1987
DOI: 10.1109/mc.1987.1663506
|View full text |Cite
|
Sign up to set email alerts
|

Computer Architecture for a Surrogate File to a Very Large Data/Knowledge Base

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

1988
1988
1996
1996

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(7 citation statements)
references
References 9 publications
0
6
0
1
Order By: Relevance
“…The first is that under optimal design, half of the bits in the record signature should be set to "1" (maximizing the entropy of the signature). The second corollary is that the logarithm of Fa is asymptotically linear on the signature size F. Both of the above observations hold for any SC scheme studied up to now [2], [32], [10].…”
Section: Discussionmentioning
confidence: 79%
“…The first is that under optimal design, half of the bits in the record signature should be set to "1" (maximizing the entropy of the signature). The second corollary is that the logarithm of Fa is asymptotically linear on the signature size F. Both of the above observations hold for any SC scheme studied up to now [2], [32], [10].…”
Section: Discussionmentioning
confidence: 79%
“…When the database is static and most queries are based on few keys, an inverted index would be the best indexing scheme. On the other hand, when the database is to be frequently updated, and partial match queries based on a number of key values are common, surrogate files [BER87] and most dynamic multidimensional file structures can provide better performance in retrieval and update over other schemes.…”
Section: Text and Formatted Datamentioning
confidence: 99%
“…In our system development, the effect of changing the underlying database management system will be minimized so that various database management constructs can be exploited. We also plan to develop a high speed file access method based on surrogate files [BER87] for multimedia applications.…”
Section: Database Managementmentioning
confidence: 99%
“…Since a partition contains signatures of the same key, we use K,,,, to refer to the key of the partition Mj and 12 to denote the length of a key. More precisely, (2) Note that only Si is stored in the partition. The original signature can be constructed from Si and KMi.…”
Section: Signature File Partitioningmentioning
confidence: 99%