An Improvement of an Approach for Representation of Tree Structures in Relational Tables
|
|
- Clementine Davis
- 5 years ago
- Views:
Transcription
1 An Improvement of an Approach for Representation of Tree Structures in Relational Tables Ivaylo Atanassov Abstract: The paper introduces an improvement of an approach for tree representation in relational tables. Tree structures are widely used in the area of the computer systems. Often is needed to store trees in relational databases. But the relational model does not supports datatypes for such an objects. The conventional methods to store trees suffer from the limitations of the relational model. The present paper offers some modifications of an existing method path enumeration model. A number of experiments were conducted and the results show improvement in manipulation time of the trees. Key words: Relational Databases, Trees, Relational Tables, Path Enumeration Model, Hierarchies, SQL INTRODUCTION Tree structures are widely used in the area of the computer systems [3, 7]. trees are implemented many system structures, the class hierarchies, the file system and others. Trees are often represented in relational databases. But the relational model does not supports such an objects. Relational tables are set of tuples of attributes of some domain[4, 6]. The representation of objects in relational databases always suffers from the limitations of the model. Several approaches exists to store trees in relational tables[1, 2]. The present paper offers an improvement of an existing approach. One of the existing approaches is the path enumeration model ( PEM ). It is well described in[2]. In brief, it represents the trees in a relation with schema as shown in fig. 1 and table 1. node4 node1 node2 node3 node5 node6 Fig. 1. An example tree Table 1. The path enumeration model ID Text Path A Node1 A B Node2 A.B C Node3 A.C D Node4 A.B.D E Node5 A.B.E F Node6 A.C.F Every node has unique string, distinguishing him from the others. Also, every node has path, consisting of the concatenated unique string of all the parents, until the root. The SQL statements to retrieve subtree of a given node are based on SQL function LIKE[4, 6]. They are quite simple and do not require special techniques[2, 4]. This is the main advantage of the method. But some improvements can be done, according to the structure of the path string. The new approach to the path string is: - the root node is unique string - the character from the path string is removed - an immediate descendant of a given node gets path string using the following formula: path = path(parent) to_char( a +number(node)) Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee ACM ISBN: II.9-1 -
2 where path(parent) is the path string of the parent node, number(node) is the consecutive number of the node being added ( consecutive according to the number of descendants ). In this manner the relational table looks as shown in table 2. Table 2. The new structure of the table Path Text a Node1 a.a Node2 a.b Node3 a.aa Node4 a.ab Node5 a.ba Node6 Every new node is formed as displacement from the character a, concatenated with parent s path string. The main advantage of the PEM still holds easy and fast retrieving of the subtrees. The improvement is that the required space is reduced and as consequence the retrieval time. EXPERIMENTAL RESULTS Experiments are conducted to proof the above statements. The tree structures, stored in relational tables, are as described in table 3. The experiments are conducted on relational database systems InterBase and Oracle. Table 3. Parameters of the used tree Height of the tree 61 Number of characters for root identifier 3 Nodes count 543 The described tree is stored multiple times, differentiating each other by the root identification string. As seen from table 3, the root node consists of 3 symbols. This means that is possible to store 26 3 ( ) different trees. Fig. 2 shows the SQL commands to create the tables. Approach with create table t1 ( idn varchar(10) not null, path varchar(200) not null, constraint pkt1 primary key(idn) ); idn the identification value of the node path the path to the node the attribute idn is primary key Approach without create table t1 ( idn integer not null, path varchar(200) not null, constraint pkt1 primary key(idn) ); idn the identification value of the node path the path to the node the attribute idn is primary key Fig. 2. The SQL commands to create the tables - II.9-2 -
3 For the purposes of the experiment is used the CPU on-chip high performance counter to measure the execution time of the queries[5]. Such a timer is available in Pentium processors. It can be accessed either via assembler instruction RDTSC ( Read Date Time Stamp Counter ) or with Windows API function QueryPerformanceCounter[8]. In the experiment is used the API function. EXPERIMENTAL RESULTS FOR INTERBASE RDBMS Table 4 summarizes the parameters of the experimental configuration. Table 4. The parameters of the experimental setup Processor Intel Celeron 333 MHz Memory 256 MB HDD 20 GB Operating system MS Windows 2000 Database system InterBase Fig. 3 describes the SQL queries to retrieve the subtree of a node For the approach with this is the node with path string a.b.c.h.u.z.ae.au.bd.bj.bk, while for the approach without is a.aadaaaabca. An important role plays the standart SQL function LIKE, well described in the appropriate literature [4, 6]. Approach with select * from t1 where path like 'a.b.c.h.u.z.ae.au.bd.bj.bk%' Approach without select * from t1 where path like 'a.aadaaaabca%' Fig. 3. The SQL queries to retrieve the subtree of a node The first experiment was conducted on the database without indexing. The number of the performed measurements is 50. The number of the trees is 26*26, thus the nodes are 676 ( trees ) * 543 ( nodes each ), plus one tree with root a = nodes total. Table 5 summarizes the results of the experiment. Every row stands for the average value of 5 measurements. The numbers in the table are the, spent for execution of the query. Fig. 4 is the graphical representation of the results. Table 5. The results of the experiment out ,50E+07 9,00E+07 8,50E+07 8,00E+07 7,50E+07 7,00E+07 Fig. 4. The graphical representation - II.9-3 -
4 Average value for the approach with ticks. Average value for the approach without ticks. As conclusion, on tables without indexing, the proposed approach without gives about 19.3 % improvement, compared with the approach with. The next experiment is for database with indexed tables. The index is on attribute pth from fig. 2. The number of the used trees is greater 26*26*10 ( 6760 ) trees, each with 543 nodes, plus one tree with root a, total of nodes. Table 6 summarizes the results of the experiment. Every row stands for the average value of 5 measurements. The numbers are the, spent for execution of the query. Fig. 5 is the graphical representation of the results. Table 6. The results of the experiment out ,00E+06 1,80E+06 1,60E+06 1,40E+06 1,20E+06 1,00E+06 8,00E+05 Fig. 5. The graphical representation Average value for the approach with Average value for the approach without As conclusion, on tables with indexing, the proposed approach without gives about 19.2 % improvement, compared with the approach with. EXPERIMENTAL RESULTS FOR ORACLE RDBMS Table 7 summarizes the parameters of the experimental configuration. Table 7. The parameters of the experimental setup. Processor Intel Celeron 900 MHz Memory 256 MB HDD 20 GB Operating system MS Windows XP Database system Oracle 8i The parameters for the trees are the same as these for the experiment with InterBase. The first experiment is for database without any indexing. Table 8 summarizes the results. Every row stands for the average value of 5 measurements. The numbers are the, spent for execution of the query. Fig. 6 is the graphical representation. - II.9-4 -
5 Table 8. The results of the experiment out ,00E+06 7,00E+06 6,00E+06 5,00E+06 4,00E+06 3,00E+06 2,00E+06 1,00E+06 0,00E+00 Average value for the approach with ticks. Average value for the approach without ticks. Fig. 6. The graphical representation As conclusion, on tables without indexing, the proposed approach without gives about 32.8 % improvement, compared with the approach with. The next experiment is for database with indexing on column path from fig. 2. Table 9 summarizes the results. Every row stands for the average value of 5 measurements. The numbers are the, spent for execution of the query. Fig. 7 is the graphical representation. Table 9. The results of the experiment out ,50E+05 6,00E+05 5,50E+05 5,00E+05 4,50E+05 4,00E+05 Fig. 7. The graphical representation Average value for the approach with ticks. Average value for the approach without ticks. As conclusion, on tables without indexing, the proposed approach without gives about 15.6 % improvement, compared with the approach with. - II.9-5 -
6 CONCLUSIONS AND FUTURE WORK The path enumeration model is a flexible way of representing tree structures in relational databases. Some modifications can be applied on the method, leading to improvement of manipulation time. Removing the character can decrease the length of the path string and as consequence the retrieval time. The experiments show an improvement in manipulation time. The disadvantage of the approach is the limitation for the number of immediate descendants no more than a 52 ( upper + lower case characters ). But in practice more often are encountered deep trees, not a large trees. Thus such a limitation is not crucial and the model can be applied in practice. REFERENCES [1] Brandon, D., Recursive Database Structures, ACM Digital Library, Journal of Computing Sciences in Colleges, 2005, Volume 21 [2] Celko, J., Trees and Hierarchies in SQL for Smarties, Morgan Kaufmann, 2004, ISBN [3] Cormen T., C. E. Leiserson, R. L. Rivest, C. Stein, Introduction to Algorithms, Second Edition, The MIT Press, 2001, ISBN [4] Elmasri, R., S. Navathe, Fundamentals of Database Systems, The Benjamin/Cumming, 1989, ISBN [5] IA-32 Intel Architecture Software Developer s Manual Volume 3: System Programming Guide, 2003, [6] Korth, H. F., A. Silberschatz, Database System Concepts, Second Edition, McGraw-Hill, 1991, ISBN [7] Sedgewick R., Algorithms in Java: Parts 1-4, Third Edition, Addison Wesley, 2002, ISBN [8] Windows NT/2000 Application Programming Inteface, Borland C++ Builder Help ABOUT THE AUTHOR Full-time assist. Ivaylo Atanassov, Department of Computer Systems and Technologies, Technical University Sofia, branch Plovdiv, Phone: , Е- mail: ivo_atan@tu-plovdiv.bg - II.9-6 -
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July ISSN
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-201 971 Comparative Performance Analysis Of Sorting Algorithms Abhinav Yadav, Dr. Sanjeev Bansal Abstract Sorting Algorithms
More informationUnit 2. Unit 3. Unit 4
Course Objectives At the end of the course the student will be able to: 1. Differentiate database systems from traditional file systems by enumerating the features provided by database systems.. 2. Design
More informationLecture2: Database Environment
College of Computer and Information Sciences - Information Systems Dept. Lecture2: Database Environment 1 IS220 : D a t a b a s e F u n d a m e n t a l s Topics Covered Data abstraction Schemas and Instances
More informationInformatics 1: Data & Analysis
Informatics 1: Data & Analysis Lecture 4: From ER Diagrams to Relational Models Ian Stark School of Informatics The University of Edinburgh Friday 24 January 2014 Semester 2 Week 2 http://www.inf.ed.ac.uk/teaching/courses/inf1/da
More informationFast algorithm for generating ascending compositions
manuscript No. (will be inserted by the editor) Fast algorithm for generating ascending compositions Mircea Merca Received: date / Accepted: date Abstract In this paper we give a fast algorithm to generate
More informationRecursively Defined Functions
Section 5.3 Recursively Defined Functions Definition: A recursive or inductive definition of a function consists of two steps. BASIS STEP: Specify the value of the function at zero. RECURSIVE STEP: Give
More informationHierarchical Data in RDBMS
Hierarchical Data in RDBMS Introduction There are times when we need to store "tree" or "hierarchical" data for various modelling problems: Categories, sub-categories and sub-sub-categories in a manufacturing
More informationCourse: Database Management Systems. Lê Thị Bảo Thu
Course: Database Management Systems Lê Thị Bảo Thu thule@hcmut.edu.vn www.cse.hcmut.edu.vn/thule 1 Contact information Lê Thị Bảo Thu Email: thule@hcmut.edu.vn Website: www.cse.hcmut.edu.vn/thule 2 References
More informationNested Intervals Tree Encoding with Continued Fractions
Nested Intervals Tree Encoding with Continued Fractions VADIM TROPASHKO Oracle Corp There is nothing like abstraction To take away your intuition Shai Simonson http://aduniorg/courses/discrete/ We introduce
More informationThe p-sized partitioning algorithm for fast computation of factorials of numbers
J Supercomput (2006) 38:73 82 DOI 10.1007/s11227-006-7285-5 The p-sized partitioning algorithm for fast computation of factorials of numbers Ahmet Ugur Henry Thompson C Science + Business Media, LLC 2006
More informationCity University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester A 2017/18
City University of Hong Kong offered by Department of Computer Science with effect from Semester A 2017/18 Part I Course Overview Course Title: Database Systems Course Code: CS3402 Course Duration: 1 semester
More informationInformatics 1: Data & Analysis
Informatics 1: Data & Analysis Lecture 4: From ER Diagrams to Relational Models Ian Stark School of Informatics The University of Edinburgh Friday 26 January 2018 Semester 2 Week 2 https://blog.inf.ed.ac.uk/da18
More informationAn Enhanced Perturbing Algorithm for Floorplan Design Using the O-tree Representation*
An Enhanced Perturbing Algorithm for Floorplan Design Using the O-tree Representation* Yingxin Pang Dept.ofCSE Univ. of California, San Diego La Jolla, CA 92093 ypang@cs.ucsd.edu Chung-Kuan Cheng Dept.ofCSE
More informationDatabase systems. Jaroslav Porubän, Miroslav Biňas, Milan Nosáľ (c)
Database systems Jaroslav Porubän, Miroslav Biňas, Milan Nosáľ (c) 2011-2016 Resources Ramez Elmasri, Shamkant B. Navathe: Fundamentals of Database Systems, Addison Wesley, 5 edition, 2006, 1168 p. ISBN
More informationICS 691: Advanced Data Structures Spring Lecture 3
ICS 691: Advanced Data Structures Spring 2016 Prof. Nodari Sitchinava Lecture 3 Scribe: Ben Karsin 1 Overview In the last lecture we started looking at self-adjusting data structures, specifically, move-to-front
More informationB.H.GARDI COLLEGE OF MASTER OF COMPUTER APPLICATION. Ch. 1 :- Introduction Database Management System - 1
Basic Concepts :- 1. What is Data? Data is a collection of facts from which conclusion may be drawn. In computer science, data is anything in a form suitable for use with a computer. Data is often distinguished
More informationA Translation of the One-to-One Relationship for Introductory. Relational Database Courses
12/17/2002 A Translation of the One-to-One Relationship for Introductory Relational Database Courses Jonathan P. Bernick Department of Computer Science Coastal Carolina University Conway, South Carolina
More informationD.Abhyankar 1, M.Ingle 2. -id: 2 M.Ingle, School of Computer Science, D.A. University, Indore M.P.
A Novel Mergesort D.Abhyankar 1, M.Ingle 2 1 D. Abhyankar, School of Computer Science, D.A. University, Indore M.P. India Email-id: deepak.scsit@gmail.com 2 M.Ingle, School of Computer Science, D.A. University,
More informationM S Ramaiah Institute of Technology Department of Computer Science And Engineering
M S Ramaiah Institute of Technology Department of Computer Science And Engineering COURSE DESIGN, DELIVERY AND ASSESMENT Semester: V Course Code: CS513 Course Name: Database systems Course Faculty: Sl#
More information15CS53: DATABASE MANAGEMENT SYSTEM
15CS53: DATABASE MANAGEMENT SYSTEM Subject Code: 15CS53 I.A. Marks: 20 Hours/Week: 04 Exam Hours: 03 Total Hours: 56 Exam Marks: 80 Objectives of the Course: This course will enable students to Provide
More informationA HASHING TECHNIQUE USING SEPARATE BINARY TREE
Data Science Journal, Volume 5, 19 October 2006 143 A HASHING TECHNIQUE USING SEPARATE BINARY TREE Md. Mehedi Masud 1*, Gopal Chandra Das 3, Md. Anisur Rahman 2, and Arunashis Ghose 4 *1 School of Information
More informationParallel Combinatorial Search on Computer Cluster: Sam Loyd s Puzzle
Parallel Combinatorial Search on Computer Cluster: Sam Loyd s Puzzle Plamenka Borovska Abstract: The paper investigates the efficiency of parallel branch-and-bound search on multicomputer cluster for the
More informationTeaching Scheme Business Information Technology/Software Engineering Management Advanced Databases
Teaching Scheme Business Information Technology/Software Engineering Management Advanced Databases Level : 4 Year : 200 2002 Jim Craven (jcraven@bournemouth.ac.uk) Stephen Mc Kearney (smckearn@bournemouth.ac.uk)
More informationERRDS: A CASE TOOL TO GENERATE AN ER DATA MODEL FROM A RELATIONAL DATABASE SCHEMA
ERRDS: A CASE TOOL TO GENERATE AN ER DATA MODEL FROM A RELATIONAL DATABASE SCHEMA NABIL ARMAN Palestine Polytechnic University Hebron, Palestine Abstract: A relational database (RDB) schema is a description
More informationKnowledge Discovery from Web Usage Data: Research and Development of Web Access Pattern Tree Based Sequential Pattern Mining Techniques: A Survey
Knowledge Discovery from Web Usage Data: Research and Development of Web Access Pattern Tree Based Sequential Pattern Mining Techniques: A Survey G. Shivaprasad, N. V. Subbareddy and U. Dinesh Acharya
More informationChapter 11: Indexing and Hashing
Chapter 11: Indexing and Hashing Basic Concepts Ordered Indices B + -Tree Index Files B-Tree Index Files Static Hashing Dynamic Hashing Comparison of Ordered Indexing and Hashing Index Definition in SQL
More informationLamé s Theorem. Strings. Recursively Defined Sets and Structures. Recursively Defined Sets and Structures
Lamé s Theorem Gabriel Lamé (1795-1870) Recursively Defined Sets and Structures Lamé s Theorem: Let a and b be positive integers with a b Then the number of divisions used by the Euclidian algorithm to
More informationB.C.A DATA BASE MANAGEMENT SYSTEM MODULE SPECIFICATION SHEET. Course Outline
B.C.A 2017-18 DATA BASE MANAGEMENT SYSTEM Course Outline MODULE SPECIFICATION SHEET This course introduces the fundamental concepts necessary for designing, using and implementing database systems and
More informationRange Tree Applications in Computational Geometry
Range Tree Applications in Computational Geometry ANTONIO-GABRIEL STURZU, COSTIN-ANTON BOIANGIU Computer Science Department Politehnica University of Bucharest Splaiul Independentei 313, Sector 6, Bucharest,
More informationOutline. Approximation: Theory and Algorithms. Ordered Labeled Trees in a Relational Database (II/II) Nikolaus Augsten. Unit 5 March 30, 2009
Outline Approximation: Theory and Algorithms Ordered Labeled Trees in a Relational Database (II/II) Nikolaus Augsten 1 2 3 Experimental Comparison of the Encodings Free University of Bozen-Bolzano Faculty
More informationBulldozers/Sites A B C D
CSE 101 Summer 2017 Homework 2 Instructions Required Reading The textbook for this course is S. Dasgupta, C. Papadimitriou and U. Vazirani: Algorithms, McGraw Hill, 2008. Refer to the required reading
More informationLecture 7 Stored procedure
ITM-661 ระบบฐานข อม ล (Database system) Walailak - 2013 Lecture 7 Stored procedure Walailak University T. Connolly, and C. Begg, Database Systems: A Practical Approach to Design, Implementation, and Management,
More informationVISUALIZING NP-COMPLETENESS THROUGH CIRCUIT-BASED WIDGETS
University of Portland Pilot Scholars Engineering Faculty Publications and Presentations Shiley School of Engineering 2016 VISUALIZING NP-COMPLETENESS THROUGH CIRCUIT-BASED WIDGETS Steven R. Vegdahl University
More informationAn Extended Byte Carry Labeling Scheme for Dynamic XML Data
Available online at www.sciencedirect.com Procedia Engineering 15 (2011) 5488 5492 An Extended Byte Carry Labeling Scheme for Dynamic XML Data YU Sheng a,b WU Minghui a,b, * LIU Lin a,b a School of Computer
More informationLearn Well Technocraft
Note: We are authorized partner and conduct global certifications for Oracle and Microsoft. The syllabus is designed based on global certification standards. This syllabus prepares you for Oracle global
More informationData Structures for Disjoint Sets
Data Structures for Disjoint Sets Manolis Koubarakis 1 Dynamic Sets Sets are fundamental for mathematics but also for computer science. In computer science, we usually study dynamic sets i.e., sets that
More informationHKTA TANG HIN MEMORIAL SECONDARY SCHOOL SECONDARY 3 COMPUTER LITERACY. Name: ( ) Class: Date: Databases and Microsoft Access
Databases and Microsoft Access Introduction to Databases A well-designed database enables huge data storage and efficient data retrieval. Term Database Table Record Field Primary key Index Meaning A organized
More informationChapter 1 SQL and Data
Chapter 1 SQL and Data What is SQL? Structured Query Language An industry-standard language used to access & manipulate data stored in a relational database E. F. Codd, 1970 s IBM 2 What is Oracle? A relational
More informationHandy Annotations within Oracle 10g
International Journal of Scientific & Engineering Research Volume 4, Issue 1, January-2013 1 Handy Annotations within Oracle 10g Mrs.Dhanamma Jagli, Ms.Priyanka Gaikwad, Ms.Shubhangi Gunjal, Mr.Chaitanya
More informationBinary Histogram in Image Classification for Retrieval Purposes
Binary Histogram in Image Classification for Retrieval Purposes Iivari Kunttu 1, Leena Lepistö 1, Juhani Rauhamaa 2, and Ari Visa 1 1 Tampere University of Technology Institute of Signal Processing P.
More informationMotivation and basic concepts Storage Principle Query Principle Index Principle Implementation and Results Conclusion
JSON Schema-less into RDBMS Most of the material was taken from the Internet and the paper JSON data management: sup- porting schema-less development in RDBMS, Liu, Z.H., B. Hammerschmidt, and D. McMahon,
More informationGeneral Purpose GPU Programming. Advanced Operating Systems Tutorial 9
General Purpose GPU Programming Advanced Operating Systems Tutorial 9 Tutorial Outline Review of lectured material Key points Discussion OpenCL Future directions 2 Review of Lectured Material Heterogeneous
More informationOracle Hyperion Profitability and Cost Management
Oracle Hyperion Profitability and Cost Management Configuration Guidelines for Detailed Profitability Applications November 2015 Contents About these Guidelines... 1 Setup and Configuration Guidelines...
More informationSyllabus Under Autonomy Mathematics
Syllabus Under Autonomy Mathematics Semester VI Course: Applied Component(Paper-I) [25 Lectures] Computer Programming and System Analysis(Java Programming & Networking) Learning Objectives:- To learn about
More informationGrouping Genetic Algorithm with Efficient Data Structures for the University Course Timetabling Problem
Grouping Genetic Algorithm with Efficient Data Structures for the University Course Timetabling Problem Felipe Arenales Santos Alexandre C. B. Delbem Keywords Grouping Genetic Algorithm Timetabling Problem
More informationModule 4: Tree-Structured Indexing
Module 4: Tree-Structured Indexing Module Outline 4.1 B + trees 4.2 Structure of B + trees 4.3 Operations on B + trees 4.4 Extensions 4.5 Generalized Access Path 4.6 ORACLE Clusters Web Forms Transaction
More informationSearch trees, tree, B+tree Marko Berezovský Radek Mařík PAL 2012
Search trees, 2-3-4 tree, B+tree Marko Berezovský Radek Mařík PL 2012 p 2
More informationDatabase Management Systems CS Spring 2017
Database Management Systems CS 542 --- Spring 2017 Instructor: Elke Rundensteiner Office: FL 135 Email: rundenst@cs.wpi.edu http://web.cs.wpi.edu/~cs542/s17 Course Information Who should attend? Interested
More informationAcknowledgement. CS Compiler Design. Intermediate representations. Intermediate representations. Semantic Analysis - IR Generation
Acknowledgement CS3300 - Compiler Design Semantic Analysis - IR Generation V. Krishna Nandivada IIT Madras Copyright c 2000 by Antony L. Hosking. Permission to make digital or hard copies of part or all
More informationSRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN
SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN Course Code : CS0304 Course Title : Data Base Management Systems Semester : VI Course Time : Dec 2012-
More informationUse of Inheritance Feature in Relational Database Development
Use of Inheritance Feature in Relational Database Development 1 A.V.Saurkar, 2 Prof. A.R. Itkikar 1,2 Department of Computer Science & Engineering Sipna s COET, SGBAU, Amravati (MH), India Abstract Currently
More informationarxiv: v3 [cs.ds] 18 Apr 2011
A tight bound on the worst-case number of comparisons for Floyd s heap construction algorithm Ioannis K. Paparrizos School of Computer and Communication Sciences Ècole Polytechnique Fèdèrale de Lausanne
More informationConstructions of hamiltonian graphs with bounded degree and diameter O(log n)
Constructions of hamiltonian graphs with bounded degree and diameter O(log n) Aleksandar Ilić Faculty of Sciences and Mathematics, University of Niš, Serbia e-mail: aleksandari@gmail.com Dragan Stevanović
More informationAutomatic Generation of Graph Models for Model Checking
Automatic Generation of Graph Models for Model Checking E.J. Smulders University of Twente edwin.smulders@gmail.com ABSTRACT There exist many methods to prove the correctness of applications and verify
More informationTEACHING & ASSESSMENT PLAN
Doc. Ref. No. Issue Version Date UoN-STC-T&A 1 June 2009 TEACHING & ASSESSMENT PLAN 1. College : Arts & Sciences 2. Department : Mathematical & Physical Sciences 3. Semester : Spring 2013/2014 4. Course
More informationData analysis and design Unit number: 23 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: H/601/1991.
Unit title: Data analysis and design Unit number: 23 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: H/601/1991 UNIT AIM AND PURPOSE The aim of this unit is to equip learners
More informationASSIGNMENT NO 2. Objectives: To understand and demonstrate DDL statements on various SQL objects
ASSIGNMENT NO 2 Title: Design and Develop SQL DDL statements which demonstrate the use of SQL objects such as Table, View, Index, Sequence, Synonym Objectives: To understand and demonstrate DDL statements
More informationA Secondary storage Algorithms and Data Structures Supplementary Questions and Exercises
308-420A Secondary storage Algorithms and Data Structures Supplementary Questions and Exercises Section 1.2 4, Logarithmic Files Logarithmic Files 1. A B-tree of height 6 contains 170,000 nodes with an
More informationIntroduction to Extended Common Coupling with an Application Study on Linux
Introduction to Extended Common Coupling with an Application Study on Linux Liguo Yu Computer Science and Informatics Indiana University South Bend 1700 Mishawaka Ave. P.O. Box 7111 South Bend, IN 46634,
More informationOn Test Generation for Transition Faults with Minimized Peak Power Dissipation
30.3 On Test Generation for Transition Faults with Minimized Peak Power Dissipation Wei Li Sudhakar M. Reddy Irith Pomeranz 2 Dept. of ECE School of ECE Univ. of Iowa Purdue University Iowa City, IA 52242
More informationWrapper: An Application for Evaluating Exploratory Searching Outside of the Lab
Wrapper: An Application for Evaluating Exploratory Searching Outside of the Lab Bernard J Jansen College of Information Sciences and Technology The Pennsylvania State University University Park PA 16802
More informationOn Integer Sequences Derived from Balanced k-ary trees
On Integer Sequences Derived from Balanced k-ary trees SUNG-HYUK CHA Pace University Department of Computer Science 1 Pace Plaza, New York, NY, 10038 USA scha@pace.edu Abstract: This article investigates
More informationCT13 DATABASE MANAGEMENT SYSTEMS DEC 2015
Q.1 a. Explain the role of concurrency control software in DBMS with an example. Answer: Concurrency control software in DBMS ensures that several users trying to update the same data do so in a controlled
More informationGraph Algorithms. A Brief Introduction. 高晓沨 (Xiaofeng Gao) Department of Computer Science Shanghai Jiao Tong Univ.
Graph Algorithms A Brief Introduction 高晓沨 (Xiaofeng Gao) Department of Computer Science Shanghai Jiao Tong Univ. 目录 2015/5/7 1 Graph and Its Applications 2 Introduction to Graph Algorithms 3 References
More informationIncreasing Database Performance through Optimizing Structure Query Language Join Statement
Journal of Computer Science 6 (5): 585-590, 2010 ISSN 1549-3636 2010 Science Publications Increasing Database Performance through Optimizing Structure Query Language Join Statement 1 Ossama K. Muslih and
More informationMore on Conjunctive Selection Condition and Branch Prediction
More on Conjunctive Selection Condition and Branch Prediction CS764 Class Project - Fall Jichuan Chang and Nikhil Gupta {chang,nikhil}@cs.wisc.edu Abstract Traditionally, database applications have focused
More informationWho, where, when. Database Management Systems (LIX022B05) Literature. Evaluation. Lab Sessions. About this course. After this course...
Who, where, when base Management Systems (LIX022B05) Instructor: Çağrı Çöltekin c.coltekin@rug.nl Information science/informatiekunde Fall 2012 Course bases (LIX022B05) 2012/13 Instructor Çağrı Çöltekin
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK CONVERTING XML DOCUMENT TO SQL QUERY MISS. ANUPAMA V. ZAKARDE 1, DR. H. R. DESHMUKH
More informationChapter-14 SQL COMMANDS
Chapter-14 SQL COMMANDS What is SQL? Structured Query Language and it helps to make practice on SQL commands which provides immediate results. SQL is Structured Query Language, which is a computer language
More informationA Commit Scheduler for XML Databases
A Commit Scheduler for XML Databases Stijn Dekeyser and Jan Hidders University of Antwerp Abstract. The hierarchical and semistructured nature of XML data may cause complicated update-behavior. Updates
More information1. Further Applications of Graph Traversal
1. Further Applications of Graph Traversal This is a replacement section, with the correct algorithm for strong components! In the following, assume G = (V, E) is a digraph with V = {1, 2,..., n}. Let
More informationApplication of TRIE data structure and corresponding associative algorithms for process optimization in GRID environment
Application of TRIE data structure and corresponding associative algorithms for process optimization in GRID environment V. V. Kashansky a, I. L. Kaftannikov b South Ural State University (National Research
More informationGeometric Data Structures
Geometric Data Structures 1 Data Structure 2 Definition: A data structure is a particular way of organizing and storing data in a computer for efficient search and retrieval, including associated algorithms
More informationPhysical Level of Databases: B+-Trees
Physical Level of Databases: B+-Trees Adnan YAZICI Computer Engineering Department METU (Fall 2005) 1 B + -Tree Index Files l Disadvantage of indexed-sequential files: performance degrades as file grows,
More informationDetecting negative cycles with Tarjan s breadth-first scanning algorithm
Detecting negative cycles with Tarjan s breadth-first scanning algorithm Tibor Ásványi asvanyi@inf.elte.hu ELTE Eötvös Loránd University Faculty of Informatics Budapest, Hungary Abstract The Bellman-Ford
More informationDatabases Lectures 1 and 2
Databases Lectures 1 and 2 Timothy G. Griffin Computer Laboratory University of Cambridge, UK Databases, Lent 2009 T. Griffin (cl.cam.ac.uk) Databases Lectures 1 and 2 DB 2009 1 / 36 Re-ordered Syllabus
More informationEfficient integration of data mining techniques in DBMSs
Efficient integration of data mining techniques in DBMSs Fadila Bentayeb Jérôme Darmont Cédric Udréa ERIC, University of Lyon 2 5 avenue Pierre Mendès-France 69676 Bron Cedex, FRANCE {bentayeb jdarmont
More informationAnalysis of Query Processing and Optimization
Analysis of Query Processing and Optimization Nimra Memon, Muhammad Saleem Vighio, Shah Zaman Nizamani, Niaz Ahmed Memon, Adeel Riaz Memon, Umair Ramzan Shaikh Abstract Modern database management systems
More informationDeccan Education Society s FERGUSSON COLLEGE, PUNE (AUTONOMOUS) SYLLABUS UNDER AUTONOMY. FIRST YEAR B.Sc. COMPUTER SCIENCE SEMESTER I
Deccan Education Society s FERGUSSON COLLEGE, PUNE (AUTONOMOUS) SYLLABUS UNDER AUTONOMY FIRST YEAR B.Sc. COMPUTER SCIENCE SEMESTER I SYLLABUS OF COMPUTER SCIENCE Academic Year 2016-2017 Deccan Education
More informationGrid Resources Search Engine based on Ontology
based on Ontology 12 E-mail: emiao_beyond@163.com Yang Li 3 E-mail: miipl606@163.com Weiguang Xu E-mail: miipl606@163.com Jiabao Wang E-mail: miipl606@163.com Lei Song E-mail: songlei@nudt.edu.cn Jiang
More informationGeneral Purpose GPU Programming. Advanced Operating Systems Tutorial 7
General Purpose GPU Programming Advanced Operating Systems Tutorial 7 Tutorial Outline Review of lectured material Key points Discussion OpenCL Future directions 2 Review of Lectured Material Heterogeneous
More informationNetwork Routing Protocol using Genetic Algorithms
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:0 No:02 40 Network Routing Protocol using Genetic Algorithms Gihan Nagib and Wahied G. Ali Abstract This paper aims to develop a
More informationCS 157: Assignment 5
Problem : Printing Neatly CS 157: Assignment 5 Douglas R. Lanman 4 April 006 In a word processor or in L A TEX, one routinely encounters the pretty printing problem. That is, how does one transform text
More informationnormalization are being violated o Apply the rule of Third Normal Form to resolve a violation in the model
Database Design Section1 - Introduction 1-1 Introduction to the Oracle Academy o Give examples of jobs, salaries, and opportunities that are possible by participating in the Academy. o Explain how your
More informationUsing Relational Databases for Digital Research
Using Relational Databases for Digital Research Definition (using a) relational database is a way of recording information in a structure that maximizes efficiency by separating information into different
More informationEfficient Non-Sequential Access and More Ordering Choices in a Search Tree
Efficient Non-Sequential Access and More Ordering Choices in a Search Tree Lubomir Stanchev Computer Science Department Indiana University - Purdue University Fort Wayne Fort Wayne, IN, USA stanchel@ipfw.edu
More informationDatabase Management System 9
Database Management System 9 School of Computer Engineering, KIIT University 9.1 Relational data model is the primary data model for commercial data- processing applications A relational database consists
More informationCSE2004 Database Management Systems
CSE2004 Database Management Systems Text Books : 1.R. Elmasri & S. B. Navathe, Fundamentals of Database Systems, Addison Wesley, 7 th Edition, 2015 2.Raghu Ramakrishnan, Database Management Systems,Mcgraw-Hill,4th
More informationEfficient Access to Non-Sequential Elements of a Search Tree
Efficient Access to Non-Sequential Elements of a Search Tree Lubomir Stanchev Computer Science Department Indiana University - Purdue University Fort Wayne Fort Wayne, IN, USA stanchel@ipfw.edu Abstract
More informationChapter. Focus of the Course. Object-Oriented Software Development. program design, implementation, and testing
Introduction 1 Chapter 5 TH EDITION Lewis & Loftus java Software Solutions Foundations of Program Design 2007 Pearson Addison-Wesley. All rights reserved Focus of the Course Object-Oriented Software Development
More informationClustering Application Benchmark
Clustering Application Benchmark Oğuz Altun 1, Nilgün Dursunoğlu 2, M.Fatih Amasyalı 3 1,3 Yıldız Technical University, Computer Engineering Department, Turkey 2 Garanti Teknoloji, Turkey E-mail: 1,3 {oguz,
More informationRecursion defining an object (or function, algorithm, etc.) in terms of itself. Recursion can be used to define sequences
Section 5.3 1 Recursion 2 Recursion Recursion defining an object (or function, algorithm, etc.) in terms of itself. Recursion can be used to define sequences Previously sequences were defined using a specific
More informationEvaluating XPath Queries
Chapter 8 Evaluating XPath Queries Peter Wood (BBK) XML Data Management 201 / 353 Introduction When XML documents are small and can fit in memory, evaluating XPath expressions can be done efficiently But
More informationSONG: Half Life Counter-Strike Network Traffic Trace Files
SONG: Half Life Counter-Strike Network Traffic Trace Files Lawrence Stewart, Philip Branch CAIA Technical Report 060406B Swinburne University of Technology Melbourne, Australia {lastewart,pbranch}@swin.edu.au
More information1. Data Model, Categories, Schemas and Instances. Outline
Chapter 2: Database System Concepts and Architecture Outline Ramez Elmasri, Shamkant B. Navathe(2016) Fundamentals of Database Systems (7th Edition),pearson, isbn 10: 0-13-397077-9;isbn-13:978-0-13-397077-7.
More informationSEMESTER 4. BCA401: Operational Research (Complementary) ( Syllabus as approved by Board of Studies of Mathematics ( UG)
SEMESTER 4 BCA401: Operational Research (Complementary) ( Syllabus as approved by Board of Studies of Mathematics ( UG) BCA402 : Microprocessors and PC Hardware (Core) Unit1: Introduction to the concept
More informationQuery Rewriting Using Views in the Presence of Inclusion Dependencies
Query Rewriting Using Views in the Presence of Inclusion Dependencies Qingyuan Bai Jun Hong Michael F. McTear School of Computing and Mathematics, University of Ulster at Jordanstown, Newtownabbey, Co.
More informationDATABASE MANAGEMENT SYSTEMS
DATABASE MANAGEMENT SYSTEMS E0 261 Jayant Haritsa Computer Science and Automation Indian Institute of Science JAN 2017 Slide 1 E0 261 JAN 2017 Slide 2 PRE-REQUISITES Undergrad DBMS course with Basic Concepts,
More informationChapter 12: Indexing and Hashing. Basic Concepts
Chapter 12: Indexing and Hashing! Basic Concepts! Ordered Indices! B+-Tree Index Files! B-Tree Index Files! Static Hashing! Dynamic Hashing! Comparison of Ordered Indexing and Hashing! Index Definition
More informationDatabase Management System Implementation. Who am I? Who is the teaching assistant? TR, 10:00am-11:20am NTRP B 140 Instructor: Dr.
Database Management System Implementation TR, 10:00am-11:20am NTRP B 140 Instructor: Dr. Yan Huang TA: TBD Who am I? Dr. Yan Huang, graduated 2003 from University of Minnesota Research interests: database,
More information