36 research outputs found

    A Framework for Real-time Analysis in OLAP Systems

    Get PDF
    OLAP systems are designed to quickly answer multi-dimensional queries against large data warehouse systems. Constructing data cubes and their associated indexes is time consuming and computationally expensive, and for this reason, data cubes are only refreshed periodically. Increasingly, organizations are demanding for both historical and predictive analysis based on the most current data. This trend has also placed the requirement on OLAP systems to merge updates at a much faster rate than before. In this thesis, we proposes a framework for OLAP systems that enables updates to be merged with data cubes in soft real-time. We apply a strategy of local partitioning of the data cube, and maintain a ``hot'' partition for each materialized view to merge update data. We augment this strategy by applying multi-core processing using the OpenMP library to accelerate data cube construction and query resolution. Experiments using a data cube with 10,000,000 tuples and an update set of 100,000 tuples show that our framework achieves a 99% performance improvement updating the data cube, a 76% performance increase when constructing a new data cube, and a 72% performance increase when resolving a range query against a data cube with 1,000,000 tuples

    Sixth Goddard Conference on Mass Storage Systems and Technologies Held in Cooperation with the Fifteenth IEEE Symposium on Mass Storage Systems

    Get PDF
    This document contains copies of those technical papers received in time for publication prior to the Sixth Goddard Conference on Mass Storage Systems and Technologies which is being held in cooperation with the Fifteenth IEEE Symposium on Mass Storage Systems at the University of Maryland-University College Inn and Conference Center March 23-26, 1998. As one of an ongoing series, this Conference continues to provide a forum for discussion of issues relevant to the management of large volumes of data. The Conference encourages all interested organizations to discuss long term mass storage requirements and experiences in fielding solutions. Emphasis is on current and future practical solutions addressing issues in data management, storage systems and media, data acquisition, long term retention of data, and data distribution. This year's discussion topics include architecture, tape optimization, new technology, performance, standards, site reports, vendor solutions. Tutorials will be available on shared file systems, file system backups, data mining, and the dynamics of obsolescence

    Letter from the Special Issue Editor

    Get PDF
    Editorial work for DEBULL on a special issue on data management on Storage Class Memory (SCM) technologies

    Approximate Query Answering Using Data Warehouse Striping

    Get PDF
    This paper presents and evaluates a simple but very effective method to implement large data warehouses on an arbitrary number of computers, achieving very high query execution performance and scalability. The data is distributed and processed in a potentially large number of autonomous computers using our technique called data warehouse striping (DWS). The major problem of DWS technique is that it would require a very expensive cluster of computers with fault tolerant capabilities to prevent a fault in a single computer to stop the whole system. In this paper, we propose a radically different approach to deal with the problem of the unavailability of one or more computers in the cluster, allowing the use of DWS with a very large number of inexpensive computers. The proposed approach is based on approximate query answering techniques that make it possible to deliver an approximate answer to the user even when one or more computers in the cluster are not available. The evaluation presented in the paper shows both analytically and experimentally that the approximate results obtained this way have a very small error that can be negligible in most of the cases

    Computer-assisted audit tools and techniques use: Determinants for individual acceptance

    Get PDF
    During the last fifteen years, several studies on the research topic of Individual Technology Acceptance have been developed, and several new models have been proposed. All these models aim to understand and define determinant contributions for the acceptance of technologies and what the drivers leading to successful adoption are. This dissertation’s main emphasis is to gain an understanding of individual acceptance of Computer-assisted Audit Tools and Techniques (CAATTs) in the context of Portuguese Statutory Auditors. Previous research in other countries, utilizing several and distinct research universes, has informed this work and the definition of the main objectives of the present research. This dissertation has as its main objectives: 1) understanding the tasks in which CAATTs are used; 2) to identify the adoption drivers of CAATTs; 3) to explore the current usage of CAATTs among statutory auditors and 4) to develop a CAATTs adoption model. To reach the objectives two studies were conducted: a qualitative study, supported by interviews to experts, and a quantitative study operationalized by a questionnaire to 110 Portuguese statutory auditors. This latter study was the cornerstone, which allowed testing the CAATTs acceptance model. This dissertation presents significant contributions impacting the various stakeholders: individual Statutory Auditors, Statutory Auditors Firms, The Portuguese Institute of Statutory Auditors, Software houses and higher education.Nos últimos 15 anos, vários estudos de investigação foram desenvolvidos abordando a temática da aceitação individual de tecnologia, tendo sido apresentados novos modelos. Esses modelos têm como objetivo compreender e identificar os determinantes sobre a aceitação de tecnologias que levem a uma adoção bem-sucedida. A principal ênfase da tese é compreender a aceitação individual de “Tecnologias de Informação para Auditoria”, também designadas, em Português, por “Ferramentas Informáticas de Suporte à Auditoria” ou “Técnicas de Auditoria Assistidas por Computador” (CAATT), no contexto dos Revisores Oficiais de Contas em Portugal. Investigações anteriores realizadas em diferentes países, com distintos universos de investigação, inspiraram este trabalho na definição dos principais objetivos da presente pesquisa. A presente dissertação tem como principais objetivos compreender as tarefas em que as CAATT são utilizadas; identificar os fatores de adoção de CAATT; explorar o atual uso de CAATT entre Revisores Oficiais de Contas e desenvolver um modelo de adoção de CAATT. Para alcançar estes objetivos foram realizados dois estudos: um estudo qualitativo e exploratório, apoiado por entrevistas com peritos, e um estudo quantitativo operacionalizado através de um questionário a 110 Revisores Oficiais de Contas portugueses. Este estudo foi a pedra angular que permitiu testar o modelo de aceitação de CAATT. Esta dissertação apresenta contribuições significativas com impactos para os principais stakeholders: Revisores Oficiais de Contas, empresas, Ordem dos Revisores Oficiais de Contas, software houses e instituições de ensino superior

    Information Security Governance Simplified

    Get PDF
    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn’t when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations
    corecore