TMOM : A Moving Object Main Memory-Based DBMS for Telematics Services
|
|
- Marianna Ramsey
- 5 years ago
- Views:
Transcription
1 TMOM : A Moving Object Main Memory-Based DBMS for Telematics Services Joung-Joon Kim, Dong-Suk Hong, Hong-Koo Kang, Ki-Joon Han School of Computer Science & Engineering Konkuk University Seoul, Korea {jjkim9, dshong, hkkang, kjhan}@db.konkuk.ac.kr
2 Table of contents Introduction Related Works TMOM (Telematics Moving Object Main Memory DBMS) Performance Evaluation Conclusion and Future Work 2
3 Introduction Research Goals The telematics system must deal with a large amount and various types of location data and sensor data Most telematics services should be provided in real time, they need to support quick response to data requests using a Main Memory-based DBMS (MMDBMS) MMDBMS s support only a small number of spatial data types and spatial operators, and their completeness is low Therefore, necessary to research and develop MMDBMS that can process and manage large moving object data 3
4 Related Works Spatial data types and operators OpenGIS Simple Features Specification for SQL 4
5 Related Works Index of moving objects Researches related to the index of moving objects are largely di vided into three categories Indexes for searching present and future location R-tree, Quad-tree and TPR-tree Indexes for searching past location 3DR-tree, HR-tree and MV3R-tree Indexes for the movement of moving objects STR-tree, TB-tree and CR-tree (Combined R-tree) Indexes for high cache performance to optimize the main memory CSB+-Tree pr-tree CR-Tree is a Variation of R-Tree that compresses MBR 5
6 Related Works Requirements of Moving Object MMDBMS Technology for the moving object MMDBMS is a key technology for all telematics services Efficient data modeling for continuously changing data to reduce the cost of data update, and various operators Indexing technology optimized to the main memory for the fast search of large moving object data High-performance transaction processing technology and efficient recovery technology Data compression technology is necessary for compressing and decompressing data for efficient network transmission in data import/export 6
7 TMOM (Telematics Moving Object Main Memory DBMS) Architecture of TMOM 7
8 TMOM Data Types and Operators Spatio-temporal Data Types and Spatio-temporal Operators 8
9 TMOM Data Types and Operators Temporal Data Types and Temporal Operators 9
10 TMOM Data Compression Arithmetic coding technique Example of Spatial and Spatio-temporal Data Compression 10
11 TMOM Indexes In order to adapt the disk-based indexes to the main memory, CR-tree (Cache-conscious R-tree) is applied Reduce the growing size of MBR Reduce the cost of additional update for reconstructing MBR compression. 11
12 TMOM Recovery Technique Uses the fuzzy-shadow checkpoint technique Structure of Recovery Procedure 12
13 Performance Evaluation Index Performance Evaluation Index Size Data Insert Time 13
14 Performance Evaluation Index Performance Evaluation Data Search Time 14
15 Performance Evaluation Data Compression Performance Evaluation Data Compression Size Data Compression Time 15
16 Performance Evaluation Transaction/Recovery Performance Evaluation Transaction Processing Time Checkpointing Time Recovery Time 16
17 Conclusion and Future Work Conclusion Designed various spatial, spatio-temporal and temporal data types Suggested indexing technology Developed recovery technology Developed data compression technology and data caching technology Designed and implemented TMOM Future Work Duplication techniques for duplicating and maintaining databases 17
18 Q & A Thank you jjkim9@db.konkuk.ac.kr 18
19 MBR compression of CR-tree B B insert MBR compression standard point A C MBR compression standard point A delete B MBR compression standard point Need the cost of additional update for reconstructing MBR compression 19
20 MBR compresion of TMOM indexes Broad distribution nded MBR insert Extended M MBR compression standard point pression point delete MBR compression standard point 부모노드의확장 MBR 안에있을경우 MBR 압축재구성이필요없음 20
21 MBR compresion of TMOM indexes Narrow distribution , Whole MBR , ompression rd point MBR compression standard point , , ,
22 Arithmetic coding technique Signed flag : +(0)/-(1) Length flag : 1 : 4bit, 2 : 8bit, 3 : 12bit, 4 : 16bit, 5 : 20bit -> 15, 255, 4095, 65535, Ex) > Min : 4byte, Max : 12byte 1bit 3bit 4-20bit 4bit 4-20bit +/- Length flag of integer Integer value Length flag of float Float value 22
Spatio-Temporal Lite DBMS for u-gis
Spatio-Temporal Lite DBMS for u-gis Ki-Young Lee 1, Jeong-Joon Kim 2, Jeong-Jin Kang 3, Jeong-Lae Kim 4, Gyoo-Seok Choi 5 and Chae-Gyun Lim a 1 Department of Medical IT and Marketing Eulji University,
More informationResearch Article Aggregate Queries in Wireless Sensor Networks
International Journal of Distributed Sensor Networks Volume 212, Article ID 625798, 15 pages doi:1.1155/212/625798 Research Article Aggregate Queries in Wireless Sensor Networks Jeong-Joon Kim, 1 In-Su
More informationIMAGE ENHANCEMENT in SPATIAL DOMAIN by Intensity Transformations
It makes all the difference whether one sees darkness through the light or brightness through the shadows David Lindsay IMAGE ENHANCEMENT in SPATIAL DOMAIN by Intensity Transformations Kalyan Kumar Barik
More informationMobility Data Management and Exploration: Theory and Practice
Mobility Data Management and Exploration: Theory and Practice Chapter 4 -Mobility data management at the physical level Nikos Pelekis & Yannis Theodoridis InfoLab, University of Piraeus, Greece infolab.cs.unipi.gr
More informationLecture 4 Image Enhancement in Spatial Domain
Digital Image Processing Lecture 4 Image Enhancement in Spatial Domain Fall 2010 2 domains Spatial Domain : (image plane) Techniques are based on direct manipulation of pixels in an image Frequency Domain
More informationDatabase Systems and Modern CPU Architecture
Database Systems and Modern CPU Architecture Prof. Dr. Torsten Grust Winter Term 2006/07 Hard Disk 2 RAM Administrativa Lecture hours (@ MI HS 2): Monday, 09:15 10:00 Tuesday, 14:15 15:45 No lectures on
More informationDigital Image Processing
Lecture 9+10 Image Compression Lecturer: Ha Dai Duong Faculty of Information Technology 1. Introduction Image compression To Solve the problem of reduncing the amount of data required to represent a digital
More informationCS4617 Computer Architecture
1/27 CS4617 Computer Architecture Lecture 7: Instruction Set Architectures Dr J Vaughan October 1, 2014 2/27 ISA Classification Stack architecture: operands on top of stack Accumulator architecture: 1
More informationChapter 4. Fundamental File Structure Concepts Kim Joung-Joon Database Lab. jjkim9@db.konkuk.ac.kr Chapter Outline 4.1 Field and Record Organization 4.2 Using Classes to Manipulate Buffers 4.3 Using Inheritance
More informationTPR tree Running in Main Memory
AALBORG UNIVERSITY Department of Computer Science TPR tree Running in Main Memory Beata Nitkiewicz Michał Pańczyk August 2006 1 2 Abstract As the branch of business, where locations based services matter,
More informationPriority and Network-aware Data Control Scheme to Guarantee the Media Quality in LTE Networks
Priority and Network-aware Data Control Scheme to Guarantee the Media Quality in LTE Networks Dongchil Kim and Kwangsue Chung Abstract For efficient streaming over wireless networks, the LTE (Long Term
More informationTransmission of IPv6 Packets over Near Field Communication
Transmission of IPv6 Packets over Near Field Communication draft-ietf-6lo-nfc-05 Y-H. Choi, Y-G. Hong (ETRI), J-S. Youn (DONG-EUI Univ.), D-K. Kim (KNU) J-H. Choi (Samsung) 6lo WG Meeting@IETF 97 Seoul,
More informationLecture 4. Digital Image Enhancement. 1. Principle of image enhancement 2. Spatial domain transformation. Histogram processing
Lecture 4 Digital Image Enhancement 1. Principle of image enhancement 2. Spatial domain transformation Basic intensity it tranfomation ti Histogram processing Principle Objective of Enhancement Image enhancement
More informationAimBetter Database Monitor - Version
Upgrade Guide v2.0.18.4 AimBetter Database Monitor - Version 2.0.18.4 AimBetter is pleased to bring you this release document with details of our new version v.2.0.18.4 Important Note: In order for the
More informationFaculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)
Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.
More informationLow Level Programming Lecture 2. International Faculty of Engineerig, Technical University of Łódź
Low Level Programming Lecture 2 Intel processors' architecture reminder Fig. 1. IA32 Registers IA general purpose registers EAX- accumulator, usually used to store results of integer arithmetical or binary
More informationUVA. Database Systems. Need for information
Database Systems Need for information - information age and information explosion - information: structured and interpreted data - one of the major driving force on the growing use of computers individually
More informationAdvanced Memory Management
Advanced Memory Management Main Points Applications of memory management What can we do with ability to trap on memory references to individual pages? File systems and persistent storage Goals Abstractions
More informationImage compression. Stefano Ferrari. Università degli Studi di Milano Methods for Image Processing. academic year
Image compression Stefano Ferrari Università degli Studi di Milano stefano.ferrari@unimi.it Methods for Image Processing academic year 2017 2018 Data and information The representation of images in a raw
More informationConstruct a High Efficiency VM Disaster Recovery Solution. Best choice for protecting virtual environments
Construct a High Efficiency VM Disaster Recovery Solution Best choice for protecting virtual environments About NAKIVO Established in the USA since 2012 Provides data protection solutions for VMware, Hyper-V
More informationAdvanced Database Management System (CoSc3052) Database Recovery Techniques. Purpose of Database Recovery. Types of Failure.
Advanced Database Management System (CoSc3052) Database Recovery Techniques Purpose of Database Recovery To bring the database into a consistent state after a failure occurs To ensure the transaction properties
More informationESc101 : Fundamental of Computing
ESc101 : Fundamental of Computing I Semester 2008-09 Lecture 9+10 Types Range of numeric types and literals (constants) in JAVA Expressions with values of mixed types 1 I : Range of numeric types and literals
More informationStructure. Woo-Chan Park, Kil-Whan Lee, Seung-Gi Lee, Moon-Hee Choi, Won-Jong Lee, Cheol-Ho Jeong, Byung-Uck Kim, Woo-Nam Jung,
A High Performance 3D Graphics Rasterizer with Effective Memory Structure Woo-Chan Park, Kil-Whan Lee, Seung-Gi Lee, Moon-Hee Choi, Won-Jong Lee, Cheol-Ho Jeong, Byung-Uck Kim, Woo-Nam Jung, Il-San Kim,
More informationFiltering and Enhancing Images
KECE471 Computer Vision Filtering and Enhancing Images Chang-Su Kim Chapter 5, Computer Vision by Shapiro and Stockman Note: Some figures and contents in the lecture notes of Dr. Stockman are used partly.
More informationThe Google File System
The Google File System Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung Google SOSP 03, October 19 22, 2003, New York, USA Hyeon-Gyu Lee, and Yeong-Jae Woo Memory & Storage Architecture Lab. School
More informationCROSS-PLANE CHROMA ENHANCEMENT FOR SHVC INTER-LAYER PREDICTION
CROSS-PLANE CHROMA ENHANCEMENT FOR SHVC INTER-LAYER PREDICTION Jie Dong, Yan Ye, Yuwen He InterDigital Communications, Inc. PCS2013, Dec. 8-11, 2013, San Jose, USA 1 2013 InterDigital, Inc. All rights
More informationData Modeling using ER Model
Data Modeling using ER Model Database design process - requirements collection and analysis: database requirements and functional requirements - conceptual DB design using a high-level model: easier to
More informationCMSC411 Fall 2013 Midterm 1
CMSC411 Fall 2013 Midterm 1 Name: Instructions You have 75 minutes to take this exam. There are 100 points in this exam, so spend about 45 seconds per point. You do not need to provide a number if you
More informationA COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE
More informationLecture Topics. Announcements. Today: Integer Arithmetic (P&H ) Next: continued. Consulting hours. Introduction to Sim. Milestone #1 (due 1/26)
Lecture Topics Today: Integer Arithmetic (P&H 3.1-3.4) Next: continued 1 Announcements Consulting hours Introduction to Sim Milestone #1 (due 1/26) 2 1 Overview: Integer Operations Internal representation
More informationMore B-trees, Hash Tables, etc. CS157B Chris Pollett Feb 21, 2005.
More B-trees, Hash Tables, etc. CS157B Chris Pollett Feb 21, 2005. Outline B-tree Domain of Application B-tree Operations Hash Tables on Disk Hash Table Operations Extensible Hash Tables Multidimensional
More informationFINALTERM EXAMINATION Fall 2008 CS501- Advance Computer Architecture (Session - 1) Marks: 75
FINALTERM EXAMINATION Fall 2008 CS501- Advance Computer Architecture (Session - 1) Marks: 75 Question No: 1 ( Marks: 1 ) - Please choose one Which one of the following is the memory organization of SRC
More informationJin-Soo Kim Systems Software & Architecture Lab. Seoul National University. Integers. Spring 2019
Jin-Soo Kim (jinsoo.kim@snu.ac.kr) Systems Software & Architecture Lab. Seoul National University Integers Spring 2019 4190.308: Computer Architecture Spring 2019 Jin-Soo Kim (jinsoo.kim@snu.ac.kr) 2 A
More informationAn Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 187 An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6 Pyung-Soo
More informationProvide One Year Free Update!
QUESTION & ANSWER HIGHER QUALITY, BETTER SERVICE Provide One Year Free Update! https://www.passquestion.com Exam : E20-598 Title : Backup Recovery - Avamar Specialist Exam for Storage Administrators Version
More informationByte Index Chunking Approach for Data Compression
Ider Lkhagvasuren 1, Jung Min So 1, Jeong Gun Lee 1, Chuck Yoo 2, Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea {Ider555, jso, jeonggun.lee, yuko}@hallym.ac.kr 2
More informationModule 1: Basics and Background Lecture 4: Memory and Disk Accesses. The Lecture Contains: Memory organisation. Memory hierarchy. Disks.
The Lecture Contains: Memory organisation Example of memory hierarchy Memory hierarchy Disks Disk access Disk capacity Disk access time Typical disk parameters Access times file:///c /Documents%20and%20Settings/iitkrana1/My%20Documents/Google%20Talk%20Received%20Files/ist_data/lecture4/4_1.htm[6/14/2012
More informationData Structure. Lecture#2: Data Structures and Algorithms. U Kang Seoul National University. U Kang (2016) 1
Data Structure Lecture#2: Data Structures and Algorithms U Kang Seoul National University U Kang (2016) 1 In This Lecture Learn what to consider in selecting right data structures Understand the need for
More informationDBMS Implementation. Chapter 6.4 V3.0. Napier University Dr Gordon Russell
DBMS Implementation Chapter 6.4 V3.0 Copyright @ Napier University Dr Gordon Russell Implementing a DBMS The DBMS takes in SQL The SQL must be processed. The results of the SQL returned to the user/ Applied
More informationDisks and Files. Jim Gray s Storage Latency Analogy: How Far Away is the Data? Components of a Disk. Disks
Review Storing : Disks and Files Lecture 3 (R&G Chapter 9) Aren t bases Great? Relational model SQL Yea, from the table of my memory I ll wipe away all trivial fond records. -- Shakespeare, Hamlet A few
More informationCSE 410. Operating Systems
CSE 410 Operating Systems Handout: syllabus 1 Today s Lecture Course organization Computing environment Overview of course topics 2 Course Organization Course website http://www.cse.msu.edu/~cse410/ Syllabus
More informationChapter 17 Indexing Structures for Files and Physical Database Design
Chapter 17 Indexing Structures for Files and Physical Database Design We assume that a file already exists with some primary organization unordered, ordered or hash. The index provides alternate ways to
More informationUNIT 7A Data Representation: Numbers and Text. Digital Data
UNIT 7A Data Representation: Numbers and Text 1 Digital Data 10010101011110101010110101001110 What does this binary sequence represent? It could be: an integer a floating point number text encoded with
More informationCOMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai
COMPUTER VISION Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai 600036. Email: sdas@iitm.ac.in URL: //www.cs.iitm.ernet.in/~sdas 1 INTRODUCTION 2 Human Vision System (HVS) Vs.
More informationData Containers. User Guide
Data Containers User Guide Contents 1. Overview... 2 Advantages of... 2 Data container options... 2 Migrating from VHD to VHDX... 3 2. Creating a Data container backup... 3 Creating a backup job... 3 Data
More information10/29/2013. Program Agenda. The Database Trifecta: Simplified Management, Less Capacity, Better Performance
Program Agenda The Database Trifecta: Simplified Management, Less Capacity, Better Performance Data Growth and Complexity Hybrid Columnar Compression Case Study & Real-World Experiences
More informationCPU Structure and Function
Computer Architecture Computer Architecture Prof. Dr. Nizamettin AYDIN naydin@yildiz.edu.tr nizamettinaydin@gmail.com http://www.yildiz.edu.tr/~naydin CPU Structure and Function 1 2 CPU Structure Registers
More informationChapter 7. GridStor Technology. Adding Data Paths. Data Paths for Global Deduplication. Data Path Properties
Chapter 7 GridStor Technology GridStor technology provides the ability to configure multiple data paths to storage within a storage policy copy. Having multiple data paths enables the administrator to
More informationCS 405G: Introduction to Database Systems. Storage
CS 405G: Introduction to Database Systems Storage It s all about disks! Outline That s why we always draw databases as And why the single most important metric in database processing is the number of disk
More informationQuadrant-Based MBR-Tree Indexing Technique for Range Query Over HBase
Quadrant-Based MBR-Tree Indexing Technique for Range Query Over HBase Bumjoon Jo and Sungwon Jung (&) Department of Computer Science and Engineering, Sogang University, 35 Baekbeom-ro, Mapo-gu, Seoul 04107,
More informationSpace-Efficient Page-Level Incremental Checkpointing *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 22, 237-246 (2006) Space-Efficient Page-Level Incremental Checkpointing * JUNYOUNG HEO, SANGHO YI, YOOKUN CHO AND JIMAN HONG + School of Computer Science
More informationInstruction Sets: Characteristics and Functions
Instruction Sets: Characteristics and Functions Chapter 10 Lesson 15 Slide 1/22 Machine instruction set Computer designer: The machine instruction set provides the functional requirements for the CPU.
More informationA Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop
A Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop Myoungjin Kim 1, Seungho Han 1, Jongjin Jung 3, Hanku Lee 1,2,*, Okkyung Choi 2 1 Department of Internet and Multimedia Engineering,
More informationRealization of Big Data Platform for PMU - Real-Time Data Processing & Historical Data Analysis -
Realization of Big Data Platform for - Real-Time Data Processing & Historical Data Analysis - March 27, 2014 Yutaka Kokai Hitachi America, Ltd. Shinji Fujiwara Hitachi, Ltd. Contents 1.Technical requirements
More informationNext Generation Technology from Intel Intel Pentium 4 Processor
Next Generation Technology from Intel Intel Pentium 4 Processor 1 The Intel Pentium 4 Processor Platform Intel s highest performance processor for desktop PCs Targeted at consumer enthusiasts and business
More informationCache-Conscious Concurrency Control of Main-Memory Indexes on Shared-Memory Multiprocessor Systems
Cache-Conscious Concurrency Control of Main-Memory Indexes on Shared-Memory Multiprocessor Systems Sang K. Cha, Sangyong Hwang, Kihong Kim, Keunjoo Kwon VLDB 2001 Presented by: Raluca Marcuta 1 / 31 1
More informationCS640: Introduction to Computer Networks. Application Classes. Application Classes (more) 11/20/2007
CS640: Introduction to Computer Networks Aditya Akella Lecture 21 - Multimedia Networking Application Classes Typically sensitive to delay, but can tolerate packet loss (would cause minor glitches that
More informationWavelet Based Image Compression Using ROI SPIHT Coding
International Journal of Information & Computation Technology. ISSN 0974-2255 Volume 1, Number 2 (2011), pp. 69-76 International Research Publications House http://www.irphouse.com Wavelet Based Image
More informationRecovery Techniques. The System Failure Problem. Recovery Techniques and Assumptions. Failure Types
The System Failure Problem Recovery Techniques It is possible that the stable database: (because of buffering of blocks in main memory) contains values written by uncommitted transactions. does not contain
More informationControl unit. Input/output devices provide a means for us to make use of a computer system. Computer System. Computer.
Lecture 6: I/O and Control I/O operations Control unit Microprogramming Zebo Peng, IDA, LiTH 1 Input/Output Devices Input/output devices provide a means for us to make use of a computer system. Computer
More informationCaches and Memory Hierarchy: Review. UCSB CS240A, Winter 2016
Caches and Memory Hierarchy: Review UCSB CS240A, Winter 2016 1 Motivation Most applications in a single processor runs at only 10-20% of the processor peak Most of the single processor performance loss
More informationCS 525: Advanced Database Organization
CS 525: Advanced Database Organization 06: Even more index structures Boris Glavic Slides: adapted from a course taught by Hector Garcia- Molina, Stanford InfoLab CS 525 Notes 6 - More Indices 1 Recap
More informationIntroduction to IBM DB2
Introduction to IBM DB2 IT4GIS Keith T. Weber, GISP GIS Director ISU GIS Training and Research Center What is it? IBM DB2 (Database 2) An object-relational database: No software limitations (e.g., size
More informationA Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles
6th WSEAS International Conference on Information Security and Privacy, Tenerife, Spain, December 14-16, 2007 146 A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by
More informationBITS, PILANI -DUBAI. International Academic City, Dubai BE (Hans) CS III Year -2nd Sem
BITS, PILANI -DUBAI International Academic City, Dubai BE (Hans) CS III Year -2nd Sem ADVANCED C:OMPUTER ORGANISATION -CS UC 342 COMPREHENSIVE EXAM (Closed book) Date: 01 June 2008 Time: 3 hrs Max Marks:
More informationCS61C : Machine Structures
inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structures CS 61C L21 Caches II (1) Lecture 21 Caches II 24-3-1 Lecturer PSOE Dan Garcia www.cs.berkeley.edu/~ddgarcia US Buys world s biggest RAM disk. 2.5TB!
More informationBlock-based Watermarking Using Random Position Key
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009 83 Block-based Watermarking Using Random Position Key Won-Jei Kim, Jong-Keuk Lee, Ji-Hong Kim, and Ki-Ryong
More informationComplex Event Processing Based Real Time Detection of Road Traffic
Complex Event Processing Based Real Time Detection of Road Traffic Events 1 Sokha Y, 2 Karpjoo Jeong, 2 Jonghyun Lee, 3 Sanghyun Lee, 3 Youngmin Baek, 3 Seongwan Koo 1 Department of Advanced Technology
More informationCSE 373 OCTOBER 23 RD MEMORY AND HARDWARE
CSE 373 OCTOBER 23 RD MEMORY AND HARDWARE MEMORY ANALYSIS Similar to runtime analysis MEMORY ANALYSIS Similar to runtime analysis Consider the worst case MEMORY ANALYSIS Similar to runtime analysis Rather
More informationPACM: A Prediction-based Auto-adaptive Compression Model for HDFS. Ruijian Wang, Chao Wang, Li Zha
PACM: A Prediction-based Auto-adaptive Compression Model for HDFS Ruijian Wang, Chao Wang, Li Zha Hadoop Distributed File System Store a variety of data http://popista.com/distributed-filesystem/distributed-file-system:/125620
More informationProgramming in Python 3
Programming in Python 3 A Complete Introduction to the Python Language Mark Summerfield.4.Addison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich
More informationCOMPUTER ORGANIZATION & ARCHITECTURE
COMPUTER ORGANIZATION & ARCHITECTURE Instructions Sets Architecture Lesson 5a 1 What are Instruction Sets The complete collection of instructions that are understood by a CPU Can be considered as a functional
More informationFile. File System Implementation. File Metadata. File System Implementation. Direct Memory Access Cont. Hardware background: Direct Memory Access
File File System Implementation Operating Systems Hebrew University Spring 2009 Sequence of bytes, with no structure as far as the operating system is concerned. The only operations are to read and write
More informationOutline. Assumptions. Key Features. A Content-Based Networking Protocol For Sensor Networks (Technical Report 2004)
A Content-Based Networking Protocol For Sensor Networks (Technical Report 004) Presented by: Kyu-Wook Cho /0/05 Outline Assumptions Direct access only to neighbor nodes Resource-constrained nodes Many
More informationA cost model for spatio-temporal queries using the TPR-tree
The Journal of Systems and Software 73 (2004) 101 112 www.elsevier.com/locate/jss A cost model for spatio-temporal queries using the TPR-tree Yong-Jin Choi *, Jun-Ki Min, Chin-Wan Chung Division of Computer
More informationECE 486/586. Computer Architecture. Lecture # 8
ECE 486/586 Computer Architecture Lecture # 8 Spring 2015 Portland State University Lecture Topics Instruction Set Principles MIPS Control flow instructions Dealing with constants IA-32 Fallacies and Pitfalls
More informationES623 Networked Embedded Systems
ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection
More informationASSEMBLY LANGUAGE MACHINE ORGANIZATION
ASSEMBLY LANGUAGE MACHINE ORGANIZATION CHAPTER 3 1 Sub-topics The topic will cover: Microprocessor architecture CPU processing methods Pipelining Superscalar RISC Multiprocessing Instruction Cycle Instruction
More informationTopic 5 Image Compression
Topic 5 Image Compression Introduction Data Compression: The process of reducing the amount of data required to represent a given quantity of information. Purpose of Image Compression: the reduction of
More informationComputer Systems Overview
Computer Systems Overview Maurizio Pizzonia slides adattate da W. Stalling Operating Systems: Internals and Design Principles http://williamstallings.com/os/os5e.html 1 Basic Elements Processor Main Memory
More informationCHAPTER 5 A Closer Look at Instruction Set Architectures
CHAPTER 5 A Closer Look at Instruction Set Architectures 5.1 Introduction 5.2 Instruction Formats 5.2.1 Design Decisions for Instruction Sets 5.2.2 Little versus Big Endian 5.2.3 Internal Storage in the
More informationReliable Computing I
Instructor: Mehdi Tahoori Reliable Computing I Lecture 8: Redundant Disk Arrays INSTITUTE OF COMPUTER ENGINEERING (ITEC) CHAIR FOR DEPENDABLE NANO COMPUTING (CDNC) National Research Center of the Helmholtz
More informationTelematics Transport Gateway for Telematics Systems. Independent on Mobile Networks
Telematics Transport Gateway for Telematics Systems Independent on Mobile Networks Chul-Su Kim 1 *, Jongik Kim, Woo-Yong Han, and Oh-Cheon Kwon 1. Electronics and Telecommunications Research Institute,
More informationPublishing CitiSense Data: Privacy Concerns and Remedies
Publishing CitiSense Data: Privacy Concerns and Remedies Kapil Gupta Advisor : Prof. Bill Griswold 1 Location Based Services Great utility of location based services data traffic control, mobility management,
More informationDatabase Applications (15-415)
Database Applications (15-415) DBMS Internals- Part V Lecture 15, March 15, 2015 Mohammad Hammoud Today Last Session: DBMS Internals- Part IV Tree-based (i.e., B+ Tree) and Hash-based (i.e., Extendible
More informationImage Coding and Data Compression
Image Coding and Data Compression Biomedical Images are of high spatial resolution and fine gray-scale quantisiation Digital mammograms: 4,096x4,096 pixels with 12bit/pixel 32MB per image Volume data (CT
More informationLecture Topics. Branch Condition Options. Branch Conditions ECE 486/586. Computer Architecture. Lecture # 8. Instruction Set Principles.
ECE 486/586 Computer Architecture Lecture # 8 Spring 2015 Portland State University Instruction Set Principles MIPS Control flow instructions Dealing with constants IA-32 Fallacies and Pitfalls Reference:
More informationBSNL TTA Question Paper-Computers Specialization 2007
BSNL TTA Question Paper-Computers Specialization 2007 1. What is the name of the software that allows us to browse through web pages? (a) Browser (b) Mail Client (c) FTP Client (d) Messenger 2. What is
More informationCaches and Memory Hierarchy: Review. UCSB CS240A, Fall 2017
Caches and Memory Hierarchy: Review UCSB CS24A, Fall 27 Motivation Most applications in a single processor runs at only - 2% of the processor peak Most of the single processor performance loss is in the
More informationA Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants. Florian Kauer, Florian Meyer, Volker Turau
A Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants Florian Kauer, Florian Meyer, Volker Turau June 13 th, 2017 Institute of Telematics Hamburg University of Technology
More informationGoogle File System 2
Google File System 2 goals monitoring, fault tolerance, auto-recovery (thousands of low-cost machines) focus on multi-gb files handle appends efficiently (no random writes & sequential reads) co-design
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 BACKUP BUILT FOR VMWARE Mark Twomey Technical Director, The Office Of The CTO 2 Agenda Market Forces Optimized VMware Backup Backup And Recovery For VCE Vblock Protecting vcloud Director Customer Success
More informationChallenges in large-scale graph processing on HPC platforms and the Graph500 benchmark. by Nkemdirim Dockery
Challenges in large-scale graph processing on HPC platforms and the Graph500 benchmark by Nkemdirim Dockery High Performance Computing Workloads Core-memory sized Floating point intensive Well-structured
More informationCS501_Current Mid term whole paper Solved with references by MASOOM FAIRY
Total Questions: 6 MCQs: 0 Subjective: 6 Whole Paper is given below: Question No: 1 ( Marks: 1 ) FALCON-A processor bus has 16 lines or is 16-bits wide while that of SRC wide. 8-bits 16-bits 3-bits (Page
More informationDatabase Recovery. Haengrae Cho Yeungnam University. Database recovery. Introduction to Database Systems
Database Recovery Haengrae Cho Yeungnam University Database recovery. Introduction to Database Systems Report Yeungnam University, Database Lab. Chapter 1-1 1. Introduction to Database Recovery 2. Recovery
More informationTrends in Data Protection and Restoration Technologies. Jason Iehl, NetApp
Trends in Data Protection and Restoration Technologies Jason Iehl, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and
More informationAP-VPMS VoIP Plug & Play Management System Next Generation Large Scale VoIP Equipment Management Solution
AP-VPMS VoIP Plug & Play Management System Next Generation Large Scale VoIP Equipment Management Solution AddPac Technology Sales and Marketing www.addpac.com AP-VPMS VoIP Plug & Play Management System
More informationIn this lecture. Background. Background. Background. PAM3012 Digital Image Processing for Radiographers
PAM3012 Digital Image Processing for Radiographers Image Enhancement in the Spatial Domain (Part I) In this lecture Image Enhancement Introduction to spatial domain Information Greyscale transformations
More informationContact Hours / week: 4 Total hours: 64. Table of Contents Architecture 3 Data Modeling Using the Entity-
Govt. of Karnataka, Department of Technical Education Diploma in Information Science & Engineering Fourth Semester Subject: DATABASE MANAGEMENT SYSTEMS Contact Hours / week: 4 Total hours: 64 Table of
More informationCST-Trees: Cache Sensitive T-Trees
CST-Trees: Cache Sensitive T-Trees Ig-hoon Lee 1, Junho Shim 2, Sang-goo Lee 3, and Jonghoon Chun 4 1 Prompt Corp., Seoul, Korea ihlee@prompt.co.kr 2 Department of Computer Science, Sookmyung Women s University,
More information