Filters








17,128 Hits in 5.1 sec

A Review on Query Optimization in Generic RDBMS

Purushottam Patel
2019 International Journal for Research in Applied Science and Engineering Technology  
The Objective of this research is to discuss about technique used by the oracle for query and to present a comparative study of the various costs involve executing join and the LIKE predicate based queries  ...  It is the responsibility of the query processor to transform the query as entered by the user into an equivalent query that can be computed more efficiently.  ...  Query optimizers are typically 'cost-based'. In a cost-based optimization strategy, multiple execution plans are generated for a given query, and then an estimated cost is computed for each plan.  ... 
doi:10.22214/ijraset.2019.3021 fatcat:zirwkihi3vbabbasvpwvrpyv4m

Development of Query Transformation Method by Cost Optimization

Aigerim Bakatkaliyevna Altayeva, Youngmi Yoon, Young Im Cho
2016 International Journal of Fuzzy Logic and Intelligent Systems  
This cost-based point of view means considering the cost whenever queries are transformed for execution.  ...  To reduce the transformation time (cost reduction) during execution, we propose an optimal query transformation method by exploring queries from a cost-based point of view.  ...  Oracle performs multiple query transformations, some of which are cost based and others are heuristic based.  ... 
doi:10.5391/ijfis.2016.16.1.36 fatcat:rmlqhq2adjhv3opcfzhphkjke4

Of snowstorms and bushy trees

Rafi Ahmed, Rajkumar Sen, Meikel Poess, Sunil Chakkappen
2014 Proceedings of the VLDB Endowment  
This paper describes a technique for bushy join tree optimization for snowstorm queries in Oracle database system.  ...  The paper describes an algorithm for generating optimal bushy join trees for snowstorm queries using an existing query transformation framework.  ...  Cost-Based Transformation Framework Query transformations in the Oracle optimizer can be heuristicbased or cost-based.  ... 
doi:10.14778/2733004.2733017 fatcat:hzeisuivhbbttixxlg6gs7puza

Query processing and optimization in Oracle Rdb

Gennady Antoshenkov, Mohamed Ziauddin
1996 The VLDB journal  
This paper contains an overview of the technology used in the query processing and optimization component of Oracle Rdb, a relational database management system originally developed by Digital Equipment  ...  Oracle Rdb is a production system that supports the most demanding database applications, runs on multiple platforms and in a variety of environments.  ...  Query transformation The earliest query transformation in Oracle Rdb takes place in the SQL front end.  ... 
doi:10.1007/s007780050026 fatcat:it56qwgzprestnotilpxym2ium

Intelligent Data Engineering for Migration to NoSQL based Secure Environments

Shabana Ramzan, Imran Sarwar Bajwa, Bushra Ramzan, Waheed Anwar
2019 IEEE Access  
The first phase is the transformation of a relational database to Oracle NoSQL database through model transformation.  ...  Due to improved proficiency of Big Data solution in handling data, such as NoSQL caused the developers in the previous decade to start preferring big data databases, such as Apache Cassandra, Oracle, and  ...  The relational metamodel is shown in Fig. 4 and Oracle NoSQL metamodel is shown in Fig. 5 . We proposed Java based MDD (Model-Driven Development) approach to implement model transformations.  ... 
doi:10.1109/access.2019.2916912 fatcat:yh6jktxo6baxbe4ittvkciwcrm

Get Out of my Picture! Internet-based Inpainting

Oliver Whyte, Josef Sivic, Andrew Zisserman
2009 Procedings of the British Machine Vision Conference 2009  
Each of the retrieved images is first geometrically then photometrically registered with the query photograph.  ...  Geometric registration is achieved using multiple homographies and photometric registration is performed using a global affine transformation on image intensities.  ...  Acknowledgements We would like to thank James Hays and Alyosha Efros for supplying their result in Figure 6 . This research is funded by ANR project ANR-07-BLAN-0331-01.  ... 
doi:10.5244/c.23.116 dblp:conf/bmvc/WhyteSZ09 fatcat:5m4hl7hjxfa4tfb4o3c4kfxhsy

Adaptive statistics in Oracle 12c

Sunil Chakkappen, Suratna Budalakoti, Ramarajan Krishnamachari, Satyanarayana R Valluri, Alan Wood, Mohamed Zait
2017 Proceedings of the VLDB Endowment  
At the center of a query optimizer is a cost model that consumes the above information and helps the optimizer make decisions related to query transformations, join order, join methods, access paths, and  ...  The query optimizer is the component in a DBMS responsible for finding the best execution plan for a given SQL statement based on statistics, access structures, location, and format.  ...  The query transformation layer calls PG to get the cost for both forms of the statement and chooses the one with the least cost [1] .  ... 
doi:10.14778/3137765.3137785 fatcat:rgypno2ahfhj5p73xnnbpmo334

Securing SQLJ Source Codes from Business Logic Disclosure by Data Hiding Obfuscation [article]

Praveen Sivadasan, P. Sojan Lal
2012 arXiv   pre-print
Oracle 8i, 9i and 11g Databases support SQLJ framework allowing embedding of SQL statements in Java Programs and providing programmer friendly means to access the Oracle database.  ...  To the best of our knowledge, strong and cost effective techniques exist for Oracle Database security, but still data security techniques are lacking for client side applications, giving possibility for  ...  Figure 2 SQLJ Translator Framework Oracle JDeveloper10g is a Java-based Integrated Development Environment(IDE) for SQLJ programming.  ... 
arXiv:1205.4813v1 fatcat:iunhgmnry5afdmw46xv6fgdp4a

Security Enhancements by OR-Proof in Identity-Based Identification [chapter]

Atsushi Fujioka, Taiichi Saito, Keita Xagawa
2012 Lecture Notes in Computer Science  
We investigate three security enhancement transformations, based on the well known OR-proof technique, in identity-based identification (IBI) protocols and show a required condition of the underlying IBI  ...  In addition, we argue that enhancing the security in the static identity attack model with two of the transformations seem to be difficult; however, we prove that the other can convert an IBI protocol,  ...  In the simulation of the Conv oracle, CV generates two queries from the received query, sends the two queries to the external Conv oracles, and constructs an answer from two replies from the Conv oracle  ... 
doi:10.1007/978-3-642-31284-7_9 fatcat:m222ca65ynh6zpc3ne2tksr55i

Secure universal designated verifier identity-based signcryption

Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn, Shengyuan Zhang
2013 Security and Communication Networks  
We also give the formal security proofs for our scheme under the random oracle model.  ...  We give the formal definitions and a concrete construction of universal designated verifier identity-based signcryption scheme.  ...  + Cost (Encryption).  ... 
doi:10.1002/sec.820 fatcat:jjkuemrdjzg3hpu2b52do64pli

Generic Transformation from Weakly to Strongly Unforgeable Signatures

Qiong Huang, Duncan S. Wong, Jin Li, Yi-Ming Zhao
2008 Journal of Computer Science and Technology  
In this paper, we propose a new generic transformation technique which converts any unforgeable signature scheme into a strongly unforgeable one without modifying any component in the original key pair  ...  Besides, it is shown in this paper that our transformation can further be applied to schemes satisfying only a weak variant of unforgeability without any further modification.  ...  Query: A runs for time t and issues q signing queries to a signing oracle in an adaptive manner, that is, for each i, 1 i q, A chooses a message m (i) based on the messagesignature pairs that A has already  ... 
doi:10.1007/s11390-008-9126-y fatcat:dnzugsf25fe7nckxt3x2dqwhyi

An Ontological Approach to Oracle BPM [chapter]

Jean Prater, Ralf Mueller, Bill Beauregard
2012 Lecture Notes in Computer Science  
BPMN 2.0, the Service Component Architecture Assembly Model, Web Service definitions (in the form of WSDL), XSLT transformations, for example are all based on well defined but varying type models.  ...  A key principle in DoD Business Transformation is its focus on data ontology.  ... 
doi:10.1007/978-3-642-29923-0_30 fatcat:wirnyqhckvcjzc43wy7o4irq7q

Multi-instance multi-label active learning

Sheng-Jun Huang, Nengneng Gao, Songcan Chen
2017 Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence  
This algorithm designs a novel query strategy for MIML objects specifically and acquires more precise information from the oracle without addition cost.  ...  Based on the queried information, the MIML model is then effectively trained by simultaneously optimizing the relative rank among instances and labels.  ...  That means without further cost, we can ask the oracle to feedback more precise information in addition to bag-label relevance, i.e., indicate the key instance that trigger the queried label.  ... 
doi:10.24963/ijcai.2017/262 dblp:conf/ijcai/HuangGC17 fatcat:yxmwntkdqjdcnlyzxbkssbkv44

Information sharing with the Oracle database

Deiter Gawlick, Shailendra Mishra
2003 Proceedings of the 2nd international workshop on Distributed event-based systems - DEBS '03  
Leveraging the existing database infrastructure, Oracle created a solution to this problem. The solution is state of the art in terms of functionality and operational characteristics.  ...  This Oracle technology is widely used and supports many highly visible applications.  ...  ETL (Extraction, Transformation, Loading) based on Oracle Streams technology provides upto-date information.  ... 
doi:10.1145/966618.966640 dblp:conf/debs/GawlickM03 fatcat:folomnhuujcclbe5arek7k4m3y

Information sharing with the Oracle database

Deiter Gawlick, Shailendra Mishra
2003 Proceedings of the 2nd international workshop on Distributed event-based systems - DEBS '03  
Leveraging the existing database infrastructure, Oracle created a solution to this problem. The solution is state of the art in terms of functionality and operational characteristics.  ...  This Oracle technology is widely used and supports many highly visible applications.  ...  ETL (Extraction, Transformation, Loading) based on Oracle Streams technology provides upto-date information.  ... 
doi:10.1145/966637.966640 fatcat:fjx4zbyebjclvfkildymtnr6bu
« Previous Showing results 1 — 15 out of 17,128 results