請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/44283
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 郭大維 教授 | |
dc.contributor.author | Rong-Jhang Liao | en |
dc.contributor.author | 廖容章 | zh_TW |
dc.date.accessioned | 2021-06-15T02:48:52Z | - |
dc.date.available | 2012-08-12 | |
dc.date.copyright | 2009-08-12 | |
dc.date.issued | 2009 | |
dc.date.submitted | 2009-08-06 | |
dc.identifier.citation | [1] K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless
Smart Cards and Identification. New York, NY, USA: JohnWiley & Sons, Inc., 2003. [2] S. E. Sarma, S. A. Weis, and D. W. Engels, “RFID Systems and Security and Privacy Implications,” inWorkshop on Cryptographic Hardware and Embedded Systems, vol. 2523 of Lecture Notes in Computer Science, pp. 454–470, 2002. [3] L. Satpathy and A. P.Mathew, “Rfid assistance system for faster book search in public libraries,” in CHI ’06: CHI ’06 extended abstracts on Human factors in computing systems, (New York, NY, USA), pp. 1289– 1294, ACM, 2006. [4] K.M. Zuberi and K. G. Shin, “An efficient semaphore implementation scheme for small-memory embedded systems,” in RTAS ’97: Proceedings of the 3rd IEEE Real-Time Technology and Applications Symposium (RTAS ’97), (Washington, DC, USA), p. 25, IEEE Computer Society, 1997. [5] K. M. Zuberi and K. G. Shin, “Emeralds: A small-memory real-time microkernel,” IEEE Trans. Softw. Eng., vol. 27, no. 10, pp. 909–928, 2001. [6] G. B. I. Creus and P. Niska, “System-level power management for mobile devices,” in CIT ’07: Proceedings of the 7th IEEE International Conference on Computer and Information Technology, (Washington, DC, USA), pp. 799–804, IEEE Computer Society, 2007. [7] D. Rakhmatov and S. Vrudhula, “Energy management for batterypowered embedded systems,” Trans. on Embedded Computing Sys., vol. 2, no. 3, pp. 277–324, 2003. [8] K. Kwon, Y. Yi, D. Kim, and S. Ha, “Embedded software generation from system level specification for multi-tasking embedded systems,” in ASP-DAC ’05: Proceedings of the 2005 conference on Asia South REFERENCES 31 Pacific design automation, (New York, NY, USA), pp. 145–150, ACM, 2005. [9] N. Aaraj, S. Ravi, A. Raghunathan, and N. K. Jha, “Hybrid architectures for efficient and secure face authentication in embedded systems,” IEEE Trans. Very Large Scale Integr. Syst., vol. 15, no. 3, pp. 296– 308, 2007. [10] P. Kocher, R. Lee, G. McGraw, and A. Raghunathan, “Security as a new dimension in embedded system design,” in DAC ’04: Proceedings of the 41st annual conference on Design automation, (New York, NY, USA), pp. 753–760, ACM, 2004. Moderator-Srivaths Ravi. [11] H. Garcia-Molina and K. Salem, “Main memory database systems: An overview,” IEEE Trans. on Knowl. and Data Eng., vol. 4, no. 6, pp. 509–516, 1992. [12] “H2 database.” http://www.h2database.com/. [13] “Hsql database.” http://hsqldb.org/. [14] K.-R. Choi and K.-C. Kim, “T*-tree: a main memory database index structure for real time applications,” in RTCSA ’96: Proceedings of the Third International Workshop on Real-Time Computing Systems Application (RTCSA ’96), (Washington, DC, USA), p. 81, IEEE Computer Society, 1996. [15] T. J. Lehman, Design and performance evaluation of a main memory relational database system (t tree). PhD thesis, 1986. [16] T. J. Lehman and M. J. Carey, “A study of index structures for main memory database management systems,” in VLDB, pp. 294–303, 1986. [17] H. Lu, Y. Y. Ng, and Z. Tian, “T-tree or b-tree: Main memory database index structure revisited,” in Australasian Database Conference, pp. 65– 73, 2000. [18] T. A. Mueck and M. L. Polaschek, Index Data Structures in Object- Oriented Databases. Norwell,MA, USA: Kluwer Academic Publishers, 1997. [19] Y. Chen and Y. Chen, “Signature file hierarchies and signature graphs: a new index method for object-oriented databases,” in SAC ’04: Proceedings of the 2004 ACM symposium on Applied computing, (New York, NY, USA), pp. 724–728, ACM, 2004. REFERENCES 32 [20] W. Lee and D. Lee, “Signature file methods for indexing objectoriented database systems,” in Proceedings of the 2nd International Computer Science Conference, 1992. [21] I. E. Shanthi, Y. Izaaz, and R. Nadarajan, “On the sd-tree construction for optimal signature operations,” in Compute ’08: Proceedings of the 1st Bangalore annual Compute conference, (New York, NY, USA), pp. 1– 8, ACM, 2008. [22] U. Deppisch, “S-tree: a dynamic balanced signature index for office retrieval,” in SIGIR ’86: Proceedings of the 9th annual international ACM SIGIR conference on Research and development in information retrieval, (New York, NY, USA), pp. 77–87, ACM, 1986. [23] E. Tousidou, P. Bozanis, and Y. Manolopoulos, “Signature-based structures for objects with set-valued attributes,” Inf. Syst., vol. 27, no. 2, pp. 93–121, 2002. [24] E. Tousidou, A.Nanopoulos, and Y.Manolopoulos, “Improvedmethods for signature-tree construction,” Comput. J., vol. 43, no. 4, pp. 300– 313, 2000. [25] D. Dervos, Y. Manolopoulos, and P. Linardis, “Comparison of signature filemodels with superimposed coding,” Inf. Process. Lett., vol. 65, no. 2, pp. 101–106, 1998. [26] C. Faloutsos, “Access methods for text,” ACM Comput. Surv., vol. 17, no. 1, pp. 49–74, 1985. [27] C. Faloutsos, “Signature files,” pp. 44–65, 1992. [28] H. Lieberman and C. Hewitt, “A real-time garbage collector based on the lifetimes of objects,” Commun. ACM, vol. 26, no. 6, pp. 419–429, 1983. [29] C.-T. Lo, M. Chang, O. Frieder, and D. Grossman, “The object behavior of java object-oriented database management systems,” pp. 247– 252, April 2002. [30] “Jvmti.” http://java.sun.com/javase/6/docs/technotes/guides/jvmti/. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/44283 | - |
dc.description.abstract | 具規模的無線射頻識別系統在後端的資料處理常常需要高效的資料庫系統,本研究即源於這些對有效率的主記憶體資料庫索引結構的強烈需求。本研究提出了一個以簽章為基礎的網格索引結構來獲取有效率的資料搜尋及儲存能力。基於已知的應用程式知識,我們也提出了有效率的方法來辨識出重覆的插入資料和執行批次刪除,範圍搜尋等動作。這些方法都已實作在開放原始碼的主記憶體資料庫- H2,且使用真實的無線射頻識別系統工作數據來測試。 | zh_TW |
dc.description.abstract | A large-scaled RFID application often needs a highly efficient database system in data processing. This research is motivated by the strong demand of an efficient index structure design for main-memory database systems of RFID applications. In this paper, a signature-based grid index structure is proposed for efficient data queries and storage. An efficient methodology is proposed to locate duplicates and to execute batch deletions and range queries based on application domain knowhow. The capability of the design is implemented in an open source main-memory database system H2 and evaluated by realistic workloads of RFID applications. | en |
dc.description.provenance | Made available in DSpace on 2021-06-15T02:48:52Z (GMT). No. of bitstreams: 1 ntu-98-R96922121-1.pdf: 689256 bytes, checksum: 00acfb8f3ac18efedf94950b454553c3 (MD5) Previous issue date: 2009 | en |
dc.description.tableofcontents | Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Chapter 2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Chapter 3 The Signature-based Grid Index . . . . . . . . . . . . . . 11 3.1 The Grid-Index Structure . . . . . . . . . . . . . . . . . . . . . 11 3.2 Signature-based Operations . . . . . . . . . . . . . . . . . . . 13 3.3 Java-Related Object Management . . . . . . . . . . . . . . . . 19 Chapter 4 Performance Evaluation . . . . . . . . . . . . . . . . . . . 22 4.1 Experimental Setup . . . . . . . . . . . . . . . . . . . . . . . . 22 4.2 Performance and Overhead Evaluation . . . . . . . . . . . . 24 Chapter 5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 29 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 | |
dc.language.iso | en | |
dc.title | 主記憶體資料庫上之簽章為基礎的網格索引設計 | zh_TW |
dc.title | A signature-based Grid Index Design for Main-Memory Databases | en |
dc.type | Thesis | |
dc.date.schoolyear | 97-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 李政崑 教授,石維寬 教授,施吉昇 副教授,洪士灝 助教授 | |
dc.subject.keyword | 主記憶體,資料庫,索引,嵌入式系統,簽章,無線射頻識別系統, | zh_TW |
dc.subject.keyword | Main Memory,Database,Index,Embedded System,Signature,RFID, | en |
dc.relation.page | 32 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2009-08-06 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-98-1.pdf 目前未授權公開取用 | 673.1 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。