咨询与建议

限定检索结果

文献类型

  • 18 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 23 篇 计算机科学与技术...
    • 7 篇 软件工程
    • 4 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 25 篇 key-value databa...
  • 4 篇 nosql
  • 3 篇 graph database
  • 3 篇 nosql database
  • 3 篇 big data
  • 3 篇 redis
  • 2 篇 internet of thin...
  • 2 篇 eviction algorit...
  • 2 篇 integrity
  • 2 篇 relational datab...
  • 2 篇 bloom filter
  • 2 篇 expiration
  • 2 篇 cloud services
  • 2 篇 data mining
  • 2 篇 solid state driv...
  • 2 篇 trust
  • 2 篇 storage
  • 2 篇 in-memory storag...
  • 1 篇 document-oriente...
  • 1 篇 data warehouse

机构

  • 2 篇 chinese univ hon...
  • 1 篇 the chinese univ...
  • 1 篇 jd intelligent c...
  • 1 篇 penn state univ ...
  • 1 篇 kasetsart univ c...
  • 1 篇 zhongguancun lab...
  • 1 篇 chinese acad sci...
  • 1 篇 chongqing univ c...
  • 1 篇 univ modena & re...
  • 1 篇 chongqing univ p...
  • 1 篇 shandong univ pe...
  • 1 篇 univ chinese aca...
  • 1 篇 univ manitoba wi...
  • 1 篇 fed univ technol...
  • 1 篇 tsinghua univ gr...
  • 1 篇 southwest jiaoto...
  • 1 篇 sogang univ
  • 1 篇 jd technol jd ic...
  • 1 篇 johannes kepler ...
  • 1 篇 microsoft res re...

作者

  • 2 篇 ciuffoletti augu...
  • 2 篇 li ruiyuan
  • 1 篇 li guanyao
  • 1 篇 hofer daniel
  • 1 篇 mao along
  • 1 篇 setty srinath
  • 1 篇 narayanan vijayk...
  • 1 篇 zhao zihao
  • 1 篇 luca ferretti
  • 1 篇 kueng josef
  • 1 篇 guochao xie
  • 1 篇 xu min
  • 1 篇 chung yeh-ching
  • 1 篇 auer dagmar
  • 1 篇 bajaj akhilesh
  • 1 篇 sarumi oluwafemi...
  • 1 篇 stamatescu grigo...
  • 1 篇 stan mircea
  • 1 篇 wu yongwei
  • 1 篇 ferretti luca

语言

  • 25 篇 英文
检索条件"主题词=Key-value Database"
25 条 记 录,以下是1-10 订阅
排序:
ISKEVA: In-SSD key-value database Engine for Video Analytics Applications  2022
ISKEVA: In-SSD Key-Value Database Engine for Video Analytics...
收藏 引用
23rd International Conference on Languages, Compilers, and Tools for Embedded System (LCTES)
作者: Zheng, Yi Fixelle, Joshua Challapalle, Nagadastagiri Huo, Pingyi Shen, Zhaoyan Shao, Zili Stan, Mircea Narayanan, Vijaykrishnan Penn State Univ University Pk PA 16802 USA Univ Virginia Charlottesville VA USA Shandong Univ Jinan Peoples R China Chinese Univ Hong Kong Hong Kong Peoples R China
key-value databases are widely used to store the features or metadata generated from the neural network based video processing platforms. Due to the large volumes of video data, these databases use solid state drives ... 详细信息
来源: 评论
Bucket-Based Expiration Algorithm: Improving Eviction Efficiency for In-Memory key-value database
Bucket-Based Expiration Algorithm: Improving Eviction Effici...
收藏 引用
International Symposium on Memory Systems (MEMSYS)
作者: Xie, Guochao Chung, Yeh-Ching Chinese Univ Hong Kong Shenzhen Peoples R China
Evicting expired keys for an in-memory key-value database is essential to save its memory resources and control its memory usage not exceeding its memory limit. Existing randomized expiration algorithms randomly sampl... 详细信息
来源: 评论
Bucket-Based Expiration Algorithm: Improving Eviction Efficiency for In-Memory key-value database  2020
Bucket-Based Expiration Algorithm: Improving Eviction Effici...
收藏 引用
The International Symposium on Memory Systems
作者: Guochao Xie Yeh-Ching Chung The Chinese University of Hong Kong Shenzhen China
Evicting expired keys for an in-memory key-value database is essential to save its memory resources and control its memory usage not exceeding its memory limit. Existing randomized expiration algorithms randomly sampl... 详细信息
来源: 评论
A Comparative Study of Relational database and key-value database for Big Data Applications
A Comparative Study of Relational Database and Key-Value Dat...
收藏 引用
International Electrical Engineering Congress (iEECON)
作者: Puangsaijai, Wittawat Puntheeranurak, Sutheera King Mongkuts Inst Technol Ladkrabang Fac Engn Bangkok Thailand
Nowadays, Demands of web scale are in increasing and growing rapidly. Mobile applications, web technologies, social media always generates unstructured data that had lead to the advent of various NoSQL databases. Ther... 详细信息
来源: 评论
A key-value Based Approach to Scalable Graph database  34th
A Key-Value Based Approach to Scalable Graph Database
收藏 引用
34th International Conference on database and Expert Systems Applications (DEXA)
作者: Zhao, Zihao Hu, Chuan Shen, Zhihong Mao, Along Ren, Hao Chinese Acad Sci Comp Network Informat Ctr Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China
An increasing number of applications are modeling data as property graphs. In various scenarios, the scale of data can differ significantly, ranging from thousands of nodes/relationships to tens of billions of nodes/r... 详细信息
来源: 评论
Agent-Based Fault-Tolerance Mechanism for Distributed key-value database
Agent-Based Fault-Tolerance Mechanism for Distributed Key-Va...
收藏 引用
5th International Conference on Digital Home (ICDH)
作者: Wu Hui-Jun Lu Kai Li Gen Jiang Jin-Fei Wang Shuang-Xi Natl Univ Def Technol Sci & Technol Parallel & Distributed Proc Lab Changsha Hunan Peoples R China
Distributed key-value database is widely used in Web 2.0 applications and cloud computing environments. It overcomes the weak performance and bad scalability of traditional relational database. But fault in distribute... 详细信息
来源: 评论
Spatio-Temporal keyword Query Processing Based on key-value Stores
收藏 引用
DATA SCIENCE AND ENGINEERING 2025年 第1期10卷 98-116页
作者: Li, Ruiyuan He, Xiang Sun, Yingying Jiang, Jun Shang, You Li, Guanyao Chen, Chao Chongqing Univ Coll Comp Sci Chongqing Peoples R China Chongqing Univ Start Spatio Temporal Art Lab Chongqing Peoples R China Chongqing City Vocat Coll Chongqing Peoples R China Guangzhou Urban Planning & Design Survey Res Inst Guangzhou Peoples R China
With the popularity of mobile devices and the development of location technology, there is an increasing amount of text data with spatial and temporal tags generated. Querying with spatial, temporal, and keyword const... 详细信息
来源: 评论
A systematic literature review of authorization and access control requirements and current state of the art for different database models
收藏 引用
INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS 2024年 第1期20卷 1-23页
作者: Mohamed, Aya Khaled Youssef Sayed Auer, Dagmar Hofer, Daniel Kueng, Josef Johannes Kepler Univ Linz Inst Applicat Oriented Knowledge Proc FAW Linz Austria Johannes Kepler Univ Linz Linz Inst Technol LIT Secure & Correct Syst Lab Linz Austria
PurposeData protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical ... 详细信息
来源: 评论
LayerBF: A Space Allocation Policy for Bloom Filter in LSM-Tree  7th
LayerBF: A Space Allocation Policy for Bloom Filter in LSM-T...
收藏 引用
7th Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) International Joint Conference on Web and Big Data
作者: Li, Jiaoyang Fan, Zhixin Yue, Yinliang Yao, Zekun Liu, Jinzhou Zhou, Jiang Univ Chinese Acad Sci Sch Cyberspace Secur Beijing Peoples R China Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Zhongguancun Lab Beijing 100080 Peoples R China
LSM-Tree based key-value stores commonly suffer from the issue of read amplification, as the retrieval of a particular key typically requires examination of multiple layers of SSTables. To enhance query performance, a... 详细信息
来源: 评论
A Free-Space Adaptive Runtime Zone-Reset Algorithm for Enhanced ZNS Efficiency  23
A Free-Space Adaptive Runtime Zone-Reset Algorithm for Enhan...
收藏 引用
15th ACM Workshop on Hot Topics in Storage and File Systems (HotStorage)
作者: Byeon, Sungjin Ro, Joseph Jamil, Safdar Kang, Jeong-Uk Kim, Youngjae Sogang Univ Seoul South Korea Samsung Elect Co Suwon South Korea
While the state-of-the-art runtime zone-reset algorithm of the ZenFS in RocksDB is optimized for the performance of Zone Namespace (ZNS) SSDs, it does not take into account the lifetime constraint of ZNS SSDs. To addr... 详细信息
来源: 评论