Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 22 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Semantic embedding for regions of interest
Abstract

The available spatial data are rapidly growing and also diversifying. One may obtain in large quantities information such as annotated point/place of interest (POIs), check-in comments on those POIs, geo-tagged microblog comments, and demarked ...

research-article
Efficient local locking for massively multithreaded in-memory hash-based operators
Abstract

The join and group-by aggregation are two memory intensive operators that are affecting the performance of relational databases. Hashing is a common approach used to implement both operators. Recent paradigm shifts in multi-core processor ...

research-article
Comparison and evaluation of state-of-the-art LSM merge policies
Abstract

Modern NoSQL database systems use log-structured merge (LSM) storage architectures to support high write throughput. LSM architectures aggregate writes in a mutable MemTable (stored in memory), which is regularly flushed to disk, creating a new ...

research-article
Cache-efficient sweeping-based interval joins for extended Allen relation predicates
Abstract

We develop a family of efficient plane-sweeping interval join algorithms for evaluating a wide range of interval predicates such as Allen’s relationships and parameterized relationships. Our technique is based on a framework, components of which ...

research-article
Better database cost/performance via batched I/O on programmable SSD
Abstract

Data should be placed at the most cost- and performance-effective tier in the storage hierarchy. While performance and cost decrease with distance from the CPU, the cost/performance trade-off depends on how efficiently data can be moved across ...

research-article
Cleaning timestamps with temporal constraints
Abstract

Timestamps are often found to be dirty in various scenarios, e.g., in distributed systems with clock synchronization problems or unreliable RFID readers. Without cleaning the imprecise timestamps, temporal-related applications such as provenance ...

research-article
Internal and external memory set containment join
Abstract

A set containment join operates on two set-valued attributes with a subset () relationship as the join condition. It has many real-world applications, such as in publish/subscribe services and inclusion dependency discovery. Existing solutions ...

research-article
Efficient structural node similarity computation on billion-scale graphs
Abstract

Structural node similarity is widely used in analyzing complex networks. As one of the structural node similarity metrics, role similarity has the good merit of indicating automorphism (isomorphism). Existing algorithms to compute role similarity (...

Subjects

Comments