Proceedings of 3rd International Conference on Parallel and Distributed Information Systems

28-30 Sept. 1994

Filter Results

Displaying Results 1 - 25 of 36
  • DataJoiner: a practical approach to multi-database access

    Publication Year: 1994
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (59 KB)

    Summary form only given. As a result of the trend towards client/server and open systems over the last decade, businesses are finding that they have useful data distributed across multiple DBMSs. DataJoiner is a new database middleware product that provides client applications with a unified view of this diverse data. It will enable and simplify the development of complex decision support applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings of 3rd International Conference on Parallel and Distributed Information Systems

    Publication Year: 1994
    Request permission for commercial reuse | |PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Precision and recall of GlOSS estimators for database discovery

    Publication Year: 1994, Page(s):103 - 106
    Cited by:  Papers (6)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (300 KB)

    Online information vendors and the Internet together offer thousands of text databases from which a user may choose for a given information need. This paper presents a framework for and analyses a solution to this problem, which we call the text-database discovery problem. Our solution is to build a service that can suggest potentially good databases to search. A user's query goes through two step... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exposing I/O concurrency with informed prefetching

    Publication Year: 1994, Page(s):7 - 16
    Cited by:  Papers (27)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (808 KB)

    Informed prefetching provides a simple mechanism for I/O-intensive, cache-ineffective applications to efficiently exploit highly-parallel I/O subsystems such as disk arrays. This mechanism, dynamic disclosure of future accesses, yields substantial benefits over sequential readahead mechanisms found in current file systems for non-sequential workloads. This paper reports the performance of the Tran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ParSets for parallelizing OODBMS traversals: implementation and performance

    Publication Year: 1994, Page(s):111 - 120
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (736 KB)

    Describes the design and implementation of ParSets, a means of exploiting parallelism in the SHORE persistent object store. We used ParSets to create and parallelize the graph traversals of the OO7 OODBMS benchmark, and present speedup and scaleup results from parallel SHORE running these traversals on a cluster of commodity workstations connected by a standard Ethernet. For some OO7 traversals, S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic parity stripe reorganizations for RAID5 disk arrays

    Publication Year: 1994, Page(s):17 - 26
    Cited by:  Papers (6)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (780 KB)

    RAID5 disk arrays provide high performance and high reliability for reasonable cost. However RAIDS suffers a performance penalty during block updates. We examine the feasibility of using “dynamic parity striping” to improve the performance of block updates. Instead of updating each block independently, this method buffers a number of updates, generates a new stripe composed of the newl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PDIS and the Information Highway

    Publication Year: 1994, Page(s):220 - 222
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (216 KB)

    Advanced networking technologies offer opportunities for new and better PDIS. The Information Highway attracts a great deal of attention, and yet a precise definition eludes us. There are two trends that are real. The first, and the one that will have the most impact, is the expansion of the Internet and commercial analogues. The other trend is the technological changes in higher performance netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query processing for decision support: the SQLmpp solution

    Publication Year: 1994, Page(s):121 - 130
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (848 KB)

    Decision support systems are characterized by large data sets and complex queries with multi-way joins, aggregation and nesting. SQLmpp is a highly parallel database server designed to efficiently support these applications. SQLmpp's query processing strategy is driven by three principal goals: (1) data parallelism in all operations, (2) maximal use of any relevant indexes, and (3) minimal process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Write twice disk buffering

    Publication Year: 1994, Page(s):27 - 34
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (568 KB)

    Non-volatile (safe) disk buffers improve performance in DBMSs. Writes to the disk buffer are durable without incurring physical disk writes. Moreover, physical writes at the disk can be performed at low cost using write piggybacking and multiblock purges. However, safe disk buffers are expensive. In this paper, unsafe buffers are used to simulate safe buffers, by writing each block twice to disk. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed selective dissemination of information

    Publication Year: 1994, Page(s):89 - 98
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (836 KB)

    To help users cope with information overload, selective dissemination of information (SDI) will increasingly become an important tool in wide area information systems. In an SDI service, users post their long term queries, called profiles, at some SDI servers and continuously receive new, filtered documents. To scale up with the volume of information and the size of user population, we need a dist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing network resources for efficient, reliable information systems

    Publication Year: 1994, Page(s):223 - 226
    Cited by:  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (196 KB)

    Recent advances in public network technology and emerging database interface standards enable the implementation of a new type of distributed database systems and create demand for improved query distribution and query optimization algorithms. A research topic that immediately arises is cost minimization for ISDN usage. Even if policies for charging telephone communications may vary, it is a fair ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant distributed garbage collection in a client-server object-oriented database

    Publication Year: 1994, Page(s):239 - 248
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (788 KB)

    We present a scalable garbage collection scheme for systems that store objects at multiple servers while clients run transactions on locally cached copies of objects. It is the first scheme that provides fault tolerance for such a system: Servers recover from failures and retrieve information needed for safe garbage collection; clients do not recover from failures, yet the scheme is able to reclai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fractional data allocation method for distributed databases

    Publication Year: 1994, Page(s):168 - 175
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (788 KB)

    High performance transaction processing in a distributed database (DDB) system can only be achieved through a high degree of locality of access, which may be attainable by appropriate data allocation. In this paper, we discuss an adaptive data allocation method for DDB systems maintaining resource allocation data, as in airline reservations and inventory control applications. According to the frac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A client/server architecture for distributed workflow management systems

    Publication Year: 1994, Page(s):253 - 256
    Cited by:  Papers (8)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (332 KB)

    A specific task of distributed and parallel information systems is workflow management, In particular, workflow management system execute business processes that run on top of distributed and parallel information systems. Parallelism is due to performance requirements and involves data and applications that are spread across a heterogeneous, distributed computing environment. Heterogeneity and dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework for object migration in federated database systems

    Publication Year: 1994, Page(s):187 - 194
    Cited by:  Papers (3)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (596 KB)

    Existing federated database systems (FDBS) provide uniform access to multiple heterogeneous DBS, but do not enable objects to move across the DBS while retaining global identity. To fulfil this requirement of industrial users, we provide a framework incorporating a flexible object migration mechanism into FDBS. It offers different capabilities for “what” and “how” to migrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Divergence caching in client-server architectures

    Publication Year: 1994, Page(s):131 - 139
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (768 KB)

    Proposes a new mechanism, divergence caching, for reducing access and communication charges in accessing online database servers. The objective is achieved by allowing tolerant read requests, namely requests that can be satisfied by out-of-date data. We propose two algorithms based on divergence caching-static and dynamic. The first is appropriate when the access pattern to an object in the databa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive dynamic load balancing of parallel hash-joins over heterogeneous processors in the presence of data skew

    Publication Year: 1994, Page(s):40 - 49
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (756 KB)

    We present new algorithms to balance the computation of parallel hash joins over heterogeneous processors in the presence of data skew and external loads. Heterogeneity in our model consists of disparate computing elements, as well as general purpose computing ensembles that are subject to external loading. Data skew appears as significant nonuniformities in the distribution of attribute values of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure access to data over the Internet

    Publication Year: 1994, Page(s):99 - 102
    Cited by:  Papers (3)  |  Patents (28)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (328 KB)

    Security issues are the major roadblock currently preventing greater access to databases over the Internet. In this paper, we propose a framework for secure access to databases by a wide audience over the Internet, using World Wide Web information servers, a modified version of the NCSA Mosaic Internet browser and role wrappers (software modules that assign roles to incoming database requests, bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interdatabase existence dependencies: a metaclass approach

    Publication Year: 1994, Page(s):213 - 216
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (344 KB)

    We present a novel approach to deal with the modeling and operational aspects of the interdatabase existence dependency problem. By extending our canonical model BLOOM with high level abstractions (metaclasses) for the different kinds of existence dependencies and their corresponding enforcement policies, inter-dependencies are declaratively specified and their behavior embodied into the model by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location management in distributed mobile environments

    Publication Year: 1994, Page(s):81 - 88
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (712 KB)

    Location management is an important problem in distributed mobile computing. Location management consists of location updates, searches and search-updates. An update occurs when a mobile host changes location. A search occurs when a mobile host needs to be located. A search-update occurs after a successful search. Various strategies can be designed for search, update and search-update. Static loca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A predicate-based caching scheme for client-server database architectures

    Publication Year: 1994, Page(s):229 - 238
    Cited by:  Papers (1)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (892 KB)

    We propose a new client-side data caching scheme for relational databases with a central server and multiple clients. Data is loaded into a client cache based on queries, which are used to form predicates describing the cache contents. A subsequent query at the client may be satisfied in its local cache if we can determine that the query result is entirely contained in the cache. This issue is cal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timestamping after commit

    Publication Year: 1994, Page(s):160 - 167
    Cited by:  Papers (5)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (744 KB)

    Many applications need transaction-consistent pictures of past states of the database. These applications use the commit time of the transaction to timestamp the data. When a transaction is distributed, the cohorts must vote on a commit time and the coordinator must choose a commit time based on the votes of the cohorts. This implies that timestamps are applied after commit. Until the timestamps a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving transaction scaleup on Unix

    Publication Year: 1994, Page(s):249 - 252
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (336 KB)

    Constructing scalable high-performance applications on commodity hardware running the Unix operating system is a problem that must be addressed in several application domains. We relate our experience in achieving transaction scaleup on Unix for a high-performance OLTP system intended for Service Control Points (SCPs) in a telephone switching network. SCPs are but one example from a class of appli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority assignment in real-time active databases

    Publication Year: 1994, Page(s):176 - 184
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (748 KB)

    Active databases and real-time databases have been important areas of research in the recent past. It has been recognized that many benefits can be gained by integrating active and real-time database technologies. However, there has not been much work done in the area of transaction processing in active real-time databases. This paper deals with an important aspect of transaction processing in act... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of the Remote Cooperation System in PRIMA

    Publication Year: 1994, Page(s):257 - 260
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (360 KB)

    In order to achieve acceptable performance in enhanced DBMS, different kinds of parallelism have to be enabled by appropriate implementation capabilities. The Remote Cooperation System (RCS) offers these capabilities. It is the basic communication system of an enhanced DBMS called PRIMA. We present different implementations for RCS and an analysis of their performance behavior. In order to get a b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.