The Snapshot Index: An I/O-optimal access method for timeslice queries
نویسندگان
چکیده
We present an access method for timeslice queries that reconstructs a past state s(t) of a time-evolving collection of objects, in O(log,, n + Is(t)l/b) I/O ‘8, where Is(t)1 denotes the size of the collection at time t, n is the total number of changes in the collection’s evolution and b is the size of an I/O transfer. Changes include the addition, deletion or attribute modification of objects; they are assumed to occur in increasing time order and always affect the most current state of the collection (thus our index supports transaction-time.) The space used is 0 n/b) while the update processing is constant per change, i.e. , independent of n. This is the first I I O-optimal access method for this problem using O(n/b) space and O(1) updating (in the expected amortized sense due to the use of hashing.) This performance is also achieved for interval intersection temporal queries. An advantage of our approach is that its performance can be tuned to match particular application needs (trading space for query time and vice versa). In addition, the Snapshot Index can naturally migrate data on a write-once optical medium while maintaining the same performance bounds. Key wools: Access Methods, Transaction-time Databases, Optimal I/O, Data Structures
منابع مشابه
Overlapping B+-Trees: An Implementation of a Transaction Time Access Method
A new variation of Overlapping B +-trees is presented, which provides eecient indexing of transaction time and keys in a two dimensional key-time space. Modiication operations (i.e. insertions, deletions and updates) are allowed at the current version, whereas queries are allowed to any temporal version, i.e. either in the current or in past versions. Using this structure, snapshot and range-ti...
متن کاملAn Access Method for Objects Moving among Fixed Regions
We propose a spatio-temporal access method for objects that move through a set of fixed and disjoint regions. The proposal is based on an R-tree, on a temporal access method and on a hashing scheme. With our method it is possible to respond to queries of the timeslice and interval types as well as queries about the trajectory that an object has followed. It is also possible to process spatio-te...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملEfficient Indexing for Constraint and Temporal Databases
in the output of the pure-timeslice query corresponding to the range-timeslice query, and B is the disk blocksize. Temporal objects can be \inserted" into or \deleted" from this data structure in O(log B n) I/O's amortized. Even though we do not explore the idea here, we believe that it is possible to migrate \older" parts of the temporal data structure to tertiary storage without reorganizing ...
متن کاملبهبود الگوریتم انتخاب دید در پایگاه داده تحلیلی با استفاده از یافتن پرس وجوهای پرتکرار
A data warehouse is a source for storing historical data to support decision making. Usually analytic queries take much time. To solve response time problem it should be materialized some views to answer all queries in minimum response time. There are many solutions for view selection problems. The most appropriate solution for view selection is materializing frequent queries. Previously posed ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Syst.
دوره 20 شماره
صفحات -
تاریخ انتشار 1995