期刊文献+

插值方法预测并调整Oracle性能研究 被引量:2

Research on predicting and tuning Oracle performance based on interpolation methods
下载PDF
导出
摘要 重点介绍了一些简单而非常有效的插值方法,使用这些技术可以在Oracle数据库系统处于高负荷状态下,对SQL语句执行情况做出准确地性能预测。同时,将插值方法用在Oracle数据库中,可以改善基于SQL的Oracle数据库系统性能。另外,这些技术利用了Oracle的性能诊断工具的功效,可以发现其他方法可能忽略的性能问题。 Some simple but effective interpolation techniques are introduced to make performance predictions at higher loads for SQL executions. Meanwhile, using interpolation methods into the Oracle database can improve the performance of Oracle database system of SQL. These techniques use the effectiveness of Oracle performance diagnostic tools and uncover hidden performance problems that can be overlooked bv other methods.
作者 杨英
出处 《重庆邮电大学学报(自然科学版)》 2008年第4期486-490,共5页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
关键词 ORACLE MATLAB 曲线契合 插值 Oracle Matlab curve-fitting interpolation
  • 相关文献

参考文献7

  • 1[1]KTYE Thomas.expert one-one-ine Oracle[M].袁勤勇,张玉魁,译.北京:清华大学出版社,2002.
  • 2[2]NIEMIEC Richard J.Oracle 9i性能调整[M].王海涛,鹿凡,译.北京:清华大学出版社,2005.
  • 3[3]KANTARDZIC Mehmed.数据挖掘棗概念、模型、方法和算法[M].闪四清,陈茵,译.北京:清华大学出版社.2003.
  • 4[5]傅鹏,龚劬,刘琼荪,等.数学实验[M].北京:科学出版社.2000.
  • 5[7]KTYE Thomas.Oracle高效设计[M].钟鸣,译.北京:机械工业出版社,2006.
  • 6[8]CASTEEL Joan.Oracle9i开发指南:PL/SQL程序设计[M].天宏工作室,译.北京:清华大学出版社,2004.
  • 7MA Chun-bo,LI Jian-hua,AO Jun.How to signcrypt a message to designated group[J].The Journal of China Universities of Posts and Telecommunications,2007,14(4):57-63. 被引量:1

二级参考文献19

  • 1Ma C, Mei Q, Li J. Broadcast group-oriented encryption for group communication. Journal of Computational Information Systems, 2007, 3(1): 63-71
  • 2An J H, Authenticated encryption in the public-key setting: security notions and analyses, http://eprint. iacr.org/2001/079, 2001
  • 3Jeong R, Jeong H Y, Rhee H S, et al. Provably secure encrypt-then-sign composition in hybrid signcryption. Proceedings of 5th International Conference on Information Security and Cryptology, Nov 28-29, 2002, Seoul, Korea. Berlin, Germany: Springer-Verlag, 2002:221-232
  • 4Zheng Y. Digital signcryption or how to achieve cost(signature and encryption)<<cost(signature)+cost(encryption). Proceedings of 17th Annual International Cryptology Conference, Aug 17-21,Santa Barbara, CA, USA. Berlin, Germany: Springer-Verlag. 1997:165-179
  • 5Lee M K, Kim D K, Park K. An authenticated encryption scheme with public verifiability. Proceedings of 4th Korea-Japan Joint Workshop on Algorthms and Computation, Jul, 2000, Tokyo, Japan. 2000:49-56
  • 6Baek J, Steinfeld R, Zheng Y. Formal proofs for the security of signcryption. Proceedings of International Workshop on Practice and Theory in Public-key Cryptography, Feb 12-14, 2002, Paris, France. Berlin, Germany: Springer-Verlag, 2002:80-98
  • 7An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Apr 28-May 2, 2002, Amsterdam, The Netherlands. Berlin, Germany Springer-Verlag, 2002:83-107
  • 8Dodis Y, Freedman M J, Jarecki S, et al. Versatile padding schemes for joint signature and encryption. Proceedings of the 11th ACM Conference on Computer and Communications Secuirty, Oct 25-29, 2004, Washington, DC, USA. New York, NY, USA: ACM, 2004: 344-353.
  • 9Petersen H, Michels M. Cryptanalysis and improvement of signcryption schemes, lEE Proceedings: Computers and Digital Techniques, 1998, 145(2): 149-151
  • 10Pieprzyk J, Pointcheval D. Parallel authentication and publickey encryption. Proceedings of 8th Australasian Conference on Information Security and Privacy, Jul 9-11, 2003, Wollongong, Australia. Berlin, Germany: Springer-Verlag, 2003:383-401

同被引文献7

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部