Access Methods
نویسندگان
چکیده
We are witnessing a tremendous growth in the size of the data gathered, stored, and processed by various kinds of information systems. Therefore, no matter how big memories become, there is always the need to store data in secondary or even tertiary storage to facilitate access. Even if the data set can fit in main memory, there is still a need to organize data to enable efficient processing. In this chapter, we discuss the most important issues related to the design of efficient access methods (i.e., indexing schemes), which are the fundamental tools in database systems for efficient query processing. For the rest of the discussion, we are going to use the terms access method and index interchangeably. Take, for example, a large data set containing information about millions of astronomical objects (e.g., stars, planets, comets). An astronomer may require some information out of this data set. Therefore, the most natural way to proceed is to store the data set in a database management system (DBMS) in order to enjoy SQL-like query formulation. For example, a possible query in natural language is: “show me all stars which are at most 1000 light-years away from the sun.” To answer such a query efficiently, one should avoid the exhaustive examination of the whole data set. Otherwise, the execution of each query will occupy the system for a long period of time, which is not practical and leads to performance degradation. For the rest of the discussion, we are mainly interested in disk-based access methods, where the data set as well as the auxiliary data structures to facilitate access reside on magnetic disks. The challenge in this case is to perform as few disk accesses as possible, because each random access to the disk (i.e., reading or writing a block) costs about 5–8 ms, which is significantly slower than processing in main memory. Moreover, we assume that our data are represented by records of the form , 10
منابع مشابه
An automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملFaculty Members' Informational Needs and their Methods of Access to information in Isfahan University of Medicals Sciences
Introduction: Faculty members' needs to information and their awareness towards these needs, is of special importance. So that, this study was performed to determine the priority of faculty members' informational needs and their method of access to information in order to improve the efficacy and the procedures of supply, collection, and organization of information in informatics centers and li...
متن کاملبررسی میزان آشنایی و نگرش اعضای هیات علمی نسبت به جنبش دسترسی آزاد به اطلاعات علمی در دانشگاه علوم پزشکی تهران
Background and Aim: Open access to scientific information is a new paradigm in scientific communication that facilitates access to research. This study was carried out to identify Tehran University of medical science faculties members’ familiarities with Open access and to survey their attitude about it. Materials and Methods: A descriptive survey method was applied. The study population consis...
متن کاملA Study of the Application of Geographic Information Systems (GIS) in Children Access to Pharmacies: A Case Study of Kermanshah, West of Iran
Background Adequate access to health services has tremendous effects on the usefulness and efficiency of health care. Therefore, this study aimed to investigate the access of girls under the age of 14 years old to pharmacies in Kermanshah, Iran. Materials and Methods In this cross-sectional study, the access of Results In terms of access to 25 pharmacies through walking, the findings revealed ...
متن کاملبررسی عدالت در سلامت با ارزیابی دسترسی شهروندان به مراکز بهداشتی- درمانی با استفاده از سیستم اطلاعات جغرافیایی (GIS) (مطالعه موردی شهر کرمانشاه)
Abstract Background and purpose: One of the main factors in establishing health equity is delivering equal spatial access to public medical cares to all members in a society. The aim of this study was to evaluate equity in health by assessing people's access to health care centers using Geographic Information System (GIS) in Kermanshah (west of Iran). Material and methods: In this descript...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014