TMOM : A Moving Object Main Memory-Based DBMS for Telematics Services

Size: px
Start display at page:

Download "TMOM : A Moving Object Main Memory-Based DBMS for Telematics Services"

Transcription

1 TMOM : A Moving Object Main Memory-Based DBMS for Telematics Services Joung-Joon Kim, Dong-Suk Hong, Hong-Koo Kang, Ki-Joon Han School of Computer Science & Engineering Konkuk University Seoul, Korea {jjkim9, dshong, hkkang, kjhan}@db.konkuk.ac.kr

2 Table of contents Introduction Related Works TMOM (Telematics Moving Object Main Memory DBMS) Performance Evaluation Conclusion and Future Work 2

3 Introduction Research Goals The telematics system must deal with a large amount and various types of location data and sensor data Most telematics services should be provided in real time, they need to support quick response to data requests using a Main Memory-based DBMS (MMDBMS) MMDBMS s support only a small number of spatial data types and spatial operators, and their completeness is low Therefore, necessary to research and develop MMDBMS that can process and manage large moving object data 3

4 Related Works Spatial data types and operators OpenGIS Simple Features Specification for SQL 4

5 Related Works Index of moving objects Researches related to the index of moving objects are largely di vided into three categories Indexes for searching present and future location R-tree, Quad-tree and TPR-tree Indexes for searching past location 3DR-tree, HR-tree and MV3R-tree Indexes for the movement of moving objects STR-tree, TB-tree and CR-tree (Combined R-tree) Indexes for high cache performance to optimize the main memory CSB+-Tree pr-tree CR-Tree is a Variation of R-Tree that compresses MBR 5

6 Related Works Requirements of Moving Object MMDBMS Technology for the moving object MMDBMS is a key technology for all telematics services Efficient data modeling for continuously changing data to reduce the cost of data update, and various operators Indexing technology optimized to the main memory for the fast search of large moving object data High-performance transaction processing technology and efficient recovery technology Data compression technology is necessary for compressing and decompressing data for efficient network transmission in data import/export 6

7 TMOM (Telematics Moving Object Main Memory DBMS) Architecture of TMOM 7

8 TMOM Data Types and Operators Spatio-temporal Data Types and Spatio-temporal Operators 8

9 TMOM Data Types and Operators Temporal Data Types and Temporal Operators 9

10 TMOM Data Compression Arithmetic coding technique Example of Spatial and Spatio-temporal Data Compression 10

11 TMOM Indexes In order to adapt the disk-based indexes to the main memory, CR-tree (Cache-conscious R-tree) is applied Reduce the growing size of MBR Reduce the cost of additional update for reconstructing MBR compression. 11

12 TMOM Recovery Technique Uses the fuzzy-shadow checkpoint technique Structure of Recovery Procedure 12

13 Performance Evaluation Index Performance Evaluation Index Size Data Insert Time 13

14 Performance Evaluation Index Performance Evaluation Data Search Time 14

15 Performance Evaluation Data Compression Performance Evaluation Data Compression Size Data Compression Time 15

16 Performance Evaluation Transaction/Recovery Performance Evaluation Transaction Processing Time Checkpointing Time Recovery Time 16

17 Conclusion and Future Work Conclusion Designed various spatial, spatio-temporal and temporal data types Suggested indexing technology Developed recovery technology Developed data compression technology and data caching technology Designed and implemented TMOM Future Work Duplication techniques for duplicating and maintaining databases 17

18 Q & A Thank you jjkim9@db.konkuk.ac.kr 18

19 MBR compression of CR-tree B B insert MBR compression standard point A C MBR compression standard point A delete B MBR compression standard point Need the cost of additional update for reconstructing MBR compression 19

20 MBR compresion of TMOM indexes Broad distribution nded MBR insert Extended M MBR compression standard point pression point delete MBR compression standard point 부모노드의확장 MBR 안에있을경우 MBR 압축재구성이필요없음 20

21 MBR compresion of TMOM indexes Narrow distribution , Whole MBR , ompression rd point MBR compression standard point , , ,

22 Arithmetic coding technique Signed flag : +(0)/-(1) Length flag : 1 : 4bit, 2 : 8bit, 3 : 12bit, 4 : 16bit, 5 : 20bit -> 15, 255, 4095, 65535, Ex) > Min : 4byte, Max : 12byte 1bit 3bit 4-20bit 4bit 4-20bit +/- Length flag of integer Integer value Length flag of float Float value 22

Spatio-Temporal Lite DBMS for u-gis

Spatio-Temporal Lite DBMS for u-gis Spatio-Temporal Lite DBMS for u-gis Ki-Young Lee 1, Jeong-Joon Kim 2, Jeong-Jin Kang 3, Jeong-Lae Kim 4, Gyoo-Seok Choi 5 and Chae-Gyun Lim a 1 Department of Medical IT and Marketing Eulji University,

More information

Research Article Aggregate Queries in Wireless Sensor Networks

Research Article Aggregate Queries in Wireless Sensor Networks International Journal of Distributed Sensor Networks Volume 212, Article ID 625798, 15 pages doi:1.1155/212/625798 Research Article Aggregate Queries in Wireless Sensor Networks Jeong-Joon Kim, 1 In-Su

More information

IMAGE ENHANCEMENT in SPATIAL DOMAIN by Intensity Transformations

IMAGE ENHANCEMENT in SPATIAL DOMAIN by Intensity Transformations It makes all the difference whether one sees darkness through the light or brightness through the shadows David Lindsay IMAGE ENHANCEMENT in SPATIAL DOMAIN by Intensity Transformations Kalyan Kumar Barik

More information

Mobility Data Management and Exploration: Theory and Practice

Mobility Data Management and Exploration: Theory and Practice Mobility Data Management and Exploration: Theory and Practice Chapter 4 -Mobility data management at the physical level Nikos Pelekis & Yannis Theodoridis InfoLab, University of Piraeus, Greece infolab.cs.unipi.gr

More information

Lecture 4 Image Enhancement in Spatial Domain

Lecture 4 Image Enhancement in Spatial Domain Digital Image Processing Lecture 4 Image Enhancement in Spatial Domain Fall 2010 2 domains Spatial Domain : (image plane) Techniques are based on direct manipulation of pixels in an image Frequency Domain

More information

Database Systems and Modern CPU Architecture

Database Systems and Modern CPU Architecture Database Systems and Modern CPU Architecture Prof. Dr. Torsten Grust Winter Term 2006/07 Hard Disk 2 RAM Administrativa Lecture hours (@ MI HS 2): Monday, 09:15 10:00 Tuesday, 14:15 15:45 No lectures on

More information

Digital Image Processing

Digital Image Processing Lecture 9+10 Image Compression Lecturer: Ha Dai Duong Faculty of Information Technology 1. Introduction Image compression To Solve the problem of reduncing the amount of data required to represent a digital

More information

CS4617 Computer Architecture

CS4617 Computer Architecture 1/27 CS4617 Computer Architecture Lecture 7: Instruction Set Architectures Dr J Vaughan October 1, 2014 2/27 ISA Classification Stack architecture: operands on top of stack Accumulator architecture: 1

More information

Chapter 4. Fundamental File Structure Concepts Kim Joung-Joon Database Lab. jjkim9@db.konkuk.ac.kr Chapter Outline 4.1 Field and Record Organization 4.2 Using Classes to Manipulate Buffers 4.3 Using Inheritance

More information

TPR tree Running in Main Memory

TPR tree Running in Main Memory AALBORG UNIVERSITY Department of Computer Science TPR tree Running in Main Memory Beata Nitkiewicz Michał Pańczyk August 2006 1 2 Abstract As the branch of business, where locations based services matter,

More information

Priority and Network-aware Data Control Scheme to Guarantee the Media Quality in LTE Networks

Priority and Network-aware Data Control Scheme to Guarantee the Media Quality in LTE Networks Priority and Network-aware Data Control Scheme to Guarantee the Media Quality in LTE Networks Dongchil Kim and Kwangsue Chung Abstract For efficient streaming over wireless networks, the LTE (Long Term

More information

Transmission of IPv6 Packets over Near Field Communication

Transmission of IPv6 Packets over Near Field Communication Transmission of IPv6 Packets over Near Field Communication draft-ietf-6lo-nfc-05 Y-H. Choi, Y-G. Hong (ETRI), J-S. Youn (DONG-EUI Univ.), D-K. Kim (KNU) J-H. Choi (Samsung) 6lo WG Meeting@IETF 97 Seoul,

More information

Lecture 4. Digital Image Enhancement. 1. Principle of image enhancement 2. Spatial domain transformation. Histogram processing

Lecture 4. Digital Image Enhancement. 1. Principle of image enhancement 2. Spatial domain transformation. Histogram processing Lecture 4 Digital Image Enhancement 1. Principle of image enhancement 2. Spatial domain transformation Basic intensity it tranfomation ti Histogram processing Principle Objective of Enhancement Image enhancement

More information

AimBetter Database Monitor - Version

AimBetter Database Monitor - Version Upgrade Guide v2.0.18.4 AimBetter Database Monitor - Version 2.0.18.4 AimBetter is pleased to bring you this release document with details of our new version v.2.0.18.4 Important Note: In order for the

More information

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.

More information

Low Level Programming Lecture 2. International Faculty of Engineerig, Technical University of Łódź

Low Level Programming Lecture 2. International Faculty of Engineerig, Technical University of Łódź Low Level Programming Lecture 2 Intel processors' architecture reminder Fig. 1. IA32 Registers IA general purpose registers EAX- accumulator, usually used to store results of integer arithmetical or binary

More information

UVA. Database Systems. Need for information

UVA. Database Systems. Need for information Database Systems Need for information - information age and information explosion - information: structured and interpreted data - one of the major driving force on the growing use of computers individually

More information

Advanced Memory Management

Advanced Memory Management Advanced Memory Management Main Points Applications of memory management What can we do with ability to trap on memory references to individual pages? File systems and persistent storage Goals Abstractions

More information

Image compression. Stefano Ferrari. Università degli Studi di Milano Methods for Image Processing. academic year

Image compression. Stefano Ferrari. Università degli Studi di Milano Methods for Image Processing. academic year Image compression Stefano Ferrari Università degli Studi di Milano stefano.ferrari@unimi.it Methods for Image Processing academic year 2017 2018 Data and information The representation of images in a raw

More information

Construct a High Efficiency VM Disaster Recovery Solution. Best choice for protecting virtual environments

Construct a High Efficiency VM Disaster Recovery Solution. Best choice for protecting virtual environments Construct a High Efficiency VM Disaster Recovery Solution Best choice for protecting virtual environments About NAKIVO Established in the USA since 2012 Provides data protection solutions for VMware, Hyper-V

More information

Advanced Database Management System (CoSc3052) Database Recovery Techniques. Purpose of Database Recovery. Types of Failure.

Advanced Database Management System (CoSc3052) Database Recovery Techniques. Purpose of Database Recovery. Types of Failure. Advanced Database Management System (CoSc3052) Database Recovery Techniques Purpose of Database Recovery To bring the database into a consistent state after a failure occurs To ensure the transaction properties

More information

ESc101 : Fundamental of Computing

ESc101 : Fundamental of Computing ESc101 : Fundamental of Computing I Semester 2008-09 Lecture 9+10 Types Range of numeric types and literals (constants) in JAVA Expressions with values of mixed types 1 I : Range of numeric types and literals

More information

Structure. Woo-Chan Park, Kil-Whan Lee, Seung-Gi Lee, Moon-Hee Choi, Won-Jong Lee, Cheol-Ho Jeong, Byung-Uck Kim, Woo-Nam Jung,

Structure. Woo-Chan Park, Kil-Whan Lee, Seung-Gi Lee, Moon-Hee Choi, Won-Jong Lee, Cheol-Ho Jeong, Byung-Uck Kim, Woo-Nam Jung, A High Performance 3D Graphics Rasterizer with Effective Memory Structure Woo-Chan Park, Kil-Whan Lee, Seung-Gi Lee, Moon-Hee Choi, Won-Jong Lee, Cheol-Ho Jeong, Byung-Uck Kim, Woo-Nam Jung, Il-San Kim,

More information

Filtering and Enhancing Images

Filtering and Enhancing Images KECE471 Computer Vision Filtering and Enhancing Images Chang-Su Kim Chapter 5, Computer Vision by Shapiro and Stockman Note: Some figures and contents in the lecture notes of Dr. Stockman are used partly.

More information

The Google File System

The Google File System The Google File System Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung Google SOSP 03, October 19 22, 2003, New York, USA Hyeon-Gyu Lee, and Yeong-Jae Woo Memory & Storage Architecture Lab. School

More information

CROSS-PLANE CHROMA ENHANCEMENT FOR SHVC INTER-LAYER PREDICTION

CROSS-PLANE CHROMA ENHANCEMENT FOR SHVC INTER-LAYER PREDICTION CROSS-PLANE CHROMA ENHANCEMENT FOR SHVC INTER-LAYER PREDICTION Jie Dong, Yan Ye, Yuwen He InterDigital Communications, Inc. PCS2013, Dec. 8-11, 2013, San Jose, USA 1 2013 InterDigital, Inc. All rights

More information

Data Modeling using ER Model

Data Modeling using ER Model Data Modeling using ER Model Database design process - requirements collection and analysis: database requirements and functional requirements - conceptual DB design using a high-level model: easier to

More information

CMSC411 Fall 2013 Midterm 1

CMSC411 Fall 2013 Midterm 1 CMSC411 Fall 2013 Midterm 1 Name: Instructions You have 75 minutes to take this exam. There are 100 points in this exam, so spend about 45 seconds per point. You do not need to provide a number if you

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Lecture Topics. Announcements. Today: Integer Arithmetic (P&H ) Next: continued. Consulting hours. Introduction to Sim. Milestone #1 (due 1/26)

Lecture Topics. Announcements. Today: Integer Arithmetic (P&H ) Next: continued. Consulting hours. Introduction to Sim. Milestone #1 (due 1/26) Lecture Topics Today: Integer Arithmetic (P&H 3.1-3.4) Next: continued 1 Announcements Consulting hours Introduction to Sim Milestone #1 (due 1/26) 2 1 Overview: Integer Operations Internal representation

More information

More B-trees, Hash Tables, etc. CS157B Chris Pollett Feb 21, 2005.

More B-trees, Hash Tables, etc. CS157B Chris Pollett Feb 21, 2005. More B-trees, Hash Tables, etc. CS157B Chris Pollett Feb 21, 2005. Outline B-tree Domain of Application B-tree Operations Hash Tables on Disk Hash Table Operations Extensible Hash Tables Multidimensional

More information

FINALTERM EXAMINATION Fall 2008 CS501- Advance Computer Architecture (Session - 1) Marks: 75

FINALTERM EXAMINATION Fall 2008 CS501- Advance Computer Architecture (Session - 1) Marks: 75 FINALTERM EXAMINATION Fall 2008 CS501- Advance Computer Architecture (Session - 1) Marks: 75 Question No: 1 ( Marks: 1 ) - Please choose one Which one of the following is the memory organization of SRC

More information

Jin-Soo Kim Systems Software & Architecture Lab. Seoul National University. Integers. Spring 2019

Jin-Soo Kim Systems Software & Architecture Lab. Seoul National University. Integers. Spring 2019 Jin-Soo Kim (jinsoo.kim@snu.ac.kr) Systems Software & Architecture Lab. Seoul National University Integers Spring 2019 4190.308: Computer Architecture Spring 2019 Jin-Soo Kim (jinsoo.kim@snu.ac.kr) 2 A

More information

An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6

An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 187 An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6 Pyung-Soo

More information

Provide One Year Free Update!

Provide One Year Free Update! QUESTION & ANSWER HIGHER QUALITY, BETTER SERVICE Provide One Year Free Update! https://www.passquestion.com Exam : E20-598 Title : Backup Recovery - Avamar Specialist Exam for Storage Administrators Version

More information

Byte Index Chunking Approach for Data Compression

Byte Index Chunking Approach for Data Compression Ider Lkhagvasuren 1, Jung Min So 1, Jeong Gun Lee 1, Chuck Yoo 2, Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea {Ider555, jso, jeonggun.lee, yuko}@hallym.ac.kr 2

More information

Module 1: Basics and Background Lecture 4: Memory and Disk Accesses. The Lecture Contains: Memory organisation. Memory hierarchy. Disks.

Module 1: Basics and Background Lecture 4: Memory and Disk Accesses. The Lecture Contains: Memory organisation. Memory hierarchy. Disks. The Lecture Contains: Memory organisation Example of memory hierarchy Memory hierarchy Disks Disk access Disk capacity Disk access time Typical disk parameters Access times file:///c /Documents%20and%20Settings/iitkrana1/My%20Documents/Google%20Talk%20Received%20Files/ist_data/lecture4/4_1.htm[6/14/2012

More information

Data Structure. Lecture#2: Data Structures and Algorithms. U Kang Seoul National University. U Kang (2016) 1

Data Structure. Lecture#2: Data Structures and Algorithms. U Kang Seoul National University. U Kang (2016) 1 Data Structure Lecture#2: Data Structures and Algorithms U Kang Seoul National University U Kang (2016) 1 In This Lecture Learn what to consider in selecting right data structures Understand the need for

More information

DBMS Implementation. Chapter 6.4 V3.0. Napier University Dr Gordon Russell

DBMS Implementation. Chapter 6.4 V3.0. Napier University Dr Gordon Russell DBMS Implementation Chapter 6.4 V3.0 Copyright @ Napier University Dr Gordon Russell Implementing a DBMS The DBMS takes in SQL The SQL must be processed. The results of the SQL returned to the user/ Applied

More information

Disks and Files. Jim Gray s Storage Latency Analogy: How Far Away is the Data? Components of a Disk. Disks

Disks and Files. Jim Gray s Storage Latency Analogy: How Far Away is the Data? Components of a Disk. Disks Review Storing : Disks and Files Lecture 3 (R&G Chapter 9) Aren t bases Great? Relational model SQL Yea, from the table of my memory I ll wipe away all trivial fond records. -- Shakespeare, Hamlet A few

More information

CSE 410. Operating Systems

CSE 410. Operating Systems CSE 410 Operating Systems Handout: syllabus 1 Today s Lecture Course organization Computing environment Overview of course topics 2 Course Organization Course website http://www.cse.msu.edu/~cse410/ Syllabus

More information

Chapter 17 Indexing Structures for Files and Physical Database Design

Chapter 17 Indexing Structures for Files and Physical Database Design Chapter 17 Indexing Structures for Files and Physical Database Design We assume that a file already exists with some primary organization unordered, ordered or hash. The index provides alternate ways to

More information

UNIT 7A Data Representation: Numbers and Text. Digital Data

UNIT 7A Data Representation: Numbers and Text. Digital Data UNIT 7A Data Representation: Numbers and Text 1 Digital Data 10010101011110101010110101001110 What does this binary sequence represent? It could be: an integer a floating point number text encoded with

More information

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai COMPUTER VISION Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai 600036. Email: sdas@iitm.ac.in URL: //www.cs.iitm.ernet.in/~sdas 1 INTRODUCTION 2 Human Vision System (HVS) Vs.

More information

Data Containers. User Guide

Data Containers. User Guide Data Containers User Guide Contents 1. Overview... 2 Advantages of... 2 Data container options... 2 Migrating from VHD to VHDX... 3 2. Creating a Data container backup... 3 Creating a backup job... 3 Data

More information

10/29/2013. Program Agenda. The Database Trifecta: Simplified Management, Less Capacity, Better Performance

10/29/2013. Program Agenda. The Database Trifecta: Simplified Management, Less Capacity, Better Performance Program Agenda The Database Trifecta: Simplified Management, Less Capacity, Better Performance Data Growth and Complexity Hybrid Columnar Compression Case Study & Real-World Experiences

More information

CPU Structure and Function

CPU Structure and Function Computer Architecture Computer Architecture Prof. Dr. Nizamettin AYDIN naydin@yildiz.edu.tr nizamettinaydin@gmail.com http://www.yildiz.edu.tr/~naydin CPU Structure and Function 1 2 CPU Structure Registers

More information

Chapter 7. GridStor Technology. Adding Data Paths. Data Paths for Global Deduplication. Data Path Properties

Chapter 7. GridStor Technology. Adding Data Paths. Data Paths for Global Deduplication. Data Path Properties Chapter 7 GridStor Technology GridStor technology provides the ability to configure multiple data paths to storage within a storage policy copy. Having multiple data paths enables the administrator to

More information

CS 405G: Introduction to Database Systems. Storage

CS 405G: Introduction to Database Systems. Storage CS 405G: Introduction to Database Systems Storage It s all about disks! Outline That s why we always draw databases as And why the single most important metric in database processing is the number of disk

More information

Quadrant-Based MBR-Tree Indexing Technique for Range Query Over HBase

Quadrant-Based MBR-Tree Indexing Technique for Range Query Over HBase Quadrant-Based MBR-Tree Indexing Technique for Range Query Over HBase Bumjoon Jo and Sungwon Jung (&) Department of Computer Science and Engineering, Sogang University, 35 Baekbeom-ro, Mapo-gu, Seoul 04107,

More information

Space-Efficient Page-Level Incremental Checkpointing *

Space-Efficient Page-Level Incremental Checkpointing * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 22, 237-246 (2006) Space-Efficient Page-Level Incremental Checkpointing * JUNYOUNG HEO, SANGHO YI, YOOKUN CHO AND JIMAN HONG + School of Computer Science

More information

Instruction Sets: Characteristics and Functions

Instruction Sets: Characteristics and Functions Instruction Sets: Characteristics and Functions Chapter 10 Lesson 15 Slide 1/22 Machine instruction set Computer designer: The machine instruction set provides the functional requirements for the CPU.

More information

A Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop

A Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop A Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop Myoungjin Kim 1, Seungho Han 1, Jongjin Jung 3, Hanku Lee 1,2,*, Okkyung Choi 2 1 Department of Internet and Multimedia Engineering,

More information

Realization of Big Data Platform for PMU - Real-Time Data Processing & Historical Data Analysis -

Realization of Big Data Platform for PMU - Real-Time Data Processing & Historical Data Analysis - Realization of Big Data Platform for - Real-Time Data Processing & Historical Data Analysis - March 27, 2014 Yutaka Kokai Hitachi America, Ltd. Shinji Fujiwara Hitachi, Ltd. Contents 1.Technical requirements

More information

Next Generation Technology from Intel Intel Pentium 4 Processor

Next Generation Technology from Intel Intel Pentium 4 Processor Next Generation Technology from Intel Intel Pentium 4 Processor 1 The Intel Pentium 4 Processor Platform Intel s highest performance processor for desktop PCs Targeted at consumer enthusiasts and business

More information

Cache-Conscious Concurrency Control of Main-Memory Indexes on Shared-Memory Multiprocessor Systems

Cache-Conscious Concurrency Control of Main-Memory Indexes on Shared-Memory Multiprocessor Systems Cache-Conscious Concurrency Control of Main-Memory Indexes on Shared-Memory Multiprocessor Systems Sang K. Cha, Sangyong Hwang, Kihong Kim, Keunjoo Kwon VLDB 2001 Presented by: Raluca Marcuta 1 / 31 1

More information

CS640: Introduction to Computer Networks. Application Classes. Application Classes (more) 11/20/2007

CS640: Introduction to Computer Networks. Application Classes. Application Classes (more) 11/20/2007 CS640: Introduction to Computer Networks Aditya Akella Lecture 21 - Multimedia Networking Application Classes Typically sensitive to delay, but can tolerate packet loss (would cause minor glitches that

More information

Wavelet Based Image Compression Using ROI SPIHT Coding

Wavelet Based Image Compression Using ROI SPIHT Coding International Journal of Information & Computation Technology. ISSN 0974-2255 Volume 1, Number 2 (2011), pp. 69-76 International Research Publications House http://www.irphouse.com Wavelet Based Image

More information

Recovery Techniques. The System Failure Problem. Recovery Techniques and Assumptions. Failure Types

Recovery Techniques. The System Failure Problem. Recovery Techniques and Assumptions. Failure Types The System Failure Problem Recovery Techniques It is possible that the stable database: (because of buffering of blocks in main memory) contains values written by uncommitted transactions. does not contain

More information

Control unit. Input/output devices provide a means for us to make use of a computer system. Computer System. Computer.

Control unit. Input/output devices provide a means for us to make use of a computer system. Computer System. Computer. Lecture 6: I/O and Control I/O operations Control unit Microprogramming Zebo Peng, IDA, LiTH 1 Input/Output Devices Input/output devices provide a means for us to make use of a computer system. Computer

More information

Caches and Memory Hierarchy: Review. UCSB CS240A, Winter 2016

Caches and Memory Hierarchy: Review. UCSB CS240A, Winter 2016 Caches and Memory Hierarchy: Review UCSB CS240A, Winter 2016 1 Motivation Most applications in a single processor runs at only 10-20% of the processor peak Most of the single processor performance loss

More information

CS 525: Advanced Database Organization

CS 525: Advanced Database Organization CS 525: Advanced Database Organization 06: Even more index structures Boris Glavic Slides: adapted from a course taught by Hector Garcia- Molina, Stanford InfoLab CS 525 Notes 6 - More Indices 1 Recap

More information

Introduction to IBM DB2

Introduction to IBM DB2 Introduction to IBM DB2 IT4GIS Keith T. Weber, GISP GIS Director ISU GIS Training and Research Center What is it? IBM DB2 (Database 2) An object-relational database: No software limitations (e.g., size

More information

A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles

A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles 6th WSEAS International Conference on Information Security and Privacy, Tenerife, Spain, December 14-16, 2007 146 A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by

More information

BITS, PILANI -DUBAI. International Academic City, Dubai BE (Hans) CS III Year -2nd Sem

BITS, PILANI -DUBAI. International Academic City, Dubai BE (Hans) CS III Year -2nd Sem BITS, PILANI -DUBAI International Academic City, Dubai BE (Hans) CS III Year -2nd Sem ADVANCED C:OMPUTER ORGANISATION -CS UC 342 COMPREHENSIVE EXAM (Closed book) Date: 01 June 2008 Time: 3 hrs Max Marks:

More information

CS61C : Machine Structures

CS61C : Machine Structures inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structures CS 61C L21 Caches II (1) Lecture 21 Caches II 24-3-1 Lecturer PSOE Dan Garcia www.cs.berkeley.edu/~ddgarcia US Buys world s biggest RAM disk. 2.5TB!

More information

Block-based Watermarking Using Random Position Key

Block-based Watermarking Using Random Position Key IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009 83 Block-based Watermarking Using Random Position Key Won-Jei Kim, Jong-Keuk Lee, Ji-Hong Kim, and Ki-Ryong

More information

Complex Event Processing Based Real Time Detection of Road Traffic

Complex Event Processing Based Real Time Detection of Road Traffic Complex Event Processing Based Real Time Detection of Road Traffic Events 1 Sokha Y, 2 Karpjoo Jeong, 2 Jonghyun Lee, 3 Sanghyun Lee, 3 Youngmin Baek, 3 Seongwan Koo 1 Department of Advanced Technology

More information

CSE 373 OCTOBER 23 RD MEMORY AND HARDWARE

CSE 373 OCTOBER 23 RD MEMORY AND HARDWARE CSE 373 OCTOBER 23 RD MEMORY AND HARDWARE MEMORY ANALYSIS Similar to runtime analysis MEMORY ANALYSIS Similar to runtime analysis Consider the worst case MEMORY ANALYSIS Similar to runtime analysis Rather

More information

PACM: A Prediction-based Auto-adaptive Compression Model for HDFS. Ruijian Wang, Chao Wang, Li Zha

PACM: A Prediction-based Auto-adaptive Compression Model for HDFS. Ruijian Wang, Chao Wang, Li Zha PACM: A Prediction-based Auto-adaptive Compression Model for HDFS Ruijian Wang, Chao Wang, Li Zha Hadoop Distributed File System Store a variety of data http://popista.com/distributed-filesystem/distributed-file-system:/125620

More information

Programming in Python 3

Programming in Python 3 Programming in Python 3 A Complete Introduction to the Python Language Mark Summerfield.4.Addison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich

More information

COMPUTER ORGANIZATION & ARCHITECTURE

COMPUTER ORGANIZATION & ARCHITECTURE COMPUTER ORGANIZATION & ARCHITECTURE Instructions Sets Architecture Lesson 5a 1 What are Instruction Sets The complete collection of instructions that are understood by a CPU Can be considered as a functional

More information

File. File System Implementation. File Metadata. File System Implementation. Direct Memory Access Cont. Hardware background: Direct Memory Access

File. File System Implementation. File Metadata. File System Implementation. Direct Memory Access Cont. Hardware background: Direct Memory Access File File System Implementation Operating Systems Hebrew University Spring 2009 Sequence of bytes, with no structure as far as the operating system is concerned. The only operations are to read and write

More information

Outline. Assumptions. Key Features. A Content-Based Networking Protocol For Sensor Networks (Technical Report 2004)

Outline. Assumptions. Key Features. A Content-Based Networking Protocol For Sensor Networks (Technical Report 2004) A Content-Based Networking Protocol For Sensor Networks (Technical Report 004) Presented by: Kyu-Wook Cho /0/05 Outline Assumptions Direct access only to neighbor nodes Resource-constrained nodes Many

More information

A cost model for spatio-temporal queries using the TPR-tree

A cost model for spatio-temporal queries using the TPR-tree The Journal of Systems and Software 73 (2004) 101 112 www.elsevier.com/locate/jss A cost model for spatio-temporal queries using the TPR-tree Yong-Jin Choi *, Jun-Ki Min, Chin-Wan Chung Division of Computer

More information

ECE 486/586. Computer Architecture. Lecture # 8

ECE 486/586. Computer Architecture. Lecture # 8 ECE 486/586 Computer Architecture Lecture # 8 Spring 2015 Portland State University Lecture Topics Instruction Set Principles MIPS Control flow instructions Dealing with constants IA-32 Fallacies and Pitfalls

More information

ES623 Networked Embedded Systems

ES623 Networked Embedded Systems ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection

More information

ASSEMBLY LANGUAGE MACHINE ORGANIZATION

ASSEMBLY LANGUAGE MACHINE ORGANIZATION ASSEMBLY LANGUAGE MACHINE ORGANIZATION CHAPTER 3 1 Sub-topics The topic will cover: Microprocessor architecture CPU processing methods Pipelining Superscalar RISC Multiprocessing Instruction Cycle Instruction

More information

Topic 5 Image Compression

Topic 5 Image Compression Topic 5 Image Compression Introduction Data Compression: The process of reducing the amount of data required to represent a given quantity of information. Purpose of Image Compression: the reduction of

More information

Computer Systems Overview

Computer Systems Overview Computer Systems Overview Maurizio Pizzonia slides adattate da W. Stalling Operating Systems: Internals and Design Principles http://williamstallings.com/os/os5e.html 1 Basic Elements Processor Main Memory

More information

CHAPTER 5 A Closer Look at Instruction Set Architectures

CHAPTER 5 A Closer Look at Instruction Set Architectures CHAPTER 5 A Closer Look at Instruction Set Architectures 5.1 Introduction 5.2 Instruction Formats 5.2.1 Design Decisions for Instruction Sets 5.2.2 Little versus Big Endian 5.2.3 Internal Storage in the

More information

Reliable Computing I

Reliable Computing I Instructor: Mehdi Tahoori Reliable Computing I Lecture 8: Redundant Disk Arrays INSTITUTE OF COMPUTER ENGINEERING (ITEC) CHAIR FOR DEPENDABLE NANO COMPUTING (CDNC) National Research Center of the Helmholtz

More information

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks Telematics Transport Gateway for Telematics Systems Independent on Mobile Networks Chul-Su Kim 1 *, Jongik Kim, Woo-Yong Han, and Oh-Cheon Kwon 1. Electronics and Telecommunications Research Institute,

More information

Publishing CitiSense Data: Privacy Concerns and Remedies

Publishing CitiSense Data: Privacy Concerns and Remedies Publishing CitiSense Data: Privacy Concerns and Remedies Kapil Gupta Advisor : Prof. Bill Griswold 1 Location Based Services Great utility of location based services data traffic control, mobility management,

More information

Database Applications (15-415)

Database Applications (15-415) Database Applications (15-415) DBMS Internals- Part V Lecture 15, March 15, 2015 Mohammad Hammoud Today Last Session: DBMS Internals- Part IV Tree-based (i.e., B+ Tree) and Hash-based (i.e., Extendible

More information

Image Coding and Data Compression

Image Coding and Data Compression Image Coding and Data Compression Biomedical Images are of high spatial resolution and fine gray-scale quantisiation Digital mammograms: 4,096x4,096 pixels with 12bit/pixel 32MB per image Volume data (CT

More information

Lecture Topics. Branch Condition Options. Branch Conditions ECE 486/586. Computer Architecture. Lecture # 8. Instruction Set Principles.

Lecture Topics. Branch Condition Options. Branch Conditions ECE 486/586. Computer Architecture. Lecture # 8. Instruction Set Principles. ECE 486/586 Computer Architecture Lecture # 8 Spring 2015 Portland State University Instruction Set Principles MIPS Control flow instructions Dealing with constants IA-32 Fallacies and Pitfalls Reference:

More information

BSNL TTA Question Paper-Computers Specialization 2007

BSNL TTA Question Paper-Computers Specialization 2007 BSNL TTA Question Paper-Computers Specialization 2007 1. What is the name of the software that allows us to browse through web pages? (a) Browser (b) Mail Client (c) FTP Client (d) Messenger 2. What is

More information

Caches and Memory Hierarchy: Review. UCSB CS240A, Fall 2017

Caches and Memory Hierarchy: Review. UCSB CS240A, Fall 2017 Caches and Memory Hierarchy: Review UCSB CS24A, Fall 27 Motivation Most applications in a single processor runs at only - 2% of the processor peak Most of the single processor performance loss is in the

More information

A Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants. Florian Kauer, Florian Meyer, Volker Turau

A Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants. Florian Kauer, Florian Meyer, Volker Turau A Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants Florian Kauer, Florian Meyer, Volker Turau June 13 th, 2017 Institute of Telematics Hamburg University of Technology

More information

Google File System 2

Google File System 2 Google File System 2 goals monitoring, fault tolerance, auto-recovery (thousands of low-cost machines) focus on multi-gb files handle appends efficiently (no random writes & sequential reads) co-design

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 BACKUP BUILT FOR VMWARE Mark Twomey Technical Director, The Office Of The CTO 2 Agenda Market Forces Optimized VMware Backup Backup And Recovery For VCE Vblock Protecting vcloud Director Customer Success

More information

Challenges in large-scale graph processing on HPC platforms and the Graph500 benchmark. by Nkemdirim Dockery

Challenges in large-scale graph processing on HPC platforms and the Graph500 benchmark. by Nkemdirim Dockery Challenges in large-scale graph processing on HPC platforms and the Graph500 benchmark by Nkemdirim Dockery High Performance Computing Workloads Core-memory sized Floating point intensive Well-structured

More information

CS501_Current Mid term whole paper Solved with references by MASOOM FAIRY

CS501_Current Mid term whole paper Solved with references by MASOOM FAIRY Total Questions: 6 MCQs: 0 Subjective: 6 Whole Paper is given below: Question No: 1 ( Marks: 1 ) FALCON-A processor bus has 16 lines or is 16-bits wide while that of SRC wide. 8-bits 16-bits 3-bits (Page

More information

Database Recovery. Haengrae Cho Yeungnam University. Database recovery. Introduction to Database Systems

Database Recovery. Haengrae Cho Yeungnam University. Database recovery. Introduction to Database Systems Database Recovery Haengrae Cho Yeungnam University Database recovery. Introduction to Database Systems Report Yeungnam University, Database Lab. Chapter 1-1 1. Introduction to Database Recovery 2. Recovery

More information

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp Trends in Data Protection and Restoration Technologies Jason Iehl, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and

More information

AP-VPMS VoIP Plug & Play Management System Next Generation Large Scale VoIP Equipment Management Solution

AP-VPMS VoIP Plug & Play Management System Next Generation Large Scale VoIP Equipment Management Solution AP-VPMS VoIP Plug & Play Management System Next Generation Large Scale VoIP Equipment Management Solution AddPac Technology Sales and Marketing www.addpac.com AP-VPMS VoIP Plug & Play Management System

More information

In this lecture. Background. Background. Background. PAM3012 Digital Image Processing for Radiographers

In this lecture. Background. Background. Background. PAM3012 Digital Image Processing for Radiographers PAM3012 Digital Image Processing for Radiographers Image Enhancement in the Spatial Domain (Part I) In this lecture Image Enhancement Introduction to spatial domain Information Greyscale transformations

More information

Contact Hours / week: 4 Total hours: 64. Table of Contents Architecture 3 Data Modeling Using the Entity-

Contact Hours / week: 4 Total hours: 64. Table of Contents Architecture 3 Data Modeling Using the Entity- Govt. of Karnataka, Department of Technical Education Diploma in Information Science & Engineering Fourth Semester Subject: DATABASE MANAGEMENT SYSTEMS Contact Hours / week: 4 Total hours: 64 Table of

More information

CST-Trees: Cache Sensitive T-Trees

CST-Trees: Cache Sensitive T-Trees CST-Trees: Cache Sensitive T-Trees Ig-hoon Lee 1, Junho Shim 2, Sang-goo Lee 3, and Jonghoon Chun 4 1 Prompt Corp., Seoul, Korea ihlee@prompt.co.kr 2 Department of Computer Science, Sookmyung Women s University,

More information