The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most database-base applications support two main sets of features: customer facing transactional capabilities such as purchasing books at an online bookstore and functionality required by managers and business analysts such as identifying trends in sales data by combing through aggregated sales data. The conventional approach of having just one main database to support both features greatly restrict...
There has been a great increase in recent years as to the amount of data from the grid that has been going to online systems. As more smart meters get installed into the AMI(advanced metering infrastructure), there is a need to mitigate the potential security threats in the collection system. There are a multitude of attack vectors that an adversary may take to compromise the confidentiality of user...
Mobile Databases with palmtops, cellular phones, car computers etc. may lead to disconnection and handoff issues due to which it is necessary to have consistent commitment of transactions in case of mobility. This paper proposes the new commitment protocol, maintains the strong transactional coherency, called as Modified Reliable Timeout Based Commit Protocol (MRTBCP), that supports off-line executions...
The first level of material's classification information by means of tree structure is added up to thousands of kinds, and dozens of levels in depth. Therefore, it is rather hard to make the spanning tree. By comparing of three methods of spanning tree, by using the median compositor cardinal number, recursive method, loop method, it is found that the efficiency of their existence spanning tree is...
Although efficient processing of probabilistic databases is a well-established field, a wide range of applications are still unable to benefit from these techniques due to the lack of means for creating probabilistic databases. In fact, it is a challenging problem to associate concrete probability values with given time-series data for forming a probabilistic database, since the probability distributions...
With the rapid development of computer technology, computer networks have become an important part of human society, to the social development of a huge role. It used a variety of database technology, which is giving hackers to provide a means of attack damage. To this, aiming at the computer network database security threats and prevention of related problems are analyzed.
In this paper, we report ongoing research on what we call locally complete XML databases. These data banks consist of an XML data tree together with a specification of the nodes of the tree that are completely represented in the document. The specification of completeness is defined by means of the defacto standard node selection language for XML, XPath, which makes this approach easy to implement...
The success and wellbeing of large organizations rely on the smooth functionality and operability of their software. Such qualities are largely affected by evolution events and changes, like software upgrades. In this paper, we are dealing with handling evolution events in data management systems. We consider a data-centric ecosystem that captures relational tables, views and queries (the latter are...
Database updates may need to tolerate extant integrity violations, but should not cause additional inconsistencies. Causes of constraint violations can be used to prevent an increase of inconsistency while tolerating extant inconsistencies. even if integrity constraints are altered.
Software-as-a-Service applications commonly consolidate multiple businesses into the same database to reduce costs. This practice makes it harder to implement several essential features of enterprise applications. The first is support for master data, which should be shared rather than replicated for each tenant. The second is application modification and extension, which applies both to the database...
As the development of expressway in our country at high speed, the database of expressway toll collection matured gradually both in technique and theory, meanwhile established a foundation for collection and analysis of traffic volume information. Firstly, introduction have been made about general investigation method of link traffic volume and pointed out its deficiency in this paper. After that,...
Real-world databases often have extremely complex schemas. With thousands of entity types and relationships, each with a hundred or so attributes, it is extremely difficult for new users to explore the data and formulate queries. Schema free query interfaces (SFQIs) address this problem by allowing users with no knowledge of the schema to submit queries. We postulate that SFQIs should deliver the...
There are opinion leaders in a society who represent the opinion of general public. The general public accepts information not only by mass media but also by opinion leaders. Since the late 20th century, the number of Internet users has increased fast. Many users interact with each other in an online social network. This makes the Web community similar to the real society. Thus it is a natural task...
In Software-as-a-Service, multiple tenants are typically consolidated into the same database instance to reduce costs. For analytics-as-a-service, in-memory column databases are especially suitable because they offer very short response times. This paper studies the automation of operational tasks in multi-tenant in-memory column database clusters. As a prerequisite, we develop a model for predicting...
In a cloud computing environment, resources are shared among different clients. Intelligently managing and allocating resources among various clients is important for system providers, whose business model relies on managing the infrastructure resources in a cost-effective manner while satisfying the client service level agreements (SLAs). In this paper, we address the issue of how to intelligently...
Storage class memory (SCM), a new generation of memory technology, offers non-volatility, high-speed, and byte-addressability, which combines the best properties of current hard disk drives (HDD) and main memory. With these extraordinary features, current systems and software stacks need to be redesigned to get significantly improved performance by eliminating disk input/output (I/O) barriers; and...
Dynamic software updating research efforts have mostly been focused on updating application code and in-memory state. As more and more applications use embedded databases for storage, dynamic updating solutions will have to support changes to embedded database schemas. The first step towards supporting dynamic updates to embedded database schemas is understanding how these schemas change-so far, schema...
Discrete manufacturing (DM) refers to produce products in non-sequential processes so as to respond to market and customer requirements quickly under limited lead-time. However, in shop-floor management, DM companies usually confront challenges such as information gaps between different manufacturing units, slow responsiveness to customer changes, and poor visualization. The main reasons are lacking...
We formalize a problem of closed and maximal pattern discovery in internally and externally weighted graph databases. We introduce two weights, internal weights and external weights, which represent utility and significance of each edge in the graph, and importance and reliability of the graph itself, respectively. In our formulation, graphs with the two sets of weights describe the target data to...
With the rapid development of database technique, categorizing datasets becomes very important for discovering information. Decision tree classification provides a rapid and effective method of categorizing datasets. Although many algorithmic methods exist for optimizing decision tree structure, these can be vulnerable to changes in the training dataset. In this paper, an evolutionary method is presented,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.