A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Review on Query Optimization in Generic RDBMS
2019
International Journal for Research in Applied Science and Engineering Technology
The Objective of this research is to discuss about technique used by the oracle for query and to present a comparative study of the various costs involve executing join and the LIKE predicate based queries ...
It is the responsibility of the query processor to transform the query as entered by the user into an equivalent query that can be computed more efficiently. ...
Query optimizers are typically 'cost-based'. In a cost-based optimization strategy, multiple execution plans are generated for a given query, and then an estimated cost is computed for each plan. ...
doi:10.22214/ijraset.2019.3021
fatcat:zirwkihi3vbabbasvpwvrpyv4m
Development of Query Transformation Method by Cost Optimization
2016
International Journal of Fuzzy Logic and Intelligent Systems
This cost-based point of view means considering the cost whenever queries are transformed for execution. ...
To reduce the transformation time (cost reduction) during execution, we propose an optimal query transformation method by exploring queries from a cost-based point of view. ...
Oracle performs multiple query transformations, some of which are cost based and others are heuristic based. ...
doi:10.5391/ijfis.2016.16.1.36
fatcat:rmlqhq2adjhv3opcfzhphkjke4
Of snowstorms and bushy trees
2014
Proceedings of the VLDB Endowment
This paper describes a technique for bushy join tree optimization for snowstorm queries in Oracle database system. ...
The paper describes an algorithm for generating optimal bushy join trees for snowstorm queries using an existing query transformation framework. ...
Cost-Based Transformation Framework Query transformations in the Oracle optimizer can be heuristicbased or cost-based. ...
doi:10.14778/2733004.2733017
fatcat:hzeisuivhbbttixxlg6gs7puza
Query processing and optimization in Oracle Rdb
1996
The VLDB journal
This paper contains an overview of the technology used in the query processing and optimization component of Oracle Rdb, a relational database management system originally developed by Digital Equipment ...
Oracle Rdb is a production system that supports the most demanding database applications, runs on multiple platforms and in a variety of environments. ...
Query transformation The earliest query transformation in Oracle Rdb takes place in the SQL front end. ...
doi:10.1007/s007780050026
fatcat:it56qwgzprestnotilpxym2ium
Intelligent Data Engineering for Migration to NoSQL based Secure Environments
2019
IEEE Access
The first phase is the transformation of a relational database to Oracle NoSQL database through model transformation. ...
Due to improved proficiency of Big Data solution in handling data, such as NoSQL caused the developers in the previous decade to start preferring big data databases, such as Apache Cassandra, Oracle, and ...
The relational metamodel is shown in Fig. 4 and Oracle NoSQL metamodel is shown in Fig. 5 . We proposed Java based MDD (Model-Driven Development) approach to implement model transformations. ...
doi:10.1109/access.2019.2916912
fatcat:yh6jktxo6baxbe4ittvkciwcrm
Get Out of my Picture! Internet-based Inpainting
2009
Procedings of the British Machine Vision Conference 2009
Each of the retrieved images is first geometrically then photometrically registered with the query photograph. ...
Geometric registration is achieved using multiple homographies and photometric registration is performed using a global affine transformation on image intensities. ...
Acknowledgements We would like to thank James Hays and Alyosha Efros for supplying their result in Figure 6 . This research is funded by ANR project ANR-07-BLAN-0331-01. ...
doi:10.5244/c.23.116
dblp:conf/bmvc/WhyteSZ09
fatcat:5m4hl7hjxfa4tfb4o3c4kfxhsy
Adaptive statistics in Oracle 12c
2017
Proceedings of the VLDB Endowment
At the center of a query optimizer is a cost model that consumes the above information and helps the optimizer make decisions related to query transformations, join order, join methods, access paths, and ...
The query optimizer is the component in a DBMS responsible for finding the best execution plan for a given SQL statement based on statistics, access structures, location, and format. ...
The query transformation layer calls PG to get the cost for both forms of the statement and chooses the one with the least cost [1] . ...
doi:10.14778/3137765.3137785
fatcat:rgypno2ahfhj5p73xnnbpmo334
Securing SQLJ Source Codes from Business Logic Disclosure by Data Hiding Obfuscation
[article]
2012
arXiv
pre-print
Oracle 8i, 9i and 11g Databases support SQLJ framework allowing embedding of SQL statements in Java Programs and providing programmer friendly means to access the Oracle database. ...
To the best of our knowledge, strong and cost effective techniques exist for Oracle Database security, but still data security techniques are lacking for client side applications, giving possibility for ...
Figure 2 SQLJ Translator Framework Oracle JDeveloper10g is a Java-based Integrated Development Environment(IDE) for SQLJ programming. ...
arXiv:1205.4813v1
fatcat:iunhgmnry5afdmw46xv6fgdp4a
Security Enhancements by OR-Proof in Identity-Based Identification
[chapter]
2012
Lecture Notes in Computer Science
We investigate three security enhancement transformations, based on the well known OR-proof technique, in identity-based identification (IBI) protocols and show a required condition of the underlying IBI ...
In addition, we argue that enhancing the security in the static identity attack model with two of the transformations seem to be difficult; however, we prove that the other can convert an IBI protocol, ...
In the simulation of the Conv oracle, CV generates two queries from the received query, sends the two queries to the external Conv oracles, and constructs an answer from two replies from the Conv oracle ...
doi:10.1007/978-3-642-31284-7_9
fatcat:m222ca65ynh6zpc3ne2tksr55i
Secure universal designated verifier identity-based signcryption
2013
Security and Communication Networks
We also give the formal security proofs for our scheme under the random oracle model. ...
We give the formal definitions and a concrete construction of universal designated verifier identity-based signcryption scheme. ...
+ Cost (Encryption). ...
doi:10.1002/sec.820
fatcat:jjkuemrdjzg3hpu2b52do64pli
Generic Transformation from Weakly to Strongly Unforgeable Signatures
2008
Journal of Computer Science and Technology
In this paper, we propose a new generic transformation technique which converts any unforgeable signature scheme into a strongly unforgeable one without modifying any component in the original key pair ...
Besides, it is shown in this paper that our transformation can further be applied to schemes satisfying only a weak variant of unforgeability without any further modification. ...
Query: A runs for time t and issues q signing queries to a signing oracle in an adaptive manner, that is, for each i, 1 i q, A chooses a message m (i) based on the messagesignature pairs that A has already ...
doi:10.1007/s11390-008-9126-y
fatcat:dnzugsf25fe7nckxt3x2dqwhyi
An Ontological Approach to Oracle BPM
[chapter]
2012
Lecture Notes in Computer Science
BPMN 2.0, the Service Component Architecture Assembly Model, Web Service definitions (in the form of WSDL), XSLT transformations, for example are all based on well defined but varying type models. ...
A key principle in DoD Business Transformation is its focus on data ontology. ...
doi:10.1007/978-3-642-29923-0_30
fatcat:wirnyqhckvcjzc43wy7o4irq7q
Multi-instance multi-label active learning
2017
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence
This algorithm designs a novel query strategy for MIML objects specifically and acquires more precise information from the oracle without addition cost. ...
Based on the queried information, the MIML model is then effectively trained by simultaneously optimizing the relative rank among instances and labels. ...
That means without further cost, we can ask the oracle to feedback more precise information in addition to bag-label relevance, i.e., indicate the key instance that trigger the queried label. ...
doi:10.24963/ijcai.2017/262
dblp:conf/ijcai/HuangGC17
fatcat:yxmwntkdqjdcnlyzxbkssbkv44
Information sharing with the Oracle database
2003
Proceedings of the 2nd international workshop on Distributed event-based systems - DEBS '03
Leveraging the existing database infrastructure, Oracle created a solution to this problem. The solution is state of the art in terms of functionality and operational characteristics. ...
This Oracle technology is widely used and supports many highly visible applications. ...
ETL (Extraction, Transformation, Loading) based on Oracle Streams technology provides upto-date information. ...
doi:10.1145/966618.966640
dblp:conf/debs/GawlickM03
fatcat:folomnhuujcclbe5arek7k4m3y
Information sharing with the Oracle database
2003
Proceedings of the 2nd international workshop on Distributed event-based systems - DEBS '03
Leveraging the existing database infrastructure, Oracle created a solution to this problem. The solution is state of the art in terms of functionality and operational characteristics. ...
This Oracle technology is widely used and supports many highly visible applications. ...
ETL (Extraction, Transformation, Loading) based on Oracle Streams technology provides upto-date information. ...
doi:10.1145/966637.966640
fatcat:fjx4zbyebjclvfkildymtnr6bu
« Previous
Showing results 1 — 15 out of 17,128 results