2020
DOI: 10.1007/s00607-020-00804-x
|View full text |Cite
|
Sign up to set email alerts
|

Strategies for array data retrieval from a relational back-end based on access patterns

Abstract: Multidimensional numeric arrays are often serialized to binary formats for efficient storage and processing. These representations can be stored as binary objects in existing relational database management systems. To minimize data transfer overhead when arrays are large and only parts of arrays are accessed, it is favorable to split these arrays into separately stored chunks. We process queries expressed in an extended graph query language SPARQL, treating arrays as node values and having syntax for specifyin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Despite its low similarity, this transitivity has more limitations than standard recognition techniques, allowing the disrupted signal to be detected well under fuzzy constraints. Information entropy has been extensively employed in cluster analysis, outlier identification, uncertainty measurement, and so on as an efficient measurement technique [13]. e information entropy within and between classes is used to measure the importance of each attribute in the clustering process.…”
Section: Trust Probability Evaluation Algorithm For Cluster Analysis ...mentioning
confidence: 99%
“…Despite its low similarity, this transitivity has more limitations than standard recognition techniques, allowing the disrupted signal to be detected well under fuzzy constraints. Information entropy has been extensively employed in cluster analysis, outlier identification, uncertainty measurement, and so on as an efficient measurement technique [13]. e information entropy within and between classes is used to measure the importance of each attribute in the clustering process.…”
Section: Trust Probability Evaluation Algorithm For Cluster Analysis ...mentioning
confidence: 99%
“…6 The alternative is using LLVM directly for generating LLVM IR. Using the NVPTX 7 backend, we can generate PTX, which can be run on the GPU. This is the approach we can take to reuse the Umbra IR to LLVM IR backend to have a highlevel API for our code generation.…”
Section: Llvm Nvptx Interfacementioning
confidence: 99%
“…Published by Francis Academic Press, UK -66-into the blockchain technology framework by Ethereum platform that mobile network big data played a greater value, which also upgraded the blockchain from the 1.0 era to the 2.0 era [6]. The application concept of mobile network big data in blockchain is that it is effectively realized with the help of blockchain architecture, which has the characteristics of decentralization and distrust, and has an executable environment, as shown in the figure 1.…”
Section: Mobile Network Big Data Privacy Feature Recognitionmentioning
confidence: 99%