 leads to decisional step230. At decisional step 230, the query generator determines whetherunique index information capable of identifying parent and child tablesis available from the database 20. If such unique index information isavailable, the Yes branch of decisional step 230 leads to step 226. Atstep 226, the unique index information is used to search the databasefor parent and child tables. The query generator 38 then automaticallylinks child and parent tables to generate the predefined query model 56.The predefined query model may then be saved or further edited by thesystem administrator.

Returning to decisional step 230, if unique index information is notavailable from the database 20, the No branch of decisional step 230leads to step 232. At step 232, the system administrator manuallyidentifies and links child and parent tables to generate the predefinedquery model 56. In this way, the predefined query models 56, are to theextent possible, automatically generated with minimal administratorinteraction. It will be understood that database tables and otherelements may be otherwise suitably linked.

FIG. 4 is a flow diagram illustrating a method for deploying andmaintaining client applications in accordance with one embodiment of thepresent invention. In this embodiment, client applications are centrallydeployed and maintained from the server 30 using a thin boot strapapplet that is initially used to download Java classes forming theclient applications to the client 110. After this, all upgrades to theclient software are done automatically by the server 30 upon initiationof a new session by the client 110. Part of the installation/updateprocedure includes downloading a manifest file listing all names andversions of all modules and resources on a client 110.

Referring to FIG. 4, the method begins at step 250 in which a newconnection to the server 30 is made by the client 110. At step 252, theboot strap agent on the client 110 transmits the user's manifest file tothe server 30.

Proceeding to step 254, the server 30 compares the versions of allmodules and resources listed in the manifest file to current versions ofthe corresponding files in the server 30. At decisional step 256, theserver 30 determines whether some or all of the modules or resources areoutdated based on the comparison. If some or all of the modules orresources are outdated, the Yes branch of decisional step 256 leads tostep 258. At step 258, the server 30 generates an incremental update forthe client 110. The incremental update includes only the modules thatneed to be updated.

Next, at step 260, the server transmits the incremental update to theclient 110. At step 262, the client 110 updates the client sideapplications based on the incremental update. At step 264, a new sessionis then launched for the update-to-date client 110. Returning todecisional step 256, if none of the client applications are outdated,the No branch of decisional step 256 also leads to step 264 in which anew session is launched. In this way, the server 30 determines what, ifany, modules (or Java classes) are out-of-date, missing, or obsolete andthen selectively pushes the correct modules to the user's machine alongwith an updated manifest. As a result, users never have to manuallyupdate client software and are able to easily roam between differentwork stations to log on without requiring their applications and datafiles to be reinstalled on each station. In addition, the client 110executes quickly and is always up-to-date while administration iscentrally maintained and network traffic is minimized.

FIG. 5 is a flow diagram illustrating a method for adapting andexecuting a query model based on a predefined query model 56 inaccordance with one embodiment of the present invention. In thisembodiment, predefined query models 56 are generated and maintained onthe server 30 by an administrator and provided to users upon request andverification of access privileges.

Referring to FIG. 5, the method begins at step 280 in which the server30 receives a request from a user for a predefined query model 56. Next,at step 282, the server determines an accessible portion of thepredefined query model 56 based on the user's privileges. The accessibleportion is a portion of the query model 56 that may be viewed by theuser. In a particular embodiment, the accessible portion of thepredefined query model 56 may also be the portion of the query modeleditable by the user. Determination of the accessible portion of thepredefined query model 56 may be accomplished by determining the user'sprivileges to the query model and then determining the accessibleportion based on the user's privileges.

In determining the accessible portion of the predefined query model 56,the server 30 may also determine a protected portion of the predefinedquery model 56. The protective portion is the remaining or othersuitable portion of the predefined query model 56. As described in moredetail below, the query composer 122 may conceal the protective portionof the predefined query model or otherwise prohibit edits to theprotected portion of the predefined query model.

Next, at step 284, the server 30 downloads the predefined query model 56to the client 110. At step 286, the query composer 122 displays theaccessible portion of the predefined query model 56 to the user. In oneembodiment, the query composer 122 displays a graphical view ofaccessible data elements defining the predefined query model 56. Indisplaying the accessible portion, the query composer 122 may concealthe protected portion of the predefined query model 56 to preventediting and/or viewing of that portion.

Proceeding to step 288, the query composer 122 receives user edits tothe predefined query model 56. User edits may include the selection ordeselection of database tables, columns in the database tables, andjoins between the database tables. Next, at step 290, the query composer122 generates a user-adapted query model 128 based on user edits to theaccessible portion of the predefined query model 56. At step 292, theuser-adapted query model 128 is uploaded to the server 30 for execution.

At step 294, the SQL generator 74 automatically generates a databasequery based on the user-adapted query model 128. The database querycomprises textual SQL that can be executed by the connection manager 76to perform the query. At step 296, the server 30 receives the results ofthe query. As previously described, the query results are initiallystored in the server 30 by the cache manager 42.

Proceeding to decisional step 298, if the query includesmultidimensional analysis, the Yes branch of decisional step 298 leadsto step 300 in which a multidimensional storage model 100 is generatedbased on the results. At step 302, the multidimensional storage model100 is used to generate pivot, drill through, and other views asrequested by the user.

Returning to decisional step 298, if multidimensional analysis is notindicated, the No branch of decisional step 298 leads to step 304 inwhich requested single dimensional views are generated based on thequery results. Steps 302 and 304 each lead to decisional step 306. Atdecisional step 306, the server 30 determines whether the user-adaptedquery model 128 will be stored for later reuse. If the user desires tosave the query model 128, the Yes branch of decisional step 306 leads tostep 308 in which the query model is saved to a selected portfolio 58 ofthe user or a security group 58 to which the user has access. Step 308and the No branch of decisional step 306 each lead to decisional step310.

At decisional step 310, the server 30 determines whether the queryresults are to be stored as an historical snapshot. If a user selects tostore the results as a snapshot, the Yes branch of decisional step 310leads to step 312 in which the query results are stored to a selectedportfolio 58. Step 312 leads to the end of the process by which apredefined query model 56 is provided to a user for adaptation andcustomization. The predefined query model 56 is displayed and alteredusing a graphical view of data elements. This facilitates robust dataanalysis by all users and allows novice users to effectively useavailable information to improve operations within their organization.

FIG. 6 is a block diagram illustrating details of the query engine 80 inaccordance with one embodiment of the present invention. In thisembodiment, the query engine 80 includes a library of data drivers 84and an intelligent dataset 82 operable in response to a query request toidentify from the library necessary data drivers 84 to perform therequest. The intelligent dataset 82 is further operable to determine thenecessary order of the data drivers 84 to perform the request, togenerate a driver chain comprising the necessary data drivers 84 in thenecessary order, and to execute in order the data drivers 84 in thedriver chain.

Referring to FIG. 6, the intelligent dataset 82 generates a driver chain320 in response to a query request. The driver chain 320 includes datadrivers 322 necessary to perform the requested query. The data drivers322 are dynamically selected from the library of available data drivers84 and ordered by the intelligent dataset 82 based on the query request.In one embodiment, the data drivers 84 in the library are derived from abase class for which all interface methods call the next driver in thechain. In this embodiment, each data driver has a chain priority forplacement in a same relative position within the chain 320. As usedherein, the term each means every one of at least a subset of theidentified items.

For the illustrated embodiment, the driver chain 320 includes datadrivers D1, D2, D3, and D4. Data driver D1 performs a fetch databaseoperation which returns requested records. The returned records are nextsorted by data driver D2 and indexed by data driver D3. Data driver D4then performs the requested search on the sorted and indexed datarecords. In this way, the modular query engine 80 employs standardizedaccess methods to perform database queries. As a result, the portal 10need not be customized for particular database queries and the cost toprovide and maintain the business intelligence portal 10 is reduced.

FIG. 7 is a flow diagram illustrating operation of the modular queryengine 80 in accordance with one embodiment of the present invention.Referring to FIG. 7, the method begins at step 340 in which a queryrequest is received by the intelligent dataset 82. Next, at step 342,the intelligent dataset 82 dynamically selects data drivers 84 from thelibrary necessary to perform the query request.

Proceeding to step 344, the intelligent dataset 82 determines the orderof data drivers 84 necessary to perform the request. At step 346, theintelligent dataset 82 dynamically constructs a driver chain comprisingthe necessary data drivers in the necessary order to perform the queryrequest.

Next, at step 348, the intelligent dataset executes the driver chain toperform the query request. Within the driver chain, the datasets 82 areexecuted in order with each calling a next driver 84 in the chain uponcompletion of its own execution. As a result, the query engine 80 anddataset 82 are application independent and can be easily modified tosupport new functionality by adding data drivers 84 to the library andprogramming the intelligent dataset 82 as to their functionality.

FIG. 8 is a block diagram illustrating details of a multidimensionalstorage model 100 in accordance with one embodiment of the presentinvention. In this embodiment, the storage model 100 utilizes anon-sparse architecture to minimize the size of the model 100. Inaddition, the storage model 100 uses an open architecture to allowcalculations to be dynamically performed after the model 100 isconstructed.

Referring to FIG. 8, the multidimensional storage model 100 comprises aslot 360 for each dimension and a slot 362 for a calculated dimension.The dimensional slots 360 contain entries and associated data valuesextracted from a database while the calculated dimension slots 362contain data calculated based on the extracted data.

For the illustrated embodiment, each dimension slot 360 includes anentry storage 370 and a dimension storage 372. The entry storage 370contains a set of non-sparse entries 374 for the correspondingdimension. Preferably, only non-sparse entries are included. The entries374 represent combinatric dimensional values and each identify anassociated data value 376. In one embodiment, each entry 374 includes apointer to the associated data value 376. Alternatively, the data values376 can be stored along with the entries 374 in the entry storage 370.Use of the pointers and separate storage of the data value 376, however,improves efficiency and processing speed of the multidimensional storagemodel 100.

The dimension storage 372 includes the data values 376 associated withentries 374 in the entry storage 370. The data values 376 representunique dimensional values for each dimension.

A set of interdimensional links 380 is provided for each non-sparseentry 374. Each interdimensional link identifies an intersection betweennon-sparse entries 374 in different dimensional slots 360. The set ofinterdimensional links 380 includes one or more interdimensional links.In one embodiment, the interdimensional links 380 are bi-directional toallow efficient traversal between the dimensional slots 360 in eitherdirection from an entry point.

The interdimensional links 380 collectively identify all intersectionsbetween non-sparse entries 374 in the dimensional slots 360.Accordingly, all intersections, including non stored emptyintersections, can be determined from the non-sparse entries 374 andtraversal of the interdimensional links 380. In particular, a nullintersection between database entries in a first and a second dimensionis determined by the lack of the database entries in the model or thelack of interdimensional links 380 connecting the entry 374 in the firstdimension to the entry in the second dimension. Non-sparse intersectionsbetween entries 374 in a first and second dimension are determined bytraversing the interdimensional links 380 from the specified entry inthe first dimension to the specified entry in the second dimension andthen obtaining the data value 376 associated with the entry 374 in thesecond dimension. Data and information obtained by traversal of theinterdimensional storage model 100 is output for further processing asdescribed in more detail below.

The calculated dimension 362 includes a set of calculated values 382.The calculated values 382 are values derived from predefinedcalculations requested by a user contemporaneously with themultidimensional storage model 100. Thus, while the multidimensionalstorage model 100 provides an open architecture to allow calculationsafter its creation, contemporaneous calculations requested by the userwith the model are precalculated and stored to minimize processing aftercreation of the model 100 and to improve the speed of multidimensionalanalysis.

FIG. 9 is a block diagram illustrating exemplary data 400 and anexemplary multidimensional storage model 402 for the exemplary data 400.Referring to FIG. 9, the exemplary data 400 includes dimensions C1 andC2 and calculated dimension C3. Dimension C1 includes unique entryvalues A, B, and C while dimension C2 includes unique entry values D, E,F, G, and H. The calculated dimension C3 includes calculated data values1, 2, 3, 4, 5, and 6 corresponding to different predefined calculations.

The exemplary storage model 402 includes dimensional slots 404 fordimensions C1 and C2 and calculated dimensional slot 406 for calculateddimension C3. In the C1 dimensional slot 404, the dimensional storage410 includes unique dimensional values A, B, and C. The entry storage412 includes entries with which the data values are associated andpointers to the data values. Similarly, the C2 dimensional slot 404includes unique data values D, E, F, G, and H in dimensional storage414. Entry storage 416 includes entries associated with the data valuesand pointers to the data values. Interdimensional links 420 identifyintersections between entries, and thus data, in the C1 and C2dimensions. The calculated dimension 406 includes calculated data values1, 2, 3, 4, 5, and 6 associated with predefined intersections of data inthe C1 and C2 dimensions.

From the exemplary storage model 402, it can be determined, for example,that entry values A and D in the C1 and C2 dimensions intersect in thatthey are connected by interdimensional links 420. It can be furtherdetermined that entry values C and D do no intersect in that they arenot connected by interdimensional links 420. Entries are connected byinterdimensional links if any one or a series of interdimensional linksconnect the entries.

FIG. 10 is a flow diagram illustrating a method for generating and usingthe multidimensional storage model 100 in accordance with one embodimentof the present invention. Referring to FIG. 10, the method begins atstep 440 in which the multidimensional storage model 100 is generated bythe multidimensional model manager 44 in response to a query request andis based on results of the query request. The query request specifiesthe dimensions and data dimensions for the multidimensional storagemodel 100.

In one embodiment, the multidimensional model manager 44 generates themultidimensional storage model 100 by first fetching data records fromthe source. For each data record, the dimensional values and data valuesare then fetched. Thereafter, for each dimensional value of a datarecord the multidimensional model manager 44 determines if thedimensional value is present in entry storage 370, in which case it maybe used. If the dimensional value is not present in the entry storage370, an entry 374 is created for the dimensional value in entry storage370 and the corresponding data value 376 stored in dimension storage372. In either case, the dimensions are next traversed from left toright to create interdimensional links 380 for the entries 374 in entrystorage 370. Existing links are reused while links that are missing arecreated. In addition, for the right-most dimension, data values fetchedfor the record are added by the multidimensional model manager 44. Itwill be understood that the multidimensional storage model 100 may beotherwise suitably generated.

After the multidimensional storage model 100 is generated, step 440proceeds to step 442. At step 442, the multidimensional model manager 44receives a view request for a subset of the specified dimensions and/ordata dimensions. Next, at step 444, the multidimensional model manager44 determines traversals necessary to generate the view from the storagemodel 100 and a starting point for each traversal. The traversals aredefined by the specified dimensions and the starting point on entrydetermined based on how the model 100 is organized.

In one embodiment, the multidimensional model manager 44 retrieves afirst and a next record from the multidimensional storage model 100using a bottom-up, right-to-left recursive movement. In this embodiment,to retrieve the first record, the multidimensional model manager 44positions a first dimension selected for display to the first entrystorage value. Next, all parent entries, which are those to the left ofthe first entry, are positioned to their first entry storage value.Child entries, which are those to the right of the selected dimension,are also positioned to their first entry storage value. For the firstrecord, the multidimensional model manager 44 then retrieves values fordimensional entries at these positions. To retrieve the next record, themultidimensional manager 44 attempts to move the right-most child in theview. If the right-most child is movable, it is repositioned and thedata values fetched at the current positions within the multidimensionalstorage model 100. If the right-most child is not movable, themultidimensional model manager 44 attempts to move the parent of thatchild, which is the entry immediately to the left of the child. If theparent is movable, it is repositioned and the data values fetched attheir current positions in the multidimensional storage model 100. Ifthe parent cannot be moved, an attempt is made to move the parent ofthat parent, which is the entry immediately to the left of the firstparent, and the process repeated until no parents remain. At this point,the end of the process is reached. It will be understood that thetraversals and starting points within the multidimensional storage model100 may be otherwise suitably determined.

Proceeding to step 446, the multidimensional model manager 44 traversesthe multidimensional storage model 100 from the entry point acrossconnecting multidimensional links 380 to determine the existence and/orvalue at a specified intersection. At step 448, the multidimensionalstorage model 100 determines any value at the specified intersection.Next, at step 448, the multidimensional model manager 44 determineswhether additional traversals exist for the model 100. If additionaltraversals exist, the Yes branch of decisional step 450 returns to step446 and the remaining traversals are performed and intersectional valuescalculated until all traversals have been completed. The No branch ofdecisional step 450 then leads to step 452.

At step 452, data and information output from the multidimensionalstorage model 100 is summarized and sorted. It will be understood thatthe multidimensional storage model 100 may be otherwise configured topresort and summarize data. However, by separating the traversaloperation from the summarizing and sorting operations, processingefficiency is improved.

Next, at step 454, information output from the multidimensional storagemodel 100 is graphically displayed to the user in a requested view bythe viewers 124 on the client 110. Proceeding to decisional step 456, ifadditional views are requested, the Yes branch returns to step 442 inwhich the view request and specified dimensions are received and theprocess repeated until all requested views have been completed anddisplayed to the user. At this point, the No branch of decisional step456 leads to the end of the process. In this way, the businessintelligence portal 10 provides a multidimensional storage model 100 ofreduced size and improved processing speeds that support efficient pivotand drill operations during data analysis. In addition, a user cancreate new calculations to analyze data intersections that were notanticipated during the original definition of the model.

This reduces time and resources needed to support pivot and drilloperations. The additional views may include pivot views and datadrilling for high and low level analysis.

FIG. 11 is a screen diagram illustrating a display of related window 480in accordance with one embodiment of the present invention. Referring toFIG. 11, the display window 480 includes a menu bar 486 with a varietyof pull down menus 488 disposed along a top edge of the display window480. A tool bar 490 is disposed immediately below the menu bar 486.

The display window 480 further includes a catalog window 492 and aportfolio window 494 adjacent the catalog window 492. The catalog window492 displays a file hierarchy within the catalog 32. The portfoliowindow 494 displays the views linked by the action portfolio.

Within the portfolio window 494, each of the views is separatelydisplayed in a discrete view window 496. Storage of the views indiscrete files linked by the portfolio and display of the related viewswithin the portfolio window 494 allows related documents to be easilyorganized together and efficiently displayed to a user. In particular,the portfolio window 494 provides a common window with a single datainterface (SDI). The discrete view windows 496 are displayed within thecommon window in a multiple data interface (MDI). It will be understoodthat other types of related components may be discretely stored andlinked together for display through a compound file.

FIG. 12 is a screen diagram illustrating a display window 500 includingview buttons for navigating between related views in a portfolio inaccordance with one embodiment of the present invention. Referring toFIG. 12, the display window 500 includes a menu bar 502 with a varietyof pull down menus 504 disposed along a top edge of the display window500. A tool bar 506 is disposed immediately below the menu bar 502. Thedisplay window 500 includes a catalog window 508 and a portfolio window510 as previously described in connection with catalog window 492 andportfolio window 494.

In the illustrated embodiment, view windows 512 are maximized with theportfolio window 510 to provide optimized viewing. To allow navigationbetween the maximized windows, view buttons 514 are provided in responseto maximization of a window 512 and displayed as tabs along a top edgeof the portfolio window 510. The view buttons 514 are each operable todisplay an associated window 512 as the active window in response toactivation. This allows users to quickly and easily navigate between thewindows. As a result, users need to constantly move, close, open, andresize windows to view related data stored in disparate files. The viewbuttons may be otherwise displayed or generated in response to othersuitable events. For example, the view buttons may be generated any timea first window becomes at least substantially hidden from display by anoverlying window. Thus, as soon as a user indicates that a window shouldbe maximized, positioned, or displayed to cover a window, a view button514 may be generated for the window to be covered. The view buttons 514may be positioned independently of a corresponding window. Thus, theymay be displayed adjacent to or remote from a corresponding window.

Although the present invention has been described with severalembodiments, various changes and modifications may be suggested to oneskilled in the art. It is intended that the present invention encompasssuch changes and modifications as fall within the scope of the appendedclaims.

What is claimed is:
 1. A method for generating database queries,comprising: storing, at a server, a predefined query model for queryinga database; displaying an accessible portion of the predefined querymodel to a user at a client; receiving user edits to the accessibleportion of the predefined query model; generating a user-adapted querymodel at the client based on user edits to the accessible portion of thepredefined query model; and initiating a query of the database based onthe user-adapted query model.
 2. The method of claim 1, the act ofdisplaying the accessible portion of the predefined query modelcomprising displaying a graphical view of accessible data elementsdefining the predefined query model.
 3. The method of claim 1, whereinthe graphical view of accessible data elements comprises accessibletables, columns in the tables, and joins between the tables.
 4. Themethod of claim 1, further comprising: determining privileges of theuser to the predefined query model; and determining the accessibleportion of the predefined query model based on the user's privileges. 5.The method of claim 1, further comprising displaying only the accessibleportion of the predefined query model to the user.
 6. The method ofclaim 1, further comprising: determining privileges of the user to thepredefined query model; determining a protected portion of thepredefined query model based on the user's privileges; and concealingthe protected portion of the predefined query model from display to theuser.
 7. The method of claim 1, further comprising: determiningprivileges of the user to the predefined query model; determining aprotected portion of the predefined query model based on the user'sprivileges; and prohibiting edits to the protected portion of thepredefined query model by the user.
 8. The method of claim 1, whereinthe user-adapted query model comprises database table joins modifiedfrom the predefined query model.
 9. The method of claim 1, wherein theuser-adapted query model comprises a database table absent from thepredefined query model.
 10. The method of claim 1, further comprising:receiving a request from the user to edit the predefined query model;and displaying to the user a graphical view of at least an accessibleportion of data elements in the database.
 11. The method of claim 1,further comprising: automatically generating a database query based onthe user-adapted query model; and initiating the database query.
 12. Amethod for generating database queries in a business intelligenceportal, comprising: storing on a server a predefined query model forquerying a database; downloading at least an accessible portion of thepredefined query model to a client; displaying the accessible portion ofthe predefined query model at the client; receiving user edits to theaccessible portion of the predefined query model at the client;generating a user-adapted query model at the client based on user editsto the accessible portion of the predefined query model; and initiatinga query of the database based on the user-adapted query model.
 13. Themethod of claim 12, the act of displaying the accessible portion of thepredefined query model comprising displaying a graphical view ofaccessible data elements defining the predefined query model.
 14. Themethod of claim 12, wherein the graphical view of accessible dataelements comprises accessible tables, columns in the tables, and joinsbetween the tables.
 15. The method of claim 12, further comprising:determining privileges of the user to the predefined query model; anddetermining the accessible portion of the predefined query model basedon the user's privileges.
 16. The method of claim 12, further comprisingdisplaying only the accessible portion of the predefined query model atthe client.
 17. The method of claim 12, further comprising: determiningprivileges of the user to the predefined query model; determining aprotected portion of the predefined query model based on the user'sprivileges; and concealing the protected portion of the predefined querymodel from display at the client.
 18. The method of claim 12, furthercomprising: determining privileges of the user to the predefined querymodel; determining a protected portion of the predefined query modelbased on the user's privileges; and prohibiting edits to the protectedportion of the predefined query model at the client.
 19. The method ofclaim 12, wherein the user-adapted query model comprises database tablejoins modified from the predefined query model.
 20. The method of claim12, wherein the user-adapted query model comprises a database tableabsent from the predefined query model.
 21. The method of claim 12,further comprising: receiving a request to edit the predefined querymodel at the client; and displaying at the client a graphical view of atleast an accessible portion of data elements in the database.
 22. Themethod of claim 12, further comprising: generating at the server adatabase query based on the user-adapted query model; and initiating thedatabase query at the server.
 23. A method for generating databasequeries in a business intelligence portal, comprising: storing on aserver a predefined query model for querying a database; downloading atleast an accessible portion of the predefined query model to a client;displaying the accessible portion of the predefined query model at theclient; receiving user edits to the accessible portion of the predefinedquery model at the client; generating a user-adapted query model basedon user edits to the accessible portion of the predefined query model;initiating a query of the database based on the user-adapted querymodel; downloading the predefined query model to the client; generatingthe user-adapted query model at the client; uploading the user-adaptedquery model to the server; and initiating the query of the database atthe server.
 24. A system for generating database queries, comprising:software operable to: store on a server a predefined query model forquerying a database; display an accessible portion of the predefinedquery model to a user at a client; receive user edits to the accessibleportion of the predefined query model; generate a user-adapted querymodel at the client based on user edits to the accessible portion of thepredefined query model; and initiate a query of the database based onthe user-adapted query model.
 25. The system of claim 24, the act ofdisplaying the accessible portion of the predefined query modelcomprising displaying a graphical a graphical view of accessible dataelements defining the predefined query model.
 26. The system of claim24, wherein the graphical view of accessible data elements comprisesaccessible tables, columns in the tables, and joins between the tables.27. The system of claim 24, wherein the software is further operable to:determine privileges of the user to the predefined query model; anddetermine the accessible portion of the predefined query model based onthe user's privileges.
 28. The system of claim 24, wherein the softwareis further operable to display only the accessible portion of thepredefined query model to the user.
 29. The system of claim 24, whereinthe software is further operable to: determine privileges of the user tothe predefined query model; determine a protected portion of thepredefined query model based on the user's privileges; and conceal theprotected portion of the predefined query model from display to theuser.
 30. The system of claim 24, wherein the software is furtheroperable to: determine privileges of the user to the predefined querymodel; determine a protected portion of the predefined query model basedon the user's privileges; and prohibit edits to the protected portion ofthe predefined query model by the user.
 31. The system of claim 24,wherein the user-adapted query model comprises database table joinsmodified from the predefined query model.
 32. The system of claim 24,wherein the user-adapted query model comprises a database table absentfrom the predefined query model.
 33. The system of claim 24, wherein thesoftware is further operable to: receive a request from the user to editthe predefined query model; and display to the user a graphical view ofat least an accessible portion of data elements in the database.
 34. Thesystem of claim 24, wherein the software is further operable to:automatically generate a database query based on the user-adapted querymodel; and initiate the database query.
 35. A system for generatingdatabase queries in a business intelligence portal, comprising: softwareoperable to: store on a server a predefined query model for querying adatabase; download at least an accessible portion of the predefinedquery model to a client; display the accessible portion of thepredefined query model at the client; receive user edits to theaccessible portion of the predefined query model at the client; generatea user-adapted query model based on user edits to the accessible portionof the predefined query model; and initiate a query of the databasebased on the user-adapted query model.
 36. The system of claim 35,wherein the software is further operable to: generate the user-adaptedquery model at the client; upload the user-adapted query model to theserver; and initiate the query of the database at the server.
 37. Thesystem of claim 35, the act of displaying the accessible portion of thepredefined query model comprising the software displaying a graphicalview of accessible data elements defining the predefined query model.38. The system of claim 35, wherein the graphical view of accessibledata elements comprises accessible tables, columns in the tables, andjoins between the tables.
 39. The system of claim 35, wherein thesoftware is further operable to: determine privileges of the user to thepredefined query model; and determine the accessible portion of thepredefined query model based on the user's privileges.
 40. The system ofclaim 35, wherein the software is further operable to conceal thenon-accessible portion of the predefined query model at the client. 41.The system of claim 35, wherein the software is further operable to:determine privileges of the user to the predefined query model;determine a protected portion of the predefined query model based on theuser's privileges; and conceal the protected portion of the predefinedquery model from display at the client.
 42. The system of claim 35,wherein the software is further operable to: determine privileges of theuser to the predefined query model; determine a protected portion of thepredefined query model based on the user's privileges; and prohibitedits to the protected portion of the predefined query model at theclient.
 43. The system of claim 35, wherein the user-adapted query modelcomprises database table joins modified from the predefined query model.44. The system of claim 35, wherein the user-adapted query modelcomprises a database table absent from the predefined query model. 45.The system of claim 35, wherein the software is further operable to:receive a request to edit the predefined query model at the client; anddisplay at the client a graphical view of at least an accessible portionof data elements in the database.
 46. The system of claim 35, whereinthe software is further operable to: generate at the server a databasequery based on the user-adapted query model; and initiate the databasequery at the server.
 47. A system for generating database queries,comprising: means for storing, at a server, a predefined query model forquerying a database; means for displaying an accessible portion of thepredefined query model to a user at a client; means for receiving useredits to the accessible portion of the predefined query model; means forgenerating a user-adapted query model at the client based on user editsto the accessible portion of the predefined query model; and means forinitiating a query of the database based on the user-adapted querymodel.
 48. A system for generating database queries in a businessintelligence portal, comprising: means for storing on a server apredefined query model for querying a database; means for downloading atleast an accessible portion of the predefined query model to a client;means for displaying the accessible portion of the predefined querymodel at the client; means for receiving user edits to the accessibleportion of the predefined query model at the client; means forgenerating a user-adapted query model based on user edits to theaccessible portion of the predefined query model; and means forinitiating a query of the database based on the user-adapted querymodel.