158 research outputs found

    Heuristic Algorithms for Designing a Data Warehouse with SPJ Views

    Full text link

    The Flexible Group Spatial Keyword Query

    Full text link
    We present a new class of service for location based social networks, called the Flexible Group Spatial Keyword Query, which enables a group of users to collectively find a point of interest (POI) that optimizes an aggregate cost function combining both spatial distances and keyword similarities. In addition, our query service allows users to consider the tradeoffs between obtaining a sub-optimal solution for the entire group and obtaining an optimimized solution but only for a subgroup. We propose algorithms to process three variants of the query: (i) the group nearest neighbor with keywords query, which finds a POI that optimizes the aggregate cost function for the whole group of size n, (ii) the subgroup nearest neighbor with keywords query, which finds the optimal subgroup and a POI that optimizes the aggregate cost function for a given subgroup size m (m <= n), and (iii) the multiple subgroup nearest neighbor with keywords query, which finds optimal subgroups and corresponding POIs for each of the subgroup sizes in the range [m, n]. We design query processing algorithms based on branch-and-bound and best-first paradigms. Finally, we provide theoretical bounds and conduct extensive experiments with two real datasets which verify the effectiveness and efficiency of the proposed algorithms.Comment: 12 page

    An Architecture for a Mobile and Dynamically Extensible Distributed DBMS

    Get PDF
    This report proposes an architectural framework for the design and implementation of a Distributed Database Management System which integrates Java and the Java Runtime Environment with the static set of operations found in a traditional database execution engine. With such a system, we intend to study the benefits of mobility of DBMS code (functionality shipping). This functionality shipping occurs at several levels, namely the query (i.e. predicates), executor (i.e. join operator) and access methods (i.e. index scan) levels

    The Placement of File Sub-system Data Streams

    Get PDF
    An abstraction called Cues was implemented [1] for providing data streams over the file sub-system in the Unix kernel. The data stream of a Cue can be used for transfer of data as well as for control of the data stream by composing such structures. The algorithm for scheduling the compound Cue sequences read and write operations for data and control Cues in the kernel and retains other properties of user process driven read-write. This is possible for the data stream as this abstraction is over the file sub-system and the data stream is run in the context of the user process that created the Cue. This report reconsiders the architectural placement of the Cues, based on the experience with design and text of implementations. The underlying theme is to try to keep the control and flexibility as it is with user processes and keep from tying it in the kernel or user space unless specifically required, in effect re-evaluating the placement of the implementation in the kernel

    Claw-free t-perfect graphs can be recognised in polynomial time

    Full text link
    A graph is called t-perfect if its stable set polytope is defined by non-negativity, edge and odd-cycle inequalities. We show that it can be decided in polynomial time whether a given claw-free graph is t-perfect

    Consistency and Performance of Concurrent Interactive Database Applications

    Get PDF
    In many modern database applications, there is an emerging need for interactive environments where users directly manipulate the contents of the database. Graphical user interfaces (GUIs) display images of the database which must reflect a consistent up-to-date state of the data with minimum perceivable delay to the user. Moreover, the possibility of several applications concurrently displaying different views of the same database increases the overall system complexity. In this paper, we show how design, performance and concurrency issues can be addressed by adapting existing database techniques. We propose the use of suitable display schemas whose instances compose active views of the database, an extended client caching scheme which is expected to yield significant performance benefits and a locking mechanism that maintains consistency between the GUIs and the database. <BR

    Cues: File Subsystem Data Streams

    Get PDF
    We present a system call which enable directing high performance data transfers with in-kernel streams. The streams are defined and run using abstract data types called Cues, formed over the Unix file subsystem. The system call, named cue() , returns a descriptor, which can be used to write requests to the newly created stream. These requests define the flow of the stream. The abstraction simplifies the design of applications that transfer large amounts of data from files or devices. It also enables high throughput when multiple transfers are in progress. Cue code is compact, modular, and portable. This model also results in a simple mechanism for remotely cueing data flow using standard connections with peer processes. The implementation and tests are also described in this paper

    Simple Calls for Flexible Constructs Using the Traditional File API

    Get PDF
    We present the design for a remote qos control interface to the transport protocol based on existing work for similar applications. This puts together the read/write calls from the traditional file system API and an additional primitive. The addition amounts to programming an operating system data- streaming service which may be provided as a system call or otherwise using the standard techniques. Put together these allow much more than the traditional call based control interface. The resulting interface simplifies the mechanisms for distributed control. Parts of this interface have also been implemented in our ongoing experiments with file transfer

    Distributed, end-to-end verifiable, and privacy-preserving internet voting systems

    Get PDF
    We present the D-DEMOS suite of distributed, privacy-preserving, and end-to-end verifiable e-voting systems; one completely asynchronous and one with minimal timing assumptions but better performance. Their distributed voting operation is human verifiable; a voter can vote over the web, using an unsafe web client stack, without sacrificing her privacy, and get recorded-as-cast assurance. Additionally, a voter can outsource election auditing to third parties, still without sacrificing privacy. We provide a model and security analysis of the systems, implement prototypes of the complete systems, measure their performance experimentally, demonstrate their ability to handle large-scale elections, and demonstrate the performance trade-offs between the two versions
    corecore