Semi-Joins and Bloom Join. Databases: The Complete Book Ch 20
|
|
- Virgil O’Neal’
- 5 years ago
- Views:
Transcription
1 Semi-Joins and Bloom Join Databases: The Complete Book Ch 20 1
2 Practical Concerns UNION R1 S1 R1 S2 R2 S1 RN SM R1 R2 RN S1 S2 SM 2
3 Practical Concerns UNION R1 S1 R1 S2 R2 S1 RN SM R1 R2 RN S1 S2 SM Where does the computation happen? How does the data get there? 2
4 Distributing the Work Let s start simple what can we do with no partitions? B R S 3
5 Distributing the Work Let s start simple what can we do with no partitions? B R S R and S may be any RA expression 3
6 Distributing the Work B R S Node 1 4
7 Distributing the Work B R S Node 1 No Parallelism! 4
8 Distributing the Work B Node 3 R Node 1 S Node 2 5
9 Distributing the Work All of R and All of S get sent! B Node 3 R Node 1 S Node 2 Lots of Data Transfer! 5
10 Distributing the Work B R Node 1 S Node 2 6
11 Distributing the Work All of R get sent B R Node 1 S Node 2 Better! We can guess whether R or S is smaller. 6
12 Distributing the Work What can we do if R is partitioned? U B B R1 S R2 7
13 Distributing the Work There are lots of partitioning strategies, but this one is interesting. U B B R1 Node 1 S R2 Node 2 Node 3 8
14 Distributing the Work it can be used as a model for partitioning S U B B R1 Node 1 S1 R2 Node 2 Node 3 9
15 Distributing the Work it can be used as a model for partitioning S U B B R1 Node 1 S2 R2 Node 2 Node 3 10
16 Distributing the Work and neatly captures the data transfer issue. U B B R1 Node 1 S R2 Node 2 Node 3 11
17 Distributing the Work So let s use it: Si joins with R1,R2,,RN locally. 12
18 Distributing the Work So let s use it: Si joins with R1,R2,,RN locally. Goal: Minimize amount of data sent from Rk to Si 12
19 Distributing the Work So let s use it: Si joins with R1,R2,,RN locally. Goal: Minimize amount of data sent from Rk to Si Solution 1: Use the partitioning strategy (like last lecture) 12
20 Distributing the Work So let s use it: Si joins with R1,R2,,RN locally. Goal: Minimize amount of data sent from Rk to Si Solution 1: Use the partitioning strategy (like last lecture) Solution 2: Hints to figure out what Rk should send 12
21 Sending Hints Rk B Si The naive approach Node 1 Node 2 Rk Si 13
22 Sending Hints Rk B Si The naive approach Node 1 Send me Node 2 Rk Rk Si 14
23 Sending Hints Rk B Si The naive approach Rk Node 1 Node 2 Rk Si 15
24 Sending Hints Rk B Si The smarter approach πb( ) Si Node 1 Node 2 Rk Si 16
25 Sending Hints Rk B Si The smarter approach πb( ) Si Node 1 Node 2 πb( ) Rk Rk Si Si 17
26 Sending Hints Rk B Si The smarter approach Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> 18 <2,X> <3,Y> <6,Y>
27 Sending Hints Rk B Si The smarter approach Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> 19 Send me rows with a B of 2,3, or 6 <2,X> <3,Y> <6,Y>
28 Sending Hints Rk B Si The smarter approach Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> <2,B> <2,C> <3,D> 20 Send me rows with a B of 2,3, or 6 <2,X> <3,Y> <6,Y>
29 Sending Hints Rk B Si The smarter approach Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> <2,B> <2,C> <3,D> 20 Send me rows with a B of 2,3, or 6 This is called a semi-join. <2,X> <3,Y> <6,Y>
30 Sending Hints Now Node 1 sends as little data as possible but Node 2 needs to send a lot of data. Can we do better? 21
31 Sending Hints Rk B Si Strategy 1: Parity Bits Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> <2,X> 0 <6,Y>
32 Sending Hints Rk B Si Strategy 1: Parity Bits Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> Send me data with a parity bit of 0 0 <2,X> 0 <6,Y>
33 Sending Hints Rk B Si Strategy 1: Parity Bit Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> <2,B> <2,C> <4,E> 24 Send me data with a parity bit of 0 0 <2,X> 0 <6,Y>
34 Sending Hints Rk B Si Strategy 1: Parity Bit Node 1 sending too much is ok! (Node 2 still needs to compute B) Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> <2,B> <2,C> <4,E> 24 Send me data with a parity bit of 0 0 <2,X> 0 <6,Y>
35 Sending Hints Rk B Si Strategy 1: Parity Bit Node 1 sending too much is ok! (Node 2 still needs to compute B) Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> <2,B> <2,C> <4,E> 24 Send me data with a parity bit of 0 Problem: One parity bit is too little 0 <2,X> 0 <6,Y>
36 Sending Hints Rk B Si Strategy 1: Parity Bit Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> Problem: One parity bit is too little 25 0 <2,X> 1 <3,Y> 0 <6,Y>
37 Sending Hints Rk B Si Strategy 2: Parity Bits Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> <2,B> <2,C> <3,D> 26 Send me data with parity bits 10 or 11 10<2,X> 11<3,Y> 10<6,Y>
38 Sending Hints Rk B Si Strategy 2: Parity Bits Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> <2,B> <2,C> <3,D> 26 Send me data with parity bits 10 or 11 Problem: Almost as much data as πb 10<2,X> 11<3,Y> 10<6,Y>
39 Sending Hints Can we summarize the parity bits? 27
40 Bloom Filters Alice Bob Carol Dave 28
41 Bloom Filters Alice Bob Carol Dave Bloom Filter 29
42 Bloom Filters Is Alice part of the set? Alice Bob Carol Dave Bloom Filter 30
43 Bloom Filters Yes Is Alice part of the set? Alice Bob Carol Dave Bloom Filter 30
44 Bloom Filters Yes Is Alice part of the set? Alice Bob Carol Dave Bloom Filter Is Eve part of the set? 30
45 Bloom Filters Yes Is Alice part of the set? Alice Bob Carol Bloom Filter No Is Eve part of the set? Dave 30
46 Bloom Filters Yes Is Alice part of the set? Alice Bob Carol Bloom Filter No Is Eve part of the set? Dave Is Fred part of the set? 30
47 Bloom Filters Yes Is Alice part of the set? Alice Bob Carol Bloom Filter No Is Eve part of the set? Dave Yes Is Fred part of the set? 30
48 Bloom Filters Yes Is Alice part of the set? Alice Bob Carol Bloom Filter No Is Eve part of the set? Dave Bloom Filter Guarantee Test definitely returns Yes if the element is in the set Test usually returns No if the element is not in the set Yes Is Fred part of the set? 30
49 Bloom Filters A Bloom Filter is a bit vector M - # of bits in the bit vector K - # of hash functions For ONE key (or record): For i between 0 and K: bitvector[ hashi (key) % M ] = 1 31
50 Bloom Filters A Bloom Filter is a bit vector M - # of bits in the bit vector K - # of hash functions For ONE key (or record): For i between 0 and K: bitvector[ hashi (key) % M ] = 1 Each bit vector has ~K bits set 31
51 Bloom Filters Key 1 Key Filters are combined by Bitwise-OR e.g. (Key 1 Key 2) = Key Key
52 Bloom Filters Key 1 Key 2 Key Filters are combined by Bitwise-OR e.g. (Key 1 Key 2) = How do we test for inclusion? Key
53 Bloom Filters Key 1 Key 2 Key 3 Key Filters are combined by Bitwise-OR e.g. (Key 1 Key 2) = How do we test for inclusion? (Key & Filter) == Key? (Key 1 & S) = (Key 3 & S) = (Key 4 & S) =
54 Bloom Filters Key 1 Key 2 Key Filters are combined by Bitwise-OR e.g. (Key 1 Key 2) = How do we test for inclusion? (Key & Filter) == Key? Key (Key 1 & S) = (Key 3 & S) = (Key 4 & S) =
55 Bloom Filters Key 1 Key 2 Key Filters are combined by Bitwise-OR e.g. (Key 1 Key 2) = How do we test for inclusion? (Key & Filter) == Key? Key (Key 1 & S) = (Key 3 & S) = X (Key 4 & S) =
56 Bloom Filters Key 1 Key 2 Key Filters are combined by Bitwise-OR e.g. (Key 1 Key 2) = How do we test for inclusion? (Key & Filter) == Key? Key (Key 1 & S) = (Key 3 & S) = X 32 (Key 4 & S) = False Positive
57 Sending Hints Rk B Si Strategy 3: Bloom Filters Node 1 Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> 33 <2,X> <3,Y> <6,Y>
58 Sending Hints Rk B Si Strategy 3: Bloom Filters Node 1 with a B in the Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> 34 Send me rows bloom filter summarizing the set {2,3,6} <2,X> <3,Y> <6,Y>
59 Sending Hints Rk B Si Strategy 3: Bloom Filters Node 1 <2,B> with a B in the Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> <2,C> <3,D> <4,E> 35 Send me rows bloom filter summarizing the set {2,3,6} <2,X> <3,Y> <6,Y>
60 Sending Hints Rk B Si Strategy 3: Bloom Filters Node 1 <2,B> with a B in the Node 2 <1,A> <2,B> <2,C> <3,D> <4,E> <2,C> <3,D> <4,E> This is called a bloom-join. 35 Send me rows bloom filter summarizing the set {2,3,6} <2,X> <3,Y> <6,Y>
Parallel DBs. April 25, 2017
Parallel DBs April 25, 2017 1 Why Scale Up? Scan of 1 PB at 300MB/s (SATA r2 Limit) (x1000) ~1 Hour ~3.5 Seconds 2 Data Parallelism Replication Partitioning A A A A B C 3 Operator Parallelism Pipeline
More informationParallel DBs. April 23, 2018
Parallel DBs April 23, 2018 1 Why Scale? Scan of 1 PB at 300MB/s (SATA r2 Limit) Why Scale Up? Scan of 1 PB at 300MB/s (SATA r2 Limit) ~1 Hour Why Scale Up? Scan of 1 PB at 300MB/s (SATA r2 Limit) (x1000)
More informationParallel DBs. April 25, 2017
Parallel DBs April 25, 2017 1 Sending Hints Rk B Si Strategy 3: Bloom Filters Node 1 Node 2 2 Sending Hints Rk B Si Strategy 3: Bloom Filters Node 1 with
More informationIntroduction to Modern Cryptography. Benny Chor
Introduction to Modern Cryptography Benny Chor Identification (User Authentication) Fiat-Shamir Scheme Lecture 12 Tel-Aviv University 4 January 2010 Model and Major Issues Alice wishes to prove to Bob
More informationBinary Search Trees. EECS 214, Fall 2018
Binary Search Trees EECS 214, Fall 2018 2 A data structure for dictionaries There are several data structures that we can use to represent dictionaries: A list of keys-value pairs A hash table An array
More informationComputer Security module
Computer Security module Revision notes Mark D. Ryan June 2010 There won't be a revision lecture for the Computer Security module. Instead, these notes are provided to help you prepare for the exam. Revision
More informationCOMPUTER & NETWORK SECURITY
COMPUTER & NETWORK SECURITY Lecture 7: Key Management CRYPTOBULLETIN: IN THE LAST WEEK OpenSSL Patch to Plug Severe Security Holes http://krebsonsecurity.com/2015/03/openssl patch to plug severe security
More informationCSE 344 Final Examination
CSE 344 Final Examination March 15, 2016, 2:30pm - 4:20pm Name: Question Points Score 1 47 2 17 3 36 4 54 5 46 Total: 200 This exam is CLOSED book and CLOSED devices. You are allowed TWO letter-size pages
More information1. (0 points) Write your name! READ cipher and english notes. P (5) =.05 P (6) =.1 P (7) =.15 P (9) =.25
HW 2 CMSC 389. DUE Jan 5 SOLUTIONS WARNING- THE HW IS THREE PAGES LONG!!!!!!!!!!!!! MUST USE GRADESCOPE Note: When you submit your assignment on Gradescope, make sure to assign each question to its corresponding
More informationuser specifies what is wanted, not how to find it
SQL stands for Structured Query Language sometimes pronounced sequel a very-high-level (declarative) language user specifies what is wanted, not how to find it number of standards original ANSI SQL updated
More informationSpanner A distributed database system
Presented by Yue Xia Spanner A distributed database system Background - Developed by Google initially as a key-value storage system - Developers want traditional database features like query language -
More informationCSE 344 Midterm. Monday, Nov 4, 2013, 9:30-10:20. Question Points Score Total: 100
CSE 344 Midterm Monday, Nov 4, 2013, 9:30-10:20 Name: Question Points Score 1 30 2 10 3 50 4 10 Total: 100 This exam is open book and open notes but NO laptops or other portable devices. You have 50 minutes;
More informationQuestion Score Points Out Of 25
University of Texas at Austin 6 May 2005 Department of Computer Science Theory in Programming Practice, Spring 2005 Test #3 Instructions. This is a 50-minute test. No electronic devices (including calculators)
More informationCOMP 2355 Introduction to Systems Programming
COMP 2355 Introduction to Systems Programming Christian Grothoff christian@grothoff.org http://grothoff.org/christian/ 1 Pointers Pointers denote addresses in memory In C types, the * represents the use
More informationDatabase Systems CSE 414
Database Systems CSE 414 Lecture 10-11: Basics of Data Storage and Indexes (Ch. 8.3-4, 14.1-1.7, & skim 14.2-3) 1 Announcements No WQ this week WQ4 is due next Thursday HW3 is due next Tuesday should be
More informationToday s Topics. What is a set?
Today s Topics Introduction to set theory What is a set? Set notation Basic set operations What is a set? Definition: A set is an unordered collection of objects Examples: Sets can contain items of mixed
More informationAnnouncement. Reading Material. Overview of Query Evaluation. Overview of Query Evaluation. Overview of Query Evaluation 9/26/17
Announcement CompSci 516 Database Systems Lecture 10 Query Evaluation and Join Algorithms Project proposal pdf due on sakai by 5 pm, tomorrow, Thursday 09/27 One per group by any member Instructor: Sudeepa
More informationAnnouncements. JSon Data Structures. JSon Syntax. JSon Semantics: a Tree! JSon Primitive Datatypes. Introduction to Database Systems CSE 414
Introduction to Database Systems CSE 414 Lecture 13: Json and SQL++ Announcements HW5 + WQ5 will be out tomorrow Both due in 1 week Midterm in class on Friday, 5/4 Covers everything (HW, WQ, lectures,
More informationJSON - Overview JSon Terminology
Announcements Introduction to Database Systems CSE 414 Lecture 12: Json and SQL++ Office hours changes this week Check schedule HW 4 due next Tuesday Start early WQ 4 due tomorrow 1 2 JSON - Overview JSon
More information: Principles of Imperative Computation. Summer Assignment 4. Due: Monday, June 11, 2012 in class
15-122 Assignment 4 Page 1 of 8 15-122 : Principles of Imperative Computation Summer 1 2012 Assignment 4 (Theory Part) Due: Monday, June 11, 2012 in class Name: Andrew ID: Recitation: The written portion
More informationLecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 24
Assume encryption and decryption use the same key. Will discuss how to distribute key to all parties later Symmetric ciphers unusable for authentication of sender Lecturers: Mark D. Ryan and David Galindo.
More informationCS 161 Computer Security. Week of September 11, 2017: Cryptography I
Weaver Fall 2017 CS 161 Computer Security Discussion 3 Week of September 11, 2017: Cryptography I Question 1 Activity: Cryptographic security levels (20 min) Say Alice has a randomly-chosen symmetric key
More informationDatabase Systems CSE 414
Database Systems CSE 414 Lecture 15-16: Basics of Data Storage and Indexes (Ch. 8.3-4, 14.1-1.7, & skim 14.2-3) 1 Announcements Midterm on Monday, November 6th, in class Allow 1 page of notes (both sides,
More informationFaster Private Set Intersection based on OT Extension
Faster Private Set Intersection based on OT Extension Michael Zohner (TU Darmstadt) Joint work with Benny Pinkas (Bar Ilan University) Thomas Schneider (TU Darmstadt) 22.08.14 Faster PSI based on OT extension
More informationCSEP 514 Midterm. Tuesday, Feb. 7, 2017, 5-6:20pm. Question Points Score Total: 150
CSEP 514 Midterm Tuesday, Feb. 7, 2017, 5-6:20pm Name: Question Points Score 1 50 2 25 3 50 4 25 Total: 150 This exam is CLOSED book and CLOSED devices. You are allowed ONE letter-size page with notes
More informationRELATIONAL OPERATORS #1
RELATIONAL OPERATORS #1 CS 564- Spring 2018 ACKs: Jeff Naughton, Jignesh Patel, AnHai Doan WHAT IS THIS LECTURE ABOUT? Algorithms for relational operators: select project 2 ARCHITECTURE OF A DBMS query
More informationLists of Lists. CS 5010 Program Design Paradigms Bootcamp Lesson 5.3
Lists of Lists CS 5010 Program Design Paradigms Bootcamp Lesson 5.3 Mitchell Wand, 2012-2017 This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. 1 Learning
More informationCSE 344 APRIL 16 TH SEMI-STRUCTURED DATA
CSE 344 APRIL 16 TH SEMI-STRUCTURED DATA ADMINISTRATIVE MINUTIAE HW3 due Wednesday OQ4 due Wednesday HW4 out Wednesday (Datalog) Exam May 9th 9:30-10:20 WHERE WE ARE So far we have studied the relational
More informationWorksheet - Reading Guide for Keys and Passwords
Unit 2 Lesson 15 Name(s) Period Date Worksheet - Reading Guide for Keys and Passwords Background Algorithms vs. Keys. An algorithm is how to execute the encryption and decryption and key is the secret
More informationThe data structures of the relational model Attributes and domains Relation schemas and database schemas
The data structures of the relational model Attributes and domains Relation schemas and database schemas databases First normal form (1NF) Running Example Pubs-Drinkers-DB: Pubs (name, location) Drinkers
More informationTrawling for Tor Hidden Services: Detection, Measurement, Deanonymization
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization A. Biryukov, I. Pustogarov, R.P. Weinmann University of Luxembourg Ivan.pustogarov@uni.lu May 20, 2013 Overview Background Measuring
More informationCMSC 341 Lecture 7 Lists
CMSC 341 Lecture 7 Lists Today s Topics Linked Lists vs Arrays Nodes Using Linked Lists Supporting Actors (member variables) Overview Creation Traversal Deletion UMBC CMSC 341 Lists 2 Linked Lists vs Arrays
More informationLecture 1 Applied Cryptography (Part 1)
Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication
More informationCryptography Functions
Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)
More informationDetecting Attacks, cont.
Detecting Attacks, cont. CS 161: Computer Security Prof. David Wagner April 8, 2016 Special request: Please spread out! Pair up. Each pair, sit far away from anyone else. If you re just arriving, sit next
More informationNetwork Flow. The network flow problem is as follows:
Network Flow The network flow problem is as follows: Given a connected directed graph G with non-negative integer weights, (where each edge stands for the capacity of that edge), and two distinguished
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Michael J. Fischer Lecture 4 September 11, 2017 CPSC 467, Lecture 4 1/23 Analyzing Confidentiality of Cryptosystems Secret ballot elections Information protection Adversaries
More informationCSE 344 JANUARY 5 TH INTRO TO THE RELATIONAL DATABASE
CSE 344 JANUARY 5 TH INTRO TO THE RELATIONAL DATABASE ADMINISTRATIVE MINUTIAE Midterm Exam: February 9 th : 3:30-4:20 Final Exam: March 15 th : 2:30 4:20 ADMINISTRATIVE MINUTIAE Midterm Exam: February
More informationIntroduction to Databases CSE 414. Lecture 2: Data Models
Introduction to Databases CSE 414 Lecture 2: Data Models CSE 414 - Autumn 2018 1 Class Overview Unit 1: Intro Unit 2: Relational Data Models and Query Languages Data models, SQL, Relational Algebra, Datalog
More informationOutline Key Management CS 239 Computer Security February 9, 2004
Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your
More informationINSTRUCTIONS TO CANDIDATES
NATIONAL UNIVERSITY OF SINGAPORE SCHOOL OF COMPUTING FINAL EXAMINATION FOR Semester 2 AY2012/2013 Introduction to Computer Networks April 2013 Time Allowed 2 hours INSTRUCTIONS TO CANDIDATES 1. This exam
More informationDetec%ng the Temporal Context of Queries. Oliver Kennedy, Ying Yang, Jan Chomicki, Ronny Fehling, Zhen Hua Liu, and Dieter Gawlick 09/01/2014
Detec%ng the Temporal Context of Queries Oliver Kennedy, Ying Yang, Jan Chomicki, Ronny Fehling, Zhen Hua Liu, and Dieter Gawlick 09/01/2014 Outline Mo.va.on Contextual Analysis Prac.cal Temporal Dependency
More informationConcurrency Control 1
Concurrency Control 1 Last time Isolation anomalies Dirty read, unrepeatable read, lost update Towards defining "correct" execution Transaction schedules e.g. R1(A) W2(B) R2(C) "Good" schedules have some
More informationScalable Low-Latency Indexes for a Key-Value Store Ankita Kejriwal
Scalable Low-Latency Indexes for a Key-Value Store Ankita Kejriwal With Arjun Gopalan, Ashish Gupta, Zhihao Jia, Stephen Yang and John Ousterhout Conjecture Can a key value store support strongly consistent
More informationPrivacy Preserving Probabilistic Record Linkage
Privacy Preserving Probabilistic Record Linkage Duncan Smith (Duncan.G.Smith@Manchester.ac.uk) Natalie Shlomo (Natalie.Shlomo@Manchester.ac.uk) Social Statistics, School of Social Sciences University of
More informationQuiz 8 May 21, 2015 Computer Engineering 80N
Quiz 8 May 21, 2015 Computer Engineering 80N Left Neighbor: Right Neighbor: Keep this side up on your desk until you are told to turn the page over. This is a closed book quiz. No calculators. First Name
More informationCreating a Crosstab Query in Design View
Procedures LESSON 31: CREATING CROSSTAB QUERIES Using the Crosstab Query Wizard box, click Crosstab Query Wizard. 5. In the next Crosstab Query the table or query on which you want to base the query. 7.
More informationCost-based Query Sub-System. Carnegie Mellon Univ. Dept. of Computer Science /615 - DB Applications. Last Class.
Cost-based Query Sub-System Carnegie Mellon Univ. Dept. of Computer Science 15-415/615 - DB Applications Queries Select * From Blah B Where B.blah = blah Query Parser Query Optimizer C. Faloutsos A. Pavlo
More informationComputer Science Spring 2005 Final Examination, May 12, 2005
Computer Science 302 00 Spring 2005 Final Examination, May 2, 2005 Name: No books, notes, or scratch paper. Use pen or pencil, any color. Use the backs of the pages for scratch paper. If you need more
More informationPractical Secure Two-Party Computation and Applications
Practical Secure Two-Party Computation and Applications Lecture 2: Private Set Intersection Estonian Winter School in Computer Science 2016 Overview of this lecture Private Set Intersection Special Purpose
More informationICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification
ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another
More informationAnnouncements. Using Electronics in Class. Review. Staff Instructor: Alvin Cheung Office hour on Wednesdays, 1-2pm. Class Overview
Announcements Introduction to Databases CSE 414 Lecture 2: Data Models HW1 and WQ1 released Both due next Tuesday Office hours start this week Sections tomorrow Make sure you sign up on piazza Please ask
More informationINSE 6110 Midterm LAST NAME FIRST NAME. Fall 2016 Duration: 80 minutes ID NUMBER. QUESTION Total GRADE. Notes:
A INSE 6110 Midterm Fall 2016 Duration: 80 minutes LAST NAME FIRST NAME ID NUMBER QUESTION 1 2 3 4 Total GRADE Notes: 1) Calculator (non-programming) allowed, nothing else permitted 2) Each page contains
More informationCSE 344 FEBRUARY 14 TH INDEXING
CSE 344 FEBRUARY 14 TH INDEXING EXAM Grades posted to Canvas Exams handed back in section tomorrow Regrades: Friday office hours EXAM Overall, you did well Average: 79 Remember: lowest between midterm/final
More informationb. Developing multiple versions of a software project in parallel
Multiple-Choice Questions: 1. Which of these terms best describes Git? a. Integrated Development Environment b. Distributed Version Control System c. Issue Tracking System d. Web-Based Repository Hosting
More informationUCSD CSE 21, Spring 2014 [Section B00] Mathematics for Algorithm and System Analysis
UCSD CSE 21, Spring 2014 [Section B00] Mathematics for Algorithm and System Analysis Lecture 11 Class URL: http://vlsicad.ucsd.edu/courses/cse21-s14/ Lecture 11 Notes Goals for this week (Tuesday) Linearity
More informationAnnouncements. Asterix Data Model (ADM) Datatypes. Closed Types. Open Types. Introduction to Database Systems CSE 414
Announcements Introduction to Database Systems CSE 414 Lecture 14: SQL++ HW5 + WQ5 released Both due in 1 week Post on piazza ( asterix / hw5 ) Check out the SQL++ tutorial on course website! Authoritative
More informationCS 251: Bitcoin and Cryptocurrencies Fall 2016
CS 251: Bitcoin and Cryptocurrencies Fall 2016 Homework 3 due : 2016-11-28, 23:59 via Gradescope (entry code M4YJ69 ) 1. Idioms of use: Consider the transaction graph in the figure below: rectangles represent
More informationLecture 20: Query Optimization (2)
Lecture 20: Query Optimization (2) Wednesday, May 19, 2010 1 Outline Search space Algorithms for enumerating query plans Estimating the cost of a query plan 2 Key Decisions Logical plan What logical plans
More informationCS154. Streaming Algorithms and Communication Complexity
CS154 Streaming Algorithms and Communication Complexity 1 Streaming Algorithms 2 Streaming Algorithms 01 42 3 L = {x x has more 1 s than 0 s} Initialize: C := 0 and B := 0 When the next symbol x is read,
More informationKleinberg s Small-World Networks. Normalization constant have to be calculated:
Kleinberg s Small-World Networks Normalization constant have to be calculated: r v u d v u P ), ( 1 ~ ) ( Z v u d v u P r 1 ), ( 1 ) ( u i r i u d Z ), ( 1 Example Choose among 3 friends (1-dimension)
More informationAnimating Objects in Groups: Using Arrays and Lists
Animating Objects in Groups: Using and By Ruthie Tucker under the direction of Professor Susan Rodger Summer 2008 Description This tutorial will cover the basics of using arrays and lists in an Alice world.
More informationECE 646 Lecture 3. Key management
ECE 646 Lecture 3 Key management Required Reading Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E Chapter 14 Key Management and Distribution Using the same key for multiple
More informationQuerying Data with Transact SQL
Course 20761A: Querying Data with Transact SQL Course details Course Outline Module 1: Introduction to Microsoft SQL Server 2016 This module introduces SQL Server, the versions of SQL Server, including
More informationAnimating Objects in Groups: Using Arrays and Lists. By Ruthie Tucker under the direction of Professor Susan Rodger Summer 2008
Animating Objects in Groups: Using Arrays and Lists By Ruthie Tucker under the direction of Professor Susan Rodger Summer 2008 Description This tutorial will cover the basics of using arrays and lists
More informationLecture 16. The Relational Model
Lecture 16 The Relational Model Lecture 16 Today s Lecture 1. The Relational Model & Relational Algebra 2. Relational Algebra Pt. II [Optional: may skip] 2 Lecture 16 > Section 1 1. The Relational Model
More informationP 5 : A Protocol for Scalable Anonymous Communications
P 5 : A Protocol for Scalable Anonymous Communications 1 P 5 : A Protocol for Scalable Anonymous Communications Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan University of Maryland, College Park
More informationLecture Notes to Big Data Management and Analytics Winter Term 2017/2018 NoSQL Databases
Lecture Notes to Big Data Management and Analytics Winter Term 2017/2018 NoSQL Databases Matthias Schubert, Matthias Renz, Felix Borutta, Evgeniy Faerman, Christian Frey, Klaus Arthur Schmid, Daniyal Kazempour,
More informationENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationRelational Algebra. Mr. Prasad Sawant. MACS College. Mr.Prasad Sawant MACS College Pune
Relational Algebra Mr. Prasad Sawant MACS College Pune MACS College Relational Algebra Tuple - a collection of attributes which describe some real world entity. Attribute - a real world role played by
More informationCryptography. Andreas Hülsing. 6 September 2016
Cryptography Andreas Hülsing 6 September 2016 1 / 21 Announcements Homepage: http: //www.hyperelliptic.org/tanja/teaching/crypto16/ Lecture is recorded First row might be on recordings. Anything organizational:
More informationchapter 2 G ETTING I NFORMATION FROM A TABLE
chapter 2 Chapter G ETTING I NFORMATION FROM A TABLE This chapter explains the basic technique for getting the information you want from a table when you do not want to make any changes to the data and
More informationCS 245 Midterm Exam Winter 2014
CS 245 Midterm Exam Winter 2014 This exam is open book and notes. You can use a calculator and your laptop to access course notes and videos (but not to communicate with other people). You have 70 minutes
More informationOracle In-Memory & Data Warehouse: The Perfect Combination?
: The Perfect Combination? UKOUG Tech17, 6 December 2017 Dani Schnider, Trivadis AG @dani_schnider danischnider.wordpress.com BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENEVA HAMBURG COPENHAGEN
More informationHash table example. B+ Tree Index by Example Recall binary trees from CSE 143! Clustered vs Unclustered. Example
Student Introduction to Database Systems CSE 414 Hash table example Index Student_ID on Student.ID Data File Student 10 Tom Hanks 10 20 20 Amy Hanks ID fname lname 10 Tom Hanks 20 Amy Hanks Lecture 26:
More informationCPSC 467b: Cryptography and Computer Security
Outline ZKIP Other IP CPSC 467b: Cryptography and Computer Security Lecture 19 Michael J. Fischer Department of Computer Science Yale University March 31, 2010 Michael J. Fischer CPSC 467b, Lecture 19
More informationSublinear Models for Streaming and/or Distributed Data
Sublinear Models for Streaming and/or Distributed Data Qin Zhang Guest lecture in B649 Feb. 3, 2015 1-1 Now about the Big Data Big data is everywhere : over 2.5 petabytes of sales transactions : an index
More informationCISC 1400 Discrete Structures
CISC 1400 Discrete Structures Chapter 4 Relations CISC1400 Yanjun Li 1 1 Relation A relation is a connection between objects in one set and objects in another set (possibly the same set). age is a relation
More informationMobility Management (cont.)
CPET 565/CPET 499 Mobile Computing Systems Lecture 5 Mobility Management of Based on the Text used in the course: Fundamentals of Mobile & Pervasive Computing, 005, by Frank Adelstein, et. al, from McGraw-Hill
More informationData Linkage Methods: Overview of Computer Science Research
Data Linkage Methods: Overview of Computer Science Research Peter Christen Research School of Computer Science, ANU College of Engineering and Computer Science, The Australian National University, Canberra,
More information15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2
15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2 Name Section Directions: Answer each question neatly in the space provided. Please read each question carefully. You have 50 minutes for this exam. No electronic
More informationCMSC201 Computer Science I for Majors
CMSC201 Computer Science I for Majors Lecture 08 Lists Constants Last Class We Covered More on while loops Sentinel loops Boolean flags 2 Any Questions from Last Time? 3 Today s Objectives To learn about
More informationZero-Knowledge Proofs. Zero-Knowledge Proofs. Slides from a Talk by Eric Postpischil
Slides from a Talk by Eric Postpischil Goals Alice wants to prove to Bob that she knows an identifying number X. Bob should not be able to figure out X. Dave observes all communications between Alice and
More informationl20 nov zero-knowledge proofs
l0 nov 00 zero-knowledge proofs what properties should an interactive proof system have? Alice Bob if c= o.w. quadratic equations prove that equation has a solution without revealing the solution! Alice
More informationMidterm 2. CMSC 430 Introduction to Compilers Spring Instructions Total 100. Name: April 18, 2012
Name: Midterm 2 CMSC 430 Introduction to Compilers Spring 2012 April 18, 2012 Instructions This exam contains 10 pages, including this one. Make sure you have all the pages. Write your name on the top
More informationIntroduction to Database Systems CSE 414. Lecture 26: More Indexes and Operator Costs
Introduction to Database Systems CSE 414 Lecture 26: More Indexes and Operator Costs CSE 414 - Spring 2018 1 Student ID fname lname Hash table example 10 Tom Hanks Index Student_ID on Student.ID Data File
More informationCOMP 250. Lecture 7. Sorting a List: bubble sort selection sort insertion sort. Sept. 22, 2017
COMP 250 Lecture 7 Sorting a List: bubble sort selection sort insertion sort Sept. 22, 20 1 Sorting BEFORE AFTER 2 2 2 Example: sorting exams by last name Sorting Algorithms Bubble sort Selection sort
More informationLists of Lists. CS 5010 Program Design Paradigms Bootcamp Lesson 6.5
Lists of Lists CS 5010 Program Design Paradigms Bootcamp Lesson 6.5 Mitchell Wand, 2012-2015 This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. 1 Learning
More informationAnytime Query Answering in RDF through Evolutionary Algorithms
Anytime Query Answering in RDF through Evolutionary Algorithms Eyal Oren Christophe Guéret Stefan Schlobach Vrije Universiteit Amsterdam ISWC 2008 Overview Problem: query answering over large RDF graphs
More informationIntroduction to Database Systems CSE 344
Introduction to Database Systems CSE 344 Lecture 10: Basics of Data Storage and Indexes 1 Student ID fname lname Data Storage 10 Tom Hanks DBMSs store data in files Most common organization is row-wise
More informationSets and set operations
CS 44 Discrete Mathematics for CS Lecture Sets and set operations Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Course administration Homework 3: Due today Homework 4: Due next week on Friday,
More informationCACHE-OBLIVIOUS MAPS. Edward Kmett McGraw Hill Financial. Saturday, October 26, 13
CACHE-OBLIVIOUS MAPS Edward Kmett McGraw Hill Financial CACHE-OBLIVIOUS MAPS Edward Kmett McGraw Hill Financial CACHE-OBLIVIOUS MAPS Indexing and Machine Models Cache-Oblivious Lookahead Arrays Amortization
More informationFinding Similar Sets. Applications Shingling Minhashing Locality-Sensitive Hashing
Finding Similar Sets Applications Shingling Minhashing Locality-Sensitive Hashing Goals Many Web-mining problems can be expressed as finding similar sets:. Pages with similar words, e.g., for classification
More informationDue to the number of people in the room, you must stay for the entire exam.
CPSC 231 Midterm 2 Duration: 40 minutes 14 March 2014 This exam has 27 questions and 9 pages. You may use one single-sided 8.5x11 piece of paper with whatever you want written on it. Apart from that, this
More informationLecture 9. Authentication & Key Distribution
Lecture 9 Authentication & Key Distribution 1 Where are we now? We know a bit of the following: Conventional (symmetric) cryptography Hash functions and MACs Public key (asymmetric) cryptography Encryption
More informationCMSC201 Computer Science I for Majors
CMSC201 Computer Science I for Majors Lecture 08 Lists Constants Last Class We Covered More on while loops Sentinel loops Priming Reads Boolean flags 2 Any Questions from Last Time? 3 Today s Objectives
More informationThe Relational Data Model
The Relational Data Model Lecture 6 1 Outline Relational Data Model Functional Dependencies Logical Schema Design Reading Chapter 8 2 1 The Relational Data Model Data Modeling Relational Schema Physical
More informationImplementation of Relational Operations. Introduction. CS 186, Fall 2002, Lecture 19 R&G - Chapter 12
Implementation of Relational Operations CS 186, Fall 2002, Lecture 19 R&G - Chapter 12 First comes thought; then organization of that thought, into ideas and plans; then transformation of those plans into
More informationBloom Filters. From this point on, I m going to refer to search queries as keys since that is the role they
Bloom Filters One of the fundamental operations on a data set is membership testing: given a value x, is x in the set? So far we have focused on data structures that provide exact answers to this question.
More informationCSC 261/461 Database Systems Lecture 13. Fall 2017
CSC 261/461 Database Systems Lecture 13 Fall 2017 Announcement Start learning HTML, CSS, JavaScript, PHP + SQL We will cover the basics next week https://www.w3schools.com/php/php_mysql_intro.asp Project
More information