Filters








713 Hits in 5.6 sec

Piggyback Statistics Collection for Query Optimization: Towards a Self-Maintaining Database Management System

Q. Zhu
2004 Computer journal  
A database management system (DBMS) performs query optimization based on statistical information about data in the underlying database.  ...  Out-of-date statistics may lead to inefficient query processing in the system.  ...  The work of this paper was originally inspired by our earlier study on related issues in a multidatabase system [31] , and the preliminary work of this paper was presented at two IBM CAS Conferences  ... 
doi:10.1093/comjnl/47.2.221 fatcat:mrp73wqonjgc3oacwkuhjoqnca

Capsule Reviews

2004 Computer journal  
the presentation for a while and then restarting it, and scaling down or up the presentation speed).  ...  In multimedia Systems, however, it is vital to integrate several media streams (e.g. video, audio, text and image).  ...  Piggyback Statistics Collection for Query Optimization: Towards a Self-Maintaining Database Management System. Q. Zhu, B. Dunkel, W. Lau, S. Chen and B.  ... 
doi:10.1093/comjnl/47.2.137 fatcat:vbufakrx5badzb7rx6vsfaquim

Automated Statistics Collection in DB2 UDB [chapter]

A. Aboulnaga, P. Haas, M. Kandil, S. Lightstone, G. Lohman, V. Markl, I. Popivanov, V. Raman
2004 Proceedings 2004 VLDB Conference  
The use of inaccurate or outdated database statistics by the query optimizer in a relational DBMS often results in a poor choice of query execution plans and hence unacceptably long query processing times  ...  ASC uses these two sources of information to automatically decide which statistics to collect and when to collect them.  ...  Introduction Query optimizers employ database statistics to determine the best execution strategy for a query.  ... 
doi:10.1016/b978-012088469-8.50100-5 dblp:conf/vldb/AboulnagaHLLMPR04 fatcat:ykz6hmdpvzduzjxuhogtvd3fja

Automated Statistics Collection in DB2 UDB [chapter]

A ABOULNAGA, P HAAS, M KANDIL, S LIGHTSTONE, G LOHMAN, V MARKL, I POPIVANOV, V RAMAN
2004 Proceedings 2004 VLDB Conference  
The use of inaccurate or outdated database statistics by the query optimizer in a relational DBMS often results in a poor choice of query execution plans and hence unacceptably long query processing times  ...  ASC uses these two sources of information to automatically decide which statistics to collect and when to collect them.  ...  Introduction Query optimizers employ database statistics to determine the best execution strategy for a query.  ... 
doi:10.1016/b978-012088469-8/50100-5 fatcat:aj3m3oh6ujhithdw5f34d6xfju

The CORDS multidatabase project

G. K. Attaluri, D. P. Bradshaw, N. Coburn, P. A. Larson, P. Martin, A. Silberschatz, J. Slonim, Q. Zhu
1995 IBM Systems Journal  
In virtually every organization, data are stored in a variety of ways and managed by different database and file systems.  ...  This paper provides an overview of the system architecture and describes the approaches taken in the following areas: management of catalog information, schema integration, global query optimization, (  ...  Paulley (query optimization, IMS agent, ORACLE agent), Wendy Powley (prototype implementation), Zhanpeng Wang (schema integration), Weipeng Yan (user interface and query optimization), and Jianchun Zhang  ... 
doi:10.1147/sj.341.0039 fatcat:qwbj6vx4zfbt5ogd2hdxzngt3m

Review on Implementing Security using SDBaaS

Miss. Arpita R. Malpe, Prof Tijare P. A., Prof Thakare G.S.
2017 IARJSET  
Setting important facts within the arms of a cloud provider must include the guarantee of safety and availability for facts at rest, in movement, and in use.  ...  To keep data confidentiality, clients want to store their data to servers in encrypted form. At the identical time, customers ought to still be capable of execute queries over encrypted data.  ...  CryptDB, a machine that explores an intermediate design point to offer confidentiality for applications that use database management systems (DBMS).  ... 
doi:10.17148/iarjset.2017.4116 fatcat:ibucbns3vvfffgshipsu2ho2h4

Exploiting soft and hard correlations in big data query optimization

Hai Liu, Dongqing Xiao, Pankaj Didwania, Mohamed Y. Eltabakh
2016 Proceedings of the VLDB Endowment  
In this paper, we propose the EXORD system to fill in this gap by exploiting the data's correlations in big data query optimization.  ...  Since the data is big, it is very challenging to validate such correlations, judge their worthiness, and put strategies for utilizing them in query optimization.  ...  Instead, the system waits for the first user's job that is going to scan the data anyway, and then piggybacks the statistics collection task over this job.  ... 
doi:10.14778/2994509.2994519 fatcat:u76ze6fdnzbkvj7eifqqagh7ci

An overview of data warehousing and OLAP technology

Surajit Chaudhuri, Umeshwar Dayal
1997 SIGMOD record  
Many commercial products and services are now available, and all of the principal database management system vendors now have offerings in these areas.  ...  for efficient query processing; and tools for metadata management and for managing the warehouse.  ...  Acknowledgement We thank Goetz Graefe for his comments on the draft.  ... 
doi:10.1145/248603.248616 fatcat:ssiegmooy5bujdawwxoseke2my

Progressive optimization in a shared-nothing parallel database

Wook-Shin Han, Jack Ng, Volker Markl, Holger Kache, Mokhtar Kandil
2007 Proceedings of the 2007 ACM SIGMOD international conference on Management of data - SIGMOD '07  
Queries used in such large data warehouses can contain complex predicates as well as multiple joins, and the resulting query execution plans generated by the optimizer may be suboptimal due to mis-estimates  ...  Extending the serial POP to a parallel environment is a challenging problem since we need to determine when and how we can trigger re-optimization based on cardinalities collected from multiple independent  ...  Due to the large quantities of data needed to be analyzed (or "mined"), OLAP systems are generally backed by a large data warehouse implemented on a sophisticated parallel database management system (DBMS  ... 
doi:10.1145/1247480.1247569 dblp:conf/sigmod/HanNMKK07 fatcat:rtweo2qkezhrbfym3dys3ik3de

Amoeba

Anil Shanbhag, Alekh Jindal, Yi Lu, Samuel Madden
2016 Proceedings of the VLDB Endowment  
Data partitioning significantly improves the query performance in distributed database systems.  ...  A large number of techniques have been proposed to efficiently partition a dataset for a given query workload.  ...  The system exposes a relational storage manager, consisting of a collection of tables, with support for predicate-based data access i.e. scan a table with a set of predicates to filter over returns a subset  ... 
doi:10.14778/3007263.3007311 fatcat:ngyvsgayerh6xjdn3erw3he7bq

Robust query processing

Goetz Graefe
2011 2011 IEEE 27th International Conference on Data Engineering  
The seminar strove to build a unified view across the loosely-coupled system components responsible for the various stages of database query processing.  ...  Participants were chosen for their experience with database query processing and, where possible, their prior work in academic research or in product development towards robustness in database query processing  ...  Progressive query optimization for federated queries. In EDBT, pages 847-864, 2006. 61. S. Ewen, M. Ortega-Binderberger, and V. Markl. A learning optimizer for a federated database management system.  ... 
doi:10.1109/icde.2011.5767961 dblp:conf/icde/Graefe11 fatcat:7jwx6qukinbvlad4df2a5aumgq

Discovering and exploiting keyword and attribute-value co-occurrences to improve P2P routing indices

Sebastian Michel, Matthias Bender, Nikos Ntarmos, Peter Triantafillou, Gerhard Weikum, Christian Zimmer
2006 Proceedings of the 15th ACM international conference on Information and knowledge management - CIKM '06  
These decisions are based on statistical summaries for each peer, which are usually organized on a per-keyword basis and managed in a distributed directory of routing indices.  ...  Peer-to-Peer (P2P) search requires intelligent decisions for query routing: selecting the best peers to which a given query, initiated at some peer, should be forwarded for retrieving additional search  ...  We plan to address adaptive run-time adjustments to execution plans and other aspects of dynamic query optimization in P2P systems. 1 . 1 First, p(a) contacts p(b) to retrieve the overall hash sketch HS  ... 
doi:10.1145/1183614.1183643 dblp:conf/cikm/MichelBNTWZ06 fatcat:lmjspbodn5c43kosmgk3da7hpy

Architectural Alternatives for Information Filtering in Structured Overlays

Christos Tryfonopoulos, Christian Zimmer, Gerhard Weikum, Manolis Koubarakis
2007 IEEE Internet Computing  
Peer-to-peer information filtering is a promising approach that offers scalability, adaptivity to high dynamics, and failure resilience.  ...  This article highlights the two approaches' main characteristics, presents the issues and trade-offs involved in their design, and compares them in terms of scalability, efficiency, and filtering effectiveness  ...  The iterative method optimizes latency because messages are sent in parallel. • The recursive method.  ... 
doi:10.1109/mic.2007.79 fatcat:r6rhrc5skvcmviq5livgz6sace

Continuous cloud-scale query optimization and processing

Nicolas Bruno, Sapna Jain, Jingren Zhou
2013 Proceedings of the VLDB Endowment  
structure, and improve query latency by a few folds for real workloads.  ...  In this paper we propose novel techniques to adapt query processing in the Scope system, the cloud-scale computation environment in Microsoft Online Services.  ...  The idea is to instrument queries and piggybacking statistics collection with its normal execution, in a similar way as our approach.  ... 
doi:10.14778/2536222.2536223 fatcat:cqu63teeoneynjxqxsq7som2sy

Preventing Information Leakage Caused by War Driving Attacks in Wi-Fi Networks

M. Elhamahmy, T. Sobh
2011 International Conference on Aerospace Sciences and Aviation Technology  
The statistical reports provide the machine-user with complete information about who, what and where in the user-machine a remote user tries to have an access.  ...  It aims to prevent the information leakage on the node machine connected to a Wi-Fi network. It also provides statistical reports that include useful data about the file access on the user-machine.  ...  This is ineffective as a security method because the SSID is broadcast in the clear in response to a client SSID query.  ... 
doi:10.21608/asat.2011.23405 fatcat:sdeqcbjm35agtlgogvk4cu7k7e
« Previous Showing results 1 — 15 out of 713 results