• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 466
Next 10 →

Equivalences of Read-Only Queries on an Object-Oriented Database

by Simon Brown And, Simon Brown
"... Based on previous work that defines the semantics of read-only queries on an objectoriented database we present a set of proofs showing useful properties of queries. It is shown that certain equivalences exist between particular query forms and that general results can be shown about particular quer ..."
Abstract - Add to MetaCart
Based on previous work that defines the semantics of read-only queries on an objectoriented database we present a set of proofs showing useful properties of queries. It is shown that certain equivalences exist between particular query forms and that general results can be shown about particular

Processing Read-Only Queries Over Views With Generalization

by unknown authors
"... appi oa(. h ..."
Abstract - Add to MetaCart
appi oa(. h

IMPLEMENTATION OF COLUMN-ORIENTED DATABASE IN POSTGRESQL FOR OPTIMIZATION OF READ-ONLY QUERIES

by Aditi D. Andurkar
"... The era of column-oriented database systems has truly begun with open source database systems like C-Store, MonetDb, LucidDb and commercial ones like Vertica. Column-oriented database stores data column-by-column which means it stores information of single attribute collectively. The need for Column ..."
Abstract - Add to MetaCart
The era of column-oriented database systems has truly begun with open source database systems like C-Store, MonetDb, LucidDb and commercial ones like Vertica. Column-oriented database stores data column-by-column which means it stores information of single attribute collectively. The need for Column-oriented database arose from the need of business intelligence for efficient decision making where traditional row-oriented database gives poor performance. PostgreSql is an open source row-oriented and most widely used relational database management system which does not have facility for storing data in column-oriented fashion. In our work we propose the best method for implementing column-store on top of rowstore in PostgreSql along with successful design and implementation of the same.

Read-Only Transactions in a Distributed Database

by Hector Garcia-molina - ACM Transactions on Database Systems , 1982
"... A read-only transaction or query is a transaction which does not modify any data. Read-only transactions could be processed with general transaction processing algorithms, but in many cases it is more efficient to process read-only transactions with special algorithms which take advantage of the kno ..."
Abstract - Cited by 86 (2 self) - Add to MetaCart
A read-only transaction or query is a transaction which does not modify any data. Read-only transactions could be processed with general transaction processing algorithms, but in many cases it is more efficient to process read-only transactions with special algorithms which take advantage

Multi-attribute range queries in read-only DHT

by Verdi March, Yong Meng Teo - in ‘Proc. of the 15th IEEE Conf. on Computer Communications and Networks (ICCCN 2006 , 2005
"... Abstract — R-DHT is a class of DHT whereby each node supports “read-only ” accesses to its key-value pairs, but does not allow key-value pairs belonging to other nodes to be written on it. Recently, supporting efficient multi-attribute range queries on DHT has been an active area of research. This p ..."
Abstract - Cited by 6 (3 self) - Add to MetaCart
Abstract — R-DHT is a class of DHT whereby each node supports “read-only ” accesses to its key-value pairs, but does not allow key-value pairs belonging to other nodes to be written on it. Recently, supporting efficient multi-attribute range queries on DHT has been an active area of research

Scalable Processing of Read-Only Transactions in Broadcast Push

by Evaggelia Pitoura, Panos K. Chrysanthis - IN BROADCAST PUSH, IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS , 1999
"... Recently, push-based delivery has attracted considerable attention as a means of disseminating information to large client populations in both wired and wireless settings. In this paper, we address the problem of ensuring the consistency and currency of client read-only transactions in the presence ..."
Abstract - Cited by 48 (5 self) - Add to MetaCart
are combined with caching to improve query latency. The relative advantages of each method are demonstrated through both simulation results and qualitative arguments. Read-only transactions are processed locally at the client without contacting the server and thus the proposed approaches are scalable, i

A READ-ONLY DISTRIBUTED HASH TABLE

by Verdi March , 2007
"... Distributed hash table (DHT) is an infrastructure to support resource discovery in large distributed system. In DHT, data items are distributed across an overlay network based on a hash function. This leads to two major issues. Firstly, to preserve ownership of data items, commercial applications m ..."
Abstract - Add to MetaCart
present a DHT-based resource discovery scheme without distributing data items called R-DHT (Read-only DHT). We further extend R-DHT to support multi-attribute queries with our Midas scheme (Multi-dimensional range queries). R-DHT is a new DHT

Optimistic Concurrency Control for Inverted Files in Text Databases

by Mauricio Marin
"... Inverted files are frequently used as index data structures for very large text databases. Most applications of this data structure are for read-only query operations. However, the problem of introducing update operations has deserved little attention so far and yet it has important applications. In ..."
Abstract - Add to MetaCart
Inverted files are frequently used as index data structures for very large text databases. Most applications of this data structure are for read-only query operations. However, the problem of introducing update operations has deserved little attention so far and yet it has important applications

Efficient Processing of Wireless Read-only Transactions in Data Broadcast

by SangKeun Lee, Masaru Kitsuregawa , 2002
"... In this paper, we address the issue of ensuring consistency of multiple data items requested in a certain order by read-only transactions in wireless data broadcast. To handle the inherent property in a data broadcast environment that data can only be accessed strictly sequential by users, we explor ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
In this paper, we address the issue of ensuring consistency of multiple data items requested in a certain order by read-only transactions in wireless data broadcast. To handle the inherent property in a data broadcast environment that data can only be accessed strictly sequential by users, we

Scaling byzantine fault-tolerant replication to wide area networks

by Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Cristina Nita-rotaru, Josh Olsen, David Zage - In DSN ’06: Proceedings of the International Conference on Dependable Systems and Networks (DSN’06 , 2006
"... Abstract — This paper presents the first hierarchical Byzantine tolerant replication architecture suitable to systems that span multiple wide area sites. The architecture confines the effects of any malicious replica to its local site, reduces message complexity of wide area communication, and allow ..."
Abstract - Cited by 31 (10 self) - Add to MetaCart
, and allows read-only queries to be performed locally within a site for the price of additional hardware. A prototype implementation is evaluated over several network topologies and is compared with a flat Byzantine tolerant approach. I.
Next 10 →
Results 1 - 10 of 466
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University