2011
DOI: 10.4304/jsw.6.9.1655-1663
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing Large Query by Simulated Annealing Algorithm Based On Graph-Based Approach

Abstract:

In general the ordering of join-operations is quite sensitive and has a devastatingly negative effect on the efficiency of the DBMS.  Scheufele and Moerkotte proved that join-ordering is NP-complete in the general case [1]. The dynamic programming algorithm has a worst case running time, thus for queries with more than 10 joins, it becomes infeasible. To resolve this problem, random strategies are used.  Simulated annealing is an intelligent algorithm of developing very fast. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…A Simulated Annealing Based On Graph-Based Approach was proposed for Optimizing Large Query by Chen et al 37 This method is a probabilistic algorithm, suitable for optimization problems that involve large solution spaces. Each solution shows a state in the search space, and each state has an associated cost.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A Simulated Annealing Based On Graph-Based Approach was proposed for Optimizing Large Query by Chen et al 37 This method is a probabilistic algorithm, suitable for optimization problems that involve large solution spaces. Each solution shows a state in the search space, and each state has an associated cost.…”
Section: Related Workmentioning
confidence: 99%
“…Each state represents a various algebraic expression for the query answer. The cost of the state is the total cost of the operation in 37 Proposing a random-search •Low cost •Dependent on the technique which exploits an •Better quality query cost function and the analogy between the way in •Avoiding getting neighbor function which a metal cools and stuck at the local used in it freezes into a minimum minimal •Deficiency resulted by energy crystalline structure the transformation of the and the search for a state minimum in a more…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we adopt attack graph to assess the overall security risk of networks. With the help of attack graphs, most of potential attack path from an attacker can be calculated [10]. Generally, the attack graph model is composed of three consecutive phases: information collecting, attack graph building and analyzing & visualizing.…”
Section: A Risk Assessment Modelmentioning
confidence: 99%
“…Attack graph algorithm is used to collect security information dynamically. The graph to assess the overall risk of any networks can be computed [4]. Attack route, risk index, and hostname are attained in order to quantify risk assessment at a particular 1509 network node.…”
Section: Introductionmentioning
confidence: 99%