Networking and Information Systems Journal

نویسندگان

  • Zhao-Hui Tang
  • Georges Gardarin
چکیده

Object relational and object database (distributed) systems are used more and more in real applications due to their rich and extensible data types and query language mixing declarative assertions and navigations. Queries may frequently involve multiple collection traversais (i.e., path expression), possibly distributed. Moreover, predicates with quantifiers can also be included inside path expressions. These bring new challenges for object query optimization. In order to efficiently optimize these queries, we define the concept of quantified path expressions and introduce navigational algebraic operators, which mix nicely with classical object algebra. We also investigate several randomized algorithms for exploring the search space generated by path expressions. Through experimentation, we also find an improved procedure of Genetic Algorithm which is more efficient compared to the classical one. We give both analytical and experimental comparisons between our Genetic Algorithm and other well-known combinatorial algorithms such as Iterative Improvement, Simulated Annealing and Tabu Search. For most of the experiments, our Genetic Algorithm finds better query plans than other algorithms. RÉSUMÉ. Les systèmes de bases de données objets et relationnelles sont de plus en plus utilisés dans de vraies applications, cela grâce à leurs types de données riches et extensibles ainsi qu'à leur langage de requêtes mélangeant les affirmations déclaratives et les navigations. Les requêtes peuvent souvent permettre de nombreuses collectes transversales (i.e., expression de chemin), potentiellement distribuées. De plus, des prédicats avec des quantificateurs comme « exist, any, all » peuvent être inclus dans ces expressions de chemin. Cela apporte de nouveaux défis pour l'optimisation de requêtes à objets. Pour optimiser efficacement ces requêtes, nous définissons le concept d'expressions de chemin quantifiées et introduisons les opérateurs algébriques de navigation qui se mêlent de manière correcte avec l'algèbre à objets classique. Nous étudions également plusieurs algorithmes combinatoires pour explorer l'espace de recherche généré par les expressions de chemin. Au travers de cette expérience, nous trouvons une procédure améliorée d'algorithme génétique qui est plus efficace comparée aux classiques du genre. Nous fournissons une comparaison analytique et expérimentale entre notre algorithme génétique et d'autres algorithmes et la méthode tabou. Dans la plupart de nos expériences, notre algorithme génétique trouve de meilleurs « plans » de requêtes que les autres algorithmes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

SDN Security: A Survey

The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...

متن کامل

SDN Security: A Survey

The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...

متن کامل

Computer security in the future

Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...

متن کامل

The impact of information technology on health

Information Technology (IT) is the study of systems especially computers for storing, retrieving, and sending information. It uses any networking and other physical devices, infrastructures to secure and exchange all forms of electronic data. IT is used globally as a major portion of daily life and we use it nearly every day within organizations for many reasons. Our computers, mobile phones an...

متن کامل

Automatic Hashtag Recommendation in Social Networking and Microblogging Platforms Using a Knowledge-Intensive Content-based Approach

In social networking/microblogging environments, #tag is often used for categorizing messages and marking their key points. Also, since some social networks such as twitter apply restrictions on the number of characters in messages, #tags can serve as a useful tool for helping users express their messages. In this paper, a new knowledge-intensive content-based #tag recommendation system is intr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010