48,433 research outputs found

    B+-tree Index Optimization by Exploiting Internal Parallelism of Flash-based Solid State Drives

    Full text link
    Previous research addressed the potential problems of the hard-disk oriented design of DBMSs of flashSSDs. In this paper, we focus on exploiting potential benefits of flashSSDs. First, we examine the internal parallelism issues of flashSSDs by conducting benchmarks to various flashSSDs. Then, we suggest algorithm-design principles in order to best benefit from the internal parallelism. We present a new I/O request concept, called psync I/O that can exploit the internal parallelism of flashSSDs in a single process. Based on these ideas, we introduce B+-tree optimization methods in order to utilize internal parallelism. By integrating the results of these methods, we present a B+-tree variant, PIO B-tree. We confirmed that each optimization method substantially enhances the index performance. Consequently, PIO B-tree enhanced B+-tree's insert performance by a factor of up to 16.3, while improving point-search performance by a factor of 1.2. The range search of PIO B-tree was up to 5 times faster than that of the B+-tree. Moreover, PIO B-tree outperformed other flash-aware indexes in various synthetic workloads. We also confirmed that PIO B-tree outperforms B+-tree in index traces collected inside the Postgresql DBMS with TPC-C benchmark.Comment: VLDB201

    On the use of asymmetric PSF on NIR images of crowded stellar fields

    Full text link
    We present data collected using the camera PISCES coupled with the Firt Light Adaptive Optics (FLAO) mounted at the Large Binocular Telescope (LBT). The images were collected using two natural guide stars with an apparent magnitude of R<13 mag. During these observations the seeing was on average ~0.9". The AO performed very well: the images display a mean FWHM of 0.05 arcsec and of 0.06 arcsec in the J- and in the Ks-band, respectively. The Strehl ratio on the quoted images reaches 13-30% (J) and 50-65% (Ks), in the off and in the central pointings respectively. On the basis of this sample we have reached a J-band limiting magnitude of ~22.5 mag and the deepest Ks-band limiting magnitude ever obtained in a crowded stellar field: Ks~23 mag. J-band images display a complex change in the shape of the PSF when moving at larger radial distances from the natural guide star. In particular, the stellar images become more elongated in approaching the corners of the J-band images whereas the Ks-band images are more uniform. We discuss in detail the strategy used to perform accurate and deep photometry in these very challenging images. In particular we will focus our attention on the use of an updated version of ROMAFOT based on asymmetric and analytical Point Spread Functions. The quality of the photometry allowed us to properly identify a feature that clearly shows up in NIR bands: the main sequence knee (MSK). The MSK is independent of the evolutionary age, therefore the difference in magnitude with the canonical clock to constrain the cluster age, the main sequence turn off (MSTO), provides an estimate of the absolute age of the cluster. The key advantage of this new approach is that the error decreases by a factor of two when compared with the classical one. Combining ground-based Ks with space F606W photometry, we estimate the absolute age of M15 to be 13.70+-0.80 Gyr.Comment: 15 pages, 7 figures, presented at the SPIE conference 201

    A Meaningful MD5 Hash Collision Attack

    Get PDF
    It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision. Vlastimil Klima then proposed a more efficient and faster technique to implement this attack. We use these techniques to first create a collision attack and then use these collisions to implement meaningful collisions by creating two different packages that give identical MD5 hash, but when extracted, each gives out different files with contents specified by the atacker

    How private is private information?:The ability to spot deception in an economic game

    Get PDF
    We provide experimental evidence on the ability to detect deceit in a buyer-seller game with asymmetric information. Sellers have private information about the buyer's valuation of a good and sometimes have incentives to mislead buyers. We examine if buyers can spot deception in face-to-face encounters. We vary (1) whether or not the buyer can interrogate the seller, and (2) the contextual richness of the situation. We find that the buyers' prediction accuracy is above chance levels, and that interrogation and contextual richness are important factors determining the accuracy. These results show that there are circumstances in which part of the information asymmetry is eliminated by people's ability to spot deception

    The asymmetric simple exclusion process: an integrable model for non-equilibrium statistical mechanics

    Full text link
    The asymmetric simple exclusion process (ASEP) plays the role of a paradigm in non-equilibrium statistical mechanics. We review exact results for the ASEP obtained by Bethe ansatz and put emphasis on the algebraic properties of this model. The Bethe equations for the eigenvalues of the Markov matrix of the ASEP are derived from the algebraic Bethe ansatz. Using these equations we explain how to calculate the spectral gap of the model and how global spectral properties such as the existence of multiplets can be predicted. An extension of the Bethe ansatz leads to an analytic expression for the large deviation function of the current in the ASEP that satisfies the Gallavotti-Cohen relation. Finally, we describe some variants of the ASEP that are also solvable by Bethe ansatz. Keywords: ASEP, integrable models, Bethe ansatz, large deviations.Comment: 24 pages, 5 figures, published in the "special issue on recent advances in low-dimensional quantum field theories", P. Dorey, G. Dunne and J. Feinberg editor

    Collective identities, European solidarity : identification patterns and preferences for European social Insurance

    Get PDF
    A degree of collective identity is often perceived to be a requirement for integration of core state powers, and even more so when redistributive measures are at stake. Existing research has shown that European identity is an important correlate of support for European social policy in general. This article explores the ways in which collective identities relate to the multidimensional nature of social policy at the European level. We explore in particular the features of European social policy that receive the most support from European publics, and how local, national and European identity moderates these preferences. We expect that people who have primarily sub-national or national attachments are less supportive of generous schemes and schemes that involve greater cross-country redistribution, and are more in favour of decentralized schemes administered by the member states than those with stronger European identities. We find support for these expectations in a conjoint survey experiment fielded in autumn 2018 in 13 EU member states

    Recent developments of MCViNE and its applications at SNS

    Get PDF
    MCViNE is an open source, object-oriented Monte Carlo neutron ray-tracing simulation software package. Its design allows for flexible, hierarchical representations of sophisticated instrument components such as detector systems, and samples with a variety of shapes and scattering kernels. Recently this flexible design has enabled several applications of MCViNE simulations at the Spallation Neutron Source (SNS) at Oak Ridge National Lab, including assisting design of neutron instruments at the second target station and design of novel sample environments, as well as studying effects of instrument resolution and multiple scattering. Here we provide an overview of the recent developments and new features of MCViNE since its initial introduction (Jiao et al 2016 Nucl. Instrum. Methods Phys. Res., Sect. A 810, 86–99), and some example applications
    corecore