摘要:
A method for consistent selectivity estimation based on the principle of maximum entropy (ME) is provided. The method efficiently exploits all available information and avoids the bias problem. In the absence of detailed knowledge, the ME approach reduces to standard uniformity and independence assumptions. The disclosed method, based on the principle of ME, is used to improve the optimizer's cardinality estimates by orders of magnitude, resulting in better plan quality and significantly reduced query execution times.
摘要:
An adaptive replacement cache policy dynamically maintains two lists of pages, a recency list and a frequency list, in addition to a cache directory. The policy keeps these two lists to roughly the same size, the cache size c. Together, the two lists remember twice the number of pages that would fit in the cache. At any time, the policy selects a variable number of the most recent pages to exclude from the two lists. The policy adaptively decides in response to an evolving workload how many top pages from each list to maintain in the cache at any given time. It achieves such online, on-the-fly adaptation by using a learning rule that allows the policy to track a workload quickly and effectively.
摘要:
An adaptive replacement cache policy dynamically maintains two lists of pages, a recency list and a frequency list, in addition to a cache directory. The policy keeps these two lists to roughly the same size, the cache size c. Together, the two lists remember twice the number of pages that would fit in the cache. At any time, the policy selects a variable number of the most recent pages to exclude from the two lists. The policy adaptively decides in response to an evolving workload how many top pages from each list to maintain in the cache at any given time. It achieves such online, on-the-fly adaptation by using a learning rule that allows the policy to track a workload quickly and effectively. This allows the policy to balance between recency and frequency in an online and self-tuning fashion, in response to evolving and possibly changing access patterns. The policy is also scan-resistant. It allows one-time-only sequential read requests to pass through the cache without flushing pages that have temporal locality. The policy is extremely simple to implement and requires only constant-time overhead per request. The policy has negligible space overhead.
摘要:
A system, method and computer program product for providing links to remotely located information in a network of remotely connected computers. The system may or may not include a server providing an interface between shorthand codes and corresponding original files. If the server is included, a uniform resource locator (URL) is registered with a server. A shorthand link is associate with the registered URL. The associated shorthand link and URL are logged in a registry database. When a request is received for a shorthand link, the registry database is searched for an associated URL. If the shorthand link is found to be associated with an URL, the URL is fetched, otherwise an error message is returned. If the server is not included, all URLs located at a root page may be listed and associated with shorthand keys or links. Associated files and keys are indexed in an index file. The shorthand codes or keys are combined with the root page to form shorthand URLs. Requests are made for the shorthand URLs and the index file is searched for the requested shorthand URL. If the requested shorthand URL is encountered, the corresponding file is returned; otherwise, an error message is returned.
摘要:
A system and method for improving the effectiveness of web advertising by allowing a user to return and request a previously displayed ad that appeals to the user. Generally, the system employs an intelligent browser cache maintained within a user's terminal to keep web pages in cache and maintain information about hyperlinks contained therein. Furthermore, the system allows for the storing of ads in a bookmark memory without clicking on the ads. The bookmark memory is either permanently maintained or temporarily stored for a predetermined time period at the user's terminal to allow the user view all the stored ads at a later time. The system further includes an algorithm for computing the differences between previously visited pages stored in the intelligent browser cache and a new page in terms of their hyperlinks. Presented to the user in separate windows are all the ads from both the old and new pages to aid the user in deciding whether to click and visit a different page or to save the displayed page for later use. Finally, the system permits the user to request for ads previously displayed at a particular position by pointing his mouse to the current ad at such a location.
摘要:
Encrypted e-mails that reside in e-mail service providers servers or a gateway machines can be compromised and deciphered with advances in technology for breaking encryption codes. Significant security can be achieved by encrypting the message, splitting message, and transmitting the individual fragments via a set of unique e-mail servers. At the receivers end, the message can be reconstructed from the individual pieces and then decrypted and displayed to the recipient.
摘要:
A system and method that utilize a scheduling algorithm to reorder queued I/O commands in rotating disk drives. The reordering is implemented by selecting commands based on a probabilistic approach that minimizes the expected next command access time. Thus, the scheduling algorithm allows data to be accessed in the shortest possible expected time, and maximizes the throughput of the drive. The scheduling algorithm improves the I/O average access time by estimating the expected access time (EAT) for the queued commands, and by reordering these commands so that the command with the least expected access time (LEAT) is executed first. The scheduling algorithm weights the possible access times of commands stored in the scheduling queue, and accounts for the probability of executing a command during a first possible revolution or cycle, as well as the probability of executing the command in the second possible revolution. Both of these probabilities are taken into consideration in reaching a final determination as to the queue order of the commands. This allows for taking calculated risks in scheduling commands so as to minimize long-term average latency.
摘要:
A system and method is provided that allows participants in an electronic conference room to move to any spatial location in the electronic conference room by simply clicking and dragging, using a computer mouse, a graphical image representing the participant to any location in the electronic conference room. This allows participants to form small groups for communicating similar to a cocktail party situation. A communication media allows participants to communicate with one another within their particular groups. The participants can communicate though the graphical images either visually, audibly or both visually and audibly. Each user is provided visually with captions of other groups, which is reduced in size depending on the distance that particular group is from the user's location within the electronic conference room. In addition, each main user is provided with audible signals from other groups, which is attenuated based on the distance that particular group is from the user's location within the electronic conference room.
摘要:
A method for determining k nearest-neighbors to a query point in a database in which an ordering is defined for a data set P of a database, the ordering being based on l one-dimensional codes C.sub.1, . . . , C.sub.1. A single relation R is created in which R has the attributes of index-id, point-id and value. An entry (j,i,C.sub..epsilon.j (p.sub.i)) is included in relation R for each data point p.sub.i .EPSILON.P, where index-id equals j, point-id equals i, and value equals C.sub..epsilon.j (p.sub.i). A B-tree index is created based on a combination of the index-id attribute and the value attribute. A query point is received and a relation Q is created for the query point having the attributes of index-id and value. One tuple is generated in the relation Q for each j, j=1, . . . , l, where index-id equals j and value equals C.sub..epsilon.j (q). A distance d is selected. The index-id attribute for the relation R of each data point p.sub.i is compared to the index-id attribute for the relation Q of the query point. A candidate data point p.sub.i is selected when the comparison of the relation R of a data point p.sub.i to the index-id attribute for the relation Q of the query point is less than the distance d. Lower bounds are calculated for each cube of the plurality of cubes that represent a minimum distance between any point in a cube and the query point. Lastly, k candidate data points p.sub.i are selected as k nearest-neighbors to the query point.
摘要:
An integer programming formulation for weighted loop fusion is presented. Loop fusion is a well-known program transformation that has shown to be effective in reducing loop overhead and improving register and cache locality. Weighted loop fusion is the problem of finding a legal partition of loop nests into fusible clusters so as to minimize the total inter-cluster edge weights. Past work has shown that the weighted loop fusion problem is NP-hard. Despite the NP-hardness property, the present invention provides optimal solutions that may be found efficiently, in the context of an optimizing compiler, for weighted loop fusion problem sizes that occur in practice. An integer programming formulation for weighted loop fusion with a problem size (number of variables and constraints) that is linearly proportional to the size of the input weighted loop fusion problem is also presented. The integer programming formulation may be solved efficiently using a general integer programming package. Alternatively, a custom branch-and-bound procedure for the integer programming formulation is presented that is more efficient than the procedures used in general integer programming.