Persistent Databases That Perform?

نویسنده

  • F. A. HENSKENS
چکیده

Conventional computer systems implement a dichotomy of storage mechanisms: a file store which provides a durable repository allowing data to exist after the creating program has ceased execution (such data is termed long-term data), and virtual memory which provides a repository for data during program execution (such data is termed short-term data). In typical conventional systems it is the responsibility of the programmer to manage the conversion of data between the transient form suitable for virtual memory and the permanent form suitable for the file store. This conversion uses up CPU cycles, and can result in data misinterpretation leading to reduced data protection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Disk Management for Object-oriented Databases (student Paper) 1.2 Clustering and Prefetching

An object-oriented database provides persistent storage for a large number of objects. These objects may be very small, and the access patterns are likely to be not as uniform as the mostly sequential reads and writes seen in le-systems 1]. For example, the OO7 benchmark for object-oriented databases speciies a number of traversals that follow pointers around a graph of objects 2]. Given these ...

متن کامل

IceDust: Incremental and Eventual Computation of Derived Values in Persistent Object Graphs

Derived values are values calculated from base values. They can be expressed in object-oriented languages by means of getters calculating the derived value, and in relational or logic databases by means of (materialized) views. However, switching to a different calculation strategy (for example caching) in object-oriented programming requires invasive code changes, and the databases limit expre...

متن کامل

Methodology for Detecting Advanced Persistent Threats in Oracle Databases

Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will describe a methodology for finding APTs that...

متن کامل

Comparison of Bibliographic Databases in Retrieving Information on Telemedicine

Background & Aims: Some of the main questions which can be of importance for those researchers who intend to perform a systematic review in a field of science are: ‘What databases should I use for my review?’; ‘Do all these databases have the same value?’; and ‘Which sourcesretrieved the highest of relevant references?’. The main aim of this work was the identification of the best database for ...

متن کامل

Interfaces to Access a Persistent Distributed Shared Store in PerDiS

Persistent data is data that survives the process that created it. Application programmers currently manipulate persistent data through files or databases. However, file and database interfaces are artificially different from memory ones, leading to unnatural and complex operation. Furthermore, existing databases are typically not distributed, and file systems typically provides no concurrency ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003