Characterizing database user's access patterns

被引:0
|
作者
Yao, QS [1 ]
An, AJ [1 ]
机构
[1] York Univ, Dept Comp Sci, Toronto, ON M3J 1P3, Canada
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Much work has been done on characterizing the workload of a database system. Previous studies focused on providing different types of statistical summaries, and modeling the run-time behavior on the physical resource level. In this paper, we focus on characterizing the database system's workload from the view of database users. We use user access patterns to describe how a client application or a group of users accesses the data of a database system. The user access patterns include a set of user access events that represent the format of the queries and a set of user access graphs that represent the query execution orders. User access patterns can help database administrators tune the system, help database users optimize queries, and help to predict and cache future queries. In this paper, we present several approaches to using user access patterns to improve system performance, and report some experimental results.
引用
收藏
页码:528 / 538
页数:11
相关论文
共 50 条
  • [31] Music Recommendation Based on Acoustic Features and User Access Patterns
    Shao, Bo
    Wang, Dingding
    Li, Tao
    Ogihara, Mitsunori
    IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2009, 17 (08): : 1602 - 1611
  • [32] Web user's access path clustering
    Li, Jihong
    Song, Yijun
    Wang, Kaihua
    2007 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING, AND CONTROL, VOLS 1 AND 2, 2007, : 111 - +
  • [33] Characterizing database errors
    Qian, Guoliang
    INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2007, : 205 - 210
  • [34] User's Requirements in Internet Access Sharing
    Tavares, Conceicao
    Santos, Henrique
    ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, 2013, 206 : 923 - 929
  • [35] Resource Allocation Between Temporal Cloud Database and User Using Access Control
    Muthurajkumar, S.
    Vijayalakshmi, M.
    Kannan, A.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [36] Characterizing a user's mental involvement in interaction with complex systems
    Treu, S
    THIRD ANNUAL SYMPOSIUM ON HUMAN INTERACTION WITH COMPLEX SYSTEMS - HICS '96, PROCEEDINGS, 1996, : 162 - 169
  • [37] Real Time Analytics for Characterizing the Computer User's State
    Carneiro, Davide
    Araujo, Daniel
    Pimenta, Andre
    Novais, Paulo
    ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, 2016, 5 (04): : 1 - 18
  • [38] Characterizing complications associated with skull clamps: A review of the manufacturer and user facility device experience database
    Shah, Harshal A.
    Mehta, Neel H.
    Mehta, Shyle H.
    Ward, Max
    McBriar, Joshua D.
    DAmico, Randy S.
    CLINICAL NEUROLOGY AND NEUROSURGERY, 2023, 235
  • [39] Spatiotemporal correlation in WebGIS group-user intensive access patterns
    Li, Rui
    Fan, Jiapei
    Jiang, Jie
    Wu, Huayi
    INTERNATIONAL JOURNAL OF GEOGRAPHICAL INFORMATION SCIENCE, 2017, 31 (01) : 36 - 55
  • [40] Analyzing Data Relevance and Access Patterns of Live Production Database Systems
    Boissier, Martin
    Meyer, Carsten
    Djuerken, Timo
    Lindemann, Jan
    Mao, Kathrin
    Reinhardt, Pascal
    Specht, Tim
    Zimmermann, Tim
    Uflacker, Matthias
    CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, : 2473 - 2475