Procedural extensions of SQL

2021 ◽  
Vol 14 (8) ◽  
pp. 1378-1391
Author(s):  
Surabhi Gupta ◽  
Karthik Ramachandra

Procedural extensions of SQL have been in existence for many decades now. However, little is known about their magnitude of usage and their complexity in real-world workloads. Procedural code executing in a RDBMS is known to have inefficiencies and limitations; as a result there have been several efforts to address this problem. However, the lack of understanding of their use in real workloads makes it challenging to (a) motivate new work in this area, (b) identify research challenges and opportunities, and (c) demonstrate impact of novel work. We aim to address these challenges with our work. In this paper, we present the results of our in-depth analysis of thousands of stored procedures, user-defined functions and triggers taken from several real workloads. We introduce SQL-ProcBench , a benchmark for procedural workloads in RDBMSs. SQL-ProcBench has been created using the insights derived from our analysis, and thus represents real workloads. Using SQL-ProcBench, we present an experimental evaluation on several database engines to understand and identify research challenges and opportunities. We emphasize the need to work on these interesting and relevant problems, and encourage researchers to contribute to this area.

AI Magazine ◽  
2016 ◽  
Vol 37 (2) ◽  
pp. 76-84 ◽  
Author(s):  
Ron Alterovitz ◽  
Sven Koenig ◽  
Maxim Likhachev

Recent years have seen significant technical progress on robot planning, enabling robots to compute actions and motions to accomplish challenging tasks involving driving, flying, walking, or manipulating objects. However, robots that have been commercially deployed in the real world typically have no or minimal planning capability. These robots are often manually programmed, teleoperated, or programmed to follow simple rules. Although these robots are highly successful in their respective niches, a lack of planning capabilities limits the range of tasks for which currently deployed robots can be used. In this article, we highlight key conclusions from a workshop sponsored by the National Science Foundation in October 2013 that summarize opportunities and key challenges in robot planning and include challenge problems identified in the workshop that can help guide future research towards making robot planning more deployable in the real world.


2013 ◽  
Vol 3 (Suppl 1) ◽  
pp. A30.2-A30
Author(s):  
Sarah Russell ◽  
Sharon Chadwick ◽  
Kate Hodell ◽  
Miller Barbara ◽  
Erzsi Nmeth ◽  
...  

Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 507
Author(s):  
Piotr Białczak ◽  
Wojciech Mazurczyk

Malicious software utilizes HTTP protocol for communication purposes, creating network traffic that is hard to identify as it blends into the traffic generated by benign applications. To this aim, fingerprinting tools have been developed to help track and identify such traffic by providing a short representation of malicious HTTP requests. However, currently existing tools do not analyze all information included in the HTTP message or analyze it insufficiently. To address these issues, we propose Hfinger, a novel malware HTTP request fingerprinting tool. It extracts information from the parts of the request such as URI, protocol information, headers, and payload, providing a concise request representation that preserves the extracted information in a form interpretable by a human analyst. For the developed solution, we have performed an extensive experimental evaluation using real-world data sets and we also compared Hfinger with the most related and popular existing tools such as FATT, Mercury, and p0f. The conducted effectiveness analysis reveals that on average only 1.85% of requests fingerprinted by Hfinger collide between malware families, what is 8–34 times lower than existing tools. Moreover, unlike these tools, in default mode, Hfinger does not introduce collisions between malware and benign applications and achieves it by increasing the number of fingerprints by at most 3 times. As a result, Hfinger can effectively track and hunt malware by providing more unique fingerprints than other standard tools.


2021 ◽  
Vol 13 (5) ◽  
pp. 105
Author(s):  
Mohamed Yousif ◽  
Chaminda Hewage ◽  
Liqaa Nawaf

The COVID-19 pandemic provided a much-needed sanity check for IoT-inspired frameworks and solutions. IoT solutions such as remote health monitoring and contact tracing provided support for authorities to successfully manage the spread of the coronavirus. This article provides the first comprehensive review of key IoT solutions that have had an impact on COVID-19 in healthcare, contact tracing, and transportation during the pandemic. Each sector is investigated in depth; and potential applications, social and economic impact, and barriers for mass adaptation are discussed in detail. Furthermore, it elaborates on the challenges and opportunities for IoT framework solutions in the immediate post-COVID-19 era. To this end, privacy and security concerns of IoT applications are analyzed in depth and emerging standards and code of practices for mass adaptation are also discussed. The main contribution of this review paper is the in-depth analysis and categorization of sector-wise IoT technologies, which have the potential to be prominent applications in the new normal. IoT applications in each selected sector are rated for their potential economic and social impact, timeline for mass adaptation, and Technology Readiness Level (TRL). In addition, this article outlines potential research directions for next-generation IoT applications that would facilitate improved performance with preserved privacy and security, as well as wider adaptation by the population at large.


2019 ◽  
Vol 8 (6) ◽  
pp. 272 ◽  
Author(s):  
Iq Reviessay Pulshashi ◽  
Hyerim Bae ◽  
Hyunsuk Choi ◽  
Seunghwan Mun ◽  
Riska Asriana Sutrisnowati

Analysis of trajectory such as detection of an outlying trajectory can produce inaccurate results due to the existence of noise, an outlying point-locations that can change statistical properties of the trajectory. Some trajectories with noise are repairable by noise filtering or by trajectory-simplification. We herein propose the application of a trajectory-simplification approach in both batch and streaming environments, followed by benchmarking of various outlier-detection algorithms for detection of outlying trajectories from among simplified trajectories. Experimental evaluation in a case study using real-world trajectories from a shipyard in South Korea shows the benefit of the new approach.


2015 ◽  
Vol 52 ◽  
pp. 1-10 ◽  
Author(s):  
Athanasios V. Vasilakos ◽  
Zhe Li ◽  
Gwendal Simon ◽  
Wei You

2017 ◽  
Vol 39 (3) ◽  
pp. 521-544 ◽  
Author(s):  
Joana Castro Pereira ◽  
Miguel Rodrigues Freitas

Abstract Cities have become important actors in international relations, and integral to security and environmental politics. We are living in an increasingly urban world, dominated by human settlements and activities. The central role now played by humans in shaping the planet has led us into an uncertain, unstable, and dangerous geological epoch – the Anthropocene – that poses great and additional challenges to security. Local and global spheres are connected as never before, generating ‘glocal’ issues in which water plays a central role. Water is the element that interconnects the complex web of food, energy, climate, economic growth, and human security. In a rapidly urbanising world, cities influence the hydrological cycle in major but uncertain ways, affecting water resources beyond their boundaries. There is no doubt that these issues are highly relevant to the discipline of International Relations (IR). However, IR scholars have been slow to engage with them, and most academic studies of cities and water security still emanate from the natural sciences. This article examines the ways in which cities in the Anthropocene challenge water security, and why IR needs to reinvent itself if it wants to sustain its contribution to global security.


Sign in / Sign up

Export Citation Format

Share Document