Brighthouse: An Analytic Data Warehouse for Ad-hoc Queries

被引:0
|
作者
Slezak, Dominik [1 ]
Wroblewski, Jakub [1 ]
Eastwood, Victoria [1 ]
Synak, Piotr [1 ]
机构
[1] Infobright Inc, Warsaw, Poland
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2008年 / 1卷 / 02期
关键词
D O I
10.14778/1454159.1454174
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Brighthouse is a column-oriented data warehouse with an automatically tuned, ultra small overhead metadata layer called Knowledge Grid, that is used as an alternative to classical indexes. The advantages of column-oriented data storage, as well as data compression have already been welldocumented, especially in the context of analytic, decision support querying. This paper demonstrates additional benefits resulting from Knowledge Grid for compressed, columnoriented databases. In particular, we explain how it assists in query optimization and execution, by minimizing the need of data reads and data decompression.
引用
收藏
页码:1337 / 1345
页数:9
相关论文
共 50 条
  • [31] Collecting data in ad-hoc networks with reduced uncertainty
    Levin, Liron
    Efrat, Alon
    Segal, Michael
    AD HOC NETWORKS, 2014, 17 : 71 - 81
  • [32] Data dissemination over vehicular ad-hoc networks
    Wang, Zhao-Yang
    Jin, Bei-Hong
    Zhang, Fu-Sang
    Zhang, Li-Feng
    Zhuo, Wei
    Ruan Jian Xue Bao/Journal of Software, 2013, 24 (SUPPL.2): : 50 - 60
  • [33] Ad-hoc filesystem: A novel network Filesystem for ad-hoc wireless networks
    Yasuda, K
    Hagino, T
    NETWORKING - ICN 2001, PART II, PROCEEDINGS, 2001, 2094 : 177 - 185
  • [34] DataCalc: Ad-hoc Analyses on Heterogeneous Data Sources
    Luong, Johannes
    Habich, Dirk
    Lehner, Wolfgang
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 463 - 468
  • [35] An overlay approach to data security in ad-hoc networks
    Liebeherr, Joerg
    Dong, Guangyu
    AD HOC NETWORKS, 2007, 5 (07) : 1055 - 1072
  • [36] AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL An Authentication Protocol for Ad-hoc Networks
    Hamad, A. M.
    Khedr, W. I.
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 274 - +
  • [37] HOW TO MAKE AD-HOC POLYMORPHISM LESS AD HOC
    WADLER, P
    BLOTT, S
    CONFERENCE RECORD OF THE SIXTEENTH ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF PROGRAMMING LANGUAGES, 1989, : 60 - 76
  • [38] MADN - Multipath Ad-hoc Data Network Prototype and Experiments
    Angius, Fabio
    Bhiday, Aditya
    Gerla, Mario
    Pau, Giovanni
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 686 - 693
  • [39] Ad-Hoc Reviewers For 2006
    不详
    Journal of Nonverbal Behavior, 2007, 31 (1) : 77 - 77
  • [40] Against an ad-hoc policy
    Guttenberg, KTFZ
    INTERNATIONALE POLITIK, 2005, 60 (06): : 66 - 66