Data Access Collection and Data Partitioning for NUMA Architectures

Author(s):  
C.R. Calidonna ◽  
M. Mango Furnari
Author(s):  
Aakanksha Jumle ◽  
Swati Ahirrao

<p>Cloud computing offers various and useful services like IAAS, PAAS SAAS for deploying the applications at low cost. Making it available anytime anywhere with the expectation to be it scalable and consistent. One of the technique to improve the scalability is Data partitioning. The alive techniques which are used are not that capable to track the data access pattern. This paper implements the scalable workload-driven technique for polishing the scalability of web applications. The experiments are carried out over cloud using NoSQL data store MongoDB to scale out. This approach offers low response time, high throughput and less number of distributed transaction. The results of partitioning technique is conducted and evaluated using TPC-C benchmark.</p>


2014 ◽  
Vol 536-537 ◽  
pp. 512-515
Author(s):  
Jian Qiang Dai

With the promotion of 3G networks and upcoming 4G network, mobile phone users in constant rise. The volume of data they produce will soar every day. A variety of data appear results in the database have rapid increasing. Some application system in access to these heterogeneous, huge databases is bound to access difficulties, the problem of low efficiency of access. Query optimization technology is proposed in this paper, based on data partitioning, by reducing the database size to solve the problem of memory and huge amounts of data access problems. From the experiment test, the method can effectively improve the efficiency of huge amounts of data access, can get satisfactory results.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


2011 ◽  
Vol 34 (3) ◽  
pp. 473-481
Author(s):  
Guo-Fu XIE ◽  
Wen-Cheng WANG
Keyword(s):  

2020 ◽  
Vol 28 (1) ◽  
pp. 181-195
Author(s):  
Quentin Vanhaelen

: Computational approaches have been proven to be complementary tools of interest in identifying potential candidates for drug repurposing. However, although the methods developed so far offer interesting opportunities and could contribute to solving issues faced by the pharmaceutical sector, they also come with their constraints. Indeed, specific challenges ranging from data access, standardization and integration to the implementation of reliable and coherent validation methods must be addressed to allow systematic use at a larger scale. In this mini-review, we cover computational tools recently developed for addressing some of these challenges. This includes specific databases providing accessibility to a large set of curated data with standardized annotations, web-based tools integrating flexible user interfaces to perform fast computational repurposing experiments and standardized datasets specifically annotated and balanced for validating new computational drug repurposing methods. Interestingly, these new databases combined with the increasing number of information about the outcomes of drug repurposing studies can be used to perform a meta-analysis to identify key properties associated with successful drug repurposing cases. This information could further be used to design estimation methods to compute a priori assessment of the repurposing possibilities.


Sign in / Sign up

Export Citation Format

Share Document