The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A polystore system is a database management system composed of integrated heterogeneous database engines and multiple programming languages. By matching data to the storage engine best suited to its needs, complex analytics run faster and flexible storage choices helps improve data organization. BigDAWG (Big Data Working Group) is our prototype implementation of a polystore system. In this paper,...
Database is widely used for information storage and management. With the explosion of the data size, the requirement of the storage capacity is growing dramatically. Cloud offers clients a scalable solution to meet the demand of the increasing space. A cloud service, if used and managed properly, can increase the resource usability and provide more secure services. In this paper, we propose a cloud-based...
Data is the new natural resource of this century. As data volumes grow and applications aimed at monetizing the data continue to evolve, data processing platforms are expected to meet new scale, performance, reliability and data retention requirements. At the same time, storage hardware continues to improve in performance and price-performance. In this paper, we present TOKVS - Trillion Operation...
MOBA (Multiplayer Online Battle Arena) games are currently one of the most popular online video game genres. This paper discusses implementation of a typical MOBA game prototype for Windows platform in a popular game engine Unity 5. The focus is put on using the built-in Unity components in a MOBA setting, developing additional behaviours using Unity's Scripting API for C# and integrating third party...
Accelerating relational databases in general and SQL in particular has become an important topic given thechallenges arising from large data collections and increasinglycomplex workloads. Most existing work, however, has beenfocused on either accelerating a single operator (e.g., a join) orin data reduction along the data path (e.g., from disk to CPU). In this paper we focus instead on the system...
Polystores, i.e., data management systems that use multiple stores for different data models, are gaining popularity. We are developing a polystore-based system called AWESOME to support social data analytics. The AWESOME polystore can support relational, semistructured, graph and text data and houses a Spark computation engine to produce derived data during ingestion. ADIL, the data ingestion language...
Most data scientists use nowadays functional or semi-functional languages like SQL, Scala or R to treat data, obtained directly from databases. Such process requires to fetch data, process it, then store again, and such process tends to be done outside the DB, in often complex data-flows. Recently, database service providers have decided to integrate "R-as-a-Service" in their DB solutions...
Apache Cassandra is a distributed database of choice when it comes to big data management with zero downtime, linear scalability, and seamless multiple data center deployment. However, resource allocation for the system during deployment is a major issue which could either lead to bad performance or under-utilization of resources. In this paper we describe a QoS-aware architecture that manages resources...
Creating autonomy for maritime vehicles that allows multiple developers and users to quickly integrate and develop capabilities is a difficult process. Multiple examples of autonomy exist; however, creating an environment that is modular and expandable is not often a goal of many autonomous systems. This work presents an advanced Autonomous Vehicle Architecture (AVA) for maritime systems that was...
With the advent of cloud computing and the virtualisation of computer systems, challenges exist in managing resources and Virtual Machines (VMs) effectively. Cloud computing platform services offer scalable and resilient platforms, but are still not without complexity to the end user community; this paper proposes an alternative solution for the deployment of an intelligent private or public cloud...
Ajax-based technology plays an important role in RIA (rich internet application). Meanwhile, Ajax-based three-tier architecture is a classic architecture in software development industry. Study shows that the data access layer and the business logic layer can be designed as universal modules and the presentation layer can be divided into specific module and universal module. As universal module is...
In the present days of rapid adoption of cloud services and varying cost models it is imperative to have a system which converts the cloud resource usage data into a measurable and payable cost. The system should be able to collect the cloud resource usage data, process it against a dynamically determined rate to get a charge for which the customer could be billed upon. These operations need to be...
The rapid development of Intelligent Transport Systems has created new objectives and requirements for traffic simulation models. The development of visualization, procedural modeling, decision support requirements mean that simulation models need to satisfy different requirements. The chapter presents methods and tools to create distribute, integrated and interactive transport simulations, to enable...
A storage engine assisted solid-state drive (SEA-SSD) has been proposed to improve the write performance of the SSDs for database applications. Since the SSD write performance bottleneck is caused by the garbage collection, the motivation of this work is to reduce the SSD garbage collection overhead by identifying, clustering and aggregating the data with similar activity in the same block of the...
In many modern systems, applications or services are realized as compositions of multiple existing services that can be enacted by Service Composition Engines (SCEs), which provide the required functionality to enable their definition and execution. SCEs typically use the capabilities of an Enterprise Service Bus (ESB) which serves as the messaging hub between the composed services aiming at ensuring...
Nowadays, the Internet Service Providers have to keep track of and in some cases to analyze for legal issues, a great amount of Internet data. Real-time big data processing and analysis introduce new challenges that must be addressed by system engineers. This is because: 1) traditional technologies exploiting databases are not designed to process a huge amount of data in real-time 2) classic machine...
Seaman has been active in the creation of differing Cyber worlds from the early 90's onward. This paper will cover historical approaches including The World Generator / The Engine of Desire (1996 to present) a generative virtual environment-exploring Recombinant Poetics, The Architecture of Association (with Daniel Howe), Engine of Engines (Howe | Seaman) (2011 - present), the more recent generative...
In this work we describe pyEHR, a new toolkit for building scalable clinical/phenotypic data management systems for biomedical research applications. The toolkit uses openEHR formalisms to guarantee the decoupling of clinical data descriptions from implementation details, and NoSQL technologies, or next-generation SQL ones, to provide scalable storage back-ends.
The integration between enterprise architectures and Business Process Management Systems (BPMS) is currently based on low-level programming interfaces that expose accidental complexities typical of process implementations. This paper describes an approach for integrating software architectures and BPMSs, based on mapping frameworks. Our inspiration are the Object-Relational Mapping (ORM) frameworks...
Due to a growing number of Host's intrusions and since the Internet have become so ubiquitous, implementing various systems that monitor system security breaches is inevitable. In this way, Host Intrusion Detection Systems (abbreviated as HIDS) have recently gained a noticeable amount of interest. These defensive systems detect malicious activities on host-based applications. This paper reviews types...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.