Data Management

Big Data, Hadoop, and analytics help unearth valuable patterns in business information. But without proper management, backup, archiving, and protection, you're taking an unacceptable risk.

  • White Papers // Jul 2011

    Multi-Episodic Dependability Assessments for Large-Scale Networks

    As a network infrastructure expands in size, the number of concurrent outages can be expected to grow in frequency. The purpose of this paper is to investigate through simulation the characteristics of concurrent network outages and how they impact network operators' perspective of network dependability. The dependability investigated includes network...

    Provided By IARIA

  • White Papers // Jul 2011

    Frequent Patterns Mining over Data Stream Using an Efficient Tree Structure

    Mining frequent patterns over data streams is an interesting problem due to its wide application area. In this paper, a novel method for sliding window frequent patterns mining over data streams is proposed. This method utilizes a compressed and memory efficient tree data structure to store and to maintain sliding...

    Provided By Shiraz Technologies

  • Case Studies // Jul 2011

    Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing

    This Case Study examines how paper manufacturer Mohawk Fine Papers uses cloud services brokerage Liaison Technologies' service to help access trading partners and simplify the adoption of cloud computing. The research provides useful lessons for combining traditional e-commerce with cloud computing.

    Provided By Liaison Technologies

  • White Papers // Jul 2011

    Approximating Constraint Propagation in Datalog

    The authors present a technique exploiting Datalog with aggregates to improve the performance of programs with arithmetic (in)equalities. Their approach employs a source-to-source program transformation which approximates the propagation technique from Constraint Programming. The experimental evaluation of the approach shows good run time speedups on a range of non-recursive as...

    Provided By University of Perugia

  • White Papers // Jul 2011

    Posit: An Adaptive Framework for Lightweight IP Geolocation

    Location-specific Internet services are predicated on the ability to identify the geographic position of IP hosts accurately. Fundamental to prior geolocation techniques is their reliance on landmarks with known coordinates whose distance from target hosts is intrinsically tied to the ability to make accurate location estimates. In this paper, the...

    Provided By Boston University

  • Case Studies // Jul 2011

    Warba Insurance: Kuwait-Based Insurance Firm Saves Around U.S.$3 Million With New Database Solution

    Warba Insurance wanted to support employees more effectively by updating the IT infrastructure. One of its goals was to roll out a new suite of FirstApex insurance applications. After detailed analysis, the company deployed a virtualized Microsoft environment - implementing Microsoft SQL Server 2008 to support its insurance solution. The...

    Provided By Microsoft

  • White Papers // Jul 2011

    Towards Holistic Multi-Tenant Monitoring for Virtual Data Centers

    Cloud computing becomes increasingly prevalent for outsourcing IT functions. The basic feature of offering virtual data center slices to customers has been in use for some time now. So far, customers only get the raw resources, with only little insight and control of their resources. But to let customers build...

    Provided By NEC Laboratories

  • White Papers // Jul 2011

    Business Protocol Monitoring

    Because it is never sure that a business process successfully tested or statistically checked will have the expected behaviour during its execution, it is necessary to bring verification to the execution phase, by continuously observing and checking the correct behaviour of business processes during run-time. In this paper, the authors...

    Provided By IARIA

  • White Papers // Jul 2011

    Data Mining Governance for Service Oriented Architecture

    In recent years, data mining has attracted a great deal of attention in the information industry, as well as in society as a whole. This is due to the wide availability of huge amounts of data and the imminent need for converting such data into useful information and knowledge. The...

    Provided By IARIA

  • White Papers // Jul 2011

    MBPR'A Business Process Repository Supporting Multi-Granularity Process Model Retrieval

    Business process repository aims at business process model discovery and reusing. However, most of current approaches for process matchmaking have the limitation that the process models should be in the same granularity, whereas a process repository with good support for multi-granularity business process retrieval is still rare. In this paper,...

    Provided By IARIA

  • White Papers // Jul 2011

    Trusted Data in IBM's Master Data Management

    A good business data model has little value if it lacks accurate, up-to-date customer data. This paper describes how data quality measures are processed and maintained in IBM InfoSphere MDM Server and IBM InfoSphere Information Server. It also introduces a notion of trust, which extends the concept of data quality...

    Provided By IARIA

  • White Papers // Jul 2011

    The Use of Data Cleansing in Mobile Devices

    Now-a-days, people utilize huge amount of data coming from a range of mobile devices under different data storage and data formats in order to make business. It is very well known that companies having useful information have better possibilities to exploited it, and make better informed decisions. Companies establishing better...

    Provided By IARIA

  • White Papers // Jul 2011

    Systems of Systems Concept in Knowledge Management

    The development of new acquisition technologies is important function of knowledge management. They are realizing via powerful computer tools such as the Internet interactive hypermedia or the Large Knowledge Collider. But except powerful tools new cognitive concepts and procedures should be synthesized for knowledge evolution. The Systems of Systems approach...

    Provided By IARIA

  • White Papers // Jul 2011

    A Field Analysis of Relational Database Schemas in Open-Source Software

    The relational schemas of 407 open-source projects storing their data in MySQL or PostgreSQL databases are investigated by querying the standard information schema, looking for various issues. These SQL queries are released as the Salix free software. As it is fully relational and relies on standards, it may be installed...

    Provided By IARIA

  • White Papers // Jul 2011

    Remote Comparison of Database Tables

    Database systems hold mission critical data in all organizations. These data are often replicated for being processed by different applications as well as for disaster recovery. In order to help handle these replications, remote sets of data must be compared to detect unwanted changes due to hardware, system, software, application,...

    Provided By IARIA

  • White Papers // Jul 2011

    An Approach for Distributed Streams Mining Using Combination of Na?ve Bayes and Decision Trees

    Now-a-days the people have various kinds of data generated at high speed in distributed environment. In many cases, it is difficult or unallowed to gather all the distributed data into a central place for processing. So the people have to perform part of the work at the location where data...

    Provided By IARIA

  • White Papers // Jul 2011

    Systems Biology Warehousing: Challenges and Strategies toward Effective Data Integration

    The rapid development of genomics, proteomics, metabolomics and structural genomics techniques have provided an unprecedented amount of data, enabling system-wide biological research. Although information integration has been well investigated in database theory research, biological data present numerous challenges from the lack of standard formats to data inconsistencies resulting from experimental...

    Provided By IARIA

  • White Papers // Jul 2011

    Studying the Impact of Partition on Data Reduction for Very Large Spatiotemporal Datasets

    Now-a-days, huge amounts of data are being collected with spatial and temporal components from sources such as metrological, satellite imagery etc. Efficient visualisation as well as discovery of useful knowledge from these datasets is therefore very challenging and becoming a massive economic need. Data Mining has emerged as the technology...

    Provided By IARIA

  • White Papers // Jul 2011

    Efficient Access to Non-Sequential Elements of a Search Tree

    This paper describes how a search tree can be extended in order to allow efficient access to predefined subsets of the stored elements. This is achieved by marking some of the elements of the search tree with marker bits. The authors show that their approach does not affect the asymptotic...

    Provided By IARIA

  • White Papers // Jul 2011

    A Workflow Platform for Simulation on Grids

    Large-scale simulation applications are becoming standard in research laboratories and in the industry. Because they involve a large variety of existing software and terabytes of data, moving around calculations and data files is not a simple avenue. This paper presents the design, implementation and deployment of a simulation platform based...

    Provided By IARIA

  • White Papers // Jul 2011

    Deploying Brocade VDX 6720 Data Center Switches with Brocade VCS in Enterprise Data Centers

    At the heart of Brocade VDX 6720 switches is Brocade Virtual Cluster Switching (VCS), a new Ethernet fabric technology that addresses the unique requirements of next-generation data center environments. Brocade VDX 6720 Data Center Switches, the first in the new Brocade VDX family, are 10 Gigabit Ethernet (GbE) line-rates, low-latency,...

    Provided By Brocade

  • White Papers // Jul 2011

    Modeling of Microsystems Production Processes for the MinaBASE Process Knowledge Database Using Semantic Technologies

    In this paper, the authors present the consolidation of a process knowledge database for knowledge-intensive production processes in the field of micro-systems technology with a workflow component. Among the requirements to be met by the workflow component are the hierarchical presentation of process chains, a close integration of the product...

    Provided By IARIA

  • White Papers // Jul 2011

    Commonsense Knowledge Acquisition Using Compositional Relational Semantics

    A method for the acquisition of commonsense knowledge based on instantiations of meta-rules is presented. The meta-rules refer to some properties and objects that have those properties. Meta-rules are instantiated by automatically identifying objects that have those properties. In order to increase the applicability of a commonsense property to objects,...

    Provided By IARIA

  • White Papers // Jul 2011

    New Fuzzy Multi-Class Method to Train SVM Classifier

    In this paper, the authors present a new classification method based on Support Vector Machine (SVM) to treat multi-class problems. In the context of multi-class problems, they have to separate large number of classes. SVM becomes an important machine learning tool to handle multi-class problems. Usually, SVM classifiers are implemented...

    Provided By IARIA

  • White Papers // Jul 2011

    MAXCLIQUE Problem Solved Using SQL

    This paper aims to show that SQL queries can be used to solve a well-known combinatorial optimization problem, the MAXimum CLIQUE Problem (MAXCLIQUE). This problem arises in many real world applications as computer vision and pattern recognition or coding theory to mention some of them. A clique of a graph...

    Provided By IARIA

  • White Papers // Jul 2011

    Exploring Statistical Information for Applications-Specific Design and Evaluation of Hybrid XML Storage

    Modern relational database management systems provide hybrid XML storage, combining relational and native technologies. Hybrid storage offers many design alternatives for XML data and in this paper the authors explore how to aid the user in effective design of hybrid storage. In particular they investigate how the XML schema and...

    Provided By IARIA

  • White Papers // Jul 2011

    Transforming XPath Expressions Into Relational Algebra Expressions with Kleene Closure

    In the problem of translating X-Path expressions into SQL queries, the most challenging part is to find a way to minimize the use of Least Fix-Point (LFP) operators when a DTD graph contains cycles. In this paper, the authors address this issue and present a new algorithm to do the...

    Provided By IARIA

  • White Papers // Jul 2011

    Large Software Component Repositories into Small Index Files

    Software component repositories have adopted semi-structured data models for representing syntactic and semantic features of handled assets. Such models imply challenges to search engines, which are related to the design of indexing techniques that ought to be efficient in terms of storage space requirements. In such a context, by applying...

    Provided By IARIA

  • White Papers // Jul 2011

    IMA: Identification of Multi-Author Student Assignment Submissions Using a Data Mining Approach

    In this paper, the authors describe a novel application of data mining techniques which can be used to identify multi-authorship contained within student submissions. They show that by regarding the pages of the submission as a set of Cascading Style Sheets, CSS type files, which they call Author Signature Styles...

    Provided By IARIA

  • White Papers // Jul 2011

    A Representation of Certain Answers for Views and Queries With Negation

    The paper is about databases content processing, namely query processing. Certain answers are very important in the study of the data complexity of the problem of answering queries using materialized views and constitute a semantics of query answers in mediated integration systems. The computing of these answers depends on database...

    Provided By IARIA

  • White Papers // Jul 2011

    Ambients of Persistent Concurrent Objects

    This paper develops a typed object-oriented paradigm equipped with message-based orthogonal persistence. Messages in this paradigm are viewed as typed objects. This view leads to a hierarchy of types of messages that belong to the core of typed reflective capabilities. Unlike most persistent object-oriented models, this model is equipped with...

    Provided By IARIA

  • White Papers // Jul 2011

    An Optimistic Transaction Model for a Disconnected Integration Architecture

    Now-a-days, Transaction Management (TM) must not only deal with short lived and flat transactions, TM must provide a transactional execution of long running and hierarchically structured business processes, so called complex transactions, involving many distributed loosely coupled, heterogeneous, and autonomous systems, represented as services as in Service Oriented Computing (SOC)...

    Provided By IARIA

  • White Papers // Jul 2011

    Merging Differential Updates in In-Memory Column Store

    To meet the performance requirements of enterprise application for both, transactional applications as well as analytical scenarios, data storage of in-memory databases are split into two parts: One optimized for reading and a write-optimized differential buffer. The read-optimized main storage together with the differential buffer for inserts provides the current...

    Provided By IARIA

  • White Papers // Jul 2011

    BPMN Requirements Specification as Narrative

    The first two phases of the software development process include a requirements analysis stage that demands conceptualization of a \"Real world domain\" and the design stage of the software product. UML-based diagrams are typically used to model systems and make them readable. In this paper, the authors view conceptualization of...

    Provided By IARIA

  • White Papers // Jul 2011

    Storage QoS Aspects in Distributed Virtualized Environments

    Storage performance of a single virtual machine in a cloud computing environment may be affected by other machines using the same physical storage. At the same time, user requirements concerning quality of service continue to increase, which brings new challenges for virtualized environments. In this paper the authors present the...

    Provided By IARIA

  • White Papers // Jul 2011

    A Grid-based Approach to Continuous Clustering of Moving Objects

    With the rapid advances in wireless devices and positioning technologies, tracking and clustering of moving objects has drawn increasing attention. Previous methods of clustering moving objects merge clusters by searching all the existing clusters, which have an obvious decline in efficiency as the number of clusters increases. This paper proposes...

    Provided By IARIA

  • White Papers // Jul 2011

    Distributed Algorithm for Traffic Data Collection and Data Quality Analysis Based on Wireless Sensor Networks

    The growing need of the real-time traffic data has spurred the deployment of large-scale dedicated monitoring infrastructure systems, which mainly consist of the use of inductive loop detectors. However, the loop sensor data is prone to be noised or even missed under harsh environment. The state-of-the-art wireless sensor networks provide...

    Provided By Hindawi Publishing

  • White Papers // Jul 2011

    A Tabu-Based Cache to Improve Range Queries on Prefix Trees

    Distributed Hash Tables (DHTs) provide the substrate to build large scale distributed applications over peer-to-peer networks. A major limitation of DHTs is that they only support exact-match queries. In order to offer range queries over a DHT it is necessary to build additional indexing structures. Prefix-based indexes, such as Prefix...

    Provided By INRIA

  • White Papers // Jul 2011

    Spatial Data Management over Flash Memory

    Flash memory has moved from being used for short-term, low-volume storage and data transfer, to becoming the primary alternative to magnetic disks for long-term, high-volume and persistent storage. The authors present desiderata for improved I/O performance of spatial data structures over flash memory and hybrid flash-magnetic storage configurations. They target...

    Provided By IBM

  • White Papers // Jul 2011

    Snake: Control Flow Distributed Software Transactional Memory

    Remote Method Invocation (RMI), Java's remote procedure call implementation, provides a mechanism for designing distributed Java technology-based applications. It allows methods to be invoked from other Java Virtual Machines (JVM), possibly at different hosts. RMI uses lock-based concurrency control, which suffers from distributed deadlocks, live-locks, and scalability and composability challenges....

    Provided By Virginia Systems