Managing Multiuser Database Buffers Using Data Mining Techniques

被引:2
|
作者
Feng, Ling [1 ]
Lu, Hongjun [2 ]
机构
[1] Univ Twente, Dept Comp Sci, Database Grp, NL-7500 AE Enschede, Netherlands
[2] Hong Kong Univ Sci & Technol, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
Multiuser database systems; Placement; Replacement; Prefetch; Data mining;
D O I
10.1007/s10115-003-0114-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a data-mining-based approach to public buffer management for a multiuser database system, where database buffers are organized into two areas - public and private. While the private buffer areas contain pages to be updated by particular users, the public buffer area contains pages shared among different users. Unlike traditional buffer management strategies where limited knowledge of user access patterns is used, the proposed approach discovers knowledge from page access sequences of user transactions and uses it to guide public buffer placement and replacement. A prefetch strategy is exploited based on the discovered page access knowledge. In practice, to make such a data-mining-based buffer management approach tractable, we present a soft variation to approximate our absolute best buffer replacement solution. The knowledge to be discovered and the discovery methods are discussed in the paper. The effectiveness of the proposed approach was investigated through a simulation study. The results indicate that with the help of the discovered knowledge, the public buffer hit ratio can be improved significantly, while the added computational complexity, compared to the achievement in buffer hit ratio, is less. In some situations, the time cost of the data-mining-based buffer management policy is even lower than that of the simplest buffer management policy.
引用
收藏
页码:679 / 709
页数:31
相关论文
共 50 条
  • [31] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [32] Garment Categorization Using Data Mining Techniques
    Jain, Sheenam
    Kumar, Vijay
    SYMMETRY-BASEL, 2020, 12 (06):
  • [33] Detecting trojans using data mining techniques
    University of Central Florida, United States
    Commun. Comput. Info. Sci., (400-411):
  • [34] Classification of Wines Using Data Mining Techniques
    Ribeiro, Jorge
    Neves, Jose
    Sanchez, Juan
    NOVAS PERSPECTIVAS EM SISTEMAS E TECNOLOGIAS DE INFORMACAO, VOL II, 2007, : 183 - 191
  • [35] Classification of Anemia Using Data Mining Techniques
    Sanap, Shilpa A.
    Nagori, Meghana
    Kshirsagar, Vivek
    SWARM, EVOLUTIONARY, AND MEMETIC COMPUTING, PT II, 2011, 7077 : 113 - +
  • [36] Mining multidimensional data using clustering techniques
    Pagani, Marco
    Bordogna, Gloria
    Valle, Massimiliano
    DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 382 - +
  • [37] Predicting IT Employability Using Data Mining Techniques
    Piad, Keno C.
    Dumlao, Menchita
    Ballera, Melvin A.
    Ambat, Shaneth C.
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 26 - 30
  • [38] Retrieval of images using data mining techniques
    Joseph, Neethu C.
    Wilson, Aswathy
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 204 - 208
  • [39] Using data mining techniques in higher education
    Susnea, Elena
    ICVL 2009 - PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON VIRTUAL LEARNING, 2009, : 371 - 375
  • [40] Earthquakes classification using data mining techniques
    Rodriguez-Elizalde, J
    Figueroa-Nazuno, J
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTING TECHNIQUES, 2004, : 257 - 261