Effects of Semantic Cache on Mobile Database System

Size: px
Start display at page:

Download "Effects of Semantic Cache on Mobile Database System"

Transcription

1 Effects of Semantic Cache on Mobile Database System S.QADRI, A.R SATTAR & T. MUSTAFA Department of Computer Sciences University of Agriculture Faisalabad PAKISTAN Abstract: - In last few years database accessibility is a great issue especially in the distributed database environment. Recently mobile computing is becoming a hot issue and this research work is focused on some important features of semantic consistency techniques with implementation strategies. Researchers are trying to find out the basic factors which affect the best performance of semantic cache implementation strategies. It is also tried to find out the methodology how these issues can be solved in the best and efficient way. This research deals with the comparative performance study of inter/intra file semantic and fully associative techniques in detail and also suggested the best solution for analyzing these Software (simulator) had been used for important calculation which generated comparative results. For statistical data analysis SPSS software is used which provide the comparison between these Key-Words: - Semantic cache, Mobile Database, LRU, Simulator, Deadbase 1 Introduction Database has many issues to work in distributed environment especially in mobile databases. It is a hot issue because now days mobiles are very common but their reliability and accessibility is an important issue. The question is raised how, why and where anyone can access the entire data. It is the basic concept of mobile database. Similarly on the run time when and where you have to access of complete information is called mobile computing. This is all due to the advancement in network technology. Modern technology plays a vital role in the field of mobile computing. With out fast communication database is called deadbase because it provides or stimulates the information exchange from one point to another point very quickly. For mobile database it is important to see the factors which effects on performance. There are many factors which focused on performance like cache size which affects its performance. Greater the cache size, better the performance because more data comes in cache, similarly speed will be fast to access CPU Data. So available storage in cache also affects system performance. Replacement algorithms for data access play a vital role in mobile database performance. This research is emphasized on the semantic cache techniques (inter/intra file) with comparison of fully associative technique for best performance in mobile database. 2 Material & Methods 2.1 Semantic-based Caching Among different file access techniques, semantic based cache is different which uses the inherent relationship between (inter/intra files) to perform the functioning or hoarding [1].The proposed approach, does not use this relationship to prefetch files or save them, rather it focused on its efforts on saving these relationships in a cache. An eviction or removal index was calculated based on these relations. In this approach strong relations were saved but weak were omitted. This approach not only gave effective hit ratios but also decreases the communication overhead as compared to other replacement algorithms such as LRU, LFU and Greedy-dual size [2] when run against the distributed file system [3] and also on different application conditions. This approach was thought to be important as in semantic cache the relationships between files are taken that conventional approaches are mostly rejected or ignore. In semantic cache it minimizes the need for replacement algorithm which could mean increased file availability and reliability and

2 reduced synchronization overhead. User patience depends on importance of the used files and expected fetch delay [4]. Importance of a priority files are specified by user in some systems [4]. In the present study a thought had been developed to remove this overhead by establishing files relationship based on which caching is done. This approach provides better hit rates than LRU while in some cases performing half the number of replacements. It is felt by allowing more files to remain in the cache that the user can be given more options to use. 2.2 Caching Architecture Fig. 1 given below is showed the architecture how query is moved forward from cache side to server side and server side to cache side [5]. priority has to be settled down i.e. which process is occurring first. The concepts of time sharing are raised in the multiprocessing functions and in next generation like hyper threading it gave better result. Intra file relation is basic to enhance the performance in cache 2.3 Cache Mapping Techniques When we want to know how we can enhance the performance of cache, there are two main factors which effect on performance i.e. hit ratio and searching speed.when processor is found the data in cache it map the cache line with memory address and data is found.it is the hit ratio which reflected more data maximum hit ratio. Searching speed depends upon the region on which searching is occurring this will also impact on performance. There are basic three cache mapping a) Direct Mapping b) N-way Set Associative Mapping c) Fully Associative Mapping 3 Results & Discussions Fig. 1: Client server Cache Architecture In semantic cache inter file relationship [6] data or information is obtained from the distributed file system and it is found on priority bases. Some time total file is checked by a very short procedure. It is observed that almost 50 to 60 % file access occurs only in one precursor. In semantic cache intra file relationship is considered better where files are opened before they are closed. It is the concept of time sharing. Mostly it is observed that time sharing concept is raised where there is some 3.1 Simulator Working In the designed software (simulator) semantic based technique was used which gave the best efficiency in data finding in the cache. These techniques are used to find the memory addresses and cache line in cache which give the desired data or information. For next data finding processor go to the neighbor of previous address. it found the data. This rule is called 90% to 10 % rule. It was observed that behavior of access pattern was totally changed. The performance of semantic cache would be changed [7] by changing Cache spaces, speed, replacement strategies, Greater storage space and using distributed file system are the main advantages of this semantic Cache technique.. In simulator green color showed the hit ratio of access pattern data. It showed that maximum data found in the semantic based cache and generated 70 to 80% data fetching or finding for the required places while red

3 color is showed the miss ratio,(inter\intra file semantics) to perform the functioning or hoarding [1]. This actually did not measure exact ratio which one is better, but here simulator cleared this fact which one is better which is intra file technique [6]. For intra file relationship data or information is obtained from the distributed file systems and its own file traces activity is mostly on precursor. Some time total file is checked by a very short time. It is observed that almost more than 50 % file access is occurring in only one precursor. Given below Fig. 2 showed the working of simulator (software) this compared the performance between discussed Fig. 2: Cache simulator (Software) Semantic Table Address Intra file Inter File Fully Associative Call Hit Data Hit Ratio Hit Data Hit Ratio Hit Data Hit Ratio % 7 47% 3 20% % 11 53% 4 19% % 13 52% 5 20% % 20 67% 7 27% % 20 62% 10 30%

4 3.1.1 Statistical Analysis of Intra File This graph shows that as we increase more addresses, the hit ratio of the data also increases. At a particular point maximum hit ratio is 80% of the performance. here it is compared with semantic cache The average hit ratio of Intra File ( )/5 =74.5% almost equal to 75% Statistical Analysis of Inter File This is histogram diagram for inter file semantic cache technique which shows the 50% to 70 % hit ratio in the semantic cache [8] describes that intra file has less hit ratio as compared to others but in this research it has more hit ratio as compared to fully associative technique. The average hit ratio of fully associative technique ( )/5 =Almost 23%. Comparison of these three techniques it is showed that intra file is best for performance point of view having almost 75% hit ratio while inter file (56% hit ratio) has less as compared to intra file (75% hit ratio) while last technique (fully associative) has least performance as compared to above two which has hit ratio almost 23% as very low other than two. The given Pie graph shows the description of the hit ration between these three techniques which is measured under simulatior results Pie Diagram of Inter File, Intra File and Fully Associative Pie diagram show the comparision between these three The average hit ratio of inter file ( )/5 =56 % Statistical Analysis of Fully Associative In the fully associative technique simulator gives the hit ratio by almost 20% to 30% which is the maximum efficiency results for this technique. The results observed by [9] were different from these results. Because Intra file=parallel lines Area Inter file=net Lines Area Fully Associative=Dotted Area 4 Future Work This research focus on the semantic cache techniques and defined a comparison

5 between inter file, intra file and fully associative and derived a comparative best performance for these calculated results. For future Extension, this area requires the improvement in the semantic cache implementation technique, like grammar oriented searching algorithms, Best search technique, Greedy Algorithm and specific size for cache region. References: [1] Geoffrey H. Kuenning, Gerald J. Popek (1997) Automated hoarding for mobile computers, ACM SIGOPS Operating Systems ACM Symposium on Operating Systems Principles Proceedings of the sixteenth ACM symposium on Operating systems principles Saint Malo, France Pages: ISBN: [2] Edith Cohen, Balachander Krishnamurthy, Jennifer Rexford (1998) improving end to end performance of web using server volumes and proxy filters,acm SIGCOMM Computer Communication Review, Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication SIGCOMM '98, Volume 28 Issue 4 Vancouver, British Columbia, Canada Pages: ISSN: Publisher ACM Press New York, NY, USA [3] James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed Amer, Panos K. Chrysanthis (2005) Self-Tuning Energy-safe Predictors, International Conference On Mobile Data Management Proceedings of the 6th international conference on Mobile data management Ayia Napa, Cyprus SESSION: Caching and replication Pages: ISBN: [4] Maria R. Ebling, Bonnie E. John, M. Satyanarayanan (2002) The importance of trancelucent cache in mobile computing system, ACM Transactions on Computer-Human Interaction (TOCHI) Volume 9, Issue 1 Pages:42 67Publishr ACM NY USA ISSN: [5] David J. Dewitt, Michael J. Franklin, Michael J. Zwilling, C. K. Tan, Michael J. Carey, (1992) Crash Recovery in Client-Server EXODUS ACM SIGMOD International Conference on the Management of Data, Pages: ISBN: San Diego California, USA. [6] Brian D. Noble, M. Satyanarayanan, Dushyanth Narayanan, James Eric Tilton, Jason Flinn, Kevin R. Walker (1997) Agile application-aware adaptation for mobility, ACM Symposium on Operating Systems Principles Proceedings of the sixteenth ACM symposium on Operating systems principles Saint Malo, France Pages: ACM Press New York, NY, USA ISSN: [7] Bjorn por, Jonsson, Mar ia Arinbjarnar, Bjarnsteinn Porsson,Michael j. Franklin,Divesh Srivastava (2006) Performance and Overhead of Semantic Cache Management, ACM Transactions on Internet Technology (TOIT) Volume 6, Issue 3 (August 2006) Pages: ACM Press New York, NY, USA ISSN: [8] Sharun Santhosh,Weisong Shi, Hanping Lufei (2004). An Adaptive Distributed File System for Heterogeneous Network Environments, Proceedings of the Parallel and Distributed Systems, Tenth International Conference on (ICPADS'04) - Volume 00 Page: 145, IEEE Computer Society Washington, DC, USA, ISBN ~ ISSN: , [9] Shaul Dar, Raghu Ramakrishnan (1994) A performance study of transitive closure algorithms, International Conference on Management of Data Proceedings of the A CM SIGMOD international conference on Management of data Pages: Minneapolis, Minnesota, United States

Feedback-based dynamic proportion allocation for disk I

Feedback-based dynamic proportion allocation for disk I Oregon Health & Science University OHSU Digital Commons CSETech December 1998 Feedback-based dynamic proportion allocation for disk I Dan Revel Dylan McNamee Calton Pu David Steere Jonathan Walpole Follow

More information

TRANSCODING CACHE FOR SMART PHONES

TRANSCODING CACHE FOR SMART PHONES TRANSCODING CACHE FOR SMART PHONES Pitiphong Phongpattranont Department of Computer Engineering Chulalongkorn University Bangkok, Thailand Abstract In this paper, we present Transcoding Cache (TC), a new

More information

Aggregating Caches: A Mechanism for Implicit File Prefetching

Aggregating Caches: A Mechanism for Implicit File Prefetching Aggregating Caches: A Mechanism for Implicit File Prefetching Ahmed Amer and Darrell D. E. Long Jack Baskin School of Engineering University of California, Santa Cruz 1156 High St., Santa Cruz 9564 a.amer@acm.org,

More information

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for

More information

Relative Reduced Hops

Relative Reduced Hops GreedyDual-Size: A Cost-Aware WWW Proxy Caching Algorithm Pei Cao Sandy Irani y 1 Introduction As the World Wide Web has grown in popularity in recent years, the percentage of network trac due to HTTP

More information

Dynamic Relationships and the Persistence of Pairings

Dynamic Relationships and the Persistence of Pairings Dynamic Relationships and the Persistence of Pairings Ahmed Amer and Darrell D. E. Long' Jack Baskin School of Engineering University of California, Santa Cruz I156 High Street Santa Cruz, CA 95064 amer4,darrell@

More information

The Case for Better Throughput Estimation

The Case for Better Throughput Estimation The Case for Better Throughput Estimation Brian D. Noble, Li Li, Atul Prakash Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 fbnoble,llzz,aprakashg@eecs.umich.edu

More information

Simulation Of Computer Systems. Prof. S. Shakya

Simulation Of Computer Systems. Prof. S. Shakya Simulation Of Computer Systems Prof. S. Shakya Purpose & Overview Computer systems are composed from timescales flip (10-11 sec) to time a human interacts (seconds) It is a multi level system Different

More information

Exploiting Correlation Among Data Items for Cache Replacement in Ad-hoc Networks

Exploiting Correlation Among Data Items for Cache Replacement in Ad-hoc Networks Exploiting Correlation Among Data Items for Cache Replacement in Ad-hoc Networks Noman Islam Center for Research in Ubiquitous Computing National University of Comp. and Emerging Sciences Karachi, Pakistan

More information

Cache Management for Concurrent Transaction Execution in Mobile Wireless Environment

Cache Management for Concurrent Transaction Execution in Mobile Wireless Environment Journal of Computer Science 7 (3): 374-378, 2011 ISSN 1549-3636 2011 Science Publications Cache Management for Concurrent Transaction Execution in Mobile Wireless Environment 1 J.C. Miraclin Joyce Pamila

More information

Mobile NFS. Fixed NFS. MFS Proxy. Client. Client. Standard NFS Server. Fixed NFS MFS: Proxy. Mobile. Client NFS. Wired Network.

Mobile NFS. Fixed NFS. MFS Proxy. Client. Client. Standard NFS Server. Fixed NFS MFS: Proxy. Mobile. Client NFS. Wired Network. On Building a File System for Mobile Environments Using Generic Services F. Andre M.T. Segarra IRISA Research Institute IRISA Research Institute Campus de Beaulieu Campus de Beaulieu 35042 Rennes Cedex,

More information

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication. Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Cooperative

More information

Active Query Caching for Database Web Servers

Active Query Caching for Database Web Servers Caching for Database Web Servers Qiong Luo Jeffrey F. Naughton Rajesekar Krishnamurthy Pei Cao Yunrui Li Computer Sciences Department University of Wisconsin-Madison Madison, WI 53706 {qiongluo,naughton,sekar,cao,yunrui}@cs.wisc.edu

More information

Comparing Centralized and Decentralized Distributed Execution Systems

Comparing Centralized and Decentralized Distributed Execution Systems Comparing Centralized and Decentralized Distributed Execution Systems Mustafa Paksoy mpaksoy@swarthmore.edu Javier Prado jprado@swarthmore.edu May 2, 2006 Abstract We implement two distributed execution

More information

Adaptive Replacement Policy with Double Stacks for High Performance Hongliang YANG

Adaptive Replacement Policy with Double Stacks for High Performance Hongliang YANG International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) Adaptive Replacement Policy with Double Stacks for High Performance Hongliang YANG School of Informatics,

More information

An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network

An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network Rekha 1, Radhika Garg 2 1 Research Scholar, M.Tech, 2 Assistant Professor, Deptt. Of Computer Sc. & Engineering, Vaish

More information

Disconnected Operation in the Thor Object-Oriented Database System

Disconnected Operation in the Thor Object-Oriented Database System To appear in Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, December 1994. Disconnected Operation in the Thor Object-Oriented Database System Robert Gruber

More information

SAT A Split-Up Cache Model to Boost the Performance of Web Cache Replacement Policies

SAT A Split-Up Cache Model to Boost the Performance of Web Cache Replacement Policies BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 11, No 4 Sofia 2011 SAT A Split-Up Cache Model to Boost the Performance of Web Cache Replacement Policies Geetha Krishnan 1,

More information

An Efficient Indirect Branch Predictor

An Efficient Indirect Branch Predictor An Efficient Indirect ranch Predictor Yul Chu and M. R. Ito 2 Electrical and Computer Engineering Department, Mississippi State University, ox 957, Mississippi State, MS 39762, USA chu@ece.msstate.edu

More information

2 TEST: A Tracer for Extracting Speculative Threads

2 TEST: A Tracer for Extracting Speculative Threads EE392C: Advanced Topics in Computer Architecture Lecture #11 Polymorphic Processors Stanford University Handout Date??? On-line Profiling Techniques Lecture #11: Tuesday, 6 May 2003 Lecturer: Shivnath

More information

Prefetch Threads for Database Operations on a Simultaneous Multi-threaded Processor

Prefetch Threads for Database Operations on a Simultaneous Multi-threaded Processor Prefetch Threads for Database Operations on a Simultaneous Multi-threaded Processor Kostas Papadopoulos December 11, 2005 Abstract Simultaneous Multi-threading (SMT) has been developed to increase instruction

More information

Interactive Visualization of the Stock Market Graph

Interactive Visualization of the Stock Market Graph Interactive Visualization of the Stock Market Graph Presented by Camilo Rostoker rostokec@cs.ubc.ca Department of Computer Science University of British Columbia Overview 1. Introduction 2. The Market

More information

Reducing Web Latency through Web Caching and Web Pre-Fetching

Reducing Web Latency through Web Caching and Web Pre-Fetching RESEARCH ARTICLE OPEN ACCESS Reducing Web Latency through Web Caching and Web Pre-Fetching Rupinder Kaur 1, Vidhu Kiran 2 Research Scholar 1, Assistant Professor 2 Department of Computer Science and Engineering

More information

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING James J. Rooney 1 José G. Delgado-Frias 2 Douglas H. Summerville 1 1 Dept. of Electrical and Computer Engineering. 2 School of Electrical Engr. and Computer

More information

Ravana: Controller Fault-Tolerance in SDN

Ravana: Controller Fault-Tolerance in SDN Ravana: Controller Fault-Tolerance in SDN Software Defined Networking: The Data Centre Perspective Seminar Michel Kaporin (Mišels Kaporins) Michel Kaporin 13.05.2016 1 Agenda Introduction Controller Failures

More information

Group-Based Management of Distributed File Caches

Group-Based Management of Distributed File Caches Group-Based Management of Distributed File Caches Darrell D. E. Long Ahmed Amer Storage Systems Research Center Jack Baskin School of Engineering University of California, Santa Cruz Randal Burns Hopkins

More information

TERM PROJECT COEN 283. Enhancing data hit ratio by using adaptive caching Technique. Operating System. Prepared By: Darshita Shah.

TERM PROJECT COEN 283. Enhancing data hit ratio by using adaptive caching Technique. Operating System. Prepared By: Darshita Shah. COEN 283 Operating System TERM PROJECT Enhancing data hit ratio by using adaptive caching Technique Prepared By: Darshita Shah Preethi Yellappa Nidhi Singh Table of Content Topics Page No 1. Introduction

More information

The Last-Copy Approach for Distributed Cache Pruning in a Cluster of HTTP Proxies

The Last-Copy Approach for Distributed Cache Pruning in a Cluster of HTTP Proxies The Last-Copy Approach for Distributed Cache Pruning in a Cluster of HTTP Proxies Reuven Cohen and Itai Dabran Technion, Haifa 32000, Israel Abstract. Web caching has been recognized as an important way

More information

Piggyback server invalidation for proxy cache coherency

Piggyback server invalidation for proxy cache coherency Piggyback server invalidation for proxy cache coherency Balachander Krishnamurthy a and Craig E. Wills b a AT&T Labs-Research, Florham Park, NJ 07932 USA bala@research.att.com b Worcester Polytechnic Institute,

More information

2 Approaches to worldwide web information retrieval

2 Approaches to worldwide web information retrieval The WEBFIND tool for finding scientific papers over the worldwide web. Alvaro E. Monge and Charles P. Elkan Department of Computer Science and Engineering University of California, San Diego La Jolla,

More information

Mondrian Memory Protection

Mondrian Memory Protection H igh Perfo rman ce S witc hing andr outin g T elecomcent erworksho p:sept4,1 97. Mondrian Memory Protection Presenter: Mohammad Moghimi CSE ept. UCS Most of the slides are taken from: http://groups.csail.mit.edu/cag/scale/papers/mmp-asplos2002-slides.ppt

More information

Be Fast, Cheap and in Control with SwitchKV Xiaozhou Li

Be Fast, Cheap and in Control with SwitchKV Xiaozhou Li Be Fast, Cheap and in Control with SwitchKV Xiaozhou Li Raghav Sethi Michael Kaminsky David G. Andersen Michael J. Freedman Goal: fast and cost-effective key-value store Target: cluster-level storage for

More information

On space management in a dynamic edge data cache

On space management in a dynamic edge data cache On space management in a dynamic edge data cache Khalil Amiri, Renu Tewari, Sanghyun Park, and Sriram Padmanabhan IBM Thomas J. Watson Research Center amirik,tewarir,sanghyun,srp @us.ibm.com Abstract Emerging

More information

Flexible Cache Cache for afor Database Management Management Systems Systems Radim Bača and David Bednář

Flexible Cache Cache for afor Database Management Management Systems Systems Radim Bača and David Bednář Flexible Cache Cache for afor Database Management Management Systems Systems Radim Bača and David Bednář Department ofradim Computer Bača Science, and Technical David Bednář University of Ostrava Czech

More information

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Computer Communications and Networking (SC 546) Professor D. Starobinksi Brian Mitchell U09-62-9095 James Nunan U38-03-0277

More information

DryadLINQ. by Yuan Yu et al., OSDI 08. Ilias Giechaskiel. January 28, Cambridge University, R212

DryadLINQ. by Yuan Yu et al., OSDI 08. Ilias Giechaskiel. January 28, Cambridge University, R212 DryadLINQ by Yuan Yu et al., OSDI 08 Ilias Giechaskiel Cambridge University, R212 ig305@cam.ac.uk January 28, 2014 Conclusions Takeaway Messages SQL cannot express iteration Unsuitable for machine learning,

More information

ASSOCIATION RULES FOR SUPPORTING HOARDING IN MOBILE COMPUTING ENVIRONMENTS

ASSOCIATION RULES FOR SUPPORTING HOARDING IN MOBILE COMPUTING ENVIRONMENTS ASSOCIATION RULES FOR SUPPORTING HOARDING IN MOBILE COMPUTING ENVIRONMENTS Yücel Saygın Bilkent University, Turkey saygin@cs.bilkent.edu.tr Özgür Ulusoy Bilkent University, Turkey oulusoy@cs.bilkent.edu.tr

More information

SF-LRU Cache Replacement Algorithm

SF-LRU Cache Replacement Algorithm SF-LRU Cache Replacement Algorithm Jaafar Alghazo, Adil Akaaboune, Nazeih Botros Southern Illinois University at Carbondale Department of Electrical and Computer Engineering Carbondale, IL 6291 alghazo@siu.edu,

More information

An Integration Approach of Data Mining with Web Cache Pre-Fetching

An Integration Approach of Data Mining with Web Cache Pre-Fetching An Integration Approach of Data Mining with Web Cache Pre-Fetching Yingjie Fu 1, Haohuan Fu 2, and Puion Au 2 1 Department of Computer Science City University of Hong Kong, Hong Kong SAR fuyingjie@tsinghua.org.cn

More information

A Comparison of Memory Usage and CPU Utilization in Column-Based Database Architecture vs. Row-Based Database Architecture

A Comparison of Memory Usage and CPU Utilization in Column-Based Database Architecture vs. Row-Based Database Architecture A Comparison of Memory Usage and CPU Utilization in Column-Based Database Architecture vs. Row-Based Database Architecture By Gaurav Sheoran 9-Dec-08 Abstract Most of the current enterprise data-warehouses

More information

Role of Aging, Frequency, and Size in Web Cache Replacement Policies

Role of Aging, Frequency, and Size in Web Cache Replacement Policies Role of Aging, Frequency, and Size in Web Cache Replacement Policies Ludmila Cherkasova and Gianfranco Ciardo Hewlett-Packard Labs, Page Mill Road, Palo Alto, CA 9, USA cherkasova@hpl.hp.com CS Dept.,

More information

The 2-way Thrashing-Avoidance Cache (TAC): An Efficient Instruction Cache Scheme for Object-Oriented Languages

The 2-way Thrashing-Avoidance Cache (TAC): An Efficient Instruction Cache Scheme for Object-Oriented Languages The 2- Thrashing-voidance Cache (): n Efficient Instruction Cache Scheme for Object-Oriented Languages Yul Chu and M. R. Ito Electrical and Computer Engineering Department, University of British Columbia

More information

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System Ubaid Abbasi and Toufik Ahmed CNRS abri ab. University of Bordeaux 1 351 Cours de la ibération, Talence Cedex 33405 France {abbasi,

More information

Shark: Hive on Spark

Shark: Hive on Spark Optional Reading (additional material) Shark: Hive on Spark Prajakta Kalmegh Duke University 1 What is Shark? Port of Apache Hive to run on Spark Compatible with existing Hive data, metastores, and queries

More information

To Use or Not to Use: CPUs Cache Optimization Techniques on GPGPUs

To Use or Not to Use: CPUs Cache Optimization Techniques on GPGPUs To Use or Not to Use: CPUs Optimization Techniques on GPGPUs D.R.V.L.B. Thambawita Department of Computer Science and Technology Uva Wellassa University Badulla, Sri Lanka Email: vlbthambawita@gmail.com

More information

Improving object cache performance through selective placement

Improving object cache performance through selective placement University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Improving object cache performance through selective placement Saied

More information

Data Warehousing Alternatives for Mobile Environments

Data Warehousing Alternatives for Mobile Environments Data Warehousing Alternatives for Mobile Environments I. Stanoi D. Agrawal A. El Abbadi Department of Computer Science University of California Santa Barbara, CA 93106 S. H. Phatak B. R. Badrinath Department

More information

OpenMP for next generation heterogeneous clusters

OpenMP for next generation heterogeneous clusters OpenMP for next generation heterogeneous clusters Jens Breitbart Research Group Programming Languages / Methodologies, Universität Kassel, jbreitbart@uni-kassel.de Abstract The last years have seen great

More information

CSE544 Database Architecture

CSE544 Database Architecture CSE544 Database Architecture Tuesday, February 1 st, 2011 Slides courtesy of Magda Balazinska 1 Where We Are What we have already seen Overview of the relational model Motivation and where model came from

More information

Replication and Caching Strategies in Cadmium

Replication and Caching Strategies in Cadmium INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Replication and Caching Strategies in Cadmium Aline Baggio No 3409 Avril 1998 THÈME 1 apport de recherche ISSN 0249-6399 Replication and

More information

A trace-driven analysis of disk working set sizes

A trace-driven analysis of disk working set sizes A trace-driven analysis of disk working set sizes Chris Ruemmler and John Wilkes Operating Systems Research Department Hewlett-Packard Laboratories, Palo Alto, CA HPL OSR 93 23, 5 April 993 Keywords: UNIX,

More information

Watching User Generated Videos with Prefetching

Watching User Generated Videos with Prefetching Watching User Generated Videos with Prefetching Samamon Khemmarat, Renjie Zhou, Lixin Gao, Michael Zink Electrical and Computer Engineering Department UMass Amherst MMSys 2011, Feb. 24 th User Generated

More information

Accelerating Dynamic Binary Translation with GPUs

Accelerating Dynamic Binary Translation with GPUs Accelerating Dynamic Binary Translation with GPUs Chung Hwan Kim, Srikanth Manikarnike, Vaibhav Sharma, Eric Eide, Robert Ricci School of Computing, University of Utah {chunghwn,smanikar,vaibhavs,eeide,ricci}@utah.edu

More information

Adaptive Data Dissemination in Mobile ad-hoc Networks

Adaptive Data Dissemination in Mobile ad-hoc Networks Adaptive Data Dissemination in Mobile ad-hoc Networks Joos-Hendrik Böse, Frank Bregulla, Katharina Hahn, Manuel Scholz Freie Universität Berlin, Institute of Computer Science, Takustr. 9, 14195 Berlin

More information

International Journal of Software and Web Sciences (IJSWS)

International Journal of Software and Web Sciences (IJSWS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

FAWN as a Service. 1 Introduction. Jintian Liang CS244B December 13, 2017

FAWN as a Service. 1 Introduction. Jintian Liang CS244B December 13, 2017 Liang 1 Jintian Liang CS244B December 13, 2017 1 Introduction FAWN as a Service FAWN, an acronym for Fast Array of Wimpy Nodes, is a distributed cluster of inexpensive nodes designed to give users a view

More information

Threshold-Based Markov Prefetchers

Threshold-Based Markov Prefetchers Threshold-Based Markov Prefetchers Carlos Marchani Tamer Mohamed Lerzan Celikkanat George AbiNader Rice University, Department of Electrical and Computer Engineering ELEC 525, Spring 26 Abstract In this

More information

THE COMPARISON OF PARALLEL SORTING ALGORITHMS IMPLEMENTED ON DIFFERENT HARDWARE PLATFORMS

THE COMPARISON OF PARALLEL SORTING ALGORITHMS IMPLEMENTED ON DIFFERENT HARDWARE PLATFORMS Computer Science 14 (4) 2013 http://dx.doi.org/10.7494/csci.2013.14.4.679 Dominik Żurek Marcin Pietroń Maciej Wielgosz Kazimierz Wiatr THE COMPARISON OF PARALLEL SORTING ALGORITHMS IMPLEMENTED ON DIFFERENT

More information

Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems

Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems Di Zhong a, Shih-Fu Chang a, John R. Smith b a Department of Electrical Engineering, Columbia University, NY,

More information

Decoupled Software Pipelining in LLVM

Decoupled Software Pipelining in LLVM Decoupled Software Pipelining in LLVM 15-745 Final Project Fuyao Zhao, Mark Hahnenberg fuyaoz@cs.cmu.edu, mhahnenb@andrew.cmu.edu 1 Introduction 1.1 Problem Decoupled software pipelining [5] presents an

More information

Predictive Line Buffer: A fast, Energy Efficient Cache Architecture

Predictive Line Buffer: A fast, Energy Efficient Cache Architecture Predictive Line Buffer: A fast, Energy Efficient Cache Architecture Kashif Ali MoKhtar Aboelaze SupraKash Datta Department of Computer Science and Engineering York University Toronto ON CANADA Abstract

More information

Graph based model for Object Access Analysis at OSD Client

Graph based model for Object Access Analysis at OSD Client Graph based model for Object Access Analysis at OSD Client Riyaz Shiraguppi, Rajat Moona {riyaz,moona}@iitk.ac.in Indian Institute of Technology, Kanpur Abstract 1 Introduction In client-server based storage

More information

On the Relationship of Server Disk Workloads and Client File Requests

On the Relationship of Server Disk Workloads and Client File Requests On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies

More information

Cache Performance, System Performance, and Off-Chip Bandwidth... Pick any Two

Cache Performance, System Performance, and Off-Chip Bandwidth... Pick any Two Cache Performance, System Performance, and Off-Chip Bandwidth... Pick any Two Bushra Ahsan and Mohamed Zahran Dept. of Electrical Engineering City University of New York ahsan bushra@yahoo.com mzahran@ccny.cuny.edu

More information

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES F.J. González-Cañete, E. Casilari, A. Triviño-Cabrera Department of Electronic Technology, University of Málaga, Spain University of Málaga,

More information

Group-Based Management of Distributed File Caches

Group-Based Management of Distributed File Caches Group-Based Management of Distributed File Caches Ahmed Amer Darrell D. E. Long Randal C. Burns Department of Computer Science Department of Computer Science University of California, Santa Cruz Johns

More information

An Analysis of Trace Data for Predictive File Caching in Mobile Computing

An Analysis of Trace Data for Predictive File Caching in Mobile Computing To appear, 1994 Summer Usenix Conference. An Analysis of Trace Data for Predictive File Caching in Mobile Computing Geoffrey H. Kuenning, Gerald J. Popek, Peter L. Reiher University of California, Los

More information

BOND: Unifying Mobile Networks with Named Data. Michael Meisel

BOND: Unifying Mobile Networks with Named Data. Michael Meisel BOND: Unifying Mobile Networks with Named Data Michael Meisel Ph.D. Dissertation Defense March 16, 2011 Freeform Wireless Networks Multi-hop Unpredictable mobility Can be connected or disconnected Examples:

More information

FlowBack: Providing Backward Recovery for Workflow Management Systems

FlowBack: Providing Backward Recovery for Workflow Management Systems FlowBack: Providing Backward Recovery for Workflow Management Systems Bartek Kiepuszewski, Ralf Muhlberger, Maria E. Orlowska Distributed Systems Technology Centre Distributed Databases Unit ABSTRACT The

More information

Popularity-Based PPM: An Effective Web Prefetching Technique for High Accuracy and Low Storage

Popularity-Based PPM: An Effective Web Prefetching Technique for High Accuracy and Low Storage Proceedings of 22 International Conference on Parallel Processing, (ICPP 22), Vancouver, Canada, August 18-21, 22. Popularity-Based : An Effective Web Prefetching Technique for High Accuracy and Low Storage

More information

Information Processing and Management

Information Processing and Management Information Processing and Management 48 (2012) 828 840 Contents lists available at ScienceDirect Information Processing and Management journal homepage: www.elsevier.com/locate/infoproman A five-level

More information

Hyperbolic Caching: Flexible Caching for Web Applications

Hyperbolic Caching: Flexible Caching for Web Applications Hyperbolic Caching: Flexible Caching for Web Applications Aaron Blankstein Princeton University (now @ Blockstack Inc.) Siddhartha Sen Microsoft Research NY Michael J. Freedman Princeton University Modern

More information

Topic C Memory Models

Topic C Memory Models Memory Memory Non- Topic C Memory CPEG852 Spring 2014 Guang R. Gao CPEG 852 Memory Advance 1 / 29 Memory 1 Memory Memory Non- 2 Non- CPEG 852 Memory Advance 2 / 29 Memory Memory Memory Non- Introduction:

More information

1. Discovering Important Nodes through Graph Entropy The Case of Enron Database

1. Discovering Important Nodes through Graph Entropy The Case of Enron  Database 1. Discovering Important Nodes through Graph Entropy The Case of Enron Email Database ACM KDD 2005 Chicago, Illinois. 2. Optimizing Video Search Reranking Via Minimum Incremental Information Loss ACM MIR

More information

Caching and Replication in Mobile Data Management

Caching and Replication in Mobile Data Management Caching and Replication in Mobile Data Management Evaggelia Pitoura Computer Science Department, University of Ioannina, Greece pitoura@cs.uoi.gr Panos K. Chrysanthis Department of Computer Science, University

More information

Summary Cache based Co-operative Proxies

Summary Cache based Co-operative Proxies Summary Cache based Co-operative Proxies Project No: 1 Group No: 21 Vijay Gabale (07305004) Sagar Bijwe (07305023) 12 th November, 2007 1 Abstract Summary Cache based proxies cooperate behind a bottleneck

More information

BOBCAT: AMD S LOW-POWER X86 PROCESSOR

BOBCAT: AMD S LOW-POWER X86 PROCESSOR ARCHITECTURES FOR MULTIMEDIA SYSTEMS PROF. CRISTINA SILVANO LOW-POWER X86 20/06/2011 AMD Bobcat Small, Efficient, Low Power x86 core Excellent Performance Synthesizable with smaller number of custom arrays

More information

Cloud Transcoder: Bridging the Format and Resolution Gap between Internet Videos and Mobile Devices

Cloud Transcoder: Bridging the Format and Resolution Gap between Internet Videos and Mobile Devices Cloud Transcoder: Bridging the Format and Resolution Gap between Internet Videos and Mobile Devices Zhenhua Li, Peking University Yan Huang, Gang Liu, Fuchen Wang, Tencent Research Zhi-Li Zhang, University

More information

Modeling Cone-Beam Tomographic Reconstruction U sing LogSMP: An Extended LogP Model for Clusters of SMPs

Modeling Cone-Beam Tomographic Reconstruction U sing LogSMP: An Extended LogP Model for Clusters of SMPs Modeling Cone-Beam Tomographic Reconstruction U sing LogSMP: An Extended LogP Model for Clusters of SMPs David A. Reimann, Vipin Chaudhary 2, and Ishwar K. Sethi 3 Department of Mathematics, Albion College,

More information

PowerScope: A Tool for Profiling the Energy Usage of Mobile Applications

PowerScope: A Tool for Profiling the Energy Usage of Mobile Applications PowerScope: A Tool for Profiling the Energy Usage of Mobile Applications Jason Flinn and M. Satyanarayanan School of Computer Science Carnegie Mellon University fjflinn,satyag@cs.cmu.edu Abstract In this

More information

Adaptive Caching Algorithms with Optimality Guarantees for NDN Networks. Stratis Ioannidis and Edmund Yeh

Adaptive Caching Algorithms with Optimality Guarantees for NDN Networks. Stratis Ioannidis and Edmund Yeh Adaptive Caching Algorithms with Optimality Guarantees for NDN Networks Stratis Ioannidis and Edmund Yeh A Caching Network Nodes in the network store content items (e.g., files, file chunks) 1 A Caching

More information

A Semantic-Driven Cache Management Approach for Mobile Applications

A Semantic-Driven Cache Management Approach for Mobile Applications A Semantic-Driven Cache Management Approach for Mobile Applications Guiyi Wei, Jun Yu, Hanxiao Shi, and Yun Ling Zhejiang Gongshang University, Hangzhou, 310035, P.R. China weiguiyi@tom.com, {yj, hxshi,

More information

Effective Prefetching for Multicore/Multiprocessor Systems

Effective Prefetching for Multicore/Multiprocessor Systems Effective Prefetching for Multicore/Multiprocessor Systems Suchita Pati and Pratyush Mahapatra Abstract Prefetching has been widely used by designers to hide memory access latency for applications with

More information

Improving the Performance of a Proxy Server using Web log mining

Improving the Performance of a Proxy Server using Web log mining San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 2011 Improving the Performance of a Proxy Server using Web log mining Akshay Shenoy San Jose State

More information

A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( )

A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( ) A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing (1970 1997) Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233

More information

Scaling Without Sharding. Baron Schwartz Percona Inc Surge 2010

Scaling Without Sharding. Baron Schwartz Percona Inc Surge 2010 Scaling Without Sharding Baron Schwartz Percona Inc Surge 2010 Web Scale!!!! http://www.xtranormal.com/watch/6995033/ A Sharding Thought Experiment 64 shards per proxy [1] 1 TB of data storage per node

More information

Beyond ILP II: SMT and variants. 1 Simultaneous MT: D. Tullsen, S. Eggers, and H. Levy

Beyond ILP II: SMT and variants. 1 Simultaneous MT: D. Tullsen, S. Eggers, and H. Levy EE482: Advanced Computer Organization Lecture #13 Processor Architecture Stanford University Handout Date??? Beyond ILP II: SMT and variants Lecture #13: Wednesday, 10 May 2000 Lecturer: Anamaya Sullery

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

WebTraff: A GUI for Web Proxy Cache Workload Modeling and Analysis

WebTraff: A GUI for Web Proxy Cache Workload Modeling and Analysis WebTraff: A GUI for Web Proxy Cache Workload Modeling and Analysis Nayden Markatchev Carey Williamson Department of Computer Science University of Calgary E-mail: {nayden,carey}@cpsc.ucalgary.ca Abstract

More information

Disconnected Operation in a Mobile Computation System

Disconnected Operation in a Mobile Computation System Disconnected Operation in a Mobile Computation System Marco T. de O. Valente, Roberto da S. Bigonha, Mariza A. da S. Bigonha, Antonio A.F. Loureiro Department of Computer Science University of Minas Gerais

More information

In embedded systems there is a trade off between performance and power consumption. Using ILP saves power and leads to DECREASING clock frequency.

In embedded systems there is a trade off between performance and power consumption. Using ILP saves power and leads to DECREASING clock frequency. Lesson 1 Course Notes Review of Computer Architecture Embedded Systems ideal: low power, low cost, high performance Overview of VLIW and ILP What is ILP? It can be seen in: Superscalar In Order Processors

More information

Evaluation of Branch Prediction Strategies

Evaluation of Branch Prediction Strategies 1 Evaluation of Branch Prediction Strategies Anvita Patel, Parneet Kaur, Saie Saraf Department of Electrical and Computer Engineering Rutgers University 2 CONTENTS I Introduction 4 II Related Work 6 III

More information

Multiprocessor Cache Coherence. Chapter 5. Memory System is Coherent If... From ILP to TLP. Enforcing Cache Coherence. Multiprocessor Types

Multiprocessor Cache Coherence. Chapter 5. Memory System is Coherent If... From ILP to TLP. Enforcing Cache Coherence. Multiprocessor Types Chapter 5 Multiprocessor Cache Coherence Thread-Level Parallelism 1: read 2: read 3: write??? 1 4 From ILP to TLP Memory System is Coherent If... ILP became inefficient in terms of Power consumption Silicon

More information

Object Placement in Shared Nothing Architecture Zhen He, Jeffrey Xu Yu and Stephen Blackburn Λ

Object Placement in Shared Nothing Architecture Zhen He, Jeffrey Xu Yu and Stephen Blackburn Λ 45 Object Placement in Shared Nothing Architecture Zhen He, Jeffrey Xu Yu and Stephen Blackburn Λ Department of Computer Science The Australian National University Canberra, ACT 2611 Email: fzhen.he, Jeffrey.X.Yu,

More information

Expecting the Unexpected: Adaptation for Predictive Energy Conservation

Expecting the Unexpected: Adaptation for Predictive Energy Conservation Expecting the Unexpected: daptation for Predictive Energy onservation Jeffrey P. Rybczynski, arrell. E. Long hmed mer Storage Systems Research enter epartment of omputer Science University of alifornia,

More information

Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol

Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Li Fan, Pei Cao and Jussara Almeida University of Wisconsin-Madison Andrei Broder Compaq/DEC System Research Center Why Web Caching One of

More information

COMMON ISSUES AFFECTING SECURITY USABILITY

COMMON ISSUES AFFECTING SECURITY USABILITY Evaluating the usability impacts of security interface adjustments in Word 2007 M. Helala 1, S.M.Furnell 1,2 and M.Papadaki 1 1 Centre for Information Security & Network Research, University of Plymouth,

More information

Relative Performance of a Multi-level Cache with Last-Level Cache Replacement: An Analytic Review

Relative Performance of a Multi-level Cache with Last-Level Cache Replacement: An Analytic Review Relative Performance of a Multi-level Cache with Last-Level Cache Replacement: An Analytic Review Bijay K.Paikaray Debabala Swain Dept. of CSE, CUTM Dept. of CSE, CUTM Bhubaneswer, India Bhubaneswer, India

More information

Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam

Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam www.kuet.ac.bd Khulna University of Engineering & Technology (KUET) 2 Introduction Components of Wireless

More information

Seminar on. By Sai Rahul Reddy P. 2/2/2005 Web Caching 1

Seminar on. By Sai Rahul Reddy P. 2/2/2005 Web Caching 1 Seminar on By Sai Rahul Reddy P 2/2/2005 Web Caching 1 Topics covered 1. Why Caching 2. Advantages of Caching 3. Disadvantages of Caching 4. Cache-Control HTTP Headers 5. Proxy Caching 6. Caching architectures

More information