Filters








982 Hits in 6.7 sec

Modular derby

Pawel Kowalski
2009
Database Management Systems (DBMS) rely on highly optimized engines. However the optimization process was driven by the context of self-contained systems.  ...  (Apache Derby) into functional units, that are going to be distributed across several physical machines.  ...  Embedded JDBC provides a JDBC driver to Derby which embeds the database management system inside a JDBC driver.  ... 
doi:10.3929/ethz-a-005906562 fatcat:rx2hryuhjzdzfnwl6jwvzoyb6a

Active Control of Memory for Java Virtual Machines and Applications

Norman Bobroff, Peter Westerink, Liana Fong
2014 IEEE International Conference on Autonomic Computing  
A controller is implemented to manage memory as an elastic resource similar to computing cycles for Java applications.  ...  The controller is based on a fair share policy in which memory is distributed to equalize the marginal performance value to all JVMs.  ...  Figures 2, 3 The derby database benchmark of Figure 2 (a) typifies workloads exhibiting the threshold memory pattern.  ... 
dblp:conf/icac/BobroffWF14 fatcat:jui2x2p6rbf6tkbec4oczahdki

Using in-memory encrypted databases on the cloud

Francesco Pagano, Davide Pagano
2011 2011 1st International Workshop on Securing Services on the Cloud (IWSSC)  
In this paper we propose to use an in-memory RDBMS with row-level data encryption for granting and revoking access rights to distributed data.  ...  Storing data in the cloud poses a number of privacy issues. A way to handle them is supporting data replication and distribution on the cloud via a local, centrally synchronized storage.  ...  ACKNOWLEDGMENT We wish to thank Ernesto Damiani, professor at Università di Milano, for helpful comments.  ... 
doi:10.1109/iwsscloud.2011.6049022 fatcat:e4uxo7l6bvct3jrp7lgpgtsaki

CumuloNimbo: A Cloud Scalable Multi-tier SQL Database

Ricardo Jiménez-Peris, Marta Patiño-Martínez, Bettina Kemme, Ivan Brondino, José Pereira, Ricardo Vilaça, Francisco Cruz, Rui Oliveira, Muhammad Yousuf Ahmad
2015 IEEE Data Engineering Bulletin  
The main novelty of CumuloNimbo is that it provides a standard SQL interface and full transactional support without resorting to sharding and no need to know the workload in advance.  ...  Java EE, Ruby on Rails, etc.), and scaling them out transparently, offering a full-fledged scalable Platform as a Service (PaaS) is much more complex due to the data and transaction management that must  ...  The system provides full transparency, syntactically and semantically. CumuloNimbo is highly distributed and each component can be scaled independently.  ... 
dblp:journals/debu/Jimenez-PerisPK15 fatcat:e5yzssa7jfc6fpigab5h32vaye

Drug Therapy and Prevalence of Erectile Dysfunction in the Massachusetts Male Aging Study Cohort

Carol A. Derby, Marilyn M. Barbour, Anne L. Hume, John B. McKinlay
2001 Pharmacotherapy  
complete drug database, provided the opportunity to examine drug- induced ED in a randomly selected cohort of men DYSFUNCTION Derby et al 677 the Boston, Massachusetts, area.  ...  Drugs later were coded by a classification system similar to that of the American Hospital Formulary Service For this analysis, drugs were classified into broad categories according to major drug classes  ... 
doi:10.1592/phco.21.7.676.34571 pmid:11401181 fatcat:jhskmsafpzczzb6ngtq4pgxx44

Nb-GCLOCK: A non-blocking buffer management based on the generalized CLOCK

Makoto Yui, Jun Miyazaki, Shunsuke Uemura, Hayato Yamana
2010 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)  
Concurrent access to the buffer management module is a major factor that prevents database scalability to processors.  ...  Therefore, we propose a nonblocking scheme for bufferfix operations that fix buffer frames for requested pages without locks by combining Nb-GCLOCK and a non-blocking hash table.  ...  for young scientists from the Japan Society for the Promotion of Science.  ... 
doi:10.1109/icde.2010.5447872 dblp:conf/icde/YuiMUY10 fatcat:bt5zm7tx2fgcbbehz4bjpzz4yi

Design, Implementation, and Evaluation of a Tight Integration of Database and Workflow Engines

Peter Reimann, Holger Schwarz, Bernhard Mitschang
2011 Journal of Information and Data Management  
This provides a common level of abstraction for both data-intensive workflows and classical orchestration workflows, e. g., business workflows, which then enables a comprehensive optimization across all  ...  Accessing and processing huge amounts of heterogeneous and distributed data are some of the major challenges of data-intensive workflows.  ...  The standard version of Apache ODE comes with a Java-based and embedded Apache Derby 7 database system.  ... 
dblp:journals/jidm/ReimannSM11 fatcat:tx4swvbkhngfrhjaegoh7xmzdm

Resco: Automatic Collection of Leaked Resources

Ziying DAI, Xiaoguang MAO, Yan LEI, Xiaomin WAN, Kerong BEN
2013 IEICE transactions on information and systems  
However, there are many other finite system resources that programmers must manage by themselves, such as sockets and database connections.  ...  A garbage collector relieves programmers from manual memory management and improves productivity and program reliability.  ...  The resource collector is implemented as a class RC based on the MMTK memory manager toolkit [12] that provides the memory management functionality for Jikes RVM.  ... 
doi:10.1587/transinf.e96.d.28 fatcat:ixibrkynfzdczmt4646o5cg4ky

OpenADR and Agreement Audit Architecture for a Complete Cycle of a Flexibility Solution

Antonio Parejo, Sebastián García, Enrique Personal, Juan Ignacio Guerrero, Antonio García, Carlos Leon
2021 Sensors  
This paper analyzes the implementation and architecture of a demand response solution based on OpenADR standard and its possible integration with a building management system through a use case.  ...  Nowadays, the presence of renewable generation systems and mobile loads (i.e., electric vehicle) spread throughout the distribution network is increasing.  ...  Furthermore, the authors want to thank Alejandro Gallardo Soto and Julian Rodríguez Galán for their help and support in the implementation of the control system in the laboratory.  ... 
doi:10.3390/s21041204 pmid:33572186 fatcat:4ozmpbros5g6hipadp2nskzbo4

Real-Time Analysis of Students' Activities on an E-Learning Platform based on Apache Spark

Abdelmajid Chaffai, Larbi Hassouni, Houda Anoun
2017 International Journal of Advanced Computer Science and Applications  
analytics on students' activities data and Apache Hive as a data warehouse for storing the processed data and for use by various reporting tools.  ...  To conceive this platform we conduct an experiment on Moodle database source.  ...  The main subsystems of Hadoop distributed system are (see 103 | P a g e www.ijacsa.thesai.org  HDFS: It is a distributed file system, inspired from the Google file system GFS [14] .When data is stored  ... 
doi:10.14569/ijacsa.2017.080715 fatcat:xqi4fxf6ebc2ta7belpgp5kyti

An Application-Aware Data Storage Model

Todd A. Anderson, Jim Griffioen
1999 USENIX Annual Technical Conference  
This new abstraction extends conventional abstractions by allowing applications to specify a le's volatility and methods for automatic reconstruction in case of loss.  ...  We describe a new application-controlled le persistence model in which applications select the desired stability from a range of persistence guarantees.  ...  Also thanks to the CS570 class for using the system during the fall 1998 semester.  ... 
dblp:conf/usenix/AndersonG99 fatcat:33awm2oanrdolmckbnka5hjgwy

The Road to Cyberinfrastructure at the Federal Reserve Bank of Kansas City

BJ Lougee, Tim Morley, Mark Watson
2018 Technical Briefings  
The Federal Reserve Bank of Kansas City's (FRBKC) Center for the Advancement of Data and Research in Economics (CADRE) has transformed computing, and in particular High Performance Computing (HPC), for  ...  The data warehousing group began work in late 2008 to provide an environment for researchers to work with data stored in a relational database management system (RDBMS).  ...  The computational demands of current research might rely on large distributed memory jobs (where each processor has its own memory), shared memory jobs (where there is a single memory space used by all  ... 
doi:10.18651/tb/tb1802 fatcat:mex4xrnyrzaspb4zjcncz7dcqu

iPrivacy: a Distributed Approach to Privacy on the Cloud [article]

Ernesto Damiani, Francesco Pagano, Davide Pagano
2015 arXiv   pre-print
Data is shared in a secure manner using a simple grant-and-revoke permission of shared data and we have developed a system test implementation, using an in-memory RDBMS with row-level data encryption for  ...  To handle them, we present an approach where confidential data is stored in a highly distributed database, partly located on the cloud and partly on the clients.  ...  In memory databases An in-memory database (IMDB, also known as main memory database system or MMDB and as real-time database or RTDB) is a database management system that primarily relies on main memory  ... 
arXiv:1503.07994v1 fatcat:fyu5o4ksqbhepaslwthzso4x4m

Memory and Resource Leak Defects and their Repairs in Java Projects [article]

Mohammadreza Ghanavati, Diego Costa, Janos Seboek, David Lo, Artur Andrzejak
2018 arXiv   pre-print
Despite huge software engineering efforts and programming language support, resource and memory leaks are still a troublesome issue, even in memory-managed languages such as Java.  ...  We find that manual code inspection and manual runtime detection are still the main methods for leak detection.  ...  For example, DERBY-5730 25 reported a severe memory leak which might lead to a system crash due to an out-of-memory error.  ... 
arXiv:1810.00101v1 fatcat:jo3q3jwfhvhzzi5cxdym64cemq

Memory and resource leak defects and their repairs in Java projects

Mohammadreza Ghanavati, Diego Costa, Janos Seboek, David Lo, Artur Andrzejak
2019 Empirical Software Engineering  
Despite huge software engineering efforts and programming language support, resource and memory leaks are still a troublesome issue, even in memory-managed languages such as Java.  ...  We find that manual code inspection and manual runtime detection are still the main methods for leak detection.  ...  For example, DERBY-5730 25 reported a severe memory leak which might lead to a system crash due to an out-of-memory error.  ... 
doi:10.1007/s10664-019-09731-8 fatcat:irjag2wsmbfmzogzgpy6apso4q
« Previous Showing results 1 — 15 out of 982 results