Characterizing database user's access patterns

被引:0
|
作者
Yao, QS [1 ]
An, AJ [1 ]
机构
[1] York Univ, Dept Comp Sci, Toronto, ON M3J 1P3, Canada
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Much work has been done on characterizing the workload of a database system. Previous studies focused on providing different types of statistical summaries, and modeling the run-time behavior on the physical resource level. In this paper, we focus on characterizing the database system's workload from the view of database users. We use user access patterns to describe how a client application or a group of users accesses the data of a database system. The user access patterns include a set of user access events that represent the format of the queries and a set of user access graphs that represent the query execution orders. User access patterns can help database administrators tune the system, help database users optimize queries, and help to predict and cache future queries. In this paper, we present several approaches to using user access patterns to improve system performance, and report some experimental results.
引用
收藏
页码:528 / 538
页数:11
相关论文
共 50 条
  • [1] Mining and modeling database user access patterns
    Yao, Qingsong
    An, Aijun
    Huang, Xiangji
    FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2006, 4203 : 493 - 503
  • [2] Characterizing User Access Behaviors in Mobile TV System
    Li, Yuheng
    Zhang, Yiping
    Yuan, Ruixi
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012, : 2093 - 2097
  • [3] Characterizing sequences of user actions for access logs analysis
    Draier, T
    Gallinari, P
    USER MODELING 2001, PROCEEDINGS, 2001, 2109 : 228 - 230
  • [4] Characterizing user access to videos on the world wide web
    Acharya, S
    Smith, B
    Parnes, P
    MULTIMEDIA COMPUTING AND NETWORKING 2000, 2000, 3969 : 130 - 141
  • [5] Anomaly detection of access patterns in database
    Roh, Jong-hyuk
    Lee, Sung-Hun
    Kim, Soohyung
    2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1112 - 1115
  • [6] Database Access and Patterns in Erlang/OTP
    Castro, Laura M.
    Gulias, Victor M.
    Abalde, Carlos
    Paris, Javier
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS, PTS I AND II: NEW ASPECTS OF APPLIED INFORMATICS AND COMMUNICATIONS, 2008, : 73 - +
  • [7] VIEWDATA SYSTEMS - DESIGNING A DATABASE FOR EFFECTIVE USER ACCESS
    WILLIAMSON, NJ
    CANADIAN JOURNAL OF INFORMATION SCIENCE-REVUE CANADIENNE DES SCIENCES DE L INFORMATION, 1981, 6 (JUN): : 1 - 14
  • [8] Characterizing Video Access Patterns in Mainstream Media Portals
    Miranda, Lucas C. O.
    Santos, Rodrygo L. T.
    Laender, Alberto H. F.
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), 2013, : 1085 - 1092
  • [9] Characterizing Service Access Patterns under Heterogeneous Clients
    Zheng, Shuyu
    Lin, Fuqi
    Lu, Xuan
    Yang, Yulian
    Deng, Hongfei
    Zhang, Jun
    Ma, Yun
    Liu, Xuanzhe
    2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2020), 2020, : 57 - 59
  • [10] Detecting Intruders by User File Access Patterns
    Huang, Shou-Hsuan S.
    Cao, Zechun
    Raines, Calvin E.
    Yang, Mai N.
    Simon, Camille
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 320 - 335