17,141 research outputs found
Towards a Holistic Integration of Spreadsheets with Databases: A Scalable Storage Engine for Presentational Data Management
Spreadsheet software is the tool of choice for interactive ad-hoc data
management, with adoption by billions of users. However, spreadsheets are not
scalable, unlike database systems. On the other hand, database systems, while
highly scalable, do not support interactivity as a first-class primitive. We
are developing DataSpread, to holistically integrate spreadsheets as a
front-end interface with databases as a back-end datastore, providing
scalability to spreadsheets, and interactivity to databases, an integration we
term presentational data management (PDM). In this paper, we make a first step
towards this vision: developing a storage engine for PDM, studying how to
flexibly represent spreadsheet data within a database and how to support and
maintain access by position. We first conduct an extensive survey of
spreadsheet use to motivate our functional requirements for a storage engine
for PDM. We develop a natural set of mechanisms for flexibly representing
spreadsheet data and demonstrate that identifying the optimal representation is
NP-Hard; however, we develop an efficient approach to identify the optimal
representation from an important and intuitive subclass of representations. We
extend our mechanisms with positional access mechanisms that don't suffer from
cascading update issues, leading to constant time access and modification
performance. We evaluate these representations on a workload of typical
spreadsheets and spreadsheet operations, providing up to 20% reduction in
storage, and up to 50% reduction in formula evaluation time
Digital forensics formats: seeking a digital preservation storage format for web archiving
In this paper we discuss archival storage formats from the point of view of digital curation and
preservation. Considering established approaches to data management as our jumping off point, we
selected seven format attributes which are core to the long term accessibility of digital materials.
These we have labeled core preservation attributes. These attributes are then used as evaluation
criteria to compare file formats belonging to five common categories: formats for archiving selected
content (e.g. tar, WARC), disk image formats that capture data for recovery or installation
(partimage, dd raw image), these two types combined with a selected compression algorithm (e.g.
tar+gzip), formats that combine packing and compression (e.g. 7-zip), and forensic file formats for
data analysis in criminal investigations (e.g. aff, Advanced Forensic File format). We present a
general discussion of the file format landscape in terms of the attributes we discuss, and make a
direct comparison between the three most promising archival formats: tar, WARC, and aff. We
conclude by suggesting the next steps to take the research forward and to validate the observations
we have made
Building an Expert System for Evaluation of Commercial Cloud Services
Commercial Cloud services have been increasingly supplied to customers in
industry. To facilitate customers' decision makings like cost-benefit analysis
or Cloud provider selection, evaluation of those Cloud services are becoming
more and more crucial. However, compared with evaluation of traditional
computing systems, more challenges will inevitably appear when evaluating
rapidly-changing and user-uncontrollable commercial Cloud services. This paper
proposes an expert system for Cloud evaluation that addresses emerging
evaluation challenges in the context of Cloud Computing. Based on the knowledge
and data accumulated by exploring the existing evaluation work, this expert
system has been conceptually validated to be able to give suggestions and
guidelines for implementing new evaluation experiments. As such, users can
conveniently obtain evaluation experiences by using this expert system, which
is essentially able to make existing efforts in Cloud services evaluation
reusable and sustainable.Comment: 8 page, Proceedings of the 2012 International Conference on Cloud and
Service Computing (CSC 2012), pp. 168-175, Shanghai, China, November 22-24,
201
ISO/EPC Addressing Methods to Support Supply Chain in the Internet of Things
RFID systems are among the major infrastructures of the Internet of Things,
which follow ISO and EPC standards. In addition, ISO standard constitutes the
main layers of supply chain, and many RFID systems benefit from ISO standard
for different purposes. In this paper, we tried to introduce addressing systems
based on ISO standards, through which the range of things connected to the
Internet of Things will grow. Our proposed methods are addressing methods which
can be applied to both ISO and EPC standards. The proposed methods are simple,
hierarchical, and low cost implementation. In addition, the presented methods
enhance interoperability among RFIDs, and also enjoys a high scalability, since
it well covers all of EPC schemes and ISO supply chain standards. Further, by
benefiting from a new algorithm for long EPCs known as selection algorithm,
they can significantly facilitate and accelerate the operation of address
mapping.Comment: arXiv admin note: text overlap with arXiv:1807.0217
A New Hybrid Method of IPv6 Addressing in the Internet of Things
Humans have always been seeking greater control over their surrounding
objects. Today, with the help of Internet of Things (IoT), we can fulfill this
goal. In order for objects to be connected to the internet, they should have an
address, so that they can be detected and tracked. Since the number of these
objects are very large and never stop growing, addressing space should be used,
which can respond to this number of objects. In this regard, the best option is
IPv6. Addressing has different methods, the most important of which are
introduced in this paper. The method presented in this paper is a hybrid
addressing method which uses EPC and ONS IP. The method proposed in this paper
provides a unique and hierarchical IPv6 address for each object. This method is
simple and does not require additional hardware for implantation. Further, the
addressing time of this method is short while its scalability is high, and is
compatible with different EPC standards
Traffic engineering in multihomed sites
It is expected that IPv6 multihomed sites will obtain as many global prefixes as direct providers they have, so traffic engineering techniques currently used in IPv4 multihomed sites is no longer suitable. However, traffic engineering is required for several reasons, and in particular, for being able to properly support multimedia communications. In this paper we present a framework for traffic engineering in IPv6 multihomed sites with multiple global prefixes. Within this framework, we have included several tools such as DNS record manipulation and proper configuration of the policy table defined in RFC 3484. To provide automation in the management of traffic engineering, we analyzed the usage of two mechanisms to configure the policy table.This work has been partly supported by the European Union under the E-Next Project FP6-506869 and by the OPTINET6 project TIC-2003-09042-C03-01.Publicad
- …