MLIP: A Concurrent Approach for Clipping Indexing
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 12
Abstract
Multidimensional databases are beginning to be used in a wide range of applications. To meet this fast-growing demand, the R-tree family is being applied to support fast access to multidimensional data, for which the R+-tree exhibits outstanding search performance. In order to support efficient concurrent access in multi-user environments, concurrency control mechanisms for multidimensional indexing have been proposed. However, these mechanisms cannot be directly applied to the R+-tree because an object in the R+-tree may be indexed in multiple leaves. This paper proposes a concurrency control protocol for R-tree variants with object clipping, namely, Micro level Locking for clIPping indexing (MLIP). MLIP is the first concurrency control approach specifically designed for the R+-tree and its variants, and it supports efficient concurrent operations with serializable isolation, consistency, and deadlock-free. Experimental tests on both real and synthetic data sets validated the effectiveness and efficiency of the proposed concurrent access framework.
Authors and Affiliations
Majoju Ravinder , R. Vijay Prakash
Efficient Global Programming Model for Discriminant Analysis
Conventional statistical analysis includes the capacity to systematically assign individuals to groups. We suggest alternative assignment procedures, utilizing a set of interrelated goal programming formulations. This pa...
Spectrum Sharing in a Long Term Spectrum Strategy via Cognitive Radio for Heterogeneous Wireless Networks
In this paper, Spectrum sharing technique among service providers to share the licensed spectrum of the licensed service providers for Heterogeneous wireless networks in a dynamic manner is proposed. Here, we could analy...
Justified Cross-Site Scripting Attacks Prevention from Client-Side
Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at an frightening rate. Web apps frequently make JavaScrip...
ROBOT NAVIGATION USING IMAGE PROCESSING AND ISOLATED WORD RECOGNITION
In this paper, a practical implementation of image processing and isolated word recognition has been explained. A modeled vehicle has been driven autonomously on the road and can navigate on a road on its own, stop at ze...
QoS Analysis of the Integrated UMTS and WLAN Ad Hoc Network in different Security Schemes with Wormhole Attack under large Scalability for CBR Voice Interactive Traffic
The selection of security schemes against Wormhole Attack (WHA) in next generation heterogeneous networks is based on major factors: authentication, confidentiality, and integrity and data availability. The effect of thi...