Space-Efficient Multiversion Index Scheme for PCM-based Embedded Database Systems

Author(s):  
Yuan-Hung Kuan ◽  
Yuan-Hao Chang ◽  
Po-Chun Huang ◽  
Kam-Yiu Lam
2020 ◽  
Author(s):  
Yuanhui Yu

Abstract As we all know, embedded systems are becoming more and more widely used. All devices with digital interfaces, such as watches, microwave ovens, video recorders, automobiles, etc., use embedded systems, but most embedded systems are implemented by a single embedded application program to achieve the entire control logic.At present, embedded applications on the WinCE platform are extending towards microservices and miniaturization. More embedded device application data requires small, embedded database systems to organize, store, and manage. The embedded database SQLite has many advantages such as zero-configuration, lightweight, multiple interfaces, easy portability, readable source code, and open source. It is currently widely used in the WinCE embedded operating system. This article discusses the technical characteristics of the SQLite database in detail, SQLite data manipulation, SQLite transplantation under the WinCE platform, and finally implements SQLite data management on WinCE mobile terminal based on MFC programming.


2015 ◽  
Vol 64 (4) ◽  
pp. 925-940 ◽  
Author(s):  
Jiantao Wang ◽  
Kam-Yiu Lam ◽  
Yuan-Hao Chang ◽  
Jen-Wei Hsieh ◽  
Po-Chun Huang

2013 ◽  
Vol 655-657 ◽  
pp. 1779-1782
Author(s):  
Jian Pin Mao ◽  
Cai Ping Liu ◽  
Jian Xu Mao

B+-trees algorithm is a high efficient and common-used data organization algorithm in database system. But B+-trees algorithm has a disadvantage of low storage utilization. This disadvantage has a bad effect especially on embedded database systems, which have limit storage. To overcome this drawback, this paper presents an improved B+-trees algorithm, and applies it to an embedded database-Berkeley DB. Experimental results show that the improved B+-trees algorithm can attain higher storage utilization at the expense of more execution time than the conventional B+-trees algorithm.


2020 ◽  
Author(s):  
Yuanhui Yu

Abstract At present, embedded applications on the WinCE platform are extending towards microservices and miniaturization. More embedded device application data requires small, embedded database systems to organize, store, and manage. The embedded database SQLite has many advantages such as zero-configuration, lightweight, multiple interfaces, easy portability, readable source code, and open source. It is currently widely used in the WinCE embedded operating system. This article discusses the technical characteristics of the SQLite database in detail, SQLite data manipulation, SQLite transplantation under the WinCE platform, and finally implements SQLite data management on WinCE mobile terminal based on MFC programming.


1993 ◽  
Vol 32 (04) ◽  
pp. 265-268 ◽  
Author(s):  
D. J. Essin

AbstractLoosely structured documents can capture more relevant information about medical events than is possible using today’s popular databases. In order to realize the full potential of this increased information content, techniques will be required that go beyond the static mapping of stored data into a single, rigid data model. Through intelligent processing, loosely structured documents can become a rich source of detailed data about actual events that can support the wide variety of applications needed to run a health-care organization, document medical care or conduct research. Abstraction and indirection are the means by which dynamic data models and intelligent processing are introduced into database systems. A system designed around loosely structured documents can evolve gracefully while preserving the integrity of the stored data. The ability to identify and locate the information contained within documents offers new opportunities to exchange data that can replace more rigid standards of data interchange.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


Sign in / Sign up

Export Citation Format

Share Document