In this paper, ONS (Object Naming System) architecture is studied, and the necessity of high performance RFID code resolving service is discussed. Then, ONS distributed network architecture is proposed, along with ONS...
详细信息
ISBN:
(纸本)9780769540207
In this paper, ONS (Object Naming System) architecture is studied, and the necessity of high performance RFID code resolving service is discussed. Then, ONS distributed network architecture is proposed, along with ONS-based distributed database, synchronous query, storage and calculation using ID as a primary key. High performance RFID coding resolving service system is designed and implemented. The simulation is done for the testing. The experimental results show that our model gained significant performance improvement and achieved millisecond-level time-consuming in resolution.
Indexing virtually integrated distributed, heterogeneous and defragmented resources is a serious challenge that so far was not even considered in the database literature. However, it is difficult to imagine that very ...
详细信息
ISBN:
(纸本)9783642176432
Indexing virtually integrated distributed, heterogeneous and defragmented resources is a serious challenge that so far was not even considered in the database literature. However, it is difficult to imagine that very large integrated resources (millions or billions of objects) can be processed without indexes. This paper presents the pioneering approach to solve the problem. Our idea is based on SBQL object-oriented virtual updatable views that are implemented in the ODRA system. SBQL views have full algorithmic power concerning mapping of stored objects into virtual ones and full algorithmic power in mapping updates addressing virtual objects into updates of stored objects. An important concept that allows to achieve that is called virtual identifier. Virtual identifiers can be used as non-key values in indexes. Because an integrator of distributed, heterogeneous and defragmented resources can be implemented as an SBQL view, it is possible to use its virtual identifiers to create any indexes addressing such resources. The paper presents the motivation for the research, explains the idea of SBQL views and presents the idea of such an index.
first, we introduce the design principles of the function of Tianjin earthquake precursor network running monitoring software;second, we have developed the software by using the precursor instrument communication tech...
详细信息
ISBN:
(纸本)9781424437092
first, we introduce the design principles of the function of Tianjin earthquake precursor network running monitoring software;second, we have developed the software by using the precursor instrument communication technology, the distributed database read-write technology and data quality monitoring methods. The software regularly and automatically monitor network equipment status, data report situation, and abnormal data. It achieves the automatic detection and alarm function for the precursor instruments and observation data. The application of the software improves data quality and work efficiency.
This paper proposes to use a single unique global identity for every entity especially mankind, used for multiple purposes requiring only one IPv6 address to identify the entity. The IPv6 address assigned to a human e...
详细信息
ISBN:
(纸本)9781424455379
This paper proposes to use a single unique global identity for every entity especially mankind, used for multiple purposes requiring only one IPv6 address to identify the entity. The IPv6 address assigned to a human entity can be used to identify the individual and coupled with the individuals biometric identity can access to the individuals records in a file stored in a distributed server. The IPv6 address assigned to an individual can be used to identify an individual, access an individuals personal record, medical record, locate the individual, communicate with the individual, perform transactions such as banking, debit or credit cards facilities, income tax, employment provident fund, pension, driving license, etc in a controlled manner.
Most of the previous studies concerning checking the integrity constraints in distributed database derive simplified forms of the initial integrity constraints with the sufficiency property, since the sufficient test ...
详细信息
Most of the previous studies concerning checking the integrity constraints in distributed database derive simplified forms of the initial integrity constraints with the sufficiency property, since the sufficient test is known to be cheaper than the complete test and its initial integrity constraint as it involves less data to be transferred across the network and can always be evaluated at the target site (single site). Their studies are limited as they depend strictly on the assumption that an update operation will be executed at a site where the relation specified in the update operation is located, which is not always true. Hence, the sufficient test, which is proven to be local test by previous study, is no longer appropriate. This paper proposes an approach to checking integrity constraints in a distributed database by utilizing as much as possible the local information stored at the target site. The proposed approach derives support tests as an alternative to the existing complete and sufficient tests proposed by previous researchers with the intention to increase the number of local checking regardless the location of the submitted update operation. Several analyses have been performed to evaluate the proposed approach, and the results show that support tests can benefit the distributed database, where local constraint checking can be achieved.
We address the problems of Privacy-Preserving Duplicate Tuple Matching (PPDTM) and Privacy-Preserving Threshold Attributes Matching (PPTAM) in the scenario of a horizontally partitioned database among N parties, where...
详细信息
We address the problems of Privacy-Preserving Duplicate Tuple Matching (PPDTM) and Privacy-Preserving Threshold Attributes Matching (PPTAM) in the scenario of a horizontally partitioned database among N parties, where each patty holds a private share of the database's tuples and all tuples have the same set of attributes. In PPDTM, each party determines whether its tuples have any duplicate on other parties' private databases. In PPTAM, each party determines whether all attribute values of each tuple appear at least a threshold number of times in the attribute unions. We propose protocols for the two problems using additive homomorphic cryptosystem based on the subgroup membership assumption, e.g., Paillier's and EIGamal's schemes. By analysis on the total numbers of modular exponentiations, modular multiplications and communication bits, with a reduced computation cost which dominates the total cost, by trading off communication cost, our PPDTM protocol for the semihonest model is superior to the solution derivable from existing techniques in total cost. Our PPTAM protocol is superior in both computation and communication costs. The efficiency improvements are achieved mainly by using random numbers instead of random polynomials as existing techniques for perturbation, without causing successful attacks by polynomial interpolations. We also give detailed constructions on the required zero-knowledge proofs and extend our two protocols to the malicious model, which were previously unknown.
In this paper we consider the problem of recovery from committed malicious transactions in distributed databases. We define several useful dependency relations among transactions and based on them present an online re...
详细信息
ISBN:
(纸本)9780769525778
In this paper we consider the problem of recovery from committed malicious transactions in distributed databases. We define several useful dependency relations among transactions and based on them present an online recovery scheme for restoring the consistency of a database.
There were some traditional algorithms for mining global frequent itemsets. Most of them adopted Apriori-like algorithm frameworks. This resulted a lot of candidate itemsets, frequent database scans and heavy communic...
详细信息
ISBN:
(纸本)3540362975
There were some traditional algorithms for mining global frequent itemsets. Most of them adopted Apriori-like algorithm frameworks. This resulted a lot of candidate itemsets, frequent database scans and heavy communication traffic. To solve these problems, this paper proposes a fast algorithm for mining global frequent itemsets, namely the FMGFI algorithm. It can easily get the global frequency for any itemsets from the local FP-tree and require far less communication traffic by the searching strategies of top-down and bottom-up. It effectively reduces existing problems of most algorithms for mining global frequent itemsets. Theoretical analysis and experimental results suggest that the FMGFI algorithm is fast and effective.
"Digitally connected enterprises" refers to e-business, global supply chains, and other new business designs of the Knowledge Economy;all of which require open and scalable information supply chains across i...
详细信息
"Digitally connected enterprises" refers to e-business, global supply chains, and other new business designs of the Knowledge Economy;all of which require open and scalable information supply chains across independent enterprises. Connecting proprietarily designed and controlled enterprise databases in these information supply chains is a critical success factor for them. Previous connection designs tend to rely on "hard-coded" regimes, which do not respond well to disruptions (including changes and failures), and do not afford these enterprises sufficient flexibility to join simultaneously in multiple supply chain regimes and share information for the benefit of all. The paper develops a new design: It combines matchmaking with global database query, and thereby supports the interoperation of independent databases to form on-demand information supply chains. The design provides flexible (re) configuration to decrease the impact of disruption, and proactive control to increase collaboration and information sharing. More broadly, the papers results contribute to a new Information System design method for massively extended enterprises, and facilitate new business designs using digital connections at the level of databases.
This paper proposes to use a single unique global identity for every entity especially mankind,used for multiple purposes requiring only one IPv6 address to identify the *** IPv6 address assigned to a human entity can...
详细信息
This paper proposes to use a single unique global identity for every entity especially mankind,used for multiple purposes requiring only one IPv6 address to identify the *** IPv6 address assigned to a human entity can be used to identify the individual and coupled with the individuals biometric identity can access to the individuals records in a file stored in a distributed *** IPv6 address assigned to an individual can be used to identify an individual,access an individuals personal record,medical record,locate the individual,communicate with the individual,perform transactions such as banking,debit or credit cards facilities,income tax,employment provident fund,pension,driving license,etc in a controlled manner.
暂无评论