1988
DOI: 10.1093/comjnl/31.3.253
|View full text |Cite
|
Sign up to set email alerts
|

Clustering Related Tuples in Databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
6
0

Year Published

1990
1990
2006
2006

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 0 publications
1
6
0
Order By: Relevance
“…On the other hand the results of this study have added to our confidence that the V2 algorithm is superior to Malmquist's original Graph-Collapsing algorithm. While the benchmark we used was of course very limited, it is comparable with several others (e.g., Bell, 1984a;Bell et al 1988. ) Our conclusion is therefore that we should use the Graph-Collapsing algorithms in our design and reorganization tool.…”
Section: Discussionsupporting
confidence: 56%
See 1 more Smart Citation
“…On the other hand the results of this study have added to our confidence that the V2 algorithm is superior to Malmquist's original Graph-Collapsing algorithm. While the benchmark we used was of course very limited, it is comparable with several others (e.g., Bell, 1984a;Bell et al 1988. ) Our conclusion is therefore that we should use the Graph-Collapsing algorithms in our design and reorganization tool.…”
Section: Discussionsupporting
confidence: 56%
“…The response-time performance obtained after using each of these was compared with that for the only two published algorithms known to the authors dealing with this problem. We call these algorithm Vl and algorithm V2 and they were compared for performance in the past (Bell, 1984b;Bell, McErlean, Stewart, & Arbuckle 1988). Algorithm Vl is a minor development of Malmquist's algorithm (1978) and V2 is a two-level version as described in Section 2.…”
Section: Sacon (Controlled)mentioning
confidence: 99%
“…where no one method is best for all environments) seems to be the general rule. In, for example, external hashing schemes [16,17], buffer management [18] and conventional database clustering [19] we get the same phenomenon.…”
mentioning
confidence: 72%
“…The linear-time graph collapsing, GC, algorithm [19] proceeds as follows. Each pair of scans is weighted by summing the weights of object pairs in T where one object is on one of the scans and the other object is on the other.…”
Section: The Algorithms Graph Collapsingmentioning
confidence: 99%
“…Conventional allocation techniques (such as data stripping/de-clustering [3][4] [5] and data contiguity/clustering [6] [7] [SI) are developed mainly for text and numeric files, which although can be different in sizes, are more or less on the same order. Unfortunately, when applied to multimedia applications, the conventional techniques are inadequate and inefficient.…”
Section: Introductionmentioning
confidence: 99%