Efficient migration of binary XML across databases
    3.
    发明授权
    Efficient migration of binary XML across databases 有权
    跨数据库高效迁移二进制XML

    公开(公告)号:US08909599B2

    公开(公告)日:2014-12-09

    申请号:US11601116

    申请日:2006-11-16

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30908

    摘要: Techniques are provided for transporting subset of databases containing binary XML data. In one embodiment, a method is provided that allows transporting binary XML data that conforms to schema by also transporting the schema entries that are necessary to derive the binary XML. In another embodiment, a method is provided that allows transporting binary XML data that does not conform to schema by also transporting the token tables that contain the mapping for the binary XML.

    摘要翻译: 提供了用于传输包含二进制XML数据的数据库的子集的技术。 在一个实施例中,提供了一种方法,其允许传送符合模式的二进制XML数据,还传送导出二进制XML所必需的模式条目。 在另一个实施例中,提供了一种方法,其允许通过还传送包含二进制XML的映射的令牌表来传输不符合模式的二进制XML数据。

    Efficient migration of binary XML across databases
    4.
    发明申请
    Efficient migration of binary XML across databases 有权
    跨数据库高效迁移二进制XML

    公开(公告)号:US20080120351A1

    公开(公告)日:2008-05-22

    申请号:US11601116

    申请日:2006-11-16

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30908

    摘要: Techniques are provided for transporting subset of databases containing binary XML data. In one embodiment, a method is provided that allows transporting binary XML data that conforms to schema by also transporting the schema entries that are necessary to derive the binary XML. In another embodiment, a method is provided that allows transporting binary XML data that does not conform to schema by also transporting the token tables that contain the mapping for the binary XML.

    摘要翻译: 提供了用于传输包含二进制XML数据的数据库的子集的技术。 在一个实施例中,提供了一种方法,其允许传送符合模式的二进制XML数据,还传送导出二进制XML所必需的模式条目。 在另一个实施例中,提供了一种方法,其允许通过还传送包含二进制XML的映射的令牌表来传输不符合模式的二进制XML数据。

    EFFICIENT FILE ACCESS IN A LARGE REPOSITORY USING A TWO-LEVEL CACHE
    5.
    发明申请
    EFFICIENT FILE ACCESS IN A LARGE REPOSITORY USING A TWO-LEVEL CACHE 有权
    使用两级高速缓存的大型报表中的高效文件访问

    公开(公告)号:US20110113036A1

    公开(公告)日:2011-05-12

    申请号:US12615090

    申请日:2009-11-09

    IPC分类号: G06F17/30 G06F12/00 G06F12/08

    摘要: A two-level cache to facilitate resolving resource path expressions for a hierarchy of resources is described, which includes a system-wide shared cache and a session-level cache. The shared cache is organized as a hierarchy of hash tables that mirrors the structure of a repository hierarchy. A particular hash table in a shared cache includes information for the child resources of a particular resource. A database management system that manages a shared cache may control the amount of memory used by the cache by implementing a replacement policy for the cache based on one or more characteristics of the resources in the repository. The session-level cache is a single level cache in which information for target resources of resolved path expressions may be tracked. In the session-level cache, the resource information is associated with the entire path expression of the associated resource.

    摘要翻译: 描述了用于促进解决资源层级的资源路径表达式的两级缓存,其包括系统范围共享高速缓存和会话级缓存。 共享缓存被组织为映射存储库层次结构的散列表的层次结构。 共享缓存中的特定哈希表包括特定资源的子资源的信息。 管理共享高速缓存的数据库管理系统可以基于存储库中的资源的一个或多个特性来实现对高速缓存的替换策略来控制高速缓存所使用的存储器量。 会话级缓存是单级缓存,其中可以跟踪解析的路径表达式的目标资源的信息。 在会话级缓存中,资源信息与相关资源的整个路径表达式相关联。

    Technique for efficiently evaluating a security policy
    6.
    发明授权
    Technique for efficiently evaluating a security policy 有权
    有效评估安全策略的技术

    公开(公告)号:US08584196B2

    公开(公告)日:2013-11-12

    申请号:US12114915

    申请日:2008-05-05

    IPC分类号: G06F21/00

    CPC分类号: G06F21/604

    摘要: One embodiment of the present invention provides a system for efficiently evaluating a security policy. During operation, the system retrieves one or more roles associated with the user. Next, the system checks if a session-level cache exists for a set of Access Control Entries (ACEs) which is associated with the one or more roles. If this session-level cache exists, the system returns the set of ACEs from the session-level cache. Otherwise, the system generates the set of ACEs associated with the one or more roles from an Access Control List (ACL). During operation, the system can also update the one or more roles associated with the user and update the set of ACEs based on the updated one or more roles and the ACL. The system subsequently updates the session level cache with the updated set of ACEs and updated one or more roles.

    摘要翻译: 本发明的一个实施例提供了一种用于有效评估安全策略的系统。 在操作期间,系统检索与用户相关联的一个或多个角色。 接下来,系统检查与一个或多个角色相关联的一组访问控制条目(ACE)是否存在会话级缓存。 如果此会话级缓存存在,系统会从会话级缓存中返回一组ACE。 否则,系统将从访问控制列表(ACL)生成与一个或多个角色相关联的一组ACE。 在操作期间,系统还可以更新与用户相关联的一个或多个角色,并根据更新的一个或多个角色和ACL更新ACE集合。 系统随后使用更新的一组ACE更新会话级缓存并更新一个或多个角色。

    TECHNIQUE FOR EFFICIENTLY EVALUATING A SECURITY POLICY
    7.
    发明申请
    TECHNIQUE FOR EFFICIENTLY EVALUATING A SECURITY POLICY 有权
    有效评估安全政策的技术

    公开(公告)号:US20090276824A1

    公开(公告)日:2009-11-05

    申请号:US12114915

    申请日:2008-05-05

    IPC分类号: G06F21/00

    CPC分类号: G06F21/604

    摘要: One embodiment of the present invention provides a system for efficiently evaluating a security policy. During operation, the system retrieves one or more roles associated with the user. Next, the system checks if a session-level cache exists for a set of Access Control Entries (ACEs) which is associated with the one or more roles. If this session-level cache exists, the system returns the set of ACEs from the session-level cache. Otherwise, the system generates the set of ACEs associated with the one or more roles from an Access Control List (ACL). During operation, the system can also update the one or more roles associated with the user and update the set of ACEs based on the updated one or more roles and the ACL. The system subsequently updates the session level cache with the updated set of ACEs and updated one or more roles.

    摘要翻译: 本发明的一个实施例提供了一种用于有效评估安全策略的系统。 在操作期间,系统检索与用户相关联的一个或多个角色。 接下来,系统检查与一个或多个角色相关联的一组访问控制条目(ACE)是否存在会话级缓存。 如果此会话级缓存存在,系统会从会话级缓存中返回一组ACE。 否则,系统将从访问控制列表(ACL)生成与一个或多个角色相关联的一组ACE。 在操作期间,系统还可以更新与用户相关联的一个或多个角色,并根据更新的一个或多个角色和ACL更新ACE集合。 系统随后使用更新的一组ACE更新会话级缓存并更新一个或多个角色。

    Efficient file access in a large repository using a two-level cache
    8.
    发明授权
    Efficient file access in a large repository using a two-level cache 有权
    使用两级缓存在大型存储库中高效地进行文件访问

    公开(公告)号:US08326839B2

    公开(公告)日:2012-12-04

    申请号:US12615090

    申请日:2009-11-09

    IPC分类号: G06F7/00 G06F17/00 G06F17/30

    摘要: A two-level cache to facilitate resolving resource path expressions for a hierarchy of resources is described, which includes a system-wide shared cache and a session-level cache. The shared cache is organized as a hierarchy of hash tables that mirrors the structure of a repository hierarchy. A particular hash table in a shared cache includes information for the child resources of a particular resource. A database management system that manages a shared cache may control the amount of memory used by the cache by implementing a replacement policy for the cache based on one or more characteristics of the resources in the repository. The session-level cache is a single level cache in which information for target resources of resolved path expressions may be tracked. In the session-level cache, the resource information is associated with the entire path expression of the associated resource.

    摘要翻译: 描述了用于促进解决资源层级的资源路径表达式的两级缓存,其包括系统范围共享高速缓存和会话级缓存。 共享缓存被组织为映射存储库层次结构的散列表的层次结构。 共享缓存中的特定哈希表包括特定资源的子资源的信息。 管理共享高速缓存的数据库管理系统可以基于存储库中的资源的一个或多个特性来实现对高速缓存的替换策略来控制高速缓存所使用的存储器量。 会话级缓存是单级缓存,其中可以跟踪解析的路径表达式的目标资源的信息。 在会话级缓存中,资源信息与相关资源的整个路径表达式相关联。

    Automatic Denormalization For Analytic Query Processing In Large-Scale Clusters
    9.
    发明申请
    Automatic Denormalization For Analytic Query Processing In Large-Scale Clusters 有权
    用于大规模集群中的分析查询处理的自动非规范化

    公开(公告)号:US20140067791A1

    公开(公告)日:2014-03-06

    申请号:US13605903

    申请日:2012-09-06

    IPC分类号: G06F17/30

    摘要: A system and method for improving performance of join operations is disclosed. The method in one embodiment includes building a graph of vertices and edges, which represent the tables and join conditions for a particular database schema. The method then traverses the graph to find a set of candidate join operations. The method further includes selecting from the set of subset of join operations that makes the best use of a given amount of memory, which means finding a collection of denormalizations which when residing in memory provide the most benefit and the least cost for the given amount of memory. The method then deploys the denormalizations so that current queries in a query processing system can use them instead of actually performing the joins.

    摘要翻译: 公开了一种用于提高连接操作性能的系统和方法。 一个实施例中的方法包括构建顶点和边的图,其表示特定数据库模式的表和连接条件。 然后,该方法遍历图形以找到一组候选连接操作。 该方法还包括从充分利用给定量的存储器的连接操作的集合集合中进行选择,这意味着找到一种非规范化集合,其在驻留在存储器中时提供最大的收益,并且给定量的 记忆。 然后,该方法部署非规范化,以便查询处理系统中的当前查询可以使用它们,而不是实际执行连接。

    Automatic denormalization for analytic query processing in large-scale clusters
    10.
    发明授权
    Automatic denormalization for analytic query processing in large-scale clusters 有权
    大规模集群中分析查询处理的自动反规范化

    公开(公告)号:US09031932B2

    公开(公告)日:2015-05-12

    申请号:US13605903

    申请日:2012-09-06

    IPC分类号: G06F17/30

    摘要: A system and method for improving performance of join operations is disclosed. The method in one embodiment includes building a graph of vertices and edges, which represent the tables and join conditions for a particular database schema. The method then traverses the graph to find a set of candidate join operations. The method further includes selecting from the set of subset of join operations that makes the best use of a given amount of memory, which means finding a collection of denormalizations which when residing in memory provide the most benefit and the least cost for the given amount of memory. The method then deploys the denormalizations so that current queries in a query processing system can use them instead of actually performing the joins.

    摘要翻译: 公开了一种用于提高连接操作性能的系统和方法。 一个实施例中的方法包括构建顶点和边的图,其表示特定数据库模式的表和连接条件。 然后,该方法遍历图形以找到一组候选连接操作。 该方法还包括从充分利用给定量的存储器的连接操作的集合集合中进行选择,这意味着找到一种非规范化集合,其在驻留在存储器中时提供最大的收益,并且给定量的 记忆。 然后,该方法部署非规范化,以便查询处理系统中的当前查询可以使用它们,而不是实际执行连接。