期刊文献+

数据流上Ad Hoc查询的自适应处理算法 被引量:2

Adaptive Processing Algorithm of Ad Hoc Query in Data Streams
下载PDF
导出
摘要 对数据流上的Ad Hoc查询进行自适应处理,需要保证已有查询计划快速在线更新和迁移,但现有方法实现新旧查询计划的更新需要大量的滑动窗口状态转换。为此,提出一种AdHoe查询自适应处理算法。该算法基于数据流概要分布特性和自定义评分模型,快速计算出现有查询计划的最佳增量更新,以实现新到达的Ad Hoc查询处理,降低新旧查询计划切换时间。在数据流benchmark Linear Road提供的高速公路数据集上进行实验,结果表明,与MS、PT方法相比,该算法可较快完成新旧查询计划的切换。 The adaptive processing of non-stop coming Ad Hoc queries over data stream concerns much on the fast on-the-fly plan updating and migration. Existing methods implementing the shifting from old plan to new plan need amounts of work to move the state maintained in operators' sliding time window leading to large time delay. This paper proposes a highly efficient Ad Hoc query processing algorithm called AQU, which can compute the best incremental updating based on the summary view of data stream characteristics and a slef-defined model, handle the newly arriving Ad Hoc queries. This algorithm reduces the time shifting from old plan to new one and is also adaptive to non-top incoming queries. Experiments on the high way data generated by data stream benchmark Linear Road shows the efficiency of this algorithm.
作者 黄浩 杨卫东
出处 《计算机工程》 CAS CSCD 2013年第9期74-79,共6页 Computer Engineering
基金 国家"863"计划基金资助项目(2008AA121705) 上海市重点基础研究基金资助项目(08JC1402500) 上海市科技创新基金资助项目(Xiao-34-1)
关键词 数据流 查询计划 AdHoc查询 自适应算法 查询计划更新 data stream query plan Ad Hoc query adaptive algorithm query plan updating
  • 相关文献

参考文献13

  • 1Zou Qiong, Wang Huayong, Soul6 R, et al. From a Stream of Relational Queries to Distributed Stream Processing[C]//Proc. of Intemet Conf. on Very Large Data Base[S. 1.]: View Publication, 2010: 1394-1405.
  • 2Arasu A, Babcock B, Babu S, et al. STREAM: The StanfordStream Data Manager(Demonstration Description)[C]//Proc. of 2003 ACM SIGMOD International Conference on Manage- ment of Data. [S. 1.]: ACM Press, 2003: 665-665.
  • 3Kr:imer J, Seeger B. PIPES: A Public Infrastructure for Processing and Exploring Streams[C]//Proc. of 2004 ACM SIGMOD International Conference on Management of Data. IS. 1.]: ACM Press, 2004: 925-926.
  • 4Rundensteiner E K, Ding Luping, Sutherland T, et al. CAPE: Continuous Query Engine with Heterogeneous-grained Adaptivity[C]//Proc. of the 30th International Conference on Very Large Data Bases. Worcester, USA: [s. n.], 2004: 1355-1356.
  • 5Chandrasekaran S, Franklin M J. PSoup: A System for Strea- ming Queries over Streaming Data[J]. The VLDB Journal, 2003, 12(2): 140-156.
  • 6Lerner A, Shasha D. The Virtues and Challenges of Ad Hoe+ Streams Querying in Finance[J]. IEEE Data Engineering Bulletin, 2003, 26(1): 49-56.
  • 7Moonjung C, Jian P, Ke W. Answering Ad Hoc Aggregate Queries from Data Streams Using Prefix Aggregate Trees[J]. Knowledge and Information Systems, 2007, 2(3): 301-329.
  • 8Babcock B, Babu S, Datar M, et al. Models and Issues in Data Stream Systems[C]//Proc. of the 21st ACM SIGMOD- SIGACT-SIGART Symposium on Principles of Database Systems. IS. 1.]: ACM Press, 2002: 1-16.
  • 9Yang Yin, Kramer J, Papadias D, et al. HybMig: A Hybrid Approach to Dynamic Plan Migration for C:ntinuous Queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(3): 398-411.
  • 10Zhu Yali, Rundensteiner E A, Heineman G T. Dynamic Plan Migration for Continuous Queries over Data Streams[C]//Proc. of 2004 ACM SIGMOD International Conference on Management of Data. IS. 1.]: ACM Press, 2004: 431-442.

同被引文献36

  • 1罗刚,王振东.自己动手写网络爬虫.北京:清华大学出版社,2010.6—21.
  • 2Hacigumus H,Iyer B,Mehrotra S.Providing database as a service[C]//Proceedings of the 18th International Conference on Data Engineering,San Jose,USA,Feb 26-Mar 01,2002.Piscataway,NJ,USA:IEEE,2002:29-38.
  • 3Goldwasser S,Micali S,Rivest R L.A digital signature scheme secure against adaptive chosen-message attacks[J].SIAM Journal on Computing,2013,17(2):281-308.
  • 4Merkle R C.A certified digital signature[M].New York:Springer,1990:218-238.
  • 5Kuty?owski M,Kubiak P.Lightweight digital signature with secretly embedded warning[J].Control and Cybernetics,2013,42(4):825-827.
  • 6Merkle R C.Protocols for public key crytosystems[C]//Proceedings of the 1980 IEEE Symposium on Security and Privacy,Oakland,USA,Apr 1980.Washington,DC,USA:IEEE Computer Society,1980:122-136.
  • 7Li Feifei,Yi Ke,Hadjieleftheriou M,et al.Proof-infused streams:enabling authentication of sliding window queries on streams[C]//Proceedings of the 33rd International Conference on Very Large Data Bases,Vienna,Austria,Sep 23-28,2007:147-158.
  • 8Devanbu P,Gertz M,Kwong A,et al.Flexible authentication of XML documents[J].Journal of Computer Security,2004,12(6):841-864.
  • 9Goldwasser S,Kalai Y T,Rothblum G N.Delegating computation:interactive proofs for muggles[C]//Proceedings of the 40th Annual ACM Symposium on Theory of Computing,Victoria,Canada,May 17-20,2008.New York,NY,USA:ACM,2008:113-122.
  • 10Nath S,Venkatesan R.Publicly verifiable grouped aggregation queries on outsourced data streams[C]//Proceedings of the 2013 IEEE 29th International Conference on Data Engineering,Brisbane,Australia,Apr 8-12,2013.Piscataway,NJ,USA:IEEE,2013:517-528.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部